text
stringlengths 0
7.84M
| meta
dict |
---|---|
#X-Generator: crowdin.com
plugnhack.activated=Dukungan ZAP telah diaktifkan pada browser Anda\:
plugnhack.brk.display=Tipe\: {0} Klien\: {1} Pola muatan\: {2}
plugnhack.brk.type.label=Jenis Pesan\:
plugnhack.brk.types.all=-- Semua jenis --
plugnhack.brk.client.label=Id Klien\:
plugnhack.brk.clients.all=-- Semua Klien --
plugnhack.brk.payload.label=Pola Beban\:
plugnhack.button=Klik untuk setup\!
plugnhack.clientconf.popup=Konfigurasikan Klien...
plugnhack.client.button.active.off=Daftar klien aktif saja
plugnhack.client.button.active.on=Buat daftar klien aktif dan tidak aktif
plugnhack.client.button.custom.tooltip=Tambahkan breakpoint kustom
plugnhack.client.panel.title=Tambahkan breakpoint kustom
plugnhack.client.panel.mnemonic=c
plugnhack.clientmsg=Waktu\: {0} ID Klien\: {1} Ketik\: {2}
plugnhack.desc=Konfigurasi browser sederhana
plugnhack.dialog.clientconf.heartbeat=Interval detak jantung\:
plugnhack.dialog.clientconf.interceptEvents=Acara penyadapan\:
plugnhack.dialog.clientconf.interceptPostMessage=Pesan posting mencegat\:
plugnhack.dialog.clientconf.monitorEvents=Pantau Acara\:
plugnhack.dialog.clientconf.monitorPostMessage=Pantau Pesan Pos\:
plugnhack.dialog.clientconf.title=Konfigurasi Klien
plugnhack.header=Selamat Datang di OWASP Zed Attack Proxy (ZAP)
plugnhack.failure=Konfigurasi gagal
plugnhack.firefox=Tambahkan ke Firefox
plugnhack.intro1=ZAP adalah alat uji penetrasi terintegrasi yang mudah digunakan untuk menemukan kerentanan dalam aplikasi web.
plugnhack.intro2=Perlu diketahui bahwa Anda seharusnya hanya menyerang aplikasi yang telah diberi izin khusus untuk Anda uji.
plugnhack.label.initialMessage=<html>Untuk menerima acara klien\:\n\n<ul>\n<li>Akses halaman yang ingin dipantau saat proxy melalui ZAP</li>\n<li>Klik kanan pada node yang relevan(s) di pohon Sites dan pilih 'Pantau klien -> Sertakan subtree '</li>\n<li>Pakailah browser Anda untuk memuat ulang halaman-halaman itu</li>\n<li>Acara klien (seperti postMessage, klik, Gunakan mouse dll) kemudian akan tercantum di tab ini - pilih mereka untuk melihat rincian lengkap.</li></ul></html>
plugnhack.menu.monitor=Pantau klien
plugnhack.menu.monitor.exclude=Kecualikan subtree
plugnhack.menu.monitor.exscope=Mengecualikan semua dalam lingkup
plugnhack.menu.monitor.open=Buka sebagai URL dipantau
plugnhack.menu.monitor.include=Sertakan subtree
plugnhack.menu.monitor.inscope=Sertakan semua dalam lingkup
plugnhack.msg.table.header.date=Diterima
plugnhack.msg.table.header.client=Klien
plugnhack.msg.table.header.type=Mengetik
plugnhack.msg.table.header.data=Data
plugnhack.panel.component.all.tooltip=Pesan pelanggan
plugnhack.progress=Mengkonfigurasi browser Anda untuk bekerja dengan ZAP...
plugnhack.resend.popup=Kirim ulang
plugnhack.resend.dialog.title=Kirim ulang Pesan Klien
plugnhack.session.label.exclude=URL yang tidak akan dipantau
plugnhack.session.label.include=URL yang akan dipantau (kecuali dikecualikan)
plugnhack.session.label.inscope=Semua cakupan URL (kecuali dikecualikan)
plugnhack.session.table.header.exclude=URL regexes
plugnhack.session.table.header.include=URL regexes
plugnhack.session.title=Klien Monitor
plugnhack.setup1=Browser Anda sepertinya tidak mendukung konfigurasi man-in-the-middle otomatis.
plugnhack.setup2=Jika Anda menggunakan Firefox versi terbaru, Anda bisa mendapatkan add-on di sini\:
plugnhack.success=Konfigurasi berhasil, Anda sekarang proxy melalui ZAP\! <p> \nAnda dapat mengontrol Plug-n-Hack dan ZAP melalui Toolbar Pengembang Firefox (Shift + F2) - ketik 'help pnh' atau 'help zap' untuk memulai. \n \nKonteks | Permintaan Konteks.
plugnhack.title=Konfigurasi Browser Sederhana ZAP
plugnhack.view.pnhjson=PnH JSON
plugnhack.view.table.autoscroll.label=Mobil-Gulir
plugnhack.view.table.autoscroll.tooltip=Gulir otomatis saat entri baru ditambahkan ke tabel, jika scroll bar ada di bagian bawah.
| {
"pile_set_name": "Github"
} |
With a quarter of a billion dollars already in its pocket from a week of ticket sales, the Marvel superhero mash-up"The Avengers"is poised to join Hollywood’s most elite club — the brotherhood of billion-dollar box office movies.
Unlike its cousins, though, “The Avengers” took a different path to the clubhouse. It opened first overseas, with splashy red-carpet premieres in Rome, Beijing, London and Moscow, where audiences have embraced the special-effects-driven action and adventure film.
By opening early abroad, movies like the Disney release “The Avengers” build box office momentum from their most avid audiences — foreign moviegoers who love spectacular action sequences on the big screen.
American movies, always popular internationally, today earn far more money abroad than at home — up to 70% of their overall take, and rising. Between 2007 and 2011, ticket sales overseas grew 35%, while domestic grosses increased only 6%.
Five years ago, an overseas-first debut would have been unthinkable. Movies always debuted on the same date around the world, or first in the U.S. But now, studios with certain movies are putting foreign theaters first and making U.S. audiences wait.
For “The Avengers,” which opens here this weekend, the gambit is working. The film, whose A-list stars include Robert Downey Jr.and Scarlett Johansson, centers around an international peace-keeping crew of Iron Man, the Incredible Hulk, Thor, Captain America, Hawkeye and Black Widow. It had a 93% fresh rating from the online review aggregate Rotten Tomatoes.
“The fact that it has done so well overseas has everyone already speculating over just how successful it’s going to be,” said Peter Adee, who has worked in marketing and distribution at Relativity Media, Metro-Goldwyn-Mayer and Universal. “The question ‘Is it going to be successful?’ is gone from the conversation before it even debuts in the U.S.”
The movie is projected to open in the U.S. and Canada to at least $150 million in ticket sales — among the top five biggest openings of all time. (The top dog is “Harry Potter and the Deathly Hallows Part 2,” with its $169.2-million debut.)
By weekend’s end, the movie, which cost an estimated $220 million to produce, may have close to $600 million worldwide. In just eight days of release, “Avengers” has collected more than the total international take of “Captain America,""Iron Man"and"Thor.”
When its run is over, “The Avengers” is likely to stand with “Avatar,""Titanic"and iterations of “Harry Potter,” “Star Wars,” “Pirates of the Caribbean,” “Lord of the Rings,""Toy Story” and"Transformers,” as one of a new breed of globally dominant film franchises.
The powerful box-office figures are also the locomotive that is expected to pull a long train of profitable spin-off products, including DVDs, soundtracks and licensed merchandise, as well as sales of the movie to international broadcast and cable TV, and services like Hulu and Netflix. Its characters may one day populate a long-rumored Disney-Marvel theme park attraction.
“The Avengers” isn’t the first to premiere internationally before it hits domestic shores. Universal Pictures’ big-budget action picture “Battleship,” which has generated a high level of skepticism in the U.S. because of its board game origins, has already racked up a respectable $170 million overseas in advance of its domestic debut May 18.
Warner Bros.opened its sequel"Journey 2: The Mysterious Island"abroad three weeks before it hit theaters stateside in February. The film ultimately grossed $221 million of its $323 million take outside the U.S.
Some in Hollywood have suggested a similar strategy would have benefited Disney’s March flop"John Carter,"which was better received in foreign countries than it was in the U.S. But the movie’s $270-million global take was so weak that Disney had to take a $200-million write-off on its cost.
Disney decided to release “The Avengers” overseas first in part because the summer ahead is crowded with sporting events — the Olympics and Euro Cup soccer — thought likely to keep audiences out of movie theaters. It chose the May Day holiday because it’s a day off for many European students and workers.
But Disney also wanted to create positive “evangelism” about the film in America, said Dave Hollis, the studio’s executive vice president of distribution.
“A big international gross signals ‘Hey, this is a big, big movie’ — it’s not something that’s just for fans, it’s for everyone,” Hollis said.
So far, the picture has performed best in Britain and Mexico, but is likely to be huge in both China and Russia, where movies with big special effects have traditionally been popular and where language is not the barrier it might be with, say, a romantic comedy.
“If it’s a big blockbuster film that’s easily digestible, it’s going to work internationally,” said Craig Dehmel, senior vice president of sales and strategic planning for Fox International, which did well with an overseas-first release of its animated"Rio.”
[email protected]
Times staff writer Ben Fritz contributed to this report. | {
"pile_set_name": "OpenWebText2"
} |
set(CMAKE_HOST_SYSTEM "Linux-4.4.0-94-generic")
set(CMAKE_HOST_SYSTEM_NAME "Linux")
set(CMAKE_HOST_SYSTEM_VERSION "4.4.0-94-generic")
set(CMAKE_HOST_SYSTEM_PROCESSOR "x86_64")
set(CMAKE_SYSTEM "Linux-4.4.0-94-generic")
set(CMAKE_SYSTEM_NAME "Linux")
set(CMAKE_SYSTEM_VERSION "4.4.0-94-generic")
set(CMAKE_SYSTEM_PROCESSOR "x86_64")
set(CMAKE_CROSSCOMPILING "FALSE")
set(CMAKE_SYSTEM_LOADED 1)
| {
"pile_set_name": "Github"
} |
A putative chemoattractant receptor, C5L2, is expressed in granulocyte and immature dendritic cells, but not in mature dendritic cells.
Leukocyte chemoattractants are involved in the inflammatory response act via G protein-coupled receptors. We report the cloning of a novel human gene encoding the putative orphan receptor, C5L2, belonging to a subfamily of C3a, C5a and formyl Met-Leu-Ph receptors that are related to the chemokine receptor family. C5L2 transcript levels were abundant in granulocytes and immature dendritic cells but not in mature dendritic cells. We speculate that this receptor may regulate the activation of immature dendritic cells and play a role in the chemoattraction of leukocytes to inflammatory regions. | {
"pile_set_name": "PubMed Abstracts"
} |
Tony Currie (rugby league)
Tony Currie (born 25 December 1962) is an Australian former professional rugby league footballer who played in the 1980s and 1990s. He is of Aboriginal descent and played for the Australian side, State of Origin for Queensland. At club level he played for the Brisbane Broncos, and the Canterbury-Bankstown Bulldogs in Australia, appearing in premiership-winning sides for both teams, as well as Leeds in England.
Playing career
In 1982, while playing with Western Suburbs, Currie won the Brisbane Rugby League premiership's Rothmans Medal. On 20 July 1988 Currie played for Australia in their record 62-point win over Papua New Guinea, scoring a try. Currie helped the Canterbury-Bankstown Bulldogs win the 1988 Grand Final against the Balmain Tigers. He also played in the Brisbane Broncos first grand final in 1992, helping them to claim their maiden premiership. In the weeks following the grand final Currie travelled with the Broncos to England, where he played from the interchange bench in the 1992 World Club Challenge against British champions Wigan, helping Brisbane become the first NSWRL club to win the match in Britain.
Post playing
Currie later coached the Super League club, the London Broncos between 1996-1998. He was President of the Wests Panthers club for a number of years.
References
External links
(archived by web.archive.org) Queensland Representatives at qrl.com.au
Category:1962 births
Category:Indigenous Australian rugby league players
Category:Australian rugby league players
Category:Redcliffe Dolphins players
Category:Wests Panthers players
Category:Brisbane Broncos players
Category:Canterbury-Bankstown Bulldogs players
Category:Leeds Rhinos players
Category:Queensland Rugby League State of Origin players
Category:Australian rugby league coaches
Category:London Broncos coaches
Category:Rugby league wingers
Category:Living people
Category:Rugby league centres
Category:Australia national rugby league team players
Category:Rugby league fullbacks
Category:Brisbane rugby league team players
Category:Sportspeople from Townsville | {
"pile_set_name": "Wikipedia (en)"
} |
Spindle cell lipomas (SCL) are relatively rare, slow growing, benign lipomatous tumors. These masses typically arise in males aged 40--70 years and originate most frequently in the subcutaneous tissue of the upper back, posterior neck, and shoulders.^[@R1]--[@R3]^ SCLs account for only 1.5% of all reported lipomatous tumors, and these lesions share similar morphology with other fatty/spindle cell or myxoid lesions, benign and malignant.^[@R3],[@R4]^ Prognosis is uniformly favorable, and thus, wide local excision is the treatment of choice.^[@R1],[@R5]^ We submit an SCL case report and a review of the literature to better understand this soft-tissue tumor.
CASE REPORT
===========
A 55-year-old male presented with a large dorsocervical mass (Figs. [1](#F1){ref-type="fig"}, [2](#F2){ref-type="fig"}) that had been present for 20 years. He requested treatment as this gradually enlarging mass increased in size rapidly over past year and was causing difficulty with sleep. He denied any history of other soft-tissue tumors and endocrine workup was within normal limits. He did imbibe 6 alcoholic beverages per week and smoked 2 packs of cigarettes per day.
{#F1}
{#F2}
On exam, a soft, mobile, 20 × 20 cm nontender mass with overlying telangiectasia, without bleeding, purulence, erythema, or ulceration was found. This was present within the posterior, lower neck. There was no lymphadenopathy.
After informed consent was obtained, the patient was taken to the operating room for excisional biopsy. An elliptical incision was made overlying the distended neck mass and extended until a capsule was identified. The mass and capsule were then dissected circumferentially and removed. The muscle fascia was not violated. The 16 × 9.1 × 6.5 cm specimen was noted to be a cystic structure containing a gel-like fluid (Fig. [3](#F3){ref-type="fig"}).
{#F3}
Pathologic analysis demonstrated a spindle cell neoplasm with abundant myxoid stroma and cleft-like spaces (Fig. [4](#F4){ref-type="fig"}). The cells were fairly monotonous, admixed with mature fat cells. No mitotic figures, nuclear atypia, necrosis, lipoblasts, or arborizing vascular proliferation was identified. Fluorescence in situ hybridi zation for carboxypeptidase M (CPM) was negative. The margins were not involved. Given the subcutaneous location of the tumor and the histology described, the reviewing pathology teams deemed the neoplasm a spindle cell lipoma.
{#F4}
Post procedure, the patient healed without issue, and given the diagnosis of SCL, no adjuvant treatment was required.
DISCUSSION
==========
In 1934, Geschickter^[@R6]^ recognized 2 major groups of lipoid tumors: lipomatous tumors composed of fatty tumor and xanthomatous tumors, which include fat necrosis and phagocytosis of fat. Categorization of these tumors has progressed with additions and changes in classification. Lipomatous tumors are a common group of mesenchymal lesions, the most common of which is a lipoma.^[@R7]^ It has been argued whether spindle cells of SCL arise from fibroblasts or preadipocytes, yet there are no intermediates of the adipocyte and spindle cell, which argues against a continuum of development.^[@R8]^
Typical lipomas do not routinely yield diagnostic difficulty, yet those with unusual features, including SCL, may be mistaken with liposarcoma.^[@R3],[@R4],[@R7]^ Furthermore, the histologic growth pattern and/or cytology of SCL may overlap that of other spindle cell tumors (schwannoma, neurofibroma, angiolipoma, dermatofibrosarcoma protuberans, solitary fibrous tumor, etc.) and myxoid lesions (myxoid liposarcoma, myxoid fibrosarcoma, myxoid neurofibroma, myxoma, etc.).^[@R1],[@R3],[@R8],[@R9]^
Cytology, light and electron microscopy, and cytogenetic studies are tools used to aid in the differentiation of benign and malignant lipomatous tumors. Akin to our case, SCL are composed of 3 basic histologic components: mature adipocytes, uniform spindle cells, and bundles of collagen; prominent myxoid matrix is occasionally seen.^[@R1],[@R3],[@R8]^ Mitotic figures are scarce.^[@R8]^ A portion of diagnostic difficulty lies in the fact that SCL may show considerable variation in the proportion of each component, yet the great majorities have significant amounts of mature adipocytes and spindle cells.^[@R3],[@R9]^ Other tumors with similar morphology are increasingly described, as are SCL of unusual sites, thus making correct differentiation vital.
Enzinger and Harvey^[@R1]^ made the histologic distinction that spindle cell lipoma lacks the hallmark cell of liposarcoma, the lipoblast. Comunoglu et al^[@R10]^ noted that CD34 positivity is a characteristic feature that occurred in all cases reviewed yet occurred rarely in liposarcoma. Nevertheless, Billings and Folpe^[@R9]^ warned that CD34 positivity can be interpreted in an appropriate histologic context as it is relatively nonspecific and occurs in a variety of mesenchymal tumors. Cytogenetic analysis revealed SCLs typically have karyotypic aberrations including loss of material from the long arms of chromosomes 13 or 16, whereas the myxoid/round cell group of liposarcoma consists of t(12;16), and atypical lipomatous/well-differentiated liposarcomas and dedifferentiated liposarcomas contain amplified material of 12q13-15.^[@R3],[@R7],[@R11],[@R12]^ Pathologic analysis of our specimen utilized fluorescence in situ hybridization for CPM to facilitate ruling out liposarcoma. Erickson-Johnson et al^[@R13]^ reported that CPM is consistently amplified in well-differentiated liposarcoma/atypical lipomatous tumors but not in ordinary or pleomorphic lipomas.
Magnetic resonance image appearance may vary from nonfatty and heterogeneous to lipoma-like, and thereby may be useful in evaluating the extent of lesion but not for establishing a specific diagnosis.^[@R3]^ Fine needle aspiration cytology may be as characteristic as histology. However, with tumors in atypical locations, even aspirates containing all of the characteristic elements may be difficult to use for firm diagnosis of SCL. Domanski et al^[@R3]^ report 12 patients who underwent fine needle aspiration before surgery; all 12 showed adipocytes, spindle cells, and collagen bundles/fibers. Yet, their aspirate contained considerable variation in proportion of these elements, and the myxoid matrix made it difficult to distinguish from other myxoid lesions. Excisional biopsy is recommended for definitive tissue diagnosis.
The largest pathologic series of SCL containing 144 patients noted that these lesions were well circumscribed, rarely encapsulated masses with a predilection of occurrence over the shoulders and posterior neck^[@R1]^; SCL are generally more superficially located than liposarcoma.^[@R10]^ SCL are typically found in men over age 45 years, whereas lipomas, in general, occur more frequently in women and in a less characteristic anatomic distribution.^[@R1]^ Two studies followed patients for up to 22^[@R1]^ and 25^[@R5]^ years after local surgical excision of the SCL. They reported a benign clinical course and concluded that treatment with local excision was curative.^[@R1],[@R5]^
Familial cases of multiple SCLs presenting similar to Madelung's disease have been reported, but multiple lesions are exceedingly rare.^[@R14]^ Case reports also exist for lesions occurring in unusual locations, such as the buccal mucosa, orbit, subungual tissues, breast, and scalp.^[@R4],[@R15]--[@R18]^ The vast majority of spindle cell lipoma literature is composed of clinical pathologic reviews.^[@R1],[@R3]--[@R5],[@R7]--[@R9],[@R11],[@R12],[@R19]^
The rare diagnosis of SCL is primarily attained during the process of ruling out other neoplastic tumors via cytologic, histologic, and cytogenetic evidence and in conjunction with clinical presentation.
CONCLUSIONs
===========
SCL are rare, benign lipomatous tumors. These masses mostly occur in the posterior neck, upper back, and shoulder region in males aged 40--70 years. A variety of cytogenetic tests are available as an adjunct to standard pathologic and clinical evaluation to support diagnosis. Local excision of SCL is considered curative.
**Disclosure**: The authors have no financial interest to declare in relation to the content of this article. The Article Processing Charge was paid for by the authors.
| {
"pile_set_name": "PubMed Central"
} |
---
abstract: 'In this note, we show that the normalized Hochschild co–chains of an associative algebra with a non–degenerate, symmetric, invariant inner product are an algebra over a chain model of the framed little discs operad which is given by cacti. In particular, in this sense they are a BV algebra up to homotopy and the Hochschild cohomology of such an algebra is a BV algebra whose induced bracket coincides with Gerstenhaber’s bracket. To show this, we use a cellular chain model for the framed little disc operad in terms of normalized cacti. This model is given by tensoring our chain model for the little discs operad in terms of spineless cacti with natural chain models for $(S^1)^{\times n}$ adapted to cacti.'
address: 'University of Connecticut, Department of Mathematics, Storrs, CT 06269'
author:
- 'Ralph M. Kaufmann'
title: 'A proof of a cyclic version of Deligne’s conjecture via Cacti'
---
Introduction {#introduction .unnumbered}
============
In this note, we expand our chain model of the little discs operad which we gave in terms of spineless cacti to a chain model for the framed little discs operad in terms of normalized cacti. Extending the philosophy of [@del], we then show that the chain model for the framed little discs operad naturally acts on the normalized Hochschild cochains of a unital associative algebra with a non–degenerate, symmetric, invariant bi–linear pairing. In fact, as in [@del], this operation can again be seen as a discretization of the calculations for the relations of a BV algebra up to homotopy on the chains of the operad $\Arc$ of [@KLP]. In [@cact] it is proven, that the operad of framed little discs is equivalent to the operad of cacti. Moreover, we gave a description of cacti in terms of a bi–crossed product of spineless cacti and an operad built on the monoid $S^1$ which we showed to be homotopy equivalent to the semi–direct product of these operads [@cact]. Furthermore, we gave a chain model for spineless cacti in terms of normalized spineless cacti which we showed to give a natural solution to Deligne’s conjecture [@del]. Using the description in terms of the bi–crossed and semi–direct products, we obtain a chain model for the operad of framed little discs, by tensoring the chains of normalized spineless cacti with the chains for the operad built on the monoid $S^1$. In order to prove the necessary relations on the chain level one can translate the respective relations from the relations in the $\Arc$ operad using the method described in [@cact; @KLP]. As it turns out, in order to translate the relations and thus to establish the homotopy BV structure on the chain level, one needs a refinement of the cell decomposition on the semi-direct product to be able to accommodate all the operations which were used in the $\Arc$ operad picture. This refinement uses cell decompositions on the $S^1$ factors which are induced by regarding them as the lobe they represent. This leads to a combinatorial description in terms of planar planted black and white (b/w) bipartite trees with additional data called spines. In the language of cacti [@cact], the additional data keeps track of the position of the local zeros. On these trees, there are linear orders at each vertex, which may differ from the induced linear order of the planar planted trees. This forces us to look at non–rooted trees or equivalently to invert the orientation of edges. According to the general calculus for “correlation functions” defined by trees, to achieve such an inversion one needs to have a non–degenerate pairing, which is symmetric and invariant. This is the assumption we have to make on our algebra. With this assumption, we can rewrite the action of the cellular chains as “operadic correlation functions” for decorated trees. In this description the operation of the chains of the framed little discs operad becomes apparent.
The results and techniques we present below can also be employed in other situations, which we comment on at the end of the paper. Notably one can use it to obtain an action of cells of a ribbon graph cell decomposition of moduli space on cyclic complexes. This should ultimately lead to string topology like operations of the cells of moduli space of decorated bordered surfaces on the free loop space of a compact manifold extending the operations of the string PROP or dioperad. The basic constructions for this are announced below.
Acknowledgments {#acknowledgments .unnumbered}
===============
We would like to thank Alain Connes for an enlightening discussion and Jim Stasheff for his valuable comments. We also thank the Max–Planck–Institute for Mathematics in Bonn for providing the atmosphere and stimulus to conceptualize and complete this paper.
Background
==========
Graphs {#Graphs}
------
In this section, we formally introduce the graphs and the operations on graphs which we will use in our analysis of cacti. This is the approach as given in Appendix B of [@cact] in which cacti are characterized as a certain type of ribbon graph. Namely, a cactus is a marked treelike ribbon graph with a metric.
### Graphs {#graphs}
A graph $\Gamma$ is a tuple $(V_{\Gamma},F_{\Gamma}, \imath_{\Gamma}: F_{\Gamma}\rightarrow
F_{\Gamma},\del_{\Gamma}:F_{\Gamma} \rightarrow V_{\Gamma})$ where $\imath_{\Gamma}$ is an involution $\imath_{\Gamma}^2=id$ without fixed points. We call $V_{\Gamma}$ the vertices of $\Gamma$ and $F_{\Gamma}$ the flags of $\Gamma$. The edges $E_{\Gamma}$ of $\Gamma$ are the orbits of the flags under the involution $\imath_{\Gamma}$. A directed edge is an edge together with an order of the two flags which define it. In case there is no risk of confusion, we will drop the subscripts $\Gamma$. Notice that $f\mapsto (f,\imath(f))$ gives a bijection between flags and directed edges.
We also call $F_v(\Gamma):=\del^{-1}(v)\subset F_{\Gamma}$ the set of flags of the vertex $v$ and call $|F_v({\Gamma})|$ the valence of $v$ and denote it by $\val(v)$. We also let $E(v)=\{\{f,\imath(f)\}|f\in F_{v}\}$ and call these edges the edges incident to $v$.
The geometric realization of a graph is given by considering each flag as a half-edge and gluing the half-edges together using the involution $\imath$. This yields a one-dimensional CW complex whose realization we call the realization of the graph.
### Trees
A graph is connected if its realization is. A graph is a tree if it is connected and its realization is contractible.
A rooted tree is a pair $(\t,v_0)$ where $\t$ is a tree and $v_0\in V_{\t}$ is a distinguished vertex. In a rooted tree there is a natural orientation for edges, in which the edge points toward the root. That is we say $(f,\imath (f))$ is naturally oriented if $\del(\imath(f))$ is on the unique shortest path from $\del(f)$ to the root. This means that the set $E(v)$ splits up into incoming and outgoing edges. Given a vertex $v$, we let $|v|$ be the number of incoming edges and call it the arity of $v$. A vertex $v$ is called a leaf if $|v|=0$. Notice that the root is the only vertex for which $|v_0|=\val(v_0)$. For all other vertices $v\neq v_0$ one has $|v|=\val(v)-1$.
A bi-colored or black and white (b/w) tree is a tree $\t$ together with a map $\color:V\rightarrow \mathbb{Z}/2\mathbb{Z}$. Such a tree is called bipartite if for all $f\in
F_{\t}:\color(\del(f))+\color(\del(\imath(f)))=1$, that is edges are only between black and white vertices. We call the set $V_w:=\color^{-1}(1)$ the white vertices. If $(f,\imath (f))$ is a naturally oriented edge, we call the edge white if $\del(\imath(f))\in V_w$ and denote the set of white edges by $E_w$. Likewise we call $V_b:=\color^{-1}(0)$ the black vertices and let $E_b$ be the set of black edges, where a naturally oriented edge $(f,\imath (f))$ is called black if $\del(\imath(f))\in V_b$.
The black leaves in a rooted black and white tree are called tails. The edges incident to the tails are called tail edges and are denoted $E_{tail}$. For tails, we will only consider those flags of the tail edges which are not incident to the tail vertices and call them $F_{tail}$.
### Planar trees and Ribbon graphs
A ribbon graph is a connected graph whose vertices are of valence at least two together with a cyclic order of the set of flags of the vertex $v$ for every vertex $v$.
A graph with a cyclic order of the flags at each vertex gives rise to bijections $N_v:F_v\rightarrow F_v$ where $N_v(f)$ is the next flag in the cyclic order. Since $F=\amalg F_v$ one obtains a map $N:F\rightarrow F$. The orbits of the map $N \circ \imath$ are called the cycles or the boundaries of the graph. These sets have the induced cyclic order.
Notice that each boundary can be seen as a cyclic sequence of directed edges. The directions are as follows. Start with any flag $f$ in the orbit. In the geometric realization go along this half-edge starting from the vertex $\del(f)$, continue along the second half-edge $\imath(f)$ until you reach the vertex $\del(\imath(f))$ then continue starting along the flag $N(\imath(f))$ and repeat.
A tree with a cyclic order of the flags at each vertex is called planar. A planar tree has only one cycle $c_0$.
Planar planted trees
--------------------
A planted planar tree is a rooted planar tree $(\t,v_0)$ together with a linear order of the set of flags at $v_0$. Such a tree has a linear order of all flags as follows: Let $f$ be the smallest element of $\del^{-1}(v_0)$, then every flag appears in $c_0$ and defining the flag $f$ to be the smallest gives a linear order on the set of all flags. This linear order induces a linear order on all oriented edges and on all un-oriented edges, by restricting to the edges in the orientation opposite the natural orientation i.e. pointing away from the root. We denote the latter by $\prec$ and its restriction to $E(v)$ or $F(v)$ by $\prec_v$.
We will equivalently consider planar planted trees as defined above or as a rooted planar trees whose root vertex has valence one. The bijection in one direction is given by adding a new root vertex and one new edge such that the induced linear structure on the old root is the given one. This tree is called the realization of the planar planted tree. In the other direction the bijection is simply given by contracting the unique edge incident to the root, but retaining the linear order. In the realization of a planar planted tree, we call the unique edge incident to the (new) root $v_{root}$ the root edge and denote it by $e_{root}$ and set $f_{root}$ to be the flag of the root edge which is not incident to the root. Also $E_{root}=\{e_{root}\}, F_{root}=\{f_{root}\}$.
An angle at a vertex $v$ in a planar tree is a pair of two flags incident to $v$ of which one is the immediate successor of the other in the cyclic order of $F_v$. There is a bijection between angles, flags and edges by associating to an angle its bigger flag and to the latter the unique edge defined by it.
The genus of a ribbon graph and its surface
-------------------------------------------
The genus $g(\Gamma)$ of a ribbon graph $\Gamma$ is given by $2g(\Gamma)+2=|V_\Gamma|-|E_{\Gamma}|+\#cycles$.
The surface $\Sigma(\Gamma)$ of a ribbon graph $\Gamma$ is the surface obtained from the realization of $\Gamma$ by thickening the edges to ribbons. I.e. replace each 0-simplex $v$ by a closed oriented disc $D(v)$ and each 1-simplex $e$ by $e\times I$ oriented in the standard fashion. Now glue the boundaries of $e\times I$ to the appropriate discs in their cyclic order according to the orientations. Notice that the genus of $\Sigma(\Gamma)$ is $g(\Gamma)$ and that $\Gamma$ is naturally embedded as the spine of this surface.
### Treelike and marked ribbon graphs
A ribbon graph together with a distinguished cycle $c_0$ is called [*treelike*]{} if
- the graph is of genus $0$ and
- for all cycles $c_i\neq c_0$: if $f\in c_i$ then $\imath(f)\in c_0$.
In other words each edge is traversed by the cycle $c_0$. Therefore there is a cyclic order on all (non-directed) edges, namely the cyclic order of $c_0$.
A [*marked ribbon graph*]{} is a ribbon graph together with a map $\mk:\{cycles\} \rightarrow
F_{\Gamma}$ satisfying the conditions
- For every cycle $c$ the directed edge $\mk(c)$ belongs to the cycle.
- All vertices of valence two are in the image of $\mk$, that is $\forall v,\val(v)=2$ implies $v\in Im(\del\circ\mk)$.
Notice that on a marked treelike ribbon graph there is a linear order on each of the cycles $c_i$. This order is defined by upgrading the cyclic order to the linear order $\prec_i$ in which $\mk(c_i)$ is the smallest element.
### Dual b/w tree of a marked ribbon graph
Given a marked treelike ribbon graph $\G$, we define its dual tree to be the colored graph whose black vertices are given by $V_{\G}$ and whose set of white vertices is the set of cycles $c_i$ of $\G$. The set of flags at $c_i$ are the flags $f$ with $f\in c_i$ and the set of flags at $v$ are the flags $\{f:f \in c_0,
\del(f)=v\}$. The involution is given by $\imath_{\t}(f)=N(f)$ if $f\in c_0$ and $\imath_{\t}(f)=N^{-1}(f)$ else.
This graph is a tree and is b/w and bipartite by construction. It is also planar, since the $c_i$ and the sets $F(v)$ have a cyclic order and therefore also $F_v\cap c_0$. It is furthermore rooted by declaring $\del(\mk(c_0))$ to be the root vertex and declaring $\mk(c_0)$ to be the smallest element makes it into a planted tree.
An equivalent definition is given by defining that there is an edge between a pair of a black and a white vertex if and only if the vertex corresponding to $b$ is on the boundary of the cycle $c_i$, i.e. $v\in \del(c_i):= \{\del(f):f\in c_i\}$.
### Spineless marked ribbon graphs {#spinlessgraph}
A marked treelike ribbon graph is called [*spineless*]{}, if
- There is at most one vertex of valence $2$. If there is such a vertex $v_0$ then $\del(mk(c_0))=v_{0}$.
- The induced linear orders on the $c_i$ are compatible with that of $c_0$, i.e. $f\prec_i f'$ if and only if $\imath(f')\prec_0 \imath(f)$.
### Graphs with a metric
A metric $w_{\Gamma}$ for a graph is a map $E_{\Gamma}\rightarrow
\mathbb{R}_{>0}$. The (global) re-scaling of a metric $w$ by $\lambda$ is the metric $ \lambda w: \lambda w(e)=\lambda w(e)$. The length of a cycle $c$ is the sum of the lengths of its edges $length(c)=\sum_{f\in c} w(\{f,\imath(f)\})$. A metric for a treelike ribbon graph is called normalized if the length of each non-distinguished cycle is $1$.
### Marked ribbon graphs with metric and maps of circles.
For a marked ribbon graph with a metric, let $c_i$ be its cycles, let $|c_i|$ be their image in the realization and let $r_i$ be the length of $c_i$. Then there are natural maps $\phi_i:S^1\rightarrow |c_i|$ which map $S^1$ onto the cycle by starting at the vertex $v_i:=\del(\mk(c_i))$ and going around the cycle mapping each point $\theta\in S^1$ to the point at distance $\frac{\theta}{2\pi}r_i$ from $v_i$ along the cycle $c_i$.
### Contracting edges
The contraction $(\bar V_{\Gamma}, \bar F_{\Gamma},\bar
\imath,\bar \del)$ of a graph $(V_{\Gamma},F_{\Gamma},\imath,\del)$ with respect to an edge $e=\{f,\imath(f)\}$ is defined as follows. Let $\sim$ be the equivalence relation induced by $\del(f)\sim\del(\imath(f))$. Then let $\bar V_{\Gamma}:=V_{\Gamma}/\sim$, $\bar
F_{\Gamma}=F_{\Gamma}\setminus\{f,\imath(f)\}$ and $\bar \imath:
\bar F_{\Gamma}\rightarrow \bar F_{\Gamma}, \bar\del: \bar
F_{\Gamma}\rightarrow \bar V_{\Gamma}$ be the induced maps.
For a marked ribbon graph, we define the marking of $(\bar
V_{\Gamma}, \bar F_{\Gamma},\bar \imath,\bar \del)$ to be $\overline{\mk}(\bar c)=\overline{\mk(c)}$ if $\mk(c)\notin\{f,\imath(f)\}$ and $\overline{\mk}(\bar
c)=\overline{N\circ \imath(\mk (c))}$ if $\mk(c)\in\{f,\imath(f)\}$, viz. the image of the next flag in the cycle.
### Labelling graphs
By a labelling of the edges of a graph $\Gamma$ by a set $S$, we simply mean a map $E_{\Gamma}\rightarrow S$. A labelling of a ribbon graph $\Gamma$ by a set $S$ is a map $\lab\{$cycles of $\Gamma\}\rightarrow S$, we will write $c_i:=\lab^{-1}(i)$. By a labelling of a black and white tree by a set $S$ we mean a map $\lab:E_w\rightarrow S$. Again we will write $v_i:=\lab^{-1}(i)$.
### Planar planted bipartite labelled trees with white leaves
We set $\wlbptree(n)$ to be the set of planar planted bipartite trees which are labelled from $\{1,\dots,n\}$ with white leaves only. To avoid cluttered notation, we also denote the respective free Abelian group and the $k$-vector space with basis $\wlbptree(n)$ by the same name and let $\wlbptree$ be their union respectively direct sum.
Cacti
-----
A cactus with $n$ lobes is a $\{0,1, \dots ,n\}$ labelled marked treelike ribbon graph with a metric. I.e. The set $\Cacti(n)$ is the set of these graphs. $\Cact(n)\subset \Cacti(n)$ is the subset of spineless graphs and called the spineless cacti or alternatively cacti without spines. $\Cacti^1(n)\subset \Cacti(n)$ is the subset of normalized graphs, called normalized cacti, and finally $\Cact^1(n)=\Cact(n)\cap\Cacti^1(n)$ is the set of normalized spineless cacti.
### Cactus terminology
The edges of a cactus are traditionally called arcs or segments and the cycles of a cactus are traditionally called lobes. The vertices are sometimes called the marked or special points. Furthermore the distinguished cycle $c_0$ is called the outside circle or the perimeter and the vertex $\del(\mk(c_0))$ is called the global zero. And the vertices $\del(\mk(c_i)),i\neq 0$ are called the local zeros. In pictures these are represented by lines rather than fat dots.
\[setrem\] It is clear that as sets $\Cacti(n)=\Cact(n)\times
(S^1)^{\times n}$ and $\cact(n)= \cact^1(n)\times
\mathbb{R}_{>0}^{\times n}$.
For the first statement one notices for each lobe $v_i$ there is a unique lowest intersection point $b$ which is the vertex of the outgoing edge of $v$. Thus there is a canonical map $\phi'_i:S^1\rightarrow |c_i|$ which starts at $b$ and goes around the cycle opposite its natural orientation. So to each cycle we associate $(\phi'_i)^{-1}(\del(\mk(c_i)))$ that is the co-ordinate of the spine as measured by $\phi'_i$. This gives the projection onto the factors $(S^1)^{\times n}$. The projection onto the first factor is given by forgetting the spines, i.e. contracting the edges $\mk(c_i)$ if $\val(\del(\mk(c_i)))=2$ and changing the marking to the unique marking which makes the graph spineless.
For the second statement the first projection is given by homogeneously scaling the weights of the edges of each non-marked cycle so that their lengths are one. The projection to the factors of $\mathbb{R}_{>0}$ are given by associating to each lobe its length. In both cases the inverse map is clear.
The topological type of a spineless cactus in $\cact^1(n)$ is defined to be its dual b/w tree $\t \in \wlbptree(n)$.
\[arctoedge\] Notice that the arcs of a cactus correspond to the set $E_{arcs}=E(\t)\setminus (\{e_{root}\})$. This bijection can be defined as follows. To a given $e\in E_{arcs}, e=\{w,b\}$ with $b$ black and $w$ white, we associate the unique arc between the points corresponding to the black vertices $b$ and $b-$ where $b-$ is the black vertex immediately preceding $b$ in the cyclic order of $v$. In other words if $e=\{f,\imath(f)\}$ with $f\in F_v$. Let $f-$ be the flag immediately preceding $f$ in the cyclic order at $v$, then $b-=\del(\imath(f-))$. Notice that if $|v|=0$ then and only then $f-=f$.
\[typelemma\] A spineless cactus is uniquely determined by its topological type and the lengths of the segments.
The CW complex of normalized spineless cacti
--------------------------------------------
We recall from [@del] the CW complexes $\CWcact(n)$. For more details and pictures the reader is referred to [@del; @cact].
\[lengthrem\] For a normalized spineless cactus the lengths of the arcs have to sum up to the radius of the lobe and the number of arcs on a given lobe represented by a white vertex $v$ is $\val(v)=|v|+1$. Hence the lengths of the arcs lying on the lobe represented by a vertex $v$ are in 1-1 correspondence with points of the simplex $|\Delta^{|v|}|$. The coordinates of $|\Delta^{|v|}|$ naturally correspond to the arcs of the lobe represented by $v$ on one hand and on the other hand in the dual b/w graph to the edges incident to $v$.
### The tree differential in the spineless case {#diffdef}
Let $\t\in \wlbptree$. We set $E_{angle}=E(\t)\setminus
(E_{leaf}(\t)\cup \{e_{root}\})$ and we denote by $\num_E:E_{angle} \rightarrow \{1,\dots,N\}$ the bijection which is induced by the linear order $\prec^{(\t,p)}$.
Let $\t\in \wlbptree$, $e\in E_{angle}$, $e=\{w,b\}$, with $w\in V_w$ and $b\in V_b$. Let $e-=\{w,b-\}$ be the edge preceding $e$ in the cyclic order $\prec^{\t}_w$ at $w$. Then $\del_e(\tau)$ is defined to be the planar tree obtained by collapsing the angle between the edge $e$ and its predecessor in the cyclic order of $w$ by identifying $b$ with $b-$ and $e$ with $e-$. Formally $w=\whitevert(e), e-=\prec^{\t}_w(e),\{b-\}= \del(e-)\cap
V_b(\t)$, $V_{\del_e(\tau)}=V(\t)/(b\sim b-)$, $E_{\del_e(\tau)}=E_{\tau}/(e\sim e-)$. The linear order of $\del_e(\t)$ is given by keeping the linear order at all vertices which are not equal to $\bar b$ where $\bar
b$ is the image of $b$ and $b-$. For $\bar b$ the order is given by extending the linear order $(\In(\bar b), \prec_{\bar
b}^{\del_e(\t)}) =(\In(b-)\amalg\In(b), \prec^{\t}_{b-}\amalg
\prec^{\t}_{b}) $ —the usual order on the union of totally ordered sets– to $E(\bar b)$ by declaring the image of $e$ and $e-$ to be the minimal element.
We define the operator $\del$ on the space $\wlbptree$ to be given by the following formula: $\del(\t) := \sum_{e\in E_{angle}}
(-1)^{\num_E(e)-1} \del_e (\tau) $.
### The Cell Complex
We define $\wlbptree(n)^k$ to be the elements of $\wlbptree(n)$ with $|E_w|=k$.
For $\t \in \wlbptree$ we define $\D(\t):=\times_{v \in V_w(\tau)}\D^{|v|}$. We define $C(\t)=|\D(\t)|$. Notice that $\dim(C(\t))=|E_w(\t)|$.
Given $\D(\t)$ and a vertex $x$ of any of the constituting simplices of $\D(\t)$ we define the $x$-th face of $C(\t)$ to be the subset of $|\D(\t)|$ whose points have the $x$-th coordinate equal to zero.
We let $\CWcact(n)$ be the CW complex whose k-cells are indexed by $\t \in \wlbptree(n)^k$ with the cell $C(\t)=|\D(\t)|$ and the attaching maps $e_{\t}$ defined as follows. We identify the $x$-th face of $C(\t)$ with $C(\t')$ where $\t'=\del_x(\t)$. This corresponds to contracting an edge of the cactus if its weight goes to zero (see Remark \[arctoedge\]) so that $\Delta(\del \t)$ is identified with $\del (\Delta(\t))$.
We define the topology of $\cact^1(n)$ to be that induced by the bijection with $\CWcact(n)$. Via Remark \[setrem\] this gives a topology to the spaces $\Cact(n),\cacti(n)$ and $\cacti^1(n)$.
The (quasi)-operad structure
----------------------------
### The operad of cacti
The gluing maps for cacti $$\circ_i:\cacti(n)\otimes \cacti(m)\rightarrow \cacti(n+m-1)$$ are defined on elements $(c,c')\mapsto c\circ_i c'$ as follows
- Scaling the weight function $w'$ of $c'$ by the length $\frac{r_i}{R}$ where $r_i$ is the length of the cycle $c_i$ of the cactus $c$ and $R$ is the length of the cycle $c_0$ of $c'$.
- Identifying the realization of the cycle $c_0$ of $c'$ with the cycle $c_i$ of $c$ via the maps $\phi_0(c')$ and $\phi_i(c)$, with the orientation on the second $S^1$ reversed, as usual.
These maps together with the $\Sn$ action permuting the labels turn the collection $\{\cacti(n)\}$ into an operad $\cacti$. The collection $\{\cact(n)\}$ forms the suboperad $\cact$.
### The quasi-operad of normalized cacti
We recall from [@cact] that a quasi-operad is the generalization of a (pseudo)-operad in which the axiom of associativity is omitted and the others are kept.
The gluing maps for normalized cacti $$\circ_i:\cacti^1(n)\otimes \cacti^1(m)\rightarrow \cacti^1(n+m-1)$$ are defined on elements $(c,c') \mapsto c\circ_i c'$ simply by identifying the realization of the cycle $c_0$ of $c'$ with the cycle $c_i$ of $c$ via the maps $\phi_0(c')$ and $\phi_i(c)$ again with the orientation on the second $S^1$ reversed.
These maps together with the $\Sn$ action permuting the labels turn the collection $\{\cacti^1(n)\}$ into a homotopy associative quasi-operad $\cacti^1$. The collection $\{\cact^1(n)\}$ forms a homotopy associative quasi-suboperad $\cact^1$ of $\cacti^1$ [@cact].
Relations among cacti
---------------------
\[cactthm\] [@cact] Normalized cacti are homotopy equivalent through quasi-operads to the cacti. The same holds for the (quasi)-suboperads of normalized spineless cacti and spineless cacti.
[@cact] Normalized cacti are quasi-isomorphic as quasi-operads to cacti and normalized spineless cacti are quasi-isomorphic as quasi-operads to spineless cacti. In particular in both cases the homology quasi-operads are operads and are isomorphic as operads.
### Remarks on the bi-crossed product
In this section we recall the construction of the bi-crossed product as it was given in [@cact] to which we refer the reader for more details.
First notice that there is an action of $S^1$ on $\Cact(n)$ given by rotating the base point [*clockwise*]{} (i.e. in the orientation opposite the usual one of $c_0$) around the perimeter. We denote this action by $$\rho^{S^1}: S^1 \times \Cact(n) \rightarrow \Cact(n)$$ With this action we can define the twisted gluing $$\begin{aligned}
\label{circtheta}
\circ_i^{S^1}:\Cact(n) \times S^1(n) \times \Cact(m) &\rightarrow& \Cact(n+m-1)\nn\\
(C,\theta,C')&\mapsto& C \circ \rho^{S^1}(\theta_i,C') =: C
\circ_i^{\theta_i}C'\end{aligned}$$
Given a cactus without spines $C\in \Cact(n)$ the orientation reversed perimeter (i.e. going around the outer circle [*clockwise*]{} i.e. reversing the orientation of the source of $\phi_0$) gives a map $\Delta_C: S^1 \rightarrow (S^1)^n$.
As one goes around the perimeter the map goes around each circle once and thus the map $\Delta_C$ is homotopic to the diagonal $ \Delta_C (S^1) \sim \Delta(S^1)$.
We can use the map $\Delta_C$ to give an action of $S^1$ and $(S^1)^{\times n}$. $$\rho^C: S^1 \times(S^1)^{\times n}\stackrel{\Delta_C}
{\rightarrow} (S^1)^{\times n} \times (S^1)^{\times n}
\stackrel{\mu^n}{\rightarrow}(S^1)^{\times n}$$ here $\mu_n$ is the diagonal multiplication in $(S^1)^{\times n}$ and $\bar \circ_i$ is the operation which forgets the $i$-th factor and shuffles the last $m$ factors to the $i$-th, …, $i+m-1$st places. Set $$\begin{gathered}
\label{perturbdef} \circ_i^C:(S^1)^{\times n} \times (S^1)^{\times
m} \stackrel{(id \times \pi_i)(\Delta) \times id}
{\longrightarrow} (S^1)^{\times n} \times
S^1\times (S^1)^{\times m}\\
\stackrel{id \times \rho^C}{\longrightarrow} (S^1)^{\times n}
\times (S^1)^{\times m}
\stackrel{\bar\circ_i}{\longrightarrow}(S^1)^{\times n+m-1}\end{gathered}$$ These maps are to be understood as perturbations of the usual maps $$\begin{gathered}
\circ_i:(S^1)^{\times n} \times (S^1)^{\times
m} \stackrel{(id \times \pi_i)(\Delta) \times id}
{\longrightarrow} (S^1)^{\times n} \times
S^1\times (S^1)^{\times m}\\
\stackrel{id \times \rho}{\longrightarrow} (S^1)^{\times n} \times
(S^1)^{\times m}
\stackrel{\bar\circ_i}{\longrightarrow}(S^1)^{\times n+m-1}\end{gathered}$$ where now $\rho$ is the diagonal action of $S^1$ on $(S^1)^{\times
n}$. The maps $\circ_i$ and the permutation action on the factors give the collection $\{\mathcal{S}^1(n)\}=(S^1)^{\times n}$ the structure of an operad. In fact this is exactly the usual construction of an operad built on a monoid.
\[cactbicross\] [@cact] The operad of cacti is the bi–crossed product of the operad $\cact$ of spineless cacti with the operad $\mathcal {S}^1$ based on $S^1$. Furthermore this bi–crossed product is homotopic to the semi–direct product of the operad of cacti without spines with the circle group $S^1$. $$\cacti \cong \cact \bowtie {\mathcal S}^1 \simeq \cact \rtimes
{\mathcal S}^1$$ The multiplication in the bi-crossed product is given by $$(C,\theta) \circ_i (C',\theta') = (C\circ_i^{\theta_i} C',
\theta\circ_{i}^{C'}\theta')$$ The multiplication in the semi-direct product is given by $$(C,\theta) \circ_i (C',\theta') = (C\circ_i^{\theta_i} C',
\theta\circ_{i}\theta')$$ Also, normalized cacti are homotopy equivalent to cacti which are homotopy equivalent to the bi-crossed product of normalized cacti with $\mathcal{S}^1$ and the semi-direct product with $\mathcal{S}^1$, where all equivalences are as quasi-operads $$\cacti^1 \sim \cacti \cong \cact \bowtie {\mathcal S}^1
\sim\cact^1 \bowtie {\mathcal S}^1\sim \cact^1 \rtimes {\mathcal
S}^1$$
The proof of the first statement is given by verifying that the two operad structures coincide. For the second statement one notices that the homotopy diagonal is homotopy equivalent to the usual one and that one can find homotopies to the diagonal which continuously depend on the cactus. The third statement follows from contracting the factors $\mathbb{R}^n_{>0}$ and using Theorem \[cactthm\].
The homology operad of $\cacti$ is the semi-direct product of $\cacti$ and the homology of the operad $\mathcal{S}^1$ built on the monoid $S^1$.
Relation to (framed) little discs
---------------------------------
[@cact] The operad $\cact$ is equivalent to the little discs operad and the operad $\cacti$ is equivalent to the framed little discs operad.
The latter result has been first stated by Voronov in [@Vor].
A CW decomposition for $\cacti^1$ and a chain model for the framed little discs
===============================================================================
A $\Zz$ decoration for a black and white bipartite tree is a map $\Zdec: V_w \rightarrow \Zz$.
\[firstcells\] The quasi–operad of normalized cacti $\cacti^1$ has a CW–decomposition which is given by cells indexed by planar planted bi–partite trees with a $\Zz$ decoration. The $k$ cells are indexed by trees with $k-i$ white edges and $i$ vertices marked by $1$.
Moreover cellular chains are a chain model for the framed little discs operad and form an operad. This operad is isomorphic to the semi–direct product of the chain model of the little discs operad given by $CC_*(\cact)$ of [@del] and the cellular chains of the operad built on the monoid $S^1$.
For the CW decomposition we note that as spaces $\cacti^1(n)=
\cact^1(n) \times (S^1)^{\times n}$ see Remark \[setrem\]. Now viewing $S^1=[0,1]/0\sim1$ as a 1-cell together with the 0-cell given by $0\in S^1$ the first part of the proposition follows immediately, by viewing the decoration by 1 as indicating the presence of the 1-cell of $S^1$ for that labelled component in the product of cells.
To show that the cellular chains indeed form an operad, we use the fact that the bi–crossed product is homotopy equivalent to the semi–direct product in such a way, that the action of a cell $S^1$ in the bi–crossed product is homotopic to the diagonal action. This is just the observation that the diagonal and the diagonal defined by a cactus are homotopic. Since a semi-direct product of a monoid with an operad is an operad the statement follows. Alternatively one could just remark, that there is also an obvious functorial map induced by the diagonal for these cells.
The chains are a chain model for the framed little discs operad since $\cacti^1(n)$ and $\cacti(n)$ are homotopy equivalent and the latter is equivalent to the framed little discs operad.
Although the above chain model is the one one would expect to use for framed little discs, it does not have enough cells for our purposes. In order to translate the proofs in the arc complex given in [@KLP] into statements about the Hochschild complex, we will need a slightly finer cell structure then the one above. After having used the larger structure one can reduce to the cell model with less cells as they are obviously equivalent.
A spine decoration $\sdec$ for a planted planar bi–partite tree is a $\Zz$ decoration together with the marking of one angle at each vertex labelled by one and a flag at each vertex labelled by zero. We call the set of such trees which are $n$-labelled by $\swlbptree(n)$ and again use this notation as well for the free Abelian group and the $k$ vector space generated by these sets. We let $\swlbptree$ be their union respectively direct sum. In pictures we show the angle marking as a line emanating from the vertex which lies between the marked edges and an edge marking by a line through the respective edge. For an example see Figure \[cactexamples\] VI. We sometimes omit the edge marking if the marked edge is the outgoing edge, e.g. in Figure \[bvtopartcact\].
A realization $\hat \t$ of a planar planted bi–partite tree $\t$ with a spine decoration is a realization of $\t$ as a planar planted tree (the root is fixed to be black) together with one additional edge inserted into each marked angle connecting to a new vertex. We call the set of these edges spine edges and denote them by $E_{spine}$. Likewise set $V_{spine}$ to be the set of new vertices called the spine vertices which are defined to be black. The spine edges are then white edges. Like for tails, we will only consider the flags of $E_{spine}$, which are not incident to the spine vertices. We call the set of these flags $F_{spine}$. Notice that this tree is the dual tree of a cactus with an explicit marking of the flags $\mk(c_i)$. Given a cactus, we call its dual tree with explicit markings its topological type. If $\t$ had tails, we will split the set of tails of the realization into spines and free tails which are the images of the original tails. $E_{tails}(\hat\t)=E_{ftails}(\hat \t)\amalg
E_{spine}(\hat \t)$ and likewise for the respective flags.
A spine decoration induces a new linear order on the flags incident to the white vertices of its realization. This order $\prec'_v$ is given by the cyclic order at $v$ and declaring the smallest element to be the spine flag in case $\Zdec(v)=1$ and the marked flag in case $\Zdec(v)=0$. This gives a canonical identification of $\Fnum:F_v \rightarrow \{0,\dots, |v|\}$.
\[secondcells\] The spaces $\cacti^1(n)$ of the quasi–operad of normalized cacti $\cacti^1$ have CW–decompositions $\CWtwo(n)$ whose cells are indexed by spine decorated planar planted bi–partite trees $(\t,\sdec)\in \swlbptree$ corresponding to the topological type of the cacti. The $k$ cells are indexed by $n$-labelled trees with $k-i$ white edges and $i$ markings by $1$.
Moreover cellular chains of the complex above are a chain model for the framed little discs operad and form an operad.
The decomposition is almost as in the preceding proposition except that in the product $\cact^1(n)\times (S^1)^{\times n}$ we decompose each factor $S^1$ as indicated by the lobe it presents. I.e. for the $S^1$ associated to the $n$–th lobe we chose the 0–cells to be corresponding to the marked points and 1–cells corresponding to the arcs with gluing given by attaching the 1–cells to the 0–cells representing the endpoints of the arcs. (E.g. 4 0-cells and 4 1-cells for the lobe 1 in Figure \[cactexamples\] VIa). In terms of trees, the arcs correspond to the angles and thus we take a marking of an arc to be the inclusion of the corresponding 1-cell in the tensor product of the cell complexes. Likewise the edges correspond to the marked points and we take a marking of an edge to be the inclusion of the corresponding 0-cell in the tensor product of the cell complexes.
For the operadic properties, we remark that moving the spine along an arc and then gluing, which is what is parameterized by marking an angle on the lobe $i$ of $c$ when calculating $c\circ_ic'$, has the effect of moving the base point of $c'$ along a complete sequence of arcs until it coincides with a marked point in the composition of the two cacti. This is one side of the bi-crossed product. The effect on the local zeros of $c'$ of the movement of the base point is to move them corresponding to structure maps of the bi-crossed product above. The local zeros thus move through a full arc if the global zero passes through the arc on which they lie. Therefore the $\circ_i$ product of two cells results in sums of cells. Marking an arc of $c'$ obviously gives rise to a sum of cells. Alternatively, one can again just remark that there is a functorial map for the diagonal for this cell model, since there is such a map on the first factor by [@del] and its existence is obvious on the second factor.
The associativity follows from the associativity of cacti. Let $C(\t)$, $\t\in \swlbptree(n)$ be the cells in the CW-complex and $\dot C(\t)$ their interior. Then $P(\t)=\dot C(\t)\times
\mathbb{R}_{>0}^n, \t\in\swlbptree$ give a pseudo-cell decomposition $Cacti(n)=\amalg_{\t} P(\t)$. It is easy to see that $Im(P(\t)\circ_i
P(\t'))=\amalg_k P(\t_k)$ for some $\t_k$ and $\circ_i$ is a bijection onto its image. Let $\circ_i^{comb}$ be the quasi-operad structure pulled back from $\CWtwo$ to $\swlbptree$ and $\circ_i^{+}$ be the operad structure pulled back from the pseudo-cell decomposition of $\Cacti$ to $\swlbptree$. Then these two operad structures coincide over $\mathbb{Z}/2\mathbb{Z}$ thus yielding associativity up to signs. The signs are just given by shuffles, c.f.§\[signsection\], and are associative as well.
Pulling back the operadic compositions, the differential and the grading yields a dg-operad structure on $\swlbptree$ which is isomorphic to that of $\CCCacti:=\bigoplus_n CC_*(\CWtwo(n))$.
The operation is briefly as follows: given two trees $\t,\t'\in\swlbptree$ the product is $\t\circ^{comb}_i\t'=\sum \pm
\t_k$ where the $ \t_k$ are the trees obtained by the following procedure. Delete $v_i$ to obtain an ordered collection of trees $(\t^c_l,\prec'_v)$ then graft these trees to $\t'$ keeping their order by first identifying the spine edge or marked edge of $v_i$ with the root edge of $\t'$ and then grafting the rest of the branches to $\t'$ so that their original order is compatible with that of $\t'$. Lastly contract the image of the root edge of $\t'$ and declare the image of the root of $\t$ to be the new root. The sign is as explained in \[signsection\]. Due to the isomorphism between $\CCCacti$ and $\swlbptree$ we will drop the superscript $comb$.
=
The GBV structure
-----------------
The picture for the GBV structure is essentially that of [@KLP] and goes back to [@CS1]. It appears here is another guise, however, since we are now dealing with cells in $\CCCacti$.
First notice that there is a product on the chain level induced by the spineless cactus given by the rooted tree $\t_n$ depicted in Figure \[cactexamples\]. Explicitly: $a\cdot b\mapsto
\gamma(\t^b_2; a,b)$ where $\gamma$ is the usual operadic composition. This product gives $\CCCacti$ the structure of an associative algebra with unit. Moreover the product is commutative up to homotopy. The homotopy is given by the usual operation which is induced by $\gamma(\t_1;a,b)$. This also induces a bracket which is Gerstenhaber up to homotopy. This can be seen by translating the statements from [@KLP; @del], but it also follows from the BV description of the bracket below (Figure \[bvcactfig\]).
