text
stringlengths
0
7.84M
meta
dict
Abstract A golf ball having an octahedral pattern about its surface with four identical quadrants in each hemisphere. Each quadrant includes a circular area which fills the quadrant as completely as possible without crossing the quadrant boundaries. A dimple is located at each pole. Each circular area is substantially filled with dimples and the remaining interstitial areas between the circular areas and the poles are substantially filled with dimples while leaving a dimple free equatorial line. Description BRIEF DESCRIPTION OF THE INVENTION This invention relates generally to golf balls and more particularly to the arrangement of dimples on a golf ball and the method for arranging such dimples. Dimples are used on golf bails as a standard means for controlling and improving the flight of the golf ball. One of the basic criteria for the use of dimples is to attempt to cover the maximum surface of the ball with dimples without incurring any detrimental effects which would influence the aerodynamic symmetry of the ball. Such aerodynamic symmetry is necessary in order to satisfy the requirements of the United States Golf Association (U.S.G.A.). Aerodynamic symmetry means that the ball must fly substantially the same with little variation no matter how it is placed on the tee or on the ground. In British Patent Provisional Specification Serial No. 377,354, filed May 22, 1931, in the name of John Vernon Pugh, there is disclosed various triangular configurations which may be used to establish dimple patterns that are geometrical and which would also be aerodynamically symmetrical. Pugh uses a number of geometrical patterns wherein he inscribes a regular polyhedron of various types in order to provide such symmetry. The details of plotting and locating the dimples is described in the above-mentioned provisional specification. The problem arises with the Pugh icosahedral golf ball in that there is no equatorial line on the ball which does not pass through some of the dimples. Since golf balls are molded and manufactured by two hemispherical half molds normally having straight edges, the bail as it comes from the mold has a flash line about the equatorial line created by the two hemispheres of the mold. Even if the ball could be molded with dimples on the flash line, the ball could not be properly cleaned and finished in any efficient manner since the flash could not be cleaned from the bottom of the dimple without individual treatment of each dimple. Many proposals have been made and, in fact, many balls have been produced using modifications of the Pugh polyhedron concept, which leave an equatorial dimple-free line and still substantially maintain aerodynamic symmetry. Other various proposals have been made and balls have been conformed which use differing means for locating the dimples on a golf ball. One such means is the use of a plurality of great circles about the ball, which great circles form triangles which include the dimples to be used on the golf ball. Again, these balls provide for an equatorial line free of dimples so that they may be molded. There is a constant striving for dimple configurations which provide the necessary aerodynamic symmetry and which still allow for the maximum surface coverage on the golf ball. Accordingly, it is an object of the present invention to provide a golf ball having dimples on the surface which assume a unique symmetry about the surface of the ball so that the ball will fly equally well regardless of its position on the tee. It is also an object of this invention to provide a method for locating dimples on the surface of a ball so as to achieve aerodynamic symmetry. It is a further object of this invention to provide a modified octahedral dimple pattern using circular dimple groupings. These and other objects of the invention will become obvious from the following description taken together with the drawings. SUMMARY OF THE INVENTION The present invention provides a golf ball having an octahedral pattern about its surface with four identical quadrants in each hemisphere. Each quadrant includes a circular area which fills the quadrant as completely as possible without crossing quadrant boundaries. A dimple is located at each pole. Each circular area is substantially filled with dimples and the remaining interstitial areas between the circular areas and the poles are substantially filled with dimples while leaving a dimple free equatorial line. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a polar view of a golf ball having a dimple pattern according to the present invention; FIG. 2 is an off-equator view of the ball of FIG. 1; FIG. 3 is an off-equator view illustrating the dimple pattern of one octant of the ball of FIG. 1; and FIGS. 4A-4E illustrate the method for arranging dimples on a golf ball according to the invention. DETAILED DESCRIPTION OF THE INVENTION Referring to FIG. 1, there is shown a polar view of one embodiment of the present invention. The hemisphere illustrated is divided into four equal quadrants by dashed lines 11, 13, 15, and 17 extending from pole P to equator E. The quadrants contain imaginary circles 21, 23, 25 and 27. The opposed hemisphere of the ball contains identical quadrants and imaginary circles such that the resulting ball surface contains an octahedral pattern. Since both hemispheres are substantially identical, the description will be limited to one hemisphere for purposes of clarity. As shown in FIG. 1, the imaginary circles fill the respective quadrants as completely as possible without crossing quadrant boundaries. The circles are substantially adjacent each other and, as shown in FIG. 2, are adjacent the dimple free equatorial line E. Each of the circles are filled with dimples, and a dimple is provided at each pole P. The pattern of dimples is the same for each circle. The remaining surface of the ball between the circles, the pole dimple P and the equator E is filled with additional dimples. FIG. 2 illustrates one quadrant in the preferred embodiment of the invention. Central dimple C is surrounded by dimples which form concentric circles 31, 33 and 35. FIG. 3 illustrates the dimple pattern of one quadrant within the hemisphere as shown in FIG. 1. All four quadrants share a common polar dimple P. In the preferred embodiment, each quadrant contains dimples having different diameters 1, 2 and 3. Dimples 1 have larger diameters than dimples 2 which have larger diameters than dimples 3. Each quadrant shares dimples 37, 39 and 41 in addition to polar dimple P. In the preferred embodiment, the surface of the ball has a pattern which contains the following dimples: This results in a total of 418 dimples which covers 72.1% of the ball surface. The method for arranging dimples on the surface of a golf ball will be described with reference to FIGS. 4A-4E. An equatorial line E is defined on the golf ball as shown in FIG. 4A. The line divides the ball into two hemispheres, each containing a pole P. Referring now to FIG. 4B, each hemisphere is divided into four equal quadrants by a plurality of imaginary lines 11, 13, 15, 17 extending from the pole to the equatorial line E. A circular area of maximum diameter is defined in each quadrant. One such circular area defined by a line 21 is shown in FIG. 4C. The circular area fills each quadrant as completely as possible without crossing the lines of the quadrant. Next, each circular area is filled with a first plurality of dimples as shown in FIG. 4D without any of the first plurality of dimples intersecting the lines which define the circular areas. The number of first dimples and the dimple pattern is substantially the same in each quadrant. Finally, the remaining area between the circular areas is filled with a second plurality of dimples as shown in FIG. 4E. No dimples are provided on the equatorial line E although some of the second plurality of dimples cross the circular area defining lines 21. The above description and drawings are illustrative only since modification of the dimple size and patterns could be provided without departing from the present invention which is limited only by the scope of the following claims. Claims (9) We claim: 1. A golf ball having a dimpled surface, comprising (a) a dimple-free equatorial line dividing said ball into two hemispheres each having a pole and substantially identical dimple patterns; (b) a plurality of imaginary lines extending from said pole to said equatorial line in each hemisphere to divide each hemisphere into four equal quadrants; (c) a line generally defining an imaginary circle of maximum diameter within each quadrant, said imaginary circles of said four quadrants being adjacent each other and adjacent said equatorial line and spaced from said pole; (d) a first plurality of dimples forming a substantially identical dimple pattern within each of said imaginary circles without intersecting said circle defining lines; and (e) a second plurality of dimples arranged between said imaginary circles, said pole, and said equatorial line. 2. A golf ball as defined in claim 1, wherein a dimple is arranged at each pole. 3. A golf ball as defined in claim 2, wherein said first plurality of dimples includes a selected number of dimples arranged in a plurality of substantially concentric adjacent circles. 4. A golf ball as defined in claim 3, wherein said first plurality of dimples further includes a central dimple. 5. A golf ball as defined in claim 4, wherein said selected number of dimples are arranged in three substantially concentric adjacent circles. 7. A golf ball as defined in claim 6, wherein 18 dimples have a diameter D1, 176 dimples have a diameter D2, and 224 dimples have a diameter D3, where D1>D2>D3. 8. A method of forming a dimple pattern on the surface of a golf ball, comprising the steps of (a) dividing the surface into two hemispheres with respect to an equatorial line, each hemisphere containing a pole; (b) dividing each hemisphere into four equal quadrants via a plurality of imaginary lines extending from the pole to the equatorial line; (c) locating a line defining a generally circular area of maximum diameter within each quadrant, said circular areas being adjacent each other and adjacent said equatorial line and spaced from said pole; (d) filling each of said circular areas with first dimples without intersecting a circular area defining line, the number of first dimples and the pattern formed by said first dimples being substantially the same in each circular area; and (e) filling the remaining area between said circular areas with second dimples, said equatorial line being dimple free. 9. A method as defined in claim 8, wherein each of said circular areas contains a central dimple and a plurality of dimples arranged in concentric rings about said central dimple.
{ "pile_set_name": "Pile-CC" }
1. Technical Field This disclosure relates to a piston for a reciprocating piston internal combustion engine and in particular to improving the lubrication of such a piston. 2. Background Art It is known, for example in GB 2,448,544 A, to provide a piston with a number of pockets to retain oil in the areas of the piston subject to frictional contact with a cylinder wall. Even further improvements are desired.
{ "pile_set_name": "USPTO Backgrounds" }
Play profiles of captive adult orangutans: a developmental perspective. The social play of 6 adult orangutan heterosexual dyads was observed, and the frequencies of the component behaviors extracted. Frequencies were converted to proportions of total play outputs for each individual and for each age/sex class, and then compared to the proportions observed for the social play of juvenile and adolescent orangutans. Adult play was more stationary, and contact maintaining, in style than was the play of younger orangutans. For the females, rolling and grabbing comprised similar proportions of the play repertoires, whereas for males, slapping and biting were developmentally consistent. For adult males, little chasing was observed, although this behavior was prominant in the play of immature males. These developmental changes in orangutan social play are addressed with respect to the natural history and ecology of orangutans, the refinement of communication skills, and the influences of captivity on social play.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The invention relates to amplifier divider/combiners for dividing input rf energy between a plurality of amplifying channels and then combining the outputs to achieve high power out. 2. Description of the Prior Art Solid state microwave amplifying devices are limited in power. To overcome this, it is a common practice to divide an input signal among a plurality of amplifiers and then combine the outputs. In the beginning, the amplifiers delivered only fractional watts, so that on combination the output might provide several watts. Divider/combiners using distributed amplifier components in impedance networks became quite common as described in U.S. Pat. No. 4,769,618. It has been found that the amplifying devices themselves in these networks had to be extremely well matched. This is not only costly, but replacement in the field becomes virtually impossible. U.S. Pat. No. 4,263,559 of Pang T. Ho uses directional couplers of the interdigital variety in microstrip for his power divider/combiners. These apparently have no phasing problems and probably work well at low power levels. Unlike impedance combiner networks, directional couplers are quite tractable to mismatch in the amplifiers. Unfortunately, when high power levels are required, microstrip couplers are not adequate and the available couplers for the higher power levels produce a new series of problems. Many are difficult to package in any compact manner. Most have limitations on the range of coupling level (tightness or loosenes) available and phase through the couplers often is a function of coupling level.
{ "pile_set_name": "USPTO Backgrounds" }
Cuba holds parliament meeting to discuss constitutional reform Havana, June 3 (IANS) Raul Castro, first secretary of the Communist Party of Cuba (PCC) and President Miguel Diaz-Canel have chaired an extraordinary session of the Caribbean nation’s parliament to discuss a constitutional reform. The meeting on Saturday, which took place at Havana’s convention centre and off limits to foreign press, began with the presence of 572 of the 605 lawmakers to start the process of drafting a new Constitution to reform the one first approved in 1976, Xinhua reported. Modifying the text responds to the need of legally accompanying the deep process of economic and social reforms that have taken place in Cuba since 2010 without renouncing socialism as the political model in the country. In the island, the private sector has flourished, after extensive state control for decades over almost all economic activities, and a new law recognising medium and small private businesses is expected to be approved. The Council of State, top state institution between parliament sessions, on Friday approved a commission which will draft the new Constitution in a meeting chaired by Diaz-Canel. The process, which could take months, will later be subject to a massive referendum where more than 9 million Cubans will vote to approve or disapprove the reform. Other topics that should be included in the reform will be a limit to high government and party posts to two five-year terms. If approved, current President Diaz-Canel would assume the party leadership in 2021, the year in which Castro concludes his second mandate as first secretary of the PCC for which he was re-elected in its Seventh Congress in April 2016. At the start of the session lawmakers paid their respects to the victims of the tragic plane crash on May 18 with a minute of silence. Later, they approved the 10 working commissions of the National Assembly for the next five years which will be responsible for providing input and supervising the constitutional reform process. Also, parliamentary friendship groups with other countries were approved by lawmakers emphasizing that Cuba’s National Assembly will deepen ties with its counterparts of Russia, Vietnam, Iran and China. The current Cuban Constitution dates back to 1976 and since then it has had three modifications after popular consultation.
{ "pile_set_name": "Pile-CC" }
Immunizations Highlights Overview Bacteria, viruses, parasites, and other germs (microbes) cause many human diseases. Vaccines can help protect against some of these microbes. The 2016 recommended immunization schedules include changes to catch-up schedules, timing, and high risk conditions. Data released recently shows that many immunization rates are below the Healthy People 2020 target rates. Vaccination (immunization) against infectious diseases saves millions of lives. Illness and death from diphtheria, pertussis, tetanus, measles, mumps, hepatitis, and other diseases can be prevented through immunization. Introduction Bacteria, viruses, parasites, and other germs (microbes) cause many human diseases. Vaccines can help protect against some of these microbes.Vaccination (immunization) against infectious diseases saves millions of lives. Illness and death from diphtheria, pertussis, tetanus, measles, mumps, hepatitis, and other diseases can be prevented through immunization. Your body is designed to protect you from infections. When you are exposed to a virus, bacterium, or other microbe, your immune system actually "learns" from the experience. The next time your body is exposed to the same microbe, your immune system often recognizes it and sets out to destroy it. During immunization, you are exposed to a very small and safe amount of part of a microbe. Your body's immune system responds to the vaccine by making substances called antibodies. If you are exposed to the microbe itself at a later time, the antibodies will kill the microbe and prevent infection. Or you may have a milder infection. Vaccine Forms Most vaccines are given by an injection. Some can be taken orally (by mouth) or by a nasal spray. Vaccines contain one of four components that trigger an immune response: Live but weakened virus. Live-virus vaccines provide longer immunity than inactivated ones. But they can cause serious infection in people with weakened immune systems. In rare cases, they have also been linked to other medical problems. Inactivated bacteria and viruses. Inactivated vaccines are safe even for people with weakened immune systems. Toxoid: This is an altered form of a harmful substance (toxin) released by certain bacteria. The toxoid in vaccines is changed so it is not harmful, but still produces an immune response. Bacterial or viral component. Instead of containing a whole microbe, these vaccines contain only parts of the microbe that trigger an immune response. These are vaccines that combine more than one vaccine into a single injection (shot). Combination vaccines for diphtheria, tetanus, and pertussis (DTaP) and for measles, mumps, and rubella (MMR) have been available for many years. New combinations that cover up to 5 vaccinations have been developed. They are safe and well-tolerated in infants as young as 2 months. For example, one such vaccine combines DTaP, hepatitis B, and the polio vaccines. It is as effective as the individual vaccines. Passive Immunity Another form of protection against disease is called passive immunity. This approach uses immune globulin, which is a blood product containing antibodies. Immune globulin may be used for people who cannot be vaccinated, when immediate protection is required, or to prevent severe complications of the disease. In some cases, passive immunization interferes with active vaccinations, particularly live-virus vaccines. Therefore, these two immunization types should not be administered within several weeks of each other. General Guidelines Each year the U.S. Centers for Disease Control and Prevention (CDC) issues updated immunization schedules for children and adults. A schedule is a list of recommended vaccines and timing of their doses. The schedules can be found at: www.cdc.gov/vaccines/schedules. This article describes routine vaccines for children and adults. Routine Childhood Vaccines In the U.S., many vaccines are first given during infancy. Even most premature infants can be immunized on a normal schedule. Experts recommend that all children through 18 years of age be routinely vaccinated against the following diseases: Measles Mumps Rubella (German measles) Diphtheria Tetanus Pertussis (whooping cough) Poliomyelitis (polio) Varicella (chickenpox) Hepatitis B Hepatitis A Haemophilus influenzae type b (a cause of meningitis) Human papillomavirus Influenza (flu) Pneumococcal disease Meningococcal disease Rotavirus Common Adult Vaccines Vaccines against the following diseases are recommended for adults: Influenza (flu) Pneumococcal pneumonia Hepatitis A Hepatitis B Meningococcal meningitis Tetanus, diphtheria, and pertussis Measles, mumps, rubella Herpes zoster (shingles) vaccine Human papillomavirus (HPV) Varicella (chickenpox) Vaccination Recommendations During Pregnancy Inactivated-virus and toxoid vaccines are generally safe in pregnant women. Tdap is safe and recommended for all pregnant women in her third trimester to boost immunity across the placenta to the baby after birth. Other vaccines should be delayed until the second or third trimester. Because of possible risk to the fetus, live-virus vaccines should not be given to pregnant women or women likely to become pregnant within 28 days. The exception is women who need immediate protection against life-threatening diseases, such as yellow fever, which can only be prevented with live-virus vaccines. The live-virus MMR combination, which vaccinates against measles, mumps, and rubella, is not given to pregnant women because of risk of the live-rubella vaccine to the fetus. Vaccination Recommendations for People with Compromised Immune Systems Vaccines are not completely effective for patients whose immune systems are compromised by disease or medications. Immune globulin is often given if there is a significant risk of infection. Live-virus vaccines are not usually given to people who have weakened immune systems due to illness or medication. Patients who are receiving treatments that suppress the immune system, such as corticosteroids, alkylating drugs, antimetabolites, or radiation. (Exceptions are discussed below under individual vaccines.) Corticosteroids taken for less than 2 weeks should not affect live-virus vaccination. Patients who need vaccines and take long-term or high-dose topical steroids should check with their health care providers. Vaccine Safety and Side Effects Some people worry that vaccines are not safe and may be harmful, especially for children. They may ask their provider to wait or even choose not to have the vaccine. But the benefits of vaccines far outweigh their risks. For example: After immunizations were introduced on a wide scale, infections such as tetanus, diphtheria, mumps, measles, pertussis (whooping cough), and polio became rare. All of these illnesses can cause lifetime disabilities or even death. Vaccines have also decreased certain types of meningitis, pneumonia, and ear infections in children. Pregnant women may contract infections that can be very dangerous to their fetus or newborn. Vaccines reduce this risk. Autism Scientific studies have shown that vaccines and their components do not cause autism. Based on this evidence, the American Academy of Pediatrics, the Centers for Disease Control and Prevention, and the Institute of Medicine all conclude that the benefits of vaccines outweigh their risks. Thimerosal is a preservative that was used in many vaccines since the 1930s. Preservatives are necessary to prevent vaccine contamination with live organism in vials that are used for vaccinating multiple people. Now, all vaccines recommended for children, except one type of influenza (flu) vaccine, contain no thimerosal. Multidose inactivated influenza vaccine has only a trace amount of thimerosal. (A trace amount means that a dose of vaccine contains less than 1 part per million.) The single-dose flu vaccine does not have any thimerosal. Autism is also not linked to the number of vaccines that children receive at a young age. From birth onward, children are exposed to substances called antigens that trigger an immune response. The number of antigens in vaccines is tiny as compared to the many antigens children are exposed to every day. Getting the Actual Infection from a Vaccine Unless a person's immune system is weakened, it is highly unlikely that a vaccine will cause an infection. Some vaccines, such as the measles, mumps, rubella (MMR), the chickenpox, and the nasal spray flu contain live but weakened viruses. These vaccines should not be given to patients who have weakened immune systems. Adverse Events Like many medications, there is always a chance a vaccine can cause adverse events. An adverse event is a health problem caused by a medical treatment. An adverse event is also called a side effect. No vaccine is 100% safe. Allergic reactions and other side effects may sometimes develop. In the U.S., the government and other agencies monitor side effects from vaccines: VAERS (Vaccine Adverse Event Reporting System) is a government service that registers all adverse events reported after vaccination, including those not related to the vaccine. VSD (Vaccine Safety Datalink) is a linked database that analyzes the records of more than 5 million patients each year. The CDC Clinical Immunization Safety Assessment Centers help providers evaluate and manage patients who may have had a side effect from a vaccine. Studies using these systems are ongoing and none to date have confirmed reports of any significant link between most vaccines and severe side effects that would outweigh their important benefits. Helping Children Before, During, and After Vaccinations Infants often accept the first shot (injection) easily, since they are not expecting any pain or discomfort. It gets more difficult, though, with each additional shot. Providing reassurance can help children of all ages tolerate immunizations. Here are some tips: Do not lie and tell an older child that a shot will be painless. Some health care providers suggest telling your child that it stings a little, and to count to 5 while the vaccine is being administered. A cooling spray of water can help numb the skin before the shot. Have your child take a deep breath right before the shot and blow out hard while it is being given. For children under 12 months, giving a sweet fluid before the shot may help ease the pain. Sugar has been found to relieve pain in infants. Ask the provider if you can give children's acetaminophen (Tylenol) or ibuprofen (Motrin, Advil) after a vaccination if your child has pain or fever. Do not give aspirin or medicine that has aspirin in it because aspirin can cause severe health problems in children. When to Postpone Vaccination If a person is ill with something more serious than a cold or develops a fever (T>101oF), vaccination may need to be scheduled for another day. Call your provider or immunization clinic for more information about this. Severe Reactions to Vaccinations Although severe reactions are very rare, you should know how to respond. Call the health care provider right away if a child has any of the following symptoms. Extremely high fever: A rectal temperature of 105°F (40.5°C) or higher. (Temperatures taken under the arm or by mouth often register lower than actual temperatures.) Inconsolable crying: The child has been crying for over 3 hours without stopping or has a cry that is not normal, such as a high-pitched sound. Convulsions: The child's body starts shaking, twitching, or jerking. This reaction is usually due to a high fever. Lie the child down with the head to one side. Protect the head from hitting anything hard. Be sure the child can breathe freely. A simple febrile seizure stops by itself within a few seconds to 10 minutes. Call 911 right away if a child has any of the following symptoms: Shock: The child collapses, turns pale, and becomes unresponsive. Severe allergic reaction (anaphylaxis): Swelling in the mouth and throat, wheezing and difficulty breathing, dizziness. The child collapses or is pale and limp. Call the provider if the following symptoms persist for more than 24 hours: The injection site is still red and tender. Fever does not go down. The child is still fussy. Adults who have any of the above side effects after vaccination should also seek medical attention. After a severe reaction to a vaccine, such as an allergic reaction or convulsion, the person should not get any additional doses (shots) of the same vaccine. Call your provider or immunization clinic for more information about this. Diphtheria, Tetanus, and Pertussis Diphtheria Diphtheria is caused by the bacterium Corynebacterium diphtheriae, which commonly infects the nose and throat. The throat infection leads to a gray to black, tough fiber-like membrane that can block the airway, making it hard to breathe, which can be life-threatening. In the early 1900s, diphtheria infected 200,000 people every year in the U.S., killing up to 10% of infected persons. Since a vaccine became available in the 1920s, there have been almost no cases of diphtheria in the U.S. Tetanus Tetanus is a disease that causes severe muscular contractions and convulsions. It is caused by a powerful toxin secreted by the bacterium Clostridium tetani. People become infected by this dangerous bacterium through skin wounds. It is fatal in 15% to 40% of cases. Since widespread vaccination began in the late 1940s, new cases of tetanus have dropped by more than 95%. Pertussis (whooping cough) Pertussis was a very common childhood illness throughout the first half of the 20th century. It is caused by the bacterium Bordetella pertussis, which spreads easily from person to person. Pertussis causes uncontrollable, violent coughing attacks that can last for several weeks or months. In infants, it can cause permanent health problems and even death. Because of the vaccine, cases of whooping cough in the U.S reached an all-time low of 1,010 in 1976. The incidence has risen in recent years, with over 40,000 cases reported in 2012, and over 20,000 cases reported in 2013. The increase has occurred because immunity from the vaccine wears off by adolescence. Therefore, more cases develop in adolescents and adults as well as in infants younger than 2 months, who cannot receive the vaccine. The Vaccines DTaP DTaP is the shortened name of the routine vaccine recommended for children through 6 years of age. DTaP is a combined vaccine made from inactivated (killed) bacteria or components that cause diphtheria, tetanus, and pertussis. Children should get 5 doses (shots) of the vaccine. One dose should be received at the following ages: 2 months 4 months 6 months 15 to 18 months 4 to 6 years DTaP can be given as an injection (shot) by itself, or it can be combined with other vaccines: DTaP-Hib-IPV DTaP-HepB-IPV DTaP-IPV The advantage of a combined vaccine is that there are fewer shots. A health care provider can tell you if a combination vaccine is right for your child. Tdap and Td Because immunity to diphtheria, tetanus, and pertussis wears off, booster vaccinations are needed. Tdap and Td are used as booster vaccines: DTaP vaccine starts to wear off after about 5 years. Tdap booster is then given. Protection against diphtheria and tetanus lasts about 10 years. At that point the Td booster is given. The Td vaccine contains the standard dose against tetanus and a less potent one against diphtheria. It does not contain the pertussis component. Persons who should receive the Tdap or Td vaccines include: Children, 7 through 10 years old, who did not get any or all 5 DTaP vaccine shots (doses) between ages 2 and 6, need one shot of Tdap. If additional shots are needed, Td vaccine is given. Children, 11 through 12 years old need one of Tdap as a booster if they received all 5 DTaP shots when younger. The Td booster is then given every 10 years. All adults, 19 years and older, need a booster shot of Td every 10 years. All adults, especially 65 years and older, who have never had Tdap should get one dose as their next booster. Pregnant women need one shot of Tdap during 27 to 36 weeks of each pregnancy. This vaccination is to protect the mother from getting the infections, especially pertussis, and spreading the germs to her newborn. (Babies younger than 2 months cannot get the DTaP vaccine because it is not safe for them.) Children and adults who have a severe cut or burn may need Td or Tdap to protect against tetanus infection. Who Should Not Get the Diphtheria, Tetanus, Pertussis Vaccines? People who received a dose (shot) of any vaccine that has tetanus, diphtheria, or pertussis in it and developed an allergic reaction to the vaccine. People who went into a coma or developed seizures within 1 week of getting a dose of DTaP or the older vaccine called DTP should not receive Tdap. These persons may be able to receive Td. People who have nervous system problems, such as epilepsy, should ask their health care providers about receiving any diphtheria, tetanus, pertussis vaccines. People who have Guillain-Barre syndrome should ask their health care providers about receiving any diphtheria, tetanus, pertussis vaccines. People who are ill with something more severe than a cold or have a fever should reschedule their vaccinations for after they have recovered. Side Effects of Diphtheria, Tetanus, Pertussis Vaccines Common side effects include: Pain and swelling at the injection site Mild fever Irritability in children Severe side effects include allergic reaction. Measles, Mumps, and Rubella Measles Measles is one of the most contagious human infections. It is caused by a virus. Measles used to be a very common childhood disease. Most cases resolve without serious complications. Symptoms include fever, cough, runny nose, and rash that covers the whole body. In severe cases, measles can cause pneumonia, encephalitis (inflammation in the brain), or death. Risk of these severe complications is highest in the very young and very old. In pregnant women, measles increases the rates of miscarriage, low birth weight, and birth defects. Vaccination programs have reduced the incidence of measles in the U.S. But measles outbreaks still occur, usually among groups of people who do not believe in immunizations or in areas where immunization levels have decreased. Out of the 118 measles cases reported in the USA in 2011, 89% occurred in unvaccinated individuals. Mumps Mumps is caused by a virus. The infection may cause no symptoms. If symptoms occur, they include fever, headache, sore throat, and painful swelling of one or both salivary glands (located between the ear and jaw). In some cases, mumps affects the lining of the brain and spinal cord, although this is usually not permanently harmful. Swelling of the testicles occurs in some males who have reached puberty, although sterility is rare. Deafness in one ear occurs very rarely. Rubella is caused by a virus. The infection leads to a mild illness that includes a rash, enlarged lymph nodes, and sometimes a fever. If a pregnant woman is infected during her first trimester, her baby has an 80% chance of developing birth defects, including heart abnormalities, cataracts, deafness, and learning disabilities. Vaccination programs have dramatically reduced the number of mumps and rubella cases in the U.S. Some adults are still susceptible, particularly immigrants who were not vaccinated in their birth countries. The Vaccines MMR The measles, mumps, rubella vaccine is called MMR for short. It is a routine vaccine recommended for children through 6 years old. MMR is a combined vaccine made from live but very weak viruses that cause the three diseases. Children should get 2 doses (shots) of the vaccine. One dose should be received at the following ages: 12 to 15 months old. To make sure the child is properly protected, the vaccine must not be given too early. 4 to 6 years old before starting school. But the shot can be given at any time after that. Adults born during or before 1956 are considered immune because they likely had the actual diseases during childhood. Adults -- 18 years old, or who were born after 1956 -- should get at least one shot of the MMR vaccine if: They have never received an MMR shot They are not sure whether or when they received an MMR shot They have never had any of the three diseases People who received inactivated types of measles or mumps vaccine in the 1960s or 1970s should be revaccinated with two doses of the live MMR vaccine. The American Academy of Pediatrics recommends the MMR vaccine for HIV-infected children, teenagers, and young adults, except for those who are severely immunocompromised. The vaccine appears to be safe in HIV-infected children. Measles infection is very dangerous in this population. Women that can get pregnant and who have not had the MMR vaccine in the past should have a blood test to see if they are immune. Being immune means they have had the three diseases or the vaccine in the past and are now protected. If they are not immune, they should receive the MMR vaccine. Women should not get this vaccine if they are pregnant or planning to become pregnant within 4 weeks. The vaccine may harm the baby. MMRV The MMRV combines the MMR vaccine with the chickenpox (varicella) vaccine into a single vaccine. One dose (shot) of MMRV is given to children at the following ages: 12 to 15 months 4 to 6 years The advantage of the MMRV vaccine is that the child gets one less shot. The disadvantage is a higher chance of developing a fever of 102°F (38.8°C) or higher and seizures than with getting the MMR and chickenpox vaccines separately. Talk with the health care provider about whether the MMRV vaccine is right for your child. The MMRV vaccine is not given to persons 13 years and older. Who Should Not Get the MMR and MMRV Vaccines? People who received a dose of MMR, MMRV, or the chickenpox vaccine (VAR) and developed an allergic reaction to it. People who are severely allergic to the antibiotic neomycin. Both the MMR and MMRV vaccines contain tiny amounts of neomycin. Pregnant women should not receive MMR. People 13 years and older cannot receive MMRV. Parents of children who have immune system problems, such as HIV/AIDS, or weakened immune systems should check with their health care providers before their children receive MMR or MMRV. People who are ill with something more severe than a cold or have a fever should reschedule their vaccination for after they have recovered. Side Effects of MMR and MMRV Vaccines Chickenpox Chickenpox is caused by the varicella-zoster virus. Chickenpox is one of the most contagious childhood diseases. Nearly every unvaccinated child becomes infected with it. Symptoms include itchy, fluid-filled blisters all over the body that burst and form crusts. The infection rarely causes complications in healthy children. In severe cases, though, children need to be hospitalized for treatment. This is a close-up picture of chickenpox. Early chickenpox lesions consist of small red papules that quickly fill with a yellowish or straw colored fluid to form small blisters (vesicles), as seen in this photograph. Later, these vesicles will rupture, forming shallow erosions that crust over and then ultimately heal. Chickenpox can be especially serious in adults and in persons with compromised immune systems. In people who had chickenpox as children, the virus stays quiet (dormant) in the nerves of the body for the rest of a person's life. When the virus becomes active, it causes areas of painful blisters. This condition is called shingles. The Vaccines VAR The chickenpox vaccine is called VAR for short. It is made from weakened chickenpox virus. After getting the vaccine, a person is protected from getting chickenpox. Or if a person does get chickenpox, the infection is usually mild. The vaccine can also prevent chickenpox or reduce its severity if it is used within 3 days, and possibly up to 5 days, after exposure to the infection. VariZIG, a varicella zoster immune globulin was approved in 2012 for high risk individuals exposed to the virus. High risk candidates include: Certain immunocompromised individuals Pregnant women without evidence of immunity Certain newborns and premature infants It is the only one of its kind available in the U.S. Ideally, it is administered within 4 days of exposure, but may be given within 10 days. Recommendations for Young Children VAR is a routine vaccine recommended for children through 6 years old. Children should get 2 doses (shots) of the vaccine. One dose should be received at the following ages: 12 to 15 months old. 4 to 6 years old before starting school. This second dose can be received before 4 years old, as long as it is 3 months after the first dose. It is also acceptable to get the second dose as soon as 4 weeks after the first dose. Recommendations for People 13 Years and Older: People who have not received the vaccine and have not had chickenpox should get 2 doses (shots). The second dose should come at least 4 weeks after the first dose. People who have had only 1 dose and have not had chickenpox should get a second dose. The second dose should come at least 4 weeks after the first dose. Healthy adults without a known history of chickenpox, and who have had a blood test that does not show immunity, should receive 2 doses of the vaccine, especially the following groups: Older people without a history of chickenpox and who are at high risk of exposure or transmission (such as hospital or day care workers and parents of young children) People who live or work in environments in which viral transmission is likely Non-pregnant women of childbearing age Adolescents and adults living in households with children International travelers MMRV MMRV combines the chickenpox vaccine with the measles, mumps, rubella (MMR) vaccine into a single vaccine. One dose (shot) of MMRV is given to children at the following ages: 12 to 15 months 4 to 6 years The advantage of the MMRV vaccine is that the child gets one less shot. The disadvantage is a higher chance of developing a fever of 102°F (38.8°C) or higher and seizures than with getting the MMR and chickenpox vaccines separately. Talk with your health care provider about whether the MMRV vaccine is right for your child. The MMRV vaccine is not given to persons 13 years and older. Who Should Not Get the Chickenpox Vaccines? Pregnant women, including the 3 months prior to pregnancy. (This applies to VAR. MMRV is not given to persons 13 years and older). Certain HIV infected individuals (CD4 counts < 200 cells/microliter). People whose immune systems are compromised by disease or medication (such as after organ transplant). People who are ill with something more severe than a cold or have a fever should reschedule their vaccination for after they have recovered. People who cannot be vaccinated, but are exposed to chickenpox, may receive immune globulin against the varicella virus. When received within 4 days of exposure, it may help reduce the symptoms of chickenpox. Side Effects of the Chickenpox Vaccines Common side effects at the injection site include: Pain Swelling Redness Sometimes a mild rash develops within a month of vaccination, which in very rare cases, may spread chickenpox to others. Persons who have recently been vaccinated should avoid close contact with anyone who might be susceptible to severe complications from chickenpox until the risk has passed. In-depth report on shingles and chickenpox (Var... Shingles Shingles is an infection caused by the varicella-zoster virus. This is the same virus that causes chickenpox. After a person gets chickenpox, the virus stays inactive (dormant) in the body. Years later, if the virus becomes active, it can cause shingles. Shingles is most common in adults over age 50. It causes a painful, red, and sometimes blistery rash to form on the body or face. Other symptoms include: Headache Fever Chills In rare cases, complications, such as pneumonia, blindness, and brain inflammation (encephalitis), can occur. In some persons, after the rash goes away, the intense pain persists. This pain is called post-herpetic neuralgia. The Vaccine The shingles vaccine is called Zoster for short. The vaccine can prevent shingles in half of adults over age 60. The vaccine is less effective the older a person is. A single dose (shot) of Zoster is recommended for most adults, age 60 or older, regardless of whether they have had shingles. Who Should Not Get the Shingles Vaccine? Anyone who has a weakened immune system due to HIV/AIDS or cancer of the lymph, bone, or blood, or due to treatments such as radiation or long-term corticosteroids. Women who are pregnant, or anyone who is in close contact with a pregnant woman who has not had chickenpox. People who are ill with something more severe than a cold or have a fever should reschedule their vaccination for after they have recovered. Side Effects of the Shingles Vaccine Common side effects at the injection site include: Mild redness Soreness Swelling Itching Some people experience headache. Hepatitis A Hepatitis A is a virus that causes liver inflammation. The virus is excreted in feces and spreads when a person eats food or drinks water contaminated by the virus. Eating shellfish taken from sewage-contaminated water is a common means of contracting hepatitis A. It can also be acquired by close contact with persons infected with the virus, such as in daycare centers. The Vaccines HepA The hepatitis A vaccine is called HepA for short. HepA is made from the inactivated virus. Children should get 2 shots (doses) of HepA between 12 and 23 months old. The two shots should be separated by 6 to 18 months. Children 2 through 18 years old should get the two doses of HepA if they live in an area where many people have hepatitis A infection. The vaccine can also be effective when given within 2 weeks of a known exposure. Adults, 19 years and older, should get the 2 doses of HepA if they: Work or travel in areas where hepatitis A is common. These areas include Africa, Asia (except Japan), the Mediterranean, Eastern Europe, the Middle East, Central and South America, Mexico, and parts of the Caribbean. Use illegal injectable drugs. Work with the hepatitis A virus in a laboratory or with research animals that are infected with the virus. Have chronic liver disease. Adopt children from a country where many people have hepatitis A. Are men who have sex with other men. Hepatitis A Inactivated and Hepatitis B (Recombinant) This vaccine combines the hepatitis A and hepatitis B vaccines into a single vaccine. The brand name of this vaccine is TWINRIX. It can be given to children starting at 1 year old. It can also be given to teens and adults. Depending on age and need, it is given in 3 or 4 shots (doses), with each shot separated by a certain period of time. Who Should Not Get the Hepatitis A Vaccines? People who have had hepatitis A infection do not need the vaccine because they are immune for life. People who received a dose of the vaccine and developed an allergic reaction to it. Pregnant women should ask their health care provider if the vaccine is safe for them. People who are allergic to neomycin should not receive TWINRIX, which contains a tiny amount of neomycin. People who are ill with something more severe than a cold or have a fever should reschedule their vaccination for after they have recovered. Side Effects of the Hepatitis A Vaccines Hepatitis B Hepatitis B is a serious disease that causes life-threatening liver damage. Worldwide about 350 million people are infected with the hepatitis B virus. Each year 620,000 people die, mostly due to cirrhosis and liver cancer caused by chronic hepatitis B infection. In the U.S., about 800,000 to 1.4 million people have chronic hepatitis B. Hepatitis B is also known as serum hepatitis. It spreads through blood and sexual contact. The infection is seen with increased frequency among intravenous drug users who share needles and among the homosexual population. The photo above is an electron microscopy image of hepatitis B virus particles. (Courtesy of the CDC.) Hepatitis B spreads through blood and sexual contact. People at high risk of the disease include: Injection drug users Persons who have sex with someone who has hepatitis B Persons who live with someone who has hepatitis B Pregnant women with hepatitis B can transmit the virus to their babies. Even if they are not infected at birth, unvaccinated children of infected mothers can get hepatitis B. Hepatitis B infections have been greatly reduced since routine childhood immunization began in the early 1990s. But there are still children who are not immunized, and the disease persists. Routine vaccination against this disease during childhood is very important. The Vaccines HepB The hepatitis B vaccine is called HepB for short. HepB is made from the inactivated virus. HepB is a routine vaccine recommended for infants through 18 months old. Three doses (shots) of HepB should be received at the following ages: Soon after birth and before hospital discharge 1 to 2 months old 6 to 18 months old Infants of mothers infected with hepatitis B should be treated with immune globulin plus HepB within 12 hours of birth. The second dose of HepB should be received at 1 to 2 months old. The third dose of HepB at 6 months old. Infants born to infected mothers should be tested for antibody status at 9 to 18 months to see if they are chronic virus carriers or need to be revaccinated. When it is not known if a mother is infected, the infant should receive the vaccine within 12 hours of birth. The mother's blood should then be tested right away. If she is infected, the infant should receive immune globulin within 1 week of birth. Hepatitis B Vaccine for Adults HepB is received in 3 doses (shots) over 6 months. The following adults are at high risk and should be vaccinated: Health care and public safety workers who may be exposed to blood products People in the same household as someone infected with hepatitis B Travelers to countries with a high incidence of hepatitis B infection Sexually active individuals with multiple partners People with any sexually transmitted diseases Patients with diabetes, under 60 years of age, or older diabetic patients who use glucose monitoring devices or have other risk factors Other people at risk who would benefit from vaccination include: Patients and workers in mental institutions Morticians Patients undergoing kidney dialysis People who use injected drugs Pregnant women at risk of the virus (there is no evidence that the vaccine is dangerous to the fetus) This vaccine combines the hepatitis B and hepatitis A vaccines into a single vaccine. The brand name of this vaccine is TWINRIX. It can be given to children starting at 1 year old. It can also be given to teens and adults. Depending on need, it is given in 2, 3, or 4 shots (doses), with each shot separated by a certain period of time. Your health care provider can tell you if this vaccine is right for your child or you. DTaP-HepB-IPV This vaccine combines HepB with two other vaccines: diphtheria, tetanus, pertussis (DTaP) and polio (IPV). It is for children 6 weeks through 6 years of age. Three doses (shots) are recommended at 2, 4, and 6 months of age. The advantage of this vaccine is that it reduces the number of injections a child has to receive. Talk with the health care provider about whether the DTaP-HepB-IPV vaccine is right for your child. Who Should Not Get the Hepatitis B Vaccines? People who are allergic to yeast. People who received a dose of the vaccine and developed an allergic reaction to the vaccine. People who are allergic to the antibiotics neomycin and polymyxin B should not receive TWINRIX or DTaP-HepB-IPV. The vaccines contain tiny amounts of these antibiotics. Children who have progressive neurologic problems, such as uncontrolled epilepsy, should not receive the DTaP-HepB-IPV until the problem is stabilized. People who are ill with something more severe than a cold or have a fever should reschedule their vaccination for after they have recovered. Side Effects of Hepatitis B Vaccines The most common side effects are fever or soreness at the injection site. The most serious side effect is an allergic reaction. In-depth report on hepatitis Pneumococcal Disease Pneumococcal disease is caused by the pneumococcus bacterium, Streptococcus pneumoniae (S pneumoniae). Different types of pneumococcal disease include respiratory infections, blood infections, ear infections, and meningitis. The most common type of severe pneumococcal disease is pneumonia. People at highest risk of pneumococcal disease are: Children younger than 5 years old The elderly Those who have chronic health problems such as diabetes mellitus, heart disease, or lung disease This photo shows the organism pneumococci. These bacteria are usually paired (diplococci) or appear in chains. Pneumococci are typically associated with pneumonia, but may cause infection in other organs, such as the brain (pneumococcal meningitis) and bloodstream (pneumococcal septicemia). (Courtesy of the CDC.) The Vaccines PCV13 The pneumococcal conjugate vaccine protects against 13 of the most severe types (strains) of the over 90 strains of S pneumoniae. For this reason, this vaccine is called PCV13 for short. These 13 strains affect mainly children and about half of adults who get pneumococcal disease. PCV13 is made with components of the 13 S pneumoniae strains. PCV13 is one of the recommended childhood immunizations. Children should get 4 doses (shots) of PCV13. One dose should be received at: 2 months old 4 months old 6 months old 12 to 15 months old One dose of PCV13 and one dose of PPSV23 may be given to older children or adults with weakened immune systems due to health conditions such as HIV or kidney and spleen problems. People with cochlear implants may also need the vaccines. The pneumococcal polysaccharide vaccine is called PPSV23 for short. It protects against the 23 strains of S pneumoniae that cause the most severe infections. PPSV23 is made from components from 23 S pneumoniae bacteria strains without extra protein. PPSV23 is not fully effective in persons who are very old or have chronic health problems. PPSV23 is recommended for the following older children and adults: Anyone older than 2 years of age with heart disease; lung disease (including asthma); kidney disease; people on dialysis; alcoholics; those who have leaks of cerebrospinal fluid; or people with diabetes, cirrhosis, or cochlear implants. All people over 65 years old. People over 65 who received a dose of PPSV23 before they were 65 should receive a second dose after they turn 65. Adults, aged 19 through 64 who have asthma or smoke should receive a single dose of PPSV23. Those with sickle cell disease. Those with a dysfunctional spleen and those who have had their spleens removed. A second dose should be received 5 years or more after the first dose. People with conditions that weaken the immune system, such as leukemia or other cancers, HIV infection, or organ transplantation. People who receive chronic (long-term) immunosuppressive medications, including steroids. Individuals with immune deficiencies or those undergoing treatments that suppress the immune system. A second dose should be received 5 years or more after the first dose. Patients with autoimmune diseases, such as rheumatoid arthritis and lupus, although protection may not be as strong for these patients. Older people who have had transplant operations or those with kidney disease may require a revaccination after 5 years. People living in long-term care facilities. Alaska Natives or Native Americans over age 65 who live in areas where pneumococcal disease is common. In certain communities, people 50 through 64 years old or younger may need the vaccine. Your health care provider can tell you about the timing of the PCV13 and PPSV23 vaccines. Who Should Not Get the Pneumococcal Vaccines? People who received a dose of the vaccine and developed an allergic reaction to it. People who had an allergic reaction to an older pneumococcal vaccine called PCV7, or from any diphtheria vaccine (DTaP, Tdap, or Td) should not receive PCV13. Pregnant women should ask their health care providers if the vaccine is safe for them. People who are ill with something more severe than a cold or have a fever should reschedule their vaccinations for after they have recovered. Side Effects of the Pneumococcal Vaccines Common side effects include: Mild pain and redness at the injection site Joint aches Fever Children are more likely to have fever within 48 hours if they receive other vaccines at the same time, and also after the second dose. Poliomyelitis Poliomyelitis is commonly known as polio. The disease is caused a virus called poliovirus and can lead to paralyzing nerve damage, which can be fatal. Polio was a major killer of children in the early 20th century. Vaccination programs have eliminated the disease in most parts of the world. But cases still occur in certain parts of Asia and Africa. Vaccination is still recommended because there is still a risk of acquiring polio through international travel. Poliomyelitis is a communicable disease caused by viral infection and occurs through direct contact with infected secretions. Polio is found worldwide, but immunization has reduced the incidence. Clinical polio affects the central nervous system (brain and spinal cord). Disability is more common than death. The Vaccines IPV The polio vaccine is made from inactivated poliovirus. For this reason the vaccine is called IPV for short. IPV is given as an injection. The oral polio vaccine is no longer used in the U.S. Polio vaccine is one of the recommended childhood immunizations. Children should get 1 dose (shot) of IPV at: 2 months old 4 months old 6 to 18 months old 4 to 6 years old Children who have received 3 doses of the IPV before age 4 should get a fourth dose before or at the time they start school. The fourth dose is not needed if the third dose is received after age 4. Combination Vaccines The polio vaccine can be given as a shot by itself. Or it can be combined with another vaccine: DTaP-Hib-IPV DTaP-HepB-IPV DTaP-IPV The advantage of a combined vaccines is that there are fewer shots. The health care provider can tell you if the combined vaccine is right for your child. Who Should Not Get the Polio Vaccines? The polio vaccine is not usually recommended for people over 18. Exceptions are unvaccinated health care workers, laboratory technicians, or others who may be exposed to the virus. People who received a dose of the vaccine and developed an allergy to it. People who are allergic to the antibiotics neomycin, streptomycin, or polymyxin B. The vaccine contains tiny amounts of these antibiotics. Children who have progressive neurologic problems, such as uncontrolled epilepsy, should not receive any of the combined vaccines until the problem is stabilized. People who are ill with something more severe than a cold or have a fever should reschedule their vaccinations for after they have recovered. Side Effects of the Polio Vaccines The most common side effects are soreness at the injection site or fever. Serious side effects may include an allergic reaction. Influenza Influenza is also known as the flu. It is caused by the influenza virus. The virus spreads easily from person to person. The flu causes a sore throat, fever and chills, headache, muscle ache, cough, and fatigue. Influenza is responsible for over 200,000 hospitalizations a year in the U.S. and results in thousands of deaths. Pneumonia is the major serious complication of the flu. It nearly always occurs in high-risk persons such as the very young or very old and pregnant women. People who are hospitalized or whose immune systems are weakened are also at high risk of complications. Type A is the most widespread. It can affect both animals and humans. In humans, it can cause severe illness. Influenza A is the cause of all the worldwide outbreaks (pandemics) of the flu. In recent years, subtypes of influenza A that were only known to infect animals, such as the avian (bird) flu viruses, have begun to infect humans. The new subtype A virus, 2009 H1N1, which was discovered in 2009, causes severe illness. Type B infects only humans. Young children are mostly affected by type B. Flu caused by this strain tends to be milder than that caused by Influenza A. Type C also infects humans. Like type B, it mainly affects young children and the illness is mild. The flu vaccine is recommended for everyone 6 months and older. However, it is most; important for people at increased risk for complications from influenza infection, and for people who care for them. This includes: In-depth report on colds and the flu The Vaccines The flu viruses are constantly changing their make-up. Scientists develop new vaccines each year to protect against the new flu strains that are expected to strike. The ability of the virus to change rapidly is why people need to receive a new vaccine each year. People should get vaccinated each year before flu season starts. This is usually in September or October. One dose of the vaccine is needed. Children, 2 through 8 years old, who are getting a flu vaccine for the first time need 2 doses. The vaccine can be received as an injection (shot) or as a nasal spray. The injection can be delivered under the skin (intradermal) or into the muscle (intramuscular). Injection The flu shot contains killed (inactive) viruses. It is not possible to get the flu from this type of vaccine. The regular flu shot is approved for persons 6 months and older. This shot is injected into the upper arm muscle in adults and into the thigh muscle in babies and toddlers. A high-dose version of the flu shot, called Fluzone High Dose, can be received by people 65 and older. As people age, their immune systems gets weaker. The high-dose vaccine is designed to produce a stronger immune response to the flu virus. Because this flu shot is new, it is not known if it is better at protecting from the flu than the regular vaccine. An intradermal flu shot, called Fluzone Intradermal, can be received by people 18 through 64 years old. The intradermal shot is injected under the skin. It uses a smaller and shorter needle. (The regular shot is injected into the muscle.) The intradermal shot also uses fewer antigens (inactive viruses). But it still protects against the flu like the regular shot. Flucelvax and Flublok are 2 new flu vaccines that are cell-based. This means the flu viruses in the vaccines are grown using cell culture technology instead of chicken eggs, which are used in the regular flu vaccine. Cell-based vaccines are made faster than traditional egg-based vaccines. Flucelvax can be received by persons 18 years and older. Flublok can be received by people 18 through 49 years of age. Currently, there is no safety information about the two vaccines for pregnant or nursing women. Your health care provider can tell you if either vaccine is right for you. Nasal Spray The Nasal spray flu vaccine is made from live, weakened viruses. It is approved for healthy people ages 2 through 49, who are not pregnant. There is no data that suggests the live virus in the nasal spray is any more effective. Who Should Not Get the Flu Vaccines? People who are severely ill or have a fever should reschedule their flu vaccinations for after they have recovered. Injection People who should not get the regular vaccine include: Children younger than 6 months old. People who are severely allergic to eggs. People who have had a severe allergic reaction to the regular flu shot in the past. People who developed Guillain-Barre syndrome after getting the flu vaccine in the past. The intradermal vaccine cannot be received by people younger than 18 or older than 64. The high-dose vaccine should not be received by people younger than 65 years old. Flucelvax and Flublok People who should not get Flucelvax or Flublok include: People who developed Guillain-Barre syndrome after getting any flu vaccine in the past. People who are allergic to any component in the vaccines. Flucelvax cannot be received by children younger than 18 years old, or who are allergic to rubber latex. Flublok cannot be received by persons younger than 18 or older than 64. Nasal Spray People who should not get the nasal spray include: Children 23 months old or younger, or adults 50 years and older. People who are severely allergic to eggs. People who have had a severe allergic reaction to the nasal vaccine in the past. Pregnant women. People who have asthma and children 4 years and younger who have had at least one episode of wheezing in the past year. People who have a nasal condition that makes it hard to breathe, such as a stuffy nose. People who have a weakened immune system. Children who take aspirin under a doctor's direction (most children should not take aspirin). Side Effects of the Flu Vaccines Possible side effects of the flu vaccines include: Allergic reaction to components in the vaccines, especially the egg-based vaccine. Flu-like symptoms. Some people actually experience flu-like symptoms, called oculorespiratory syndrome, which include conjunctivitis, coughing, wheezing, tightness in the chest, sore throat, or a combination. Such symptoms tend to occur 2 to 24 hours after the vaccination and generally last for up to 2 days. These symptoms are not the flu itself, but an immune response to the virus proteins in the vaccine. Guillain-Barre syndrome. This paralytic illness occurs in very rare cases. Haemophilus influenzae Type B Haemophilus influenzae (H influenzae) type b is a bacterium that commonly caused childhood bacterial meningitis, pneumonia, blood infection, and epiglottitis (throat swelling that can block breathing). Despite its name, this bacterium is entirely different from the viruses that cause influenza (the flu). Prior to the vaccine, about 600 children died every year in the U.S. Because of routine vaccination, serious Hib disease in children is now rare. The photo above is a Gram stain of spinal fluid from a person with meningitis. The rod-like organisms seen in the fluid are Haemophilus influenza, one of the most common causes of childhood meningitis (prior to the widespread use of the H. influenza vaccine). The large red-colored objects are cells in the spinal fluid. A vaccine to prevent infection by Haemophilus influenza type B is available as one of the routine childhood immunizations (Hib), typically given at 2, 4, and 12 months. The Vaccines Hib vaccine is highly effective in protecting against Hib disease. It is a routine vaccine recommended for children through 15 months old. Two vaccine brands are available. Depending on which vaccine is received, 3 or 4 doses (shots) are received. Hib can be given as a shot by itself, or it can be combined with another vaccine: DTaP-Hib-IPV HepB-Hib Your health care provider can tell you whether the combined vaccine is right for your child. Adults with certain health problems, such as sickle cell disease, or conditions affecting the spleen, should have the Hib vaccine if they have not already been vaccinated. Hematopoietic stem cell transplant recipients should also receive a 3-dose regimen 6 to 12 months after transplantation, regardless of vaccination history. Who Should Not Get the Hib Vaccines? People who received a dose of the vaccine and developed an allergic reaction from it. People who are ill with something more severe than a cold or have a fever should reschedule their vaccinations for after they have recovered. Hib vaccines are no longer recommended for persons with HIV. Certain children aged aged 5 to 18 years who have never been vaccinated and are at high risk. Side Effects of the Hib Vaccines Side effects of the Hib vaccines include: Redness and pain at the injection site Moderate fever Weakness (rare) Nausea (rare) Dizziness (rare) Human Papillomavirus (HPV) HPV is actually a group of 100 viruses, about 40 of which are sexually transmitted. Some HPV strains can cause genital warts, cervical cancer, and cancers of the vulva, vagina, anus, and penis. HPV infection is very common. About 20 million people in the U.S. have it. At least half of all sexually active men and women will eventually be exposed to the virus. The Vaccines Two vaccines are available for preventing infections due to the most dangerous types of HPV. Both vaccines are made from inactivated human papillomaviruses. The vaccines protect against HPV strains 16 and 18, which account for 70% of cervical cancer cases in the United States. HPV4 HPV4 is also known by its brand name, Gardasil. The vaccine protects against 4 types (strains) of HPV (HPV 6, 11, 16, 18). For this reason, the vaccine is called HPV4 for short. The vaccine is recommended for: Females, ages 9 through 26: It is not effective in women who were exposed to these strains before being vaccinated. The vaccine also protects against most HPV strains that cause genital warts. Males, 9 through 26: The vaccine protects against most HPV strains that cause genital warts and can lead to cancer of the penis and anus. The vaccine also decreases HPV transmission to women. HPV9 HPV9 is also known by its brand name Gardasil-9. The vaccine protects against 9 types (strains) of HPV It is recommended for both males and females. It is routinely given at 11 or 12 years of age, but it may be given beginning at age 9 years through age 26 years. Three doses of Gardasil-9 are recommended with the second dose given 1 to 2 months after the first dose and the third dose given 6 months after the first dose. HPV2 HPV2 is also known by its brand name, Cervarix. It protects against HPV 16 and 18, the two strains that cause most cervical cancer cases. For this reason, the vaccine is called HPV2 for short. It does not prevent genital warts. HPV2 is only recommended for females, 9 through 26 years old. Current Immunization Guidelines Recommend Girls ages 11 and 12 should receive the HPV vaccine series: The vaccine is given in three shots over a 6-month period. The second and third shots are given 2 and 6 months after the first shot. One brand of vaccine can be substituted for another in the 3-dose series. The HPV vaccine can be given at the same time as other vaccines. Girls as young as age 9 can receive the vaccine if their health care provider recommends it, such as children who have been abuse. Girls and women ages 13 to 26: Those who have not received the HPV vaccine in the past should get a series of three shots. Those who have not completed the full vaccine series should catch up on missed shots. Pregnant women should not receive this vaccine. However, there have been no problems found in women who received the vaccine during pregnancy, before they knew they were pregnant Boys ages 11 to 12 should receive the HPV4 (Gardasil) vaccine series: To reduce the chance of becoming infected with genital and anal warts. The vaccine also reduces the risk of cancer of the penis and anus. The vaccine is given in three shots over a 6-month period. The second and third shots are given 2 and 6 months after the first shot. Boys as young as age 9 can receive the vaccine if their provider recommends it. Boys and men ages 13 to 21: Those who have not received the vaccine in the past should get a series of three shots. Those who have not completed the full vaccine series should catch up on missed shots. Men ages 22 to 26: Those who have not received the vaccine in the past may still get the series of three shots. Talk to your provider. Those who have not finished the full vaccine series may catch up on missed shots. Talk to your provider. You should get the vaccine if you have sex with men. You should get the vaccine if your immune system is weak due to HIV, other conditions, or medication. Who Should Not Get the HPV Vaccines? People who received a dose of the vaccine and had an allergic reaction to it. Pregnant women. HPV2 (Cervarix) vaccine is not for males. People who are ill with something more severe than a cold or have a fever should reschedule their vaccinations for after they have recovered. Side Effects The most common side effect of either vaccine is soreness at the injection site. Meningococcal Disease Meningococcal disease is caused by the meningococcal bacterium, Neisseria meningitides (N. meningitides). The major, life-threatening meningococcal diseases are meningitis (infection of the lining of the brain and spinal cord) and septicemia (blood infection). Meningococcus is spread when someone comes into contact with the respiratory and throat secretions of an infected person, such as through coughing or kissing. Although just over 1,000 people a year get meningococcal disease in the U.S., 10 to 15% of these people die. Of the people who survive, 11 to 19% have permanent health problems such as deafness and other nervous system problems. People at highest risk of meningococcal disease include: Infants and children younger than 4 years of age Adolescents and young adults College freshmen living in dorms Children and adults who have certain medical problems, including weakened immune systems Children and adults who do not have normal spleen function Military recruits Researchers who work with N. meningitides. People who travel to areas of the world where there are high rates of meningococcal infection The Vaccines MCV4 The meningococcal conjugate vaccine is called MCV4 for short because it protects against 4 types (strains) of N. meningitides. The vaccine is made from portions of N. meningitides bacteria. MCV4 is a routine vaccine recommended for adolescents, 11 through 18 years old. High risk children may be vaccinated at age 10. One dose (shot) should be received at: 11 to 12 years old 16 years old (booster) One or more doses of the vaccine are also recommended in certain high risk children and adults, ages 9 months to 55 years old. MPSV4 Another meningococcal vaccine, called Menomune, is a polysaccharide vaccine. It is the only meningococcal vaccine for people over 55. Who Should Not Get the Meningococcal Vaccines? People who received the vaccine and had allergic reactions to it. People who are ill with something more severe than a cold or have a fever should reschedule their vaccinations for after they have recovered. Side Effects The most common side effect is soreness at the injection site or mild fever. Rotavirus Rotavirus is a virus that is the most common cause of diarrhea, cramps, and vomiting in infants and toddlers worldwide. The virus is spread from person to person. Before the vaccine was developed, as many as 80% of young children in the U.S. came down with symptoms of rotavirus disease. Tens of thousands of children were hospitalized and 20 to 60 children died of the disease each year. The Vaccine The rotavirus vaccine is made from weakened, live rotavirus. It is an oral vaccine. Rotavirus vaccine is one of the recommended childhood immunizations. Depending on the vaccine brand, 2 or 3 doses are received. One dose is received at: 2 months old 4 months old 6 months old (if needed) Who Should Not Get the Rotavirus Vaccine? Babies with the following conditions should not receive the vaccine: Received a dose of the vaccine and had an allergic reaction to it Have a severe allergy to latex Have an immune system problem Have had blocked intestine (intussusception) Babies who are severely ill, have a fever, or diarrhea or vomiting, should have their vaccinations rescheduled for after they have recovered. Side Effects of the Rotavirus Vaccine Mild side effects that go away quickly include: Irritability Diarrhea Vomiting Serious side effects may include blocked intestine (rare). Other Vaccines Many other vaccines are available, including vaccines for: Adenovirus Anthrax Cholera Japanese encephalitis Rabies Smallpox Tuberculosis Typhoid fever Yellow fever These vaccines are not routinely given to the general population, only to people who are at risk of exposure to the specific germ. For more information about these vaccines, visit the CDC website at: www.cdc.gov/vaccines/vpd/vaccines-diseases.html. Vaccines for Travelers to Developing Countries People who are traveling to countries where certain infectious diseases are common should seek consultation in a travel clinic or check with the Centers for Disease Control and Prevention (www.cdc.gov/travel) for up-to-date information on immunization requirements for their destinations. All travelers should be up-to-date on any recommended vaccinations for childhood diseases, regardless of age. Booster shots may be required for travelers even if they have completed their initial series. Some countries require vaccinations against specific diseases such as yellow fever, meningitis, typhoid, cholera, Japanese encephalitis, and rabies under certain circumstances.
