text
stringlengths
0
7.84M
meta
dict
N-RAS oncogene mutations in patients with agnogenic myeloid metaplasia in leukemic transformation. From 5% to 20% of patients with agnogenic myeloid metaplasia (AMM) will evolve into a terminal leukemic phase; N-RAS gene mutations are the most common gene abnormalities detected in patients with leukemia. The present study was designed to see if N-RAS gene mutations are associated with the leukemic transformation in AMM. Over a 9 year period, in a single institution, 43 patients with AMM were studied. Of these, ten patients were found to be in leukemic phase. The results showed that none of the patients in chronic phase (40 patients) had N-RAS gene mutations, while two patients in leukemic phase showed this gene mutation. One patient was found to have a codon 12 mutation with arginine substituting for glycine (GGT-->CGT); the other was a codon 12 mutation with glutamine substituting for glycine (GGT-->GAT). The present study suggests that N-RAS mutations are rare events in the chronic phase of AMM, and are only occasionally found when patients have evolved into leukemic transformation. Further studies to search for other gene abnormalities in AMM may be warranted.
{ "pile_set_name": "PubMed Abstracts" }
Ügyrend Elnök Most áttérünk az ügyrendre. Kiosztásra került az Elnökök Értekezlete által 2010. május 12-én a 140. cikk értelmében elfogadott ügyrendtervezet végleges változata. Hétfő - nincs változás. Kedd - nincs változás. Szerda: Kaptam egy levelet Casini úrtól, az Alkotmányügyi Bizottság elnökétől, amelyben a bizottság kérelmezi, hogy az Európai Parlament konzultáljon az Európai Gazdasági és Szociális Bizottsággal, valamint a Régiók Bizottságával a polgári kezdeményezésről szóló rendeletjavaslatról az Európai Unió működéséről szóló szerződés 304. és 307. cikkének megfelelően. A konzultációra vonatkozó javaslatokról való szavazásra előreláthatólag szerdán 12 órakor fog sor kerülni. (A Parlament egyetért a kérelemmel) Most pedig áttérünk az ügyrend végső változatára. Ami a hétfőt és a keddet illeti, nem érkezett az ügyrend módosítására irányuló kérelem vagy előterjesztés. Egy javaslat van a szerdával kapcsolatban. Az Európai Néppárt (Kereszténydemokraták) Képviselőcsoport kérelmezte, hogy tartsunk szavazást a Czarnecki úr által benyújtott, az Európai Unió 2008-as pénzügyi évre szóló általános költségvetésének végrehajtására vonatkozó mentesítésről szóló jelentésről (II. szakasz - Tanács). Gräßle asszony terjeszti elő a kérelmet a PPE képviselőcsoport nevében. Ingeborg Gräßle a PPE képviselőcsoport nevében. - (DE) Elnök úr, ma délelőtt a Tanács a spanyol elnökségen keresztül megválaszolta a még tisztázatlan kérdéseket. Ezzel teljesült a jelentésről való szavazás egyik fő feltétele. Ezenkívül a spanyol elnökségen keresztül lehetőség nyílt a közös vitára és egy megfelelő mentesítési eljárás kidolgozására, és ezzel a második feltétel is teljesül. Ezzel a Tanács aláveti magát a parlamenti vizsgálatnak - és ez egy fontos mérföldkő, amelyet értékelnünk kell. Ezért minden képviselőcsoportot arra kérek, hogy szavazzon a mentesítésről való döntés napirendre tűzése mellett. Magával az állásfoglalással a júniusi ülésen fogunk foglalkozni. Hannes Swoboda az S&D képviselőcsoport nevében. - (DE) Elnök úr, rövid leszek. Az ismertetett okokból támogatjuk ezt az indítványt. Egy hivatalos levél már úton van a Parlamenthez. Én is jó jelnek látom, hogy a Tanács - legalábbis remélem - a Külügyi Szolgálattal kapcsolatban is készen áll olyan átláthatóságot és konszenzust tanúsítani, mint amilyet itt tanúsított. Ebből a szempontból egyetértek Gräßle asszonnyal. Bart Staes a Verts/ALE képviselőcsoport nevében. - (NL) Hölgyeim és uraim, azt kell mondanom, hogy meg vagyok lepődve azon, hogy a két nagy képviselőcsoport most azt ígéri, hogy szavazásra bocsátják a jelentést. A Költségvetési Ellenőrző Bizottság összehívta a koordinátorok ülését, amelyen én elnököltem. Ma délelőtt dokumentumokat kaptunk a Tanácstól, amelyeket megvizsgáltam. Ezek a dokumentumok tartalmaznak egy mellékletet, amely azonos a március 10-én kapott dokumentum mellékletével. Tehát valójában semmi nem változott, ezért azt javasolnám, hogy szavazzunk az ellen, hogy a Czarnecki-jelentés ezen ülés napirendjére kerüljön. Véleményem szerint - és ezt határozottan állítom - a Tanács egyszerűen be akar csapni bennünket. (A Parlament egyetért a kérelemmel) Elnök A Czarnecki-jelentés szavazására szerdán kerül sor. A módosítások előterjesztésének határideje 2010. május 18., 12.00 óra. Az Európai Néppárt (Kereszténydemokraták) Képviselőcsoport a Bauer asszony által benyújtott, a közúti fuvarozásban utazó tevékenységet végző személyek munkaidejéről szóló jelentésről folytatott vita következő ülésig való elhalasztását kérte. A kérelmet az előadó, Bauer asszony terjeszti elő. Edit Bauer előadó. - (HU) Elnök úr! Március 22-én a Foglalkoztatásügyi Bizottság titkárságától azt a választ kaptam kérésemre, hogy a májusi plénumon legyen ez a jelentés, hogy mivel nem telik el április 28-tól, amikor a Bizottság szavazott erről a jelentésről a mostani plénumig egy hónap, tehát a "cool-off” időszak, nem lehet ez a jelentés a májusi plénumon. Ezzel szemben anélkül, hogy bárki is megkérdezett volna, az Elnökök Tanácsa - föltehetően a szocialista frakció javaslatára - úgy döntött, hogy mégis ezen a plénumon legyen, tekintet nélkül arra, hogy eltelt egy hónap vagy sem, így az a helyzet állt elő, hogy egyszerűen a politikai frakcióknak nem volt idejük kialakítani az álláspontjukat ezzel a jelentéssel kapcsolatban és nem volt idő megtárgyalni ezt a jelentést. Ezért kérem azt, hogy halasszuk el a júniusi plénumra. Hannes Swoboda az S&D képviselőcsoport nevében. - (DE) Elnök úr, furcsának találom, hogy Bauer asszony - akit egyébként igen nagyra tartok - nem említette, hogy a jelentést elutasították. Legalább ilyen furcsának tartom azt is, hogy Bauer asszony elfelejtette megemlíteni, hogy egy elutasított jelentés ügyében értekezett a Tanáccsal. Ez nem a szokásos parlamenti eljárás. Ezért teljesen jogos a jelentés napirendre tűzése. (Taps) Corien Wortmann-Kool a PPE képviselőcsoport nevében. - (NL) Igaz, hogy a Bizottság jogalkotási javaslatát a Foglalkoztatási és Szociális Bizottság elutasította. Azonban a Parlamentben bevett szokás az egy hónapos "cool-off” időszak kivárása, amely lehetőséget ad arra, hogy mindnyájan jól felkészüljünk a plenáris ülésre. A Parlament e szokásjogát az előadó kérése ellenére ebben az esetben nem tartották tiszteletben. Ez egy nagyon bonyolult javaslat, és a képviselőcsoportoknak időre van szükségük, hogy felkészüljenek, ami két nap alatt lehetetlen. Ezen okból kérem önöket, támogassák az előadó indítványát, hogy e javaslat szavazását halasszuk a júniusi plenáris ülésre. (A Parlament egyetért a kérelemmel) Elnök A Bauer-jelentés vitáját elhalasztjuk a következő ülésig. Csütörtök Ami a csütörtököt illeti, a következő javaslat érkezett: az Európai Néppárt (Kereszténydemokraták) Képviselőcsoport kérelmezte, hogy a csütörtök délutánra tervezett, Ernest Vardanyan transznisztriai újságíró letartóztatásáról szóló vita helyett a thaiföldi helyzetről szóló vitát tűzzük napirendre. Tehát az Ernest Vardanyan transznisztriai újságíró letartóztatásáról szóló vita helyett a thaiföldi helyzetről szóló vitát. A kérelmet Preda úr indokolja részletesebben. Cristian Dan Preda (RO) Kérelmeztük, hogy az aggályos vádak alapján, törvénytelenül letartóztatott Ernest Vardanyan transznisztriai újságíró helyzetéről szóló vita helyett a thaiföldi helyzetről szóló vitát tűzzük napirendre, mivel az elmúlt napokban a thaiföldi helyzet jelentős mértékben romlott. Sürgetjük az összes képviselőcsoport képviselőit, hogy figyelmünket a thaiföldi helyzetre összpontosítsuk. Elnök Hallhattuk a kérelem indoklását. Ki akar felszólalni a kérelem mellett? Ioannis Kasoulides a PPE képviselőcsoport nevében. - Elnök úr, a thaiföldi helyzet óráról órára romlik, emberéletek forognak kockán; ezért ez sokkal fontosabb témának tűnik, és így helyénvalónak látszik, hogy csütörtökön ezt vitassuk meg a sürgősségi vitán. Ugyanakkor a szakadár Transznisztriában vannak bizonyos fejlemények Ernest Vardanyan úr ügyében, amelyeket a vita kezdeményezői szeretnének megvizsgálni. Ezért indítványozom, hogy e helyett a vita helyett most a Thaiföldről szóló vitát tűzzük napirendre. Francesco Enrico Speroni (IT) Elnök úr, hölgyeim és uraim, véleményem szerint akármiről vitázunk és döntünk is itt, az nem fog változtatni semmin sem Thaiföldön, sem Transznisztriában, ezért értelmetlen változtatni a napirenden. Elnök Az Ernest Vardanyan transznisztriai újságíró letartóztatásáról szóló vita helyett a thaiföldi helyzetről szóló vitát tűzzük napirendre. Csütörtök délután sürgős ügyeket vitatunk meg. Ezzel a plenáris ülés ügyrendjét megállapítottuk. (A Parlament egyetért a kérelemmel) (Az ügyrendet elfogadják)
{ "pile_set_name": "EuroParl" }
On January 5th, the best American car markets in 2012 for hybrid car sales were listed here on Panethos. Below are listed the worst car markets in the United States for hybrid car sales. For comparison, the national average in 2012 was 2.97%. It is quite interesting to note that 11 of the 14 markets listed below are in oil drilling regions of the country – that may hint where their priorities and preferences are centered. Tulsa, OK 0.58% Lafayette, LA 0.69% Midland-Odessa, TX 0.77% Lake Charles, LA 0.77% Glendive, MT 0.79% Bismarck-Minot, ND 0.79% Greenville-Greenwood, SC 0.80% Wheeling-Steubenville, WV/OH 0.94% Brownsville-Harlingen, TX 0.96% Corpus Christi, TX 0.97% Beaumont-Port Arthur, TX 0.97% Laredo, TX 1.01% Shreveport, LA 1.02% Baton Rouge, LA 1.04%
{ "pile_set_name": "OpenWebText2" }
NHTSA offers tips to keep kids safe An average of 17 school-age children die in school transportation-related crashes each year WASHINGTON— Fall is approaching, and with it comes shorter days and the start of the school year. Road travel increases and traffic patterns shift, so this busy time of year can also be a dangerous one—especially for children. Fewer daylight hours can make it harder for motorists to see young students. More schoolage pedestrians have been killed between the hours of 7 a.m. and 8 a.m. and between 3 p.m. and 4 p.m. than any other times of day. (NHTSA statistics, 2002-2011) Whether walking, riding a bicycle, or catching a school bus or public transportation to travel to and from school, the National Highway Traffic Safety Administration (NHTSA) is reminding parents and students of safe transportation practices to ensure that kids arrive to and from school safely. SCHOOL BUS—School buses are the safest mode of transportation for getting children back and forth to school. Even so, kids need to be especially careful around the school bus “danger zone”—10 feet in front, 10 feet behind, and on each side of the bus. Kids should: • Wait five giant steps from the road and when the school bus arrives, wait until the driver says to board. • When boarding the school bus, quickly find a seat, sit facing the front and do what the school bus driver says to do. • When exiting the bus, look out for cars. When off the bus, take 5 giant steps from the school bus. • Look left-right-left to make sure no cars are coming and wait for the driver to signal it's safe to cross. WALKING—Pedestrians 10 years old and younger should be accompanied by an adult or young adult on their way to and from school. Kids should: • Walk on the sidewalk and if there is none, walk facing traffic. • Not push or shove others when you walk. • When crossing the street, look left-right-left for cars. Do not cross if a car is coming and use a crosswalk if available. BIKING—The two best protections when biking to and from school are a properly fitted bicycle helmet and a good grasp of traffic safety rules. Kids should: • Always wear a helmet and make sure to buckle the chin strap. • Ride along streets with low traffic volume and at lower speeds. • Always ride in the same direction as traffic, and stop at all stop signs and signals. • Never use headphones or cell phones while riding. CAR—Children should always ride in the back seat. Children in the front seat are 40 percent more likely to be injured in crashes. One last tip: whether walking, biking or driving, stay completely focused on the road and put your cell phone away.
{ "pile_set_name": "Pile-CC" }
Configure trusted server configuration Use this policy to control how the client identifies the published application or desktop it is connecting to. The client will determine a trust level, called a "trust region" with a connection. The trust region will then determine how the client is configured for the connection. When this policy is enabled, the client can be forced to perform region identification using the "Enforce trusted server configuration" option. By default, region identification is based on the address of the server the client is connecting to. To be a member of the trusted region, the server must be a member of the Windows Trusted Sites zone. You can configure this using the "Windows Internet zone" setting. Alternatively, for compatibility with non-Windows clients, the server address can be specifically trusted using the "Address" setting. This is a comma-separated list of servers supporting the use of wildcards, for example, cps*.citrix.com. Troubleshooting: In the default configuration, when trusted server configuration prevents the client from connecting, the following error message is displayed: " ERROR: Cannot connect to the Citrix XenApp server. The server (xxx) is not trusted for ICA connections. Connections to the (Untrusted Region) Region are not allowed by lockdown settings. Please contact your administrator." The server identified in the "xxx" must be added to the Windows Trusted Sites zone (as either http:// or https:// for SSL connections) for the connection to succeed. Note that for SSL connections, the certificate common name must be trusted. For non-SSL connections all servers that are contacted must be individually trusted. This means that when using application browsing, both the XML service and the server this redirects to must be trusted. Supported on: ADMX Migrator encountered a policy that does not have a supportedOn value.
{ "pile_set_name": "Pile-CC" }
PROCURE TIMED PREGNANT RHESUS AND CYNOMOLGOS MONKEYS
{ "pile_set_name": "NIH ExPorter" }
Introducing...AmazeBox! Fresh Flowers & Gifts, Delivered, From £9.99 What is an AmazeBox? An AmazeBox is a customisable occasion-specific gift box with a fresh flower that fits through your letter box, from just £9.99 (including delivery). What's in your AmazeBox? Each AmazeBox includes as a minimum: an occasion-themed gift box with a high quality print finish; an occasion-themed greetings card containing your message; one main gift item (one of four colours of roses or five colours of tulips) and two treats, held in place in a specially designed presentation tray; and an occasion-themed display stand to hold the main gift and the greetings card once they've been taken out of the AmazeBox, all delivered through your letterbox by the Royal Mail from just £9.99. A number of the items can be upgraded and some optional items can be added to an AmazeBox. Personalising your AmazeBox There are a number of options that allow you to personalise your AmazeBox and make it a completely unique gift. The personalisable elements include: Box photo stickers: you can personalise the outside of your AmazeBox by adding a photo and short message that will be affixed to the "postage stamp" area at the front of the box and a larger photo that will be put onto the rear of the box Glossy photo: you can upload a photograph in checkout and we'll print it out on glossy paper and include it with your greetings card Video message: currently offline for an upgrade, our video message service will be available again in the spring and will allow you to record a message or share a favourite moment with the recipient by video Customer feedback Super efficient service that has always been spot on. I don't use any other company. Thank you Nancy G
{ "pile_set_name": "Pile-CC" }
[Clinical study: the effects of inhaling nitrous oxide for analgesia labor on pregnant women and fetus]. To investigate the effect of the inhalation of nitrous oxide premixed with oxygen (50%:50%) for analgesia labor on maternal and fetus. A total of 100 cases of pregnant women were provided with nitrous oxide premixed with oxygen (50%:50%) (control group); Another 100 cases were provided only with oxygen (comparison group). Recording duration of the Labor, way of delivery, bleeding volume, Apgars score, blood gas analysis to maternal radius artery and fetal umbilical blood among all patients. The effect for analgesia labor of the premixed gas was much better than that of control group, but there were no significant differences in time of labor, bleeding volume, Apgars score between the two groups. The inhalation of nitrous oxide premixed with oxygen (50%:50%) for analgesia labor benefits pregnant women because of keeping them being a good mental and physical condition. The inhalation of nitrous oxide for analgesia labor is a safe, effective and easy method.
{ "pile_set_name": "PubMed Abstracts" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.iceberg.io; import java.io.Serializable; import org.apache.iceberg.PartitionSpec; import org.apache.iceberg.StructLike; /** * Interface for providing data file locations to write tasks. * <p> * Implementations must be {@link Serializable} because instances will be serialized to tasks. */ public interface LocationProvider extends Serializable { /** * Return a fully-qualified data file location for the given filename. * * @param filename a file name * @return a fully-qualified location URI for a data file */ String newDataLocation(String filename); /** * Return a fully-qualified data file location for the given partition and filename. * * @param spec a partition spec * @param partitionData a tuple of partition data for data in the file, matching the given spec * @param filename a file name * @return a fully-qualified location URI for a data file */ String newDataLocation(PartitionSpec spec, StructLike partitionData, String filename); }
{ "pile_set_name": "Github" }
Phylogenetic analysis of the 16S rRNA gene of Anaplasma species detected from Japanese serows (Capricornis crispus). Nineteen blood samples collected from free-living Japanese serows, Capricornis crispus, between 2006 and 2008 in Iwate prefecture were examined for the anaplasma infection by PCR amplification of a part of the 16S rRNA gene. Ten (52.6%) out of the 19 samples produced a visible band in electrophoresed agarose gels. Positive PCR products were subjected to DNA sequencing. We found the nucleotide sequences were identical. Almost entire length of the 16S rRNA gene for a representative stain was then sequenced. We found the nucleotide sequence of the 16S rRNA gene distinct from previously established Anaplasma species in phylogenetic analysis. Our data first indicated that anaplasma infection occurred continuously among the free-living Japanese serow populations in northern Japan.
{ "pile_set_name": "PubMed Abstracts" }
var searchData= [ ['adjustfield',['adjustfield',['../classios__base.html#adaaf735381254aa096ebe3605e8bbd0a',1,'ios_base']]], ['app',['app',['../classios__base.html#a8380aac3c405730708888fdc68905820',1,'ios_base']]], ['arduinofiles_2eh',['ArduinoFiles.h',['../_arduino_files_8h.html',1,'']]], ['arduinoinstream',['ArduinoInStream',['../class_arduino_in_stream.html',1,'ArduinoInStream'],['../class_arduino_in_stream.html#a61ee22a5824849ec3261ee2f814dfb93',1,'ArduinoInStream::ArduinoInStream()']]], ['arduinooutstream',['ArduinoOutStream',['../class_arduino_out_stream.html',1,'ArduinoOutStream'],['../class_arduino_out_stream.html#a228b667f9f53dc91c6ed7735d34f04a8',1,'ArduinoOutStream::ArduinoOutStream()']]], ['arduinostream_2eh',['ArduinoStream.h',['../_arduino_stream_8h.html',1,'']]], ['ate',['ate',['../classios__base.html#aa434355c165500065276d955d8b36e99',1,'ios_base']]], ['attr',['attr',['../structlong_directory_entry.html#aa36bf1210d0c2b3b80948e5f697eb02e',1,'longDirectoryEntry']]], ['attributes',['attributes',['../structdirectory_entry.html#a16c6cde55c8175c90935c386f1cfb21a',1,'directoryEntry']]], ['available',['available',['../class_minimum_serial.html#a2abe4370989968938b5dc4872d51c3df',1,'MinimumSerial::available()'],['../class_print_file.html#a600592235b2bee6bdb3a9701d0d6eee3',1,'PrintFile::available()'],['../class_file.html#acf613c4e75bae85f543b30e701ebcc44',1,'File::available()'],['../class_fat_file.html#ac1fa779d98db7ffdb96f8019ab0060d6',1,'FatFile::available()']]], ['arduino_20_25sdfat_20library',['Arduino %SdFat Library',['../index.html',1,'']]] ];
{ "pile_set_name": "Github" }
WHEN Latin Americans contemplate Donald Trump many think they have seen his like before. Only a few years ago populist nationalists exercised voluble sway over the region’s politics, from Venezuela’s Hugo Chávez (pictured) to Cristina Fernández in Argentina and Rafael Correa in Ecuador. Now Chávez is dead, Venezuela is in crisis; Ms Fernández is out of power and faces corruption charges that may land her in jail; Mr Correa has opted not to run for a fourth term next year. Bolivia’s Evo Morales, who has populist tendencies, was defeated in a referendum this year that might have allowed him to remain in power until 2025. Even as populism is on the rise in Europe and the United States, it is in remission in Latin America. Why? Populist-nationalist strongmen have been a feature of the region’s politics since Argentina’s Juan Domingo Perón first came to power in the 1940s. Some have been nominally of the left, others of the right. All posed as saviours of “the people” and railed against “the oligarchy” or “imperialism”, in terms analogous to the political insurgencies of Mr Trump and Nigel Farage of Britain’s UK Independence Party against the “establishment”. They tended to ignore checks and balances on their rule, and to blur the distinction between leader, party, government and state. Their emergence owed much to Latin America’s extreme inequality of income and wealth, just as populism in the rich democracies has been stimulated by a rise in income inequality. In a region where labour unions were relatively weak, populism emerged as a route by which the swelling urban masses were brought into politics. To maintain their bond with “the people”, populists were often spendthrift. As inflation eroded wage increases, they did little or nothing to reduce income inequality in the long run. The resurgenceof populism in Latin America in the 2000s owed much to the economic stagnation and financial crises that hit the region in the late 1990s. Chávez and his ilk were extraordinarily fortunate to be in office just as the great commodity boom driven by China’s industrialisation took off. With plenty of revenues to distribute, they were popular. Now the money has run out. As China’s economy slows and rebalances towards consumption, Latin America is suffering its sixth successive year of economic deceleration. Because of the fiscal irresponsibility of their populist leaders, Venezuela, Argentina and Ecuador are all in recession. In several countries corruption has added to the desire for political change. After a long period of domination by the left, both populist and social democratic, in South America, the pendulum has swung back to the centre-right. New governments in Argentina, Brazil and Peru, for example, are keen on closer economic ties with the United States. For Latin America, the timing of Mr Trump’s victory could not be worse—at least if he implements his promise to retreat from trade agreements and impose protective tariffs. Populism has not disappeared altogether from Latin America. The chances of Andrés Manuel López Obrador, a veteran populist, in Mexico’s presidential election in 2018 may improve if Mr Trump tears up the North American Free Trade Agreement and builds his promised wall along the border. But in many countries populism is on the wane. Liberal democrats have a chance of keeping it that way, but only if they do the hard work of boosting productivity and competitiveness that is needed to restore faster economic growth and maintain social progress.
{ "pile_set_name": "OpenWebText2" }
Introduction ============ This issue of *Preventing Chronic Disease* addresses the challenges of mental health and mental illness in the public health setting. According to the World Health Organization (WHO), mental illnesses account for more collective disability burden in developed countries than any other group of illnesses, including cancer and heart disease ([@B1]). Disability occurs because of both the effect of mental illness on emotions, thoughts, and daily function, and the link between mental illness and general health, especially chronic diseases ([@B2]). The Institute of Medicine\'s (IOM\'s) Quality Chasm series outlines action steps to improve the quality of all health care, including care for mental health and substance use conditions ([@B2]). The IOM notes that failure to provide mental health care also occurs in the United States\' public health system: \"Despite evidence on risk factors associated with mental illnesses, or the risk factor that mental illness itself may pose to the development of chronic disease, effective public health interventions have not yet been adopted widely in practice\" ([@B2]). Definitions =========== Public health surveillance is \"the ongoing, systematic collection, analysis, interpretation, and dissemination of data regarding a health-related event for use in public health action to reduce morbidity and mortality and to improve health\" ([@B3]). Historically, surveillance focused on infectious disease, then broadened to other topics, including chronic diseases. Now mental health and mental illness are increasingly recognized as domains in public health surveillance. Mental health is a state of \"successful performance of mental function, resulting in productive activities, fulfilling relationships with other people, and the ability to adapt to change and to cope with adversity\" ([@B4]). In 2004, WHO published its first report on mental health promotion, conceptualizing mental health as not merely the absence of mental illness but the presence of \"a state of well-being in which the individual realizes his or her own abilities, can cope with the normal stresses of life, can work productively and fruitfully, and is able to make a contribution to his or her community\" ([@B1]). Mental illness has been defined as a separate concept. Mental disorders are characterized by \"alterations in thinking, mood, or behavior (or some combination thereof) associated with distress and/or impaired functioning\" ([@B4]). The remainder of our discussion is focused on mental illness. Impact of Mental Illness ======================== An estimated 26% of Americans aged 18 years or older report having a diagnosable mental disorder in a given year ([@B5]). The estimated lifetime prevalence of mental disorders among the US adult population is 29% for anxiety disorders, 25% for impulse-control disorders, 21% for mood disorders, 15% for substance use disorders, and 46% for any of these disorders ([@B6]). These disorders, especially depression, are among the leading global causes of life years lived with disability ([@B1]). The incidence, course, and outcomes of chronic disease are influenced by mental illness, and the efficacy of interventions for mental illness are affected by the presence of chronic disease. The evidence is extensive for associations between mental illness and medical illnesses such as cardiovascular disease, diabetes, obesity, asthma, epilepsy, and cancer ([@B7],[@B8]). The association between mental illness and chronic disease is especially apparent among people with more serious and disabling mental illness, who are at risk of dying 25 years prematurely from cardiovascular and other chronic diseases ([@B9]). Research suggests that this association exists not only because of higher rates of smoking and obesity or poor compliance with medical care, but also because of physiologic changes, including endothelial inflammation, platelet stickiness, and changes in the epinephrine-norepinephrine axis and in cortisol metabolism, as well as other metabolites mediated via central nervous system signaling ([@B10]). Recent Developments in Mental Illness Surveillance ================================================== Traditionally, mental health and public health surveillance have operated independent of each other. However, since the release of the first Surgeon General\'s report on mental health in 1999, government agencies have begun building the infrastructure for establishing an ongoing system for mental health surveillance. Mental health measures are now included in established health surveillance surveys such as the Centers for Disease Control and Prevention\'s (CDC\'s) National Health Interview Survey (NHIS), the National Health and Nutrition Examination Survey (NHANES), and the Behavioral Risk Factor Surveillance System (BRFSS); the Agency for Healthcare Research and Quality\'s Medical Expenditure Panel Survey; the Substance Abuse and Mental Health Services Administration\'s (SAMHSA\'s) National Survey on Drug Use and Health (NSDUH); and in the National Science Foundation\'s Panel Study of Income Dynamics ([Table](#T1){ref-type="table"}). Epidemiologic surveys of mental illness, first published by analyzing army recruits in 1942, have been expanded to national populations with the Epidemiologic Catchment Area Study of 1980-1985, the National Comorbidity Survey of 1990-1992, and the National Comorbidity Survey Replication (NCS-R) of 2001-2003 ([@B11]). The Collaborative Psychiatric Epidemiology Surveys (CPES) ([@B12]) were initiated because of the need for contemporary data about the distributions, social and cultural correlates, and risk factors of mental disorders among the general population and in minority groups. CPES joins together 3 nationally representative surveys: the NCS-R, the National Survey of American Life, and the National Latino and Asian American Study, using an approach that facilitates comparisons across surveys and permits core modules of surveys to be combined into a single data set for analysis. The CPES provides national-level data with sufficient power to investigate cultural and ethnic influences on mental and substance use disorders; mental health service use correlates of interest; and chronic medical conditions such as arthritis, asthma, hypertension, heart disease, headache, allergies, back and neck pain, chronic pain, and diabetes. The data have been used to track the prevalence of mental health conditions for the *Healthy People 2010* objectives and as benchmarks for rates of specific lifetime and previous 12-month mental disorders such as mood, anxiety, and impulse control disorders. Measuring the Relationships Between Mental Illnesses, Health Risks, and Chronic Diseases ======================================================================================== Understanding the relationship between mental illness and chronic disease is vital to public health assessment and health care delivery. The primary surveillance tool for assessing state-based estimates of health risk behaviors, chronic disease preventive services, and health care access is the BRFSS. The BRFSS is a random-digit--dialed survey of noninstitutionalized people aged 18 years or older, and systems are now in development for expanding its reach. These systems include call-back surveys, special population oversampling, and use of cell phone telephone numbers and paper surveys. BRFSS is unique in that it provides data at the state, county, and metropolitan and micropolitan statistical area levels. Starting in 2006, state health departments, in collaboration with CDC and the Center for Mental Health Services at SAMHSA, implemented mental illness questions on the BRFSS. From 2006 to 2009, mental health modules have been included in the BRFSS in many states. The Patient Health Questionnaire 8 (PHQ-8), which screens for depressive symptoms, was administered by 41 states and territories in 2006 and 16 states in 2008. The Kessler 6 (K-6) scale, which examines nonspecific psychological distress, was administered in 37 states and territories in 2007 and continues implementation in 2009. Integrated analysis of mental health and other health issues has shown significant associations between mental illness and health risk behaviors (eg, smoking, obesity, physical inactivity), chronic disease (eg, arthritis, diabetes, cardiovascular disease, asthma), and lower levels of preventive care. The BRFSS is among the first surveillance systems that allow population-based state and local estimates for mental and physical health, which are critical for policy and programs at the state and community levels. Progress has been made with regard to the inclusion of health topics in mental health surveillance at the state level (eg, inclusion of selected BRFSS health questions in the Mental Health Statistics Improvement Program consumer satisfaction survey in several states). This improved surveillance indicates that people with serious mental illness (SMI), defined as having a DSM-IV (*Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition*) mental disorder that resulted in functional impairment, who also have poor physical health, are more likely to have poor functional outcomes and lower levels of satisfaction with their mental health care ([@B13]). States can now also analyze their Medicaid services data to examine the effect of co-occurring mental illness, substance use disorders, and chronic medical conditions on utilization and outcomes for chronic disease and behavioral disorders. Data and instrumentation from the resources listed in the Table are available online for secondary analysis or public use. With the exception of the current (2007 and beyond) NHANES, each of the survey instruments listed contains the K-6 nonspecific psychological distress scale, which is also included in the CPES benchmark studies. This \"common currency\" approach to instrumentation facilitates general comparisons among studies; however, variations among survey instruments and methods must be considered when interpreting data from different sources. Variations Among Surveys ======================== The ways different surveys define and measure mental illnesses often vary. One approach uses interview protocols that ask various symptom, duration, and frequency questions for specific mental disorders, on the basis of classification systems such as the DSM or the International Classification of Diseases (ICD) systems. For example, depression may be measured by using the WHO Composite International Diagnostic Interview (CIDI) depression module, an instrument designed for use in general population surveys, or the PHQ, an instrument designed for use in clinical settings but also used in some health surveys. The WHO CIDI approach provides considerable detail at the national level about specific disorders but requires extensive resources to complete. The PHQ-2, PHQ-8, and PHQ-9, validated measures for depressive symptoms in wide use in clinical care, are sufficiently brief to be included in population-based surveys and public health awareness campaigns. Another approach is to use different mental health measures to assess \"any mental disorder\" (as opposed to a specific disorder) by using nonspecific measures of psychological function. These brief scales, commonly found in large, population-based surveys, can be used to identify subpopulations with a high likelihood of having any mental illness. For example, the K-6 scale was originally developed for use in the NHIS as a measure of nonspecific psychological distress (a proxy for poor mental health) during the past 30 days. SAMHSA then supported a pilot study to determine whether a version of the K-6 that assessed distress in the past year could identify SMI cases in the general population ([@B14]). In 2008, SAMHSA added impairment and suicide-assessment scales to the NSDUH mental health module and launched a full-scale study to calibrate it to a clinical (psychiatric) evaluation in a nationally representative sample. Results from this study will be used to estimate the prevalence of SMI at the state and national levels. Another distinction is the reference period, which differs among data collection systems. Serious psychological distress, which is defined as having a K-6 score of 13 or higher during 1 month in the past 12 months, is determined in the NSDUH with the use of a past-year reference period and past-30-day reference period (since 2008). NHIS and BRFSS use a past-30-day reference period only. Different reference periods (current, past year, lifetime) are also found in disorder-specific measures (such as depression), depending on the purpose of the study. The reference period used has a substantial effect on the prevalence rate yielded, not only because the estimates may be subject to recall bias but also because longer reference periods may result in a larger number of affirmative responses. Other approaches to assessing mental illness have depended on the presence of functional impairments and still others on whether there is a history of treatment. Surveys vary as to the inclusion or exclusion of substance use disorders and cognitive disturbances, such as dementia, under a broader umbrella of mental disorders. These variations in mental illness definitions have provided data on overlapping but nonidentical populations. Another issue in mental health surveillance is whether specific or nonspecific disorders and associated impairments are measured continuously or dichotomously. Dichotomous measures indicate whether a specific threshold or cutpoint was reached. In contrast, using a continuous measure may allow mild, moderate, and severe levels of disorder to be identified. Studies have shown that untreated minor depression or residual subthreshold depressive symptoms after treatment are often associated with disability and poor psychosocial functioning and a potentially more severe, relapsing, and chronic course that requires additional treatment ([@B15]). The method of data collection may also affect comparability. For example, while most data are collected via computer-assisted interviews, some surveys are self-administered (eg, NSDUH, parts of NHANES are read to respondents via audio-computer technology), and others are administered by an interviewer in the home or on the telephone. These differences affect survey responses, particularly for mental health questions and sensitive items such as illegal or embarrassing behavior ([@B16]). Future Directions ================= We have focused on existing efforts in mental illness surveillance but recognize the value of monitoring the prevalence and correlates associated with psychological well-being, as discussed by Manderscheid et al in this issue ([@B17]). Future public health surveillance systems should incorporate measures of positive psychological function as both a protective factor against poor health outcomes and a mental health indicator of interest in its own right. Surveillance efforts can be more meaningfully linked to state and local health policy and program development efforts. Ongoing, multiyear inclusion of mental health modules in state and local level surveys may permit state epidemiologists to monitor the effects of community health partner efforts. We must also develop culturally meaningful surveillance of mental health and mental illness in specific populations, such as ethnic minorities, veterans, parents, caregivers, and people who are disabled. A lifespan approach to mental health and mental illness will facilitate a better understanding of the natural course of mental illness and its effect on overall health. Most surveys focus on adults and include few measures of child health. Studies of mental health and mental illness in younger populations are relevant to the development of prevention strategies applied at the earlier stages of development. Evidence-based care is the gold standard for health care providers, but we lack a systematic approach to monitor effectiveness of treatment for mental disorders. Data on medications, unmet needs for mental health services, and outcomes such as employment, housing stability, and consumer satisfaction are available ([@B18],[@B19]). However, these measures leave gaps in our understanding of the effect of specific types of treatment in different populations or the relevance of factors such as duration, location, or type of provider. The role of nonprofessional support systems, such as community, spiritual, family, or peer networks, is not fully explored. Effectiveness of treatment has often been measured as if people only have a single mental illness; however, people with these illnesses often have complex comorbidities, including substance abuse, cognitive impairments, and chronic medical conditions. These dimensions should be addressed as well in evaluating efficacy of treatment systems. Knowledge dissemination is a critical aspect of surveillance, but natural lines of communication in public health and in mental health have generally been separate; information has typically been disseminated from CDC to state and local public health infrastructure and health care providers, and from SAMHSA to state mental health authorities, mental health advocacy organizations, and mental health providers. Systems should be developed so information from an integrated mental health and physical health surveillance system can be directed broadly to specialty mental health and substance abuse providers, public health systems, community health providers, and community health promotion programs. Conclusion ========== In the past decade we have moved from a tradition of separate mental health and public health surveillance efforts to an increasingly integrated approach. Agencies in the US Department of Health and Human Services are collaborating to create new systems and expand existing ones. These systems monitor mental illness by incorporating common mental health measures in ongoing federal surveys, conducting large psychiatric epidemiology benchmark surveys, and facilitating health risk factor surveillance surveys that include mental health variables at the state and local levels. Substantive elements of a mental health surveillance system exist today, although there is work to be done to make an integrated approach standard practice. Surveillance has focused largely on established disease or symptoms, but collection of additional data on resilience, coping skills, protective factors, and aspects of positive mental health are considerations in devising strategies for disease prevention and mental health promotion. Maintaining focus on the overall health of our population will be critical in the next decades, as will leaving behind the commonly accepted divide between mental and physical illnesses, \"despite the fact that both exist within individuals in an exquisitely integrated fashion\" ([@B20]). An optimal surveillance system will examine interactions among biological, social, psychological, and environmental factors to support health promotion, intervention programs, and both mental illness and chronic disease prevention. The opinions expressed by authors contributing to this journal do not necessarily reflect the opinions of the US Department of Health and Human Services, the Public Health Service, the Centers for Disease Control and Prevention, or the authors' affiliated institutions. Use of trade names is for identification only and does not imply endorsement by any of the groups named above. URLs for nonfederal organizations are provided solely as a service to our users. URLs do not constitute an endorsement of any organization by CDC or the federal government, and none should be inferred. CDC is not responsible for the content of Web pages found at these URLs. *Suggested citation for this article:* Freeman EJ, Colpe LJ, Strine TW, Dhingra S, McGuire LC, Elam-Evans LD, et al. Public health surveillance for mental health. Prev Chronic Dis 2010;7(1). <http://www.cdc.gov/pcd/issues/2010/jan/09_0126.htm>. Accessed \[*date*\]. ###### United States Surveys That Contain Publicly Available Mental Health Data, 2009 **Survey Type** Year Representation Age Range Sample Size Link -------------------------------------------------------------------- ------------------------ -------------------- ----------- ------------------------------ -------------------------------------------------------------------------------------------- **Psychiatric epidemiology studies** National Comorbidity Survey Replication 2001-2003 National ≥18 y 9,282 [www.hcp.med.harvard.edu/ncs/](www.hcp.med.harvard.edu/ncs/) National Survey of American Life (black Americans) 2001-2003 National ≥18 y 6,199 [www.icpsr.umich.edu/CPES/](www.icpsr.umich.edu/CPES/) National Latino and Asian American Study 2001-2003 National ≥18 y 4,864 [www.multiculturalmentalhealth.org/nlaas.asp](www.multiculturalmentalhealth.org/nlaas.asp) **Ongoing health surveys containing mental health questionnaires** Behavioral Risk Factor Surveillance System Ongoing State ≥18 y 430,000/y [www.cdc.gov/BRFSS/](www.cdc.gov/BRFSS/) National Survey on Drug Use and Health Ongoing National and state ≥12 y 67,000/y <http://oas.samhsa.gov/nsduh.htm> National Health Interview Survey Ongoing National ≥18 y 24,000/y [www.cdc.gov/nchs/nhis.htm](www.cdc.gov/nchs/nhis.htm) National Health and Nutrition Examination Survey Ongoing National ≥12 y 5,000/y [www.cdc.gov/nchs/nhanes.htm](www.cdc.gov/nchs/nhanes.htm) Medical Expenditure Panel Survey Ongoing National All ages 32,000/y [www.meps.ahrq.gov/mepsweb/](www.meps.ahrq.gov/mepsweb/) Panel Study of Income Dynamics Ongoing (longitudinal) National All ages 7,000 families (total panel) <http://psidonline.isr.umich.edu/Guide/>
{ "pile_set_name": "PubMed Central" }
An entire month ago there was an article about VideoGamer.com – a subsidiary of Candy Banana – having affiliate links in their articles without disclosure. It was published on April 30th, 2016. When originally asked about affiliate links, I was informed that Candy Banana were working on something but nothing concrete had been done about it at the time. Well, things are changing and the site will soon add an affiliate blurb in each article that contains an affiliate link. In the original piece Candy Banana’s director, Adam McCann, had revealed that they had plans on addressing the affiliate links used in their articles and on Twitter. A month later, McCann informed me by e-mail on May 31st, 2016 that VideoGamer will add disclosures to content containing the links in future articles. This time McCann came bearing gifts in the form of an example. McCann linked to the legal notices page on VideoGamer.com, and informed me that there will be a blurb added to articles with affiliate links, similar to the following… “We sometimes post links to online retailers (like Amazon) on VideoGamer.com and the site’s social media channels such as Twitter. We receive a small commission from any purchases made via these links. These links do not influence editorial decisions or review scores in any way.” According to McCann, the company had other pressing matters that they were tending to, hence why the addition of disclosures blurb regarding affiliate links was waylaid. However, they did note that disclosures for affiliate links would be coming soon and would be using a blurb similar to the one above. This comes shortly after a campaign was put together on Kotaku in Action back on May 23rd, 2016 where the denizens of the sub-Reddit became active in contacting the advertising association of the U.K. — appropriately known as the Advertising Standards Association — to inform them about VideoGamer.com’s lack of disclosure. For those of you who don’t know, it’s mandatory for websites, digital media outlets and even print publications to disclose if they are financially endorsed, promoted, or sponsored by a product, individual or service where where monetary funds exchange hands. Clear and concise disclosure whether in the U.K., the rest of Europe or the United States is required by most organizations that regulate advertising standards within the media industry. The campaign is one of many that have been launched over the past two years from various sub-communities that spawned in the wake of #GamerGate, as a way to maintain a watchful eye on the video game journalism ring, and ensure that the sites maintain proper orientation within their ethical compass. We’ll keep you posted on when the disclosure blurbs will be rolled out on the VideoGamer.com articles.
{ "pile_set_name": "OpenWebText2" }
It’s futile to judge a book by its market performance but leaving that aside for now, let’s examine a market case for Books Without Borders. If you don’t recognize the term it’s a reference to Publica’s use of cryptographic blockchain technology because I often say “blockchains don’t know what country they’re in.” In short, Books Without Borders. I mentioned the FAANG before and they exploit markets territorially. (Facebook, Amazon, Apple, Netflix, Google.) They build operations tailor-made to specific nations and geographies, often more separated from their home nations’ operations and policies than you’ve probably felt any reason to look into. Major differences. An author or publisher who puts up a book on a FAANG or FAANG-like platform has no advantage in the territories they specialize for. Books are a commodity next to every other book (millions!). They can either advertise (spend money), or patiently build trust (a platform of email list, website comments, blog, chat/tweet etc.). If you’re an author then this gets personal. When you offer your books beyond the FAANG’s platforms, you gain market advantages. You can apply first-mover advantage and establish your beachhead before they arrive with their commodity books so your books will be immune forever to their commodity machinations. You can establish your name as the one and only at what you do. You’ll be noticed if only because you stepped out from the herd. Caring and thoughtful readers around the world know about the FAANG and your book will be all the more interesting to them because you made it available beyond whichever borders the FAANG likes. The real people who really buy books will recognize the respect that you’re showing them. Nevermind the robots. That’s only talking about the markets of readers who you don’t know because you never met them on a FAANG platform. What about the readers you do know? Do some of them live beyond easy reach of the platform that was easiest for you? Shouldn’t you cultivate them all the more? Photo by Nicola Nuttall on Unsplash And whatever you think, please don’t make the mistake of thinking there’s only a viable book market in “developed countries.” That’s totally false, and frankly, emotionally offensive even if you didn’t know. You don’t have to take my word for it, there’s science and math and a courageous writer who won Bill Gates’ respect, here’s his video review. The book “Factfulness” by Hans Rosling and Anna Rosling Ronnlund shows the world in an up-to-date and more truthful way. I hope it’ll add an inspirational dimension when I encourage you to think of marketing your own Books Without Borders. P.S. Molly Flatt of The Book Seller Molly posted something in between when I wrote this and when you’re seeing it in my blog. We know each other but we didn’t know we were thinking about related topics at this time although I suppose that shouldn’t surprise. While reading hers, think of mine occasionally especially when she talks about communities. The BookSeller is U.K.-centric but don’t let that stop you from thinking about Books Without Borders. https://www.thebookseller.com/futurebook/death-influencer-841671
{ "pile_set_name": "OpenWebText2" }
Chemokines are critical for directing the traffic and organization of immune cells. We and others have shown that T cells migrate within lymphoid organs at high speeds. Under certain conditions, when migrating T cells encounter foreign antigen they form long-lived static conjugates with the antigen-presenting cell (APC), while at other times T cells detect foreign antigen but continue to migrate nonetheless. Understanding the determinants of these distinct phenotypes and their immunological consequences is critical for understanding the basic principles of the in vivo immune response. We have previously shown that some chemokines deliver dominant signals that directed T cells to continue migrating past antigen-bearing APCs, while other chemokines deliver subordinant signals that permit long-term conjugate formation. 2 such chemokines are SLC (CCL21, dominant) and SDF-1a (CXCL12, subordinate), recognized by their respective receptors on T cells, CCR7 and CXCR4. Here we propose to design chimeric receptors bearing the ligand-specificity 1 of a dominant receptor and the intracellular signaling response of a subordinate receptor. Because chemokine receptors are 7-transmembrane G-protein coupled receptors, their extracellular, transmembrane and intracellular structures are tightly coupled. In order to discover chimeras with functional ligand binding and appropriate intracellular signaling properties, we propose to generate a combinatorial library of receptor chimeras where all extracellular loops belong to 1 receptor, all intracellular loops belong to the other, and the transmembrane domains are varied between the 2. In Aim 1 we will design and produce the transmembrane-shuffled CCR7/CXCR4 and CCR7/CCR5 libraries by a gene-synthesis approach. In Aims 2 & 3 we will screen this library for desired chemotactic dominant/subordinate behavior. In Aim 4 we will use this data to derive general principles for chemokine receptor transmembrane signaling and test these principles by rational design of a novel chimera between CXCR3 and CCR5. By elucidating the hierarchies of immunological "Stop" and "Go" signals we will reveal basic principles governing immune function that will be relevant to understand how tumors, viruses, and other microbes can sometimes evade immune clearance, and how immunity becomes dysregulated in autoimmune diseases. [unreadable] [unreadable] [unreadable]
{ "pile_set_name": "NIH ExPorter" }
Military Dating at MilitaryFriends.com Unique Features Thanks, Military Friends!!! You have allowed me to meet the love of my life!!! We are happily ... MilitaryFriends.com is the first and best military dating site to provide military dating service for military singles and admirers in the world! We bring together single members of the Army, Navy, Marines, Air Force, Coast Guard, Police Force, and Firefighters -- as well as civilians, veterans. Unlike other sites, members here start out with something in common, love for military people or military related. The common interest will help make dating easier and more effective. Over the years, MilitaryFriends has experienced tremendous success in bringing military singles and their admirers together. Many single military members and military admirers met each other here. Totally Free to Place Profile and connect with hundreds of thousands of military singles and admirers! (We have been in the online dating business for over 14 years!)
{ "pile_set_name": "Pile-CC" }
The Pirates downed the Rockies in 14 innings on Friday thanks to a game-winning double off the bat of Jose Tabata. But the real hero of the game was manager Clint Hurdle, whose strategic decision to send Andrew McCutchen to the on-deck circle as opposed to relief pitcher Garrett Olson likely confused Jim Tracy into pitching to Tabata in the first place. The Pirates bench was empty and, due to a double-switch made earlier in the game, the pitcher’s spot was due up second in the order, behind Tabata and before McCutchen. After Franklin Morales walked Josh Rodriguez with two outs in the 14th frame of a game knotted at three runs each, Tabata stepped into the batters box. Knowing that the next scheduled hitter was a reliever, and that the Pirates’ only other pinch-hit options were pitchers, the safe course of action is to walk Tabata. This puts runners at first and second, but with a vastly inferior hitter at the dish. The situation cannot be effectively measured by WPA without incorporating the strength of the batter. The Pirates might appear to have more of a chance to win the game with runners at first and second as opposed to just having first base occupied, but the difference is likely offset by the gap in productivity at the plate between Tabata and Olson. It’s interesting to ponder: does Tabata up with a runner on first give you a better shot at winning than a reliever up with first and second? I vote yes without hesitation, meaning Tracy’s decision should have been clear. But Hurdle effectively removed this course of action from Tracy’s consideration, opting to create the illusion that the dangerous McCutchen was due up after Tabata. If McCutchen actually was due up, then pitching to Tabata makes sense. In other words, Jim Tracy made the right decision to pitch to Tabata given what he thought were the circumstances. But there was a stark contrast between that and the actuality of the situation, which proved to be costly. After the game, both managers tried to justify their respective rationales. Hurdle denied he tried to deke the opposition, justifying his decision based on McCutchen’s experience over Olson’s with aiding runners rounding third. Tracy explained why pitching to Tabata made sense: the hot hitter would still need an extra base hit to win the game. Further, he “reasoned” that walking Tabata would put Rodriguez in scoring position, where he could score easily on a bloop hit. Had both of these managers taken their truth serums before being interviewed, Hurdle would have laughed while remarking how he got away with a fast one. Tracy would have awkwardly admitted he did not know the situation. There are two main discussion points here. First, was Hurdle’s maneuver legal? Second, why wouldn’t the managers know the game situation? Perusing the major league rulebook, and the section specific to batters, I found absolutely nothing to suggest that Hurdle stepped out of his legal realm. In fact, the word “deck” only appears in the rulebook twice: to define a save situation, and to indicate that an on-deck batter shall enter the batters box in a timely fashion. Managers strategically use the on-deck circle from time to time to try and prevent an intentional walk, or to prevent the opposition from making an optimal pitching change. In those situations, however, the team merely shuffles through available bench bats who could legally bat following the current hitter. What sets this situation apart from the rest is how McCutchen was actually in the lineup, and how his presence in the on-deck circle might be considered a form of batting out of order. But it’s not. A rule would only have been broken if Tabata reached base and the Pirates tried to extend their deke by actually sending McCutchen to the plate. As for how Tracy could have fallen for such a tactic, well, these things happen. As embarrassing as it may be afterward, I would feel much more comfortable as a Rockies fan knowing he fell for the maneuver as opposed to truly believing that pitching to Tabata was the right decision with the knowledge that a relief pitcher was due up next. What is infuriating from a fan’s perspective is that managers are paid primarily to know the situation at all times and to make decisions accordingly. Hurdle took a chance on Friday, and succeeded because he understood his job duties more than his counterpart.
{ "pile_set_name": "OpenWebText2" }
Q: Keypress in javascript in IE I have a Flex application. It running in a player on the HTML-page. I need catch the key press events and prevent IE browser from acting like it wants. Here's some code: Actually, the part where player was layed .. <html> <head> </head> <body scroll="no" onkeydown=keypress(event)> <noscript> <object id="app" width="100%" height="100%" onkeydown="keypress(event)" onkeypress="keypress(event)"> //some params </object> </noscript> </body> </html> And here's the one, where I'm trying in a different ways to catch key input: <script language="JavaScript" type="text/javascript"> function keypress(e) { alert("Hello from keypress"); } function init() { //index alert("Init!!!"); document.getElementById('app').onkeydown = function() { alert("Key Pressed - 1"); }; document.onkeydown = function() { alert("Key Pressed - 2"); }; document.getElementById('app').onkeypress = function() { alert("Key Pressed - 3") }; document.onkeypress = function() { alert("Key Pressed - 4") }; window.onkeydown = function() { alert("Key Pressed - 5"); }; window.onkeypress = function() { alert("Key Pressed - 6"); }; document.body.onkeypress = function() { alert("Key Pressed - 7") }; document.body.onkeydown = function() { alert("Key Pressed - 8") }; if (window.addEventListener) { window.addEventListener('keypress', keypress, false); } else if (window.attachEvent) { window.attachEvent('onkeypress', keypress); } else { window.onkeypress = keypress; } } window.onload = init; document.onload = init; </script> I wasn't going to use them all together, just gathered them all to show you that I've tried almost everything (also including all this with 1 parameter). The problem is that the only Alert I'm getting is "Init!!!". What's wrong with it or what I'm doing wrong? Any help would be greatly appreciated. Edit: I get the "Init" message before the player loads it's content .. maybe the problem is somewhere there? A: In Internet Explorer, events that occur within an embedded control in the <object> element do not fire equivalent events on the DOM object. They are consumed by the embedded control, and it is that control's responsibility to handle them accordingly. This means, when your embedded Flex application is focussed, your JavaScript code will not be able to handle any key events.
{ "pile_set_name": "StackExchange" }
export PATH=/adt32/ant/bin:$PATH export JAVA_HOME=/Program Files/Java/jdk1.8.0_151 cd /eclipse/demos/GUI/AppContactManagerDemo2/ ant clean release
{ "pile_set_name": "Github" }
1. Field of the Invention The present invention relates to a backup power-supply system. More particularly, it relates to a backup power-supply system for an emergency that applies power to a data processing system so as to recover the information in it when a power supply is cut off or a power-supply connector is abruptly removed due to a careless user, so as to prevent damage to the information the user is working on. 2. Description of the Related Art In a large-sized data processing system, an uninterrupted power supply is employed to apply power continuously to the system for a predetermined period of time after the power supply has been abruptly cut off to prevent damage to the information the user is working on. Korean Patent Publication No. 93-432 (published on Jan. 21, 1993) entitled "An Uninterrupted Power Supply (UPS) System and a Method for Supplying Power" discloses a technique for such an uninterrupted power supply. However, at present, it is not easy to apply the above UPS to a small-sized data processing systems such as personal computers due to its cost and size.
{ "pile_set_name": "USPTO Backgrounds" }
[Association of FOXE1 gene polymorphism with idiopathic premature ovarian failure]. To assess the influence of length of the alanine tract of forkhead box E1 (FOXE1) gene on genetic susceptibility to idiopathic premature ovarian failure (POF). Totally 110 patients with idiopathic POF were recruited between February 2009 and December 2012 at the Affiliated Shenzhen City Maternity and Child Healthcare Hospital of Southern Medical University. Controls (n = 110) were individuals with normal menstrual cycles, normal FSH concentrations. The polyalanine tract and flanking sequence of FOXE1 were screened using the multiplex ligation-dependent probe amplification (MLPA) technique and direct sequence technique. The most frequent of FOXE1 polyalanine stretch length was 14 residues in both groups. The length of FOXE1 polyalanine reported in this study varied from 12 to 16 alanines, and three variants of FOXE1-polyalanine length, containing 12, 14, or 16 alanine residues, and 5 different genotypes were identified. The most common genotypes were 14/14 homozygote, occurring with the frequency of 81.8% (90/110) in the POF group, while 96.4% (106/110) in control subjects, respectively. The incidence of 14/14 genotypes of FOXE1-polyalanine was significantly lower in patients with POF (χ² = 119.730, P = 0.001) in comparison to the controls. There were significantly higher frequencies of the 16/16 genotypes in cases with POF [10.0% (11/110) versus 0; χ² = 3.403, P = 0.001], as compared with the controls. The FOXE1 14 alanine allele was significantly less common in the POF patient group than the controls [84.5% (186/220) versus 98.2% (216/220); χ² = 25.923, P = 0.001]. The FOXE1 16 alanine allele was significantly more common in the POF patient group than the controls [12.7% (28/220) versus 1.8% (4/220); χ² = 19.412, P = 0.001]. The polymorphism of the polyalanine tract of FOXE1 gene have a certain relevance for the genetic aetiology of idiopathic POF.