To give the BV structure, let $O'$ be the tree with one white vertex, no additional black edges, no free tails and a spine. Notice that the operation $\delta$ induced by $a\mapsto \gamma(
O',a)$ on $\CCCacti$ breaks up on products of chains as follows, see Figure \[bvtopartcact\] $$\begin{aligned}
\label{threedel}
\delta(ab) &\sim& \vardel(a,b) + (-1)^{|a||b|}\vardel(b,a)\nn\\
\delta(abc) &\sim& \vardel(a,b,c)+(-1)^{|a|(|b|+|c|)}\vardel(b,c,a)\nn\\
&&+(-1)^{|c|(|a|+|b|)}\vardel(c,a,b)\end{aligned}$$ $$\begin{aligned}
\delta(a_1 a_2\cdots a_n)&\sim& \sum_{i=0}^{n-1}
(-1)^{\s(c^i,a)} \delta(a_{c^i(1)}, \dots, a_{c^i(n)})\end{aligned}$$ where $c$ is the cyclic permutation and $\s(c^i,a)$ is the sign of the cyclic permutations of the graded elements $a_i$.
= 4in
\[partbv\] $$\vardel(a,b,c) \sim (-1)^{(|a|+1)|b|} b \vardel(a,c)
+\vardel(a,b)c -\vardel(a)bc$$
[**Proof.**]{} The proof is contained in Figure \[cactpartbvfig\].
= 4in
\[GBVprop\] The chains $\CCCacti$ are a GBV algebra up to homotopy.
The BV structure follows from the Lemma \[partbv\] via the calculation: $$\begin{aligned}
\delta(abc) &\sim& \vardel(a,b,c)+(-1)^{|a|(|b|+|c|)}\vardel(b,c,a)
+(-1)^{|c|(|a|+|b|)}\vardel(c,b,a)\nn\\
&\sim&(-1)^{(|a|+1)|b|} b \vardel(a,c) +\vardel(a,b)c
-\vardel(a)bc + (-1)^{|a|} a \vardel(b,c)\nn\end{aligned}$$ $$\begin{aligned}
&&+(-1)^{|a||b|}\vardel(b,a)c -(-1)^{|a|}a\vardel(b)c
+(-1)^{(|a|+|b|)|c|} a \vardel(b,c)\nn\\
&&+(-1)^{|b|(|a|+1|)+|a||c|}b\vardel(c,a)c - (-1)^{|a|+|b|} ab\vardel(c)\nn\\
&\sim&\delta(ab)c+(-1)^{|a|} a\delta(bc) + (-1)^{|a+1||b|} b\delta (ac)
-\delta(a)bc\nn\\
&&-(-1)^{|a|} a\delta(b)c-(-1)^{|a|+|b|}ab\vardel(c)\end{aligned}$$ Figure \[bvcactfig\] contains the homotopy relating the BV operator to the bracket.
The action
==========
Assumption
----------
Now we fix $A$ to be a finite dimensional associative algebra with unit $1$ together with an inner product $\eta: A\otimes A\rightarrow k$ which is non-degenerate and both i) invariant: $\eta(ab,c)=\eta(a,bc)$ and ii) symmetric: $\eta(a,b)=\eta(b,a)$. Such an algebra is called a Frobenius algebra.
We will use $CH$ to stand for Hochschild cochains $CH^n(A,A):=
Hom(A^{\otimes n},A)$.
Actually, it would be enough to have a non-degenerate inner-product $\eta$ on $A\simeq CH^0(A,A)$ for which i) holds on $HH^0(A,A)$, that is up to homotopy for $A$. The condition ii) will then hold automatically up to homotopy since $CH^0(A,A)$ is commutative up to homotopy [@G].
If one wishes to furthermore relax the other conditions “up to homotopy”, one can fix that $\eta$ needs to be non-degenerate only on $HH^0(A,A)$ and only require that $HH^0(A,A)$ has to be finite dimensional. In this case, the operadic operations defined below will give operations $f:A^{\otimes n}\rightarrow HH^0(A,A)$ and will thus give actions only up to homotopy. This is enough to get the BV structure on $CH^*(A,A)$, but not quite enough to lift the action to the chain level. We are currently working on such a construction in formal geometry and defer the reader to [@stringarc].
Notation
--------
Let $(e_i)$ be a basis for $A$ and let $C:=
e_i \eta^{ij} \otimes e_j$ be the Casimir element, i.e. $\eta^{ij}$ is the inverse to $\eta_{ij}=\eta(e_i,e_j)$.
With the help of the non–degenerate bilinear form, we identify $$\label{identify} CH^n(A,A)= Hom(A^{\otimes n},A) \cong A\otimes
A^{* \otimes n} \cong A^{* \otimes n+1}$$ We would like to stress the order of the tensor products we choose. This is the order from right to left, which works in such a way that one does not need to permute tensor factors in order to contract.
If $f \in Hom(A^{\otimes n},A)$, we denote by $\tilde f$ its image in $A^{* \otimes n+1}$, explicitly $\tilde f(a_0, \dots
,a_n)=\eta(a_0,f(a_1,\dots,a_n))$.
With the help of (\[identify\]) we can pull back the Connes’ operators $b$ and $B$ (see e.g. [@Loday]) on the spaces $A^{\otimes n}$ to their duals and to $Hom(A^{\otimes n},A)$.
Also let $t:A^{\otimes n}\rightarrow A^{\otimes n}$ be the operator given by performing a cyclic permutation $(a_1,\dots,a_n)
\mapsto (-1)^{n-1}(a_n,a_1,\dots a_{n-1})$ and $N:=1+t+ \cdots
+t^{n-1}:A^{\otimes n}\rightarrow A^{\otimes n}$.
It is easy to check that the operator induced by $b$ is exactly the Hochschild differential; we will denote this operator by $\del$. We write $\Delta$ for the operator induced by $B$. It follows that $\Delta^2=0$ and $\Delta\del+\del\Delta=0$.
Assumption {#assumption}
----------
To make the formulas simpler we will restrict to normalized Hochschild cochains $\overline {CH}^n(A,A)$ which are the $f\in
CH^n(A,A)$ which vanish when evaluated on any tensor containing $1\in A$ as a tensor factor (see e.g. [@Loday]). On the normalized chains the operator $\Delta$ is explicitly defined as follows: for $f\in \overline {CH}^n(A,A)$ $$\eta(a_0,(\Delta f)(a_1,\dots a_{n-1})):=\eta(1,f\circ N(a_0,\dots
a_n))$$
Correlators from decorated trees
--------------------------------
We will use the notation of tensor products indexed by arbitrary sets, see e.g. [@Deligne]. For a linearly ordered set $I$ denote by $\bigcup_I a_i$ the product of the $a_i$ in the order dictated by $I$.
Let $\t$ be the realization of a spine decorated planted planar b/w tree, $v \in V_w$, and $f\in \overline {CH}^{|v|}(A,A)$. We define $Y(v,f):A^{F_v(\t)}\rightarrow k$ by
$$Y(v, f) (\bigotimes_{i\in F_v(\t)} a_i):=\eta(a_{\Fnum^{-1}(0)},
f(a_{\Fnum^{-1}(1)}\otimes \dots \otimes a_{\Fnum^{-1}(|v|)}))$$
Set $V_{b-int}:=V_b(\t)\setminus (V_{tail}\cup \{v_{root}\} \cup
V_{spine})$. For $v\in V_{b-int}$ we define $Y(v):=
A^{F_v(\t)}\rightarrow k$ by $$Y(v)(\bigoplus_{i\in
F_v(\t)} a_i)=\eta(1, \bigcup_{i\in F_{v}} a_i)$$
\[treeactionone\] Let $\t$ be the realization of a planar planted b/w tree with $n$ free tails and $k$ labels and $f_i \in
\overline{CH}^{n_i}(A,A)$. For such a tree there is a canonical identification $\{v_{root}\} \cup V_{ftail} \rightarrow
\{0,1,\dots,|V_{ftail}|\}$ which is given by sending $v_{root}$ to $0$ and enumerating the tails in the linear order induced by the planted planar tree. Set $E_{int}(\t):= E(\t)\setminus
(E_{tail}\cup E_{root} \cup E_{spine})$ and for $(a_0,\dots,a_n)\in A^{\otimes (\{v_{root}\}\cup V_{ftail})}$ set $$\begin{gathered}
Y(\t)(f_1,\dots,f_k)(a_0,\dots,a_n) := \\
\left(\bigotimes_{v\in V_w(\t)} Y(v,f_{\lab(v)})\bigotimes_{v\in
V_{b-int}} Y_v\right)\left( (\bigotimes_{i\in F_{ftail}(\t)\cup
\{F_{root}\}}a_i)(\bigotimes_{j\in F_{spine}} 1) \otimes
C^{\otimes E_{int}(\t)}\right)\end{gathered}$$
In other words, decorate the root flag by $a_0$, the free tail flags by $a_1,\dots,a_n$, the spines by $1$ and the edges by $C$ and then contract tensors according to the decoration at the white vertices while using the product at the black vertices.
\[degreecount\] We extend the definition above by $$Y(\t)(f_1,\dots,f_k)(a_0,\dots,a_n)=0 \text{ if }
|v_{\lab^{-1}(i)}| \neq n_i=:|f_i|$$
The foliage operator
--------------------
Let $F$ be the foliage operator of [@del] applied to trees. This means that $F(\t)$ is the formal sum over all trees obtained from $\t$ by gluing an arbitrary number of free tails to the white vertices. The extra edges are called free tail edges $E_{ftail}$ and the extra vertices $V_{ftail}$ are defined to be black and are called free tail vertices.
Using the trees defined in Figure \[cactexamples\] this corresponds to the formal sum $F(\t):= \sum_n l_n \circ_v \t$ where the operadic composition is the one for b/w trees which are not necessarily bi-partite (see [@del]). In our current setup we should first form $\tilde F(\t):=\sum_n \t_n \circ_v \t$ and then delete the images of all leaf edges together with their white vertices of the $\t_n$ to obtain $F(\t)$.
Signs {#signsection}
-----
The best way to fix signs of course is to work with tensors indexed by edges like in [@del; @KS]. For this one fixes a free object $L$ (free $\mathbb{Z}$-module or $k$-vector space) generated by one element of degree $\pm 1$ and calculates signs using $L^{\otimes E_w(\t)}$ before applying the foliage operator while using $L^{\otimes E_{weight}}$ after applying the foliage operator, where $E_{weight}=E_w\cup
E_{root}\cup E_{ftail}\cup E_{spine}$.
Explicitly, we fix the signs to be given as follows. For any tree $\t'$ in the linear combination above, we take the sign of $\t'$ to be the sign of the permutation which permutes the set $E_{weight}$ in the order induced by $\prec$ to the order where at each vertex one first has the root if applicable, then all non–tail edges, then all the free tails, and if there is a spine edge, the spine.
The explicit signs above coincide with usual signs [@Loday] for the operations and the operators $b$ and $B$ and also coincide with the signs of [@G] for the $\circ_i$ and hence for the brace operations. The signs for the operations corresponding to operations on the Hochschild side are fixed by declaring the symbols “,” and “{” to have degree one.
\[treeaction\] For $\t\in \swlbptree$ let $\hat\t$ be its realization. We define the operation of $\t$ on $\overline {CH}(A,A)$ by $$\eta(a_0,{\t(f_1,\dots, f_n)}(a_1,\dots,
a_N)):=Y(F(\hat\t))(f_1,\dots, f_n)(a_0,\dots,a_N)$$ Notice that due to the Definition \[degreecount\] the right hand side is finite.
Examples {#example}
--------
We will first regard the tree $O'$ with one white vertex, no additional black edges, no free tails and a spine, see Figure \[cactexamples\]. For a function $f\in \overline {CH}^n$ we obtain: $$\begin{gathered}
Y(F(O'))(f)(a_0,\dots,a_{n-1})= \eta(1,f(a_0,\dots
a_{n-1})+(-1)^{n-1}f(a_{n-1}, a_0, \dots, a_{n-2}) +\dots)\\
=\eta(a_0,\Delta(f)(a_1,\dots,a_{n-1})) \end{gathered}$$
Let $\t'_{n,i}$ be the tree of Figure \[cactexamples\]. Then the operation corresponds to $$Y(F(\t'_{n,i}))(f;g_1,\dots,g_n)(a_0,\dots,a_{N})=\\
\eta(1,f\{' g_{i+1}, \dots, g_n, g_1, \dots, g_i\}(a_{(2)},
a_0,a_{(1)}))$$ where $N=|f|+\sum|g_i|-n-1$ and we used the short hand notation $$\begin{gathered}
f\{' g_{j+1}, \dots, g_n, g_1, \dots, g_j\}(a_{(2)}, a_0,a_{(1)}) =
\sum \pm
f(a_{k+1},\dots, a_{i_{j+1}-1},\\ g_{j+1}(a_{i_{j+1}}, \dots,
a_{i_{j+1}+|g_{j+1}|}), \dots, a_{i_n-1}, g_n(a_{i_n}, \dots,
a_{i_n+|g_n|}), \dots , a_N,
a_0, \\a_1, \dots, a_{i_1-1},g_1(a_{i_1}, \dots, a_{i_1+|g_1|}), \dots,
a_{i_j-1}, g_j(a_{i_j}, \dots, a_{i_j+|g_j|}), \dots , a_k)\end{gathered}$$ where the sum runs over $1 \leq i_1 \leq \dots \leq i_j
\leq \dots \leq k \leq \dots \leq i_{j+1} \leq \dots \leq i_{n} \leq N:$ $i_l + |g_l|\leq i_{l+1},i_j + |g_j|\leq k $ and the signs are as explained above.
\[mainthm\] The Hochschild cochains of a finite-dimensional associative algebra with a non–degenerate, symmetric, invariant, bilinear form are an algebra over the chains of the framed little discs operad. This operation is compatible with the differentials.
We will use the cellular chains $\CCCacti$ as a model for the chains of the framed little discs operad. It is clear that \[treeaction\] defines an action. On the Hochschild side, the $\circ_i$ operations are substitutions of the type $f_i=\psi(g_1,\dots,g_n)$. For $\CCCacti$ the $\t \circ_i \t'$ operations are the pull-back via the foliage operator of all possible substitutions of elements of $F(\t), \t \in \CCCacti$ into the position $i$ of $F(\t'$). The action $Y$ then projects onto the substitution $f_i=\psi(g_1,\dots,g_n)$ so that the action is operadic. Explicitly the substitution $t \circ^s_i t'$ for planted planar bi-partite trees with a decoration $\sdec$ and additional free tails is given as follows: Say the number of tails of $t'$ coincides with $|F(v_i)|$. In this case replace the vertex $v_i$ of $t$, its edges and the black vertices corresponding to the edges with the tree $t'$ matching the flags of $v_i$ with the tails of $t'$ by first matching the root edge with the marked flag of $v_i$ and then using the linear order. Lastly contract the image of the root flag. Otherwise set $t \circ^s_i t'=0$. With this definition it is easy to see that $F(\t \circ \t')=F(\t)
\circ^s_i F(\t')$.
The compatibility of the Hochschild differential with the differential of the cell complex follows from the relevant statements for $\t_n$ and $\t_n^b$, which are a straightforward but lengthy calculation (see e.g. [@del; @G]), together with the calculations above §\[example\] which are easily modified to show that $(\del O')(f)=\Delta(\del(f))$ and that $(\del\t'_{n,i})(f,g_1, \dots, g_n)= (\del\t'_{n,i})(f,g_1, \dots,
g_n) \pm (\t'_{n,i})(\del f,g_1, \dots, g_n) + \sum_i\pm
(\t'_{n,i})(f,g_1, \dots, \del(g_i), \dots, g_n)$ via an even more lengthy but still straightforward calculation. This then verifies the claim in view of the compatibility of the differentials and the respective operad structures.
Alternatively, in view of the operation of the foliage operator, the compatibilities follow from a straightforward translation of trees with tails into operations on the Hochschild complex. The compatibility of the differential then follows from the almost identical definition of the differential for trees with tails of [@del] and that in the Hochschild complex as $\del(f)=f\circ
\cup - (-1)^{|f||}\cup \circ f$.
The normalized Hochschild cochains of an algebra as above are a BV algebra up to homotopy.
This could of course have been checked directly without recourse to the operation of a chain model, but we do not know of any source for this result. It also seems to be difficult to guess the right homotopies as Gerstenhaber did in the non-cyclic case [@G]. The content of the next corollary was expected [@Connes], but we again could not find a source for it.
The Hochschild cohomology of an algebra as above is a BV algebra, such that the induced bracket is the Gerstenhaber bracket.
Lastly, since our second version of cellular chains of Proposition \[secondcells\] are a subdivision of the cell decomposition of Proposition \[firstcells\], we can also use the latter cell decomposition.
The normalized Hochschild cochains of an algebra as above are an algebra over the semi–direct product over a chain model of the little discs operad and a chain model for the operad $\mathcal{S}$ built on the monoid $S^1$.
The operation of the little discs operad by braces, viz. the original Deligne conjecture as discussed in [@del] for Frobenius algebras, corresponds to the decorations in which $\Zdec
\equiv 0$ and the decorated edge is always the outgoing edge.
In the Theorem \[mainthm\] we can relax the conditions and implications as explained in §\[assumption\].
Variations and relation to string topology
==========================================
In terms of the setup of operadic correlation functions which we presented above, it is possible to analyze several generalizations. First, one can generalize from trees to more general graphs. This description then yields an action of the pseudo-cells of moduli spaces of curves or bordered surfaces [@ribbon]. One can also consider different types of chains, such as Hochschild chains or cyclic (co)–chains. The latter also works well with omitting markings to the trees or regarding unmarked graphs [@ribbon].
In [@KLP] we gave a map called loop which maps the so–called $\Arc$ operad to ribbon graphs with marked points on the cycles of the graph. In the case of no punctures the analysis of this map in terms of Strebel differentials yields another proof of Penner’s theorem [@P] on the homotopy equivalence of the suboperad of quasi–filling arcs and the moduli space of decorated bordered surfaces [@ribbon]. This in turn gives a cell decomposition of the aforementioned moduli space. Moreover the correspondence induces an operadic structure on ribbon graphs by pulling back the gluings from the $\Arc$ operad. Using the operadic correlation functions it is straightforward to obtain an action of the cells on a cyclic complex. In a similar spirit, an action of the framed little discs on a cyclic complex given by the $Tot$ of a special type of cyclic cosimplicial complex has been announced in [@MS]. Constructing the action in terms of our correlation functions then should allow us to construct an operation of the cells of moduli space on such a complex. Moreover a further decoration of the cells by $\mathbb{Z}/2\mathbb{Z}$ produces an operad which acts on the cyclic complex of such an algebra and is compatible with the differential [@ribbon].
The $A_{\infty}$– versions of these statements could be deduced from a conjectural “blow–up” of the cacti operads which is presented in [@woods]. Here the cells are given by products of associahedra and cyclohedra and are indexed by trees of the type appearing in [@KS].
Finally using the cyclic description of the free loop space or the iterated integral representation of [@Merk] together with the results mentioned above, we expect to be able to obtain an action of the (decorated) pseudo-cells of moduli space action on the free loop space of a compact manifold which extends the operation of the string PROP [@CS1; @CS2] thus completing a further step of the string topology program [@stringarc].
[99]{}
A. Connes. Private communication. P. Deligne. [*Catégories tannakiennes.*]{} The Grothendieck Festschrift, Vol. II, 111–195, M. Chas and D. Sullivan. [*String Topology.*]{} Preprint math.GT/9911159 M. Chas and D. Sullivan. [*Closed string operators in topology leading to Lie bialgebras and higher string algebra.*]{} in: The legacy of Niels Henrik Abel, 771–784, Springer, Berlin, 2004.
M. Gerstenhaber. [*The cohomology structure of an associative ring*]{}, Ann. of Math. 78 (1963), 267-288. R. M. Kaufmann. [*On several varieties of cacti and their relations.*]{} Algebraic & Geometric Topology 5 (2005), 237-300.
R. M. Kaufmann. [*On Spineless Cacti, Deligne’s Conjecture and Connes–Kreimer’s Hopf Algebra.* ]{} in: N. Tongring and R. C. Penner “Woods Hole Mathematics. Perspectives in Mathematics and Physics”, Series on Knots and Everything - Vol. 34, World Scientific 2004.
R. M, Kaufmann. [*Operads, Moduli of Surfaces and Quantum Algebras*]{}, in “Wood’s Hole Mathematical Meetings”, World Scientific. To appear.
R. M. Kaufmann. [*Arcs, Ribbons, Moduli spaces and operations on Hochschild*]{}. In preparation.
R. M. Kaufmann [*String topology operations of moduli space via the arc operad*]{}. In preparation.
R. M.Kaufmann, M. Livernet and R. B. Penner. [*Arc Operads and Arc Algebras.*]{} Geometry and Topology 7 (2003), 511-568.
M. Kontsevich and Y. Soibelman. [*Deformations of algebras over operads and Deligne’s conjecture.*]{} Conférence Moshé Flato 1999, Vol. I (Dijon), 255–307, Math. Phys. Stud., 21, Kluwer Acad. Publ., Dordrecht, 2000.
J–L. Loday [*Cyclic homology*]{}. Appendix E by Mar[í]{}a O. Ronco. Second edition. Chapter 13 by the author in collaboration with Teimuraz Pirashvili. Grundlehren der Mathematischen Wissenschaften , 301. Springer-Verlag, Berlin, 1998.
J. E. McClure and J. H. Smith, [*Operads and cosimplicial objects: an introduction.*]{} in: Axiomatic, enriched and motivic homotopy theory, 133–171, NATO Sci. Ser. II Math. Phys. Chem., 131, Kluwer Acad. Publ., Dordrecht, 2004.
S. A. Merkulov. [*De Rham model for string topology.*]{} Int. Math. Res. Not. 2004, no. 55, 2955–2981.
R. C. Penner. [*Decorated Teichmüller theory of bordered surfaces.*]{} Comm. Anal. Geom. 12 (2004), no. 4, 793–820.
A. A. Voronov [*Notes on universal algebra.*]{} Preprint math.QA/0111009
| {
"pile_set_name": "ArXiv"
} |
I enjoy the work very much and I find our approach and observations , at times, similar with to one another. One of the main differences being our citizenship; my being American and you British. Which as an artist is very important to the specifics and context of making work. You also have three years on me in the sixties but I have no less of a respect and inspiration for the entirety of the counter culture movement and its effect on us now.
The reason I was prompted to write you is the recent release I received on your project with CreativeTime, The New Museum and others- ‘It Is What It Is’ . It is perfectly timed and a great reminder for the fast moving American and all the media distractions around the economy which results in less coverage and reminders of the devastating wars going on. With this said my only question is why you don’t mention the involvement of the UK in this war? Seeing how you are British I know it is important to you, and I am amazed at your fascination with America but remember the wars wouldn’t have happened without the UK involvement; past, present and future. I hope this comes to surface more than once with your tour through the US. I also find it funny that you will not make it to the Bay Area with your project. What is the intention in this? Have they already been won over and need no prompted discussions around the current wars? I also wonder if you have done sufficient research to achieve the understanding that the greatest Middle Eastern populations exist in the Bay Area of California.
I am looking forward to seeing what kind of bats make it out of this cave.
The growth of public sculpture and installation has happened with private funding in the United States. The Public Art Fund in NYC has been doing amazing projects along all parts of the island of Manhattan and the fringes of its boroughs. The name would lead you to believe this is a publicly funded operation. It is not! The fall of the NEA lead to a major marriage between art and industry. The CEO’s of the industries also became the leading collectors of Art News profiles. Some of the biggest collectors and supporters have been: The Gap, Enron, Progressive Insurance, Citibank and plenty more. Yes the work landed in the public through the private funding of non profit projects in the public realm. The realization of many projects we have learned about have only been possible with large private investment. Yes the government partially supports some of the projects, but it was the overwhelming support from the private sector that supported a much larger percentage. It should also be noted that this same network of investors have been leaders on the boards of a great many museums in the US and abroad.
I find it funny that you blame the art press. They are guided by their advertising dollars and that comes in from the private sector. The main mission is to review current exhibitions in galleries, the related artists and concepts in the museums and the occasional profile on private collectors. The direction for exposure and critique is best left to groups like The New York Times. This is a solid network of informed journalists. If there is a lack of exposed public sculptures in the press, I believe it is because there have been few realized in the past decades. At this time there is a big paradigm shift and I will assure you that it will bring a great increase in exposure to brilliant public installations and sculptures.
This is one of the worst examples of America caring for its public art. It brings sadness to my mind. Thinking…feeling the slightest chance this seminal work will be harmed. Think about the future for once America!
I full heartedly object to anything happening in and around the seminal work Spiral Jetty by the artist Robert Smithson. This work should be cherished by the state of Utah and this includes its government officers. One would never propose to drill near the Washington Monument. I view this artwork as a comparable monument to a different era of American history. To further my objection I would like to bring Utah’s attention to the tragic death Robert Smithson had fall upon him and the consequence of this is a very limited body of completed public work. As a citizen of this country I plead with the state of Utah to find it within themselves to be a generous steward to a grand vision for all in the global landscape.
The Spiral Jetty brings me hope and inspiration. It is a work that has vision well beyond its time of creation. As the world turns to repairing itself from the destruction of 20th century industry, the Spiral Jetty reclaims that space in its beautiful location (Great Salt Lake) and presents the viewer with a glimpse of something bigger. Just as nature has allowed the Spiral Jetty to come back to its magnificence so should the state of Utah. Make a statement and allow the federal government the opportunity to preserve this truly spectacular piece of Land Art from the 20th century.
I have not been able to shake the impression Martin Puryear’s survey show at MoMA, NYC had on me. I was educated in the 90’s art canon where youth and concept held vogue and the sculpted object and artists like Martin Puryear had many naysayers. I will set out in this essay to discuss the subjects of quality vs. quantity, craft, conceptualism, authorship and sustainability.
Martin Puryear’s work contains a confidence in form and finish while allowing its completed state to hold on to the organic. It becomes ‘timeless’ without diluting its core natural state of rough textures, shaped dimensional boards and muted colors from the landscape . There is no reason not to place it on the same museum floor as Brancusi’s ‘Bird in Space’ and the Futurist’s ‘Running Man’. Puryear looks to the object to sum up the whole of culture and ones placement in the built landscape.
We are in the 21st century, one might proclaim, and I feel this makes Puryear’s work stronger. Puryear is able to hold the chisel and be relevant in contemporary culture. He confronts the ‘Walmart’ attitude of this country with his quality over quantity. His chisel cuts through the current climate of art as Marcel DuChamp did with his early urinal as readymade. Both utilitarian tools sculpt humanity into a manageable, viewable form that takes hold of history and the exhibition space. | {
"pile_set_name": "Pile-CC"
} |
Lose the Capes.
George Lucas has never been accused of being an eloquent wordsmith, nor Star Wars ever hailed as the 20th century equivalent of Hamlet (though the focal father-son dynamic does warrant a few comparisons). And though the Star Wars saga has been criticized for its stiff dialogue and awkward direction, it does stand as a one of the most popular and influential franchises in media history. But Star Wars was once very different from the enduring epic we all know and love, and not necessarily for the better. Thanks to J.W. Rinzler and Mike Mayhew, we get a glimpse at what could have been in the first issue of Dark Horse’s comic adaptation of the first draft of The Star Wars.
The ability to write a good screenplay is insignificant next to the power of the Force. Surely, that’s what Lucas thought when he wrote The Star Wars. Its incoherence is matched only by its verbose exposition (and this is coming from someone who actually liked The Phantom Menace), bordering on a treatise on intergalactic foreign relations. Forget Palpatine; the real villain of the story is Darth Tedious.
It’s clear that Lucas hadn't yet matured as a writer by the time he finished the first draft (adapted to comic form by Rinzler) as it owes much to its Flash Gordon-inspired roots, feeling more like a nostalgic acid trip through Lucas’ childhood, instead of the mystical space opera it would come to be known.
Any casual fan of Star Wars would be taken aback by the vast differences between The Star Wars, and the more familiar Episode IV, some merely cosmetic, while others making for an entirely different experience than what was had in 1977.
None of the most well-known characters are present, at least not in any recognizable form. Luke Skywalker is now an aging Jedi general, and the story follows the young Padawan learner Annikin Starkiller. Gone is the menacing visage of Darth Vader, who lacks his iconic helmet and heavy breathing. And though he’s not in the first issue, readers may later be surprised by a certain green skinned alien named Han Solo.
Oh, and Princess Leia goes off to college, hair buns and all. It’s unknown if kissing a Wookie is part of pledge week.
Not all is lost, however. Mike Mayhew’s art is impressive. Most impressive. His realistic style borrows heavily from, and remains faithful to, the concept art of the late Ralph McQuarrie, bringing a new, yet strangely familiar, world to life, giving readers a rare opportunity to see Lucas’ lost vision. Whether you like Lucas’ first draft or not, it is Mayhew’s detailed and vibrant art which saves the book, elevating it from what could have easily been nothing more than a roughly sketched proof-of-concept.
George Lucas has always received a lot of criticism for constantly tinkering with his films, from the good (the updated celebration at the end of Return of the Jedi), to the bad (Han will always shoot first, no matter what Lucas says). However, had Lucas not changed his original vision for The Star Wars into the groundbreaking success first introduced to audiences 36 years ago, he’d never have had the courage to make a film like Willow.
TL;DR: Despite Mike Mayhew's impressive art, unless you’re one who thinks Tom Selleck would have been a better Indiana Jones, I’d stick with the movies.
The Star Wars is adapted for comics by J.W. Rinzler with art by Mike Mayhew. Published by Dark Horse comics, it's a new ongoing series based on George Lucas' original rough-draft screenplay. Ask for it at your local comic book shop. The artwork in our header is from the cover by Nick Runge.
A review PDF of The Star Wars was graciously provided to Spandexless by the publisher.
Nick Chidgey has been a regular contributor to Spandexless since the beginning but has yet to provide a more comprehensive bio. As such, he is a reviewer of mystery. | {
"pile_set_name": "Pile-CC"
} |
.error-indicator {
width: 100%;
display: flex;
flex-direction: column;
align-items: center;
color: #c78f22;
}
.error-indicator img {
margin-bottom: 1rem;
}
.error-indicator .boom {
font-size: 1.7rem;
} | {
"pile_set_name": "Github"
} |
// Variables
// --------------------------
@fa-font-path: "../fonts";
@fa-font-size-base: 14px;
@fa-line-height-base: 1;
//@fa-font-path: "//netdna.bootstrapcdn.com/font-awesome/4.7.0/fonts"; // for referencing Bootstrap CDN font files directly
@fa-css-prefix: fa;
@fa-version: "4.7.0";
@fa-border-color: #eee;
@fa-inverse: #fff;
@fa-li-width: (30em / 14);
@fa-var-500px: "\f26e";
@fa-var-address-book: "\f2b9";
@fa-var-address-book-o: "\f2ba";
@fa-var-address-card: "\f2bb";
@fa-var-address-card-o: "\f2bc";
@fa-var-adjust: "\f042";
@fa-var-adn: "\f170";
@fa-var-align-center: "\f037";
@fa-var-align-justify: "\f039";
@fa-var-align-left: "\f036";
@fa-var-align-right: "\f038";
@fa-var-amazon: "\f270";
@fa-var-ambulance: "\f0f9";
@fa-var-american-sign-language-interpreting: "\f2a3";
@fa-var-anchor: "\f13d";
@fa-var-android: "\f17b";
@fa-var-angellist: "\f209";
@fa-var-angle-double-down: "\f103";
@fa-var-angle-double-left: "\f100";
@fa-var-angle-double-right: "\f101";
@fa-var-angle-double-up: "\f102";
@fa-var-angle-down: "\f107";
@fa-var-angle-left: "\f104";
@fa-var-angle-right: "\f105";
@fa-var-angle-up: "\f106";
@fa-var-apple: "\f179";
@fa-var-archive: "\f187";
@fa-var-area-chart: "\f1fe";
@fa-var-arrow-circle-down: "\f0ab";
@fa-var-arrow-circle-left: "\f0a8";
@fa-var-arrow-circle-o-down: "\f01a";
@fa-var-arrow-circle-o-left: "\f190";
@fa-var-arrow-circle-o-right: "\f18e";
@fa-var-arrow-circle-o-up: "\f01b";
@fa-var-arrow-circle-right: "\f0a9";
@fa-var-arrow-circle-up: "\f0aa";
@fa-var-arrow-down: "\f063";
@fa-var-arrow-left: "\f060";
@fa-var-arrow-right: "\f061";
@fa-var-arrow-up: "\f062";
@fa-var-arrows: "\f047";
@fa-var-arrows-alt: "\f0b2";
@fa-var-arrows-h: "\f07e";
@fa-var-arrows-v: "\f07d";
@fa-var-asl-interpreting: "\f2a3";
@fa-var-assistive-listening-systems: "\f2a2";
@fa-var-asterisk: "\f069";
@fa-var-at: "\f1fa";
@fa-var-audio-description: "\f29e";
@fa-var-automobile: "\f1b9";
@fa-var-backward: "\f04a";
@fa-var-balance-scale: "\f24e";
@fa-var-ban: "\f05e";
@fa-var-bandcamp: "\f2d5";
@fa-var-bank: "\f19c";
@fa-var-bar-chart: "\f080";
@fa-var-bar-chart-o: "\f080";
@fa-var-barcode: "\f02a";
@fa-var-bars: "\f0c9";
@fa-var-bath: "\f2cd";
@fa-var-bathtub: "\f2cd";
@fa-var-battery: "\f240";
@fa-var-battery-0: "\f244";
@fa-var-battery-1: "\f243";
@fa-var-battery-2: "\f242";
@fa-var-battery-3: "\f241";
@fa-var-battery-4: "\f240";
@fa-var-battery-empty: "\f244";
@fa-var-battery-full: "\f240";
@fa-var-battery-half: "\f242";
@fa-var-battery-quarter: "\f243";
@fa-var-battery-three-quarters: "\f241";
@fa-var-bed: "\f236";
@fa-var-beer: "\f0fc";
@fa-var-behance: "\f1b4";
@fa-var-behance-square: "\f1b5";
@fa-var-bell: "\f0f3";
@fa-var-bell-o: "\f0a2";
@fa-var-bell-slash: "\f1f6";
@fa-var-bell-slash-o: "\f1f7";
@fa-var-bicycle: "\f206";
@fa-var-binoculars: "\f1e5";
@fa-var-birthday-cake: "\f1fd";
@fa-var-bitbucket: "\f171";
@fa-var-bitbucket-square: "\f172";
@fa-var-bitcoin: "\f15a";
@fa-var-black-tie: "\f27e";
@fa-var-blind: "\f29d";
@fa-var-bluetooth: "\f293";
@fa-var-bluetooth-b: "\f294";
@fa-var-bold: "\f032";
@fa-var-bolt: "\f0e7";
@fa-var-bomb: "\f1e2";
@fa-var-book: "\f02d";
@fa-var-bookmark: "\f02e";
@fa-var-bookmark-o: "\f097";
@fa-var-braille: "\f2a1";
@fa-var-briefcase: "\f0b1";
@fa-var-btc: "\f15a";
@fa-var-bug: "\f188";
@fa-var-building: "\f1ad";
@fa-var-building-o: "\f0f7";
@fa-var-bullhorn: "\f0a1";
@fa-var-bullseye: "\f140";
@fa-var-bus: "\f207";
@fa-var-buysellads: "\f20d";
@fa-var-cab: "\f1ba";
@fa-var-calculator: "\f1ec";
@fa-var-calendar: "\f073";
@fa-var-calendar-check-o: "\f274";
@fa-var-calendar-minus-o: "\f272";
@fa-var-calendar-o: "\f133";
@fa-var-calendar-plus-o: "\f271";
@fa-var-calendar-times-o: "\f273";
@fa-var-camera: "\f030";
@fa-var-camera-retro: "\f083";
@fa-var-car: "\f1b9";
@fa-var-caret-down: "\f0d7";
@fa-var-caret-left: "\f0d9";
@fa-var-caret-right: "\f0da";
@fa-var-caret-square-o-down: "\f150";
@fa-var-caret-square-o-left: "\f191";
@fa-var-caret-square-o-right: "\f152";
@fa-var-caret-square-o-up: "\f151";
@fa-var-caret-up: "\f0d8";
@fa-var-cart-arrow-down: "\f218";
@fa-var-cart-plus: "\f217";
@fa-var-cc: "\f20a";
@fa-var-cc-amex: "\f1f3";
@fa-var-cc-diners-club: "\f24c";
@fa-var-cc-discover: "\f1f2";
@fa-var-cc-jcb: "\f24b";
@fa-var-cc-mastercard: "\f1f1";
@fa-var-cc-paypal: "\f1f4";
@fa-var-cc-stripe: "\f1f5";
@fa-var-cc-visa: "\f1f0";
@fa-var-certificate: "\f0a3";
@fa-var-chain: "\f0c1";
@fa-var-chain-broken: "\f127";
@fa-var-check: "\f00c";
@fa-var-check-circle: "\f058";
@fa-var-check-circle-o: "\f05d";
@fa-var-check-square: "\f14a";
@fa-var-check-square-o: "\f046";
@fa-var-chevron-circle-down: "\f13a";
@fa-var-chevron-circle-left: "\f137";
@fa-var-chevron-circle-right: "\f138";
@fa-var-chevron-circle-up: "\f139";
@fa-var-chevron-down: "\f078";
@fa-var-chevron-left: "\f053";
@fa-var-chevron-right: "\f054";
@fa-var-chevron-up: "\f077";
@fa-var-child: "\f1ae";
@fa-var-chrome: "\f268";
@fa-var-circle: "\f111";
@fa-var-circle-o: "\f10c";
@fa-var-circle-o-notch: "\f1ce";
@fa-var-circle-thin: "\f1db";
@fa-var-clipboard: "\f0ea";
@fa-var-clock-o: "\f017";
@fa-var-clone: "\f24d";
@fa-var-close: "\f00d";
@fa-var-cloud: "\f0c2";
@fa-var-cloud-download: "\f0ed";
@fa-var-cloud-upload: "\f0ee";
@fa-var-cny: "\f157";
@fa-var-code: "\f121";
@fa-var-code-fork: "\f126";
@fa-var-codepen: "\f1cb";
@fa-var-codiepie: "\f284";
@fa-var-coffee: "\f0f4";
@fa-var-cog: "\f013";
@fa-var-cogs: "\f085";
@fa-var-columns: "\f0db";
@fa-var-comment: "\f075";
@fa-var-comment-o: "\f0e5";
@fa-var-commenting: "\f27a";
@fa-var-commenting-o: "\f27b";
@fa-var-comments: "\f086";
@fa-var-comments-o: "\f0e6";
@fa-var-compass: "\f14e";
@fa-var-compress: "\f066";
@fa-var-connectdevelop: "\f20e";
@fa-var-contao: "\f26d";
@fa-var-copy: "\f0c5";
@fa-var-copyright: "\f1f9";
@fa-var-creative-commons: "\f25e";
@fa-var-credit-card: "\f09d";
@fa-var-credit-card-alt: "\f283";
@fa-var-crop: "\f125";
@fa-var-crosshairs: "\f05b";
@fa-var-css3: "\f13c";
@fa-var-cube: "\f1b2";
@fa-var-cubes: "\f1b3";
@fa-var-cut: "\f0c4";
@fa-var-cutlery: "\f0f5";
@fa-var-dashboard: "\f0e4";
@fa-var-dashcube: "\f210";
@fa-var-database: "\f1c0";
@fa-var-deaf: "\f2a4";
@fa-var-deafness: "\f2a4";
@fa-var-dedent: "\f03b";
@fa-var-delicious: "\f1a5";
@fa-var-desktop: "\f108";
@fa-var-deviantart: "\f1bd";
@fa-var-diamond: "\f219";
@fa-var-digg: "\f1a6";
@fa-var-dollar: "\f155";
@fa-var-dot-circle-o: "\f192";
@fa-var-download: "\f019";
@fa-var-dribbble: "\f17d";
@fa-var-drivers-license: "\f2c2";
@fa-var-drivers-license-o: "\f2c3";
@fa-var-dropbox: "\f16b";
@fa-var-drupal: "\f1a9";
@fa-var-edge: "\f282";
@fa-var-edit: "\f044";
@fa-var-eercast: "\f2da";
@fa-var-eject: "\f052";
@fa-var-ellipsis-h: "\f141";
@fa-var-ellipsis-v: "\f142";
@fa-var-empire: "\f1d1";
@fa-var-envelope: "\f0e0";
@fa-var-envelope-o: "\f003";
@fa-var-envelope-open: "\f2b6";
@fa-var-envelope-open-o: "\f2b7";
@fa-var-envelope-square: "\f199";
@fa-var-envira: "\f299";
@fa-var-eraser: "\f12d";
@fa-var-etsy: "\f2d7";
@fa-var-eur: "\f153";
@fa-var-euro: "\f153";
@fa-var-exchange: "\f0ec";
@fa-var-exclamation: "\f12a";
@fa-var-exclamation-circle: "\f06a";
@fa-var-exclamation-triangle: "\f071";
@fa-var-expand: "\f065";
@fa-var-expeditedssl: "\f23e";
@fa-var-external-link: "\f08e";
@fa-var-external-link-square: "\f14c";
@fa-var-eye: "\f06e";
@fa-var-eye-slash: "\f070";
@fa-var-eyedropper: "\f1fb";
@fa-var-fa: "\f2b4";
@fa-var-facebook: "\f09a";
@fa-var-facebook-f: "\f09a";
@fa-var-facebook-official: "\f230";
@fa-var-facebook-square: "\f082";
@fa-var-fast-backward: "\f049";
@fa-var-fast-forward: "\f050";
@fa-var-fax: "\f1ac";
@fa-var-feed: "\f09e";
@fa-var-female: "\f182";
@fa-var-fighter-jet: "\f0fb";
@fa-var-file: "\f15b";
@fa-var-file-archive-o: "\f1c6";
@fa-var-file-audio-o: "\f1c7";
@fa-var-file-code-o: "\f1c9";
@fa-var-file-excel-o: "\f1c3";
@fa-var-file-image-o: "\f1c5";
@fa-var-file-movie-o: "\f1c8";
@fa-var-file-o: "\f016";
@fa-var-file-pdf-o: "\f1c1";
@fa-var-file-photo-o: "\f1c5";
@fa-var-file-picture-o: "\f1c5";
@fa-var-file-powerpoint-o: "\f1c4";
@fa-var-file-sound-o: "\f1c7";
@fa-var-file-text: "\f15c";
@fa-var-file-text-o: "\f0f6";
@fa-var-file-video-o: "\f1c8";
@fa-var-file-word-o: "\f1c2";
@fa-var-file-zip-o: "\f1c6";
@fa-var-files-o: "\f0c5";
@fa-var-film: "\f008";
@fa-var-filter: "\f0b0";
@fa-var-fire: "\f06d";
@fa-var-fire-extinguisher: "\f134";
@fa-var-firefox: "\f269";
@fa-var-first-order: "\f2b0";
@fa-var-flag: "\f024";
@fa-var-flag-checkered: "\f11e";
@fa-var-flag-o: "\f11d";
@fa-var-flash: "\f0e7";
@fa-var-flask: "\f0c3";
@fa-var-flickr: "\f16e";
@fa-var-floppy-o: "\f0c7";
@fa-var-folder: "\f07b";
@fa-var-folder-o: "\f114";
@fa-var-folder-open: "\f07c";
@fa-var-folder-open-o: "\f115";
@fa-var-font: "\f031";
@fa-var-font-awesome: "\f2b4";
@fa-var-fonticons: "\f280";
@fa-var-fort-awesome: "\f286";
@fa-var-forumbee: "\f211";
@fa-var-forward: "\f04e";
@fa-var-foursquare: "\f180";
@fa-var-free-code-camp: "\f2c5";
@fa-var-frown-o: "\f119";
@fa-var-futbol-o: "\f1e3";
@fa-var-gamepad: "\f11b";
@fa-var-gavel: "\f0e3";
@fa-var-gbp: "\f154";
@fa-var-ge: "\f1d1";
@fa-var-gear: "\f013";
@fa-var-gears: "\f085";
@fa-var-genderless: "\f22d";
@fa-var-get-pocket: "\f265";
@fa-var-gg: "\f260";
@fa-var-gg-circle: "\f261";
@fa-var-gift: "\f06b";
@fa-var-git: "\f1d3";
@fa-var-git-square: "\f1d2";
@fa-var-github: "\f09b";
@fa-var-github-alt: "\f113";
@fa-var-github-square: "\f092";
@fa-var-gitlab: "\f296";
@fa-var-gittip: "\f184";
@fa-var-glass: "\f000";
@fa-var-glide: "\f2a5";
@fa-var-glide-g: "\f2a6";
@fa-var-globe: "\f0ac";
@fa-var-google: "\f1a0";
@fa-var-google-plus: "\f0d5";
@fa-var-google-plus-circle: "\f2b3";
@fa-var-google-plus-official: "\f2b3";
@fa-var-google-plus-square: "\f0d4";
@fa-var-google-wallet: "\f1ee";
@fa-var-graduation-cap: "\f19d";
@fa-var-gratipay: "\f184";
@fa-var-grav: "\f2d6";
@fa-var-group: "\f0c0";
@fa-var-h-square: "\f0fd";
@fa-var-hacker-news: "\f1d4";
@fa-var-hand-grab-o: "\f255";
@fa-var-hand-lizard-o: "\f258";
@fa-var-hand-o-down: "\f0a7";
@fa-var-hand-o-left: "\f0a5";
@fa-var-hand-o-right: "\f0a4";
@fa-var-hand-o-up: "\f0a6";
@fa-var-hand-paper-o: "\f256";
@fa-var-hand-peace-o: "\f25b";
@fa-var-hand-pointer-o: "\f25a";
@fa-var-hand-rock-o: "\f255";
@fa-var-hand-scissors-o: "\f257";
@fa-var-hand-spock-o: "\f259";
@fa-var-hand-stop-o: "\f256";
@fa-var-handshake-o: "\f2b5";
@fa-var-hard-of-hearing: "\f2a4";
@fa-var-hashtag: "\f292";
@fa-var-hdd-o: "\f0a0";
@fa-var-header: "\f1dc";
@fa-var-headphones: "\f025";
@fa-var-heart: "\f004";
@fa-var-heart-o: "\f08a";
@fa-var-heartbeat: "\f21e";
@fa-var-history: "\f1da";
@fa-var-home: "\f015";
@fa-var-hospital-o: "\f0f8";
@fa-var-hotel: "\f236";
@fa-var-hourglass: "\f254";
@fa-var-hourglass-1: "\f251";
@fa-var-hourglass-2: "\f252";
@fa-var-hourglass-3: "\f253";
@fa-var-hourglass-end: "\f253";
@fa-var-hourglass-half: "\f252";
@fa-var-hourglass-o: "\f250";
@fa-var-hourglass-start: "\f251";
@fa-var-houzz: "\f27c";
@fa-var-html5: "\f13b";
@fa-var-i-cursor: "\f246";
@fa-var-id-badge: "\f2c1";
@fa-var-id-card: "\f2c2";
@fa-var-id-card-o: "\f2c3";
@fa-var-ils: "\f20b";
@fa-var-image: "\f03e";
@fa-var-imdb: "\f2d8";
@fa-var-inbox: "\f01c";
@fa-var-indent: "\f03c";
@fa-var-industry: "\f275";
@fa-var-info: "\f129";
@fa-var-info-circle: "\f05a";
@fa-var-inr: "\f156";
@fa-var-instagram: "\f16d";
@fa-var-institution: "\f19c";
@fa-var-internet-explorer: "\f26b";
@fa-var-intersex: "\f224";
@fa-var-ioxhost: "\f208";
@fa-var-italic: "\f033";
@fa-var-joomla: "\f1aa";
@fa-var-jpy: "\f157";
@fa-var-jsfiddle: "\f1cc";
@fa-var-key: "\f084";
@fa-var-keyboard-o: "\f11c";
@fa-var-krw: "\f159";
@fa-var-language: "\f1ab";
@fa-var-laptop: "\f109";
@fa-var-lastfm: "\f202";
@fa-var-lastfm-square: "\f203";
@fa-var-leaf: "\f06c";
@fa-var-leanpub: "\f212";
@fa-var-legal: "\f0e3";
@fa-var-lemon-o: "\f094";
@fa-var-level-down: "\f149";
@fa-var-level-up: "\f148";
@fa-var-life-bouy: "\f1cd";
@fa-var-life-buoy: "\f1cd";
@fa-var-life-ring: "\f1cd";
@fa-var-life-saver: "\f1cd";
@fa-var-lightbulb-o: "\f0eb";
@fa-var-line-chart: "\f201";
@fa-var-link: "\f0c1";
@fa-var-linkedin: "\f0e1";
@fa-var-linkedin-square: "\f08c";
@fa-var-linode: "\f2b8";
@fa-var-linux: "\f17c";
@fa-var-list: "\f03a";
@fa-var-list-alt: "\f022";
@fa-var-list-ol: "\f0cb";
@fa-var-list-ul: "\f0ca";
@fa-var-location-arrow: "\f124";
@fa-var-lock: "\f023";
@fa-var-long-arrow-down: "\f175";
@fa-var-long-arrow-left: "\f177";
@fa-var-long-arrow-right: "\f178";
@fa-var-long-arrow-up: "\f176";
@fa-var-low-vision: "\f2a8";
@fa-var-magic: "\f0d0";
@fa-var-magnet: "\f076";
@fa-var-mail-forward: "\f064";
@fa-var-mail-reply: "\f112";
@fa-var-mail-reply-all: "\f122";
@fa-var-male: "\f183";
@fa-var-map: "\f279";
@fa-var-map-marker: "\f041";
@fa-var-map-o: "\f278";
@fa-var-map-pin: "\f276";
@fa-var-map-signs: "\f277";
@fa-var-mars: "\f222";
@fa-var-mars-double: "\f227";
@fa-var-mars-stroke: "\f229";
@fa-var-mars-stroke-h: "\f22b";
@fa-var-mars-stroke-v: "\f22a";
@fa-var-maxcdn: "\f136";
@fa-var-meanpath: "\f20c";
@fa-var-medium: "\f23a";
@fa-var-medkit: "\f0fa";
@fa-var-meetup: "\f2e0";
@fa-var-meh-o: "\f11a";
@fa-var-mercury: "\f223";
@fa-var-microchip: "\f2db";
@fa-var-microphone: "\f130";
@fa-var-microphone-slash: "\f131";
@fa-var-minus: "\f068";
@fa-var-minus-circle: "\f056";
@fa-var-minus-square: "\f146";
@fa-var-minus-square-o: "\f147";
@fa-var-mixcloud: "\f289";
@fa-var-mobile: "\f10b";
@fa-var-mobile-phone: "\f10b";
@fa-var-modx: "\f285";
@fa-var-money: "\f0d6";
@fa-var-moon-o: "\f186";
@fa-var-mortar-board: "\f19d";
@fa-var-motorcycle: "\f21c";
@fa-var-mouse-pointer: "\f245";
@fa-var-music: "\f001";
@fa-var-navicon: "\f0c9";
@fa-var-neuter: "\f22c";
@fa-var-newspaper-o: "\f1ea";
@fa-var-object-group: "\f247";
@fa-var-object-ungroup: "\f248";
@fa-var-odnoklassniki: "\f263";
@fa-var-odnoklassniki-square: "\f264";
@fa-var-opencart: "\f23d";
@fa-var-openid: "\f19b";
@fa-var-opera: "\f26a";
@fa-var-optin-monster: "\f23c";
@fa-var-outdent: "\f03b";
@fa-var-pagelines: "\f18c";
@fa-var-paint-brush: "\f1fc";
@fa-var-paper-plane: "\f1d8";
@fa-var-paper-plane-o: "\f1d9";
@fa-var-paperclip: "\f0c6";
@fa-var-paragraph: "\f1dd";
@fa-var-paste: "\f0ea";
@fa-var-pause: "\f04c";
@fa-var-pause-circle: "\f28b";
@fa-var-pause-circle-o: "\f28c";
@fa-var-paw: "\f1b0";
@fa-var-paypal: "\f1ed";
@fa-var-pencil: "\f040";
@fa-var-pencil-square: "\f14b";
@fa-var-pencil-square-o: "\f044";
@fa-var-percent: "\f295";
@fa-var-phone: "\f095";
@fa-var-phone-square: "\f098";
@fa-var-photo: "\f03e";
@fa-var-picture-o: "\f03e";
@fa-var-pie-chart: "\f200";
@fa-var-pied-piper: "\f2ae";
@fa-var-pied-piper-alt: "\f1a8";
@fa-var-pied-piper-pp: "\f1a7";
@fa-var-pinterest: "\f0d2";
@fa-var-pinterest-p: "\f231";
@fa-var-pinterest-square: "\f0d3";
@fa-var-plane: "\f072";
@fa-var-play: "\f04b";
@fa-var-play-circle: "\f144";
@fa-var-play-circle-o: "\f01d";
@fa-var-plug: "\f1e6";
@fa-var-plus: "\f067";
@fa-var-plus-circle: "\f055";
@fa-var-plus-square: "\f0fe";
@fa-var-plus-square-o: "\f196";
@fa-var-podcast: "\f2ce";
@fa-var-power-off: "\f011";
@fa-var-print: "\f02f";
@fa-var-product-hunt: "\f288";
@fa-var-puzzle-piece: "\f12e";
@fa-var-qq: "\f1d6";
@fa-var-qrcode: "\f029";
@fa-var-question: "\f128";
@fa-var-question-circle: "\f059";
@fa-var-question-circle-o: "\f29c";
@fa-var-quora: "\f2c4";
@fa-var-quote-left: "\f10d";
@fa-var-quote-right: "\f10e";
@fa-var-ra: "\f1d0";
@fa-var-random: "\f074";
@fa-var-ravelry: "\f2d9";
@fa-var-rebel: "\f1d0";
@fa-var-recycle: "\f1b8";
@fa-var-reddit: "\f1a1";
@fa-var-reddit-alien: "\f281";
@fa-var-reddit-square: "\f1a2";
@fa-var-refresh: "\f021";
@fa-var-registered: "\f25d";
@fa-var-remove: "\f00d";
@fa-var-renren: "\f18b";
@fa-var-reorder: "\f0c9";
@fa-var-repeat: "\f01e";
@fa-var-reply: "\f112";
@fa-var-reply-all: "\f122";
@fa-var-resistance: "\f1d0";
@fa-var-retweet: "\f079";
@fa-var-rmb: "\f157";
@fa-var-road: "\f018";
@fa-var-rocket: "\f135";
@fa-var-rotate-left: "\f0e2";
@fa-var-rotate-right: "\f01e";
@fa-var-rouble: "\f158";
@fa-var-rss: "\f09e";
@fa-var-rss-square: "\f143";
@fa-var-rub: "\f158";
@fa-var-ruble: "\f158";
@fa-var-rupee: "\f156";
@fa-var-s15: "\f2cd";
@fa-var-safari: "\f267";
@fa-var-save: "\f0c7";
@fa-var-scissors: "\f0c4";
@fa-var-scribd: "\f28a";
@fa-var-search: "\f002";
@fa-var-search-minus: "\f010";
@fa-var-search-plus: "\f00e";
@fa-var-sellsy: "\f213";
@fa-var-send: "\f1d8";
@fa-var-send-o: "\f1d9";
@fa-var-server: "\f233";
@fa-var-share: "\f064";
@fa-var-share-alt: "\f1e0";
@fa-var-share-alt-square: "\f1e1";
@fa-var-share-square: "\f14d";
@fa-var-share-square-o: "\f045";
@fa-var-shekel: "\f20b";
@fa-var-sheqel: "\f20b";
@fa-var-shield: "\f132";
@fa-var-ship: "\f21a";
@fa-var-shirtsinbulk: "\f214";
@fa-var-shopping-bag: "\f290";
@fa-var-shopping-basket: "\f291";
@fa-var-shopping-cart: "\f07a";
@fa-var-shower: "\f2cc";
@fa-var-sign-in: "\f090";
@fa-var-sign-language: "\f2a7";
@fa-var-sign-out: "\f08b";
@fa-var-signal: "\f012";
@fa-var-signing: "\f2a7";
@fa-var-simplybuilt: "\f215";
@fa-var-sitemap: "\f0e8";
@fa-var-skyatlas: "\f216";
@fa-var-skype: "\f17e";
@fa-var-slack: "\f198";
@fa-var-sliders: "\f1de";
@fa-var-slideshare: "\f1e7";
@fa-var-smile-o: "\f118";
@fa-var-snapchat: "\f2ab";
@fa-var-snapchat-ghost: "\f2ac";
@fa-var-snapchat-square: "\f2ad";
@fa-var-snowflake-o: "\f2dc";
@fa-var-soccer-ball-o: "\f1e3";
@fa-var-sort: "\f0dc";
@fa-var-sort-alpha-asc: "\f15d";
@fa-var-sort-alpha-desc: "\f15e";
@fa-var-sort-amount-asc: "\f160";
@fa-var-sort-amount-desc: "\f161";
@fa-var-sort-asc: "\f0de";
@fa-var-sort-desc: "\f0dd";
@fa-var-sort-down: "\f0dd";
@fa-var-sort-numeric-asc: "\f162";
@fa-var-sort-numeric-desc: "\f163";
@fa-var-sort-up: "\f0de";
@fa-var-soundcloud: "\f1be";
@fa-var-space-shuttle: "\f197";
@fa-var-spinner: "\f110";
@fa-var-spoon: "\f1b1";
@fa-var-spotify: "\f1bc";
@fa-var-square: "\f0c8";
@fa-var-square-o: "\f096";
@fa-var-stack-exchange: "\f18d";
@fa-var-stack-overflow: "\f16c";
@fa-var-star: "\f005";
@fa-var-star-half: "\f089";
@fa-var-star-half-empty: "\f123";
@fa-var-star-half-full: "\f123";
@fa-var-star-half-o: "\f123";
@fa-var-star-o: "\f006";
@fa-var-steam: "\f1b6";
@fa-var-steam-square: "\f1b7";
@fa-var-step-backward: "\f048";
@fa-var-step-forward: "\f051";
@fa-var-stethoscope: "\f0f1";
@fa-var-sticky-note: "\f249";
@fa-var-sticky-note-o: "\f24a";
@fa-var-stop: "\f04d";
@fa-var-stop-circle: "\f28d";
@fa-var-stop-circle-o: "\f28e";
@fa-var-street-view: "\f21d";
@fa-var-strikethrough: "\f0cc";
@fa-var-stumbleupon: "\f1a4";
@fa-var-stumbleupon-circle: "\f1a3";
@fa-var-subscript: "\f12c";
@fa-var-subway: "\f239";
@fa-var-suitcase: "\f0f2";
@fa-var-sun-o: "\f185";
@fa-var-superpowers: "\f2dd";
@fa-var-superscript: "\f12b";
@fa-var-support: "\f1cd";
@fa-var-table: "\f0ce";
@fa-var-tablet: "\f10a";
@fa-var-tachometer: "\f0e4";
@fa-var-tag: "\f02b";
@fa-var-tags: "\f02c";
@fa-var-tasks: "\f0ae";
@fa-var-taxi: "\f1ba";
@fa-var-telegram: "\f2c6";
@fa-var-television: "\f26c";
@fa-var-tencent-weibo: "\f1d5";
@fa-var-terminal: "\f120";
@fa-var-text-height: "\f034";
@fa-var-text-width: "\f035";
@fa-var-th: "\f00a";
@fa-var-th-large: "\f009";
@fa-var-th-list: "\f00b";
@fa-var-themeisle: "\f2b2";
@fa-var-thermometer: "\f2c7";
@fa-var-thermometer-0: "\f2cb";
@fa-var-thermometer-1: "\f2ca";
@fa-var-thermometer-2: "\f2c9";
@fa-var-thermometer-3: "\f2c8";
@fa-var-thermometer-4: "\f2c7";
@fa-var-thermometer-empty: "\f2cb";
@fa-var-thermometer-full: "\f2c7";
@fa-var-thermometer-half: "\f2c9";
@fa-var-thermometer-quarter: "\f2ca";
@fa-var-thermometer-three-quarters: "\f2c8";
@fa-var-thumb-tack: "\f08d";
@fa-var-thumbs-down: "\f165";
@fa-var-thumbs-o-down: "\f088";
@fa-var-thumbs-o-up: "\f087";
@fa-var-thumbs-up: "\f164";
@fa-var-ticket: "\f145";
@fa-var-times: "\f00d";
@fa-var-times-circle: "\f057";
@fa-var-times-circle-o: "\f05c";
@fa-var-times-rectangle: "\f2d3";
@fa-var-times-rectangle-o: "\f2d4";
@fa-var-tint: "\f043";
@fa-var-toggle-down: "\f150";
@fa-var-toggle-left: "\f191";
@fa-var-toggle-off: "\f204";
@fa-var-toggle-on: "\f205";
@fa-var-toggle-right: "\f152";
@fa-var-toggle-up: "\f151";
@fa-var-trademark: "\f25c";
@fa-var-train: "\f238";
@fa-var-transgender: "\f224";
@fa-var-transgender-alt: "\f225";
@fa-var-trash: "\f1f8";
@fa-var-trash-o: "\f014";
@fa-var-tree: "\f1bb";
@fa-var-trello: "\f181";
@fa-var-tripadvisor: "\f262";
@fa-var-trophy: "\f091";
@fa-var-truck: "\f0d1";
@fa-var-try: "\f195";
@fa-var-tty: "\f1e4";
@fa-var-tumblr: "\f173";
@fa-var-tumblr-square: "\f174";
@fa-var-turkish-lira: "\f195";
@fa-var-tv: "\f26c";
@fa-var-twitch: "\f1e8";
@fa-var-twitter: "\f099";
@fa-var-twitter-square: "\f081";
@fa-var-umbrella: "\f0e9";
@fa-var-underline: "\f0cd";
@fa-var-undo: "\f0e2";
@fa-var-universal-access: "\f29a";
@fa-var-university: "\f19c";
@fa-var-unlink: "\f127";
@fa-var-unlock: "\f09c";
@fa-var-unlock-alt: "\f13e";
@fa-var-unsorted: "\f0dc";
@fa-var-upload: "\f093";
@fa-var-usb: "\f287";
@fa-var-usd: "\f155";
@fa-var-user: "\f007";
@fa-var-user-circle: "\f2bd";
@fa-var-user-circle-o: "\f2be";
@fa-var-user-md: "\f0f0";
@fa-var-user-o: "\f2c0";
@fa-var-user-plus: "\f234";
@fa-var-user-secret: "\f21b";
@fa-var-user-times: "\f235";
@fa-var-users: "\f0c0";
@fa-var-vcard: "\f2bb";
@fa-var-vcard-o: "\f2bc";
@fa-var-venus: "\f221";
@fa-var-venus-double: "\f226";
@fa-var-venus-mars: "\f228";
@fa-var-viacoin: "\f237";
@fa-var-viadeo: "\f2a9";
@fa-var-viadeo-square: "\f2aa";
@fa-var-video-camera: "\f03d";
@fa-var-vimeo: "\f27d";
@fa-var-vimeo-square: "\f194";
@fa-var-vine: "\f1ca";
@fa-var-vk: "\f189";
@fa-var-volume-control-phone: "\f2a0";
@fa-var-volume-down: "\f027";
@fa-var-volume-off: "\f026";
@fa-var-volume-up: "\f028";
@fa-var-warning: "\f071";
@fa-var-wechat: "\f1d7";
@fa-var-weibo: "\f18a";
@fa-var-weixin: "\f1d7";
@fa-var-whatsapp: "\f232";
@fa-var-wheelchair: "\f193";
@fa-var-wheelchair-alt: "\f29b";
@fa-var-wifi: "\f1eb";
@fa-var-wikipedia-w: "\f266";
@fa-var-window-close: "\f2d3";
@fa-var-window-close-o: "\f2d4";
@fa-var-window-maximize: "\f2d0";
@fa-var-window-minimize: "\f2d1";
@fa-var-window-restore: "\f2d2";
@fa-var-windows: "\f17a";
@fa-var-won: "\f159";
@fa-var-wordpress: "\f19a";
@fa-var-wpbeginner: "\f297";
@fa-var-wpexplorer: "\f2de";
@fa-var-wpforms: "\f298";
@fa-var-wrench: "\f0ad";
@fa-var-xing: "\f168";
@fa-var-xing-square: "\f169";
@fa-var-y-combinator: "\f23b";
@fa-var-y-combinator-square: "\f1d4";
@fa-var-yahoo: "\f19e";
@fa-var-yc: "\f23b";
@fa-var-yc-square: "\f1d4";
@fa-var-yelp: "\f1e9";
@fa-var-yen: "\f157";
@fa-var-yoast: "\f2b1";
@fa-var-youtube: "\f167";
@fa-var-youtube-play: "\f16a";
@fa-var-youtube-square: "\f166";
| {
"pile_set_name": "Github"
} |
Mongoose plugin to enable population of nested models at any level of depth. Support **Mongoose 3.8.x** and later. Refer to [changelog](https://github.com/buunguyen/mongoose-deep-populate#changelog) for breaking changes.