{ "pile_set_name": "Pile-CC" }
Missing Melbourne woman Katie Dircks has been found alive in Tasmania, police say. The 30-year playwright and Melbourne Theatre Company employee had been last seen on Friday night leaving work in South Melbourne. Friends and family had flooded social media with pleas for help to find Ms Dircks over the weekend when she did not arrive home. In a short statement Monday evening Victorian police said: "Elwood woman Katie Dircks has been located safe and well this afternoon. Investigators would like to thank members of the public and the media for their assistance."
{ "pile_set_name": "OpenWebText2" }
Sergio Reina Sergio Mauricio Reyna Piedrahita (born January 26, 1985 in Cali) is a Colombian football defender, lastly playing for Club Blooming in the Bolivian first division and currently a free agent. Career In January 2010 Zaglebie Lubin signed the centre-back from Peruvian club Inti Gas Deportes. 14.01.2013 he joined Patriotas F.C. References External links www.eurosport.com/football/sergio-reina_prs232771/person.shtml Category:1985 births Category:Living people Category:Sportspeople from Cali Category:Association football defenders Category:Colombian footballers Category:América de Cali footballers Category:Atlético F.C. footballers Category:C.S. Cartaginés players Category:Patriotas Boyacá footballers Category:Ayacucho FC footballers Category:Zagłębie Lubin players Category:Ekstraklasa players Category:Club Blooming players Category:Colombian expatriate footballers Category:Expatriate footballers in Costa Rica Category:Expatriate footballers in Peru Category:Expatriate footballers in Poland Category:Colombian expatriate sportspeople in Poland Category:Expatriate footballers in Bolivia
{ "pile_set_name": "Wikipedia (en)" }
Q: Is this eval() in python safe? consider this code: from re import sub input = request.POST['input'] sub_pattern = {'1':"sub('pattern1','txt1',input)", '2':"sub('pattern2','txt2',input)", } eval(sub_pattern['1']) is there code-injection in this code? can you provide POC on this code injection? A: Since the strings passed to eval are constant, with nothing substituted into them, this code is safe. However, it's also a pointless deviation from best practices: There's no legitimate reason to use eval here at all. Assuming that you want to be able to do operations other than re.sub(), one approach is to use lambdas: from re import sub input = request.POST['input'] sub_pattern = {'1': lambda input: sub('pattern1','txt1',input), '2': lambda input: sub('pattern2','txt2',input)} sub_pattern['1'](input)
{ "pile_set_name": "StackExchange" }
1. Introduction {#sec1} =============== Biologic agents are increasingly used as disease-modifying antirheumatic drugs (DMARDS) because of their ability to slow down progression of the disease. However, their use can lead to increased susceptibility to tuberculosis. Tuberculosis treatment, in turn, typically involves elimination of immunosuppression by these biologic agents. Rapid changes in the immune system can lead to a heightened and generalized inflammatory response, usually referred to as immune reconstitution inflammatory syndrome. 2. Case Presentation {#sec2} ==================== A 41-year-old male, a recent immigrant, presented to the emergency room with swelling and pain in his neck and left arm. He had a history of rheumatoid arthritis and started treatment with infliximab, methotrexate, and high dose prednisone one year prior to admission. Six weeks prior to admission, he developed night sweats and weight loss, which was diagnosed as miliary tuberculosis by CT imaging and positive sputum culture. His tuberculosis was treated with rifampin, pyrazinamide, isoniazid, and ethambutol. His anti-TNF and steroid therapy were discontinued and replaced with hydroxychloroquine and sulfasalazine. The day before his admission, the patient noticed swelling and pain in his left neck and mild dyspnea. The swelling progressed down his entire arm over the course of the day. The patient was a lifelong nonsmoker and had no prior history of deep vein thrombosis (DVT). On physical examination, he had a BMI of 24 and was afebrile but tachycardic to 130. He had cervical and supraclavicular lymphadenopathy. His entire left arm was erythematous, swollen, and tender to palpation. Range of motion of that extremity was reduced secondary to pain. CT of neck revealed a thrombus within the left axillary and left subclavian veins extending to the proximal left brachiocephalic vein, in addition to enlarged right and left supraclavicular lymph nodes, without obvious vascular compression ([Figure 1](#fig1){ref-type="fig"}). CT angiography of chest showed pulmonary emboli involving the right lower lobe in addition to previously noted nodular opacities of miliary tuberculosis ([Figure 2](#fig2){ref-type="fig"}). His hemogram was significant for normocytic anemia and neutrophilia. Electrolytes, renal and liver function tests, hepatitis panels, and blood cultures were normal and his acid-fast smear was now negative. His coagulation profile was normal except for an elevated D-dimer of greater than 1000 ng/mL. An extensive work-up for thrombophilia was unremarkable with normal lupus anticoagulant, silicone-clotting test, Factor V Leiden, prothrombin 20210, Cardiolipin IgG, IgM 5, and beta-2 glycoprotein. The patient was treated with enoxaparin and his swelling and dyspnea subsided. A warfarin regimen was attempted at 5 mg, but his INR remained 1.2. The patient was subsequently discharged being on rivaroxaban, prednisone 20 mg, and trimethoprim-sulfonamide prophylaxis, in addition to his antituberculosis regimen. 3. Discussion {#sec3} ============= It is well known that disease-modifying antirheumatics, such as infliximab, significantly increase the risk of tuberculosis \[[@B1]\]. Patients receiving interferon and adalimumab are more at risk compared to those receiving etanercept \[[@B2]\]. Recent reports indicate cumulative incidence rates as high as 499/100,000 in rheumatoid arthritis and 287/100,000 in inflammatory bowel disease \[[@B3]\]. Thus, both active and latent tuberculosis are contraindications to the use of anti-TNF-alpha drugs, and candidates for infliximab therapy are screened with a tuberculin skin test, which, for this group, is positive if it is greater than 6 mm \[[@B4]\]. However, these patients are often on anti-inflammatory medication such as steroids and thus are more likely to have negative tuberculin skin tests \[[@B5]\]. Immune reconstitution inflammatory syndrome (IRIS) has been well described in HIV-positive patients upon initiation of antiretroviral therapy \[[@B6]\]. IRIS has also been reported in patients on infliximab who develop tuberculosis \[[@B7], [@B8]\]. There is a five-to-sixteen-week period between cessation of infliximab treatment and onset of symptoms, such as progression of lymph node swelling, infiltrates, or pleural effusion \[[@B9]\]. To our knowledge, however, the development of pulmonary thromboembolic disease has never been described in the setting of IRIS specifically occurring as a consequence of discontinuation of anti-TNF therapy. We speculate that this complication was the result of concurrent biomechanical and biochemical factors as delineated below. Virchow\'s triad has been used to explain the association of lower extremity DVT with TB in multiple reports \[[@B10]\]. In our case, lymph node enlargement could have mechanically contributed to this unusual case of upper extremity DVT, presumably with impeding the flow in the adjacent veins at least in certain positions. Cervical lymphadenopathy is the most common lymphadenopathy in TB \[[@B11]\], but any lymphatic chain, including the supraclavicular lymph nodes, can easily be involved in the setting of generalized inflammatory resurgence as part of immune reconstitution as in this case. Both RA and TB could have presumably contributed to a hypercoagulable state in this patient. Early in tuberculosis, procoagulants such as fibrin degradation products (FDP) and tissue plasminogen activator (t-PA) are increased \[[@B12]\]. Although their levels normalize over the course of 12 weeks of treatment, they can still be susceptible to DVT \[[@B12]\]. In a review of autopsies in 1948, Zahn and Peirce found that 1.5% of tuberculosis subjects had DVT and less than 0.1% had pulmonary embolism as the cause of death \[[@B13]\]. In a 2013 review of 30 subjects who had DVT after receiving antituberculosis therapy, Kouismi et al. documented 5 cases of pulmonary tuberculosis that resulted in pulmonary embolism \[[@B10]\]. While pulmonary embolism is a rare complication of tuberculosis, rheumatoid arthritis is also an autoinflammatory disorder associated with endothelial dysfunction through the rise in immune mediators and cytokines and can have similar thromboembolic complications \[[@B14]\]. Overall, in our patient, the reduction in RA treatment and initiation of antituberculous treatment could have conceivably created an immune reconstitution inflammatory syndrome leading to a procoagulant milieu. To our knowledge, this is the first report of a pulmonary thromboembolic manifestation of immune reconstitution inflammatory syndrome as a result of withdrawal of infliximab treatment following miliary tuberculosis. Conflict of Interests ===================== The authors declare that there is no conflict of interests regarding the publication of this paper. ![CT angiography showing (a) thrombus (arrow) in the left subclavian vein extending into the proximal innominate. Bilateral necrotic supraclavicular lymphadenopathy (star) does not show compression of the subclavian vein in the (b) axial and (c) coronal views.](CRIPU2014-479025.001){#fig1} ![CT angiography demonstrating lobar and segmental pulmonary emboli (arrow) in the right lower lobe.](CRIPU2014-479025.002){#fig2} [^1]: Academic Editor: Hasan Bayram
{ "pile_set_name": "PubMed Central" }
Walter Middelberg Walter Middelberg (30 January 1875 in Zwolle – 15 September 1944 in Zwolle) was a Dutch rower who competed in the 1900 Summer Olympics. He was part of the Dutch boat Minerva Amsterdam, which won the bronze medal in the eight event. External links profile Category:1875 births Category:1944 deaths Category:Dutch male rowers Category:Olympic rowers of the Netherlands Category:Rowers at the 1900 Summer Olympics Category:Olympic bronze medalists for the Netherlands Category:Sportspeople from Zwolle Category:Olympic medalists in rowing Category:Medalists at the 1900 Summer Olympics
{ "pile_set_name": "Wikipedia (en)" }
By The pope expressed supportive sentiments to a parents' group this week.
{ "pile_set_name": "OpenWebText2" }
Survivor 2016: Everything You Always Wanted to Know about Edgic... but were afraid to Ask Understanding Edgic, the System of Studying the Survivor Edit to Determine the Winner Rob Cesternino (@RobCesternino) talks with Zach Vosseler about the concept of EDGIC – which is a system used to analyze the edit of a season of Survivor to try and determine the eventual winner. On this podcast, we’ll discuss the history of Edgic, get an explanation of how Edgic is determined and also try to explain why it dominated the discussion of Survivor Kaoh Rong. Show Links:
{ "pile_set_name": "OpenWebText2" }
Khodorkovsky warns Baltics over Russia threat VILNIUS, Lithuania (AP) — Former Russian tycoon Mikhail Khodorkovsky has warned that Russia poses a serious threat to its neighbors, including the three ex-Soviet republics that form the Baltic states. The founder and former owner of the Yukos oil giant says Lithuania, Latvia and Estonia or the Balkans “could be the next targets of Russian President Vladimir Putin if he does not meet proper resistance in Ukraine.” Khodorkovsky, who spent 10 years in Russian prison before being released and moving to Switzerland last year, was speaking to reporters on a stopover in the Lithuanian capital Wednesday after visiting Ukraine. He accused Putin of invading Crimea, saying “they took Crimea fairly easily and now cannot retreat.” He also said Putin was trying to “reconstruct” the Soviet Union and accused him of spreading false propaganda. Copyright 2014 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
{ "pile_set_name": "Pile-CC" }
"Take, for example, this court, which consists of only nine men and women, all of them successful lawyers who studied at Harvard or Yale Law School. Four of the nine are natives of New York City. Eight of them grew up in east- and west-coast States. Only one hails from the vast expanse in-between. Not a single south-westerner or even, to tell the truth, a genuine Westerner (California [where Kennedy hails from] does not count). Not a single evangelical Christian (a group that comprises about one quarter of Americans), or even a Protestant of any denomination. The strikingly unrepresentative character of the body voting on today's social upheaval would be irrelevant if they were functioning as judges .... But of course the justices in today's majority are not voting on that basis."
{ "pile_set_name": "OpenWebText2" }
US Researchers have developed a smart patch that can be worn on the wrist to detect symptoms of Parkinson's disease or epilepsy and even deliver drugs. Soon, patients will be able to wear a tattoo-like thin device (an artificial skin / wearable smart patch) that can store their information, transmit data about their movements, receive diagnostic information and release drugs into their skin. Patients with movement disorders like Parkinson’s disease or epilepsy can benefit from this technology. What we are talking here is a “sticky patch containing a device roughly four centimetres long, two cm wide and 0.003 millimetres thick”, said Nanshu Lu, a mechanical engineer at University of Texas in Austin. A package of stretchable nanomaterials was layered and constructed into a device by the researchers. These nanomaterials are sensors that detect temperature and motion, resistive RAM for data storage, microheaters and drugs - onto a material that mimics the softness and flexibility of the skin. “The novelty is really in the integration of the memory device,” Stephanie Lacour, an engineer at Swiss Federal Institute of Technology in Lausanne, added. When the device is connected to a power supply and data transmitter, it works. Both teh supply and transmitter need to be made similarly compact and flexible before the prototype can be used routinely in patients. “Although some commercially available components, such as lithium batteries and radio-frequency identification tags can do this work, they are too rigid for the soft-as-skin brand of electronic device,” Lu explained. Source: AINS Image Source: inhabitat.com Read more Health News.
{ "pile_set_name": "OpenWebText2" }
in need of technical support As for mine, I did that just because I said I would (was in the middle of a ADL when I was trying to help earlier) but it looks like I'm running driver version 6.14.0010.7256 on a ATI Radeon HD 4600 AGP. I can verify that driver works, with minor artifacts. (Some are a bit annoying but nothing I can do at the moment) A tip for reinstalling drivers if you need to do taht, get Driver Fusion. That's the best way to make sure you can scrub your drivers clean out. It's the update to a old tool people might remember. ^^ And since it's different than what you expected, you might want to see if there is a downgrade for that particular one. That's not ati ^^.
{ "pile_set_name": "Pile-CC" }
Adriaen Hendriksz Verboom Adriaen Hendriksz Verboom (1627 – 1673), was a Dutch Golden Age landscape painter. Biography He was born in Rotterdam, and was the older brother and teacher of Willem Hendricksz Verboom. He worked in Haarlem from 1650 and in Amsterdam from 1661 and is known for Italianate landscapes in the manner of Jacob van Ruisdael. He seems to have spent a long period in Amsterdam, where his works appeared in inventories and after his wife died in 1667 he returned to Rotterdam, where he later died. He was documented as a good draughtsman who painted tiles and made etchings, as well as paintings. The Rijksmuseum has several of his drawings and etchings. The Teylers Museum has a book of engravings by Johannes Groensveld after Verboom's drawings. References Adriaen Hendriksz Verboom on Artnet Category:1627 births Category:1673 deaths Category:Dutch Golden Age painters Category:Dutch male painters Category:Artists from Rotterdam
{ "pile_set_name": "Wikipedia (en)" }
Since there aren't any takers for Josh McRoberts, the Miami Heat are throwing in the towel and moving forward with him on the roster. The team contacted McRoberts' camp to inform him he's in their plans for the 2016-17 regular season, his agent told the Miami Herald's Barry Jackson. Management checked in with the nine-year pro to go over his offseason training and ensure both parties are on the same page. Miami reportedly sought to get rid of McRoberts' contract during negotiations with former franchise player Dwyane Wade, but wasn't able to move the $5.7 million he's owed this upcoming season. McRoberts also has a player option worth a touch over $6 million in 2017-18. He's been an injury risk throughout most of his run in the league, only suiting up for 70 or more games in a season twice. McRoberts was limited to just 17 appearances in 2014-15 after tearing his right meniscus, and 42 appearances last season due to a bruised knee. The 29-year-old forward averaged 3.6 points on 37.2 percent shooting, along with 2.5 rebounds and 1.9 assists, in 14.2 minutes off the bench last year.
{ "pile_set_name": "OpenWebText2" }
Maryland Continuing Professional Competency (CPC) RequirementsContinuing Education or PDH is known as CPC in Maryland PDHengineer is approved by the Maryland State Board for Professional Engineers as a provider of continuing education for professional engineers. Click on the thumbnail to the right to view the approval letter. Hours Required 24 PDH biennially Renewal Dates Based on the licensee’s date of birth Board Approval Maryland requires that courses be taken from a pre-approved sponsor. PDHengineer has been approved as an approved provider of continuing education for Maryland PEs listed under our parent company name, Decatur Professional Development, LLC. Approved Content Courses must maintain and enhance the professional competency of professional engineers and foster improvement, advancement, and extension of professional skills and knowledge related to the practice of engineering. Maryland has separated acceptable content into two areas: Category ACategory A courses must have content in areas that focus on the following issues: Technical, research, analytical, or design aspects of engineering Laws and regulations applicable to the practice of engineering in Maryland Similar topics aimed to maintain, improve, or expand the skills and knowledge relevant to the licensee’s field of practice A minimum of 18 PDH must be earned with Category A courses. At least 1 PDH must be in the area of standards of practice or care, Maryland laws and regulations, or professional engineering ethics. Category BCategory B courses must have content in areas that focus on the following issues: Business or government administration Development of traits, skills, or behavioral patterns geared towards improved communication skills, oral and written skills, personal management skills, or other similar programs which contain a clear purpose of improving a licensee’s methods of practice or operations or advancing professionally related skills and practices as applicable to the practice of engineering A maximum of 6 PDH may be earned with Category B courses. The PE is not required to earn credits using Category B courses, but if you decide to do so, you may not apply more than 6 credits from this category. Approved Activities Online continuing education from approved providers is specifically accepted under Maryland’s rules. There is no limit on the number of hours that can be earned using online courses. PDH Carryover A maximum of 12 PDH can be carried forward into the next renewal period. Notes A dual-licensed engineer/surveyor shall comply with the CPC requirements set forth in COMAR 09.13.08 applicable to licensed professional land or property line surveyors, except that a minimum of one-third of the units earned shall be gained from the qualifying programs on engineering-related topics. PDH completion records must be maintained for a minimum of 4 years. PDHengineer helps you meet this requirement by providing you with the ability to instantly access and print a certificate upon successful completion of a course or webinar. Additionally, your certificates of completion are securely maintained by PDHengineer for a minimum of ten years and can be accessed online at any time through your login account. Last updated on September 17, 2012 PDHengineer credits have been accepted by the Maryland State Board for Professional Engineers, as well as all other U.S. state boards that mandate continuing education for engineers. In fact, no PDHengineer course or webinar has ever been rejected by a state licensing board. We’re so confident about the acceptability of our PDH credits that every PDHengineer course and webinar comes with the PDHengineer Triple Guarantee. If your state licensing board does not accept any PDHengineer course or webinar: Disclaimer: The information listed above represents a summary of the Board’s requirements and is provided solely for the convenience of PDHengineer.com’s users. While every effort is made to ensure the accuracy of the information provided, Decatur Professional Development, LLC and its affiliate PDHengineer.com make no guarantee regarding the accuracy or completeness of the data listed above. It is the responsibility of each engineer to investigate the Board’s rules to ensure his/her own compliance. You are strongly encouraged to contact the Board directly for a complete listing of the Board’s current requirements.
{ "pile_set_name": "Pile-CC" }
Network Pinger's Awards and Listings Network Pinger's Awards and Listings Network Pinger was only submitted to download websites at the end of the year 2011, so it is not listed in many of them yet, but I'll try to put here some of them updated in the future: Network Pinger on Alt om DATA - one of the biggest Danish IT magazines (2012-06-11) I enjoyed a lot seeing it on this magazine as it seems to be the biggest IT magazine in Denmark for what I've read. I just didn't translate it to Danish because I don't know the language. Softoxi Editor's Opinion (2012-03-19) «If you are in need of a great network monitoring application, then Network Pinger is a really awesome solution. This high-quality tool is so amazingly versatile, comprehensive and intuitive that you will quickly begin to wonder how you could handle things without its assistance.»
{ "pile_set_name": "Pile-CC" }
Q: c++ catch false input without tryCatch block I am trying to catch wrong inputs without the tryCatch-Block. Whenever the user types a wrong value(e.g. 'hh' or -5), my program shall ask again until the the user types in a correct value. Afterwards go on until the array is full. int main() { double array[6]; string str_array[7]; str_array[0] = "stringA"; str_array[1] = "stringB"; str_array[2] = "stringC"; str_array[3] = "StringD"; str_array[4] = "StringE"; str_array[5] = "StringF"; str_array[6] = "StringG"; double value; for (int i = 0; i < 7; i++) { bool exit = false; while (!exit) { cout << str_array[i] << ":"; if (cin >> value&& value> 0) { array[i] = value; cout << array[i] << endl; exit = true; } else { cerr << "incorrect input" << endl; cin.clear(); } } } } A: cin.clear(); isn't enough. You also need to consume the rejected input along to synchronize for new input: else { cerr << "incorrect input" << endl; cin.clear(); std::string dummy; // <<<<< cin >> dummy; // <<<<< } Otherwise you will just read the rejected input over and over again. Something like cin.ignore(numeric_limits<streamsize>::max(), '\n') might serve you as well.
{ "pile_set_name": "StackExchange" }
The “open castration technique” created in 1802- is the same procedure used to alter our family pets today! As a result, it has become our ‘culture’ to accept emasculation as being the norm. Neutering your pet is important- but Neuticles provides an important option to the pet owner unlike never before. Whole verses unwhole- natural appearance verses unnatural appearance. You pet can retain his God given look when opting for Neuticles. When neutering your pet insist on Neuticles!
{ "pile_set_name": "OpenWebText2" }
Record Store Day 2019: the best 137 releases you can buy The list of Record Store Day 2019 releases has been announced... and we've taken all the crap out Shares Record Store Day is almost upon us once more. The annual celebration of high-street record shops seems to go from strength to strength each year, even if half the available stock seems to appear on eBay and Discogs within minutes of the opening bell. For those of us who aren't interested in making a quick buck at the expense of actual music fans, RSD is a day to lay claim to some limited edition vinyl, while stamping your feet in the pre-dawn cold and muttering about how this is the last year you're ever going to put up with this kind of thing, honest. This year, some big guns are wheeling out releases. Pink Floyd's Saucerful Of Secrets gets a mono reissue. There's three releases from The Rolling Stones, including a live version of She's A Rainbow on sexy 10" coloured vinyl. There's a lavish-looking double 7” picture disc of Overkill and Bomber by Motorhead in a gatefold sleeve. The new Struts album makes an appearance on coloured vinyl.
{ "pile_set_name": "Pile-CC" }
Hewlett-Packard is boasting its dedication to OpenStack through the debut of a handful of new Converged Cloud products being debuted today. Announced amid the OpenStack Summit in Portland this week, HP is integrating more of the open source cloud computing software with its own portfolio of private and public cloud solutions. Starting with brand new options, HP has added new private cloud bursting services intended to simplify the startup of hybrid clouds. Dubbed CloudSystem Bursting Activation Services, HP will provide support to help clients configure the software needed to burst from HP CloudSystem (the tech giant's private cloud flagship product) to another while also streamlining access to additional capacity across multiple HP CloudSystems. Service providers will also be able to use these services to deliver on-demand capacity to customers. On the public cloud side, HP has a new "as-a-service" model to share. Aimed towards developers, HP Cloud Messaging is supposed to enable building more fault-tolerant apps while reducing downtime by duplicating messages across multiple servers. The messaging service also uses the OpenStack Marconi API standard, which in turn is designed to set up the program as an intermediary between apps without any installation or configuration required. HP also updated the overall CloudSystem private cloud. Version 7.2 further integrates OpenStack to enable both the aforementioned bursting services while also supporting RedHat KVM resource pools. HP CloudSystem 7.2 as well as Cloud Messaging are both available worldwide now, but the bursting activation services won't roll out until the summer.
{ "pile_set_name": "Pile-CC" }
The effect of a telephone-based cognitive behavioral therapy on quality of life: a randomized controlled trial. Health-related quality of life (HRQoL) has emerged as a major public health concern in perinatal care. The purpose of this study was to examine the effect of telephone-based cognitive behavioral therapy (T-CBT) on HRQoL among Chinese mothers at risk of postnatal depression at 6 weeks and 6 months postpartum. A multi-center randomized controlled trial was conducted at the postnatal units of three regional hospitals. Three hundred and ninety-seven women at risk of postnatal depression were recruited and were randomly assigned to the T-CBT (n = 197) or usual care (n = 200). Assessment was conducted at baseline, 6 weeks and 6 months postpartum for HRQoL. Women in the T-CBT experienced greater improvement in the physical component of HRQoL from baseline to 6 weeks and 6 months postpartum than the usual care group. At 6 months postpartum, the T-CBT group also experienced better HRQoL in the mental component of HRQoL than the usual care group. The T-CBT appears to be feasible and effective in improving HRQoL in women at risk of postnatal depression in the primary care practice.
{ "pile_set_name": "PubMed Abstracts" }
Articles An Interview with Ramesh Jain Refining the search engine The vast amount of information on the internet is growing every day -- it's enough to gag a google search. Researcher Ramesh Jain offers up new strategies for information retrival. Researcher, entrepreneur and teacher Ramesh Jain is currently professor of computer science at the Georgia Institute of Technology. His previous appointments include similar positions at the University of Michigan, Ann Arbor, and the University of California, San Diego. He has founded three companies (PRAJA, Virage, and ImageWare), and his numerous books and articles include "Machine Vision," a textbook used at several universities. He serves on the editorial boards of several magazines in multimedia, business and image and vision processing. UBIQUITY: Let's talk today about Web searching strategies. Do you think that search technology is now in an evolutionary stage, or is it entering stage better thought of as revolutionary? JAIN: I think both processes are going to work together: there will be an evolutionary process but I don't think it's going to take us to the solution that we are looking for. There will also be some revolutionary things coming down the line, but in my opinion they're not going to happen in the next few years, because people are not frustrated enough with the current approaches. For example, today I'll use Google and complain about it, but it has not become so frustrating for me that I'd say, "Enough of this, I'm going to do something else!" And when I say this about myself, as someone who's already thinking about search techniques, then the same point could be made even more strongly for the common person, for whom searching has not become all that frustrating yet. But it is going to be soon in my opinion. UBIQUITY: What do you think are the main characteristics of this frustration? JAIN: A variety of different things, of course. Number one is that the amount of data is continuously increasing — the amount of data that Google throws up at me is increasing really fast. Now their ranking algorithms work in very well-defined cases, so that for example if I am looking for a restaurant in Atlanta with a certain kind of food, my Web search is going to work extremely well. But if I am looking for so-called "lifestyle" restaurants, it's not going to work that well. So if the problem is very well-defined, then the answer will be very well-defined, whereas ill-defined, unstructured problems are of course the hardest to solve. UBIQUITY: Besides the structure factor (or lack of structure factor), isn't there also an anticipation factor — where the search problem is compounded by the system failure to anticipate certain kinds of requests? If you anticipate that you are going to need something — data or objects or old clothes — then you think about them and you classify them. JAIN: That's right, so in fact if I understand you right, search engines like Google try to find out what the user's intents are, and in some cases the system is doing a good job; for example, on Google I can put in a complete address and it immediately understands that it is an address. And it will take me to Mapquest or a map of that particular area. But one of the examples that I like to use is this: what about if I am trying to understand whether President Bush's popularity is increasing or decreasing; what do I do? There is no way I can find out this information. UBIQUITY: And what would be the nature of the project that would give an answer to that? JAIN: Ah. If I had an answer I would have implemented it. But I do have some speculations on that topic, along the following lines. Current search engines like Google do not give me a "steering wheel" for searching the Internet (the term steering wheel was used by William Woods in one of his articles). The search engines get faster and faster, but they're not giving me any control mechanism. The only control mechanism, which is also a stateless control mechanism, asks the searcher to put in keywords, and if I put in keywords I get this huge monstrous list. I have no idea how to refine this list. The only way is to come up with a completely new keyword list. I also don't know what to do with the 8 million results that Google threw at me. So when I am trying to come up with those keywords, I don't know really where I am. That means I cannot control that list very easily because I don't have a holistic picture of that list. That's very important. When I get these results, how do I get some kind of holistic representation of what these results are, how they are distributed among different dimensions. UBIQUITY: What would that kind of holistic representation be like? JAIN: Two common dimensions that I find very useful in many general applications are time and space. If I can be shown how the items are distributed in time and space, I can start controlling what I want to see over this time period or what I want to see in that space. UBIQUITY: How would you compare the search on Google or other search mechanisms with the process of searching for food in a supermarket? JAIN: That's a very good analogy. If I went to a Publix, and I wanted a tube of toothpaste, but could only see two tubes, I could ask for assistance — and that's how the current Google is. But when I go to a Publix I have a holistic picture — I have a complete distribution of the same things and I can search by going through those things and finding exactly what I require. Google does not give me an option like that. With Google, you have to play a game of 20 Questions — you ask a question and it gives you an answer. Since you asked me about supermarkets, let me give you a slightly different example, still related to shopping. In some of the old countries — such as India where I grew up — when you go to a shop or grocery store you are not allowed to access items in the shop directly. Instead, there is a person outside, and you say to the person, "This is what I want." Say I go to buy clothes. I say "I want fur." He will say "What kind of fur?" I would say, "This is my size and I am looking for a farmer's fur." He will bring three or four furs to you, and you look at those and say, "I don't like this, I don't like that, but I like this one." He will then bring four or five more that he thinks you will like, and this process continues until you find something that you really like. This takes place in shopping all over the world. It is not the free shopping mall that you have here in the US and many other countries, where you can enter and you can touch everything, play with everything, you can do all kinds of things. Here, the responsibility is yours to browse through and search. There, they ask you questions — and based on those questions they give you things. UBIQUITY: Sounds like fun actually. JAIN: Well it can be fun and it can be frustrating. The main reason they did this is so nothing was stolen there. The fact that the nature of shopping is changing even in old countries and is becoming more like the model of shopping malls suggests that people prefer that mode of shopping. The same thing will happen to information markets. UBIQUITY: What do you think of online shopping experiences — Amazon or Macy's or whatever? JAIN: Well, they're good for people who know reasonably well what they want, and they are a lot more orientated towards branded things. I am one of those people who buy quite a few things on the Internet but my wife will never touch it because she wants to feel the merchandise, she wants to do the comparison — and right now the comparison is not that easy. People are trying to make the comparison easy but it's still hard. UBIQUITY: Will your daughter and granddaughter do it? JAIN: My daughter does it a little bit. Will my granddaughter do it? I think by that time the technology will be advanced. If it's not I will be disappointed. UBIQUITY: So what are the next steps? JAIN: There are all kinds of people studying this problem, including ones coming from audio or video perspectives. So far searching has been limited to text but very soon it's going to involve a lot more audio and video. Cameras now are absolutely everywhere — still cameras and phone cell cameras — so the problem's become very interesting: how do you combine text, audio and video? In fact, if you look at Yahoo and Google and now MSN also, they are all trying to put together all of these techniques. They are trying to put together media search and image search. Right now these things are, as to be expected, in very early stages, but they are putting a lot of effort in those directions. Now who will actually do it? I don't know, but I believe that none of these big companies will do it, because they are heavily invested in text and in the current technology. That's why in order to beat Google, another big company like Google will rise up from the work of some young people who will come up with these things. UBIQUITY: Presumably from your group at Georgia Tech, right? JAIN: That would be wonderful. UBIQUITY: In your recent work you seem to clearly prefer the word "exploration" to "querying"; why is that? JAIN: In fact, that is very true, and I am excited to use that term in my new white paper, in which I've started arguing that we will soon be prospecting for data and information, and exploration will become part of prospecting. UBIQUITY: How does the use of sensors add to the dimensions of the search problem? JAIN: That's a very interesting development. I believe Yahoo search relies mostly on the name of the file for the image — so that if you type in the word "horses," then if the file name also contains the word "horses" the search will pull in the particular thing. But Google analyzes the text from where the picture is also coming. Google possibly goes slightly beyond that because I thought that all the files that Yahoo brings in at that particular time that I put in the keywords. Google doesn't necessarily have that and, because of that, Google's results are sometimes not as good as Yahoo's. Why does that happen? It's very simple. What I am saying is that they are trying to configure the associated text with the name of the file — or you take the speech component in the audio and video and somehow transcribe that, then apply the text with this technique into that. That's what they are trying to do and that's not bad, and that will buy you some time. You can make some progress with that but soon you find out that if that was the only case people would not rely on audio and video so much. Because text alone doesn't capture the emotion and they don't capture the experience we get from all kinds of other things that you get when you are listening to something or when you are watching something and you are seeing all the reactions there. So how do you get that information? Text is based on well-defined language. We use an alphabet to form words and use those words to express ideas to form the text. Without words, there is no language. We don't have anything equivalent to the alphabet and words in audio, video, images or any other sensor. So we have to develop those things first; there are some efforts like MPEG and things like that, but they are not yet advanced enough. And how will they advance? That's where the interesting results really lie. I don't have the answer to that yet. UBIQUITY: So some day a system will tell me what's wrong with my grass and why it has yellow spots? JAIN: Well that's the easy part, they will do that today. There are systems that you can start implementing for these kinds of things. But you'll have a problem if you want to ask whether your lawn is really in excellent condition or if you want to say "I want to see pictures of a nice beach today." The question could mean, "Is the beach beautiful?" or could mean "Is the weather there good today?" or could mean "Are the people there interesting?" The question could mean any or all of those things, and there is no specific visual language right now to distinguish those kinds of meanings in images and video. UBIQUITY: Would I be wrong in saying that the essence of what you're doing is trying to get beyond language? JAIN: That's very correct. I think one of my favorite books, which I love and quote a lot, is a famous book by S.I. Hayakawa, "Languages in Thought and Action," in which he makes the point that it's amazing how some arbitrary noises and some scribbles on paper started to make meaning to us. It's amazing that we all agree that some noise is going to be presenting some particular thing or some particular concept. And similarly it's amazing that we agree that such-and-such particular scribbles are going to be representing this and that real thing. Another person who had great insights on these issues is Carl Popper. Popper started talking about word one, word two, and word three. Where word one is the real word, word two is what concepts and what mechanisms you learn and have in your head, and word three is the model you build using word two about word one. And those things become very exciting because what we don't see — which is word two (what we have in our head) — is a lot more complex and sophisticated than our language allows. And that's how we sometimes fail to find the words to represent what we want to say. Language allows us to represent some of the things that become a lot more explicit and a lot clearer. Language is a knowledge representation language. UBIQUITY: I'm interested in knowing whether you think that your personal history — coming from India and speaking different languages — has influenced much of your thinking on these topics. JAIN: Oh boy. Now you are asking a difficult question because all of us are products of what we have experienced, so I am sure that it has influenced me. But I am not an expert to tell how it has influenced me that way. I do know that because of that background, I like to experiment with different things, but then I also know that many of my friends from India are completely disinterested in experimenting with anything. So, how did I become different from them? I don't know that. These are the complex problems. UBIQUITY: Let's move from words to numbers. You've had some thoughts about statistics from baseball and other sports; share them with us, along with related thoughts you've had on the analysis of stock market performance. JAIN: My basic point is that there is a big difference between information and insights. If I ask how your stock is doing, and you give me one year's worth of numbers, it would take me a long time to go through those numbers and understand what that stock has been doing. But if you show me a chart of stock prices over the last one-year period, it takes me just a second to understand how the stock is doing. And the same thing applies to a baseball player's performance: how the player is performing. The point is that just churning out data doesn't really help too much. The difference between the data and the context is what makes it useful. This is exactly the same as when we were initially talking about the results of Google and I was talking about the holistic picture and trying to put together along the time and the space. The data warehousing people realized this, too, and when they began dealing with large volumes of data using visualization techniques they started calling their work "business insights" or "business insight applications." UBIQUITY: Insights seem so elusive. Take as a purported insight the anti-war slogan "War is not the answer." Without worrying about the truth or falsity of that slogan, how would any search mechanism deal with it? JAIN: No search engine can deal with that, and in fact that's very interesting. Let me give you a very interesting example along the same lines. In playing with the various search engines, I tried to determine the popularity of George Bush in India. So I used many different keywords, but there was no way that I could find anything about the popularity of George Bush in India. All it would tell me or give me is articles that had the term "India" and "Bush" in them, and had some terms related to "popular." But it simply did not talk about the popularity of George Bush in India. In the same way, if you write the query "War AND Answer" all you will get is that self-same slogan. UBIQUITY: Have you looked at AskJeeves? JAIN: Actually AskJeeves started going in the natural language direction, but they soon realized that natural language understanding is not ready for this. So they now have a combination of people sitting and analyzing and then trying to put the answer. It's a very interesting combination of natural language understanding with case-based reasoning and human-based organization. UBIQUITY: What's the standing of this field today in academia? JAIN: It is becoming very interesting and respectable in academia now, and people are paying attention to this. At one time, information retrieval was not as respected a field as it's slowly becoming. If you went to ten years ago, I don't think that computer academics and computer science departments would have considered this as respected a field as they would consider it now. UBIQUITY: And that changed because of — what? JAIN: Two things. First it is widely used now so its applicability has been proven. And because it is now becoming a field where you can write a lot of papers. Faculty can get tenure, get promoted based on publications in this area. UBIQUITY: Do you get back to India much? JAIN: I go at least once or twice a year. UBIQUITY: India is in the news a lot these days because of its great success in attracting work outsourced from US and European companies. What's your opinion of the political disagreements about outsourcing? JAIN: Let me just say that when, for example, IBM Global Services decides to do a big project in India — for the government of India or for Indian Airlines — it is also outsourcing from India to America. So outsourcing goes on not just from America to India. In fact the real debate should be, "What is the business-related policy necessary to accomplish this commercial exchange?" That's what the policy makers should be doing and that's what the real debate should be. The debate is not whether or not to ban outsourcing. It should be about facts, not emotions. UBIQUITY: As we've discussed, much of your recent work has been focused on search engines. What has been most surprising about what you've found? JAIN: One thing I've found particularly surprising is that you can find the same thing on a hundred different places on a single site in a response to the same query. I have no idea why they can't very quickly go through the results list and remove those duplicates. So that's certainly been a surprise to me. But there are lots of other puzzles as well. Yet that's the fun part of it — to complain about all of this. I will be furious when those things are no longer there to complain about.
{ "pile_set_name": "Pile-CC" }
Q: Use bash when ksh is shell I have access to several RHEL systems that use Active Directory for user accounts and a NFS mount for home directories. Our login shell is stored in Active Directory and is always /bin/ksh. I want to always have /bin/bash, so I figured I could accomplish this in ~/.profile. After reading several posts here and on SO I have come up with this: if [ ! -n "$BASH" ] ;then SHELL=`type -P bash` exec bash -l; fi Is this a standard/good way of doing this? I read ! -n "$BASH" as NOT ("$BASH" is NOT null) So true if it IS null and false if NOT null. If so then why not just -z "$BASH" or even ! "$BASH"? A: The code that you show could very well be used to start a bash login shell from your ~/.profile file. I personally would use command to detect the presence of bash like so: if [ -z "$BASH" ]; then shell=$( command -v bash ) if [ -n "$shell" ]; then exec env SHELL="$shell" bash --login fi unset shell echo 'Bash not present, continuing...' >&2 fi This gets the path to bash into $shell which is then used in a test of whether bash is available and to set the SHELL environment variable for bash. Whether to use [ ! -n "$BASH" ] or [ -z "$BASH" ] is of minor importance (so do whatever feels right and is easiest to read), but I'd probably not use ! [ "$BASH" ] or [ ! "$BASH" ]. In the general case you may end up testing strings that start with dashes, which could confuse the test, so it's better stick to -n or -z when testing whether strings are empty or not. You may also want to keep ~/.profile largely untouched (apart from the above) if the admins of the system one day decides to uninstall bash, and instead write a separate ~/.bash_profile file. The bash shell would use ~/.bash_profile, if it is available, instead of ~/.profile, and a failure in launching bash would result in your default login shell successfully using ~/.profile without stumbling over possible bashisms.
{ "pile_set_name": "StackExchange" }
COMPUTEX 2017 – European Hardware Awards 2017 Winners Announced At Computex 2017 in Taipei, Taiwan, more than 100 editors from 9 countries gathered together inside the Strategy Rooms at the W Hotel to vote the for the European Hardware Awards, after nominations had starte way back in April this year. Among some predictable winners, a clear winner was AMD in the Processor Categories, impressing the voters and the whole IT sector at large. The European Hardware Association (EHA) that organizes the event was created some 3 years ago, including the most respectable, and reknown, editors of online multimedia outlets in Europe: KitGuru from the United Kingdom, HardwareLuxx from Germany, Hardware.Info from the Benelux region, Geeknetic from Spain, Hardware Upgrade from Italy, Lab501 from Romania, CowCotLand from France, PurePC from Poland and SweClockers representing the Nordic countries. We hope to be included in the list soon… 😉 As we said, there are some surprises, some confirmations and honestly, some choices that, in our modest opinion, do not make sense. But awards were given out based on 22 million visitors per year and a combined database of more than 100,000 articless hosted by the websites hosting the event. At Computex 2017 in Taipei, Taiwan, more than 100 editors from 9 countries gathered together inside the Strategy Rooms at the W Hotel to vote the for the European Hardware Awards, after nominations had starte way back in April this year. Among some [...]
{ "pile_set_name": "Pile-CC" }
The general goal of this project is to (i) examine the peripheral central nervous system mechanisms and interactions which produce changes in aggressive state (using the American lobster, as the crustacean model system); and (ii) to determine the physiological and morphological basis of single neurosecretory neurons affecting aggressive behavior. Serotonin neurons, responsible for modulating aggression in lobsters have been identified at a morphological and physiological level. Specifically, I will focus on a sub-set of neurosecretory neurons, namely the spontaneous serotonin neurosecretory cells (A1-5HT). The properties of the ionic currents which determine spontaneity of these cells will be identified and quantified. Furthermore, the physiological affect of perfused serotonin and 20-hydroxyecdysone, the crustacean molting hormone, on the ionic channel properties of Al ganglion-secretory containing neurosecretory neurons, will be further explored. Both standard electrophysiology combined with voltage clamping (the major technique to be learnt in this NRSA grant period), will be used to describe the relationship of ionic currents with each other and their interactions relating to behavioral modulation at both the central and peripheral nervous systems. In summary, the ionic channel properties of these neurosecretory cells will be examined and identified.
{ "pile_set_name": "NIH ExPorter" }
Arcade Expo video games, pinball this weekend Hundreds of vintage and retro video games, pinball machines and gaming systems were hauled in to the Ramada on Plantside Drive for this weekend's Fifth Annual Arcade Expo. Organizers Mark Hagan and Joe Stith expect between about 4,000 people of all ages to join them to celebrate what they can only describe as "nerd culture." "This is a magical gaming haven, an American Institution. A lot of kids have never heard of these games and we didn't want (the games) to die. We decided to bring that magic back," Stith said about how the Arcade Expo came to fruition. "We're trying to bring old school back." Admission is $20 for an all-day pass — free for kids younger than 10 — to play unlimited video games, compete in a costume contest, enjoy two concerts and hear keynote speaker David Crane, who created Pitfall, speak. There even is a seminar available in how to construct a costume for the costume contest. Todd Brooks took his 7-year-old son, Jeremy, to the Expo for the second year. "He gets to see stuff that I used to play with when I was little and it's a thing we can both share in," he said. "It's awesome," Jeremy added. "You can play a whole bunch of games, some I didn't even know about." The Expo seems to be more about just playing games, it's about coming together for a common love. "The games don't matter nearly as much as the company," Liam Randall said after finishing a game with his 5-year-old son, Eamon.
