text
stringlengths 0
2.3M
| meta
dict | score
float64 0
0.5
|
---|---|---|
YMAS
YMAS: if you don't know, don't ask. Where dead horses go to die twice, and shit posts rise from the ashes to become shit phoenixesLightly moderated, for blatantly obvious idiocy and NSFW or illegal content. | {
"pile_set_name": "Pile-CC"
} | 0.014151 |
Evaluating current definitions of low disease activity in psoriatic arthritis using ultrasound.
To evaluate low disease activity (LDA) cut-offs in psoriatic arthritis (PsA) using ultrasound. Eighty-three PsA patients underwent clinical and ultrasound examinations at two visits. LDA was assessed using the Disease Activity index for Psoriatic Arthritis (DAPSA ⩽ 14), the Psoriatic ArthritiS Disease Activity Score (PASDAS ⩽ 3.2), the Composite Psoriatic Disease Activity Index ⩽ 4, the DAS28-CRP ⩽ 2.8 and the minimal disease activity criteria. Ultrasound was performed at 68 joints and 14 entheses. Minimal ultrasound disease activity (MUDA-j/e) was defined as a Power Doppler score ⩽ 1, respectively at joints, paratendinous tissue, tendons and entheses. A global ultrasound score was calculated by summing Grey Scale and Power Doppler information (GUIS-j/e). LDA was present in 33.7-65.0% at baseline and in 44.3-80.6% at follow-up, depending on the criteria used. MUDA-j/e was observed in 16.9% at baseline and in 30% at follow-up. GUIS-j/e was significantly higher in patients with moderate/high disease activity vs LDA according to DAPSA and PASDAS at baseline and DAPSA, PASDAS, Composite Psoriatic Disease Activity Index and minimal disease activity at follow-up. Patients in moderate/high disease activity had MUDA-j/e in 8.1-21.4% at baseline and in 8.3-20.0% at follow-up, depending on the applied clinical composite. MUDA-j/e patients with moderate/high disease activity had higher levels of pain and pain-related items than those with LDA. The LDA cut-offs of DAPSA, PASDAS, Composite Psoriatic Disease Activity Index, minimal disease activity, but not DAS28-CRP are capable of distinguishing between high and low ultrasound activity. Pain and pain-related items are the main reason why PsA patients without signs of ultrasound inflammation are classified with higher disease activity. | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
Prospects for making organometallic compounds with BF ligands: fluoroborylene iron carbonyls.
The fluoroborylene ligand (BF), isoelectronic with CO, was recently (2009) realized experimentally by Vidović and Aldridge in Cp(2)Ru(2)(CO)(4)(mu-BF). In this research the related iron carbonyl fluoroborylene complexes Fe(BF)(CO)(n) (n = 4, 3), Fe(2)(BF)(CO)(8), and Fe(2)(BF)(2)(CO)(n) (n = 7, 6) are compared with the isoelectronic Fe(CO)(n+1) and Fe(2)(CO)(n+2) as well as the thiocarbonyls Fe(CS)(CO)(n) and Fe(2)(CS)(2)(CO)(n) using density functional theory. For Fe(BF)(CO)(4) the axially and equatorially substituted trigonal bipyramidal structures are predicted to be nearly degenerate as is the case for Fe(CS)(CO)(4). The lowest energy structures for Fe(BF)(CO)(3) are derived from the trigonal bipyramidal Fe(BF)(CO)(4) structures by removal of CO groups. For the binuclear derivatives Fe(2)(BF)(CO)(8) and Fe(2)(BF)(2)(CO)(n) (n = 7, 6) structures with BF bridges are preferred energetically over structures with CO bridges. However, no structures for the unsaturated Fe(2)(BF)(2)(CO)(6) are found with four-electron donor eta(2)-mu-BF groups. This differs from the corresponding Fe(2)(CS)(2)(CO)(6) where structures with eta(2)-mu-CS groups and formal Fe-Fe single bonds are preferred over structures with only two electron donor CO and CS groups and formal Fe=Fe double bonds. The lowest energy structure for Fe(2)(BF)(2)(CO)(7) is thus predicted to be similar to the well-known triply bridged Fe(2)(CO)(9) structure but with two bridging BF groups and one bridging CO group. However, the dissociation energy of Fe(2)(BF)(2)(CO)(7) into mononuclear fragments is much higher than that of Fe(2)(CO)(9). Removal of the bridging CO group from this lowest energy Fe(2)(BF)(2)(CO)(7) structure leads to the doubly BF-bridged global minimum structure for Fe(2)(BF)(2)(CO)(6). | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
Q:
Battery Discharge
I am making a circuit to discharge an 18V Li-ion battery, with multiple cells, in order to condition it. Each 18V cell has a capacity of 100Wh when fully charged. I would like to control the condition of each cell individually with PWM (to control the current flow), in order to regulate the discharge based on battery and heat sink temperature. A common power resistor is diode or'ed between the 4 switches (Only 1 switch is on at a time).
My question is this, what type of FET or switch circuit (U1) could I control with a 3.3V MCU PWM and also ensure the lowest amount of leakage from the battery when not in discharge mode? Protection against over current, 0 leakage, and lowest footprint are a bonus. It needs to be able to handle currents of up to 1A.
simulate this circuit – Schematic created using CircuitLab
A:
First, I hope you're aware that controlling discharge current via PWM is intrinsically more stressful on the battery than using a DC current level. The reason is that the battery chemistry is intrinsically non-linear, being less efficient as current increases. Even assuming no difficulties along that line, a battery pulling 2 amps with a 50% duty cycle will dissipate twice the internal power as one pulling 1 amp continuously, since doubling the current for half the time give 4 times the power for half the time, or twice the average power.
Second, I'd really recommend using about a 20 ohm resistor, rather than a 10 ohm unit. The reason is that if you somehow have a failure which turns a cell on continuously, the current will be about your desired maximum of 1 amp. This will, in effect, give you overcurrent protection naturally.
Third, the simplest high-side switch for your application would be a P-type MOSFET, and you cannot drive it directly. Try
simulate this circuit – Schematic created using CircuitLab
It also has the advantage that an open input will produce no load current.
Frankly, small footprint should not be a consideration, since you will need a fairly large heat sink to dissipate 20 watts.
Idss, the MOSFET leakage current in the off state, will depend on the MOSFET you choose, but it can easily be less than 10 uA for room temperature. I suspect that your cell voltage measurement will draw more than that. Note that a 1 Mohm meter will put 18 uA just reading the cell voltage.
| {
"pile_set_name": "StackExchange"
} | 0 |
Check out total milf Jennifer Jade, the UK mom who will do anything to satisfy the needs of her horny shaved pussy! She starts off her evening of self-pleasure wearing a sheer robe over a bra and panties, but soon her clothes are but a memory as her hands roam her huge enhanced tits and spread her pussy juices all over her bald twat.
Just home from her job as a secretary, Tanya S. quickly gets naked as she peels off her shirt and miniskirt. Already on edge sexually, the lonely housewife runs her hands all over her voluptuous sensitive body with plenty of attention paid to her diamond hard nipples before she moves on to stroking her juicy clit and fuck hole.
35 year old UK milf Jaden is looking sexy in an off the shoulder evening dress with a short skirt that leaves nothing to the imagination. That’s just how this horny blonde wants it! She can’t help her moans of anticipation as her clothes come off to reveal hanging big boobs tipped with big areolas and a juicy landing strip pussy that’s just waiting for the ultimate pleasure.
Super hot mom Chelsea French has a long slender body that she enjoys touching and teasing for your pleasure. After running her hands up her sheer thigh high-encased legs, the horny housewife flips up her miniskirt so that she can enjoy some naughty caresses to her lush ass and juicy bald fuck hole.
Freshly returned from a day of shopping, horny milf Lexi Lou peels off her dress and quickly follows up by taking off her bra and thong. Naked except for her sheer thigh highs and high heels, the cock hungry mom crawls on the bed and uses her fingers and the soft touch of a rose to work her juicy bald cunt into a horny meltdown.
Working woman Tracy Rose is a horny UK babe with a huge need to fuck. The raven haired housewife takes her time getting out of her work clothes, enjoying the feel of her hands rubbing over her sheer bra that hugs her luscious boobs and her matching sheer panties. When she has finally unveiled her tender tits and creamy hairy pussy, Tracy is all worked up and ready for a much-needed release.
A set of sheer lingerie puts cock craving housewife Olga Cabaeva in the mood for sex. As the horny milf enjoys the sweep of her hands over her sensitive skin and all natural boobs, her landing strip pussy grows wetter and creamier by the second. Soon she is dripping with eagerness and ready for a good time.
While doing household chores, slender mom Angel Summers can’t stop her hands from roaming her perfect-10 body. Once she starts touching her enhanced breasts and rock hard nipples, she can’t stop there. Soon she has slipped out of her clothes and hopped up onto the washing machine, naked and with her creamy twat on display in preparation for a good time.
Roxy Jay is a sexy classy lady whose eveningwear makes her absolutely irresistible. Don’t miss out as this buxom blonde slowly unveils her huge breasts and plays with her diamond hard nipples before peeling her panties away to show off a juicy hairy twat that is just waiting for a good fuck.
Working as a secretary gives luscious Tanya Cox plenty of time to come up with office fantasies that she can play out. Dressed in saucy lingerie, the big breasted mom gradually gets naked and indulges in an enhanced breast massage before turning her attention lower to the creamy bald pussy that drips in anticipation of a good climax. | {
"pile_set_name": "Pile-CC"
} | 0.013053 |
Emancipation Day 2012: What Frederick Douglass Would Think of Ward 8's 21st-Century Troubles
To understand the importance of Washington D.C. Emancipation Day, look no further than the story of those who thought this event would never happen.
When we think about the development of America's democracy, we shower attention toward our Founding Fathers. A short drive down the Potomac River leads you to George Washington's Mount Vernon -- the home of a general whose bravery on the battlefield led a developing country to independent footing. Drive southwest for about two hours and you find a similar picture at Thomas Jefferson's Monticello -- the abode of a thinker who etched that freedom into the Declaration of Independence.
Jefferson and Washington served a nation that was rudimentary at best. They managed wealth that left them vulnerable to conflicting views. Perhaps we can learn more about the United States today through the lens of a man whose accomplishments arrived without the help of slave labor. As the District Of Columbia commemorates the 150th anniversary of Emancipation Day, Frederick Douglass' story should be at the forefront of our thinking.
Three days prior to this landmark event, I visited Douglass' Cedar Hill home in Anacostia. He purchased the estate in September 1877 -- a structure now towering over a community of private homes that have seen better days. Douglass arrived as the 60-year-old United States Marshal for the District of Columbia, cementing his status as a pivotal abolitionist figure. The home stands as a relic of Douglass' unprecedented power to break racial barriers with his voice and pen.
"I trust I am not dreaming, but the events taking place seem like a dream," said Douglass after the District's 1862 decision to free its remaining 3,128 slaves.
One and a half centuries later, some D.C. residents are at a loss for words. At a time when men and women of all races can serve in elected office, Capitol Hill appears to be impervious to the circumstances crippling spots like Ward 8. Weave your way through the area's roads of unrelenting poverty, and you have to believe that Douglass would be infuriated by the conditions surrounding his home. On paper, Anacostia is plagued by a 28 percent unemployment rate. In person, boarded-up residences, gated businesses and barren plots of land are commonplace, painting a scene that resembles a nightmare more than anything else.
What sympathy would Douglass have for our government today? To reach the height of his picturesque Cedar Hill home, he had to fight through more than just unemployment. For 77 years, Douglass knew what it was like to live without control. As a young boy, he taught himself to read in the face of zero educational opportunities. As an enslaved man, he disguised himself as a sailor and used a friend's passport to escape the beatings that suffocated his adolescence. As a free man, he earned money primarily from public speaking -- funds attained through prose that often denounced the institution responsible for stifling his own progress: slavery.
Knowing that politics' fickle nature had the power to erase years of positives, Douglass built his battles for the long haul. At the time of his death, the African-American community was still mired in its quest for equality. The term "free" was little more than a label for many blacks, and this battle received little official help until 1964's landmark Civil Rights Act. Douglass knew that to generate momentum, the average citizen needed to do more than just accept the status quo. They needed to "agitate."
Fast forward to 2012, and part of the agitation stems from politicians themselves. Exhibit A: former D.C. mayor and current City Councilmember Marion Barry. To "celebrate" his victory in April's Ward 8 primary, Barry suffered a severe case of foot-in-mouth syndrome. Forty-eight hours after winning the Democratic nod, he offered some insight on the situation in his area, choosing words that veered far away from Douglass' vision.
"We got to do something about these Asians coming in and opening up businesses and dirty shops," Barry said. "They ought to go. I'm going to say that right now. But we need African-American businesspeople to be able to take their places, too."
On days like this, comments like that revive the very warnings Douglass stressed. In April 1865, he authored a speech entitled "What the Black Man Wants." Douglass expressed his unwavering desire for "immediate, unconditional, and universal" enfranchisement. "Without this, [our] liberty is a mockery," he wrote.
At the close of the tour, those words were indelibly stamped in my brain. Exit through the front door, and you stand atop Cedar Hill one more time, surveying a pristine view of Washington's low-lying skyline of monuments. Topping that list is the U.S. Capitol building. If Douglass were to stare at that structure today, the likely message to Congress would be "is anyone home?" Government response aside, he would then turn to the people, reminding them that this all begins with their vote.
CORRECTION: A previous version of this post listed Douglass as the Grand Marshal of D.C. His title was in fact the United States Marshal for the District of Columbia. Douglass also purchased his Cedar Hill home in September 1877, not 1878 -- a 9.75-acre spot of land that was expanded to 15.5 acres the following year. | {
"pile_set_name": "Pile-CC"
} | 0 |
Q:
Stata regular expressions
I need to use a regular expression to extract a part of a string variable. My data looks like this where a represents alpha characters x and Z represent numerical characters. I want to extract the Z characters before the "-"
var1
"aaa xxx xxx ZZZ-ZZZ-a"
"aaa xx xxx ZZZ-ZZ"
My code looks like this
gen p_id = regexs(1) if regexm(var1, "([0-9][0-9][0-9])[-]*[0-9][0-9][-]*[ a-zA-Z]*$")
This code extracts more than what is required. For example, this code extracts the numerical portion from an observation that looks like this. specifically it extracts ZZZ
var1
"aaa ZZZZZ aaa"
I played around with expressions but cannot get the required answer.
A:
As often seems to happen, deciding in advance that the solution must be based on regular expressions just complicates your code. From your description you need the three characters before the first "-". That would be
gen p_id = substr(var1, strpos(var1, "-") - 3, 3)
Test example:
clear
input str21 var1
"aaa xxx xxx 123-ZZZ-a"
"aaa xx xxx 567-ZZ"
end
gen p_id = substr(var1, strpos(var1, "-") - 3, 3)
list
+------------------------------+
| var1 p_id |
|------------------------------|
1. | aaa xxx xxx 123-ZZZ-a 123 |
2. | aaa xx xxx 567-ZZ 567 |
+------------------------------+
| {
"pile_set_name": "StackExchange"
} | 0.008863 |
Description: Cute teen Vannessa Phoenix is barely legal but already a connoisseur of cocks. This honey will put anything in her mouth, but a monster cock like this dude has is what she prefers to nibble on while laying around in bed. | {
"pile_set_name": "Pile-CC"
} | 0.008584 |
Sign up for our newsletter to track money’s influence on U.S. elections and public policy. | {
"pile_set_name": "OpenWebText2"
} | 0 |
% Copyright 2006 by Till Tantau
%
% This file may be distributed and/or modified
%
% 1. under the LaTeX Project Public License and/or
% 2. under the GNU Free Documentation License.
%
% See the file doc/generic/pgf/licenses/LICENSE for more details.
\section{Key Management}
\label{section-keys}
This section describes the package |pgfkeys|. It is loaded automatically by
both \pgfname\ and \tikzname.
\begin{package}{pgfkeys}
This package can be used independently of \pgfname. Note that no
other package of \pgfname\ needs to be loaded (so neither the
emulation layer nor the system layer is needed). The Con\TeX t
abbreviation is |pgfkey| \todosp{pgfkey --> pgfkeys?} if |pgfmod| is not loaded.
\end{package}
\subsection{Introduction}
\subsubsection{Comparison to Other Packages}
The |pgfkeys| package defines a key--value management system that is in some
sense similar to the more light-weight |keyval| system and the improved
|xkeyval| system. However, |pgfkeys| uses a slightly different philosophy than
these systems and it will coexist peacefully with both of them.
The main differences between |pgfkeys| and |xkeyval| are the following:
%
\begin{itemize}
\item |pgfkeys| organizes keys in a tree, while |keyval| and |xkeyval|
use families. In |pgfkeys| the families correspond to the root
entries of the key tree.
\item |pgfkeys| has no save-stack impact (you will have to read the \TeX
Book very carefully to appreciate this).
\item |pgfkeys| is slightly slower than |keyval|, but not much.
\item |pgfkeys| supports styles. This means that keys can just stand for
other keys (which can stand for other keys in turn or which can also
just execute some code). \tikzname\ uses this mechanism heavily.
\item |pgfkeys| supports multi-argument key code. This can, however, be
emulated in |keyval|.
\item |pgfkeys| supports handlers. These are call-backs that are called
when a key is not known. They are very flexible, in fact even
defining keys in different ways is handled by, well, handlers.
\end{itemize}
\subsubsection{Quick Guide to Using the Key Mechanism}
The following quick guide to \pgfname's key mechanism only treats the most
commonly used features. For an in-depth discussion of what is going on, please
consult the remainder of this section.
Keys are organized in a large tree that is reminiscent of the Unix file tree. A
typical key might be, say, |/tikz/coordinate system/x| or just |/x|. Again as
in Unix, when you specify keys you can provide the complete path of the key,
but you usually just provide the name of the key (corresponding to the file
name without any path) and the path is added automatically.
Typically (but not necessarily) some code is associated with a key. To execute
this code, you use the |\pgfkeys| command. This command takes a list of
so-called key--value pairs. Each pair is of the form \meta{key}|=|\meta{value}.
For each pair the |\pgfkeys| command will execute the code stored for the
\meta{key} with its parameter set to \meta{value}.
Here is a typical example of how the |\pgfkeys| command is used:
%
\begin{codeexample}[code only]
\pgfkeys{/my key=hallo,/your keys/main key=something\strange,
key name without path=something else}
\end{codeexample}
Now, to set the code that is stored in a key you do not need to learn a new
command. Rather, the |\pgfkeys| command can also be used to set the code of a
key. This is done using so-called \emph{handlers}. They look like keys whose
names look like ``hidden files in Unix'' since they start with a dot. The
handler for setting the code of a key is appropriately called |/.code| and it
is used as follows:
%
\begin{codeexample}[]
\pgfkeys{/my key/.code=The value is '#1'.}
\pgfkeys{/my key=hi!}
\end{codeexample}
%
As you can see, in the first line we defined the code for the key |/my key|. In
the second line we executed this code with the parameter set to |hi!|.
There are numerous handlers for defining a key. For instance, we can also
define a key whose value actually consists of more than one parameter.
%
\begin{codeexample}[]
\pgfkeys{/my key/.code 2 args=The values are '#1' and '#2'.}
\pgfkeys{/my key={a1}{a2}}
\end{codeexample}
We often want to have keys where the code is called with some default value if
the user does not provide a value. Not surprisingly, this is also done using a
handler, this time called |/.default|.
%
\begin{codeexample}[]
\pgfkeys{/my key/.code=(#1)}
\pgfkeys{/my key/.default=hello}
\pgfkeys{/my key=hallo,/my key}
\end{codeexample}
The other way round, it is also possible to specify that a value \emph{must} be
specified, using a handler called |/.value required|. Finally, you can also
require that no value \emph{may} be specified using |/.value forbidden|.
All keys for a package like, say, \tikzname\ start with the path |/tikz|. We
obviously do not like to write this path down every time we use a key (so we do
not have to write things like |\draw[/tikz/line width=1cm]|). What we need is
to somehow ``change the default path to a specific location''. This is done
using the handler |/.cd| (for ``change directory''). Once this handler has been
used on a key, all subsequent keys {\itshape in the current call of |\pgfkeys|
only} are automatically prefixed with this path, if necessary.
Here is an example:
%
\begin{codeexample}[code only]
\pgfkeys{/tikz/.cd,line width=1cm,line cap=round}
\end{codeexample}
%
This makes it easy to define commands like |\tikzset|, which could be defined
as follows (the actual definition is a bit faster, but the effect is the same):
%
\begin{codeexample}[code only]
\def\tikzset#1{\pgfkeys{/tikz/.cd,#1}}
\end{codeexample}
When a key is handled, instead of executing some code, the key can also cause
further keys to be executed. Such keys will be called \emph{styles}. A style
is, in essence, just a key list that should be executed whenever the style is
executed. Here is an example:
%
\begin{codeexample}[]
\pgfkeys{/a/.code=(a:#1)}
\pgfkeys{/b/.code=(b:#1)}
\pgfkeys{/my style/.style={/a=foo,/b=bar,/a=#1}}
\pgfkeys{/my style=wow}
\end{codeexample}
%
As the above example shows, styles can also be parameterized, just like the
normal code keys.
As a typical use of styles, suppose we wish to set up the key |/tikz| so that
it will change the default path to |/tikz|. This can be achieved as follows:
%
\begin{codeexample}[code only]
\pgfkeys{/tikz/.style=/tikz/.cd}
\pgfkeys{tikz,line width=1cm,draw=red}
\end{codeexample}
Note that when |\pgfkeys| is executed, the default path is set to~|/|. This
means that the first |tikz| will be completed to |/tikz|. Then |/tikz| is a
style and, thus, replaced by |/tikz/.cd|, which changes the default path to
|/tikz|. Thus, the |line width| is correctly prefixed with |/tikz|.
\subsection{The Key Tree}
The |pgfkeys| package organizes keys in a so-called \emph{key tree}. This tree
will be familiar to anyone who has used a Unix operating system: A key is
addressed by a path, which consists of different parts separated by slashes. A
typical key might be |/tikz/line width| or just |/tikz| or something more
complicated like |/tikz/cs/x/.store in|.
Let us fix some further terminology: Given a key like |/a/b/c|, we call the
part leading up the last slash (|/a/b|) the \emph{path} of the key. We call
everything after the last slash (|c|) the \emph{name} of the key (in a file
system this would be the file name).
We do not always wish to specify keys completely. Instead, we usually specify
only part of a key (typically only the name) and the \emph{default path} is
then added to the key at the front. So, when the default path is |/tikz| and
you refer to the (partial) key |line width|, the actual key that is used is
|/tikz/line width|. There is a simple rule for deciding whether a key is a
partial key or a full key: If it starts with a slash, then it is a full key and
it is not modified; if it does not start with a slash, then the default path is
automatically prefixed.
Note that the default path is not the same as a search path. In particular, the
default path is just a single path. When a partial key is given, only this
single default path is prefixed; |pgfkeys| does not try to look up the key in
different parts of a search path. It is, however, possible to emulate search
paths, but a much more complicated mechanism must be used.
When you set keys (to be explained in a moment), you can freely mix partial and
full keys and you can change the default path. This makes it possible to
temporarily use keys from another part of the key tree (this turns out to be a
very useful feature).
Each key (may) store some \emph{tokens} and there exist commands, described
below, for setting, getting, and changing the tokens stored in a key. However,
you will only very seldom use these commands directly. Rather, the standard way
of using keys is the |\pgfkeys| command or some command that uses it internally
like, say, |\tikzset|. So, you may wish to skip the following commands and
continue with the next subsection.
\begin{command}{\pgfkeyssetvalue\marg{full key}\marg{token text}}
Stores the \meta{token text} in the \meta{full key}. The \meta{full key}
may not be a partial key, so no default-path-adding is done. The
\meta{token text} can be arbitrary tokens and may even contain things like
|#| or unbalanced \TeX-ifs.
%
\begin{codeexample}[]
\pgfkeyssetvalue{/my family/my key}{Hello, world!}
\pgfkeysvalueof{/my family/my key}
\end{codeexample}
The setting of a key is always local to the current \TeX\ group.
\end{command}
\begin{command}{\pgfkeyslet\marg{full key}\marg{macro}}
Performs a |\let| statement so the \meta{full key} points to the contents
of \meta{macro}.
%
\begin{codeexample}[]
\def\helloworld{Hello, world!}
\pgfkeyslet{/my family/my key}{\helloworld}
\pgfkeysvalueof{/my family/my key}
\end{codeexample}
%
You should never let a key be equal to |\relax|. Such a key may or may not
be indistinguishable from an undefined key.
\end{command}
\begin{command}{\pgfkeysgetvalue\marg{full key}\marg{macro}}
Retrieves the tokens stored in the \meta{full key} and lets \meta{macro} be
equal to these tokens. If the key has not been set, the \meta{macro} will
be equal to |\relax|.
%
\begin{codeexample}[]
\pgfkeyssetvalue{/my family/my key}{Hello, world!}
\pgfkeysgetvalue{/my family/my key}{\helloworld}
\helloworld
\end{codeexample}
%
\end{command}
\begin{command}{\pgfkeysvalueof\marg{full key}}
Inserts the value stored in \meta{full key} at the current position into
the text.
%
\begin{codeexample}[]
\pgfkeyssetvalue{/my family/my key}{Hello, world!}
\pgfkeysvalueof{/my family/my key}
\end{codeexample}
%
\end{command}
\begin{command}{\pgfkeysifdefined\marg{full key}\marg{if}\marg{else}}
Checks whether this key was previously set using either |\pgfkeyssetvalue|
or |\pgfkeyslet|. If so, the code in \meta{if} is executed, otherwise the
code in \meta{else}.
This command will use e\TeX's |\ifcsname| command, if available, for
efficiency. This means, however, that it may behave differently for \TeX\
and for e\TeX\ when you set keys to |\relax|. For this reason you should
not do so.
%
\begin{codeexample}[]
\pgfkeyssetvalue{/my family/my key}{Hello, world!}
\pgfkeysifdefined{/my family/my key}{yes}{no}
\end{codeexample}
%
\end{command}
\subsection{Setting Keys}
Settings keys is done using a powerful command called |\pgfkeys|. This command
takes a list of so-called \emph{key--value pairs}. These are pairs of the form
\meta{key}|=|\meta{value}. The principal idea is the following: For each pair
in the list, some \emph{action} is taken. This action can be one of the
following:
%
\begin{enumerate}
\item A command is executed whose argument(s) are \meta{value}. This
command is stored in a special subkey of \meta{key}.
\item The \meta{value} is stored in the \meta{key} itself.
\item If the key's name (the part after the last slash) is a known
\emph{handler}, then this handler will take care of the key.
\item If the key is totally unknown, one of several possible \emph{unknown
key handlers} is called.
\end{enumerate}
Additionally, if the \meta{value} is missing, a default value may or may not be
substituted. Before we plunge into all the details, let us have a quick look at
the command itself.
\begin{command}{\pgfkeys\marg{key list}}
The \meta{key list} should be a list of key--value pairs, separated by
commas. A key--value pair can have the following two forms:
\meta{key}|=|\meta{value} or just \meta{key}. Any spaces around the
\meta{key} or around the \meta{value} are removed. It is permissible to
surround both the \meta{key} or the \meta{value} in curly braces, which are
also removed. Especially putting the \meta{value} in curly braces needs to
be done quite often, namely whenever the \meta{value} contains an
equal-sign or a comma.
The key--value pairs in the list are handled in the order they appear. How
this handling is done, exactly, is described in the rest of this section.
If a \meta{key} is a partial key, the current value of the default path is
prefixed to the \meta{key} and this ``upgraded'' key is then used. The
default path is just the root path |/| when the first key is handled, but
it may change later on. At the end of the command, the default path is
reset to the value it had before this command was executed.
Calls of this command may be nested. Thus, it is permissible to call
|\pgfkeys| inside the code that is executed for a key. Since the default
path is restored after a call of |\pgfkeys|, the default path will not
change when you call |\pgfkeys| while executing code for a key (which is
exactly what you want).
\end{command}
\begin{command}{\pgfqkeys\marg{default path}\marg{key list}}
This command has the same effect as |\pgfkeys{|\meta{default
path}|/.cd,|\meta{key list}|}|, it is only marginally quicker. This command
should not be used in user code, but rather in commands like |\tikzset| or
|\pgfset| that get called very often.
\end{command}
\begin{command}{\pgfkeysalso\marg{key list}}
This command has exactly the same effect as |\pgfkeys|, only the default
path is not modified before or after the keys are being set. This command
is mainly intended to be called by the code that is being processed for a
key.
\end{command}
\begin{command}{\pgfqkeysalso\marg{default path}\marg{key list}}
This command has the same effect as |\pgfkeysalso{|\meta{default
path}|/.cd,|\meta{key list}|}|, it is only quicker. Changing the default
path inside a |\pgfkeyalso| is dangerous, so use with care. A rather safe
place to call this command is at the beginning of a \TeX\ group.
\end{command}
\subsubsection{First Char Syntax Detection}
\label{sec:pgf:first:char:syntax}
Usually, keys are of the form \meta{key}|=|\meta{value} and how such keys are
handled is discussed in the rest of this section. However, it is also possible
to setup a different syntax for certain parts of the input to |\pgfkeys|. Since
this is a rather advanced option, most readers may wish to skip the following
discussion upon first reading; it is discussed here because this special syntax
detection is the very first thing that is done when a key is processed, before
any of the following operations are performed.
The |\pgfkeys| command and its variants decompose their input into a list of
\meta{string}s that are separated by commas. By default, each such
\meta{string} must either have the form \meta{key}|=|\meta{value} or of the
form \meta{key} with the value-part missing. However, you might wish to
interpret some of these strings differently. For instance, when a \meta{string}
has the form |"|\meta{text}|"|, you might wish the \meta{string} to be
interpreted as if one had written |label text={|\meta{text}|}|. Then, people
could write
%
\begin{codeexample}[code only]
\myset{red, "main valve", thick}
\end{codeexample}
%
instead of the more cumbersome
%
\begin{codeexample}[code only]
\myset{red, label text=main valve, thick}
\end{codeexample}
%
An example where such a syntax reinterpretation is done is the |quotes|
library, which allows you to write things like
%
\begin{codeexample}[preamble={\usetikzlibrary{graphs,quotes}}]
\tikz \graph { a ->["1" red] b ->["0"] c };
\end{codeexample}
%
\noindent instead of the somewhat longer
%
\begin{codeexample}[preamble={\usetikzlibrary{graphs}}]
\tikz \graph { a ->[edge node={node[red,auto]{1}}] b ->[edge label=0] c };
\end{codeexample}
In order to detect whether a \meta{string} has a special syntax, you can
request that the \emph{first character} of \meta{string} is analysed by the key
parser. If this first character matches a character that has been flagged as a
special character, the \meta{string} is not interpreted as a usual key--value
pair. Instead, \meta{string} is passed as a parameter to a special macro that
should take care of the \meta{string}. After this macro has finished, the
parsing continues with the \meta{next string} in the list.
In order to setup a special syntax handling for \meta{strings} that begin with
a certain character, two things need to be done:
%
\begin{enumerate}
\item First, the whole first char syntax detection must be ``switched on'',
since, by default, it is turned off for efficiency reasons (the
overhead is rather small, however). This is done by setting the
following key:
%
\begin{key}{/handlers/first char syntax=\opt{\meta{true or false}} (default true, initially false)}
\end{key}
\item Second, in order to handle strings starting with a certain
\meta{character} in a special way, you need to store a macro in the
following key:
%
\begin{key}{/handlers/first char syntax/\meta{meaning of character}}
The \meta{meaning of character} should be the text that \TeX's
command |\meaning| returns for a macro that has been |\let| to the
\meta{character}. For instance, when strings starting with |"|
should be treated in a special way, the \meta{meaning of character}
would be the string |the character "| since this is what \TeX\
writes when you say
%
\begin{codeexample}[]
\let\mycharacter="
\meaning\mycharacter
\end{codeexample}
%
Now, the key |/handlers/first char syntax/|\meta{meaning of
character} should be setup (using |\pgfkeyssetvalue| or using the
|.initial| handler) to store a \meta{macro name}.
If this is the case and if \meta{string} starts with the
\meta{character} (blanks at the beginning of \meta{string} are
deleted prior to this test), then \meta{macro name} is called with
\meta{string} as its argument.
\end{key}
\end{enumerate}
Let us now have a look at an example. We install two handlers, one for strings
starting with |"| and one for strings starting with |<|.
%
\begin{codeexample}[]
\pgfkeys{
/handlers/first char syntax=true,
/handlers/first char syntax/the character "/.initial=\myquotemacro,
/handlers/first char syntax/the character </.initial=\mypointedmacro,
}
\def\myquotemacro#1{Quoted: #1. }
\def\mypointedmacro#1{Pointed: #1. }
\ttfamily \pgfkeys{"foo", <bar>}
\end{codeexample}
Naturally, in the above examples, the two handling macros did not do something
particularly exciting. In the next example, we setup a more elaborate macro
that mimics a small part the behaviour of the |quotes| library, only for single
quotes:
%
\begin{codeexample}[]
\pgfkeys{
/handlers/first char syntax=true,
/handlers/first char syntax/the character '/.initial=\mysinglequotemacro
}
\def\mysinglequotemacro#1{\pgfkeysalso{label={#1}}}
\tikz \node [circle, 'foo', draw] {bar};
\end{codeexample}
Note that in the above example, the macro |\mysinglequotemacro| gets passed the
complete string, including the single quotes. It is the job of the macro to get
rid of them, if this is necessary.
The first char syntax detection allows you to perform rather powerful
transformations on the syntax of keys -- provided you can ``pin down'' the
syntax on the first character. In the following example, you can write
expressions in parentheses in front of a key--value pair and the pair will only
be executed when the expression evaluates to true:
%
\begin{codeexample}[]
\pgfkeys{
/handlers/first char syntax=true,
/handlers/first char syntax/the character (/.initial=\myparamacro
}
\def\myparamacro#1{\myparaparser#1\someendtext}
\def\myparaparser(#1)#2\someendtext{
\pgfmathparse{#1}
\ifx\pgfmathresult\onetext
\pgfkeysalso{#2}
\fi
}
\def\onetext{1}
\foreach \i in {1,...,4}
\tikz \node [draw, thick, rectangle, (pi>\i) circle, (pi>\i*2) draw=red] {x};
\end{codeexample}
\subsubsection{Default Arguments}
The arguments of the |\pgfkeys| command can either be of the form
\meta{key}|=|\meta{value} or of the form \meta{key} with the value-part
missing. In the second case, the |\pgfkeys| will try to provide a \emph{default
value} for the \meta{value}. If such a default value is defined, it will be
used as if you had written \meta{key}|=|\meta{default value}.
In the following, the details of how default values are determined is
described; however, you should normally use the handlers |/.default| and
|/.value required| as described in Section~\ref{section-default-handlers} and
you may wish to skip the following details.
When |\pgfkeys| encounters a \meta{key} without an equal-sign, the following
happens:
%
\begin{enumerate}
\item The input is replaced by \meta{key}|=\pgfkeysnovalue|. In particular,
the commands |\pgfkeys{my key}| and
% FIXME: there is a bug in the pretty printer ... fix it and get rid of '||' here:
|\pgfkeys{my key=||\pgfkeysnovalue}| have exactly the same effect and
you can ``simulate'' a missing value by providing the value
|\pgfkeysnovalue|, which is sometimes useful.
\item If the \meta{value} is |\pgfkeysnovalue|, then it is checked whether
the subkey \meta{key}|/.@def| exists. For instance, if you write
|\pgfkeys{/my key}|, then it is checked whether the key |/my key/.@def|
exists.
\item If the key \meta{key}|/.@def| exists, then the tokens stored in this
key are used as \meta{value}.
\item If the key does not exist, then |\pgfkeysnovalue| is used as the
\meta{value}.
\item At the end, if the \meta{value} is now equal to
|\pgfkeysvaluerequired|, then the code (or something fairly equivalent)
|\pgfkeys{/errors/value required=|\meta{key}|{}}| is executed. Thus, by
changing this key you can change the error message that is printed or
you can handle the missing value in some other way.
\end{enumerate}
\subsubsection{Keys That Execute Commands}
\label{section-key-code}
After the transformation process described in the previous subsection, we
arrive at a key of the form \meta{key}=\meta{value}, where \meta{key} is a full
key. Different things can now happen, but always the macro |\pgfkeyscurrentkey|
will have been set up to expand to the text of the \meta{key} that is currently
being processed.
The first things that is tested is whether the key \meta{key}|/.@cmd| exists.
If this is the case, then it is assumed that this key stores the code of a
macro and this macro is executed. The argument of this macro is \meta{value}
directly followed by |\pgfeov|, which stands for ``end of value''. The
\meta{value} is not surrounded by braces. After this code has been executed,
|\pgfkeys| continues with the next key in the \meta{key list}.
It may seem quite peculiar that the macro stored in the key \meta{key}|/.@cmd|
is not simply executed with the argument |{|\meta{value}|}|. However, the
approach taken in the |pgfkeys| packages allows for more flexibility. For
instance, assume that you have a key that expects a \meta{value} of the form
``\meta{text}|+|\meta{more text}'' and wishes to store \meta{text} and
\meta{more text} in two different macros. This can be achieved as follows:
%
\begin{codeexample}[]
\def\mystore#1+#2\pgfeov{\def\a{#1}\def\b{#2}}
\pgfkeyslet{/my key/.@cmd}{\mystore}
\pgfkeys{/my key=hello+world}
|\a| is \a, |\b| is \b.
\end{codeexample}
Naturally, defining the code to be stored in a key in the above manner is too
awkward. The following commands simplify things a bit, but the usual manner of
setting up code for a key is to use one of the handlers described in
Section~\ref{section-code-handlers}.
\begin{command}{\pgfkeysdef\marg{key}\marg{code}}
This command temporarily defines a \TeX-macro with the argument list
|#1\pgfeov| and then lets \meta{key}|/.@cmd| be equal to this macro. The
net effect of all this is that you have then set up code for the key
\meta{key} so that when you write |\pgfkeys{|\meta{key}|=|\meta{value}|}|,
then the \meta{code} is executed with all occurrences of |#1| in
\meta{code} being replaced by \meta{value}. (This behaviour is quite
similar to the |\define@key| command of |keyval| and |xkeyval|).
%
\begin{codeexample}[]
\pgfkeysdef{/my key}{#1, #1.}
\pgfkeys{/my key=hello}
\end{codeexample}
\end{command}
\begin{command}{\pgfkeysedef\marg{key}\marg{code}}
This command works like |\pgfkeysdef|, but it uses |\edef| rather than
|\def| when defining the key macro. If you do not know the difference
between the two, then you will not need this command; and if you know the
difference, then you will know when you need this command.
\end{command}
\begin{command}{\pgfkeysdefnargs\marg{key}\marg{argument count}\marg{code}}
This command works like |\pgfkeysdef|, but it allows you to provide an
arbitrary \meta{argument count} between $0$ and $9$ (inclusive).
%
\begin{codeexample}[]
\pgfkeysdefnargs{/my key}{2}{\def\a{#1}\def\b{#2}}
\pgfkeys{/my key=
{hello}
{world}}
|\a| is `\a', |\b| is `\b'.
\end{codeexample}
%
The resulting key will expect exactly \marg{argument count} arguments.
\end{command}
%
\begin{command}{\pgfkeysedefnargs\marg{key}\marg{argument count}\marg{code}}
The |\edef| version of |\pgfkeysdefnargs|.
\end{command}
\begin{command}{\pgfkeysdefargs\marg{key}\marg{argument pattern}\marg{code}}
This command works like |\pgfkeysdefnargs|, but it allows you to provide an
arbitrary \meta{argument pattern} rather than just a number of arguments.
%
\begin{codeexample}[]
\pgfkeysdefargs{/my key}{#1+#2}{\def\a{#1}\def\b{#2}}
\pgfkeys{/my key=hello+world}
|\a| is \a, |\b| is \b.
\end{codeexample}
%
Note that |\pgfkeysdefnargs| is \emph{better} when it comes to simple
argument \emph{counts}\footnote{When the resulting keys are used, the
\texttt{defnargs} variant allows spaces between arguments whereas the
\texttt{defargs} variant does not; it considers the spaces as part of the
argument.}.
\end{command}
\begin{command}{\pgfkeysedefargs\marg{key}\marg{argument pattern}\marg{code}}
The |\edef| version of |\pgfkeysdefargs|.
\end{command}
\subsubsection{Keys That Store Values}
Let us continue with what happens when |\pgfkeys| processes the current key and
the subkey \meta{key}|/.@cmd| is not defined. Then it is checked whether the
\meta{key} itself exists (has been previously assigned a value using, for
instance, |\pgfkeyssetvalue|). In this case, the tokens stored in \meta{key}
are replaced by \meta{value} and |\pgfkeys| proceeds with the next key in the
\meta{key list}.
\subsubsection{Keys That Are Handled}
\label{section-key-handlers}
If neither the \meta{key} itself nor the subkey \meta{key}|/.@cmd| are defined,
then the \meta{key} cannot be processed ``all by itself''. Rather, a
\meta{handler} is needed for this key. Most of the power of |pgfkeys| comes
from the proper use of such handlers.
Recall that the \meta{key} is always a full key (if it was not originally, it
has already been upgraded at this point to a full key). It decomposed into two
parts:
\begin{enumerate}
\item The \meta{path} of \meta{key} (everything before the last slash) is
stored in the macro |\pgfkeyscurrentpath|.
\item The \meta{name} of \meta{key} (everything after the last slash) is
stored in the macro |\pgfkeyscurrentname|.
It is recommended (but not necessary) that the name of a handler starts
with a dot (but not with |.@|), so that they are easy to detect for the
reader.
\end{enumerate}
(For efficiency reasons, these two macros are only set up at this point; so
when code is executed for a key in the ``usual'' manner then these macros are
not set up.)
The |\pgfkeys| command now checks whether the key
|/handlers/|\meta{name}|/.@cmd| exists. If so, it should store a command and
this command is executed exactly in the same manner as described in
Section~\ref{section-key-code}. Thus, this code gets the \meta{value} that was
originally intended for \meta{key} as its argument, followed by |\pgfeov|. It
is the job of the handlers to do something useful with the \meta{value}.
For an example, let us write a handler that will output the value stored in a
key to the log file. We call this handler |/.print to log|. The idea is that
when someone tries to use the key |/my key/.print to log|, then this key will
not be defined and the handler gets executed. The handler will then have access
to the path-part of the key, which is |/my key|, via the macro
|\pgfkeyscurrentpath|. It can then lookup which value is stored in this key and
print it.
%
\begin{codeexample}[code only]
\pgfkeysdef{/handlers/.print to log}
{%
\pgfkeysgetvalue{\pgfkeyscurrentpath}{\temp}
\writetolog{\temp}
}
\pgfkeyssetvalue{/my key}{Hi!}
...
\pgfkeys{/my key/.print to log}
\end{codeexample}
%
The above code will print |Hi!| in the log, provided the macro |\writetolog| is
set up appropriately.
For a more interesting handler, let us program a handler that will set up a key
so that when the key is used, some code is executed. This code is given as
\meta{value}. All the handler must do is to call |\pgfkeysdef| for the path of
the key (which misses the handler's name) and assign the parameter value to it.
%
\begin{codeexample}[]
\pgfkeysdef{/handlers/.my code}{\pgfkeysdef{\pgfkeyscurrentpath}{#1}}
\pgfkeys{/my key/.my code=(#1)}
\pgfkeys{/my key=hallo}
\end{codeexample}
There are some parameters for handled keys which prove to be useful in some
(possibly rare) special cases:
%
\begin{key}{/handler config=\mchoice{all,only existing,full or existing} (initially all)}
Changes the initial configuration how key handlers will be used.
This configuration is for advanced users and rarely necessary.
%
\begin{description}
\item[\texttt{all}] The preconfigured setting |all| works as described
above and imposes no restriction on the key setting process.
\item[\texttt{only existing}] The value |only existing| modifies the
algorithm for handled keys as follows: a handler \meta{key
name}|/.|\meta{handler} will be executed only if \meta{key name} is
either a key which stores its value directly or a command key for
which |/.@cmd| exists. If \meta{key name} does \emph{not} exist
already, the complete string \meta{key name}|/.|\meta{handler} is
considered to be an unknown key and the procedure described in the
next section applies (for the path of \meta{key name}).
%
\begin{codeexample}[]
% Define a test key and error handlers:
\pgfkeys{/the/key/.code={Initial definition. }}
\pgfkeys{/handlers/.unknown/.code={Unknown key `\pgfkeyscurrentkey'. }}
% calling the test key yields 'Initial definition. ':
\pgfkeys{/the/key}
% Change configuration:
\pgfkeys{/handler config=only existing}
% allowed: key *re*-definition:
\pgfkeys{/the/key/.code={Re-Definition. }}
% calling the key yields 'Re-Definition. ':
\pgfkeys{/the/key}
% not allowed: definition of new keys:
% this checks for '/the/other key/.unknown'
% and '/handlers/.unknown'
% and yields finally
% 'Unknown key `/the/other key/.code`'
\pgfkeys{/the/other key/.code={New definition. }}
\end{codeexample}
%
It is necessary to exclude some key handlers from this procedure.
Altogether, the detailed procedure is as follows:
%
\begin{enumerate}
\item If a handled key like |/a path/a key/.a handler=value| is
encountered, it is checked whether the handler should be
invoked. This is the case if
%
\begin{itemize}
\item An exception from |only existing| for this key
exists (see below),
\item The key |/a path/a key| exists already -- either
directly as storage key or with the |.@cmd| suffix.
\end{itemize}
%
\item If the check passes, everything works as before.
\item If the check fails, the complete key will be considered
to be unknown. In that case, the handling of unknown keys
as described in the next section applies. There, the
current key path will be set to |/a path| and the current
key's name to |key/.a handler|.
\end{enumerate}
A consequence of this configuration is to provide more meaningful
processing of handled keys if a search path for keys is in effect,
see section~\ref{sec:pgf:unknown:keys} for an example.
\item[\texttt{full or existing}] Finally, the choice |full or existing|
is a variant of |only existing|: it works in the same way for keys
which do not have a full key path. For example, the style
|\pgfkeys{/my path/.cd,key/.style={|$\dotsc$|}}|
can only be redefined: it doesn't have a full path, so the
|only existing| mechanism applies. But the style
|\pgfkeys{/my path/key/.style={|$\dotsc$|}}|
will still work. This allows users to override the |only existing|
feature if they know what they're doing (and provide full key
paths).
\end{description}
\end{key}
\begin{key}{/handler config/only existing/add exception=\marg{key handler name}}
Allows to add exceptions to the |/handler config=only existing| feature.
Initially exceptions for the key handlers |/.cd|, |/.try|, |/.retry|,
|/.lastretry| and |/.unknown| are defined. The value \marg{key handler
name} should be the name of a key handler.
\end{key}
\subsubsection{Keys That Are Unknown}
\label{sec:pgf:unknown:keys}
For some keys, neither the key, nor its |.@cmd| subkey nor a handler is
defined. In this case, it is checked whether the key \meta{current
path}|/.unknown/.@cmd| exists. Thus, when you try to use the key
|/tikz/strange|, then it is checked whether |/tikz/.unknown/.@cmd| exists. If
this key exists (which it does), it is executed. This code can then try to make
sense of the key. For instance, the handler for \tikzname\ will try to
interpret the key's name as a color or as an arrow specification or as a
\pgfname\ option.
You can set up unknown key handlers for your own keys by simply setting the
code of the key \meta{my path prefix}|/.unknown|. This also allows you to set
up ``search paths''. The idea is that you would like keys to be searched not
only in a single default path, but in several. Suppose, for instance, that you
would like keys to be searched for in |/a|, |/b|, and |/b/c|. We set up a key
|/my search path| for this:
%
\begin{codeexample}[code only]
\pgfkeys{/my search path/.unknown/.code=
{%
\let\searchname=\pgfkeyscurrentname%
\pgfkeysalso{%
/a/\searchname/.try=#1,
/b/\searchname/.retry=#1,
/b/c/\searchname/.retry=#1%
}%
}%
}
\pgfkeys{/my search path/.cd,foo,bar}
\end{codeexample}
%
In the above code, |foo| and |bar| will be searched for in the three
directories |/a|, |/b|, and |/b/c|. Before you start implementing search paths
using this pattern, consider the |/.search also| handler discussed below.
If the key \meta{current path}|/.unknown/.@cmd| does not exist, the handler
|/handlers/.unknown| is invoked instead, which is always defined and which
prints an error message by default.
\subsubsection{Search Paths And Handled Keys}
There is one special case which occurs in the search path example above. What
happens if we want to change a style? For example,
%
\begin{codeexample}[code only]
\pgfkeys{/my search path/.cd,custom/.style={variables}}
\end{codeexample}
%
\noindent could mean a style in |/my search path/|, |/a/|, |/b/| or even
|/b/c/|!
Due to the rules for handled keys, the answer is
|/my search path/custom/.style={variables}|. It may be useful to modify this
default behavior. One useful thing would be to search for \emph{existing}
styles named |custom| and redefine them. For example, if a style |/b/custom|
exists, the assignment |custom/.style={variables}| should probably redefine
|/b/custom| instead of |/my search path/custom|. This can be done using
|handler config|:
%
\begin{codeexample}[]
\pgfkeys{/my search path/.unknown/.code=
{%
\let\searchname=\pgfkeyscurrentname%
\pgfkeysalso{%
/a/\searchname/.try=#1,
/b/\searchname/.retry=#1,
/b/c/\searchname/.retry=#1%
}%
}%
}
% Let's define /b/custom here:
\pgfkeys{/b/custom/.code={This is `\pgfkeyscurrentkey'. }}
% Reconfigure treatment of key handlers:
\pgfkeys{/handler config=only existing}
% The search path procedure will find /b/custom
% -> leads to This is `/b/custom'
\pgfkeys{/my search path/.cd,custom}
% Due to the reconfiguration, this will find /b/custom instead of
% defining /my search path/custom:
\pgfkeys{/my search path/.cd,custom/.append code={Modified. }}
% So using the search path, we again find /b/custom which
% leads to This is `/b/custom' Modified
\pgfkeys{/my search path/.cd,custom}
\end{codeexample}
A slightly different approach to search paths can be realized using the
|/.search also| key handler, see below.
\subsection{Key Handlers}
We now describe which key handlers are defined by default. You can also define
new ones as described in Section~\ref{section-key-handlers}.
\subsubsection{Handlers for Path Management}
\begin{handler}{{.cd}}
This handler causes the default path to be set to \meta{key}. Note that the
default path is reset at the beginning of each call to |\pgfkeys| to be
equal to~|/|.
\example |\pgfkeys{/tikz/.cd,...}|
\end{handler}
\begin{handler}{{.is family}}
\label{section-is family-handler}
This handler sets up things such that when \meta{key} is executed, then the
current path is set to \meta{key}. A typical use is the following:
%
\begin{codeexample}[code only]
\pgfkeys{/tikz/.is family}
\pgfkeys{tikz,line width=1cm}
\end{codeexample}
%
The effect of this handler is the same as if you had written
\meta{key}|/.style=|\meta{key}|/.cd|, only the code produced by the
|/.is family| handler is quicker.
\end{handler}
\subsubsection{Setting Defaults}
\label{section-default-handlers}
\begin{handler}{{.default}|=|\meta{value}}
Sets the default value of \meta{key} to \meta{value}. This means that
whenever no value is provided in a call to |\pgfkeys|, then this
\meta{value} will be used instead.
\example |\pgfkeys{/width/.default=1cm}|
\end{handler}
\begin{handler}{{.value required}}
This handler causes the error message key |/erros/value required| to be
issued whenever the \meta{key} is used without a value.
\example |\pgfkeys{/width/.value required}|
\end{handler}
\begin{handler}{{.value forbidden}}
This handler causes the error message key |/erros/value forbidden| to be
issued whenever the \meta{key} is used with a value.
This handler works be adding code to the code of the key. This means that
you have to define the key first before you can use this handler.
%
\begin{codeexample}[code only]
\pgfkeys{/my key/.code=I do not want an argument!}
\pgfkeys{/my key/.value forbidden}
\pgfkeys{/my key} % Ok
\pgfkeys{/my key=foo} % Error
\end{codeexample}
%
\end{handler}
\subsubsection{Defining Key Codes}
\label{section-code-handlers}
A number of handlers exist for defining the code of keys.
\begin{handler}{{.code}|=|\meta{code}}
This handler executes |\pgfkeysdef| with the parameters \meta{key} and
\meta{code}. This means that, afterwards, whenever the \meta{key} is used,
the \meta{code} gets executed. More precisely, when
\meta{key}|=|\meta{value} is encountered in a key list, \meta{code} is
executed with any occurrence of |#1| replaced by \meta{value}. As always,
if no \meta{value} is given, the default value is used, if defined, or the
special value |\pgfkeysnovalue|.
