texts
sequence
meta
dict
scores
sequence
avg_score
float64
0
0.13
num_sents
int64
5
5
[ "Q:\n\nCheck if a column is auto incremented in Sybase with JDBC\n\nTo check if a column is auto incremented i can do the following\nConnection con = ... \nDatabaseMetaData meta = con.getMetaData();\nResultSet metaCols = meta.getColumns(catalog, schema, table, \"%\");\nwhile ( metaCols.next() ) \n String value = rs.getString(\"IS_AUTOINCREMENT\") \n ...\n\nworks fine except with Sybase databases. ", "I've tried it with the jTDS and JConnect drivers, but with both drivers I get the this exception:\njava.sql.", "SQLException: Invalid column name IS_AUTOINCREMENT.", "\n\nIs there another the get find out, whether a column in Sybase is auto incremented or not?", "\nI thought \"IS_AUTOINCREMENT\" is a feature with JDBC4 and jTDS is a JDBC4 compatible driver.", "\n\nA:\n\nSybase uses 'identity' columns rather than 'default autoincrement' which is why I believe you are getting this message. ", "\nTry checking if TYPE_NAME column contains keyword \"identity\".", "\nThe behaviour of identity columns is a little different also, but that is an aside.", "\n\nA:\n\nsp_help delivers all the information I need.", "\nThis SP returns several ResultSets.", "\nThe third ResultSet contains the information I need.", "\nStatement stmt = con.createStatement();\nstmt.executeQuery(\"sp_help \" + table);\nstmt.getMoreResults();\nstmt.getMoreResults();\nResultSet rs = stmt.getResultSet();\n//...\nwhile( rs.next() )\n boolean identity = rs.getBoolean(\"Identity\");\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.007575757575757576, 0.009345794392523364, 0.0196078431372549, 0.01098901098901099, 0.021739130434782608, 0, 0, 0, 0, 0.05555555555555555, 0.018867924528301886, 0.004219409282700422 ]
0.012325
5
[ "Q:\n\nAdd bootstrap tabs dynamically including the events firing mechanism\n\nUsing Bootstrap 3, I'm dynamically creating some tabs using the way suggested in this post:\nAdd / Remove Tabs Dynamically in Bootstrap - Make created tab active.", "\nIt's working great apart from the events firing mechanism.", "\nFor instance, when clicking on a statically predefined tab, the shown.bs.tab event is fired, but this is not the case for any dynamically created tabs.", "\nYou can try it on this fiddle adapted from the one proposed in the above post\nhttps://jsfiddle.net/HotPheel/v6be62c4/4/ \nHTML\n<div class=\"container\">\n<ul class=\"nav nav-tabs\">\n <li class=\"active\"><a href=\"#contact_01\" data-toggle=\"tab\">Joe Smith</a><span>x</span></li>\n <li><a href=\"#contact_02\" data-toggle=\"tab\">Molly Lewis</a><span>x</span> </li>\n <li><a href=\"#\" class=\"add-contact\" data-toggle=\"tab\">+ Add Contact</a></li>\n</ul>\n<div class=\"tab-content\">\n <div class=\"tab-pane active\" id=\"contact_01\">Contact Form: Joe Smith</div>\n <div class=\"tab-pane\" id=\"contact_02\">Contact Form: Molly Lewis</div>\n</div>\n\nJS\n$(\".nav-tabs\").on(\"click\", \"a\", function(e){\n e.preventDefault();\n $(this).tab('show');\n})\n.on(\"click\", \"span\", function () {\n var anchor = $(this).siblings('a');\n $(anchor.attr('href')).remove();\n $(this).parent().remove();\n $(\".nav-tabs li\").children('a').first().click();\n});\n\n$('.add-contact').click(function(e) {\n e.preventDefault();\n var id = $(\".nav-tabs\").children().length; //think about it ;)\n $(this).closest('li').before('<li><a href=\"#contact_'+id+'\">New Tab</a><span>x</span></li>');\n $('.tab-content').append('<div class=\"tab-pane\" id=\"contact_'+id+'\">Contact Form: New Contact '+id+'</div>');});\n\n$('a[data-toggle=\"tab\"]')\n .on('shown.bs.tab', function (e) {\n var target = $(e.target).attr(\"href\");\n alert('clicked on tab' + target);\n})\n\nCSS\n.container {margin-top: 10px;}\n.nav-tabs > li {position:relative;}\n.nav-tabs > li > a {display:inline-block;}\n.nav-tabs > li > span {\n display:none;\n cursor:pointer;\n position:absolute;\n right: 6px;\n top: 8px;\n color: red;}\n.nav-tabs > li:hover > span {display: inline-block;}\n\nAny idea on a method to dynamically create bootstrap tabs preserving the events ?", "\nThanks a lot for any help.", "\n\nA:\n\nThere's two issues I can identify that if addressed will implement a working solution: \nFirstly, your current code doesn't add data-toggle=\"tab\" to the new <li> in the logic that adds a new tab/ div. ", "So I updated this to:\n$(this).closest('li').before('<li><a href=\"#contact_'+id+'\" data-toggle=\"tab\">New Tab</a><span>x</span></li>');\n\nSecondly, according to other threads e.g. this one, the correct event handling logic would be to hook it like this:\n$(document).on('shown.bs.tab', 'a[data-toggle=\"tab\"]', function (e) {\n var target = $(e.target).attr(\"href\");\n alert('clicked on tab' + target);\n})\n\nUpdate fiddle: https://jsfiddle.net/RobinMackenzie/ym9enL5p/4/\nHope that helps.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0.0016759776536312849, 0, 0, 0.002079002079002079, 0 ]
0.000469
5
[ "仙台第一高等学校水泳部「WATER BOYZ」が、部活と勉強の両立をしている部員の様子をTwitterに投稿しています。……が、両立の仕方を大幅に間違ってしまったため、9000RTを超えるなど広く拡散されることに。", "\n\n水の張ったプールの中、机に向かって教科書を開く部員。水中にもかかわらずしっかり服を着て、一生懸命勉強をしている(?)のが分かります。……いや、両立するってそういうことじゃない。", "\n\nツイートでは「部員達は少ない時間をうまくやりくりして勉強と部活の両立をはかっています!」「三年生は、練習しながら受験勉強することにより、とても効率的に時間を使っています!」など、自信満々で勉強してる感を出していますが、どう考えても勉強できていないし、なんなら泳いですらいない。", "\n\n9月3日から5日にかけてシンクロ公演が予定されているという仙台第一高等学校水泳部。Twitterには「どうやって沈んでいるんだ」「教科書大丈夫ですか?」「この努力があの演技につながっているんですね!」などのリプライが寄せられています。水中での勉強はシンクロとはほとんど関係ないようにも思えますが、少なくとも見る人を楽しませようとする姿勢は本物かも……?", "\n\nこりゃシンクロ公演も見るしかないな\n\n画像提供 仙台一高 WATER BOYZ (公式)(@ichiko_wb)\n\n関連キーワード 学習 | 勉強 | 仙台 | 水泳 | Twitter | 部活\n\n" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.009345794392523364, 0, 0, 0.0056179775280898875, 0.00980392156862745 ]
0.004954
5
[ "Medical devices, such as imaging devices are often used in combination with many other medical devices. ", "These other devices are, for example, devices provided with a screen for monitoring data. ", "Other devices include medical instruments like injectors or support devices such as tables. ", "In order to operate the variety of devices in a medical room efficiently, there appears to be need to an improve tracking of the relative position of patients and staff with respect to the medical devices, during the use of such medical devices. ", "Regarding patients, in the prior art, it is suggested to locate the medical device with respect to the patient's bed. ", "This approach will have as an effect that if a patient moves on its bed, no adjustment is made with respect to the amended relative position of the medical device and the patient. ", "With respect to staff members, for the operation of medical devices, the relative position between the staff members and the devices is not used to improve the use of the devices." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Telomerase activity levels for evaluating the surgical margin in breast-conserving surgery.", "\nTo evaluate the efficiency of measuring telomerase activity levels in clinical diagnosis, we performed a semiquantitative analysis of telomerase activity in breast tumors and compared the results with the histological findings. ", "Breast tissue adjacent to areas of cancer were also serially resected and checked for telomerase activity. ", "The amount of telomerase activity in the breast cancers ranged widely, from 0.36 to 1180 units/microg, with 31 of the 34 (91.2%) showing a value above 1.0unit/microg. ", "None of the normal breast tissues including mastopathy, and only 4 (23.5%) of 17 benign breast masses had values above 1.0unit/microg. ", "Telomerase activity was detectable in serial sections of adjacent tissues as far as 10mm from the macroscopic tumor margin with histologically detectable cancer cells. ", "Furthermore, telomerase activity was detectable in the scrape specimens obtained from the stump of the surgical margins for breast-conserving surgery, and this activity was in accordance with the histological findings. ", "These findings show that conducting a semiquantitative assay of telomerase activity is useful for evaluating the surgical margin in breast-conserving surgery." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Location\n\nDescription\n\nZappion hotel is located close to the Kallimarmaron Stadium, where the 1st modern Olympic Games (1896) were held. ", "The hotel is situated on a quiet pedestrian street, a short distance from the National Garden and the Zappion Megaron. ", "Not far from the historical city center and Syntagma Square. ", "All the rooms have modern and simple decoration, their own bathroom, telephone, TV, air-conditioning and central heating.\\r\\n\n\nTripAdvisor Reviews Zappion Hotel Athens\n\nTravel Blogs from Athens\n\nWe spent most of our day on the bus again but it was worth it to get to Athens. ", "We had a bus tour around the main sights of the city and then got to walk up to the Acropolis which had some amazing views and a really interesting history. ", "We were then dropped in town and a few of us decided to check out the changing of the guard at Parliament House. ", "I'm glad I did it, as it was the strangest thing I have ever seen and I could not imagine doing it every hour. ...", "\n\n... green peppers, olives and sausage on a thin crust dough. ", "Totally delicious... Pretty sure pizza at home is now ruined for me too, lol. ", "All the food here has been so fresh. ", "We have really noticed a huge difference in just the quality of ingredients in even cheap street food versus what you could get home for equal price. ", "North America has really done itself no favours by filling its cities with fast food chains and over processed mass produced foods. ...", "\n\n... woman-there you have it guys, I am classically beautiful!!! :) ", "Anyways, I told him that I was Australian. ", "He asked if I had Greek heritage-I am like no and then he said goodbye. ", "It was such a random conversation-I even checked if my wallet was fine but it was all untouched. ", "This guy was who he said he was and he truly thought I was Greek!", "\n\nI was meant to meet a friend in Monastiraki square but she ended up in Syntagma square and by the time I knew that I had made it ...\n\n... and filled our already expanding tummies before dragging our feet to bed.. Comfortable sleep encouraged by the vibration of ( no not that )...the engines roaring below took us to Patros where we boarded the coach which took us comfortably along the scenic route via Corinth to Athens.....lots of Greek.... Very little English!!! ", "Thank goodness for John who got directions to the bus station which was to take us to Pireaus...the port town ...\n\n... not Cunard! ", "Met our dinner guests, only 6 of us tonight on our table 394, our waiter(male Philippino) is called June, a couple from Liverpool about our age,Jeremy, an ex Pharmacist now teaching about substance abuse & his wife Pat a hospital matron now retired. ", "Then a older lady 84yr old Betty (English) from Birmingham and her daughter Sheryl ,a teacher in her 50's I would guess,live in Cleveland Ohio. ", "A good group we really enjoy their company already. ", "After dinner about ..." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.008403361344537815, 0, 0.0036363636363636364, 0.006369426751592357, 0.008849557522123894, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007633587786259542, 0.008, 0.013888888888888888, 0, 0 ]
0.002469
5
[ "Chapel Hill Transit\n\nChapel Hill Transit operates public bus and van transportation services within the contiguous municipalities of Chapel Hill and Carrboro and the campus of the University of North Carolina at Chapel Hill in the southeast corner of Orange County in the Research Triangle metropolitan region of North Carolina. ", "Chapel Hill Transit operates its fixed route system fare free due to a contractual agreement with the two towns and the university to share annual operating and capital costs.", "\n\nHistory\nIn the early 1970s, during the administration of Chapel Hill Mayor Howard Nathaniel Lee, the Public Transportation Study Committee was formed, consisting of representatives from the Towns of Chapel Hill and Carrboro, and UNC. ", "The committee then received a Federal Urban Mass Transit Administration grant to examine the suitability of a permanent transit system. ", "Town voters approved a $350,000 bond referendum for local match for capital and a $.10/$100 valuation ad valorem tax to support transit operations. ", "Chapel Hill Transit began operations in August 1974 as a department of the Town of Chapel Hill government. ", "Prior to Chapel Hill Transit, the UNC Student Government operated a campus shuttle system from 1968 until 1974. ", "The Transit Director reports to the Town Manager, who is responsible to the Town Council. ", "A citizen advisory committee, the Transportation Board, makes recommendations to the Town Council on transportation and traffic issues. ", "A plan adopted by the Town Council in 1977 included a set of transportation goals which specifically encourage transit over automobile use in the central areas of Chapel Hill. ", "Although the transit system is operated by the town of Chapel Hill, Carrboro and UNC are financial partners in the operations. ", "System expenses are allocated based upon population. ", "Carrboro began purchasing transit services in the fiscal year 1977-1978 with revenue sharing funds. ", "In the fall of 1980, Carrboro approved a $.10/$100 valuation ad valorem tax to pay for transit service. ", "In fiscal year 1980–1981 the Carrboro contract first included the EZ Rider.", "\n\nIn 1992, Chapel Hill Transit teamed up with the Triangle Clean Cities Coalition and Ebus, a California company that manufactures electric buses, to demonstrate a 22-passenger bus that promised cleaner air and reduced dependence on foreign fuels. ", "This vehicle demonstration followed an earlier one arranged by the Public Transportation Division of the North Carolina Department of Transportation. ", "In the earlier demonstration, a Transteq hybrid bus was transported from daily use in Denver, Colorado, and made available for test drives on the Chapel Hill Transit lot. ", "In February 2006, K. Stephen Spade, a former Des Moines Metropolitan Transit Authority employee, was hired as the transportation director for the Town of Chapel Hill. ", "In August 2006, Chapel Hill Transit announced that their buses will be equipped with GPS tracking devices, allowing the bus riders to check the arrival time of the buses using the internet and their cell phone. ", "The project was completed by NextBus Inc. Fourteen bus stops would also have digitized signs showing the estimated arrival times of buses. ", "These signs were controversial, as the cost of installing them was almost $1 million. ", "In September 2006, Chapel Hill Transit announced plans to buy begin purchasing hybrid buses. ", "The town planned to buy as many as nineteen new buses: three hybrids, several extra-long and the rest standard size. ", "In October 2006, the Chapel Hill Town Council approved the purchase of sixteen new Chapel Hill Transit buses at a cost of $5.8 million from Gillig Corp. Federal grants provided about $5.2 million, and the town provided approximately $600,000 in local funds. ", "Three of these sixteen new buses run on diesel-electric drivetrains. ", "The rest of the buses are mostly powered by Detroit Diesel series 50 engines. ", "The buses, delivered in July 2007, were expanded the system and replaced older buses. ", "The town had an additional $1.7 million in federal funding which was sufficient to purchase four 60-foot Articulated buses, each with two sections that allow them to flex in the middle. ", "All of the purchased buses were low-floor buses with interior floors at curb level.", "\n\nFixed Route Service\nThe Chapel Hill Transit system consists of 24 weekday routes and 9 weekend routes. ", "5 of the weekday routes are considered express routes and area designated with an X, with the exception of route 420. ", "The basic hours of operation are from early morning to evening. ", "Connections to GoTriangle, Orange County Transportation Authority, and PART are available. ", "Each fixed route vehicle is equipped with a bike rack mounted on the front of the bus with capacity for two bicycles. ", "\n\n3 \"Safe Ride\" routes operate on Thursday, Friday, and Saturday evenings when the university is in session. ", "\n\nA Senior Shuttle route operates weekdays making 7 stops each hour, in a loop, to destinations in Chapel Hill and Carrboro. ", "The Senior Shuttle route uses alternative vehicles to accommodate passengers with restricted mobility. ", "\n\nChapel Hill Transit operates a \"Tar Heel Express\" special event shuttle service for UNC Football and Men's Basketball home games, in addition to special events. ", "The shuttles provide continuous and fully accessible service, running every 10 to 15 minutes between the park and rides and Kenan Memorial Stadium or Dean E. Smith Center.", "\n\nAll fixed routes and special service routes are fare free. ", "The Tar Heel Express charges a $3 one way and $5 round trip fee for rides.", "\n\nRoute List\n\nWeekday Routes\n\nWeekend Routes\n\nSafe Ride Service\n\nTar Heel Express Shuttles\n\nParatransit \nA fare free \"EZ Rider\" paratransit service provides a demand-responsive transit service for the handicapped and elderly that are unable to use the regular fixed route service. ", "The service operates from morning to evening on weekdays and on Saturdays. ", "Advanced reservations and enrollment are required.", "\n\nPark & Ride \nChapel Hill Transit operates 4 Park & Ride lots throughout Chapel Hill and Carrboro. ", "Parking fees are $2/day and can be paid using an on-site meter or the Parkmobile app. ", "Monthly and annual permits are available for $21/month and $250/year. ", "The University of North Carolina operates 5 other Park & Ride lots. ", "Permitting for these lots is administered through the university's Commuter Alternatives Program (CAP) Office. ", "UNC's Park & Ride lots are for UNC Employees and Students only; no public/daily parking is available. ", "UNC Park & Ride permits are honored in all Chapel Hill Transit Park & Ride lots.", "\n\nChapel Hill Transit Park & Ride Lots\n\nUNC Park & Ride Lots\n\nBus Rapid Transit\nChapel Hill Transit is planning to build an 8.2 mile North-South Bus Rapid Transit (NSBRT) to run from the Eubanks Road Park & Ride lot (a northern terminus) and Southern Village (the southern terminus) and points in between. ", "The route follows NC 86 (MLK Jr. Blvd.) ", "from the northern edge of Chapel Hill into downtown, then follows Columbia St through the campus of UNC-Chapel Hill, and continues along US 15-501 to Southern Village. ", "The proposed route is based on the NS route which consistently has the highest ridership of all routes. ", "Projected cost is $96-105.9 million with $50-75 million provided by federal funding, to commence passenger service in 2022 and projected 12,000 daily trips (in 2040) with an annual operating cost of $3.4 million. ", "The NSBRT will run every 8 minutes during peak hours and every 10-20 minutes in off-peak hours. ", "The existing NS bus route is expected to be replaced by the NSBRT. ", "Along most of the corridor, NSBRT will operate in dedicated lanes.", "\n\nProposed BRT Stations \n\n Eubanks Park & Ride\n Weaver Dairy Road\n New Parkside\n Northfield\n Piney Mountain\n Estes\n Hillsborough\n Franklin\n Cameron\n Carrington Hall\n Pittsboro / Credit Union\n Manning / East\n Jackson Circle / Mason Farm\n NC 54\n Culbreth\n Southern Village Park & Ride\n\nSee also\nChapel Hill, North Carolina\nCarrboro, North Carolina\nGoTriangle\nUniversity of North Carolina at Chapel Hill\nPublic transport\nBus rapid transit\n\nReferences\n\nExternal links\n\n Chapel Hill Transit\n\nCategory:Bus transportation in North Carolina\nCategory:Companies based in Chapel Hill-Carrboro, North Carolina\nCategory:1974 establishments in North Carolina\nCategory:University of North Carolina at Chapel Hill" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.0121580547112462, 0.005714285714285714, 0.025423728813559324, 0, 0, 0.009345794392523364, 0.017857142857142856, 0.011111111111111112, 0.014705882352941176, 0.005681818181818182, 0.023622047244094488, 0, 0.01, 0.009615384615384616, 0.02666666666666667, 0.008064516129032258, 0.013333333333333334, 0.011695906432748537, 0.011976047904191617, 0.009478672985781991, 0.007194244604316547, 0, 0.010752688172043012, 0, 0.007751937984496124, 0, 0, 0, 0, 0, 0.009523809523809525, 0, 0, 0.02197802197802198, 0, 0, 0.008, 0, 0.012269938650306749, 0.005847953216374269, 0, 0, 0, 0, 0, 0.04, 0, 0, 0.029411764705882353, 0.018018018018018018, 0.029411764705882353, 0.0125, 0.013071895424836602, 0.025, 0.011904761904761904, 0.009615384615384616, 0, 0.010416666666666666, 0.014925373134328358, 0.015151515151515152, 0.010043041606886656 ]
0.009004
5
[ "1. ", "Field of the Invention\nThis invention relates to a fork lift truck with a chassis and a battery block that can be positioned inside the chassis. ", "The chassis has a lateral opening so that the battery block can be removed essentially in a horizontal, e.g., lateral, direction.", "\n2. ", "Technical Considerations\nAn electrically-powered fork lift truck of the general type described above is typically equipped with a battery block that contains storage batteries and provides the energy required for the traction drive system, the lifting drive system, and the other electrical units of the truck. ", "To make it possible to replace the battery block, for example if it becomes damaged, the chassis of the fork lift truck is configured so that the battery block can be removed and a new battery block can be inserted by means of a suitable conveyor device. ", "The battery block must typically be replaced frequently when the fork lift truck is used in multiple-shift operations. ", "In that case, a discharged battery block in the fork lift truck is replaced regularly by a freshly charged battery block.", "\nThe chassis of some fork lift trucks is designed so that the battery block can be removed upwardly by a crane. ", "One disadvantage of this arrangement is that the components that are located above the battery block, generally the driver's cab and the protective roof over the driver, must be able to pivot at least to some extent to make it possible to hoist the battery block.", "\nOn fork lift trucks that have a lateral opening for the removal of the battery, a roller conveyor can be located inside the fork lift truck on the floor of the battery compartment. ", "Using this roller conveyor, which is permanently installed inside the fork lift truck, the battery block can be pushed in the horizontal (i.e., lateral) direction onto an external roller conveyor that is located next to the fork lift truck. ", "To provide the chassis of the fork lift truck with the required rigidity in spite of the large lateral opening for the battery block, it is known that a structural section that runs underneath and alongside the opening can be provided to support the weight of the battery block. ", "A fork lift truck of this type is described in DE 100 05 285 A1, for example. ", "One disadvantage of this arrangement is that the roller conveyors are absolutely essential to change the battery.", "\nTherefore, it is an object of this invention to design a fork lift truck so that a pallet truck, for example, can be placed underneath the battery block located in the fork lift truck and the battery block can be lifted and removed through the lateral opening of the chassis without the need for a permanently mounted conveyor in the truck." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Low price photo prints : Those looking for a great holiday gift with a personal touch now have several new photo gift options from the Sprint Picture Store. ", "Continuing its leadership in mobile imaging, Sprint announced as part of its \"Twelve Days of Power Shopping\" campaign that it is launching exciting new ways to do more with your digital and camera phone photos than ever before. ", "Starting this month, the Sprint Picture Store now offers 4x6 prints for just $0.10 each, free standard shipping on gift items through the end of the year, and new gifts including photo books and posters. ", "And just in time for that last-minute shopping rush, guest access to the Sprint Picture Store now allows non-subscribers to convert pictures into prints.", "\n\nSprint low price photo prints\n\"The holidays are one of the most popular times for taking pictures and for sharing pictures with others,\" said Amos Anderson, product manager for Sprint Picture Mail. \"", "Sprint has always offered its customers the most freedom and flexibility to use their pictures in innovative ways, and free holiday shipping, low-priced prints and guest access to the Sprint Picture Store make that even easier and more affordable.\" ", "For the month of December, free standard shipping on every order makes holiday gift-giving even more affordable. ", "With the Sprint Picture Store, customers can turn their favorite pictures into unique gifts, such as mugs, mouse pads, postage stamps, magnets, prints, and now photo books and posters. ", "Customers simply upload digital pictures from their phone or PC and order directly for delivery to their home or a gift recipient's address.", "\n\nSprint picture store - Sprint Power Vision M610\nThe Sprint Picture Store also allows users to create greeting cards using their digital photos. ", "Holiday-themed backgrounds are available to add the perfect festive touch to any photo. ", "The cards are available in packs of 20 and include envelopes to make sending them off to loved ones quick and easy. ", "Additionally, for the photo enthusiast in need of a new camera phone, Sprint currently offers three models with 2.0 megapixel cameras. ", "The Sprint Power Vision Phone M610 by Samsung, the Sprint Power Vision Phone M1 by Sanyo and the i880 by Motorola allow customers to take higher quality pictures with the one device they always have with them.", "\n\nAbout Sprint Picture Mail\nSprint Picture Mail allows customers to take high-quality pictures using their wireless phones and do more with their pictures than ever before. ", "As the first U.S. wireless carrier to introduce a mobile picture sharing service, Sprint continues to build its leadership in this area by constantly evolving Picture Mail to include new industry-first features and services for customers. ", "Today, Picture Mail offers innovative ways to capture, share, print, preserve, create, display, publish, tell, present and relive with services like the Sprint Picture Store, more printing options than any other wireless provider, editing tools, photo contests, PC upload, Groups, and lifestyle solutions for healthy eating and exercise.", "\n\nAbout Sprint Nextel\nSprint Nextel offers a comprehensive range of wireless and wireline communications services bringing the freedom of mobility to consumers, businesses and government users. ", "Sprint Nextel is widely recognized for developing, engineering and deploying innovative technologies, including two robust wireless networks serving more than 51 million customers at the end of third quarter 2006; industry-leading mobile data services; instant national and international walkie-talkie capabilities; and an award-winning and global Tier 1 Internet backbone." ]
{ "pile_set_name": "Pile-CC" }
[ 0.006369426751592357, 0.0043859649122807015, 0.004901960784313725, 0.006535947712418301, 0.009950248756218905, 0.008032128514056224, 0, 0.005405405405405406, 0, 0.00684931506849315, 0, 0, 0.007407407407407408, 0.019138755980861243, 0.005780346820809248, 0.0041841004184100415, 0.008902077151335312, 0.010309278350515464, 0.002680965147453083 ]
0.005833
5
[ "Suman Mokhtarian is rapidly becoming one of the most feared submission fighters on the international scene.", "\n\nThe 25-year-old featherweight wowed the crowd at Hex Fight Series 10 in Perth, Australia on Saturday, forcing Sam Chan to tap out to a slick twister submission. ", "Mokhtarian improved to 7-0 in his young career.", "\n\nTwister submission by Suman Mokhtarian (vs. Sam Chan) HL – HEX 10 pic.twitter.com/0eMxEbwdze — Jolassanda (@Jolassanda) July 29, 2017\n\nThis is the second straight sensational submission for Mokhtarian. ", "Just over a month ago, he finished Wajana Kiew-on with a nearly-incomprehensible maneuver that was best described as a “Teepee choke”.", "\n\nCheck out the first Teepee submission in MMA history by Suman Mokhtarian at Hex Fight Series 9 on Friday. ", "Suman Mokhtarian - MMA Fighter moves to 6-0 with this win. ", "Tickets to Hex 10 (Perth) are on sale now from www.hexfightseries.com Posted by Hex Fight Series on Saturday, June 24, 2017\n\nIf Mokhtarian keeps this up, he could be joining his brother Ashkan on the UFC roster soon enough." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.009345794392523364, 0.006134969325153374, 0, 0.0196078431372549, 0.007462686567164179, 0.027777777777777776, 0.01694915254237288, 0.017937219730941704 ]
0.013152
5
[ "86\tval_86\n" ]
{ "pile_set_name": "Github" }
[ 0 ]
0
5
[ "C-MYC translocations in de novo B-cell lineage acute leukemias with t(14;18)(cell lines Karpas 231 and 353).", "\nRare de novo acute leukemias of mature B cells may exhibit the chromosomal translocation t(14;18)(q32.3; q21.3). ", "We report the preliminary characterization of two cases that exhibited not only t(14;18)(q32.3;q21.3) but also the novel translocation t(8;9)(q24.1;p13.3), involving the C-MYC locus with unknown sequences at 9p13.3. ", "From these cases, two Epstein-Barr virus negative cell lines (Karpas 231 and 353) with features identical to those seen in fresh cells from the patient have been derived. ", "Both cell lines have complex karyotypes: in addition to both t(14;18)(q32.3;q21.3) and t(8;9)(q24.1;p13.3), cell line Karpas 231 exhibited three-way translocation t(1;3;11) (q42.3;q27.1;q23.1), whereas Karpas 353 exhibited t(1;3;7)(p32.1;q21.1;q22.1). ", "Both cases retained immunophenotypes characteristic of mature B cells with no evidence for commitment to other hematopoietic lineages. ", "Both cases expressed abundant, normal-sized C-MYC transcript, but no rearrangement of C-MYC DNA sequences could be detected using probes that span 80 kb around the C-MYC coding sequences. ", "Breakpoints within the BCL-2 gene were divergent. ", "In Karpas 353 the BCL-2 breakpoint occurred within the 3' untranslated major breakpoint region (mbr) of the gene, whereas, in Karpas 231, breaks in both the 3' mbr and in the region 5' of the gene were detected. ", "The cytogenetic combination of t(14;18)(q32.3;q21.3) and t(8;9)(q24.1;p13.3) has been previously reported in diffuse B cell lymphomas. ", "This combination may be a new recurrent abnormality, of central pathogenic importance in the transformation of B cells to high grade malignancies through simultaneous deregulation of BCL-2 and C-MYC genes, constitutive expression of C-MYC being driven by currently unknown DNA sequences on chromosome 9p13.3. ", "The presence of other complex translocations including those affecting 11q23.1 may further accelerate the process of acute transformation." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.017543859649122806, 0.009259259259259259, 0.005847953216374269, 0.011904761904761904, 0, 0.005319148936170213, 0, 0, 0.007407407407407408, 0.003236245954692557, 0 ]
0.005043
5
[ "Streptomyces varsoviensis\n\nStreptomyces varsoviensis is a bacterium species from the genus of Streptomyces which has been isolated from soil. ", "Streptomyces varsoviensis produces oxytetracycline and hygrobafilomycin.", "\n\nFurther reading\n\nSee also \n List of Streptomyces species\n\nReferences\n\nExternal links\nType strain of Streptomyces varsoviensis at BacDive - the Bacterial Diversity Metadatabase\t\n\nvarsoviensis\nCategory:Bacteria described in 1967" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0, 0, 0.008733624454148471 ]
0.002911
5
[ "(NaturalNews) Legislation that allows certain medical patients to access marijuana for medicinal use has been signed into law in Connecticut, making the Constitution State the 17th in the nation to at least partially deregulate marijuana for medical use. ", "Connecticut Governor Dannel Malloy has officially signed into law H.B. 5389,, which permits state-registered patients or their caregivers with doctor approval to access marijuana from state-regulated dispensaries.", "According to the Marijuana Policy Project (MPP), the timeline of the bill's approval has been short, with the Connecticut House of Representatives having approved the bill in a 96-51 vote on April 25, and the state Senate following suit with a 21-13 vote of approval on May 6. ", "On May 31, Gov. Malloy officially signed the bill into law.", "\"For years, we've heard from so many patients with chronic diseases who undergo treatments like chemotherapy or radiation and are denied the palliative benefits that medical marijuana would provide,\" said Governor Malloy in a statement. \"", "With careful regulation and safeguards, this law will allow a doctor and a patient to decide what is in that patient's best interest.", "\"Set to go into effect on October 1, 2012, H.B. 5389 will permit dispensaries to obtain marijuana from licensed producers, producers who will be required to pay a fee to the state of nearly $25,000. ", "Only patients with certain debilitating conditions, which include cancer, glaucoma, HIV, Parkinson's disease, multiple sclerosis, spinal cord injuries causing spasticity, epilepsy, wasting Crohn's disease and PTSD will be eligible to receive marijuana under the program.", "Though the legislation is considered to be the most restrictive among all the states that have passed medical marijuana measures, it is still a step in the right direction. ", "Eventually, it is hoped that Connecticut and many other states will end their needless prohibition of marijuana and fully legalize the natural plant for everyone.", "Nearby Rhode Island is reportedly moving forward with its own marijuana decriminalization legislation that will reduce the penalty for first-time possession of marijuana by an adult from arrest and jail time to confiscation and fines similar to those issued for speeding or other traffic violations. ", "If passed, H. 7092 A will only help pave the way for full decriminalization in the future.", "Meanwhile, the world is waiting for the Obama administration to live up to its promise to end federal raids on marijuana dispensaries and growers in states where marijuana has been legalized. ", "The Obama brigade was quite vocal on the campaign trail about respecting state marijuana laws, but the administration has acted quite contrary to these promises during its current occupation of the White House." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.004694835680751174, 0.01444043321299639, 0.01694915254237288, 0.004201680672268907, 0, 0, 0.003703703703703704, 0.005780346820809248, 0, 0, 0, 0.010416666666666666, 0.009523809523809525 ]
0.004979
5
[ "Detroit Red Wings defenseman Ian White had some harsh words for NHL commissioner Gary Bettman.", "\n\n\"I gotta be honest: I personally think he's an idiot,\" White told USA Today on Friday. \"", "Since he's come in, I think he's done nothing but damage the game.\"", "\n\nWhite's comments come in regards to the league enduring a lockout for the third time during Bettman's tenure, which began in February 1993. ", "The last lockout forced the cancellation of the entire 2004-05 season.", "\n\nWith the league and players unable to come to an agreement since the latest lockout went into effect Sept. 16, multiple sources told ESPN that Bettman suggested to NHLPA executive director Donald Fehr on Wednesday that the two sides take a two-week moratorium from negotiations.", "\n\n\"The whole process has just been frustrating,\" White told USA Today. \"", "I think, just where we stand now, you'd think that we're close to making a deal if they're willing to come a little bit our way. ", "It's something that could have been done even in the summer. ", "So it's frustrating. ", "There's just absolutely no need to be missing games and doing this kind of damage.\"", "\n\nThe two sides remain divided on how to share revenue and player contract issues, as well as who shoulders the financial burden of the losses incurred as a result of the lockout.", "\n\nWith scant optimism that a new collective bargaining agreement will be reached soon, reports surfaced Thursday that the next round of cancellations could be on the horizon.", "\n\nThe league already has been forced to cancel 327 regular-season games -- through Nov. 30 -- as well as the annual Winter Classic. ", "There also has been speculation that the fate of the season may be in jeopardy soon.", "\n\n\n\nInformation from ESPNNewYork.com's Katie Strang, ESPN.com's Pierre LeBrun and The Associated Press was used in this report." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.031914893617021274, 0.011111111111111112, 0, 0.007042253521126761, 0, 0.014285714285714285, 0.013888888888888888, 0, 0, 0, 0, 0, 0, 0, 0, 0.03937007874015748 ]
0.007351
5
[ "Q:\n\nHow to check development mode in OctoberCMS?", "\n\nI've got a .env file with this content: \n\nAPP_ENV=dev \n\nin the root of my project which shows that I am in the development mode \nand therefor my config files will be loaded from config/dev directory instead of config directory. ", " \nNow I want to add live reload to my html page by including the following script:\n<script type=\"text/javascript\">document.write('<script src=\"//localhost:35729/livereload.js?snipver=1\" type=\"text/javascript\"><\\/script>')</script>\n\nBut I only want this to be included if I am in development mode, not in production. ", "How can I do this?", "\n\nA:\n\nAs luketowers answered on October's Slack channel:\n\nhttps://octobercms.com/docs/markup/this-environment\nSo for your example you’d do something like this:\n{% if this.environment == 'dev' %}\n <script src=\"//localhost:35729/livereload.js?snipver=1\" type=\"text/javascript\"></script>\n{% endif %}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0.0031645569620253164, 0, 0.009966777408637873 ]
0.002626
5
[ "C-reactive protein is a more sensitive and specific marker for diagnosing bacterial infections in systemic lupus erythematosus compared to S100A8/A9 and procalcitonin.", "\nC-reactive protein (CRP), S100A8/A9, and procalcitonin have been suggested as markers of infection in patients with systemic lupus erythematosus (SLE). ", "We investigated the clinical significance of these factors for indication of infection in SLE. ", "Blood samples were prospectively collected from 34 patients with SLE who had bacterial infections and 39 patients with SLE who had disease flares and no evidence of infection. ", "A second set of serum samples was collected after the infections or flares were resolved. ", "CRP levels of SLE patients with infections were higher than those with flares [5.9 mg/dl (IQR 2.42, 10.53) vs 0.06 mg/dl (IQR 0.03, 0.15), p < 0.001] and decreased after the infection was resolved. ", "S100A8/A9 and procalcitonin levels of SLE patients with infection were also higher [4.69 μg/ml (IQR 2.25, 12.07) vs 1.07 (IQR 0.49, 3.05) (p < 0.001) and 0 ng/ml (IQR 0-0.38) vs 0 (0-0) (p < 0.001), respectively]; these levels were also reduced once the infection disappeared. ", "In the receiver-operating characteristics analysis of CRP, S100A8/A9, and procalcitonin, the area under the curve was 0.966 (95% CI 0.925-1.007), 0.732 (95% CI 0.61-0.854), and 0.667 (95% CI 0.534-0.799), respectively. ", "CRP indicated the presence of an infection with a sensitivity of 100% and a specificity of 90%, with a cutoff value of 1.35 mg/dl. ", "Our data suggest that CRP is the most sensitive and specific marker for diagnosing bacterial infections in SLE." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.0196078431372549, 0.010526315789473684, 0.011363636363636364, 0, 0.010101010101010102, 0.0036101083032490976, 0.0228310502283105, 0.007633587786259542, 0.018018018018018018 ]
0.010369
5
[ "Prostate cancer biomarker discovery using high performance mass spectral serum profiling.", "\nProstate-specific antigen (PSA) is the most widely used serum biomarker for early detection of prostate cancer (PCA). ", "Nevertheless, PSA level can be falsely elevated due to prostatic enlargement, inflammation or infection, which limits the PSA test specificity. ", "The objective of this study is to use a machine learning approach for the analysis of mass spectrometry data to discover more reliable biomarkers that distinguish PCA from benign specimens. ", "Serum samples from 179 prostate cancer patients and 74 benign patients were analyzed. ", "These samples were processed using ProXPRESSION Biomarker Enrichment Kits (PerkinElmer). ", "Mass spectra were acquired using a prOTOF 2000 matrix-assisted laser desorption/ionization orthogonal time-of-flight (MALDI-O-TOF) mass spectrometer. ", "In this study, we search for potential biomarkers using our feature selection method, the Extended Markov Blanket (EMB). ", "From the new marker selection algorithm, a panel of 26 peaks achieved an accuracy of 80.7%, a sensitivity of 83.5%, a specificity of 74.4%, a positive predictive value (PPV) of 87.9%, and a negative predictive value (NPV) of 68.2%. ", "On the other hand, when PSA alone was used (with a cutoff of 4.0ng/ml), a sensitivity of 66.7%, a specificity of 53.6%, a PPV of 73.5%, and a NPV of 45.4% were obtained." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.01680672268907563, 0.013888888888888888, 0.005263157894736842, 0, 0.011235955056179775, 0, 0.008264462809917356, 0.008620689655172414, 0.01775147928994083 ]
0.008183
5
[ "Grafe, Regina. ", "2011. ", "Distant Tyranny: Markets, Power and Backwardness in Spain, 1650-1800. ", "Princeton, NJ: Princeton University Press. ", "Gutierrez, Gustavo. (", "1971) 1973. ", "A Theology of Liberation. ", "Edited and translated by Caridad Inda and John Eagleson. ", "Maryknoll, NY: Orbis. ", "Mariategui, Jose Carlos. ", "1974. ", "Seven Interpretive Essays on Peruvian Reality. ", "Austin: University of Texas Press. ", "Marquez, Ivan. ", "2008. ", "Contemporary Latin American Social and Political Thought. ", "New York: Rowman & Littlefield. ", "Mignolo, Walter. ", "1999. ", "Local Histories/Global Designs. ", "Princeton, NJ: Princeton University Press. ", "Pagden, Anthony. ", "1998. ", "Spanish Imperialism and the Political Imagination. ", "New Haven, CT: Yale University Press. ", "Reid Andrews, George. ", "2004. ", "Afro-Latin America, 1800-2000. ", "Oxford: Oxford University Press. ", "Schutte, Ofelia. ", "1993. ", "Cultural Identity and Social Liberation in Latin American Thought. ", "New York: SUNY Press. ", "Unger, Roberto. ", "1997. ", "Politics: The Central Texts, Theory Against Fate. ", "Edited by Cui Zhiyuan. ", "New York: Verso. ", "Vasconcelos, Jose. ", "1997. ", "La Raza Cosmica. ", "Baltimore, MA: Johns Hopkins University Press. ", "von Yacano, Diego. ", "2011. ", "The Color of Citizenship: Race, Modernity and Latin American/Hispanic Political Thought. ", "Oxford: Oxford University Press. ", "Zea, Leopoldo. ", "1991. ", "The Role of the Americas in History. ", "New York: Rowman & Littlefield. ", "LAW AND POLITICAL THOUGHT In the modern period, the most original and influential theories about law and politics were developed in connection with a set of far-reaching, interrelated questions about the definition of law, the purpose of law, the relationship between law and morality, and the existence of natural law and natural rights. ", "Montesquieu Charles-Louis de Secondat, Baron de La Brede et de Montesquieu (1689-1755), published The Spirit of the Laws in 1748. ", "In this widely read and highly influential work (it appeared in 22 editions within 18 months after its first publication), Montesquieu defines laws as \"the necessary relations deriving from the nature of things.\" ", "Laws are both the relations that exist between God and created beings and the relations of these created beings to one another. ", "Law and Political Thought 487 For Montesquieu, it is possible to discern a uniformity in the relations between things, despite their wide diversity. ", "Thus, although one body is capable of moving another body in various ways, such motion will always be in accordance with the relations of mass and velocity. ", "A similar kind of uniformity in the midst of diversity can be found in human affairs. ", "Even before humans make their own positive laws, there exist \"possible relations of justice\" that determine which actual relations between humans are just and which are unjust. ", "For Montesquieu, there are thus laws of nature or natural laws that are grounded in the very nature of things and that underlie true \"relations of fairness\" as they exist apart from any positive or human-made laws, and apart from the will of any sovereign. ", "Although affirming the existence of natural law, Montesquieu differs from previous thinkers who held that one or another form of government was the \"most natural\" for human beings. ", "For Montesquieu, what is \"most natural\" is not that which is \"most common\" or \"most basic\" but what is most in accord with a thing's nature or its internal principle of activity. ", "Just as individual things have their own natures, so too a people or a nation can be said to have a nature or \"character\" or \"general spirit\" of its own. ", "The general spirit of a people emerges in connection with a wide variety of particular conditions pertaining to that people, including their climatic and geographical situation, their way of life, their degree of liberty, their religion, their level of wealth, the size of their population, their modes of commerce, and their mores and manners. ", "When contemplating acts of legislation, says Montesquieu, legislators should not be guided by abstract, rationalistic ideas about justice but by the general spirit of the people for whom the legislation is intended. ", "Law is most effective, after all, when it is least coercive and most suited to a people's \"natural genius.\" ", "Furthermore, legislators should not try to correct all the mores and manners of a people but only those that are manifestly unjust or harmful. ", "Even when some mores and manners stand in need of correction, it is best if political leaders aim to correct them, not by relying on the coercive force of the law but by appealing to other mores and manners already recognized by the people. ", "One of Montesquieu's best-known contributions to legal and political theory is his argument for a \"separation of powers\" within the state. ", "488 Law and Political Thought Montesquieu identifies three possible kinds of powers within the state: the legislative power, the executive power over the things depending on the right of nations (or simply \"the executive power\"), and the executive power over the things depending on civil right (or simply \"the judicial power\"). ", "If political liberty is to be preserved, Montesquieu argues, then these three powers must be vested in different individuals or different bodies, each acting independently of the other two. ", "If individuals are to have political liberty, says Montesquieu, then the government and laws must be arranged so that no citizen stands in fear of any other citizen. ", "Such becomes impossible, however, when two or more of the state's powers are vested in a single individual or in a single body. ", "Montesquieu's Spirit of the Laws was praised by radical progressives such as Voltaire (who appreciated Montesquieu's observations about religious diversity and tolerance) but also by traditionalist conservatives such as Edmund Burke (who shared Montesquieu's skepticism about affecting social change through coercive legal means). ", "The influence of Montesquieu's thought regarding the separation of powers is readily discernible in the Instruction of Catherine the Great of Russia, in the Federalist Papers (especially nos. ", "47 through 51), in the American Constitution, and in the French Declaration of the Rights of Man. ", "William Blackstone The work of William Blackstone (1723-80) is important not so much for its originality as a piece of legal theory as for its originality as a work of systematization. ", "Blackstone's four-volume work, Commentaries on the Laws of England, was first published in England between 1765 and 1769 and then in the United States between 1771 and 1772. ", "The Commentaries gave systematic form to a vast range of previously disconnected legal questions, showing how almost every aspect of English law could be analyzed and explained through the basic principles of a \"rational science\" of law. ", "This \"rational science\" was divided into four parts, focusing on \"the rights of persons\" (Book I); \"the rights of things,\" by which Blackstone meant the rights that people can have in things (Book II); \"private wrongs,\" including torts (Book III); and \"public wrongs,\" including crimes against other citizens, against God, and against religion (Book IV). ", "Blackstone defines law as \"a rule of action dictated by some superior being.\" ", "As applied to human action, laws are the precepts by which humans are commanded how to regulate their behavior. ", "For Blackstone, human beings are obliged to obey the laws given to them by God, for an inferior being is inevitably obliged to follow the rules of conduct given to it by the superior being on which it depends. ", "But human beings are not only obliged to obey the will of God, they are naturally inclined to do so as well. ", "This is because God, in His infinite wisdom and goodness, constituted human beings so that they would need no inducement to follow the law of nature other than their own self-love, which is the \"universal principle\" of human action. ", "According to Blackstone, the rule of obedience for all human action can be reduced to one precept, which constitutes the foundation of all ethics or natural law: \"[M]an should pursue his own true and substantial happiness\" (1765, Vol. ", "I, 41). ", "For Blackstone, the precepts of the natural law are universally binding on all human beings, regardless of time or place. ", "All positive, or human-made, laws derive their force and authority from the natural law; human laws that are contrary to the natural law can have no validity. ", "If humans were always clear and unprejudiced in their reasoning, they could know how to act by relying on their natural reason and their natural inclinations alone. ", "But since humans are prone to ignorance and error, they need the further guidance of revealed or divine law, which God has provided through the scriptures. ", "But the natural law and the divine law, on their own, are insufficient for guiding human conduct. ", "This is because humans are neither self-sufficient nor courageous enough to live entirely on their own; they need to live in society with one another. ", "Since it is impossible for all human beings to be united within a single, comprehensive society, they end up forming a multiplicity of separate, but interacting, states. ", "Accordingly, there arises not only the need for municipal law or civil law (which governs the relations prevailing within a single state), but also the need for a \"law of nations\" or jus gentium (which governs the relations of different states to one another). ", "Municipal or civil law, says Blackstone, is a rule of civil conduct prescribed by the supreme power within a state. ", "For Blackstone, the primary aim of human society and thus of municipal law is to protect individuals in their enjoyment of the \"absolute rights\" they possess simply in virtue of the immutable laws of nature. ", "These absolute rights include the rights to personal security, to personal liberty, and to personal property. ", "No human legislature has the power to abridge or destroy these rights, says Blackstone, unless their possessor has committed an act that amounts to a forfeiture of such rights. ", "A secondary aim of human society and thus of municipal law is to protect individuals in their enjoyment of \"social\" or \"relative\" rights (e.g., the right to trial by jury), which result from and are posterior to the formation of states and societies. ", "The municipal law of England can be subdivided into two kinds: \"the unwritten common law\" and \"the written or statute law.\" ", "Because written law is expressed in general and not particular terms, it follows that no written law can fully anticipate the concrete circumstances under which it might be applied. ", "Thus, the determination of what a written law actually commands in some particular circumstance will require some recourse to the rationale or justification behind the law. ", "Since only intelligent beings can discern when and how the law's rationale might apply, \"it is necessary that when the general decrees of the law come to be applied to particular cases, there should be somewhere a power vested of defining those circumstances\" for applying the law (1765, Vol. ", "I, 62). ", "Thus, there arises the need for judges, who are authorized to decide cases in light of \"equity\" by taking into consideration the particular circumstances surrounding individual cases. ", "If the rationale or justification behind a written law ceases to apply, says Blackstone, then \"the law also ceases with it\" (Commentaries, 1767, Vol. ", "III, 219; 1765, Vol. ", "I, 61). ", "For Blackstone, the unwritten \"common law,\" as embodied in the understandings, practices, and customs of judges, can never be supplanted by a system of written law or \"statute law.\" ", "When deciding cases in light of equity, Blackstone goes on to argue, judges generally should follow past precedents; however, judges may disregard previous decisions when they are manifestly absurd or unjust. ", "This is not because such previous decisions are instances of bad law; rather, it is because-being contrary to reason or justice-they are not law at all. ", "Blackstone's Commentaries were exceedingly influential at the time of the American founding, and they were regularly cited by those in favor of ratifying the American Constitution (e.g., by Alexander Hamilton, in Federalist nos. ", "69 and 84) as well as Law and Political Thought 489 by those opposed to ratification (e.g., by Patrick Henry, who argued, in reliance on Blackstone, that the Constitution should provide for jury trials in civil cases). ", "Blackstone's Commentaries remained a staple of Anglophone legal education for the next 150 years. ", "Jeremy Bentham In 1763, Jeremy Bentham (1748-1832) attended the Oxford University lectures given by Blackstone that were later to become part of the latter's Commentaries on the Laws of England. ", "But unlike Blackstone, who sought to explain and justify English law, Bentham was interested primarily in critique and reform. ", "And unlike both Montesquieu and Blackstone, whose main contributions to legal thought can be found in individual works, Bentham disseminated his key ideas about law and politics through a vast collection of disparate writings, including A Fragment on Government (1776), A Defence of Usury (1787), Introduction to the Principles of Morals and Legislation (1789), An Essay on Political Tactics (1791), Panopticon, or the Inspection House (1787), Emancipate Your Colonies (1793), Catechism of Parliamentary Reform (1809), Punishments and Rewards (1811), A Table of the Springs of Action (1815), Chrestomathia (1816), Church of Englandism and Its Catechism Examined (1818), Radicalism is Not Dangerous (1819-20), and A Treatise on Judicial Evidence (1825). ", "A summary of Bentham's criticisms of Blackstone can be found in his Fragment on Government, which is a shortened version of a more extensive critique, Comments on the Commentaries, published posthumously in 1928. ", "What we call law, says Bentham, is not grounded in the nature of things or in the divine ideas of an all-benevolent God; it is grounded instead in the will of a sovereign (whether this be an individual or a group) that has the power to command its subjects to act in certain ways, and to induce obedience in its subjects by means of punishments and rewards. ", "For Bentham, the purpose of human law cannot be to protect any \"natural\" order of justice or \"natural\" rights as they allegedly exist apart from positive laws and apart from the will of a sovereign. ", "This is because there are no such things as \"natural\" rights or \"natural\" justice in the first place. ", "According to Bentham, a \"right\" is nothing other than an actual r 490 Law and Political Thought \"security\" enjoyed by someone under the protection of some more powerful person or body (such as the sovereign). ", "It follows from this that there is no such thing as a right that is not an enforceable right; and no such thing as justice that is not enforceable justice. ", "For Bentham, then, the positive law does not protect preexisting rights or enforce preexisting duties that persons allegedly have in a state of nature or as a matter of natural right; on the contrary, it is the positive law that brings into existence all the rights and duties that persons have in the first place. ", "The ideas of law, offense, right, and obligation, says Bentham, \"are born together\" and are inseparably connected. ", "According to Bentham, proponents of \"natural law\" jurisprudence (including Blackstone) systematically failed to distinguish between \"expositorial\" (or merely descriptive) jurisprudence and \"censorial\" (or evaluative) jurisprudence. ", "As a result, they also failed to distinguish between the law as it is and the law as it should be. ", "On account of these confusions, \"natural law\" thinkers were led to the erroneous view that law, in order to exist at all, must be in accord with reason and justice and, conversely, that supposedly \"bad\" laws-being contrary to reason and justice--could not really exist as laws at all. ", "Against such \"natural law\" reasoning, Bentham argued that it is obvious that \"bad\" laws can exist. ", "For a law, after all, is nothing other than the command of a sovereign backed by the threat of force. ", "It is obvious that a command can be issued, and those subject to it can be induced to obey, even if there is nothing \"reasonable\" or \"just\" about the command being issued. ", "By arguing that the existence of law is one thing and its moral merit is another (or that there is \"no necessary connection\" between law and morality), Bentham laid the theoretical groundwork for what has since come to be known as modern \"legal positivism.\" ", "Bentham opposed \"natural law\" reasoning, not only because he regarded it as deeply confused as a matter of theory, but he also believed that it supported perniciously antireformist consequences in the realm of practice. ", "If bad law is no law at all, as the \"natural law\" theorists held, then it becomes difficult to see how actual existing laws could be \"bad\" and thus in need of reform. ", "For Bentham, it is only by acknowledging that \"bad\" laws can exist that we will be in a position to begin reforming them. ", "Furthermore, the question of how bad laws should be reformed is not to be settled by reference to an empty, abstract, speculative account of \"natural law\"; instead, it is to be settled by reference to a readily accessible and easily understandable standard of right and wrong, namely, the principle of utility. ", "According to this principle, an action is right to the extent that it tends to produce pleasure or happiness and wrong to the extent that it tends to produce pain or unhappiness. ", "For Bentham, the actions of all individual and all legal regimes are to be measured and judged in accordance with the principle of utility or \"the greatest happiness principle.\" ", "The guiding purpose of the law should be nothing other than to promote social welfare or utility or \"the greatest happiness for the greatest number.\" ", "Bentham's commitment to the principle of utility led him to hold that legal punishments could be justified only on the grounds that they incentivize good behavior and deter bad behavior in those who are subject to the law. ", "As a result, he argued that legal punishment was not for the sake of retribution, and he sought to reform many of England's often-cruel penal practices that had been based on retributivist ideas about punishment. ", "Bentham's belief in the principle of utility also led him to argue in favor of replacing the unwritten \"common law\" of England with a fully written, codified system of statutory law. ", "Because the \"common law\" was unwritten and depended so heavily on the unpredictable, discretionary rulings of judges, it failed to provide legal subjects with sufficient advance guidance about how they should conduct themselves; and when the law fails in this way, he noted, it cannot properly serve to incentivize good behavior and deter bad behavior. ", "Bentham famously derided England's regime of unwritten, judge-made \"common law\" as a regime of arbitrary, ex post facto law-making that was more suited to dogs than to human beings: When your dog does anything you want to break him of, you wait till he does it, and then you beat him for it. ", "This is the way you make laws for your dog: and this is the way the judges make law for you and me. ", "They won't tell a man beforehand what it is he should not do (1843, 235). ", "A lover of neologisms (he invented the nowcommon words, \"codification,\" \"minimize,\" \"maximize,\" and \"international\"), Bentham made a number of innovative proposals for concrete legal and social reform, including what he called a Pannomion (a complete and systematic code of laws that would leave no room for unreliable guesswork by citizens or arbitrary discretion by judges) and a Panopticon (a building whose design included a central observation tower allowing authorities at prisons, asylums, schools, and workhouses to see all of their charges all at once, without in turn being seen). ", "In 1794, the English Parliament agreed to fund Bentham's Panopticon plan for a new prison, to be managed by Bentham himself (foundations for the prison were laid, but in 1804, the project was terminated on account of insufficient funding). ", "Bentham's thought exerted a substantial influence over the later utilitarian and social reformist philosophies of James Mill (1773-1836), John Stuart Mill (1806-73), Henry Sidgwick (1838-1900), and Alexander Bain (1818-1903). ", "Bentham's positivistic jurisprudence helped to inspire the later legal positivism of John Austin (1790-1859), Oliver Wendell Holmes, Jr. (1841-1935), Hans Kelsen (1881-1973), H. L. A. Hart (1907-92), and Joseph Raz (1939-). ", "Bentham's utilitarian jurisprudence is the distant precursor to the \"law and economics\" school of contemporary legal theory, championed in its early days by Ronald Coase (1910-), Guido Calabresi (1932-), and Richard Posner ( 19 3 9-). ", "Immanuel Kant For Immanuel Kant ( 1724-1804 ), theorizing about the law cannot be based simply on our experientially derived judgments about human desires or needs since our merely empirical judgments can never yield the necessity and universality that are the true hallmarks of a genuine science of right. ", "Instead, jurisprudence must take its bearings from the nonempirical or a priori concept of \"right\" (Recht) as such. ", "According to its pure or a priori concept, \"right\" is the sum of the conditions under which the free choice of one person can be united with the free choice of others in accordance with a universal law. ", "The \"universal law of right\" stipulates that persons may rightfully perform external actions only to the extent that the exercise of their free choice through such actions can coexist with the free choice of everyone else in accordance with a universal law. ", "For Kant, the concept of right is necessarily connected with the authorization to use force or coercion (e.g., through the use of law). ", "For a person acts wrongly when he or she hinders the free choice of Law and Political Thought 491 someone else. ", "Such a hindrance amounts to an act of coercion by the wrong-doer; for when the wrongdoer hinders the freedom of another, the wrongdoer forces the wronged party to do or refrain from doing something entirely apart from the wronged party's own act of choosing. ", "Now if one person's use of freedom amounts to an act of hindering the freedom of another, then the use of coercion to prevent such a hindrance (the hindering of a hindrance to freedom or the coercive prevention of coercion) is justified. ", "Prior to Kant's time, it was common to think that the coercion of free persons by means of the law was justifiable on the grounds that freedom must be limited or compromised at times for the sake of achieving goods that are external to freedom itself. ", "These goods might include the cultivation of individual virtue or the promotion of social welfare. ", "Kant, however, rejects such an approach. ", "For Kant, it is always wrong to coerce free persons for the sake of promoting goods that are external to freedom itself; for it is always wrong to use a person as a mere means to some end, even if the end for which the person is being used is an exceedingly important one. ", "Significantly, Kant observes that what is right or justified does not pertain to relations between persons and external objects; it pertains instead to relations among persons. ", "Although one person may never rightfully be used as a mere means for another person's ends, there is nothing about external objects as such that makes it wrong for persons to use them as mere means in the service of the ends that they freely set for themselves. ", "Furthermore, free persons must be permitted to make use of external objects even when the objects being used are not in the spatial vicinity, or under the physical control, of the persons making use of them. ", "Just as there is nothing about external objects as such that makes it wrong for persons to use them as means in the service of the ends that they freely set for themselves, so too there is nothing about the merely contingent empirical conditions of such objects (e.g., the merely contingent fact that the object exists in a certain spatial location or beyond the scope of a person's physical control over it) that can legitimately prohibit them from being used by persons in the service of their ends. ", "For Kant, in other words, it is necessary that persons be permitted to make use of external objects, not only through their empirical possession of such objects, but also through what Kant calls their 492 Law and Political Thought intelligible or noumenal possession of them. ", "To have intelligible possession of an external object, says Kant, is to have possession of it even when the person who possesses the object is not spatially adjacent to or physically in control of the object being possessed. ", "Significantly, Kant argues that such intelligible possession of objects cannot be secured in a state of nature. ", "For in a state of nature, says Kant, there is no generally accepted public authority for determining how the intelligible possession of external objects is to be acquired, enforced, and arbitrated in cases of disagreement. ", "As a result, a person's ability to make use of an external object in a state of nature is forever insecure, dependent always on merely contingent empirical conditions, such as whether the person is strong, smart, or lucky enough to keep the external object from being appropriated and used by others. ", "But this is just to say that in a state of nature, all possession is something other than rightful possession. ", "For Kant, persons are obliged to exit the state of nature and enter into a civil condition, or a \"condition of right\" under the rule of law. ", "They are obliged to do so, not because doing so will help them to secure ends that are external to freedom itself (e.g., the ends of cultivating individual virtue or promoting of social welfare). ", "Instead, argues Kant, free persons are obliged to live in a civil condition (and, incidentally, obliged not to destroy this civil condition by means of revolution) since it is only in a civil condition that they can fulfill their vocation as free persons; for it is only in a civil condition that they can rightfully make use of external objects in pursuing the ends that they freely set for themselves. ", "For Kant, the aim of the law is to make possible the conditions of free personhood as such, and not to promote ends that are external to free personhood. ", "Kant's theory of law thus stands opposed to all \"welfarist\" or \"utilitarian\" conceptions of the law. ", "Kant's jurisprudential thought, with its emphasis on the importance of free personhood (and the relative unimportance of promoting individual virtue or social welfare), has influenced several twentieth-century jurisprudential thinkers. ", "The most famous of these thinkers, including some who depart in one way or another from Kant's strict a priori, anti-welfarist theory of right, are John Rawls (1921-2002), Robert Nozick (1938-2002), Ronald Dworkin (1931-), and T. M. Scanlon (1940-). ", "Friedrich Carl von Savigny ( 1779-1861) was an early admirer of Kant, but inspired by post-Kantian Romanticism, he ended up rejecting what he regarded as the overly rationalistic, unhistorical character of Kantian jurisprudence. ", "As a leading proponent of the German \"historical school\" of jurisprudence, Savigny went on to argue that the nature and origins of \"right\" should be understood not by reference to any nonempirical or a priori concept but by reference to the historically situated, empirically accessible Volksgeist, or \"spirit of a people.\" ", "Another early follower of Kant, Georg Wilhelm Friedrich Hegel ( 1770-1831 ), sought to develop a theory of law that would correct both the overly rationalistic character of Kantian jurisprudence as well as the overly empiricist character of Savigny's \"historical\" approach. ", "According to Hegel, Kant erred by failing to realize that the abstract, free personhood with which he began his \"science of right\" was not the pure, unhistorical personhood that he took it to be but instead only the result of a long, historical process of self-transformation through labor and social interaction. ", "If Kant had understood the underlying logic of human self-transformation through labor and social interaction, he would not have been so firmly committed to the false and dualistic belief that the law's purpose can be only to make possible the conditions of free personhood, and not to promote social welfare. ", "Karl Marx (1818-83) famously developed Hegel's thought to argue that the dynamics of labor and social interaction not only make possible free personhood and legality as they exist but also will bring about social revolution and emancipation in the future. ", "Until that occurs, says Marx, law will continue to serve as an ideological instrument for the oppression of one economic class by another. ", "In the twentieth century and beyond, Marx's ideological-critical assessment of the law has been adopted and transformed by many different legal theorists (e.g., proponents of critical legal studies, critical race theory, and feminist legal theory) who have argued that the law can serve in various ways as an ideological instrument for oppressing persons on the basis of class, race, and gender. ", "Michael Baur See also Bentham, Jeremy; Eighteenth-Century Political Thought; Hegel, Georg Wilhelm Friedrich; International Law; Justice; Kant, Immanuel; Marx, Karl; Montesquieu, Baron de; Natural Law; Nineteenth-Century Political Thought; Obedience, Political; Political Philosophy and Political Thought; Rawls, John; Rights, Natural and Human; TwentiethCentury Political Thought; Utilitarianism Further Readings Bentham, Jeremy. ", "1843. \"", "Truth versus Ashhurst; Or, Law As It Is, Contrasted With What It Is Said To Be (1792).\" ", "In The Works of Jeremy Bentham, Vol. ", "5, edited by John Bowring, 231-37. ", "Edinburgh: William Tait. --. ", "1970. ", "An Introduction to the Principles of Morals and Legislation. ", "Edited by J. H. Burns and H. L. A. Hart. ", "London: Athlone Press. --. ", "1977. ", "A Comment on the Commentaries and a Fragment on Government. ", "Edited by J. H. Burns and H. L. A. Hart. ", "London: Athlone Press. ", "Blackstone, William. ", "1765-69. ", "Commentaries on the Laws of England. ", "4 vols. ", "Oxford, UK: Clarendon Press. ", "Hegel, G. W F. 1991. ", "Elements of the Philosophy of Right. ", "Translated by H. B. Nisbet and edited by Allen W Wood. ", "Cambridge, UK: Cambridge University Press. ", "Kant, Immanuel. ", "1996a. ", "The Metaphysics of Morals. ", "Translated and edited by Mary Gregor. ", "Cambridge, UK: Cambridge University Press. --. ", "1996b. ", "Practical Philosophy. ", "Translated and edited by Mary J. Gregor. ", "Cambridge, UK: Cambridge University Press. ", "Montesquieu, Baron de. ", "1989. ", "The Spirit of the Laws. ", "Translated and edited by Anne M. Cohler, Basia Carolyn Miller, and Harold Samuel Stone. ", "Cambridge, UK: Cambridge University Press. ", "LEFORT' CLAUDE Claude Lefort (1924-2010) played a major role in the revival of French political philosophy in the 1970s and 1980s. ", "As a youth in Paris during World War II, Lefort studied with the philosopher Maurice Merleau-Ponty, whose phenomenological approach deeply influenced Lefort's political thought. ", "In the early 1940s, Lefort was briefly involved with Trotskyist groups, but he quickly grew critical. ", "With Cornelius Castoriadis, Lefort initiated a break from Trotskyism that led to the founding of the group and journal Socialisme ou Barbarie in 1948. ", "As a member of this ultra-left libertarian group, Lefort opposed not only the Soviet Union and the French Communist Party but also fellow travelers like Jean-Paul Sartre. ", "After years of fraught relations Lefort, Claude 493 with Castoriadis, Lefort left Socialisme ou Barbarie in the early 1960s over disagreements about the nature and role of militant politics. ", "Parallel to his political engagements, Lefort pursued a university career, teaching at several universities until his election to the prestigious Ecole des Hautes Etudes en Sciences Sociales in 1976. ", "In 1971, he completed a massive dissertation on Niccolo Machiavelli under the supervision of Raymond Aron. ", "His preferred writing form is the essay, and many of his important texts are translated into three volumes, The Political Forms of Modern Society: Bureaucracy, Democracy, Totalitarianism; Democracy and Political Theory; and Writing: The Political Test. ", "A long-term critic of totalitarian regimes, Lefort gained prominence as a theorist of liberal democracy in the 1970s when many French intellectuals grew disillusioned with communism and Marxism more generally. ", "Lefort's mature thought centers on three major claims. ", "First, the proper goal of political philosophy is not to understand \"politics\" as a particular sector of social life but to explore the \"political,\" which he defines as the basic framework that operates as the formative or generative principle of the social experience itself. ", "Second, this framework is a symbolic construct: In contrast to Marxists, who would argue that power rests on a base of material relations, Lefort maintains that power functions only through representation. ", "Third, and again in contrast to Marxism, division and conflict are ineradicable dimensions of social experience. ", "Lefort's work is best seen not as an attempt to provide liberal democracy with new or renewed normative foundations but as an effort to identify the formative principles of democratic pluralism. ", "This search leads him back to a basic position advanced by Alexis de Tocqueville: What is most important about democracy is not what it does, but what it causes to be done, namely, its power to arouse constant agitation in people. ", "Democracy's core lies not in a particular set of institutions acting in a certain way but in the open, indeterminate, and unmasterable process that democracy generates. ", "Lefort traces this power of democracy to a \"symbolic mutation\" in the order of power. ", "Earlier forms of society sought to conceal or overcome conflict through symbolic representations of power as a unity; so, for example, the early modern monarch symbolically incarnated the body politic in the unity of his or her body. ", "In the struggle against monarchy climaxing in the French 494 Legitimacy Revolution, power underwent a radical disincorporation in the name of egalitarian social relations. ", "In Lefort's famous formulation, the symbolic center of modern democratic power is a lieu vide, an empty place. ", "Democratic power may be contested, and specific people exercise power. ", "However, no one can permanently appropriate or incarnate democratic power, nor can such power be definitively represented. ", "Democracy is, therefore, not a regime governed by fixed laws or an unquestioned legitimate power. ", "Rather, it is a regime based on the legitimacy of a debate as to what is legitimate; and this debate is without any final guarantor or terminus. ", "Totalitarianism is, in Lefort's view, the modern counterpart of democracy because regimes like Nazism or Stalinism tried once again to conceal social division by reinvesting power in the symbol of the Nation, Party, Race, or Leader. ", "Liberal democracy, by contrast, is an original form of society in which social division is the essence of its political logic. ", "Once the markers of certainty that situated people in relation to each other have been lost, the conflict of opinion and the debate over rights become interminable. ", "Basing his thought on the collapse of transcendent sources of political legitimacy, Lefort created an original and highly influential theory of democracy, which illuminates the nature of sovereignty, the role of symbolic representation in politics, and the dynamic expansion of civil and human rights in the modern democratic era. ", "Warren Breckman See also Communism, Varieties of; Democratic Theory; French Political Thought; Marx, Karl; Tocqueville, Alexis de; Totalitarianism; Twentieth-Century Political Thought Further Readings Breckman, Warren. ", "Forthcoming. ", "Adventures of the Symbolic: Postmarxism and Democratic Theory. ", "New York: Columbia University Press. ", "Flynn, Bernard. ", "2005. ", "The Philosophy of Claude Lefort: Interpreting the Political. ", "Evanston, IL: Northwestern University Press. ", "Howard, Dick. ", "2002. ", "The Specter of Democracy. ", "New York: Columbia University Press. ", "Moyn, Samuel. ", "Forthcoming. ", "A New Theory of Politics: Claude Lefort and Company in Contemporary France. ", "New York: Columbia University Press. ", "LEGITIMACY In the political context, legitimacy amounts to the governed recognizing the right of the governors to lead and, to a certain extent, their entitlement to the perks of power. ", "It is a process through which both political power and obedience are justified. ", "Yet, it is not as if the recognition of the right to govern is without constraints on those who govern. ", "Conditions have to be met for the acknowledgment and justification of the right to govern-that is, for legitimacy-to develop. ", "Three come to mind: First, those in power must deliver services to the governed. ", "These services may vary from one society to another, from one period to another, but they are requirements that cannot be overlooked. ", "Second, the services provided have to respond to and reasonably satisfy the key needs (of which security is an essential one) of the governed. ", "These needs are themselves associated with the sense of the possible and the values (and the expectations they create) that are constitutive of the identity of society. ", "As such, they are crystallized in the rights of people. ", "Third, the needs/ rights benchmark the responsibility and accountability of those in the position of command as well as of that of the political institutions, including the procedures of exercise of power and of how they oversee the general arrangements of society. ", "The emergence of democratic values in the second half of the eighteenth century and their increasing importance ever since have emphasized these elements as central aspects of modern political legitimacy. ", "Today the perception of political legitimacy comes down to the distribution of power being seen as expressing, defending, and promoting justice, understood as the fair allocation of, and access to, resources and opportunities (political, but also legal, economic, cultural, and others) resulting from relevant actors, with the attribution of rights and duties that comes with it. ", "In this perspective, when political leaders and institutions, and the social system they underwrite, are viewed as unjust, and consequently illegitimate, it is not surprising that challenging social injustice and the political order becomes one and the same thing. ", "Authority being defined as legitimate power, and thus distinct from naked coercion, two contrasting dynamics of authority can be identified throughout history. ", "First, when the legitimacy of leaders and" ]