{ "pile_set_name": "OpenWebText2" }
The present invention relates generally to coating compositions which can be applied to thermoplastic films and, more particularly, to a slip coating composition which, when applied to a thermoplastic film such as polypropylene, results in a film structure having low haze, low coefficient of friction and non-blocking characteristics. While the present coating composition is suitable for application to a wide variety of thermoplastic films, it is especially suited for application to polypropylene films. Polypropylene films are widely used in the packaging industry due to their physical properties, such as, transparency, stiffness and excellent moisture barrier. With all its good characteristics, unmodified polypropylene film also has the disadvantageous properties of high inherent coefficient of friction and film to film destructive blocking on storage. In the past, coefficient of friction characteristics of polypropylene and other thermoplastic films have been beneficially modified by the inclusion of fatty acid amides in the polymer. This attempt at minimizing those shortcomings associated with unmodified polypropylene has been described in U.S. Pat. No. 3,176,021. Specifically, it is described that minor quantities of fatty acid amides can be incorporated into the polypropylene in order to improve the coefficient of In order, however, to obtain the benefits taught by the '021 patent, certain limitations must be observed. The film must be formed from a melt extruded at a temperature between about 400.degree.-550.degree. F. In addition, the amide must be present in from 0.005 to about 2.0 weight percent of the polypropylene, and it must be present along with from 0.1 to about 4.0 weight percent of polyethylene. Under these conditions and limitations, the resulting polypropylene film will have a static coefficient of friction no higher than 0.6 which is significantly higher than present day requirements. In addition, such a film does not have the high stereoregularity required by present day packaging demands. Further, it has been found that once the film has been subjected to temperature conditions approaching 140.degree. F., the coefficient of friction increases significantly and is nowhere near the present day requirements of 0.25. In addition to the foregoing limitations regarding fatty acid amide-containing polypropylene films, the effectiveness of the amides depends upon their ability to migrate to the surface of the films in order to reduce coefficient of friction. While such amides do improve the coefficient of friction of the films, the value of the coefficient of friction is subject to wide variation depending upon the heat history which the film experiences during shipping, storage, and certain converting processes. The presence of such amides on the film surfaces can adversely affect the film's appearance as manifested by an increase in haze, a decrease in gloss and the presence of streaks. The presence of such amides on the surface can also adversely affect the wettability and adhesion of solvent and water based inks, coatings and adhesives. In the case of oriented polypropylene films, which are widely used in the food packaging industry, it is common to laminate this film with itself or with other thermoplastic films or with paper films such as glassine paper. When oleamide or erucamide are used in the polypropylene films a significant increase in coefficient of friction has been observed after lamination to such films. It is theorized that this is due either to the migration of the amide back into the polypropylene film or to the loss of the additive layer at the film surface. Therefore, these types of oriented laminated polypropylene films have limited usage for particular converting processes. Attempts at replacing these amide types, in order to provide a consistent coefficient of friction, have not been successful. Therefore, it is an object of the present invention to provide a coating composition for application to a thermoplastic film, such as polypropylene, whereby the resultant coated film is characterized by a reduced coefficient of friction. It is another object of the present invention to provide such a coated film, which further exhibits non-blocking and improved slip characteristics. It is yet another object of the present invention to provide such a coated film having stable non-blocking and improved slip characteristics with respect to the heat history experienced by the film during shipping, storage, converting processes and the like. It is a further object of the present invention to provide such a film which is additionally characterized by improved clarity resulting from low haze.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Excluding location path from file paths In config file, location /i/ { root /data/w3; } The /data/w3/i/top.gif file will be sent in response to the /i/top.gif request. How can I set it to ignore i in file paths? Indeed I need /i/top.gif to be mapped to /data/w3/top.gif. A: location /i/ { alias /data/w3/; }
{ "pile_set_name": "StackExchange" }
import os import tempfile from core.config import defaultEditor from core.colors import white, yellow from core.log import setup_logger logger = setup_logger(__name__) def prompt(default=None): # try assigning default editor, if fails, use default editor = os.environ.get('EDITOR', defaultEditor) # create a temporary file and open it with tempfile.NamedTemporaryFile(mode='r+') as tmpfile: if default: # if prompt should have some predefined text tmpfile.write(default) tmpfile.flush() child_pid = os.fork() is_child = child_pid == 0 if is_child: # opens the file in the editor try: os.execvp(editor, [editor, tmpfile.name]) except FileNotFoundError: logger.error('You don\'t have either a default $EDITOR \ value defined nor \'nano\' text editor') logger.info('Execute %s`export EDITOR=/pat/to/your/editor` \ %sthen run XSStrike again.\n\n' % (yellow,white)) exit(1) else: os.waitpid(child_pid, 0) # wait till the editor gets closed tmpfile.seek(0) return tmpfile.read().strip() # read the file
{ "pile_set_name": "Github" }
Arsenal cut to 11-8 to win Premier League title Leading bookmaker Coral has trimmed the odds on Arsenal winning the Premier League title into 11-8 (from 13-8) following their victory over Bournemouth this evening, a result which puts them top of the table with Leicester playing tomorrow evening. Tottenham have also been cut for the title with Coral after another victory today where they are now available at 8-1 (from 11-1). After his side drew 0-0 at home to Chelsea this evening, Louis van Gaal is 1-8 not to be in charge of Manchester United for the final game of the 2015/16 Premier League campaign, while he is 9-2 to still be there.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention relates to a method for discharge of a liquid wished to be discharged and a liquid discharge head which resort to generation of bubbles by means of thermal energy, for example, and more particularly to a method for the discharge of a liquid and a liquid discharge head which rely on the use of a movable separation membrane capable of effecting displacement of its own in consequence of the generation of bubbles. The term "record" as used herein means not merely the action of imparting images such as characters and figures which have meanings to a recording medium but also the action of imparting figures such as patterns which are destitute of meaning to the recording medium. 2. Related Background Art The so-called bubble jet recording medium, i.e. the version of ink jet recording method which effects the formation of an image on a recording medium by exerting the energy of heat, for example, on an ink thereby causing the ink to produce a change of state accompanied by an abrupt volumetric change (generation of bubbles) and thereby enabling the force of action due to this change of state to discharge the ink through a discharge port and allowing the discharged ink to adhere to the recording medium, has been heretofore known to the art. The recording device which utilizes this bubble jet recording method, as disclosed in JP-B-61-59911 and JP-B-61-59914, is generally furnished with a discharge port for allowing the discharge of ink, an ink flow path communicating with the discharge port, and a heating element (electrothermal converting element) disposed in the ink flow path and adapted as an energy generating means for effecting the discharge of ink. The recording method described above enjoys many fine features such as permitting easy production of recorded images and further color images of high resolution by the use of a small device because this recording method enables images of high quality to be recorded at high speed with low noise and the head embodying this recording method permits discharge ports for the discharge of this ink to be disposed in high density. The bubble jet recording method, therefore, has come to be utilized in recent years in numerous office devices such as printers, copying devices, and facsimile devices. It is now on the verge of finding utility in industrial applications such as for a printing device. In the conventional bubble jet recording method, since the heating element held in contact with the ink repeats application of heat to the ink, it has the possibility of scorching the ink and forming on the surface thereof a deposit of scorched ink. When the liquid wished to be discharged is apt to be deteriorated by heat or it is not easily allowed to foam sufficiently, there are times when the formation of bubbles by direct heating with the heating element mentioned above will fail to bring about perfect discharge of the liquid. The present applicant has proposed in JP-A-55-81172 a method for effecting discharge of a discharging liquid by foaming the bubble generating liquid with a thermal energy applied thereto through the medium of a flexible membrane adapted to separate the bubble generating liquid and the discharging liquid. This method is constructed such that the flexible membrane and the bubble generating liquid are disposed in part of a nozzle. In contrast, a construction using a large membrane capable of separating the head in its entirety into an upper and a lower part is disclosed in JP-A-59-26270. This large membrane is aimed at enabling a liquid flow path to be interposed between two plate members and consequently preventing liquids held back by the two plate members from mingling with each other. As ideas that take consideration of foaming properties which are characteristic of bubble generating liquids themselves, an invention of JP-A-05-229122 which uses a liquid having a lower boiling point than a discharging liquid and an invention of JP-A-04-329148 which uses an electroconductive liquid as a bubble generating liquid have been also known to the art. The conventional method for discharge of liquid by the use of a separation membrane has not reached a level of feasibility because it is constructed solely for the separation of a bubble generating liquid and a discharging liquid or is intended only for improving the bubble generating liquid itself. The present inventors have pursued a study on the discharge of liquid drops by the use of a separator, with emphasis on the liquid drops subjected to discharging, and have consequently reached a conclusion that the discharge of liquid brought about by the formation of bubbles with the thermal energy has the efficiency thereof degraded through the intervention of the aging of the separation membrane and has not yet been reduced to practice. The present inventors, therefore, have initiated a study in search of a method for discharge of liquid and a device therefor which can utilize the effect the function of separation by the separation membrane and meanwhile exalt the discharge of liquid to a higher level. The present invention has originated in the course of this study and is directed to providing an epochal method of discharge and a device therefor which can improve the efficiency of discharge of liquid drops and can stabilize and exalt the volume of liquid drops to be discharged and the speed of discharge of liquid drops. Specifically, this invention resides in a liquid charge head furnished with a first flow path used for a discharging liquid and adapted to communicate with a discharge port, a second flow path adapted to supply or transfer a bubble generating liquid and embrace a bubble generating region, and a movable separation membrane for separating the first and the second flow path, which features the ability to improve the efficiency of discharge. The present inventors, particularly concerning the liquid discharge head disclosed in JP-A-5-229122, have demonstrated that a small empty space destined to serve as a bubble generating region is disposed on the upstream side of a discharge port relative to the direction of the flow of a discharging liquid, that the bubble generating region itself barely has the same width and length as a heating element, that when the bubble generating region emits bubbles, a flexible membrane is displaced by the generation of the bubbles only in the vertical direction relative to the direction of discharge of the discharging liquid, and that the liquid discharge head consequently entails the problem of producing no sufficient discharging speed and performing no efficient discharging motion. The inventors, regarding the cause for this problem, have taken notice of the fact that the same bubble generating liquid always uses repeatedly the closed small empty space and have ultimately realized the production of an efficient discharging motion by virtue of the present invention. The present invention has been produced in the light of the problem encountered by the prior art as mentioned above. The first object of this invention is to provide, in a construction for substantially separating, preferably perfectly separating, a discharging liquid and a bubble generating liquid by means of a movable separation membrane, a method for the discharge of liquid and a liquid discharge head which, while the force generated by the pressure of bubbles is deforming the movable separation membrane and transferring the pressure to the discharging liquid, not only prevent the pressure from escaping toward the upstream side but also guide the pressure in the direction of the discharge port and give rise to a high discharging force without a sacrifice of the efficiency of discharging. The second object of this invention is to provide a method for the discharge of liquid and a liquid discharge head which, owing to the construction described above, allow a decrease in the amount of a deposit suffered to pile on a heating element and permit efficient discharge of liquid without inflicting a thermal effect on the discharging liquid. The third object of this invention is to provide a method for the discharge of liquid and a liquid discharge head which enjoy broad freedom of selection without reference to the viscosity of the discharging liquid or the composition of the material thereof. Specifically, the major object of this invention resides in providing a method for the discharge of liquid and a liquid discharge head which, besides fulfilling the objects mentioned above, repress the vibration of the movable separation membrane during the extinction of bubbles, effect stable discharge, promote supply of liquid, and improve the property of refilling.
{ "pile_set_name": "USPTO Backgrounds" }
Post-Issuance Tax Compliance DAC's innovative post-issuance tax accounting system provides a safe, secure area for clients to store sensitive bond documents, account for proceeds expended and spend down requirements, as well as store bank statements, draw requests, invoices, and the like for the life of the bond plus three years. Issuers receive timely reminders of filing due dates and assistance with preparation of IRS Form 8038-CP and 1097-BTC. DAC also provides Private Business Use services. The DAC system demystifies the calculation of private business use and the preparation of Schedule K to Form 990 by incorporating, in one software application, the complicated Treasury Regulations applicable to financings of separate facilities with separate placed in service dates and separate economic lives. With fast and easy inputs, the DAC system can track the impact of cost of issuance, redemptions, refunding, reimbursements, neutral costs, working capital expenditures, and construction period investment earnings. The DAC system prompts the user for the minimally necessary information and outputs private business use for the reporting period, actual private business use to date, and an estimated private business use percentage for the life of the financing. The system tracks usage by both percentage and dollar amount and alerts the user when specific limitations have been exceeded. The DAC post-issuance tax accounting system is not intended to replace legal assistance or render opinions; basically, it's a sophisticated calculator that allows the user to know, at any time, with exacting precision, the amount of private business use for any bond issue. The system even allows the user to model future numbers to plan ahead for expected changes in private use. Therefore, the DAC system allows the user to plan for the future and maximize the available private use amounts. The user can effectively model "what if" scenarios instantly and with complete confidence.
{ "pile_set_name": "Pile-CC" }
Are we Ready for a "Microbiome-Guided Behaviour" Approach? The microbiome is proving to be increasingly important for human brain functioning. A series of recent studies have shown that the microbiome influences the central nervous system in various ways, and consequently acts on the psychological well-being of the individual by mediating, among others, the reactions of stress and anxiety. From a specifically neuroethical point of view, according to some scholars, the particular composition of the microbiome-qua microbial community-can have consequences on the traditional idea of human individuality. Another neuroethical aspect concerns the reception of this new knowledge in relation to clinical applications. In fact, attention to the balance of the microbiome-which includes eating behavior, the use of psychobiotics and, in the treatment of certain diseases, the use of fecal microbiota transplantation-may be limited or even prevented by a biased negative attitude. This attitude derives from a prejudice related to everything that has to do with the organic processing of food and, in general, with the human stomach and intestine: the latter have traditionally been regarded as low, dirty, contaminated and opposed to what belongs to the mind and the brain. This biased attitude can lead one to fail to adequately consider the new anthropological conceptions related to the microbiome, resulting in a state of health, both physical and psychological, inferior to what one might have by paying the right attention to the knowledge available today. Shifting from the ubiquitous high-low metaphor (which is synonymous with superior-inferior) to an inside-outside metaphor can thus be a neuroethical strategy to achieve a new and unbiased reception of the discoveries related to the microbiome.
{ "pile_set_name": "PubMed Abstracts" }
Jean-Charles Chenu Jean-Charles Chenu (30 August 1808 – 12 November 1879) was a French physician, naturalist and author. Bibliography Natural history Illustrations conchyliologiques ou description et figures de toutes les coquilles connues vivantes et fossiles, classées suivant le système de Lamarck modifié d'après les progrès de la science et comprenant les genres nouveaux et les espèces rècemment découvertes (1842–1854) 1842. Tome I. - Volume one contains ammonites, land snails and sea snails. 1845. [https://archive.org/details/bibliothquecon01chen Histoire Naturelle des Coquilles D'Angleterre]. Paris, A. Franck. - This is translation in French from English of work by Edward Donovan. The Natural History of British Shells, including Figures and Descriptions of all the Species Hitherto Discovered in Great Britain, Systematically Arranged in the Linnean Manner, with Scientific and General Observations on Each., 5 volumes. Jean-Charles Chenu. 1845. Conchologie Americáine ou descriptions et figures des coquilles du nord de l'Amérique Paris, A. Franck, Libraire-Éditeur, rue Richelieu, 69, Leçons élémentaires d'histoire naturelle, comprenant un aperçu sur toute la zoologie et un Traité de conchyliologie, (1846) Encyclopédie d'histoire naturelle ou Traité complet de cette science d'après les travaux des naturalistes les plus éminents, (1850 - 1861) accompagné des Tables alphabétiques des noms vulgaires et scientifiques de tous les animaux décrits et figurés dans cette encyclopédie, dressées par Desmarests Manuel de conchyliologie et de paléontologie conchyliologée, (1859 - 1862) Leçons élémentaires sur l'histoire naturelle des oiseaux, (1862 - 1863) Medical Rapport sur le choléra-morbus, (1835) Rapport au conseil de santé des armées sur les résultats du service médico-chirurgical aux ambulances de Crimée et aux hôpitaux militaires français de Turquie, pendant la campagne d'Orient en 1854-1856-1856, (1865) De la mortalité dans l'armée et des moyens d'économiser la vie humaine, (1870) Statistique médico-chirurgicale de la campagne d'Italie en 1859 et 1860, (2 volumes et un atlas, 1869) Recrutement de l'armée et population de la France, (1867) References Anonym 1874 [Chenu, J.] Boston Advert. 134(73). Anonym 1880 [Biographien] Zool. Anz. 3 144. Anonym 1880 [Chenu, J.] Amer. Natural. 14 151. Constantin, R. 1992 Memorial des Coléopteristes Français. Bull. liaison Assoc. Col. reg. parisienne , Paris (Suppl. 14) : 1-92. Evenhuis, N. L. 1997 Litteratura taxonomica dipterorum (1758-1930). Volume 1 (A-K); Volume 2 (L-Z). Leiden, Backhuys Publishers. Lhoste, J. 1987 Les entomologistes français. 1750-1950. INRA (Institut National de la Recherche Agronomique), Paris : 1-355. External links University of Bordeaux In French Portrait, three plates.Links through to Gallica which has digitalised works by Chenu. BHL Scanned books. Four works. Category:French naturalists Category:19th-century French physicians Category:French malacologists Category:1808 births Category:1879 deaths
{ "pile_set_name": "Wikipedia (en)" }
United States Court of Appeals FOR THE EIGHTH CIRCUIT ___________ No. 02-3415 ___________ United States of America, * * Plaintiff - Appellee, * * Appeal from the United States v. * District Court for the * Northern District of Iowa. Richard Lofton, * * Defendant - Appellant. * ___________ Submitted: March 12, 2003 Filed: June 26, 2003 ___________ Before HANSEN,* Chief Judge, LOKEN and MURPHY, Circuit Judges. ___________ LOKEN, Chief Judge. During a routine traffic stop, Iowa police officers saw a handgun at the feet of passenger Richard Lofton and arrested Lofton and the driver, Fabian Espinosa, for a state law weapons violation. After a drug dog alerted to the vehicle, the officers found 236 grams of methamphetamine and ammunition for the handgun in the center console, and three pounds of marijuana in a storage area. Lofton and Espinosa were * The Honorable David R. Hansen stepped down as Chief Judge of the United States Court of Appeals for the Eighth Circuit at the close of business on March 31, 2003. The Honorable James B. Loken became Chief Judge on April 1, 2003. charged with drug and firearm offenses. Espinosa pleaded guilty to the drug charges. A jury then convicted Lofton of the drug charges and both defendants of the firearm offense. Lofton moved for a new trial based on newly discovered evidence -- Espinoza’s belated willingness to testify that Lofton had no knowledge of the drugs found in the vehicle. The district court1 denied the motion and sentenced Lofton to 138 months in prison. He appeals, arguing the district court abused its discretion in denying the motion for new trial. We affirm. Neither Lofton nor Espinosa testified at trial. Just before Lofton’s sentencing, but after Espinoza’s appeal was submitted to this court,2 Lofton filed a motion for new trial based on newly discovered evidence, claiming that Espinosa would now testify that Lofton had no knowledge of the controlled substances in Espinosa’s vehicle when they were arrested. At the motion hearing, Espinosa testified that Lofton had no knowledge of the drugs found in the vehicle, that Espinoza would testify to that effect if Lofton were granted a new trial, that Espinosa and Lofton had no personal contact from the time of their arrest until trial because of the court’s bond requirements, and that Espinosa did not volunteer to testify until he responded to a request from Lofton’s wife’s approximately sixty days before the hearing. On cross- examination, Espinosa invoked his Fifth Amendment privilege against self- incrimination when asked about the source of the drugs and to whom he planned to deliver them. The district court denied the new trial motion on the ground that Espinosa’s testimony would not qualify as evidence newly discovered after trial, one of the facts Lofton must establish to warrant a new trial on the basis of newly discovered 1 The HONORABLE DONALD E. O’BRIEN, United States District Judge for the Northern District of Iowa. 2 We affirmed Espinosa’s conviction for the firearm offense in United States v. Espinosa, 300 F.3d 981 (8th Cir. 2002). -2- evidence. See United States v. Zuazo, 243 F.3d 428, 431 (8th Cir. 2001). That ruling is consistent with this Court’s prior decisions. “[W]hen a defendant who has chosen not to testify subsequently comes forward to offer testimony exculpating a codefendant, the evidence is not ‘newly discovered.’” United States v. Offutt, 736 F.2d 1199, 1202 (8th Cir. 1984), quoted in United States v. Rogers, 982 F.2d 1241, 1245 (8th Cir. 1993), and in Meadows v. Delo, 99 F.3d 280, 282 (8th Cir. 1996). Conceding that “‘newly available’ evidence is not necessarily ‘synonymous’ with ‘newly discovered’ evidence,” United States v. Williams, 698 F. Supp. 796, 797 (E.D. Mo. 1988), Lofton nonetheless argues that his new trial motion was in fact based upon newly discovered evidence because he was not aware of Espinosa’s willingness to testify until after the trial. We reject this contention. Before trial, Lofton knew the relevant fact at issue -- whether Espinosa had advised Lofton during the course of their travels that Espinosa was carrying illegal drugs in the vehicle. Knowing that fact, Lofton could have called codefendant Espinosa as a defense witness at trial. Perhaps Espinosa would have invoked his privilege against self- incrimination and refused to testify. In that event, Lofton could have moved to sever his trial from Espinosa’s, which would have tested whether Espinosa’s unavailable testimony would deprive Lofton of a fair trial. In these circumstances, the district court did not abuse its discretion in relying upon the general rule that belated exculpatory testimony by a codefendant who did not testify at trial is not newly discovered evidence warranting the grant of a new trial. The judgment of the district court is affirmed. A true copy. Attest: CLERK, U. S. COURT OF APPEALS, EIGHTH CIRCUIT. -3-
{ "pile_set_name": "FreeLaw" }
MHC-presented peptide vaccines are one of the most promising experimental therapies for melanoma. However, MHC class I peptides that prime CTLs lack dramatic anti-tumor effect in clinical trials. Co-immunization with MHC class II peptides substantially enhances CTL potency, augments antibody development and provides memory. A drawback to this approach is that MHC class II epitope bind poorly, therefore they are weak immunogens. Antigen Express scientists found that coupling the li-Key segment of the immunoregulatory li-protein to the N-terminus of a MHC class II epitope enhances the potency of class II epitope peptide presentation 200 times more than the epitope-only peptide. Our studies in immunized mice demonstrate 4-6 fold enhancement of Th1 cells by with li-Key/MHC II hybrid as measured by ELISPOT. In vitro li-Key/HER-21/neu(MHC II epitope) hybrids potently stimulate peripheral blood or draining lymph node lymphocytes from breast cancer patients. Applying these methods to melanoma, we will define the most potent HLA-DR-restricted li-Key/tyrosinase(MHC II) and li-key/gpl00(MHC II) hybrids for a clinical trial by our collaborator, Dr. Jedd Wolchok of Memorial Sloan Kettering Cancer Center (MSKCC). He will use these MHC class II hybrids to potentiate CTL and clinical responses to previously used tyrosinase and gp100 HLA-A2-restricted CTL epitope peptide vaccines. Here we will define the optimal sequence of MHC class II epitopes for incorporation in new hybrids, optimal spacer length, and dose/dosage and immune response parameters in mice. In parallel with studies using human cells in vitro, Dr. MigueI-Angel Perales from MSKCC will confirm our structure-activity findings. Toxicology studies in mice and rabbits of one GMP batch of the optimal peptide(s) will complete our preclinical studies of this SBIR, supporting a clinical trial at Memorial Sloan-Kettering.
{ "pile_set_name": "NIH ExPorter" }
Q: Efficient way to calculate geographic density in Pandas? I have a large list of longitude and latidue data corresponding to fast food places in the U.S. For each fast food place, I want to know how many other fast food places are within 5 miles. I could calculate this in Pandas using Geopy like so (each row in the DataFrame is a different fast food place): import pandas as pd import geopy.distance df = pd.DataFrame({'Fast Food Place':[1,2,3], 'Lat':[33,34,35], 'Lon':[42,43,44]}) for index1, row1 in df.iterrows(): num_fastfood = 0 for index2, row2 in df.iterrows(): # calculate distance in miles between longitude and latitude dist = geopy.distance.VincentyDistance(row1[['Lat','Lon']], row2[['Lat','Lon']]).miles # if fast food is within 5 miles, increment num_fastfood if dist < 5: # if less than five miles num_fastfood = num_fastfood + 1 df.loc[index1, 'num_fastfood_5miles'] = num_fastfood - 1 # (subtract 1 to exclude self) But this is extremely slow on very large data sets (i.e. 50,000 rows). I considered using a KDTree for the search, but curious if other people have a much quicker method? A: Implementation with scipy.spatial.cKDTree: from scipy.spatial import cKDTree def find_neighbours_within_radius(xy, radius): tree = cKDTree(xy) within_radius = tree.query_ball_tree(tree, r=radius) return within_radius def flatten_nested_list(nested_list): return [item for sublist in nested_list for item in sublist] def total_neighbours_within_radius(xy, radius): neighbours = find_neighbours_within_radius(xy, radius) return len(flatten_nested_list(neighbours))
{ "pile_set_name": "StackExchange" }
At times I'll go into a zone maybe a dimensional circle or deep Meditation possibly a trance and start walking,talking or writing MY thoughts and ideas then melt and blend together bonding as a Whole like 100 drops of different colors in a jar,I'll shake And mix it in a ink-well, It's then applied on paper with minor changes, Yes I now truly believe its ready to post and possibly a good roast? And remember "Al the Green Rain Train" is an excellent book to learn English (Alfred Guajardo) "GET YOUR BUSINESS ONLINE" "Al the Green Rain Train" An environmental book for children and a reminder to all
{ "pile_set_name": "Pile-CC" }
// Copyright 2009 the V8 project authors. All rights reserved. // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following // disclaimer in the documentation and/or other materials provided // with the distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived // from this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // This benchmark is based on a JavaScript log processing module used // by the V8 profiler to generate execution time profiles for runs of // JavaScript applications, and it effectively measures how fast the // JavaScript engine is at allocating nodes and reclaiming the memory // used for old nodes. Because of the way splay trees work, the engine // also has to deal with a lot of changes to the large tree object // graph. package { // To make the benchmark results predictable, we replace Math.random // with a 100% deterministic alternative. var seed = 49734321; class Math2 { public static function random() { // Robert Jenkins' 32 bit integer hash function. seed = ((seed + 0x7ed55d16) + (seed << 12)) & 0xffffffff; seed = ((seed ^ 0xc761c23c) ^ (seed >>> 19)) & 0xffffffff; seed = ((seed + 0x165667b1) + (seed << 5)) & 0xffffffff; seed = ((seed + 0xd3a2646c) ^ (seed << 9)) & 0xffffffff; seed = ((seed + 0xfd7046c5) + (seed << 3)) & 0xffffffff; seed = ((seed ^ 0xb55a4f09) ^ (seed >>> 16)) & 0xffffffff; return (seed & 0xfffffff) / 0x10000000; } } public class PayloadData { var array; var string; var left; var right; public function PayloadData(array,string,left=null,right=null) { this.array=array; this.string=string; this.left=left; this.right=right; } } public class Splayer { var kSplayTreeSize = 8; var kSplayTreeModifications = 3; var kSplayTreePayloadDepth = 1; var splayTree = null; public function GeneratePayloadTree(depth, key) { if (depth == 0) { return new PayloadData([0,1,2,3,4,5,6,7,8],'String for key '+key+' in leaf node'); } else { return new PayloadData(null,null,GeneratePayloadTree(depth - 1, key),GeneratePayloadTree(depth - 1, key)); } } public function GenerateKey() { // The benchmark framework guarantees that Math.random is return Math2.random(); } public function InsertNewNode() { // Insert new node with a unique key. var key; do { key = GenerateKey(); } while (splayTree.find(key) != null); splayTree.insert(key, GeneratePayloadTree(kSplayTreePayloadDepth, key)); return key; } public function playerSetup() { splayTree = new SplayTree(); for (var i = 0; i < kSplayTreeSize; i++) { InsertNewNode(); } } public function playerTearDown() { // Allow the garbage collector to reclaim the memory // used by the splay tree no matter how we exit the // tear down function. var keys = splayTree.exportKeys(); splayTree = null; // Verify that the splay tree has the right size. var length = keys.length; print("Key length: " + length); if (length != kSplayTreeSize) { print("Splay tree has wrong size"); } // Verify that the splay tree has sorted, unique keys. for (var i = 0; i < length - 1; i++) { if (keys[i] >= keys[i + 1]) { print("Splay tree not sorted"); } } } public function playerRun() { // Replace a few nodes in the splay tree. for (var i = 0; i < kSplayTreeModifications; i++) { var key = InsertNewNode(); var greatest = splayTree.findGreatestLessThan(key); if (greatest == null) splayTree.remove(key); else splayTree.remove(greatest.key); } // end for } // End player } // end class /** * Constructs a Splay tree. A splay tree is a self-balancing binary * search tree with the additional property that recently accessed * elements are quick to access again. It performs basic operations * such as insertion, look-up and removal in O(log(n)) amortized time. * * @constructor */ public class SplayTree { public function SplayTree() { } /** * Pointer to the root node of the tree. * * @type {SplayTree.Node} * @private */ private var root_ = null; /** * @return {boolean} Whether the tree is empty. */ public function isEmpty() { return !this.root_; }; /** * Inserts a node into the tree with the specified key and value if * the tree does not already contain a node with the specified key. If * the value is inserted, it becomes the root of the tree. * * @param {number} key Key to insert into the tree. * @param {*} value Value to insert into the tree. */ public function insert(key, value) { if (this.isEmpty()) { this.root_ = new Node(key, value); return; } // Splay on the key to move the last node on the search path for // the key to the root of the tree. this.splay_(key); if (this.root_.key == key) { return; } var node = new Node(key, value); if (key > this.root_.key) { node.left = this.root_; node.right = this.root_.right; this.root_.right = null; } else { node.right = this.root_; node.left = this.root_.left; this.root_.left = null; } this.root_ = node; }; /** * Removes a node with the specified key from the tree if the tree * contains a node with this key. The removed node is returned. If the * key is not found, an exception is thrown. * * @param {number} key Key to find and remove from the tree. * @return {SplayTree.Node} The removed node. */ public function remove(key) { if (this.isEmpty()) { print('Key not found: ' + key); } this.splay_(key); if (this.root_.key != key) { print('Key not found: ' + key); } var removed = this.root_; if (!this.root_.left) { this.root_ = this.root_.right; } else { var right = this.root_.right; this.root_ = this.root_.left; // Splay to make sure that the new root has an empty right child. this.splay_(key); // Insert the original right child as the right child of the new // root. this.root_.right = right; } return removed; }; /** * Returns the node having the specified key or null if the tree doesn't contain * a node with the specified key. * * @param {number} key Key to find in the tree. * @return {SplayTree.Node} Node having the specified key. */ public function find(key) { if (this.isEmpty()) { return null; } this.splay_(key); return this.root_.key == key ? this.root_ : null; }; /** * @return {SplayTree.Node} Node having the maximum key value that * is less or equal to the specified key value. */ public function findGreatestLessThan(key) { if (this.isEmpty()) { return null; } // Splay on the key to move the node with the given key or the last // node on the search path to the top of the tree. this.splay_(key); // Now the result is either the root node or the greatest node in // the left subtree. if (this.root_.key <= key) { return this.root_; } else if (this.root_.left) { return this.findMax(this.root_.left); } else { return null; } }; /** * @return {Array<*>} An array containing all the keys of tree's nodes. */ public function exportKeys() { var result = new Vector.<Number>(); if (!this.isEmpty()) { this.root_.traverse_(function (node) {result.push(node.key)} ); } return result; }; /** * Perform the splay operation for the given key. Moves the node with * the given key to the top of the tree. If no node has the given * key, the last node on the search path is moved to the top of the * tree. This is the simplified top-down splaying algorithm from: * "Self-adjusting Binary Search Trees" by Sleator and Tarjan * * @param {number} key Key to splay the tree on. * @private */ public function splay_(key) { if (this.isEmpty()) { return; } // Create a dummy node. The use of the dummy node is a bit // counter-intuitive: The right child of the dummy node will hold // the L tree of the algorithm. The left child of the dummy node // will hold the R tree of the algorithm. Using a dummy node, left // and right will always be nodes and we avoid special cases. var dummy; var left; var right; dummy = left = right = new Node(null, null); var current = this.root_; while (true) { if (key < current.key) { if (!current.left) { break; } if (key < current.left.key) { // Rotate right. var tmp = current.left; current.left = tmp.right; tmp.right = current; current = tmp; if (!current.left) { break; } } // Link right. right.left = current; right = current; current = current.left; } else if (key > current.key) { if (!current.right) { break; } if (key > current.right.key) { // Rotate left. var tmp = current.right; current.right = tmp.left; tmp.left = current; current = tmp; if (!current.right) { break; } } // Link left. left.right = current; left = current; current = current.right; } else { break; } } // Assemble. left.right = current.left; right.left = current.right; current.left = dummy.right; current.right = dummy.left; this.root_ = current; }; } /** * Constructs a Splay tree node. * * @param {number} key Key. * @param {*} value Value. */ public class Node { public var key; public var value; public function Node(key,value) { this.key = key; this.value = value; }; /** * @type {SplayTree.Node} */ public var left = null; /** * @type {SplayTree.Node} */ public var right = null; /** * Performs an ordered traversal of the subtree starting at * this SplayTree.Node. * * @param {function(SplayTree.Node)} f Visitor function. * @private */ public function traverse_(f): void { var current = this; while (current) { print(current.key); var left = current.left; if (left) left.traverse_(f); f(current); current = current.right; } }; } // End class } // End package var splashPlayer = new Splayer(); splashPlayer.playerSetup(); splashPlayer.playerRun(); splashPlayer.playerTearDown();
{ "pile_set_name": "Github" }
45 comments: That fiction is dead is an assessment that's been around a while. It's not nearly as good anymore. Why? Has the talent fled to other fields, such as nonfiction? (Talking pre-Internet here) Is the internet just putting the final nail in? Is there nothing to write about? Writers of fiction can talk about their craft in such interesting and engaging ways. I knew a mother and son who were both writers. The mother wrote fiction, the son nonfiction. Their debates about autobiographical writing vs fiction were very interesting. Still, not such interesting fiction is actually being produced. Am I wrong? Up until about three years ago, I almost exclusively read for information, not for pleasure. I made a deliberate effort to read fiction, interspersing the classics that my incompetent English teachers/professors failed to require. I would still rather read a dictionary or atlas than a novel (or anything by McCollough), but I have enjoyed some excellent fiction. I've also read a bunch of crap. If something doesn't hold my interest past 40 pages, I'm done. I simply walk down the aisles of the library and pull out random books. If I like one, I read other stuff by the same author. Fiction these days seems to be written with one eye on a movie deal. Classics developed the character, with the plot as a backdrop. Contemporary fiction seems to use the characters as the backdrop to the plot. Action is key. Do those of you who reject fiction literature also reject fictional movies and television programs? I used to read fiction almost exclusively, but now I rarely read it at all. I adore fictional movie though. There's a time investment difference. If I watch a bad movie, I've usually spent about ninety minutes, and I've probably watched it with someone else, so that leads to discussion, and it's a social activity. If I read a bad book, the time spent is significantly longer, and the activity is solitary. If I'm not going to know more about actual things by the end of the book, it has to be extremely good to warrant that investment. Of Roth's work, I've only read Sabbath's Theater. I loved it. NB it's filthy-- an apotheosis of smut-- & potentially very offensive to some women (like that judge who would've refused him the prize, but not me). You know, just because David McCullough takes a shit and prints it, doesn't mean it's Tacitus. Reams of "history" are printed every year-- including a good number of bestsellers--which are forgetable crap. Even malarkey. And spinning 'new' interpretations, yadda yadda, that have been the bread and butter of historians for generations. Like every time an Englishman writes a new book on Napoleon (the *definitive* volume, natch). Hint: he was just like *Hitler*! Seldom do I hear anybody enthusing about dragging down the Plutarch off the shelf. In all sobriety: most of this stuff is just Tom Brokaw Goes To Print. "Historians" endlessly aping the manners of television; all that Cecil B. DeMille pseudo-gravitas, that *uncleanliness* in the intellectual sense. Even those hefty WWII tomes: Antony Beevor or "Absolute War". Fascinating stuff, yes. But tear it apart long enough and you ask-- does it really get to something new? Does it even model the real excellences that all writing-- that *history* writing-- should exemplify? This chest-beating "I read some history the other day and it was great!" is a constant through many threads, and I feel the need to throw a conscientious satiric salvo against it. These books are fine to read for an evening, or whatever it takes to get through them. But guess what: they don't *stay*. In fact, their arguments are as liable to fall apart as the plots of bad fiction. I know the style well enough: that endless anecdotage; "now Truman ballsed up and said to him--"; "now here's another sob story of a Russian artist, this time in theatre, who also fell afoul of the NKVD . . ." All true, perhaps. Part of our world. But this *preening* over reading it-- this silly lack of skepticism over the individual facts; this *facility* in yielding wholeheartedly to the latest new interpretation (ie whatever the Book Barn put out on the shelf/your daughter bought you for Father's Day/Tim Russert's 2nd cousin thrice removed went on tv and told you to read. I'll fall back on "Absolute War" one more time: heavy, fascinating, couldn't have a more tragic subject matter, or an epic one. But I rate it a dude. It takes up again and again the campaigns and makes them incomprehensible. It takes the tragic stories of many individuals and, time and again, has to tell us them, and makes of them an anecdotal sob story. Stalin didn't know the half of it: a million people's deaths,--each told individually-- that too, is a statistic. Read fiction. We'll be smarter. Anyway, there's Thucydides. Old men reading McCullough is like teenyboppers reading Libba Bray. Gibbon, Macaulay and Frazier (The Golden Bough) are in the public domain and all beyond awesome. Mostly I read fiction though. The funny thing is that the fiction I read and enjoy is genre stuff that would be looked down upon by most of civil society. Recently I read Master of the Senate by Caro and Nixonland by Perlstein. Both are highly readable but I was a bit disappointed by Caro. I've read most of Shakespeare's plays, mostly in school but some on my own, and I've read a lot of other important literature because I thought it important. Plus, I enjoyed it. But when I break out literary references, I usually feel like Dennis Miller on Monday Night Football. Most people just don't care about literature, and I don't really blame them. There's not much money in being well-read. I don't read any fiction either. I don't listen to much music and I never go to art galleries, either. I've been to the opera once in my life and fell asleep. If the fine arts disappeared from the face of the earth, it would affect me not at all. The real world is far more interesting. Euler's Identity and the Maxwell Equations impart more truth and beauty than all the artists who ever lived.
{ "pile_set_name": "Pile-CC" }
Q: Can a c++ compiler and includes be in one drive (system drive) and the code files themselves (.cpp) be at another? Can I use my home drive as a place where the compiler and its files (and includes) are placed/installed, but use a different drive for my c/cpp source files? For example, gcc and includes are in /usr/, while source/code files are on another drive. I tried importing the necessary includes using #include "/usr/include/stdlib.h" etc. but it didn't work because adding just stdlib wasn't enough and it showed: cannot open source file "stdarg.h" (dependency of "stdio.h") I'm using Ubuntu 18.04, VSCode. EDIT: The problem was solved by manually adding the includes path to the configuration file, c_cpp_properties.json. A: Don't specify absolute paths in the include directive! If you want to include header files from other locations than the default paths you can use the pre-procecessor’s -I flag, multiple times if necessary. Pretty much all modern C and C++ compilers have embedded pre-processors, so you can simply specify the flag in the normal compiler command line: cc [options...] -I/your/header/search-path -I/another/header/search-path [more options...] [source files...] For more info see the GCC manual section on “Options for Directory Search” or equivalent sections of your C or C++ compiler’s manual. make-based build systems will typically pass pre-processor, C compiler, and C++ compiler flags via the CPPFLAGS, CFLAGS, and/or CXXFLAGS environment variables respectively: CPPFLAGS="$CPPFLAGS -I/your/header/search/path" make If your project uses a different build system please consult its documentation. You can ask more specific questions about compiler and build system instrumentation over on Stack Overflow as they’d likely be off topic here.
{ "pile_set_name": "StackExchange" }
Author Topic: Winning (Read 21614 times) Let's say it wasn't a house, it was some family jewelry that the OP gave to her daughter. Would you object to taking precautions that the husband couldn't walk off with half of it, in case the marriage did founder? As much of a romantic as I am, I see no problem with a parent saying, "I am going to give you a gift, and I want to make steps that this gift is always yours, come hell or high water." Otherwise, I think one would be objecting to nearly all premarital financial planning, since that should always consider what happens if the marriage ends, as much as we hope it doesn't. I would be very upset if I gave my child something as expensive as a home, to ensure her security, only to find her (let's say) cheating, abusive soon-to-be-ex was going to end up with at least half of it, and she would be, basically, out on the street. Proper planning is essential, though, to eliminate that possibility. Logged My cousin's memoir of love and loneliness while raising a child with multiple disabilities will be out on Amazon soon! Know the Night, by Maria Mutch, has been called "full of hope, light, and companionship for surviving the small hours of the night." Let's say it wasn't a house, it was some family jewelry that the OP gave to her daughter. Would you object to taking precautions that the husband couldn't walk off with half of it, in case the marriage did founder? As much of a romantic as I am, I see no problem with a parent saying, "I am going to give you a gift, and I want to make steps that this gift is always yours, come hell or high water." Otherwise, I think one would be objecting to nearly all premarital financial planning, since that should always consider what happens if the marriage ends, as much as we hope it doesn't. I would be very upset if I gave my child something as expensive as a home, to ensure her security, only to find her (let's say) cheating, abusive soon-to-be-ex was going to end up with at least half of it, and she would be, basically, out on the street. Proper planning is essential, though, to eliminate that possibility. I don't think it is the same. You live in a house together, pay taxes together, maintain it, mow the lawn ... Also, it is entirely possible the marriage could end because the wife is abusive and or cheating. Men are not the de facto villains. Let's say it wasn't a house, it was some family jewelry that the OP gave to her daughter. Would you object to taking precautions that the husband couldn't walk off with half of it, in case the marriage did founder? As much of a romantic as I am, I see no problem with a parent saying, "I am going to give you a gift, and I want to make steps that this gift is always yours, come hell or high water." Otherwise, I think one would be objecting to nearly all premarital financial planning, since that should always consider what happens if the marriage ends, as much as we hope it doesn't. I would be very upset if I gave my child something as expensive as a home, to ensure her security, only to find her (let's say) cheating, abusive soon-to-be-ex was going to end up with at least half of it, and she would be, basically, out on the street. Proper planning is essential, though, to eliminate that possibility. I don't think it is the same. You live in a house together, pay taxes together, maintain it, mow the lawn ... Also, it is entirely possible the marriage could end because the wife is abusive and or cheating. Men are not the de facto villains. Well, I used daughter and husband, because that is the OP's situation. It would be the same principle if I wanted to give a house to my son, and prevent it from ending up entirely in the hands of my ex-DIL. Logged My cousin's memoir of love and loneliness while raising a child with multiple disabilities will be out on Amazon soon! Know the Night, by Maria Mutch, has been called "full of hope, light, and companionship for surviving the small hours of the night." Heck, if my kid were not getting married, and I were going to buy him something as big-ticket as a house, in one fell swoop, I'd probably put it in a trust. I'm not handing over THAT much in assets to someone who isn't actually going to *earn it* (big diff. in how people normally pay for such a huge purchase; they may not have as much at stake, for example) without making sure that creditors, future spouses, etc., can't siphon it off. and there's where a financial *planner* can help, because maybe that person would say, "put a time expiration on it--after 7 years, it becomes theirs wholly, or whatever." And then the disposition of the house in terms of spouses is the adult child's problem I have to agree with doodlemoor. With this sum of money, you need a qualified professional trained especially in financial planning. An accountant is not qualified. If anything happens with your Dd's relationship, do you want him having so much info about your personal finances? It might be best to stop planning for the end of her daughter's marriage/relationship. It is wise planning especially in terms a large amount of finances. No one knows what will happen. I have to agree with doodlemoor. With this sum of money, you need a qualified professional trained especially in financial planning. An accountant is not qualified. If anything happens with your Dd's relationship, do you want him having so much info about your personal finances? It might be best to stop planning for the end of her daughter's marriage/relationship. Well, it's something that has to be considered in financial planning. Even the happiest relationships may eventually founder, and it is the job of a good financial planner to take that into account. Since it would be awkward for the daughter's fiance to do this (and might even be considered conflict of interest), I agree with other posters that a neutral third party, with experience in dealing with windfall sums, is the best solution. Certainly, the OP should be able to afford one now! I think the suggestion of putting her house in a trust so that he doesn't get anything if they divorce is a bit OTT. If OP hadn't won the lottery and her DD was marrying a guy who was already planning to keep his house away from her in case of divorce, I'd be slightly disgusted. Again, wise financial planning. Why should he get any part of a house for which he did not pay and was basically a gift to the OP's DD? Let's say it wasn't a house, it was some family jewelry that the OP gave to her daughter. Would you object to taking precautions that the husband couldn't walk off with half of it, in case the marriage did founder? As much of a romantic as I am, I see no problem with a parent saying, "I am going to give you a gift, and I want to make steps that this gift is always yours, come hell or high water." Otherwise, I think one would be objecting to nearly all premarital financial planning, since that should always consider what happens if the marriage ends, as much as we hope it doesn't. I would be very upset if I gave my child something as expensive as a home, to ensure her security, only to find her (let's say) cheating, abusive soon-to-be-ex was going to end up with at least half of it, and she would be, basically, out on the street. Proper planning is essential, though, to eliminate that possibility. I have to agree with doodlemoor. With this sum of money, you need a qualified professional trained especially in financial planning. An accountant is not qualified. If anything happens with your Dd's relationship, do you want him having so much info about your personal finances? It might be best to stop planning for the end of her daughter's marriage/relationship. Well, it's something that has to be considered in financial planning. Even the happiest relationships may eventually founder, and it is the job of a good financial planner to take that into account. Since it would be awkward for the daughter's fiance to do this (and might even be considered conflict of interest), I agree with other posters that a neutral third party, with experience in dealing with windfall sums, is the best solution. Certainly, the OP should be able to afford one now! I think the suggestion of putting her house in a trust so that he doesn't get anything if they divorce is a bit OTT. If OP hadn't won the lottery and her DD was marrying a guy who was already planning to keep his house away from her in case of divorce, I'd be slightly disgusted. Again, wise financial planning. Why should he get any part of a house for which he did not pay and was basically a gift to the OP's DD? because he will live there, help maintain it, help pay property taxes, help clean it, help with upkeep ... Let's say it wasn't a house, it was some family jewelry that the OP gave to her daughter. Would you object to taking precautions that the husband couldn't walk off with half of it, in case the marriage did founder? As much of a romantic as I am, I see no problem with a parent saying, "I am going to give you a gift, and I want to make steps that this gift is always yours, come hell or high water." Otherwise, I think one would be objecting to nearly all premarital financial planning, since that should always consider what happens if the marriage ends, as much as we hope it doesn't. I would be very upset if I gave my child something as expensive as a home, to ensure her security, only to find her (let's say) cheating, abusive soon-to-be-ex was going to end up with at least half of it, and she would be, basically, out on the street. Proper planning is essential, though, to eliminate that possibility. I don't think it is the same. You live in a house together, pay taxes together, maintain it, mow the lawn ... Also, it is entirely possible the marriage could end because the wife is abusive and or cheating. Men are not the de facto villains. Well, I used daughter and husband, because that is the OP's situation. It would be the same principle if I wanted to give a house to my son, and prevent it from ending up entirely in the hands of my ex-DIL. If it is hers and he is entitled to nothing from it should she be entirely responsible for upkeep, taxes, lawn mowing, cleaning, etc? If we recommend making sure she gets all the value no matter what do we recommend making sure she gets all the work and responsibility? I have to agree with doodlemoor. With this sum of money, you need a qualified professional trained especially in financial planning. An accountant is not qualified. If anything happens with your Dd's relationship, do you want him having so much info about your personal finances? It might be best to stop planning for the end of her daughter's marriage/relationship. Well, it's something that has to be considered in financial planning. Even the happiest relationships may eventually founder, and it is the job of a good financial planner to take that into account. Since it would be awkward for the daughter's fiance to do this (and might even be considered conflict of interest), I agree with other posters that a neutral third party, with experience in dealing with windfall sums, is the best solution. Certainly, the OP should be able to afford one now! I think the suggestion of putting her house in a trust so that he doesn't get anything if they divorce is a bit OTT. If OP hadn't won the lottery and her DD was marrying a guy who was already planning to keep his house away from her in case of divorce, I'd be slightly disgusted. Again, wise financial planning. Why should he get any part of a house for which he did not pay and was basically a gift to the OP's DD? because he will live there, help maintain it, help pay property taxes, help clean it, help with upkeep ... Just because he lives there doesn't mean he is entitled to half of a house he did not contribute one penny to the purchase. Sure, he can get some increase in value after they are married - the difference in the value from marriage to the increase to whatever time. If a family member bought me a house, there is no way I would do anything to jeopardize the ownership of it. Years ago, my parents had both my sister and me on the title of the family home to prevent the house from going into probate and title would just transfer to us when they die. That worked perfectly until they found out that our husbands would be entitled to shares of the house. If one of us was divorcing, the value of the home could be attached as an asset to myself or my sister, forcing a payout to the ex. When they discovered this, they immediately changed it back to their names. My sister and I had to sign something and we had no problem doing so. My parents were protecting the asset for them and for us in the future. Why yes. And then she gets to charge her husband rent, for living in a house that he didn't spend a penny to buy. Logged My cousin's memoir of love and loneliness while raising a child with multiple disabilities will be out on Amazon soon! Know the Night, by Maria Mutch, has been called "full of hope, light, and companionship for surviving the small hours of the night." congratulations on your win, and I think you are making very sensible plans :-) I agree with those saying ignore your sister's comments initially, and if she renews her demands stick to 'that won't be possible' If she does persist, I would suggest(1) don't use words like, and stick to 'us' and 'our' when you talk about the money - so if she talks about you 'sharing' the money with her or her son, you make it very clear that she is asking you to GIVE her / nephew some of YOUR and YOUR HUSBAND'S money.(2) if she does persist, consider saying something along the lines of "We're really surprised that you would ask us for money. We have decided not to discuss our finances with anyone other than our financial advisor. If we feel we can give some of the money away, we will of course be prioritising our own immediate family. We don't anticipate being in a position to provide gifts to extended family members" It does highlight that she is asking you for money, not asking for 'her share' of a family asset. And do consider speaking to independent financial / legal advisors about the gifts you do give, and whether you want to attach conditions to any of them!
{ "pile_set_name": "Pile-CC" }
Sun Jul 29 01:00:00 EAT 2018 In the life of a mother working away from home Hot tip. Numerous studies have shown that the pressure society places on women to stay home and do what is “best for the child” is based on emotion, not evidence. Some data even suggests that having two parents working outside the home can be advantageous to a child’s development, particularly girls. By PHIONAH ATUHEBWE In Summary PARENTING BY REMOTE? While our jobs are exciting and it comes with, we ought to challenge society and its pressures, PHIONAH ATUHEBWE shares her experience. ADVERTISEMENT ADVERTISEMENT Dr Phionah Atuhebwe lives and works away from home. She shares her experiences. Last Sunday, I was in church trying to focus on my French and Lingala Holy mass or else I would lose the context. My phone rang off the hook, thanks to smart watches that will ensure you do not miss any call. It was my children’s nanny in Uganda calling. Having spoken to the children minutes prior to church, I sent a text that I was in church and she should only text me but the calls persisted and I had to walk out of church and return the call.On the receiving end, a small voice went “hello mummy, sorry, I know you were in church but a quick request, can we please go swimming? Now, that is parenting by remote. When did we get there again! However, any mother who works away from her children will tell you that the involvement in the small daily decisions is what keeps us going. Others’ reactionsOn almost a daily basis, I get the “Oh my God, don’t your children miss you? I would never be able to be away from my children”. The other version is the “okikola otya (how do you juggle all this)?” kind of comments. And of course the “aren’t you afraid your husband will cheat on you?” At the risk of being shot by chauvinists (if such a thing exists), I will tell you that my life as not only a working mother who lives away from my family, but one who travels most if not all the time, is intentionally lived and on no single day have I taken that guilt trip that society is willing to pay for, because of my work unlike many other working mums.The purpose of this to encourage mothers who work away from home ending up spending lots of time away from your children. Those who disagree, please do not read further.Science says…As a scientist, in God we trust, all others must bring data. I believe in evidence based information as opposed to sentiments.On that note, I have taken time to read and correlate my findings with what is happening in my life and this is what I have discovered.Numerous studies have shown that the pressure society places on women to stay home and do what is “best for the child” is based on emotion, not evidence.In 1991, more than 30 child development experts from leading universities initiated a comprehensive study on the relationship between child care and child development. They tracked over 1,000 children and followed them up for 15 years. In 2006, these were some of their findings. “Children who were cared for exclusively by their mothers did not develop differently than those who were cared for by others. There is no gap in cognitive skills, language competence, social competence, ability to build and maintain relationships, or in the quality of their mother-child bond.”However, (now pay attention) parental behavioural factors including fathers who are responsive and positive, mothers who favour “self-directed child behaviour,” and parents with emotional intimacy in their marriages - influence a child’s development two or three times more than any form of child care.If all this is abstract for you, just take away this one finding:“Exclusive maternal care (babies only looked after by mothers) was not related to better or worse outcomes for children. There is, thus, no reason for mothers to feel as though they are harming their children if they decide to work.” Despite the distance...Children need parental involvement, love, care, time and attention. But parents who work outside the home are still capable of giving their children a loving and secure childhood. Some data even suggests that having two parents working outside the home can be advantageous to a child’s development, particularly girls.Dear fellow working mothers, let society not put you under pressure, go out and make a difference in the world - for a better tomorrow of your children. What children need, is the reassurance of a loving environment and caretakers (reason why the nanny you choose is very very important”Coping mechanisms are many but above all, work on your marriages and let God do his job with the rest.
