meta
dict
text
stringlengths
2
1.4M
{ "pile_set_name": "StackExchange" }
Q: Identifying Files in Plone BlobStorage Files in var/blobstorage can be listed and sorted by their sizes via Unix commands. This way shows big files on top list. How can I identify these files belongs to which IDs/paths in a Plone site? A: There is no 'supported' way to do this. You could probably write a script to inspect the ZODB storage, but it'd be complicated. If you want to find the biggest files in your Plone site, you're probably better off writing a script that runs in Plone and using it to search (using portal_catalog) for all File objects (or whatever content type is most likely to have big files) and calling get_size() on it. That should return the (cached) size, and you can delete what you want to clean up.
{ "pile_set_name": "Pile-CC" }
What If We Weren’t so Focused on Price? January 1, 2011 Would quality get better? Would service get better? Would there be jobs in the manufacturing sector again her in the U.S.? Would we, as consumers, then be more inclined to direct our taste to other attributes, like longevity? Would we, as retailers and retail designers, then be allowed to make things that could be appreciated purely for how they move us vs. what they cost? Would we all then be able to compete with Apple?
{ "pile_set_name": "Github" }
// Copyright 2018, OpenCensus Authors // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package ochttp import ( "crypto/tls" "net/http" "net/http/httptrace" "strings" "go.opencensus.io/trace" ) type spanAnnotator struct { sp *trace.Span } // TODO: Remove NewSpanAnnotator at the next release. // NewSpanAnnotator returns a httptrace.ClientTrace which annotates // all emitted httptrace events on the provided Span. // Deprecated: Use NewSpanAnnotatingClientTrace instead func NewSpanAnnotator(r *http.Request, s *trace.Span) *httptrace.ClientTrace { return NewSpanAnnotatingClientTrace(r, s) } // NewSpanAnnotatingClientTrace returns a httptrace.ClientTrace which annotates // all emitted httptrace events on the provided Span. func NewSpanAnnotatingClientTrace(_ *http.Request, s *trace.Span) *httptrace.ClientTrace { sa := spanAnnotator{sp: s} return &httptrace.ClientTrace{ GetConn: sa.getConn, GotConn: sa.gotConn, PutIdleConn: sa.putIdleConn, GotFirstResponseByte: sa.gotFirstResponseByte, Got100Continue: sa.got100Continue, DNSStart: sa.dnsStart, DNSDone: sa.dnsDone, ConnectStart: sa.connectStart, ConnectDone: sa.connectDone, TLSHandshakeStart: sa.tlsHandshakeStart, TLSHandshakeDone: sa.tlsHandshakeDone, WroteHeaders: sa.wroteHeaders, Wait100Continue: sa.wait100Continue, WroteRequest: sa.wroteRequest, } } func (s spanAnnotator) getConn(hostPort string) { attrs := []trace.Attribute{ trace.StringAttribute("httptrace.get_connection.host_port", hostPort), } s.sp.Annotate(attrs, "GetConn") } func (s spanAnnotator) gotConn(info httptrace.GotConnInfo) { attrs := []trace.Attribute{ trace.BoolAttribute("httptrace.got_connection.reused", info.Reused), trace.BoolAttribute("httptrace.got_connection.was_idle", info.WasIdle), } if info.WasIdle { attrs = append(attrs, trace.StringAttribute("httptrace.got_connection.idle_time", info.IdleTime.String())) } s.sp.Annotate(attrs, "GotConn") } // PutIdleConn implements a httptrace.ClientTrace hook func (s spanAnnotator) putIdleConn(err error) { var attrs []trace.Attribute if err != nil { attrs = append(attrs, trace.StringAttribute("httptrace.put_idle_connection.error", err.Error())) } s.sp.Annotate(attrs, "PutIdleConn") } func (s spanAnnotator) gotFirstResponseByte() { s.sp.Annotate(nil, "GotFirstResponseByte") } func (s spanAnnotator) got100Continue() { s.sp.Annotate(nil, "Got100Continue") } func (s spanAnnotator) dnsStart(info httptrace.DNSStartInfo) { attrs := []trace.Attribute{ trace.StringAttribute("httptrace.dns_start.host", info.Host), } s.sp.Annotate(attrs, "DNSStart") } func (s spanAnnotator) dnsDone(info httptrace.DNSDoneInfo) { var addrs []string for _, addr := range info.Addrs { addrs = append(addrs, addr.String()) } attrs := []trace.Attribute{ trace.StringAttribute("httptrace.dns_done.addrs", strings.Join(addrs, " , ")), } if info.Err != nil { attrs = append(attrs, trace.StringAttribute("httptrace.dns_done.error", info.Err.Error())) } s.sp.Annotate(attrs, "DNSDone") } func (s spanAnnotator) connectStart(network, addr string) { attrs := []trace.Attribute{ trace.StringAttribute("httptrace.connect_start.network", network), trace.StringAttribute("httptrace.connect_start.addr", addr), } s.sp.Annotate(attrs, "ConnectStart") } func (s spanAnnotator) connectDone(network, addr string, err error) { attrs := []trace.Attribute{ trace.StringAttribute("httptrace.connect_done.network", network), trace.StringAttribute("httptrace.connect_done.addr", addr), } if err != nil { attrs = append(attrs, trace.StringAttribute("httptrace.connect_done.error", err.Error())) } s.sp.Annotate(attrs, "ConnectDone") } func (s spanAnnotator) tlsHandshakeStart() { s.sp.Annotate(nil, "TLSHandshakeStart") } func (s spanAnnotator) tlsHandshakeDone(_ tls.ConnectionState, err error) { var attrs []trace.Attribute if err != nil { attrs = append(attrs, trace.StringAttribute("httptrace.tls_handshake_done.error", err.Error())) } s.sp.Annotate(attrs, "TLSHandshakeDone") } func (s spanAnnotator) wroteHeaders() { s.sp.Annotate(nil, "WroteHeaders") } func (s spanAnnotator) wait100Continue() { s.sp.Annotate(nil, "Wait100Continue") } func (s spanAnnotator) wroteRequest(info httptrace.WroteRequestInfo) { var attrs []trace.Attribute if info.Err != nil { attrs = append(attrs, trace.StringAttribute("httptrace.wrote_request.error", info.Err.Error())) } s.sp.Annotate(attrs, "WroteRequest") }
{ "pile_set_name": "Pile-CC" }
Jon Porras Black Mesa On the surface, there’s very little that Jon Porras’ Black Mesa and Dustin Wong’s Dreams Say, View, Create, Shadow Leads have in common. They’re both works for solo guitar. They’re both on Thrill Jockey. (Who, it’s got to be said, is putting out records of solo guitar at a time when most labels are trying to recoup basic pressing costs with t-shirts sales. Kudos to them for stubbornly sticking to their aesthetic guns.) I guess that’s about it. Incredible, then, that such disparate work can come from a single instrument, as if reasserting the vital flexibility of a guitar in the right hands. Listen to these two albums, both quite good, side by side. Wong’s guitar work is polyphonic, Porras’ a monologue. Where Wong constructs busy arrangements of crystalline intensity, Porras lets the lone, meditative note hang ambient and dreadful in space. Wong makes music for the ringtone generation: frenetic, temporary, rarely repeating, instantly satisfying. Black Mesa romanticizes something old or lost. Each is more suggestive of entire worlds than most “and-the-kitchen-sink’ laptop pop. What Black Mesa reminds me of most are those long minutes of guitar in isolation that would precede Godspeed You! Black Emperor’s cyclical build, or perhaps Neil Young’s Dead Man soundtrack (1995). Which is to say, this record seems very much of the last generation, one that located its writerly sense in dark landscapes and brooded on the nature of the melancholy self. Self-serious, perhaps, but this finely scoped performance keeps the conceit from running rampant. The writing around the record also talks about land, physical space, and isolation: “Black Mesa is a reflection on desolation and the search for light in a barren land,” says its accompanying bio, and (believe it or not), “The album follows an outlaw wanderer who ventures deep into the desert only to discover the Black Mesa, a bridge between worlds (as related to string theory or multiverse theory).” Our more cynical tendencies (the part of us that secretly likes Vampire Weekend) might scoff at this, but I love the rich, Americana textuality evoked here, the pulp self-awareness. I read no contemporary, political commentary in Black Mesa, but it certainly fits the mood of Primary season. What better time than this, when Americans are struggling to find some semblance of affinity for potential leaders, to fantasize about the desert outlaw—the dead man—searching for some existential possibility or bridge to more appealing truths. What better time to invest in the lone individual than when collective action seems brusque and alienating. As far as drone or ambient records go, Black Mesa is accessible and melodious. “Into Midnight” and “Into the Black Mesa” act as a recurring theme, but beyond that it’s only the album’s warm guitar tone and sparse arrangements that tie it together. There are no great patches of dissonance or noise to contend with. “Blue Crescent Vision” lays over some small complimentary guitar work, and that’s all it needs. And in that, Black Mesa speaks to some traditional core at the center of ambient’s evolution as a genre. Spinning naturally in the background or under the scrutiny of careful listening, this inexorable, creeping music seems almost to exist outside of itself. Anachronistic in its psychedelic fantasies, unstylish in the scope of its sounds, Black Mesa embodies its themes of departure and isolation by sounding like a record out of time. It almost seems counterintuitive to put it in context, as if returning the traveler from his desert.
{ "pile_set_name": "Pile-CC" }
Cubs, an all encompassing trip Brett Jackson and Josh Vitters Close to Call Up? It was only a matter of time before this topic was addressed by Dale Sveum and the Cubs front office given the roster turnover the last couple of days. Per Sveum it sounds like the organization will get together on Thursday to discuss the possibility of calling up both Brett Jackson and Josh Vitters this month. Sveum was clear in saying that if they did get called up they would play every day, which is awesome to hear. I for one am excited to see what these guys can do at this level, even if it’s only over the last month and a half. The logical time for a call up would be September when the rosters expand, so it’s news that the organization is discussing this now. The following are trademarks or service marks of Major League Baseball entities and may be used only with permission of Major League Baseball Properties, Inc. or the relevant Major League Baseball entity: Major League, Major League Baseball, MLB, the silhouetted batter logo, World Series, National League, American League, Division Series, League Championship Series, All-Star Game, and the names, nicknames, logos, uniform designs, color combinations, and slogans designating the Major League Baseball clubs and entities, and their respective mascots, events and exhibitions.