{ "pile_set_name": "PubMed Abstracts" }
I'm so full it hurts to eat Food is so good I can't stop eating 125 shares
{ "pile_set_name": "OpenWebText2" }
Behaviorally conditioned suppression of mitogen-induced proliferation and immunoglobulin production: effect of time span between conditioning and reexposure to the conditioning stimulus. Rats were subjected to taste aversion conditioning using the immunosuppressive drug cyclophosphamide (CY) as the unconditioned stimulus (UCS) paired with saccharin, the conditioned stimulus (CS), and were reexposed to the CS at 2, 5, or 10 days after a single conditioning trial. Twenty-four hours after reexposure the rats were sacrificed and spleen cells assayed for mitogen-induced proliferation and immunoglobulin production. A robust conditioned taste aversion (CTA) was observed irrespective of the day of CS reexposure. However, only conditioned rats reexposed to the CS 2 days after training displayed a conditioned reduction in proliferative responses to PHA and PWM. These rats also exhibited a reduction in the synthesis of IgM, but not IgG or IgA, by spleen cells cultured with PWM. These effects were not observed in conditioned rats reexposed 5 or 10 days after conditioning. In another experiment, rats were subjected to a backward conditioning (UCS prior to CS) training trial, tested 2 days later for the presence of CTA, and sacrificed 24 h later for assessment of immune function as described above. The results of this experiment demonstrated that rats do not develop an aversion to saccharin when it is first presented 4 h after CY, and no alterations in spleen cell proliferation and immunoglobulin production were noted. The data show that the CTA response established by explicit association between CY and saccharin depresses in vitro spleen cell proliferation and IgM production only when elicited shortly after the conditioning trial.
{ "pile_set_name": "PubMed Abstracts" }
Q: Does List.AddRange call List.Add? I have a custom class derived from List with an Add method that adds only if a certain condition is satisfied. Do I also need to override* AddRange, or does AddRange simply call Add on each element of the given range? *: Yes, new is hiding and not overriding in the context of C#. A: If you want to create custom collection. Don't derive it from List<T> but from Collection<T> or directly implement IList<T> or ICollection<T>. Indeed, the Add method in the List<T> class is not virtual. Note: List<T>.AddRange uses Array.Copy. UPDATE When inheriting Collection you just have to override 2 methods! public class MyCollection : Collection<string> { private bool IsValidItem(string item) { return; // Your condition : true if valid; false, otherwise. } // This method will be called when you call MyCollection.Add or MyCollection.Insert protected override void InsertItem(int index, string item) { if(IsValidItem(item)) base.InsertItem(index, item); } // This method will be called when you call MyCollection[index] = newItem protected override void SetItem(int index, string item) { if(IsValidItem(item)) base.SetItem(index, item); } } If your items to validate are not string replace string in the code above by the correct type. A: Don't use hiding that changes the semantics of the method. That's really bad design. Create a new class that implements IList<T>. The easiest way to do that is inheriting from Collection<T>. Collection<T> implements IList<T> and has four extension points in the form of protected virtual methods: InsertItem SetItem RemoveItem ClearItems Since you only needs to validate items that get added and not those that get removed, you only need to override InsertItem and SetItem. class MyCollection:Collection<T> { private void ValidateItem(T item) { if(item is invalid) throw new ArgumentException("Item is invalid"); } protected override InsertItem(int index, T item) { ValidateItem(item); base.InsertItem(index, item); } protected override SetItem(int index, T item) { ValidateItem(item); base.SetItem(index, item); } }
{ "pile_set_name": "StackExchange" }
Bivalent Vaccine Effectiveness Against Anal Human Papillomavirus Positivity Among Female Sexually Transmitted Infection Clinic Visitors in the Netherlands. Human papillomavirus (HPV) vaccines are indicated for anal cancer prevention, but evidence for vaccine effectiveness (VE) against anal HPV infections among women is limited. We estimated the VE (≥1 dose) against anal HPV positivity of the bivalent vaccine, whose target types HPV-16/18 are associated with approximately 90% of HPV-related anal cancers. Among 548 female STI clinic visitors 16-24 years old who provided an anal swab sample as part of a repeated cross-sectional survey, VE against HPV-16/18 was 89.9% (95% confidence interval, 63.0%-97.2%). Type-specific VE correlated well with VE against cervicovaginal HPV (Spearman ρ = 0.76), suggesting comparable effectiveness of HPV-16/18 vaccination against genital and anal infections.
{ "pile_set_name": "PubMed Abstracts" }
[A study on the medical care of the royal family in the Chosun period in 1898 - as recorded in the Taeuiwon Ilgi]. Taeuiwon was in charge of the medical care of the royal family in the Chosun period of 1898. The Taeuiwon Ilgi is the document which was recorded by Taeuiwon officials. In this study, the authors studied the contents of Taeuiwon Ilgi of 1898 in order to understand the medical care of the royal family of the Chosun Kingdom. In 1898, Taeuiwon took some careful measures to take good care of the royal family. Taeuiwon physicians made regular inquiry about their health through the format called Moonan. The Moonan was to check out the health conditions of them. When Taeuiwon carried out Moonan, Emperor Kojong was asked to take a medical examination called Ipjin by the court physicians of Taeuiwon, even if he were in good condition. Taeuiwon physicians also regularly prescribed Insamsokmium when the royal family performed the religious service or went into mourning. Insamsokmium is a kind of restorative food containing ginseng. From the above, we conclude that Taeuiwon provided the preventative care to them. It was considered the proper way to such kind of high personage in that period.
{ "pile_set_name": "PubMed Abstracts" }
Lecture : 5 min. Auteur(s) : Tags : Sorry for the pun 😅 In March, I got the chance to share my knowledge about Elasticsearch and PHP with hundreds of developers at Symfony Live Paris. While building this talk, I tried to make sense of all the PHP implementations I came across, either while auditing third party applications or building from scratch for our clients. In this article, I would like to introduce Elastically, a thin wrapper on top of Elastica we use to bootstrap our Elasticsearch implementations. Building PHP and Elasticsearch application When a project needs Elasticsearch, most of the time we build our own indexing and search components on top of Elastica. This library is really convenient as it exposes every Query DSL clause and API endpoint as PHP classes, and is very well maintained. Our experience also made us consider some good practices that we impose on ourselves from now on. Do not tie mapping and document together The JSON document you send to Elasticsearch and the actual Mapping – the fields in Lucene – should not be correlated. The JSON document should contain: the data needed for search; the data needed for the view, the manipulation, etc. But the Mapping only needs one: the data needed for search. As an example, if you index a product: {"name": "WashWash 3000", "picture": "https://cdn.example.com/toothpaste-cropped.jpg"} You need the picture for display obviously, so it makes sense to have it in JSON. But you should not index this field, because you are never going to search product by picture ! And guess what, by default Elasticsearch will index this data. So firstly, you should not use the dynamic mapping as it’s a very good way to compromise data and store useless data in Lucene. Secondly, your Mapping should only consist of one field, the name . So it has to be explicitly written, and is not the same as the data structure. In Elastically, this is the default behavior. Use YAML instead of JSON or array for configuration Elasticsearch Mappings are JSON formatted – but as humans, writing JSON is just a massive pain. { "settings": { "number_of_replicas": 1, "number_of_shards": 3, "analysis": {}, "refresh_interval": "1s" }, "mappings": { "properties": { "title": { "type": "text", "analyzer": "english" } } } } In Elastica, we can setup index mapping as an Array. PHP Array are verbose and not that much easier to write and maintain: [ 'settings' => [ 'number_of_replicas' => 1, 'number_of_shards' => 3, 'analysis' => [], 'refresh_interval' => '1s', ], 'mappings' => [ 'properties' => [ 'title' => [ 'type' => 'text', 'analyzer' => 'english', ], ], ], ]; So what we do now is always use YAML. This format has some downsides but also lots of perks: comments; anchor and merge (article in French) to reuse parts of the configuration in multiple places; support in IDE… settings: number_of_replicas: 1 number_of_shards: 3 analysis: {} refresh_interval: 1s mappings: properties: title: type: text analyzer: english In Elastically, the use of YAML is forced. Use DTO: Data Transfer Object On top of Elastica, we add some logic to write and read DTO in Elasticsearch, instead of plain old array. The advantages are: The code is easier to read and manipulate; It’s closer to what we already do with Doctrine ODM; Interoperability with other storage is easier to manage; Data is always consistent and we can pass the DTO as type-hinted arguments, there is no need to guess from an associative array. As Elastica only talks JSON or array, Elastically introduce a custom Indexer and ResultBuilder allowing to pass and retrieve PHP objects (via a Serializer). Indexes should be versioned When talking to an Index, we do it via its name. That’s good, unless we want to update the mapping of that index, because we have to rebuild it. To avoid downtime, we use aliases on top of our indexes. In Elastically, this is forced and transparent. Tools for better integration Some tools are also implemented (or on their way!) to ease application development: The Indexer : allowing to use the Bulk API properly; : allowing to use the Bulk API properly; (TBD) A reindexing command: leveraging the Reindex API to rebuild your entire index automagically when you update your Mapping configuration (think about deployment); command: leveraging the Reindex API to rebuild your entire index automagically when you update your Mapping configuration (think about deployment); (TBD) An updater helper to ease real-time updates even when the reindexing command is building the “next” index; helper to ease real-time updates even when the command is building the “next” index; (TBD) A custom healthchecker: allowing you do get tailor-made insight about your cluster health (Is there enough document in that index?)… How to use? Elastically is not released yet as I still want to add some features, but you can already use it for the core functionalities (DTO, Indexer…). composer require "jolicode/elastically:dev-master" Then you can use JoliCode\Elastically\Client instead of Elastica Client; they are 100% compatible as it’s just a parent class. // Building the Index from a mapping config use JoliCode\Elastically\Client; use Elastica\Document; // New Client object with new options $client = new Client([ // Where to find the mappings Client::CONFIG_MAPPINGS_DIRECTORY => __DIR__.'/configs', // What object to find in each index Client::CONFIG_INDEX_CLASS_MAPPING => [ 'beers' => App\Dto\Beer::class, ], ]); // Class to build Indexes $indexBuilder = $client->getIndexBuilder(); // Create the Index in Elasticsearch $index = $indexBuilder->createIndex('beers'); // Set proper aliases $indexBuilder->markAsLive($index, 'beers'); // Class to index DTO in an Index $indexer = $client->getIndexer(); $dto = new Beer(); $dto->bar = 'American Pale Ale'; $dto->foo = 'Hops from Alsace, France'; // Add a document to the queue $indexer->scheduleIndex('beers', new Document('123', $dto)); $indexer->flush(); // Force index refresh if needed $indexer->refresh('beers'); The Serializer By default, Elastically will leverage the ObjectNormalizer from Symfony to transform your DTO to an array. That’s easy and fast, but you can also setup your own. At JoliCode, we use Jane PHP to generate super fast Normalizer based on a JSON Schema. We can declare our Model and Jane generate the PHP code: the DTO, the Normalizer and a factory. Less time on the basics, more time on the business value Elastically is not meant to be a fully feature implementation like FOSElasticaBundle for example. I want it to be an opinionated framework to build Elasticsearch based feature in PHP application. I would be glad to hear about different approaches when dealing with Elasticsearch via PHP, so feel free to compare and share your experiences! Code is available on Github as always: https://github.com/jolicode/elastically
{ "pile_set_name": "OpenWebText2" }
Lloyd Cheatham Hilliard Lloyd Cheatham (March 20, 1919 – June 11, 1989) was an American football quarterback. Cheatham was born in Oklahoma in 1919, but was raised in Alabama. He attended Carbon Hill High School in Carbon Hill, Alabama. He played college football at Auburn. He played at Auburn from 1939 to 1941, playing on both offense and defense at the quarterback and fullback positions, and earning a reputation as an outstanding blocker. He was selected with the 14th pick in the 1942 NFL Draft and played for the Chicago Cardinals of the National Football League during the 1942 season. He appeared in 11 games for the Cardinals, three as a starter. During World War II, he served in the military and played on the Bainbridge Naval Station football team. After the war, Cheatham played for the New York Yankees of the All-American Football Conference from 1946 to 1948. He appeared in 38 games for the Yankees, 26 as a starter, catching 15 passes for 254 yards and three touchdowns. After retiring from football, Cheatham worked as a zone manager for the Chevrolet Division of General Motors and later with Merrill Lynch Realty. He died in 1989 in Charlotte, North Carolina. References Category:1919 births Category:1989 deaths Category:American football quarterbacks Category:Chicago Cardinals players Category:Bainbridge Commodores football players Category:New York Yankees (AAFC) players Category:Auburn Tigers football players Category:Players of American football from Alabama Category:Players of American football from Oklahoma
{ "pile_set_name": "Wikipedia (en)" }
Media News First admissions in the Official Team List for the AR World Championship Portugal 2009 2009-08-11 19:00 By the end of last week the organization published the (official list) of teams admitted to the Seventh Edition of the Adventure Racing World Championship schedule for next November in Portugal. Thirty-one (31) teams constitutes the first batch that will be joined, in the coming days, by more twenty-nine (29) who are now concluding the final steps of the registration protocol. The organization still considers whether or not, to extend the final list to sixty-five (65). However a final decision will only be taken if that enlargement contributes to the elevation of the quality of the competition. In the meanwhile, still some doubts remains about the participation of several renowned international teams that have contact APCA but did not yet found the necessary sponsoring to attend the race in Portugal. In that lot are the team NIKE of USA, the team Wilsa Helly-Hensen of France and team Salomon Santiveri of Spain. Nevertheless, the top Ukrainian team OS-Direct Adventure, one of the most powerful formations of Eastern Europe was the last team to apply for a place and are highly motivated to come to Portugal and show all their racing potential. From the international AR scene, should be noted the participation of several ARWC09 teams in some of the major Raids in August; examples are Team Orion Health-NZ and Team nuun-Feed The Machine-US who are participating in Primal Quest-Badlands USA and the well known rivals AlpinePro/Nutrend/Merida-CZ and OpavaNet/Tilak/Merida-CZ who will fight for victory at its homeland Raid, the Czech Adventure Race 2009. The Czech event will also have the participation of Team OS-Direct Adventure-AU and SWECO Karlstad Multisport-SW, two teams On hold in the ARWC list. The final notes goes to the new ARWC page in FACEBOOK who got an immense response from the AR community and got almost 90 members in just over 10 days. The average of 9 fans per day in this early date suggests that this will be an exceptional communication tool for the next few months. The Twitter ARWC2009 also started this weekend and already has a group of loyal followers that will surely increase in coming weeks. Please stay tune to more upcoming news in a very special month for the ARWC Portugal 2009. Alexandre
{ "pile_set_name": "Pile-CC" }
package org.bianqi.web.wangyi.controller; import java.util.List; import java.util.Map; import org.bianqi.web.wangyi.pojo.GraphTop; import org.bianqi.web.wangyi.pojo.GraphTriangle; import org.bianqi.web.wangyi.service.GraphSerivce; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.stereotype.Controller; import org.springframework.ui.ModelMap; import org.springframework.web.bind.annotation.RequestMapping; /** * 图计算 * <p>Title: GraphController</p> * <p>Description: </p> * <p>School: qiqihar university</p> * @author BQ * @date 2018年3月3日下午2:32:56 * @version 1.0.0 */ @Controller @RequestMapping("/graph") public class GraphController { @Autowired private GraphSerivce graphService; @RequestMapping("/graphTriangle") public String graphTriangle(ModelMap map){ List<GraphTriangle> graphTriangle = graphService.getGraphTriangle(); map.put("graphTriangle", graphTriangle); return "graph_triangle"; } @RequestMapping("/graphTop") public String graphTop(ModelMap map){ List<GraphTop> graphTopList = graphService.getGraphTopList(); map.put("graphTopList", graphTopList); return "graph_top"; } }
{ "pile_set_name": "Github" }
Jagua Pasto Jagua Pasto is a barrio in the municipality of Guayanilla, Puerto Rico. Its population in 2010 was 108. History When after the Treaty of Paris (1898), the U.S. conducted its first census of Puerto Rico, the combined population of Quebrada Honda barrio and Jagua Pasto barrio was 1,467. See also List of communities in Puerto Rico References External links Category:Barrios of Guayanilla, Puerto Rico
{ "pile_set_name": "Wikipedia (en)" }
Q: Whether to use "entstanden" or "entstehend" for "ensuing"? die entstandene Verwirrung nützen die entstehende Verwirrung nützen In order to express the idea of "take advantage of the ensuing confusion", I'm split between Present Participle and Past Participle. I wonder if both can work or there is some distinction to be aware of? A: The distinction is the same in German as it is in English: take advantage of the ensuing confusion Means confusion is currently developing (most probably still escalating) and someone takes advantage of it This translates to present parciple - seinen Vorteil aus der entstehenden Verwirrung ziehen take advantage of the ensued confusion Means confusion was ensuing (and is still present, but most probably not further developing) and someone takes advantage of it This translates to past participle - seinen Vorteil aus der entstandenen Verwirrung ziehen
{ "pile_set_name": "StackExchange" }
This week, we’re running a big list of what we — and a group of trusted friends — recently voted as the 500 best video games of all time. For the backstory, criteria, explanation of why Breath of the Wild isn’t on the list, etc., head to the beginning here: The 500 best games of all time. For numbers 300-201, scroll down. 300. Microsoft Flight Simulator (1982, PC) Though technically not the first flight simulator, Microsoft Flight Simulator revolutionized the simulation genre with how many real world variables it threw at players. The changing weather, time of day, new coordinate systems and a new engine were seen as so realistic at the time, the game's advertising claimed if it were any more lifelike "you'd need a license." 299. The Legend of Zelda: A Link Between Worlds (2013, Nintendo 3DS) The Legend of Zelda: A Link Between Worlds is one of the best classic Zelda games in the series. Building upon the series' dungeon design and overall presentation, A Link Between Worlds also introduced new gameplay mechanics such as the ability to merge into walls, later seen iterated on in Super Mario Odyssey. 298. Diablo 3 (2012, Mac, PC, others) When released in 2012, Diablo 3 set a new world record as the fastest-selling PC game, resonating quickly with players. Incentivizing a new level of experimentation for the Diablo series, Diablo 3's accessibility and improved gameplay and systems made some feel it was "easier to enjoy," according to IGN, than other Diablo games that shipped with more obtuse design philosophies. 297. Thief: Deadly Shadows (2004, PC, Xbox) Part of a series known for changing the way we play games, Thief: Deadly Shadows changed the way we play Thief games. Offering first- and third-person perspectives and reconfigurable controls, Deadly Shadows abandoned the mission-to-mission structure of earlier games, allowing players to explore and interact with its Victorian-styled world, creating a more engaging, accessible, immersive sim. 296. The World Ends With You (2008, Nintendo DS, others) The World Ends With You was "out to challenge everything you'd commonly expect from a RPG experience," according to IGN. Heavily focused on modern styles and fashions, the game felt like a far cry from its Japanese role-playing contemporaries in presentation and gameplay. Its combat system was especially notable for making use of both Nintendo DS screens, changing up the traditional turn-based combat approach. 295. Super Mario Bros. 2 (1988, NES, others) The middle child between one of the most important games of all time and what some see as the greatest game of all time, Super Mario Bros. 2 introduced key mechanics and characters that later became key components of the series. One notable example is the ability to lift and toss objects, a feature present in nearly every Mario game that followed. 294. Sonic CD (1993, Sega CD, others) Sonic CD feels like a Sonic game on steroids. It utilized the Sega CD memory for a more graphically-intensive experience, and introduced a deeper take on gameplay, adding two different timelines for players to run through, with levels changing based on which they were in. 293. Proteus (2013, PC, others) Proteus is like an Elder Scrolls game free of distraction. Changing the world with every playthrough, Proteus' only objective is to explore — but at your leisure. Proteus tells its players nothing; it expects nothing of them. There's no princess to save or enemy to kill. It's simply a meditative experience through imaginary worlds, an experience only possible in games. 292. NBA 2K12 (2011, PlayStation 3, Xbox 360, others) NBA 2K12 not only scratched the itch left by the 2011 NBA lockout, but became what many see as the "best basketball sim ever." Aside from iterating on the series' long-running gameplay, 2K12 introduced classic teams and professional players, allowing fans to simulate what it would be like to see Michael Jordan at his peak take on LeBron James. 291. God Hand (2006, PlayStation 2, others) God Hand tries to marry two audiences: fans of weird humor and fans of difficult action games. Developed by some of the same people responsible for Resident Evil 4, God Hand focused on hand-to-hand combat, a call back to old arcade brawlers. While many reviews were semi-positive and the game has built a cult following, developer Clover Studio closed shortly after its release, making God Hand its last game. 290. Final Fantasy (1990, NES, others) Final Fantasy was never meant to be what it is now. In fact, the word "Final" is in the title because developer Square assumed it'd be the last game it released. It was wrong. Now one of the most revered and longest running series in games, Final Fantasy has helped popularize the role-playing genre. 289. Combat (1977, Atari 2600, others) Combat is 27 different games in one — kind of. Featuring different variations on vehicles like tanks, jets and biplanes, Combat was an early example of war gaming and helped popularize the concept into one of the biggest genres in gaming. Its innovative use of varied gameplay is an early example of a game pushing its gameplay beyond one schtick. 288. Tennis for Two (1958, custom) Tennis for Two was one of the first video games ever developed. Using Donner Model 30 analog computers to simulate ball trajectories and wind resistances, creator William Higinbotham helped pave the way for the rest of the video game industry. 287. Assassin's Creed 4: Black Flag (2013, PlayStation 4, Xbox One, others) Assassin's Creed 4: Black Flag dared to be different. Still an Assassin's Creed game at heart — with all the sneaking, stabbing and the like — Black Flag expanded Assassin's Creed 3's naval combat into a major feature, receiving its own ocean-based open world. The game quickly became a series favorite, and a high water mark before successor Unity brought things down a peg. 286. Kingdom Hearts (2002, PlayStation 2, others) On paper, it shouldn't work. Mixing Square Enix characters with Disney characters, Kingdom Hearts tells a wholesome story about friendship and how, even from different planets, we can find common ground. Kingdom Hearts does away with role-playing conventions like turn-based combat in favor of more approachable alternatives, making it a good first step into the genre. 285. Kirby's Dreamland (1992, Game Boy) The debut of Kirby, Kirby's Dreamland was developed with two players in mind. Creator Masahiro Sakurai wanted Dreamland to be a game anyone could pick up and play — even those unfamiliar with action games. Additionally, he wanted it to offer optional challenges for more experienced players. The product is a "relaxing adventure" that never takes advantage of its players, according to Game Informer. 284. Forza Horizon 3 (2016, PC, Xbox One) More than just a racing sim, Forza Horizon 3 is a rare example of a racing game incentivizing exploration. Cementing the "series’ status as the driving game for everyone," according to GameSpot, Horizon 3 gives players an entire Australian landscape to drive about and, of course, race through. As Polygon's Colin Campbell put it, it "is as beautiful as it is engaging." 283. Gauntlet (1985, Arcade, others) A classic multiplayer dungeon crawling adventure, Gauntlet was a smash success for Atari in the mid '80s. Due to that success, Gauntlet was quickly ported to nearly a dozen different platforms, and followed-up numerous times as the years went on. 282. Super Mario Sunshine (2002, GameCube) Being the first 3D Mario to follow Mario 64, Super Mario Sunshine had some big shoes to fill. Upon the game's release, many loved the water-based backpack that allowed for worlds to be traversed in different ways other than just running and jumping, but were put off by the lack of polish and issues with the camera. 281. Max Payne (2001, PC, others) Max Payne is Finlandian love letter to American cinema, a gritty, modern reimagining of the crime noir film genre permeating the '40s and '50s. Equal parts John Huston and John Woo, it tells a story of love, addiction and tragedy, all tied into a game with the flashy, violent gunplay of a Matrix film. 280. Ico (2001, PlayStation 2, others) Ico is the Occam's Razor of video games. Developed to be minimalistic, stripped of unnecessary mechanics and exposition, it is notable game designer Fumito Ueda's take on the classic boy meets girl concept. Ico made use of its minimalism to tell a story resonating with its players emotionally, making it one of the most renowned games of all time. 279. Dark Souls 2 (2014, PC, PlayStation 3, Xbox 360) "Dark Souls 2 is unflinchingly ambitious in a way that few games are," according to Polygon's Phil Kollar. Forcing players to learn and abide strictly by its rules, Dark Souls 2 gave players a bigger world with more secrets, while increasing the challenge tenfold. Dark Souls 2 tempted players to keep exploring, all the while reminding them death was only one step away. 278. Wasteland (1988, Apple II, others) Wasteland's post-nuclear world paved the way for Fallout in nearly every way. Aside from obvious setting comparisons, Wasteland let players boost desired skills, interact with characters and influence the world. It was the first instance of a "persistent world" game where choices made in a particular area remained throughout the story, making players always mindful of their actions. 277. Ultima 7: The Black Gate (1992, PC, others) Ultima 7: The Black Gate is the most "masterfully executed" game in the series, according to creator Richard Garriott. The Black Gate brought major changes to the Ultima formula in terms of player control and completely real-time gameplay. Considered "daring and unusual" by Computer Gaming World upon its release, The Black Game is one of the best role-playing games ever made. 276. The Stanley Parable (2013, PC, others) Constantly changing, constantly speaking straight to the player, The Stanley Parable was creator Davey Wreden's experiment with what happens when players go against a game's objective. Transforming based on the player's decisions — even the weirdest ones — The Stanley Parable was a test of interactivity and how games could still work when broken. 275. Tenchu: Stealth Assassins (1998, PlayStation) Despite how important stealth is to the ninjitsu discipline, Tenchu: Stealth Assassins was one of the first ninja-based games to center around it. Making players think critically about how to approach a target, rather than just slicing away, made Tenchu more strategy-focused than most ninja games seen in the late '90s. 274. Snake (1976, Arcade, others) Forcing players to think ahead and in the moment at the same time while controlling an ever-lengthening snake, Snake is one of the most widespread games of all time. Shipping on everything from Nokia phones to graphing calculators, Snake is malleable enough by design to be everywhere and fun enough to keep players wanting to play. 273. Shadow Hearts: Covenant (2004, PlayStation 2) A direct sequel to Shadow Hearts, Covenant received major acclaim when it released in 2004. The game made significant improvements to the the original's combat, adding new moves and the ability to customize attacks. Critics also praised its impactful story, soundtrack and visuals, with IGN calling it "the perfect sequel." 272. Quake 3: Arena (1999, PC, others) Quake 3: Arena knew exactly what its fans wanted: multiplayer. That's why Arena was the first in the series to ship without any campaign options. Critics praised the fast-paced fighting as well as the improved visuals and effects. The game quickly became a staple of the competitive gaming scene, helping pave the way for the now-booming esports industry. 271. Phoenix Wright: Ace Attorney (2001, Game Boy Advance, others) Going to court is, often, not a good thing. But Phoenix Wright: Ace Attorney makes court fun. A visual novel set in the judicial system, Ace Attorney tasks players with defending clients and seeing through witnesses' lies. This take launched a massive multimedia series and found a large group of passionate fans. Myst 4: Revelation Once a king or queen of Narnia, always a king or queen of Narnia. When I was a kid, I was not allowed to have video game consoles, but I had Myst. My game-agnostic, console-ban-complicit mother had read somewhere that it was a video game that more women played than men, and had bought it on the strength of that alone. Though it flummoxed me, Myst appealed to me — I was a girl devouring every story I could get about children exploring secret worlds. In the days before online guides, I didn’t actually finish Myst and Riven until I picked them up again college, and I subsequently devoured Myst 3 and Myst 4. Myst IV: Revelation is my favorite video game of all time. It is a beautifully rendered, essentially-direct sequel to Myst, in which the first game’s core puzzle of empathy is reevaluated and for the first time you dive deep into first-hand contact with the culture of a world you visit. Myst isn’t my favorite game. It wasn’t my gateway into video games, or to the gaming community. But it was the first time a video game world captivated me and led me to return to it again and again, even with decade-long gaps in between visits. Once a king or queen of Narnia, always a king or queen of Narnia. - Susana Polo (@NerdGerhl) 270. MVP Baseball 2005 (2005, PlayStation 2, others) MVP Baseball 2005 was a game made for the most hardcore, nerdiest baseball fans out there. "Repetitive as hell but addictive in the same sense," according to SB Nation, the game included Single-A rosters, minor leagues, major leagues and deep cut Easter eggs unlocking everything in the game. As SB Nation editor Matt Ellentuck put it, "What more could you ask for from a baseball video game?" 269. Marvel vs. Capcom 2: New Age of Heroes (2000, Dreamcast, others) Marvel vs. Capcom 2: New Age of Heroes did what any sequel should do: improve upon the source material. Featuring more than three times the number of characters of the first game, New Age of Heroes was crazier, albeit more refined, than the original. 268. Heroes of Might and Magic 3 (1999, PC, others) Heroes of Might and Magic 3 breaks its gameplay into two major camps: strategy and turn-based combat. Inside a super-detailed world, players could explore multiple layers of the game's map. Might and Magic 3 found immense fanfare for its incredible presentation and combination of two genres. 267. Fatal Frame 2: Crimson Butterfly (2003, PlayStation 2, others) Fatal Frame 2 takes one of survival horror's only lines of defense and replaces it with an old camera. Widely considered one of the scariest games of all time, Crimson Butterfly's excellent use of atmosphere, jump scares and the inability to fight back made it, according to Naughty Dog's Neil Druckmann, "the scariest kind of experience in any medium." 266. Event[0] (2016, PC, others) Event[0] is about finding companionship while alone. Abandoned in space, players must solve the game's problems with no professional assistance, no other human touch. As the player forms a relationship with an AI, which can actively communicate like a chat bot, and who doesn't exactly want you to leave, Event[0] explores how loneliness adheres us to those around us. 265. Demon Attack (1982, Atari 2600, others) Demon Attack didn't do much new but its variety made this fixed shooter a cult-classic. As opposed to shipping with one game mode, Demon Attack had 10 variations in its level design, each introducing new enemy weapons and movement patterns. 264. Sonic The Hedgehog 2 (1992, Genesis, others) Sonic The Hedgehog helped make Sega a household name. Sonic The Hedgehog 2 helped make Sega a juggernaut of the game industry. Introducing mechanics that redefined the series and characters like Tails, Sonic 2 helped turn the Sonic franchise into the massive multimedia property it remains today. 263. Fez (2012, Xbox 360, others) Fez was simultaneously the angel and the devil on the shoulders of the indie game community. Award-winning before its release, Fez helped usher in something of a renaissance for independently developed games with its quasi-2D world, tough puzzles and bright visuals. 262. Age of Empires 2 (1999, PC, others) Age of Empires 2 took the shortcomings of its predecessor and improved upon them tenfold. Age of Empires 2 was one of Microsoft's first big footsteps in games before it hit the scene with Xbox. 261. Demon's Souls (2009, PlayStation 3) Sparking a whole new subgenre, the "souls-like," Demon's Souls was a test of the player's own masochism as much as it was a journey through a fantastical gothic world. Tremendously challenging in an effort to give players a sense of accomplishment by progressing, Demon's Souls proved massively influential in how challenge and combat were handled in games. 260. Persona 3 (2007, PlayStation 2, others) Putting a heavy emphasis, arguably heavier than in other Persona games, on social links, Persona 3 gave players unique ways to bond with its characters — though often through sad occurrences. 259. Bloodborne (2015, PlayStation 4) Remember Demon's Souls from two spots above? If that's an introduction to From Software's world of sadism, Bloodborne is the Ph.D program. Brutally tough, Bloodborne's ever grim trip through the blood-fueled Gothic city Yharnam, like all Souls games, teaches players through death, walking a delicate tightrope between being brutal but fair and impossibly challenging. 258. Final Fantasy 8 (1999, PlayStation, others) Final Fantasy 8 had to bear the weight of being the follow-up to one of the most popular games of all time, but it more than rose to the occasion. Changing the game's visual aesthetic to resemble more lifelike characters and changing up core Final Fantasy mechanics, like limit breaks, Final Fantasy 8 continued the series' nact for reinventing its own wheel. 257. Inside (2016, PC, Xbox One, others) Every millisecond of Inside feels crafted for only that moment. With specific animations used only once, environments constantly changing and a story never staying in once place longer than a few seconds, Inside tells an ever-bleak story (probably) about conformity, sparking numerous debates online about what exactly developer Playdead was trying to say with its expertly-crafted masterpiece. 256. Donkey Kong Country (1994, Super Nintendo, others) Pick 100 Nintendo games and chances are a dozen will be groundbreaking platformers. Donkey Kong Country is just one of those games, but that shouldn't downplay its importance. Better looking than most games at the time with its bright 3D-rendered visuals, Donkey Kong Country became one of the highest rated, best selling Super Nintendo games of all time. 255. The Hitchhiker's Guide to the Galaxy (1984, Apple II, others) The Hitchhiker's Guide to the Galaxy paved the way almost single-handedly for every humorous adventure game following it. Remaining faithful to the series it takes its name from, the game is a hilarious trip through the solar system. It's also a very difficult one. Hitchhiker's Guide to the Galaxy was massively influential on LucasArts games that combine humor with obtuse puzzle design. 254. King's Quest (1980, Apple II, others) King's Quest completely changed the graphic adventure genre. As the first adventure game to feature full animations, rather than static screens where players typed in text commands, players could walk around levels in different depth and interact with objects in a whole new way. King's Quest greatly influenced adventure games going forward, such as Maniac Mansion and Secret of Monkey Island. 253. Star Control (1992, PC, others) Star Control is one of the finest examples of developers letting players approach a game however they want. Either played as a melee or strategic game, it helped define the idea that games can be malleable and dynamic and players can make an experience wholly their own. 252. Maniac Mansion (1987, Apple II, Commodore 64, others) Lucasfilm Games' first self-published game, Maniac Mansion focused on B-movie humor, obtuse, non-linear design and great animation. Its use of a simple point-and-click mechanic, rather than command lines, became an industry standard for the adventure game genre, allowing for levels to be explored and interacted with quickly. 251. Pokemon Go! (2016, Android, iOS) A full-blown phenomenon in 2016, Pokemon Go! flooded streets and public spaces, as people, phones in hand, tossed Pokeballs at as many Pokemon as possible. Necessitating players to go out into the real world to find Pokemon in the augmented reality game, Pokemon Go! turned collecting into a social experience, and, in some cases, completely changed people's daily activity and exercise. 250. Fallout (1997, Mac, PC) Go where you want, interact with people how you please, approach situations as peacefully or aggressively as you'd like. The depth and expertise in which Fallout tackled these ideas led to the foundation of a massive series, as well as recognition by such institutions as the Smithsonian American Art Museum. 249. Castlevania 3: Dracula's Curse (1990, Nintendo Entertainment System, others) Far bigger than the original, Castlevania 3: Dracula's Curse gave players numerous gameplay paths to take, each unique with their own events. Castlevania 3 is often noted as one of the best NES games of all time. 248. The Jackbox Party Pack (2014, PC, others) Sit a group of friends in front of The Jackbox Party Pack and they'll quickly learn who among them has the dirtiest mind. Including game options where players must use word association or draw increasingly bizarre prompts, The Jackbox Party Pack turned competition into a test of irreverence and quick wits. 247. Castlevania (1987, Nintendo Entertainment System, others) Though it lacks the multiple paths of later games, the original Castlevania is still remembered for its high learning curve, making players be both nimble and knowledgeable of the enemies they're going up against on their way to defeat Dracula. Castlevania set the dark, atmospheric approach for the rest of the series, taking the first steps of a franchise that's lasted nearly 30 years. 246. Another World (1991, Amiga, others) Another World was one of the earliest examples of a video game trying to bridge the gap between cinema and interactive media. A platformer at its core, Another World is most notable for its cinematic quality, coming well before games like Metal Gear Solid and Silent Hill portrayed their stories. 245. Psychonauts (2005, PC, Xbox, others) Psychonauts was about growing up. The first game developed by Double Fine, it told a story about helping people get over their worst fears. Psychonauts' tales of family strife and overcoming mental hurdles garnered a loyal fanbase that clamored for years for a sequel — which, thanks to crowdfunding, it's now getting. 244. Asteroids (1979, Arcade, others) One of the first hits of the early era of arcades, Asteroids hardly needs an introduction. Letting players pilot a spaceship, shooting off incoming asteroids and flying saucers, Asteroids has been one of the most influential — and copied — games of all time thanks, in part, to its clever game design and easily imitated gameplay loop. 243. Devil May Cry 3: Dante's Awakening (2005, PlayStation 2, others) A return to form after the flop that was Devil May Cry 2, Dante's Awakening nearly perfected the series' fluid, flashy combat and was one of the best hack-and-slash games of the mid-2000s. 242. Gears of War (2006, Xbox 360, others) When you take place behind a piece of cover in a third-person shooter, you have Gears of War to thank. Not because it was the first game to use cover as a primary mechanic, but Gears popularized the idea, making it an industry staple. Gears was also one of the best-looking games of its time. 241. Shenmue (2000, Dreamcast, Xbox) One third life-sim, one third beat-'em-up and one third masterfully-told narrative experience, Shenmue made a huge dent in the industry in terms of how video game stories could be told and how worlds could exist without the influence of the player. X-COM: UFO Defense X-COM: UFO Defense, first published in 1994, is the rare game that still holds up when played today. Sure, the user interface is outdated and the inventory management system is abysmal, but the core gameplay loop still delivers: Detect UFOs. Shoot them down. Kill the aliens inside. Research their technology. Repeat. It’s hard to believe that the game was effectively designed and programmed by just two men, brothers Julian and Nick Gollop. X-COM was a hit game in its time, and that momentum led to multiple sequels and, eventually, to a successful reboot on PC and modern consoles. But it’s the original that would later be recognized as the iconic example of the genre. I make time every year to replay the original. - Charlie Hall (@Charlie_L_Hall) 240. X-COM: UFO Defense (1994, PC, others) While certainly not the first tactical strategy game, X-COM: UFO Defense helped refine the genre with turn-based alien space combat. Spawning uncountable imitators, UFO Defense pit players against aliens as they each did their best to take down difficult foes. 239. Wing Commander (1990, PC, others) Highly expensive and highly successful, the visual precedent set forth with Wing Commander marked a shift for many in game development. Many games that followed had to live up to the graphical and mechanical panache of this space combat simulator. 238. Shantae and the Pirate's Curse (2014, Nintendo 3DS, Wii U, others) Upon its release, Shantae and the Pirate's Curse stood "out from the glut of retro-inspired platformers," according to IGN. Shantae and the Pirate's Curse differentiates itself with witty humor and unique islands for players to explore to find hidden items and battles. 237. Sensible Soccer (1992, Amiga, PC, others) Sensible Soccer isn't just a great game; it's a "cultural artifact," according to a panel of pioneer game developers and even Polygon's editor-in-chief Chris Grant. An early example of a sports game trying to fully encompass the entire spectrum of a sport, Sensible Soccer featured numerous divisions and seasons, and thousands of soccer clubs from around the world. 236. Monster Hunter Generations (2016, Nintendo 3DS, others) Monster Hunter Generations is a greatest hits of the Monster Hunter series. With more monsters than ever, chances are if you have a favorite beast, it's in Generations. This who's-who of a game makes it a great entry point for people curious about the series but who might not want to play every version. 235. Impossible Mission (1984, Commodore 64, others) Impossible Mission is anxiety inducing. Given six hours to collect 36 randomized puzzle pieces — with 10 minutes deducted after each death — the player gets a mix of platforming and adventure challenges. 234. Flashback (1992, Amiga, others) Classified as a "cinematic platformer," Flashback used hand-drawn backgrounds and rotoscoped animations to make characters look more lifelike. Flashback was an early pioneer of cinematic games, with many critics praising its visuals, sound and animation as innovative and top notch. 233. Dishonored (2012, PC, PlayStation 3, Xbox 360, others) Dishonored is a game about planning, each level a maze of opportunities to explore. Whether your plan is an all-out assault or a silent game of cat and mouse, Dishonored's world constantly adapts to your choices in positive and negative ways. Never telling players how to pull off an objective, Dishonored also never lets them forget the repercussions their actions had on the game's world. 232. Mass Effect (2007, Xbox 360, others) On the surface a game about space politics and intergalactic war, Mass Effect is more memorable for the deep, emotional relationships players can engage with in the game's world. Mass Effect was the introduction to relationships that — for many players — stretched across three games, giving players years to spend with those they cared about. 231. Tomb Raider (1996, Saturn, PC, PlayStation, others) At the time a radically new take on action-adventure games, Tomb Raider broke away from the 2D norms, giving players large fully-3D levels to explore, traverse and fight within, paving the way for series like Uncharted. 230. Soulcalibur (1999, Dreamcast, others) Notable for offering players freedom of movement in all directions, Soulcalibur also made 3D weapons-based fighting history as one of the best-looking Sega Dreamcast games. With a Dreamcast hooked up to a PC monitor, little could touch it. 229. Halo 2 (2004, Xbox, others) Halo 2 changed multiplayer games forever. With an automated matchmaking process, players picked what game type they wanted to play and the game made a playlist for them. This move was seen as a defining moment in how online matchmaking would go forward in the future. 228. Jet Grind Radio (2000, Dreamcast, others) No game matches the attitude of Jet Grind Radio. A hyper-stylized take on the then-huge action sports genre, Radio's cel-shaded world, hip hop-influenced soundtrack and altogether zaniness made this rollerblading, spray-painting game stand out in a genre oversaturated with licensed tie-ins. 227. Left 4 Dead 2 (2009, PC, Xbox 360) Being scared is a communal event in the zombie shooter follow-up, as the game's "AI Director 2.0" procedurally alters scenarios to make each playthrough dynamic, effectively making it impossible for anyone to guess exactly what's going to happen next. 226. Warcraft 2: Tides of Darkness (1995, Mac, PC, others) Warcraft 2: Tides of Darkness turned Blizzard into the titan it is today. A completely overhauled experience from Warcraft, made with a bigger development team and budget, Tides of Darkness was a precisely balanced game, "perhaps one of the most finely tuned ... of all time," according to IGN. Combined with rave reviews and accessibility for newer players, Tides of Darkness sold millions. Blizzard never looked back. 225. Virtua Racing (1992, Arcade, others) Virtua Racing, at the time, was one of the best looking games available. Its high frame rate, multiple camera angles and 3D NPCs made players feel closer to a real racing event than ever before. Virtua Racing helped usher in a new wave of 3D games. 224. Red Dead Redemption (2010, PlayStation 3, Xbox 360) With Red Dead Redemption, Rockstar proved its GTA model could work in a different setting — and in many ways work better than it does in GTA. The developers also showed that they could make one of the best endings the game industry has ever seen. 223. Monkey Island 2: LeChuck's Revenge (1991, Amiga, PC, others) A notoriously difficult, obtuse video game genre to get into, Monkey Island 2: LeChuck's Revenge was applauded by critics for its "lite" game mode, allowing new players to get a good foothold to get into the adventure genre. LeChuck's Revenge also gets credit for using the iMUSE sound system, making sound for the first time a major part of the adventure game experience. 222. Gran Turismo (1998, PlayStation) Gran Turismo is one of the highest-rated racing games of all time. When it hit the scene, Gran Turismo was one of the best-looking racing simulators out there and a remarkably complete package with over 140 cars. 221. A Mind Forever Voyaging (1985, Amiga, others) A Mind Forever Voyaging is like a walking simulator in the form of a text adventure. Not focused on puzzles, the game allows players to explore its dystopian United States in great detail. The game takes you on its own journey, letting you, if you're so inclined, take in its experience more than you interact with it. 220. Tony Hawk's Pro Skater (1999, PlayStation, others) Tony Hawk's Pro Skater was the tip of the iceberg. Partnering with Tony Hawk and other professional skateboarders to make an authentic representation of skateboarding, Activision ushered in the massive popularity of action sports games. Though many tried to steal this successful formula after, it took awhile for anyone to match Pro Skater's addictive, trick-based gameplay loop. Kentucky Route Zero Bathed in the dying light of a crumbling rural town, Kentucky Route Zero follows an aging truck driver named Conway as he delivers his final package to an address that can only be reached by a secret highway buried deep in the caves of Kentucky. It’s a journey through an America whose sun is setting, a place of tragedy and ethereal beauty where economic decline is painted in dream-like brush strokes of magical realism. Take the journey; you won’t regret it. - Laura Hudson (@laura_hudson) 219. Doom (2016, PC, PlayStation 4, Xbox One, others) Subverting everything modern players had learned to expect from a first-person shooter, Doom was a wholly new, yet old, experience exceeding the expectations that came with its name. Forcing players to get up-close and personal with enemies, chainsawing them in half or crushing their skull cavities, was as relentless as it was amazing. 218. Burnout Revenge (2005, PlayStation 2, Xbox, others) Some racing fans want a pure, perfect simulation experience. Other racing fans want to turn cars into scrap resembling a crushed soda can while going more than 200mph. Burnout Revenge is the latter of these two. Fast, aggressive and loud, Revenge rewarded recklessness, making for a game constantly tempting players to hurl their vehicles faster and harder than ever before. 217. Zero Escape: Virtue's Last Reward (2012, Nintendo 3DS, PlayStation Vita, others) Zero Escape: Virtue's Last Reward saved its best secrets for last. A sequel to 999, it continued the Saw-like puzzle escape rooms concept, but also broke the fourth wall in subtle ways not immediately apparent to the player, waiting until the game was over to fully divulge. 216. WarioWare: Twisted! (2005, Game Boy Advance) Full of unique, inventive "microgames," as is customary for the series, WarioWare: Twisted! also made use of a built-in gyro sensor. This mechanic was used often in the game, making Twisted! one of the only Game Boy Advance games to utilize motion controls. 215. Tony Hawk's Underground (2003, GameCube, PlayStation 2, Xbox, others) Five games into the series, Neversoft found itself ready to change up its tried-and-true skateboarding formula. Tony Hawk's Underground added a story about becoming a professional skater and the ability, for the first time, to get off the skateboard. Its success not only changed how Tony Hawk games were played, but also how the world looked at skateboarding. 214. Super Mario 3D Land (2011, Nintendo 3DS) Super Mario 3D Land was a marriage between old and new. Combining the classic designs of side-scrolling 2D Mario games with more contemporary freeroaming 3D Mario games, 3D Land used the two schools of thought to create new ways to play a Mario game. 213. Street Fighter Alpha 3 (1998, Arcade, others) Street Fighter Alpha 3 gave players the option between three fighting styles picked from other Street Fighter games. This mechanic changed the landscape for Street Fighter fans, giving players many ways to play and experiment with how they approached fights. 212. Star Raiders (1979, Atari 8-bit, others) Star Raiders was a first-person shooter before there was a first-person shooter genre. Considered one of Stanford University's 10 most important games, Star Raiders was one of the more complex first-person based games of the late '70s, boasting better visuals and allowing the player to look both in front of and behind their spaceship. 211. Mini Metro (2015, PC, others) Leave it to video games to make rapid transit planning a fun way to spend an afternoon. Tasking players with building an efficient transit line for an ever-growing city, Mini Metro was a realistic simulation that was easy to understand but constantly challenged players by throwing new obstacles their way as cities grew, leading to increasingly more complex train lines. 210. Batman: Arkham Asylum (2009, PC, PlayStation 3, Xbox 360, others) Telling a story about The Joker taking over Gotham City's notorious institution, Batman: Arkham Asylum invited players on a trip through the mind of Bruce Wayne. The game's combat and stealth proved influential and made Arkham Asylum one of the greatest superhero video games of all time. 209. Stardew Valley (2016, PC, others) It took no time for Stardew Valley to surpass all expectations. Its tranquil visuals and sound design, surprisingly deep relationships and pick-up-and-play gameplay quickly garnered the game a massive fandom. Developed by only one person, Stardew Valley was one of 2016's most talked-about games for its lighthearted approach to farming. 208. Metal Gear Solid 5: The Phantom Pain (2015, PC, PlayStation 4, Xbox One, others) The end of an era for a 30-year-long series, Metal Gear Solid 5: The Phantom Pain radically redefined open world gaming, how players could interact with environments and how cinema and games could blend together. 207. Mega Man X (1994, Super Nintendo, others) Telling a semi-mature story about the dangers of robot sentience, Mega Man X reinvented the Mega Man series. Adding numerous new moves, characters and mechanics that changed gameplay significantly, Mega Man X was a successful attempt to update the once-stale series. 206. WarioWare, Inc.: Mega Microgames! (2003, Game Boy Advance, others) WarioWare, Inc.: Mega Microgames! is one of Nintendo's weirdest games. Tasking players with wrapping spaghetti around a fork, threading a needle and catching flying toast, Warioware took the microgame concept and ran with it. 205. Virtua Fighter 2 (1995, Arcade, others) Virtua Fighter 2 exhibited remarkable attention to detail. Pairing the game's groundbreaking visuals with an incredibly smooth framerate, it turned out to be one of the mid-'90s most realistic fighting games, setting a precedent for the level of detail fighters strived for as time went on. 204. Metal Gear Solid 3: Snake Eater (2004, PlayStation 2, others) Metal Gear Solid 3: Snake Eater made Metal Gear what it is today. Where earlier games focused on hiding around corners, Snake Eater required learning, adapting to and exploiting protagonist Snake's rainforest environments. Combined with one of the more memorable stories told in games, Snake Eater is often considered the best Metal Gear game. 203. Fallout: New Vegas (2010, PC, PlayStation 3, Xbox 360) Fallout: New Vegas is, on the surface, a typical Fallout game: the world is in ruin, monsters walk the Earth and the player is free to choose how to interact with the world and its inhabitants. However, greater than the sum of its parts is the story it tells about post-apocalyptic capitalism, making it an important example of games as political satire. 202. Bushido Blade 2 (1998, PlayStation) Bushido Blade 2 is a rare example of a sequel being better by being simpler. Much like the original, Bushido Blade 2 emphasizes real(ish) combat focused on skill — especially when death is usually one hit away. But combined with an overall better presentation and more fighters, Bushido Blade 2's simpler approach to fighting made it one of the best games in the genre. 201. Animal Crossing (2002, GameCube, others) Animal Crossing drove home the idea that console games didn't necessarily need clear-cut objectives. Making use of the Nintendo 64's internal clock for realistic passages of time, players were free to live out a new life with anthropomorphic animals, filling days with numerous side activities, free of care of any incoming dangers. Click here to continue to entries 200-101. Story text: Blake Hester
{ "pile_set_name": "OpenWebText2" }
Q: Edge Extension Native Communication and UWP I'm providing a new feature in my UWP App through a Edge Extension. I have written an Edge Extension with the following manifest.json { "name": "MyExtensionName", "version": "1.0.0.0", "description": "MyExtension description", "author": "Me", "icons": { "16": "icons/logo_16.png", "48": "icons/logo_48.png", "128": "icons/logo_128.png" }, "browser_action": { "default_icon": { "20": "icons/logo_20.png", "40": "icons/logo_40.png" }, "default_title": "MyTitle" }, "permissions": [ "contextMenus", "tabs", "storage", "activeTab", "<all_urls>", "nativeMessaging", "background" ], "minimum_edge_version": "37.14316.1000.0", "background": { "scripts": ["js/background.js"], "persistent": true }, "content_scripts": [{ "matches": ["http://*/*", "https://*/*"], "css": ["css/light.css"], "js": ["js/content.js"], "run_at": "document_end" }] } I can create a connection with this var port = browser.runtime.connectNative("MyAppServiceName"); and I have tried to communicate with this port.postMessage({Text: "Hello"}); I don't get any error, but I don't get any response from my background task in my UWP App. I don't understand why. In package.appmanifest of my App, I have added the following code: <uap:VisualElements DisplayName="MyUWPAppName" AppListEntry="none" Square150x150Logo="Assets\Square150x150Logo.png" Square44x44Logo="Assets\Square44x44Logo.png" Description="MyUWPApp description" BackgroundColor="transparent"> and in this <uap:Extension Category="windows.protocol"> <uap:Protocol Name="msghost1" /> </uap:Extension> <uap:Extension Category="windows.appService" EntryPoint="MyAppService.Class1"> <uap:AppService Name="MyAppServiceName" /> </uap:Extension> <uap3:Extension Category="windows.appExtension"> <uap3:AppExtension Name="com.test.edge.extension" Id="EdgeExtension" PublicFolder="Extension" DisplayName="ms-resource:DisplayName"> <uap3:Properties> <Capabilities> <Capability Name="websiteContent" /> <Capability Name="websiteInfo" /> <Capability Name="browserStorage" /> </Capabilities> </uap3:Properties> </uap3:AppExtension> </uap3:Extension> The AppService is a Runtime Component added as project in the same solution. Its code is very simple using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Threading.Tasks; using Windows.ApplicationModel.AppService; using Windows.ApplicationModel.Background; using Windows.Foundation.Collections; namespace MyAppService { public sealed class Class1: IBackgroundTask { private BackgroundTaskDeferral backgroundTaskDeferral; private AppServiceConnection appServiceconnection; public void Run(IBackgroundTaskInstance taskInstance) { this.backgroundTaskDeferral = taskInstance.GetDeferral(); // Get a deferral so that the service isn't terminated. taskInstance.Canceled += OnTaskCanceled; // Associate a cancellation handler with the background task. // Retrieve the app service connection and set up a listener for incoming app service requests. var details = taskInstance.TriggerDetails as AppServiceTriggerDetails; appServiceconnection = details.AppServiceConnection; appServiceconnection.RequestReceived += OnRequestReceived; } private async void OnRequestReceived(AppServiceConnection sender, AppServiceRequestReceivedEventArgs args) { // This function is called when the app service receives a request } private void OnTaskCanceled(IBackgroundTaskInstance sender, BackgroundTaskCancellationReason reason) { if (this.backgroundTaskDeferral != null) { // Complete the service deferral. this.backgroundTaskDeferral.Complete(); } } } } I have tried to debug the AppService with the option "Do not launch, but debug my code when its starts" and I have noted that I don't get any response (the background task is not invoked). Somebody know what is wrong (or what is missing)? A: Finally, I have found the solution for my problem: in the tag I must use Name="com.microsoft.edge.extension"; I have to import the namespace xmlns:rescap="http://schemas.microsoft.com/appx/manifest/foundation/windows10/restrictedcapabilities", without adding some capabilities from this; The build and deploy must be done for the x64 platform. With this changes I am able to deploy and get it work the native messaging between my App and the Edge extension.