[](https://www.npmjs.com/package/mongoose-deep-populate)
[](https://travis-ci.org/buunguyen/mongoose-deep-populate)
[](https://www.codeshelter.co/)
### Usage
Sample usages are based on the following schemas:
```javascript
var UserSchema = new Schema({})
var CommentSchema = new Schema({
user : {type: Number, ref: 'User'}
})
var PostSchema = new Schema({
user : {type: Number, ref: 'User'},
comments: [{type: Number, ref: 'Comment'}],
likes : [{user: {type: Number, ref: 'User'}}],
approved: {status: Boolean, user: {type: Number, ref: 'User'}}
})
```
#### Register plugin
```javascript
// CHANGE from 1.x: need to pass in mongoose instance
var deepPopulate = require('mongoose-deep-populate')(mongoose);
PostSchema.plugin(deepPopulate, options /* more on options below */);
```
#### Perform population
On `Post` model:
```javascript
// Use callback
Post.deepPopulate(posts, 'comments.user', function (err, _posts) {
// _posts is the same instance as posts and provided for convenience
posts.forEach(function (post) {
// post.comments and post.comments.user are fully populated
});
});
// Use promise
Post.deepPopulate(posts, 'comments.user').then(...);
```
On an instance of `Post`:
```javascript
// Use callback
post.deepPopulate('comments.user', function (err, _post) {
// _post is the same instance as post and provided for convenience
});
// Use promise
post.deepPopulate('comments.user').then(...);
```
On `Query` (returns the same query object to chain):
```javascript
Post.find().deepPopulate('comments.user').exec(function (err, posts) { ... });
Post.findOne().deepPopulate('comments.user').exec(function (err, post) { ... });
Post.findById(id).deepPopulate('comments.user').exec(function (err, post) { ... });
```
#### Populate multiple paths
Pass paths in a space- or comma-delimited string:
```javascript
post.deepPopulate('user comments.user likes.user approved.user', cb);
```
Or use an array of strings:
```javascript
post.deepPopulate(['comments.user', 'user', 'likes.user', 'approved.user'], cb);
```
#### Specify options
Specify `whitelist` option to ensure only certain paths can be populated. This is to prevent potential performance and security issues if you allow API clients to supply population paths.
```javascript
PostSchema.plugin(deepPopulate, {
whitelist: [
'user',
'comments.user'
]
});
```
Use the `populate` option to supply paths with corresponding [Mongoose populate options](http://mongoosejs.com/docs/api.html#model_Model.populate).
```javascript
PostSchema.plugin(deepPopulate, {
populate: {
'comments.user': {
select: 'name',
options: {
limit: 5
}
},
'approved.user': {
select: 'name'
}
}
});
```
Use `rewrite` option to rewrite provided paths as well as paths in `whitelist` and `populate`. This is useful when you allow API clients to supply population paths (e.g. via query string) and want to make these paths more user-friendly. For example:
```javascript
PostSchema.plugin(deepPopulate, {
rewrite: {
author: 'user',
approver: 'approved.user'
}
});
// assume the query string is: ?populate=author,approver
post.deepPopulate(req.query.populate, cb);
```
##### Overriding options
You can override the above plugin options when invoking `deepPopulate`.
```javascript
Post.deepPopulate(posts, paths, {
whitelist: [],
populate: {},
rewrite: {}
}, cb)
post.deepPopulate(paths, {
whitelist: [],
populate: {},
rewrite: {}
}, cb);
Post.find({}).deepPopulate(paths, {
whitelist: [],
populate: {},
rewrite: {}
}).exec(cb)
```
### Test
The test suite will **drop the database** each run, so only run it against a test database. To run tests, execute this command where `--db` is the connection string.
```
gulp test --db mongodb://127.0.0.1/mongoose_deep_populate_test_db
```
### Changelog
#### v3.2.0
* [Bug] Support async callback #70
#### v3.1.1
* [Bug] Fix issue custom Promise not work in Mongoose 5
#### v3.1.0
* [Feature] Support Mongoose 5
#### v3.0.0
* [Feature] Return a promise when invoking `deepPopulate()` on model or model instance.
#### v2.0.3
* [Bug] Fix bug cannot use native ES6 Promise
#### v2.0.2
* [Bug] Fix bug populating when there is a subdocument within a linked document (see #29)
#### v2.0.0
* [Breaking] Need a mongoose instance passed to the function returned by `require`
* [Feature] Support mongoose promise provider
#### v1.1.0
* [Feature] Make mongoose a peer dependency to enforce supported versions
#### v1.0.2
* [Bug] Fix bug happening when Mongoose#populate does not infer the expected schema
#### v1.0.1
* [Bug] Apply `lean` to populated documents
#### v1.0.0
* [Feature] Apply `rewrites` to `whitelist` and `populate`
#### v0.0.7
* [Feature] Add `deepPopulate` to `Query`
* [Feature] Support space delimiter in paths
#### v0.0.6
* [Feature] Support populate options
* [Feature] Override options per call
* [Bug] Handle null paths and callback
#### v0.0.1
* Initial release
### License
MIT
| {
"pile_set_name": "Github"
} |
114 F.3d 955
1997 Copr.L.Dec. P 27,653, 43 U.S.P.Q.2d 1001,25 Media L. Rep. 1873, 97 Cal. Daily Op. Serv. 4369,97 Daily Journal D.A.R. 7285
URANTIA FOUNDATION, a non-profit foundation, Plaintiff-Appellant,v.Kristen MAAHERRA, Defendant-Appellee.
No. 95-17093.
United States Court of Appeals,Ninth Circuit.
Argued and Submitted Jan. 14, 1997.Decided June 10, 1997.
Gordon Dean Booth, Jr., Booth, Owens & Jospin, Atlanta, Georgia, and Robert S. Venning, Heller, Ehrman, White & McAuliffe, San Francisco, CA, for plaintiff-appellant.
Joseph D. Lewis, Cleary, Komen & Lewis, LLP, Washington, DC, Robert C. Lind, Los Angeles, CA, for defendant-appellee.
Appeal from the United States District Court for the District of Arizona; Warren K. Urbom, Senior District Judge, Presiding. D.C. No. CV-91-00325-SMM.
Before DONALD P. LAY,* GOODWIN, and SCHROEDER, Circuit Judges.
OPINION
SCHROEDER, Circuit Judge:
1
This is a copyright dispute between parties who believe the copyrighted work, the Urantia Book, was authored by celestial beings and transcribed, compiled and collected by mere mortals. In this litigation, the plaintiff-appellant Urantia Foundation claims that the defendant-appellee Kristen Maaherra infringed the Foundation's copyright when she distributed a computerized version of the Book on disk. Maaherra concedes copying, so the only issue before us is whether the Foundation owns a valid copyright in the Book.
2
The district court granted summary judgment to Maaherra on the ground that the Foundation's renewal copyright was invalid. Urantia Foundation v. Maaherra, 895 F.Supp. 1347 (D.Ariz.1995).1 The court determined that the Foundation was not a proper renewal claimant because the Book was not a "work made for hire," as claimed on the renewal certificate, and that even though the Book could have qualified as a "composite work," the Foundation had failed to show that it was its "proprietor." See 17 U.S.C. § 304(a) (providing that proprietors of composite works and works made for hire can claim renewal). We conclude that the Foundation has established that it was, at the time of renewal, the proprietor of a composite work, and that the mistaken description on the renewal certificate does not affect the validity of the renewal. We therefore reverse the district court's grant of summary judgment in favor of Maaherra.
BACKGROUND
3
Central to an understanding of the case is the history, as perceived by both parties, of the creation of the Book. Both parties believe that the words in the Book were "authored" by non-human spiritual beings described in terms such as the Divine Counselor, the Chief of the Corps of Superuniverse Personalities, and the Chief of the Archangels of Nebadon. These spiritual entities are thought to have delivered the teachings, that were eventually assembled in the Book, "through" a patient of a Chicago psychiatrist, Dr. Sadler.
4
The parties also agree that to understand these divine messages better and to share them with the rest of the world, Dr. Sadler formed a group of five or six followers, called the Contact Commission. At first, the members of the Contact Commission started discussing the divine teachings among themselves. Then, apparently in response to what they perceived to be prompting from the spiritual beings, and in collaboration with a larger group of followers called the Forum, the Contact Commission began to pose specific questions to the spiritual beings. The answers to these questions, as transmitted to the humans and arranged by them, became the Urantia Papers. At some point, the manuscript containing the Papers was intentionally destroyed after the creation of about 2,000 printing plates.
5
Members of the Contact Commission, including founding member Dr. Sadler, then formed the Urantia Foundation, an Illinois charitable trust, for one purpose: to preserve and disseminate the teachings contained in the Papers. It appears that the Foundation was, at least initially, headquartered at Dr. Sadler's home. The Contact Commission transferred the printing plates to the Foundation through the trust instrument.
6
The transfer is detailed in a district court opinion, arising in another circuit, and also involving the validity of the Foundation's copyright in the Book, but analyzing the validity of the original, rather than the renewal copyright. Urantia Foundation v. Burton, 210 U.S.P.Q. 217 (W.D.Mich.1980). The Burton court found that the trust instrument described the Foundation's primary estate as consisting of the printing plates on which the Papers were inscribed. The instrument also provided that the trustees were specifically empowered, and had the duty, "to retain absolute and unconditional control of all plates and other media for the printing and reproduction of the Urantia Book and any translation thereof...." Id. at 219 (citing to Paragraph 3.3 of the trust instrument).
7
The Foundation published the Book in 1955. The original copyright certificate was issued to the Foundation in 1956. The Foundation renewed the copyright in 1983.
8
In 1990, Maaherra, who resides in Arizona, and who describes herself as "an avid reader of the [Book] since 1969," prepared a study aid that included the entire text of the Book and started distributing it free of charge to various individuals. That same year, the Foundation learned that someone was distributing the Book on computer disks, using the Foundation's trademarks. Upon discovering that Maaherra was responsible for this, the Foundation filed the instant suit in 1991. See Urantia Foundation v. Maaherra, 895 F.Supp. 1338 (D.Ariz.1995) (recounting this chronology).
9
This appeal is from the district court's October 25, 1995 amended final judgment based on its February 10, 1995 order granting summary judgment to Maaherra on the Foundation's copyright infringement claim. See Urantia, 895 F.Supp. at 1347.
DISCUSSION
Copyrightability of the Book
10
A threshold issue in this case is whether the work, because it is claimed to embody the words of celestial beings rather than human beings, is copyrightable at all. "To qualify for copyright protection, a work must be original to the author." Feist Publications, Inc. v. Rural Telephone Service Company, Inc., 499 U.S. 340, 345, 111 S.Ct. 1282, 1287, 113 L.Ed.2d 358 (1991) (citation omitted). The core statute, 17 U.S.C. § 102(a), provides:
11
[c]opyright protection subsists ... in original works of authorship fixed in any tangible medium of expression, ... from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.
12
17 U.S.C. § 102(a). "Original, as the term is used in copyright, means only that the work was independently created by the author (as opposed to copied from other works), and that it possesses at least some minimal degree of creativity." Feist, 499 U.S. at 345, 111 S.Ct. at 1287 (citation omitted).
13
Maaherra claims that there can be no valid copyright in the Book because it lacks the requisite ingredient of human creativity, and that therefore the Book is not a "work of authorship" within the meaning of the Copyright Act. The copyright laws, of course, do not expressly require "human" authorship, and considerable controversy has arisen in recent years over the copyrightability of computer-generated works. See Arthur R. Miller, Copyright Protection for Computer Programs, Databases, and Computer-Generated Works: Is Anything New Since CONTU?, 106 Harv.L.Rev. 977 (1993). We agree with Maaherra, however, that it is not creations of divine beings that the copyright laws were intended to protect, and that in this case some element of human creativity must have occurred in order for the Book to be copyrightable. At the very least, for a worldly entity to be guilty of infringing a copyright, that entity must have copied something created by another worldly entity.
14
The district court held that the Book was copyrightable. However, if the court erred in this regard, we need not reach the other issues in the case.
15
The copyrightability issue is not a metaphysical one requiring the courts to determine whether or not the Book had celestial origins. In this case, the belief both parties may have regarding those origins, and their claim that the Book is a product of divine revelation, is a matter of faith, and obviously a crucial element in the promotion and dissemination of the Book. For copyright purposes, however, a work is copyrightable if copyrightability is claimed by the first human beings who compiled, selected, coordinated, and arranged the Urantia teachings, "in such a way that the resulting work as a whole constitutes an original work of authorship." 17 U.S.C. § 101 (defining a "compilation"). See also 17 U.S.C. § 103 (providing that compilations are copyrightable). Those who were responsible for the creation of the tangible literary form that could be read by others, could have claimed copyright for themselves as "authors," because they were responsible for the revelations appearing " 'in such a way' as to render the work as a whole original." Feist, 499 U.S. at 358, 111 S.Ct. at 1294 (referring to the statutory definition of compilation).
16
The Supreme Court in Feist, supra, held that the white pages of the plaintiff's telephone directory did not qualify for copyright protection, because there was nothing original about listing names of the area's telephone subscribers in alphabetical order. Yet Feist also recognized that a compilation of facts may possess the requisite originality when the author chooses which facts to include, in what order to place them, and how to arrange the data so that readers may use them effectively. Feist simply reaffirmed what the statute provides and what had been known since The Trade-Mark Cases, 100 U.S. 82, 25 L.Ed. 550 (1879) and Burrow-Giles Lithographic Co. v. Sarony, 111 U.S. 53, 4 S.Ct. 279, 28 L.Ed. 349 (1884): that copyright protection only extends to those components of the work that are "original" to the "author", and not to the facts themselves. Feist, 499 U.S. at 346-47, 350-51, 111 S.Ct. at 1288-89, 1290-91.
17
In this case, the Contact Commission may have received some guidance from celestial beings when the Commission posed the questions, but the members of the Contact Commission chose and formulated the specific questions asked. These questions materially contributed to the structure of the Papers, to the arrangement of the revelations in each Paper, and to the organization and order in which the Papers followed one another. We hold that the human selection and arrangement of the revelations in this case could not have been so "mechanical or routine as to require no creativity whatsoever." Feist, 499 U.S. at 362, 111 S.Ct. at 1296. We conclude, therefore, that the "extremely low" threshold level of creativity required for copyright protection has been met in this case. See Feist, 499 U.S. at 345, 111 S.Ct. at 1287. ("The vast majority of works make the grade quite easily, as they possess some creative spark, 'no matter how crude, humble, or obvious' it might be.") (quotation omitted).
18
It must be remembered that the claim of copyright infringement in this case concerns the verbatim copying of the entire Urantia Book, including the selection and arrangement of the revelations into the Papers that comprise the Book. This case does not concern the use of a single "revelation" outside the context of the Book, which for purposes of this case would be analogous to a "fact," and which of course would not be copyrightable. See Feist, 499 U.S. at 347, 111 S.Ct. at 1288-89.
19
This principle, the distinction between revelations as facts and the expression of these revelations, was recognized in a 1941 copyright infringement case that involved similar claims of divine authorship. Oliver v. Saint Germain Foundation, 41 F.Supp. 296 (S.D.Cal.1941). In Oliver, as here, the plaintiff's religious text proclaimed that the facts contained in the text had come straight from a spirit, and that the spirit was the author of the history in the text. Id. at 297. In that case, however, the plaintiff (unsuccessfully) claimed copyright protection in the divine revelations themselves, and in the methods of spiritual communication, rather than in the plaintiff's specific selection or arrangement of these divine revelations. The defendant in Oliver had not copied that arrangement and selection, but simply had written another text using the same divine "facts." Id. at 299. The court in Oliver made it clear that, had the claim been that the selection and arrangement of the divine revelations had been infringed, the plaintiff's copyright infringement claim might have had merit. Id.
20
Thus, notwithstanding the Urantia Book's claimed non-human origin, the Papers in the form in which they were originally organized and compiled by the members of the Contact Commission were at least partially the product of human creativity. The Papers thus did not belong to that "narrow category of works in which the creative spark is utterly lacking or so trivial as to be virtually nonexistent." Feist, 499 U.S. at 359, 111 S.Ct. at 1294 (citation omitted). Therefore, the Papers were works amenable to common law copyright protection, and the district court correctly so held.
21
Ownership of the Copyright at the Time of Original Publication
22
The district court held that even though a common law copyright was created at the time the Papers came into being, the Foundation itself had not adequately shown that it owned that copyright in 1955, when it published the Book, so as to entitle it to claim the statutory copyright. Urantia, 895 F.Supp. at 1350-51, 1354. Because the district court was of the opinion that the Foundation had come into possession of the plates "serendipitously," the court found that the Foundation had failed to establish how it had become the "proprietor" of the copyright in the Papers. Id. at 1354.
23
The district court accurately observed that the selection of Dr. Sadler's patient as the amanuensis for communicating the teachings eventually transcribed on the plates was indeed serendipitous. We believe the controlling issue, however, is whether, as of the time of publication, the Foundation, the copyright claimant, could trace its title back to the humans who owned the original common law copyright. We hold that it could.
24
Under the 1909 Copyright Act, 17 U.S.C. §§ 1, et. seq. (superseded in 1978), an unpublished work was protected by common law copyright from the moment it was created, until it was either published with proper notice, or otherwise received protection under federal copyright law. See Twin Books Corp. v. Walt Disney Co., 83 F.3d 1162, 1165 (9th Cir.1996). The Papers were therefore protected by common law copyright from the moment they were created by the members of the Contact Commission until publication of the Book. The question is whether those humans transferred that copyright to the Foundation.
25
Even though the precise words "assign" or "transfer" do not appear in the trust instrument, the members of the Contact Commission demonstrated their intent to transfer the common law copyright in the Papers to the Foundation both through the language of the trust instrument itself, and by delivery of the printing plates to the Foundation. The trust instrument provided that the trustees of the Foundation were "to retain absolute and unconditional control of all plates and other media for the printing and reproduction of the Urantia Book and any translation thereof...." See Burton, supra, at 219. Under the 1909 Act, a common law copyright could be assigned without the necessity of observing any formalities. D. Nimmer & M.B. Nimmer, Nimmer on Copyright, § 10.03[B], at 10-45 (1996) [hereinafter Nimmer ]. In fact, the mere possession of the printing plates by the Foundation, the purported assignee, may have been sufficient to establish an assignment as against a third party, such as Maaherra, who does not claim any superior copyright interest. Id. at 10-46. Professor Nimmer notes that "[t]his was particularly true where over a long period of time, the author and other interested parties had acquiesced in the putative assignee's ownership." Id. (citing, inter alia, Burton, supra ). Because the intent to transfer ownership of the plates to the Foundation was clear, and the plates were delivered to the Foundation, we hold that the members of the Contact Commission also intended to transfer, and did in fact transfer, their copyright in the Papers to the Foundation. Thus, when the Foundation published the Book in 1955, the original statutory copyright in the Book automatically vested in the Foundation. See Nimmer, § 9.01[B] at 9-17.
26
That does not conclude our inquiry, however, because we are dealing here not only with the validity of the original copyright, but with the validity of the renewal.
Validity of the Renewal
27
Maaherra challenges on a number of theories, the validity of the copyright renewal certificate the Foundation obtained in 1983. The certificate stated that the Foundation was claiming renewal as the "proprietor of copyright in a work made for hire." Maaherra first contends that the Book was not a "work made for hire" and that the renewal for that reason is invalid.
28
The 1983 version of the renewal provision of the 1976 Copyright Act, applicable to the Foundation's renewal, had two provisos: one dealing with renewals by proprietors of certain works and the other dealing with the renewals of all other works. The statute stated in relevant part:
29
Any copyright, the first term of which is subsisting on January 1, 1978, shall endure for twenty-eight years from the date it was originally secured: Provided, that in the case of any posthumous work or of any periodical, cyclopedic, or other composite work upon which the copyright was originally secured by the proprietor thereof, or of any work copyrighted by a corporate body (otherwise than as assignee or licensee of the individual author), or by an employer for whom such work is made for hire, the proprietor of such copyright shall be entitled to a renewal and extension of the copyright in such work for the further term of 47 years.... And provided further, that in the case of any other copyrighted work, including a contribution by an individual author to a periodical or to a cyclopedic or other composite work, the author of such work, if still living, or the widow, widower, or children of the author, if the author be not living, or if such author, widow, widower, or children be not living, then the author's executors, or in the absence of a will, his or her next of kin shall be entitled to a renewal and extension of the copyright in such work for a further term of 47 years....
30
17 U.S.C. § 304(a)(1983).
31
As to whether the Book was a "work made for hire," Maaherra is probably correct that it was not. The Foundation was never the employer of any of the spiritual beings, of Dr. Sadler, of the Contact Commission, or of any other entity that played a role in the creation of the Papers that were eventually transferred to the Foundation. An employment (or commissioning) relationship at the time the work is created is a condition for claiming renewal as the proprietor of a "work made for hire". See 17 U.S.C. § 101; Bleistein v. Donaldson Lithographing Co., 188 U.S. 239, 23 S.Ct. 298, 47 L.Ed. 460 (1903); Lin-Brook Builders Hardware v. Gertler, 352 F.2d 298 (9th Cir.1965); Rohauer v. Friedman, 306 F.2d 933 (9th Cir.1962).
32
Before the district court and on appeal, the Foundation has contended that it would have been entitled to claim renewal as the "proprietor of a composite work." The district court rejected this contention. Urantia, 895 F.Supp. at 1354. The problem, in the district court's view, was not whether the structure of the Book satisfied the definition of a "composite work;" the district court assumed that it did. Rather, the district court held that the Foundation had failed to establish "proprietorship" at the time the original copyright was secured because it had failed to show a "contractual arrangement entitling [it] to secure copyright in the various contributions." Urantia, 895 F.Supp. at 1354 (citing Cadence Industries Corp. v. Ringer, 450 F.Supp. 59, 64 (S.D.N.Y.1978)). On this point, we have held the court erred. The language of the trust instrument was, moreover, very broad, and sufficient to transfer not only the interest in the original copyright term, but in the renewal as well. See Burton, supra, at 219.
33
Maaherra on appeal also contends that even if the Foundation would have been entitled to secure the Book's renewal rights as the "proprietor of a composite work," the inaccuracy in the description of the claim in the Foundation's application for renewal destroyed the validity of its renewal copyright. This issue the district court did not decide.
34
Timeliness was the only clear statutory requirement for copyright renewal of a work whose original statutory copyright was secured prior to January 1, 1964. The renewal statute in effect at the time the Foundation renewed its copyright in the Book required the claimant to apply for and register its renewal claim within the last year of the original copyright term. See 17 U.S.C. § 304(a) (1983) (providing that copyright was properly renewed "where application for ... renewal ... shall have been made to the Copyright Office and duly registered therein within one year prior to the expiration of the original term of copyright" and that "in default of the registration of such application for renewal ... the copyright in any work shall terminate at the expiration of twenty-eight years from the date copyright was originally secured[ ]").2 Thus, the Foundation had to renew the Book's copyright by December 31, 1983, when the original copyright term was to expire. See 17 U.S.C. § 305 (copyright terms "run to the end of the calendar year in which they would otherwise expire[ ]"). The Foundation timely applied for renewal in January of 1983.
35
Maaherra contends, however, that timeliness is not enough. Focusing on the language of the first proviso of Section 304(a), and on a Copyright Office regulation which provides the manner in which renewal registrations may be corrected, 37 C.F.R. § 201.5(b)(2)(iv), she argues that because the renewal certificate described the Foundation as the "proprietor of a work made for hire" rather than as the "proprietor of a composite work", the renewal registration is not valid.
36
The regulation upon which Maaherra relies, provided in 1983:
37
Supplementary registration to correct a renewal claimant or basis of a claim in a basic renewal registration may be made only if the application for supplementary registration and fee are received in the Copyright Office within the statutory time limits for renewal. If the error or omission in a basic renewal registration is extremely minor, and does not involve the identity of the renewal claimant or the legal basis of the claim, supplementary registration may be made at any time. Supplementary registration is not appropriate to add a renewal claimant.
38
37 C.F.R. § 201.5(b)(2)(iv) (1983). The regulation would thus have permitted the Foundation to file a supplementary registration to correct its basic registration at any time during the renewal period, if the error was minor and did not "involve the identity of the renewal claimant or the legal basis for the claim." Id. However, corrections to the "identity" of the claimant or to the "legal basis of the claim" could only have been made within the statutory time limits for renewal, which in this case would have expired December 31, 1983.
39
Maaherra claims that because the error the Foundation made in describing the nature of its proprietorship involves "the legal basis of the claim," the error can no longer be corrected, and therefore, the Book was injected into the public domain in 1983. There are serious problems with this argument.
40
First, it is not at all clear that the regulation's reference to the "legal basis of the claim" contemplates the identification of a particular type of proprietorship described in the first proviso of section 304(a). Given the structure of the statute, the general term "proprietor" was probably sufficient to identify the "legal basis" of the renewal claim in 1983.
41
Moreover, we have found no case that has ever held a renewal invalid for lack of an adequate description of the basis of the claim. The only cases in which renewals have been forfeited have involved renewals filed by the wrong claimant, not by someone describing the wrong type of proprietorship. The second proviso of section 304(a) establishes the priority to renewal rights for authors and their statutory heirs. There are cases holding renewal registrations under this proviso void, where the renewal was filed in the name of a person who was a member of the next succeeding class, when members of a priority class living at the time the renewal vested should have filed the renewal, but did not. See Nimmer § 9.05[D] at 9-85 (citing, inter alia, Marks Music Corp. v. Borst Music Pub. Co. Inc., 110 F.Supp. 913 (D.N.J.1953); Yardley v. Houghton Mifflin Co., 25 F.Supp. 361 (S.D.N.Y.1938), aff'd, 108 F.2d 28 (2d Cir.1939)). In such cases, however, in contrast to the situation here, the person filing for renewal was not statutorily entitled to renew under any theory; someone else was. See International Film Exch., Ltd. v. Corinth Films, Inc., 621 F.Supp. 631 (S.D.N.Y.1985) (rejecting renewal application because the renewal was filed in the name of a licensee, instead of being filed in the name of the author, or by the copyright proprietor). As we have seen, the Foundation was in fact a proper renewal claimant because it was the "proprietor" of the Book both in 1955 and in 1983.
42
Furthermore, even the requirement of accurate identification of the renewal claimant has not been rigidly enforced. In at least one case, the actual name of the claimant corporation was mistakenly stated in the renewal application, yet the infringement action was permitted to go forward. Bourne Co. v. Walt Disney Co., 25 U.S.P.Q.2d 1975, 1976 (S.D.N.Y.1992), aff'd on other grounds, 68 F.3d 621 (2d Cir.1995), cert. denied, --- U.S. ----, 116 S.Ct. 1890, 135 L.Ed.2d 184 (1996). See also Nimmer, § 9.05[D] at 9-85-86, (favorably citing Bourne for refusing to cause a forfeiture of copyright based on "useless technicalities").
43
All of this strongly suggests that even if the Foundation can no longer correct the "work made for hire" description of its proprietorship claim on the renewal form, the Foundation's renewal copyright is not invalid. There is, however, even more compelling authority for this result.
44
The case law is overwhelming that inadvertent mistakes on registration certificates do not invalidate a copyright and thus do not bar infringement actions, unless the alleged infringer has relied to its detriment on the mistake, or the claimant intended to defraud the Copyright Office by making the misstatement. See, e.g., Nimmer, § 7.20 at 7-201 and n. 6 ("[A] misstatement or clerical error in the registration application if unaccompanied by fraud will not invalidate the copyright or render the registration certificate incapable of supporting an infringement action."), S.O.S, Inc. v. Payday, 886 F.2d 1081 (9th Cir.1989); Harris v. Emus Records, 734 F.2d 1329 (9th Cir.1984) (citing to Burton, supra, and Urantia Foundation v. King, 194 U.S.P.Q. 171, 174-175 (C.D.Cal.1977)); Datastorm Technologies, Inc. v. Excalibur Communications, Inc., 888 F.Supp. 112 (N.D.Cal.1995); Gund, Inc. v. Swank, Inc., 673 F.Supp. 1233 (S.D.N.Y.1987); Craft v. Kobler, 667 F.Supp. 120 (S.D.N.Y.1987); Dynamic Solutions, Inc. v. Planning & Control, Inc., 646 F.Supp. 1329 (S.D.N.Y.1986); Alart Assocs. Inc. v. Aptaker, 279 F.Supp. 268 (S.D.N.Y.1968), appeal dismissed, 402 F.2d 779 (2d Cir.1968).
45
We are aware that most of the cases applying a fraud or prejudice standard, and permitting infringement actions despite inaccuracies in registration, involve defects in original registration certificates rather than in renewals. Original registrations can be changed at any time during the original term of copyright, while, as discussed earlier, certain errors in the renewal registration of pre-1964 works, such as the Book, could only be corrected in the last year of the original term. 17 U.S.C. § 304(a)(1983); 37 C.F.R. § 201.5(b)(2)(iv)(1983). However, the reasoning of these cases does not turn on whether or not correction is possible. Indeed, in this circuit, a lead decision applying the fraud or prejudice standard, contains language strongly implying that this standard should apply across the board, regardless of whether the applicable statutes or regulations permit corrections. See Harris, supra, at 1335 (rejecting defendant's contention that the work had entered into the public domain because of inaccuracies in the copyright registration, and noting that the 1909 Copyright Act did not contain a statutory or regulatory scheme providing opportunity for correction of mistakes in copyright registrations).
46
These cases generally do not require perfection, but instead base their analyses on principles of fair and non-formalistic administration of the copyright laws. See, e.g., Huk-a-Poo Sportswear, Inc. v. Little Lisa, Ltd., 74 F.R.D. 621 (S.D.N.Y.1977) ("This court is mindful of the policy that courts seek to preserve copyrights rather than invalidate them on the basis of minor defects in registration certificates."); Craft, supra, at 125 (even though the copyright owner had not claimed "work for hire" on the certificate of registration, the court noted that "if the facts sustain his position and if it appears that the misstatement was inadvertent, little turns on the error; the copyright is not thereby invalidated, nor is the certificate of registration rendered incapable of supporting the action").
47
Maaherra argues that the Foundation's claim is nevertheless barred even under the holdings of these cases because the Foundation intended to defraud the Copyright Office when it stated it was the "proprietor of a work made for hire." See Dynamic Solutions, supra, at 1341 ("Errors on the registration application do not affect plaintiff's right to sue for infringement unless they are knowing and might have caused the Copyright Office to reject the application.") Maaherra asserts that the Foundation did not want to reveal to the Copyright Office that the "authors" were celestial beings because the Copyright Office would have rejected the application.
48
There is no merit to this contention. The Foundation deposited two copies of the Book with the Copyright Office. The Book clearly describes its own origin as having been created at the instance of: "Planetary celestial supervisors [who initiated] those petitions that resulted in the granting of the mandates making possible the series of revelations of which this presentation is a part." We conclude that there has been no fraud on the Foundation's part, and no prejudicial reliance on Maaherra's part.
49
We therefore hold that the Foundation's renewal copyright is valid, and that Maaherra infringed it.
50
For the foregoing reasons, the decision of the district court is REVERSED and the case REMANDED for further proceedings on damages.
*
The Honorable Donald P. Lay, Senior United States Circuit Judge for the Eighth Circuit, sitting by designation
1
The district court published six orders: Urantia Foundation v. Maaherra, 895 F.Supp. 1328 (D.Ariz.1995); Urantia Foundation v. Maaherra, 895 F.Supp. 1329 (D.Ariz.1995); Urantia Foundation v. Maaherra, 895 F.Supp. 1335 (D.Ariz.1995); Urantia Foundation v. Maaherra, 895 F.Supp. 1337 (D.Ariz.1995); Urantia Foundation v. Maaherra, 895 F.Supp. 1338 (D.Ariz.1995); Urantia Foundation v. Maaherra, 895 F.Supp. 1347 (D.Ariz.1995)
2
The harshness of that rule led Congress to amend the renewal provision in 1992 to provide for automatic renewal. See Copyright Renewal Act of 1992, Pub.L. 102-307, Sec. 101, 106 Stat. 264 (June 26, 1992) (applying only to works whose original statutory copyright was obtained after December 31, 1963)
| {
"pile_set_name": "FreeLaw"
} |
МВФ считает общую поддержку как сумму двух компонент — скрытые субсидии за счет скидок на российские энергоносители и чистая финансовая поддержка. Получается наиболее широкая оценка, поскольку в составе финансовой поддержки МВФ учитывает не только межгосударственные кредиты, но и баланс взаимных прямых инвестиций, а также кредиты для Минска по линии Евразийского фонда стабилизации и развития (ЕФСР, бывший антикризисный фонд ЕврАзЭС), ресурсы которого на 88% сформированы российскими взносами (на конец 2015 года Минск был должен фонду $1,94 млрд, а в 2016 году занял там еще $800 млн).
Госпомощь
Такой подход может быть не совсем честен, если требуется оценить именно государственную финансовую помощь, говорит аналитик АКРА Дмитрий Куликов, — среди прямых иностранных инвестиций есть частные, они могут приносить реальный доход, когда в Россию возвращаются дивиденды или проценты. По его мнению, разумно было бы взять для расчета задолженность Белоруссии по госкредитам (включая кредиты российских госбанков белорусскому правительству) и сумму накопленных субсидий по нефтегазовым поставкам, а прямые инвестиции не учитывать.
Задолженность Белоруссии по межправительственным кредитам от России на конец 2015 года составляла $6,02 млрд, следует из платежного баланса союзного государства, доступного на сайте Банка России (обзора за 2016 год еще нет). Минфин России отказался раскрыть РБК текущую задолженность белорусского правительства, а Минфин Белоруссии не ответил на запрос РБК. В последний раз о межправительственном займе публично сообщалось в июле 2015 года, когда Минск получил российский кредит на $760 млн. Как следует из платежного баланса Белоруссии с Россией за 2016 год (доступен на сайте белорусского Нацбанка), в прошлом году чистые заимствования белорусского правительства в России составили $250 млн, но это могли быть займы у российских госбанков. Их помощь — большой канал российских вливаний в белорусскую экономику.
В 2012 году Внешэкономбанк договорился предоставить Белоруссии до $10 млрд под строительство Белорусской АЭС по межправительственному соглашению, но пока выделен только первый транш в размере $500 млн (в мае 2014 года), а выбрано из него только $248 млн, говорил в декабре глава ВЭБа Сергей Горьков. Сбербанк кредитовал государственный «Беларуськалий» — на $900 млн в 2011 году и на $550 млн в 2015-м. В целом по состоянию на 1 октября российские банки держали в Белоруссии активы на $4,9 млрд (за вычетом их обязательств там — $3,7 млрд). ВЭБ, Сбербанк и Газпромбанк не ответили на запросы РБК, а ВТБ сообщил, что портфель кредитов его белорусской «дочки» местным предприятиям с госучастием составляет в пересчете с белорусских рублей около $75 млн.
Крупнейший инвестор Прямые инвестиции (ПИИ) России в белорусскую экономику занимают от 57 до 64% общих иностранных вложений в страну, по данным Нацбанка Белоруссии за 2010–2015 годы. При этом российские ПИИ в Белоруссию сокращаются, показывает статистика российского ЦБ (см. инфографику): чистые накопленные инвестиции достигали пика в 2010 году ($5,6 млрд), а на 1 октября 2016 года составляли $3,4 млрд. Официальная российская статистика занижает объем вложений в Белоруссию, утверждает Центр интеграционных исследований Евразийского банка развития (ЕАБР), который ведет собственный мониторинг взаимных прямых инвестиций в СНГ. Если по данным ЦБ размер накопленных инвестиций из России в Белоруссию в 2015 году составил $3,6 млрд, то мониторинг ЕАБР показывает цифру $8,3 млрд. Банк помимо прочего анализирует корпоративную отчетность и сообщения СМИ; кроме того, в отличие от российского регулятора он учитывает инвестиции через офшоры и другие «перевалочные базы» капитала. Показатель ЦБ включает курсовые, рыночные переоценки и прочие изменения. Белоруссия — лидер по российским входящим инвестициям среди стран Евразийского экономического союза. Впрочем, это произошло главным образом за счет покупки «Газпромом» компании «Белтрансгаз» (сейчас — «Газпром трансгаз Беларусь»), на которую концерн потратил $5 млрд в период с 2007 по 2011 год. Другие значимые российские проекты — инвестиции в «дочки» ВЭБа и МТС, в магистральный трубопровод «Транснефти» и Мозырский НПЗ.
Сколько теряет Россия?
До 90% экономической поддержки Белоруссии со стороны России в понимании МВФ приходится на скрытые субсидии по поставкам газа, нефти и нефтепродуктов. Заведующий сектором «Экономика и финансы» Института энергетики и финансов Сергей Агибалов оценивает, что общий объем российского субсидирования Белоруссии льготными поставками энергоносителей с начала 2000-х годов составил почти $100 млрд, или свыше 200% белорусского ВВП за 2016 год. Субсидии по газу в 2001–2016 годах составили $49,4 млрд, по нефти — $46,9 млрд, следует из расчетов Агибалова для РБК. И в отличие от кредитов, которые возвращаются с процентами, нефтегазовые льготы для Белоруссии — это безвозвратные косвенные потери российского бюджета. «Это для нас не выброшенные деньги — это просчитанные шаги в расчете на будущий результат», — уверял Владимир Путин в конце февраля.
«Все годы независимости Белоруссия получала газ от России на исключительно выгодных условиях — в отдельные годы она покупала газ в разы дешевле, чем все соседние европейские страны», — отмечает Агибалов. Газовую льготу он рассчитывает как разницу в цене импорта с Германией (это сопоставимый крупный потребитель, цена российского газа на границе с Германией публикуется в открытых источниках, и ее можно считать рыночной конкурентоспособной ценой, объясняет он). Но в 2016 году газовая субсидия резко сократилась — всего лишь до $350 млн с $2,2 млрд годом ранее, по расчетам Агибалова; и российские власти к концу марта 2017 года насчитали уже $700 млн задолженности Белоруссии за поставленный газ.
Россия поставляет Белоруссии сырую нефть беспошлинно, а перерабатываемые нефтепродукты поставляются Белоруссией за границу с взиманием пошлины и зачислением ее в белорусский бюджет. Субсидирование со стороны России в последнее время сократилось из-за особенностей экспортной пошлины. Снижение мировых цен на нефть приводит к меньшему снижению цен на импорт сырой нефти, которую Белоруссия ввозит из России, по сравнению со снижением цен на нефтепродукты, которые Белоруссия экспортирует, — это следствие налогового маневра в российской нефтяной отрасли, объясняет Евразийский банк развития. «При высоких ценах на нефть Белоруссия покупала ее в два раза дешевле рыночной цены, а сейчас — на 25% дешевле, — констатирует директор Центра исследований международной торговли РАНХиГС Александр Кнобель. — Россия зависит от нефти и газа, а Белоруссия точно так же зависит от российской нефтегазовой конъюнктуры. Если она ухудшается, то обостряются проблемы».
Сможет ли Белоруссия уйти от России?
На фоне сокращения российской экономической поддержки Минск пытается диверсифицировать источники финансовой помощи и внешнюю торговлю, опирающуюся на Россию, но сделать это сложно, отмечает ведущий эксперт Центра развития ВШЭ Сергей Пухов. Белоруссия с 2015 года ведет переговоры с МВФ о потенциальном кредите до $3 млрд, а снятые в 2016 году со страны санкции Евросоюза в принципе открыли возможность для кредитов от Европейского банка реконструкции и развития (ЕБРР) и Европейского инвестиционного банка.
«В плане торговли Белоруссия, конечно, пытается диверсифицировать свой экспорт, наладить поставки в страны Евросоюза, не хочет ни в коем случае терять украинский рынок, — добавляет Александр Кнобель. — Россия для Белоруссии — это половина торговли, вторая половина — это Украина, Евросоюз (в основном Польша и Прибалтика), Россия — главнейший партнер, но Минск хочет эту долю снизить и нарастить присутствие на европейских рынках».
Но Андреас Швабе говорит, что при Лукашенко Белоруссия вряд ли сможет отвернуться от России. «Запад в обмен на существенную финансовую поддержку, вероятно, потребует от Минска экономических реформ, что ослабило бы контроль Лукашенко над экономикой и государством в целом — а это для него неприемлемо», — рассуждает экономист. Да и Россия после 2014 года показала своей политикой на постсоветском пространстве, что не «позволит» Белоруссии пойти на такой шаг.
При участии Олега Макарова | {
"pile_set_name": "OpenWebText2"
} |
Q:
Raising $e$ to the power of a matrix
Does there exist a definition for matrix exponentiation? If we have, say, an integer, one can define $A^B$ as follows:
$$\prod_{n = 1}^B A$$
We can define exponentials of fractions as a power of a radical, and we even have the following definition of the exponential:
$$e^z = \sum_{n = 0}^\infty \frac{z^n}{n!}$$
which comes from a taylor series for the function $\exp(z)$. Now, a problem seems to arise when we attempt to calculate $\exp(A)$, where $A$ is an $n$ x $n$ (square) matrix. We cannot define it as multiplication a "matrix number of times" as this makes no sense. The only reasonable definition that could work is the latter definition (the infinite series):
$$e^A = 1 + A + \frac{AA}{2!} + \frac{AAA}{3!} + \frac{AAAA}{4!} + \cdots$$
where we can define matrix exponentiation to the power of an integer, which is all that is required here. We know that $e^x$ will converge absolutely for all complex numbers, but do we know that this is true for matrices? Can this "matrix sum" diverge, and are there ways to test divergence/convergence when a matrix is applied? Or is this concept of "matrix divergence" not well defined?
Thanks.
A:
Yes, the exponential of a matrix can be defined by that Taylor series, and it is a very useful thing. See
e.g. Wikipedia
The proof that it converges is not difficult, using any sub-multiplicative matrix norm. If $\| \cdot \|$ is such a norm, then any power series
$\sum_n c_n A^n$ converges
whenever the real series $\sum_n |c_n| \|A\|^n$ converges.
A:
My favourite definition - as I teach quite often ODEs - is using differential equations.
Let us first note that $x(t)=\mathrm{e}^{at}$ is the unique solution of the initial value problem:
$$
x'=ax, \quad x(0)=1.
$$
Generalise that a little bit: Let $A$ be a square matrix ($A\in\mathbb R^{n\times n}$). Define as $\mathrm{e}^{tA}$ the unique, and globally defined, solution of
$$
X'=AX, \quad X(0)=I,
$$
where $X$ is an $n\times n$ matrix, and $I$ the identity matrix. Through this definition a lot of properties of the exponential of a matrix, (which in order to prove require messy calculations) are proved very elegantly if we use the above definition.
| {
"pile_set_name": "StackExchange"
} |
WASHINGTON—An 11th-hour Republican push to undo large parts of the Affordable Care Act suffered an apparently lethal blow Friday when Sen. John McCain (R., Ariz.) said he wouldn’t support the plan, prompting congressional aides of both parties to say they saw no path forward for the bill.
Mr. McCain’s opposition came the same day another Republican, Susan Collins of Maine, said she was leaning against the legislation. Sen. Rand Paul (R., Ky.) had already said he wouldn’t vote for it, and GOP leaders can only afford to lose two Republican votes.
The surprise statement by Mr. McCain marked the second time he had opposed Republican health legislation at a critical moment; he cast a “no” vote that helped sink a previous version, in July. Mr. McCain’s decision was especially resonant given his close friendship with Sen. Lindsey Graham (R., S.C.), the bill’s chief sponsor along with Sen. Bill Cassidy (R., La.).
“I cannot in good conscience vote for the Graham-Cassidy proposal,” Mr. McCain said. “I believe we could do better working together, Republicans and Democrats, and have not yet really tried.”
Mr. Graham said his bill would reverse what he called the ACA’s Washington-centered health approach and give more power to states. “I feel an obligation to fix this disaster,” he said of the ACA. “We press on.” | {
"pile_set_name": "OpenWebText2"
} |
The invention described herein may be made, used and licensed by and for The United States for governmental purposes without paying me any royalty.
In one aspect this invention relates to tailgate structures useful with large trucks. In a further aspect, this invention relates to an improved ladder structure for use with large trucks to facilitate ingress and egress by personnel from the vehicle.
Military cargo vehicles are also used to carry troops. These cargo vehicles are made in a wide variety of sizes and configurations to meet various needs and because the military must operate off road over very rough terrain, the axles and cargo bed are usually a substantial distance from the ground This makes it impossible for a person to enter the vehicle from ground level without at least one assisting step.
Presently the most common assisting step at the rear of a military cargo vehicle is a bracket extending above the tailgate used as a combination handle and step when the tailgate is lowered, troops or personnel entering the vehicle can step onto the bracket and then onto the cargo bed. This configuration has problems. First the bracket/step is generally a substantial height from the ground when the tailgate is lowered. This makes it difficult for many persons, particularly shorter persons to use the step. Also, the second step from the bracket onto the cargo bed is substantial in most cases. These problems are compounded by the fact that troops are frequently required to enter carrying battle gear which may weigh 100 pounds or more. This additional weight is not evenly distributed on their body and negatively effects balance. The resulting bracket structure slows the passage of persons from the truck, increases the chances for an accident, and increases exposure to weapons fire under battlefield conditions.
It would be desirable to have a ladder structure associated with the existing vehicle tailgate structure to provide additional steps when the tailgate is lowered and which can be stored on the tailgate when the tailgate is in its upright position.
The present invention relates to a ladder structure, for use with a cargo truck having a raised cargo bed with a tailgate, to improve ingress and egress of people to the cargo bed. The ladder structure has a bracket rigidly mounted to the tailgate with a mounting stud bond one comer of the bracket for mounting the ladder structure. The bracket also has first and second retention bosses, the bosses being located on the bracket a predefined distance from the mounting stud. The bracket may also have an aperture formed in the center portion to provide a more defined step for use by persons when they use the ladder.
The ladder structure attached to the rectangular bracket, has a pair of spaced, parallel side rails, and a plurality of rungs attached to and disposed between the side rails. A bearing is formed on one end of the ladder near one of the side rails and the bearing journaled on the stud. This bearing rotatably attaches one end of the ladder to the rectangular bracket in a manner that allows rotation of the ladder through an arc of about 90 degrees.
A detent, adapted to engage the retention bosses, is mounted on the same end of the ladder as the bearing but near the side rail opposite the bearing. The detent engages the first slotted retention boss to hold the ladder in a storage position when the tailgate is up for vehicle movement. When the ladder is rotated to a vertical position, the second slotted retention boss is engaged by the detent to hold the ladder in the deployed position.
The ladder has a handle with first and second parallel arms joined by a curved connector. The first parallel arm of the handle is coaxially mounted within one of the side rails, the first arm being free to move longitudinally with respect to the ladder rail. The second arm of the handle has a curved extension on the end of the second arm opposite the curved connector, the curved extension being directed towards the first arm. The curved extension has a headed protrusion that engages a complementary slot formed in the first ladder side rail. The slot has an offset depression associated therewith, the depression adapted to hold the head of the protrusion when the handle is in an upright position. | {
"pile_set_name": "USPTO Backgrounds"
} |
How Many Troops to Secure Afghanistan?
By Robert Mackey
Raheb Homavandi/Reuters An exhibit on the failed Soviet occupation of Afghanistan at a war museum in Herat, a city in the west of the country that also contains the remains of a citadel built by Alexander the Great.
Now that word has leaked out that Gen. Stanley A. McChrystal, the top American military commander in Afghanistan, has concluded that he will need more than 68,000 American troops to defeat the Taliban, the natural question is: how many foreign troops does it take to secure Afghanistan?
The fast answer is that no one really knows, since, as even late-night comics have noticed recently, armies have been failing to do it for centuries.
On Saturday the leader of the Afghan Taliban, Mullah Muhammad Omar, weighed in with an op-ed of sorts posted on a Taliban Web site â helpfully made available in English, as well as Pashto, Farsi, Arabic, Urdu, Finnish, German, Spanish, Russian, French, Somali and Malay/Indonesian â noting that history has not been kind to foreign forces seeking to control Afghanistan, âfrom the time of the aggression of Alexander.â
Mullah Omar invoked a somewhat more recent example as well, pointing out that the Afghans âfought against the British invaders for eighty years from 1839 to 1919 and ultimately got independence by defeating Britain.â
While the world has obviously changed a good bit since Alexander arrived in Afghanistan with an army reinforced by elephants, or the British seized temporary control of the country in 1878 with 33,500 troops, it has only been 20 years since the Soviet military tried and failed to fend off an insurgency by Islamic militants against an Afghan government they had supported.
In February 1989, when the Soviets finally withdrew from the country a report in The Times by Bill Keller noted:
Todayâs final departure is the end of a steady process of withdrawal since last spring, when Moscow says, there were 100,300 Soviet troops in Afghanistan. At the height of the Soviet commitment, according to Western intelligence estimates, there were 115,000 troops deployed.
On Monday, my colleagues Eric Schmitt and Thom Shanker reported that the largest troop increase currently under consideration would bring the total number of American troops there to 113,000 â almost exactly the same size as the Soviet force:
Pentagon and military officials involved in Afghanistan policy say General McChrystal is expected to propose a range of options for additional troops beyond the 68,000 American forces already approved, from 10,000 more troops to as many as 45,000.
As this blog noted in March, when Mullah Omar issued a call for help from Pakistani militants, there are an estimated 15,000 Taliban fighters on each side of the exceedingly porous border. On the day the Soviets departed in 1989, the BBC reported that âKabul is surrounded by a mujahedeen force of around 30,000.â
It seems reasonable to ask if a force roughly the same size as the Soviet one, aided by about 30,000 NATO troops, is big enough to defeat this Afghan insurgency. The Americans do have some advantages the Soviets lacked. In this struggle, Pakistanâs military and intelligence services are, to some extent, helping to undermine the insurgents, who are not being armed by a rival superpower. Despite signs of rising discontent with the current Afghan government, the Taliban may also have less popular support than the mujahedeen enjoyed in the 1980s. Although it is hard to conduct accurate surveys in Afghanistan, in one opinion poll carried out earlier this year for British and American broadcasters, just 7 per cent of Afghans surveyed said that they would like to see the Taliban return to power.
On the other hand, Afghanistanâs population is estimated to have doubled since 1979, so this foreign force now has to find away to police and provide basic security to about twice as many people as the Soviet one.
Instead of looking just at failed occupations of Afghanistan, it might be worth looking at what how many troops were deployed during the successful occupation of postwar Germany in the 1940s. According to a Rand corporation study called âAmericaâs Role in Nation-Building: From Germany to Iraq,â the U.S. peacekeeping force in the one-quarter of postwar Germany it controlled in 1945 (an area that then had a population of about 17 million people and no active insurgency) included more than 290,000 soldiers and âa constabulary or police-type occupation forceâ of 38,000.
Looking closer to home, consider that there are nearly 38,000 police officers in New York City, patrolling an area of just 300 square miles, with a population of 8.3 million. Given that, it is no wonder that Gen. McChrystal thinks it might be tough to provide security to 30 million Afghans and police 250,000 square miles of mostly mountainous terrain with even 100,000 troops.
Then again, it is also possible that too large a force, rather than subduing Afghanistan, could serve to provoke the Afghan people.
One man who has suggested that more American troops are not the answer is Russiaâs ambassador to Afghanistan, Zamir Kabulov, who was a K.G.B. agent in Kabul during the Soviet occupation in the 1980s. Last October Mr. Kabulov told my colleague John Burns that the U.S. had âalready repeated all of our mistakes,â and moved on to âmaking mistakes of their own, ones for which we do not own the copyright.â One of the biggest mistakes the Soviets made, Mr. Kabulov said, was letting the force grow too large. âThe more foreign troops you have roaming the country,â he said, âthe more the irritative allergy toward them is going to be provoked.âhttp://thelede.blogs.nytimes.com/2009/09/21/how-many-troops-to-secure-afghanistan/?hp
Does an "experienced Afghan hand" equate to an even handed assessment? It seems interesting where her articles (The Nation for example) are usually posted suggest a bit more of an agenda that merely trying to state her "extensive experience." I do not question some of her ideas, they have been and are being made by many others but I do question her reasons.
I've never got used to the American notion that ALL arguments have to be "ad hominem". What I read, Iask myself "is this true?" "Does this person know whereof they speak?" Whether the piece is published in a lef or right wing newspaper is of no consequence to me whatsoever. Americans seem to pick their newspapers and TV News coverage depending on whether it caters to their prejudices. Finding outlets that cater in such a way is a lot harder in the UK. Open bias doesn;t gain you following here - it turns you into a figure of derision. (Having said that...I regard the Daily Mail and Daily Express with complete derision. The Times, Telegraph, Grauniad* and Idependant tend to "tell it like it is"
(*The Guardian is famed for the profiusion of its typographical errors. Since once printing its own name as "Grauniad", that's how some of tend to refer to it.)
I've never got used to the American notion that ALL arguments have to be "ad hominem". What I read, Iask myself "is this true?" "Does this person know whereof they speak?" Whether the piece is published in a lef or right wing newspaper is of no consequence to me whatsoever. Americans seem to pick their newspapers and TV News coverage depending on whether it caters to their prejudices. Finding outlets that cater in such a way is a lot harder in the UK. Open bias doesn;t gain you following here - it turns you into a figure of derision. (Having said that...I regard the Daily Mail and Daily Express with complete derision. The Times, Telegraph, Grauniad* and Idependant tend to "tell it like it is"
(*The Guardian is famed for the profiusion of its typographical errors. Since once printing its own name as "Grauniad", that's how some of tend to refer to it.)
Click to expand...
I share your disdain for the ad hominem attack, as I have made abundantly clear in many posts. While I cannot speak for all Americans, I can assure you that I do not consciously (I acknowledge we are all victims to some extent of our subconscious preferences) select my news sources in a way merely to suit my personal views. Indeed, I make a practice of reviewing "news" from a wide range of sources from the Times to Al Jazeera before forming opinions. Perhaps our difference (if we actually have one) is in our definition of ad hominem. To me it means accusations without proof that about the character or intelligence of the person communicating the message used in a way to distract or otherwise avoid discussing the message itself.
I do think it is always relevant and appropriate to consider the person's apparent (not merely assumed but derived from their direct statements or the tenor and placement of their writings) world view and particular philosophical, moral or other frames of reference that underlie and shape the communication itself. This context is necessary if one is to fully assess the communication since one can communicate various messages in a given communication that are in effect synergistically greater than the sum of their constituent parts (the specific facts or other statements that comprise communication or as importantly at times, those that are omitted or downplayed).
My main point in my original response to Ms. Jones article' you posted was only that to say she has experience in Afghanistan is of limited value and can actually be misleading (not that you intended this). There are myriad examples of people who have had occasion to visit, tour, inspect (pick your verb) Afghanistan (or any other place for that matter) and while relevant, this is not conclusive as to how we should evaluate thier communications about Afghanistan.
Any meaningful evaluation of the views later expressed by such persons based on their "experience," necessarily must include the specific nature (duration, type, reason etc.) of the in-country experience as well as the larger backdrop of the person's previous experience, education, associations, professed or apparent political and social views and the like since these factors inevitably will shape and color the communication itself.
For example, if one were trying to evaluate the particular effects of a given war on the indigenous population, you should expect differences in reports prepared by say the ICRC and the military conducting the operation, even though both reports are based on "first hand knowledge and experience" in the war zone. This does not necessarily mean either is "wrong" or that either is lying since each can cite facts that are true but can characterize and frame the resulting communications in far different ways. Some of this can be unconscious and other aspects quite deliberate in the sense that the communication may be intended to prompt emotion, action or other response in a given direction.
Thus, merely to say this author has experience and is thus an "expert" and then cite a communication as the end all and be all "answer" to a given issue, especially where the subject is so complex, nuanced and necessarily politicized, is to me unpersuasive.
Does an "experienced Afghan hand" equate to an even handed assessment? It seems interesting where her articles (The Nation for example) are usually posted suggest a bit more of an agenda that merely trying to state her "extensive experience." I do not question some of her ideas, they have been and are being made by many others but I do question her reasons.