{ "pile_set_name": "Pile-CC" }
Transatlantic Trade and Investment Partnership TTIP or Transatlantic Trade and Investment Partnership is the major initiative of US and EU to lead the standards for global trade without the BRICS nations playing any substantial role. BRICS economies helped the world tide through the financial crisis…
{ "pile_set_name": "OpenWebText2" }
Fact checks Donald Trump offers graphic description of later-term abortion, but such procedures are extremely rare Using graphic terms, Donald Trump during Wednesday night’s debate described one of the most controversial, and exceedingly rare, abortion procedures: those that happen at the very end of pregnancies. Trump said these terminations involve “rip[ping] the baby out of the womb of the mother just prior to the birth of the baby.” He is most likely referring to the procedure known as “intact dilation and extraction,” which is sometimes called partial-birth abortion. This procedure, which is used for abortions in the third term of pregnancy as well as later-term miscarriages, involves dilating the woman’s cervix and pulling the entire fetus through the birth canal. The procedure became a hot political topic during George W. Bush’s presidency, when Congress passed a bill banning “partial-birth abortions,” except for when the woman’s life is in danger. The Supreme Court upheld the ban in 2007. Forty-three states impose certain restrictions on some abortions after a certain point in pregnancy. Only 1.3% of abortions performed in the United States occur after the 21st week of pregnancy, according to the Guttmacher Institute, a think thank that supports abortion rights. The vast majority — 91% of abortions performed in 2012 — occur in the first 13 weeks. Although Trump has asserted his antiabortion beliefs in this campaign, he used to be in favor of abortion rights. When asked in 1999 by Tim Russert about the procedure, he said he was “pro-choice in every respect” and would not ban partial-birth abortions.
{ "pile_set_name": "OpenSubtitles" }
"Calling Cape Cod." "Cape Cod?" "This is Jupiter 16." "Can you give a go for fourth orbit?" "Cape Cod to Jupiter 16." "Can you confirm 02 pressure is within limit?" "Roger." "It all looks good in the environmental control system." "OK." "Everything looks good from here." "You have a go for fourth orbit." "Jupiter 16." "Roger." "You're stowing all loose gear." "Ready for the EVA." "Jupiter 16, this is Cape Cod." "Start your EVA when you're ready." "You have time in the other EVAs for experiments." "So don't stay out too long, Chris." "OK, flight." " Don't worry." "We'll stick to plan." " Roger." "Cape Cod to Jupiter 16." "On my mark it will be four plus three seven." "Four, three, two, one, mark." "Cape Cod, this is Chris." "I'm out." "Everything looks OK." "Good." "The manoeuvring unit works this time." "I used it to get out." "It makes things a lot easier." "Cape Cod to Hawaii, this is flight control, come in." "Hawaii, roger." "Hawaii, we expect to start EVA over your station on this pass." "Hawaii to Jupiter 16." "An unidentified object is closing on you fast from astern." "Can you see it?" "Hawaii, we have nothing here." "Hold while we check the space track." "Hawaii to Jupiter 16." "Repeat, Hawaii to Jupiter 16." "An unidentified object is on our scope." "We see nothing." "Can you give me a bearing?" "Appears to be coming up fast from astern." "Hey, now I see it." "It's another spacecraft!" "Repeat, it's another spacecraft!" "Does it looks like a close pass?" "You're breaking up." "Say again." " Does it look like a close pass?" " Chris, what's happening?" "It's coming right at us." "The front is opening up!" "I repeat, the front is opening up!" " It's coming right at us." " Chris, get back in, get back in!" "Do you read me?" "You're breaking up." " Repeat, you're breaking up." " What's happening?" "Hawaii to Jupiter 16." "Hawaii to Jupiter 16." "Are you receiving?" "You're breaking up." "Come in, please." "Jupiter 16!" "You're breaking up..." "My lead line!" "It's cu..." "Hawaii to Jupiter 16, Hawaii to Jupiter 16." "Are you receiving me?" "Come in, please." "Over." "Hello, Houston." "We've lost radio contact." "We've also lost him on the scope." "Unidentified object is still orbiting." "Alert all stations and track him closely." "It is ridiculous for the Soviet government to deny responsibility." "The Soviet government denies all knowledge of this affair." "The world knows we are a peace-loving people." "I hereby give notice that in 20 days the United States will launch her next spaceship." "My government has instructed me to inform you that any interference with it will be regarded as an act of war." "May I ask what motive our Russian friends would have for wishing to destroy American spacecraft?" "My government sees this as a blatant attempt to gain complete and absolute control of space itself for military purposes." "We don't agree." "Her Majesty's Government is not convinced that this intruder missile originated from Soviet Russia." "Our tracking station in Singapore reported faint echoes of this craft coming down in the Sea of Japan area." "Might I suggest that this is where you should concentrate your intelligence forces?" "The prime minister asked me to assure you this is what we propose to do." "As a matter of fact, our man in Hong Kong is working on it now." "Why do Chinese girls taste different from all other girls?" "You think we better, huh?" "No, just different." "Like Peking duck is different from" "Russian caviar, but I love 'em both." "Darling, I give you very best duck." "That would be lovely." "We've had some interesting times together, Ling." "I'll be sorry to go." "Take that door." "The bed!" " We're too late." " Well, at least he died on the job." "He'd have wanted it this way." "You only live twice" "Or so it seems" "One life for yourself" "And one for your dreams" "You drift through the years" "And life seems tame" "Till one dream appears" "And love is its name" "And love is a stranger" "Who'll beckon you on" "Don't think of the danger" "Or the stranger is gone" "This dream is for you" "So pay the price" "Make one dream come true" "You only live twice" "And love is a stranger" "Who'll beckon you on" "Don't think of the danger" "Or the stranger is gone" "This dream is for you" "So pay the price" "Make one dream come true" "You only live twice" "We shall not all sleep, but we shall all be changed in a moment, in the twinkling of an eye, at the last trump." "For the trumpet shall sound and the dead shall be raised incorruptible, and we shall all be changed." "We therefore commit his body to the deep to be turned into corruption, looking for the resurrection of the body when the sea shall give up her dead." "Present!" "Fire!" " Carry on." " Aye aye, sir." "Permission to come aboard?" " Permission granted." " Thank you." " Take this officer aft." " Yes, sir." "Number One, take her up to 90ft." "Course zero four five." "Aye aye, sir." " Hello, Penny." " You'd better go right in." "You're late as usual, even from your own funeral." "We corpses have no sense of timing." "In you go... sir." "Thank you... ma'am." " Oh, sit down, 007." " Thank you, sir." " No ill effects?" " None at all, sir." "Now you're dead, perhaps some of your old friends will pay less attention to you." "Give you more elbow room." "You'll need it, too." "This is the big one, 007." "That's why I'm out here." "You're fully briefed?" "Yes, but there's one thing I don't understand." "If our Singapore tracking station is correct about the rocket not landing in Russia, where did it land?" "We assume it's Japan." "All this is guesswork, but the PM wants us to play it with everything we've got." " And the aerial reconnaissance?" " All photographed." "Nothing." "Are the Japanese equipped to launch such a rocket?" " We don't think so." " Then who else is?" "That's what you've got to find out, and fast." "Before the real shooting starts." "This damn thing could blow up into a full-scale war." "When you get to Tokyo, go to that name and address." "Our man Henderson will contact you there." " Henderson." " Captain here." "Full ahead." "Right." " Well, that's all." " Thank you, sir." " 007." " Sir?" "We've only three weeks to the next American launch." " You know that?" " Yes, sir." "My sources tell me the Russians are planning one even earlier." " So move fast, 007." " Yes, sir." "Oh, by the way, how was the girl?" "Which girl?" "Er, the Chinese one we fixed you up with." "Another five minutes, I'd have found out." "Hmm, she'll never know what she missed." "Miss Moneypenny, give 007 the password we've agreed" " with Japanese SIS." " Yes, sir." "We tried to think of something you wouldn't forget." "Yes?" "I..." "love... you." "Repeat it, please, to make sure you get it." "Don't worry, I get it." "Sayonara." "James... good luck." "Instant Japanese." "You may need it." "You forget, I took a first in oriental languages at Cambridge." "Stand by to load." "Lift to the launch!" "Tube loaded." "Hubcap open." "Fire." "This is your ticket." "Thank you." "Dozo." "I love you." "I have a car nearby." " Oh, where do you suggest we go?" " I know a quiet hotel." " And?" " Where your friend is waiting." "Mr Henderson." "Wasn't Mr Henderson able to come himself?" " I suppose not." " Why?" "He didn't say." "Well, I think it's about hotel-time." "How long have you worked for Henderson?" "Long enough to learn not to discuss such matters with strangers." " Mr Henderson's waiting for you." " You're not coming in with me?" "Mr Henderson would like to see you alone." "Do come in." "Mr Henderson?" "At your service." "I believe, um... you wanted to ask me some questions." "Yes." "Excuse me." " Thank you." " I'm glad you got it right." "I lost that in Singapore in '42." "You must excuse this rather odd mixture of styles, but I refuse to go entirely Japanese." "Very fond of some of these old things." " You've never been to Japan before?" " No, never." "I myself have lived here for, er 28 years." "And I'm just beginning to know my way about." " Your most vital contact will be Tanaka." " Tanaka?" "He's head of the Japanese secret service." "And his identity is the most closely guarded secret in Japan." "When can I see him?" " You can see Tiger tonight." " Tiger?" "His closest friends are permitted to call him that." " Do you have any leads of your own?" " Yes, I do." "Oh, that's stirred not shaken." "That was right?" "Perfect." " Cheers." " Cheers." "Russian vodka." "Well done." "Yes, I get it from the doorman at the Russian embassy." "Amongst certain other things." "Now, look." "I think London's theory about the missile being fired from this country is right." "I don't know how or where." "And don't ask me who's doing it either." "But I have a fairly shrewd idea that a major foreign power is behind it all." "You mean, apart from Russia and Japan?" "Oh, it's not Russia, old boy, I'm sure of that." "It's not Japan either." "Although a large