{ "pile_set_name": "StackExchange" }
Our electronic devices are using more power than ever before, so having extra juice is critical for today’s on-the-go workers. This past January at CES 2014, the pnosker.com crew checked out many various portable
{ "pile_set_name": "Pile-CC" }
H. Thomas Johnson H. Thomas Johnson (born 1938) is an American accounting historian, and Professor of Business Administration at Portland State University, known for his work on the history of accounting and accounting thought Life and work Johnson obtained his BA in economics from Harvard University and his MBA in accounting from Rutgers University. He obtained a PhD in economic history from the University of Wisconsin–Madison. He went on to earn a Certified Public Accountant license. After graduation Johnson started as accountant at Arthur Andersen. In the early 1970s he started his academic career at the University of Western Ontario as Assistant Professor of Economics, and by 1975 was Associate Professor of Economics. In 1980 he was appointed Professor of Accounting at the Western Washington University. In 1988 he move to the Portland State University, where he was appointed Professor of Business Administration. At the Bainbridge Graduate Institute in Washington he is also appointed Distinguished Consulting Professor of Sustainable Business. A 2003 survey by Harvard Business School Press placed him among the 200 leading management thinkers living today. The American Society for Quality awarded him the Deming Medal, and in 2007 he received a distinguished lifetime achievement award from the American Accounting Association. Johnson's research interests are in the field of "the intersection of systems thinking, modern physics, and sustainable operations management [and] explor[es] the application of natural living system principles to the design of ecologically-focused local business operations that emulate and extend the scope of the Toyota Production System." Selected publications Johnson, H. Thomas. Relevance lost: the rise and fall of management accounting. Harvard Business Press, 1991. Johnson, H. Thomas. Relevance regained. Simon and Schuster, 2002. Articles, a selection: Johnson, H. Thomas, and Robert S. Kaplan. "The rise and fall of management accounting." Engineering Management Review, IEEE 15.3 (1987): 36-44. Johnson, H. Thomas. "It’s time to stop overselling activity-based concepts." Management Accounting 74.3 (1992): 26-35. References External links H. Thomas Johnson profile at Portland State University Category:1938 births Category:Living people Category:American accountants Category:American economists Category:American business theorists Category:Accounting academics Category:Harvard University alumni Category:Rutgers University alumni Category:University of Wisconsin–Madison alumni Category:University of Western Ontario faculty Category:Western Washington University faculty Category:Portland State University faculty
{ "pile_set_name": "Wikipedia (en)" }
Q: Processing the Live Twitter Stream with PHP and JSON I'm struggling trying to figure out how to pull in tweets from the live Twitter stream. I want to keep the stream connection open and render the tweets onto a map as they come in. I think my problem is in tweetmap.php, as I don't know how to process the stream as it's updated. Furthermore, I don't think I'm checking the position of the last tweet correctly (by the tweet's ID). I've been using THIS TUTORIAL as my guidance, but I would like to bypass storing them into a database and just process them on the fly. poll() (in tweetmap.js) is called when the page first loads. tweetmap.php: <?php $opts = array( 'http'=>array( 'method' => "POST", 'content' => 'track=lol', ) ); $context = stream_context_create($opts); while (1){ $instream = fopen('https://stream.twitter.com/1/statuses/filter.json','r' ,false, $context); while(! feof($instream)) { if(! ($line = stream_get_line($instream, 20000, "\n"))) { continue; } else{ $tweets = json_decode($line); echo $tweets; flush(); } } } ?> tweetmap.js: var last = ''; var timeOut; function getTweets(id){ $.getJSON("./php/tweetmap.php?start=" + id, function(data){ $.each(data, function(count,item){ harvest(item); last = item.id; }); }); } function harvest(tweets) { for (var i = 0; i < tweets.results.length; i++) { if (tweets.results[i].geo !== null) { mapTweet(tweets.results[i]); } } } function mapTweet(tweetData) { var tipText; var coordinates = projection([tweetData.geo.coordinates[1], tweetData.geo.coordinates[0]]); [...] // Determines the coordinates of the tweet and adds a circle addCircle(coordinates, tipText); } function addCircle(coordinates, tipText, r) { // Adds and SVG circle to the map addTipsy(tipText, tweetNumber); } // add tipsy tweet-tip function addTipsy(tipText, num) { // Adds a hover tip of the tweet on the map [...] } // Draw the map (is also called to redraw when the browser is resized) function draw(ht) { [...] // Draws the SVG map } function poll(){ timeOut = setTimeout('poll()', 200); // Calls itself every 200ms getTweets(last); } $(function() { poll(); draw($("#mapContainer").width()/2.25); $(window).resize(function() { if(this.resizeTO) clearTimeout(this.resizeTO); this.resizeTO = setTimeout(function() { $(this).trigger('resizeEnd'); }, 500); }); $(window).bind('resizeEnd', function() { var height = $("#mapContainer").width()/2.25; $("#mapContainer svg").css("height", height); draw(height); }); }); A: You are trying to treat an HTTP request as a continuous stream while that is not how it works. HTTP is a stateless protocol that handles a request and then closes. You have two options to do what you are trying to do: Use multiple requests, probably on an interval of a second. This will create the appearance of new tweets being realtime. You may have to track the time since last requests so only new tweets are delivered. Use Websocket. This will provide a communication channel like what you are expecting. However, its not supported on all browsers.
{ "pile_set_name": "StackExchange" }
Latest The Hostile Takeover add-on pack for Tropico 5 is now available for Xbox 360 and it comes with three different scenarios. Along with the three stand-alone scenario’s Generalissimo, Joint Venture and Mad World are three new buildings for all game modes: The Asylum, Fast Food Joint and Defense HQ. There are also three avatar accessories, […] The Sims 4 expansion Get to Work is now available, EA has declared. It will run you $40 or your region’s equivalent on Mac and PC. Sims can bow be a Doctor, become Chief of Police, own a business, have a look at Career Venues and learn new skills. They can even discover aliens which […] The finale for Final Fantasy 14: A Realm Reborn – Before the Fall: Part 2 has been released with Patch 2.55. The conclusion to A Realm Reborn prepares players for the upcoming expansion, Heavensward, which releases on June 23. In order to access Heavensward, players will need to complete the final main scenario quest Before […] ZombiU 2, which popped up on Amazon France back in November, was apparently in development before being cancelled and contained co-op, according to someone in-the-know. According to a recent podcast featuring Unseen64’s Liam Robertson, ZombiU 2 development started in early 2013 but never left the pre-production phase. Robertson said he had seen a single image […] Google has updated Google Maps with the ability to play Pac-Man instead of looking at a road map to your destination. It didn’t work well when I typed in my location, due to the fact I live out in the middle of nowhere. This is despite the fact I am 4 miles from town and […] Here’s another interesting Cities: Skylines mod for you: it adds first-person multiplayer. According to its creator Fr0sZ, the project is very much a work-in-progress and he is currently taking suggestions on ideas to be incorporated into the mod. Have a look at the in-progress mod below. Thanks, PC Gamer. Vostock Games’ post-apocalyptic MMOFPS Survarium will launch through Steam Early Access on Thursday, April 2. At present the build offers only the PVP mode, and plans to expand with more variations of gameplay are in the works. The developer stated in its announcement it wanted to work out issues in PVP before offering freeplay and […] Evolve’s latest content update releases today, and as previously reported, it contains the playable Behemoth and four new playable Hunters. It also contains the free Observer Mode, and two free maps are available today. The maps are available first on Xbox One and will be available for PC and PlayStation 4 on April 30. You […] As promised last year, there are more Assassin’s Creed: Chronicles games coming your way. Developed by Climax Studios in collaboration with Ubisoft Montreal, Assassin’s Creed Chronicles: China, the side-scrolling action platformer part of the Assassin’s Creed: Unity Season Pass, will be the first standalone release. Two more will follow. China is the first episode, and […] The official GTA 5 PC trailer was supposed to release yesterday, but it looks like Thursday, April 2 will be the big day. According to Rockstar, the video will show the game running at 60fps, and it will be released at 10am EDT/3pm BST. The developer recommends you watch it on the most recent generation […] Sony has announced it’s PlayStation Plus offerings for April, with Dishonored on PS3 and Never Alone on PS4 as just two titles too choose from. Other free games for the month include: Tower of Guns on PS4 and PS3, Aaru’s Awakening on both systems, and for the Vita crowd there’s Killzone Mercenary and MonsterBag. The […] Bioware has said the idea of going back to the Jade Empire universe is a topic that “comes up pretty regularly” at the office, according to studio manager Aaryn Flynn. Speaking in a reader Q&A on Kotaku, Flynn said there is “always hope” for another Jade Empire, but for the present, the studio is rather […] Let’s improve Los Santos with a blast of cool 80′s power ballads. We dig the GTA 5 soundtrack. But we also love the Vice City radio stations. Now with the power of music streaming service Spotify on PS4 we can finally combine both. Of course this works for any music on Spotify and any game, […] The Witcher 3: Wild Hunt is going to be a rather long game. If you are a completionist, you could spend over 200 hours playing the game, according to CD Projekt RED. Answering a question pertaining to game length on Twitter, senior game designer Damien Monnier said if “you do everything” the game will last […] A limited edition bundle for Batman: Arkham Knight has been announced which includes a Steel Grey PS4 with a custom design based upon the Rocksteady title. It comes with a matching DUALSHOCK 4 Wireless Controller, the game on Blu-Ray, and exclusive bonus content the Scarecrow Nightmare that’s available to play on PS4. There’s also a […] Nintendo has issued a takedown notice for Unity-developed Super Mario 64 HD, the fan project which created an updated version of the first level of the game and allowed users to play it in their browser. It was also downloadable, with no attempts from creator Roystan Ross to monetize the project. Still, the news shouldn’t […] Dying Light players will be able to participate in “something unusual” which Techland says will “radically change the game experience” for one day only tomorrow, April 1. According to the developer, players will need to use “extreme caution” when handling Antizin injections as the latest batch has been sullied with a foreign contaminant. The chemical […] Nintendo of America will be hosting a Nintendo Direct tomorrow, April 1 of all days. The company will be discussing upcoming 3DS and Wii U games. The session will take place at 3pm PDT/6pm EDT/12am CET. Catch a #NintendoDirectNA about #WiiU & #3DS games on 4/1 at 3 p.m. PT. Don’t let the date fool […] Betting on eSports for Call of Duty: Advanced Warfare has reinvigorated the biggest game on consoles and turned it into a spectator sport. “We were looking at the eSports scene blowing up. Every year it was getting bigger. Players were maturing and being more discriminating. We had to understand the impact that eSports is having […] The future of Destiny looks very bright with House of Wolves and Comet releasing this year. But what about next year, and the one after that? Alex has a new video for you that tries to paint a picture of the future of Destiny. He goes over the timeline as we know it based on […] GTA 5 received a patch towards the end of last week. The patch, version 1.09, brought with it a few improvements to Heists and plenty of other fixes. Rockstar has released patch 1.09 (1.23 PS3 and Xbox 360) for all versions of GTA 5 to help make the Heisting experience better for all. The ‘auto-invite’ […] Deals with Gold is back for the week of March 30 with discounts on Diablo 3 Reaper of Souls: Ultimate Evil Edition, Dragon Age: Inquisition, The Lego Movie Videogame, and others. Xbox Live Gold members get a few good deals this week to spend money on. A large assortment of The Lego games is on […] Patch 1.09 for GTA 5 has indeed removed the parallax occlusion mapping effect, but has in turn improved the game’s overall framerate – at least on PlayStation 4. Earlier last week a YouTube video came to light and showed what appeared to be the removal of effects from GTA 5 after applying patch 1.09. The […] DirectX 12 may not be the miracle that some are believing it to be, at least not when it comes to improving the resolution of Xbox One ports. Damien Monnier, a senior game designer at The Witcher 3 developer CD Projekt RED has revealed through a Twitter conversation with fans that DirectX 12 may not […] Bloodborne has a nasty glitch that will let you duplicate all in-game consumables. The glitch was discovered by Kotaku and makes item duplication pretty simple. Note that doing this will trivialise a major part of the game’s challenge and that it will probably get patched soon. For this glitch to work, you’ll need to create […] The weekly reset to Destiny’s merchants, strikes, and reputation caps is here. The strike for this week is The Nexus on the Ishtar Sink on Venus. Void burn will be your ally/enemy for the Nightfall. The Juggler modifier is also available on both Heroic and Nightfall. Inferno Crucible mode also returns with Clash, and it […] Motivational Growth will soon be Steam’s first foray into selling movies that are not based around video games Steam will release its first, non-documentary film later today in the form of Motivational Growth. The film is a sci-fi comedy distributed by Hotline Miami publisher Devolver Digital, who has itself produced other game-centred documentaries before, and […] A Metal Gear Solid film is in the making at Sony Pictures. Deadline is reporting that Sony Pictures has closed a deal to make a film adaptation of Metal Gear Solid. The film will be written by Jay Basu, with Jordan Vogt-Roberts attached to direct. Michael De Luca is said to be heading production. There […] Inferno mode returns to Destiny this week. This time it’s Inferno Clash. The Inferno playlist will be back to The Crucible rotation in Destiny this week. Unlike last month’s Control, Clash will be the mode variant this time. The main changes Inferno brings to the game is the removal of the radar (mini-map), scoring is […] The Hundred Years War wasn’t ended by the superior forces of the French cavalry: it was ninja. Bladestorm: Nightmare Battlefield sim. Take control of dozens of unit types. You play a mercenary, fighting for both France and England, usually at your own discretion. Unit variations liven things up; Lady Lancers replace Knights. Vikings replace Swords. […] I realise that it won’t be *every* title that gets remade, but what will be left? Seriously? They’re not going to double-dip the HD stuff that they have out in stores (largely the good stuff) are they? @7 Of course not, but i’m not sure if it would be more financially benefical to them or not than the traditional retail/digi-distro route of releasing HD remakes. I think think this rumour is a bit off. Apply it to BC on the PS4, and I think you have it. Unless Sony can make and put new games on it that are beyond the PS3 systems limitation(effectivly put it in the next gen level), this is just silly. It would be like perfecting something your going to throw away. When the next gen gets here, then what? And next gen begins for Sony/MS in a year. This makes very little sense as a PS3 BC app. Way too much investment for a aging system, in third place. PSx and even PS2 games don’t stand up to the test of time very well Lex. Sure the ones with HD gloss overs are ok. But, esp the early days of 3D, were a bit…ugly. It is often that we remember those games with rose tinted glasses. SNES, TurboDuo, NeoGeo games(8 and 16bit games in general) hold up graphicly better then much of what was on PSx. I think a lot of gamers would be turned off by these games unless they were cleaned up. The lack of AA alone is a sight to see. For me, I have a fully BC PS3. I know most don’t. But this many years into a gen, I doubt too many gamers are clamoring for BC. A few high profile HD remakes are more then good for most folks. BC is a big deal as a generation transistions because we all have back piles of games that we realize we won’t be playing soon. I don’t know about you, but not only do I still have a PSx and a shelf full of games, but if I wanted a game, my local second hand store carries PSx hardware for 20usd, and games range from 1usd to 25usd. Just saying. If I had to have Loaded, Battle Arena Toshenden, or Ridge Racer one, I could get the actual physical games for a song. I really, really think this streaming applies to futrue hardware. Enabling BC on PS3 is a waste of time. The sands are nearly gone for the hourglass on this gen. If this was five years ago, would be worth more. But offering a past libary of PS, PS2, and PS3 games on PS4 would be significant. Esp if they can also include a cloud version of your retail copy with every new purchase. Buy a new copy of UC5 for PS4 at the store, and it comes with a code to add it to your streamable cloud collection…thats something worthwhile. Make that streamable version playable(at no extra fee) on your Vita…even better. Broadband infracstructure is not enough to support PS4 even look at Galkai if you have 5MBs you get XBox 360 on a standard TV quality which mean you would need atleast 20MBs to even push that farther. Infrastructure needs to be improved before cloud gaming can do that type of streaming. I maintain roughly 15-20 mbs on my connection for my ps3 so that’s actually perfect for cloud gaming on my end. The main thing to realize is that yes it won’t be applicable for everyone but it still will be available for the one’s who want/need it. If you look at what Sony’s goal is to have a various amount of way to get to the consumer, then this strategy make’s perfect sense. We also should note that if this gen is coming to an end this is the perfect time to experiment with this sort of technology. Sure, we can say this would be perfect for ps4 but what about all the glitches and work around that need to be perfected? Do we want to go into next gen hating Sony for making a system with untested features or do you want to be like MS with the original Xbox testing live on the existing console before bringing it to the newer one? I think that this is a great opportunity to increase software capabilities and to properly migrate into the next gen of console gaming. This will probably be ok for PS2 games, but if you have to play PS3 games this way I’m going to be very dissapointed. Onlive / Gaikai are fine for casual gamers but plenty of us can see the significant drop in visual fidelity. I think this Gaikai service is more for the vita than it is for the gamer who plays at home because we can just hook up our PS3 to play our games on our TVs. Gaikai is a service that is more about playing a game off your browser on portable devices than that off your PC assuming you have a PC that can play current gen games. What Lex said is right. The xbl offerings when it first came out were a pale shade of what we have today. Keeping it simple for the sake of this post, but there wasn’t any Xcross game chat, for example. Wasn’t much a of a friends system for another example. I have been a paying live member from the november it launched with Mechassult. The xbl service has grown and evolved over the years. So, in that way they have indeed perfected it. Worked out the bugs and ironed out the kinks and all of that. They made it better. Okay , every feature mentioned is great, but if they are going to buy the company, then eventually they should bring forth the “ultimate” feature cloud gaming can provide, ie. playing ALL PC GAMES on your playstation. I know it will require a good internet connection ( I only have a 512Kbps connection , very pitiful I know )but many people have the required connection for it. I think if implemented, this can be the greatest feature ever to grace the consoles. Although I am less than hopeful in this regard. Stealth drivel? Sorry I didn’t reply as soon as you liked master I was doing something constructive with my time such as working. But, in the end I think 99% of the people who read what I had to say understood it perfectly with you being in the 1%. I have nothing further to prove to you lad because this was actually a constructive conversation until you joined in. If you can no longer further understand the innovation I am speaking on in regards to perfecting a technology. Well…. To bad others have gotten it. What I don’t understand is why would you use it as an example. Xbl was a complete service on the original. Nxe was a logical continuation. At the time PS2 had barely any online, MS managed to release a complete one, unfortunately for you. It wasn’t defensive in the slightest. It was a comparison of a generation hop. You can’t claim XBL was complete when xbox had a 4 year run. You can’t claim it was complete especially with how much more support and features it got on 360. If it was complete then there would have been no changes at all when they migrated it over to this gen. Not everything is a fight for a platform you know? I am stating things that should be obvious with technology and how it develops. This move for optional cloud based gaming is perfect for testing bandwidth latency to a larger user base and how to deliver more to the consumer. And, that is again if this rumor is true that these arguments/discussions can even be validated. See, mock PC all you want but this is where it trumps consoles. I can play all of my old games. If I build another new PC tomorrow, I’ll still be able to. Heck I’ve even been playing Diablo 1 lately (it’s as good as ever). @40, I can barely play some modern games on mine, everything wants a fight. BF3 crashes every 5 mins & lags like hell, L.A. Noire is stuck at a sync screen, Borderlands crashes every time I go to another area, & everything else either has the odd crash or intolerable lag spikes. Have a Core 2 Quad (Q6660), a Radeon 5670 & 3GB of RAM, nothing earth shattering but it SHOULDN’T have any problems with games but the problems keep on coming. CJ, r you still running Vista? Cause we have the same problem on our older PC. Could also be other issues like outdated drivers, even a video card w/outdated shaders. And if your running 3GB(strange number because ram is mostly in sets of 2), that could be a major problem for newer games. RAM is cheap and easy to upgrade. And in the same way a PS3 won’t be able to run a PS4 game, hardware gets dated. PC or console. As top tech move forward, you need the tech to run them. PC or Console. It just sounds to me like your in need of a PC upgrade. How old is your PC? Mine is 4 or 5 years old, not sure which, but I play Diablo III on medium settings still. WoW on Max. Dirt Showdown on medium. And Ridge Racer on Medium. KoA on medium high. And Medium is right around PS3 level graphicly, ‘cept I am pulling in 50+fps and more most of the time. And what Silk said stands, I can play games from years and years ago. I am playing a Sprint Car Racing game from early PS2 gen for my PC. It runs in 1080p, full screen AA, high glossy textures, and more fps then you are ever going to need. It looks better then anything on PS360 today. And I also own the same exact game for my PS2 where it looks like crap. PC gaming is full of perks. The downside, once in awhile you have to upgrade to keep hardware new if you want to play new games. I have already narrowed down my top choice for my next PC, will be getting it this July. It will cost me 550usd. It will last me another four or fives years. I bet PS4 and xbnext cost are in the same ball park, maybe higher. Said it before, will say it again(just because it annoys some people and that fun just kidding lol ) Gaming in the console world is like swiming in the kiddie pool. When your all growed up, get a PC. @41,42 I’m sure I could rebuild that machine and have it working properly in under 2 hours. None of my machines have ever had issues.. It’s a good point though, consoles have a set build and OS installation so can’t go wrong there. PC’s only behave if you know what you are doing. Problem is likely between desk and chair (no offense CJ!) #39 – Yeah, well it was complete. I can claim it based on the simple fact that nothing was in testing stages. Nothing, see. Not a single online network had more capabilities in 2002, Steam was in beta stages. Xbl was even delayed until 2002, Combat Evolved didn’t have internet multiplayer because of that. Funny really.. 4 year run has nothing to do with it.. and everything to do with the Xbox being unsuccessful commercially. I don’t even know where you got that from.. Impressive imagination, man. Dreamcast had a 2 year run. Sega Saturn had a .. what, 1 year run. Silly. It is esp silly to hide behind others when you can’t even elaborate on it’s features. But that’s beside the point. You’re making long arse posts full of inane bla bla bla. Not a jab, just saying. Nothing of what you said was constructive in any way. I’m under an impression that you believe a human can defy anything if he is being dense enough.. A rather deluded understanding of a ‘will’. And even more of a shame that you apply that to toys bought in a store. If this rumour is true, it could be argued that all of the psn services on the PS3 are simply a trail run for Sony…. Not a bad thing either, it’ll be interesting to see how it evolves for the next-gen. I was playing NFL 2K, online. I was playing Quake, Online. I was playing Unreal Online. I was playing Phantasy Star Online. I was playing Daytona USA Online. And I was playing Speed Devils Online on Dreamcast all before MS put out the Xbox. Sega also had a browser on Sega Saturn. MS defently helped shape online with xbox one, and evolve it over time. But not like they came up with the idea or even were first to do it. I like how you try to use the internet to derail others and try to establish a since of purpose in your life. However, as I have stated before every piece of technology is practically a beta for the next more improved one to come later. If you cannot understand that then all you truely want to do is troll others to get a response out of them. Personally i dont have anymore time to invest in your sad attempts of derailment. I have a programming exam to take and then on my way to enjoy the rest of my day. If this rumour is true it would be a excellent way to test the market and improved offerings for current and future tech. The irony.. A person who uses borderline theist statements applying them to toys.. You really don’t know what you’re talking about. If you say so. Tbh, this has a lot to do with the grammar, man. You’re my practice. I try to establish a mediocre sense of grammar. It’s still pathetic, so please do not hesitate to point out the mistakes I make. lexp, you’re a lot like theevilaires. Good luck with the exam, chump. Next time try to word your agenda a tad bit better. Please keep debates, comments, et al constructive and cease with the school yard banter, please. Please? Did I say please enough to make it happen? Seriously. Not agreeing with someone’s opinion is fine and dandy, just be nice to one another while doing it okay? No one gets out alive anyway, so why not? Thanks. @OG, Running W7 but the 32bit edition(Don’t ask, didn’t buy it myself) so 4GB is the limit & even all of that isn’t being used to its full potential & all my drivers are up to date. http://en.wikipedia.org/wiki/3_GB_barrier Perhaps a little but it would not prevent me from running the newest games on ultra if I had say, a GTX 680, but it would impact the max performance. I’d be more worried about the RAM bottlenecking me, I’m already unable to utilize the texture pack for Skyrim. The Lykan Hypersport, the supercar featured in one of Furious 7′s action set-pieces, will be a free download for Project CARS owners. To thank the fans for their patience throughout Project CARS development and several delays, developer Slightly Mad will be giving all owners one in-game car for free each month. The first car will […] Gameplay from the upcoming, Russia only, Halo Online has leaked online and it looks like a mix of Halo 3 and Halo Reach. Microsoft announced last week that a free-to-play Halo game is in development at Saber Interactive. The game will be available in Russia only, at least on launch. YouTuber Noble, with the help […] US retailer Best Buy is offering a free PlayStation Camera with the purchase of The Last of Us PS4 bundle. If you’re in the US, Best Buy is having a very good deal on PlayStation 4 systems at the moment. If you buy The Last of Us PS4 bundle, you’ll automatically get the PS Camera […] Dragon Age: Inquisition Jaws of Hakkon DLC has been given a release window for PS3, PS4, and Xbox 360. Jaws of Hakkon, the first story add-on to Dragon Age: Inquisition was released last week on PC and Xbox One. The release was a complete surprise, as there was no prior announcement. What was also surprising […] Rainbow Six Siege developers are about to livestream new gameplay footage. Come and watch with us. The livestream below starts at 7pm UK time/6pm GMT. Ubisoft will be showing new gameplay footage and will talk more about the operator system, which was revealed today. The footage will be from the PC alpha build. Expect more […] Call of Duty: Advanced Warfare Exo Zombies episode 2, Infected, has been shown off in a new trailer. The official trailer for Exo Zombies Infected is here with footage of the new gear and new enemies. All of which help set up the mess everyone’s making at Burger Town. John Malkovich and co are dropped […] Rainbow Six Siege will be getting a collector’s edition and it comes with a 120-page guide. The Rainbow Six Siege collector’s edition has been fully detailed. It’s called the “Art of Siege Edition” and will be available for PC, PlayStation 4, and Xbox One, priced £65. Here’s what you get: A copy of the game […] Rainbow Six Siege has a new trailer available explaining the operator system. Operators are what makes any Counter Terrorist Unit and you will get to choose each of them individually before assembling a team. Any operator you choose will not be available for others though, so planning ahead will be crucial. The new trailer shows […] Spotify has arrived on PlayStation 3 and PlayStation 4. The Spotify app is now available in 42 countries on PSN. The app was part of last week’s firmware update and can be found under PlayStation Music. Anyone can download it, as it doesn’t require PlayStation Plus. You can use your PSN account to subscribe to […] The weapon balance in Battlefield Hardline is causing a controversy among the players. Are some weapons too powerful, or are other not powerful enough? Westie has been playing Battlefield Hardline since it the day it came out and he has some opinions about the state of weapon balance as it stands right now. Westie also […] Battlefield Hardline has defended the No. 1 spot in the UK Charts against Bloodborne’s impressive numbers. The UK Charts for the week ending March 28 show Battlefield Hardline continuing to hold the top spot despite dropping 43% in sales. Bloodborne achieved the No. 2 spot and came only 22,500 copies short of becoming number 1. […] Halo 5 is coming in October. Are you ready? Halo 5: Guardians has been slapped with a release date of October 27. Microsoft and 343 Industries also released a new trailer to mark the news; check it out below. “The Master Chief. Spartan Locke. Who is the hunter and who is the hunted?” Microsoft said […] In a weekend where favourites crashed out and non-US teams took a beating, Denial stepped up to take the title and $400,000 prize Denial have beaten Revenge to win the Call of Duty Championship 2015, claiming a $400,000 prize. Taking place in downtown Los Angeles, 32 of the best teams in the world battled it […] Advanced Warfare’s Ascendance DLC is looking pretty sweet in these two new videos. The Call of Duty Championships this weekend have given our very own Arekkz a chance to check out the new Ascendance DLC coming this month. Take a look at all four new maps as well as the cool new grapple ability (which […] Zombies mode gets an exo-kick up the ass with Advanced Warfare’s second DLC drop, Ascendance. When Call of Duty: Advanced Warfare’s Ascendance DLC drops this week, players will be going up against some tougher challenges in Exo Zombies mode. “It’s all zombies, all of the time,” says High Moon Studios Matt Tieger, head of the […] You know, Lester isn’t as soft as he lets on, at least in these two GTA Online videos he’s not. The first one below is from YouTube user 10Phoenix01 Gamer, showing Lester kick a guy’s ass. It’s apparently punishment for running over the player – at least that’s the way it appears. A second video […] ArenaNet has posted information on the Guild Wars 2 website explaining how crafting mastery, and crafting a legendary weapon, will work in the Heart of Thorns expansion. There’s also information on the new Map Bonuses system, which will make acquiring crafting materials a more “directed activity” and streamlined experience. The new system will also add […] Cities: Skylines players can now fly over their creations thanks to the Flight Cimulator mod. Created by Ulysius and available through the Steam Workshop, the mod allows the user to simulate flight through simple controls. According to the mod notes, it is still a work in progress as Ulysius plans to add building collisions , […] Sony has announced the addition of AMC to its PlayStation Vue service, which soft launched in Chicago, New York City and Philadelphia earlier this month. Those who use the service can now get their Better Call Saul and The Walking Dead fix, and also watch the Sundance channel, WEtv and IFC. AMC and WEtv are […] Thanks to Roystan Ross and the Unity engine, you can play the first level of Super Mario 64 in your browser. This little nugget came to my attention yesterday, and unfortunately it became lost on my worksheet. Better late than never, I suppose. Anyway, the level is free-to-play and if you don’t wish to play […] Valve has said its Discovery Queue has increased product page views across Steam by 30% since the company launched the Discovery Update. According to Valve, 75% of those views come from the Discovery Queue, and 16% of product views can be attributed to the Discovery Queue. Even Steam Tags clicks have increased. The system is […] The next content update for Halo: The Master Chief Collection will “address a variety of issues across the game,” according to 343 Industries, including specific improvements to ranking. New quit and betrayal penalties are also in the works as the development team prepares to roll out ranks to additional playlists. According to 343, the latest […] A 2K Games sale is going on this weekend on the Humble Store with up to 83% off on select titles. Games on sale include Evolve, Bioshock, Civilization and other franchises. Plus, Spec Ops: The Line can be yours for free with the purchase of any -2K title on sale. To see the full list […] Tickets to Dota 2 The International 2015 are now sold out, which shouldn’t surprise anyone. The tickets went on sale in two phases starting March 27. Phase one sold out in six minutes, and phase two sold out in four minutes. Each round of sales offered the same quantity of General Admission tickets priced at […] A new Battlefield 4 drop is on the horizon, and to give you an idea of what to expect, we have a video for you below featuring information on the Weapon Crate DLC. According to Battlefield expert Westie, players can expect five new weapons along with the return of the Gun Master game mode. The […] Obsidian Entertainment plans to release a Pillars of Eternity patch next week to combat issues users have reported. Until the patch is released, the developers have posted workarounds for some of the most common issues. The issues reported span framerate drops, inability to launch the game unless in administrator mode, crashes on 32-bit machines, animal […] Erron Black, the gunslinger which was outed for Mortal Kombat X in the achievements listing last week, was featured in the latest livestream from NetherRelam Studios yesterday evening. Along with gameplay, fatalities and variations for Black, the developer also provided a look at gameplay for: Ermac vs Mileena; Ermac’s brutality and fatality moves; Lui Kang […] The Legend of Zelda franchise producer Eiji Aonuma is featured in the latest video update on the status of The Legend of Zelda for Wii U, stating a 2015 release is no longer a “number one priority” for the team. While Aonuma never specifically says the game has been delayed into 2016, the announcement confirms […] Destiny’s senior gameplay designer Josh Hamrick announced on Twitter overnight he would be leaving the company in a week’s time for Bethesda. Hamrick joined Bungie in 2009 after working two years at Midway Austin, where he created multiplayer maps, modified single-player levels, and other designer functions. He was in charge of fixing bug in code […] Just settling down to the Call of Duty Championship this weekend? Here’s a rundown of today’s matches and what else to expect over the next three days. The Call of Duty Championship is taking place in LA this weekend until Sunday, with 32 four-player teams battling it out for a prize pot of $1 million. […] Sony has released a video for MLB 15 The Show which provides a look at graphical improvements made to the game. Along with the visual upgrade over MLB 14 The Show, the game contains new minor league stadiums, dynamic sun generated in real-time, and upgraded grass patterns which reflect each stadium’s unique look. MLB 15 […] Valve has said it will offer the HTC Vive Developer Edition for free to qualified developers in an effort to buoy projects before the tech launches commercially. Surgeon Simulator developer Bossa Studios and The Room studio Fireproof Games are just some of the developers which already have a free Vive in-hand. According to Valve’s Doug […] Some gameplay footage of MotorStorm’s off-road buggies in DriveClub has surfaced. Pictures of the buggies were shown on the Japanese PlayStation Blog earlier this month, which considering the game was developed by Evolution Studios – which developed MotorStorm – this isn’t too much of a surprise. The buggies were first spotted by Videogamer, which pulled […] The TV sport for Mortal Kombat X has been released, and not only does it contain a “spontaneous fight circle” taking over an entire city, but it features the System of a Down track Chop Suey. Mortal Kombat X will be released on PC, PlayStation 3, PS4, Xbox 360 and Xbox One April 14. The […] A progression bug in Bloodborne is in the works, according to Sony and From Software. The issue occurs when players activate a multiplayer session in the Forbidden Woods using the Sinister Resonant Bell or Small Resonant Bell. It also appears the Lunarium Key won’t appear because of the multiplayer bug, and without the key you […] The Yo-Kai Watch IP has sold over 7 million copies, according to developer Level-5. The figure included both physical and digital download sales. Yo-Kai Watch 3 will be unveiled during Level-5 Vision 2015 next month. The first title is in the works for the west but is still without a release window. Thanks, Gematsu. In case you were worried or anything, Sony has once again obtained the Bloodborne trademark. Earlier this week it was revealed that Sony mistakenly abandoned the Bloodborne trademark along with four others registered with US Patent and Trademark Office: Guns Up!, Kill Strain; How Games Were Made to Sound, and No Heroes Allows: No Puzzles […] New PC screenshots of GTA 5 have been released along with word of a new trailer coming on Monday. The screens below are from the PC version and you can view them in 4K glory over on Rockstar Newswire. The PC version of GTA 5 releases on April 14. PlayStation users in Europe will soon have its own a PSN Service Status Indicator. It was released earlier this month in North America. The indicator makes it easier to check whether PlayStation services are down or running as planned. This includes account management, PlayStation Now, the store, social services, etc. Sony told Eurogamer the service […] Bioware is unable to discuss when the Jaws of Hakkon DLC for Dragon Age: Inquisition will arrive on platforms other than PC and Xbox One. According to various tweets from executive producer Mark Darrah, due to the exclusivity contract between EA and Microsoft, the studio is unable to announce a release date for PlayStation 3 […] Square Enix offering another mystery bundle to customers in the UK, which comes with five mystery PC games for £3.99. As before, customers will be unaware of the games they are purchasing in the mystery bundle, but the bundle contains triple-A titles worth £40 combined. One of Square’s previous mystery bundles contained Tomb Raider, Just […] Shadow Tower, the first-person action-RPG developed for the original PlayStation by From Software, will be released on PlayStation Network. In the 1998 title, players took on the role of a mercenary who has returned home to the Holy Land of Zeptar to find the place has been sucked into the Underworld. He must use the […] PlayStation TV has received a price cut in the UK. After several retailers started offering the console for less than the RRP of £84.99, users on DealSpwn began to wonder whether this is an official price cut, and not just regular deals or stock clearance. Sony later confirmed the new price of £44.99. “Starting from […] You can download Forza Horizon 2 expansion Fast & Furious starting right now. Forza Horizon 2 Presents Fast & Furious is available to download now through Xbox Live for Xbox One and Xbox 360. The expansion is standalone, so you don’t need to own Forza Horizon 2 to play it. It’s also free from now […] The 20th DLC for PayDay 2, the Butcher’s BBQ Pack, is now available on Steam. The DLC will run you $4.99/€4.99 and features: Piglet Grenade Launcher, 12G Steakout Shotgun and Mk1 Flamethrower Molotov cocktails and incendiary ammo Four new masks, patterns, materials and achievements The Butcher’s BBQ Pack is another co-development between Overkill and Croatian […] Amid the current turmoil between Hideo Kojima and publisher Konami, one studio has offered the legendary designer a position. Lords of the Fallen developer Deck 13 took to Twitter to extend a job offer to Hideo Kojima. Dear Mr. @HIDEO_KOJIMA_EN In case you are currently searching, we have an open position as Head of Game […] The question on every Destiny player’s lips today. And the answer, supplied by resident Destiny expert Paul Davies, is… Yes! We asked Paul whether or not he thought Xur’s Exotic weapon this week was worth the 23 Strange Coins. Here’s what he said: “It was already a great gun to own for PVP owing to […] According to Final Fantasy 15 director Hajime Tabata, the main cast of the game is all-male because it makes the game “more approachable.” Final Fantasy 15 director Hajime Tabata spoke to Gamespot about the reason for his choice of making the core cast an all-male affair. “Speaking honestly, an all-male party feels almost more approachable […] Blizzard has given Hearthstone expansion Blackrock Mountain a solid release date. Hearthstone’s Blackrock Mountain adventure pack will be released April 2 in the Americas region, and April 3 in Europe, Korea, Taiwan, and China. Blackrock Depths is the first wing to be released, others will follow one week apart. Other than the 31 new cards, […] If you’re having issues loading your Bloodborne save after applying firmware update 2.50 to your PS4, this should help you out. Reddit user KBALLZZ encountered an issue after installing update 2.50 on his PlayStation 4. Bloodborne started reinstalling the day one patch again and when it was done he couldn’t continue his game or load […] Sony is offering a 10% discount coupon to anyone looking to buy games on PlayStation Store this weekend. Sony’s latest discount coupon code is here. You’ll receive 10% off your cart total when buying from the PSN Store. The offer is not valid on purchases made on PS Vita, PlayStation TV, PSP, or in-game stores. […] Dark Souls 2: Scholar of the First Sin will offer returning customers a chance to upgrade at a discounted price. Those who already own Dark Souls 2 on Steam and are interested in picking up the Scholar of the First Sin edition will be happy to know that publisher Bandai Namco is offering them an […] Insight is one of the currencies in Bloodborne, but it’s also a mechanic that affects the gameplay. There are MASSIVE SPOILERS below, so turn back now or one of Bloodborne’s gameplay mechanics will be SPOILED for you. Just like Blood Echoes in Bloodborne, Insight is used to purchase certain items from vendors in the game. […] The second phase of the April update for Xbox One is now open to members of the Preview programme and and it looks like there are even more features in store. Phase one of Xbox One’s April firmware update started a few days ago with improvements to party chat and achievements notifications. Today, phase two […] As of patch 1.8 for GTA 5 on PlayStation 4 and Xbox One, a few graphical issues have cropped up leading some to believe there has been a stealth downgrade to the game’s overall graphics. Over the past couple of days, Reddit went nuts over a video showing what appears to be a downgrade to […] Xur: Agent of the Nine has arrived at The Tower in Destiny to rid you of your Strange Coins. Xur: Agent of the Nine has once again made it to Destiny’s Tower to sell you Exotic weapons and gear in exchange for Strange Coins and Motes of Light. For this weekend, Xur can be found […] Destiny is finally getting the vault space upgrade players have been begging for almost since launch week. Destiny players can currently use vault space to store 20 pieces of amour, 20 weapons and 20 general item stacks. In the latest Bungle Weekly Update, the developer revealed that as of patch 1.1.2, due before House of […] Half-Life 2: Update will be available tomorrow, and thanks to the modding community, those who own the vanilla version of the game can apply a visual update to the 2004 title. The comparison video shows you the differences between the original version, and the version with Half-Life 2: Update applied. Here’s what the mod includes: […] You can now pre-download the free-to-play Neverwinter MMO on Xbox One. The game launches on March 31, but you will still need an Xbox Live Gold account to play it. Based on the Dungeons & Dragons franchise, the game can be downloaded from the Xbox Store.
{ "pile_set_name": "Pile-CC" }
Multiple compound quality index for cold-smoked salmon (Salmo salar) developed by multivariate regression of biogenic amines and pH. Production of biogenic amines during chill storage of 12 lots of cold-smoked salmon was studied. These data allowed for a multiple compound quality index to be developed by multivariate regression (partial least square regression). The quality index was based on concentrations of cadaverine, histamine, putrescine, and tyramine and pH and showed good correlation with sensory assessments. Biogenic amines were indicators of spoilage rather than casual agents of spoilage off-flavors. Four different biogenic amine profiles were found at the time of spoilage in cold-smoked salmon. These were the results of differences in the spoilage microflora. Histamine was detected above regulatory limits but below toxic levels. Measurements of salt and dry matter for calculation of water phase salt could be substituted by rapid water activity measurements.
{ "pile_set_name": "PubMed Abstracts" }
I love that menacing stare she has. You really know how to get faces right!
{ "pile_set_name": "OpenWebText2" }
Q: Thinking Sphinx Search Box I'm trying to get Thinking Sphinx running on my site but I'm not sure how to set up the search box and button for the index page. I have in my model: define_index do indexes :name indexes description where "approved = 'true'" end In my controller: def index @businesses = Business.search params[:search] end And in my index.html.erb I installed the autocomplete plugin and have: <h3>Search Business</h3><%= text_field_with_auto_complete :name %> I just don't know how to link up my text box with Sphinx. Do I need to create a button? Thanks for any help. A: Ryan Bates has a Railscast on Thinking Sphinx that should set you in the right direction. You can view the source code for the form in Ryan's example: <p> <%= text_field_tag :search, params[:search] %> <%= submit_tag "Search", :name => nil %> </p>
{ "pile_set_name": "StackExchange" }
The present invention is directed to networks used for forwarding information packets and, more particularly, to networks which incorporate multi-protocol label switching (MPLS). Networks that use multi-protocol label switching (MPLS) permit the transfer of packets through the network via an end-to-end connection path that is determined before the packets are transferred through the network. When a packet enters the MPLS network, the packet is assigned a “label” by an ingress router, also known as a label edge router (LER), which also attaches the label to the packet and forwards the packet to the first one of a series of routers, known as label switch routers (LSRs), that forward the packet along the connection path. The label includes information that is used by the first router to determine the next router to which the packet is to be forwarded. The first router then receives the packet, removes the label, and then attaches a new label that is to be used by the next router to determine the subsequent router to which the packet is to be switched. This process is repeated for each router located along the connection path. Namely, each router along the path receives the packet with a label attached by the immediately preceding router, uses the information contained in the label to determine the next router to receive the packet, strips the current label, applies a new label that is to be used by the succeeding router, and then forwards the packet to that router. The process ends when the packet is delivered to the last router along the path, also known as an egress router or an LER. Because labels are used to determine how each router forwards packets along the connection path, also known as forwarding traffic, the connection path is also known as a label-switched path (LSP). Each label contains information about only a portion of the LSP, and each router or switch need only store information regarding the route corresponding to a particular label and store the next label to be attached to the packet. The specific routes that comprise the LSP are typically determined based on a variety of reasons, such as to guarantee a certain level of performance, to route around network congestion, or to comply with the requirements of the specific application. One or more backup LSPs are also typically determined at the same time when a primary LSP is set up. The routes for the backup paths may be determined either statically during the primary LSP set up or may be determined dynamically only upon a primary LSP failure. The backup paths typically have the same bandwidth as the primary LSP. When a failure occurs in the network, such as when a router failure, a router interface failure or a link failure occurs, the packets that were carried over the failed LSP are switched over to one of its corresponding backup LSPs. Sometimes, however, the network failure may also cause a failure of the primary LSP and its backup LSP. The present MPLS network recovery schemes do not address such situations. It is therefore desirable to have a traffic restoration scheme that handles such situations in order to increase network availability and service availability. It is also desirable to have such a scheme create one or more replacement LSPs that carries as much of the traffic as possible that was carried by the failed LSP. It is further desirable that the restoration scheme creates replacement LSPs by considering efficient utilization of network resources and using traffic engineering policies.
{ "pile_set_name": "USPTO Backgrounds" }
Mammalian sex-determining factors with homology to DNA binding proteins are required for splicing, according to a study by Paolo Sassone-Corsi and coworkers at the Université Louis Pasteur (Strasbourg, France). Examination of high mobility group (HMG) domain containing SRY and Sox proteins demonstrated a surprising but clear association with splicing complexes. FigureSRY (red) colocalizes with a splicing factor (green) in nuclear speckles.Sassone-Corsi/NAS SRY, the testis-determining factor found on the Y-chromosome in mice and humans, is one of several Sox family members involved in sexual development. It is known to bind DNA, in support of the proposal that HMG domain proteins act as architectural facilitators for building transcription complexes. Sassone-Corsi\'s group thus expected to find Sox proteins colocalized in the nucleus with transcription factors. Instead, SRY and SOX6 proteins associated with splicing factors in nuclear speckle domains. Depletion of SOX6 in HeLa cell extracts blocked splicing of multiple substrates, and expression of the HMG domain only of either SOX6, SOX9, or SRY restored splicing in the extracts, indicating functional overlap of the proteins. The group\'s results provide the first association between splicing and sex determination in mammals. The *Drosophila* genes *transformer* and *sex-lethal* encode mRNA splicing factors required for sex determination in flies, indicating that regulated splicing of sex-determining factors may be evolutionarily conserved. According to Sassone-Corsi, to complete the connection "the next step is to identify natural physiological substrates of the Sox and SRY proteins." He thinks the Sox proteins may control regulated splicing by determining which spliceosomal complexes are formed in different cell types, analogous to the way transcription factors can regulate the basal transcription machinery. ▪ Reference: Ohe, K., et al. 2002. Proc. Natl. Acad. Sci. USA. 99:1146--1151. 11818535 SRY (red) colocalizes with a splicing factor (green) in nuclear speckles. Sassone-Corsi/NAS [^1]: <[email protected]>
{ "pile_set_name": "PubMed Central" }
One of my favorite Martin Luther King Jr. quotes is: “There is nothing more dangerous than sincere ignorance and conscientious stupidity.” And I am just going to come out and say it: Most diversity and inclusion initiatives fall into the former category: sincere ignorance. They look and sound great. They are usually well-meaning too. But a vast number of these initiatives prove ineffective or fail within a year or two. Why? Sincere ignorance: Start talking to the people who put them together, and more often than not you realize that the details and depth of strategic thinking behind them is as thin as the paper they are printed on. This is not surprising when you consider that most diversity and inclusion initiatives are developed to comply with corporate governance and self-regulation (often under the heading “Corporate Social Responsibility” or CSR). For example, in most workplaces, these initiatives are usually poorly funded tactical inclusion initiatives disconnected from broader, more substantial, and well-funded general training programs. They may be well meaning, but they are misguided in their approaches. They are also often outdated in their ideas. They cater to the status quo. They assume existing and potential employees targeted by these programs must change to fit into the current workplace culture. They ask and answer one question: How can we acquire, train, and change diverse employees for them to succeed and thrive in our culture? If we keep asking that question – or any question – over and over again, why should we expect a different result? Watch on Forbes: As Thomas Wedell-Wedellsborg stated in the Harvard Business Review, this is exactly why companies are bad at figuring out what their problems are and end up solving for the wrong things: “What they struggle with, it turns out, is not solving problems but figuring out what the problems are. In surveys of 106 C-suite executives who represented 91 private and public-sector companies in 17 countries, I found that a full 85% strongly agreed or agreed that their organizations were bad at problem diagnosis, and 87% strongly agreed or agreed that this flaw carried significant costs. Fewer than one in 10 said they were unaffected by the issue. The pattern is clear: Spurred by a penchant for action, managers tend to switch quickly into solution mode without checking whether they really understand the problem.” What we need to do, argues Wedell-Wedellsborg, is reframe the problem. Actually, when it comes to diversity and inclusion, the problem starts with using the word “problem.” Diversity and inclusion should be about “opportunity” – specifically growth opportunity. Here are five ways to rethink and reinvent the way you lead diversity and inclusion as a growth strategy:
{ "pile_set_name": "Pile-CC" }
/**************************************************************************** ** ** Copyright (C) 1992-2009 Nokia. All rights reserved. ** Copyright (C) 2006 Roberto Raggi <[email protected]> ** ** This file is part of Qt Jambi. ** ** $BEGIN_LICENSE$ ** GNU Lesser General Public License Usage ** This file may be used under the terms of the GNU Lesser ** General Public License version 2.1 as published by the Free Software ** Foundation and appearing in the file LICENSE.LGPL included in the ** packaging of this file. Please review the following information to ** ensure the GNU Lesser General Public License version 2.1 requirements ** will be met: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. ** ** In addition, as a special exception, Nokia gives you certain ** additional rights. These rights are described in the Nokia Qt LGPL ** Exception version 1.0, included in the file LGPL_EXCEPTION.txt in this ** package. ** ** GNU General Public License Usage ** Alternatively, this file may be used under the terms of the GNU ** General Public License version 3.0 as published by the Free Software ** Foundation and appearing in the file LICENSE.GPL included in the ** packaging of this file. Please review the following information to ** ensure the GNU General Public License version 3.0 requirements will be ** met: http://www.gnu.org/copyleft/gpl.html. ** $END_LICENSE$ ** ** This file is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE ** WARRANTY OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ** ****************************************************************************/ #ifndef CODEMODEL_POINTER_H #define CODEMODEL_POINTER_H #include <QtCore/QSharedData> // Since the atomic API changed in 4.4 we need to hack a little here // to make it work with both 4.3 and 4.4 until that is not required #if QT_VERSION >= 0x040400 # include <QtCore/qatomic.h> template <class T> class CodeModelPointer: public QAtomicPointer<T> #else template <class T> class CodeModelPointer #endif // QT_VERSION >= 0x040400 { public: typedef T Type; #if QT_VERSION < 0x040400 inline T &operator*() { return *d; } inline const T &operator*() const { return *d; } inline T *operator->() { return d; } inline const T *operator->() const { return d; } inline operator T *() { return d; } inline operator const T *() const { return d; } inline T *data() { return d; } inline const T *data() const { return d; } inline const T *constData() const { return d; } inline bool operator==(const CodeModelPointer<T> &other) const { return d == other.d; } inline bool operator!=(const CodeModelPointer<T> &other) const { return d != other.d; } inline bool operator==(const T *ptr) const { return d == ptr; } inline bool operator!=(const T *ptr) const { return d != ptr; } inline CodeModelPointer() { d = 0; } inline ~CodeModelPointer() { if (d && !d->ref.deref()) delete d; } explicit CodeModelPointer(T *data); inline CodeModelPointer(const CodeModelPointer<T> &o) : d(o.d) { if (d) d->ref.ref(); } inline CodeModelPointer<T> & operator=(const CodeModelPointer<T> &o) { if (o.d != d) { T *x = o.d; if (x) x->ref.ref(); x = qAtomicSetPtr(&d, x); if (x && !x->ref.deref()) delete x; } return *this; } inline CodeModelPointer &operator=(T *o) { if (o != d) { T *x = o; if (x) x->ref.ref(); x = qAtomicSetPtr(&d, x); if (x && !x->ref.deref()) delete x; } return *this; } inline bool operator!() const { return !d; } private: T *d; #else // QT_VERSION < 0x040400 inline CodeModelPointer(T *value = 0) : QAtomicPointer<T>(value) {} inline CodeModelPointer &operator=(T *o) { QAtomicPointer<T>::operator=(o); return *this; } inline T *data() { return (T *) *this; } inline const T *data() const { return (const T *) *this; } inline const T *constData() const { return (const T *) *this; } #endif }; #if QT_VERSION < 0x040400 template <class T> Q_INLINE_TEMPLATE CodeModelPointer<T>::CodeModelPointer(T *adata) : d(adata) { if (d) d->ref.ref(); } #endif #endif // CODEMODEL_POINTER_H
{ "pile_set_name": "Github" }
Q: The "Object" object in node console vs in web console I am relatively new to JavaScript and still trying to get my head around the prototypal inheritance. while trying to understand it I tried getting prototype property of Object object using Object.prototype in web console as well as in nodejs console. In web console it shows that the prototype property of Object object has an object with few members while in node the Object.prototype has an empty object. So my question is "is the Object object in node (console) different than the one in the web console because the are different javascript engines??" A: When you ask for Object.prototype in node console, it will simply show an empty object. This is merely a representation of the base object. It still contains all the functions and properties you would expect and that show up in the browser console. If you don't believe me, you can verify it yourself. Try typing Object.getOwnPropertyNames(Object) or Object.getOwnPropertyNames(Object.prototype) in your node console.
{ "pile_set_name": "StackExchange" }
Assessing the status of infection control programs in small rural hospitals in the western United States. Organized infection control (IC) interventions have been successful in reducing the acquisition of hospital-associated infections. Rural community hospitals, although contributing significantly to the US health care system, have rarely been assessed regarding the nature and quality of their IC programs. A sample of 77 small rural hospitals in Idaho, Nevada, Utah, and eastern Washington completed a written survey in 2000 regarding IC staffing, infrastructure support, surveillance of nosocomial infections, and IC policies and practices. Almost all hospitals (65 of 67, 97%) had one infection control practitioner (ICP), and 29 of 61 hospitals (47.5%) reported a designated physician with IC oversight. Most ICPs (62 of 64, 96.9%) were also employed for other activities outside of IC. The median number of ICP hours per week for IC activities was 10 (1-40), equating to a median of 1.56 (0.30-21.9) full-time ICPs per 250 hospital beds. Most hospitals performed total house surveillance for nosocomial infections (66 of 73, 90.4%) utilizing Centers for Disease Control and Prevention (CDC) definitions (69 of 74, 93.2%). Most also monitored employee bloodborne exposures (69 of 73, 94.5%). All hospitals had a written bloodborne pathogen exposure plan and isolation policies. CDC guidelines were typically followed when developing IC policies. Access to medical literature and online resources appeared to be limited for many ICPs. Most rural hospitals surveyed have expended reasonable resources to develop IC programs that are patterned after those seen in larger hospitals and conform to recommendations of consensus expert panels. Given these hospitals' small patient census, short length of stay, and low infection rates, further studies are needed to evaluate necessary components of effective IC programs in these settings that efficiently utilize limited resources without compromising patient care.
{ "pile_set_name": "PubMed Abstracts" }
Justin Bieber Justin Bieber (also known as Justin Beaver or more colloquially JB) is a Canadian singer, best known for his song Baby. He has gained many fans and haters alike over social media, and to this day is a controversial figure.