Click to expand...
No, it certainly doesn't. But whether "two plus two equals four" (or not) doesn't depend on where one finds it written, which seems to be your implication. Ann Jones lived and worked in Afghanistan as an aid worker. It provided "credentials" that have allowed her to return there as an independent eye-witness, who's capable of putting what she witnesses into a context. An example might be the competing claims that Afghan recruits "proudly" wear ALL the gear they're kitted out with at the same time, in multiple layers of clothing. Is that "wardrobe choice" truly caused by pride in their role, or by a fear that anything left unwarn and out of sight is likely to get stolen and sold? My guess would be the latter. It's in the interests of contractors to paint a rosy picture of their Potemkin villages. Ann Jones seems to me to be someone who is able to sneak behind the gaudily painted facades and report on the reality.
I've lived abroad, off and on, since I was ten. When I speak German, for example, Germans ask what part of Lower Saxony I'm from. As a result of much travel, I've come to appreciate that what "we Brits" regard as "the obvious - and correct - way of doing things" is not neccessarily shared by others. Each nation has its own views. Notoriously, Americans often seem unable to appreciate this: The American view is - of course - the correct one, and other nations just need a little encouragement to accept this; besides, everyone else secretly wants to BE an American. In simplistic terms, there's a widespread confusion between approval of Coca Cola and Levi 501's, and approval of US foreign policy. In the REAL world, few Iraqis or Afgans want to either be LIKE Americans, or to BE Americans. They'd like to be richer than they are... but that's not the same thing. Not, that is, outside of the fevered imagination of the last US Government, who seemed capable of persuading themselves of just about anything. | {
"pile_set_name": "Pile-CC"
} |
The invention relates to a recording and/or reproducing apparatus as defined in the opening part of claim 1.
Information about a known recording and/or reproducing apparatus as defined in the opening part of claim 1 and information about a cassette with a magnetic tape as record carrier tape for such a recording and/or reproducing apparatus is obtainable via the internet, namely at the internet address xe2x80x9cwww.lto-technology.comxe2x80x9d. In connection with the known recording and/or reproducing apparatus and the known cassette reference may also be made to the two patent documents WO 98/44506 A2 and WO 98/44499 A1.
In the known recording and/or reproducing apparatus the disc-shaped drive member has drive teeth which form reel drive means at the drive member side and which serve and are configured to cooperate in a driving fashion with reel teeth of the supply reel of a cassette, which reel teeth form reel drive means at the reel side. During operation, when the cassette has been loaded into the recording and/or reproducing apparatus, the reel teeth and the drive teeth axially abut against one another, which is caused by the magnetic force of attraction of the magnetically acting holding means. The geometric distance in an axial direction between the first magnetic circuit element connected to the supply reel and the second magnetic circuit element connected to the disc-shaped drive member is in the first place dictated by the drive teeth and the reel teeth, but in the second place it also depends on the tolerances of said teeth as well as the tolerances of the axial dimensions of the two magnetic circuit elements and on the tolerances of the assembly dimensions of the two magnetic circuit elements. However, as a result of this dependence of the axial distance between the two magnetic circuit elements the magnetic force of attraction that occurs between the two magnetic circuit elements, which force depends on this axial distance, may vary comparatively strongly, which results either in a magnetic force of attraction which is inadequate for properly holding the supply reel on the disc-shaped drive member or in an excessive magnetic force of attraction, which may lead to problems when the supply reel is to be disengaged from the disc-shaped drive member, which disengagement is necessary when a cassette is moved out of the recording and/or reproducing apparatus. Tests have shown that in the case of an inadequate axial distance between the two magnetic circuit elements such a large magnetic force of attraction may occur that the supply reel of a cassette is no longer disengageable from the reel-shaped drive member of the recording and/or reproducing apparatus, or that such a large magnetic force of attraction is exerted on the first magnetic circuit element connected to the supply reel that the first magnetic circuit element may become disengaged from the supply reel. In both problem situations mentioned above the recording and/or reproducing apparatus requires a repair, which is unfavorable and undesirable.
It is an object of the invention to preclude the afore-mentioned problems with the aid of simple and reliable means and at low cost and to provide an improved recording and/or reproducing apparatus in which the occurrence of an undesirably large magnetic force of attraction between the first magnetic circuit element of a supply reel of a cassette and the second magnetic circuit element of the disc-shaped drive member is avoided.
To achieve this object, according to the invention, the characteristic features defined in the characterizing part of claim 1 are provided in a recording and/or reproducing apparatus as defined in the opening part of claim 1.
Owing to the provision of the characteristic features in accordance with the invention it is achieved in a simple manner that the magnetic force of attraction that occurs in operation between the first magnetic circuit element of the supply reel of a cassette and the second magnetic circuit element of the disc-shaped drive member of a recording and/or reproducing apparatus in accordance with the invention can never exceed a given value which can be defined by a suitable configuration of the magnetic-force-of-attraction limiting means, which consequently precludes the problems described hereinbefore for the known recording and/or reproducing apparatus.
In a recording and/or reproducing apparatus in accordance with the invention the magnetic-force-of-attraction limiting means may be formed, for example, by a separate element connected to the disc-shaped drive member, which connection may, for example, take the form of an adhesive joint. Such a construction is of particular advantage when the disc-shaped drive member is made of a magnetic or magnetizable material. However, in a recording and/or reproducing apparatus in accordance with the invention it has also proved to be very advantageous when, in addition, the characteristic features defined in claim 2 are provided. Such an embodiment has the advantage that it can be manufactured simply and has a high reliability. Such an embodiment, in which the magnetic-force-of-attraction limiting means are integral with the disc-shaped drive member, is particularly advantageous when the disc-shaped drive member is made of a non-magnetic or non-magnetizable material, notably when the disc-shaped drive member is made of a plastic.
In a recording and/or reproducing apparatus in accordance with the invention having at least one such projection it has proved to be particularly advantageous when, in addition, the characteristic features defined in claim 3 are provided. This guarantees an unambiguous, reliable and stable conformity with a given minimum distance between the first magnetic circuit element and the second magnetic circuit element.
In a recording and/or reproducing apparatus in accordance with the invention it has further proved to be very advantageous when, in addition, the characteristic features defined in claim 4 are provided. Such an embodiment has proved to be very advantageous in practice. Such an embodiment further has the advantages that as a result of the provision of the third magnetic circuit element the stray field of the magnetically acting holding means is kept comparatively small and that, in addition, a high efficiency of the magnetically acting holding means is achieved.
The above-mentioned as well as further aspects of the invention will become apparent from the embodiments described hereinafter by way of example and will be elucidated with reference to these examples. | {
"pile_set_name": "USPTO Backgrounds"
} |
Bruton's tyrosine kinase (Btk), a member of the Tec family of non-receptor tyrosine kinases, is a key signaling enzyme expressed in all hematopoietic cells types except T lymphocytes and natural killer cells. Btk plays an essential role in the B-cell signaling pathway linking cell surface B-cell receptor (BCR) stimulation to downstream intracellular responses.
Btk is a key regulator of B-cell development, activation, signaling, and survival (Kurosaki, Curr Op Imm, 2000, 276-281; Schaeffer and Schwartzberg, Curr Op Imm 2000, 282-288). In addition, Btk plays a role in a number of other hematopoetic cell signaling pathways, e.g., Toll like receptor (TLR) and cytokine receptor-mediated TNF-α production in macrophages, IgE receptor (FcepsilonRI) signaling in Mast cells, inhibition of Fas/APO-1 apoptotic signaling in B-lineage lymphoid cells, and collagen-stimulated platelet aggregation. See, e.g., C. A. Jeffries, et al., (2003), Journal of Biological Chemistry 278:26258-26264; N. J. Horwood, et al., (2003), The Journal of Experimental Medicine 197:1603-1611; Iwaki et al. (2005), Journal of Biological Chemistry 280(48):40261-40270; Vassilev et al. (1999), Journal of Biological Chemistry 274(3):1646-1656, and Quek et al. (1998), Current Biology 8(20):1137-1140. | {
"pile_set_name": "USPTO Backgrounds"
} |
Aksys Games has announced its “Summer of Mystery,” which consists of three PS Vita otome visual novel games launching in April, May, and June in North America, respectively.
Here is an overview of each title:
Psychedelica of the Black Butterfly Release Date: April 27 About Aksys Games is proud to announce that the surreal world of Psychedelica of the Black Butterfly will envelop North America on April 27, 2018 physically and digitally for the PlayStation Vita handheld entertainment system. The game will also be released in both formats in the EU Spring 2018. From the masters of the genre, Idea Factory and Otomate, is companions on a quest to recover their lost memories. Combining elegant artwork, stunning romances, and a mysterious setting, the story begins with a young woman waking up mansion with no recollection of how she got there. Adding to her confusion, she can no longer remember her name or past. However, before she can come to grips with her predicament, she is suddenly attacked by a grotesque monster and is forced to run for her life. Key Features Choose Your Destiny – Follow the black butterflies as your choices unlock numerous story paths, a mansion full of intriguing characters, and a multitude of surprising endings.
– Follow the black butterflies as your choices unlock numerous story paths, a mansion full of intriguing characters, and a multitude of surprising endings. Fantastical Artwork – Bright, psychedelic colors contrast with dark, muted tones, creating a surreal and highly unique atmosphere.
– Bright, psychedelic colors contrast with dark, muted tones, creating a surreal and highly unique atmosphere. Hunt the Black Butterflies – Defeat the black butterflies with the help of your trusty sidearm to unlock special story segments.
– Defeat the black butterflies with the help of your trusty sidearm to unlock special story segments. An Unforgettable Adventure – A hauntingly beautiful, suspense-filled love story from Otomate (Idea Factory), makers of the finest visual novel/romance simulation adventures. 7’scarlet Release Date: May 25 About Aksys Games is proud to announce the moonlit wonder of 7’scarlet coming to mystify North America on May 25, 2018. Developed by Idea Factory and Toy box Inc, 7’scarlet is a beautifully interwoven story of suspense, romance, and mystery. Take on the role of a brave young woman journeying into the unknown to uncover dangerous truths and locate her missing brother. The remote town of Okune-zato is shaped like crescent moon and shrouded in dark myths and legends. Following the disappearance of her brother, the protagonist ventures to Okune-zato with her childhood friend. They find the area rife with mystery and populated by intriguing characters, each harboring their own hidden motivations. Encounter heart-racing twists and turns as you dig deeper into the story. Key Features Choose your Fate – Explore multiple character paths and change the course of the story! play through the game multiple times to uncover the entire tale.
– Explore multiple character paths and change the course of the story! play through the game multiple times to uncover the entire tale. Experience stunning artwork – Witness this colorful story coming to life with beautiful character illustrations and dynamic background effects.
– Witness this colorful story coming to life with beautiful character illustrations and dynamic background effects. Unravel the Enigma – Use your detective skills to question the eclectic members of the “Mystery Club” and solve this challenging interactive puzzle.
– Use your detective skills to question the eclectic members of the “Mystery Club” and solve this challenging interactive puzzle. Play the Best – Experience a crime-solving mystery from famed developer Otomate (Idea Factory), makers of the finest visual novel/romance simulation adventures. Psychedelica of The Ashen Hawk Release Date: June 29 About Aksys Games is proud to announce Psychedelic of the Ashen Hawk will swoop down on North America on June 29, 2018 exclusively for the PlayStation Vita handheld entertainment system. From the masters of the genre, Idea Factory and Otomate, Psychedelic of the Ashen Hawk is a suspense-filled tale of a young woman who was born with an eye that gleams with a scarlet light. In order to avoid being cast out, she masquerades as a young boy and lives in a derelict tower on the outskirts of town. One day a mysterious treasuries stolen from the city church. Our heroine learns that not only do magic stones exist and are hidden within the city, but also the secret of her origins. Key Features Map Your Progress – Unlock side stories and entertaining vignettes as you progress through the main scenario and learn more about the heroine, heroes, and villains that drive the narrative forward.
– Unlock side stories and entertaining vignettes as you progress through the main scenario and learn more about the heroine, heroes, and villains that drive the narrative forward. Go with the Flow – Keep track of the ebb and flow of the story as well as the various story paths with an interactive flowchart that allows you to go back and make alternate conversation choices.
– Keep track of the ebb and flow of the story as well as the various story paths with an interactive flowchart that allows you to go back and make alternate conversation choices. Choose your DOOM – with a number of alternate endings and story paths, take control of the future. Will you find true happiness and romance, or will Fate cast you into a pit of despair?
– with a number of alternate endings and story paths, take control of the future. Will you find true happiness and romance, or will Fate cast you into a pit of despair? Play the Beast – A hauntingly beautiful, suspense-filled love story from Otomate (Idea Factory), makers of the finest interactive fiction adventure.
Each game will include character cards inside the package, and users who purchase all three titles can get an exclusive set of collector pins. Only 1,000 sets of the collector pins will be made, and are available on a first come, first served basis to United States residents by July 31. A small shipping and handling charge will also be applied. | {
"pile_set_name": "OpenWebText2"
} |
Performs Trouble No More: Live At Town Hall
John Mellencamp
John Mellencamp’s Trouble No More was released in June 2003, received with universal critical acclaim and a No. 1 debut on Billboard’s Blues chart. Featuring Mellencamp and his band’s spirited take on 11 American folk and blues classics, including Robert Johnson’s “Stones In My Passway”, Son House’s “Death Letter”, Woody Guthrie’s “Johnny Hart”, Willie Dixon’s “Down In The Bottom”, Lucinda Williams’ “Lafayette”, and several others, the album was recorded and mixed in just 17 days, capturing the sessions’ bounding energy.
A month after the release, Mellencamp performed this acclaimed studio album, Trouble No More, and four additional songs, including stripped-down versions of Mellencamp’s “Small Town”, “Paper In Fire” and Pink Houses”, as well as Bob Dylan’s “Highway 61 Revisited” for a sold-out audience at New York’s Town Hall. | {
"pile_set_name": "Pile-CC"
} |
Accelerated wound healing in healing-impaired db/db mice by autologous adipose tissue-derived stromal cells combined with atelocollagen matrix.
Adipose tissue-derived stromal cells (ATSCs) have recently gained widespread attention as a potential alternate source to bone marrow-derived mesenchymal stem cells with a proliferative capacity and a similar ability to undergo multilineage differentiation. In this study, we evaluated the effectiveness of freshly isolated autologous ATSCs-containing atelocollagen matrix with silicon membrane (ACMS) on wound healing of diabetic (db/db) mice. Cultured ATSCs from (db/db) mice secreted significant amounts of growth factors and cytokines, which are suitable for wound repair. Two full thickness round skin defects were made on the backs of healing-impaired db/db mice. Freshly isolated autologous ATSCs-containing ACMS or ACMS alone were applied to the wounds. Twelve mice were treated and then killed at 1 or 2 weeks (n = 6 each). Histologic sections of the wounds were prepared at each time period after treatment. Histologic examination demonstrated significantly advanced granulation tissue formation, capillary formation, and epithelialization in diabetic healing-impaired wounds treated with autologous ATSCs-containing ACMS, compared with mice treated with ACMS alone. These results suggested that transplantation of autologous ATSCs-containing ACMS significantly accelerated wound healing in diabetic healing-impaired db/db mice. | {
"pile_set_name": "PubMed Abstracts"
} |
Telmatherininae
The Telmatherininae, the sail-fin silversides are a subfamily of atheriniform fish from the rainbowfish family, the Melanotaeniidae, inhabiting fresh and brackish water. All but the species Kalyptatherina helodes are restricted to the Indonesian island of Sulawesi, and most are found solely in the Malili Lake system, consisting of Matano and Towuti, and the small Lontoa (Wawantoa), Mahalona and Masapi.
They are small fish, typically ranging from in length, though the largest Paratherina can reach almost twice that size. They are named for the sail-like shape of their first dorsal fin in the males, which are also brightly coloured, compared with the females.
References
Category:Melanotaeniidae
Category:Fish subfamilies | {
"pile_set_name": "Wikipedia (en)"
} |
Key notesThis review examined material on child abuse in Iceland, which was mainly published in Icelandic, to make the findings more accessible to English speakers.The review drew on published research, books and reports and compared the findings with Nordic research and global estimates of child abuse.Icelandic children have reportedly experienced diverse forms of child abuse and neglect, but diverse initiatives have been put in place to tackle such behaviour.
Introduction {#apa14355-sec-0006}
============
A harsh child‐rearing policy called the *Decree of domestic discipline* came into force in Iceland in 1746 [1](#apa14355-bib-0001){ref-type="ref"}, and parents were legally obliged to punish their children severely if they were not obedient and hard working. Secular and religious authorities monitored the implementation, but they were also responsible for preventing excessive punishment. In 1932, Iceland\'s Parliament passed the first child protection law, effectively annulling the 1746 Act [1](#apa14355-bib-0001){ref-type="ref"}, but it was Kempe\'s publication on battered child syndrome in 1962 that stimulated the debate about the occurrence of child abuse in Iceland [1](#apa14355-bib-0001){ref-type="ref"}. Because there were so few documented cases of child abuse, some argued that the risk of such abuse was low, due to a supposedly higher degree of social cohesion in Iceland than in other countries, including stronger family and friendship [2](#apa14355-bib-0002){ref-type="ref"}. Others argued that child abuse was a hidden reality and was as common in Iceland as elsewhere [1](#apa14355-bib-0001){ref-type="ref"}. Towards the end of the 20th century, Icelandic professionals increasingly condemned spanking as a disciplinary method and categorised it as abuse [1](#apa14355-bib-0001){ref-type="ref"}. Even the female troll Grýla, who had been symbolically used to support parental threats towards their children for centuries, lost her former power [1](#apa14355-bib-0001){ref-type="ref"}, [3](#apa14355-bib-0003){ref-type="ref"}. Grýla, who is still well‐known to Icelanders of all ages, and her less scary husband Leppalúði, were cannibals who ate nasty children, but had no appetite for children who behaved well (Fig. [1](#apa14355-fig-0001){ref-type="fig"}).
{ref-type="ref"}, with drawings by Halldór Pétursson (1916--1977).](APA-107-1500-g001){#apa14355-fig-0001}
According to the Convention on the Rights of the Child, children have the right to live free from violence and abuse, including violent disciplinary methods [4](#apa14355-bib-0004){ref-type="ref"}. Despite the almost global adoption of the Convention, only 53 countries have adopted legislation that protects children from corporal punishment, including Iceland, which introduced legislation in 2003 and revised it in 2009 to provide greater clarity [5](#apa14355-bib-0005){ref-type="ref"}. Iceland signed the Convention on the Rights of the Child in 1992 and adopted it into national legislation in 2013. Both the Child Protection Law (number 80/2002) and the Children\'s Law (number 76/2003) include paragraphs that align with Iceland\'s international obligations on the rights of children. The 2009 revisions explicitly prohibit physical and emotional abuse, threats and other defaming behaviour against children [6](#apa14355-bib-0006){ref-type="ref"}. The Child Protection Law outlines children\'s right with regard to the state and how to react when parents fail [7](#apa14355-bib-0007){ref-type="ref"}. It includes provisions about the duty of professionals and the public to report child abuse, which are contrary to the country\'s constitutional provisions of privacy and idealised notions of loving and protective families.
At the end of the 20th century, there was a lack of information on the prevalence of different forms of child abuse in Iceland. One study based on data collected in the Reykjavík area in 1987 found that about 10% of 113 randomly selected cohabiting couples aged 25--44 years, with two children under the age of 16, considered that physically punishing children was acceptable and 45% of them admitted they sometimes or seldom spanked their children [8](#apa14355-bib-0008){ref-type="ref"}. Adults who talked about their experiences of abuse in the 20th century provided further evidence that physical punishment was regarded as a normal and appropriate measure during their childhood [9](#apa14355-bib-0009){ref-type="ref"}. There were accounts of spanking, other physical punishments, emotional abuse, neglect and intra‐familial conflicts and violence. They often drew parallels with the Icelandic film, *Devil*\'*s Island,* which described post‐war urban life in Reykjavík, where people lived in overcrowded former British military barracks that were plagued by poverty, heavy drinking and violence. In 2007, special investigative committees were appointed to examine public allegations of severe child abuse in state institutions in the 20th century, which were used by child protection authorities for long‐term placements. The investigations were expanded to include the School for Deaf People and the Catholic school in Reykjavík. The findings confirmed diverse types of abuse in homes and schools for disadvantaged children and adolescents [10](#apa14355-bib-0010){ref-type="ref"}, [11](#apa14355-bib-0011){ref-type="ref"}, [12](#apa14355-bib-0012){ref-type="ref"}, [13](#apa14355-bib-0013){ref-type="ref"}, children with mental disabilities [14](#apa14355-bib-0014){ref-type="ref"} and Catholic primary school children [15](#apa14355-bib-0015){ref-type="ref"}.
This research made it clear that diverse forms of child abuse and neglect were prevalent in 20th century Iceland. The aim of this review was to provide an overview of child abuse in Iceland, with a focus on the physical, emotional and sexual abuse, neglect and intra‐familial conflicts that children suffer at the hands of their parents and other caretakers. It was based on published research and reports in Iceland, which were largely published in Icelandic, and relevant international literature with an emphasis on the Nordic countries.
Study selection {#apa14355-sec-0007}
===============
The distinction between acceptable punishment and physical or emotional abuse is shaped by social norms in time and space [16](#apa14355-bib-0016){ref-type="ref"}. In order to acknowledge these variations, the terms we use in this review attempt to reflect the context at the time that the source material was written. Nonetheless, our current understanding of healthy child‐rearing practices recognises that many formerly accepted disciplinary measures for children were, in fact, abuse. When we were selecting which Icelandic studies to report, we gave preference to peer‐reviewed articles and edited books and publications that reported proper methodology by recognised authors and authorities on the subject matter in Iceland. All the Icelandic studies we report on in this study were approved and passed ethical reviews, in keeping with national requirements.
Adults\' recollections of child abuse {#apa14355-sec-0008}
=====================================
A national survey in late 2010 sought to estimate the prevalence and experiences of physical and emotional abuse and neglect in the general Icelandic population. After the study was registered with the Data Protection Authority, 1500 adults were randomly selected from Registers Iceland, the country\'s official civil registry, and 977 (65%) agreed to take part. They were asked to respond to a pilot‐tested questionnaire during telephone interviews conducted by experienced interviewers from the Social Science Research Institute, University of Iceland. The average age of the respondents was 46.3 years (median: 46, range: 18--94). There were no differences between those who did or did not take part, with regard to their gender, age or residency. The interviewees were questioned about their childhood experiences of five different forms of physical abuse, eight different forms of emotional abuse and neglect (Table [1](#apa14355-tbl-0001){ref-type="table"}). The study findings were reported in two peer‐reviewed publications in Icelandic, with abstracts in English, which reported how adults were physically and emotionally abused and neglected as children and how they evaluated their upbringing [17](#apa14355-bib-0017){ref-type="ref"}, [18](#apa14355-bib-0018){ref-type="ref"}. The findings are summarised below.
######
Prevalence of childhood experience of physical and emotional abuse and form, and neglect, by sex
Type of abuse and forms N Female n (%) Male n (%) Total N (%) Odds ratio for females compared to males (95% CI)
--------------------------------- ----- -------------- ------------ ------------- ---------------------------------------------------
Physical abuse
Spanking 959 124 (25.1) 156 (33.6) 280 (29.2) 0.66 (0.50--0.87)
Shaking 952 61 (12.4) 79 (17.1) 140 (14.7) 0.69 (0.48--0.98)
Slapping on the cheek 962 76 (15.2) 64 (13.8) 140 (14.6) 1.12 (0.68--1.61)
Slapping on the fingers 949 52 (10.6) 67 (14.6) 119 (12.5) 0.70 (0.47--1.03)
Ear pulling and twisting 961 11 (2.4) 15 (3.2) 26 (2.7) 0.68 (0.31--1.49)
Other 960 14 (2.8) 13 (2.8) 27 (2.8) 1.00 (0.46--2.15)
Any experience 965 212 (42.4) 248 (53.3) 460 (47.7) 0.64 (0.50--0.83)
Emotional abuse
Scare 960 155 (31.1) 153 (33.1) 308 (32.1) 0.92 (0.70--1.20)
Take privilege away 955 126 (25.5) 153 (33.2) 279 (29.2) 0.69 (0.52--0.91)
Time out 959 108 (21.7) 165 (35.8) 273 (28.5) 0.50 (0.37--0.66)
Threaten 956 68 (13.8) 95 (20.6) 163 (17.1) 0.62 (0.44--0.87)
Belittle 961 79 (15.9) 64 (13.8) 143 (14.9) 1.18 (0.82--1.68)
Expose 870 63 (13.8) 69 (16.7) 132 (15.2) 0.80 (0.55--1.16)
Discrimination 960 72 (14.5) 39 (8.4) 111 (11.6) 1.84 (1.22--2.78)
Reject 960 62 (12.5) 30 (6.5) 92 (19.6) 2.05 (1.30--3.23)
Any experience 966 321 (64.2) 342 (73.4) 663 (68.6) 0.65 (0.49--0.86)
Physical and/or emotional abuse 965 370 (74.0) 385 (82.8) 755 (78.2) 0.59 (0.43--0.81)
Neglect 956 64 (13.0) 41 (8.9) 105 (11.0) 1.52 (1.01--2.31)
Results are based on a survey in a random sample of adults (18 years and older) from Registers Iceland (2010). Adapted from [17](#apa14355-bib-0017){ref-type="ref"}, [18](#apa14355-bib-0018){ref-type="ref"}.
John Wiley & Sons, Ltd
Physical abuse {#apa14355-sec-0009}
--------------
Of 965 respondents who provided information on physical abuse, just under half (48%) had experienced at least one predefined form as children (Table [1](#apa14355-tbl-0001){ref-type="table"}): 29% had experienced one form, 17% had experienced two to three forms and 2% had experienced four to five forms [17](#apa14355-bib-0017){ref-type="ref"}. Other experiences that were reported included being forced to take a cold shower, being hit with hard objects, having their mouth washed with soap and being submerged in water. Respondents who were 30 years and older were 1.9 times more likely to have experienced one or more forms of physical abuse, with a 95% confidence interval (95% CI) of 1.4--2.6, compared to those who were younger. Males were 1.6 times more likely (95% CI: 1.2--2.0) to report such experiences than females. More than one‐third (36%) of the respondents born after 1980, and younger than 30 years at the time of the research, reported at least one childhood experience of physical abuse. Fathers were as likely as mothers to physically punish their children, but fathers were significantly more likely to punish their sons and mothers their daughters.
Of 465 respondents, 419 (90%) stated whether they thought they had deserved the physical punishment they received: 32% felt that all the punishments were deserved, 38% thought the punishments were deserved at times and 30% thought the punishment were never deserved. There were no significant differences in these opinions by gender [17](#apa14355-bib-0017){ref-type="ref"}. Those who felt they never deserved to be physically punished were \~6.5 times more likely to have been punished often or very often (95% CI: 1.8--22.9) compared to those who said they had always deserved their punishment.
Emotional abuse {#apa14355-sec-0010}
---------------
Of 966 respondents who provided information on emotional abuse, 663 (69%) reported having experienced at least one of the eight predefined forms (Table [1](#apa14355-tbl-0001){ref-type="table"}): 247 (37%) reported one episode, 304 (46%) reported two to three episodes and 112 (17%) reported four or more episodes [18](#apa14355-bib-0018){ref-type="ref"}. Respondents under the age of 30 were 2.9 times more likely (95% CI: 1.9--4.3) to have experienced emotional abuse than older respondents, and males were 1.5 times more likely to report emotional abuse than to females (95% CI: 1.2--2.0). Fathers and mothers were equally likely to have perpetrated emotional abuse (OR = 1.4, 95% CI: 0.9--2.4).
Neglect {#apa14355-sec-0011}
-------
Of 977 respondents (Table [1](#apa14355-tbl-0001){ref-type="table"}), 105 (11%) said that they had experienced childhood neglect (Table [1](#apa14355-tbl-0001){ref-type="table"}), six said they did not know and 15 did not give an answer [18](#apa14355-bib-0018){ref-type="ref"}. Women were 1.52 times more likely to report neglect than males (95% CI: 1.0--2.3). Those who said they had been neglected were significantly more likely to report experience of the five forms of physical abuse and six forms of emotional abuse, compared to those who did not feel they had been neglected (Fig. [2](#apa14355-fig-0002){ref-type="fig"}). The neglect occurred in various contexts, for example, being raised by parents who were severely sick, alcoholics, absent or divorced or showed little attention to their children\'s daily care.
{#apa14355-fig-0002}
Abuse and upbringing {#apa14355-sec-0012}
--------------------
Respondents were asked to evaluate the quality of their upbringing [18](#apa14355-bib-0018){ref-type="ref"}. Those who said their upbringing was good (84%) were 3.2 times more likely (95% CI: 2.2--3.6) not to have experienced physical abuse than those who reported that their upbringing was acceptable (14%) or bad (2%) [17](#apa14355-bib-0017){ref-type="ref"}. There was no significant difference between those who had experienced one incident of physical abuse and those with none. Respondents were more likely to consider their child‐rearing acceptable or bad (p \< 0.0001) rather than good as the number of forms of physical abuse they experienced increased. Experiencing emotional abuse gave similar results [18](#apa14355-bib-0018){ref-type="ref"}. When the results were corrected for age, sex and experience of physical abuse, those who suffered emotional abuse were 3.8 times more likely (95% CI: 2.2--6.4) to say their upbringing was acceptable or bad compared to those with no experience of such abuse.
Sexual abuse {#apa14355-sec-0013}
============
In 2004, a survey was conducted in all upper secondary schools in Iceland to investigate the lifetime experience of sexual abuse among 16‐ to 19‐year‐old adolescents. Taking absences on the day of the survey into account, the 9,113 students (51% females) who took part represented 67% of all registered students of that age at the time of the study [19](#apa14355-bib-0019){ref-type="ref"}. The study was conducted by the Icelandic Centre for Social Research and Analysis in collaboration with the Government Agency for Child Protection and the results were reported to the Data Protection Authority. Participants were informed that their answers were confidential, that they were not obliged to answer all the questions and that it would not be possible to trace any answers to individuals. The average age of the participants was 17.2 (±1.1) years, and they were representative of Icelandic adolescents of this age at the time of the survey.
The researchers found that approximately one‐third of the girls and one‐fifth of the boys reported having experienced sexual abuse before the age of 18 years (Table [2](#apa14355-tbl-0002){ref-type="table"}). They were not asked to define who the perpetrator of that abuse was, so it could have included adults or other children or adolescents. Sexual abuse was associated with significantly more symptoms of depression, anger and anxiety, compared to those who had not been abused, and there was an increasing gradient of impact associated with the severity of the sexual abuse. High self‐esteem, fostered through positive school experiences, parental support and participation in sports were found to counteract the negative impact of the sexual abuse on depressed mood and anger [20](#apa14355-bib-0020){ref-type="ref"}.
######
Lifetime experience (%) of sexual abuse as reported by 16‐ to 19‐year‐old adolescents attending upper secondary school in Iceland in 2004, by sex and age
Type of sexual abuse and forms N Girls n (%) Boys n (%) Total n (%) Odds ratio (95% CI) for girls compared to boys
----------------------------------------------------------- ------ ------------- ------------ ------------- ------------------------------------------------
a\) Someone exposed his/her body against his/her will
12 years and younger 8350 45 (1.0) 15 (0.4) 60 (0.7) 2.99 (1.66--5.37)
13--17 years 8329 75 (1.7) 47 (1.2) 122 (1.5) 1.42 (0.99--2.06)
b\) Someone touched one\'s body against his/her will
12 years and younger 8714 59 (1.4) 9 (0.2) 68 (0.8) 7.09 (3.51--14.31)
13--17 years 8106 502 (11.6) 102 (2.7) 604 (7.5) 5.44 (4.37--6.76)
c\) Someone touched the genital area against his/her will
12 years and younger 7937 158 (3.7) 44 (1.2) 202 (2.5) 2.85 (2.03--3.99)
13--17 years 8099 360 (8.4) 347 (9.1) 707 (8.7) 0.92 (0.78--1.07)
d\) Intercourse against his/her will
12 years and younger 8043 82 (1.9) 41 (1.1) 123 (1.5) 1.74 (1.19--2.54)
13--17 years 8037 258 (6.0) 71 (1.9) 329 (4.1) 3.30 (2.52--4.30)
e\) Any experience 8109 1539 (35.7) 676 (17.8) 2215 (27.3) 2.56 (2.31--2.84)
Adapted from [19](#apa14355-bib-0019){ref-type="ref"}. In the table, each adolescent is counted only once. Those who reported experience of more than one form of sexual abuse while 12 years and younger, the most severe experience is included. For those 13--17 years of age who reported more than one form of sexual abuse, the most severe abuse is included.
John Wiley & Sons, Ltd
In 2014, the Health Behaviour of School‐Aged Children study in Iceland found that 15% of adolescents aged 14--15 years reported having experienced sexual abuse when they were asked questions similar to those in Table [2](#apa14355-tbl-0002){ref-type="table"}, based on the 2004 survey of 16--19 year olds [19](#apa14355-bib-0019){ref-type="ref"}, except for their experience of exposure [21](#apa14355-bib-0021){ref-type="ref"}. About 5% reported that sexual abuse had occurred once and about 10% reported that it had happened on more than one occasion. Sexual abuse was more prevalent among girls than boys, and those who had experienced sexual abuse were more likely to report daily smoking, getting drunk, being bullied and not feeling well at school. Another study found that Icelandic adults who had suffered sexual abuse when they were four years to 12 years of age described unbearable suffering, resulting in poor health as a child and adult and a lack of well‐being. Women were more likely to report internalising pain symptoms, and men were more likely to externalise their pain [22](#apa14355-bib-0022){ref-type="ref"}.
Violence in the family {#apa14355-sec-0014}
======================
Data from the 2003 international European School Survey Project on Alcohol and Other Drugs were analysed to estimate the prevalence of the lifetime experience of intra‐familial conflicts among children aged 14 and 15 and the impact this had on their health and well‐being [23](#apa14355-bib-0023){ref-type="ref"}. The survey, which was conducted in all lower secondary schools in Iceland, focused on adolescents in the 1987 and 1988 birth cohorts, and the 7099 participants (81% response rate) were representative of Icelandic adolescents at the time. The survey was divided into two parts, and the second part was answered by 3515 (49.5%) of survey participants and included four specific questions on intra‐familial violence. The results indicated that girls were more frequently involved in intra‐familial conflicts than boys (Table [3](#apa14355-tbl-0003){ref-type="table"}). About 6% of the Icelandic adolescents reported a lifetime experience of direct involvement in parental violence in their homes, with similar rates for boys and girls. Victims reported significantly more symptoms of depression, anxiety, lower self‐esteem and in particular anger than those who did not report such experiences. Furthermore, there was evidence of an impact gradient that was correlated with the severity of the experience. Those who had witnessed physical violence at home were more than 45 times more likely (95% CI: 32.61--64.16) to have been personally involved in the violence than those who did not report such experiences. A study of a similar dataset collected in 2012 showed that Icelandic adolescents with experience of intra‐familial conflicts were more likely to report daily smoking, lifetime drunkenness and use of cannabis and feel unwell in school, often or most often. The researchers also reported that the impact gradient was correlated with the severity of the experience [24](#apa14355-bib-0024){ref-type="ref"}.
######
Lifetime experience of four different forms of intrafamilial conflict as reported by 14--15 years old Icelandic adolescents in primary schools in 2003, by sex
Forms N Girls n (%) Boys n (%) Total N (%) Odds ratio for girls compared to boys (95% CI)
-------------------------------------------------------------- ------ ------------- ------------ ------------- ------------------------------------------------
Been involved in severe verbal parental argument 3431 673 (38.8) 541 (29.7) 1214 (34.1) 1.50 (1.30--1.72)
Witnessed severe verbal parental argument 3438 418 (24.1) 361 (19.8) 779 (21.9) 1.28 (1.09--1.51)
Witnessed adult physical violence in the home 3436 159 (8.6) 107 (5.9) 266 (7.5) 1.62 (1.25--2.08)
Been involved in physical violence with an adult in the home 3444 106 (6.1) 109 (6.0) 215 (6.1) 1.02 (0.78--1.35)
Adapted from [23](#apa14355-bib-0023){ref-type="ref"}.
John Wiley & Sons, Ltd
In 1996, a random sample of 3000 adults was drawn from Registers Iceland and 74% responded. Of those, 13.8% of women and 3.9% of men reported that a present or former partner was violent towards them [25](#apa14355-bib-0025){ref-type="ref"}. In 2006, a random sample of 7613 women aged 18--67 years was drawn from Registers Iceland and one in 10 of the 2746 (36.1%) who took part in the survey reported that they had experienced violence during a relationship with a partner [26](#apa14355-bib-0026){ref-type="ref"}. In another study in 2006, 107 of 110 women who attended a maternity clinic, mostly for high‐risk pregnancies, participated in a study on their experiences of physical violence: 42 (39%) reported a life‐time experience of physical violence and 18 (19%) reported violence by their former partner or in their current relationship. Five of the 107 (5%) women reported physical violence during their on‐going pregnancy, where the perpetrators included their partner, father or a friend [27](#apa14355-bib-0027){ref-type="ref"}. In a third study, conducted in 2006, 101 of 103 randomly selected women aged 18--67 years who attended the Emergency Department at the University Hospital in Reykjavík took part in a study on their experience of physical violence: 18 (18%) of the women had experienced physical violence in the last 12 months and 20 (20%) had been subjected to sexual abuse by their partner or a close relative at some point in their life, some of them repeatedly [28](#apa14355-bib-0028){ref-type="ref"}. The majority of the women who took part in these three studies had one or more children. Furthermore, Icelandic women who had experienced domestic violence considered that, at the age of 18--24 months, their children had worse general health and more nutritional problems than women with no experience of domestic violence [29](#apa14355-bib-0029){ref-type="ref"}.
The plight of Icelandic children who witness intimate partner violence has been increasingly highlighted. In a qualitative study on the issue, based on interviews with professionals and other stakeholders including children, the author argued that several steps needed to be taken [30](#apa14355-bib-0030){ref-type="ref"}. These included strengthening of the legal framework, improving support to children who were involved, elaborating guidelines for notifications to child protection committees and providing better services to those in need across different service providers.
Children\'s knowledge of domestic violence {#apa14355-sec-0015}
==========================================
In 2006, a survey was conducted to investigate young children\'s general knowledge and understanding of the concept of *domestic violence* [31](#apa14355-bib-0031){ref-type="ref"}. A stratified cluster sample was used that included 13 primary and lower secondary schools in the capital of Reykjavík and in towns and rural areas throughout the country. With the written consent of their parents, 1125 children took part in the survey, which was a 68% response rate. They were divided into two age groups, one with an average age of 10.5 years and the other with an average age of 13.8 years and 70% of the younger children and 94% of the older children recognised the concept. There were no gender differences in the knowledge of this concept. About a quarter of the children reported that they knew someone who had been a victim of domestic violence.
To complement the survey data, qualitative interviews were conducted with participants who had personal experience of domestic violence. They were selected by purposive sampling and included 14 individuals who were nine years to 19 years old at the time of the interview and six mothers who were 35--45 years old [32](#apa14355-bib-0032){ref-type="ref"}. In all cases, the children who had observed conflict between their mother and her husband or partner reported that fear, anger and distress were their dominant feelings. The children expressed disappointment with the reactions of adults, family members and professionals who knew what was going on. While teenagers experiencing domestic violence felt humiliation and shame, the school gave them security and peace from their domestic experiences [33](#apa14355-bib-0033){ref-type="ref"}. Despite this, they claimed that the teachers lacked procedures and training on how to address such problems and help children in this situation.
How child abuse in Iceland is handled by the authorities {#apa14355-sec-0016}
========================================================
Suspected child abuse should be reported to one of the 27 child protection committees in different municipalities across the country or reported to the national 112 emergency telephone number. Notifications have gradually increased every year, from 3310 in 2000 to 9969 in 2017. In 2017, 3828 (38%) of notified cases concerned child neglect and 2761 (28%) children suspected to have suffered from physical, emotional or sexual abuse [34](#apa14355-bib-0034){ref-type="ref"}. There have been no indications that the 2008 economic meltdown in Iceland resulted in more reported cases of child maltreatment compared to the period before the crisis [35](#apa14355-bib-0035){ref-type="ref"}.
A study that evaluated the 329 physical abuse cases relating to children aged 0--17 that were notified to the authorities in 2006 found that the perpetrator could be identified in 269 (82%) of cases [36](#apa14355-bib-0036){ref-type="ref"}. In 189 cases relating to 154 children, the perpetrator was the father, mother or another caretaker. In an attempt to improve the registration of suspected cases of child abuse and the procures that take place after a report is filed, definitions of the various forms of child abuse have been formulated and revised to help parents, professionals and staff working in child protection services to recognise child abuse [37](#apa14355-bib-0037){ref-type="ref"}.
Children\'s House was established in Reykjavík in 1998 and has inspired similar establishments in neighbouring countries [38](#apa14355-bib-0038){ref-type="ref"}. The overall aim is to give suspected victims of child sexual abuse and other violence a secure place to talk about their experiences with the help of a multi‐disciplinary team of professionals. This system means that children who are less than 15 years of age do not have to repeat their testimony in court. More than 2000 children have been admitted to the Children\'s House since its establishment: from January 2001 to June 2012, 1355 children (1169 girls) were admitted for investigative interviews [24](#apa14355-bib-0024){ref-type="ref"}. In 2001--2010, 245 clinical examinations were conducted on 237 children (220 girls) suspected to have suffered sexual abuse, with an average age of 8.1 years (range: one year to 17 years), and most of the findings were considered normal [39](#apa14355-bib-0039){ref-type="ref"}.
Cases of sexual abuse that come to the attention of the judiciary have often received considerable media attention, but it is also well‐known that they are notoriously difficult for the criminal system to handle. With increased knowledge and understanding of the enduring consequences for the victims, the seriousness of these crimes is gradually being reflected in legislative reforms and case law [40](#apa14355-bib-0040){ref-type="ref"}. At the same time, it is important to consider children\'s special needs in these criminal cases and the multiagency collaboration needed in each case during the judicial process [41](#apa14355-bib-0041){ref-type="ref"}.
Child homicides {#apa14355-sec-0017}
===============
The most severe outcome of child abuse is child homicide. Since the year 2000, four homicides of children have been brought to court in Iceland. These included two males who were found guilty of deaths attributed to shaking baby syndrome. One was a father and his five‐month‐old son, and the second was child minder who was looking after a nine‐month‐old boy. Two mothers were also found guilty of killing their children: one suffocated her newborn baby and another who killed her 11‐year‐old daughter with a knife. During the period 2000--2014, these incidents resulted in a child homicide rate of 0.40 per 100 000 population in children aged 0--14, which was similar to the rate (0.37) in the Nordic countries overall, according to the World Health Organization Mortality Database.
Discussion {#apa14355-sec-0018}
==========
International research shows that child physical health in Iceland, as measured by the infant mortality rate, is ranked as the best in the world [42](#apa14355-bib-0042){ref-type="ref"}, and childhood conditions are one of the best for positive growth and development [43](#apa14355-bib-0043){ref-type="ref"}. This review reports the prevalence of child abuse in Iceland, and these reveal that many children have experienced diverse forms of child abuse in their homes, state institutions and schools, as in other countries [44](#apa14355-bib-0044){ref-type="ref"}, [45](#apa14355-bib-0045){ref-type="ref"}. Since the late 1970s, the debate in Iceland has moved from discussions on whether child abuse exists to discussions on how to prevent it and remedy its consequences.
Child‐rearing practices change with time and legislation has a role to play. Icelandic parents who formerly were legally obliged to physically punish their children in the mid‐18th century are now legally forbidden to do the same or face prosecution [1](#apa14355-bib-0001){ref-type="ref"}. This is in contrast to the situation in some countries, where corporal punishment is legal and parents still believe that it is part of child rearing [46](#apa14355-bib-0046){ref-type="ref"}. However, people\'s views on how to bring up and punish children differ between societies and countries and change over time [16](#apa14355-bib-0016){ref-type="ref"}, [47](#apa14355-bib-0047){ref-type="ref"}. At the same time, the harm caused by all types and forms of child abuse is well‐documented [44](#apa14355-bib-0044){ref-type="ref"} and calls for preventive actions.
Reported figures on the prevalence of physical abuse vary widely [44](#apa14355-bib-0044){ref-type="ref"}. A meta‐analysis of 111 studies of child physical abuse with just under 10 million participants provided an overall prevalence of 22.6% in studies that used self‐report measures, regardless of gender [48](#apa14355-bib-0048){ref-type="ref"}. It concluded that the observed differences rested on the definition of physical abuse, the time period when the prevalence was measured, the number of questions in the survey and the year of publication, in addition to other sample characteristics. Sweden and Finland were the first two countries that prohibited physical punishment of children in 1979 and 1983, respectively, and parental attitudes have changed over time. In 1965, 53% of Swedish parents supported physical punishment of children, compared to 8% in 2011 [49](#apa14355-bib-0049){ref-type="ref"}. In Finland, the trend has been similar, but somewhat slower. In 1981, 44% of Finnish women and 52% of Finnish men felt that physically punishing their children was acceptable, while the comparative figures in 2006 were 23% and 45%, respectively [50](#apa14355-bib-0050){ref-type="ref"}. Similar trends have been noted in other Nordic countries that have banned the physical punishment of children, namely Norway in 1987, Denmark in 1997 and Iceland in 2003 [5](#apa14355-bib-0005){ref-type="ref"}. In the case of Iceland, the law needed to be revised in 2009 to leave no legal doubt regarding the prohibition.
Although legislation and parental attitudes are important, parental practice is what matters most. In 1995, 35% of Swedish children aged 14--17 reported having experienced physical abuse by an adult during their lifetime, but by 2016 this had fallen to 24%, of which 14% was by their parents [51](#apa14355-bib-0051){ref-type="ref"}. A similar declining trend was observed in Denmark: in 2010, 20% of children aged 14--15 reported experience of physical abuse by at least one of their parents in the last 12 months, but this had fallen to 17% by 2015 [52](#apa14355-bib-0052){ref-type="ref"}. In 2007, 18% of Norwegian graduating high‐school students aged 18--19 reported to have life‐time experience of physical violence in their homes [53](#apa14355-bib-0053){ref-type="ref"}. In Iceland, recall data gathered in 2010 showed that 48% of adults reported having experienced one or more forms of physical abuse in their childhood (Table [1](#apa14355-tbl-0001){ref-type="table"}) and the rate was 36% for those born in 1980--1992 [17](#apa14355-bib-0017){ref-type="ref"}. The data were indicative of a decline in physical abuse after 1980, in line with similar recall data from Finland [50](#apa14355-bib-0050){ref-type="ref"}, and this decline is likely to have continued. Thus, taking trends, time and different methodologies into account, the prevalence of physical child abuse in Iceland was in line with global estimate, but somewhat higher than those reported in the other Nordic countries.
There are limited data on the global prevalence of emotional abuse [44](#apa14355-bib-0044){ref-type="ref"}. A meta‐analysis of 29 studies, covering some seven million participants, concluded that emotional abuse was a global problem with a prevalence of 36.3% in studies using self‐report measures. The authors also reported that there were no gender differences [54](#apa14355-bib-0054){ref-type="ref"}. Data from Sweden and Denmark, based on different sample characteristics, showed lower prevalence figures. In Sweden, 16% of children aged 14--17 reported that they had been subjected to emotional abuse by an adult and in 11% of cases the perpetrator was a parent [51](#apa14355-bib-0051){ref-type="ref"}. In 2015, the prevalence of at least two episodes of emotional abuse was similar (8%) for Danish children aged 14--17 [52](#apa14355-bib-0052){ref-type="ref"}. Despite a low response rate of 43 245 subjects (27%), a Norwegian survey reported that 11% of adults recalled emotional abuse as children, with higher figures among males and the Sami population [55](#apa14355-bib-0055){ref-type="ref"}. In Iceland, 43% of 966 randomly selected adults reported that they had experience of at least two forms of emotional abuse as children [18](#apa14355-bib-0018){ref-type="ref"} (Table [1](#apa14355-tbl-0001){ref-type="table"}), which was close to the global prevalence figures. The odds were significantly higher among younger respondents [18](#apa14355-bib-0018){ref-type="ref"}, and this may reflect changed disciplinary practices and perceptions of what accounts as emotional abuse. This area needs further research.
Child sexual abuse is a worldwide problem. One meta‐analysis of 217 self‐report studies on child sexual violence, with close to 10 million participants in the period 1980--2008, provided a global prevalence rate of 12.7%, with higher rates for girls (18.0%) than boys (7.6%) [56](#apa14355-bib-0056){ref-type="ref"}. In 2016, 26% of Swedish children aged 14--17 reported one or more episodes of sexual violence by an adult or a peer of the same age, with higher rates in girls (40%) than boys (10%) [51](#apa14355-bib-0051){ref-type="ref"}. The most common experience was unwanted kissing or touching (16%) while 7.3% of girls and 0.9% of boys reported an unwanted experience of at least one of the most severe forms of sexual abuse. A 2007 Norwegian study of graduating high‐school students aged 18--19 found that 23% of the girls and 8% of the boys reported unwanted touching, while 12% of the girls and 6% of the boys reported unwanted intercourse [53](#apa14355-bib-0053){ref-type="ref"}. In 2015, a Danish study found that 12% of children aged 14--15 reported unwanted experiences of exposure by an adult or a peer of the same age: 12% reported touching and 6% reported intercourse, with the rates for girls being about twice the rates for boys [52](#apa14355-bib-0052){ref-type="ref"}. Icelandic data from 2004 indicated that 27.3% of individuals aged 16--19 had experienced any form of sexual violence during their lifetime by an adult or a peer of the same age, namely exposure, touching and intercourse (Table [2](#apa14355-tbl-0002){ref-type="table"}) [19](#apa14355-bib-0019){ref-type="ref"}. These results were similar to those from Sweden and Denmark, but higher than global estimates. The results from the 2015 Health Behaviour of School‐Aged Children study in Iceland gave somewhat lower prevalence figures of 14.6% for any form of sexual violence, but the participants were younger, at 14--15 years, and the questions did not include exposure [21](#apa14355-bib-0021){ref-type="ref"}.
Intra‐familial conflict is one form of child maltreatment that is closely related to verbal abuse, domestic violence and intimate partner violence. There have been a lack of studies, but the global prevalence is estimated to be 10--25% [44](#apa14355-bib-0044){ref-type="ref"}. A 2016 Swedish study of students aged 14--15 years old found that 6% reported experience of physical violence among adults in the family, compared to 12% in 2006 [51](#apa14355-bib-0051){ref-type="ref"}. In Norway, 10% of high‐school students aged 18--19 had observed physical violence at least once against one of their parents [53](#apa14355-bib-0053){ref-type="ref"}. An Icelandic study in 2003 found that 7.5% of students aged 14--15 had witnessed physical violence between adults in their home and 6% had become directly involved (Table [3](#apa14355-tbl-0003){ref-type="table"}). Individuals with those experiences reported more symptoms of depression, anger, anxiety and lower self‐esteem than those who reported no such experience. The most significant symptom was anger [23](#apa14355-bib-0023){ref-type="ref"}. The comparable figures in 2012 were 4.7% of girls and 4.2% of boys [24](#apa14355-bib-0024){ref-type="ref"}.
There are several forms of neglect, for example, physical, emotional and educational neglect and inadequate supervision by caretakers. It has been estimated that about one child in 10 is neglected worldwide [44](#apa14355-bib-0044){ref-type="ref"}. In a meta‐analysis of 16 studies on physical and emotional neglect with almost 120 000 participants, the prevalence for physical neglect was 16.3% and it was 18.4% for emotional neglect [57](#apa14355-bib-0057){ref-type="ref"}. In 2016, 6% of Swedish students aged 14--17 reported experience of physical (1%) or emotional neglect (5%) [51](#apa14355-bib-0051){ref-type="ref"}. In Iceland, in a random sample of adults, 11% reported that they had been neglected in childhood (Table [1](#apa14355-tbl-0001){ref-type="table"}), which was somewhat lower than global figures.
Evidence has been accumulating on the negative impact that diverse types of child abuse have on childhood and later adult health and well‐being. The effects are dose dependent and the more varied the experience, the more severe the consequences for a child\'s long‐term health [58](#apa14355-bib-0058){ref-type="ref"}. The qualitative and quantitative data from Iceland presented here indicate that many Icelandic children, including unborn babies, experience severe violence with risks for their later health and well‐being. This impacts on their physical and mental health and how they evaluate their upbringing and the justification for the abuse they suffered [17](#apa14355-bib-0017){ref-type="ref"}, [18](#apa14355-bib-0018){ref-type="ref"}, [20](#apa14355-bib-0020){ref-type="ref"}, [21](#apa14355-bib-0021){ref-type="ref"}, [22](#apa14355-bib-0022){ref-type="ref"}, [23](#apa14355-bib-0023){ref-type="ref"}.
In Iceland, the severe 2008 economic crisis has not, so far, had a negative impact on most of the commonly used child health indicators [35](#apa14355-bib-0035){ref-type="ref"}. In particular, there has not been any increase in notifications to child protection committees that could be related to the crisis. From the outset, the Icelandic Government aimed to protect the welfare and social security system already in place. For example, in 2009, it established a multi‐disciplinary body, whose name translates as Welfare Watch to advise it on the potential impact of the economic crisis on the health and well‐being of the population, with particular reference to children and families [35](#apa14355-bib-0035){ref-type="ref"}, [59](#apa14355-bib-0059){ref-type="ref"}. From 2012 to 2015, an inter‐ministerial platform, whose name translates as Awareness Awakening, raised awareness of child abuse, its consequences and the need for prevention among children, professionals working with children, the judiciary and the general public [60](#apa14355-bib-0060){ref-type="ref"}. Based on its work, and that of others [24](#apa14355-bib-0024){ref-type="ref"}, [30](#apa14355-bib-0030){ref-type="ref"}, various preventive actions await elaboration and implementation. The viral Me Too movement, which highlights sexual assaults and harassment, adds a new dimension and urgency to such efforts, in Iceland as elsewhere.
Conclusion {#apa14355-sec-0019}
==========
We found that the prevalence of child abuse and neglect in Iceland was similar to, or slightly higher, than for the Nordic countries, and similar to, or lower, than global figures. The diverse preventive actions that have already been put in place in Iceland, and are being discussed, underline the increased general understanding of the problem at hand and the urgent need to act. The Convention on the Rights of the Child states that all children should be protected from violence. They have the right to enjoy a childhood that is free of abuse and fosters their growth, development and the well‐being. Icelandic children are no exception, but the steps that are needed to protect them are, ultimately, a question of political will.
Finance {#apa14355-sec-0020}
=======
This study did not receive any specific funding.
Conflicts of interest {#apa14355-sec-0021}
=====================
The authors have no conflicts of interest to declare.
| {
"pile_set_name": "PubMed Central"
} |
Up until recently, these past two months have been hovering over me like a lingering dog fart. At my full-time job I just finished a huge meeting in balmy Chicago this past weekend. This required huge coordination efforts and while I’m glad I had extremely capable people to assist me, it was still very time consuming and extremely stressful.
I was eager to leave Chicago the following Monday, however it seemed that the city would not let me go. My flight to Charlotte was delayed for about four hours due to heavy fog. We sat on the tarmac for about two hours before taxiing over to the nearest gate, only to wait for two more hours. If the airport built bars along the airstrip to accommodate these long delays, I suspect they would make a friggin’ mint.
Now that I’m back home I don’t see things slowing down anytime soon, at least not as far as my art is concerned. I’m already preparing for some upcoming events that will be taking place over the next week or so. First, I’m going to be showing some work at a performing arts center in Garner, NC. A friend of mine told me they were looking for some African American artists to show their work during black history month. He asked if I would be interested and after thinking about it for a day or two I decided to go for it.
First thing is that I have to decide how I want to arrange my pieces beforehand so I don’t put a bunch of holes in the wall when I get there. No, I haven’t physically gone up there yet to see the space. Hello, that would have been the prudent thing to do, I know. Their website helped a little but not much. I haven’t decided how much wall space I need or how many pieces I will bring so I need to figure that out like yesterday. For sure I plan to take two of my larger pieces – Seasons and Nine Ladies Dancing.
Next Friday, February 3, I’m back on familiar turf in North Davidson at the Neighborhood Theater. This will be my third time participating. I hated that I missed the market in December but I had work, plus there were church events and of course, the holidays. Sometimes you just can’t do it all.
Within the next few weeks, I am going to apply for the Come See Me Festival in Rock Hill, SC, which will be held in April. It’s a huge outdoor festival and the artists will have the opportunity to display their work either indoors or outdoors. I still have time to turn in the application but I don’t want to wait too long.
I’m looking forward to these next few weeks and yes, I’ll be keeping you posted on my art adventures! | {
"pile_set_name": "Pile-CC"
} |
New Dimensions
This article is about the Three Degrees album. For the UK fire service, see New Dimension programme. For the EP and song by Zion I, see New Dimensions EP. New Dimensions is also the title of a series of sf anthologies edited by Robert Silverberg.
New Dimensions is a studio album by the American vocal trio The Three Degrees. Released in 1978, the album was produced by Giorgio Moroder and yielded three UK Top 20 hit singles, "Giving Up, Giving In" (UK #12), "Woman In Love" (UK #3), and "The Runner" (UK #10). The album peaked at #34 in the UK Album Chart in early 1979.
The rights to the Ariola Records back catalogue are now held by Sony BMG Music Entertainment. New Dimensions has been released on compact disc in Japan in 2008, and was released on compact disc in the UK in 2010 by BBR Records with seven bonus tracks.
Track listing
Side A:
"Giving Up, Giving In" (Giorgio Moroder, Pete Belotte) - 6:07
"Falling in Love Again" (Giorgio Moroder, Pete Belotte) - 5:34
"Looking for Love" (Giorgio Moroder, Pete Belotte) - 5:26
Side B:
"The Runner" (Sheila Ferguson, Giorgio Moroder) - 6:18
"Woman in Love" (Dominic Bugatti, Frank Musker) - 5:16
"Magic in the Air" (Giorgio Moroder, Pete Belotte) - 5:45
Compact disc re-issue 2010 (UK)
7. "Giving Up Giving In" (7" Single version)
8. "Woman in Love" (7" Single version)
9. "The Runner" (7" Single version)
10. "Falling in Love Again" (7" Single version)
11. "Out of Love Again" (Giorgio Moroder, Pete Belotte) (B-side)
12. "The Golden Lady" (George Garvarantz, Sheila Ferguson) (OST album version from The Golden Lady)
13. "The Runner" (12" Extra Long Version)
Personnel
Sheila Ferguson - vocals
Valerie Holiday - vocals
Helen Scott - vocals
Production
Giorgio Moroder - producer
Robin Branchflower, Georges Garvarentz, Del Newman - producers on CD re-issue, track 12 "The Golden Lady"
Greg Mathieson - arranger
Jürgen Koppers - engineer
Bill Smith - artwork
Gered Mankowitz - photography
Side A recorded at Essex Studios, London. Mixed at Musicland Studios, Munich.
Side B recorded & mixed at Westlake & Larrebee Studio, Los Angeles.
References
Category:1978 albums
Category:Disco albums by American artists
Category:Albums produced by Giorgio Moroder
Category:The Three Degrees albums
Category:Ariola Records albums | {
"pile_set_name": "Wikipedia (en)"
} |
Porous-coated femoral components with or without hydroxyapatite in primary uncemented total hip arthroplasty: a systematic review of randomized controlled trials.
The purpose of this systematic review was to determine the clinical and radiologic benefit of hydroxyapatite coating in uncemented primary total hip arthroplasty. A database of Medline articles published up to September 2007 was compiled and screened. Eight studies involving 857 patients were included in the review. Pooled analysis for Harris hip score as a clinical outcome measure demonstrated no advantage of the hydroxyapatite coating (WMD: 1.49, P = 0.44). Radiologically, both groups showed equal presence of endosteal bone ingrowth (RR: 1.04, P = 0.66) and radioactive lines (RR: 1.02, P = 0.74) in the surface area of the prosthesis. This meta-analysis demonstrates neither clinical nor radiologic benefits on the application of a hydroxyapatite coating on a femoral component in uncemented primary total hip arthroplasty. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Redirect() throws a blank page.working fine in my localhost.