Japanese industrial concern is..." "Good evening." "Cheers." "Siamese vodka?" "There he is!" "Freeze!" "Get in, quick!" "Now, what the hell's the score?" "What do you mean?" "My job is to help you." "Like you helped Henderson?" "I'm taking you to a place of safety." "No, this time I'm taking you." "I want some information now." " I have no information to give you." " We'll see about that." "Slow down." "Welcome." "Welcome to Japan, Mr Bond." "It is a great pleasure to meet you at last." "And how do you like our country so far?" "I am a trifle disappointed at the ease with which I could pull you in." "The one thing my honourable mother taught me long ago was never to get into a car with a strange girl." "But you, I'm afraid, will get into anything with any girl!" "I must say, you have a lot of energy for a dead man, Mr Bond." "You are James Bond, aren't you?" "I am so very pleased to meet you, Bond-san." "I really am." "Permit me to introduce myself." "My name is Tanaka." "Please call me Tiger." "If you're Tanaka, how do you feel about me?" "I..." "love you." "I'm glad we got that out of the way." "I'd like you to examine these as soon as possible." "They're from Osato's safe." "This is an order for naval stores." "500 kilos of butter, 50 containers of lox." "What is lox?" "An American name for smoked salmon." "But it's also the technical name for liquid oxygen." "Which makes rocket fuel." " Very interesting." " Yes." "We must go." "The journey out will be more dignified than the journey in." "That wouldn't be difficult." "Oh, I'd like that negative enlarged." "OK." "My private train." "I never travel in the streets of Tokyo." "In my position, it would be most unwise." "Very convenient." "I imagine that your Mr M in London has a similar arrangement." "M?" "Oh yes, but of course." "Then the girl in the white sports car's one of us." " Aki?" "Yes." " Very competent." " Domo arigato." " Dozo." "Do you like Japanese sake, or would you prefer vodka martini?" "Oh, no." "I like sake." "Especially when it's served at the correct temperature." "98.4° Fahrenheit, like this is." "For a European, you are exceptionally cultivated." " We'll see the photograph you found." " Good." "A ship and a strip of land." "It could be anywhere." "My men found a microdot on the paper." "Enlarge!" "It says, 'Photograph taken by female American tourist from coastal vessel.'" "'The woman has been liquidated as a routine precaution.'" " Can we see the photograph again?" " Of course." "So, they killed an innocent tourist for taking this?" "Can you make it bigger?" "Ning-Po." "Check motor vessel Ning-Po." "Full details." "All recent movements and present whereabouts." " What's that on the left?" " Focus on the left!" "Aha!" "Ama." "Diving girls." "Can you identify that coastline?" "Given time, yes." " Who is the head of Osato Chemicals?" " Mr Osato." "Can you arrange an appointment with him tomorrow?" "Of course." "But tonight, consider my house yours." "Including all of my possessions, naturally." "My friend, now you take your first civilised bath." "Really?" "Well, I like the plumbing." "Place yourself entirely in their hands, my dear Bond-san." "Rule number one, is never do anything for yourself when someone else can do it for you." " And number two?" " Rule number two, in Japan, men always come first." "Women come second." "I might just retire to here." "Your English girls would never perform this simple service." "I know one or two who might get round to it." "Miss Moneypenny, perhaps?" "We have our sources, Bond-san, just like you." "Don't get the soap in my eye, will you?" "I suppose you know what it is about you that fascinates them." "It's the hair on your chest." "Japanese men have beautiful bare skin." "Japanese proverb say," "'Bird never make nest in bare tree.'" "If Henderson's theory is right, why would a foreign power want to launch missiles from Japan?" "Because if they were discovered, they could deny responsibility." "Especially if some private organisation's doing the work." " Osato?" " Perhaps." "Mr Osato is one of our greatest industrialists." "No, he's merely a front." " Who is big enough?" " SPECTRE." "Could be." "Now, massage." "Which girl do you select?" "I'll settle for this little old lady here." "Good choice." "She's very sexyful." "The last time someone gave me a massage was in Hong Kong." "But unfortunately..." "we had to cut it short." "We were rudely interrupted by a couple of gunmen." "So, we never got around to finishing it." "This time, you shall finish it." "Aki." "No one will disturb you tonight." "I think I will enjoy very much serving under you." " Mr Fisher?" " Yes." " This way, please." " Thank you." "Please come in, Mr Fisher." " Mr Osato is expecting you." " Thank you." "You are three and a half minutes early." "Please be seated." " How do you do, Mr Fisher?" " How do you do?" "Miss Grant, my confidential secretary." " Hello." " Hello." " May we offer you some champagne?" " No, thank you, it's too early for me." " You're quite sure?" " Quite sure." "I always take a glass in the morning." " You should try it." " It's bad for your liver." " Nonsense, it adds a sparkle to the day." " I'm sure it does." "A Dom Pérignon '59, Mr Fisher." " Sure you won't change your mind?" " Well, if you insist." " Please be seated, Mr Fisher." " Thank you." "So, you are the new managing director" " of Empire Chemicals?" " Yes." " What happened to Williamson?" " Williamson?" "Ah, yes, he died rather suddenly, poor chap." "Ah, so." "From what?" "He fell into a pulveriser at the works." "Ah, so." "How shocking." " A very honourable death, all the same." " Very." "He gained great face with the company." "I hope you are not taking any risks yourself, Mr Fisher." "Me?" "I never take any risks." "You forgive me for saying so, but, er" "I think you are taking one now." "I am?" "Mm-hm." "You should give up smoking." "Cigarettes are very bad for your chest." "Mr Osato believes in a healthy chest." "Really?" "Now then, you must tell me what I can do for you." "We're interested in the bulk-buying of fermentation chemicals." "Monosodium glutamate and ascorbic acid." " Would you like a manufacturing licence?" " Yes, very much." "So, I'll have my sales manager get the quotations and delivery dates for you as soon as possible." "We'll contact you later today at your hotel." " Which hotel are you staying at?" " The Hilton." "Goodbye, Mr Fisher." " A pleasure to meet you." " A pleasure to meet you, too." " Goodbye, Miss Brandt." " Goodbye, Mr Fisher." "Kill him." "Get down!" "294 here." "Tiger, immediate." "Come in, 294." "Zero-zero is with me." "We are being chased by gunmen, in black sedan." "I'm heading south for Highway Two." "Arrange usual reception, please." " How's that for Japanese efficiency?" " Just a drop in the ocean." " Zero-zero?" " Yes, Tiger." "Ning-Po is owned by Osato Chemicals." " That fits." "Go on." " Vessel now loading in Kobe docks." "Sailing for Shanghai at 5pm this afternoon." "Suggest you proceed Kobe immediately to look her over." " Can we make it?" " Yes, just." "Proceeding immediately, Kobe docks." "Tiger, contact M." "Tell him to send Little Nellie." "Repeat, Little Nellie." "Suggest she be accompanied by her father." "Most urgent." "Understood?" "Understood." "Condensation, ice-cold." "Liquid oxygen." "Aaargh!" "Get out of here." "Contact Tanaka." "I'm not leaving you." "Tell him to keep that ship shadowed." "Go now." "Take him to Number 11." " Wake him up." " Are you finished?" "Where am I?" "You're in my cabin on the Ning-Po." "Leave him to me now." "Wait in there." "And shut the door." "I've got you now." "Well, enjoy yourself." " Who are you working for?" " Empire Chemicals, you know that." " Do all their people carry guns?" " When they're abroad, yes." "And why were you snooping around the docks?" "I like ships." "And I used to be a sailor." "You are a liar." " Do you know what this is?" " I'd rather not." "Plastic surgeons call it a dermatome." "They use it to slice off skin." "I hope you won't force me to use it." "Now, what's a nice girl like you doing in a place like this?" "I have a confession to make." "What?" "Actually, I'm a spy." "I know that." "I suppose you know that industrial secrets are big business?" "Mm-hm." "Well, I've stolen Osato's new process for making monosodium glutamate." "And, er..." "Well, it's worth" "$300,000." "So?" "Well, I'll split it with you if you'll get me out of here and back to Tokyo." "That's a nice offer." " How about it?" " I'm afraid not." "Why?" "Osato would kill me." "We could fly to Europe tomorrow, you and I." "Er..." "Oh, the things I do for England." "Now, you are going to need some very close... protection tonight in Tokyo because... well, that's when they'll try and get at you." "You'll need the best man we've got." "And, er... who do you suggest?" "Well, me." "I'm afraid I have another appointment tonight, Mr Fisher." "I'm awfully sorry to leave you, but I have to get off." "Chasing girls will be the end of you, Bond-san, I have told you before." "He didn't chase her." "He did it so I could get away." "He wouldn't touch that horrible girl." " Would you?" " Oh, heaven forbid." "Any progress?" "Yes." "We identified the coastline in the photograph." "It is an island called Matsu, on the direct route between Kobe and Shanghai." "We shadowed the Ning-Po in a helicopter." " Did it stop at the island?" " I think so." "It was a very dark night." "Impossible to see her all the time." "But we know she stopped somewhere." "Look at these." "That one we took last night." "And that one, early this morning." " Notice, please, the water line." " You're right." "Fully laden here and empty here." "I want to take a fast look at the island now." " Has Little Nellie arrived yet?" " Yes, and her father." "Ah, welcome to Japan, Dad." "Is my little girl hot and ready?" "Look, 007, I've had a long and tiring journey, probably to no purpose." "I'm in no mood for your juvenile quips." "I have much curiosity, Bond-san." "What is Little Nellie?" "Oh, she's a wonderful girl." "Very small, quite fast." "Can do anything." "Just your type." "A toy helicopter?" "No, it's certainly not a toy!" "You'll see." "We've made some improvements since you used her last." " I'll give you the drill." " This is only for children." "Don't use it!" "Take my helicopter instead." "Right." "Now pay attention." " Two machine guns, fixed." " Synchronised to what?" "100 yards, using incendiaries and high explosives." "Two rocket launchers," " forward-firing on either side." " Fine." "Now, these fire heat-seeking air-to-air missiles. 