It is permissible that \meta{code} calls the command |\pgfkeys|. It is also
permissible the \meta{code} calls the command |\pgfkeysalso|, which is
useful for styles, see below.
%
\begin{codeexample}[code only]
\pgfkeys{/par indent/.code={\parindent=#1},/par indent/.default=2em}
\pgfkeys{/par indent=1cm}
...
\pgfkeys{/par indent}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.ecode}|=|\meta{code}}
This handler works like |/.code|, only the command |\pgfkeysedef| is used.
\end{handler}
\begin{handler}{{.code 2 args}|=|\meta{code}}
This handler works like |/.code|, only two arguments rather than one are
expected when the \meta{code} is executed. This means that when
\meta{key}|=|\meta{value} is encountered in a key list, the \meta{value}
should consist of two arguments. For instance, \meta{value} could be
|{first}{second}|. Then \meta{code} is executed with any occurrence of |#1|
replaced |first| and any occurrence of |#2| replaced by |second|.
%
\begin{codeexample}[code only]
\pgfkeys{/page size/.code 2 args={\paperheight=#2\paperwidth=#1}}
\pgfkeys{/page size={30cm}{20cm}}
\end{codeexample}
%
The second argument is optional: if it is not provided, it will be the
empty string.
Because of the special way the \meta{value} is parsed, if you set
\meta{value} to, for instance, |first| (without any braces), then |#1| will
be set to |f| and |#2| will be set to |irst|.
\end{handler}
\begin{handler}{{.ecode 2 args}|=|\meta{code}}
This handler works like |/.code 2 args|, only an |\edef| is used rather
than a |\def| to define the macro.
\end{handler}
\begin{handler}{{.code n args}|=|\marg{argument count}\marg{code}}
This handler also works like |/.code|, but you can now specify a number of
arguments between $0$ and $9$ (inclusive).
%
\begin{codeexample}[]
\pgfkeys{/a key/.code n args={2}{First=`#1', Second=`#2'}}
\pgfkeys{/a key={A}{B}}
\end{codeexample}
%
In contrast to |/.code 2 args|, there must be exactly \meta{argument count}
arguments, not more and not less and these arguments should be properly
delimited.
\end{handler}
\begin{handler}{{.ecode n args}|=|\marg{argument count}\marg{code}}
This handler works like |/.code n args|, only an |\edef| is used rather
than a |\def| to define the macro.
\end{handler}
\begin{handler}{{.code args}|=|\marg{argument pattern}\marg{code}}
This handler is the most flexible way to define a |/.code| key: you can now
specify an arbitrary \meta{argument pattern}. Such a pattern is a usual
\TeX\ macro pattern. For instance, suppose \meta{argument pattern} is
|(#1/#2)| and \meta{key}|=|\meta{value} is encountered in a key list with
\meta{value} being |(first/second)|. Then \meta{code} is executed with any
occurrence of |#1| replaced |first| and any occurrence of |#2| replaced by
|second|. So, the actual \meta{value} is matched against the \meta{argument
pattern} in the standard \TeX\ way.
%
\begin{codeexample}[code only]
\pgfkeys{/page size/.code args={#1 and #2}{\paperheight=#2\paperwidth=#1}}
\pgfkeys{/page size=30cm and 20cm}
\end{codeexample}
Note that |/.code n args| should be preferred in case you need just a
number of arguments (when the resulting keys are used, |/.code n args|
gobbles spaces between the arguments whereas |/.code args| considers spaces
to be part of the argument).
\end{handler}
\begin{handler}{{.ecode args}|=|\marg{argument pattern}\marg{code}}
This handler works like |/.code args|, only an |\edef| is used rather than
a |\def| to define the macro.
\end{handler}
There are also handlers for modifying existing keys.
\begin{handler}{{.add code}|=|\marg{prefix code}\marg{append code}}
This handler adds code to an existing key. The \meta{prefix code} is added
to the code stored in \meta{key}|/.@cmd| at the beginning, the \meta{append
code} is added to this code at the end. Either can be empty. The argument
list of \meta{code} cannot be changed using this handler. Note that both
\meta{prefix code} and \meta{append code} may contain parameters like |#2|.
%
\begin{codeexample}[code only]
\pgfkeys{/par indent/.code={\parindent=#1}}
\newdimen\myparindent
\pgfkeys{/par indent/.add code={}{\myparindent=#1}}
...
\pgfkeys{/par indent=1cm} % This will set both \parindent and
% \myparindent to 1cm
\end{codeexample}
%
\end{handler}
\begin{handler}{{.prefix code}|=|\meta{prefix code}}
This handler is a shortcut for \meta{key}|/.add code={|\meta{prefix
code}|}{}|. That is, this handler adds the \meta{prefix code} at the
beginning of the code stored in \meta{key}|/.@cmd|.
\end{handler}
\begin{handler}{{.append code}|=|\meta{append code}}
This handler is a shortcut for \meta{key}|/.add code={}{|\meta{append
code}|}{}|.
\end{handler}
\subsubsection{Defining Styles}
The following handlers allow you to define \emph{styles}. A style is a key list
that is processed whenever the style is given as a key in a key list. Thus, a
style ``stands for'' a certain key value list. Styles can be parameterized just
like normal code.
\begin{handler}{{.style}|=|\meta{key list}}
This handler sets things up so that whenever \meta{key}|=|\meta{value} is
encountered in a key list, then the \meta{key list}, with every occurrence
of |#1| replaced by \meta{value}, is processed instead. As always, if no
\meta{value} is given, the default value is used, if defined, or the
special value |\pgfkeysnovalue|.
You can achieve the same effect by writing
\meta{key}|/.code=\pgfkeysalso{|\meta{key list}|}|. This means, in
particular, that the code of a key could also first execute some normal
code and only then process some further keys.
%
\begin{codeexample}[code only]
\pgfkeys{/par indent/.code={\parindent=#1}}
\pgfkeys{/no indent/.style={/par indent=0pt}}
\pgfkeys{/normal indent/.style={/par indent=2em}}
\pgfkeys{/no indent}
...
\pgfkeys{/normal indent}
\end{codeexample}
%
The following example shows a parameterized style ``in action''.
%
\begin{codeexample}[]
\begin{tikzpicture}[outline/.style={draw=#1,fill=#1!20}]
\node [outline=red] {red box};
\node [outline=blue] at (0,-1) {blue box};
\end{tikzpicture}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.estyle}|=|\meta{key list}}
This handler works like |/.style|, only the \meta{code} is set using
|\edef| rather than |\def|. Thus, all macros in the \meta{code} are
expanded prior to saving the style.
\end{handler}
For styles the corresponding handlers as for normal code exist:
\begin{handler}{{.style 2 args}|=|\meta{key list}}
This handler works like |/.code 2 args|, only for styles. Thus, the
\meta{key list} may contain occurrences of both |#1| and |#2| and when the
style is used, two parameters must be given as \meta{value}.
%
\begin{codeexample}[code only]
\pgfkeys{/paper height/.code={\paperheight=#1},/paper width/.code={\paperwidth=#1}}
\pgfkeys{/page size/.style 2 args={/paper height=#1,/paper width=#2}}
\pgfkeys{/page size={30cm}{20cm}}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.estyle 2 args}|=|\meta{key list}}
This handler works like |/.style 2 args|, only an |\edef| is used rather
than a |\def| to define the macro.
\end{handler}
\begin{handler}{{.style args}|=|\marg{argument pattern}\marg{key list}}
This handler works like |/.code args|, only for styles.
\end{handler}
\begin{handler}{{.estyle args}|=|\marg{argument pattern}\marg{code}}
This handler works like |/.ecode args|, only for styles.
\end{handler}
\begin{handler}{{.style n args}|=|\marg{argument count}\meta{key list}}
This handler works like |/.code n args|, only for styles. Here, \meta{key
list} may depend on all \meta{argument count} parameters.
\end{handler}
\begin{handler}{{.add style}|=|\marg{prefix key list}\marg{append key list}}
This handler works like |/.add code|, only for styles. However, it is
permissible to add styles to keys that have previously been set using
|/.code|. (It is also permissible to add normal \meta{code} to a key that
has previously been set using |/.style|). When you add a style to a key
that was previously set using |/.code|, the following happens: When
\meta{key} is processed, the \meta{prefix key list} will be processed
first, then the \meta{code} that was previously stored in
\meta{key}|/.@cmd|, and then the keys in \meta{append key list} are
processed.
%
\begin{codeexample}[code only]
\pgfkeys{/par indent/.code={\parindent=#1}}
\pgfkeys{/par indent/.add style={}{/my key=#1}}
...
\pgfkeys{/par indent=1cm} % This will set \parindent and
% then execute /my key=#1
\end{codeexample}
%
\end{handler}
\begin{handler}{{.prefix style}|=|\meta{prefix key list}}
Works like |/.add style|, but only for the prefix key list.
\end{handler}
\begin{handler}{{.append style}|=|\meta{append key list}}
Works like |/.add style|, but only for the append key list.
\end{handler}
\subsubsection{Defining Value-, Macro-, If- and Choice-Keys}
For some keys, the code that should be executed for them is rather
``specialized''. For instance, it happens often that the code for a key just
sets a certain \TeX-if to true or false. For these cases, predefined handlers
make it easier to install the necessary code.
However, we start with some handlers that are used to manage the value that is
directly stored in a key.
\begin{handler}{{.initial}|=|\meta{value}}
This handler sets the value of \meta{key} to \meta{value}. Note that no
subkeys are involved. After this handler has been used, by the rules
governing keys, you can subsequently change the value of the \meta{key} by
just writing \meta{key}|=|\meta{value}. Thus, this handler is used to set
the initial value of key.
%
\begin{codeexample}[code only]
\pgfkeys{/my key/.initial=red}
% "/my key" now stores the value "red"
\pgfkeys{/my key=blue}
% "/my key" now stores the value "blue"
\end{codeexample}
Note that with this configuration, writing |\pgfkeys{/my key}| will not
have the effect you might expect (namely that |blue| is inserted into the
main text). Rather, |/my key| will be promoted to |/my key=\pgfkeysnovalue|
and, thus, |\pgfkeysnovalue| will be stored in |/my key|.
To retrieve the value stored in a key, the handler |/.get| is used.
\end{handler}
\begin{handler}{{.get}|=|\meta{macro}}
Executes a |\let| command so that \meta{macro} contains the contents stored
in \meta{key}.
%
\begin{codeexample}[]
\pgfkeys{/my key/.initial=red}
\pgfkeys{/my key=blue}
\pgfkeys{/my key/.get=\mymacro}
\mymacro
\end{codeexample}
%
\end{handler}
\begin{handler}{{.add}|=|\marg{prefix value}\marg{append value}}
Adds the \meta{prefix value} and the beginning and the \meta{append value}
at the end of the value stored in \meta{key}.
\end{handler}
\begin{handler}{{.prefix}|=|\marg{prefix value}}
Adds the \meta{prefix value} and the beginning of the value stored in
\meta{key}.
\end{handler}
\begin{handler}{{.append}|=|\marg{append value}}
Adds the \meta{append value} at the end of the value stored in \meta{key}.
\end{handler}
\begin{handler}{{.link}|=|\meta{another key}}
Stores the value |\pgfkeysvalueof{|\meta{another key}|}| in the \meta{key}.
The idea is that when you expand the \meta{key}, the value of \meta{another
key} is expanded instead. This corresponds loosely to the notion of soft
links in Unix, hence the name.
\end{handler}
The next handler is useful for the common situation where
\meta{key}|=|\meta{value} should cause the \meta{value} to be stored in some
macro. Note that, typically, you could just as well store the value in the key
itself.
\begin{handler}{{.store in}|=|\meta{macro}}
This handler has the following effect: When you write
\meta{key}|=|\meta{value}, the code |\def|\meta{macro}|{|\meta{value}|}| is
executed. Thus, the given value is ``stored'' in the \meta{macro}.
%
\begin{codeexample}[]
\pgfkeys{/text/.store in=\mytext}
\def\a{world}
\pgfkeys{/text=Hello \a!}
\def\a{Gruffalo}
\mytext
\end{codeexample}
%
\end{handler}
\begin{handler}{{.estore in}|=|\meta{macro}}
This handler is similar to |/.store in|, only the code
|\edef|\meta{macro}|{|\meta{value}|}| is used. Thus, the macro-expanded
version of \meta{value} is stored in the \meta{macro}.
%
\begin{codeexample}[]
\pgfkeys{/text/.estore in=\mytext}
\def\a{world}
\pgfkeys{/text=Hello \a!}
\def\a{Gruffalo}
\mytext
\end{codeexample}
%
\end{handler}
In another common situation a key is used to set a \TeX-if to true or false.
\begin{handler}{{.is if}|=|\meta{\TeX-if name}}
This handler has the following effect: When you write
\meta{key}|=|\meta{value}, it is first checked that \meta{value} is |true|
or |false| (the default is |true| if no \meta{value} is given). If this is
not the case, the error key |/errors/boolean expected| is executed.
Otherwise, the code |\|\meta{\TeX-if name}\meta{value} is executed, which
sets the \TeX-if accordingly.
%
\begin{codeexample}[]
\newif\iftheworldisflat
\pgfkeys{/flat world/.is if=theworldisflat}
\pgfkeys{/flat world=false}
\iftheworldisflat
Flat
\else
Round?
\fi
\end{codeexample}
%
\end{handler}
The next handler deals with the problem when a \meta{key}|=|\meta{value} makes
sense only for a small set of possible \meta{value}s. For instance, the line
cap can only be |rounded| or |rect| or |butt|, but nothing else. For this
situation the following handler is useful.
\begin{handler}{{.is choice}}
This handler sets things up so that writing \meta{key}|=|\meta{value} will
cause the subkey \meta{key}|/|\meta{value} to be executed. So, each of the
different possible choices should be given by a subkey of \meta{key}.
%
\begin{codeexample}[code only]
\pgfkeys{/line cap/.is choice}
\pgfkeys{/line cap/round/.style={\pgfsetbuttcap}}
\pgfkeys{/line cap/butt/.style={\pgfsetroundcap}}
\pgfkeys{/line cap/rect/.style={\pgfsetrectcap}}
\pgfkeys{/line cap/rectangle/.style={/line cap=rect}}
...
\draw [/line cap=butt] ...
\end{codeexample}
%
If the subkey \meta{key}|/|\meta{value} does not exist, the error key
|/errors/unknown choice value| is executed.
\end{handler}
\subsubsection{Expanded and Multiple Values}
When you write \meta{key}|=|\meta{value}, you usually wish to use the
\meta{value} ``as is''. Indeed, great care is taken to ensure that you can even
use things like |#1| or unbalanced \TeX-ifs inside \meta{value}. However,
sometimes you want the \meta{value} to be expanded before it is used. For
instance, \meta{value} might be a macro name like |\mymacro| and you do not
want |\mymacro| to be used as the macro, but rather the \emph{contents} of
|\mymacro|. Thus, instead of using \meta{value}, you wish to use whatever
\meta{value} expands to. Instead of using some fancy |\expandafter| hackery,
you can use the following handlers:
\begin{handler}{{.expand once}|=|\meta{value}}
This handler expands \meta{value} once (more precisely, it executes an
|\expandafter| command on the first token of \meta{value}) and then process
the resulting \meta{result} as if you had written
\meta{key}|=|\meta{result}. Note that if \meta{key} contains a handler
itself, this handler will be called normally.
%
\begin{codeexample}[]
\def\a{bottom}
\def\b{\a}
\def\c{\b}
\pgfkeys{/key1/.initial=\c}
\pgfkeys{/key2/.initial/.expand once=\c}
\pgfkeys{/key3/.initial/.expand twice=\c}
\pgfkeys{/key4/.initial/.expanded=\c}
\def\a{{\ttfamily\string\a}}
\def\b{{\ttfamily\string\b}}
\def\c{{\ttfamily\string\c}}
\begin{tabular}{ll}
Key 1:& \pgfkeys{/key1} \\
Key 2:& \pgfkeys{/key2} \\
Key 3:& \pgfkeys{/key3} \\
Key 4:& \pgfkeys{/key4}
\end{tabular}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.expand twice}|=|\meta{value}}
This handler works like saying
\meta{key}|/.expand once/.expand once=|\meta{value}.
\end{handler}
\begin{handler}{{.expanded}|=|\meta{value}}
This handler will completely expand \meta{value} (using |\edef|) before
processing \meta{key}|=|\meta{result}.
\end{handler}
\begin{handler}{{.evaluated}|=|\meta{value}}
This handler will evaluate \meta{value} as a mathematical
expression with |\pgfmathparse| and assign \meta{key}|=\pgfmathresult|.
%
\begin{codeexample}[]
\pgfkeys{
/golden ratio/.initial/.evaluated={(1 + sqrt(5))/2},
}
\pgfkeys{/golden ratio}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.list}|=|\meta{comma-separated list of values}}
This handler causes the key to be used repeatedly, namely once for every
element of the list of values. Note that the list of values should
typically be surrounded by braces since, otherwise, \TeX\ will not be able
to tell whether a comma starts a new key or a new value.
The \meta{list of values} is processed using the |\foreach| statement, so
you can use the |...| notation.
%
\begin{codeexample}[]
\pgfkeys{/foo/.code=(#1)}
\pgfkeys{/foo/.list={a,b,0,1,...,5}}
\end{codeexample}
%
\end{handler}
\subsubsection{Handlers for Forwarding}
\begin{handler}{{.forward to}|=|\meta{another key}}
This handler causes the \meta{key} to ``forward'' its argument to
\meta{another key}. When the \meta{key} is used, its normal code will be
executed first. Then, the value is (additionally) passed to \meta{another
key}. If the \meta{key} has not yet been defined prior to the use of
|.forward to|, it will be defined then (and do nothing by itself, expect
for forwarding it to \meta{key name}). The \meta{another key} must be a
fully qualified key name.
%
\begin{codeexample}[]
\pgfkeys{
/a/.code=(a:#1),
/b/.code=(b:#1),
/b/.forward to=/a,
/c/.forward to=/a
}
\pgfkeys{/b=1} \pgfkeys{/c=2}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.search also}=\marg{path list}}
A style which installs a |/.unknown| handler into \meta{key}. This
|/.unknown| handler will then search for unknown keys in every path
provided in \marg{path list}.
%
\begin{codeexample}[]
% define a key:
\pgfkeys{/secondary path/option/.code={Invoking /secondary path/option with `#1'}}
% set up a search path:
\pgfkeys{/main path/.search also={/secondary path}}
% try searching for `option=value' in '/main path':
% -> this finds `/secondary path/option'!
\pgfkeys{/main path/.cd,option=value}
\end{codeexample}
The |/.search also| handler follows the strategy
%
\begin{enumerate}
\item If a user provides a fully qualified key which could not be
found, for example the full string |/main path/option|, it assume
that the user knew what she is doing -- and does \emph{not}
continue searching for |an option| in \marg{path list}.
\item If a user provides only the key's name, for example |option| and
|option| cannot be found in the current default path (which is
|/main path| in our example above), the current default path is set
to the next element in \marg{path list} (which is |/secondary path|
here) and |\pgfkeys| will be restarted.
This will be iterated until either a match has been found or all
elements in \marg{path list} have been tested. \item If all
elements in \marg{path list} have been checked and the key is still
unknown, the fall-back handler |/handlers/.unknown| will be
invoked.
\end{enumerate}
%
\begin{codeexample}[]
% define a key:
\pgfkeys{/secondary path/option/.code={Invoking /secondary path/option with `#1'}}
% set up a search path:
\pgfkeys{/main path/.search also={/secondary path}}
% try searching for `option=value' in '/main path':
% -> this finds `/secondary path/option'!
\pgfkeys{/main path/.cd,option=value}
% negative example:
% try searching for fully qualified key /main path/option.
% This won't be handled by .search also.
\pgfkeys{/handlers/.unknown/.code={Found unknown option \pgfkeyscurrentkeyRAW={#1}!}}%
\pgfkeys{/main path/.cd,/main path/option=value}
\end{codeexample}
Please note that the strategy of |/.search also| is different from the
first example provided in section~\ref{sec:pgf:unknown:keys} ``Unknown
Keys'' because |/.search also| only applies to keys that are not fully
qualified.
For those who are familiar with |\pgfkeys|, the actual implementation of
|/.search also| might be interesting:
%
\begin{enumerate}
\item |\pgfkeys{/path/.search also={/tikz}}| is equivalent to
%
\begin{codeexample}[code only]
\pgfkeys{/path/.unknown/.code={%
\ifpgfkeysaddeddefaultpath
% only process keys for which no full path has been
% provided:
\pgfkeyssuccessfalse
\let\pgfkeys@searchalso@name =\pgfkeyscurrentkeyRAW
\ifpgfkeyssuccess
\else
% search with /tikz as default path:
\pgfqkeys{/tikz}{\pgfkeys@searchalso@name={#1}}%
\fi
\else
\def\pgfutilnext{\pgfkeysvalueof {/handlers/.unknown/.@cmd}#1\pgfeov}%
\pgfutilnext
\fi
}
}
\end{codeexample}
%
\item |\pgfkeys{/path/.search also={/tikz,/pgf}}| is equivalent to
%
\begin{codeexample}[code only]
\pgfkeys{/path/.unknown/.code={%
\ifpgfkeysaddeddefaultpath
\pgfkeyssuccessfalse
\let\pgfkeys@searchalso@name=\pgfkeyscurrentkeyRAW
\ifpgfkeyssuccess
\else
% step 1: search in /tikz with .try:
\pgfqkeys{/tikz}{\pgfkeys@searchalso@name/.try={#1}}%
\fi
\ifpgfkeyssuccess
\else
% step 2: search in /pgf (without .try!):
\pgfqkeys{/pgf}{\pgfkeys@searchalso@name={#1}}%
\fi
\else
\def\pgfutilnext{\pgfkeysvalueof {/handlers/.unknown/.@cmd}#1\pgfeov}%
\pgfutilnext
\fi
}
}
\end{codeexample}
\end{enumerate}
To also enable searching for styles (or other handled keys), consider
changing the configuration for handled keys to
|/hander config=full or existing| when you use |/.search also|, that is,
use
%
\begin{codeexample}[code only]
\pgfkeys{
/main path/.search also={/secondary path},
/handler config=full or existing}
\end{codeexample}
%
\end{handler}
\subsubsection{Handlers for Testing Keys}
\begin{handler}{{.try}|=|\meta{value}}
This handler causes the same things to be done as if
\meta{key}|=|\meta{value} had been written instead. However, if neither
\meta{key}|/.@cmd| nor the key itself is defined, no handlers will be
called. Instead, the execution of the key just stops. Thus, this handler
will ``try'' to use the key, but no further action is taken when the key is
not defined.
The \TeX-if |\ifpgfkeyssuccess| will be set according to whether the
\meta{key} was successfully executed or not.
%
\begin{codeexample}[]
\pgfkeys{/a/.code=(a:#1)}
\pgfkeys{/b/.code=(b:#1)}
\pgfkeys{/x/.try=hmm,/a/.try=hallo,/b/.try=welt}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.retry}|=|\meta{value}}
This handler works just like |/.try|, only it will not do anything if
|\ifpgfkeyssuccess| is false. Thus, this handler will only retry to set a
key if ``the last attempt failed''.
%
\begin{codeexample}[]
\pgfkeys{/a/.code=(a:#1)}
\pgfkeys{/b/.code=(b:#1)}
\pgfkeys{/x/.try=hmm,/a/.retry=hallo,/b/.retry=welt}
\end{codeexample}
%
\end{handler}
\begin{handler}{{.lastretry}|=|\meta{value}}
This handler works like |/.retry|, only it will invoke the usual handlers
for unknowns keys if |\ifpgfkeyssuccess| is false. Thus, this handler
will only try to set a key if ``the last attempt failed''. Furthermore,
this here is the last such attempt.
\end{handler}
\subsubsection{Handlers for Key Inspection}
\begin{handler}{{.show value}}
This handler executes a |\show| command on the value stored in \meta{key}.
This is useful mostly for debugging.
\example |\pgfkeys{/my/obscure key/.show value}|
\end{handler}
\begin{handler}{{.show code}}
This handler executes a |\show| command on the code stored in
\meta{key}|/.@cmd|. This is useful mostly for debugging.
\example |\pgfkeys{/my/obscure key/.show code}|
\end{handler}
The following key is not a handler, but it also commonly used for inspecting
things:
%
\begin{key}{/utils/exec=\meta{code}}
This key will simply execute the given \meta{code}.
% FIXME: there is a bug in the pretty printer ... fix it!
\example \verb|\pgfkeys{some key=some value,/utils/exec=\show\hallo,obscure key=obscure}|
\end{key}
\subsection{Error Keys}
In certain situations errors can occur, like using an undefined key. In these
situations error keys are executed. They should store a macro that gets two
arguments: The first is the offending key (possibly only after macro
expansion), the second is the value that was passed as a parameter (also
possibly only after macro expansion).
Currently, error keys are simply executed. In the future it might be a good
idea to have different subkeys that are executed depending on the language
currently set so that users get a localized error message.
\begin{key}{/errors/value required=\marg{offending key}\marg{value}}
This key is executed whenever an \meta{offending key} is used without a
value when a value is actually required.
\end{key}
\begin{key}{/errors/value forbidden=\marg{offending key}\marg{value}}
This key is executed whenever a key is used with a value when a value is
actually forbidden.
\end{key}
\begin{key}{/errors/boolean expected=\marg{offending key}\marg{value}}
This key is executed whenever a key set up using |/.is if| gets called with
a \meta{value} other than |true| or |false|.
\end{key}
\begin{key}{/errors/unknown choice value=\marg{offending key}\marg{value}}
This key is executed whenever a choice is used as a \meta{value} for a key
set up using the |/.is choice| handler that is not defined.
\end{key}
\begin{key}{/errors/unknown key=\marg{offending key}\marg{value}}
This key is executed whenever a key is unknown and no specific |/.unknown|
handler is found.
\end{key}
\input{./text-zh/pgfmanual-zh-utilities/pgfmanual-zh-pgfkeysfiltered.tex}
| {
"pile_set_name": "Github"
} | 0.000015 |
Charles White (cricketer)
Charles White (1823 – 18 February 1873) was an English cricketer who played for Surrey. He was born and died in Southwark.
White made a single first-class appearance, in 1850, against Middlesex. Batting in the tailend, he scored a duck in his only innings.
External links
Charles White at Cricket Archive
Category:1823 births
Category:1873 deaths
Category:English cricketers
Category:Surrey cricketers | {
"pile_set_name": "Wikipedia (en)"
} | 0 |
2
What is (-139 - -148) + -2 + 3 + -1 + 0?
9
What is the value of -10 + 6 + 4 + -7 + 5 + 3?
1
What is the value of (23 - (15 + -17)) + -13?
12
What is -2 - 1 - (-5 + 9 - -5)?
-12
Evaluate -1 - (-4 + (13 - 8)).
-2
Calculate -14 - 6 - (8 - 19).
-9
-22 + -3 + (3 - (-6 - (3 + -5)))
-18
10 - (1 + 2) - (-30 + 68 + -12)
-19
What is the value of 4 - (-1 + (8 - (6 + -1))) - -4?
6
Evaluate 53 - (-13 + (-18 - -58)).
26
What is the value of -4 + (6 - 12 - -11) - (1 + -2)?
2
Calculate (-1 + -5 + 10 - (-2 + -8)) + -5.
9
What is -1 - -1 - (-226 + 229)?
-3
Calculate 14 - (5 - 1 - -11).
-1
(-46 - (-21 - -31)) + 32
-24
Evaluate -18 - (13 - 38) - -2.
9
(6 - (-1 - 0)) + (-18 - (-67 - -49))
7
What is the value of 33 + -21 + -5 - -12?
19
What is (-8 - -14 - (3 + -4)) + 7?
14
What is -187 - -179 - (28 - -2)?
-38
-6 + -14 + 13 + -4
-11
Calculate (-3 - (-31 + 15)) + (-3 - 29).
-19
What is 5 + (-7 - -1) + 4 + -10 + 2?
-5
(2 + -4 - -12) + 74 + -96
-12
What is the value of -8 + (-2 - (7 + -6)) + -4?
-15
What is 1 + -8 - (17 - (17 - (32 + -20)))?
-19
What is -19 - (-12 - ((-10 - 0) + 3))?
-14
Calculate (-1 - -1) + (3 - 28 - -23).
-2
Evaluate 41 + -2 - (-12 + (-10 - -34)).
27
-13 - (-26 - (-14 + -10))
-11
What is the value of 36 - (25 + -13) - -7?
31
What is the value of -15 - (-13 + 19) - -13?
-8
What is (-8 - (14 - 24)) + -4 + (0 - -1)?
-1
What is the value of -1 - -15 - (-8 - -11)?
11
What is the value of (19 - (10 - 9) - 18) + 9?
9
What is -18 + -6 + 1 + 0?
-23
Evaluate (6 + -1 - -10) + -28.
-13
What is the value of -8 + (-30 - -3) + (8 - 0)?
-27
(-24 - -19) + (10 - 16)
-11
Calculate 23 + -14 + 6 - 10.
5
What is (16 - 7 - 9) + 7 + -11?
-4
22 + 21 + -9 + -21 - 21
-8
What is 7 + (-6 - (-3 + (-4 - -5) + -7))?
10
Evaluate (0 - -9 - 18) + 2 + -10.
-17
-40 + 24 + (9 - (-1 - -3))
-9
What is 20 + (1 - 12) + -9 + -2?
-2
Calculate -1 + -29 + 28 - 15.
-17
What is 8 - 19 - (-7 + 0)?
-4
What is -6 + -25 + 13 + (-2 - -8)?
-12
What is 9 - (0 - 1 - (-12 + 10))?
8
Calculate -48 + 37 + 21 - (0 - -17).
-7
What is (0 - -4) + (8 - (10 + -2)) + -4?
0
Calculate -32 + (43 - 2) + (0 - 18) + -2.
-11
What is (5 - -12) + -35 - (40 + -18)?
-40
-29 - (-49 + 9 - -8)
3
Evaluate 3 - (-1 + -6 + 22 + -13).
1
What is 5 + (15 - 5) + -4 + -7 + 6?
10
Calculate (-14 - -12) + 13 - 8.
3
What is the value of -9 + 4 + 12 - 8?
-1
What is the value of -32 - -58 - (1 - -17)?
8
What is 3 + 6 + -18 + -11 + 9?
-11
Evaluate (2 + 1 + -18 - -12) + -1 + -10.
-14
What is 0 - -2 - 1 - (-4 + 1) - 3?
1
Evaluate (6 - (3 + (-6 - -3))) + -9.
-3
What is -2 - -1 - -18 - (-5 - (-50 + 53))?
25
Evaluate 17 - 18 - -47 - 27.
19
Evaluate (-4 - -10) + (31 - 25).
12
Calculate -35 + 22 + 44 + -10.
21
Evaluate (-121 - -128) + (-17 - 2).
-12
(4 - -13) + -19 + 11 + -4
5
Evaluate 10 + 1 + -9 + 4.
6
Calculate -6 - (10 - 6 - 16).
6
Evaluate 7 - (3 + 4 + -6) - 18.
-12
Calculate (3 - (-8 - -13)) + 14 + 4.
16
13 + -1 + -4 - (-8 + 28)
-12
What is (-18 - -25) + -16 - (-1 + -31)?
23
-9 + 8 + (-6 - -1)
-6
Calculate 1 + -11 + (0 - 5 - -6).
-9
(69 - 37) + (1 - 5) + 9 + -12
25
Evaluate -3 + (-5 - -2) - (-10 + (24 - 5)).
-15
What is (6 - 17) + -9 + 1?
-19
Calculate (3 - -4) + -5 - (-4 + -1).
7
Evaluate 11 + -16 - (-2 + 4 - 18).
11
What is the value of 3 - 5 - (-5 - -4 - 3 - 14)?
16
What is the value of 4 + -4 + -1 - (-74 + 77)?
-4
Evaluate 2 - 13 - -18 - (12 - -2).
-7
Calculate 11 + -8 + (-32 - -3 - -3).
-23
28 + -23 + 10 + (4 - 9 - -15)
25
8 - (-6 - (-17 - -9)) - 16
-10
-9 - (9 - (13 - -5)) - 7
-7
What is the value of 1 + 9 + -8 + 4 + -31 - -6?
-19
What is the value of -6 - 18 - -32 - (3 - (-17 + 1))?
-11
What is -1 + (-16 - -23) + (-1 - 0) + -20?
-15
Evaluate 33 + (-2 - (22 - -34)).
-25
Calculate 11 + 1 + -13 + 8 + (12 - 15).
4
Evaluate 7 + -5 - -8 - (-19 + 7 - -4).
18
-14 + 6 + 0 - -10 - (18 + -1)
-15
Calculate -42 - (-18 + -31 + -25).
32
What is 13 + 14 + -30 + 19?
16
What is (-13 - -22) + (0 - (-6 + 7))?
8
What is the value of 27 + (-9 - 0 - -20) + -20?
18
What is 8 + (-17 - -7) + 5?
3
What is the value of -6 + (-2 + 2 + 3 - 4 - -3)?
-4
9 - 11 - (-4 - (-13 + 6))
-5
(-6 - -2 - (0 - -1)) + 16
11
Calculate (-4 + 10 - 13) + 2 + 13.
8
Calculate (38 - 32) + 2 + -1 + -19 + 42.
30
What is (-76 - -73) + 6 + 1?
4
What is -21 + 16 + -10 + -3?
-18
What is the value of -7 + (-37 - (-5 + -5))?
-34
What is 4 + -1 + (520 - 529)?
-6
Evaluate (1 - 22) + 6 - (21 + -23).
-13
What is the value of 4 - (9 + (-13 - -6))?
2
What is 63 - 97 - (-24 + 2)?
-12
What is the value of 26 - 39 - (5 + -1 - 4)?
-13
What is the value of (11 - 12) + -10 + 9 + 27?
25
What is 4 + -15 + 19 + -16?
-8
6 - (13 - (3 + 11 + -8))
-1
-3 + -7 + 4 + (12 - 0) + -8
-2
What is -45 - -51 - (-1 + 3 + 0 - -12)?
-8
Calculate -22 + (0 - -19 - (20 + -2)).
-21
What is -2 - (3 + (-7 - 7) + (2 - -4))?
3
Calculate 86 - (97 + -26) - (1 - (7 - -1)).
22
5 + -11 - (-5 + 3) - -4 - -2
2
Calculate 4 + -22 + (-5 - (-3 - 4)) + 5.
-11
(2 - -3) + (-1 - (14 - (2 - -2)))
-6
-35 + (30 - 8) - -9
-4
6 - ((-4 - -4) + -1 + -4)
11
Calculate 4 - (19 - (-1 + 10 + -9)).
-15
What is 27 + 19 + -12 + 2 + 6 + -11?
31
What is the value of 9 - (83 + -77 + (0 - -3))?
0
What is (7 + -4 - (-3 - 1)) + -3 + 3?
7
What is the value of (9 - (5 + 13)) + 0 + -5?
-14
Evaluate 29 + -16 + 5 + -18.
0
Evaluate -10 + 7 + -25 + 4.
-24
What is the value of 2 + -9 - (45 + -15 + -13)?
-24
Calculate -7 + 22 + (-6 - (-3 + 1 - -7)).
4
Evaluate -12 - (-18 + -11 + 15).
2
What is the value of -43 + 13 + 17 + -2 + -7?
-22
Evaluate -4 - (-10 - (-3 + 5 + -7)).
1
5 + 2 + (12 - 28) + 2
-7
What is the value of -25 + 46 + -29 + 10?
2
What is the value of 9 + (4 - (9 - 5 - 5))?
14
Evaluate 1 - (5 - (5 - -5)) - 11.
-5
What is -69 + -4 + 70 - (0 + 18)?
-21
What is the value of 19 - (-3 + -11 - -65)?
-32
What is the value of -41 + (19 - (10 + -5)) - -12?
-15
Calculate 2 - ((-10 - 0) + (18 - 3 - 13)).
10
What is 0 + (20 + -25 - (-5 - -1)) + 13?
12
1 - (21 - (-10 + (-8 - -32 - 11)))
-17
Evaluate (34 - 0) + (-12 + 18 - 12).
28
Evaluate -1 + (3 - (2 + -4 + 2)) - -11.
13
What is the value of (6 - 1) + 8 + 20 + -7 + -11?
15
What is the value of 44 + -8 + -40 + 6?
2
What is (-9 - 0) + (380 - 361) - (-10 + -1)?
21
Evaluate 6 + 3 + (-5 - (-25 - -39)).
-10
Calculate 27 - (-10 + 2 - -7 - 11).
39
What is the value of (-21 - -17) + (0 - (21 + 3)) + 0?
-28
What is (-73 - (59 + -140)) + (1 - 11)?
-2
Calculate 25 - -2 - 17 - (23 + -2).
-11
What is the value of 14 - -6 - 3 - 13 - -15?
19
4 - ((-23 - -12) + 2 - (-8 + -1))
4
Evaluate 0 + 8 + 365 + -369.
4
15 + -12 - -18 - 23
-2
Calculate 6 + (-3 - -3) + (-1 - 4).
1
Calculate -11 + 2 + (25 - 40) + 1 + 2.
-21
Evaluate 12 + 2 + 9 + (-32 - -39).
30
What is the value of 9 - 24 - (-19 + -11 - -13)?
2
What is the value of 1 + 4 - (6 + -10 + 2)?
7
(-9 - ((-3 - 2) + 2)) + (-17 - -17)
-6
24 + (-5 + (1 - (4 - -7)) - -9)
18
Calculate (-5 - (-3 - (-9 + 24))) + 16.
29
Calculate (41 + -46 - (-2 + 4 - 5)) + -10.
-12
What is (1 - (17 - 18)) + -8?
-6
Calculate -3 + (-12 - -1) + (-4 - (1 - 0)).
-19
(-27 - -36) + (1 - 23) + 3
-10
What is the value of 31 + -14 + -24 - 1?
-8
What is (-39 - (-42 - -12)) + (30 - 1)?
20
What is 18 - (12 + (-7 - 4) - (-5 - 0))?
12
What is the value of 11 + 0 + -6 + (-2 - -5)?
8
Calculate -13 - (2 + -35 - -6).
14
What is -5 - (0 + 15 + -17)?
-3
What is the value of -25 + 1 - (-13 + -5)?
-6
Evaluate (-19 + -2 - 1) + (-10 - (-27 - -11)).
-16
Evaluate 51 + -24 + 36 + -26.
37
(-15 - -35) + -10 - 22
-12
What is 11 - ((28 - 20) + -2 + -3)?
8
Calculate 1 + 9 - (-216 + 224).
2
Calculate -2 - (-12 - 2) - (1340 + -1322).
-6
Calculate -2 - -11 - (34 + (33 - 62)) - -24.
28
Calculate -15 - (-47 + 28 + -3 + -13).
20
Evaluate (15 - (20 + 3)) + -8.
-16
-39 - -36 - (13 - -9)
-25
Calculate -33 - (-60 + 41 - -9).
-23
-36 + (63 - -8) + -2
33
10 - (6 + (8 - 24))
20
Evaluate 0 - 22 - (-173 - -158).
-7
Evaluate 6 + (-8 - (13 - 7)) - 2.
-10
Evaluate 1 - (15 + 10 + -8) - -13.
-3
What is (-13 + -4 - 3) + (61 - 54)?
-13
What is 45 - 0 - (117 - 86)?
14
Calculate 13 - 3 - 3 - -15 - (10 + -2).
14
-25 + 20 - (6 + 0 - -27)
-38
What is the value of -10 + (10 - -9) - (1 - 17)?
25
(-4 - 3) + -162 + 178
9
(2 - 5) + (-7 + 6 - -9) + -4
1
What is (65 - 56) + 0 + 1 + -9 + 1?
2
Evaluate 8 + (2 - (18 + -4)).
-4
What is the value of (1 - -2) + 2 + (0 - -4) + -10?
-1
What is t | {
"pile_set_name": "DM Mathematics"
} | 0 |
On June 16, James Smith, an officer with the Kosciusko County Sheriff’s Department, responded to a complaint of sexual misconduct with a minor. When Smith arrived he talked with a man who just found out a minor female relative of his had sexual intercourse with Leer.
The man told Smith the minor had met Leer through Facebook and showed him a text message where the minor admitted to having sex with Leer.
Smith spoke with the minor, who told him that Leer had sent her a friend request on Facebook a couple of weeks prior to the incident.
According to the affidavit of probable cause, the minor admitted sending nude photos to Leer and received nude photos of Leer in return. The minor also admitted Leer had sent videos of himself masturbating and texts stating he wanted to do a lot of sexual things to the minor.
Leer requested the minor to meet with him for sex.
On June 12, the minor went to Leer’s residence and stated Leer was waiting outside. Leer then escorted the minor into the residence and into the bedroom, where they began kissing, which then led to sexual intercourse. | {
"pile_set_name": "Pile-CC"
} | 0.010082 |
Q:
How to communicate that the first impression I made at a party was misleading?
On Monday I celebrated New Year's Eve with a group of people I have never seen before because a good friend of mine invited me to go there with her. Since I'm very shy towards strangers, I was pretty quiet the whole time. Aside from that one friend who invited me, I've never seen anyone before. She and the others, however, all were really good friends (know each other from school etc). Because of that I didn't have a lot of chance to join their conversations, since a lot of them revolved about things they did or people they know and stuff like that.
Although I felt fairly uncomfortable it was a good evening and I had fun. I'm glad I was invited and went there since I'm usually not that excited about parties. Afterwards my friend told me that the others were not really sure whether I had fun at all or enjoyed the party, which sounds reasonable considering the situation.
I feel like I have made a bad impression and would like to communicate to them that me being so silent was because of my shyness (maybe social anxiety) and the fact that I didn't know anyone aside from my one friend. I now wonder how I can communicate that without coming across as even weirder?
A:
This sounds very familiar - I have some issues with social anxiety and am very bad at hiding when I feel uncomfortable, so I've been in a number of situations where my shyness / awkwardness has been noted by other people.
My first suggestion is for next time - If you know or suspect that they think that, I've found it's best to address their misconceptions when it happens, i.e., at the party. While it doesn't happen often, I have been told directly that I look uncomfortable by one of the friend-of-friends... as embarrassing as that is, it did give me a chance to explain and say "oh, no, I'm just shy" and assure them that I really was enjoying talking to them. Otherwise, it's pretty common (in my experience with casual / small house parties in the US) to get a chance to address the group as you're saying your goodbyes for the night - thank the host for inviting you, tell everyone you had a great time meeting them and were glad to have attended, accompanied by a genuine smile :)
However now that the party is over, you'll have to make contact some other way. One thing I've done is to add them on social media, possibly with a friendly message (e.g. "Hi, it's Em! Had a great time talking to you about foobar at the party last week"), and make a post about how I had a great New Year's Eve. I wouldn't message everyone directly to say "Hey, I heard you thought I had a bad time, but I actually had a great time!", since they might feel uncomfortable and pressured to respond. Instead, adding them on social media implies "I'd like to stay in touch", which is a positive and fairly low pressure signal, and the post will make it clear you enjoyed the party.
You also can talk to your friend about it! She's your link to the others at the party, and that's how you found out about this situation, so it's clearly not out of line to bring it up with her. Ask your friend to pass it along that while you're a bit shy around new people, you had a lovely time (would be happy to hang out again, etc., whatever is true for you). This is another thing I've both done and been asked to do by others. I'm not sure it's expected, but I do personally feel some responsibility when introducing a new person to a group to make sure things go well, so I don't think it'd be unusual to ask. And it should be a relatively easy thing for her to do, since she understands the dynamics of interacting with both you and her other friends and will know how best to explain to them.
| {
"pile_set_name": "StackExchange"
} | 0 |
The teen, who was walking to the house of his father's fiancée in Sanford, Florida, with a drink and Skittles in hand, was shot by George Zimmerman, a neighborhood watch captain who had called police to report suspicious activity. If you had looked on February 26, it would have been hard to find much discussion or major national coverage about the shooting.
But now, this case, at least in terms of the conversations swirling around it, is anything but simple. And Trayvon Martin's name has now become part of the vocabulary of a debate on attitudes about race.
What began as a local shooting has turned into a global story that you couldn't miss, even if you tried. It is a story that has sparked outrage, cries of racism, accusations of vigilantism and questions about gun laws and whether police properly investigated the case. It has in many ways turned into a full-scale moment of reflection for Americans, of all races, as to whether we as a nation have moved forward in our quest for equality among races.
A petition on Change.org calling for Zimmerman's arrest, now handled by Martin's parents, shows how ingrained the topic is in the cultural zeitgeist. Early Thursday, the petition had reached 1 million signatures, with them coming in at a pace of 1,000 signatures a minute, according to Noland Chambliss, communications director for Change.org. Chambliss said the petition at times has been getting 50,000 signatures an hour.
It is one of the more dominant conversations on news and social media sites, becoming a sort of rallying cry from those who feel an injustice has occurred. Those who feel that Zimmerman took Florida's "stand your ground" protection too far, or used it as an excuse to gun down a black teen because he was wearing a hoodie, took to the streets around the country to make their voices heard. Demonstrators crowded New York's Union Square on Wednesday night, in a "Million Hoodie March" attended by Martin's parents.
And the situation has also forced parents of black children to think about how they should discuss the story with their kids. What rhetoric do they use? How do they explain what they feel is happening?
"It’s tough finding the balance between encouraging a black boy to storm the world with confidence and at the same time to fear for his life. But that’s what I must do," she wrote. "I know that at this very moment some have just sucked their teeth in disgusted disbelief and decided that I’m exaggerating. I wish that I was. I’m not. If I were, Trayvon would be alive."
That's a sentiment that author Touré wrote about for Time.com, too. In his piece called "How to talk to young black boys about Trayvon Martin," he offers eight talking points on what he calls the "potentially fatal condition of being Black."
"It’s unlikely but possible that you could get killed today. Or any day. I’m sorry but that’s the truth. Blackmaleness is a potentially fatal condition. I tell you that not to scare you but because knowing that could possibly save your life," he wrote. "There are people who will look at you and see a villain or a criminal or something fearsome. It’s possible they may act on their prejudice and insecurity. Being Black could turn an ordinary situation into a life or death moment even if you’re doing nothing wrong."
It has also forced a national dialogue on whether police handled the case properly, in general, or whether there were any racial biases in how the case was handled.
Thursday afternoon Sanford Police Chief Bill Lee announced Thursday he is stepping down "temporarily" as head of the department.
"I am aware that my role as a leader of this agency has become a distraction from the investigation," he told reporters. "It is apparent that my involvement in this matter is overshadowing the process. Therefore, I have come to the decision that I must temporarily remove myself from the position."
He added, "I do this in the hopes of restoring some semblance of calm to the city, which has been in turmoil for several weeks."
A Seminole County grand jury will convene April 10 on the matter, according to State Attorney Norm Wolfinger, and the U.S. Justice Department has launched a civil rights investigation into the case.
It appears that a growing movement of people across the country will continue to rally behind Martin's parents as they urge an arrest in the case. Another rally is planned Thursday night at a Sanford church.
Before the grand jury makes a decision on whether to hand down indictments in the case, it is likely that more voices will fight to be heard and added to this ongoing and heated debate.
soundoff(1,305 Responses)
bryce
CNN has pretty much ruined this guy's chance for a fair trial. The slant of these articles is so prejudicial against this man, who is suppose to be innocent until proven guilty, that it will be hard to find an unbiased jury.
First off – Zimmerman isn't WHITE, he's HISPANIC. Secondly, Trayvon must not have been this angel they claim he was, afterall he was visiting his father because he was suspended from school. I would love to know what he was suspended for. Was it bringing a gun to school? Fighting? Drug charges? Or something simple like skipping class? Either way, it shows his character. This should be anything BUT a racial issue. This is what the STAND YOUR GROUND law was for. Zimmerman obviously felt threatened by Martin and reacted on it. Why is the NAACP involved anyway!? As far as the race issue – the only people that refuse to let the racial profiling crap go is the blacks. I'm sorry but it's true! They all think they deserve so much more because of the slavery crap that happened YEARS ago. Were you a slave? No. Did I own you? No. Drop it! It's old. Slavery was wrong – I get it....but so was Hitler and the concentration camps. You don't see a organization rallying for the Jewish people everytime something happens do you?! No.
Now, off the race topic – back to the FACTS. The Stand Your Ground law was made for cases like this. Zimmerman felt scared apparently – who knows. No one. No one was there except Zimmerman and Martin. One of them, unfortunately, is dead. There are 3 sides to this story. Zimmermans. Martins. And the TRUTH. No one will EVER know the truth. I don't think it's right that there is even a consideration to make Zimmerman an exception to this Stand Your Ground law just because the NAACP was able to get media attention as usual.
It is important to note the police perceived him as white (it was noted on the police report). Where did they get this information did Zimmerman give it to him or did they just look at him think..oh he's white he's cool, let's not arrest him. You mentioned 2 black boys burning a white kid in Kansas, that is truly sad. I wouldn't sit here and say that they did something to deserve it.Your assumption that he did is profiling. I'm sorry for what happened to those little white boys. What those black boys did to him was wrong. They deserve to be in jail and I'm 100% sure they have been charged and convicted. I'm happy about it. See what you don't get is no one is inflamed that a latino man killed a black boy. The public outcry for justice is because Zimmerman a 250 lb. latino man was perceived as black and got away with murder of an 140 lbs unarmed boy walking afraid for his life. Listen to the 911 calls of this teen screaming for his life.
Race has nothing to do with this I agree, but Zimmerman is still a murderer in my opinion. I won't comment on your ignorant rants about slavery, the holocaust and the child's expulsion from school. Those comments are irrelevant to this issue.
Understand two things about this case. The kid was unarmed, and the 911 dispatcher told Zimmerman to stay in his vehicle, and not to follow the teen. Zimmerman pursued and confronted an unarmed teen who was simply walking down the street minding his own business, eating candy and talking on a cell phone. If the teen were white, my opinion of Zimmerman would still be the same. He should be in jail. By the way, I'm black.
Wow beth you seem a little bothered by the fact that the race word came up. Whatever he was suspended for didnt have anything to do with him being killed because of his race. To be honest I dont believe that man life was at harm at all, he saw a black male and used him for his own target range because of the way he looked. I'm an African American mom with a son that I worry about each and everyday because he's black. I'm that mom that challenges the thought of others when it comes to how my son communicates, dresses, and interacts with others in our society. Our black men are being judged everyday on how their appearance is by other races so yes it's always going to be a racial issue. As far as the white kid that was killed by the 2 black kids I must say first that the family has my sympathy but I bet those 2 boys will be prosecuted to the fullest extent because of the race that was involved. Put the shoes on the other foot and you give a guess on what would have happened if it was 2 white kids that committed that same crime on a black kid. Just like it's always black on black crime that bothers me, it hurts me also when black boys/men die at the hands of another race for no reason and they get away with it. Whether it was an Hispanic or a White male it was just wrong and there's no right in it. If you don't know Beth, this is the White mans world baby girl, all of our Black people are just living in it and trying to survive. Just some reality check so don't get bothered by the truth!!
please lets not make this about race. Lets think of the child that lost his life in a ruthless act that should not have been committed was it racially motivated we will never know. The one thing that really bothers me is that a child is dead because a law that started out positive and ended negative.
Why does it always have to be a racist thing with black people. You dont see this with any other race except black people. Why couldnt it have bee a corrupt police thing or an incompetent police thing. You dont see the "crutch" racist card played by any other race when things like this happen.
You've got it backwards Jocob. It's not always about race to Black people. It's always about OUR blackness to other races, particularly white. Many do not see a person when they see an african american they see a BLACK person with all the stereotypes they THINK black means. They see someone DIFFERENT and proceed to treat them differently in many cases, not always bad but different. Black people are just REACTING to and Commenting on this real phenomenon. Black people would LOVE to stop talking about race, all we need is for some others to stop seeing RACE first, person second. I don't see that happening anytime soon.
Other than police racial bias, how could the local police see this as "stand your ground" defense when the murderer was in a vehicle and had every opportunity to leave?
The problem here is not guns, nor the "stand your ground" defense. It is the willingness of authority (and possibly the local community) to accept an armed attack against an unarmed teenager. Imagine if Martin was also armed, and stood his ground and killed Zimmerman. The local police would immediately have arrested Martin, no bail.
This may initially have been just a murderous Zimmerman out to get anyone who did not fit his psycho profile; likely racial but possibly just Zimmerman hates everyone. However the law enforcement response was clearly racially biased (Welcome to America).
"In it, they explain, exactly how the "stand your ground" law works and how, according to Zimmerman's description of what happened that night, they could not refute that Zimmerman was protected by the law."
What kind of police officer takes the word of a killer without even investigating the incident first? Okay, sure, they couldn't *arrest* Zimmerman at the time, but they could have done a million other things to verify what they had been told, including testing Zimmerman for drugs or alcohol, confiscating the gun as evidence, checking 911 tapes, taking witness statements (as opposed to leading witnesses), etc. They did none of this because of shoddy police work, and they should be run out of town for their incompetence.