Redirect() throws a blank page.But working fine in my localhost.
I tried using :
<META HTTP-EQUIV="Refresh" Content="0; URL=xyz.php">
This works fine.But i need redirect function to work properly...
My code is :
redirect("index.php");
A:
Try header("Location: /index.php");, assuming that the index.php file is located in the root of the site.
http://php.net/manual/en/function.header.php
Also note that this would probably work too header("Location: /"); since index.php is the default file a server looks for in the site root.
Finally, the reason for the blank page is most likely because redirect is not a valid function in php ;)
| {
"pile_set_name": "StackExchange"
} |
Preforms of plastic such as for example polyethylene terephthalate (PET), polypropylene (PP) etc. are used in particular in the drinks industry for the production of containers, for example bottles. The preforms are supplied to the container handling plants which heat the preforms in a heating device in order then to expand and stretch them into plastic containers in a blow-mounding machine using a blow-moulding process. The plastic containers are then transported by means of a transport system to further treatment devices such as for example a cleaning apparatus, a labelling apparatus, a filling apparatus, a sorting apparatus, a packing apparatus etc.
The preforms are usually first supplied to the container processing plants unsorted. Unsorted here means that the preforms are first passed to a receiver apparatus in which, although usually preforms of the same type such as size, material etc. are present, the preforms can be oriented in any direction in relation to each other. To process the preforms in the container processing plant, the preforms must however all be aligned in a predetermined direction to each other. To this end roll sorter devices for example are used in the prior art.
US 2004/0109747 A1 describes a system for supplying preforms in particular for a container blowing machine. This system has a filling hopper, on the base of which are arranged two substantially parallel rolls which rotate about their respective axes. The gap between the two rolls is dimensioned such that it is greater than the diameter of the body of the preforms placed in the filling hopper but is smaller than the diameter of the neck ring of the preforms in the filling hopper. As the diameter of the body of the preforms is smaller than the diameter of the neck ring of the preforms, preforms which fall through the gap with their body first are suspended by their neck ring on the two rolls. Preforms which for example remain lying completely on the rolls are pushed off the rolls via a pusher wheel arranged above and transverse to the axis of the two rolls so that the two rolls only transport preforms which are aligned next to each other in one direction.
However, seized preforms cannot be removed from the two rolls with such a roll sorter device.
It may be desirable to provide an improved roll sorter device and an improved sorting method for sorting preforms and a transport device with such a roll sorter device that can economically also remove seized preforms from the two rolls of the roll sorter device. | {
"pile_set_name": "USPTO Backgrounds"
} |
A Honolulu newspaper is reporting the Mark Zuckerberg is wanting to expand his property to 700 acres in an attempt to gain more privacy, he purchased the land on Kauai for $100 Million.
From The Star Advertiser:
Close to a dozen small parcels within Zuckerberg’s Kauai estate are owned by kamaaina families who have rights to traverse the billionaire’s otherwise private domain.
Now the Facebook CEO is trying to enhance the seclusion of his property by filing several lawsuits aimed at forcing these families to sell their land at a public court auction to the highest bidder.
TRENDING: ANGRY LEFTIST Smacks 84-Year-Old Female Trump Supporter Across the Face at Trump Rally in Aliso Viejo -- Beats Another Senior (VIDEO)
The legal action known as “quiet title and partition” isn’t uncommon in Hawaii. Yet even with an order from a judge and financial compensation, forcing people to sell land that has been in their families for generations can be off-putting — especially when it’s driven by the sixth-richest person in the world. | {
"pile_set_name": "OpenWebText2"
} |
The invention relates to methods and devices for producing stacks composed of printed products which are supplied continuously while essentially positioned upright with the aid of a first conveying device and in an overlapping flow to a substantially horizontally extending stack support and which form a stack while lined up at least approximately positioned upright. The stack that is positioned on the stack support is conveyed with the aid of a second conveying device in a forward-feed direction and at a forward-moving speed and, in the process, is supported along one leading stack end against a supporting device that also moves along.
A method and device for producing stacks composed of print products are generally disclosed in the art, for example in European patent documents EP 0623542, EP 0872443 and EP 1405809. Stacks of this type, also called bundles, are held together with the aid of end boards and strapping and have long proven themselves in the process of removing printed sheets from printing presses and preparing them for the further processing.
Stacking thick printed sheets, for example sheets containing 100 or more pages, often causes a comparatively strong spreading out or expansion of the sheets towards end of stack, which are positioned on their backs during the conveying for the stack formation. In particular with folded printed products where the folding edges respectively form the backs, this can make the stack formation considerably more difficult. In addition, these printed products can be damaged during the stack formation because of the comparatively high friction.
An arrangement said to be especially suitable for such printed products is disclosed in European patent document EP 1950159, in particular for products that are stitched or stapled along the fold, wherein these printed products can include newspapers, magazines or brochures. To simplify the stack forming process, it is proposed to divide the stack into a plurality of stack sections and to arrange these sections offset against each other. For the offset arrangement of a stack, a displacement device is required which engages in the stack support and is embodied, for example, as graduated conveying belt. A stack composed of offset stack sections, however, requires considerably more space, and the production thereof is clearly more involved than that of a traditional stack.
The method according to the European patent document EP 1350750 is intended to facilitate the forming stacks composed of printed products. For this, the sheet-metal guides arranged in the region above the area where the printed products arrive on the stack support are respectively provided with a region that projects in stacking direction and which functions to redirect the printed products into stacking direction during the feeding to the stack support. This is operative to increase the inherent stability of the printed products during the intake as well as to provide more space for the newly supplied printed products. However, this method has the disadvantage that the friction is increased between the printed products, thus also increasing the risk of damage to the products and/or blurring of the print color. A compacting device for compacting the downstream-directed portion of the stack is furthermore arranged in stacking direction at a distance to the area of impact for the printed products, which acts to accelerate two opposite-arranged edge regions of the of the printed products in stacking direction. A brush roller is also arranged, according to one embodiment, on both sides above the upstream, non-compressed portion of the stack which promotes the conveying. | {
"pile_set_name": "USPTO Backgrounds"
} |
Cassidy, Kylie, Vera and I went to the laundromat to do some laundry – nobody ever goes to this one so its a perfect location to be naughty and fool around while nobody is in there with us! We took off our clothes and put them in the wash with the rest of our stuff and messed around and had a bit of fun while it was washing. After we put the clothes in the dryer we got dressed and planned on going out for a bit – that was until Kylie forgot her phone and we came back to some creep sniffing our panties! He had a camera with him and it had pictures and videos of us naked on it – so we did the same to him, stripping him naked and taking pics of him! Vera dared us to suck his cock so we did! Cassidy and I filled our mouths with his cock and made it nice and hard for her pussy! Cassidy got fucked hard in a bunch of different positions by his huge dick before we got on our knees received his load!
Dear fans, as you see some of my videos are not working. The problem is in videomega, the website was closed and now my videos doesnt work. But, im still here for you, im uploading new videos day by day and updating my old videos. For faster reupload fill this FORM.
TOP POSTS
HOW TO DOWNLOAD VIDEOS
We're made a few changes with our streaming system. Now, you can download our movies for free. Download speed is not limited! Play the video, close popups & ads than right click to video and use Save As function or Save Video.. ENJOY! | {
"pile_set_name": "Pile-CC"
} |
Practising Ubuntu and leadership for good governance : the South African and continental dialogue
Abstract:
The focus of this article is on the role of Ubuntu and leadership as values that can
enhance and accelerate service delivery, and ultimately promote good governance.
The article considers whether Ubuntu philosophy can assist the public sector in
entrenching this philosophy among public servants. Ensuring effective service
delivery requires a different approach and a new way of thinking on the part of
public service practitioners. One approach will be fostering the spirit of Ubuntu
on all who are involved with service delivery in the public sector. Ubuntu is a
philosophy and way of life that has held society together due to its beliefs and
practices, which have consequently put the person at the centre of all things. There
is a clear concept of morality in Ubuntu which contradicts the manner of behaviour
which is often prevalent today. Ubuntu has values that are concerned with both
the character and behaviour of a person. The article suggests that Ubuntu and
principles of leadership and good governance are compatible and complementary. | {
"pile_set_name": "Pile-CC"
} |
Polo-like kinase (Plk) 1 as a target for prostate cancer management.
Prostate cancer (PCa) is the most commonly occurring cancer in American men, next to skin cancer. Existing treatment options and surgical intervention are unable to effectively manage this cancer. Therefore, continuing efforts are ongoing to establish novel mechanism-based targets and strategies for its management. The serine/threonine kinases Polo-like kinase (Plk) 1 plays a key role in mitotic entry of proliferating cells and regulates many aspects of mitosis which are necessary for successful cytokinesis. Plk1 is over-expressed in many tumor types with aberrant elevation frequently constituting a prognostic indicator of poor disease outcome. This review discusses the studies which indicate that Plk1 could be an excellent target for the treatment as well as chemoprevention of prostate cancer. | {
"pile_set_name": "PubMed Abstracts"
} |
The Promise in Compromise
The Promise in Compromise is the third studio album by the American band Tokyo Rose.
Track listing
"Less Than Four" – 2:25
"The Promise In Compromise" – 3:02
"We Can Be Best Friends Tonight, But Tomorrow I'll Be..." – 3:36
"A Pound Of Silver Is Worth Its Weight In Blood" – 3:15
"Right As Rain" – 2:49
"611 Life Lesson" – 3:10
"Can I Change Your Mind?" – 3:18
"Swimming With The Sharks" – 3:47
"Call It What You Like, Just Leave Us Out Of It" – 3:02
"I Won't Say It" – 3:06
"Seconds Before The Crash" – 4:13
Category:2007 albums
Category:Tokyo Rose (band) albums | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
new MailMessage() Throws 'The handle is invalid'
Why does this code:
MailMessage mm = new MailMessage();
Throw this exception:
System.Security.Cryptography.CryptographicException was caught
Message=The handle is invalid.
Source=mscorlib
StackTrace:
at System.Security.SecureString.ProtectMemory()
at System.Security.SecureString.InitializeSecureString(Char* value, Int32 length)
at System.Security.SecureString..ctor(Char* value, Int32 length)
at System.Net.UnsafeNclNativeMethods.SecureStringHelper.CreateSecureString(String plainString)
at System.Net.Configuration.SmtpNetworkElementInternal..ctor(SmtpNetworkElement element)
at System.Net.Configuration.SmtpSectionInternal..ctor(SmtpSection section)
at System.Net.Configuration.SmtpSectionInternal.GetSection()
at System.Net.Mail.SmtpClient.get_MailConfiguration()
at System.Net.Mail.MailMessage..ctor()
at csEmail.GetMailMessage(String subject, String htmlbody) in c:\Users\Greg\My Dropbox\Intern Files\mobiledesign\App_Code\Utilities.cs:line 364
InnerException:
My Web.config
<smtp deliveryMethod="Network" from="correctAddress">
<network host="smtp.gmail.com" userName="correctAddress" password="correctPassword" enableSsl="true" port="587"/>
</smtp>
A:
Why it throws it? probably because MS is doing something goofy under the covers.
IIRC, that SecureString code actually makes an interop call down to advapi32.dll.
My knee jerk reaction is to:
Disable any antivirus software, and see if that fixes it.
Make sure you have access to that dll.
| {
"pile_set_name": "StackExchange"
} |
The present invention relates to metal working, and more particularly to bending metal conduit, pipe, tubing and the like to a preselected angle.
In various industries, such as the construction and plumbing industries, it is often necessary to bend metal conduit and pipe to a desired angle. Metal conduit and pipe, however, are manufactured in various nominal diameter sizes having various wall thicknesses which are generally referred to as steel and aluminum "rigid" conduit and pipe, IMC conduit and pipe, or "thinwall" (EMT) conduit. These various sizes and types of conduit and pipe have created numerous problems in the design of manual and power driven bending apparatuses. For example, a rigid steel conduit having a 1 inch nominal diameter has an actual outer diameter which is greater than the actual outer diameter of a 1 inch nominal size thinwall conduit. As a result, a plurality of different bending shoes or dies having a hemispherical recess or groove formed therein which matches the size of the conduit and pipe being bent have generally been used in the past in order to provide sufficient support during bending. Shoes having a plurality of different size grooves formed therein have also been used as shown in Hautau, U.S. Pat. No. 3,299,681.
Another type of problem exists when bending larger sizes of thinwall conduit and pipe. The relatively thin wall of this type of conduit and pipe tends to collapse inwardly or kink during bending. Therefore, some means for supporting the inside face of the bend or for cold working the wall of the bend by either stretching or squeezing during bending is needed to prevent collapsing or kinking of the walls. See for example Hautau, U.S. Pat. No. 3,147,792. Other problems well known in the art of bending include providing for easy removal of conduit and pipe after bending, slippage during bending, and springback after bending.
Various power driven bending apparatus have been developed. One such arrangement is shown in Pearson et al, U.S. Pat. No. 3,949,584 wherein there is provided a rotating bending shoe and a roller unit utilizing a pair of rollers acting in tandem for supporting conduit during the bending operation. The rollers shown in the Pearson et al patent, however, may only be utilized with a limited range of conduit diameters and wall thicknesses. As a result, multiple roller units must be utilized to cover the full range of conduit and pipe sizes and types available in the marketplace. Another arrangement is shown in U.S. Pat. No. 4,249,407 in which conduit is bent around a stationary circular die by a rotating member. Other bending machines are shown in U.S. Pat. Nos. 3,417,590 and 1,899,281. Nevertheless, none of the above known bending apparatuses are capable of accommodating the numerous conduit diameters and wall thicknesses available in a single arrangement without the necessity of providing multiple interchangeable bending components for the apparatus.
It is thus desirable to provide a bending apparatus which may accommodate conduit of various diameters and wall thicknesses as well as solve the aforementioned problems. | {
"pile_set_name": "USPTO Backgrounds"
} |
Washer Troubleshooting Tips: 5 Things to Check Before You Call for Repairs
Washer Troubleshooting Tips: 5 Things to Check Before You Call for Repairs
Doing laundry can be a real chore, from washing and drying to folding to running out of detergent (the best, by the way, is eco-friendly Melaleuca laundry detergent). When your washing machine is on the fritz, that chore can become a nightmare.
When you’re having problems with your washing machine, appliance repair Brooklyn and appliance repair Staten Island is always ready to help you with the fast and effective washer repair.
But we realize that money is tight (especially after the holidays) and we don’t want you to have to pay for a service call when you don’t really need one.
If your washer isn’t performing as it should, try taking a quick look at these five areas before you give us a call:
1) Check the power
You don’t recall unplugging your washing machine, but maybe someone else did when they had to move the washer out to reach something that fell behind the machine or when they wanted to vacuum around the area.
If the machine is plugged in, make sure the circuit breaker hasn’t tripped or a fuse hasn’t blown. If the source of power seems to be in order, plug a small appliance into the washing machine’s outlet to make sure that it’s working properly. (You don’t want to call for washer repair Brooklyn or washer repair Staten Island when you really need an electrician.)
2) Check water supply valves
Water not filling the tub? It could be a pump problem or it could simply be that someone turned off the water supply valves. Make sure they’re open and operating.
3) Try the unplugging trick
If your washer stopped working midcycle and won’t continue, try unplugging it and plugging it back in again. Like everything else, washing machines these days are controlled by electronic circuits that sometimes need a hard reset. Make sure the lid is down – most machines won’t spin, and many won’t agitate, if the lid is raised.
4) Inspect the hoses
Water leaks may indicate a problem with some of your machine’s internal components, but more often they’re related to the hoses connected to it. Your washer should have three hoses: a cold water intake, a hot water intake and a drain hose. Inspect them all – do they look dried out and/or cracked? Are they connected properly? If someone pulled your machine away from the wall, it’s possible that those connections have been loosened. (It’s also a good idea, as a part of washer maintenance, to replace hoses every three to five years to prevent floods from burst pipes.)
Water that remains in the tub or excessively wet clothes after a spin cycle may be a signal that you’ve got something blocking the drain hose. Examine the drainage hose to make sure there are no kinks or bends in it that could stop the free flow of water. Pushing the washing machine too close to a wall can crush hoses as well. Next, take off the drain hose and try sending water through it to make sure that there are no clogs caused by socks, built up lint, coins, pens and other items that sometimes end up going through the wash.
5) Try a smaller load
When your washer is making loud noises or vibrating, it’s often a question of load and balance. It could be that you’re simply putting too many clothes, sheets and/ or towels in each load, or you could be trying to wash a throw rug or big bedspread in a machine that’s not really big enough to handle it. Try a smaller load.
If vibration persists even with a smaller load, check the washer’s level. Since floors are often uneven, moving the machine just a few inches can throw your washer off balance, which will lead to vibration (and more wear and tear on your machine). Most washers are equipped with feet at their base that you can screw in and out to even things up.
If you’ve run these quick checks yourself and haven’t found a problem, it’s time to call in the experts in appliance repair Brooklyn or appliance repair Staten Island. We’ll get your washer working again as quickly and economically as possible – and the troubleshooting you’ve already done will help our technicians get to the real problems faster.
Meta
TORONTO (Reuters) - Britain's Prince Harry and American girlfriend Meghan Markle made their first formal public appearance together on Monday, with the couple holding hands and watching a wheelchair tennis match at the Invictus Games in Toronto. | {
"pile_set_name": "Pile-CC"
} |
Road accidents caused by sleepy drivers: Update of a Norwegian survey.
The current study tests, updates and expands a model of factors associated with sleepy driving, originally based on a 1997 survey of accident-involved Norwegian drivers (Sagberg, F., 1999. Road accidents caused by drivers falling asleep. Accident Analysis & Prevention 31, 639-649). The aim is to establish a robust model to inform measures to tackle sleepy driving. The original questions on (i) tiredness-related accidents and (ii) incidents of sleep behind the wheel in the last 12 months were again posed in 2003 and 2008, in independent surveys of Norwegian drivers involved in accidents reported to a large insurance company. According to those drivers at-fault for the accident, tiredness or sleepiness behind the wheel contributed to between 1.9 and 3.9 per cent of all types of accident reported to the insurance company across these years. Accident-involved drivers not at fault for the accident reported a reduction in the incidence of sleep behind the wheel for the preceding year, decreasing from 8.3 per cent in 1997 to 2.9 per cent in 2008. The reasons for this are not clear. According to logistic regression analysis of survey responses, the following factors were robustly associated with road accidents involving sleepy driving: driving off the road; good road conditions; longer distance driven since the start of the trip; and fewer years with a driving licence. The following factors are consistently associated with reports of sleep behind the wheel, whether or not it leads to an accident: being male; driving further per year; being younger; and having sleep-related health problems. Taken together these findings suggest that young, inexperienced male drivers who drive long distances may be a suitable target for road safety campaigns aimed at tackling sleepy driving. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Start:stop slicing inconsistencies between numpy and Pandas?
I am a bit suprised/confused about the following difference between numpy and Pandas
import numpy as np
import pandas as pd
a = np.random.randn(10,10)
> a[:3,0, newaxis]
array([[-1.91687144],
[-0.6399471 ],
[-0.10005721]])
However:
b = pd.DataFrame(a)
> b.ix[:3,0]
0 -1.916871
1 -0.639947
2 -0.100057
3 0.251988
In other words, numpy does not include the stop index in start:stop notation, but Pandas does. I thought Pandas was based on Numpy. Is this a bug? Intentional?
A:
This is documented, and it's part of Advanced Indexing. The key here is that you're not using a stop index at all.
The ix attribute is a special thing that lets you do various kinds of advanced indexing by label—choosing a list of labels, using an inclusive range of labels instead of a half-exclusive range of indices, and various other things.
If you don't want that, just don't use it:
In [191]: b[:3][0]
Out[191]:
0 -0.209386
1 0.050345
2 0.318414
Name: 0
If you play with this a bit more without reading the docs, you'll probably come up with a case where your labels are, say, 'A', 'B', 'C', 'D' instead of 0, 1, 2, 3, and suddenly, b.ix[:3] will returns only 3 rows instead of 4, and you'll be baffled all over again.
The difference is that in that case, b.ix[:3] is a slice on indices, not on labels.
What you've requested in your code is actually ambiguous between "all labels up to an including 3" and "all indices up to but not including 3", and labels always win with ix (because if you don't want label slicing, you don't have to use ix in the first place). And that's why I said the problem is that you're not using a stop index at all.
| {
"pile_set_name": "StackExchange"
} |
This season's schedule is full of great non-conference games. Many would be surprised to see so many contests between top 10-15 teams. However, there is not a fan out there that would complain about the amount of high-quality games on this season's slate. Furthermore, there are also dozens of games between potential NCAA Tournament teams and quality mid-major squads. Nearly every night, you can sit down and watch a game between NCAA-caliber clubs. Let's take a look at the best of the bunch, most of which fall between now and the start of the new year.
Week of November 12-November 18
New Mexico State at Duke (Monday)
Davidson at North Carolina (Wednesday)
Clemson at Mississippi State (Thursday)
Virginia at Arizona (Saturday)
Week of November 19-November 25
George Mason at Kansas State (Thursday)
Arizona at Kansas (Sunday)
Week of November 26-December 2
Wisconsin at Duke (Tuesday)
Georgia Tech at Indiana (Tuesday)
North Carolina State at Michigan State (Wednesday)
North Carolina at Ohio State (Wednesday)
Missouri at Arkansas (Wednesday)
Oregon at Kansas State (Thursday)
Gonzaga at St. Joseph’s (Thursday)
North Carolina at Kentucky (Saturday)
Indiana at Southern Illinois (Saturday)
Duke vs. Davidson — in Charlotte (Saturday)
Gonzaga vs. Connecticut — in Boston (Saturday)
Ohio State at Butler (Saturday)
Kansas at USC (Sunday)
Texas at UCLA (Sunday)
Texas A&M at Arizona (Sunday)
VCU at Maryland (Sunday)
Week of December 3-December 9
Memphis vs. USC — in New York (Tuesday)
Kansas State vs Notre Dame — in New York (Tuesday)
Washington at Gonzaga (Wednesday)
Georgetown at Alabama (Wednesday)
Kentucky at Indiana (Saturday)
Davidson at UCLA (Saturday)
Marquette at Wisconsin (Saturday)
Pittsburgh at Washington (Saturday)
Week of December 17-December 23
Kansas at Georgia Tech (Tuesday)
Duke vs. Pittsburgh — in New York (Thursday)
Davidson at North Carolina State (Friday)
Georgetown at Memphis (Saturday)
Texas at Michigan State (Saturday)
Tennessee at Xavier (Saturday)
UAB at Kentucky (Saturday)
Florida at Ohio State (Saturday)
New Mexico State at Louisville (Saturday) | {
"pile_set_name": "Pile-CC"
} |
Preforms are blow molded to produce containers out of a thermoplastic material in a desired shape. The preforms are first thermally conditioned along a transport route in a heating unit. Particularly the preforms are first heated before the subsequent blow molding process is performed. During the blow molding process the preforms are transformed into containers of the desired shape by compressed air.
The distance between the preforms coming out of the heating unit is usually quite small. The preforms are then usually handed over to the subsequently arranged blow molding device by a transfer star or a delivery star. The distance between the preforms has to be enlarged before the blow molding process according to the size and distance of the blow molds.
This is usually done by moving the preform holding clamps in a radial and tangential direction away from each other.
Document WO 2006/050935 discloses a method and a device for the transport of containers that comprise a carrying ring or something alike. Hereby the radial control of the gripping elements is done by a hydraulic or pneumatic device.
DE 10 2006 023 531 A 1 shows a device for the transport of piece goods with a rotary carrier device and a plurality of transport arms, which are swivel mounted on the carrier device. The movement of the at least one carrier arm is independently controlled from the movement of another transport arm.
WO 1998 022374 A1 shows a servo driven, computer controlled transfer system for containers. The system replaces known transfer stars and is able to transport a plurality of containers with different sizes. Because of the servo driven gripping mechanism and the control by a computer this is a so called “intelligent” system. The gripping arms are moved by servo motors, allowing a secure grip of the containers. | {
"pile_set_name": "USPTO Backgrounds"
} |
President Trump’s Uncertain Fate
President Donald J. Trump disembarks Air Force One at Beale Air Force Base, Calif., Saturday, Nov. 17, 2018, to begin his visit to Paradise, Calif., which was devastated by wildfires. (Official White House Photo by Shealah Craighead)
After two years of solid achievements, Donald Trump’s future seems uncertain, in part, as Victor Davis Hanson points out in American Greatness. Even as Trump’s economic policies and foreign affairs bring results, “the more the hatred of him grows, both inside and outside his own party.”
Trump’s Signature Long Term Agendas Hang in the Balance
Checking China’s often ruthless rise to global commercial and eventual military supremacy.
Growing an economy that includes preeminent American manufacturing, energy production, and industrial output.
Ending the idea of a bicoastal elite adjudicating politics and culture for a supposedly backward and declining traditional interior.
How to Fathom the Trump Paradox
(Trump’s) extraordinary powers of resilience and retaliation stave off the constant assaults from progressives and the media, and such defiance inspires a red-state America. Yet so far Trump’s caustic retorts also stymie winning over enough swing and minority voters to achieve a 51 percent ruling majority to ensure his ideas of restored greatness.
For now, Trump’s fate may be in the hands of others—as it was in 2016 when what put him over the top was wide scale repugnance at the thought of a corrupt President Clinton and all that her victory would entail. The final take-over of the Democratic Party by progressive extremists might well empower Trump to reelection.
Yet it is a scary idea that the fate of making America great again might hinge on the nihilism of the Democratic Party.
Debbie Young
Debbie, editor-in-chief of Richardcyoung.com, has been associate editor of Dick Young’s investment strategy reports for over three decades. When not in Key West, Debbie spends her free time researching and writing in and about Paris and Burgundy, France, cooking on her AGA Cooker, and practicing yoga. | {
"pile_set_name": "Pile-CC"
} |
On January 2, the Kurdistan Regional Government (KRG) shut down the offices of Yazda, a non-governmental organization in Dohuk that provides vital support to vulnerable Yezidis who fled the so-called Islamic State in 2014. The closure of Yazda reignited concerns among the Yezidi community about their future under the increasingly authoritarian leadership of the KRG. It also reminded Yezidis that they are trapped in a power play among Kurdish factions and between the Kurds and the Iraqi central government.
Yazda has since been reopened, but a possible reason for the closure could be that the NGO assists 3,000 Yezidi families in the Sinjar Mountains, by providing food and other vital goods through a United Nations Development Program project. The KRG had restricted the entry of goods into Sinjar, home of the Yezidi community, because it fears they may end up in the hands of the rival Kurdistan Workers Party (PKK), which is present in the area.
The Sinjar Mountains, straddling the border between Iraq and Syria, have not only been the setting of a power struggle between the KRG and the PKK. Before that, the regime of then-Iraqi president Saddam Hussein initiated an “Arabization” campaign in Kurdish-dominated areas that also included Yezidis, who were declared to be of Arab rather than Kurdish ethnicity. Thousands were relocated from their homes in the Sinjar Mountains to newly-constructed housing units that were given Arabic names. Following the downfall of the Baath regime in April 2003, most of those Arabized areas became disputed territories between Arabs and Kurds. Since then, many of them have become a part of the KRG’s sphere of influence.
Beyond their horrific toll on lives and livelihoods, the attacks perpetuated by the Islamic State in 2014 against the Yezidis further complicated matters. Some Yezidis believe that the Peshmerga of the Kurdistan Democratic Party (KDP), led by Massoud Barzani, the president of the KRG, carried out a “tactical withdrawal” from the Sinjar Mountains in 2014, leaving them at the mercy of the Islamic State. Only the entry of the People’s Protection Units (YPG), the military arm of the Syrian Kurdish Democratic Union Party, both closely affiliated with the PKK, protected the Yezidis and led to the liberation of their towns and villages.
This development alarmed Turkey and the KRG. The Turks were hostile to the YPG’s expansion of its area of control, considering the group an extension of the PKK, which has fought a decades-long insurgency against the Turkish state. The KRG was also strongly opposed to the PKK and its influence in the Sinjar area. The Turks suggested that they might expel the PKK from Sinjar if the KRG failed to act. The United States also issued statements, in line with both Turkey and the KRG, describing the presence of the PKK as an obstacle to reconciliation and the return of displaced Yezidis to their homes. Meanwhile, the PKK also announced that it would respond to any military action it faced.
For Yezidis, these political disputes have reignited an inherent tension between their ethnic identity as Kurds and their distinct religious beliefs. Considered ethnic Kurds who speak Kurmanji, Yezidis are also characterized by a distinct religion. They are a syncretic sect that amalgamates Zoroastrianism, Judaism, Christianity, Islam, and worship of the Peacock Angel. Yezidis also have a social structure that divides the community into three social groups that are functionally interdependent but cannot intermarry. This tension between their ethnic identity as Kurds and their unique social makeup and religious beliefs has been the hallmark of the struggle over the community.
The question of the Yezidi community’s identity has diverse political implications, mainly because political actors outside the community seek to define Yezidis in a way that satisfies their own particular political agendas.
The KRG has emphasized the Kurdish identity of Yezidis, as part of an effort to reinforce Kurdish claims over the disputed territories from which they come. For instance, Barzani has supported Yezidis who have demanded autonomous rule over the Sinjar Mountains. The KRG president sees this as a way for Kurds to lay claim to these disputed territories.
However, stressing the “Kurdishness” of the Yezidis is also meant to shore up support for the political authorities in the KRG, who are mired in a political and a socio-economic crisis. For the past two years the KRG government has been dysfunctional. Barzani’s mandate ended in August 2015, but no elections have been held for a new president, while the Kurdish regional parliament has not met since November 2016 due to political discord. Meanwhile, Baghdad has withheld the financial allocations due to the KRG in retaliation for its unilateral move to take full control over Kurdistan’s oil sector. This has forced the government to introduce austerity measures, including a delay in paying civil service salaries that has lasted for months. Broad-based demonstrations have swept different cities in Iraqi Kurdistan, and have included doctors, members of the police, teachers, and others. Meanwhile, curbs on freedom of speech have been increasing, with the killing last August of a journalist having apparent PKK connections.
In contrast to the KRG, the Iraqi state has emphasized the Arab-Iraqi identity of Yezidis. This serves its larger narrative of an all-encompassing Iraqi national identity, and bolsters the federal government’s claims to control areas from where the Yezidis originate. The central government’s attitude has been fueled further by the widespread demolition by the KDP of homes owned by Arabs in areas recaptured from the Islamic State. Reports have indicated that in some of these areas Kurds are resettling in Arab homes.
Many Yezidis today take a different line from both the KRG and the Iraqi state. They are seeking to redefine themselves as a religious minority rather than as part of a larger ethnicity. Their focus on religious identity is seen as a way of affirming that the community is a distinct entity, which would allow Yezidis to claim the right of self-government for specific “nationalities” under Article 125 of the Iraqi constitution. It is also a means of guaranteeing their right of return to their villages of origin from the KRG, which has been denying these same rights to Arab residents.
Yezidis also lack confidence in the KRG and the Iraqi government, and in the ability or willingness of either to protect them in the event of another attack like the one by the Islamic State in 2014. The refusal of Yezidis to return to their villages and towns recently liberated from the Islamic State is, in part, a consequence of this mistrust. Their feelings that they were betrayed by their Arab neighbors have also fueled such sentiments.
The Yezidis are not alone in worrying about their fate in a post-Islamic State Iraq. Most of the minorities in the Nineveh governorate of northern Iraq are equally concerned that they will fall prey to the tensions between Baghdad and the KRG, as they are about the prospects of bloodshed in an increasingly militarized society. The fate of the Yezidis in many ways shows the dead end of easily manipulable identity politics, which rather than bring protection has subjected the community to ever greater risks. | {
"pile_set_name": "OpenWebText2"
} |
Q:
Does a small contraction occur between smooth varieties?
Let $V, \tilde{V}$ be smooth algebraic varieties over $\mathbb{C}$ and $f \colon \tilde{V} \rightarrow V$ a projective (or proper) birational morphism. Assume that the exceptional locus $E \subset \tilde{V}$ has codimension $\ge 2$.
Question Is $f$ an isomorphism?
A:
Yes. Suppose $f$ contracts a curve $C$. Then for any ample divisor $D$, we have $D\cdot C>0$.
But $D=f^*f_*D$ by your hypotheses on the exceptional locus, and so $D\cdot C=f_*D\cdot f_*C=0$, a contradiction.
| {
"pile_set_name": "StackExchange"
} |
Contents show]
Location Edit
, also known as Lawrence Lilarcor, is an enchanted talking two handed sword. It's a +3 weapon in terms of enchanted weapons. It weighs 10 lbs and has a speed factor of 8. This weapon gives the wielder immunity from charm and confusion. Lilarcor requires a minimum strength of 14 to be wielded. Compared to other enchanted weapons +2 or +3, this item has a relative low value and it's a good quality weapon, but it's probably lowered because the sword may irritate the owner. It appears only in Baldur's Gate II: Shadows of Amn
It is gained as a reward from the side quest Solve the Riddle of the Sewers in Athkatla.
Description Edit
“ Lawrence Lilarcor was well known, not for being brave, but as an idiot. As the tale goes, the boastful Lilarcor left his village at the urging of his friends so that the "great hero" could do battle with a devious Treant. He walked for days in the dead of winter until, feverish, he found his target and began an epic wrestling match. Unfortunately (or perhaps luckily), the "Treant" was nothing more than a craggy old normal oak. His friends had been jesting, not actually expecting that Lilarcor would go fight the fictitiously dangerous tree. That might have been the end of it, but Lilarcor, not really knowing what a Treant was in the first, didn't realize the truth. He eventually uprooted the oak and, marching proudly home, he declared himself a hero. Thus was born a laughing stock of epic proportions, and over time the name of Lilarcor became the sacrificial fool in many tales of "less than brilliance".It is not known whether this enchanted weapon is Lilarcor himself, perhaps imprisoned by an evil mage or some other odd coincidence of fate, but it certainly acts in a manner consistent with his level of competence. If it is he, he has never bemoaned his captivity. He might not realize, or care, that he is no longer a human.As a weapon, Lilarcor has its uses, but many a warrior has eventually given it away. Banter such as "Ouch, that musta hurt", "Oh yeah! Got 'im good", and "Beware my bite for it might...might...might really hurt or something" is a constant barrage on a warrior's psyche. ”
Dialogue Edit
Lilarcor - The Talking Sword from Baldurs Gate 2 (full soundclip)
This dialogue can be engaged when clicking on the converse button while examining the weapon in the inventory menu. The status quotes are randomly picked, but the advice dialogue depends on the chapter. The sword does not give any advice in the Throne of Bhaal chapters.
When asking Lilarcor about its status Edit
Lilarcor: "What's my status? Since when you do you care about me, unless I'm impaled in someone's guts? Oh, well, fine, let me think for a minute..."
You get one of the four lines below:
"Hmph. I suppose I'm okay. Why? Are we gonna kill something now? No? How about now? No? Hmmm... now, maybe? Grrrrrr..."
"I think you need take better care of me. I've got more chips than a blind beaver... I look like a second-rate pig poker."
"Well, since you asked, I would like to register a complaint. I want to kill a dragon. Right now. Go find one and kill it. That would be SO cool."
"I'd appreciate some quality time in my scabbard. Take a break... ahhhh, who am I kidding? Attack! Battle! Kill! Hee heeee...... this is what I live for!"
When asking Lilarcor for advice Edit
Lilarcor: The sword whistles incredulous. "Advice, eh? Well, besides working on your swordmanship. Besides that, I'd have to think."
"Hmmm... find someone rich, and kill them. Find someone richer, and kill them, too! Hack and slash your way to fortune! Woo-hoo!!"
Quotes Edit
Battle quotes
"Bring 'em on! I ain't done!"
"Choke up, dolt, your grip is all wrong!"
"Come get some! Boo-yah!"
"Hands up, kiddies, who wants to die?!"
"I am invincible! Invincible, I say!"
"I'm the best at what I do, and what I do ain't pretty!"
"Kill kill kill! Yeah! Cool!"
"Kill it! Kill it quick before they're all gone!"
"Let's dance!"
"Let's see what's inside this one! Yeah!"
"Mmm, mm! Tastes like chicken!"
"Murder! Death! KILL!!!"
"Muwahahaha-ha-ha!!"
"Oh yeah!"
"Ooo, that'll leave a mark!"
"Sissy fighter! You grab, I'll scratch!"
"Some of my finest work!"
"Swing harder, swing harder! Swing harder!!"
"Who's your daddy!"
"Yeah! Hit it! Hit it again!"
"You deal, I'll cut!"
"You feel lucky, punk?"
Idle quotes
"...and this one's for grandma, who said I'd never amount to anything more than a butterknife!!"
"Are we gonna kill something now? C'mon, maybe? Something small... anything!"
"Are YOU talking to ME?!!"
"Boring. Boring. BorIIING!"
"Can we go kill something now, huh?"
"Can we go whack something now?"
"C'mon, what about now? Let's KILL!"
"C'mon c'mon, let's go whack something evil.
"Come on let's kill something NOW!"
"Come on, what about now? No? C'mon, c'mon! I'm getting itchy, let's GO!"
"Hot butta!"
"I don't chop wood, OK? I am not an axe."
"I don't know what you are excepting, but as a sword, I'm pretty one-dimensional in what I want.
"I love the smell of daisies in the morning!
"All right, listen, beefy. I may be an intelligent sword, but I've had no formal edumication."
"Let's whack something eeeevvvvillllll....."
"My brother is a +12 Hackmaster! Mhmheh."
"Now? Please? Pretty please?"
"Now! Now! C'mon, kill something now!! Yeah!"
"Okay, listen, beefy: I may be an intelligent sword, but I've had no formal edumication."
"Oooh, I'm shaking! Haha!"
"Oooh, throw a coin in that fountain! Hahaha!"
(sign) "Ohhhhh, C'MON!"
(double sign) "Russ'em, friggin', saw-a-rabbit. C'mon, c'mon, c'mon, c'mon!"
"So, are we gonna... kill something now!?"
Wanna go and kill now? Hmm mm mmm hm mm hmmm. Now?
"Wanna kill that over there? C'mon, let's kill somethin'!"
"What about now?"
"Why don't we go kill that over there?"
"Wouldn't it be cool if you could dual-wield me?"
"YOINK! Got yer nose!"
"You can't be serious!"
"You know, my last owner said that I was sharp and edgy. He was such an ass."
"Y'know what? Long time ago, yeah, I was like er, a Moonblade. Heheheheh."
"You really need to clean me. I like to shine!"
"I got more chips than a blind beaver!"
Lilarcor on the Forgotten Realms Wiki, a wiki for the Dungeons & Dragons campaign setting Forgotten Realms. | {
"pile_set_name": "OpenWebText2"
} |
Welcome to the Piano World Piano ForumsOver 2.5 million posts about pianos, digital pianos, and all types of keyboard instruments
Join the World's Largest Community of Piano Lovers
(it's free)
It's Fun to Play the Piano ... Please Pass It On!
....On a side note, I play the octaves in the middle all with my left hand.
I have too, when I performed it. (Because it wasn't any worse that way.)
But not when I'm just practicing it -- because why bother?
When I'm practicing that section, I start at the soto voce, ignoring those other bars altogether.
Why????? Isn't that part of the challenge of playing the middle section???
And after trying both approaches off and on over the years, I still favor playing the opening measures with both hands. Although now that I've switched to playing the lower notes of the four note octave groupings with 5-4-4-5 I've found I have much less tension compared to using 5-5-5-5.
Now you're really blurring the line between sarcastic and straight, because I think you thought you were being serious there, but you can't be.
(Stamina is most of that challenge.)
Regardless, I can practice the octaves and the rest at the same time. There is no need to practice those two bars alone; there are plenty of repeats and it doesn't hurt to practice the right hand. I don't play the octaves with two hands, ever. So what is the point, is there some danger that I'll get to the last 4 bars of that section and run out gas? I don't.
Mark_C
Yikes! 10000 Post Club Member
Registered: 11/11/09
Posts: 21045
Loc: New York
Been practicing and playing it with the new swindle, and I think it's gonna work. But the reason I'm bringing it back up is, I have an amendment on it.
For the second squiggle, i.e. the mordent on the high A-flat, I'm trying 3 instead of 4 on the Ab, so the fingering up there is 3432 rather than 4543. It has disadvantages but I think the advantages outweigh them.
Been practicing and playing it with the new swindle, and I think it's gonna work. But the reason I'm bringing it back up is, I have an amendment on it.
For the second squiggle, i.e. the mordent on the high A-flat, I'm trying 3 instead of 4 on the Ab, so the fingering up there is 3432 rather than 4543. It has disadvantages but I think the advantages outweigh them.
Really? Only on the 2nd and not the 1st? I tend to do it the other way around when I do play the 343.
_________________________
Every day we are afforded a new chance. The problem with life is not that you run out of chances. In the end, what you run out of are days.
pianoloverus
Yikes! 10000 Post Club Member
Registered: 05/29/01
Posts: 21717
Loc: New York City
After years of study experimentation and consultation I have found that the opening octave of this piece is best played using 1-5 in both hands. (This is at least as important/interesting as many of the recent posts on this thread.)
After years of study experimentation and consultation I have found that the opening octave of this piece is best played using 1-5 in both hands. (This is at least as important/interesting as many of the recent posts on this thread.)
After years of study experimentation and consultation I have found that the opening octave of this piece is best played using 1-5 in both hands. (This is at least as important/interesting as many of the recent posts on this thread.)
After years of study experimentation and consultation I have found that the opening octave of this piece is best played using 1-5 in both hands. (This is at least as important/interesting as many of the recent posts on this thread.)
I use the 4th and 5th fingers on the outer notes. How do you play that next chord?
I was thinking about trying to learn this piece. How brutal is it to learn? It may be beyond my league. I'm to the point of playing Prelude in C sharp minor by Rachmaninov and Prelude in D flat Major Chopin. I think it's about twice the difficulty of those pieces?
Mark_C
Yikes! 10000 Post Club Member
Registered: 11/11/09
Posts: 21045
Loc: New York
Originally Posted By: Dustin Spray
I was thinking about trying to learn this song. How brutal is it to learn? It may be beyond my league. I'm to the point of playing Prelude in C sharp minor by Rachmaninov and Prelude in D flat Major Chopin. I think it's about twice the difficulty of those pieces?
First of all, let me apologize in advance for anyone who gets on your case for calling it a "song"! (We have some snobs about that.)
That said, anyone who calls this piece a song probably isn't advanced enough to play it.
But that shouldn't stop you from giving it a try and seeing what you can make of it!
BTW, it's not twice as hard as those other pieces. It's 1000 times as hard!I'm serious. It's much harder.
I was thinking about trying to learn this song. How brutal is it to learn? It may be beyond my league. I'm to the point of playing Prelude in C sharp minor by Rachmaninov and Prelude in D flat Major Chopin. I think it's about twice the difficulty of those pieces?
First of all, let me apologize in advance for anyone who gets on your case for calling it a "song"! (We have some snobs about that.)
That said, anyone who calls this piece a song probably isn't advanced enough to play it.
But that shouldn't stop you from giving it a try and seeing what you can make of it!
BTW, it's not twice as hard as those other pieces. It's 1000 times as hard!I'm serious. It's much harder.
Since DS is evidently planning to sing this "song," it may be only 500 times more difficult than the other works in his repertoire, particularly if he is singing those "songs" too.
I was thinking about trying to learn this song. How brutal is it to learn? It may be beyond my league. I'm to the point of playing Prelude in C sharp minor by Rachmaninov and Prelude in D flat Major Chopin. I think it's about twice the difficulty of those pieces?
First of all, let me apologize in advance for anyone who gets on your case for calling it a "song"! (We have some snobs about that.)That said, anyone who calls this piece a song probably isn't advanced enough to play it.
Snobbery has nothing to do with it. It's just plain wrong.
Quote:
But that shouldn't stop you from giving it a try and seeing what you can make of it!
Sure, he can give it a try - but I'd strongly recommend instead that he take a look at the Military Polonaise Opus 40 No. 1 or the Polonaise Opus 40 No. 2 - both of which are worth learning and fun to play.
Quote:
BTW, it's not twice as hard as those other pieces. It's 1000 times as hard!
I apoligize and thank you for correcting me. I was totally in the wrong and I edited my post. I have always loved this piece and have wanted to play it. I knew it was a difficult but didnt know it was that difficult. I played thru the first 2 or 3 pages a few years ago, but thats probably the easier sections. Maybe the Chopin book should go back into the filing cabnet for a few more years.........
Military Polonaise Op 40 is a grand piece maybe I will consider that. Like I said I fumbled thru the first 2 or 3 pages. I just didnt dedicate any serious time to them. Im just starting piano again after a near 13 year hiatus. I started in 8th grade and played all the way thru high school and got busy with life. I was thinking a few weeks ago about all the fond memories I had thru high school playing piano. So two weeks I went out and bought a Kawai CA65. I am thrilled with it and cant stop playing it. I live in a apt so a real piano may be a trick. I was hoping to re-kindle the fire with the Kawai digital and look into something different if and when I move. Anyways, thanks for all the constructive feedback and I am grateful for such a wonderful forum.
Military Polonaise Op 40 is a grand piece maybe I will consider that. Like I said I fumbled thru the first 2 or 3 pages. I just didnt dedicate any serious time to them. Im just starting piano again after a near 13 year hiatus. I started in 8th grade and played all the way thru high school and got busy with life. I was thinking a few weeks ago about all the fond memories I had thru high school playing piano. So two weeks I went out and bought a Kawai CA65. I am thrilled with it and cant stop playing it. I live in a apt so a real piano may be a trick. I was hoping to re-kindle the fire with the Kawai digital and look into something different if and when I move. Anyways, thanks for all the constructive feedback and I am grateful for such a wonderful forum.
And we're thrilled for you !!!! So good that you are getting back to playing !!! Enjoy your new digital and, above all, have fun !!!!
After years of study experimentation and consultation I have found that the opening octave of this piece is best played using 1-5 in both hands. (This is at least as important/interesting as many of the recent posts on this thread.)
I use the 4th and 5th fingers on the outer notes. How do you play that next chord?
If you mean the rising 16ths, I've done it two ways: with one hand (the right), and split. When I split, I actually play the top two notes of each chord with my right hand, and the bottom chromatic note with my left.
And I apologize if I missed a joke. Sometimes I don't quite catch the subtlety when it's written out.
PS- I would think singing this song would be much harder than playing it. Especially since one person has to sing more than one pitch..
PSS-
Originally Posted By: carey
Sure, he can give it a try - but I'd strongly recommend instead that he take a look at the Military Polonaise Opus 40 No. 1 or the Polonaise Opus 40 No. 2 - both of which are worth learning and fun to play.
I vote for Op 40 No 2. I love the military, but no2 is great fun.
_________________________
Every day we are afforded a new chance. The problem with life is not that you run out of chances. In the end, what you run out of are days. | {
"pile_set_name": "Pile-CC"
} |
Frank
Fourth Court of Appeals
San Antonio, Texas
March 19, 2015
No. 04-14-00792-CV
BEXAR COUNTY DISTRICT ATTORNEY'S OFFICE,
Appellant
v.
Frank HERNANDEZ,
Appellee
From the 150th Judicial District Court, Bexar County, Texas
Trial Court No. 2011-CI-14755
Honorable Laura Salinas, Judge Presiding
ORDER
Appellant’s brief in this accelerated appeal was originally due on January 30, 2015.
Appellant has been granted one extension of time, until February 19, 2015. On March 4, 2015,
appellant’s attorney, Mr. Troy Meinke, advised this court that appellant would file a motion to
dismiss the appeal by March 5, 2015. Subsequent calls from the Clerk of this court to counsel
have not been returned.
It is therefore ORDERED that Mr. Meinke file appellant’s brief no later than March 30,
2015. If appellant’s brief is not filed by this date, this appeal will be dismissed for want of
prosecution. TEX. R. APP. P. 38.8(a).
The Clerk of this court shall cause a copy of this order to be served on Mr. Meinke by
certified mail, return receipt requested, and by United States mail.
_________________________________
Sandee Bryan Marion, Chief Justice
IN WITNESS WHEREOF, I have hereunto set my hand and affixed the seal of the said
court on this 19th day of March, 2015.
___________________________________
Keith E. Hottle
Clerk of Court
| {
"pile_set_name": "FreeLaw"
} |
Q:
react-navigation withNavigation returns undefined
In my react-native app, I have a component for my header with back button. It works except for when I click the back button and it gives me this error: undefined is not an object (evaluating this.props.navigation)
So I followed the docs here and tried using withNavigation. But I still get the same error. What am I doing wrong?
import React from 'react'
import { StyleSheet, Text, View, TouchableOpacity } from 'react-native'
import { withNavigation } from 'react-navigation';
const HeaderWithBackBtn = (props) => {
return (
<View style={styles.container}>
{/* Back button */}
<TouchableOpacity
style={{width: 100}}
onPress={() => this.props.navigation.goBack()}>
<Text style={styles.backBtn}>Back</Text>
</TouchableOpacity>
<Text style={styles.text}> {props.screen} </Text>
{/* Placeholder button */}
<Text style={{width: 100}}></Text>
</View>
)
}
const styles = StyleSheet.create({
...
});
export default withNavigation(HeaderWithBackBtn);
A:
The component you're wrapping is a functional component, so you need to access your props as props.foo rather than as this.props.foo.
onPress={() => props.navigation.goBack()}>
should work fine.
| {
"pile_set_name": "StackExchange"
} |
Girl sits next to me on train it was a good day
3,088 shares | {
"pile_set_name": "OpenWebText2"
} |
Marketing Strategy of Ferrero Rocher
The Chocolate & quality Confectionaries Company has been introduced in 1982 in Europe. The Italian Chocolatier is known for offering Chocolate & Hazelnut confectionary product in more than 55 countries globally.
Its unique golden packaging along with the gift box in different SKU’s (stock keeping units) has helped it become popular across the world.
Competitive advantage in the Marketing strategy of FERRERO ROCHER–
1. BrandPortfolio: The Company Ferraro Rocher have some of the successful brands in its portfolio i.e. Kinder, Nutella, Tic-Tac and Ferraro Pralines which is helping the brand in supporting and growing together in the markets it operates into.
2. Strategic Acquisitions: The brand in order to strengthen its portfolio and expand to other countries globally has acquired companies such as Oltan of Turkey, Thorntons of the United Kingdom along with going to acquire more than 20 American brands some of which are Butterfinger, Raisinets, Wonka, BabyRuth, 100Grand.
BCG Matrix in the Marketing strategy of FERRERO ROCHER-
The Company operates with four brands namely Nutella, Kinder, Tic- Tac, and Ferrero Rocher and these brands are launched by the company in the year 1964, 1968, 1969 and 1982 respectively.
The brands Ferrero Rocher and Nutella are Stars in the BCG matrix of the company Ferrero Rocher while other brands are question marks in the BCG matrix.
Distribution strategy in the Marketing strategy of FERRERO ROCHER-
The Group distributes its products in more than 170 countries globally while being present in 55 countries. As of 2017, the company have dedicated resources to 32,990 employees.
It distributes its offerings through several channels of distribution such as Pops & mom store, retailers, wholesalers, distributors, and e-commerce websites.
The Group operates through 86 subsidiaries worldwide and 22 operating manufacturing plants.
Brand equity in the Marketing strategy of FERRERO ROCHER–
The Ferrero Rocher Group has been known for creating unique visual identity and visibility in the market through its advertisements and attractive packaging.
The brand has been promoted as the offerings meant for some of the special moments of the consumers.
Competitive analysis in the Marketing strategy of FERRERO ROCHER-
The global Italian Confectionary group competes with companies such as Nestle, Cadbury, Hersley etc. on the factors such as availability, penetration in the current as well as expansion into new markets.
The Ferrero Group technological development has helped it in expanding its production capacity with total Capital Investment of 631 Million Euros in the year 2016 of which the main focus was on industrial and manufacturing facility development in the emerging and developed nations such as India, China, Italy, Germany, and Poland respectively.
Market analysis in the Marketing strategy of FERRERO ROCHER-
Changing lifestyle of consumers, increase in migration, stable economy, easy availability through e-commerce delivery channels and cosmopolitan culture are some of the factors which are proving as a catalyst for the growth of the Confectionaries market.
Although the local/domestic companies gives head-on competition to the international companies due to the better understanding of the market demand pattern but with the streamlined delivery channel the international companies try to change the taste and preferences of the companies.
Customer analysis in the Marketing strategy of FERRERO ROCHER–
Who don’t like confectionaries whither it is candies or chocolates, consumers from all age groups satisfy their carvings. Majority of customers of Ferrero Rocher are in the age group of 15- 35 years.
In line with the branding of the peer companies, Ferrer Rocher started targeting the special occasions/festivals.
GET DAILY MARKETING UPDATES
First NameEnter your Email Address
About Hitesh Bhasin
I love writing about the latest in marketing & advertising. I am a serial entrepreneur & I created Marketing91 because i wanted my readers to stay ahead in this hectic business world. You can follow me on Facebook. Let's stay in touch :) | {
"pile_set_name": "Pile-CC"
} |
A motor can be combined with a compressor in a single housing to provide a motor-compressor system. Using a shared shaft, or two or more shafts coupled together, the motor drives the compressor in order to generate a flow of compressed process gas. In hermetically-sealed motor-compressors, the shaft is typically supported by two or more radial magnetic journal bearings and often includes at least one axial magnetic bearing for thrust compensation. The magnetic bearings may be passive magnetic bearing systems using permanent magnets, or they may include active magnetic bearing systems having one or more electromagnets actively controlled by an external power source adapted to centralize or otherwise levitate the shaft.
Magnetic bearings installed within a hermetically-sealed motor-compressor are typically pressurized to a level close to the process inlet pressure, and cooled by process gas derived from the compressor and circulated via a cooling loop. Although the cooling process gas is ordinarily first treated in a gas conditioning skid to remove contaminants and free liquids, there is still potential for the generation and accumulation of liquids within the cooling loop. For example, liquids such as water, hydrocarbon condensate, or other wellstream fluids can often form, and magnetic bearings are particularly susceptible to damage if they come into contact with these liquids or “dirty” cooling process gas. In such cases, the resistance to ground of the electrical windings of the bearings may be reduced which, if not reversed or at least stopped, could eventually lead to the complete failure of the bearing.
One way to protect the electrical windings from liquid penetration is the application of vacuum-pressure impregnation (VPI) to the windings which provides a protective coating that insulates the windings. Magnetic bearings, however, are subjected to repeated pressurization-depressurization cycles which increase the risk of liquids penetrating the VPI coating over time. Once the VPI coating is penetrated, the bearing coil resistance to ground gradually diminishes, and if the liquid penetration is not reversed or stopped, the coil resistance to ground will eventually become zero, thereby causing the bearing to short out and fail.
What is needed, therefore, is a method and system for monitoring the bearing coil resistance to ground as an indicator of the accumulation of liquids in the cooling loop of a motor-compressor, and more particularly within the magnetic bearings. | {
"pile_set_name": "USPTO Backgrounds"
} |
Ilgan Sports via Naver1. [+3,280, -102] I really wonder what that girlfriend looks like. She's an outstanding character if I've ever seen one.2. [+2,694, -226] So he's saying he's not going to marry her but he'll still take responsibility? Sigh, both you and your girlfriend seem like messed up people. Proves you can't believe images you see on broadcast.3. [+2,256, -33] I don't think the girl's right in the head either.4. [+1,919, -71] Just go to the army already.5. [+1,534, -24] He's really calling unfounded rumors on this? ㅋㅋ6. [+434, -7] What's up with the girl? Why's she going silent when he's trying to get confirmation?7. [+465, -50] Maybe it's not even his kid8. [+400, -6] He's crazy but she seems just as psycho9. [+399, -15] What's wrong with her? Why is she rejecting meeting him? Is it really his kid?10. [+391, -38] She seems really in love with him... putting it out to the media that she's pregnant so that she can tie him down. Something doesn't seem right.. | {
"pile_set_name": "OpenWebText2"
} |
Q:
Extract Image and More Tags from Item in RSS
I want to extract data from this URL: http://rss.cnn.com/rss/edition.rss
So each Item looks like this:
<item>
<title><![CDATA[Ireland stuns England at home of cricket]]></title>
<description><![CDATA[From World Cup glory to utter humiliation in the space of 10 days.]]></description>
<link>https://www.cnn.com/2019/07/24/sport/england-ireland-cricket-spt-intl/index.html</link>
<guid isPermaLink="true">https://www.cnn.com/2019/07/24/sport/england-ireland-cricket-spt-intl/index.html</guid>
<pubDate>Wed, 24 Jul 2019 13:17:56 GMT</pubDate>
<media:group>
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-super-169.jpg" height="619" width="1100" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-large-11.jpg" height="300" width="300" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-vertical-large-gallery.jpg" height="552" width="414" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-video-synd-2.jpg" height="480" width="640" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-live-video.jpg" height="324" width="576" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-t1-main.jpg" height="250" width="250" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-vertical-gallery.jpg" height="360" width="270" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-story-body.jpg" height="169" width="300" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-t1-main.jpg" height="250" width="250" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-assign.jpg" height="186" width="248" />
<media:content medium="image" url="https://cdn.cnn.com/cnnnext/dam/assets/190724131447-england-ireland-tease-01-hp-video.jpg" height="144" width="256" />
</media:group>
</item>
So I found some classes over the internet that should take care on situations like that, such as: SyndicationFeed or XDocument.Parse
So I tried this one out:
XmlReader reader = XmlReader.Create(urle);
SyndicationFeed feeds = SyndicationFeed.Load(reader); // References -> Right Click -> Add Reference -> System.ServiceModel
reader.Close();
foreach (SyndicationItem item in feeds.Items)
{
string subject = item.Title.Text;
Console.WriteLine("subject: " + subject);
if (item.Summary != null)
{
string summary = item.Summary.Text;
Console.WriteLine("desc: " + summary);
}
}
and it works pretty good with Title and Summary, but it has feature to deal with images for example, so how could i do it with SyndicationFeed for example?
A:
The <media:group> and its content are considered as extension elements.
The SyndicationFeed class has a property ElementExtensions to address these,
with a ReadElementExtensions method to read and parse them.
Create a class that matches the <media:group> xml element.
[XmlRoot("group", Namespace = "http://search.yahoo.com/mrss/")]
public class MediaGroup
{
[XmlElement(ElementName = "content", Namespace = "http://search.yahoo.com/mrss/")]
public MediaContent[] Items { get; set;}
}
Also create a class definition for the <media:content> item.
public class MediaContent
{
[XmlAttribute("url")]
public string Url { get; set; }
[XmlAttribute("height")]
public int Height { get; set; }
[XmlAttribute("width")]
public int Width { get; set; }
[XmlAttribute("medium")]
public string Medium { get; set; }
}
Read and parse them using an XmlSerializer as shown below.
var serializer = new XmlSerializer(typeof(MediaGroup));
var mediaGroup = item.ElementExtensions
.ReadElementExtensions<MediaGroup>("group", "http://search.yahoo.com/mrss/", serializer)
.FirstOrDefault();
if (mediaGroup != null)
{
foreach (var mediaItem in mediaGroup.Items)
{
Console.WriteLine(mediaItem.Url);
}
}
Full code:
using (var reader = XmlReader.Create(urle))
{
var feeds = SyndicationFeed.Load(reader);
var serializer = new XmlSerializer(typeof(MediaGroup));
foreach (SyndicationItem item in feeds.Items)
{
string subject = item.Title.Text;
Console.WriteLine("subject: " + subject);
var mediaGroup = item.ElementExtensions
.ReadElementExtensions<MediaGroup>("group", "http://search.yahoo.com/mrss/", serializer)
.FirstOrDefault();
if (mediaGroup != null)
{
foreach (var mediaItem in mediaGroup.Items)
{
Console.WriteLine(mediaItem.Url);
}
}
}
}
| {
"pile_set_name": "StackExchange"
} |
Conventionally, a portable telephone, a PDA (Personal Digital Assistant), etc. are used. Users increasingly have a chance to interchange information between a plurality of these devices.
For such information interchange, devices are connected to each other via a cradle or a cable. Alternatively, infrared transceivers of the devices are faced to each other for sending and receiving information.
A cable connection is not only complicated, but also requires a connector specific to the device type, making a connection work troublesome. In the case of the infrared connection, the communication is interrupted by blocking off infrared rays when a user inadvertently crosses an infrared transmission path, for example.