{ "pile_set_name": "PhilPapers" }
[ 0, 0, 0.014285714285714285, 0.023255813953488372, 0, 0, 0.038461538461538464, 0.03508771929824561, 0.13636363636363635, 0.04, 0, 0.02127659574468085, 0.02857142857142857, 0.13333333333333333, 0, 0.017241379310344827, 0.03125, 0.11764705882352941, 0, 0.03125, 0.023255813953488372, 0.11764705882352941, 0, 0.0196078431372549, 0.05263157894736842, 0.09090909090909091, 0, 0.03225806451612903, 0.06060606060606061, 0.11764705882352941, 0, 0.014925373134328358, 0.045454545454545456, 0.125, 0, 0, 0.043478260869565216, 0, 0.05263157894736842, 0, 0, 0.0425531914893617, 0.10526315789473684, 0, 0.011235955056179775, 0.06060606060606061, 0, 0, 0, 0.03125, 0, 0.015384615384615385, 0.004694835680751174, 0, 0.006711409395973154, 0, 0, 0, 0.0038910505836575876, 0.0055248618784530384, 0.00558659217877095, 0, 0, 0.004629629629629629, 0.009259259259259259, 0, 0, 0.007194244604316547, 0, 0.005263157894736842, 0.006024096385542169, 0, 0.015105740181268883, 0.005208333333333333, 0, 0.010810810810810811, 0.011494252873563218, 0.004201680672268907, 0.0028169014084507044, 0.01282051282051282, 0, 0.004761904761904762, 0, 0, 0.00851063829787234, 0, 0.00819672131147541, 0, 0, 0, 0, 0, 0, 0, 0.008620689655172414, 0.004807692307692308, 0, 0.005649717514124294, 0, 0, 0, 0, 0, 0, 0, 0.006666666666666667, 0.047619047619047616, 0, 0.005494505494505495, 0.004784688995215311, 0.006535947712418301, 0.008733624454148471, 0.0136986301369863, 0.01020408163265306, 0.020512820512820513, 0.015748031496062992, 0.01593625498007968, 0.014084507042253521, 0.002793296089385475, 0.005025125628140704, 0, 0.004784688995215311, 0, 0.0031746031746031746, 0.008695652173913044, 0.008620689655172414, 0, 0.0035087719298245615, 0.010101010101010102, 0, 0, 0.003875968992248062, 0.004545454545454545, 0, 0.00819672131147541, 0, 0, 0.0056179775280898875, 0, 0.004484304932735426, 0, 0.00546448087431694, 0, 0.003424657534246575, 0, 0, 0.00338409475465313, 0.0125, 0.022123893805309734, 0.026785714285714284, 0.01702127659574468, 0.006514657980456026, 0.008620689655172414, 0, 0, 0.007352941176470588, 0, 0, 0, 0.003968253968253968, 0, 0, 0.003663003663003663, 0.005649717514124294, 0, 0, 0, 0.007246376811594203, 0.0044444444444444444, 0.008928571428571428, 0.004484304932735426, 0, 0, 0.0070921985815602835, 0, 0.0024752475247524753, 0.006493506493506494, 0.009900990099009901, 0, 0.02, 0.013100436681222707, 0.006172839506172839, 0.010948905109489052, 0.006369426751592357, 0.0032258064516129032, 0.0078125, 0.007194244604316547, 0.0025252525252525255, 0.03953488372093023, 0, 0, 0, 0.02857142857142857, 0.034482758620689655, 0, 0, 0.04878048780487805, 0.037037037037037035, 0, 0, 0.04878048780487805, 0.043478260869565216, 0.09523809523809523, 0, 0, 0, 0.06896551724137931, 0.09523809523809523, 0, 0.03636363636363636, 0.023255813953488372, 0.0625, 0, 0.037037037037037035, 0.02631578947368421, 0.02127659574468085, 0, 0.045454545454545456, 0.024390243902439025, 0.023255813953488372, 0.043478260869565216, 0, 0, 0.03409090909090909, 0.023255813953488372, 0.007633587786259542, 0.0056179775280898875, 0, 0.013245033112582781, 0.011695906432748537, 0.005235602094240838, 0.005, 0.018691588785046728, 0.003952569169960474, 0, 0, 0, 0.0048543689320388345, 0, 0, 0.004329004329004329, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004291845493562232, 0, 0, 0, 0.0319634703196347, 0, 0, 0.02702702702702703, 0, 0, 0.01639344262295082, 0.06666666666666667, 0, 0, 0.038461538461538464, 0.02702702702702703, 0, 0, 0.02631578947368421, 0.02702702702702703, 0.005376344086021506, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.01292
5
[ "Gaf Roofing\n\nby Fred on April 1, 2013\n\nHow does GAF’s payment system workc\n\nGetaFreelancer is a very popular site for freelancers and for clients. ", "A lot of Projects for web designer, software programmer, writer, and IT services are available on GAF. ", "For freelance writer, there is more than enough work for you to find. ", "Anyone who wants to work from home, part or full time, have the opportunity here to find some good projects.", "\n\nBefore the actual articles starts, here another good source for information about gaf and other things regarding freelancing: Freelance Blog\n\nThere are many reasons why GAF is very popular among freelancer, one reason is the secure payment system. ", "It protects the emplyer as well as the emplyee. ", "No one needs to work for nothing, a payment is to 99% secured. ", "A few things might confuse you when you are new to GetaFreelancer.", "\n\nWhen you create your GAF account, whether as a freelance or an employer, you automatically get a GAF bank account for yourself. ", "This account is linked to your profile and your password, but not to any external banking system. ", "You begin to place bids on GAF and the time will come, that one of your bids is accepted. ", "When this happens you will find your GAF account goes into minus if you haven’t deposit money before. ", "Because there are no membership fees at GetaFreelancer when you join it, the site makes their money by taking a commission from you for every job you get. ", "However, if you upgrade your account to Gold Status’, it costs you monthly, but you will only pay a commision of 3%, which is very little compared to other sites.", "\n\nYou have to negotiate with the emplyer how he is going to pay you. ", "Some will put the money into escrow account on their own. ", "Other pay on a weekly or monthly basis. ", "Another option is milestone payment, this works as followed: The payment is split into two or more parts. ", "When reaching one level at the project, one payment part will be released into your account. ", "If there are problems regarding the payment, you may contact the support team. ", "The support is very quick and kind at the same time.", "\n\nWhether or not you choose to use Milestone payments, when you have completed your project and submitted it to your employer, he or she will transfer money into your GAF account. ", "At that time you will also receive an email that announces the transfer of money. ", "The balance of your account will be the payment minus the initial GAF commission. ", "For instance, a bid on a project takes out a commission, leaving you with a GAF bank balance of . ", "This money will stay securely in your GAF account as long as you want it to. ", "You can use this money to pay further commission fees or to pay others who are doing work contracted out by you.", "\n\nWhen you are ready to withdraw money from GAF, there are many different options from which to choose. ", "You may want to sign up for a GAF debit card, sponsored by Master Card, which lets you spend from your GAF account like a checking account. ", "You can also choose to directly transfer money to your bank account, however that requires that you input your bank account and routing number into the GAF system. ", "While Get a Freelancer is safe and secure, many people feel uncomfortable sharing their bank account information online. ", "That is why GAF also offers transfers to PayPal and Moneybookers accounts, two ways for people to use their money online or transfer it to their bank accounts.", "\n\nIf you like to withdraw money from your GAF account, you have a few different options. ", "One, which is rather new, you sign up for a GAF debit card. ", "The card will be send to you within a week or so and you can withdraw your monet at any atm machine you find. ", "Another option is direct tranfser into your bank account, and Paypal and Moneybookers. ", "What ever option you choose – the fee is always small and a quick transfer ist guaranteed.", "\n\nAbout the author: Visit www.freelancer-online.com for more information about freelance work.", "\n\nFrequently Asked Questions\n\nQUESTION:\nwhat is the best roofing shingles certanteed or gaf?", "\ni am having a new roof put on in 2 weeks what else should i ask to get a good job done\n\nANSWER:\nTAMCO\nWill it be torn off or roofed over old?", "\nIf torn off ,require your roofer to install at least 15# felt.", "\nAre roof vents being replaced or reused?", "\nRequire your roofer to install drip edge,Style”D”.", "\nWill new flashing be used where required?", "\nWill new “step” and “counter” flashing be replaced on chimney if applicable.", "\nWill new pipe flanges be used.", "\nHow long is the roofers warranty (not just the product but the actual work).", "\nWhen will you be starting?", "\nwhen will you be finished?", "\nRequire the gutters to be cleaned and all old roofing material be hauled away.", "\nAre you licensed?", "\nRequire the shingles to be nailed on rather than stapled.", "\n\nCan’t think of much else\n\nQUESTION:\nNeed advice on GAF 3 tab roofing shingles (Low end)?", "\nMy home needs a new roof and I’m able to get a good price on some base GAF roofing shingles from a local property manager.", "\n\nI’ve researched and seen that GAF had complaints with their base (cheap) shingles in the past. ", "Has anyone had recent (5 year) experience with them?", "\n\nAre the packages marked with a date code? ", "If they are, how do you read the code? ", "That way I can avoid shingles from the problem prone era.", "\n\nI know I shouldn’t shop price alone for shingles, but, we are tight financially.", "\n\nThanks!", "\n\nANSWER:\nthe cover [packaging] should have a manufacture date\n\nQUESTION:\nFerment roofing…. ", "steel or GAF shingle? ", "anyone who works in roofing or has either please give input?", "\nI live in Florida in a 2 story house. ", "It has a steeply pitched roof. ", "I am going to be bringing my roof up to the new codes and both of these products qualify if properly installed. ", "I am seeking imput to help in making my desision. ", "The steel costs 2 – 2 1/2 times the shingle cost but if it will be better in the long run that is what I will buy.", "\n\nANSWER:\nGAF sells good shingles, you can get them with a warranty up to 35 years. ", "Steel is good also, that depends on where you buy it. ", "If you live along the coast of Florida, then you have to think about rust. ", "Go to a salvage yard and look at an older model car, it will be rusted from the top down. ", "Also use roof wrap instead of felt under the shingles. ", "It does not break down like felt with age.", "\n\nQUESTION:\nRoofing experts.. pls advice me…which shingles are best ‘TIMBERLINE (GAF)’ or ‘ELK’ ?", "\nExpecting some valuable advice from roofing experts ,,, in order to select the quality shingles.", "I have 2 options in selection 1).TIMBERLINE(GAF) or\n2).ELK\n\nI think 30 years warranty products are more worth for money than 40 yr or 50 yr.", "Waiting for your valuable advice…Thanks in advance…!!!!", "\n\nANSWER:\nrosh\n\nShingles manufactured by GAF would be my choice. ", "We’ve put GAF shingles on 6 houses and have never had an issue. ", "In fact, through Loews on a house last year, GAF had a factory representative come by for follow-up inspection. ", "Now that is service.", "\n\nQUESTION:\nWhich is a better brand of roof shingle – GAF Timberline 30, Tamko Heritage or IKO Cambridge 30 AR?", "\nMy roofer has given me the option to go with either GAF Timberline 30, Tamko Heritage or IKO Cambridge 30 AR shingles. ", "He’s pushing the IKO Cambridge 30 saying they are the thickest, but my skepticism makes me think maybe they are just the cheapest.", "\n\nAny sugeestions?", "\nMy roofer has given me the option to go with either GAF Timberline 30, Tamko Heritage or IKO Cambridge 30 AR shingles. ", "He’s pushing the IKO Cambridge 30 saying they are the thickest, but my skepticism makes me think maybe they are just the cheapest.", "\n\nI am paying him a flat rate for labor and supplies.", "\n\nANSWER:\nBoth shingles should weigh about 260 lbs per square so the cambridge should not be any thicker than the Timberline. ", "Are you paying him labor plus materials or simply by the square? ", "Remember that it takes 4 bundles of arch. ", "shingles to make a square. ", "Make sure your invoice for what you are paying (total # of squares) equals what you see in your yard. ", "This is where roofers really get ya. ", "I would check to see if the shingles are impact resistant and algae/mold resistant. ", "The algae is the ugly black you see on composition shingles. ", "Impact resistant shingles will help you in a hail storm. ", "With what ever you choose, make sure that the shingle in your yard is what you have paid for. ", "There is not much difference in a 20 year(220 lbs per square) or 25 year(240 lbs per square) 3 tab comp shingle. ", "I am glad to see that you have atleast gone with the arch. ", "shingles – I believe 30 year is the lightest made — still better than 3 tab." ]
{ "pile_set_name": "Pile-CC" }
[ 0.013605442176870748, 0.009708737864077669, 0, 0, 0.008, 0, 0, 0.015151515151515152, 0.015384615384615385, 0, 0.011111111111111112, 0.00980392156862745, 0.0064516129032258064, 0.006172839506172839, 0, 0, 0, 0, 0, 0, 0, 0.011111111111111112, 0, 0.012195121951219513, 0.01020408163265306, 0.012987012987012988, 0, 0.009615384615384616, 0.02142857142857143, 0.006097560975609756, 0, 0.018867924528301886, 0.011235955056179775, 0.016666666666666666, 0, 0.011494252873563218, 0, 0.010638297872340425, 0.010869565217391304, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.011111111111111112, 0.008130081300813009, 0.010309278350515464, 0, 0, 0, 0, 0, 0, 0, 0.045454545454545456, 0, 0, 0, 0, 0, 0, 0.011904761904761904, 0, 0, 0, 0, 0, 0.010309278350515464, 0, 0, 0, 0.015384615384615385, 0.015625, 0.017857142857142856, 0, 0.02702702702702703, 0.025, 0.007692307692307693, 0, 0.025, 0.007692307692307693, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.004828
5
[ "Q:\n\nremove empty rows of an Eigen::SparseMatrix\n\nI have built a sparse matrix mat from a list of triplets\nEigen::SparseMatrix<double, Eigen::RowMajor> mat(Nbins,Ndata);\nmat.setFromTriplets(tripletList.begin(), tripletList.end());\n\nNow I would like to create a new matrix ret, which only contains the rows of the previous matrix which are not empty. ", "I do it as follows\nEigen::SparseMatrix<double, Eigen::RowMajor> ret(Nbins,Ndata);\nunsigned Nrow=0;\nfor (unsigned i=0; i<Nbins; ++i) {\n auto mrow = mat.row(i);\n if (mrow.sum()>0) {\n ret.row(Nrow++) = mrow;\n }\n}\nret.conservativeResize(Nrow,Ndata);\n\nHowever, doing it this way is slow and inefficient. ", "Slow because quick profiling suggests it spends most of its time on ret.row(Nrow++) = mrow;. ", "Inefficient because we are also copying all the data twice.", "\nIs there a better solution? ", "I feel one has to fiddle with the inner vectors but I get confused by them and I don't know how user-proof it is to play with them.", "\nEDIT: In my application, matrices are row major, and I want to remove empty rows. ", "mat is not needed, just ret. ", "All coefficients are positive hence the way I check for nonzero rows. ", "The triplets are sorted but column-major. ", "There are no duplicate triplets.", "\n\nA:\n\nFound it! ", "Instead of writing a hand-made setFromTriplets, I went with a modification of the tripletList. ", "The interface of Eigen::Triplet makes it very easy.", "\n//get which rows are empty\nstd::vector<bool> has_value(Nbins,false);\nfor (auto tr : tripletList) has_value[tr.row()] = true; \n\n//create map from old to new indices\nstd::map<unsigned,unsigned> row_map;\nunsigned new_idx=0;\nfor (unsigned old_idx=0; old_idx<Nbins; old_idx++) \n if(has_value[old_idx])\n row_map[old_idx]=new_idx++;\n\n//make new triplet list, dropping empty rows\nstd::vector<Eigen::Triplet<double> > newTripletList;\nnewTripletList.reserve(Ndata);\nfor (auto tr : tripletList) \n newTripletList.push_back(\n Eigen::Triplet<double>(row_map[tr.row()],tr.col(),tr.value()));\n\n//form new matrix and return\nEigen::SparseMatrix<double, Eigen::RowMajor> ret(new_idx,Ndata);\nret.setFromTriplets(newTripletList.begin(), newTripletList.end());\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0057306590257879654, 0.013114754098360656, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.0013245033112582781 ]
0.001345
5
[ "Den 30-åriga Malmöforwarden Nichlas Hardt blev under tisdagen klar för Växjö Lakers som i sin tur lånar ut Pontus Netterberg till Malmö Redhawks. ", "Bytet gäller resten av säsongen 2018/19\n\nUnder tisdagen blev Malmöforwarden Nichlas Hardt klar för Växjö Lakers och kontraktet är skrivet för säsongen 2018/19.", "\n\nNichlas har spelat i Malmö Redhawks de två senaste säsongerna, dessförinnan Linköping HC och Finska Jokerit. ", "Nichlas har också spelat över 100 landskamper i den danska landslagströjan.", "\n\nVi känner att Nichlas kan erbjuda oss en dimension i spelet som vi behöver, han är en kraftfull spelare med mycket energi, säger sportschef Henrik Evertsson\n\nVäxjö Lakers kommer att låna ut Pontus Netterberg till Malmö Redhawks under resterande del av säsongen 2018/19." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.0273972602739726, 0.012578616352201259, 0.02702702702702703, 0.013333333333333334, 0.02214022140221402 ]
0.020495
5
[ "what do studies say about when the police tase, mace, beat, break an arm, orbital bone, nose etc of a child as they are prone to doing too often today??.. ", "oh the badge monkeys are immune from studies..\nthe police are a fun loving bunch of thugs.. they are the do as we say, not as we do crowd!", "\n\nex post facto http://www.law.cornell.edu/wex/ex_post_facto\nArt 1, § 9 and Art. ", "1 § 10. ", "see, e.g. Collins v. Youngblood, 497 US 37 (1990) and California Dep’t of Corrections v. Morales, 514 US 499 (1995).", "\n18 USC § 241 – Conspiracy against rights\n18 USC § 242 – Deprivation of rights under color of law\n42 USC § 1983 – Civil action for deprivation of rights\nFor a crime to exist, there must be an injured party. ", "There can be no sanction or penalty imposed upon one because of this exercise of Constitutional rights.”- ", "Sherar v. Cullen, 481 F. 945.", "\n\nin Eisner v. Macomber, 252 U.S. 189 (1920), to wit:\nCongress … cannot by legislation alter the Constitution, from which alone it derives its power to legislate, and within whose limitations alone that power can be lawfully exercised.", "\n\nU.S. v Mersky (1960) 361 U.S. 431 a statute that regulates without constitutional authority is a nullity even though it be published in the books, recognized by the police and lowers courts, and even though it be unchallenged for decades.", "\n\nThe Legislature, either by amending or otherwise, may not nullify a constitutional provision\nRost v. Municipal Court of Southern Judicial District of San Mateo (1960)\n\nif “any” governor wants to cut taxes.. they should use their state’s multiple CAFR accounts to retire debt, resulting in LOWER property taxes..\nThe above would generally make sense to a ‘non-politician” but given the choice to retire debt and lower taxes.. they choose to keep things status quo!", "\nIf you don’t know what a cafr account is.. a search engine is your friend.. every state, county, city and town has cafr accounts, this is a second set of books that are “usually” awash with money derived from theft of taxpayers.. they keep this $$$ invest it for decades..\nit is estimated that combined, the cafr accounts across the united states of America amount to tens of trillions of dollars!", "\nthese aforementioned cafr accounts don’t include the federal government abc agencies cafr accounts.. yes the irs, the fbi, cia and even the social security administration has cafr accounts!", "\n\ndriving is an occupation and thus a privilege,.. traveling is a right!", "\nRobertson vs. Department of Public Works, 180 Wash 133, 147\n“Personal liberty, or the Right to enjoyment of life and liberty, is one of the fundamental or natural Rights, which has been protected by its inclusion as a guarantee in the various constitutions, which is not derived from, or dependent on, the U.S. Constitution, which may not be submitted to a vote and may not depend on the outcome of an election. ", "It is one of the most sacred and valuable Rights, as sacred as the Right to private property…and is regarded as inalienable.” ", "16 C.J.S., Constitutional Law, Sect.202, p.987.", "\nChicago Motor Coach v Chicago 169 NE 22\nThompson v Smith 154 SE 579.", "\nKent v Dulles, 357 U.S. 116, 125.", "\nSchactman v Dulles, 96 App D.C. 287, 293.", "\nHertado v. California, 110 U.S. 516.", "\nMiller v. U.S., 230 F 2d 486, 489.", "\n\nGo back to huffpo jrook as you have zero understanding of constitutional rights vs corporate privileges! ", "your beliefs and opinions are propaganda\n\nwell, since the government ignores the constitution,.. how about the Universal declaration of human rights, that the federal government is a signatory of..\nspecifically\nArticle 12.", "\nNo one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. ", "Everyone has the right to the protection of the law against such interference or attacks.", "\n\nDoes this not count either?? ", "probably not,.. our government is out of control !", "\n\nAround 1994, most states got rid of their education bachelors degree. ", "Instead, it became a party degree plus a year of actual work.", "\nWhen I went back for my masters in the late 1990s, it was mainly the immoral party animals that were going into teaching. ", "Main things they studied in college were amateur intoxicants chemistry and hands-on biology (which is probably why so many women teachers are preying on students. ", "They are not used to self-control.). ", "They literally knew less than students graduating from high school in the mid 1980s were required to know in math, science, geography, etc.", "\nThe university I went to even went so far as to make it extremely difficult for science graduates to get into the 5th year teacher certificate.", "\nParty, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, party, ah, I no lots nou, duuuuude.", "\nAnd then we wonder why our kids are not taught. ", "Or like my old HS, are taught 2 years below grade level.", "\n\nMarch 20, 2014 at 2:41pm\n\nNabuquduriuzhur responded:\n\nI've been told many times I should be a teacher. ", "Ha! ", "Good luck with that. ", "With four degrees in three fields (bio, geo, and engineering), I could not teach, despite writing 8 books so far, and writing for various newspapers. ", "After all, I might teach the kids something true and that can't possibly be done now, because we, the public schools, are into Socialist indoctrination.", "\n\nMarch 20, 2014 at 2:43pm\n\nNabuquduriuzhur responded:\n\nIt should outrage people, but in Bend, Oregon, the Principal of Bear Creek School was fired because the kids were actually learning. ", "It made the other teachers look bad, so out he went.", "\n\nMarch 20, 2014 at 1:25pm\n\nah yes the slavery card, yes that’s why ovomit can’t work with the teaparty, it has nothing to do with ovomits lies or corruption, right?", "\n\nIf the Trans-Dniester region sounds familiar, it’s because it already tried in 1996 to break off from Moldova. ", "The area also tried in 2006 to gain its independence by holding a referendum vote in which 97 percent of the population voted to join Russia. ", "However, the vote went nowhere because the international community refused to recognize its legitimacy.", "\n\nHere’s why many countries don’t and won’t recognize breakaways.. regions of their own countries which WANT TO BREAK AWAY.. “I can think of some states in the US that want to break away from the oligarchy that is the UNITED STATES Inc.” would get the idea that they too can leave their SLAVE MASTERS BONDAGE!", "\nIf it happens there, it can happen here! ", "so any breakaway must not be recognized and stifled so that other’s don’t get the same idea!", "\n\nThis is correct. ", "States in America are slaves to the US Government. ", "It should be the other way around.", "\nLet Texas or Florida try to succeed and see how fast Obama and his ilk start to drone strike American Citizens in these States." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.012345679012345678, 0, 0.008620689655172414, 0.014492753623188406, 0.009433962264150943, 0, 0, 0, 0.004301075268817204, 0, 0.021052631578947368, 0, 0.007263922518159807, 0, 0.0425531914893617, 0.014492753623188406, 0, 0.023809523809523808, 0.02702702702702703, 0.02857142857142857, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.005291005291005291, 0, 0, 0, 0, 0, 0.003236245954692557, 0, 0, 0, 0.0196078431372549, 0, 0.0078125 ]
0.004463
5
[ "Various types of a positioning apparatus which estimate the position utilizing the satellite signals from the satellites are disclosed. ", "There are two kinds of the positioning methods for the positioning apparatus, one is a point positioning and the other is a differential positioning. ", "A basic estimation of the point positioning is to derive a nonlinear simultaneous equation comprising a receiver's position (error) in three dimensions and a clock error of the receiver as the unknown values from a code pseudorange. ", "And applying a Newton method, an extended Kalmann Filter to this nonlinear samultaneous equation, the point positioning could be estimated. ", "The various types of a method to eliminate an influence of an ionosphere and a troposphere are disclosed. ", "One method set a delay of the ionosphere and a delay of the troposphere to “0” at initial condition. ", "And the other method estimates these delays utilizing a phase difference such as a single phase difference.", "\nThe Geodetic Society of Japan, [Shinteiban GPS—Jinko-eisei-niyoru seimitsu-sokutei system—(in Japanese), A new edition GPS—A precise positioning system—], JAPAN ASSOCIATION OF SURVEYORS, Nov. 15, 1989, p. 121-140" ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0.007142857142857143, 0, 0, 0, 0.009389671361502348 ]
0.002067
5
[ "Q:\n\nHow do I write a character at codepoint 80 to a file in Windows-1252?", "\n\nI am trying to write bytes to a file in the windows-1252 charset. ", "The example below, writing the raw bytes of a float to a file, is similar to what I'm doing in my actual program.", "\nIn the example given, I am writing the raw hex of 1.0f to test.txt. ", "As the raw hex of 1.0f is 3f 80 00 00 I expect to get ?", "€(NUL)(NUL), as from what I can see in the Windows 1252 Wikipedia article, 0x3f should correspond to '?', ", "0x80 should correspond to '€', and 0x00 is 'NUL'. ", "Everything goes fine until I actually try to write to the file; at that point, I get a java.nio.charset.", "UnmappableCharacterException on the console, and after the program stops on that exception the file only has a single '?' ", "in it. ", "The full console output is below the code down below.", "\nIt looks like Java considers the codepoint 0x80 unmappable in the windows-1252 codepage. ", "However, this doesn't seem right – all the codepoints should map to actual characters in that codepage. ", "The problem is definitely with the codepoint 0x80, as if I try with 0.5f (3f 00 00 00) it is happy to write ?(", "NUL)(NUL)(NUL) into the file, and does not throw the exception. ", "Experimenting with other codepages doesn't seem to work either; looking at key encodings supported by the Java language here, only the UTF series will not give me an exception, but due to their encoding they don't give me codepoint 0x80 in the actual file.", "\nI'm going to try just using bytes instead so I don't have to worry about string encoding, but is anyone able to tell me why my code below gives me the exception it does?", "\nCode:\nimport java.io.", "IOException;\nimport java.io.", "Writer;\nimport java.nio.charset.", "Charset;\nimport java.nio.file.", "Files;\nimport java.nio.file.", "Paths;\n\npublic class CharsetTest {\n public static void main(String[] args) {\n float max = 1.0f;\n System.out.println(\"Checking \" + max);\n String stringFloatFormatHex = String.format(\"%08x\", Float.floatToRawIntBits(max));\n System.out.println(stringFloatFormatHex);\n byte[] bytesForFile = javax.xml.bind.", "DatatypeConverter.parseHexBinary(stringFloatFormatHex);\n String stringForFile = new String(bytesForFile);\n System.out.println(stringForFile);\n\n String charset = \"windows-1252\";\n try {\n Writer output = Files.newBufferedWriter(Paths.get(\"test.txt\"), Charset.forName(charset));\n output.write(stringForFile);\n output.close();\n } catch (IOException e) {\n System.err.println(e.getMessage());\n e.printStackTrace();\n }\n }\n}\n\nConsole output:\nChecking 1.0\n3f800000\n?", "� \nInput length = 1\njava.nio.charset.", "UnmappableCharacterException: Input length = 1\n at java.nio.charset.", "CoderResult.throwException(CoderResult.java:282)\n at sun.nio.cs.", "StreamEncoder.implWrite(StreamEncoder.java:285)\n at sun.nio.cs.", "StreamEncoder.write(StreamEncoder.java:125)\n at java.io.", "OutputStreamWriter.write(OutputStreamWriter.java:207)\n at java.io.", "BufferedWriter.flushBuffer(BufferedWriter.java:129)\n at java.io.", "BufferedWriter.close(BufferedWriter.java:265)\n at CharsetTest.main(CharsetTest.java:21)\n\nA:\n\nEdit: The problem is on the instruction String stringForFile = new String(bytesForFile);, below the DatatypeConverter. ", "As I was constructing a string without providing a charset, it uses my default charset, which is UTF-8, which doesn't have a symbol for codepoint 80. ", "However, it only throws an exception when it writes to a file. ", "This doesn't happen in the code below because my refactor (keeping in mind Johannes Kuhn's suggestion in the comments) doesn't use the String(byte[]) constructor without specifying a charset.", "\nJohannes Kuhn's suggestion about the String(byte[]) constructor gave me some good clues. ", "I've ended up with the following code, which looks like it works fine: even printing the € symbol to the console as well as writing it to test.txt. ", "That suggests that codepoint 80 can be translated using the windows-1252 codepage.", "\nIf I were to guess at this point why this code works but the other didn't, I'd still be confused, but I would guess it was something around the conversion in javax.xml.bind.", "DatatypeConverter.parseHexBinary(stringFloatFormatHex);. ", "That looks to be the main difference, although I'm not sure why it would matter.", "\nAnyway, the code below works (and I don't even have to turn it into a string; I can write the bytes to a file with FileOutputStream fos = new FileOutputStream(\"test.txt\"); fos.write(bytes); fos.close();), so I'm happy with this one.", "\nCode:\nimport java.io.", "FileOutputStream;\nimport java.io.", "IOException;\nimport java.io.", "Writer;\nimport java.nio.", "ByteBuffer;\nimport java.nio.charset.", "Charset;\nimport java.nio.file.", "Files;\nimport java.nio.file.", "Paths;\n\npublic class BytesCharsetTest {\n public static void main(String[] args) {\n float max = 1.0f;\n System.out.println(\"Checking \" + max);\n int convInt = Float.floatToRawIntBits(max);\n byte[] bytes = ByteBuffer.allocate(4).putInt(convInt).array();\n\n String charset = \"windows-1252\";\n try {\n String stringForFile = new String(bytes, Charset.forName(charset));\n System.out.println(stringForFile);\n\n Writer output = Files.newBufferedWriter(Paths.get(\"test.txt\"), Charset.forName(charset));\n output.write(stringForFile);\n output.close();\n } catch (IOException e) {\n System.err.println(e.getMessage());\n e.printStackTrace();\n }\n }\n}\n\nConsole output:\nChecking 1.0\n?", "€ \n\nProcess finished with exit code 0\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0.009433962264150943, 0.02, 0, 0, 0, 0, 0.011111111111111112, 0, 0, 0, 0.0078125, 0, 0, 0.03571428571428571, 0, 0.03333333333333333, 0.03571428571428571, 0.008849557522123894, 0, 0, 0, 0, 0, 0, 0, 0, 0.004651162790697674, 0, 0, 0.005235602094240838, 0.011111111111111112, 0, 0, 0, 0, 0, 0.004291845493562232, 0, 0, 0.03571428571428571, 0, 0, 0.03333333333333333, 0.03571428571428571, 0.00125, 0 ]
0.00575
5
[ "Q:\n\nConverting ImageSource to Object Throws Binary stream error\n\nI'm trying to convert/cast an image source to an object. ", "I tried to convert to a byte prior to object.", "\nImageSource oImageSelectedByUser = (from ii in mySource where ii.", "PhotoImgStream !", "= null select ii.", "PhotoImgStream).FirstOrDefault();\n var oImageAsByte = await ConvertStreamtoByteAsync(oImageSelectedByUser);\n var oImageAsObject = FromByteArray<object>(oImageAsByte);\n\n private static async Task<byte[]> ConvertStreamtoByteAsync(ImageSource imageSource)\n {\n byte[] buffer = new byte[16 * 1024];\n try\n {\n if (imageSource is FileImageSource)\n {\n FileImageSource objFileImageSource = (FileImageSource)imageSource;\n string strFileName = objFileImageSource.", "File;\n\n var webClient = new WebClient();\n buffer = await webClient.", "DownloadDataTaskAsync(new Uri(strFileName));\n return buffer;\n }\n }\n catch (Exception ex)\n {\n buffer = null;\n }\n return buffer;\n }\n\n public T FromByteArray<T>(byte[] data)\n {\n if (data == null)\n return default(T);\n BinaryFormatter bf = new BinaryFormatter();\n using (MemoryStream ms = new MemoryStream(data))\n {\n object obj = bf.", "Deserialize(ms);\n return (T)obj;\n }\n }\n\nWhen trying to convert to object, the error I get is:\n\nBinary stream '0' does not contain a valid BinaryHeader. ", "Possible\ncauses are invalid stream or object version change between\nserialization and deserialization.", "\n\nI wanted to ask is there a better way to do this?", "\nAny direction/pointers appreciated.", "\n\nA:\n\nYou could modify the code like following\n public T FromByteArray<T>(byte[] data)\n {\n if (data == null)\n return default(T);\n BinaryFormatter bf = new BinaryFormatter();\n using (MemoryStream ms = new MemoryStream(data))\n {\n \n ms.", "Seek(0, SeekOrigin.", "Begin); // /rewinded the stream to the begining.", "\n object obj = bf.", "Deserialize(ms);\n return (T)obj;\n }\n }\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0.010309278350515464, 0.004357298474945534, 0.005780346820809248, 0, 0, 0, 0.003389830508474576, 0.05263157894736842, 0, 0, 0 ]
0.004498
5
[ "Abbarajupalem, Amaravati (state capital)\n\nAbbarajupalem is a neighbourhood and a part of Urban Notified Area of Amaravati, the state capital of the Indian state of Andhra Pradesh. ", "It was a village in Thullur mandal of in Guntur district, prior to its denotification as gram panchayat.", "\n\nDemographics \n\n Census of India, the village had a population of , of which males are , females are with average sex ratio 992 and the population under 6 years of age are . ", "The average literacy rate stands at 70.61 percent, with literates.", "\n\nTransport\n\nNo bus services are available to this village one has to go to Rayapudi 1 km, which is located on the Vijayawada and Amaravathi routes. ", "APSRTC run buses provide transport services from Vijayawada to Rayapudi.", "\n\nReferences \n\nCategory:Neighbourhoods in Amaravati" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.011111111111111112, 0, 0, 0.014925373134328358, 0.013422818791946308, 0.013888888888888888, 0 ]
0.007621
5
[ "Intervertebral disc recovery after dynamic or static loading in vitro: is there a role for the endplate?", "\nIn vivo studies on disc mechanics show loss of fluid from the intervertebral disc (IVD) during loading and full recovery during rest. ", "Previous work indicated that in vitro recovery is hampered after static loading. ", "The aim of the present study was to investigate the role of the endplate after dynamic and static loading on mechanical recovery in vitro. ", "Lumbar spines (caprine) were obtained from the local slaughterhouse and stored frozen. ", "Twenty-four intervertebral discs were thawed and subjected to a compression test in a saline bath (37 degrees C). ", "The discs were pre-loaded at 20 N for 15 min. ", "Three 15-min loading cycles (static: 2.0 MPa or dynamic: average load 2.0 MPa at 0.5 Hz) were applied, each followed by a 30-min period of unloading (20 N). ", "After this protocol, the endplates of half of the discs were blocked with silicone paste and the long-term recovery protocol was applied; the discs were subjected to a single loading cycle (15 min of static or dynamic loading) followed by 10h of unloading at 20 N. All specimens showed a net loss of height and a gain in stiffness during the first part of the test. ", "Eventually, height and stiffness were restored during a long-term recovery test. ", "The difference in recovery between blocked and free endplates was marginal. ", "If fluid flow plays a role during recovery in vitro, the role of the endplate appears to be limited. ", "Our findings show no influence of loading type on recovery in vitro." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0, 0.006369426751592357, 0, 0, 0, 0, 0 ]
0.00049
5
[ "Just say 'no' to freeways\n\nEconomist, environmentalists fight project to redesign I-5/I-84 interchange in Rose Quarter\n\nAs photo opportunities go, Gov. Kate Brown's ceremonial signing of the new state $5.3 billion road-and-bridge funding bill on Tuesday, near the corner of Southeast 82nd and Division, was a huge success.", "\n\nLocal officials were all smiles under a sunny sky, and Portland economist Joe Cortright and his allies were nowhere to be seen — which was precisely the point.", "\n\nThe governor's staff initially looked to celebrate the bill's \"congestion relief\" at The Rose Quarter, where the state plans a $450 million project adding lanes to I-5 to reconstruct the I-84 interchange, funded in part by new tolls authorized by the bill.", "\n\nBut a coalition of 18 groups has sprung up in recent days to oppose the project, with Cortright as its most prominent voice. ", "Accordingly, Portland officials warned Brown's office that a Rose Quarter signing was likely to draw protesters' banners and spoil the hoped-for images, the Portland Tribune has learned.", "\n\nInstead, the signing was moved to where there was no freeway in sight — and no Cortright either.", "\n\nNow he and the coalition of his allies are taking their case to Thursday's meeting of the Portland City Council, under the motto of \"No More Freeway Expansions.\"", "\n\nCortright, a consultant, supports \"smart growth,\" the idea that building more densely, living closer to our workplaces and using our cars less will save money and help the planet.", "\n\nMore freeways, he and other smart growth proponents believe, encourage people to make trips they otherwise wouldn't and live where they probably shouldn't — fostering sprawl. ", "The concept is called \"induced demand:\" that if you expand a freeway to reduce congestion, more people will use it, creating more congestion.", "\n\nAs a result of the opposition, the long-discussed I-5/I-84 interchange has emerged as a flashpoint in the proposed update of the Central City Plan to be considered by the City Council this week.", "\n\nFor Cortright, blocking the latest freeway project is a familiar quest. ", "He was a prominent voice in the fight against the Columbia River Crossing, or CRC — the plan to build a new bridge and widen the freeway at I-5's connection to Washington state.", "\n\nA similar coalition joined Cortright at the time, and various other consultants joined in to question the assumptions driving the massive project. ", "The divisive eight-year battle ended when Republican lawmakers in Washington state refused to back the new bridge.", "\n\nFight moving south\n\nNow the battle is moving south on I-5, to what's known as the I-5 Broadway Weidler project.", "\n\nThe constricted lanes and narrowly-spaced off- and on-ramps in the area around the interchange there have long been highlighted by transportation officials as a major source of congestion and accidents on both freeways. ", "The council approved a project plan to rework the interchange in 2012, although it did not fund it. ", "The Oregon Department of Transportation highlighted the bottleneck in a Portland area congestion report released in early August.", "\n\nThe report said the most severe recurring bottleneck on southbound I-5 is in the Rose Quarter, where congestion lasted for two hours in the morning and seven hours in the afternoon and evening, with traffic backing up three miles.", "\n\nThe Portland Bureau of Transportation included the project in its citywide transportation plan, and the tri-county planning agency, Metro, is considering adding it to an update of the region's transportation plan. ", "The 2017 Legislature included early planning and future construction funds for the project in the $5.3 billion transportation funding package that is expected to be the centerpiece of Brown's 2018 reelection campaign.", "\n\nOn Aug. 30, the coalition of 18 local, statewide and national environmental and alternative transportation organizations opposing the project sent a letter to the council asking that it be taken out of Central City 2035, the official name of the update that includes the TSP.", "\n\nThe groups hope to persuade the council to pressure Metro and the state not to proceed with it. ", "The coalition includes the Audubon Society of Portland, OPAL Environmental Justice Oregon, the Community Cycling Center, Neighbors for Clean Air, the NAACP chapter of Portland, and other groups.", "\n\nThe letter highlights city leaders' decision in the 1970s to reject the Mt. Hood Freeway, and says, \"Members of the City Council: It's not too late to stop the freeway.\"", "\n\nCortright says that not until the state adopts congestion pricing, a form of tolling, for I-5 — as is called for under the bill signed by Brown — will it have a true picture of the corridor's congestion needs.", "\n\nOther critics say that adding a new north-south freight rail line using existing right of way would do a great deal to solve the corridor's congestion problems at a far lower cost.", "\n\nPublic wants lanes\n\nPublic surveys have repeatedly found the vast majority of those in the Portland region consider traffic congestion to be the number one transportation problem. ", "They overwhelmingly want road projects prioritized for transportation funding dollars.", "\n\nLocal and state officials, meanwhile, have lined up behind the package, and so has the powerful trucking industry, which says congestion in Portland is costing consumers money.", "\n\nSo do Cortright and his allies even have a prayer of succeeding?", "\n\n\"I think we have a prayer,\" he said. \"", "I don't know. ", "My experience with the CRC was we lost every single vote until the one that we won.", "\n\n\"So it wouldn't surprise me if we didn't convince the council at this point to pull this out of the plan. ", "But I hope that at a minimum we can force some serious questions of what's going on, whether it makes sense and is something our community wants to do.\"" ]
{ "pile_set_name": "OpenWebText2" }
[ 0.009316770186335404, 0.006211180124223602, 0, 0, 0.010752688172043012, 0, 0.006134969325153374, 0, 0, 0, 0.00510204081632653, 0.013513513513513514, 0.011299435028248588, 0.006711409395973154, 0, 0.008849557522123894, 0, 0, 0.007751937984496124, 0, 0.004629629629629629, 0.004608294930875576, 0.0036101083032490976, 0, 0.020618556701030927, 0.005847953216374269, 0.004739336492890996, 0, 0, 0, 0, 0, 0, 0, 0.012048192771084338, 0, 0 ]
0.003831
5
[ "Q:\n\nWhen I render my model in blender the only thing that appears is the blue color i have for the backround\n\nI've been trying to fix this for ages and can't seem to find a solution. ", "I'm rendering with cycles. ", "I've tried messing with the layers and different render engines and even tried finding a solution based on other questions but no luck.", "\nHere is the blend file\n\nA:\n\nThere is an Object in your scene which is set to Wireframe Display mode in the viewport, but when rendered it is being shaded solid. ", "It encompasses all your objects, so basically it hides everything. ", "The object in question is called CloudBounds, and is highlighted in this screenshot:\n\nThe camera however is clearly outside of this box:\n\nProbably you have tried to generate clouds using an Add-on which targets Blender Internal render engine? ", "It would explain why there are no nodes on the cycles shader (it still has the button labeled use nodes):\n\nAnyways, if you move that object to a separate layer which is not set as a RenderLayer, or simply hide or delete it, the scene renders again:\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0.006172839506172839, 0, 0.00411522633744856, 0.004 ]
0.002041
5
[ "Q:\n\nSelect all elements by class in one div\n\nHello all good people.", "\nI need your advice once again (i wait for day when i could say i can solve my programming problems by myself).", "\nI need to write a simple quiz with JavaScript or jQuery. ", "I have done simple questions like ABCD but still i cant crack fill gap questions. ", "Here's my code:\n <?", "xml version=\"1.0\" encoding=\"utf-8\"?", ">\n<!", "DOCTYPE html><html xmlns=\"http://www.w3.org/1999/xhtml\" xml:lang=\"pl\">\n <head>\n <meta charset=\"utf-8\" />\n <title></title>\n <script src=\"js/jquery-1.9.1.min.js\"></script>\n <link type=\"text/css\" href=\"../css/nexto.css\" rel=\"stylesheet\" />\n </head>\n <body>\n <div class=\"pytanie\">\n <p class=\"tresc\">1. ", "Ile ksiezyców ma ziemia?</p>\n <p class=\"odpowiedz poprawna\">A) 1</p>\n <p class=\"odpowiedz\">A) 2</p>\n </div>\n <div class=\"pytanie\">\n <p class=\"tresc\">1. ", "Ile ksiezyców ma ziemia?</p>\n <p class=\"odpowiedz poprawna\">A) 1</p>\n <p class=\"odpowiedz\">A) 2</p>\n </div>\n <div class=\"pytanie\">\n <p class=\"tresc\">Excuse me, how <span contenteditable=\"true\" class=\"luka-odpowiedz\"></span> I get to the nearest underground station?</p>\n <p class=\"luka-prawidlowa\">can </p>\n </div>\n <span class=\"btn-sprawdz\" id=\"btn-sprawdz-1\">Sprawdz</span>\n <script>\n $(document).ready(function() {\n var score;\n score=0;\n // Mechanizm zaznaczania odpowiedzi wielokrotnego wyboru\n $('.odpowiedz').click(function() {\n // Najpierw zdejmij kolor\n $(this).closest('.pytanie').find('p').css('background-color','transparent');\n // Zdejmij selecta\n $(this).closest('.pytanie').find('p').removeClass('selected');\n // Zaznacz tę odpowiedź\n $(this).css('background-color','blue');\n // Oznacz ją jako zaznaczoną\n $(this).addClass('selected');\n });\n ////////////////////////////////////////////////////////////\n //Mechanizm sprawdzania odpowiedzi wielokrotnego wyboru\n $('#btn-sprawdz-1').click(function() {\n // Iteruje po odpowiedziach i pobieram class\n $('.odpowiedz').each(function() {\n var wartosc_odpowiedzi = $(this).attr('class');\n // Jeśli selected i poprawna + punkt\n if (wartosc_odpowiedzi == \"odpowiedz poprawna selected\") {\n score++;\n }\n });\n ////////////////////////////////////////////////////////////\n // Mechanizm sprawdzania luk\n $('.luka-odpowiedz').each(function() {\n // Pobieramy odpowiedź użytkownika\n var wartosc_odpowiedzi = $(this).text();\n var wzorzec_odpowiedzi = $(this).closest('.luka-prawidlowa').text;\n alert(wzorzec_odpowiedzi);\n });\n });\n });\n </script>\n </body>\n</html>\n\nhere is JSFIDDLE project.", "\nGap can have multiple answers (all wits class .luka-prawidlowa i tried to take all paragraps in loop, and compare user answer to .luka-prawidlowa But i get some trash instead. ", "Anyone can help me?", "\n------- EDIT --------\nAnswer of @Spokey works great - in meantime i do it other way. ", "Diffrence was in .each loop. ", "before it was \n$('.luka-odpowiedz').each(function() {\n // Pobieramy odpowiedź użytkownika\n var wartosc_odpowiedzi = $(this).text();\n var wzorzec_odpowiedzi = $(this).closest('.luka-prawidlowa').text;\n alert(wzorzec_odpowiedzi);\n });\n\nbut I go one step up to .pytanie and do it like:\n$('.pytanie-luka').each(function() {\n // Pobieramy odpowiedź użytkownika\n var wartosc_odpowiedzi = $(this).find('.luka-odpowiedz').text();\n var wzorzec_odpowiedzi = $(this).find('.luka-prawidlowa').text();\n\n });\n\nI must change .pytanie to .pytanie-luka for loop iterate only with fill a gap questions. ", "But still @Spokey approach seems better one. ", "\n\nA:\n\nTry the following\n $('#btn-sprawdz-1').click(function () {\n // Iteruje po odpowiedziach i pobieram class\n $('.odpowiedz').each(function () {\n var wartosc_odpowiedzi = $(this).attr('class');\n // Jeśli selected i poprawna + punkt\n if (wartosc_odpowiedzi == \"odpowiedz poprawna selected\") {\n score++;\n }\n });\n ////////////////////////////////////////////////////////////\n // Mechanizm sprawdzania luk\n var fill = $('.luka-odpowiedz').text(); // save span text on click \n\n $('.luka-prawidlowa').each(function () { \n // for each paragraph \n //your mistake here was to use for each span instead of paragraph\n\n if (fill === $(this).text()) { // if span text is like paragraph\n alert('ok'); // do something\n }\n });\n });\n\nFIDDLE\n\nNew script (I did not see that you are using the same class everywhere).", "\nI suggest that you add another class to .pytanie (in my example .gap-fill). ", "\nIt's not necessary to add a new class, but it is better for performance. (", "each won't have to browse every div that is not a gap filling question)\n$('.gap-fill').each(function () {\n var th = $(this);\n var text = th.find('.luka-odpowiedz').text();\n\n th.find('.luka-prawidlowa').each(function(){\n if(text === $(this).text()){ score++; }\n });\n});\n\nhttp://jsfiddle.net/k8KC7/9/\nNOTE: I also reseted score when you click the button.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0.034482758620689655, 0.012195121951219513, 0, 0.02857142857142857, 0, 0.006230529595015576, 0.005780346820809248, 0.0035551041137633316, 0, 0, 0.011627906976744186, 0, 0.0014577259475218659, 0.022222222222222223, 0.002053388090349076, 0, 0, 0.007874015748031496, 0 ]
0.006479
5
[ "\nAsk HN: Which is the best Ruby on Rails book? - ", "xstartup\nI am not new to development (built apps in dozens of frameworks&#x2F;languages) but looking to create more elegant code and one of my friends recommended Rails. ", "So, which book describes the best practice from a newbie -&gt; expert.", "\n======\ntebura\nPrefer first to brush up ruby primers and then you can start with Agile Web\nDevelopment with Rails\n\n------\ndevotiongeo\nAgile Web Development with Rails 5.1, but don't forget to learn enough Ruby\nbefore that.", "\n\n" ]
{ "pile_set_name": "HackerNews" }
[ 0, 0.0058823529411764705, 0, 0.0045045045045045045, 0 ]
0.002077
5
[ "Politics|Justice Dept. ", "Office to Make Legal Aid More Accessible Is Quietly Closed\n\nSupported by\n\nJustice Dept. ", "Office to Make Legal Aid More Accessible Is Quietly Closed\n\nImage\n\nThe Office for Access to Justice's stated mission was to “deliver outcomes that are fair and accessible to all, irrespective of wealth and status.", "”CreditCreditJustin T. Gellerson for The New York Times\n\nWASHINGTON — The Justice Department has effectively shuttered an Obama-era office dedicated to making legal aid accessible to all citizens, according to two people familiar with the situation.", "\n\nThe division, the Office for Access to Justice, began as an initiative in 2010 under former Attorney General Eric H. Holder Jr. to increase and improve legal resources for indigent litigants in civil, criminal and tribal courts. ", "Though the head of the office reports directly to the associate attorney general, it never gained much visibility within the Justice Department because it did not oversee a large staff of prosecutors.", "\n\nWhile Attorney General Jeff Sessions cannot close the office without notifying the Congress, he can sideline it by moving its resources elsewhere. ", "Its offices now sit dark on the third floor of the Justice Department building. ", "The staff of a dozen or so has dwindled and left the department over the past few months, the people said. ", "Maha Jweied, the acting director of the department, left this month to start a consulting business, according to her LinkedIn profile.", "\n\nThe Justice Department did not respond to repeated requests for comment, and Ms. Jweied did not respond to an emailed request for comment. ", "Career prosecutors emphasized that new administrations reshuffle the Justice Department’s priorities, de-emphasizing or shuttering projects that previous administrations had supported to devote resources to their own agendas.", "\n\nThe office’s stated mission was to “deliver outcomes that are fair and accessible to all, irrespective of wealth and status.” ", "It worked with other federal, state and local entities in the justice system to “increase access to counsel and legal assistance” for people who could not afford lawyers.", "\n\nCivil rights groups objected to its effective closure.", "\n\n“Sessions’ shutting down the Access to Justice Initiative sadly speaks for itself,” said Vanita Gupta, the chief executive of the Leadership Conference on Civil and Human Rights and the former head of the civil rights division of the Justice Department under former President Barack Obama.", "\n\nAdded Sharon McGowan, director of strategy at Lambda Legal and a former official in the Civil Rights Division of the Justice Department in the Obama administration: “Ever since he became attorney general, Sessions has advanced positions that are irreconcilable with where we are as a country.”", "\n\nMr. Holder oversaw the creation of the office as part of a broader civil rights and criminal justice reform push, trying to draw attention to what he deemed a national crisis of substandard legal aid for the poor. ", "The office gained prominence when the Harvard Law professor Laurence H. Tribe became a senior counselor, a position created by the Obama administration. ", "It was eventually led by Lisa Foster, a former California Superior Court Judge and attorney who specialized in public interest law.", "\n\nUnder Mr. Holder, the Justice Department filed so-called statements of interest in dozens of local lawsuits around the country alleging that poor citizens had received substandard legal services. ", "He also supported a class-action lawsuit against Gov. Andrew M. Cuomo and the State of New York for violating the rights of people who could not afford to hire lawyers.", "\n\n“Access to Justice was a recognition that the Justice Department’s job was not just to prosecute cases, but to ensure justice in the system overall,” Ms. Gupta said.", "\n\nLoretta E. Lynch, Mr. Holder’s successor under Mr. Obama, continued to support the office after she became attorney general, including support for the Office of Access to Justice. ", "Civil rights groups called their work a “game changer.”", "\n\nAs of Thursday, the website for the Office of Access to Justice was still online; Ms. Jweied’s profile had been deleted." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0.004694835680751174, 0.012048192771084338, 0.008658008658008658, 0.005, 0.013422818791946308, 0.0125, 0, 0.014925373134328358, 0.014184397163120567, 0.0044444444444444444, 0, 0, 0, 0.013745704467353952, 0.01694915254237288, 0.004629629629629629, 0.0196078431372549, 0.015267175572519083, 0.010101010101010102, 0.011904761904761904, 0.011976047904191617, 0.02197802197802198, 0, 0.01639344262295082 ]
0.00894
5
[ "Q:\n\nMYSQL sum of costs for all employees for certain date\n\nI am trying to write a mysql query that will list all employees, their job function, and the total costs of all jobs they did for a particular day. ", "Here is the relevant portion of my tables:\njob_function table\nemp_func\nemp_num\n\nemployee table\nemp_name\nemp_num\n\njob table\njob_date\nemp_num\njob_name\n\njob_type table\ncost\njob_name\n\nThe query works except that it is only returns the employees that had a job for that particular day. ", "If an employee had no job that day they do not show up. ", "I need to to display all employees, even those that had no job that day. ", "Any suggestions on how to do that? ", "Here is my query:\nSELECT\nemployee.emp_name,\njob_function,emp_func,\nSUM(job_type.cost)\nFROM\nemployee\nINNER JOIN job ON job.emp_num = employee.emp_num\nINNER JOIN job_function ON job_function.emp_num = employee.emp_num\nINNER JOIN job_type ON job.job_name = job_type.job_name\nwhere job_date = '2016-04-16'\ngroup by emp_name;\n\nA:\n\nYou need a left join to get results even if there are no rows in the left joined table that fit the on-condition; the values in columns of the left joined tables are returned as null in such cases. ", "\nYou also need to move your where-condition to the on-condition; your where would otherwise require the date in the job-table to be 2016-04-16, so it has to exist (and not be null), which would make the left join behave like a join again.", "\nSELECT \n employee.emp_name,\n job_function.emp_func,\n SUM(job_type.cost)\nFROM employee\nJOIN job_function ON job_function.emp_num = employee.emp_num\nleft JOIN job ON job.emp_num = employee.emp_num and job.job_date = '2016-04-16' \nleft JOIN job_type ON job.job_name = job_type.job_name\ngroup by employee.emp_name, job_function.emp_func;\n\nI also fixed your group by and added the emp_func-column there, since you select that column. ", "This would otherwise result in an error in MySQL 5.7+ with default settings, and otherwise might give you wrong results in cases where an employee has more than one function.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0.0019083969465648854, 0, 0.0045871559633027525, 0, 0 ]
0.00065
5
[ "All:\n\nSeveral of our automated data acquisition and analysis systems have been interrupted since last Friday afternoon due to the \"Code Red\" worm that's been attacking federal web servers. ", "Apparently aimed initially at White House servers, the worm quickly found its way to other federal servers and has now shut down all web service in the army.mil domain, including the Corp of Engineers, which furnishes much of our hydro data. ", "Other internet sources have also been interrupted.", "\n\nWe're working on alternative data sources and transfer methods, but web site content will likely be spotty for the balance of the week. ", "Also, we're retaining the Mt Hood conference room for this afternoon, but we won't have a structured presentation.", "\n\nTim" ]
{ "pile_set_name": "Enron Emails" }
[ 0, 0.008264462809917356, 0, 0, 0, 0.2 ]
0.034711
5
[ "Iowa Northern EMD GP38-2 No. ", "3808 sits idle in the yard.", "\n\nIowa Northern EMD GP38-2 No. ", "3808 sits idle in IANR yard located in Manly, Iowa. ", "Photo taken with permission.", "\n\nDone" ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0, 0, 0, 0, 0 ]
0
5
[ "Homozygous p.M172K mutation of the TFR2 gene in an Italian family with type 3 hereditary hemochromatosis and early onset iron overload.", "\nThe p.M172K TFR2 mutation was identified in two Italian siblings aged 32 and 40 years old with primary iron overload. ", "The two patients showed a severe increase in serum iron indices. ", "From the age of 25, the male sib also revealed abnormal levels of hepatic enzymes, presumably in relation to iron induced liver damage. ", "Clinical findings seem to evidence that type 3 hemochromatosis can be more serious than classic hemochromatosis. ", "This report adds two more type 3 hereditary hemochromatosis cases which suggest that TFR2 mutations could be more frequently involved in non-HFE hemochromatosis than has been actually thought." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0 ]
0
5
[ "Changing perceptions and practices regarding aspirin, nonsteroidal anti-inflammatory drugs, and cyclooxygenase-2 selective nonsteroidal anti-inflammatory drugs among US primary care providers.", "\nOur understanding of the benefits and risks of aspirin non steroidal anti-inflammatory drugs (NSAIDs), cyclooxygenase-2 (COX-2) selective NSAIDs and gastro-protective agents (GPAs) continues to expand. ", "To assess the perceptions and practices of US primary care physicians (PCPs) regarding the use of aspirin, NSAIDs, COX-2 selective NSAIDs and GPA. ", "A 34-question survey was administered to 1000 US PCPs via the internet. ", "Questions addressed issues involving aspirin, NSAIDs, COX-2 selective NSAIDs, and GPAs. ", "Around 491 of 1000 PCPs had participated in a similar survey conducted in 2003. ", "Eighty-five per cent of PCPs reported that >25% of their patients were taking aspirin for preventive reasons. ", "Nineteen per cent performed a risk calculation when deciding whether to start aspirin for cardioprotection. ", "Fifty-four per cent recommended a proton pump inhibitor (PPI) for a patient with a recently healed ulcer who required ongoing aspirin. ", "Thirty-one per cent reported prescribing NSAIDs more often and 52% were more likely to recommend a GPA with an NSAID than in 2003. ", "Although PCPs were less likely to recommend a COX-2 selective NSAID compared to 2003, only 41% felt that rofecoxib increased cardiovascular risk. ", "One-third felt that celecoxib and traditional NSAIDs were associated with increased cardiac risk. ", "This survey identified several areas of ongoing confusion regarding aspirin, NSAIDs, COX-2 selective NSAIDs and GPAs, which should help direct future educational efforts regarding the benefits, risks and appropriate use of these agents." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.009852216748768473, 0.02040816326530612, 0, 0.011363636363636364, 0, 0, 0, 0, 0.015267175572519083, 0, 0, 0.00423728813559322 ]
0.004702
5
[ "Businesses worldwide recognize the commercial value of their data and seek reliable, cost-effective ways to protect the information stored on their computer networks while minimizing impact on productivity. ", "Protecting information is often part of a routine process that is performed within an organization. ", "A company might back up critical computing systems such as databases, file servers, web servers, and so on as part of a daily, weekly, or monthly maintenance schedule. ", "The company may similarly protect computing systems used by each of its employees, such as those used by an accounting department, marketing department, engineering department, and so forth.", "\nGiven the rapidly expanding volume of data under management, companies also continue to seek innovative techniques for managing data growth, in addition to protecting data. ", "For instance, companies often implement migration techniques for moving data to lower cost storage over time and data reduction techniques for reducing redundant data, pruning lower priority data, etc. ", "Enterprises also increasingly view their stored data as a valuable asset. ", "Along these lines, customers are looking for solutions that not only protect and manage, but also leverage their data. ", "For instance, solutions providing data analysis capabilities, information management, improved data presentation and access features, and the like, are in increasing demand." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "NA 78 Gujranwala Election 1988\nResult\n\nNA-78 Gujranwala V Detail Election Result 1988\n\nDetail and complete election result of NA-78 Gujranwala\n5 with votes detail of General Election 1988. ", "provide the information\nabout Names of all candidates , their party affiliation and their votes in\ngeneral election 1988 of Pakistan . ", "Rana Nazir Ahmad Khan was elected MNA from\nN.A-78 Gujranwala V in the general election 1988." ]
{ "pile_set_name": "Pile-CC" }
[ 0.015873015873015872, 0, 0.03260869565217391 ]
0.016161
5
[ "Q:\n\nWhy regex is not working?", "\n\nI need to replace all occurences of normal whitespaces in «статья 1», «статьи 2» etc. ", "with non-breaking spaces. ", "\nThe construction below works fine:\n re.sub('(стат.{0,4}) (\\d+)', r'\\1&#x00A0;\\2', text) # 'r' in repl is important, otherwise the word is not replaced correctly, at least for texts in Russian.", "\n\nhowever, I do not want to repeatedly use re.sub for «статья», then for «пункт», then for the names of months, I want to have a dictionary with regex expressions and replacements. ", "Here's my code, but it does not work as expected: 'статья 1 статьи 2' should look like 'статья(non-breaking space here)1 статьи(non-breaking space here)2':\n import re\n\n text = 'статья 1 статьи 2'\n dic = {'(cтат.{0,4}) (\\d+)' : r'\\1&#x00A0;\\2'}\n\n def replace():\n global text\n final_text = ''\n for i in dic:\n new_text = re.sub(str(i), str(dic[i]), text)\n text = new_text\n return text\n\n print (replace())\n\nA:\n\nThe problem is that you copied and pasted wrong.", "\nThis pattern works:\n'(стат.{0,4}) (\\d+)'\n\nThis one doesn't:\n'(cтат.{0,4}) (\\d+)'\n\nWhy? ", "Because in the first one, and in your search string, that first character is a U+0441, a Cyrillic small Es. ", "But in the second one, it's a U+0063, a Latin small C. Of course the two look identical in most fonts, but they're not the same character.", "\n\nSo, how can you tell? ", "Well, when I suspected this problem, here's what I did:\n>>> a = '(стат.{0,4}) (\\d+)' # copied and pasted from your working code\n>>> b = '(cтат.{0,4}) (\\d+)' # copied and pasted from your broken code\n>>> print(a.encode('unicode-escape').decode('ascii'))\n(\\u0441\\u0442\\u0430\\u0442.{0,4}) (\\\\d+)\n>>> print(b.encode('unicode-escape').decode('ascii'))\n(c\\u0442\\u0430\\u0442.{0,4}) (\\\\d+)\n\nAnd the difference is obvious: the first one has a \\u0441 escape sequence where the second one has a plain ASCII c.\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.002 ]
0.000182
5
[ "About Celebrity Tanushree Dutta:\n\nTanushree Dutta is a very well-known Indian actress plus talented model. ", "Her date of birth is 19th March, 1984. ", "The place of birth is Jamshedpur, Bihar, India. ", "She has won the title of Femina Miss India Universe in the year of 2004 by participating in this beauty pageant. ", "She basically belongs from Bengali Hindu family. ", "She was doing her B.Com when only after one year of this course she leaves her study & takes a start of her modeling career.", "\n\nAs she wins the Miss India title then she starts to receives offers from prestigious brands, fashion designers etc. ", "So, in this way she comes in the world of show business. ", "She also appears in lots of Indian movies such as in “Aashiq Banaya Apne”. ", "Her sister Ishita Dutta is also an actress & currently she is doing acting in a star plus serial “Ek Ghar Banaunga”.", "\n\nOn this page I am going to share some very unique & exclusive pictures if Tanushree Dutta. ", "These pictures deal only with the dresses that she wears on different occasions.", "\n\nAnarkali Frock:\n\nIn this picture you can this Indian actress in cream color Anarkli frock which is decorated by using ferozi color patches & floral thread embroidery. ", "Deep round neckline & net stuff sleeves are looking very glamorous. ", "A matching Churidar pajama is looking very perfect with it. ", "She was spotted in this Anarkali frock at the event of a Bollywood couple marriage ceremony) that is film director Mohit Suri & actress Udita Goswami wedding function). ", "This function was held in Mumbai.", "\n\nDress wears at Indian Bridal Week:\n\nHave a look at this light sky blue color frock which she wears at the at Aamby Valley Indian Bridal Week show. ", "In this half sleeved deep squared neckline she is looking very stylish. ", "It is a designer Anarkali frock which is designed very beautifully.", "\n\nRed & Green Color Dress:\n\nWhat do you say about this red color frock which is paired with green color Churidar pajama? ", "The red frock ends of green color banarsi stuff patches. ", "A green color duppata with red color patch is looking very nice with it. ", "She wears this dress at Cancer Rose Day which is celebrated by the CPAA (Cancer Patients Aid Association) at the Hotel Trident in BKC, Mumbai, India.", "\n\nShort Red Embroidered top with Pajama:\n\nLook at another amazingly designed pure red color embroidered dress which is worn by the Tanushree Dutta. ", "It is a short red color fully embroidered (golden embroidery) thigh length top with tight red color pajama & ferozi color embroidered duppata. ", "She wear this dress at Jessica Simpson’s Bollywood Party, which held in India.", "\n\nTanushree Dutta Dresses:\n\nYou can browse some more pictures from the following gallery. ", "This gallery is full of with the Tanushree Dutta Dresses. ", "by looking towards each picture you can get a unique idea & you can design your own dress by copying your favorite actress Tanushree Dutta Dress." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.02564102564102564, 0.020833333333333332, 0.017699115044247787, 0, 0, 0, 0, 0, 0.008620689655172414, 0.010752688172043012, 0, 0, 0, 0, 0.011834319526627219, 0, 0.006711409395973154, 0, 0.014925373134328358, 0, 0, 0, 0.006711409395973154, 0.013513513513513514, 0, 0.02564102564102564, 0, 0.017241379310344827, 0 ]
0.006004
5
[ "Q:\n\nWill my programming question currently posted on CR be OK for SO?", "\n\nSince my question includes working code I thought it belonged to Code Review and posted it there.", "\nApparently it was deemed too hypothetical for their taste.", "\nWould it be OK to move it to SO?", "\n\nA:\n\nThe reason why you can't find the right place to post your question is because your problem is not well defined.", "\nYou have posted some code, that returns the union of all the elements in two sets. ", "But the specification of the method is not there (see my comment on your question: is the returned set supposed to be of a specific type? ", "sorted in a specific order? ", "throw an exception in some cases? ", "etc.).", "\nOnce you have defined that specification, your question could evolve into two things:\n\neither the code you have behaves as specified and the question may be posted on CR if you would like people to comment on how to improve it\not it does not in which case there is a bug and you could post a question on SO explaining why it doesn't do what you expect, or, even better, you could include a MCVE showing the faulty behaviour.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.014492753623188406, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004705882352941176, 0 ]
0.0016
5