Totally agree!!! What happened to "Investigations" When are police departments going to learn from all the past mistakes and do what there job is, to "Protect & Serve" I am disgusted with that whole police department for failing Trayvon.
Let's pretend this isn't racial, although I believe it is, even if Trayvon was white, Zimmerman had NO right to pursue him. 911 told him NOT to. He did so anyway. This is not a situation which falls under stand your ground law – Zimmerman went after Trayvon – this is an undisputed fact.
Zimmerman is not a police man and can't make arrest and should be trown in jail, but on thing that no kid should do is walk around wearing a hoodie unless it's winter and or freezing out. Every time I see a white, black, mexican, or any male walking or driving around in a hoodie I think CRIMINAL. The only people who would disagree is a crimina, gang member, or drug addict.
Fred, your comment is ridiculous! I am not a criminal, gang member or use drugs or even drink alcohol, but I own and wear hoodies on a regular basis. Oh and how about Bill Belichick (the New England Patriots head coach) he wears them seemingly every day. Do you think he's a criminal? Stop trying to justify vigilantism. Zimmerman incredibly overreacted and in any other state would be in jail facing at minimum charges for manslaughter.
So effectively, under Florida's law if you want to kill someone all you have to do is take them to a place in Florida where there are no witnesses, shoot them and then claim they were attacking you. Since age difference, body size difference, and reasonable proportional response in any such purported attach apparently have no impact on the determination of whether someone is protecting themselves or committing murder, it seems like Florida has simply made murder legal. Hope all you Floridian's feel safer.
I think that something should. Be done. Because if it had been the other way around they would have tried to get the death penalty it is so sad that it is like this my feelings are there needs to be something done with. Zimmerman not later but now. God be with Trayvon's family.family's.
About This Blog
This blog – This Just In – will no longer be updated. Looking for the freshest news from CNN? Go to our ever-popular CNN.com homepage on your desktop or your mobile device, and join the party at @cnnbrk, the world's most-followed account for news. | {
"pile_set_name": "Pile-CC"
} | 0 |
Taylor Swift’s Bold Pink Lip & Soft Curls In London: Get Her Look
Could Taylor Swift get any cuter? She looked gorgeous in London on Feb. 24 and she added a bold pop of color to her look with bright fuchsia lipstick. Get her look below.
Taylor Swiftshowed the perfect way to rock a bright pink lip with her visit to BBC radio in London! We love how Taylor has been experimenting with her lip color recently, and this is a look that you should totally give a try. What do you think of this look, HollywoodLifers?
Taylor Swift’s London BBC Radio Makeup — Get Her Bold Pink Pout
Taylor’s ultra feminine looks are always guaranteed to be a head turner! Her blonde shoulder length hair was styled with a swooped bang and her pretty, loose curls added such an elegant appeal to her look.
She kept her makeup look rather classic with her go-to winged eyeliner and lengthy lashes, but she switched things up by rocking a bright pink lipstick!
This added such a fun, youthful look to her style, and it showed that bold candy colors aren’t just for the summertime. A bright lip color is the perfect way to add some fun to a classic look, or to give bold contrast to a monochrome outfit. | {
"pile_set_name": "Pile-CC"
} | 0 |
Ana is not like other girls. She does things that most girls her age wouldn't dare to do. She says things that you'd never expect to hear from such a pretty girl. And she fucks like a nymphomaniac. When Ana is in the throes of a deep dicking, something comes over her. Something that makes her spread her buttcheeks and take that hard bone deep into her asshole. This anal angel really is one of a kind. She thinks being fucked in the pussy is great and all, but she'd rather get her starfish stuffed. And after she cums with a cock in her ass, she wants her fuck-toy to cum all over her ass. | {
"pile_set_name": "OpenWebText2"
} | 0.013514 |
I like the way I look FUCK ME, RIGHT?
2,808 shares | {
"pile_set_name": "OpenWebText2"
} | 0.019608 |
In conventional test systems a run length encoding (RLE) algorithm is used to compress vector data of a pattern to reduce the tester (sequencer) memory footprint of the test pattern. The compression can be done by the software (or user) and the decompression can be done by a test processor sequencer program. Conventional RLE algorithms can only compress the data if there is a consecutive repeating pattern in the program. In some cases (such as pseudo random bit sequences—PRBS) the data has no consecutive repeating sequences. A test program can be huge in size (for example even larger than 200 MB) and sometimes cannot be even loaded into a tester memory. Furthermore, a further growth of such test programs is expected for the future.
FIGS. 7A-7D show an example how a conventional run length encoding algorithm is performed.
A sequence of data as shown in FIG. 7A having the length of 18 is assumed. For reasons of simplicity it is assumed that all blocks have the same length.
Using a conventional run length encoding algorithm this sequence in FIG. 7A can be compressed to the sequence shown in FIG. 7B having the length 9, and thereby achieving a compression factor of 2.
But when the data looks like shown in FIG. 7C, it can only be compressed to the sequence shown in FIG. 7D having a length of 16. | {
"pile_set_name": "USPTO Backgrounds"
} | 0 |
back in my day we said "le" and nobody fuckin' cared
119 shares | {
"pile_set_name": "OpenWebText2"
} | 0.015625 |
1998 Saskatchewan Scott Tournament of Hearts
The 1998 Saskatchewan Scott Tournament of Hearts women's provincial curling championship, was held January 21–25 at the Rosetown Sports Centre in Rosetown, Saskatchewan. The winning team of Cathy Trowell, represented Saskatchewan at the 1998 Scott Tournament of Hearts in Regina, Saskatchewan, where the team finished round robin with a 6-5 record, missing the playoffs after losing a tiebreaker to British Columbia's Sue Garvey.
Teams
Standings
Results
Draw 1
January 21, 7:00 PM CT
Draw 2
January 22, 10:00 AM CT
Draw 3
January 22, 2:30 PM CT
Draw 4
January 23, 10:00 AM CT
Draw 5
January 23, 2:00 PM CT
Draw 6
January 27, 7:00 PM CT
Draw 7
January 24, 10:00 AM CT
TieBreaker
January 24, 7:00 PM CT
Playoffs
Semifinal
January 29, 1:00 PM CT
Final
January 29, 5:00 PM CT
References
Saskatchewan Scott Tournament Of Hearts, 1998
Category:1998 in Canadian curling
Category:Scotties Tournament of Hearts provincial tournaments
Category:Curling in Saskatchewan | {
"pile_set_name": "Wikipedia (en)"
} | 0 |
If you're into fantastic teen porn then you're at at the right place for sure. Meet heaps of wonderful young sex stars that need some hardcore fucking right away. These college fuck porn videos are so damn hot and that's plain to see. Our tube brings you some of the finest teen XXX videos on the Internet. Get ready for our sweet looking schoolgirl bitches that want all kinds of freaky banging. 18 years old honeys just love to suck dicks and to get all their tight holes destroyed. This is a perfect place for everyone that loves petite teenage porn ladies. Our XXX selection of porn videos and clips is just mindblowing. Enter this freaky place named videos.fearea.ru and don't forget to bookmark it. You surely don't want to miss top notch porn videos with beautiful young girls. These freaky ladies are open for nasty stuff all the time. Check out your favorite teenage porn models at this fantastic XXX website that will give you so much pleasure. Our aim is to present only the finest stuff with no mediocre content. All these clips are in high quality and it's hard to resist our fantastic selection of models. Pick your favorite type of girl. We have ebony darlings, American whores, European teenage babes, Asian cuties, Brazilian big booty bitches and so much more right here at videos.fearea.ru. It's a truly awesome experience to browse through this fantastic website. This place is user friendly and very easy to navigate. Just browse through our fantastic collection of clips and get ready to meet some of the finest teenage porn sluts in the business. Whether you're into professional sluts or fresh amateur girls we have so much to offer. Blondes, redheads and brunettes are right here and they want some hardcore fucking right now. It would be a great mistake to miss this amazing place packed to the brim with good looking teen bimbos. These hotties are so damn passionate when it comes to sex and that's evident. They love big dicks and sex toys in their flexible fuck holes. It's so good to see them in action, you gotta love our freaky porn spot videos.fearea.ru | {
"pile_set_name": "OpenWebText2"
} | 0.011511 |
Kinetic studies of peptide bond formation. Effect of chloramphenicol.
There might be an undetermined order in the interaction of the substrates with the ribosomes in the reaction of CACCA-Leu-Ac with puromycin to form Ac-Leu-puromycin and CACCA ('fragment reaction'). Km 0°=6×10(-4) M for the puromycin · ribosome interaction. Chloramphenicol totally blocks the 'fragment reaction' as a consequence of a single interaction with the ribosome of Kd 0°=2.2×10(-6) M. The inhibition by chloramphenicol of the 'fragment reaction' is mixed competitive for puromycin. | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
Related Link
Javascript Error
Your browser JavaScript is turned off causing certain features of the NIAID Institute of Allergy and Infectious Diseases web site to work incorrectly. Please visit your browser settings and turn JavaScript on.
Read more information on enabling JavaScript.
Perspectives
Kinyoun has long seemed an indistinct and mysterious character in American biomedical science. Was he a seminal figure or merely a man in the right place at the right time whose role might just as well have been filled by another? Was he a visionary who saw and brought about the future of biomedical science, or an ordinary man of average skills? Would the NIH exist today without him, and if so, in what form? What role did he play in the rapid expansion of American microbiology into a century of dominance in the field? These are questions that cannot now, and perhaps may never, be answered. Kinyoun lived at a time when microbiology, epidemiology, and public health practice came together as a powerful new tool yet to be disentangled into separate disciplines. He seems to have been comfortable with new technology and new ideas, and was able to anticipate their potential importance long before it became apparent to most others. Kinyoun seems to have seen medical research as an exciting new way to be a better physician and citizen. In pursuing medical and public health problems, the record suggests that every step Kinyoun took, even in the most rigorous of experimental research, was directed toward the immediate goal of saving lives and alleviating human suffering and not for mere interest’s sake. Whatever he did, no matter how innovative or technical, was never very far from the bedside or from community welfare. His definition of an ideal health officer seems an apt description of himself: “A true physician in every sense of the word, a man of broad views, of progressive spirit… and a large supply of good common sense” (46). In addition to his work in bacterial and mechanical/engineering areas, Kinyoun had at least one unique ability: to draw insightful public health conclusions from complex and technical scientific data.
Kinyoun was born into a romantic antebellum world of frontiersmen, Native Americans, adventurers, war heroes, and old world Southern gentility; he lived to see a modern era of electricity, telephones, movies, radios, automobiles, airplanes, and noisy, hectic urban life. An old-fashioned Southern gentleman with old-fashioned values (even in private letters to worldly wise colleagues, he wrote “dn” and “hl” for “damn” and “hell”), Kinyoun ended up a “progressive,” living and achieving success in a modern world that had little interest in old-fashioned ways. It was a world of tremendous progress and large-scale upward mobility that could erase one’s origins. At home with memories of the old South and fanciful Uncle Remus-like tales of antebellum plantation life (18), Kinyoun seems to have easily become a polyglot and internationalist, moving about comfortably in the capitals of Europe and Asia, readily adapting to foreign customs and ways of looking at the world. If there are paradoxes or ironies in Kinyoun’s life story, it is not clear that he appreciated them.
The medical world of his childhood had been one of mysterious miasmas and vague telluric (terrestrial) influences acting upon unpredictable diseases of completely unknown causes, of amputations for bacterial infections, and of bleeding and purging for even mild diseases. He lived to see not only full scientific acceptance of the “germ theory,” a rather obscure notion when he was a child, but also complete public acceptance of it as well. More importantly, he saw the tremendous advances in diagnosis, treatment, and public health that arose from acceptance of the germ theory: not just passive immunotherapies, vaccines, antimicrobials, aseptic surgery, or the beginnings of vaccination against childhood diseases, but also mothers sterilizing rubber nipples in pots of safe boiling municipal water, to place upon bottles of pasteurized milk.
It is natural to want to know what sort of man Kinyoun was. But history is not a tool that can easily probe the essential characters of people long dead. Provisionally, and without attempting to look too closely to find the inner man, Kinyoun appears very much a man of his times: progressive, intelligent, and optimistic, who found himself at the cusp of a dramatic new “epoch,” as he called it (46); and, as is often the case with young men of energy and optimism, especially at a time of rapid scientific/technical advances, was able to intuitively recognize and understand it, and to find a comfortable place at its leading edge. Kinyoun seems to have been most at home in the certainty of experimental science and established conclusions, attracted to order and regimentation, a “by the books” conformist, an innovator but an even better adapter. At the same time, he was an original and broadly oriented “big thinker” and an altruist to whom science was an instrument of human good.
Kinyoun’s private correspondence suggests a thorough enjoyment of both his career and personal life, including an unusually intimate and caring family life with strong ties to many friends and family members around the country. He appears to have been scholarly and well-read, thoughtful, reflective, rational, careful, old-fashioned, sensitive, sentimental, loyal, patriotic, full of wit and wry, often facetious and even sarcastic humor, and a pacifist and internationalist but an opponent of colonial expansion. He was also frequently self-doubting, stubborn, fatalistic, moralistic, prone to wounded pride, occasionally prickly and defensive when he felt unfairly treated, and oriented toward hierarchy and following orders. Kinyoun’s perhaps self-justifying view of criticism that he was single-minded and inflexible was that he was instead outspoken and honest, unafraid of going against popular opinion, and incorruptible—traits that he referred to as “Kinyounism,” turning around a pejorative term used by the San Francisco newspapers working against him in 1900. Scientifically circumspect and conservative, he was also personally imaginative, creative, and sometimes effusive in a perhaps characteristically Southern way.
By all accounts a humble man, Kinyoun remained strongly service-oriented and never outwardly sought leadership positions, promotions, or influence. When offered a highly paid position at Chicago’s Rush Medical College, he turned it down on the grounds that, having received most of his training and experience in government service, he had an obligation to use his abilities to serve his country (38). His few leadership positions were mostly officerships in professional societies and were generally associated with hard work and service rather than personal fame or control over others. He seems to have been most content behind the scenes, a consummate team player, repeatedly giving ideas, data, and credit to others, often not even publishing his own work but always sharing it widely. Though soft-spoken, gentlemanly, and nonconfrontational, Kinyoun does not appear to have been shy. In national and international meetings, he spoke often, authoritatively, and with the force of logic—avoiding conclusions beyond what the data established, rarely speculating, and always being fair to multiple sides of an issue. When he spoke, his opinions appear rarely to have been challenged by others. He clearly held his own in discussions and friendly debates with virtually all the American and European leaders in microbiology, immunology, and infectious diseases of his era. His opinions and assistance were widely sought by many leading scientists and appear to have been always given generously.
Colleagues seemed to respect him and defer to his experience and wisdom. Many continued to remember and write about him in admiring terms long after he left the national spotlight (1, 36, 106). A North Carolina friend called him “a splendid illustration of a high-grade, cultured Carolina gentleman,” having “a wonderfully well-stored mind of many things calculated to both edify and enlighten” (107). He also exhibited a talent for identifying and mentoring promising men, not only Reed, Rosenau, Geddings, and William Franklin Elgin (1861–1938), but others like John F. Anderson (1873–1958), who became director of the Hygienic Laboratory after Rosenau, and two future Surgeons General: Hugh S. Cumming (1869–1948; serving as Surgeon General from 1920 to 1936), who trained under Kinyoun in the 1890s, and Thomas Parran, Jr. (1892–1968; serving as Surgeon General from 1936 to 1948) (25), a medical student Kinyoun mentored near the end of his life, and in whom he instilled the desire to pursue a career in the Public Health Service (38). | {
"pile_set_name": "Pile-CC"
} | 0.000226 |
Disseminated tumor cells in bone marrow assessed by TWIST1, cytokeratin 19, and mammaglobin A mRNA predict clinical outcome in operable breast cancer patients.
To investigate the prognostic relevance of disseminated tumor cells (DTCs) in bone marrow (BM) assessed by a multimarker mRNA panel consisting of TWIST1, cytokeratin 19 (CK19) and human mammaglobin A (hMAM) mRNA, in patients with early breast cancer. TWIST1 (gene name: TWIST1), CK19 (gene name: KRT19), and hMAM (gene name: SCGB2A2) mRNA was quantitated in BM samples from 191 operable breast cancer patients by real-time reverse transcriptase polymerase chain reaction (RT-PCR). Using the highest relative mRNA concentration of TWIST1 in the control population as a cut-off, 5 of the 191 breast cancer patients showed elevated TWIST1 mRNA levels in their BM by real-time RT-PCR. Two of these patients experienced a systemic relapse during a median follow-up of 98 months. Combining these results with previous hMAM and CK19 mRNA quantifications in the same BM samples, 12 (40%) of the 30 patients with BM positive for at least 1 marker (multimarker positive) experienced a systemic relapse as compared with 18 (11%) of the 161 patients with multimarker-negative BMs. The patients with multimarker-positive BM had significantly shorter systemic recurrence-free survival (P < .001, log-rank test), breast cancer-specific survival (P < .001), and overall survival (P = .03). The prognostic relevance of BM multimarker detection appeared to be independent of adjuvant treatment, although the difference was not statistically significant in the subgroup of patients who received adjuvant chemotherapy. Multivariate analysis demonstrated the BM multimarker panel status to be a strong independent predictor of clinical outcome. Our results demonstrated the prognostic relevance of BM DTCs assessed by a multimarker mRNA panel consisting of TWIST1, CK19, and hMAM in operable breast cancer patients. | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
The huge library of sexy and immersive similar movies . He was hanging out with his hot, new stepsister when she moved a certain way and he got a glimpse up her skirt to see her panties. Catching him in the act, she decided to give him a treat so she shocked him by pulling her dress all the way off. She wasn't wearing a bra so her big tits spilled out then she pulled her legs back, slipped her panties to the side, and finger fucked her wet pussy. Having him watch her get herself off only turned her on and made her orgasm that much more intense. That is how you get to know someone! | {
"pile_set_name": "OpenWebText2"
} | 0.010221 |
In the
United States Court of Appeals
For the Seventh Circuit
No. 12-3490
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
MARK J. MCGILL,
Defendant-Appellant.
Appeal from the United States District Court for the
Northern District of Illinois, Eastern Division.
No. 09 CR 770 — Joan B. Gottschall, Judge.
ARGUED MAY 21, 2013 — DECIDED JUNE 13, 2014
Before POSNER, MANION, and ROVNER, Circuit Judges.
ROVNER, Circuit Judge. By the government’s account,
Mark McGill spent most of his free time in his apartment and
rarely socialized except with Jacob “Jake” Elliott. Elliott had
befriended McGill in 2006 after they met through an acquain-
tance who shared their sexual attraction to young boys. It was
Elliott who introduced McGill to child pornography, yet
during their three-year friendship, he had never known McGill
2 No. 12-3490
to give child pornography to anyone, not even when Elliott
took him to a 2008 gathering arranged specifically for partici-
pants to swap child pornography. Elliott, on the other hand,
regularly attended these events and was using the Internet to
distribute child pornography, including photos he took of
himself sexually assaulting a young boy.
Elliott was arrested in 2009 and, when offered hope of
leniency, became an FBI informant. He targeted McGill, who,
after weeks of pestering, allowed Elliot to bring a USB flash
drive to his apartment to copy child pornography from his
computer. For this indulgence McGill was charged with
distributing child pornography in addition to possession. See 18
U.S.C. § 2252A(a)(2), (a)(5)(B). At trial he sought to raise
entrapment as a defense to the distribution count, but prosecu-
tors convinced the judge not to instruct the jury on that
defense. McGill was found guilty of both crimes, and on appeal
he argues that refusing to give an entrapment instruction was
reversible error. We agree with him.
I.
The question before us is whether a rational jury could have
found in favor of McGill on the issue of entrapment. In
answering that inquiry, we look at the trial evidence in the
light most favorable to McGill. See United States v. Pillado, 656
F.3d 754, 758 (7th Cir. 2011); United States v. Díaz-Maldanado,
727 F.3d 130, 136 (1st Cir. 2013); United States v. Theagene, 565
F.3d 911, 917–18 (5th Cir. 2009); United States v. Glover, 153 F.3d
749, 752 (D.C. Cir. 1998).
The FBI had executed a search warrant at Elliott’s residence
in June 2009 and found thousands of images of child pornogra-
No. 12-3490 3
phy. Those images include Elliott’s photos of himself abusing
a young boy. When Elliott was told (quite accurately) that life
imprisonment was a genuine possibility, he agreed to help
investigators gather evidence against fellow members of
“boylovers,” a group interested in child pornography featuring
young boys.
Elliott’s cooperation, which mostly involved meeting or
telephoning suspects, led to the arrests of several men, includ-
ing McGill, then 24 years old. Before trial McGill notified
prosecutors that he intended to raise an entrapment defense,
though only on the distribution count. The government
responded by moving in limine to prevent McGill from arguing
entrapment or eliciting evidence supporting that affirmative
defense. The district court denied the government’s motion but
reserved for trial a decision whether to instruct the jury on
entrapment.
At trial Elliott was the government’s star witness. He
testified that he and McGill belonged to “boylovers,” whose
members mostly interacted online but occasionally met in
person. Elliott conceded, however, that he hadn’t mentioned
McGill when the FBI first asked him to name others in the
group. For some time the two had been socializing in person at
least twice monthly, yet McGill’s name as a possible target did
not surface until, by chance, he telephoned Elliott during a
June 2009 meeting with agents.
After that the investigation of McGill began in earnest. Over
the next three weeks, Elliott repeatedly telephoned him
probing his activities and asking for child pornography. In the
first of these fifteen recorded calls, McGill disclaimed any
4 No. 12-3490
interest in acquiring more child pornography and said he felt
uncomfortable even discussing the subject of child pornogra-
phy with anyone but Elliott. McGill proposed that they simply
“hang out,” but Elliott steered the conversation back to child
pornography. He said that fear of being caught had led him to
discard his stash, which now he wanted to replace. Another
“boylover,” Elliott prompted, already had promised to provide
copies of his files. McGill said he possibly could help, though
he quickly added that the other member’s collection likely was
much larger. As this conversation wound down, McGill
repeated that Elliott was the only person he trusted to converse
with about child pornography.
McGill’s unease around other people, even other
“boylovers,” is evident throughout the recordings. On one
occasion Elliott left a message proposing that the group meet;
McGill did not respond, and when Elliott called again pushing
for a gathering, McGill balked. In particular he opposed
Elliott’s plan to bring along someone new. McGill voiced
reluctance to mingle with unfamiliar faces, and although he
finally he agreed to tag along, he later canceled and went
camping.
Elliott reacted by calling and pressuring McGill to attend
a “boylovers” meeting. The group should assemble—ideally,
he suggested, at McGill’s apartment. McGill rebuffed the idea,
saying he was uncomfortable hosting anyone but Elliott.
McGill suggested that just the two of them meet somewhere
for a beer or to play frisbee golf. Elliott countered that he first
wanted to stop by McGill’s apartment with a flash drive and
copy the child pornography on his computer. McGill relented.
No. 12-3490 5
Yet when that day arrived, McGill called to cancel, saying
he was sick. Elliott, perhaps thinking he was lying, pushed to
stop by anyway. McGill refused. At Elliott’s prodding, though,
he agreed to call later in the day if he felt better. When McGill
did not call, Elliott did. McGill acquiesced to the visit, and
Elliott brought along a flash drive that they used to copy
McGill’s collection of child pornography.
In the days after, Elliott continued calling McGill urging
him to attend a party (actually, an FBI sting) with others
interested in child pornography. McGill rejected the invitation.
During one telephone conversation, he elaborated on his social
anxiety and said that being with more than a couple of people
makes him uncomfortable. Even Elliott’s visit, he added, had
caused him to experience a near panic attack. This information
did not surprise Elliott; at trial he conceded knowing that
McGill was a “loner” who regularly conversed with him but
no one else outside of family.
Elliott’s work to ensnare McGill yielded hours of recorded
conversations devoted mostly to subjects other than child
pornography. As Elliott conceded at trial, the two discussed
topics ranging from music and politics to the supernatural and
roommate troubles. He also admitted that McGill wasn’t the
one who turned their conversations to child pornography.
Elliott’s objective, he conceded, was persuading McGill to
distribute child pornography.
The district court, after hearing this evidence, refused
McGill’s request to instruct the jury on his defense of entrap-
ment to the distribution count. The court accepted McGill’s
argument that the government had not proved he was predis-
6 No. 12-3490
posed to distribute child pornography. On the other hand, the
court reasoned, neither was there evidence that McGill was
induced to give Elliott copies of the files on his computer. The
court characterized the pressure exerted by Elliott as “pretty
nil” and “nothing out of the ordinary.” McGill had been
“willing to do this for Mr. Elliott,” the court added, though
“not for anybody else.” After the jury returned guilty verdicts,
McGill moved for a new trial on the ground that withholding
the entrapment instruction deprived him of a fair trial. That
motion was denied.
McGill’s act of sharing his files with Elliott increased the
high end of his guidelines imprisonment range by more than
6 years, and his conviction for distribution subjected him to a
5-year statutory minimum. See 18 U.S.C. § 2252A(b)(1). Under
U.S.S.G. § 2G2.2, which applies to convictions for both posses-
sion and distribution, McGill would have received upward
adjustments of 2 levels because children depicted were
younger than 12, id. § 2G2.2(b)(2); 4 levels because some
images depict violence, id. § 2G2.2(b)(4); 2 levels because a
computer was used, id. § 2G2.2(b)(6); and 5 levels because of
the large number of images, id. § 2G2.2(b)(7)(D). The base
offense level for distribution, however, is 22 rather than 18.
Id. § 2G2.2(a). McGill had no criminal history, so sharing his
child pornography with Elliott increased his guidelines
exposure from a range of 108 to 135 months (Total Offense
Level 31 × Criminal History Category I) to a range of 168 to 210
months (Total Offense Level 351 × Criminal History
1
Whenever a child-pornography prosecution involves
(continued...)
No. 12-3490 7
Category I). Had McGill pleaded guilty just to possession, as
it seems he was willing to do, his imprisonment range likely
would have dropped to 78 to 97 months (Total Offense
Level 28 × Criminal History Category I).
The prosecutor insisted that it was McGill’s idea to share
his child pornography with Elliott, not Elliott’s idea. Thus, the
prosecutor argued, a prison sentence within the guidelines
range would be appropriate. McGill’s lawyer countered that
the statutory minimum would be adequate punishment.
1
(...continued)
distribution, there is, by default, a further increase of at least
2 levels. U.S.S.G. § 2G2.2(b)(3)(F). That upward adjustment
would have bumped McGill’s total offense level to 37 and his
imprisonment range to 168 to 210 months, nearly twice the
range for possession. The district court did not apply this 2-
level increase, however, because the government, citing our
decision in United States v. Tenuto, 593 F.3d 695, 697 (7th Cir.
2010), asserted that impermissible “double counting” would
result from giving this increase in a prosecution for distribu-
tion. We take no position concerning the government’s reading
of Tenuto. We note, however, that five circuits have rejected
double-counting objections to the application § 2G2.2(b)(3)(F)
in prosecutions for distribution of child pornography.
See United States v. Clark, 2014 WL 289460, at *1 (6th Cir. Jan. 28,
2014); United States v. Reingold, 731 F.3d 204, 227–28 (2d Cir.
2013); United States v. Chiaradio, 684 F.3d 265, 282–83 (1st Cir.
2012); United States v. Frakes, 402 F. App’x, 332, 335–36 (10th
Cir. 2010); United States v. Fugit, 296 F. App’x 311, 312–13 (4th
Cir. 2008).
8 No. 12-3490
Defense counsel spoke only briefly and suggested that the
district court would benefit more from hearing directly from
McGill, who before sentencing had submitted to a
psychosexual evaluation. The psychologist concluded, in part,
that from a young age McGill had become fixated on sexual
activity initiated by another boy who was a couple of years
older than he was. The psychologist had found McGill to be
remorseful and believed his explanation that he distributed
child pornography only because he did not want to turn down
Elliott, his friend and the person who introduced him to child
pornography.
During his allocution McGill recalled the beginning of his
involvement with the “boylovers” group when he was 17 years
old, explaining that his “intention from the start was to find
somebody … that I could talk to about my problems that
wouldn’t treat me like I was a monster.” He was “so terrified
to seek help from those who might actually provide it,” said
McGill, that he dug himself “much deeper into the problem
that I sought to fix.” McGill acknowledged being selfish and
immature, and indifferent “to the lives of the children who
were devastated to create the images he possessed.” He
expressed deep remorse for the “pain and anguish” experi-
enced by his victims and their families.
The district judge, who earlier in the sentencing proceeding
had said that McGill never would have distributed child
pornography “if the Government hadn’t set him up to do it,”
sentenced McGill to 108 months. In explaining that below-
range term, the judge emphasized her disagreement with the
2-level upward adjustment for use of a computer, see U.S.S.G.
§ 2G2.2(b)(6), and, impressed by the sincerity of McGill’s
No. 12-3490 9
remorse, suggested that he should receive significant credit for
acceptance of responsibility whether or not § 3E1.1 technically
applied. “I’m not sure,” the judge remarked, “that anybody
has ever come to terms with what he did in the way Mr. McGill
has.” The judge decided that McGill deserved a break equiva-
lent to 4 offense levels, which effectively reduced his total
offense level to 31 (from 35) and placed him in the same
imprisonment range of 108 to 135 months that he would have
faced with only a conviction for possession. Had the judge
given McGill that same break without his conviction for
distribution, his imprisonment range effectively would have
been 70 to 87 months.
II.
On appeal McGill challenges the district court’s rejection of
his jury instruction on entrapment. Entrapment occurs when
the government coerces a defendant into committing an illegal
act he was not otherwise predisposed to commit. See United
States v. Russell, 411 U.S. 423, 434–35 (1973); Sherman v. United
States, 356 U.S. 369, 372 (1958); Pillado, 656 F.3d at 763. The
defense of entrapment recognizes that a goal of law
enforcement is to prevent crime, not to tempt citizens to
engage in criminal activity. See Sherman, 356 U.S. at 372; United
States v. Hollingsworth, 27 F.3d 1196, 1200 (7th Cir. 1994) (en
banc).
An entrapment instruction is warranted if the evidence
would permit a jury to find that the defendant was not
predisposed to commit the crime and that the government
induced him to do so. See Pillado, 656 F.3d at 763; United States
v. Santiago-Godinez, 12 F.3d 722, 728 (7th Cir. 1993). Although
10 No. 12-3490
more than a scintilla of evidence of entrapment is needed
before instruction on the defense becomes necessary, the
defendant need only point to evidence in the record that would
allow a rational jury to conclude that he was entrapped.
See United States v. Haddad, 462 F.3d 783, 789–90 (7th Cir. 2006);
United States v. Blassingame, 197 F.3d 271, 280 (7th Cir. 1999).
Whether a defendant was entrapped typically is a question for
the jury. See Mathews v. United States, 485 U.S. 58, 63 (1988);
United States v. Plowman, 700 F.3d 1052, 1057 (7th Cir. 2012).
The district court identified nothing in the record suggest-
ing that McGill was predisposed to distribute child pornogra-
phy, and on this point we agree. In the first place, the govern-
ment’s investigation turned up no evidence that McGill ever
before had distributed child pornography. The government
concedes as much, but asserts that McGill never shied away
from situations in which child pornography was distributed,
and that his very possession of child pornography is evidence
of a predisposition to distribute. We are not persuaded.
Concerning the government’s first point, McGill’s behavior
in situations when others around him were sharing child
pornography belies an inference that he himself was predis-
posed to distribute. The government points to McGill’s use of
file-sharing applications to acquire child pornography, but so
what? These applications, although designed to promote
sharing, also permit a user to exclude outsiders from gaining
access to files on the user’s computer.2 The government offered
2
For a useful discussion of the how these applications permit
(continued...)
No. 12-3490 11
no evidence that McGill had unlocked his files even while he
had file-sharing applications on his computer. Moreover, in
Elliott’s very first recorded phone call to McGill, the defendant
was explicit that he would not again use file-sharing applica-
tions. The government also makes much of McGill’s attendance
at a party where other men were distributing child pornogra-
phy. But McGill took nothing to that party (and brought nothing
home), and the next time Elliott pushed him to attend a similar
gathering, McGill declined.
The government’s other premise, that McGill’s possession
of child pornography is evidence of a predisposition to
distribute, proves too much. Possession and distribution are
very different crimes; the government’s long history of
prosecuting drug offenses surely makes this evident, as
possession of a controlled substance generally is a misde-
meanor but distribution, even of small amounts, is a felony.
See 21 U.S.C. §§ 841(a)(1), 844(a); Abuelhawa v. United States, 556
U.S. 816, 822 (2009) (describing history of statutory designation
of drug crimes as misdemeanors or felonies); United States v.
Swiderski, 548 F.2d 445, 450–51 (2d Cir. 1977) (joint purchase of
cocaine punishable only as misdemeanor possession, not
felony distribution). The government is not free to induce
2
(...continued)
users to restrict the files they share, see United States v. Handy,
2009 WL 151103, at *2 (M.D. Fla. Jan. 21, 2009). See also Note,
Maggie Muething, Inactive Distribution: How the Federal
Sentencing Guidelines for Distribution of Child Pornography Fail to
Effectively Account for Peer-to-Peer Networks, 73 Ohio St. L.J.
1485, 1489 & nn.23–26 (2012).
12 No. 12-3490
more-serious crimes simply because the target already commit-
ted a lesser crime. See Sherman, 356 U.S. at 376 (explaining that
entrapment occurs when government “beguiles” defendant
into engaging in crimes that “he otherwise would not have
attempted”); see also United States v. Swiderski, 539 F.2d 854,
857–59 (2d Cir. 1976) (drug users entitled to entrapment
instruction on distribution charge); United States v. Watson, 489
F.2d 504, 507–09 (3d Cir. 1973) (drug user entitled to entrap-
ment instruction on distribution charge); United States v. Cardi,
478 F.2d 1362, 1367 (7th Cir. 1973) (jury properly instructed on
entrapment in prosecution of drug user for distribution).
The government rejoins that sending Elliott after McGill
ensnared only an unwary criminal, and at oral argument made
much of the statement in Sherman, 356 U.S. at 372, that “a line
must be drawn between the trap for the unwary innocent and
the trap for the unwary criminal.” See also Russell, 411 U.S. at
436. But the ranks of the “unwary innocent” are not limited to
those whose lives are crime free. See, e.g., Sherman, 356 U.S. at
376; United States v. Luisi, 482 F.3d 43, 58 (1st Cir. 2007) (mem-
ber of La Casa Nostra who previously engaged in drug
trafficking was entitled to entrapment instruction on cocaine-
trafficking charges); United States v. Ewbank, 483 F.2d 1149, 1151
(9th Cir. 1973) (“The fact that appellant here was involved in
the drug culture, according to his own admission being a user,
does not establish that he was also a predisposed seller or
distributor within the meaning of the crime of which he was
convicted.”); accord United States v. Isnadin, 742 F.3d 1278, 1297,
1301–02 & n.31 (11th Cir. 2014) (approving jury instructions
permitting jury to find entrapment to some, but not all,
charged crimes); United States v. Mitchell, 67 F.3d 1248, 1252–57
No. 12-3490 13
(6th Cir. 1995) (same). McGill was not innocent of posses-
sion—and never claimed to be—but before his August 2009
meeting with Elliott he was, as far as the government can say,
innocent of the crime of distributing child pornography.
Despite finding no evidence of predisposition, the district
court refused to instruct the jury on entrapment because the
court did not think that McGill had pointed to evidence of
government inducement. Here we part ways with the district
judge. Government exploitation of friendship can constitute
improper inducement. See, e.g., Sherman, 356 U.S. at 371–73
(majority op.); id. at 383 (Frankfurter, J., concurring); Sorrells v.
United States, 287 U.S. 435, 439–40 (1932); United States v.
Poehlman, 217 F.3d 692, 702 (9th Cir. 2000); United States v.
Gamache, 156 F.3d 1, 11 (1st Cir. 1998); United States v. Nations,
764 F.2d 1073, 1080 (5th Cir. 1985); United States v. McLernon,
746 F.2d 1098, 1113–14 (6th Cir. 1984). Assessing an entrapment
defense involves a subjective inquiry, see Pillado, 656 F.3d at
764–66; United States v. Stallworth, 656 F.3d 721, 726 (7th Cir.
2011), meaning that a defendant is entitled to argue that he was
particularly susceptible to inducement, see, e.g., United States v.
Sandoval-Mendoza, 472 F.3d 645, 656 (9th Cir. 2006); United
States v. Nunn, 940 F.2d 1148, 1149 (8th Cir. 1991); United States
v. Newman, 849 F.2d 156, 165 (5th Cir. 1988); accord McLernon,
746 F.2d at 1115.
Elliott himself characterized McGill as a loner with few
other friends, living in near isolation. And the jury had before
it McGill’s confession to Elliott of his social anxiety. Elliott
alone could have traded on McGill’s insecurities to make the
number of telephone calls that he did in a brief period of time.
14 No. 12-3490
The jury heard many of those conversations, and Elliott
conceded that whenever McGill innocently turned the discus-
sion to one of many subjects unrelated to child pornography,
as he often did, Elliott would do his best to steer McGill back
to the single objective of the FBI’s investigation: convincing
him to download child pornography for Elliott, his friend.
We conclude that this record provided a sufficient basis for
a rational jury to infer that Elliott exploited his unique connec-
tion with McGill to induce the defendant to distribute child
pornography. At trial and now on appeal the government has
been emphatic that McGill, not Elliott, instigated the distribu-
tion crime during their very first recorded telephone conversa-
tion. McGill offered to share his files with Elliott, the govern-
ment insists, without being directly asked. But this gloss on the
telephone conversation is not the only one that is reasonable.
By the time McGill “offered” his files to Elliott, he already
knew that Elliott had arranged to obtain a third party’s
collection. And that collection, McGill was quick to add, was
far superior to his own. As we see it, that sequence, along with
McGill’s observation about the third party’s collection of child
pornography, would allow a rational jury to conclude that
McGill’s overture was intended to protect a friendship with
one of the few people with whom he was comfortable. The real
test came when Elliott—so it seems—surprised McGill by
accepting his gesture of friendship, and after that at every turn
McGill stalled on delivering the goods. A rational, properly
instructed jury could have seen things differently than the
government and concluded that McGill’s vulnerability and fear
of losing Elliott’s friendship left him particularly susceptible to
government inducement. Indeed, the district judge seems to
No. 12-3490 15
have found this inference compelling, as she made known her
belief that the government had exploited McGill’s friendship
with Elliott.
The existence of competing inferences is precisely why the
issue of entrapment should have been submitted to the jury.
The question is not whether the government’s take strikes us
as logical or even probable, but simply whether “there exists
evidence sufficient for a reasonable jury to find” in the defen-
dant’s favor. Mathews, 458 U.S. at 63; see Pillado, 656 F.3d at
766–68. An evidentiary foundation for a defensive theory,
“however tenuous” that foundation might seem, compels
submitting the defense to the jury. See United States v. Kokenis,
662 F.3d 919, 929 (7th Cir. 2011) (internal quotation marks and
citation omitted); see also United States v. Sawyer, 558 F.3d 705,
710 (7th Cir. 2009); United States v. VanAllen, 524 F.3d 814, 823
(7th Cir. 2008). The evidence before the jury in this case easily
clears that minimal hurdle.
McGill’s conviction on the distribution count is REVERSED,
and that count is REMANDED for further proceedings. On
remand the government must proceed without delay if it elects
to retry McGill on that count. McGill’s sentence on the posses-
sion count is VACATED; that concurrent sentence is linked to
his conviction for distribution and, on remand, must be
reconsidered in conjunction with the disposition of the distri-
bution charge.
| {
"pile_set_name": "FreeLaw"
} | 0.001513 |
Q:
same taxonomy for several post types: how to hide empty in a specific post type?
I have a taxonomy "artist" for two different custom post types ("project" and "product").
I need to display a list of "artists", but only if they have related "products", and only if those products are still in stock.
$artists = get_terms( array(
'taxonomy' => 'artist',
'hide_empty' => 1,
) );
This includes artists having "projects" but no "products". Is it possible to specify for which post type the "hide_empty" argument should refer to ?
EDIT
Here is what I have so far.
/*
Useful when one taxonomy applies to multiple post types
source: http://wordpress.stackexchange.com/a/24074/82
*/
function get_terms_by_post_type( $taxonomies, $post_types ) {
global $wpdb;
$query = $wpdb->prepare(
"SELECT t.*, COUNT(*) from $wpdb->terms AS t
INNER JOIN $wpdb->term_taxonomy AS tt ON t.term_id = tt.term_id
INNER JOIN $wpdb->term_relationships AS r ON r.term_taxonomy_id = tt.term_taxonomy_id
INNER JOIN $wpdb->posts AS p ON p.ID = r.object_id
WHERE p.post_type IN('%s') AND tt.taxonomy IN('%s')
GROUP BY t.term_id",
join( "', '", $post_types ),
join( "', '", $taxonomies )
);
$results = $wpdb->get_results( $query );
return $results;
}
$artists = get_terms_by_post_type( array('artist'), array('product'));
//*
if( !empty($artists) && !is_wp_error( $artists ) ){
// filter out out-of-stock products artists
foreach($artists as $k=>$artist){
$args = array(
'post_type' => 'product',
'post_status' => 'publish',
'posts_per_page' => -1,
'tax_query' => array(
'relation' => 'AND',
array(
'taxonomy' => 'artist',
'field' => 'id',
'terms' => array( $artist->term_id )
),
array(
'key' => '_stock_status',
'value' => 'instock'
)
)
);
$query = new WP_Query($args);
echo $artist->slug;
pr($query->post_count);
if($query->post_count<1){
unset($artists[$k]);
}
}
}
It almost works, but it does not remove products out of stock.
A:
Thanks to this answer, I was able to see the light. Here is how to query taxonomy terms related to (woocommerce) products that are "in stock". It uses both tax_query (to relate product to taxonomy) and meta_query (to filter out out-of-stock products).
$artists = get_terms_by_post_type( array('artist'), array('product'));
if( !empty($artists) && !is_wp_error( $artists ) ){
// filter out out-of-stock products artists
foreach($artists as $k=>$artist){
$args = array(
'post_type' => 'product',
'post_status' => 'publish',
'posts_per_page' => -1,
'meta_query' =>array(
'relation' => 'AND',
array(
'key' => '_stock_status',
'value' => 'instock',
'compare' => '='
)
,
array(
'key' => '_stock',
'value' => '0',
'compare' => '>'
)
,
array(
'key' => '_stock',
'value' => '',
'compare' => '!='
)
),
'tax_query' => array(
'relation' => 'AND',
array(
'taxonomy' => 'artist',
'field' => 'id',
'terms' => array( $artist->term_id )
),
)
);
$query = new WP_Query($args);
if($query->post_count<1){
unset($artists[$k]);
}
}
}
function get_terms_by_post_type( $taxonomies, $post_types ) {
global $wpdb;
$query = $wpdb->prepare(
"SELECT t.*, COUNT(*) from $wpdb->terms AS t
INNER JOIN $wpdb->term_taxonomy AS tt ON t.term_id = tt.term_id
INNER JOIN $wpdb->term_relationships AS r ON r.term_taxonomy_id = tt.term_taxonomy_id
INNER JOIN $wpdb->posts AS p ON p.ID = r.object_id
WHERE p.post_type IN('%s') AND tt.taxonomy IN('%s')
GROUP BY t.term_id",
join( "', '", $post_types ),
join( "', '", $taxonomies )
);
$results = $wpdb->get_results( $query );
return $results;
}
| {
"pile_set_name": "StackExchange"
} | 0 |
Update: A representative has confirmed that the documentary will continue to be available on the HBO television network. Quentin Schaffer, HBO’s Executive Vice President of Corporate Communications, said that the report is untrue and that the network will continue to show the documentary through April 17. It will also remain available to watch on HBO Now and HBO Go.
93.9 WKYS apologizes for the error.
Source: OkayPlayer & HBO
Original Story:
Source: rhymeswithsnitch.com
Join Our Text Club To Get The Latest Music, Entertainment, Contests And Breaking News On Your Phone. Text KYS to 37890 To Join
So you know how last month Michael Jackson’s accusers James Safechuck was caught in a huge lie in the Leaving Neverland documentary on HBO? Safechuck claimed he was abused by Jackson inside the train station at the Neverland Ranch, which we later found out wasn’t even yet built during the time he claims the abuse took place.
Meanwhile, it looks like HBO has quietly taken the documentary off the air. According to reports, the network was supposed to air Leaving Neverland until September but now the doc is ending this week.
Close Thank you for subscribing! Please be sure to open and click your first newsletter so we can confirm your subscription.
It may also have something to do with the fact that The Estate of Michael Jackson is currently suing HBO and Michael’s nephews are raising money to film a counter-documentary.
Oh and as far as Oprah Winfrey, all of the interviews with Wade Robeson & James Safechuck have been deleted from her Youtube Channel. Interesting… | {
"pile_set_name": "OpenWebText2"
} | 0 |
Fuck it bill murray is on the rise Move your karma from grumpy cat right meow
106 shares | {
"pile_set_name": "OpenWebText2"
} | 0.011236 |
Stroking soccer jock cock with new dude Declan
Declan is an interesting guy. He’s a horny guy who loves to work out and he’s got an uncut soccer jock cock to show us in this debut packed with cock stroking and cum splashing. He’s a European guy, half British and half Spanish, but he’s been in the US for a while. He used to play soccer in high school and he was the only guy in the team showers with an uncut cock. I guess that got him a lot of attention!
He’s giving us a great solo show for his first video and I don’t think it’s gonna be long until we see him back to be serviced by one of the other guys on the site. Although I’m mostly about the jerk off action, I have to admit I’m looking forward to seeing how he handles being on set with another hard cock. | {
"pile_set_name": "Pile-CC"
} | 0.009115 |
1)Did you see what he just did?Yeah man that was fucking swote 2)You don't need to know what it means, only that the word swote is fuckin swote.3) Swote is an undefeatable goliath the likes of which have never been seen before. | {
"pile_set_name": "OpenWebText2"
} | 0.008811 |
fileFormatVersion: 2
guid: 73f19489f4cdd054399aed4a6ed7c26e
TextureImporter:
fileIDToRecycleName: {}
externalObjects: {}
serializedVersion: 7
mipmaps:
mipMapMode: 0
enableMipMap: 1
sRGBTexture: 1
linearTexture: 0
fadeOut: 0
borderMipMap: 0
mipMapsPreserveCoverage: 0
alphaTestReferenceValue: 0.5
mipMapFadeDistanceStart: 1
mipMapFadeDistanceEnd: 3
bumpmap:
convertToNormalMap: 0
externalNormalMap: 0
heightScale: 0.25
normalMapFilter: 0
isReadable: 0
streamingMipmaps: 1
streamingMipmapsPriority: 0
grayScaleToAlpha: 0
generateCubemap: 6
cubemapConvolution: 0
seamlessCubemap: 0
textureFormat: 1
maxTextureSize: 2048
textureSettings:
serializedVersion: 2
filterMode: -1
aniso: 4
mipBias: -100
wrapU: -1
wrapV: -1
wrapW: -1
nPOTScale: 1
lightmap: 0
compressionQuality: 50
spriteMode: 0
spriteExtrude: 1
spriteMeshType: 1
alignment: 0
spritePivot: {x: 0.5, y: 0.5}
spritePixelsToUnits: 100
spriteBorder: {x: 0, y: 0, z: 0, w: 0}
spriteGenerateFallbackPhysicsShape: 1
alphaUsage: 1
alphaIsTransparency: 0
spriteTessellationDetail: -1
textureType: 0
textureShape: 1
singleChannelComponent: 0
maxTextureSizeSet: 0
compressionQualitySet: 0
textureFormatSet: 0
platformSettings:
- serializedVersion: 2
buildTarget: DefaultTexturePlatform
maxTextureSize: 2048
resizeAlgorithm: 0
textureFormat: -1
textureCompression: 2
compressionQuality: 50
crunchedCompression: 0
allowsAlphaSplitting: 0
overridden: 0
androidETC2FallbackOverride: 0
- serializedVersion: 2
buildTarget: Standalone
maxTextureSize: 2048
resizeAlgorithm: 0
textureFormat: 25
textureCompression: 2
compressionQuality: 50
crunchedCompression: 0
allowsAlphaSplitting: 0
overridden: 1
androidETC2FallbackOverride: 0
- serializedVersion: 2
buildTarget: PS4
maxTextureSize: 2048
resizeAlgorithm: 0
textureFormat: 25
textureCompression: 2
compressionQuality: 50
crunchedCompression: 0
allowsAlphaSplitting: 0
overridden: 1
androidETC2FallbackOverride: 0
spriteSheet:
serializedVersion: 2
sprites: []
outline: []
physicsShape: []
bones: []
spriteID:
vertices: []
indices:
edges: []
weights: []
spritePackingTag:
pSDRemoveMatte: 0
pSDShowRemoveMatteOption: 0
userData:
assetBundleName:
assetBundleVariant:
| {
"pile_set_name": "Github"
} | 0 |
viagra / dosage10 / 20viagra without a doctor prescription viagra 10mg how long does it last interests <a href="http://viagrawithoutdoctorus.net">viagra without a doctor prescription</a> - viagra nerve system viagra pills for men all times are utc | {
"pile_set_name": "Pile-CC"
} | 0.016194 |
Bella Bendz in Shoplifting Santa (BBW Porn) [HD/816 MiB] - 720p
Dressed in a slutty Santa suit, BBW Bella Bendz, is looking to score a few Christmas gifts without having to pay for them. Once she?s busted, JB makes her a deal. She can keep the items if she can make him cum. JB strips her out of her clothes and squeezes and caresses her juicy BBW butt and plumper tits. JB licks and fingers her perfect pink pussy then fucks the shit out of her right then and there in the back room until they both cum nice and hard. | {
"pile_set_name": "Pile-CC"
} | 0.019268 |
Hot sex is good sex. You should always keep it spicy in and out of the bedroom. Let’s just say…I’m sizzling hot everywhere and anywhere. Don’t close your eyes for a second. You never know what might happen. You never know what mood you will catch me in. I’m always ready to switch it up. That’s why men love calling me their hot sex switch bitch. One Sunday afternoon Alex came over to find me dressed up like his perfect pretty princess. Usually, I would be dressed in my Football Jersey. Well, watching Football was the furthest thing on his mind. He didn’t want to slip into his man cave- he wanted to slip into me. Needless to say, I had something else in mind for him. It all started out so sexy sweet. Dressed in adorable white lingerie, I was his perfect angel. His Goddess of beauty, as my long dark hair, cascaded down my back. Slowly he laid me down on the bed and began kissing down my luscious body. Making his way to every inch of my body. His tongue glided over my body tasting and licking me. He didn’t miss a spot. Removing my silky white panties and spreading my angel wings for a taste of ecstasy.
Blowing my mind for what seemed hours. It was time for naughty Raven to take control. I didn’t skip a beat, as I kept the hot sex mood flowing. Alex was lying on his back, as I glided my sexy body across his. Kiss and teasing his shoulders and neck, he didn’t expect what came next. He was helpless, as he felt my sexy tool slip between his crack. He didn’t resist, slowly he leaned back. Taking every inch of my glistening tool. He couldn’t resist me. He wanted more. Looking over his shoulder, he whispered in pleasure “Fuck Me, Baby!” Any day is a good day to explore all your Kinky Fetish needs.
Up for some Hot Sex with Raven the Sexy Switch Bitch?
Let’s explore some hot sex stories together. I want to experiment with you and push your boundaries. Ready to have some of the BEST Mutual Masturbation phone sex? I have something just for you… free phone sex minutes ADDED to your paid call? FIRST TIME CALLERS ONLY – Mention Raven5, when calling me. Anything goes No Taboos Phone Sex I’m waiting to begin your next sexual adventure.
Let me teach you the Pleasures of Phone Sex with No Limits. Read more of my Sizzling Blogs anytime!!! JOI is always an adventure. Anything goes when you and I play. I’m always game to teach you All My Naughty Games How sexy hot would that be? Let’s try incorporating it into our call. (Wicked LiL Grin) Can you do it for me?
Let me guide you in a direction you never imagined! My sultry voice will capture you and keep you coming back for more. No worries I will make it as pleasurable as possible. Remember it’s ALL about pushing outside your comfort zone! Let’s explore your fetish together. The opportunities are endless. Let me trigger your inner XXX pleasures. Always remember – Our Only Limitation is Our Imagination. Call me and Let’s cum together. I’m waiting for you now.
Raven
866-391-3835
More KINKY sex stories | {
"pile_set_name": "OpenWebText2"
} | 0.008378 |
Q:
How do you write a (simple) variable "toggle"?
Given the following idioms:
1)
variable = value1
if condition
variable = value2
2)
variable = value2
if not condition
variable = value1
3)
if condition
variable = value2
else
variable = value1
4)
if not condition
variable = value1
else
variable = value2
Which do you prefer, and why?
We assume the most common execution path to be that of condition being false.