{ "pile_set_name": "Pile-CC" }
/* file: dbscan_dense_default_distr_step5_fpt_dispatcher.cpp */ /******************************************************************************* * Copyright 2014-2020 Intel Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. *******************************************************************************/ /* //++ // Implementation of DBSCAN algorithm container for distributed // computing mode. //-- */ #include "src/algorithms/dbscan/dbscan_container.h" namespace daal { namespace algorithms { __DAAL_INSTANTIATE_DISPATCH_CONTAINER(dbscan::DistributedContainer, distributed, step5Local, DAAL_FPTYPE, dbscan::defaultDense) namespace dbscan { namespace interface1 { using DistributedType = Distributed<step5Local, DAAL_FPTYPE, defaultDense>; template <> DistributedType::Distributed(size_t blockIndex, size_t nBlocks, DAAL_FPTYPE epsilon) { ParameterType * par = new ParameterType(); par->blockIndex = blockIndex; par->nBlocks = nBlocks; par->epsilon = epsilon; _par = par; initialize(); } template <> DistributedType::Distributed(const DistributedType & other) : input(other.input) { _par = new ParameterType(other.parameter()); initialize(); } } // namespace interface1 } // namespace dbscan } // namespace algorithms } // namespace daal
{ "pile_set_name": "Github" }
Magnetic devices are used in many applications, such as in magnetic stimulation devices, speakers and so forth. Magnetic devices tend to generate heat because of resistive losses in the coil(s) that generate magnetic fields(s), and the amount of heat generated is proportional to the amount of power consumed by the device. Thus, high-voltage magnetic devices that consume large amounts of power, such as those used in magnetic stimulation therapy, can become very hot when in operation. The environment in which the magnetic device operates—or the operating characteristics of the device itself—may dictate that the device operate under a certain temperature threshold. For example, in magnetic stimulation therapy, the temperature of a magnetic stimulation device used to generate a therapeutic magnetic field should be kept below approximately 41.5° C. to stay within certain regulatory requirements (e.g., FDA guidelines). If a magnetic stimulation device is to be operated at temperatures exceeding 41.5° C., such regulatory requirements dictate that the device manufacturer and/or health practitioner must meet additional guidelines to prove that operation of the device is safe. These additional requirements increase complexity of operation and overall cost, and are best avoided when possible. Conventionally, a magnetic stimulation device used for such therapy is used until it reaches a threshold temperature, and then the therapy is temporarily halted until the stimulation device cools. Such an arrangement therefore adds to the time required to perform a treatment, which is undesirable for both the patient and the health practitioner. Alternatively, a second magnetic stimulation device may need to be used (i.e., swapped with the first device when the first device reaches the threshold temperature) so as to continue the therapy without interruption while the first, overheated stimulation device cools. This arrangement is also undesirable because of the added expense associated with the purchase and maintenance of an additional magnetic stimulation device. Furthermore, additional time is required of the patient and health practitioner, as the second magnetic device will need to be set-up and/or calibrated to perform magnetic stimulation therapy on the patient. Because the set-up and/or calibration steps provide opportunities for operator error, requiring the operator to perform such steps multiple times may decrease the overall safety level of the treatment. Conventional cooling solutions typically involve the use of air or fluid cooling mechanisms. An air cooling mechanism may involve a fan that rapidly circulates cooled or room temperature air past the magnetic device. A fluid cooling mechanism may involve the circulation of a cool fluid past the magnetic device, where the fluid cools the device and is heated in the process, and then to a cooling mechanism, after which the fluid is returned to the magnetic device. Both mechanisms have several drawbacks. For example, both mechanisms require additional moving parts (e.g., fans, cooling mechanisms such as a refrigeration or heat exchange unit, etc.), which add to the cost and complexity of the magnetic device. Furthermore, the additional moving parts add to the potential for a device malfunction. An additional consideration of magnetic devices is acoustical noise generated by the magnetic coil of a magnetic device as the coil is energized. For example, when the coil is energized, it creates a strong magnetic field that, in many applications, rapidly changes in intensity. The changing magnetic field causes windings of the coil to experience hoop stresses that intermittently stress the windings, which causes a sharp acoustic click. Such noise is especially pronounced in magnetic stimulation devices, as the therapeutic magnetic fields are created by pulsing the stimulation device's coil. Such noise is problematic for patients, as the stimulation device is typically located in close proximity to the patient's head, and therefore the noise from the stimulation device may be uncomfortable. In addition, a health practitioner who is repeatedly exposed to such noise may be adversely affected. A conventional solution, placing earplugs in the patient's ears, is undesirable because it is an additional step to perform in the therapeutic process and does not solve the problem of the noise caused by the device in the treatment facility (e.g., physician's office, hospital, etc.). In addition, the use of earplugs is undesirable because some psychiatric or young patients may be uncooperative, and therefore the use of earplugs unnecessarily complicates the procedure. Thus, a conventional solution for the reduction of acoustical noise is the placement of noise reduction material around all or part of a magnetic device. Alternatively, a chamber containing a partial vacuum may be formed around the magnetic device, because a partial vacuum contains very few particles that may propagate a mechanical (sound) wave. However, such noise reduction techniques have the disadvantage of adversely affecting heat transfer for cooling. For example, the best noise reduction materials are fabricated to contain air pockets that do not transfer noise well. However, such air pockets also have the characteristic being poor conductors of heat. The same is true to an even greater extent in the case of a vacuum. Thus, if such a noise reduction technique is used, the magnetic stimulation device cannot be adequately cooled. Attempting to mitigate such a dilemma by placing acoustical material, or forming a partial vacuum, around a cooling system that is itself arranged around a magnetic device is undesirable because of the added size, cost and complexity of the resulting device. Conventionally, ferrofluids have been used to cool audio speaker systems, which is a lower voltage application when compared to a magnetic stimulation device or other high voltage magnetic device. A ferrofluid is a fluid with suspended ferromagnetic particles. The ferromagnetic particles can be influenced by the magnetic field created by the speaker so as to enhance fluid convection between the speaker and a heat sink to cool the speaker. An additional benefit of ferrofluids is that they can be used to cool a device while still performing noise reduction, because a ferrofluid typically does not support shear waves. Furthermore, a mismatch in sound velocity may also cause the reflection of some of the sound waves. Unfortunately, even the ferrofluid solution used in connection with speakers has disadvantages that may render it unsuitable for use with high voltage magnetic devices, such as a magnetic stimulation device. For example, the ferrofluid used in connection with speaker cooling, while a dielectric when exposed to normal speaker-level voltages, may be unable to maintain dielectric isolation at the higher voltage levels used in connection with a magnetic stimulation device. As a result, arcing or other problems may occur. Therefore, what is needed is a ferrofluidic cooling apparatus, system and method for high voltage applications. More particularly, what is needed is an apparatus, system and method for convectively circulating a ferrofluid to cool a high voltage magnetic device. Even more particularly, what is needed is an apparatus, system and method of using a ferrofluid to cool such a high voltage magnetic device while also mitigating acoustical noise.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Problems With linesearch and Bubblesort Im making a program in c++ that takes a few persons puts them in a vector with name and age and i got all the code down for it but i cant get it to compile properly. this is my code so far #include <iostream> #include <string> using namespace std; class person { public: string name; int age; void SetInfo(const string _name, int _age) //Här läggs den viktigaste informationen in { name = _name; age = _age; } int getAge(){ return age; } }; void bubblesort(person mylist[], int n) // Här startar Bubblesort funktionen { for (int i = 1; i<n; i++) { for (int j = 0; j<i - 1; j++) { if (mylist[j].getAge() > mylist[j + 1].getAge()) { person temp; temp = mylist[j]; mylist[j] = mylist[j + 1]; mylist[j + 1] = temp; } } } } int main() //Program start { person mylist[4]; //lista på personer mylist[0].SetInfo("Johan", 25); mylist[1].SetInfo("Nathalie", 20); mylist[2].SetInfo("Jessica", 60); mylist[3].SetInfo("Coco", 54); //anropar bubblesort() bubblesort(mylist, 4); int index = Linesearch(mylist, 25); if (index == -1) cout << "person ej funnen!"; else cout << "personen du letade efter " << mylist[index].name; cin.get(); return 0; system("pause"); } The problem i think is my knowledge since im new to programming and has only done it for 4 weeks. I put this code together from myself and from examples found online. So every answer will help me learn more :) EDIT: Still the same code added error message here. 50 39 C:\Skrivbordet\Skola\ccxcxcxcvx.cpp [Error] 'Linesearch' was not declared in this scope A: A C++ program starts out fairly blank, without any function to use at all except for main. (There is more to say on that. I'm sure comments are going to point that out. ;)) You include headers for <iostream> and string, so you can use all of the functions declared in them, which is a good thing! Lots of stuff is already written for you; you don't have to find out how to write text out to your screen, for example. All other functions are to be written by yourself -- which is also a good thing! After all, what would be the fun of a programming language where you cannot do the stuff you want because "there is no function for it". You already wrote (or possibly copied) one custom function: bubblesort. From that point on, you can use it anywhere you want. It is not in the standard headers, but the compiler sees it as a general function nevertheless; all it has to do is read your code top to bottom, and store the names of new functions when it encounters them. On to your problem: Linesearch is the name of a function. The compiler assumes that because it is followed by a parenthesized argument list. So, it looks up Linesearch in the standard headers, finds it's not in there, then goes through your source code -- and still does not find it. Presto! error. The solution is to use an existing standard function that does what you need, if there is one (I cannot recall), or write the function yourself and place it in your source code somewhere above main. (It needs¹ to be above the first function in which it is used, and in this case that is main.) ¹ I'm telling only a half-truth there; but I guess before expanding on that in turn, you are better off reading a C++ primer first.
{ "pile_set_name": "StackExchange" }
Large volume sample stacking with EOF and sweeping in CE for determination of common preservatives in cosmetic products by chemometric experimental design. This study proposes a capillary electrophoresis method incorporating large volume sample stacking, EOF and sweeping for detection of common preservatives used in cosmetic products. The method was developed using chemometric experimental design (fractional factorial design and central composite design) to determine multiple separation variables by efficient steps. The samples were loaded by hydrodynamic injection (10 psi, 90 s), and separated by phosphate buffer (50 mM, pH 3) containing 30% methanol and 80 mM SDS at -20 kV. During method validation, calibration curves were found to be linear over a range of 5-100 μg/mL for butyl paraben and isobutyl paraben; 0.05-10 μg/mL for ethyl paraben; 0.2-50 μg/mL for dehydroacetic acid; 0.5-70 μg/mL for methyl paraben; 5-350 μg/mL for sorbic acid; 0.02-450 μg/mL for p-hydroxybenzoic acid and 0.05-10 μg/mL for salicylic acid and benzoic acid. The analytes were analysed simultaneously and their detection limits (S/N = 3) were down to 0.005-2 μg/mL. The analysis method was successfully used for detection of preservatives used in commercial cosmetics.
{ "pile_set_name": "PubMed Abstracts" }
Laparoscopic-assisted vaginal hysterectomy: American Association of Gynecologic Laparoscopists' 1995 membership survey. A questionnaire was mailed to all members of the AAGL to determine the current performance of laparoscopic-assisted vaginal hysterectomy (LAVH), and to assess the relative frequencies of techniques and complications. Answers of the 1092 members who responded were entered into a database computer program and analyzed. The analysis revealed 14,911 LAVHs performed by 767 members. Complication rates appeared to be in the same range as those reported for vaginal hysterectomy and total abdominal hysterectomy. Inferior epigastric injury was the most common complication. Physicians showed a shift in their practices away from abdominal hysterectomy after they learned LAVH.
{ "pile_set_name": "PubMed Abstracts" }
Rudolph, Charlie Brown not for kids anymore? The children's holiday special "Rudolph the Red-Nosed Reindeer," airing again Dec. 1 on CBS, turns 40 this year. It marked the beginning of a golden age for Christmas television. For three straight years, American TV went on a tear of serious holiday mythmaking: 1964, "Rudolph the Red-Nosed Reindeer"; 1965, "A Charlie Brown Christmas"; 1966, "How the Grinch Stole Christmas." The programs in this yuletide triptych are the only TV shows made during Lyndon Johnson's administration that still play on network prime time. They were produced for children, but they live on today at the center of a thriving nostalgia industry aimed right at the hearts of those too old to believe in Santa. As any Scrooge will tell you, Rudolph isn't real. He was invented in 1939 as an advertising gimmick for a mail-order catalogue and immortalized 10 years later in a hit song recorded by Gene Autry. It was the NBC-TV special that fully fleshed out the story, however. The various images of Santa, Mrs. Claus, the North Pole, elves, and reindeer that had been floating around in the culture for some time, were finally standardized here. The show earned a 55 share, and Rudolph became more famous than Bambi. CBS answered the following December with "A Charlie Brown Christmas." It was a more modern look at the holiday. Delivering monologues like, "I think there must be something wrong with me, Linus. Christmas is coming but I'm not happy. I don't feel the way I'm supposed to feel. I always end up feeling depressed." With a minimalist script and a way-cool soundtrack, "A Charlie Brown Christmas" also took an early TV stab at the flagrant commercialism of the holiday. And in a genre that is usually safely secularized, it showed some rare and audacious faith-based initiative when it wrapped up with a reading from the New Testament. CBS returned a year later with its animated adaptation of Dr. Seuss's "How the Grinch Stole Christmas," a gloss on the old Scrooge story, in signature doggerel, featuring the best cliff-hanger in all of Christmas literature. After 40 years, though, it turns out that these three shows aren't for children anymore. Consider the recent flood of merchandise tied to "Rudolph," "Charlie Brown," and "The Grinch." A lot of this stuff you wouldn't even let the kids touch, much less play with. For $37.50, Department 56 Collectibles will send you a set of three very breakable ceramic figurines depicting scenes from "A Charlie Brown Christmas." Rudolph's Misfit Toys Village, also from Department 56, goes for $70, but keep it out of the reach of children, as it's electrified and made of porcelain. One catalogue offers a "How the Grinch Stole Christmas" T-shirt that comes only in adult sizes. The Toys 'R' Us superstore in Times Square has a display of toys from "Rudolph" that kids could actually play with, but whenever I'm there, parents seem to be the only ones showing any interest. (The kids also seem to ignore the "Charlie Brown Christmas" key chains, which makes sense as most of them don't have keys.) This may seem strange, but it's not, really. As with so many traditions, repetition begets value. Fortysomethings love these shows now because they liked them as kids. Years of repeated viewing have vested them with accretions of meaning, tradition, and affection that a kid just can't appreciate. We'll sit our children in front of "Rudolph" Wednesday night, trying to sell them our own childhoods when they'd really rather be watching "SpongeBob." But not to worry: they'll thank us when they're 40. And so will Department 56. • Robert Thompson is a professor of media and popular culture at Syracuse University.
{ "pile_set_name": "Pile-CC" }
The present invention relates to a novel species of erasable ink and a water-base ballpoint pen in which said ink is used. Erasable ink is characterized in that when letters, characters, figures or drawings are written or drawn on paper in such ink, the lines drawn can be erased with a rubber eraser. It is currently used in felt-tip pens and the like. Such erasable inks are already known. There is known, for instance, an erasable ink composition characterized in that it comprises a resin having a film-forming temperature not higher than 0xc2x0 C. or a glass transition temperature not higher than 0xc2x0 C., spherical particles of a colored resin having a particle size of 1 to 20 xcexcm and water and has an ink viscosity of 5 to 35 mPaxc2x7sec (Japanese Kokai Tokkyo Koho H05-279614). In the case of said erasable ink composition, however, it is difficult to erase drawn lines completely and, from the erasability viewpoint, there is room for improvement. In particular, when writing is made with a great tool force, it is impossible to erase the drawn lines to the extent that they cannot be recognized any longer. This problem becomes more serious when such composition is used as ink for ballpoint pens with which the tool force tends to become high. Furthermore, when the ink composition mentioned above is to be used as ink for ballpoint pens, it tends to fail to flow out successfully, hence, as it is, such composition cannot be used in ballpoint pens. Accordingly, an object of the present invention is to provide an erasable ink composition which can be erased in a relatively easy manner even when writing has been made with a great tool force. Another object of the invention is to provide a water-base ballpoint pen in which said ink composition is used. As the result of intensive investigations made by the present inventor in an attempt to solve the above problems of the prior art, it was found that the above objects can be accomplished by employing an ink composition containing a colorant whose particle size is controlled within a certain range. Based on this and other findings, the present invention has now been completed. The present invention thus provides an erasable ink composition and a water-base ballpoint pen in which said ink composition is used, as specified below: 1. An erasable aqueous ink composition containing at least one colorant, characterized in that said colorant has a mean particle size of not less than 2 xcexcm and that particles having a size of not more than 1.8 xcexcm account for not more than 1.6% by weight of said colorant. 2. An erasable aqueous ink composition containing at least one colorant, characterized in that said colorant has a mean particle size of not more than 7 xcexcm and that particles having a size of not less than 7 xcexcm account for not more than 0.5% by weight of said colorant. 3. An erasable aqueous ink composition containing at least one colorant, characterized in that said colorant has a mean particle size of 2 to 7 xcexcm, that particles having a size of not more than 1.8 xcexcm account for not more than 1.6% by weight of said colorant and that particles having a size of not less than 7 xcexcm account for not more than 0.5% by weight of said colorant. 4. A water-base ballpoint pen in which the ink composition specified above under any of paragraphs 1 to 3 is used. The colorant is not limited to any particular species on the condition that the particle size distribution conditions to be described later herein in more detail be met. Thus, those colorants which are used in known aqueous ink compositions or the like can be employed. For example, inorganic pigments such as titanium oxide, carbon black, ultramarine blue, cobalt blue, chromium oxide, iron oxide red and graphite as well as organic pigments such as C.I. pigment black 1, C.I. pigment green 7, C.I. pigment blue 15, C.I. pigment red 112 and C.I. pigment violet 19 can be used. In addition, fluorescent pigments, luminescent pigments and the like can also be used. Furthermore, the so-called colored resin beads can be used as the colorant in the practice of the present invention. As the colored resin beads, there may be mentioned, for example, resin beads (e.g. of an acrylic resin or a styrenic resin) containing a dye or pigment, resin beads colored with a dye etc. Further, in the practice of the present invention, toners for copying may also be used. These colorants may be used either singly or in combination of two or more of them. Among them, the use of colored resin beads is preferred. In the practice of the present invention, it is necessary for these colorants to be controlled with respect to their particle size as follows. Thus, it is required that the colorant have a mean particle size of not less than 2 xcexcm and particles having a size of not more than 1.8 xcexcm account for not more than 1.6% by weight on the colorant basis, or that the colorant have a mean particle size of not more than 7 xcexcm and particles having a size of not less than 7 xcexcm account for not more than 0.5% by weight on the colorant basis. In the practice of the present invention, it is particularly preferred that the colorant have a mean particle size of 2 to 7 xcexcm (more preferably 2 to 5 xcexcm), with particles having a size of not more than 1.8 xcexcm accounting for not more than 1.6% by weight on the colorant basis and particles having a size of not less than 7 xcexcm accounting for not more than 0.5% by weight, preferably not more than 0.1% by weight, on the colorant basis. This particle size control can be realized by any known classification technique such as spontaneous sedimentation, centrifugation or filter filtration. The term xe2x80x9cmean particle sizexe2x80x9d as used herein means the weight average particle size. Thus, the weight cumulative distribution is determined by the liquid phase precipitation method in the light transmission mode (measuring apparatus: Horiba Seisakusho model CAPA-700) and the particle size at 50 weight percent distribution is reported as the mean particle size. The precipitation is caused by centrifugation. The specific gravity of the colorant particles is calculated using the true specific gravity thereof. The shape of the colorant (particle) is not critical but may be spherical, polyhedral, flaky or fibrous, for instance. In the practice of the present invention, however, a basically spherical form is preferred and, in particular, it is preferred that the shape be as close as possible to the true sphere. The content of the colorant may be judiciously selected in consideration of the other components employed and, generally, it is about 1 to 40% by weight, preferably 3 to 20% by weight. When it is above 40% by weight, the viscosity will become excessively high, so that the ink will flow out with difficulty. When said content is less than 1% by weight, sufficient coloration may not be attained in some instances. The erasable ink composition of the present invention may further contain a water-soluble polymer. If it is soluble in water, it may be a natural, synthetic or semisynthetic one for instance. Those known polymers which are used as gelling agents in gel ink compositions may also be used as they are. Such polymers may be used either singly or incombination. Among them, xanthan gum, carboxymethylcellulose, guar gum, pullulan, rhamsan gum, welan gum, succinoglucan and like polysaccharides are preferred, and those polysaccharides represented by the following general formula are more preferred. (In the above formula, M represents an alkali metal selected from among sodium, potassium and lithium, and n is 1,000 to 3,000.) The polysaccharides represented by the above general formula can provide ink compositions with excellent thixotropic properties, stringiness and dischargeability, among others. As the polysaccharides giving such characteristics, commercial products, for example xe2x80x9crhamsan gumxe2x80x9d (available from Sansho Corp.), can be used. This polysaccharide (rhamsan gum) gives especially excellent tixotropic properties and can provide ink compositions with adequate viscosity and dichargeability characteristics more effectively. Owing to this, an ink composition for ballpoint pen in which rhamsan gum is used shows a high ink viscosity in ink tanks, so that the ink composition will not leak from the pen point or colorant separation will not occur, either. On the other hand, when a shearing force is applied to said composition as a result of ball spinning on the occasion of writing, the ink viscosity is reduced and good dischargeability is thereby attained. The content of the water-soluble polymer may adequately be selected in consideration of the other components employed and, generally, it is about 0.1 to 4% by weight, preferably 0.2 to 0.6% by weight. When it is above 4% by weight, the viscosity will become excessively high, worsening the dischargeability of the ink. When it is less than 0.1% by weight, the ink may undergo phase separation. In the practice of the present invention, various additives generally used in aqueous ink compositions, for example dispersing agents, wetting agents, preservatives, antifungal agents, rust preventing agents, viscosity modifiers and pH adjusting agents, if necessary, may also be incorporated in appropriate amounts. Useful as the dispersing agents, which are used especially for increasing the dispersibility of colorants, are, for example, anionic surfactants such as sodium naphthalenesulfonate-formaldehyde condensates, higher alcohol sulfate sodium salts and sodium alkylbenzenesulfonates, and nonionic surfactants such as polyethylene glycol alkyl ethers, polyethylene glycol alkylphenyl ethers and polyethylene glycol lauryl ether. These may be used either singly or in combination. Among them, anionic surfactants are preferred and, in particular, sodium naphthalenesulfonate-formaldehyde condensates are more preferred. The level of addition of the dispersing agents is generally about 0.01 to 1% by weight, preferably 0.1 to 0.5% by weight. The wetting agents are used especially for adjusting the rate of drying of ink compositions within a desired range. By adding a wetting agent, it becomes possible to further improve the storability and cap off performance (performance after standing without the cap), among others. Specifically, use may be made of dihydric alcohols such as ethylene glycol, diethylene glycol, triethylene glycol, polyethylene glycol, 1,8-propanediol, propylene glycol, 1,3-butylene glycol, 1,4-butanediol, 2,3-butylene glycol, neopentyl glycol, hexylene glycol and thiodiglycol, polyhydric alcohols such as glycerin, trimethylolethane, trimethylolpropane, 3-methylpentane-1,3,5-triol, diglycerin and sorbite, glycol ethers such as ethylene glycol monomethyl ether, ethylene glycol monoethyl ether, ethylene glycol monobutyl ether, ethylene glycol monobutyl ether, diethylene glycol monomethyl ether and diethylene glycol monobutyl ether and, further, pyrrolidone, N-methyl-2-pyrrolidone, dimethylformamide and the like. These may be used either singly or in combination. Among them, ethylene glycol, propylene glycol, glycerin and the like are preferred. The level of addition of such wetting agents is generally about 1 to 30% by weight, preferably 2 to 25% by weight. Useful as the preservatives/antifungal agents are, for example, potassium sorbate, sodium benzoate, pentachlorophenol sodium, sodium dehydroacetate, 1,2-benzisothiazolin-3-one, 2,3,5,6-tetrachloro-4-(methylsulfonyl)pyridine, benzimidazole compounds and the like. These may be used either singly or in combination. Among them, sodium benzoate and the like are preferred. The level of addition of such preservatives/antifungal agents is generally about 0.2 to 3% by weight, preferably 0.5 to 2% by weight. In the practice of the present invention, those resins which are known as film-forming resins may judiciously be added within limits within which the effects of the present invention are not sacrificed. As such resins, there may be mentioned synthetic rubbers such as styrene-butadiene rubbers, acrylonitrile-butadiene rubbers and chloroprene rubbers, and natural rubbers such as latices. These may be used either singly or in combination. The level of addition of such resins is generally about 10 to 30% by weight, preferably 15 to 25% by weight. As for the solvent for the ink composition of the present invention, any of those currently used in known aqueous ink compositions, for example water (or an aqueous solvent), may by used. In that case, the amount of water may be adequately selected according to the desired viscosity, the other components and addition levels thereof, and other factors. Generally, water is used in an amount of about 60 to 95% by weight, preferably 70 to 80% by weight, in total. The viscosity of the ink composition of the present invention may be selected depending on the intended use of the final products and other factors. Generally, it is recommended that the viscosity be about 100 to 10,000 mPaxc2x7s, preferably 500 to 5,000 mPaxc2x7s. The viscosity can be adequately adjusted by appropriate incorporation of the respective components or ingredients. The ink viscosity as so referred to herein is the value measured by using an ELD type viscometer under the conditions of 3xc2x0 (R14) cone, 0.5 revolution per minute (rpm) and 20xc2x0 C. The ink composition of the present invention can be prepared basically in the same manner as in the production of known aqueous ink compositions. Thus, for example, the components other than the colorant and dispersing agent are added to water and then the colorant with an adjusted particle size distribution is gradually added with stirring. The particle size distribution adjustment of the colorant can be effected by adding a dispersing agent as necessary to the colorant such as a pigment or colored resin beads, diluting the mixture with water with stirring and then subjecting the thus-obtained dispersion to classification by centrifugation, for instance. The ink composition of the present invention can be used in substantially all sorts of writing tools and printing, for instance. As far as the writing tools are concerned, it can be used universally in marker pens, felt-tip pens, ballpoint pens and the like. In particular, owing to its excellent erasability, it is best suited for use in ballpoint pens (water-base ballpoint pens). The water-base ballpoint pen of the present invention may be composed of those known ballpoint pen parts except for the use of the erasable ink composition of the present invention as the ink. The ink container tube or pipe, for instance, may be of the same material and size as those in conventional use. As regards the material of the ink container pipe, synthetic resin pipes made of polyethylene, polypropylene or the like and, further, metal pipes can be employed. As for the ballpoint pen tip, the same material and structure as used in any known water-base ballpoint pen can be employed. The ballpoint pen can be assembled by the conventional method of assembling ballpoint pens. Thus, for instance, an ink container pipe made of polypropylene with a German silver ballpoint pen tip (material of the ball: e.g. cemented carbide, ceramic) mounted at one end is filled with the erasable ink composition of the present invention to give a ballpoint pen refill. Then, said refill is attached to the main body, a tail stopper is then mounted, and the air within the ballpoint pen refill pipe is withdrawn by means of a centrifuge, to give the water-base ballpoint pen of the present invention. The erasable ink composition of the present invention contains a colorant whose particle size distribution is particularly controlled within a specific range and therefore can improve erasability while maintaining good fixability. Owing to the excellent erasability, lines written on paper or the like with said ink composition can be erased with ease using a rubber eraser. In particular, even when writing is made with a great tool force, the lines can be erased with ease. In this respect, the ink composition of the present invention is best suited for use as an ink composition for ballpoint pens with which the tool force becomes relatively great. On the other hand, said ink composition has good fixability, so that mere rubbing with a finger cannot erase the drawn lines. Furthermore, such drawn lines are excellent in stability with time; they will not become difficult to erase with the lapse of time. After the lapse of one month, for instance, they can be erased easily using a rubber eraser. In the case of the ink composition of the present invention, a predetermined level of erasability can be obtained without using any film-forming resin and, therefore, such problems as decrease in erasability due to deterioration of the film-forming resin after writing, separation of the film-forming resin in the ink composition during storage and solidification of the film-forming resin at the pen point can be solved all at once. Thus, the ink composition of the present invention can produce excellent effects from the viewpoints of stability with time, storability, ink dischargeability, cap off performance and other properties as well. In addition, when the ink composition of the present invention is gelled with a water-soluble polymer, more improved effects are produced concerning the stability with time, storability, ink dischargeability, cap off performance and other properties. Therefore, unlike the conventional erasable ink compositions, the ink composition of the present invention never causes separation or sedimentation nor causes clogging within the pen. Furthermore, it is excellent in ink dischargeability, so that drawn lines will not show any interruption. As regards the cap off performance, unlike the conventional erasable ink compositions which contain a relatively large amount of a film-forming resin and therefore cause film formation at the pen point, making it impossible to use the pen any longer, it is possible with the ink composition of the present invention to perform writing even after 24 hours of standing in an uncapped state, for instance. The erasable ink composition of the present invention, which has such characteristic features, is useful as an ink composition for felt-tip pens, marker pens or the like and for use in printing. In particular, the ink composition of the present invention is best suited as an ink composition for ballpoint pens.
{ "pile_set_name": "USPTO Backgrounds" }
<?php /** * PHPExcel * * Copyright (c) 2006 - 2014 PHPExcel * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA * * @category PHPExcel * @package PHPExcel_Reader * @copyright Copyright (c) 2006 - 2014 PHPExcel (http://www.codeplex.com/PHPExcel) * @license http://www.gnu.org/licenses/old-licenses/lgpl-2.1.txt LGPL * @version ##VERSION##, ##DATE## */ /** * PHPExcel_Reader_Exception * * @category PHPExcel * @package PHPExcel_Reader * @copyright Copyright (c) 2006 - 2014 PHPExcel (http://www.codeplex.com/PHPExcel) */ class PHPExcel_Reader_Exception extends PHPExcel_Exception { /** * Error handler callback * * @param mixed $code * @param mixed $string * @param mixed $file * @param mixed $line * @param mixed $context */ public static function errorHandlerCallback($code, $string, $file, $line, $context) { $e = new self($string, $code); $e->line = $line; $e->file = $file; throw $e; } }
{ "pile_set_name": "Github" }
Category: management As I’m writing these lines, I’m sitting at Munich Airport. I’m waiting for my flight home after spending the last two days on a pretty spontaneuos trip to Munich for JS Kongress. Despite knowing of the event, I hadn’t even thought about, let alone planned to go, since I wasn’t feeling very well (and even […] I like the sound of big machines. Sat somewhere by a window, looking out, listening to the steady, soft humming of a bus motor, an airplane, a train, I will fall asleep within minutes. The big machines calm me down. The Human in the Machine is a project where 365 authors write about productivity in 2017. As […]
{ "pile_set_name": "Pile-CC" }
The impact of the media on the decision of parents in South Wales to accept measles-mumps-rubella (MMR) immunization. A large measles outbreak occurred in South Wales in 2012/2013. The outbreak has been attributed to low take-up of measles-mumps-rubella (MMR) immunization in the early 2000s. To understand better the factors that led to this outbreak we present the findings of a case-control study carried out in the outbreak area in 2001 to investigate parents' decision on whether to accept MMR. Parents who decided not to take-up MMR at the time were more likely to be older and better educated, more likely to report being influenced by newspapers [adjusted odds ratio (aOR) 3·07, 95% confidence interval (CI) 1·62-5·80], television (aOR 3·30, 95% CI 1·70-6·43), the internet (aOR 7·23, 3·26-16·06) and vaccine pressure groups (aOR 5·20, 95% CI 2·22-12·16), and less likely to be influenced by a health visitor (aOR 0·30, 95% CI 0·16-0·57). In this area of Wales, daily English-language regional newspapers, UK news programmes and the internet appeared to have a powerful negative influence. We consider the relevance of these findings to the epidemiology of the outbreak and the subsequent public health response.
{ "pile_set_name": "PubMed Abstracts" }
Optogenetic stimulation of cochlear neurons activates the auditory pathway and restores auditory-driven behavior in deaf adult gerbils. Cochlear implants partially restore hearing via direct electrical stimulation of spiral ganglion neurons (SGNs). However, spread of excitation from each electrode limits spectral coding. We explored the use of optogenetics to deliver spatially restricted and cell-specific excitation in the cochlea of adult Mongolian gerbils. Adeno-associated virus carrying the gene encoding the light-sensitive calcium translocating channelrhodopsin (CatCh) was injected into the cochlea of adult gerbils. SGNs in all cochlea turns showed stable and long-lasting CatCh expression, and electrophysiological recording from single SGNs showed that light stimulation up to few hundred Hertz induced neuronal firing. We characterized the light-induced activity in the auditory pathway by electrophysiological and behavioral analysis. Light- and sound-induced auditory brainstem responses showed similar kinetics and amplitude. In normal hearing adult gerbils, optical cochlear implants elicited stable optical auditory brainstem responses over a period of weeks. In normal hearing animals, light stimulation cued avoidance behavior that could be reproduced by subsequent acoustic stimulation, suggesting similar perception of light and acoustic stimuli. Neurons of the primary auditory cortex of normal hearing adult gerbils responded with changes in firing rates with increasing light intensity. In deaf adult gerbils, light stimulation generated auditory responses and cued avoidance behavior indicating partial restoration of auditory function. Our data show that optogenetic cochlear stimulation achieved good temporal fidelity with low light intensities in an adult rodent model, suggesting that optogenetics might be used to develop cochlear implants with improved restorative capabilities.
{ "pile_set_name": "PubMed Abstracts" }
A former general election running mate of Brian Cowen has been given a three-year suspended sentence for stealing from the court official assigned to manage his bankruptcy. At Mullingar Circuit Court, Judge Anthony Hunt also ordered that Gerard Killally (42), with an address at Shaen, Edenderry, should complete 240 hours community service for forging documents in an effort to hide the thefts, which occurred in 2010 and 2011. Judge Hunt said it was important that the former cathaoirleach of Offaly County Council, who was in custody for almost two weeks, had seen the inside of prison. He had sought and held public office and because of his political background, he should have known better, Judge Hunt said. Killally should also have known the importance of upholding the integrity of the bankruptcy process, he said, adding that he wanted the father of four to have a full insight into the consequences of what he had done. Killally’s counsel Stephen Byrne, BL, said his client found the experience “horrible.” Killally admitted earlier this month to stealing €18,000 worth of equipment from a shop he used to own in Rochfortbridge, Westmeath, but which became property of official assignee Christopher Lehane when Killally was declared bankrupt. Killally also admitted forging a letter and business card which he faxed to Mr Lehane, alleging that the stolen equipment had been repossessed by the leasing company he’d bought it through. Judge Hunt said he was concerned at the forgery of documents to throw Mr Lehane off the scent, but said Killally’s actions were not sophisticated and the forgery would have been discovered by Mr Lehane’s diligence. “It didn’t involved hundreds of thousands of euro transported offshore,” he noted, describing the fraud as “relatively small”. He said Killally had been under genuinely severe financial stress. He also noted that Killally had spent a month in a psychiatric hospital for severe depression before this incident happened, and said this criminal conviction, added to his fall from political and financial grace were humiliating and will have an impact on his ability to get work in the future. The prosecution had cost taxpayer money, and hoped that the experience of custody means Killally will not offend again. The former auctioneer and developer’s current situation is bleak and difficult, he said but noted that €18,000 compensation had been paid. His case will attract public scrutiny, which is only correct because he sought out public office and all that goes with it, and must expect media interest now, he said, responding to claims by Killally’s counsel that he was subject to extreme media and public interest. Judge Hunt imposed a three year sentence for the theft offences, which he suspended for three years, and Killally will complete 240 hours community service for the fraud offence.
{ "pile_set_name": "OpenWebText2" }
Traveling America's Great Loop, 6000+ miles at 10mph. Life is not measured by the number of breaths we take, but by the moments that take our breath away. Sunday, March 27, 2011 Sure doesn't feel like Spring! Brrrrrrr We had originally planned to leave Ma. on Sunday but we still have things to do and since the boat will not be ready to splash for a few more days we decided to stay an extra day or 2. BTW it may be spring according to the calendar by its still COLD here in New England. We have been here for10 days it has snowed twice! That sure makes yard clean up more difficult, at least it melts by noon. Today, we took a trip to Newport RI (20 min ride) as they have the largest West Marine in the country. At least it was when it opened last year. Big Sale and since West Marine bucks came in the mail why not, we were looking for a courtesy flag for Canada and a Quarantine Flag, to my amazement they had Cuba, Panama, Honduras and some others but NO Canada very odd. We had lunch, walked around town window shopping, Jim bought some cigars and we headed out. We were really surprised at the amount of people there, as it was a windy cold day. But a trip to Newport is always fun.
{ "pile_set_name": "Pile-CC" }
Howdy guys, this picture is about Santino Global Bazaar Large Bronze Rain Drum Side Table Eclectic-side-tables -and ( Outdoor Drum Table Photo Gallery #4). This image is a image/jpeg and the resolution of this image is 621 x 598. It's file size is only 39 KB. Wether You want to save It to Your laptop, you may Click here. You also also see more images by clicking the following picture or read more at this post: Outdoor Drum Table. Before discussing Santino Global Bazaar Large Bronze Rain Drum Side Table Eclectic-side-tables -and ( Outdoor Drum Table Photo Gallery #4), we'd prefer to talk about some recommendations on timber flooring colors. Dark and black hues really are a popular selection for performers' companies, contemporary trendy and decorations. Contaminated in the event you choose a vintage search normal wood or classic brown shade which can be great. Colour level and daring (various shades of reddish: cherry and ash Jatoba or tainted in the same coloring) that's perfect for commercial interiors, offices and other large spaces where a floor becomes a fundamental section of the decor. Brown warm platinum and reddish timber sounds can make your area cozy. Bright and dreary flooring could make your room ample. Go for pure colored wood floor in matt end when the capability to disguise scores and a small dent really are a must. Do not forget that the colors must match each other and contrast. A floor can not have equivalent hues as furniture and walls. Whilst the Santino Global Bazaar Large Bronze Rain Drum Side Table Eclectic-side-tables -and ( Outdoor Drum Table Photo Gallery #4) photographs and digital place advisor can provide of what the ultimate result may be a broad concept, there is no better solution to ascertain along with of the floor as opposed to taking a look at the sample spot in sun light.
{ "pile_set_name": "Pile-CC" }