[ "Citation {#SECID0ENAAC}\n========\n\nWu Y-A, Gao J-W, Cheng X-F, Xie M, Yuan X-P, Liu D, Song R (2020) Characterization and comparative analysis of the complete mitochondrial genome of *Azygia hwangtsiyui* Tsin, 1933 (Digenea), the first for a member of the family Azygiidae. ", "ZooKeys 945: 1--16. [", "https://doi.org/10.3897/zookeys.945.49681](10.3897/zookeys.945.49681)\n\nIntroduction {#SECID0ENBAC}\n============\n\nThe genus *Azygia* Looss, 1899 is an endoparasitic helminth found in the stomach and intestine of freshwater feral carnivorous fish ([@B10]). ", "This genus includes several species complexes and its type species is *Azygia lucii* (Müller, 1776), which is a parasite of numerous, but especially esocid and percid, fishes in Europe. ", "Many researchers have added to our knowledge of this cosmopolitan species. ", "To date, species of *Azygia* are frequently reported from the esophagus, stomach, and intestine of a wide range of predatory fishes from Asia, Europe and North America, including China, Japan, India, Russia, Germany, and North America ([@B43]; [@B42]; [@B30]; [@B29]; [@B4]; [@B12]; [@B34]; [@B47]; [@B31]).", "\n\n*Azygia hwangtsiyui* Tsin, 1933 is a member of the family Azygiidae Odhner, 1911 and is often overlooked; it is parasitic in the gastrointestinal tract of species of the family Channidae Fowler, 1934 but caused only slight clinical signs, including malnutrition and weight loss. ", "In China, *Azygia hwangtsiyui*-infected freshwater predatory fishes have been described from Shandong, Heilongjiang, Jiangsu, Fujian, Sichuan and Hunan Provinces ([@B42]; [@B51]; [@B26]; [@B41]; [@B15]; [@B7]; [@B45]; [@B9]). ", "It has a mainly inland distribution and utilizes freshwater snail species (e.g. *Vivipara quadrata* (Benson, 1842)) as intermediate hosts ([@B41]) and develops into adults in the gastrointestinal tract of predatory fish species such as *Ophiocephalus argus* Cantor, 1842 and *Channa asiatica* (Linnaeus, 1758) ([@B42]; [@B4]).", "\n\nMorphology is the most commonly used method for species identification and differentiation of metazoans and is widely adopted globally by parasitologists and taxonomists. ", "A huge disadvantage of using morphological criteria, however, is that it is difficult to identify and distinguish closely related and cryptic species. ", "Although the family Azygiidae was erected more than a century ago, its situation, and that of several species of *Azygia*, is still controversial and uncertain. [", "@B28] pointed out that *Azygia* is the only genus in the family then presenting systematic confusion: *Azygia longa* (Leidy, 1851) in North America may be a synonym of *A. lucii* in Europe ([@B28]), and [@B44] reported that *Azygia acuminata* Goldberger, 1911 and *A. longa* should be considered conspecific. ", "Nevertheless, due to the discovery of some life histories of members of *Azygia*, *A. lucii* and *A. longa* have been recognized as two distinct species ([@B40]; [@B38]; [@B39]).", "\n\nMitochondrial (mt) genome and nuclear ribosomal DNA sequences are effective molecular tools for taxonomic identification, phylogeny and biogeographical research ([@B3]; Le et al. ", "2019). ", "However, only a partial cytochrome oxidase subunit 1 protein sequence ([AIY67834](AIY67834)) of *Proterometra macrostoma* Horsfall, 1933 (Azygiidae) is currently available in GenBank. ", "None of the mitochondrial genome data have been sequenced for a member of the family Azygiidae. ", "Therefore, we determined the complete mitochondrial genome sequence of *A. hwangtsiyui* as a basis for the future definition of strain- and species-specific markers, and for assessing mitogenomics in resolving the interrelationships of trematodes.", "\n\nMaterials and methods {#SECID0EEMAC}\n=====================\n\nSampling and DNA extraction {#SECID0EIMAC}\n---------------------------\n\nThe specimens of flatworms were isolated from the stomach of their definitive host, in this case snakehead fish (*Ophiocephalus argus* (Cantor, 1842)) obtained from east Dongting Lake in Yueyang, Hunan province, China (29°22\\'N, 113°06\\'E). *", "Azygia hwangtsiyui* was morphologically identified according to the original and other descriptions ([@B42]; [@B41]; [@B50]; [@B4]), using a stereomicroscope and a light microscope. ", "Furthermore, single samples were confirmed molecularly as *A. hwangtsiyui* based on sequencing of 1370 bp 28S rDNA sequence. ", "The parasites were completely washed in water, preserved in 99% ethanol, and stored at 4 °C until genomic DNA extraction. ", "Total genomic DNA extraction was performed from an intact specimen with the TIANamp Micro DNA Kit (Tiangen Biotech, Beijing, China), according to the manufacturer's instructions.", "\n\nDNA amplification and sequencing {#SECID0EHOAC}\n--------------------------------\n\nAccording to conserved regions of mitochondrial genes in other available digenea mitogenomes, six partial gene fragments for cytb, nad4, nad1, 16S, 12S and cox2 were amplified using six generic primers sets HWF1/HWR1 (for cytb), HWF3/HWR3 (for nad4), HWF5/HWR5 (for nad1), HWF7/HWR7 (for 16S), HWF9/HWR9 (for 12S), and HWF11/HWR11 (for cox2), respectively. ", "On the basis of these obtained nucleotide sequences, *A. hwangtsiyui*-specific primers were designed for amplification and sequencing of the remaining mitogenome (Suppl. ", "material [1](#S1){ref-type=\"supplementary-material\"}: Table S1). ", "All primers were designed to produce amplicons with overlaps of approximately 100 bp. ", "PCR reactions were performed in a 50 µl reaction solution with the ingredient of 18.5 µl ddH~2~O, 25 µl 2×PCR buffer (Mg^2+^, dNTP plus, Takara, Dalian, China), 1.5 µl of each primer (0.2--1.0 μM), 1 µl EX Taq polymerase (250U, Takara), and 2.5 µl DNA template. ", "PCR amplification was compliant to the following amplification protocol: initial denaturation at 98 °C for 2 min, followed by 40 cycles 10 s at 98 °C, 15 s at 50 °C, 68 °C for 1 min/kb, and 10 min at 68 °C for a final extension. ", "The amplified PCR products were purified with TIANgel Purification Kit (Tiangen Biotech, Beijing, China), and sequenced bidirectionally at Sangon Biotech (Shanghai) Co., Ltd. (Shanghai, China) based on the primer walking method using several specific primers (Suppl. ", "material [1](#S1){ref-type=\"supplementary-material\"}: Table S1).", "\n\nMitogenome annotation and analysis {#SECID0EMPAC}\n----------------------------------\n\nAccording to sequence chromatograms, all raw fragments were quality-proofed using CHROMAS (<https://www.technelysium.com.au>) to remove ambiguity codes and low-quality bases. ", "Whenever the quality was sub-optimal, sequencing was repeated until the amplicon is the consensus sequence. ", "Before manual assembly of the entire mitochondrial genomic sequence, identification of all amplicons was performed by BLASTN check ([@B1]). ", "The mt genome of *A. hwangtsiyui* was aligned against the mt genome sequences of other promulgated digenean mitogenomes utilizing multiple sequence alignment software MAFFT version 7.149 ([@B13]) to identify genetic boundary. ", "Protein-coding genes (PCGs) were predicted with Open Reading Frame Finder (<https://www.ncbi.nlm.nih.gov/orffinder/>) adopting echinoderm and flatworm mitochondrial codes, and examining the nucleotide alignment against the reference mtDNA in trematode *Dicrocoelium chinense* Tang et Tang, 1978 ([NC_025279.1](NC_025279.1)). ", "Whole tRNAs were inferred with the detection results of ARWEN ([@B17]) and MITOS web server ([@B3]). ", "Two rRNA (rrnL and rrnS) were founding by comparison with those of published fluke mitogenomes. ", "Codon usage and relative synonymous codon usage (RSCU) for 12 PCGs of *A. hwangtsiyui* were computed by PHYLOSUITE ([@B49]), and its operation results were imported into GGPLOT2 program ([@B46]) to make figures of the RSCU. ", "Tandem repeats in the non-coding regions were determined with Tandem Repeats Finder software version 4.09 ([@B2]), and the prediction of their secondary structures were performed by the MFOLD web server ([@B52]). ", "The annular diagram of *A. hwangtsiyui* mitogenome was plotted with mitochondrial genome data visualization tool MTVIZ (<http://pacosy.informatik.uni-leipzig.de/mtviz/mtviz>).", "\n\nPhylogenetic analysis {#SECID0E2CAE}\n---------------------\n\nFor phylogenetic analyses, we utilized translated and concatenated amino acid sequences of twelve protein-coding genes for 49 Platyhelminthes including *A. hwangtsiyui* mitogenome determined in this study. ", "Two tapeworm species, *Cloacotaenia megalops* (Nitzsch in Creplin, 1829) ([NC_032295.1](NC_032295.1)) and *Dibothriocephalus latus* (Linnaeus, 1758) ([NC_008945.1](NC_008945.1)) were included as outgroup taxa representing two different families. ", "Species information including systematic positions and GenBank accession numbers is provided in Suppl. ", "material [2](#S2){ref-type=\"supplementary-material\"}: Table S2. ", "The PHYLOSUITE program was used to extract twelve PCGs from the GenBank files, export fasta files with translated amino acid datasets, and align datasets in bulk using integrated applet MAFFT with normal-alignment mode. ", "Phylogenetic analyses were performed using Bayesian Inference (BI) and Maximum Likelihood (ML) methods. ", "Assessment of the best-fit evolutionary model for dataset was conducted via ModelGenerator v0.8527 ([@B14]). ", "BI in MrBayes version 3.2.6 ([@B36]) was carried out under the MtRev matrix of amino acid substitution, and was analyzed with 1 × 10^7^ metropolis-coupled Monte Carlo Markov Chain (MCMC) generations. ", "Two independent runs with four simultaneous MCMC chains (one cold and three heated chains) were conducted for 1 × 10^7^ million generations, sampling every 10,000 generations and discarding the initial 25% generations as burn-in. ", "ML analysis in PHYLOSUITE was performed using MtART+I+G matrix with 1000 bootstrap replicates.", "\n\nResults and discussion {#SECID0EBGAE}\n======================\n\nGeneral traits of the *Azygia hwangtsiyui* mitogenome {#SECID0EFGAE}\n-----------------------------------------------------\n\nThe entire *A. hwangtsiyui* mtDNA is 13,973 bp in length (GenBank accession number: [MN844889](MN844889)) and comprised of 12 protein-coding genes (cox1-3, nad1-6, nad4L, cytb, and atp6), 22 tRNA genes, two rRNA genes (rrnL and rrnS), and two non-coding regions. ", "The 12 protein-coding gene order arrangement is cox3-cytb-nad4L-nad4-atp6-nad2-nad1-nad3-cox1-cox2-nad6-nad5 (Fig. [", "1](#F1){ref-type=\"fig\"}), which is identical to those of *Clinostomum complanatum* (Rudolphi, 1814), *Echinostoma hortense* Asada, 1926, and some species of the Fasciolidae (*Fasciola hepatica* Linneuus, 1758, *Fasciola gigantica* Cobbold, 1856, and *Fasciola* sp. ", "GHL-2014) ([@B21]; [@B8]; [@B23]); the gene atp8 is similarly missing, as usual in trematode species. ", "All genes are transcribed in the anticlockwise direction and encoded by H strand (Table [1](#T1){ref-type=\"table\"}), which is in accordance with other digeneans. ", "The mt genome of *A. hwangtsiyui* has 22 intergenic spacers ranging from 1 to 15 bp and contains two overlapping nucleotides ranging from 1 to 40 bp (Table [1](#T1){ref-type=\"table\"}). ", "Noteworthily, a 40 bp overlap between the nad4 and nad4L genes exists in the *A. hwangtsiyui* mitogenome, which is consistent with most helminths such as *Eurytrema pancreaticum* Janson, 1889 ([@B6]), *Hypoderaeum conoideum* (Bloch, 1782) ([@B48]), but shorter than that of *Schistosoma mekongi* Voge, Bruckner & Bruce, 1978 (64 bp; [@B20]). ", "The nucleotide contents of T, C, A, G, in *A. hwangtsiyui* mitogenome are 42.8%, 12.0%, 16.8%, and 28.5%, respectively (Table [2](#T2){ref-type=\"table\"}). ", "The whole A+T content of the mitogenome is 59.6%, which was markedly biased toward T over A (AT skew: --0.437), and G over C (GC skew: 0.408).", "\n\n###### \n\nThe organization of the mitochondrial genome of *Azygia hwangtsiyui*.", "\n\n ------- ---------- ------- ------------------------ ------- ------------ -------- ----- ---\n Gene Position Size Intergenic nucleotides Codon Anti-codon Strand \n From To Start Stop \n cox3 1 660 660 -- ATG TAG -- H\n trnH 666 729 64 +5 -- -- GTG H\n cytb 732 1841 1110 +2 ATG TAG -- H\n nad4L 1848 2108 261 +6 ATG TAG -- H\n nad4 2069 3340 1272 --40 ATG TAG -- H\n trnQ 3345 3409 65 +4 -- -- TTG H\n trnF 3423 3488 66 +13 -- -- GAA H\n trnM 3490 3555 66 +1 -- -- CAT H\n atp6 3556 4068 513 -- ATG TAG -- H\n nad2 4072 4932 861 +3 GTG TAG -- H\n trnV 4946 5009 64 +13 -- -- TAC H\n trnA 5013 5076 64 +3 -- -- TGC H\n trnD 5081 5146 66 +4 -- -- GTC H\n nad1 5149 6054 906 +2 GTG TAG -- H\n trnN 6070 6134 65 +15 -- -- GTT H\n trnP 6148 6212 65 +13 -- -- TGG H\n trnI 6216 6279 64 +3 -- -- GAT H\n trnK 6280 6348 69 -- -- -- CTT H\n nad3 6349 6708 360 -- ATG TAA -- H\n trnS1 6712 6770 59 +3 -- -- GCT H\n trnW 6781 6842 62 +10 -- -- TCA H\n cox1 6843 8396 1554 -- TTG TAG -- H\n trnT 8410 8474 65 +13 -- -- TGT H\n rrnL 8475 9449 975 -- -- -- -- H\n trnC 9450 9506 57 -- -- -- GCA H\n rrnS 9507 10246 740 -- -- -- H\n cox2 10247 10828 582 -- GTG TAA -- H\n nad6 10834 11277 444 +5 GTG TAG -- H\n trnY 11284 11352 69 +6 -- -- GTA H\n trnL1 11352 11416 65 --1 -- -- TAG H\n trnS2 11421 11490 70 +4 -- -- TGA H\n trnL2 11491 11555 65 -- -- -- TAA H\n trnR 11558 11617 60 +2 -- -- TCG H\n nad5 11626 13225 1600 +8 GTG T -- H\n trnE 13226 13288 63 -- -- -- TTC H\n trnG 13604 13669 66 -- -- -- TCC H\n ------- ---------- ------- ------------------------ ------- ------------ -------- ----- ---\n\n###### \n\nNucleotide contents of genes and the non--coding region within the mitochondrial genome of *Azygia hwangtsiyui*.", "\n\n --------- ----------- ------ ------ ------ ------ -------- -------- --------- ---------\n Regions Size (bp) T C A G AT (%) GC (%) AT skew GC skew\n atp6 513 50.5 11.3 12.9 25.3 63.4 36.6 --0.594 0.383\n cox1 1554 44.0 13.0 15.9 27.1 59.9 40.1 --0.469 0.352\n cox2 582 39.7 13.1 18.0 29.2 57.7 42.3 --0.375 0.382\n cox3 660 44.8 11.4 15.9 27.9 60.7 39.3 --0.476 0.421\n cytb 1110 44.4 13.5 15.8 26.3 60.2 39.8 --0.476 0.321\n nad1 906 44.0 10.0 16.3 29.6 60.3 39.6 --0.459 0.493\n nad2 861 46.2 11.3 11.8 30.7 58.0 42.0 --0.592 0.463\n nad3 360 45.8 8.1 14.2 31.9 60.0 40.0 --0.528 0.597\n nad4 1272 45.7 12.8 12.3 29.2 58.0 42.0 --0.577 0.391\n nad4L 264 47.0 8.0 17.8 27.3 64.8 35.3 --0.450 0.548\n nad5 1600 46.4 9.5 14.1 30.0 60.5 39.5 --0.535 0.519\n nad6 444 45.9 11.9 14.2 27.9 60.1 39.8 --0.528 0.401\n rrnL 975 37.4 14.1 22.5 26.1 59.9 40.2 --0.250 0.299\n rrnS 740 36.6 14.5 21.6 27.3 58.2 41.8 --0.258 0.307\n tRNAs 1349 35.3 14.5 21.7 28.5 57.0 43.0 --0.238 0.328\n rRNAs 1715 37.1 14.2 22.1 26.6 59.2 40.8 --0.253 0.303\n PCGs 10126 45.2 11.5 14.7 28.6 59.9 40.1 --0.509 0.425\n Genome 13973 42.8 12.0 16.8 28.5 59.6 40.5 --0.437 0.408\n --------- ----------- ------ ------ ------ ------ -------- -------- --------- ---------\n\n![", "An annular diagram of the *Azygia hwangtsiyui* mitochondrial genome.](zookeys-945-001-g001){#F1}\n\nProtein-coding genes and non-coding regions {#SECID0EXBBG}\n-------------------------------------------\n\nA total of 3364 amino acids was encoded by the *A. hwangtsiyui* mtDNA. ", "The full scale of 12 concatenated protein-coding genes was 10126 bp, composed of 45.2% T, 11.5% C, 14.7% A, and 28.6% G. Average A+T content of concatenated 12 protein-coding genes was 59.9%, varying from 57.7% (cox2) to 64.8% (nad4L) (Table [2](#T2){ref-type=\"table\"} and Suppl. ", "material [2](#S2){ref-type=\"supplementary-material\"}: Table S2). ", "All 12 protein-coding genes of *A. hwangtsiyui* mt genome have a lower A+T percentage than those of *Trichobilharzia szidati* Neuhaus, 1952, *Calicophoron microbothrioides* Price & McIntosh, 1944, and some members of the Schistosomatidae Poche, 1907, but possess a higher A+T percentage than those of *Metagonimus yokogawai* Katsurada, 1912, and *Paragonimus westermani* Kerbert, 1878 (Suppl. ", "material [3](#S3){ref-type=\"supplementary-material\"}: Table S3) ([@B19]; [@B20]; [@B5]; [@B37]; [@B32]). ", "There is an obvious bias towards T over A (AT skew = --0.509), and G over C (GC skew = 0.425), and the coding strand is enriched with T and poor with A and especially C. For *A. hwangtsiyui*, the length of protein-coding genes was followed in the order: nad5 (1600 bp) \\> cox1 (1554 bp) \\> nad4 (1272 bp) \\> cytb (1110 bp) \\> nad1 (906 bp) \\> nad2 (861 bp) \\> cox3 (660 bp) \\> cox2 (582 bp) \\> atp6 (513 bp) \\> nad6 (444 bp) \\> nad3 (360 bp) \\> nad4L (264 bp). ", "There are two non-coding regions (NCR1 and NCR2) in *A. hwangtsiyui* mitogenome, while the mt genome of *Paragonimus heterotremus* Chen et Hsia (1964), *C. complanatum*, *Fascioloides magna* (Bassi, 1875), and *T. szidati* have a single non-coding region ([@B8]; [@B27]; [@B37]; [@B35]). ", "NCR1 and NCR2 of the *A. hwangtsiyui* mitogenome is partitioned into two parts by trnG, and accompanied by 70.5% and 57.6% A+T content, respectively. ", "NCR1 and NCR2 have similar chemical base counts, 315 bp and 317 bp in size, respectively. ", "While the NCR1 lacks distinguishing features and any tandem repeats, the NCR2 contains two typical tandem repeats, and each of tandem repeats sequence (120 bp) forms a hairpin-like secondary structure including a whole set of stems and loops (Suppl. ", "material [4](#S4){ref-type=\"supplementary-material\"}: Figure S1). ", "Although tandem repeats are a segment of function-deficiency mitochondrial genome sequences, its hairpin-like secondary structures are widely perceived as regulating the replication and transcription of mitochondrial genome.", "\n\nCodon usage, transfer RNAs, and ribosomal RNAs {#SECID0ERIBG}\n----------------------------------------------\n\nFor the *A. hwangtsiyui* mitogenome, codon ends in G or T were more continual than those ending in A or C. The most frequently used start codon in protein-coding genes was ATG (for six PCGs), secondly was GTG (for five PCGs), which resembles that of the most frequent extrapolated start codons for mitogenome protein-encoding genes of digenean species ([@B8]). ", "The least-used start codon was TTG (only one PCGs). ", "Likewise, the most-used terminal codon was TAG (for nine PCGs), followed by TAA (for two PCGs). ", "Only one of 12 protein-coding sequence (nad5) was terminated with abbreviated T stop codon (Table [1](#T1){ref-type=\"table\"}). ", "Although incomplete stop codons (T or TA) frequently occur in cestodes and nematodes, they were rarely presented in flukes other than *D. chinensis*, *Dicrocoelium dendriticum* (Rudolphi, 1819), and *Postharmostomum commutatum* (Dietz, 1858) ([@B22]; [@B11]). ", "The codon UUU (Phe, 10.17%), UUG (Leu, 8.17%), and GUU (Val, 7.19%) were the most frequently occurring codons in protein-coding genes. ", "Leucine, valine, and phenylalanine are the most-used amino acids, with frequency of 15.96%, 13.38%, and 11.09%, respectively. ", "The least-used codons were CGA (Arg, 0.06%) and GAC (Asp, 0.15%), and the least frequent utilized amino acid was glutamine (1.01%) (Suppl. ", "material [5](#S5){ref-type=\"supplementary-material\"}: Figure S2). ", "As most of digenea mitogenome sequences, the mitogenome of *A. hwangtsiyui* possessed 22 commonly found tRNAs, with the exception of that of *P. westermani* Korean isolate (23 tRNAs), and *P. westermani* Indian isolate (24 tRNAs) ([@B5]). ", "In *A. hwangtsiyui*, tRNA-Gly (trnG) is located between NCR1 and NCR2 (Fig. [", "1](#F1){ref-type=\"fig\"}). ", "The size of ribosomal RNA genes (rrnL and rrnS) in mitochondrial DNA of *A. hwangtsiyui* are 975 bp and 740 bp, respectively (Table [2](#T2){ref-type=\"table\"}). ", "The upstream and downstream of rrnL and rrnS are cascaded with trnT and cox2 genes, respectively, and are detached from each other by trnC, as in all reported platyhelminths to date ([@B20], [@B18]).", "\n\nGene arrangement {#SECID0E1NBG}\n----------------\n\nComparative analysis of gene arrangement among 47 selected digenean taxa, two gene blocks (cox1-trnT-rrnL-trnC-rrnS-cox2-nad6 and cytb-nad4L-nad4-trnQ) are shared by all selected taxa (Fig. [", "2](#F2){ref-type=\"fig\"}). ", "Disregarding *P. heterotremus* and members of the family Schistosomatidae and Fasciolidae Raillet, 1895, the gene order of the remaining digenea taxa is virtually identical with the exception of the translocation of trnE and trnG among the remaining members of selected digenea representatives in family level. ", "Intriguingly, there is the translocation of trnE and trnG within different species of family Fasciolidae. ", "The translocations of three tRNAs (trnS1, trnS2 and trnS) can be discovered even between taxa of the same subgroup. ", "Gene order of the *Brachycladium goliath* (Van Beneden, 1858) mt genome (the only representative of family Brachycladiidae Faust, 1929) is nearly same as that of *P. westermani* (Troglotrematidae Ward, 1918) except for the relocations of trnY between trnG and cox3, and trnE to the position between trnN and trnP. The groups of Schistosomatidae show a massive gene reorganization of protein-coding genes and tRNAs compared with other sequenced digenea mitogenome, which is in accord with previous finding reported by [@B20].", "\n\n![", "Phylogenetic relationships and gene arrangement of *Azygia hwangtsiyui* with other selected digeneas based on translated mitochondrial proteins. ", "The concatenated amino-acid sequence datasets of the 12 protein-coding genes were analyzed by Bayesian Inference (BI) and Maximum Likelihood (ML), utilizing *Cloacotaenia megalops* ([NC_032295.1](NC_032295.1)) and *Dibothriocephalus latus* ([NC_008945.1](NC_008945.1)) as the outgroups. ", "Both ML and BI analyses constructed identical tree topologies.](zookeys-945-001-g002){#F2}\n\nMitogenome-derived phylogeny {#SECID0EPSBG}\n----------------------------\n\nTo assess phylogenetic relationships among available flatworms, we utilized concatenated amino acid sequence dataset representing 12 protein-coding genes of *A. hwangtsiyui*, 46 other digenean representatives, and two tapeworm species (*C. megalops* and *D. latus*) for analyzing molecular-based phylogeny. ", "In this study, the topological structure is divided into two large clades: one consists of seven members of the family Schistosomatidae; and the other clade comprises 40 members from 16 families including the family Azygiidae (*A. hwangtsiyui*) (Fig. [", "2](#F2){ref-type=\"fig\"}). ", "The topological structure shows that *A. hwangtsiyui* (Azygiidae) is identified as the most basal lineage of the Digenea, but separated from *C. complanatum* (Clinostomidae Lühe, 1901), and *Cyathocotyle prussica* Mühling, 1896 (Cyathocotylidae Poche, 1926). ", "Phylogenetic analyses of all complete digenea mtDNAs confirmed taxonomic and previous phylogenetic assessments ([@B33]; [@B16]; [@B11]). ", "The intricate structure and varying content of the family Azygiidae still awaits investigation of relationships based on a much wider taxon sampling and more mitogenome datasets.", "\n\nThis work was supported by the Earmarked Fund for China Agriculture Research System (CARS-45) and Important Research Project of Hunan Provincial Science and Technology Department (2016NK2176).", "\n\nSupplementary materials\n=======================\n\n10.3897/zookeys.945.49681.suppl1\n\nFB70DD86-7DF3-5163-A53C-756FF29CD117\n\n###### \n\nTable S1\n\nmolecular data\n\nPrimers for amplification and sequencing mitochondrial genome of *Azygia hwangtsiyui*.", "\n\nhttps://binary.pensoft.net/file/428057\n\nThis dataset is made available under the Open Database License (http://opendatacommons.org/licenses/odbl/1.0/). ", "The Open Database License (ODbL) is a license agreement intended to allow users to freely share, modify, and use this Dataset while maintaining this same freedom for others, provided that the original source and author(s) are credited.", "\n\nYuan-An Wu, Jin-Wei Gao, Xiao-Fei Cheng, Min Xie, Xi-Ping Yuan, Dong Liu, Rui Song\n\n10.3897/zookeys.945.49681.suppl2\n\n18CEB78A-9321-5447-A2F1-D7BAA335AB98\n\n###### \n\nTable S2\n\nmolecular data\n\nInformation of the Digenea and the outgroups for which complete mitogenomes are available in GenBank.", "\n\nhttps://binary.pensoft.net/file/428058\n\nThis dataset is made available under the Open Database License (http://opendatacommons.org/licenses/odbl/1.0/). ", "The Open Database License (ODbL) is a license agreement intended to allow users to freely share, modify, and use this Dataset while maintaining this same freedom for others, provided that the original source and author(s) are credited.", "\n\nYuan-An Wu, Jin-Wei Gao, Xiao-Fei Cheng, Min Xie, Xi-Ping Yuan, Dong Liu, Rui Song\n\n10.3897/zookeys.945.49681.suppl3\n\n69071E2A-C3CB-5B9A-ADF8-57EFBE1A8083\n\n###### \n\nTable S3\n\nmolecular data\n\nA+T content (%) for 12 protein-coding genes in the available 49 Platyhelminthes mitogenomes.", "\n\nhttps://binary.pensoft.net/file/428059\n\nThis dataset is made available under the Open Database License (http://opendatacommons.org/licenses/odbl/1.0/). ", "The Open Database License (ODbL) is a license agreement intended to allow users to freely share, modify, and use this Dataset while maintaining this same freedom for others, provided that the original source and author(s) are credited.", "\n\nYuan-An Wu, Jin-Wei Gao, Xiao-Fei Cheng, Min Xie, Xi-Ping Yuan, Dong Liu, Rui Song\n\n10.3897/zookeys.945.49681.suppl4\n\n706B0859-8AC5-5D54-870A-F96E6D170850\n\n###### \n\nFigure S1\n\nmolecular data\n\nSecondary structure of tandem repeats in non-coding region 2 (NCR2) of *Azygia hwangtsiyui* mitochondrial genome.", "\n\nhttps://binary.pensoft.net/file/428060\n\nThis dataset is made available under the Open Database License (http://opendatacommons.org/licenses/odbl/1.0/). ", "The Open Database License (ODbL) is a license agreement intended to allow users to freely share, modify, and use this Dataset while maintaining this same freedom for others, provided that the original source and author(s) are credited.", "\n\nYuan-An Wu, Jin-Wei Gao, Xiao-Fei Cheng, Min Xie, Xi-Ping Yuan, Dong Liu, Rui Song\n\n10.3897/zookeys.945.49681.suppl5\n\n1EE62074-E6F3-5A97-81F4-BAB72E1CFB3E\n\n###### \n\nFigure S2\n\nmolecular data\n\nRelative synonymous codon usage (RSCU) of *Azygia hwangtsiyui* mitochondrial genome.", "\n\nhttps://binary.pensoft.net/file/428061\n\nThis dataset is made available under the Open Database License (http://opendatacommons.org/licenses/odbl/1.0/). ", "The Open Database License (ODbL) is a license agreement intended to allow users to freely share, modify, and use this Dataset while maintaining this same freedom for others, provided that the original source and author(s) are credited.", "\n\nYuan-An Wu, Jin-Wei Gao, Xiao-Fei Cheng, Min Xie, Xi-Ping Yuan, Dong Liu, Rui Song\n\n[^1]: Academic editor: D. Gibson\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0.02197802197802198, 0, 0.011764705882352941, 0.005376344086021506, 0, 0.029315960912052116, 0.0071174377224199285, 0.04424778761061947, 0.018404907975460124, 0, 0, 0, 0.016181229773462782, 0.016853932584269662, 0.0055248618784530384, 0, 0.005434782608695652, 0, 0, 0.0026595744680851063, 0.027472527472527472, 0.008, 0, 0.0056179775280898875, 0.018140589569160998, 0.0058823529411764705, 0, 0, 0.007633587786259542, 0.004366812227074236, 0.018726591760299626, 0, 0.0076045627376425855, 0, 0.014285714285714285, 0.008849557522123894, 0.006153846153846154, 0.019801980198019802, 0, 0.013392857142857142, 0.018779342723004695, 0.017142857142857144, 0, 0.0040650406504065045, 0.019417475728155338, 0, 0.00909090909090909, 0.028846153846153848, 0.009174311926605505, 0.01, 0, 0.02127659574468085, 0.0066518847006651885, 0.008620689655172414, 0, 0.029411764705882353, 0, 0, 0.017543859649122806, 0, 0.007042253521126761, 0, 0.008933263268523384, 0.0054914881933003845, 0, 0.010714285714285714, 0, 0.010178117048346057, 0.047619047619047616, 0.0021691973969631237, 0.027777777777777776, 0.013333333333333334, 0.022222222222222223, 0.012, 0, 0, 0.004228329809725159, 0, 0.010416666666666666, 0, 0.007692307692307693, 0.022222222222222223, 0, 0.02158273381294964, 0, 0.012552301255230125, 0.03896103896103896, 0, 0.006211180124223602, 0.010050251256281407, 0.012345679012345678, 0, 0.003215434083601286, 0, 0, 0.011450381679389313, 0, 0, 0.010452961672473868, 0.004228329809725159, 0.007936507936507936, 0, 0.011583011583011582, 0.021897810218978103, 0, 0.010309278350515464, 0, 0.012987012987012988, 0.00425531914893617, 0.023809523809523808, 0.012987012987012988, 0.00425531914893617, 0.017543859649122806, 0.012987012987012988, 0.00425531914893617, 0.019543973941368076, 0.012987012987012988, 0.00425531914893617, 0.017985611510791366, 0.012987012987012988, 0.00425531914893617, 0.05042016806722689 ]
0.009518
5
[ "Q:\n\nASP.NET webservice wish ajax, json, jquery and vb.net\n\nI am tying out this tutorial, http://www.ezzylearning.com/tutorial.aspx?tid=5869127.", "\nIt works perfectly. ", "What I am now trying to do is to host the aspx contents as html file. ", "This html file is hosted on my wampserver which is on my laptop. ", "The asp.net code hosted on my test server. ", "When I try to access, I get the following error, \nResource interpreted as Script but transferred with MIME type text/html: \"http://201.x.x.x/testAjax/Default.aspx/AddProductToCart?callback=jQuery17103264484549872577_1346923699990&{%20pID:%20%226765%22,%20qty:%20%22100%22,%20lblType:%20%2220%22%20}&_=1346923704482\". ", "jquery.min.js:4\n\nUncaught SyntaxError: Unexpected token <\n\nI am not sure how to solve this problem. ", "\nindex.html code\n \n\n $(function () {\n $('#btnAddToCart').click(function () {\n var result = $.ajax({\n type: \"POST\",\n url: \"http://202.161.45.124/testAjax/Default.aspx/AddProductToCart\",\n crossDomain: true,\n data: '{ pID: \"6765\", qty: \"100\", lblType: \"20\" }',\n contentType: \"application/json; charset=utf-8\",\n dataType: \"jsonp\",\n success: succeeded,\n failure: function (msg) {\n alert(msg);\n },\n error: function (xhr, err) {\n alert(err);\n }\n });\n });\n });\n\n function succeeded(msg) {\n alert(msg.d);\n }\n\n function btnAddToCart_onclick() {\n\n }\n\n</script>\n</head>\n<body>\n <form name=\"form1\" method=\"post\">\n <div>\n <input type=\"button\" id=\"btnAddToCart\" onclick=\"return btnAddToCart_onclick()\" \n value=\"Button\" />\n</div>\n</form>\n\naspx.vb\nImports System.", "Web.", "Services\nImports System.", "Web.", "Script.", "Services\n\n<ScriptService()>\nPublic Class WebForm1\nInherits Page\n\nProtected Sub Page_Load(ByVal sender As Object, ByVal e As System.", "EventArgs) Handles Me.", "Load\n Session(\"test\") = \"\"\nEnd Sub\n\n<WebMethod()>\n<ScriptMethod(UseHttpGet:=False, ResponseFormat:=ResponseFormat.", "Json)>\nPublic Shared Function AddProductToCart(pID As String, qty As String, lblType As String) As String\n\n Dim selectedProduct As String = String.", "Format(\"+ {0} - {1} - {2}\", pID, qty, lblType)\n\n HttpContext.", "Current.", "Session(\"test\") += selectedProduct\n\n Return HttpContext.", "Current.", "Session(\"test\").ToString()\n\nEnd Function\n\nEnd Class\n\nA:\n\nThe reason for this is no matter how you specify the content-type of your ajax call, ASP.NET sends the request with Content-Type text/xml\nA solution to this problem is available at:\nhttp://bloggingabout.net/blogs/adelkhalil/archive/2009/08/14/cross-domain-jsonp-with-jquery-call-step-by-step-guide.aspx\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.006993006993006993, 0, 0, 0, 0, 0.006211180124223602, 0, 0.0029013539651837525, 0, 0, 0, 0, 0.007633587786259542, 0.045454545454545456, 0, 0.013333333333333334, 0.015625, 0, 0, 0, 0.00554016620498615 ]
0.004938
5
[ "Q:\n\nBuffer is merged with another Buffer in TCP Vert.x server\n\nI would like to send commands to server via TCP. ", "I created server which retrieve Buffers messages. ", "In client I send 10 commands. ", "I don't know why server reads Buffer in not predictable way.", "\nserver:\n@Slf4j\npublic class TcpServ {\n\n public static void main(String[] args) {\n Vertx vertx = Vertx.vertx();\n NetServer server = vertx.createNetServer();\n\n server.connectHandler(socket -> {\n log.debug(\"New connection established with: socket address {}\", socket.remoteAddress());\n\n socket.handler(new MyHandler());\n\n socket.closeHandler(v -> {\n log.debug(\"The socket has been closed.\");", "\n });\n });\n\n server.listen(8088, \"localhost\", netServerAsyncResult -> {\n if (netServerAsyncResult.succeeded()) {\n log.debug(\"Server is now listening on actual port: \" + server.actualPort());\n } else {\n log.debug(\"Failed to bind!\");", "\n }\n });\n }\n\n @Slf4j\n static class MyHandler implements Handler<Buffer> {\n\n @Override\n public void handle(Buffer event) {\n byte[] bytes = event.getBytes();\n log.debug(\"Received data: {}\", new String(bytes));\n }\n\n }\n\n}\n\nclient:\n@Slf4j\npublic class TcpClie {\n\n public static void main(String[] args) {\n Vertx vertx = Vertx.vertx();\n\n NetClient client = vertx.createNetClient();\n\n client.connect(8088, \"localhost\", netSocketAsyncResult -> {\n\n log.debug(\"Connection established.\");", "\n\n NetSocket socket = netSocketAsyncResult.result();\n\n for (int j = 0; j < 10; j++) {\n String s = \"Command\" + j;\n Buffer b = Buffer.buffer(s.getBytes());\n socket.write(b);\n }\n\n log.debug(\"Data sent.\");", "\n\n socket.handler(buffer -> {\n log.debug(\"Recived data from server with size: \" + buffer.length());\n });\n\n });\n\n }\n\n}\n\nWhat I got is once:\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command0Command1Command2Command3Command4Command5Command6Command7Command8Command9\n\nanother time is:\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command0\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command1\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command2\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command3\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command4Command5\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command6Command7\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command8\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command9\n\nWhat I expect is every time I use socket.write() server recive Buffer.", "\nExpected output should be:\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command0\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command1\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command2\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command3\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command4\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command5\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command6\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command7\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command8\n[vert.x-eventloop-thread-1] DEBUG TcpServ$MyHandler - Received data: Command9\n\nA:\n\nThis is not a bug. ", "TCP is a low-level protocol, it does not define what is a request or command like HTTP does.", "\nYou must define your own application protocol on top of TCP, which can be as simple as adding the newline \\n character between them, or having a fixed buffer size for all commands.", "\nOn the server side, you could then use the Vert.x RecordParser:\nRecordParser parser = RecordParser.newDelimited(\"\\n\", h -> {\n System.out.println(h.toString());\n});\n\nparser.handle(Buffer.buffer(\"command0\\ncomma\"));\nparser.handle(Buffer.buffer(\"nd1\\nco\"));\nparser.handle(Buffer.buffer(\"mmand2\"));\n\nWill result in:\ncommand0\ncommand1\ncommand2\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.017857142857142856, 0, 0, 0.016666666666666666, 0.010845986984815618, 0, 0.013675213675213675, 0.0034482758620689655, 0.009389671361502348, 0.01201923076923077, 0, 0.0055248618784530384, 0 ]
0.006879
5
[ "Languedoc Tours\n\nSAVOR THE FINEST WINES\n\non the sunny mediterranean coast\n\nLanguedoc is a region famed as the biggest producer of wine in France, most notably due to its sunny, Mediterranean climate which produces the perfect conditions for grape growth. ", "Languedoc-Roussillon boasts a greatly improved and thriving wine industry, making it an exciting wine-producing region. ", "About a quarter of all the wine-producing vines in France are located in Languedoc-Roussillon, but this spectacular region offers much more than just wine. ", "Join us on one of our Ophorus tours and explore the rolling hills of the region, the warm waters of the coast, or the gothic architecture of Toulouse, Languedoc´s capital, also know La Ville Rose (‘The Pink City’) due to the terra-cotta bricks used in many of its buildings. ", "Languedoc offers a spectrum of possibilities and endless adventures for every traveler. ", "Discover the splendors of this region with the help of our expert, English-speaking guides." ]
{ "pile_set_name": "Pile-CC" }
[ 0.00784313725490196, 0.008333333333333333, 0.00641025641025641, 0, 0, 0 ]
0.003764
5
[ "//===- DominanceFrontier.cpp - Dominance Frontier Calculation -------------===//\n//\n// The LLVM Compiler Infrastructure\n//\n// This file is distributed under the University of Illinois Open Source\n// License. ", "See LICENSE.TXT for details.", "\n//\n//===----------------------------------------------------------------------===//\n\n#include \"llvm/Analysis/DominanceFrontier.h\"\n#include \"llvm/Analysis/DominanceFrontierImpl.h\"\n#include \"llvm/IR/PassManager.h\"\n\nusing namespace llvm;\n\nnamespace llvm {\ntemplate class DominanceFrontierBase<BasicBlock>;\ntemplate class ForwardDominanceFrontierBase<BasicBlock>;\n}\n\nchar DominanceFrontierWrapperPass::ID = 0;\n\nINITIALIZE_PASS_BEGIN(DominanceFrontierWrapperPass, \"domfrontier\",\n \"Dominance Frontier Construction\", true, true)\nINITIALIZE_PASS_DEPENDENCY(DominatorTreeWrapperPass)\nINITIALIZE_PASS_END(DominanceFrontierWrapperPass, \"domfrontier\",\n \"Dominance Frontier Construction\", true, true)\n\n DominanceFrontierWrapperPass::DominanceFrontierWrapperPass()\n : FunctionPass(ID), DF() {\n initializeDominanceFrontierWrapperPassPass(*PassRegistry::getPassRegistry());\n}\n\nvoid DominanceFrontierWrapperPass::releaseMemory() {\n DF.releaseMemory();\n}\n\nbool DominanceFrontierWrapperPass::runOnFunction(Function &) {\n releaseMemory();\n DF.analyze(getAnalysis<DominatorTreeWrapperPass>().getDomTree());\n return false;\n}\n\nvoid DominanceFrontierWrapperPass::getAnalysisUsage(AnalysisUsage &AU) const {\n AU.setPreservesAll();\n AU.addRequired<DominatorTreeWrapperPass>();\n}\n\nvoid DominanceFrontierWrapperPass::print(raw_ostream &OS, const Module *) const {\n DF.print(OS);\n}\n\n#if !", "defined(NDEBUG) || defined(LLVM_ENABLE_DUMP)\nLLVM_DUMP_METHOD void DominanceFrontierWrapperPass::dump() const {\n print(dbgs());\n}\n#endif\n\nAnalysisKey DominanceFrontierAnalysis::Key;\n\nDominanceFrontier DominanceFrontierAnalysis::run(Function &F,\n FunctionAnalysisManager &AM) {\n DominanceFrontier DF;\n DF.analyze(AM.getResult<DominatorTreeAnalysis>(F));\n return DF;\n}\n\nDominanceFrontierPrinterPass::DominanceFrontierPrinterPass(raw_ostream &OS)\n : OS(OS) {}\n\nPreservedAnalyses\nDominanceFrontierPrinterPass::run(Function &F, FunctionAnalysisManager &AM) {\n OS << \"DominanceFrontier for function: \" << F.getName() << \"\\n\";\n AM.getResult<DominanceFrontierAnalysis>(F).print(OS);\n\n return PreservedAnalyses::all();\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.0043859649122807015, 0, 0.004282655246252677, 0.009114583333333334 ]
0.004446
5
[ "Employment is a major determinant of health and healthy ageing. ", "The working life comprises a large proportion of the total life span, including vulnerable life stages such as the reproductive period. ", "Occupation can also invoke a broad range of exposures often higher than that encountered in the general environment. ", "Assessment of occupational exposure is thus a crucial aspect of assessing total exposure over the life course. ", "To support such ambitious goals, concerted effort is needed to catalogue occupational exposure information. ", "OMEGA-NET (the Network on the Coordination and Harmonisation of European Occupational Cohorts, <http://omeganetcohorts.eu/>) is a 4-year EU COST Action that started in 2017 intending to do just this.", "\n\nSpecifically, OMEGA-NET aims to enable optimization of the use of occupational, industrial, and general population cohorts across Europe to advance aetiological research and support public health. ", "One obvious way to strengthen and elaborate ongoing research is to seek and leverage collaboration of cohorts with extensive occupational histories. ", "The coordination and harmonization of occupational exposure assessment efforts, to facilitate an integrated research strategy for occupational health in Europe and beyond, is also of utmost importance ([@CIT0010]).", "\n\nDespite the numerous large cohort studies conducted world-wide, data on occupational risks as a whole are not being used to their full potential. ", "We provisionally estimated approximately 30 million individuals in Europe are represented in existing cohort studies with extensive occupational and employment information ([@CIT0010]). ", "Pooling such cohorts would offer optimal exploitation of these resources, and unique opportunities for advancing aetiological research. ", "Making the best use of a wide range of cohorts, however, requires high-quality large-scale systematic and harmonized exposure assessment.", "\n\nExposure assessment is a cornerstone in occupational epidemiology---one of the key methodological considerations---and not without its challenges. ", "The goal in any study is to derive an accurate, precise, and biologically relevant exposure estimate for each worker under study ([@CIT0007]). ", "Without high-quality exposure assessment, the power of a study to detect an association between exposure and health outcome is diminished, which may bias results and lead to spurious interpretations. ", "Study to study differences in exposure assessment quality are more apparent when drawing the evidence together. ", "As has been shown in examples on benzene ([@CIT0011]), asbestos ([@CIT0006]), and trichloroethylene ([@CIT0009]), heterogeneity in findings across epidemiological studies are at least partly explained by variations in the quality of exposure assessment.", "\n\nIn addition to high-quality exposure assessment, it is essential to make the method objective, consistent, and transparent. ", "These aspects are particularly important when pooling data to enable comparison of findings from different populations. ", "Pooling of data is becoming increasingly important in detection of rare exposures, exposures with lower potency, and interactions with vulnerability including genetics.", "\n\nThe typical step before pooling of cohort data is harmonization. ", "Harmonization of occupational histories is not straightforward though. ", "Many different systems for coding of job titles are being used world-wide: there are national classification systems \\[such as the French PCS (*professions et catégories socioprofessionnelles*) or the Dutch SBC (*standaard beroepenclassificatie*)\\], and there is the International Standard Classification of Occupations (ISCO). ", "These systems also have several version updates, which may be very different from each other. ", "The same is true for industrial coding. ", "In general, conversion between these different systems is not trivial. ", "Ongoing efforts for developing cross-walks or automatic coding systems that allow free text to be transferred into standardized codes may provide solutions to harmonizing occupational and industrial coding. ", "To have an easy entry point into finding these tools is one of the goals of OMEGA-NET.", "\n\nThis information on job title and industry collected in occupational histories within cohorts in fact forms the foundation for exposure assessment. ", "Using existing cohorts, basic analyses of harmonized job titles alone may already be informative when large numbers are available, potentially revealing patterns between occupations and health outcomes. ", "An example is the use of the RNV3P database in France, identifying emerging disease--exposure associations through a network approach ([@CIT0002]). ", "The efforts within OMEGA-NET to draw together information about existing cohorts and exposure assessment tools ultimately aim to facilitate similar initiatives.", "\n\nJob titles can also be translated into specific exposures via a job-exposure matrix (JEM). ", "A JEM consists of a job axis and an exposure axis, sometimes expanded with time and/or regional dimensions. ", "JEMs provide exposure assessment in a systematic and unbiased way, representing a highly efficient and reproducible methodology ([@CIT0005]). ", "If observed patterns of associations between jobs and health outcomes cannot be explained by exposures covered in available JEMs, it is likely that unknown or non-suspected exposures are responsible, laying the groundwork for new hypotheses.", "\n\nNumerous national and transnational JEMs have been developed. ", "Examples in Europe are the Finnish FIN-JEM ([@CIT0004]), the French Constances-JEM ([@CIT0001]), the Scandinavian NOCCA-JEM ([@CIT0003]), and the international SYN-JEM ([@CIT0008]), to name a few. ", "Transferability is of course a challenge, with JEMs based on different occupational coding systems, and a wide variation in the exposure definitions and exposure indices (e.g. intensity, probability, and peaks of exposure). ", "OMEGA-NET strives to compile a listing of available JEMs; pairing these with the cross-walks mentioned above can facilitate linkage to a broader range of cohorts.", "\n\nSince many methods and tools are used for occupational exposure assessment, and method uncertainties are largely unknown, systematic comparisons of epidemiological results are complicated. ", "Another consequence is that many cohort data remain unexploited with regard to work-related exposures and diseases. ", "It is our hope that sharing information on occupational exposure assessment methods and tools may accelerate research.", "\n\nWith this specific intention in mind, the OMEGA-NET consortium is compiling online inventories of existing cohort studies (Kogevinas *et al.*, ", "submitted) and occupational exposure information. ", "Recently, we have launched an online tool for these two inventories: <http://omeganetcohorts.eu/resources/inventory/>. ", "The inventory for occupational exposure information specifically aims to collect metadata on all JEMs, exposure databases, occupational coding systems and the associated cross-walks available across Europe. ", "This inventory will be the basis for a searchable web-based database, which will become publicly available.", "\n\nTo make such a comprehensive inventory possible, the OMEGA-NET consortium seeks the participation from all researchers involved in these types of studies or data collection. ", "Via the searchable web-based database, researchers around the globe will have a quick and clear overview of all available information that they could use for assessing occupational exposures in their cohorts.", "\n\nOur overall aim is to facilitate a concerted effort on harmonization of occupational exposure data to allow pooling and replication of findings, towards accelerating aetiological research.", "\n\nThe authors are grateful to the OMEGA-NET Working Group 2.1 members: Balázs Ádám, Gemma Castaño, Alex Burdorf, Deborah Glass, Marco Gnesi, Lode Godderis, Marcel Goldberg, Irina Guseva Canu, Sibel Kiran, Damien McElvenny, Nurka Pranjic, Vivi Schlünssen, and Henk van der Molen. ", "All authors contributed substantially to the work and approved the final version of the manuscript. ", "They also agree to take responsibility for the work.", "\n\nFunding {#s0101}\n=======\n\nOMEGA-NET is supported by COST (European Cooperation in Science and Technology), project CA16216: Network on the Coordination and Harmonisation of European Occupational Cohorts. ", "MCT is funded by a Ramón y Cajal fellowship (RYC-2017-01892) from the Spanish Ministry of Science, Innovation and Universities and cofunded by the European Social Fund. ", "ISGlobal is a member of the CERCA Programme, Generalitat de Catalunya.", "\n\nConflict of interest {#s0102}\n====================\n\nNone declared.", "\n" ]
{ "pile_set_name": "PubMed Central" }
[ 0, 0, 0, 0, 0, 0.020100502512562814, 0.005025125628140704, 0, 0.004672897196261682, 0, 0.005376344086021506, 0, 0, 0, 0.006993006993006993, 0, 0, 0.011857707509881422, 0, 0, 0, 0, 0, 0.009146341463414634, 0, 0, 0, 0, 0.011627906976744186, 0, 0, 0.006756756756756757, 0.00625, 0, 0.009259259259259259, 0.007042253521126761, 0, 0, 0.02030456852791878, 0, 0.006172839506172839, 0, 0, 0, 0.006896551724137931, 0, 0.008403361344537815, 0.004830917874396135, 0, 0.005681818181818182, 0, 0, 0.053763440860215055, 0, 0, 0.014563106796116505, 0.01775147928994083, 0.04285714285714286, 0, 0 ]
0.004756
5
[ "Pages\n\nMonday, July 27, 2015\n\nThree weeks ago I was at the annual Beetle Bash at a friend's house at Cochise Stronghold, Arizona. ", "Many entomologists from Arizona and beyond were attending. ", "Late that evening we set up light traps in the Stronghold itself and I happened to collect a beetle that the experts first claimed to be a Tenebrionid - and someone wrote down the unfamiliar species name for me. ", "But when I put it under the scope, it clearly was a Carabid with very thin antennae, big mandibles and eyes. ", "It's in the genus Pseudomorpha (Western False-form Beetle) and because of its shape, we sometime call it a 'roach carabid'. ", "It's not very common, but I had found it a couple of times before.", "\n\nPseudomorpha (Western False-form Beetle)\n\nAbout a week later when preparing to do laundry, I found a slip of paper in my pocket with the scientific name Doliodesmus charlesi. ", "I searched my photos and specimens but couldn't find anything it could refer to. ", "I began to feel really bad about this laps of memory. ", "To make it worse, the species did not exist on BugGuide.com. ", "But I finally found a very bad UAIC image on the SCAN database for ground living insects of the SW mountain ranges. ", "D. charlesi looked quite similar to my roach scarab - and yes, someone had id that one as a teneb at first. ", "Mystery solved. ", "Too bad, the teneb seems even rarer than the carabid.", "\n\nA few days ago I ran light traps in our drive way here in Picture Rocks, Arizona. ", "A narrow, shiny black beetle with relatively thin antennae was running quickly up the slump block wall at the light. ", "It seemed to be a carabid that I had not seen before, so I took care to photograph and collect it. ", "This time, though, a close-up photo clearly showed the antennae and tarsi of a teneb.", "\n\nDoliodesmus charlesi\n\nI posted it on BugGuide where my friend Vassili commented 'not having a bloody clue feels so nice!", "\n\nantennae so thin, prothorax so transverse, dorsum so shiny.. - i e-mailed Warren Steiner right away.' ", "I hadn't been cheered on like that for a while. ", "But Vassili's description rang a bell - it sounded just like a description of that 'roach carabid' again, except this time I was sure that it was really a teneb. ", "I went in search of that piece of paper, and, not having cleaned my desk in a while, actually found it! ", "Could this be the real Doliodesmus charlesi now? ", "Checking the SCAN web site again, sure, this beetle does look like the distorted old UAIC specimen. ", "So, if it all turns out to be correct,there are no more missing genera in the Diaperinae on BugGuide. ", "Very satisfying.", "\n\nSaturday, July 18, 2015\n\nOn Facebook, a question came up: what kind of vegetation to plant to make lizards at home in your yard: First answer: plant and design as natural as possible using native, heat and drought tolerant plants.", "\n\nBut: Lizards are really not too particular when it comes to vegetation - on the U of A Campus the whiptails hang out around those temporary monocultures of decorative plants that have little ecological value - but they do attract some bugs.", "\n\nTohono Chull Park and even our patio are home to more Desert Spinys than the surrounding pristine desert - even a little irrigation and a few blooming plants offer access to more bugs than the dry sandy areas with nothing but creosote. ", "Desert Spinys also don't scoff at an occasional bite of a juicy tomato or cactus fruit.", "\n\nThe local population of Zebra Tails is obviously happier where there is more loose sand to dig into - away from walking, ground-compacting feet.", "\n\nThe numbers of Side Blotched Lizards go up and down considerably over the years, and it is not easy to see what triggers peaks and valleys. ", "They happily live around groups of creosote bushes where squirrel holes offer them safety when our local Kestrel is hunting.", "\n\nBuildings seem to be a great replacement for trees when it comes to the needs of Ornate Tree Lizards. ", "During the years of drought, they certainly fared better close to the house than on the Ironwood Trees where they used to live.", "\n\nRegal Honed Lizards depend on ants, but not even all ants are created equal - on our land the 'Horned Toads' seem to always pop up where Pogonomyrmex rugosa colonies strive. ", "Veromessor pergandei does not seem to have the same attraction.", "\n\nHere on the very west side of Tucson, we have Desert Iguanas. ", "They are big, elegant and very heat tolerant, and vegetarians (partly?). ", "I have seen them climb creosote bushes and even cacti to gnash on flower petals. - ", "They will not appear in masses and eat all your roses, rather they are quite rare and should be enjoyed.", "\n\nIf your area has Chuck-wallas (south Mountain in Phoenix, Waterman Mts) - they also eat plant material. ", "Again, a rarity.", "\n\nGila Monsters probably live in more areas than we know, but they are so rarely active, they seem to go out for a very short time every year. ", "But they can finish a whole nest of rodent youngsters or quail eggs in one meal. ", "The two last photos are not my own, and I cannot find out where it came from. ", "I apologize!", "\n\nSome relatives of lizards avoid day light. ", "Mediterranean House Geckos live only around buildings where the were introduced. ", "I am surprised that we have them here on the westside of the Tucson Mountains, but they do hang out around our porch lights where bugs congregate at night.", "\n\nOur Western Banded Gecko is also night active, but stay on the ground while hunting. ", "During the day they hide out in moist, cool spots, often under flower pots, so don't squish the delicate little guy when you move those around.", "In summary, what lizards you can 'attract' depends on the habitat and elevation your yard is in - whether you get Earless Lizards or Zebra Tails, Desert Spiny or Clark's Spiny, Regal or Shorthorned Horned Lizards. ", "Like to all ectoterm animals (regulating their body temperature through behavior rather that sweating or shivering), to lizards, hiding and basking spots are both important, as is the structure of the soil (not too much mulching!). ", "Most lizards need to eat insects, so if you plan to spray against any arthropods, even with insect specific toxins, do not expect a healthy reptilian fauna. ", "If your cats and dogs have the run of the yard, they will disturb and diminish the reptile population. ", "The very popular decorative crushed rock that covers sterile black plastic foil offers no habitat for anything. ", "And finally, much of the plastic fencing used to protect plants from herbivores like rats can be a deathtrap for lizards and snakes, who can push through it in one direction, but not withdraw because their scales trap them in those nooses.", "\n\nWednesday, July 8, 2015\n\nThe Santa Rita Mountains already received a nice amount of monsoon precipitation. ", "Mark Heitlinger, the manager of the research station in Florida Canyon sent me this encouraging graph.", "\n\ntemperatures and precipitation during June at the SRER in Florida Canyon\n\nWhen I crossed Madera Creek at Proctor Road I found only a little trickle of very murky water and no roadside flowers yet. ", "The Mesquite Trees were blooming again and the tall candles of blooming Sotol stood out from the brush. ", "From earlier years, I remember trips with Eric Eaton when it was difficult to make him move on from the overabundance of Hymenoptera and Diptera that usually buzz around these nectar sources. ", "But yesterday, there wasn't much diversity.", "\n\nThe sound of summer and heat - Cicada song\n\nThe insects that I did find where all old acquaintances that I had photographed before. ", "So - since I did not need any more documentary shots - this time I went for close-ups, portraits and details.", "\n\nMozena sp., ", "Leaf-footed Bug on Mesquite\n\nAll photography is done with my point-and-shoot Olympus SP-800UZ, an ideally light camera for hikes in hot, muggy weather and under threatening storm clouds. ", "The SLR stayed safely tucked away in the car.", "\n\nA Flower Scarab, Euphoria leucographa\n\nThere was some activity on the few Desert Broom bushes that have not fallen victim to the strange maniac who goes around year after year and brakes off the most mature and attractive bushes. ", "Why would anybody do this?", "\n\nChlorion sp. ", "and Cotinis sp.", "\n\nThe sweet sap oozing from the bark of some Desert Broom bushes attracts the strangest table fellows and often causes short displays of aggression and dominance. ", "This Chlorion had just chased off a big, clumsy Tarantula Hawk, then shared peacefully with the scarab, only to finally get chased off herself by a horde of marauding ants.", "\n\nAcanthocephala thomasi, Giant Agave Bug\n\nGiant Agave Bugs seem to be able to pierce the intact bark to reach the sugar water flow in the phloem of the bush. ", "Often, they actually seem to start the sap flow for everyone else. ", "All extremities of the huge dark bug end in bright orange segments that seem ideal for signaling and posturing.", "\n\nPolistes dorsalis and E. leucographa\n\nNot all wasps are just snacking on sweets. ", "A Polistes comanche is masticating Marine Blue caterpillar into a package that's easy to carry to a colony full of hungry larvae nearby.", "\n\nFor years this area close to the ticket booth for Madera Canyon used to be dominated by several colonies of Polistes major, but it seems that they have been replaced by Polistes comanchus this year.", "\n\nFinding this Leptinotarsa haldemani chomping on the leaves of a bush instead of the usual herbaceous Nightshades surprised me until I realized that it is Lycium pallidum – Wolf Berry, or Pale Desert-thorn - in the family Solanaceae. ", "Still to me it's a new host for this beetle.", "\n\nBrightly aposematic Leaf Beetles, Lema trabeata, are using a Datura Plant to provide for their offspring. ", "A reliable source of juicy leaves and protective alkaloids if the monsoon holds its promise.", "\n\nZygogramma piceicollis pairs are hiding in Asteraceae that are shooting up now and will soon produce yellow flowers and later those annoying black, elongate seeds that seem to be waiting for entomologists swinging insect nets as their chosen form of distribution. ", "I hope the beetles and their larvae are very hungry!", "\n\nWhite Tail Deer grazing under Silver Leaf Oaks\n\nAfter several couple of hours in the low grassland at over 90 degrees Fahrenheit and, as it feels, over 90 percent humidity (it actually rained a couple of times), 80 Degrees at the upper Mt Baldy trail head are refreshing and cool. ", "Ceanothus greggii is still blooming, but many of the plants have been destroyed by mud slides last year.", "\n\nA hunter is hanging out among the small flowers: a small ambush bug in the genus Phymata. ", "Waiting motionless for prey to walk into the reach of it's short, strong raptorial arms, it is ready to take on prey several times its size. ", "Brachial power is not its only weapon: its bite will quickly paralyze its prey.", "\n\nThe usual mass orgy of Rose Chafers is still ongoing and beetles are flying around their wings catching the afternoon sun and their long legs trailing.", "\n\nSoon several species of red Net-winged Beetles (genus Lycus) will join them and buzz around the oaks in great numbers, but this time I only see a couple of individuals.", "\n\nWeevils in the genus Pandeleteius nibble on the tips of oak leaves. ", "They look like spiders from afar, but close up they always remind me of Popeye after a good meal of spinach.", "\n\nWeevils in the genus Curculio are extremely difficult to identify to the species, but I feel some justification in calling this one an Acorn Curculio. ", "I usually see them at the black lighting sheet and never realized how well their subtle pattern matches that of a young acorn.", "\n\nA persistent irritation under my shirt drove me into the privacy of the trail head restroom. ", "The culprit: a rather large tick that obviously had not found a spot that it liked. ", "Luckily. ", "We don't seem to be in an area with a lot of Lyme disease here, but a tick bite is never pleasant. ", "Trying to identify the tick, I end up with the eastern genus Amblyomma. ", "Now I wished I had collected the specimen as a voucher because that would be a considerable range extension for that genus.", "\n\nThursday, July 2, 2015\n\nHere in Arizona we are anxiously waiting for the beginning of the\nmonsoon. ", "We already have high humidity, dust storms, dramatic clouds and\nblack skies at times. ", "But no real measurable rain yet, at least not on\nthe west side of the Tucson Mountains. ", "Of course, the wildlife around us\nis waiting more eagerly than we humans with our access to CAP water and\nground water delivered from every faucet. ", "Amphibians like toads, frogs,\nand spadefoots are hidden under ground during the dry season and emerge\nwhen water might be available. ", "They need to keep their bodies moist\nbecause their skin is quite permeable - they breath through it and can\nabsorb, but also loose, water. ", "Even more than the adults the eggs and\nlarvae of amphibians (tadpoles) depend on water. ", "Some of our desert\nspecies are masters in utilizing very temporary puddles that only lat\nfor a few days for their offspring. ", "Those species, like red-spotted\ntoads and spadefoots have produced quite a lot of offspring last year.", "\nBut the big Colorado River Toads, or better now Sonoran Desert Toads\n(after their western most populations are disappearing) need more than\njust a puddle, they need at least a small pond to mate, lay their\nstrings of eggs and for their tadpoles to reach maturity. ", "Nevertheless,\nwe have at least half a dozen of those prehistoric looking giants\nbetween our and our neighbors property. ", "The probably have not bred in\ndecades. ", "But the individuals survive and eat bugs nightly under all our\nporch lights and my black light.", "\nThese toads have a terrible reputation with\ndog owners and concerned parents because they produce potent psychedelic and toxic secretions from glands in their skin.", "\nWikipedia: 'Just behind the large golden eye with horizontal pupil is a bulging kidney-shaped parotoid gland. ", "Below this is a large circular pale green area which is the tympanum\nor ear drum. ", "By the corner of the mouth there is a white wart and there\nare white glands on the legs. ", "All these glands produce toxic\nsecretions. ", "Dogs that have attacked toads have been paralyzed or even killed.'", "\nThe cocktail of chemicals produced by these glands contains among other toxins 5-MeO-DMT (5-methoxy-N,N-dimethyltryptamine) is a powerful psychedelictryptamine. ", "This had brought them to the attention of seekers of highs among humans - and dogs.", "\n\nMy\nbest dog ever, Cody, discovered the toads when he was young. ", "The first\nencounter was scary - his heart raced out of control and his breathing\nbecame labored. (", "no foaming from the mouth). ", "But after that first time\nwhich ended at the vet's office (Cody was already fine again when we\ngot there), he seemed to like the effect and know how to dose it. ", "So\nonce a year early in the toad season, he would show up with his hair\nstanding on end, very happily swaggering and humping everything in his\nreach (something he did not usually do). ", "A dead toad would be somewhere\nin his wake. ", "He eventually outgrew this behavior and paid no attention\nat all to the surviving toads that were always drawn to bird baths and\ndog tub. ", "Our 5 other dogs always completely ignored the toads. ", "So the\ndanger from the toads to smaller dogs or unlucky individuals is\ncertainly real, but nobody should overreact and try to eradicate the\ntoads. ", "Remember, they were here fist, they are surviving in a very\ndifficult environment, they may be the only ones that actually eat the\nbig Palo Verde Root Borers. ", "Different from rattlesnakes, Sonoran Desert\nToads will never make any aggressive advances towards the dogs. ", "They\nonly want to be left alone. ... ", "The skin secretion is also an irritant to mucous membranes, and most dogs will realize that and back off after the first contact. ", "Any reasonably smart dog can learn to\nstay away from the toads with some training and supervision. ", "You can never be sure that you eradicated every single toad from your yard. ", "But you should be able to control your pets.", "\nThe smaller species like Woodhouse's Toad,\nGreat Plains Toad, and Red-spotted Toad are not, or only mildly toxic and\npose no threat. ", "Still, I see a lot of hysteria in public forums that\ntargets even those harmless guys.", "\n\nMy Watercolor Blog:\n\nPlease also visit Margarethe Brummermann Watercolors, my new blog that show-cases my art, from watercolors to insect photography collages. ", "In that blog, I will introduce new pieces, announce upcoming shows and other events, and provide links to archived images and my contact information.", "\n\nIf you like my adventures, you may want to support my traveling habit\n\nSearch This Blog\n\nAbout Me\n\nI am a biologist, watercolor painter, and photographer originally from Dortmund, Germany.", "\nIn 1995 I founded my business, Brummermann's Art and Sciences in Tucson, Arizona. ", "Through this venue I am selling my original watercolors and insect collages, offer services like high quality art printing (giclee) art classes. ", "I offer naturalists' presentations on many topics, I prepare and design and graphics for scientific publications. ", "You can license my photographs. ", "I collect Arizona insect specimens upon requests for scientists and researchers.", "\nI offer guided, very personalized tours to exciting natural areas in Arizona.", "\nI am producing a photographic field guide to Arizona beetles with co author Arthur Evans. ", "For this purpose I have collected, identified and photographed (life) over 1800 Arizona Beetle species.", "\nI am still searching for additional under-writers to help finance this project and will start a crowd funding campaign soon." ]
{ "pile_set_name": "Pile-CC" }
[ 0.015384615384615385, 0, 0, 0, 0, 0, 0.005649717514124294, 0, 0, 0.01639344262295082, 0.008620689655172414, 0.009259259259259259, 0, 0, 0, 0, 0, 0, 0.00819672131147541, 0.009615384615384616, 0, 0.006172839506172839, 0, 0.02040816326530612, 0, 0.00980392156862745, 0, 0.004310344827586207, 0, 0.004201680672268907, 0.011494252873563218, 0.00684931506849315, 0, 0.016129032258064516, 0.009615384615384616, 0, 0.005681818181818182, 0, 0.015625, 0, 0, 0, 0.018867924528301886, 0, 0, 0, 0, 0, 0, 0.012345679012345678, 0.0064516129032258064, 0.011494252873563218, 0, 0.014018691588785047, 0, 0, 0, 0, 0, 0, 0.00980392156862745, 0.010050251256281407, 0.009615384615384616, 0.010416666666666666, 0, 0, 0, 0, 0, 0.022222222222222223, 0.004310344827586207, 0, 0, 0, 0.006134969325153374, 0.005813953488372093, 0.006289308176100629, 0, 0, 0, 0.007352941176470588, 0, 0.02127659574468085, 0, 0.018518518518518517, 0, 0.0037593984962406013, 0, 0.007067137809187279, 0, 0, 0, 0, 0.006535947712418301, 0.011764705882352941, 0, 0, 0.006535947712418301, 0, 0, 0, 0, 0, 0, 0, 0, 0.011627906976744186, 0, 0.006756756756756757, 0, 0, 0, 0, 0, 0.0037735849056603774, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.015151515151515152, 0, 0, 0.006211180124223602, 0, 0, 0, 0, 0, 0.006289308176100629, 0.009259259259259259, 0, 0, 0, 0, 0, 0.014925373134328358, 0, 0.006172839506172839, 0, 0, 0, 0, 0, 0, 0, 0, 0.01098901098901099, 0, 0 ]
0.003239
5
[ "Teaching residents the two-challenge rule: a simulation-based approach to improve education and patient safety.", "\nResidents train in a historically hierarchical system. ", "They may be compelled to question their teachers if they do not understand or disagree with a clinical decision, have a patient safety concern, or when treatment plans are unclear. ", "We sought to determine whether a debriefing intervention that emphasizes (1) joint responsibility for safety and (2) the \"two-challenge rule\" (a rubric for challenging others) using a conversational technique that is assertive and collaborative (advocacy-inquiry) can improve the frequency and effectiveness with which residents \"speak up\" to superiors. ", "In a simulated operating room, anesthesiology trainees were presented with opportunities to challenge coworkers (eg, orders to administer a relatively contraindicated medication). ", "Opportunities to challenge the attending faculty anesthesiologist, attending faculty surgeon, and nurse (all confederates) were presented. ", "When debriefed, subjects were taught the two-challenge rule and a communication technique that paired advocacy (stating trainee's observation) and inquiry (request for the other's reasoning). ", "A second scenario offered new opportunities to challenge. ", "Video recorded scenarios were evaluated by two investigators and trainee use of the prescribed advocacy-inquiry language was rated on a 5-point scale. ", "Forty subjects participated. ", "Overall use of the two-challenge rule and advocacy-inquiry increased after debriefing. ", "The debriefing and instruction specifically improved the frequency and quality of challenges directed toward superordinate physicians, without improving resident challenges toward nurses. ", "This instructional intervention improves \"speaking up\" by residents to other physicians during simulated obstetric cases. ", "Providing increased opportunities for resident learning, sharing responsibility for patient safety, and overcoming communication barriers within the medical hierarchy may improve teamwork and patient safety." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Q:\n\nHow to change parameters in retry request after error in RxJava\n\nI send a login request to server with retrofit 2.0, and server return to the client session token, wich I must use in other requests, but this token has limited life-time, and when it is expire server returns HTTP error 401.", "\nI try make re-logon, after getting this error, with help a next code:\n holder.getApi(GuideProfileApi.class)\n .getProfile(String.valueOf(holder.getServerId()), holder.getServerToken())\n .subscribeOn(Schedulers.io())\n .retryWhen(new Function<Observable<Throwable>, ObservableSource<?", ">>() {\n @Override\n public ObservableSource<?", "> apply(Observable<Throwable> throwableObservable) throws Exception {\n return throwableObservable.flatMap(new Function<Throwable, ObservableSource<?", ">>() {\n @Override\n public ObservableSource<?", "> apply(Throwable throwable) throws Exception {\n if (throwable instanceof HttpException && ((HttpException)throwable).code() == 401) {\n RegistryLoginResult loginResult = holder.login().blockingSingle();\n return holder.getApi(GuideProfileApi.class)\n .getProfile(String.valueOf(loginResult.getUserId()), loginResult.getSessionToken());\n }\n return Observable.error(throwable);\n }\n });\n }\n })\n .observeOn(AndroidSchedulers.mainThread())\n .subscribe(new Consumer<ProfileResult>() {\n @Override\n public void accept(ProfileResult profileResult) throws Exception {\n Log.d(\"Result\", profileResult.toString());\n }\n }, new Consumer<Throwable>() {\n @Override\n public void accept(Throwable throwable) throws Exception {\n Log.e(\"Result\", throwable.getLocalizedMessage());\n }\n});\n\nAnd retry request is sent, but parameters of request are same as in incorrect request (before re-login). ", "How I can change parameters of the request before sending it again?", "\n\nA:\n\nYou can use retryWhen, but the problem is that your retryWhen retry the same observable object that you create in lazy moment. ", "\nYour solution here is use the operator defer to get the host(), since defer it´s not creating the observable when you define it but when it´s consumed by the subscribed.", "\nObservable.defer(()-> holder.getApi(GuideProfileApi.class)\n .getProfile(String.valueOf(holder.getServerId()),holder.getServerToken()))\n .subscribeOn(Schedulers.io())\n .retryWhen(new Function<Observable<Throwable>, ObservableSource<?", ">>() {\n @Override\n public ObservableSource<?", "> apply(Observable<Throwable> throwableObservable) throws Exception {\n return throwableObservable.flatMap(new Function<Throwable, ObservableSource<?", ">>() {\n @Override\n public ObservableSource<?", "> apply(Throwable throwable) throws Exception {\n if (throwable instanceof HttpException && ((HttpException)throwable).code() == 401) {\n RegistryLoginResult loginResult = holder.login().blockingSingle();\n return holder.getApi(GuideProfileApi.class)\n .getProfile(String.valueOf(loginResult.getUserId()), loginResult.getSessionToken());\n }\n return Observable.error(throwable);\n }\n });\n }\n })\n .observeOn(AndroidSchedulers.mainThread())\n .subscribe(new Consumer<ProfileResult>() {\n @Override\n public void accept(ProfileResult profileResult) throws Exception {\n Log.d(\"Result\", profileResult.toString());\n }\n }, new Consumer<Throwable>() {\n @Override\n public void accept(Throwable throwable) throws Exception {\n Log.e(\"Result\", throwable.getLocalizedMessage());\n }\n });\n\nYou can see some examples of retry here https://github.com/politrons/reactive/blob/master/src/test/java/rx/observables/errors/ObservableExceptions.java\n\nA:\n\nYou're using the wrong operator. ", "retryWhen will retry your original observable if it encounters an error. ", "What you need is onErrorResumeNext. ", "Something like\n holder.getApi(GuideProfileApi.class)\n .getProfile(String.valueOf(holder.getServerId()), holder.getServerToken())\n .subscribeOn(Schedulers.io())\n .onErrorResumeNext(new Function<Throwable, ObservableSource<?", ">>() {\n @Override\n public ObservableSource<?", "> apply(Throwable throwable) {\n if (throwable instanceof HttpException && ((HttpException)throwable).code() == 401) {\n RegistryLoginResult loginResult = holder.login().blockingSingle();\n return holder.getApi(GuideProfileApi.class)\n .getProfile(String.valueOf(loginResult.getUserId()), loginResult.getSessionToken());\n }\n return Observable.error(throwable);\n }\n }) \n .observeOn(AndroidSchedulers.mainThread())\n .subscribe(new Consumer<ProfileResult>() {\n @Override\n public void accept(ProfileResult profileResult) throws Exception {\n Log.d(\"Result\", profileResult.toString());\n }\n }, new Consumer<Throwable>() {\n @Override\n public void accept(Throwable throwable) throws Exception {\n Log.e(\"Result\", throwable.getLocalizedMessage());\n }\n});\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.0034129692832764505, 0.01, 0.03333333333333333, 0.012658227848101266, 0.029411764705882353, 0.007797270955165692, 0, 0, 0, 0.004098360655737705, 0.038461538461538464, 0.012987012987012988, 0.03333333333333333, 0.00818926296633303, 0, 0, 0.012658227848101266, 0.03389830508474576, 0.00904977375565611 ]
0.01312
5
[ "Q:\n\nRemove downloads metabox in Woocommerce order edit pages\n\nI am trying to remove the 'woocommerce-order-downloads' div in the admin menu from the 'shop_order' context. ", "I got a great answer to identify the context and was able to remove the 'postcustom' div with the following code. ", "Note that I'm trying to the exact same thing by including a line to remove 'woocommerce-order-downloads' as well. ", "That piece is not working. ", "I've tried 'order-downloads', 'downloads', etc. ", "I also went to Settings --> Account --> Blanked our 'downloads' route. ", "This seems odd but I'm relatively new. ", "Any ideas how to remove this pesky div? ", "I'm also trying to remove the order_label div as well... As you can see :)\nfunction remove_custom_field_meta_box()\n{\n remove_meta_box('postcustom', 'shop_order', 'normal', 90);\n remove_meta_box('woocommerce-order-downloads', 'shop_order', 'normal', 90);\n //remove_meta_box('woocommerce-order-label', 'shop_order', 'normal');\n}\n\n//Remove postcustom/downloads/shippinglabel meta boxes\nadd_action('admin_menu', 'remove_custom_field_meta_box');\n\nA:\n\nTry this instead:\nadd_action( 'add_meta_boxes', 'remove_shop_order_meta_boxe', 90 );\nfunction remove_shop_order_meta_boxe() {\n remove_meta_box('postcustom', 'shop_order', 'normal');\n remove_meta_box('woocommerce-order-downloads', 'shop_order', 'normal');\n}\n\nCode goes in function.php file of your active child theme (or active theme). ", "Tested and works.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "{\n \"extends\": \"../../tslint.json\",\n \"rules\": {\n \"directive-selector\": [true, \"attribute\", \"ngx\", \"camelCase\"],\n \"component-selector\": [true, \"element\", \"ngx\", \"kebab-case\"]\n },\n \"linterOptions\": {\n \"exclude\": [\"!**/*\"]", "\n }\n}\n" ]
{ "pile_set_name": "Github" }
[ 0, 0 ]
0
5
[ "Q:\n\nIncluding a post title in a twitter link\n\nIm trying to make a Twitter button on each article of my blog. ", "This is the code I use on single.php\n<a href=\"http://twitter.com/home?status=<?php echo urlencode(get_the_title()); ?", ">\">\nTweet this!", "\n</a>\n\nThe problem is that I have a blog post with this title:\n\nGive format to “bodytext”\n\nand when I tweet it, the quotes appear as\n\nGive format to &#8220;bodytext&#8221;\n\nWhat should I do?", "\n\nA:\n\nThe problem is that get_the_title() will pass the title through a filter that texturizes the quotes. ", " So a regular \" becomes a curly quote (“) and urlencode() will break it.", "\nSo instead, write your own title function and use that:\nfunction my_get_the_title() {\n global $post;\n\n return $post->post_title;\n}\n\nThis should bypass any unwanted filters and let you work with regular quotes.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0.008547008547008548, 0, 0, 0, 0, 0, 0 ]
0.001068
5
[ "Ethnobotanical study of medicinal plants traditionally used in the Arribes del Duero, western Spain.", "\nWe studied traditional knowledge (TK) and current uses of medicinal plants among the inhabitants of the Arribes del Duero-ARD-(Spain), documenting traditional medical practices. ", "We interviewed 80 key informants (44 men and 36 women). ", "Their average age was 72 years (range 48-98 years). ", "We calculated the cultural importance for each species cited. ", "To analyze how TK varies with the characteristics of the different informants, we performed an ANCOVA, taking the number of use-reports (URs) provided by each informant as a variable to model, and age and gender as explanatory variables. ", "156 medicinal remedies were recorded; they were based on a single species and were cited by at least three independent informants, and half of them are still in use today. ", "These remedies are related to nine major organ systems and 54 therapeutic uses, and 70 species (belonging to 39 families) are used, most of which are herbs (64%). ", "The most relevant family is the Lamiaceae (23 remedies, 8 species) and the species employed in the greatest number of remedies (8) is Urtica dioica L. However, the taxon with the greatest cultural value is Hypericum perforatum L. (CI=0.71). ", "31% of the variability of the TK can be explained in terms of the age and gender of the informants (R(2)=0.315), the age factor having a positive effect. ", "Most of the remedies are related to the treatment of unimportant ailments, referring to disorders of the skin, and the respiratory and digestive systems. ", "The leaves and fruits are the most frequently sought plant parts (40 and 17% of the plants mentioned, respectively), and infusions (34%) and decoctions (28%) are the main methods used for preparing the remedies. ", "Likewise, we recorded remedies based on plant mixtures and ethnomedicinal novelties or rare uses, and comment on the influence exerted by superstition. ", "Currently, many people preserve a rich TK about medicinal plants, and it may be affirmed that the folk medicine is still very much alive in the ARD, above all as regards the treatment of certain common afflictions or unimportant ailments." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0.012448132780082987, 0, 0, 0, 0, 0.004201680672268907 ]
0.001189
5
[ "Filename\n\nType\n\nUploader\n\nDate\n\nSize\n\nDownloads\n\nEmbed Button\n\nMirrors\n\nA mod for SS3:BFE. ", "Weapons and enemies changed in a way to turn SS3:BFE into pure madness. ", "With new campaign \"Prehistory of the Serious Sam\"!", "\n\nCRAZY Serious Sam 3: BFE Mod.", "\nThis mod features modified weapons and enemies. ", "Now with new skins! ", "If you felt lack of action in SS3 - you definitely should check it out.", "\nInstallation: unpack this RAR archive in your\n*\\steamapps\\common\\serious sam 3\\Content\\Serious Sam 3\\ folder.", "\nThis mod (as well as any other) works only in the Moddable version of the game" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0.03225806451612903, 0, 0, 0, 0, 0 ]
0.003584
5
[ "Mussel-mimetic tissue adhesive for fetal membrane repair: a standardized ex vivo evaluation using elastomeric membranes.", "\nIatrogenic preterm premature rupture of membranes (iPPROM), the main complication of invasive interventions in the prenatal period, seriously limits the benefit of diagnostic or surgical prenatal procedures. ", "This study aimed to evaluate preventive plugging of punctured fetal membranes in an ex vivo situation using a new mussel-mimetic tissue adhesive (mussel glue) to inhibit leakage. ", "A novel biomechanical test device that tests the closure of injured membranes under near-physiological conditions was used. ", "Mussel glue, a poly(ethylene glycol)-based hydrogel, was used to seal membrane defects of up to 3 mm in mechanically well-defined elastomeric membranes with three different degrees of stiffness. ", "Elastomeric test membranes were successfully employed for testing mussel glue under well-defined conditions. ", "Mussel glue plugs were distended by up to 94%, which translated to an improved sealing efficiency on elastomeric membranes with high stiffness. ", "For the stiffest membrane tested, a critical burst pressure of 48 mbar (36 mmHg) was accomplished in this ex vivo setting. ", "Mussel glue appears to efficiently seal membrane defects under well-standardized ex vivo conditions. ", "As repaired membranes resist pressures measured in amniotic cavities, mussel glue might represent a novel sealing method for iatrogenic membrane defects." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Accelerated bony defect healing by chitosan/silica hybrid membrane with localized bone morphogenetic protein-2 delivery.", "\nTherapeutic agents such as growth factors have been widely applied to promote bone regeneration with implantable biomaterials. ", "In this study, a hybrid of chitosan-xerogel membrane was combined with bone morphogenetic protein-2 (BMP-2) for enhancing bone regeneration. ", "The characteristics of the hybrid membrane as a carrier of BMP-2 were compared with that of the pure chitosan membrane, and the effect of combining the hybrid membrane with BMP-2 on its bone healing ability was evaluated using in vitro and in vivo animal tests. ", "The amount of BMP-2 adsorbed on the pure chitosan membrane was less than that on the hybrid membrane and, therefore, the cellular behaviors of the pure chitosan membrane were only slightly improved by the protein treatment. ", "In contrast, the hybrid membrane showed excellent affinity toward BMP-2, and the adsorption of BMP-2 elicited a dramatic improvement in the cellular responses of the hybrid membrane. ", "Moreover, the in vivo study demonstrated that bone regeneration was significantly enhanced when using the hybrid membrane with BMP-2 as compared to the hybrid membrane without BMP-2. ", "These results suggest that the hybrid membrane is very efficient in carrying BMP-2 and accelerates the bone healing process through the successful delivery of BMP-2 and its osteoconductive composition." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.008333333333333333, 0, 0.0070921985815602835, 0.007633587786259542, 0.013392857142857142, 0.00546448087431694, 0.00546448087431694, 0.004975124378109453 ]
0.006545
5