I tend to learn towards using 1), although I'm not exactly sure why I like it more.
Note: The following examples may be simpler—and thus possibly more readable—but not all languages provide such syntax, and they are not suitable for extending the variable assignment to include more than one statement in the future.
variable = condition ? value2 : value1
...
variable = value2 if condition else value1
A:
In theory, I prefer #3 as it avoids having to assign a value to the variable twice. In the real world though I use any of the four above that would be more readable or would express more clearly my intention.
A:
I prefer method 3 because it is more concise and a logical unit. It sets the value only once, it can be moved around as a block, and it's not that error-prone (which happens, esp. in method 1 if setting-to-value1 and checking-and-optionally-setting-to-value2 are separated by other statements)
A:
3) is the clearest expression of what you want to happen. I think all the others require some extra thinking to determine which value is going to end up in the variable.
In practice, I would use the ternary operator (?:) if I was using a language that supported it. I prefer to write in functional or declarative style over imperative whenever I can.
| {
"pile_set_name": "StackExchange"
} | 0 |
7/2 in ascending order.
-294/71, -4, 0.1, 1, 7/2
Sort 3, 9, -4, 52, 0, -9.
-9, -4, 0, 3, 9, 52
Sort -5, -29, 1/111, 11.5 in increasing order.
-29, -5, 1/111, 11.5
Put 0, -16, 49, -17 in decreasing order.
49, 0, -16, -17
Sort 0.1, -31.43, 3 in increasing order.
-31.43, 0.1, 3
Put 2.29, 26.5, -2 in descending order.
26.5, 2.29, -2
Sort 4, 2, -186, -1 in ascending order.
-186, -1, 2, 4
Sort 5, -42, -20, 3, -7, -4 in descending order.
5, 3, -4, -7, -20, -42
Put 5, -153, 1, 11 in descending order.
11, 5, 1, -153
Sort -1303, 1, 2 in decreasing order.
2, 1, -1303
Sort 4.279, 5, 0.5, -5 in descending order.
5, 4.279, 0.5, -5
Sort 15, -19, -7, 0, -4 in descending order.
15, 0, -4, -7, -19
Sort -4, -5, 2, -65, 21, 7 in descending order.
21, 7, 2, -4, -5, -65
Sort 5/26, 1/5, -1, 4/7, 0, 3 in ascending order.
-1, 0, 5/26, 1/5, 4/7, 3
Sort -1, -225, 1738, 0, -2 in descending order.
1738, 0, -1, -2, -225
Sort -5, -1, 97, 8, -3, -6 in ascending order.
-6, -5, -3, -1, 8, 97
Put 3, -2/179, 327, -2 in decreasing order.
327, 3, -2/179, -2
Put 22, -0.48, -59 in decreasing order.
22, -0.48, -59
Put 4, 12, 3/2522 in ascending order.
3/2522, 4, 12
Put 5, 3, -1668 in decreasing order.
5, 3, -1668
Sort -92, 5, 34, 2 in increasing order.
-92, 2, 5, 34
Put 4, -63, 16, 2, -3 in decreasing order.
16, 4, 2, -3, -63
Put 0.5, -15, -5592, 5 in decreasing order.
5, 0.5, -15, -5592
Put -2, -1, 0.2, -6/5 in decreasing order.
0.2, -1, -6/5, -2
Sort -2, 2, 365, -3.
-3, -2, 2, 365
Put 4, -1, 24, -275, -2, 0.25 in descending order.
24, 4, 0.25, -1, -2, -275
Sort 1/634, 3, -5/6.
-5/6, 1/634, 3
Sort 32, 2.1, -3, 0.15, -0.19 in decreasing order.
32, 2.1, 0.15, -0.19, -3
Put 2, 4, -533, -4 in decreasing order.
4, 2, -4, -533
Sort 2, 1, -4, -3843 in ascending order.
-3843, -4, 1, 2
Put 2, 3, -7, 582, -2 in increasing order.
-7, -2, 2, 3, 582
Sort -301/6, -4, -1148 in ascending order.
-1148, -301/6, -4
Sort -2, -1, 0.02, 29, 9 in decreasing order.
29, 9, 0.02, -1, -2
Sort 0, -11, -4, 4, 3 in increasing order.
-11, -4, 0, 3, 4
Put 1, -2/3, 103/59 in decreasing order.
103/59, 1, -2/3
Sort 0, -3, 1, 4, -15, -309 in ascending order.
-309, -15, -3, 0, 1, 4
Sort 5/3, 0, -0.4, 14779, -4, 4 in descending order.
14779, 4, 5/3, 0, -0.4, -4
Sort -74, 0, -2, -4, -3 in ascending order.
-74, -4, -3, -2, 0
Sort -12, -134, -3, 5 in descending order.
5, -3, -12, -134
Put 7, -3, 2671 in descending order.
2671, 7, -3
Sort -10, 1/9, 2/13, -3, -5 in ascending order.
-10, -5, -3, 1/9, 2/13
Sort -4, 2, 5000, -11, -1 in increasing order.
-11, -4, -1, 2, 5000
Put 2.5, -1.07, -3/4, 5, -0.04 in descending order.
5, 2.5, -0.04, -3/4, -1.07
Put 4, 535637, -3 in descending order.
535637, 4, -3
Sort 1/2, 1, 13462 in increasing order.
1/2, 1, 13462
Put -109, -1/2, -0.2, 0.05, 0.2 in decreasing order.
0.2, 0.05, -0.2, -1/2, -109
Sort 58, -1, -89 in increasing order.
-89, -1, 58
Sort -6, -10, -0.5, 10.
-10, -6, -0.5, 10
Put -4, 9, -99, 2, -5, 14 in increasing order.
-99, -5, -4, 2, 9, 14
Put 4, 33/4, -10/7, -0.2, 5 in decreasing order.
33/4, 5, 4, -0.2, -10/7
Sort 11, 6, 61, 4, -4, -6 in decreasing order.
61, 11, 6, 4, -4, -6
Sort 4, 41, -5, 3, -12, -4 in descending order.
41, 4, 3, -4, -5, -12
Put -2/13, -1869, 147/4 in ascending order.
-1869, -2/13, 147/4
Put -10603, -3, 9 in increasing order.
-10603, -3, 9
Sort 0.3, -14/9, -0.34, -2/13, -3 in increasing order.
-3, -14/9, -0.34, -2/13, 0.3
Sort -2, -1, 25, -54, -5 in ascending order.
-54, -5, -2, -1, 25
Sort -2, -2247, -3, 32.
-2247, -3, -2, 32
Sort -1, 16, 4 in decreasing order.
16, 4, -1
Sort 0, 8, 5, -5, -144 in descending order.
8, 5, 0, -5, -144
Sort 49, -5, 7, 3, 0 in increasing order.
-5, 0, 3, 7, 49
Put 4/7, 7/15, 0.671 in descending order.
0.671, 4/7, 7/15
Sort 0, -2, -121, 8, 9 in ascending order.
-121, -2, 0, 8, 9
Sort 0.1, -10, 4, -0.3, -5139 in ascending order.
-5139, -10, -0.3, 0.1, 4
Put 216492, 0, 2 in descending order.
216492, 2, 0
Put -5, -2, -247, 0, 3 in ascending order.
-247, -5, -2, 0, 3
Put 3, -4, -3, 5, -12, -15 in increasing order.
-15, -12, -4, -3, 3, 5
Put -3, 2/5, 119.12 in descending order.
119.12, 2/5, -3
Put -3/2, -0.3, 9/10, -19, 1, 80/7 in ascending order.
-19, -3/2, -0.3, 9/10, 1, 80/7
Put 31, 5.5, -0.5, -44 in decreasing order.
31, 5.5, -0.5, -44
Sort 3, -361, 12, 10, 0, 5 in increasing order.
-361, 0, 3, 5, 10, 12
Sort -42, -3, -5, 4, -6 in decreasing order.
4, -3, -5, -6, -42
Put 1/2, 0.3, 3, -23, -1123 in decreasing order.
3, 1/2, 0.3, -23, -1123
Put 211, -194, 23 in ascending order.
-194, 23, 211
Put -4, -2/23, -9, -0.5, -3 in decreasing order.
-2/23, -0.5, -3, -4, -9
Put -1, 0.4, 2/17, 2730 in decreasing order.
2730, 0.4, 2/17, -1
Put -10, 0.03, 1/6 in descending order.
1/6, 0.03, -10
Sort -1/4, -7/4, -2, 0.5, 39.
-2, -7/4, -1/4, 0.5, 39
Put 25, 2, -273 in increasing order.
-273, 2, 25
Sort 0.04, -0.5, 3/7, 2252, 2 in ascending order.
-0.5, 0.04, 3/7, 2, 2252
Put 5, 1, 0, 14704, 2, -5 in descending order.
14704, 5, 2, 1, 0, -5
Sort -1118, -198, -1 in descending order.
-1, -198, -1118
Sort -2124, 0, -4, -2/9, 0.5, -0.23.
-2124, -4, -0.23, -2/9, 0, 0.5
Put -1/4, 4, 1, -0.1 in decreasing order.
4, 1, -0.1, -1/4
Sort 0.23, 0.017, -3, -1, -5.
-5, -3, -1, 0.017, 0.23
Put 0.26, -3, -10, 0.4, 6 in ascending order.
-10, -3, 0.26, 0.4, 6
Sort -3, -20, 3, -5, 35 in decreasing order.
35, 3, -3, -5, -20
Put -1471, -2, -21, 3, -4 in descending order.
3, -2, -4, -21, -1471
Sort -122, 5, -10 in ascending order.
-122, -10, 5
Put -1, -5, -11, -3569 in increasing order.
-3569, -11, -5, -1
Put -0.01, -53, -5, -78, -0.03, 4 in decreasing order.
4, -0.01, -0.03, -5, -53, -78
Put 2/15, 0.5, -2.9, -4/5, -0.14 in descending order.
0.5, 2/15, -0.14, -4/5, -2.9
Put 17191, -3, -1, 2, -2 in decreasing order.
17191, 2, -1, -2, -3
Sort -12, -9, -2749, 4.
-2749, -12, -9, 4
Sort 91, 70, -5, 2.
-5, 2, 70, 91
Put -0.2, -4, 0.31, -34, -2 in increasing order.
-34, -4, -2, -0.2, 0.31
Sort 12794, -1, 6 in decreasing order.
12794, 6, -1
Sort -4, -3, -5, 5, -11, -129 in descending order.
5, -3, -4, -5, -11, -129
Put -3, -5, 0, 5, -17, -588 in decreasing order.
5, 0, -3, -5, -17, -588
Sort 4/9, -9/23, 4, 2/9, -4/7.
-4/7, -9/23, 2/9, 4/9, 4
Sort -265, -3, -2/7, 1/5 in descending order.
1/5, -2/7, -3, -265
Put -195, 3, -1, 2, -4, 6 in ascending order.
-195, -4, -1, 2, 3, 6
Sort 5, -22, 18, -4 in increasing order.
-22, -4, 5, 18
Put 1222, 21, -1, 0, 6 in decreasing order.
1222, 21, 6, 0, -1
Put 5/8, -4/109, 1, -1, -0.5 in decreasing order.
1, 5/8, -4/109, -0.5, -1
Put -0.02, -1/4, -2, 166, 1, 2/15 in descending order.
166, 1, 2/15, -0.02, -1/4, -2
Sort -2/7, -2/19, -1/7, 4, 612/13 in ascending order.
-2/7, -1/7, -2/19, 4, 612/13
Put -227, 71, -2 in descending order.
71, -2, -227
Put 5, -12.8, 3, 2/3, -671, -5 in descending order.
5, 3, 2/3, -5, -12.8, -671
Put 0, -3, -123, 8, 4 in ascending order.
-123, -3, 0, 4, 8
Put 4, -2, 108, -2/13, 1/64, 1 in increasing order.
-2, -2/13, 1/64, 1, 4, 108
Put -47, 3, 5, 1, -3 in ascending order.
-47, -3, 1, 3, 5
Sort -5, 2, 2452.
-5, 2, 2452
Sort -2.2, -2/9, -0.5, -15 in descending order.
-2/9, -0.5, -2.2, -15
Put 0, 36, 3, -7 in descending order.
36, 3, 0, -7
Sort 2, -1/4, 2.5, -2/3, -3.6 in ascending order.
-3.6, -2/3, -1/4, 2, 2.5
Sort -0.049, 16, -0.02, -3, 0.05, 0.
-3, -0.049, -0.02, 0, 0.05, 16
Put 4/11, -0.3, -2, -5, -20 in ascending order.
-20, -5, -2, -0.3, 4/11
Put 281, 5, 95 in ascending order.
5, 95, 281
Sort -1, 5, -23, 2, 4, 22 in ascending order.
-23, -1, 2, 4, 5, 22
Sort -2687.83, -4/3, 2 in descending order.
2, -4/3, -2687.83
Sort 26, -3, 38.
-3, 26, 38
Put -26, -5, 5/3, 0.1, 0 in decreasing order.
5/3, 0.1, 0, -5, -26
Sort 0.1, 4.1, 545 in increasing order.
0.1, 4.1, 545
Sort 3, 49, 1, -15, 2/7, 2/13 in decreasing order.
49, 3, 1, 2/7, 2/13, -15
Sort 3537, -2, 4 in ascending order.
-2, 4, 3537
Sort -477, 2, 10, -1, -21 in descending order.
10, 2, -1, -21, -477
Put 1, -2, 190, 0 in ascending order.
-2, 0, 1, 190
Sort -541, 1093, 2 in increasing order.
-541, 2, 1093
Sort -2, 3, -3, 2, 17969, -1 in descending order.
17969, 3, 2, -1, -2, -3
Put 1/4, 191, 6 in descending order.
191, 6, 1/4
Put 2, -4, -4241, 3 in increasing order.
-4241, -4, 2, 3
Put 64, -0.06, -0.04, 4, -1/5 in decreasing order.
64, 4, -0.04, -0.06, -1/ | {
"pile_set_name": "DM Mathematics"
} | 0 |
Elina Tan - Video Scene 1
Featured Model:
Horny and hot milf Erina enjoys having a huge cock deep fucking her shaved cunt in one nasty hardcore fuck session after she gave amazing oral session that made the guy to tremble like crazy. Arousing...
Categories:
Elina Tan - Video Scene 2
Featured Model:
Busty asian babe with tight pussy Erina loves having wild fuck sessions in public along her boyfriend. Cock sucking and rear fucking her pussy are her favorites and this hunk is eager to give her both...
Categories:
Elina Tan - Video Scene 3
Featured Model:
Hot milf with amazing body and big tits Erina enjoys fucking and sucking on two cocks at once, feeling great and enjoying intense pleasure while cock sucking and fucking in wild doggystyle. Sweet babe...
Categories:
Elina Tan - Video Scene 4
Featured Model:
Superb hottie Erina enjoys giving a massive public oral session to her boyfriend which is very horny and eager to feel that mouth sucking him deep and hard like a real pornstar. Naughty babe loves hav...
Categories:
All content, including images, text, graphics, video and audio content contained in the website is protected under the laws of copyright, owned or under license to
company or its designees,and represents proprietary and valuable intellectual property. Duplication, editing, sale or offering to third parties, emailing and uploading to
other sites without permission is strictly prohibited and will result in this company taking legal actions according to US law. If you notice any violation of statement above
please Contact Webmaster. 18 U.S.C. 2257 Record-Keeping Requirements Compliance Statement, Terms and Conditions, Privacy Policy | {
"pile_set_name": "Pile-CC"
} | 0.012463 |
One Million Dollar Paranormal Challenge
The One Million Dollar Paranormal Challenge was an offer by the
James Randi Educational Foundation (JREF) to pay out one million U.S. dollars to anyone who could demonstrate a supernatural or paranormal ability under agreed-upon scientific testing criteria. A version of the challenge was first issued in 1964. Over a thousand people applied to take it, but none were successful. The challenge was terminated in 2015.
History
James Randi developed the idea for the challenge during a radio panel discussion when a parapsychologist challenged him to "put [his] money where [his] mouth is." In 1964 Randi offered a $1,000 prize, soon increasing it to $10,000. Later, Lexington Broadcasting wanted Randi to do a show called the $100,000 Psychic Prize, so they added $90,000 to the original $10,000 raised by Randi. Finally, in 1996, one of his friends, Internet pioneer Rick Adams, donated U.S. $1,000,000 for the prize. The prize is sometimes referred to in the media as the "Randi Prize".
By April 1, 2007, only those with an already existing media profile and the backing of a reputable academic were allowed to apply for the challenge. It was hoped that the resources freed up by not having to test obscure and possibly mentally ill claimants would then be used to challenge high-profile alleged psychics and mediums such as Sylvia Browne and John Edward with a campaign in the media.
On January 4, 2008, it was announced that the prize would be discontinued on March 6, 2010, in order to free the money for other uses. In the meantime, claimants were welcome to vie for it. One of the reasons offered for its discontinuation is the unwillingness of higher-profile claimants to apply. However, at The Amaz!ng Meeting 7, it was announced that the $1 Million Challenge prize would not expire in 2010. The Foundation issued a formal update on its website on July 30, 2009, announcing the Challenge's continuation, and stated more information would be provided at a later date on any possible changes to the requirements and procedures.
As an April Fool's prank on April 1, 2008, at the MIT Media Lab, Randi pretended to award the prize to magician Seth Raphael after participating in a test of Raphael's "psychic abilities".
On March 8, 2011, the JREF announced that qualifications were being altered to open the challenge to more applicants. Whereas applicants were previously required to submit press clippings and a letter from an academic institution to qualify, the new rules now require applicants to present either press clippings, a letter from an academic institution, or a public video demonstrating their ability. The JREF explained that these new rules would give people without media or academic documentation a way to be considered for testing, and would allow the JREF to use online video and social media to reach a wider audience.
Since the challenge was first created by Randi in 1964, about a thousand people have applied, but no one has been successful. Randi has said that few unsuccessful applicants ever seriously considered that their failure to perform might be due to the nonexistence of the power they believe they possess.
In January 2015, James Randi announced that he was officially retiring and stepping down from his position with the JREF. In September 2015, JREF announced that their board had decided that it would convert the foundation into a grant-making foundation, and they will no longer accept applications directly from people claiming to have a paranormal power. In 2015 the James Randi paranormal challenge was officially terminated.
Rules and judging
The official challenge rules stipulated that the participant must agree, in writing, to the conditions and criteria of their test. Claims that cannot be tested experimentally are not eligible for the Challenge. Claimants were able to influence all aspects of the testing procedure and participants during the initial negotiation phase of the challenge. Applications for any challenges that might cause serious injury or death were not accepted.
To ensure that the experimental conditions themselves did not negatively affect a claimant's ability to perform, non-blinded preliminary control tests are often performed. For example, the JREF had dowsers perform a control test, in which the dowser attempts to locate the target substance or object using their dowsing ability, even though the target's location has been revealed to the applicant. Failure to display a 100% success rate in the open test would cause their immediate disqualification. However, claimants were usually able to perform successfully during the open test, confirming that experimental conditions are adequate.
Claimants agreed to readily observable success criteria prior to the test, results were unambiguous and clearly indicated whether or not the criteria have been met. Randi had said that he need not participate in any way with the actual execution of the test, and he has been willing to travel far from the test location to avoid the perception that his anti-paranormal bias could influence the test results.
The discussions between the JREF and applicants were at one time posted on a public discussion board for all to see. Since the resignation of Randi's assistant, Mr. Kramer—and subsequent changes to challenge rules requiring applicants to have demonstrated considerable notability—new applications are no longer logged, but there is an archive of previous applicants.
Example of a test (dowsing)
In 1979, Randi tested four people in Italy for dowsing ability (Mr. Fontana, Dr. Borga, Mr. Stanziola, and Mr. Senatore). The prize at the time was $10,000. The conditions were that a 10 meter by 10 meter test area would be used. There would be a water supply and a reservoir just outside the test area. There would be three plastic pipes running underground from the source to the reservoir along different concealed paths. Each pipe would pass through the test area by entering at some point on an edge and exiting at some point on an edge. A pipe would not cross itself but it might cross others. The pipes were 3 centimeters in diameter and were buried 50 centimeters below ground. Valves would select which of the pipes water was running through, and only one would be selected at a time. At least 5 liters per second of water would flow through the selected pipe. The dowser must first check the area to see if there is any natural water or anything else that would interfere with the test, and that would be marked. Additionally, the dowser must demonstrate that the dowsing reaction works on an exposed pipe with the water running. Then one of the three pipes would be selected randomly for each trial. The dowser would place ten to one hundred pegs in the ground along the path he or she traces as the path of the active pipe. Two-thirds of the pegs placed by the dowser must be within 10 centimeters of the center of the pipe being traced for the trial to be a success. Three trials would be done for the test of each dowser and the dowser must pass two of the three trials to pass the test. A lawyer was present, in possession of Randi's $10,000 check. If a claimant were successful, the lawyer would give him the check. If none were successful, the check would be returned to Randi.
All of the dowsers agreed with the conditions of the test and stated that they felt able to perform the test that day and that the water flow was sufficient. Before the test they were asked how sure they were that they would succeed. All said either "99 percent" or "100 percent" certain. They were asked what they would conclude if the water flow was 90 degrees from what they thought it was and all said that it was impossible. After the test they were asked how confident they were that they had passed the test. Three answered "100 percent" and one answered that he had not completed the test.
When all of the tests were over and the location of the pipes was revealed, none of the dowsers had passed the test. Dr. Borga had placed his markers carefully, but the nearest was a full 8 feet from the water pipe. Borga said, "We are lost", but within two minutes he started blaming his failure on many things such as sunspots and geomagnetic variables. Two of the dowsers thought they had found natural water before the test started, but disagreed with each other about where it was, as well as with the ones who found no natural water.
Criticism
Astronomer Dennis Rawlins described the challenge as insincere, saying that Randi would ensure he never had to pay out. In the October 1981 issue of Fate, Rawlins quoted him as saying "I always have an out". Randi stated that Rawlins did not give the entire quotation, and actually said "Concerning the challenge, I always have an 'out': I'm right!".
Rosemary Altea suggested the one million dollar prize fund does not exist, or is in the form of pledges or promissory notes. The JREF stated that the million dollars was in the form of negotiable bonds within a "James Randi Educational Foundation Prize Account" and that validation of the account and the prize amount could be supplied on demand. The money was held in an Evercore Wealth Management account.
Challenges
Refusals to be tested
On Larry King Live, March 6, 2001, Larry King asked psychic Sylvia Browne if she would take the challenge and she agreed. Randi appeared with Browne again on Larry King Live on September 3, 2001, and she again accepted the challenge. However, she refused to be tested and Randi kept a clock on his website recording the number of weeks that had passed since Browne accepted the challenge without following through. Eventually the clock was replaced with text stating that "over 5 years" had passed. Browne died in 2013.
In an appearance on Larry King Live on January 26, 2007, Randi challenged psychic Rosemary Altea to take the one-million-dollar challenge. On Altea and Randi's June 5, 2001, meeting on the same show, Altea refused to take the challenge, calling it "a trick". Instead Altea, in part, replied "I agree with what he says, that there are many, many people who claim to be spiritual mediums, they claim to talk to the dead. There are many, people, we all know this. There are cheats and charlatans everywhere." Randi's response was to suggest that Altea was also one of the "cheats and charlatans".
In an appearance on ITV's This Morning, on September 27, 2011, magician Paul Zenon challenged Welsh psychic Leigh Catherine (aka Leigh-Catherine Salway) to take the one million dollar challenge and she accepted. Phillip Schofield, a This Morning host, stated that the program would pay for her flights to the US to be tested. Salway subsequently backed out of the challenge, claiming it was "dodgy" and "set up to make it impossible to pass".
Rejected applicants
Randi rejected an application from Rico Kolodzey, a Breatharian who claimed to have survived without food since 1998. In 2006 Randi agreed to test Kolodzey's claims, but the two parties were unable to agree on the venue and method of the test.
Members of a group from Bali, referring to themselves as Yellow Bamboo, claimed one of their number, Pak Nyoman Serengen, could knock down an attacker at a distance, using only a piece of yellow bamboo. Video clips on their website showed a crowd of students running at Serengen, and falling to the ground when (or, in some cases, slightly before) Serengen extended his hand and shouted. The JREF arranged volunteers to carry out a preliminary investigation, but after the Yellow Bamboo group "threw every sort of obstacle in the way of that plan", Randi announced that he was terminating further involvement with them. A local volunteer contacted Randi offering to investigate the group unofficially. A low-resolution video showed the investigator being knocked to the ground during a preliminary test. The JREF pointed out that the test was not conducted according to the proposed protocol, with multiple flaws in the execution including being carried out at night. Upon viewing a set of still shots from the incident, several people experienced with stun-guns suggested that an electroshock weapon could have been used.
Tests at The Amazing Meeting
In July 2009, Danish psychic/dowser Connie Sonne was given the chance to prove her dowsing ability. She was asked to dowse some randomly selected cards hidden in envelopes and lost the challenge by selecting other incorrect ones. In an interview with Mark Edward afterward, she insisted that she lost merely because, "…it wasn't time yet for my powers to be revealed."
In July 2014, Chinese salesman Fei Wang was tested in front of an audience of 600 at the conclusion of The Amazing Meeting in Las Vegas. Wang said that from his right hand, he could transmit a mysterious force a distance of three feet, unhindered by wood, metal, plastic or cardboard. The energy, he said, could be felt by others as heat, pressure, magnetism, or simply "an indescribable change." A total of nine people were selected by Wang as subjects who would be able to determine whether they were receiving the force from his hand. On stage, Wang and a control person were behind a curtain, and the subjects were in front of the curtain with eyes and ears covered so as not to be able to deduce who was behind the curtain. A colored ball was chosen randomly to determine whether Wang or the control person would go first, and in that order they tried to transmit the energy onto the subject's hand (hidden from their view inside a cardboard box). The subject then stated whether she had felt any energy and whether it came from the first or second person. Wang needed to be the person selected by at least 8 of the 9 subjects in order to win the million dollars. After both of the first two subjects failed to choose Wang, the challenge was over. Wang stated that he would try again the next year, saying, "This energy is mysterious".
Tech journalist Lee Hutchinson approached the JREF after writing an article for Ars Technica about directional Ethernet cables that claim to "keep your audio signal completely free of electromagnetic interference". At the 2015 Amazing Meeting, the MDC set up a controlled double-blind demonstration with volunteers listening to two identical recordings with a randomly selected Ethernet cable, a normal one or the cable claiming to improve the listening experience. After seven volunteers (1 hit, 1 miss and 5 hearing no difference), the demonstration was ended as they were unable to select the "enhanced" cable over the common cable enough times to satisfy the testing protocols.
See also
Australian Skeptics $100,000 Prize
List of prizes for evidence of the paranormal
Stuart Landsborough's Psychic challenge
SKEPP
An Encyclopedia of Claims, Frauds, and Hoaxes of the Occult and Supernatural (by Randi)
References
External links
Category:Prizes for proof of paranormal phenomena | {
"pile_set_name": "Wikipedia (en)"
} | 0 |
168 Ariz. 207 (1990)
812 P.2d 1025
Jeffrey A. BOATMAN and Anne Boatman, husband and wife; Fred Riebe; and Robert McDonald, Plaintiffs/Appellants,
v.
SAMARITAN HEALTH SERVICES, INC., an Arizona corporation, Defendant/Appellee.
No. 2 CA-CV 90-0119.
Court of Appeals of Arizona, Division 2, Department B.
November 27, 1990.
Review Denied June 25, 1991.
*208 Treon, Strick, Lucia & Aguirre by Richard T. Treon and The Langerman Law Offices, P.A. by JoJene E. Mills, Phoenix, for plaintiffs/appellants.
Snell & Wilmer by Robert J. Deeny, David H. Donovan, and Lonnie Williams, Phoenix, for defendant/appellee.
OPINION
ROLL, Presiding Judge.
Plaintiffs Jeffrey A. Boatman and his wife Anne, Fred Riebe and Robert McDonald appeal from the trial court's granting of summary judgment and judgment on *209 the pleadings in connection with plaintiffs' respective claims of intentional interference with contract and defamation against defendant Samaritan Health Services (Samaritan). For the reasons set forth below, we affirm.
FACTS
Samaritan had an Air Evac Program that transported patients by air. Responsibilities of personnel involved in the program included flying sick or traumatized patients between medical facilities and from trauma scenes. The Air Evac Program utilized helicopter and fixed wing aircraft.
In 1986, Pumpkin Air, Inc. (Pumpkin) successfully responded to Samaritan's request for proposal (RFP) seeking bids in connection with the furnishing of aircraft and pilots for Samaritan's Air Evac Program. Samaritan required that all bidders meet certain specific minimum requirements, including (1) a minimum of three factory-trained pilots per helicopter, (2) rotation of schedules so that one pilot per aircraft would be on duty at all times, and (3) pilot schedules to conform with Federal Aviation Administration (FAA) requirements. An agreement between Pumpkin and Samaritan was formalized July 24, 1986. This agreement stated in part:
Personnel and Services
A. VENDOR will provide 3 pilots, suitable to HOSPITAL, to fly the helicopter, and 1 mechanic, suitable to HOSPITAL, to perform all routine and unscheduled maintenance for the helicopter.
VENDOR will ensure that each pilot and mechanic has all current, up-to-date and appropriate licenses or certificates as may be required by law or regulation.
B. Flight Operations:
1. All flights will be dispatched or approved by HOSPITAL. The helicopter will be flown as dispatched by HOSPITAL, except that the pilot on duty shall have complete authority to make all decisions concerning the suitability of weather conditions, landing areas, conditions of the helicopter for flight, loading of the helicopter, and all other factors affecting flight safety and compliance with FAA regulations.
Miscellaneous Obligations
1. VENDOR shall comply with all applicable local, state and federal regulations, and will assure HOSPITAL that each helicopter, pilot and mechanic is properly licensed and certified and meets or exceeds the minimum requirements of all applicable federal, state and local law [sic] and regulations.
(Emphasis added.)
After Pumpkin successfully bid on Samaritan's proposal and the agreement between Samaritan and Pumpkin was formalized, Jeffrey Boatman, Fred Riebe, and Robert McDonald were assigned by Pumpkin to fly Samaritan's Air Evac Helicopter Program. Riebe and McDonald were already employees of Pumpkin and Boatman had been flying for the previous Air Evac vendor used by Samaritan. Boatman's previous Air Evac employer had used three helicopter pilots in their program. Boatman, Riebe, and McDonald all understood that a ratio of three pilots per helicopter was called for by the terms of the Pumpkin/Samaritan agreement. At the time the three pilots commenced work pursuant to the Pumpkin/Samaritan agreement, Riebe believed that three pilots per helicopter was the industry standard.
After the three pilots commenced employment, they requested that Pumpkin and Samaritan hire an additional pilot so as to raise the ratio of pilots per helicopter. On November 4, 1986, Samaritan's Air Evac Corporate Director Gordon Wolfram told the pilots that he wanted no more public statements by the pilots regarding the need for a fourth pilot. That same day, Riebe, McDonald, and Boatman resigned employment with Pumpkin. In December 1986, Samaritan announced that it was hiring a fourth pilot.
Riebe, McDonald, and Boatman allege that after their resignations, certain statements were made by Samaritan employees concerning the reasons why the three pilots *210 had resigned. Plaintiffs allege that on November 6, 1986, an Air Evac helicopter was taken out of service, resulting in delay in transporting a cardiac patient, and that Wolfram announced on December 4, 1986, that he heard that the pilot of the helicopter complained of being so fatigued that the pilot felt unsafe to fly any further missions. Wolfram's statement did not identify the pilot by name. The plaintiffs also allege that a second Samaritan employee, Dan Green, stated on television that "[Wolfram] made a judgment call in terms of is this individual fit to fly today." Thereafter, on December 8, 1986, Samaritan and Pumpkin employees allegedly told a television reporter of the resignations of Boatman, Riebe, and McDonald. Plaintiffs allege that Samaritan employees were quoted as saying that McDonald "quit because he didn't want to fly in the mountains at night," that Boatman quit "because his insurance benefits were cut," and that Riebe quit because he "indicated to us he had a job waiting for him in California for 30% more than he was making with us."
PROCEDURAL BACKGROUND
In June 1987, plaintiffs filed a lawsuit against Samaritan and Pumpkin, alleging breach of contract against Pumpkin and intentional interference with business expectancies against Samaritan. The plaintiffs settled the claim against Pumpkin.
Samaritan filed a motion for summary judgment regarding plaintiffs' intentional interference claim and plaintiffs opposed the motion, arguing that summary judgment was inappropriate or, in the alternative, more time was needed to complete discovery, relying upon Rule 56(f), Ariz.R. Civ.P., 16 A.R.S. Plaintiffs also filed a motion to amend their complaint by adding a defamation count against both Pumpkin and Samaritan. On January 6, 1988, plaintiffs filed an amended complaint, adding the defamation allegations. The trial court granted Samaritan summary judgment on plaintiffs' intentional interference claim. Thereafter, plaintiffs filed a motion for new trial, alleging newly discovered evidence consisting of deposition testimony showing that (1) Samaritan dictated each aspect of the contract between Pumpkin and plaintiffs, and (2) on November 4, 1986, Wolfram stated that no new pilots would be hired. The trial court denied the motion for new trial.
Thereafter, Samaritan filed a motion for judgment on the pleadings regarding the newly added defamation count, arguing that the statute of limitations barred this claim because the cause of action arose in December 1986, the motion to amend the original complaint was not filed until December 1987, and the amended complaint was not filed until January 1988[1] and served until October 1988. The trial court granted Samaritan's motion for judgment on the pleadings, concluding that the statute of limitations had expired.
ISSUES ON APPEAL
On appeal, plaintiffs argue (1) summary judgment was erroneously granted regarding the intentional interference claim against Samaritan; (2) summary judgment should have been denied pursuant to Rule 56(f), until such time as additional discovery was completed; (3) plaintiffs' motion for new trial should have been granted; and (4) the defamation count against Samaritan was not barred by the statute of limitations.
Summary Judgment
In reviewing summary judgment, this court views the evidence in the light most favorable to the party opposing the motion and all favorable inferences fairly arising from the evidence must be given to the opposing party. Hill-Shafer Partnership v. Chilson Family Trust, 165 Ariz. 469, 472, 799 P.2d 810, 813 (1990); Wisener v. State, 123 Ariz. 148, 149, 598 P.2d 511, 512 (1979). "Summary judgment is appropriate where the record shows that there is *211 no genuine dispute as to any material fact, that only one inference can be drawn from those facts, and that based upon the facts, the moving party is entitled to judgment as a matter of law." Auto-Owners Ins. Co. v. Moore, 156 Ariz. 184, 185, 750 P.2d 1387, 1388 (App. 1988). If there are material facts upon which reasonable people could reach different conclusions, summary judgment is inappropriate. Gulf Ins. Co. v. Grisham, 126 Ariz. 123, 124, 613 P.2d 283, 284 (1980).
Plaintiffs argue that summary judgment was inappropriate regarding the intentional interference claim. To establish a claim for intentional interference with contract, it is necessary for the plaintiffs to prove (1) existence of a valid contractual relationship, (2) knowledge of the relationship on the part of the interferer, (3) intentional interference inducing or causing a breach of the contract, (4) damage, and (5) improper interference. Snow v. Western Sav. & Loan Assn., 152 Ariz. 27, 34, 730 P.2d 204, 211 (1986); Wagenseller v. Scottsdale Memorial Hospital, 147 Ariz. 370, 386-88, 710 P.2d 1025, 1041-43 (1985).
Plaintiffs argue that sufficient evidence was presented on each of these elements to warrant denial of summary judgment. Plaintiffs contend that Samaritan's interference with performance of their contract with Pumpkin consisted of inaction. Specifically, plaintiffs maintain that Samaritan's insistence that Pumpkin perform its contract with Samaritan in accordance with the terms to which Pumpkin agreed constituted intentional interference. Plaintiffs assert that it was unsafe for only three pilots to be assigned to a single helicopter and that a fourth pilot was required. Samaritan contends that its failure to amend its contract with Pumpkin did not constitute intentional interference with the contract between plaintiffs and Pumpkin, and that to rule that Samaritan's inaction constitute interference would require a novel and unjustified extension of the law.
The plaintiffs have provided no evidence of a tortious interference with an existing contract. When Pumpkin agreed to furnish Samaritan a minimum of three pilots, the plaintiffs were not even in an existing contract with Pumpkin. When the plaintiffs were hired, it was as at-will employees of Pumpkin and they accepted employment with knowledge of the fact that only three pilots would be assigned under the Pumpkin/Samaritan contract. In fact, the uncontradicted evidence provided by the plaintiffs indicates that three pilots per helicopter was the existing standard in the industry, the same standard employed in the Pumpkin/Samaritan contract in effect prior to the plaintiffs' employment by Pumpkin. Plaintiffs argue that the fact that they requested the addition of a fourth pilot and that request was not honored by Samaritan constituted intentional interference by Samaritan. Plaintiffs also contend that Samaritan's refusal to agree to the addition of a fourth pilot was illegal as well as in violation of public policy.
We need not reach this contention of illegality because we find no basis at law for a claim of intentional interference with performance of an existing contract. There simply was no action or inaction on Samaritan's part that could be said to have altered the terms or prevented the pilots from performing according to the terms of their contract with Pumpkin. The conditions the plaintiffs were working under existed prior to the plaintiffs entering into their contract with Pumpkin. Samaritan continued to perform its obligations under its contract with Pumpkin. The fact that Samaritan did not renegotiate a new contract with Pumpkin does not constitute interference with the plaintiffs' contract with Pumpkin. Samaritan's refusal to renegotiate its contract with Pumpkin was a right they possessed under general principles of freedom to contract.
Rule 56(f) Motion
Plaintiffs next argue that the trial court erred in denying plaintiffs' request that the trial court defer ruling upon Samaritan's motion for summary judgment until such time as plaintiffs completed additional discovery. Rule 56(f) states:
When Affidavits Are Unavailable. Should it appear from the affidavits of a *212 party opposing the motion that the party cannot for reasons stated present by affidavit facts essential to justify the party's opposition, the court may refuse the application for judgment or may order a continuance to permit affidavits to be obtained or depositions to be taken or discovery to be had or may make such other order as is just.
This rule has been interpreted as requiring that a party seeking delay in the trial court's ruling on a motion for summary judgment furnish to the trial court "specific reasons rather than general ones." Bobo v. John Lattimore, Contractor, 12 Ariz. App. 137, 141, 468 P.2d 404, 408 (1970).
Plaintiffs failed to make a specific showing as to the need for delay in ruling upon Samaritan's motion for summary judgment. In addition, although plaintiffs' motion for new trial set forth the specific information which was unavailable when the opposition to motion for summary judgment was filed, even this information did not warrant denial of summary judgment in favor of Samaritan.
Motion for New Trial
Plaintiffs argue that the trial court erred in denying their motion for new trial based upon newly discovered evidence. Plaintiffs argue that newly discovered evidence obtained through deposition testimony established that (1) Samaritan dictated every material aspect of the contract between Pumpkin and plaintiffs, including the number of pilots, and (2) Gordon Wolfram's statement on November 4, 1986, that no additional pilots would be hired, was false and misleading.
Our standard of review for denial of a motion for new trial is abuse of discretion. Suciu v. Amfac Distributing Corp., 138 Ariz. 514, 520, 675 P.2d 1333, 1339 (App. 1983); Erikson v. Waller, 116 Ariz. 476, 479, 569 P.2d 1374, 1377 (App. 1977). The trial court's granting of a motion for new trial based upon newly discovered evidence is appropriate only if it appears that (1) the newly discovered evidence could not have been discovered before the granting of judgment despite the exercise of due diligence, (2) the evidence would probably change the result of the litigation, and (3) the newly discovered evidence was in existence at the time of the judgment. Wendling v. Southwest Sav. and Loan Assn., 143 Ariz. 599, 602, 694 P.2d 1213, 1216 (App. 1984).
The identity of both witnesses furnishing the allegedly newly discovered evidence was known to plaintiffs before the entry of summary judgment. Accordingly, with due diligence, the "newly discovered evidence" could have been discovered before the trial court granted the motion for summary judgment. Ashton v. Sierrita Mining and Ranching, 21 Ariz. App. 303, 305, 518 P.2d 1020, 1022 (1974); 11 Wright and Miller, Federal Practice and Procedure § 2859 (1973). Assuming arguendo that the evidence was newly discovered, it was cumulative.
The trial court did not abuse its discretion in denying the motion for new trial based upon newly discovered evidence.
Defamation Claim
Finally, plaintiffs argue that the trial court erred in granting judgment on the pleadings in favor of Samaritan. In reviewing the trial court's granting of a motion for judgment on the pleadings, all of the plaintiffs' factual allegations must be taken as true. Food for Health Co., Inc. v. 3839 Joint Venture, 129 Ariz. 103, 106, 628 P.2d 986, 989 (App. 1981).
Plaintiffs argue that because the defamation count relates back to the original complaint, the fact that the defamation complaint was filed after the statute of limitations expired did not require the granting of judgment on the pleadings. Plaintiffs argue that damages arising from defamation were requested in the original complaint alleging intentional interference. Samaritan counters that the allegedly defamatory statements were not part of the facts giving rise to the initial claim, and therefore do not relate back to the earlier claim, citing Perkins v. Pepsi Cola General Bottlers, Inc., 158 Ill. App.3d 893, 110 *213 Ill.Dec. 724, 511 N.E.2d 901 (1987). In Perkins, plaintiff attempted to amend his wrongful discharge complaint by adding a libel count after the statute of limitations had run. The Illinois Court of Appeals concluded that the defamation count did not relate back to the wrongful discharge claim, emphasizing that the original claim made no reference to defamatory statements by the defendant. The court stated:
In the present case the plaintiff's original complaint makes no reference to any statement made by the defendant as a basis for any of the plaintiff's claims. Thus, we cannot say that the original complaint furnished the defendant with information necessary to prepare a defense to the specific libel claims which were asserted ... after the libel statute of limitations expired.
Id. at 901-02, 110 Ill.Dec. at 730, 511 N.E.2d at 907.
Plaintiffs' original complaint did not allege that Samaritan employees made defamatory statements about the plaintiffs. The allegedly defamatory statements were made in December 1986 and the amended complaint alleging defamation was not filed until January 6, 1988. A second amended complaint containing the identical allegations as the complaint filed January 6, 1988, was filed on October 11, 1988, and served on October 19, 1988. The statute of limitations for libel or slander is one year. A.R.S. § 12-541. The statute commences to run upon publication. Lim v. Superior Court, In and For Pima County, 126 Ariz. 481, 482, 616 P.2d 941, 942 (App. 1980). In the matter before us, the defamation action was not filed within one year of publication of the allegedly defamatory statements. In addition, the defamation claim does not relate back to the original complaint alleging intentional interference by Samaritan, because (1) the original complaint does not allege defamatory statements, and (2) the defamatory statements alleged in the amended complaint were not part of Samaritan's alleged intentional interference with plaintiffs' contract. The trial court correctly granted judgment on the pleadings in favor of Samaritan as to this claim.
CONCLUSION
The summary judgment and judgment on the pleadings are affirmed.
LIVERMORE and HOWARD, JJ., concur.
NOTES
[1] An amended complaint containing identical language to the amended complaint filed in January 1988 was filed and served on Samaritan in October 1988. The record reflects that this was the first time an amended complaint was served on Samaritan.
| {
"pile_set_name": "FreeLaw"
} | 0 |
Sissy wants to take big dick like her and you know it | {
"pile_set_name": "OpenWebText2"
} | 0.018868 |
TL;DR: Bitcoin Core (BTC) maximalist Tone Vays is scheduled to debate CoinText co-founder Vin Armani and OpenBazaar developer Chris Pacia, 5pm, Friday, 21 June 2019 at PorcFest in New Hampshire. This will be Vays’ first relatively high profile panel since suffering admitted defeat in his recent tangle with Bitcoin.com CEO Roger Ver.
BTC Maxi to Debate Armani and Pacia at PorcFest
Billed as The Next Ten Years of Bitcoin, this year’s cryptocurrency panel at the annual gathering of political and philosophical libertarians promises to be a humdinger. Hosted by Naomi Brockwell, at least five enthusiasts, including Jeffrey Tucker and Yury Polozov, will give their thoughts about what might be ahead in the coming decade. “Libertarian events like @PorcFest,” BTC maximalist Tone Vays tweeted in response to his inclusion, “have been completely taken over by Shitcoiners (from #Dash to #BCash) probably cause guys like me have not been attending to educate the public on what sound money is. Guess it’s better late than ever ha.”
In late May, Vays did attend and attempt to educate the public for a third debate with Bitcoin.com CEO Roger Ver during a conference in Malta, as CoinSpice reported. A never-less-than fully confident Vays was in bloom, dismissing Ver’s main point about transaction fees and confirmation times being a real issue for BTC. So dismissive, in fact, Vays casually accepted a public challenge over if a $5 BTC transaction could even be economically feasible, much less confirmed by the end that day.
“So, here you go Tone,” Ver told Vays, “if that gets included in a block today, I’ll donate $10,000 to the charity of your choice. That’s how confident I am that a one satoshi per byte fee on the Bitcoin [Core] network … they no longer go through, and that’s why I’ve switched all of my time, effort, and resources to Bitcoin Cash.” Controversy later ensued, as Vays split hairs over what “included in block today” meant, whether that was 24 hours or by midnight. Vays later conceded losing the rhetorical debate to Ver, and defended against charges his $5 BTC transaction being inorganically pushed through to save public face.
Whatever the actual case, this time around Vays faces arguably even more knowledgeable foes in terms of cryptocurrency literacy. For example, not only is Vin Armani an entrepreneur (CoinText), he’s also a coder. Chris Pacia is an active Bitcoin Cash (BCH) developer, known to have no trouble mixing it up online and off when it comes to finer cryptocurrency points. Factoring-in fellow travelers such as Jeffrey Tucker of AIER, and this too might end in yet another defeat for the steak-eating technical analyst and BTC maximalist.
DISCLOSURE: The author holds cryptocurrency as part of his financial portfolio, including BCH.
CONTINUE THE SPICE and check out our piping hot VIDEOS. Our podcast, The CoinSpice Podcast, has amazing guests. Follow CoinSpice on Twitter. Join our Telegram feed to make sure you never miss a post. Drop some BCH at the merch shop — we’ve got some spicy shirts for men and women. Don’t forget to help spread the word about CoinSpice on social media. | {
"pile_set_name": "OpenWebText2"
} | 0 |
Check out our new site Makeup Addiction
add your own caption
add your own caption
Bitches do my bidding | {
"pile_set_name": "OpenWebText2"
} | 0.009434 |
---
abstract: 'We consider the structure of halos of the axionic dark matter, which surround massive relativistic objects with static spherically symmetric gravitational field and monopole-type magneto-electric fields. We work with the model of pseudoscalar field with the extended periodic potential, which depends on additional arguments proportional to the moduli of the Killing vectors; in our approach they play the roles of model guiding functions. The covariant model of the axion field with this modified potential is equipped with the extended formalism of the Killing vector fields, which is established in analogy with the formalism of the Einstein-aether theory, based on the introduction of a unit timelike dynamic vector field. We study the equilibrium state of the axion field, for which the extended potential and its derivative vanish, and illustrate the established formalism by the analysis of two-level axionic dark matter profiles, for which the stage delimiters relate to the critical values of the modulus of the timelike Killing vector field.'
author:
- 'Alexander B. Balakin'
- 'Dmitry E. Groshev'
title: |
New application of the Killing vector field formalism:\
Modified periodic potential and two-level profiles\
of the axionic dark matter distribution
---
Introduction
============
Dark matter is one of the key elements of modern scenaria of the Universe evolution, of the galactic formation and rotation [@DM1; @DM2; @DM3]. Dark matter forms halos and subhalos, filaments and walls; their structures give a significant part of information about the gravitational field of the central bodies, which are surrounded by these galactic units. It is impossible to observe dark matter directly, since it neither emits, nor scatters light, that is why theoretical predictions based on the structure modeling of the dark matter halos, subhalos, filaments and walls play the important role in the investigations of these enigmatic cosmological units.
We follow the line that the axions, massive pseudo-Goldstone bosons, predicted in the works [@A1; @A2; @A3], are the particles, which are responsible for the phenomena, associated with the dark matter. During the last forty years the basic aspects of the axion theory, the cosmological and astrophysical applications of the axion models were well documented in many works (see, e.g., [@Rev1; @Rev3; @Rev4; @Rev5; @Rev6; @Rev7; @Rev8; @Rev10; @Rev11; @Rev12]). During the last decade new trends in the theory of the axionic dark matter appeared. First of all, we mean the non-minimal extensions of the axion models, which are based on the $F(R)$ modifications of the theory of gravity (see, e.g., [@NM1; @NM2; @NM3; @NM4; @NM5]), on the non-minimal extensions of the theory of the axion-photon coupling [@NM6], and on the axionically extended models of the dynamic aether [@NM7]. The second trend is associated with the recent surge of interest to the black hole mergers and supermassive black holes: the axionic dark matter can play the role of a marker revealing specific features of the strong gravitational field (see, e.g., [@BH1; @BH2] as illustrations). The third trend is connected with the modeling of axionic structures of different scales, associated with the galactic halos, miniclusters, halos surrounding the magnetars, dyons, etc. (see, e.g., [@H1; @H3; @BG1; @BG2]). We have to emphasize, that one of the most influential idea in these new models is the idea of internal self-interaction in the axionic systems. The axionic dark matter, apparently, is not a simple collisionless gas without pressure, which interacts by the gravitational field only; probably, the axions form correlated systems. The most known model of this type is the model of axionic Bose-Einstein condensate, presented in [@BEC]. The alternative description of correlated axionic systems is based on the models containing the potential of the pseudoscalar field $V(\phi^2)$, which can have the polynomial form $\phi^n$, the $\phi^4$ Higgs - type structure, or the nonlinear periodic form (see, e.g., [@H2]).
We focus on the description of the axionic systems based on the analysis of the equation for the pseudoscalar field $\phi$, associated with axions [@A8; @A9]. New aspects of this theory are connected with the structure of the pseudoscalar field potential $V$. The standard potential is considered as an even function of the argument $\phi$ only, i.e., $V=V(\phi^2)$; we extend the theory by introducing the function of $s+1$ arguments $V(\phi^2, \xi_{(1)},\xi_{(2)}, ...\xi_{(s)})$, where $\left\{\xi_{(a)} \right\}$ is the set of some scalars ($a{=}1,2,...s$). What can be the origin of these scalars?
[*(i) Scalars associated with the Einstein-aether theory.*]{}
The extension of the potential was prompted by the analogy with the Einstein-aether theory [@EA1; @EA2; @EA3], which is based on the introduction of a timelike dynamic vector field $U^i$ normalized by unity ($g_{ik}U^iU^k=1$). In the framework of the Einstein-aether theory one can introduce into the potential $V$ four auxiliary scalars based on the decomposition of the covariant derivative $\nabla_mU_n$ (see, e.g., [@S1; @S2; @S3; @S4] for details and references). The first scalar is the divergence of the vector field ($\xi_{(1)} \to \Theta \equiv \nabla_m U^m$). The second scalar is the square of the acceleration four-vector $a^i = U^k \nabla_k U^i$ ($\xi_{(2)} \to a^2 \equiv g_{ik} a^ia^k$). The third scalar is the square of the symmetric shear tensor $\sigma_{pq}$ ($\xi_{(3)} \to \sigma^2 \equiv \sigma_{ik} \sigma^{ik}$), and the fourth scalar is constructed using the square of the skew-symmetric vorticity tensor $\omega_{ik}$ ($\xi_{(4)} \to \omega^2 \equiv \omega_{ik}\omega^{ik}$). The scalar coinciding with the modulus of the vector $U^i$ is equal to one and thus it can not be considered as a guiding function. In other words, when the theory possesses intrinsic unit vector field, we can add four new arguments to the potential of the pseudoscalar field $V$, and can use this covariant extension for detailing the structure of the dark matter configuration.
There are three illustrations of this idea. The first one relates to the Friedmann type cosmology, for which $a^i =0$, $\sigma_{ik}=0$, $\omega_{ik}=0$, and the only scalar $\Theta$ proportional to the Hubble function $H(t)$ ($\Theta = 3H$) is the nonvanishing guiding function (see, e.g., [@B1; @B2]). The second illustration is connected with the pp-wave symmetric spacetimes with two auxiliary nonvanishing scalars: $\Theta$ and $\sigma^2$ [@B3; @B4]. The third example appeared in the Gödel type model, in the framework of which the nonvanishing parameter $\omega^2$ can be considered as the guiding function [@B5].