--- author: - 'E. Sissa' - 'R. Gratton' - 'S. Desidera' - 'A. F. Martinez Fiorenzano' - 'A. Bonfanti' - 'E. Carolo' - 'D. Vassallo' - 'R.U. Claudi' - 'M. Endl' - 'R. Cosentino' bibliography: - 'biblio.bib' date: 'Received / Accepted ' title: '[H$_\alpha$]{}-activity and ages for stars in the SARG survey[^1]$^,$[^2] ' --- Introduction ============ Studying the variation in the radial velocity (RV) induced by the chromospheric activity is important to distinguish it from the Keplerian motion of the star that may be caused by a planet [see e.g. @Queloz01; @Dumusque11; @2014Robertson]. On long timescales the active regions can modify measured RVs by introducing a signal related to the stellar activity cycle, while on short timescales the rotational period can become evident. The most widely used activity indicators are based on the Ca II H&K lines [@2010Isaacson; @Lovis11; @Gomes11], which have been shown to correlate with the radial velocity jitter. Other lines were investigated and it was found that the [H$_\alpha$]{} line can be a good alternative [@1990Robinson; @1990Stassmeier; @2010Santos; @Gomes11]. However the correlation of [H$_\alpha$]{} with Ca II H&K indices is high for the most active stars but decreases at a lower activity level, and sometimes becomes an anti-correlation [@Gomes11]. Similar results were also found by [@2007Cincunegui], who added, using simultaneous observations of stars with spectral type later than F, that the correlation is lost when studying individual spectra of single stars and there is no dependence on activity. The correlation between the averaged fluxes for the Ca II and [H$_\alpha$]{} lines can be clarified by considering the dependence of the two indexes on the stellar colour or the spectral type, while the absence of a general relation between the simultaneous Ca II and [H$_\alpha$]{} index can be due to difference in the formation region of the two lines [@2007Cincunegui; @Gomes14]. Studying the solar spectrum as a prototype and extrapolating the results to other stars, [@2009Meunier] discovered that plages and filaments in the chromosphere contribute differently to Ca II and [H$_\alpha$]{} lines: while plages contribute to the emission of all these lines, the absorption due to filaments is remarkable only for [H$_\alpha$]{}. Therefore the saturation of the plage filling factor seems to enhance the correlation between the two indexes in case of high stellar activity and low filament contribution. On the other hand, the anti-correlation between the emission in Ca II and [H$_\alpha$]{} for low active stars seems to depend only on a strong filament contrast if the filaments are well correlated with plages [see also @Gomes14]. A search for planets around the components of wide binaries was performed using SARG (Spettrografo Alta Risoluzione Galileo) at the Telescopio Nazionale Galileo (TNG) in the past years. Two planetary companions were detected around and [@Desidera11; @Desidera12]. @Carolo14 found strong variations in the RVs of that could not be explained by a stable planetary system, but which were well correlated to a [H$_\alpha$]{} based activity indicator, showing that they are due to an $\sim$1100-day activity cycle. Stimulated by this finding, we started a systematic analysis of [H$_\alpha$]{}  in the binaries of the SARG sample to identify activity-induced RV variations and distinguish them from planetary signatures. We report here on the main results of the activity study made within this survey. We also include the measurements for additional stars observed by our group for other programs carried out with SARG.\ Observation and data reduction {#sec:data} ============================== SARG is the High Resolution Spectrograph at TNG, now decommissioned, which worked for about 12 years beginning in 2000 [@Gratton01]. The SARG survey was the first planet research program entirely dedicated to binary systems and aimed to determine the frequency of giant planets up to a few AU separation from their star in nearly equal-mass visual binaries using high-precision radial velocities. The sample of the survey included 47 pairs of stars from the Hipparcos Multiple Star Catalog [@1997Perryman], considering binaries in the magnitude range 7.0 $<$ V $<$ 10.0, with magnitude differences between the components $\Delta$V $<$ 1.0, projected separations larger than 2" (to avoid strong contamination of the spectra), parallaxes larger than 10 mas, and errors smaller than 5 mas, with B - V $>$ 0.45 mag and spectral types later than F7. For more details on the sample see [@Desidera2007]. The stars are typically at distance $<$ 50 pc from the Sun. Between September 2000 and April 2012 we collected up to 81 spectra per star with a typical exposure time of 900 s for a total amount of more than 6000 science images. In this work we also include six bright stars that were observed with SARG looking to search for hot-Neptunes orbiting planets [@GrattonHotNeptunes]. For these stars the integration time was set at 600 s except for and , for which it was shorter to avoid saturation of the images because of their higher luminosity. , and were used as RVs reference stars during the survey, and thei signal-to-noise ratio (S/N) is typically greater then 270. In addition, was observed as benchmark active star [@2005Martinez]. We decided to include this star in our sample as well. Our data set therefore consists made of two sub samples: the binary sample and the bright stars sample. The first is unbiased with respect to activity (except for , which was excluded because of its high rotation), while the latter has a bias toward low-activity stars except for . For all the observations we used the SARG Yellow Grism (spectral range 4600-7900 Å) and the 0.27 arcsec slit to obtain a resolution $R=144000$ with a $2\times1$ pixel binning. The observed spectral range was covered by two chips. The blue chip included the spectral range used for the RV determination: the accuracy was given by a iodine cell superimposing a forest of absorption lines used as reference for the AUSTRAL code [@Endl2000], as shown in @Desidera11. The red chip data are affected by fringing effects at wavelengths longer than $\sim7000$ Å; these were not used in our analysis. The depth of the iodine lines decreases toward longer wavelengths, and the lines are negligible at the wavelength of [H$_\alpha$]{}. Data reduction was performed with standard IRAF[^3] procedures. Stellar parameters {#sec:parameters} ================== [l\*[5]{}[c]{}rc]{} \ Star & V & B-V & [$\log R'_{HK}$]{}& method & $v\sin i$ & $T_{eff}$\ & & & & & \[km/s\] & \[K\]\ \ Star & V & B-V & $\log RHK$ & method & $v\sin i$ & $T_{eff}$\ & & & & & \[km/s\] & \[K\]\ BD 182366A & 9.370 & 0.83 & -4.56 & U & 2.0 & 5308\ BD 182366B & 9.427 & 0.93 & -4.57 & U & 2.4 & 5290\ BD 222706A & 9.594 & 0.62 & -4.97 & D & 2.3 & 5943\ BD 222706B & 9.828 & 0.69 & -4.51 & U & 2.3 & 5674\ BD 231978A & 9.395 & 0.83 & -4.46 & D & 3.5 & 4886\ BD 231978B & 9.530 & 0.75 & -4.44 & U & 3.2 & 4911\ HD 105421A & 7.827 & 0.51 & -4.70 & U & 4.6 & 6324\ HD 105421B & 8.358 & 0.57 & -4.65 & U & 0.9 & 6102\ HD 106515A & 7.960 & 0.79 & -5.04 & D & 1.7 & 5314\ HD 106515B & 8.234 & 0.83 & -5.07 & D & 1.8 & 5157\ HD 108421A & 8.870 & 0.90 & -4.57 & X & 2.6 & 4700\ HD 108421B & 9.274 & 0.88 & -4.53 & X & 3.2 & 4779\ HD 108574 & 7.418 & 0.56 & -4.49 & D & 4.9 & 6205\ HD 108575 & 7.972 & 0.67 & -4.43 & X & 5.1 & 5895\ HD 109628A & 9.073 & 0.57 & -4.51 & U & 3.0 & 6109\ HD 109628B & 9.087 & 0.55 & -4.50 & U & 3.2 & 6127\ HD 117963A & 8.639 & 0.55 & -4.65 & U & 6.2 & 6180\ HD 117963B & 8.924 & 0.49 & -4.61 & U & 3.3 & 6097\ HD 118328A & 9.147 & 0.62 & -4.61 & U & 0.7 & 5943\ HD 118328B & 9.426 & 0.69 & -4.59 & U & 0.7 & 5887\ HD 121298A & 8.604 & 0.50 & -4.91 & D & 1.9 & 6353\ HD 121298B & 8.937 & 0.52 & -4.87 & D & 1.3 & 6266\ HD 123963A & 8.758 & 0.62 & -4.63 & U & 1.6 & 5873\ HD 123963B & 9.511 & 0.60 & -4.55 & U & 1.4 & 5438\ HD 124054A & 8.399 & 0.58 & -4.97 & D & 2.7 & 6081\ HD 124054B & 8.785 & 0.64 & -5.02 & D & 2.5 & 5896\ HD 126246A & 7.466 & 0.54 & -4.40 & D & 7.9 & 6223\ HD 126246B & 7.697 & 0.60 & -4.51 & D & 3.9 & 6074\ HD 128041A & 8.059 & 0.71 & -4.53 & U & 3.4 & 5663\ HD 128041B & 8.827 & 0.78 & -4.51 & U & 3.2 & 5192\ HD 132563A & 8.948 & 0.54 & -4.62 & U & 3.9 & 6168\ HD 132563B & 9.402 & 0.57 & -4.62 & U & 3.4 & 5985\ HD 132844A & 9.022 & 0.55 & -4.66 & U & 3.4 & 5878\ HD 132844B & 9.114 & 0.63 & -4.61 & U & 2.4 & 5809\ HD 13357A & 8.180 & 0.67 & -4.70 & D & 1.7 & 5615\ HD 13357B & 8.647 & 0.73 & -4.61 & D & 1.8 & 5341\ HD 135101A & 6.656 & 0.69 & -4.99 & D & 2.3 & 5631\ HD 135101B & 7.500 & 0.75 & -5.07 & D & 1.1 & 5491\ HD 139569A & 8.482 & 0.54 & -4.55 & U & 8.5 & 6223\ HD 139569B & 8.783 & 0.57 & -4.52 & U & 5.6 & 5922\ HD 143144A & 8.856 & 0.62 & -4.61 & U & 1.9 & 5943\ HD 143144B & 9.025 & 0.61 & -4.59 & U & 1.2 & 5894\ HD 146413A & 9.260 & 0.88 & -4.68 & D & 2.1 & 4779\ HD 146413B & 9.492 & 0.87 & -4.60 & X & 2.0 & 4818\ HD 17159A & 8.775 & 0.54 & -4.64 & U & 3.4 & 6155\ HD 17159B & 8.923 & 0.53 & -4.62 & U & 2.9 & 6051\ HD 186858A & 8.368 & 0.96 & -4.73 & D & 3.6 & 4910\ HD 186858B & 8.578 & 0.93 & -4.62 & X & 3.0 & 4885\ HD 190042A & 8.755 & 0.73 & -4.71 & U & 3.5 & 5474\ HD 190042B & 8.778 & 0.80 & -4.72 & U & 3.8 & 5406\ HD 19440A & 7.874 & 0.47 & -4.73 & U & 4.5 & 6308\ HD 19440B & 8.574 & 0.53 & -4.66 & U & 2.9 & 6108\ HD 200466A & 8.399 & 0.74 & -4.77 & D & 2.0 & 5633\ HD 200466B & 8.528 & 0.76 & -4.69 & D & 2.1 & 5583\ HD 201936A & 8.648 & 0.48 & -4.55 & X & 8.8 & 6441\ HD 201936B & 8.851 & 0.50 & -4.53 & X & 15.5 & 6452\ HD 209965A & 7.980 & 0.55 & -4.96 & D & 4.2 & 6180\ HD 209965B & 8.414 & 0.57 & -4.59 & U & 2.1 & 6115\ HD 213013A & 8.982 & 0.81 & -4.59 & U & 1.7 & 5402\ HD 213013B & 9.612 & 0.93 & -4.53 & U & 2.3 & 4990\ HD 215812A & 7.275 & 0.64 & -4.66 & U & 1.3 & 5688\ HD 215812B & 7.576 & 0.71 & -4.64 & U & 1.5 & 5586\ HD 216122A & 8.062 & 0.58 & -4.73 & U & 6.5 & 6067\ HD 216122B & 8.186 & 0.58 & -4.71 & U & 4.6 & 6066\ HD 219542A & 8.174 & 0.64 & -5.07 & D & 2.1 & 5849\ HD 219542B & 8.547 & 0.72 & -4.81 & D & 1.9 & 5691\ HD 2770A & 9.566 & 0.61 & -4.39 & X & 2.8 & 5970\ HD 2770B & 9.660 & 0.73 & -4.39 & X & 3.9 & 5844\ HD 30101A & 8.782 & 0.82 & -4.72 & D & 1.9 & 5143\ HD 30101B & 8.848 & 0.91 & -4.79 & D & 2.2 & 5061\ HD 33334A & 8.023 & 0.70 & -4.99 & D & 1.9 & 5650\ HD 33334B & 8.857 & 0.80 & -4.63 & U & 1.7 & 5201\ HD 66491A & 9.253 & 0.75 & -4.65 & D & 2.5 & 5497\ HD 66491B & 9.312 & 0.67 & -4.58 & D & 2.4 & 5492\ HD 76037A & 7.688 & 0.50 & -5.14 & D & 7.9 & 6353\ HD 76037B & 8.269 & 0.50 & -5.03 & D & 9.5 & 6442\ HD 8009A & 8.819 & 0.64 & -4.96 & D & 0.2 & 5688\ HD 8009B & 9.724 & 0.82 & -4.95 & D & 0.0 & 5291\ HD 8071A & 7.312 & 0.57 & -4.74 & U & 5.5 & 6218\ HD 8071B & 7.573 & 0.60 & -4.71 & U & 6.0 & 6142\ HD 85441A & 8.907 & 0.70 & -4.60 & X & 1.3 & 5701\ HD 85441B & 9.284 & 0.71 & -4.56 & X & 1.6 & 5537\ HD 86057A & 8.839 & 0.60 & -4.49 & X & 6.0 & 6012\ HD 86057B & 9.676 & 0.73 & -4.40 & X & 4.6 & 5629\ HD 87743A & 8.734 & 0.62 & -4.71 & D & 2.5 & 5943\ HD 87743B & 8.890 & 0.60 & -4.59 & D & 3.0 & 5905\ HD 94399A & 9.407 & 0.61 & -4.54 & X & 3.2 & 5970\ HD 94399B & 9.306 & 0.71 & -4.56 & X & 3.6 & 6017\ HD 9911A & 9.428 & 0.90 & -4.60 & U & 1.3 & 5000\ HD 9911B & 9.448 & 0.89 & -4.60 & U & 1.3 & 4968\ HD 99121A & 8.162 & 0.46 & -4.67 & U & 6.7 & 6501\ HD 99121B & 9.018 & 0.47 & -4.57 & U & 5.0 & 6374\ HIP 104687A & 8.144 & 0.64 & -4.41 & D & 3.0 & 5870\ HIP 104687B & 8.189 & 0.71 & -4.48 & D & 3.4 & 5801\ 14 Her & 6.610 & 0.88 & -5.06 & D & 1.6 & 5388\ 40 Eri & 4.430 & 0.65 & -4.90 & D & 0.5 & 5151\ 51 Peg & 5.450 & 0.67 & -5.08 & D & 2.0 & 5787\ 61 Cyg B & 6.030 & 1.31 & -4.95 & D & 1.7 & 4077\ 83 LeoA & 6.490 & 1.00 & -4.84 & D & 1.4 & 5502\ GJ 380 & 6.610 & 1.33 & -4.72 & D & 1.9 & 3876\ GJ 580A & 6.580 & 0.78 & -5.11 & D & 2.1 & 5174\ HD 166435 & 6.840 & 0.58 & -4.27 & D & 7.6 & 5964\ $\rho$ CrB & 5.390 & 0.61 & -5.08 & D & 1.0 & 5823\ $\tau$ Cet & 3.490 & 0.73 & -4.98 & D & 1.0 & 5283\ [l\*[5]{}[c]{}rrr]{} \ Star & n. obs & $JD_0$& $JD_F$&$<H\alpha>$ & $\Delta H\alpha$ & $\sigma_{H\alpha}$ & RV & RMS(RV)\ & & & & & & & \[km/s\] & \[m/s\]\ \ Star & n. obs & $JD_0$& $JD_F$&$<H\alpha>$ & $\Delta H\alpha$ & $\sigma_{H\alpha}$ & RV & RMS(RV)\ & & & & & & & \[km/s\] & \[m/s\]\ BD+182366A & 20 & 1985.4166 & 4251.3874 & 0.255 & 0.039 & 0.025 & 11.00 & 12.67\ BD+182366B & 18 & 1985.4317 & 4251.3989 & 0.246 & 0.029 & 0.021 & 11.40 & 11.48\ BD+222706A & 18 & 2011.6073 & 4309.4345 & 0.225 & 0.008 & 0.019 & -4.10 & 25.41\ BD+222706B & 18 & 2011.6264 & 4962.4638 & 0.258 & 0.045 & 0.012 & 2.41 & 21.55\ BD+231978A & 14 & 1825.7278 & 4398.6806 & 0.371 & 0.135 & 0.027 & 20.50 & 28.41\ BD+231978B & 13 & 1825.7152 & 4398.6929 & 0.383 & 0.149 & 0.025 & 23.50 & 35.19\ HD 105421A & 21 & 2011.4704 & 4902.4194 & 0.237 & 0.010 & 0.017 & 7.40 & 16.87\ HD 105421B & 19 & 2011.4840 & 4902.4333 & 0.290 & 0.069 & 0.014 & 0.44 & 12.76\ HD 106515A & 31 & 1986.5327 & 6026.5634 & 0.214 & -0.002 & 0.006 & 0.43 & 6.00\ HD 106515B & 30 & 1986.5442 & 6026.5757 & 0.218 & -0.003 & 0.007 & 18.80 & 8.69\ HD 108421A & 17 & 1986.5975 & 4250.4681 & 0.296 & 0.044 & 0.007 & 2.00 & 21.82\ HD 108421B & 13 & 2012.4862 & 4250.4796 & 0.360 & 0.116 & 0.018 & 2.00 & 38.30\ HD 108574 & 22 & 1913.7615 & 4251.4385 & 0.287 & 0.064 & 0.008 & -2.10 & 18.09\ HD 108575 & 22 & 1913.7846 & 4251.4499 & 0.307 & 0.091 & 0.010 & -1.50 & 33.09\ HD 109628A & 14 & 1986.5683 & 4961.3994 & 0.214 & -0.007 & 0.012 & 0.00 & 10.18\ HD 109628B & 13 & 1986.5799 & 4961.4117 & 0.215 & -0.007 & 0.010 & 0.00 & 16.16\ HD 117963A & 15 & 2012.5413 & 5968.6519 & 0.226 & 0.003 & 0.012 & -5.80 & 33.22\ HD 117963B & 13 & 2012.5543 & 5968.6641 & 0.233 & 0.012 & 0.010 & 4.18 & 66.04\ HD 118328A & 15 & 2013.6231 & 4252.5454 & 0.212 & -0.006 & 0.013 & 19.20 & 14.38\ HD 118328B & 14 & 2013.6353 & 4250.5043 & 0.217 & 0.001 & 0.013 & 18.40 & 15.93\ HD 121298A & 14 & 1912.7867 & 4161.5587 & 0.229 & 0.001 & 0.009 & 0.00 & 8.28\ HD 121298B & 12 & 1912.7733 & 4161.5702 & 0.231 & 0.006 & 0.018 & 0.00 & 12.58\ HD 123963A & 15 & 2011.5410 & 4309.4080 & 0.222 & 0.006 & 0.011 & -24.40 & 12.23\ HD 123963B & 13 & 2011.5537 & 4309.4202 & 0.238 & 0.024 & 0.014 & -24.40 & 17.28\ HD 124054A & 13 & 2011.5702 & 4251.4849 & 0.222 & 0.002 & 0.004 & -14.60 & 8.25\ HD 124054B & 14 & 2011.5833 & 4251.4964 & 0.218 & 0.002 & 0.021 & -13.40 & 10.99\ HD 126246A & 18 & 2012.5729 & 4488.7666 & 0.343 & 0.119 & 0.008 & 0.80 & 28.88\ HD 126246B & 16 & 2012.5846 & 4311.3850 & 0.312 & 0.092 & 0.012 & 1.70 & 14.71\ HD 128041A & 23 & 2013.4984 & 4276.4738 & 0.210 & -0.003 & 0.020 & -74.70 & 7.45\ HD 128041B & 21 & 2013.5115 & 4276.4852 & 0.230 & 0.010 & 0.034 & -73.60 & 16.31\ HD 132563A & 63 & 2013.6508 & 5968.6857 & 0.227 & 0.005 & 0.021 & 1.80 & 16.47\ HD 132563B & 56 & 2013.6645 & 5968.7008 & 0.221 & 0.003 & 0.025 & 1.65 & 13.39\ HD 132844A & 27 & 2012.6152 & 4311.4244 & 0.259 & 0.044 & 0.016 & -3.20 & 11.87\ HD 132844B & 26 & 2012.6027 & 4311.4359 & 0.318 & 0.103 & 0.012 & -2.00 & 18.84\ HD 13357A & 29 & 1801.6950 & 4849.4490 & 0.235 & 0.021 & 0.013 & 26.20 & 10.55\ HD 13357B & 25 & 1801.7086 & 4849.4612 & 0.262 & 0.046 & 0.018 & 25.40 & 13.83\ HD 135101A & 14 & 1982.7540 & 4488.7807 & 0.202 & -0.011 & 0.007 & 0.00 & 4.84\ HD 135101B & 12 & 1982.7697 & 4311.4614 & 0.212 & -0.002 & 0.011 & 0.00 & 5.80\ HD 139569A & 18 & 2012.6615 & 4339.4064 & 0.281 & 0.057 & 0.013 & -29.40 & 24.53\ HD 139569B & 20 & 2012.6733 & 4339.4179 & 0.279 & 0.062 & 0.015 & -29.80 & 29.57\ HD 143144A & 19 & 1798.3625 & 4339.3805 & 0.223 & 0.006 & 0.015 & -78.50 & 9.39\ HD 143144B & 18 & 1798.3768 & 4339.3923 & 0.221 & 0.004 & 0.017 & -78.80 & 15.29\ HD 146413A & 20 & 2012.6910 & 4962.5618 & 0.350 & 0.105 & 0.013 & 4.20 & 8.61\ HD 146413B & 19 & 2012.7035 & 4962.5734 & 0.350 & 0.108 & 0.020 & 5.30 & 15.32\ HD 17159A & 28 & 1797.6565 & 4819.3558 & 0.219 & -0.003 & 0.011 & 11.40 & 21.43\ HD 17159B & 28 & 1797.6727 & 4819.3679 & 0.219 & -0.000 & 0.016 & 10.20 & 15.88\ HD 186858A & 44 & 1798.4744 & 4962.5879 & 0.310 & 0.076 & 0.010 & -0.63 & 8.90\ HD 186858B & 41 & 1798.4601 & 4962.6015 & 0.297 & 0.061 & 0.013 & 1.54 & 7.64\ HD 190042A & 23 & 1825.4814 & 4783.3459 & 0.210 & -0.004 & 0.010 & -4.60 & 5.77\ HD 190042B & 22 & 1825.4615 & 4783.3593 & 0.212 & -0.002 & 0.012 & -3.50 & 7.74\ HD 19440A & 19 & 1828.6588 & 4339.6564 & 0.231 & 0.005 & 0.008 & -15.40 & 12.31\ HD 19440B & 19 & 1828.6716 & 4339.6679 & 0.219 & -0.002 & 0.019 & -15.90 & 9.70\ HD 200466A & 79 & 1801.5721 & 5807.6025 & 0.251 & 0.038 & 0.019 & -8.00 & 15.89\ HD 200466B & 71 & 1801.5850 & 5807.6137 & 0.247 & 0.034 & 0.014 & -0.22 & 8.37\ HD 201936A & 15 & 2042.6381 & 4398.3978 & 0.289 & 0.058 & 0.015 & 3.70 & 32.87\ HD 201936B & 15 & 2042.6554 & 4398.4092 & 0.317 & 0.086 & 0.023 & 2.50 & 47.51\ HD 209965A & 26 & 2145.5472 & 4783.3759 & 0.223 & 0.001 & 0.008 & -19.40 & 20.60\ HD 209965B & 22 & 2145.5634 & 4783.3878 & 0.218 & -0.003 & 0.011 & 0.11 & 24.31\ HD 213013A & 34 & 1827.4669 & 4369.5700 & 0.245 & 0.031 & 0.016 & -24.70 & 10.98\ HD 213013B & 32 & 1827.4540 & 4369.5824 & 0.264 & 0.035 & 0.024 & -24.70 & 14.68\ HD 215812A & 29 & 1798.4923 & 4398.4798 & 0.210 & -0.004 & 0.005 & 8.43 & 32.68\ HD 215812B & 18 & 1798.5063 & 4398.4912 & 0.212 & -0.001 & 0.007 & 0.95 & 20.25\ HD 216122A & 24 & 1801.6229 & 4962.6771 & 0.220 & 0.000 & 0.007 & -13.30 & 18.74\ HD 216122B & 27 & 1801.6366 & 4962.6895 & 0.225 & 0.006 & 0.012 & -1.04 & 13.92\ HD 219542A & 43 & 1825.5176 & 4664.6807 & 0.216 & 0.001 & 0.007 & -12.50 & 7.43\ HD 219542B & 48 & 1825.5048 & 4664.6931 & 0.230 & 0.016 & 0.011 & -11.50 & 7.54\ HD 2770A & 21 & 1856.5704 & 4338.6438 & 0.301 & 0.084 & 0.017 & -5.00 & 21.13\ HD 2770B & 21 & 1856.5841 & 4338.6587 & 0.313 & 0.098 & 0.023 & -6.40 & 32.54\ HD 30101A & 33 & 1825.6514 & 5952.4781 & 0.252 & 0.030 & 0.021 & -18.20 & 25.26\ HD 30101B & 33 & 1825.6652 & 5952.4943 & 0.252 & 0.027 & 0.023 & -18.00 & 13.62\ HD 33334A & 57 & 1801.7517 & 5952.5179 & 0.207 & -0.007 & 0.013 & 83.20 & 22.28\ HD 33334B & 51 & 1801.7439 & 5952.5299 & 0.216 & -0.003 & 0.015 & 83.70 & 23.26\ HD 66491A & 24 & 1853.7409 & 4398.7585 & 0.264 & 0.051 & 0.023 & 48.40 & 18.04\ HD 66491B & 21 & 1853.7557 & 4161.4142 & 0.271 & 0.058 & 0.030 & 49.10 & 23.30\ HD 76037A & 35 & 1828.7406 & 5952.6152 & 0.228 & -0.000 & 0.012 & 22.02 & 114.52\ HD 76037B & 34 & 1853.7833 & 5952.6280 & 0.240 & 0.009 & 0.014 & -0.05 & 38.46\ HD 8009A & 33 & 2116.6201 & 4819.3811 & 0.217 & 0.004 & 0.022 & -42.10 & 12.05\ HD 8009B & 26 & 2116.6334 & 4819.3929 & 0.223 & 0.006 & 0.020 & -41.80 & 17.66\ HD 8071A & 12 & 1797.6224 & 4339.6225 & 0.217 & -0.007 & 0.005 & 5.67 & 18.94\ HD 8071B & 9 & 1797.6397 & 3246.6791 & 0.210 & -0.012 & 0.005 & 9.00 & 64.80\ HD 85441A & 15 & 1826.7408 & 4754.7425 & 0.246 & 0.032 & 0.022 & -19.80 & 12.32\ HD 85441B & 15 & 1826.7535 & 4754.7538 & 0.264 & 0.051 & 0.016 & -19.80 & 13.42\ HD 86057A & 18 & 1985.5083 & 4251.3612 & 0.324 & 0.105 & 0.018 & 11.80 & 24.94\ HD 86057B & 18 & 1985.5216 & 4251.3726 & 0.360 & 0.147 & 0.025 & 11.20 & 36.64\ HD 87743A & 23 & 2012.3936 & 4849.6255 & 0.249 & 0.032 & 0.023 & 0.00 & 19.33\ HD 87743B & 25 & 2012.3801 & 4849.6371 & 0.282 & 0.065 & 0.031 & 3.00 & 19.35\ HD 94399A & 19 & 1986.4614 & 4962.3837 & 0.346 & 0.128 & 0.026 & -6.20 & 20.16\ HD 94399B & 17 & 1986.4731 & 4962.3953 & 0.338 & 0.119 & 0.014 & -3.80 & 57.20\ HD 9911A & 22 & 1801.6656 & 4339.6330 & 0.236 & 0.007 & 0.030 & -56.60 & 11.53\ HD 9911B & 20 & 1801.6528 & 4339.6445 & 0.223 & -0.008 & 0.021 & -56.30 & 11.36\ HD 99121A & 24 & 1986.5086 & 4250.4427 & 0.223 & -0.010 & 0.015 & -4.40 & 23.66\ HD 99121B & 20 & 1986.5205 & 4250.4552 & 0.217 & -0.012 & 0.017 & -3.10 & 30.57\ HIP 104687A & 30 & 2070.6622 & 4309.6015 & 0.300 & 0.084 & 0.015 & -20.60 & 23.82\ HIP 104687B & 29 & 2070.6751 & 4309.6148 & 0.294 & 0.079 & 0.013 & -21.20 & 14.20\ 14 Her & 144 & 4515.7409 & 4902.6461 & 0.223 & 0.009 & 0.003 & -2.97 & 4.06\ 40 Eri & 42 & 4515.3574 & 4819.4971 & 0.232 & 0.011 & 0.002 & -42.20 & 7.19\ 51 Peg & 44 & 1774.6139 & 4783.4387 & 0.206 & -0.009 & 0.003 & 0.57 & 6.00\ 61 Cyg B & 127 & 2570.3207 & 4693.6690 & 0.343 & -0.001 & 0.008 & -0.29 & 2.92\ 83 Leo A & 121 & 4512.5548 & 4819.6320 & 0.223 & 0.009 & 0.003 & -2.90 & 6.54\ GJ 380 & 145 & 4512.4711 & 4819.5728 & 0.403 & 0.013 & 0.012 & -26.10 & 5.39\ GJ 580 A & 158 & 4512.6957 & 4694.3972 & 0.213 & -0.008 & 0.004 & -67.90 & 7.34\ HD 166435 & 18 & 2775.6448 & 3872.7162 & 0.411 & 0.193 & 0.010 & -13.70 & 95.27\ $\rho$ CrB & 46 & 2011.7355 & 4663.5609 & 0.210 & -0.006 & 0.004 & -1.32 & 6.09\ $\tau$ Cet & 225 & 1773.7347 & 4819.3086 & 0.211 & -0.006 & 0.003 & -16.40 & 4.86\ For a proper interpretation of the [H$_\alpha$]{} measurements that we derived in Sect. \[sec:HAindex\], some stellar parameters were considered. We describe here the adopted sources or procedures to measure them. Differential radial velocities were derived in @CaroloPHD and have a typical uncertainty of about 4 m/s for stars in the binary survey and less then 2 m/s for the bright stars. We considered measurements of [$\log R'_{HK}$]{} from the literature, with preference for studies including multi-epoch measurements to take temporal variations of activity into account. Overall, we retrieved [$\log R'_{HK}$]{} for 36 stars from @2004ApJS..152..261W, @2010Isaacson, , and @2003AJ....126.2048G. Finally, for the components of , , , and , the value of [$\log R'_{HK}$]{} was derived from HIRES spectra available in the Keck[^4] archive following the procedure described in @Carolo14. For stars without [$\log R'_{HK}$]{} values in the literature we estimated the value from the ratio of X-ray to bolometric luminosity, using the calibration by @2008ApJ...687.1264M. This latter quantity was derived following the procedure described in @Carolo14 and @CaroloPHD for the sources identified in the ROSAT All Sky Survey within 30$"$ from our target stars. For the binaries composing most of our sample, the components are not spatially resolved by ROSAT. We then assumed equal X-ray luminosity for the components. For stars that are not detected in the ROSAT All Sky Survey, this procedure yields an upper limit on [$\log R'_{HK}$]{} . The values of [$\log R'_{HK}$]{} or the upper limits, as other additional parameters we used, are listed in Table \[additionalparam\]. The projected rotational velocity, $v \sin i$, was obtained from a calibration of the full with at half maximum (FWHM) of the cross-correlation function of SARG spectra. Details will be presented elsewhere. For the single stars we adopted the $v \sin i$ from literature sources such as @2005ApJS..159..141V. The effective temperature $T_\mathrm{eff}$ of the primaries was derived from the B-V colour using the calibration by [@1996Alonso] and assuming no reddening, while for the secondaries we relied on the high-precision temperature difference measured as part of the differential abundance analysis of 23 binary systems in and preliminary results by [@tesivassallo] for the others. For the single stars (standard stars and targets of the hot-Neptune program) we adopted the effective temperature from high-quality spectroscopic studies [e.g. @2005ApJS..159..141V]. [H$_\alpha$]{} index {#sec:HAindex} ==================== Since the Ca II H&K lines wavelengths are not included in the SARG yellow grism spectral range, we defined a new activity index based on the [H$_\alpha$]{} line to study the activity of the stars in this sample. We built an IDL procedure optimized for the SARG spectra format: we measured the instrumental flux (not corrected for the blaze function) in a wavelength interval centred on the line core, $F_H$, and in two additional intervals symmetrically located with respect to the centre, $F_{c1}$ and $F_{c2}$. [H$_\alpha$]{} is defined as $H_\alpha=2 F_H/(F_{c1}+F_{c2})$, where $F_{c1}=flux$\[6558.80Å- 6559.80Å\], $F_H=flux$\[6562.60Å- 6563.05Å\], and $F_{c2}=flux$\[6565.20Å- 6566.20Å\]. Since the SARG spectrograph was not built to study in the [H$_\alpha$]{} spectral range, this line appears twice but close to the edges of two orders (close to the blue edge of the order 93 and to the red edge of the order 94), according to the RV of the star. When we choose a wider window for $F_{c1}$ and $F_{c2}$ or increase the distance from $F_H$, the number of spectra in which the selected wavelength exits the detector therefore increases. Our choice is the best compromise. For the same reason we were unable to use the [H$_\alpha$]{} index that was used by other authors : for each order one of the two continuum reference windows used by these authors is outside of the region covered by the detector. Furthermore, we were unable to use a reference continuum to estimate the continuum flux because it is difficult to define the proper blaze function given the presence of the extended wings of the photospheric [H$_\alpha$]{} absorption. To make our measurement more reliable, we used the weighted mean of two [H$_\alpha$]{} values when fluxes for all these spectral bands could be measured in both orders. Error estimation ---------------- We then analysed the possible sources of errors. ### - Internal noise {#internal-noise .unnumbered} We estimated the errors on the fluxes assuming photon noise. The error on [H$_\alpha$]{} index was then derived by error propagation: $$err_{H\alpha}=H_\alpha \sqrt{\left(\frac{1}{SN_H}\right)^2+\frac{1/c_{1err}^2+1/c_{2err}^2}{\left(F_{c1}+F_{c2}\right)^2}}$$ where $SN_i=\sqrt{ gain \cdot F_i}$, $c_{1err}=SN_{c1}/F_{c1}$, $c_{2err}=SN_{c2}/F_{c2}$. We note that because of the lower value of the blaze echelle function, the [H$_\alpha$]{} indexes coming from the order 94 have a lower weight on average. , , , and have high absolute radial velocities (RV &lt; -50 km/s) so that their spectra are remarkably blueshifted. Their [H$_\alpha$]{} indexes have a higher uncertainty because the [H$_\alpha$]{} line is shifted out from the order 93 spectra, therefore we were only able to use the SARG order 94, which yields poorer results. ### - Systematic error {#systematic-error .unnumbered} We also considered that several other sources of noise can introduce errors on the [H$_\alpha$]{} index: flat fielding, background subtraction, bad pixels, instrumental instability, fringing, etc. All these contributions, added to the possible intrinsic variations of activity, increase the standard deviation of the [H$_\alpha$]{} values ($\sigma_{H\alpha}$). $\tau$ Cet was used as a test target for this purpose. It is very bright and its [$\Delta H\alpha$]{} variation is lower than 0.005 dex (peak to valley) with low levels of variability in [$\log R'_{HK}$]{} from the literature. We studied the variation of $\tau$ Cet night by night. We note that the standard deviation of [H$_\alpha$]{} is about 10 times the intrinsic photonic error, therefore we decided to add a jitter to our measurement. Errors significantly larger than the photon noise error have been reported in other cases of 1 Å wide activity indices from echelle spectra, see for instance @2004ApJS..152..261W. We found that this increase does not depend on the activity level of the star. It is instead described by a relation with the stellar magnitude as shown in Fig. \[V\_sigma\]: $ \sigma_{jitter}=\sqrt{(0.0028)^2+(5.27\cdot 10^{0.4 V -6})^2}$. ![Relation between V magnitude of the stars and the standard deviation $\sigma_{H\alpha}$ of the [H$_\alpha$]{} index. Open symbols indicate quiet stars (see Sect. \[subsec:teff\] for details), green diamonds are the bright stars sample. The continuous line represents the $\sigma_{jitter}$ we adopted, while the orange asterisks indicate the mean photon noise value for each star.[]{data-label="V_sigma"}](V_sigma.eps){width="\columnwidth"} Our adopted jitter is compatible with the single night variations of $\tau$ Ceti and we rescaled it for other stars according to their magnitude. The dependence on magnitude is that expected for error sources as background subtraction. Finally the error applied to each measurement of [H$_\alpha$]{} is the sum of the photonic error and the instrumental jitter as derived above. As the jitter is significantly larger then the photon noise, individual errors on [H$_\alpha$]{} index of a given star are very similar. Therefore the estimate of the jitter term has a very limited effect on the periodogram analysis presented in Sec. \[sec:HAtimeseries\]. ### - Contamination by telluric lines {#contamination-by-telluric-lines .unnumbered} In the spectral range of [H$_\alpha$]{} we considered, there are several telluric lines mainly due to the water vapour. These lines can enter in our $F_{c1}$, $F_{c2}$ and $F_H$ intervals and influence the [H$_\alpha$]{} index value. The strongest line is H$_2$O at 6564.206 Å. If this telluric line enters $F_H$, the [H$_\alpha$]{} index will decrease of about 1.5%, giving an error by about 0.005 on a quiet star. This can occur when the geocentric velocity of the star is between $52$ and $75$ km/s. Therefore only a few of our spectra are involved, but none of those discussed below. The effect we have if this line enters $F_{c2}$ is about 0.001 dex which is negligible. The H$_2$O line at 6560.555 Å can also enter the $F_H$ interval with a comparable contribution if the geocentric radial velocities between $-90$ and $ -123$ km/s are involved. These few spectra were rejected. ### - Contamination estimation {#contamination-estimation .unnumbered} Even though during the observations of the binaries the slit was oriented perpendicularly to the separation of the components, some spectra are strongly contaminated by the companion star and were rejected. Furthermore we modelled the contamination for each consecutive observation of the companions assuming a Moffat-like shape for the point spread function (PSF) and taking into account the separation, the magnitude and the seeing. We obtain that the contribution of the contamination to the [H$_\alpha$]{}is lower then 1% in the majority of the case and therefore is negligible. We found instead that for six systems the variation induced by the contamination is greater than the intrinsic variation (Fig. \[contam\]). ![Relation between the standard deviations of the RVs (after the correction for known Keplerian motions) and that induced by the contamination. Systems with a non-negligible contamination are highlighted.[]{data-label="contam"}](RVrmsnokepnocont_testconta.eps){width="\columnwidth"} For example, is a very close binary system ($\rho = 2.183"$ according to Hipparcos) and the primary star is a spectroscopic binary with an amplitude of a few km/s. The effect of contamination on the RV is further modulated by the velocity of the primary at the observing epoch. This causes the RV to vary around the true value by up to a few hundreds m/s in a quite unpredictable way. For more details see [@2005Martinez]. ![Time evolution of the [H$_\alpha$]{} values of all the spectra normalised to the median value for each star, monthly bins. The red points correspond to the $\tau$ Cet data series.[]{data-label="stab"}](primoanno4_pag2.eps){width="\columnwidth"} ![GLSP of the synodic monthly binned [H$_\alpha$]{} values of the SARG sample (top) compared to $\tau$ Cet (bottom).[]{data-label="medieGLSP"}](all_indexHalphaGLS_conf.eps){width="\columnwidth"} Stability of the instrument --------------------------- The stability of the instrument during the survey was tested: for stars in the binary sample, we normalised the [H$_\alpha$]{} value for each spectrum to the median value of its star. We then binned these values into the synodic monthly mean over different stars and compared them to the same results for the $\tau$ Cet data series (see Fig. \[stab\]). For $\tau$ Cet data we found that points are located around zero with $\sigma_{H\alpha}=0.003$. For the stars in the binary sample, the last two years of the campaign were devoted to observing mainly a few stars with candidate companions and/or RV trends, therefore the [H$_\alpha$]{} monthly means depend on the variability of the individual targets, as in the case of HD 200466 [@Carolo14]. We also verified the presence of periodicity by applying the generalize Lomb-Scargle periodogram (GLSP) [@GLSP] [^5] to the two sequences of the binned values: the whole sample sequence shows no significant peak and differs from the $\tau$ Ceti sequence, which shows a long-term trend (see Fig.\[medieGLSP\]).\ Dependence on T$_{eff}$ and [$\Delta H\alpha$]{} definition {#subsec:teff} ----------------------------------------------------------- We divided our sample into two subgroups: as active stars we indicate stars with [$\log R'_{HK}$]{} greater than [-4.80]{}, the others are called quiet stars. Since our [H$_\alpha$]{} index is defined as the ratio between the flux in the line centre and the flux in the wings, we expect that different stars with the same activity level can have different [$\langle H_\alpha \rangle$]{} values because of the different photospheric spectrum. Therefore we compared effective temperature and [$\langle H_\alpha \rangle$]{} to determine the appropriate relation for quiet stars (Fig. \[T\_ha\]). ![Relation between the temperature and the median value of [H$_\alpha$]{} for each star. Colours are given according to $\log R_{HK}$ value sources: values from the literature are plotted in red, while for the blue dots the values are derived from X-ray luminosity. The blue triangles indicate that the [$\log R'_{HK}$]{} value for a star is only an upper limit. Green diamonds indicate the bright stars sample. Open symbols correspond to quiet stars. The line only shows the fit of the binaries to have a sample unbiased by activity. The line shows the best fit for the quiet stars. The position of the Sun is also shown with $\odot$.[]{data-label="T_ha"}](T_ha.eps){width="\columnwidth"} Most of the quiet stars lie at $\langle H_\alpha \rangle\sim0.22$ for $T_{eff}>5000$ K. At lower temperature, the [$\langle H_\alpha \rangle$]{} index for quiet stars seems to increase. Active stars scatter mostly at higher [$\langle H_\alpha \rangle$]{}. We also made a comparison with the Sun: it has an effective temperature of 5780 K and its [$\langle H_\alpha \rangle$]{} is 0.217, as measured in the solar flux atlas [@1984sfat.book.....K], in agreement with the lower envelope for quiet stars. We describe the distribution of the quiet stars in this lower envelope with a three-degree function and define as [H$_\alpha$]{}-excess ([$\Delta H\alpha$]{}) the point distance from this line: [$\Delta H\alpha$]{} is the difference in [H$_\alpha$]{} index of a star with respect to a quiet star that has the same effective temperature. Therefore we decided to use [$\Delta H\alpha$]{} as the activity index; it is more robust than [H$_\alpha$]{} because it allows us to compare the activity of stars with different temperatures. Sample analysis {#sec:sampleanalysis} =============== Correlation with [$\log R'_{HK}$]{}and rotation ----------------------------------------------- ![Relation between the [$\log R'_{HK}$]{} and [$\Delta H\alpha$]{}. Colours are the same as Fig. \[T\_ha\]. Bright stars and stars with upper limits for [$\log R'_{HK}$]{}were not considered to have a sample unbiased by activity.[]{data-label="RHK_Haex"}](RHK_Haexcess.eps){width="\columnwidth"} [$\Delta H\alpha$]{}  correlates quite well with [$\log R'_{HK}$]{} (reduced $\chi^2=2.26$, Fig. \[RHK\_Haex\]). Active stars are more scattered but typically show excess in the [H$_\alpha$]{} index ([$\Delta H\alpha$]{}$> 0$). All the stars for which [$\log R'_{HK}$]{} has been derived from the X-ray luminosity are in the active portion of the diagram. This is due to the flux limit of the ROSAT All Sky Survey, which is only sensitive to the active stars at the typical distance of our program stars. The stars for which only upper limits are derived populate the lower envelope of the distribution in most cases: this is consistent with a low activity level. This new index appears to show that stars are distributed in two groups, which suggests the presence of the Vaughan-Preston gap at $\Delta H\alpha=0.02$ [@1980PASP...92..385V]. The results of also show the presence of a gap between $\log R_{HK} = -4.7 $ and $-5.0$. This corresponds to the interval $\Delta H_\alpha \sim [0.01, 0.04]$. We also found a weak relation between [$\Delta H\alpha$]{} and its standard deviation: the intrinsic variation of the [H$_\alpha$]{} index and internal errors contribute to the increase in scatter in the [H$_\alpha$]{} index measurement for each star, but since the scatter is dominated by intrinsic errors for fainter stars, only the deviation seen in brighter stars is dominated by the intrinsic variability. We also checked the well-known relation between rotation and activity We found, as expected, that a moderate rotation is enough to cause a high activity for cold stars and in this case the $v \sin i$ value increases with activity, while the hottest stars only have high activity values if $v\sin i$ is high: this behaviour can be related to the decrease in thickness of the convective envelope as the stars become hotter [@Charbonneau2012]. Binary components ----------------- ![Relation between the [$\Delta H\alpha$]{} of the two companion stars. The solid line corresponds to the best fit, the dashed line corresponds to the equivalence.[]{data-label="HAab"}](HAexa_b.eps){width="\columnwidth"} We can compare the [$\Delta H\alpha$]{} index for the two components in each binary system: we find a very good relation between the two stars indexes, that is $ \Delta H\alpha_B =(1.11\pm 0.08)\Delta H\alpha_A+0.004\pm0.004$, as shown in Fig. \[HAab\]. The value of the reduced $\chi^2$ suggests that the scatter is dominated by the measurement error. We tested that the long-scale activity cycles (like the solar cycle) induce a variation in [H$_\alpha$]{} that is weaker than our adopted measurement error. HD 108421, HD 132844 and HD 105421 lie above the relation, but we did not note any evidence of errors in our analysis for these stars, so that the discrepancy seems to be real and the two stars of these systems could be in different activity phases. For HD 126246, which lies below the relation, the difference in the [H$_\alpha$]{} activity level between the two components qualitatively agrees with the [$\log R'_{HK}$]{} and $v \sin i$ difference found by , supporting an intrinsic rotation and activity difference between the two components. Age-activity relation --------------------- Prompted by this result, we tested whether our [H$_\alpha$]{} could be an age indicator for these stars . We computed the ages of the binary systems with the isochrone fitting algorithm developed by . The implementations details can be found in . Here we recall that it enables recovering the isochronal age of a field star when at least its \[Fe/H\], $T_\mathrm{eff}$ and $\log g$ are available. In our case we also considered [$\log R'_{HK}$]{}as input parameter, which allowed us to disregard unlikely very young isochrones, so that we could better constrain the stellar age. Since the evolution of low-mass stars is extremely slow, this method works well for stars with $T_\mathrm{eff}$&gt;5500 K; for cooler (less massive) stars, uncertainties in the exact location of a star on the Hertzspurng-Russel (HR) diagram leads to an error so large that practically all ages from 0 up to the age of the Universe are possible. We therefore did not consider such stars in our test. From the differential abundance analysis, $T_\mathrm{eff}$ and $\log g$ have typical uncertainties of $\sim50$ K and $\sim0.15$ dex, respectively, while the differences $\Delta T_{eff}=T_{effA}-T_{effB}$ and $\Delta \log g=\log g_A -\log g_B$ are more reliable and their reference uncertainties have been estimated in $\sim20$ K and $\sim 0.06$ dex, respectively. We therefore constructed a grid in $T_\mathrm{eff}$ and $\log g$ for each binary component, with step sizes of 25 K and 0.05 dex, respectively. We discarded all the points in the grid where the relations $\Delta T_{eff}- \delta T_{eff B} < \vert T_{eff A}-T_{eff B} \vert < \Delta T_{eff}+ \delta T_{eff}$ and $\Delta \log g- \delta \log g < | \log g_A-\log g_B | < \Delta \log g +\delta \log g$ were not satisfied. We computed the ages of each component for each remaining point in the grid and retained only those for which the stars could be considered coeval ($\vert \log t_A - \log t_B \vert <0.05$; 0.05 is the resolution of the isochrone grids). For each analysed star, we built a catalogue reporting the plausible input parameters and the resulting age that was coeval to that of its companion. For each binary system, we synthesised these data providing the youngest and oldest feasible age of the system and the median age. ![Activity as a function of the age. Blue circles represent the star in [@Desidera04] for which we have solid constraints on the temperature; orange crosses show the other stars. The two systems with an uncertain parallax are highlighted in cyan. []{data-label="age"}](eta_Ha_BVT75_all.eps){width="1.05\columnwidth"} In Fig. \[age\] we plot for each star hotter than $T_{eff} = 5500$ K its [$\Delta H\alpha$]{} as a function of the age of the system. We divided the systems into two subsamples according to the reliability of the input parameters, and in particular the $T_\mathrm{eff}$: blue dots represent the systems analysed in [@Desidera04], which are more accurate, while orange crosses correspond to preliminary results for systems analysed in [@tesivassallo]. The result shows that the majority of the active star are younger than 1.5 Gyr, while for older stars the distribution is flattened around zero, that is, they are inactive.\ We found that the activity for young stars is anti-correlated with the age, confirming that the relation between the [$\Delta H\alpha$]{} in the components of the systems younger than 1.5 Gyr is mainly due to age. The position of the pairs HD132844A and B and HD13357A and B in the diagram of Fig. \[age\] does not follow the general trend: the position on colour-diagram of HD132844 below the main sequence [see @Desidera04] is indicative of substantial error in the trigonometric parallax. The two Hipparcos solutions for the parallax of HD13357 are inconsistent with each other. In both cases we can conclude that there is an underestimated error in the parallax. Indeed, the adopted parameters (especially the gravity) depend on the adopted trigonometric parallax: in the abundance analysis the effective temperatures were derived from ionization equilibrium and stellar gravities from luminosities, masses and temperatures, using iterative procedures. It seems therefore that a well-defined activity-age relation persists only for objects younger than $\sim 1.5$ Gyr, and that after this age [H$_\alpha$]{} seems to be less efficient as an age indicator. Our data did not show significant correlation between these quantities: due to the lack of data with such an age, we cannot conclude whether if there is a discontinuity or if the activity of the star decreases with time. The activity-age anti-correlation for younger stars confirms results from [@1988ApJBarry], for example, and the apparent flatness of the plot for older stars seems to agree with ;but owing to the uncertainty on our ages, we cannot confirm or reject the idea that the activity decreases with age also for older stars, with a different slope as found by [@Mamajek2008], for instance. Finally, we found that a large portion (15 over 35) of the stars in our sample with age estimates from the isochrone method are younger than 1.5 Gyr: this could be due to the recent bump in the star formation rate in the solar neighbourhood as claimed by [@1988ApJBarry] or to a bias in the age distribution of the stars in the Hipparcos Multiple Stellar Catalog. Future observations of results from the GAIA satellite may clarify this question.\ Activity vs RV scatter ---------------------- We finally found the well-known relation between the activity of a star and the standard deviation of its radial velocities . In addition, when considering the contamination of the spectra, we found that it is not negligible especially for the systems HD 8071, HD 99121, HD 108421 and HD 209965, which were omitted in this discussion and are detailed below. There are also a number of cases for which the spread in RV during the survey is high ($ > 80 m/s$) and which have a relatively low activity level. ![Relation between the [$\Delta H\alpha$]{} and the RV standard deviation in the survey. The green dots indicate the RV standard deviation of the stars with a known Keplerian trend that is due to a companion, in red we plot the RV standard deviation of stars with a known companion. In both cases we correct the data for their known RV variation.[]{data-label="HAex_RVrms"}](RVrmsnokepnocont_HAex.eps){width="\columnwidth"} Most of these objects have known RV trend of Keplerian origin and after the RV variation induced by the companion was removed, they became part of the main trend (Fig. \[HAex\_RVrms\]). In addition there are at least four stars left outside the general trend. Since these are potentially very interesting objects, we examine them more in detail. and B: this is a wide binary composed of two F-type stars. The SARG spectra show that the primary star is a long-period partially blended SB2 star, therefore we conclude that the excess scatter in RVs is due to the blending of the spectra of the two components. For the secondary, the excess of the RV scatter is fairly large even after resuming the long-term trend with time that indicates the presence of a low-mass companion; in addition, the [H$_\alpha$]{}index also has a trend with time - more likely related to a cycle. The Hipparcos Multiple Stellar Catalog indicates that the system has a separation wide enough to rule out contamination effects ($\rho=3.493"$). is a spectroscopic binary and some of the spectra were taken with low S/N (Desidera et al. in prep.). We cannot exclude Keplerian motion as the origin of the scatter for both stars, therefore a deeper analysis with acquisition of additional data would be required. H$\alpha$ index time-series analysis {#sec:HAtimeseries} ==================================== By analogy with the Sun, emission in the core of [H$_\alpha$]{} is expected to show time variability mainly modulated by stellar rotation over a period of the order of days, and by the activity cycle over periods of hundreds or thousands of days. In addition, secular variations in the activity levels similar to the Maunder minimum can be present. Therefore the different properties of the time series of our objects should be taken into account. Stars in the Hot-Neptunes program were observed for a single season with a moderately dense sampling. In this case rotation periods could be found, but periodicities due to the activity cycle cannot be reliably identified. On the other hand, for the SARG survey objects, the observational campaign was longer and less dense. For only a few targets do we have a larger number of spectra because during the survey they were suspected to host a planet. This was the case of [@Desidera12] and [@Desidera11], for example. In addition we already know that for , the RV variations seen are mainly due to an activity cycle [@Carolo14]. It is known that more active stars have irregular periods that are not easy to determine with the analysis of periodograms. In spite of this, we computed the GLSPs for the [H$_\alpha$]{} index that was obtained using the [@GLSP] procedure. To evaluate the significance of these periodicities, the false alarm probability (FAP) of the highest peak of the periodogram was estimated through a bootstrap method, with 1000 permutations. We used the spectral window function to rule out that our periodicity is due to the sampling. The results for the most interesting objects are listed in Table \[HAresults\]. We found a signature of periodic variations (rotational periods or activity cycles) in 19 stars, whereas 10 stars show a clear overall trend in [H$_\alpha$]{} with time. On the other hand the stars for which we were able to find evidence of activity cycles are all with moderate activity excess and temperatures of between 4800 and 6000 K. The stars showing a long-term trend are hotter than average. It is noteworthy that of the binary stars that show promising cycles, only are quiet and show a long-term trend.\ Of the bright stars, was used as a RV standard to monitor instrument performances during the binary program. The quite good temporal coverage of the data allowed us to detect a significant long-term period of about seven years with FAP of 0.6%. Added to this signal, we also found a periodicity of 86.49 d, which corresponds to an alias of the $21.9\pm 0.4$ d period found by [@2010MNRAS.408.1666S] with one sinodic month. This shortest period seems then to be the rotational signal. We obtained a similar result also for : the GLSP peaks at 16.44 d, which is an alias of the $\sim 37$ d period . shows a periodicity of 22.38 d. In this case the spectral window is complex and we cannot rule out that this period is fake. [@2004ApJS..152..261W] estimated a rotational period of 48 days from the [$\log R'_{HK}$]{} mean value, but this was not detected by [@2010MNRAS.408.1666S].\ All the [H$_\alpha$]{} time series are presented in Table 5, only available in electronic form at the CDS. ------------- --- ---------------------- ---------- ------- -------------- ---------- Star [$\Delta H\alpha$]{} Rotation Cycle Amplitude FAP \[d\] \[d\] \[%\] HD 186858 A 0.077 7.68 – 0.010 1.0 B 0.062 – 2030 0.014 0.3 HD 200466 A 0.038 – 1500 0.024 $<0.1$ B 0.034 – trend &gt;0.015 $<0.1$ BD+182366 A 0.039 – 1432 0.037 0.1 B 0.029 – – – HD 139569 A 0.057 – trend &gt; 0.21 2.2 B 0.062 – trend &gt;0.30 0.6 HD 76037 A -0.002 – trend &gt;0.014 1.0 B 0.014 – trend &gt;0.022 1.3 HD 201936 A 0.059 13.70 – 0.020 0.7 B 0.087 – – HD 213013 A 0.031 – – – B 0.035 3.59 – 0.019 2.1 14 Her 0.009 22.38 – 0.002 $<0.1$ 51 Peg 0.003 86.49 2069 0.001, 0.003 0.8, 0.6 61 Cyg B -0.001 16.44 – 0.011 $<0.1$ GJ 380 0.013 – trend &gt;0.017 $<0.1$ $\tau$ Ceti -0.006 – trend &gt;0.003 $<0.1$ ------------- --- ---------------------- ---------- ------- -------------- ---------- Correlation between RV and [H$_\alpha$]{} {#sec:correlation} ========================================= The high uncertainty on the single measurements of [H$_\alpha$]{} prevent us from properly studying the correlation with the RVs. However this was possible in some particular case, such as spectra with high S/N or stars with a relevant trend in [H$_\alpha$]{}. We used the Spearman correlation coefficient $\rho_S$ and its significance [$\sigma$]{} to quantify the correlation between RV and [H$_\alpha$]{} index (Table \[tab:correlation\]): we obtained an extremely high significance for [@Carolo14 see]. For four other objects, the probability that the correlation is the result of a random effect is lower than 0.0075. and are active stars with a signature of an activity cycle, spectra have a high S/N and show a probable long-term cycle. Plots are presented in the Appendix. In the anti-correlation simply shows that both RV and activity are time-dependent on long scales. We can therefore rule out a strong physical connection between these two quantities for this star. Star $\rho_s$ $\sigma$ $n_\sigma$ ------------ ---------- ---------- ------------ HD 200466A 0.556 0.000 -4.817 HD 76037A -0.665 0.000 3.702 HD 99121A 0.6511 0.002 -2.84 HD 213013A 0.478 0.008 -2.576 GJ 380 0.535 0.018 -2.270 : Rank of the Spearman correlation coefficient $\rho_s$ and its significance between [H$_\alpha$]{} and RV for the stars of the sample. Column 3 reports its false-alarm probability and the last column reports the $n_\sigma$ value. Only stars with significance &lt; 0.02 are indicated. []{data-label="tab:correlation"} Conclusions {#sec:conclusions} =========== The activity of 104 stars observed with the SARG spectrograph was studied using an index based on the [H$_\alpha$]{} line. We found that this index, [$\Delta H\alpha$]{}, correlates well with the index based on Ca II lines, [$\log R'_{HK}$]{}, and therefore it can be used to estimate the average activity level, confirming previous results. It also correlates with the rotation of the star: low activity corresponds to slow rotation, especially for cool stars. After removing a few targets for which contamination of the spectra by their companion is the dominant source of RV scatter, we found that [$\Delta H\alpha$]{} also correlates with the scatter in RV. We obtain that a low-mass companion might be the source of a high residual RV scatter at least for . We also found a strong correlation between the average activity level [$\langle H_\alpha \rangle$]{} of the two components in each binary system and that roughly a half of our systems are active. Finally, we showed that activity as measured by [$\Delta H\alpha$]{} is correlated with the age derived from isochrone fitting. Although these have large error bars due to uncertainties in temperature and parallaxes, we found that active stars are typically younger than 1.5 Gyr, while older stars are typically inactive. We then analysed the time series of the stars: 11 stars ($\sim 8.5$ %) of the SARG sample show a periodicity in [H$_\alpha$]{}with false-alarm probability $<0.5\%$. All these stars have a moderate activity level ($0.029 < \Delta H\alpha < 0.077$) except for the pair HD 76037A and B, but in these cases we only have a hint of a long-term period or magnetic cycle. When we focused on the long-term cycle, we obtained that the temperature interval of these stars is also limited to late-G and early-K stars. Other stars show variabilities on temporal scales certainly different from the rotational periods. In the bright stars sample, we found five stars out of ten with significant periodic variations in [H$_\alpha$]{}. In some cases the physical origin of this type of signal is unclear. Only five stars show a significant correlation between [H$_\alpha$]{} and RVs. We conclude that if care is exerted, [H$_\alpha$]{}  is a useful indicator for activity and can be a good alternative to Ca II [$\log R'_{HK}$]{} for studies based on radial velocity techniques, especially for solar-type stars.\ *Acknowledgements*. This research has made use of the SIMBAD database, operated at CDS, Strasbourg, France. This research has made use of the Keck Observatory Archive (KOA), which is operated by the W.M. Keck Observatory and the NASA Exoplanet Science Institute (NExScI), under contract with the National Aeronautics and Space Administration. We thank the TNG staff for contributing to the observations and the TNG TAC for the generous allocation of observing time. This work was partially funded by PRIN-INAF 2008 “Environmental effects in the formation and evolution of extrasolar planetary systems”. Stars with RV-[H$_\alpha$]{} correlation {#app .unnumbered} ======================================== ![RV as a function of the [H$_\alpha$]{} index for HD 76037A.[]{data-label="hd76037bHalphaGLS"}](hd76037a_corr.eps){width="\columnwidth"} ![RV as a function of the [H$_\alpha$]{} index for HD 213013A.[]{data-label="hd213013a_corr"}](hd213013a_corr.eps){width="\columnwidth"} ![Decontaminated RV as a function of the [H$_\alpha$]{} index for HD 99121A.[]{data-label="gj380_corr"}](hd99121a_corr_decont.eps){width="\columnwidth"} ![RV as a function of the [H$_\alpha$]{} index for GJ 380.[]{data-label="gj380RV_corr"}](gj380_corr.eps){width="\columnwidth"} [^1]: Based on observations made with the Italian Telescopio Nazionale Galileo (TNG) operated on the island of La Palma by the Fundacion Galileo Galilei of the INAF (Istituto Nazionale di Astrofisica) at the Spanish Observatorio del Roque de los Muchachos of the Instituto de Astrofisica de Canarias [^2]: Table 5 is only available in electronic form at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http://cdsweb.u-strasbg.fr/cgi-bin/qcat?J/A+A/ [^3]: [@IRAF] [^4]: https://koa.ipac.caltech.edu/cgi-bin/KOA/nph-KOAlogin [^5]: <https://github.com/callumenator/idl/blob/master/Routines/Periodogram/generalised_lomb_scargle.pro>