[ "Field of the Invention\nThe present invention relates to a mobile terminal and a method of controlling therefor, and more particularly, to a mobile terminal capable of seamlessly performing a same function in a manner of being synchronized with an external device and a method of controlling therefor.", "\nDiscussion of the Related Art\nA terminal can be classified into a mobile/portable terminal and a stationary terminal according to whether the terminal is portable. ", "And again, the mobile terminal can be divided into a handheld terminal and a vehicle mount terminal according to whether the terminal is directly portable by a user.", "\nAs a function of the terminal is diversified, the terminal is implemented in a form of a multimedia player equipped with multiple functions such as capturing a picture or a video, playing music or a video file, receiving broadcast and the like.", "\nIn order to support and increase the functions of the terminal, it may consider improving a structural part and/or a software part of the terminal.", "\nRecently, as a smart-type mobile terminal is disseminated, an identical function, i.e., an application can be driven by mobile terminals different from each other. ", "Hence, when a user using a plurality of terminals is driving a specific application in a terminal, a necessity for satisfying a need of the user intending to seamlessly use the same application via a different terminal is arising." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "PUBLISHED\n\nUNITED STATES COURT OF APPEALS\n\nFOR THE FOURTH CIRCUIT\n\nELLEN V. ELLIS,\nPlaintiff-Appellant,\n\nv.\n No. ", "96-2711\nMETROPOLITAN LIFE INSURANCE\nCOMPANY,\nDefendant-Appellee.", "\n\nAppeal from the United States District Court\nfor the Eastern District of Virginia, at Norfolk.", "\nRobert G. Doumar, Senior District Judge.", "\n(CA-95-1003-2)\n\nArgued: July 18, 1997\n\nDecided: September 10, 1997\n\nBefore ERVIN, Circuit Judge, and BUTZNER and\nPHILLIPS, Senior Circuit Judges.", "\n\n_________________________________________________________________\n\nAffirmed by published opinion. ", "Judge Ervin wrote the opinion, in\nwhich Senior Judge Butzner and Senior Judge Phillips joined.", "\n\n_________________________________________________________________\n\nCOUNSEL\n\nARGUED: John Bertram Mann, LEVIT & MANN, Richmond, Vir-\nginia, for Appellant. ", "Alvin Pasternak, New York, New York, for\nAppellee. ", "ON BRIEF: Gregory D. Zahs, New York, New York, for\nAppellee.", "\n\n_________________________________________________________________\n\fOPINION\n\nERVIN, Circuit Judge:\n\nPlaintiff-Appellant Ellen V. Ellis (Ellis) appeals from an order\ngranting Defendant-Appellee Metropolitan Life Insurance Company's\n(MetLife) cross-motion for summary judgment and denying her own.", "\nEllis had sought review in district court of MetLife's final determina-\ntion that she was ineligible for long-term disability benefits under an\nemployee welfare benefit plan governed by the Employee Retirement\nIncome Security Act of 1974 (ERISA), 29 U.S.C. § 1001 et seq. ", "Ellis\nalleged that MetLife had improperly denied her her benefits and\nengaged in procedural errors in contravention of the statutory and reg-\nulatory requirements of ERISA. ", "We affirm.", "\n\nI.\n\nEllis was a branch manager for NationsBank Corporation whose\nprincipal duties related to originating mortgage loans. ", "She partici-\npated in NationsBank's Long Term Disability Plan (Plan). ", "The Plan\nis an employee welfare benefit plan governed by ERISA, and it is\nfunded by MetLife.", "\n\n The Plan vests MetLife, a fiduciary under the Plan, with\n discretionary authority to interpret the terms of the plan and\n to determine eligibility for and entitlement to plan benefits\n in accordance with the terms of the plan.", "\n\n Any interpretation or determination made pursuant to\n such discretionary authority shall be given full force and\n effect, unless it can be shown that the determination was\n arbitrary and capricious.", "\n\nJ.A. at 101. ", "The terms of the Plan provide, in pertinent part, that a\nparticipant is \"disabled\" if\n\n due to an Injury or Sickness, [the participant] require[s] the\n regular care and attendance of a Doctor . . . ", "and:\n\n 2\n\f (1) [the participant is] unable to perform each of the material\n duties of [her] regular job . . . .", "\n\nJ.A. at 92.", "\n\nIn August 1993, Ellis submitted a long-term disability claim form\nin which she declared that she suffered from blurred vision, balance\nproblems, and chronic pain which precluded her from driving, read-\ning, sitting, or standing for any length of time without rest. ", "She indi-\ncated that she believed her disability arose from a dental visit\nprocedure that occurred in April 1992, five days after which she\nadmitted herself to a hospital. ", "MetLife subsequently initiated its\nreview procedure.", "\n\nAt MetLife's request, Ellis's health care providers submitted medi-\ncal information relating to her claim. ", "Her primary treating provider,\nMichael Porvaznik, D.O., informed MetLife that, in his opinion, Ellis\nwas disabled, and he diagnosed her difficulties as being due to\nsomatic dysfunction. ", "Records submitted by other health care provid-\ners, however, indicated that the etiology of her problems was undeter-\nmined, that the results of a neurological examination were normal,\nand that there were no known limitations on her return to work.", "\n\nIn November 1993, MetLife referred Ellis's claim file to the Inde-\npendent Board Certified Physicians Roundtable (Roundtable), an\nindependent medical consulting group, for an assessment of Ellis's\ncondition. ", "The Roundtable members who reviewed Ellis's file con-\nsisted of an internal medicine and neurology specialist, an internal\nmedicine and cardiology specialist, and an orthopedic surgeon. ", "This\npanel concluded that no medical diagnosis for her condition could be\nconfirmed. ", "The panel suggested the possibility of an underlying psy-\nchiatric disorder, but no such evidence had been submitted to them.", "\nFunctional ability on the basis of a psychiatric disorder could not be\nassessed. ", "Nonetheless, assuming that each of Ellis's symptoms were\npresent, the panel concluded that Ellis ought to be able to lift various\nweights, to walk or stand for three to four hours a day in divided peri-\nods, and to sit for eight to ten hours a day.", "\n\nBased on the Roundtable's findings, MetLife denied Ellis's claim\nin a letter dated December 9, 1993. ", "MetLife explained why her claim\n\n 3\n\fwas denied, informed her of the Roundtable's conclusions, notified\nher that she could request further review within 60 days, and\nexplained that additional documentation could be submitted for\nreview.", "\n\nEllis did seek further review, and Porvaznik compiled additional\nmedical reports and information. ", "Porvaznik himself characterized\nEllis's problem as severe and disabling but admitted that the etiology\nremained unclear. ", "Reports by other providers, however, were again\ninconclusive. ", "A neurobehavioral profile revealed that Ellis possessed\n\"considerable strengths in the majority of skills assessed, including\nsensory-perceptual abilities, general intellectual abilities, and execu-\ntive functioning skills.\" ", "J.A. at 167. ", "That report concluded that\n\"[a]lthough her symptoms are very real, and do apparently preclude\nher resumption of her previous lifestyle, it is difficult to pinpoint eti-\nology of symptoms with any degree of certainty.\" ", "J.A. at 168. ", "A fur-\nther head and neck examination, MRI, audiogram, and otoscopic\nexamination yielded normal results. ", "A physical therapist reported that\nEllis's performance on one test was consistent with a patient who has\nsensory organization dysfunction. ", "Another report suggested that Ellis\nappears to have a predisposition to fibromyalgia and recommended a\ntreatment of progressive aerobic exercise. ", "And yet another report\ncould find no evidence of neurological disease but admitted that the\nreported symptoms were incapacitating.", "\n\nMetLife submitted this new material to the Roundtable, which\nadded a psychiatrist to the panel of the original three members. ", "Based\non all the information supplied, the Roundtable, in a May 16, 1994,\nreport, suggested that there was a reasonable basis for a probable\ndiagnosis of fibrositis or fibromyalgia but that it could not be confirmed.1\nStill, assuming that fibrositis or fibromyalgia was present, as well as\na memory deficit, a peripheral vestibular disorder, and some element\nof depression or dysthymia,2 the Roundtable determined that there\n_________________________________________________________________\n1 Fibrositis or fibromyalgia is a\"group of common nonspecific ill-\nnesses characterized by pain, tenderness, and stiffness of joints, capsules,\nand adjacent structures.\" ", "Taber's Cyclopedic Medical Dictionary (16th\ned. ", "1989).", "\n2 Dysthymia is a \"morbid anxiety and depression accompanied by\nobsession.\" ", "Webster's Third New International Dictionary 712 (1993).", "\n\n 4\n\fwas no incompatibility between Ellis's functional capacity and her\nwork requirements, even though her functional limitations could have\nbeen over-estimated.", "\n\nRather than continue to deny Ellis's claim based on this report,\nMetLife instead provided copies of the report to Ellis's health care\nproviders to seek their comments. ", "In particular, MetLife requested\nthat they address whether Ellis was totally disabled with respect to her\noccupation of bank branch manager and to submit objective medical\nevidence of her continuing disability. ", "Only a few of the health care\nproviders responded. ", "Additional testing of Ellis was arranged, how-\never, and MetLife continued to accept and consider evidence through\nJanuary 1995. ", "The new reports continued to give a wide variety of\nassessments. ", "One neuro-psychologist, for example, suggested that the\nenvironment of the banking industry, especially NationsBank's\nmerger with Sovran Bank and its attendant layoffs, created the poten-\ntial for \"secondary gain\" because of Ellis's access to long-term dis-\nability benefits. ", "See J.A. at 238. ", "A clinical social worker, however,\ndiscounted that hypothesis, believing that Ellis had been earning more\nthan $100,000 annually whereas her disability payments would\namount to only $28,000 annually. ", "See J.A. at 245. ", "A statement by\nNationsBank placed Ellis's annual earnings at approximately\n$38,700. ", "See J.A. at 107.", "\n\nMetLife submitted all of this data for a third time to the Round-\ntable. ", "In place of the specialist in internal medicine and cardiology,\na specialist in internal medicine and rheumatology was substituted;\nthe three other panel members remained the same as on the second\npanel. ", "In a report of February 4, 1995, the panel concluded that a\ndiagnosis of fibrositis remained probable. ", "But again, assuming that\ndiagnosis, as well as symptoms of muscle tightness, pain, and ocular\nconvergence, the panel determined that Ellis ought to be able to lift\neven greater weights than indicated before, walk and stand six to eight\nhours a day, and sit for eight to ten hours a day. ", "This functional\ncapacity was yet again found not to be medically incompatible with\nEllis's work requirements.", "\n\nFollowing this review of its earlier denial, MetLife informed Ellis\non March 28, 1995, that its decision remained the same and that her\nfile was closed.", "\n\n 5\n\fEllis filed this action on October 12, 1995, alleging (1) that\nMetLife had failed to give her adequate written notice of the reasons\nfor its denial of her claim, (2) that she was not given a full and fair\nreview, and (3) that the denial violated the terms of the Plan and\nERISA. ", "Following cross-motions for summary judgment, the district\ncourt granted MetLife's motion and denied Ellis's. ", "The court deter-\nmined that, considering the inconclusive evidence of the conflicting\nreports of Ellis's own health care providers as well as the three deter-\nminations of the Roundtable, substantial evidence supported\nMetLife's denial decision. ", "MetLife, therefore, had not abused the dis-\ncretion vested in it by the Plan, notwithstanding the slight possibility\nof a financial conflict of interest. ", "The court also concluded that\nMetLife had substantially complied with the applicable regulations\ninterpreting ERISA in its denial letters and that, because MetLife had\ndone more than was required to permit Ellis to present her claim,\nthere was no question that she had received a full and fair review.", "\n\nThis appeal followed.", "\n\nII.", "\n\nOver the last few years, we have developed a well-settled frame-\nwork for review of the denial of benefits under ERISA plans. ", "Where\na plaintiff is appealing the grant of summary judgment, we engage in\na de novo review, applying the same standards that the district court\nemployed. ", "See Brogan v. Holland, 105 F.3d 158, 161 (4th Cir. ", "1997).", "\nIn cases where the benefit plan grants the administrator or fiduciary\ndiscretionary authority to determine eligibility or to construe the\nterms of the plan, the denial decision must be reviewed for abuse of\ndiscretion. ", "See Firestone Tire and Rubber Co. v. Bruch, 489 U.S. 101,\n111, 115 (1989); Brogan, 105 F.3d at 161; Bedrick v. Travelers Ins.", "\nCo., 93 F.3d 149, 152 (4th Cir. ", "1996); Bernstein v. CapitalCare, Inc.,\n70 F.3d 783, 787 (4th Cir. ", "1995); Doe v. Group Hospitalization &\nMedical Servs., ", "3 F.3d 80, 85 (4th Cir. ", "1993). ", "Under this deferential\nstandard, the administrator or fiduciary's decision will not be dis-\nturbed if it is reasonable, even if this court would have come to a dif-\nferent conclusion independently. ", "See Bruch, 489 U.S. at 115; Brogan,\n105 F.3d at 161; Haley v. Paul Revere Life Ins. ", "Co., 77 F.3d 84, 89\n(4th Cir. ", "1996); Bernstein, 70 F.3d at 787; Fagan v. National Stabili-\nzation Agreement of the Sheet Metal Indus. ", "Trust Fund, 60 F.3d 175,\n\n 6\n\f180 (4th Cir. ", "1995); Doe, 3 F.3d at 85. ", "Such a decision is reasonable\nif it is \"the result of a deliberate, principled reasoning process and if\nit is supported by substantial evidence.\" ", "Brogan, 105 F.3d at 161\n(quoting Bernstein, 70 F.3d at 788).", "\n\nAs an initial matter, a reviewing court determines de novo whether\nthe ERISA plan confers discretionary authority on the administrator\nor fiduciary and, if so, whether the administrator or fiduciary acted\nwithin that discretion. ", "See Haley, 77 F.3d at 89. ", "In the instant case,\nthere is really no question that MetLife possessed discretionary\nauthority to determine Ellis's entitlement to benefits and that\nMetLife's denial was plainly within that scope. ", "The parties do not dis-\npute this and the Plan's language is crystal clear. ", "See supra part I.\n(quoting Plan language). ", "We must therefore review MetLife's denial\ndecision for an abuse of that discretion vested in MetLife.", "\n\nEllis argues, however, that we should determine her eligibility for\nbenefits de novo because MetLife, as both fiduciary of the Plan's ben-\neficiaries and the Plan's insurer, suffers from a conflict of interest.", "\nAgain, we have established a well-developed framework for consider-\ning such conflicts of interest in a court's reviewing calculus. ", "The\nSupreme Court has recognized that where a plan administrator or\nfiduciary is vested with discretionary authority and is \"operating\nunder a conflict of interest, that conflict must be weighed as a `fac-\ntor[ ] in determining whether there is an abuse of discretion.'\" ", "Bruch,\n489 U.S. at 115 (quoting Restatement (Second) of Trusts § 187 cmt.", "\nd (1959)). ", "Because ERISA plans are governed by trust principles, this\nfactor is just one of several that a court should consider in determin-\ning whether an administrator or fiduciary has abused the discretion\nvested in it. ", "We have recently stated that a reviewing court should\nconsider, to the extent relevant,\n\n (1) the scope of the discretion conferred; (2) the purpose of\n the plan provision in which the discretion is granted; (3) any\n external standard relevant to the exercise of that discretion;\n (4) the administrator's motives; and (5) any conflict of inter-\n est under which the administrator operates in making its\n decision.", "\n\nHaley, 77 F.3d at 89 (citing Restatement (Second) of Trusts § 187\ncmt. ", "d (1959)). ", "As we recently explained in Bedrick v. Travelers\n\n 7\n\fInsurance Company, the court applies the conflict of interest factor,\non a case by case basis, to lessen the deference normally given under\nthis standard of review only to the extent necessary to counteract any\ninfluence unduly resulting from the conflict:\n\n [W]hen a fiduciary exercises discretion in interpreting a dis-\n puted term of the contract where one interpretation will fur-\n ther the financial interests of the fiduciary, we will not act\n as deferentially as would otherwise be appropriate. ", "Rather,\n we will review the merits of the interpretation to determine\n whether it is consistent with an exercise of discretion by a\n fiduciary acting free of the interests that conflict with those\n of the beneficiaries. ", "In short, the fiduciary decision will be\n entitled to some deference, but this deference will be less-\n ened to the degree necessary to neutralize any untoward\n influence resulting from the conflict.", "\n\nBedrick, 93 F.3d at 152 (harmonizing Bruch and circuit law and quot-\ning Bailey v. Blue Cross & Blue Shield, 67 F.3d 53, 56 (4th Cir. ", "1995)\n(quoting Doe, 3 F.3d at 87), cert. ", "denied, 116 S. Ct. ", "1043 (1996)); see\nalso Martin v. Blue Cross & Blue Shield of Va., Inc. , 115 F.3d 1201,\n1206 (4th Cir. ", "1997).", "\n\nIt therefore appears that in no case does the court deviate from the\nabuse of discretion standard. ", "Instead, the court modifies that abuse of\ndiscretion standard according to a sliding scale. ", "The more incentive\nfor the administrator or fiduciary to benefit itself by a certain interpre-\ntation of benefit eligibility or other plan terms, the more objectively\nreasonable the administrator or fiduciary's decision must be and the\nmore substantial the evidence must be to support it.", "\n\nIn the instant case, it is clear that an administrator or fiduciary, free\nof MetLife's conflict of interest, would have been more than reason-\nable in exercising its discretion to deny Ellis benefits under the cir-\ncumstances of this case. ", "The decision maker had before it three\nseparate reports of the independent Roundtable. ", "3 Each of these reports\n_________________________________________________________________\n3 It is worth noting that Ellis presented no evidence that the Roundtable\nis not independent of MetLife or that MetLife somehow unduly influ-\nences the Roundtable's evaluation.", "\n\n 8\n\fconcluded that there was no conclusive diagnosis of Ellis's condition.", "\nEach also assessed her functional limitations, even assuming her\nsymptoms and certain possible diagnoses. ", "The first report implicitly,\nand the second two explicitly, found no incompatibility between her\nfunctional capabilities and the physical requirements of her job as a\nbank branch manager. ", "These reports constitute a substantial basis on\nwhich an objectively reasonable decision maker could determine that\nEllis was not disabled within the terms of the Plan.", "\n\nBut MetLife had before it not just these reports by the Roundtable\nspecialists but also all the data submitted by Ellis and her health care\nproviders. ", "Although Ellis's osteopath, Porvaznik, as well as several\nother health care providers, opined that Ellis was, in fact, disabled,\nthere was no consensus on a diagnosis of Ellis's condition or even on\nwhether there was a medical cause for her symptoms. ", "Indeed, a num-\nber of her examiners indicated that she retained\"executive function-\ning skills,\" that she could engage in various forms of physical\nexercise, and that she could return to work on a reduced schedule.", "\nOne report even suggested that the possibility that Ellis was embel-\nlishing her symptoms for potential secondary gain warranted serious\nconsideration. ", "Based on this conflicting data, but supported by the\nindependent medical assessment of the Roundtable, MetLife deter-\nmined that Ellis was not \"unable to perform each of the material\nduties of [her] regular job\" \"due to an injury or sickness\" and thus that\nshe was not disabled within the meaning of the Plan. ", "4 Despite\nMetLife's conflict of interest, which, as the district court noted, was\ngreatly mitigated by its substantial reliance on the evaluations of the\nindependent Roundtable, we conclude that MetLife did not abuse its\ndiscretion in denying Ellis benefits. ", "MetLife's decision was based on\nsubstantial evidence, and its lengthy and thorough review evinces a\ndeliberate, principled reasoning process.", "\n_________________________________________________________________\n4 Ellis argues that the Roundtable's evaluation of her functional capac-\nity should be discounted in light of her health care providers' determina-\ntion of her disability. ", "That is, the treating provider's conclusion should\ntrump that of the reviewing physician, since the former had the opportu-\nnity to examine the patient while the latter had only the cold paper record\nto go by. ", "We need not, and do not, reach this issue, as it is evident that\nEllis's own providers had not reached a consensus that she was disabled\nin any sense of the word (vis-a-vis the meaning within the Plan), let\nalone that she could not perform the material duties of her job.", "\n\n 9\n\fAs fiduciary, MetLife must serve the best interests of all Plan bene-\nficiaries, not just the best interest of one potential beneficiary. ", "Faced\nwith conflicting evaluations by the claimant's own health care provid-\ners, no conclusive diagnosis, and three separate reports of an indepen-\ndent panel of medical specialists finding no incompatibility between\nher functional limitations and her job requirements, a fiduciary free\nof any conflict of interest would have been more than reasonable in\nrejecting Ellis's claim and preserving the Plan's funds for those bene-\nficiaries who satisfy the Plan's definition of \"disabled.\"", "\n\nIII.", "\n\nIn addition to challenging MetLife's denial of benefits, Ellis also\nalleged procedural errors in contravention of ERISA's statutory law\nand its applicable regulations. ", "Section 503 of ERISA requires that an\nadequate notice, \"setting forth the specific reasons for [the] denial,\nwritten in a manner calculated to be understood by the participant,\"\nas well as the opportunity for a full and fair review, must be given to\nany participant whose claim is denied. ", "29 U.S.C.§ 1133. ", "Ellis claims\nboth that her notice was deficient and that her review was not full and\nfair.", "\n\nA.\n\nERISA regulations elaborate specifically what a denial notice must\ncontain:\n\n (1) The specific reason or reasons for the denial;\n\n (2) Specific reference to pertinent plan provisions on which\n the denial is based;\n\n (3) A description of any additional material or information\n necessary for the claimant to perfect the claim and an expla-\n nation of why such material or information is necessary; and\n\n (4) Appropriate information as to the steps to be taken if the\n participant or beneficiary wishes to submit his or her claim\n for review.", "\n\n 10\n\f29 C.F.R. § 2560.503-1(f). ", "Whether MetLife's denial notice complied\nwith this regulation is a question of law subject to de novo review. ", "See\nBrogan v. Holland, 105 F.3d 158, 165 (4th Cir. ", "1997). ", "As we recently\nre-emphasized in Brogan, substantial compliance with the spirit of the\nregulation will suffice, for \"[n]ot all procedural defects will invalidate\na plan administrator's decision.\" ", "Id.; see also Sheppard & Enoch\nPratt Hosp., ", "Inc. v. Travelers Ins. ", "Co., 32 F.3d 120, 127 (4th Cir.", "\n1994). ", "Substantial compliance exists where the claimant is provided\nwith \"a statement of reasons that, under the circumstances of the case,\npermitted a sufficiently clear understanding of the administrator's\nposition to permit effective review.\" ", "Brogan , 105 F.3d at 165 (internal\nquotation marks and citations omitted).", "\n\nIn the instant case, MetLife's denial letter of December 9, 1993,\nexplained that Ellis's claim was denied because her functional limita-\ntions did not adversely impact her ability to perform the duties of her\njob, quoted the relevant Plan language defining\"totally disabled,\"\ninformed her of the Roundtable's conclusions, notified her that she\ncould request further review within 60 days, and explained that addi-\ntional documentation could be submitted for review. ", "5 In all material\n_________________________________________________________________\n5 The denial letter states in pertinent part:\n\n The policy states:\n\n \"Total Disability\" or \"Totally Disabled\" means the Employee:\n\n - is completely and continuously unable to do each of the\n material duties of his job; and\n\n - requires the regular care and attendance of a Physician.", "\n\n [. . .]", "\n\n We have reviewed the extensive medical information submitted\n by your physicians, Michael Porvaznik, M.D. [sic], Francis\n Hunter, M.D., and Robert Allen, M.D. and subsequently,\n referred their reports to a Board Certified Physicians Roundtable.", "\n This Roundtable was unable to support your claim of inability to\n perform the duties of your own occupation. ", "This is based entirely\n on the physicians' evidence submitted on the restric-\n tions/limitations you claim to have from headaches, vertigo, and\n syncopal spells.", "\n\n According to the medical records available, no specific cause of\n continued syncopal spells exists. ", "These records indicate the prior\n\n 11\n\frespects, MetLife substantially complied with each of the ERISA reg-\nulation's requirements.", "\n\nEllis argues that the denial notice was deficient because it failed to\ninform her of the information she needed to provide in order to per-\nfect her claim. ", "In particular, she asserts that the Roundtable's report,\nwhich was not provided to her with the denial letter, but which she\nlater obtained, apparently during discovery, states that \"additional\ndiagnosis and evaluations would be of merit or merit consideration.\"", "\nBr. ", "of Appellant at 41. ", "Her argument is that, had she known this infor-\nmation, she would have known what medical proof she needed in\norder to prove her disability. ", "Ellis's argument is fundamentally flawed\nin two respects.", "\n_________________________________________________________________\n relatively good relief of dizziness and nausea by meclizine, the\n absence of any balance, coordination or vestibular abnormalities\n on clinical exam, the absence of any neurologic abnormalities of\n the facial or trigeminal nerve on clinical exam, and the lack of\n any medical indication of loss of higher cognitive function.", "\n\n Based on the above information, we are unable to give this claim\n favorable consideration from the claim effective date of August\n 31, 1993.", "\n\n We want you to understand that our decision in this matter has\n been based solely upon information contained in our file. ", "As\n such, we are willing to answer any questions or to review any\n further material you would care to submit which may have an\n effect upon consideration given to this claim.", "\n\n [. . .]", "\n\n You may request a review of the claim within 60 days of the\n denial date by writing directly to Group Insurance Claims\n Review, Metropolitan Life Insurance Company, at the address\n indicated in this letter. . . . ", "When requesting this review, you\n should state the reason you believe the claim was improperly\n denied and you may submit any data, questions or comments to\n Metropolitan you deem appropriate. ", "Metropolitan will reevaluate\n all the data and you will be informed in a timely manner of our\n findings.", "\n\nJ.A. at 159-60 (bold and underlining in original).", "\n\n 12\n\fFirst, Ellis entirely misconstrues what the Roundtable report says.", "\nThat report actually states:\n\n The above functional capacities do not assume that any\n major improvement has occurred with treatment. ", "However,\n such might be obtainable with additional diagnosis. ", "As\n noted above, the fluctuating visual field loss may be due to\n migraine phenomena, which have specific treatments for\n prevention that have not been used. ", "Evaluation for signifi-\n cant postural hypotension, and its treatment if found, may\n also be of merit. ", "The other alternative, of psychiatric cause,\n also may merit consideration.", "\n\nJ.A. at 146. ", "The report does not say that if Ellis were diagnosed or\nevaluated for certain conditions that such conditions would prove her\ndisability. ", "Instead, the report states that, were her diagnosis known,\nthen improvement in her functional capacities might be obtained\nthrough appropriate, directed treatment. ", "What Ellis fails to understand\nis that, even without such diagnosis, treatment, or improvement, her\nfunctional capacities are such that she was deemed able to perform\nher job duties.", "\n\nSecond, and more importantly, MetLife, in its denial letter,\ninformed Ellis of what she needed to do in order to obtain a review\nof her claim pursuant to 29 C.F.R. § 2560.503-1(f)(4). ", "MetLife was\nnot requiring any further information from Ellis to perfect her claim\nunder 29 C.F.R. § 2560.503-1(f)(3). ", "Her claim was already complete\nand perfected; no additional information was necessary for MetLife\nto process it and render a decision in her case. ", "These two provisions\nof the content of notice regulation are distinct and operate indepen-\ndently. ", "Subsection (f)(3) is only implicated when there remain unre-\nsolved, material factual questions about which a plan administrator or\nfiduciary must have information in order to review the denial of a\nclaim. ", "See Brehmer v. Inland Steel Indus. ", "Pension Plan, 114 F.3d\n656, 661-62 (7th Cir. ", "1997). ", "Ellis has somehow conflated these pur-\nposes and come to the erroneous belief that MetLife is under an obli-\ngation to inform her of what she needs to tell MetLife in order to\nobtain disability benefits. ", "That is not MetLife's role as a fiduciary.", "\nMetLife must treat each claimant with procedural fairness, but,\nbecause it must also guard against improper claims, it is not its duty\n\n 13\n\fto affirmatively aid claimants in proving their claims. ", "MetLife's\ndenial letter of December 9, 1993, substantially complies with the\napplicable ERISA regulations in all material respects.", "\n\nB.\n\nEllis also alleged that the review she obtained was not full and fair.", "\nThe applicable regulation provides that every ERISA plan must estab-\nlish procedures under which a full and fair review may be obtained.", "\nThese procedures must, at a minimum, permit the claimant to\n\n (i) Request a review upon written application to the plan;\n\n (ii) Review pertinent documents; and\n\n (iii) Submit issues and comments in writing.", "\n\n29 C.F.R. § 2560.503-1(g)(1). ", "Once a decision on review is reached,\nthe regulations further require that\n\n [t]he decision on review shall be in writing and shall include\n specific reasons for the decision, written in a manner calcu-\n lated to be understood by the claimant, as well as specific\n references to the pertinent plan provisions on which the\n decision is based.", "\n\n29 C.F.R. § 2560.503-1(h)(3).", "\n\nIt appears that neither party really comprehends what these regula-\ntions require. ", "MetLife argues, and the district court agreed, that the\nreview of Ellis's claim that it provided was more than eminently full\nand fair. ", "MetLife, for example, sent the Roundtable's second report\nto Ellis's health care providers and allowed them the opportunity to\ncritique it. ", "It subsequently repeatedly extended the deadline for Ellis's\nproviders to submit evidence on her behalf, and then submitted all the\ndata to the Roundtable yet a third time before it finally decided to\nuphold its original denial and close Ellis's case. ", "Ellis for her part\nargues that she never received any of the Roundtable's reports and\nthat the third report in particular was crucial since she claims the\n\n 14\n\fRoundtable specifically requested that Ellis be psychiatrically evalu-\nated according to a list of questions it prepared. ", "Both miss the point.", "\n\nThe full and fair review procedural requirements serve two com-\nplementary purposes. ", "They are designed to permit a plan's adminis-\ntrators to resolve disputes in an efficient, streamlined, non-adversarial\nmanner. ", "At the same time, the procedures ensure that a plan partici-\npant is protected from arbitrary or unprincipled decision-making. ", "See\nWeaver v. Phoenix Home Life Mut. ", "Ins. ", "Co., 990 F.2d 154, 157 (4th\nCir. ", "1993). ", "Both the specific minimum procedural review require-\nments of subsection (g)(1) and the notice requirements of the decision\non review of subsection (h)(3) have been read as ensuring that a full\nand fair review is conducted by the administrator, that a claimant is\nenabled to prepare an appeal for further administrative review or\nrecourse to the federal courts, and that the courts can perform the task,\nentrusted to them by ERISA, of reviewing a claim denial. ", "See\nWilczynski v. Lumbermens Mut. ", "Cas. ", "Co., 93 F.3d 397, 402 n.3 (7th\nCir. ", "1996) (interpreting 29 C.F.R. § 2560.503-1(g)(1)(ii)); Halpin v.\nW.W. Grainger, Inc., 962 F.2d 685, 693 (7th Cir. ", "1992) (interpreting\n29 C.F.R. § 2560.503-1(h)(3)). ", "Compliance that substantially fulfills\nthese goals suffices.", "\n\nWhat Ellis fails to understand is that the initial decisional process\nand the subsequent review process are distinct. ", "While it appears that\nEllis did request a review in writing and submit her disputed issues\nin writing in accordance with 29 C.F.R. § 2560.530-1(g)(1)(i) & (iii),\nit is unclear from the record before us whether she ever requested,\neither in writing or in verba, to review the pertinent documents pursu-\nant to 29 C.F.R. § 2560.530-1(g)(1)(ii). ", "On the other hand, MetLife\ndid not provide these documents on its own initiative, in particular the\nfirst report of the Roundtable on which it so heavily relied in its initial\ndenial of Ellis's claim. ", "The opportunity to review the pertinent docu-\nments is critical to a full and fair review, for by that mechanism the\nclaimant has access to the evidence upon which the decision-maker\nrelied in denying the claim and thus the opportunity to challenge its\naccuracy and reliability. ", "See Wilczynski, 93 F.3d at 402; Halpin, 962\nF.2d at 689. ", "Again, although the initial denial letter and the subse-\nquent review process are distinct, there is some support for the view\nthat, by informing a claimant of the steps to be taken to initiate the\nreview process, in accordance with 29 C.F.R. § 2560.530-1(f)(4),\n\n 15\n\fthere is an implicit obligation on the part of the administrator to\ninform a claimant that she may review pertinent documents. ", "See\nGrossmuller v. International Union, United Auto. ", "Aerospace and\nAgric. ", "Implement Workers of America, Local 813, 715 F.2d 853, 858\n& n.5 (3d Cir. ", "1983) (stating, in the context of analyzing the statutory\nand regulatory meaning of \"full and fair review,\" that the \"fiduciary\nmust also inform the participant of what evidence he relied upon and\nprovide him with an opportunity to examine that evidence and to sub-\nmit written comments or rebuttal documentary evidence\"). ", "This\nMetLife did not do. ", "What is implicit in the ERISA regulations we\nnow make explicit: A plan administrator or fiduciary must inform a\nclaimant that, should she desire to submit her claim for review follow-\ning an initial denial, she is entitled to review the pertinent documents\nupon which the initial denial decision was predicated.", "\n\nThe notice requirement for the decision on review must be every\nbit as explicit as an initial denial notice in terms of providing specific\nreasons for the continued denial and specific references to the perti-\nnent plan provisions. ", "Compare 29 C.F.R.§ 2560.503-1(h)(3) with id.\n§ 2560.503-1(f)(1) & (2). ", "What is not required, because not relevant\nat this stage of the administrative review, is notice regarding how to\nperfect a claim or how to seek review. ", "Cf. ", "29 C.F.R. § 2560.503-\n1(f)(3) & (4).", "\n\nMetLife's \"decision on review\" letter of March 28, 1995, states in\ntoto:\n\n Your request for a subsequent review of your Long Term\n Disability termination of benefits has been completed.", "\n\n This reply constitutes our final response in your ERISA\n appeal.", "\n\n Review of your claim under ERISA has previously been\n completed and our decision remains the same.", "\n\n Your Long Term Disability file remains closed.", "\n\n Should you have any questions or concerns, you may con-\n tact us at the listed number.", "\n\n 16\n\fJ.A. at 269. ", "On its face, this letter is baldly deficient in specific refer-\nences to the reasons for the decision and contains no references to the\npertinent Plan provisions.", "\n\nIt is plain that MetLife has not followed the letter of the applicable\nERISA regulations concerning its review of Ellis's claim denial. ", "In\nthe first place, MetLife ought to have informed Ellis that she could\nreview the documentary evidence that MetLife relied upon in reach-\ning its initial decision. ", "In this particular case, the most critical docu-\nment was the Roundtable's first report. ", "In the second place, MetLife\nalso failed to provide its rationale for its continued denial with the\nrequisite specificity. ", "On the other hand, Ellis also complains that she\nwas never provided with the second and third Roundtable reports.", "\nAlthough it was incumbent upon MetLife to describe the Round-\ntable's analysis to the extent MetLife based its decision on that analy-\nsis, MetLife was under no duty to provide these latter two reports to\nEllis as part of the review procedures.", "\n\nWere the regulations to be strictly construed as written, then, due\nto these procedural defects, Ellis did not receive a full and fair review.", "\nWhat is not written, however, but what is implicit in their nature, is\nthat there must be a causal connection between these defects and the\nfinal denial of a claim. ", "Although Ellis did not review the first Round-\ntable report, she informs us that what is important about that docu-\nment is that the Roundtable believed that certain diagnoses would\nhave merited consideration. ", "However, as explained above, Ellis\nentirely misconstrues what that report says. ", "It is apparent that had\nEllis had the report, the data she could have submitted to MetLife\nwould not have materially affected the Roundtable's subsequent anal-\nyses. ", "Two additional factors, beyond her misunderstanding of the\nreport's contents, make this plain. ", "First, Ellis was, in fact, examined\nby a variety of different specialists who sought to make diagnoses of\nher condition, including psychologists and psychiatrists. ", "By her (mis)-\nunderstanding, the Roundtable sought evaluations by psychologists or\npsychiatrists, and she acquired that evidence independently. ", "Evi-\ndently, she was not prejudiced by not reviewing the report. ", "Second,\nMetLife provided a copy of the Roundtable's second report to Ellis's\nhealth care providers. ", "This second report was even more detailed than\nthe first, and it made clear that the available data on her functional\nlimitations did not preclude her from engaging in the physical tasks\n\n 17\n\fof her profession. ", "By providing this second report for critique and\npermitting Ellis and her health care providers to submit additional\ndata in response, MetLife, in effect, neutralized any harm it may have\ncaused by not informing Ellis that she could have reviewed the first\nreport. ", "We can see no causal link between MetLife's failure to inform\nEllis that she could review pertinent documents and the ultimate\ndenial of her claim.", "\n\nSimilarly, although MetLife's \"decision on review\" letter appears\nwoefully deficient on its face, it does state that the \"decision remains\nthe same.\" ", "We note that the purpose of the specificity requirements\nin the notice provision is to permit the claimant to adequately prepare\nan appeal to the federal courts and for those courts to properly review\nthe decision. ", "See Wilczynski, 93 F.3d at 402 n.3; Collins v. Central\nStates, Southeast and Southwest Areas Health and Welfare Fund, 18\nF.3d 556, 561 (8th Cir. ", "1994); Halpin, 962 F.2d at 693. ", "Because the\nrecord before us, as before the lower court, contains all of the docu-\nmentary evidence that MetLife relied upon in reaching its decision,\nand it is clear, as discussed above, that MetLife did not abuse its dis-\ncretion in denying Ellis's claim based upon that evidence, Ellis has\nin no way been prejudiced by the deficiencies in MetLife's \"decision\non review\" letter. ", "Indeed, the district court interpreted the conclusion\nthat MetLife's \"decision remain[ed] the same\" as making it plain to\nEllis that the lack of medical documentation of her affliction was the\ncause of the denial. ", "Whether this be so, these deficiencies obviously\nare not causally related to MetLife's ultimate denial, and Ellis has\nbeen able to effectively prosecute her appeal in the federal courts.", "\nMoreover, it would be pointless for us to vacate the decision below\nand remand with instructions to the lower court that it should, in turn,\nremand this matter to MetLife with instructions that it provide Ellis\nwith the specific reasons for its continued denial, since those reasons\nare now apparent to all. ", "Lex non praecipit inutilia, quia inutilis labor\nstultus.", "\n\nWe do not believe that this disposition makes the review proce-\ndures of 29 C.F.R. § 2560.503-1(g)(1) or the notice provisions of 29\nC.F.R. § 2560.503-1(h)(3) toothless. ", "We emphasize that MetLife is\nsaved in this instance only because the substance of the review that\nMetLife did provide to Ellis was full and fair, even though it did not\ntechnically comply with all of ERISA's procedural requirements.", "\n\n 18\n\fAlthough we do not say that MetLife substantially complied with the\nrequirements, we do conclude that MetLife substantively complied\nwith the spirit and intent of a full and fair review in this particular\ncase. ", "Ellis was not subject to an arbitrary or unprincipled decision-\nmaking process. ", "Hereafter, MetLife, as well as other plan administra-\ntors and fiduciaries, would be well advised to ascertain their compli-\nance with these ERISA procedural requirements.", "\n\nIV.", "\n\nBased on the foregoing analysis of Ellis's three allegations, we\naffirm the grant of summary judgment to MetLife and its denial to\nEllis.", "\n\nAFFIRMED\n\n 19\n\f" ]
{ "pile_set_name": "FreeLaw" }
[ 0, 0, 0.010416666666666666, 0.024390243902439025, 0.02054794520547945, 0, 0.031914893617021274, 0.019230769230769232, 0.0196078431372549, 0.016666666666666666, 0.010135135135135136, 0.01098901098901099, 0.017341040462427744, 0, 0.016260162601626018, 0.02857142857142857, 0.021739130434782608, 0.0037593984962406013, 0, 0, 0.009259259259259259, 0, 0, 0.003745318352059925, 0, 0.019230769230769232, 0.01834862385321101, 0.016129032258064516, 0, 0.01904761904761905, 0.005376344086021506, 0, 0, 0, 0.008064516129032258, 0.019417475728155338, 0.00390625, 0.02, 0.008264462809917356, 0, 0.0044444444444444444, 0, 0, 0, 0, 0.007194244604316547, 0.00684931506849315, 0, 0.0078125, 0, 0.020833333333333332, 0, 0, 0, 0.005494505494505495, 0.011764705882352941, 0.009478672985781991, 0, 0.015503875968992248, 0, 0.010869565217391304, 0, 0.005, 0, 0.023809523809523808, 0, 0.013333333333333334, 0, 0, 0.003484320557491289, 0.009174311926605505, 0.012987012987012988, 0.003289473684210526, 0.01818181818181818, 0.008130081300813009, 0.006493506493506494, 0.013289036544850499, 0, 0, 0.0078125, 0, 0.0196078431372549, 0, 0, 0.024, 0, 0.015151515151515152, 0.018518518518518517, 0.041666666666666664, 0, 0, 0.023809523809523808, 0.03333333333333333, 0.019230769230769232, 0.015873015873015872, 0.038461538461538464, 0, 0.03333333333333333, 0, 0.038461538461538464, 0.010101010101010102, 0, 0.023255813953488372, 0.019801980198019802, 0.018867924528301886, 0, 0.0036900369003690036, 0, 0, 0.009389671361502348, 0, 0, 0, 0.0016339869281045752, 0, 0, 0.014705882352941176, 0, 0.05263157894736842, 0.019417475728155338, 0, 0, 0, 0, 0.008264462809917356, 0, 0.011278195488721804, 0.010416666666666666, 0, 0, 0.005952380952380952, 0.013071895424836602, 0.01593625498007968, 0, 0.006535947712418301, 0.0064516129032258064, 0.007722007722007722, 0.0070921985815602835, 0.0041841004184100415, 0, 0.0036900369003690036, 0.006134969325153374, 0.00411522633744856, 0, 0.01764705882352941, 0, 0, 0.011111111111111112, 0, 0, 0.00909090909090909, 0.0196078431372549, 0, 0.005128205128205128, 0.022727272727272728, 0, 0, 0, 0, 0, 0.004273504273504274, 0, 0, 0.014134275618374558, 0, 0, 0, 0.013245033112582781, 0.006329113924050633, 0, 0, 0.05, 0, 0.017543859649122806, 0, 0, 0, 0, 0, 0.007936507936507936, 0, 0.00819672131147541, 0, 0.010752688172043012, 0, 0, 0, 0, 0, 0, 0.007246376811594203, 0, 0.005494505494505495, 0.016129032258064516, 0.01694915254237288, 0.006802721088435374, 0, 0, 0.02857142857142857, 0, 0, 0.014705882352941176, 0.023809523809523808, 0, 0.007633587786259542, 0.013157894736842105, 0, 0, 0.03125, 0, 0.03225806451612903, 0, 0.014705882352941176, 0.014285714285714285, 0.007936507936507936, 0.006600660066006601, 0, 0, 0, 0, 0.02702702702702703, 0, 0, 0, 0.0021691973969631237, 0.058823529411764705, 0.2, 0, 0.02631578947368421, 0.0196078431372549, 0, 0.008333333333333333, 0.0029154518950437317, 0.009950248756218905, 0, 0.017543859649122806, 0, 0.03773584905660377, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.027777777777777776, 0.004878048780487805, 0.011764705882352941, 0.008403361344537815, 0, 0, 0, 0, 0.014492753623188406, 0.01818181818181818, 0, 0.008130081300813009, 0.008849557522123894, 0.0163265306122449, 0.006944444444444444, 0, 0.004761904761904762, 0.0125, 0.012048192771084338, 0, 0.006097560975609756, 0, 0, 0.02, 0, 0.011320754716981131, 0.013605442176870748, 0.006578947368421052, 0, 0.013793103448275862, 0.03125, 0.013123359580052493, 0.009345794392523364, 0.010752688172043012, 0.006472491909385114, 0, 0.005813953488372093, 0.01293103448275862, 0.008438818565400843, 0.0125, 0.005847953216374269, 0, 0.02158273381294964, 0 ]
0.0085
5
[ "Stable and unstable genes: distribution among species and range of mutations.", "\nAn expansion of the 'stable' gene hypothesis proposed previously is the hypothesis that there is a range of genes, some proto-oncogenes and some not, varying from those with multiple copies in the genome, wide distribution among species, and limited mutability because of a specific protective stabilizing mechanism of such genes, to those that are in single copies in the genome, unprotected, unique to one species, and highly mutable along their entire length." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0 ]
0
5
[ "Franklin Metcalfe Carpenter\n\nFranklin Metcalfe Carpenter (July 23, 1847 – September 25, 1907) was a farmer and political figure in Ontario, Canada. ", "He represented Wentworth South in the House of Commons of Canada from 1887 to 1896 as a Conservative member.", "\n\nHe was born in Saltfleet Township, Canada West. ", "He served on the council for Saltfleet Township from 1872 to 1874 and was reeve from 1874 to 1883; he also served as warden for Wentworth County. ", "Carpenter was an unsuccessful candidate in the 1878 federal election, losing to Joseph Rymal. ", "He was elected to the Legislative Assembly of Ontario in 1879 but the election was declared void later that year. ", "In 1880, he married Catherine H. Gardiner. ", "Carpenter was also a major in the militia.", "\n\nReferences \n\nThe Canadian parliamentary companion, 1891 AJ Gemmill\n\nExternal links \n Franklin M. Carpenter, Erland Lee (Museum) Home, Stoney Creek, Ontario\n Erland Lee Museum\n\nCategory:1847 births\nCategory:1907 deaths\nCategory:Members of the House of Commons of Canada from Ontario\nCategory:Conservative Party of Canada (1867–1942) MPs\nCategory:Progressive Conservative Party of Ontario MPPs" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0.013513513513513514, 0.009259259259259259, 0, 0, 0.02127659574468085, 0.008771929824561403, 0.023255813953488372, 0.023809523809523808, 0.017811704834605598 ]
0.013078
5
[ "This invention pertains specifically to locating a blood vessel of a patient for cannulation, and guiding a cannula for subsequent insertion into the blood vessel, for purposes of adding substances (e.g. medicine), removing substances (e.g. blood samples), monitoring the patient (e.g. blood pressure), or the like.", "\nThe procedure of positively locating a blood vessel for venipuncture is difficult under certain conditions, including where the patient is in hypotension, where the blood vessel is not close to the skin due to patient obesity or other factors, where the blood vessel tends to displace during cannulation due to factors such as thickening of the wall of the blood vessel, or the like.", "\nWhen locating a blood vessel for cannulation, it is desirable to accurately sense the location of the blood vessel through noninvasive means. ", "Due to normal curvature along the length of the blood vessel, it may be difficult to accurately place a cannula if only one point on the blood vessel is located. ", "It is thus desirable to locate the blood vessel, account for orientation of the blood vessel, and insert the cannula adjacent the location point or points to reduce the possibility of missing the blood vessel.", "\nOnce the blood vessel has been located, the cannula must be aligned along the length of the blood vessel at an angle suitable for insertion into the blood vessel, and in an imaginary plane generally passing through the blood vessel. ", "If the angle is too great, the cannula may penetrate entirely through the blood vessel, including through the far wall of the blood vessel. ", "If the angle with the blood vessel is too small, penetration may be difficult, or may fail. ", "If the length of the cannula is outside the recited imaginary plane, the cannula may pass sideways out of the blood vessel whereby suitable cannulation is also frustrated.", "\nIt is an object of this invention to provide a blood vessel cannulation device which enables effectively sensing a blood vessel at a first location, and correspondingly enables effectively inserting a cannula adjacent the first location, in alignment along the blood vessel, and thus into the blood vessel.", "\nIt is another object of this invention to provide a blood vessel cannulation device which enables sensing the blood vessel, accounts for the orientation of the blood vessel by aligning the sensor location point or points with the blood vessel, and facilitates effective insertion of a cannula into the blood vessel at a suitable angle adjacent the sensed location.", "\nIt is a further object of this invention to provide a blood vessel cannulation device which enables sensing the location of a blood vessel through the use of multiple sensors with distinguishable outputs to allow for rapid and accurate location of the blood vessel, and accurate alignment of the sensors and cannula with the blood vessel." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0
5
[ "Infant weaning practices in Adelaide: the results of a shopping complex survey.", "\nThe results are presented of a survey of infant weaning practices carried out in shopping complexes in the Adelaide metropolitan area. ", "The types of foods and fluids currently being consumed by the sample of 258 healthy infants was documented, and a comparison made between the feeding practices of breast and artificially fed infants and with respect to socio-economic status. ", "While the majority of weaning diets were compatible with the South Australian guidelines, 40% of infants under 4 months of age were having solid foods and a greater percentage of these infants were artificially fed. ", "Iron intake may not be optimal after six months of age with the increasing use of cow's milk and non-fortified adult cereals. ", "There is an increasing awareness of the inappropriateness of adding sugar and salt to infant foods; however, foods high in sugar and salt are still being used. ", "The results suggest that parents may not always be aware of or understand the rationale behind recommendations for weaning and that dietary guidelines for adults and children may not always be appropriate for infants. ", "Consistent guidelines for infants, modified to consider current food trends, would be useful for parents." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0.02531645569620253, 0.007352941176470588, 0, 0, 0, 0, 0, 0 ]
0.004084
5
[ "In these trying times, we plan to continue entertaining, enriching, and expanding the global community for jazz through online education and our social platforms. ", "Please consider supporting Jazz at Lincoln Center, at whatever level you can.", "\n\nfeatures & highlights\n\nnews | Apr, 27th 2020\n\nIn response to growing concerns about the spread of COVID-19, Jazz at Lincoln Center has canceled all concerts and classes in Frederick P. Rose Hall, The House of Swing, effective immediately, Thursday, March 12, 2020 through Wednesday, April 15, 2020.", "\n\nnews | Apr, 24th 2020\n\nSome of Jazz’s biggest stars got their start in the City of Brotherly Love including John Coltrane, the Heath Brothers and McCoy Tyner before moving on to impact the scenes of other cities. ", "From bebop to the avant-garde, explore Philly’s Jazz scene and the trailblazers who dared to push the envelope.", "\n\nNobody in the history of jazz expressed himself more freely; or with more variety, swing, and sophistication than Duke Ellington. ", "Listen to our playlist of essential Ellington recordings and find out how he changed jazz forever.", "\n\nWynton Marsalis appeared on The Late Show with Stephen Colbert to perform with Jon Batiste, Stay Human, and acclaimed dancer Lil Buck. ", "Check out video and behind-the-scenes content from their performance.", "\n\nNew to jazz and don't know where to start? ", "With many artists and extensive catalogues of music, a new jazz listener can feel intimidated. ", "We're here to help! ", "Check out our list of 10 albums to get you started on your jazz journey and introduce yourself to some of jazz's great artists.", "\n\nOn December 7, 2014 the Jazz at Lincoln Center Orchestra drove 8 hours on an off day to play for Clark Terry on his 94th birthday. ", "Victor Goines, James Chirillo, Ted Nash, Vincent Gardner, and Walter Blanding recall the day and the impact that Clark had on jazz.", "\n\nBefore his passing in May, Joe Temperley spent 29 unforgettable years as the Jazz at Lincoln Center Orchestra's baritone saxophonist and its beloved elder statesman. ", "Between performances on their recent mini-tour of Canada, several JLCO members shared their memories of Temperley, who left behind an indelible legacy and a whole lot of stories.", "\n\nApril is Jazz Appreciation Month, so we thought we'd celebrate by delving into the careers of a handful of underappreciated jazz artists. ", "Explore the careers of six musicians who deserve more accolades and learn the best places to start with their discographies." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.025974025974025976, 0.016666666666666666, 0.013953488372093023, 0, 0.007575757575757576, 0.01020408163265306, 0.029197080291970802, 0, 0, 0, 0, 0, 0.022556390977443608, 0.04580152671755725, 0.011904761904761904, 0.011235955056179775, 0, 0 ]
0.010267
5
[ "1. ", "Field of the Invention\nThis invention relates to a method of correcting a mailing address and more particularly to maintaining a correct, updated address list for mass mailing.", "\n2. ", "Description of the Related Art\nThe Postal Service processes and delivers millions of pieces of mail each year. ", "The efficiency of the postal system is impacted when address information on a mailpiece is not correct. ", "The mail system works most efficiently when a mailpiece is addressed exactly correctly, and it costs the USPS more money to deliver improperly addressed mailpieces.", "\nLikewise, certain bulk mailers or mass mailers have a strong economic interest in seeing that they have the most up to date and accurate mailing information for its intended addressees. ", "Improperly addressed items that do not reach the intended recipient are a direct lost cost to the mailer. ", "Mailpieces that must be redirected may lose their timeliness and thus their effectiveness for the mailer.", "\nDelivery service providers, including mail delivery providers such as the USPS, are also faced with certain challenges presented by customers who change address. ", "Misdirected mail that arises when a customer relocates is a source of inefficiency to the entity sending the mail. ", "Likewise the time and resources expended by the entity handling the mail also represent lost resources. ", "The USPS for example handles millions of mailpiece items in a calendar year, and the inefficiency and waste associated with misdirected mail carries significant costs.", "\nIn addition to typical change of address occurrences occasioned by the move of an individual addressee, postal delivery addresses themselves may change. ", "A postal delivery address, even though established, may have changes made, for example, to the street name, the secondary information like apartment numbers, or even the ZIP code or the plus four add-on.", "\nThe intelligent ZIP+4 (IZ4) can use the Delivery Point Bar Code (DPBC) from a ZIP+4 reference product and maintain updates or changes to that record.", "\nAs is currently known, a mailer, or anyone with an address list, can run the address list through a reference database product. ", "The current address database product assigns the correct ZIP+4 code to a physical address and standardizes the addresses. ", "This reference product is commonly referred to as a ZIP+4 engine. ", "The ZIP+4 engine accepts street addresses with a city and state and attempts to match them against a database that has all possible addresses within that geographical area.", "\nHowever, there are limitations to the ZIP+4 engine. ", "For example, it does not verify that the address is correct. ", "It merely indicates that the address is within the range of addresses on that street in that city. ", "If the street name changes or a renumbering of any kind occurs, then the ZIP+4 engine may not make a match or may make an incorrect match and the owner of the address list may have corrupted the address.", "\nThe Postal Service estimates that there is quite a significant number of address changes that do occur. ", "On an annual basis it is estimated that 20% of all postal addresses experience a change of some kind. ", "The change may be to the physical address such as a street name, number or ZIP code. ", "Also included within this number are changes that do not appear on the physical address, but are nonetheless important to mass mailers. ", "This information includes items such as drop off points, equipment, and packaging information. ", "Mailers use all of this information to efficiently communicate with their addressees.", "\nThus there is a need for an improved address correction method. ", "The improved method should allow a mailer to check information on an address list for any changes to the postal delivery address. ", "It is desired that a correction method would identify changes to postal addresses such as renamed streets, renumbering of apartments, or ZIP code changes.", "\nIt is further desired that an improved address correction method provide updated address information on a regular and periodic basis. ", "In this way mailers can continuously update mailing lists when sending out mailings on a periodic basis.", "\nIt is also desired that an improved address correction method be made accessible to the mailing public through software and software applications now in use by mailers. ", "In this way mailers can use the product without significant changes to data processing operations." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0.009009009009009009, 0, 0, 0, 0.009433962264150943, 0, 0.006134969325153374, 0, 0, 0.005988023952095809, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009523809523809525, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.001084
5
[ "Q:\n\nFile Upload to a cross domain WCF service using jquery ajax\n\nHere is what I am trying to do (unsuccessfully, I might add) and would appreciate any direction you can give me\nFrom my HTML5 site, I want to upload a file to a cross domain WCF service that is hosted in IIS 7.5. ", "\nIn addition to uploading the files, I need to send additional parameters to the upload function on the server\nIs this possible to do?", "\nHere is what my operationContract looks like:\n[OperationContract]\n[WebInvoke( Method = \"POST\",\nUriTemplate = \"/uploadmodeldata/?id={Id}&customerdatatype={customerdatatype}&data={data}\")]\nvoid UploadModelData(string Id, string customerdataType, byte[] data);\n\nHere is what my jquery ajax request\nfunction FileVisits() {\n\n var uid = checkCookie1();\n userid = uid.toString().replace(/\"/g, '');\n var fileData = JSON.stringify({\n Id:userid ,customerdatatype:scanupload,\n data: $('#fileBinary').val()\n });\n alert(fileData);\n \"use strict\";\n var wcfServiceUrl = \"http://xxxxx:1337/Service1.svc/XMLService/\";\n $.ajax({\n cache: false,\n url: wcfServiceUrl + \"uploadmodeldata/\", \n data: fileData,\n type: \"POST\",\n processData: false,\n contentType: \"application/json\",\n timeout: 10000,\n dataType: \"json\",\n headers: {\n 'User-agent': 'Mozilla/5.0 (compatible) Greasemonkey',\n 'Accept': 'application/atom+xml,application/xml,text/xml',\n },\n beforeSend: function (xhr) {\n $.mobile.showPageLoadingMsg();\n\n xhr.setRequestHeader(\"Content-type\", \"application/x-www-form-urlencoded\");\n\n },\n complete: function () {\n $.mobile.hidePageLoadingMsg();\n },\n\n success: function (data) {\n var result = data;\n\n },\n error: function (data) {\n alert(\"Error\");\n }\n });\n\n}\n\nif file size is less then 100 kb this error occurred\n\nMethod not allowed\n\nbut if file is greater then 100 kb this error occurred\n\n413 Request entity to large\n\nHow can I upload a file from jquery ajax to cross domain wcf.", "\nThanks\n\nA:\n\nYou are getting the Method not allowed cause you are trying to call a service on another domain. ", "This violates the Same origin policy. ", "This is a security limitation. ", "Most older browsers will deny such requests. ", "\nYou will need to setup Cross-Origin Resource Sharing if you want to access a different domain the webservice in javascript.", "\n\nCross-origin resource sharing (CORS) is a mechanism that allows a web\n page to make XMLHttpRequests to another domain. ", "Such \"cross-domain\"\n requests would otherwise be forbidden by web browsers, per the same\n origin security policy. ", "CORS defines a way in which the browser and\n the server can interact to determine whether or not to allow the\n cross-origin request\n\nIf you have access to the webservice code, you can enable CORS requests at the server.", "\nEnable cors is a good resource. ", "Here is some explaination on cors\nOn IIS 7, you need to set a few custom headers in your web.config.", "\n<system.webserver>\n <httpprotocol>\n <customheaders>\n <add name=\"Access-Control-Allow-Origin\" value=\"*\" />\n <add name=\"Access-Control-Allow-Headers\" value=\"Content-Type\" />\n </customheaders>\n </httpprotocol>\n</system.webserver>\n\nHere are the steps for IIS6 \nAs for the 413 error, that is related to the max file size you allow on your binding\n<bindings>\n <webHttpBinding>\n <binding maxBufferSize=\"2147483647\" maxReceivedMessageSize=\"2147483647\" />\n </webHttpBinding>\n</bindings>\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.007168458781362007, 0, 0.003236245954692557, 0.00909090909090909, 0, 0, 0, 0.008, 0, 0, 0.004524886877828055, 0, 0, 0.006036217303822937 ]
0.002718
5
[ "Tapping into teams.", "\nTeam management has a definite cachet in management circles in general industry; business magazines like Fortune regularly write about the concept, and executives in a wide variety of business fields are excited by it. ", "But there's a lot of confusion behind the buzz, and the reality, say experts and those who've tried it, is a lot more complex than it might seem at first. ", "Can the idea even be applied to hospitals and other large health care organizations?" ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0.0064516129032258064, 0 ]
0.001613
5
[ "Q:\n\nHow can I get undo behavior in Evil similar to Vim's?", "\n\nThe default undo behavior in Evil is too coarse-grained because it considers anything taking place between entering insert mode and leaving it as one edit operation. ", " When you enter a whole paragraph of text during one insert and then execute undo, the whole paragraph is removed. ", " In contrast to that, Vim starts a new undo unit whenever you move the cursor in insert mode by means other than entering text.", "\nEvil has a customization variable that can be used to get a more fine-grained undo history:\n(setq evil-want-fine-undo t)\n\nWith this setting, Evil starts a new undo unit when the cursor is moved in insert mode, just like Vim does. ", " However, this setting also messes with how the replace operation is handled: if you replace a word using cw, you have to undo twice to restore the original word: once for removing the new word and once for reinserting the original word. ", " This is inconsistent with Vim and doesn't make much sense because replace should be atomic.", "\nThe question: How can I configure Evil and undo-tree in order to get Vim's undo behavior?", "\n\nA:\n\nSince @shosti pointed out that Evil considers deviation from Vim behavior as bugs, I filed a bug and one of the authors of Evil added a new possible value for evil-want-fine-undo: \n(setq evil-want-fine-undo 'fine)\n\nWith this setting, you get new undo units when moving the cursor in insert mode, but replace operations are undone in one step. ", " As far as I can tell this is consistent with Vim. ", " See here for details.", "\n\nA:\n\nAccording to the variable description (see C-h v evil-want-fine-undo) the value fine is not supported any more due to inconsistent behaviour. ", "\nAs I use undo to undo typos or the mentioned setting helped my allot.", "\n(setq evil-want-fine-undo t) \n\nI had trouble undoing errors in org-table formula editing, since you don't have to leave the insert mode if you want to change to *Edit Forumlas* with C-'.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.017543859649122806, 0.005952380952380952, 0, 0.007874015748031496, 0.008658008658008658, 0, 0.010869565217391304, 0.011111111111111112, 0.008595988538681949, 0.0196078431372549, 0, 0, 0, 0.0053475935828877, 0 ]
0.006371
5
[ "Q:\n\nHow to detect top is reached on inverted react-native flat list\n\nam designing a chat screen, in which the data is shown from bottom . ", "to top. ", "once the top is reached need to do pagination API call. ", "I have used a flat list for showing the data with the inverted prop. ", "once I reach the top of the list I have to make another call. ", " \nI have tried to find scroll height but that is also not coming :(\n<FlatList\n ref={nameRef}\n data={messages}\n renderItem={({ item }) => renderData(item)}\n inverted\n onScroll={(e) => handleScroll(e)}\n />\n\nI need to do an API call once it reached the top of the list\n\nA:\n\nYou can use onEndReached prop to determine the top like below:\n<FlatList\n ref={nameRef}\n data={messages}\n renderItem={({item}) => renderData(item)}\n inverted\n onEndReached={this.handlePagination}\n />\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0.017857142857142856, 0, 0, 0 ]
0.002976
5
[ "Registered voters in theState of Michigan, U.S.A.in alphabetical order\n\nUse this website at your own risk. ", "There is no warranty. ", "This is a privately owned and operated genealogy website using a purchased copy of the Michigan voter list, as of 12 May 2017, which is public information.", "\nDon’t bother mining data, just download the list for free\n\nROUSSEL, CHARLES JULES-OSCAR was born in 1989 and he registered to vote, giving his address as 6461 N MCKINLEY RD, FLUSHING MICHIGAN 48433 U.S.A. (Voter ID number 32588403).", "\nVisit the detail page.", "\n\nROUSSEL, DANIELLE LEA was born in 1988 and she registered to vote, giving her address as 900 LONG BLVD APT 258, LANSING MICHIGAN 48911 U.S.A. (Voter ID number 108785331).", "\nVisit the detail page.", "\n\nROUSSEL, HANNAH THERESA-ELEN was born in 1990 and she registered to vote, giving her address as 8178 CYPRESS CIR, DEXTER MICHIGAN 48130 U.S.A. (Voter ID number 235007315).", "\nVisit the detail page.", "\n\nROUSSEL, HAVAH ELISABETH-ROSE was born in 1996 and she registered to vote, giving her address as 8178 CYPRESS CIR, DEXTER MICHIGAN 48130 U.S.A. (Voter ID number 109053666).", "\nVisit the detail page.", "\n\nROUSSEL, ISAAC SETH-IAN was born in 1963 and he registered to vote, giving his address as 8178 CYPRESS CIR, DEXTER MICHIGAN 48130 U.S.A. (Voter ID number 4004387473).", "\nVisit the detail page.", "\n\nROUSSEL, JACLYN AMANDA was born in 1996 and she registered to vote, giving her address as 614 W SUPERIOR ST, ALMA MICHIGAN 48801 U.S.A. (Voter ID number 1775003296).", "\nVisit the detail page.", "\n\nROUSSEL, JAMES MURRAY was born in 1982 and he registered to vote, giving his address as 1604 S 11TH ST #2, KALAMAZOO MICHIGAN 49009 U.S.A. (Voter ID number 2605005521).", "\nVisit the detail page.", "\n\nROUSSEL, JEANNINE MARY was born in 1927 and she registered to vote, giving her address as 9242 LOUISIANA ST, LIVONIA MICHIGAN 48150 U.S.A. (Voter ID number 6101381).", "\nVisit the detail page.", "\n\nROUSSEL, JERRY JULIUS-CANDILARIO was born in 1967 and he registered to vote, giving his address as 3910 S AIRPORT RD, BRIDGEPORT MICHIGAN 48722 U.S.A. (Voter ID number 4000987953).", "\nVisit the detail page.", "\n\nROUSSEL, JOSEPH PAUL was born in 1933 and he registered to vote, giving his address as 23324 AUDREY AVE, WARREN MICHIGAN 48091 U.S.A. (Voter ID number 3458035).", "\nVisit the detail page.", "\n\nROUSSEL, JULIE MARIE-LOUISE was born in 1959 and she registered to vote, giving her address as 8178 CYPRESS CIR, DEXTER MICHIGAN 48130 U.S.A. (Voter ID number 4004387470).", "\nVisit the detail page.", "\n\nROUSSEL, LEOMA JANIVE was born in 1932 and she registered to vote, giving her address as 9083 MAPLEWOOD DR, CLIO MICHIGAN 48420 U.S.A. (Voter ID number 106212447).", "\nVisit the detail page.", "\n\nROUSSEL, MARY CHRISTINE was born in 1949 and she registered to vote, giving her address as 31264 93RD AVE, LAWTON MICHIGAN 49065 U.S.A. (Voter ID number 7134558).", "\nVisit the detail page.", "\n\nROUSSEL, NICOLE S. was born in 1995 and she registered to vote, giving her address as 3498 TIMBERLINE DR, NORTH STREET MICHIGAN 48049 U.S.A. (Voter ID number 32840131).", "\nVisit the detail page.", "\n\nROUSSEL, NORMA L. was born in 1958 and she registered to vote, giving her address as 3498 TIMBERLINE DR, NORTH STREET MICHIGAN 48049 U.S.A. (Voter ID number 7160017).", "\nVisit the detail page.", "\n\nROUSSEL, PAUL JOSEPH was born in 1958 and he registered to vote, giving his address as 3498 TIMBERLINE DR, NORTH STREET MICHIGAN 48049 U.S.A. (Voter ID number 7160023).", "\nVisit the detail page.", "\n\nROUSSEL, RYAN PATRICK was born in 1974 and he registered to vote, giving his address as 1356 INNISBROOK CT, HOLLAND MICHIGAN 49423 U.S.A. (Voter ID number 106934501).", "\nVisit the detail page.", "\n\nROUSSEL, SAMUEL ELISHA-MARK was born in 1995 and he registered to vote, giving his address as 8178 CYPRESS CIR, DEXTER MICHIGAN 48130 U.S.A. (Voter ID number 32269930).", "\nVisit the detail page.", "\n\nROUSSEL, STEPHANE was born in 1968 and he registered to vote, giving his address as 3498 HAZELTON AVE, ROCHESTER HILLS MICHIGAN 48307 U.S.A. (Voter ID number 685015490).", "\nVisit the detail page.", "\n\nROUSSEL, WAYNE J. was born in 1946 and he registered to vote, giving his address as 31264 93RD AVE, LAWTON MICHIGAN 49065 U.S.A. (Voter ID number 7134557).", "\nVisit the detail page.", "\n\nROUSSELL, ANDRE T. was born in 1996 and he registered to vote, giving his address as 19379 CONCETTA DR, MACOMB MICHIGAN 48044 U.S.A. (Voter ID number 32974603).", "\nVisit the detail page.", "\n\nROUSSELL, ELI JAMES was born in 1977 and he registered to vote, giving his address as 9030 MCCLELLAN, DETROIT MICHIGAN 48213 U.S.A. (Voter ID number 108063256).", "\nVisit the detail page.", "\n\nROUSSELL, EVELYN ELAINE was born in 1936 and she registered to vote, giving her address as N 7560 INDIAN TRL, ENGADINE MICHIGAN 49827 U.S.A. (Voter ID number 107006898).", "\nVisit the detail page.", "\n\nROUSSELL, GEORGE HAROLD was born in 1933 and he registered to vote, giving his address as N 7560 INDIAN TRL, ENGADINE MICHIGAN 49827 U.S.A. (Voter ID number 106962778).", "\nVisit the detail page.", "\n\nROUSSELL, JOSEPH ARTHUR was born in 1935 and he registered to vote, giving his address as 2333 HIDDEN TRAIL DR, STERLING HEIGHTS MICHIGAN 48314 U.S.A. (Voter ID number 31549020).", "\nVisit the detail page.", "\n\nROUSSELL, RAMONA BEATRICE was born in 1977 and she registered to vote, giving her address as 14301 GLASTONBURY AVE, DETROIT MICHIGAN 48223 U.S.A. (Voter ID number 107899423).", "\nVisit the detail page.", "\n\nROUSSELL, REGINA VICTORIA was born in 1968 and she registered to vote, giving her address as 19379 CONCETTA DR, MACOMB MICHIGAN 48044 U.S.A. (Voter ID number 32337707).", "\nVisit the detail page.", "\n\nROUSSELL, SEAN PAUL was born in 1969 and he registered to vote, giving his address as 672 HERALD ST, PLYMOUTH MICHIGAN 48170 U.S.A. (Voter ID number 4001749805).", "\nVisit the detail page.", "\n\nROUSSELLE, AMANDA ANN was born in 1987 and she registered to vote, giving her address as 38741 LONG ST, HARRISON TOWNSHIP MICHIGAN 48045 U.S.A. (Voter ID number 31503870).", "\nVisit the detail page.", "\n\nROUSSELLE, CAROLYN MAE was born in 1929 and she registered to vote, giving her address as 80739 COUNTY ROAD 376, COLOMA MICHIGAN 49038 U.S.A. (Voter ID number 8646339).", "\nVisit the detail page.", "\n\nROUSSELLE, CONNIE MARIE was born in 1952 and she registered to vote, giving her address as 6561 US HIGHWAY 2, MANISTIQUE MICHIGAN 49854 U.S.A. (Voter ID number 105979412).", "\nVisit the detail page.", "\n\nROUSSELLE, COURTNEY ERWIN was born in 1981 and she registered to vote, giving her address as 2554 BRISTOL TER, SAINT JOSEPH MICHIGAN 49085 U.S.A. (Voter ID number 103249111).", "\nVisit the detail page.", "\n\nROUSSELLE, EDWARD LEAMAN was born in 1927 and he registered to vote, giving his address as 80739 COUNTY ROAD 376, COLOMA MICHIGAN 49038 U.S.A. (Voter ID number 8646343).", "\nVisit the detail page.", "\n\nROUSSELLE, KIMBERLY ANNE was born in 1972 and she registered to vote, giving her address as 23001 PLAYVIEW ST, SAINT CLAIR SHORES MICHIGAN 48082 U.S.A. (Voter ID number 32360392).", "\nVisit the detail page.", "\n\nROUSSELLE, ROD JOHN was born in 1963 and he registered to vote, giving his address as 1500 HELENA AVE, HARTLAND MICHIGAN 48353 U.S.A. (Voter ID number 107923985).", "\nVisit the detail page.", "\n\nROUSSELO, ANDREW ROBERT was born in 1978 and he registered to vote, giving his address as 3941 MEGANS RDG, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 4001619885).", "\nVisit the detail page.", "\n\nROUSSELO, DAVID CHARLES was born in 1987 and he registered to vote, giving his address as 5973 VANDERCOOK RD, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 103063543).", "\nVisit the detail page.", "\n\nROUSSELO, DAVID WILLIAM was born in 1978 and he registered to vote, giving his address as 128 BRIGHTON RD, HOWELL MICHIGAN 48843 U.S.A. (Voter ID number 103845522).", "\nVisit the detail page.", "\n\nROUSSELO, DEBRA ANN was born in 1957 and she registered to vote, giving her address as 683 W SUNSET DR, ROSCOMMON MICHIGAN 48653 U.S.A. (Voter ID number 9319541).", "\nVisit the detail page.", "\n\nROUSSELO, DENEE MORGAN was born in 1981 and she registered to vote, giving her address as 128 BRIGHTON RD, HOWELL MICHIGAN 48843 U.S.A. (Voter ID number 103836120).", "\nVisit the detail page.", "\n\nROUSSELO, GREGORY STEVEN was born in 1959 and he registered to vote, giving his address as 1800 TRIANGLE LAKE RD, HOWELL MICHIGAN 48843 U.S.A. (Voter ID number 8412578).", "\nVisit the detail page.", "\n\nROUSSELO, JEREMY CHRISTIAN was born in 1985 and he registered to vote, giving his address as 316 W LORAIN ST, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 31983993).", "\nVisit the detail page.", "\n\nROUSSELO, JOANN E. was born in 1937 and she registered to vote, giving her address as 1520 ROMAN DR, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 6131279).", "\nVisit the detail page.", "\n\nROUSSELO, JOSHUA MICHAEL was born in 1988 and he registered to vote, giving his address as 1078 S RAISINVILLE RD, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 32440848).", "\nVisit the detail page.", "\n\nROUSSELO, KENNETH LEO was born in 1932 and he registered to vote, giving his address as 4023 S CUSTER RD, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 6078472).", "\nVisit the detail page.", "\n\nROUSSELO, LINDA KAY was born in 1959 and she registered to vote, giving her address as 1800 TRIANGLE LAKE RD, HOWELL MICHIGAN 48843 U.S.A. (Voter ID number 8412577).", "\nVisit the detail page.", "\n\nROUSSELO, LINDA MARIE was born in 1955 and she registered to vote, giving her address as 3023 SWARTZ RD, LA SALLE MICHIGAN 48145 U.S.A. (Voter ID number 6554257).", "\nVisit the detail page.", "\n\nROUSSELO, LYNN MICHELLE was born in 1957 and she registered to vote, giving her address as 1050 STEWART RD, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 102209200).", "\nVisit the detail page.", "\n\nROUSSELO, MARCIE A. was born in 1948 and she registered to vote, giving her address as 3321 MAPLEWOOD ST, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 6758228).", "\nVisit the detail page.", "\n\nROUSSELO, MICHAEL ALLEN was born in 1982 and he registered to vote, giving his address as 4152 HAZEL AVE, LINCOLN PARK MICHIGAN 48146 U.S.A. (Voter ID number 105088539).", "\nVisit the detail page.", "\n\nROUSSELO, MICHAEL ANTHONY was born in 1956 and he registered to vote, giving his address as 8 BLUEGILL, BRIGHTON MICHIGAN 48114 U.S.A. (Voter ID number 105674645).", "\nVisit the detail page.", "\n\nROUSSELO, MICHELLE ELIZABETH was born in 1985 and she registered to vote, giving her address as 33451 KATHRYN ST, GARDEN CITY MICHIGAN 48135 U.S.A. (Voter ID number 107842359).", "\nVisit the detail page.", "\n\nROUSSELO, MICHELLE ELIZABETH was born in 1976 and she registered to vote, giving her address as 3023 SWARTZ RD, LA SALLE MICHIGAN 48145 U.S.A. (Voter ID number 33147630).", "\nVisit the detail page.", "\n\nROUSSELO, NELDA MAE was born in 1930 and she registered to vote, giving her address as 316 W LORAIN ST, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 5668238).", "\nVisit the detail page.", "\n\nROUSSELO, PATRICIA ANN was born in 1950 and she registered to vote, giving her address as 5973 VANDERCOOK RD, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 6086346).", "\nVisit the detail page.", "\n\nROUSSELO, PATRICIA SUE was born in 1961 and she registered to vote, giving her address as 23 LINSWOOD AVE, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 108657567).", "\nVisit the detail page.", "\n\nROUSSELO, RANDALL RAYMOND was born in 1960 and he registered to vote, giving his address as 683 W SUNSET DR, ROSCOMMON MICHIGAN 48653 U.S.A. (Voter ID number 106944579).", "\nVisit the detail page.", "\n\nROUSSELO, RICHARD JAMES was born in 1960 and he registered to vote, giving his address as 821 E SUBSTATION RD, TEMPERANCE MICHIGAN 48182 U.S.A. (Voter ID number 4000828021).", "\nVisit the detail page.", "\n\nROUSSELO, RICHARD JOHN was born in 1954 and he registered to vote, giving his address as 503 N MACOMB ST, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 5668239).", "\nVisit the detail page.", "\n\nROUSSELO, ROBERT D. was born in 1935 and he registered to vote, giving his address as 1520 ROMAN DR, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 6131280).", "\nVisit the detail page.", "\n\nROUSSELO, ROBERT MICHAEL was born in 1955 and he registered to vote, giving his address as 3023 SWARTZ RD, LA SALLE MICHIGAN 48145 U.S.A. (Voter ID number 6554258).", "\nVisit the detail page.", "\n\nROUSSELO, ROBERT WILLIAM was born in 1998 and he registered to vote, giving his address as 683W W SUNSET DR, ROSCOMMON MICHIGAN 48653 U.S.A. (Voter ID number 32556681).", "\nVisit the detail page.", "\n\nROUSSELO, SARAH REBECCA was born in 1985 and she registered to vote, giving her address as 5043 KAY DR, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 32773308).", "\nVisit the detail page.", "\n\nROUSSELO, SHIRLEY ANNE was born in 1933 and she registered to vote, giving her address as 4023 S CUSTER RD, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 6078473).", "\nVisit the detail page.", "\n\nROUSSELO, STEVEN MICHAEL was born in 1983 and he registered to vote, giving his address as 5043 KAY DR, MONROE MICHIGAN 48161 U.S.A. (Voter ID number 32773309).", "\nVisit the detail page.", "\n\nROUSSELO, TERRI LEE was born in 1964 and she registered to vote, giving her address as 7839 WISEMAN RD, LAMBERTVILLE MICHIGAN 48144 U.S.A. (Voter ID number 107875347).", "\nVisit the detail page.", "\n\nROUSSETY, ALDO GUY was born in 1963 and he registered to vote, giving his address as 146 LEGACY PARK CIR, DEARBORN HEIGHTS MICHIGAN 48127 U.S.A. (Voter ID number 570015298).", "\nVisit the detail page.", "\n\nROUSSETY, PATRICIA ANN was born in 1970 and she registered to vote, giving her address as 146 LEGACY PARK CIR, DEARBORN HEIGHTS MICHIGAN 48127 U.S.A. (Voter ID number 108208802).", "\nVisit the detail page.", "\n\nROUSSEV, NIKOLAY GUEORGUIEV was born in 1968 and he registered to vote, giving his address as 3355 BUCKINGHAM TRL, WEST BLOOMFIELD MICHIGAN 48323 U.S.A. (Voter ID number 705015681).", "\nVisit the detail page.", "\n\nROUSSEVA, BRANIMIRA ANGUELOVA was born in 1974 and she registered to vote, giving her address as 3355 BUCKINGHAM TRL, WEST BLOOMFIELD MICHIGAN 48323 U.S.A. (Voter ID number 705014283).", "\nVisit the detail page.", "\n\nROUSSEVA, MARIA N. was born in 1998 and she registered to vote, giving her address as 3355 BUCKINGHAM TRL, WEST BLOOMFIELD MICHIGAN 48323 U.S.A. (Voter ID number 705015538).", "\nVisit the detail page.", "\n\nROUSSEY, ALBERT PHILIP was born in 1929 and he registered to vote, giving his address as 23262 MYSTIC FOREST DR, NOVI MICHIGAN 48375 U.S.A. (Voter ID number 5841966).", "\nVisit the detail page.", "\n\nROUSSEY, ANTHONY was born in 1954 and he registered to vote, giving his address as 2718 MEADOWRIDGE DR SW, BYRON CENTER MICHIGAN 49315 U.S.A. (Voter ID number 6048167).", "\nVisit the detail page.", "\n\nROUSSEY, ASHLEA ANN was born in 1979 and she registered to vote, giving her address as 901 92ND ST SE, BYRON CENTER MICHIGAN 49315 U.S.A. (Voter ID number 106223860).", "\nVisit the detail page.", "\n\nROUSSEY, ASHLEE ANNEMARIE was born in 1995 and she registered to vote, giving her address as 840 GARLAND RD, ORTONVILLE MICHIGAN 48462 U.S.A. (Voter ID number 33286438).", "\nVisit the detail page.", "\n\nROUSSEY, BRANDON KYLE was born in 1977 and he registered to vote, giving his address as 887 BURR OAK RD, BRONSON MICHIGAN 49028 U.S.A. (Voter ID number 10387368).", "\nVisit the detail page.", "\n\nROUSSEY, BRIAN ALBERT was born in 1960 and he registered to vote, giving his address as 5100 DARON LN, WEST BLOOMFIELD MICHIGAN 48324 U.S.A. (Voter ID number 4735842).", "\nVisit the detail page.", "\n\nROUSSEY, BRIAN MATHEW was born in 1992 and