{ "pile_set_name": "Pile-CC" }
Section 1: General Election Patterns of Support Obama and Clinton both hold modest leads over McCain in a general election matchup; Obama has a 50% to 43% lead and Clinton holds a 50% to 45% edge. But Clinton draws more universal support among Democrats (89%) than does Obama (81%). Conversely, Obama leads McCain slightly among independents (49% to 43%), while McCain edges Clinton among this group by the same margin. There is no evidence that either Obama or Clinton attracts much support from Republicans. Obama and Clinton both show strength among younger voters and women. But there are demographic differences evident in their respective matchups with McCain. Obama leads McCain among 30-49 year-olds by 13 points, while these voters are divided almost evenly if the race is between Clinton and McCain. Both Democrats run about even with McCain among voters ages 50 and over. While women favor either possible Democratic nominee over McCain in a general election matchup, Obama fares somewhat better than Clinton among men. Obama runs even with McCain among all male voters (47% Obama to 46% McCain), but McCain holds a 51% to 43% advantage over Clinton among men. Obama’s Appeal to Independents Obama has much greater personal appeal to independent voters than does either McCain or Clinton. Fully 63% of independents rate Obama favorably, nearly twice the percentage expressing an unfavorable view of him (32%). The balance of opinion toward McCain also is favorable, but by a much slimmer 51% to 38% margin. The share of independents with an unfavorable view of Clinton is substantially higher (50%), while just 45% view her favorably. Roughly half of independent voters (51%) say they personally find Obama very likeable, which is far greater than the percentages saying they find either Clinton (18%) or McCain (13%) very likeable. A substantial minority of independents says that Clinton is not likeable; 37% express this view about Clinton, compared with 19% for McCain and just 8% for Obama. In a general election test against McCain, Obama runs slightly better than Clinton among most subgroups of independent voters. But he shows particular strength among younger and well-educated independents. Obama leads McCain by 21 points among independents under age 50 (58% to 37%); these same younger independents split their vote almost evenly in a race between Clinton and McCain (49% vs. 46%). In addition, Obama holds a slight 49% to 44% edge among independent college graduates by five points. Clinton trails McCain among this group by 13 points (41% to 54%). Obama also holds a 20 point lead over McCain among female independent voters (57% to 37%). Clinton’s edge over McCain among independent women is just three points (50% to 47%). Clinton Draws More Support Among Democrats The vast majority of Democratic voters say they would support either Obama or Clinton over McCain. But in an Obama-McCain matchup, 14% of Democratic voters say they would support McCain, compared with 8% who would do so if Clinton is the nominee. One-in-five white Democrats (20%) say that they will vote for McCain over Obama, double the percentage who say they would switch sides in a Clinton-McCain matchup (10%). Roughly the same number of Democrats age 65 and older say they will vote for McCain if Obama is the party’s choice (22%). Obama also suffers more defections among lower income and less educated Democratic voters than does Clinton. In addition, female Democrats look at the race differently depending on the matchup. While 93% of women in the party say they would vote for Clinton over McCain, just 79% say they would support Obama over McCain. A quarter of Democrats (25%) who back Clinton for the nomination say they would favor McCain in a general election test against Obama. The “defection” rate among Obama’s supporters if Clinton wins the nomination is far lower; just 10% say they would vote for McCain in November, while 86% say they would back Clinton. Obama’s Foreign Policy Challenge Obama suffers a significant number of defections from Democrats with more conservative foreign policy views, particularly on the issue of Iraq. A large majority of Democrats — 70% — say they want U.S. troops in Iraq to return home as soon as possible; these Democrats overwhelmingly favor either Obama or Clinton over McCain. But roughly a quarter of Democrats believes the troops should remain in Iraq until the situation has stabilized. These voters would support Clinton over McCain by greater than five-to-one (83% vs. 14%). Democrats who support maintaining U. S. forces in Iraq would support Obama over McCain by a smaller margin (66% to 31%). Similarly, concerns about Obama’s foreign policy among a minority of Democrats also cut into Obama’s standing. A quarter of Democratic voters believe that Obama would not be tough enough in his approach to foreign policy issues; about a third (32%) of these Democrats say they will vote for McCain if Obama wins the nomination. Just 13% of these same Democrats would switch sides if Clinton wins the nomination. Wary Republicans Rally to McCain There is little evidence that a significant number of Republican voters find either Obama or Clinton to be acceptable alternatives to John McCain — fully 87% back him in a contest against Barack Obama, and 91% back him if Clinton wins the Democratic nomination. Yet many Republicans are skeptical about McCain’s commitment to conservative positions. Overall, 38% of Republicans, including 46% of conservative Republicans, believe that McCain’s positions on issues are not conservative enough. But that perception does not appear to have hurt McCain’s image, or support, among GOP voters. Only a minority of Republicans (31%) believe that differences and disagreements within the party will keep many Republicans from supporting McCain. Instead, roughly six-in-ten (59%) say that the Republican Party will unite solidly behind McCain as their candidate. Notably, the belief that the party can unite behind McCain is equally widespread among both conservative (61%) and moderate and liberal (60%) Republicans. In fact, John McCain’s overall favorability rating among Republican voters has risen sharply, from 65% on the eve of the Iowa caucuses to 80% today. This increase has come across the ideological spectrum. Since late December, McCain’s favorability among conservative Republicans has increased from 66% to 81%, and it is up from 64% to 81% among moderates and liberals in the party. In fact, conservative Republican voters now rate McCain about as favorably as they do George W. Bush; 81% have a favorable opinion of McCain while 85% have a favorable opinion of Bush. McCain is held in substantially higher regard than the president among moderate and liberal Republicans (81% favorable vs. 63% for Bush). McCain Seen as Less Divisive Than Dole in 1996 The proportion of Republican voters who believe that their party will unite solidly behind John McCain (59%) exceeds the share of Republicans voters who thought that about Bob Dole in 1996 (47%). Just 31% now say that differences and disagreements in the party will keep many Republicans from supporting McCain, compared with 37% who said that about Dole in 1996. In 1992, Democrats were divided about prospects the party would unite behind Bill Clinton. Four years ago, an overwhelming proportion of Democrats expected the party to unite behind John Kerry. About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping America and the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of The Pew Charitable Trusts.
{ "pile_set_name": "Pile-CC" }
Main menu 625 tons of bread per yearBristol City goalkeeper Jojo Wollacott 625 tons of bread per yearBristol City goalkeeper Jojo Wollacott is Bath City loan target but injury holds up dealWe caught up with Romans boss Gary Owers after Friday’s defeat to Exeter City12:04, new balance 2017 15 JUL 2017Jojo Wollacott pulled on a Bath City shirt, briefly, new balance prix for cheap jerseys the Romans friendly against Bristol City last season (Image: Simon Howe) An injury has held up Bath City’s pursuit of Bristol City goalkeeper Jojo Wollacott.Over cheap football jerseys the past couple of weeks, Romans manager Gary Owers has said he had a goalkeeper tied up.However, the 20 year old shotstopper has picked up a knock, which has temporarily disrupted that timeline.In his stead, trialist Matt Cafer has played 120 minutes over City’s first two friendly games and made a solid impression.And whether Wollacott returns to fitness soon enough or not, Owers is keen on intra squad competition for the number one jersey, Nike Air Max 2018 homme which could mean good news for cheap jerseys china Cafer.”It’s not a secret, I’m in discussions with Bristol City about Jojo Wollacott,” the Romans boss said after Friday night’s 2 0 defeat to Exeter City.Bath City 0 2 Exeter City: Romans’ penalty hoodoo returns as Grecians take victory”Unfortunately he picked up a slight injury last week that set him back for ten days, so I’m waiting for him to get fit and see where that goes.”I like Matt, he’s done nothing wrong tonight, louboutin chine you can’t blame him for anything.”I’ve had a chat with him. final fantasy xiv sale I’d love two goalkeepers battling for one position, I’ve never Cheap Jerseys had that Wholesale NFL Jerseys before.”That would be a good situation for me, nike free 5.0 uomo grigio whether it’s a good situation for the goalkeepers I don’t know.”Even training, it’s much better having two goalkeepers around. I had young Adam [Forster] on the bench, who’s come on leaps and bounds, but he’s not ready yet.”City put on a decent showing against Exeter, who played two different teams in each half on Friday night.They had the chance to make the breakthrough when George Rigg was felled in the box, but Billy Murphy saw his spot kick kept out by Jason Hamon.The Grecians would go on to net two back to back goals but Owers was nevertheless pleased with the workout.”There was a little spell again where we got punished, and you will get punished playing against professionals and league opposition,” he said.”Exeter were good, young, full of enthusiasm, and Paul [Tisdale, adidas nmd homme manager] is renowned for the way he plays football.Dan Ball likely to secure deal at Bath City for the new National League South campaign”But I thought we matched them for most of the game, and again we had to do a little bit of reorganising and shuffling about, because we lost Dan [Ball], Nike Free Run 2.0 homme and Will [Christopher], Warning: Invalid argument supplied for foreach() in /var/www/vhosts/ritetoknow.org/wp-content/plugins/top-position-google-finance/top-position-google-finance.php on line 196
{ "pile_set_name": "Pile-CC" }
Helicopter aids in arrest of 3 fleeing Lynnwood police Herald Staff LYNNWOOD -- Three people with outstanding warrants were arrested late Friday night with a little help from above.Lynnwood police attempted to stop a Dodge Dakota pickup around 8:45 p.m. in the 15600 block of Highway 99, just outside of city limits.The driver took off, making his way from Highway 99 to Highway 405.The pickup headed past Bothell, Kirkland and Bellevue before stopping on a dead end street in Renton.The trio then walked to a fast-food restaurant where they were arrested.The King County Sheriff's Office helicopter Guardian One was used to keep an eye on the pickup after patrol cars stopped their pursuit, Lynnwood police spokeswoman Shannon Sessions said.The driver was arrested for attempting to elude police and possession of a controlled substance as well as warrants.The Washington State Patrol and Renton police also assisted Lynnwood police, Sessions said. Share your comments: Log in using your HeraldNet account or your Facebook, Twitter or Disqus profile. Comments that violate the rules are subject to removal. Please see our terms of use. Please note that you must verify your email address for your comments to appear.
{ "pile_set_name": "Pile-CC" }
"Darryl is a proven veteran defenseman who brings a great deal of character and leadership abilities to our group,” said Co-General Manager Les Jackson. "He is obviously a player we are very familiar with and we are excited to welcome him back to the Stars. On the other side of the coin, we thank Philippe Boucher for everything he’s done for the Dallas Stars organization the last few years, and we wish him the best with the Penguins." Sydor, who had a goal and an assist in eight games for the Pens this season, signed as a free agent with Pittsburgh in 2007. If he had gotten his way, though, he would have remained in Dallas. "I didn’t want to leave," he said. "I have a lot of roots there, and we love Dallas. It is just a dream come true to be able to put that jersey back on. I think the reason why (I was not re-signed by the Stars) was a cap issue. That’s the way it is; it’s the way the system works. There are no hard feelings. I’m very excited to be back." Now that he's in Dallas, Sydor is eager to show he can still play at a high level. "Being 36, some people might say your skills have diminished, but I think I bring experience and intangibles," Sydor said. "I feel I can play. I felt really good in Detroit the other night (with the Penguins) and got to play a few more minutes. I believe I can play; I think I showed it last year when I sat for so long and got thrown into the Stanley Cup Final. I have positive thoughts that I can still play this game for many more years." Niittymaki continued his dominance over Atlanta on Sunday, moving to 11-0-0 lifetime against the club with a 4-3 victory at the Wachovia Center. Niittymaki also started against the Thrashers on Oct. 28, when the Flyers cruised in a 7-0 rout. "It's a remarkable run that he has," Stevens said. "He really was strong tonight and we knew he would have to be. I thought he was terrific down the stretch to keep the streak alive." Seriously, though, what is it about Atlanta? ''I really don't know, I just feel comfortable playing against them,'' said Niittymaki, who finished with 29 saves to help end the Thrashers' five-game win streak. ''There's no magic. Hopefully it stays that way.'' Don't bother bringing up Niittymaki's lifetime success against the Thrashers with Atlanta coach John Anderson. He's not buying it. ''He played decent tonight,'' Anderson said of Niittymaki, who faced 21 saves in the third period. ''I don't think he was the difference. I don't take any stock in that.'' Last man standing -- The Chicago Blackhawks gave the San Jose Sharks everything they had Sunday night, but were unable to stand toe-to-toe with one of the League's true powerhouses for a full 60 minutes. Devin Setoguchi broke a 5-5 tie with 4:15 remaining in the third period, lifting the Sharks to a wild 6-5 victory at the United Center. San Jose now has won its last 12 meetings with Chicago and improved to 15-3-1 on the season, while the Blackhawks lost in regulation at home for the first time in 2008-09. "It was one of those crazy nights when the last guy standing wins," Sharks goalie Brian Boucher said. "You got to win all different ways. Two points is two points. And on the road against a team that hasn't lost (at home) in regulation, it's a nice win for us." The main reason why the Blackhawks came up short Sunday? Well, one could certainly point to their deficiencies on the penalty kill. San Jose went 4-for-6 on the power play. "I'm not happy at all with the way this thing ended," Chicago coach Joel Quenneville said. "They're a good team. We had them where we wanted them and let them off the hook. We were gracious." Better than nothing -- It didn't go as well as he had hoped, but Rick Tocchet's debut as an NHL head coach could have been worse. In the end, his Tampa Bay Lightning earned a point in the standings with Sunday's 3-2 shootout loss to the Carolina Hurricanes at the RBC Center. With his team locked in a 2-2 tie, Tocchet watched as the Lightning dominated the tempo in the third period. While they were unable to grab the lead, the Lightning outshot Carolina 8-1 in the third. ''It's a step in the right direction,'' said Tocchet, who replaced Barry Melrose on Friday. ''I thought the guys played well, I think they're really starting to get what we're trying to do here.'' Tocchet's first order of business was to reunite the line of Vincent Lecavalier, Martin St. Louis and Vaclav Prospal. The move paid immediate dividends, as Lecavalier and St. Louis scored the team's goals in regulation. It marked the first time this season Lecavalier and St. Louis scored in the same game. ''This is our first crack at it,'' St. Louis said. ''I thought he did a good job. I wish we had a better outcome, but I thought we stuck together. We battled hard.'' No goals for you! -- The Anaheim Ducks have come up with a plan to consistently defeat the Los Angeles Kings. Don't allow any goals. Ever. Jonas Hiller made 29 saves for his first NHL shutout Sunday night, leading the Ducks to a 2-0 win against their rivals at the Honda Center. In the previous meeting Nov. 4 in Los Angeles, Chris Pronger scored in overtime to give the Ducks a 1-0 victory. "It feels great. That's what I work for every practice -- stop as many pucks as possible, and today I stopped them all," said Hiller, who made his 29th career NHL appearance. Hiller got in a groove early as he stopped 14 shots in the opening period. The scoreless tie wasn't broken until midway through the second, when Corey Perry beat Erik Ersberg. Bret Hedican made it 2-0 in the third with his first goal in 13 months. ''It's easier to get in the game when you get some shots at the beginning and move around and get the confidence -- especially when you don't play that much," Hiller said. "I've been looking to get more starts than last year, but I'm happy to be able to play this many so far. Hopefully I can keep playing good enough to get some more.'' Meanwhile, the Kings are working on the recipe to solve the Ducks. ''If you don't score, you don't win,'' Ersberg said. ''(Hiller) played good in net at the other end, so it happens. We played a good team tonight and we gave it our best effort. Maybe we ran out of gas at the end. It was like this the last game, too. We couldn't get the puck in the net.'' "Being 36, some people might say your skills have diminished, but I think I bring experience and intangibles. I feel I can play. I think I showed it last year when I sat for so long and got thrown into the Stanley Cup Final. I have positive thoughts that I can still play this game for many more years."-- Stars defenseman Darryl Sydor Kovalev went to the forehand, then pulled the puck back to his backhand and lifted the shot high over Legace, lifting the Habs to a 3-2 victory at the Scottrade Center. ''I knew he was going there, too,'' Legace said. ''I was just slow to react to it. He's a good player and can put it where he put it, probably two feet over my pad. Not too many guys can pull it that quick and bang, in the back of the net.'' Christopher Higgins agreed about Kovalev, who had the lone goal in the shootout after receiving more than 25 minutes of ice time Sunday. ''It was a pretty sweet deke,'' Higgins said. ''I don't think anyone expects less from him right now because he's such a skilled player.'' Contact Brian Compton at: [email protected]. Material from wire services and team web sites was used in this report.
{ "pile_set_name": "Pile-CC" }
We specialize in the 2001-2006 USDM, JDM, EDM Lancer Evolution Evo VII-IX as well as the 2008-2012Evo X GSR, MR and 2009+ Ralliart turbo. We are the home of the world's most experienced and recognized Lancer Evolution engine ECU tuner. TTP is your one stop source for performance parts, maintenance, engine building, fabrication and ECU tuning in one location. We are also a MUSTANG DYNO AWD-500 dynamometer facility! You can find everything you need for your Lancer Evolution in our Online Store. 10/21/2011 - Hurell's 2.4L, 4g64, MIVEC, twin scroll, front facing PTE 6265 on E85 ethanol fuel and twin walbro fuel pumps with tuning from Master Pro ECU tuner Scott Davis deliver a potent dose of horsepower and torque. 778whp and 578tq at the low boost setting of 32psi! Hurell plans on amping up the fuel system to supply more volume before heading back to the dyno for 800whp+! On the dyno Jeff's 2005 Lancer Evolution GSR laid down an astounding 572whp on the stock engine in 95*F heat and high humidity. With his recently traded FPBlack journal bearing turbo, his new boost pressure was delivered by a journal bearing, air cooled, PTE 5857. Packing more potential behind it, at a lower boost level, Jeff's GSR was able to deliver the power needed for him to reach his goals of a 10 second pass in the quarter mile.
{ "pile_set_name": "Pile-CC" }
Q: Colouring an n times n grid using n colours Inspired by the four colours puzzle. The goal is to color the squares of an $n\times n$ grid with $n$ colors such that All squares are coloured. no two squares of the same color touch at an edge or corner there are an equal number of squares of each color. For which values of $n$ is this possible? A: It's possible if and only if $n$ is not $2$ or $3$. Proof is as follows. $n\leq3$ It's trivially possible for $n=1$. It's impossible for $n=2$ and $n=3$, because four distinct colours are needed in order to colour any $2\times2$ square in such a way that no two cells of the same colour meet at an edge or vertex. $n>3$ Let the first row of the $n\times n$ block contain one cell of each colour. Let the second row contain the same colours in the same order but cycled round by two places (e.g. ABCDEF -> CDEFAB). Keep on filling in each row in this way until you reach the bottom of the $n\times n$ block. For example, with $n=7$ we have A B C D E F G C D E F G A B E F G A B C D G A B C D E F B C D E F G A D E F G A B C F G A B C D E
{ "pile_set_name": "StackExchange" }
Right ventricular mechanics: a comparison of models. Using data from an isolated supported cat right ventricle preparation, we investigated the following models or methods for characterising the mechanical function of the ventricle: (1) a pressure generator in series with an internal impedance; (2) a variable elastance in series with an internal, pressure dependent flow resistance; (3) pulse response analyses, theoretically based on the pressure response to a small volume step of short duration; and (4) geometric mapping of the variables pressure and volume as functions of time. We tested the reproductive and predictive strengths of the four models, and found that all methods could reproduce 50% of the observed pressure curves with an RMS error less than 0.2 kPa, and in most cases also gave a close prediction of pressure curves which were not used to establish the respective model parameters. We see this as one reason for the fact that no single ventricular model has yet been universally accepted.
{ "pile_set_name": "PubMed Abstracts" }
4 min Demo of Zerto Analytics | Truth in IT Here's a demo of Zerto's Virtual Replication 5.5 with Zerto Analytics. This helps with predictive monitoring and maintenance of your Zerto environment. Check out the demo and the transcript here below. Transcript: Okay, so, to get to your My Zerto po... 4 min Demo of Zerto Analytics Here's a demo of Zerto's Virtual Replication 5.5 with Zerto Analytics. This helps with predictive monitoring and maintenance of your Zerto environment. Check out the demo and the transcript here below: Okay, so, to get to your My Zerto portal, if you don't know, you go to www.zerto.com/myZerto, or you can scroll all the way down to the bottom, and you will see a myZerto link down here. That will bring you right into the myZerto portal. Once you're here, in the MyZerto portal, you can click on the analytics button on the top right, and we'll see that we have this big, large, QA Dev SE environment of Zerto, so there's a lot of things going on. You can see in this map in the center. I can zoom in and see everything if I want to. Really scroll in and zoom in and out. You can do the same thing here. I can zoom these in. But what's really, really cool, is on the left, I have all these different environments, so if I'm looking for something in particular that I know is an AWS environment, the map will automatically zoom to where we want to go, and I can troubleshoot if I need to, or just look at the status. But this is a really, really powerful way, as Rob said, to show everything across all of your sites, all at the same time. Average RPO across all my sites, and then I can drill down into them and say, even though these ZVMs aren't paired, how is everything related, and maybe not related, so I can troubleshoot a little easier. I have my alerts and tasks, so if I click on these and view them, that will pop me back over to this monitoring tab, but we'll look at that in a second. So, I click on the VPGs, and I can actually look at all the different alerts and warnings, and health of everything. I can filter these, and I can also sort by any of these names over here. So, for example, if I uncheck the warnings and errors, I can look at all my healthy ones and look at RPOs. But it does give me a chance to look at some of my sites that might be disconnected. And because people actually shut down their labs all the time here when they're doing tests, so if they've been disconnected and certain things are happening, then they won't actually affect that average RPO that's on the main dashboard. But if a site gets disconnected for a certain amount of time, it actually will remove itself from that average. That's just to not bring your averages down, or higher, I guess. But it's a really effective and impactful way to look at all of your information, search, filter. And then the monitoring tab will show you all of these alerts, and as you click into them, you can see a popup comes up from the right side, and gives you data on what's going on with that particular alert. And then we also have tasks, so if anything ongoing, anything that's failed, completed, the statuses, so you get a really, really good view into what's going on in your environment. Then lastly, on the top right, that Rob mentioned, this coming soon is going to go away, and you'll be able to click there. And when you click on the reports tab, this is where you'll come. Into the reports section. And we see our virtual protection groups here. We can sort by a couple of different things, RPO history, journal history, but I can really look into all of my VPGs and check out the help, for example. So, what I'm trying to show you is something that's been up and running for a little while. I can look at different times and apply that so it stretches out my calendar, but this one hasn't been running for very long. But what you see is when that SLA [inaudible 00:03:25] has been missed, or it's not being met, you'll see that data here. You can look at percentages of how much has met that SLA versus hasn't. And I can do the same with RPO journal history, and look at different things within the journal, and what's been going on with the journal, journal sizing and retention. So this is being built out, and lots of new features coming, constantly. So, a lot of upgrades always happening and deploying out. So, thank you very much, and enjoy the rest.
{ "pile_set_name": "Pile-CC" }
x(c) be the first derivative of b(c). Factor x(f). f**2*(f - 1)*(f + 1) Let v(b) = -b**3 + 36*b**2 - 72*b + 53. Let o(j) = -18*j**2 - 9*j + 16*j - 27 + 29*j. Let m(x) = 5*o(x) + 3*v(x). Suppose m(g) = 0. Calculate g. 2 Let x be (-2 - (-61)/12) + -3. Let t(q) be the second derivative of -1/48*q**4 + q - 1/8*q**2 + 0 - x*q**3. Factor t(m). -(m + 1)**2/4 Let h(p) be the third derivative of -p**8/336 - p**7/210 + p**6/120 + p**5/60 + 29*p**2. Suppose h(y) = 0. What is y? -1, 0, 1 Let y be 143/26*(-2)/3. Let g = y - -13/3. Factor 0*j - g*j**2 + 0 + 4/3*j**3. 2*j**2*(2*j - 1)/3 Solve -2*o**2 + 3 + 0*o**2 + 3*o + o**2 - o = 0. -1, 3 Let m be (-27)/(-54) + 1 + 10/4. Let j(w) be the second derivative of 3*w + 0*w**2 + 0 + 1/6*w**m + 0*w**3. Let j(a) = 0. Calculate a. 0 Let h(u) be the second derivative of -u**8/1680 + u**7/840 + u**3/6 + u. Let n(d) be the second derivative of h(d). Let n(a) = 0. Calculate a. 0, 1 Let u be ((-1)/(-2))/(6/(-36)). Let a = u - -5. Find x, given that -2*x**5 + 0*x**4 + 6*x - 4*x**2 - 4*x**3 + 6*x**4 + 0*x**4 - a = 0. -1, 1 Let t = -1317 - -4027/3. Solve t*m + 8/3 + 361/3*m**3 + 254/3*m**2 + 224/3*m**4 + 49/3*m**5 = 0. -2, -1, -2/7 Let z(n) be the first derivative of 0*n + 1/3*n**2 - 1/6*n**4 + 1/9*n**3 - 1/15*n**5 - 3. Factor z(g). -g*(g - 1)*(g + 1)*(g + 2)/3 Suppose 5*i + 0 + 5 = 0. Let q be -3 - 40/(-12) - i. Factor 0*j**2 - q*j**3 + 0*j - 2*j**4 + 0. -2*j**3*(3*j + 2)/3 Let h be (-6 - 63/(-33))/(6/(-4)). Find k such that -18/11*k**4 + h*k**3 + 2/11*k - 14/11*k**2 + 0 = 0. 0, 1/3, 1 Factor -1/6*g**2 + 0 + 1/6*g. -g*(g - 1)/6 Let x be (-1)/(((-15)/12)/5*14). Factor -x + 4/7*a - 2/7*a**2. -2*(a - 1)**2/7 Let d(u) be the third derivative of -u**5/12 - 5*u**4/8 + 64*u**2. Factor d(v). -5*v*(v + 3) Let j(z) be the first derivative of 1/12*z**4 - 1/3*z - 1/3*z**3 + 2 + 1/2*z**2. Let j(r) = 0. What is r? 1 Let l(f) be the second derivative of 5/2*f**5 + 8*f - 12*f**2 - 56/3*f**3 - 55/6*f**4 + 0. Factor l(i). 2*(i - 3)*(5*i + 2)**2 Let q be ((-28)/210)/(6/(-10)). Find f, given that -2/3*f**3 + 0 - q*f + 2/3*f**2 + 2/9*f**4 = 0. 0, 1 Let k = -1/53 + 55/106. Let y(u) be the first derivative of 1/10*u**5 - 1 - k*u**2 + 1/4*u**4 + 0*u**3 - 1/2*u. Let y(a) = 0. Calculate a. -1, 1 Let m(f) = f - 1. Let g(j) = j**2 - 4*j + 3. Let t(y) = 3*g(y) + 6*m(y). Factor t(h). 3*(h - 1)**2 Let p(g) = g**2. Let o be p(2). Let m(r) be the second derivative of 0*r**2 + 2*r - 1/75*r**6 + 0*r**5 + 0 + 1/30*r**o + 0*r**3. Factor m(a). -2*a**2*(a - 1)*(a + 1)/5 Let l(n) be the first derivative of n**9/4536 - n**8/1260 + n**6/270 - n**5/180 - n**3 - 3. Let k(g) be the third derivative of l(g). Factor k(q). 2*q*(q - 1)**3*(q + 1)/3 Let g(x) = -11*x**2 + 6*x - 8. Let s(r) = 12*r**2 - 7*r + 6. Let u(q) = 3*g(q) + 4*s(q). Factor u(l). 5*l*(3*l - 2) Let s(r) = 8*r**2 - 8*r - 7. Let g(l) = l**2 - l - 1. Let t(w) = 28*g(w) - 4*s(w). What is d in t(d) = 0? 0, 1 Let x(s) be the first derivative of -s**5/25 + s**4/10 - s**3/15 - 7. Suppose x(i) = 0. What is i? 0, 1 Factor 2/7*z + 2/7 - 2/7*z**2 - 2/7*z**3. -2*(z - 1)*(z + 1)**2/7 Let b = 24545/53361 - -2/5929. Let c = b - 1/63. Solve -c + 2/3*p - 2/9*p**2 = 0 for p. 1, 2 Let x(k) be the first derivative of -k**4/18 - k**3/9 + 8*k - 8. Let t(g) be the first derivative of x(g). Suppose t(r) = 0. What is r? -1, 0 Let i be (-40)/16*2/(-1). Factor 2*h**4 - 9*h**2 - 4*h**3 + 2*h**4 + 4*h**i + 5*h**2. 4*h**2*(h - 1)*(h + 1)**2 Let g = 2 + -1. Let h = -4 + 6. Determine x so that -2 + h*x - g + 2*x**2 - 1 = 0. -2, 1 Let k be (-62)/(-14) + 6/(-14). Let r = k + -5/2. Determine v so that 5/2*v**2 - v**5 - 3/2*v**4 + 5/2*v**3 - 1 - r*v = 0. -2, -1, -1/2, 1 Let k(g) be the third derivative of 1/24*g**3 + 1/80*g**5 - 1/480*g**6 + 0*g + g**2 - 1/32*g**4 + 0. Solve k(v) = 0. 1 Let a(g) be the second derivative of -g**5/120 + g**4/48 - g**2 + 4*g. Let z(h) be the first derivative of a(h). Determine y, given that z(y) = 0. 0, 1 Factor 4/3*z**2 + 2/9 - 8/9*z**3 - 8/9*z + 2/9*z**4. 2*(z - 1)**4/9 Let f(b) be the first derivative of -4*b**5/5 - 4*b**4/3 - 4*b**3/9 + 2. What is w in f(w) = 0? -1, -1/3, 0 Let a(m) be the first derivative of -m**5/5 - m**4/4 + 2*m**3/3 - 17. Factor a(y). -y**2*(y - 1)*(y + 2) Let z(y) = 3*y**2 + 2 - 4*y**2 + 2*y + 0*y**2 + 4*y. Let d be z(6). Factor 4/3*p**d - p - 1/3. (p - 1)*(4*p + 1)/3 Let l(k) be the second derivative of -k**6/1440 - k**5/480 + k**4/48 - 2*k**3/3 + 3*k. Let b(a) be the second derivative of l(a). Suppose b(v) = 0. What is v? -2, 1 Let r = 31 - 31. Suppose r + 4/3*i + 2/3*i**2 = 0. Calculate i. -2, 0 Determine c, given that -60*c + 45*c**5 + 118*c**2 + 4 + 4*c**5 + 4 - 126*c**4 + 11*c**3 = 0. -1, 2/7, 1, 2 Let b(p) be the second derivative of -p**2 + 0 + 1/150*p**5 - p + 1/15*p**3 - 1/30*p**4. Let a(r) be the first derivative of b(r). Find m such that a(m) = 0. 1 Factor 1/4*a + 1/4*a**3 + 0 - 1/2*a**2. a*(a - 1)**2/4 Solve 2/11*u**4 - 2/11*u + 2/11*u**3 - 2/11*u**2 + 0 = 0 for u. -1, 0, 1 Let c(q) be the first derivative of 1/4*q**2 - 5 + 1/12*q**3 - 3/4*q. Factor c(w). (w - 1)*(w + 3)/4 Factor 2/9 - 2/3*k**4 - 2/3*k + 2/9*k**5 + 4/9*k**3 + 4/9*k**2. 2*(k - 1)**4*(k + 1)/9 Let w(k) be the second derivative of 1/18*k**4 - 2/27*k**3 + 0*k**2 + 3*k + 0 - 1/90*k**5. Factor w(g). -2*g*(g - 2)*(g - 1)/9 Let y be -4*3*4/(-72). Factor 0*x**2 + 0 - 2/3*x**3 + y*x. -2*x*(x - 1)*(x + 1)/3 Let y(f) be the second derivative of -3*f**7/8 + 9*f**6/10 - f**5/4 - 5*f**4/8 + f**3/8 + f**2/4 + 15*f. Let y(p) = 0. What is p? -1/3, -2/7, 1/3, 1 Let l(k) = -k**2 + 2*k - 7. Let p(d) = -6*d**2 + 10*d - 36. Let y(f) = 16*l(f) - 3*p(f). Suppose y(g) = 0. What is g? -2, 1 Let k(r) be the second derivative of r**6/90 - r**5/30 - r**4/36 + r**3/9 + 30*r. Factor k(x). x*(x - 2)*(x - 1)*(x + 1)/3 Let l be 0 - (-2 - (-118)/60). Let j(b) be the second derivative of 0 + 0*b**2 - l*b**4 + b - 1/15*b**3. Factor j(s). -2*s*(s + 1)/5 Let o(n) be the third derivative of -n**5/12 + 25*n**4/24 - 5*n**2. Factor o(f). -5*f*(f - 5) Let j = -12 - -17. Suppose -3*q + 24 = 5*r, j*r - 3*q + 2 = 8. Let -4*g + 3*g**4 - 2*g**2 - 1 + r*g**3 + g - g**3 + g**5 = 0. What is g? -1, 1 Let w = 3 + -1. Solve h + 4 + 2*h**w - 7*h + 0*h**2 + 0*h**2 = 0 for h. 1, 2 Let g(c) be the first derivative of 3/5*c**5 - 3/2*c**2 - 9/4*c**4 + 3*c**3 - 3 + 0*c. Solve g(b) = 0. 0, 1 Factor 0*a - 8/5*a**2 + 4/5*a**3 + 0 + 4/5*a**4. 4*a**2*(a - 1)*(a + 2)/5 Let m(v) be the first derivative of -v**3/6 + 2*v**2 - 8*v + 2. Factor m(j). -(j - 4)**2/2 Let h = -33 + 33. Let p(d) be the second derivative of 0*d**5 + 1/10*d**4 + 2/15*d**3 + h - 1/75*d**6 - 3*d + 0*d**2. Factor p(w). -2*w*(w - 2)*(w + 1)**2/5 Let m(o) = 2*o**2 - 7*o + 23. Let p = 11 + -15. Let a(y) = -2*y**2 + 8*y - 22. Let x(s) = p*m(s) - 5*a(s). Find l such that x(l) = 0. 3 Let x = 4 - 1. Suppose -x*p - 2*p = -10. Let 1/4*m**p + 1/2*m + 1/4 = 0. Calculate m. -1 Let r(q) be the third derivative of q**5/60 - q**4/24 - q**3/3 + 6*q**2. Factor r(h). (h - 2)*(h + 1) Factor 0 - 24/5*m**3 - 3*m**2 - 2/5*m - 11/5*m**4. -m*(m + 1)**2*(11*m + 2)/5 Let r(i) = 2852*i**4 - 836*i**3 - 916*i**2 - 172*i - 28. Let f(q) = 317*q**4 - 93*q**3 - 102*q**2 - 19*q - 3. Let t(x) = -28*f(x) + 3*r(x). Factor t(k). -4*k*(4*k + 1)**2*(5*k - 4) Suppose 0*k = z - k - 11, -5*k = 5. Factor 3*d**4 + 7*d**5 + 4 - z*d**5 - 4. -3*d**4*(d - 1) Let v(f) be the first derivative of 5 + 2*f**6 + 9/5*f**5 - 15/4*f**4 + 0*f - 3*f**3 + 3/2*f**2. What is h in v(h) = 0? -1, 0, 1/4, 1 Find u, given that -5/2*u**2 + 0*u**3 + 5/2*u**4 + 0 + 0*u = 0. -1, 0, 1 Let o(n) be the first derivative of 7*n**6/6 + 2*n**5/5 - 10. Factor o(p). p**4*(7*p + 2) Let r be 10/(-60) + (-2)/(-8). Let t(w) be the first derivative of -1/16*w**4 - 1/20*w**5 + 0*w + 1/8*w**2 + r*w**3 + 3. Solve t(v) = 0. -1, 0, 1 Let v(u) = u**4 - u**3 - u**2 + u - 6. Let g(h) = 1. Let o(w) = 6*g(w) + v(w). Factor o(r). r*(r - 1)**2*(r + 1) Let 3/4*w**2 + 0 - 9/4*w - 3/4*w**4 + 9/4*w**3 = 0. What is w? -1, 0, 1, 3 Let t(v) be the third derivative of -v**5/20 + v**4/8 + v**3 - 2*v**2. Suppose t(n) = 0. What is n? -1, 2 Suppose -15 = -5*q + 5*a, -2*q + 4*a = -6*q + 12. Factor 0*d**3 - d - 2*d**q + 2*d**2 + d. -2*d**2*(d - 1) Let z(k) be the first derivative of 1/36*k**4 + 0*k**2 + 1 + 1
{ "pile_set_name": "DM Mathematics" }
Dynamic interference and/or fading environments typically make broadcasting an unreliable operation in a wireless network, particularly with low-power nodes or constrained power consumption requirements. Unreliable communications at the broadcast-level can result in broadcast coverage that is not network-wide. These scenarios may cause reduced throughputs or stagnant/stale nodes, both of which are extremely undesirable for critical network messages and operations. Modern commercial and military applications require robustness with respect to information dissemination throughout a wireless network, and thus, there is a need for robust broadcast communications in wireless networks. Embodiments of the present invention provide reliable broadcast mechanisms using re-transmissions.
{ "pile_set_name": "USPTO Backgrounds" }
Q: C# - Geocode pharmacy by name and location How can I find the coordinates of a pharmacy by it name and location? I'm trying to search with the Google geocode API like this: var pharmacyName = "Farmácia Ereirense"; var address = "Cartaxo, Santarém"; var url = "http://maps.googleapis.com/maps/api/geocode/xml?address=" + pharmacyName + ", " + address + "&sensor=false"; but I only got ZERO_RESULTS on the GeoResponse Status, and if I google "Farmácia Ereirense, Cartaxo, Santarém" it found the right location... I already tried to do: var pharmacyName = "Farmácia Ereirense"; var address = "Cartaxo, Santarém"; var url = "https://maps.googleapis.com/maps/api/place/nearbysearch/xml?name=" + pharmacyName + ", " + address + "&key=" + apiKey; but I got the INVALID_REQUEST result. Documentation I based on A: Finally I found the solution! We can do a Text Search request like this: var pharmacyName = "Farmácia Ereirense"; var address = "Cartaxo, Santarém"; var url = "https://maps.googleapis.com/maps/api/place/textsearch/xml?query=" + pharmacyName + ", " + address + "&key=" + apiKey; And it works just fine, like Google's search. Documentation
{ "pile_set_name": "StackExchange" }
Improved acid tolerance of a recombinant strain of Escherichia coli expressing genes from the acidophilic bacterium Oenococcus oeni. Oenococcus oeni is a lactic acid bacterium used in wine fermentation. Two open reading frames (orfB and orfC) were identified in the upstream region of the hsp18 gene, encoding the small heat-shock protein Lo18. Expression of these genes in conditions of acid stress was studied in Escherichia coli. Sequence analysis showed that orfB encodes a putative transcriptional regulator of the LysR family. The protein encoded by orfC shares homologies with multi-drug resistance systems. Heterologous expression of orfB, orfC and hsp18 genes in Escherichia coli significantly enhanced the viability of the host strain under acidic conditions. It was demonstrated that the three genes were needed for acquisition of this acid tolerance phenotype. Heterologous expression of Oenococcus genes could be used to confer acidophilic behaviour on strains of biotechnological interest.
{ "pile_set_name": "PubMed Abstracts" }
Questionnaire-based diagnosis of REM sleep behavior disorder in Parkinson's disease. Rapid eye movement (REM) sleep behavior disorder (RBD) is present in around 40% of Parkinson's disease (PD) patients. Definitive diagnosis requires a polysomnogram, but that is costly, time intensive, and not practical for large-scale studies. Therefore, we assessed using a questionnaire-based diagnostic approach. The patient-administered RBD questionnaire and bed-partner-administered question 1 of the Mayo questionnaire were prospectively validated. Seventy-five PD patients (51 male, 68 Hoehn and Yahr stages I and II) participated. Forty-eight had a clinical history of RBD. Sensitivity was 100% (95% CI, 86.3%-100%) when a combination of both questionnaires was compared with the gold standard of polysomnogram-confirmed RBD. Among those who achieved REM sleep (n=65), specificity was highest for the patient questionnaire used alone, at 82.4% (95% CI, 64.8%-92.6%). A combination of patient and bed-partner questionnaires is a useful tool to detect RBD.
{ "pile_set_name": "PubMed Abstracts" }
Orf virus infection in pregnancy. Orf virus infection is endemic among sheep and goats, and can occur in humans who handle these animals. Orf virus infection in humans causes a characteristic skin lesion, and systemic symptoms can occur. Very little is known about Orf virus infection in human pregnancy. A case of Orf virus infection, with onset at 33 weeks gestation, is presented. There were no pathological findings in the infant born at term, or in the placenta.
{ "pile_set_name": "PubMed Abstracts" }
Choosing the right Parker house dealer online will help you to buy the best quality products at the best rates. Most of the online dealers also offer different types of discounts and offers that can help you to make huge savings.
{ "pile_set_name": "Pile-CC" }
A cynical budget maneuver July 8, 2010|By David Broder, Washington Post Writers Group WASHINGTON -- On June 30,the Congressional Budget Office issued its long-term outlook, predicting that deficits would come down for the next few years as the need for counterrecession spending eases and revenues improve. But then, it warned, "unsustainable" red ink would flow again, creating debts not seen since World War II. The very next day the House of Representatives passed a one-year budget resolution rather than the normal blueprint committing the government to a fiscal plan of at least five years. For all the publicity that goes to earmarks and other spending gimmicks, this was a far worst dereliction of duty. And the cynicism of the maneuver just made it worse. One of the casualties of this maneuver is the partnership that has developed between Kent Conrad of North Dakota, the chairman of the Senate Budget Committee, and Judd Gregg of New Hampshire, its ranking Republican. In January, they were co-sponsors of the legislation to create a National Commission on Fiscal Responsibility and Reform, whose recommendations for closing the budget gap would be guaranteed an up or down vote in Congress. The commission legislation was defeated when seven Republican senators who had initially co-sponsored it defected on the roll call.At that point, President Obama stepped in and rescued the idea, creating the commission by executive order. Now, in a stunning reversal, the Democrats are using the existence of the commission to justify their abandonment of their long-term budget responsibilities. Speaker Nancy Pelosi brazenly hailed the one-year substitute as "another key step … in restoring fiscal responsibility." Rep. John Spratt of South Carolina, the House budget committee chairman, more modestly termed it "the functional equivalent of a traditional budget resolution." "These are disciplines for the short run," Spratt said, "while the fiscal commission works out recommendations for the longer run." The Republicans, who had been rightly roasted for abandoning Conrad and Gregg on the vote to create the commission, were not about to let the Democrats pull off this bait and switch. Paul Ryan of Wisconsin, the top Republican on Spratt's committee, said in a statement: "This is not a budget. The measure fails to meet the most basic, commonly understood objectives of any budget. It does not set congressional priorities; it does not align overall spending, tax, deficit and debt levels; and it does nothing to address the runaway spending of federal entitlement programs." When I reached Gregg by phone, he said the commission -- on which both he and Ryan serve, and to which the Democrats were ostensibly deferring -- "remains a hope-and-prayer exercise." Its work has barely begun and it is not due to report until December. Gregg speculated that the reason the Democrats did not pass a real budget resolution is because "they do not want to let the American people see how bad the five-year numbers really are." My next call was to Conrad, and I felt nothing but pity for him. He had actually passed a credible five-year budget through his committee, but deferred to the leadership and did not call it up for a floor vote. Now, he said, with the House's action, "it makes no sense. There's nothing for it to link up to." The terrible irony in all this? More and more people are seeing that what this agonizing situation requires is a limited and temporary measure to pump more life into the economy and create jobs, along with a serious commitment to impose real spending discipline and hold down deficits in the long term -- exactly what a five-year budget resolution could provide. Gregg and Conrad agree that such a resolution could "unleash huge energy back into the economy," because corporations are hoarding $1.8 trillion in their treasuries and consumers are sitting on billions more. Of all the times for Congress to abandon its responsibility for long-term fiscal planning, this is the worst.
{ "pile_set_name": "Pile-CC" }
Q: Is the following NP-complete? I have encountered the following problem. We have $N$ points in discrete coordinates,distributed through a plane with vertical axis $[1..Y]$ and horizontal axis $[1..X]$. We can perform the action of removing all points with vertical coordinate $y$, in short removing $y$. What is the least number of $y$'$s$ we must remove so that the number of $x$ that have points is less than $X/2$. For example in the graph above removing 1 and 2 leaves points only in 1,3,6,9. This seems like a NP-complete problem to me so the only solution I have developed is removing all combinations of $y'$s. I would be grateful if someone experienced in computation-theory could point me to a similar known problem (or maybe a problem this could be reduced to), any suggestion is welcome. A: If you mean by "the number of $x$ that have points" that the number of distinct values $x$ such that there is a point $(x, y)$ such that $y$ has not been removed is at most $X/2$, then your problem is extremely similar to Set Cover, which is $\mathbf{NP}$-complete. Your problem would be the variant in which you ask for the minimum number of sets needed to cover half the elements of your universe. I would be very surprised if this was not $\mathbf{NP}$-complete. I'll think about it some more and update this if I think up a proof of $\mathbf{NP}$-completeness.