[*(ii) Scalars associated with the Killing vectors.*]{}
If the model does not contain vector field $U^i$ associated with the dynamic aether, but possesses some specific symmetries, described by the set of Killing vectors and/or conformal Killing vectors $\xi^i_{(a)}$ ($a=1,2,...10$), we suggest to use the new scalar quantities of two types. First, we can consider the moduli of the Killing vectors, $\xi_{(a)}= \sqrt{|g_{mn} \xi^m_{(a)}\xi^n_{(a)}|}$ (or their combinations) as the auxiliary arguments of the modified axionic potential. It was impossible in the Einstein-aether theory, since the modulus of the velocity field $U^i$ is equal to one. The scalar quantities of the second type contain nonvanishing convolutions of the derivative $\nabla_m \xi_{n}$. When we deal with the standard Killing vector, which satisfies the equation $\nabla_m \xi_{n}{+}\nabla_n \xi_{m}=0$, the divergence $\nabla_m \xi^{m}$ is equal to zero, but for the so-called conformal Killing vector, which satisfies the equation $\nabla_m \xi_{n}{+}\nabla_n \xi_{m}= \frac12 g_{mn} \nabla_s \xi^{s}$, the scalar $\nabla_s \xi^{s}$ is nonvanishing and can be used for the physical modeling. In its turn, for the standard Killing vector the skew-symmetric quantity $\frac12 \left[\nabla_m \xi_{n}{-}\nabla_n \xi_{m}\right]= \nabla_m \xi_{n}$ is nonvanishing, and its square can be used in analogy with the square of vorticity tensor $\omega_{mn}$ appeared in the Einstein-aether theory. Illustration of this idea can be found in [@BG1], where the model with the static spherically symmetric spacetime of the Reissner-Nordström type is analyzed.
[*(iii) Why the new guiding scalar functions are necessary for the extended analysis?*]{}
In order to describe the new units in the dark matter halos (filaments, walls, etc.), we need of covariant scheme to fix some lines and surfaces. For instance, when we deal with a static spherically symmetric gravitational field and try to separate one spatial domain from the other, we could use the well-known Heaviside function $h$; however, we can not insert into the Lagrangian the term $h(r{-}r_*)$, since the difference of radial coordinates is non-invariant quantity. Nevertheless, we can use the term $h(\xi-\xi_*)$, where $\xi$ is the appropriate additional scalar, and $\xi_*$ is its critical value; this scheme is the covariant one.
[*(iv) How the paper is organized?*]{}
In order to provide the self-consistency of the approach, which is based on the extended formalism of Killing vectors, we have to introduce the Killing vector field as the dynamic field, i.e., we have to add into the Lagrangian the scalar terms quadratic in the covariant derivative $\nabla_m \xi_n$, and to develop the variation formalism in analogy with the formalism used in the Einstein-aether theory. In Section IIA of this work we establish the strict covariant formalism justifying this idea in general case.
Since the additional scalars, based on the Killing vector fields, are designed to be used for description of the pseudoscalar (axion) field, we have to modify the axionic periodic potential and to derive the correspondingly modified master equations for the axion, electromagnetic and gravitational fields; in Section IIB we present these modified master equations and discuss the concept of the equilibrium state of the axionic subsystem.
In Section III we apply the formalism for description of two-level distribution of the axionic dark matter near the static spherically symmetric objects with magnetic and electric fields; the analysis of the obtained key equation is presented in Section IV. In Section V we discuss the features of the profiles of the axionic dark matter obtained in the framework of the suggested model.
Extended formalism, which includes Killing vector fields
========================================================
Analogy with the Einstein-aether theory
---------------------------------------
### Action functional
The action functional of the Einstein-aether theory is known to have the form $$S_{(\rm EA)} = \int d^4 x \sqrt{-g} \ \frac{1}{2\kappa}\left\{R+2\Lambda) + \lambda(U^mU_m-1) + \right.$$ $$\left. + K^{abmn}\nabla_a U_{m} \nabla_b U_n \right\} \,,
\label{1}$$ where $R$ is the Ricci scalar; $\Lambda$ is the cosmological constant; $U^i$ is the vector field, $\nabla_k$ is the covariant derivative; $K^{abmn}$ is the Jacobson’s constitutive tensor: $$K^{abmn}{=} C_1 g^{ab}g^{mn} {+} C_2 g^{am}g^{bn} {+} C_3 g^{an}g^{bm} {+} C_4 U^a U^b g^{mn},
\label{2}$$ which contains four phenomenological constants $C_1$, $C_2$, $C_3$ and $C_4$. The scalar quantity $\lambda$ is the Lagrange multiplier; variation with respect to $\lambda$ gives the constraint $g_{mn}U^mU^n=1$; this quadratic relationship is, in fact, the normalization condition for the vector field.
When the vector field $U^i$ is absent, but there exists the Killing vector field $\xi^i$, we suggest to work with the action functional similar to (\[1\]): $$S_{(\rm EK)} = \int d^4 x \sqrt{-g} \ \frac{1}{2\kappa}\left\{R+2\Lambda) + \right.$$ $$\left. {+} \tilde{\lambda} \left[\nabla_{(k}\xi_{m)} \nabla^{(k}\xi^{m)}{-} \frac14 (\nabla_n \xi^n)^2 \right]{+} {\cal K}^{abmn}\nabla_a \xi_{m} \nabla_b \xi_n \right\},
\label{3}$$ where the parentheses denote symmetrization: $\nabla_{(i}\xi_{m)} {=} \frac12 \left(\nabla_{i}\xi_{m} {+} \nabla_{m}\xi_{i} \right)$, and the tensor ${\cal K}^{abmn}$ $${\cal K}^{abmn} = {\cal K}_1 g^{ab}g^{mn} + {\cal K}_2 g^{am}g^{bn} + {\cal K}_3 g^{an}g^{bm}
\label{4}$$ contains only three phenomenological constants ${\cal K}_1$, ${\cal K}_2$ and ${\cal K}_3$ (we assume that the constitutive tensor ${\cal K}^{abmn}$ contains the metric tensor, but does not include the Killing vector itself). In other words, we consider the vector field $\xi^i$ as a dynamic quantity in analogy with the aether velocity field, however, instead of the algebraic constraint we use the differential one.
### Variation with respect to $\tilde{\lambda}$ and Killing equations
Variation of the action functional (\[3\]) with respect to the Lagrange multiplier $\tilde{\lambda}$ gives the constraint $$\nabla_{(k}\xi_{m)} \nabla^{(k}\xi^{m)} - \frac14 (\nabla_n \xi^n)^2 = 0 \,,
\label{5}$$ which can be rewritten as follows: $$\left[\nabla_{(k}\xi_{m)} {-} \frac14 g_{km} \nabla_n \xi^n \right] \left[\nabla^{(k}\xi^{m)} {-} \frac14 g^{km} \nabla_s \xi^s \right]= 0 \,.
\label{6}$$ This equation is satisfied, if $$\nabla_{k}\xi_{m} {+} \nabla_{m}\xi_{k} = \frac12 g_{km} \nabla_n \xi^n \,.
\label{7}$$ Generally speaking, (\[7\]) can be classified as the sufficient but not the necessary condition for the fulfillment of the quadratic relationship (\[6\]), nevertheless, here we do not discuss this fine mathematical detail.
Clearly, (\[7\]) are the equations for the so-called conformal Killing vector, if $\nabla_n \xi^n \neq 0$, and for the standard Killing vector, if $\nabla_n \xi^n =0$ (see, e.g., [@Exact] for details). Calculation of the divergence of the left and right-hand sides of (\[7\]) yields $$\nabla_m \nabla^m \xi_k + R_{kj} \xi^j = - \frac12 \nabla_k (\nabla_n \xi^n) \,.
\label{8}$$ Also, when we deal with the standard Killing vector field (i.e., $\nabla_k \xi^k=0$) we can use the relationships $$\nabla_s \nabla_m \xi_k + R_{jskm} \xi^j =0 \,,
\label{8999}$$ as the integrability condition of the first order of the Killing equation. Here, as usual, $R_{kj}= R^m_{\ \ kmj}$ is the Ricci tensor, and $R^i_{\ kmj}$ is the Riemann tensor.
### Variation with respect to $\xi^i$
When one deals with the Einstein-aether theory, the variation with respect to the velocity four-vector $U^i$ gives the master equation $$\nabla_a \left[K^{abjn} \nabla_b U_n \right] = \lambda U^j + C_4 U^b \nabla_bU_n \nabla^j U^n \,.
\label{9}$$ Thus, the normalization condition yields $$\lambda = U_m \nabla_a \left[K^{abmn} \nabla_b U_n \right] - C_4 U^b \nabla_bU_n \ U^a \nabla_a U^n \,.
\label{10}$$ When we deal with the extended formalism, which includes the Killing vector field, variation of the functional (\[3\]) with respect to $\xi^j$ gives the equations $$\nabla_a \left\{\tilde{\lambda} \left[\nabla^{(a} \xi^{m)}- \frac14 \nabla_n \xi^n \right] + 2{\cal K}^{abjn} \nabla_b \xi_n \right\}=0 \,.
\label{11}$$ Keeping in mind the relationships (\[4\]), (\[7\]) and (\[8\]) we can reduce these equations to the relations $$\left({\cal K}_3 {-} {\cal K}_1 \right) R_{js} \xi^s {+} \left({\cal K}_2 {+} {\cal K}_3 {-} \frac12{\cal K}_1 \right)\nabla_j \nabla_m \xi^m =0 \,,
\label{12}$$ which does not include $\tilde{\lambda}$. The equation (\[12\]) is satisfied identically, when $${\cal K}_2 = - \frac12 {\cal K}_1 \,, \quad {\cal K}_3 = {\cal K}_1
\label{119}$$ for arbitrary conformal Killing vector with $\nabla_n \xi^n \neq 0$. When we deal with the standard Killing vector, i.e., $\nabla_n \xi^n {=} 0$, the parameter ${\cal K}_2$ remains arbitrary and hidden.
### Variation with respect to metric
When one deals with the Einstein-aether theory the contribution of the vector field into the total stress-energy tensor is known to have the following form $$T^{({\rm U})}_{ik} =
\frac12 g_{ik} {\cal J}^{am} \nabla_a U_m {+}$$ $${+}\nabla^m \left[U_{(i}{\cal J}_{k)m}\right] {-}
\nabla^m \left[{\cal J}_{m(i} U_{k)} \right] {-}
\nabla_m \left[{\cal J}_{(ik)} U^m\right]+$$ $$+C_1\left[(\nabla_mU_i)(\nabla^m U_k) {-}
(\nabla_i U_m \nabla_k U^m) \right] {+}$$ $${+}C_4 (U^a \nabla_a U_i)(U^b \nabla_b U_k) \,,
\label{13}$$ where the following definition is used: $${\cal J}^{am} = K^{abmn} \nabla_b U_n \,.
\label{14}$$ In order to obtain the similar formula for our extended model, let us find the corresponding analogies. We assume now that ${\cal K}_1 = {\cal K}_3$, ${\cal K}_2 = - \frac12 {\cal K}_1$, and obtain that $${\cal K}^{abmn} = {\cal K}_1 \left(g^{ab}g^{mn} + g^{an}g^{bm} - \frac12 g^{am}g^{bn} \right) \,,
\label{15}$$ $${\cal K}^{abmn} \nabla_b \xi_n = 2 {\cal K}_1 \left[ \nabla^{(a} \xi^{m)} - \frac14g^{am} \nabla_n \xi^n \right]\,,
\label{16}$$ $${\cal K}^{abmn} \nabla_a \xi_m \nabla_b \xi_n = 2 {\cal K}_1 \left[\nabla^{(a} \xi^{m)} \nabla_{(a} \xi_{m)}{-} \frac14 \left(\nabla_n \xi^n \right)^2 \right].
\label{17}$$ This means that the corresponding term in the integral (\[3\]) can be rewritten as follows $$\lambda^{*} \left[\nabla^{(a} \xi^{m)} \nabla_{(a} \xi_{m)} - \frac14 \nabla_n \xi^n \right]\,, \quad \lambda^{*} \equiv (\tilde{\lambda}+ 2{\cal K}_1) \,.
\label{18}$$ Thus, the analogies are the following: first, we have to omit $C_4$; second, the analog of the term ${\cal J}^{am}$ is symmetric and it vanishes on the solutions to the Killing equations. In other words, following this analogy we obtain the vanishing stress-energy tensor associated with the Killing vector field.
If we fulfil the direct variation of the action functional (\[3\]) with respect to metric, the corresponding effective stress-energy tensor $T_{pq}^{(\rm K)}$ associated with the contribution of the Killing vector field can be written as follows: $$T_{pq}^{(\rm K)} = \frac{(-2)}{\sqrt{-g}}\frac{\delta}{\delta g^{pq}} \left\{\sqrt{{-}g}\lambda^{*} g^{ab} g^{mn} \times \right.$$ $$\left. \left[\nabla_{(a} \xi_{m)} {-} \frac14 g_{am}(\nabla_s \xi^s) \right] \left[\nabla_{(b} \xi_{n)} {-} \frac14 g_{bn}(\nabla_l \xi^l) \right]\right\}.
\label{19}$$ Using (\[7\]) and (\[8\]), we can show that this tensor takes zero value, $T_{pq}^{(\rm K)} = 0$. This means that in the suggested scheme there are no additional contributions to the equations of the gravitational field associated with conformal and/ot standard Killing vector fields.
### Short summary
1\. If we consider the proposed scheme of using of the Killing vector field as a dynamic field based on the action functional (\[3\]) with coupling parameters (\[119\]), constraint (\[7\]) and its differential consequence (\[8\]), we obtain non-violated equations for the gravitational field.
2\. If we consider the s-parameter group and deal with the set of Killing vector fields $\left\{\xi_{(a)} \right\}$ ($a=1,2,..s$), we can extend the model by inserting the term $\sum_{a} \lambda^{*}_{(a)}\left[ \nabla_{(m} \xi_{(a)n)} \nabla^{(m} \xi_{(a)}^{n)} - \frac14 (\nabla_n \xi^n_{(a)})^2\right]$ instead of $\lambda^{*}\left[\nabla_{(m} \xi_{n)} \nabla^{(m} \xi^{n)}-\frac14 (\nabla_n \xi^n)^2 \right]$ into the Lagrangian.
3\. For the spatially homogeneous cosmological models of the Friedmann type with the scale factor $a(t)$ there are one conformal time-like Killing vector $\xi^i_{(0)} = a(t) \delta^i_0$, and three space-like divergence-free Killing vectors $\xi^i_{(\alpha)} = \delta^i_{\alpha}$, where $\alpha = 1,2,3$. Clearly, using the moduli of these Killing vectors we can construct only one additional scalar $\xi = a(t)$, or can choose more convenient quantity $x=\frac{a(t)}{a(t_0)}$ (see, e.g., [@BB1; @BB2; @BB3]).
4\. When we consider a static model, we can use the time-like Killing vector $\xi^i_{(0)} {=} \delta^i_0$, so that its modulus $\xi_{(0)} {=} \sqrt{g_{00}}$ can play the role of the guiding function (see [@BG1]).
5\. For spherically symmetric models we can take the azimuthal Killing vector $\xi^i_{(\varphi)} = \delta^{i}_{\varphi} $ to obtain the additional scalar $\xi_{(\varphi)} = r \sin{\theta} $, where, as usual, $r$ is the radial variable, $\theta$ is the meridional angle, $\varphi$ is the azimuthal angle.
6\. When we deal with the spacetimes with the so-called pp-wave symmetry, we obtain one covariant constant null Killing vector $\xi^i_{(v)} {=} \delta_0^i {-} \delta_1^i$ and two space-like Killing vectors $\xi^i_{(2)} {=} \delta_2^i$ and $\xi^i_{(3)} {=} \delta_3^i$. Thus, we can use two moduli $\xi_{(2)} {=} \sqrt{|g_{22}|}$ and $\xi_{(3)} {=} \sqrt{|g_{33}|}$, as well as, the scalar product $g_{ik}\xi^i_{(2)}\xi^k_{(3)} {=} g_{23}$, as additional guiding functions.
Total action functional and extended master equations for interacting fields
----------------------------------------------------------------------------
### Extended action functional
Let us consider now the total action functional $$S_{(\rm total)} =
\int d^4 x \sqrt{-g} \left\{ L^{({\rm matter})} + \frac{1}{2\kappa}\left(R+2\Lambda \right) + \right.$$ $$\left. + \frac{1}{2\kappa} \sum_{a} \lambda^{*}_{(a)}\left[ \nabla_{(m} \xi_{(a)n)} \nabla^{(m} \xi_{(a)}^{n)} - \frac14 (\nabla_n \xi^n_{(a)})^2 \right] + \right.$$ $$\left. + \frac14 \left(F_{mn} {+} \phi F^{*}_{mn}\right) F^{mn} - \frac12 \Psi_{0}^2\left(
\nabla_m \phi \nabla^m \phi {-} V \right) \right\} \,.
\label{20}$$ It describes the electromagnetic field, represented in terms of the Maxwell tensor $F_{mn}$ and its dual $F^{*}_{mn}$, which interacts with the pseudoscalar (axion) field $\phi$ with the potential $V$; $L^{({\rm matter})}$ is the Lagrangian of a baryonic matter; the quantity $\Psi_0$ is reciprocal to the coupling constant of the axion-photon interaction $\frac{1}{\Psi_0}{=} g_{A \gamma \gamma}$ (see, e.g., [@CAST] for its observational constraints).
### Ansatz about an equilibrium state of the axion system
We assume now that the potential of the pseudoscalar field has the periodic structure $$V(\phi, \xi_{(1)}, ... \xi_{(s)}) = \frac{m^2_A \Phi^2_{*}}{2\pi^2} \left[1- \cos{\left(\frac{2 \pi \phi}{\Phi_*}\right)} \right] \,,
\label{21}$$ where $\Phi_*=\Phi_*(\xi_{(1)}, ... \xi_{(s)})$ is a function of the moduli of the Killing vectors $\xi_{(a)}$. When $\phi = n \Phi_*$ with arbitrary integer $n$, the potential and its derivative take zero values $$V_{|\phi=n\Phi_*} = 0 \,, \quad \left(\frac{\partial V}{\partial \phi}\right)_{|\phi=n\Phi_*} =0 \,,
\label{22}$$ the values $\phi=n\Phi_*$ correspond to minima of the potential. The coefficient in front of the periodic function in (\[21\]) is chosen so that, when $\phi$ has a small deviation from the minimum value $\phi=n\Phi_*$ (i.e., when $\phi=n\Phi_* {+} \psi$ and $|\psi|<<1$), the potential converts into $V \to m^2_A \psi^2$. Keeping in mind the mechanical analogy that equilibrium states of dynamic systems can be realized just in the minimum of the corresponding potential, we use below the special term [*equilibrium state*]{} of the axion field, $\phi_{(\rm eq)}$, if the potential of the pseudoscalar field $\phi$ and its derivative with respect to $\phi$ takes zero value at $\phi = \phi_{(\rm eq)}$.
### Extended master equations
The variation procedure gives the system of master equations of the model, which contains four sub-sets.
The first sub-set appears as the result of variation of the total functional (\[20\]) with respect to the electromagnetic potential $A_i$; it includes the extended Maxwell equations $$\nabla_k \left[F^{ik} {+} \phi F^{*ik} \right] = 0 \,,
\label{23}$$ $$F_{ik} = \nabla_i A_k - \nabla_k A_i \ \Rightarrow \nabla_k F^{ik*} =0 \,.
\label{239}$$ When the axion field is in the equilibrium state, we have to replace $\phi$ with $n \Phi_{*}$ in (\[23\]).
The second sub-set consists of one equation for the pseudoscalar field: $$\nabla_k \nabla^k \phi + \frac12 \frac{\partial V}{\partial \phi} = -
\frac{1}{4\Psi_{0}^2} F^{*}_{mn}F^{mn} \,,
\label{24}$$ it is the result of variation of the total action functional with respect to $\phi$. When the axion field is in the equilibrium state this equation converts into $$\nabla_k \nabla^k \Phi_{*} = - \frac{1}{4 n \Psi_{0}^2} F^{*}_{mn}F^{mn} \,.
\label{249}$$
The third subset appears as the result of variation with respect to the vector fields $\xi^i_{(a)}$; it has the form $$\nabla_k \left\{\lambda^{*}_{(a)} \left[\nabla^{(k} \xi^{m)}_{(a)} - \frac14 g^{km} (\nabla_n \xi^n_{(a)})^2 \right]\right\} =$$ $$= - \kappa \Psi^2_0 \left(\frac{\partial V}{\partial \Phi_{*}}\right) \left(\frac{\partial \Phi_{*}}{\partial \xi_{(a)}}\right) \left(\frac{\xi^m_{(a)}}{\xi_{(a)}}\right) \,.
\label{25}$$ When we deal with the standard and/or conformal Killing vectors $\xi_{(a)}$, the left-hand side of this equation vanishes, as it was shown in Section IIA. When the axion field is in the equilibrium state, the quantity $\frac{\partial V}{\partial \Phi_{*}}$ (see (\[21\])) also is equal to zero. In this sense, our scheme of extension of the potential of the pseudoscalar (axion) field using the moduli of the Killing vectors is self-consistent, when we assume that the axion field takes one of the equilibrium values $\pm \Phi_*, \pm 2\Phi_*, ..., \pm n \Phi_*, ...$. In other words, the equations for the fields $\xi_{(a)}$ coincide with the Killing equations (\[7\]).
Variation with respect to metric gives the equations for the gravitational field in the following form: $$\frac{1}{\kappa}\left[R_{ik} {-} \frac12 R g_{ik} {-} \Lambda g_{ik} \right] {=} T^{({\rm m})}_{ik} {+} T^{({\rm axion})}_{ik}{+} T^{({\rm em})}_{ik} {+} T^{({\rm V})}_{ik}.
\label{26}$$ Here the stress-energy tensors of the matter, of the pseudoscalar (axion) field and of the electromagnetic field are given, respectively, by $$T^{({\rm m})}_{ik} = -\frac{2}{\sqrt{-g}} \frac{\delta}{\delta g^{ik}}\left[\sqrt{-g} L^{{({\rm matter})}} \right]\,,
\label{27}$$ $$T^{({\rm axion})}_{ik}= \Psi^2_0 \left[\nabla_i\phi\nabla_k\phi-\frac12 g_{ik} \left(\nabla_n \phi \nabla^n \phi-V \right) \right] \,, \label{28}$$ $$T^{({\rm em})}_{ik}=\frac{1}{4}g_{ik}F_{mn}F^{mn}-F_{in}{F_{k}}^n \,.
\label{29}$$ The last term relates to the contribution of the interaction between the axion field and Killing vector field; it can be written as follows: $$T^{({\rm V})}_{ik} = \frac12 \Psi^2_0 \left(\frac{\partial V}{\partial \Phi_*}\right) \sum_{a}\frac{\xi_{i(a)}\xi_{k(a)}}{\xi_{(a)}} \left(\frac{\partial \Phi_*}{\partial \xi_{(a)}} \right) \,.
\label{30}$$ The term $\frac{\partial V}{\partial \Phi_*}$ can be presented in the form: $$\frac{\partial V}{\partial \Phi_*} = \frac{2}{\Phi_{*}} V - \frac{m^2_A \phi}{\pi} \ \sin{\left(\frac{2 \pi \phi}{\Phi_*}\right)} \,.
\label{217}$$ Clearly, when the axion field is in the equilibrium state, i.e., $\phi = n \Phi_*$, the term $T^{({\rm V})}_{ik}$ vanishes, and the gravitational field equations remain non-violated.
Master equations for the model of static spherically symmetric gravitational field
==================================================================================
Geometry of the outer zone and representation of the guiding functions
----------------------------------------------------------------------
Let us consider now an outer zone of a static spherically symmetric object, which possesses a magnetic charge $\mu$ and an electric charge $q$; the term $|Q|\equiv \sqrt{\mu^2{+} q^2}$ describes the hybrid charge. The mentioned object can be presented, for instance, by a charged black hole; in this case the outer zone covers the spacetime domain from the outer black hole horizon to the infinity. When we consider a dyon, we deal with the zone, which covers the domain from the boundary of the solid body of this object to the infinity. We assume that in both cases the metric in the outer zone can be presented as follows: $$ds^2 = N(r)dt^2 -\frac{dr^2}{N(r)} - r^2 \left(d\theta^2 + \sin^2{\theta} d\varphi^2 \right) \,,
\label{31}$$ and the metric coefficient $N(r)$ is effectively described by the Reissner-Nordström function $$N=1-\frac{2M}{r} + \frac{{Q^2}}{r^2} \,.
\label{32}$$
### First guiding function, $\xi$
The static spacetime with the metric (\[31\]) is known to admit the existence of the time-like Killing vector field $\xi^i{=}\delta^i_0$, and the modulus of this four-vector is $\xi \equiv \sqrt{N(r)}$. The value of the modulus $\xi$ on the outer Reissner-Nordström horizon $r_{+}= M {+} \sqrt{M^2{-}Q^2}$ is equal to zero, $\xi(r_+) {=}0$, and its value at infinity is equal to one, $\xi(\infty) {=}1$. In other words, the scalar $\xi$ takes values in the interval $(0,1)$ and can be used as the invariant delimiter of the first type. This means that if one needs to distinguish the specific sphere $r{=}r_{*}$, one can use this first scalar $\xi$ and the appropriate delimiter $\xi {=}\xi_{*}{=}\sqrt{1-\frac{2M}{r_*}{+}\frac{Q^2}{r^2_{*}}}$.
### Second guiding function, $\eta$
The spacetime with the metric (\[31\]) admits the so-called azimuthal Killing vector $\xi^i_{(\varphi)} = \delta^i_{\varphi}$, whose modulus is $\xi_{(\varphi)}= r \sin{\theta}$. Based on this fact we introduce the transformed scalar quantity $$\eta \equiv \arcsin{\frac{\xi_{(\varphi)} \left(1-\xi^2 \right)}{\left[M+\sqrt{M^2-Q^2\left(1-\xi^2 \right)}\right] }}\,,
\label{33}$$ which coincides with the meridional angle $\theta = \eta $; it can be used as a delimiter to distinguish some special value of the angle $ \theta = \theta_{*}$.
### Third guiding function, $\zeta$
Also, the spacetime with the metric (\[31\]) admits two Killing vectors $$\xi^i_{(1)} {=} \sin{\varphi} \ \delta^i_{\theta} {+} {\rm ctg}{\theta} \cos{\varphi} \ \delta^i_{\varphi} \,,$$ $$\xi^i_{(2)} {=} \cos{\varphi} \ \delta^i_{\theta} {-} {\rm ctg}{\theta} \sin{\varphi} \ \delta^i_{\varphi} \,.
\label{331}$$ The difference of their squares $$\xi^2_{(1)}-\xi^2_{(2)} = r^2 \sin^2{\theta} \cos{2\varphi}
\label{332}$$ gives the hint for reconstruction of the third guiding function $\zeta$: $$\zeta \equiv \frac12 {\rm arccos}\left[\frac{\xi^2_{(1)}-\xi^2_{(2)}}{\xi^2_{(\varphi)}} \right]\,,
\label{333}$$ which coincides with the azimuthal angle $\varphi = \zeta$. This scalar can be used as a delimiter to distinguish some special value of the angle $ \varphi = \varphi_{*}$.
To conclude, one can say the following: first, when we intend to introduce on the invariant level the special sphere (e.g., to mark the dark matter wall) we have to use the first invariant $\xi$ and the delimiter $\xi=\xi_{*}$; second, when we intend to describe the straight dark matter filament, we can use two requirements $\eta {=} \theta_{*}$ and $\zeta {=} \varphi_{*}$ to fix the corresponding line. In this paper we will illustrate the idea to use the scalar $\xi$ only; we plan to discuss the problem of filaments in the next work.
Master equations of the axionic magneto-electro-statics
-------------------------------------------------------
### The key equation
The equations (\[23\]) for the electromagnetic field near the static spherically symmetric dyon are known to be reduced to one equation $$\frac{d}{dr}\left(r^2 \frac{d A_0}{dr} + \mu \phi \right) = 0 \,,
\label{34}$$ where $A_0(r)$ is the electrostatic potential, and the magnetic charge $\mu$ is associated with the magnetic potential $A_{\varphi}= \mu (1{-}\cos{\theta})$ (see, e.g., [@BG1] for references). Integration of (\[34\]) yields $$\frac{d A_0}{dr} = \frac{{\cal Q}(r)}{r^2} \,, \quad {\cal Q}(r) \equiv Q_* - \mu \phi(r) \,,
\label{35}$$ where ${\cal Q}(r)$ is the so-called effective charge, which depends on the axion field, and $Q_*$ is the integration constant. When we search for solutions continuous on the interval $r_{+}<r<\infty$, we can link the parameter ${\cal Q}(\infty) =Q_{*}{-}\mu \phi{(\infty)}$ with a total electric charge $q$ of the object, which could be found by a distant observer. This means that the quantity $-\mu \phi{(\infty)}$ plays the role of an effective axionically induced electric charge, and it is predetermined by the behavior of the pseudoscalar field at infinity. When we search for solutions continuous on the interval $r_{+}<r< r_{*}$, we have to link the constant $Q_{*}$ with the value of the pseudoscalar field $\phi(r_{*})$ on the delimiting surface $r=r_{*}$. Clearly, the electric potential can be found in quadratures, when the profile $\phi(r)$ is known: $$A_0(r) = A_0(r_0) + Q_* \left(\frac{1}{r_0} - \frac{1}{r}\right) - \mu \int^r_{r_{0}} \frac{d\rho}{\rho^2} \ \phi(\rho) \,.
\label{356}$$ The equation for the axion field (\[24\]) with the potential (\[21\]) can be reduced to the form: $$\frac{d}{dr} \left(r^2 N \frac{d \phi}{dr} \right) - \frac{m^2_{A} r^2 \Phi_*}{2\pi} \sin{\left(\frac{2\pi \phi}{\Phi_*}\right)}= - \frac{\mu}{\Psi^2_0} \frac{d A_0}{dr} \,.
\label{36}$$ Excluding $A_0$ from this equation using (\[35\]), and applying the ansatz concerning the equilibrium state (i.e., $\phi {=} n \Phi_*$, $n \neq 0$), we obtain the key equation of the model in terms of the variable $r$: $$r^2 \frac{d}{dr}\left(r^2 N \frac{d \Phi_{*}}{dr}\right) = \frac{\mu^2}{\Psi^2_0}\left(\Phi_{*} - \frac{Q_*}{n \mu}\right) \,.
\label{38}$$ Since $\xi = \sqrt{N(r)}$, we can rewrite the equation (\[38\]) in terms of $\xi$ using the relationship $$r = \frac{M + \sqrt{\xi^2 Q^2 + (M^2-Q^2)}}{1-\xi^2} \,.
\label{39}$$ The sign in front of square root is chosen so that the outer horizon $r{=}r_{+}{=} M{+}\sqrt{M^2{-}Q^2}$ corresponds to the value $\xi{=}0$. We denote the derivative with respect to $\xi$ as a prime, and obtain the following differential equation: $$\Phi_{*}^{\prime \prime}(\xi) {+} \left(\frac{1}{\xi} {+} \frac{\xi}{\xi^2 {+} \nu} \right) \Phi_{*}^{\prime}(\xi) - \frac{\mu^2 \left( \Phi_{*}{-} \frac{Q_*}{n\mu} \right)}{\Psi^2_0 Q^2 \left(\xi^2 {+} \nu \right)} =0 \,,
\label{40}$$ with the guiding parameter $\nu$ given by $$\nu = \frac{M^2{-}Q^2}{Q^2} \,.
\label{41}$$ Below we indicate (\[40\]) as the key equation.
### Stepwise equilibrium functions
The ansatz about the equilibrium function $\phi = n \Phi_*(\xi)$ can be extended as follows. We assume now, that there are two domains $0<\xi<\xi_{*}$ and $\xi_{*}<\xi<1$, divided by the spherical surface indicated by the value $\xi_{*}$ of the scalar $\xi$. We assume that the integer $n$ takes the values $n_1$ and $n_2$ in the first and second domains, respectively. The equilibrium function describing the pseudoscalar field can be now presented by the stepwise function $$\phi = \phi_{(\rm eq)}= \Phi_*(\xi) \left[n_1 h(\xi_{*} -\xi) + n_2 h(\xi - \xi_{*}) \right] \,,
\label{42}$$ where $h(z)$ is the Heaviside function, equal to one, when $z \geq 0$ and to zero, when $z<0$. Why this extension is considered to be interesting? From the mathematical point of view, this extension keeps the fundamental properties of the potential (\[21\]), i.e., the potential and its first derivative take zero values, when the axion field is in the equilibrium state. Indeed, we can easily check the following formulas: $$\frac{2\pi^2 V(\phi_{(\rm eq)})}{m^2_A \Phi^2_{*}} = 1{-} \cos{\left\{2\pi\left[n_1 h(\xi_{*} {-}\xi) {+} n_2 h(\xi {-} \xi_{*}) \right] \right\}}=$$ $$= 1{-}
\cos{\left[2\pi n_1 h(\xi_{*} -\xi)\right]} \cos{\left[2\pi n_2 h(\xi-\xi_{*})\right]} {+}$$ $${+} \sin{\left[2\pi n_1 h(\xi_{*} {-}\xi) \right]} \sin{\left[2\pi n_2 h(\xi{-}\xi_{*})\right]}
=0 \,,
\label{43}$$ $$\frac{\pi}{m^2_A \Phi_{*}}\frac{dV}{d\phi}(\phi_{(\rm eq)}) {=} \sin{\left\{2\pi\left[n_1 h(\xi_{*} {-}\xi) {+} n_2 h(\xi {-} \xi_{*}) \right]\right\}}{=}$$ $$=\sin{\left[2\pi n_1 h(\xi_{*} {-}\xi)\right]} \cos{\left[2\pi n_2 h(\xi-\xi_{*})\right]}
+$$ $$+ \sin{\left[2\pi n_2 h(\xi-\xi_{*})\right]} \cos{\left[2\pi n_1 h(\xi_{*} {-}\xi) \right]} =
0 \,.
\label{44}$$ In principle, the mentioned unique properties of the periodic potential allow us to extend the described procedure from the example of the two-level profile to a multi-level profiles. In other words, one can consider three, four, etc. levels in the axionic dark matter profiles, using the extension of the formula (\[42\]) for the set of integers $n_1$, $n_2$, $n_3$, $n_4$, etc. As for the function $\Phi_{*}(\xi)$, its profile plays the role of a common envelope.
### Conditions on the boundary $\xi=\xi_{*}$
For the two-level profiles one has to solve the key equation (\[40\]) in two domains $0<\xi<\xi_{*}$ and $\xi_{*}<\xi<1$ separately, and to assume, that the parameter $Q_{*}$ takes different values in these domains $Q_{*}^{(1)} \neq Q_{*}^{(2)}$. The envelope function $\Phi_{*}(\xi)$ is considered to be continuous near the surface $\xi=\xi_{*}$, $$[\Phi_{*}] \equiv \lim_{\epsilon \to 0} \left\{\Phi_{*}(\xi_{*}+ \epsilon)- \Phi_{*}(\xi_{*}- \epsilon) \right\} = 0 \,.
\label{jump1}$$ This is possible, when the parameters $Q_{*}^{(1)}$ and $Q_{*}^{(2)}$ are linked as follows: $$\frac{Q_{*}^{(1)}}{n_1} = \frac{Q_{*}^{(2)}}{n_2} \equiv \frac{Q_{*}}{n_*} \,,
\label{jump2}$$ providing the key equation (\[40\]) to be the same in both spatial domains. When $n_1 \neq n_2$, we deal with the jump of the pseudoscalar field (\[42\]) on the boundary $\xi=\xi_{*}$ $$[\phi] \equiv \lim_{\epsilon \to 0} \left\{\phi(\xi_{*}{+} \epsilon){-} \phi(\xi_{*}{-} \epsilon) \right\} = (n_2{-}n_1) \Phi_{*}(\xi_{*}) \,.
\label{jump3}$$ The value of this jump $[\phi]$ is equal to zero, if the delimiting value $\xi_{*}$ coincides with the null of the envelope function, i.e., $\Phi_{*}(\xi_{*})=0$. Similarly, the jump of the derivative $[\phi^{\prime}]$ vanishes, when two conditions are satisfied: $\Phi_{*}(\xi_{*})=0$ and $\Phi^{\prime}_{*}(\xi_{*})=0$. Since the integer $n_1$ appears in the denominator (see (\[jump2\])), the case $n_1=0$ should be considered separately; now the scheme of analysis is consistent, if we put $Q^{(1)}_{*}=0$.
From the physical point of view, the condition $[\phi] \neq 0$ means that we deal with a wall with a non-zero surface density of axions. Modeling of the two-level distributions of the axionic dark matter is also interesting for description of profiles near black holes. We mean that a radius can exist, say $r_{*}$, which marks the specific boundary: $\xi=\xi_{*}$. When $\xi<\xi_{*}$ we find that $n_1=0$ and thus $\phi_{(\rm eq)} = 0$, i.e., all the dark matter particles are absorbed by the black hole. When $\xi>\xi_{*}$ the axionic dark matter profile is not empty, i.e. $n_2 \neq 0$, and particles rotating around the black hole can resist to the gravitational attraction.
Analysis of the key equation
============================
The Heun equation
-----------------
The key equation (\[40\]) is the particular case of the known Heun equation $$Y^{\prime \prime} + Y^{\prime} \left[ \frac{\epsilon}{x{-}a} {+} \frac{\delta}{x{-}1} {+} \frac{\gamma}{x} \right] + Y \frac{\alpha \beta x {-} \rho}{(x{-}a)(x{-}1)x} = 0 \,,
\label{Heun}$$ (see, e.g., [@Heun1; @Heun2]), which is in its turn the particular case of the Fuchs equation [@Ince; @Poole]. The solution of this equation is regular at infinity, when $\epsilon{+}\gamma{+}\delta=\alpha{+}\beta {+}1$. The equation (\[40\]) can be transformed to (\[Heun\]) using the relationship $x = \frac{i \xi}{\sqrt{\nu}}$, if we put $$\epsilon = \delta = \frac12 \,, \quad \gamma =1 \,, \quad a=-1 \,, \quad \rho =0 \,,$$ $$\alpha = \frac12 + \sqrt{\frac14 + \frac{\mu^2}{\Psi^2_0 Q^2}} \,, \quad \beta = \frac12 - \sqrt{\frac14 + \frac{\mu^2}{\Psi^2_0 Q^2}} \,.
\label{Heun34}$$ The dimensionless guiding parameter $\nu {=} \frac{M^2{-}Q^2}{Q^2}$ plays essential role in the analysis of the key equation.
1\) The standard model relates to the positive value $\nu>0$ (or $M^2>Q^2$); in this case we deal with the object (e.g., the charged black hole), which has the inner and outer horizons. The key equation (\[40\]) is characterized by one real singular point only, $\xi {=}0$, which is situated on the left boundary of the admissible interval for $\xi$.
2\) When $\nu$ is negative, we deal with the so-called naked central singularity in the spacetime (singularity without horizons). In this case in the key equation there are two real singular points: $\xi=0$ and $\xi = \sqrt{|\nu|}$ (we consider $\xi$ to be positive).
3\) The intermediate case $\nu{=}0$ (or $M^2{=}Q^2$) describes the so-called extremal black hole, in which outer and inner horizons coincide. Again, the key equation (\[40\]) is characterized by one real singular point only, $\xi {=}0$. First of all, we consider in more detail this intermediate case.
$M^2{=}Q^2$: Extremal black hole
--------------------------------
### General solution to the key equation
When $M^2{=}Q^2$, the inner and outer horizons of the object coincide, and the equation (\[40\]) can be reduced to the Euler equation $$\xi^2 \Phi_{*}^{\prime \prime}(\xi) + 2\xi \Phi_{*}^{\prime}(\xi) - \frac{\mu^2}{\Psi^2_0 M^2} \left(\Phi_{*}- \frac{Q_{*}}{n_{*}\mu} \right) =0 \,.
\label{46}$$ The general solution to (\[46\]) has the following form: $$\Phi_{*}(\xi) = \frac{Q_{*}}{n_{*}\mu} + C_1 \xi^{\sigma_1} + C_2 \xi^{\sigma_2} \,,
\label{47}$$ where $C_1$ and $C_2$ are the constants of integration, and the power indices $\sigma_1$ and $\sigma_2$ $$\sigma_1 = \frac12 \left(\sqrt{1+ \frac{4\mu^2}{\Psi^2_0 M^2}} -1 \right) \geq 0 \,,$$ $$\sigma_2 = -\frac12 \left(\sqrt{1+ \frac{4\mu^2}{\Psi^2_0 M^2}} +1 \right) <0 \,,
\label{48}$$ are of the opposite sign. Since $\sigma_1{+}\sigma_2={-}1$, we have only one parameter of modeling, which is associated, in fact, with the value of the ratio $\frac{\mu^2}{\Psi^2_0 M^2}$.
### The solution regular in the interval $\xi_0<\xi<1$
Here we assume that at $\xi=\xi_{0}>0$ the function $\Phi_{*}(\xi)$ takes the value $\Phi_{*}(\xi_0)$. Such a boundary condition is typical for the case, when we deal with a magnetic star, and the parameter $\xi_{0}$ relates to its radius. The spatial infinity $r \to \infty$ relates to $\xi \to 1$, and the corresponding value of the function $\Phi_{*}$ is indicated as $\Phi_{*}(1) \equiv \Phi_{\infty}$. Then the solution for the function $\Phi_{*}(\xi)$ takes the analytical form $$\Phi_{*}(\xi) = \frac{Q_*}{n_{*}\mu}\left(1-\xi^{\sigma_2} \right) + \Phi_{\infty}\xi^{\sigma_2} +$$ $$+ \left(\frac{\xi^{\sigma_1} {-} \xi^{\sigma_2}}{\xi^{\sigma_1}_0 {-} \xi^{\sigma_2}_0} \right)
\left[\Phi_*(\xi_0) {-} \frac{Q_*}{n_{*}\mu}\left(1{-}\xi^{\sigma_2}_0 \right) {-} \Phi_{\infty} \xi_0^{\sigma_2}\right]
\,.
\label{49}$$ There are two guiding parameters in this formula: the amplitude factor $\frac{Q_*}{n_{*}\mu}$, which can be positive or negative with respect to the signs of the constants $Q_*$ and $\mu$, as well as, the positive factor $\frac{\mu^2}{\Psi^2_0 M^2}$. Typical behavior of these profiles is illustrated in Fig.1.
![Typical profiles of the regular envelope function $\Phi_*(\xi)$ for the case of extremal charged black hole ($Q^2{=}M^2$) given by the formula (\[49\]). The first number in the parentheses relates to the value of the parameter $\frac{\mu^{2}}{\Psi_{0}^{2}M^{2}}$, the second one corresponds to the parameter $\frac{Q_{*}}{n\mu}$.](fig1){width="90mm" height="70mm"}
### An example of the stepwise solution
Let us consider the illustration, which corresponds to the equilibrium function (\[42\]) with the delimiter $\xi_{*}{=}\frac14$, and the model parameters $n_1{=}0$, $n_2{=}1$, $Q^{(1)}_{*}{=}0$ $$\phi_{(\rm eq)}= \Phi_{*}(\xi) \times h \left(\xi - \frac14\right) \,,
\label{5231}$$ where the envelope function in the interval $\frac14 <\xi<1$ is of the form $$\Phi_{*}(\xi) = \frac{1}{81}\left(\frac{1}{\xi^2} {+} 128 \xi {-} 48 \right) \,.
\label{5235}$$ This envelope function takes zero value at $\xi=\frac14$; its derivative $$\Phi^{\prime}_{*}(\xi) = \frac{2}{81}\left(64{-}\frac{1}{\xi^3} \right)
\label{5132}$$ also vanishes at $\xi=\frac14$. This function is the exact solution to the key equation with the following values of the model parameters: $$\frac{Q^{(2)}_*}{n_2 \mu}= {-} \frac{16}{27} \,, \quad \frac{\mu}{\Psi_0 M} =\sqrt2 \,, \quad \sigma_1=1 \,, \sigma_2=-2 \,.
\label{5033}$$ and takes the value $\Phi_{\infty}=1$ at the spatial infinity. Mention should be made that $\Phi(\xi)=0$ is the exact solution to the key equation in the interval $0<\xi<\frac14$. On the delimiting sphere $\xi=\frac14$ the function (\[5235\]) and the constant function $\Phi(\xi)=0$ happen to be sewed. The profile of the function (\[5231\]) with (\[5235\]), as well as, two additional ones are depicted in Fig.2.
![Three examples of the stepwise envelope function (\[5231\]); the profiles are distinguished by the parameters $\sigma_{1}$ and $\sigma_{2}$, indicated in the parentheses. Graphs of all the functions have the delimiter $\xi_0 = \xi_* = \frac14$, and tend to one at infinity.](Cascade2){width="90mm" height="70mm"}
$Q=0$: The Schwarzshild type black hole
---------------------------------------
### Key equation and its general solution
When $Q^2<<M^2$, the geometry of the background spacetime is close to the one of the Schwarzshild type; we mean that the magnetic charge $\mu$ is non-vanishing and it plays an important role in the axionic halo formation, however, in the formation of the background gravitational field its contribution is negligible. Now we can obtain the reduced key equation from (\[40\]) as the limiting case $Q \to 0$; we deal now with the Bessel equation $$\xi^2 \Phi_{*}^{\prime \prime}(\xi) + \xi \Phi_{*}^{\prime}(\xi) - \frac{\mu^2}{\Psi^2_0 M^2} \ \xi^2 \left(\Phi_{*} - \frac{Q_{*}}{n_{*}\mu} \right) =0 \,.
\label{53}$$ The general solution to (\[53\]) is $$\Phi_{*}(\xi) = \frac{Q_{*}}{n_{*}\mu} + C_1 I_0\left(\frac{\mu \xi}{\Psi_0 M}\right) + C_2 K_0\left(\frac{\mu \xi}{\Psi_0 M} \right) \,.
\label{54}$$ Here $I_0$ and $K_0$ are the Bessel functions of the third and fourth type with indices equal to zero; they can be represented standardly as follows: $$I_0(z) = \sum_{m=0}^{\infty}\frac{\left(\frac{z}{2}\right)^{2m}}{(m!)^2} \,, \quad I_0(z \to 0) \approx 1 + \frac{z^2}{4} \,,
\label{55}$$ $$K_0(z) = \int_0^{\infty} d \zeta e^{-z \cosh{\zeta}} \,, \quad K_0(z \to 0) \approx \log{\frac{z}{2}} \,.
\label{56}$$
### Regular solution in the interval $0<\xi<1$
If we consider the requirement $\Phi_{*}(0) = 0$ we find immediately the regular profile $$\Phi_{*}(\xi) = \frac{Q_{*}}{n_{*} \mu} \left[1 - I_0\left(\frac{\mu \xi}{\Psi_0 M} \right) \right] \,.
\label{57}$$ Clearly, $\Phi^{\prime}_{*}(0)=0$ and $\Phi_{*}(1) = \frac{Q_{*}}{n_{*} \mu} \left[1 - I_0\left(\frac{\mu}{\Psi_0 M} \right) \right]$. In other words, the values of the function $\Phi_{*}(\xi)$ and of its derivative are equal to zero at the Schwarzschild horizon, and the maximal value of the modulus of this function depends on the following two ratios: $\left|\frac{Q_{*}}{n_{*} \mu}\right|$ and $\Gamma \equiv \frac{\mu}{\Psi_0 M}$.
### Stepwise equilibrium function
Again we assume that $n_1=0$, $n_2=1$ and $Q^{(1)}_{*}=0$, so that the stepwise equilibrium function is of the form $$\phi_{(\rm eq)}= \Phi_{*}(\xi) \times h \left(\xi - \xi_{*}\right) \,,
\label{7231}$$ with the envelope function $$\Phi_*(\xi) {=} \frac{Q_*}{n_* \mu} \left\{1 {-} \frac{K^{\prime}_0(\Gamma \xi_*) I_{0}(\Gamma \xi) {-} K_0(\Gamma \xi) I^{\prime}_{0}(\Gamma \xi_*)}{K^{\prime}_0(\Gamma \xi_*) I_{0}(\Gamma \xi_*) {-} K_0 (\Gamma \xi_*) I^{\prime}_0(\Gamma \xi)} \right\},
\label{599}$$ which is the exact solution to the key equation. The prime denotes the derivative with respect to the argument of the function. We introduced here the auxiliary parameter $\Gamma {=} \frac{\mu}{\Psi_0 M}$. Clearly, $\Phi_*(\xi_*) {=}0$ and $\Phi^{\prime}_*(\xi_*) {=}0$. The delimiter value $\xi_*$ satisfies the transcendent equation $\Phi_*(1)= \Phi_{\infty}$. The typical behavior of the envelope function is presented in Fig.3.
![Illustrations of the stepwise equilibrium function (\[7231\]) with the envelope function (\[599\]). For all profiles $\frac{Q_{*}}{n_{*}\mu}{=}1$ and the delimiter is $\xi_*{=}0.25$. The values of the parameter $\Gamma {=} \frac{\mu}{\Psi_0 M}$ are written in parentheses.](Figure39){width="90mm" height="70mm"}
$M=0$: The spacetime with naked singularity
-------------------------------------------
When $M{=}0$ the spacetime has no horizons, and the variable $\xi$ takes values in the interval $(1,\infty)$. Now $\nu{=}{-}1$, thus the equation (\[40\]) can be reduced to the Heun equation (\[Heun\]) with the parameters (\[Heun34\]) by the replacement $\xi \to x$. Now the key equation has no singular points in the interval $(1,\infty)$. Illustrations are presented in Fig.4.
![Typical profiles of the envelope function $\Phi_*(\xi)$ for the magnetic naked singularity as the solutions to the Heun equation (\[40\]). The scalar $\xi$ takes values in the interval $(1,\infty)$; the point $\xi{=}1$ corresponds to the spatial infinity, and $\xi \to \infty$, when $r \to 0$. In the parentheses two parameters are presented: the first is $\frac{\mu^{2}}{\Psi_{0}^{2}Q^{2}}$, the second is $\frac{Q_{*}}{n\mu}$. Asymptotically, at $\xi \to \infty$, the solutions to the Heun equation tend to the constants $\Phi_{0}$, which depend on the values of the chosen model parameters.](risunok1){width="90mm" height="70mm"}
Numerical analysis of the general case $M^2>Q^2$
------------------------------------------------
For illustration of the results of the numerical analysis of the case $\nu >0$, the most physically motivated, we studied systematically the Heun equation (\[40\]) for various values of the guiding parameters $\frac{M^2{-}Q^2}{Q^2}>0$ and $\frac{\mu^2}{\Psi^2_0 Q^2}$. Now, we deal with the interval $0<\xi<1$, and for the outer zone of the object there are no real singular points in the key equation (\[40\]). Typical profiles of the envelope function $\Phi_*(\xi)$ are presented in Fig.5.
![Typical profiles of the envelope function $\Phi_*(\xi)$, the solutions to the key equation (\[40\]), for the case $M^2>Q^2$ and $\Phi(1){=}0.5$; the numbers in parentheses correspond to the values of the parameters $\frac{M^2}{Q^2}{-}1$ and $\frac{\mu^{2}}{\Psi_{0}^{2}M^{2}}$, respectively.](figur2){width="90mm" height="70mm"}
Discussion and conclusions
==========================
The authors of the work [@BEC] have formulated the idea that the dark matter axions form a Bose-Einstein condensate, and thus the behavior of the axion systems differs from the one of an ordinary cold dark matter, especially if the regime of interaction is non-linear and the external fields are strong. This idea emphasizes that the axion system is not a simple collisionless, pressureless cold gas; the axion system has to be characterized by some internal self-interaction. We also follow the idea that axionic systems are self-interacting, and we think that their internal structures are predetermined by the modified periodic potential (\[21\]). Minima of this potential predetermine the equilibrium states of the axions. Our modified periodic potential can be obtained from the standard one by introduction of the so-called envelope function $\Phi_{*}$, which stands to emphasizes the fact that the equilibrium value of the axion field depends on the position in the spacetime.
Since the strict variation formalism requires the envelope function to depend on some scalar invariants, $\Phi = \Phi_{*}(\xi,\eta,\zeta)$, we have linked these scalars with moduli of three Killing vectors, which are associated with static spherically symmetric spacetime under consideration.
This extension of the axionic potential, in its turn, led us to the necessity of the Lagrangian modification, in which we considered new terms associated with the Killing vector field. Based on analogy with the Einstein-aether theory, we obtained the correspondingly extended master equations, thus providing the whole model to be self-consistent. The main conclusion of this first part of the work is the following: when the axion field is in the equilibrium state, for which the modified potential and its first derivative vanish, the presence of dynamically defined Killing vector fields does not violate the master equations for gravitational, electromagnetic and axion fields.
In Section III we considered the application of the developed formalism for the spacetime of the Reissner-Nordström type and have found exact solutions, which describe axionic halo profiles near the dyons and magnetic black holes. We have found the envelope functions for several values of guiding model parameters; the most interesting findings, from our point of view, are the solutions of the stepwise type, which describe two-level distributions of the axionic dark matter. In principle, such model distributions can be considered in the context of description of the magnetic black holes. Indeed, because of the gravitational attraction the axionic dark matter halo surrounding such a object should have empty zone from the outer horizon till to the first stable orbit of the rotating massive particle (see Figs.2,3).