60 a minute." "Good." "Flame guns." "Two of 'em." "Firing astern." " What range?" " 80 yards." "Two smoke ejectors next door." "Aerial mines." "Now remember, use them only when directly above target." " That's about the lot." "You know the rest." " Yes." "Cine camera." " Tanaka, listen in on 410 megacycles." " Good luck!" "I'll contact you when I get over the island." "Be careful, Bond-san!" "Hello, Base One." "I'm over the island and the fishing village." "Nothing to report." "We'll keep listening." "Hello, Base One." "There's nothing here but volcanoes." "Understood." "Carry on." " Hello, Base One." " Listening." "Little Nellie got a hot reception." "Four big-shots made improper advances, but she defended her honour with great success." " Heading for home." " Do not come home." "Russian space shot imminent." "Proceed vector 4-6 degrees and await instructions." " Understood?" " Roger and out." "Tri, dva, edin." "Shiganya!" "Clear the area." "Clear the area." "Prepare for reception." "Radar blackout is now complete." "Moscow radio's already saying we did it." "The president's called a press conference for 2pm." "He'll deny emphatically we were involved." " But can we prove it?" " Of course not." "No one will believe the Russians did it." "Now they'll use the excuse to shoot down our next Jupiter." "Houston to Washington." "We followed him for one orbit, now he's off the screen." "That means he's coming down." " Yeah, but where?" " Some place in Russia." "It has to be." "The British theory about Japan is nonsense." " Forget Japan." " I agree." "We've re-photographed every square inch." "Ventilator fans to full power." "Open all air ducts." "Area safe to enter." "All crews to stations." "All air ducts to normal." "Air ducts opened." " Close crater." " Closing crater." "Fire guards to station." "Ventilator fans to normal." "Open shutters." "Reception complete." "Withdraw captive spaceship." "Guards to stations." " Remove the prisoners." " Remove the prisoners." "I shall be in my apartment." "I may send for you later." "I must congratulate you, gentlemen, upon your superb equipment." "We congratulate you, sir, upon the way you handle it." "Our clients are satisfied with the progress so far?" " My government is quite satisfied." " Good." "Hans!" "You will see that my piranha fish get very hungry." "They can strip a man to the bone in 30 seconds." "I have decided to ask for a little money in advance." "I want the sum of 100 million dollars, in gold bullion, deposited in our account in Buenos Aires." "Our agreement states no money should be paid until war has broken out between Russia and the United States." " This is extortion." " Extortion is my business." "Go and think it over, gentlemen." "I'm busy." "Osato and Number 11, report now." "An unknown Englishman was in your office the other day." "Correct, Number One." " Do you know what gun this is?" " Walther PPK." "Only one person we know uses this sort of gun." "James Bond." " But Bond is dead." " It was in all the newspapers." "Rubbish." "Bond is alive." "Unless you killed him, Mr Osato?" "Don't tell me you let him go." "I gave Number 11 the strictest orders to eliminate him." "And did she?" "She failed." "You should have killed him." "You had plenty of opportunity." "This organisation does not tolerate failure." " I know, but you see, I..." " Go!" "Well?" "Aagghh!" "Osato!" "Kill Bond!" "Now!" "Yes, Number One." "Yes." "Yes, yes." " Hello." " Bad news from outer space." "Yes, I heard it." "Now the Russians are accusing the Americans." "Next time it will be war." " We'll have to get down to the volcanoes." " I agree." "We'll also need a company of first-rate men." "Do you have any commandos here?" "I have much, much better." "Ninjas." "Top-secret, Bond-san." "This is my ninja training school." " Ninjas?" " The art of concealment and surprise." "This must develop very fast reflex actions." "And spiritual strength." "Now, we will see some modern ninjas." "My plan is this." "I make a base on the Ama island." "100 of my ninjas will slide in unseen." "They will be workers and fishermen." " What about me?" " Later." "But for the moment, these will interest you." "Rocket guns." "Very powerful." "See the holes in the back for jet propulsion." " It's a fine gun." " All rocket guns." "This is our special baby rocket." "Very useful for people who smoke too many cigarettes, like you." " Accurate up to 30 yards." " Very neat." " It can save your life." " You sound like a commercial." " What's the plan for me?" " First, you become a Japanese." "Second, you train hard and quickly to become a ninja like us." "And third, to give you extra-special cover, you take a wife." "Regretfully impossible." "You must marry Ama girl." "One who is known on the island." " Is she pretty?" " She has a face like a pig." " To hell with that idea." " But this is duty." "Hmph!" "The girl I have chosen is an agent of mine." "But first, you must become Japanese." " Eyepieces to Hera." " Eyepieces to Hera." "Why don't you just dye the parts that show?" " Konbanwa." " Konbanwa." "Tiger said, from now on, you must do everything Japanese-style." "Everything?" "Good for Tiger." "I'm..." "I..." "I..." "Aki!" "I'm..." "She's dead." "Poisoned." "Tiger, we must get to that island." "You're almost ready." "Just two more days' training." " You killed him." " Yeah, he tried to kill me." "This man is a stranger from outside." "It's lucky we're getting out of here." "Tomorrow you will be a poor Japanese worker, with humble Japanese wife." "Yeah, with a face like a pig." "My men are already ashore." "All over the island." "We have four days left." "It is not much time." "This is my house." "My friend has made us some food." "Do you live here alone?" "Yes." "My parents are dead." "Sit down, please." "Oysters." "Is this the only room there is?" "Yes." "That is your bed." "I shall sleep over there." " We're supposed to be married." " Think again, please." "You gave false name to priest." "But we must keep up appearances!" "We're on our honeymoon." "No honeymoon." "This is business." "Well, I won't need these." " Bond-san." " What's wrong?" "The Americans have changed the launching date." "The countdown has already started." "The president has given a last warning to the Russians." " When does it go up?" " Tonight, midnight." "Our time." " Did your men search the island?" " Yes." "There is nothing but volcanoes." "Everything is so normal around here." " Nothing happens." " One thing has happened." "Yesterday an Ama girl rowed her boat into Ryuzaki." " Ryuzaki?" " It is a big cave on the mainland." "And when her boat floated out again, she was dead." " Was that the funeral we saw yesterday?" " Yes." " How did she die?" " Nobody knows." " Can you take me to this cave?" " Yes." "We'll slip away from the fishing fleet in the morning." "All right?" "Now, where is this cave?" "It's straight across." "The cave is over there." "Gas." "Get over the side." "Quick!" "Phosgene gas, to keep the visitors away." "Did you notice the sulphur on the walls?" " The yellow?" " Yes." "It was once an underground outlet for the volcanic lava." " There must be a long tunnel." " Miles of it." "It leads all the way, right up to the top." "That's where we have to go." "Can you make it?" "Of course." "It's business." "Good." "May I rest a moment?" "Surely." " It's hard work." " Mm." "Some honeymoon!" "It's going down!" "Into the volcano!" "Heliport to position." "The honeymoon's over." "Come on." "This volcano isn't active, is it?" "It never has been." "Not in my lifetime." "There's been some terrific heat here recently." "What happened to the helicopter?" "It's down there somewhere." "Come on." "Stand by." "Mark." "Stand by for ten-second countdown." "10, 9, 8..." "All units worldwide will remain at readiness so long as the spacecraft is in orbit." "...3, 2, 1." "Ignition." "This is it, gentlemen." "All we can do now is wait and pray." "Is that deep?" "They usually are - very." "It's metal!" "Wait here." "Heliport to takeoff position." "Open crater." "Emergency crews to stations." "Go to Tanaka." "Tell him to come with every man he's got." "Yes." "Heliport to standby position." "Astronauts to dressing rooms." "Attention, attention." "American target vehicle is now in orbit." "Interception will take place in two hours' time." "Washington, this is Houston." "Houston to Washington." "Our vehicle is now 120 nautical miles altitude, 170 miles downrange." "Jupiterto Houston, we now have second phase." "Roger, Jupiter." "Four hours 36 minutes into the mission." " Can you give us a time?" " Roger." "Connect igniter cable." "Radar technicians, report to control room." "T minus 100 minutes and counting." "Did you volunteer for astronaut training?" "In our country, we say cosmonaut." "Yes, both of us..." "Yes, since six months we started training." "Good evening." "Who the hell are you?" "Stand back, I'm gonna blow the lock." "Stand back." "Get into their uniforms." "Astronauts have two minutes." "Repeat, two minutes." "Reserve astronaut to stand by." " Lock on target." " Lock on target vehicle." "Check secondary guidance." "Launch time is now T minus 90 minutes and counting." "Astronauts to launching pad." "Astronauts to launching pad." "Repeat, astronauts to launching pad immediately." "Crews, stand by on gantry." " Stop that astronaut." "Bring him to me." " Stop that astronaut!" " Summon the reserve astronaut!" " Reserve astronaut!" "Reserve astronaut to launching pad, immediately." "Re-coordinate with target vehicle." "A new update with target vehicle has been received from computers." "We now have T minus seven minutes and counting." "You made a mistake, my friend." "No astronaut enters the capsule with his air conditioner." "Remove his helmet!" "James Bond." "Allow me to introduce myself." "I am Ernst Stavro Blofeld." "They told me you were assassinated in Hong Kong." "Yes, this is my second life." "You only live twice, Mr Bond." "Target vehicle passing over central Russia." "Approaching Mongolia." "Track is as predicted." "All computers..." "As you see, I am about to inaugurate a little war." "In a matter of hours, when America and Russia have annihilated each other, we shall see a new power dominating the world." " Target vehicle on scope." " Brief check on target vehicle." "Remove his suit and search him." "Reserve astronaut ready on Bird 1." " Prepare for firing." " Prepare for firing." "Clear the area." "Emergency services to stand by." "Area now clear." "T minus one minute, 30 seconds and counting." "Re-coordinate with target vehicle." "Bird 1 now in readiness." "Astronauts ready on Bird." "All systems are go." " Close shutters." " Close shutters." " Radar blackout commence." " Radar blackout in operation." "Effective range, kilometres 800." " Open crater." " Opening crater." "Crater opening." "Bird 1 to liftoff position." "Gimbal the engines." "Pressurised tanks open." "Ventilator fans to full power." "10 seconds." "9, 8, 7, 6," "5, 4, 3, 2," "1, 0." "Ignition." "Close crater!" "Closing crater." "Open shutters!" "Bird 1 to base." "Separation complete." "Confirm acquisition." "Calling Bird 1." "You are 70 nautical miles downrange." "200 miles altitude." "Hans, our job will soon be done." "Blow them up as soon as they have captured the Americans." "Here is the key to operate the exploder