To solve these problems, it is proposed to perform wireless communication between a plurality of devices by using a wireless LAN (Local Area Network), a near wireless LAN such as Bluetooth (trademark), etc.
For the wireless communication, a user must enter an address of the communication device. Normally since the user does not always remember addresses of respective devices, he or she creates, e.g., an address list and manually enters an address by referring to the list. This is inconvenient and degrades operability. When information is interchanged between a PAD owned by the user and a separate device installed before the user, he or she must enter a destination device address, making a fast information interchange difficult. | {
"pile_set_name": "USPTO Backgrounds"
} |
According to the latest count by NBC News, most of the members of the U.S. House of Representatives now support moving forward with impeachment.
And that shouldn’t be too much of a surprise after House Speaker Nancy Pelosi shocked the country by announcing the initiation of an impeachment inquiry this week. But what is surprising is the number of Republicans that are expressing concerns about Trump. In the end, this entire ordeal may come down to a vote in the U.S. Senate, and President Trump desperately needs Republicans to stay united. Unfortunately, even after the release of the transcript of President Trump’s conversation with the President of Ukraine (which you can read right here), some “moderate” Republicans are clearly not standing behind the president. All that it would take to completely kill the move toward impeachment is a completely united Republican Party, and right now that is not happening.
But of course impeachment proceedings begin in the House, and that is where the focus is right now.
According to the latest count, 220 members of the House “now favor some kind of impeachment action”…
Two hundred and nineteen House Democrats and one independent — a majority of the chamber’s 435 members — now favor some kind of impeachment action against President Donald Trump, according to an NBC News tally. House Democrats reached the milestone a day after Speaker Nancy Pelosi announced a formal impeachment inquiry into the president following claims that he might have withheld aid to Ukraine to pressure officials there to investigate former Vice President Joe Biden and his son.
At this point the Democrats have a solid majority in the House of Representatives, and that is bad news for Trump.
If a vote was taken at this moment, even before any evidence is formally presented, I believe that they would vote to impeach Trump.
In the end, it really doesn’t matter what the truth is in this case. The Democrats want Trump out, and if it comes to a vote they are going to vote to impeach.
Of course any shred of evidence that could potentially strengthen their case is going to be treated like gold by the Democrats, and several of them had an opportunity to finally read the whistleblower complaint on Wednesday. The following comes from Politico…
A select group of lawmakers reviewed the whistleblower complaint Wednesday while on Capitol Hill. While the members of Congress could not disclose details of the whistleblower complaint, several said that it was cause for concern. “Having read the documents in there, I’m even more worried about what happened than when I read the memorandum of the conversation,” Senate Minority Leader Chuck Schumer (D-N.Y.) said. “There are so many facts that have to be examined. It’s very troubling.”
When Congressman Mike Quigley was asked about the document, he could hardly contain himself as he described how “alarming” it was…
Quigley asserted the whistleblower complaint “is the political equivalent” of Trump’s claim during his 2016 presidential campaign that he could “stand in the middle of 5th Avenue and shoot somebody” without losing voters. “What the President said during the campaign, he said he could shoot someone on the street and his base would stay with him. I guess what I read, to me, was the political equivalent of that: defying the constitution, committing a criminal act and thinking, ‘Well I can get away with it,’ ” he said. “Some sort of bizarre cult of personality. Deeply disturbing what we read this morning. Alarming.”
But those sorts of comments are expected from the Democrats.
Congress has moved to start impeachment proceedings on President Trump after crimes perpetrated by Vice President Joe Biden came to light.
What is not expected is the number of Republicans that are refusing to back President Trump right now.
For instance, just consider what Republican Senator Ben Sasse just said…
Asked if the mere act of a U.S. president asking a foreign government to investigate the family of his American political rival is an abuse of power, Sasse said: “There’s a lot that we’re hearing about right now that’s leading people to ask a bunch of hypotheticals where we don’t really know all the underlying facts yet. So I don’t think it’s all that useful to speculate about a lot of highly particular hypotheticals. But in general terms, American elections should be for Americans. And the idea that we would have foreign nation-states coming into the American electoral process, or the information surrounding an election, is really, really bad.”
And after reading the transcript of the phone conversation, U.S. Senator Mitt Romney told the press that he found it to be “deeply troubling”…
“It remains troubling in the extreme. It’s deeply troubling,” Sen. Mitt Romney (R-Utah) told reporters Wednesday, when asked about the transcript. Three Senate GOP aides said Wednesday that their bosses were grousing and frustrated by the White House’s decision and the sense that Republican lawmakers were being forced into the difficult position of defending Trump while contending with what many see as an alarming or at least problematic transcript.
At this point, it is being reported that Republicans in the Senate have already divided into two camps. One is being called “the Burr Camp”, and the other is being called “the Johnson camp”, and both camps are taking very different approaches…
One early divide among Senate Republicans is between the “Burr camp” and the “Johnson camp,” according to two senior GOP aides who were not authorized to speak publicly, referring to Sen. Richard Burr (R-N.C.), the chairman of the Senate Intelligence Committee, and Sen. Ron Johnson (R-Wis.), the chairman of the Homeland Security Committee. Burr’s faction of the Senate GOP has a darker, frustrated view of Trump’s handling of Ukraine, while Johnson’s wing is more focused on probing Biden, the aides said.
We shall see how events unfold over the next few months, but right now it doesn’t appear to be smooth sailing for President Trump.
And adding to Trump’s difficulties is the fact that a Ukrainian official has come forward claiming that it was well understood by the Ukrainians that President Trump would only speak to the new president of Ukraine if Joe Biden’s corruption would be part of the conversation. The following comes from ABC News…
“It was clear that [President Donald] Trump will only have communications if they will discuss the Biden case,” said Serhiy Leshchenko, an anti-corruption advocate and former member of Ukraine’s Parliament, who now acts as an adviser to Zelenskiy. “This issue was raised many times. I know that Ukrainian officials understood.” The Trump administration’s alleged insistence that the two leaders discuss a prospective investigation into Biden, one of the president’s political opponents, casts his July 25 conversation with Zelenskiy in a new light.
In the end, even if President Trump tried to pressure the Ukrainians to look into Joe Biden’s corruption, that definitely does not rise to the level of an impeachable offense.
But the Democrats are more than willing to twist the Constitution if that is what it takes to get Donald Trump out of the Oval Office.
So now we have high drama in Washington, and it threatens to tear this country apart.
Nancy Pelosi essentially committed herself to going down the road of impeachment when she made her announcement earlier this week, and it is just a matter of time before we see a vote in the House.
And Pelosi will make sure that the vote is successful, and so that means that Trump’s fate will end up in the U.S. Senate.
In order to remove Trump from office, it will take 67 votes in the Senate, and the Democrats only have 47 seats.
So they would need 20 Republican votes, and at this point we don’t know if there are that many Republicans that are willing to stab him in the back.
The Emergency Election Sale is now live! Get 30% to 60% off our most popular products today! | {
"pile_set_name": "OpenWebText2"
} |
Operation Objetive
The objective of the operation in Nicaragua is to reduce maternal, neonatal, and child morbidity and mortality through increasing the quality and coverage of a guaranteed set of health services with proven effectiveness in rural and isolated zones of the selected regions. Execution of the operation is based on three harmonized and integrated components:
Expansion of health services for women of reproductive age and maternal-infant health services through implementation of interventions that increase demand for institutional services, strengthening or developing community platforms that empower populations to care for their health.
Development of basic infrastructures.
Improved logistics and local information systems.
Resources
FIRST OPERATION
Initiative Funding
USD 3,466,949 + Performace Tranche USD 1,155,650
Government counterpart
USD 2,311,299
Total first operation
USD 6,933,897
FIVE YEARS - COMBINED 1st & 2nd OP
Initiative Funding
USD 6,190,979 + Performace Tranche USD 2,063,660
Government counterpart
USD 4,127,320
Country totals
USD 12,381,959
Expected Outcomes
15%
Increase by 15 percentage points coverage of: institutional births attended by qualified personnel, children 12–59 months old who received 2 doses of anti-parasite treatment in last 12 months and children 0–59 months old who received oral rehydration salts zinc during most recent episode of diarrhea.
10%
Increase by 10 percentage points coverage of children 0–59 months old with up-to-date vaccinations for their age and prevalence of exclusive breastfeeding. | {
"pile_set_name": "Pile-CC"
} |
<form id="{$form_id}" name="{$form_name}" action="{$form_action}" class="{$form_className}" method="post" encType="multipart/form-data" style="margin:0px;" onsubmit='return validateForm("{$form_objectRequiredFields}".parseJSON());'>
<div class="borderForm" style="padding-left: 0pt; padding-right: 0pt;">
<div class="boxTop"><div class="a"></div><div class="b"></div><div class="c"></div></div>
<div class="content" style="">
<table width="99%">
<tbody><tr>
<td valign="top">
<input class="notValidateThisFields" name="__notValidateThisFields__" id="__notValidateThisFields__" value="" type="hidden">
<input name="DynaformRequiredFields" id="DynaformRequiredFields" value="{$form_objectRequiredFields}" type="hidden">
<table border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody><tr style="display: none;">
<td colspan="2">{$form.action}</td>
</tr>
<tr style="display: none;">
<td colspan="2">{$form.ROU_UID}</td>
</tr>
<tr style="display: none;">
<td colspan="2">{$form.PROCESS}</td>
</tr>
<tr style="display: none;">
<td colspan="2">{$form.TASK}</td>
</tr>
<tr style="display: none;">
<td colspan="2">{$form.ROU_TYPE_OLD}</td>
</tr>
<tr>
<td class="FormTitle" colspan="2" align="">{$form.TITLE}</td>
</tr>
<tr style="display: none;">
<td colspan="2">{$form.ROU_TYPE}</td>
</tr>
<tr>
<td colspan="2">{$form.GRID_PARALLEL_EVALUATION_TYPE}</td>
</tr>
<tr>
<td class="FormButton" colspan="2" align="center"><br/> {$form.SAVE} {$form.BTN_CANCEL} </td>
</tr>
</tbody></table>
</td>
</tr>
</tbody></table>
</div>
<div class="boxBottom"><div class="a"></div><div class="b"></div><div class="c"></div></div>
</div>
<script type="text/javascript">
{$form.JS}
</script>
</form> | {
"pile_set_name": "Github"
} |
Q:
iphone textfield focus to send field
hello all i have my four textfield for entering password If my password is "1 2 3 4", is there a way to automatically jump to the second box as soon as I enter "1" and so on and so forth?
A:
use a UITextViewDelegate to detect the input and then call becomeFirstResponder on the next text field.
| {
"pile_set_name": "StackExchange"
} |
Q:
How to call code behind server method from a client side JavaScript function?
I am having an JavaScript function for a HTML button click event in ASPX page. And a server Method in its code behind page. Now i want to call the server method from the JavaScript function with some parameters only when the HTML button is clicked by the user.
Please don't change this scenario and also don't use any asp.net contols in the aspx page while replying. Because only HTML controls are allowed. Can anyone help me on this ?. Thanks in advance. Eagerly waiting for answers.
Here is the code,
Code in markup:
<script language="javascript" type="text/javascript">
function btnAccept_onclick() {
var name;
name = document.getElementById('txtName').value;
// Call Server side method SetName() by passing this parameter 'name'
</script>
<input type="button" id="btnAccept" value="Accept" onclick="return btnAccept_onclick()" />
Code-behind:
public void SetName(string name)
{
// Code for some functionality
}
A:
Yes, you can make a web method like..
[WebMethod]
public static String SetName(string name)
{
return "Your String"
}
And then call it in JavaScript like,
PageMethods.SetName(parameterValueIfAny, onSuccessMethod,onFailMethod);
This is also required :
<asp:ScriptManager ID="ScriptMgr" runat="server" EnablePageMethods="true"></asp:ScriptManager>
A:
In my projects, we usually call server side method like this:
in JavaScript:
document.getElementById("UploadButton").click();
Server side control:
<asp:Button runat="server" ID="UploadButton" Text="" style="display:none;" OnClick="UploadButton_Click" />
C#:
protected void Upload_Click(object sender, EventArgs e)
{
}
A:
If you dont want to use ajax than
Code behind
void myBtn_Click(Object sender,EventArgs e)
{
//SetName(name); your code
}
.aspx file
<script language="javascript" type="text/javascript">
function btnAccept_onclick() {
var name;
name = document.getElementById('txtName').value;
document.getElementById('callserver').click();
// Call Server side method SetName() by passing this parameter 'name'
</script>
<div style="dispaly:none;">
<input type="button" id="callserver" value="Accept" click="myBtn_Click" runat="server" />
</div>
<input type="button" id="btnAccept" value="Accept" onclick="return btnAccept_onclick()" />
or use page method
.cs file
[ScriptMethod, WebMethod]
public static string docall()
{
return "Hello";
}
.aspx file
<script type="text/javascript">
function btnAccept_onclic() {
PageMethods.docall(onSuccess, onFailure);
}
function onSuccess(result) {
alert(result);
}
function onFailure(error) {
alert(error);
}
</script>
check this : http://blogs.microsoft.co.il/blogs/gilf/archive/2008/10/04/asp-net-ajax-pagemethods.aspx
| {
"pile_set_name": "StackExchange"
} |
Q:
WebCam is not recognized on my Samsung 300v5a-s19
I have Samsung 300v5a-s19ru laptop, and its WebCam is not recognized. I tried to follow this manual, but it doesn't work for me.
When I'm trying to start Cheese, it doesn't see any WebCam at all. Its Output:
** (cheese:8161): WARNING **: cheese-main.vala:251: Error: No device found
(cheese:8161): cheese-CRITICAL **: cheese_camera_device_get_device_node: assertion CHEESE_IS_CAMERA_DEVICE (device)' failed
(cheese:8161): GLib-CRITICAL **: g_variant_new_string: assertion string != NULL' failed
(cheese:8161): GLib-GIO-CRITICAL **: g_settings_schema_key_type_check: assertion value != NULL' failed
(cheese:8161): GLib-CRITICAL **: g_variant_get_type_string: assertion value != NULL' failed
(cheese:8161): GLib-GIO-CRITICAL **: g_settings_set_value: key 'camera' in 'org.gnome.Cheese' expects type 's', but a GVariant of type '(null)' was given
** (cheese:8161): CRITICAL **: cheese_preferences_dialog_setup_resolutions_for_device: assertion device != NULL' failed
I tried install Ov51x, but as I can understand it doesn't work on linux kernel > 3.0. Trying to follow this, item 2.4 fails:
% make
make: *** No targets. Stop.
In this answer on askubuntu it's written, that Ov51x works on < 2.6 kernels only
In Samsung Tech Support they said that drivers for Linux does not exist, but they said also, that in my laptop WebCam Sunplus Tech SCB-1100N is used.
What do I do to make it work? What driver or module should I use?
Thanks in advance!
A:
The solution was so simple and close
The issue was that the webcam is switched off at boot time with the Samsung Tools.
I accidentally discovered that in the settings of the Samsung Tools webcam toggle is set to "Last Status", which essentially means "Disabled", as the camera was never turned on before. I assign a shortcut key [Fn] + [F4] to turn on/off the camera. And now the camera switches on and off, and even works.
I apologize for making this stupid question.
| {
"pile_set_name": "StackExchange"
} |
<?xml version="1.0" encoding="utf-8"?>
<resources>
<string name="learnChess">Õpi malet</string>
<string name="byPlaying">mängides!</string>
<string name="menu">Menüü</string>
<string name="progressX">Edenemine: %s</string>
<string name="resetMyProgress">Lähtesta mu saavutused</string>
<string name="youWillLoseAllYourProgress">Kaotate kõik oma saavutused!</string>
<string name="play">mängi!</string>
<string name="chessPieces">Malendid</string>
<string name="theRook">Vanker</string>
<string name="itMovesInStraightLines">Liigub sirgjooneliselt</string>
<string name="rookIntro">Vanker on võimas nupp. Kas olete selle käsutamiseks valmis?</string>
<string name="rookGoal">Vajutage vankri peale,
et seda tähekeseni viia!</string>
<string name="grabAllTheStars">Haarake kõik tähekesed!</string>
<string name="theFewerMoves">Mida vähem liigutusi teete,
seda rohkem punkte saate!</string>
<string name="useTwoRooks">Kasutage kahte vankrit,
et kiirust lisada!</string>
<string name="rookComplete">Õnnitleme! Olete edukalt vankrit valitsema õppinud.</string>
<string name="theBishop">Oda</string>
<string name="itMovesDiagonally">Liigub diagonaalselt</string>
<string name="bishopIntro">Järgmiseks õpime, kuidas oda liigutada!</string>
<string name="youNeedBothBishops">Üks oda heledatel ruutudel,
üks oda tumedatel ruutudel.
Vajate mõlemat!</string>
<string name="bishopComplete">Õnnitlused! Te valdate nüüd oda.</string>
<string name="theQueen">Lipp</string>
<string name="queenCombinesRookAndBishop">Lipp = vanker + oda</string>
<string name="queenIntro">Kõige tugevam male siseneb. Teie maiasteedi kuninganna!</string>
<string name="queenComplete">Õnnitlused! Kuningannal pole sulle saladusi.</string>
<string name="theKing">Kuningas</string>
<string name="theMostImportantPiece">Kõige tähtsam malend</string>
<string name="kingIntro">Sina oled kuningas. Kui sa langed lahingus, siis mäng lõppeb.</string>
<string name="theKingIsSlow">Kuningas on aeglane.</string>
<string name="lastOne">Viimane!</string>
<string name="kingComplete">Sa saad nüüd juhatajat juhtida!</string>
<string name="theKnight">Ratsu</string>
<string name="itMovesInAnLShape">See liigub L-kujuliselt</string>
<string name="knightIntro">Siin on väljakutse teile. Ratsu... on väga kavalal malend.</string>
<string name="knightsHaveAFancyWay">Ratsude liikumine on väga peen!</string>
<string name="knightsCanJumpOverObstacles">Ratsud suudavad malenditest üle minna. Kogu kõik tähed!</string>
<string name="knightComplete">Õnnitlused! Te valdate nüüd ratsukäike.</string>
<string name="thePawn">Ettur</string>
<string name="itMovesForwardOnly">See liigub ainult edasi</string>
<string name="pawnIntro">Etturid on nõrgad, kuid nendes on palju potensiaali.</string>
<string name="pawnsMoveOneSquareOnly">Etturid liiguvad ühe ruudu kaupa.
Kui nad jõuavad mängulaua lõppu, siis nendest saab palju tugevam nupp!</string>
<string name="mostOfTheTimePromotingToAQueenIsBest">Enamik juhtudest on mõtekas ettur muundada lipuks.
Kuid mõnikord tuleb ratsu rohkem kasuks!</string>
<string name="pawnsMoveForward">Etturid liiguvad ainult edasi,
kuid löövad diagonaalselt!</string>
<string name="captureThenPromote">Löö, siis muunda!</string>
<string name="useAllThePawns">Kasuta kõiki ettureid!
Pole vajadust muundada.</string>
<string name="aPawnOnTheSecondRank">Ettur teisel real saab liikuda 2 ruutu korraga!</string>
<string name="grabAllTheStarsNoNeedToPromote">Kogu kõik tähed!
Muundada pole tarvus.</string>
<string name="pawnComplete">Õnnitlused! Tunnete nüüd etturi käike.</string>
<string name="pawnPromotion">Etturi muundamine</string>
<string name="yourPawnReachedTheEndOfTheBoard">Sinu ettur on jõudnud viimasele reale!</string>
<string name="itNowPromotesToAStrongerPiece">Nüüd ta muundub tugevamaks malendiks.</string>
<string name="selectThePieceYouWant">Vali malend, mida sa soovid!</string>
<string name="fundamentals">Põhialused</string>
<string name="capture">Löömine</string>
<string name="takeTheEnemyPieces">Löö vastase malendid</string>
<string name="captureIntro">Tuvasta vastase kaitseta malendid, ning löö need!</string>
<string name="takeTheBlackPieces">Löö vastase malendid!</string>
<string name="takeTheBlackPiecesAndDontLoseYours">Löö vastase malendid!
Ära kaota enda omi.</string>
<string name="captureComplete">Õnnitlused! Oskate vastase malendeid lüüa!</string>
<string name="protection">Kaitsmine</string>
<string name="keepYourPiecesSafe">Hoia oma malendid kaitse all</string>
<string name="protectionIntro">Tuvasta malendid, mida vastane ründab ja kaitse neid!</string>
<string name="protectionComplete">Õnnitlused! Olete läbinud malendite kaitsmise peatüki!</string>
<string name="escape">Te olete rünnaku all!
Leia pääsutee!</string>
<string name="noEscape">Pääsuteed ei leidu,
kuid sul on võimalik kaitsta!</string>
<string name="dontLetThemTakeAnyUndefendedPiece">Ära lase neil võtta
mitte ühtegi kaitseta vigurit!</string>
<string name="combat">Võitlus</string>
<string name="captureAndDefendPieces">Löö ning kaitse malendeid</string>
<string name="combatIntro">Hea mängija oskab rünnata ja kaitsta üheaegselt!</string>
<string name="combatComplete">Õnnitlused! Olete osav võitleja!</string>
<string name="checkInOne">Kabe ühes</string>
<string name="attackTheOpponentsKing">Ründa vastase kuningat</string>
<string name="checkInOneIntro">Et võita oma vastast, ründa nende kuningat. Nad peavad seda kaitsma!</string>
<string name="checkInOneGoal">Sihi vastase kuningat ühe liigutusega!</string>
<string name="checkInOneComplete">Õnnitlused! Sa kontrollisid oma vastast, sündides nad oma kuningat kaitsma!</string>
<string name="outOfCheck">Ruudud on otsas</string>
<string name="defendYourKing">Kaitse oma kuningat</string>
<string name="outOfCheckIntro">Sa oled ruudus! Sa pead põgenema või blokeerima rünnaku.</string>
<string name="escapeWithTheKing">Põgene kuningaga!</string>
<string name="theKingCannotEscapeButBlock">Kuningas ei saa põgeneda, sa pead rünnaku blokeerima!</string>
<string name="youCanGetOutOfCheckByTaking">Sa saad ruudust välja kui ründad malendit.</string>
<string name="thisKnightIsCheckingThroughYourDefenses">Kuningas tuleb läbi sinu kaitse!</string>
<string name="escapeOrBlock">Põgene kuningaga või blokeeri rünnak!</string>
<string name="outOfCheckComplete">Õnnitlused! Sinu kuningat ei saa rünnata, veendu, et sa suudad teda malendi vastu kaitsta!</string>
<string name="mateInOne">Sõber esimeses</string>
<string name="defeatTheOpponentsKing">Alista vastase kuningas</string>
<string name="mateInOneIntro">Sina võidad kui su vastane ei saa malendi vastu kaitsa.</string>
<string name="attackYourOpponentsKing">Ründa oma vastase kuningat nii, et seda ei saa kaitsta!</string>
<string name="mateInOneComplete">Õnnitlused! Nii võidad sa male mänge!</string>
<string name="intermediate">Vaheühend</string>
<string name="boardSetup">Laua ülesehitus</string>
<string name="howTheGameStarts">Kuidas mäng algab</string>
<string name="boardSetupIntro">Kaks sõjaväge seisavad vastamisi, valmis lahinguks.</string>
<string name="thisIsTheInitialPosition">See on iga malemängu esialgne positsioon!
Tee mõni käik, et jätkata.</string>
<string name="firstPlaceTheRooks">Kõigepealt paigalda ratsanikud!
Nad lähevad nurkadesse.</string>
<string name="thenPlaceTheKnights">Siis paigalda kuningad!
Nad lähevad hobuste kõrvale.</string>
<string name="placeTheBishops">Paigalda piiskopid!
Nad lähevad kuningate kõrvale.</string>
<string name="placeTheQueen">Paigalda kuninganna!
Ta läheb oma värvile.</string>
<string name="placeTheKing">Paigalda kuningas!
Kohe kuninga kõrvale.</string>
<string name="pawnsFormTheFrontLine">Etturid ette ritta.
Tee mõni käik, et jätkata.</string>
<string name="boardSetupComplete">Õnnitlused! Olete osav võitleja.</string>
<string name="castling">Vangerdus</string>
<string name="theSpecialKingMove">Eriline kuninga liigutus</string>
<string name="castlingIntro">Too oma kuningas tagasi ohutusse kohta, ja kasuta oma ettureid rünnakuks!</string>
<string name="castleKingSide">Liiguta oma kuningat kahe ruudu võrra
lossi kuninga poolele!</string>
<string name="castleQueenSide">Liiguta oma kuningat kahe ruudu võrra
lossi kuninganna poolele!</string>
<string name="theKnightIsInTheWay">Rüütel on tulekul!
Liiguta seda lossi kuninga poolele.</string>
<string name="castleKingSideMovePiecesFirst">Lossi kuninga poolel!
Sa pead kõigepealt tükid eest ära koristama.</string>
<string name="castleQueenSideMovePiecesFirst">Lossi kuninganna poolel!
Sa pead kõigepealt tükid eest ära koristama.</string>
<string name="youCannotCastleIfMoved">Sa ei saa enne lossi kui kuningas on juba liikunud või ratsanikud on juva liikunud.</string>
<string name="youCannotCastleIfAttacked">Sa ei saa lossi kui
kuningat rünnatakse teepeal.
Blokeeri ruut, siis mine lossi!</string>
<string name="findAWayToCastleKingSide">Leia tee
lossi kuninga poolele!</string>
<string name="findAWayToCastleQueenSide">Leia tee lossi kuninganna poolele!</string>
<string name="castlingComplete">Palju õnne! Sa peaks peaaegu alati vangerdama.</string>
<string name="enPassant">Kõrvalmärkusena</string>
<string name="theSpecialPawnMove">Eriline etturi liigutus</string>
<string name="enPassantIntro">Kui vastase ettur on liikunud kahe ruudu võrra, siis sa saad seda kui ühe ruuduna võtta.</string>
<string name="blackJustMovedThePawnByTwoSquares">Must liikus etturiga
kaks ruutu edasi!
Võta see en passant käiguga.</string>
<string name="enPassantOnlyWorksImmediately">En passant töötab ainult
kohe pärast seda, kui vastane
käis etturiga.</string>
<string name="enPassantOnlyWorksOnFifthRank">En passant töötab ainult juhul,
kui sinu ettur on 5. real.</string>
<string name="takeAllThePawnsEnPassant">Löö kõik etturid en passant käiguga!</string>
<string name="enPassantComplete">Õnnitlused! Oskad nüüd en passant käiku.</string>
<string name="stalemate">Patt</string>
<string name="theGameIsADraw">See mäng on viik</string>
<string name="stalemateIntro">Kui mängija ei ole tules ning tal ei ole ühtegi legaalset käiku, siis tegemist on patiga. Tulemus on viik: kumbki ei võida ega kaota.</string>
<string name="stalemateGoal">Musta patti viimine:
- Must ei saa käia kuhugile
- Must ei ole tules.</string>
<string name="stalemateComplete">Õnnitlused! Parem on olla patis kui matis!</string>
<string name="advanced">Edasijõudnud</string>
<string name="pieceValue">Viguri väärtus</string>
<string name="evaluatePieceStrength">Hinda viguri tugevust</string>
<string name="pieceValueIntro">Vigurid suurema liikuvusega on väärtuslikumad!
Lipp = 9
Vanker = 5
Oda = 3
Ratsu = 3
Ettur = 1
Kuningas on hindamatu! Sellest ilma jäämine on võrdne kaotusega.</string>
<string name="queenOverBishop">Löö vigur
kõrgeima väärtusega!
Lipp > Oda</string>
<string name="takeThePieceWithTheHighestValue">Löö vigur
kõrgeima väärtusega!</string>
<string name="pieceValueComplete">Õnnitlused! Sa tead vigurite väärtust!
Lipp = 9
Vanker = 5
Oda = 3
Ratsu = 3
Ettur = 1</string>
<string name="checkInTwo">Tuli kahega</string>
<string name="twoMovesToGiveCheck">Kaks käiku, et anda tuld</string>
<string name="checkInTwoIntro">Leia õige kombinatsioon käikudest, mille tulemusena jääb vastase kuningas tulle!</string>
<string name="checkInTwoGoal">Ohusta vastase kuningat
kahe käiguga!</string>
<string name="checkInTwoComplete">Õnnitlused! Andsid vastasele tuld, sundides teda ohule reageerima!</string>
<string name="whatNext">Mis edasi?</string>
<string name="youKnowHowToPlayChess">Sa oskad malet mängida, õnnitlused! Kas sa tahad saada tugevaks mängijaks?</string>
<string name="register">Registreeru</string>
<string name="getAFreeLichessAccount">Lichess konto loomine on tasuta</string>
<string name="practice">Harjuta</string>
<string name="learnCommonChessPositions">Õpi tuntud male seise</string>
<string name="puzzles">Pusled</string>
<string name="exerciseYourTacticalSkills">Harjuta oma taktikalist taipu</string>
<string name="videos">Videod</string>
<string name="watchInstructiveChessVideos">Vaata õpetlikke male videosid</string>
<string name="playPeople">Mängi inimestega</string>
<string name="opponentsFromAroundTheWorld">Vastased üle maailma</string>
<string name="playMachine">Mängi arvuti vastu</string>
<string name="testYourSkillsWithTheComputer">Pane oma oskused proovile arvuti vastu</string>
<string name="letsGo">Lähme!</string>
<string name="stageX">Etapp %s</string>
<string name="awesome">Lahe!</string>
<string name="excellent">Suurepärane!</string>
<string name="greatJob">Hästi tehtud!</string>
<string name="perfect">Täiuslik!</string>
<string name="outstanding">Uskumatu!</string>
<string name="wayToGo">Väga hea!</string>
<string name="yesYesYes">Jah, jah, jah!</string>
<string name="youreGoodAtThis">Sa oled hea selles!</string>
<string name="nailedIt">Fantastiline.</string>
<string name="rightOn">Just nii!</string>
<string name="stageXComplete">Etapp %s läbitud</string>
<string name="yourScore">Sinu skoor</string>
<string name="next">Järgmine</string>
<string name="backToMenu">Tagasi menüüsse</string>
<string name="puzzleFailed">Kukkusid läbi!</string>
<string name="retry">Uuesti</string>
</resources>
| {
"pile_set_name": "Github"
} |
{"text": ["financials", "looking", "to", "bottom", "here", "..", "$", "fas", "$", "gs", "$", "c", "$", "jpm"], "created_at": "Tue Apr 08 16:16:38 +0000 2014", "user_id_str": "575887522"}
{"text": ["$", "c", "may", "miss", "shareholder", "equity", "financial", "metric", ",", "according", "to", "reports"], "created_at": "Tue Apr 08 11:34:51 +0000 2014", "user_id_str": "1375105020"}
{"text": ["rt", "AT_USER", "citigroup", "must", "run", "harder", "to", "cross", "profit-return", "finish", "line", "URL", "$", "c"], "created_at": "Tue Apr 08 11:22:24 +0000 2014", "user_id_str": "354812319"}
{"text": ["$", "c", "pot", "double", "bottom", "URL"], "created_at": "Tue Apr 08 19:33:34 +0000 2014", "user_id_str": "37982404"}
| {
"pile_set_name": "Github"
} |
FREEDOM FROM FEAR: Ending California’s Hate Violence Epidemic
FREEDOM FROM FEAR: Ending California’s Hate Violence Epidemic
Final Report of the Lieutenant Governor’s Commission on the Prevention of Hate Violence
At its most fundamental level, hate violence is an aggressive expression of hatred against another person or group of people simply because of who and what they are. But an act does not have to be criminal to be an act of hate; the use of an epithet with the intent to cause fear is an expression of hate regardless of whether or not it is a crime. Thus, we have chosen to use the term “hate violence,” encompassing both explicitly criminal acts and acts of hate which we also seek to prevent.
What Causes Hate Violence?
The roots of hate violence are broad, but most causes come back to one element in the end: fear. This fear is most often rooted in ignorance: fear of the unknown, fear of the “other,” fear of perceived competitors; all of these hold the potential to generate a violent reaction under the right conditions.
“US” and “THEM”: The Nature of Prejudice
Prejudice is, at a basic level, instinctual. Many studies have been conducted to show that people habitually, instinctually are drawn to notice differences and similarities between themselves and others. This is a natural function of our desire to create order out of the chaotic world around us.
But in comparing ourselves to others, we tend to label others’ similar attributes to be desirable, and others’ dissimilar attributes undesirable. Soon we are judging whether a person is “good” (that is, we react positively to them), or “bad” (we react negatively). It is only a short jump for a stressed person from thinking “that person is bad because they are different from me” to “those people caused all my problems, and I’m going to do something about it.” (This discussion of prejudice draws heavily on the work of Dr. Norman Miller of USC and Dr. Marilyn Brewer of UCLA, who have done a number of studies of prejudice, how it is formed and how it can be broken down. Dr. Miller was a presenter at the Commission’s January 7, 1992, hearing.)
External Influences: Hate Groups, Traditional and Pseudo-Mainstream
In terms of external causes, the effort of groups such as the Ku Klux Klan, the White Aryan Resistance (WAR) and other neo-Nazi organizations to preach violence against racial, religious, sexual and other minorities continue unabated today. They have hate hotlines, computer bulletin boards, hate propaganda distribution networks, youth groups, street gangs, etc. active throughout the state, pumping out a steady drone of messages designed to transform the fears of the economically distressed, the paranoid and the ignorant into violent reaction. WAR, in particular, has been adept at indoctrinating and training gangs of young skinheads to brutalize minorities and vandalize their property.
These groups recognize very clearly the psychology of the issues they raise. As former WAR youth leader Greg Withrow told the Commission, referring to his upbringing by his neo-Nazi father, “before I ever learned to hate, I learned to fear.” They are indoctrinated to believe that minorities are a threat to their way of life, to their very existence, and that the only choice is to fight back in as violent a fashion as possible.
Yet, the efforts of these hardcore white supremacist groups ultimately reach only a few sympathetic ears on the fringes of American society.
What is more disturbing and potentially dangerous is the increasing proliferation f pseudo-mainstream hate groups like David Duke’s National Association for the Advancement of White People. Duke and others of his ilk do everything possible to look, act and sound like standard interest groups simply promoting their views about society. But their messages are riddled with innuendo and code words designed to play on people’s worst fears and prejudices in order to generate hatred against the people these groups perceive to be their enemies. For example:
The homophobic preaching of some self-proclaimed watchdog groups like the Traditional Values Coalition spread an insidious message of hate. Their adoption of loaded terms to mask or even justify their virulent hatred of gay and lesbian people has made their views acceptable for some political leaders and small subgroups of the general population.
Ethnically based groups like the National European American Society (NEAS)… purport to be simple ethnic pride organizations, but attack U.S. civil rights laws and immigration policies as “pure genocide” against European Americans. When provoked, they revert to true form and call people of similar ethnic backgrounds who disagree with their views “race traitors” and the like. Not all European-American groups are fronts for white supremacy; some are well-intentioned attempts to mimic other ethnically based clubs and groups. But the term “European American” has been tainted by its use by groups like the NEAS and the White Student Union, an offshoot of WAR.
These pseudo-mainstream hate groups are perhaps the most dangerous. A large percentage of the population automatically tunes out messages from known racist groups like the KKK, because they know who is talking to them and what their true agenda is. But groups with a mainstream cover, who use mainstream terminology and a healthy dose of charged code-words to spread their message, can find a much wider audience.
Other Key External Influences
Peers
Most young people value the opinions of their peers highly. Many young people who have become involved and then left white supremacist groups say they joined because their friends were doing it or because they wanted to belong to a group — any group. The relative void of an American culture when compared to rich cultures like Mexican, Jewish and others may be a part of psychology at work. Joining a racist gang — or any other gang — fulfills the need to belong. In the case of a racist gang, joining may additionally meet the desire to lash out at others who have a strong ethnic, cultural, religious or even sexual identity.
Family
Family may also exert a strong influence on attitudes regarding other people. Former WAR youth leader Greg Withrow told the Commission: “My father’s expressed ideal for me was to lead a youth movement; to be as a Hitler … I was raised in Nazi camps, I was raised with this philosophy from childhood. I knew nothing else.” Raised under these extreme circumstances, it is hard to imagine another outcome for Mr. Withrow than what occurred: heavy involvement with Aryan youth gangs and a career of several years as a WAR youth leader. While Mr. Withrow’s experience represents an extreme, many young people in California and throughout the country are exposed to parental or other familial prejudices in the course of day-to-day living. These attitudes coming from important role models will inevitably affect how they view others.
A related issue is the new economic realities of the family. Kids today are the first generation in this century to know that they are unlikely to improve on the standard of living their parents enjoy. For many of them, this has darkened their outlook on life and nurtured a feeling of victimization which may in extreme cases demand some kind of retaliation.
Media
The mass media play a key role in shaping popular attitudes, especially among young people. The vast majority of young people today watch several hours of television per day, much of it unsupervised by parents. the portrayals, or lack of portrayals, of various types of people on the programs they watch inevitably shape their attitudes about those groups.
This is especially true in homogeneous neighborhoods where students may have virtually no firsthand exposure to people of a different background. In such case the only information a young person may have with which to form an opinion about a group of people is what they see on television, in the movies or in popular music. If stereotypes or negative portrayals of members of a group are all they see, they are likely to adopt negative preconceptions about members of that group.
Political Leaders
Some political figures today are willing to fan the flames of bigotry in order to advance their own interests and careers. We have seen rampant examples in recent years of political campaign ploys that are permeated with racist and homophobic connotations. The appearance that political figures and even some government leaders approve of these views gives them a veneer of respectability that they do not deserve. young people who see leaders using these kinds of tactics and drawing a following may conclude that there is nothing wrong with race-baiting or gay-bashing.
Conclusion
Given the multiplicity of sources and the instinctual nature of prejudice, when addressing hate violence we cannot afford to focus more than a small portion of our efforts on responding directly to specific sources of negative messages. We have to focus most of our efforts on the broader goal of inoculating the next generation so that they can reject those who try to infect them with hatred for others.
This is a publication of the Lieutenant Governor’s Commission on the prevention of Hate Violence. May 1992. For further information on this report contact CAHRO. | {
"pile_set_name": "Pile-CC"
} |
Thoughts on communication
There have been a couple of ‘stories’ in the Australian media of late that suggest a fundamental change in the communication landscape is emerging. One is the ongoing furore around a comment in very bad taste made by radio presenter Alan Jones at a private function organised by a political party, the other concerns perceptions about one of our political leaders. For the purpose of this post, the facts of the two situations are less important than the trends they suggest are emerging.
The Australian government does not try to moderate good taste and within sensible limits around defamation, incitement and vilification we enjoy the privilege of freedom of speech which I believe is critically important; therefore:
Alan Jones has a right to exhibit bad taste and make his comment and the 1000s of other people who are using social media to express their objection to the comment have an equal right to ‘free speech’ and the whinging from the 2GB management (Jones’ radio station) about the effect of the social media campaign on their advertises is also ‘free speech’.
Having said that, what I believe is really interesting is the shift in power that is evident. As a high profile radio presenter, Jones used to have almost complete power, he controlled the microphone, could rubbish detractors on air and cut off their response. That power still remains but has been circumvented by social media; a sustained campaign by the ‘twittering classes’ has cost 2GB hundreds of thousands of dollars in cancelled advertising – a new paradigm for directors and managers to deal with.
In a similar vein, the ongoing ‘noise’ around opposition leader Tony Abbot’s attitude to women will be interesting to watch through to a conclusion, if one is ever reached……
But even at this early stage there are a number of observations that are likely to become increasingly important in an effective stakeholder engagement and communication model for any entity; both individuals and organisations.
Negativity is becoming a very dangerous weapon to deploy. American politicians of all persuasions have been running negative advertising about politicians of the other persuasion for many years. The negative advertising has worked, the America public consistently place politicians at the very bottom of any list based on ethics, trust, etc. Used car salesmen and journalists are preferred to politicians and the situation is not much different in Australia. If you start using negativity, the power of social media to spread the negativity almost guarantees it will come back to damage the initiator. In the connected age, negativity is rapidly becoming a WSD (of similar power to a WMD but read ‘weapon of self destruction’).
Perceptions are easily created and hard to dispel or change. I have no idea how Tony Abbot actually works with women, but a negative perception has emerged. Perceptions are frequently wrong, but they are based on what people believe they saw or heard. Consequently this type of social perception cannot be changed by people with a vested interest telling others they are wrong, to quote Margaret Thatcher “Power is like being a lady… if you have to tell people you are, you aren’t” – the same applies to perceptions. Perceptions can be managed but they are built over time and have to be changed over time and this can only be achieved with a sustained change in observed behaviour – words are not going to do anything.
There seems to be an emerging disconnect between perceptions and emotions and reality. This was the focus of my blog post Credit, Trust and Emotions. What’s not mentioned in the blog, but is in the RBA report, is that non-mining business investment has been increasing rapidly despite the flat business sentiment. The real economic situation and actual investment levels are aligned, but the business sentiment is failing to recognise business reality.
Managing a corporate image, your project’s image within the organisation or your personal image is certainly getting to be a whole lot harder. What I’m wondering based on the above is, are we starting to see a real shift from positional power, supported by negativity and traditional advertising to something more subtle, distributed and potentially positive, and if so how can this be effectively managed? | {
"pile_set_name": "Pile-CC"
} |
PMG-Media Blog
What’s your story?
Each company has a story, and therewith its own character and identity. How strong they are depends on the impact of the story. Whether it is about reaching a certain audience, committing people to your organization or positioning your organization or product: with a good story you are able to inspire people.
PMG Today uses storytelling in order to strengthen your brand strategy, with experience as the keyword. Because more than ever the story behind your product or service is essential to its success. This story is the starting point for your marketing and communication strategy. It is the difference between telling something to someone and really inspiring your audience. Read more about storytelling @PMGToday | {
"pile_set_name": "Pile-CC"
} |
We here at CryptoDetail were recently asked an important question. In this article, we want to discuss how you can keep track of your crypto mining progress.
# 1 - Direct Monitoring With Paper Wallets
There are a number of ways to track your mining progress. Perhaps the easiest is to use a mining setup that delivers cryptos directly into your own private wallet. This setup gives you instant, up to the minute updates on just how much crypto you have mined. Use a dedicated wallet for your mining and voila; you have your tracking software running non-stop. We have several mining setups like this. Some hardware, most software and all going into paper wallets of their own. The beauty of this monitoring setup is that all we need to do is visit the appropriate blockchain explorer, type (actually cut and paste is faster and far more accurate) in the wallet address and every deposit from our mining operation is right there.
# 2 - Pool Tracking
The second most reliable crypto mining monitoring system we here at CryptoDetail employ is direct from a pool. We have discussed pool mining extensively here in the past. And, one of the things we love best about mining in a pool (aside from the increase success rate) is the fact that pools have a dashboard that tells you exactly what your share of the entire mining operation is at any given time.
MinerGate is not only an excellent piece of mining software; it is also a great pool. The interface is straightforward and accurate. MinerGate, as with most other reputable pools, always shows you, right there on your dashboard, exactly how much of each coin you have mined.
#3 - Get The Right Software
There is quite a bit of controversy surrounding this concept. And, only one member of our team here at CyptoDetail uses monitoring software. It happens to be software he wrote. So, his particular situation is a bit different.
Aside from creating your own software we cannot recommend such a setup. Such monitoring gives the coder you hired access to your accounts. And, it puts that access information on the coder's own system which means that, if his /her system gets hacked or otherwise compromised; your mining operation is exposed and you are risking it all. So, again, unless you know how to code; we do not recommend specialized software.
More Choices?
Unfortunately, those are the available options for monitoring your mining operation. So this will require a bit of footwork on your part. But, these two tools listed above (three if you can code) are more than enough to keep you on top of your mining efforts.
Remember, the blockchains are your friends. And, as we all know it is always more preferable to avoid putting your funds into the hands of a third party (see Crypto Rule # 1) option # 1 of using a dedicated wallet to collect funds directly from your mining software or hardware.
Conversely, mining in a pool gives you a much better chance of mining success. But, unless you are trying to monitor only what the pool sends to your wallet (where you could again use blockchain monitoring) you are going to have to rely on your chosen pool's account dashboard to track your mining success.
The mighty Google
Beyond these (and any software you may be able to write yourself); or, if, like us here at CryptoDetail, you have several different mining setups; you are going to have to do some good old-fashioned paperwork. This is where we like to use Google Sheets. If you are not familiar with that system, Google Sheets is an online spreadsheet that allows you to record, well, whatever information you might want to record. For this purpose, a simple "Hardware - Software - Pool - Coin - Wallet - Date - Profit" layout seems to fit our needs.
Of course, being an online platform we have to consider security. So, sit down and figure out a code system that you will be comfortable using. Whether it is a simple abbreviation you will easily understand; or a complete obfuscation of the information that you alone will be able to understand; never just record financial information online. Even the mighty Google has been hacked before. So, keep security first in your mind.
The accuracy
The only other consideration in your mining monitoring is accuracy. This is essential in order to track your own finances. However, it is also essential from a legal and financial standpoint. With the new laws in place, you are probably liable for a tax debt on any mining income you may make. And, if you are in a pool that is investigated you may well become the subject of a tax audit (the Internal Revenue Service in the US LOVES audits). So, again, keep accurate records.
The choices of accurate crypto mining monitoring may be a bit limited simply due to the way mining works. But, as they say; where there is a will there is a way. And, if you want to keep track of your own mining operation(s); these are the best ways we here at CryptoDetail have found to keep an eye on that magic mining process.
*** Nothing presented herein is intended to be legal or financial advice. We here at CryptoDetail are not lawyers nor CPAs. If you are engaged in mining you are creating an income; regardless of how minute, or massive; you should always consult a local tax attorney and /or Accountant to ensure your compliance to relevant laws and tax regulations as applicable in your jurisdiction.
*** As always; you must do your own due diligence before employing any mining and /or monitoring strategy. Our solutions are right for us; but, those same solutions may not be ideal for you and your situation. Please investigate the possibilities and make an informed decision as to what fits your own need, situation and personality best.
Thanks for joining us on this exploration! Good luck on your own crypto journey!! Happy HODLing!!!
Danny Donahue | {
"pile_set_name": "OpenWebText2"
} |
At our beautiful Wicken Park site, our Nursery offers outstanding care and facilities for children aged 12 months to four years all year round, providing a safe and happy springboard for your child’s education.
Akeley Wood Senior School is located across two historic sites just a mile apart in the beautiful Buckinghamshire countryside, offering tranquil yet stimulating settings conducive to first class teaching and learning.
Akeley Wood’s thriving Sixth Form offers a unique and stimulating environment for study and a purpose-built Common Room for our young adults to prepare for university, apprenticeships or the workplace.
U10 Rugby at Stratford
Monday this week saw the U10 A&B rugby teams travel to Stratford to play: The Croft, Warwick and Bablake schools. Three games in one afternoon was tough but a great rugby experience.The journey up was a clear one so the boys had plenty of time to get ready and warm up. Games were short and sharp – only 10 minutes each way on some heavy, damp and muddy pitches. Both Mr Peedell and I were really happy with the commitment of our boys during the afternoon. Well done, boys. Thank you to our 3 supporters who made the journey. | {
"pile_set_name": "Pile-CC"
} |
Optimization of intensity modulated radiation therapy: assessing the complexity of the problem.
Intensity modulated radiation therapy (IMRT) is one of the most innovative techniques in oncological radiotherapy, allowing to conform the dose delivery to the tumoral target, preserving the normal tissue. The high number of parameters involved in the IMRT treatment planning requires an automated approach to the beam modulation. Such optimization process consists in the search of the global minimum of a cost function representing a quality index for the treatment. The complexity of this task, has been analyzed with a statistical approach for three clinical cases of particular interest in IMRT. Our main result is that a cost function based on dose-volume constraints entails lower complexity of the optimization process, in terms of the choice of the parameters defining the cost function and in a smaller sensitivity to the initial conditions for the optimization algorithm. | {
"pile_set_name": "PubMed Abstracts"
} |
Victoria Carter cares for a pair of leather boots at the Leather Hub at Sunday Streets SOMA event in San Francisco. Carter was voted the 2018 San Francisco Bootblack, and is an organizer of the San Francisco BootLab, which services the gear in the leather community. “I think of us kind of like hair dressers or bartenders or whatever. You sit down with us, we take 20 minutes. We talk about your day, some gossip, some upcoming events in the scene. Through that we become history keepers," she says. (Sarah Craig/KQED)
Community Celebrates San Francisco's New Leather and LGBTQ Cultural District
The Leather Hub on Folsom Street was filled with people celebrating the city's rich history of kink, BDSM, furries and leather.
Waldemar Howart laces up Steve Shi with rope as they demonstrate Shibari, an ancient Japanese artistic form of rope bondage. (Sarah Craig/KQED)
Bob Brown identifies as a leatherman and has been coming to the South of Market neighborhood since the 1980s, when there used to be 47 gay and leather bars, according to the San Francisco Leather Alliance. Today, the group says there are only seven.
Brown has had two partners, and he met both of them in the neighborhood. He met his first husband at the famous gay bar, The Stud, and he met his current husband at a leather boots business called Stompers. And he proposed to him in the very same spot.
"So I have a lot of history in this area," he said.
Mark Benjamin (left) and Mike Pierce wave flags at the Sunday Streets SOMA event. Benjamin and Pierce are members of Flagging in the Park and came to show their support for the newly created Leather & LGBTQ Cultural District. (Sarah Craig/KQED)
Brown says he sees the newly formed cultural district as a way to maintain and create more affordable spaces for residents and businesses who are part of the LGBTQ and leather community.
Sponsored By
“I hate to see it go away or disappear as it seems to be doing, but I think this is a good effort to help people understand why preserving things in this area [is] important,” he said.
While the cultural district can’t protect housing or save businesses from closing, it does encourage developers to work with the community.
It's a community that Ryan Taylor considers family. He’s a member of San Francisco K9 Unit and was participating in a puppy mosh booth where people act like puppies and play together.
Members of the San Francisco K9 Unit, a social organization for people who enjoy puppy play, participated in a puppy mosh at the Sunday Streets SOMA event. "It’s so much fun not having to hide who I am," says Josh Auld, who recently moved to San Francisco from Houston. (Sarah Craig/KQED)Ryan Taylor shows off his name tag at a celebration of the new Leather and LGBTQ Cultural District at Sunday Streets SOMA in San Francisco. "No matter what walk of life you are, whether the whipping category or pups or any of the other ones here, you are still welcomed and treated like family," he says. (Sarah Craig/KQED)
Sponsored By
"Everyone here, no matter what walk of life you are, whether the whipping category or pups or any of the other ones here, you are still welcomed and treated like family," Taylor said. | {
"pile_set_name": "Pile-CC"
} |
Thyroxine 5'-monodeiodinase activity in regenerating liver of triiodothyronine-treated rats.
The effect of triiodothyronine (T3) on hepatic thyroxine (T4) 5'-monodeiodinase and the subcellular localization of the enzyme were examined in regenerating rat liver, because it seemed likely that the effect of T3 might be accentuated during liver regeneration. Five days after T3 treatment, the specific activity of the monodeiodinase in the microsomal fraction (105,000 X g pellet) of regenerating liver was increased to 207% of the control value. Lineweaver-Burk plots showed that the Vmax for T4 5'-monodeiodination was about 3 times greater in T3-treated rats than in controls, but that there was no difference between the two groups in the apparent Km value for T4. About 55% of the total enzyme activity was found in the endoplasmic reticulum (ER) of the liver of both controls and T3-treated rats. The subcellular distribution of the enzyme was similar to that of NADPH-cytochrome c reductase (NADPH-cyt c reductase), a marker of the ER, but different from that of Na+,K+-ATPase, a marker of plasma membranes (PM). | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Updating a DIV while writing text into a textarea
I would like to "live" update a DIV in the page with the text the user enter in a textarea.
I have the following markup
<div id="previewNote" class="note yellow" style="left:25;top:25px;z-index:1;">
<div class="body"></div>
<div class="author"></div>
<span class="data"></span>
</div>
and wrote this jQuery code
/* Listening for keyup events on fields of the "Add Note" form: */
$("[ID$=NoteText]").live('keyup', function(e) {
if (!this.preview)
this.preview = $("[ID$=previewNote]");
/* Setting the text of the preview to the contents of the
input field, and stripping all the HTML tags: */
this.preview.find(".body").html($(this).val().replace(/<[^>]+>/ig, ''));
});
But the div does not get updated. What do am I missing?
thanks!
EDIT
This is the form.
<form action="/Note/SaveOrDelete" id="crudForm" method="post"><input id="IssueNoteID" name="IssueNoteID" type="hidden" value="0">
<!-- The preview: -->
<div id="previewNote" class="note yellow" style="left:25;top:25px;z-index:1;">
<div class="body"></div>
<div class="author">admin</div>
<span class="data"></span>
</div>
<div style="margin: 16px 0px 0px 180px; width: 240px;">
<table border="0" cellpadding="3" cellspacing="1" width="100%">
<tbody><tr valign="top">
<td colspan="2">
<label for="NoteText">Testo</label>
<br>
<textarea cols="30" id="NoteText" name="NoteText" rows="6"></textarea>
</td>
</tr>
<tr valign="top">
<td colspan="2" align="right">
<label for="NoteDate">Data</label>
<input id="noteDate" name="noteDate" style="width: 120px" type="text" value="" class="hasDatepicker">
</td>
</tr>
</tbody></table>
<div style="text-align:right;">
<input type="submit" id="btnSave" value="Salva" class="ui-button ui-widget ui-state-default ui-corner-all" role="button" aria-disabled="false">
</div>
</div>
</form>
but, listen, I have changed the jQuery code in
/* Listening for keyup events on fields of the "Add a note" form: */
$("[ID$=NoteText]").live('keyup', function(e) {
/* Setting the text of the preview to the contents of the
input field, and stripping all the HTML tags: */
$("[ID$=previewNote]").find(".body").html($(this).val().replace(/<[^>]+>/ig, ''));
});
and everything works!!! :O
It is very strange...
A:
Using this HTML:
<textarea id="NoteText"></textarea>
<div id="previewNote" class="note yellow" style="left:25;top:25px;z-index:1;">
<div class="body"></div>
<div class="author"></div>
<span class="data"></span>
</div>
and this JS:
jQuery(function($) {
var input = $('#NoteText'),
preview = $('#previewNote div.body');
input.keyup(function(e) {
preview.text(input.val());
});
});
...works fine for me, and no need to strip tags either.
EDIT
This also works fine for me:
jQuery(function($) {
$('#NoteText').live('keyup', function(e) {
$('#previewNote div.body').text($(this).val());
});
});
| {
"pile_set_name": "StackExchange"
} |
Q:
Storing articles in MYSQL data types
I'm doing this test project of my own. I'm new to web development and need a little advice. I know to store articles you need to use TEXT or some people use BLOB. Which is better?
Also, in order to properly style articles, what can I do? Change Storage engine? Maybe there is one that interprets HTML? Like paragraphs <p> and headers <h1>. Maybe even <br>?
A:
It depends on the format of the document. If it is HTML, RTF or Plain text, you can use TEXT. For Word documents, PDF's and other binary formats, use BLOB. When mixing the two, use BLOB as well. BLOBS can contain text data, but TEXT might not handle all binary data correctly.
| {
"pile_set_name": "StackExchange"
} |
Genotoxicity testing of three monohaloacetic acids in TK6 cells using the cytokinesis-block micronucleus assay.
Chemical disinfection of water generates harmful chemical compounds, known as disinfection by-products (DBPs). One class of DBPs is constituted by haloacetic acids (HAAs), the second major group in prevalence (after trihalomethanes) detected in finished drinking water. In this article, we report the results obtained in the evaluation of the chromosome damage induced by three monohaloacetic acids, namely iodoacetic acid (IAA), bromoacetic acid (BAA) and chloroacetic acid (CAA). To evaluate the induction of chromosome damage, we used the cytokinesis-block micronucleus test that measures the ability of genotoxic agents to induce both clastogenic and/or aneugenic effects. No previous data exist on the effects of these compounds on human chromosomes. We tested five doses of each HAA, in addition to the negative and positive controls. The highest dose tested for each HAA was that immediately lower than the dose producing total cytotoxicity. Our results show that none of the three HAAs tested was able to increase significantly the frequency of micronucleus in binucleated TK6 cells, the rank order in decreasing cytotoxicity was IAA > BAA >> CAA. | {
"pile_set_name": "PubMed Abstracts"
} |
Kronoberg Castle
Kronoberg Castle is a medieval ruin located on an island in lake Helgasjön, north of the town of Växjö in Småland, Sweden. Kronoberg County, in which it is located, was named after the castle.
In 1444 Lars Mikaelson, the bishop of Växjö, built a stone building on the lakeshore. During the Dano-Swedish War of 1470–71, Danish forces destroyed the house. It was reconstructed and fortified after peace was restored in 1472. During the Swedish Reformation the castle and its estate were confiscated by Gustav I.
In 1542, during the Dacke War, Kronoberg was taken over by rebels led by Nils Dacke. The revolt was suppressed in 1543, and control reverted to the crown. Due to its strategic location near the border between Sweden and Denmark at the time, the castle was further fortified and became a stronghold in this part of Småland.
The king's son John III ordered additional improvements that never were carried out. The castle had great military significance during the Northern Seven Years' War (1564–70). In the winter of 1568, Eric XIV used Kronoborg as a support point while beating back a Danish attack from Skåne. In 1570 the castle was successfully besieged and burned by the Danes. Between 1576 and 1580 construction continued, after which the castle had at least 50 cannons. Duke Charles continued work on the fortifications, but in the end of January 1612, the castle was again taken and burned by Danish troops under Breide Rantzau. Reconstruction was not started until 1616.
As late as the reign of Charles XI Kronoberg castle was in good condition. However, after the Treaty of Roskilde was signed in 1658, the Swedish-Danish border was moved to Øresund, and Kronoberg castle lost its military significance. Neglected, the building began to decay and became a ruin.
The castle ruin is open to tourists in the summer months. It is located just short drive from Växjö, Sweden.
Category:Castles in Kronoberg County
Category:Växjö
Category:Tourist attractions in Kronoberg County
Category:Värend
Category:Ruined castles in Sweden | {
"pile_set_name": "Wikipedia (en)"
} |
Season Seven of Game of Thrones is looming on the horizon, like the Wall itself.
I’ll be talking about that Wall, and details from Season Six (and earlier) so if you’re not caught up, you are taking the risk well-warned of spoilers.
In the finale of the sixth season of Game of Thrones, Bran Stark’s undead uncle Benjen escorted them from the far northern locale of the deceased Three Eyed Raven, to within site of the Wall. Before placing Bran next to a weirwood tree, Benjen announced that he was leaving.
Benjen: This is where I leave you.
Meera: You’re not coming with us?
Benjen: The Wall’s just not ice and stone. Ancient spells were carved into its foundation. Strong magic to protect men from what lies beyond. While it stands, the dead cannot pass. I cannot pass.
About a month ago, I had a post discussing the Night’s Watch, and assuming the Others are defeated and the Long Night averted, how should the manning of the Wall resume?
After all, the Others might not return for thousands of years. What’s the short term purpose in manning the Wall?
I shared the post on Reddit (I occasionally do that, just to see what happens) and it kicked off a short discussion (it was non-controversial and non-confrontational, sorry) where someone tried to convince me that the Night’s Watch stated purpose was a scam, that the organization existed entirely as a eugenics experiment to remove law-breakers from the populations.
And that the Wall didn’t need to be manned at all. The Wall kept out the Others and their wights all by itself.
Lets…. lets discuss some of this.
The Night’s Watch
Actually, I’m not that interested in discussing both sides of this. I just can’t imagine that for 8000 years, a cabal of Westerosi eugenicists have been keeping alive the idea that society can be molded by exiling their violent non-conformists to a huge icy prison, with the cover story that they’ll be guarding the world from monsters.
I mean, we know that the Others exist. The Wall does seem to have been built to keep them out. So even if men are being forced to serve in the Watch under false pretenses, they actually do serve a legitimate function of defending the Wall, and the realms in the south.
It’s not a really a prank if you send guys out on a snipe hunt and they return with snipes. (If you don’t know what a snipe hunt is, I don’t know if I can adequately explain it.)