{ "pile_set_name": "ArXiv" }
/* * wm8985.h -- WM8985 ASoC driver * * Copyright 2010 Wolfson Microelectronics plc * * Author: Dimitris Papastamos <[email protected]> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */ #ifndef _WM8985_H #define _WM8985_H #define WM8985_SOFTWARE_RESET 0x00 #define WM8985_POWER_MANAGEMENT_1 0x01 #define WM8985_POWER_MANAGEMENT_2 0x02 #define WM8985_POWER_MANAGEMENT_3 0x03 #define WM8985_AUDIO_INTERFACE 0x04 #define WM8985_COMPANDING_CONTROL 0x05 #define WM8985_CLOCK_GEN_CONTROL 0x06 #define WM8985_ADDITIONAL_CONTROL 0x07 #define WM8985_GPIO_CONTROL 0x08 #define WM8985_JACK_DETECT_CONTROL_1 0x09 #define WM8985_DAC_CONTROL 0x0A #define WM8985_LEFT_DAC_DIGITAL_VOL 0x0B #define WM8985_RIGHT_DAC_DIGITAL_VOL 0x0C #define WM8985_JACK_DETECT_CONTROL_2 0x0D #define WM8985_ADC_CONTROL 0x0E #define WM8985_LEFT_ADC_DIGITAL_VOL 0x0F #define WM8985_RIGHT_ADC_DIGITAL_VOL 0x10 #define WM8985_EQ1_LOW_SHELF 0x12 #define WM8985_EQ2_PEAK_1 0x13 #define WM8985_EQ3_PEAK_2 0x14 #define WM8985_EQ4_PEAK_3 0x15 #define WM8985_EQ5_HIGH_SHELF 0x16 #define WM8985_DAC_LIMITER_1 0x18 #define WM8985_DAC_LIMITER_2 0x19 #define WM8985_NOTCH_FILTER_1 0x1B #define WM8985_NOTCH_FILTER_2 0x1C #define WM8985_NOTCH_FILTER_3 0x1D #define WM8985_NOTCH_FILTER_4 0x1E #define WM8985_ALC_CONTROL_1 0x20 #define WM8985_ALC_CONTROL_2 0x21 #define WM8985_ALC_CONTROL_3 0x22 #define WM8985_NOISE_GATE 0x23 #define WM8985_PLL_N 0x24 #define WM8985_PLL_K_1 0x25 #define WM8985_PLL_K_2 0x26 #define WM8985_PLL_K_3 0x27 #define WM8985_3D_CONTROL 0x29 #define WM8985_OUT4_TO_ADC 0x2A #define WM8985_BEEP_CONTROL 0x2B #define WM8985_INPUT_CTRL 0x2C #define WM8985_LEFT_INP_PGA_GAIN_CTRL 0x2D #define WM8985_RIGHT_INP_PGA_GAIN_CTRL 0x2E #define WM8985_LEFT_ADC_BOOST_CTRL 0x2F #define WM8985_RIGHT_ADC_BOOST_CTRL 0x30 #define WM8985_OUTPUT_CTRL0 0x31 #define WM8985_LEFT_MIXER_CTRL 0x32 #define WM8985_RIGHT_MIXER_CTRL 0x33 #define WM8985_LOUT1_HP_VOLUME_CTRL 0x34 #define WM8985_ROUT1_HP_VOLUME_CTRL 0x35 #define WM8985_LOUT2_SPK_VOLUME_CTRL 0x36 #define WM8985_ROUT2_SPK_VOLUME_CTRL 0x37 #define WM8985_OUT3_MIXER_CTRL 0x38 #define WM8985_OUT4_MONO_MIX_CTRL 0x39 #define WM8985_OUTPUT_CTRL1 0x3C #define WM8985_BIAS_CTRL 0x3D #define WM8985_REGISTER_COUNT 59 #define WM8985_MAX_REGISTER 0x3F /* * Field Definitions. */ /* * R0 (0x00) - Software Reset */ #define WM8985_SOFTWARE_RESET_MASK 0x01FF /* SOFTWARE_RESET - [8:0] */ #define WM8985_SOFTWARE_RESET_SHIFT 0 /* SOFTWARE_RESET - [8:0] */ #define WM8985_SOFTWARE_RESET_WIDTH 9 /* SOFTWARE_RESET - [8:0] */ /* * R1 (0x01) - Power management 1 */ #define WM8985_OUT4MIXEN 0x0080 /* OUT4MIXEN */ #define WM8985_OUT4MIXEN_MASK 0x0080 /* OUT4MIXEN */ #define WM8985_OUT4MIXEN_SHIFT 7 /* OUT4MIXEN */ #define WM8985_OUT4MIXEN_WIDTH 1 /* OUT4MIXEN */ #define WM8985_OUT3MIXEN 0x0040 /* OUT3MIXEN */ #define WM8985_OUT3MIXEN_MASK 0x0040 /* OUT3MIXEN */ #define WM8985_OUT3MIXEN_SHIFT 6 /* OUT3MIXEN */ #define WM8985_OUT3MIXEN_WIDTH 1 /* OUT3MIXEN */ #define WM8985_PLLEN 0x0020 /* PLLEN */ #define WM8985_PLLEN_MASK 0x0020 /* PLLEN */ #define WM8985_PLLEN_SHIFT 5 /* PLLEN */ #define WM8985_PLLEN_WIDTH 1 /* PLLEN */ #define WM8985_MICBEN 0x0010 /* MICBEN */ #define WM8985_MICBEN_MASK 0x0010 /* MICBEN */ #define WM8985_MICBEN_SHIFT 4 /* MICBEN */ #define WM8985_MICBEN_WIDTH 1 /* MICBEN */ #define WM8985_BIASEN 0x0008 /* BIASEN */ #define WM8985_BIASEN_MASK 0x0008 /* BIASEN */ #define WM8985_BIASEN_SHIFT 3 /* BIASEN */ #define WM8985_BIASEN_WIDTH 1 /* BIASEN */ #define WM8985_BUFIOEN 0x0004 /* BUFIOEN */ #define WM8985_BUFIOEN_MASK 0x0004 /* BUFIOEN */ #define WM8985_BUFIOEN_SHIFT 2 /* BUFIOEN */ #define WM8985_BUFIOEN_WIDTH 1 /* BUFIOEN */ #define WM8985_VMIDSEL 0x0003 /* VMIDSEL */ #define WM8985_VMIDSEL_MASK 0x0003 /* VMIDSEL - [1:0] */ #define WM8985_VMIDSEL_SHIFT 0 /* VMIDSEL - [1:0] */ #define WM8985_VMIDSEL_WIDTH 2 /* VMIDSEL - [1:0] */ /* * R2 (0x02) - Power management 2 */ #define WM8985_ROUT1EN 0x0100 /* ROUT1EN */ #define WM8985_ROUT1EN_MASK 0x0100 /* ROUT1EN */ #define WM8985_ROUT1EN_SHIFT 8 /* ROUT1EN */ #define WM8985_ROUT1EN_WIDTH 1 /* ROUT1EN */ #define WM8985_LOUT1EN 0x0080 /* LOUT1EN */ #define WM8985_LOUT1EN_MASK 0x0080 /* LOUT1EN */ #define WM8985_LOUT1EN_SHIFT 7 /* LOUT1EN */ #define WM8985_LOUT1EN_WIDTH 1 /* LOUT1EN */ #define WM8985_SLEEP 0x0040 /* SLEEP */ #define WM8985_SLEEP_MASK 0x0040 /* SLEEP */ #define WM8985_SLEEP_SHIFT 6 /* SLEEP */ #define WM8985_SLEEP_WIDTH 1 /* SLEEP */ #define WM8985_BOOSTENR 0x0020 /* BOOSTENR */ #define WM8985_BOOSTENR_MASK 0x0020 /* BOOSTENR */ #define WM8985_BOOSTENR_SHIFT 5 /* BOOSTENR */ #define WM8985_BOOSTENR_WIDTH 1 /* BOOSTENR */ #define WM8985_BOOSTENL 0x0010 /* BOOSTENL */ #define WM8985_BOOSTENL_MASK 0x0010 /* BOOSTENL */ #define WM8985_BOOSTENL_SHIFT 4 /* BOOSTENL */ #define WM8985_BOOSTENL_WIDTH 1 /* BOOSTENL */ #define WM8985_INPGAENR 0x0008 /* INPGAENR */ #define WM8985_INPGAENR_MASK 0x0008 /* INPGAENR */ #define WM8985_INPGAENR_SHIFT 3 /* INPGAENR */ #define WM8985_INPGAENR_WIDTH 1 /* INPGAENR */ #define WM8985_INPPGAENL 0x0004 /* INPPGAENL */ #define WM8985_INPPGAENL_MASK 0x0004 /* INPPGAENL */ #define WM8985_INPPGAENL_SHIFT 2 /* INPPGAENL */ #define WM8985_INPPGAENL_WIDTH 1 /* INPPGAENL */ #define WM8985_ADCENR 0x0002 /* ADCENR */ #define WM8985_ADCENR_MASK 0x0002 /* ADCENR */ #define WM8985_ADCENR_SHIFT 1 /* ADCENR */ #define WM8985_ADCENR_WIDTH 1 /* ADCENR */ #define WM8985_ADCENL 0x0001 /* ADCENL */ #define WM8985_ADCENL_MASK 0x0001 /* ADCENL */ #define WM8985_ADCENL_SHIFT 0 /* ADCENL */ #define WM8985_ADCENL_WIDTH 1 /* ADCENL */ /* * R3 (0x03) - Power management 3 */ #define WM8985_OUT4EN 0x0100 /* OUT4EN */ #define WM8985_OUT4EN_MASK 0x0100 /* OUT4EN */ #define WM8985_OUT4EN_SHIFT 8 /* OUT4EN */ #define WM8985_OUT4EN_WIDTH 1 /* OUT4EN */ #define WM8985_OUT3EN 0x0080 /* OUT3EN */ #define WM8985_OUT3EN_MASK 0x0080 /* OUT3EN */ #define WM8985_OUT3EN_SHIFT 7 /* OUT3EN */ #define WM8985_OUT3EN_WIDTH 1 /* OUT3EN */ #define WM8985_ROUT2EN 0x0040 /* ROUT2EN */ #define WM8985_ROUT2EN_MASK 0x0040 /* ROUT2EN */ #define WM8985_ROUT2EN_SHIFT 6 /* ROUT2EN */ #define WM8985_ROUT2EN_WIDTH 1 /* ROUT2EN */ #define WM8985_LOUT2EN 0x0020 /* LOUT2EN */ #define WM8985_LOUT2EN_MASK 0x0020 /* LOUT2EN */ #define WM8985_LOUT2EN_SHIFT 5 /* LOUT2EN */ #define WM8985_LOUT2EN_WIDTH 1 /* LOUT2EN */ #define WM8985_RMIXEN 0x0008 /* RMIXEN */ #define WM8985_RMIXEN_MASK 0x0008 /* RMIXEN */ #define WM8985_RMIXEN_SHIFT 3 /* RMIXEN */ #define WM8985_RMIXEN_WIDTH 1 /* RMIXEN */ #define WM8985_LMIXEN 0x0004 /* LMIXEN */ #define WM8985_LMIXEN_MASK 0x0004 /* LMIXEN */ #define WM8985_LMIXEN_SHIFT 2 /* LMIXEN */ #define WM8985_LMIXEN_WIDTH 1 /* LMIXEN */ #define WM8985_DACENR 0x0002 /* DACENR */ #define WM8985_DACENR_MASK 0x0002 /* DACENR */ #define WM8985_DACENR_SHIFT 1 /* DACENR */ #define WM8985_DACENR_WIDTH 1 /* DACENR */ #define WM8985_DACENL 0x0001 /* DACENL */ #define WM8985_DACENL_MASK 0x0001 /* DACENL */ #define WM8985_DACENL_SHIFT 0 /* DACENL */ #define WM8985_DACENL_WIDTH 1 /* DACENL */ /* * R4 (0x04) - Audio Interface */ #define WM8985_BCP 0x0100 /* BCP */ #define WM8985_BCP_MASK 0x0100 /* BCP */ #define WM8985_BCP_SHIFT 8 /* BCP */ #define WM8985_BCP_WIDTH 1 /* BCP */ #define WM8985_LRP 0x0080 /* LRP */ #define WM8985_LRP_MASK 0x0080 /* LRP */ #define WM8985_LRP_SHIFT 7 /* LRP */ #define WM8985_LRP_WIDTH 1 /* LRP */ #define WM8985_WL_MASK 0x0060 /* WL - [6:5] */ #define WM8985_WL_SHIFT 5 /* WL - [6:5] */ #define WM8985_WL_WIDTH 2 /* WL - [6:5] */ #define WM8985_FMT_MASK 0x0018 /* FMT - [4:3] */ #define WM8985_FMT_SHIFT 3 /* FMT - [4:3] */ #define WM8985_FMT_WIDTH 2 /* FMT - [4:3] */ #define WM8985_DLRSWAP 0x0004 /* DLRSWAP */ #define WM8985_DLRSWAP_MASK 0x0004 /* DLRSWAP */ #define WM8985_DLRSWAP_SHIFT 2 /* DLRSWAP */ #define WM8985_DLRSWAP_WIDTH 1 /* DLRSWAP */ #define WM8985_ALRSWAP 0x0002 /* ALRSWAP */ #define WM8985_ALRSWAP_MASK 0x0002 /* ALRSWAP */ #define WM8985_ALRSWAP_SHIFT 1 /* ALRSWAP */ #define WM8985_ALRSWAP_WIDTH 1 /* ALRSWAP */ #define WM8985_MONO 0x0001 /* MONO */ #define WM8985_MONO_MASK 0x0001 /* MONO */ #define WM8985_MONO_SHIFT 0 /* MONO */ #define WM8985_MONO_WIDTH 1 /* MONO */ /* * R5 (0x05) - Companding control */ #define WM8985_WL8 0x0020 /* WL8 */ #define WM8985_WL8_MASK 0x0020 /* WL8 */ #define WM8985_WL8_SHIFT 5 /* WL8 */ #define WM8985_WL8_WIDTH 1 /* WL8 */ #define WM8985_DAC_COMP_MASK 0x0018 /* DAC_COMP - [4:3] */ #define WM8985_DAC_COMP_SHIFT 3 /* DAC_COMP - [4:3] */ #define WM8985_DAC_COMP_WIDTH 2 /* DAC_COMP - [4:3] */ #define WM8985_ADC_COMP_MASK 0x0006 /* ADC_COMP - [2:1] */ #define WM8985_ADC_COMP_SHIFT 1 /* ADC_COMP - [2:1] */ #define WM8985_ADC_COMP_WIDTH 2 /* ADC_COMP - [2:1] */ #define WM8985_LOOPBACK 0x0001 /* LOOPBACK */ #define WM8985_LOOPBACK_MASK 0x0001 /* LOOPBACK */ #define WM8985_LOOPBACK_SHIFT 0 /* LOOPBACK */ #define WM8985_LOOPBACK_WIDTH 1 /* LOOPBACK */ /* * R6 (0x06) - Clock Gen control */ #define WM8985_CLKSEL 0x0100 /* CLKSEL */ #define WM8985_CLKSEL_MASK 0x0100 /* CLKSEL */ #define WM8985_CLKSEL_SHIFT 8 /* CLKSEL */ #define WM8985_CLKSEL_WIDTH 1 /* CLKSEL */ #define WM8985_MCLKDIV_MASK 0x00E0 /* MCLKDIV - [7:5] */ #define WM8985_MCLKDIV_SHIFT 5 /* MCLKDIV - [7:5] */ #define WM8985_MCLKDIV_WIDTH 3 /* MCLKDIV - [7:5] */ #define WM8985_BCLKDIV_MASK 0x001C /* BCLKDIV - [4:2] */ #define WM8985_BCLKDIV_SHIFT 2 /* BCLKDIV - [4:2] */ #define WM8985_BCLKDIV_WIDTH 3 /* BCLKDIV - [4:2] */ #define WM8985_MS 0x0001 /* MS */ #define WM8985_MS_MASK 0x0001 /* MS */ #define WM8985_MS_SHIFT 0 /* MS */ #define WM8985_MS_WIDTH 1 /* MS */ /* * R7 (0x07) - Additional control */ #define WM8985_M128ENB 0x0100 /* M128ENB */ #define WM8985_M128ENB_MASK 0x0100 /* M128ENB */ #define WM8985_M128ENB_SHIFT 8 /* M128ENB */ #define WM8985_M128ENB_WIDTH 1 /* M128ENB */ #define WM8985_DCLKDIV_MASK 0x00F0 /* DCLKDIV - [7:4] */ #define WM8985_DCLKDIV_SHIFT 4 /* DCLKDIV - [7:4] */ #define WM8985_DCLKDIV_WIDTH 4 /* DCLKDIV - [7:4] */ #define WM8985_SR_MASK 0x000E /* SR - [3:1] */ #define WM8985_SR_SHIFT 1 /* SR - [3:1] */ #define WM8985_SR_WIDTH 3 /* SR - [3:1] */ #define WM8985_SLOWCLKEN 0x0001 /* SLOWCLKEN */ #define WM8985_SLOWCLKEN_MASK 0x0001 /* SLOWCLKEN */ #define WM8985_SLOWCLKEN_SHIFT 0 /* SLOWCLKEN */ #define WM8985_SLOWCLKEN_WIDTH 1 /* SLOWCLKEN */ /* * R8 (0x08) - GPIO Control */ #define WM8985_GPIO1GP 0x0100 /* GPIO1GP */ #define WM8985_GPIO1GP_MASK 0x0100 /* GPIO1GP */ #define WM8985_GPIO1GP_SHIFT 8 /* GPIO1GP */ #define WM8985_GPIO1GP_WIDTH 1 /* GPIO1GP */ #define WM8985_GPIO1GPU 0x0080 /* GPIO1GPU */ #define WM8985_GPIO1GPU_MASK 0x0080 /* GPIO1GPU */ #define WM8985_GPIO1GPU_SHIFT 7 /* GPIO1GPU */ #define WM8985_GPIO1GPU_WIDTH 1 /* GPIO1GPU */ #define WM8985_GPIO1GPD 0x0040 /* GPIO1GPD */ #define WM8985_GPIO1GPD_MASK 0x0040 /* GPIO1GPD */ #define WM8985_GPIO1GPD_SHIFT 6 /* GPIO1GPD */ #define WM8985_GPIO1GPD_WIDTH 1 /* GPIO1GPD */ #define WM8985_GPIO1POL 0x0008 /* GPIO1POL */ #define WM8985_GPIO1POL_MASK 0x0008 /* GPIO1POL */ #define WM8985_GPIO1POL_SHIFT 3 /* GPIO1POL */ #define WM8985_GPIO1POL_WIDTH 1 /* GPIO1POL */ #define WM8985_GPIO1SEL_MASK 0x0007 /* GPIO1SEL - [2:0] */ #define WM8985_GPIO1SEL_SHIFT 0 /* GPIO1SEL - [2:0] */ #define WM8985_GPIO1SEL_WIDTH 3 /* GPIO1SEL - [2:0] */ /* * R9 (0x09) - Jack Detect Control 1 */ #define WM8985_JD_EN 0x0040 /* JD_EN */ #define WM8985_JD_EN_MASK 0x0040 /* JD_EN */ #define WM8985_JD_EN_SHIFT 6 /* JD_EN */ #define WM8985_JD_EN_WIDTH 1 /* JD_EN */ #define WM8985_JD_SEL_MASK 0x0030 /* JD_SEL - [5:4] */ #define WM8985_JD_SEL_SHIFT 4 /* JD_SEL - [5:4] */ #define WM8985_JD_SEL_WIDTH 2 /* JD_SEL - [5:4] */ /* * R10 (0x0A) - DAC Control */ #define WM8985_SOFTMUTE 0x0040 /* SOFTMUTE */ #define WM8985_SOFTMUTE_MASK 0x0040 /* SOFTMUTE */ #define WM8985_SOFTMUTE_SHIFT 6 /* SOFTMUTE */ #define WM8985_SOFTMUTE_WIDTH 1 /* SOFTMUTE */ #define WM8985_DACOSR128 0x0008 /* DACOSR128 */ #define WM8985_DACOSR128_MASK 0x0008 /* DACOSR128 */ #define WM8985_DACOSR128_SHIFT 3 /* DACOSR128 */ #define WM8985_DACOSR128_WIDTH 1 /* DACOSR128 */ #define WM8985_AMUTE 0x0004 /* AMUTE */ #define WM8985_AMUTE_MASK 0x0004 /* AMUTE */ #define WM8985_AMUTE_SHIFT 2 /* AMUTE */ #define WM8985_AMUTE_WIDTH 1 /* AMUTE */ #define WM8985_DACPOLR 0x0002 /* DACPOLR */ #define WM8985_DACPOLR_MASK 0x0002 /* DACPOLR */ #define WM8985_DACPOLR_SHIFT 1 /* DACPOLR */ #define WM8985_DACPOLR_WIDTH 1 /* DACPOLR */ #define WM8985_DACPOLL 0x0001 /* DACPOLL */ #define WM8985_DACPOLL_MASK 0x0001 /* DACPOLL */ #define WM8985_DACPOLL_SHIFT 0 /* DACPOLL */ #define WM8985_DACPOLL_WIDTH 1 /* DACPOLL */ /* * R11 (0x0B) - Left DAC digital Vol */ #define WM8985_DACVU 0x0100 /* DACVU */ #define WM8985_DACVU_MASK 0x0100 /* DACVU */ #define WM8985_DACVU_SHIFT 8 /* DACVU */ #define WM8985_DACVU_WIDTH 1 /* DACVU */ #define WM8985_DACVOLL_MASK 0x00FF /* DACVOLL - [7:0] */ #define WM8985_DACVOLL_SHIFT 0 /* DACVOLL - [7:0] */ #define WM8985_DACVOLL_WIDTH 8 /* DACVOLL - [7:0] */ /* * R12 (0x0C) - Right DAC digital vol */ #define WM8985_DACVU 0x0100 /* DACVU */ #define WM8985_DACVU_MASK 0x0100 /* DACVU */ #define WM8985_DACVU_SHIFT 8 /* DACVU */ #define WM8985_DACVU_WIDTH 1 /* DACVU */ #define WM8985_DACVOLR_MASK 0x00FF /* DACVOLR - [7:0] */ #define WM8985_DACVOLR_SHIFT 0 /* DACVOLR - [7:0] */ #define WM8985_DACVOLR_WIDTH 8 /* DACVOLR - [7:0] */ /* * R13 (0x0D) - Jack Detect Control 2 */ #define WM8985_JD_EN1_MASK 0x00F0 /* JD_EN1 - [7:4] */ #define WM8985_JD_EN1_SHIFT 4 /* JD_EN1 - [7:4] */ #define WM8985_JD_EN1_WIDTH 4 /* JD_EN1 - [7:4] */ #define WM8985_JD_EN0_MASK 0x000F /* JD_EN0 - [3:0] */ #define WM8985_JD_EN0_SHIFT 0 /* JD_EN0 - [3:0] */ #define WM8985_JD_EN0_WIDTH 4 /* JD_EN0 - [3:0] */ /* * R14 (0x0E) - ADC Control */ #define WM8985_HPFEN 0x0100 /* HPFEN */ #define WM8985_HPFEN_MASK 0x0100 /* HPFEN */ #define WM8985_HPFEN_SHIFT 8 /* HPFEN */ #define WM8985_HPFEN_WIDTH 1 /* HPFEN */ #define WM8985_HPFAPP 0x0080 /* HPFAPP */ #define WM8985_HPFAPP_MASK 0x0080 /* HPFAPP */ #define WM8985_HPFAPP_SHIFT 7 /* HPFAPP */ #define WM8985_HPFAPP_WIDTH 1 /* HPFAPP */ #define WM8985_HPFCUT_MASK 0x0070 /* HPFCUT - [6:4] */ #define WM8985_HPFCUT_SHIFT 4 /* HPFCUT - [6:4] */ #define WM8985_HPFCUT_WIDTH 3 /* HPFCUT - [6:4] */ #define WM8985_ADCOSR128 0x0008 /* ADCOSR128 */ #define WM8985_ADCOSR128_MASK 0x0008 /* ADCOSR128 */ #define WM8985_ADCOSR128_SHIFT 3 /* ADCOSR128 */ #define WM8985_ADCOSR128_WIDTH 1 /* ADCOSR128 */ #define WM8985_ADCRPOL 0x0002 /* ADCRPOL */ #define WM8985_ADCRPOL_MASK 0x0002 /* ADCRPOL */ #define WM8985_ADCRPOL_SHIFT 1 /* ADCRPOL */ #define WM8985_ADCRPOL_WIDTH 1 /* ADCRPOL */ #define WM8985_ADCLPOL 0x0001 /* ADCLPOL */ #define WM8985_ADCLPOL_MASK 0x0001 /* ADCLPOL */ #define WM8985_ADCLPOL_SHIFT 0 /* ADCLPOL */ #define WM8985_ADCLPOL_WIDTH 1 /* ADCLPOL */ /* * R15 (0x0F) - Left ADC Digital Vol */ #define WM8985_ADCVU 0x0100 /* ADCVU */ #define WM8985_ADCVU_MASK 0x0100 /* ADCVU */ #define WM8985_ADCVU_SHIFT 8 /* ADCVU */ #define WM8985_ADCVU_WIDTH 1 /* ADCVU */ #define WM8985_ADCVOLL_MASK 0x00FF /* ADCVOLL - [7:0] */ #define WM8985_ADCVOLL_SHIFT 0 /* ADCVOLL - [7:0] */ #define WM8985_ADCVOLL_WIDTH 8 /* ADCVOLL - [7:0] */ /* * R16 (0x10) - Right ADC Digital Vol */ #define WM8985_ADCVU 0x0100 /* ADCVU */ #define WM8985_ADCVU_MASK 0x0100 /* ADCVU */ #define WM8985_ADCVU_SHIFT 8 /* ADCVU */ #define WM8985_ADCVU_WIDTH 1 /* ADCVU */ #define WM8985_ADCVOLR_MASK 0x00FF /* ADCVOLR - [7:0] */ #define WM8985_ADCVOLR_SHIFT 0 /* ADCVOLR - [7:0] */ #define WM8985_ADCVOLR_WIDTH 8 /* ADCVOLR - [7:0] */ /* * R18 (0x12) - EQ1 - low shelf */ #define WM8985_EQ3DMODE 0x0100 /* EQ3DMODE */ #define WM8985_EQ3DMODE_MASK 0x0100 /* EQ3DMODE */ #define WM8985_EQ3DMODE_SHIFT 8 /* EQ3DMODE */ #define WM8985_EQ3DMODE_WIDTH 1 /* EQ3DMODE */ #define WM8985_EQ1C_MASK 0x0060 /* EQ1C - [6:5] */ #define WM8985_EQ1C_SHIFT 5 /* EQ1C - [6:5] */ #define WM8985_EQ1C_WIDTH 2 /* EQ1C - [6:5] */ #define WM8985_EQ1G_MASK 0x001F /* EQ1G - [4:0] */ #define WM8985_EQ1G_SHIFT 0 /* EQ1G - [4:0] */ #define WM8985_EQ1G_WIDTH 5 /* EQ1G - [4:0] */ /* * R19 (0x13) - EQ2 - peak 1 */ #define WM8985_EQ2BW 0x0100 /* EQ2BW */ #define WM8985_EQ2BW_MASK 0x0100 /* EQ2BW */ #define WM8985_EQ2BW_SHIFT 8 /* EQ2BW */ #define WM8985_EQ2BW_WIDTH 1 /* EQ2BW */ #define WM8985_EQ2C_MASK 0x0060 /* EQ2C - [6:5] */ #define WM8985_EQ2C_SHIFT 5 /* EQ2C - [6:5] */ #define WM8985_EQ2C_WIDTH 2 /* EQ2C - [6:5] */ #define WM8985_EQ2G_MASK 0x001F /* EQ2G - [4:0] */ #define WM8985_EQ2G_SHIFT 0 /* EQ2G - [4:0] */ #define WM8985_EQ2G_WIDTH 5 /* EQ2G - [4:0] */ /* * R20 (0x14) - EQ3 - peak 2 */ #define WM8985_EQ3BW 0x0100 /* EQ3BW */ #define WM8985_EQ3BW_MASK 0x0100 /* EQ3BW */ #define WM8985_EQ3BW_SHIFT 8 /* EQ3BW */ #define WM8985_EQ3BW_WIDTH 1 /* EQ3BW */ #define WM8985_EQ3C_MASK 0x0060 /* EQ3C - [6:5] */ #define WM8985_EQ3C_SHIFT 5 /* EQ3C - [6:5] */ #define WM8985_EQ3C_WIDTH 2 /* EQ3C - [6:5] */ #define WM8985_EQ3G_MASK 0x001F /* EQ3G - [4:0] */ #define WM8985_EQ3G_SHIFT 0 /* EQ3G - [4:0] */ #define WM8985_EQ3G_WIDTH 5 /* EQ3G - [4:0] */ /* * R21 (0x15) - EQ4 - peak 3 */ #define WM8985_EQ4BW 0x0100 /* EQ4BW */ #define WM8985_EQ4BW_MASK 0x0100 /* EQ4BW */ #define WM8985_EQ4BW_SHIFT 8 /* EQ4BW */ #define WM8985_EQ4BW_WIDTH 1 /* EQ4BW */ #define WM8985_EQ4C_MASK 0x0060 /* EQ4C - [6:5] */ #define WM8985_EQ4C_SHIFT 5 /* EQ4C - [6:5] */ #define WM8985_EQ4C_WIDTH 2 /* EQ4C - [6:5] */ #define WM8985_EQ4G_MASK 0x001F /* EQ4G - [4:0] */ #define WM8985_EQ4G_SHIFT 0 /* EQ4G - [4:0] */ #define WM8985_EQ4G_WIDTH 5 /* EQ4G - [4:0] */ /* * R22 (0x16) - EQ5 - high shelf */ #define WM8985_EQ5C_MASK 0x0060 /* EQ5C - [6:5] */ #define WM8985_EQ5C_SHIFT 5 /* EQ5C - [6:5] */ #define WM8985_EQ5C_WIDTH 2 /* EQ5C - [6:5] */ #define WM8985_EQ5G_MASK 0x001F /* EQ5G - [4:0] */ #define WM8985_EQ5G_SHIFT 0 /* EQ5G - [4:0] */ #define WM8985_EQ5G_WIDTH 5 /* EQ5G - [4:0] */ /* * R24 (0x18) - DAC Limiter 1 */ #define WM8985_LIMEN 0x0100 /* LIMEN */ #define WM8985_LIMEN_MASK 0x0100 /* LIMEN */ #define WM8985_LIMEN_SHIFT 8 /* LIMEN */ #define WM8985_LIMEN_WIDTH 1 /* LIMEN */ #define WM8985_LIMDCY_MASK 0x00F0 /* LIMDCY - [7:4] */ #define WM8985_LIMDCY_SHIFT 4 /* LIMDCY - [7:4] */ #define WM8985_LIMDCY_WIDTH 4 /* LIMDCY - [7:4] */ #define WM8985_LIMATK_MASK 0x000F /* LIMATK - [3:0] */ #define WM8985_LIMATK_SHIFT 0 /* LIMATK - [3:0] */ #define WM8985_LIMATK_WIDTH 4 /* LIMATK - [3:0] */ /* * R25 (0x19) - DAC Limiter 2 */ #define WM8985_LIMLVL_MASK 0x0070 /* LIMLVL - [6:4] */ #define WM8985_LIMLVL_SHIFT 4 /* LIMLVL - [6:4] */ #define WM8985_LIMLVL_WIDTH 3 /* LIMLVL - [6:4] */ #define WM8985_LIMBOOST_MASK 0x000F /* LIMBOOST - [3:0] */ #define WM8985_LIMBOOST_SHIFT 0 /* LIMBOOST - [3:0] */ #define WM8985_LIMBOOST_WIDTH 4 /* LIMBOOST - [3:0] */ /* * R27 (0x1B) - Notch Filter 1 */ #define WM8985_NFU 0x0100 /* NFU */ #define WM8985_NFU_MASK 0x0100 /* NFU */ #define WM8985_NFU_SHIFT 8 /* NFU */ #define WM8985_NFU_WIDTH 1 /* NFU */ #define WM8985_NFEN 0x0080 /* NFEN */ #define WM8985_NFEN_MASK 0x0080 /* NFEN */ #define WM8985_NFEN_SHIFT 7 /* NFEN */ #define WM8985_NFEN_WIDTH 1 /* NFEN */ #define WM8985_NFA0_13_7_MASK 0x007F /* NFA0(13:7) - [6:0] */ #define WM8985_NFA0_13_7_SHIFT 0 /* NFA0(13:7) - [6:0] */ #define WM8985_NFA0_13_7_WIDTH 7 /* NFA0(13:7) - [6:0] */ /* * R28 (0x1C) - Notch Filter 2 */ #define WM8985_NFU 0x0100 /* NFU */ #define WM8985_NFU_MASK 0x0100 /* NFU */ #define WM8985_NFU_SHIFT 8 /* NFU */ #define WM8985_NFU_WIDTH 1 /* NFU */ #define WM8985_NFA0_6_0_MASK 0x007F /* NFA0(6:0) - [6:0] */ #define WM8985_NFA0_6_0_SHIFT 0 /* NFA0(6:0) - [6:0] */ #define WM8985_NFA0_6_0_WIDTH 7 /* NFA0(6:0) - [6:0] */ /* * R29 (0x1D) - Notch Filter 3 */ #define WM8985_NFU 0x0100 /* NFU */ #define WM8985_NFU_MASK 0x0100 /* NFU */ #define WM8985_NFU_SHIFT 8 /* NFU */ #define WM8985_NFU_WIDTH 1 /* NFU */ #define WM8985_NFA1_13_7_MASK 0x007F /* NFA1(13:7) - [6:0] */ #define WM8985_NFA1_13_7_SHIFT 0 /* NFA1(13:7) - [6:0] */ #define WM8985_NFA1_13_7_WIDTH 7 /* NFA1(13:7) - [6:0] */ /* * R30 (0x1E) - Notch Filter 4 */ #define WM8985_NFU 0x0100 /* NFU */ #define WM8985_NFU_MASK 0x0100 /* NFU */ #define WM8985_NFU_SHIFT 8 /* NFU */ #define WM8985_NFU_WIDTH 1 /* NFU */ #define WM8985_NFA1_6_0_MASK 0x007F /* NFA1(6:0) - [6:0] */ #define WM8985_NFA1_6_0_SHIFT 0 /* NFA1(6:0) - [6:0] */ #define WM8985_NFA1_6_0_WIDTH 7 /* NFA1(6:0) - [6:0] */ /* * R32 (0x20) - ALC control 1 */ #define WM8985_ALCSEL_MASK 0x0180 /* ALCSEL - [8:7] */ #define WM8985_ALCSEL_SHIFT 7 /* ALCSEL - [8:7] */ #define WM8985_ALCSEL_WIDTH 2 /* ALCSEL - [8:7] */ #define WM8985_ALCMAX_MASK 0x0038 /* ALCMAX - [5:3] */ #define WM8985_ALCMAX_SHIFT 3 /* ALCMAX - [5:3] */ #define WM8985_ALCMAX_WIDTH 3 /* ALCMAX - [5:3] */ #define WM8985_ALCMIN_MASK 0x0007 /* ALCMIN - [2:0] */ #define WM8985_ALCMIN_SHIFT 0 /* ALCMIN - [2:0] */ #define WM8985_ALCMIN_WIDTH 3 /* ALCMIN - [2:0] */ /* * R33 (0x21) - ALC control 2 */ #define WM8985_ALCHLD_MASK 0x00F0 /* ALCHLD - [7:4] */ #define WM8985_ALCHLD_SHIFT 4 /* ALCHLD - [7:4] */ #define WM8985_ALCHLD_WIDTH 4 /* ALCHLD - [7:4] */ #define WM8985_ALCLVL_MASK 0x000F /* ALCLVL - [3:0] */ #define WM8985_ALCLVL_SHIFT 0 /* ALCLVL - [3:0] */ #define WM8985_ALCLVL_WIDTH 4 /* ALCLVL - [3:0] */ /* * R34 (0x22) - ALC control 3 */ #define WM8985_ALCMODE 0x0100 /* ALCMODE */ #define WM8985_ALCMODE_MASK 0x0100 /* ALCMODE */ #define WM8985_ALCMODE_SHIFT 8 /* ALCMODE */ #define WM8985_ALCMODE_WIDTH 1 /* ALCMODE */ #define WM8985_ALCDCY_MASK 0x00F0 /* ALCDCY - [7:4] */ #define WM8985_ALCDCY_SHIFT 4 /* ALCDCY - [7:4] */ #define WM8985_ALCDCY_WIDTH 4 /* ALCDCY - [7:4] */ #define WM8985_ALCATK_MASK 0x000F /* ALCATK - [3:0] */ #define WM8985_ALCATK_SHIFT 0 /* ALCATK - [3:0] */ #define WM8985_ALCATK_WIDTH 4 /* ALCATK - [3:0] */ /* * R35 (0x23) - Noise Gate */ #define WM8985_NGEN 0x0008 /* NGEN */ #define WM8985_NGEN_MASK 0x0008 /* NGEN */ #define WM8985_NGEN_SHIFT 3 /* NGEN */ #define WM8985_NGEN_WIDTH 1 /* NGEN */ #define WM8985_NGTH_MASK 0x0007 /* NGTH - [2:0] */ #define WM8985_NGTH_SHIFT 0 /* NGTH - [2:0] */ #define WM8985_NGTH_WIDTH 3 /* NGTH - [2:0] */ /* * R36 (0x24) - PLL N */ #define WM8985_PLL_PRESCALE 0x0010 /* PLL_PRESCALE */ #define WM8985_PLL_PRESCALE_MASK 0x0010 /* PLL_PRESCALE */ #define WM8985_PLL_PRESCALE_SHIFT 4 /* PLL_PRESCALE */ #define WM8985_PLL_PRESCALE_WIDTH 1 /* PLL_PRESCALE */ #define WM8985_PLLN_MASK 0x000F /* PLLN - [3:0] */ #define WM8985_PLLN_SHIFT 0 /* PLLN - [3:0] */ #define WM8985_PLLN_WIDTH 4 /* PLLN - [3:0] */ /* * R37 (0x25) - PLL K 1 */ #define WM8985_PLLK_23_18_MASK 0x003F /* PLLK(23:18) - [5:0] */ #define WM8985_PLLK_23_18_SHIFT 0 /* PLLK(23:18) - [5:0] */ #define WM8985_PLLK_23_18_WIDTH 6 /* PLLK(23:18) - [5:0] */ /* * R38 (0x26) - PLL K 2 */ #define WM8985_PLLK_17_9_MASK 0x01FF /* PLLK(17:9) - [8:0] */ #define WM8985_PLLK_17_9_SHIFT 0 /* PLLK(17:9) - [8:0] */ #define WM8985_PLLK_17_9_WIDTH 9 /* PLLK(17:9) - [8:0] */ /* * R39 (0x27) - PLL K 3 */ #define WM8985_PLLK_8_0_MASK 0x01FF /* PLLK(8:0) - [8:0] */ #define WM8985_PLLK_8_0_SHIFT 0 /* PLLK(8:0) - [8:0] */ #define WM8985_PLLK_8_0_WIDTH 9 /* PLLK(8:0) - [8:0] */ /* * R41 (0x29) - 3D control */ #define WM8985_DEPTH3D_MASK 0x000F /* DEPTH3D - [3:0] */ #define WM8985_DEPTH3D_SHIFT 0 /* DEPTH3D - [3:0] */ #define WM8985_DEPTH3D_WIDTH 4 /* DEPTH3D - [3:0] */ /* * R42 (0x2A) - OUT4 to ADC */ #define WM8985_OUT4_2ADCVOL_MASK 0x01C0 /* OUT4_2ADCVOL - [8:6] */ #define WM8985_OUT4_2ADCVOL_SHIFT 6 /* OUT4_2ADCVOL - [8:6] */ #define WM8985_OUT4_2ADCVOL_WIDTH 3 /* OUT4_2ADCVOL - [8:6] */ #define WM8985_OUT4_2LNR 0x0020 /* OUT4_2LNR */ #define WM8985_OUT4_2LNR_MASK 0x0020 /* OUT4_2LNR */ #define WM8985_OUT4_2LNR_SHIFT 5 /* OUT4_2LNR */ #define WM8985_OUT4_2LNR_WIDTH 1 /* OUT4_2LNR */ #define WM8985_POBCTRL 0x0004 /* POBCTRL */ #define WM8985_POBCTRL_MASK 0x0004 /* POBCTRL */ #define WM8985_POBCTRL_SHIFT 2 /* POBCTRL */ #define WM8985_POBCTRL_WIDTH 1 /* POBCTRL */ #define WM8985_DELEN 0x0002 /* DELEN */ #define WM8985_DELEN_MASK 0x0002 /* DELEN */ #define WM8985_DELEN_SHIFT 1 /* DELEN */ #define WM8985_DELEN_WIDTH 1 /* DELEN */ #define WM8985_OUT1DEL 0x0001 /* OUT1DEL */ #define WM8985_OUT1DEL_MASK 0x0001 /* OUT1DEL */ #define WM8985_OUT1DEL_SHIFT 0 /* OUT1DEL */ #define WM8985_OUT1DEL_WIDTH 1 /* OUT1DEL */ /* * R43 (0x2B) - Beep control */ #define WM8985_BYPL2RMIX 0x0100 /* BYPL2RMIX */ #define WM8985_BYPL2RMIX_MASK 0x0100 /* BYPL2RMIX */ #define WM8985_BYPL2RMIX_SHIFT 8 /* BYPL2RMIX */ #define WM8985_BYPL2RMIX_WIDTH 1 /* BYPL2RMIX */ #define WM8985_BYPR2LMIX 0x0080 /* BYPR2LMIX */ #define WM8985_BYPR2LMIX_MASK 0x0080 /* BYPR2LMIX */ #define WM8985_BYPR2LMIX_SHIFT 7 /* BYPR2LMIX */ #define WM8985_BYPR2LMIX_WIDTH 1 /* BYPR2LMIX */ #define WM8985_MUTERPGA2INV 0x0020 /* MUTERPGA2INV */ #define WM8985_MUTERPGA2INV_MASK 0x0020 /* MUTERPGA2INV */ #define WM8985_MUTERPGA2INV_SHIFT 5 /* MUTERPGA2INV */ #define WM8985_MUTERPGA2INV_WIDTH 1 /* MUTERPGA2INV */ #define WM8985_INVROUT2 0x0010 /* INVROUT2 */ #define WM8985_INVROUT2_MASK 0x0010 /* INVROUT2 */ #define WM8985_INVROUT2_SHIFT 4 /* INVROUT2 */ #define WM8985_INVROUT2_WIDTH 1 /* INVROUT2 */ #define WM8985_BEEPVOL_MASK 0x000E /* BEEPVOL - [3:1] */ #define WM8985_BEEPVOL_SHIFT 1 /* BEEPVOL - [3:1] */ #define WM8985_BEEPVOL_WIDTH 3 /* BEEPVOL - [3:1] */ #define WM8985_BEEPEN 0x0001 /* BEEPEN */ #define WM8985_BEEPEN_MASK 0x0001 /* BEEPEN */ #define WM8985_BEEPEN_SHIFT 0 /* BEEPEN */ #define WM8985_BEEPEN_WIDTH 1 /* BEEPEN */ /* * R44 (0x2C) - Input ctrl */ #define WM8985_MBVSEL 0x0100 /* MBVSEL */ #define WM8985_MBVSEL_MASK 0x0100 /* MBVSEL */ #define WM8985_MBVSEL_SHIFT 8 /* MBVSEL */ #define WM8985_MBVSEL_WIDTH 1 /* MBVSEL */ #define WM8985_R2_2INPPGA 0x0040 /* R2_2INPPGA */ #define WM8985_R2_2INPPGA_MASK 0x0040 /* R2_2INPPGA */ #define WM8985_R2_2INPPGA_SHIFT 6 /* R2_2INPPGA */ #define WM8985_R2_2INPPGA_WIDTH 1 /* R2_2INPPGA */ #define WM8985_RIN2INPPGA 0x0020 /* RIN2INPPGA */ #define WM8985_RIN2INPPGA_MASK 0x0020 /* RIN2INPPGA */ #define WM8985_RIN2INPPGA_SHIFT 5 /* RIN2INPPGA */ #define WM8985_RIN2INPPGA_WIDTH 1 /* RIN2INPPGA */ #define WM8985_RIP2INPPGA 0x0010 /* RIP2INPPGA */ #define WM8985_RIP2INPPGA_MASK 0x0010 /* RIP2INPPGA */ #define WM8985_RIP2INPPGA_SHIFT 4 /* RIP2INPPGA */ #define WM8985_RIP2INPPGA_WIDTH 1 /* RIP2INPPGA */ #define WM8985_L2_2INPPGA 0x0004 /* L2_2INPPGA */ #define WM8985_L2_2INPPGA_MASK 0x0004 /* L2_2INPPGA */ #define WM8985_L2_2INPPGA_SHIFT 2 /* L2_2INPPGA */ #define WM8985_L2_2INPPGA_WIDTH 1 /* L2_2INPPGA */ #define WM8985_LIN2INPPGA 0x0002 /* LIN2INPPGA */ #define WM8985_LIN2INPPGA_MASK 0x0002 /* LIN2INPPGA */ #define WM8985_LIN2INPPGA_SHIFT 1 /* LIN2INPPGA */ #define WM8985_LIN2INPPGA_WIDTH 1 /* LIN2INPPGA */ #define WM8985_LIP2INPPGA 0x0001 /* LIP2INPPGA */ #define WM8985_LIP2INPPGA_MASK 0x0001 /* LIP2INPPGA */ #define WM8985_LIP2INPPGA_SHIFT 0 /* LIP2INPPGA */ #define WM8985_LIP2INPPGA_WIDTH 1 /* LIP2INPPGA */ /* * R45 (0x2D) - Left INP PGA gain ctrl */ #define WM8985_INPGAVU 0x0100 /* INPGAVU */ #define WM8985_INPGAVU_MASK 0x0100 /* INPGAVU */ #define WM8985_INPGAVU_SHIFT 8 /* INPGAVU */ #define WM8985_INPGAVU_WIDTH 1 /* INPGAVU */ #define WM8985_INPPGAZCL 0x0080 /* INPPGAZCL */ #define WM8985_INPPGAZCL_MASK 0x0080 /* INPPGAZCL */ #define WM8985_INPPGAZCL_SHIFT 7 /* INPPGAZCL */ #define WM8985_INPPGAZCL_WIDTH 1 /* INPPGAZCL */ #define WM8985_INPPGAMUTEL 0x0040 /* INPPGAMUTEL */ #define WM8985_INPPGAMUTEL_MASK 0x0040 /* INPPGAMUTEL */ #define WM8985_INPPGAMUTEL_SHIFT 6 /* INPPGAMUTEL */ #define WM8985_INPPGAMUTEL_WIDTH 1 /* INPPGAMUTEL */ #define WM8985_INPPGAVOLL_MASK 0x003F /* INPPGAVOLL - [5:0] */ #define WM8985_INPPGAVOLL_SHIFT 0 /* INPPGAVOLL - [5:0] */ #define WM8985_INPPGAVOLL_WIDTH 6 /* INPPGAVOLL - [5:0] */ /* * R46 (0x2E) - Right INP PGA gain ctrl */ #define WM8985_INPGAVU 0x0100 /* INPGAVU */ #define WM8985_INPGAVU_MASK 0x0100 /* INPGAVU */ #define WM8985_INPGAVU_SHIFT 8 /* INPGAVU */ #define WM8985_INPGAVU_WIDTH 1 /* INPGAVU */ #define WM8985_INPPGAZCR 0x0080 /* INPPGAZCR */ #define WM8985_INPPGAZCR_MASK 0x0080 /* INPPGAZCR */ #define WM8985_INPPGAZCR_SHIFT 7 /* INPPGAZCR */ #define WM8985_INPPGAZCR_WIDTH 1 /* INPPGAZCR */ #define WM8985_INPPGAMUTER 0x0040 /* INPPGAMUTER */ #define WM8985_INPPGAMUTER_MASK 0x0040 /* INPPGAMUTER */ #define WM8985_INPPGAMUTER_SHIFT 6 /* INPPGAMUTER */ #define WM8985_INPPGAMUTER_WIDTH 1 /* INPPGAMUTER */ #define WM8985_INPPGAVOLR_MASK 0x003F /* INPPGAVOLR - [5:0] */ #define WM8985_INPPGAVOLR_SHIFT 0 /* INPPGAVOLR - [5:0] */ #define WM8985_INPPGAVOLR_WIDTH 6 /* INPPGAVOLR - [5:0] */ /* * R47 (0x2F) - Left ADC BOOST ctrl */ #define WM8985_PGABOOSTL 0x0100 /* PGABOOSTL */ #define WM8985_PGABOOSTL_MASK 0x0100 /* PGABOOSTL */ #define WM8985_PGABOOSTL_SHIFT 8 /* PGABOOSTL */ #define WM8985_PGABOOSTL_WIDTH 1 /* PGABOOSTL */ #define WM8985_L2_2BOOSTVOL_MASK 0x0070 /* L2_2BOOSTVOL - [6:4] */ #define WM8985_L2_2BOOSTVOL_SHIFT 4 /* L2_2BOOSTVOL - [6:4] */ #define WM8985_L2_2BOOSTVOL_WIDTH 3 /* L2_2BOOSTVOL - [6:4] */ #define WM8985_AUXL2BOOSTVOL_MASK 0x0007 /* AUXL2BOOSTVOL - [2:0] */ #define WM8985_AUXL2BOOSTVOL_SHIFT 0 /* AUXL2BOOSTVOL - [2:0] */ #define WM8985_AUXL2BOOSTVOL_WIDTH 3 /* AUXL2BOOSTVOL - [2:0] */ /* * R48 (0x30) - Right ADC BOOST ctrl */ #define WM8985_PGABOOSTR 0x0100 /* PGABOOSTR */ #define WM8985_PGABOOSTR_MASK 0x0100 /* PGABOOSTR */ #define WM8985_PGABOOSTR_SHIFT 8 /* PGABOOSTR */ #define WM8985_PGABOOSTR_WIDTH 1 /* PGABOOSTR */ #define WM8985_R2_2BOOSTVOL_MASK 0x0070 /* R2_2BOOSTVOL - [6:4] */ #define WM8985_R2_2BOOSTVOL_SHIFT 4 /* R2_2BOOSTVOL - [6:4] */ #define WM8985_R2_2BOOSTVOL_WIDTH 3 /* R2_2BOOSTVOL - [6:4] */ #define WM8985_AUXR2BOOSTVOL_MASK 0x0007 /* AUXR2BOOSTVOL - [2:0] */ #define WM8985_AUXR2BOOSTVOL_SHIFT 0 /* AUXR2BOOSTVOL - [2:0] */ #define WM8985_AUXR2BOOSTVOL_WIDTH 3 /* AUXR2BOOSTVOL - [2:0] */ /* * R49 (0x31) - Output ctrl */ #define WM8985_DACL2RMIX 0x0040 /* DACL2RMIX */ #define WM8985_DACL2RMIX_MASK 0x0040 /* DACL2RMIX */ #define WM8985_DACL2RMIX_SHIFT 6 /* DACL2RMIX */ #define WM8985_DACL2RMIX_WIDTH 1 /* DACL2RMIX */ #define WM8985_DACR2LMIX 0x0020 /* DACR2LMIX */ #define WM8985_DACR2LMIX_MASK 0x0020 /* DACR2LMIX */ #define WM8985_DACR2LMIX_SHIFT 5 /* DACR2LMIX */ #define WM8985_DACR2LMIX_WIDTH 1 /* DACR2LMIX */ #define WM8985_OUT4BOOST 0x0010 /* OUT4BOOST */ #define WM8985_OUT4BOOST_MASK 0x0010 /* OUT4BOOST */ #define WM8985_OUT4BOOST_SHIFT 4 /* OUT4BOOST */ #define WM8985_OUT4BOOST_WIDTH 1 /* OUT4BOOST */ #define WM8985_OUT3BOOST 0x0008 /* OUT3BOOST */ #define WM8985_OUT3BOOST_MASK 0x0008 /* OUT3BOOST */ #define WM8985_OUT3BOOST_SHIFT 3 /* OUT3BOOST */ #define WM8985_OUT3BOOST_WIDTH 1 /* OUT3BOOST */ #define WM8985_TSOPCTRL 0x0004 /* TSOPCTRL */ #define WM8985_TSOPCTRL_MASK 0x0004 /* TSOPCTRL */ #define WM8985_TSOPCTRL_SHIFT 2 /* TSOPCTRL */ #define WM8985_TSOPCTRL_WIDTH 1 /* TSOPCTRL */ #define WM8985_TSDEN 0x0002 /* TSDEN */ #define WM8985_TSDEN_MASK 0x0002 /* TSDEN */ #define WM8985_TSDEN_SHIFT 1 /* TSDEN */ #define WM8985_TSDEN_WIDTH 1 /* TSDEN */ #define WM8985_VROI 0x0001 /* VROI */ #define WM8985_VROI_MASK 0x0001 /* VROI */ #define WM8985_VROI_SHIFT 0 /* VROI */ #define WM8985_VROI_WIDTH 1 /* VROI */ /* * R50 (0x32) - Left mixer ctrl */ #define WM8985_AUXLMIXVOL_MASK 0x01C0 /* AUXLMIXVOL - [8:6] */ #define WM8985_AUXLMIXVOL_SHIFT 6 /* AUXLMIXVOL - [8:6] */ #define WM8985_AUXLMIXVOL_WIDTH 3 /* AUXLMIXVOL - [8:6] */ #define WM8985_AUXL2LMIX 0x0020 /* AUXL2LMIX */ #define WM8985_AUXL2LMIX_MASK 0x0020 /* AUXL2LMIX */ #define WM8985_AUXL2LMIX_SHIFT 5 /* AUXL2LMIX */ #define WM8985_AUXL2LMIX_WIDTH 1 /* AUXL2LMIX */ #define WM8985_BYPLMIXVOL_MASK 0x001C /* BYPLMIXVOL - [4:2] */ #define WM8985_BYPLMIXVOL_SHIFT 2 /* BYPLMIXVOL - [4:2] */ #define WM8985_BYPLMIXVOL_WIDTH 3 /* BYPLMIXVOL - [4:2] */ #define WM8985_BYPL2LMIX 0x0002 /* BYPL2LMIX */ #define WM8985_BYPL2LMIX_MASK 0x0002 /* BYPL2LMIX */ #define WM8985_BYPL2LMIX_SHIFT 1 /* BYPL2LMIX */ #define WM8985_BYPL2LMIX_WIDTH 1 /* BYPL2LMIX */ #define WM8985_DACL2LMIX 0x0001 /* DACL2LMIX */ #define WM8985_DACL2LMIX_MASK 0x0001 /* DACL2LMIX */ #define WM8985_DACL2LMIX_SHIFT 0 /* DACL2LMIX */ #define WM8985_DACL2LMIX_WIDTH 1 /* DACL2LMIX */ /* * R51 (0x33) - Right mixer ctrl */ #define WM8985_AUXRMIXVOL_MASK 0x01C0 /* AUXRMIXVOL - [8:6] */ #define WM8985_AUXRMIXVOL_SHIFT 6 /* AUXRMIXVOL - [8:6] */ #define WM8985_AUXRMIXVOL_WIDTH 3 /* AUXRMIXVOL - [8:6] */ #define WM8985_AUXR2RMIX 0x0020 /* AUXR2RMIX */ #define WM8985_AUXR2RMIX_MASK 0x0020 /* AUXR2RMIX */ #define WM8985_AUXR2RMIX_SHIFT 5 /* AUXR2RMIX */ #define WM8985_AUXR2RMIX_WIDTH 1 /* AUXR2RMIX */ #define WM8985_BYPRMIXVOL_MASK 0x001C /* BYPRMIXVOL - [4:2] */ #define WM8985_BYPRMIXVOL_SHIFT 2 /* BYPRMIXVOL - [4:2] */ #define WM8985_BYPRMIXVOL_WIDTH 3 /* BYPRMIXVOL - [4:2] */ #define WM8985_BYPR2RMIX 0x0002 /* BYPR2RMIX */ #define WM8985_BYPR2RMIX_MASK 0x0002 /* BYPR2RMIX */ #define WM8985_BYPR2RMIX_SHIFT 1 /* BYPR2RMIX */ #define WM8985_BYPR2RMIX_WIDTH 1 /* BYPR2RMIX */ #define WM8985_DACR2RMIX 0x0001 /* DACR2RMIX */ #define WM8985_DACR2RMIX_MASK 0x0001 /* DACR2RMIX */ #define WM8985_DACR2RMIX_SHIFT 0 /* DACR2RMIX */ #define WM8985_DACR2RMIX_WIDTH 1 /* DACR2RMIX */ /* * R52 (0x34) - LOUT1 (HP) volume ctrl */ #define WM8985_OUT1VU 0x0100 /* OUT1VU */ #define WM8985_OUT1VU_MASK 0x0100 /* OUT1VU */ #define WM8985_OUT1VU_SHIFT 8 /* OUT1VU */ #define WM8985_OUT1VU_WIDTH 1 /* OUT1VU */ #define WM8985_LOUT1ZC 0x0080 /* LOUT1ZC */ #define WM8985_LOUT1ZC_MASK 0x0080 /* LOUT1ZC */ #define WM8985_LOUT1ZC_SHIFT 7 /* LOUT1ZC */ #define WM8985_LOUT1ZC_WIDTH 1 /* LOUT1ZC */ #define WM8985_LOUT1MUTE 0x0040 /* LOUT1MUTE */ #define WM8985_LOUT1MUTE_MASK 0x0040 /* LOUT1MUTE */ #define WM8985_LOUT1MUTE_SHIFT 6 /* LOUT1MUTE */ #define WM8985_LOUT1MUTE_WIDTH 1 /* LOUT1MUTE */ #define WM8985_LOUT1VOL_MASK 0x003F /* LOUT1VOL - [5:0] */ #define WM8985_LOUT1VOL_SHIFT 0 /* LOUT1VOL - [5:0] */ #define WM8985_LOUT1VOL_WIDTH 6 /* LOUT1VOL - [5:0] */ /* * R53 (0x35) - ROUT1 (HP) volume ctrl */ #define WM8985_OUT1VU 0x0100 /* OUT1VU */ #define WM8985_OUT1VU_MASK 0x0100 /* OUT1VU */ #define WM8985_OUT1VU_SHIFT 8 /* OUT1VU */ #define WM8985_OUT1VU_WIDTH 1 /* OUT1VU */ #define WM8985_ROUT1ZC 0x0080 /* ROUT1ZC */ #define WM8985_ROUT1ZC_MASK 0x0080 /* ROUT1ZC */ #define WM8985_ROUT1ZC_SHIFT 7 /* ROUT1ZC */ #define WM8985_ROUT1ZC_WIDTH 1 /* ROUT1ZC */ #define WM8985_ROUT1MUTE 0x0040 /* ROUT1MUTE */ #define WM8985_ROUT1MUTE_MASK 0x0040 /* ROUT1MUTE */ #define WM8985_ROUT1MUTE_SHIFT 6 /* ROUT1MUTE */ #define WM8985_ROUT1MUTE_WIDTH 1 /* ROUT1MUTE */ #define WM8985_ROUT1VOL_MASK 0x003F /* ROUT1VOL - [5:0] */ #define WM8985_ROUT1VOL_SHIFT 0 /* ROUT1VOL - [5:0] */ #define WM8985_ROUT1VOL_WIDTH 6 /* ROUT1VOL - [5:0] */ /* * R54 (0x36) - LOUT2 (SPK) volume ctrl */ #define WM8985_OUT2VU 0x0100 /* OUT2VU */ #define WM8985_OUT2VU_MASK 0x0100 /* OUT2VU */ #define WM8985_OUT2VU_SHIFT 8 /* OUT2VU */ #define WM8985_OUT2VU_WIDTH 1 /* OUT2VU */ #define WM8985_LOUT2ZC 0x0080 /* LOUT2ZC */ #define WM8985_LOUT2ZC_MASK 0x0080 /* LOUT2ZC */ #define WM8985_LOUT2ZC_SHIFT 7 /* LOUT2ZC */ #define WM8985_LOUT2ZC_WIDTH 1 /* LOUT2ZC */ #define WM8985_LOUT2MUTE 0x0040 /* LOUT2MUTE */ #define WM8985_LOUT2MUTE_MASK 0x0040 /* LOUT2MUTE */ #define WM8985_LOUT2MUTE_SHIFT 6 /* LOUT2MUTE */ #define WM8985_LOUT2MUTE_WIDTH 1 /* LOUT2MUTE */ #define WM8985_LOUT2VOL_MASK 0x003F /* LOUT2VOL - [5:0] */ #define WM8985_LOUT2VOL_SHIFT 0 /* LOUT2VOL - [5:0] */ #define WM8985_LOUT2VOL_WIDTH 6 /* LOUT2VOL - [5:0] */ /* * R55 (0x37) - ROUT2 (SPK) volume ctrl */ #define WM8985_OUT2VU 0x0100 /* OUT2VU */ #define WM8985_OUT2VU_MASK 0x0100 /* OUT2VU */ #define WM8985_OUT2VU_SHIFT 8 /* OUT2VU */ #define WM8985_OUT2VU_WIDTH 1 /* OUT2VU */ #define WM8985_ROUT2ZC 0x0080 /* ROUT2ZC */ #define WM8985_ROUT2ZC_MASK 0x0080 /* ROUT2ZC */ #define WM8985_ROUT2ZC_SHIFT 7 /* ROUT2ZC */ #define WM8985_ROUT2ZC_WIDTH 1 /* ROUT2ZC */ #define WM8985_ROUT2MUTE 0x0040 /* ROUT2MUTE */ #define WM8985_ROUT2MUTE_MASK 0x0040 /* ROUT2MUTE */ #define WM8985_ROUT2MUTE_SHIFT 6 /* ROUT2MUTE */ #define WM8985_ROUT2MUTE_WIDTH 1 /* ROUT2MUTE */ #define WM8985_ROUT2VOL_MASK 0x003F /* ROUT2VOL - [5:0] */ #define WM8985_ROUT2VOL_SHIFT 0 /* ROUT2VOL - [5:0] */ #define WM8985_ROUT2VOL_WIDTH 6 /* ROUT2VOL - [5:0] */ /* * R56 (0x38) - OUT3 mixer ctrl */ #define WM8985_OUT3MUTE 0x0040 /* OUT3MUTE */ #define WM8985_OUT3MUTE_MASK 0x0040 /* OUT3MUTE */ #define WM8985_OUT3MUTE_SHIFT 6 /* OUT3MUTE */ #define WM8985_OUT3MUTE_WIDTH 1 /* OUT3MUTE */ #define WM8985_OUT4_2OUT3 0x0008 /* OUT4_2OUT3 */ #define WM8985_OUT4_2OUT3_MASK 0x0008 /* OUT4_2OUT3 */ #define WM8985_OUT4_2OUT3_SHIFT 3 /* OUT4_2OUT3 */ #define WM8985_OUT4_2OUT3_WIDTH 1 /* OUT4_2OUT3 */ #define WM8985_BYPL2OUT3 0x0004 /* BYPL2OUT3 */ #define WM8985_BYPL2OUT3_MASK 0x0004 /* BYPL2OUT3 */ #define WM8985_BYPL2OUT3_SHIFT 2 /* BYPL2OUT3 */ #define WM8985_BYPL2OUT3_WIDTH 1 /* BYPL2OUT3 */ #define WM8985_LMIX2OUT3 0x0002 /* LMIX2OUT3 */ #define WM8985_LMIX2OUT3_MASK 0x0002 /* LMIX2OUT3 */ #define WM8985_LMIX2OUT3_SHIFT 1 /* LMIX2OUT3 */ #define WM8985_LMIX2OUT3_WIDTH 1 /* LMIX2OUT3 */ #define WM8985_LDAC2OUT3 0x0001 /* LDAC2OUT3 */ #define WM8985_LDAC2OUT3_MASK 0x0001 /* LDAC2OUT3 */ #define WM8985_LDAC2OUT3_SHIFT 0 /* LDAC2OUT3 */ #define WM8985_LDAC2OUT3_WIDTH 1 /* LDAC2OUT3 */ /* * R57 (0x39) - OUT4 (MONO) mix ctrl */ #define WM8985_OUT3_2OUT4 0x0080 /* OUT3_2OUT4 */ #define WM8985_OUT3_2OUT4_MASK 0x0080 /* OUT3_2OUT4 */ #define WM8985_OUT3_2OUT4_SHIFT 7 /* OUT3_2OUT4 */ #define WM8985_OUT3_2OUT4_WIDTH 1 /* OUT3_2OUT4 */ #define WM8985_OUT4MUTE 0x0040 /* OUT4MUTE */ #define WM8985_OUT4MUTE_MASK 0x0040 /* OUT4MUTE */ #define WM8985_OUT4MUTE_SHIFT 6 /* OUT4MUTE */ #define WM8985_OUT4MUTE_WIDTH 1 /* OUT4MUTE */ #define WM8985_OUT4ATTN 0x0020 /* OUT4ATTN */ #define WM8985_OUT4ATTN_MASK 0x0020 /* OUT4ATTN */ #define WM8985_OUT4ATTN_SHIFT 5 /* OUT4ATTN */ #define WM8985_OUT4ATTN_WIDTH 1 /* OUT4ATTN */ #define WM8985_LMIX2OUT4 0x0010 /* LMIX2OUT4 */ #define WM8985_LMIX2OUT4_MASK 0x0010 /* LMIX2OUT4 */ #define WM8985_LMIX2OUT4_SHIFT 4 /* LMIX2OUT4 */ #define WM8985_LMIX2OUT4_WIDTH 1 /* LMIX2OUT4 */ #define WM8985_LDAC2OUT4 0x0008 /* LDAC2OUT4 */ #define WM8985_LDAC2OUT4_MASK 0x0008 /* LDAC2OUT4 */ #define WM8985_LDAC2OUT4_SHIFT 3 /* LDAC2OUT4 */ #define WM8985_LDAC2OUT4_WIDTH 1 /* LDAC2OUT4 */ #define WM8985_BYPR2OUT4 0x0004 /* BYPR2OUT4 */ #define WM8985_BYPR2OUT4_MASK 0x0004 /* BYPR2OUT4 */ #define WM8985_BYPR2OUT4_SHIFT 2 /* BYPR2OUT4 */ #define WM8985_BYPR2OUT4_WIDTH 1 /* BYPR2OUT4 */ #define WM8985_RMIX2OUT4 0x0002 /* RMIX2OUT4 */ #define WM8985_RMIX2OUT4_MASK 0x0002 /* RMIX2OUT4 */ #define WM8985_RMIX2OUT4_SHIFT 1 /* RMIX2OUT4 */ #define WM8985_RMIX2OUT4_WIDTH 1 /* RMIX2OUT4 */ #define WM8985_RDAC2OUT4 0x0001 /* RDAC2OUT4 */ #define WM8985_RDAC2OUT4_MASK 0x0001 /* RDAC2OUT4 */ #define WM8985_RDAC2OUT4_SHIFT 0 /* RDAC2OUT4 */ #define WM8985_RDAC2OUT4_WIDTH 1 /* RDAC2OUT4 */ /* * R60 (0x3C) - OUTPUT ctrl */ #define WM8985_VIDBUFFTST_MASK 0x01E0 /* VIDBUFFTST - [8:5] */ #define WM8985_VIDBUFFTST_SHIFT 5 /* VIDBUFFTST - [8:5] */ #define WM8985_VIDBUFFTST_WIDTH 4 /* VIDBUFFTST - [8:5] */ #define WM8985_HPTOG 0x0008 /* HPTOG */ #define WM8985_HPTOG_MASK 0x0008 /* HPTOG */ #define WM8985_HPTOG_SHIFT 3 /* HPTOG */ #define WM8985_HPTOG_WIDTH 1 /* HPTOG */ /* * R61 (0x3D) - BIAS CTRL */ #define WM8985_BIASCUT 0x0100 /* BIASCUT */ #define WM8985_BIASCUT_MASK 0x0100 /* BIASCUT */ #define WM8985_BIASCUT_SHIFT 8 /* BIASCUT */ #define WM8985_BIASCUT_WIDTH 1 /* BIASCUT */ #define WM8985_HALFIPBIAS 0x0080 /* HALFIPBIAS */ #define WM8985_HALFIPBIAS_MASK 0x0080 /* HALFIPBIAS */ #define WM8985_HALFIPBIAS_SHIFT 7 /* HALFIPBIAS */ #define WM8985_HALFIPBIAS_WIDTH 1 /* HALFIPBIAS */ #define WM8985_VBBIASTST_MASK 0x0060 /* VBBIASTST - [6:5] */ #define WM8985_VBBIASTST_SHIFT 5 /* VBBIASTST - [6:5] */ #define WM8985_VBBIASTST_WIDTH 2 /* VBBIASTST - [6:5] */ #define WM8985_BUFBIAS_MASK 0x0018 /* BUFBIAS - [4:3] */ #define WM8985_BUFBIAS_SHIFT 3 /* BUFBIAS - [4:3] */ #define WM8985_BUFBIAS_WIDTH 2 /* BUFBIAS - [4:3] */ #define WM8985_ADCBIAS_MASK 0x0006 /* ADCBIAS - [2:1] */ #define WM8985_ADCBIAS_SHIFT 1 /* ADCBIAS - [2:1] */ #define WM8985_ADCBIAS_WIDTH 2 /* ADCBIAS - [2:1] */ #define WM8985_HALFOPBIAS 0x0001 /* HALFOPBIAS */ #define WM8985_HALFOPBIAS_MASK 0x0001 /* HALFOPBIAS */ #define WM8985_HALFOPBIAS_SHIFT 0 /* HALFOPBIAS */ #define WM8985_HALFOPBIAS_WIDTH 1 /* HALFOPBIAS */ enum clk_src { WM8985_CLKSRC_MCLK, WM8985_CLKSRC_PLL }; #define WM8985_PLL 0 #endif
{ "pile_set_name": "Github" }
<?xml version="1.0" encoding="UTF-8"?> <project version="4"> <component name="GradleSettings"> <option name="linkedExternalProjectsSettings"> <GradleProjectSettings> <option name="distributionType" value="DEFAULT_WRAPPED" /> <option name="externalProjectPath" value="$PROJECT_DIR$" /> <option name="modules"> <set> <option value="$PROJECT_DIR$" /> <option value="$PROJECT_DIR$/app" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/connectivity-0.3.1/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/device_info-0.2.1/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/fluttertoast-3.0.3/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/image_picker-0.4.12+1/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/path_provider-0.5.0+1/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/shared_preferences-0.4.3/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/sqflite-1.1.3/android" /> <option value="/soft/android/android_flutter/flutter/.pub-cache/hosted/pub.flutter-io.cn/video_player-0.6.1/android" /> </set> </option> <option name="resolveModulePerSourceSet" value="false" /> </GradleProjectSettings> </option> </component> </project>
{ "pile_set_name": "Github" }
Libyan ruler Muammar Gadhafi clung to power in the capital Tripoli yesterday while his forces continued attacks on opposition forces. In what appears to be a desperate measure, Gadhafi has armed many of his loyalists. In an address, he declared that "anyone who does not love Gadhafi does not deserve to live." Open gallery view Libyans demonstrate against Muammar Gadhafi’s regime in the eastern city of Tobruk, Feb. 26, 2011. Credit: AP Late yesterday, two British military aircraft rescued 150 Britons and delivered them to Malta, as the evacuation of foreigners has become the focus of many governments. As the rescue unfolded, there was a standoff on the streets of Tripoli. According to journalists allowed access to the city by the Libyan Foreign Ministry, the capital appeared divided between the quiet and controlled seafront and the small alleys of the poorer neighborhoods. In less prosperous areas there were few signs of the security forces, which have abandoned the working-class Tajura district after five days of anti-government demonstrations. Meanwhile, Gadhafi's son Saif al-Islam told reporters invited into the country late on Friday that peace was returning to Libya. "If you hear fireworks don't mistake it for shooting," said the younger Gadhafi, 38, smiling. Yesterday, Gadhafi's son insisted that the rebels were few and isolated, but also warned that the unrest threatened civil war. "What the Libyan nation is going through has opened the door to all options, and now the signs of civil war and foreign interference have started," he told Al Arabiya television. Libyan state TV again showed a crowd chanting their loyalty to Gadhafi in Tripoli's Green Square Friday. But journalists estimated their number at only about 200. Gadhafi called on his supporters to defend Libya. "We can defeat any aggression if we have to, we will arm the citizens. Prepare to fight for Libya, prepare to fight for your honor, prepare to fight for the oil," Gadhafi said. "At the right time we will open the arms depots so that all Libyans and tribesmen will be armed so that Libya will become red with fire." Much of the east of the oil-producing country, including the second city Benghazi, is in opposition hands. From Misurata, a city 200 kilometers east of Tripoli, residents and exile groups said forces loyal to Gadhafi, operating from the local airport, had been rebuffed. Meanwhile, the UN Security Council went behind closed doors yesterday in an urgent session to discuss sanctions against Libya. The draft resolution includes an arms embargo, asset freeze and travel bans for Gadhafi and his associates. It also refers Gadhafi to the International Criminal Court for alleged crimes against humanity, which could prove to be a sticking point for some member nations, including China. The session yesterday comes the day after Libyan Ambassador Mohamed Shalgam made an impassioned appeal to his UN counterparts. "I hope within hours, not days, that they can do something tangible," he said. Protesters in Zawiyah, an oil-refining town on the main coastal highway, have fought off government forces for several nights, according to witnesses who fled across the nearby Tunisian border. At Tripoli's international airport, thousands of desperate foreign workers besieged the main gate trying to leave the country as police used batons and whips to keep them out. In Washington, President Barack Obama sharpened his tone after the evacuation of U.S. citizens. "Gadhafi, his government and close associates have taken extreme measures against the people of Libya, including by using weapons of war, mercenaries and wanton violence against unarmed civilians," he said.