{ "pile_set_name": "StackExchange" }
[Cite as Smith v. Sheldon, 2018-Ohio-3233.] COURT OF APPEALS RICHLAND COUNTY, OHIO FIFTH APPELLATE DISTRICT JUDGES: EDDIE LEE SMITH : Hon. W. Scott Gwin, P. J. : Hon. Patricia A. Delaney, J. Petitioner-Relator : Hon. Craig R. Baldwin, J. : -vs- : : Case No. 18CA47 EDWARD SHELDON : : Respondent : OPINION CHARACTER OF PROCEEDING: Writ of Habeas Corpus JUDGMENT: Dismissed DATE OF JUDGMENT ENTRY: August 8, 2018 APPEARANCES: For Petitioner-Relator For Respondent EDDIE LEE SMITH PRO SE JERRI FOSNAUGHT #691507 Assistant Attorney General Mansfield Correction Institution Criminal Justice Section 1150 North Main St. 150 East Gay Street, 16th Floor Mansfield, OH 44901 Columbus, OH 43215 [Cite as Smith v. Sheldon, 2018-Ohio-3233.] Gwin, P.J. {¶1} Petitioner, Eddie Lee Smith, has filed a Petition for Writ of Habeas Corpus arguing he must be released from prison because his sentences are void. Respondent has filed a Motion to Dismiss. {¶2} Petitioner argues his sentences are void because (1) the trial court improperly imposed community control and a prison sentence for the same convictions, (2) his plea was not knowing, intelligent and voluntary, (3) he was not notified of his right to appeal, and (4) the trial court failed to include a 58(B) notice in the trial court’s June 1, 2016 entry of conviction. FACTS {¶3} Petitioner is imprisoned pursuant to his convictions in Summit County Common Pleas Court, Case Numbers CR 2015 09 2837 and CR 2015 12 3774. {¶4} In CR 2015 09 2837, Petitioner was convicted of one count of robbery and one count of weapons under disability. He was given a community control sanction of 24 months on both counts. The sentencing entry indicated that the trial court “reserved” 36 months in prison should Petitioner violate the terms of community control. Five months after his initial sentence, Petitioner was found to have violated community control and received a 36 month prison sentence ordered to be served consecutive to the sentence in Case Number CR 2015 12 3774. {¶5} In CR 2015 12 3774, Petitioner was convicted of obstructing justice. He initially received a community control sanction wherein the judgment entry indicated a prison term of 12 months was “reserved” should Petitioner violate the terms of community Richland County, Case No. 18CA47 3 control. He was found to have violated community control and received a sentence of 12 months in prison consecutive to Case Number CR 2015 09 2837. HABEAS CORPUS {¶6} R.C. 2725.01, which establishes which persons are entitled to a writ of habeas corpus, states “[w]hoever is unlawfully restrained of his liberty, or entitled to the custody of another, of which custody of such person is unlawfully deprived, may prosecute a writ of habeas corpus, to inquire into the cause of such imprisonment, restraint, or deprivation.” {¶7} A writ of habeas corpus will generally lie only when a prisoner can show that his/her confinement is illegal because the trial court never had the requisite jurisdiction to convict or his/her sentence has expired. McKay v. Gansheimer, 11th Dist. No.2003–A–0123, 2004–Ohio–4284. A writ of habeas corpus is an extraordinary writ which may not be used if an adequate remedy at law exists. Heddleston v. Mack, 84 Ohio St.3d 213 (1998); Burch v. Perini, 66 Ohio St.2d 174 (1981). Sentencing errors by a trial court that had proper jurisdiction cannot be remedied by extraordinary writ. Majoros v. Collins, 64 Ohio St.3d 442 (1992). Habeas corpus is not a substitute for appeal or post- conviction relief. Daniel v. State, 98 Ohio St.3d 467, 2003–Ohio–1916. DUAL SENTENCES {¶8} Petitioner claims the trial court lacked jurisdiction to sentence him to both community control and prison at the same time, however, the trial court did not sentence him to both at the same time. Initially, he was sentenced to community control. Thereafter, when he was found to have violated community control, he was sentenced to prison. Petitioner argues when the trial court initially granted community control and Richland County, Case No. 18CA47 4 “reserved” a prison sentence in the event of violation of community control this equated to both a sentence of community control and a sentence of prison simultaneously. Any challenge to the propriety of the sentence could have been challenged on appeal. An appeal provides an adequate remedy at law which precludes the issuance of the writ of habeas corpus. {¶9} “Like other extraordinary-writ actions, habeas corpus is not available when there is an adequate remedy in the ordinary course of law.” In re Complaint for Writ of Habeas Corpus for Goeller, 103 Ohio St.3d 427, 2004–Ohio–5579, 816 N.E.2d 594, ¶ 6. VALIDITY OF PLEA {¶10} Next, Petitioner claims his sentence is void because his guilty plea was not valid because it was not knowingly, intelligently, and voluntarily made. The Supreme Court has held, “[W]hether appellant made a guilty plea knowingly and voluntarily is a matter to be resolved at post-conviction proceedings or on direct appeal . . . Habeas corpus is not a substitute for appeal.” Pollock v. Morris, 35 Ohio St.3d 117, 118, 518 N.E.2d 1205, 1206 (1988). {¶11} Petitioner could have raised the issue of the validity of his plea on direct appeal or in post-conviction proceedings. Therefore, habeas corpus does not lie. NOTIFICATION OF APPELLATE RIGHTS {¶12} The failure of a trial court to advise of appellate rights would result in a resentencing and not release from prison. State v. Hunter, 8th Dist. Cuyahoga No. 92626, 2010-Ohio-657. {¶13} “A trial court's failure to notify a defendant concerning appeal rights, however, does not render a sentence void. State v. Barnes, 12th Dist. No. CA2014–03– Richland County, Case No. 18CA47 5 049, 2015–Ohio–651, ¶ 27” State v. Smotherman, 10th Dist. Franklin No. 16AP-471, 2016-Ohio-8133, ¶ 13. {¶14} Habeas Corpus does not lie based upon the failure of a trial court to notify a defendant of appellate rights. INSTRUCTIONS TO THE CLERK PURSUANT TO CIV.R. 58(B) {¶15} Finally, Petitioner argues he is entitled to release because the trial court failed to issue instructions to the clerk for service as required by Civ.R. 58(B). Specifically, he argues the trial court’s entry of June 1, 2016 should have contained a Civ. R. 58 (B) notice to the clerk for service. The June 1, 2016 entry is an entry of conviction in a criminal case. Rule 58(B) is found in the civil rules and is inapplicable to sentencing entries. {¶16} “Civ.R. 58(B) is not applicable to a criminal action or judgment. Henderson v. Saffold, 8th Dist. No. 100406, 2014-Ohio-306, ¶ 7, citing State ex rel. Aziz v. Fuerst, 8th Dist. No. 78018, 2000 WL 1222028, 2000 Ohio App. LEXIS 3833 (Aug. 24, 2000). However, Civ.R. 58(B) does apply to decisions on postconviction petitions. State v. Nichols, 11 Ohio St.3d 40, 463 N.E.2d 375 (1984), paragraph two of the syllabus (“Postconviction relief proceedings will be governed by the Ohio Rules of Appellate Procedure as applicable to civil actions.”); see also State v. Tucker, 8th Dist. No. 95556, 2011-Ohio-4092, ¶ 9–14; State v. McKinney, 3d Dist. No. 4-11-01, 2011-Ohio-3521, ¶ 12–17.” State v. Barber, 10th Dist. Franklin No. 16AP-172, 2017-Ohio-9257, ¶ 14, appeal not allowed, 152 Ohio St.3d 1466, 2018-Ohio-1795, 97 N.E.3d 501, ¶ 14. {¶17} Because the judgment entry of June 1, 2016 is the sentencing entry and not an entry relative to post-conviction relief, service pursuant to Civ.R. 58(B) is inapplicable. Richland County, Case No. 18CA47 6 {¶18} Petitioner has not demonstrated he is entitled to release from prison and has not demonstrated his entitlement to a writ of habeas corpus. Therefore, the motion to dismiss is granted. By Gwin, P.J., Delaney, J., and Baldwin, J., concur
{ "pile_set_name": "FreeLaw" }
INTRODUCTION ============ Forkhead box P3 (FoxP3) is a member of the forkhead/winged-helix family of transcriptional regulators, which are involved in immune system development and function, notably in the generation of immunosuppressive regulatory T cells (Tregs) ([@b1-cln_67p483]). The loss of FoxP3 function leads to a reduction in the number of Tregs, resulting in lethal autoaggressive lymphoproliferation, whereas the overexpression of FoxP3 causes severe immunodeficiency ([@b2-cln_67p483]). Because FoxP3 helps to specify Treg lineages, its expression in primarily lymphoid tissues is expected and has been well documented ([@b3-cln_67p483],[@b4-cln_67p483]). In addition, FoxP3 expression has been observed in human cancer cells, but has not yet been described in thyroid tumors ([@b5-cln_67p483]). There is increasing evidence that Tregs also play an important role in cancer immune evasion, which enables tumor cells to elude the host antitumor immune response ([@b6-cln_67p483]-[@b8-cln_67p483]). However, the contribution of Tregs to tumor progression and their clinical significance remain poorly understood. Some studies have suggested that the presence of Tregs indicates a worse prognosis ([@b9-cln_67p483]-[@b11-cln_67p483]), whereas others have associated their presence with favorable outcomes ([@b12-cln_67p483],[@b13-cln_67p483]). A recent meta-analysis concluded that Treg lymphocytic infiltration was not sufficient to either improve or worsen the prognosis of cancer patients ([@b14-cln_67p483]). The existence of an immune response against differentiated thyroid carcinomas has long been recognized ([@b15-cln_67p483]-[@b17-cln_67p483]). Previous research has suggested that a local inflammatory response may impede tumor evolution ([@b18-cln_67p483]) and may indicate a more favorable outcome ([@b15-cln_67p483],[@b16-cln_67p483]). However, a recent study found an association between the presence of Tregs and lymph node metastasis in papillary thyroid carcinomas ([@b19-cln_67p483]). Unfortunately, the authors did not evaluate the expression of FoxP3 in the analyzed tumor cells. In this work, we investigated the expression of FoxP3 in malignant and benign thyroid cells. Furthermore, we explored the clinical and pathological roles and the prognostic significance of both FoxP3 expression and intratumoral Treg infiltration in differentiated thyroid carcinomas. MATERIALS AND METHODS ===================== Patients -------- We investigated 380 patients, from whom tissue samples were removed and maintained in the tissue bank of the A. C. Camargo Hospital, as summarized in [Table 1](#t1-cln_67p483){ref-type="table"}. Thyroid carcinoma was diagnosed in 266 patients: 253 had papillary thyroid carcinoma (PTC; 153 cases of the classical form, 80 follicular variants and 20 tall cell variants), and 13 had follicular carcinomas (seven minimally invasive and six frankly invasive). In addition, we obtained samples from five normal thyroid tissues and 114 benign thyroid lesions, including 58 nodular goiters and 56 follicular adenomas. Clinical information was obtained from the patients\' files. The tumor aggressiveness at diagnosis was ascertained using the Tumor Node Metastasis classification system and the stage classification system for differentiated thyroid carcinomas ([@b20-cln_67p483]). The patients were followed according to a standard protocol that included periodic total body scans, serum TSH and thyroglobulin (Tg) measurements, X-rays, ultrasonography, computed tomography scans and other procedures as required to detect distant metastases for 12-298 months (mean 43.50±33.29 months; Mo = 21 months). Patients presenting with high non-stimulated serum Tg levels (\>2 mg/dl) were subjected to a thorough imaging scan. We used the aforementioned parameters to define tumors as persistent/recurrent and/or presenting with distant metastasis. Formalin-fixed, paraffin-embedded tissues from all 380 cases were reviewed for diagnostic confirmation and to select the most representative areas for the construction of a tissue microarray (Beecher Instruments®, Silver Springs, MD, USA) for immunohistochemical analysis. Chronic lymphocytic thyroiditis was investigated in the nonmalignant thyroid parenchyma of the tumor contralateral lobe and was characterized by extensive lymphocytic infiltration with lymphoid follicles, scarring and follicular regenerative activity evidenced by numerous small follicles, which were frequently lined by Hurthle cells ([@b21-cln_67p483]). The clinical diagnosis of Hashimoto\'s thyroiditis was confirmed with patient serum thyroperoxidase and thyroglobulin antibody titers. Immunohistochemistry -------------------- The 5-µm tissue sections intended for microarray construction were placed on electrically charged slides, deparaffinized, and rehydrated with alcohol solutions of decreasing concentration. The endogenous peroxide activity was blocked with H~2~O~2~ for 15 min. All the tissue sections were subjected to heat-induced antigen retrieval using a 10% citrate buffer (10 mM, pH 6.0) in a steamer (90°C for 30 min). The tissue sections were then incubated overnight at 6°C with a 1:500 anti-FoxP3 mouse monoclonal antibody (clone 236A/E7; Abcam, Cambridge, UK). The Advance (DAKO, Carpenteria, CA, USA) was used as the reaction detection system. DAB (3.3-diaminobenzidine-tetrahydrochloride; Sigma, St. Louis, MA, USA) was applied as a chromogen for 5 min at room temperature, and the sections were counterstained with hematoxylin. Positive and negative controls were assayed in the same batch of reactions as the patient samples. Immunohistochemical evaluation ------------------------------ The slides were scored independently by two pathologists (JV and FAS), both of whom were blinded to the tumor features. FoxP3 staining was found in both tumor cells and tumor-infiltrating lymphocytes ([Figure 1](#f1-cln_67p483){ref-type="fig"}). To quantify the FoxP3 staining, a tumor cell was considered positive for FoxP3 when an unambiguous brown staining was observed in its cytoplasm or nucleus. Each tissue spot was visually evaluated to estimate the percentage of positive tumor cells and the intensity of the staining. The percentage of positive cells was classified as one of the following: 0 = no positive cells; 1 = up to 10% positive cells; 2 = 10 to 30% positive cells; and 3 = more than 30% positive cells. For statistical purposes, the cases with scores of 0 were defined as negative, and the cases with scores from 1 to 3 were defined as positive. The immunohistochemical expression of FoxP3 was analyzed using the Automated Cellular Imaging System III (ACIS-III) (DAKO, Carpenteria, CA, USA). Cytoplasmic and nuclear staining was assessed separately: tissue spots were digitalized and assigned numerical values proportional to intensity/extension of staining. For the survival analysis, staining ≤ the median was considered negative, and staining \> the median was considered positive. The FoxP3^+^ lymphocytes were evaluated for each tissue microarray spot individually by estimating the number of positive cells per spot, assuming an approximate area of 0.79 mm^2^ per cell. To analyze the immunostaining of both the tumor cells and the tumor-infiltrating lymphocytes, aleatory spots were obtained from each tissue, and three spots were assessed to obtain more representative samples from each lesion. For statistical purposes, the cases were grouped into the following categories: 0 (no positive cells), 1+ (up to 10 positive cells per spot) and 2+ (10 or more positive cells per spot). Statistical analysis -------------------- The statistical analyses were performed using the Statistical Analysis System for Windows (SAS Institute Inc., Version 9.1.3, Service Pack 3, 2002-2003, Cary, NC, USA). The disease-free survival was calculated using Kaplan-Meier curves with log-rank comparisons. Nonparametric analyses were performed using the chi-square or Fisher\'s exact test, as indicated. A multivariate logistic regression model was applied using benignancy/malignancy as the dependent variable and clinical risk factors, including gender and age, as the explicative variables. The Mann-Whitney test was used to compare the continuous or arranged measurements of two groups with variables that did not present a Gaussian distribution, and the Kruskal-Wallis test was used to compare three or more such groups. The immune cell and tumor markers were assessed for their sensitivity, specificity and predictive value in malignancy. Quantitative data were expressed as the mean ± standard deviation. The accuracy of the quantification of the FoxP3 expression in predicting malignancy was evaluated with a receiver operating characteristic (ROC) curve analysis that was based on predicted probabilities from the logistic regression models. All the tests were conducted at a 0.05 significance level. Ethics ------ This study was approved by the Research Ethics Committee of the A.C. Camargo Cancer Hospital, São Paulo, Brazil. RESULTS ======= As expected, the majority (83.6%) of the patients were females. Individuals with benign (49.2±15.1 years old) and malignant (43.6±15.9 years old) thyroid lesions presented at similar ages at diagnosis. The differentiated thyroid carcinoma patients were classified, according to the pathologic Tumor Node Metastasis staging system ([@b22-cln_67p483]), as stage I (157 cases), II (28 cases), III (40 cases) or IV (41 cases). Ninety tumors were classified as encapsulated, and 176 were classified as nonencapsulated; 118 were multifocal tumors, and 148 were unifocal tumors. Additionally, 108 patients presented with extrathyroidal invasion, whereas 158 did not. Fifty-five patients (20.6%, including 10 who died from the disease) experienced recurrences, whereas 211 progressed free of disease (79.4%). Semiquantitative analysis of FoxP3 in tumor cells ------------------------------------------------- Four of the five normal thyroid tissues tested negative for FoxP3 expression, whereas up to 10% of the thyroid cells in the remaining tissue were negative. Eighty-one of the 114 (71.0%) cases of benign lesions, and 244 of the 266 (91.9%) malignant cases were FoxP3 positive (*p*\<0.0001). Twenty-two malignant cases were negative for FoxP3 staining. Fourteen of the 244 FoxP3^+^ malignant cases were scored as class 1, 11 were scored as class 2 and 219 were scored as class 3. FoxP3 positivity was more frequent among women (95.1%) than men (79.4%, *p* = 0.0063). There was no association between FoxP3 status and clinical or pathological features of tumor aggressiveness or long-term patient outcome. Quantitative analysis of FoxP3 in tumor cells --------------------------------------------- A close relationship was found between the results of the semiquantitative and quantitative analyses of both the cytoplasmic (*p*\<0.0001) and nuclear FoxP3 staining (*p*\<0.0001); however, the numerical values were not distributed according to a Gaussian curve. We found no significant differences between the cytoplasmic FoxP3 staining levels of the female (52.3±37.4) and male (41.6±40.5, *p* = 0.0641) differentiated thyroid carcinoma patients. The cytoplasmic FoxP3 levels were inversely correlated with the patient\'s age at the of the differentiated thyroid carcinoma diagnosis (Spearman r = -0.2913, *p* = 0.0001). The Kruskal-Wallis test showed distinct patterns of FoxP3 expression among the different types of lesions (*p*\<0.0001), with the malignant lesions staining more intensely (48.1±36.2) than the benign ones (31.9±25.8, *p* = 0.0005) ([Figure 2](#f2-cln_67p483){ref-type="fig"}). The normal thyroid tissues exhibited the lowest cytoplasmic staining (10.9±4.8). The classic papillary thyroid carcinomas received higher staining scores (55.8±38.6) than goiters (22.8±19.6, *p*\<0.0001) and follicular carcinomas (32.5±18.9, *p* = 0.0143). A multivariate logistic regression model indicated that cytoplasmic FoxP3 expression may be an independent risk factor for malignancy in the diagnosis of thyroid nodules, albeit with a relatively low sensitivity and specificity ([Table 1](#t1-cln_67p483){ref-type="table"}). The differentiated thyroid carcinoma tumors with concurrent chronic lymphocytic thyroiditis exhibited higher cytoplasmic FoxP3 expression (67.6±42.8) when compared with those with no concurrent chronic lymphocytic thyroiditis (46.1 ± 35.6, *p* = 0.0043). The nuclear FoxP3 staining was also more intense in younger patients (Spearman r = -0.16479, *p* = 0.01562) but was similar between different types of lesions (*p* = 0.5622). Aggressive tumors presenting with metastasis at diagnosis had stronger nuclear FoxP3 staining (78.1±24.6) than the less aggressive lesions (63.9±27.6, *p* = 0.0011). Spearman\'s log-rank test failed to confirm cytoplasmic (*p = *0.72045) or nuclear (*p = *0.65969) FoxP3 immunostaining as a prognostic marker. FoxP3^+^ lymphocytic infiltration --------------------------------- No normal thyroid, goiter, follicular adenoma, or follicular carcinoma cases and only 14.5% of the papillary thyroid carcinoma cases presented with FoxP3^+^ lymphocytes. However, FoxP3 immunostaining again did not prove sufficiently sensitive to be useful as a diagnostic test ([Table 1](#t1-cln_67p483){ref-type="table"}). FoxP3^+^ lymphocytes were more common in differentiated thyroid carcinomas smaller than 2 cm (*p = *0.0078), lacking extrathyroidal invasion (*p = *0.0122) and accompanied by chronic lymphocytic thyroiditis (*p*\<0.0001). Tumors with FoxP3^+^ lymphocytic infiltration also exhibited higher cytoplasmic FoxP3 expression (76.8±43.1) than did those without such infiltration (45.3±33.5, *p = *0.0011). However, the nuclear FoxP3 staining was similar among the cases with and without FoxP3^+^ lymphocytic infiltration (*p = *0.95886). The log-rank test failed to validate FoxP3^+^ lymphocytic infiltration as a prognostic marker. Likewise, a Cox regression model failed to confirm the reliability of cytoplasmic FoxP3 staining, nuclear FoxP3 staining and FoxP3^+^ lymphocytic infiltration as independent prognostic markers. Patients with concurrent chronic lymphocytic thyroiditis generated a distinct immune response compared with those without a background of autoimmune disorders. A multivariate analysis that considered chronic lymphocytic thyroiditis and FoxP3^+^ lymphocytic infiltration as independent variables confirmed that the absence of FoxP3^+^ lymphocytic infiltration was an independent risk factor for extrathyroidal invasion (*p = *0.0048). DISCUSSION ========== We found that FoxP3 is expressed not only in differentiated thyroid carcinoma-infiltrating lymphocytes but also in both the cytoplasm and the nuclei of follicular cells. Our data demonstrated that FoxP3 nuclear expression is related to the aggressiveness of differentiated thyroid carcinomas. In addition, FoxP3^+^ lymphocytic infiltration was more frequent in tumors smaller than 2 cm, lacking extrathyroidal invasion, and accompanied by chronic lymphocytic thyroiditis. FoxP3 expression was initially thought to be restricted to hematopoietic cells and tissues; however, recent findings have suggested that other tissues and cell lines are able to express FoxP3 ([@b5-cln_67p483]),. The roles of Tregs in different tumors remain under dispute. There is evidence that the *FOXP3* gene plays a critical role in suppressing pathological transformation in the prostate ([@b26-cln_67p483]). However, among different prostate samples, we found FoxP3 to be more frequently expressed in tumor cells than in benign nodules, which suggests that the protein may exert different effects in different types of tumors. In fact, FoxP3 expression was shown to progressively decrease as normal cells transform into prostatic intraepithelial neoplasias (PINs) and prostate cancer cells, which implies widespread downregulation that may have occurred at an early stage in prostate cancer development. Conversely, we found the FoxP3 protein to be more highly expressed in carcinomas than in nodular goiters and follicular adenomas. We found higher cytoplasmic but not nuclear FoxP3 immunostaining in malignant lesions compared with benign nodules, which suggests that the cytoplasmic localization of FoxP3 may be a result of the high mutation rate characteristic of malignant transformation. In fact, the cytoplasmic (rather than nuclear) localization of FoxP3 has been considered a consequence of somatic mutations. The FoxP3 molecule contains a forkhead (FKH)/winged-helix domain that includes a putative nuclear localization signal. Mutations in this domain and other transcriptional or post-transcriptional modifications could generate the cytoplasmic localization of FoxP3 in cancer cells ([@b27-cln_67p483]-[@b29-cln_67p483]). Although FoxP3 expression has also been linked to tumor aggressiveness, the mechanisms of this protein\'s function and the clinical implications of this association remain unclear. Ban et al. reported a significant association between *FOXP3* polymorphisms and susceptibility to autoimmune thyroid disease in Caucasian patients ([@b30-cln_67p483]). This finding suggests that FoxP3 may be engaged in the regulation of the immune response against thyroid tissue. However, the specific function of FoxP3 in differentiated thyroid carcinomas remains unclear. In addition to provoking a molecular mimicry that enables immune evasion ([@b24-cln_67p483]), FoxP3 may modulate the patterns of molecular expression in tumor cells, thus favoring an aggressive phenotype ([@b23-cln_67p483]). However, the relationship between FoxP3 expression and patient prognosis is a matter of debate. In studying HER2-overexpressing breast carcinomas, Ladoire et al. found that FoxP3 expression was an independent prognostic factor for increases in both relapse-free and overall survival ([@b27-cln_67p483]). On the contrary, Merlo et al. found that the expression of FoxP3 in tumors was inversely associated with patient survival([@b23-cln_67p483]). These authors also reported a significant association between FoxP3 expression and lymph node metastasis, suggesting that FoxP3 expression indicated a worse prognosis ([@b23-cln_67p483]). Here, we demonstrated higher nuclear, but not cytoplasmic, FoxP3 immunostaining in the more aggressive differentiated thyroid carcinomas presenting with metastasis at diagnosis. The inverse correlations between both cytoplasmic and nuclear FoxP3 levels and age at diagnosis appear to reinforce the finding that FoxP3 expression may be correlated with a worse patient prognosis. However, the log-rank analysis failed to validate FoxP3 as a reliable prognostic marker, supporting the current belief that appropriate management is the most important prognostic factor in differentiated thyroid carcinoma patients. Another noteworthy finding was the correlation between FoxP3 expression and patient age. In fact, although children and adolescents tend to present with higher-stage disease and a greater likelihood of locoregional and distant metastasis, they generally exhibit excellent survival rates ([@b31-cln_67p483]). In contrast, older patients experience an increased mortality rate in parallel with the occurrence of metastasis ([@b32-cln_67p483],[@b33-cln_67p483]). The intriguing possibility of an association between the inverse correlation between FoxP3 and age revealed in the present work and the clinical behavior of differentiated thyroid carcinoma deserves further study. We found FoxP3^+^ lymphocytic infiltration to be associated with the absence of extrathyroidal invasion, a small tumor size and the presence of concurrent chronic lymphocytic thyroiditis. Conversely, studying only 10 papillary thyroid carcinoma cases, French et al. found that regulatory T cell infiltration was closely associated with the presence of lymph node metastasis ([@b19-cln_67p483]). It is difficult to compare our data on 253 papillary thyroid carcinomas with those obtained by these authors, especially because different methodologies were used. Furthermore, French et al. did not investigate FoxP3 expression in tumor cells. In conclusion, we demonstrated FoxP3 expression in differentiated thyroid carcinoma cells and found evidence that this expression may exert an important influence on tumor aggressiveness, especially in cases with strong nuclear staining. Larger series of patients are warranted to confirm the clinical utility of FoxP3 staining or Treg infiltration. ACKNOWLEDGMENTS =============== We thank Etna Macário and Marcella Lima de Souza for their valuable suggestions and insights. No potential conflict of interest was reported. ![Different levels of FoxP3 expression in various thyroid tissues and lesions. (A) Normal thyroid tissues showed the lowest FoxP3 staining. (B) Goiter lesions presented with intermediate FoxP3 immunostaining. In contrast to the normal thyroid, the goiter cells exhibited increased cytoplasmic and nuclear staining. (C) Follicular adenoma cells demonstrated pronounced cytoplasmic and nuclear FoxP3 immunostaining. (D) Papillary thyroid carcinomas showed strong FoxP3 expression. In particular, increased cytoplasmic expression is evident. (E) Follicular thyroid carcinoma tissues showed faint immunostaining. (F) A papillary thyroid carcinoma with FoxP3^+^ tumor cells and FoxP3^+^ lymphocytes. The white arrows show regulatory T lymphocytes infiltrating the malignant tissue. The black arrows show papillary thyroid carcinoma cells with both cytoplasmic and nuclear FoxP3 staining. Magnification = 400x.](cln-67-05-483-g001){#f1-cln_67p483} ![Cytoplasmic FoxP3 immunostaining in different thyroid tissues. This boxplot of the immunohistochemical quantification data provides evidence of progressive FoxP3 staining in different stages of tumor evolution. Computer-generated numerical values that represent the intensity and extent of the brown (FoxP3) staining are plotted on the y-axis. Abbreviations: NT = normal thyroid; G = goiter; FA = follicular adenoma; FVPTC = follicular variant of papillary thyroid carcinoma; CPTC = classic papillary thyroid carcinoma; FC = follicular carcinoma.](cln-67-05-483-g002){#f2-cln_67p483} ###### FoxP3 immunostaining and FoxP3^+^ lymphocytic infiltration in different thyroid tissue subsets. Analyzed Groups Statistical Parameters Cytoplasmic FoxP3[\*](#tfn2-cln_67p483){ref-type="table-fn"}) Nuclear FoxP3[\*](#tfn2-cln_67p483){ref-type="table-fn"}) FoxP3^+^ Lymphocytes ------------------------ ------------------------ --------------------------------------------------------------- ----------------------------------------------------------- ---------------------- Malignant *vs.* Benign Accuracy (%) 61.89 50.86 38.89 Sensitivity (%) 62.10 50.20 11.79 Specificity (%) 61.40 52.50 100.00 PPV (%) 79.04 72.61 100.00 NPV (%) 40.86 29.59 33.45 *p*-value 0.0005 0.1514 0.0001 PTC vs. FTC Accuracy (%) 59.49 53.71 69.34 Sensitivity (%) 72.20 59.50 0.00 Specificity (%) 56.60 52.40 85.47 PPV (%) 27.41 21.99 0.00 NPV (%) 89.97 85.16 78.61 *p*-value 0.0143 0.5937 0.0055 FA vs. FVPTC Accuracy (%) 55.69 57.41 54.72 Sensitivity (%) 45.70 67.30 5.88 Specificity (%) 64.70 48.10 100.00 PPV (%) 53.85 54.98 100.00 NPV (%) 56.94 60.97 53.40 *p*-value 0.6885 0.1864 0.1079 FA vs. FC Accuracy (%) 55.17 57.34 57.89 Sensitivity (%) 63.90 70.30 0.00 Specificity (%) 49.00 48.10 100.00 PPV (%) 46.95 49.11 50.00 NPV (%) 65.77 69.45 57.89 P-value 0.6760 0.1735 n.e. Abbreviations: FA =  follicular adenoma; PTC = papillary thyroid carcinoma; FVPTC =  follicular variant of papillary thyroid carcinoma; FC = follicular carcinoma; PPV = positive predictive value; NPV = negative predictive value; n.e. = not evaluated. Only data obtained from FoxP3 immunostaining quantification were used in the present analysis. [^1]: Cunha LL conceived and designed the study, was also responsible for data collection and assembly, data analysis and interpretation, manuscript writing, and final approval of the manuscript. Morari EC contributed to the collection and assembly of data and final approval of the manuscript. Nonogaki S contributed to the data analysis and interpretation, histopathological analysis, and final approval of the manuscript. Soares FA and Vassallo J contributed to the histopathological analysis and final approval of the manuscript. Ward LS contributed to the conception and design of the study, data analysis and interpretation, manuscript writing, and final approval of the manuscript.
{ "pile_set_name": "PubMed Central" }
/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.hadoop.hdfs.server.datanode.fsdataset.impl; import java.io.BufferedInputStream; import java.io.DataInputStream; import java.io.File; import java.io.FileInputStream; import java.io.FileNotFoundException; import java.io.FileOutputStream; import java.io.IOException; import java.io.InputStream; import java.io.OutputStreamWriter; import java.io.RandomAccessFile; import java.io.Writer; import java.nio.file.Files; import java.util.ArrayList; import java.util.Arrays; import java.util.Collections; import java.util.Comparator; import java.util.Iterator; import java.util.List; import java.util.Queue; import java.util.Scanner; import java.util.concurrent.ConcurrentLinkedQueue; import java.util.concurrent.ExecutionException; import java.util.concurrent.ForkJoinPool; import java.util.concurrent.ForkJoinTask; import java.util.concurrent.RecursiveAction; import java.util.concurrent.atomic.AtomicLong; import java.util.concurrent.locks.ReentrantReadWriteLock; import java.util.concurrent.TimeUnit; import org.apache.hadoop.hdfs.server.datanode.FSCachingGetSpaceUsed; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.fs.CachingGetSpaceUsed; import org.apache.hadoop.fs.CommonConfigurationKeys; import org.apache.hadoop.fs.GetSpaceUsed; import org.apache.hadoop.hdfs.DFSConfigKeys; import org.apache.hadoop.hdfs.DFSUtilClient; import org.apache.hadoop.hdfs.protocol.Block; import org.apache.hadoop.hdfs.protocol.BlockListAsLongs; import org.apache.hadoop.hdfs.protocol.BlockListAsLongs.BlockReportReplica; import org.apache.hadoop.hdfs.server.common.HdfsServerConstants.ReplicaState; import org.apache.hadoop.hdfs.server.datanode.FileIoProvider; import org.apache.hadoop.hdfs.server.datanode.BlockMetadataHeader; import org.apache.hadoop.hdfs.server.datanode.DataStorage; import org.apache.hadoop.hdfs.server.datanode.DatanodeUtil; import org.apache.hadoop.hdfs.server.datanode.ReplicaInfo; import org.apache.hadoop.hdfs.server.datanode.ReplicaBuilder; import org.apache.hadoop.hdfs.server.datanode.fsdataset.impl.RamDiskReplicaTracker.RamDiskReplica; import org.apache.hadoop.hdfs.server.datanode.fsdataset.ReplicaInputStreams; import org.apache.hadoop.io.IOUtils; import org.apache.hadoop.io.MultipleIOException; import org.apache.hadoop.util.DataChecksum; import org.apache.hadoop.util.DataChecksum.Type; import org.apache.hadoop.util.DiskChecker; import org.apache.hadoop.util.DiskChecker.DiskErrorException; import org.apache.hadoop.util.ShutdownHookManager; import org.apache.hadoop.util.Timer; import com.google.common.annotations.VisibleForTesting; /** * A block pool slice represents a portion of a block pool stored on a volume. * Taken together, all BlockPoolSlices sharing a block pool ID across a * cluster represent a single block pool. * * This class is synchronized by {@link FsVolumeImpl}. */ class BlockPoolSlice { static final Logger LOG = LoggerFactory.getLogger(BlockPoolSlice.class); private final String bpid; private final FsVolumeImpl volume; // volume to which this BlockPool belongs to private final File currentDir; // StorageDirectory/current/bpid/current // directory where finalized replicas are stored private final File finalizedDir; private final File lazypersistDir; private final File rbwDir; // directory store RBW replica private final File tmpDir; // directory store Temporary replica private final int ioFileBufferSize; @VisibleForTesting public static final String DU_CACHE_FILE = "dfsUsed"; private final Runnable shutdownHook; private volatile boolean dfsUsedSaved = false; private static final int SHUTDOWN_HOOK_PRIORITY = 30; private final boolean deleteDuplicateReplicas; private static final String REPLICA_CACHE_FILE = "replicas"; private final long replicaCacheExpiry; private final File replicaCacheDir; private AtomicLong numOfBlocks = new AtomicLong(); private final long cachedDfsUsedCheckTime; private final Timer timer; private final int maxDataLength; private final FileIoProvider fileIoProvider; private static ForkJoinPool addReplicaThreadPool = null; private static final int VOLUMES_REPLICA_ADD_THREADPOOL_SIZE = Runtime .getRuntime().availableProcessors(); private static final Comparator<File> FILE_COMPARATOR = new Comparator<File>() { @Override public int compare(File f1, File f2) { return f1.getName().compareTo(f2.getName()); } }; // TODO:FEDERATION scalability issue - a thread per DU is needed private final GetSpaceUsed dfsUsage; /** * Create a blook pool slice * @param bpid Block pool Id * @param volume {@link FsVolumeImpl} to which this BlockPool belongs to * @param bpDir directory corresponding to the BlockPool * @param conf configuration * @param timer include methods for getting time * @throws IOException */ BlockPoolSlice(String bpid, FsVolumeImpl volume, File bpDir, Configuration conf, Timer timer) throws IOException { this.bpid = bpid; this.volume = volume; this.fileIoProvider = volume.getFileIoProvider(); this.currentDir = new File(bpDir, DataStorage.STORAGE_DIR_CURRENT); this.finalizedDir = new File( currentDir, DataStorage.STORAGE_DIR_FINALIZED); this.lazypersistDir = new File(currentDir, DataStorage.STORAGE_DIR_LAZY_PERSIST); if (!this.finalizedDir.exists()) { if (!this.finalizedDir.mkdirs()) { throw new IOException("Failed to mkdirs " + this.finalizedDir); } } this.ioFileBufferSize = DFSUtilClient.getIoFileBufferSize(conf); this.deleteDuplicateReplicas = conf.getBoolean( DFSConfigKeys.DFS_DATANODE_DUPLICATE_REPLICA_DELETION, DFSConfigKeys.DFS_DATANODE_DUPLICATE_REPLICA_DELETION_DEFAULT); this.cachedDfsUsedCheckTime = conf.getLong( DFSConfigKeys.DFS_DN_CACHED_DFSUSED_CHECK_INTERVAL_MS, DFSConfigKeys.DFS_DN_CACHED_DFSUSED_CHECK_INTERVAL_DEFAULT_MS); this.maxDataLength = conf.getInt( CommonConfigurationKeys.IPC_MAXIMUM_DATA_LENGTH, CommonConfigurationKeys.IPC_MAXIMUM_DATA_LENGTH_DEFAULT); this.timer = timer; // Files that were being written when the datanode was last shutdown // are now moved back to the data directory. It is possible that // in the future, we might want to do some sort of datanode-local // recovery for these blocks. For example, crc validation. // this.tmpDir = new File(bpDir, DataStorage.STORAGE_DIR_TMP); if (tmpDir.exists()) { fileIoProvider.fullyDelete(volume, tmpDir); } this.rbwDir = new File(currentDir, DataStorage.STORAGE_DIR_RBW); // create the rbw and tmp directories if they don't exist. fileIoProvider.mkdirs(volume, rbwDir); fileIoProvider.mkdirs(volume, tmpDir); String cacheDirRoot = conf.get( DFSConfigKeys.DFS_DATANODE_REPLICA_CACHE_ROOT_DIR_KEY); if (cacheDirRoot != null && !cacheDirRoot.isEmpty()) { this.replicaCacheDir = new File(cacheDirRoot, currentDir.getCanonicalPath()); if (!this.replicaCacheDir.exists()) { if (!this.replicaCacheDir.mkdirs()) { throw new IOException("Failed to mkdirs " + this.replicaCacheDir); } } } else { this.replicaCacheDir = currentDir; } this.replicaCacheExpiry = conf.getTimeDuration( DFSConfigKeys.DFS_DATANODE_REPLICA_CACHE_EXPIRY_TIME_KEY, DFSConfigKeys.DFS_DATANODE_REPLICA_CACHE_EXPIRY_TIME_DEFAULT, TimeUnit.MILLISECONDS); // Use cached value initially if available. Or the following call will // block until the initial du command completes. this.dfsUsage = new FSCachingGetSpaceUsed.Builder().setBpid(bpid) .setVolume(volume) .setPath(bpDir) .setConf(conf) .setInitialUsed(loadDfsUsed()) .build(); if (addReplicaThreadPool == null) { // initialize add replica fork join pool initializeAddReplicaPool(conf, (FsDatasetImpl) volume.getDataset()); } // Make the dfs usage to be saved during shutdown. shutdownHook = new Runnable() { @Override public void run() { if (!dfsUsedSaved) { saveDfsUsed(); addReplicaThreadPool.shutdownNow(); } } }; ShutdownHookManager.get().addShutdownHook(shutdownHook, SHUTDOWN_HOOK_PRIORITY); } private synchronized static void initializeAddReplicaPool(Configuration conf, FsDatasetImpl dataset) { if (addReplicaThreadPool == null) { int numberOfBlockPoolSlice = dataset.getVolumeCount() * dataset.getBPServiceCount(); int poolsize = Math.max(numberOfBlockPoolSlice, VOLUMES_REPLICA_ADD_THREADPOOL_SIZE); // Default pool sizes is max of (volume * number of bp_service) and // number of processor. addReplicaThreadPool = new ForkJoinPool(conf.getInt( DFSConfigKeys.DFS_DATANODE_VOLUMES_REPLICA_ADD_THREADPOOL_SIZE_KEY, poolsize)); } } File getDirectory() { return currentDir.getParentFile(); } File getFinalizedDir() { return finalizedDir; } File getLazypersistDir() { return lazypersistDir; } File getRbwDir() { return rbwDir; } File getTmpDir() { return tmpDir; } /** Run DU on local drives. It must be synchronized from caller. */ void decDfsUsed(long value) { if (dfsUsage instanceof CachingGetSpaceUsed) { ((CachingGetSpaceUsed)dfsUsage).incDfsUsed(-value); } } long getDfsUsed() throws IOException { return dfsUsage.getUsed(); } void incDfsUsed(long value) { if (dfsUsage instanceof CachingGetSpaceUsed) { ((CachingGetSpaceUsed)dfsUsage).incDfsUsed(value); } } /** * Read in the cached DU value and return it if it is less than * cachedDfsUsedCheckTime which is set by * dfs.datanode.cached-dfsused.check.interval.ms parameter. Slight imprecision * of dfsUsed is not critical and skipping DU can significantly shorten the * startup time. If the cached value is not available or too old, -1 is * returned. */ long loadDfsUsed() { long cachedDfsUsed; long mtime; Scanner sc; try { sc = new Scanner(new File(currentDir, DU_CACHE_FILE), "UTF-8"); } catch (FileNotFoundException fnfe) { return -1; } try { // Get the recorded dfsUsed from the file. if (sc.hasNextLong()) { cachedDfsUsed = sc.nextLong(); } else { return -1; } // Get the recorded mtime from the file. if (sc.hasNextLong()) { mtime = sc.nextLong(); } else { return -1; } // Return the cached value if mtime is okay. if (mtime > 0 && (timer.now() - mtime < cachedDfsUsedCheckTime)) { FsDatasetImpl.LOG.info("Cached dfsUsed found for " + currentDir + ": " + cachedDfsUsed); return cachedDfsUsed; } return -1; } finally { sc.close(); } } /** * Write the current dfsUsed to the cache file. */ void saveDfsUsed() { File outFile = new File(currentDir, DU_CACHE_FILE); if (!fileIoProvider.deleteWithExistsCheck(volume, outFile)) { FsDatasetImpl.LOG.warn("Failed to delete old dfsUsed file in " + outFile.getParent()); } try { long used = getDfsUsed(); try (Writer out = new OutputStreamWriter( Files.newOutputStream(outFile.toPath()), "UTF-8")) { // mtime is written last, so that truncated writes won't be valid. out.write(Long.toString(used) + " " + Long.toString(timer.now())); // This is only called as part of the volume shutdown. // We explicitly avoid calling flush with fileIoProvider which triggers // volume check upon io exception to avoid cyclic volume checks. out.flush(); } } catch (IOException ioe) { // If write failed, the volume might be bad. Since the cache file is // not critical, log the error and continue. FsDatasetImpl.LOG.warn("Failed to write dfsUsed to " + outFile, ioe); } } /** * Temporary files. They get moved to the finalized block directory when * the block is finalized. */ File createTmpFile(Block b) throws IOException { File f = new File(tmpDir, b.getBlockName()); File tmpFile = DatanodeUtil.createFileWithExistsCheck( volume, b, f, fileIoProvider); // If any exception during creation, its expected that counter will not be // incremented, So no need to decrement incrNumBlocks(); return tmpFile; } /** * RBW files. They get moved to the finalized block directory when * the block is finalized. */ File createRbwFile(Block b) throws IOException { File f = new File(rbwDir, b.getBlockName()); File rbwFile = DatanodeUtil.createFileWithExistsCheck( volume, b, f, fileIoProvider); // If any exception during creation, its expected that counter will not be // incremented, So no need to decrement incrNumBlocks(); return rbwFile; } File addFinalizedBlock(Block b, ReplicaInfo replicaInfo) throws IOException { File blockDir = DatanodeUtil.idToBlockDir(finalizedDir, b.getBlockId()); fileIoProvider.mkdirsWithExistsCheck(volume, blockDir); File blockFile = FsDatasetImpl.moveBlockFiles(b, replicaInfo, blockDir); File metaFile = FsDatasetUtil.getMetaFile(blockFile, b.getGenerationStamp()); if (dfsUsage instanceof CachingGetSpaceUsed) { ((CachingGetSpaceUsed) dfsUsage).incDfsUsed( b.getNumBytes() + metaFile.length()); } return blockFile; } /** * Move a persisted replica from lazypersist directory to a subdirectory * under finalized. */ ReplicaInfo activateSavedReplica(ReplicaInfo replicaInfo, RamDiskReplica replicaState) throws IOException { File metaFile = replicaState.getSavedMetaFile(); File blockFile = replicaState.getSavedBlockFile(); final long blockId = replicaInfo.getBlockId(); final File blockDir = DatanodeUtil.idToBlockDir(finalizedDir, blockId); final File targetBlockFile = new File(blockDir, blockFile.getName()); final File targetMetaFile = new File(blockDir, metaFile.getName()); fileIoProvider.moveFile(volume, blockFile, targetBlockFile); FsDatasetImpl.LOG.info("Moved " + blockFile + " to " + targetBlockFile); fileIoProvider.moveFile(volume, metaFile, targetMetaFile); FsDatasetImpl.LOG.info("Moved " + metaFile + " to " + targetMetaFile); ReplicaInfo newReplicaInfo = new ReplicaBuilder(ReplicaState.FINALIZED) .setBlockId(blockId) .setLength(replicaInfo.getBytesOnDisk()) .setGenerationStamp(replicaInfo.getGenerationStamp()) .setFsVolume(replicaState.getLazyPersistVolume()) .setDirectoryToUse(targetBlockFile.getParentFile()) .build(); return newReplicaInfo; } void checkDirs() throws DiskErrorException { DiskChecker.checkDir(finalizedDir); DiskChecker.checkDir(tmpDir); DiskChecker.checkDir(rbwDir); } void getVolumeMap(ReplicaMap volumeMap, final RamDiskReplicaTracker lazyWriteReplicaMap) throws IOException { // Recover lazy persist replicas, they will be added to the volumeMap // when we scan the finalized directory. if (lazypersistDir.exists()) { int numRecovered = moveLazyPersistReplicasToFinalized(lazypersistDir); FsDatasetImpl.LOG.info( "Recovered " + numRecovered + " replicas from " + lazypersistDir); } boolean success = readReplicasFromCache(volumeMap, lazyWriteReplicaMap); if (!success) { List<IOException> exceptions = Collections .synchronizedList(new ArrayList<IOException>()); Queue<RecursiveAction> subTaskQueue = new ConcurrentLinkedQueue<RecursiveAction>(); // add finalized replicas AddReplicaProcessor task = new AddReplicaProcessor(volumeMap, finalizedDir, lazyWriteReplicaMap, true, exceptions, subTaskQueue); ForkJoinTask<Void> finalizedTask = addReplicaThreadPool.submit(task); // add rbw replicas task = new AddReplicaProcessor(volumeMap, rbwDir, lazyWriteReplicaMap, false, exceptions, subTaskQueue); ForkJoinTask<Void> rbwTask = addReplicaThreadPool.submit(task); try { finalizedTask.get(); rbwTask.get(); } catch (InterruptedException | ExecutionException e) { exceptions.add(new IOException( "Failed to start sub tasks to add replica in replica map :" + e.getMessage())); } //wait for all the tasks to finish. waitForSubTaskToFinish(subTaskQueue, exceptions); } } /** * Wait till all the recursive task for add replica to volume completed. * * @param subTaskQueue * {@link AddReplicaProcessor} tasks list. * @param exceptions * exceptions occurred in sub tasks. * @throws IOException * throw if any sub task or multiple sub tasks failed. */ private void waitForSubTaskToFinish(Queue<RecursiveAction> subTaskQueue, List<IOException> exceptions) throws IOException { while (!subTaskQueue.isEmpty()) { RecursiveAction task = subTaskQueue.poll(); if (task != null) { task.join(); } } if (!exceptions.isEmpty()) { throw MultipleIOException.createIOException(exceptions); } } /** * Recover an unlinked tmp file on datanode restart. If the original block * does not exist, then the tmp file is renamed to be the * original file name and the original name is returned; otherwise the tmp * file is deleted and null is returned. */ File recoverTempUnlinkedBlock(File unlinkedTmp) throws IOException { File blockFile = FsDatasetUtil.getOrigFile(unlinkedTmp); if (blockFile.exists()) { // If the original block file still exists, then no recovery is needed. if (!fileIoProvider.delete(volume, unlinkedTmp)) { throw new IOException("Unable to cleanup unlinked tmp file " + unlinkedTmp); } return null; } else { fileIoProvider.rename(volume, unlinkedTmp, blockFile); return blockFile; } } /** * Move replicas in the lazy persist directory to their corresponding locations * in the finalized directory. * @return number of replicas recovered. */ private int moveLazyPersistReplicasToFinalized(File source) throws IOException { File[] files = fileIoProvider.listFiles(volume, source); int numRecovered = 0; for (File file : files) { if (file.isDirectory()) { numRecovered += moveLazyPersistReplicasToFinalized(file); } if (Block.isMetaFilename(file.getName())) { File metaFile = file; File blockFile = Block.metaToBlockFile(metaFile); long blockId = Block.filename2id(blockFile.getName()); File targetDir = DatanodeUtil.idToBlockDir(finalizedDir, blockId); if (blockFile.exists()) { try { fileIoProvider.mkdirsWithExistsCheck(volume, targetDir); } catch(IOException ioe) { LOG.warn("Failed to mkdirs " + targetDir); continue; } final File targetMetaFile = new File(targetDir, metaFile.getName()); try { fileIoProvider.rename(volume, metaFile, targetMetaFile); } catch (IOException e) { LOG.warn("Failed to move meta file from " + metaFile + " to " + targetMetaFile, e); continue; } final File targetBlockFile = new File(targetDir, blockFile.getName()); try { fileIoProvider.rename(volume, blockFile, targetBlockFile); } catch (IOException e) { LOG.warn("Failed to move block file from " + blockFile + " to " + targetBlockFile, e); continue; } if (targetBlockFile.exists() && targetMetaFile.exists()) { ++numRecovered; } else { // Failure should be rare. LOG.warn("Failed to move " + blockFile + " to " + targetDir); } } } } fileIoProvider.fullyDelete(volume, source); return numRecovered; } private void addReplicaToReplicasMap(Block block, ReplicaMap volumeMap, final RamDiskReplicaTracker lazyWriteReplicaMap,boolean isFinalized) throws IOException { ReplicaInfo newReplica = null; long blockId = block.getBlockId(); long genStamp = block.getGenerationStamp(); if (isFinalized) { newReplica = new ReplicaBuilder(ReplicaState.FINALIZED) .setBlockId(blockId) .setLength(block.getNumBytes()) .setGenerationStamp(genStamp) .setFsVolume(volume) .setDirectoryToUse(DatanodeUtil.idToBlockDir(finalizedDir, blockId)) .build(); } else { File file = new File(rbwDir, block.getBlockName()); boolean loadRwr = true; File restartMeta = new File(file.getParent() + File.pathSeparator + "." + file.getName() + ".restart"); Scanner sc = null; try { sc = new Scanner(restartMeta, "UTF-8"); // The restart meta file exists if (sc.hasNextLong() && (sc.nextLong() > timer.now())) { // It didn't expire. Load the replica as a RBW. // We don't know the expected block length, so just use 0 // and don't reserve any more space for writes. newReplica = new ReplicaBuilder(ReplicaState.RBW) .setBlockId(blockId) .setLength(validateIntegrityAndSetLength(file, genStamp)) .setGenerationStamp(genStamp) .setFsVolume(volume) .setDirectoryToUse(file.getParentFile()) .setWriterThread(null) .setBytesToReserve(0) .build(); loadRwr = false; } sc.close(); if (!fileIoProvider.delete(volume, restartMeta)) { FsDatasetImpl.LOG.warn("Failed to delete restart meta file: " + restartMeta.getPath()); } } catch (FileNotFoundException fnfe) { // nothing to do hereFile dir = } finally { if (sc != null) { sc.close(); } } // Restart meta doesn't exist or expired. if (loadRwr) { ReplicaBuilder builder = new ReplicaBuilder(ReplicaState.RWR) .setBlockId(blockId) .setLength(validateIntegrityAndSetLength(file, genStamp)) .setGenerationStamp(genStamp) .setFsVolume(volume) .setDirectoryToUse(file.getParentFile()); newReplica = builder.build(); } } ReplicaInfo tmpReplicaInfo = volumeMap.addAndGet(bpid, newReplica); ReplicaInfo oldReplica = (tmpReplicaInfo == newReplica) ? null : tmpReplicaInfo; if (oldReplica != null) { // We have multiple replicas of the same block so decide which one // to keep. newReplica = resolveDuplicateReplicas(newReplica, oldReplica, volumeMap); } // If we are retaining a replica on transient storage make sure // it is in the lazyWriteReplicaMap so it can be persisted // eventually. if (newReplica.getVolume().isTransientStorage()) { lazyWriteReplicaMap.addReplica(bpid, blockId, (FsVolumeImpl) newReplica.getVolume(), 0); } else { lazyWriteReplicaMap.discardReplica(bpid, blockId, false); } if (oldReplica == null) { incrNumBlocks(); } } /** * Add replicas under the given directory to the volume map * @param volumeMap the replicas map * @param dir an input directory * @param lazyWriteReplicaMap Map of replicas on transient * storage. * @param isFinalized true if the directory has finalized replicas; * false if the directory has rbw replicas * @param exceptions list of exception which need to return to parent thread. * @param subTaskQueue queue of sub tasks */ void addToReplicasMap(ReplicaMap volumeMap, File dir, final RamDiskReplicaTracker lazyWriteReplicaMap, boolean isFinalized, List<IOException> exceptions, Queue<RecursiveAction> subTaskQueue) throws IOException { File[] files = fileIoProvider.listFiles(volume, dir); Arrays.sort(files, FILE_COMPARATOR); for (int i = 0; i < files.length; i++) { File file = files[i]; if (file.isDirectory()) { // Launch new sub task. AddReplicaProcessor subTask = new AddReplicaProcessor(volumeMap, file, lazyWriteReplicaMap, isFinalized, exceptions, subTaskQueue); subTask.fork(); subTaskQueue.add(subTask); } if (isFinalized && FsDatasetUtil.isUnlinkTmpFile(file)) { file = recoverTempUnlinkedBlock(file); if (file == null) { // the original block still exists, so we cover it // in another iteration and can continue here continue; } } if (!Block.isBlockFilename(file)) { continue; } long genStamp = FsDatasetUtil.getGenerationStampFromFile( files, file, i); long blockId = Block.filename2id(file.getName()); Block block = new Block(blockId, file.length(), genStamp); addReplicaToReplicasMap(block, volumeMap, lazyWriteReplicaMap, isFinalized); } } /** * This method is invoked during DN startup when volumes are scanned to * build up the volumeMap. * * Given two replicas, decide which one to keep. The preference is as * follows: * 1. Prefer the replica with the higher generation stamp. * 2. If generation stamps are equal, prefer the replica with the * larger on-disk length. * 3. If on-disk length is the same, prefer the replica on persistent * storage volume. * 4. All other factors being equal, keep replica1. * * The other replica is removed from the volumeMap and is deleted from * its storage volume. * * @param replica1 * @param replica2 * @param volumeMap * @return the replica that is retained. * @throws IOException */ ReplicaInfo resolveDuplicateReplicas( final ReplicaInfo replica1, final ReplicaInfo replica2, final ReplicaMap volumeMap) throws IOException { if (!deleteDuplicateReplicas) { // Leave both block replicas in place. return replica1; } final ReplicaInfo replicaToDelete = selectReplicaToDelete(replica1, replica2); final ReplicaInfo replicaToKeep = (replicaToDelete != replica1) ? replica1 : replica2; // Update volumeMap and delete the replica volumeMap.add(bpid, replicaToKeep); if (replicaToDelete != null) { deleteReplica(replicaToDelete); } return replicaToKeep; } @VisibleForTesting static ReplicaInfo selectReplicaToDelete(final ReplicaInfo replica1, final ReplicaInfo replica2) { ReplicaInfo replicaToKeep; ReplicaInfo replicaToDelete; // it's the same block so don't ever delete it, even if GS or size // differs. caller should keep the one it just discovered on disk if (replica1.getBlockURI().equals(replica2.getBlockURI())) { return null; } if (replica1.getGenerationStamp() != replica2.getGenerationStamp()) { replicaToKeep = replica1.getGenerationStamp() > replica2.getGenerationStamp() ? replica1 : replica2; } else if (replica1.getNumBytes() != replica2.getNumBytes()) { replicaToKeep = replica1.getNumBytes() > replica2.getNumBytes() ? replica1 : replica2; } else if (replica1.getVolume().isTransientStorage() && !replica2.getVolume().isTransientStorage()) { replicaToKeep = replica2; } else { replicaToKeep = replica1; } replicaToDelete = (replicaToKeep == replica1) ? replica2 : replica1; if (LOG.isDebugEnabled()) { LOG.debug("resolveDuplicateReplicas decide to keep " + replicaToKeep + ". Will try to delete " + replicaToDelete); } return replicaToDelete; } private void deleteReplica(final ReplicaInfo replicaToDelete) { // Delete the files on disk. Failure here is okay. if (!replicaToDelete.deleteBlockData()) { LOG.warn("Failed to delete block file for replica " + replicaToDelete); } if (!replicaToDelete.deleteMetadata()) { LOG.warn("Failed to delete meta file for replica " + replicaToDelete); } } /** * Find out the number of bytes in the block that match its crc. * * This algorithm assumes that data corruption caused by unexpected * datanode shutdown occurs only in the last crc chunk. So it checks * only the last chunk. * * @param blockFile the block file * @param genStamp generation stamp of the block * @return the number of valid bytes */ private long validateIntegrityAndSetLength(File blockFile, long genStamp) { try { final File metaFile = FsDatasetUtil.getMetaFile(blockFile, genStamp); long blockFileLen = blockFile.length(); long metaFileLen = metaFile.length(); int crcHeaderLen = DataChecksum.getChecksumHeaderSize(); if (!blockFile.exists() || blockFileLen == 0 || !metaFile.exists() || metaFileLen < crcHeaderLen) { return 0; } try (DataInputStream checksumIn = new DataInputStream( new BufferedInputStream( fileIoProvider.getFileInputStream(volume, metaFile), ioFileBufferSize))) { // read and handle the common header here. For now just a version final DataChecksum checksum = BlockMetadataHeader.readDataChecksum( checksumIn, metaFile); if (Type.NULL.equals(checksum.getChecksumType())) { // in case of NULL checksum type consider full file as valid return blockFileLen; } int bytesPerChecksum = checksum.getBytesPerChecksum(); int checksumSize = checksum.getChecksumSize(); long numChunks = Math.min( (blockFileLen + bytesPerChecksum - 1) / bytesPerChecksum, (metaFileLen - crcHeaderLen) / checksumSize); if (numChunks == 0) { return 0; } try (InputStream blockIn = fileIoProvider.getFileInputStream( volume, blockFile); ReplicaInputStreams ris = new ReplicaInputStreams(blockIn, checksumIn, volume.obtainReference(), fileIoProvider)) { ris.skipChecksumFully((numChunks - 1) * checksumSize); long lastChunkStartPos = (numChunks - 1) * bytesPerChecksum; ris.skipDataFully(lastChunkStartPos); int lastChunkSize = (int) Math.min( bytesPerChecksum, blockFileLen - lastChunkStartPos); byte[] buf = new byte[lastChunkSize + checksumSize]; ris.readChecksumFully(buf, lastChunkSize, checksumSize); ris.readDataFully(buf, 0, lastChunkSize); checksum.update(buf, 0, lastChunkSize); long validFileLength; if (checksum.compare(buf, lastChunkSize)) { // last chunk matches crc validFileLength = lastChunkStartPos + lastChunkSize; } else { // last chunk is corrupt validFileLength = lastChunkStartPos; } // truncate if extra bytes are present without CRC if (blockFile.length() > validFileLength) { try (RandomAccessFile blockRAF = fileIoProvider.getRandomAccessFile( volume, blockFile, "rw")) { // truncate blockFile blockRAF.setLength(validFileLength); } } return validFileLength; } } } catch (IOException e) { FsDatasetImpl.LOG.warn("Getting exception while validating integrity " + "and setting length for blockFile", e); return 0; } } @Override public String toString() { return currentDir.getAbsolutePath(); } void shutdown(BlockListAsLongs blocksListToPersist) { saveReplicas(blocksListToPersist); saveDfsUsed(); dfsUsedSaved = true; // Remove the shutdown hook to avoid any memory leak if (shutdownHook != null) { ShutdownHookManager.get().removeShutdownHook(shutdownHook); } if (dfsUsage instanceof CachingGetSpaceUsed) { IOUtils.cleanupWithLogger(LOG, ((CachingGetSpaceUsed) dfsUsage)); } } private boolean readReplicasFromCache(ReplicaMap volumeMap, final RamDiskReplicaTracker lazyWriteReplicaMap) { ReplicaMap tmpReplicaMap = new ReplicaMap(new ReentrantReadWriteLock()); File replicaFile = new File(replicaCacheDir, REPLICA_CACHE_FILE); // Check whether the file exists or not. if (!replicaFile.exists()) { LOG.info("Replica Cache file: "+ replicaFile.getPath() + " doesn't exist "); return false; } long fileLastModifiedTime = replicaFile.lastModified(); if (System.currentTimeMillis() > fileLastModifiedTime + replicaCacheExpiry) { LOG.info("Replica Cache file: " + replicaFile.getPath() + " has gone stale"); // Just to make findbugs happy if (!replicaFile.delete()) { LOG.info("Replica Cache file: " + replicaFile.getPath() + " cannot be deleted"); } return false; } FileInputStream inputStream = null; try { inputStream = fileIoProvider.getFileInputStream(volume, replicaFile); BlockListAsLongs blocksList = BlockListAsLongs.readFrom(inputStream, maxDataLength); if (blocksList == null) { return false; } for (BlockReportReplica replica : blocksList) { switch (replica.getState()) { case FINALIZED: addReplicaToReplicasMap(replica, tmpReplicaMap, lazyWriteReplicaMap, true); break; case RUR: case RBW: case RWR: addReplicaToReplicasMap(replica, tmpReplicaMap, lazyWriteReplicaMap, false); break; default: break; } } // Now it is safe to add the replica into volumeMap // In case of any exception during parsing this cache file, fall back // to scan all the files on disk. for (Iterator<ReplicaInfo> iter = tmpReplicaMap.replicas(bpid).iterator(); iter.hasNext(); ) { ReplicaInfo info = iter.next(); // We use a lightweight GSet to store replicaInfo, we need to remove // it from one GSet before adding to another. iter.remove(); volumeMap.add(bpid, info); } LOG.info("Successfully read replica from cache file : " + replicaFile.getPath()); return true; } catch (Exception e) { // Any exception we need to revert back to read from disk // Log the error and return false LOG.info("Exception occurred while reading the replicas cache file: " + replicaFile.getPath(), e ); return false; } finally { // close the inputStream IOUtils.closeStream(inputStream); if (!fileIoProvider.delete(volume, replicaFile)) { LOG.info("Failed to delete replica cache file: " + replicaFile.getPath()); } } } private void saveReplicas(BlockListAsLongs blocksListToPersist) { if (blocksListToPersist == null || blocksListToPersist.getNumberOfBlocks()== 0) { return; } final File tmpFile = new File(replicaCacheDir, REPLICA_CACHE_FILE + ".tmp"); final File replicaCacheFile = new File(replicaCacheDir, REPLICA_CACHE_FILE); if (!fileIoProvider.deleteWithExistsCheck(volume, tmpFile) || !fileIoProvider.deleteWithExistsCheck(volume, replicaCacheFile)) { return; } FileOutputStream out = null; try { out = fileIoProvider.getFileOutputStream(volume, tmpFile); blocksListToPersist.writeTo(out); out.close(); // Renaming the tmp file to replicas fileIoProvider.moveFile(volume, tmpFile, replicaCacheFile); } catch (Exception e) { // If write failed, the volume might be bad. Since the cache file is // not critical, log the error, delete both the files (tmp and cache) // and continue. LOG.warn("Failed to write replicas to cache ", e); fileIoProvider.deleteWithExistsCheck(volume, replicaCacheFile); } finally { IOUtils.closeStream(out); fileIoProvider.deleteWithExistsCheck(volume, tmpFile); } } void incrNumBlocks() { numOfBlocks.incrementAndGet(); } void decrNumBlocks() { numOfBlocks.decrementAndGet(); } public long getNumOfBlocks() { return numOfBlocks.get(); } /** * Recursive action for add replica in map. */ class AddReplicaProcessor extends RecursiveAction { private ReplicaMap volumeMap; private File dir; private RamDiskReplicaTracker lazyWriteReplicaMap; private boolean isFinalized; private List<IOException> exceptions; private Queue<RecursiveAction> subTaskQueue; /** * @param volumeMap * the replicas map * @param dir * an input directory * @param lazyWriteReplicaMap * Map of replicas on transient storage. * @param isFinalized * true if the directory has finalized replicas; false if the * directory has rbw replicas * @param exceptions * List of exception which need to return to parent thread. * @param subTaskQueue * queue of sub tasks */ AddReplicaProcessor(ReplicaMap volumeMap, File dir, RamDiskReplicaTracker lazyWriteReplicaMap, boolean isFinalized, List<IOException> exceptions, Queue<RecursiveAction> subTaskQueue) { this.volumeMap = volumeMap; this.dir = dir; this.lazyWriteReplicaMap = lazyWriteReplicaMap; this.isFinalized = isFinalized; this.exceptions = exceptions; this.subTaskQueue = subTaskQueue; } @Override protected void compute() { try { addToReplicasMap(volumeMap, dir, lazyWriteReplicaMap, isFinalized, exceptions, subTaskQueue); } catch (IOException e) { LOG.warn("Caught exception while adding replicas from " + volume + " in subtask. Will throw later.", e); exceptions.add(e); } } } /** * Return the size of fork pool used for adding replica in map. */ @VisibleForTesting public static int getAddReplicaForkPoolSize() { return addReplicaThreadPool.getPoolSize(); } @VisibleForTesting public ForkJoinPool getAddReplicaThreadPool() { return addReplicaThreadPool; } @VisibleForTesting public static void reInitializeAddReplicaThreadPool() { addReplicaThreadPool.shutdown(); addReplicaThreadPool = null; } }
{ "pile_set_name": "Github" }
Lansing Lugnuts Baseball Outing 6-7-2014 Alumni took in the sights and sounds of Cooley Law Stadium while enjoying excellent food and testing their knowledge of GVSU related trivia. Following dinner, alumni made their way to their seats to watch the Lugnuts take on the Great Lakes Loons. During the game, alumni shared ideas and suggestions for future events and ways to get more Lansing area alumni involved. To top it all off, Alyssa Sagolla, one of the club leaders, won a souvenir baseball after being one of the lucky winners in the Lugnuts group raffle.