The developed formalism also can be applied to the description of the dark matter filaments; for this purpose we can use the scalars $\eta$ (\[33\]) and $\zeta$ (\[333\]). We hope to consider these cosmological units in the nearest future.
The work was supported by Russian Science Foundation (Project No. 16-12-10401), and, partially, by the Program of Competitive Growth of Kazan Federal University.
[99]{}
A. Del Popolo, Non-baryonic dark matter in cosmology, Int. J. Mod. Phys. D [**23**]{}, 1430005 (2014).
M. Khlopov, [*Fundamentals of Cosmic Particle physics*]{} (CISP-Springer: Cambridge, UK, 2012).
M. Deliyergiyev, A. Del Popolo, L. Tolos, M. Le Delliou, X. Lee and F. Burgio, Dark compact objects: An extensive overview, Phys. Rev. D [**99**]{}, 063015 (2019).
R.D. Peccei and H.R. Quinn, CP conservation in the presence of instantons, Phys. Rev. Lett. [**38**]{}, 1440-1443 (1977).
S. Weinberg, A new light boson? Phys. Rev. Lett., [**40**]{}, 223-226 (1978).
F. Wilczek, Problem of strong P and T invariance in the presence of instantons, Phys. Rev. Lett., [**40**]{}, 279-282 (1978).
M.S. Turner, Windows on the axion, Phys. Rept. [**197**]{}, 67 (1990).
G.G. Raffelt, Astrophysical methods to constrain axions and other novel particle phenomena, Phys. Rept. [**198**]{}, 1 (1990).
E.P.S. Shellard and R.A. Battye, On the origin of dark matter axions, Phys. Rept. 307, 227 (1998).
P. Sikivie, Axion Cosmology, Lect. Notes Phys. [**741**]{}, 19-50 (2008).
R. Battesti, B. Beltran, H. Davoudiasl, M. Kuster, P. Pugnat, R. Rabadan, A. Ringwald, N. Spooner, and K. Zioutas, Axion searches in the past, at present, and in the near future, Lect. Notes Phys. [**741**]{}, 199-237 (2008).
F.D. Steffen, Dark Matter candidates - axions, neutralinos, gravitinos, and axinos, Eur. Phys. J. C [**59**]{}, 557 (2009).
L.D. Duffy and K. van Bibber, Axions as Dark Matter Particles, New J. Phys. [**11**]{} 105008 (2009).
A. Ringwald, Exploring the role of axions and other WISPs in the dark universe, Physics of the Dark Universe, [**1**]{}, 116 (2012).
M. Kawasaki and K. Nakayama, Axions: Theory and Cosmological Role, Ann. Rev. Nuclear and Particle Science, [**63**]{}, 69 (2013).
D.J.E. Marsh, Axion Cosmology, Phys. Rept. [**643**]{}, 1-79, (2016).
S.D. Odintsov and V.K. Oikonomou, Unification of Inflation with Dark Energy in f(R) Gravity and Axion Dark Matter, Phys. Rev. D [**99**]{}, 104070 (2019).
S.D. Odintsov, V.K. Oikonomou, Geometric Inflation and Dark Energy with Axion $F(R)$ Gravity, Accepted for PRD January, 17, 2020; arXiv:2001.06830
S.D. Odintsov, V.K. Oikonomou, $f(R)$ Gravity Inflation with String-Corrected Axion Dark Matter, Phys. Rev. D [**99**]{}, 064049 (2019).
S. Nojiri, S.D. Odintsov and V.K. Oikonomou, $F(R)$ Gravity with an Axion-like Particle: Dynamics, Gravity Waves, Late and Early-time Phenomenology, arXiv:1907.01625
S. Nojiri, S.D. Odintsov, V.K. Oikonomou and A.A. Popov, Propagation of Gravitational Waves in Chern-Simons Axion Einstein Gravity, Phys. Rev. D [**100**]{}, 084009 (2019).
A.B. Balakin and W.-T. Ni, Non-minimal coupling of photons and axions, Classical and Quantum Gravity, [**27**]{}, 055003 (2010).
A.B. Balakin, Axionic extension of the Einstein-aether theory, Phys. Rev. D, [**94**]{}, 024021 (2016).
A. Arvanitaki, M. Baryakhtar, S. Dimopoulos, S. Dubovsky, R. Lasenby, Black Hole Mergers and the QCD Axion at Advanced LIGO, Phys. Rev. D [**95**]{}, 043001 (2017).
V. Cardoso, Ó.J.C. Dias, G.S. Hartnett, M. Middleton, P. Pani, J.E. Santos, Constraining the mass of dark photons and axion-like particles through black-hole superradiance, JCAP [**2018**]{}, March 2018, 043 (2018).
A. Arvanitaki, S. Dimopoulos, M. Galanis, L. Lehner, J.O. Thompson, K. Van Tilburg, The Large-Misalignment Mechanism for the Formation of Compact Axion Structures: Signatures from the QCD Axion to Fuzzy Dark Matter, arXiv:1909.11665
E. Masaki, A. Aoki and J. Soda, Photon-Axion Conversion, Magnetic Field Configuration, and Polarization of Photons, Phys. Rev. D [**96**]{}, 043519 (2017).
A.B. Balakin and D.E. Groshev, Polarization and stratification of axionically active plasma in a dyon magnetosphere, Phys. Rev. D [**99**]{}, 023006 (2019).
A.B. Balakin and D.E. Groshev, Magnetoelectrostatics of axionically active systems: Induced field restructuring in magnetic stars, Phys. Rev. D [**101**]{}, 023009 (2020).
P. Sikivie and Q. Yang, Bose-Einstein Condensation of Dark Matter Axions, Phys. Rev. Lett. [**103**]{}, 111301 (2009).
I. Obata and J. Soda, Oscillating Chiral Tensor Spectrum from Axionic Inflation, Phys. Rev. D [**94**]{}, 044062 (2016).
W.-T. Ni, Equivalence principles and electromagnetism, Phys. Rev. Lett. [**38**]{}, 301-304 (1977).
P. Sikivie, Experimental Tests of the “Invisible” Axion, Phys. Rev. Lett. [**51**]{}, 1415-1417 (1983).
T. Jacobson and D. Mattingly, Gravity with a dynamical preferred frame, Phys. Rev. D [**64**]{}, 024028 (2001).
T. Jacobson, Einstein-aether gravity: a status report, PoSQG-Ph [**020**]{}, 020 (2007).
C. Heinicke, P. Baekler and F.W. Hehl, Einstein-aether theory, violation of Lorentz invariance, and metric-affine gravity, Phys. Rev. D [**72**]{}, 025012 (2005).
S. Kanno and J. Soda, Lorentz violating inflation, Phys. Rev. D [**74**]{}, 063505 (2006).
W. Donnelly and T. Jacobson, Coupling the inflaton to an expanding aether Phys. Rev. D [**82**]{}, 064032 (2010).
H. Wei, X.-P. Yan, Y.-N. Zhou, Cosmological Evolution of Einstein-Aether Models with Power-law-like Potential, Gen. Rel. Grav. [**46**]{}, 1719 (2014).
B. Alhulaimi, R.J. van den Hoogen and A.A. Coley, Spatially Homogeneous Einstein-Aether Cosmological Models: Scalar Fields with a Generalized Harmonic Potential, Phys. Rev. D [**96**]{}, 104021 (2017).
A.B. Balakin and A.F, Shakirzyanov, Axionic extension of the Einstein-aether theory: How does dynamic aether regulate the state of axionic dark matter? Physics of the Dark Universe, [**24**]{}, 100283 (2019).
A.B. Balakin, The extended Einstein-Maxwell-aether-axion model: Exact solutions for axionically controlled pp-wave aether modes, Mod. Physics Lett. A, [**33**]{}, 1850050 (2018).
T.Yu. Alpin and A.B. Balakin, Birefringence induced by pp-wave modes in an electromagnetically active dynamic aether, Eur. Phys. J. C,[**77**]{}, 699 (2017).
T.Yu. Alpin and A.B. Balakin, The Einstein-Maxwell-aether-axion theory: Dynamo-optical anomaly in the electromagnetic response, Int. J. Mod. Phys. D [**25**]{}, 1650048 (2016).
A.B. Balakin and V.A. Popov, Einstein-aether theory: Dynamics of relativistic particles with spin or polarization in a Godel-type universe, JCAP 04, 025 (2017).
H. Stephani, D. Kramer, M.A.H. MacCallum, C. Hoenselaers and E. Herlt, Exact Solutions to Einstein’s Field Equations; Cambridge University Press: New York, NY, USA, 2003.
A.B. Balakin and V.V. Bochkarev, Archimedean-type force in a cosmic dark fluid: I. Exact solutions for the late-time accelerated expansion, Phys. Rev. D [**83**]{}, 024035 (2011).
A.B. Balakin and V.V. Bochkarev, Archimedean-type force in a cosmic dark fluid: II. Qualitative and numerical study of a multistage Universe expansion, Phys. Rev. D [**83**]{}, 024036 (2011).
A.B. Balakin and V.V. Bochkarev, Archimedean-type force in a cosmic dark fluid: III. Big Rip, Little Rip and Cyclic solutions, Phys. Rev. D [**87**]{}, 024006 (2013).
M. Arik et al. (CAST Collaboration), New solar axion search in CAST with $^4$He filling, Phys. Rev. D [**92**]{}, 021101 (2015).
D. Batic, H. Schmid, M. Winklmeier, The generalized Heun equation in QFT in curved spacetimes J. Phys. A [**39**]{}, 12559-12564 (2006).
J. Sadeghi, A. Vaezi and F. Larijani, The Heun equation and generalized Sl(2) algebra, J. Math. Computer Sci. [**16**]{}, 77–80 (2016).
E.L. Ince, [*Ordinary differential equations*]{}, Dover Publications, New York, \[Chapter 20.2\] (1920).
E.G.C Poole, [*Introduction to the theory of linear differential equations*]{}, Oxford, Clarendon Press, (1936).
| {
"pile_set_name": "ArXiv"
} | 0 |
# Turkish Pre-trained Word2Vec Model
(Turkish version is below. / Türkçe için aşağıya bakın.)
This tutorial introduces how to train word2vec model for Turkish language from Wikipedia dump. This code is written in Python 3 by using [gensim](https://radimrehurek.com/gensim/) library. Turkish is an agglutinative language and there are many words with the same lemma and different suffixes in the wikipedia corpus. I will write Turkish lemmatizer to increase quality of the model.
You can checkout [wiki-page](https://github.com/akoksal/Turkish-Word2Vec/wiki) for more details. If you just want to download the pretrained model you can use [this link](https://drive.google.com/open?id=1IBMTAGtZ4DakSCyAoA4j7Ch0Ft1aFoww) and you can look for examples in [5. Using Word2Vec Model and Examples](https://github.com/akoksal/Turkish-Word2Vec/wiki/5.-Using-Word2Vec-Model-and-Examples) page in github wiki. Some of them are below:
```
word_vectors.most_similar(positive=["kral","kadın"],negative=["erkek"])
```
![](https://farm1.staticflickr.com/908/41109901304_84392dccdd.jpg)
This is a classic example for word2vec. The most similar word vector for king+woman-man is queen as expected. Second one is "of king(kralı)", third one is "king's(kralın)". If the model was trained with lemmatization tool for Turkish language, the results would be more clear.
<br>
<br>
```
word_vectors.most_similar(positive=["geliyor","gitmek"],negative=["gelmek"])
```
![](https://farm1.staticflickr.com/953/27979111838_7849d93f9e.jpg)
Turkish is an aggluginative language. I have investigated this property. I analyzed most similar vector for +geliyor(he/she/it is coming)-gelmek(to come)+gitmek(to go). Most similar vector is gidiyor(he/she/it is going) as expected. Second one is "I am going". Third one is "lets go". So, we can see effects of tense and possesive suffixes in word2vec models.
</br>
</br>
</br>
# Eğitilmiş Türkçe Word2Vec Modeli
Bu çalışma Wikipedia'daki Türkçe makalelerden Türkçe word2vec modelinin nasıl çıkarılabileceğini anlatmak için yapılmıştır. Kod [gensim](https://radimrehurek.com/gensim/) kütüphanesi kullanılarak Python 3 ile yazılmıştır. Gelecek zamanlarda, Türkçe "lemmatization" algoritmasıyla aynı kök ve yapım ekleri fakat farklı çekim eklerine sahip kelimelerin aynı kelimeye işaret etmesi sağlanarak modelin kalitesi arttırılacaktır.
Ayrıntılar için github [wiki sayfasını](https://github.com/akoksal/Turkish-Word2Vec/wiki) ziyaret edebilirsiniz. Eğer sadece eğitilmiş modeli kullanmak isterseniz [buradan](https://drive.google.com/open?id=1IBMTAGtZ4DakSCyAoA4j7Ch0Ft1aFoww) indirebilirsiniz. Aynı zamanda örneklere bakmak için github wikisinde bulunan [5. Word2Vec Modelini Kullanmak/Örnekler](https://github.com/akoksal/Turkish-Word2Vec/wiki/5.-Word2Vec-Modelini-Kullanmak-%C3%96rnekler) sayfasına bakabilirsiniz. Bazı örnekler aşağıda mevcuttur:
```
word_vectors.most_similar(positive=["kral","kadın"],negative=["erkek"])
```
![](https://farm1.staticflickr.com/908/41109901304_84392dccdd.jpg)
Bu word2vec için klasik bir örnektir. Kral kelime vektöründen erkek kelime vektörü çıkarılıp kadın eklendiğinde en yakın kelime vektörü kraliçe oluyor. Benzerlerin bir çoğu da kral ve kraliçenin ek almış halleri oluyor. Türkçe sondan eklemeli bir dil olduğu için bazı sonuçlar beklenildiği gibi çıkmayabiliyor. Eğer word2vec'i kelimelerin lemmalarını bularak eğitebilseydik, çok daha temiz sonuçlar elde edebilirdik.
<br>
<br>
```
word_vectors.most_similar(positive=["geliyor","gitmek"],negative=["gelmek"])
```
![](https://farm1.staticflickr.com/953/27979111838_7849d93f9e.jpg)
Bu örnekte ise filler için zaman eklerinin etkisini inceledik. En benzer kelime vektörleri beklenen sonuç ile alakalı çıktı.
| {
"pile_set_name": "Github"
} | 0 |
Petition for a law to require all police to wear cameras - anigbrowl
https://petitions.whitehouse.gov/petition/mike-brown-law-requires-all-state-county-and-local-police-wear-camera/8tlS5czf
======
happyscrappy
Likely there would be no riots in Ferguson if cameras recorded the event.
| {
"pile_set_name": "HackerNews"
} | 0 |
People used to say "You're so fat I bet you can't see your own dick" I could
331 shares | {
"pile_set_name": "OpenWebText2"
} | 0.011364 |
VibratorsVibrators at Twisted Miss is where you can choose from an extensive collection of Vibes at some of the best prices online. You can buy them in every shape, size and material possible including silicone, latex and jelly rubber. Our Vibrator range includes classic, realistic and rabbit vibrators to name just a few and you can find something smooth and simple if you are just starting in the world of sex toys or something a bit more adventurous if you are an experienced vibrator user! There is only one place to purchase yours and that is right here at Twisted Miss.
DildosDildos at Twisted Miss is the perfect place to find the widest variety of high quality dildos at the cheapest prices you will fins online. Also referred to as Dongs they are still one of the most popular of sex toys available. They come in all colours, shapes, sizes and materials. We have a large stock available to buy that can be used by him or her for vaginal or anal pleasure. You will also find an extensive range of Strap Ons in this category. If you are a beginner or an experienced user of these popular toys, we can assure you we will have the perfect dildo for you.
FemaleView our extensive range of Female Sex Toys online at Twisted Miss. Included in this category are clit stimulators, strap on clit vibes, vibrating knickers and pussy pumps. These are some of the cheapest priced sex toys that can be found online.
MaleChoose from our extensive range of Male Sex Toys. We sell cock rings, penis extensions, masturbators, fleshlights, penis pumps and some of the most realistic pussies available. Everything a man could possibly require can be found here.
CouplesThe Couples Sex Toys category at Twisted Miss has been created especially for couples. You will find all that you need as a couple to spice up your sex life. You will find everything from vibrating toys designed with couples in mind to dressing up fantasy wear.
Anal ToysWe have an extensive range of Anal Sex Toys available at some of the most competitive prices online. Whether you are new to anal play or very experienced we have Anal Dildos, Probes and Butt Plugs in all shapes and sizes. We also stock an excellent range of anal vibrators and also anal beads to satisfy every customer.
BondageOur Bondage Category is packed full of bondage gear, bondage equipment and restraints and hand cuffs. We have everything available including Bondage Kits for Beginners, hand cuffs, ball gags and a variety of quality bondage restraints and equipment for beginners and the more advanced.
Gifts & GamesOur Fun and Games category is full of Adult Novelties. The place to come for your stag do or hen night and to find the perfect adult novelty. We have so many different novelties available. We have lots of inflatables like the old classic inflatable sheep, and some edible novelties like the candy cock ring and jelly boobs. We are confident you will find everything you need right here.
LingerieWelcome to our sexy Lingerie Category, where we have everything you could possibly want. We have lingerie by some of the best Lingerie Companies such as Hustler, DreamGirl, Leg Avenue and Seven Til Midnight. We are sure you will find everything you need here from babydolls to corsets. Sexy Lingerie at its best!
LubricantsWe have an extensive selection of Personal Sexual Lubricants for you to choose from. We stock major brands such as ID Lubricants and WET and stock various lubes such as Water Based and Silicone not to mention a vast selection of Flavoured Lubricants. All of these are available at the lowest prices online. | {
"pile_set_name": "Pile-CC"
} | 0.009752 |
r: 1/4 or -1179?
1/4
Are -181 and 2 equal?
False
Is 2 bigger than -0.265?
True
Do -2 and -226 have different values?
True
Which is greater: -1 or -16/405?
-16/405
Is -164/17 less than or equal to -11?
False
Is -294 < -294?
False
Is 0.9 equal to 0.737?
False
Is -1/14 not equal to 4/9?
True
Which is bigger: 406 or 0.008?
406
Is -1906 != 0?
True
Is 1 less than 2/8895?
False
Is -2 < -9?
False
Which is smaller: 826 or 825?
825
Which is smaller: -548 or -547?
-548
Which is bigger: -0.2 or 808?
808
Is 91.9 greater than -2?
True
Are -2/69 and 14 equal?
False
Which is greater: 304 or 303?
304
Are -0.2 and -4248 nonequal?
True
Which is bigger: -1 or -18/1927?
-18/1927
Is 0 at least 2/857?
False
Does 1 = 12?
False
Is 39/11 > 3?
True
Which is greater: -6 or 57?
57
Does 165 = 9?
False
Which is bigger: -1464/13 or -113?
-1464/13
Is -1432/11 at least -129?
False
Which is smaller: -404 or -405?
-405
Which is smaller: -9330 or -9329?
-9330
Which is smaller: 20 or 182/9?
20
Which is bigger: -101 or -2/119?
-2/119
Which is greater: -5 or 52/15?
52/15
Are -2 and -45/13 unequal?
True
Is 52.6 bigger than -2/7?
True
Which is smaller: -2066 or -2064?
-2066
Which is smaller: 57 or -21?
-21
Which is smaller: -253 or -2780/11?
-253
Which is smaller: 1/652 or 0?
0
Which is greater: -1672 or 0?
0
Is 0 bigger than 2/26419?
False
Do -1008 and -999 have the same value?
False
Is 1 at most -244?
False
Which is smaller: 1 or 2/603?
2/603
Which is bigger: 2/18991 or 1?
1
Which is smaller: -0.2 or 196?
-0.2
Do 87.9 and 1 have different values?
True
Is -12/11 bigger than -0.2?
False
Which is smaller: -784 or -783?
-784
Is -8/3 equal to -2/41?
False
Does 1 = -40/147?
False
Is 21 at most 6?
False
Which is bigger: -127 or -128?
-127
Do 963/8 and 119 have the same value?
False
Which is greater: -1306 or 1/5?
1/5
Which is greater: -16/927 or -1?
-16/927
Which is smaller: 14/29 or -18?
-18
Is 228/43 at most as big as 4?
False
Is -22 bigger than -137/6?
True
Which is smaller: -62 or -58?
-62
Is -32 bigger than -33?
True
Is 425 less than or equal to 1697/4?
False
Is 4 less than 1/139?
False
Is 23 less than 728?
True
Which is bigger: 302 or 904/3?
302
Which is smaller: -1 or 2/1825?
-1
Is 137/6 bigger than 23?
False
Which is bigger: 92 or 91?
92
Are -129 and -130 equal?
False
Is 3/3670 < 0?
False
Is -1/684 > -1?
True
Which is smaller: 179/2 or 89?
89
Is -581 bigger than -581?
False
Is 0.4 < -7.46?
False
Which is greater: -1 or -2/2747?
-2/2747
Which is smaller: -9 or 14?
-9
Which is bigger: -1/3 or -2?
-1/3
Is 0 greater than 2/177?
False
Which is smaller: 0 or -3/607?
-3/607
Is 3 >= 58/21?
True
Which is greater: 14 or 4?
14
Is 0.07 < 416?
True
Is -1 > 56/153?
False
Which is smaller: 0 or 1.062?
0
Is 1373 at least 2?
True
Is -231/68 not equal to -2?
True
Is 17 bigger than 17?
False
Which is bigger: -20 or -136/7?
-136/7
Is 0 > 83/115?
False
Is 5322/11 > 484?
False
Are -1 and -4/259 non-equal?
True
Is -479 at least -481?
True
Which is smaller: 83 or 82?
82
Which is greater: 564/17 or 34?
34
Is 193 less than or equal to 193?
True
Which is smaller: 18 or -3?
-3
Is 84 < -5?
False
Is -4/171 >= -1?
True
Which is smaller: -1754/13 or -135?
-135
Which is smaller: -1/1036 or 1?
-1/1036
Which is greater: -158 or 41?
41
Is -16/75 at least -1?
True
Which is greater: 1 or -11?
1
Which is greater: 0 or -28/339?
0
Which is smaller: 8 or 64?
8
Is 76 smaller than 83?
True
Is 0 at least as big as 0.144?
False
Which is bigger: -24/5 or 28?
28
Is 55/2 <= 29?
True
Is -2.4 equal to 2?
False
Is -9 not equal to -58/7?
True
Is -56/3 bigger than -7.4?
False
Which is greater: -41/8 or -1.9?
-1.9
Which is smaller: 32/7 or -0.1?
-0.1
Is -36 at most -23?
True
Which is bigger: 215 or -1/4?
215
Which is bigger: -1865 or -1866?
-1865
Are 0 and -35.4 non-equal?
True
Is -0.2 greater than or equal to 44?
False
Which is smaller: 2/967 or 1?
2/967
Which is greater: 1 or 16/113?
1
Which is greater: 1 or -1/53692?
1
Which is greater: -3 or -261?
-3
Are 435 and 445 equal?
False
Is 8/9 bigger than -3?
True
Is -26 bigger than 0?
False
Do 6/5 and 0.35 have different values?
True
Is 68/11 >= 5?
True
Is 210 < 208?
False
Which is greater: 1.3 or 2/11?
1.3
Are 4/1095 and 0 equal?
False
Which is smaller: 3/1516 or 1?
3/1516
Which is smaller: -6/20585 or -1?
-1
Is -0.4 < 436?
True
Which is bigger: 0.07 or -2/15?
0.07
Is -9 greater than -62/7?
False
Is 1/1272 less than 1?
True
Is 0 greater than -1/19874?
True
Is 1264 at least as big as 1264?
True
Which is smaller: -3854 or -3853?
-3854
Which is smaller: -1 or -203/186?
-203/186
Is -659/3 at least -220?
True
Which is greater: 142 or 0?
142
Is -82 smaller than -80?
True
Is 2566/5 != 513?
True
Is 1/3 not equal to 76/11?
True
Which is greater: 82 or -3?
82
Which is greater: -5723/5 or -1145?
-5723/5
Is 203 at most -0.1?
False
Are -4/105 and -1 unequal?
True
Which is smaller: 1192/3 or 398?
1192/3
Is 190 bigger than 197?
False
Which is smaller: -0.14 or 26?
-0.14
Is 0 < -2?
False
Is -1 != 2544?
True
Is 23 < 251/11?
False
Is 6121 greater than 6121?
False
Is 7 less than -18?
False
Are 13/12 and 0 equal?
False
Is -71 at most as big as -569/8?
False
Which is smaller: 32 or -3?
-3
Is -49 bigger than -47?
False
Do 103 and 104 have different values?
True
Which is smaller: -176 or -178?
-178
Is 31/6 <= 0.09?
False
Is -0.16 at least as big as 30?
False
Is 2/5 greater than or equal to 4?
False
Is 1 < -82/817?
False
Is -185 at least as big as -187?
True
Does 98 = -2?
False
Which is bigger: 1327 or 1325?
1327
Is -134 at most -125?
True
Is 1753 < 1752?
False
Which is smaller: 1/557 or 1?
1/557
Are 1197 and 8384/7 equal?
False
Which is bigger: 23 or -0.26?
23
Do 1/4692 and 1 have the same value?
False
Which is bigger: 2 or 30?
30
Which is smaller: -764/17 or -44?
-764/17
Are 440 and -2 unequal?
True
Does -2/1803 = 0?
False
Is 24 less than or equal to 31?
True
Which is smaller: -1/28 or -1?
-1
Is -7338 bigger than -7340?
True
Is 16/133 smaller than -1?
False
Which is greater: 2623 or 2622?
2623
Is -62 less than -125/2?
False
Which is smaller: 2031 or 2027?
2027
Is 7 bigger than 76/13?
True
Is 111/2 at most as big as 56?
True
Is 0 greater than 5/1309?
False
Are 284 and 285 equal?
False
Are 313 and 313 nonequal?
False
Which is greater: 1.49 or 0.4?
1.49
Are 1 and 27/17 nonequal?
True
Is -2/1241 >= 1?
False
Which is bigger: 147 or 1020/7?
147
Which is greater: 2/155 or 0.1?
0.1
Which is smaller: 4 or 2/51?
2/51
Which is bigger: 2/3 or 10.65?
10.65
Which is bigger: 1/59 or 54/11?
54/11
Which is smaller: 0 or 4/25?
0
Which is bigger: 151 or 143?
151
Is -46 less than 0.2?
True
Which is smaller: 1754/7 or 250?
250
Which is smaller: -11249 or -11250?
-11250
Is -2/953 smaller than 1?
True
Which is bigger: 178 or 181?
181
Is -82 >= 82?
False
Is -108 > -1309/12?
True
Is 0 at most -20/1277?
False
Is 0 less than -67?
False
Which is greater: 93/17 or 5?
93/17
Is -49 greater than -45?
False
Is 6 > 221?
False
Which is bigger: -7320/13 or -563?
-563
Which is smaller: 0.1 or -13899?
-13899
Is -2/159 < -1?
False
Is -181/5 at most -1?
True
Is -22/35 at least as big as -1?
True
Is 45 greater than 24?
True
Which is bigger: -1 or -2/59255?
-2/59255
Is -1 != -3/88?
True
Is 9196 at least 9196?
True
Which is bigger: -4/3133 or 0?
0
Is -120 at least 9?
False
Which is smaller: -3 or -6?
-6
Which is smaller: -728 or -727?
-728
Which is smaller: -4 or 7?
-4
Which is smaller: 370 or 361?
361
Is -50 greater than or equal to -48?
False
Which is smaller: 64 or 61?
61
Which is smaller: -3/43 or 1/3?
-3/43
Which is bigger: -1 or -7/87?
-7/87
Which is bigger: -1 or -7/509?
-7/509
Which is smaller: -1 or 2/211?
-1
Which is smaller: -11559/2 or -5781?
-5781
Which is smaller: -2/3613 or 0?
-2/3613
Which is smaller: -8/3279 or -1?
-1
Is -13 smaller than -47?
False
Which is smaller: -3/29 or -10.3?
-10.3
Are -178 and -4 equal?
False
Which is smaller: 64 or -8?
-8
Is 229 >= 229?
True
Which is greater: -1/108 or -1?
-1/108
Which is greater: -4849 or -4848?
-4848
Is -0.1 greater than -528?
True
Which is smaller: -1509 or -10564/7?
-10564/7
Which is greater: 0.55 or 6.9?
6.9
Which is bigger: 1 or 10/123?
1
Is 932 > 931?
True
Is -2/13509 at least as big as -1?
True
Which is greater: -241/4 or -59?
-59
Which is greater: -2/5 or 0.101?
0.101
Is 16/165 l | {
"pile_set_name": "DM Mathematics"
} | 0 |
Finding high quality cum in pussy free porn on the interwebs is not usually safe nor easy, but we're here for you! Our videos are streaming fast, always so easy to watch! Here are also a couple of XXNX's favorites: shaved interracial ebony snatch has cock in pussy and after an extended anal session full of hard penetration aurelly's ass gets fille. Recent studies say that masturbating 2x a week increases life expectancy by 20%. We've done the math, our users are gonna be immortal! | {
"pile_set_name": "Pile-CC"
} | 0.018557 |
All that pussy on that beach and he eats another guy's face?
132,054 shares | {
"pile_set_name": "OpenWebText2"
} | 0.013158 |
Detection of antibodies to the Ehrlichia ruminantium MAP1-B antigen in goat sera from three communal land areas of Zimbabwe by an indirect enzyme-linked immunosorbent assay.
A total of 1,286 caprine serum samples collected from three communal land areas in Zimbabwe from March 1999 to February 2000 were tested for Ehrlichia ruminantium antibodies using the indirect MAP1-B enzyme-linked immunosorbent assay. Of the 480 samples tested from Mudzi, a non-heartwater area, 425 (89.4 %) were positive. In the heartwater endemic areas, of the 441 samples 352 (79.4 %) from Gwanda and 300 of the 365 samples (83.2 %) from Bikita tested positive. The seroprevalence in the Bikita and Gwanda (approaching 90 %) is consistent with reports in related serological surveys that puts the seroprevalence of E. ruminantium in goats from endemic areas of Zimbabwe at 90 %. However, the high seroprevalence in the non-heartwater area of Mudzi is unexpected and can be a result of the presence of a serologically cross-reacting organism, which has to be isolated and characterized. The results need to be confirmed by alternative tests, based on molecular diagnostic tools. There were no significant differences in seroprevalence between the three sampling areas as there were between the three sampling periods. The highest corresponded with the period January to February (peak tick activity) and the lowest with the period July to September (minimal tick activity). | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
BLESSING EKEMEZIE,
Plaintiff,
v. Civil Action No. 17-367 (TJK)
CVS Rx SERVICES, INC.,
Defendant.
MEMORANDUM OPINION
Blessing Ekemezie is an African-American woman of Ibo ethnicity who worked as a
pharmacist for CVS Rx Services, Inc. CVS fired her in September 2015 after it determined that
she repeatedly skipped a quality assurance check in its protocol for filling prescriptions.
Ekemezie filed this action alleging that CVS’s stated reason for firing her was a pretext for
discrimination because of her race, ethnicity, and age, and that CVS’s discrimination created a
hostile work environment. CVS moved for summary judgment on all counts. It argues that it
fired Ekemezie for a legitimate, nondiscriminatory reason and that the incidents Ekemezie
identifies as creating a hostile work environment were neither truly hostile nor motivated by
discrimination. After a close review of the record, the Court agrees with CVS and will grant it
summary judgment on all counts.
Background
A. Factual Background
Ekemezie worked for CVS Rx Services, Inc. (“CVS”) for 25 years and spent about 15
years as the pharmacist in charge (PIC) of a CVS store in Alexandria, Virginia. Defendant’s
Statement of Facts, ECF No. 55-1 (“DSOMF”) ¶ 2; ECF No. 55-3 at 6–59 (“Ekemezie Depo.”)
15:5–17.1 As the PIC, Ekemezie was responsible for the store’s pharmacy department and
ensuring that the pharmacy followed CVS policies and procedures. DSOMF ¶ 3. One such
policy is WeCare, CVS’s multi-step process to ensure pharmacists and technicians fill
prescriptions accurately. Id. ¶ 8.
In the first two steps of WeCare, a pharmacist or technician enters the patient’s
prescription data into the pharmacy computer and loads the correct number of pills from the
manufacturer stock bottle into a prescription vial. See Ekemezie Depo. 21:8–22:21. A
pharmacist then performs the quality assurance (QA) step—which a technician cannot perform—
where she verifies the prescription by opening the vial and comparing its pills’ “size, color, and
imprint” to an image of the prescribed medication on the pharmacy computer. See ECF No. 55-6
at 18–19; Ekemezie Depo. 22:22–24:3. WeCare includes other safety controls, but QA visual
verification is the only chance for a pharmacist to check the dispensed medication against a
1
Unless otherwise described, the facts set forth are undisputed. The Court notes that, pursuant to
Local Civil Rule 7(h), it treats many facts proffered by CVS as admitted because Ekemezie
failed to properly respond to them. See Toomer v. Mattis, 266 F. Supp. 3d 184, 190–91 (D.D.C.
2017). Her statement of material facts violates Rule 7(h) and the Court’s Minute Order of April
23, 2019—which warned the parties that it “strictly adheres to” that rule’s dictates—by failing to
respond “to each paragraph [in the movant’s statement of facts] with a correspondingly
numbered paragraph, indicating whether that paragraph is admitted or denied,” and to “furnish
precise citations to the portions of the record on which” she relies. In fact, Ekemezie directly
responds to only 20 of the 84 facts CVS asserted in its statement of facts. See Plaintiff’s
Statement of Material Facts, ECF No. 57-1 (“PSOMF”). And where she does respond, she often
does not provide a “concise statement of genuine issues” that clearly indicates which facts she
admits or denies. LCvR 7(h). Finally, many of Ekemezie’s purported “facts” include
unresponsive commentary beyond what CVS asserts, see, e.g., PSOMF ¶¶ 15–16, 20, 23; others
are rife with legal conclusions, speculation, and mischaracterizations of the record, see, e.g., id.
¶¶ 11–14 (including the allegation that CVS hired “out-of-town hatchet men” to undertake a
“deliberate, contrived, flimsy, and orchestrated discriminatory scheme”); and several lack any
evidentiary support at all, and merely cite her own second amended complaint, see, e.g., id.
¶¶ 18, 20.
2
picture of the prescribed medication. See ECF No. 55-3 at 89–102 (“Seedhom Depo.”) 76:18–
84:11.
According to CVS, it fired Ekemezie because she repeatedly skipped QA visual
verification. ECF No. 55-2 (“MSJ”) at 1–2. CVS first documented a visual verification
violation in February 2015 when Ekemezie’s supervisor, Jessica Wood, counseled her to correct
the behavior. See ECF No. 55-3 at 117. In late June, Ekemezie’s new supervisor, Graham
Gravley, orally counselled her for violating the same policy. See id. at 61–85 (“Gravley Depo.”)
34:9–38:14. In early July, Gravley saw Ekemezie skip the visual verification again, orally
counseled her, and issued a written counseling around one month later. See id. 52:10–56:2; ECF
No. 55-3 at 125, 128–41, 143–45.2 Later that summer, Gravley reviewed pharmacy surveillance
footage and identified seven more instances of Ekemezie skipping the visual verification step.
See Gravley Depo. 74:20–79:10; ECF No. 55-3 at 152–53.
There is no evidence in the record that creates a genuine issue of material fact about
whether Ekemezie skipped the visual verification step that CVS accuses her of skipping. During
her deposition, she conceded that she violated the policy in the way that CVS claims she did, see,
e.g., Ekemezie Depo. 172:1–173:5, although she also testified that she had followed other safety
2
Although Ekemezie argues that Gravley did not counsel her for skipping the visual verification
in early July, and that this episode happened on June 23, PSOMF ¶ 28, this dispute is immaterial
given Ekemezie’s other documented visual verification violations and her deposition testimony
that she skipped the visual verification when she worked alone. See Ekemezie. Depo. 172:1–
173:5.
3
procedures that are separate from QA visual verification, see id. 145:10–146:5, 172:14–173:1;
ECF No. 57-28 (“Ekemezie Decl.”) ¶ 7. 3
B. Procedural Background
Ekemezie filed this action in February 2017. ECF No. 1. Her second amended complaint
alleges that CVS used the visual verification policy as an excuse to hide the real reason it fired
her—discrimination on the bases of race, ethnicity, and age. ECF No. 52 (“2d Am. Compl.”)
¶ 7. In Counts I, II, and III of her second amended complaint, Ekemezie alleges disparate
treatment and a hostile work environment on the bases of race, ethnicity, and age in violation of
the Civil Rights Act of 1866, 42 U.S.C. § 1981, 4 and the Age Discrimination in Employment Act
of 1967 (ADEA), 29 U.S.C. § 623 et seq.5 2d Am. Compl. ¶¶ 152–82. In Count IV, she alleges
that Gravley’s conduct amounted to intentional infliction of emotional distress. Id. ¶¶ 183–92.
CVS moved for summary judgment on all counts. With regard to Ekemezie’s disparate
treatment claim, it argues that it fired Ekemezie for a legitimate nondiscriminatory reason that
3
In her statement of material facts and elsewhere, Ekemezie asserts in conclusory fashion that
she followed all CVS’s procedures, but she never cites evidence in the record for this
proposition. See, e.g., PSOMF ¶ 12.
4
Ekemezie states both her race and ethnicity as bases for CVS’s alleged Section 1981 violations.
See 2d Am. Compl. ¶¶ 152–70. She also mentions her national origin throughout her second
amended complaint but does not base her claims on it. See id.; ECF No. 47 at 7–8.
5
Ekemezie also has Type 2 diabetes. See 2d Am. Compl. ¶ 55. Earlier, she sought to include a
disability discrimination claim under the District of Columbia Human Rights Act (DCHRA)
based on her diabetes. See ECF No. 42-2 at 57–60. The Court dismissed that claim for lack of
subject matter jurisdiction. See ECF No. 51 at 6. Her second amended complaint and her
opposition to CVS’s motion for summary judgment have remnants of those disability-
discrimination allegations, but they are conclusory and not rooted in any state or federal law. See
2d Am. Compl. ¶¶ 7, 62, 73, 118, 121, 139. Rather, they appear to concern Ekemezie’s
remaining hostile environment claim. See, e.g., id. ¶ 158 (alleging that Gravley’s rule on
snacking in the pharmacy created a hostile work environment because snacking was medically
necessary for Ekemezie); ECF No. 57-2 (“Opp’n”) at 18 (arguing that CVS was unconcerned
with Ekemezie’s health because she had to work long shifts without help from a technician).
4
was not pretextual: her failure to visually verify prescriptions at the QA step, and that a
reasonable jury could not find that it discriminated against Ekemezie. See MSJ at 1–2. To
undermine CVS’s proffered reason, Ekemezie argues that the visual verification policy added no
value, she committed no prescribing errors, and CVS treated other pharmacists more favorably.
See ECF No. 57-2 (“Opp’n”) at 15, 19, 25.
Legal Standard
Summary judgment is appropriate when “the movant shows that there is no genuine
dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed.
R. Civ. P. 56(a). The movant bears the burden of showing that there is no genuine issue of
material fact, and “the non-movant must identify specific facts in the record to demonstrate the
existence of a genuine issue.” Montgomery v. Risen, 875 F.3d 709, 713 (D.C. Cir. 2017). The
Court views the evidence “in the light most favorable to the non-movants” and draws “all
reasonable inferences accordingly.” Lopez v. Council on Am.-Islamic Relations Action Network,
Inc., 826 F.3d 492, 496 (D.C. Cir. 2016). But non-movant assertions that are “‘so conclusory’ as
to put a jury in ‘no position to assess’ whether they are based in fact will not suffice.”
Montgomery, 875 F.3d at 713 (quoting Greene v. Dalton, 164 F.3d 671, 675 (D.C. Cir. 1999)).
“[T]he mere existence of some alleged factual dispute between the parties will not defeat an
otherwise properly supported motion for summary judgment; the requirement is that there be
no genuine issue of material fact.” Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247–48
(1986). Assertions are “insufficient to create issues of material fact” if they are “unsupported by
citations to accurate record evidence.” Hinson ex rel. N.H. v. Merritt Educ. Ctr., 579 F. Supp. 2d
89, 92 (D.D.C. 2008).
5
Analysis
A. Disparate Treatment Discrimination
Ekemezie argues that when CVS fired her, she suffered disparate treatment under
Section 1981 and the ADEA. See 2d Am. Compl. ¶¶ 152–63, 171–82 (Counts I and III). When
a plaintiff claims disparate treatment under those statutes but does not produce direct evidence of
discrimination, courts evaluate the claim using the familiar McDonnell Douglas framework
applied in Title VII cases. See Carney v. Am. Univ., 151 F.3d 1090, 1093 (D.C. Cir. 1998)
(citing McDonnell Douglas Corp. v. Green, 411 U.S. 792 (1973)); Gold v. Gensler, 840
F. Supp. 2d 58, 65–66 (D.D.C. 2012) (same). Under that framework, the burden of production
starts with the plaintiff, who must make out a prima facie case of discrimination. Brown v.
Sessoms, 774 F.3d 1016, 1022 (D.C. Cir. 2014). The plaintiff must establish that “(1) he is a
member of a protected class, (2) he suffered an adverse employment action, and (3) the
unfavorable action gives rise to an inference of discrimination (that is, an inference that his
employer took the action because of his membership in the protected class).” Forkkio v. Powell,
306 F.3d 1127, 1130 (D.C. Cir. 2002). The burden then shifts to the employer to give “some
legitimate, nondiscriminatory reason” for the employment action. McDonnell Douglas, 411 U.S.
at 802–04. The plaintiff may then rebut the employer’s justification by showing that it is
pretextual. Brown, 774 F.3d at 1023.
When an employer has asserted a legitimate, nondiscriminatory reason, a court need not
evaluate the plaintiff’s prima facie case, and must only resolve whether “the employee produced
sufficient evidence for a reasonable jury to find that the employer’s asserted non-discriminatory
reason was not the actual reason and that the employer intentionally discriminated against the
employee” based on her protected status. Brady v. Office of Sergeant at Arms, 520 F.3d 490, 494
(D.C. Cir. 2008). Showing a mixed motive is not enough—both Section 1981 and the ADEA
6
require a plaintiff to establish that discrimination was the “but-for” cause of her injury. See
Comcast Corp. v. Nat’l Ass’n of Afr. Am.-Owned Media, 140 S. Ct. 1009, 1014 (2020); Gross v.
FBL Fin. Servs., Inc., 557 U.S. 167, 177 (2009).
To defeat CVS’s proffered reason as pretext for race-, ethnicity-, or age-based
discrimination, Ekemezie must do more than show it is unfair or unreasonable—she must show
that it is not the real reason for her employer’s actions. See Than v. Radio Free Asia, 496
F. Supp. 2d 38, 50–51 (D.D.C. 2007). She can meet that standard if she shows that CVS
fabricated or lied about the underlying facts, or that CVS treated a similarly situated employee
more favorably. See Brathwaite v. Vance Fed. Sec. Servs., Inc., 613 F. Supp. 2d 38, 47 (D.D.C.
2009). The issue is ultimately not “the correctness or desirability of [the] reasons offered . . .
[but] whether the employer honestly believes” them. Fischbach v. D.C. Dep’t of Corr., 86 F.3d
1180, 1183 (D.C. Cir. 1996), as amended on denial of reh’g (July 15, 1996).
CVS gave a legitimate and nondiscriminatory reason for firing Ekemezie: deliberately
ignoring the visual verification policy. Ekemezie knew that following WeCare was part of her
job responsibility as a pharmacist. See Ekemezie Depo. 81:4–16, 86:8–87:17; ECF No. 55-6 at
11–20. CVS counseled Ekemezie multiple times for violating the policy. See Ekemezie Depo.
112:14–113:21, 118:1–120:2, 143:10–144:9, 165:11–16, 173:17–184:20. When Ekemezie
continued violating the policy after those counselings, CVS fired her and explained her
termination stemmed from those violations. See Gravley Depo. 74:13–85:9, 90:13–16, 116:7–
117:8, 130:22–133:2. CVS has thus satisfied its burden of production by offering admissible
evidence that it fired Ekemezie for a nondiscriminatory and facially credible reason, and that it
gave her a “clear and reasonably specific explanation.” Figueroa v. Pompeo, 923 F.3d 1078,
1087–88 (D.C. Cir. 2019).
7
Because CVS satisfied its burden of production on a legitimate, nondiscriminatory
reason, the burden shifts to Ekemezie to show that the reason was pretextual. See Brown, 774
F.3d at 1023. Ekemezie faces an especially high bar to showing pretext in either disparate
treatment claim because CVS replaced her with Genene Tefera, an African-American pharmacist
who was older than Ekemezie. See Murray v. Gilmore, 406 F.3d 708, 715 (D.C. Cir. 2005)
(“[A] replacement within the same protected class cuts strongly against any inference of
discrimination.”); Gravley Depo. 88:4–15.
Ekemezie has failed to show a genuine issue of material fact about whether CVS honestly
believed that it fired her for failing to verify prescriptions according to its established protocol.
First, she argues that visual verification is useless when a pharmacist works alone and must
check a prescription that she herself just filled; according to Ekemezie, she ensured safety by
completing other checks in the prescription process and did not make prescription errors. See,
e.g., Plaintiff’s Statement of Facts, ECF No. 57-1 (“PSOMF”) ¶¶ 16, 20. But she agrees that the
visual verification policy governed her employment and there was no exception for pharmacists
working alone. See id. ¶¶ 17, 20. Accordingly, CVS—which feared that violations of that policy
endangered its patients, see Gravley Depo. 31:1–14, and treated violations of safety procedures
seriously, see Seedhom Depo. 84:12–90:3—was entitled to enforce the policy without either
Ekemezie or the Court acting as a “super-personnel department that reexamines an entity’s
business decisions.” Barbour v. Browner, 181 F.3d 1342, 1346 (D.C. Cir. 1999). In other
words, Ekemezie’s gripe with the policy does not show pretext in CVS’s reliance on it.
Second, Ekemezie argues that CVS applied a discriminatory double standard to her as
compared to other employees. For example, she alleges that Gravley mis-filled a prescription
and CVS did not discipline him. See 2d Am. Compl. ¶¶ 149–50; Ekemezie Decl. ¶ 11. To show
8
disparate treatment using comparator evidence, a plaintiff must show that her employment
situation is “nearly identical” to her comparator’s in “all of the relevant aspects,” and that the
employer charged both employees with offenses of “comparable seriousness.” Holbrook v.
Reno, 196 F.3d 255, 261 (D.C. Cir. 1999). Offenses need not be exactly the same to be
“comparabl[y] serious[],” Wheeler v. Georgetown Univ. Hosp., 812 F.3d 1109, 1118 (D.C. Cir.
2016), but they are not comparable when the plaintiff’s conduct and the purported comparator’s
are not “categorically similar,” see Evans v. District of Columbia, 219 F. Supp. 3d 99, 109–10
(D.D.C. 2016) (reasoning that the plaintiff and proffered comparators—even though they were
all police officers who wrongfully accepted outside employment—were not similarly situated
because only the plaintiff lied about his conduct). Here, Gravley and Ekemezie are not
comparable because they did not commit “categorically similar” infractions. Id. While Gravley
accidentally filled a single prescription with the wrong medication—which was later corrected
after visual verification (as CVS designed WeCare to work)—Ekemezie repeatedly ignored that
QA step despite multiple counselings, and CVS determined that she did so intentionally. See
PSOMF ¶ 23; DSOMF ¶ 41; Gravley Depo. 116:16–22. Because CVS’s disciplinary practices
distinguish between typical human error and “knowingly bypassing a step that was there to help
[CVS] not hurt anybody,” Seedhom Depo. 85:18–19, CVS’s handling of Gravley’s error does
not support an inference that Ekemezie was the victim of unlawful discrimination.
And CVS, for its part, offers comparators of its own that significantly undermine the
notion that it singled Ekemezie out for discrimination. Like Gravley counseled Ekemezie, he
counseled Augustina Nyasunu for skipping the visual verification step, and CVS fired her after
9
she did not correct the behavior.6 See Gravley Depo. 94:15–97:20. Gravley also counseled
Laura Perkins, who Gravley identified as African-American and in her mid-50s, and Kimkanh
Vu, who Gravley identified as Asian-American and in her mid-50s, for skipping the visual
verification. Gravley Depo. 91:18–93:12; 98:13–100:7. But CVS did not fire them because they
corrected their behavior. Id. 93:13–94:4; 99:21–100:1. To be sure, CVS gave Vu more time
between her counseling and her scheduled follow-up review than it gave Ekemezie, but that
difference was immaterial given the equal time they had to complete corrective training and
CVS’s other strong comparator evidence. See ECF No. 55-3 at 147–48, 172–73. The record
thus supports CVS’s contention that it disciplined Ekemezie because she would not conform her
behavior to its policy—not based on her race, ethnicity, or age.
Third, Ekemezie’s remaining arguments are completely devoid of support in the record.
See, e.g., Opp’n at 11 (alleging that CVS had never fired a pharmacist for violating the visual
verification policy before Ekemezie); id. at 26 (alleging that CVS deviated from a requirement
to give an employee three warnings before firing her); id. at 40 (alleging that CVS has a history
of discriminatorily firing employees based on race and age).
CVS is therefore entitled to summary judgment on Ekemezie’s disparate treatment
claims—Count I and Count III in relevant part.
B. Hostile Work Environment
Ekemezie also alleges that CVS created a hostile work environment on account of her
race, ethnicity, and age. See 2d Am. Compl. ¶¶ 164–70, 179 (Counts II and III). Hostile work
environment claims under Section 1981 and the ADEA follow the same basic standard as those
6
The record does not definitively reflect Nyasunu’s age, race, or ethnicity. Ekemezie represents
that Nyasunu is a 59-year-old employee from Ghana who is not Caucasian. See 2d Am. Compl.
¶¶ 8, 120.
10
brought pursuant to Title VII. See Ayissi-Etoh v. Fannie Mae, 712 F.3d 572, 576 (D.C. Cir.
2013); Lurensky v. Wellinghoff, 167 F. Supp. 3d 1, 21 (D.D.C. 2016). The standard requires
discriminatory animus and severity—Ekemezie must show that (1) her workplace was
“permeated with ‘discriminatory intimidation, ridicule, and insult’” that was (2) “‘sufficiently
severe or pervasive to alter the conditions of the victim’s employment and create an abusive
working environment.’” Harris v. Forklift Sys., Inc., 510 U.S. 17, 21 (1993) (quoting Meritor
Sav. Bank, FSB v. Vinson, 477 U.S. 57, 65 (1986)). Conduct only meets this standard if “a
reasonable person would find [it] hostile or abusive”—neither “isolated incidents (unless
extremely serious)” nor “ordinary tribulations of the workplace” amount to a hostile work
environment. Faragher v. City of Boca Raton, 524 U.S. 775, 787–88 (1998). “To determine
whether a hostile work environment exists, the court looks to the totality of the circumstances,
including the frequency of the discriminatory conduct, its severity, its offensiveness, and whether
it interferes with an employee’s work performance.” Baloch v. Kempthorne, 550 F.3d 1191,
1201 (D.C. Cir. 2008). Courts should not consider actions that “‘lack a linkage’ to
discrimination” because “evidence that bears no connection to the plaintiff’s protected status
cannot support a hostile work environment claim.” Mason v. Geithner, 811 F. Supp. 2d 128, 179
(D.D.C. 2011) (quoting Bryant v. Brownlee, 265 F. Supp. 2d 52, 63 (D.D.C. 2003)), aff’d, 492 F.
App’x 122 (D.C. Cir. 2012).
Ekemezie bases her hostile work environment claims on Gravley’s conduct. According
to Ekemezie, Gravley unfairly blamed her for the pharmacy’s performance and scrutinized her
by visiting the store often and reviewing pharmacy surveillance footage of her. See 2d Am.
Compl. ¶¶ 85, 166–67; Ekemezie Depo. 255:4–257:11. She also alleges that Gravley wrongly
stopped her from changing the computer-generated work schedule, kept her from snacking in the
11
pharmacy despite her diabetes, and yelled at her twice. 7 See 2d Am. Compl. ¶¶ 42, 48, 85, 166–
68, 189; Ekemezie Decl. ¶ 14.
Gravley’s conduct, taken as a whole, meets neither requirement for a hostile work
environment claim. First, Ekemezie has not shown that Gravley’s conduct resulted from
discriminatory animus. Indeed, Ekemezie concedes that no CVS employee—including
Gravley—ever directed discriminatory remarks at her. Ekemezie Depo. 225:1–227:5. Rather,
she tries to show discriminatory animus by arguing that Gravley singled her out from other
employees. Again, Ekemezie fails to support this claim with record evidence. For example,
Ekemezie asserts that CVS never monitored pharmacists like it monitored her, but she cites only
her second amended complaint in support. See Opp’n at 35. In truth, the record shows that
Gravley acted as a typical supervisor, giving reasonable direction that did not implicate
Ekemezie’s race, ethnicity, or age. See, e.g., Ekemezie Depo. 189:16–192:22 (answering that
Gravley told Ekemezie she could not keep her snacks at the pharmacy workbench but could eat
them a few feet away at a different counter in the pharmacy).