he registered to vote, giving his address as 33325 GRAND RIVER AVE APT 2, FARMINGTON MICHIGAN 48336 U.S.A. (Voter ID number 33128806).", "\nVisit the detail page.", "\n\nROUSSEY, CAROL ANN was born in 1944 and she registered to vote, giving her address as 3078 CHANDLER AVE, LINCOLN PARK MICHIGAN 48146 U.S.A. (Voter ID number 3014054).", "\nVisit the detail page.", "\n\nROUSSEY, CAROLYN SUE was born in 1954 and she registered to vote, giving her address as 2718 MEADOWRIDGE DR SW, BYRON CENTER MICHIGAN 49315 U.S.A. (Voter ID number 6040047).", "\nVisit the detail page.", "\n\nROUSSEY, CHRISTIAN AARON was born in 1995 and he registered to vote, giving his address as 25 E SEBEWAING ST, SEBEWAING MICHIGAN 48759 U.S.A. (Voter ID number 108021455).", "\nVisit the detail page.", "\n\nROUSSEY, CHRISTIE ANN was born in 1975 and she registered to vote, giving her address as 26747 ROSE DR, FLAT ROCK MICHIGAN 48134 U.S.A. (Voter ID number 4003846605).", "\nVisit the detail page.", "\n\nROUSSEY, COLEEN MARIE was born in 1956 and she registered to vote, giving her address as 256 N SNOW PRAIRIE RD, COLDWATER MICHIGAN 49036 U.S.A. (Voter ID number 8686897).", "\nVisit the detail page.", "\n\nROUSSEY, DAVID ANTHONY was born in 1976 and he registered to vote, giving his address as 26747 ROSE DR, FLAT ROCK MICHIGAN 48134 U.S.A. (Voter ID number 4003865178).", "\nVisit the detail page.", "\n\nROUSSEY, DAVID LOUIS was born in 1960 and he registered to vote, giving his address as 2023 CHURCH PL, TRENTON MICHIGAN 48183 U.S.A. (Voter ID number 6160962).", "\nVisit the detail page.", "\n\nROUSSEY, DEANNA RAYE was born in 1960 and she registered to vote, giving her address as 2023 CHURCH PL, TRENTON MICHIGAN 48183 U.S.A. (Voter ID number 6161186).", "\nVisit the detail page.", "\n\nROUSSEY, DIANA LYNN was born in 1969 and she registered to vote, giving her address as 418 SHAFFMASTER AVE, BRONSON MICHIGAN 49028 U.S.A. (Voter ID number 7378279).", "\nVisit the detail page.", "\n\nROUSSEY, DONNA MARIA was born in 1978 and she registered to vote, giving her address as 707 RUFFNER AVE, BIRMINGHAM MICHIGAN 48009 U.S.A. (Voter ID number 106112939).", "\nVisit the detail page.", "\n\nROUSSEY, ELLEN DENISE was born in 1963 and she registered to vote, giving her address as 1488 ARDMOOR AVE, ANN ARBOR MICHIGAN 48103 U.S.A. (Voter ID number 1630012279).", "\nVisit the detail page.", "\n\nROUSSEY, JACK JOSEPH was born in 1949 and he registered to vote, giving his address as 3681 PEMBROKE ST, TRENTON MICHIGAN 48183 U.S.A. (Voter ID number 6165238).", "\nVisit the detail page.", "\n\nROUSSEY, JENNIFER BROOKE was born in 1972 and she registered to vote, giving her address as 215 HARAL AVE, STURGIS MICHIGAN 49091 U.S.A. (Voter ID number 104077980).", "\nVisit the detail page.", "\n\nROUSSEY, JONATHAN ALBERT was born in 1987 and he registered to vote, giving his address as 29721 HOY ST, LIVONIA MICHIGAN 48154 U.S.A. (Voter ID number 32285525).", "\nVisit the detail page.", "\n\nROUSSEY, JOSEPH ALLEN was born in 1962 and he registered to vote, giving his address as 426 FRANKLIN ST, BRONSON MICHIGAN 49028 U.S.A. (Voter ID number 7378275).", "\nVisit the detail page.", "\n\nROUSSEY, KAREN JANE was born in 1957 and she registered to vote, giving her address as 6075 WHISPERING MEADOWS DR, WHITE LAKE MICHIGAN 48383 U.S.A. (Voter ID number 8339322).", "\nVisit the detail page.", "\n\nROUSSEY, KATHRYN BROSNAN was born in 1963 and she registered to vote, giving her address as 3424 CONE AVE, ROCHESTER HILLS MICHIGAN 48309 U.S.A. (Voter ID number 108116984).", "\nVisit the detail page.", "\n\nROUSSEY, KEVIN LYNN was born in 1963 and he registered to vote, giving his address as 13332 CALLENDER ST, SOUTHGATE MICHIGAN 48195 U.S.A. (Voter ID number 33157220).", "\nVisit the detail page.", "\n\nROUSSEY, KIMBERLY SUE was born in 1962 and she registered to vote, giving her address as 48389 MANOR BRIDGE DR, CANTON MICHIGAN 48188 U.S.A. (Voter ID number 108202721).", "\nVisit the detail page.", "\n\nROUSSEY, LANORA was born in 1964 and she registered to vote, giving her address as 426 FRANKLIN ST, BRONSON MICHIGAN 49028 U.S.A. (Voter ID number 103579365).", "\nVisit the detail page.", "\n\nROUSSEY, LISA ANN was born in 1963 and she registered to vote, giving her address as 21628 TULANE AVE, FARMINGTON HILLS MICHIGAN 48336 U.S.A. (Voter ID number 3108058).", "\nVisit the detail page.", "\n\nROUSSEY, LISA ANNE was born in 1965 and she registered to vote, giving her address as 13332 CALLENDER ST, SOUTHGATE MICHIGAN 48195 U.S.A. (Voter ID number 108051681).", "\nVisit the detail page.", "\n\nROUSSEY, LYLE JAMES was born in 1941 and he registered to vote, giving his address as 4190 W CEDAR LAKE RD, GREENBUSH MICHIGAN 48738 U.S.A. (Voter ID number 104282991).", "\nVisit the detail page.", "\n\nROUSSEY, MARK ALLEN was born in 1959 and he registered to vote, giving his address as 4006 PEBBLE RIDGE CT, FENTON MICHIGAN 48430 U.S.A. (Voter ID number 7046187).", "\nVisit the detail page.", "\n\nROUSSEY, MARY was born in 1949 and she registered to vote, giving her address as 3681 PEMBROKE ST, TRENTON MICHIGAN 48183 U.S.A. (Voter ID number 6165239).", "\nVisit the detail page.", "\n\nROUSSEY, MARY ELIZABETH was born in 1953 and she registered to vote, giving her address as 31183 SENECA LN, NOVI MICHIGAN 48377 U.S.A. (Voter ID number 3792167).", "\nVisit the detail page.", "\n\nROUSSEY, NICHOLAS JOSEPH was born in 1978 and he registered to vote, giving his address as 707 RUFFNER AVE, BIRMINGHAM MICHIGAN 48009 U.S.A. (Voter ID number 105944892).", "\nVisit the detail page.", "\n\nROUSSEY, NICOLE M. was born in 1995 and she registered to vote, giving her address as 5100 DARON LN, WEST BLOOMFIELD MICHIGAN 48324 U.S.A. (Voter ID number 705016050).", "\nVisit the detail page.", "\n\nROUSSEY, PATRICK JOSEPH was born in 1953 and he registered to vote, giving his address as 801 N UNION CITY RD, COLDWATER MICHIGAN 49036 U.S.A. (Voter ID number 32417526).", "\nVisit the detail page.", "\n\nROUSSEY, PATRICK JOSEPH was born in 1971 and he registered to vote, giving his address as 215 HARAL AVE, STURGIS MICHIGAN 49091 U.S.A. (Voter ID number 103717230).", "\nVisit the detail page.", "\n\nROUSSEY, PAUL ANTHONY was born in 1976 and he registered to vote, giving his address as 901 92ND ST SE, BYRON CENTER MICHIGAN 49315 U.S.A. (Voter ID number 106220122).", "\nVisit the detail page.", "\n\nROUSSEY, PHILIP EDWARD was born in 1962 and he registered to vote, giving his address as 9054 LOUISE ST, LIVONIA MICHIGAN 48150 U.S.A. (Voter ID number 33030344).", "\nVisit the detail page.", "\n\nROUSSEY, RACHEL ELIZABETH was born in 1982 and she registered to vote, giving her address as 9316A MARYLAND ST, OSCODA MICHIGAN 48750 U.S.A. (Voter ID number 31105894).", "\nVisit the detail page.", "\n\nROUSSEY, REBECCA EMILY was born in 1988 and she registered to vote, giving her address as 29721 HOY ST, LIVONIA MICHIGAN 48154 U.S.A. (Voter ID number 32114518).", "\nVisit the detail page.", "\n\nROUSSEY, ROBERT GERARD was born in 1958 and he registered to vote, giving his address as 6075 WHISPERING MEADOWS DR, WHITE LAKE MICHIGAN 48383 U.S.A. (Voter ID number 5704030).", "\nVisit the detail page.", "\n\nROUSSEY, SALLY ANN was born in 1954 and she registered to vote, giving her address as 801 N UNION CITY RD, COLDWATER MICHIGAN 49036 U.S.A. (Voter ID number 32517234).", "\nVisit the detail page.", "\n\nROUSSEY, TAMARA LOUISE was born in 1977 and she registered to vote, giving her address as 887 BURR OAK RD, BRONSON MICHIGAN 49028 U.S.A. (Voter ID number 10387388).", "\nVisit the detail page.", "\n\nROUSSEY, TIMOTHY PAUL was born in 1962 and he registered to vote, giving his address as 3424 CONE AVE, ROCHESTER HILLS MICHIGAN 48309 U.S.A. (Voter ID number 108169174).", "\nVisit the detail page.", "\n\nROUSSEY, TYLER MICHAEL was born in 1997 and he registered to vote, giving his address as 215 HARAL AVE, STURGIS MICHIGAN 49091 U.S.A. (Voter ID number 32716688).", "\nVisit the detail page.", "\n\nROUSSEY, WILLIAM EDWARD was born in 1932 and he registered to vote, giving his address as 3410 COUNTRY VIEW RD, KALAMAZOO MICHIGAN 49004 U.S.A. (Voter ID number 32179125).", "\nVisit the detail page.", "\n\nROUSSI, CHRISTOPHER JOHN was born in 1955 and he registered to vote, giving his address as 729 W SOUTH ST, KALAMAZOO MICHIGAN 49007 U.S.A. (Voter ID number 4001704239).", "\nVisit the detail page.", "\n\nROUSSIN, ALEX was born in 1976 and he registered to vote, giving his address as 7512 COOLIDGE, CENTER LINE MICHIGAN 48015 U.S.A. (Voter ID number 106429990).", "\nVisit the detail page.", "\n\nROUSSIN, ALEXANDRIA LYNN was born in 1991 and she registered to vote, giving her address as 29619 MANHATTAN ST, SAINT CLAIR SHORES MICHIGAN 48082 U.S.A. (Voter ID number 107274960).", "\nVisit the detail page.", "\n\nROUSSIN, ALLEN MARTIN was born in 1960 and he registered to vote, giving his address as 6628 CALEDONIA RD, HUBBARD LAKE MICHIGAN 49747 U.S.A. (Voter ID number 8521332).", "\nVisit the detail page.", "\n\nROUSSIN, AMIEE ANNE was born in 1986 and she registered to vote, giving her address as 1119 1ST AVE APT 1, CADILLAC MICHIGAN 49601 U.S.A. (Voter ID number 105831232).", "\nVisit the detail page.", "\n\nROUSSIN, ARTHUR JOEL was born in 1944 and he registered to vote, giving his address as 5759 W KENDALL RD, MANISTIQUE MICHIGAN 49854 U.S.A. (Voter ID number 108918923).", "\nVisit the detail page.", "\n\nROUSSIN, BARBARA JEAN was born in 1952 and she registered to vote, giving her address as 50181 PEPPER TREE DR, MACOMB MICHIGAN 48044 U.S.A. (Voter ID number 350003134).", "\nVisit the detail page.", "\n\nROUSSIN, BONNIE was born in 1953 and she registered to vote, giving her address as 20161 ROGGE ST, DETROIT MICHIGAN 48234 U.S.A. (Voter ID number 330856).", "\nVisit the detail page.", "\n\nROUSSIN, BRIAN MATTHEW was born in 1985 and he registered to vote, giving his address as 10702 LAKE AVE, OSSINEKE MICHIGAN 49766 U.S.A. (Voter ID number 109046969).", "\nVisit the detail page.", "\n\nROUSSIN, CAROL LYNN was born in 1950 and she registered to vote, giving her address as 2470 MAYFLOWER RD, NILES MICHIGAN 49120 U.S.A. (Voter ID number 6387895).", "\nVisit the detail page.", "\n\nROUSSIN, CAROLYN JEAN was born in 1942 and she registered to vote, giving her address as 7576 AMANDA CIR, WASHINGTON MICHIGAN 48094 U.S.A. (Voter ID number 345004686).", "\nVisit the detail page.", "\n\nROUSSIN, CHRISTOPHER WILLIAM was born in 1969 and he registered to vote, giving his address as 7511 COOLIDGE, CENTER LINE MICHIGAN 48015 U.S.A. (Voter ID number 9847816).", "\nVisit the detail page.", "\n\nROUSSIN, CONSTANCE CHRISTINE was born in 1950 and she registered to vote, giving her address as 39443 PARKLAWN DR, STERLING HEIGHTS MICHIGAN 48313 U.S.A. (Voter ID number 31564408).", "\nVisit the detail page.", "\n\nROUSSIN, DANA ANN was born in 1965 and she registered to vote, giving her address as 506 MARQUETTE ST, DURAND MICHIGAN 48429 U.S.A. (Voter ID number 107192863).", "\nVisit the detail page.", "\n\nROUSSIN, DANIELLE LEIGH was born in 1978 and she registered to vote, giving her address as 15822 VAN METER DR, MACOMB MICHIGAN 48044 U.S.A. (Voter ID number 106407777).", "\nVisit the detail page.", "\n\nROUSSIN, DANIEL ROBERT was born in 1944 and he registered to vote, giving his address as 34193 SUMMERHILL LN, NEW BALTIMORE MICHIGAN 48047 U.S.A. (Voter ID number 31798134).", "\nVisit the detail page.", "\n\nROUSSIN, DARRELL ARTHUR was born in 1956 and he registered to vote, giving his address as 19781 WOODVIEW DR, CLINTON TOWNSHIP MICHIGAN 48038 U.S.A. (Voter ID number 3535782).", "\nVisit the detail page.", "\n\nROUSSIN, DAVID BRUCE was born in 1952 and he registered to vote, giving his address as 3313 S DICKERSON RD, LAKE CITY MICHIGAN 49651 U.S.A. (Voter ID number 106075216).", "\nVisit the detail page.", "\n\nROUSSIN, DENISE A. was born in 1959 and she registered to vote, giving her address as 78455 KIDDER RD, ROMEO MICHIGAN 48065 U.S.A. (Voter ID number 725060).", "\nVisit the detail page.", "\n\nROUSSIN, DONNA LOU was born in 1957 and she registered to vote, giving her address as 10702 LAKE AVE, OSSINEKE MICHIGAN 49766 U.S.A. (Voter ID number 4002085876).", "\nVisit the detail page.", "\n\nROUSSIN, EMILY ANN was born in 1981 and she registered to vote, giving her address as 641 WALL AVE, ALPENA MICHIGAN 49707 U.S.A. (Voter ID number 31944864).", "\nVisit the detail page.", "\n\nROUSSIN, ERIC JOHN was born in 1964 and he registered to vote, giving his address as 504 S WASHINGTON AVE, LUDINGTON MICHIGAN 49431 U.S.A. (Voter ID number 203693).", "\nVisit the detail page.", "\n\nROUSSIN, FREDERICK THOMAS was born in 1947 and he registered to vote, giving his address as 2470 MAYFLOWER RD, NILES MICHIGAN 49120 U.S.A. (Voter ID number 6475606).", "\nVisit the detail page.", "\n\nROUSSIN, GARY ALFRED was born in 1959 and he registered to vote, giving his address as 10702 LAKE AVE, OSSINEKE MICHIGAN 49766 U.S.A. (Voter ID number 1875001766).", "\nVisit the detail page.", "\n\nROUSSIN, HANNAH MARGARET was born in 1998 and she registered to vote, giving her address as 109 WATER ST, LUDINGTON MICHIGAN 49431 U.S.A. (Voter ID number 32788810).", "\nVisit the detail page.", "\n\nROUSSIN, HOLLY NIKOLE was born in 1977 and she registered to vote, giving her address as 46 W SOUTH ST, HILLSDALE MICHIGAN 49242 U.S.A. (Voter ID number 104473990).", "\nVisit the detail page.", "\n\nROUSSIN, JASON ROBERT-DENNIS was born in 1985 and he registered to vote, giving his address as 795 MEADOW LN, HARBOR SPRINGS MICHIGAN 49740 U.S.A. (Voter ID number 105185809).", "\nVisit the detail page.", "\n\nROUSSIN, JAY L. was born in 1968 and he registered to vote, giving his address as 109 WATER ST, LUDINGTON MICHIGAN 49431 U.S.A. (Voter ID number 215001356).", "\nVisit the detail page.", "\n\nROUSSIN, JENNIFER LYN was born in 1985 and she registered to vote, giving her address as 53396 MEADOW CREEK DR, NEW BALTIMORE MICHIGAN 48047 U.S.A. (Voter ID number 108656686).", "\nVisit the detail page.", "\n\nROUSSIN, JOHN ALLEN was born in 1982 and he registered to vote, giving his address as 641 WALL AVE, ALPENA MICHIGAN 49707 U.S.A. (Voter ID number 32539727).", "\nVisit the detail page.", "\n\nROUSSIN, JOHN ARTHUR was born in 1971 and he registered to vote, giving his address as 16 ARROWHEAD DR, MARQUETTE MICHIGAN 49855 U.S.A. (Voter ID number 4002828791).", "\nVisit the detail page.", "\n\nROUSSIN, JONATHAN RICHARD was born in 1989 and he registered to vote, giving his address as 26329 BIRCHCREST DR, NEW BALTIMORE MICHIGAN 48051 U.S.A. (Voter ID number 31570713).", "\nVisit the detail page.", "\n\nROUSSIN, JOSEPH GENE was born in 1935 and he registered to vote, giving his address as 506 MARQUETTE ST, DURAND MICHIGAN 48429 U.S.A. (Voter ID number 5294890).", "\nVisit the detail page.", "\n\nROUSSIN, KAYLA MARIE was born in 1988 and she registered to vote, giving her address as 795 MEADOW LN, HARBOR SPRINGS MICHIGAN 49740 U.S.A. (Voter ID number 106305822).", "\nVisit the detail page.", "\n\nROUSSIN, KEVIN MATTHEW was born in 1978 and he registered to vote, giving his address as 15822 VAN METER DR, MACOMB MICHIGAN 48044 U.S.A. (Voter ID number 106554987).", "\nVisit the detail page.", "\n\nROUSSIN, LAUREN NICOLE was born in 1985 and she registered to vote, giving her address as 16264 TOURAINE DR, CLINTON TOWNSHIP MICHIGAN 48038 U.S.A. (Voter ID number 108623907).", "\nVisit the detail page.", "\n\nROUSSIN, LINDA LEE was born in 1955 and she registered to vote, giving her address as 19781 WOODVIEW DR, CLINTON TOWNSHIP MICHIGAN 48038 U.S.A. (Voter ID number 3541857).", "\nVisit the detail page.", "\n\nROUSSIN, LINDSAY ASHLEY was born in 1985 and she registered to vote, giving her address as 19781 WOODVIEW DR, CLINTON TOWNSHIP MICHIGAN 48038 U.S.A. (Voter ID number 107231734).", "\nVisit the detail page.", "\n\nROUSSIN, LISA ANN was born in 1980 and she registered to vote, giving her address as 514 PORTAGE AVE, THREE RIVERS MICHIGAN 49093 U.S.A. (Voter ID number 102490576).", "\nVisit the detail page.", "\n\nROUSSIN, MARIE FRANCES was born in 1968 and she registered to vote, giving her address as 109 WATER ST, LUDINGTON MICHIGAN 49431 U.S.A. (Voter ID number 5245530).", "\nVisit the detail page.", "\n\nROUSSIN, MARJORIE MARY was born in 1966 and she registered to vote, giving her address as 8563 JANIS ST, SHELBY TOWNSHIP MICHIGAN 48317 U.S.A. (Voter ID number 31201793).", "\nVisit the detail page.", "\n\nROUSSIN, MARY LOU was born in 1936 and she registered to vote, giving her address as 7511 COOLIDGE, CENTER LINE MICHIGAN 48015 U.S.A. (Voter ID number 5158162).", "\nVisit the detail page.", "\n\nROUSSIN, MATTHEW DARRELL was born in 1983 and he registered to vote, giving his address as 53396 MEADOW CREEK DR, NEW BALTIMORE MICHIGAN 48047 U.S.A. (Voter ID number 107904934).", "\nVisit the detail page.", "\n\nROUSSIN, MELISSA BETTY was born in 1978 and she registered to vote, giving her address as 9145 HILLCREST DR LOT 23, ZEELAND MICHIGAN 49464 U.S.A. (Voter ID number 4004357855).", "\nVisit the detail page.", "\n\nROUSSIN, MICHAEL ANDREW was born in 1979 and he registered to vote, giving his address as 514 PORTAGE AVE, THREE RIVERS MICHIGAN 49093 U.S.A. (Voter ID number 102539169).", "\nVisit the detail page.", "\n\nROUSSIN, MOLLY ERIN was born in 1985 and she registered to vote, giving her address as 355 COPPER ST, NEGAUNEE MICHIGAN 49866 U.S.A. (Voter ID number 104589415).", "\nVisit the detail page.", "\n\nROUSSIN, PATRICIA ANN was born in 1936 and she registered to vote, giving her address as 506 MARQUETTE ST, DURAND MICHIGAN 48429 U.S.A. (Voter ID number 5294893).", "\nVisit the detail page.", "\n\nROUSSIN, PATRICIA MARY was born in 1964 and she registered to vote, giving her address as 26025 MARINERS PT, NEW BALTIMORE MICHIGAN 48051 U.S.A. (Voter ID number 107754984).", "\nVisit the detail page.", "\n\nROUSSIN, PATTI MILES was born in 1954 and she registered to vote, giving her address as 43589 RIVERBEND DR N, CLINTON TOWNSHIP MICHIGAN 48038 U.S.A. (Voter ID number 31392431).", "\nVisit the detail page.", "\n\nROUSSIN, RANDALL ALBERT was born in 1959 and he registered to vote, giving his address as 8031 E LAKE RD, TWIN LAKE MICHIGAN 49457 U.S.A. (Voter ID number 107495984).", "\nVisit the detail page.", "\n\nROUSSIN, RICHARD G. was born in 1953 and he registered to vote, giving his address as 302 MCKINLEY AVE, ALPENA MICHIGAN 49707 U.S.A. (Voter ID number 990000097).", "\nVisit the detail page.", "\n\nROUSSIN, RICHARD JAMES was born in 1974 and he registered to vote, giving his address as 1419 MAPLE AVE, MONROE MICHIGAN 48162 U.S.A. (Voter ID number 103646309).", "\nVisit the detail page.", "\n\nROUSSIN, ROBERT DARRELL was born in 1957 and he registered to vote, giving his address as 7511 COOLIDGE, CENTER LINE MICHIGAN 48015 U.S.A. (Voter ID number 1210000996).", "\nVisit the detail page.", "\n\nROUSSIN, ROBIN DENISE was born in 1958 and she registered to vote, giving her address as 21908 LAKEVIEW ST, SAINT CLAIR SHORES MICHIGAN 48080 U.S.A. (Voter ID number 3381592).", "\nVisit the detail page.", "\n\nROUSSIN, STEVEN MICHAEL was born in 1988 and he registered to vote, giving his address as 231 SUPERIOR ST, ROGERS CITY MICHIGAN 49779 U.S.A. (Voter ID number 103235074).", "\nVisit the detail page.", "\n\nROUTHEAUX, KENNETH RAE was born in 1981 and he registered to vote, giving his address as 5973 FAIRWAY CIR, KALAMAZOO MICHIGAN 49009 U.S.A. (Voter ID number 107463541).", "\nVisit the detail page.", "\n\nROUTHEAUX, KENNY ROBB was born in 1957 and he registered to vote, giving his address as 116 PAULSON RD, IRON RIVER MICHIGAN 49935 U.S.A. (Voter ID number 8101150).", "\nVisit the detail page.", "\n\nROUTHEAUX, LEE ANN was born in 1962 and she registered to vote, giving her address as 116 PAULSON RD, IRON RIVER MICHIGAN 49935 U.S.A. (Voter ID number 8101153).", "\nVisit the detail page.", "\n\nROUTHEAUX, LORRAINE MARIE was born in 1934 and she registered to vote, giving her address as W 7247 NUMBER 3 LN, MENOMINEE MICHIGAN 49858 U.S.A. (Voter ID number 107927567).", "\nVisit the detail page.", "\n\nROUTHEAUX, MATHEW JUSTIN was born in 1989 and he registered to vote, giving his address as 321 W BOYINGTON ST APT 2, IRON RIVER MICHIGAN 49935 U.S.A. (Voter ID number 109029479).", "\nVisit the detail page.", "\n\nROUTHEAUX, MELISSA MARIE was born in 1993 and she registered to vote, giving her address as 21785 205TH AVE, PARIS MICHIGAN 49338 U.S.A. (Voter ID number 107621940).", "\nVisit the detail page.", "\n\nROUTHEAUX, RANDAL DUANE was born in 1962 and he registered to vote, giving his address as 208 EUCLID ST, SAINT LOUIS MICHIGAN 48880 U.S.A. (Voter ID number 6731851).", "\nVisit the detail page.", "\n\nROUTHEAUX, RICKY ALLEN was born in 1968 and he registered to vote, giving his address as 4300 STARVILLE RD, CHINA MICHIGAN 48054 U.S.A. (Voter ID number 3988604).", "\nVisit the detail page.", "\n\nROUTHEAUX, RONALD JAMES was born in 1949 and he registered to vote, giving his address as 1849 MARLETTE RD, SMITHS CREEK MICHIGAN 48074 U.S.A. (Voter ID number 5871649).", "\nVisit the detail page.", "\n\nROUTHEAUX, RYAN DENNIS was born in 1979 and he registered to vote, giving his address as N 10389 LAKE RD, IRONWOOD MICHIGAN 49938 U.S.A. (Voter ID number 31520805).", "\nVisit the detail page.", "\n\nROUTHEAUX, SAMANTHA KAY was born in 1988 and she registered to vote, giving her address as 1309 CONCORD PLACE DR APT 3A, KALAMAZOO MICHIGAN 49009 U.S.A. (Voter ID number 31567179).", "\nVisit the detail page.", "\n\nROUTHEAUX, SAMUEL DAVID was born in 1980 and he registered to vote, giving his address as 48606 LAKEVIEW E, SHELBY TOWNSHIP MICHIGAN 48317 U.S.A. (Voter ID number 104783780).", "\nVisit the detail page.", "\n\nROUTHEAUX, SARA ELIZABETH was born in 1980 and she registered to vote, giving her address as 48606 LAKEVIEW E, SHELBY TOWNSHIP MICHIGAN 48317 U.S.A. (Voter ID number 104615651).", "\nVisit the detail page.", "\n\nROUTHEAUX, SHEILA JOAN was born in 1951 and she registered to vote, giving her address as 1511 CONTINENTAL CT, PORT HURON MICHIGAN 48060 U.S.A. (Voter ID number 32306868).", "\nVisit the detail page.", "\n\nROUTHEAUX, SUSAN LYNN was born in 1968 and she registered to vote, giving her address as 4300 STARVILLE RD, CHINA MICHIGAN 48054 U.S.A. (Voter ID number 9029121).", "\nVisit the detail page.", "\n\nROUTHEAUX, TIMOTHY ROSS was born in 1983 and he registered to vote, giving his address as E 5045 MOUNTAIN VIEW RD, IRONWOOD MICHIGAN 49938 U.S.A. (Voter ID number 108311015).", "\nVisit the detail page.", "\n\nROUTHEAUX, TONYA RANDAL was born in 1990 and she registered to vote, giving her address as 9064 N BLAIR RD, BRECKENRIDGE MICHIGAN 48615 U.S.A. (Voter ID number 32073724).", "\nVisit the detail page.", "\n\nROUTHEAUX, TRISH MARIE was born in 1979 and she registered to vote, giving her address as 1401 17TH AVE S, ESCANABA MICHIGAN 49829 U.S.A. (Voter ID number 31346681).", "\nVisit the detail page.", "\n\nROUTHEAUX, VALERIE LYNN was born in 1964 and she registered to vote, giving her address as 208 EUCLID ST, SAINT LOUIS MICHIGAN 48880 U.S.A. (Voter ID number 6754339).", "\nVisit the detail page.", "\n\nROUTHEAUX, VANESSA LYNN was born in 1982 and she registered to vote, giving her address as 712 W GENESEE ST, IRON RIVER MICHIGAN 49935 U.S.A. (Voter ID number 32397305).", "\nVisit the detail page.", "\n\nROUTHEAUX, WENDY RUTH was born in 1977 and she registered to vote, giving her address as E 5045 MOUNTAIN VIEW RD, IRONWOOD MICHIGAN 49938 U.S.A. (Voter ID number 31513687).", "\nVisit the detail page.", "\n\nROUTHIEAUX, JOSHUA JEFFREY was born in 1985 and he registered to vote, giving his address as 4375 N WILLIAMSTON RD, WILLIAMSTON MICHIGAN 48895 U.S.A. (Voter ID number 32272382).", "\nVisit the detail page.", "\n\nROUTHIEAUX, JULIA LORRAINE was born in 1989 and she registered to vote, giving her address as 4375 N WILLIAMSTON RD, WILLIAMSTON MICHIGAN 48895 U.S.A. (Voter ID number 31324873).", "\nVisit the detail page.", "\n\nROUTHIER, TORY DIANE was born in 1985 and she registered to vote, giving her address as 7120 OAKLEY PARK, WEST BLOOMFIELD MICHIGAN 48323 U.S.A. (Voter ID number 33218778).", "\nVisit the detail page.", "\n\nROUTHIER, WALTER ALFRED was born in 1942 and she registered to vote, giving her address as 2434 GOLFVIEW CIR, FENTON MICHIGAN 48430 U.S.A. (Voter ID number 860003483).", "\nVisit the detail page.", "\n\nROUTHIER, WENDY JEANNE was born in 1953 and she registered to vote, giving her address as 14844 S JOHNSON RD, RUDYARD MICHIGAN 49780 U.S.A. (Voter ID number 4001002014).", "\nVisit the detail page.", "\n\nROUTHIER, WILLIAM ANDREW was born in 1946 and he registered to vote, giving his address as 3606 BIRCH RUN RD, MILLINGTON MICHIGAN 48746 U.S.A. (Voter ID number 105674713).", "\nVisit the detail page.", "\n\nROUTHIER-LASKOSKY, MELODY MARIE was born in 1979 and she registered to vote, giving her address as 900 LONG BLVD APT 601, LANSING MICHIGAN 48911 U.S.A. (Voter ID number 108883752).", "\nVisit the detail page.", "\n\nROUTHU, ANIL KUMAR was born in 1975 and he registered to vote, giving his address as 45191 BARTLETT DR, NOVI MICHIGAN 48377 U.S.A. (Voter ID number 33256148).", "\nVisit the detail page.", "\n\nROUTHU, MAMATHA was born in 1969 and she registered to vote, giving her address as 45278 BARTLETT DR, NOVI MICHIGAN 48377 U.S.A. (Voter ID number 755017338).", "\nVisit the detail page.", "\n\nROUTHU, PAVANI MAMIDI was born in 1984 and she registered to vote, giving her address as 45191 BARTLETT DR, NOVI MICHIGAN 48377 U.S.A. (Voter ID number 33255777).", "\nVisit the detail page.", "\n\nROUTIN, DEBORAH LYNN was born in 1950 and she registered to vote, giving her address as 25233 LYNDON, REDFORD MICHIGAN 48239 U.S.A. (Voter ID number 2558222).", "\nVisit the detail page.", "\n\nROUTIN, KENNETH RAY was born in 1948 and he registered to vote, giving his address as 25233 LYNDON, REDFORD MICHIGAN 48239 U.S.A. (Voter ID number 4000533213).", "\nVisit the detail page.", "\n\nROUTIN, KENNETT RAY was born in 1975 and he registered to vote, giving his address as 65 E HURON ST, PONTIAC MICHIGAN 48342 U.S.A. (Voter ID number 31198957).", "\nVisit the detail page.", "\n\nROUTIN, RACHEL MARIE was born in 1997 and she registered to vote, giving her address as 29916 JOHN HAUK ST, GARDEN CITY MICHIGAN 48135 U.S.A. (Voter ID number 955005699).", "\nVisit the detail page.", "\n\nROUTIN, STEPHANIE BROOK was born in 1977 and she registered to vote, giving her address as 25233 LYNDON, REDFORD MICHIGAN 48239 U.S.A. (Voter ID number 31401292).", "\nVisit the detail page.", "\n\nROUTIN, TRACY LYN was born in 1969 and she registered to vote, giving her address as 29916 JOHN HAUK ST, GARDEN CITY MICHIGAN 48135 U.S.A. (Voter ID number 108035587).", "\nVisit the detail page.", "\n\nROUTION, BRUCE JOSEPH was born in 1991 and he registered to vote, giving his address as 2735 S HADLEY RD, ORTONVILLE MICHIGAN 48462 U.S.A. (Voter ID number 108839792).", "\nVisit the detail page.", "\n\nROUTION, ROBERT JOSEPH was born in 1966 and he registered to vote, giving his address as 22010 VILLAGE WEST DR N, LAPEER MICHIGAN 48446 U.S.A. (Voter ID number 107191221).", "\nVisit the detail page.", "\n\nROUTION, TESIA MARIE was born in 1990 and she registered to vote, giving her address as 9 EAGLE VISTA LN, LAKE ORION MICHIGAN 48359 U.S.A. (Voter ID number 107685186).", "\nVisit the detail page.", "\n\nROUTLEDGE, CASEY JOSEPH was born in 1993 and he registered to vote, giving his address as 539 NORWOOD AVE SE, GRAND RAPIDS MICHIGAN 49506 U.S.A. (Voter ID number 32509622).", "\nVisit the detail page.", "\n\nROUTLEDGE, DAWN MICHELLE was born in 1971 and she registered to vote, giving her address as 5520 CARD RD, READING MICHIGAN 49274 U.S.A. (Voter ID number 9475659).", "\nVisit the detail page.", "\n\nROUTLEDGE, ERIN ELIZABETH was born in 1998 and she registered to vote, giving her address as 3531 OAK MEADOWS CT, COMMERCE TOWNSHIP MICHIGAN 48382 U.S.A. (Voter ID number 32588439).", "\nVisit the detail page.", "\n\nROUTLEDGE, KARI ANN was born in 1965 and she registered to vote, giving her address as 3531 OAK MEADOWS CT, COMMERCE TOWNSHIP MICHIGAN 48382 U.S.A. (Voter ID number 9682236).", "\nVisit the detail page.", "\n\nROUTLEDGE, MADISON MARIE was born in 1996 and she registered to vote, giving her address as 5520W CARD RD, READING MICHIGAN 49274 U.S.A. (Voter ID number 31684759).", "\nVisit the detail page.", "\n\nROUTLEDGE, MARK DAVID was born in 1962 and he registered to vote, giving his address as 3531 OAK MEADOWS CT, COMMERCE TOWNSHIP MICHIGAN 48382 U.S.A. (Voter ID number 9682237).", "\nVisit the detail page.", "\n\nROUTSON, DAVID PAUL was born in 1949 and he registered to vote, giving his address as 619 RILEY ST, DUNDEE MICHIGAN 48131 U.S.A. (Voter ID number 6077647).", "\nVisit the detail page.", "\n\nROUTSON, GEOFFREY LINN was born in 1954 and he registered to vote, giving his address as 6625 CRESCENT GRN, WEST BLOOMFIELD MICHIGAN 48322 U.S.A. (Voter ID number 31332934).", "\nVisit the detail page.", "\n\nROUTSON, GREGORY SCOTT was born in 1955 and he registered to vote, giving his address as 1121 N WAVERLY RD, LANSING MICHIGAN 48917 U.S.A. (Voter ID number 9774306).", "\nVisit the detail page.", "\n\nROUTSON, JAMES DOUGLAS was born in 1955 and he registered to vote, giving his address as 2521 S CAMPBELL RD, WEST BRANCH MICHIGAN 48661 U.S.A. (Voter ID number 6865426).", "\nVisit the detail page.", "\n\nROUTSON, JEANETTE ADELE-WEISIGER was born in 1981 and she registered to vote, giving her address as 1384 MESA ST, YPSILANTI MICHIGAN 48197 U.S.A. (Voter ID number 103294474).", "\nVisit the detail page.", "\n\nROUTSON, JEFFREY DAVID was born in 1947 and he registered to vote, giving his address as 2576 TUTTLE RD, MASON MICHIGAN 48854 U.S.A. (Voter ID number 9169249).", "\nVisit the detail page.", "\n\nROUTSON, JEREMY GUY was born in 1977 and he registered to vote, giving his address as 1610 CRESCENT DR, FLINT MICHIGAN 48503 U.S.A. (Voter ID number 107588091).", "\nVisit the detail page.", "\n\nROUTSON, JULIA CATHERINE was born in 1943 and she registered to vote, giving her address as 18556 FORRESTER RD, HUDSON MICHIGAN 49247 U.S.A. (Voter ID number 7700538).", "\nVisit the detail page.", "\n\nROUTSON, KAREN GOODRICH was born in 1947 and she registered to vote, giving her address as 2576 TUTTLE RD, MASON MICHIGAN 48854 U.S.A. (Voter ID number 9169250).", "\nVisit the detail page.", "\n\nROUTSON, KAREN SUE was born in 1952 and she registered to vote, giving her address as 619 RILEY ST, DUNDEE MICHIGAN 48131 U.S.A. (Voter ID number 6079398).", "\nVisit the detail page.", "\n\nROUTSON, LINDA KAY was born in 1947 and she registered to vote, giving her address as 71056 BRANDE CREEK DR, EDWARDSBURG MICHIGAN 49112 U.S.A. (Voter ID number 7610659).", "\nVisit the detail page.", "\n\nROUTSON, MARY ANN was born in 1958 and she registered to vote, giving her address as 6625 CRESCENT GRN, WEST BLOOMFIELD MICHIGAN 48322 U.S.A. (Voter ID number 705014284).", "\nVisit the detail page.", "\n\nROUTSON, MATTHEW EUGENE was born in 1971 and he registered to vote, giving his address as 6405 WHITEFORD CENTER RD, LAMBERTVILLE MICHIGAN 48144 U.S.A. (Voter ID number 103638855).", "\nVisit the detail page.", "\n\nROUTSON, NIEKO ALLEN was born in 1996 and he registered to vote, giving his address as 36215 SCHLEY ST, WESTLAND MICHIGAN 48186 U.S.A. (Voter ID number 32657674).", "\nVisit the detail page.", "\n\nROUTSON, OLIVE MARTINA was born in 1921 and she registered to vote, giving her address as 819 GROVER ST, OWOSSO MICHIGAN 48867 U.S.A. (Voter ID number 1075003765).", "\nVisit the detail page.", "\n\nROUTSON, RAY ROBERT was born in 1940 and he registered to vote, giving his address as 18556 FORRESTER RD, HUDSON MICHIGAN 49247 U.S.A. (Voter ID number 7700540).", "\nVisit the detail page.", "\n\nROUTSON, RAY ROBERT was born in 1960 and he registered to vote, giving his address as 372 N MCKENZIE ST, ADRIAN MICHIGAN 49221 U.S.A. (Voter ID number 31250137).", "\nVisit the detail page.", "\n\nROUTSON, RICHARD LOREN was born in 1967 and he registered to vote, giving his address as 1384 MESA ST, YPSILANTI MICHIGAN 48197 U.S.A. (Voter ID number 103294475).", "\nVisit the detail page.", "\n\nROUTSON, ROBERT LEE was born in 1944 and he registered to vote, giving his address as 71056 BRANDE CREEK DR, EDWARDSBURG MICHIGAN 49112 U.S.A. (Voter ID number 7610670).", "\nVisit the detail page.", "\n\nROUTSON, TRUMAN RAY was born in 1980 and he registered to vote, giving his address as 27774 W MAIN ST, EDWARDSBURG MICHIGAN 49112 U.S.A. (Voter ID number 105668626).", "\nVisit the detail page.", "\n\nROUTSON-CG, BENJAMIN COREY was born in 1981 and he registered to vote, giving his address as 7721 DEER GROVE CT NE, ROCKFORD MICHIGAN 49341 U.S.A. (Voter ID number 107945813).", "\nVisit the detail page.", "\n\nROUTSONG, AMBER NICOLE was born in 1995 and she registered to vote, giving her address as 1364 CATO LN, STURGIS MICHIGAN 49091 U.S.A. (Voter ID number 32951885).", "\nVisit the detail page.", "\n\nROUTSONG, ARPA ELIZABETH was born in 1946 and she registered to vote, giving her address as 504 E MAIN ST, BURR OAK MICHIGAN 49030 U.S.A. (Voter ID number 4001983562).", "\nVisit the detail page.", "\n\nROUTSONG, BETTY ALLENE was born in 1927 and she registered to vote, giving her address as 3850 SCENIC RDG APT 128, TRAVERSE CITY MICHIGAN 49684 U.S.A. (Voter ID number 105500756).", "\nVisit the detail page.", "\n\nROUTSONG, GAIL ARLENE was born in 1944 and she registered to vote, giving her address as 1095 W CHICAGO RD, BRONSON MICHIGAN 49028 U.S.A. (Voter ID number 2445000291).", "\nVisit the detail page.", "\n\nROUTSONG, JACK LAMAR was born in 1943 and he registered to vote, giving his address as 121 HERITAGE DR APT 2, NEGAUNEE MICHIGAN 49866 U.S.A. (Voter ID number 1428868).", "\nVisit the detail page.", "\n\nROUTSONG, JOHN WARREN was born in 1960 and he registered to vote, giving his address as 1706 BAY HILL TER, TRAVERSE CITY MICHIGAN 49684 U.S.A. (Voter ID number 107938189).", "\nVisit the detail page.", "\n\nROUTSONG, ROBERT MICHAEL was born in 1976 and he registered to vote, giving his address as 232 CRAIG ST, MARQUETTE MICHIGAN 49855 U.S.A. (Voter ID number 9945526).", "\nVisit the detail page.", "\n\nROUTSONG, SONYA MARIE was born in 1969 and she registered to vote, giving her address as 35464 PHYLLIS ST, WAYNE MICHIGAN 48184 U.S.A. (Voter ID number 6223295).", "\nVisit the detail page.", "\n\nROUTSONG, THOMAS JAY was born in 1969 and he registered to vote, giving his address as 504 E MAIN ST, BURR OAK MICHIGAN 49030 U.S.A. (Voter ID number 4001823334).", "\nVisit the detail page.", "\n\nROUTSONG, WILLIAM GARY was born in 1986 and he registered to vote, giving his address as 1706 BAY HILL TER, TRAVERSE CITY MICHIGAN 49684 U.S.A. (Voter ID number 107867825).", "\nVisit the detail page.", "\n\nROUTSON-STRUEBEL, MICHAEL DEAN was born in 1967 and he registered to vote, giving his address as 8666 MOHRLE RD, FOWLERVILLE MICHIGAN 48836 U.S.A. (Voter ID number 4000749357).", "\nVisit the detail page.", "\n\nROUTT, ALISON MARIE was born in 1969 and she registered to vote, giving her address as 4396 SAINT MARTINS DR, FLINT MICHIGAN 48507 U.S.A. (Voter ID number 2312983).", "\nVisit the detail page.", "\n\nROUTT, ANN LYNN was born in 1958 and she registered to vote, giving her address as 2481 LIVERNOIS DR, HOWELL MICHIGAN 48843 U.S.A. (Voter ID number 9041318).", "\nVisit the detail page.", "\n\nROUTT, ARNOLD was born in 1929 and he registered to vote, giving his address as 14300 FORRER ST, DETROIT MICHIGAN 48227 U.S.A. (Voter ID number 603094).", "\nVisit the detail page.", "\n\nROUTT, BRANDON NATHANIEL was born in 1980 and he registered to vote, giving his address as 878 KATIE CT, NORTON SHORES MICHIGAN 49441 U.S.A. (Voter ID number 104996050).", "\nVisit the detail page.", "\n\nROUTT, BRIAN MICHAEL was born in 1969 and he registered to vote, giving his address as 5869 WAGON WHEEL DR, SALINE MICHIGAN 48176 U.S.A. (Voter ID number 102336459).", "\nVisit the detail page.", "\n\nROUTT, BRIANNA KAY was born in 1995 and she registered to vote, giving her address as 6826 ANITA CT, FRUITPORT MICHIGAN 49415 U.S.A. (Voter ID number 2210003186).", "\nVisit the detail page.", "\n\nROUTT, BYRON PAUL was born in 1963 and he registered to vote, giving his address as 734 S WOODLAND ST, MUSKEGON MICHIGAN 49442 U.S.A. (Voter ID number 4004213796).", "\nVisit the detail page.", "\n\nROUTT, DEAN ALLEN was born in 1969 and he registered to vote, giving his address as 6826 ANITA CT, FRUITPORT MICHIGAN 49415 U.S.A. (Voter ID number 10198949).", "\nVisit the detail page.", "\n\nDo you support libertyand justice for all?", "\n\nAn organized hate group has scheduled events in Michigan to raise money to\nspend promoting hate crimes.", "\nYou can address these no-good punks at their own fund-raisers.", "\n\nMany civil rights activists are quick to respond if an innocent person\nis being maliciously mistreated because of his or her race, sex, religion or even sexual orientation. ", "They\nhave some explaining to do if they are silent now.", "\n\nThe hate group calls itself “Mothers Against Drunk Driving,”\nbut they are not all mothers, and they are not against drunk driving. ", "Their target is everybody born during\nthe past 21 years.", "\n\nMADD pushes politicians to use gun-toting goons in bulletproof vests\nto intimidate Mr. and Mrs. Twenty into total abstinence from alcoholic beverages, and to intimidate\nbusinesses into refusing to sell alcoholic beverages to Mr. and Mrs. Twenty.", "\n\nOf course, it is obvious why so many politicians, and Michigan voters, would rather commit\nthis hate crime against persons younger than 21, than impose tougher DWI measures which would apply to themselves.", "\nThat wouldn’t be fair to the hypocrites, who “can drive better drunk than\nteenagers can sober.”\n\nIt is not so obvious what motivates the hate-mongering MADD bigots,\nso let me explain:\n\nMADD is sponsored by auto makers, who want to perpetuate the intense\nbureaucratic hostility against persons who don’t buy cars. ", "This hostility is manifested in numerous ways,\nincluding traffic lights without crosswalk lights, streets without sidewalks, snow plowed onto sidewalks and\nleft there until it melts in the springtime, and zoning restrictions which prevent walkers from living closer to work.", "\nCity Hall requires parking lots for new apartment houses, to make walkers pay higher rents.", "\n\nPedestrians are lucky to get\nwhite paint marking a crosswalk, while railroad crossings are equipped with clanging bells, flashing lights and\ndescending gates, because the persons who could get hurt are persons in cars, persons who matter. ", "The carnage on\nthe roads was an excuse to raise the drinking age, and then the speed limits were also raised, because speed limits apply\nto persons who matter.", "\n\nThe more a young adult drinks alcohol, the more he or she will avoid\ndriving. ", "That person will do more walking and then demand equal rights for pedestrians.", "\n\nA serious crackdown on drunk driving, making laws in the U.S.A. comparable\nto those in other countries, would\nmean more suspended licenses on any given day, and with more riders, bus companies could extend their hours and routes.", "\nThen more young folks could find jobs\nwithout buying cars. ", "MADD wants to get these young persons addicted to driving. ", "Our nation’s youth are\ntomorrow’s leaders, and MADD wants them to show the same depraved indifference to the rights of pedestrians\nthat so many of today’s politicians show. ", "Most voters and politicians don’t give a fire truck about the\nrights of pedestrians, or the rights of persons born during the past 21 years.", "\n\nSome MADD activists, having lost a family member, are desperately trying\nto pretend their own past DWI crimes\nare not their own fault, but the fault of a society that was soft on underage drinking. ", "Some cannot even picture\nsomebody drinking alcohol and\nthen not driving, while others cannot live with the fact that, every day, many thousands of persons younger than\n21 imbibe and then don’t drive.", "\n\nIt’s not that they are all morons. ", "It’s just that good, sound,\nlogical reasoning does not\nsupport their cause, so they rely on bad reasoning: “Statistical analysis of historical crash data\nproves that the United States of America\nought not to be a free country, with liberty and justice for all, where the citizen decides what to drink,\nbe it water, wine or turpentine, and\nwhere the drunk driver is the one who gets punished for drunk driving.”\n\nMADD will argue that too many young persons have been killed in DWI crashes,\nwhich is true. ", "Notice I didn’t say “accidents,” because\nso many crashes aren’t accidents at all. ", "Well, consider the crash in Burton, Ohio on 2 March 2006. ", "The guilty\ndriver was 47. ", "He was driving drunk (0.26% BAC), driving\nleft of center, speeding, driving under suspension and leading a police chase, butatleasthewasn’tdrinkingunderage,\na victory for MADD. ", "He crashed head on into a car with three outvoted discrimination victims, butatleasthewasn’tbuyingforthem, another victory for MADD. ", "While he collected his\neleven prior DUI’s, MADD pushed for\nsting operations, keg registration laws, counterfeit-resistant ID’s and harsher punishments for being younger\nthan 21. ", "They don’t care about drunk driving,\nthey just hate everybody younger than 21.", "\n\nGrace Chamberlain and Andrew Hopkins were both 18, and they never got a chance\nto drink alcohol legally. ", "A 19-year-old man\nin the back seat spent weeks in Metro Hospital, getting his face put back together with plates and screws.", "\n\nOutraged and stunned, the victims’ parents, and fellow students\nat Hiram College went to Columbus to lobby for a\ncrackdown. ", "They got a tougher repeat offender law introduced, overwhelmingly passed and signed by the governor. ", "Citizens\nwho want results don’t need MADD.", "\n\nWhile you’re lobbying, don’t forget all the other senseless crashes\nwhere alcohol was not a factor.", "\n\nDo resist the temptation to debate the enemies of liberty on their statistics.", "\nSure, they get to include Grace and Andy in their numbers\nof persons age 15 through 20 killed in alcohol-related crashes. ", "Sure, they have data that reflected lowering the\ndrinking age at a time when cops let drunk drivers go home and sleep\nit off. ", "Sure, if you saw a crash, you would have to note the mile marker and drive to the next exit as precious seconds\nticked away. ", "Maybe there’s a gas station with a pay telephone.", "\nToo bad the gas station is closed, and the pay telephone is inside it. ", "Nowadays, usually somebody is on line to a\n9-1-1 operator within 60 seconds of impact. ", "Sure, these days more of the fatal drunk driving crashes are\nlisted as hit-and-run crashes because tougher penalties get more drunk drivers to flee the scene, and there’s no proof of\nintoxication by the time they get arrested.", "\n\nInsurance companies classify people. ", "It’s bad enough that a good driver,\nsuch as a single man with a clean record, has to pay the same as a married woman with two moving violations. ", "He has to pay\nhigher rates, for the ones who drive like jackasses. ", "However, there’s a world of difference between\ninsurance and liberty. ", "For one thing, you can avoid insurance by doing without a car, but they still inflict the drinking age on you.", "\n\nCan crime statistics justify a dusk-to-dawn curfew based on race? ", "Or should each person be judged on his or her own decisions?", "\n\nLiberty is not a gift from the government, doled out at the discretion of bureaucrats. ", "Liberty is an unalienable right which no\ngovernment can justly infringe. ", "Liberty can only be defined meaningfully as the freedom to do whatever does not violate anybody’s rights. ", "Any other definition is\nmeaningless because, under such other definitions, the government could simply manufacture documents reducing your rights. ", "Unalienable rights, by definition, preempt\nthe Rule of Law whenever the two things conflict with each other. ", "Drinking alcoholic beverages does not violate anybody’s rights. ", "Even when Prohibition was imposed by\nthe Eighteenth Amendment, orthodox libertarian extremists maintained that governments cannot acquire authority by manufacturing documents, regardless of what words are\ninscribed thereon.", "\n\nUnalienable rights inhere in the individual. ", "Each person is a distinct individual and a distinct transaction.", "\nThe only relevant statistics are the ones about that individual, not crimes committed by\nother persons. ", "Eliminate drunk driving, and there will be no teenagers killed in drunk driving crashes.", "\n\nThought Experiment\n\nSuppose the Supreme Court of the United States (SCOTUS) strikes down the underage drinking statutes. ", "What do you think State legislators would do?", "\n\nIf you said they would scramble to pass tougher measures against DUI, then you just admitted that they impose underage drinking laws instead of\npassing tougher measures against DUI.", "\n\nThe hate-mongering MADD bigots can be found and addressed at their events on public property:\n\nTell the businesses sponsoring these events what you think of their promoting hate crimes against persons\nyounger than 21. ", "If you are approached by somebody planning to participate in one of these events, asking for your donation, ask that person if he or she is aware that MADD hates everybody born during the past 21 years." ]
{ "pile_set_name": "Pile-CC" }
[ 0.009345794392523364, 0, 0, 0.008583690987124463, 0, 0.011627906976744186, 0, 0.017341040462427744, 0, 0.011494252873563218, 0, 0.011904761904761904, 0, 0.017964071856287425, 0, 0.023529411764705882, 0, 0.011976047904191617, 0, 0.01098901098901099, 0, 0.018518518518518517, 0, 0.017341040462427744, 0, 0.012121212121212121, 0, 0.012195121951219513, 0, 0.011764705882352941, 0, 0.005952380952380952, 0, 0.011764705882352941, 0, 0.023809523809523808, 0, 0.011764705882352941, 0, 0.017543859649122806, 0, 0.01910828025477707, 0, 0.018518518518518517, 0, 0.018518518518518517, 0, 0.005847953216374269, 0, 0.0058823529411764705, 0, 0.011111111111111112, 0, 0.017045454545454544, 0, 0.011764705882352941, 0, 0.012269938650306749, 0, 0.011560693641618497, 0, 0.011764705882352941, 0, 0.011560693641618497, 0, 0.022727272727272728, 0, 0.011695906432748537, 0, 0.011049723756906077, 0, 0.006097560975609756, 0, 0.011976047904191617, 0, 0.011834319526627219, 0, 0.012048192771084338, 0, 0.018292682926829267, 0, 0.006024096385542169, 0, 0.005847953216374269, 0, 0.005952380952380952, 0, 0.0189873417721519, 0, 0.01744186046511628, 0, 0.012269938650306749, 0, 0.011976047904191617, 0, 0.018292682926829267, 0, 0.005988023952095809, 0, 0.018404907975460124, 0, 0.023391812865497075, 0, 0.01818181818181818, 0, 0.016853932584269662, 0, 0.01744186046511628, 0, 0.012422360248447204, 0, 0.011976047904191617, 0, 0.024096385542168676, 0, 0.011695906432748537, 0, 0.017142857142857144, 0, 0.018404907975460124, 0, 0.0189873417721519, 0, 0.018072289156626505, 0, 0.01764705882352941, 0, 0.018518518518518517, 0, 0.012121212121212121, 0, 0.024691358024691357, 0, 0.01775147928994083, 0, 0.017142857142857144, 0, 0.016666666666666666, 0, 0.01092896174863388, 0, 0.005376344086021506, 0, 0.011428571428571429, 0, 0.017857142857142856, 0, 0.01764705882352941, 0, 0.011904761904761904, 0, 0.029239766081871343, 0, 0.012195121951219513, 0, 0.011834319526627219, 0, 0.0223463687150838, 0, 0.023809523809523808, 0, 0.005714285714285714, 0, 0.01744186046511628, 0, 0.023952095808383235, 0, 0.023255813953488372, 0, 0.017964071856287425, 0, 0.031055900621118012, 0, 0.030864197530864196, 0, 0.018072289156626505, 0, 0.023809523809523808, 0, 0.01764705882352941, 0, 0.024539877300613498, 0, 0.023952095808383235, 0, 0.012195121951219513, 0, 0.024539877300613498, 0, 0.017045454545454544, 0, 0.017142857142857144, 0, 0.017964071856287425, 0, 0.023391812865497075, 0, 0.0125, 0, 0.011764705882352941, 0, 0.017857142857142856, 0, 0.01764705882352941, 0, 0.01818181818181818, 0, 0.025477707006369428, 0, 0.024539877300613498, 0, 0.023391812865497075, 0, 0.023668639053254437, 0, 0.01744186046511628, 0, 0.024242424242424242, 0, 0.023668639053254437, 0, 0.018292682926829267, 0, 0.029411764705882353, 0, 0.012269938650306749, 0, 0.016853932584269662, 0, 0.011904761904761904, 0, 0.018072289156626505, 0, 0.017543859649122806, 0, 0.024539877300613498, 0, 0.023121387283236993, 0, 0.01764705882352941, 0, 0.012578616352201259, 0, 0.01092896174863388, 0, 0.011764705882352941, 0, 0.023809523809523808, 0, 0.01775147928994083, 0, 0.01764705882352941, 0, 0.01282051282051282, 0, 0.006024096385542169, 0, 0.012345679012345678, 0, 0.01775147928994083, 0, 0.01744186046511628, 0, 0.00546448087431694, 0, 0.018518518518518517, 0, 0.01764705882352941, 0, 0.005714285714285714, 0, 0.017045454545454544, 0, 0.011764705882352941, 0, 0.0189873417721519, 0, 0.012195121951219513, 0, 0.0189873417721519, 0, 0.018072289156626505, 0, 0.011976047904191617, 0, 0.012121212121212121, 0, 0.017964071856287425, 0, 0.012048192771084338, 0, 0.01694915254237288, 0, 0.0189873417721519, 0, 0.0056179775280898875, 0, 0.0189873417721519, 0, 0.011976047904191617, 0, 0.016853932584269662, 0, 0.018518518518518517, 0, 0.01764705882352941, 0, 0.017857142857142856, 0, 0.016853932584269662, 0, 0.01744186046511628, 0, 0.0111731843575419, 0, 0.011976047904191617, 0, 0.018292682926829267, 0, 0.01744186046511628, 0, 0.018518518518518517, 0, 0.011111111111111112, 0, 0.01694915254237288, 0, 0.011627906976744186, 0, 0.006134969325153374, 0, 0.012195121951219513, 0, 0.011428571428571429, 0, 0.0056179775280898875, 0, 0.011904761904761904, 0, 0.018404907975460124, 0, 0.018292682926829267, 0, 0.01764705882352941, 0, 0.005649717514124294, 0, 0.017543859649122806, 0, 0.023668639053254437, 0, 0.006060606060606061, 0, 0.012269938650306749, 0, 0.017142857142857144, 0, 0.011111111111111112, 0, 0.017964071856287425, 0, 0.005988023952095809, 0, 0.018292682926829267, 0, 0.017543859649122806, 0, 0.012048192771084338, 0, 0.02197802197802198, 0, 0.011363636363636364, 0, 0.01675977653631285, 0, 0.017341040462427744, 0, 0.012195121951219513, 0, 0.011363636363636364, 0, 0.01744186046511628, 0, 0.005988023952095809, 0, 0.011904761904761904, 0, 0.011695906432748537, 0, 0.011494252873563218, 0, 0.0111731843575419, 0, 0.011111111111111112, 0, 0.005780346820809248, 0, 0.011834319526627219, 0, 0.017543859649122806, 0, 0.011560693641618497, 0, 0.01098901098901099, 0, 0.0125, 0, 0.006289308176100629, 0, 0.006097560975609756, 0, 0.025, 0, 0.018633540372670808, 0, 0.025, 0, 0.011627906976744186, 0, 0.012195121951219513, 0, 0.005917159763313609, 0, 0.01775147928994083, 0, 0.011560693641618497, 0, 0.023668639053254437, 0, 0.017241379310344827, 0, 0.012195121951219513, 0, 0.01639344262295082, 0, 0.011363636363636364, 0, 0.018072289156626505, 0, 0.01694915254237288, 0, 0.01910828025477707, 0, 0.011428571428571429, 0, 0.006024096385542169, 0, 0.017543859649122806, 0, 0.011363636363636364, 0, 0.006211180124223602, 0, 0.012345679012345678, 0, 0.01775147928994083, 0, 0.012269938650306749, 0, 0.025477707006369428, 0, 0.017543859649122806, 0, 0.011627906976744186, 0, 0.016574585635359115, 0, 0.018292682926829267, 0, 0.01818181818181818, 0, 0.024539877300613498, 0, 0.018404907975460124, 0, 0.01818181818181818, 0, 0.017543859649122806, 0, 0.011976047904191617, 0, 0.022598870056497175, 0, 0.024539877300613498, 0, 0.005917159763313609, 0, 0.011049723756906077, 0, 0.005917159763313609, 0, 0.01775147928994083, 0, 0.011560693641618497, 0, 0.012121212121212121, 0, 0.012269938650306749, 0, 0.012195121951219513, 0, 0.011494252873563218, 0, 0.011235955056179775, 0, 0.006024096385542169, 0, 0.012578616352201259, 0, 0.012987012987012988, 0, 0.017543859649122806, 0, 0.017964071856287425, 0, 0.012195121951219513, 0, 0.006060606060606061, 0, 0.0125, 0, 0, 0, 0, 0, 0, 0.007518796992481203, 0.017857142857142856, 0.008097165991902834, 0.004830917874396135, 0.0031847133757961785, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007142857142857143, 0.005, 0, 0, 0.001984126984126984, 0.024390243902439025, 0, 0, 0.01694915254237288, 0.007518796992481203, 0, 0, 0.009345794392523364, 0.008064516129032258, 0.015873015873015872, 0, 0, 0.009900990099009901, 0, 0.008130081300813009, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.008130081300813009, 0, 0.00546448087431694, 0, 0.009900990099009901 ]
0.007008
5
[ "Q:\n\nJavaScript setInterval increase and decrease variable\n\nI have a problem with creating a variable that first will increase value (for example) form 0 to 10, and after that it wil go back from 10 to 0.", "\nSo 0,1,2,3...10,10,9,8,7...0 (and so on)\nThe main idea looks like this:\nvar count = 10;\n\nvar counter = setInterval(timer, 500); \n\nfunction timer() {\n count = count-1;\n\n if (count == 0) {\n count = 10;\n }\n\n}\nconsole.log(counter);\n\nBut it will only go from 0 to 10 all the time. ", "How to make that 'comeback' thing? ", "Thank you for help.", "\n\nA:\n\nTry to change the increment value\nvar count = 10;\nvar counterIncrement=-1;\nvar counter = setInterval(timer, 500); \n\nfunction timer() {\n count = count+counterIncrement;\n if (count == 0 || count == 10 ) {\n counterIncrement = -counterIncrement;\n }\n console.log(count);\n}\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0 ]
0
5
[ "Q:\n\nCan't get time pressed in onTouch\n\nI'm trying to get the time the user takes pressing a button. ", "I'm doing like that:\nvar timeDown = 0L\nwhen (event.actionMasked) {\n MotionEvent.", "ACTION_DOWN -> {\n timeDown = event.eventTime\n true\n }\n MotionEvent.", "ACTION_UP -> {\n val totalTime = event.eventTime - timeDown`\n\n if (totalTime <= 500) {\n do something\n }\n }\n}\n\nBut it isn't subtracting, totalTime holds only the eventTime of Action_UP\nHere's my LogCat:\n2020-05-13 11:58:57.194 11259-11259/app D/timeDown: 34492026\n2020-05-13 11:58:57.240 11259-11259/app D/timeUp: 34492083\n2020-05-13 11:58:57.240 11259-11259/app D/totalTime: 34492083\n\nA:\n\nEnsure var timeDown = 0L is outside the function that is being invoked on touch (onInterceptTouchEvent for example) because you assign = 0 on every event that you receive so you end up in \"ACTION_UP ->\" you end up with timeDown = 0 and totalTime becomes equal to event.eventTime.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0 ]
0
5
[ "Effects of radial shock waves on membrane permeability and viability of chondrocytes and structure of articular cartilage in equine cartilage explants.", "\nTo investigate in vitro effects of radial shock waves on membrane permeability, viability, and structure of chondrocytes and articular cartilage. ", "Cartilage explants obtained from the third metacarpal and metatarsal bones of 6 horses. ", "Equine cartilage was subjected to radial shock waves and then maintained as explants in culture for 48 hours. ", "Treatment groups consisted of a negative control group; application of 500, 2,000, and 4,000 impulses by use of a convex handpiece (group A); and application of 500, 2,000, and 4,000 impulses by use of a concave handpiece (group B). ", "Effects on explant structure were evaluated by use of environmental scanning electron microscopy (ESEM). ", "Membrane permeability was determined by release of lactate dehydrogenase (LDH). ", "Chondrocyte viability was assessed by use of vital cell staining. ", "Comparisons of LDH activity and nonviable cell percentages were performed by ANOVA. ", "Cell membrane permeability increased significantly after application of 2,000 and 4,000 impulses in groups A and B. A significant decrease in cell viability was observed for application of 4,000 impulses in explants of group A. There was no detectable damage to integrity of cartilage explants observed in any treatment group by use of ESEM. ", "Radial shock waves do not appear to structurally damage articular cartilage but do impact chondrocyte viability and membrane permeability. ", "Caution should be exercised when extremely high periarticular pulse doses are used until additional studies can determine the long-term outcome of these effects and appropriate periarticular treatment regimens can be validated." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0, 0, 0, 0, 0.009523809523809525, 0, 0, 0.011904761904761904, 0.005847953216374269, 0, 0 ]
0.002273
5
[ "Towards understanding the genetics of Autism.", "\nAutism spectrum disorder (ASD) includes a group of neurodevelopmental disorders that affect communication skills, social interaction and intellectual ability. ", "Despite evidence suggesting a strong genetic link with ASD, the genetic determinant remains unclear. ", "Early studies focusing on candidate genes have shown that several genes associated with neuronal synaptic function are involved in development of ASD. ", "Linkage studies have identified several single nucleotide polymorphisms (SNPs) associated with ASD, and genome-wide association studies have implicated several loci, but failed to recognize a single specific locus with strong significance, indicating heterogeneity in ASD genetic determinants. ", "Detection of de novo copy number variations and single nucleotide variants in several ASD probands has confirmed the genetic heterogeneity of the disease. ", "More interestingly, next generation sequencing approaches have recently identified novel candidate genes and several point mutations in sporadic ASDs, thus increasing our knowledge of ASD etiology. ", "The current review summarizes the findings of recent studies using genetic and genomic approaches to understand the underlying molecular mechanisms of ASD." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.00625, 0.009900990099009901, 0.006622516556291391, 0.006802721088435374, 0.0064516129032258064, 0, 0.0064516129032258064 ]
0.00531
5
[ "The action comes two years after Dawood Ibrahim's name figured on the UK Treasury department’s Consolidated List of Financial Sanctions Targets\n\nIn a big diplomatic boost for India, the UK government is learnt to have sealed properties worth thousands of crores linked to India’s most wanted Dawood Ibrahim, signaling a massive crackdown against the fugitive gangster.", "\n\nUK-based daily Birmingham Mail reported on Wednesday that the seized properties include a hotel he owns in Warwickshire and other residential properties across the Midlands that had been on tha radar of Indian probe agencies.", "\n\nThe action comes two years after India had handed over a dossier on Dawood to UK back in 2015.", "\n\nThe Treasury sanction document lists three recorded addresses for Ibrahim in Pakistan including one sprawling property called The White House near the Saudi mosque in the seaside suburb of Clifton in Karachi Pakistan.", "\n\nIn January this year, some unconfirmed reports had said that the United Arab Emirates (UAE) government may also have moved to seize assets of 1993 Mumbai blasts mastermind Dawood Ibrahim, on its soil.", "\n\nDawood, who is currently said to be based in Pakistan, has been closely tracked by India because of his complicity in the 1993 serial blasts as well as terror acts masterminded by Pakistan's spy agency ISI.", "\n\nIn 2013, the US Treasury Department declared him a global terrorist while the United Nations sanctions list Dawood as an associate and funder of Al Qaeda.", "\n\nThe sanctions prohibit the transfer of funds to anyone on the list and freezes any assets they may hold in the UK. ", "It is a criminal offence to breach a financial sanction." ]
{ "pile_set_name": "Pile-CC" }
[ 0.010869565217391304, 0, 0, 0.0091324200913242, 0.0049504950495049506, 0.004807692307692308, 0.02564102564102564, 0, 0 ]
0.006156
5
[ "I would see the Turtles. ", "After the profane stuff that Flo and Eddie (from the Turtles) did with Frank Zappa (Listen to the Fillmore East LP) and the profane-assed cartoon that they (Flo and Eddie again) did the voices for (I think they might have written the script too... maybe) entitled Dirty Duck (go see it, it's fucked up), I would pick the Turtles any day!", "\n\n[quote=\"BigTimeOperator\"]Big Time Operator needs help this figuring out what he is going to do this weekend. ", "Remember his wife is working all weekend and he has little $ until next week. ", "So heres what up:\n\nBig Time Operator already have plans for Friday night and Sunday BTO is going to a homeshow in Clearwater so help me make plans for Saturday:\n\nBTO could go see Kansas ( Carry on my wayward son) in concert FREE\n\nBTO could go see The Turtles (Remember you and me and me and you...Happy Together) again this is another FREE concert\n\nJust stay home and flood the board with senseless posts\n\nYou might not like them but Big Time Operator is leaning towards seeing the Free Kansas concert since they normally charge like $40 when they play arenas.", "\n\nIf any of you Bay area Dm'ers wanna hang out Saturday let me know email me or IM me[/quote]" ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.020771513353115726, 0, 0, 0.008928571428571428, 0 ]
0.00495
5
[ "Survey of Anisakis larvae in marine fish of Taiwan.", "\nA survey on the prevalence and intensity of larval anisakid infection in some species of marine fishes sold in the markets at Tan-shui in northern Taiwan was carried out from May to August 1980. ", "The general infection rate was 37.7% with an average of 14.2 larvae per fish. ", "A total of 13 species of examined fishes were found with Anisakis larvae, these were Argyrosomus argentatus, Caranx djeddaba, Diploprion bifasciatum, Evynnis cardinalis, Lethrinus haematopterus, Megalops cyprinoides, Nemipterus virgatus, Paraplagusia formosana, Plectorhinchus pictus, Rastrelliger chrysozonus, Saurida tumbil, Scolopsis vosmeri, and Trichiurus haumela. ", "The highest intensity of Anisakis larvae was obtained in E. cardinalis with an average of 80.3 larvae per fish; the next was in N. virgatus (76.2 larvae/fish). ", "The parasite could not be found in the other 20 species of fishes examined." ]
{ "pile_set_name": "PubMed Abstracts" }
[ 0, 0.00510204081632653, 0, 0.01891891891891892, 0, 0 ]
0.004003
5
[ "Gateson Exclaim! ", "TV Aggressive Tendencies\n\nToronto experimental drone/metal outfit Gates have been shy of the spotlight since their 2010 debut LP, Moths Have Eaten at the Core, but the band have been quietly honing their feedback-heavy brand of noise, leading up to the release of their latest album, The Prevailing Wind, in April of this year.", "\n\nWe caught up with Gates during a performance last August at Toronto's Comfort Zone, where we sat down with the band's Bryan W. Bray. ", "He enlightened us on the origin of the band, what they sound like and comparisons to Bray's other project, psychedelic outfit Gardenia." ]
{ "pile_set_name": "Pile-CC" }
[ 0.058823529411764705, 0.009174311926605505, 0.007407407407407408, 0.007407407407407408 ]
0.020703
5
[ "Q:\n\nImproving worldwide website performance without using a CDN?", "\n\nCDNs seem like a tremendously brute-force approach to improving website performance across the world, since they use some thousands of machines close to the end-user to ensure good throughput.", "\nAre there any ways of improving performance over long distances with high latency or slow-ish links (e.g., UK to Australia) over the \"usual\" methods of reducing size and number of requests, or is the only other way to have servers closer to the user?", "\n\nA:\n\nYou can't circumvent latency by reducing size. ", "Just make sure your server supports Keepalive, everything that should be cached actually comes with appropriate Expires: headers and that your HTML is reasonably sized (i.e. also use gzip compression) - then see how far you get with that and whether multi-homing is still necessary.", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0, 0 ]
0
5
[ "For years now, CPAs have been on the front lines of the financial literacy battle, and while we undoubtedly want everyone to get smarter about their finances, the financial literacy push has centered on some very targeted audiences – specifically, the financial illiterate. ", "Here’s a problem, though: Sometimes the people who know a lot about … Continued\n\nFor years now, CPAs have been on the front lines of the financial literacy battle, and while we undoubtedly want everyone to get smarter about their finances, the financial literacy push has centered on some very targeted audiences – specifically, the financial illiterate.", "\n\nHere’s a problem, though: Sometimes the people who know a lot about personal finance still fall victim to circumstance.", "\n\nTom is 77, a former vice president of marketing for Oral-B whose salary rose to the low six figures at the height of his career. ", "By all accounts, he was a success – great job, great family, paid off his mortgage, put his kids through college. ", "He even managed to save a little bit for retirement along the way.", "\n\nThen came 2008. ", "He lost most of what he had saved for retirement when the stock market crashed. ", "Today, when he should be enjoying retirement, he’s working two part-time jobs to make ends meet.", "\n\nThe moral of the story? ", "No matter what you’ve saved for retirement, it’s probably not enough. ", "Here are some numbers taken verbatim from Hymowitz’s Bloomberg article:\n\nThe median 401(k) balance for households headed by people aged 55 to 64 who had retirement accounts at work was $120,000 in 2011.", "\n\n“Longevity should be a blessing, but if you haven’t planned for it, you’re going to work much longer than you ever dreamed of doing,” Larry Fink, CEO of BlackRock Inc., the world’s largest asset manager, told Hymowitz.", "\n\nThat’s particularly troubling, given the results of the third annual Financial Finesse report, which finds that younger workers (along with women and lower-income employees) are at particular risk of failing to achieve “retirement security.”", "\n\nThe report finds that overall retirement preparedness has increased, but only because workers are making better investment decisions. ", "They’re still not saving enough, and “this is concerning,” the report states, “since ultimately saving is the biggest driver to achieving retirement security.”", "\n\nCautionary tales like this make this much obvious: Instilling a spirit of saving in the next generation of workers is more important than ever. ", "Enjoying a comfortable retirement means saving a ton of money right out of the gate, from Day 1 on the job.", "\n\nAnd with advancements in medical technology, we’re living longer than ever. ", "Longevity researcher Aubrey De Grey has famously predicted that the first person to live to 150 has already been born. ", "Are today’s millennials willing to put enough money away to fund a 50- or 60- or 70-year retirement?", "\n\nFinancial literacy has quickly become about much more than saving your pennies. ", "It may be one of the most important skills we’ll have going forward." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0.007633587786259542, 0, 0, 0, 0, 0, 0, 0, 0.0049504950495049506, 0.013636363636363636, 0.00411522633744856, 0, 0, 0, 0, 0, 0.008403361344537815, 0, 0, 0 ]
0.001684
5
[ "Egyptian authorities arrested seven people on Monday, who they accused of being gay and promoting homosexuality, according to officials who did not want to be named as they had not been authorized to speak to the media.", "\n\nRead more:In Egypt, Islamic clerics give out edicts in the metro\n\nThe officials said the seven people arrested were responsible for raising the rainbow flag at a gig by popular Lebanese rock band Mashrou' Leila. ", "They have apparently also been charged with \"public indecency\" and \"inciting immorality among young people.\"", "\n\nThe rainbow flag symbolizes the Lesbian, Gay, Bisexual and Transgender (LGBT) movement.", "\n\nRead more: Alaa al-Aswany: What should our attitude to the barbarians be?", "\n\nHomosexuality is taboo in Egypt but it is not illegal to identify as gay nor is it expressly prohibited to \"promote\" homosexuality. ", "Authorities, however, often use offenses such as blasphemy or \"debauchery\" to justify arresting homosexuals in a country that severaly limits free speech.", "\n\nIn April 2016, an Egyptian court sentenced 11 men to jail terms of up to 12 years after convicting them of \"debauchery and incitement to debauchery,\" provoking international criticism.", "\n\nEgypt's conservative musicians' union said Mashrou' Leila, whose singer Hamed Sinno is openly homosexual, would not be allowed to perform again in Egypt. ", "The group has previously been banned from performing in the Jordanian capital, Amman.", "\n\nng/kms (AP, AFP)" ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0, 0, 0.011235955056179775, 0.013333333333333334, 0, 0, 0, 0.01282051282051282, 0, 0.1111111111111111 ]
0.0135
5
[ "Emmalocera umbricostella\n\nEmmalocera umbricostella is a species of snout moth in the genus Emmalocera. ", "It was described by Ragonot in 1888. ", "It is found in Taiwan, India, Borneo, the Philippines, Java, China and Korea.", "\n\nThe larvae have been recorded on Saccharum officinarum.", "\n\nReferences\n\nCategory:Moths described in 1888\nCategory:Emmalocera" ]
{ "pile_set_name": "Wikipedia (en)" }
[ 0, 0, 0.012987012987012988, 0, 0 ]
0.002597
5
[ "Italy cruise ship Costa Concordia: Search for missing\n\nThe Independent’s travel editor Simon Calder: ”It is unbelievable … that this should happen to a 21st Century ship”\n\nEmergency teams in Italy are racing to rescue those missing after a cruise ship ran aground off the country’s west coast with about 4,000 people on board.", "\n\n70TH BIRTHDAY FOR ALI In this file photo, Muhammad Ali and his wife Lonnie shakes hands with guests after a welcoming ceremony for the Ryder Cup golf tournament in Louisville, Ky. The three-time heavyweight boxing champion will celebrate a milestone birthday Tuesday, Jan. 17, 2012, when he turns 70. ", "Ali will be surrounded by friends who are gathering Saturday evening, Jan. 14, 2012, for a birthday party at the Muhammad Ali Center in his hometown of Louisville.", "\n\nGuantanamo Bay Taliban Detainees To Be Released\n\nARAB COUNCIL SAYS TANKS WITHDRAW FROM SYRIA\n\nREPORTING FROM BEIRUT AND CAIRO — Syria’s government has taken steps to comply with a regional initiative to end months of bloodshed, including pulling tanks out of cities and releasing nearly 3,500 detainees, the head of the Arab League said Monday.", "\n\nBut he said gunfire continued and called for a halt to the hostilities.", "\n\nPOPE IGNORES MEXICO CITY IN UPCOMING TRIP TO LATIN AMERICAN TRIP\n\nREPORTING FROM MEXICO CITY — Pope Benedict XVI will not include a stop in Mexico City on his trip to Latin America this spring, a tour that includes Mexico and Cuba. ", "The reason, church officials say, is not fear about his security but rather concern for the 84-year-old pontiff’s health. ", "The sprawling capital sits at more than 7,000 feet, an altitude that can cause sickness in some people.", "\n\nBritish police investigate discovery of body on queen’s estate\n\nREPORTING FROM LONDON — There were all the elements of a mystery novel Britons love so well: a wooded area on the queen’s country estate, a neighbor out walking a dog through the trees during the winter holidays, a body discovered.", "\n\nA corner of Queen Elizabeth II’s country estate of Sandringham, where the British royal family traditionally spends the Christmas and New Year holidays, became a homicide crime scene Tuesday.", "\n\nPolice in nearby King’s Lynn, about 100 miles northeast of London, launched a murder inquiry after the discovery of the body of a woman in the woods close to Anmer, a village on the 20,000-acre area of farmland and woods owned by the royal family.", "\n\nNorfolk Constabulary statements Monday and Tuesday reported that the remains were found on New Year’s Day on the royal estate’s 600 acres, which are open to the public year round and used by local hikers.", "\n\nPolice gave no suggestion as to a possible cause or time of death and provided few details. ", "Detective Chief Inspector Jes Fry of Norfolk police said at an on-scene news conference that the inquiry could be “complex.”", "\n\n“The body has been in situ for some time,” he said. “", "The circumstances suggest this is a murder case.”", "\n\nSculptor works to reshape the Iraqi art world\n\nAbdul Hameed returned from exile and found his old art institute in deplorable condition. ", "He’s now focused on restoring it, and is inspiring his young students.", "\n\nA statue of Saddam Hussein in Baghdad stands headless in 2003 after having been vandalized. ", "During the Hussein years, only statues for — and of — Hussein were encouraged, Iraqi sculptor Abdul Hameed remembers. ", "Even if the Hussein era brought him pain, Hameed objects to moves by the Baghdad provincial council to remove all statues related to the dictator. (", "Carolyn Cole, Los Angeles Times / April 12, 2003)\n\nRussia: Nuclear Submarine Fire Extinguished\n\nA grab from images released by Russia Today shows fire crew trying to extinguish a fire on board the Russian nuclear submarine Yekaterinburg docked in Murmansk on December 29, 2011.", "\n\nJamaica Election Results: Labor Party Thrown Out By Opposition\n\nPortia Simpson Miller, leader of the People’s National Party, pumps her fist to supporters during the victory rally of the parliamentary elections in Kingston, Jamaica,\n\nSyria Protests: Death Toll Increases During Clashes\n\nIN this image from amateur video made available by the Ugarit News group and shot on Friday, Dec. 30, 2011, protesters gather at an anti-Bashar Assad rally in Hama, Syria. ", "Hundreds of thousands of Syrians poured into the streets across the nation Friday in the largest protests in months, shouting for the downfall of the regime in a defiant display invigorated by the presence of Arab observers, activists said.", "\n\nRescuers continue the search for survivors after floods killed hundreds of people and left many missing in the southern Philippines.", "\n\nMore than 1,000 people gathered at Stonehenge, Wiltshire, to mark the winter solstice. ", "During the winter solstice, the sun is closer to the horizon than at any other time in the year, meaning shorter days and longer nights\n\nOne image in particular from the five days of clashes that ended this week has stoked their fury: that of soldiers dragging a woman lying on the street so that her bra and torso were exposed, while clubbing and stamping on her.", "\n\nEgyptians rally against army over beatings of protesters\n\nThousands of Egyptians rallied in Cairo and other cities on Friday to demand the military give up power and vent their anger after 17 people were killed in protests where troops beat and clubbed women and men even as they lay on the ground.", "\n\nFollowing the death of the Czech Republic’s first President, Vaclav Havel, the country is observing a week of mourning and hundreds of candles have been lit in Wenceslas Square – once the focal point of the Velvet Revolution that overthrew the country’s communist regime.", "\n\nQuarter of Europe Has Never Used the Internet\n\nChina’s First Aircraft Carrier as Seen From Space\n\nAl-Aqsa mosque ramp reopens amid controversy\n\nIsrael reopened a controversial access ramp to the al-Aqsa mosque compound in Jerusalem on Wednesday, just 48 hours after it was closed amid safety concerns, prompting angry reactions among Muslims. ", "No work has yet been done to reinforce the ramp.", "\n\nPope Benedict XVI arrives for a Mass celebrating the 200th anniversary of the independence of Latin American countries at St Peter’s Basilica. ", "Pope Benedict announced in his homily that he would make a trip to Mexico and Cuba early next year, before Easter.", "\n\nA exhibition currently on display at the University of Cambridge in England about Captain Scott’s polar expedition entitled ‘These rough notes: Captain Scott’s last expedition,’ with photographs taken sometime between 1910 and 1913.", "\n\nThe remains of a figure of a devil are seen after being burned during the traditional Quema del Diablo (Burning of the Devil) celebration in Guatemala City.", "\n\nMilitants in Pakistan launched a rocket-propelled grenade at lorries loaded with fuel and other supplies for Nato forces in Afghanistan. ", "Many loaded vehicles remain parked across Pakistan since the country stopped supplies following a Nato air strike that killed 24 Pakistan soldiers.", "\n\nEuro Survives For Now\n\nUK PM David Cameron (right) has effectively vetoed an EU-wide treaty change to tackle the eurozone crisis, saying it was not in the UK’s interests. ", "Instead a new “accord” setting out tougher budget rules will now be drawn up for the eurozone and at least six other EU states which want to sign up. ", "European Commission President Jose Manuel Barroso said he regretted that unanimity on treaty change had not been possible.", "\n\nProtesting Putin\n\nRussians take to the street to protest the recent parliamentary elections.", "\n\nDangcheng, China — A bust of the Chinese philosopher Confucius lies on the ground in an abandoned stone-carving workshop in a town about 155 miles southwest of Beijing. ", "The small town in Hebei province has a history of stone carving dating back more than 2,000 years\n\nOut Of Iraq\n\nCIA ‘secret prison’ found in Romania – media reports\n\nFormer CIA operatives said the building was used to interrogate terrorism suspects, including Khaled Sheikh Mohammed\n\nThe CIA operated a secret prison in the Romanian capital Bucharest where terrorism suspects were interrogated, an investigation by the Associated Press and German media has found.", "\n\nFormer CIA operatives identified the building where, they said, detainees were held and tortured.", "\n\nThe building belongs to a Romanian agency, Orniss, which stores classified information from the EU and Nato.", "\n\nOrniss has denied hosting a CIA prison and the CIA has refused to comment.", "\n\nThe investigation, by the Sueddeutsche Zeitung newspaper and the German TV network ARD, said those held in the secret prison included Khaled Sheikh Mohammed, who has admitted organising the 9/11 attacks.", "\n\nHe was seized in Pakistan in March 2003 under the US programme known as “extraordinary rendition” – the extra-judicial detention and transfer of terrorism suspects.", "\n\nHe has been in the US detention centre at Guantanamo Bay since 2006, where he is awaiting trial.", "\n\nPolice and Protesters Clash in Cairo\n\nLourdes Jeannette documents the daily life of a group based in Tampa, Florida.", "\n\nCamp Pendleton | A decade of service in Afghanistan and Iraq\n\nA nice alternative to fighting the crowds at the mall this weekend, would be a photo excursion to the Los Angeles Convention Center for the Auto Show which runs until this Sunday. ", "There are dazzling cars to photograph, from Kia to Roll Royce, along with everything in between.", "\n\nThai flood victim rests under a mosquito net at a relief center in Bangkok as a health worker fumigates a flooded neighborhood on the outskirts of the city. ", "Since July, more than a fifth of the country’s population of 64 million have been affected by the worst flooding in more than half a century. ", "A transport train carrying nuclear waste treated in France.", "\n\nAs the sun came up Monday morning, many Occupy L.A. protesters were in a good mood, pleased simply to still be camped in front of City Hall hours after it became officially illegal to do so.", "\n\nA man with his face painted as a skull attends a protest against violence in Mexico City. ", "More than 40,000 people have been killed in drug-related violence in Mexico since December 2006, when President Felipe Calderon deployed soldiers and federal police to take on organised crime.", "\n\nEgyptians are voting in the opening stage of the first elections since former President Hosni Mubarak was toppled in February. ", "Queues formed early in many places but there are also reports of polling stations opening late because of administrative problems.", "\n\nPeople hold candles during a vigil for those killed in a fire earlier in the week, as they participate in the fourth Delhi Pride March. ", "India’s lesbian, gay, bisexual and transgender community marched through the streets of Delhi and gathered to protest against harassment, violence and discrimination." ]