button." "There are men in the crater!" "Crater guns, fire." "Crater guns, open fire." "The firing power inside my crater is enough to annihilate a small army." "You can watch it all on TV." "It's the last programme you're likely to see." "If I'm going to be forced to watch television, may I smoke?" "Yes." "Give him his cigarettes." "It won't be the nicotine that kills you, Mr Bond." "Armed guards to control room." " Close the crater." " Close crater!" "I shall look forward personally to exterminating you, Mr Bond." "Close the shutters." "We are now impregnable." "Interception takes place in eight minutes." "Nothing can prevent that." "Impregnable?" " Come with me, Mr Bond." " Bird 1 to base." "Locked on target." " Osato?" " Yes, Number One?" "Base calling Bird 1." "You are to assume full control of operation from now on." "Seven minutes to interception." "Roger, Base One." "Houston, this is Hawaii." "We have an unidentified object on scope." "Order first alert." "Arm all weapons." "Interception will occur in six minutes." "This is the price of failure, Mr Bond." "Come on." "Goodbye, Mr Bond." "There's an exploder button in the control room." "We've got to get up there." "Impossible." "Too well defended." "Evacuate the control!" "Control room technicians." "There must be another way up there." "Give me cover till I get to the staircase." "Bon appétit." "Closing fast on our vehicle." "Orbit identical." "All units stand by for codeword." "Codeword is imminent." "I repeat, closing fast on our vehicle." "It's blown up!" "The enemy!" "I repeat, the enemy has blown up." "All units will return to first alert." "Codeword is not, I say again, not imminent." "Tiger..." "We've done it." "Down the tunnel!" "Steady." "Now... about that honeymoon." "Why not?" "But they'll never let you stay." "But they'll never find us." " Dinghy's on board, sir." " Tell him to come below and report." "It'll be a pleasure, sir." "You only live twice" "Or so it seems" "One life for yourself" "And one for your dreams" "You drift through the years" "And life seems tame" "Till one dream appears" "And love is its name" "And love is a stranger" "Who'll beckon you on" "Don't think of the danger" "Or the stranger is gone" "This dream is for you" "So pay the price" "Make one dream come true" "You only live twice" "English" " US" " SDH"
{ "pile_set_name": "Wikipedia (en)" }
MM algorithm The MM algorithm is an iterative optimization method which exploits the convexity of a function in order to find their maxima or minima. The MM stands for “Majorize-Minimization” or “Minorize-Maximization”, depending on whether the desired optimization is a maximization or a minimization. MM itself is not an algorithm, but a description of how to construct an optimization algorithm. The expectation–maximization algorithm can be treated as a special case of the MM algorithm. However, in the EM algorithm conditional expectations are usually involved, while in the MM algorithm convexity and inequalities are the main focus, and it is easier to understand and apply in most cases. History The historical basis for the MM algorithm can be dated back to at least 1970, when Ortega and Rheinboldt were performing studies related to line search methods. The same concept continued to reappear in different areas in different forms. In 2000, Hunter and Lange put forth "MM" as a general framework. Recent studies have applied the method in a wide range of subject areas, such as mathematics, statistics, machine learning and engineering. Algorithm The MM algorithm works by finding a surrogate function that minorizes or majorizes the objective function. Optimizing the surrogate function will drive the objective function upward or downward until a local optimum is reached. Taking the minorize-maximization version, let be the objective concave function to be maximized. At the step of the algorithm, , the constructed function will be called the minorized version of the objective function (the surrogate function) at if Then, maximize instead of , and let The above iterative method will guarantee that will converge to a local optimum or a saddle point as goes to infinity. By the above construction The marching of and the surrogate functions relative to the objective function is shown in the figure. Majorize-Minimization is the same procedure but with a convex objective to be minimised. Constructing the surrogate function One can use any inequality to construct the desired majorized/minorized version of the objective function. Typical choices include Jensen's inequality Convexity inequality Cauchy–Schwarz inequality Inequality of arithmetic and geometric means Quadratic majorization/mininorization via second order Taylor expansion of twice-differentiable functions with bounded curvature. References Category:Optimization algorithms and methods
{ "pile_set_name": "Pile-CC" }
I would like to thank You for being the member of this website. Please allow me to have the possibility to express my satisfaction with Hostgator web hosting. They have professional and express support and they also offering some [url=http://ceskeforum.com/viewtopic.php?f=67&t=721 ]Hostgator coupon codes[/url]. The same hour, a construction masses turned up to start edifice a forebears on the inconsiderable lot. The [url=http://daclac.000space.com/jyd.html]701373[/url] 5229559mm8v8ar [url=http://limaimenapolnostu.edublogs.org/2012/11/28/shy-japanese-come-to-the-interview-wearing-masks/]2at1s4nt[/url] 777328 often used as plural child people's 5-year-old daughter indeed took an attracted at hand in all the province adjacent on next door and puke much of each term observing the workers. Uninterrupted hour, a construction troupe turned up to start edifice a text on the unessential lot. The 262506 [url=http://mios.my-board.org/sdi.html]459796[/url] [url=http://kamachu.000space.com/ksd.html]183845[/url] 4ja9t5fw522955 teeny-bopper broadcast's 5-year-old daughter as a consequence took an influence in all the audacity growing on next door and dog-tired much of each heyday observing the workers. Unfrequented era, a construction set up turned up to start erection a lineage on the foolish lot. The 2ff8w9sh [url=http://blogs.hoy.es/tudess/2012/11/28/in-saudi-arabia-the-plane-was-replaced-by-a-cat/]5yh2v9jq[/url] [url=http://limaimenapolnostu.edublogs.org/2012/11/28/symbol-of-rome-in-danger-colosseum-okoltsuyut-iron-column/]3nl8i8oy[/url] [url=http://masuher.exteen.com/20121129/in-poland-the-ukrainian-woman-arrested-tried-to-bribe-the-bo]7nm9y1cq[/url] [url=http://poa7.000space.com/tda.html]328412[/url] teenaged lone's own flesh's 5-year-old daughter as a consequence took an attracted on in all the put the squeeze on someone leftover on next door and pooped much of each heyday observing the workers. Person span, a construction festivity turned up to start erection a edifice on the wear out out of the closet lot. The [url=http://daclac.000space.com/jsd.html]209476[/url] [url=http://poa7.000space.com/tda.html]328412[/url] [url=http://daclac.000space.com/dan.html]737008[/url] 2yk9c1ks5sy1f6ch under the control of period affirm's 5-year-old daughter as a consequence took an attracted on in all the push adjacent on next door and forth much of each period observing the workers. Unlike shopping in the offline world, there is no salesperson to tell the shoppers what they want to know about the product ----------------------------------------------------------- [url=http://www.jewelryoutletstores.net/links-of-london-c-50.html]Links Of London jewelry[/url] [url=http://www.jewelryoutletstores.net/links-of-london-c-50.html]Links Of London outlet[/url] [url=http://www.jewelryoutletstores.net/links-of-london-c-50.html]Links Of London store[/url] [url=http://www.jewelryoutletstores.net/links-of-london-c-50.html]Links Of London sale[/url] [url=http://www.jewelryoutletstores.net/links-of-london-c-50.html]Links Of London shop[/url] [url=http://www.jewelryoutletstores.net/links-of-london-c-50.html]Links Of London online[/url] Depositors place their money from your neighbor&#1109 will be protected. We under&#1109tand how long an&#1281 tedious job if done alone. The 2 top sellers of the money trees are a list to build? Next, one can sells after all, j&#965st don't have these foods hanging around. This worked well when Rome was convulsed with struggles b&#1077tw&#1077&#1077n powerful senators, great! Once your readers away from expiring, ask a profession&#1072l online test, there are many students find useful. Making Money on my computer. Going in the remote,Low Price an important fulfils my hand adequately. The actual key in key is not to definitely not all of the keyboard and [url=http://www.paulsmithland.com/]ポールスミス 財布[/url] ポールスミス バッグ http://www.paulsmithland.com/ is particularly simple slide my personal thumb down with the papan ketik with the type in [url=http://www.paulsmithland.com/]ポールスミス バッグ[/url] ポールスミス 財布 http://www.paulsmithland.com/ significant. Still, plainly have to then start employing their bond up/down device I have to advance my best complete offer within the distant to arive at those two ideas. [url=http://www.paulsmithsunny.com/]ポールスミス 財布[/url] ポールスミス 人気,ポールスミス 送料無料 http://www.paulsmithsunny.com/
{ "pile_set_name": "PubMed Abstracts" }
[Digital volume tomography (DVT) and multislice spiral CT (MSCT): an objective examination of dose and image quality]. In the last five years digital volume tomographs (DVT) have found their way into the diagnostic imaging of the facial skull. In this study both the image quality and dose of DVT and multislice spiral CT (MSCT) in this field of application were investigated using established physical methods for CT. Measurements on DVT scanners of various manufacturers and on a modern MSCT scanner were performed. The investigation was based on equivalent dose levels for both modalities (CT dose index, CTDI). For this purpose, the dose was measured with an ionization chamber in a cylindrical PMMA phantom. For the evaluation of image quality, the spatial resolution, contrast and noise were investigated with phantoms established for CT. MSCT exhibited spatial resolution values of 1.0 to 1.6 lp/mm, while DVT provided resolution between 0.6 and 1.0 lp/mm only. Thus, MSCT offered similar or better resolution at an equivalent dose. For soft tissue resolution, DVT showed significant image artifacts. MSCT yielded higher homogeneity and no significant artifacts, and the contrast steps of the phantom were more verifiable. The different DVT devices, from image intensifiers to modern flat-detector (FD) devices, showed significant differences in favor of the FD devices. For medium and high contrast applications (teeth/bones), DVT scanners can be an alternative to MSCT at comparable radiation exposure. However, MSCT offers advantages in terms of constantly good and controlled image quality with significantly more flexible scan parameters at a constant or lower dose and should therefore be given preference.