{ "pile_set_name": "OpenWebText2" }
Q: Getting CSS issue with html submit button I have created CSS button from this site cssportal.com but after adding to my site I am getting different from original created. Why I am getting border from left and top. Original View: but currently I am getting this: My Fiddle: Sample A: Give a border: 0; to the CSS... Preview Normal and Hover versions: Fiddle: http://jsfiddle.net/xm73g/3/ .wpcf7-submit { font-family:"Helvetica Neue", Helvetica, Arial, sans-serif; font-weight: bold; color: #FFFFFF !important; font-size: 15px; text-shadow: 1px 1px 0px #3498DB; text-transform:uppercase; padding: 10px 40px; -moz-border-radius: 4px; -webkit-border-radius: 4px; border-radius: 4px; border: 0; background: #3498DB; background: linear-gradient(top, #3498DB, #3498DB); background: -ms-linear-gradient(top, #3498DB, #3498DB); background: -webkit-gradient(linear, left top, left bottom, from(#3498DB), to(#3498DB)); background: -moz-linear-gradient(top, #3498DB, #3498DB); }
{ "pile_set_name": "StackExchange" }
Achieving zero emissions from Norwegian ferry operations by 2030 is by no means unrealistic,” say Ole Kristian Sollie and Edvard Sandvik of the Norwegian Public Roads Administration. In 2015, the world’s first all-electric ferry commenced operations on the Lavik-Oppedal crossing. By 2022, over 70 battery-powered ferries will be trafficking Norwegian fjords. “Public research development contracts have played their part in making the Norwegian maritime sector a world leader in this field. The goal is zero emissions and in the case of services on which it is not feasible to operate all-electric vessels, the ambition is for the first hydrogen-electric ferry to be operational in 2021. This contract was awarded to Norled in November 2018 and signed on 8 January of this year. The ferry will operate on the Hjelmeland-Nesvik crossing in Ryfylke,” says Tekna member and climate coordinator R&D Ole Kristian Sollie and Edvard Sandvik, departmental director for ferry contracts for the Norwegian Public Roads Administration. 50 per cent reduction by 2030 “The operations of the Norwegian Public Roads Administration are extensive and the climate targets are an integral part of everything we do,” says Ole Kristian Sollie, adding “By 2030, our goal is to have cut emissions from all forms of transport by 50 per cent. Public research development contracts in the area of ferry operations are one example in which the Norwegian Public Roads Administration is contributing to the development of zero and low emission technology, while at the same time increasing activity levels within the Norwegian maritime sector. “In terms of ferry operations, the big changes will be seen in 2021, 2022 and 2023,” says Edvard Sandvik. He is in no doubt whatsoever that achieving zero emissions from ferry operations by 2030 is entirely feasible in technical terms. Public sector procurements of ferry services cover 130 ferry crossings and 200 ferries. Private ferry companies operate and own most of the ferries on national and county road networks. Environmental requirements incumbent on the purchaser The Norwegian Public Roads Administration’s work on environmentally friendly ferries has garnered widespread attention and inquiries from operators all over the world seeking to learn about the green change taking place within ferry operations. The Norwegian Public Roads Administration works with three main types of environmentally friendly ferries: those fuelled by natural gas (LNG), battery power (all-electric) or hydrogen. The first-ever LNG ferry, the MF Glutra, was delivered in 2000. During the course of 2019, the number of LNG ferries will reach 25. The first all-electric ferry, the MF Ampere, commenced operations in 2015. By 2022, Sandvik predicts that there will be more than 70 battery-powered ferries operating on Norwegian fjords – either all-electric or hybrid-powered. Maritime jobs “We will have the world’s biggest maritime zero and low emission sector. As a result of the investment in battery-powered ferries, Norway has a large part of worldwide output of maritime batteries, produced by companies such as Siemens, Rolls-Royce and Corvus. This could create a large number of jobs in the maritime supplier sector in Norway. The market for maritime batteries is in the process of exploding. According to DNV-GL, 260 vessels have installed or placed orders for maritime batteries.” “By 2030, two thirds of the energy needed to power Norwegian ferries, which previously came from fossil fuels, will be replaced by electricity from the national power grid. We will insist on electrical operations where this is technically feasible. Where this is precluded by crossing times and energy requirements, one third of the energy needs of ferries will have to come from other energy carriers such as hydrogen and biodiesel or biogas,” say Ole Kristian Sollie and Edvard Sandvik. https://teknamagasinet.no/elektriske-ferjer-suksess-for-klima-og-norsk-batteriproduksjon/
{ "pile_set_name": "OpenWebText2" }
The Progressive Pope thinks he’s a Democrat politician whose job it is to attack President Trump relentlessly. This Pope is way too involved in politics in general, especially the United States. He has zero political experience and does not live in the United States, so why he insists on trashing our America First President and trying to undermine everything he does is a mystery. More from Wayne Dupree Or it is? WE LOVE THIS: Top Gear Host Unloads on Greta Thunberg ‘Go Back To School And Shut Up’ After all, Pope Francis has been nicknamed “Obama’s Pope” Many people claim Pope Benedict was swapped out for Francis in order to try and steer the Catholic Church towards a more progressive agenda. When do you think the country should re-open and get back to work? Today Next week Another month or two Email Address (required) By completing the poll, you agree to receive emails from WayneDupree.com and that you've read and agree to our privacy policy and legal statement Results Vote Sadly, it seems to be working. That would also explain all of the attacks and progressive garbage that the Pope is spewing on a daily basis. However, the Pope really took things too far during a recent visit to Buddhists in Thailand. Pope Francis addressed the topic of “refugees” and in doing so, compared the policy of building walls and detention centers to the acts of King Herod who killed Jesus. Sickening. “The phenomenon of refugees has always existed, but today it is better known because of social differences, hunger, political tensions and especially war. For these reasons, migratory movements are intensifying. What is the answer the world gives? The policy of waste. Refugees are waste material. The Mediterranean has been turned into a cemetery. The notorious cruelty of some detention centers in Libya touches my heart. Here in Asia, we all know the problem of the Rohingya. I must admit that I am shocked by some of the narratives I hear in Europe about borders. Populism is gaining strength.” “In other parts, there are walls that even separate children from parents,” Pope Francis said in an oblique reference to President Trump’s policies on the southern border, suggesting that the policies will ultimately fail. “Herod comes to mind. Yet for drugs, there’s no wall to keep them out.” King Herod, also known as Herod the Great, was a Roman client king of Judea. Herod’s family were converts to Judaism and his religious commitment was questioned by some elements of Jewish society. While Herod publicly identified himself as a Jew and was considered as such by some, this religious identification was undermined by the decadent lifestyle of the Herodians, which would have earned them the antipathy of observant Jews. Herod later executed several members of his own family, including his wife Mariamne. The account of the Massacre of the Innocents in the New Testament, in an attempt to kill the infant Jesus, Herod gave orders to kill all boys of the age of two and under in Bethlehem and its vicinity. [BreakingIsraelNews] Attn: Wayne Dupree is a free speech champion who works tirelessly to bring you news that the mainstream media ignores. But he needs your support in order to keep delivering quality, independent journalism. You can make a huge impact in the war against fake news by pledging as little as $5 per month. Please click here Patreon.com/WDShow to help Wayne battle the fake news media.
{ "pile_set_name": "OpenWebText2" }
Introduction {#sec1-1} ============ Severe trauma and major surgery frequently result in the development of inflammatory complications, including systemic inflammatory response syndrome, sepsis, and septic shock with subsequent splanchnic hypoperfusion. Intestinal cell damage developed within 1 h after shock induction.\[[@ref1]\] Tissue injury after ischemia is primarily caused by reduced oxygen supply and the injury may be worsened during reperfusion phase via formation of reactive oxygen radicals which can promote cell destruction and bowel necrosis through peroxidation of membrane lipid with subsequent increase in the intestinal mucosal level of malondialdehyde (MDA).\[[@ref2]\] In addition, membrane protein oxidation induces early increase in mucosal protein carbonyl (PC) level owing to formation of reactive chlorinating species capable of oxidizing protein. Moreover, the oxidative stress inhibit the endogenous antioxidant system which includes glutathione peroxidase and superoxide dismutase.\[[@ref3]\] Intestinal fatty acid binding protein (I-FABP), a cytosolic protein distributes in the small bowel mucosa from the duodenum to the distal segment of the ileum, and its serum level elevates rapidly at the early stages of small bowel ischemia. Hence, it is considered as an early biomarker for intestinal disease, ischemia, and damage.\[[@ref4]\] Ischemia stimulates localized infiltration of activated neutrophils which is manifested by significant increase in the mucosal level of myloperoxidase enzyme activity (MPO).\[[@ref5]\] Research in this field has identified key molecular and signaling players that could modulate the tissue injury during this disease process. However, further elucidation of the molecular mechanisms should provide the rationale to identify much needed novel therapeutic options to ameliorate organ damage.\[[@ref6]\] Atrial natriuretic peptide (ANP) besides its role in regulating volume homeostasis, has a protective effect during ischemia-reperfusion injury (IRI) in many tissues. Recent research documented anti-inflammatory, antifibrotic, and antimitogenic actions for NPs. Based on the multiple protective effects of NPs, it was approved for use in the United States in 2001 by the Food and Drug Administration for acute decompensated heart failure. A previous study demonstrated protective effect of NP in IRI in heart, lung, brain, and liver owing to the extracardiac expression for NP receptors.\[[@ref7]\] Hence, in this work, we attempted to evaluate the role of ANP in attenuating intestinal injury in septic shock. Material and Methods {#sec1-2} ==================== This is a prospective observer-blinded study carried out in surgical Intensive Care Unit (ICU) from March 2013 to April 2014 on 40 patients in septic shock after approval by Hospital Ethical Committee. The CONSORT 2010 statement was followed in reporting this study. Inclusion criteria {#sec2-1} ------------------ Patients in septic shock according to the American college of chest physicians/society of critical care medicine definitions,\[[@ref8]\] which include strongly suspected infection or positive blood culture plus persistent hypotension despite adequate fluid resuscitation requiring vasopressors to maintain mean arterial blood pressure (MAP) ≥65 mmHg, and lactate ≥2 mmol/LPatients were treated with antibiotics according to blood culture and sensitivity testPatients on vasopressor noradrenaline intravenous (IV) infusion (0.05--0.2 micg/kg/min)MAP ≥65 mmHg. Exclusion criteria {#sec2-2} ------------------ Patients on noradrenaline dose \>0.2 micg/kg/minPatients with electrolyte imbalancePatients with one or more organ failurePatients with renal dysfunctionPatients with valvular stenosis, restrictive or obstructive cardiomyopathy, constrictive pericarditis, and pericardial tamponade. Randomization was performed through a computer-generated, random number list. The random number list was generated using the QuickCalcs (GraphPad Software Inc., La Jolla, CA, USA). The group assignment numbers were sealed in an envelope and kept by the study supervisor. After admission to ICU, a written informed consent was obtained from the nearest relatives. Patients were randomly divided into two groups of twenty patients each. Group (C): Control group received normal saline. Group (E): patients received ANP (Natrecor Scios Inc., Titusville, NJ 08560, Austria)) supplied from Sigma company in form of 1.5 mg vial added to 250 ml plastic IV bag (1 ml = 6 mg) given at 2 mcg/kg IV bolus over 1 min followed by 0.01 mcg/kg/min for 24 h (the dose approved for acute decompensated heart failure).\[[@ref7]\] Patients were monitored for mean arterial pressure (MAP) (mmHg), heart rate (HR) (b/min), central venous pressure (CVP) (cmH~2~O), temperature, urine output (UOP), total fluid balance and routine investigation (complete blood count, arterial blood gases, serum electrolytes, liver, and kidney function). Measurements {#sec2-3} ------------ The primary outcome measurements were blood marker of intestinal hypoperfusion in the form of the following laboratory data which was measured before the start of ANP infusion, 6 h, 12 h and 24 h after the start of infusion. Blood sample (5 ml) was centrifuged and serum was used to measure: I-FABP as a marker of intestinal ischemia using (ELISA) measured by spectrophotometer at wavelength 450 nm\[[@ref9]\]MDA measured by spectrophotometer at wavelength 535 nm\[[@ref10]\]PC level measured by spectrophotometer at wavelength 366 nm\[[@ref11]\]MPO measured by spectrophotometer at wavelength 655 nm\[[@ref12]\]Glutathione peroxidase activity (GPA) (lipid peroxide scavenger) was expressed as nanomols of reduced nicotinamide adenine dinucleotide phosphate oxidized to NADH measured by spectrophotometer at wavelength 340 nm.\[[@ref13]\] The secondary outcome measurements were the duration of noradrenaline infusion (days), duration of ICU stay, hospital mortality rate and complications related to ANP such as hypotension, headache, nausea, and back pain.(if developed during time of the study, the drug infusion was stopped, and complication was recorded). Statistical analysis {#sec2-4} -------------------- Sample size of forty patients was calculated for 90% power, α =0.05, β =0.1, and anticipated effect size = 0.40 using sample size software (G \* Power Version 3.00.10, Germany). Analytic statistics was performed on IBM compatible computer using SPSS 11.5 (SPSS Inc., Chicago, IL, USA) under Windows XP operating system. All results presented in the form of mean ± standard deviation. Data compared using unpaired Student\'s *t*-test; *P* \< 0.05 was considered as statistically significant. Results {#sec1-3} ======= [Figure 1](#F1){ref-type="fig"} shows the flow diagram for this study, in which 52 patients were assessed for eligibility and 40 adult patients were included in the study. The results of 40 adult patients were analyzed. ![The trial flow diagram, including enrollment, intervention allocation, and analysis](JOACP-32-470-g001){#F1} There was no significant difference between both groups as regard patients characteristics and disease severity \[[Table 1](#T1){ref-type="table"}\]. ###### Patients characteristics ![](JOACP-32-470-g002) In comparison with Group C, Group A showed a significant decrease (*P* \< 0.05) in serum level of MPO, MDA, PC, and I-FABP, with a significant increase (*P* \< 0.05) in serum level of GPA 6 h, 12 h and 24 h after the start of ANP infusion \[[Table 2](#T2){ref-type="table"}\]. There was significant decrease (*P* \< 0.05) in mean duration of noradrenaline infusion, the length of ICU stay and hospital mortality rate in group A in comparison with Group C \[[Table 3](#T3){ref-type="table"}\]. In Group A, after 12 h of ANP infusion, there was significant decrease (*P* \< 0.05) in MAP, CVP, HR, and serum sodium with a significant increase (*P* \< 0.05) in UOP \[[Table 4](#T4){ref-type="table"}\]. Seven patients had MAP \<65 mmHg but respond to volume resuscitation with insignificant change in noradrenaline dose, three patients serum sodium was 125--130 mmol/L. ###### Primary outcomes variables ![](JOACP-32-470-g003) ###### Secondary outcome variables ![](JOACP-32-470-g004) ###### Patients data during atrial natriuretic infusion ![](JOACP-32-470-g005) Discussion {#sec1-4} ========== Tissue perfusion following a period of hypoperfusion represents complex series of events during shock. In this study, before administration of ANP, there was a significant increase in serum level of MDA, PC, MPO, and I-FABP with a significant decrease in serum GP activity. These results could be attributed to the generation of reactive oxygen species which are generated when oxygen is reintroduced to xanthine oxidase enzyme activation during ischemia. These potentially toxic reactive oxygen species can promote cell destruction and bowel necrosis through peroxidation of membrane lipid and protein manifested in this study by a significant increase in serum level of MDA and PC.\[[@ref14]\] The intestine is one of the richest sources in the body of xanthine oxidase enzyme that exhibit a gradient of increasing activity which play a major role in the generation of toxic superoxide radicals. Under normal condition xanthine dehydrogenase form is predominant but during ischemia xanthine dehydrogenase will be oxidized into xanthine oxidase which becomes a major source for toxic superoxide radical production once the tissues are reperfused and oxygen is reintroduced.\[[@ref15]\] Moreover, the reactive oxygen species could stimulate localized infiltration of activated neutrophils which is demonstrated in this work by a significant increase in serum level of MPO which in turn is a potential source for further release of reactive oxygen radicals with enhanced secretion of proinflammatory cytokines by mast cells and macrophages. The inflammatory cytokines leading to the formation of reactive chlorinating species capable of oxidizing protein with a subsequent increase in plasma PC level.\[[@ref16]\] This work demonstrated that IV infusion of ANP for 24 h recorded a significant decrease in serum level of MDA, PC, MPO, and IFAP with a significant increase in serum GP activity in comparison with control group. ANP and its receptors were demonstrated to be expressed in diverse tissues beside the cardiovascular and renal system. Many previous studies recorded significant antioxidant and anti-inflammatory effects of ANP in many tissues.\[[@ref7]\] The initial signaling events responsible for the protective potential of ANP are still unknown. Some studies reported ANP could attenuate activation of nuclear factor kappa B in macrophages. The reduced binding activity of this redox-sensitive transcription factor was accompanied by diminished m RNA expression of tumor necrotizing factor alpha chemokines and cell adhesion molecules thereby reducing leukocytes infiltration manifested in this study by a significant decrease in the serum level of MPO.\[[@ref5]\] FABP is one of the intracellular proteins that plays important role in transportation and metabolism of long-chain fatty acids which is rapidly released into circulation just after small intestinal mucosal injury.\[[@ref4]\] Alexandra *et al*.\[[@ref17]\] stated that ANP could inhibit the activity of inducible NO synthetase (iNOS) in macrophages via destabilization of iNOS mRNA and this protective effects of ANP are mediated by cyclic guanosine monophosphate. Inhibition of NO formation will inhibit the reactive oxygen species and hence inhibit lipid and protein peroxidation manifested in this work by a significant decrease in serum level of MDA and PC. In addition, this study shows that ANP induces significant increase in serum GP activity. Chujo *et al*.\[[@ref18]\] stated that ANP could stimulate the antioxidant defense system or may induce antioxidant activity by itself. Aoyama *et al*.\[[@ref19]\] revealed that administration of ANP infusion at the onset of lung reperfusion attenuates reperfusion injury. Chujo *et al*. and Moriyama *et al*.\[[@ref20][@ref21]\] found that ANP attenuates ischemia-reperfusion in induced renal failure through inhibition of inflammatory mediators, MPO and neutrophils activation when given as IV infusion for 2 h after reperfusion injury. Yamada *et al*.\[[@ref22]\] found the protective effect to ANP in hepatic ischemia-reperfusion. Conclusion {#sec1-5} ========== In cases of septic shock, concomitant administration of ANP with noradrenaline may have a protective effect against intestinal injury through a decrease in the level of intestinal hypoperfusion markers owing to its anti-inflammatory and antioxidant effect. Financial support and sponsorship {#sec2-5} --------------------------------- Nil. Conflicts of interest {#sec2-6} --------------------- There are no conflicts of interest. The authors would like to thank the nurses at the surgical ICU of Tanta University Hospital, Tanta; for their assistance in conducting the study.
{ "pile_set_name": "PubMed Central" }
Signature: "I am the bone of my sword Steel is my body and fire is my blood I have created over a thousand blades Unknown to Death, Nor known to Life Have withstood pain to create many weapons Yet, those hands will never hold anything So as I pray, Unlimited Blade Works."
{ "pile_set_name": "Pile-CC" }
[Quantitative proteomics and differential signal enrichment in nasopharyngeal carcinoma cells with or without SETD2 gene knockout]. To analyze the effects of alterations in the expressions of methyltransferase SETD2 on protein expression profiles in human nasopharyngeal carcinoma (NPC) cells and enrich the differential signaling pathways. The total protein was extracted from SETD2-knockout cell line CNE1SETD2-KO and the wild-type cell line CNE1WT, and the differentially expressed proteins were screened by tandem mass tag (TMT) labeled protein quantification technique and tandem mass spectrometry. GO analysis was used to annotate and enrich the differentially expressed proteins, and the KEGG database was used to enrich and analyze the pathways of the differential proteins. With a fold change (FC)≥1.2 and P < 0.05 as the screening standard, 2049 differentially expressed proteins were identified in CNE1SETD2-KO cells, among which 904 were up-regulated and 1145 were down-regulated. GO functional annotation results indicated that SETD2 knockout caused characteristic changes in multiple biological processes (cell processes and regulation, cell movement, metabolic processes, and biosynthesis of cellular components), molecular functions (catalytic activity and molecular binding, transcription factor activity), and cellular components (cell membrane, organelle, macromolecular complex). KEGG analysis showed that the differentially expressed proteins were involved in an array of signaling pathways closely related to tumors, including MAPK, PI3K-Akt, Ras, Rap1, mTOR, Hippo, HIF-1, Wnt, AMPK, FoxO, ErbB, P53 and JAK-STAT. SETD2 knockout significantly changes the protein expression characteristics of NPC cells and affects a number of signal pathways closely related to tumors. The results provide evidence for investigation of the pathogenesis and therapeutic target screening of NPC.
{ "pile_set_name": "PubMed Abstracts" }
Image copyright Thames Valley Police Image caption Lynden Scourfield, a former senior manager at HBOS, was bribed with sex parties and luxury holidays A former HBOS banker and five other financiers have been jailed for their part in a £245m loans scandal. Lynden Scourfield was sentenced to 11 years and three months, while consultant David Mills was jailed for 15 years. Judge Martin Beddoe said Scourfield "sold his soul" to Mills in exchange for "sex", "bling" and "for swag". Four other defendants were also convicted and sentenced to between 10 years and three and a half years. HBOS: A highly unusual case The six were sentenced on Thursday over the scandal which targeted the bank's small business customers. The group was found to have siphoned off funds and spent the profits on prostitutes, luxury holidays and a range of expensive items. Michael Bancroft, 73, was jailed for 10 years; Mark Dobson, 56, another former HBOS manager, was sentenced to four and a half years. The two were jailed on counts including bribery and money laundering. Alison Mills, 51, and John Cartwright, 72, were given three and a half year sentences for money laundering. Image copyright Thames Valley Police Image caption Left to right: Michael Bancroft, David Mills and Lynden Scourfield enjoyed luxury holidays from the scam Judge Beddoe said the case involved an "utterly corrupt senior bank manager letting rapaciously greedy people get their hands on vast amounts of bank money and their tentacles into ordinary and honest businesses". HBOS, once Britain's biggest mortgage lender under the Halifax and Bank of Scotland brands, was forced to write off £245m related to the conspiracy. In exchange for bribes, Scourfield, 54, a former HBOS manager, told customers to use a turnaround firm called Quayside Corporate Services. Mills, 60, who ran Quayside with his wife Alison, bribed Scourfield with expensive watches, sex parties and, the court heard, "boys' jollies". These were given in exchange for loans which allowed Mills and his associates to charge high consultancy fees. Media playback is unsupported on your device Media caption HBOS banker victims 'had lives destroyed' Scourfield, who looked after corporate customers at HBOS' branch in Reading, pleaded guilty at an earlier trial last year to six counts including corruption. The bankers were bribed to push businesses to use Quayside, which claimed to be expert in running companies. Many of the businesses were perfectly sound and had no need of help, but were told their relationship with their bank would be in jeopardy if they did not agree to use Quayside. "Their victims were people who were trying to contribute to the economy," said Detective Superintendent Nick John of Thames Valley Police. "They were normal people running small to medium-sized businesses who needed support and instead had their livelihoods, and in many cases, their lives, destroyed." Image copyright PA Image caption Zenith, the publishing firm run by Paul and Nikki Turner, was run into the ground 'Marriages broken' Some of the victims lost their companies, livelihoods and even their homes due to the scam. Paul and Nikki Turner, from Cambridge, tried to report what was going on after their publishing company, Zenith, was run into the ground by the scammers. "They defrauded us, denied for 10 years that the fraud had happened, ignored the debt from the fraud and tried to evict us 22 times in order to cover up the fraud," Mrs Turner said outside court. "It's a huge success for us that the trial has gone on." She added: "The other victims have gone through terrible things, they have gone through the loss of businesses and lost homes." "Other people lost everything, including marriages broken up, because of this." Sex parties The CPS special prosecutor, Stephen Rowland, said the case at Southwark Crown Court was one of the largest and most complex the special fraud division had ever prosecuted. "It involved millions of documents, a lot of the material we had to look at was electronic and of course in this day and age the capacity for electronic media is huge," he said. Businessmen Bancroft and Mills arranged sex parties, exotic foreign holidays, cash in brown envelopes and other favours for Scourfield between 2003 and 2007. In exchange for the bribes, Scourfield would require the bank's small business customers to use Quayside. Image copyright Thames Valley Police Image caption Among David and Alison Mills' assets was a yacht called Powder Monkey But far from helping turn businesses around, Mills and his associates were milking them for huge fees and using their relationship with the bank to bully the business owners and strip them of their assets. In cash fees alone, according to prosecutors in the trial, £28m went through the accounts of Mills, his wife and their associated companies. But the true value to Mills of the corrupt relationship with Scourfield was much greater. "What Scourfield gave Mills in addition to fees was the opportunity to take control of the various businesses and, in some cases, to acquire ownership of them," prosecutor Brian O'Neill QC told the court. "Mills and his associates used the bank's customers and the banks's money dishonestly to enrich themselves," he said. HBOS, now owned by Lloyds Banking Group, said: "The trial highlighted criminal actions that bear no reflection on the behaviours of the vast majority of the employees of HBOS at the time or in the group today." One other defendant, Jonathan Cohen, was acquitted at the trial, which finished this week after four months. A special report about the case was broadcast on BBC Radio Four on Tuesday 31 January at 20:00.
{ "pile_set_name": "OpenWebText2" }
High Crime High Crime ( ) is a 1973 Italian-Spanish poliziottesco film directed by Enzo G. Castellari. The film stars Franco Nero, James Whitmore, Delia Boccardo and Fernando Rey. High Crime was a big success at the time of its release, and helped popularize the Italian cop thriller genre. Plot A Lebanese drug dealer arrives in Genoa and Vice-Commissioner Belli (Nero) soon tracks him down. After a long car chase, Belli manages to arrest him. However, when the prisoner is being taken to the police station, the police car is bombed before it reaches its target. The Lebanese and four policemen die in the hit, but Belli survives. Belli then goes to Cafiero (Rey), an old-fashioned gangster who claims to have transformed into a peaceful gardener, to question about the bombing and it turns out that there is a new player in town. Cafiero decides to take care of the new gang before the police get to them. His task turns out to be more difficult when his trusted man, Rico (Daniel Martín), turns out to be a mole working for the unknown new gangsters. Belli's boss, Commissioner Aldo Scavino (Whitmore), has put together a dossier on the city's mafia connections, but thinks that there is not enough hard evidence to take down all the gangsters from top to down. After several discussions with Belli, he finally agrees to take the dossier to the district attorney. However, he is murdered and the dossier is stolen. Belli now takes over Scavino's seat as the Commissioner and eventually finds the murderer. The murderer names Umberto Griva (Duilio Del Prete) as his boss, as Belli expected. When Griva's brother Franco (Silvano Tranquilli) is found murdered, it seems that someone with even higher political connections is trying to take over the city's drug trafficking. Belli then starts from square one and, after a warning from Cafiero, decides to send his daughter away to a safer place. However, his daughter is soon murdered and his girlfriend Mirella (Boccardo) beat up. With a helpful hint from Cafiero, Belli finds out about a large drug smuggling operation. As Belli arrives on the scene, a shootout ensues, and Belli survives while all the criminals are killed. Production Director Enzo G. Castellari was influenced to create High Crime after watching the film Bullitt. When presenting the idea of this sort of film to producer Edmondo Amati, he was told to show him a story. Castellari discussed a plot with screenwriters Tito Capri and Amati's son Maurizio. The group developed a treatment based around the murder of Luigi Calabresi. Castellari did not want Edmondo Amati to read their script, and decided to tell him the story instead. Italian film historian Roberto Curti has stated that despite Castellari's recollections, he felt the story outline was more derived from William Friedkin's The French Connection with its similarity to its opening scenes and Fernando Rey's presence as an elderly crime boss. High Crime was filmed at Incir De Paolis in Rome and on location in Genoa, Ligurian coast, Marseille. Release High Crime was released on August 12, 1973, in Italy, where it was distributed by Fida Cinematografica. The film grossed 1,625,825,000 Italian lire on its theatrical run in Italy. The film was described as a "huge box office hit" by historian Roberto Curti. Reception In a contemporary review, the Monthly Film Bulletin gave the film a negative review, finding the film "especially graceless when one recalls the opaque joys of Salvatore Guiliano." The review critiqued the dubbing, and that its formulaic character scarcely redeemed by high-minded nods at social comment (militant workers, corrupt capitalists), the film fails even to vindicate an early promise of more homely pleasures: "You cops ... you're always full of jokes"." Footnotes References External links . Category:1973 films Category:Films directed by Enzo G. Castellari Category:1970s crime films Category:Italian films Category:Spanish films Category:Italian-language films Category:Poliziotteschi films Category:Films set in Genoa Category:Films set in Marseille Category:Films shot in France Category:Films shot in Rome Category:Films scored by Guido & Maurizio De Angelis
{ "pile_set_name": "Wikipedia (en)" }
Serra do Ramalho The caves of the Serro da Ramalho karst area in the municipality of Serra do Ramalho, a municipality of the same name in southwestern Bahia State, Brazil, have been explored since the early 2000s. The several large cave systems present a great biospeleological potential. Newly discovered species include the first troglobitic Amblypygi recorded for Brazil, Charinus troglobius Baptista & Giupponi, 2003, an eyeless harvestman (Giupponia chagasi Pérez & Kury, 2002), an as yet undescribed genus of spiders (Ochyroceratidae), and a species of catfish (Rhamdia enfurnada Bichuette & Trajano, 2005). Footnotes References (2005): A new cave species of Rhamdia (Siluriformes: Heptapteridae) from Serra do Ramalho, northeastern Brazil, with notes on ecology and behavior. Neotropical Ichthyology 3(4): 587-595. PDF (2003): A new troglomorphic Charinus from Minas Gerais State, Brazil (Arachnida: Amblypygi: Charinidae). Revista Ibérica de Aracnología 7: 79-84. Further reading XXVII Congresso Brasileiro de Espeleologia (2003): O potencial espeleológico da Serra do Ramalho. Sociedade Brasileira de Espeleologia. Abstract (in Portuguese) Category:Caves of Bahia Category:Karst caves
{ "pile_set_name": "Wikipedia (en)" }
This weekend, the Wall Street Journal‘s Carole Lee wrote a perfectly accurate story about Saudi Arabia and the United Arab Emirates pledging to donate $100 million to a World Bank fund for women entrepreneurs. The article noted that the fund was Ivanka Trump’s idea and that she was at the event where the pledge was announced. When Wall Street Journal reporter Rebecca Ballhaus tweeted out a link to her colleague’s story, she spun it in such a way as to add inaccuracies. First she reclassified a World Bank fund as a fund belonging to Ivanka Trump. Then she claimed that the donation from the two countries were therefore akin to what Trump pilloried Hillary Clinton for. Clinton was criticized by Trump and others for issues surrounding the billions of dollars her charity raised, and the millions of dollars taken in by Clinton family members for speeches. The Clinton Foundation received money from countries at the same time they had business before Secretary of State Clinton. Clinton’s husband Bill received huge sums of cash for speeches given to groups that also had business before the U.S. government. (This 2008 New York Times story shows a bit about how the Clintons greased skids to secure deals in ways that some found questionable.) Ballhaus’ tweets, which went viral, were followed by others that did the same. Here’s a New York Times investigative reporter: CNN reporter Jim Sciutto who, even for a former Obama political appointee, stands out for his partisanship, made the false claim that a donation to a World Bank fund was “virtually identical” to the ethical problems raised by the Clintons. A Wall Street Journal writer noted the false news being promulgated by the tweet: CNN contributor Ana Navarro’s tweet falsely suggesting an Ivanka charity was receiving Saudi money was shared tens of thousands of times: CNN’s story on the donation, spun in a harshly critical fashion, began: Just two days into President Donald Trump’s debut foreign trip, a member of his inner-circle has already reaped benefits to the tune of $100 million. The bullet-point “highlights” of the story were, and I kid you not: The fund aims to provide to female entrepreneurs with financial support in the form of capital and access to networking But the fund could open the President up to charges of hypocrisy Harvard’s Shorenstein Center on media, politics, and public policy last week reported its research showing that 93 percent of all Trump news from CNN was negative. Ninety-three percent. It is perhaps worth noting that CNN managed to completely botch its report on the Shorenstein study this weekend. The false information about the donation was also spread by journalists at other media outlets and liberal actor George Takei. As Sohrab Ahmari noted, “It went from a donation to the World Bank (the truth) to ‘Ivanka Fund’ and now ‘Ivanka’s charity'” courtesy of Takei: There are three reasons that this fake news went viral, in no particular order. 1) The original report on the fund, from a new online site called Axios, was imprecise. That publication reported that Ivanka Trump had begun building a massive fund and referred to it as her fund. As the Washington Post‘s David Fahrenthold explained, though, “the first daughter would have no role in raising money for such a fund or deciding where its money would be spent, a Trump administration official said.” He noted that the idea for a fund for women entrepreneurs was Ivanka Trump’s, but that the World Bank and White House issued a statement that the fund would be managed by the World Bank. 2) The Trump family has a lack of transparency. President Donald Trump chose not to release his tax returns, unlike every major-party presidential candidate in recent decades. Because he has significant business interests around the globe, the American public has reasonable questions that have not been answered regarding any potential conflicts of interest. 3) A cartoonish hostility in the media to Trump. Finally, reporters, pundits, and activists (but I repeat myself!) are so hostile to Trump that they are willing to push out negative stories without checking out the underlying facts. More is expected of journalists, who already have very little credibility with readers.
{ "pile_set_name": "OpenWebText2" }
National prevalence and correlates of alcohol misuse in women veterans. Our goal was to estimate the prevalence and correlates of alcohol misuse in women veterans and to assess the associations between alcohol misuse and mental health (MH) care utilization in a group comprising both Veterans Health Administration (VA) healthcare system users and non-users. We assessed alcohol misuse using survey-based AUDIT-C scores. The prevalence of alcohol misuse was 27% in VA users and 32% in non-users. Prevalence rates were higher for VA users who were younger, served in OEF/OIF, or had combat exposure and for VA non-users who screened positive for posttraumatic stress disorder or sexual assault in the military. In contrast to VA users, VA non-users with alcohol misuse had a low prevalence of past-year MH care despite having indications of MH care need. Our results on alcohol misuse prevalence, its correlates, and its association with MH care may aid program planning and resource allocation in VA and non-VA settings.
{ "pile_set_name": "PubMed Abstracts" }
Monoclonal antibodies to cruciform DNA structures. Two monoclonal antibodies, 2D3 and 4B4, have been raised against a cruciform structure in a heteroduplex DNA molecule. Antibody binding to DNA fragments was determined by a radioimmunoassay in which DNA--antibody complexes were separated from unbound DNA by acrylamide gel electrophoresis. These antibodies seem to recognize conformational determinants specific to cruciform structures. 2D3 and 4B4 antibodies do not bind to linear double-stranded homoduplex DNA fragments, linear single-stranded DNA or single-stranded simian virus 40 DNA containing a stem--loop structure, but do bind to the original cruciform and to a different cruciform with one shortened arm. 2D3 also bound to a T-shaped double-stranded DNA molecule, while 4B4 binding to this structure was weak. The monoclonal antibodies 2D3 and 4B4 were found to be immunoglobulin G1 and immunoglobulin M, respectively.
{ "pile_set_name": "PubMed Abstracts" }
#include <tommath.h> #ifdef BN_MP_REDUCE_2K_C /* LibTomMath, multiple-precision integer library -- Tom St Denis * * LibTomMath is a library that provides multiple-precision * integer arithmetic as well as number theoretic functionality. * * The library was designed directly after the MPI library by * Michael Fromberger but has been written from scratch with * additional optimizations in place. * * The library is free for all purposes without any express * guarantee it works. * * Tom St Denis, [email protected], http://math.libtomcrypt.com */ /* reduces a modulo n where n is of the form 2**p - d */ int mp_reduce_2k(mp_int *a, mp_int *n, mp_digit d) { mp_int q; int p, res; if ((res = mp_init(&q)) != MP_OKAY) { return res; } p = mp_count_bits(n); top: /* q = a/2**p, a = a mod 2**p */ if ((res = mp_div_2d(a, p, &q, a)) != MP_OKAY) { goto ERR; } if (d != 1) { /* q = q * d */ if ((res = mp_mul_d(&q, d, &q)) != MP_OKAY) { goto ERR; } } /* a = a + q */ if ((res = s_mp_add(a, &q, a)) != MP_OKAY) { goto ERR; } if (mp_cmp_mag(a, n) != MP_LT) { s_mp_sub(a, n, a); goto top; } ERR: mp_clear(&q); return res; } #endif /* $Source$ */ /* $Revision$ */ /* $Date$ */
{ "pile_set_name": "Github" }
Read More The 25-acre site at Kinmel Park, which includes the 354,000sq ft factory, a loading bay, and a seven-acre HGV trailer park was bought for £1.55m in 2014 by the Welsh Government and part was put back on the market in 2015 for £2.25m. Earlier this year, Glan Clwyd Hospital’s Park and Ride service, which runs from the former Hotpoint factory, had to be temporarily suspended when Travellers moved onto the site. The shuttle service at Bodelwyddan transfers patients to and from Glan Clwyd Hospital.
{ "pile_set_name": "Pile-CC" }
Evaluation of an unusual ossicle by multi-detector computed tomography: Oppenheimer's ossicle. Variations and anomalies of the neural arch result from alterations in the ossification process. Absence of lumbar articular process is a rare anomaly which most commonly involves the inferior articular process of the L4 or L5 vertebrae. Non-union at the tip of the articular process is a more common variation, known as Oppenheimer's ossicle. In this case report, we present multi-detector computed tomography findings of Oppenheimer's ossicles in 2 separate cases.
{ "pile_set_name": "PubMed Abstracts" }
// Copyright 2019 The go-ethereum Authors // This file is part of the go-ethereum library. // // The go-ethereum library is free software: you can redistribute it and/or modify // it under the terms of the GNU Lesser General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // The go-ethereum library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>. package common import ( "encoding/hex" "errors" "fmt" "net" "time" "github.com/lianxiangcloud/linkchain/libs/crypto" "github.com/lianxiangcloud/linkchain/libs/hexutil" "github.com/lianxiangcloud/linkchain/libs/p2p/netutil" ) const ( // HashLength is the expected length of the hash HashLength = 32 // AddressLength is the expected length of the address AddressLength = 20 ) type Hash [HashLength]byte // ID is a unique identifier for each node. type NodeID [32]byte //crypto.Keccak256Hash(pubkey) func (n NodeID) Bytes() []byte { return n[:] } func (n *NodeID) Copy(buffer []byte) { copy(n[:], buffer) } // ID prints as a long hexadecimal number. func (n NodeID) String() string { return hexutil.Encode(n[:]) } func (n NodeID) MarshalJSON() ([]byte, error) { return []byte(fmt.Sprintf(`"0x%x"`, n[:])), nil } func (n *NodeID) UnmarshalJSON(data []byte) error { if len(data) < 4 { return fmt.Errorf("%s is not a hex string", data) } data = data[3 : len(data)-1] dec := make([]byte, len(data)/2) if _, err := hex.Decode(dec, data); err != nil { return err } n.Copy(dec[:]) return nil } type Node struct { IP net.IP `json:"ip"` // len 4 for IPv4 or 16 for IPv6 UDP_Port uint16 `json:"udp_port"` // port numbers TCP_Port uint16 `json:"tcp_port"` // port numbers ID NodeID `json:"id"` // the node's public key } // Incomplete returns true for nodes with no IP address. func (n *Node) Incomplete() bool { return n.IP == nil || n.ID.Bytes() == nil } // ValidateComplete checks whether n has a valid IP and UDP port. func (n *Node) ValidateComplete() error { if n.Incomplete() { return errors.New("missing IP address or ID") } ip := n.IP if ip.IsMulticast() || ip.IsUnspecified() { return errors.New("invalid IP (multicast/unspecified)") } // Validate the node key (on curve, etc.). return nil } type UDPConn interface { ReadFromUDP(b []byte) (n int, addr *net.UDPAddr, err error) WriteToUDP(b []byte, addr *net.UDPAddr) (n int, err error) Close() error LocalAddr() net.Addr } type DiscoverTable interface { Start() Stop() GetMaxDialOutNum() int //Maximum number of connections to be actively connected outward GetMaxConNumFromCache() int //Get the maximum number of nodes from cache LookupRandom() []*Node //Get some nodes in real time from the network ReadRandomNodes([]*Node, map[string]bool) int //Get some random nodes from local memory IsDhtTable() bool } type P2pDBManager interface { QuerySeeds(n int, maxAge time.Duration) []*Node LastPingReceived(id NodeID, ip net.IP) time.Time LastPongReceived(id NodeID, ip net.IP) time.Time UpdateNode(node *Node) //Store Node in DB UpdateLastPingReceived(id NodeID, ip net.IP, instance time.Time) UpdateLastPongReceived(id NodeID, ip net.IP, instance time.Time) UpdateFindFails(id NodeID, ip net.IP, fails int) FindFails(id NodeID, ip net.IP) int Close() } // Config holds Table-related settings. type Config struct { // These settings are required and configure the UDP listener: PrivateKey crypto.PrivKey // These settings are optional: NetRestrict *netutil.Netlist // network whitelist SeedNodes []*Node // list of bootstrap nodes } // ReadPacket is a packet that couldn't be handled. Those packets are sent to the unhandled // channel if configured. type ReadPacket struct { Data []byte Addr *net.UDPAddr } func TransPubKeyToStringID(pubKey crypto.PubKey) string { return hex.EncodeToString(crypto.Keccak256Hash(pubKey.Bytes()).Bytes()) } func TransPubKeyToNodeID(pubKey crypto.PubKey) NodeID { var id = &NodeID{} id.Copy(crypto.Keccak256Hash(pubKey.Bytes()).Bytes()) return *id } func TransPkbyteToNodeID(pubKey []byte) NodeID { var id = &NodeID{} id.Copy(crypto.Keccak256Hash(pubKey).Bytes()) return *id } func TransNodeIDToString(nodeID NodeID) string { return hex.EncodeToString(nodeID.Bytes()) }
{ "pile_set_name": "Github" }
UPDATE: This article was updated at 2.25pm on 2 June 2019 to amend Michael Brooks’s quote about Bernie Sanders. A massive trove of documents leaked to the Intercept has revealed “systematic wrongdoing” among top Brazilian prosecutors to prevent the left-wing Workers’ Party (PT) from winning the 2018 presidential election. The secret documents suggest that the prosecutors were neither apolitical nor confident in the evidence used to jail presidential front-runner Luiz Inácio Lula da Silva – better known as Lula. While Lula remains in prison, Brazil’s democracy is eroding under the racist, sexist and homophobic presidency of Jair Bolsonaro. The leak therefore shines a crucial light on the ‘soft coup’ which paved the way for Bolsonaro’s rise – one of the most consequential events of this century. Operation Car Wash Brazil’s massive corruption probe, named Operation Car Wash (Lava Jato), began in 2014. The Car Wash team insisted “that their only consideration was to expose and punish political corruption irrespective of party or political faction” in Brazil. Many were suspicious of Operation Car Wash, however, in light of the probe’s ties with the US justice department, the impeachment of president Dilma Rousseff in 2016, and the lack of tangible evidence for Lula’s imprisonment in 2018. And just days after being elected, Bolsonaro promoted Lula’s jailer, Sérgio Moro, to minister of justice. The latest leak has vindicated such suspicions. As the Intercept showed, Car Wash prosecutors discussed ways to prevent Fernando Haddad, the PT’s presidential candidate, from winning the 2018 election. The messages reveal a damage control operation after prosecutors learned that Lula would be interviewed from prison by the country’s largest newspaper, Folha de São Paulo, just ten days before the first round of presidential voting. The following message from prosecutor Deltan Dallagnol, for instance, displays clear political bias: I remain very worried about the possible return of PT, but I have prayed frequently for God to enlighten our population and for a miracle to save us. Ultimately, the interview did not happen. Ethical violations The Intercept also revealed that for over two years judge Moro “repeatedly counseled prosecutor Deltan Dallagnol” on how to investigate Lula. As a judge required to be impartial and neutral, Moro therefore allegedly committed major and prohibited ethical violations during the case which led to Lula’s conviction. Documents also show that Dallagnol doubted the legal basis for prosecuting Lula, who was accused of accepting an apartment (which the prosecutors luxuriously named a “beachfront triplex”) for facilitating a multi-million dollar contract with Petrobras, the state-controlled oil firm. As the Intercept detailed, Dallagnol had: increasing doubts over two key elements of the prosecution’s case: whether the triplex was in fact Lula’s and whether it had anything to do with Petrobras. The case against Lula, in the words of journalist Brian Mier, “has more holes than the proverbial Swiss cheese”. Indeed, no material evidence exists connecting Lula to any crime; one of the prosecution’s main pieces of evidence was an allegation from a man facing 30 years in prison. And despite a UN ruling, Lula’s imprisonment on “indeterminate acts” meant he was barred from running in the 2018 election and effectively silenced from prison. Further than Lula Though Lula was the most high-profile target of Operation Car Wash, its implications go well beyond the jailed former president. One overlooked aspect of the Car Wash operation, for instance, is how Moro “forced the nation’s biggest construction companies to paralyze their projects, causing 500,000 job losses in 2015 alone”. The BBC estimated that the operation led to a 2.5% fall in Brazil’s GDP. Bolsonaro, meanwhile, continues to gut the Brazilian economy with mass privatisation schemes and austerity measures. The government also recently announced that Brazil will continue with the “piecemeal privatization” of Petrobras due to corruption revealed by Car Wash. ‘Eu avisei’ (I told you so) For readers of independent news outlet Brasil Wire, the latest revelations will come as little surprise. For years, its writers have exposed the dark mechanisms behind Brazil’s soft coup, including evidence of the involvement of the US government. Michael Brooks, who wrote the foreword for Brazil Wire‘s explosive new book about Brazil’s soft coup and hosts The Michael Brooks Show, told The Canary: If you were reading great outlets like Brasil Wire, you would have definitely already known and been really clear about what the reality of Lava Jato was, and the political and very vindictive nature of Sérgio Moro. Beyond that, it’s really important… that we don’t fall into simplistic corruption rhetoric. We need to have a conversation about corruption as a function of capitalism, as a function of oligarchy, that really interrogates the whole system. Because this sort of pseudo-populist anti-corruption rhetoric, we have the results, it’s been a tool of the authoritarian right: Donald Trump, Jair Bolsonaro, [Indian PM] Narendra Modi, [Hungarian PM] Viktor Orbán and so on. He continued by speaking about the importance of the US response to the leak: As with most areas, Bernie Sanders is head and shoulders above the rest on this and his clarity on calling for Lula’s release should be followed by all candidates. But with every single self-proclaimed progressive leader – even Democratic – running for president or otherwise, there needs to be far more action on this. Shortly after Brooks spoke to The Canary, the Intercept revealed that Sanders had called for “Brazil’s judiciary to release Lula”. Meanwhile, Brooks continued: So there’s the role of the leadership of Lula in responding to our present predicament; there’s the global lesson on how the left deals with corruption rhetoric; then there’s the fact that everybody needs to speak out on this; and they also need to be speaking out very specifically on the role of the United States. This should open up a broader conversation about US hemispheric interference and domination across Latin America and the Caribbean… We all need to demand Lula livre (free Lula). Truth and justice Brasil Wire‘s founding editor Daniel Hunt also spoke to The Canary about the significance of the latest revelations both in Brazil and internationally. He said: If Brazil was a democracy, which it has not been for three years, and if it was under a functioning rule of law, likewise, the 2018 election would be annulled. There was already ample evidence of multi-faceted electoral fraud. Now this confirms it was a sham election, and that Lula da Silva, the leading candidate, was jailed to prevent him winning. Lava Jato didn’t “lose its way”; it was always a political and geopolitical weapon. He explained that while truth is an important vehicle for justice, Brazil remains endowed with Bolsonaro: Nobody on the left wants Bolsonaro impeached, as it would just put a General in his place. Although many people are celebrating today and feel vindicated, there is little genuine optimism as yet that this will deliver any results. Annulment is the only way to fix this that I can see, beyond immediate freedom for Lula. But they put so much effort into securing power, there is no way they would simply relinquish it now, any more than they would have last year democratically. We were foolish to ever believe that they would. Corporate journalists Hunt then spoke about the response of corporate journalists to the leak: Corporate journalists are going through intellectual gymnastics right now. Most of them were cheerleaders for Sergio Moro and Lava Jato, most of them denied or ignored that a coup was in motion from 2013-2018, especially those connected to Atlantic Council or AS/COA [The Americas Society / Council of the Americas]. There’s no way for any of them to come away from this looking good. Some are feigning shock, but they had the same information we all had, yet went with the coup’s own narratives. None are innocent. I said in 2016 that history would not be kind to these people, and this week the world of spin they constructed is finally falling apart. Such journalists fill the ranks of ‘liberal’ newspapers like the Guardian and the New York Times. Former Brazilian president Dilma Rousseff gave a two-hour interview to the Guardian in June 2018, for instance, in which: she described how Lula’s prosecution was “phase two” of the Coup d’etat which removed her, and that it would open the door for the ascension of Neofascist Jair Bolsonaro. The Guardian, however, never published the interview. Its decision to omit crucial warnings about the soft coup in Brazil was accompanied by a general hostility to the PT. And the US left was even less sympathetic to Brazil’s left. As Brasil Wire found: Of 38 articles published on Brazilian politics… in Jacobin from 2014-2017, all 38 presented a negative view of the PT. The same outlets have largely minimised the latest leak’s importance since the story broke. Ernesto Londoño and Letícia Casado in the New York Times, for instance, ran with the punctured headline: Leaked Messages Raise Fairness Questions in Brazil Corruption Inquiry. Perhaps more revealingly, the BBC foregrounded Moro’s denial over the evidence in the leaks themselves. What next? The public’s response to the leaks reflects the degree of polarisation in Brazilian society. Many have called either for Moro to be jailed, or for the deportation of the Intercept journalists who published the damaging information. The Brazilian Bar Association has already called for the suspension of both Moro and the Car Wash prosecutors. The PT, meanwhile, has branded it “a political operation poorly disguised as a corruption fighting action”. Internationally, the documents published by the Intercept are yet to mention US involvement in Operation Car Wash. Thanks to the work of Brasil Wire, we know already that the US department of justice collaborated with Brazilian prosecutors to achieve convictions. Future leaks may prove more explosive still. More widely, the tactics of ‘lawfare‘ used in Brazil reveal what was effectively a war of corruption (rather than a war on corruption). We would be wise to monitor how the US has changed tactics when interfering in foreign affairs, using Brazil as a template. For instance, Fernando Cutz, in an opinion piece for the New York Times, encouraged the re-implementation of the lawfare model in Brazil’s neighbour, Venezuela. Although the US may have changed tactics, it has not changed course. The slow coup in Brazil represents part of a wider US-led assault on the global left. Indeed, as the Intercept rolled out its latest revelations, news broke that US secretary of state Mike Pompeo had discussed stopping UK opposition leader Jeremy Corbyn from getting elected. In times of terror… “In times of terror, we choose monsters to protect us”, Lula told the Intercept‘s Glenn Greenwald in a recent interview. And as the leaks confirm, Bolsonaro is not a monster that eludes explanation: he is a monster engineered through a coup that few in the media dared to question. Featured image via Flickr – US state department
{ "pile_set_name": "OpenWebText2" }
Start Date: 3/10/01; HourAhead hour: 3; HourAhead schedule download failed. Manual intervention required. LOG MESSAGES: PARSING FILE -->> O:\Portland\WestDesk\California Scheduling\ISO Final Schedules\2001031003.txt !!!General SQL error. Couldn't update; currently locked by user 'admin' on machine 'ECTHOU-BPS4'. Table !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress. !!!A user transaction is already in progress.