{ "pile_set_name": "Pile-CC" }
[ 0.006134969325153374, 0.009900990099009901, 0.006134969325153374, 0.005780346820809248, 0, 0.004273504273504274, 0, 0, 0, 0.010362694300518135, 0.008032128514056224, 0, 0, 0.008064516129032258, 0, 0, 0.007194244604316547, 0, 0.010638297872340425, 0.00847457627118644, 0.013513513513513514, 0.007220216606498195, 0.006507592190889371, 0, 0, 0.011235955056179775, 0, 0, 0.003663003663003663, 0.005797101449275362, 0, 0.006896551724137931, 0.017543859649122806, 0.01282051282051282, 0.006329113924050633, 0.007194244604316547, 0.006802721088435374, 0.011560693641618497, 0.006666666666666667, 0.01639344262295082, 0, 0.011695906432748537, 0.01079913606911447, 0.010101010101010102, 0.02727272727272727, 0.02631578947368421, 0.00975609756097561, 0, 0, 0.00847457627118644, 0.004098360655737705, 0.010416666666666666, 0, 0, 0, 0.005208333333333333, 0, 0.005208333333333333, 0.007751937984496124, 0, 0, 0 ]
0.005843
5
[ "JACKSON, Wyo. — ", "If anyone was still alive today that lived through the 1918 Spanish Influenza pandemic, they might recognize a lot of similarities with this day’s COVID-19 outbreak.", "\n\nLike the current coronavirus, the deadly flu of 1918-19 moved slowly to the U.S., beginning in major metropolitan areas and spreading, slowly and eventually, to Jackson Hole even as local news media here in 1918 said there was little chance it would get to such an isolated valley.", "\n\nAs the Great War in the Europe began winding down a far deadlier scourge was to claim more lives—10 times as many—than WWI.", "\n\nThe dreaded “La Grippe” infected 28% of all Americans, with an estimated 675,000 succumbing to the Spanish Flu during the pandemic. ", "Of the U.S. soldiers who died in the European theatre, half of them fell to the influenza virus and not to the enemy.", "\n\nThe 1918-19 influenza pandemic would go on to kill more people in absolute numbers than any other disease outbreak in history. ", "Contemporary estimates put the death toll at 21 million, worldwide, but some epidemiologists have revised that number in recent years to be as high as 50, to perhaps 100 million deaths.", "\n\nOkay, enough with the scary numbers. ", "Point taken. ", "Spanish Influenza was bad; like Black Plague bad, smallpox deadly.", "\n\nA regular purge of humankind?", "\n\nPandemics are nothing new in history, and their long record across the ages and continents has much to teach us about how best to handle the current outbreak. ", "The pandemic of 1918-19 was hardly the world’s first influenza pandemic. ", "Throughout history, there have been others—the Africa outbreak of 1510, Asia flu of 1580, Yellow Fever gripped the United States in 1647, England/Ireland epidemic of 1688, the London outbreaks in 1847-48 and again in 1889-90.", "\n\nBut 1918 topped them all.", "\n\nIt began mildly, with a spring wave in March and April. ", "In fact, it was so mild that some physicians wondered at the time if this disease actually was influenza. ", "Early cases in Kansas and in military camps spread throughout the U.S. were all but ignored.", "\n\nUntil the second wave. ", "Fall of 1918, the flu hit hard.", "\n\nSoldiers returning from the war brought it back to the U.S. with them. ", "It first arrived in Boston in September of 1918. ", "The virus killed almost 200,00 in October alone. ", "In November, as people celebrated Armistice Day with parades and parties, a more fearsome enemy was taking hold on American shores.", "\n\nWhat was La Grippe and how does it compare to COVID-19?", "\n\nDubbed “Spanish Influenza” because Spain was reportedly hit particularly hard early (8 million deaths in that country), the disease likely originated elsewhere. ", "Maybe China, France, Britain—even the U.S have been considered in myriad studies. ", "What is known is a rare genetic shift of a strain of H1N1 avian influenza virus started the whole thing. ", "The recombination of its surface proteins created a virus novel to almost everyone on the planet, capitalizing on a lack of herd immunity.", "\n\nRecent molecular studies attempting to reverse-engineer the virus from the frozen tissues of a dead soldier may shed more light on exactly what Spanish Flu was but for now what scientists have learned is characterization of five of the eight RNA segments of the 1918 influenza virus indicates that it was the common ancestor of both subsequent human and swine H1N1 lineages. ", "Since the appearance of H5N1 in 1997, pathologists have noticed a lot of similarities there as well.", "\n\nAnd the 1918 flu targeted young adults. ", "Those between ages 20-40 accounted for most of all deaths. ", "The over 50 age group was far less affected. ", "Perhaps more disturbing is the fact that the actual flu disease was not responsible for the majority of deaths associated with the influenza in 1918-19, it was secondary bacterial pneumonia so nasty pathologists conducting autopsies found the lungs in such a devastated condition the only thing they could compare it to was victims of poison gas.", "\n\nMilitary doctors called it “atypical pneumonia” back then. ", "Today it’s referred to as Acute Respiratory Distress Syndrome (ARDS). ", "The Army’s pneumonia board judged that “more than half” of all the deaths among soldiers came from this atypical pneumonia.", "\n\nAccording to California State University professor Ibrahim Al-Marashi, who wrote an enlightening treatise in the Bulletin of the Atomic Scientists titled, Black plague, Spanish flu, smallpox: All hold lessons for coronavirus, the recent COVID is just another instance in the long history of so-called zoonoses—diseases that jump from animals to humans.", "\n\nThe domestication of the horse led to the virus responsible for the common cold in humans, while the domestication of chickens gave humans chickenpox, shingles, and various strains of the bird flu. ", "Pigs were the source of influenza, and measles, smallpox; and tuberculosis emerged from cattle.", "\n\nWhen a virus successfully jumps species from an animal to a human (“patient zero”), and that version of the virus, in turn, succeeds in making the jump to a second human, those two people become the first two human vectors of human-to-human virus transmission.", "\n\nThree-quarters of infectious diseases are the result of zoonotic spillovers, and the novel coronavirus is no exception. ", "The term “coronavirus” refers to a family of viruses shaped like a crown, and it accounts for about 10 percent of common colds in humans. (", "Rhinoviruses are the predominant cause of the common cold.)", "\n\nNovel coronaviruses have made the jump into the human population on three occasions in the 21st century, each time causing a deadly pandemic: SARS (severe acute respiratory syndrome) in late 2002, MERS (Middle East respiratory syndrome) in 2012, and COVID-19 (coronavirus disease 2019) at the start of this winter.", "\n\nInterestingly, as early as 2007, the world was put on notice by an American Society for Microbiology journal article, Severe Acute Respiratory Syndrome Coronavirus as an Agent of Emerging and Reemerging Infection. ", "In it, researchers warned, “The presence of a large reservoir of SARS/CoV-like viruses in horseshoe bats, together with the culture of eating exotic mammals in southern China, is a time bomb. ", "The possibility of the reemergence of SARS and other novel viruses from animals or laboratories, and therefore the need for preparedness, should not be ignored.”", "\n\nBut ignored it was.", "\n\nIgnore at your peril\n\nWhat we are experiencing now around the world must look an awful lot like 101 years ago.", "\n\nThe flu that winter of 1918 was beyond imagination. ", "Millions were infected, thousands died. ", "No one escaped. ", "The pandemic affected everyone. ", "With one-quarter of the U.S. and one-fifth of the world infected with the influenza, it was impossible to hide from the sickness.", "\n\nThe strain was not only virulent and lethal but extraordinarily violent. ", "It presented a suite of symptoms rarely seen with influenza—symptoms so unusual it was sometimes misdiagnosed as dengue, cholera, or typhoid. ", "Patients exhibited a range of complications including hemorrhage from mucous membranes in the nose, stomach, and intestine. ", "Flu sufferers sometimes bled from their ears and eyes, or even right through unbroken skin.", "\n\n“Intense and protracted prostration led to hysteria, melancholia, and insanity with suicidal intent,” reported New York City Health Department’s chief pathologist on patients bedridden for so long if the disease didn’t kill them they were often driven mad with depression.", "\n\nPhysicians tried everything they knew, everything they had ever heard of; from the ancient art of bleeding patients to administering oxygen, to developing new vaccines and sera. ", "Home remedies weren’t much better, either, though there was some anecdotal indication that fresh air and sunshine eased symptoms better than most anything else.", "\n\nDoctors today are noting various possible home precautions that have been observed—at least in this early going—to have optimistic results. ", "A blast of Vitamin C, and Vitamin D, as well as zinc, are thought to help in boosting the immune system and fighting off illness. ", "Lately, malaria pills with\n\nhydroxychloroquine and chloroquine are being explored as a possible preventative for the current coronavirus.", "\n\nOne curious development noted by doctors of the early 20th Century is the later in the pandemic someone got sick, the milder the symptoms and less likely they would die from it.", "\n\nSurvivors of the first wave enjoyed significant resistance to the second and third waves, offering compelling evidence that all were caused by the same virus. ", "Compare that to the 1889-90 pandemic, which also came in waves, where it was the third wave that was the most lethal.", "\n\nIn the Spanish Influenza outbreak, even if isolation only slowed the virus, it had some value. ", "One of the more interesting epidemiologic findings in 1918 was that the later in the second wave someone got sick, the less likely he or she was to die, and the milder the illness was likely to be.", "\n\nThis was true in terms of how late in the second wave the virus struck a given area, and, more curiously, it was also true within an area. ", "For instance, cities struck later tended to suffer less, and individuals in a given city sickened later also tended to suffer less.", "\n\nWest coast American cities, hit later in the spread, had lower death rates than east coast cities; and Australia, which was did not experience the second wave until 1919, had the lowest death rate of any developed country.", "\n\nFurther, in the 1918-19 pandemic, someone who got sick four days into an outbreak in one place was more likely to develop a viral pneumonia that progressed to ARDS than someone who got sick four weeks into the outbreak in the same place. ", "The earlier patients were also more likely to develop secondary bacterial pneumonia, and to die from it.", "\n\nLate in the winter of 1919-20, the third wave of the plague swung through the U.S. to clean up anyone missed in 1918. ", "The world’s deadliest disease, in terms of mortality in a set amount of time, finally fizzled in summer 1920.", "\n\nAs we are just beginning to experience today, those lucky enough to avoid infection back then had to deal with public health ordinances to restrain the spread of the disease.", "\n\nPublic health departments distributed gauze masks to be worn in public. ", "Stores were forbidden from holding sales. ", "Funerals were limited to 15 minutes. ", "Some towns required a signed certificate to enter, and railroads would not accept passengers without them. ", "And yes, there were guards posted on some roads and train depots in and out of valleys in western Wyoming.", "\n\nBodies piled up as the death toll climbed. ", "Besides the lack of healthcare workers and medical supplies, there was a shortage of coffins, morticians, and gravediggers. ", "Conditions in 1918-19 were not so far removed from what was experienced in the Black Death era of the bubonic plague of the Middle Ages.", "\n\nHow Spanish Flu affected Jackson Hole\n\nHindsight is 20/20, and looking back on old newspaper articles during the outbreak of flu in 1918-19 plays out like a frightening vision—a monster movie with the reading audience knowing what the players don’t.", "\n\n“Don’t go there,” you want to warn. “", "Be overly cautious. ", "Do everything to prepare!”", "\n\nAn October 10, 1918 article in the Jackson’s Hole Courier observed the influenza spread as something happening “out there” in the world and “not yet in the valley.” ", "The paper printed an advisory on precautions to take to stay healthy. ", "Headlines noted the advance of the virus had brought it to neighboring states Utah and Nevada but “no occasion for hysteria exists,” the Courier wrote.", "\n\nPrecautions in late September, early October were almost nil. ", "Dances were held. ", "People came and went and congregated. ", "Life went on in Jackson Hole.", "\n\n“Spanish Influenza, which recently ravaged the German army and later spread into France and England, with such discomforting effects on the civil population, has been brought to some of the American Atlantic coast cities, officials fear, but they are awaiting further investigation and develops before forming definite opinions,” wrote the Courier on September 19, devoting barely a column inch to the story buried behind news the Boston Red Sox had won the 1918 World Series.", "\n\nA month later, the Casper Daily Press ran a small article on Thursday, October 10, 1918, sharing the news that “medical men had gathered in Chicago” to discuss the year’s influenza strain which they agreed might be something akin to 1890 when the U.S. was rocked by the virus. ", "Follow simple rules and the death rate would be cut down, they assured.", "\n\nThese rules included advice like: “Keep warm,” “do not kiss anyone,” and “avoid expectorating in public.”", "\n\nA week later, on October 18, the Kemmerer Republic reported 400 cases of Spanish influenza with 23 already dead. ", "Cokeville had eight cases, Star Valley had 30 with three deaths—one being the only doctor in Afton.", "\n\nIn that same newspaper, Kemmerer was reported having its first case despite establishing a quarantine on October 11, a measure the newspaper called the “most extreme precautions in the United States.” ", "But three Japanese men had arrived just before the borders to Kemmerer/Diamondville were closed. ", "They brought death with them.", "\n\nBy October 17, as the plague began its killing spree in earnest, the Courier suddenly reflected a more serious tone as local authorities began taking measures to slow the spread of the disease in the valley.", "\n\n“Miss Tressie Royer arrived to Jackson from Ogden after the school she was attending was closed due to flu. ", "She was placed in quarantine,” the paper wrote. “", "Miss Loletta Thomas [also recently] arrived to teach at Kelly and was quarantined.”", "\n\nSchools were ordered closed, chairs and tables removed from hotel lobbies to discourage congregating, and public gatherings of any kind were banned.", "\n\n“Spanish Influenza is traveling through the country like wildfire, and the community is rare, where it has not put in its appearance. ", "Jackson is, so far, fortunate and every possible precaution will be taken to prevent the malady from gaining a foothold here,” the Courier exclaimed.", "\n\nIt was too late. ", "For everyone.", "\n\nThe Worland Grit reported on October 24 that the flu there was “on the decline” and “seems to have been checked.”", "\n\nDr. WO Gray, Washakie County health officer, told the Grit, “Worland…seems to have been very fortunate in the small number of cases, especially serious ones, that have developed in the community. ", "There is probably no town in the state at the present time more free than our little city from the ‘Spanish Flu’ and with proper precautions taken by the public and reasonable care in the treatment of the cases which develop, there is no reason why this should not continue to exist.”", "\n\nThey relaxed, and paid the price.", "\n\nBy December, Grit headlines screamed, “Worland Under Strict Quarantine from Epidemic.” ", "More than a hundred new cases swamped the town’s two doctors who “were busy night and day and nearly work out completely” from battling the plague. ", "The Masonic Hall was converted into a makeshift hospital to deal with the growing numbers of infected.", "\n\nMeanwhile, in Jackson, the first deaths were being reported by early November. ", "Joseph Novack, who had recently moved to San Francisco for his work, died along with his wife and year-old son, Edward.", "\n\nJust before Christmas, in December 1918, the valley was full in the grip of the disease.", "\n\nDr. Charles Huff reported five new cases of flu on December 5. “", "Mr. and Mrs. Lloyd, two children, and a nephew all ill. ", "He hopes to keep them isolated to stop any spread,” the Courier reported.", "\n\nThe December 12 edition reported “quite a number of cases in South Park country” including SJ Callahan, James Boyle, Charles Wort, and GV Long.", "\n\nThree more deaths reported on January 9, 1919—Mrs. Doris Topping (Fred Topping’s first wife before Eva), Fred Karns, and Mrs. Fred Shinkle—brought the death toll to 11 in Jackson Hole.", "\n\nAdvertisements for local businesses like Wm. ", "Mercill’s and the Jackson Mercantile Co. went from hawking fresh vegetables and fruits for the holidays on Dec. 19, to announcing quarantine regulations prohibited anyone from entering the store. “", "Come to the back door,” they advised.", "\n\nEven that failed to work as Mable Hood, manager of the Mercill Store, came down ill and was reported convalescing at the Reed Hotel in January.", "\n\nLate in January, the Courier announced: “Present conditions in the valley are pretty good evidence that the flu epidemic has run its course.”", "\n\nIt hadn’t.", "\n\nA March 13, 1919 article reported: “Influenza returns, 15-16 new cases in and around Wilson. ", "RC Lundy, John Powell family, Warren Edmiston family, all ill.”", "\n\nA week later, “WC Deloney and the girls were stricken with flu.”", "\n\nOn March 27, 1919, the Kemmerer Republic, so boastful it had dodged significant trouble the previous year due to “strict enforcement of rigid quarantine,” admitted the flu made a rebound and the city was in the midst of a “serious outbreak.”", "\n\nIt wasn’t until July 31 of 1919 that Dr. Huff pronounced a Wilson outbreak all but cleared up, and the valley fairly safe, even as he, himself, took ill and was “bedridden with exhaustion and effects of the flu.” ", "Doctor W. Ackley came from Ashton, Idaho to assist Dr. Huff in late August 1919. ", "At that time, St. John’s was reporting 38 people hospitalized with the flu, all but two of those would recover.", "\n\nBut back it came for one last wave in 1920.", "\n\nOn February 5, 1920, Jackson Hole again had enough cases of the Spanish Flu that the Baptist Church canceled services and the valley again braced for the worst. ", "JP Cunningham took ill, reportedly down for six weeks with the flu in Idaho Falls through March.", "\n\nBy the summer of 1920, reports of any flu epidemic had disappeared from Wyoming newspapers. ", "But the resulting numbers were staggering.", "\n\nThirteen million jars of Vicks VapoRub were distributed in the U.S. during the height of the pandemic from October 1918 to March 1919. ", "The Wyoming Board of Health estimated flu deaths at around 700 at a time when the state population was a mere 180,000. ", "Hundreds in Jackson Hole were eventually down with the flu; nearly the entire population of the valley at the time.", "\n\nNew flu, same as the old flu\n\nHistory repeats itself. ", "We’ve all heard the phrase. ", "Or variations of it.", "\n\n“Those who do not learn [from] history are doomed to repeat it.” ", "That’s a quote often attributed to writer and philosopher George Santayana, an aphorism of what he actually wrote: “Those who cannot remember the past are condemned to repeat it.”", "\n\nClose enough.", "\n\nHow about this one? “", "What has been will be again, what has been done will be done again; there is nothing new under the sun.” ", "King Solomon wrote that in the Old Testament book Ecclesiastes. ", "It’s been there for decades, available and ignored in every motel nightstand in America.", "\n\nGeorge Bernard Shaw’s quip cuts to the quick. “", "If history repeats itself, and the unexpected always happens, how incapable must Man be of learning from experience.”", "\n\nHow given we all are to forget or dismiss. ", "Hollywood has warned again and again mankind’s demise might not manifest in a Godzilla suit breathing fire. ", "Our blindsided vulnerability will more realistically be a bug we can’t see without a microscope. ", "Something so small as to be dismissed as insignificant.", "\n\nIn many ways, we are no smarter or stronger or better prepared as a species now than we were in the Middle Ages or the Roaring Twenties. ", "We are still the same flawed men and women who beat our chests then succumb to a sniffle.", "\n\nBut we’ve always been resilient as a race. ", "You don’t climb to the top of the food chain by chance.", "\n\nAnd we are learning with this new syndrome. ", "Pathologists, scientists, doctors—they’re all putting to use a century of JAMA journals, new lab findings, and real-time life-or-death clinical trials in China and Italy to come up with a cure, a vaccination, a hope.", "\n\nNever before has it been easier to share information. ", "To collaborate with colleagues, and commiserate with friends and family around the globe. ", "We are all connected like no other time in history. ", "That’s one edge of the sword.", "\n\nThe flipside is we are all connected like no other time in history. ", "What happens to an old man in China, ripples to an Italian mother of five, ripples to a Seattle day-trader who had not a care in the world yesterday.", "\n\nWe’re in this together. ", "There is a map called history. ", "Let’s learn and live." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.006060606060606061, 0.0035335689045936395, 0, 0, 0, 0, 0, 0, 0, 0.015151515151515152, 0, 0, 0, 0.0044444444444444444, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.017543859649122806, 0, 0, 0, 0, 0.002652519893899204, 0, 0, 0, 0, 0, 0, 0.014285714285714285, 0.008130081300813009, 0.00847457627118644, 0, 0.010526315789473684, 0, 0, 0, 0, 0.0031645569620253164, 0.009259259259259259, 0.005208333333333333, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.007042253521126761, 0, 0, 0, 0, 0, 0, 0.007692307692307693, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.009433962264150943, 0, 0, 0.007352941176470588, 0.00398406374501992, 0, 0, 0, 0, 0, 0.006622516556291391, 0, 0, 0, 0, 0.0041841004184100415, 0.0035842293906810036, 0, 0, 0, 0.010101010101010102, 0.0049261083743842365, 0.010309278350515464, 0, 0.004784688995215311, 0.00909090909090909, 0, 0.024096385542168676, 0, 0, 0.013422818791946308, 0, 0, 0, 0.010101010101010102, 0, 0, 0, 0, 0, 0, 0.01680672268907563, 0, 0.015151515151515152, 0.017857142857142856, 0.0136986301369863, 0.027586206896551724, 0.021505376344086023, 0, 0.01015228426395939, 0, 0.006896551724137931, 0.006993006993006993, 0, 0.010526315789473684, 0.047619047619047616, 0, 0, 0.009302325581395349, 0.037037037037037035, 0, 0, 0.012269938650306749, 0.020833333333333332, 0, 0, 0.0072992700729927005, 0.008403361344537815, 0, 0, 0, 0, 0, 0.00558659217877095, 0, 0, 0, 0, 0, 0.02040816326530612, 0, 0, 0.009259259259259259, 0, 0, 0.007194244604316547, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.003139
5
[ "/* Intel PRO/1000 Linux driver\n * Copyright(c) 1999 - 2015 Intel Corporation.", "\n *\n * This program is free software; you can redistribute it and/or modify it\n * under the terms and conditions of the GNU General Public License,\n * version 2, as published by the Free Software Foundation.", "\n *\n * This program is distributed in the hope it will be useful, but WITHOUT\n * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or\n * FITNESS FOR A PARTICULAR PURPOSE. ", " See the GNU General Public License for\n * more details.", "\n *\n * The full GNU General Public License is included in this distribution in\n * the file called \"COPYING\".", "\n *\n * Contact Information:\n * Linux NICS <linux.nics@intel.com>\n * e1000-devel Mailing List <e1000-devel@lists.sourceforge.net>\n * Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497\n */\n\n/* ethtool support for e1000 */\n\n#include <linux/netdevice.h>\n#include <linux/interrupt.h>\n#include <linux/ethtool.h>\n#include <linux/pci.h>\n#include <linux/slab.h>\n#include <linux/delay.h>\n#include <linux/vmalloc.h>\n#include <linux/pm_runtime.h>\n\n#include \"e1000.h\"\n\nenum { NETDEV_STATS, E1000_STATS };\n\nstruct e1000_stats {\n\tchar stat_string[ETH_GSTRING_LEN];\n\tint type;\n\tint sizeof_stat;\n\tint stat_offset;\n};\n\n#define E1000_STAT(str, m) { \\\n\t\t.stat_string = str, \\\n\t\t.type = E1000_STATS, \\\n\t\t.sizeof_stat = sizeof(((struct e1000_adapter *)0)->m), \\\n\t\t.stat_offset = offsetof(struct e1000_adapter, m) }\n#define E1000_NETDEV_STAT(str, m) { \\\n\t\t.stat_string = str, \\\n\t\t.type = NETDEV_STATS, \\\n\t\t.sizeof_stat = sizeof(((struct rtnl_link_stats64 *)0)->m), \\\n\t\t.stat_offset = offsetof(struct rtnl_link_stats64, m) }\n\nstatic const struct e1000_stats e1000_gstrings_stats[] = {\n\tE1000_STAT(\"rx_packets\", stats.gprc),\n\tE1000_STAT(\"tx_packets\", stats.gptc),\n\tE1000_STAT(\"rx_bytes\", stats.gorc),\n\tE1000_STAT(\"tx_bytes\", stats.gotc),\n\tE1000_STAT(\"rx_broadcast\", stats.bprc),\n\tE1000_STAT(\"tx_broadcast\", stats.bptc),\n\tE1000_STAT(\"rx_multicast\", stats.mprc),\n\tE1000_STAT(\"tx_multicast\", stats.mptc),\n\tE1000_NETDEV_STAT(\"rx_errors\", rx_errors),\n\tE1000_NETDEV_STAT(\"tx_errors\", tx_errors),\n\tE1000_NETDEV_STAT(\"tx_dropped\", tx_dropped),\n\tE1000_STAT(\"multicast\", stats.mprc),\n\tE1000_STAT(\"collisions\", stats.colc),\n\tE1000_NETDEV_STAT(\"rx_length_errors\", rx_length_errors),\n\tE1000_NETDEV_STAT(\"rx_over_errors\", rx_over_errors),\n\tE1000_STAT(\"rx_crc_errors\", stats.crcerrs),\n\tE1000_NETDEV_STAT(\"rx_frame_errors\", rx_frame_errors),\n\tE1000_STAT(\"rx_no_buffer_count\", stats.rnbc),\n\tE1000_STAT(\"rx_missed_errors\", stats.mpc),\n\tE1000_STAT(\"tx_aborted_errors\", stats.ecol),\n\tE1000_STAT(\"tx_carrier_errors\", stats.tncrs),\n\tE1000_NETDEV_STAT(\"tx_fifo_errors\", tx_fifo_errors),\n\tE1000_NETDEV_STAT(\"tx_heartbeat_errors\", tx_heartbeat_errors),\n\tE1000_STAT(\"tx_window_errors\", stats.latecol),\n\tE1000_STAT(\"tx_abort_late_coll\", stats.latecol),\n\tE1000_STAT(\"tx_deferred_ok\", stats.dc),\n\tE1000_STAT(\"tx_single_coll_ok\", stats.scc),\n\tE1000_STAT(\"tx_multi_coll_ok\", stats.mcc),\n\tE1000_STAT(\"tx_timeout_count\", tx_timeout_count),\n\tE1000_STAT(\"tx_restart_queue\", restart_queue),\n\tE1000_STAT(\"rx_long_length_errors\", stats.roc),\n\tE1000_STAT(\"rx_short_length_errors\", stats.ruc),\n\tE1000_STAT(\"rx_align_errors\", stats.algnerrc),\n\tE1000_STAT(\"tx_tcp_seg_good\", stats.tsctc),\n\tE1000_STAT(\"tx_tcp_seg_failed\", stats.tsctfc),\n\tE1000_STAT(\"rx_flow_control_xon\", stats.xonrxc),\n\tE1000_STAT(\"rx_flow_control_xoff\", stats.xoffrxc),\n\tE1000_STAT(\"tx_flow_control_xon\", stats.xontxc),\n\tE1000_STAT(\"tx_flow_control_xoff\", stats.xofftxc),\n\tE1000_STAT(\"rx_csum_offload_good\", hw_csum_good),\n\tE1000_STAT(\"rx_csum_offload_errors\", hw_csum_err),\n\tE1000_STAT(\"rx_header_split\", rx_hdr_split),\n\tE1000_STAT(\"alloc_rx_buff_failed\", alloc_rx_buff_failed),\n\tE1000_STAT(\"tx_smbus\", stats.mgptc),\n\tE1000_STAT(\"rx_smbus\", stats.mgprc),\n\tE1000_STAT(\"dropped_smbus\", stats.mgpdc),\n\tE1000_STAT(\"rx_dma_failed\", rx_dma_failed),\n\tE1000_STAT(\"tx_dma_failed\", tx_dma_failed),\n\tE1000_STAT(\"rx_hwtstamp_cleared\", rx_hwtstamp_cleared),\n\tE1000_STAT(\"uncorr_ecc_errors\", uncorr_errors),\n\tE1000_STAT(\"corr_ecc_errors\", corr_errors),\n\tE1000_STAT(\"tx_hwtstamp_timeouts\", tx_hwtstamp_timeouts),\n};\n\n#define E1000_GLOBAL_STATS_LEN\tARRAY_SIZE(e1000_gstrings_stats)\n#define E1000_STATS_LEN (E1000_GLOBAL_STATS_LEN)\nstatic const char e1000_gstrings_test[][ETH_GSTRING_LEN] = {\n\t\"Register test (offline)\", \"Eeprom test (offline)\",\n\t\"Interrupt test (offline)\", \"Loopback test (offline)\",\n\t\"Link test (on/offline)\"\n};\n\n#define E1000_TEST_LEN ARRAY_SIZE(e1000_gstrings_test)\n\nstatic int e1000_get_settings(struct net_device *netdev,\n\t\t\t struct ethtool_cmd *ecmd)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 speed;\n\n\tif (hw->phy.media_type == e1000_media_type_copper) {\n\t\tecmd->supported = (SUPPORTED_10baseT_Half |\n\t\t\t\t SUPPORTED_10baseT_Full |\n\t\t\t\t SUPPORTED_100baseT_Half |\n\t\t\t\t SUPPORTED_100baseT_Full |\n\t\t\t\t SUPPORTED_1000baseT_Full |\n\t\t\t\t SUPPORTED_Autoneg |\n\t\t\t\t SUPPORTED_TP);\n\t\tif (hw->phy.type == e1000_phy_ife)\n\t\t\tecmd->supported &= ~SUPPORTED_1000baseT_Full;\n\t\tecmd->advertising = ADVERTISED_TP;\n\n\t\tif (hw->mac.autoneg == 1) {\n\t\t\tecmd->advertising |= ADVERTISED_Autoneg;\n\t\t\t/* the e1000 autoneg seems to match ethtool nicely */\n\t\t\tecmd->advertising |= hw->phy.autoneg_advertised;\n\t\t}\n\n\t\tecmd->port = PORT_TP;\n\t\tecmd->phy_address = hw->phy.addr;\n\t\tecmd->transceiver = XCVR_INTERNAL;\n\n\t} else {\n\t\tecmd->supported = (SUPPORTED_1000baseT_Full |\n\t\t\t\t SUPPORTED_FIBRE |\n\t\t\t\t SUPPORTED_Autoneg);\n\n\t\tecmd->advertising = (ADVERTISED_1000baseT_Full |\n\t\t\t\t ADVERTISED_FIBRE |\n\t\t\t\t ADVERTISED_Autoneg);\n\n\t\tecmd->port = PORT_FIBRE;\n\t\tecmd->transceiver = XCVR_EXTERNAL;\n\t}\n\n\tspeed = SPEED_UNKNOWN;\n\tecmd->duplex = DUPLEX_UNKNOWN;\n\n\tif (netif_running(netdev)) {\n\t\tif (netif_carrier_ok(netdev)) {\n\t\t\tspeed = adapter->link_speed;\n\t\t\tecmd->duplex = adapter->link_duplex - 1;\n\t\t}\n\t} else if (!", "pm_runtime_suspended(netdev->dev.parent)) {\n\t\tu32 status = er32(STATUS);\n\n\t\tif (status & E1000_STATUS_LU) {\n\t\t\tif (status & E1000_STATUS_SPEED_1000)\n\t\t\t\tspeed = SPEED_1000;\n\t\t\telse if (status & E1000_STATUS_SPEED_100)\n\t\t\t\tspeed = SPEED_100;\n\t\t\telse\n\t\t\t\tspeed = SPEED_10;\n\n\t\t\tif (status & E1000_STATUS_FD)\n\t\t\t\tecmd->duplex = DUPLEX_FULL;\n\t\t\telse\n\t\t\t\tecmd->duplex = DUPLEX_HALF;\n\t\t}\n\t}\n\n\tethtool_cmd_speed_set(ecmd, speed);\n\tecmd->autoneg = ((hw->phy.media_type == e1000_media_type_fiber) ||\n\t\t\t hw->mac.autoneg) ? ", "AUTONEG_ENABLE : AUTONEG_DISABLE;\n\n\t/* MDI-X => 2; MDI =>1; Invalid =>0 */\n\tif ((hw->phy.media_type == e1000_media_type_copper) &&\n\t netif_carrier_ok(netdev))\n\t\tecmd->eth_tp_mdix = hw->phy.is_mdix ? ", "ETH_TP_MDI_X : ETH_TP_MDI;\n\telse\n\t\tecmd->eth_tp_mdix = ETH_TP_MDI_INVALID;\n\n\tif (hw->phy.mdix == AUTO_ALL_MODES)\n\t\tecmd->eth_tp_mdix_ctrl = ETH_TP_MDI_AUTO;\n\telse\n\t\tecmd->eth_tp_mdix_ctrl = hw->phy.mdix;\n\n\treturn 0;\n}\n\nstatic int e1000_set_spd_dplx(struct e1000_adapter *adapter, u32 spd, u8 dplx)\n{\n\tstruct e1000_mac_info *mac = &adapter->hw.mac;\n\n\tmac->autoneg = 0;\n\n\t/* Make sure dplx is at most 1 bit and lsb of speed is not set\n\t * for the switch() below to work\n\t */\n\tif ((spd & 1) || (dplx & ~1))\n\t\tgoto err_inval;\n\n\t/* Fiber NICs only allow 1000 gbps Full duplex */\n\tif ((adapter->hw.phy.media_type == e1000_media_type_fiber) &&\n\t (spd !", "= SPEED_1000) && (dplx !", "= DUPLEX_FULL)) {\n\t\tgoto err_inval;\n\t}\n\n\tswitch (spd + dplx) {\n\tcase SPEED_10 + DUPLEX_HALF:\n\t\tmac->forced_speed_duplex = ADVERTISE_10_HALF;\n\t\tbreak;\n\tcase SPEED_10 + DUPLEX_FULL:\n\t\tmac->forced_speed_duplex = ADVERTISE_10_FULL;\n\t\tbreak;\n\tcase SPEED_100 + DUPLEX_HALF:\n\t\tmac->forced_speed_duplex = ADVERTISE_100_HALF;\n\t\tbreak;\n\tcase SPEED_100 + DUPLEX_FULL:\n\t\tmac->forced_speed_duplex = ADVERTISE_100_FULL;\n\t\tbreak;\n\tcase SPEED_1000 + DUPLEX_FULL:\n\t\tmac->autoneg = 1;\n\t\tadapter->hw.phy.autoneg_advertised = ADVERTISE_1000_FULL;\n\t\tbreak;\n\tcase SPEED_1000 + DUPLEX_HALF:\t/* not supported */\n\tdefault:\n\t\tgoto err_inval;\n\t}\n\n\t/* clear MDI, MDI(-X) override is only allowed when autoneg enabled */\n\tadapter->hw.phy.mdix = AUTO_ALL_MODES;\n\n\treturn 0;\n\nerr_inval:\n\te_err(\"Unsupported Speed/Duplex configuration\\n\");\n\treturn -EINVAL;\n}\n\nstatic int e1000_set_settings(struct net_device *netdev,\n\t\t\t struct ethtool_cmd *ecmd)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tint ret_val = 0;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\t/* When SoL/IDER sessions are active, autoneg/speed/duplex\n\t * cannot be changed\n\t */\n\tif (hw->phy.ops.check_reset_block &&\n\t hw->phy.ops.check_reset_block(hw)) {\n\t\te_err(\"Cannot change link characteristics when SoL/IDER is active.\\n\");\n\t\tret_val = -EINVAL;\n\t\tgoto out;\n\t}\n\n\t/* MDI setting is only allowed when autoneg enabled because\n\t * some hardware doesn't allow MDI setting when speed or\n\t * duplex is forced.", "\n\t */\n\tif (ecmd->eth_tp_mdix_ctrl) {\n\t\tif (hw->phy.media_type !", "= e1000_media_type_copper) {\n\t\t\tret_val = -EOPNOTSUPP;\n\t\t\tgoto out;\n\t\t}\n\n\t\tif ((ecmd->eth_tp_mdix_ctrl !", "= ETH_TP_MDI_AUTO) &&\n\t\t (ecmd->autoneg !", "= AUTONEG_ENABLE)) {\n\t\t\te_err(\"forcing MDI/MDI-X state is not supported when link speed and/or duplex are forced\\n\");\n\t\t\tret_val = -EINVAL;\n\t\t\tgoto out;\n\t\t}\n\t}\n\n\twhile (test_and_set_bit(__E1000_RESETTING, &adapter->state))\n\t\tusleep_range(1000, 2000);\n\n\tif (ecmd->autoneg == AUTONEG_ENABLE) {\n\t\thw->mac.autoneg = 1;\n\t\tif (hw->phy.media_type == e1000_media_type_fiber)\n\t\t\thw->phy.autoneg_advertised = ADVERTISED_1000baseT_Full |\n\t\t\t ADVERTISED_FIBRE | ADVERTISED_Autoneg;\n\t\telse\n\t\t\thw->phy.autoneg_advertised = ecmd->advertising |\n\t\t\t ADVERTISED_TP | ADVERTISED_Autoneg;\n\t\tecmd->advertising = hw->phy.autoneg_advertised;\n\t\tif (adapter->fc_autoneg)\n\t\t\thw->fc.requested_mode = e1000_fc_default;\n\t} else {\n\t\tu32 speed = ethtool_cmd_speed(ecmd);\n\t\t/* calling this overrides forced MDI setting */\n\t\tif (e1000_set_spd_dplx(adapter, speed, ecmd->duplex)) {\n\t\t\tret_val = -EINVAL;\n\t\t\tgoto out;\n\t\t}\n\t}\n\n\t/* MDI-X => 2; MDI => 1; Auto => 3 */\n\tif (ecmd->eth_tp_mdix_ctrl) {\n\t\t/* fix up the value for auto (3 => 0) as zero is mapped\n\t\t * internally to auto\n\t\t */\n\t\tif (ecmd->eth_tp_mdix_ctrl == ETH_TP_MDI_AUTO)\n\t\t\thw->phy.mdix = AUTO_ALL_MODES;\n\t\telse\n\t\t\thw->phy.mdix = ecmd->eth_tp_mdix_ctrl;\n\t}\n\n\t/* reset the link */\n\tif (netif_running(adapter->netdev)) {\n\t\te1000e_down(adapter, true);\n\t\te1000e_up(adapter);\n\t} else {\n\t\te1000e_reset(adapter);\n\t}\n\nout:\n\tpm_runtime_put_sync(netdev->dev.parent);\n\tclear_bit(__E1000_RESETTING, &adapter->state);\n\treturn ret_val;\n}\n\nstatic void e1000_get_pauseparam(struct net_device *netdev,\n\t\t\t\t struct ethtool_pauseparam *pause)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\n\tpause->autoneg =\n\t (adapter->fc_autoneg ? ", "AUTONEG_ENABLE : AUTONEG_DISABLE);\n\n\tif (hw->fc.current_mode == e1000_fc_rx_pause) {\n\t\tpause->rx_pause = 1;\n\t} else if (hw->fc.current_mode == e1000_fc_tx_pause) {\n\t\tpause->tx_pause = 1;\n\t} else if (hw->fc.current_mode == e1000_fc_full) {\n\t\tpause->rx_pause = 1;\n\t\tpause->tx_pause = 1;\n\t}\n}\n\nstatic int e1000_set_pauseparam(struct net_device *netdev,\n\t\t\t\tstruct ethtool_pauseparam *pause)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tint retval = 0;\n\n\tadapter->fc_autoneg = pause->autoneg;\n\n\twhile (test_and_set_bit(__E1000_RESETTING, &adapter->state))\n\t\tusleep_range(1000, 2000);\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tif (adapter->fc_autoneg == AUTONEG_ENABLE) {\n\t\thw->fc.requested_mode = e1000_fc_default;\n\t\tif (netif_running(adapter->netdev)) {\n\t\t\te1000e_down(adapter, true);\n\t\t\te1000e_up(adapter);\n\t\t} else {\n\t\t\te1000e_reset(adapter);\n\t\t}\n\t} else {\n\t\tif (pause->rx_pause && pause->tx_pause)\n\t\t\thw->fc.requested_mode = e1000_fc_full;\n\t\telse if (pause->rx_pause && !", "pause->tx_pause)\n\t\t\thw->fc.requested_mode = e1000_fc_rx_pause;\n\t\telse if (!", "pause->rx_pause && pause->tx_pause)\n\t\t\thw->fc.requested_mode = e1000_fc_tx_pause;\n\t\telse if (!", "pause->rx_pause && !", "pause->tx_pause)\n\t\t\thw->fc.requested_mode = e1000_fc_none;\n\n\t\thw->fc.current_mode = hw->fc.requested_mode;\n\n\t\tif (hw->phy.media_type == e1000_media_type_fiber) {\n\t\t\tretval = hw->mac.ops.setup_link(hw);\n\t\t\t/* implicit goto out */\n\t\t} else {\n\t\t\tretval = e1000e_force_mac_fc(hw);\n\t\t\tif (retval)\n\t\t\t\tgoto out;\n\t\t\te1000e_set_fc_watermarks(hw);\n\t\t}\n\t}\n\nout:\n\tpm_runtime_put_sync(netdev->dev.parent);\n\tclear_bit(__E1000_RESETTING, &adapter->state);\n\treturn retval;\n}\n\nstatic u32 e1000_get_msglevel(struct net_device *netdev)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\treturn adapter->msg_enable;\n}\n\nstatic void e1000_set_msglevel(struct net_device *netdev, u32 data)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tadapter->msg_enable = data;\n}\n\nstatic int e1000_get_regs_len(struct net_device __always_unused *netdev)\n{\n#define E1000_REGS_LEN 32\t/* overestimate */\n\treturn E1000_REGS_LEN * sizeof(u32);\n}\n\nstatic void e1000_get_regs(struct net_device *netdev,\n\t\t\t struct ethtool_regs *regs, void *p)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 *regs_buff = p;\n\tu16 phy_data;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tmemset(p, 0, E1000_REGS_LEN * sizeof(u32));\n\n\tregs->version = (1 << 24) | (adapter->pdev->revision << 16) |\n\t adapter->pdev->device;\n\n\tregs_buff[0] = er32(CTRL);\n\tregs_buff[1] = er32(STATUS);\n\n\tregs_buff[2] = er32(RCTL);\n\tregs_buff[3] = er32(RDLEN(0));\n\tregs_buff[4] = er32(RDH(0));\n\tregs_buff[5] = er32(RDT(0));\n\tregs_buff[6] = er32(RDTR);\n\n\tregs_buff[7] = er32(TCTL);\n\tregs_buff[8] = er32(TDLEN(0));\n\tregs_buff[9] = er32(TDH(0));\n\tregs_buff[10] = er32(TDT(0));\n\tregs_buff[11] = er32(TIDV);\n\n\tregs_buff[12] = adapter->hw.phy.type;\t/* PHY type (IGP=1, M88=0) */\n\n\t/* ethtool doesn't use anything past this point, so all this\n\t * code is likely legacy junk for apps that may or may not exist\n\t */\n\tif (hw->phy.type == e1000_phy_m88) {\n\t\te1e_rphy(hw, M88E1000_PHY_SPEC_STATUS, &phy_data);\n\t\tregs_buff[13] = (u32)phy_data; /* cable length */\n\t\tregs_buff[14] = 0; /* Dummy (to align w/ IGP phy reg dump) */\n\t\tregs_buff[15] = 0; /* Dummy (to align w/ IGP phy reg dump) */\n\t\tregs_buff[16] = 0; /* Dummy (to align w/ IGP phy reg dump) */\n\t\te1e_rphy(hw, M88E1000_PHY_SPEC_CTRL, &phy_data);\n\t\tregs_buff[17] = (u32)phy_data; /* extended 10bt distance */\n\t\tregs_buff[18] = regs_buff[13]; /* cable polarity */\n\t\tregs_buff[19] = 0; /* Dummy (to align w/ IGP phy reg dump) */\n\t\tregs_buff[20] = regs_buff[17]; /* polarity correction */\n\t\t/* phy receive errors */\n\t\tregs_buff[22] = adapter->phy_stats.receive_errors;\n\t\tregs_buff[23] = regs_buff[13]; /* mdix mode */\n\t}\n\tregs_buff[21] = 0;\t/* was idle_errors */\n\te1e_rphy(hw, MII_STAT1000, &phy_data);\n\tregs_buff[24] = (u32)phy_data;\t/* phy local receiver status */\n\tregs_buff[25] = regs_buff[24];\t/* phy remote receiver status */\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n}\n\nstatic int e1000_get_eeprom_len(struct net_device *netdev)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\treturn adapter->hw.nvm.word_size * 2;\n}\n\nstatic int e1000_get_eeprom(struct net_device *netdev,\n\t\t\t struct ethtool_eeprom *eeprom, u8 *bytes)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu16 *eeprom_buff;\n\tint first_word;\n\tint last_word;\n\tint ret_val = 0;\n\tu16 i;\n\n\tif (eeprom->len == 0)\n\t\treturn -EINVAL;\n\n\teeprom->magic = adapter->pdev->vendor | (adapter->pdev->device << 16);\n\n\tfirst_word = eeprom->offset >> 1;\n\tlast_word = (eeprom->offset + eeprom->len - 1) >> 1;\n\n\teeprom_buff = kmalloc(sizeof(u16) * (last_word - first_word + 1),\n\t\t\t GFP_KERNEL);\n\tif (!", "eeprom_buff)\n\t\treturn -ENOMEM;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tif (hw->nvm.type == e1000_nvm_eeprom_spi) {\n\t\tret_val = e1000_read_nvm(hw, first_word,\n\t\t\t\t\t last_word - first_word + 1,\n\t\t\t\t\t eeprom_buff);\n\t} else {\n\t\tfor (i = 0; i < last_word - first_word + 1; i++) {\n\t\t\tret_val = e1000_read_nvm(hw, first_word + i, 1,\n\t\t\t\t\t\t &eeprom_buff[i]);\n\t\t\tif (ret_val)\n\t\t\t\tbreak;\n\t\t}\n\t}\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n\n\tif (ret_val) {\n\t\t/* a read error occurred, throw away the result */\n\t\tmemset(eeprom_buff, 0xff, sizeof(u16) *\n\t\t (last_word - first_word + 1));\n\t} else {\n\t\t/* Device's eeprom is always little-endian, word addressable */\n\t\tfor (i = 0; i < last_word - first_word + 1; i++)\n\t\t\tle16_to_cpus(&eeprom_buff[i]);\n\t}\n\n\tmemcpy(bytes, (u8 *)eeprom_buff + (eeprom->offset & 1), eeprom->len);\n\tkfree(eeprom_buff);\n\n\treturn ret_val;\n}\n\nstatic int e1000_set_eeprom(struct net_device *netdev,\n\t\t\t struct ethtool_eeprom *eeprom, u8 *bytes)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu16 *eeprom_buff;\n\tvoid *ptr;\n\tint max_len;\n\tint first_word;\n\tint last_word;\n\tint ret_val = 0;\n\tu16 i;\n\n\tif (eeprom->len == 0)\n\t\treturn -EOPNOTSUPP;\n\n\tif (eeprom->magic !", "=\n\t (adapter->pdev->vendor | (adapter->pdev->device << 16)))\n\t\treturn -EFAULT;\n\n\tif (adapter->flags & FLAG_READ_ONLY_NVM)\n\t\treturn -EINVAL;\n\n\tmax_len = hw->nvm.word_size * 2;\n\n\tfirst_word = eeprom->offset >> 1;\n\tlast_word = (eeprom->offset + eeprom->len - 1) >> 1;\n\teeprom_buff = kmalloc(max_len, GFP_KERNEL);\n\tif (!", "eeprom_buff)\n\t\treturn -ENOMEM;\n\n\tptr = (void *)eeprom_buff;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tif (eeprom->offset & 1) {\n\t\t/* need read/modify/write of first changed EEPROM word */\n\t\t/* only the second byte of the word is being modified */\n\t\tret_val = e1000_read_nvm(hw, first_word, 1, &eeprom_buff[0]);\n\t\tptr++;\n\t}\n\tif (((eeprom->offset + eeprom->len) & 1) && (!", "ret_val))\n\t\t/* need read/modify/write of last changed EEPROM word */\n\t\t/* only the first byte of the word is being modified */\n\t\tret_val = e1000_read_nvm(hw, last_word, 1,\n\t\t\t\t\t &eeprom_buff[last_word - first_word]);\n\n\tif (ret_val)\n\t\tgoto out;\n\n\t/* Device's eeprom is always little-endian, word addressable */\n\tfor (i = 0; i < last_word - first_word + 1; i++)\n\t\tle16_to_cpus(&eeprom_buff[i]);\n\n\tmemcpy(ptr, bytes, eeprom->len);\n\n\tfor (i = 0; i < last_word - first_word + 1; i++)\n\t\tcpu_to_le16s(&eeprom_buff[i]);\n\n\tret_val = e1000_write_nvm(hw, first_word,\n\t\t\t\t last_word - first_word + 1, eeprom_buff);\n\n\tif (ret_val)\n\t\tgoto out;\n\n\t/* Update the checksum over the first part of the EEPROM if needed\n\t * and flush shadow RAM for applicable controllers\n\t */\n\tif ((first_word <= NVM_CHECKSUM_REG) ||\n\t (hw->mac.type == e1000_82583) ||\n\t (hw->mac.type == e1000_82574) ||\n\t (hw->mac.type == e1000_82573))\n\t\tret_val = e1000e_update_nvm_checksum(hw);\n\nout:\n\tpm_runtime_put_sync(netdev->dev.parent);\n\tkfree(eeprom_buff);\n\treturn ret_val;\n}\n\nstatic void e1000_get_drvinfo(struct net_device *netdev,\n\t\t\t struct ethtool_drvinfo *drvinfo)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tstrlcpy(drvinfo->driver, e1000e_driver_name, sizeof(drvinfo->driver));\n\tstrlcpy(drvinfo->version, e1000e_driver_version,\n\t\tsizeof(drvinfo->version));\n\n\t/* EEPROM image version # is reported as firmware version # for\n\t * PCI-E controllers\n\t */\n\tsnprintf(drvinfo->fw_version, sizeof(drvinfo->fw_version),\n\t\t \"%d.%d-%d\",\n\t\t (adapter->eeprom_vers & 0xF000) >> 12,\n\t\t (adapter->eeprom_vers & 0x0FF0) >> 4,\n\t\t (adapter->eeprom_vers & 0x000F));\n\n\tstrlcpy(drvinfo->bus_info, pci_name(adapter->pdev),\n\t\tsizeof(drvinfo->bus_info));\n}\n\nstatic void e1000_get_ringparam(struct net_device *netdev,\n\t\t\t\tstruct ethtool_ringparam *ring)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tring->rx_max_pending = E1000_MAX_RXD;\n\tring->tx_max_pending = E1000_MAX_TXD;\n\tring->rx_pending = adapter->rx_ring_count;\n\tring->tx_pending = adapter->tx_ring_count;\n}\n\nstatic int e1000_set_ringparam(struct net_device *netdev,\n\t\t\t struct ethtool_ringparam *ring)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_ring *temp_tx = NULL, *temp_rx = NULL;\n\tint err = 0, size = sizeof(struct e1000_ring);\n\tbool set_tx = false, set_rx = false;\n\tu16 new_rx_count, new_tx_count;\n\n\tif ((ring->rx_mini_pending) || (ring->rx_jumbo_pending))\n\t\treturn -EINVAL;\n\n\tnew_rx_count = clamp_t(u32, ring->rx_pending, E1000_MIN_RXD,\n\t\t\t E1000_MAX_RXD);\n\tnew_rx_count = ALIGN(new_rx_count, REQ_RX_DESCRIPTOR_MULTIPLE);\n\n\tnew_tx_count = clamp_t(u32, ring->tx_pending, E1000_MIN_TXD,\n\t\t\t E1000_MAX_TXD);\n\tnew_tx_count = ALIGN(new_tx_count, REQ_TX_DESCRIPTOR_MULTIPLE);\n\n\tif ((new_tx_count == adapter->tx_ring_count) &&\n\t (new_rx_count == adapter->rx_ring_count))\n\t\t/* nothing to do */\n\t\treturn 0;\n\n\twhile (test_and_set_bit(__E1000_RESETTING, &adapter->state))\n\t\tusleep_range(1000, 2000);\n\n\tif (!", "netif_running(adapter->netdev)) {\n\t\t/* Set counts now and allocate resources during open() */\n\t\tadapter->tx_ring->count = new_tx_count;\n\t\tadapter->rx_ring->count = new_rx_count;\n\t\tadapter->tx_ring_count = new_tx_count;\n\t\tadapter->rx_ring_count = new_rx_count;\n\t\tgoto clear_reset;\n\t}\n\n\tset_tx = (new_tx_count !", "= adapter->tx_ring_count);\n\tset_rx = (new_rx_count !", "= adapter->rx_ring_count);\n\n\t/* Allocate temporary storage for ring updates */\n\tif (set_tx) {\n\t\ttemp_tx = vmalloc(size);\n\t\tif (!", "temp_tx) {\n\t\t\terr = -ENOMEM;\n\t\t\tgoto free_temp;\n\t\t}\n\t}\n\tif (set_rx) {\n\t\ttemp_rx = vmalloc(size);\n\t\tif (!", "temp_rx) {\n\t\t\terr = -ENOMEM;\n\t\t\tgoto free_temp;\n\t\t}\n\t}\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\te1000e_down(adapter, true);\n\n\t/* We can't just free everything and then setup again, because the\n\t * ISRs in MSI-X mode get passed pointers to the Tx and Rx ring\n\t * structs. ", " First, attempt to allocate new resources...\n\t */\n\tif (set_tx) {\n\t\tmemcpy(temp_tx, adapter->tx_ring, size);\n\t\ttemp_tx->count = new_tx_count;\n\t\terr = e1000e_setup_tx_resources(temp_tx);\n\t\tif (err)\n\t\t\tgoto err_setup;\n\t}\n\tif (set_rx) {\n\t\tmemcpy(temp_rx, adapter->rx_ring, size);\n\t\ttemp_rx->count = new_rx_count;\n\t\terr = e1000e_setup_rx_resources(temp_rx);\n\t\tif (err)\n\t\t\tgoto err_setup_rx;\n\t}\n\n\t/* ...then free the old resources and copy back any new ring data */\n\tif (set_tx) {\n\t\te1000e_free_tx_resources(adapter->tx_ring);\n\t\tmemcpy(adapter->tx_ring, temp_tx, size);\n\t\tadapter->tx_ring_count = new_tx_count;\n\t}\n\tif (set_rx) {\n\t\te1000e_free_rx_resources(adapter->rx_ring);\n\t\tmemcpy(adapter->rx_ring, temp_rx, size);\n\t\tadapter->rx_ring_count = new_rx_count;\n\t}\n\nerr_setup_rx:\n\tif (err && set_tx)\n\t\te1000e_free_tx_resources(temp_tx);\nerr_setup:\n\te1000e_up(adapter);\n\tpm_runtime_put_sync(netdev->dev.parent);\nfree_temp:\n\tvfree(temp_tx);\n\tvfree(temp_rx);\nclear_reset:\n\tclear_bit(__E1000_RESETTING, &adapter->state);\n\treturn err;\n}\n\nstatic bool reg_pattern_test(struct e1000_adapter *adapter, u64 *data,\n\t\t\t int reg, int offset, u32 mask, u32 write)\n{\n\tu32 pat, val;\n\tstatic const u32 test[] = {\n\t\t0x5A5A5A5A, 0xA5A5A5A5, 0x00000000, 0xFFFFFFFF\n\t};\n\tfor (pat = 0; pat < ARRAY_SIZE(test); pat++) {\n\t\tE1000_WRITE_REG_ARRAY(&adapter->hw, reg, offset,\n\t\t\t\t (test[pat] & write));\n\t\tval = E1000_READ_REG_ARRAY(&adapter->hw, reg, offset);\n\t\tif (val !", "= (test[pat] & write & mask)) {\n\t\t\te_err(\"pattern test failed (reg 0x%05X): got 0x%08X expected 0x%08X\\n\",\n\t\t\t reg + (offset << 2), val,\n\t\t\t (test[pat] & write & mask));\n\t\t\t*data = reg;\n\t\t\treturn true;\n\t\t}\n\t}\n\treturn false;\n}\n\nstatic bool reg_set_and_check(struct e1000_adapter *adapter, u64 *data,\n\t\t\t int reg, u32 mask, u32 write)\n{\n\tu32 val;\n\n\t__ew32(&adapter->hw, reg, write & mask);\n\tval = __er32(&adapter->hw, reg);\n\tif ((write & mask) !", "= (val & mask)) {\n\t\te_err(\"set/check test failed (reg 0x%05X): got 0x%08X expected 0x%08X\\n\",\n\t\t reg, (val & mask), (write & mask));\n\t\t*data = reg;\n\t\treturn true;\n\t}\n\treturn false;\n}\n\n#define REG_PATTERN_TEST_ARRAY(reg, offset, mask, write) \\\n\tdo { \\\n\t\tif (reg_pattern_test(adapter, data, reg, offset, mask, write)) \\\n\t\t\treturn 1; \\\n\t} while (0)\n#define REG_PATTERN_TEST(reg, mask, write) \\\n\tREG_PATTERN_TEST_ARRAY(reg, 0, mask, write)\n\n#define REG_SET_AND_CHECK(reg, mask, write) \\\n\tdo { \\\n\t\tif (reg_set_and_check(adapter, data, reg, mask, write)) \\\n\t\t\treturn 1; \\\n\t} while (0)\n\nstatic int e1000_reg_test(struct e1000_adapter *adapter, u64 *data)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\tstruct e1000_mac_info *mac = &adapter->hw.mac;\n\tu32 value;\n\tu32 before;\n\tu32 after;\n\tu32 i;\n\tu32 toggle;\n\tu32 mask;\n\tu32 wlock_mac = 0;\n\n\t/* The status register is Read Only, so a write should fail.", "\n\t * Some bits that get toggled are ignored. ", " There are several bits\n\t * on newer hardware that are r/w.\n\t */\n\tswitch (mac->type) {\n\tcase e1000_82571:\n\tcase e1000_82572:\n\tcase e1000_80003es2lan:\n\t\ttoggle = 0x7FFFF3FF;\n\t\tbreak;\n\tdefault:\n\t\ttoggle = 0x7FFFF033;\n\t\tbreak;\n\t}\n\n\tbefore = er32(STATUS);\n\tvalue = (er32(STATUS) & toggle);\n\tew32(STATUS, toggle);\n\tafter = er32(STATUS) & toggle;\n\tif (value !", "= after) {\n\t\te_err(\"failed STATUS register test got: 0x%08X expected: 0x%08X\\n\",\n\t\t after, value);\n\t\t*data = 1;\n\t\treturn 1;\n\t}\n\t/* restore previous status */\n\tew32(STATUS, before);\n\n\tif (!(", "adapter->flags & FLAG_IS_ICH)) {\n\t\tREG_PATTERN_TEST(E1000_FCAL, 0xFFFFFFFF, 0xFFFFFFFF);\n\t\tREG_PATTERN_TEST(E1000_FCAH, 0x0000FFFF, 0xFFFFFFFF);\n\t\tREG_PATTERN_TEST(E1000_FCT, 0x0000FFFF, 0xFFFFFFFF);\n\t\tREG_PATTERN_TEST(E1000_VET, 0x0000FFFF, 0xFFFFFFFF);\n\t}\n\n\tREG_PATTERN_TEST(E1000_RDTR, 0x0000FFFF, 0xFFFFFFFF);\n\tREG_PATTERN_TEST(E1000_RDBAH(0), 0xFFFFFFFF, 0xFFFFFFFF);\n\tREG_PATTERN_TEST(E1000_RDLEN(0), 0x000FFF80, 0x000FFFFF);\n\tREG_PATTERN_TEST(E1000_RDH(0), 0x0000FFFF, 0x0000FFFF);\n\tREG_PATTERN_TEST(E1000_RDT(0), 0x0000FFFF, 0x0000FFFF);\n\tREG_PATTERN_TEST(E1000_FCRTH, 0x0000FFF8, 0x0000FFF8);\n\tREG_PATTERN_TEST(E1000_FCTTV, 0x0000FFFF, 0x0000FFFF);\n\tREG_PATTERN_TEST(E1000_TIPG, 0x3FFFFFFF, 0x3FFFFFFF);\n\tREG_PATTERN_TEST(E1000_TDBAH(0), 0xFFFFFFFF, 0xFFFFFFFF);\n\tREG_PATTERN_TEST(E1000_TDLEN(0), 0x000FFF80, 0x000FFFFF);\n\n\tREG_SET_AND_CHECK(E1000_RCTL, 0xFFFFFFFF, 0x00000000);\n\n\tbefore = ((adapter->flags & FLAG_IS_ICH) ? ", "0x06C3B33E : 0x06DFB3FE);\n\tREG_SET_AND_CHECK(E1000_RCTL, before, 0x003FFFFB);\n\tREG_SET_AND_CHECK(E1000_TCTL, 0xFFFFFFFF, 0x00000000);\n\n\tREG_SET_AND_CHECK(E1000_RCTL, before, 0xFFFFFFFF);\n\tREG_PATTERN_TEST(E1000_RDBAL(0), 0xFFFFFFF0, 0xFFFFFFFF);\n\tif (!(", "adapter->flags & FLAG_IS_ICH))\n\t\tREG_PATTERN_TEST(E1000_TXCW, 0xC000FFFF, 0x0000FFFF);\n\tREG_PATTERN_TEST(E1000_TDBAL(0), 0xFFFFFFF0, 0xFFFFFFFF);\n\tREG_PATTERN_TEST(E1000_TIDV, 0x0000FFFF, 0x0000FFFF);\n\tmask = 0x8003FFFF;\n\tswitch (mac->type) {\n\tcase e1000_ich10lan:\n\tcase e1000_pchlan:\n\tcase e1000_pch2lan:\n\tcase e1000_pch_lpt:\n\tcase e1000_pch_spt:\n\t\tmask |= (1 << 18);\n\t\tbreak;\n\tdefault:\n\t\tbreak;\n\t}\n\n\tif ((mac->type == e1000_pch_lpt) || (mac->type == e1000_pch_spt))\n\t\twlock_mac = (er32(FWSM) & E1000_FWSM_WLOCK_MAC_MASK) >>\n\t\t E1000_FWSM_WLOCK_MAC_SHIFT;\n\n\tfor (i = 0; i < mac->rar_entry_count; i++) {\n\t\tif ((mac->type == e1000_pch_lpt) ||\n\t\t (mac->type == e1000_pch_spt)) {\n\t\t\t/* Cannot test write-protected SHRAL[n] registers */\n\t\t\tif ((wlock_mac == 1) || (wlock_mac && (i > wlock_mac)))\n\t\t\t\tcontinue;\n\n\t\t\t/* SHRAH[9] different than the others */\n\t\t\tif (i == 10)\n\t\t\t\tmask |= (1 << 30);\n\t\t\telse\n\t\t\t\tmask &= ~(1 << 30);\n\t\t}\n\t\tif (mac->type == e1000_pch2lan) {\n\t\t\t/* SHRAH[0,1,2] different than previous */\n\t\t\tif (i == 1)\n\t\t\t\tmask &= 0xFFF4FFFF;\n\t\t\t/* SHRAH[3] different than SHRAH[0,1,2] */\n\t\t\tif (i == 4)\n\t\t\t\tmask |= (1 << 30);\n\t\t\t/* RAR[1-6] owned by management engine - skipping */\n\t\t\tif (i > 0)\n\t\t\t\ti += 6;\n\t\t}\n\n\t\tREG_PATTERN_TEST_ARRAY(E1000_RA, ((i << 1) + 1), mask,\n\t\t\t\t 0xFFFFFFFF);\n\t\t/* reset index to actual value */\n\t\tif ((mac->type == e1000_pch2lan) && (i > 6))\n\t\t\ti -= 6;\n\t}\n\n\tfor (i = 0; i < mac->mta_reg_count; i++)\n\t\tREG_PATTERN_TEST_ARRAY(E1000_MTA, i, 0xFFFFFFFF, 0xFFFFFFFF);\n\n\t*data = 0;\n\n\treturn 0;\n}\n\nstatic int e1000_eeprom_test(struct e1000_adapter *adapter, u64 *data)\n{\n\tu16 temp;\n\tu16 checksum = 0;\n\tu16 i;\n\n\t*data = 0;\n\t/* Read and add up the contents of the EEPROM */\n\tfor (i = 0; i < (NVM_CHECKSUM_REG + 1); i++) {\n\t\tif ((e1000_read_nvm(&adapter->hw, i, 1, &temp)) < 0) {\n\t\t\t*data = 1;\n\t\t\treturn *data;\n\t\t}\n\t\tchecksum += temp;\n\t}\n\n\t/* If Checksum is not Correct return error else test passed */\n\tif ((checksum !", "= (u16)NVM_SUM) && !(*", "data))\n\t\t*data = 2;\n\n\treturn *data;\n}\n\nstatic irqreturn_t e1000_test_intr(int __always_unused irq, void *data)\n{\n\tstruct net_device *netdev = (struct net_device *)data;\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\n\tadapter->test_icr |= er32(ICR);\n\n\treturn IRQ_HANDLED;\n}\n\nstatic int e1000_intr_test(struct e1000_adapter *adapter, u64 *data)\n{\n\tstruct net_device *netdev = adapter->netdev;\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 mask;\n\tu32 shared_int = 1;\n\tu32 irq = adapter->pdev->irq;\n\tint i;\n\tint ret_val = 0;\n\tint int_mode = E1000E_INT_MODE_LEGACY;\n\n\t*data = 0;\n\n\t/* NOTE: we don't test MSI/MSI-X interrupts here, yet */\n\tif (adapter->int_mode == E1000E_INT_MODE_MSIX) {\n\t\tint_mode = adapter->int_mode;\n\t\te1000e_reset_interrupt_capability(adapter);\n\t\tadapter->int_mode = E1000E_INT_MODE_LEGACY;\n\t\te1000e_set_interrupt_capability(adapter);\n\t}\n\t/* Hook up test interrupt handler just for this test */\n\tif (!", "request_irq(irq, e1000_test_intr, IRQF_PROBE_SHARED, netdev->name,\n\t\t\t netdev)) {\n\t\tshared_int = 0;\n\t} else if (request_irq(irq, e1000_test_intr, IRQF_SHARED, netdev->name,\n\t\t\t netdev)) {\n\t\t*data = 1;\n\t\tret_val = -1;\n\t\tgoto out;\n\t}\n\te_info(\"testing %s interrupt\\n\", (shared_int ? \"", "shared\" : \"unshared\"));\n\n\t/* Disable all the interrupts */\n\tew32(IMC, 0xFFFFFFFF);\n\te1e_flush();\n\tusleep_range(10000, 20000);\n\n\t/* Test each interrupt */\n\tfor (i = 0; i < 10; i++) {\n\t\t/* Interrupt to test */\n\t\tmask = 1 << i;\n\n\t\tif (adapter->flags & FLAG_IS_ICH) {\n\t\t\tswitch (mask) {\n\t\t\tcase E1000_ICR_RXSEQ:\n\t\t\t\tcontinue;\n\t\t\tcase 0x00000100:\n\t\t\t\tif (adapter->hw.mac.type == e1000_ich8lan ||\n\t\t\t\t adapter->hw.mac.type == e1000_ich9lan)\n\t\t\t\t\tcontinue;\n\t\t\t\tbreak;\n\t\t\tdefault:\n\t\t\t\tbreak;\n\t\t\t}\n\t\t}\n\n\t\tif (!", "shared_int) {\n\t\t\t/* Disable the interrupt to be reported in\n\t\t\t * the cause register and then force the same\n\t\t\t * interrupt and see if one gets posted. ", " If\n\t\t\t * an interrupt was posted to the bus, the\n\t\t\t * test failed.", "\n\t\t\t */\n\t\t\tadapter->test_icr = 0;\n\t\t\tew32(IMC, mask);\n\t\t\tew32(ICS, mask);\n\t\t\te1e_flush();\n\t\t\tusleep_range(10000, 20000);\n\n\t\t\tif (adapter->test_icr & mask) {\n\t\t\t\t*data = 3;\n\t\t\t\tbreak;\n\t\t\t}\n\t\t}\n\n\t\t/* Enable the interrupt to be reported in\n\t\t * the cause register and then force the same\n\t\t * interrupt and see if one gets posted. ", " If\n\t\t * an interrupt was not posted to the bus, the\n\t\t * test failed.", "\n\t\t */\n\t\tadapter->test_icr = 0;\n\t\tew32(IMS, mask);\n\t\tew32(ICS, mask);\n\t\te1e_flush();\n\t\tusleep_range(10000, 20000);\n\n\t\tif (!(", "adapter->test_icr & mask)) {\n\t\t\t*data = 4;\n\t\t\tbreak;\n\t\t}\n\n\t\tif (!", "shared_int) {\n\t\t\t/* Disable the other interrupts to be reported in\n\t\t\t * the cause register and then force the other\n\t\t\t * interrupts and see if any get posted. ", " If\n\t\t\t * an interrupt was posted to the bus, the\n\t\t\t * test failed.", "\n\t\t\t */\n\t\t\tadapter->test_icr = 0;\n\t\t\tew32(IMC, ~mask & 0x00007FFF);\n\t\t\tew32(ICS, ~mask & 0x00007FFF);\n\t\t\te1e_flush();\n\t\t\tusleep_range(10000, 20000);\n\n\t\t\tif (adapter->test_icr) {\n\t\t\t\t*data = 5;\n\t\t\t\tbreak;\n\t\t\t}\n\t\t}\n\t}\n\n\t/* Disable all the interrupts */\n\tew32(IMC, 0xFFFFFFFF);\n\te1e_flush();\n\tusleep_range(10000, 20000);\n\n\t/* Unhook test interrupt handler */\n\tfree_irq(irq, netdev);\n\nout:\n\tif (int_mode == E1000E_INT_MODE_MSIX) {\n\t\te1000e_reset_interrupt_capability(adapter);\n\t\tadapter->int_mode = int_mode;\n\t\te1000e_set_interrupt_capability(adapter);\n\t}\n\n\treturn ret_val;\n}\n\nstatic void e1000_free_desc_rings(struct e1000_adapter *adapter)\n{\n\tstruct e1000_ring *tx_ring = &adapter->test_tx_ring;\n\tstruct e1000_ring *rx_ring = &adapter->test_rx_ring;\n\tstruct pci_dev *pdev = adapter->pdev;\n\tstruct e1000_buffer *buffer_info;\n\tint i;\n\n\tif (tx_ring->desc && tx_ring->buffer_info) {\n\t\tfor (i = 0; i < tx_ring->count; i++) {\n\t\t\tbuffer_info = &tx_ring->buffer_info[i];\n\n\t\t\tif (buffer_info->dma)\n\t\t\t\tdma_unmap_single(&pdev->dev,\n\t\t\t\t\t\t buffer_info->dma,\n\t\t\t\t\t\t buffer_info->length,\n\t\t\t\t\t\t DMA_TO_DEVICE);\n\t\t\tif (buffer_info->skb)\n\t\t\t\tdev_kfree_skb(buffer_info->skb);\n\t\t}\n\t}\n\n\tif (rx_ring->desc && rx_ring->buffer_info) {\n\t\tfor (i = 0; i < rx_ring->count; i++) {\n\t\t\tbuffer_info = &rx_ring->buffer_info[i];\n\n\t\t\tif (buffer_info->dma)\n\t\t\t\tdma_unmap_single(&pdev->dev,\n\t\t\t\t\t\t buffer_info->dma,\n\t\t\t\t\t\t 2048, DMA_FROM_DEVICE);\n\t\t\tif (buffer_info->skb)\n\t\t\t\tdev_kfree_skb(buffer_info->skb);\n\t\t}\n\t}\n\n\tif (tx_ring->desc) {\n\t\tdma_free_coherent(&pdev->dev, tx_ring->size, tx_ring->desc,\n\t\t\t\t tx_ring->dma);\n\t\ttx_ring->desc = NULL;\n\t}\n\tif (rx_ring->desc) {\n\t\tdma_free_coherent(&pdev->dev, rx_ring->size, rx_ring->desc,\n\t\t\t\t rx_ring->dma);\n\t\trx_ring->desc = NULL;\n\t}\n\n\tkfree(tx_ring->buffer_info);\n\ttx_ring->buffer_info = NULL;\n\tkfree(rx_ring->buffer_info);\n\trx_ring->buffer_info = NULL;\n}\n\nstatic int e1000_setup_desc_rings(struct e1000_adapter *adapter)\n{\n\tstruct e1000_ring *tx_ring = &adapter->test_tx_ring;\n\tstruct e1000_ring *rx_ring = &adapter->test_rx_ring;\n\tstruct pci_dev *pdev = adapter->pdev;\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 rctl;\n\tint i;\n\tint ret_val;\n\n\t/* Setup Tx descriptor ring and Tx buffers */\n\n\tif (!", "tx_ring->count)\n\t\ttx_ring->count = E1000_DEFAULT_TXD;\n\n\ttx_ring->buffer_info = kcalloc(tx_ring->count,\n\t\t\t\t sizeof(struct e1000_buffer), GFP_KERNEL);\n\tif (!", "tx_ring->buffer_info) {\n\t\tret_val = 1;\n\t\tgoto err_nomem;\n\t}\n\n\ttx_ring->size = tx_ring->count * sizeof(struct e1000_tx_desc);\n\ttx_ring->size = ALIGN(tx_ring->size, 4096);\n\ttx_ring->desc = dma_alloc_coherent(&pdev->dev, tx_ring->size,\n\t\t\t\t\t &tx_ring->dma, GFP_KERNEL);\n\tif (!", "tx_ring->desc) {\n\t\tret_val = 2;\n\t\tgoto err_nomem;\n\t}\n\ttx_ring->next_to_use = 0;\n\ttx_ring->next_to_clean = 0;\n\n\tew32(TDBAL(0), ((u64)tx_ring->dma & 0x00000000FFFFFFFF));\n\tew32(TDBAH(0), ((u64)tx_ring->dma >> 32));\n\tew32(TDLEN(0), tx_ring->count * sizeof(struct e1000_tx_desc));\n\tew32(TDH(0), 0);\n\tew32(TDT(0), 0);\n\tew32(TCTL, E1000_TCTL_PSP | E1000_TCTL_EN | E1000_TCTL_MULR |\n\t E1000_COLLISION_THRESHOLD << E1000_CT_SHIFT |\n\t E1000_COLLISION_DISTANCE << E1000_COLD_SHIFT);\n\n\tfor (i = 0; i < tx_ring->count; i++) {\n\t\tstruct e1000_tx_desc *tx_desc = E1000_TX_DESC(*tx_ring, i);\n\t\tstruct sk_buff *skb;\n\t\tunsigned int skb_size = 1024;\n\n\t\tskb = alloc_skb(skb_size, GFP_KERNEL);\n\t\tif (!", "skb) {\n\t\t\tret_val = 3;\n\t\t\tgoto err_nomem;\n\t\t}\n\t\tskb_put(skb, skb_size);\n\t\ttx_ring->buffer_info[i].skb = skb;\n\t\ttx_ring->buffer_info[i].length = skb->len;\n\t\ttx_ring->buffer_info[i].dma =\n\t\t dma_map_single(&pdev->dev, skb->data, skb->len,\n\t\t\t\t DMA_TO_DEVICE);\n\t\tif (dma_mapping_error(&pdev->dev,\n\t\t\t\t tx_ring->buffer_info[i].dma)) {\n\t\t\tret_val = 4;\n\t\t\tgoto err_nomem;\n\t\t}\n\t\ttx_desc->buffer_addr = cpu_to_le64(tx_ring->buffer_info[i].dma);\n\t\ttx_desc->lower.data = cpu_to_le32(skb->len);\n\t\ttx_desc->lower.data |= cpu_to_le32(E1000_TXD_CMD_EOP |\n\t\t\t\t\t\t E1000_TXD_CMD_IFCS |\n\t\t\t\t\t\t E1000_TXD_CMD_RS);\n\t\ttx_desc->upper.data = 0;\n\t}\n\n\t/* Setup Rx descriptor ring and Rx buffers */\n\n\tif (!", "rx_ring->count)\n\t\trx_ring->count = E1000_DEFAULT_RXD;\n\n\trx_ring->buffer_info = kcalloc(rx_ring->count,\n\t\t\t\t sizeof(struct e1000_buffer), GFP_KERNEL);\n\tif (!", "rx_ring->buffer_info) {\n\t\tret_val = 5;\n\t\tgoto err_nomem;\n\t}\n\n\trx_ring->size = rx_ring->count * sizeof(union e1000_rx_desc_extended);\n\trx_ring->desc = dma_alloc_coherent(&pdev->dev, rx_ring->size,\n\t\t\t\t\t &rx_ring->dma, GFP_KERNEL);\n\tif (!", "rx_ring->desc) {\n\t\tret_val = 6;\n\t\tgoto err_nomem;\n\t}\n\trx_ring->next_to_use = 0;\n\trx_ring->next_to_clean = 0;\n\n\trctl = er32(RCTL);\n\tif (!(", "adapter->flags2 & FLAG2_NO_DISABLE_RX))\n\t\tew32(RCTL, rctl & ~E1000_RCTL_EN);\n\tew32(RDBAL(0), ((u64)rx_ring->dma & 0xFFFFFFFF));\n\tew32(RDBAH(0), ((u64)rx_ring->dma >> 32));\n\tew32(RDLEN(0), rx_ring->size);\n\tew32(RDH(0), 0);\n\tew32(RDT(0), 0);\n\trctl = E1000_RCTL_EN | E1000_RCTL_BAM | E1000_RCTL_SZ_2048 |\n\t E1000_RCTL_UPE | E1000_RCTL_MPE | E1000_RCTL_LPE |\n\t E1000_RCTL_SBP | E1000_RCTL_SECRC |\n\t E1000_RCTL_LBM_NO | E1000_RCTL_RDMTS_HALF |\n\t (adapter->hw.mac.mc_filter_type << E1000_RCTL_MO_SHIFT);\n\tew32(RCTL, rctl);\n\n\tfor (i = 0; i < rx_ring->count; i++) {\n\t\tunion e1000_rx_desc_extended *rx_desc;\n\t\tstruct sk_buff *skb;\n\n\t\tskb = alloc_skb(2048 + NET_IP_ALIGN, GFP_KERNEL);\n\t\tif (!", "skb) {\n\t\t\tret_val = 7;\n\t\t\tgoto err_nomem;\n\t\t}\n\t\tskb_reserve(skb, NET_IP_ALIGN);\n\t\trx_ring->buffer_info[i].skb = skb;\n\t\trx_ring->buffer_info[i].dma =\n\t\t dma_map_single(&pdev->dev, skb->data, 2048,\n\t\t\t\t DMA_FROM_DEVICE);\n\t\tif (dma_mapping_error(&pdev->dev,\n\t\t\t\t rx_ring->buffer_info[i].dma)) {\n\t\t\tret_val = 8;\n\t\t\tgoto err_nomem;\n\t\t}\n\t\trx_desc = E1000_RX_DESC_EXT(*rx_ring, i);\n\t\trx_desc->read.buffer_addr =\n\t\t cpu_to_le64(rx_ring->buffer_info[i].dma);\n\t\tmemset(skb->data, 0x00, skb->len);\n\t}\n\n\treturn 0;\n\nerr_nomem:\n\te1000_free_desc_rings(adapter);\n\treturn ret_val;\n}\n\nstatic void e1000_phy_disable_receiver(struct e1000_adapter *adapter)\n{\n\t/* Write out to PHY registers 29 and 30 to disable the Receiver. */", "\n\te1e_wphy(&adapter->hw, 29, 0x001F);\n\te1e_wphy(&adapter->hw, 30, 0x8FFC);\n\te1e_wphy(&adapter->hw, 29, 0x001A);\n\te1e_wphy(&adapter->hw, 30, 0x8FF0);\n}\n\nstatic int e1000_integrated_phy_loopback(struct e1000_adapter *adapter)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 ctrl_reg = 0;\n\tu16 phy_reg = 0;\n\ts32 ret_val = 0;\n\n\thw->mac.autoneg = 0;\n\n\tif (hw->phy.type == e1000_phy_ife) {\n\t\t/* force 100, set loopback */\n\t\te1e_wphy(hw, MII_BMCR, 0x6100);\n\n\t\t/* Now set up the MAC to the same speed/duplex as the PHY. */", "\n\t\tctrl_reg = er32(CTRL);\n\t\tctrl_reg &= ~E1000_CTRL_SPD_SEL; /* Clear the speed sel bits */\n\t\tctrl_reg |= (E1000_CTRL_FRCSPD | /* Set the Force Speed Bit */\n\t\t\t E1000_CTRL_FRCDPX | /* Set the Force Duplex Bit */\n\t\t\t E1000_CTRL_SPD_100 |/* Force Speed to 100 */\n\t\t\t E1000_CTRL_FD);\t /* Force Duplex to FULL */\n\n\t\tew32(CTRL, ctrl_reg);\n\t\te1e_flush();\n\t\tusleep_range(500, 1000);\n\n\t\treturn 0;\n\t}\n\n\t/* Specific PHY configuration for loopback */\n\tswitch (hw->phy.type) {\n\tcase e1000_phy_m88:\n\t\t/* Auto-MDI/MDIX Off */\n\t\te1e_wphy(hw, M88E1000_PHY_SPEC_CTRL, 0x0808);\n\t\t/* reset to update Auto-MDI/MDIX */\n\t\te1e_wphy(hw, MII_BMCR, 0x9140);\n\t\t/* autoneg off */\n\t\te1e_wphy(hw, MII_BMCR, 0x8140);\n\t\tbreak;\n\tcase e1000_phy_gg82563:\n\t\te1e_wphy(hw, GG82563_PHY_KMRN_MODE_CTRL, 0x1CC);\n\t\tbreak;\n\tcase e1000_phy_bm:\n\t\t/* Set Default MAC Interface speed to 1GB */\n\t\te1e_rphy(hw, PHY_REG(2, 21), &phy_reg);\n\t\tphy_reg &= ~0x0007;\n\t\tphy_reg |= 0x006;\n\t\te1e_wphy(hw, PHY_REG(2, 21), phy_reg);\n\t\t/* Assert SW reset for above settings to take effect */\n\t\thw->phy.ops.commit(hw);\n\t\tusleep_range(1000, 2000);\n\t\t/* Force Full Duplex */\n\t\te1e_rphy(hw, PHY_REG(769, 16), &phy_reg);\n\t\te1e_wphy(hw, PHY_REG(769, 16), phy_reg | 0x000C);\n\t\t/* Set Link Up (in force link) */\n\t\te1e_rphy(hw, PHY_REG(776, 16), &phy_reg);\n\t\te1e_wphy(hw, PHY_REG(776, 16), phy_reg | 0x0040);\n\t\t/* Force Link */\n\t\te1e_rphy(hw, PHY_REG(769, 16), &phy_reg);\n\t\te1e_wphy(hw, PHY_REG(769, 16), phy_reg | 0x0040);\n\t\t/* Set Early Link Enable */\n\t\te1e_rphy(hw, PHY_REG(769, 20), &phy_reg);\n\t\te1e_wphy(hw, PHY_REG(769, 20), phy_reg | 0x0400);\n\t\tbreak;\n\tcase e1000_phy_82577:\n\tcase e1000_phy_82578:\n\t\t/* Workaround: K1 must be disabled for stable 1Gbps operation */\n\t\tret_val = hw->phy.ops.acquire(hw);\n\t\tif (ret_val) {\n\t\t\te_err(\"Cannot setup 1Gbps loopback.\\n\");\n\t\t\treturn ret_val;\n\t\t}\n\t\te1000_configure_k1_ich8lan(hw, false);\n\t\thw->phy.ops.release(hw);\n\t\tbreak;\n\tcase e1000_phy_82579:\n\t\t/* Disable PHY energy detect power down */\n\t\te1e_rphy(hw, PHY_REG(0, 21), &phy_reg);\n\t\te1e_wphy(hw, PHY_REG(0, 21), phy_reg & ~(1 << 3));\n\t\t/* Disable full chip energy detect */\n\t\te1e_rphy(hw, PHY_REG(776, 18), &phy_reg);\n\t\te1e_wphy(hw, PHY_REG(776, 18), phy_reg | 1);\n\t\t/* Enable loopback on the PHY */\n\t\te1e_wphy(hw, I82577_PHY_LBK_CTRL, 0x8001);\n\t\tbreak;\n\tdefault:\n\t\tbreak;\n\t}\n\n\t/* force 1000, set loopback */\n\te1e_wphy(hw, MII_BMCR, 0x4140);\n\tmsleep(250);\n\n\t/* Now set up the MAC to the same speed/duplex as the PHY. */", "\n\tctrl_reg = er32(CTRL);\n\tctrl_reg &= ~E1000_CTRL_SPD_SEL; /* Clear the speed sel bits */\n\tctrl_reg |= (E1000_CTRL_FRCSPD | /* Set the Force Speed Bit */\n\t\t E1000_CTRL_FRCDPX | /* Set the Force Duplex Bit */\n\t\t E1000_CTRL_SPD_1000 |/* Force Speed to 1000 */\n\t\t E1000_CTRL_FD);\t /* Force Duplex to FULL */\n\n\tif (adapter->flags & FLAG_IS_ICH)\n\t\tctrl_reg |= E1000_CTRL_SLU;\t/* Set Link Up */\n\n\tif (hw->phy.media_type == e1000_media_type_copper &&\n\t hw->phy.type == e1000_phy_m88) {\n\t\tctrl_reg |= E1000_CTRL_ILOS;\t/* Invert Loss of Signal */\n\t} else {\n\t\t/* Set the ILOS bit on the fiber Nic if half duplex link is\n\t\t * detected.", "\n\t\t */\n\t\tif ((er32(STATUS) & E1000_STATUS_FD) == 0)\n\t\t\tctrl_reg |= (E1000_CTRL_ILOS | E1000_CTRL_SLU);\n\t}\n\n\tew32(CTRL, ctrl_reg);\n\n\t/* Disable the receiver on the PHY so when a cable is plugged in, the\n\t * PHY does not begin to autoneg when a cable is reconnected to the NIC.", "\n\t */\n\tif (hw->phy.type == e1000_phy_m88)\n\t\te1000_phy_disable_receiver(adapter);\n\n\tusleep_range(500, 1000);\n\n\treturn 0;\n}\n\nstatic int e1000_set_82571_fiber_loopback(struct e1000_adapter *adapter)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 ctrl = er32(CTRL);\n\tint link;\n\n\t/* special requirements for 82571/82572 fiber adapters */\n\n\t/* jump through hoops to make sure link is up because serdes\n\t * link is hardwired up\n\t */\n\tctrl |= E1000_CTRL_SLU;\n\tew32(CTRL, ctrl);\n\n\t/* disable autoneg */\n\tctrl = er32(TXCW);\n\tctrl &= ~(1 << 31);\n\tew32(TXCW, ctrl);\n\n\tlink = (er32(STATUS) & E1000_STATUS_LU);\n\n\tif (!", "link) {\n\t\t/* set invert loss of signal */\n\t\tctrl = er32(CTRL);\n\t\tctrl |= E1000_CTRL_ILOS;\n\t\tew32(CTRL, ctrl);\n\t}\n\n\t/* special write to serdes control register to enable SerDes analog\n\t * loopback\n\t */\n\tew32(SCTL, E1000_SCTL_ENABLE_SERDES_LOOPBACK);\n\te1e_flush();\n\tusleep_range(10000, 20000);\n\n\treturn 0;\n}\n\n/* only call this for fiber/serdes connections to es2lan */\nstatic int e1000_set_es2lan_mac_loopback(struct e1000_adapter *adapter)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 ctrlext = er32(CTRL_EXT);\n\tu32 ctrl = er32(CTRL);\n\n\t/* save CTRL_EXT to restore later, reuse an empty variable (unused\n\t * on mac_type 80003es2lan)\n\t */\n\tadapter->tx_fifo_head = ctrlext;\n\n\t/* clear the serdes mode bits, putting the device into mac loopback */\n\tctrlext &= ~E1000_CTRL_EXT_LINK_MODE_PCIE_SERDES;\n\tew32(CTRL_EXT, ctrlext);\n\n\t/* force speed to 1000/FD, link up */\n\tctrl &= ~(E1000_CTRL_SPD_1000 | E1000_CTRL_SPD_100);\n\tctrl |= (E1000_CTRL_SLU | E1000_CTRL_FRCSPD | E1000_CTRL_FRCDPX |\n\t\t E1000_CTRL_SPD_1000 | E1000_CTRL_FD);\n\tew32(CTRL, ctrl);\n\n\t/* set mac loopback */\n\tctrl = er32(RCTL);\n\tctrl |= E1000_RCTL_LBM_MAC;\n\tew32(RCTL, ctrl);\n\n\t/* set testing mode parameters (no need to reset later) */\n#define KMRNCTRLSTA_OPMODE (0x1F << 16)\n#define KMRNCTRLSTA_OPMODE_1GB_FD_GMII 0x0582\n\tew32(KMRNCTRLSTA,\n\t (KMRNCTRLSTA_OPMODE | KMRNCTRLSTA_OPMODE_1GB_FD_GMII));\n\n\treturn 0;\n}\n\nstatic int e1000_setup_loopback_test(struct e1000_adapter *adapter)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 rctl, fext_nvm11, tarc0;\n\n\tif (hw->mac.type == e1000_pch_spt) {\n\t\tfext_nvm11 = er32(FEXTNVM11);\n\t\tfext_nvm11 |= E1000_FEXTNVM11_DISABLE_MULR_FIX;\n\t\tew32(FEXTNVM11, fext_nvm11);\n\t\ttarc0 = er32(TARC(0));\n\t\t/* clear bits 28 & 29 (control of MULR concurrent requests) */\n\t\ttarc0 &= 0xcfffffff;\n\t\t/* set bit 29 (value of MULR requests is now 2) */\n\t\ttarc0 |= 0x20000000;\n\t\tew32(TARC(0), tarc0);\n\t}\n\tif (hw->phy.media_type == e1000_media_type_fiber ||\n\t hw->phy.media_type == e1000_media_type_internal_serdes) {\n\t\tswitch (hw->mac.type) {\n\t\tcase e1000_80003es2lan:\n\t\t\treturn e1000_set_es2lan_mac_loopback(adapter);\n\t\tcase e1000_82571:\n\t\tcase e1000_82572:\n\t\t\treturn e1000_set_82571_fiber_loopback(adapter);\n\t\tdefault:\n\t\t\trctl = er32(RCTL);\n\t\t\trctl |= E1000_RCTL_LBM_TCVR;\n\t\t\tew32(RCTL, rctl);\n\t\t\treturn 0;\n\t\t}\n\t} else if (hw->phy.media_type == e1000_media_type_copper) {\n\t\treturn e1000_integrated_phy_loopback(adapter);\n\t}\n\n\treturn 7;\n}\n\nstatic void e1000_loopback_cleanup(struct e1000_adapter *adapter)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu32 rctl, fext_nvm11, tarc0;\n\tu16 phy_reg;\n\n\trctl = er32(RCTL);\n\trctl &= ~(E1000_RCTL_LBM_TCVR | E1000_RCTL_LBM_MAC);\n\tew32(RCTL, rctl);\n\n\tswitch (hw->mac.type) {\n\tcase e1000_pch_spt:\n\t\tfext_nvm11 = er32(FEXTNVM11);\n\t\tfext_nvm11 &= ~E1000_FEXTNVM11_DISABLE_MULR_FIX;\n\t\tew32(FEXTNVM11, fext_nvm11);\n\t\ttarc0 = er32(TARC(0));\n\t\t/* clear bits 28 & 29 (control of MULR concurrent requests) */\n\t\t/* set bit 29 (value of MULR requests is now 0) */\n\t\ttarc0 &= 0xcfffffff;\n\t\tew32(TARC(0), tarc0);\n\t\t/* fall through */\n\tcase e1000_80003es2lan:\n\t\tif (hw->phy.media_type == e1000_media_type_fiber ||\n\t\t hw->phy.media_type == e1000_media_type_internal_serdes) {\n\t\t\t/* restore CTRL_EXT, stealing space from tx_fifo_head */\n\t\t\tew32(CTRL_EXT, adapter->tx_fifo_head);\n\t\t\tadapter->tx_fifo_head = 0;\n\t\t}\n\t\t/* fall through */\n\tcase e1000_82571:\n\tcase e1000_82572:\n\t\tif (hw->phy.media_type == e1000_media_type_fiber ||\n\t\t hw->phy.media_type == e1000_media_type_internal_serdes) {\n\t\t\tew32(SCTL, E1000_SCTL_DISABLE_SERDES_LOOPBACK);\n\t\t\te1e_flush();\n\t\t\tusleep_range(10000, 20000);\n\t\t\tbreak;\n\t\t}\n\t\t/* Fall Through */\n\tdefault:\n\t\thw->mac.autoneg = 1;\n\t\tif (hw->phy.type == e1000_phy_gg82563)\n\t\t\te1e_wphy(hw, GG82563_PHY_KMRN_MODE_CTRL, 0x180);\n\t\te1e_rphy(hw, MII_BMCR, &phy_reg);\n\t\tif (phy_reg & BMCR_LOOPBACK) {\n\t\t\tphy_reg &= ~BMCR_LOOPBACK;\n\t\t\te1e_wphy(hw, MII_BMCR, phy_reg);\n\t\t\tif (hw->phy.ops.commit)\n\t\t\t\thw->phy.ops.commit(hw);\n\t\t}\n\t\tbreak;\n\t}\n}\n\nstatic void e1000_create_lbtest_frame(struct sk_buff *skb,\n\t\t\t\t unsigned int frame_size)\n{\n\tmemset(skb->data, 0xFF, frame_size);\n\tframe_size &= ~1;\n\tmemset(&skb->data[frame_size / 2], 0xAA, frame_size / 2 - 1);\n\tmemset(&skb->data[frame_size / 2 + 10], 0xBE, 1);\n\tmemset(&skb->data[frame_size / 2 + 12], 0xAF, 1);\n}\n\nstatic int e1000_check_lbtest_frame(struct sk_buff *skb,\n\t\t\t\t unsigned int frame_size)\n{\n\tframe_size &= ~1;\n\tif (*(skb->data + 3) == 0xFF)\n\t\tif ((*(skb->data + frame_size / 2 + 10) == 0xBE) &&\n\t\t (*(skb->data + frame_size / 2 + 12) == 0xAF))\n\t\t\treturn 0;\n\treturn 13;\n}\n\nstatic int e1000_run_loopback_test(struct e1000_adapter *adapter)\n{\n\tstruct e1000_ring *tx_ring = &adapter->test_tx_ring;\n\tstruct e1000_ring *rx_ring = &adapter->test_rx_ring;\n\tstruct pci_dev *pdev = adapter->pdev;\n\tstruct e1000_hw *hw = &adapter->hw;\n\tstruct e1000_buffer *buffer_info;\n\tint i, j, k, l;\n\tint lc;\n\tint good_cnt;\n\tint ret_val = 0;\n\tunsigned long time;\n\n\tew32(RDT(0), rx_ring->count - 1);\n\n\t/* Calculate the loop count based on the largest descriptor ring\n\t * The idea is to wrap the largest ring a number of times using 64\n\t * send/receive pairs during each loop\n\t */\n\n\tif (rx_ring->count <= tx_ring->count)\n\t\tlc = ((tx_ring->count / 64) * 2) + 1;\n\telse\n\t\tlc = ((rx_ring->count / 64) * 2) + 1;\n\n\tk = 0;\n\tl = 0;\n\t/* loop count loop */\n\tfor (j = 0; j <= lc; j++) {\n\t\t/* send the packets */\n\t\tfor (i = 0; i < 64; i++) {\n\t\t\tbuffer_info = &tx_ring->buffer_info[k];\n\n\t\t\te1000_create_lbtest_frame(buffer_info->skb, 1024);\n\t\t\tdma_sync_single_for_device(&pdev->dev,\n\t\t\t\t\t\t buffer_info->dma,\n\t\t\t\t\t\t buffer_info->length,\n\t\t\t\t\t\t DMA_TO_DEVICE);\n\t\t\tk++;\n\t\t\tif (k == tx_ring->count)\n\t\t\t\tk = 0;\n\t\t}\n\t\tew32(TDT(0), k);\n\t\te1e_flush();\n\t\tmsleep(200);\n\t\ttime = jiffies;\t/* set the start time for the receive */\n\t\tgood_cnt = 0;\n\t\t/* receive the sent packets */\n\t\tdo {\n\t\t\tbuffer_info = &rx_ring->buffer_info[l];\n\n\t\t\tdma_sync_single_for_cpu(&pdev->dev,\n\t\t\t\t\t\tbuffer_info->dma, 2048,\n\t\t\t\t\t\tDMA_FROM_DEVICE);\n\n\t\t\tret_val = e1000_check_lbtest_frame(buffer_info->skb,\n\t\t\t\t\t\t\t 1024);\n\t\t\tif (!", "ret_val)\n\t\t\t\tgood_cnt++;\n\t\t\tl++;\n\t\t\tif (l == rx_ring->count)\n\t\t\t\tl = 0;\n\t\t\t/* time + 20 msecs (200 msecs on 2.4) is more than\n\t\t\t * enough time to complete the receives, if it's\n\t\t\t * exceeded, break and error off\n\t\t\t */\n\t\t} while ((good_cnt < 64) && !", "time_after(jiffies, time + 20));\n\t\tif (good_cnt !", "= 64) {\n\t\t\tret_val = 13;\t/* ret_val is the same as mis-compare */\n\t\t\tbreak;\n\t\t}\n\t\tif (time_after(jiffies, time + 20)) {\n\t\t\tret_val = 14;\t/* error code for time out error */\n\t\t\tbreak;\n\t\t}\n\t}\n\treturn ret_val;\n}\n\nstatic int e1000_loopback_test(struct e1000_adapter *adapter, u64 *data)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\n\t/* PHY loopback cannot be performed if SoL/IDER sessions are active */\n\tif (hw->phy.ops.check_reset_block &&\n\t hw->phy.ops.check_reset_block(hw)) {\n\t\te_err(\"Cannot do PHY loopback test when SoL/IDER is active.\\n\");\n\t\t*data = 0;\n\t\tgoto out;\n\t}\n\n\t*data = e1000_setup_desc_rings(adapter);\n\tif (*data)\n\t\tgoto out;\n\n\t*data = e1000_setup_loopback_test(adapter);\n\tif (*data)\n\t\tgoto err_loopback;\n\n\t*data = e1000_run_loopback_test(adapter);\n\te1000_loopback_cleanup(adapter);\n\nerr_loopback:\n\te1000_free_desc_rings(adapter);\nout:\n\treturn *data;\n}\n\nstatic int e1000_link_test(struct e1000_adapter *adapter, u64 *data)\n{\n\tstruct e1000_hw *hw = &adapter->hw;\n\n\t*data = 0;\n\tif (hw->phy.media_type == e1000_media_type_internal_serdes) {\n\t\tint i = 0;\n\n\t\thw->mac.serdes_has_link = false;\n\n\t\t/* On some blade server designs, link establishment\n\t\t * could take as long as 2-3 minutes\n\t\t */\n\t\tdo {\n\t\t\thw->mac.ops.check_for_link(hw);\n\t\t\tif (hw->mac.serdes_has_link)\n\t\t\t\treturn *data;\n\t\t\tmsleep(20);\n\t\t} while (i++ < 3750);\n\n\t\t*data = 1;\n\t} else {\n\t\thw->mac.ops.check_for_link(hw);\n\t\tif (hw->mac.autoneg)\n\t\t\t/* On some Phy/switch combinations, link establishment\n\t\t\t * can take a few seconds more than expected.", "\n\t\t\t */\n\t\t\tmsleep_interruptible(5000);\n\n\t\tif (!(", "er32(STATUS) & E1000_STATUS_LU))\n\t\t\t*data = 1;\n\t}\n\treturn *data;\n}\n\nstatic int e1000e_get_sset_count(struct net_device __always_unused *netdev,\n\t\t\t\t int sset)\n{\n\tswitch (sset) {\n\tcase ETH_SS_TEST:\n\t\treturn E1000_TEST_LEN;\n\tcase ETH_SS_STATS:\n\t\treturn E1000_STATS_LEN;\n\tdefault:\n\t\treturn -EOPNOTSUPP;\n\t}\n}\n\nstatic void e1000_diag_test(struct net_device *netdev,\n\t\t\t struct ethtool_test *eth_test, u64 *data)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tu16 autoneg_advertised;\n\tu8 forced_speed_duplex;\n\tu8 autoneg;\n\tbool if_running = netif_running(netdev);\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tset_bit(__E1000_TESTING, &adapter->state);\n\n\tif (!", "if_running) {\n\t\t/* Get control of and reset hardware */\n\t\tif (adapter->flags & FLAG_HAS_AMT)\n\t\t\te1000e_get_hw_control(adapter);\n\n\t\te1000e_power_up_phy(adapter);\n\n\t\tadapter->hw.phy.autoneg_wait_to_complete = 1;\n\t\te1000e_reset(adapter);\n\t\tadapter->hw.phy.autoneg_wait_to_complete = 0;\n\t}\n\n\tif (eth_test->flags == ETH_TEST_FL_OFFLINE) {\n\t\t/* Offline tests */\n\n\t\t/* save speed, duplex, autoneg settings */\n\t\tautoneg_advertised = adapter->hw.phy.autoneg_advertised;\n\t\tforced_speed_duplex = adapter->hw.mac.forced_speed_duplex;\n\t\tautoneg = adapter->hw.mac.autoneg;\n\n\t\te_info(\"offline testing starting\\n\");\n\n\t\tif (if_running)\n\t\t\t/* indicate we're in test mode */\n\t\t\tdev_close(netdev);\n\n\t\tif (e1000_reg_test(adapter, &data[0]))\n\t\t\teth_test->flags |= ETH_TEST_FL_FAILED;\n\n\t\te1000e_reset(adapter);\n\t\tif (e1000_eeprom_test(adapter, &data[1]))\n\t\t\teth_test->flags |= ETH_TEST_FL_FAILED;\n\n\t\te1000e_reset(adapter);\n\t\tif (e1000_intr_test(adapter, &data[2]))\n\t\t\teth_test->flags |= ETH_TEST_FL_FAILED;\n\n\t\te1000e_reset(adapter);\n\t\tif (e1000_loopback_test(adapter, &data[3]))\n\t\t\teth_test->flags |= ETH_TEST_FL_FAILED;\n\n\t\t/* force this routine to wait until autoneg complete/timeout */\n\t\tadapter->hw.phy.autoneg_wait_to_complete = 1;\n\t\te1000e_reset(adapter);\n\t\tadapter->hw.phy.autoneg_wait_to_complete = 0;\n\n\t\tif (e1000_link_test(adapter, &data[4]))\n\t\t\teth_test->flags |= ETH_TEST_FL_FAILED;\n\n\t\t/* restore speed, duplex, autoneg settings */\n\t\tadapter->hw.phy.autoneg_advertised = autoneg_advertised;\n\t\tadapter->hw.mac.forced_speed_duplex = forced_speed_duplex;\n\t\tadapter->hw.mac.autoneg = autoneg;\n\t\te1000e_reset(adapter);\n\n\t\tclear_bit(__E1000_TESTING, &adapter->state);\n\t\tif (if_running)\n\t\t\tdev_open(netdev);\n\t} else {\n\t\t/* Online tests */\n\n\t\te_info(\"online testing starting\\n\");\n\n\t\t/* register, eeprom, intr and loopback tests not run online */\n\t\tdata[0] = 0;\n\t\tdata[1] = 0;\n\t\tdata[2] = 0;\n\t\tdata[3] = 0;\n\n\t\tif (e1000_link_test(adapter, &data[4]))\n\t\t\teth_test->flags |= ETH_TEST_FL_FAILED;\n\n\t\tclear_bit(__E1000_TESTING, &adapter->state);\n\t}\n\n\tif (!", "if_running) {\n\t\te1000e_reset(adapter);\n\n\t\tif (adapter->flags & FLAG_HAS_AMT)\n\t\t\te1000e_release_hw_control(adapter);\n\t}\n\n\tmsleep_interruptible(4 * 1000);\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n}\n\nstatic void e1000_get_wol(struct net_device *netdev,\n\t\t\t struct ethtool_wolinfo *wol)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\twol->supported = 0;\n\twol->wolopts = 0;\n\n\tif (!