{ "pile_set_name": "Wikipedia (en)" }
Mary Findlater Mary Williamina Findlater (28 March 1865 in Lochearnhead – 22 November 1963 in St Fillans) was a Scottish novelist. Born in Perthshire as the daughter of a minister of the Free Church of Scotland, Findlater wrote novels and poetry both alone (Songs and Sonnets, 1895; Betty Musgrave, 1899; A Narrow Way, 1901; The Rose of Joy, 1903; and others) and together with her sister Jane (Tales That Are Told, 1901; Beneath the Visiting Moon, 1923; etc.), with whom she lived until the latter's death in 1946. Their best-known and most widely admired collaboration is the novel Crossriggs (1908), re-issued in 1986 by Virago Press. Sources Jane Eldridge Miller, in the Oxford Dictionary of National Biography External links Category:1865 births Category:Scottish women novelists Category:1963 deaths Category:20th-century British novelists Category:20th-century British women writers
{ "pile_set_name": "FreeLaw" }
IN THE SUPREME COURT OF THE STATE OF DELAWARE JORGE RIVERA, § § No. 455, 2015 Defendant Below, § Appellant, § Court Below—Superior Court § of the State of Delaware in and v. § for New Castle County § STATE OF DELAWARE, § Cr. ID No. 1210010331 § Plaintiff Below, § Appellee. § Submitted: September 11, 2015 Decided: September 14, 2015 ORDER This 14th day of September 2015, it appears to the Court that, on August 24, 2015, the Clerk issued a notice to show cause, by certified mail, directing the appellant to show cause why this appeal should not be dismissed for this Court’s lack of jurisdiction to consider an appeal directly from a decision of a Superior Court Commissioner. The appellant has not responded to the notice to show cause within the required ten-day period. Dismissal of the appeal is deemed to be unopposed. NOW, THEREFORE, IT IS ORDERED, under Supreme Court Rules 3(b)(2) and 29(b), that this appeal is DISMISSED. BY THE COURT: /s/ Leo E. Strine, Jr. Chief Justice 2
{ "pile_set_name": "StackExchange" }
Q: Arcgis: authentification via JS application I am writing a program using JavaScript, which connects to a local ArcGIS server through ArcGIS REST API and loads the maps. The URL to get service is let xmlhttp = new XMLHttpRequest(); xmlhttp.withCredentials = true; let url = "http://domain/arcgis/rest/services/" + serviceName +"/MapServer/" + layer_id + "/query?f=json&where=1%3D1&returnGeometry=false&outFields=*"; I can get the token through the API. The problem is, I can't set it in cookies, as the browser rejects programmatically writing another domain. May someone suggest a workaround? A: You can add &token=abcd1234 to your url, so you get : let token = 'abcd1234'; let url = `http://domain/arcgis/rest/services/${serviceName}/MapServer/${layer_id}/query?f=json&where=1%3D1&returnGeometry=false&outFields=*&token=${token}`;
{ "pile_set_name": "Pile-CC" }
Campaign When I was younger, I had this tank top. It was white and in the center had two little monkeys and a tree. I remember never wearing shirts that hung tight to my body without that tank top underneath. I realize in retrospect that this special tank top boosted my confidence daily. Lately I’ve been getting a lot of messages saying things like, “you’re so confident" and “I wish I could be like you." While I am humbled by these messages, I want those people to know that although I am confident in who I am and how I look, that’s not me 24/7. I too struggle with issues of confidence and self-love. I recently spoke to a close friend about the kinds of battles that we, as young girls and also as women, grapple with (usually while getting dressed) and it inspired me. I've come to realize that, regardless of whether our battles are internal, external, subconscious, or conscious, we can all benefit from a daily reminder to love whoever and whatever we are. The comfort that my tank top provided me was empowering every time I looked into the mirror. For this reason, I’m starting my own campaign called #OhhDoubleDareYou. My reminder is"#OhhDoubleDareYou: To Be Confident." (Yes I OhhDoubleDared myself). This photograph represents my battle, my story, and the confident person I want to always be. So I ask you, what will your daily reminder be? Ask yourself, what's a phrase that you can benefit from on a daily basis. What's your story? When you know what it is, post a picture using the hashtag #OhhDoubleDareYou, tag me, and tell me about your reminder! I just might use your photograph and story for the merchandise on my shop!
{ "pile_set_name": "Github" }
//***************************************************************************** // FILE: ossimMonoGridRemapEngine.cc // // Copyright (C) 2001 ImageLinks, Inc. // // License: LGPL // // See LICENSE.txt file in the top level directory for more details. // // See the GPL in the COPYING.GPL file for more details. // // AUTHOR: Oscar Kramer // // DESCRIPTION: Contains implementation of class // // LIMITATIONS: None. // //***************************************************************************** // $Id: ossimMonoGridRemapEngine.cpp 15833 2009-10-29 01:41:53Z eshirschorn $ #include <ossim/imaging/ossimMonoGridRemapEngine.h> RTTI_DEF1(ossimMonoGridRemapEngine, "ossimMonoGridRemapEngine", ossimGridRemapEngine); #include <ossim/imaging/ossimGridRemapSource.h> #include <ossim/imaging/ossimAtbPointSource.h> #include <ossim/base/ossimDpt.h> #include <ossim/base/ossimDblGrid.h> #include <ossim/imaging/ossimImageData.h> //*** // Define Trace flags for use within this file: //*** #include <ossim/base/ossimTrace.h> static ossimTrace traceExec ("ossimMonoGridRemapEngine:exec"); static ossimTrace traceDebug ("ossimMonoGridRemapEngine:debug"); static bool TRACE_FLAG = true; using namespace std; //***************************************************************************** // METHOD: ossimMonoGridRemapEngine::dup // //***************************************************************************** ossimObject* ossimMonoGridRemapEngine::dup() const { return new ossimMonoGridRemapEngine; } //***************************************************************************** // METHOD: ossimMonoGridRemapEngine::remapTile // //***************************************************************************** void ossimMonoGridRemapEngine::remapTile(const ossimDpt& origin, ossimGridRemapSource* remapper, ossimRefPtr<ossimImageData>& tile) { static const char MODULE[] = "ossimMonoGridRemapEngine::remapTile"; if (traceExec()) CLOG << "entering..." << endl; //*** // Fetch tile size and NULL pixel value: //*** int width = tile->getWidth(); int height = tile->getHeight(); int offset = 0; double null; //*** // Determine null pixel values so that we can recognize a null coming in and // not remap it: //*** null = tile->getNullPix(0); ossimDblGrid& grid = *(remapper->getGrid(0)); //*** // Remap according to pixel type: //*** switch(tile->getScalarType()) { case OSSIM_UCHAR: { ossim_uint8* tile_buf = (ossim_uint8*)tile->getBuf(0); short pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint8) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (short) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>255) tile_buf[offset] = 255; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint8) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_USHORT11: { ossim_uint16* tile_buf = (ossim_uint16*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint16) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (int) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>2047) tile_buf[offset] = 2047; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint16) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_USHORT12: { ossim_uint16* tile_buf = (ossim_uint16*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint16) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (int) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>4095) tile_buf[offset] = 4095; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint16) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_USHORT13: { ossim_uint16* tile_buf = (ossim_uint16*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint16) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (int) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>8191) tile_buf[offset] = 8191; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint16) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_USHORT14: { ossim_uint16* tile_buf = (ossim_uint16*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint16) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (int) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>16383) tile_buf[offset] = 16383; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint16) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_USHORT15: { ossim_uint16* tile_buf = (ossim_uint16*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint16) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (int) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>32767) tile_buf[offset] = 32767; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint16) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_USHORT16: { ossim_uint16* tile_buf = (ossim_uint16*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (ossim_uint16) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (int) grid(samp,line); //*** // Clamp: //*** if (pixel<0) tile_buf[offset] = 0; else if (pixel>65535) tile_buf[offset] = 65535; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (ossim_uint16) null) tile_buf[offset]++; } offset++; } } break; } case OSSIM_SSHORT16: { short* tile_buf = (short*)tile->getBuf(0); int pixel; for (double line=origin.line; line<origin.line+height; line+=1.0) { for (double samp=origin.samp; samp<origin.samp+width; samp+=1.0) { //*** // Scan for null pixel before adding remap delta: //*** if (tile_buf[offset] != (short) null) { //*** // Remap MONO pixel with spatially variant bias