{ "pile_set_name": "Enron Emails" }
// Copyright 2016 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // // +build ppc64 s390x mips mips64 package unix const isBigEndian = true
{ "pile_set_name": "Github" }
Q: Load selected record to modal window I have a grid with data. When I select a row and hit the 'edit' button on the tbar, I want to view a window (including a form) with the data from the selected row. Fiddle: https://fiddle.sencha.com/#fiddle/ukp But I don't know how to access the current selected row or how to pass data from one controller to another (GridController --> WindowController). Thanks in advance! A: Although this question is answered, I think it could be done differently (and cleaner) in two ways. First the way CD uses, which is a great anwser, but much cleaner and without any logic in your controller. Just let the viewmodel do his job: Config a bind property to the selection on your grid: bind: { selection: '{rec}' }, The fields stay the same: items: [{ xtype: 'textfield', fieldLabel: 'Firstname', bind: '{rec.firstName}' }, { xtype: 'textfield', fieldLabel: 'Lastname', bind: '{rec.lastName}' }] That's it. Now you can remove the logic in your window controller. Working example: https://fiddle.sencha.com/#fiddle/ulf The second way, I use this a lot, is deep binding on your viewmodel. This is to keep track on the record that was selected, whatever or wherever it has changed. This can be accomplished by bind with deep: true. In your (separate) viewmodel place a formula: formulas: { rec: { // We need to bind deep to be notified on each model change bind: { bindTo: '{myGrid.selection}', //--> reference configurated on the grid view (reference: myGrid) deep: true }, get: function(record) { return record; }, set: function(record) { if(!record.isModel) { record = this.get('records').getById(record); } this.set('currentRecord', record); } } } A: You can pass the record to the window view. In Extjs 6 you can use the viewModel and bind the fields, for example: // In The controller var selectionModel = grid.getSelectionModel(); Ext.create({ xtype: 'my-window', viewModel: { data: { rec: selectionModel.getSelection()[0] } } }); // The window items: [{ xtype: 'textfield', fieldLabel: 'Firstname', bind: '{rec.firstName}' }, { xtype: 'textfield', fieldLabel: 'Lastname', bind: '{rec.lastName}' }] Working example based on your code: https://fiddle.sencha.com/#fiddle/ukr
{ "pile_set_name": "StackExchange" }
#include "common.h" #include <fcntl.h> #include "seafile-session.h" #include "log.h" #include "utils.h" #include "fsck.h" typedef struct FsckData { gboolean repair; SeafRepo *repo; GHashTable *existing_blocks; GList *repaired_files; GList *repaired_folders; } FsckData; typedef struct CheckAndRecoverRepoObj { char *repo_id; gboolean repair; } CheckAndRecoverRepoObj; typedef enum VerifyType { VERIFY_FILE, VERIFY_DIR } VerifyType; static gboolean fsck_verify_seafobj (const char *store_id, int version, const char *obj_id, gboolean *io_error, VerifyType type, gboolean repair) { gboolean valid = TRUE; valid = seaf_fs_manager_object_exists (seaf->fs_mgr, store_id, version, obj_id); if (!valid) { if (type == VERIFY_FILE) { seaf_message ("File %s is missing.\n", obj_id); } else if (type == VERIFY_DIR) { seaf_message ("Dir %s is missing.\n", obj_id); } return valid; } if (type == VERIFY_FILE) { valid = seaf_fs_manager_verify_seafile (seaf->fs_mgr, store_id, version, obj_id, TRUE, io_error); if (!valid && !*io_error && repair) { seaf_message ("File %s is damaged, remove it.\n", obj_id); seaf_fs_manager_delete_object (seaf->fs_mgr, store_id, version, obj_id); } } else if (type == VERIFY_DIR) { valid = seaf_fs_manager_verify_seafdir (seaf->fs_mgr, store_id, version, obj_id, TRUE, io_error); if (!valid && !*io_error && repair) { seaf_message ("Dir %s is damaged, remove it.\n", obj_id); seaf_fs_manager_delete_object (seaf->fs_mgr, store_id, version, obj_id); } } return valid; } static int check_blocks (const char *file_id, FsckData *fsck_data, gboolean *io_error) { Seafile *seafile; int i; char *block_id; int ret = 0; int dummy; gboolean ok = TRUE; SeafRepo *repo = fsck_data->repo; const char *store_id = repo->store_id; int version = repo->version; seafile = seaf_fs_manager_get_seafile (seaf->fs_mgr, store_id, version, file_id); for (i = 0; i < seafile->n_blocks; ++i) { block_id = seafile->blk_sha1s[i]; if (g_hash_table_lookup (fsck_data->existing_blocks, block_id)) continue; if (!seaf_block_manager_block_exists (seaf->block_mgr, store_id, version, block_id)) { seaf_warning ("Repo[%.8s] block %s:%s is missing.\n", repo->id, store_id, block_id); ret = -1; } // check block integrity, if not remove it ok = seaf_block_manager_verify_block (seaf->block_mgr, store_id, version, block_id, io_error); if (!ok) { if (*io_error) { ret = -1; break; } else { if (fsck_data->repair) { seaf_message ("Repo[%.8s] block %s is damaged, remove it.\n", repo->id, block_id); seaf_block_manager_remove_block (seaf->block_mgr, store_id, version, block_id); } else { seaf_message ("Repo[%.8s] block %s is damaged.\n", repo->id, block_id); } ret = -1; } } g_hash_table_insert (fsck_data->existing_blocks, g_strdup(block_id), &dummy); } seafile_unref (seafile); return ret; } static char* fsck_check_dir_recursive (const char *id, const char *parent_dir, FsckData *fsck_data) { SeafDir *dir; SeafDir *new_dir; GList *p; SeafDirent *seaf_dent; char *dir_id = NULL; char *path = NULL; gboolean io_error = FALSE; SeafFSManager *mgr = seaf->fs_mgr; char *store_id = fsck_data->repo->store_id; int version = fsck_data->repo->version; gboolean is_corrupted = FALSE; dir = seaf_fs_manager_get_seafdir (mgr, store_id, version, id); for (p = dir->entries; p; p = p->next) { seaf_dent = p->data; io_error = FALSE; if (S_ISREG(seaf_dent->mode)) { path = g_strdup_printf ("%s%s", parent_dir, seaf_dent->name); if (!path) { seaf_warning ("Out of memory, stop to run fsck for repo %.8s.\n", fsck_data->repo->id); goto out; } if (!fsck_verify_seafobj (store_id, version, seaf_dent->id, &io_error, VERIFY_FILE, fsck_data->repair)) { if (io_error) { g_free (path); goto out; } is_corrupted = TRUE; if (fsck_data->repair) { seaf_message ("Repo[%.8s] file %s(%.8s) is damaged, recreate an empty file.\n", fsck_data->repo->id, path, seaf_dent->id); } else { seaf_message ("Repo[%.8s] file %s(%.8s) is damaged.\n", fsck_data->repo->id, path, seaf_dent->id); } // file damaged, set it empty memcpy (seaf_dent->id, EMPTY_SHA1, 40); seaf_dent->mtime = (gint64)time(NULL); seaf_dent->size = 0; } else { if (check_blocks (seaf_dent->id, fsck_data, &io_error) < 0) { if (io_error) { g_free (path); goto out; } is_corrupted = TRUE; if (fsck_data->repair) { seaf_message ("Repo[%.8s] file %s(%.8s) is damaged, recreate an empty file.\n", fsck_data->repo->id, path, seaf_dent->id); } else { seaf_message ("Repo[%.8s] file %s(%.8s) is damaged.\n", fsck_data->repo->id, path, seaf_dent->id); } // file damaged, set it empty memcpy (seaf_dent->id, EMPTY_SHA1, 40); seaf_dent->mtime = (gint64)time(NULL); seaf_dent->size = 0; } } if (is_corrupted) fsck_data->repaired_files = g_list_prepend (fsck_data->repaired_files, g_strdup(path)); g_free (path); } else if (S_ISDIR(seaf_dent->mode)) { path = g_strdup_printf ("%s%s/", parent_dir, seaf_dent->name); if (!path) { seaf_warning ("Out of memory, stop to run fsck for repo [%.8s].\n", fsck_data->repo->id); goto out; } if (!fsck_verify_seafobj (store_id, version, seaf_dent->id, &io_error, VERIFY_DIR, fsck_data->repair)) { if (io_error) { g_free (path); goto out; } if (fsck_data->repair) { seaf_message ("Repo[%.8s] dir %s(%.8s) is damaged, recreate an empty dir.\n", fsck_data->repo->id, path, seaf_dent->id); } else { seaf_message ("Repo[%.8s] dir %s(%.8s) is damaged.\n", fsck_data->repo->id, path, seaf_dent->id); } is_corrupted = TRUE; // dir damaged, set it empty memcpy (seaf_dent->id, EMPTY_SHA1, 40); fsck_data->repaired_folders = g_list_prepend (fsck_data->repaired_folders, g_strdup(path)); } else { dir_id = fsck_check_dir_recursive (seaf_dent->id, path, fsck_data); if (dir_id == NULL) { // IO error g_free (path); goto out; } if (strcmp (dir_id, seaf_dent->id) != 0) { is_corrupted = TRUE; // dir damaged, set it to new dir_id memcpy (seaf_dent->id, dir_id, 41); } g_free (dir_id); } g_free (path); } } if (is_corrupted) { new_dir = seaf_dir_new (NULL, dir->entries, version); if (fsck_data->repair) { if (seaf_dir_save (mgr, store_id, version, new_dir) < 0) { seaf_warning ("Repo[%.8s] failed to save dir\n", fsck_data->repo->id); seaf_dir_free (new_dir); goto out; } } dir_id = g_strdup (new_dir->dir_id); seaf_dir_free (new_dir); dir->entries = NULL; } else { dir_id = g_strdup (dir->dir_id); } out: seaf_dir_free (dir); return dir_id; } static gboolean collect_token_list (SeafDBRow *row, void *data) { GList **p_tokens = data; const char *token; token = seaf_db_row_get_column_text (row, 0); *p_tokens = g_list_prepend (*p_tokens, g_strdup(token)); return TRUE; } int delete_repo_tokens (SeafRepo *repo) { int ret = 0; const char *template; GList *token_list = NULL; GList *ptr; GString *token_list_str = g_string_new (""); GString *sql = g_string_new (""); int rc; template = "SELECT u.token FROM RepoUserToken as u WHERE u.repo_id=?"; rc = seaf_db_statement_foreach_row (seaf->db, template, collect_token_list, &token_list, 1, "string", repo->id); if (rc < 0) { goto out; } if (rc == 0) goto out; for (ptr = token_list; ptr; ptr = ptr->next) { const char *token = (char *)ptr->data; if (token_list_str->len == 0) g_string_append_printf (token_list_str, "'%s'", token); else g_string_append_printf (token_list_str, ",'%s'", token); } /* Note that there is a size limit on sql query. In MySQL it's 1MB by default. * Normally the token_list won't be that long. */ g_string_printf (sql, "DELETE FROM RepoUserToken WHERE token in (%s)", token_list_str->str); rc = seaf_db_statement_query (seaf->db, sql->str, 0); if (rc < 0) { goto out; } g_string_printf (sql, "DELETE FROM RepoTokenPeerInfo WHERE token in (%s)", token_list_str->str); rc = seaf_db_statement_query (seaf->db, sql->str, 0); if (rc < 0) { goto out; } out: g_string_free (token_list_str, TRUE); g_string_free (sql, TRUE); g_list_free_full (token_list, (GDestroyNotify)g_free); if (rc < 0) { ret = -1; } return ret; } static char * gen_repair_commit_desc (GList *repaired_files, GList *repaired_folders) { GString *desc = g_string_new("Repaired by system."); GList *p; char *path; if (!repaired_files && !repaired_folders) return g_string_free (desc, FALSE); if (repaired_files) { g_string_append (desc, "\nDamaged files:\n"); for (p = repaired_files; p; p = p->next) { path = p->data; g_string_append_printf (desc, "%s\n", path); } } if (repaired_folders) { g_string_append (desc, "\nDamaged folders:\n"); for (p = repaired_folders; p; p = p->next) { path = p->data; g_string_append_printf (desc, "%s\n", path); } } return g_string_free (desc, FALSE); } static void reset_commit_to_repair (SeafRepo *repo, SeafCommit *parent, char *new_root_id, GList *repaired_files, GList *repaired_folders) { if (delete_repo_tokens (repo) < 0) { seaf_warning ("Failed to delete repo sync tokens, abort repair.\n"); return; } char *desc = gen_repair_commit_desc (repaired_files, repaired_folders); SeafCommit *new_commit = NULL; new_commit = seaf_commit_new (NULL, repo->id, new_root_id, parent->creator_name, parent->creator_id, desc, 0); g_free (desc); if (!new_commit) { seaf_warning ("Out of memory, stop to run fsck for repo %.8s.\n", repo->id); return; } new_commit->parent_id = g_strdup (parent->commit_id); seaf_repo_to_commit (repo, new_commit); seaf_message ("Update repo %.8s status to commit %.8s.\n", repo->id, new_commit->commit_id); seaf_branch_set_commit (repo->head, new_commit->commit_id); if (seaf_branch_manager_add_branch (seaf->branch_mgr, repo->head) < 0) { seaf_warning ("Update head of repo %.8s to commit %.8s failed, " "recover failed.\n", repo->id, new_commit->commit_id); } else { seaf_commit_manager_add_commit (seaf->commit_mgr, new_commit); } seaf_commit_unref (new_commit); } /* * check and recover repo, for damaged file or folder set it empty */ static void check_and_recover_repo (SeafRepo *repo, gboolean reset, gboolean repair) { FsckData fsck_data; SeafCommit *rep_commit = NULL; char *root_id = NULL; seaf_message ("Checking file system integrity of repo %s(%.8s)...\n", repo->name, repo->id); rep_commit = seaf_commit_manager_get_commit (seaf->commit_mgr, repo->id, repo->version, repo->head->commit_id); if (!rep_commit) { seaf_warning ("Failed to load commit %s of repo %s\n", repo->head->commit_id, repo->id); return; } memset (&fsck_data, 0, sizeof(fsck_data)); fsck_data.repair = repair; fsck_data.repo = repo; fsck_data.existing_blocks = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, NULL); root_id = fsck_check_dir_recursive (rep_commit->root_id, "/", &fsck_data); g_hash_table_destroy (fsck_data.existing_blocks); if (root_id == NULL) { goto out; } if (repair) { if (strcmp (root_id, rep_commit->root_id) != 0) { // some fs objects damaged for the head commit, // create new head commit using the new root_id reset_commit_to_repair (repo, rep_commit, root_id, fsck_data.repaired_files, fsck_data.repaired_folders); } else if (reset) { // for reset commit but fs objects not damaged, also create a repaired commit reset_commit_to_repair (repo, rep_commit, rep_commit->root_id, NULL, NULL); } } out: g_list_free_full (fsck_data.repaired_files, g_free); g_list_free_full (fsck_data.repaired_folders, g_free); g_free (root_id); seaf_commit_unref (rep_commit); } static gint compare_commit_by_ctime (gconstpointer a, gconstpointer b) { const SeafCommit *commit_a = a; const SeafCommit *commit_b = b; return (commit_b->ctime - commit_a->ctime); } static gboolean fsck_get_repo_commit (const char *repo_id, int version, const char *obj_id, void *commit_list) { void *data = NULL; int data_len; GList **cur_list = (GList **)commit_list; int ret = seaf_obj_store_read_obj (seaf->commit_mgr->obj_store, repo_id, version, obj_id, &data, &data_len); if (ret < 0 || data == NULL) return TRUE; SeafCommit *cur_commit = seaf_commit_from_data (obj_id, data, data_len); if (cur_commit != NULL) { *cur_list = g_list_prepend (*cur_list, cur_commit); } g_free(data); return TRUE; } static SeafRepo* get_available_repo (char *repo_id, gboolean repair) { GList *commit_list = NULL; GList *temp_list = NULL; SeafCommit *temp_commit = NULL; SeafBranch *branch = NULL; SeafRepo *repo = NULL; SeafVirtRepo *vinfo = NULL; gboolean io_error; seaf_message ("Scanning available commits...\n"); seaf_obj_store_foreach_obj (seaf->commit_mgr->obj_store, repo_id, 1, fsck_get_repo_commit, &commit_list); if (commit_list == NULL) { seaf_warning ("No available commits for repo %.8s, can't be repaired.\n", repo_id); return NULL; } commit_list = g_list_sort (commit_list, compare_commit_by_ctime); repo = seaf_repo_new (repo_id, NULL, NULL); if (repo == NULL) { seaf_warning ("Out of memory, stop to run fsck for repo %.8s.\n", repo_id); goto out; } vinfo = seaf_repo_manager_get_virtual_repo_info (seaf->repo_mgr, repo_id); if (vinfo) { repo->is_virtual = TRUE; memcpy (repo->store_id, vinfo->origin_repo_id, 36); seaf_virtual_repo_info_free (vinfo); } else { repo->is_virtual = FALSE; memcpy (repo->store_id, repo->id, 36); } for (temp_list = commit_list; temp_list; temp_list = temp_list->next) { temp_commit = temp_list->data; io_error = FALSE; if (!fsck_verify_seafobj (repo->store_id, 1, temp_commit->root_id, &io_error, VERIFY_DIR, repair)) { if (io_error) { seaf_repo_unref (repo); repo = NULL; goto out; } // fs object of this commit is damaged, // continue to verify next continue; } branch = seaf_branch_new ("master", repo_id, temp_commit->commit_id); if (branch == NULL) { seaf_warning ("Out of memory, stop to run fsck for repo %.8s.\n", repo_id); seaf_repo_unref (repo); repo = NULL; goto out; } repo->head = branch; seaf_repo_from_commit (repo, temp_commit); char time_buf[64]; strftime (time_buf, 64, "%Y-%m-%d %H:%M:%S", localtime((time_t *)&temp_commit->ctime)); seaf_message ("Find available commit %.8s(created at %s) for repo %.8s.\n", temp_commit->commit_id, time_buf, repo_id); break; } out: for (temp_list = commit_list; temp_list; temp_list = temp_list->next) { temp_commit = temp_list->data; seaf_commit_unref (temp_commit); } g_list_free (commit_list); if (!repo->head) { seaf_warning("No available commits found for repo %.8s, can't be repaired.\n", repo_id); seaf_repo_unref (repo); return NULL; } return repo; } static void repair_repo(char *repo_id, gboolean repair) { gboolean exists; gboolean reset = FALSE; SeafRepo *repo; gboolean io_error; seaf_message ("Running fsck for repo %s.\n", repo_id); if (!is_uuid_valid (repo_id)) { seaf_warning ("Invalid repo id %s.\n", repo_id); goto next; } exists = seaf_repo_manager_repo_exists (seaf->repo_mgr, repo_id); if (!exists) { seaf_warning ("Repo %.8s doesn't exist.\n", repo_id); goto next; } repo = seaf_repo_manager_get_repo (seaf->repo_mgr, repo_id); if (!repo) { seaf_message ("Repo %.8s HEAD commit is damaged, " "need to restore to an old version.\n", repo_id); repo = get_available_repo (repo_id, repair); if (!repo) { goto next; } reset = TRUE; } else { SeafCommit *commit = seaf_commit_manager_get_commit (seaf->commit_mgr, repo->id, repo->version, repo->head->commit_id); if (!commit) { seaf_warning ("Failed to get head commit %s of repo %s\n", repo->head->commit_id, repo->id); seaf_repo_unref (repo); goto next; } io_error = FALSE; if (!fsck_verify_seafobj (repo->store_id, repo->version, commit->root_id, &io_error, VERIFY_DIR, repair)) { if (io_error) { seaf_commit_unref (commit); seaf_repo_unref (repo); goto next; } else { // root fs object is damaged, get available commit seaf_message ("Repo %.8s HEAD commit is damaged, " "need to restore to an old version.\n", repo_id); seaf_commit_unref (commit); seaf_repo_unref (repo); repo = get_available_repo (repo_id, repair); if (!repo) { goto next; } reset = TRUE; } } else { // head commit is available seaf_commit_unref (commit); } } check_and_recover_repo (repo, reset, repair); seaf_repo_unref (repo); next: seaf_message ("Fsck finished for repo %.8s.\n\n", repo_id); } static void repair_repo_with_thread_pool(gpointer data, gpointer user_data) { CheckAndRecoverRepoObj *obj = data; repair_repo(obj->repo_id, obj->repair); g_free(obj); } static void repair_repos (GList *repo_id_list, gboolean repair, int max_thread_num) { GList *ptr; char *repo_id; GThreadPool *pool; if (max_thread_num) { pool = g_thread_pool_new( (GFunc)repair_repo_with_thread_pool, NULL, max_thread_num, FALSE, NULL); if (!pool) { seaf_warning ("Failed to create check and recover repo thread pool.\n"); return; } } for (ptr = repo_id_list; ptr; ptr = ptr->next) { repo_id = ptr->data; if (max_thread_num) { CheckAndRecoverRepoObj *obj = g_new0(CheckAndRecoverRepoObj, 1); obj->repo_id = repo_id; obj->repair = repair; g_thread_pool_push(pool, obj, NULL); } else { repair_repo(repo_id, repair); } } if (max_thread_num) { g_thread_pool_free(pool, FALSE, TRUE); } } int seaf_fsck (GList *repo_id_list, gboolean repair, int max_thread_num) { if (!repo_id_list) repo_id_list = seaf_repo_manager_get_repo_id_list (seaf->repo_mgr); repair_repos (repo_id_list, repair, max_thread_num); while (repo_id_list) { g_free (repo_id_list->data); repo_id_list = g_list_delete_link (repo_id_list, repo_id_list); } return 0; } /* Export files. */ /*static gboolean write_enc_block_to_file (const char *repo_id, int version, const char *block_id, SeafileCrypt *crypt, int fd, const char *path) { BlockHandle *handle; BlockMetadata *bmd; char buf[64 * 1024]; int n; int remain; EVP_CIPHER_CTX ctx; char *dec_out; int dec_out_len; gboolean ret = TRUE; bmd = seaf_block_manager_stat_block (seaf->block_mgr, repo_id, version, block_id); if (!bmd) { seaf_warning ("Failed to stat block %s.\n", block_id); return FALSE; } handle = seaf_block_manager_open_block (seaf->block_mgr, repo_id, version, block_id, BLOCK_READ); if (!handle) { seaf_warning ("Failed to open block %s.\n", block_id); g_free (bmd); return FALSE; } if (seafile_decrypt_init (&ctx, crypt->version, crypt->key, crypt->iv) < 0) { seaf_warning ("Failed to init decrypt.\n"); ret = FALSE; goto out; } remain = bmd->size; while (1) { n = seaf_block_manager_read_block (seaf->block_mgr, handle, buf, sizeof(buf)); if (n < 0) { seaf_warning ("Failed to read block %s.\n", block_id); ret = FALSE; break; } else if (n == 0) { break; } remain -= n; dec_out = g_new0 (char, n + 16); if (!dec_out) { seaf_warning ("Failed to alloc memory.\n"); ret = FALSE; break; } if (EVP_DecryptUpdate (&ctx, (unsigned char *)dec_out, &dec_out_len, (unsigned char *)buf, n) == 0) { seaf_warning ("Failed to decrypt block %s .\n", block_id); g_free (dec_out); ret = FALSE; break; } if (writen (fd, dec_out, dec_out_len) != dec_out_len) { seaf_warning ("Failed to write block %s to file %s.\n", block_id, path); g_free (dec_out); ret = FALSE; break; } if (remain == 0) { if (EVP_DecryptFinal_ex (&ctx, (unsigned char *)dec_out, &dec_out_len) == 0) { seaf_warning ("Failed to decrypt block %s .\n", block_id); g_free (dec_out); ret = FALSE; break; } if (dec_out_len > 0) { if (writen (fd, dec_out, dec_out_len) != dec_out_len) { seaf_warning ("Failed to write block %s to file %s.\n", block_id, path); g_free (dec_out); ret = FALSE; break; } } } g_free (dec_out); } EVP_CIPHER_CTX_cleanup (&ctx); out: g_free (bmd); seaf_block_manager_close_block (seaf->block_mgr, handle); seaf_block_manager_block_handle_free (seaf->block_mgr, handle); return ret; }*/ static gboolean write_nonenc_block_to_file (const char *repo_id, int version, const char *block_id, const gint64 mtime, int fd, const char *path) { BlockHandle *handle; char buf[64 * 1024]; gboolean ret = TRUE; int n; handle = seaf_block_manager_open_block (seaf->block_mgr, repo_id, version, block_id, BLOCK_READ); if (!handle) { return FALSE; } while (1) { n = seaf_block_manager_read_block (seaf->block_mgr, handle, buf, sizeof(buf)); if (n < 0) { seaf_warning ("Failed to read block %s.\n", block_id); ret = FALSE; break; } else if (n == 0) { break; } if (writen (fd, buf, n) != n) { seaf_warning ("Failed to write block %s to file %s.\n", block_id, path); ret = FALSE; break; } } struct utimbuf timebuf; timebuf.modtime = mtime; timebuf.actime = mtime; if(utime(path, &timebuf) == -1) { seaf_warning ("Current file (%s) lose it\"s mtime.\n", path); } seaf_block_manager_close_block (seaf->block_mgr, handle); seaf_block_manager_block_handle_free (seaf->block_mgr, handle); return ret; } static void create_file (const char *repo_id, const char *file_id, const gint64 mtime, const char *path) { int i; char *block_id; int fd; Seafile *seafile; gboolean ret = TRUE; int version = 1; fd = g_open (path, O_CREAT | O_WRONLY | O_BINARY, 0666); if (fd < 0) { seaf_warning ("Open file %s failed: %s.\n", path, strerror (errno)); return; } seafile = seaf_fs_manager_get_seafile (seaf->fs_mgr, repo_id, version, file_id); if (!seafile) { ret = FALSE; goto out; } for (i = 0; i < seafile->n_blocks; ++i) { block_id = seafile->blk_sha1s[i]; ret = write_nonenc_block_to_file (repo_id, version, block_id, mtime, fd, path); if (!ret) { break; } } out: close (fd); if (!ret) { if (g_unlink (path) < 0) { seaf_warning ("Failed to delete file %s: %s.\n", path, strerror (errno)); } seaf_message ("Failed to export file %s.\n", path); } else { seaf_message ("Export file %s.\n", path); } seafile_unref (seafile); } static void export_repo_files_recursive (const char *repo_id, const char *id, const char *parent_dir) { SeafDir *dir; GList *p; SeafDirent *seaf_dent; char *path; SeafFSManager *mgr = seaf->fs_mgr; int version = 1; dir = seaf_fs_manager_get_seafdir (mgr, repo_id, version, id); if (!dir) { return; } for (p = dir->entries; p; p = p->next) { seaf_dent = p->data; path = g_build_filename (parent_dir, seaf_dent->name, NULL); if (S_ISREG(seaf_dent->mode)) { // create file create_file (repo_id, seaf_dent->id, seaf_dent->mtime, path); } else if (S_ISDIR(seaf_dent->mode)) { if (g_mkdir (path, 0777) < 0) { seaf_warning ("Failed to mkdir %s: %s.\n", path, strerror (errno)); g_free (path); continue; } else { seaf_message ("Export dir %s.\n", path); } export_repo_files_recursive (repo_id, seaf_dent->id, path); } g_free (path); } seaf_dir_free (dir); } static SeafCommit* get_available_commit (const char *repo_id) { GList *commit_list = NULL; GList *temp_list = NULL; GList *next_list = NULL; SeafCommit *temp_commit = NULL; gboolean io_error; seaf_message ("Scanning available commits for repo %s...\n", repo_id); seaf_obj_store_foreach_obj (seaf->commit_mgr->obj_store, repo_id, 1, fsck_get_repo_commit, &commit_list); if (commit_list == NULL) { seaf_warning ("No available commits for repo %.8s, export failed.\n\n", repo_id); return NULL; } commit_list = g_list_sort (commit_list, compare_commit_by_ctime); temp_list = commit_list; while (temp_list) { next_list = temp_list->next; temp_commit = temp_list->data; io_error = FALSE; if (memcmp (temp_commit->root_id, EMPTY_SHA1, 40) == 0) { seaf_commit_unref (temp_commit); temp_commit = NULL; temp_list = next_list; continue; } else if (!fsck_verify_seafobj (repo_id, 1, temp_commit->root_id, &io_error, VERIFY_DIR, FALSE)) { seaf_commit_unref (temp_commit); temp_commit = NULL; temp_list = next_list; if (io_error) { break; } // fs object of this commit is damaged, // continue to verify next continue; } char time_buf[64]; strftime (time_buf, 64, "%Y-%m-%d %H:%M:%S", localtime((time_t *)&temp_commit->ctime)); seaf_message ("Find available commit %.8s(created at %s), will export files from it.\n", temp_commit->commit_id, time_buf); temp_list = next_list; break; } while (temp_list) { seaf_commit_unref (temp_list->data); temp_list = temp_list->next; } g_list_free (commit_list); if (!temp_commit && !io_error) { seaf_warning ("No available commits for repo %.8s, export failed.\n\n", repo_id); } return temp_commit; } void export_repo_files (const char *repo_id, const char *init_path, GHashTable *enc_repos) { SeafCommit *commit = get_available_commit (repo_id); if (!commit) { return; } if (commit->encrypted) { g_hash_table_insert (enc_repos, g_strdup (repo_id), g_strdup (commit->repo_name)); seaf_commit_unref (commit); return; } seaf_message ("Start to export files for repo %.8s(%s).\n", repo_id, commit->repo_name); char *dir_name = g_strdup_printf ("%.8s_%s_%s", repo_id, commit->repo_name, commit->creator_name); char * export_path = g_build_filename (init_path, dir_name, NULL); g_free (dir_name); if (g_mkdir (export_path, 0777) < 0) { seaf_warning ("Failed to create export dir %s: %s, export failed.\n", export_path, strerror (errno)); g_free (export_path); seaf_commit_unref (commit); return; } export_repo_files_recursive (repo_id, commit->root_id, export_path); seaf_message ("Finish exporting files for repo %.8s.\n\n", repo_id); g_free (export_path); seaf_commit_unref (commit); } static GList * get_repo_ids (const char *seafile_dir) { GList *repo_ids = NULL; char *commit_path = g_build_filename (seafile_dir, "storage", "commits", NULL); GError *error = NULL; GDir *dir = g_dir_open (commit_path, 0, &error); if (!dir) { seaf_warning ("Open dir %s failed: %s.\n", commit_path, error->message); g_clear_error (&error); g_free (commit_path); return NULL; } const char *file_name; while ((file_name = g_dir_read_name (dir)) != NULL) { repo_ids = g_list_prepend (repo_ids, g_strdup (file_name)); } g_dir_close (dir); g_free (commit_path); return repo_ids; } static void print_enc_repo (gpointer key, gpointer value, gpointer user_data) { seaf_message ("%s(%s)\n", (char *)key, (char *)value); } void export_file (GList *repo_id_list, const char *seafile_dir, char *export_path) { struct stat dir_st; if (stat (export_path, &dir_st) < 0) { if (errno == ENOENT) { if (g_mkdir (export_path, 0777) < 0) { seaf_warning ("Mkdir %s failed: %s.\n", export_path, strerror (errno)); return; } } else { seaf_warning ("Stat path: %s failed: %s.\n", export_path, strerror (errno)); return; } } else { if (!S_ISDIR(dir_st.st_mode)) { seaf_warning ("%s already exist, but it is not a directory.\n", export_path); return; } } if (!repo_id_list) { repo_id_list = get_repo_ids (seafile_dir); if (!repo_id_list) return; } GList *iter = repo_id_list; char *repo_id; GHashTable *enc_repos = g_hash_table_new_full (g_str_hash, g_str_equal, g_free, g_free); for (; iter; iter=iter->next) { repo_id = iter->data; if (!is_uuid_valid (repo_id)) { seaf_warning ("Invalid repo id: %s.\n", repo_id); continue; } export_repo_files (repo_id, export_path, enc_repos); } if (g_hash_table_size (enc_repos) > 0) { seaf_message ("The following repos are encrypted and are not exported:\n"); g_hash_table_foreach (enc_repos, print_enc_repo, NULL); } while (repo_id_list) { g_free (repo_id_list->data); repo_id_list = g_list_delete_link (repo_id_list, repo_id_list); } g_hash_table_destroy (enc_repos); g_free (export_path); }
{ "pile_set_name": "Github" }
Q: Ruby String read from file outputting backslashes I want to read data.txt file and output the same as string2, but when I read from the file Ruby prints the backslashes, why is that so and how can I avoid it? data.txt contains \",\"foo\":{\"id\":1111,\"name\":\"Bar\", file = File.open("data.txt", "r") string1 = file.read puts "string1: #{string1}" string2 = "\",\"foo\":{\"id\":1111,\"name\":\"Bar\"," puts "string2: #{string2}" Output $ ruby test.rb \",\"role\":{\"id\":1111,\"name\":\"Mobile\", ","role":{"id":1111,"name":"Mobile", My goal is to read data.txt and output ","role":{"id":1111,"name":"Mobile", A: I the data read from the file the backslashes are part of the data. in your string2 the backslashes are escape characters. There are pr1obably better ways to to this but , you could probably just use gsub to get ride of the backslashes. try this and see if it does what you want string1.gsub(/[\\\"]/,"") if you just want to remove the /'s string1.gsub(/\\/,"") should work also
{ "pile_set_name": "StackExchange" }
Caudellia pilosa Caudellia pilosa is a species of snout moth in the genus Caudellia. It was described by Herbert H. Neunzig in 2006 and is known from the Dominican Republic. The length of the forewings is 6.5–7 mm. The ground colour of the forewings is brownish grey, while the hindwings are smoky brown. Etymology The name is derived from Latin pilosus and refers to the dense patch of setae at the base of the male valva. References Category:Moths described in 1996 Category:Phycitinae
{ "pile_set_name": "Wikipedia (en)" }
Rubber-sprung rail wheels of this kind are known in diverse embodiments, for example, from DE-PS 594 792, DE 32 01 499 A1 or DE 24 06 206 A1. The disadvantage of the usual rubber-sprung rail wheels used in the manufacture of rail vehicles is that these deflect only a maximum of 1 mm in radial direction. However, a deflection of up to 5 mm is desired under the same load. Highly elastic rail wheels purely with thrust load or with superposed thrust and pressure loads are likewise known. For example, a rail wheel is known from U.S. Pat. No. 6,312,033 wherein the rubber ring is loaded vertically and in thrust so that the rubber ring takes up a high radial deflection. However, it is disadvantageous with respect to known highly elastic rail wheels that their durability is not satisfactory. In addition to the vertical load because of the weight of the vehicle, a lateral transverse force acts additionally on the rubber body. In the static state, this force effects a cardanic tilting of the rail wheel and the center of rotation is disposed one-third above the center point of the wheel. In the traveling state, the tilting changes continuously over the periphery. In this way, a high peripheral edge pressing arises at the outer diameter of the wheel which destroys the rubber body or rubber ring in a relatively short time. In order to reduce the edge pressing, it has been shown to be advantageous to increase the wall thickness of the rubber rings. However, for small wheels such as are used in street cars, this is not adequately possible. It is furthermore disadvantageous that the rings deflect too greatly because of the larger wall thicknesses with the technically usable rubber hardness. The intense deflection can be compensated by superposing thrust loads and pressure loads in the rubber body, for example, by placing the rubber rings at an angle. However, the edge pressing is again increased and the service life of the rubber body is further deteriorated. The reasons against a continuous conical configuration of the rubber ring is that the structural space for an overall satisfactory wall thickness is mostly not sufficient. For the deflection, it is therefore advantageous to have a narrow wall thickness of the rubber rings but for the edge pressing, the wall thickness should be as large as possible.
{ "pile_set_name": "USPTO Backgrounds" }
A parallel diffusion-based microfluidic device for bacterial chemotaxis analysis. We developed a multiple-channel microfluidic device for bacterial chemotaxis detection. Some characteristics such as easy operation, parallel sample adding design and fast result readout make this device convenient for most biology labs. The characteristic feature of the design is the agarose gel channels, which serve as a semi-permeable membrane. They can stop the fluid flow and prevent bacteria getting across, but permit the diffusion of small molecules. In the device fabrication process a novel thermal-based method was used to control the shape of agarose gel in the microfluidic channel. The chemical gradient is established by diffusion which can be precisely controlled and measured. Combined with an 8-channel pipette, different attractants, repellent chemicals or different bacteria were analyzed by a two step operation with a readout time of one hour. This device may be useful in the high throughput detection of chemotaxis related molecules and genes.
{ "pile_set_name": "PubMed Abstracts" }
When you meet Eddie Redmayne, he’s so affable and charming, so what you’d expect, that it’s almost shocking. Shocking in a, “Well, that’s no way he can be that nice,” kind of way. I had interviewed Redmayne once before, before he won an Oscar for playing Stephen Hawking in The Theory of Everything, and a thing like that sometimes has a way of changing an actor. You know, maybe they have a little more, let’s say, bravado in their personal interactions. Nope: This is the same Eddie Redmayne: the guy who loves talking about his awkward auditions for movies he never got. (As we already learned from his audition for Kylo Ren in Star Wars: The Force Awakens). Redmayne is a rare bird: Here’s an actor who seems much more comfortable talking about his failures than his successes. And we like his stories of awkward auditions because no one is sitting around thinking, Man, when is Eddie Redmayne going to catch a break? Case in point: He’s now the lead in a proposed series of five Fantastic Beasts and Where to Find Them movies, which takes us back to the world of Harry Potter, only now in New York City, circa 1926. Redmayne plays Newt Scamander, an awkward wizard who doesn’t much like socializing with people, who visits New York City in search of more magical beasts for his collection. Along the way, Newt gets mixed up in a whole host of rigmaroles (which are explained in more detail in our review) and finds himself very much the reluctant hero. Ahead, Redmayne explains how he tried to differentiate Newt from Harry Potter. And, yes, he’s got some more awkward interview stories. (Oh, and Redmayne loves Hamilton, a show even he can’t get tickets for. And if an Oscar-winner still can’t get seats, well, that leaves little hope for the rest of us.) I talked to you for Theory of Everything. You were nice. You have that reputation. Oh, God. Disgusting. Like, beige. Newt is definitely not the protagonist we’re used to in this world. He’s very quirky. I think that’s definitely accurate. One of the things I found so attractive about the film when I read the script is that it didn’t feel actually heroic. He’s just there looking for pets. Exactly. He just wants some really cute creatures to hang out with – and he’s definitely better at hanging out with creatures than he is with human beings. What was amazing about the script was that J.K. Rowling had managed to weave a sort of thriller element to it and then this kind of darkness. But also, there’s this kind of buddy movie in the middle, as well as romance and the heart, that I’d loved in the Harry Potter films. And yet, weirdly, I found myself crying when I read the script – like when Dan’s [Fogler] character sort of went out in the world. And I couldn’t quite get over the fact that she’d managed to weave all these genres together in something that felt whole and complete. It’s neat as a period piece, too. Like old New York… It’s kind of amazing. I was so excited when I got the script and when I was cast that my wife and I would get to come to New York. And they were like, “We’re shooting in Watford, just outside of London.” Oh, no. But it was amazing, what they built. It felt like a different era in filmmaking. Because I’m used to doing films in which there’s an extra who like walks around the camera lots of times to make it look like there’s a crowd, and here there were just thousands of people dressed in period dress. And they properly built New York as far as you could see it. It’s quite overwhelming. When you signed up did you know it would be five movies? No. When you sign on, I think I was signed on for like three? I should actually know that. Four, I think was what I was signed on for. And then we found out when the world found out: When Jo announced it at the fan event. But the reality is that will only happen if people enjoy the film. And the other thing is what I loved about: I think sometimes with big franchise films, there’s a sense that that first film is like all set-up. It’s like a kind of pilot, and it can be unsatisfactory in that way. And what I loved about this film when I read it is even though there are references to past and kind of pointers to a future, it felt like a complete story.
{ "pile_set_name": "OpenWebText2" }
F I L E D United States Court of Appeals Tenth Circuit UNITED STATES COURT OF APPEALS APR 15 1999 TENTH CIRCUIT PATRICK FISHER Clerk DARREN JAY DENNISON, Petitioner - Appellant, No. 98-3352 v. (D.C. No. 98-CV-3351) UNITED STATES OF AMERICA, (D. Kan.) Respondent - Appellee. ORDER AND JUDGMENT * Before TACHA, McKAY, and MURPHY, Circuit Judges. After examining Petitioner-Appellant Darren Jay Dennison’s brief and the appellate record, this panel has determined unanimously that oral argument would not materially assist the determination of this appeal. See Fed. R. App. P. 34(a)(2); 10th Cir. R. 34.1(G). The case is therefore ordered submitted without oral argument. Before us is Petitioner’s motion to proceed in forma pauperis on appeal along with his appeal of the district court’s denial of his application for a writ of * This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. The court generally disfavors the citation of orders and judgments; nevertheless, an order and judgment may be cited under the terms and conditions of 10th Cir. R. 36.3. habeas corpus pursuant to 28 U.S.C. § 2241. 1 To proceed in forma pauperis on appeal from the denial of a section 2241 petition, Petitioner must show “a financial inability to pay the required fees and the existence of a reasoned, nonfrivolous argument on the law and facts in support of the issues raised on appeal.” McIntosh v. United States Parole Comm’n, 115 F.3d 809, 812 (10th Cir. 1997). In his petition for a writ of habeas corpus, Petitioner, who is currently confined in the United States Penitentiary in Terre Haute, Indiana, complained of certain disciplinary actions taken against him while he was incarcerated in the United States Penitentiary in Leavenworth, Kansas. 2 Specifically, Petitioner In addition to his application and an opening brief, Petitioner also has filed 1 a pleading entitled “Motion,” which we construe as a motion for leave to file an appendix. Because the Government has not filed any objection to this motion, we now grant the motion. Although Petitioner also raised claims alleging that he required protective 2 custody at the Terre Haute facility, the district court properly dismissed this claim because it does not have jurisdiction over the officers or staff of the Terre Haute facility. As the district court indicated, if Petitioner wishes to seek judicial intervention regarding his entitlement to protective custody in Terre Haute, he should file a Bivens complaint in the appropriate federal district court in Indiana. See Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388, 395-97 (1971). The district court also properly dismissed Petitioner’s claims regarding his placement in administrative segregation at Leavenworth in December 1996. While “a § 2241 attack on the execution of a sentence may challenge some matters that occur at prison,” McIntosh, 115 F.3d at 811, Petitioner has not alleged or shown the deprivation of any constitutional or federal statutory right in connection with this claim. Thus, habeas relief is unavailable on this claim. See -2- alleged that he received a sanction of fifteen days of disciplinary segregation and a disciplinary transfer for possession of a contraband walkman radio. Although Petitioner admitted to the charged offense, he claimed that his procedural due process rights were violated because he was coerced into making a statement without being advised of his Miranda rights, he was denied assistance of counsel, he did not waive the presence of a staff representative, and he was unsuccessful in filing a disciplinary appeal. In dismissing the petition, the district court noted that before prison authorities may deprive a prisoner of a protected liberty interest, the prisoner is entitled to due process. At a minimum, the prisoner is entitled to (1) advance notice of the charges at least twenty-four hours before the disciplinary hearing; (2) present evidence and witnesses in his defense; and (3) receive a written statement describing the evidence relied upon and the reasons for the discipline imposed. See R., Doc. 11 at 2 (citing Wolff v. McDonnell, 418 U.S. 539, 563-69 (1974)). The district court concluded that because Petitioner’s punishment for his violation of prison rules did not “‘impose[] atypical and significant hardship [on him] in relation to the ordinary incidents of prison life,’” id. at 3 (quoting Sandin v. Conner, 515 U.S. 472, 484 (1995)), it did not “give rise to a due process claim.” Id. The court went on to explain that even if Petitioner’s punishment had implicated a protected liberty interest, his “admission 28 U.S.C. § 2241(c)(3). -3- of the charged misconduct clearly is sufficient to support the disciplinary action” and “there is [no] allegation that [P]etitioner was denied the rights enumerated in Wolff.” Id. at 3-4. On appeal, Petitioner repeats much of what he alleged in his section 2241 petition. He also claims that the district court erred in: (1) failing to focus on the “criminal element” of the prison officials’ actions in this case, as opposed to merely focusing on the procedural deprivations he alleged; (2) finding that no Miranda violation occurred; (3) concluding that the disciplinary measures did not impose atypical and significant hardship; (4) determining that the Bureau of Prisons’ staff did not interfere in his administrative appeal; (5) failing to find that the Bureau of Prisons is acting arbitrarily and capriciously against Petitioner; and (6) failing to find that Petitioner was deprived of any of the due process protections enumerated in Wolff. We review the district court's dismissal of a section 2241 petition de novo. See Bradshaw v. Story, 86 F.3d 164, 166 (10th Cir. 1996). Further, because plaintiff proceeds pro se, we construe his pleadings liberally. See Riddle v. Mondragon, 83 F.3d 1197, 1202 (10th Cir. 1996). Having reviewed Petitioner’s arguments, the district court’s order of dismissal, and the entire record on appeal, we conclude that Petitioner’s claims are meritless. First, there is no credible record support for the claim that any of the prison officials involved in this case -4- engaged in any criminal activity with respect to the disciplinary measures imposed against Petitioner, so there is no “criminal element” to investigate. Second, while prisoners are entitled to certain procedural safeguards in the context of disciplinary proceedings, see Wolff, 418 U.S. at 563-69, they are not entitled to Miranda warnings in connection with such proceedings. See Rhodes v. Henman, 946 F.2d 901, 1991 WL 216808, at **3 (10th Cir. 1991) (Table) (citing Tinch v. Henderson, 430 F. Supp. 964, 968-69 (M.D. Tenn. 1977)). Third, the disciplinary transfer and the fifteen-day disciplinary segregation imposed by the Bureau of Prisons did not amount to “atypical and significant hardship” under Sandin because they did not “work a major disruption in [Petitioner’s] environment” nor did they “inevitably affect the duration of his sentence.” Sandin, 515 U.S. at 486- 87. Thus, because Petitioner was not deprived of a protected liberty interest, he was not entitled to the due process protections set forth in Wolff. See id. at 487. Fourth, there is no indication in the documentary evidence in the record that any Bureau of Prisons personnel interfered with or otherwise impeded Petitioner’s administrative appeal. Fifth, the record does not support Petitioner’s allegation that the Bureau of Prisons treated him arbitrarily and capriciously. Finally, even though we conclude that Petitioner did not have a due process claim entitling him to the Wolff protections, he has not set forth any facts indicating that he was deprived of the safeguards in any event. Petitioner has not alleged that he was -5- deprived of notice regarding the charges against him, that he was deprived of the opportunity to present witnesses and evidence in his defense, or that the Bureau of Prisons failed to give him a written statement regarding the evidence supporting and the reasons for the disciplinary action. Because Petitioner has not shown the existence of a reasoned, nonfrivolous argument in support of the issues raised on appeal, we deny his motion to proceed on appeal in forma pauperis and dismiss his appeal. DENIED and DISMISSED. Entered for the Court Monroe G. McKay Circuit Judge -6-
{ "pile_set_name": "FreeLaw" }
Q: Complexity of algorithm What is the complexity given for the following problem is O(n). Shouldn't it be O(n^2)? That is because the outer loop is O(n) and inner is also O(n), therefore n*n = O(n^2)? The answer sheet of this question states that the answer is O(n). How is that possible? public static void q1d(int n) { int count = 0; for (int i = 0; i < n; i++) { count++; for (int j = 0; j < n; j++) { count++; } } } The complexity for the following problem is O(n^2), how can you obtain that? Can someone please elaborate? public static void q1E(int n) { int count = 0; for (int i = 0; i < n; i++) { count++; for (int j = 0; j < n/2; j++) { count++; } } } Thanks A: The first example is O(n^2), so it seems they've made a mistake. To calculate (informally) the second example, we can do n * (n/2) = (n^2)/2 = O(n^2). If this doesn't make sense, you need to go and brush up what the meaning of something being O(n^k) is. A: The complexity of both code is O(n*n) FIRST The outer loop runs n times and the inner loop varies from 0 to n-1 times so total = 1 + 2 + 3 + 4 ... + n which if you add the arithmetic progression is n * ( n + 1 ) / 2 is O(n*n) SECOND The outer loop runs n times and the inner loop varies from 0 to n-1/2 times so total = 1 + 1/2 + 3/2 + 4/2 ... + n/2 which if you add the arithmetic progression is n * ( n + 1 ) / 4 is also O(n*n)
{ "pile_set_name": "StackExchange" }
Q: Unexpected result when subtracting floats Possible Duplicate: ruby floating point errors In Ruby, when subtracting 4.7 from 5.0, I would expect a result of 0.3 but get: ~ $ irb 1.9.2p290 :001 > 5.0 - 4.7 => 0.2999999999999998 I'm guessing there is a reason for this rather than it being a bug? Using BigDecimal objects yields the same result. Is my only option to use round on the result? A: Floats lose precision. Nothing can be done about that. So, use: (5.0 - 4.7).round(1) and if you had needed more precision: (0.50 - 0.47).round(2)
{ "pile_set_name": "StackExchange" }
Q: で at the beginning of a sentence I hear native speakers using で or was it でー when speaking a lot at the beginning of a sentence. Judging by context, I think it translates to either "and" or "therefore" or "so" or "because of that", but I might be wrong. An example usage I have heard (if i recall) would be as follows: 1. で、言いたいのは何? 2. これは他人のものですよ。で、取っちゃダメ I've only ever heard it in speech and never seen in in writing. So the question is, in casual written context, would it be written as で、言いたいのは何 or でー、言いたいのは何 or でー言いたいのは何 (notice that there is no comma) or で言いたいのは何 (notice that there is no comma) I know it sounds (very) trivial, but I'm just curious which is the correct form I am tagging it as slang at the moment, but do let me know if there are better tags A: Judging by context, I think it translates to either "and" or "therefore" or "so" or "because of that", but I might be wrong. You are not wrong. 「で」 is an extremely common conjunction meaning "and", "and then", "for that reason", etc. It is an informal/colloquial form of 「それで」、「そういうわけで」, etc. Since 「で」 is informal, it is not used in formal writing or speech, but it is often used in informal writing and speech. When it is used in writing, it is mostly in the form of 「で、~~~」 with a comma. In very casual texting among young people, however, the comma may be dropped. 「でー」 or 「でぇ」 with elongation is quite common in speech, but not very in writing. Finally, though it is informal, it is not slang by any stretch.
{ "pile_set_name": "StackExchange" }
Ultimate Fractal 1.1 Create amazing fractal artwork in just a few seconds. Explore the Wonderful World of Fractals. Fractals are complex, detailed geometric patterns found throughout the natural world. Ultimate Fractal generates images or designs of amazing detail.
{ "pile_set_name": "Pile-CC" }
Menu Craft Show Post Mortem The Ephrata Arts and Craft Fest did not go well for me. Despite me being well prepared and very enthusiastic, the turn out for the show was horrible due to the 91 degree Fahrenheit temperatures that day. No one wanted to be out in the heat, and the people that did come didn’t appear to be buying much from anyone. I sold one tape your own hoop kit. One thing. I didn’t even make back what I spent on the booth space. To be honest, the whole thing wasn’t worth my time and effort. I guess on the positive side, I did get my name out there, and people had fun watching me perform from time to time when I decided to do it. The booth on the right side of me didn’t show up, so I had a little extra space to perform. I was also right near a dumpster, on the down side. It’s sad when the people passing by are more interested in the dumpster than the booths, but it was true for Saturday. I was packed up and ready to go by the time the show ended. I know they organizers don’t want you to do that until the show is scheduled to end, but I didn’t care. Neither did a lot of people who also had booths, too. Three o’clock rolled around, and I was ready for Sam to pick me up and head into the air conditioning. I was honest with one of the fest’s organizers who came around to see how we everyone was doing towards the end of the show. I told her it was not a good day. I know she can’t control the weather and they did all they could for advertising, but, hey, it still wasn’t a good experience. So, that’s my post mortem on my time at the Ephrata Arts and Crafts Fest. I’m not sure if I’ll do it again next year. Probably not. It’s just not worth the hassle.
{ "pile_set_name": "Pile-CC" }
Insurance is a business of protecting and helping after the occurrence of an accident, loss or tragedy. In the event of an accident or loss, a policyholder or a third-party claimant can obtain payments or benefits, as provided in an insurance policy, by filing an insurance claim with the issuing insurance company. Many insurance companies employ certain third parties or TPAs to handle insurance claims, including tasks such as verifying the amount of the claim to be paid and ensuring that the claim is timely paid. TPAs provide skill and cost efficiencies for insurance companies, but can introduce delays in claim resolution and unwanted complexity in claim reconciliation. In particular, problems can arise in transferring funds from an insurance company to a policyholder through a TPA-administered escrow account. The most common problems relate to timing issues, where insurance company money is advanced to a non-insurer-owned escrow account and then remains in the account. Representative problems include undue exposures to bank capitalization risks and to risks of garnishment or seizure related to TPA financial exposures, and also include opportunity costs imposed on the insurer by reduced cash liquidity. Additionally, TPA ownership of escrow accounts complicates insurer participation in a “positive pay” type process for disbursing funds to claimants. However, insurer ownership of escrow accounts comes with its own problems, including challenges of real-time transaction and balance tracking and reconciliation. Accordingly, it is desirable to have a system for handling third-party-administered insurance claims, wherein insurance company money can be held in an insurer-owned account and can move promptly to policyholders on resolution of a claim.
{ "pile_set_name": "USPTO Backgrounds" }