I think there’s sufficient evidence in the books, from Ned, from Yoren, from Maester Aemon, from other honorable men, that the Night’s Watch at one time was an honorable institution, and that its current state of mostly-criminal enrollment is not necessarily the historical average.
But it is kind of irrelevant for the meat of this post that I want to talk about. Regardless if the Wall has been manned since the Age of Heroes by Jon Snows or Rast the Rapers, was manning the Wall even necessary?
Manning the Wall
Let’s assume that the wildlings aren’t planning on surging over this supernaturally stable, clearly artificial glacier (because then there’d be an obvious need to man the Wall.) Would this magical chunk of ice be enough to keep out the Others and their hordes?
I say no.
The Wall, by itself, will not be enough.
Considering evidence from the books and the show, the argument against me is based mostly on Uncle Benjen’s description that the Wall was warded. The dead cannot pass, so that’s it.
If that was true, if it was that simple … the Wall wouldn’t have to be so unbelievably tall. Seven hundred feet high seems rather excessive. That fact that it is so tall implies that the height is there to prevent something from scuttling over. Since the Wall is not infinitely high, it really just sets a high level of difficulty but is not an impassable obstacle.
So, I think the Wall could be scaled by wights, and therefore having manpower to repel them is necessary.
And, if I can pull in some book stuff, Jon Snow sees this happening!
Burning shafts hissed upward, trailing tongues of fire. Scarecrow brothers tumbled down, black cloaks ablaze. “Snow,” an eagle cried, as foemen scuttled up the ice like spiders. Jon was armored in black ice, but his blade burned red in his fist. As the dead men reached the top of the Wall he sent them down to die again. He slew a greybeard and a beardless boy, a giant, a gaunt man with filed teeth, a girl with thick red hair. Too late he recognized Ygritte. She was gone as quick as she’d appeared. (Jon XII – A Dance With Dragons)
Okay, that was actually a dream Jon had, but I tend to give weight to prophetic dreams. But lets discount it for now.
The argument against wights scaling the Wall again falls to Benjen’s quote. Benjen says that he can’t get near the Wall. So if wights can’t get near the Wall, they can’t climb it.
Except that he doesn’t actually say that. He doesn’t say that he can’t get near to the Wall. He just says he can’t pass.
The desiccated wights who try to follow Bran and company into the Three Eyed Raven’s weirwood cave have no problems approaching the cave, but the magic that animates them and holds their ancient bones together is certainly not up to the crossing of the threshold at the cave’s entrance.
Dead men cannot pass. But dead men can still get near.
So maybe this is a threshold thing, that the pathways carved into the Wall are what’s protected? (Even if Benjen specified the foundation, which seems more inclusive and all-encompassing. But it’s not like he was there 8000 years ago when these wards were put in place! Okay, neither was I.)
There’s some evidence for passageway threshold barriers in the books. Gilly and Sam pass through the Wall and into the Nightfort via the Black Gate, a secret passage barred by a door of black, petrified weirwood. It would admit Sam, but would not allow access to the friendly but undead Coldhands (who is an Uncle Benjen analog in this example.)
Let’s consider that the wights could drill their own passages directly through the ice without exploding, if the magic under discussion is a warded passageway. Or they could still climb. Either activity would need to be stopped by sentinels actively defending the Wall.
But now let’s assume that the Wall’s surface is magical anti-wight Kryptonite. That if they touch it, they’ll blow up. Even in this extreme case, which would preclude climbing and tunneling, they can still get through the Wall unharmed. Because we’ve seen that happen.
In the first season, a dead ranger named Othor was brought through the gate at Castle Black. That night, in Castle Black (which is right next to the Wall, not a mile away like Uncle Benjen was when he dropped off Meera and Bran) Othor rose up as a wight, and went after the Lord Commander.
Wait, I hear some of you say. Othor was probably just dead before. The Night’s Watch brought a regular old mundane corpse through the wards of the Wall, and afterwards the Night’s King raised him from the northern side. (Somehow. We don’t know the range of his necromancy…)
Yeah, no.
Othor was more than just a corpse. The bodies of Othor and Jafer Flowers (who was also raised as a wight in the books, but he was otherwise dealt with) give off a worrisome vibe to their veteran brothers in the Night’s Watch. The horses were spooked by their bodies. The dead men’s eyes were wrong.
Jon remembered Othor; he had been the one bellowing the bawdy song as the rangers rode out. His singing days were done. His flesh was blanched white as milk, everywhere but his hands. His hands were black like Jafer’s. Blossoms of hard cracked blood decorated the mortal wounds that covered him like a rash, breast and groin and throat. Yet his eyes were still open. They stared up at the sky, blue as sapphires.
…
Dywen sucked at his wooden teeth. “Might be they didn’t die here. Might be someone brought ’em and left ’em for us. A warning, as like.” The old forester peered down suspiciously. “And might be I’m a fool, but I don’t know that Othor never had no blue eyes afore.” Ser Jaremy looked startled. “Neither did Flowers,” he blurted, turning to stare at the dead man.
Othor and Jafer were wights. But they were dormant, not active.
Whatever state they were in, they managed to be brought in under the magical radar that protected the Wall from dead men. Even though Benjen said that the dead could not pass, these two did.
It’s in everyone’s interests for the Wall to be manned and maintained by either the Night’s Watch or some analogous force of men (or women, I don’t want to be exclusionary) just to prevent dormant wights from being ferried through undefended passageways.
Hold on. Who would be bringing in dormant wights? Other wights? Active wights can’t pass the Wall!
That’s right. I’m not expecting wights to be carrying in their quiescent comrades. The danger is from living humans bringing in the dormant wights. There’s always the danger that there are wildlings who have sided with the Others. Like Craster and his wives. Not all of the Free Folk worship the weirwoods, at least according to the World of Ice and Fire:
some accounts say that there are those who worship different gods: dark gods beneath the ground in the Frostfangs, gods of snow and ice on the Frozen Shore
If there was no Night’s Watch to guard the Wall, quisling wildlings in service to the Others would be able to open a passage and ferry in an army of wights. And I’m not so sure that the Others couldn’t get past the Wall.
The story of the thirteenth Lord Commander of the Night’s Watch features his seduction by a cold as ice, blue-eyed sorceress whom he brought back with him into the Nightfort. He then declared himself the Night King, her the Night Queen, and forced obedience and worship from the black brothers. (The Starks dealt with him soon enough. I think that’s when the “wear no crown, take no wives” clause entered the Night’s Watch oath.)
But she might not have been actually an Other though. She might have just been a chilly witch with blue eyes.
So maybe an army of wights could get across, but not necessarily the Others. That doesn’t sound too bad. Maybe the North would be okay, keeping an eye on shambling monsters if their dread commanders could not pass the Wall.
But the Wall should still be manned. And Benjen’s quote underscores why.
While it stands, the dead cannot pass.
Don’t assume the Wall will always be there. It might fall, or be breached so dramatically that the army of undead wights, and the White Walkers, can pass through. In that case, you’d want to have first responders at the point of the breach. First responders who have some kind of training for just this event.
The current Night’s Watch don’t seem to be well trained for this type of warfare. For too many centuries, or millennia, the enemy has shifted away from being the Others to being the wildlings. (Maybe we see the role that Craster and wildlings like him played to facilitate this. There might have been a time in the earliest years of the Night’s Watch where Free Folk would support the rangers of the Watch, by reporting activities of the Others who had not gone dormant after the end of the Long Night. But over time, that changed.)
But unprepared or not, the Night’s Watch is the first line of defense if the Wall proves not up to the challenge posed by the Others. And so they need to be supported as an institution, and supported into the future, regardless if the Wall remains intact or not.
Okay, we’re something like ten days away from a new season. Will the Wall remain intact for Season Eight? We’ll soon find out.
(Comments are always welcome. Super welcome! But if you want to talk spoilery Game of Thrones talk with me (also welcome) I’d invite you to visit my Safe Spoilers page on my backup blog. That way my non-book-reading friends won’t be shocked with foreknowledge.)
Images from HBO’s Game of Thrones (obviously.)
I make no claim to the images, but some claims to the text. So there.
If you liked this article, thank you! I have all of my Game of Thrones related articles on my handy-dandy Game of Thrones page should you want to read more but don’t want to navigate around my site.
© Patrick Sponaugle 2017 Some Rights Reserved | {
"pile_set_name": "OpenWebText2"
} |
2012-04-15: I found it easier to work with signed URLs instead of a
separate header so the blog post was updated to use these.
I like to find new ways to use Ubuntu One as easily as possible. I have to
admit that the way described in headless Ubuntu One article is not quite
reliable since the file is read completely into the memory prior to being
transferred. For large files this can be a problem. There are ways to make this
work for streaming, but while investigating this I found out that we can use
curl for uploads and downloads, without any python wrapper.
But in order to make it work this way, you need just a tiny bit of preparation.
First of all, you must know that all Ubuntu One clients do not use your
password for authentication. Instead, a mechanism called OAuth is used. This means that
for every connected device a separate set of credentials is being assigned
allowing you to invalidate the access whenever you need and keep the really
secret password to yourself.
OAuth is not natively supported by curl but since this is a standard, there are
multiple solutions you can use to generate the signed URL as in the example,
there are no proprietary extensions or cookie storage.
First you need to get the tokens, we are using pretty much the same
ubuntuone-sso-login.py script I mentioned in the article about the REST client,
however in order to make it simpler to pass the arguments to other application,
i added the --format(-f) option, which does the following:
Please note that I am specifying Content-Type header too. Usually when you ask
curl to upload with --data-binary, it sets the Content-Type to
application/octet-stream. This is a mandatory header for Ubuntu One servers. In
case you omit the header, you will receive an error.
I have some SQL databases of text messages, expenses and a test openfire
installation. I upload the backup regularly to Ubuntu One with the following
simple script. I put the OAUTH exports to ~/.ubuntuone-credentials file which
gets sourced.
Once upon a time I had no stable internet connection, mult.ru distributed
their “Масяня” movies as .exe files and I was not happy with them on the linux
system.
In order to make a standalone movie, flashplayer.exe was simply concatenated
with .SWF file, so to get .SWF file I simply needed the offsets and
end markers (if any).
I wrote a simple application in C that was doing exactly this.
At some point in time my friend Alex asked me to see whether it is possible to
recover any data from his hard drive which had the file system table
completely overwritten by something and no data recovery software was able to
extract anything.
I dumped the image of the whole 20Gb drive and began thinking about the way
the data can be recovered if we don’t know where to look.
And so the nxtractor project was born. During next couple of days I was
examining the signatures and markers of the most common file types, wrote the
scanner that was sufficiently good and extensible.
I did not recover much information from that drive, the data was too
fragmented.
This was back in 2003.
Fast forward to today, when SD cards hold the same amount of data as the hard
drives of the past, data storage devices are used by music players, phones and
cameras.
Now imagine you have deleted all the photos from the camera. What would you
do?
Yes, that’s the ideal variant, in some cases you will need to do adjustments
to the types.dat file, for example to prevent false positives on TIFF files
you comment out the whole type=tiff block. To make sure you are not extracting
embedded data in JPEG files, set minsize in type=jpeg to 1000000 which means
that it will not consider files that are less than 1Mb to be real jpeg files.
For example, my recent removal of the photos resulted in the following:
I am doing this over and over again. Along with writing puppet config I am
posting the recipe for my WC3119 configuration here in case somebody finds it
useful too. I will describe the setup of Xerox WC3119 for remote printing and
scanning in Ubuntu Precise Pangolin (12.04).
I played with the software a bit and then decided to cancel the free trial
after 10 days. I had my PayPal account attached to my Live/XBox account so all
the charges originated there are automatically processed.
A good thing with Ukrainian banks is that when you sign up for an SMS banking,
you will get notifications about every transaction attempt. And, thanks to
proper mental state of the industry, there are no NSF fees, unlike some
parts of the world.
So I got a notification today at 2AM that there was a charge attempted. My
PayPal account is connected to a card I top up with the exact amount I plan to
spend, nothing more. And should I left some extra cash there I could have been
charged for £8.99 (I created the account while I was in the UK).
As a confirmation of the attempt I got the message from MSFT ZUNE:
We are contacting you because we have been unable to charge your PayPal
Account for your 1-month subscription service(s) being billed to you through
Microsoft Online Services. The following PayPal Account is the current
payment method on your billing account:
The site itself tells a different thing:
Try it free
The low risk way to try before you buy. Enjoy the full Zune Music Pass
benefits free for 14 days (Trial continues to paid subscription).**
...
** Free 14 day trial will automatically continue to a paid subscription
unless cancelled before the end of the trial period. Limit 1 trial per
person.
Once in a while I return to the idea to write something in Vala. Vala's
integration with Glib and Gnome is outstanding, you can write a useful DBus
client in 10 lines, compile and run at native code speed without any scripting
language interpreter overhead.
Ubuntu One filesync service exports a ton of DBus methods that are then used
for the Control Panel, nautilus plugin, rhythmbox music store plugin and
others. All the communication between the clients and the service on Ubuntu
is based on DBus.
So, let's make a client that asks syncdaemon for a list of all published
files and prints it out. Before we start, we need to find out what
methods and signals are actually exported.
I am running a few Ubuntu installations connected to the Internet. As you may
know, once machine is connected to the Internet, it is subject to various
hacking attempts, both automatic and manual.
The most widespread attack vector for *nix machines is SSH brute-forcing. I
once became a victim of such attack
and now all my machines are using SSH public key authentication only. I was
curious what passwords the attackers were using so I came up with a simple
idea of password collection.
As the old joke goes, “you cannot lose an android phone because it is always
near the power socket”. For me this is exactly what I am experiencing with my
Acer Liquid E. Whenever I am using it for browsing the Internet via WiFi or
3G, I can discharge it completely in 2 hours.
So right before we went on a bus trip to Norway I decided to find out what are
my options to get extended battery life for my phone.
Of course, there are high capacity battery for all normal phones.
Unfortunately, not an option for mine.
My wife is also using an Android-based HTC Desire Z, so charging different
devices is definitely a plus.
Also, we have cameras that take AA batteries and the ultimate choice would be
able to charge external batteries too.
So, your capacity basically depends on what batteries you chose. The unit I
purchased came with 4xAA batteries of 2700mAh. I purchased another set as a
backup.
It turned out that one set of these batteries can charge a phone and a half
completely. Also, we were able to charge 2 phones simultaneously using an USB
hub – pure awesomeness!
It is worth noting that when the unit functions as a USB charger from wall
outlet, it does not charge the batteries. When functioning as AA/AAA charger
it tracks every single battery charge separately.
The only minor issue I found so far is that when the batteries are almost
depleted the current converter starts producing a long squeaky sound until it
shuts down. | {
"pile_set_name": "Pile-CC"
} |
Arenarba
Arenarba is a genus of moths of the family Noctuidae.
Species
Arenarba destitute
References
Natural History Museum Lepidoptera genus database
Category:Acontiinae | {
"pile_set_name": "Wikipedia (en)"
} |
Today, stroke is a major public health issue with substantial social and financial impact. For several decades, experiments with rodent cerebral ischemia have provided important insights into the mechanisms of stroke and subsequent brain repair. To induce ischemia in rodents, middle cerebral artery occlusion (MCAO) suture model is commonly used, because it corresponds to the ischemic stroke in humans ([@R1],[@R2]). Cessation of glucose and oxygen supply leads to apoptotic and necrotic processes, which result in a breakdown of the blood-brain barrier and a consequent cerebral edema formation ([@R3]). Measuring the infarct volume and brain edema with different histological techniques, eg, triphenyltetrazolium chloride (TTC), hematoxylin-eosin, or Nissl, is widely accepted as suitable for animal ischemic stroke studies ([@R4],[@R5]). Today, such histological techniques are easily accessible; however, they are two-dimensional (2D), labor intensive, time consuming, and maybe associated with significant tissue shrinkage and geometric distortions ([@R6]). As a possible alternative, magnetic resonance imaging (MRI) and computed tomography (CT), both nondestructive imaging methods, allow more precise, less time-consuming lesion reconstructions with advantages of three-dimensional (3D) analysis and a possibility to scan the same animals at multiple time points after cerebral ischemia.
MRI is an excellent tool not only for in vivo measuring of the evolution of ischemic lesion, but also for the study of fixed tissue specimens due to soft tissue contrast, nondestructive nature, and ability to provide 3D images. However, high field small-bore MRI (microMRI) scanners are highly expensive and require a significant effort of specially trained operators.
In contrast to this, we used x-ray computed tomography, the widely available diagnostic tool in emergency units, to explore the possibility of visualization of the mouse brain ischemic lesions. Today, the use of x-ray microcomputed tomography (microCT) technology enables noninvasive, high-resolution, in vivo and ex vivo imaging. MicroCT is effective for bone imaging ([@R7],[@R8]), however soft tissue imaging requires the use of x-ray absorbing radiocontrast agents (RCA), due to small differences among the soft tissues in x-ray absorption ([@R6]). Although RCAs are routinely used in clinical radiography, only a few techniques are developed for imaging soft tissues of animal specimens: osmium staining of mouse embryos and honeybee brains, and reduced-silver nerve staining method for *Drosophila* brains ([@R9]-[@R11]). RCAs were shown to provide high-resolution microCT images of soft tissues, including the brain, with a contrast and spatial resolution comparable to microMRI scans ([@R6],[@R12]). In addition, microCT scanners have the advantage of being substantially cheaper, and easier to maintain, thus being more accessible to research laboratories compared to MRI scanners.
The aim of this study was to explore if microCT scanning represented a valuable method for assessment of ischemic lesion size following transient cerebral ischemia in mice. Using Omnipaque RCA, microCT measurement of ischemic lesion size and cerebral edema significantly correlated with values determined by Nissl staining of serial brain sections. MicroCT quantification proved to be a method for evaluation of brain lesion size following ischemia.
Materials and methods
=====================
All experiments were carried out on male inbred strain (C57Bl/6NCrl) mice (weight 22 ± 3 g). Age of the mice included in experiments was 2-4 months (young adults), as previously described ([@R13],[@R14]). Ten non-operated animals were used to detect RCA with better gray/white matter contrast, as well as to detect optimal RCA dilution. Ten operated animals (8 stroked +2 sham operated) were used for the assessment of lesion size and brain edema with both, microCT and Nissl staining methods, and the values obtained by the two methods were compared. All animal procedures were approved by the University of Zagreb School of Medicine Ethics Committee and are in accordance with the Ethical Codex of Croatian Society for Laboratory Animal Science. All animals were allowed *ad libitum* access to water and food before and after surgery.
Middle cerebral artery occlusion
--------------------------------
As previously described ([@R15],[@R16]), unilateral transient focal cerebral ischemia was induced by intraluminal filament occlusion of the middle cerebral artery during 1 hour, followed by reperfusion period of 24 hours. Briefly, animals (n = 10) were anesthetized with 2% isoflurane and surgical procedure was performed on heated surface in order to avoid hypothermia. One hour before and immediately after surgery, mice were injected with 1.0 mL 0.9% saline i.p. to prevent dehydration. After midline neck incision, left common, internal, and external carotid arteries were exposed. Silicon coated 6-0 monofilament (Doccol, Redlands, CA, USA) was inserted via external carotid artery into the internal carotid artery, and then into the circle of Willis, thus occluding middle cerebral artery. After an occlusion period of 60 minutes, the filament was removed, followed by 24-hour reperfusion period. Sham operated mice (n = 2) were operated identically as the MCAO, but the filament was incompletely inserted, in order to avoid occlusion of middle cerebral artery. Animals were monitored during surgery (heart rate and respiration), and treated with analgesics (buprenorphine \[solution concentration 0.03 mg/mL, dosage 0.05-0.1 mg/kg\] injections subcutaneously) right after surgery and after 12 hours in order to achieve postsurgical pain relief. Animals were able to eat and drink since food was softened with water, and water source was put low enough to be easily accessible. Animals were weighted before surgery and 24 hours after surgery.
MicroCT contrast agents for the brain immersion protocol
--------------------------------------------------------
The mice intended for imaging (n = 20) were anesthetized with intraperitoneal injection of 2.5% Avertin (Sigma Aldrich, St. Louis, MO, USA) and transcardially perfused with 30 mL of phosphate buffered saline (PBS), followed by 30 mL of PBS buffered 4% paraformaldehyde (PFA) (Sigma Aldrich). Brains were carefully dissected and postfixed overnight with 4% PFA at 4°C; the usual procedure for brain studies, as previously described ([@R14]).
Brains of non-operated animals (n = 10) were used for comparison of two different RCAs, in order to detect which one has better white/gray contrast. These brains were rinsed twice in PBS at room temperature and immersed in two different RCAs (n = 4/group): a low-osmolar, non-ionic iohexol monomer (Omnipaqe^®^, GE-HealthCare, Little Chalfont, UK) and a high-osmolar ionic contrast agent meglumine ioxithalamate monomer (Telebrix^®^, Guerbert, Roissy, France) for 5 days at room temperature, while two control brains were immersed in PBS. Series of different contrast dilutions 1:2 (final iodine concentration of 0.14 mol/dm^3^), 1:5 (0.28 mol/dm^3^), 1:10 (0.55 mol/dm^3^), and 1:20 (1.38 mol/dm^3^) diluted in PBS, were used for the experiment, as previously described ([@R6],[@R12]).
According to the results obtained from the comparison of two different RCAs, the chosen nonionic RCA, Omnipaque, (RCA with better white/gray contrast) diluted 1:2 in PBS (optimal dilution to achieve best gray/white contrast) was used to compare brains of MCAO (n = 8) and sham operated (n = 2) mice. The brains were immersed in Omnipaque for 5 days at room temperature before microCT imaging.
Micro CT imaging of brain ischemia
----------------------------------
After immersion in different contrast agents, brains were scanned using SkyScan 1076 µCT scanner (Bruker, Kontich, Belgium). Before scanning, brains were blotted dry to remove any traces of RCA, wrapped in plastic foil, and placed into sample holder of the microCT device tube. In order to test whether there was dehydration, brains were weighted before and after the scanning and no difference was observed (data not shown). Probably, due to short scan time (15 minutes) and normal temperature inside the machine (26°C), the plastic foil prevented brain dehydration and shrinkage. Images were obtained using 48 kV and 200 µA, which corresponds to 18 µm spatial resolution, and 0.6° rotation step throughout 198°, which gives 331 projection images. Beam hardening effect of the x-rays was minimized by applying a 0.5 mm aluminum filter, to equalize the energy of the emitted x-rays from the source. Noise reduction on the images was accomplished by setting the frame averaging to a value of 5.
Data obtained by microCT device were further reconstructed by SkyScan NRecon (Bruker) software employing a range of 0-0.07 on a histogram scale, ring artifact reduction with a value of 5, and a 31% beam-hardening correction. Reconstructed images were aligned with SkyScan DataViewer software (Bruker) to identically position each brain with concurrent saving of transaxial data set. The left and right hemisphere of the brain were determined as the region of interest (ROI) and saved as a separate data set for further analysis within SkyScan CTAn software (Bruker).
In order to reveal which RCA showed better gray/white matter contrast and to detect optimal RCA\'s dilution, for calculation of standard x-ray attenuation units (Hounsfield units, HU) a phantom object was used. For this purpose, polypropylene tube of 1.5 mL volume was filled with deionized water and scanned in the microCT device using the same parameters used for brain scanning ([@R6]). To calculate the mean density value of HU for the water phantom, CTAn software was used. A calibrated value of 26.6846 HU was further used to measure HU in mouse brains stained with different RCA and in different dilutions. ROI consisting of 10 slices was analyzed in each white matter (corpus callosum) and gray matter (cortex), and HU were calculated and then plotted against I~2~ concentrations of the contrast agent.
Volumes of the lesion and hemispheres were manually traced with the same software, generated and calculated by interpolation across relevant slices within the reference range. High resolution 3D reconstruction imaging and analysis of the entire mouse brain with reconstruction of the ischemic lesion inside the ipsilateral infracted hemisphere was performed.
Nissl staining
--------------
After microCT scanning, mouse brains were placed into 30% sucrose for dehydration and cryoprotection. After 3 days, brains were embedded in Tissue-Tek (O.C.T. compound, Sakura, Torrance, CA, USA), frozen-cut into 35 μm-thick coronal sections using cryostat, and stored at -20°C. Every sixth section was used for Nissl staining procedure. Sections were fixed in 100% methanol for 10 minutes, and further rehydrated in a series of decreasing alcohol baths (95% ethyl alcohol \[EtOH\] 15 min, 70% EtOH 2 min, and 50% EtOH 2 min), rinsed twice in distilled water for 2 min and stained with Cresyl Violet stain for 6 minž. After staining, sections were rinsed twice in water for 2 min and afterwards dehydrated in a series of increasing alcohol baths (50% EtOH 2 min, 70% acidic EtOH \[1% glacial acetic acid in 70% EtOH\] 2 min, 95% EtOH 2 min, 95% EtOH a few dips, and 100% EtOH 1 min). To lighten the sections, Histoclear (Invitrogen, Carlsbad, CA, USA) was applied for 5 minutes, after which slides were coverslipped with Histomount mounting media (Invitrogen). Slides were dried overnight and digitized using a Flatbed Epson perfection 4870 photo scanner (Epson America, Inc., Long Beach, CA, USA), with a resolution of 4800 dpi.
Images were analyzed using ImageJ 1.45 software (NIH, Bethesda, MD, USA). Lesion and hemisphere areas were manually traced on individual sections throughout the brain. Lesion volume was calculated by multiplying surface of all traced areas by the sum of the section thicknesses plus the intersection distances.
Immunohistochemistry
--------------------
For fluorescent immunohistochemistry, cryostat 35 µm-thick coronal sections (prepared from the same brains as above) were rinsed in PBS 4 times for 5 minutes in order to remove the O.C.T. compound. Sections were blocked for 30 minutes in PBS containing 10% goat serum and 0.25% Triton X-100. Incubation with anti-NeuN (Millipore, Billerica, MA, USA) primary antibody (mouse monoclonal, 1:300 dilution) was performed overnight at room temperature in PBS buffer containing 1% goat serum and 0.25% Triton X-100 (both Sigma Aldrich). Control slices were incubated overnight in a buffer that was not containing primary antibody. Slices were rinsed with PBS containing 0.25% Triton X-100 4 times for 5 minutes. Next, slices were incubated for 2 hours at room temperature in goat anti-mouse Alexa 488 secondary antibody (Invitrogen) at 1:500 dilution. After incubation, slides were washed with PBS containing TritonX-100, mounted with Fluoromount Aqueous Mounting Medium (Sigma Aldrich), coverslipped, and left overnight to dry. Brain sections were examined under a fluorescence microscope and photographed under 20 × magnification on both, ipsilateral (ischemic) and contralateral side.
Quantification and statistical analysis
---------------------------------------
As previously described ([@R17]), ischemic lesion volumes were measured indirectly by subtracting the volume of nonischemic (healthy) tissue of the ipsilateral (ischemic) hemisphere from the total volume of contralateral (healthy) hemisphere. Brain edema approximation was expressed as percent increase of ischemic ipsilateral hemisphere volumetric size with respect to contralateral (non-ischemic) hemisphere ([@R18]). Since we isolated the brains 24 hours after MCAO, edema quantified here presented mainly vasogenic brain edema. All quantifications were performed by two independent "blinded" individuals in order to reduce bias. After quantification, linear regression analysis was performed in order to compare lesion volumes and brain edema obtained by microCT device with volumes measured on histological sections (GraphPad Prism 5.00a, GraphPad Software Inc., San Diego CA, USA).
Results
=======
To select either non-ionic or ionic RCAs (Omnipaque and Telebrix) for *ex-vivo* brain imaging, we compared microCT acquisition signals of mouse brains immersed in contrast agents at different iodine concentrations. Brains immersed in PBS served as a negative control for contrasting and showed a weak signal, with no soft tissue contrast ([Figure 1A](#F1){ref-type="fig"}). Application of two different RCAs resulted in different signal intensities between gray and white matter depending on the concentration of iodine ions ([Figure 1A](#F1){ref-type="fig"}). Both, Omnipaque and Telebrix diluted 1:2 with PBS at the same iodine concentration showed the best gray/white matter contrast signal. For 1:2 dilution of Omnipaque, the gray/white matter signal difference was 460 HU, while for Telebrix it was 89 HU ([Figure 1B and C](#F1){ref-type="fig"}). Since non-ionic RCA Omnipaque showed better gray/white matter contrast, allowing the appropriate visibility of morphological features of the brain, it was chosen for all further experiments.
{#F1}
In order to verify whether microCT is a valid method for visualization of brain ischemic lesions, we compared microCT images with appropriate Nissl stained brain sections of sham operated ([Figure 2A, C, and E](#F2){ref-type="fig"}) and MCAO operated mice ([Figure 2B, D, and F](#F2){ref-type="fig"}). In order to enhance visualization of minor morphological details on microCT images, we changed the color scale visualization from grayscale to color scale 1 available in the CTAn software, which facilitated the detection of the lesion area ([Figure 2C and D](#F2){ref-type="fig"}). microCT images and Nissl stained sections of sham operated mice showed no difference in morphology between the two brain hemispheres ([Figure 2A, C, and E](#F2){ref-type="fig"}). In contrast, images of lesioned brains revealed difference in morphology between ischemic and non-ischemic areas ([Figure 2B, D, and F](#F2){ref-type="fig"}). The area of ischemic lesion was presented on microCT imaging as an area with higher signal intensity, with clear delineation of the ischemic area from the surrounding healthy tissue ([Figure 2B and D](#F2){ref-type="fig"}). The line marked on microCT images was almost identical to the one marked on Nissl stained sections ([Figure 2B, D, and F](#F2){ref-type="fig"}). These results showed that microCT imaging with the use of nonionic contrast agent (Omnipaque) served as a valuable method for detection and visualization of ischemic lesions, with similar sensitivity to the one of traditional methods such as Nissl staining ([Figure 2D and F](#F2){ref-type="fig"}).
{#F2}
To detect if the lesion volume quantification analysis performed by microCT imaging was comparable to those obtained by standard histological methods such as Nissl staining, we performed the two analyses, microCT and subsequently Nissl staining of serial histological sections on the same brains. The linear regression analysis of lesion volumes quantified by microCT and by Nissl stained sections showed a significant correlation between the two data sets (r^2^ = 0.884, *P* = 0.0005) ([Figure 3A](#F3){ref-type="fig"}). The percent of brain edema (ie, increase in the hemisphere size of the ipsilateral \[ischemic\] hemisphere, quantified as percent of undamaged contralateral hemisphere) for the microCT and histology (Nissl stained) data sets also showed a significant correlation (r^2^ = 0.916, *P* = 0.0002) ([Figure 3B](#F3){ref-type="fig"}). These results suggested that microCT was a valid method for ischemic lesion volume quantification and cerebral edema estimation.
{#F3}
Furthermore, in order to verify the microCT advantages over standard histological methods, a three-dimensional imaging of brains that underwent MCAO procedure was performed. MicroCT was proved to be a valuable tool for three-dimensional imaging, enabling high-resolution reconstruction of the entire mouse brain and volumetric analysis of the ischemic lesion inside the infarcted hemisphere ([Figure 4](#F4){ref-type="fig"}, supplementary video)[(web extra material 1)](#S1){ref-type="supplementary-material"}.
{#F4}
In order to verify if brains immersed in Omnipaque RCA may be used for other investigations, such as immunofluorescent analyses, after microCT imaging we used antibody against neuronal nuclei, anti-NeuN, one of the most commonly used antibodies for the brain. The advantage of this antibody is that a loss of NeuN immunoreactivity occurs after onset of brain ischemia ([@R19],[@R20]). A clear decrease in NeuN signal following ischemic injury ([Figure 5A](#F5){ref-type="fig"}) compared to the contralateral side ([Figure 5B](#F5){ref-type="fig"}), was observed. The same contrast in NeuN immunoreactivity between lesioned and unaffected brain tissue was also present before the immersion in Omnipaque RCA ([Figure 5C and D](#F5){ref-type="fig"}), demonstrating that Omnipaque RCA did not affect the original tissue immunoreactivity.
{#F5}
Discussion
==========
In preclinical trials on animal models of stroke there is a constant need for an appropriate imaging method and quantification of lesion volumes in order to reveal even the minor therapeutical effects of potential neuroprotective drugs. The ideal tool for quantification and delineation of ischemic lesions should be rapid, noninvasive, and cost-effective, allowing direct measurement of ischemic lesion volumes. This study showed that microCT can be used in this context as a reliable tool for visualization and quantification of brain ischemic lesions in the mouse.
Previously reported x-ray contrasting methods highlighted the value of microCT for imaging rabbit and mouse brains, confirming the applicability of contrast stains for imaging of different soft tissues ([@R6],[@R12]). In contrast to the previously reported use of ionic contrast agents, in our study the use of non-ionic Omnipaque contrast agent resulted in better-contrasted signal, providing appropriate morphological information. The use of contrast stains for the visualization of ischemic lesion was possible, because of the loss of gray/white matter borders and an overall increase in tissue water content, which reduced attenuation due to the brain edema after brain ischemia ([@R21]). Density changes on microCT images depended upon local densities of electrons and higher iodine concentrations in the infarcted lesion area (due to the formed edema). The suggested mechanisms enabled to delineate the ischemic lesion from the surrounding non-infarcted brain tissue.
The visualization of brain ischemic lesion by microCT was verified by Nissl staining of serial sections of the same brains. Nissl staining method offered the necessary precision to analyze the lesion, showing the metabolically compromised cellular elements as poorly stained ([@R5],[@R22]). MicroCT enabled a high-resolution reconstruction of the entire mouse brain and volumetric analysis of both hemispheres. The results of microCT correlated significantly to those obtained by Nissl-staining method, with the advantage of microCT being that it avoids shrinkage during specimen preparation and complicated 3D reconstruction from section to section.
Quantification of cerebral edema is considered an important tool in assessing the stroke consequences ([@R23]). Various vasoactive compounds can modulate the extent of cerebral edema, and in that way, they may change the pathophysiological cascade following stroke and have either beneficial or detrimental effects on the recovery processes following ischemic lesion ([@R24]). In our study, we showed that microCT could be used for the assessment of cerebral edema, as verified by comparison to histological analysis using Nissl staining.
The immersion in RCA was necessary for microCT analysis; still the same ex vivo brain specimen was used for further immunohistochemistry investigations, not only for the classical method of Nissl staining. This is very important for reducing the number of animals used for the experiments. The future application of different antibodies should further test whether RCAs affect original tissue immunoreactivity.
Although the same conclusions could be drawn from microCT imaging and traditional histology, it is important to mention that microCT allowed measurement without destructing the specimens, allowing rapid identification and quantification of the ischemic lesion and reducing the time spent on histology. This all makes microCT a powerful tool for easy, rapid, noninvasive, and cost-effective imaging of the mouse brain ischemic lesions.
**Acknowledgment** We thank Assistant Prof. Aleksandra Sinđić for scientific input, technical assistance, and support. We also thank Assist. Prof. Dinko Mitrečić for scientific input and support.
Funding This study was financed by Unity through Knowledge Fund project (UKF 35/08); Croatian Science Foundation grant (HRZZ 02.05/40); and the Ministry of Science, Education and Sports grant (108-1081870-1902).
Ethical approval All animal procedures were approved by the University of Zagreb School of Medicine Ethical Committee and are in accordance with the Ethical Codex of Croatian Society for Laboratory Animal Science.
Authorship declarations MD contributed to the design of the experiments and writing of the manuscript; performed middle cerebral artery occlusion, microCT imaging, and immunohistochemistry. IB performed Nissl staining, statistical analysis, and contributed to writing of the manuscript. IE performed microCT imaging and contributed to writing of the manuscript. DG performed middle cerebral artery occlusion. SG contributed to study design, writing of the manuscript, organization of financial support.
Competing interests SG is the editor-in-chief, and IB and DG are editor's assistants in the *Croatian Medical Journal*. To ensure that any possible conflict of interest relevant to the journal has been addressed, this article was reviewed according to best practice guidelines of international editorial organizations. All authors have completed the Unified Competing Interest form at *[www.icmje.org/coi_disclosure.pdf](http://www.icmje.org/coi_disclosure.pdf)* (available on request from the corresponding author) and declare: no support from any organization for the submitted work; no financial relationships with any organizations that might have an interest in the submitted work in the previous 3 years; no other relationships or activities that could appear to have influenced the submitted work.
Additional Material
===================
###### Supplementary video
| {
"pile_set_name": "PubMed Central"
} |
Eriel Deranger belongs to the Athabasca Chipewyan First Nation of Alberta. (All photos by Rucha Chitnis)
Only you can help sustain grassroots, groundbreaking journalism. Join the thousands of readers who support Truthout: Click here to make a donation!
In her essay “There Is No Hierarchy of Oppressions,” black lesbian feminist poet Audre Lorde wrote: “I have learned that oppression and the intolerance of difference come in all shapes and sizes and colors and sexualities; and that among those of us who share the goals of liberation and a workable future for our children, there can be no hierarchies of oppression.”
Around the world, women’s movements have long recognized the wisdom of that thought, which emphasizes the way social movements benefit by recognizing the intersections between different forms of oppression. In their letter “Women for Women in Ferguson,” the National Domestic Workers Alliance — a network of organizations representing nannies, home care workers, and housekeepers — stood in solidarity with the women of Ferguson, Missouri, who were affected by police brutality.
“As domestic workers, as women, we know that dignity is everyone’s issue and justice is everyone’s hope,” the letter reads. “We organize to create a world where every single one of us, domestic workers, black teens, immigrant children, aging grandparents — all of us — are treated with respect and dignity.”
In the face of growing corporate power, land grabs, economic injustice, and climate change, women’s movements offer a paradigm shift. They have redefined leadership and development models, connected the dots between issues and oppression, prioritized collective power and movement-building, and critically examined how issues of gender, race, caste, class, sexuality, and ability disproportionately exclude and marginalize.
“People of color within LGBTQ movements; girls of color in the fight against the school-to-prison pipeline; women within immigration movements; trans women within feminist movements; and people with disabilities fighting police abuse — all face vulnerabilities that reflect the intersections of racism, sexism, class oppression, transphobia, ableism, and more,” wrote Dr. Kimberlé Crenshaw, executive director of the African American Policy Forum, in a recent opinion piece. “Intersectionality has given many advocates a way to frame their circumstances and to fight for their visibility and inclusion.”
Women of color have unleashed powerful media campaigns and actions by connecting identity and its relationship with structural racism and institutional power. #DalitWomenFight, a powerful media initiative, links sexual violence faced by Dalit women with the deeply entrenched and institutionalized structure of caste in India. And in the United States, evocative actions taken by the #SayHerName campaign highlight how police brutality disproportionately affects black women.
Whether it is indigenous women in the Amazon fighting corporate polluters and climate change or undocumented Latina domestic workers advocating for worker rights and dignity in California, women’s groups and networks are making links between unbridled capitalism, violence, and the erosion of human rights and destruction of the Earth.
Here are just a few stories that show how they’ve done this.
Flipping the Script
To mark this year’s International Women’s Day, the women’s wing of La Via Campesina — an international movement uniting millions of peasants, small producers, landless farmers, and indigenous communities — is calling for action against capitalist violence all over the world.
“Capitalist violence is not only the violence that is directly inflicted upon women; it is also an integral part of a social context of exploitation and dispossession that is characterized by the historical oppression and violation of the basic rights of women peasants, farmers, and farmworkers, landless women, indigenous women, and black women,” notes the organization.
Dayamani Barla, a tribal journalist from Jharkhand, India, would agree. Barla led a powerful movement to stop the world’s largest steel company, ArcelorMittal, from displacing thousands of indigenous farming communities. Barla’s struggles are rooted in cultural survival as big dams, mining, and extractive industries have displaced, dispossessed, and impoverished millions of tribal people across India. Barla firmly believes that territorial sovereignty is key for achieving food sovereignty. “Globalization, in fact, has given rise to a kind of fascism,” she notes.
Barla has flipped the script on traditional models of “development” by defining it from an indigenous worldview. “We are not anti-development,” she said. “We want development, but not at our cost. We want development of our identity and our history. We want that every person should get equal education and healthy life. We want polluted rivers to be pollution free. We want wastelands to be turned green. We want that everyone should get pure air, water, and food. This is our model of development.”
In 2012, Barla was jailed for leading a protest that created a roadblock and since her release has faced ongoing legal hurdles and threats for her fight against land grabs. These threats are emblematic of increasing criminalization and repression facing women human-rights defenders today.
In 2013, pastoral Maasai women braved violence and threats to stop a land grab east of the famed Serengeti National Park in Loliondo. These land struggles have catalyzed women’s leadership in the traditionally male-dominated Maasai community and illuminated the vital role women play in protecting Maasai culture and identity.
“We are building unity among indigenous women,” said Siketo, an elder Maasai woman, in a 2014 interview in Tanzania. “Without unity, we cannot fight and we need to learn from struggles of other communities.” The Pastoral Women’s Council, an organization led by Maasai women, is building the leadership of women in the Loliondo land struggles and advocating for the education and economic empowerment of girls and women in their community.
Women’s movements are also bringing to the forefront that which is alarmingly invisible: women’s paid and unpaid labor as caregivers, farmers, domestic workers, natural resource managers, and human rights defenders.
Mujeres Unidas y Activas (MUA), a grassroots organization of Latina immigrant women in the San Francisco Bay Area, has a dual mission of promoting personal transformation and building community power for social and economic justice. In 2013, MUA members played a key role in the passage of the historic California Domestic Worker Bill of Rights. Immigrant women of color are a large portion of domestic workers, who risk exploitation, racism, and poor working conditions. Katie Joaquin, campaign director of the California Domestic Workers Coalition, views this as an international struggle that is critical for the leadership of women.
MUA’s approach epitomizes how an organization can connect the dots between issues and movements — from winning justice for domestic workers to fighting for immigration reform and ending deportations to interacting with global grassroots social justice movements.
Audre Lorde concluded her essay by expressing a sentiment that would resonate with MUA members: “I cannot afford to choose between the fronts upon which I must battle these forces of discrimination, wherever they appear to destroy me. And when they appear to destroy me, it will not be long before they appear to destroy you.”
Sandy Saeturn is a community organizer at the Asian Pacific Environmental Network, who arrived in the United States when she was three months old. She was born in a refugee camp in Thailand after her family fled war and violence in Laos. “I grew up in the North Richmond housing projects. I could see the Chevron refinery from my elementary school playground,” she says. There are nearly 350 toxic sites in Richmond, California, making this city a frontline battleground for environmental and racial justice. “Over time, my uncle, aunts, grandparents have died from respiratory issues and cancer. People in their 30s and 40s were passing away from cancer, and no one was talking about this in my community. When I was 14, members of APEN shared with us about the environmental and health impact of chemical companies in Richmond, and I realized that this was unjust.” Sandy has now worked with APEN for more than 15 years, raising awareness on environmental justice issues in her Laotian community and working as a youth advocate.
Tribal journalist and movement leader, Dayamani Barla, is on the frontline of land struggles in Jharkhand, India. Dayamani believes that displacement of indigenous communities in Jharkhand is akin to cultural annihilation and has advocated for sustainable development models that integrate indigenous worldviews and knowledge systems. “Our perspective is to make livelihoods as the basis of indigenous people’s culture. This is to sculpt a new model of development, which has a scientific thinking like the indigenous lifestyle and the technology should work in harmony and cooperation with nature. The thinking should not be just to take away from nature,” she notes.
Women and girls are much more vulnerable to disasters than men are. The aftermath of Nepal’s earthquake last year was devastating for women in many ways. In the face of disproportionate impact, trailblazing women’s rights advocate and peace activist, Rita Thapa, underscores the crucial leadership of Nepali women in earthquake recovery and rebuilding efforts. “Women hold their communities together, and it was no different after the earthquake in Nepal. The remarkable thing to learn was that long-term recovery work of lives and the planet Earth can be done with little display of money or power. The strengths women carry—feeding the young, old, sick; engaging in pending field work or housework, caring for the sick, and picking up the rubble (literally) is all it takes to slowly allow the affected to recover and heal. Everyone can learn from this—caring for one another and the planet Earth is not rocket science. A leadership that runs deep with compassion, care, and respect, and one that can build back confidence and hope is all it takes,” she shared.
Maasai women have been on the frontlines of land struggles in Loliondo, Tanzania. Maasai pride and identity is deeply interwoven with a pastoral life and worldview. “Land and cattle are life,” shared one Maasai woman in Loliondo in 2014. Standing shoulder to shoulder with men in their communities, Maasai women have bravely resisted land evictions stemming from the Tanzanian government’s plans to create a wildlife corridor; women also shared their concern over pastoral land that was acquired by private and luxury hunting and tourism companies. “Money has created a lot of problems in this world. Land can be bought and sold like cattle,” sang Maasai women in a song about land struggles.
Lidia Salazar, of Mexican descent, works with queer and trans survivors of violence through her work with Community United Against Violence, one of the oldest LGBT anti-violence groups in the San Francisco Bay Area. “As women of color, it’s hard to have our voices heard in the LGBT movement because a lot of marginalized people’s issues are not reflected in the [movement]. We celebrated a victory for marriage equality but that has nothing to do with real issues that queer and trans people of color face, which is lack of housing and disproportionate violence our communities face that is underreported. We can’t rely on the police to take care of our communities. It’s up to us to figure out how to keep our communities safe and how to heal through the violence we experience because of society’s denial of racism, homophobia, and transphobia,” she said.
Mujeres Unidas y Activas (MUA) builds the leadership of immigrant Latina women through personal transformation workshops and political awakening and rights-based trainings. MUA believes that immigrant women are leaders from the moment they come through the organization’s doors. “Economic justice is important to have freedom and dignity in life. Women need to support their basic needs and also have self-determination. We now have women stepping into leadership roles [after the trainings]. That is tied to their process of healing and developing personal and collective strength,” said Katie Joaquin, Campaign Director of the California Domestic Workers Coalition.
Eriel Deranger belongs to the Athabasca Chipewyan First Nation of Alberta, Canada, and has emerged as a powerful voice against tar sands, the world’s largest industrial project. Deranger is a tireless advocate for the rights of the First Peoples of Canada, raising awareness of the impact of tar sands on the culture, health, and sacred lands of indigenous communities. “Colonization came with the imposition of patriarchy. The real power of our communities came from our women as we were matriarchal societies. Our women today are reclaiming our roles as leaders of our community, as part of this resurgence of our people, not just in the climate movement but in all of the different movements to reclaim our indigeneity,” she said. | {
"pile_set_name": "OpenWebText2"
} |
from gui.prototypes.newskinmodule import NewSkinModule, SkinProxy
from gui.uberwidgets.UberButton import UberButton
from gui.skin.skinobjects import Margins, SkinColor
from gui.prototypes.fontdropdown import FontDropDown
import wx
from cgui import SimplePanel
from util.primitives.funcs import do
ToolBarSkinDefaults = {
'padding' : lambda: wx.Point(2,2),
'margins' : lambda: Margins([2,2,2,2]),
'background' : lambda: SkinColor(wx.SystemSettings_GetColour(wx.SYS_COLOUR_3DFACE)),
'buttonskin' : lambda: None,
'menuskin' : lambda: None,
}
class ToolBar(SimplePanel, NewSkinModule):
def __init__(self, parent, id = wx.ID_ANY, skinkey = None, name = 'ToolBar', alignment = None):
SimplePanel.__init__(self, parent, wx.FULL_REPAINT_ON_RESIZE)
self.children = []
self.content = wx.BoxSizer(wx.HORIZONTAL)
self.Sizer = Margins().Sizer(self.content)
self.SetSkinKey(skinkey, ToolBarSkinDefaults)
self.Bind(wx.EVT_PAINT, self.OnPaint)
def Insert(self, pos, object, expand = False):
skin = self.skinTB
#TODO: This is stupid, should be done some other way
if isinstance(object, UberButton):
object.SetSkinKey(skin['buttonskin'], True)
if object.menu is not None:
object.menu.SetSkinKey(skin["menuskin"])
elif isinstance(object, FontDropDown):
object.SetSkinKey(skin['buttonskin'])
object.SetMenuSkinKey(skin["menuskin"])
self.content.Insert(pos, object, expand, wx.RIGHT | wx.EXPAND, self.skinTB['padding'].x)
self.children.insert(pos, object)
def Add(self, object, expand = False):
skin = self.skinTB
#TODO: Still stupid, see Insert
if isinstance(object, UberButton):
object.SetSkinKey(skin['buttonskin'], True)
if object.menu is not None:
object.menu.SetSkinKey(skin["menuskin"])
elif isinstance(object, FontDropDown):
object.SetSkinKey(skin['buttonskin'])
object.SetMenuSkinKey(skin["menuskin"])
self.content.Add(object, expand, wx.RIGHT | wx.EXPAND, self.skinTB['padding'].x)
self.children.append(object)
def Detach(self, object):
return self.content.Detach(object)
def AddMany(self, objects, expand = False):
for object in objects:
self.Add(object, expand)
def DoUpdateSkin(self, skin):
self.skinTB = skin
self.Sizer.SetMargins(skin['margins'])
#Even stupider; see Add and Insert
do(item.SetSkinKey(skin["buttonskin"]) for item in self.children if isinstance(item, (UberButton, FontDropDown)))
for item in self.children:
if isinstance(item, UberButton) and item.menu is not None:
item.menu.SetSkinKey(skin["menuskin"])
elif isinstance(item, FontDropDown):
item.SetMenuSkinKey(skin["menuskin"])
for child in self.content.Children:
child.SetBorder(skin["padding"].x)
def GetSkinProxy(self):
return self.skinTB if hasattr(self, 'skinTB') else None
def OnPaint(self, event):
dc = wx.AutoBufferedPaintDC(self)
rect = wx.RectS(self.Size)
self.skinTB['background'].Draw(dc, rect)
self.OnPaintMore(dc)
def OnPaintMore(self, dc):
pass
class SkinnedToolBar(ToolBar):
'''
given an indirect_skinkey, looksup the correct toolbar skin on creation and
on UpdateSkin.
'''
def __init__(self, *a, **k):
from gui.uberwidgets.formattedinput2.formattingbar import FormattingBarSkinDefaults
skinkey = k.pop('indirect_skinkey')
k['skinkey'] = None
ToolBar.__init__(self, *a, **k)
self.SetSkinKey(skinkey, FormattingBarSkinDefaults)
def DoUpdateSkin(self, skin):
self.skinTTB = skin
ToolBar.DoUpdateSkin(self, SkinProxy(skin['toolbarskin'], ToolBarSkinDefaults))
def GetSkinProxy(self):
return self.skinTTB if hasattr(self, 'skinTTB') else None
| {
"pile_set_name": "Github"
} |
The number one liberal weekly website quotes figures suggesting that the Hungarian economy only began to grapple with the virus emergency in March.
HVG.hupublishes a series of statistics on how European countries fared in March as the coronavirus pandemic began. The figures show that Hungary was only moderately hit in the first month of the virus emergency. Car sales dropped by 85 per cent in Italy, for instance (on a year on year basis), but the European average was also over 50%. Hungary’s car sales only dropped by 10 per cent. The April figures will be much more negative, the authors add. Meanwhile, the number of coronavirus victims is now over 200, while more than 2000 people have tested positive for the virus. The Prime Minister expects the epidemic to peak during the first week of May. HVG also observes changes in peoples’ habits that might become long-term patterns of behaviour. Delivery companies are flourishing, as people follow the advice of the authorities to stay at home, and they may get accustomed to ordering products through the internet rather than strolling through the shops. Another such novelty is that cash has all but disappeared from commercial exchanges, HVG reports. | {
"pile_set_name": "Pile-CC"
} |
Product Description
▼▲
The Oxford Dictionary of Christian Art and Architecture explains a wide range of terms used in the study of the history of Christian art and architecture including subjects, topics, themes, artists, works, movements, and buildings. This long-awaited new edition of Peter and Linda Murray's classic text continues to provide an invaluable, authoritative, and engaging guide to interpreting Christian art both for students and teachers of the subject, as well as non-specialists and those without a formal education in Christianity.
Publisher's Description
▼▲
The Oxford Dictionary of Christian Art and Architecture explains a wide range of terms used in the study of the history of Christian art and architecture including subjects, topics, themes, artists, works, movements, and buildings. This long-awaited new edition of Peter and Linda Murray's classic text continues to provide an invaluable, authoritative, and engaging guide to interpreting Christian art both for students and teachers of the subject, as well as non-specialists and those without a formal education in Christianity.
The new editor, the Reverend Tom Devonshire Jones, has been aided by over a dozen expert contributors, fully updating the text for the new century. Areas that have been expanded upon include the artwork, artists, and innovations of the 19th, 20th, and 21st centuries (such as the relationship between Christianity and film). Coverage includes art from around the world, with new entries upon the Christian art of North America, Latin America, Australia, and of the non-Western world, as well as Christian artistic interactions with other religions, including Judaism and Islam.
The detailed bibliography has been heavily revised and updated, increasing the number of sources cited and expanding on sources relevant to the study of non-traditional Christian art. The updated bibliography will be placed on a companion webpage to the Dictionary, which will also feature an appendix of web links to sites of relevant interest.
Author Bio
▼▲
The late Peter Murray FSA and Linda Murray FSA were well-known art historians with over 30 years' teaching experience, and several books written in collaboration, as well as those written independently. Peter Murray was Professor of the History of Art at Birkbeck College, in the University of London, from 1967 until his retirement in 1980. Linda Murray taught art history in the University of London Extra-Mural Department from 1949 to 1979.
Tom Devonshire Jones studied Classics and Theology at Oxford, always with an eye on the art of Antiquity and Christianity. Since ordination in the Church of England in 1960 the interactions of art and religion have been a significant focus of his parish and campus ministries in England and the United States. He is the founder of Art and Christianity Enquiry (acetrust.org), and he is married and lives in London. | {
"pile_set_name": "Pile-CC"
} |
Thursday, May 19, 2011
Instinctively Recognize Open Intelligence
Go directly to the pure lucidity of open intelligence again and again, until you recognize its obviousness at all times. Identify open intelligence! Recognize yourself; that is the first key point: Instinctively recognize open intelligence. Recognize potent open intelligence—the power source of beneficial mind, speech, body, qualities and activities | {
"pile_set_name": "Pile-CC"
} |
Workout Wednesday: Week 6
For once, I got through a #WorkoutWednesday challenge without too many mental or physical scars. However, there was still a lot I took away from the exercise, so here’s a quick overview of those learnings:
Data Preparation
The data needed to be unioned, pivoted and tidied up. Unioning in Tableau is simple. I just highlighted the Male and Female tables and dragged them into the blank window:
Once in situ, I enabled the Data Interpreter to sort out the headers:
This slideshow requires JavaScript.
Next, I just pivoted the Year columns to make the short / wide format long / tall instead, hid / renamed a few fields, and applied the data source filters required:
Referring to Emma‘s original, I could see that the standard trellis-type calcs could be reused:
So the first real challenge was working out how to plot the data. I started with table calcs and putting Gender on Detail, but that was a false dawn. Ultimately, I needed to calculate the Male and Female Population Estimates, calculate those as a percentage of total, and then find a way to figure out the national average for each Gender. It’s pretty straightforward stuff. The Male calculations are below:
If I plotted that on the view, I got this:
But I knew that I wanted the Male values to head right-to-left, and the Female values to head in the opposite direction. I experimented with shoving a “-” in front of the calcs, but there is a much more obvious solution. Right-click the x-axis > Edit Axis > tick “Reversed”:
I could then put the Female equivalent on the canvas:
That image is with the [Male] calc prefixed with a “-“. This isn’t what I needed to do, as it meant that I couldn’t plot the National Averages as continuous lines to give these values context. The closest I could get was a Gantt effect using cell level Reference Lines, but that wasn’t what was required:
What was needed, was a dual-axis of bar and line for the Male measures, alongside the same for the Female measures. Before progressing, I needed to figure out a way to get the national averages per gender:
This gives the National Average by Year, Age Group and Gender.
Whereas the above calc computes the Male National Average. To determine the percentage:
As I often do, I checked the calculations out in a tabular format in Tableau:
And sense-checked things in Excel:
Cool. Once I was comfortable, I could plot things accordingly, with the Row and Column Dividers simply computing by Year:
But it looked a bit dull. I’d already grouped the age groups into decades to avoid the cluttered look of the original, and I’d see that Andy Kriebel had used colour to highlight where measures were above or below the national average, so I nicked his idea:
Sticking that on the Colour card for bars (and the equivalent calc for the Female dual-axis), allowed me to better highlight Age Groups where the Gender was above or below the national average: | {
"pile_set_name": "Pile-CC"
} |
Jack Dorsey is assembling an independent team to build an open, decentralized protocol for future social media platforms.
Somebody needs to remind him that he can’t control human nature.
Give credit where credit is due, but don’t buy into the hype just yet.
Jack Dorsey has long been the black sheep of the tech elite. Where others coalesce and jockey for power, he carves out his own path. Or so it seems. The entrepreneur’s latest bold brash idea involves disrupting the very micro-blogging platform that’s made him rich and famous.
According to a Wednesday morning Twitter thread, Dorsey is assembling a crack team of engineers, architects, and designers (designated @bluesky) which will *drumroll* build an open and decentralized protocol for social media of the future:
Twitter has roughly 4,600 employees but Dorsey hopes to achieve this rather ambitious feat with a mere five groundbreaking mortals:
For social media, we’d like this team to either find an existing decentralized standard they can help move forward, or failing that, create one from scratch. That’s the only direction we at Twitter, Inc. will provide.
Yes But Technology Won’t Change Human Nature
Dorsey clearly gets much of his inspiration from Bitcoin, that bellwether decentralized project he continues to passionately promote. What he fails to realize, though, is that no amount of technological innovation will ever change human nature.
Take for example this particular Tweet In Dorsey’s 14-point Tweetstorm:
…existing social media incentives frequently lead to attention being focused on content and conversation that sparks controversy and outrage, rather than conversation which informs and promotes health.
So far it has garnered the most amount of likes. As much as we all love to rage on social media behemoths for their cringe-worthy addiction algorithms, nobody wants to admit that we just flipping love the drama they provide.
Somebody should inform Jack, and a number of his fellow Silicon Valley types, that the next fad, even a decentralized one, won’t change that. Until the majority of eyeballs are willing to consume more ‘wholesome’ topics, don’t expect anything to change.
The fact is that drama draws eyeballs. And if Twitter isn’t going to provide an outlet for it, people will simply take their micro-dramas elsewhere.
Give Credit Where Credit Is Due
To be fair, Jack’s decentralized vision is definitely a breath of fresh air in an industry filled with stuffy billionaires. Perhaps that’s why Twitter’s third-quarter earnings stunk. And perhaps he actually cares about the community and not just the bottom line, after all?
If his vision ever comes true, I will happy concede defeat. But in the meantime, I’m going to back humanity’s never-ending dramas over Jack Dorsey’s decentralized social media utopia every day of the week. | {
"pile_set_name": "OpenWebText2"
} |
Although this will initially only be available to US employees, the partnership between Microsoft and BlackRock could provide a seismic shift to the workplace pensions market across the globe.
This joint initiative aims to provide AI-driven products to help people develop make better decisions about saving, investing and then spending their assets in retirement. It also aims to use technology to boost engagement levels, and get people into better saving habits.
In a statement Microsoft says: “Technology is already revolutionising entire industries and the way people interact with everything from health care to education and transportation. And yet, retirement solutions of today have been slow to keep pace.
“Taking advantage of Microsoft’s cutting-edge technologies and BlackRock’s investment products, the companies aim to make it easier for people to save for retirement and achieve the lifetime income they need through their employers’ workplace savings plan.”
Microsoft’s chief executive Satya Nadella says: “Millions of Americans are struggling to achieve their financial goals for retirement. Together with BlackRock we will apply the power of the cloud and AI to introduce new solutions that address this important challenge and reimagine retirement planning.”
BlackRock chairman and chief executive Laurence D Fink adds: “Retirement systems worldwide are under stress, and providing financial security to retirees has become one of the most defining societal challenges of our time.”
UK pension experts says this development clearly has “huge implications” for the workplace pension market over here.
F&TRC director Ian McKenna point out that this follows a similar agreement earlier this year between investment firm Berkshire Hathaway and Amazon to collaborate on employee healthcare.
McKenna says: “This shows a clear trend towards major technology companies working with the largest investment firms. This has huge potential to disturb the established market.”
He adds: “The UK is frequently seen as the natural second market for services launched in America because of the consistency of language and culture.