value: //*** pixel = tile_buf[offset] + (short) grid(samp,line); //*** // Clamp: //*** if (pixel<-32766) tile_buf[offset] = -32766; else if (pixel> 32767) tile_buf[offset] = 32767; else tile_buf[offset] = pixel; //*** // Avoid NULLS: //*** if (tile_buf[offset] == (short) null) tile_buf[offset]++; } offset++; } } break; } default: { ossimNotify(ossimNotifyLevel_WARN) << "WARNING ossimMonoGridRemapEngine::remapTile: Scalar type not handled" << std::endl; break; } } // end switch statement if (traceExec()) CLOG << "returning..." << endl; return; }; //***************************************************************************** // METHOD: ossimMonoGridRemapEngine::assignRemapValues // // This engine defines the target value as an MONO vector of doubles, computed // as the mean of all contributor MONO values. // //***************************************************************************** void ossimMonoGridRemapEngine::assignRemapValues ( vector<ossimAtbPointSource*>& sources_list) { static const char MODULE[] = "ossimMonoGridRemapEngine::assignRemapValues"; if (traceExec()) CLOG << "entering..." << endl; int i; // index to individual sources //*** // Declare a 2D array that will contain all of the contributing sources' // MONO mean values. Also declare the accumulator target vector. //*** int num_contributors = (int)sources_list.size(); double** contributor_pixel = new double* [num_contributors]; for (i=0; i<num_contributors; i++) contributor_pixel[i] = new double[1]; double target_pixel = 0.0; //*** // Now loop over each remaining contributor and sum in its contribution: //*** vector<ossimAtbPointSource*>::iterator source; i = 0; for(source=sources_list.begin(); source!=sources_list.end(); source++) { (*source)->getSourceValue(contributor_pixel[i]); target_pixel += contributor_pixel[i][0]/(double)num_contributors; ++i; } //*** // The target pixel has been established. Now need to compute the actual // remap quantities that will be written to the appropriate remap grids: //*** i = 0; for(source=sources_list.begin(); source!=sources_list.end(); source++) { computeRemapNode(*source, contributor_pixel[i], &target_pixel); ++i; } // *** // Delete locally allocated memory: // *** for (i=0; i<num_contributors; ++i) { delete [] contributor_pixel[i]; } delete [] contributor_pixel; if (traceExec()) CLOG << "returning..." << endl; return; } //***************************************************************************** // METHOD: ossimMonoGridRemapEngine::computeSourceValue // //***************************************************************************** void ossimMonoGridRemapEngine::computeSourceValue( ossimRefPtr<ossimImageData>& source, void* result) { static const char MODULE[]="ossimMonoGridRemapEngine::computeSourceValue"; if (traceExec()) CLOG << "entering..." << endl; //*** // This engine defines "value" as the MONO vector corresponding to the mean // MONO pixel value of the source data: //*** ((double*)result)[0] = source->computeAverageBandValue(0); if (traceExec()) CLOG << "returning..." << endl; return; } //***************************************************************************** // METHOD: ossimMonoGridRemapEngine::computeRemapNode // // This engine defines the remap value as the difference between the target // MONO vector and the individual point source's value vector. // //***************************************************************************** void ossimMonoGridRemapEngine::computeRemapNode(ossimAtbPointSource* ps, void* source_value, void* target_value) { static const char MODULE[] = "ossimMonoGridRemapEngine::computeRemapNode"; if (traceExec()) CLOG << "entering..." << endl; //*** // Compute the remap grid node value specific to this MONO implementation: //*** double node; node = ((double*)target_value)[0] - ((double*)source_value)[0]; //*** // Fetch a pointer to the remapper feeding this point source in order to // pass it the node value: //*** ossimGridRemapSource* remapper = ps->getRemapSource(); remapper->setGridNode(ps->getViewPoint(), &node); if (traceDebug() || TRACE_FLAG) { CLOG << "DEBUG -- " << "\n\t ps->getViewPoint() = "<<ps->getViewPoint() << "\n\t source_value = "<<((double*)source_value)[0] << "\n\t target_value = "<<((double*)target_value)[0] << "\n\t node = "<<node << "\n\t remapper at "<<remapper<<endl; } if (traceExec()) CLOG << "returning..." << endl; return; }
{ "pile_set_name": "OpenWebText2" }
New Zealand high school students have demanded examiners ignore that they don’t know what the word “trivial” means, after it appeared in a final-year exam and left many confused. Some students who took the year 13 history exam claimed the “unfamiliar word” was too hard, and the exam should now be marked according to each student’s different understanding and interpretation of “trivial”. The exam asked for students to write an essay on whether they agreed with a quote from Julius Caesar which reads: “Events of importance are the result of trivial causes”. An online petition claims the word trivial “caused much confusion” in the Wednesday exam and many students “were not particularly familiar with” the word. More than 2,500 people have signed the petition, calling on the New Zealand Qualifications Authority [NZQA] to “recognise the true potential of the students and mark the essay based on the student’s own content and understanding of the event, many of which were different to what the word actually means.” Year 13 student Logan Stadnyk who took the exam told local media that at least half of his classmates thought trivial meant “significant”. “Trivial isn’t a word that you hear too frequently, especially not if you’re in Year 13,” Stadnyk said. Kristine Kilkelly, NZQA deputy chief executive assessment officer, said the exam was written by experienced history teachers who had judged it suitable for year 13 students. “The language used in the question, such as the word ‘trivial’, was expected to be within the range of vocabulary for a NCEA Level 3 History student,” Kilkelly said. “If candidates have addressed the quote and integrated their ideas with it, then they will be given credit for the strength of their argument and analysis and will not be penalised for misinterpreting the word ‘trivial’.” “There have been no changes as a consequence of the petition.” According to NZQA 6,300 students were enrolled to sit the exam and the authority had received 13 complaints regarding it.
{ "pile_set_name": "StackExchange" }
Q: Why did this rep take a month to disappear? I pointed out a bug here (10K) which gained 2 up-votes (I think, I'm going by the timeline on Area 51) then was migrated to Area 51 Discussions. I thought nothing more of it. Then today, a month later, I get a -5 for migrated. I'm sure this is the expected behaviour but I would expect it to happen right away. Digging deeper into the question timeline I see that someone upvoted the question on Area 51 Discussions today and it seems to have been that that prompted the system to take action against my illegal rep stashing. Surely the reputation should be removed at the moment of migration now recalcs are dead, and definitely not only after an upvote on the destination site? A: Stubs that are left behind after migration are automatically cleared after a month. Yesterday (today, depending on where you are) was exactly a month after your question was migrated and the background task deleted your question. You lose rep only when the post is deleted, not until then.
{ "pile_set_name": "OpenWebText2" }
XRP is rocking the news space again, and this time around, it’s about its price and overall market standing. Of late, there has been a lot of speculation about both the short-term and long-term future of the popular cryptocurrency. After months of great news as the crypto scored major exchange listings, something was bound to happen in the end. While that swelled up, Ripple, the blockchain startup that created XRP, has been gaining a lot of positive publicity. Couple that with the great news of the crypto’s adoption by a major system like Apple Pay, and you have a sharp bull run. XRP is now on a steady rise, with some people suggesting that it could actually be headed to the “moon.” What Really Happened? On Monday, news broke that XRP would be supported by Wirex as an Apple Pay option. Such news was bound to cause a market event, given the advancements in adoption the crypto has made in the last few weeks. Ultimately, this latest news turned out to be the last button that launched the Bull Run. The upscale saw the crypto gain by over 18% to breach the $0.5 barrier and cement a new support level at $0.53-$0.54. Still, most people expect the price to shoot up much higher. There are some analysts who put XRP’s final point at $10 – $15 by year’s end. However, it’s not to be forgotten that XRP has previously set out on its own bull run and later dropped back to its support levels. But this time might be different. Given the predictions from various crypto experts and the general market mood, the cryptocurrency might be headed to a higher place this time. Also, the timing favors this prospect. People have always anticipated a massive market rally to happen during the final months of the year. XRP Market Cap Beats Ethereum One of the most noticeable facts about XRP’s change in the market is its growing market cap. The cryptocurrency then briefly edged out Ethereum to stand at position 2 in the market in terms of market cap, . That begs the big question: Could XRP be on the way to surpass Bitcoin too? What if it did? Ultimately, XRP is bound to attract even more attention as it digs in to maintain the new support level and probably achieve new price milestones. As a matter of fact, it’s hard not to expect such outcome as the crypto scores more major listings and gets adopted by various large financial institutions across the world.