{ "pile_set_name": "Pile-CC" }
THE MRIDANGAM PLAYER’S VOCABULARY Aksharam – denotes a subdivision of a Maathra. For example, in Chaturashra-nadai, each Maathra has four Aksharams. Anu-dhrutam – one of the building blocks of Thaalas. It denotes a beat with your palm facing downwards. Symbol: U. Arai-edam – denotes the actual starting point of a Kriti after the Samam. The terminology is with respect to a Randu-kalai version of a Thaalam. Arai(half)-edam means that the starting point is half a Maathra after the Samam. Also, look at Eduppu, Kaal-edam, and Mukkaal-edam. Ata-thaalam – one of the seven basic Thaalas. Notation, Laghu-Laghu-Dhrutam-Dhrutam or 1100. Chaapu Thaalam – is a family of three Thaalas that do not exactly fit the “Suladi Sapta Thaala” system. For more details refer to the writeup on Thaalam in the main page. Chaturashram – to do with the number four. Chauka-thaalam – a slow-tempo version of a Thaalam, such that it necessitates splitting each Maathra into two or more beats. Chore – cooked rice in Malayaalam. Same as Saadam. Corvei – is one of the pre-composed items played in a Tani-aavartanam. It can be mathematically quite complex and challenging and is usually played three times. Dhrutam – 1) one of the building blocks of Thaalas. It denotes a set of two beats, the first beat with your palm facing downwards and a second with your palm facing upwards. Symbol: 0. 2) Dhrutam also denotes a fast tempo or kaala-pramanam. Dhruva-thaalam – one of the seven basic Thaalas. Notation, Laghu-Laghu-Dhrutam-Laghu or 1101. Eduppu – denotes the starting point of the Kriti with respect to the Samam. Eka-thaalam – one of the seven basic Thaalas. Notation, Laghu or 1. Gati – signifies the number of Aksharams making up a Maathra. Same as Nadai. Ghatam – specially made clay pot. Used as an accompanying instrument in concerts. Produces a beautiful, crisp and metallic sound. Jaati – means type. For example, Khanda-jaati means ‘of a type to do with the number five’. Jati – pattern that exemplifies the basic feel of a thaalam. Similar to Sarva-laghu. Jhampa-thaalam – one of the seven basic Thaalas. Notation, Laghu-Anu-dhrutam-Dhrutam or 1U0. Kaala-pramanam – tempo, of a song (say). Kaal-edam – denotes the actual starting point of a Kriti after the Samam. The terminology is with respect to a Randu-kalai version of a Thaalam. Kaal(quarter)-edam means that the starting point is a quarter Maathra after the Samam. Also, look at Eduppu, Arai-edam, and Mukkaal-edam. Kaarini – is the central black circle in the right hand side[1] of the Mridangam. It consists of granite powder, Manganese dioxide made into a paste using cooked rice. It is the heart of the Mridangam. Kaarvai – is a length of time (gap, number of Aksharams) between two strokes. Kalle – the stone used to tune the Mridangam along with the Kattai. Kanjira – an instrument that looks like a Tambourine. The skin is special and is of a monitor lizard (Varanus; mini iguanas). It is played with one hand and give a nice bass sound. It also has a few copper coins fixed to the edge which give the sound some treble. Kappi – is a coarse powder, of the same material as the Kaarini, which is inserted in between the two layers of skin to provide sustain. Also, look at Kuchchi. Kattai – a piece of wood (cylindrical and about 3-4 inches long) used to tune the Mridangam along with the Kalle and also to increase the tension in the Vaaru if needed. Khanda-chaapu thaalam – is a Chaapu thaalam of 2 1/2 Maathras, which, in Chaturashra-nadai yield 10 Aksharams. For more details refer to the writeup on Thaalam in the main page. Khandam – to do with the number five. Konnakkol – is the art of speaking the sounds of the mridangam. Kuchchi – is a two inch long slice of a particular grass or straw that is inserted between the two layers of skin on the right hand side[1] to give sustain. Laghu – one of the building blocks of Thaalas. Layam – denotes the inherent rhythmic content of the music (song or Mridangam patterns). Maathra – One beat of a Thaalam Madhyama-kaalam – denotes a medium speed tempo or kaala-pramanam. Matya-thaalam – one of the seven basic Thaalas. Notation, Laghu-Dhrutam-Laghu, or 101. Mishra-chaapu thaalam – is a Chaapu thaalam of 3 1/2 Maathras, which, in Chaturashra-nadai yield 14 Aksharams. For more details refer to the writeup on Thaalam in the main page. Mishram – to do with the number seven. Mohra – is a specific type of composition that is played towards the end of a Tani-aavartanam. For more details refer to the writeup on Tani-aavartanam in the main page. Morsing – a small instrument made up of a metallic vibrating slender rod. The instrument is tuned by sticking some carpenter’s wax at the tip of the rod. It is placed close to the mouth and is played by plucking the rod with one’s finger and inhaling and exhaling. Mridangam – The instrument under discussion. Mrit + angam meaning clay + body => the clay-bodied instrument. Nowadays it is made out of wood (particularly the roots of trees like Jack, Mahogany, Coconut palm etc.). Mukkaal-edam – denotes the actual starting point of a Kriti after the Samam. The terminology is with respect to a Randu-kalai version of a Thaalam. Mukkaal(three quarters)-edam means that the starting point is three quarters of a Maathra after the Samam. Mutharippu – Same as Theerumanam. Naadam – refers to a certain timbre of the sound that can be produced from the right hand side of the Mridangam. Nadai – same as Gati. Ravai – cream of wheat. A paste of Ravai with water is applied to the Thoppi to create the bass sound. Nowadays silicon-rubber or Silly Putty(TM) is also used. Roopaka-thaalam – one of the seven basic Thaalas. Notation, Dhrutam-Laghu or 01. Saadam – means cooked rice in Tamil. In this context it refers to the black center of the right hand side head, since cooked rice is used as the gum to stick it to the leather. Samam – the starting point of a Thaalam Sankeerna-chaapu thaalam – is a Chaapu thaalam of 4 1/2 Maathras, which, in Chaturashra-nadai yield 18 Aksharams. For more details refer to the writeup on Thaalam in the main page. Sankeernam – to do with the number nine. Used as a prefix, for example, Sankeerna-jaati Triputa Thaalam. Sarva-laghu – is a pattern that exemplifies the basic running rhythm of a Thaalam. The feeling induced when playing the Sarva-laghu is that of peace or Sowkhyam. Silicon-rubber – nowadays used instead of Ravai-paste in the left hand side of the Mridangam as a semi-permanent substitute. Silly Putty – is a Silicon based material that kids play with in the USA. It is quite suitable to be used instead of a Ravai-paste in the left hand side[2] as a semi-permanent substitute. Suladi Sapta Thaala – is the commonly used classification of Thaalas in Karnatic music. For more details refer to the writeup on Thaalam in the main page. Tani-aavartanam – Mridangam solo part of a concert. For more details refer to the writeup on Tani-aavartanam in the main page. Theerumanam – is a short pattern played three times to signify the end of a song, part of a song, or a corvei. Thaalam – is the basic recurring unit of rhythm. For more details refer to the writeup on Thaalam in the main page Thaala-vadya kacheri – is a concert featuring the rhythmic part of Karnatic music. It usually has a percussion ensemble consisting of Mridangam, Ghatam, Kanjira, Konnakkol, Morsing, Thavil etc. along with some vocal or melodic instrumental support. Thoppi – usually refers to the left hand side (the bass side) of the Mridangam. Actually means ‘a cap’ in Tamil Triputa-thaalam – One of the seven basic Thaalas. Notation Laghu-Dhrutam-Dhrutam or 100. Trishram – to do with the number three. Vaaru – the rope that connects the two drum heads. Made of Buffalo hide.
{ "pile_set_name": "Pile-CC" }
Flow cytometric assessment of reactive oxygen species generations that are directly related to cellular ZnO nanoparticle uptake. In this study, a simple flow cytometry protocol to evaluate nanoparticle associated biological response was proposed. Particularly, we have evaluated the effect of surface charge on the cellular nanoparticle associations and nanoparticle-induced apoptosis. Significant enhancement in side scattering intensity was observed for the HeLa cells treated with positively charged (PLL)ZnO nanoparticles, suggesting that the (PLL)ZnO nanoparticles may induce cell death via adsorption and endocytosis of the nanoparticles. On the other hand, the negatively charged (PAA)ZnO nanoparticle seems to cause cell death process indirectly via the released Zn ions, with less contribution from cellular association of nanoparticles. Time- and dose-dependent studies on cellular association of ZnO nanoparticles, and ZnO associated reactive oxygen species generation were also performed for the HeLa cells exposed to the (PLL)ZnO nanoparticle. For those cells associated with (PLL)ZnO nanoparticle, a significant enhancement in reactive oxygen species generation was observed even at a lower concentration (10 ppm), which was not observable for the results with the whole cell population. By using this approach, we are able to distinguish biological responses (e.g., reactive oxygen species (ROS) generation) directly related to the cellular associations of NPs from those indirectly related to the cellular associations of NPs, such as the cytotoxicity caused by the NP released metal ions.
{ "pile_set_name": "PubMed Abstracts" }
Labor Positions Laboring is one of the most difficult times during your entire pregnancy. What’s worse is that you don’t know what you are doing, especially if it is your first baby. No offense, but even as a labor and delivery nurse I didn’t know much about what I was doing. I knew about the different labor positions and such, but I still didn’t know what I was doing. One thing that is known is that movement during labor is very important and one of the best ways to help get labor progressing. If you sit in the same position for several hours your labor is going to stall, that is why it is important to know the different labor positions and find a few that are most comfortable for you during labor and switch between them. Your nurses and doctor can help you get into position and help you decide which positions will be best for you. It is important, though, to know the different labor positions because some nurses and doctors will keep you in one position and it is usually the position most convenient to them, on your back. Each position will have it’s pros and cons, and often different positions will help you tolerate the pain of labor differently as well. There are several different labor positions for you to chose from: Walking. If you are able to walk during your labor, many women opt for this position for as long as possible. Pros: Contractions often feel less painful, takes advantage of gravity, baby is better aligned with your pelvis, can help reduce back pain or back labor, encourages the baby to drop into the birth canal, may speed up labor. Cons: Cannot be done with an epidural, not recommended if you have high blood pressure, may not be able to be done if you need continuous fetal monitoring. Standing. Very similar to walking, standing is something else many women try to take advantage of when possible. Pros: Uses gravity, increases the amount of oxygen delivered to the baby, contractions feel less painful while being more effective, helps the baby drop to increase the urge to push, may speed up a labor that has stalled. Cons: Cannot be done with an epidural, hard for healthcare professionals to see the baby. Leaning or kneeling forward with support. This is a position we use a lot in the hospital if we want the baby to turn. Basically you use a pillow to lean forward on with your butt in the air. You are almost upside down. If your baby is not dropping it may be because she needs to turn. This position can help because gravity will get baby out of the birth canal so she can turn. Pros: Can help turn or shift a baby if needed, contractions are often less painful and more effective, can be done with an epidural if you have help to move in bed, baby is aligned with your pelvis, can help with back labor, easier for your partner or coach to put counter pressure on your back, great resting position, great for pelvic rocking. Cons: Hard for healthcare professionals to help with birth. Semi-sitting. This is one of the labor positions most often used in the hospital. Basically, when you are in the hospital bed and you raise the head of the bed slightly, this is considered a semi-sitting position. Pros: Comfortable, takes some advantage of gravity, great for resting, can be done with an epidural, easy for your doctor and nurses to check the fetal heart rate and cervical dilation, and easily done in a bed. Cons: Only partially takes advantage of gravity, puts some stress on your perineum, mobility of your pelvis is impaired. Sitting. Simple and can be done anywhere, this is another common position used in the hospital setting. I don’t think I need to explain this one. Pros: Can be done anywhere, great for resting, uses gravity, can be used with continuous fetal heart rate monitoring, and can be done in a hospital bed with an epidural. Cons: Puts pressure on your perineum, access to your perineum is impossible so you will have to move to have your cervix checked, and you may not be able to use this position if you have high blood pressure. Sitting on a toilet. This pretty much sums it up. The important part is to not push on the toilet. If you feel pressure like you have to have a bowel movement, tell your doctor or nurse so they can check your progress. Pros: Takes pressure off perineum while still allowing you to sit, helps open up and relax perineum, gets you used to the open-leg position and pressure, uses gravity. Cons: Cannot be done if you have an epidural, the hard toilet seat can be uncomfortable. Standing supported squat. With this position you will stand up, place your feet shoulder width apart and squat slightly, using either a squatting bar, a wall, or your partner or birthing coach for support. Pros: Helps open up your pelvis by up to an additional 15%, takes advantage of gravity, makes contractions feel less painful, helps your baby line up with the birth canal by lengthening your trunk, and it may increase your urge to push in the second stage of labor. Cons: If you are using your partner for support it will require a strong individual, may be tiring, cannot be done if you have an epidural. Squatting. Because you are likely to be a little off balance, it is important for you to be supported while squatting. In this position you are squatting a lot lower than in the standing supported squat. You can use a chair, bed, or birthing ball as support by resting your arms on them. Pros: Uses gravity, encourages rapid descent, may help rotate the baby, more freedom for you to shift your weight, allows access to your perineum, great position for fetal circulation, can help increase your pelvic diameter by up to 2 centimeters, requires less effort when bearing down. Cons: Cannot be done if you have an epidural because your legs will not support your weight, can be tiring, your legs may wear out before you are ready to move, harder for you to assist in the birth of your baby if you wish to, can be difficult for healthcare workers to hear fetal heart tones. Side-lying. You can lay on either side, but often times it is recommended that you lay on your left side if possible. Pros: Great for helping reduce blood pressure, helps increase the amount of oxygen delivered to the baby, great position for resting, easily done with an epidural though you may need some help moving, can help your contractions be more effective, easier for you to rest in between pushes, can slow down a labor that is moving too fast, your partner can help assist in the birth by holding your legs, easier for your partner to see the birth, easier for you to assist in the birth if you want, give healthcare workers access to your perineum, and it may decrease your risk of needing an episiotomy. Cons: Can be hard to hear fetal heart tones, no help from gravity, if no one is available to hold your legs you have to support them yourself, you may not feel like you are doing enough in this position. These are just the most common positions women find comfortable during labor. The important thing is to make sure you are comfortable and if you have an epidural find a safe position. Something else to keep in mind is the best thing to do during your labor is to move. This doesn’t mean you have to be walking, but changing positions during labor helps the baby come down and changes how the baby’s head hits your cervix. Often times the positions the doctors and nurses want you in are not the best position. For example, many times in the hospital you are pushing while laying on your back, and this is actually one of the worst positions for pushing, but with an epidural it is the safest and the one where you have the most sensation to push. If you don’t have an epidural, feel free to ask if you can push in a different position, however you are most comfortable. What labor position did you find most comfortable during your labor and delivery? Did you change positions a lot? If you had an epidural, how did that affect what position you were in?
{ "pile_set_name": "Pile-CC" }
Archive | August, 2015 Today I thought I would start a new feature here at ChurchSalt. Whenever I come across some text in Scripture that might challenge some folks, I’m going to try to send it out so that they are, well, challenged. Keep in mind that, while I may have a few thoughts on the page too, the […] Narcissism has never felt so spiritual! In watching the video below, you’re going to think it’s a parody or some sort of satirical look at how modern Christians often read the Bible, but sadly it isn’t. It’s a real product, and people are really buying it. The “ToYouBible” app (available on your pad or other […] Great article over at CrippleGate blog (click HERE if you haven’t read it already). Lays out some thoughts I’ve had for some time now, but better than I would have done it. The only thing I would add is that when you’re done reading it, ask yourself these questions: How would God’s judgement on my […] Short post today, Please read the following (please note that it’s a passage of Scripture, from the same collection of Scripture where we find John 3:16 and the statement “God is love”): “For what have I to do with judging outsiders? Is it not those inside the church whom you are to judge?” If your […] What, you don’t want to sing about me? Well, I’m a little hurt, but I suppose I’ll get over it. How about we sing about you then, or better yet, we can sing about us! Sounds silly, doesn’t it? How would you react if a worship leader at your church said such things? It would […]
{ "pile_set_name": "Pile-CC" }
// ==LICENSE-BEGIN== // Copyright 2017 European Digital Reading Lab. All rights reserved. // Licensed to the Readium Foundation under one or more contributor license agreements. // Use of this source code is governed by a BSD-style license // that can be found in the LICENSE file exposed on Github (readium) in the project repository. // ==LICENSE-END== import { BaseError } from "./base"; export class OpdsParsingError extends BaseError { }
{ "pile_set_name": "Github" }
"Water..." "Earth..." "Fire..." "Air." "Long ago..." "The four nations lived together in harmony." "Then everything changed when the fire nation attacked." "Only the avatar, master of all four elements could stop them." "But when the world needed him most he vanished." "100 years passed and my brother and I discovered the new avatar an airbender named aang." "And although his airbending skills were great he has a lot to learn before he's ready to save anyone." "But I believe aang can save the world." "I am proud of you, prince zuko." "You slayed the avatar." "You're so beautiful when you hate the world." "I don't hate you." "I don't hate you, too." "I have everything I always wanted." "But it's not at all how I thought it would be." "The avatar is alive." "I want you to find him..." "And end him." "I'm so excited to spend the weekend on ember island." "It's gonna be great to hang out on the beach and do nothing." "Doing nothing is a waste of time." "We're being sent away on a forced vacation." "I feel like a child." "Lighten up." "So dad wants to meet with his advisors alone without anyone else around." "Don't take it personally." "Doesn't your family have a house on ember island?" "We used to come every summer when we were kids." "That must've been fun." "That was a long time ago." "Welcome to ember island, kids." "It smells like old lady in here." "Gee, I wonder why." "Who are these two beautiful women?" "Can't you tell?" "It's li and me." "S lo and me." "Ooh, I love this seashell bedspread." "Are you serious?" "It looks like the beach threw up all over it." "We know you're upset that you were forced to come here this weekend." "But ember island is a magical place keep an open mind." "Give it a chance." "And it can help you understand yourselves and each other." "The beach has a special way of smoothing even the most ragged edges." "Time to hit the beach." "Aang, I know swimming is fun and all but do you really think you should be exposing yourself like that?" "Cover up." "What?" "I'm wearing trunks." "I know, it's youtattoos I'm worried about." "What if someone sees you?" "There are walls all around us." "It's completely safe." "Whoo, hey!" "This has got to be the most boring job in the fire nation." "Nothing ever happens." "Whoa!" "Let's go again." "The avatar's alive." "We better send a messenger hawk to the fire lord." "A black ribbon message." "This is so exciting." "Ahh!" "Hey, you need some help unpacking?" "Sure, thanks." "Could you scooch just a little bit more to the..." "Perfect." "Here..." "This is for you." "Why would I want that?" "I saw it and I thought it was pretty." "Don't girls like stuff like this?" "Maybe stupid girls." "Forget it!" "Wow, thanks." "This is so pretty." "Not as pretty as you are." "That shell's not so great." "Ahem, shade... shade." "I thought since it's so hot... here." "Thks." "This is really refreshing." "Hey, beach bums, we're playing next." "Ty Lee, get over here now." "See that girl with the silly pigtails?" "When she runs towards the ball..." "There's just the slightest hesitation of her left foot." "I'm willing to bet a childhood injury has weakened her." "Keep serving the ball to her left and we'll destroy her and the rest of her team." "Dismissed." "Yes, we defeated you for all time." "You will never rise from the ashes of your shame and humiliation." "Well, that was fun." "I'm having a party tonight." "You should come by." "Sure..." "I love parties." "Your friend can come, too." "Uh, what about me and my brother?" "Aren't you going to invite us?" "You don't know who we are, do you?" "Don't you know who we are?" "We're chan and ruon-jian." "Yeah." "But fine, you're invited." "Just so you know, though some of the most important teenagers in the fire nation are gonna be at this party so..." "Try and act normal." "We'll do our best." "Why didn't you tell those guys who were were?" "I guess I was intrigued." "I'm so used to people worshipping us." "They should." "Yes, I know, and I love it." "But for once, I just wanted to see how people would treat us if they didn't know who we were." "Like waves washing away the footprints othe sand ember island gives everyone a clean slate." "Ember island reveals the true you." "To the party." "To the party." "Um... you're a little early." "No one's here yet." "I heard you telling someone you'd be partying from dusk till dawn." "It's dusk so we're here." "But that's just an expression." "We are the perfect party guests." "We arrive right on time because we are very punctual." "All right, listen, my dad's an admiral." "He has no idea I'm having this party so don't mess anything up." "That's a sharp outfit, chan... careful." "You could puncture the hull of an empire-class fire nation battleship leaving thousands to drown at sea..." "Because it so sharp." "Um... thanks." "Hey, first ones here, huh?" "He thinks he's so great." "Well, what do you think of him?" "I don't have any opinion about him." "I hardly know him." "You like him, don't you?" "So how do you know ty Lee?" "I met her at the beach today." "She was pretty impressed by a sand pagoda that I made for her." "Well, I met her first." "Look, it doesn't matter who I met first 'cause I like you all." "But which one of us do you like?" "Yeah." "Tell us." "I don't know, I don't know." "Ooh." "Ahh..." "Oh, I'm glad you're here." "Those boys won't leave me alone." "I guess they all just like me too much." "Come on, ty Lee, you can't be this ignorant." "What are you talking about?" "Those boys only like you because you make it so easy for them." "You're not a challenge- you're a tease." "It's not like they actually care who you are." "Ok, ok, calm down." "I didn't mean what I said." "Look, maybe I just said it because I was a little..." "Jealous." "What?" "You were jealous of me?" "Um, but, you're the most beautiful, smartest, perfect girl in the world." "Well, you're right about all those things." "But for some reason when I meet boys they act as if I'm going to do something horrible to them." "But you probably would do something horrible to them." "I'm sure they're just intimidated by you." "Ok, look, if you want a boy to like you just look at him and smile a lot and laugh at everything he says even if it's not funny." "Well, that sounds really shallow and stupid." "Let's try it." "Ok." ""Hey, there, sweet sugar cakes." "How ya liking' this party?"" " I'm bored." " I know." "I'm hungry." "So what?" "So find me some food." "Sure." "Chan, I'm ready for a tour of the house." "Is this your first time on ember island?" "No, I used to come here years ago." "It's a great place if you like sand." "Yeah, it's like, "welcome to Sandy land."" "Your arms look so strong." "Yeah, I know." "You're pretty." "Together, you and I will be..." "The strongest couple in the entire world." "We will dominate the earth!" "Uh..." "I gotta go." "Hey, watch it." "That food was for my cranky girlfriend." "Whoa..." "What are you doing?" "Stop talking to my girlfriend." "Relax, it's just a party." "Uh!" "Zuko, what is wrong with you?" "What's wrong with me?" "Your temper's out of control." "You blow up over every little thing." "You're so impatient and hot-headed and angry." "Well, at least I feel something... as opposed to you." "You have no passion for anything." "You're just a big blah." "It's over, zuko." "We're done." "Who broke my Nana's vase?" "That's it, you're out of here." "I was just leaving." "Have fun by yourself, loser boy." "Nice." "Guys, you're all gonna think I'm crazy but it feels like a metal man is coming." "I thought I'd find you here." "Those summers we spent here seem so long ago." "So much has changed." "Come down to the beach with me." "Come on, this place is depressing." "Hey..." "Where's your new boyfriend?" "Are you cold?" "I'm freezing." "I'll make a fire." "There's plenty of stuff to burn in there." "This is crazy." "How can we beat a guy who blows things up with his mind?" "We can." "Jump on appa." "I'll try to distract him." "I'm ok." "Well, that was random." "I don't think so." "I get the feeling he knows who we are." "What are you doing?" "What does it look like I'm doing." "But it's a painting of your family." "You think I care?" "I think you do." "You don't know me, so why don't you just mind your own business?" "Ah, I know you." "No, you don't." "You're stuck in your little ty Lee world where everything's great all the time." "Zuko, leave her alone." "I'm so pretty, look at me." "I can walk on my hands, whoo!" "Circus freak." "Yes, I'm a circus freak." "Go ahead and laugh all you want." "You wanna know why I joined the circus?" "Here we go." "Do you have any idea what my home life was like growing up with six sisters who look exactly like me?" "It was like, I didn't even have my own name." "I joined the circus because" "I was scared of spending the rest of my life as part of a matched set." "At least, I'm different now." "Circus freak is a compliment." "Guess that explains why you need 10 boyfriends, too." "I'm sorry, what?" "Attention issues?" "You couldn't get enough attention when you were a kid so you're trying to make up for it now." "Well, what's your excuse, mai?" "You were an only child for 15 years." "But even with all that attention your aura is this dingy, pasty, gray..." "I don't believe in auras." "Yeah, you don't believe in anything." "Oh, well, I'm sorry I can't be as high-strung and crazy as the rest of you." "I'm sorry, too." "I wish you would be high-strung and crazy for once instead of keeping all your feelings bottled up inside." "She just called your aura dingy." "Are you gonna take that?" "What do you want from me?" "You want a teary confession about how hard my childhood was?" "Well, it wasn't." "I was a rich only child who got anything I wanted as long as I behaved..." "And sat still and didn't speak unless spoken to." "My mother said I had to keep out of trouble." "We had my dad's political career to think about." "Well, that's it, then." "You had a controlling mother who had certain expectations and if you strayed from them you were shut down." "That's why you're afraid to care about anything and why you can't express yourself." "You want me to express myself?" "Leave me alone!" "I like it when you express yourself." "Don't touch me." "I'm still mad at you." "My life hasn't been that easy, either, mai." "Whatever- that doesn't excuse the way you've been acting." "Calm down, you guys." "This much negative energy is bad for your skin." "You'll totally break out." "Bad skin?" "Normal teenagers worry about bad skin." "I don't have that luxury." "My father decided to teach me a permanent lesson on my face." "Sorry, zuko, I..." "For so long, I thought that if my dad accepted me, I'd be happy." "I'm back home, now." "My dad talks to me." "Huh, he even thinks I'm a hero." "Everything should be perfect, right?" "I should be happy now, but I'm not." "I'm angrier than ever and I don't know why." "There's a simple question you need to answer then." "Who are you angry at?" "No one, I'm just angry." "Yeah, who are you angry at, zuko?" "Everyone..." "I don't know." "Is it dad?" "No, no." "Your uncle?" "Me?" "No, no... no, no." "Then who?" "Who are you angry at?" "Answer the question, zuko." "Talk to us." "Come on, answer the question." "Come on, answer it." "I'm angry at myself." "Why?" "Because I'm confused." "Because I'm not sure I know the difference between right and wrong anymore." "You're pathetic." "I know one thing I care about..." "I care about you." "Well, those were wonderful performances, everyone." "I guess you wouldn't understand, would you, azula because you're just so perfect." "Well, yes, I guess you're right." "I don't have sob stories like all of you." "I could sit here and complain how our mom liked zuko more than me but I don't really care." "My own mother..." "Thought I was a monster." "She was right, of course, but it still hurt." "What lo and li said came true." "The beach did help us learn about ourselves." "I feel all smoothed." "I'll always remember this." "You know what would make this trip really memorable?" "We've got some bad news, chan." "Party's over." "S" "Subtitle" "Subtitle fixed" "Subtitle fixed by" "Subtitle fixed by LEO33" "Subtitle fixed by LEO33"
{ "pile_set_name": "OpenSubtitles" }
Thomas H. Robbins Jr. Thomas Hinckley Robbins Jr. (11 May 1900 – 12 December 1972) was a rear admiral of the United States Navy. A naval aviator, his career included command of an aircraft carrier during World War II, service as a key advisor to the United States Secretary of the Navy, and a tour as President of the Naval War College. Robbins ancestors included William Bradford (1590-1657), the first governor of the Massachusetts Bay Colony, and Thomas Hinckley (1618-1706), a governor of Plymouth Colony. His great-great-grandfather was Fisher Ames (1758-1808), a Massachusetts politician who served in the United States House of Representatives. Naval career Robbins was born on 11 May 1900 in Paris, France, the son of Thomas Hinckley Robbins Sr. (9 April 1877 – 14 November 1954), and the former Alice Ames (23 September 1873 – 23 October 1951). He entered the United States Naval Academy in Annapolis, Maryland, as a member of the Class of 1920, but his curriculum was accelerated due to the entry of the United States into World War I on 6 April 1917, and he graduated in 1919. Interwar Between 1919 and 1922, Robbins served consecutively aboard the troop transport , the battleship , and the destroyer . From 1922 to 1924, he was assigned to the armed yacht in Turkish waters, also seeing service aboard the submarine chaser in the Black Sea in 1923 and 1924. In 1924 and 1925 he served first aboard the destroyer , then aboard the destroyer . He then was an instructor at the U.S. Naval Academy from 1925 to 1927, before reporting to the battleship Utah in 1928 for a second tour aboard her. While aboard Utah in 1928, Robbins – by now a lieutenant – was ordered to Naval Air Station Pensacola in Pensacola, Florida, for flight training, and he was designated Naval Aviator No. 3426 later that year. He served his first aviation tour as a member of Scouting Squadron 5 (VS-5) aboard the light cruiser from 1928 to 1929, followed by duty as the executive officer of Scouting Squadron 6 (VS-6) aboard the light cruiser from 1929 to 1931. From 1931 to 1932 he was the assistant operations officer at Naval Air Station Anacostia in Washington, D.C., after that serving as aide to the chief of the Bureau of Aeronautics at the United States Department of the Navy in Washington from 1932 to 1933. Robbins became commanding officer of the minesweeper/aircraft tender in 1933. While he was in command, Sandpiper operated in the waters of the Territory of Alaska and took part in the Aleutian Islands survey expedition of 1935. Leaving Sandpiper in 1935, he was assigned to Scouting Squadron 4 (VS-4) aboard the aircraft carrier . He entered the Naval War College in Newport, Rhode Island, in 1936, graduating in 1937. He then became aviation officer at the Naval Torpedo Station at Newport in 1937 before returning to the Naval War College to serve on its staff from 1938 to 1939. Robbins next tour was as navigator of the aircraft carrier from 1939 to 1940, followed by duty in 1940 and 1941 as aviation officer on the staff of the Commander, Scouting Force, and Commander, Task Force 3. Later in 1941 he became the Chief of Naval Operations liaison officer to the Commanding General of the Army Air Forces Command in Washington, D.C., the position he held when the United States entered World War II on 7 December 1941. World War II In 1942, Robbins became liaison officer from Headquarters, Commander-in-Chief, United States Fleet, to the U.S. Army Air Forces Combat Command in Washington, D.C. Later in 1942, he became aviation plans officer for Headquarters, Commander-in-Chief, United States Fleet. In 1943 he moved on to become naval aviation officer at the Army-Navy Staff College in Washington. In 1944, he received a temporary assignment to Air Force, United States Pacific Fleet, embarked aboard the aircraft carrier . On 30 January 1945, Robbins – by then a captain – became commanding officer of the aircraft carrier . While he was in command, Lexington participated in strikes against Tokyo, Japan, in February 1945 in support of the Iwo Jima campaign and against Japanese forces on Iwo Jima itself. After an overhaul in the United States, Lexington returned to action, attacking Japanese forces on Luzon in June 1945 during the Luzon campaign and participating in heavy strikes against Japan itself in July and August 1945, when the war ended. Immediately after the war, Robbins oversaw Lexingtons efforts to air-drop supplies to Allied prisoners-of-war in Japan in advance of their liberation by occupying American forces. Lexington was the first Essex-class aircraft carrier to enter Tokyo Bay after the war, and she was anchored there on 16 November 1945 when Robbins was promoted to rear admiral and left the ship for assignments in Washington, D.C. He received the Legion of Merit with Combat Distinguishing Device (Combat "V") for his tour aboard Lexington. Postwar Between 1945 and 1948, Robbins served consecutively in the Office of the Deputy Chief of Naval Operations for Air, the Office of the Chief of Naval Operations, and the Office of the United States Secretary of the Navy, and became a key advisor to Secretary of the Navy James Forrestal while Forrestal was overseeing the completion of the Navys transition from an orientation toward battleships to one toward aircraft carriers. In February 1947, Robbins read of a United States Army Air Forces plan to fly the P-82 Twin Mustang fighter Betty Jo nonstop from Honolulu, Hawaii, to New York City. He suggested that the Navy have a P2V-1 Neptune patrol plane take off from Honolulu within 30 minutes of the P-82s departure and beat the P-82 to New York in order to steal the days glory from the Army Air Forces, but the Navy did not follow up on his idea. From 1948 to 1949, Robbins was the commander of Carrier Division 17. He was the U.S. Navy member of the Joint Chiefs of Staffs Joint Strategic Survey Committee in Washington, D.C., from 1949 to 1952, then served as the commander of Carrier Division 2 from 1952 to 1953. Robbins became chief of staff of the Naval War College in 1953. When the tour of the colleges 28th president, Vice Admiral Richard L. Conolly, ended on 2 November 1953. Robbins served as acting president until the 29th president, Vice Admiral Lynde D. McCormick, began his tour on 3 May 1954, after which Robbins served as McCormicks chief of staff. When McCormick became the first of the colleges presidents to die in office on 16 August 1956, Robbins again became acting president, serving in this capacity until himself becoming the colleges 30th president on 5 September 1956. During his presidency, Robbins instituted a new course for senior officers of foreign navies that McCormick had established before his death. After leaving the college on 1 August 1957, Robbins became President of the Naval Discharge Review Board at the Bureau of Naval Personnel at the Department of the Navy in Washington, D.C., the first Naval War College president since World War II to remain in active Navy service after his presidency. Leaving the board in 1960, he became Commandant of the Potomac River Naval Command, Naval Weapons Plant, Washington, D.C., receiving a gold star in lieu of a second award of the Legion of Merit for his service in that capacity between August 1960 and May 1962. Upon conclusion of his tour in the Potomac River Naval Command, Robbins retired from the Navy as a rear admiral in 1962. Personal life Robbins married the former Barbara Little (30 June 1904–16 May 2000) in 1930. They had a daughter, Barbara Robbins Armstrong. Death Robbins died on 12 December 1972 in New London, Connecticut. He is buried at the United States Naval Academy Cemetery. Awards Legion of Merit (two awards, one with Combat "V") Navy Commendation Ribbon Presidential Unit Citation (three awards) World War I Victory Medal with Silver Star American Defense Service Medal (two awards) American Campaign Medal Asiatic–Pacific Campaign Medal (five awards) World War II Victory Medal Navy Occupation Service Medal National Defense Service Medal (two awards) Philippine Liberation Medal (two awards) Notes References ROBBINS, Thomas, Jr., RADM at togetherweserved.com Past Presidents page at the Naval War College official Web site Military Times Hall of Valor: Thomas H. Robbins Friend, Melinda K. Thomas H. Robbins: A Register of His Papers in the Naval Historical Foundation Collection in the Library of Congress. Washington, D.C.: Manuscript Division, Library of Congress, 2008. Jackson, John E., Jondavid Duvall, and Kimberly Rhoades, eds. Naval War College Illustrated History and Guide, Second Edition. Washington, D.C.: Government Printing Office, 2010. , . Power, Hugh. Carrier Lexington. Texas A&M University Press, 1995. . Trimble, William. Attack From The Sea: A History Of The U.S. Navy's Seaplane Striking Force. Annapolis, Maryland: Naval Institute Press, 2005. . External links Citation for second award of Legion of Merit to Thomas H. Robbins at Military Times Hall of Valor Portrait of Thomas H. Robbins, Jr., at Naval War College official Web site Category:1900 births Category:1972 deaths Category:People from Paris Category:Presidents of the Naval War College Category:United States Navy admirals Category:United States Naval Academy alumni Category:United States Naval Academy faculty Category:Naval War College alumni Category:Naval War College faculty Category:United States Naval Aviators Category:American military personnel of World War II Category:Recipients of the Legion of Merit Category:Burials at the United States Naval Academy Cemetery
{ "pile_set_name": "Wikipedia (en)" }
Comparison of MS-DOS and Macintosh pharmacokinetic analysis programs using a two-compartment, two-infusion dosing scheme. Pharmacokinetic values derived by three nonlinear least-squares regression computer programs for sets of serum drug concentration data were compared. The three programs selected for comparison were the MS-DOS-based programs PCNONLIN and ADAPT and the Macintosh program BOOMER. Data on serum recainam hydrochloride concentration in 10 patients given an i.v. loading dose followed by a maintenance infusion were fitted by the appropriate models in each program. Samples had been subjected to reverse-phase isocratic high-performance liquid chromatography with ultraviolet light detection; intraday and interday coefficients of variation were less than 8% over the range of concentrations measured. A two-compartment model was used for all regressions. Each program was given identical initial estimates, and the simplex minimization algorithm of each program was used to fit the model to the data. An identical weighting scheme was used for all three programs. The mean pharmacokinetic values estimated by each program for the 10 data sets were essentially identical. Slightly larger rate constants and smaller volume terms were derived by BOOMER. BOOMER yielded the lowest weighted sum of squares and the highest correlation coefficient. A mean concentration-time plot showed that the programs all produced values that described the data very well. The three computer programs used in this analysis derived essentially the same pharmacokinetic values to describe sets of serum drug concentration data. The BOOMER program provides an acceptable alternative to MS-DOS-based programs for pharmacokinetic analysis.
{ "pile_set_name": "PubMed Abstracts" }
We are trying to determine by genetic and biochemical methods the interactions between different proteins in the replication and recombination complexes of phage T4. The gene 32 protein is a key element in these interactions and we will continue our studies to recognize such interactions in vivo by analysing mutation-specific suppressors. In addition we shall try to isolate the corresponding mutant proteins and determine their interaction potential and function in vitro. We will also collaborate with Dr. Robert Marsh at the University of Texas in Dallas to determine by restriction enzyme fragment analysis whether the first round to T4 DNA replication starts from one or from several origins. In addition, in collaboration with investigators at the Max-Planck-Institute fur Zuchtungsforschung in Cologne, Germany, we will study uptake and fate of DNA added to plant protoplasts. BIOGRAPHIC REFERENCES: Mosig, G. and Bock, S. Gene 32 Protein of Bacteriophage T4 Moderates the Activities of the T4 Gene 46/47-Controlled Nuclease and of the Escherichia coli RecBC Nuclease In Vivo, Journal of Virology, 17, 756-761 (1976). Mosig, G. Linkage Map and Genes of Bacteriophage T4, Handbook of Biochemistry and Molecular Biology, 3rd edition, pp. 664-676 (1976).
{ "pile_set_name": "NIH ExPorter" }
AtCCS is a functional homolog of the yeast copper chaperone Ccs1/Lys7. In plant chloroplasts two superoxide dismutase (SOD) activities occur, FeSOD and Cu/ZnSOD, with reciprocal regulation in response to copper availability. This system presents a unique model to study the regulation of metal-cofactor delivery to an organelle. The Arabidopsis thaliana gene AtCCS encodes a functional homolog to yeast Ccs1p/Lys7p, a copper chaperone for SOD. The AtCCS protein was localized to chloroplasts where it may supply copper to the stromal Cu/ZnSOD. AtCCS mRNA expression levels are upregulated in response to Cu-feeding and senescence. We propose that AtCCS expression is regulated to allow the most optimal use of Cu for photosynthesis.