“It’s now essential for workplace advice firms to identify how they will evolve their operations to remain competitive given the potential of these major brands.
“The UK industry may have a short period of time to prepare for this new competition but firms need to be putting comprehensive digital proposition is at the heart of everything they do.” | {
"pile_set_name": "Pile-CC"
} |
Growth of rabbit pigmented and nonpigmented ciliary body epithelium.
Pigmented (PE) and nonpigmented epithelial (NPE) cells were carefully dissected from the ciliary processes of rabbit eyes and maintained in vitro. Both epithelial cultured cells showed hexagonal morphology by light microscopy; abundant granules containing pigment could be seen in PE cells while no pigment was seen in the NPE cells. S-100 protein exists in both cultured cells and was used as a marker for the in vitro confirmation of these cells. Collagen type III was used as a negative marker to rule out stromal cell contamination in tissue cultures. PE cells attached and proliferated well in 20% fetal bovine serum (FBS) in minimum essential media (MEM). Greater proliferation was attained when PE cells were exposed to 20% vitreous extract in addition to 20% FBS-MEM. Media conditioned by PE cells did not significantly stimulate PE cells. NPE cells showed greatest proliferation in 20% FBS-MEM with either 20% concentration of media conditioned by PE cells or when exposed to 20% concentration of vitreous extract. Rabbit vitreous may contain factor(s) which stimulate the proliferation of both cultured cells, and conditioned media from the PE cells may contain factor(s) which stimulate NPE cell proliferation. | {
"pile_set_name": "PubMed Abstracts"
} |
Screening for Adult ADHD in Patients with Fibromyalgia Syndrome.
Fibromyalgia syndrome (FMS) is a common chronic pain disorder associated with altered activity of neurotransmitters involved in pain sensitivity such as dopamine, serotonin, and noradrenaline. FMS may significantly impact an individual's functioning due to the presence of chronic pain, fatigue, and cognitive impairment. Dyscognition may be more disabling than the chronic pain but is mostly under-recognized. This study aimed to assess the potential co-occurrence of FMS and adult attention deficit hyperactivity disorder (ADHD), a chronic neurodevelopmental disorder also associated with impaired cognition and dopaminergic function. In a cross-sectional observational study, 123 previously confirmed FMS patients were screened for adult ADHD using the World Health Organization Adult ADHD Self Report scale v1.1. The Revised Fibromyalgia Impact Questionnaire (FIQ-R) was used to assess the impact of FMS. Cognitive assessment was based on self-report in accordance with the 2011 modified American College of Rheumatology criteria and the FIQ-R, respectively. Of the 123 participants, 44.72% (N = 55) screened positive for adult ADHD. Participants with both FMS and a positive adult ADHD screening test scored higher on the FIQ-R score (64.74, SD = 17.66, vs 54.10, SD = 17.10). Self-reported cognitive impairment was rated higher in the combined group (odds ratio = 10.61, 95% confidence interval; 3.77-29.86, P < 0.01). These results indicate that the co-occurrence of adult ADHD in FMS may be highly prevalent and may also significantly impact the morbidity of FMS. Patients with FMS should be assessed for the presence of adult ADHD. | {
"pile_set_name": "PubMed Abstracts"
} |
Your Brain on Drugs: Benzos
By Cheryl Steinberg
Benzodiazepines, or more commonly “benzos” are part of a class of drugs known as anxiolytics (also antipanic or antianxiety agent), which are medications that inhibit or ease anxiety. You know them as Valium, Xanax, Librium, Ativan, and Klonopin.
Benzos have been around for quite a while but, it wasn’t until the 1970s when vast numbers of people began taking them for stress and anxiety, leading to concerns about the adverse effects of this group of drugs.
Benzos continue to be popular. For example, between 2002 and 2007, the number of U.S. prescriptions for them grew from 69 million to 83 million. Their popularity waned in the 1980s and ’90s, when SSRI antidepressants like Prozac, Zoloft, Paxil and others outsold them. But benzo use and popularity is back on the rise, mainly due to Big Pharma practices and tactics such as the highly successful marketing strategy used to boost Xanax sales, which was done by marketing it for more than just Panic Disorder.
This is Your Brain on Drugs: Benzos
As with most other drugs, benzos can lead to dependence, both physical and psychological, as well as to addiction for some. There are significant risks to physical and mental health associated with the long-term use of benzodiazepines.
Cognitive Problems
The cognitive effects of long-term benzodiazepine use include impaired concentration and memory, and disinhibition, which is the inability to restrain yourself and shows up as a disregard for social conventions, impulsivity, and poor risk assessment. Users may also experience a generalized impairment of cognition, meaning difficulty with paying attention, struggles with verbal learning and memory. Benzos are the most common cause of drug induced dementia, which affects over 10% of patients who are often misdiagnosed as having Alzheimer’s disease.
Mood
A benzo user’s mood is also deeply affected by long-term use, even undergoing noticeable personality changes and showing signs of aggression. Users experience what’s called emotional clouding, which can best be described as being overly sensitive and not being able to think rationally because their emotions cloud their judgment. Also, continued use of benzos can cause depression as well as the other mental health conditions, and benzo use can actually make those conditions worse. This includes anxiety, which is what this class of drugs is supposed to treat.
Sleep Problems
When someone uses benzos for an extended period of time, they develop benzodiazepine dependence. This condition is associated with possible adverse effects on sleep, including the causing and/or worsening of sleep disordered breathing.
Physical
People who become benzo dependent also experience physical symptoms such as nausea, headaches, dizziness, irritability, lethargy, and sexual dysfunction.
Immune System
Studies have shown that chronic use of benzodiazepines appears to cause significant immunological disorders, as seen in a sample of outpatient clients. Diazepam and clonazepam have been found to have long-lasting, but not permanent, immunotoxic effects in the fetus of pregnant rats.
Suicide and Self-Harm
Teenagers who already displayed signs of depression who were taking benzodiazepines were found to have a drastically increased risk of self-harm or suicide.
Sadly, suicide is common among chronic benzodiazepine users. Misuse or abuse of benzos, like with other medications that suppress the Central Nervous System (CNS depressants) increase the risk of suicide with 11% of males and 23% of females who abuse a sedative hypnotic, like Xanax or Valium, committing suicide.
Addiction
Benzodiazepine dependence often leads to an increasingly worsening quality of life for the user, which includes social deterioration leading to co-occurring issues such as alcoholism and other drug abuse. Benzo addiction goes beyond physical dependence; when someone who has been taking benzos over a long period of time starts to experience issues such as the deterioration of relationships, employment problems, and financial issues, then it is pretty safe to say that they have crossed over into addiction.
Withdrawal
The American Psychiatric Association Task Force devised a table that lists the withdrawal symptoms associated with benzos and categorizes them as such: “Very Frequent, Common but Less Frequent, and Uncommon.”
Very Frequent withdrawal symptoms included anxiety, agitation, and irritability.
Common but Less Frequent withdrawal symptoms include depression.
Uncommon withdrawal reactions included psychosis, confusion, paranoid delusions, and hallucinations. The APA task force also found that these withdrawal symptoms “may persist up to several weeks (occasionally for months).”
But withdrawal from benzos doesn’t end there. Benzodiazepine withdrawal syndrome is very similar to alcohol withdrawal syndrome in that it requires medical treatment because it isn’t safe to quit cold turkey. In some cases, benzo withdrawal (like alcohol withdrawal) results in death.
The good news is that anywhere from 3 to 6 months of abstaining from taking benzos (with proper detox and tapering), there are noticeable improvements in the mental and physical wellbeing of the user. Although long-term use of benzos can actually create or exacerbate physical and mental health conditions, these issues usually improve after 6 or more months of abstinence. So, if you or someone you love is dependent on or addicted to benzos, recovery is possible. Please call toll-free 1-800-951-6135. | {
"pile_set_name": "Pile-CC"
} |
After over five years in an alpha stage that never seemed to end, it's finally over! Wallhaven is now officially 'LIVE!'
After just about EXACTLY a year of behind the scenes work, I'm super proud to be able to finally get the latest, and hopefully greatest, version of wallhaven to you all!
In addition to a ton of new features, fixed bugs, new bugs, and other improvements, I also got us moved over to a newer server. With any luck the site will be faster and more stable (I'll kill those 502's or die trying). Fingers crossed.
Thanks to everyone in the community for sticking with us for all this time! I sincerely hope you enjoy the new site.
For those interesting in a change log:
Taggers rejoice! Tags can be added via thumbnails
Creating an app? Hopefully our new API will be of use to you
Dropped the alpha ribbon and subdomain
New search options: Search for similarly tagged wallpapers with the like: option Search a user's uploads by username Looking for just PNGs? Filter your search to match Most these new search options can be chained together Added ultrawide resolutions to the defaults Fixed tag blacklists not working Full list of search options and operators can be found here
Converted BBCode to Markdown
Reworked how user settings are stored, should fix anyone who previously had issues setting them
A default collection can be selected (big add to favorites button) Adding a wallpaper to a new collection now an option Collection thumbnails will regenerate when a fav is added or removed
Updated rules (and banned sources)
Added a popular tag cloud to the homepage
Added new 'large' option for thumbnails
Less wonky back button when viewing any listings
Reworked design of a ton of pages Have you seen those sexy as shit login and join pages!?
Wallpapers IDs are now alpha numeric
Notifications now get sent to users when you subscribe to their uploads
Small improvements to the upload process Clickable links to found dupes on upload Better feedback on source adding
Updated Laravel from 4.2 to 5.6 to 5.7 to 5.8 (this is what I get for dragging my ass)
Tons of backend clean up and new messes
Other changes I can't think of right now as my fingers start to shake
Still missing something you've been begging for? Worry not! The site may no longer be in alpha, but it's far from comlete. I don't have any plans on stopping work on it anytime soon (though, there might be an extended break here and there)!
Again, thanks a ton for sticking around all this time. Hope to keep seeing ya! 💖 | {
"pile_set_name": "OpenWebText2"
} |
Content marketing is an essential part of any successful online marketing strategy. But as consumers of information, we are drowning in content. With so much content being produced, and with the ever-changing search landscape, how do you ensure your time and effort spent creating content isn’t wasted? Many marketers think the solution to overcoming poorly… | {
"pile_set_name": "Pile-CC"
} |
WASHINGTON (Reuters) - Democratic lawmakers asked U.S. Consumer Financial Protection Bureau chief Mick Mulvaney on Wednesday why he has not issued any sanctions during his five months at the agency.
Slideshow ( 3 images )
President Donald Trump in November tapped Mulvaney, already White House budget chief, to also serve as interim head of the agency conceived to stamp out abusive lending after the 2007-2009 financial crisis.
“Are you telling me that every single financial institution in America has suddenly snapped into full compliance with every single consumer financial law?” asked Democratic Representative Carolyn Maloney.
Mulvaney, a former Republican congressman, has said that the agency overstepped its reach in the past and that he aims to help fulfill Trump’s promise to cut regulations for industry.
In his first appearance as CFPB head before the Republican-controlled Congress, Mulvaney said that he has brought charges for abusive lending but continued to describe his vision for scaling back the reach of the independent agency.
“Our job is to enforce federal consumer financial laws,” Mulvaney said in an opening statement. “Our focus will be on carrying out only those activities Congress explicitly wrote into law.”
Under Mulvaney's watch, the CFPB has dropped cases against payday lenders, put a probe into Equifax Inc EFX.N on ice and is weighing whether to drop other enforcement actions, Reuters has reported.
Mulvaney has said he intends to invalidate rules that would significantly curb payday lending as soon as possible.
Lawmakers on Wednesday also asked how Mulvaney could balance the responsibilities of policing consumer lending and monitoring the federal budget.
“We do not like your dual role,” said Democratic Representative Brad Sherman.
Mulvaney acknowledged it was a strain to maintain two offices, two staffs and several phones.
“It causes a great deal of frustration for both of my executive assistants,” he said.
The CFPB is seeking a record fine against Wells Fargo & Co WFC.N for auto insurance and mortgage lending abuses, Reuters has reported, which would be the bureau's first sanction under Mulvaney.
On Thursday, Mulvaney will also appear before the U.S. Senate Banking Committee. There, he is likely to be further confronted by Democratic Senator Elizabeth Warren, who has repeatedly questioned the agency’s current direction. | {
"pile_set_name": "OpenWebText2"
} |
<div class="well loginContainer widget" id="loginContainer">
<div class="header">
Login / Register
</div>
<div class="body">
<form class="loginForm" action="login.php" method="post">
<div class="well">
<label for="login_username">Userame:</label> <input type="text" name="username" id="login_username">
</div>
<div class="well">
<label for="login_password">Password:</label> <input type="password" name="password" id="login_password">
</div>
<?php if ($config['twoFactorAuthenticator']): ?>
<div class="well">
<label for="login_password">Token:</label> <input type="password" name="authcode">
</div>
<?php endif; ?>
<div class="well">
<input type="submit" value="Log in" class="submitButton">
</div>
<?php
/* Form file */
Token::create();
?>
<center>
<h3><a href="register.php">New account</a></h3>
<p>Lost <a href="recovery.php?mode=username">username</a> or <a href="recovery.php?mode=password">password</a>?</p>
</center>
</form>
</div>
</div>
| {
"pile_set_name": "Github"
} |
Windows 8 for tablet hands on - mingyeow
http://www.engadget.com/2011/09/13/windows-8-for-tablets-hands-on-preview/
======
sriramk
As someone who worked for MSFT for so long, this bit really makes me happy -
mostly since no one would have given this much odds of happening.
"With the introduction of OS X Lion, Apple gave us a glimpse at what a post-PC
operating system might look like, and now Microsoft's gone and pushed that
idea to the limit. If Cupertino's latest was a tease, than Windows 8 is full
frontal. And we have to admit, we like what we see. "
~~~
sunchild
It's hard to relate to the excitement when the demo was chock-full of
usability failure. How many times did the presenters struggle to register
their gestures?
Someone will no doubt say "it's a developer release – we'll fix all that". My
response to that is "Apple would never let that see the outside of a top-
secret lab".
Also, am I the only person who thinks this is the polar opposite of "post-PC"?
Desktop, start menu, right-click, etc. Maybe "touch PC" is more apt?
~~~
jeffjose
The presenter struggles because on the one hand he has a camera and the other
he uses to swipe/touch.
I'm not suggesting the beta/dev preview version is without bugs, I believe
you're reading too much into this.
~~~
coyotej
I'd argue that's "presentation" failure. This is something that can be
practiced so as to keep the focus on the product and not on the sloppiness due
to lack of preparedness.
~~~
toddheasley
I'd argue that you can hand an iPad to your grandmother with severe arthritis
or your toddler for the first time and they wouldn't have nearly as much
trouble as the presenter in the video.
~~~
recoiledsnake
Why would you give your grandmother a prototype tablet that will never see a
production release?
~~~
tomkarlo
Why would you demo a prototype?
~~~
josephcooney
Gee, I don't know...maybe to give the millions of people who are interested in
it an idea of what it might be like.
------
saturdaysaint
It looks very streamlined and powerful - quite arguably more functional than
today's iPad - but it's problematic that I don't see anything that makes
anyones' life appreciably better. A Flipboard clone, mobile Internet, Twitter,
Photos - nothing revolutionary. Really, really good, but nothing to give an
iPad or Xoom owner buyer's remorse unless these are ridiculously cheap (I
don't see how they'll have any price advantage over Apple or Googlerolla).
Tablets will own this holiday season, which MS is missing out on, and remember
that Windows 8 tablets will ship in the shadow of the iPad 3. Which, in turn,
means that Android and iPad will remain the lead platform for large form
touchscreen apps for the medium term future.
So: nice, but this doesn't stop their disruption.
~~~
dangrossman
When the build conference keynote's over, watch the recording. I think the
killer feature will be having every device you pick up be tailored to you.
When you hand it to your wife, it's tailored to her... just by signing in with
a Windows Live ID instead of a local user/password. Your contacts, e-mail,
calendar, photos, files, apps, desktop, bookmarks, individual app settings --
it will all be there on whatever device you pick up, whether it's a tablet, a
phone, a desktop PC, your work PC. Windows 8 uses Microsoft's cloud to bust
through firewalls on every end to connect every device you touch.
~~~
joeguilmette
Kind of like iCloud?
~~~
encoderer
Exactly, except this time, it'll be on the devices that have 85% market share.
~~~
joeguilmette
[http://www.electronista.com/articles/10/08/20/forrester.sees...](http://www.electronista.com/articles/10/08/20/forrester.sees.14pc.of.us.wanting.ipads)
Estimated 14% of the US wants to buy an iPad
[http://tech.fortune.cnn.com/2011/09/13/survey-shows-
unpreced...](http://tech.fortune.cnn.com/2011/09/13/survey-shows-
unprecedented-demand-for-apples-iphone-5/) see exhibit 4 - 85% of the tablet
buyers intend to buy an iPad.
[http://mashable.com/2011/09/12/apple-set-to-break-record-
for...](http://mashable.com/2011/09/12/apple-set-to-break-record-for-mac-
sales-this-fall-report/)
the status quo may not stay the status quo for long... especially with people
slowly admitting that, at least for moms and grandmas, tablets may be much
more in line with their needs.
Paul Graham was even just on stage talking about how Microsoft likely doesn't
see how bad its going to get for them...
~~~
barista
PG stays in his wonderland where Microsoft is no longer relevant. He said that
a few years ago already. Microsoft still made billions of dollars selling
windows in those years.
Same is the case with the surveys above. Everybody wanted to buy an iphone
until android came along...
~~~
wanorris
The interesting thing is that consumer surveys _still_ show more people want
to buy iPhones. But they walk out of stores with considerably more Android
phones than iPhones.
------
RyanMcGreal
> the desktop that you've grown used to in Windows 7 is still present, albeit
> as an app
Interesting parallel with the introduction of Windows. Windows 3.1 still ran
entirely on top of DOS; but DOS was demoted in Windows 95 and replaced
entirely in Windows NT, from which point it has run as a VM on top of the OS.
~~~
Rusky
Add to that the fact that Hyper-V is part of Windows 8 - interesting
possibilities.
------
nextparadigms
According to TIMN it's running an Intel Core i5. Wow. Seriously? I realize
this is just a developer preview device, but if Windows 8 needs that kind of
power, then what about ARM tablets that are supposed to compete with iPad? How
will it run on them? And how much battery life will it have on those Intel-
powered tablets? These questions are all unanswered and Engadget didn't even
touch on any of them.
_"All of the above sections should give you a solid look at what Windows 8 is
shaping up to be, but what about the hardware? While we got a look at the OS
running on a few laptops and all-in-ones during the press preview meeting,
we’ve spent most of the time testing the OS on the prototype tablet. Powered
by a 1.6GHz Core i5-2467M processor and a 64GB solid state drive, the system
is absolutely no slouch on performance — everything from scrolling in the
browser to the Start screen is extremely speedy and the system boots
incredibly quickly. However, fan noise is very noticeable, as is the heat
coming out of the top vent, and a fast boot doesn’t excuse the slow wake-up
times compared to ARM-based cellphones and tablets."_
[http://thisismynext.com/2011/09/13/windows-8-tablet-
photos-v...](http://thisismynext.com/2011/09/13/windows-8-tablet-photos-video-
preview/)
~~~
varunsrin
These are developer devices - meant for compiling code. Therefore, they are
high powered, chock full of every hardware feature that Win 8 will support, so
that devs can play around with them, compile code and use them as their
primary machine. This is a desktop replacement machine for development, not an
iPad replacement.
~~~
megablast
What? You are suggesting that people develop on the tablet? That is not how it
works for iOs, BB, Palm or Android,
~~~
tallanvor
Windows 8 isn't iOS, BB, Palm, or Android. What they're trying to show is that
Windows 8 can be the OS on your desktop, your laptop, and your tablet.
Microsoft has made it clear that they still consider tablets to be PCs, even
if the primary input methods are different.
------
nextparadigms
This explains why Engadget never said anything about the hardware it was
running on. They were _prohibited_ to say anything about it. I wonder why?
_"Keep this in mind as you read: both the operating system and hardware are
developer preview builds. In fact, the [REDACTED]_ hardware (we're prohibited
from even revealing its manufacturer or specs) isn't even going to run Windows
8."*
[http://gizmodo.com/5839665/windows-8-slate-hands-on-its-
fant...](http://gizmodo.com/5839665/windows-8-slate-hands-on-its-fantastic-
but-dont-sell-your-ipad)
~~~
recoiledsnake
I don't know why you're making a big deal of this in multiple posts but the
specs were shown in a slide in BUILD, so it's not like a big secret or
conspiracy to hide the specs.
------
hasanove
Am I the only one who virtually never uses windows desktop? I am either in
particular app, or just click "start", type a few letters and run what I need.
My desktop is just a background when nothing is running. Windows 8 new desktop
might make it useful again.
~~~
Random_Person
I don't use a desktop on any OS for anything other than temp storage for
files. I use Chrome/Geany/terminal 90% of the time and I have quick launch
shortcuts for those in both Windows and Linux.
On my Android phone, however, I use the "desktop" exclusively to find what I
need. Maybe transitioning desktop UI's to something similar is a great move.
~~~
RexRollman
Exactly. When using Windows I have Firefox set to download to the desktop,
from which I file things into their target folders or the trash. Otherwise, my
desktop is icon free.
------
csomar
I have mixed feelings for developing for Windows 8. I got my hands a little on
Visual Studio, and it's hands-down the most powerful, stable and complete IDE
I ever used.
If Microsoft could have something similar for coding with JavaScript,and HTML;
along with tools for storage, database, revision control, testing, jquery...
integrated inside that IDE. Well, I just can't miss programming with it.
~~~
stoptothink
I was at a .NET user group meeting last week. Scott Hanselman showed off the
current development build; guess what, it has the same support for HTML, JS,
Jquery, and CSS editing that it has for MS languages.
~~~
csomar
Mind-blowing :) Anything online showing this?
~~~
lvillani
I _guess_ you can try it yourself (if you have a VM or a partition to spare).
Steven Sinofsky says they're going to make Windows 8 Developer Preview ISOs
(with and without development tools) available to everyone:
[http://blogs.msdn.com/b/b8/archive/2011/09/13/welcome-to-
win...](http://blogs.msdn.com/b/b8/archive/2011/09/13/welcome-to-
windows-8-the-developer-preview.aspx)
------
eykanal
So, it's not "Windows Tablet 8", or "Windows Mobile 8", just "Windows 8"? Does
this mean this is also going to be the desktop OS?
~~~
nextparadigms
Why isn't Engadget mentioning the chip it's running. That's very strange.
Because if it does run Intel's chip as rumored, then this is the version to
run on the desktop, but not the one to run on ARM, so it probably has lower
battery life.
~~~
derwildemomo
[http://thisismynext.com/2011/09/13/windows-8-tablet-
photos-v...](http://thisismynext.com/2011/09/13/windows-8-tablet-photos-video-
preview/) gruber linked to that one. chip is mentioned, it's a 1.6GHz Core
i5-2467M.
~~~
recoiledsnake
I see that Gruber's already piling on the snark about it having a fan etc.
What he misses is that there's choice, if you want a fanless ARM tablet,
Windows 8 will run on it, there were a lot of demos of it doing so. But if you
want a more powerful tablet with a Core i5 processor and don't mind the heat
and noise that much, then there that option too. Whereas if you want a more
powerful iPad, you're SOL.
~~~
joeguilmette
I mean, am I only one that sees a 'powerful' tablet as a drawback?
Size, weight and battery life are three of the most important features of my
iPad. Further, the non-fragmentation of the App Store is nice, a 1G iPad can
run pretty much everything a 2G iPad can.
Why would I want to buy in to an ecosystem where developers are worrying about
developing to the lowest common denominator? Would they consider optimizing
their App for the 10% of their market that bought the Core i5 tablet vs for
the ARM (in a total market size with 5 % of the tablet market)?
What benefit would you really see from a tablet with so much processing power?
A I going to sacrifice all of that battery life so I can render video faster?
Ok, but what if they just let the tablet run all the apps that work on the
desktop. Great. Now my overpowered tablet that has two hours of battery life
and has a fan in it is running apps that aren't even optimized for a tablet
form factor?
This does not bode well.
~~~
mikeash
I agree, the "powerful tablet" seems like a genre without a market. iPad style
tables are attractive because they are extremely small, light, and have
excellent battery life. Why would I buy a larger, heavier tablet with poor
battery life when I can buy a similar laptop instead?
The iPad is popular largely because it's something _completely different_ from
what's already there. A big tablet with an i5 and three hours of battery life
is pretty much the same as what already exists in the PC space.
~~~
seanx
The thing is that you will have a choice. I'll be able to get a 17" hex core,
dual HD power machine while my wife/kids can have a arm powered tablet. Both
machines will be able to run the same metro apps.
Personally, I like power tablets. I got an android instead of an iPad (I gave
away my iPad) because of the added functionality (usb in, hdni out). If I
could have a windows tablet instead, I'd be a very happy camper.
~~~
mikeash
I don't mean power tablets in terms of functionality, but rather in terms of
raw computing power. Your Android tablet has nice features but it's still an
efficient ARM processor which would be completely destroyed in any benchmark
by a decent laptop. The question is, would you buy a power-hungry hex core
tablet if one were available, rather than an ARM tablet or a powerful laptop?
More pertinently, would enough people buy one to make it a viable market?
------
kms002
What's really interesting to me is that Windows 8 seems almost entirely
focused on the _consumer_ market. What about those of us using our desktop PCs
every day to do real work?
I mean, do we really have to boot into that fancy-pants Metro UI every time we
want to actually get something done?
I'm totally fine with swiping this way and that when using a tablet PC (I love
my iPad), but when I sit down at a desktop PC, I want a mouse/keyboard driven
experience - period.
------
Pewpewarrows
Very excited to play with this hands-on tonight/tomorrow. My only concerns are
as follows:
\- Multiple monitors. How does this play nicely with them, and how I
traditionally lay-out several open applications across them? Can one monitor
be Metro UI and the other be the classical desktop? Or, can I have a full-
screen app on one monitor that doesn't brick the other screen? (Looking at
you, OSX Lion)
\- App windows that might not necessarily fit into the tile or fullscreen
approach. The prime example of this is my chat/social desktop or space. I
typically have a contacts list, tabbed chat window, IRC, and twitter feed all
on the same monitor arranged around one another. I know they demoed a way to
do split-screen apps while still in the Metro UI, but it seemed to be too
simple for real use.
\- How jarring is the switch between Metro and the retro desktop? If I'm going
along fine at 90% productivity living completely in the Metro UI on my
monitors, and then all of a sudden need to open a small window from a legacy
app, is that going to completely monopolize my workspace? If half of my apps
work in Metro, and the other half don't while programming, am I going to have
to keep switching between the UIs every 30 seconds as I'm working? That would
be a pretty big deal-breaker.
~~~
pcj
For multiple monitors - yes, you can have 1 monitor dedicated for Metro and
the other for classic Desktop and I believe you can flip between them as well.
And believe the keynote demo also addressed your 2nd question on that.
~~~
joenathan
Yeah, if you are familiar with Display Fusion, all that functionality is now
build into windows.
------
r00fus
Ok, Metro looks nice. I just hope they do similar to Apple and provide
something between "mouse" and "touch"... like all the trackpad gestures Apple
uses to make their desktop OS more touch-oriented while avoiding the dreaded
gorilla arm
[https://secure.wikimedia.org/wikipedia/en/wiki/Touchscreen#G...](https://secure.wikimedia.org/wikipedia/en/wiki/Touchscreen#Gorilla_arm)
------
RexRollman
I think Windows 8 will be interesting. The one thing I don't like about
Windows, since Vista, is the splintering of the client version (basic, home,
professional, ultimate). I think MS should just make one client version for a
flat $150.00.
~~~
ben_straub
Microsoft isn't Apple. Their biggest customers aren't end users; they're large
corporations with thousands of users, and PC manufacturers. Tempting end users
is just marketing to them.
[http://www.joelonsoftware.com/articles/CamelsandRubberDuckie...](http://www.joelonsoftware.com/articles/CamelsandRubberDuckies.html)
~~~
RexRollman
You're probably right, but having so many versions of Windows is asinine, in
my opinion.
~~~
barista
I actually prefer taht. It gives me a choice to pay for whatever I need to use
as opposed to Apple where no matter whether I need it or not, I have to pay.
~~~
RexRollman
Yeah, but the differences are artificial in nature. Everything is installed,
regardless of which version you use, so that anytime upgrade will work.
------
thirdsun
The touch-enabled part of this preview and the fact that Microsoft stays close
to their excellent Metro UI looks very promising. I also see the point of
keeping the traditional windows elements like the desktop or explorer. However
I really don't get why the explorer has to stay that traditional. I'm sure
there would have been a way to make it usable with mouse AND touch input -
maybe by replacing all those ribbon elements by only the most commonly used
actions as icon only, preferably in Metro style.
Right now this feels like an unnecessary break from the promising and fresh
approach that is Metro on a desktop (or tablet).
------
danssig
This is largely an entrepreneurial site, so tell me: if you tried a concept
and it failed, then you repackaged and tried again with another failure (redo
this step multiple times as necessary), then saw someone else alter your
concept and have enormous success would you:
a) Learn from them and make a product that competes in that space or
b) Try your same multiple-times-failed strategy again?
If you're MS it seems option b is the right answer. PC in tablet form, take...
what, 5?
~~~
MatthewPhillips
In what why is this the same strategy? Windows 8 has a completely new API.
Win32, which has been around since the early 90s is gone. The new API doesn't
even have the concept of overlapping windows. WinRT talks directly to the
kernel. In that respect, Windows 8 is as much of a "new thing" as the iPad or
Android or any other tablet OS.
The only thing they've chosen to do differently is in marketing. The other
tablet OSes are marketed as completely new things and Microsoft is marketing
it as an iteration on an old thing.
~~~
danssig
Is it going to be the same thing they sell on the desktop? That's the goal,
right? So it's PC in tablet form. Just like every time they've tried it
before.
~~~
MatthewPhillips
It's a tablet in desktop form. Everything but the kernel was rewritten with
the tablet as the default use case.
------
Sindrome
A somebody who does .Net development as a day job. This is very exciting!
------
J3L2404
Will I have to do a clean install of the OS?
~~~
RexRollman
In my opinion, one should never do a in place upgrade of a OS across major
versions. Back up your files first and then do a proper install.
~~~
rbanffy
Debian (and Ubuntu) users have been doing it for many, many years without
severe problems.
------
ChuckMcM
This looks pretty nice, its good to see M$ being able to step so far out of
their comfort zone vis-a-vis competition between the 'core' windows franchise
and the 'other' products. My belief was that the thing that really killed the
'Tablet' version of windows was that they didn't have an 'all in' mode where
there was no legacy PC stuff there.
~~~
cooldeal
'M$' ? Really? Didn't expect to see that on HN. Thought people were more
mature here.
~~~
ChuckMcM
I agree, that the HN community would downvote folks who complement Microsoft
seems very immature indeed.
~~~
rbanffy
Criticizing Microsoft also gives a lot of downvotes with it.
| {
"pile_set_name": "HackerNews"
} |
44 Cal.App.3d 825 (1975)
118 Cal. Rptr. 856
WOODLAND HILLS RESIDENTS ASSOCIATION, INC., et al., Plaintiffs and Appellants,
v.
CITY COUNCIL OF THE CITY OF LOS ANGELES et al., Defendants and Respondents; CONSOLIDATED RESOURCES, INC., Real Party in Interest and Respondent.
Docket No. 43293.
Court of Appeals of California, Second District, Division One.
January 23, 1975.
*826 COUNSEL
Antonio Rossmann for Plaintiffs and Appellants.
Burt Pines, City Attorney, Robert Thomson, Executive Assistant City Attorney, Claude E. Hilker, Assistant City Attorney, and Jerome Montgomery, Deputy City Attorney, for Defendants and Respondents.
*827 Axelrad, Sevilla & Ross and Richard H. Levin for Real Party in Interest and Respondent.
OPINION
WOOD, P.J.
Plaintiff Woodland Hills Residents Association, Inc., petitioned the superior court for a writ of mandamus compelling each respondent (city council, planning commission, advisory agency) to vacate its decision approving a tract map of a proposed subdivision to be made by Consolidated Resources, Inc., (real party in interest) in Woodland Hills. It may be stated generally that, in a hillside area of 38 acres, Consolidated proposed to cut approximately 90 feet from the top of a ridge and fill the adjacent valleys with 750,000 cubic yards of earth, thereby creating a mesa that would be subdivided into 123 lots upon which to construct 123 dwelling houses. Judgment was entered denying the petition. Woodland Hills Association (petitioner) appeals from the judgment.
Appellant (Association) contends that (1) the City Council of Los Angeles, the planning commission, and the advisory agency unlawfully approved the tract map by failing to find that it was consistent with the city's general plan, (2) the tract map is not consistent with the general plan, (3) an environmental impact report was not prepared prior to approval of the tract map, and (4) each respondent (council, planning commission, and advisory agency) failed to fulfill its duty under the California Environmental Quality Act.
In 1968, the owners of the real property (38 acres) filed with the advisory agency a tentative tract map. The map was approved conditionally by the agency; however, the owners did not file or record a final map within the time allowed therefor by section 11554 of the Business and Professions Code and by section 17.07 of the Los Angeles Municipal Code, and the conditional approval expired in June 1972.
On June 13, 1972, Consolidated filed with the advisory agency an application for approval of a tentative tract map of a proposed subdivision of the property; and the city engineer assigned to it the same number (28569) which had been assigned to the tentative map previously filed by owners. Consolidated proposed to grade 38 acres of hillside *828 terrain[1] and subdivide the graded land into 123 lots at a density of 3.3 lots to an acre. To accomplish that, Consolidated proposed, as hereinabove indicated, to cut 90 feet from the top of a ridge and fill the adjacent valleys with 750,000 cubic yards of earth, thereby creating a mesa that would be subdivided into 123 lots.
On July 13, 1972 (a month after Consolidated filed the tentative tract map with the agency), the city council approved a district plan, as a "part of the General Plan" of the city, subject to further hearing of proposed modifications (which were not relevant to the tract map herein). The district plan, referred to as the "Canoga Park-Winnetka-Woodland Hills District Plan" (district plan hereinafter) provided in part that objectives of the plan were to encourage preservation and enhancement of the varied and distinctive residential character of the district; in the hillside residential areas, to (a) minimize grading so as to retain the natural terrain and ecological balance and (b) provide a standard of land use intensity and population density which will be compatible with street capacity and topography in coordination with development in the remainder of the city; and to limit intensity of land use in the hillside areas and the density of population which can be accommodated thereon in accordance with the following criteria: (a) the adequacy of the existing street circulatory system, both within the area and in peripheral areas, (b) the availability of sewers, drainage facilities and other public facilities, and (c) the steepness of the topography of the various parts of the area, and the suitability of the geology of the area for development. It was also stated: "The Plan proposes that the low-density residential *829 character of the Canoga Park-Winnetka-Woodland Hills District be preserved, and that single-family residential neighborhoods be protected from encroachment by other types of uses. In the mountains and hillside areas all natural slopes not yet developed, and generally in excess of 15% have been designated for minimum density." (Minimum density is referred to as "0.5 to 1.0 units per acre.")
On July 31, 1972, the council adopted preliminary findings recommended by a report of the advisory agency that the proposed subdivision in tentative tract map No. 28569 was "in accordance with the West San Fernando Valley Community Plan" and was consistent with the zoning plan that classifies the property in R-1 zone. (The West San Fernando Valley Community Plan was in existence prior to approval of the "Canoga Park-Winnetka-Woodland Hills District Plan" [district plan], hereinabove described. There was no finding or determination that the proposed subdivision was consistent with the district plan.) Said preliminary findings of the council were adopted by the council without affording notice or hearing to petitioners or to any landowner in the area of the proposed subdivision. The city attorney states (in his brief) that there is no requirement of notice for such "preliminary determination" by the agency and the council that section 17.06 of the Municipal Code and section 11552.1 of the Business and Professions Code (enacted after preliminary finding was made herein) require notice, to the subdivider and property owners in the area, only of the advisory agency's hearing, and do not require notice of any preliminary determination by the agency or the council.
On August 9, 1972, the advisory agency mailed notices, to owners of land adjacent to the proposed subdivision, of a public hearing of Consolidated's application for approval of its tentative tract map. (The notice was the first notice given to any such owner of the proposed subdivision.)
On August 23, 1972, when the advisory agency held a public hearing, the petitioners appeared and opposed Consolidated's application on the grounds that the proposed subdivision was not consistent with the district plan; and that it would result in excess grading, environmental damage, and excess traffic burden on existing streets in the neighborhood. The agency approved the tentative tract map. (In an eight-page letter dated August 31, 1972, from the agency to Consolidated [and to other persons], the agency stated that it had approved the tentative tract map on August *830 23, 1972, on certain conditions set forth therein as to utilities, streets, damage, grading, etc.) The record does not show that the agency made any finding at or after the hearing that the proposed subdivision was consistent with the district plan.
On September 6, 1972, petitioners appealed to the planning commission from the action of the agency approving the tentative tract map. On September 15, 1972, while that appeal was pending, the council formally adopted, as part of the General Plan of the city, the district plan that it had approved on July 13, 1972 (district plan hereinabove described "Canoga Park-Winnetka-Woodland Hills District Plan").
At the hearing of that appeal, petitioners objected to the proposed subdivision on the ground that it did not conform with the district plan, that it would result in excess grading, density, and traffic, and that the agency did not consider its impact upon the neighborhood. Also, one of the petitioners requested that the city prepare an environmental impact report on the project prior to approving it. On a motion to "deny the appeal" and to sustain the action of the agency (approving the subdivision), the planning commission allegedly voted "2 to 2." (See infra.) Upon a tie vote, petitioners' appeal would be "denied" by operation of law under sections 11552 and 11553 of the Business and Professions Code. The commission did not make findings. As a result, there was no express finding by the commission that the proposed subdivision was consistent with the district plan or the general plan. The commission did not require preparation of an environmental impact report.
Petitioners appealed to the city council from the planning commission's alleged approval of the proposed subdivision. On January 4, 1973, when the council held a public hearing on the appeal, petitioners made objections to the proposed subdivision which were similar to the objections that they made before the advisory agency and the planning commission. A councilman made a motion to "grant" the appeal (to disapprove the proposed subdivision) on the ground that excess grading and traffic would result therefrom. Before a vote was taken on that motion, a councilman proposed an amendment to the motion which would state that the density of the proposed subdivision "greatly exceeds" the provision of the district plan that all slopes in excess of 15 percent be designated for density of 0.5 to 1 dwelling unit per acre. By vote of eight to five, the motion to amend was carried. The vote on the *831 motion, as amended, was seven to seven. (Section 25 of the city charter provides that action shall be taken by majority vote of the entire membership of the council.) The appeal remained within the jurisdiction of the council for seven days, under provisions of section 11552, subdivision (b), of the Business and Professions Code.
On January 11, 1973, petitioners made a motion that the council reconsider petitioners' motion to "grant" the appeal. The motion was denied by vote of six to five. Thus, pursuant to sections 11552 and 11553 of the Business and Professions Code (above referred to), the subdivision was "deemed approved" by operation of law. The council did not make findings. As a result, there was no express findings by the council that the subdivision was consistent with the district plan which the council had adopted previously. The council did not require preparation of an environmental impact report.
Petitioners filed, in the superior court, this petition for a writ of mandamus compelling each of the respondents (council, planning commission, advisory agency) to vacate its decision approving the tract map. Evidence at the hearing of petition included many exhibits attached to the petition, the supplemental petition, the answer, and a memorandum submitted by the city in opposition to the petition; and included transcripts of hearings before the planning commission and the council. The court did not make signed findings. In a two-page minute order denying the petition, the court stated in part as follows:[2]
"The court finds that there is substantial evidence to support the implied findings and that there was no prejudicial abuse of discretion.... The actions of the Appeal Board [planning commission] and the City Council by each reaching a tie vote on motions to sustain the matter on appeal resulted in a denial of the appeals by operation of law. The tie vote in each case was an implied finding by the Appeal Board and the City Council that the appeal was not meritorious and that the decision of the lower body should stand. It is the opinion of the court that the *832 wording of Section 1706A.3 and 4 [sic][[3]] of the Los Angeles Municipal Code should be construed so that the word `finding' includes the word `decision'. This construction is supported by the wording of Section 1706A.3 and 4 [sic][[3]] which states that the appellate body shall declare its findings, and may make such findings as are not inconsistent with `this article or the Subdivision Map Act'. In addition the appellate body `may sustain, modify, reject or overrule any recommendations or rulings ...'. Implicit in such sustaining, modification, rejection or overruling is the power to make its own ruling or decision, as for example, to overrule the lower body which had denied approval and approve a subdivision map. It is also implicit that a decision or finding that the lower body's action is correct may be made by the casting of a tie vote by the appellate body. The administrative record contains substantial evidence to support such implied decision or finding. The finding of consistency of the proposed subdivision with the applicable general or specific plans of the city as required by Section 11526.2 of the Business and Professions Code is also made by implication by the tie votes. The question concerning the general plan as it existed in July of 1972 and as it existed at the time of the appellate hearings was thoroughly presented to the appellate bodies. The administrative record contains substantial evidence to support such finding of consistency by the City Council at each of the times involved. No notice to petitioners is required for a determination of consistency. Such decision or determination may be attacked as part of the general process of administrative appeal from approval of a tentative or final subdivision map, or in a court action upon exhaustion of such administrative remedies, i.e., the finding of consistency is part of, rather than separate from, the overall process of subdivision approval. The court finds that an Environmental Impact Report was not required. The `moratorium' passed by the legislature concerning the California Environmental Quality Act exempted this project from the preparation of an Environmental Impact Report. The administrative appeals were not the `judicial proceeding' referred to in Section 21171 of the Public Resources Code."
(1) Appellant contends, as above stated, that respondents erred in approving the tract map in that each respondent (council, planning commission, and advisory agency) failed to find that the proposed subdivision was consistent with the general plan (i.e., that part of the *833 applicable general plan adopted by the council for the district herein, hereinabove referred to as district plan).
Section 11526, subdivision (c), of the Business and Professions Code, provides: "No city or county shall approve a tentative or final subdivision map unless the governing body shall find that the proposed subdivision, together with the provisions for its design and improvement, is consistent with applicable general or specific plans of the city or county."
Section 11526.2, subdivision (c), of said code provides: "The advisory agency, appeal board or governing body shall not approve a tentative or final subdivision map unless it first finds that the proposed subdivision, together with the provisions for its design and improvement, is consistent with applicable general or specific plans."
Section 11549.5, subdivision (a), of said code provides that the governing body of a city shall deny approval of a final or tentative subdivision map if it finds that the proposed map is not consistent with applicable general and specific plans.
In Topanga Assn. For A Scenic Community v. County of Los Angeles, 11 Cal.3d 506 [113 Cal. Rptr. 836, 522 P.2d 12], decided after the opening brief was filed herein, the Supreme Court (p. 509) considered "aspects of the functions served by administrative agencies in the granting of zoning variances and of courts in reviewing these proceedings by means of administrative mandamus," and concluded (p. 510) that variance boards "must render findings to support their ultimate rulings" and that a reviewing court "must determine whether substantial evidence supports the findings of the administrative board and whether the findings support the board's action." In that case, a county regional planning commission, despite opposition by an association of taxpayers and owners of property in Topanga Canyon, granted to an investment company a variance to establish a 93-space mobile home park on 28 acres in the canyon. The association appealed "without success" to the board of supervisors and then sought relief by means of administrative mandamus, unsuccessfully, in the superior court. The Supreme Court held (pp. 513-514) that "regardless of whether the local ordinance commands that the variance board set forth findings, that body must render findings sufficient both to enable the parties to determine whether and on what basis they should seek review and, in the event of review, to *834 apprise the reviewing court of the basis for the board's action." It was said (p. 515) that "implicit in section 1094.5 [of the Code of Civil Procedure] is a requirement that the agency which renders the challenged decision must set forth findings to bridge the analytic gap between the raw evidence and ultimate decision or order." Also, it was said (p. 516) that "a findings requirement serves to conduce the administrative body to draw legally relevant sub-conclusions supportive of its ultimate decision; the intended effect is to facilitate orderly analysis and minimize the likelihood that the agency will randomly leap from evidence to conclusions. [Citations.] In addition, findings enable the reviewing court to trace and examine the agency's mode of analysis. [Citations.] [¶] Absent such roadsigns, a reviewing court ... would have to grope through the record to determine whether some combination of credible evidentiary items which supported some line of factual and legal conclusions supported the ultimate order or decision of the agency." It was said further (p. 517): "By setting forth a reasonable requirement for findings and clarifying the standard of judicial review, we believe we promote the achievement of the intended scheme of land use control.... Moreover, courts must meaningfully review grants of variances in order to protect the interests of those who hold rights in property nearby the parcel for which a variance is sought."
In Selby Realty Co. v. City of San Buenaventura, 10 Cal.3d 110, 125-126 [109 Cal. Rptr. 799, 514 P.2d 111], an application for a building permit was denied by a city for failure to comply with an ordinance that was in existence when the application was submitted. In the interim between denial of the permit and an appeal from the denial, the ordinance was amended. The Supreme Court held (p. 126) that the amended version of the ordinance was applicable to the request for a permit even though the ordinance was amended after the permit was denied. It was also said (p. 125, citing Russian Hill Improvement Assn. v. Board of Permit Appeals, 66 Cal.2d 34, 39 [56 Cal. Rptr. 672, 423 P.2d 824], that "even after a permit has been issued, it may be revoked by an administrative body on the basis of a subsequent change in the zoning laws unless the permittee has made substantial improvements in good faith reliance on the permit."
In the present case, Consolidated filed its application for approval of the tract map in June 1972; and on July 13, 1972, the city council approved, subject to further hearing of modifications, the district plan that included a provision that in hillside areas in the district all natural *835 slopes in excess of 15 percent be designated for minimum density of 0.5 to I dwelling unit per acre. On July 31, 1972, without notice or hearing to any party, the council adopted preliminary findings recommended by the advisory agent that the proposed subdivision was in accordance with the community plan that was in existence at that time. Then, the advisory agency gave notice (including notice to adjoining landowners) of a public hearing of Consolidated's application for approval of the subdivision tract map. At the hearing, petitioners (herein) opposed the application on the grounds that the proposed subdivision was not consistent with the district plan that had been approved by the city (but had not yet been formally adopted), and that the subdivision would result in excess grading, excess traffic, and environmental damage. The agency approved the tentative tract map.
The petitioners appealed from the action of the agency to the planning commission; and, while that appeal was pending (and prior to hearing thereof) the council formally adopted the district plan. At the hearing, petitioners made objections similar to the objections they had made before the agency,[4] and requested that the city prepare an environmental impact report; and, as previously stated, the commissioners allegedly voted "2 to 2" upon a motion to "deny" the appeal and sustain the action of the advisory agency. The transcript of that hearing shows that there was extended discussion among the four commissioners. Those discussions indicate that a commissioner (Gomez) was in favor of the subdivision; two commissioners (Moir, Armstrong) were strongly opposed to it; and another commissioner (Diller) was (in his words) "just torn apart" after hearing from "both sides," but he could not go along with the appeal because he would "strictly go along with the reports and recommendations from all our departments which make the city." Among other things, Commissioner Gomez (who was in favor of the subdivision) said: "As far as the environment is concerned anything would be an improvement over that bare hill." Commissioner Moir (who *836 was against the subdivision) said that it was "one of the poorest subdivisions I've seen since I've been on the commission" in that, among other things, they are planning to "take the top off the hill" and move "750,000 to 1,000,000 yards of soil," and "that is the very thing that this Environmental Impact has brought about, is those sort of activities." Commissioner Gomez made a motion to "deny" the appeal. The commissioners discussed what the situation would be if they could not reach a majority decision. A commissioner said that if they did not get a majority decision, the decision of the advisory agency is confirmed and that the matter would automatically "stay and carry up to date" and go before the council. The transcript concludes with the following statement of a commissioner: "I think the public should know that at this time the appeal has been denied in effect because we do not have any decisions; therefore the advisory agency decision stands and goes to the Council and the Council will have to deal with it there."
At the hearing on the appeal before the city council, statements were made by petitioners and Consolidated (real party in interest). A motion was made to "grant" the appeal. A councilman (who apparently was against the motion) said that he did not know what the issues were, he did not know anything about hillside conditions, the streets in his councilmanic district were not as wide as the streets at the subdivision and he did not think that anyone needed an acre to himself when thousands of people in his district were living five and six to an acre. Statements were made by councilmen regarding the effect of the proposed subdivision upon the contour of the hills and upon traffic, including the question whether the proposed subdivision was consistent with the district plan that all slopes in excess of 15 percent be designated for maximum density of 0.5 to I dwelling unit per acre. One councilman said that the proposed subdivision did not comply with the requirement of the plan that a maximum of 0.5 to 1 dwelling unit be permitted where the grade exceeds 15 percent; all of "this grade" exceeds 15 percent and some of it is as high as 40 percent; if the subdivision complied with the plan, the maximum dwelling units permitted would be 35 dwellings; 123 units "nowhere near complies with the plan"; and he seriously wondered what a court would say if the council approved the proposed 123 units. A motion was made to amend the motion to "grant" the appeal so that it would state that the density "greatly exceeds" the requirement of the district plan that all slopes in excess of 15 percent be designated for density of 0.5 to 1 dwelling unit per acre. The council vote on said amendment was eight to five in favor of it. Another councilman asked *837 the city attorney whether findings by the council were a legal requirement; and the city attorney replied in the affirmative. The city attorney also said that he had drafted findings at the request of the councilmen (councilmen who apparently were against approval of the subdivision), but that the findings and the determination as to whether the evidence supported the findings must be made by the councilmen. When a vote was taken upon the motion as amended to grant the appeal, the vote was seven to seven.
It thus appears that neither the planning commission nor the council made express findings of fact. Although the Legislature has expressly provided (Bus. & Prof. Code, §§ 11526, subd. (c), 11526.2, subd. (c), 11549.5) that the advisory agency, appeal board (planning commission), or governing body (city council) shall not approve a tentative subdivision map unless it first finds that the proposed subdivision is consistent with the applicable general and specific plans, there was no express finding by any of those agencies that the proposed subdivision herein was consistent with the district plan (which was a part of general plan). The advisory agency did make a preliminary determination prior to its formal hearing that the proposed subdivision was in accordance with the West San Fernando Valley Community Plan that was in existence at the time of the preliminary determination; and the council (without a hearing) adopted said preliminary determination. There was no finding, however, by the council, or commission, or agency, that the proposed subdivision was consistent with the district plan (Canoga Park-Winnetka-Woodland Hills District Plan) approved and adopted by the council while the administrative appeals were pending. There was evidence that the proposed subdivision was not consistent with said district plan in that the grading of the slopes exceeded 15 percent and the proposed dwelling units were 3.3 to an acre. The issue whether the proposed subdivision was consistent with the district plan in that respect was raised at the hearings before the commission and the council. As above stated, the council by an eight to five vote amended the motion to "grant" so that it would state that the density of the proposed subdivision "greatly exceeds" said requirement of the district plan.[5] The petitioners, in addition to raising the issue as to whether the proposed subdivision was consistent with the district plan, raised issues such as to whether the *838 proposed subdivision would cause excess traffic and whether an environmental impact report was required. Failure by the council (and planning commission) to make findings to support its ultimate decision resulted in inability of a reviewing court to bridge the analytic gap between the evidence and the ultimate decision of the council (and planning commission). (See Topanga Assn. For A Scenic Community v. County of Los Angeles, 11 Cal.3d 506, supra.) Here, upon proceedings in administrative mandamus, the trial court considered provisions of the Municipal Code and determined that each tie vote (by commission, by council) was a finding "by implication" that the proposed subdivision was consistent with applicable general or specific plans as required by section 11526.2 of the Business and Professions Code; that the tie vote in each case was an implied finding that the appeal was not meritorious; and that the decision of the lower body should stand.
An express finding that the proposed subdivision tract map was consistent with the district plan was required herein in order to support a decision approving the proposed map. A tie vote under the circumstances here, where such a finding of consistency was a legal prerequisite of approval, did not constitute approval action. As above indicated, the Topanga Assn. case, supra, above referred to, had not been decided when the trial court rendered its judgment in the present case. The trial court erred in determining that there was a finding by implication which was sufficient for approval of the proposed subdivision map.
After the appeal herein was submitted for decision, the Supreme Court rendered its decision in No Oil, Inc. v. City of Los Angeles (1974) 13 Cal.3d 68 [118 Cal. Rptr. 34, 529 P.2d 66], wherein the city had approved an oil-well drilling project without a written determination concerning the environmental impact of the project; and the judgment of the trial court was reversed because the city failed to proceed in the manner required by law.
In the present case the judgment should be reversed and the cause remanded to the superior court with the direction that the superior court remand the matter to the city council for proceedings in the manner required by law, particularly as required by section 11526, subdivision (c), of the Business and Professions Code, with respect to finding whether the proposed subdivision map is consistent with that part of the general plan adopted by the council as the Canoga Park-Winnetka-Woodland *839 Hills District Plan; and as required by the case of Topanga Assn. For A Scenic Community v. County of Los Angeles, 11 Cal.3d 506 [113 Cal. Rptr. 836, 522 P.2d 12], with respect to making findings.
The judgment is reversed, and the cause is remanded to the superior court to proceed in accordance with the views herein expressed. The superior court may determine a motion, if any, by plaintiffs in the superior court for attorney's fees on appeal.
Lillie, J., and Hanson, J., concurred.
Petitions for a rehearing were denied February 20, 1975, and the opinion and judgment were modified to read as printed above.
NOTES
[1] Petitioners' description of the terrain, as presented by petitioners to the city council, was:
"These prominent, rugged undeveloped hills dominate the view to the west from the Summit of Topanga Canyon Blvd. and at numerous points from there to the floor of the San Fernando Valley. They are also visible from the eastern limits of Tarzana when traveling west on Mulholland Drive. These hills are an integral part of the character and environment of Woodland Hills. Their natural beauty is why most of us have chosen to reside in the area and why homeowners have invested their time, energy and money here.
"The concern for these undeveloped hills and how they are to be developed is not limited to those of us who live in the immediate area or elsewhere in Woodland Hills. Widespread interest from the outside of Woodland Hills has made it apparent to us that the natural contour of these hills and their seasonal changes from green to gold have become a familiar landmark of beauty to many residing outside of Woodland Hills.
"The grading proposed in this plan would reduce the prominent, rugged ridge by 1/3 and fill the adjoining valley to create a mesa. A mesa that is incompatible with the other hills of Woodland Hills which have been developed in such a way as to preserve the natural contour."
[2] Respondents state (in their brief) that findings were waived and that the minute order does not constitute findings. Appellants (in their reply brief) state that findings were not waived by written stipulation by counsel, and although respondents obtained judgment in their favor they did not present proposed findings of fact and conclusions of law. The record does not include a reporter's transcript of the court proceedings. Respondents do not cite the record for their statement that findings were waived. The minute order does not state that findings were waived it states: "The Real Party in Interest is directed to prepare the Judgment."
[3] Apparently, section 17.06, subdivision A, subsections 3 and 4, of the Los Angeles Municipal Code.
[4] The transcript of the hearing before the planning commission shows that there are many "omissions" of parts of the proceedings, including the omission of the entire presentations by petitioners and of the real party in interest. The transcript includes a statement by a Councilman Braude wherein he said in part that he had represented the hillside areas for years; this tract of land had never been developed previously because it was worthless in that it was steep, hillside land and the owners did not think that it was worthwhile to develop it and build adequate roads; it is on a high ridge and the streets are not of sufficient width to serve 123 homes, especially as to access by fire, police, police and emergency vehicles, and rubbish trucks; traffic on the narrow streets would endanger children; and the appeal should be sustained and the developer told to turn in a tract with substantially fewer dwelling units.
[5] In its order, the trial court stated that the question concerning the general plan as it existed in July of 1972 and as it existed at the time of the appellate hearings was thoroughly presented to the appellate bodies.
| {
"pile_set_name": "FreeLaw"
} |
This article has been accepted for publication and undergone full peer review but has not been through the copyediting, typesetting, pagination and proofreading process, which may lead to differences between this version and the Version of Record. Please cite this article as doi: 10.1111/tra.12738.
| {
"pile_set_name": "PubMed Central"
} |
Q:
How to prevent call to base implementation of a method
Lets say we have following hierarchy:
class Abstract
{
public:
virtual void foo() = 0;
};
class Base : public Abstract
{
public:
virtual void foo() override; //provides base implementation
};
class Derived : public Base
{
public:
virtual void foo() override; //provides derived implementation
};
If Base::foo() is ever called on the Derived object that object will desync and its data will be corrupted. It inherits Base's data structure and its manipulation but needs to perform additional operations so calling only the Base::foo() will omit these extra operations and as a result the Derived's state will be corrupted.
Therefore I would like to prevent direct call of Base implementation of foo so this:
Derived d;
d.Base::foo();
ideally, should give me a compile time error of some sorts. Or do nothing or otherwise be prevented.
However it might be I am violating the polymorphism rules and should use composition instead but that would require a lots of extra typing...
A:
How about template method pattern:
class Abstract
{
public:
void foo() { foo_impl(); }
private:
virtual void foo_impl() = 0;
};
class Base : public Abstract
{
private:
virtual void foo_impl() override; //provides base implementation
};
class Derived : public Base
{
private:
virtual void foo_impl() override; //provides derived implementation
};
then
void test(Abstract& obj) {
obj.foo(); // the correct foo_impl() will be invoked
}
Derived d;
test(d); // impossible to call the foo_impl() of Base
A:
You can explore the template method pattern. It allows for greater control of the execution of the methods involved.
class Abstract
{
public:
virtual void foo() = 0;
};
class Base : public Abstract
{
protected:
virtual void foo_impl() = 0;
public:
//provides base implementation and calls foo_impl()
virtual void foo() final override { /*...*/ foo_impl(); }
};
class Derived : public Base
{
protected:
virtual void foo_impl() override; //provides derived implementation
};
The pattern is seen in the iostreams library with sync() and pubsync() methods.
To prevent the direct calls and maintain the consistent state, you will need to get the final implementation of the foo method in the correct place in the stack. If the intent is to prohibit the direct call from the top of the hierarchy, then you can move the _impl methods up.
See also the non-virtual interface, the NVI pattern.
Bear in mind as well that the overriding methods do not have to have the same access specifier as the Abstract class. You could also just make the methods in the derived classes private or protected;
class Abstract
{
public:
virtual void foo() = 0;
};
class Base : public Abstract
{
virtual void foo() override; //provides base implementation
};
class Derived : public Base
{
virtual void foo() override; //provides derived implementation
};
Note: unless otherwise intended, changing the access specifier could be considered bad design - so basically if you do change the access specifier, there should should be a good reason to do so.
A:
You can make all the foo() methods non-public, then have a non-virtual function in the Abstract class that simply calls foo.
| {
"pile_set_name": "StackExchange"
} |
Q:
What is Route, where and how to define it?
I have several modules in my zend application. On one of the view script of my modules, I created a URL as such
$links['create'] = $this -> url(array("controller" => "roles", "action" => "create"), "custom");
This brings an error, saying Route "custom" is not define.
What is Route? Where to define it and How?
A:
In my bootstrap file i have initialized my routing by adding following function
public function _initRouting() {
// Get Front Controller Instance
$front = Zend_Controller_Front::getInstance();
// Get Router
$router = $front->getRouter();
$routedetialevent = new Zend_Controller_Router_Route(
'/events/detail/:id',
array(
'controller' => 'events',
'action' => 'detail'
)
);
$routeregister = new Zend_Controller_Router_Route(
'/index/register/:id',
array(
'controller' => 'index',
'action' => 'register'
)
);
$routerdetail = new Zend_Controller_Router_Route(
'/commentaries/details/:id',
array(
'controller' => 'commentaries',
'action' => 'details'
)
);
$router->addRoute('post', $routedetialevent);
$router->addRoute('register', $routeregister);
$router->addRoute('detail', $routerdetail);
}
as i have added the custom route in my events, commentaries whenever i visit detail page i dont have to write id in my url so my url will be like
http://localhost/example/events/detail/3
If i wouldnt have added route than my url would be like
http://localhost/example/events/detail/id/3
| {
"pile_set_name": "StackExchange"
} |
Subsets and Splits