(", "adapter->flags & FLAG_HAS_WOL) ||\n\t !", "device_can_wakeup(&adapter->pdev->dev))\n\t\treturn;\n\n\twol->supported = WAKE_UCAST | WAKE_MCAST |\n\t WAKE_BCAST | WAKE_MAGIC | WAKE_PHY;\n\n\t/* apply any specific unsupported masks here */\n\tif (adapter->flags & FLAG_NO_WAKE_UCAST) {\n\t\twol->supported &= ~WAKE_UCAST;\n\n\t\tif (adapter->wol & E1000_WUFC_EX)\n\t\t\te_err(\"Interface does not support directed (unicast) frame wake-up packets\\n\");\n\t}\n\n\tif (adapter->wol & E1000_WUFC_EX)\n\t\twol->wolopts |= WAKE_UCAST;\n\tif (adapter->wol & E1000_WUFC_MC)\n\t\twol->wolopts |= WAKE_MCAST;\n\tif (adapter->wol & E1000_WUFC_BC)\n\t\twol->wolopts |= WAKE_BCAST;\n\tif (adapter->wol & E1000_WUFC_MAG)\n\t\twol->wolopts |= WAKE_MAGIC;\n\tif (adapter->wol & E1000_WUFC_LNKC)\n\t\twol->wolopts |= WAKE_PHY;\n}\n\nstatic int e1000_set_wol(struct net_device *netdev, struct ethtool_wolinfo *wol)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tif (!(", "adapter->flags & FLAG_HAS_WOL) ||\n\t !", "device_can_wakeup(&adapter->pdev->dev) ||\n\t (wol->wolopts & ~(WAKE_UCAST | WAKE_MCAST | WAKE_BCAST |\n\t\t\t WAKE_MAGIC | WAKE_PHY)))\n\t\treturn -EOPNOTSUPP;\n\n\t/* these settings will always override what we currently have */\n\tadapter->wol = 0;\n\n\tif (wol->wolopts & WAKE_UCAST)\n\t\tadapter->wol |= E1000_WUFC_EX;\n\tif (wol->wolopts & WAKE_MCAST)\n\t\tadapter->wol |= E1000_WUFC_MC;\n\tif (wol->wolopts & WAKE_BCAST)\n\t\tadapter->wol |= E1000_WUFC_BC;\n\tif (wol->wolopts & WAKE_MAGIC)\n\t\tadapter->wol |= E1000_WUFC_MAG;\n\tif (wol->wolopts & WAKE_PHY)\n\t\tadapter->wol |= E1000_WUFC_LNKC;\n\n\tdevice_set_wakeup_enable(&adapter->pdev->dev, adapter->wol);\n\n\treturn 0;\n}\n\nstatic int e1000_set_phys_id(struct net_device *netdev,\n\t\t\t enum ethtool_phys_id_state state)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\n\tswitch (state) {\n\tcase ETHTOOL_ID_ACTIVE:\n\t\tpm_runtime_get_sync(netdev->dev.parent);\n\n\t\tif (!", "hw->mac.ops.blink_led)\n\t\t\treturn 2;\t/* cycle on/off twice per second */\n\n\t\thw->mac.ops.blink_led(hw);\n\t\tbreak;\n\n\tcase ETHTOOL_ID_INACTIVE:\n\t\tif (hw->phy.type == e1000_phy_ife)\n\t\t\te1e_wphy(hw, IFE_PHY_SPECIAL_CONTROL_LED, 0);\n\t\thw->mac.ops.led_off(hw);\n\t\thw->mac.ops.cleanup_led(hw);\n\t\tpm_runtime_put_sync(netdev->dev.parent);\n\t\tbreak;\n\n\tcase ETHTOOL_ID_ON:\n\t\thw->mac.ops.led_on(hw);\n\t\tbreak;\n\n\tcase ETHTOOL_ID_OFF:\n\t\thw->mac.ops.led_off(hw);\n\t\tbreak;\n\t}\n\n\treturn 0;\n}\n\nstatic int e1000_get_coalesce(struct net_device *netdev,\n\t\t\t struct ethtool_coalesce *ec)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tif (adapter->itr_setting <= 4)\n\t\tec->rx_coalesce_usecs = adapter->itr_setting;\n\telse\n\t\tec->rx_coalesce_usecs = 1000000 / adapter->itr_setting;\n\n\treturn 0;\n}\n\nstatic int e1000_set_coalesce(struct net_device *netdev,\n\t\t\t struct ethtool_coalesce *ec)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tif ((ec->rx_coalesce_usecs > E1000_MAX_ITR_USECS) ||\n\t ((ec->rx_coalesce_usecs > 4) &&\n\t (ec->rx_coalesce_usecs < E1000_MIN_ITR_USECS)) ||\n\t (ec->rx_coalesce_usecs == 2))\n\t\treturn -EINVAL;\n\n\tif (ec->rx_coalesce_usecs == 4) {\n\t\tadapter->itr_setting = 4;\n\t\tadapter->itr = adapter->itr_setting;\n\t} else if (ec->rx_coalesce_usecs <= 3) {\n\t\tadapter->itr = 20000;\n\t\tadapter->itr_setting = ec->rx_coalesce_usecs;\n\t} else {\n\t\tadapter->itr = (1000000 / ec->rx_coalesce_usecs);\n\t\tadapter->itr_setting = adapter->itr & ~3;\n\t}\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tif (adapter->itr_setting !", "= 0)\n\t\te1000e_write_itr(adapter, adapter->itr);\n\telse\n\t\te1000e_write_itr(adapter, 0);\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n\n\treturn 0;\n}\n\nstatic int e1000_nway_reset(struct net_device *netdev)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tif (!", "netif_running(netdev))\n\t\treturn -EAGAIN;\n\n\tif (!", "adapter->hw.mac.autoneg)\n\t\treturn -EINVAL;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\te1000e_reinit_locked(adapter);\n\tpm_runtime_put_sync(netdev->dev.parent);\n\n\treturn 0;\n}\n\nstatic void e1000_get_ethtool_stats(struct net_device *netdev,\n\t\t\t\t struct ethtool_stats __always_unused *stats,\n\t\t\t\t u64 *data)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct rtnl_link_stats64 net_stats;\n\tint i;\n\tchar *p = NULL;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\te1000e_get_stats64(netdev, &net_stats);\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n\n\tfor (i = 0; i < E1000_GLOBAL_STATS_LEN; i++) {\n\t\tswitch (e1000_gstrings_stats[i].type) {\n\t\tcase NETDEV_STATS:\n\t\t\tp = (char *)&net_stats +\n\t\t\t e1000_gstrings_stats[i].stat_offset;\n\t\t\tbreak;\n\t\tcase E1000_STATS:\n\t\t\tp = (char *)adapter +\n\t\t\t e1000_gstrings_stats[i].stat_offset;\n\t\t\tbreak;\n\t\tdefault:\n\t\t\tdata[i] = 0;\n\t\t\tcontinue;\n\t\t}\n\n\t\tdata[i] = (e1000_gstrings_stats[i].sizeof_stat ==\n\t\t\t sizeof(u64)) ? *(", "u64 *)p : *(u32 *)p;\n\t}\n}\n\nstatic void e1000_get_strings(struct net_device __always_unused *netdev,\n\t\t\t u32 stringset, u8 *data)\n{\n\tu8 *p = data;\n\tint i;\n\n\tswitch (stringset) {\n\tcase ETH_SS_TEST:\n\t\tmemcpy(data, e1000_gstrings_test, sizeof(e1000_gstrings_test));\n\t\tbreak;\n\tcase ETH_SS_STATS:\n\t\tfor (i = 0; i < E1000_GLOBAL_STATS_LEN; i++) {\n\t\t\tmemcpy(p, e1000_gstrings_stats[i].stat_string,\n\t\t\t ETH_GSTRING_LEN);\n\t\t\tp += ETH_GSTRING_LEN;\n\t\t}\n\t\tbreak;\n\t}\n}\n\nstatic int e1000_get_rxnfc(struct net_device *netdev,\n\t\t\t struct ethtool_rxnfc *info,\n\t\t\t u32 __always_unused *rule_locs)\n{\n\tinfo->data = 0;\n\n\tswitch (info->cmd) {\n\tcase ETHTOOL_GRXFH: {\n\t\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\t\tstruct e1000_hw *hw = &adapter->hw;\n\t\tu32 mrqc;\n\n\t\tpm_runtime_get_sync(netdev->dev.parent);\n\t\tmrqc = er32(MRQC);\n\t\tpm_runtime_put_sync(netdev->dev.parent);\n\n\t\tif (!(", "mrqc & E1000_MRQC_RSS_FIELD_MASK))\n\t\t\treturn 0;\n\n\t\tswitch (info->flow_type) {\n\t\tcase TCP_V4_FLOW:\n\t\t\tif (mrqc & E1000_MRQC_RSS_FIELD_IPV4_TCP)\n\t\t\t\tinfo->data |= RXH_L4_B_0_1 | RXH_L4_B_2_3;\n\t\t\t/* fall through */\n\t\tcase UDP_V4_FLOW:\n\t\tcase SCTP_V4_FLOW:\n\t\tcase AH_ESP_V4_FLOW:\n\t\tcase IPV4_FLOW:\n\t\t\tif (mrqc & E1000_MRQC_RSS_FIELD_IPV4)\n\t\t\t\tinfo->data |= RXH_IP_SRC | RXH_IP_DST;\n\t\t\tbreak;\n\t\tcase TCP_V6_FLOW:\n\t\t\tif (mrqc & E1000_MRQC_RSS_FIELD_IPV6_TCP)\n\t\t\t\tinfo->data |= RXH_L4_B_0_1 | RXH_L4_B_2_3;\n\t\t\t/* fall through */\n\t\tcase UDP_V6_FLOW:\n\t\tcase SCTP_V6_FLOW:\n\t\tcase AH_ESP_V6_FLOW:\n\t\tcase IPV6_FLOW:\n\t\t\tif (mrqc & E1000_MRQC_RSS_FIELD_IPV6)\n\t\t\t\tinfo->data |= RXH_IP_SRC | RXH_IP_DST;\n\t\t\tbreak;\n\t\tdefault:\n\t\t\tbreak;\n\t\t}\n\t\treturn 0;\n\t}\n\tdefault:\n\t\treturn -EOPNOTSUPP;\n\t}\n}\n\nstatic int e1000e_get_eee(struct net_device *netdev, struct ethtool_eee *edata)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tu16 cap_addr, lpa_addr, pcs_stat_addr, phy_data;\n\tu32 ret_val;\n\n\tif (!(", "adapter->flags2 & FLAG2_HAS_EEE))\n\t\treturn -EOPNOTSUPP;\n\n\tswitch (hw->phy.type) {\n\tcase e1000_phy_82579:\n\t\tcap_addr = I82579_EEE_CAPABILITY;\n\t\tlpa_addr = I82579_EEE_LP_ABILITY;\n\t\tpcs_stat_addr = I82579_EEE_PCS_STATUS;\n\t\tbreak;\n\tcase e1000_phy_i217:\n\t\tcap_addr = I217_EEE_CAPABILITY;\n\t\tlpa_addr = I217_EEE_LP_ABILITY;\n\t\tpcs_stat_addr = I217_EEE_PCS_STATUS;\n\t\tbreak;\n\tdefault:\n\t\treturn -EOPNOTSUPP;\n\t}\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\tret_val = hw->phy.ops.acquire(hw);\n\tif (ret_val) {\n\t\tpm_runtime_put_sync(netdev->dev.parent);\n\t\treturn -EBUSY;\n\t}\n\n\t/* EEE Capability */\n\tret_val = e1000_read_emi_reg_locked(hw, cap_addr, &phy_data);\n\tif (ret_val)\n\t\tgoto release;\n\tedata->supported = mmd_eee_cap_to_ethtool_sup_t(phy_data);\n\n\t/* EEE Advertised */\n\tedata->advertised = mmd_eee_adv_to_ethtool_adv_t(adapter->eee_advert);\n\n\t/* EEE Link Partner Advertised */\n\tret_val = e1000_read_emi_reg_locked(hw, lpa_addr, &phy_data);\n\tif (ret_val)\n\t\tgoto release;\n\tedata->lp_advertised = mmd_eee_adv_to_ethtool_adv_t(phy_data);\n\n\t/* EEE PCS Status */\n\tret_val = e1000_read_emi_reg_locked(hw, pcs_stat_addr, &phy_data);\n\tif (ret_val)\n\t\tgoto release;\n\tif (hw->phy.type == e1000_phy_82579)\n\t\tphy_data <<= 8;\n\n\t/* Result of the EEE auto negotiation - there is no register that\n\t * has the status of the EEE negotiation so do a best-guess based\n\t * on whether Tx or Rx LPI indications have been received.", "\n\t */\n\tif (phy_data & (E1000_EEE_TX_LPI_RCVD | E1000_EEE_RX_LPI_RCVD))\n\t\tedata->eee_active = true;\n\n\tedata->eee_enabled = !", "hw->dev_spec.ich8lan.eee_disable;\n\tedata->tx_lpi_enabled = true;\n\tedata->tx_lpi_timer = er32(LPIC) >> E1000_LPIC_LPIET_SHIFT;\n\nrelease:\n\thw->phy.ops.release(hw);\n\tif (ret_val)\n\t\tret_val = -ENODATA;\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n\n\treturn ret_val;\n}\n\nstatic int e1000e_set_eee(struct net_device *netdev, struct ethtool_eee *edata)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\tstruct e1000_hw *hw = &adapter->hw;\n\tstruct ethtool_eee eee_curr;\n\ts32 ret_val;\n\n\tret_val = e1000e_get_eee(netdev, &eee_curr);\n\tif (ret_val)\n\t\treturn ret_val;\n\n\tif (eee_curr.tx_lpi_enabled !", "= edata->tx_lpi_enabled) {\n\t\te_err(\"Setting EEE tx-lpi is not supported\\n\");\n\t\treturn -EINVAL;\n\t}\n\n\tif (eee_curr.tx_lpi_timer !", "= edata->tx_lpi_timer) {\n\t\te_err(\"Setting EEE Tx LPI timer is not supported\\n\");\n\t\treturn -EINVAL;\n\t}\n\n\tif (edata->advertised & ~(ADVERTISE_100_FULL | ADVERTISE_1000_FULL)) {\n\t\te_err(\"EEE advertisement supports only 100TX and/or 1000T full-duplex\\n\");\n\t\treturn -EINVAL;\n\t}\n\n\tadapter->eee_advert = ethtool_adv_to_mmd_eee_adv_t(edata->advertised);\n\n\thw->dev_spec.ich8lan.eee_disable = !", "edata->eee_enabled;\n\n\tpm_runtime_get_sync(netdev->dev.parent);\n\n\t/* reset the link */\n\tif (netif_running(netdev))\n\t\te1000e_reinit_locked(adapter);\n\telse\n\t\te1000e_reset(adapter);\n\n\tpm_runtime_put_sync(netdev->dev.parent);\n\n\treturn 0;\n}\n\nstatic int e1000e_get_ts_info(struct net_device *netdev,\n\t\t\t struct ethtool_ts_info *info)\n{\n\tstruct e1000_adapter *adapter = netdev_priv(netdev);\n\n\tethtool_op_get_ts_info(netdev, info);\n\n\tif (!(", "adapter->flags & FLAG_HAS_HW_TIMESTAMP))\n\t\treturn 0;\n\n\tinfo->so_timestamping |= (SOF_TIMESTAMPING_TX_HARDWARE |\n\t\t\t\t SOF_TIMESTAMPING_RX_HARDWARE |\n\t\t\t\t SOF_TIMESTAMPING_RAW_HARDWARE);\n\n\tinfo->tx_types = (1 << HWTSTAMP_TX_OFF) | (1 << HWTSTAMP_TX_ON);\n\n\tinfo->rx_filters = ((1 << HWTSTAMP_FILTER_NONE) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V1_L4_SYNC) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V1_L4_DELAY_REQ) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_L4_SYNC) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_L4_DELAY_REQ) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_L2_SYNC) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_L2_DELAY_REQ) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_EVENT) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_SYNC) |\n\t\t\t (1 << HWTSTAMP_FILTER_PTP_V2_DELAY_REQ) |\n\t\t\t (1 << HWTSTAMP_FILTER_ALL));\n\n\tif (adapter->ptp_clock)\n\t\tinfo->phc_index = ptp_clock_index(adapter->ptp_clock);\n\n\treturn 0;\n}\n\nstatic const struct ethtool_ops e1000_ethtool_ops = {\n\t.get_settings\t\t= e1000_get_settings,\n\t.set_settings\t\t= e1000_set_settings,\n\t.get_drvinfo\t\t= e1000_get_drvinfo,\n\t.get_regs_len\t\t= e1000_get_regs_len,\n\t.get_regs\t\t= e1000_get_regs,\n\t.get_wol\t\t= e1000_get_wol,\n\t.set_wol\t\t= e1000_set_wol,\n\t.get_msglevel\t\t= e1000_get_msglevel,\n\t.set_msglevel\t\t= e1000_set_msglevel,\n\t.nway_reset\t\t= e1000_nway_reset,\n\t.get_link\t\t= ethtool_op_get_link,\n\t.get_eeprom_len\t\t= e1000_get_eeprom_len,\n\t.get_eeprom\t\t= e1000_get_eeprom,\n\t.set_eeprom\t\t= e1000_set_eeprom,\n\t.get_ringparam\t\t= e1000_get_ringparam,\n\t.set_ringparam\t\t= e1000_set_ringparam,\n\t.get_pauseparam\t\t= e1000_get_pauseparam,\n\t.set_pauseparam\t\t= e1000_set_pauseparam,\n\t.self_test\t\t= e1000_diag_test,\n\t.get_strings\t\t= e1000_get_strings,\n\t.set_phys_id\t\t= e1000_set_phys_id,\n\t.get_ethtool_stats\t= e1000_get_ethtool_stats,\n\t.get_sset_count\t\t= e1000e_get_sset_count,\n\t.get_coalesce\t\t= e1000_get_coalesce,\n\t.set_coalesce\t\t= e1000_set_coalesce,\n\t.get_rxnfc\t\t= e1000_get_rxnfc,\n\t.get_ts_info\t\t= e1000e_get_ts_info,\n\t.get_eee\t\t= e1000e_get_eee,\n\t.set_eee\t\t= e1000e_set_eee,\n};\n\nvoid e1000e_set_ethtool_ops(struct net_device *netdev)\n{\n\tnetdev->ethtool_ops = &e1000_ethtool_ops;\n}\n" ]
{ "pile_set_name": "Github" }
[ 0.012987012987012988, 0.00966183574879227, 0.010638297872340425, 0, 0.009259259259259259, 0.0058468502451904944, 0.005847953216374269, 0.01485148514851485, 0.007716049382716049, 0.041666666666666664, 0.010046885465505693, 0, 0.009615384615384616, 0.022727272727272728, 0.005303476723629935, 0.002932551319648094, 0, 0.010638297872340425, 0.05, 0.0030194894317869887, 0.0008123476848090983, 0, 0.002680965147453083, 0.006693440428380187, 0.016181229773462782, 0, 0, 0.009615384615384616, 0.007272727272727273, 0.00693000693000693, 0.010917030567685589, 0.0016488046166529267, 0, 0.014164305949008499, 0.005154639175257732, 0.01929260450160772, 0.011857707509881422, 0.0076726342710997444, 0.045454545454545456, 0.0041753653444676405, 0.017421602787456445, 0.001984126984126984, 0, 0, 0.006097560975609756, 0, 0.008064516129032258, 0.015384615384615385, 0, 0, 0.006340579710144928, 0, 0.007272727272727273, 0.007267441860465116, 0.008645533141210375, 0.012345679012345678, 0.012605042016806723, 0.0072992700729927005, 0.005763688760806916, 0.006944444444444444, 0.0058823529411764705, 0.0061000406669377795, 0.009389671361502348, 0.007272727272727273, 0.0033277870216306157, 0.005788951372808469, 0, 0, 0.00395778364116095, 0, 0.003003003003003003, 0.001971414489896501, 0, 0, 0.008130081300813009, 0, 0.005336179295624333, 0.0032701111837802484, 0, 0, 0.0020639834881320948, 0.005681818181818182, 0.002938295788442703, 0.01291248206599713, 0, 0.001697792869269949, 0.015748031496062992, 0.0078125, 0.0022935779816513763, 0.0023957834211787254 ]
0.007152
5
[ "Marvel’s god of thunder has officially taken the world by storm.", "\n\nThor: Ragnarok topped the international box office this weekend with $151.4 million, fueled by a strong $55.6 million opening in China.", "\n\nCombined with last week’s international openings, Thor: Ragnarok has made $306 million internationally. ", "Add in the $121 million the film made in its domestic opening and Thor: Ragnarok already has a worldwide box office total of $427 million.", "\n\nTo put that into perspective, Marvel Studios' original Thor grossed $449 million worldwide in its entire lifetime. ", "The sequel, Thor: The Dark World, grossed $644 million worldwide.", "\n\nOther territories where Thor: Ragnarok opened big include Mexico with $10.8 million, Germany with $5.5 million and India with $5.2 million.", "\n\nThor: Ragnarok's opening set new November records in both China and India.", "\n\nIn Russia, Thor: Ragnarok opened to $3.7 million in limited IMAX and premium large format release. ", "The film opens wide in Russia on Monday.", "\n\nThor: Ragnarok is also continuing to perform well in the markets that it opened in last week, dropping only an average of 40%. ", "The film earned another $27.2 million in the United Kingdom, $25.8 million in South Korea, $19.3 million in Brazil, and $14.9 million in France.", "\n\nThor: Ragnarok has also been a hit with fan and critics, debuting at number six in the ComicBook.com Composite Rankings.", "\n\nThor: Ragnarok currently has an 84.52 ComicBook.com Composite score, the sixth highest composite score of any comic book movie.", "\n\nThor: Ragnarok also has a 4.08 out of 5 ComicBook.com User Rating, making it the fourth highest rated comic book movie among ComicBook.com users. ", "Let us know what you thought of Thor: Ragnarok by giving the film your own ComicBook.com User Rating below.", "\n\nThor: Ragnarok is now playing in theaters. ", "Other upcoming Marvel CinematicUniverse movies include Black Panther on February 16, 2018, Avengers: Infinity War on May 4, 2018, Ant-Man and the Wasp on July 6, 2018, Captain Marvel on March 8, 2019, the fourth Avengers movie on May 3, 2019, the sequel to Spider-Man: Homecoming on July 5, 2019, and Guardians of the Galaxy Vol. ", "3 in 2020.", "\n\n[h/t] Variety" ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0, 0, 0, 0.008547008547008548, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.00909090909090909, 0, 0 ]
0.000882
5
[ "The objective of this proposal is to improve our understanding of the mechanisms of pathogenesis of tick borne rickettsial pathogens that cause ehrlichiosis and anaplasmosis of humans and animals. ", "These pathogens efficiently utilize a small genome (<1.5 Mb) to evade the immune response and establish persistent infection in the mammalian reservoir host, to colonize and replicate in the tick midgut and salivary glands, and to develop infectivity upon renewed feeding of the tick to effect onward transmission. ", "MSP2 was initially defined in Anaplasma marginale and infections of cattle and ticks with this pathogen provide an excellent model for discovering the mechanisms used to modify the surface proteome. ", "In the prior project period, we identified segmental gene conversion of single expression sites for MSP2, and a related surface paralogue MSP3, as a primary mechanism for generating surface diversity and demonstrated differential expression of operon-encoded proteins between the mammalian host and tick vector. ", "A similar gene conversion mechanism is used by Anaplasma phagocytophilum to express a large repertoire of outer membrane proteins in human patients and studies by others support expression from multiple loci to generate surface diversity. ", "Analysis of the A. marginale genome reveals a complex family of outer membrane protein genes related to msp2. ", "This msp2 superfamily is comprised of 32 paralogues, comprising the two msp2 and msp3 operon-linked expression sites, a single msp4 gene locus, multiple msp2 and msp3 pseudogenes, and other uncharacterized msp2-like paralogues. ", "We hypothesize that differential expression of these paralogues and recombination between them generates diversity in the pathogen surface and provides the ability of organisms to adapt to and persist in different hosts and cellular environments. ", "The specific aims of the present proposal are: 1] Determine if msp2 superfamily genes are differentially expressed during infection of the mammalian and invertebrate hosts; 2] Determine the operon structure and generation of diversity within msp2 superfamily gene clusters; 3] Identify the mechanisms for differential regulation of the msp2 superfamily proteins in the mammalian and invertebrate hosts; and 4] Compare regulation of expression of msp2 superfamily proteins in A. marginale and A. phagocytophilum." ]
{ "pile_set_name": "NIH ExPorter" }
[ 0, 0, 0.005025125628140704, 0.003205128205128205, 0.0041841004184100415, 0, 0, 0, 0 ]
0.001379
5
[ "This tax season, when you visit the IRS’s website seeking tax information, can you be certain that no one else is monitoring which pages you browse?", "\n\nUnfortunately, right now the answer to that question is “no.” ", "Unlike Facebook, Twitter, Google Mail (Gmail), and virtually every bank and credit card company, the IRS, like most government agencies, does not use HTTPS for encryption and authentication on its website. ", "If you try typing “mail.google.com” into your browser right now, you will see that the URL you end up at is actually “https://mail.google.com.” ", "That “s” after the “http” may seem insignificant, but it means a lot. ", "It signifies that Google is using Secure Sockets Layer encryption, or SSL, to both encrypt and authenticate its communications. ", "When you visit google.com and you see “https” at the beginning of the address, it lets you know that your connection is secure, and that third parties – such as your internet service provider, employer, or university cannot monitor what you’re doing through the use of network interception technology.", "\n\nIn contrast, the IRS website not only does not use HTTPS by default, but manually typing in “https://www.IRS.gov” will result in a scary error message, due to the fact that the IRS administrators haven’t bothered to configure their hosting service to supply a valid HTTPS certificate.", "\n\nAlthough the IRS website doesn’t ask for sensitive login information that must be encrypted like online banking sites or email providers, there does exist sensitive information on the website. ", "For example, perhaps you are looking for information on the IRS website about tax credits or deductions associated with adoption, the death of a spouse, or sensitive medical procedures and services such as abortions, breast reconstruction surgery or counseling for drug addiction. ", "In all of these scenarios, you should be able to obtain tax information without your internet provider, employer or university knowing what you are looking for. ", "However, because the IRS does not use HTTPS encryption to protect its website, the specific pages you view on the IRS website can be easily intercepted by others, particularly when you are browsing the web using an open WiFi network.", "\n\nIf Google, Twitter and Facebook can deliver HTTPS to their users, we should certainly have it for our visits to government websites. ", "This is especially important as the April 15 tax deadline approaches, and more and more Americans turn to government websites for reliable information.", "\n\nLike many companies, the IRS uses a third party Content Distribution Network to deliver web content to visitors. ", "Instead of connecting to a server run by the IRS, visitors to the IRS website are actually connecting to one of many servers owned by Akamai, a company that provides the same service for many of the most popular websites on the web. ", "Akamai supports HTTPS delivery (pdf) of web content, and has done so since at least 2001—but it charges a premium for this service. ", "The IRS could easily move their entire website to HTTPS, they’d just have to pay for it (and for now, it seems, they don’t want to).", "\n\nThe Central Intelligence Agency website also uses Akamai, but has a correctly configured HTTPS certificate, and even uses HTTPS by default. ", "If the CIA can find the funds in their technology budget to provide a HTTPS connection to a website that few Americans are likely to visit (and which is largely used for recruiting and marketing purposes), surely the IRS, which annually receives sensitive and private data from millions of Americans, should be able to do so too.", "\n\nIn 2010 then FTC Commissioner Pamela Jones Harbor publicly called on all cloud computing companies to enable HTTPS by default. ", "A year later, Senator Chuck Schumer wrote to Amazon, Twitter, Facebook and Yahoo, urging them to move their websites to HTTPS. ", "The pressure worked—Twitter and Facebook both eventually protected their websites with HTTPS by default.", "\n\nCommissioner Harbor and Senator Schumer showed bold leadership by using their soapboxes to pressure companies to take cybersecurity seriously. ", "Although the soapbox is great, there is an even better way for the government to lead—and that is by example." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.006756756756756757, 0, 0.019417475728155338, 0.006944444444444444, 0, 0.015625, 0, 0.01048951048951049, 0.005128205128205128, 0.0035587188612099642, 0, 0.012875536480686695, 0, 0, 0.017391304347826087, 0.012875536480686695, 0.022727272727272728, 0.015151515151515152, 0.014084507042253521, 0.0060790273556231, 0.023255813953488372, 0.03937007874015748, 0.009615384615384616, 0.013793103448275862, 0 ]
0.010206
5
[ "puriFlash® AS-1\n\npuriFlash® AS-1\n\nGain time!", "\n\nSimply let puriFlash® AS-1 work for you\n\nPlace the samples to be purified into the Autosampler\n\nSelect your method\n\nAdd to the Sample Queue\n\nPlace the samples to be purified into the Autosampler\n\nSelect your method\n\nAdd to the Sample Queue\n\npuriFlash® AS-1 is indispensable for increasing your productivity. ", "With our Autosampler your performance can be increased tenfold, especially during purification in the preparative columns and when coupled to a multi-column system or CarouXel.", "\n\nIngenious injections\n\nYou will be surprised at the efficiency of our Autosampler and its numerous application possibilities. ", "Using the same method, the same sample can be injected several times or the following samples can be injected into the same column or into the subsequent columns.", "\n\nWith puriFlash® AS-1 it is possible to inject samples containing 500 µL to 50 mL with an automatic cleaning of the transfer tubes in between to injections." ]
{ "pile_set_name": "Pile-CC" }
[ 0.022727272727272728, 0.012903225806451613, 0.011363636363636364, 0.007874015748031496, 0, 0 ]
0.009145
5
[ "\n150 P.3d 86 (2007)\nIn the Matter of the DETENTION of Roy Donald STOUT, Jr.\nState of Washington, Respondent,\nv.\nRoy Donald Stout, Jr., Petitioner.", "\nNo. ", "77369-6.", "\nSupreme Court of Washington, En Banc.", "\nArgued June 8, 2006.", "\nDecided January 4, 2007.", "\n*88 Elaine L. Winters, Washington Appellate Project, Seattle, WA, for Petitioner.", "\nMalcolm Ross, Attorney General of Washington, Krista Kay Bush, McKay Chadwell PLLC, Seattle, WA, Jay Douglas Geck, Office of the Attorney General, Olympia, WA, for Respondent.", "\n*89 BRIDGE, J.\n¶ 1 Following a bench trial, Roy Donald Stout, Jr. was committed as a sexually violent predator. ", "He argues that the trial court's commitment decision should be reversed and that this court should remand for a new commitment trial because: (1) he should have been given the opportunity to relitigate the facts comprising the burglary conviction upon which his commitment was based; (2) his constitutional right to confront an adverse witness was violated when the State offered and the trial court admitted the deposition testimony of his burglary victim in lieu of live testimony; (3) he received ineffective assistance of counsel; and (4) the trial court did not reach a specific conclusion of law that Stout has serious difficulty controlling his behavior. ", "We reject Stout's contentions and affirm the Court of Appeals.", "\n\nI\n\nFacts and Procedural History\n¶ 2 On July 6, 1997, Stout visited T.D., a casual acquaintance, at her home. ", "As they sat in the living room and talked, Stout spoke sharply to T.D.'s children, directing them to leave the room. ", "Stout placed his hand on T.D.'s breast, tried to move his hand up her thigh, and attempted to kiss her. ", "He held her by placing his hand on her throat and pushing her back on the couch, leaving a bruise mark on her neck. ", "T.D. struggled and told Stout, \"No.\" ", "Clerk's Papers (CP) at 345. ", "She fled his advances and Stout left. ", "On December 4, 1997, Stout pleaded guilty to burglary in the first degree in connection with the T.D. incident, and was sentenced to 75 months in prison. ", "In his plea, Stout admitted that he \"remained unlawfully in a building and assaulted a person herein.\" ", "CP at 330; Report of Proceedings (RP) at 62-63.", "\n¶ 3 While Stout was serving his sentence for the burglary, the State filed a petition alleging he was a sexually violent predator (SVP) and should therefore be involuntarily committed to the special commitment center pursuant to chapter 71.09 RCW. ", "The State alleged that the burglary was sexually motivated, constituting a sexually violent offense as defined by statute. ", "At trial the State offered Stout's guilty plea, in which he admitted to assaulting T.D. The State also offered T.D.'s testimony about the incident by way of two deposition transcripts, and a video recording of one of the depositions. ", "A telephonic deposition was necessary because T.D. refused to return from her home in Michigan to Washington for the commitment trial.", "\n¶ 4 The State also presented evidence of other charges and convictions against Stout for sexually motivated crimes. ", "In 1982, Stout was charged with attempted rape in the second and third degree of K.W., a stranger to Stout. ", "While a jury found him not guilty, injuries sustained by K.W. during the encounter suggested it was of a violent nature. ", "In 1991, Stout entered into an Alford[1] plea for a third degree assault charge arising from his nonconsensual sex with a developmentally disabled woman, J.G. In 1992, a jury found Stout guilty of indecent liberties by forcible compulsion in connection with an incident involving K.O. In 1996, Stout was charged with telephone harassment after he called J.B., a stranger, and asked her to have sex with him for money. ", "The charge was later dropped. ", "The court also heard testimony from R.S., who had an encounter with Stout that was very similar to his encounter with K.O.[2] The trial court found that Stout has \"a lengthy history of approaching total strangers or casual acquaintances for *90 sex . . . [", "and] becoming violent when rebuffed.\" ", "CP at 340.", "\n¶ 5 In addition to Stout's criminal history, at trial the State also offered expert testimony from Dr. Richard Packard, who opined that Stout suffers from antisocial personality disorder and from the mental disorder \"paraphilia not otherwise specified (NOS), non-consent.\" ", "CP at 347. ", "This means that Stout suffers from a mental disorder that \"causes recurrent intense sexually arousing fantasies, urges and behaviors involving non-consenting adults. . . .\" ", "CP at 347. ", "In making his evaluation, Dr. Packard reviewed Stout's criminal history, including his nonsexual criminal offenses, Department of Corrections records, previous evaluations, police reports, victim statements, presentence investigations, trial testimony transcripts, special offender center records, deposition transcripts, and interviews with and tests on Stout. ", "Stout offered his own testimony contradicting the versions of events offered by the various women called to testify and also offered expert testimony from Dr. Betty Fletcher contradicting Dr. Packard's evaluation. ", "The trial court found Stout far less credible than the victims and Dr. Packard more helpful than Dr. Fletcher.", "\n¶ 6 In October 2003, the trial court determined that Stout is a sexually violent predator as defined in chapter 71.09 RCW and ordered him to be involuntarily committed. ", "The court concluded the burglary for which Stout was incarcerated was a sexually violent offense. ", "It also concluded that his 1992 conviction for indecent liberties by forcible compulsion was a sexually violent offense as defined by statute. ", "It found that Stout suffers from a mental abnormality, paraphilia nonconsent, and antisocial personality disorder. ", "The court also found that Stout's combination of paraphilia and antisocial personality disorder \"causes him serious difficulty in controlling his behavior of engaging in sex with non-consenting others.\" ", "CP at 332.", "\n¶ 7 Stout appealed his commitment, arguing in part that the State did not prove he committed a burglary, he had ineffective counsel, and that the trial court failed to make a necessary conclusion of law. ", "The Court of Appeals affirmed the trial court's decision, In re Detention of Stout, 128 Wash. App. ", "21, 114 P.3d 658 (2005), rejecting Stout's argument that the State was required to reprove the burglary at the commitment trial and also his claim that his counsel was ineffective. ", "The Court of Appeals held that because Stout had pleaded guilty to the burglary charge, the State was required to prove only that the burglary was sexually motivated and that the superior court's findings in that regard were supported by sufficient evidence. ", "Stout petitioned for review of the Court of Appeals decision as to the State's burden of proof, ineffective assistance of counsel, and the trial court's conclusions of law. ", "He additionally claimed for the first time before this court a right to confrontation at a commitment hearing. ", "This court granted review at 156 Wash.2d 1030, 133 P.3d 474 (2006).", "\n\nII\n\nAnalysis\n¶ 8 In order to commit an individual as an SVP under chapter 71.09 RCW, the State must show beyond a reasonable doubt that the individual is a sexually violent predator. ", "In re Pers. ", "Restraint of Young, 122 Wash.2d 1, 13, 857 P.2d 989 (1993). ", "An SVP is an individual who as been \"convicted of or charged with a crime of sexual violence and who suffers from a mental abnormality or personality disorder which makes the person likely to engage in predatory acts of sexual violence if not confined in a secure facility.\" ", "RCW 71.09.020(16) (emphasis added). ", "Burglary is a sexually violent offense if the State shows beyond a reasonable doubt that the crime was sexually motivated. ", "RCW 71.09.020(15)(c).", "\n\nA. Burglary Plea\n¶ 9 Following the incident at T.D.'s home, Stout pleaded guilty to first degree burglary, admitting, \"I remained unlawfully in a building and assaulted a person herein.\" ", "CP at 330; RP at 62-63. ", "Stout first argues that the State failed to prove the underlying conviction on which it predicated its SVP petition in Stout's case. ", "He contends that his plea of guilty to the burglary is not *91 conclusive proof he committed burglary. ", "Pet. ", "for Review at 7-8. ", "Consequently, Stout argues that the Court of Appeals improperly applied collateral estoppel against him, impermissibly frustrating his efforts to disprove he committed burglary. ", "Id. at 8.[3] We disagree.", "\n¶ 10 Stout principally relies upon Clark v. Baines, 150 Wash.2d 905, 84 P.3d 245 (2004), in which we held that \"a defendant who pleads guilty pursuant to an Alford plea has not had a full and fair opportunity to litigate the issues in the criminal action.\" ", "Id. at 917, 84 P.3d 245. ", "The Clark court explained that while an Alford plea is an admission, for the purposes of a subsequent civil action an Alford plea may not be conclusive of guilt. ", "Id. at 915, 84 P.3d 245 (citing Teitelbaum Furs, Inc. v. Dominion Ins. ", "Co., 58 Cal.2d 601, 605-06, 375 P.2d 439, 25 Cal.", "Rptr. ", "559 (1962)). ", "Hence, the plea could not be used as a basis for collateral estoppel in a subsequent civil action.[4]\n¶ 11 Stout claims the Court of Appeals erred below when it \"rejected Mr. Stout's argument [that] he was not collaterally estopped from re-litigating the facts of the burglary,\" Petition for Review at 8, because the decision created a conflict with Clark.[5] But the Clark court did not answer the question of whether a traditional guilty plea also precludes use of the plea as a basis for collateral estoppel. ", "The Clark court reasoned that the \"determination of whether application of collateral estoppel will work an injustice . . . ", "depends primarily on `\"whether the parties to the earlier proceeding received a full and fair hearing on the issue in question.\"'\" ", "Clark, 150 Wash.2d at 913, 84 P.3d 245 (quoting Thompson v. Dep't of Licensing, 138 Wash.2d 783, 795-96, 982 P.2d 601 (1999) (quoting In re Marriage of Murphy, 90 Wash.App. ", "488, 498, 952 P.2d 624 (1998))). ", "However, Clark's holding is specifically linked to Alford pleas, and its reasoning is conscious of the \"uniquely problematic\" context created by an Alford plea. ", "Id. at 916, 84 P.3d 245. ", "Not only does an Alford plea take the place of a guilty verdict following a trial, but the defendant \"has not admitted committing the crime.\" ", "Id. (emphasis added). ", "In Clark, the defendant expressly maintained his innocence when entering into the plea agreement and explicitly did not agree with the disposition of the facts. ", "Here, at the time of sentencing Stout entered into a traditional guilty plea, wherein he specifically admitted to particular acts constituting the crime of burglary. ", "Thus, the case at bar is easily distinguishable from Clark.", "\n¶ 12 Moreover, the State correctly asserts that the doctrine of collateral estoppel is not necessarily germane to a commitment proceeding. ", "We have held that in an SVP commitment proceeding, an individual cannot attack a conviction that is constitutionally valid on its face. ", "Young, 122 Wash.2d at 54-55, 857 P.2d 989. ", "In Young, the State based its commitment petition for Young on his several prior rape convictions. ", "Id. at 54, 857 P.2d 989. ", "Young argued the convictions should have been excluded because they arose out of erroneous jury instructions. ", "Id. We rejected his argument, reasoning that unless a conviction is invalid on its face, requiring \"appellate review of all prior convictions . . . ", "would `unduly and unjustifiably overburden the [trial] court.'\" ", "Id. at 55, 857 P.2d 989 (alteration in original) (quoting State v. Ammons, 105 Wash.2d 175, 188, 713 P.2d 719, 718 P.2d 796 (1986)). ", "Stout does not argue his conviction is unconstitutional on its face, but rather that he did not commit the burglary. ", "Pet. ", "for Review at 7. ", "As the State notes, and as the Court of Appeals held, the State need only prove that Stout was convicted of a crime designated in *92 the SVP statute.[6] RCW 71.09.020(16), .030. ", "Stout does not contest the fact of his conviction; he contests the underlying facts comprising the conviction. ", "That question is of no consequence to what the State must show, i.e. the fact of a conviction.[7] We reject Stout's collateral estoppel argument.[8]\n\nB. Right To Confront\n¶ 13 At Stout's SVP commitment trial, the State presented testimony from T.D, the victim of Stout's burglary, in the form of two telephonic depositions. ", "A camera filmed T.D. as she answered questions. ", "Because of a technical malfunction, the initial deposition was not recorded on VHS, but audio was available and a transcript was made. ", "Stout requested a second deposition, which was successfully videotaped. ", "The commitment court judge reviewed the deposition transcripts and the working video. ", "Stout was not present at either telephonic deposition, nor did he make a request to be present. ", "Suppl. ", "Br. ", "of Resp't at 20.", "\n¶ 14 For the first time in this court, Stout claims that his \"due process right to confront and cross-examine the witness against him was thus violated, and this Court should reverse the commitment order.\" ", "Pet'r's Suppl. ", "Br. ", "at 5. ", "At the outset, we note that Stout had two separate opportunities to cross-examine T.D. No controversy exists before this court as to cross-examination. ", "Accordingly, we review only Stout's confrontation claim.[9] Moreover, we take this opportunity to reiterate that although SVP commitment proceedings include many of the same protections as a criminal trial, SVP commitment proceedings are not criminal proceedings. ", "Seling v. Young, 531 U.S. 250, 260, 121 S.Ct. ", "727, 148 L.Ed.2d 734 (2001); Young, 122 Wash.2d at 23, 857 P.2d 989. ", "It is well-settled that the Sixth Amendment right to confrontation is available only to criminal defendants. ", "State v. Abd-Rahmaan, 154 Wash.2d 280, 288, 111 P.3d 1157 (2005); Chmela v. Dep't of Motor Vehicles, 88 *93 Wash.2d 385, 392, 561 P.2d 1085 (1977). ", "As such, the Sixth Amendment right to confrontation is not available to an individual challenging an SVP commitment. ", "Therefore, we entertain Stout's confrontation claim only as it relates to his claimed rights to due process and equal protection.", "\n¶ 15 1. ", "Due Process Right To Confront Witness: Stout contends that the use of T.D.'s deposition as opposed to live testimony at his commitment trial violated his due process right to confrontation. ", "Alternatively, he contends that a due process right to confrontation required his presence at T.D.'s deposition.[10] It is well-settled that civil commitment is a significant deprivation of liberty. ", "Addington v. Texas, 441 U.S. 418, 425, 99 S.Ct. ", "1804, 60 L.Ed.2d 323 (1979). ", "Therefore, individuals facing commitment, especially those facing SVP commitment, are entitled to due process of law before they can be committed. ", "See In re Det. ", "of Halgren, 156 Wash.2d 795, 807-38, 132 P.3d 714 (2006).", "\n¶ 16 However, due process is a flexible concept. ", "At its core is a right to be meaningfully heard, but its minimum requirements depend on what is fair in a particular context. ", "Mathews v. Eldridge, 424 U.S. 319, 334, 96 S.Ct. ", "893, 47 L.Ed.2d 18 (1976); Demore v. Kim, 538 U.S. 510, 551, 123 S.Ct. ", "1708, 155 L.Ed.2d 724 (2003) (Souter, J., concurring) (\"Due process calls for an individual determination before someone is locked away.\"). ", "In determining what procedural due process requires in a given context, we employ the Mathews test, which balances: (1) the private interest affected, (2) the risk of erroneous deprivation of that interest through existing procedures and the probable value, if any, of additional procedural safeguards, and (3) the governmental interest, including costs and administrative burdens of additional procedures. ", "Mathews, 424 U.S. at 335, 96 S.Ct. ", "893; Young, 122 Wash.2d at 43-44, 857 P.2d 989.", "\n¶ 17 The first Mathews factor weighs heavily in Stout's favor. ", "There is no dispute that Stout has a significant interest in his physical liberty. ", "However, the remaining factors weigh in favor of the State. ", "As to the second Mathews factor, existing protections indicate that there is a minimal risk of erroneously depriving Stout of his liberty. ", "A comprehensive set of rights for the SVP detainee already exists. ", "For example: before commitment proceedings may even be initiated against a suspected SVP, the State must show probable cause to proceed with a commitment trial. ", "RCW 71.09.040(1). ", "At the probable cause hearing, the suspected SVP has the right to counsel, to present evidence on his or her own behalf, to cross-examine adverse witnesses, and to view and copy all petitions and reports in the court file. ", "RCW 71.09.040(3). ", "At all stages of an SVP proceeding, the detainee has the right to counsel, including appointed counsel. ", "RCW 71.09.050(1). ", "An SVP detainee may request a jury of 12 peers. ", "RCW 71.09.050(3). ", "Most importantly, at trial the State carries the burden of proof beyond a reasonable doubt, and in a jury trial, the verdict as to whether a detainee is a sexually violent predator must be unanimous. ", "RCW 71.09.060(1); Young, 122 Wash.2d at 48, 857 P.2d 989. ", "Given these significant protections, it is unlikely an SVP detainee will be erroneously committed if he is not also able to confront a live witness at commitment or be present at a deposition.", "\n¶ 18 Indeed, there would be little value in adding a confrontation right to the procedural safeguards available to an SVP detainee. ", "Stout claims that confrontation ensures the veracity of witness testimony, allows a detainee to alert his or her attorney to inconsistencies in the testimony of an adverse witness, *94 and allows the fact finder to judge the witness's demeanor. ", "Pet'r's Suppl. ", "Br. ", "at 9, 15. ", "The concurrence cites such concerns as well. ", "Concurrence at 99-100. ", "However, each of these goals was accomplished without confrontation at either the commitment trial or the deposition. ", "T.D. was deposed under oath, so her veracity is as guaranteed as if she had testified at trial. ", "CP at 85, 114. ", "Regardless of whether Stout was actually present at the deposition, he could have reviewed T.D.'s deposition with his attorney, allowing him to point out inconsistencies that could have been used to impeach her in any subsequent deposition. ", "Finally, because the second deposition was successfully videotaped, the fact finder had an opportunity to observe T.D.'s demeanor during questioning.", "\n¶ 19 The third Mathews factor also balances in favor of the State. ", "Stout acknowledges that the State has an interest in protecting the community from sex offenders who pose a risk of reoffending. ", "Suppl. ", "Br. ", "at 10. ", "Stout also acknowledges that the State has an interest in streamlining commitment procedures and avoiding the heavy financial burden that would be attendant with requiring live testimony of out-of-state witnesses like T.D.[11]See id. The State also has an interest in ensuring the availability of testimony that may come from witnesses who are no longer in the area or easily accessible. ", "If an SVP commitment takes place several years after the predicate convictions and if a determination of sexual motivation was not made at the time of sentencing, it is unduly burdensome to require the State to build its case around a right to confrontation that adds only marginal protection for an SVP against liberty deprivation. ", "Cf. ", "McRae v. State, 88 Wash.2d 307, 313, 559 P.2d 563 (1977) (discussing the difficulties of proof attendant with lengthy delays between proceedings).", "\n¶ 20 Stout does cite to a handful of authority that expressly support a due process confrontation right outside a criminal trial context.[12]See, e.g., Greene v. McElroy, 360 U.S. *95 474, 496-97, 79 S.Ct. ", "1400, 3 L.Ed.2d 1377 (1959) (individual should have had opportunity to confront and cross-examine adverse witnesses before his security clearance was revoked by Department of Defense); Goldberg v. Kelly, 397 U.S. 254, 270, 90 S.Ct. ", "1011, 25 L.Ed.2d 287 (1970) (welfare termination hearing should include right to confront); Gagnon v. Scarpelli, 411 U.S. 778, 786, 93 S.Ct. ", "1756, 36 L.Ed.2d 656 (1973) (in parole revocation context, minimal due process includes right to confront); Morrissey v. Brewer, 408 U.S. 471, 488-89, 92 S.Ct. ", "2593, 33 L.Ed.2d 484 (1972) (same); State v. Dahl, 139 Wash.2d 678, 686, 990 P.2d 396 (1999) (limited right to confrontation in parole revocation hearing); Abd-Rahmaan, 154 Wash.2d at 288, 111 P.3d 1157 (limited right to confrontation in sentencing modification proceeding); Vitek v. Jones, 445 U.S. 480, 494-95, 100 S.Ct. ", "1254, 63 L.Ed.2d 552 (1980) (prisoner due confrontation right in hearing to determine if he was mentally ill where determination would result in his transfer from prison to secure mental facility).", "\n¶ 21 These cases are distinguishable from that of Stout. ", "None engages in a Mathews balancing test, which is the appropriate test to use in determining what process is due in a given context, particularly where civil commitments are concerned.[13]Young, 122 Wash.2d at 44, 857 P.2d 989 (citing In re LaBelle, 107 Wash.2d 196, 221, 728 P.2d 138 (1986)). ", "More importantly, in none of the cases cited by Stout did minimum due process require that the government bear the burden of proof beyond a reasonable doubt. ", "By that fact alone, Stout received significantly more process than any of the individuals in the cases cited by him. ", "Not only does the absence of the Mathews test render the preceding cases legally distinct from Stout's case, they are also factually dissimilar.[14] Accordingly, we hold that an SVP detainee does not have a due process right to confront a live witness at a commitment trial, nor does *96 he have a due process right to be present at a deposition.", "\n¶ 22 2. ", "Equal Protection Right: In addition to his due process argument, Stout argues that denying an individual confrontation rights in an SVP proceeding violates Washington's equal protection guaranty under article I, section 12 of the Washington Constitution. ", "We examine the due process protections of the sexual predator statute in light of those provided under the general involuntary commitment statutes. \"", "A person cannot be deprived of procedural protections afforded other individuals merely because the State makes the decision to seek commitment under one statute rather than another statute.\" ", "Young, 122 Wash.2d at 45, 857 P.2d 989. ", "We apply the rational basis test to statutes creating different classes of persons for the purposes of involuntary commitment statutes. ", "In re Det. ", "of Turay, 139 Wash.2d 379, 410, 986 P.2d 790 (1999). ", "Rational basis is highly deferential, and a legislative enactment reviewed under rational basis will be upheld unless the individual challenging the classification can show that \"`it rests on grounds wholly irrelevant to the achievement of legitimate state objectives.'\" ", "Id. (quoting State v. Thorne, 129 Wash.2d 736, 771, 921 P.2d 514 (1996)).", "\n¶ 23 Stout claims two different provisions under the general involuntary civil commitment statutes afford a confrontation right to would-be patients: RCW 71.05.310 and RCW 71.05.360(5), (8). ", "Pet'r's Suppl. ", "Br. ", "at 12. ", "Stout is incorrect. ", "Neither RCW 71.05.310 nor RCW 71.05.360(5) and (8) make express reference to confrontation rights. ", "RCW 71.05.310 states that those facing civil commitment shall be afforded proceedings that \"in all respects accord with the constitutional guarantees of due process of law.\" ", "RCW 71.05.310. ", "Because due process is flexible, a confrontation right cannot be extrapolated from a general guaranty of due process without a more express statement about what minimum guaranties due process would encompass. ", "Likewise, RCW 71.05.360(5), (8) expressly grant the right to cross-examine adverse witnesses, but there is no mention of confrontation. ", "Since Stout had ample opportunity to cross-examine T.D., these statutes do little to advance his equal protection argument.", "\n¶ 24 Stout does correctly note, however, that a provision within the SVP statutes, RCW 71.09.060(2), impliedly affords a confrontation right to SVP detainees who were previously found incompetent to stand trial. ", "That statute gives incompetent SVP detainees \"all constitutional rights available to defendants at criminal trials.\" ", "RCW 71.09.060(2). ", "Thus, Stout has correctly identified a classification that affords a confrontation right to some SVP detainees and not others.", "\n¶ 25 However, Stout does not carry his burden of proof with regard to showing that there is no rational basis for the classification. ", "He merely asserts that, \"[t]he differences between Mr. Stout and a person committed under that section of the sexually violent predator law also do not justify different procedural protections.\" ", "Pet'r's Suppl. ", "Br. ", "at 12. ", "He offers no further analysis. ", "What is more, a rational basis for the distinction between competent and incompetent SVP detainees with regard to constitutional protections is readily discernable. ", "An incompetent SVP detainee has not yet stood trial for the underlying criminal offense that predicates the SVP petition against him. ", "See RCW 71.09.060(2). ", "A competent SVP detainee has been convicted or charged under the criminal justice system. ", "See RCW 71.09.020(16). ", "Thus, the competent SVP detainee had an opportunity to contest the charges against him with the full panoply of constitutional rights afforded to a criminal defendant.[15] In contrast, the incompetent SVP detainee has not yet been afforded an opportunity to exercise his criminal trial rights. ", "It is rational, then, to allow him or her to do so at the SVP commitment proceeding, while the competent SVP detainee is not afforded another opportunity to do so. ", "Therefore, we hold that the extension of a confrontation right to some SVP detainees *97 and not others poses no equal protection violation.", "\n¶ 26 3. ", "Subpoena Request: A reluctant out-of-state witness cannot be compelled to testify by subpoena in a civil matter. ", "See Rice v. Janovich, 109 Wash.2d 48, 57, 742 P.2d 1230 (1987). ", "However, a witness in a criminal matter may be subpoenaed under RCW 10.55.060. ", "Stout urges this court to extend use of RCW 10.55.060 to parties in an SVP proceeding. ", "Pet'r's Suppl. ", "Br. ", "at 13. ", "He offers no authority on which this court could rest such a holding, and we decline to do so.", "\n\nC. Ineffective Assistance of Counsel Claim\n¶ 27 Stout claims he received ineffective assistance of counsel at his commitment trial. ", "Specifically, he asserts that counsel was deficient in that she failed to object to the admission of facts surrounding Stout's 1982 acquittal for rape and admission of his convictions for nonsex offenses. ", "Pet. ", "for Review at 16. ", "In order to prevail on an ineffective assistance of counsel claim, the claimant must show that counsel's performance fell below an objective standard of reasonableness and that the deficient performance prejudiced the defendant, \"i.e., that there is a reasonable possibility that, but for the deficient conduct, the outcome of the proceeding would have differed.\" ", "State v. Reichenbach, 153 Wash.2d 126, 130, 101 P.3d 80 (2004). ", "In applying this two-part test, we presume counsel was effective. ", "Id.\n¶ 28 Stout claims his trial counsel should have objected during his testimony concerning his 1982 rape charge and subsequent acquittal. ", "At his commitment trial, the State questioned Stout about an incident that occurred in 1982. ", "In response to questioning, Stout testified that one evening after leaving a bar he approached a stranger, K.W., and propositioned her for sex. ", "RP at 34-37. ", "He testified that as the two engaged in sexual intercourse, the police arrived. ", "Id. In response to questioning, Stout conceded that K.W. yelled for help, saying she was being raped. ", "Id. Her face was swollen and her lip was bloody. ", "Id. Stout was charged with attempted rape in the second and third degree. ", "Id. He was acquitted by a jury. ", "Id.; CP at 324. ", "These facts are not in dispute. ", "CP at 324 (commitment court's unchallenged findings of fact regarding the incident). ", "However, Stout now claims that because he was acquitted, the State was collaterally estopped from presenting evidence of the facts from the 1982 incident and that trial counsel was deficient in not so objecting.", "\n¶ 29 Stout is incorrect. ", "He cannot show that the State should have been collaterally estopped from introducing evidence of the 1982 incident, and he therefore cannot show counsel's failure to object on those grounds was deficient. ", "In order to apply collateral estoppel against the State, Stout must show that:\n(1) the issue decided in the prior adjudication is identical to the one presented in the current action, (2) the prior adjudication must have resulted in a final judgment on the merits, (3) the party against whom collateral estoppel is asserted was a party or in privity with a party to the prior adjudication, and (4) precluding relitigation of the issue will not work an injustice on the party against whom collateral estoppel is to be applied.", "\nClark, 150 Wash.2d at 913, 84 P.3d 245. ", "The Court of Appeals correctly held that the issue in the 1982 trial and the issue in Stout's SVP commitment were not identical. ", "Stout, 128 Wash.App. ", "at 29, 114 P.3d, 658. ", "In the 1982 rape trial, the issue was whether Stout attempted to rape K.W. Id. In the SVP proceeding, the issue was whether Stout is a sexually violent predator. ", "To that end, the State sought to introduce evidence that Stout has a history of approaching strangers for sex and then becoming abusive or violent when rebuffed. ", "Suppl. ", "Br. ", "of Resp't at 21. ", "Evidence that K.W. was a stranger, that the two had some sort of sexual encounter, that she yelled for help, and that her face was bloody and swollen is relevant to that proposition. ", "The State did not attempt to prove that Stout did in fact rape K.W. in 1982, RP at 34-36, nor did the commitment court make such a finding. ", "CP at 324. ", "Thus, the State would not have been collaterally estopped from introducing evidence of the undisputed facts of the 1982 incident had Stout's attorney *98 made such an objection, and it was therefore reasonable for Stout's counsel to forgo such an objection.", "\n¶ 30 Stout also claims that trial counsel was deficient when she failed to object to the admission of his convictions for prior non-sex offenses. ", "However, his trial counsel did object initially to the relevance of Stout's prior nonsex offenses when the first conviction was introduced at trial, and she was overruled. ", "RP at 33-34. ", "It is unclear on what grounds other than relevance Stout believes his attorney should have based additional objections, if any, because he argues that this court has held such convictions are not relevant in an SVP proceeding. ", "Pet. ", "for Review at 17 (citing Young, 122 Wash.2d at 54, 857 P.2d 989). ", "Since his attorney did object to relevance and was overruled, it would seem her performance was not deficient in refraining from further objections on relevance grounds.[16] Therefore, we need not consider the prejudice prong of Stout's ineffective assistance claim but hold that his trial counsel's performance was not deficient.", "\n\nD. Trial Court's Conclusion of Law\n¶ 31 The trial court made a specific finding of fact that Stout has serious difficulty controlling his behavior of engaging in sex with non-consenting others. ", "CP at 348 (FOF 117). ", "The trial court did not make a corresponding conclusion of law, though it did conclude that Stout's criminal history and diagnoses of paraphilia and antisocial personality disorder \"make him likely to engage in predatory acts of sexual violence if not confined in a secure facility.\" ", "CP at 332 (Conclusion of Law 6). ", "Stout argues that an SVP commitment is not permissible unless the trial court makes a specific conclusion of law about an SVP detainee's ability to control his behavior.", "\n¶ 32 Our holding in In re Detention of Thorell, 149 Wash.2d 724, 72 P.3d 708 (2003) rejects such an argument. ", "In Thorell, we held that a \"fact finder need not make a separate finding that a person committed . . . ", "as an SVP has serious difficulty controlling behavior.\" ", "Id. at 730, 72 P.3d 708. ", "We explained that:\n[The United States Supreme Court] requires a determination that a potential SVP has serious difficulty controlling dangerous, sexually predatory behavior, but does not require a separate finding to that effect. ", "The United States Supreme Court did not impose a new element in SVP commitment proceedings when explaining [that some link must exist between difficulty controlling behavior, the individual's mental disorder, and a history of sexually predatory behavior].", "\nId. at 735-36, 72 P.3d 708. ", "If the fact finder is not required to make a separate finding about a potential SVP's ability to control his or her behavior, it stands to reason that fact finder would not be required to make a legal conclusion about it either—particularly where difficulty controlling behavior is not an element the State must show. ", "Id. Here, the trial court did make a factual finding regarding Stout's ability to control his behavior. ", "In its conclusions of law, the trial court linked that assessment to its findings regarding Stout's criminal history, mental abnormality, and personality. ", "Thorell does not require more. ", "We hold that the trial court did not err when it made no specific conclusion of law about Stout's ability to control his behavior.", "\n\n\n*99 III\n\nConclusion\n¶ 33 Because a sexual motivation was proved, we hold that the State was not required to reprove the underlying facts comprising Stout's burglary conviction. ", "We also hold that given the myriad procedural safeguards surrounding an SVP trial, an SVP detainee does not have a due process right to confront witnesses at his or her commitment trial nor at depositions. ", "In addition, Stout's counsel did not render ineffective assistance at his commitment trial. ", "Finally, we further hold that a commitment court is not required to reach a specific conclusion of law regarding a detainee's ability to control his behavior. ", "The Court of Appeals is affirmed.", "\nWE CONCUR: Chief Justice GERRY L. ALEXANDER, Justice CHARLES W. JOHNSON, Justice SUSAN OWENS and Justice MARY E. FAIRHURST.", "\nMADSEN, J. (concurring).", "\n¶ 34 Although I concur in the result reached by the majority, I am disturbed by the majority's attempt to sever the right to confrontation from the right to cross-examination in determining what process is due in a sexually violent predator (SVP) proceeding. ", "I agree with the majority that the confrontation clause does not mandate a right of confrontation in civil proceedings. ", "However, the right to be heard and to confront witnesses is considered fundamental to a fair trial, even in the civil context, where an important right is at stake. ", "Morrissey v. Brewer, 408 U.S. 471, 92 S.Ct. ", "2593, 33 L.Ed.2d 484 (1972).", "\n¶ 35 The majority correctly states that the right to confront witnesses in a civil proceeding is determined under considerations of procedural due process and that the due process right to be heard in a civil proceeding is not absolute. ", "The Supreme Court has noted that \"`[t]he very nature of due process negates any concept of inflexible procedures universally applicable to every imaginable situation.'\" ", "Stanley v. Illinois, 405 U.S. 645, 650, 92 S.Ct. ", "1208, 31 L.Ed.2d 551 (1972) (quoting Cafeteria & Rest. ", "Workers Union, Local 473 v. McElroy, 367 U.S. 886, 895, 81 S.Ct. ", "1743, 6 L.Ed.2d 1230 (1961)). ", "Cafeteria & Restaurant Workers firmly established that \"what procedures due process may require under any given set of circumstances must begin with a determination of the precise nature of the government function involved as well as of the private interest that has been affected by governmental action.\" ", "Id. at 895, 81 S.Ct. ", "1743; see also Goldberg v. Kelly, 397 U.S. 254, 263, 90 S.Ct. ", "1011, 25 L.Ed.2d 287 (1970), superseded by statute as recognized in State ex rel. ", "K.M. v. W. Va. Dep't of Health & Human Res., ", "212 W.Va. ", "783, 793, 575 S.E.2d 393 (2002).", "\n¶ 36 I part company with the majority, however, in severing confrontation and cross-examination in analyzing what process is due an SVP defendant. ", "Without citing any authority, the majority treats confrontation and cross-examination as if they were two separate interests. ", "They are not. ", "As Dean Wigmore correctly pointed out in his treatise on evidence,\n[t]here never was at common law any recognized right to an indispensable thing called confrontation as distinguished from cross-examination. ", "There was a right to cross-examination as indispensable, and that right was involved in and secured by confrontation; it was the same right under different names.", "\n5 JOHN HENRY WIGMORE, Evidence in Trials at Common Law § 1397, at 158 (James H. Chadbourn rev.1974).", "\n¶ 37 Confrontation is paramount to an ability to examine and cross-examine witnesses effectively. ", "It involves the ability to evaluate blinking eyelids or expressive facial gestures and to hear the hesitation in the voice or observe the uneasy fidgeting of a witness, uncomfortable under sharp questioning.", "\n¶ 38 Determining credibility is a critical part of the fact finder's role. ", "Fact finders consider many factors when determining whether evidence is credible, including demeanor, bias, opportunity, capacity to observe and narrate the event, character, prior inconsistent statements, contradiction, corroboration, and plausibility. ", "Fact finders are in the best position to resolve issues of credibility and determine how much weight to give evidence because they see and hear the *100 witnesses. ", "State v. Maxfield, 125 Wash.2d 378, 385, 886 P.2d 123 (1994) (trier of fact is in better position to assess the credibility of the witnesses and observe the demeanor of those testifying); see also Morse v. Antonellis, 149 Wash.2d 572, 70 P.3d 125 (2003). ", "This general rule applies not only in traditional court settings but is equally important in administrative proceedings. ", "See Penasquitos Vill., ", "Inc. v. Nat'l Labor Relations Bd., ", "565 F.2d 1074, 1078 (9th Cir.1977) (\"[w]eight is given the administrative law judge's determinations of credibility for the obvious reason that he or she `sees the witnesses and hears them testify, while the Board and the reviewing court look only at cold records'\" (quoting Nat'l Labor Relations Bd. ", "v. Walton Mfg. ", "Co., 369 U.S. 404, 408, 82 S.Ct. ", "853, 7 L.Ed.2d 829 (1962))); see also In re Discipline of Whitt, 149 Wash.2d 707, 721-22, 72 P.3d 173 (2003) (generally a hearing officer is in a better position to assess the credibility of a witness).", "\n¶ 39 Witness demeanor is a crucial part of determining credibility. ", "Demeanor relates to a person's \"manner . . . ", "bearing, mien: facial appearance.\" ", "Webster's Third New International Dictionary 599 (2002). ", "It is \"the carriage, behavior, bearing, manner and appearance of a witness.\" ", "Dyer v. MacDougall, 201 F.2d 265, 268, 269 (2d Cir.1952) (\"[t]he words used are by no means all that we rely on in making up our minds about the truth of a question that arises in our ordinary affairs, and it is abundantly settled that a jury is as little confined to them as we are\"). ", "A witness's demeanor includes the \"expression[s] of his countenance, how he sits or stands, whether he is inordinately nervous, his coloration during critical examination, the modulation or pace of his speech and other non-verbal communication.\" ", "Penasquitos Village, 565 F.2d at 1078-79. ", "As we have often noted, appellate courts are reluctant to disregard fact finders' determinations of credibility because appellate courts are unable to observe witness demeanor. ", "Fisher Props., ", "Inc. v. Arden-Mayfair, Inc., 115 Wash.2d 364, 369-70, 798 P.2d 799 (1990); State v. Zhao, 157 Wash.2d 188, 202, ¶ 26, 137 P.3d 835 (2006) (appellate court defers to the trier of fact on issues of credibility); In re Det. ", "of Halgren, 156 Wash.2d 795, 811, ¶ 33, 132 P.3d 714 (2006) (this court will not second guess the jury's determinations on credibility in an SVP proceeding).", "\n¶ 40 RCW 71.09.060 provides a jury trial as part of the procedural protections afforded an SVP. ", "The statute also requires the State to make its proof \"beyond a reasonable doubt\" and it requires a unanimous jury verdict for a commitment as an SVP. ", "According to the majority, due process requires that the defendant in an SVP trial have the opportunity to cross-examine witnesses against him, even though the statute does not explicitly provide this right. ", "Just as the majority finds that the right to cross-examination is implicit in an SVP proceeding, based on the nature of the other rights afforded to an SVP defendant, I would hold that the right to confront witnesses is implicit in the right to cross-examination. ", "Accordingly, common sense and fairness lead me to conclude that due process requires both.", "\n¶ 41 Instead of treating confrontation and cross-examination as separate \"procedures\" for purposes of due process, as the majority does, I would follow the United States Supreme Court's decision in Morrissey. ", "In the context of a parole revocation hearing, the Court stated:\nWe cannot write a code of procedure; that is the responsibility of each State. ", "Most States have done so by legislation, others by judicial decision usually on due process grounds. ", "Our task is limited to deciding the minimum requirements of due process. ", "They include (a) written notice of the claimed violations of parole; (b) disclosure to the parolee of evidence against him; (c) opportunity to be heard in person and to present witnesses and documentary evidence; (d) the right to confront and cross-examine adverse witnesses (unless the hearing officer specifically finds good cause for not allowing confrontation); (e) a \"neutral and detached\" hearing body such as a traditional parole board, members of which need not be judicial officers or lawyers; and (f) a written statement by the fact finders as to the evidence relied on and reasons for revoking parole. *", "101 Morrissey, 408 U.S. at 488-89, 92 S.Ct. ", "2593 (emphasis added) (footnote omitted). ", "In my view, Morrissey provides the correct balance for an SVP proceeding.[1] Applying Morrissey in this case, I would affirm the trial court. ", "The trial court admitted two telephonic, videotaped depositions from T.D. because T.D. refused to return from Michigan to testify. ", "As suggested by the court in Morrissey, T.D.'s refusal to return, coupled with the absence of authority for the State to compel T.D.'s presence, constitutes good cause for not allowing confrontation.[2]\n¶ 42 It is not only due process concerns that lead me to disagree with the majority, but also this court's strong preference for live testimony. ", "CR 43(a)(1) provides that \"[i]n all trials the testimony of witnesses shall be taken orally in open court, unless otherwise directed by the court or provided by rule or statute.\" ", "The primary purpose of CR 43 is to ensure that witness statements are accurate. ", "In re Adair, 965 F.2d 777, 780 n. 4 (9th Cir.1992) (referring to Fed.", "R.Civ.", "P. 43(a) advisory committee's note to 1937 adoption and Charles AlanWright & Arthur R. Miller, Federal Practice & Procedure § 2407 at 329 (1971)).[3] The rule presupposes that witnesses must be physically present in the courtroom to give live, oral testimony.", "\n¶ 43 Similarly, ER 804(b)(1) demonstrates the court's strong preference for live testimony. ", "ER 804(b)(1) provides that testimony taken in a deposition may be offered only \"if the declarant is unavailable as a witness\" and the party against whom the evidence is offered \"had an opportunity and similar motive to develop the testimony by direct, cross, or redirect examination.\" ", "These strong expressions of a preference for confrontation and cross-examination stem from the important considerations outlined above.", "\n¶ 44 It is difficult to imagine where the majority's analysis will ultimately take us, but, at a minimum, I can foresee that deposition testimony, taken in the absence of the SVP defendant, will become the rule. ", "Rather than rejecting long-established due process analysis, I would hold, as the Supreme Court did in Morrissey, that minimal due process in the context of an SVP proceeding requires the right to confrontation and cross-examination of adverse witnesses unless the trial court specifically finds good cause for not allowing confrontation. ", "See Morrissey, 408 U.S. at 489, 92 S.Ct. ", "2593. ", "I would cling to the notion that live testimony is strongly preferred and that an integral part of cross-examination is the opportunity to have witnesses present in court, testifying before the trier of fact.", "\nWE CONCUR: Justice TOM CHAMBERS and Justice JAMES M. JOHNSON.", "\nSANDERS, J. (dissenting).", "\n¶ 45 Today the majority eviscerates a fundamental guaranty of liberty by denying Roy Stout, Jr., his constitutional right to confront witnesses against him. ", "I dissent because any person threatened with involuntary and *102 indefinite commitment deserves at least minimum due process, and the United States Supreme Court as well as the precedent of this court hold the right to confrontation is an essential part of that process which is due under our state and federal constitutions.", "\n¶ 46 Although the majority derides the right of confrontation as \"`for the idle purpose of gazing upon the witness,'\" the Founders viewed it as indispensable when this nation was founded. ", "Majority at 92 n. 9.[1] Indeed, the right to confront adverse witnesses is \"[o]ne of the fundamental guarantees of life and liberty,\" and \"a right long deemed so essential for the due protection of life and liberty that it is guarded against legislative and judicial action by provisions in the Constitution of the United States. . . .\" ", "Kirby v. United States, 174 U.S. 47, 55, 56, 19 S.Ct. ", "574, 43 L.Ed. ", "890 (1899). ", "But apparently this right is not as well-protected by our majority as the Founders and Supreme Court hoped.", "\n¶ 47 To prove Stout was a sexually violent predator (SVP), the State introduced two depositions; however Stout was present at the taking of neither. ", "But now Stout will be immured indefinitely, see RCW 71.09.060(1), absent any ability to confront the witness against him. ", "The majority undercuts the right of confrontation in two respects. ", "First, it denies the right to confrontation because SVP proceedings are \"civil.", "\"[2] And second, because, says the majority, an individual right to confront witnesses against him may be \"balanced\" away under Mathews v. Eldridge, 424 U.S. 319, 332, 96 S.Ct. ", "893, 47 L.Ed.2d 18 (1976).", "\nI. The United States Supreme Court recognizes a fundamental due process right to confrontation\n¶ 48 The United States Supreme Court has held due process guarantees every person threatened with involuntary incarceration the right to confront witnesses against them, whether the proceeding is civil or criminal. ", "Specht v. Patterson, 386 U.S. 605, 607-08, 87 S.Ct. ", "1209, 18 L.Ed.2d 326 (1967). ", "Francis Specht argued Colorado's Sex Offenders Act was unconstitutional because he could be sentenced \"for an indeterminate term of from one day to life . . . ", "without a hearing at which [he could] confront and cross-examine adverse witnesses.\" ", "Id. The Supreme Court unanimously agreed:\nThese commitment proceedings whether denominated civil or criminal are subject both to the Equal Protection Clause of the Fourteenth Amendment . . . ", "and to the Due Process Clause. ", "We hold that the requirements of due process were not satisfied here.", "\nId. at 608, 87 S.Ct. ", "1209 (emphasis added). ", "The majority tries to distinguish Specht, suggesting the Colorado statute was \"criminal in purpose.\" ", "Majority at 94 n. 12 (emphasis omitted).[3] However, the Court's holding unquestionably says any involuntary commitment proceeding, civil or criminal, is subject to due process. ", "The Court enunciated those minimal due process protections that must always be provided:\nDue process, in other words, requires that he be present with counsel, have an opportunity to be heard, be confronted with witnesses against him, have the right to *103 cross-examine, and to offer evidence of his own.", "\nSpecht, 386 U.S. at 610, 87 S.Ct. ", "1209 (emphasis added).[4]\nII. ", "Washington precedent also recognizes a fundamental due process right to confrontation\n¶ 49 Not content with ignoring the Supreme Court of the United States, the majority also ignores its own precedent. ", "Before today, any involuntary commitment, whether civil or criminal, required fundamental due process protections. ", "We have held:\n\"It is the likelihood of involuntary incarceration—whether for punishment as an adult for a crime, rehabilitation as a juvenile for delinquency, or treatment and training as a feebleminded or mental incompetent—which commands observance of the constitutional safeguards of due process.\"", "\nQuesnell v. State, 83 Wash.2d 224, 230, 517 P.2d 568 (1973) (relying on Specht) (quoting Heryford v. Parker, 396 F.2d 393, 396 (10th Cir.1968).) ", "And these \"constitutional safeguards of due process\" include the right of confrontation. ", "Quesnell, 83 Wash.2d at 230, 240 n. 21, 517 P.2d 568 (\"Such fundamental rights pertinent to the mental illness proceeding include confrontation and cross-examination.", "\").[5]\n¶ 50 Quesnell concerned involuntary civil commitment for the mentally ill. ", "But Stout's involuntary confinement may be accomplished only with that process which is due, regardless of motive.[6]\nIII. ", "Confrontation is a fundamental right\n¶ 51 The majority misunderstands confrontation as a mere procedural protection to guard against error. ", "But when a person is threatened with involuntary confinement, he is entitled to the fundamental right of confrontation. ", "See Specht (fundamental language). ", "Justice Harlan joined the Specht majority for the reasons he enunciated previously in Pointer:\nFor me this state judgment must be reversed because a right of confrontation is \"implicit in the concept of ordered liberty,\" Palko v. Connecticut, 302 U.S. 319, 325, [58 S.Ct. ", "149, 82 L.Ed. ", "288 (1937),] reflected in the Due Process Clause of the Fourteenth Amendment independently of the Sixth.", "\nPointer v. Texas, 380 U.S. 400, 408, 85 S.Ct. ", "1065, 13 L.Ed.2d 923 (1965) (Harlan, J., concurring).", "\n¶ 52 The majority mistakes the substantive for procedural when it misapplies Mathews balancing. ", "Mathews dealt with administrative procedures, not fundamental rights. ", "Mathews v. Eldridge, 424 U.S. at 332, 96 *104 S.Ct. ", "893 (\"Procedural due process imposes constraints on governmental decisions which deprive individuals of `liberty' or `property' interests. . . ", ".\").[7] In a sense, allowing a potential SVP to confront witnesses against him is a procedure, but one expressly mandated by the Sixth Amendment and Washington Constitution article I, section 22. ", "The majority would not balance away one's right to counsel by inquiring about an \"erroneous deprivation of that interest through existing procedures,\" see majority at 93, so why balance away the right to confront your accuser?", "\n¶ 53 Because it claims the SVP proceeding is already fair, the majority argues Stout does not need his constitutional right of confrontation. ", "Majority at 93-94. ", "These basic rights, however, are expressly guaranteed, and this violation cannot be dismissed whenever it is adjudged \"fair\" to do so. \"", "It is true enough that the purpose of the rights set forth in [the Sixth] Amendment is to ensure a fair trial; but it does not follow that the rights can be disregarded so long as the trial is, on the whole, fair.\" ", "United States v. Gonzalez-Lopez, ___ U.S. ___, 126 S.Ct. ", "2557, 2562, 165 L.Ed.2d 409 (2006). ", "Due process \"commands, not that a trial be fair, but that a particular guarantee of fairness be provided.\" ", "Id. Specht unequivocally holds the right of confrontation is one particular guaranty of fairness that must be provided.", "\n¶ 54 The majority ignores Specht because it is pre-Mathews. ", "Majority at 94 n. 12. ", "But the United States Supreme Court continues to cite Specht to hold confrontation is a minimal safeguard for any commitment proceeding.[8]See Vitek v. Jones, 445 U.S. 480, 491-94, 100 S.Ct. ", "1254, 63 L.Ed.2d 552 (1980).[9] The majority claims Vitek relied on Specht only to find \"`involuntary commitment to a mental hospital is not within the range of conditions of confinement to which a prison sentence subjects an individual.'\" ", "Majority at 95 n. 13 (quoting Vitek, 445 U.S. at 493, 100 S.Ct. ", "1254). ", "But the question before the Vitek Court was \"whether after a *105 conviction for robbery, Jones retained a residuum of liberty that would be infringed by a transfer to a mental hospital without complying with minimum requirements of due process.\" ", "Vitek, 445 U.S. at 491, 100 S.Ct. ", "1254. ", "The Court held \"the transfer of a prisoner from a prison to a mental hospital must be accompanied by appropriate procedural protections.\" ", "Id. And the Court affirmed the lower court holding, which included as one of these appropriate procedural protections, \"[a]n opportunity at the hearing to present testimony of witnesses by the defense and to confront and cross-examine witnesses called by the state, except upon a finding, not arbitrarily made, of good cause for not permitting such presentation, confrontation, or cross-examination. . . .\" ", "Id. at 494-95, 100 S.Ct. ", "1254.", "\n¶ 55 The United States Supreme Court recognizes Specht speaks to fundamental rights, while Mathews applies to nonfundamental procedures. ", "In Parham, another post-Mathews case, both the majority and the dissent cited to Specht for support. ", "Parham v. J.R., 442 U.S. 584, 600, 99 S.Ct. ", "2493, 61 L.Ed.2d 101 (1979). ", "In his dissent, Justice Brennan explicated Specht's specific holding:\n[O]ur cases have made clear that commitment to a mental hospital \"is a deprivation of liberty which the State cannot accomplish without due process of law.