{ "pile_set_name": "PubMed Abstracts" }
When Adam Yauch Park was desecrated by anti Semitic and pro-Trump graffiti on Friday afternoon the community reaction was swift. Law enforcement deemed the incident a hate crime and the City Parks Department immediately painted over the offensive tags. State Senator, Daniel Squadron deftly organized a bevy of elected officials and religious leaders for the […] Hate is on our doorstep, where our children play. On Friday afternoon a resident alerted Senator Daniel Squadron’s office that Adam Yauch Park playground had been defaced with swastikas and the message, “Go Trump.” The Daily News reports The NYPD Hate Crimes Task Force is investigating the incident and the Parks Department is in the […]
{ "pile_set_name": "Pile-CC" }
Q: How to write a variadic-template function with objects as parameters? Consider the following functions (it uses the CSV parser library from ben-strasser (github)) void col1(const std::string &fn, Base *v0) { io::CSVReader<2> in(fn); in.read_header(io::ignore_extra_column, "epoch", v0->column); double ign; while (in.read_row(ign, v0->value)) { v0->process(); } } void col2(const std::string &fn, Base *v0, Base *v1) { io::CSVReader<3> in(fn); in.read_header(io::ignore_extra_column, "epoch", v0->column, v1->column); double ign; while (in.read_row(ign, v0->value, v1->value)) { v0->process(); v1->process(); } } This function processes the value in column 2 of a CSV-file. v0 of type Base * contains the member value which is filled by read_row and is processed in the process-method. Base is an interface-class of calculation methods (for exemple: one is Max, another one is MinMaxAvg). How could I rewrite this function to accept any number of Base * arguments in order to process multiple columns? read_header and read_row are variadic-template function and thus can accept any number of arguments, but they only work with scalars. How do I expand/unpack the variadic-argument so that it calls or uses a member? I tried some things, reading some examples, but I'm unable to create something which works, here is my current/ridicules code: template<unsigned int COL> void func(const std::string &fn, Base &... values) { io::CSVReader<COL> in(fn); // that's it :-( } A: Some well-placed pack expansions will work dandy: template <class... Bases> void col(const std::string &fn, Bases *... bases) { io::CSVReader<sizeof...(Bases) + 1u> in(fn); in.read_header(io::ignore_extra_column, "epoch", bases->column...); double ign; while (in.read_row(ign, bases->value...)) { // Awful C++11 arbitrary expansion trick int dum[]{ 0, (void( bases->process() ), 0)... }; (void) dum; // Alternative, sweet and beautiful C++17 fold expression // (void)(bases->process(), ...); } }
{ "pile_set_name": "StackExchange" }
1. Introduction {#sec1-microorganisms-08-00454} =============== Formic acid, a monocarboxylic acid, is one of the simplest organic compounds. It is a colourless liquid with a pungent odour \[[@B1-microorganisms-08-00454]\]. The freezing and the boiling points of formate are 8.3 and 100.7 °C, respectively. The carbon of formic acid is a poor electrophile. This characteristic makes formic acid a strong acid (pK~a~ = 3.75), e.g., compared to acetic acid (pK~a~ = 4.75) \[[@B2-microorganisms-08-00454]\]. The salt of formic acid is formate. Formate can be produced using various routes such as the electrochemical reduction of CO~2~ \[[@B3-microorganisms-08-00454],[@B4-microorganisms-08-00454],[@B5-microorganisms-08-00454],[@B6-microorganisms-08-00454],[@B7-microorganisms-08-00454]\], photo-reduction of CO~2~ \[[@B8-microorganisms-08-00454]\], hydrogenation of CO~2~ \[[@B9-microorganisms-08-00454],[@B10-microorganisms-08-00454]\], selective oxidation of biomass \[[@B11-microorganisms-08-00454],[@B12-microorganisms-08-00454]\], partial oxidation of natural gas \[[@B13-microorganisms-08-00454]\], and hydration of syngas (e.g., carbon monoxide) \[[@B14-microorganisms-08-00454]\]. In 1670, John Wray had already isolated formate from ants \[[@B15-microorganisms-08-00454]\], and later it was named after "formicidae", the ant family. Formate has numerous functions in biological systems, such as serving as an irritant in the sprayed venom of some ant species \[[@B16-microorganisms-08-00454]\], as antibacterial substance \[[@B17-microorganisms-08-00454]\], and it is used for food preservation, as cosmetic additive, or as pesticide \[[@B18-microorganisms-08-00454]\]. Moreover, it can be used as a non-flammable liquid fuel \[[@B19-microorganisms-08-00454]\], an energy storage compound \[[@B20-microorganisms-08-00454],[@B21-microorganisms-08-00454]\], and as a feedstock for cultivation of microorganisms \[[@B22-microorganisms-08-00454]\]. Hence, biological production and utilization of formate is of ecological and biotechnological significance. Metabolisation of formate can occur during acetogenesis \[[@B23-microorganisms-08-00454]\], methanogenesis \[[@B24-microorganisms-08-00454]\], and molecular hydrogen (H~2~) production \[[@B25-microorganisms-08-00454]\]. Moreover, formate can provide cells with both a carbon source and reducing power. It delivers a significant contribution to anaerobic syntrophic associations, as formate is transferred as redox currency between the organisms \[[@B26-microorganisms-08-00454]\]. According to a search using the PubChem Substance and Compound Databases \[[@B27-microorganisms-08-00454]\], there are 189 biological systems that include formate as a reaction component. This shows the significance of formate in functioning of biological systems. Therefore, formate assimilation pathways and studying how microorganisms with different physiologies can convert formate into specific metabolites are increasingly attracting attention. One possible way to biologically produce formate is the reduction of CO~2~ by H~2~ through the hydrogen-dependent CO~2~ reductase (HDCR). The HDCR was first isolated and characterized in *Acetobacterium woodii* \[[@B28-microorganisms-08-00454]\]. It consists of four subunits: a putative formate dehydrogenase (FdhF1/2), a Fe--Fe hydrogenase (HydA), and two small electron transfer subunits \[[@B28-microorganisms-08-00454],[@B29-microorganisms-08-00454]\]. The HDCR operates the direction of the catalysis depends on the substrate concentration \[[@B28-microorganisms-08-00454]\]. Another option to biologically produce formate is through pyruvate cleavage by pyruvate formate lyase (PFL) (30). PFL is an oxygen sensitive, ubiquitous enzyme that supports increased ATP yield during fermentation of, e.g., glucose \[[@B14-microorganisms-08-00454]\]. PFL plays a central role in many organisms providing formate and acetyl-coenzyme A (CoA) via the conversion of pyruvate and CoA. The activation of PFL occurs with an enzyme referred to as PFL-activating enzyme (PFL-AE). The activation of PFL involves an abstraction of hydrogen through PFL-AE, which belongs to the radical S-adenosyl-methionine (SAM) super-family \[[@B30-microorganisms-08-00454],[@B31-microorganisms-08-00454]\]. To understand the assimilation of formate and how it can support microbial growth, the reverse PFL reaction was studied in vivo in *Escherichia coli.* \[[@B32-microorganisms-08-00454]\]. PFL-dependent co-assimilation of acetate and formate was demonstrated with *E. coli* mutant strains. It was concluded that PFL could support growth on formate as the carbon source. Oxidation of formate can be catalysed by some microorganisms such as Burkholderiaceae \[[@B33-microorganisms-08-00454]\], Clostridiaceae \[[@B34-microorganisms-08-00454],[@B35-microorganisms-08-00454]\], and Enterobacteriaceae \[[@B36-microorganisms-08-00454],[@B37-microorganisms-08-00454],[@B38-microorganisms-08-00454],[@B39-microorganisms-08-00454],[@B40-microorganisms-08-00454],[@B41-microorganisms-08-00454],[@B42-microorganisms-08-00454],[@B43-microorganisms-08-00454],[@B44-microorganisms-08-00454]\]. The oxidation of formate is performed to avoid cellular toxification through intracellular formate accumulation \[[@B45-microorganisms-08-00454]\]. In *E. coli*, formate is able to disturb the membrane potential and allows the hydrogen ion (H^+^) to enter the cell from the medium \[[@B45-microorganisms-08-00454],[@B46-microorganisms-08-00454]\]. At certain concentrations, this leads to a collapse of the pH gradient across the cytoplasmic membrane, referred to as uncoupling, that consequently ceases the metabolism \[[@B47-microorganisms-08-00454]\]. Hence, detoxification mechanisms were developed to avoid uncoupling at high concentrations of formate. In *E. coli*, formate is disproportionated into H~2~/CO~2~ by the formate hydrogen lyase (FHL) complex. There, Fdh along with hydrogenase-3 (Hyd-3) which is encoded by *hyc* operon, can form the FHL complex \[[@B48-microorganisms-08-00454]\]. Even though the oxidation of formate can occur as a result of detoxification mechanism, formate cannot be metabolised by members of Burkholderiaceae, Clostridiaceae, and Enterobacteriaceae, as this reaction is not energetically sufficient to support growth. Under anoxic conditions, the stoichiometry of formate conversion is given below (Equation (1)): Until the discovery of the hyperthermophilic archaeon *Thermococcus onnurineus* NA1 \[[@B49-microorganisms-08-00454],[@B50-microorganisms-08-00454]\], it was assumed that the reaction is only thermodynamically possible when a methanogenic or sulphate-reducing partner is present to remove H~2~, which is one of the end products of syntrophic formate oxidation \[[@B51-microorganisms-08-00454],[@B52-microorganisms-08-00454],[@B53-microorganisms-08-00454],[@B54-microorganisms-08-00454]\]. *T. onnurineus* is able to oxidise formate into H~2~/CO~2~, and coupling this reaction to chemiosmotic ATP synthesis \[[@B25-microorganisms-08-00454],[@B55-microorganisms-08-00454]\]. The metabolic pathway responsible for formate oxidation in *T. onnurineus* was characterised by using proteomics \[[@B56-microorganisms-08-00454]\]. It was found that formate oxidation proceeds via a membrane-bound enzyme system, comprised of Fdh, and a membrane-bound hydrogenase (Mfh), a sodium-proton (Na^+^/H^+^) antiporter (Mnh) and a Na^+^-dependent ATP synthase \[[@B57-microorganisms-08-00454]\]. Furthermore, it was revealed that several copies of hydrogenase gene clusters (*fdh-mfh-mnh*) are present in *T. onnurineus.* The hydrogenase genes in *fdh2-mfh2-mnh2* were upregulated more than 2-fold when formate was provided as sole energy source to *T. onnurineus*, which is an indication of the importance of the hydrogenase genes in the *fdh2-mfh2-mnh2* gene cluster for growth coupled to formate oxidation and H~2~ production \[[@B25-microorganisms-08-00454]\]. Recently, a novel synthetic formate-fixing pathway was proposed, which is involved in the acetyl-CoA exchange to formyl-CoA and formate reduction to formaldehyde \[[@B58-microorganisms-08-00454]\]. Formaldehyde can be integrated into the central carbon metabolism much easier than direct formate utilization, since it is a highly reactive compound \[[@B59-microorganisms-08-00454]\]. However, the reduction potential of formate to formaldehyde is quite low under standard biochemical conditions \[−650 mV≤ E°′≤−450 mV (6 ≤ pH ≤ 8; 0 ≤ I ≤ 0.25 mol L^−1^)\] \[[@B60-microorganisms-08-00454]\]. Hence, the activation of formate requires an electron donor such as universal electron carrier NAD(P)H (−370 mV ≤ E′ ≤ −280 mV) \[[@B58-microorganisms-08-00454]\]. One of the formate-fixing reactions is catalysed through the formaldehyde dehydrogenase (FoDH) enzyme, which directly converts formate to formaldehyde using NADH as a cofactor \[[@B61-microorganisms-08-00454],[@B62-microorganisms-08-00454]\]. Investigating formate assimilation in other organisms could contribute to the identification of new formate-fixation pathways and its enzymes. *Desulfurococcus amylolyticus* DSM 16532 \[[@B63-microorganisms-08-00454]\] is an anaerobic, hyperthermophilic Crenarchaeon able to grow on a broad range of polymers and sugars \[[@B63-microorganisms-08-00454],[@B64-microorganisms-08-00454]\]. Recently, physiological variables, such as the specific growth rate (µ), were determined for of *D. amylolyticus* grown on fructose or glucose in chemically defined medium \[[@B65-microorganisms-08-00454]\]. A metabolic reconstruction revealed that *D. amylolyticus* contains all glucose metabolism-related genes and harbours several genes for H~2~ production, such as pyruvate ferredoxin oxidoreductase, glyceraldehyde-3-phosphate ferredoxin oxidoreductase, and two membrane-bound hydrogenases \[[@B64-microorganisms-08-00454],[@B65-microorganisms-08-00454]\]. As growth on formate coupled to H~2~ production by hyperthermophilic Archaea could be an opportunity in biotechnology \[[@B66-microorganisms-08-00454],[@B67-microorganisms-08-00454]\], we investigated whether *D. amylolyticus* could be used for this purpose. In this work, we examined the substrate uptake, growth, and production kinetics of *D. amylolyticus* grown on formate, glucose, and a mixture of glucose/formate in closed batch cultivation mode. The intention was to physiologically characterise the organism with respect to μ, cell-specific H~2~ and CO~2~ productivities, and maximum cell concentration. After this, the mass balance analysis of substrate uptake and product formation kinetics was performed in whole cell conversion experiments. Finally, we investigated and compared the metabolic capacity for formate utilization of *D. amylolyticus* to other formate metabolising microorganisms on the genomic level with the goal of revealing possible formate assimilation pathways. 2. Material and Methods {#sec2-microorganisms-08-00454} ======================= 2.1. Chemicals {#sec2dot1-microorganisms-08-00454} -------------- The standard test gas utilized in gas chromatography (GC) comprised the following composition: 0.01 Vol.-% CH~4~; 0.08 Vol.-% CO~2~ in N~2~ (Messer GmbH, Wien, Austria). All other chemicals were of highest grade available. H~2~, CO~2~, N~2~, 20 Vol.-% CO~2~ in N~2~, and CO were of test gas quality (Air Liquide, Schwechat, Austria). 2.2. Microorganism and Medium Composition {#sec2dot2-microorganisms-08-00454} ----------------------------------------- *Desulfurococcus amylolyticus* DSM 16532 \[[@B63-microorganisms-08-00454],[@B68-microorganisms-08-00454]\] was purchased from the Deutsche Sammlung von Mikroorganismen und Zellkulturen GmbH (DSMZ). The medium was prepared as previously described \[[@B64-microorganisms-08-00454],[@B65-microorganisms-08-00454]\]. A modified DSMZ medium, No. 395, without yeast extract, powdered sulphur and glucose was prepared when only formic acid containing medium was used for growth of *D. amylolyticus*. The medium contained (per L): 0.33 g of NH~4~Cl; 0.33 g of KH~2~PO~4~; 0.33 g of KCl; 0.44 g of CaCl~2~·2H~2~O; 0.70 g of MgCl~2~·6H~2~O; 0.50 g of NaCl; 0.80 g of NaHCO~3~; 0.50 g of Na~2~S·9H~2~O; 1 mL of trace elements SL-10; and 10 mL of vitamin solution as previously described \[[@B64-microorganisms-08-00454],[@B65-microorganisms-08-00454]\]. 2.3. Closed Batch Cultivations {#sec2dot3-microorganisms-08-00454} ------------------------------ Closed batch cultivations were conducted in two different sets of experiments. The first set of experiments were designed as "end-point experiments" where growth was monitored at each time-point, whereas substrate uptake and production measurements were only performed at end of the experiment. The second set of experiments were designed as "time-point experiments" where substrate uptake, growth and production kinetics were observed and measured at each time-point during the experiment. Cultures of *D. amylolyticus* were grown anaerobically at 0.2--0.3·10^5^ Pa in a 100 Vol.-% N~2~ atmosphere in a closed batch set-up as previously described \[[@B64-microorganisms-08-00454],[@B65-microorganisms-08-00454]\]. Concentrations of carbon sources were adjusted to the same carbon concentration (C-mmol L^−1^). For end-point experiments the following carbon sources were individually tested: formic acid and glucose at 116.6 C-mmol L^−1^, respectively. Formic acid at a concentration of 50 C-mmol L^−1^, and glucose at a concentration of 66.6 C-mmol L^−1^ (total 116.6 C-mmol L^−1^) were added for the co-substrate experiment. Additionally, glucose and formic acid were tested as carbon sources at 66.6 and 50 C-mmol L^−1^, respectively, to assess the difference in substrate uptake, growth and production kinetics between the co-substrate and single substrate experiment. The pre-culture for inoculation was obtained from a formic acid pre-grown *D. amylolyticus* culture. All experiments were performed in quadruplicates together with a negative (un-inoculated) control and reproduced twice. Moreover, we performed an additional positive--negative (inoculated on medium without formic acid) control to observe growth kinetics on medium containing just vitamins and trace elements, without formic acid ([Supplementary Figure S1](#app1-microorganisms-08-00454){ref-type="app"}). Pressure measurements of the serum bottle headspace were performed with a digital manometer (LEO1-Ei, −1-3bar rel, Keller, Germany) and the measurements were performed before samples were taken for microscope analysis. For time-point experiments, formic acid was used as the carbon source at concentration of 100 C-mmol L^−1^. For each time-point, identical sets of serum bottles (quadruplicates) were prepared and inoculated. They were not manipulated until the destructive gas chromatography (GC) measurement (see below in GC section). 2.4. Whole Cell Conversion Experiments {#sec2dot4-microorganisms-08-00454} -------------------------------------- *D. amylolyticus* was pre-grown on formic acid and harvested by centrifugation (Eppendorf Centrifuge 5415R, Eppendorf, Hamburg, Germany) for 20 min and 15,700 g. The supernatant was removed and the resulting pellet was washed with the respective medium. After the washing step, the cells were resuspended in buffer containing (per L): NH~4~Cl 0.33 g; KH~2~PO~4~ 0.33 g; KCl 0.33 g; CaCl~2~·2H~2~O 0.44 g; MgCl~2~·6 H~2~O 0.70 g; NaCl 0.50 g; NaHCO~3~ 0.80 g. Serum bottles of 120 mL were supplemented with formic acid (concentration of 20, 50, and 100 C-mmol L^−1^). Cultures (1·10^8^ cells mL^−1^) were incubated for 5 and 12 h, respectively and GC analyses were immediately conducted afterwards. All experiments were performed in triplicates together with a negative (un-inoculated) control. 2.5. Cell Counting {#sec2dot5-microorganisms-08-00454} ------------------ *D. amylolyticus* cells were counted using a Nikon Eclipse 50i microscope (Nikon, Amsterdam, Netherlands) at each sampling point. The samples for cell count were taken from each individual closed batch run using syringes (Soft-Ject, Henke Sass Wolf, Tuttlingen, Germany) and hypodermic needles (Sterican size 14, B. Braun, Melsungen, Germany). An amount of 10 µL of sample was applied onto a Neubauer improved cell counting chamber (Superior Marienfeld, Lauda-Königshofen, Germany) with a grid depth of 0.1 mm. 2.6. Gas Chromatography {#sec2dot6-microorganisms-08-00454} ----------------------- Time-point and end-point GC measurements were performed from serum bottles that remained without any manipulation after inoculation, except incubation in air bath until the GC measurement was performed. To analyse the gas composition inside the serum bottles from end-point and time-point experiments, destructive sampling was employed. The gas compositions were analysed using a GC (7890A GC System, Agilent Technologies, Santa Clara, CA, USA) with a 19808 Shin Carbon ST Micropacked Column (Restek GmbH, Bad Homburg, Germany) and provided with a gas injection and control unit (Joint Analytical System GmbH, Moers, Germany) as described earlier \[[@B64-microorganisms-08-00454]\]. 2.7. Formic Acid Analysis {#sec2dot7-microorganisms-08-00454} ------------------------- The Formic Acid Assay Kit (Megazyme Inc., Bray, Ireland) was used for measurements of formic acid concentrations in samples which were previously diluted to the linear range of the assay kit to yield a formic acid concentration of 0.004--0.200 g L^−1^. The microplate (Crystal Clear, Greiner Bio One) assay was applied according to manufacturer's instructions: a 255 μL reaction volume. 2.8. HPLC {#sec2dot8-microorganisms-08-00454} --------- The determination of sugars, volatile fatty acids (VFAs), organic acids, and alcohols were performed with high performance liquid chromatography (HPLC) system (Agilent 1100), consisting of a G1310A isocratic pump, a G1313A ALS autosampler, a Transgenomic ICSep ICE-ION-300 column, a G1316A column thermostat set at 45 °C, a G1362A RID refractive index detector, measuring at 45 °C (all modules were from Agilent 1100 (Agilent Technologies, CA, USA)). The measurement was performed with 0.005 mol L^−1^ H~2~SO~4~ as solvent, with a flow rate of 0.325 mL min^−1^ and a pressure of 48--49 bar. The injection volume was 40 µL. 2.9. Data Analysis {#sec2dot9-microorganisms-08-00454} ------------------ For the quantitative analysis, the maximum specific growth rate (µ~max~ \[h^−1^\]) and mean specific growth rate (µ~mean~ \[h^−1^\]) were calculated as follows: N = N^0^·e^µt^ with N, cell number \[cells mL^−1^\]; N^0^, initial cell number \[cells mL^−1^\]; t, time \[h\] and e, Euler number. According to the delta cell counts in between sample points, µ was assessed. The CO~2~ evolution rate (CER \[mmol L^−1^ h^−1^\] (C-molar)), the cell specific CO~2~ productivity (qCO~2~, cell \[mmol cell^−1^ h^−1^\] (C-molar)) \[[@B67-microorganisms-08-00454]\] was calculated from the end point gas composition of the non-manipulated serum bottles. The ash content and elementary composition of *D. amylolyticus* were presumed to relate to published results \[[@B69-microorganisms-08-00454]\]. The elementary composition was used for the calculation of the mean molar weight, Carbon balance (C-balance) and the degree of reduction (DoR) balance of the corresponding biomass. DoR denotes the number of electrons an atom can donate, summed up for all the atoms of a molecule, or biomass elementary composition, divided by the number of carbon atoms in the molecule/biomass elementary composition. Yields of by-products were determined after HPLC measurement. The values were normalized according to zero (time-point zero) control and negative values (if there were any) were assumed as zero. 2.10. Gibbs Free Energy Calculations {#sec2dot10-microorganisms-08-00454} ------------------------------------ Standard Gibbs free energy change (ΔG^0′^) is used to describe whether a certain chemical reaction can be utilized for microbial energy conservation. However, the underlying thermodynamic calculations are usually standardized to 25 °C and 1 bar pressure. For thermophilic bioprocesses the physiological conditions differ significantly and, consequently, values have to be adapted, as especially temperature has a huge impact on thermodynamics \[[@B70-microorganisms-08-00454]\]. In the present study, *D. amylolyticus* was cultivated at 80 °C. The recalculation method applied in the current study is based on previously published results \[[@B70-microorganisms-08-00454]\], which provide standard state thermodynamic properties at temperatures up to 200 °C for a wide variety of anaerobic metabolic reactions. Moreover, they discuss the thermodynamic framework in detail and the application of the revised Helgeson Kirkham Flowers (HKF) equation of state to obtain standard molal Gibbs free energies of formation (G~f~^0^) at elevated temperatures and pressures for individual aqueous compounds. With one important exemption, the values for G~f~^0^ are taken from this paper. Unfortunately, the named study does not include data for formaldehyde, which were therefore obtained from another publication \[[@B71-microorganisms-08-00454]\], and recalculated as specified. Finally, the Gibbs values for the overall reaction at standard concentrations (1 mol L^−1^) and pH of 7 (∆G^0′^) were calculated as previously described \[[@B70-microorganisms-08-00454]\]. 2.11. Genome Analysis {#sec2dot11-microorganisms-08-00454} --------------------- To investigate the formate metabolism of *D. amylolyticus*, the protein sequences from the whole genome of organisms where formate related pathways were previously described like *T. onnurineus* (Ton_GCF_000018365.1_ASM1836v1), *Pyrococcus furious* (Pfu_GCF_000007305.1_ASM730v1), *E. coli* K-12 (Eco_GCF_000750555.1_ASM75055v1), *Methanosarcina barkeri* (Mba_GCF_000195895.1_ASM19589v1), *Thermoanaerobacter kivui* (Tki_GCF_000763575.1_ASM76357v1) and *A. woodii* (Awo_GCF_000247605.1_ASM24760v1) were obtained from the NCBI RefSeq \[[@B72-microorganisms-08-00454]\] database. Homologous proteins involved in formate-related metabolism of *D. amylolyticus* were identified by using Basic Local Alignment Search Tool (BLAST) \[[@B73-microorganisms-08-00454]\] against the manually sorted proteins from characterised enzymes ([Supplementary Table S1](#app1-microorganisms-08-00454){ref-type="app"}) with E-values and local identity cutoffs of \<10^−10^ and \>25%, respectively. Orthologous genes (genome level) were obtained by pair-wise all versus all BLAST of the aforementioned organisms using the \"OrthoFinder\" tool \[[@B74-microorganisms-08-00454]\]. Furthermore, the orthologous gene (gene in a different species that evolved from a common ancestral gene by speciation) groups (ortho-groups) containing the characterised enzymes related to formate-related metabolism were retrieved. After sorting the proteins of interest, enzyme complexes were identified by using bidirectional BLAST. Results for query coverage, E-value, and identity can be found in [Supplementary Table S2 and Supplementary Table S3](#app1-microorganisms-08-00454){ref-type="app"}. In addition, the Pfam domains \[[@B75-microorganisms-08-00454]\] of all the proteins in *D. amylolyticus* were also predicted for a further look into the domains of enzymes related to the formate metabolism. 3. Results {#sec3-microorganisms-08-00454} ========== 3.1. D. amylolyticus Grows on Formate {#sec3dot1-microorganisms-08-00454} ------------------------------------- Recently, we investigated growth characteristics of *D. amylolyticus* on cellulose, fructose, arabinose, glucose, lactose, maltose, starch, and sucrose. Moreover, we partially re-annotated the genome and metabolically reconstructed the central carbon metabolism \[[@B65-microorganisms-08-00454]\]. According to the metabolic reconstruction of *D. amylolyticus*, it seemed to be possible that the organism could grow through metabolisation of formate. To elucidate the growth kinetics of *D. amylolyticus* on formate and to be able to compare them to glucose and formate--glucose mixtures, end-point experiments were designed to analyse growth kinetics in defined medium with each of the substrates at the same concentration (166.6 C-mmol L^−1^). Additionally, formate and glucose were tested at concentrations of 50 and 66.6 C-mmol L^−1^, respectively, to be able to examine the growth kinetics at lower substrate concentrations. The results of the growth characteristics are shown in [Figure 1](#microorganisms-08-00454-f001){ref-type="fig"}. Cleary, *D. amylolyticus* did not grow on a medium where formic acid was omitted ([Supplementary Figure S1](#app1-microorganisms-08-00454){ref-type="app"}). The lag time lasted approximately 125 h, until growth of *D. amylolyticus* on each of the substrates commenced. The key physiological variables are presented in [Table 1](#microorganisms-08-00454-t001){ref-type="table"}. The organism grew almost equally well on all substrates tested and at all concentrations. Astonishingly, the organism grew on formate as the sole energy source with a µ~max~ of 0.032 h^−1^. A slightly higher µ~max~ of 0.035 and 0.036 h^−1^ was only obtained on glucose and formate/glucose, respectively. The differences in µ~max~ might be explained by slightly different concentrations and hyperbolic relationship between µ and the substrate concentration \[[@B76-microorganisms-08-00454],[@B77-microorganisms-08-00454]\]. In a previous study, we showed that *D. amylolyticus* comprises a µ~max~ of 0.059 h^−1^ at a concentration of 166.5 C-mmol L^−1^ glucose \[[@B65-microorganisms-08-00454]\]. In our previous studies \[[@B64-microorganisms-08-00454],[@B65-microorganisms-08-00454]\], growth of *D. amylolyticus* resulted in low cell densities only, a characteristic shared with many other hyperthermophilic microorganisms \[[@B78-microorganisms-08-00454]\]. The growth of *D. amylolyticus* on glucose was accompanied by lactate, acetate, and formate production, whereas growth on formate resulted in production of acetate, citrate, and ethanol ([Table 2](#microorganisms-08-00454-t002){ref-type="table"}). Following this, we examined the gaseous product formation spectrum from all quadruplicate closed batch experiments on formate, glucose, and formate/glucose. CO~2~ was the only gas detectable in all growth experiments. The CO~2~ concentrations are shown in [Figure 2](#microorganisms-08-00454-f002){ref-type="fig"}, and an overview of CO~2~ productivities are presented in [Table 2](#microorganisms-08-00454-t002){ref-type="table"}. In cultures which were grown on formate, the cumulative CO~2~ levels were in the ppm range. However, during growth on glucose or formate/glucose, the cumulative CO~2~ values were more than one order of magnitude higher. H~2~ could not be detected in any growth experiment, which is in contradiction to experiments in bioreactors \[[@B64-microorganisms-08-00454]\], but in agreement to our previous closed batch experiments \[[@B65-microorganisms-08-00454]\]. This indicates that *D. amylolyticus* did not to use the electrons from formate or glucose to balance homeostasis by producing H~2~. However, instead it could be possible that the electrons were used to balance anaplerotic reactions, which indicates that during formate metabolization, CO~2~ was assimilated into biomass through some of the several annotated CO~2~-fixing enzymes \[[@B65-microorganisms-08-00454]\]. However, up to now it is not clear if the ATP for the CO~2~ fixation is retrieved from substrate level phosphorylation via glycolysis or from chemiosmotic ATP production or the pseudo-TCA cycle. During the time-point experiments ([Figure 3](#microorganisms-08-00454-f003){ref-type="fig"}), the observed growth kinetics showed a similar trend as in the end-point experiments ([Figure 1](#microorganisms-08-00454-f001){ref-type="fig"}). Production and consumption of citrate and CO~2~ are shown in [Figure 3](#microorganisms-08-00454-f003){ref-type="fig"} and an overview of CO~2~ productivities and mass balances are presented in [Table 3](#microorganisms-08-00454-t003){ref-type="table"}. The results of the closed batch time-point experiment indicate that CO~2~-fixation occurs. Hence, during the first 300 h, CO~2~ was produced and subsequently consumed within the next 200 h of the experiment. We have previously shown that *D. amylolyticus* harbours several genes, which might be involved in CO~2~ fixation \[[@B65-microorganisms-08-00454]\], and the results presented in this study suggest the possibility that CO~2~ might be fixed through enzymes of the reductive citric acid cycle, as citric acid is one of the produced metabolites and consumed compounds. 3.2. D. amylolyticus Converts Formate to CO~2~, Acetate, Citrate, and Ethanol {#sec3dot2-microorganisms-08-00454} ----------------------------------------------------------------------------- To investigate the metabolism on formate in more detail, whole cell conversion experiments were performed. A whole cell conversion experiment has unique advantages, such as minimising side reactions and avoiding biomass production \[[@B79-microorganisms-08-00454],[@B80-microorganisms-08-00454],[@B81-microorganisms-08-00454]\]. Therefore, we performed experiments with high cell densities (1·10^8^ cells mL^−1^) using *D. amylolyticus* at formate concentrations of 20, 50, and 100 C-mmol L^−1^ in buffer. This experiment revealed astonishing findings. A summary of the obtained physiological variables is shown in [Table 4](#microorganisms-08-00454-t004){ref-type="table"}. The highest formate uptake rate of 20.7 C-mmol L^−1^ was observed when *D. amylolyticus* was incubated at a concentration of 100 C-mmol L^−1^ formate. After 5 h of incubation, the production of small amounts of butyrate was detected in 50 and 100 C-mmol L^−1^ formate, and citrate, as well as ethanol, was only detected in one of the other. After 12 h of incubation, ethanol and low amounts of citrate were detected at all tested formate concentrations, but acetate was only detected at 100 C-mmol L^−1^ formate. The detection of citrate production during growing conditions and during the whole cell conversion experiment (compare [Table 2](#microorganisms-08-00454-t002){ref-type="table"} and [Table 4](#microorganisms-08-00454-t004){ref-type="table"}) might indicate that the citric acid cycle was involved during formate assimilation. However, in our previous study, a canonical citric acid cycle or a reverse citric acid cycle could not be observed in the genome of *D. amylolyticus* \[[@B65-microorganisms-08-00454]\]. Gas production analyses indicated CO~2~ production, but again no H~2~ was detected. Interestingly, the qCO~2~ values detected at any formate concentration were much lower compared to the growth experiments (compare [Table 2](#microorganisms-08-00454-t002){ref-type="table"} and [Table 4](#microorganisms-08-00454-t004){ref-type="table"}). However, this finding is in strong contrast to the growth experiments, as the final CO~2~ concentrations during formate metabolisation were much higher (compare [Figure 2](#microorganisms-08-00454-f002){ref-type="fig"} to [Figure 4](#microorganisms-08-00454-f004){ref-type="fig"}). These observations suggest that the metabolism of *D. amylolyticus* was retarded during the whole cell conversion experiment and that the released CO~2~ could not be assimilated into biomass. The results of the whole cell conversion experiments revealed that the CO~2~, citrate, acetate, and ethanol play key roles in the functioning of the formate metabolism of *D. amylolyticus*. Based on the obtained metabolite excretion profile, we examined the bioenergetics of formate conversion. The results are shown in [Supplementary Table S4](#app1-microorganisms-08-00454){ref-type="app"}. ∆G^0′^ and ∆G^0^'/formate at 25 °C and 80 °C for the anaerobic production of formaldehyde + CO~2~, H~2~ + CO~2~, ethanol + CO~2~, acetate + CO~2~ and acetate + ethanol + CO~2~ from formate. ∆G^0'^/formate is given to compare the calculated values based on 1 mol of used formate. Negative values of ∆G^0^' show that a reaction is thermodynamically favourable under the given conditions. The formation of formaldehyde + CO~2~ from formate is thermodynamically not favourable. Nevertheless, this does not exclude the proposed formaldehyde pathway, as formaldehyde is not an end product. When formaldehyde is converted into other substances after formation, for example for the assimilation into biomass, the complete reaction has to be considered. Ethanol and acetate were found to be the main end products in whole cell conversion with formate as only carbon source. The results show, that these reactions are thermodynamically favourable under the given conditions. The formation of acetate and ethanol out of formate provides small amounts of energy, consistent with the slow growth of *D. amylolyticus*. As the results show, temperature has little influence on ∆G^0^' for these reactions in the range of 25 to 80 °C. To understand the formate metabolism of *D. amylolyticus*, we retrieved the amino acid sequences of characterized enzyme complexes, which are known to be involved in different formate utilization pathways: PFL, HDCR, Fdh, and FoDH. We then used the protein sequences of the formate utilization pathway-related enzyme complexes from selected microorganisms (*T. onnurineus*, *P. furious*, *E. coli*, *M. barkeri*, *T. kivui*, and *A. woodii*), to identify their homologous proteins in the genomes of *D. amylolyticus*. Based on these analyses, formate-related pathways were predicted in *D. amylolyticus*. Furthermore, we examined if the genetic arrangement of these sequences resembled the one for *D. amylolyticus*. The results of this analysis are shown in [Figure 5](#microorganisms-08-00454-f005){ref-type="fig"}. The protein subunits of the HDCR complex of *A. woodii* are one of the microbial formate assimilation mechanisms. According to our ortho-group analysis, only the electron transfer subunits (Awo_c08200, Awo_c08230, Awo_c08250) of *A. woodii* belong to the same ortho-group as *D. amylolyticus* (Desfe_1134), which indicates that both may have the same function. On the other hand, FdhF1/2 and HydA proteins were located in different ortho-groups and were not identified in the genome of *D. amylolyticus*. We then hypothesised whether *D. amylolyticus* possesses the genes of PFL and PFL-AE \[[@B30-microorganisms-08-00454]\]. While, the Desfe_1164 sequence of *D. amylolyticus* showed similarities with *pfl*A of *E. coli* \[[@B32-microorganisms-08-00454]\], Desfe_0583 resembled TON_0415 of *T. onnurineus* and Awo_c27600 sequence of *A. woodii*, which are annotated as PFL-AE \[[@B28-microorganisms-08-00454]\]. A comparison of sequences of PFL and PFL-AE proteins from *A. woodii* with *D. amylolyticus* revealed that the alignment is significant concerning E-value and identity ([Figure 5](#microorganisms-08-00454-f005){ref-type="fig"}, [Supplementary Table S1](#app1-microorganisms-08-00454){ref-type="app"}). The PFL (or formate C-acetyltransferase) (EC 2.3.1.54) present in *E. coli* and *A. woodii* could not be detected in *D. amylolyticus*. Even though the similar PFL systems were not detected in *D. amylolyticus*, our analysis revealed that the genome harbours a high number of radical SAM proteins (Desfe_0007, Desfe_0149, Desfe_0201, Desfe_0288, Desfe_0298, Desfe_0313, Desfe_0363, Desfe_0369, Desfe_0376, Desfe_0576, Desfe_0583, Desfe_0693, Desfe_0860, Desfe_1164, Desfe_0130, Desfe_0177, Desfe_1197, Desfe_1234) \[[@B31-microorganisms-08-00454]\]. This might indicate that the PFL function is supported by another radical SAM protein, which is not similar to the PFL of *E. coli* or *A. woodii*. This finding is also not surprising considering that very few archaea possess PFL \[[@B82-microorganisms-08-00454],[@B83-microorganisms-08-00454]\]. However, *D. amylolyticus* possesses PFL-AE genes (Desfe_0583, Desfe_1164, and Desfe_1234), and it was recently shown that the PFL-AE homolog in *T. onnurineus* NA1 is strongly upregulated during growth on formate \[[@B56-microorganisms-08-00454]\]. We then investigated the *D. amylolyticus* genome with respect to the hydrogenase gene clusters of *T. onnurineus* to identify possible orthologous proteins. Our sequence alignment showed that *D. amylolyticus* possesses one multimeric membrane bound hydrogenase subcluster (*mfh*) Desfe_1135-1141), and two H^+^/Na^+^ antiporters (*mnh*) (Desfe_0344-0350 and Desfe_1085-1091) that are similar to subcluster *mfh2* and *mnh1-mnh2* of *T. onnurineus*. Regarding the *fdh* subcluster, which contains *fdh* and electron transfer genes, we were able to identify only the electron transfer gene (Desfe_1134) in *D. amylolyticus.* Additionally, all protein sequences of *fdh* subcluster belonging to molybdopterin Pfam family of proteins were downloaded for all species from Pfam, including the aforementioned strains, and compared them with the *D. amylolyticus* genome. Unfortunately, we couldn't detect any *fdh* genes in *D. amylolyticus* ([Figure 5](#microorganisms-08-00454-f005){ref-type="fig"}, [Table S1](#app1-microorganisms-08-00454){ref-type="app"}). However, the auxiliary proteins involved in hydrogenase maturation (Desfe_0501, Desfe_0337, Desfe_0339), which were found to be homologous to hydrogenase maturation proteins of *T. onnurineus* (*Hyc I*; TON_0263, *Hyp F*; TON_0287, *Hyp E*; TON_0286), were identified in the genome of *D. amylolyticus*. Several studies conducted with *E. coli* and *T. onnurineus* resulted in the identification of known auxiliary proteins involved in hydrogenase maturation \[[@B28-microorganisms-08-00454],[@B56-microorganisms-08-00454],[@B84-microorganisms-08-00454]\]. These studies showed that the expression of the *hyc* operon, which contains hydrogenase maturation genes, was upregulated in formate grown cells. This could indicate that the auxiliary proteins of *D. amylolyticus* (Desfe_0501, Desfe_0337, Desfe_0339) might also have an important role in formate metabolism in *D. amylolyticus*. Furthermore, we examined whether the necessary genes to generate ATP in *T. onnurineus* can be identified in the genome of *D. amylolyticus*. In *T. onnurineus,* a hydrogenase is coupled to an H^+^ antiporter involved in the formation of a Na^+^ gradient, which can be used for ATP generation \[[@B25-microorganisms-08-00454],[@B57-microorganisms-08-00454]\]. Despite the fact that *D. amylolyticus* might possess an orthologous membrane bound hydrogenase, which is coupled to a H^+^ antiporter in *T. onnurineus*, the *fdh* subcluster genes could not be detected in the genome. This analysis also supports the experimental observations that *D. amylolyticus* did not produce any H~2~ from formate. However, is must be noted that *D. amylolyticus* produced ppm amounts of H~2~ from cellulose and glucose during batch fermentation in bioreactors \[[@B64-microorganisms-08-00454]\] and in previously published closed batch cultivations \[[@B63-microorganisms-08-00454]\]. On the other hand, H~2~ was not detectable during our recent closed batch experiments \[[@B65-microorganisms-08-00454]\]. Hence, such an ATP synthesis system in *D. amylolyticus* remains to be detected. The gluconeogenesis and pentose phosphate (PP) pathway enzymes of *T. onnurineus* were already investigated during formate utilisation. It was shown that the glyceraldehyde-3-phosphate dehydrogenase (TON_0639), 2-phosphoglycerate kinase, (TON_0742), fructose bisphosphatase (TON_1497), ribose-5-phosphate isomerase (TON_0168), adenine phosphoribosyl transferase (TON_0120), AMP phosphorylase homolog DeoA (TON_1062), and 3-hexulose-6-phosphate synthase/6-phospho-3-hexuloisomerase (HPS/PHI) (TON_0336) were upregulated during growth on formate in *T. onnurineus* \[[@B56-microorganisms-08-00454]\]. It was also demonstrated that gluconeogenesis and the PP pathway products, such as ribose-5-phosphate and NADPH were favoured when formate was used as a substrate \[[@B56-microorganisms-08-00454]\]. The genome of *D. amylolyticus* encodes for several NADH generating genes, however, according to the results of this study, formate oxidation is not coupled to H~2~ evolution and PFL encoding genes are missing in the genome of *D. amylolyticus*. 4. Discussion {#sec4-microorganisms-08-00454} ============= Based on the above analysis, we hypothesise that the organism might operate the central metabolism with formaldehyde rather than formate. Therefore, we propose that two formate-metabolising reactions might occur in *D. amylolyticus*. First, the reduction of formate with coenzyme A (CoA) to formyl-CoA, which might be catalysed by acetyl-CoA synthetase, and furthermore, the conversion of formaldehyde with the support of an acetylating acetaldehyde dehydrogenase \[[@B58-microorganisms-08-00454]\]. Second, the direct conversion of formate to formaldehyde through NADH via FoDH \[[@B61-microorganisms-08-00454]\]. Our analysis showed that *D. amylolyticus* harbours the following proteins: Desfe_0278, Desfe_0067, and Desfe_0019-Desfe_1240 for the enzymes formyl/acetyl transferase (F/AT) \[3.1.2.10\], (catalyses the reaction: formate \<=\> formyl-CoA), acylating acetaldehyde dehydrogenase (ADH) \[1.2.1.10\] (catalyses formyl-CoA \<=\> formaldehyde), and glutathione-independent formaldehyde dehydrogenase \[1.2.1.46\] (catalyses formaldehyde + NAD^+^ + H~2~O \<=\> Formate + NADH + H^+^), respectively ([Supplementary Table S1](#app1-microorganisms-08-00454){ref-type="app"}). The generated formaldehyde can be assimilated with the oxidative PP pathway (OPPP) which is an efficient route for the assimilation of one-carbon compounds into the central carbon metabolism \[[@B85-microorganisms-08-00454],[@B86-microorganisms-08-00454],[@B87-microorganisms-08-00454]\]. OPPP enzymes catalyse the oxidation of glucose-6-phosphate (G6P) to ribulose-5-phosphate (Ru5P), which was recently shown in halophilic archaea \[[@B88-microorganisms-08-00454]\]. However, the genes encoding some of the OPPP enzymes, glucose-6-phosphate dehydrogenase and 6-phosphogluconate dehydrogenase are missing in the genome of *D. amylolyticus*. In several Archaea, it has been shown that the conventional PP pathway is incomplete \[[@B89-microorganisms-08-00454]\]. Moreover, it has been confirmed through biochemical and genome analyses of Archaea that ribulose monophosphate pathway (RuMP) substitutes for the incomplete PP pathway \[[@B90-microorganisms-08-00454]\]. The generated formaldehyde can be assimilated with inclusion of the synthesis of Ru5P from fructose 6-phosphate (F6P) through the reverse reaction of formaldehyde fixation by HPS/PHI via the RuMP ([Figure 6](#microorganisms-08-00454-f006){ref-type="fig"}). The RuMP provided metabolic precursors for the anabolism. The key enzymes are HPS (Desfe_0079), catalysing the reaction from formaldehyde to arabino-3-hexulose-6-phosphate and PHI (Desfe_0297), which catalyses the isomerization of arabino-3-hexulose-6-phosphate to fructose 6-phosphate (F6P). Further, F6P can be metabolised and generate Ru5P by the bifunctional activity of HPS/PHI ([Supplementary Table S1](#app1-microorganisms-08-00454){ref-type="app"}). The required energy can be substituted by the assimilation of CO~2~ together with ribulose 1,5 bis-phosphate to 3-phosphoglycerate via the activity of RuBisCO \[[@B91-microorganisms-08-00454]\]. The produced 3-phosphoglycerate could be used for ATP production via glycolysis, while ATP and CO~2~ production can occur via incomplete/pseudo TCA cycle \[[@B56-microorganisms-08-00454]\]. However, our hypothesis would need to be validated through the combined approach of transcriptomics and proteomics---an endeavour of importance and of high dignity---considering the fastidious growth characteristics of this fascinating organism. 5. Conclusions {#sec5-microorganisms-08-00454} ============== Through a combined approach of in silico analyses and physiological experiments, we could show that *D. amylolyticus* has the ability to metabolise formate as carbon and energy substrate. *D. amylolyticus* grew at similar µ on formate and glucose, which suggests that this organism faces inherent growth limitations, independent of the supplied carbon and energy substrate concentration. Supported by our experiments and analyses, we propose that the identified homologs of formaldehyde dehydrogenase genes are the only currently-known possibility allowing the metabolisation of formate. Therefore, we would like to raise the possibility that *D. amylolyticus* uses FoDH as a formate assimilation mechanism to produce formaldehyde, and that formaldehyde is subsequently assimilated into biomass through the RuMP. We consequently demonstrate that the CO~2~ released during growth on formate is efficiently assimilated into biomass. Our findings shed new light on the metabolic versatility of the archaeal phylum Crenarchaeota and offers insight into a putative new C1 assimilation pathway in prokaryotes. We thank Christian Pruckner for his help with bioinformatic analyses. We thank Melina Kerou for proofreading the manuscript. Open access funding by the University of Vienna. The following are available online at <https://www.mdpi.com/2076-2607/8/3/454/s1>, **Supplementary Figure S1:** Growth curves of *D. amylolyticus* in a medium with the addition of formic acid compared to a medium where formic acid was omitted (positive--negative control). Clearly *D. amylolyticus* does not grow on a medium where formic acid is not supplied. **Supplementary Table S1:** Manually sorted homologous proteins from characterized enzymes involved in formate-related metabolism of *D. amylolyticus.* **Supplementary Table S2:** Identification of enzyme complexes of *D. amylolyticus* by using bidirectional BLAST. **Supplementary Table S3:** List of orthologous genes of *D.* *amylolyticus, T. onnurineus*, *P. furious*, *E. coli*, *M. barkeri*, *T. kivui* and *A. woodii* based on pair-wise all versus all BLAST using the "OrthoFinder" tool. **Supplementary Table S4:** Gibbs values of expected intermediates and metabolic end products from formate metabolisation by *D. amylolyticus* at 25 °C and 80 °C. ###### Click here for additional data file. Conceptualization, I.E. and S.K.-M.R.R.; methodology, I.E., B.R., B.H. and A.Z.; software, L.M.; validation, I.E., W.F. and S.K.-M.R.R.; formal analysis, S.K.-M.R.R.; investigation, I.E. and S.K.-M.R.R.; resources, G.B., W.F. and S.K.-M.R.R.; data curation, I.E.; writing---original draft preparation, I.E. and S.K.-M.R.R.; writing---review and editing, I.E., G.B., W.F. and S.K.-M.R.R.; visualization, I.E.; supervision, S.K.-M.R.R.; project administration, G.B. and S.K.-M.R.R.; funding acquisition, G.B., W.F. and S.K.-M.R.R. All authors have read and agreed to the published version of the manuscript. The Austrian Research Promotion Agency (Forschungsförderungsgesellschaft (FFG)) is gratefully acknowledged supporting this research in the frame of the projects H2.AT (grant 853618) and NitroFix (grant 859293). The authors declare no conflict of interest. ![Growth curves of *D. amylolyticus* on formate, glucose, and glucose/formate at different concentrations. A slightly higher µ could be obtained when glucose/formate was used as substrate. All the substrate concentrations are given as C-mmol L^−1^. A negative (un-inoculated) control and positive--negative (inoculated into medium where formic acid was omitted) control were performed in each set and no growth was observed.](microorganisms-08-00454-g001){#microorganisms-08-00454-f001} ![End point gas composition of *D. amylolyticus* grown at different concentrations of formate, glucose, and glucose/formate at the end of the cultivation. The results indicate that the CO~2~ production is very low in the cultures grown on formate compared to cultures grown on glucose or glucose/formate. All the substrate concentrations are given as C-mmol L^−1^.](microorganisms-08-00454-g002){#microorganisms-08-00454-f002} ![Growth, substrate uptake, and production kinetics of *D. amylolyticus* on 100 C-mmol L^−1^ formate. The results indicate that CO~2~ and citric acid were produced and consumed completely during the cultivation and only after the consumption of CO~2~ and citric acid, acetic acid was produced.](microorganisms-08-00454-g003){#microorganisms-08-00454-f003} ![Headspace gas composition of *D. amylolyticus*, from experiments performed in triplicates, at the end points of the whole cell conversion experiment. The experiment was designed and performed to be able to measure the cumulative gas accumulation in the serum bottle headspace. Despite the application of high cell density in the whole cell conversion experiment no H~2~ accumulation was detected.](microorganisms-08-00454-g004){#microorganisms-08-00454-f004} ![Comparison of genetic organization of (**A**) the fdh complex subunits in *T. onnurineus*, and (**B**) the pyruvate formate lyase (PFL) complex subunits in *E. coli* and *A. woodii* to the genetic organisation in *D. amylolyticus*.](microorganisms-08-00454-g005){#microorganisms-08-00454-f005} ![Schematic illustration of the proposed route for formate assimilation in *D. amylolyticus*. The first part of the cycle is formaldehyde production from formate, which might be catalysed by formaldehyde dehydrogenase (FoDH), or formyl/acetyl transferase (F/AT) and aldehyde dehydrogenase (ADH). The second part of the cycle represents formaldehyde assimilation and ribulose 5-phosphate (Ru5P) regeneration via ribulose monophosphate pathway (RuMP) and oxidative pentose phosphate pathway (OPPP). Formaldehyde could be fixed by Ru5P to form D-arabino-3-hexulose-6-phosphate (A3H6P) by 3-hexulose-6-phosphate synthase (HPS) (1) and then isomerized to fructose 6-phosphate (F6P) by 6-phospho-3-hexuloisomerase (PHI) (2). In the genome of *D. amylolyticus,* only gene was found for an HPS-PHI-fused bifunctional enzyme (1-2). F6P is further isomerized to glucose-6-phosphate (G6P) by glucose-6-phosphate isomerase (3). Later, G6P is oxidized to Ru5P by glucose-6-phosphate dehydrogenase (4) and 6-phosphogluconate dehydrogenase (5).](microorganisms-08-00454-g006){#microorganisms-08-00454-f006} microorganisms-08-00454-t001_Table 1 ###### Growth characteristics of *D. amylolyticus.* Compound and Concentration μ~max~ \[h^−1^\] μ~mean~ \[h^−1^\] Final Cell Concentration \[cells per mL\] ------------------------------------------------ ------------------ ------------------- ------------------------------------------- Glucose \[66.6 C-mmol L^−1^\] 0.033 0.011 1.55·10^7^ Glucose \[116.6 C-mmol L^−1^\] 0.035 0.012 2.09·10^7^ Formic acid \[50 C-mmol L^−1^\] 0.032 0.010 1.24·10^7^ Formic acid \[116.6 C-mmol L^−1^\] 0.032 0.011 2.08·10^7^ Glucose/Formic acid \[66 and 50 C-mmol L^−1^\] 0.036 0.012 2.38·10^7^ microorganisms-08-00454-t002_Table 2 ###### Productivity and yields of *D. amylolyticus* from glucose or formic acid metabolisation during closed batch end-point experiments. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Compound and Concentration CER\ qCO~2~\ Y~(CO2/s)~\ Y~(Lact/s)~\ Y~(Ac/s)~\ Y~(Form/s)~\ Y~(Glu/s)~\ Y~(Buty/s)~\ Y~(Citr/s)~\ Y~(Eth/s)~\ Y~(x/s)~\ C-Balance ^+^ DoR-Balance ^\#^ \[mmol L^−1^ h^−1^\] (C-Molar) \[pmol h^−1^ g^−1^\] (C-Molar) \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/ C-mol\] \* \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ------------------------------------ -------------------------------- -------------------------------- ---------------------- ---------------------- ---------------------- ---------------------- --------------------- ---------------------- ---------------------- ---------------------- ----------------- --------------- ------------------ Glucose \[66.6 C-mmol L^−1^\] 3.34·10^−5^ 2.41·10^−3^ 2.64·10^−2^ 2.96·10^−1^ 5.64·10^−1^ 6.14·10^−2^ 1.29·10^−4^ 94.80% 89.08% Glucose \[116.6 C-mmol L^−1^\] 4.04·10^−5^ 2.59·10^−3^ 4.43·10^−1^ 2.48·10^−1^ 5.89·10^−1^ 8.10·10^−2^ 2.42·10^−3^ 136.12% 87.82% Formic acid \[50 C-mmol L^−1^\] 1.20·10^−6^ 1.16·10^−2^ 7.20·10^−4^ 1.45·10^−1^ 8.69·10^−3^ 2.15·10^−4^ 5.59·10^−2^ 5.17·10^−1^ 6.34·10^−5^ 72.79% 194.37% Formic acid \[116.6 C-mmol L^−1^\] 3.48·10^−6^ 2.23·10^−4^ 5.02·10^−4^ 6.21·10^−1^ 5.12·10^−2^ 1.02·10^−2^ 1.59·10^−2^ 3.18·10^−5^ 69.84% 140.65% -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- \* Y; Yield of product (CO~2~, lactate, acetate, formate, glucose, butyrate, citrate, ethanol, biomass) per substrate (s) consumed. ^+^ Carbon balance. ^\#^ Degree of reduction balance. microorganisms-08-00454-t003_Table 3 ###### Productivities and yields of *D. amylolyticus* grown on formic acid during time-point experiments. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Time\ CER\ qCO~2~\ Y~(CO2/s)~\ Y~(Ac/s)~\ Y~(Citr/s)~\ Y~(x/s)~\ C-Balance ^+^ DoR-Balance ^\#^ \[h\] \[mmol L^−1^ h^−1^\] (C-Molar) \[pmol h^−1^ g^−1^\] (C-Molar) \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ \[C-mol/C-mol\] ^\*^ ------- -------------------------------- -------------------------------- ---------------------- ---------------------- ---------------------- ---------------------- --------------- ------------------ 69 4.09·10^−1^ 1.05·10^−5^ 40.93% 81.87% 141 2.12·10^−5^ 2.65·10^−6^ 2.32·10^−3^ 3.73·10^−1^ 6.57·10^−5^ 37.55% 74.67% 237 4.57·10^−1^ 2.75·10^−4^ 45.75% 91.53% 333 5.35·10^−5^ 1.31·10^−6^ 6.04·10^−3^ 1.93·10^−1^ 1.21·10^0^ 1.46·10^−4^ 141.12% 220.45% 477 1.44·10^−1^ 8.36·10^−1^ 1.91·10^−4^ 98.05% 154.30% 549 NA ^§^ NA^§^ 1.82·10^−3^ 6.74·10^−1^ 1.15·10^−3^ 66.53% 134.93% 645 3.03·10^0^ 1.65·10^−3^ 302.83% 90.15% 721 NA ^§^ NA^§^ 3.53·10^−3^ 3.54·10^−1^ 7.76·10^−4^ 34.11% 70.77% -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- \* Y; Yield of product (CO~2~, acetate, citrate, biomass) per substrate (s) consumed. ^+^ Carbon balance. ^\#^ Degree of reduction balance. ^§^ NA; Not available. microorganisms-08-00454-t004_Table 4 ###### Physiological key variables of *D. amylolyticus* obtained from whole cell conversion experiments on formic acid. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Time \[h\] Concentration \[C-mmol L^−1^\] Formic acid Consumption \[%\] CER\ qCO~2~\ Y~(CO2/s)~ ^\*^\ Y~(Ac/s)~ ^\*^\ Y~(Buty/s)~ ^\*^\ Y~(Citr/s)~ ^\*^\ Y~(Eth/s)~ ^\*^\ \[mmol L^−1^ h^−1^\] (C-Molar) \[mmol h^−1^ g^−1^\] (C-Molar) \[C-mol/C-mol\] \[C-mol/C-mol\] \[C-mol/C-mol\] \[C-mol/C-mol\] \[C-mol/C-mol\] ------------ -------------------------------- ------------------------------- -------------------------------- -------------------------------- ------------------ ----------------- ------------------- ------------------- ------------------ 5 100 1.42 2.50·10^−5^ 1.60·10^−15^ 8.78·10^−5^ 3.41·10^−3^ 5.72·10^−2^ 5 50 0.71 1.79·10^−5^ 1.14·10^−15^ 2.53·10^−4^ 1.97·10^−3^ 2.95·10^−2^ 5 20 0.08 1.76·10^−5^ 1.13·10^−15^ 5.41·10^−3^ 12 100 41.05 1.93·10^−4^ 1.23·10^−14^ 5.63·10^−5^ 3.06·10^−1^ 1.43·10^−4^ 4.63·10^−4^ 12 50 9.35 1.20·10^−4^ 7.71·10^−15^ 3.09·10^−4^ 7.72·10^−3^ 2.81·10^−2^ 12 20 9.36 1.12·10^−4^ 7.17·10^−15^ 7.18·10^−5^ 1.92·10^−4^ 1.26·10^−2^ ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- \* Y; Yield of product (CO~2~, acetate, butyrate, citrate, ethanol, biomass) per substrate (s) consumed.
{ "pile_set_name": "PubMed Central" }
RIYADH Saudi Telecom Co (STC) is set to sign a marketing deal with football club Manchester United that could be worth $18.6 million (9.3 million pounds), a spokesman said, its first-ever deal with a non-Saudi football club.
{ "pile_set_name": "Pile-CC" }
This invention relates to composite particles comprising core particles and a silicone elastomer adhered to the surfaces of the core particles, a method for preparing the same, and a cosmetic composition containing the composite particles. A makeup cosmetic composition such as a foundation is to conceal skin configuration troubles such as wrinkles, pores and texture roughness and skin tone troubles such as blemishes and freckles, and gives a smooth and beautiful look to skin. In recent years, a non-artificial natural finish feel (bare skin feel) is considered to be important. A cosmetic composition is assessed to provide a natural finish feel, when the cosmetic composition is free of unnatural gloss (shine), is excellent in the uniformity of the adhesion of a cosmetic film, and has high transparency. Numerous new materials and new technologies have conventionally been proposed to provide a natural finish feel while retaining the above-described effects of makeup cosmetics. Especially for concealing configuration troubles, cosmetics having various diffuse reflectance powders blended therein are known. Proposed in JP-A 6-128122 (Patent Document 1) is a wrinkle-concealing, multilayer cosmetic making in which a makeup foundation containing a tacky substance for a first layer, and a makeup finish containing a powder that diffuses and reflects light for a second layer are used in combination. In this wrinkle-concealing, multilayer cosmetic, composite powder of the light diffuse reflectance type obtained by coating talc particles with an acrylic polymer is used, for example. This cosmetic composition is, however, accompanied by a drawback that, when a cosmetic film is held for a long time on the skin, the powder and the tacky substance fall outside an appropriate mixing range due to mixing of sebum to the tacky substance, leading to reductions in its effects. The pamphlet of PCT Patent Publication No. WO 92/03119 (Patent Document 2) discloses a flaky fine powder composed of a flaky substance such as natural mica and spherical, fine particulate silica coated on the surfaces of the flaky substance. Because this flaky fine powder uses the spherical fine particles having high surface diffuse reflectance effects for light, the use of this flaky fine powder as a cosmetic additive is described to bring about technical effects that “the gloss of mica as a base at corners thereof can be reduced, a soft focus effect such as making fine wrinkles less noticeable can be exhibited, and further, cosmetics far improved in slipperiness and touch feel in use can be obtained.” For the extremely good slipperiness of the flaky fine powder, however, a cosmetic composition having the flaky fine powder blended therein involves a drawback that it tends to form creases upon application, can be hardly applied evenly, and cannot obtain a natural finish. In addition, the fine particulate silica employed as a coating material decreases the area of contact between the composite powder and the skin. The cosmetic composition is, therefore, accompanied by another drawback that the fine particulate silica reduces the adhesion to the skin, renders the composite powder susceptible to falling off from the skin by physical impacts such as rubbing by clothing, and lowers the retention of the effects of the cosmetic. Further, any attempt to lower the proportion of the fine particulate silica in the flaky fine powder with a view to improving the adhesion of the composite powder to the skin results in a drawback that the effects for configuration troubles cannot be obtained sufficiently. Other technologies which are similar to the foregoing technologies and are intended to avoid configuration troubles or to bring about a natural finish feel include a cosmetic composition that contains a pigment of the core-shell structure obtained by coating a flaky extender pigment as cores with a colored-pigment-containing titanium dioxide and further coating the coated cores with a light-diffusing powder (JP-A 8-188723; Patent Document 3), a technology that mixes in a cosmetic composition composite powder obtained by coating surfaces of a clay mineral with an inorganic metal hydroxide such as aluminum hydroxide (JP-A 9-20609, Patent Document 4; JP-A 2002-146238, Patent Document 5), a cosmetic composition that contains powder having layers of a high-refractive-index metal oxide coated on surfaces of powder having a refractive index of from 1.6 to 1.7 such as barium sulfate and layers of one or more materials, which are selected from yellow iron oxide, black iron oxide and red iron oxide, coated on the first-mentioned layers (JP-A 2003-40737, Patent Document 6), a cosmetic composition obtained by mixing in the cosmetic composition a silica-zinc oxide composite material obtained by combining silica sol and zinc oxide (Japanese Patent No. 3702072, Patent Document 7). These composite powders each exhibit a certain degree of soft focus effect owing to their light diffusing effect. When attention is paid to a feel upon use of each cosmetic composition, however, the cosmetic composition is not fully satisfactory in softness, moistness, and smoothness for the hardness of the composite powder itself because the composite powder is composed of the inorganic metal oxide or inorganic metal hydroxide. For the purpose of improving the feel on use of such a cosmetic powder, specifically, imparting a feel on use such as a freely flowing feel and smoothness, spreadability, adhesiveness and the like, on the other hand, JP-A 2002-69329 (Patent Document 8) proposes particles obtained by coating surfaces of scaly inorganic particles with a polyurethane, styrene-butadiene copolymer, silicone-based elastomer or polyolefin-based elastomer, and describes that a soft and moist feel can be obtained. However, no specific exemplification is made as to the particles coated with such a silicone-based elastomer. In yet further documents, particles with silicone elastomers coated on surfaces of particles and their making methods are proposed. Proposed in JP-A 8-3451 (Patent Document 9) is a method that mixes a silicone elastomer having reactive functional groups and silica to crush them. This method is, however, accompanied by a drawback that, because the silica particles as core particles are crushed, particles cannot be obtained with the initial shape and particle size. In other words, particles in the form of a specific shape such as sphere, plate or rod cannot be obtained, and the particle size can be hardly controlled. JP-A 3-294357 (Patent Document 10) proposes a method that mixes core particles with a curable silicone composition which would cure into a silicone elastomer, and then cures the silicone composition. The resulting particles, however, contain plural core particles therein. JP-A 2-232263 (Patent Document 11) proposes a method that emulsifies and disperses in water a mixture of silica particles as core particles and a curable silicone composition which would cure into a silicone elastomer and then cures the silicone composition, and JP-A 3-281536 (Patent Document 12) proposes a method that emulsifies and disperses in water a mixture of an aqueous dispersion of silica particles and a curable silicone composition which would cure into a silicone elastomer and then cures the silicone composition. These methods, however, form particles containing plural core particles therein or particles containing no core particles therein.
{ "pile_set_name": "USPTO Backgrounds" }
![](envhper00357-0020-color.jpg "scanned-page"){.792} ![](envhper00357-0021-color.jpg "scanned-page"){.793}
{ "pile_set_name": "PubMed Central" }
[Glucocorticoid kinetics in Cushing's syndrome treated with chloditane and large doses of reserpine]. The paper is concerned with the results of the studies on corticosteroid kinetics (secretion rate, distribution volume, metabolic blood clearance, mean daily blood cortisol content and excretion of free hormone with urine) in 44 patients suffering from Icenko-Cushing's disease, treated with chloditane and/or chloditane combined with massive reserpine doses. The above parameters increased in Icenko-Cushing's disease during clinical remission after chloditane or chloditane and reserpine treatment. No differences between effects on glucocorticoid secretion and metabolism after the treatment with chloditane or chloditane in combination with high reserpine doses were recorded.
{ "pile_set_name": "PubMed Abstracts" }
Build-up and release from proactive interference during chronic ethanol consumption in mice: a behavioral and neuroanatomical study. Male mice of the BALB/c strain were given a solution of 15% ethanol as their only source of fluid during either 24 or 48 weeks. They were submitted to a sequential alternation (SA) task in a T-maze (6 successive trials). It was found that 48 but not 24 weeks of alcohol administration lead to a deficit as compared to pair-fed or tap-water controls. Whereas experimental mice performed as well as controls on the first 3 choices, they exhibited a gradual decrease in the SA rate on subsequent trials. We suggest that this deficit might result from an exaggerated vulnerability to proactive interference (PI). In order to further test this hypothesis, a second experiment investigated whether a between-trials variation of context of the maze would increase performance. It was found that the SA rate improved as soon as the variation was provided (5th trial). We suggest that the deficit of experimental mice results from an impairment of retrieval processes. A neuroanatomical study was conducted to quantify cell losses resulting from 8, 24 or 48 weeks of ethanol treatment in the mammillary bodies (MM) or the hippocampus (HPC). At the time of appearance of the deficit, MM exhibited a -32% cellular loss, whereas this was only -18% in the HPC. This result emphasises the importance of MM lesion in memory deficits resulting from long-term alcohol consumption.