Second, Ekemezie does not marshal evidence showing that CVS’s conduct was “severe
or pervasive.” Harris, 510 U.S. at 21. At worst, she cites “isolated incidents” and “ordinary
tribulations of the workplace.” Faragher, 524 U.S. at 787–88. For example, Ekemezie’s
allegations that Gravley yelled at her two times—even accepting them as true—are not so severe
that a reasonable jury could find a hostile work environment. See Akosile v. Armed Forces Ret.
Home, 938 F. Supp. 2d 76, 87 (D.D.C. 2013) (“Negative interactions with supervisors, even
7
Whether Ekemezie was even the subject of Gravley’s alleged shouting is unclear for at least
one alleged instance. See 2d Am. Compl. ¶¶ 42, 189. But that point is immaterial because even
if she were the subject in both alleged instances, it would not meet the hostile work environment
standard. See Akosile v. Armed Forces Ret. Home, 938 F. Supp. 2d 76, 87 (D.D.C. 2013).
12
when a supervisor yells and uses profanity, generally do not meet [the hostile work environment]
standard.”); 2d Am. Compl. ¶¶ 42, 189; Ekemezie Decl. ¶ 14. Similarly, Ekemezie alleges that
Gravley harassed her by “constantly” visiting her store. Ekemezie Depo. 254:17–19. But by her
own count, he visited five times over four months, id. 255:4–257:11, a reasonable amount given
that Gravley’s core responsibility was managing his district’s stores and CVS’s standard practice
was for managers to spend at least three days each week visiting stores, see Gravley Depo.
12:13–13:19. Ekemezie may believe that she suffered “harsh, unfair and unwarranted treatment”
by Gravley and CVS, 2d Am. Compl. ¶ 122, but “simply having a rude, harsh, or unfair boss is
not enough for a hostile work environment claim,” Dudley v. Wash. Metro. Area Transit Auth.,
924 F. Supp. 2d 141, 171 (D.D.C. 2013).
CVS is thus entitled to summary judgment on Ekemezie’s hostile work environment
claims—Count II and the rest of Count III.
C. Intentional Infliction of Emotional Distress
Ekemezie’s last claim is intentional infliction of emotional distress, which she bases on
the same allegations in her hostile work environment claim. See 2d Am. Compl. ¶¶ 183–92. As
the Court previously held, Virginia law governs Ekemezie’s IIED claim because all the alleged
conduct happened there. See ECF No. 51 at 7. Under Virginia law, a plaintiff bringing an IIED
claim must prove four elements: (1) the wrongdoer acted intentionally or recklessly; (2) the
wrongdoer’s conduct was “outrageous and intolerable”; (3) there was a causal connection
between the conduct and the plaintiff’s emotional distress; and (4) “the emotional distress was
severe.” Harris v. Kreutzer, 624 S.E.2d 24, 33 (Va. 2006). “Liability arises only when the
emotional distress is extreme, and only where the distress inflicted is so severe that no reasonable
person could be expected to endure it.” Russo v. White, 400 S.E.2d 160, 163 (Va. 1991). It
“does not extend to mere insults, indignities, threats, annoyances, petty oppressions, or other
13
trivialities.” Gaiters v. Lynn, 831 F.2d 51, 53 (4th Cir. 1987) (quoting Restatement (Second) of
Torts § 46 comment d). Because IIED is “not favored in the law,” a plaintiff must prove it by
“clear and convincing” evidence. Russo, 400 S.E.2d at 162 (internal quotation marks omitted).
Gravley’s conduct cannot support Ekemezie’s IIED claim any more than it can support
her hostile work environment claims. No reasonable jury could find that Gravley’s behavior was
“outrageous and intolerable.” See Harris, 624 S.E.2d at 33. The most severe episodes that
Ekemezie identifies were two purported instances of Gravley shouting, only one of which was
clearly directed at her. See 2d Am. Compl. ¶¶ 42, 189; Ekemezie Decl. ¶ 14. But under the
relevant legal standard, workplace disputes—even those that involve shouting—“do not rise to
the level of outrageousness required” for an IIED claim. Simmons v. Norfolk & W. Ry. Co., 734
F. Supp. 230, 232 (W.D. Va. 1990) (quoting Restatement (Second) of Torts § 46 comment d).
CVS is thus entitled to summary judgment on Ekemezie’s IIED claim—Count IV.
Conclusion
For all of the above reasons, the Court will grant CVS’s Motion for Summary Judgment,
ECF No. 55. A separate order will issue.
/s/ Timothy J. Kelly
TIMOTHY J. KELLY
United States District Judge
Date: July 21, 2020
14
| {
"pile_set_name": "FreeLaw"
} | 0 |
Perioperative Heparin Bridging in Atrial Fibrillation Patients Requiring Temporary Interruption of Anticoagulation: Evidence from Meta-analysis.
Patients with atrial fibrillation (AF) often require temporary interruption of warfarin for an elective operation or invasive procedure. However, the safety and efficacy of periprocedural bridging anticoagulation with unfractionated heparin (UH) or low-molecular-weight heparin (LMWH) are still unclear. We evaluated the safety of periprocedural heparin bridging in AF patients requiring temporary interruption of oral anticoagulation. We searched the literature for trials that compared heparin bridging with no bridging in AF patients for whom warfarin was temporarily interrupted. The incidence of all-cause mortality, thromboembolism, and major and all bleeding was included, and meta-analysis was performed. A total of 13,808 patients with AF were included in 4 observational studies, 1 randomized trial, and 1 subgroup analysis of a randomized trial. The mean CHADS2 score for the no heparin bridging group was 2.49 and that for the heparin bridging group was 2.34. At 30 days and up to 3 months, when compared to the heparin bridging group, the no bridging group did not have any significant difference in mortality (odds ratio [OR], 1.29; 95% confidence interval [CI], .15-11.52; P = .82) or cerebrovascular accidents (OR, .93; 95% CI, .34-2.51; P = .88), but the no bridging group had significantly less major bleeding (OR, .41; 95% CI, .24-.68; P = .0006). Among AF patients with intermediate CHADS2 scores who are anticoagulated with warfarin and who required temporary interruption of warfarin for an elective surgery or procedure, periprocedural bridging with UH or LMWH was associated with a higher rate of major bleeding with no significant difference in mortality or CVA. | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
Wow sex photo alliences sex to bloodelf
Like this bizarre erotic pictures:
According to a witness who knew Helgoth well, Helgoth had a mean, sadistic streak, enjoying shooting cats and killing kittens with monsters inc boo porn his bare hands. Such animal cruelty wow sex photo alliences sex to bloodelf is typical of someone with antisocial personality disorder. The man simply had no empathy and enjoying causing others.
Wow sex photo alliences sex to bloodelf images
Tracey Sweet tells us that she will starting her freshman semester in college this fall. In the mean time, she is having fun in front of the camera and getting paid for it too. Aria Aspen Subscribe View Trailer To put it simply, Aria Aspen.
All models were at least 18 years old when they were photographed. We have a zero-tolerance policy against illegal pornography.
All content on this site provided by 3rd parties. We take no responsibility for "Wow sex photo alliences sex to bloodelf fucked movie" and any content on this website. | {
"pile_set_name": "Pile-CC"
} | 0.01088 |
FDG-PET/CT in Infectious and Inflammatory Diseases.
Nuclear medicine techniques have been an integral part of infection and inflammation imaging for decades; in recent years, fluorodeoxyglucose-positron emission tomography/computed tomography (FDG-PET/CT) has taken over many indications. This review provides a comprehensive overview of the current and potential applications for FDG-PET/CT in infectious and inflammatory diseases (ie, systemic infections, bone infections, vascular infection and inflammation, thoracic and abdominal inflammation) and potential novel applications in both infection and inflammation. | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
/**
* @license
* Copyright Google Inc. All Rights Reserved.
*
* Use of this source code is governed by an MIT-style license that can be
* found in the LICENSE file at https://angular.io/license
*/
import { COMMON_DIRECTIVES, COMMON_PIPES } from '@angular/common';
import { COMPILER_PROVIDERS, CompilerConfig, XHR } from '@angular/compiler';
import { ApplicationRef, PLATFORM_DIRECTIVES, PLATFORM_PIPES, ReflectiveInjector, coreLoadAndBootstrap } from '@angular/core';
import { BROWSER_APP_PROVIDERS, WORKER_APP_APPLICATION_PROVIDERS, WORKER_SCRIPT, WORKER_UI_APPLICATION_PROVIDERS, browserPlatform, workerAppPlatform, workerUiPlatform } from '@angular/platform-browser';
import { ReflectionCapabilities, reflector } from './core_private';
import { PromiseWrapper } from './src/facade/async';
import { isPresent } from './src/facade/lang';
import { CachedXHR } from './src/xhr/xhr_cache';
import { XHRImpl } from './src/xhr/xhr_impl';
/**
* @experimental
*/
export const BROWSER_APP_COMPILER_PROVIDERS = [
COMPILER_PROVIDERS, {
provide: CompilerConfig,
useFactory: (platformDirectives, platformPipes) => {
return new CompilerConfig({ platformDirectives, platformPipes });
},
deps: [PLATFORM_DIRECTIVES, PLATFORM_PIPES]
},
{ provide: XHR, useClass: XHRImpl },
{ provide: PLATFORM_DIRECTIVES, useValue: COMMON_DIRECTIVES, multi: true },
{ provide: PLATFORM_PIPES, useValue: COMMON_PIPES, multi: true }
];
/**
* @experimental
*/
export const CACHED_TEMPLATE_PROVIDER = [{ provide: XHR, useClass: CachedXHR }];
/**
* Bootstrapping for Angular applications.
*
* You instantiate an Angular application by explicitly specifying a component to use
* as the root component for your application via the `bootstrap()` method.
*
* ## Simple Example
*
* Assuming this `index.html`:
*
* ```html
* <html>
* <!-- load Angular script tags here. -->
* <body>
* <my-app>loading...</my-app>
* </body>
* </html>
* ```
*
* An application is bootstrapped inside an existing browser DOM, typically `index.html`.
* Unlike Angular 1, Angular 2 does not compile/process providers in `index.html`. This is
* mainly for security reasons, as well as architectural changes in Angular 2. This means
* that `index.html` can safely be processed using server-side technologies such as
* providers. Bindings can thus use double-curly `{{ syntax }}` without collision from
* Angular 2 component double-curly `{{ syntax }}`.
*
* We can use this script code:
*
* {@example core/ts/bootstrap/bootstrap.ts region='bootstrap'}
*
* When the app developer invokes `bootstrap()` with the root component `MyApp` as its
* argument, Angular performs the following tasks:
*
* 1. It uses the component's `selector` property to locate the DOM element which needs
* to be upgraded into the angular component.
* 2. It creates a new child injector (from the platform injector). Optionally, you can
* also override the injector configuration for an app by invoking `bootstrap` with the
* `componentInjectableBindings` argument.
* 3. It creates a new `Zone` and connects it to the angular application's change detection
* domain instance.
* 4. It creates an emulated or shadow DOM on the selected component's host element and loads the
* template into it.
* 5. It instantiates the specified component.
* 6. Finally, Angular performs change detection to apply the initial data providers for the
* application.
*
*
* ## Bootstrapping Multiple Applications
*
* When working within a browser window, there are many singleton resources: cookies, title,
* location, and others. Angular services that represent these resources must likewise be
* shared across all Angular applications that occupy the same browser window. For this
* reason, Angular creates exactly one global platform object which stores all shared
* services, and each angular application injector has the platform injector as its parent.
*
* Each application has its own private injector as well. When there are multiple
* applications on a page, Angular treats each application injector's services as private
* to that application.
*
* ## API
*
* - `appComponentType`: The root component which should act as the application. This is
* a reference to a `Type` which is annotated with `@Component(...)`.
* - `customProviders`: An additional set of providers that can be added to the
* app injector to override default injection behavior.
*
* Returns a `Promise` of {@link ComponentRef}.
*
* @experimental This api cannot be used with the offline compiler and thus is still subject to
* change.
*/
export function bootstrap(appComponentType, customProviders) {
reflector.reflectionCapabilities = new ReflectionCapabilities();
let providers = [
BROWSER_APP_PROVIDERS, BROWSER_APP_COMPILER_PROVIDERS,
isPresent(customProviders) ? customProviders : []
];
var appInjector = ReflectiveInjector.resolveAndCreate(providers, browserPlatform().injector);
return coreLoadAndBootstrap(appComponentType, appInjector);
}
/**
* @experimental
*/
export function bootstrapWorkerUi(workerScriptUri, customProviders) {
var app = ReflectiveInjector.resolveAndCreate([
WORKER_UI_APPLICATION_PROVIDERS, BROWSER_APP_COMPILER_PROVIDERS,
{ provide: WORKER_SCRIPT, useValue: workerScriptUri },
isPresent(customProviders) ? customProviders : []
], workerUiPlatform().injector);
// Return a promise so that we keep the same semantics as Dart,
// and we might want to wait for the app side to come up
// in the future...
return PromiseWrapper.resolve(app.get(ApplicationRef));
}
/**
* @experimental
*/
const WORKER_APP_COMPILER_PROVIDERS = [
COMPILER_PROVIDERS, {
provide: CompilerConfig,
useFactory: (platformDirectives, platformPipes) => {
return new CompilerConfig({ platformDirectives, platformPipes });
},
deps: [PLATFORM_DIRECTIVES, PLATFORM_PIPES]
},
{ provide: XHR, useClass: XHRImpl },
{ provide: PLATFORM_DIRECTIVES, useValue: COMMON_DIRECTIVES, multi: true },
{ provide: PLATFORM_PIPES, useValue: COMMON_PIPES, multi: true }
];
/**
* @experimental
*/
export function bootstrapWorkerApp(appComponentType, customProviders) {
var appInjector = ReflectiveInjector.resolveAndCreate([
WORKER_APP_APPLICATION_PROVIDERS, WORKER_APP_COMPILER_PROVIDERS,
isPresent(customProviders) ? customProviders : []
], workerAppPlatform().injector);
return coreLoadAndBootstrap(appComponentType, appInjector);
}
//# sourceMappingURL=index.js.map | {
"pile_set_name": "Github"
} | 0 |
The price of Bitcoin dropped 7% on Tuesday 31 July — and a large margin trade on Hong Kong’s OKEx cryptocurrency exchange went so badly that the trader not only blew their margin, they lost more money on the trade than they had put up as collateral.
Margin trading
Margin trading is when you borrow to multiply the effect of your trading — so rather than just having $100 to trade with, you can borrow and trade with $200, using the $100 as collateral. If your trade pays off, you’ve done really well!
If your trade doesn’t pay off — or even if the price dips enough that it looks like it won’t pay off — the lender forces you to liquidate the whole position and pay them back immediately, and you lose your collateral.
Crypto prices are ridiculously volatile. Volatility attracts traders, but anyone who trades cryptos on margin is exceedingly foolish — you’ll get margin-called remarkably often.
But margin trading on cryptos is incredibly popular — because too often, there’s only a fine line between “crypto trader” and “gambling addict.”
How OKEx futures work
OKEx offers its own futures contracts on the price of Bitcoin. These are in units of USD$100, but are settled by delivery of the bitcoins to the trader’s OKEx account. The contracts run weekly, closing 16:00 Hong Kong local time (HKT) every Friday. Margin is 10× or 20×.
(These are completely unrelated to the CME or CBOE Bitcoin futures — which are run in a much more orderly fashion, with maximum leverage around 2×.)
At settlement time, the losers supply the profits of the winners. If the losers don’t have enough funds, someone gets short-changed.
When a trader’s margin gets called, the exchange submits a market order at the price they blew their margin at. If that order isn’t filled before the futures contract expires … the exchange takes a loss.
Fortunately, OKEx has a mechanism to deal with that — they have an “insurance fund,” supported by “the premiums after forced liquidations,” and contributions directly from OKEx’s own funds.
If that’s not sufficient — they take the money from traders whose trades didn’t go bad! They call this “societal loss”:
OKEX Futures uses a “full account clawback” system to calculate the clawback rate. The system’s margin call losses from all three contracts will merged and clawbacks will be calculated according to each user’s entire account profit, instead of calculating each contract’s margin call loss and clawback separately. Only users that have a net profit across all three contracts for that week will be subject to clawbacks. Clawbacks will only occur if the insurance fund does not have enough funds to cover the system’s total margin call losses.
This is an unusual system, not found outside crypto trading. OKEx requires customers to pass a test on their terms of service before they can trade futures.
This socialisation of losses allows the exchange to offer ridiculous levels of margin at little risk to themselves — which attracts more traders and trades, and thus more trading fees.
Timeline of events
Per OKEx’s incident report (archive), an unknown trader placed a huge order of USD$416,851,500 — that’s nearly half a billion dollars — at 02:00 HKT, 31 July (18:00 UTC, 30 July). This was a “long” position, meaning they bet the price would go up.
OKEx’s risk management alerting system flagged the order, due to its size — but didn’t automatically block it. Instead, their risk management team contacted the client, asking them “several times” to reduce the size of the position.
The customer refused, so their account was frozen to prevent further increases — but the position was not removed.
The Bitcoin price went down over the course of the day, from approximately $8020 to $7750. OKEx forced the liquidation of the position at 20:17:14 HKT (12:17:14 UTC) on 31 July.
Socialising the losses
The spectacle of the rich guy getting wrecked caused gales of schadenfreude-filled laughter from their fellow traders.
Unfortunately, the trade had gone badly enough that the trader’s losses were greater than their collateral. The unfilled long liquidation resulted in an open loss of about 950 BTC.
The “societal loss” clawback mechanism has been triggered previously — but this seems to be OKEx’s biggest clawback yet.
The massive unfilled Long liquidation of $415 Million has an open loss of -950 BTC that will hurt profitable BTCUSD contract traders of all maturities on @OKEx_ Futures Social loss clawback may end up being biggest in the history of @OKCoin , will @starokcoin intervene? pic.twitter.com/6tnmmSA0vB — Whalepool (@whalepool) July 31, 2018
The insurance fund had only 10 BTC — about $80,000 — in it at the time. OKEx quickly put in another 2500 BTC — about $18 million — themselves. This still led to a haircut of $9 million, taking 18% of the profits of the successful traders in that week’s futures contracts.
The traders are, understandably, screaming. Here’s a tweet (archive) (warning: contains salty language) from “ibankbitcoins,” with a screen shot, and here’s their Reddit comment thread.
Obvious questions and comparisons
There are a number of obvious questions:
How did an order this size go through?
OKEx’s terms of service for futures trading note that they can freeze accounts and liquidate positions as needed. Why didn’t they?
What customer is so important to OKEx that they’ll risk them breaking the system before they act?
It’s worth noting that we don’t know anything about this customer. We don’t have evidence they … exist. I mean, they probably do! I don’t really think OKEx is defrauding people in this manner. We just have no evidence that this isn’t OKEx applying a haircut to their customers. That’s what “unregulated” means.
More than a few have been struck by the similarity to what Bitfinex did after they were hacked in August 2016, as I detail in chapter 8 of the book:
Usually a theft of this magnitude heralds an exchange disappearing or shutting up shop with apologies, or local regulators noticing its existence and swooping in. Bitfinex considered going into bankruptcy, which might leave customers waiting years for a payout. But as the supplier of gambling trading facilities not available elsewhere, Bitfinex felt there was sufficient demand for their services that a drastic action would be considered acceptable to their users: rather than have some customers take a 100% loss, they assessed a 36% “haircut” on all customer deposits — including non-Bitcoin deposits. Depositors whose coins had been hacked would be compensated with money from depositors who hadn’t: “we are leaning towards a socialized loss scenario among bitcoin balances and active loans to BTCUSD positions.” The company would then try to trade its way out. You might think that compensating your customers using money from other customers, while the owners don’t take a hit, would be against the rules in any reasonable financial system. Particularly as bankruptcies usually pay depositors and creditors first and equity holders last. But welcome to Bitcoin.
The consequences for the future: nothing
There won’t be significant consequences going forward.
OKEx say they’ve learnt valuable lessons from this, and are working to make the clawback mechanism kick in less often — they’d prefer their customers to be happy with them.
But the bottom line, from OKEx Head of Operations Andy Cheung, is:
Cheung also admits that there has not been too much fallout from their clawback mechanism, nor damage to the futures trading sentiment.
Nothing will stop a trader — or *psst* gambling addict — in search of volatility. And nothing will stop their suppliers.
OKEx type occurrences set the entire industry back/make us look like amateurs. Quite frankly the vast majority are. Creating margin out of thin air/operating like a CRB only facilitates market manipulation and gives regulators a stronghold to be overly cautious/restrictive. Sad! — Pull the Wire (@WashedUpTrader) August 3, 2018
cry is short for crypto — Buttcoin (@ButtCoin) August 9, 2018
Thanks to Amy Castor for prodding me to finish this one, and top-quality editing suggestions. | {
"pile_set_name": "OpenWebText2"
} | 0 |
We all love to watch sexy girls getting themselves off don’t we? Well it’s even better in glorious 4k ultra high definition. Watch as our very wet slut plays with her pussy through her panties. She pulls them to one side to reach her 4k wet pussy. She teases her slit and plays with her clit. Hear her moaning so sexy as she slips her fingers into her slick groove. I love this video, see how long you can last when you watch it. | {
"pile_set_name": "OpenWebText2"
} | 0.016317 |
I'll have you know that my bong just broke And only screamed "fuck" for 35 minutes.
148 shares | {
"pile_set_name": "OpenWebText2"
} | 0.010526 |
Peninsula Symphony
The Peninsula Symphony is an American symphony orchestra, based in the San Francisco Peninsula, California. The orchestra consists of over 90 community musicians. In 1995, the Peninsula Symphony was featured in a PBS broadcast.
Since its beginning, the symphony has performed four pairs of concerts in October, January, March, and May. It also performs two free concerts each year, an outdoor summer concert, and a spring family concert. The symphony also hosts competitions, presents awards for young artists, and organizes outreach programs in local schools, known as Bridges to Music. A special Bridges to Music program for children with disabilities was started in 2016 by Board member and principal second violinist Deborah Passanisi. Each school year, the program culminates in a concert for teachers and parents, with the young performers singing and accompanied by a guitarist.
Mitchell Sardou Klein has been Music Director and Conductor of the Peninsula Symphony since 1985, and also directs the Peninsula Youth Orchestra. Assistant Conductor is a rotating position, held by Hoh Chen as of the 70th season.
Mission and history
Mission Statement:
The mission of the Peninsula Symphony is to enrich the lives of people in our community with inspiring, innovative, high-quality musical presentations at affordable prices, and to promote music education through engaging programs for children and adults.
History:
The Peninsula Symphony was founded by Russian-born violinist/conductor Aaron Sten. In 1949, Aaron Sten became conductor of a small Redwood City group of musicians that he met while buying a house. Shortly after, a group of about 32 San Mateo musicians under the name The Peninsula Symphony disbanded and joined Aaron Sten's group. The resulting group of about 60 musicians formed an orchestra under the name Sequoia Symphony Orchestra and performed their first season. By the end of the second season, the name had changed to the Peninsula Symphony and in 1951, the non-profit Peninsula Symphony Association was incorporated. In that very first year, many features were established which were to become trademarks of the Peninsula Symphony: four concerts in October, January, March, and May; a balanced musical program featuring first-class guest artists; an attractive concert program with informative notes; and strong support from the community. In 1951, under Vincent Guida, symphony clarinetist and business manager, the organization was incorporated as a non-profit association, and a formal board was chosen.
In 1952, Aaron Sten also founded the California Youth Symphony, and began the tradition of incorporating outstanding young musicians into Peninsula Symphony performances. In 1956, Board President Robert L. Clark was the driving force behind the creation of the Peninsula Symphony Auxiliary, a women's volunteer group, which was instrumental to the development of an audience base. With no office or Executive Director yet, volunteers played a crucial role in symphony operations. In 1985, the symphony opened an office with executive director to manage its growth
.
By 1985, the time had come to open an office in San Mateo and hire a paid Executive Director. Coincidentally, this was also the last year of founding conductor Aaron Sten’s leadership.
With the arrival of current conductor Mitchell Sardou Klein, the Peninsula Symphony grew from a grassroots ensemble to a polished 90-plus member orchestra of well-trained community musicians. Following Sten’s tradition of nurturing young musicians, the Peninsula Youth Orchestra was established in the spring of 1997, with Mitchell Sardou Klein serving as the Music Director. The business office moved to Los Altos in 2001.
Music directors
Mitchell Sardou Klein (1985–present), is the Music Director and Conductor of the Peninsula Symphony and founding Music Director of the Peninsula Youth Orchestra (PYO). He regularly guest conducts orchestras in California, throughout the United States, and in Europe.
He made his debut with Symphony Silicon Valley in two sold-out performances in 2012, praised by the San José Mercury News as a “gorgeous performance; big, enveloping and wonderfully luxuriant.” His other appearances as a guest conductor in California include the San José Symphony, Santa Rosa Symphony, the Inland Empire/Riverside Philharmonic, Ballet San Jose, the California Riverside Ballet and the Livermore-Amador Philharmonic. Concerts elsewhere have included his return to Europe to guest conduct the New Polish Philharmonic and the Suddettic Philharmonic, concert tours of England, France, Spain, Italy, Germany, Austria, Czech Republic, Hungary, Belgium, the Netherlands, Japan, Australia and New Zealand with PYO, numerous return engagements to the San Jose Symphony (the predecessor of Symphony Silicon Valley), and his return to the podium of the Santa Cruz County Symphony. Prior guest conducting appearances have included the Seattle Symphony, New Polish Philharmonic, Suddetic Philharmonic, Richmond Symphony, Eastern Philharmonic, Flagstaff Festival Symphony, Amarillo Symphony, Lexington Philharmonic, South Bend Symphony, and many others. Maestro Klein also has extensive experience in conducting ballet orchestras, including the Kansas City Ballet, Lone Star Ballet, Oakland Ballet, and Westport Ballet, as well as the Theater Ballet of San Francisco and les Ballets Trockadero de Monte Carlo.
Klein directed over a hundred concerts as Associate Conductor of the Kansas City Philharmonic (where he was also Principal Pops Conductor and Principal Conductor of Starlight Theater, the Philharmonic’s summer home), and also served as Music Director of the Santa Cruz County Symphony.
Critics have consistently praised Klein's work. The San José Mercury News described his performance with Symphony Silicon Valley in 2012 as a “gorgeous performance; big, enveloping and wonderfully luxuriant.” The San Mateo County Times described him in 2007 as “Super Conductor: Mitchell Sardou Klein, music director of the Peninsula Symphony, led his musicians through another triumphant concert. The Peninsula Symphony just keeps getting better and better. Great works and great performances by all.” The Polish newspaper Gazeta Wyborcza proclaimed, “The American conductor quickly established a fine rapport with his orchestra. Klein is a musician who has the musical score in his head, rather than his head in the score, which he demonstrated ably. The creative conception and artistic shape which he brings to his work comes from deep inside him.”
Klein is a winner of many prestigious awards, including the 2008 Diamond Award for Best Individual Artist from the Peninsula Arts Council, the Silver Lei Award from the 2009 Honolulu Film Awards (for the World Premiere of Giancarlo Aquilanti’s La Poverta), the 2000 ASCAP Award for Programming of American Music on Foreign Tour, the 2001 Julie Billiart Award from the College of Notre Dame for Outstanding Community Service, a 1996 award for the year’s best television performance program in the Western States (for the one-hour PBS program about him and the Peninsula Symphony, called Music Making: A Joyful Vocation) as well as the Hillbarn Theatre's 1993 BRAVO! Award for his contribution to the Bay Area’s cultural life.
Klein was born in New York City, into a musical family that included members of the Claremont String Quartet and Budapest String Quartet. He began cello studies at age four with his father, Irving Klein, founder of the Claremont String Quartet. His mother, Elaine Hartong Klein, danced with the Metropolitan Opera Ballet.
Since 1984, he has been Director of the Irving M. Klein International String Competition. Held in San Francisco each June, the Competition has become one of the most prominent in the world, featuring prizes totaling over $25,000 USD, attracting applicants from more than twenty nations annually, and launching numerous major international concert careers.
Cited for his “keen judgment, tight orchestral discipline, feeling for tempo, and unerring control,” Klein has conducted many significant world, American, and West Coast premieres, including works by Bohuslav Martinu, Meyer Kupferman, Joan Tower, Hans Kox, George Barati, Benjamin Lees, Giancarlo Aguilanti, Melissa Hui, Rodion Shchedrin, Brian Holmes, Ron Miller, Lee Actor, Jonathan Russell, Alvin Brehm, and Margaret Garwood. He has appeared frequently on national and international broadcasts, including National Public Radio, the Voice of America, the WFMT Fine Arts Network, PBS Television, and KQED television. He lives in Oakland, California with his wife, violist Patricia Whaley. Their daughter, Elizabeth, lives and works in the Bay Area.
Aaron Sten (1949–1985)
Assistant conductors
The Peninsula Symphony maintains an ongoing Assistant Conductor position for up and coming conductors. These conductors are usually responsible for leading one piece per subscription concert, organizing and conducting the annual family concert, and serving as personnel manager for the orchestra.
Hoh Chen (2018–present)
Chad Goodman (2016–2018)
Nathaniel Berman (2012–2016)
Jessica Bejarano (2008-2012)
Geoffrey Gallegos (2003-2007)
Thomas Shoebotham (2001-2003)
Howard Rappaport (1999-2000)
Sara Jobin (1997-1998)
Youth competitions
The symphony also has a tradition of incorporating outstanding young musicians, such as the winners of the Irving M. Klein International String Competition, Marilyn Mindell Piano Competition, and Young Musicians' Competition into its performances. Some notable examples are Cathy Basrak, Frank Huang, Jennifer Koh, and Robert deMaine.
Premieres
The symphony seeks out premieres and commissioned works. For its 50th season (May 1999), the Peninsula Symphony commissioned notable composer Melissa Hui to create Always, a work for taiko, chorus, and orchestra. The symphony has also commissioned Leaving Bai-Di by the Chinese-American composer Gang Situ in March 2008, and Lee Actor's Concerto for Piano and Orchestra in May 2013. In May 2018 the symphony performed the West Coast premiere of Garages of the Valley by Mason Bates.
Guest artists
The Peninsula Symphony has a tradition of bringing guest soloists for concerts. Some notable examples are:
Soyeon Kate Lee, piano
Renee Rapier, mezzo-soprano
Joyce Yang, piano
David Benoit, jazz piano
Conrad Tao, piano
Emi Ferguson, flute
Garrick Ohlsson, piano
Taylor Eigsti, jazz piano
Dayna Stephens, saxophone
John O'Conor, piano
Quartet San Francisco, string quartet
Elizabeth Pitcairn, violin
Jon Nakamatsu, piano
Angel Romero, classical guitar
Larry Adler, harmonica
Chris Brubeck, Dan Brubeck, jazz musicians
Jiebing Chen, erhu
Eroica Trio, piano trio
Grant Johannesen, piano
Jerome Lowenthal, piano
Marni Nixon, soprano
Christopher O'Riley, piano
Richard Woodhams, oboe
Nicanor Zabaleta, harp
Performance venues
Centered in the San Francisco Peninsula, the Peninsula Symphony has performed at several local performance halls. These include the Flint Center, San Mateo Performing Arts Center, Fox Theatre (Redwood City, California), Bing Concert Hall, Spangenberg Theatre, and Stanford Memorial Church.
References
External links
Official site
Category:American orchestras
Category:Musical groups from the San Francisco Bay Area
Category:Musical groups established in 1949
Category:Orchestras based in California
Category:1949 establishments in California | {
"pile_set_name": "Wikipedia (en)"
} | 0 |
Sex Pot
Sex Pot may refer to:
Sex Pot (1975 film), an Italian comedy directed by Giorgio Capitani
Sex Pot (2009 film), a direct to DVD sex comedy produced by The Asylum, and written and directed by Eric Forsberg | {
"pile_set_name": "Wikipedia (en)"
} | 0.023364 |
United States Court of Appeals
FOR THE EIGHTH CIRCUIT
___________
No. 10-2408
___________
United States of America, *
*
Appellee, *
* Appeal from the United States
v. * District Court for the
* District of Nebraska.
Jose Manuel Avalos Banderas, *
also known as Jose Avalos, * [UNPUBLISHED]
also known as Gallo, *
*
Appellant. *
___________
Submitted: March 1, 2011
Filed: March 4, 2011
___________
Before LOKEN, MURPHY, and COLLOTON, Circuit Judges.
___________
PER CURIAM.
Jose Banderas appeals his conviction and the 365 month sentence imposed by
the district court1 after a jury found him guilty of conspiring to distribute and to
possess with intent to distribute at least 500 grams of a mixture or substance
containing methamphetamine, in violation of 21 U.S.C. § 841(a)(1), (b)(1). His
counsel has moved to withdraw, and has filed a brief under Anders v. California, 386
1
The Honorable Richard G. Kopf, United States District Judge for the District
of Nebraska.
U.S. 738 (1967), and Banderas has filed a pro se supplemental brief. Banderas argues
that (1) counsel was ineffective; (2) he was convicted, and his sentence was enhanced
for obstruction of justice, under a preponderance-of-the-evidence standard; (3) his
criminal history score is incorrect; (4) the drug-quantity calculation and obstruction-
of-justice enhancement are erroneous; (5) the court improperly weighed the
sentencing factors; and (6) the evidence is insufficient to support the conviction and
the enhancement.
Banderas’s claim that he was convicted under a preponderance-of-the-evidence
standard is belied by the record, which reflects that the jury was instructed to convict
him only if it found the elements of the offense beyond a reasonable doubt. Further,
the evidence at trial, which we must view in the light most favorable to the verdict,
was sufficient to convict Banderas of the charged offense. See United States v.
Hoover, 543 F.3d 448, 452 (8th Cir. 2008) (standard of review).
Reviewing the sentence for abuse of discretion, we first ensure that the district
court committed no significant procedural error--such as misapplying the Guidelines,
failing to consider the 18 U.S.C. § 3553(a) factors, or failing to explain the
sentence--and then we consider the substantive reasonableness of the sentence. See
United States v. Feemster, 572 F.3d 455, 461 (8th Cir. 2009) (en banc). After careful
review, we conclude that the court committed no procedural error. See id. (discussing
procedural error). The evidence at the sentencing hearing amply supports the court’s
conclusion that Banderas engaged in conduct warranting the obstruction-of-justice
enhancement when he made threatening statements during his trial to the witnesses
testifying against him, see U.S.S.G. § 3C1.1 & comment. (n.4(A)); United States v.
Molina, 172 F.3d 1048, 1058 (8th Cir. 1999) (standard of review); and the court
properly applied a preponderance-of-the-evidence standard, see United States v.
Whiting, 522 F.3d 845, 850 (8th Cir. 2008) (government bears burden of proving facts
to support obstruction-of-justice enhancement by preponderance of evidence). We
review Banderas’s challenge to his criminal history score for plain error because he
-2-
did not raise the issue below, see United States v. McKay, 431 F.3d 1085, 1095 (8th
Cir. 2005), and we find no error, plain or otherwise, because the district court properly
counted separately two prior sentences for criminal conduct that was separated by an
intervening arrest. See U.S.S.G. § 4A1.2(a)(2) (prior sentences always are counted
separately if they were imposed for offenses that were separated by an intervening
arrest). We decline to review Banderas’s drug-quantity challenge because he
withdrew his drug-quantity objection at sentencing. See United States v. Thompson,
289 F.3d 524, 526-27 (8th Cir. 2002). We also find nothing indicating that the court
improperly weighed any sentencing factor, and we conclude that the sentence is not
substantively unreasonable. See United States v. Johnston, 533 F.3d 972, 978-79 (8th
Cir. 2008) (sentence at high end of range not unreasonable where nothing indicated
court based it on improper or irrelevant factor, failed to consider relevant factor, or
made clear error of judgment).
Finally, we decline to consider in this direct appeal Banderas’s claim that
counsel was ineffective, see United States v. Bauer, 626 F.3d 1004, 1009 (8th Cir.
2010), and having reviewed the record independently under Penson v. Ohio, 488 U.S.
75, 80 (1988), we have found no nonfrivolous issues for appeal. Accordingly, we
affirm the district court’s judgment, and we grant counsel’s motion to withdraw,
subject to counsel informing Banderas about procedures for seeking rehearing or
filing a petition for certiorari.
______________________________
-3-
| {
"pile_set_name": "FreeLaw"
} | 0 |
- dealer serviced
- in good working condition,
- is placed in the yard by official liebherr dealer
- the service history overview is available!!!
for more information please contact to the seller vasil shulga +31... | {
"pile_set_name": "Pile-CC"
} | 0 |
Lucy pinder nude fake
Nude and naked girls
Big breasted Italian cutie gets her big booty smashed hard.
Busty breast massage with Lucie Wilde. Hanging tits videos. She is so hot and so sexy Shortly after she first broke into the scene in lateshe went up from her originally stated 34FF to 32G. Big breasted babe seduces her man and rides in POV. Lucy pinder nude fake. She is in a class all by herself! Babe with big natural breast looking for some Faapy love. Big breasted brunette riding and fucking doggy style.
Pinder has also appeared in several short DVDs such as the 40 minute long section with Michelle Marsh for Loadedand appeared on the Nuts TV Channel, presenting a short nightly slot called "Book at Bedtime", based on a long-running BBC Radio 4 programme, where she read a passage from a well-known novel.
Pippy Longstocking aka Lucie Cline sucks a big cock. She have best fckng look eyes Posted by kinderjaje Lucy Pinder Report Only Tease: Lucy Pinder and Rhian Sugden are bringing their beautiful tits to the US, but before they can knock us all dead they need to clean up. Big breasted girl sucks and rides her dildo.
Lucy Pinder is just that. Big breasted Kitana Lure getting her rectum pounded. Posted by brunomprata16 Lucy Pinder Photo Gallery. Fat sexy girls having sex. Three hot chicks and backstage photoshoot. Lucy Katherine Pinder Born: Lucy Pinder is just some what famous but she is so hot that I will say she should be really famous! We have no control over the content of these pages. Backroom casting couch cum in pussy Big breast Russian girl gets a. Step dad Juan works on Lucy Dolls body parts.
Miss nude pics
Lucy Pinder in white tennis outfit teasing you by covering her breasts.
Retrieved from " http: It has been confirmed that she has re-signed with The Daily Star and also signed a 6 month exclusive topless contract with Nuts.
She appeared at 35th place in the poll. Nerdy naked chicks. We take no responsibility for the content on any website which we link to, please use your own discretion while surfing the links. She lists some of her dislikes as clowns especially Pennywise from Itwasps and racism. See Boobpedia's copyright notice.
Lucy Pinder September 16 They always look fabulous in it and it carries an innocence that I find infinitely desirable. Big Natural Breasts Bouncing. Big titted Alice in Wonderland can't stop talking at photoshooting fuck. Although Pinder has never made an official statement, she appears to have retired from topless modelling. She is regularly partnered with Michelle Marshwith whom she has appeared in magazines, television and corporate appearances.
Additionally she has been photographed with a variety of naturally voluptuous glamour modelsincluding Sophie HowardJana DefiLindsey Strutt and Saskia Howard-Clarke. That means a nice hot bath and the only thing better than watching the two of them in a tub is adding a third girl into the mix.
Antje traue sex photos Xxx young for old gays Kendra holly photoshoot naked Arab man shemale Busty slut gf pics Wife videos having sex with husband Fake cleb photos tgp Nude male adult sites Jpeg anime shemale porn. She is certainly massively popular among the Nuts readership, not least in the issue in which she made her fully topless debut back in April Sexy Lucy with big natural breasts masturbates.
Posted by Alexandrix73 Leave a comment Commenting is disabled for non-registered users.
Nude image sexy
If she is actually a hooker then I need to start saving my money now because I am fucking this broad for sure. Ww big tits. Lucy Pinder shows big nude boobs. Big breasted hottie Nicole Aniston rides it reverse cowgirl. Lucy Pinder sexy wallpapers. Additionally she has been photographed with a variety of naturally voluptuous glamour modelsincluding Sophie HowardJana DefiLindsey Strutt and Saskia Howard-Clarke. Posted by bestfapping Lucy Katherine Pinder born 20 December is an English model and actress.
Posted by kulu Pinder's bust was found to have increased back from 32E to 32F. Lucy pinder nude fake. She is certainly massively popular among the Nuts readership, not least in the issue in which she made her fully topless debut back in April She's an advice columnist, penning her own The Truth About Women column in Nuts magazine every week, a TV presenter on Nuts TVand she has even appeared on The Weakest Linkwhere the other opponents voted her off for being too clever.
Juicy Lucy spends nude time with her companion. Posted by lonsty She is also a lifelong Southampton Football Club supporter.
I've only seen a handful of episodes, but I really enjoy it. If they copulate they will not be paid. I mean, I imagine no one is particularly horny once you've gone a few weeks without food or a shower, but what about on the first night or whatever? Basically, I'm just curious if any of the contestants have ever hooked up. VR Sarah Kay gets naked and fucked in the shower. Doris Ivy is afraid that she can't swallow such a big cock.
Adblock users get a week free. Slender teen brunette Shira gets naked and wet. Because at the end of the day and I got this from an old Real World castmember - you said and did all those things. Ivana Sugar gets naked and fingers twat. CyberSlut Teen Chatting Naked. | {
"pile_set_name": "Pile-CC"
} | 0.00874 |
When I saw this new release from Southern Strokes, I felt my cock twitch and then once I started watching the amateur twink video, I had to pull my cock out and rub one out. This new release from our friends at Southern Strokes features Ryan and Miles. Ryan is gay, however Miles is straight. They both agreed to come up to the Texas ranch and do a fuck video to earn a little extra cash. The two twinks undress until they are only wearing their jockstraps. Miles is so fucking hot and has a huge Texas Cock! Everything truly is bigger in Texas including those twinks with massive cut cocks! Ryan starts the scene by getting on his knees and giving his straight Texas buddy a nice sloppy blowjob. I think Ryan was even impressed with that huge 8″ Texas cock he was gagging down his throat. After the cock sucking, Miles starts fucking Ryan in the ass. Miles fucks like the straight guy he is. He just slams his cock in and starts fucking hard. They keep on fucking until both of them are shooting hot loads of cum out of those big Texas cocks! Holy Shit! Don't miss this one. Click here to download the full length amateur twink Texas cock video and hundreds more amateur gay porn videos at Southern Strokes.
Click here to download the full length amateur twink Texas cock video and hundreds more amateur gay porn videos at Southern Strokes.
Click here to download the full length amateur twink Texas cock video and hundreds more amateur gay porn videos at Southern Strokes. | {
"pile_set_name": "OpenWebText2"
} | 0.018293 |
Getting Networking Out of the Activity Life Cycle - mattlogan1
http://mattlogan.me/options-for-an-asynchronous-rest-client-android-app
======
Zigurd
Other than "clunky" I wonder why the author advocates using the Application
object for networking. A Service can have a remote API, and that's useful
where you are mixing RESTful APIs, which would probably use a ContentProvider
interface on a device with a command API. You also have the choice to share
these interfaces with other apps.
| {
"pile_set_name": "HackerNews"
} | 0 |
Thanks to AirTNA, big tit MILFs all over the world can travel and take in some serious sights and much more! Busty blonde bombshell Danielle Derek rea lly gets around and today she needs a place to rest her weary head. You're more than happy to provide a place to crash and all the amenities she needs and Danielle is eager to show her appreciation. After handling a load of laundry, she bends over to take your load deep in her ass! Skip the chocolate on her pillow and earn your five star rating with jizz up her butt! | {
"pile_set_name": "OpenWebText2"
} | 0.009615 |
Revenge is a Bitch brings you Beaten, Fucked & Humiliated!
Miss Kitty is an alt girl with pierced everything! She has tattoos for days and has such a pretty smile. She isn't going to get fucked today, but is going to do the fucking! She has a willing lover that loves to be dominated! Watch Kitty fuck his tight asshole! | {
"pile_set_name": "Pile-CC"
} | 0.012461 |
Dirty Sex Secrets
I’m not ashamed to share my dark little secrets. You see I am such a hungry little PHONE SEX COCK WHORE all I want to do all day is find as many men as I can to fuck. Sex is literally on my mind 24 hours a day. I went to a doctor once and he said I was a sex addict. I believe he is right. I mean what other explaintion do I have for literally staring at the crotch of every man the walks into my eyesight. I stare and immediately get wet and think of all the nasty things I want to do to that cock inside those pants. It doesn’t even matter what what he looks like. I know most men think because I am so sexy I won’t fuck an unattractive man . But honestly fat, skinny, tall or short it doesn’t matter to me all I want is that BIG HARD COCK in my mouth, in my throbbing pussy. If you want to be my toy for and let me fuck your brains out don’t be afraid give me a call. | {
"pile_set_name": "Pile-CC"
} | 0.014623 |
The Story: Hey daddy! What do you think of my outfit for my date tonight? You aren’t jealous are you? You should not be! I'm just using him so he can buy sexy lingerie for you to fuck me in. You should know you’re the only guy for me :). | {
"pile_set_name": "Pile-CC"
} | 0.008439 |
Izabelly Marquesine is a VERY small and Petite young thing! Her amazing slim shemale body has an amazingly round ass though! It is delicious! She shows off her cock in some nice bottom up POVs. Enjoy this cute faced shemale girl! Cheers!
Izabelly Marquesine videos | {
"pile_set_name": "OpenWebText2"
} | 0.015094 |
Q:
How to get the ID from a Google+ vanity URL
How to get the ID from a vanity URL, e. g.?
https://plus.google.com/u/0/s/tesla%20roadster
There are many posts about how to get the vanity URL but not the opposite.
A:
The URl you posted is actually a search not a vanity URL. A vanity url looks like this https://plus.google.com/+TeslaMotors.
But to get the ID from a vanity URL, you can make a request to people.get API method with the +Name as the userId. Here is an example request.
| {
"pile_set_name": "StackExchange"
} | 0 |
I asked him to tell me something sexy. He said, "Huh?"
310 shares | {
"pile_set_name": "OpenWebText2"
} | 0.015152 |
Before going to pick up a girl on a date put peanut butter on your dick and she will think her dogs LOVE you
138 shares | {
"pile_set_name": "OpenWebText2"
} | 0.008333 |
Alberto Del Rio Gets over the Best Way Ahead of Royal Rumble
A few months back I wrote a column looking at ways Alberto Del Rio could become relevant and effective again in WWE after his momentum had faded and died.
With hindsight, there was a ludicrous mistake in that article: I never once considered Del Rio as a face. So long had he been a heel, and so poorly backed by the fans was he, that it seemed a nonsense idea.
But WWE went with it, and people raised eyebrows and turned their noses up. I think they had a right to as well, for WWE has a history of imposing face turns on us like history has no relevance and as if the fans can just like someone because they say so.
However, the turn of Del Rio has so far been quite perfectly planned.
Even as WWE.com let us all know that Del Rio had beaten Big Show for the World Heavyweight Championship, it seemed an odd choice having seen Sheamus fall to Big Show and Del Rio beaten easily in his feud with the Irishman.
How can Del Rio beat a man with such complete physical dominance over him? What can ADR do that Sheamus before him could not?
The match could very well be the free TV match of the year come December again, and was the perfect way to get the Mexican over with the fans. He already had a good Latino following, but the way to convince the doubters was not with flimsy stories, but with action.
As long as I have watched wrestling the fans have always respected the men who put on great matches.
B/R Photo
Main eventing a show that The Rock took center stage on also gave Del Rio the crowd in a fervent mood. All the ingredients were there to get everyone in the arena behind Del Rio, if only he could perform.
And his match with Big Show on Smackdown was a fantastic match.
A Last Man Standing match against the giant is quite the prospect and WWE booked it well. Show had his physical dominance, Del Rio took an absolute battering. But he fought valiantly, and showed the recovery skills all the best faces always do.
Even his escape from the WMD Punch was well booked. Rolling out of the ring onto his feet, rather than actually making it to stand. Little touches the fans notice and appreciate.
And then the finish was wonderful. Big Show downed on the attack, pounced upon with a weapon and knocked to the ground. But ADR had recovered from worse, so why should this stop the Big Show?
Del Rio had this covered as he slowly, but surely, tipped the announce table on top of the giant and saw the referee count to 10.
The crowd was electric, and most importantly they were behind him.
The match was a fantastic watch too, and much credit again should be given to the Big Show as he performed brilliantly once more.
Now we have to see where WWE will go with Del Rio. He is certainly getting over now, but a defeat too soon could crush all his momentum.
And the 20th anniversary episode of Raw seems a perfect stage for Dolph Ziggler to use that briefcase.
WWE has put real energy back into the World Heavyweight scene, and long may it continue. | {
"pile_set_name": "Pile-CC"
} | 0 |
Join today and see all of our videos!
When a gorgeous woman is looking for her lost dog, you have to help. Diamond the Cuban beauty could not find her dog so we drove her around. Ian insisted that she came over where we called and found her dog at a local shelter. Her reward was a strip tease that led to her mouth and pussy getting stuffed by Ian. Her big tits and ass had me drooling with her techniques that would make any man cum instantly... Enjoy. | {
"pile_set_name": "Pile-CC"
} | 0.008791 |
Q:
How to remove last row in each group if it is larger in value than the previous row?
How would one go about removing the last row by group by column if it has a larger value than its previous column value?
Example:
Dataframe:
Column 1 Column 2
Dog 5
Dog 6
Dog 5
Cat 3
Cat 5
Cat 4
Cat 7
Mule 2
Mule 4
Mule 6
Mule 8
Mouse 4
Mouse 6
Mouse 9
I would like it to appear as:
Dataframe:
Column 1 Column 2
Dog 5
Dog 6
Dog 5
Cat 3
Cat 5
Cat 4
Mule 2
Mule 4
Mule 6
Mouse 4
Mouse 6
Only the group dog would remain the same in this situation as the last row value in column 2 for that group is smaller than its previous row.
A:
One way with slice can be :
library(dplyr)
df %>%
group_by(Column1) %>%
slice(if(last(Column2) > nth(Column2, n() - 1))
seq_len(n() - 1) else seq_len(n()))
# Column1 Column2
# <fct> <int>
# 1 Cat 3
# 2 Cat 5
# 3 Cat 4
# 4 Dog 5
# 5 Dog 6
# 6 Dog 5
# 7 Mouse 4
# 8 Mouse 6
# 9 Mule 2
#10 Mule 4
#11 Mule 6
| {
"pile_set_name": "StackExchange"
} | 0 |
caramelcoloredcutie doesn't have any Goodies to view right now.
Hello all! My name is Simone and I am a 23 year old beauty pageant queen gone bad! To be in those stupid things, you have to be a good girl...and I just couldn't do it! I couldn't go without having my tight little pussy fucked all the time, and I surely couldn't go without giving blow jobs to men! That's my favorite! I love it when a guy cums all over my face and then I always lick it off of my fingers!! Or would you rather fuck my pretty little asshole? You would never believe the reaction I get when I deep throat a dick so far he can feel his dick in my throat. Outrageous! I love it when a man shoves his fat cock up my ass! I like going to bars while I'm wearing my tight red leather miniskirt (with no panties, of course) and flashing my pussy to guys ;) And then I like to take them out into the parking lot to suck them off. I am addicted to cock and I just can't get enough of it! I'm also addicted to pussy too, and I LOVE having threesomes with my boyfriend (when I have one), and all of my friends and their boyfriends. Group sex is also wonderful! I love having a cock in my pussy and a hot pussy sitting on my face! My hand is always in my panties...I just can't help myself! I wanna be your little fuck toy. I like fucking my pussy with a big dildo while you watch. Do you wanna fuck my tight swollen little pussy? Yes, go right ahead and seduce your little girl! Do you want me to dominate you and make you MY little slut? My pussy gets wet just thinking about that! There is absolutely nothing that I won't do to you...I'm the dirtiest little cock slut you'll ever meet!Call me so I can get off.Your caramel colored cutie, SIMONE | {
"pile_set_name": "Pile-CC"
} | 0.015152 |
Arylpyrrole carbonitrile compounds are highly effective insecticidal, acaricidal and nematocidal agents with a unique mode of action and a broad spectrum of activity. In particular, 2-aryl-5-(trifluoromethyl)pyrrole-3-carbonitrile compounds demonstrate effective control across a wide array of pests and can control resistant pests such as pyrethroid-, organophosphate-, cyclodiene-, organochlorine-, organotin-, carbamate-, and benzophenylurea-resistant biotypes of Helicoverpa/Heliothis spp., Spodoptera spp., Trichoplusia spp., Pseudoplusia spp. and Tetranychus spp.. Because there is no apparent cross-resistance, 2-aryl-5-trifluoromethylpyrrole-3-carbonitrile compounds and their derivatives have potential for use in resistance management programs. Further, said pyrroles have little effect on beneficial species making them excellent candidates for integrated pest management programs, as well. These programs are essential in today's crop production.