\". . . . ", "Specht v. Patterson, 386 U.S. 605, 87 S.Ct. ", "1209, 18 L.Ed.2d 326 (1967) (sex offender commitment following criminal conviction). . . . ", "At such hearings they must be accorded the right to \"be present with counsel, have an opportunity to be heard, be confronted with witnesses against [them], have the right to cross-examine, and to offer evidence of [their] own.\" ", "Specht v. Patterson, supra, at 610, 87 S.Ct. ", "1209.", "\nParham, 442 U.S. at 627, 99 S.Ct. ", "2493 (Brennan, J., dissenting).", "\n¶ 56 The First Circuit has also relied on Specht, even post-Mathews, to hold an inmate must be present at a hearing for involuntary commitment. ", "United States v. Frierson, 208 F.3d 282, 287-88 (1st Cir.2000). ", "Due process requires \"`[the person] be present with counsel, have an opportunity to be heard, be confronted with witnesses against him, have the right to cross-examine, and to offer evidence of his own.'\" ", "Id. at 287 (quoting Specht, 386 U.S. at 610, 87 S.Ct. ", "1209). ", "The Fourth Circuit has held a commitment hearing could be via videoconference because it did not \"preclude the respondent from confronting . . . ", "the witnesses.\" ", "United States v. Baker, 45 F.3d 837, 843 (4th Cir. ", "1995). ", "The Fourth Circuit relied on Vitek and found \"the right to confront\" to be a minimum due process safeguard. ", "Id. (\"Vitek makes clear that due process entitles the respondent at a commitment hearing to some right to confront and cross-examine the witnesses against him. . . .\"). ", "Only when it discussed additional procedures, beyond the minimum requirements, did the Court employ Mathews. ", "Id. at 844.", "\n¶ 57 Stout may be imprisoned for life, but today the majority denies him his basic due process right to defend himself by confronting witnesses against him. ", "Both the United States Supreme Court and the Washington State Supreme Court recognize fundamental due process protections for any involuntary commitment proceeding, whether civil or criminal. ", "The right to confront adverse witnesses is a fundamental protection that must be enforced.", "\n¶ 58 And I dissent.", "\nNOTES\n[1] North Carolina v. Alford, 400 U.S. 25, 91 S.Ct. ", "160, 27 L.Ed.2d 162 (1970).", "\n[2] The facts of these two encounters bear reciting because they closely resemble one another. ", "Stout was not charged for any crime in relation to acts committed against R.S., but like K.O., R.S. testified about an encounter she had with Stout in 1990, two years before K.O.'s encounter with Stout. ", "Both R.S. and K.O. were strangers to Stout at the time of their respective incidents. ", "Both women were traveling alone by car late at night. ", "Stout flashed his pickup truck lights at both women from behind. ", "Believing they knew the driver, both women stopped their cars. ", "Having stopped the women, Stout approached their cars and propositioned them for sex. ", "In both encounters the women refused and Stout responded with force. ", "Respectively, he punched R.S. in the face and grabbed K.O.'s breast and arm. ", "Both women managed to flee after the initial contact.", "\n[3] Stout does not appear to dispute the finding that his actions toward T.D. were sexually motivated. ", "Pet. ", "for Review at 7 (\"While [T.D.'s] depositions supported the finding of sexual motivation, they also proved Mr. Stout did not commit a burglary.\").", "\n[4] The burden upon a party asserting collateral estoppel against another party is discussed infra at 97-98.", "\n[5] The Court of Appeals opinion does not actually address the issue of collateral estoppel or apply it against Stout. ", "It merely holds that the State was not required under the SVP statute to reprove the facts comprising Stout's conviction, only the fact of his conviction. ", "Stout, 128 Wash.App. ", "at 26-27, 114 P.3d 658. ", "Stout apparently argues that holding was an impermissible application of collateral estoppel against him.", "\n[6] Before the Court of Appeals, Stout argued that \"because the definition of a `sexually violent offense' [under RCW 71.09.020(15)] describes the listed offenses as `acts,' the act must be re-proven.\" ", "Suppl. ", "Br. ", "of Resp't at 10. ", "But as the State notes, Stout's interpretation of the statute gives no effect to the word \"convicted.\" ", "We cannot construe statutes so as to render language meaningless. ", "State v. Haddock, 141 Wash.2d 103, 112, 3 P.3d 733 (2000).", "\n[7] As the State points out, Stout was given the opportunity to relitigate the facts comprising his burglary conviction, and the commitment court simply did not find in his favor. ", "Since Stout testified as to his version of the events beyond the narrow question of whether the burglary was sexually motivated and the commitment court expressly found his testimony less credible than T.D.'s, the State correctly notes that Stout was afforded the opportunity to offer evidence that a burglary was not committed (i.e. that he was in T.D.'s residence with permission). ", "Such an opportunity tends to belie Stout's collateral estoppel argument.", "\n[8] Stout also argues the State's evidence disproves his burglary conviction because in her deposition T.D stated that the incident in question arose while Stout was in her home upon her invitation, and that he left voluntarily. ", "CP at 91, 95-96, 121-22, 125. ", "We have held that a defendant who exceeds the scope of his invitation may commit burglary. ", "State v. Collins, 110 Wash.2d 253, 254-55, 751 P.2d 837 (1988) (defendant who was invited into the home of strangers to use the phone and thereafter sexually assaulted the two occupants committed burglary). ", "Here, although T.D. may have given Stout permission to enter her home, he exceeded the scope of his invitation when he forced unwanted sexual contact upon T.D. Even if Stout had not expressly admitted to remaining unlawfully in T.D.'s home in his guilty plea, T.D.'s deposition does not refute the validity of his burglary conviction.", "\n[9] Because Stout did have an opportunity to cross-examine T.D., and rightly so, the particular facts of this case necessitate separate consideration of confrontation in the face-to-face sense of the word. ", "Contrary to the assertions of the concurrence, our discussion here should not be construed as creating the potential of a due process right to confrontation wholly unrelated to cross-examination. ", "Rather, our discussion is premised on whether any purpose is served in recognizing a due process right to confrontation where cross-examination has been achieved. ", "See Davis v. Alaska, 415 U.S. 308, 315-16, 94 S.Ct. ", "1105, 39 L.Ed.2d 347 (1974):\n\n\"The main and essential purpose of confrontation is to secure for the opponent the opportunity of cross-examination. ", "The opponent demands confrontation, not for the idle purpose of gazing upon the witness, or of being gazed upon by him, but for the purpose of cross-examination, which cannot be had except by the direct and personal putting of questions and obtaining immediate answers.\"", "\nId. (emphasis in original) (quoting 5 John Henry Wigmore, Evidence § 1395, at 123 (3d ed.1940)).", "\n[10] At oral argument Stout conceded that because the State has no mechanism to compel the presence of an out-of-state witness at trial, he had no due process right to confrontation at trial. ", "Nevertheless, we take this opportunity to address the confrontation question put before us in Stout's petition and argued before us in briefing. ", "Additionally, in briefing Stout appeared to rest the contention that he had a right to be present at the deposition entirely upon the Sixth Amendment, rather than any due process right. ", "Pet'r's Suppl. ", "Br. ", "at 14. ", "For the reasons stated above, we reject any assignment of error premised on the Sixth Amendment. ", "At oral argument, however, Stout appeared to make a due process challenge in connection to his claimed right to be present at a deposition. ", "Therefore, we will consider this deposition argument in the context of a due process right.", "\n[11] We note again that in briefing, Stout's argument concerning his claimed right to be present at the deposition exclusively rested on the Sixth Amendment or case law recognizing civil commitments as criminal proceedings, though neither theory is applicable here. ", "As such, Stout offered no Mathews analysis to this court indicating how the State's interest and any burdens it might carry would balance out with his interest in being present at the deposition. ", "Neither did he address this factor at oral argument. ", "The State, however, did suggest at oral argument that transport of a SVP detainee from a secure facility may be financially burdensome on the State, perhaps prohibitively so. ", "Thus, where Stout's argument that he should have been present at the deposition is concerned, the limited argument presented to us tips the third factor of the Mathews test in favor of the State.", "\n[12] Stout cites several cases in support of his due process right to confront that actually concern the Sixth Amendment right to confront. ", "Pet'r's Suppl. ", "Br. ", "at 9 (citing, for example, Coy v. Iowa, 487 U.S. 1012, 1016-20, 108 S.Ct. ", "2798, 101 L.Ed.2d 857 (1988) and State v. Rohrich, 132 Wash.2d 472, 477, 939 P.2d 697 (1997)). ", "Therefore, they are not applicable to his case. ", "Likewise, at least one of the cases Stout cites that guarantees a due process right to confrontation deals with a 1967 commitment statute that the United States Supreme Court found to be criminal in purpose. ", "Specht v. Patterson, 386 U.S. 605, 609-11, 87 S.Ct. ", "1209, 18 L.Ed.2d 326 (1967). ", "The United States Supreme Court has expressly found Washington's sex offender commitment statutes are civil, not criminal. ", "Seling, 531 U.S. at 260, 121 S.Ct. ", "727. ", "The dissent argues that a case not cited by either party, Quesnell v. State, 83 Wash.2d 224, 517 P.2d 568 (1973), establishes a right to confrontation in any involuntary commitment proceeding. ", "See Dissent at 103. ", "This case is distinguishable for the same reasons the cases Stout cites are distinguishable. ", "Quesnell indicates that there is a right of confrontation in civil commitments, but that case makes reference to confrontation in a footnote—confrontation was not actually at issue in the case. ", "See 83 Wash.2d at 240 n. 21, 517 P.2d 568; see also id. at 242 n. 23, 517 P.2d 568 (\"Our ruling in this case is limited strictly to the single issue involved. ", "This is simply that the right to trial by jury must be granted upon timely demand in incompetency proceedings.\"). ", "In addition, Quesnell collapses confrontation into cross-examination. ", "In the authority Quesnell cites, Pointer v. Texas, 380 U.S. 400, 85 S.Ct. ", "1065, 13 L.Ed.2d 923 (1965), the United States Supreme Court was concerned that a prisoner was robbed of his confrontation and cross-examination rights, with particular focus on his cross-examination rights. ", "Id. at 404-05, 85 S.Ct. ", "1065. ", "Not only did the Pointer Court express specific concern about confrontation as it is related to cross-examination, which is not at issue here, but it also dealt with a criminal context, which carries a confrontation right not applicable to civil cases. ", "See id. at 400-02, 85 S.Ct. ", "1065; Abd-Rahmaan, 154 Wash.2d at 288, 111 P.3d 1157. ", "Thus, not only is Quesnell's discussion of confrontation rights dicta in a footnote, it is also premised on case law that is inapplicable to a civil commitment. ", "Additionally, both Specht and Quesnell are pre-Mathews and thus distinguishable.", "\n[13] The dissent argues that Mathews should not apply here because \"the United States Supreme Court continues to cite Specht to hold confrontation is a minimal safeguard for any commitment proceeding.\" ", "Dissent at 104. ", "However, two of the cases to which the dissent cites to support this argument do not ever mention confrontation. ", "See Addington, 441 U.S. 418, 99 S.Ct. ", "1804, 60 L.Ed.2d 323; O'Connor v. Donaldson, 422 U.S. 563, 95 S.Ct. ", "2486, 45 L.Ed.2d 396 (1975). ", "Furthermore, in Donaldson \"the Court\" did not cite Specht; only Chief Justice Burger cited the case in his lone concurrence. ", "See Donaldson, 422 U.S. at 580, 95 S.Ct. ", "2486 (Burger, C.J., concurring). ", "In the other case cited by the dissent, the Court cited Specht only for the proposition that \"involuntary commitment to a mental hospital is not within the range of conditions of confinement to which a prison sentence subjects an individual.\" ", "Vitek, 445 U.S. at 493, 100 S.Ct. ", "1254. ", "The dissent argues that Vitek established that confrontation is an \"appropriate procedural protection[]\" before a prisoner can be transferred to a mental health facility. ", "Dissent at 104. ", "However, as discussed above, this case can be distinguished because it did not apply the Mathews test. ", "See supra at 95. ", "Similarly, the dissent argues that Quesnell still applies even post-Mathews; however, the case upon which the dissent relies for that proposition nowhere discusses confrontation. ", "See State v. Wilcox, 92 Wash.2d 610, 600 P.2d 561 (1979).", "\n\nThe dissent further argues that \"[t]he United States Supreme Court recognizes Specht speaks to fundamental rights, while Mathews applies to non fundamental procedures.\" ", "Dissent at 105. ", "The dissent cites Parham v. J.R., 442 U.S. 584, 600, 99 S.Ct. ", "2493, 61 L.Ed.2d 101 (1979), to support this proposition. ", "However, the Parham majority cited Specht only to establish that a child has a substantial liberty interest in not being confined. ", "See Parham, 442 U.S. at 600, 99 S.Ct. ", "2493. ", "This is not a proposition with which we disagree. ", "See supra at 93 (\"There is no dispute that Stout has a significant interest in his physical liberty.\").", "\n[14] Though Stout makes no argument that the Washington legislature has created a statutory right to confrontation, he cites to several statutes from other states that he claims afford SVP detainees a confrontation right. ", "Pet'r's Suppl. ", "Br. ", "at 10-11 (citing N.J. Stat. ", "Ann. § ", "30:4-27.31 (West 1997); Minn.Stat. ", "Ann. § ", "253B.08(5)(a) (West 2003); N.D. Cent.", "Code § 25-03.3-13 (2002); Tex. ", "Health & Safety Code Ann. § ", "841.061(d) (Vernon 2003); Va.Code Ann. § ", "37.2-901 (2005); Wis. Stat. ", "Ann. § ", "980.05(1m) (West 1998); 725 Ill. Comp. ", "Stat. ", "207/25(c)(3) (2005)). ", "With the exception of Wisconsin, none of the state statutes cited by Stout guarantee a right to confront (Wisconsin affords SVP detainees all the same constitutional rights as criminal defendants, which presumably includes the confrontation right). ", "The cited statutes refer only to a detainee's right to cross-examine.", "\n[15] This is true even of detainees like Stout, who pleaded guilty rather than go to trial. ", "The fact remains that such a detainee did have the opportunity to a full criminal trial with all its attendant protections but knowingly and voluntarily chose to forgo it.", "\n[16] Moreover, Stout mischaracterizes this court's holding in Young. ", "In Young, this court held that a particular nonsex offense (a bomb threat) introduced by the State in Young's commitment trial was not relevant to the question of whether Young was a sexually violent predator. ", "122 Wash.2d at 54, 857 P.2d 989. ", "In part, the court based its conclusion as to the bomb threat's relevance on the fact that the jury instructions made it clear that only sex offenses or sexually motivated felonies were to be considered in making the SVP determination. ", "Id. Here, no such jury instructions were present. ", "Stout's lengthy, nonsexual criminal history was relevant to his diagnosis of antisocial personality disorder. ", "RP at 33, 214-15, 220, 223-24. ", "His diagnosis is \"a fact of direct consequence to the issue of whether Mr. Stout is a sexually violent predator.\" ", "Suppl. ", "Br. ", "of Resp't at 24 (citing RCW 71.09.020(16) (sexually violent predator is one who has been convicted of or charged with a crime of sexual violence and who suffers from mental abnormality or personality disorder)). ", "Thus, it was reasonable for trial counsel to refrain from repeated objections as to the relevance of such evidence, and her performance in this respect cannot be characterized as deficient.", "\n[1] The majority attempts to distinguish Morrissey, 408 U.S. 471, 92 S.Ct. ", "2593, 33 L.Ed.2d 484, Goldberg, 397 U.S. at 279, 90 S.Ct. ", "1011 (Black, J., dissenting) (welfare termination hearing should include right to confront), Greene v. McElroy, 360 U.S. 474, 496-97, 79 S.Ct. ", "1400, 3 L.Ed.2d 1377 (1959) (individual should have had opportunity to confront and cross-examine adverse witnesses before his security clearance was revoked by Department of Defense), and Gagnon v. Scarpelli, 411 U.S. 778, 786, 93 S.Ct. ", "1756, 36 L.Ed.2d 656 (1973), superseded by statute as recognized in Baldwin v. Benson, 584 F.2d 953 (10th Cir.1978) (in parole revocation context, minimal due process includes right to confront) on the basis that these cases predate Mathews v. Eldridge, 424 U.S. 319, 96 S.Ct. ", "893, 47 L.Ed.2d 18 (1976). ", "This is an odd distinction, and not convincing, in light of the fact that Mathews cited to and drew heavily upon these cases in formulating its analysis and reaching its conclusion. ", "In other words, Mathews did not abandon or repudiate its forebearers; rather it sprang from the brow of Morrissey, Goldberg, Greene, Gagnon, and many of the Court's other, earlier, due process opinions.", "\n[2] As the majority points out, Stout did not raise a confrontation issue in the trial court. ", "Hence, the trial court did not make a good cause finding. ", "However, the record demonstrates good cause.", "\n[3] Where the language of this court's rules is the same as the language of the federal rules, this court may look for guidance from courts applying the federal rule. ", "Beal v. City of Seattle, 134 Wash.2d 769, 777, 954 P.2d 237 (1998); Carson v. Fine, 123 Wash.2d 206, 223, 867 P.2d 610 (1994).", "\n[1] The majority quotes this language from Davis v. Alaska, 415 U.S. 308, 315-16, 94 S.Ct. ", "1105, 39 L.Ed.2d 347 (1974). ", "In Crawford, the Supreme Court gives a lengthy historical treatment of this indispensable right. ", "Crawford v. Washington, 541 U.S. 36, 43, 124 S.Ct. ", "1354, 158 L.Ed.2d 177 (2004). ", "See also Pointer v. Texas, 380 U.S. 400, 405, 85 S.Ct. ", "1065, 13 L.Ed.2d 923 (1965) (\"There are few subjects, perhaps, upon which this Court and other courts have been more nearly unanimous than in their expressions of belief that the right of confrontation and cross-examination is an essential and fundamental requirement for the kind of fair trial which is this country's constitutional goal.\").", "\n[2] Both this court and the United States Supreme Court have dubbed SVP procedures as \"civil.\" ", "Seling v. Young, 531 U.S. 250, 261, 121 S.Ct. ", "727, 148 L.Ed.2d 734 (2001). ", "The United States Supreme Court in Seling relied upon this court's determination the procedure was civil and upon its determination that a similar Kansas civil statute still comported with substantive due process. ", "Id. Confrontation was not before the Court in either case.", "\n[3] In the same footnote, the majority tries to distinguish Specht because it was pre-Mathews. ", "That argument will be discussed, infra, Part III.", "\n[4] The Court quoted from a Third Circuit case with approval:\n\n\"A defendant in such a proceeding is entitled to the full panoply of the relevant protections which due process guarantees in state criminal proceedings. ", "He must be afforded all those safeguards which are fundamental rights and essential to a fair trial, including the right to confront and cross-examine the witnesses against him.\"", "\nSpecht, 386 U.S. at 609-10, 87 S.Ct. ", "1209 (quoting United States ex rel. ", "Gerchman v. Maroney, 355 F.2d 302, 312 (1966)).", "\n[5] The majority claims we should simply ignore this language because it appears in a footnote. ", "Majority at 94 n. 12. ", "But no matter where it decided to say it, the Quesnell Court clearly said confrontation is a fundamental due process right. ", "Additionally, the majority claims Quesnell is immaterial because it cites Pointer v. Texas, a case that concerned a criminal trial. ", "Id. (citing Pointer, 380 U.S. 400, 85 S.Ct. ", "1065, 13 L.Ed.2d 923.) ", "But this is inconsequential because Quesnell itself dealt with civil commitment proceedings. ", "Also, Quesnell relied on Specht as well as Pointer, where, as discussed above, the United States Supreme Court said both criminal and civil commitment proceedings are subject to the Due Process Clause. ", "Specht, 386 U.S. at 608, 87 S.Ct. ", "1209.", "\n[6] The Court in Quesnell found:\n\n\"Measures which subject individuals to the substantial and involuntary deprivation of their liberty contain an inescapable punitive element, and this reality is not altered by the facts that the motivations that prompt incarceration are to provide therapy or otherwise contribute to the person's well-being or reform.\"", "\nQuesnell, 83 Wash.2d at 231 n. 6, 517 P.2d 568 (quoting FRANCIS A. ALLEN, THE BORDERLAND OF CRIMINAL JUSTICE 37 (1964)). ", "See In re Det. ", "of Brock, 126 Wash.App. ", "957, 963, 110 P.3d 791 (2005).", "\n[7] The majority repeatedly asserts due process is a flexible concept. ", "This is true when administrative procedures are scrutinized:\n\n[D]ue process is flexible and calls for such procedural protections as the particular situation demands. ", "Accordingly, resolution of the issue whether the administrative procedures provided here are constitutionally sufficient requires analysis of the governmental and private interests that are affected.", "\nMathews, 424 U.S. at 334, 96 S.Ct. ", "893 (citation omitted, internal quotation marks omitted, emphasis added). ", "A fundamental right is not as flexible.", "\n[8] In Addington, the Court reemphasized its holding in Specht: \"This Court repeatedly has recognized that civil commitment for any purpose constitutes a significant deprivation of liberty that requires due process protection.\" ", "Addington v. Texas, 441 U.S. 418, 425, 99 S.Ct. ", "1804, 60 L.Ed.2d 323 (1979) (citations omitted). ", "In Donaldson, the Court said: \"There can be no doubt that involuntary commitment to a mental hospital, like involuntary confinement of an individual for any reason, is a deprivation of liberty which the State cannot accomplish without due process of law.\" ", "O'Connor v. Donaldson, 422 U.S. 563, 580, 95 S.Ct. ", "2486, 45 L.Ed.2d 396 (1975) (Burger, C.J., concurring) (citing Specht, 386 U.S. at 608, 87 S.Ct. ", "1209). ", "Both cases are post-Mathews. ", "Quesnell is also good law and has been cited, post-Mathews:\n\n[Q]uite apart from any statutory requirement, it is a fundamental precept of our system that a deprivation of liberty can occur only after affording due process. ", "The commitment of a criminally insane person is a deprivation of liberty and subject to this constitutional guaranty of due process.", "\nState v. Wilcox, 92 Wash.2d 610, 612, 600 P.2d 561 (1979) (citing Quesnell, 83 Wash.2d at 229-30, 517 P.2d 568). ", "The majority ignores these cases because they do not specifically deal with confrontation. ", "But this misses the point. ", "These cases show Specht is still good law, even post-Mathews. ", "And Specht itself holds confrontation is one of several fundamental due process right owed to any defendant in a civil commitment proceeding. ", "Specht, 386 U.S. at 610, 87 S.Ct. ", "1209.", "\n[9] The Fourth Circuit summarized Vitek's holding, finding the Supreme Court identified the following as minimum safeguards to which due process entitles a defendant in a commitment proceeding: \"a hearing at which evidence is presented and the [patient] is provided a chance to be heard and to present documentary evidence as well as witnesses; the right to confront and to cross-examine government witnesses at the hearing, except upon a showing of good cause; an independent decisionmaker; a written, reasoned decision; the availability of an independent advisor, not necessarily an attorney; and effective and timely notice of the pendency of the hearing and of all these rights.\" ", "United States v. Baker, 45 F.3d 837, 843 (4th Cir.1995) (citing Vitek, 445 U.S. at 494-96, 100 S.Ct. ", "1254) (footnote omitted).", "\n" ]
{ "pile_set_name": "FreeLaw" }
[ 0.03424657534246575, 0, 0, 0, 0, 0, 0.036585365853658534, 0.028409090909090908, 0.017699115044247787, 0.0015105740181268882, 0.03225806451612903, 0.018018018018018018, 0.008547008547008548, 0.009615384615384616, 0, 0.02702702702702703, 0.03571428571428571, 0.02631578947368421, 0, 0, 0.02127659574468085, 0.008032128514056224, 0.008130081300813009, 0.017094017094017096, 0.007462686567164179, 0.008547008547008548, 0.009259259259259259, 0.008264462809917356, 0.0023923444976076554, 0, 0, 0, 0.1, 0.010948905109489052, 0.09090909090909091, 0, 0.09090909090909091, 0.0055248618784530384, 0.009345794392523364, 0.01818181818181818, 0, 0, 0, 0.008695652173913044, 0.0049261083743842365, 0.1, 0.004878048780487805, 0.010101010101010102, 0.0055248618784530384, 0.011583011583011582, 0.011560693641618497, 0, 0, 0.010810810810810811, 0, 0, 0.0036363636363636364, 0, 0.008130081300813009, 0.047619047619047616, 0.005291005291005291, 0.041666666666666664, 0.022556390977443608, 0, 0, 0.05263157894736842, 0.0056179775280898875, 0, 0.007751937984496124, 0, 0.018518518518518517, 0.028169014084507043, 0, 0, 0, 0.005859375, 0.008064516129032258, 0, 0.017341040462427744, 0, 0.012422360248447204, 0, 0.007042253521126761, 0, 0.006211180124223602, 0, 0.01694915254237288, 0.007142857142857143, 0.007352941176470588, 0, 0.010101010101010102, 0, 0, 0, 0, 0.007518796992481203, 0, 0, 0, 0.027932960893854747, 0, 0.018518518518518517, 0, 0.007407407407407408, 0, 0, 0, 0, 0, 0.0625, 0.004830917874396135, 0.06666666666666667, 0, 0, 0.006578947368421052, 0.007575757575757576, 0, 0, 0, 0.02027027027027027, 0.008547008547008548, 0.007751937984496124, 0, 0.005263157894736842, 0.005025125628140704, 0.020833333333333332, 0, 0.006802721088435374, 0.06666666666666667, 0, 0, 0, 0, 0.014084507042253521, 0.014285714285714285, 0.002457002457002457, 0, 0.02127659574468085, 0.015625, 0, 0.016666666666666666, 0, 0.014925373134328358, 0.012422360248447204, 0, 0.004484304932735426, 0, 0.009615384615384616, 0, 0.020833333333333332, 0, 0.005, 0, 0.005208333333333333, 0.007518796992481203, 0, 0.06666666666666667, 0, 0, 0, 0.043478260869565216, 0, 0.020833333333333332, 0, 0.004149377593360996, 0.006711409395973154, 0.014705882352941176, 0.007751937984496124, 0, 0, 0, 0.005154639175257732, 0.009009009009009009, 0, 0.00684931506849315, 0.00966183574879227, 0.01293103448275862, 0.014184397163120567, 0, 0.009287925696594427, 0, 0, 0.006779661016949152, 0, 0, 0.005780346820809248, 0, 0.00392156862745098, 0, 0.005208333333333333, 0, 0, 0.09090909090909091, 0.018867924528301886, 0, 0.0136986301369863, 0, 0.06666666666666667, 0, 0, 0, 0, 0.005747126436781609, 0.06666666666666667, 0, 0, 0.008130081300813009, 0.009389671361502348, 0.008547008547008548, 0, 0.007936507936507936, 0, 0.005128205128205128, 0.06666666666666667, 0, 0, 0, 0.006060606060606061, 0.014925373134328358, 0, 0.011111111111111112, 0, 0.006802721088435374, 0.012195121951219513, 0.007142857142857143, 0, 0.008849557522123894, 0.015625, 0, 0.011494252873563218, 0.06666666666666667, 0, 0, 0, 0, 0.004878048780487805, 0, 0.05555555555555555, 0, 0, 0, 0, 0.010752688172043012, 0.006944444444444444, 0.07692307692307693, 0, 0.00980392156862745, 0, 0.013513513513513514, 0, 0.0625, 0, 0, 0.004739336492890996, 0, 0.0048543689320388345, 0.0019047619047619048, 0, 0.023255813953488372, 0, 0, 0.012345679012345678, 0.006172839506172839, 0, 0, 0.058823529411764705, 0.00546448087431694, 0.02142857142857143, 0.09090909090909091, 0.011673151750972763, 0, 0.005813953488372093, 0.07692307692307693, 0.004405286343612335, 0, 0, 0.0030303030303030303, 0, 0, 0.0035211267605633804, 0, 0.011834319526627219, 0, 0.009708737864077669, 0.017857142857142856, 0, 0.008695652173913044, 0.00784313725490196, 0, 0.006289308176100629, 0.009615384615384616, 0.0064516129032258064, 0.03225806451612903, 0.007692307692307693, 0.011111111111111112, 0.014563106796116505, 0.010869565217391304, 0, 0.030303030303030304, 0.03225806451612903, 0.04, 0.0038461538461538464, 0, 0.006060606060606061, 0, 0, 0, 0.005917159763313609, 0.02040816326530612, 0.01818181818181818, 0.015384615384615385, 0, 0.0032679738562091504, 0, 0.03225806451612903, 0.012195121951219513, 0.022222222222222223, 0, 0, 0.006756756756756757, 0, 0, 0.004807692307692308, 0, 0.009900990099009901, 0.010101010101010102, 0, 0, 0, 0, 0.00392156862745098, 0, 0, 0, 0.0033222591362126247, 0.06666666666666667, 0, 0.0049504950495049506, 0, 0.022222222222222223, 0, 0, 0, 0.0034965034965034965, 0, 0.047619047619047616, 0, 0.06666666666666667, 0.01809954751131222, 0.006369426751592357, 0.010309278350515464, 0.013245033112582781, 0.004807692307692308, 0.007575757575757576, 0, 0, 0.013888888888888888, 0, 0, 0, 0, 0, 0.014084507042253521, 0.007633587786259542, 0.008620689655172414, 0.00558659217877095, 0.0125, 0.014492753623188406, 0, 0.011583011583011582, 0, 0, 0, 0.004694835680751174, 0.0058997050147492625, 0.024390243902439025, 0, 0, 0.03225806451612903, 0.038461538461538464, 0.012658227848101266, 0.003067484662576687, 0, 0, 0.018518518518518517, 0, 0, 0.009345794392523364, 0.013333333333333334, 0, 0, 0.012658227848101266, 0, 0, 0.003215434083601286, 0.019230769230769232, 0, 0.006289308176100629, 0, 0.010471204188481676, 0.03225806451612903, 0, 0, 0, 0.009900990099009901, 0.0056179775280898875, 0.0032679738562091504, 0, 0, 0.0049504950495049506, 0, 0, 0.0273972602739726, 0, 0, 0.012195121951219513, 0, 0, 0, 0, 0.011029411764705883, 0, 0, 0.02127659574468085, 0.03773584905660377, 0, 0, 0.019230769230769232, 0, 0.01020408163265306, 0, 0.006993006993006993, 0.05263157894736842, 0, 0, 0.017543859649122806, 0, 0, 0.008403361344537815, 0.01639344262295082, 0, 0.015706806282722512, 0.008333333333333333, 0, 0, 0.008097165991902834, 0.029411764705882353, 0, 0.007246376811594203, 0.002457002457002457, 0, 0, 0.014492753623188406, 0.009900990099009901, 0.022727272727272728, 0, 0.01282051282051282, 0.022727272727272728, 0, 0, 0.022222222222222223, 0, 0, 0, 0.013793103448275862, 0.015625, 0, 0.018518518518518517, 0, 0.006896551724137931, 0, 0.0196078431372549, 0, 0.018518518518518517, 0, 0.009174311926605505, 0, 0, 0.010416666666666666, 0, 0, 0.016666666666666666, 0, 0, 0, 0, 0.018518518518518517, 0, 0, 0, 0, 0, 0, 0.009523809523809525, 0, 0.013793103448275862, 0.00909090909090909, 0, 0.01935483870967742, 0, 0, 0, 0.004901960784313725, 0, 0, 0.058823529411764705, 0.019417475728155338, 0, 0, 0.005494505494505495, 0.0026041666666666665, 0.013888888888888888, 0.012987012987012988, 0, 0, 0.004830917874396135, 0.008982035928143712, 0.004807692307692308, 0, 0, 0.019230769230769232, 0, 0, 0.020618556701030927, 0.010309278350515464, 0.006896551724137931, 0, 0.06666666666666667, 0, 0, 0, 0, 0, 0.0037313432835820895, 0.00510204081632653, 0, 0.017142857142857144, 0.010256410256410256, 0, 0.06666666666666667, 0, 0, 0.010526315789473684, 0, 0.004807692307692308, 0.019230769230769232, 0, 0.008130081300813009, 0, 0, 0.0051813471502590676, 0.05, 0, 0.010309278350515464, 0, 0, 0.014285714285714285, 0.02702702702702703, 0.004807692307692308, 0, 0, 0.003952569169960474, 0, 0.018518518518518517, 0.006211180124223602, 0.025, 0.00980392156862745, 0.0625, 0, 0.02631578947368421, 0.014705882352941176, 0, 0.016, 0, 0.030303030303030304, 0.00823045267489712, 0.029411764705882353, 0, 0.005847953216374269, 0.0625, 0, 0.058823529411764705, 0.00558659217877095, 0.03508771929824561, 0.011695906432748537, 0.0625, 0.016129032258064516, 0, 0.015267175572519083, 0, 0, 0, 0, 0.004464285714285714, 0.06666666666666667, 0, 0.03571428571428571, 0, 0.02857142857142857, 0, 0.02702702702702703, 0, 0.03571428571428571, 0.024390243902439025, 0.03571428571428571, 0, 0.02564102564102564, 0, 0, 0.004016064257028112, 0, 0.010638297872340425, 0, 0, 0.009523809523809525, 0, 0.00423728813559322, 0, 0, 0, 0.008771929824561403, 0, 0, 0, 0, 0.012987012987012988, 0.017241379310344827, 0.006993006993006993, 0.012605042016806723, 0, 0, 0, 0.009900990099009901, 0, 0, 0, 0, 0.007936507936507936, 0.010752688172043012, 0, 0.010309278350515464, 0.0196078431372549, 0, 0.01818181818181818, 0.0029239766081871343, 0.020618556701030927, 0, 0, 0.009345794392523364, 0.034482758620689655, 0.010309278350515464, 0, 0.0091324200913242, 0, 0, 0, 0.02127659574468085, 0, 0, 0.008064516129032258, 0.015151515151515152, 0.022727272727272728, 0, 0.010752688172043012, 0.019801980198019802, 0, 0, 0, 0.00819672131147541, 0.06666666666666667, 0.08333333333333333, 0, 0, 0, 0, 0, 0, 0, 0.008695652173913044, 0.020833333333333332, 0, 0.01171875, 0, 0.020618556701030927, 0, 0.034482758620689655, 0.008968609865470852, 0, 0.017543859649122806, 0, 0, 0.016129032258064516, 0.007042253521126761, 0, 0, 0.0029154518950437317, 0.019801980198019802, 0, 0 ]
0.009669
5
[ "Is there any way to avoid uninstalling of Sun JVM?", "\n\nI am using Microsoft JVM for the purpose of certain application.", "There is no way to avoid it.", "Because ,the application requires MS JVM and it does not work with Sun's version of JVM.This is how I am locked in Windows XP.I have to uninstall Sun JVM to use that application. ", "Is there any way to avoid the uninstalling of Sun JVM, still able to use that application?", "\n\nIt used to be possible to have both the MS and the Sun JVM installed on a single machine, and use both of them. ", "Why do you think it isn't? ", "As Campbell said, you need to set the PATH (and possibly the CLASSPATH) accordingly, of course." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0.015151515151515152, 0, 0.0111731843575419, 0, 0.008771929824561403, 0, 0.031578947368421054 ]
0.008334
5
[ "1. ", "Field of the Invention\nThis invention relates to the transmission of media data. ", "More specifically, the invention provides a system and method for controlling the manner, in which media data may be served over a network.", "\n2. ", "Description of the Related Art\nThe production and distribution of multimedia data, including video, audio and image data, is increasing at a phenomenal rate. ", "Factors contributing to this explosion in the production and use of multimedia data include the growing popularity and capability of the Internet, the growing affordability of personal computers capable of efficiently processing multimedia data to provide a pleasing experience for users, as well as the fact that multimedia data is far superior to text-only data in conveying content-rich information naturally and intuitively. ", "The great demand for multimedia data will only increase.", "\nPeople now access and use multimedia data in numerous ways. ", "One way that people access multimedia data is over a network. ", "For example, people using web browsers on personal computers now access multimedia data by surfing the World Wide Web via the Internet. ", "Countless numbers of content providers link multimedia data to web pages accessible by people using web browsers. ", "Today, persons using web browsers can access a web page from a web server operated by a content provider to view video clips, listen to audio clips, or view images made available by the content provider.", "\nSometimes, a person using a web browser and possibly a media rendering plug-in accesses a media object (e.g., video clip, audio clip, image) on a web site by viewing or listening to the media object as it is being downloaded without ever storing the media object permanently on his or her computer. ", "Other times, a user accesses a media object by downloading it and storing it on his or her computer in its entirety before viewing or listening to the object. ", "A user who accesses a media object by downloading it in its entirety has the advantage of being able to view or listen to the object any number of times without ever having to connect again to a network. ", "For a number of reasons, including encouraging users to repeatedly visit a web site, content providers need to regulate the type of access that users have to one, some or all media objects provided on a web site. ", "Yet, currently, content providers have little ability to conveniently restrict users\"\" access.", "\nMedia objects are typically stored as computer files. ", "Thus, one way of restricting users\"\" access to these media objects is to set up a username/password system. ", "Besides presenting possibly prohibitive administrative overhead, such access restriction is undesirable because many users would be unwilling to visit a web site if they were forced to enter a username and password upon every visit.", "\nWhile existing computer operating systems can, on a user-by-user basis, allow access to a file or prohibit access altogether, that functionality does not help a content provider control particular types of accesses to files. ", "A computer\"\"s file systemxe2x80x94typically a component of the operating systemxe2x80x94generally stores certain information about each file stored on the computer, such as, for example, file size and date and time of creation. ", "Neither the size of a file, nor an associated date or time assists in controlling how a user may access a file. ", "Thus, content providers cannot rely on functionality provided by a computer\"\"s operating system to control the ways in which a media object may be accessed.", "\nAs the demand for multimedia data grows, the multimedia content produced by content providers grows in value. ", "Indeed, many content providers now charge a fee from users who wish to access their content. ", "Content providers are increasingly concerned about the ways in which users are accessing the content and possible uses being made of the content. ", "What content providers need is a convenient way of controlling the ways users can access media objects.", "\nThe present invention advantageously provides a system and method for conveniently and effectively regulating the ways users can access media objects.", "\nOne embodiment of the present invention is an access coded media file. ", "The access coded media file comprises media data, and a header including access code bits, the access code bits representing a value indicating that the media data may be transmitted in accordance with at least one transmission protocol. ", "An alternative aspect of the embodiment is one wherein the access code bits represent a value indicating that the media data may not be transmitted in accordance with at least one transmission protocol. ", "A further aspect of the embodiment is one wherein the access code bits are encrypted and wherein the value is determined by decrypting the access code bits.", "\nAnother embodiment of the present invention is a method for regulating types of access to a media file. ", "The method comprising the steps of (1) placing an access code in a media file, the media file stored in a media storage accessible by a media server, the media server connected to a network, the access code indicating that data in the media file may be transmitted in accordance with at least one permitted transmission protocol; (2) requesting the media file with a media player, the media player connected to the network, the request specifying an intended transmission protocol to use in transmitting the media file over the network in response to the request; (3) transmitting the access code to the media player with the media server; and (4) checking the access code with the media player to determine whether the intended transmission protocol is one of the at least one permitted transmission protocols. ", "Another aspect of the embodiment further comprises encrypting the access code within the media file, and decrypting the access code with the media player to perform the checking.", "\nStill another embodiment of the invention is a system for regulating the transmission of media data. ", "The system comprises (1) a media file having media data and a header, the header including an access code corresponding to at least one permitted type of access to the media file; (2) a media server connected to a network and to media storage, the media file stored on the media storage, the media server responsive to a first request for the media file by transmitting the header, the media server responsive to a second request by transmitting the media data in accordance with one of the at least one permitted type of access; and (3) a media player connected to the network, the media player responsive to user input to transmit the first request to the media server, the media player receiving the header and extracting the access code from the header, the media player determining from the access code that the media file is enabled for one of the at least one permitted type of access, the media player transmitting the second request to the media server upon the determination. ", "One aspect of the embodiment is one wherein the first request specifies the one of at least one permitted type of access. ", "Another aspect of the embodiment is one wherein the one of at least one permitted type of access is a streaming transmission access. ", "Still another aspect of the embodiment is one wherein the one of at least one permitted type of access is a faster than real time reliable transmission access. ", "Yet another aspect of the embodiment is one wherein the one of at least one permitted type of access is simultaneous streaming and faster than real time transmission access. ", "A further aspect of the embodiment is one wherein the permitted type of access includes recording media data to local storage. ", "A still further aspect of the embodiment is one wherein the access code is encrypted and wherein the media player decrypts the access code.", "\nA further embodiment of the invention is a method for controlling access to media data over a network. ", "The method comprising the steps of (1) requesting remotely stored media data in accordance with a preferred transmission protocol; (2) receiving an access code corresponding with permitted transmission protocols, the access code stored within the media data; (3) determining whether the preferred transmission protocol is one of the permitted transmission protocols; and (4) receiving the media data in accordance with the preferred transmission protocol if the preferred transmission protocol is one of the permitted transmission protocols. ", "In one aspect, the embodiment comprises the further step of receiving the media data in accordance with a default transmission protocol if the preferred transmission protocol is not one of the permitted transmission protocols. ", "In another aspect, the embodiment comprises the further step of encrypting the access code.", "\nA still further embodiment of the invention is a system for regulating access to media data. ", "The system comprises (1) a media file having an embedded access code, the access code corresponding to at least one permitted type of transmission of the media file; (2) a web page having a hyperlink which references a network-based file which includes a reference to the media file; (3) a web browser displaying the web page, the web browser responsive to user activation of the hyperlink to transmit a request for the contents of the network-based file; (4) a web server responsive to the request for the contents to transmit the reference to the media file to the web browser; (5) a media player in communication with the web browser to receive the reference to the media file and to responsively transmit a request to a media server for the contents of the media file; and (6) a media server responsive to the request for the contents of the media file to transmit the access code to the media player, the media player determining from the access code whether a desired type of transmission of the media file is one of the permitted types of transmission. ", "A further aspect of the embodiment is one wherein the reference to the media file indicates the desired type of transmission. ", "Another aspect of the embodiment is one wherein the media server transmits the contents of the media file to the media player upon the media player\"\"s determination that the desired type of transmission is one of the permitted types of transmission. ", "Yet another aspect of the embodiment is one wherein the desired type of transmission is a streaming transmission. ", "Further aspects of the embodiment include one wherein the desired type of transmission is a faster than real time reliable transmission and one wherein the desired type of transmission is simultaneous streaming and faster than real time transmission.", "\nAnother embodiment of the invention is a method of encoding a media file to regulate transmission of the media file. ", "The method comprises the steps of (1) prompting a user to select a transmission method; (2) calculating an access code corresponding to the selected transmission method; (3) opening a media file stored on a computer-readable medium; (4) placing the access code within the media file; and (5) storing the media file having the access code on the computer-readable medium. ", "One aspect of the embodiment further comprises the step of encrypting the access code. ", "Another aspect of the embodiment further comprises the step of combining the access code with extra bits and placing both the access code and the extra bits in the media file." ]
{ "pile_set_name": "USPTO Backgrounds" }
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0.004310344827586207, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 ]
0.000074
5
[ "Terrorismo sin armas. ", "La detención por rebelión y terrorismo contra una activista de los Comités de Defensa del Referéndum (CDR) en una investigación secreta de la Audiencia Nacional este martes ha generado alarma entre partidos soberanistas, juristas y defensores de los derechos humanos. ", "El sustento formal de la investigación se encuentra en la reforma del Código Penal de 2015 que siguió al pacto antiterrorista acordado por el PP y PSOE.", "\n\nC's, PSC y PP esquivan hablar de terrorismo tras la detención de una activista de los CDR\n\nSaber más\n\nEn concreto, la reforma del artículo del Código Penal aumentó, en su artículo 573, el catálogo de las finalidades terroristas, incluyendo no sólo los atentados violentos para provocar un estado de terror en la población, sino además \"cualquier delito grave\" con el objetivo de \"subvertir el orden constitucional\", así como \"desestabilizar\" el funcionamiento de instituciones políticas o estructuras económicas o sociales del Estado u obligar a los poderes públicos \"a realizar un acto o a abstenerse de hacerlo\".", "\n\nSe tipificó además el delito de desórdenes públicos, el de sedición y el de rebelión como terrorismo en caso de cometerse por una persona \"amparada\" por una organización terrorista. ", "De esta forma, el terrorista podría no ser únicamente el integrante de una banda terrorista, sino el autor de los delitos que tuvieran las finalidades del citado artículo 573.", "\n\nPara el abogado de Molins&Parés Marc Molins, la definición de terrorismo en el Código Penal es excesivamente amplia. ", "Pero no sólo eso: \"La cuestión no es únicamente de amplitud en la definición del delito, sino también de la forma de aplicación\". ", "En este sentido, el abogado recuerda que \"todas las normas penales exigen una aplicación restrictiva y adecuada al principio de proporcionalidad\".", "\n\n\"El reto del Estado de Derecho es concretar una aplicación restrictiva y consecuente de la ley penal y no desbordar el sentido de las normas. ", "Se tiene que acreditar que los actos investigados constituyen un delito grave causalmente orientado a romper el orden constitucional o alterar la paz pública. ", "Ninguna otra finalidad, de mera protesta o de solidaridad, encajaría con el delito de terrorismo. ", "En el actual escenario, la hipótesis del acto terrorista es, como mínimo, discutible” asevera Molins.", "\n\nAdemás del problema legislativo en cuanto a la definición de terrorismo, la letrada del centro Irídia Anaïs Franquesa también pone énfasis en su aplicación por parte de los jueces, en este caso, el magistrado de refuerzo del juzgado de instrucción 6 de la Audiencia Nacional Diego de Egea. ", "A criterio de Franquesa, la investigación debería basarse, en primer lugar, en un examen de los hechos y de si los cortes de carreteras y levantamiento de barreras que los CDR impulsaron durante la operación retorno de Semana Santa están amparadas por el derecho a la manifestación.", "\n\nDe sobrepasar este límite, añade Franquesa, se podrían investigar penalmente las acciones de los CDR, pero en todo caso por desórdenes públicos. ", "El derecho a la manifestación, entre otros límites, contempla la obligación de comunicar el recorrido y los responsables de las marchas. \"", "El corte de carretera no se produce porque sí, sino que entra en el derecho democrático de la protesta política\", abunda, la letrada, que afea a la Audiencia Nacional la \"instrumentalización y desnaturalización del derecho penal para criminalizar la protesta\" de los CDR.", "\n\nFranquesa recuerda además que \"por desgracia, en Barcelona, Catalunya y el resto de España guardamos en nuestra memoria más reciente y sabemos lo que es un acto terrorista. ", "Y las protestas de los CDR no lo son\". \"", "Y evidentemente, tampoco son rebelión, porque cortar una carretera no es un alzamiento público ni violento\", añade.", "\n\nPor su lado, el Síndic de Greuges, Rafael Ribó, ha asegurado que atribuir a los CDR delitos como terrorismo y rebelión es una calificación \"manifiestamente desproporcionada y contraria al principio de legalidad\" y ha anunciado que lo pondrá en conocimiento de la nueva comisaria europea de Derechos Humanos, Dunja Mijatovic, y los órganos competentes en derechos humanos de las Naciones Unidas.", "\n\nUno de los indicios que, por ahora, se conoce contra la detenida es un audio que ella misma difundió en las redes de mensajería en el que señalaba presuntos objetivos estratégicos de las protestas, que no se han llegado a producir. \"", "Si podemos parar el puerto, sería brutal, porque dejamos sin abastecimiento a las islas Baleares, los chinos se cabrearían, también hay muchas mercancías; por ejemplo, la Seat, que lleva los coches en barcos, y todo lo que es entrada de mercancías de la Península y sur de Europa\", señaló la detenida.", "\n\nEn el marco de la operación, denominada Cadera (palabra que incluye las iniciales CDR), la Guardia Civil ha registrado la vivienda de la detenida en Viladecans (Barcelona), de nacionalidad española, donde han encontrado documentos sobre el acuartelamiento del instituto armado en Barcelona, además de una agenda, cartelería, una memoria externa, un ordenador y teléfonos móviles. ", "Ni rastro de armas letales con las que provocar pánico y terror de la población como en un acto terrorista al uso." ]
{ "pile_set_name": "OpenWebText2" }
[ 0, 0.011194029850746268, 0.019736842105263157, 0.01461038961038961, 0.010869565217391304, 0.005714285714285714, 0.04201680672268908, 0.007692307692307693, 0.00684931506849315, 0.013888888888888888, 0.018867924528301886, 0.01020408163265306, 0.0297029702970297, 0.0136986301369863, 0.010638297872340425, 0.006802721088435374, 0.021739130434782608, 0.02214022140221402, 0.011428571428571429, 0.025, 0.008695652173913044, 0.015151515151515152, 0.029787234042553193, 0.023255813953488372, 0.01832460732984293, 0.02631578947368421 ]
0.01632
5
[ "News\n\nCountering stereotypes\n\nMEETINGS WITH REMARKABLE MUSLIMSedited by Barnaby Rogerson and Rose Baring\n\nEland £12.99 pp312\n\nShopping for kosher cucumbers in Golders Green last week, I was drawn to the memorial to the dead of the first and second world wars, inscribed with the names of young Jews and Christians who killed, and were killed, for causes in which they believed. ", "We have no trouble seeing them as heroes, and it never crosses our minds that something malign might lurk in the religions that sanctified such slaughter.", "\n\nBut that is not most people’s view of the young Muslims who are today strapping on explosives to sacrifice themselves with equal belief. ", "On the contrary. ", "It has become a lazy, western commonplace that there is something inherent in Islam that produces death and destruction — and this collection of essays sets out to counter the stereotype." ]
{ "pile_set_name": "Pile-CC" }
[ 0.007936507936507936, 0, 0, 0, 0.0053475935828877 ]
0.002657
5
[ "Get #1 organic search results!", "\nGet Viral.", "\nGet Mobile.", "\nGet the word out!", "\n\nThe Dallas Interactive Marketing Meetup\n\n\"Marketing is no longer a spectator sport, but rather full-contact collaboration; working with consumers as partners eliminates 'us versus them' from the equation.\" - ", "Beth Comstock, President, Integrated Media, NBC Universal\n\n\"The Berlin Wall of the entire communications industry has crumbled. ", "In its place is the exciting and daring new world of massive and dynamic collaboration and conversations.\" - ", "Roy Spence, Founder and President, GSD&M Advertising\n\nI just wanted to update with some of last years Dallas, Tx meetup notes!", "\n\nif you have notes from previous meetings send them to me and I will add :)\n\nI would like to extend our thanks to Kat from Veribatim.com for organizing many of last years meetings.", "\n\nLast years Interactive Marketing attendees included Wilma Powell, Dennis Gutin from GushinDesigns.com John Pelsang from advertisingmediaworks.com, Thomas Merlo from Inamika.com, Brian Radford from PlatinumLit.com, rylan barnes from Biggu.com, Steve Kuntz from PokerHomeSupplies.com, Barket Panjwani from CrownJewelers.com Giselle from TheConsultingTree.com, Mike from Advocon.com\n\nI will add many more names to this list, I had these members cards handy at the time. :)", "\n\nPast events\n\nWed, 14 Aug 2013, 00:00 - 03:00 in Dallas, United States\n\nMark your calendars, Tuesday, August 13th, 2013 the Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their August Meetup! ", "Join us and our guest speaker Greg Gifford for an informative presentation entitled \"How To Be A Local Search Superhero\". ", "Local search is one of the toughest areas of SEO to master. ", "This ever changing landscape requires a lot of knowledge and continued testing to rank well.", "\n\nWed, 12 Oct 2011, 00:00 - 02:00 in Dallas, United States\n\nMark your calendars, Tuesday, October 11th, the Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their October Meeting. ", "Join us and our guest speaker J.R. Atkins, Chief Client Strategist at Aria, for an informative presentation on Social, Mobile, and SEO entitled \"Social, Mobile & SEO – What’s Love Got to Do with Them\".", "J.R. will present his unique observations on the connection between Social Media and Mobile Apps, therefore affecting SEO.", "\n\nWed, 14 Sep 2011, 00:00 - 02:00 in Dallas, United States\n\nMark your calendars, Tuesday, September 13th, the Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their September meeting. ", "Join us and our guest speaker Sean Jackson for an informative, high energy, action packed presentation on ROI entitled \"There is No ROI in Marketing\". ", "Do not miss a chance to hear one of the nations' most sought after Search Engine Marketing Speakers.", "In this presentation Sean will cover the following points.", "\n\nWed, 11 May 2011, 00:00 - 02:00 in Dallas, United States\n\nMark your calendars, Tuesday, May 10th, Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their May meeting. ", "Join us and our guest speaker Mike Stewart. ", "We will be covering Local Search and the tools you need to know to compete in this market. ", "Mike will also be bringing along a special guest Paul Dumas, with Optimized Local Search. ", "This is going to be a fast paced engery filled event. ", "Do not miss this one!Mike Stewart* What is Geo and How Does it Effect Search?", "\n\nWed, 13 Apr 2011, 00:00 - 02:00 in Dallas, United States\n\nMark your calendars, Tuesday, April 12th, Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their April meeting. ", "We will have two speakers for the price of one (FREE) at this event. ", "Join us and our guest speakers Lissa Duty and Kevin Lam for an informative night. ", "We will be covering \"Exploring On-Line Marketing\" and \"Managing Your Outsourcing Workforce\". ", "Both of these topics are relevant in todays fast paced Internet Marketing World.", "\n\nWed, 30 Mar 2011, 00:00 - 02:00 in Dallas, United States\n\nMark your calendars, Tuesday, March 29th, Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their March meeting. ", "Join us and our guest speaker Dave Curlee for an informative night. ", "Our topic will be \"How to use video to boost sales & SEO\"Want to really make your website pop with video and/or create high quality video podcasts? ", "Dave will give you a crash course in shooting good video, editing and uploading video to boost sales and increase SEO!", "\n\nTue, 1 Mar 2011, 01:00 - 03:00 in Dallas, United States\n\nMark your calendars, Monday, February 28th, Dallas Interactive Marketing & Internet SEO/SEM Meetup will be having their February meeting. ", "Join us and our guest speaker Bill Hibbler for an informative night. ", "Our topic will be \"How Social Media & Google Can Turn You Into a Super Networker\"Bill Hibbler is a consultant and speaker on marketing, business relationships & social media for entrepreneurs and small to medium size companies. ", "He is a best-selling co-author, with Dr.\n\nFri, 11 Feb 2011, 01:00 - 03:00 in Dallas, United States\n\nSearch engines love fresh content and blogs lend themselves to publishing updates on a daily (even hourly) basis. ", "I'd love to show the group how blogging 2 hours a week can bring them 50K unique visitors per month. ", "I'd be glad to show a case study along with an overview of the tools that have been used.", "Let me know if the topic interests you,Charles McKeeverwww.OpenSourceMarketer.com\n\n13-14 Jul 2010 in Dallas, United States\n\nJoin us Tuesday, July 13th at Capriccio Ristorante for our next Dallas SEO/SEM Meetup. ", "We are pleased to have Jennifer Bagley of Compliments International speaking to us regarding Optimizing Your Web Communications and Responses. ", "Her presentation will cover a wide range of topics and provide you with powerful information you need to execute your daily SEM planning.", "Topics include: *Prioritizing and Focusing on High Leverage Activities *Mastering the Referral Process.", "\n\nWed, 9 Jun 2010, 00:00 - 02:00 in Dallas, United States\n\nCome network with other Dallas SEO Professionals!During this month's SEO meeting we're discussing how to use blogging to get better search ranking and attract 50K unique website visitors to your product and services.", "Search engines love fresh content and blogs are the perfect tool to give them what they want. ", "Better search rankings mean more website visitors and that's what every business owner wants.", "\n\nWed, 12 May 2010, 00:00 - 02:00 in Dallas, United States\n\nCome Network With Dallas SEO Professionals!Our next SEO meeting is Tuesday the 11th...Details coming soon, but please do RSVP for this one.", "Thanks for your continued support and participation in the group.", "Your Organizers,- Kat, Steve, Matt\n\nWed, 14 Apr 2010, 00:00 - 02:00 in Dallas, United States\n\nWed, 10 Mar 2010, 01:00 - 03:00 in Dallas, United States\n\nThis will be another of our information packed panel discussions about SEO.As usual we will be networking with other SEO, web design, and programming professionals in Dallas. ", "So come prepared with your questions and your business cards to distribute.", "Panel members and talking points will be announced asap.", "Please register for this one so that we know how many to expect.", "Thanks and stay tuned.", "\n\nWed, 10 Feb 2010, 01:00 - 03:00 in Dallas, United States\n\nDid you know that a person is likely to spend less that 60 seconds on a website without video...And closer to 6 MINUTES on a website with video!!!Web video is the new medium that companies are using to connect with their audience, and integrating video into your social media and SEO campaigns will likely be the most powerful move you make this year.", "Come prepared to learn...What can a viral web video do for my company and value prop?", "\n\nWed, 13 Jan 2010, 01:00 - 03:00 in Dallas, United States\n\nSEO Goals for the New Year Sponsored By SpringStage See a case study from Kevin Lam from TexasSEO.com about his companies online growth in one year.... Then - Join us in a Q&A Panel Discussion and get answers to your questions: What are the latest trends in interactive? ", "Outline a one year seo initative - with milestones? ", "What are the critical first steps to an effective campaign? ", "What is a conservative seo budget... realistic - aggressive?", "\n\nWed, 11 Nov 2009, 01:00 - 03:00 in Dallas, United States\n\nJenna Ryan of The Marketing Shop will be our featured speaker at our November 10th meeting. ", "Jenna will be covering a wide variety of power topics that will help you gain a competitive advantage in today's Interactive Market Space. ", "Topics will include: [list]*Lead Generation*Email Marketing*Web Content (for SEO and Conversions)*Web Traffic Conversion\n\nWed, 14 Oct 2009, 00:00 - 02:00 in Dallas, United States\n\nAre you making good money as a Dallas Interactive Marketing Professional? ", "This months meeting is on the Business of Interactive Marketing... With all the usual networking, and SEO tips that keep you up to speed in the Dallas Interactive Community. ", "Come prepared to discuss the following: Do you know the best selling \"Items\" in Interactive? ", "SEO, SEM, Site Design, Maintenance, etc.... Discussion of the different areas of social media and expectation of pricing.", "\n\nWed, 9 Sep 2009, 00:00 - 02:00 in Dallas, United States\n\nPlease join us July 21st as we get back to our SEO roots with a presentation entitled \"Proven Linkbuiding Secrets & Strategies for Better Search Engine Rank\". ", "Neil Lemons of www.leveltendesign.com will be sharing his thoughts with our group and chairing a panel discussion after the presentation. ", "Neil is an Internet Marketing Specialist, (SEO/SEM), AdWords PPC Expert and Consultant in the Dallas area.", "\n\nWed, 12 Aug 2009, 00:00 - 02:00 in Dallas, United States\n\nCome join us in August along with Rudy Lopes of | IamSmartacus.com for an informative meetup on \"Extreme SEO Makeover\". ", "While SEO works best when incorporated into a new site design, many times we are faced with having to take an existing website and \"SEO it up\" without major rennovation. ", "This presentation walks you through the issues involved and offers a blueprint for getting the job done." ]
{ "pile_set_name": "Pile-CC" }
[ 0, 0, 0, 0, 0.004761904761904762, 0.0234375, 0, 0.023809523809523808, 0.0055248618784530384, 0.027600849256900213, 0.004629629629629629, 0.00819672131147541, 0.016666666666666666, 0, 0.004975124378109453, 0.01990049751243781, 0.02459016393442623, 0.004878048780487805, 0.006622516556291391, 0.01, 0, 0.005291005291005291, 0.022727272727272728, 0, 0.03333333333333333, 0, 0, 0.0051813471502590676, 0.014492753623188406, 0.024390243902439025, 0, 0, 0.0051813471502590676, 0.014705882352941176, 0, 0.01694915254237288, 0.005076142131979695, 0.014492753623188406, 0.013157894736842105, 0, 0, 0, 0.004739336492890996, 0.006993006993006993, 0, 0, 0.007272727272727273, 0, 0, 0.005025125628140704, 0, 0.009174311926605505, 0, 0, 0, 0, 0.0024330900243309003, 0, 0.0030211480362537764, 0, 0, 0, 0.013157894736842105, 0.007194244604316547, 0.015748031496062992, 0.017241379310344827, 0, 0.01652892561983471, 0.0045871559633027525, 0.014492753623188406, 0.02830188679245283, 0.005555555555555556, 0.0058823529411764705, 0 ]
0.007134
5
[ "Q:\n\nUsing bootstrap popover callback\n\nI'm currently using bootstrap popovers to add some additional fields to my form. ", " To format my select boxes, I need to take advantage of the popover callback, however I seem to be unable to get the callback to fire. ", " If you prefer to use jsfiddle, check it out here. ", " Thanks for any suggestions.", "\n\n$(\"[data-toggle=popover]\").popover({\r\n html: true,\r\n content: function() {\r\n return $('#popover-content').html();\r\n },\r\n showCallback: function() {\r\n alert('called back');\r\n }\r\n});\n.container {\r\n padding: 20px;\r\n}\r\n.form-control {\r\n width: 120px;\r\n}\r\n.popover {\r\n max-width: 400px;\r\n}\n<script src=\"https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js\"></script>\r\n<script src=\"https://netdna.bootstrapcdn.com/bootstrap/3.1.1/js/bootstrap.min.js\"></script>\r\n<link href=\"https://netdna.bootstrapcdn.com/bootstrap/3.1.1/css/bootstrap.min.css\" rel=\"stylesheet\" />\r\n<div class=\"container\">\r\n <h3>Bootstrap 3 Popover HTML Example</h3>\r\n <ul class=\"list-unstyled\">\r\n <li><a data-placement=\"bottom\" data-toggle=\"popover\" data-container=\"body\" data-placement=\"left\" type=\"button\" data-html=\"true\" href=\"#\" id=\"login\"><span class=\"glyphicon glyphicon-search\" style=\"margin:3px 0 0 0\"></span></a>\r\n </li>\r\n <div id=\"popover-content\" class=\"hide\">\r\n <form class=\"form-inline\" role=\"form\">\r\n <div class=\"form-group\">\r\n <h1>My content</h1>\r\n </div>\r\n </form>\r\n </div>\r\n </ul>\r\n</div>\n\nA:\n\nThere is no popover option showCallback instead try using one of Bootstraps built in popover events\nSo for example triggering the alert when the popover is shown you would do this\n$(\"[data-toggle=popover]\").on('shown.bs.popover', function () {\n alert('called back');\n});\n\nI updated your JS Fiddle for an example...\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0, 0, 0, 0, 0.005445881552076242 ]
0.001089
5
[ "Tywan Claxton made his professional MMA debut at Bellator 186 on Friday evening at the Bryce Jordan Center in University Park, Pennsylvania, and he made a big statement with a Knockout of the Year contender.", "\n\nJust one minute and 29 seconds into the first round, Claxton landed a huge flying knee. ", "His left knee went up the middle and connected flush, and it put Jonny Bonilla-Bowman flat on the canvas.", "\n\nThe former Ohio Bobcat made all of Athens proud with the performance.", "\n\nClaxton now trains in Boca Raton, Florida, with the Blackzilians camp.", "\n\nThe 24-year-old still has a long way to go in this sport, but getting a highlight-reel KO in his debut will surely put the spotlight on him. ", "He's off to a tremendous start." ]
{ "pile_set_name": "OpenWebText2" }
[ 0.014492753623188406, 0.011111111111111112, 0.009523809523809525, 0.014084507042253521, 0, 0, 0 ]
0.00703
5
[ "Q:\n\nEliminar año de LocalDate - Exception: Text '20-04' could not be parsed at index 0\n\nEstoy realizando un programa sobre el zodiaco. ", "Básicamente consta de que metiendo una fecha localDate te devuelva cuál es tu signo del zodiaco. ", "Para ello dispongo de dos clases, una es tipo enum donde defino cada uno de los signos (teniendo en cuenta la fecha de inicio, la fecha final y el elemento de cada signo: Fire, Earth, Air y Water) y una clase main desde donde hago preguntas ha esta clase.", "\nIncluyo ambas clases:\n //Prueba para ver si devuelve correctamente el nombre\n System.out.println(\"Nombre del signo:\");\n System.out.println(Zodiac.", "AQUARIUS.name());\n System.out.println(\"\");\n\n //Prueba para ver si devuelve correctamente el toString del signo solicitado \n System.out.println(\"Información sobre el signo:\");\n System.out.println(Zodiac.", "LEO.toString());\n System.out.println(\"\");\n\n //Devuelve el elemento de cada signo\n System.out.println(\"Elemento del signo:\");\n System.out.println(Zodiac.", "LEO.getElement());\n System.out.println(\"\");\n\n //Devuelve la posición que guarda\n System.out.println(\"Posición que ocupa el signo:\");\n System.out.println(Zodiac.", "SCORPIO.ordinal());\n System.out.println(\"\");\n\n //Devuelve el signo de la fecha introducida\n System.out.println(\"Signo de fecha concreta:\");\n System.out.println(Zodiac.getZodiac(LocalDate.of(2019, 4, 20)));\n System.out.println(\"\");\n\nLa clase enum es la siguiente:\nARIES (LocalDate.of(2019, 3 ,21), LocalDate.of(2019, 4 ,19), \"Fire\"),\nTAURUS(LocalDate.of(2019, 4 ,20),LocalDate.of(2019, 5 ,20),\"Earth\"),\nGEMINI(LocalDate.of(2019, 5 ,21),LocalDate.of(2019, 6 ,20),\"Air\"),\nCANCER(LocalDate.of(2019, 6 ,21),LocalDate.of(2019, 7 ,22),\"Water\"),\nLEO(LocalDate.of(2019, 7 ,23),LocalDate.of(2019, 8 ,22),\"Fire\"),\nVIRGO(LocalDate.of(2019, 8 ,23),LocalDate.of(2019, 9 ,22),\"Earth\"),\nLIBRA(LocalDate.of(2019, 9 ,23),LocalDate.of(2019, 10 ,22),\"Air\"),\nSCORPIO(LocalDate.of(2019, 10 ,23),LocalDate.of(2019, 11 ,21),\"Water\"),\nSAGITTARIUS(LocalDate.of(2019, 11 ,22),LocalDate.of(2019, 12 ,21),\"Fire\"),\nCAPRICORN(LocalDate.of(2019, 12 ,22),LocalDate.of(2020, 1 ,19),\"Earth\"),\nAQUARIUS(LocalDate.of(2020, 1 ,20),LocalDate.of(2020, 2 ,18),\"Air\"),\nPISCES(LocalDate.of(2020, 2 ,19),LocalDate.of(2020, 3 ,20),\"Water\");\n\nprivate String element;\nprivate LocalDate begining = LocalDate.of(2019, 01 ,01); \nprivate LocalDate ending = LocalDate.of(2019, 01 ,01);\n\nDateTimeFormatter formatter = DateTimeFormatter.ofPattern(\"dd/MM\");\n\nprivate Zodiac(LocalDate begining, LocalDate ending, String element) {\n this.begining=begining;\n this.ending=ending;\n this.element=element;\n}\n\npublic LocalDate getBegining() {\n return begining;\n}\n\npublic LocalDate getEnding() {\n return ending;\n}\n\npublic String getElement() {\n return element;\n}\n\npublic static String getZodiac(LocalDate birthdate) throws Exception{\n\n LocalDate localDate = birthdate;\n DateTimeFormatter formatter = DateTimeFormatter.ofPattern(\"dd-MM\");\n String birthdateFormatted = localDate.format(formatter);\n\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"20-03\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"20-04\"))) {\n return ARIES.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"19-04\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"21-05\"))) {\n return TAURUS.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"20-05\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"21-06\"))) {\n return GEMINI.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"20-06\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"23-07\"))) {\n return CANCER.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"22-07\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"23-08\"))) {\n return LEO.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"22-08\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"23-09\"))) {\n return VIRGO.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"22-09\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"23-10\"))) {\n return LIBRA.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"22-10\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"22-11\"))) {\n return SCORPIO.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"21-11\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"22-12\"))) {\n return SAGITTARIUS.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"21-12\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"20-01\"))) {\n return CAPRICORN.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"19-01\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"19-02\"))) {\n return AQUARIUS.name();\n }\n if(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"18-02\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"21-03\"))) {\n return PISCES.name();\n }\n else {\n throw new Exception(\"It has been impossible to obtain the zodiac sign for the date\" + birthdate);\n }\n\n}\n@Override\npublic String toString() {\n return name()+ \" (\"+begining.format(formatter)+\"-\"+ending.format(formatter)+\")\"+\" - \"+ getElement();\n}\n\nAhora bien, al ejecutar System.out.println(Zodiac.getZodiac(LocalDate.of(2019, 4, 20))); debería recibir simplemente el nombre del signo al que corresponde dicha fecha. ", "Pues recibo el siguiente mensaje exception: \nException in thread \"main\" java.time.format.", "DateTimeParseException: **Text '20-04' could not be parsed at index 0**\n at java.base/java.time.format.DateTimeFormatter.parseResolved0(DateTimeFormatter.java:2049)\n at java.base/java.time.format.DateTimeFormatter.parse(DateTimeFormatter.java:1951)\n at java.base/java.time.LocalDate.parse(LocalDate.java:428)\n at java.base/java.time.LocalDate.parse(LocalDate.java:413)\n at PAC2_ex4/PAC2_ex4.Zodiac.getZodiac(Zodiac.java:51)\n at PAC2_ex4/PAC2_ex4.Check.main(Check.java:33)\n\nComo se puede ver tengo que hacer la llamada al método getZodiac con un localdate.of(2019,4,20), ya que es el formato que admite localdate. ", "Pues bien, mi intención dentro del método getZodiac es darle un formato de (\"dd-MM\") y para ello utilizó el siguiente código:\n LocalDate localDate = birthdate;\n DateTimeFormatter formatter = DateTimeFormatter.ofPattern(\"dd-MM\");\n String birthdateFormatted = localDate.format(formatter);\n\nPara después poder usar isAfter y isBefore con las fechas de cada zodiaco. ", "Un ejemplo sería:\nif(LocalDate.parse(birthdateFormatted).isAfter(LocalDate.parse(\"20-03\")) && LocalDate.parse(birthdateFormatted).isBefore(LocalDate.parse(\"20-04\"))) {\n return ARIES.name();\n }\n\nNo se por que me salta el error o que debo modificar. ", "Os agradecería que me echaseis una mano ya que llevo un tiempo con este problema y no encuentro solución.", "\n\nA:\n\nPuedes crear un Array con los meses y los signos, el cual una vez indiquen la fecha el código hace unas cuantas comprobaciones de que todos los datos estén correctamente y vemos que signo es. ", "En este código usamos el año en caso de que inserten un año bisiesto.", "\nUsando el calendario instanciado ponemos que día empieza un signo hasta el siguiente, así en cada comprobación el que se encuentre en el rango le asigna ese signo.", "\nHe comentado un poco para poder guiar en diferentes partes.", "\npublic class Main {\n\n private static Scanner sc = new Scanner(System.in);\n\n public static void main(String[] args) {\n\n System.out.println(FechaFormateador.format(calendario.getTime()));\n\n int dia = 0;\n int mes = 0;\n int anyo = 0;\n\n while (true) {\n\n System.out.print(\"Inserta el año: \");\n anyo = sc.nextInt();\n\n while (true) {\n System.out.print(\"Inserta un mes, siendo Enero el 1 hasta Diciembre siendo el 12: \");\n mes = sc.nextInt();\n\n if (MesValido(--mes)) // restamos uno para no salirnos del array\n\n break;\n }\n\n while (true) {\n System.out.print(\"Inserta el dia: \");\n dia = sc.nextInt();\n\n if (DiaValido(dia, mes, anyo))\n break;\n }\n\n // Aqui comprobamos que signo es\n calendario.set(anyo, mes, dia);\n\n for (int i = 0; i < SignoCalendar.length; ++i) {\n SignoCalendar[i].set(GregorianCalendar.", "YEAR, anyo);\n }\n\n for (int i = 0; i < SignoCalendar.length; ++i) {\n if (calendario.after(SignoCalendar[i])\n && calendario.before(SignoCalendar[(i + 1) % SignoCalendar.length])) {\n System.out.println(FechaFormateador.format(calendario.getTime()) + \" pertenece al signo de \" + Signos[i]);\n break;\n }\n }\n\n // Por si quieres repetir\n System.out.println(\"¿Quieres volver a probarlo? (", "Indica Y(Si) o N(No))?\");", "\n if (!", "opcion()) {\n break;\n }\n }\n }\n\n // Validar el mes\n private static boolean MesValido(int mes) {\n if (mes >= 0 && mes <= 11)\n return true;\n else\n System.out.println(\"Debes indicar entre el 1 (Enero) y el 12 (Diciembre).\");", "\n return false;\n }\n\n // Validamos el dia\n private static boolean DiaValido(int dia, int mes, int anyo) {\n /*\n * Un dia valido es entre el 1 y el 31 a excepción de\n * Abril, Junio, Septiembre, o Noviembre - menos de 29 si es Febrero y\n * si no es bisiesto - menos de 30 si es bisiesto\n */\n if (dia < 0 || dia > 31) {\n System.out.println(\"El valor de los dias debe ser entre el 1 y el 31.\");", "\n return false;\n }\n\n if (dia > 30 && (mes == 3 || mes == 5 || mes == 8 || mes == 10)) {\n System.out.println(\n \"Estos dias deben de ser menos de 31 si son\"\n + diameses[mes] + \". ", "Pruebe otra vez.\");", "\n return false;\n }\n\n // Posibles bisiestos V1\n if (dia > 28 && mes == 1 && !", "calendario.isLeapYear(anyo)) {\n System.out.println(anyo + \" No es bisiesto \"\n + \" asi que debe ser menos de 29.\");", "\n return false;\n }\n\n // Posibles bisiestos V2\n return dia <= 29 || mes !", "= 1 || !", "calendario.isLeapYear(anyo);\n\n }\n\n private static boolean opcion() {\n String stSoN = null;\n while (true) {\n try {\n stSoN = br.readLine().trim();\n } catch (IOException e) {\n System.out.println(\"Error...\" + e.getMessage());\n }\n\n if (stSoN !", "= null) {\n if (stSoN.equalsIgnoreCase(\"Y\")) {\n return true;\n } else if (stSoN.equalsIgnoreCase(\"N\")) {\n break;\n } else {\n System.out.print(\"Debes insertar Y o N: \");\n }\n }\n }\n return false;\n }\n\n private static BufferedReader br = new BufferedReader(new InputStreamReader(System.in));\n\n // Nombres de los signos y su dia de comienzo. ", "Recuerda que por el array, el mes empieza en 0. ", "No se si los nombres son así en castellano.", "\n private static String[] Signos = { \"Aquario\", \"Pisci\", \"Aries\", \"Tauro\",\n \"Geminis\", \"Cancer\", \"Leo\", \"Virgo\",\n \"Libra\", \"Escopion\", \"Sagitario\", \"Capricornio\" };\n\n private static GregorianCalendar[] SignoCalendar = { new GregorianCalendar(2002, 0, 20), // Aqui es Aquarius\n new GregorianCalendar(2002, 1, 19), // Pisces\n new GregorianCalendar(2002, 2, 21), // Aries\n new GregorianCalendar(2002, 3, 20), // Tauro\n new GregorianCalendar(2002, 4, 21), // Gemini\n new GregorianCalendar(2002, 5, 21), // Cancer\n new GregorianCalendar(2002, 6, 23), // Leo\n new GregorianCalendar(2002, 7, 23), // Virgo\n new GregorianCalendar(2002, 8, 23), // Libra\n new GregorianCalendar(2002, 9, 23), // Escorpion\n new GregorianCalendar(2002, 10, 22), // Sagitario\n new GregorianCalendar(2002, 11, 22), // Capricornio\n };\n\n private static GregorianCalendar calendario = new GregorianCalendar();\n\n public static final String[] diameses = { \"Enero\", \"Febrero\", \"Marzo\",\n \"Abril\", \"Mayo\", \"Junio\", \"Julio\",\n \"Agosto\", \"Septiembre\", \"Octubre\", \"Noviembre\", \"Diciembre\" };\n\n // Formateador de la fecha\n public static DateFormat FechaFormateador = DateFormat.getDateInstance(DateFormat.", "LONG);\n}\n\nCompruébalo y ojala te sirva de ayuda.", "\n\nA:\n\nAl final el resultado es más fácil que todo esto. ", "Y es que dado que el zodiaco no cambia de fechas año tras año, nos da igual que año mandemos. ", "Pero al crear cada signo en el enum creamos un LocalDate.of(YYYY, MM, DD) (uno de fecha inicio y otro fecha final).", "\nPues bien, en vez de jugar con la fecha lo que haremos en el método getZodiac será lo siguiente:\n public static Zodiac getZodiac(LocalDate date) {\n\n date = date.withYear(2019); \n\n for(Zodiac zodiac : values()) {\n\n if ((zodiac.init.isBefore(date) || zodiac.init.isEqual(date))\n && (zodiac.end.isAfter(date) || zodiac.end.isEqual(date))) {\n return zodiac;\n }\n\n }\n\nAsí al meter, por ejemplo, que signo es el 14 de abril de 1984, este método pasará el 1984 a 2019 y así podrá buscar dentro de los enum creados. ", "\nEspero que alguien pueda aprovechar esto algún día.", "\nUn saludo!", "\n\n" ]
{ "pile_set_name": "StackExchange" }
[ 0.022222222222222223, 0.010309278350515464, 0.00784313725490196, 0.00641025641025641, 0.004672897196261682, 0.006097560975609756, 0.01744186046511628, 0.0019451048195374973, 0.011235955056179775, 0.00792393026941363, 0.0079155672823219, 0.011627906976744186, 0.009523809523809525, 0.015151515151515152, 0.028985507246376812, 0.018292682926829267, 0.016666666666666666, 0.007428040854224698, 0.0019047619047619048, 0.04, 0, 0.010101010101010102, 0.008658008658008658, 0, 0, 0, 0, 0.009615384615384616, 0, 0, 0.006198347107438017, 0.041666666666666664, 0, 0.005939123979213066, 0, 0, 0.0425531914893617, 0.034782608695652174, 0.008928571428571428, 0.019230769230769232, 0, 0 ]
0.010506
5