{ "pile_set_name": "PubMed Abstracts" }
: A Rock-and-Roll Memoir Grace Slick , Andrea Cagan Hachette UK , 14 Dec 2008 - Biography & Autobiography - 384 pages 2 Reviews A candid autobiography of the great rock diva of Jefferson Airplane and Jefferson Starship, revealing her wild life at the forefront of the Sixties and Seventies counterculture. She has been called rock and roll's original female outlaw, as famous for her bad behavior as for her haunting singing voice. In her 25-year career as a musician, Grace Slick charted dozens of hits and sold millions of albums. From "White Rabbit" and "Somebody to Love" to "Sarah" and "Miracles", the songs she performed became the anthems of a generation. Whether describing her antics at the White House with Abbie Hoffman or the unforgettable experience that was Woodstock, Slick's recollections have the same rich imagery found in her lyrics. In this provocative narrative, readers will discover the many sides of Grace Slick: as artistic pioneer; she records songs with Jerry Garcia and David Crosby; as practitioner of freedom and rebellion; she sleeps with Jim Morrison and gets arrested for DUI on three separate occasions (without actually being in a car); and as a loving mother to actress China Kantner, she tries to balance casual friendship with parental wisdom. Slick offers a revealing self-portrait of the complex woman behind the rock-outlaw image, and delivers a behind-the-scenes, no-holds-barred view of the people and spirit that defined a quarter-century of American pop culture. Wildly funny, candid, and evocative, Somebody to Love?tells what it was really like during, and after, the Summer of Love-and how one remarkable woman survived it all to remain today as vibrant and rebellious as ever. Preview this book »
{ "pile_set_name": "OpenWebText2" }
sitive. k**(-165/2) Simplify (n*n*n*n**(-2/3)*n**(-13/4))/(n*n**(-7)/n)**(10/7) assuming n is positive. n**(109/12) Simplify (n*(n/(n*n*((n*n/n**(-3/5))/n)/n)*n)/n)**(10/3)/(n**(-12)/n*n*n**(-1/19)*n) assuming n is positive. n**(172/19) Simplify (((c**(2/9)*c)/c)/c*c**(-3/8))**(11/5) assuming c is positive. c**(-913/360) Simplify u**(4/3)/(u**(-12)*u)*u**(-1)*u**(-2/5)*u assuming u is positive. u**(179/15) Simplify (((n*n**(12/7)*n)/n*n)/n)/n**2*n*n*n/(n**(-2/51)/n*n*n)*(n/n**24)/n assuming n is positive. n**(-7585/357) Simplify (f*f**(4/9))**2*f/(f/(f/(f*f*f*f*f**(-15)*f)))*f**(-7/5)/f*f assuming f is positive. f**(562/45) Simplify (a*a**(1/3))**(-24)*a**(-1/7)*a/(a*a**(1/15)*a*a) assuming a is positive. a**(-3592/105) Simplify (q**29*q*q**(1/13))/(q*q**(-16))**(1/64) assuming q is positive. q**(25219/832) Simplify (((v**(-4)/v)/(v/v**(3/7)))/(v**(-1/3)/v)**(4/19))**(-12) assuming v is positive. v**(8444/133) Simplify (l/(l/(l*l*l**(2/7))))**(-3/14)*l**(-1/13)/l*l*l*l**(-2/11)/l assuming l is positive. l**(-5245/7007) Simplify (r**(-2/7))**24*(r**3)**(-7) assuming r is positive. r**(-195/7) Simplify s**(-7/5)*(s*s**(-1))/s*s*s**(-1/3)*s**(-4/5)*s assuming s is positive. s**(-23/15) Simplify ((s*s*s**(-3/16)/s)/(s/(s/s**(-28))))/((s*s*s**17)/(s*s**(1/8)*s)) assuming s is positive. s**(191/16) Simplify y/y**(-7/2)*y/(y*(y**7*y)/y)*(y/(y**(-1)/y*y))**(-4/5) assuming y is positive. y**(-41/10) Simplify (x**(-3/5)/x*x*x/x**(-2/29))/(x**(-2)*x*x*x**(7/4)) assuming x is positive. x**(-743/580) Simplify (y**(-6)/(y/((y*y/y**(-3/2))/y)))/((y**(-2/15)*y)/y)**(-10/7) assuming y is positive. y**(-197/42) Simplify ((a**(-2/7)/a)**13/(((((a*a**(-2/3))/a)/a*a)/a)/a*a/(a/(a*a/(a/a**(-3/4))*a*a))))**(1/35) assuming a is positive. a**(-1369/2940) Simplify (g**(2/17)/(g/(g**3*g*g)))/(g*g**(14/9)*g**(-4)) assuming g is positive. g**(851/153) Simplify ((u**(-1/7)*u**13)/(u**(2/11)*((u/(u**7*u))/u)/u*u))**40 assuming u is positive. u**(63680/77) Simplify (w/(w/w**(-34))*w*w/(w/(w**37*w*w)))/(w**(-28)*w**(-28)) assuming w is positive. w**62 Simplify (w**5)**(-1/18)/(w**0)**(-37) assuming w is positive. w**(-5/18) Simplify (d**(-2/11)/(d/(d/(d/((d/d**(-14))/d)))))/(d*d**18*d*d**(-7/2)) assuming d is positive. d**(-81/22) Simplify (z*z*z/z**12)**(2/11)/(z**7*z**(-2/33)) assuming z is positive. z**(-283/33) Simplify r/(r*r*r/(r*r**(4/5))*r*r)*r**(-10/7)*r/(r/r**11)*r**(-5/4)/r*r assuming r is positive. r**(857/140) Simplify ((t*t**40)/(t*(t**(-32)*t)/t))**(-1) assuming t is positive. t**(-72) Simplify ((b**14/b)/b*b*b/(b/b**10)*b*b)/(b*b*b*(b*b**2)/b)**(-1/3) assuming b is positive. b**(80/3) Simplify (o**28*o**(34/3))**(-1/42) assuming o is positive. o**(-59/63) Simplify (v*v/(v*(v/v**(-6/13))/v)*v/(v**(-8)*v))/(v/(v/(v**(-1)*v)*v))**47 assuming v is positive. v**(722/13) Simplify ((v*v**(-8)*v)/(v/v**(-7/4)*v)*v*v**(2/11)*v*v**(1/14))**27 assuming v is positive. v**(-62343/308) Simplify p**0*p/p**(-26)*(p**(-4/5)/p)/(p*p/p**(-14/5)) assuming p is positive. p**(102/5) Simplify v**(-1/7)*v*v**(-2)*v/(v**(-2/17)/v*v)*v**(-2/17)*v assuming v is positive. v**(6/7) Simplify (l/(l**(-7)*l)*(l*(l*l**(2/9)*l*l)/l)/l*l)/((l/((l/((l**11*l*l*l)/l))/l)*l)/((l/(l/(l*l**(-9/7)/l*l*l)))/l)) assuming l is positive. l**(-319/63) Simplify ((o**(-16)*o**20)**(2/5))**17 assuming o is positive. o**(136/5) Simplify ((w**(2/3))**(-10)/(w/(w/(w/(w/(w*w*w*w**1*w)*w))))**(-2/17))**(-3/17) assuming w is positive. w**(316/289) Simplify ((w**(-3)*w)/w)**(1/22)/((w*w**(-2)*w)/w**(2/11)) assuming w is positive. w**(1/22) Simplify ((a*a**(3/25)*a)/a**(-4/3))**(2/101) assuming a is positive. a**(518/7575) Simplify (d/(d**(-7)*d))**(-7)*d**(-18)*d*d*(d*d**(-1))/d assuming d is positive. d**(-66) Simplify (k**(1/3))**(-47)*(k/(k/(((k*k*k/(k/k**(1/2)))/k)/k))*k)/k*k**20 assuming k is positive. k**(29/6) Simplify (y**10)**7/(y**7)**17 assuming y is positive. y**(-49) Simplify ((k**(-20)/k)/k*k**(4/13))/(k*k**(2/39))**(-21/5) assuming k is positive. k**(-1123/65) Simplify p*p*p*p/p**(1/6)*p*p*p*p*p**(-2/23)*(p**(-4)*p*p)**(7/8) assuming p is positive. p**(1655/276) Simplify (t/t**(7/4)*t)/t**1*t/t**(1/10)*t**(-2/49) assuming t is positive. t**(107/980) Simplify (f**3*f)/((f*f/(f*(f**10*f)/f))/f)*(f*f*f*f/(((f/(f**(-2/13)/f))/f*f)/f))**(2/29) assuming f is positive. f**(5352/377) Simplify (f**4)**(-10)*(f/(f/f**(-1/2)))**(3/10) assuming f is positive. f**(-803/20) Simplify (((m/m**(3/11))/(m/m**(6/11)*m))**(2/35))**(2/21) assuming m is positive. m**(-32/8085) Simplify (m*m*m**(1/22)*m**7)/(m**(1/14)/m**(3/11)) assuming m is positive. m**(712/77) Simplify (q*q/(((q**(-3)/q)/q)/q))**27*(q*q/(q*q*q/(q**(4/7)/q)*q))/(q**1/q) assuming q is positive. q**(1495/7) Simplify (w/w**(-3/23)*w**(2/25))**(-3/16) assuming w is positive. w**(-261/1150) Simplify (y**(1/2))**26/(y**(2/7))**42 assuming y is positive. y Simplify t/(t**3/t*t)*(t*t/(t/t**(-8))*t)/t*(t*t/(t**(4/7)/t))**(-1/88) assuming t is positive. t**(-5561/616) Simplify (((s**(-6)/s)/s*s**(2/13))**(-43))**(14/3) assuming s is positive. s**(20468/13) Simplify (m**(-4)/m*m)**46*(m*(m*((m/(m*m**(-1/28)))/m)/m*m*m)/m)/m*m*m*m*m/m**6*m*m assuming m is positive. m**(-5151/28) Simplify (f*f**(3/10))/((f**(-6/23)*f)/f)*(f/(f*f*f**(1/52)/f))/(f/f**19) assuming f is positive. f**(116859/5980) Simplify v*v/v**(7/2)*v**(1/22)*((v**(-4/7)/v)/v)/v*v/((v/((v/(v**6/v))/v*v))/v) assuming v is positive. v**(-618/77) Simplify s**19*s**(-21)*((s**(-11)/s)/s)/(s/s**(1/11)) assuming s is positive. s**(-175/11) Simplify (((n/n**(-2/11))/n**(3/5))/(n**(-2/7))**28)**(9/8) assuming n is positive. n**(531/55) Simplify (((y**(-8)/y*y*y)/y*y*y)/y)**(-16)*y**(-26)/y**(2/13) assuming y is positive. y**(1116/13) Simplify (p*(((p/p**(-2/13))/p)/p)/p)**(-47)*p**(-2/3)*p**(-2/87)/p assuming p is positive. p**(14356/377) Simplify q**8*q/(q**12/q)*q*q**(1/11)/(q**10/q) assuming q is positive. q**(-109/11) Simplify ((n/(n*n**(3/4)/n*n))/n**(-1))/(n*n**(-1/2)*n*n*n**(-1/3)/n*n) assuming n is positive. n**(-23/12) Simplify ((v**(-2/3)/v**(-6))/((v*v**(-2/11))/((v/(v*v**(1/6)*v*v))/v)))**(-15) assuming v is positive. v**(-445/22) Simplify ((l/(l/(l**(-1)*l*l)))/((l*l**(-1/3)*l)/l))/((l*l**(-3/8)/l)/(l**(-8)*l*l)) assuming l is positive. l**(-127/24) Simplify ((s**(-1/3))**(2/69)/(s/s**(1/2)*s**(-2)/s*s*s))**39 assuming s is positive. s**(2639/138) Simplify ((c**(2/5)*(c**8*c)/c)**(-46))**(11/5) assuming c is positive. c**(-21252/25) Simplify (p**(-4)/p**7*p**3/(p**(-1/4)/p))**(-10/11) assuming p is positive. p**(135/22) Simplify ((u*u/u**45)/(u**(-19)/u))**47 assuming u is positive. u**(-1081) Simplify ((p*p*p/p**(1/3)*p)**(-21)*p**(-2/7)*p/(p*p/p**(1/10)))**(-14/9) assuming p is positive. p**(5473/45) Simplify (b**(-3/7))**(3/2)/(b*b/(b/(b**6*b))*b**7) assuming b is positive. b**(-219/14) Simplify (((k**0/k)/(((k/(k/(k*k**(-1/4))))/k)/k))/((k*k/(k**(1/2)/k)*k)/k*k*k*k)**20)**(-1/56) assuming k is positive. k**(439/224) Simplify (((s**(-1/7))**43)**(-1/22))**(-1/5) assuming s is positive. s**(-43/770) Simplify x**(-8/3)/x**(-4)*(x**1/x)**(12/7) assuming x is positive. x**(4/3) Simplify ((g/g**(3/7)*g*g)/g**(-19))/(g**(3/19)/(g*g/(g/(g/(g*g*g**(4/13)))))) assuming g is positive. g**(36492/1729) Simplify (v*v/((v*v/v**(1/5))/v))/v**10*((v**(-3/4)*v)/v)**(-9) assuming v is positive. v**(-41/20) Simplify (z*z**6*z**7)/(z*(z*z/(z**(-1/4)/z))/z)**(-1/28) assuming z is positive. z**(1581/112) Simplify (h*h*h/((h*h**(2/15))/h)*h)**(2/9)/((h*h**(-26))/(h**(-10)/h)) assuming h is positive. h**(2006/135) Simplify (((i**(-1/4)/i)/(i/i**(-3/2)))/(i**(1/3))**(2/27))**(-1/15) assuming i is positive. i**(1223/4860) Simplify ((l**(-2/45))**(-46))**(2/15) assuming l is positive. l**(184/675) Simplify (g**(-2/11)*g)**(-6/11)/(g**(3/8)/((g*g*g/((((g*g**0*g)/g)/g*g)/g))/g)) assuming g is positive. g**(1141/968) Simplify (d**(-3)*(d**25*d*d)/d*d)**(1/3) assuming d is positive. d**8 Simplify (a**(-5)/(a/(a/(a/(a**20*a)))))**42 assuming a is positive. a**630 Simplify (m**(-12)/m*m)/m**(1/5)*(m**(2/9))**(28/3) assuming m is positive. m**(-1367/135) Simplify (s/(s/(s/(s**(2/11)/s)))*s*s)**(-3)*s**(-9)/((s**(-14)*s*s)/s) assuming s is positive. s**(-82/11) Simplify (((i*i**(-4/5))/(i/((i**(-6)*i)/i)*i))/(i**3)**(4/27))
{ "pile_set_name": "DM Mathematics" }
Q: Which libraries have been ported to different programming languages? Since I am working with different Platforms and programming languages, I found there are many good libraries that are ported with different programming language than its original. For example JUnit and Log4j which has been ported into several different languages. Sometimes if I am already used to working with these libraries, I would find the ported version for it if I'm working with another programming language. What are other libraries that you have found been ported to different languages and as good as the original? Please make it one library per answer so others can vote. Format: Original-Library-Name, Original-Programming-Language Ported-Library-Name, Ported-Programming-Language If possible with the links to the website of the libraries. A: QuickCheck, Haskell Quviq QuickCheck, Erlang RushCheck, Ruby ScalaCheck, Scala ClickCheck, CommonLisp pyqcy, Python PeckCheck, Python qc, Python QCheck/SML, Standard ML Scheme-Check, Scheme Test::LectroTest, Perl Reductio, Java QuickCheck, Java FsCheck, F# A: SUnit, Smalltalk every other unit testing framework, pretty much every programming language unittest, python A: JUnit, Java test/unit, Ruby NUnit, .NET PHPUnit, PHP unittest, python CppUnit, C++ perlunit, Perl
{ "pile_set_name": "StackExchange" }
Q: requestFocus for TextView on Jelly Bean slow I am developing an application that has 4 text fields for entering data into and I have come across a performance issue when moving focus from one to the other. When a field has a character entered into it I use the addTextChangedListener to monitor the text and move the focus to the next text field. This was working fine on versions of android before 4.1.1 but since testing on 4.1.1 there is a noticeable lag when you press a key before the focus appears in the next field. This means if the user types rapidly, key presses can be lost. I have a simple app using the following code public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); one = (EditText)findViewById(R.id.editText1); two = (EditText)findViewById(R.id.editText2); one.addTextChangedListener(new TextWatcher() { @Override public void afterTextChanged(Editable s) { two.requestFocus(); } @Override public void beforeTextChanged(CharSequence s, int start, int count, int after) { // TODO Auto-generated method stub } @Override public void onTextChanged(CharSequence s, int start, int before, int count) { // TODO Auto-generated method stub } }); } that highlights the issue. When run on a 4.0.4 based device everything is fine, but on 4.1.1 it takes a while to move the focus. I have tested this on 2 different Samsung Galaxy s3's one with 4.0.4 and one with 4.1.1. Has anyone else seen this? Many thanks Paul A: I don't know if there is a solution for that problem... but I might have a "hack" that gives an alternative solution while the problem exists: Put an EditText out of the screen. (I normally set it to the right of the right margin with a RelativeLayout). Set onTouchListener to your visible EditText (and set the EditText to not be clickable). The onTouchListener should the focus to the hidden EditText. On the hidden EditText set a addTextChangedListener which for each character added or removed makes the proper changes on the visible EditTexts. Example: If I have 4 EditTexts for PIN with IDs: A, B, C and D and a EditText out of the screen with id hidden: Whenever I receive the first char on hidden I write A. Whenever I receive the second char on hidden I write B. Whenever I receive a delete on the second char of hidden I delete on B. ... I'm doing something similar on one of my apps, without problems.
{ "pile_set_name": "StackExchange" }
PRIVATE ENTRY bedroom just a few steps away from one of PA's treasured parks, Bushy Run Battlefield. You will experience both nature and privacy all while being 30 minutes away from downtown Pittsburgh. You will have easy access parking, laundry room amenities, hiking trails, breakfast, a private refrigerator, TV, and internet access with ease. But most of all, you will have clean and comfortable living space. We're happy to chat with our guests as much as they'd like or give them their privacy. We have created a binder packed with all the things to do and places to go in our area as well as downtown Pittsburgh. When you stay with us, you will have easy access parking, laundry room amenities, hiking trails, breakfast, a private refrigerator, TV, Netflix, and Internet access with ease. You will only have to share the kitchen, bathroom, and living area with your host. The feel of country, with the access of a city. Penn Township sits just outside of the City of Greensburg and is a 30 minute drive to downtown Pittsburgh. Our town is packed full of character, nightlife, parks, and good eats. I would highly recommend staying here! The hosts were very thoughtful and caring. The house was perfectly clean and exceeded all expectations. Noah2017-08-09T00:00:00Z They are very nice and kind hosts. They really make sure us to easily get to their place, including parking and getting into the room. Very easy to get there as they described. Nice private and comfortable room and have everything we needed. The area is surrounded by country scenery and park. Nice! Maaw2017-09-04T00:00:00Z It was just wonderful to stay at Jules and Andrew's place. They are very courteous, kind and cared much about our well-being. Their house is beautiful and is located in a very nice area. Definitly one of my best airbnb experiences ever. I highly recommend this place!!!!!!! Uwe2017-05-22T00:00:00Z This place was amazing! They had toiletries and snacks for us. Perfect place to rest up. Caroline2017-07-24T00:00:00Z Jules & Andrew's place was just what I needed to break up my long drive.I liked the flexible check-in and that the room included Netflix on the smart tv. Beautiful walking trails at Bushy Run park too. We stopped on the Jules and Andrews place on our way to NY. We loved how easy was the check-in as it does not require the host physically being in house to let you in. It was perfect for us as we arrived close to the midnight and did not feel like we would be disturbing the host when trying to get to the house. Place is very clean. We shared the bathroom with the host but, since my understanding their bedroom is on the 3rd floor and in the morning they were gone by the time we woke up, we had plenty of privacy. They have few things for the breakfast to eat and drink, which was very helpful for us as we were trying to leave early and did not really have time to stop for the breakfast somewhere else. i would greatly suggest this place. Leyla2017-06-22T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 2 Soverom BEAUTIFUL COUNTRY HOME - PRIVATE BEDROOM SUITE WITH PRIVATE BATH and Living Room Area, located just 30 mins from downtown Pittsburgh. A great space for extended stays! Our home backs up to the seventh green of The Club at Blackthorne Golf Course. Circular driveway provides parking directly in front of the house. Suite is equipped with a private refrigerator, microwave, TV and internet access. We share our home with 2 gentle giants, a St. Bernard, Hamilton and a Newfoundland, Franklin. We will share our family room and kitchen if you're interested. We have a great outside area with a lot of greenspace for unwinding, a large deck and patio with fire pit. We have a 2nd room and private bath with a queen bed which is perfect for a family with more than two adults or friends who want separate rooms. Extra charge of $30.00 per night, for 2nd room use, and can accommodate 2. Please send an inquiry if you would like both rooms. Duff Park with hiking trails is 2 miles away. Restaurants and shops are close by. Even a really great Nail Salon if you are interested! This is a very nice place to stay. Easy to find and its in a quiet area. Hosts are super nice people that make you feel comfortable and right at home. I would not hesitate to stay here again. You won't be disappointed! The dogs are great too. Very loving and chill. Luke2017-08-31T00:00:00Z Had a great stay and lovely chat and Robert's and Daphne's. Hosts were very nice and we felt very welcomed! Beautiful house and spacious, lovely room. Patrik2017-08-07T00:00:00Z Robert and Daphne were simply amazing hosts. The room is much beyond what I had expected: there was delicious pastry and juices, snacks, coffee, and all kinds of body products. I felt bad for how much I paid because they could easily price the room three or four times as much as they did, but they didn't. They were also flexible and were willing to accommodate my schedule and comfort level with dogs. I had one of my best nights of sleep on the very comfortable, clean bed. This is probably the best Airbnb I've stayed at across many cities in the US, and I cannot recommend enough. Lily2017-07-30T00:00:00Z Great place to stay. Hosts are very nice people! Luke2017-09-07T00:00:00Z This room and property are beautiful, and the hosts are amazing. We weren't expecting all the food and drink and other extras that come with the room, especially at the price. Robert and Daphne are super friendly, and we really appreciated getting to know them too. Reserve your couples getaway here before others discover it. Tim & Lynette2017-08-13T00:00:00Z Robert & Daphne are such great hosts! They are the kind of people who should be in this business. The warmth of their welcome makes you feel right at home, and we really enjoyed our time talking with them. The room is comfortable and clean, and very affordable for those of us on a shoe string budget. For that I can't thank them enough! Their pets are very loving and welcoming as well. Very nice and safe neighborhood, great parking, and beautifully kept property. We highly recommend their home! We have found our place to stay, and are looking forward to a return visit in the very near future. (Almost didn't want to give a great review, then the secrets out!! :) William & Jacquelyn2017-08-20T00:00:00Z Robert and Daphne are the sweetest hosts you will ever meet. We were coming in with a moving truck and Robert really bent over backwards to lead us to a good place to park, and to show us the easiest way to the house. Then he stayed up chatting with us, as if he were our relative or old friend. Robert and Daphne really take the time to get to know people and so they enjoy Airbnb hosting much more than the average person does. The room is convenient and it has its own bathroom and mini living room set-up (with sofas and a small TV). There's a mini fridge by the bed with fresh baked goods, juice, and water. There's also a goody bag of candy on the dresser! So cute!! They also have travel-sized toiletries in a basket for anyone who forgot something. And lastly, their DOGS ARE WONDERFUL! For anyone who isn't acquainted with Newfoundlands or Saint Bernards, they're like giant, slow-motion puppies. They have one Newfy and one St Bernard. They are so gentle and soft. For people who aren't used to dogs, Robert and Daphne leave their dogs in the basement where you won't see them. Still, I highly recommend that you be adventurous and experience their dogs. They are darlings. Caitlin2017-08-18T00:00:00Z A great room in a beautiful home. Robert and Daphne far exceeded my expectations as hosts. Pleasant, personable and down to earth. Always willing to chat about my day, plans for the next day and the best way to get from "here to there". Location is centrally located between Pittsburgh and Latrobe. Todd2017-08-05T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 3 Soverom This apartment is located in the Monroeville neighborhood of Pittsburgh and is conveniently surrounded by a wide range of restaurants, coffee shops, and shopping options. There are numerous options for recreational activities nearby such as go karting, laser tag, movies amongst others. It's also a 10 min drive from the University of Pittsburgh/Carnegie Mellon University and a 15 min drive from downtown. Ben was incredibly communicative and flexible with my schedule. The home was nice and clean and the bed was comfortable. Would definitely stay again! Amber2017-09-09T00:00:00Z The host canceled this reservation 6 days before arrival. This is an automated posting. Jane2017-08-12T00:00:00Z Clean, comfortable room and convenient to Pittsburgh (right off 376). Wendy2017-08-10T00:00:00Z Ben is very communicative and helpful. He is very accommodative. 5 stars. Great host. Dinesh2017-08-12T00:00:00Z Romtype Privat rom Eiendomstype Leilighet Plass til 2 Soverom My place is close to nightlife, family-friendly activities, and the city center. You’ll love my place because of the coziness and the views. My place is good for couples, solo adventurers, and business travelers. I really enjoyed my stay in Usman's place. His place was clean, tidy, beautiful and quit. You officially rent a room but literally have access to any part of the home. In addition, you will have full privacy in his place. It is a 20 minutes drive to Pittsburgh downtown where you would have access to a plenty of restaurants and wonderful places. This space is on the 3rd floor shared with the other side because theres a staircase but no door in between the 2 sides We can put up a privacy curtain if you like. We have bed rolls or you may get another bed or futon to share your side. For an added fee. See pricing. Personal fridge available in room for 15 per week. Nice quit neighborhood. Ppl are nosey. I like it. It keeps the neighborhood safe. If asked just tell them your my guests. Walkable , great porches, fire pit for Saturday cook outs. Close to everything. Literally within walking distance. Bus 2 blocks, bikes can be made,available or bring your own. Romtype Delt rom Eiendomstype Hus Plass til 1 Soverom Our place is located in the Verona neighborhood & is a short to a couple of great shopping centers, casual dining (Sandwiches! Greek/Italian!), a local grocery store, a pharmacy, public transportation, and two fabulous parks! We're happy to play tour guide & know that you'll feel right at home. Join us (Scott + Audrey), our daughter Amelia and our animals in our life adventure! Our Home: Comfortable, Eclectic, Vintage-Inspired, Clean. The kitchen is fully equipped with plenty of cabinet space. Included among others are a dishwasher, microwave oven and coffee maker. 42" TV with all of the goodies: Blu-Ray player, Chromecast, N64, PS2, Wii, surround sound. Your Room: Relaxing, Cozy, Fresh. It's furnished with a full sized bed, and a chest including hangers & a shoe rack. We love this neighborhood because it's very family friendly without the "Suburbia" feeling. All of our surrounding neighbors are friendly, considerate, & easy going. Verona is a very old borough & the homes are charming. There are also two lovely parks about 5 minutes walking distance from the house. First off, the house is beautiful--I've loved tudors since I was a kid. Room and bed were both quite comfortable. More importantly, Scott and Audrey are super friendly, and helped guide me in the direction of a nearby coffee shop in the AM--that was two minutes away and delicious. Adam2017-08-03T00:00:00Z Such a lovely little Tudor house. Suzanne2017-08-20T00:00:00Z Scott and Audrey's home is a cute and convenient lodging experience. With being approximately 20 minutes away from downtown, one of the greatest perks was feeling safe in their neighborhood while also being conveniently close to attractions. They are kind hosts who offer great accommodations regarding toiletries, wifi, and even pets. This was my friend's and my first AirBnB experience, and it was a great one to start with. Julie2017-09-03T00:00:00Z Very friendly! Room was comfortable and clean. Robert2017-08-30T00:00:00Z Scott and Audrey were very accommodating. They offered more than we needed for just a one night stay to break up a road trip and it would have been great to stay multiple nights. Cute, quiet neighborhood and friendly hosts that are respectful of your privacy if necessary. Would definitely consider staying again in the future Casey2017-08-16T00:00:00Z It was a good place. Off street parking, bathroom next to the room, and I was traveling with a cat and they allowed me to put him in their big garage. nathan2017-07-26T00:00:00Z We had a great one night stay at Scott + Audrey's place while driving across the country! The room was comfortable, clean, and cute. It is so hard to find a nice place to stay that allows pets, so we really appreciated having this place to keep the dogs for the evening while we explored Pittsburgh! Thanks! Stephanie2017-08-18T00:00:00Z The house was super clean and Scott and Audrey were super welcoming. Their pets are also super friendly so if you have allergies be aware. The house itself is very nice and comfortable though it can be creaky. There is only room in the driveway for one extra car so any other cars would have to park on the street. All in all I was really impressed and would not hesitate to stay with Scott and Audrey again Sarah2017-08-01T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 2 Soverom 1500 sq/ft hardwood floored split entry with plenty of amenities. Nice dead end street with back yard and wooded area for animals to roam. House is equipped with big screen TV set up in the living room, pool and foosball table in the gameroom. Rooms are a basic set up with fresh, clean linens provided for new guests. I do share the house with a 1 year old Shepherd and my cousin, both extremely well trained and friendly lol. WE DO LIVE HERE!! 10 min from Monroeville mall, 15-20 min from downtown. All spaces are available minus bedrooms that are occupied. The neighborhood is 5-10 min from monroeville mall and a long strip of shopping plazas. 10-15 min from south side and 15-20 min from the city. Jim was a very friendly host. His pets are well behaved and you'll forget they are even there. My stay was only for a night but 10/10, would book again. Patrick2017-06-30T00:00:00Z Jim was a great host and the accomodations were very clean and comfortable. I would definitely choose this place again! Melissa2017-08-29T00:00:00Z Jim's place is just straight-up awesome. Plenty of space upstairs and downstairs, lots of room to hang out wherever, and he kept the fridge stocked with some light, complimentary beverages. The bathroom, though communal, was only shared between a couple people, and it was so luxurious that I had no right to complain. I felt very at-home and safe in this space - the neighborhood was fantastic, and Cairo (Jim's dog) was an incredibly friendly sentry. I couldn't have asked for a better host or a better house - it was such a nice time, I wish I'd stayed longer. Robert2017-08-15T00:00:00Z Thanks for letting me spend the night Christian2017-07-08T00:00:00Z Jim is a really nice host, easy going and a great guy for little chats. I enjoyed staying at his place, which was super clean and quite. He owns a really cute dog and a cat. I would definitely recommend Jim's place to Airbnb community. Jim was a great host! He communicated effectively and timely through texting- which was great for us. His German Shepard was the sweetest pup we've ever seen! This was our first BnB stay and it was above our expectations! Thanks Jim! Maria2017-06-12T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 2 Soverom Charming one bedroom located just off the beaten path in Monroeville. Just steps away from shopping and dinning. Conveniently located to the parkway and PA Turnpike. Walking distance to the Monroeville convention center. Nice quiet room with off street parking. Flat screen tv. Home has everything you will need. Jonathan runs a lovely inn centrally located in Monroeville. Clean, quiet, and spacious with the added charm of a trio of adorable dachshunds! They all made me feel right at home. A great place. Matt2017-07-20T00:00:00Z Jonathan was very accommodating and the room was great! Would definitely stay again. Marcus2015-12-06T00:00:00Z Great place to stay. The room was super with a great bed. The hosts were super nice and I enjoyed talking with them. The dogs were just adorable. Could have taken them home with me. Good location. 10stars. Will stay again when in the area. Anne Elizabeth2017-05-06T00:00:00Z I would highly recommend Jonathon's place! The accommodations were top notch, with a bunch of little extras that made my stay especially nice. I look forward to staying there again this summer when I'm back In Pittsburgh. Jonathan's listing is one of the nicest places Airbnb listings I've stayed in. My hosts were very welcoming and accommodating. The room is clean and comfortable with lots of amenities. I would highly recommend their listing to anyone staying in the area. Jose2016-02-18T00:00:00Z Jonathan was a gracious host and his home was clean, comfortable, and attractive. We didn't have a chance to sample any of the coffee or treats he left us, but our time was limited. His three dogs were very sociable and cute. The neighborhood was convenient to the mall and restaurants but still safe and quiet. Mark2017-08-10T00:00:00Z Jonathan's place is AMAZING. We are first timers of airbnb and this was our first stop. Jonathan was extremely amazing at communicating with us from booking up until arrival, and then was kind enough to give us a list of great places he loves in the area, as well as his personal number in case of any questions. The closeness to Pittsburgh is perfect, without being in the city, and Monroeville is a cute, clean town! We felt safe and cared for; Jonathan even left us extra blankets in our room - which was extremely thoughtful. Everything is as pictured and described. I cannot express, in words how wonderful our experience was and thank Jonathan and his handsome dogs for our stay! Samantha2017-03-23T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 2 Soverom very cozy in quiet neighborhood, two private rooms in are home, you will have your own bathroom and livingroom with access to the kitchen ,cable and internet,pool access,one parking spot in driveway. located in slickville pa close to Greensburg, Monroeville right off state route 22, 819 state highway. we are located about 45 mins from downtown Pittsburgh and an hr from Pittsburgh airport. Are home is located on a dead end street in a quiet safe neighborhood. The home is a lovely private getaway for a small family. Great value and a wonderfully accommodating host! I would stay here again for sure! Raven2017-08-14T00:00:00Z The host is exceptional and very responsive. The apartment is located in the basement of property and has plenty of space. Eiendomstype Plass til Soverom Lots of trees and peaceful surroundings. Minutes from nearby shopping plaza. Thirty minutes east of Pittsburgh. The hosts welcomed me to a wonderful home away from home. Surrounded by nature, quiet and in a safe and beautiful community, with a shaded parking for the car meters from the front door, a very confortable couch, a full equipped kitchen, a washer and dryer, a great porch and backyard, blackout curtains in the bedroom, shower head more than 6 feet high, a real desktop and very good internet connection. All meticulously clean. Thank you Tara and thank you Eric for a great AirBnB experience, the communication with you was excellent and you are very nice people. I hope our paths cross again someday. Alejandro2017-08-31T00:00:00Z This is a lovely little home. It was just perfect for us and had really nice amenities. Tara was very receptive and friendly. We will book again when we visit our family in the Pittsburgh's area. Good, affordable place to stay in the area, especially since there is not much available in this small town. My girlfriends and I had a bridal shower to attend in the area, and just needed a place to sleep. It was perfect for that. Three large bedrooms with beds, and a pullout couch in the living room. Also, ample room for air mattresses if you needed to fit more people. The house is older and outdated, and the furniture is mix-matched, but everything worked correctly, and we felt comfortable. Would definitely stay at Nieves again if we needed to. He was very accommodating to our needs, and checkin was very easy. Meredith2017-04-09T00:00:00Z Romtype Helt hjem/leilighet Eiendomstype Hus Plass til 12 Soverom 3 bedroom home 1.5 baths 2 car garage less than 15 miles from downtown Pittsburgh if looking for place to stay for the week.House is available for rent for the entire week. Roughly 30 minute commute depending on traffic in mornings to downtown Jamie was an excellent host - very welcoming and accommodating. He has two dogs, which are the cutest and friendliest dogs you could wish for. The house was beautiful, the bedroom my wife and I stayed in was quite large and clean, and the bathroom was right off the bedroom, which was convenient. Michael2017-08-20T00:00:00Z We was Jamie's first guest. He went out of his way to make our stay comfort, pleasant, and well informed. His wonderful home, attentive attitude, and local knowledge had made our college touring trip a memorable life event. Welcome to the airbnb community, and thank you. Jeannie2017-08-06T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 2 Soverom Welcome to our cozy creekside cottage. We are conveniently located close to the Monroeville Convention Center, and we're only a 15 minute drive from downtown Pittsburgh. Our private room sleeps up to 6 people with a workspace and entertainment provided. Relax in our hot tub or take a walk through the gardens as you listen to the creek babble, and feel free to make use of our kitchen and common living spaces. People from all backgrounds are welcome in our home. Our family would love to meet you! Joel and Stephanie were very sweet and friendly. They even offered to cook for us. We were just passing through and needed somewhere to sleep. It fit perfect for that need. Shelly2017-08-06T00:00:00Z Lovely home in a great neighborhood! Bedroom and bathroom were both clean and well maintained. We had everything we needed and the instruction/guide was clear from the beginning. Joel and Stephanie were great hosts and we definitely recommend their home to anyone traveling to Pittsburg. Della2017-08-27T00:00:00Z I needed to stay an extra day in Pittsburg, Joel and Stephanie were very accommodating for my last minute request. I am currently staying in another Airbnb because they had another booking but to be perfectly honest I'd much rather be staying at their house because it's so homey and inviting! Tonya2017-07-18T00:00:00Z The area/location, the house, the sleeping arrangements, and the family are exactly as advertised. Safe, comfortable, clean, relaxing, lovely, etc etc DannyLynne2017-08-17T00:00:00Z Was just what my family and i needed. Very friendly, would definitely stay again. Andrew2017-08-26T00:00:00Z Joel and Stephanie are wonderfully accommodating and located in a great spot - enjoy the quiet and relaxing location, or take a quick drive into Pittsburgh - their place was the perfect spot for our trip. Kendal2017-08-09T00:00:00Z Great hosts, highly recommend. Justin2017-08-19T00:00:00Z We just needed a place to sleep overnight and shower, on a road trip. The place was clean, thoughtfully set up, and Joel was very easy to deal with. Definitely recommend it! Graham2017-08-18T00:00:00Z Romtype Privat rom Eiendomstype Hus Plass til 6 Soverom Fully furnished 2 bedroom 1 bathroom apartment all utilities cleaning services ChromeCast TV ..Kitchen with all utensils provided .. clean linens , blankets and pillows are provided.. with towels. great for a family on vacation or just friends Romtype Helt hjem/leilighet Eiendomstype Leilighet Plass til 4 Soverom This 3 bedroom townhouse on a private road is secluded, yet near many restaurants and malls. Has 3 floors, full kitchen and 2.5 baths. Newly decorated and comfortable with a king size master bedroom with master bath, double bed and twin size bed. Kristen's welcome was just right for us. She greeted us and made sure we would be able to find everything we need, and left us a note with details regarding things that might come up and nearby places we might need or be interested in going to. She let us settle in on our own right after that. I Christine2016-05-02T00:00:00Z Kristen was quick to respond to messages! Pam2017-06-18T00:00:00Z I did not get to meet Kristen personally due to travel delays however my family stated that she was very welcoming and friendly. Throughout the process Kristen communicated very well with me and in a timely manner. Her home is BEAUTIFUL. I loved it. Cozy, clean and filled with love. We enjoyed our stay. Jessica 2016-07-05T00:00:00Z Quiet neighborhood in the location we needed! Cassandra2017-06-25T00:00:00Z Property description was good, neighbors were quiet, clean home and peaceful, driving directions were good and many conveniences close by. Pugliano's Italian nice place for pasta! Thanks Kristen for the stay, we'll see you back in July :) Kimberly2016-05-30T00:00:00Z Perfect location for our event. Everything as described. Would come here again when need to be in the area Richard2016-06-20T00:00:00Z Great place everything was as expected Doug2017-08-13T00:00:00Z Romtype Helt hjem/leilighet Eiendomstype Hus Plass til 5 Soverom Taking a trip to Pittsburgh but don't want to pay high hotel or parking rates when it's time to sleep? Free parking and a spacious comfy room! Take a look at my home which is about 10-20 mins from Regent Square, Downtown, Oakland, the Waterfront, Southside, Shadyside, etc! Shopping Plaza 5 mins away-FOOD Feel free to use cups or other utensils in the kitchen. Dirty dishes please rinse and place in dishwasher. You may store stuff in the fridge as well. Parking Space, bedroom features queen bed with memory form topper, plenty of space to hang or store your clothes in closet or dresser. Can use kitchen area or washer and dryer downstairs if you'd like. Im centrally located on the east end of Pittsburgh which gives you great access to places like Regent Square, Shadyside, the Waterfront, East Liberty, Oakland which gives you endless possibilities for bars, restaurants, shopping, etc. Plus there is a Plaza that's less than 5 mins away from my places that has an Applebee's, Giant Eagle, Taco Bell, Subway, Dollar Store, dry cleaners, Wendy's, Eat 'n Park, wine & spirits store, etc. Need a workout, Planet Fitness is also located in Plaza so you can get your sweat on! Raymond was awesome! Super welcoming and hospitable. The room and house were perfect for my husband and I to just crash for a night on our long drive from St. Louis to Eastern PA. Relatively easy to find, although I would definitely suggest a GPS. Excellent value for the price. Thanks, Raymond! Brynn2016-11-22T00:00:00Z Raymond made sure that I always had a way in and out of the house. My stay was very comfortable and he provided the essentials and then some. I highly recommend him for anyone! Ryan2016-12-14T00:00:00Z Nice stay. Good value. Arnab2017-07-12T00:00:00Z Great value. The host is very transparent, responsive, helpful, friendly, and trustworthy. Provided privacy, and was open to share any information or resource. Sam2017-04-02T00:00:00Z For the price I did not mind it being alil bit out of the city. Johnny2017-05-06T00:00:00Z Everything was very good, as described, quiet and pleasant. A good ending to a frustrating day, thanks!
{ "pile_set_name": "Pile-CC" }
Suppression of rat tumor colonies in the lung by oxygen at high pressure is a local effect. The effect of hyperbaric oxygen (HBO) on the growth of anaplastic carcinoma colonies in rat lungs after intravenous tumor cell injection was studied. From the first day after tumor cell injection, the rats were exposed to HBO for 16-21 days, 90 min per day. Oxygen at a pressure of 300 kPa (3.0 ATA) significantly decreased the number of lung tumor colonies and increased the survival of tumor-bearing rats, whereas the application of oxygen at a pressure of 100 kPa had no effect. An oxygen-nitrogen normoxic mixture balanced with nitrogen to 300 kPa (3.0 ATA) did not affect the number of colonies, suggesting that the effect was specific for oxygen and not for the increased pressure itself. A 6-day application of oxygen at a 300 kPa pressure suppressed the growth of lung tumor colonies when applied on days 1-6 and 7-12 after intravenous tumor cell injection, but had no effect when applied on days 13-18. In contrast to dramatic effects of HBO on the development of artificial lung metastases, the oxygen at the same 300 kPa pressure had no effect on the growth of tumor cells injected in the hind foot. Thus it appears that the suppression of lung tumor colonies by HBO was due to local oxygen effects in the lungs.
{ "pile_set_name": "PubMed Abstracts" }
The Ubiquinol Binding Site of Cytochrome bo3 from Escherichia coli Accommodates Menaquinone and Stabilizes a Functional Menasemiquinone. Cytochrome bo3, one of three terminal oxygen reductases in the aerobic respiratory chain of Escherichia coli, has been well characterized as a ubiquinol oxidase. The ability of cytochrome bo3 to catalyze the two-electron oxidation of ubiquinol-8 requires the enzyme to stabilize the one-electron oxidized ubisemiquinone species that is a transient intermediate in the reaction. Cytochrome bo3 has been shown recently to also utilize demethylmenaquinol-8 as a substrate that, along with menaquinol-8, replaces ubiquinol-8 when E. coli is grown under microaerobic or anaerobic conditions. In this work, we show that its steady-state turnover with 2,3-dimethyl-1,4-naphthoquinol, a water-soluble menaquinol analogue, is just as efficient as with ubiquinol-1. Using pulsed electron paramagnetic resonance spectroscopy, we demonstrate that the same residues in cytochrome bo3 that stabilize the semiquinone state of ubiquinone also stabilize the semiquinone state of menaquinone, with the hydrogen bond strengths and the distribution of unpaired spin density accommodated for the different substrate. Catalytic function with menaquinol is more tolerant of mutations at the active site than with ubiquinol. A mutation of one of the stabilizing residues (R71H in subunit I) that eliminates the ubiquinol oxidase activity of cytochrome bo3 does not abolish activity with soluble menaquinol analogues.
{ "pile_set_name": "PubMed Abstracts" }
A clinical lesson: glioblastoma multiforme masquerading as depression in a chronic alcoholic. To highlight the need to consider other medical conditions when the presentation initially appears to be alcohol-related. We report the case of a 34-year-old male alcoholic, who presented with clinical depression and later a delirious state, and was subsequently diagnosed to have a right frontal glioblastoma multiforme. Psychiatric patients, especially alcoholics, may present with physical and neurological symptoms in the emergency department, which are linked by the examiner to the toxic effects of alcohol. However, consideration should be given to the possibility that the symptoms are due to other severe medical conditions.
{ "pile_set_name": "PubMed Abstracts" }
Q: Last Digit of a Large Fibonacci Number fast algorithm I'm trying to solve Fibonacci using java, but my code takes so long with big numbers. Problem Description Task. Given an integer , find the last digit of the th Fibonacci number (that is, mod 10). Input Format. The input consists of a single integer . Constraints. 0 ≤ ≤ 10⁷. Output Format. Output the last digit of . My code: public class FibonacciLastDigit { private static int getFibonacciLastDigitNaive(int n) { if (n <= 1) { return n; } BigInteger first = BigInteger.ZERO; BigInteger second = BigInteger.ONE; BigInteger temp; for (int i = 1; i < n; i++) { temp = first.add(second); first = second; second = temp; } return second.mod(BigInteger.TEN).intValue(); } public static void main(String[] args) { Scanner scanner = new Scanner(System.in); int n = scanner.nextInt(); System.out.println(getFibonacciLastDigitNaive(n)); }} My code fails if input = 613455 it takes 30 seconds to get value and max allowed time is 1.5 second. I had to use big Integer because long isn't enough. A: There is a cycle in the last digit of the Fibonacci numbers. It repeats for every 60 numbers. So just build a table of the last digit of the first 60 numbers, then do a modulo 60 operation on the input and a table lookup. You may see the cycle in any online (or offline) table of Fibonacci numbers. One link at the bottom. For building the table, for each calculated number you may subtract 10 if it’s over 9 since you only need the last digit, and the last digit of each number only depends on the last digit of the two previous numbers. You can use int math (you neither need long nor BigInteger). Link: The first 300 Fibonacci numbers, factored A: Your implementation is indeed naive, because you're asked to get the last digit of the Fibonacci number not the actual Fibonacci number itself. You only need to keep the track of the last digit, other digits don't matter. public static void main(String[] args) { Scanner scanner = new Scanner(System.in); int n = scanner.nextInt(); System.out.println(getFibonacciLastDigit(n)); } private static int getFibonacciLastDigit(int n) { if (n <= 1) { return n; } int first = 0; int second = 1; int temp; for (int i = 1; i < n; i++) { temp = (first + second) % 10; first = second; second = temp; } return second; }
{ "pile_set_name": "StackExchange" }
(CNN) 米オクラホマ州でこのほど、自宅へ来た警官に拘束され後ろ手に手錠をかけられた男性が、その姿のまま恋人にプロボーズする出来事があった。 ブランドン・トンプソンさん(35)は7月4日、同州マスコギーの自宅で警察に逮捕された。庭で家族がトンプソンさんの誕生日と独立記念日を同時に祝っていたところへ警官が到着。別の場所でトンプソンさんを見かけた警官が、複数の容疑で逮捕状が出ている人物だと気付き、尾行して自宅にたどり着いていた。 自分を逮捕しようとする警官にトンプソンさんが懇願したのは、一風変わった内容だった。「自分の気持ちを伝えないまま彼女と別れたくなかった」「彼女には、生涯を共にする妻になってほしかった」。トンプソンさんはCNNの電話取材にそう振り返った。 トンプソンさんは母親に指輪を持ってきてほしいと頼み、後ろ手に手錠をかけられたまま地面に両膝をついて、恋人のリンドリア・キースさんに「愛してる」「僕の妻になってもらえますか」とプロポーズ。キースさんが受け入れると、婚約指輪をはめられるよう、警官がトンプソンさんの後ろ手の手錠を体の前でかけ直した。この一部始終を警官のボディーカメラが捕らえていた。 2人は2016年5月から交際を続けていて、トンプソンさんの法的トラブルが解決したら、結婚式の日取りを決める予定だという。トンプソンさんの逮捕状は、裁判所に出廷しなかったことや罰金を払わなかったことが理由だった。 トンプソンさんは逃走に疲れ、人生をやり直すと約束。キースさんは2人の貯金を取り崩して保釈金を支払い、トンプソンさんは逮捕の翌日に保釈された。
{ "pile_set_name": "OpenWebText2" }
fileFormatVersion: 2 guid: 1dad87ba4f1e04d6eb7f287e1f2e08fe MonoImporter: serializedVersion: 2 defaultReferences: - sunTransform: {instanceID: 0} - prepareBlurShader: {fileID: 4800000, guid: 9ad381ed8492840ab9f165df743e4826, type: 1} - radialBlurShader: {fileID: 4800000, guid: f58445347fe2e4b8396487ed2bfa02ad, type: 1} - sunShaftsShader: {fileID: 4800000, guid: d3b1c8c1036784176946f5cfbfb7fe4c, type: 1} - simpleClearShader: {fileID: 4800000, guid: f688f89ed5eb847c5b19c934a0f1e772, type: 1} executionOrder: 0 icon: {instanceID: 0}
{ "pile_set_name": "Github" }
Q: Recycle Bin on Server 2008 Redirected Folders no longer works A user reported yesterday that the Recycle Bin function on his XP workstation had stopped working. I determined that the scope was a bit smaller than that. When he deleted a file from any of the Redirected folders (Desktop, My Documents, etc.), the Recycle Bin no longer functioned. The file was simply deleted. Deleted from a non-redirected folder worked fine. I have read pretty extensively on the topic and understand that VSS is the preferable method of restoring a file when using redirection. Indeed, not only do I have VSS running but I also run hourly incrementals with a backup product. Still, there's a chance for complete loss and, well, the Recycle Bin worked for him before. I do see a RECYCLER folder in the Redirected My Documents, so that seems to be right. And I just tried another workstation (albeit Windows 7 x64) and RB functionality is fine. -- Update: I did some further testing tonight. It looks like this has been going on for a few months. Indeed, it's affecting all Windows XP users. I just deployed a Windows 7 machine for someone this week and his recycle bin is working fine. -- Update x2: It seems like this stopped working for all XP-based users in July. I wonder if a security update was pushed from MS around that time that we installed? I'm still hopeful to resolve this, but my client doesn't care so much because of our backup procedures. A: I believe that you'll witness this behavior on all non-local, non-spinning storage (eg network mounts and flash drives - though it may be true across all USB-mounted media as well). The Recycle Bin is really a local alias to a directory that holds files before being fully deleted. Windows does not setup a RECYCLER alias on non-local media (ie, not the internal hard drive and any partitions thereon) because it can't ensure it will stay consistent.
{ "pile_set_name": "StackExchange" }
In a typical cellular radio network, also referred to as a wireless communication system, User Equipments, also referred to as UEs in the figures, communicate via a Radio Access Network (RAN) to one or more core networks (CNs). A user equipment is a mobile terminal by which a subscriber can access services offered by an operator's core network. The user equipments are radio network nodes and may be mobile stations or user equipment units such as mobile telephones, also known as “cellular” telephones, and laptops with wireless capability, and thus may be, for example, portable, pocket, hand-held, computer-included, or car-mounted mobile devices which communicate voice and/or data with the radio access network. Each cell in the cellular radio network covers a geographical area. A cell is served by radio base station equipment at a radio base station. That is, the radio base station provides radio coverage in the cell and communicates over an air interface with user equipment units operating on radio frequencies within its range. A cell from within which the communication between a user equipment and a base station is communicated, is referred to as the “serving cell” for that user equipment. A radio base station is a radio network node, in some radio networks called “eNB”, “eNodeB”, “NodeB” or “B node”, and will in this document be referred to as a base station (BS), or a radio network node. In some versions of the radio access network, several base stations are controlled, e.g. via landlines or radio link, by a Radio Network Controller (RNC) which supervises and coordinates various activities of the plural base stations connected thereto. The radio network controller, which also is a radio network node, is also sometimes termed a Base Station Controller (BSC). The radio network controllers are typically connected to one or more core networks. In LTE-type radio access networks, there is no separate radio network node corresponding to the BSC or RNC, and the base stations themselves, referred to as eNodeB:s comprise extra functionality. Due to the size and complexity of many radio communication systems, operators today spend considerable effort in planning, configuring, optimizing, and maintaining their wireless access networks. These efforts can consume a great part of their operational expenditures (OPEX). Today, operators resort to planning tools to dimension and plan their networks according to a specific business strategy. The approach based on planning tools and prediction is, however, not fully accurate. Reasons for the inaccuracies are imperfections in the used geographic data, simplifications and approximations in the applied propagation models, and changes in the environment, e.g. construction or demolition or seasonal effects such as foliage changes. Furthermore, changes in the traffic distribution and user profiles can lead to inaccurate prediction results. The above mentioned shortcomings force operators to continuously optimize their networks using measurements and statistics, and to perform drive or walk tests. Drive or walk testing provides a picture of the end user, such as a user equipment, perception in the field, and enables the operator to identify locations causing poor performance and their corresponding cause, e.g. incorrect tilt or handover settings. Drive/walk tests are, however, not ideal since only a limited part of the network can be analyzed due to access restrictions and the cost and time involved. Further, only a snapshot in time of the conditions in the field is captured. A viable method for overcoming these difficulties is to use the user equipments to report the observed service quality along with the locations where the measurements are performed. These user equipment reports may for example be used by a function which continuously monitors the network and estimates the spatial network performance, e.g. coverage and throughput. For LTE, three different localization methods are foreseen. The first location function is the network-assisted version of Global Navigation Satellite Systems (GNSSs) like the Global Positioning System (GPS) or Galileo. Different GNSSs can be used individually or in combination with other GNSSs. The network assists the UE GNSS receiver by providing assistance data (e.g., visible satellite list, clock corrections, reference positions) to reduce the UE GNSS start-up and acquisition times, to increase the UE GNSS sensitivity, and to allow the UE to consume less handset power than with stand-alone GNSS. The network-assisted GNSS methods rely on signaling between UE GNSS receivers and a continuously operating GNSS reference receiver network which has clear sky visibility of the same GNSS constellation as the assisted UE. The second localization method is the Observed Time Difference Of Arrival (OTDOA) method. This method utilizes the differences of time measurements of downlink radio signals from at least three eNodeBs along with the knowledge of the geographical coordinates of the measured eNodeBs and their relative downlink timing for calculating the UE position. The relative eNodeB downlink timing can be determined from information about the relation of each eNodeB downlink timing relative a time reference. One such time reference is the absolute time in the network. The last localization method, the enhanced cell ID positioning method, uses information about the user equipments, information about the serving cell, and the knowledge of the geographical coordinates of the serving eNodeB for estimating the user equipment position. Additional radio resource measurements like the Reference Signal Received Power (RSRP) or the Reference Signal Received Quality (RSRQ) can be used to improve the user equipment location estimate. According to one solution user equipment reports include position information in which the user equipments report or log radio measurements (e.g., RSRP), and also provide location info if the latter is available in the user equipment at the time of reporting or logging. One problem with the above mentioned solution is that the user equipment information is reported by the user equipment only if the position information is known at the time the report is transmitted or measurements logged. This means that the user equipment must have GPS enabled or recently used a positioning service relying on e.g. OTDOA. The UEs will typically have GPS enabled during a limited time or will use GPS frequently but over the same area, e.g., highways. It may also be desirable to obtain a more accurate position estimate than may be provided by the above methods.
{ "pile_set_name": "USPTO Backgrounds" }