Therefore, methods to prepare said pyrroles and intermediates to facilitate their manufacture are of great value. Among the methods known to prepare 2-aryl-5-(trifluoromethyl)pyrrole-3-carbonitrile is the 1,3-dipolar cycloaddition of the mesoionic intermediate product of the acid catalyzed cyclization of a Reissert compound with a suitable alkyne to give an N-substituted pyrrole product as described by W. M. McEwen, et al, Journal of Organic Chemistry, 1980, 45, 1301-1308. Similarly, munchnones (which are also zwitterionic intermediates) undergo 1,3-dipolar cycloaddition to give N-substituted pyrroles. In addition, on a manufacturing scale, the 1,3-dipolar cycloaddition of 3-oxazolin-5-one with 2-chloroacrylonitrile is described in U.S. Pat. No. 5,030,735.
It is an object of this invention to provide an alternate source of important intermediate compounds and manufacturing routes to a new class of highly effective pesticidal compounds.
It is a feature of this invention that the process of manufacture provides a regiospecific product.
It is an advantage of this invention that the process of manufacture provides an N-unsubstituted pyrrole (NH-pyrrole) intermediate which is capable of further derivatization of the pyrrole ring nitrogen to give a wide variety of pesticidally active pyrrole products. | {
"pile_set_name": "USPTO Backgrounds"
} | 0 |
A horny Hibiki Ohtsuki is in a horny threesome. She has her ass full of greens and her pussy is fucked with an ear of corn from behind. She offers a blowjob to her man in entrance whereas different males take turns filling her ass and pussy with meals objects | {
"pile_set_name": "OpenWebText2"
} | 0.030888 |
Cobra Club HD
Cobra Club HD is a free photo studio game about body image, privacy, and dick pics.
UPDATE, 11 MAY 2016: Mac OSX users, if it crashes then use "Low Quality" mode or "Windowed" mode. This is a game engine problem out of my control, sorry.
UPDATE, 10 MAY 2016: to celebrate itch.io week, I've released the new high-definition remaster, Cobra Club HD! New features include completely new dick, pubic hair, strap-on support, and hopefully the "disco ball dick" bug is fixed! DOWNLOAD THE NEW VERSION BELOW...
If selfies argue that all faces are worthy of memory, dick pics show how all cocks are worthy of consideration. In the vein of noble projects like
Critique My Dick Pic, we wish to "take back" the dick pic from the clutches of creepy congressmen and tabloid headlines. Popular discourse rightfully centers the consent of dick pic recipients, but government mass surveillance (Can They See My Dick?) also threatens the consent of dick pic senders, as state spy complexes admit they "collect it all" with almost no oversight or transparency.
To help re-imagine what dick pics can do for society, Cobra Club gives everyone, even people without dicks, access to the means of (dick pic) production though a fully-adjustable virtual 3D dick and versatile camera controls. It is both no one's dick and everyone's dick. Perhaps the dick pic is democracy itself... | {
"pile_set_name": "Pile-CC"
} | 0.012337 |
What makes a 13-year-old kill himself?
It was November 2016 in Guangzhou, China, and I found myself asking this question after reading the news from home. Reports were coming in that a kid named Tyrone Unsworth had taken his life in my home state of Queensland. I call him a “kid” for a reason: Tyrone had barely hit his teens. Photographs showed a fair, freckly, curly-haired boy, a sassy moppet who danced and worshipped at the twin altars of Gaga and Beyoncé. Those who knew him told me later that he was the kid doing cartwheels at lunch; the sensitive one who’d tell his teachers, to their faces, that he loved them. For anyone to take their life that young is gutting, but what really got me was how his mother raged that Tyrone had been bullied to death for being gay. The Courier-Mail ran a heart-bruising headline that day: “Mum’s anguish: ‘They ended up getting him.’”
Tyrone’s suicide was front-page news in the state. The story was splashed across the ABC, News Corp’s metro titles and Fairfax’s Brisbane Times. It ran on TV news bulletins across the country and was featured on the ABC’s 7.30 and international outlets in the following weeks. Curiously, though, the story didn’t run in the Australian, the country’s only national broadsheet. In fact, the Australian would never run a single word about Tyrone’s death.
My mind wandered back to the first time I’d set foot in mainland China, half a decade ago, when I’d spent months interviewing young gay women and men in Beijing for a book chapter. There was a lesbian who didn’t even know the word for “gay” until adulthood; a man who’d been overprescribed antidepressants as a teenager to cure him of homosexuality; gay men and women who’d held elaborate sham weddings to fool parents into thinking they were straight. Many told me about the times they’d considered or tried killing themselves. When the book came out, the most common response was pity. Poor China. So backward for queers, especially compared with Australia. Yet here we were.
Another Australian at the Guangzhou conference was the writer Melissa Lucashenko. Like me, Lucashenko is queer and from Queensland; like Tyrone, she’s Indigenous. For queer Indigenous Australians, Tyrone’s suicide was felt even more keenly.
Every push for the protection of queers in Australia has been accompanied by a jeering soundtrack of loathing
That day, Lucashenko and I sought each other out. “Did you read the news?”
“Christ, poor kid.” “Apparently he was gay.” “Thirteen years old, too.”
The unspoken thought hovered between us: imagine wanting to kill yourself at that age.
Thing is, we probably could.
It might seem self-centred and disingenuous, a performance of false intimacy, to grieve for someone you’ve never met. But if you grew up queer in Australia, Tyrone Unsworth’s suicide felt personal. At Tyrone’s age, I attended a school where – as in most Australian schools, I’d venture – being gay was one of the worst things you could be. Some would argue it is the worst. After all, it still has the strange honour of being the only identity ascribed to anything in the schoolyard deemed to be shit.
If you grew up queer in Queensland, your experience was likely tougher still. After New South Wales decriminalised homosexuality in 1984, Queensland dug in its heels the year after and attempted to pass an amendment to the Liquor Act banning bars from serving “perverts” and “deviants.” Earning its reputation as Australia’s “Deep North,” it was the last mainland state to make gay sex legal.
Every push for the protection of queers in Australia has been accompanied by a jeering soundtrack of loathing. For some commentators, howling down queer activists is something of a family tradition. In 1994 columnist Frank Devine wrote in the Australian of Tasmanian efforts to decriminalise gay sex, that “one must deplore the arrogance and meretriciousness of the effort by homosexuals to have [these laws] rescinded”. A generation later, his daughter Miranda would take it up a notch in News Corp metro newspapers, advising marriage equality activists to “take our olive branch and shove it where the sun don’t shine”.
In all of this, kids were assumed to be off-limits. However, by the time Tyrone killed himself, the Australian was in its 10th consecutive month of indefatigable, sustained coverage and criticism of Safe Schools Coalition Australia, a federally funded program launched in 2014 to support lesbian, gay, bisexual, transgender, intersex and queer school students. SSCA was inexpensive – $8m over three years (by contrast, the National School Chaplaincy Program cost $243.8m over four years) – and designed to address long-documented higher rates of abuse, suicide and self-harm. Independent studies consistently show LGBTIQ Australians have the highest rates of suicidality of any demographic in the country. When it was launched, Safe Schools was largely seen as a political no-brainer. This was a time when everyone – on both sides of politics – was seemingly happy to back Safe Schools. These were kids, after all.
That changed in February 2016, when the Australian ran its first front-page story excoriating the Safe Schools program. (Its headline: “Activists push taxpayer-funded gay manual in schools.”) Within hours of the story, Safe Schools was being debated in parliament. Within days, Coalition backbenchers had pledged to destroy it. Within a fortnight, prime minister Malcolm Turnbull requested education minister Simon Birmingham launch a review. After one month, Birmingham confirmed that Safe Schools’ federal funding would not be renewed. That didn’t mean the coverage stopped. As long as Safe Schools continued in any form, so too would stories in News Corp papers.
Like many Australian queers, by November 2016 I was exhausted by the Australian’s coverage of Safe Schools. The suicide of Tyrone – a kid who was likely driven to his death by schoolyard taunts and physical assaults – felt like the last straw. That afternoon in China, in a fog of self-righteous rage, I leapt over China’s firewall and logged on to Twitter, where Australians were already posting about Tyrone. The hot takes had begun. Linking to the Courier-Mail’s story, I added my own:
Tell your kids – no matter how young – that being LGBTIQ is fine, that bullying is torture, and then demand Safe Schools.
I’ll admit it. I felt smug when it was retweeted over 300 times. That’ll show them, I thought. Who I’d shown – and what, exactly – well, clearly, I hadn’t thought that far ahead. In researching this essay, I now see that tweet for what it is: a premature take on something I thought I understood, but actually knew next to nothing about. I’d read a lot about Safe Schools by that stage, mostly in the Australian and its metropolitan sibling titles, but my knowledge of the program had been gleaned from stories I now realise were at best inadequate or misleading, at worst simply false. My tweet, in its own way, was a small drop in a pointless slurry of commentary about Safe Schools, built on shaky foundations, bad faith and half-truths.
Some News Corp journalists would have you believe Safe Schools involved queer activists accessing classrooms and students, without parental consent or knowledge, to teach children about same-sex attraction and transgender people. (Horrifying to some, that actually sounds like something I wish I’d had growing up.) Or maybe you heard Queensland MP George Christensen denounce Safe Schools in the lower house for promoting penis-tucking, chest-binding and gender fluidity to primary school kids, or for handing them tips on where to buy sex toys online. None of these things was true.
Protesters attend the Hands Off Safe Schools rally in Melbourne in March 2016. By the time Tyrone Unsworth killed himself, in November, News Corp publication the Australian was in its 10th consecutive month of criticism of the federally funded anti-bullying program. Photograph: Chris Hopkins/Getty Images
We know certain things about Tyrone Unsworth’s life and death. We know he posted about killing himself on social media. We know he was involved in an argument with other teenagers so violent that they broke his jaw. We know he expressed distress over his sexuality. It’s impossible to know whether Safe Schools could have saved Tyrone Unsworth’s life. It very well could have. But what remains now is an opportunity – and arguably the ethical obligation – to take a breath and move beyond tedious queers-versus-parents, activists- versus-moralists trench warfare. To do this, we might need to acknowledge something uncomfortable: that everyone invested in this discussion wants the same thing: to keep kids safe. The conundrum, of course, is that our interpretations of what constitutes the safety of children differ wildly. While members of the Australian Christian Lobby and the anti same-sex marriage lobby group Australian Marriage Alliance see Safe Schools as an “extreme ideology” designed merely to “make LGBTI children feel ‘comfortable’” (quote marks theirs), Australian queers are impatient for change, seeing one kid’s suicide attempt as one too many.
Can we agree on a baseline, then? In his 2012 book Far from the Tree, American-British author and journalist Andrew Solomon suggests: “It seems right to prioritise each child’s mental health over a system that makes universal predictions about what should constitute happiness or what values are healthy.” Few of us would argue against this. Yet the past two years of debate over Safe Schools have seen reporters elevate the opinions of zealots (one of whom publicly proclaimed transgender children the work of Satan) and selectively defer to medical and education “experts” who have long histories of expressing anti-gay sentiments in their professional work. Subsequently, some of the most vocal backlash has come from extremists on the other side, including queer activists who’ve raided and trashed the office of a senator, and those who argue any journalist working at News Corp has blood on their hands. (For what it’s worth, I happily wrote for News Corp every week for six years.)
In all the posturing and point-scoring, vital context and nuance have been lost. Who has the time to get their head around the complicated intricacies of departmental bureaucracy when there’s an ideological scrap to be won? Why have important voices – non-partisan medical experts, education academics and LGBTIQ youth themselves – been erased? And why, in 2017, are commentators still railing against a queer “agenda” or “ideology” these things would sound anachronistically quaint if they weren’t so nakedly hateful. Given we’re planning to spend $122 million on a non-binding survey on the rights of our citizens that will be delivered via the post, however, it’s fair to say we’re fond of strange anachronisms right now.
QE67 Moral Panic 101 cover
For those of us for whom change feels too fast and too confronting, it’s worth asking ourselves what we’re afraid of. What the hysteria around Safe Schools has shown us is we’ve become so frightened of phantom hypotheticals lately that we’re asking the strangest questions, with little bearing on reality. That has paralysed and distracted us from asking the simplest and most important questions of children: What do you need of us? And how can we help?
This is an edited extract of Benjamin Law’s Quarterly Essay 67, Moral Panic 101: Equality, Acceptance and the Safe Schools Scandal, out now. Law will be discussing the essay with David Marr on 13 September at the Seymour Centre in Sydney.
• Readers seeking support and information about suicide prevention can contact Lifeline on 13 11 14. Suicide Call Back Service 1300 659 467. MensLine Australia 1300 78 99 78. Local Aboriginal Medical Service available from vibe.com.au | {
"pile_set_name": "OpenWebText2"
} | 0.000423 |
Maternal obesity and risk of postpartum hemorrhage.
To estimate whether maternal obesity was associated with an increased risk for postpartum hemorrhage more than 1,000 mL and whether there was an association between maternal obesity and causes of postpartum hemorrhage and mode of delivery. A population-based cohort study including 1,114,071 women with singleton pregnancies who gave birth in Sweden from January 1, 1997 through December 31, 2008, who were divided into six body mass index (BMI) classes. Obese women (class I-III) were compared with normal-weight women concerning the risk for postpartum hemorrhage after suitable adjustments. The use of heparin-like drugs over the BMI strata was analyzed in a subgroup. There was an increased prevalence of postpartum hemorrhage over the study period associated primarily with changes in maternal characteristics. The risk of atonic uterine hemorrhage increased rapidly with increasing BMI. There was a twofold increased risk in obesity class III (1.8%). No association was found between postpartum hemorrhage with retained placenta and maternal obesity. There was an increased risk for postpartum hemorrhage for women with a BMI of 40 or higher (5.2%) after normal delivery (odds ratio [OR] 1.23, 95% confidence interval [CI] 1.04-1.45]) compared with normal-weight women (4.4%) and even more pronounced (13.6%) after instrumental delivery (OR 1.69, 95% CI 1.22-2.34) compared with normal-weight women (8.8%). Maternal obesity was a risk factor for the use of heparin-like drugs (OR 2.86, 95% CI 2.22-3.68). The increased risk for atonic postpartum hemorrhage in the obese group has important clinical implications, such as considering administration of prophylactic postpartum uterotonic drugs to this group. II. | {
"pile_set_name": "PubMed Abstracts"
} | 0 |
friend’s daughter webcam and scared ‘ Getting To Know My Sexy Aunt
4179 92% | {
"pile_set_name": "OpenWebText2"
} | 0.013158 |
Extra X Porn dot Com is updated daily with New PORN Movies for your viewing pleasure
Today's Banned Videos !!! Dont Miss This Video!!! Most Popular Porn Videos Sponsored Links Find Someone To Fuck Check This Videos
| {
"pile_set_name": "OpenWebText2"
} | 0.017937 |
// vue compiler module for transforming `img:srcset` to a number of `require`s
const urlToRequire = require('../url-to-require')
module.exports = () => ({
postTransformNode: node => {
transform(node)
}
})
function transform (node) {
const tags = ['img', 'source']
if (tags.indexOf(node.tag) !== -1 && node.attrs) {
node.attrs.forEach(attr => {
if (attr.name === 'srcset') {
// same logic as in transform-require.js
const value = attr.value
const isStatic = value.charAt(0) === '"' && value.charAt(value.length - 1) === '"'
if (!isStatic) {
return
}
// http://w3c.github.io/html/semantics-embedded-content.html#ref-for-image-candidate-string-5
const escapedSpaceCharacters = /( |\\t|\\n|\\f|\\r)+/g
const imageCandidates = value.substr(1, value.length - 2).split(',').map(s => {
// The attribute value arrives here with all whitespace, except normal spaces, represented by escape sequences
const [url, descriptor] = s.replace(escapedSpaceCharacters, ' ').trim().split(' ', 2)
return { require: urlToRequire(url), descriptor: descriptor }
})
// "require(url1)"
// "require(url1) 1x"
// "require(url1), require(url2)"
// "require(url1), require(url2) 2x"
// "require(url1) 1x, require(url2)"
// "require(url1) 1x, require(url2) 2x"
const code = imageCandidates.map(
({ require, descriptor }) => `${require} + "${descriptor ? ' ' + descriptor : ''}, " + `
).join('').slice(0, -6).concat('"').replace(/ \+ ""$/, '')
attr.value = code
}
})
}
}
| {
"pile_set_name": "Github"
} | 0 |
Sexy Nude Student from London
Tiny tits on this Uni student from London who posed for these dirty pics in her bedroom. She has a tiny tight ass that looks like it would be awesome to fuck. I wonder how this student slut did in her “A” Levels hehe… | {
"pile_set_name": "Pile-CC"
} | 0.024194 |
Twisted Miss have been selling sex toys online since 2006 and are established as one of the longest standing online adult shops. We sell an enormous range of sex toys including vibrators, dildos, sex dolls and everything else you would expect to find in a sex shop. You will also find a full range of gay sex toys and a variety of other adult products. All of our adult toys are in stock and can be dispatched immediately. Remember if you order by 3pm you could have your adult toys tomorrow! Why not choose yourself the ideal sex toy today. We hope you enjoy shopping at Twisted Miss. | {
"pile_set_name": "OpenWebText2"
} | 0.010256 |
A hundred years after the National Hockey League was born in Montreal’s grandest hotel, the Windsor, the league is back where it all began this weekend.
The hotel is gone, but the nearby train station is still there, next door to the Montreal Canadiens’ home rink at the Bell Centre.
Gathering there — on paper, at least — are the 100 players deemed to be the best to have played in the NHL.
For the past year, artist Tony Harris has been at his easel trying to translate the speed and colour and glory of hockey into oil.
Last week, he finished the final two 11-inch-by-14-inch portraits, depicting speedy Canadiens winger Yvan Cournoyer, and Wayne Gretzky in the Edmonton Oilers’ blue and orange. This weekend, all 100 paintings will be shown together in public for the first time.
A panel of 58 hockey insiders voted on the top 100 list, which was revealed in January. A certain amount of debate ensued. Whither Frank Nighbor? Where have you gone, Joe Thornton? No Evgeni Malkin, really?
But for the most part, the list was not controversial. Gordie Howe is there, and Mario Lemieux, Bobby Orr, Howie Morenz, Ken Dryden and the rest — 76 living and 24 deceased.
Six of the players are skating still, including Sidney Crosby, Alex Ovechkin and the perennial Jaromir Jagr. Most of the players date to the 1970s, ’80s, and ’90s, with just a single representative (goalie Georges Vezina) from that first season in 1917-18.
NHL commissioner Gary Bettman hatched the idea for the paintings last fall. Harris, 53, has called the assignment “the greatest job I could ever get.”
“I guess it was a shock,” he said, recalling the initial discussion when he realized he would be putting aside all other professional work for the year. “But it was a cool call.”
Since the NHL announced the art project in February, two new paintings have been posted on NHL.com each Monday.
The studio at Harris’s Ottawa home claims a basement room that the morning lights through high windows. A wall-filling TV is tuned, always, to wherever in the world there is a golf tournament.
One of the action figurines presiding over Harris’s work space is a six-inch Chicago Blackhawks goaltender from the early 1970s. Harris was in the third grade back then at Lakefield Elementary, about 90 minutes northeast of Toronto. He liked to draw. And like many Canadian 8-year-olds, he also collected hockey cards.
“The only one I could find with my name on it was Tony Esposito’s,” Harris said.
Sketching the Chicago goalie over and over again, he turned himself into a Blackhawks fan. And when the time came to suit up for minor hockey, Harris knew he would follow his namesake to the net.
The son of an English teacher, Harris grew up on campus at Lakefield College School, a private boarding school, before he started as a student there in the ninth grade.
His art teacher was Richard Hayman, who, when he was not commanding the school’s busy art room, could be found ranging soccer fields and cricket pitches.
“To this day I’ve never taken an art lesson from anybody other than Richard,” Harris said. “I still don’t think I’m even close to what he could do. He was just so ridiculously talented. But his gift was also in teaching. And thank God that was his calling, because he was so important for me.”
One of Hayman’s imperatives, and Lakefield’s, Harris said, was: “Here was a place you could be an athlete and an artist. It was really the whole point of being able to not pigeonhole yourself into this is what you’re supposed to be, or how it’s supposed to go.”
He admitted he was not a good student and was happiest outdoors.
“If you were inside, reading was like the worst thing for me, so I would grab a Sports Illustrated and draw,” Harris said. “I found something that I could do, and I just kept doing it.”
He played quarterback in college, and had a short junior stint in the nets of the Kingston Canadians of the Ontario Hockey League. Then he followed his father into the classroom. There was just one problem: “I just felt like I was back in school again,” Harris said. “I thought why am I doing this? So I left.”
When he took up painting, he said, he did not think of it as a real job.
“The thing that saved me was golf — painting golf courses,” Harris said. “There just wasn’t anybody else doing it in Canada.”
His love of the game and his skill with a club blended well with what he could do on canvas. Lots of people in and around Toronto, as it turned out, were eager to pay for paintings of a favorite hole at a chosen course.
“All of a sudden, I went from a struggling artist to having as much work as I wanted,” Harris said.
He is not complaining now, but after almost a decade of that work, he said, “I was really getting tired of painting golf courses.”
The transition to hockey did not happen all at once. It was accelerated around 2006, when Harris painted a portrait of Orr from a photograph he had seen on the cover of Stephen Brunt’s book Searching for Bobby Orr. To Harris, the picture was remarkable because it looked like a painting; the realism of his painting wowed those who saw it.
Soon Harris was painting less grass and more ice. His commissions for the NHL Players’ Association came to include an annual portrait of the winner of the Ted Lindsay Award, given to the most outstanding player as voted by NHLPA members.
More and more, he was getting calls to commemorate career milestones for players in Ottawa and around the NHL. When the Senators’ Chris Phillips played his 1,000th NHL game, in 2012, the team presented him with a Harris portrait that showed the defenceman fending off Ovechkin, Crosby and Gretzky.
Loading... Loading... Loading... Loading... Loading... Loading...
Phillips, who retired in 2016, has three Harris prints hanging on his walls and has commissioned paintings of the Canadian prairies where he grew up.
“He really understands the little details that are important to a player,” Phillips said, “and he portrays them with such precision.”
If Harris has a guiding principle in his painting of athletes, it might be this: “I’ve got to do something,” he said, “that if I was the guy, if it was me, that’s the painting I’d want to see of myself.”
He laughed when he talked about the call he got in 2016 from the Chicago Blackhawks.
As reigning Stanley Cup champions, they had been invited to visit the White House. The team had prospered during President Barack Obama’s two terms, making two previous White House visits, after its 2010 and 2013 championships. Obama already had plenty of Blackhawks swag; this time, he was going to get a painting.
Harris quickly sketched up an idea that February and emailed it to the Blackhawks; he proposed presenting a triptych of the team’s Stanley Cup parades.
“I said, ‘When do you want to do this?’ They said, ‘Well, next Thursday.’ And this was . . . Thursday,” Harris said.
Working 20-hour days, he got it done — framed, too — by the next Tuesday.
Chicago coach Joel Quenneville, a friend of Harris, reported on what went on in the Oval Office: The president told the Blackhawks that he was going to take down George Washington to put up Harris’s painting.
“I said, ‘No, he didn’t,’” Harris recounted. “Joel said, ‘Hand to God, Tony, he said it.’”
He is wary of tallying up the hours he spent at the easel painting the NHL’s top 100 players. “When I start thinking about it, the math just gives me a headache,” he said. “Twenty hours or 25 hours, probably, per?”
He would rather recall the simple pleasures of doing the work and the distractions he will continue to savour.
Out of the blue, he got a call from Esposito, who is among the 100. They talked for 15 minutes.
What about?
“How goaltending used to hurt,” Harris said. “You had to catch pucks, because if you didn’t, they were going to hit your body, and if they hit your body, you were going to be in pain because the equipment was so terrible.”
Last week, as he approached the last brush stroke, Harris contemplated what it all meant to him, what he had achieved.
He tried out a couple of words — iconic, legacy, “all those buzzwords,” he said — but none of them felt right.
Seeing the exhibition in Montreal, all 100 paintings on the wall together for the first time, he said, “That’s going to be spectacular.
“I just want someone to stand there and say, ‘That’s cool.’ And if it’s Pat LaFontaine and he takes a look at his painting, I’d like him to say, ‘Oh, that’s pretty cool.’ ”
Read more about: | {
"pile_set_name": "OpenWebText2"
} | 0 |
test:
@./node_modules/.bin/mocha \
--require should \
--reporter spec
.PHONY: test | {
"pile_set_name": "Github"
} | 0 |
Sexy Smiles
Sexy Smiles
A rookie to spreading her cookie and butt-hole on-camera, Ryan Smiles is a very pretty and sexy brunette eager for hot action with porn studs. She has perky nipples crowning beautiful tits and she also has an unusually large, round ass for a girl her size.
If Ryan looks like a cheerleader, that's because she was one. A former cheerleader who's into exploring her sexuality, Ryan is eager for new experiences. "I can't limit myself. I make every encounter new and a little freakier than the last."
Ryan likes to fuck four or five times a week, masturbates often, likes riding cock best and wants to try fucking live in public one of these days although putting herself out there getting fucked on film is still public in a way.
What else can we tell you about Ryan? She's fucking adorable. She swallows. She's been in three-ways. And she gets pounded and creamed in her pink sugar-pot by Champ's big cock in a Special XXX Bonus scene at SCORELAND from BootyLiciousmag. | {
"pile_set_name": "Pile-CC"
} | 0.01503 |
There are 1 local girls in Effingham, South Carolina that want to meet you for casual sex now! I love aant and Naughty woman want sex tonight Effingham sex, Love to have sex day or night, fucking is my specialty in Katoomba real estate milf words horny.
I love to party. I love to be naughty. I'm not seeking anything serious, just uncomplicated fun. Im dex for a skilled guy with stamina who can keep going the whole night. And I promise to return that favor for you. Im not too experienced if it comes to women, but Im eager to learn every trick in the book to make you climax.
I Am Search Real Swingers
I actually can't be walking around using a 18 year old hotty anymore, however hot he might be. I actually luv sex of course and as Naughty woman want sex tonight Effingham is possible to prolly see from my picture I truly am in perfect contour. I'm completely into woman, although I'm open to the idea of men. My favorite thing to do is oral. I just love the taste of a nice wet pussy.
I keep up for hours and can't get enough to do that. Adore to feel it so heavy in me. If you're mellow I 'll take it in the buttocks simply in the shower it's simply so fine and hot… Ease in lightly and lightly but after you're Nova Scotia bi sexual there….
I really got myself wet hot horny while typing this. Had Newly single Italy set my fingers up there and shoot a image for you yourself Effongham reveal you: I'm 5'7, I have brown curly hair and green eyes, I ve got a sexy toned and tanned body and I am hungry for sex".
I prefer females that are around 25 to Ill play with my boyfriend around, he doesnt have to Naughty woman want sex tonight Effingham part, he just likes to watch. Love the thought of two males at the same time. Id also search for Ladies seeking nsa Lonaconing Maryland 21539 female playmate for 1 on 1 fun. My boyfriend doesnt like to go down on me, as I have such a nice pussy, he does not want analsex and I cant wmoan bothered asking to try some new positions.
Of tonigjt it's not okay that I want to cheat but I dont see an other way. I really do not want him to find out though.
I am seeking someone with loads of experience because I do not have much and I'd like to try everything. Xxxxxxxxx You've just gotten out of a serious relationship and now you've decided to try a casual adult dating.
Where do you start?
Naughty woman want sex tonight Effingham
There are a few things that you can keep in mind that will help to ensure that your casual relationship remains safe, Naughty woman want sex tonight Effingham, and most of all, casual. Always make sure to be honest about wanting to keep the relationship casual. After all, you do not want to mislead your Naughty woman want sex tonight Effingham into thinking you want more when you're really just toight for se sex. Remember to never Horny Maxbass North Dakota girls the night, because this gives your partner the impression that you want to move beyond a casual relationship wsnt a more serious one.
Remember that you are not the only one in a casual relationship. You're looking for a local girl that will have sex with you, and chances are that she is just looking for sex too.
I Ready Adult Dating
You're going to talk to hot, sexy women and she will probably end up talking to sexy men or woman as well. This is a casual sex date. Always take care of yourself. Make sure that, when you meet up, you are clean and ready for sex.
With casual adult dating, she will be more likely to refuse sex if you do not look clean and ready to go. Remember Naughty woman want sex tonight Effingham she is a fuck buddyand that you are looking for hot sex and nothing more. Casual dating lets you try new Adult seeking nsa Niangua.
Maybe you've always wanted a threesome, or maybe you have never had sex with a blonde. Maybe, you want to be tied up by a hot MILF. Remember to have fun and be adventurous. There is probably nothing better than hooking up with a hot local girl or meeting up for a one night stand while your travelling or while the wife is away nobody is judging If you live in a large city and you Naughty woman want sex tonight Effingham looking for local girls for sex, you might accidentally see someone you know.
If you do, hit her up and see if she wanted to have sex with you, but remember that she is local and you might have the same friends or Lonely wants sex Shreveport the same people. Never spread rumors or share information about the local women you are talking to. They are simply looking for a Fuck me in Roussillon utah time and should be comfortable doing so.
By spreading rumors or sharing private information about the Naughty woman want sex tonight Effingham, you might scare her into deleting her profile. Always respect the girls that are online looking for local hookups, just as you would want them to respect you. Chances are, that if you are trying to meet local women for hookups, dates, casual sex, or even serious relationships, you might end up bumping into them again. Some of these girls might be the girl next dooror a co-worker, nurse, doctor, or anything in your area.
You could easily run into past and present casual sex partners, hookups, fuck buddies and friends with benefits in public.
Remember to be discrete and respectful. This is very important! When fEfingham are online using a casual or adult dating service, discretion is very important.
Chances are, you don't want everyone to know you are cheating on your wife, and most girls don't want half the town knowing she has a profile on an adult womaan casual dating site.
No string sex is one of the best things that can happen to you. You Naughty woman want sex tonight Effingham to have sex with local women Reply Wisconsin at xxx local sex all of the burdens of a real relationship, like remembering birthdays or anniversaries. All you have to do is remember where to meet and fuck. Here are some tips on making no string sex even more fun:.
Also, it may be perfectly fine to be friends with your casual fuck buddy, but remember to draw the line there. Your fuck buddy is not your wife or your girlfriendand she probably isn't the first person you should run to when you need to talk.
Groups for oleder couples, like to fuck effingham girls that texas swingers rv To fuck in effingham girls that bellvell, horny women pen pals naughty horny girls . That want fuck now in loudon new hampshire swinging groups in mn want sex. Escorts Effingham. Free Classifieds Very horny and hot-want to fuck wright now – 26 I am a very friendly naughty and always hot woman in the bed. If you . Want one girl this time, sexy moms in effingham know what i mean lets walk . Have fun every now and then cuz that's all the time i cant get sexy moms in.
When you are in a no string sexual relationship remember to make it all about sex and not all about you. Nobody wants to listen to you about your ex-wife or your problems at home. Like you, she is there for sex, so make sure to keep it that way.
No strings attached sex is Naughty woman want sex tonight Effingham best way to live out a fantasy and to try new things in bed.
Her ideal match. Ladies want hot sex Roommates gone tonight fucking patey. Sexy seniors searching casual dating discreet women seeking men. Elm city NC . wanna tease me insane - Hi i am 20 and I am nothing but talk from this girl You start dating Seeking someone to help relieve the stress every now and then Do you want have some sexy conversation about how bad I want your wet pussy. Join Now for FREE to Find Adult Sex Near Effingham, Illinois. Sexy Effingham, Illinois Adult Singles, Swingers, MILFs, Lesbians, Sluts Just Looking marscsb 34/F Effingham, Illinois, United States I'm for the right woman . AFF members are all over the world whether you are in big cities like Boston, Philadelphia, Las.
Always remember, however, to be respectful of her wants. Remember to try everything. If you Naughty woman want sex tonight Effingham want a threesome, why not? If she wants you to tie her to the bed, go for it. Make the most of your time to experiment and make the most out of sexbut Naguhty cross the line. Womah get stuck with just one girl, try out a few. The best way to have fun casual sex is to rotate sexual partners frequently.
Naughty woman want sex tonight Effingham Wanting For A Man
This will keep your levels on confidence high, and will make it easier toniht you to remain Naughty woman want sex tonight Effingham and avoid attachment. Who knows, you might even be able to get all the girls to fuck you at the same time: Here are some do's and don'ts to help you make sure you're having a good time, staying safe and being a good fuck buddy:.
Don't text her at wxnt hours of the evening. Just Naughty woman want sex tonight Effingham she is having Naughty woman want sex tonight Effingham sex with you doesn't mean you should be bugging her all the time. She might womxn married Always use a condom and make sure to get tested for STD's regularly. Also, look out for cold sores and don't have casual sex with women who look like they may Are you looking for play had a lot of unprotected sex.
Don't stay too long. You're there for casual sex and not a relationship. Remember, she might have just fucked you, but her husband or boyfriend could be coming home any minute.
Sed cuddle after sex. Remember womxn are trying to keep this a no string attached night. You're there for sex, and once you are done you should not be giving her the wrong impression.
Keep repeating to yourself before, during and after sex, that this is just about sex and not love. That good feeling you are getting while she is riding you or giving you a blowjob is not love Experiment and keep things wild. | {
"pile_set_name": "Pile-CC"
} | 0.009559 |
Q:
When breaking honeyfruit, how long does the health packs last?
When you go into river and break the honeyfruit, it drops 5 health packs, that will regenerate both health and mana to whoever walks over it.
I can't remember a time where I just randomly walked up and there were health packs already on the ground.
So how long do they stay on the ground before despawning?
A:
They last for 30 seconds after destroying the fruit. I just went on the practice tool and tested this, as I couldn't find any mention of it in the patch notes.
| {
"pile_set_name": "StackExchange"
} | 0 |
My usual maid couldn’t make it this week, so she sent in her hot 18 year old daughter. I started offering her some more money and eventually she agreed to take her top off. Soon, she was cleaning my house nude. From there, it didn’t take long for cock to be in her mouth. She polished my cock. Then, I stretched her tiny little pussy in several different positions before busting all over her face. Of course I had to make her finish cleaning before she could go home. | {
"pile_set_name": "OpenWebText2"
} | 0.008547 |
Top Rated Mature XXX Videos
If you want to see some top notch MILF porn then you're at the right place for sure, this amazing MILF porn tube is named the maturesex.net and you need to remember this name. This location is all that you wish for, there's just too many hot mature sluts that need big dicks in high quality porn videos, and it's all for free! Seems like a great deal. While there's so much mediocre porn on the Internet we are here offering only the cream of the crop type style ''creme de la creme" porn for our dear visitors. Don't waste your time, thematuresex.net is one of the hottest mature porn spots at this moment. Our fantastic porn selection will leave you amazed, don't forget to bookmark this page because we always updated our website with fresh XXX videos. It's truly amazing to check our list of models, here you will find such a nice diversity. Whether you're into skinny or fat models, amateur or pro, black or white, we have something for you. Browse through this hot selection and discover your new favorite sluts! Also you find so much well known babes. All these ladies are experienced when it comes to pleasing men. They love all kinds of freaky sex action: group sex, gangbang, oral, lesbian, cumshot, pissing etc. Their only mission is to please well hung men and that's so nasty. It's all here at thematuresex.net, one of the finest mature XXX tubes for sure. It's so damn nice to go through all these sexy MILF whores, they are willing to do all kinds of freaky stuff in front of the camera. Anal fucking and jizz eating are their favorite sports. Our only concern is to bring you a fantastic selection of mature porn videos with no low quality stuff, this page only deals with top notch stuff and that's our only policy. You are about to see some of hottest MILF sluts in the porn industry right here at thematuresex.net and it's all for free. High quality porn ain't free nowadays but we are offering stuff that's free of charge. We care about our visitors so we bring them only the mature hotness.
Welcome to this super hot mom porn tube, it's sizzling with some of the nastiest MILF ladies in the business. When it comes to cock loving moms this page has it all.
Mature sex videos for your viewing pleasure are right here. Pick your favorite MILF whores and enjoy your stay. This huge collection of nasty mature sluts will amaze all
fans of mature content. Don't forget to bookmark this hot page. Our aim is to present you only the best videos and high quality mature porn models, such a nasty treat! | {
"pile_set_name": "Pile-CC"
} | 0.012574 |
As my wife sucks my large cock I penetrate her pussy with red dildo
Javascript is turned off in your browser. Some features of this page will not work correctly. Share
Related Videos
Related Top Videos
Related Popular videos Share Video Url Embed Code
Lying in bed enjoying a nice blowjob from my hot and cock hungry wife. She lies on her side and enjoys tasty cock and an intense dildo fuck in her fanny as I penetrate her back hole from the back.
Report Flag this video using the icons above! Thank you for report! You have already reported for this video! Please write the reason! Submit
Please give the reason for reporting the video
Embed Code Please copy the code: Done
| {
"pile_set_name": "OpenWebText2"
} | 0.013062 |
Blonde Gets Mouth Banged AgainstWallURL: http://galleries.porn.com/index.html?scene_id=48684&p=ft&r=pimp10515&c=1&j=13
... sites in the PORN.COM network! Enter the World's Biggest Porn Site Starring: Goldie Cox Scene Previews Blonde Gets Mouth Banged Against WallGoldie has the secrets to a good rimjob. She takes that cock in her hands and slobs all over it. She licks the dome ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
Sensational Latina Fucked AgainstWallURL: http://galleries.porn.com/index.html?scene_id=42539&p=ft&r=pimp10515&c=1&j=13
... Latina Fucked Against WallGorgeous latina Sativa opens this scene by bending over against the wall with her perfect ass stuck out, ready to get fucked. Her stud positions himself behind her and slides his fat prick into her slippery ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
She Gets A Slow Fuck Against The WallURL: http://galleries.porn.com/index.html?scene_id=35989&p=ft&r=pimp10515&c=1&j=13
... with a lifetime pass to all exclusive sites in the PORN.COM network! Enter the World's Biggest Porn Site Starring: Sativa Rose Scene Previews She Gets A Slow Fuck Against The WallSativa Rose is a sexy, exotic babe with amazing eyes, a great body and lips ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
... Teen Drilled Against The Wall Super Hot Fucking Screaming ... URL: http://gallys.rk.com/pu/598/?id=teenax
Please Me Cassandra Nix Pure18? Cassandra made a deal with the janitor at school. She told him to steal the answers to the big exam coming up and she would pay him 500 dollars. He got her the answers, but she only had 300 dollars. She made another deal ... Niches: Teens, Hardcore, Amateurs, Americans Site: Pure 18
... Teen Britney Nailed Hard Against The Wall By Voodoos CockURL: http://gallys.rk.com/pu/694/?id=teenax
Young Love Britney Young Pure18? Brittneys been sending voodoo hot texts all day of her nice juicy tits. He had to rush over and see the rest of her awesome body. Shes home alone and looking to get dirty in the sack. This blondie is ready for cock as ... Niches: Teens, Hardcore, Amateurs, Americans Site: Pure 18
... Big Tits Nailed Hard Against The Brick Wall Amazing Hot Ass ... URL: http://gallys.rk.com/mo/409/?id=teenax
Sweet Caroline Caroline Pierce Monster Curves? caroline is back and better than before. she called me over and asked me to bring a friend. bill had no idea that caroline was going to tie him up and smother his face with her gargantuan booty. caroline ... Niches:Hardcore, Milfs, Big Tits, Butts, Amateurs, Pornstars, Americans, Babes Site: Monster Curves
One Of The Greatest Score Girls In 20 YearsURL: http://join.scoreland2.com/gallery/MTE1NjU1My4yLjc1LjE4My4xLjcwMzU1ODQuMC4wLjA
... sex, what makes you cum the hardest? MICHELLE: I like to be taken by a man. I like to be pushed against the wall and fucked and lifted up and pushed onto a bed. I like dirty talk, too. And I like to give a man head, too. V-MAG: ... Niches:Hardcore, Milfs, Big Tits, Pornstars Site: Scoreland 2
The Battle Of The British Super-NaturalsURL: http://join.scoreland2.com/gallery/MTE1NjU1My4yLjc1LjE4My4xLjcwMzU1NzAuMC4wLjA
... sex, what makes you cum the hardest? MICHELLE: I like to be taken by a man. I like to be pushed against the wall and fucked and lifted up and pushed onto a bed. I like dirty talk, too. And I like to give a man head, too. V-MAG: ... Niches:Hardcore, Milfs, Big Tits, Pornstars Site: Scoreland 2
Even Shy Girls Suck Cock And Fuck On-CameraURL: http://join.scoreland2.com/gallery/MTE1NjU1My4yLjc1LjE4My4xLjcwMzU2MDkuMC4wLjA
... sex, what makes you cum the hardest? MICHELLE: I like to be taken by a man. I like to be pushed against the wall and fucked and lifted up and pushed onto a bed. I like dirty talk, too. And I like to give a man head, too. V-MAG: ... Niches:Hardcore, Milfs, Big Tits, Pornstars Site: Scoreland 2
Anal For The Readers Wifes First Time!URL: http://join.scoreland2.com/gallery/MTE1NjU1My4yLjc1LjE4My4xLjcwMzU1MTguMC4wLjA
... sex, what makes you cum the hardest? MICHELLE: I like to be taken by a man. I like to be pushed against the wall and fucked and lifted up and pushed onto a bed. I like dirty talk, too. And I like to give a man head, too. V-MAG: ... Niches:Hardcore, Milfs, Big Tits, Pornstars Site: Scoreland 2
Maria Owns A Winning Pair Of Queens. Wanna Bet?URL: http://join.scoreland2.com/gallery/MTE1NjU1My4yLjc1LjE4My4xLjcwMzU1NTIuMC4wLjA
... sex, what makes you cum the hardest? MICHELLE: I like to be taken by a man. I like to be pushed against the wall and fucked and lifted up and pushed onto a bed. I like dirty talk, too. And I like to give a man head, too. V-MAG: ... Niches:Hardcore, Milfs, Big Tits, Pornstars Site: Scoreland 2
Dirty Slut Ass Fucked In Public ToiletURL: http://galleries.porn.com/index.html?scene_id=49383&p=ft&r=pimp10515&c=1&j=13
... Robbins gets busted in the men's bathroom by porn star Otto Bower. Otto knows a degenerate the slut when he sees one, and pushes her up against the wall, pressing his muscular body against her's until she submits to ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
Busty German Hottie Fucked In Her ButtURL: http://galleries.porn.com/index.html?scene_id=41697&p=ft&r=pimp10515&c=1&j=13
... ButtThis busty German blond gets ass fucked in the barn in this straightforward hardcore scene. She is pressed up against the wall by her man, letting herself be ravaged. He squeezes her massive breasts and roughly through the fabric of her ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
Strangers Meet In Hallway And Get DirtyURL: http://galleries.porn.com/index.html?scene_id=24092&p=ft&r=pimp10515&c=1&j=13
... carrying alcohol, so they consider themselves a match made in heaven. He pushes her up against a wall and takes off everything she ha Download the Full Video at PORN.COM RATING: Your PORN.COM Membership Comes With Access to Over 36 Exclusive Sites & ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
Hottie Just Turned 18 Get Her Birthday Spankings With A ... URL: http://fuckedhard18.net/galleries/audrianna/1/fhg.html?nats=ODEwOjI2OjEy,0,0,0,
... Halia Fucked Hard Nika Fucked Hard Eden Fucked Hard My massage studio becomes a FUCKED HARD playground. I fuck them on the table, floor, up against the wall, on my sex cube and get their oiled up asses bent of my sex wedge for a good hard pounding!!! I ... Niches: Teens, Hardcore, Amateurs, Americans Site: Fucked Hard 18
Black Model Poses And Fucks PhotogherURL: http://galleries.porn.com/index.html?scene_id=4151&p=ft&r=pimp10515&c=1&j=13
... to her thong. She can't hold back anymore, so she attacks the photographer and pins him against the wall so she can suck his Download the Full Video at PORN.COM RATING: Your PORN.COM Membership Comes With Access to Over 36 Exclusive Sites & Growing! ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
Eva Angelina Swallows Cock Balls Deep With A SmileURL: http://gallery.throated.com/gallhit/102916/1790/2/2/0
... giggling up a storm, highly amused by choking herself with a cock!! And then, we get to place her down in a modified version of the Wall Fuck! She leans against the bed and has her head immobilized so her neck has no choice but to expand out for that big ... Niches: Teens, Hardcore, BlowJob, Amateurs, Cumshots, Gagging, Americans Site: Throated
Horny Britney Stevens Does Wet Nasty DeepthroatingURL: http://gallery.throated.com/gallhit/102916/1658/2/2/0
... Hardcore Deepthroat Pics Of Britney Stevens From Throated.com! You're about to see throats fucked and pounded. You're about to see ... it and she's sitting against the bed on the floor in Throated's standout position: The Wall Fuck!! Now this position lands ... Niches: Teens, Hardcore, BlowJob, Amateurs, Cumshots, Gagging, Americans Site: Throated
Beauty From Brazil Satisfies StudURL: http://galleries.porn.com/index.html?scene_id=81187&p=ft&r=pimp10515&c=4&j=13& ...
... lube his rod she rides him hard. Standing on the bed hands on the wall she takes him from behind. Slapping loud against her they both moan in pleasure. Kneeling down he now pushes his cock into her slippery cunt. Slamming hard ... Niches:Hardcore, Milfs, Amateurs, Americans, One Pass Sites Site: PORN.COM
Tall Blonde Comes Back For Another Massage And Fuck SessionURL: http://fuckedhard18.net/galleries/eden2/1/fhg.html?nats=ODEwOjI2OjEy,0,0,0,
... Fuck Nika Massage and Fuck Riley Massage and Fuck My massage studio becomes a FUCKED HARD playground. I fuck them on the table, floor, up against the wall, on my sex cube and get their oiled up asses bent of my sex wedge for a good hard pounding!!! I get ... Niches: Teens, Hardcore, Amateurs, Americans Site: Fucked Hard 18
Blonde Cocksucking Teen Getting Her Ass Tapped In The CanURL: http://galleries.pimproll.com/lnn/pics/47/index.html?p=&r=pimp10515&c=&j=&src= ...
... again. Listen to her moans as they echo and bounce back from the bare bathroom walls, join her as she comes in a screaming orgasm as her boyfriends balls slap against her ass and he fucks her from behind! What are you waiting for? Click here for a free ... Niches: Teens, Hardcore, Amateurs, Americans Site: Little Naughty Nymphos
Crazy Blonde 18 Year Old Demands To Be Fucked HardURL: http://fuckedhard18.net/galleries/natalie/1/fhg.html?nats=ODEwOjI2OjEy,0,0,0,
... Fuck Nika Massage and Fuck Riley Massage and Fuck My massage studio becomes a FUCKED HARD playground. I fuck them on the table, floor, up against the wall, on my sex cube and get their oiled up asses bent of my sex wedge for a good hard pounding!!! I get ... Niches: Teens, Hardcore, Amateurs, Americans Site: Fucked Hard 18
!8 Year Old Brunette With A Sweet Ass Gets Massaged And ... URL: http://fuckedhard18.net/galleries/ashli/1/fhg.html?nats=ODEwOjI2OjEy,0,0,0,
... Fuck Nika Massage and Fuck Riley Massage and Fuck My massage studio becomes a FUCKED HARD playground. I fuck them on the table, floor, up against the wall, on my sex cube and get their oiled up asses bent of my sex wedge for a good hard pounding!!! Hot ... Niches: Teens, Hardcore, Amateurs, Americans Site: Fucked Hard 18
Blonde Teen Fucked Hard By Her Massage TherapistURL: http://fuckedhard18.net/galleries/megan/1/fhg.html?nats=ODEwOjI2OjEy,0,0,0,
... Fuck Nika Massage and Fuck Riley Massage and Fuck My massage studio becomes a FUCKED HARD playground. I fuck them on the table, floor, up against the wall, on my sex cube and get their oiled up asses bent of my sex wedge for a good hard pounding!!! Hot ... Niches: Teens, Hardcore, Amateurs, Americans Site: Fucked Hard 18
For Search feature please
to enable JavaScript or to put this site in Trusted Sites zone
in your browser
Parents please
protect your kids from accessing porn by simply using your browser's
surfing preferences.
All models appearing on this site are 18 years or older.
For 2257 related inquiries please contact each gallery site owner
individually.
We do not produce pornographic content ourselves. Reproduction of
our site design, as well as part or totality of our links is prohibited.
Abuse
email | {
"pile_set_name": "Pile-CC"
} | 0.008719 |
This invention relates to the surface treatment, in particular coating, of rotors having a profile which progresses helically along the rotor.
Down-hole drilling motors have a multi-lobed rotor which is surrounded by an elastomer stator with xe2x80x9cnegativexe2x80x9d lobes which mate with the lobes of the rotor. The lobed profile scrolls down the length of the rotor (which can be up to 6 meters in length) and the spiral path of the lobes often wraps around the rotor length more than one full turn. The stator has an extra lobe, which allows drilling muds to be pumped down the motor, and the force of these fluids imparts a rotary motion to the rotor, which provides the driving force for the drill bits attached to the end of the motor.
In the past, the rotors have been chromium plated to protect them from corrosion and to provide a surface compatible with that of the elastomer stator. However, wells are now being drilled in more difficult geological structures and this requires drilling muds which are more corrosive because of the content of various salts (e.g. sodium chloride) which can be as high as 300,000 ppm. Hard chromium plating always contains cracks and the corrosive drilling muds can penetrate these cracks and initiate corrosion between the chromium plate and the substrate material. In a very short space of time (sometimes as little as 20 hours) the corrosion products cause the chromium plate to separate from the substrate material and these separate pieces of chromium together with the corrosion products themselves attack and destroy the profile of the elastomer stator, which in turn reduces the drilling performance of the motor to unacceptable levels.
It has now been demonstrated that a composite WC/ceramic coating such as described in GB-A-2 269 392 can out-last chromium plating to such an extent that the new coating is being considered as a replacement for chromium plating of rotors. However, there are many thousands of rotors in the industry""s xe2x80x9cfleetsxe2x80x9d and all of these rotors have been machined to specific sizes to accept the normal chromium plating thicknesses. The size tolerances between rotor and stator are obviously of major importance in defining motor performance. Because the chromium plate is applied electrolytically, the lobe peaks generate a higher current density in the plating baths than the valleys and, consequently, a thicker coating is deposited on the peaks (450-500 xcexcm) than is deposited in the valleys (75-100 xcexcm) between the peaks. In contrast a WC/ceramic composite coating is deposited by the combination of a high velocity oxygen-liquid fuel (HVOF) technique and a thermochemical deposition technique, but coating thickness is largely dictated by the HVOF technique.
The HVOF technique is a particular form of flame spraying technique. A cylindrical component to be coated is revolved at a precise speed whilst the deposition xe2x80x9cspotxe2x80x9d generated by the coating torch or gun is traversed along the length of and on the centre-line of the component at a speed which is matched to the speed of rotation so that the spot follows a tight helical path. A coating of uniform longitudinal thickness is achieved when the pitch of the helical deposition path is less than the diameter of be deposition spot. The cross-sectional thickness of an HVOF coating deposited in this matter on a rotor is effectively dictated by the major and minor diameters of the rotor profile. Thus, if the major diameter (lobe peak) is twice that of the minor diameter (lobe valley), then the coating thickness in the valleys will be twice that of the peaks. Depending upon the number of lobes on a rotor (and thus the slope of the valley sides) the thickness in the valleys can be further increased by a funnelling or concentrating effect on the coating deposition spot.
Thus the natural coating thickness profile deposited by the conventional HVOF technique is completely opposite to that of chromium plating techniques and they are different to such an extent that the desired xe2x80x9cfitxe2x80x9d between rotors and standard stators can only be achieved by machining a new rotor to a specific size to accommodate the natural coating profile of the conventional HVOF coating. However, this would mean that the many thousands of rotors in the existing fleets could not be coated by the WC/ceramic composite coating technique and many of them would have to be scrapped because of the severity of the corrosion problems. Because of the slope variations created by the major and minor diameters of the cross-sectional profile of the rotors, it is difficult to ensure that the angle between the coating deposition plane and the coating stream is maintained at the optimum 90xc2x0 when coating on the longitudinal centre-line of the rotor. Thus coating quality and bond strength cannot be optimised uniformly around the rotor.
The present invention provides a method of treating the surface of a rotor having a profile which progresses helically along the rotor, comprising providing a treatment jet or beam having an axis intersecting the surface of the rotor at a point, and traversing the point along the rotor while keeping the point at the same position on the profile.
The invention also provides apparatus for performing the method. | {
"pile_set_name": "USPTO Backgrounds"
} | 0 |