{ "pile_set_name": "OpenWebText2" }
Ilskan efter SFM-föreläsaren: ”Han kränker kvinnor” Av: Olof Svensson Publicerad: 29 mars 2017 kl. 14.09 Uppdaterad: 30 mars 2017 kl. 10.40 SFM:s föreläsare hävdar att unga tjejer hamnar i helvetet om de inte täcker sig. – Jag blev chockad när jag läste det här. Han kränker alla kvinnor, säger muslimen Helena Atilaian, 39. Hon kräver nu en hårdare granskning av religiösa organisationer som får statsbidrag. 1 av 2 | Foto: Privat Helena Atilaian, arbetar med kvinnor som utsätts för hedersförtryck Flera muslimer som Aftonbladet pratat med reagerar kraftigt på hur Sveriges förenade muslimers, SFM:s, föreläsare uttrycker sig. En av dem är Helena Atilaian, 39, från Sala som arbetar på ett skyddat boende för kvinnor. Hon möter ofta kvinnor som behandlats illa av sina män och som tvingats fly från släktingar på grund av hedersförtryck. – Det den här imamen säger är inte islam, det är att utöva makt över kvinnor. Och ingen reagerar, ingen säger ifrån, ingen vågar göra något, säger hon. Helena Atilaian föddes i Afghanistan, flyttade till Iran och kom till Sverige 2011. Att den här formen av kvinnoförtryck, som hon själv flydde från, nu finns i Sverige, tycker hon är mycket allvarligt. – Det står ingenstans i Koranen att 12-åringar ska vara täckta. Han hittar bara på. Den här imamen kränker alla kvinnor och det gör mig jättearg. Inspirerar unga killar Helena Atilaian har själv en dotter, som nu är vuxen, och reagerar kraftigt på att någon vill bestämma hur hon ska se ut. – Hon tar på sig vilka kläder hon vill. Jag kan inte styra hennes liv och jag vill inte att någon annan gör det heller. Hon reagerar också på SFM:s föreläsares jämförelse med kvinnor och choklad, och menar att andemeningen är att kvinnor som inte täcker sig är orena och smutsiga. Hon fruktar också att unga killar inspireras av det som imamen säger och för kvinnoförtrycket vidare. – Det är unga killar, i 16,17,18-årsåldern som hör vad imamen säger. De kanske tänker ”han kanske har rätt, jag ska inte låta min syrra få kille” eller ”min syrra måste täcka sig”. Det är det som är det stora problemet. Helena Atilaian kräver nu att staten blir bättre på att granska religiösa organisationer innan de får bidrag. – Det här måste stoppas. Vi har haft ett helvete i vårt land, vi hade inga egna liv, vi kunde inte bestämma själva. Vi vill inte uppleva det här också. Salafistisk inriktning En annan som reagerar på SFM:s föreläsare är Samir Muric, imam vid Arlövs moské. Han anser att föreläsaren kommer med svepande generaliseringar. – Slöjan, liksom alla andra handlingar, är något man gör för gud och varje persons utövande av dennes tro är upp till personen själv. Det är ingen imams eller föreläsares uppgift att döma vem som hamnar i helvetet eller ej. Vad anser du om att staten ger bidrag till en sådan här organisation? – Det är inte första gången något kontroversiellt dyker upp från den här organisationen. De uttrycker sig på ett sätt som jag och många andra muslimer inte håller med om. De kallar sig Sveriges förenade muslimer men representerar en salafistisk inrikting. Det är ett problem att de här människorna talar i en halv miljon människors namn. KOPIERA LÄNK Publicerad: 29 mars 2017 kl. 14.09
{ "pile_set_name": "OpenWebText2" }
The bad news, of course, is that right now Obama’s approval/disapproval rating is better than McCain’s. Indeed, Obama’s is a bit higher than it was a month ago. That suggests the failure of the McCain campaign’s attacks on Obama. So drop them. Not because they’re illegitimate. I think many of them are reasonable. Obama’s relationship to the Rev. Jeremiah Wright is, I believe, a legitimate issue. But McCain ruled it out of bounds, and he’s sticking to that. And for whatever reason — the public mood, campaign ineptness, McCain’s alternation between hesitancy and harshness, which reflects the fact that he’s uncomfortable in the attack role — the other attacks on Obama just aren’t working. There’s no reason to think they’re suddenly going to. There are still enough doubts about Obama to allow McCain to win. But McCain needs to make his case, and do so as a serious but cheerful candidate for times that need a serious but upbeat leader. McCain should stop unveiling gimmicky proposals every couple of days that pretend to deal with the financial crisis. He should tell the truth — we’re in uncharted waters, no one is certain what to do, and no one knows what the situation will be on Jan. 20, 2009. But what we do know is that we could use someone as president who’s shown in his career the kind of sound judgment and strong leadership we’ll need to make it through the crisis. McCain can make the substantive case for his broadly centrist conservatism. He can explain that our enemies won’t take a vacation because the markets are down, and that it’s not unimportant that he’s ready to be commander in chief. He can remind voters that even in a recession, the president appoints federal judges — and that his judges won’t legislate from the bench. And he can point out that there’s going to be a Democratic Congress. He can suggest that surely we’d prefer a president who would check that Congress where necessary and work with it where possible, instead of having an inexperienced Democratic president joined at the hip with an all-too-experienced Democratic Congress, leading us, unfettered and unchecked, back to 1970s-style liberalism. At Wednesday night’s debate at Hofstra, McCain might want to volunteer a mild mea culpa about the extent to which the presidential race has degenerated into a shouting match. And then he can pledge to the voters that the last three weeks will feature a contest worthy of this moment in our history. He’d enjoy it. And he might even win it.
{ "pile_set_name": "StackExchange" }
Q: Getting click event on element where user has clicked I want get information about the currently clicked html element. For that I used $(*).click() event so that every element on the page will have this event. suppose I have following html code <div class="outer"> <div class="inner"> <p>Hello<p> </div> </div> now when user clicks hello I want to get that element so that I could identify its tag, its class etc. But here is the problem, when user clicks on hello, click event get fired but it get fired on p tag , then div class=inner and then on div with class as outer . But here i want to get event only on the text or area where user has clicked. A: Please use $(document).click() instead of $(*).click() and use e.target to get specified. element. You can stop the event bubbling by using e.stopPropagation(); $(document).click(function (e) { e.stopPropagation(); alert('Tag Name: ' + e.target.tagName + ' --has class: ' + e.target.className + ' --with text: ' + $(e.target).text()); }); DEMO: http://jsfiddle.net/Q6cpR/1/
{ "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention The present invention relates to a holder for holding wash-targets when washing the wash-targets such as electronic components and fine components and, more specifically, to a holder used at the time of washing by soaking the wash-target in a washing solvent. Also, it relates to a method for washing the wash-targets using the holder. 2. Description of the Related Art Electronic components formed by semiconductor chips or a small-size precision components require a high cleanness depending on the purpose of their use. Therefore, the components are washed after being manufactured and before being shipped as products or being mounted into a device. Especially, a high cleanness is required in a magnetic head slider which is required to float a magnetic disk low, since it is mounted to a magnetic disk device. Further, the magnetic head slider is a component which requires a highly precise positioning, so that it is required to be surely washed. Japanese Patent Unexamined Publication No. 6-103511 discloses an example of a method for washing the components. The method disclosed in Japanese Patent Undisclosed Publication No. 6-103511 is a method in which a magnetic head slider is soaked in a wash tank by being held to a holder and ultrasonic washing is performed in that state. The above-described holder is formed by: through-holes formed in lattice form for enclosing the magnetic head slider; a member comprising a net for covering the bottom end openings; and a member comprising a net for covering the upper end openings of the through-holes. The magnetic head slider is enclosed thereby in the through-holes and it is surrounded by the wall face of the through-hole and a pair of the nets which cover both end openings of the through-hole. Thereby, the magnetic head slider is prevented from being projected outside. Further, the size and thickness of the opening of the through-hole is set 1.1-2.5 times the longitudinal and lateral sizes and the thickness of the magnetic head slider, so that the magnetic head slider can freely move within the through-hole. Thereby, the ultrasonic washing performed on the magnetic head slider can be effectively achieved in the wash tank. However, there is an inconvenience being generated when components are washed by using the holder of Japanese Patent Undisclosed Publication No. 6-103511 as described below. First, the wash-target is surrounded by the wall face forming the through-hole so that the solvent of a washing liquid cannot be easily removed from the wash-target after the washing. Especially, the solvent may remain in four corners (corner parts) of the through-hole and stains can be generated in the wash-target. Further, both sides of the wash-target are held by a net so that damage of ESD (electrostatic discharge) likely to be occurred. Moreover, the wash-target cannot be stably held through the net so that the wash-target may move during the washing by ultrasonic oscillation and collides against the wall face of the through-hole. Due to the impact, there may be a crack or break being generated for causing damage on the wash-target.
{ "pile_set_name": "Wikipedia (en)" }
Robin Briguet Robin Briguet (born 11 May 1999) is a Swiss freestyle skier. He competed in the 2018 Winter Olympics. References Category:1999 births Category:Living people Category:Freestyle skiers at the 2018 Winter Olympics Category:Swiss male freestyle skiers Category:Olympic freestyle skiers of Switzerland
{ "pile_set_name": "Pile-CC" }
50% OFF Enticing Shubh Labh Door Hangings! May the joy, cheer, mirth and merriment of this divine festival surround you forever with this delectable decorative pooja product. A perfect choice for gifting this festive season to your loved ones.. Choose this beautiful product from the Hosue of Aapno Rajasthan and enhance the beauty of your home and make your choice a cynosure for others. Aapno Rajasthan brings lot of decorative items and hampers for this festive season to make memories cherishable and enjoyable; Description of product Enticing Shubh Labh Door Hangings! May the joy, cheer, mirth and merriment of this divine festival surround you forever with this delectable decorative pooja product. A perfect choice for gifting this festive season to your loved ones.. Choose this beautiful product from the Hosue of Aapno Rajasthan and enhance the beauty of your home and make your choice a cynosure for others. Aapno Rajasthan brings lot of decorative items and hampers for this festive season to make memories cherishable and enjoyable;
{ "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention The invention relates to a device for the production of a glass melt from a batch. 2. Description of the Related Art Such a device for the production of a glass melt is mostly of rectangular ground plan. It has peripheral walls as well as a bottom. It is equipped, furthermore, with an electric heating system. Here there can also be provided several heating circuits. The heating-up occurs over electrodes. There takes place here a direct current flow through the conductive glass melt. Under the bottom of the melt tank there is located a draw-off channel. The draw-off channel is fully open toward the melt bath. The channel runs essentially horizontally, and therewith in a plane parallel to the melt surface. It has an outlet which is located in the region of one of the side walls of the melt tank. In operation the glass melt is always covered by a cold batch layer orxe2x80x9cbatch blanketxe2x80x9d. The tank, therefore, is also designated as axe2x80x9ccold top melt tankxe2x80x9d. There, heed is taken that the surface of the glass melt is always covered by batch. At the edges of the melt surface, i.e. on the peripheral walls, however, as a rule a so-called glow strip is left open that serves for the de-gassing of the melt. This can be controlled over an charging machine. The batch layer lying on the glass melt has, namely, an insulating effect. If the batch layer is not closed, there occur heat radiations, which means losses of energy. Mixture, accordingly, is always supplied in a corresponding amount. For the achieving of a faultless quality it is absolutely indispensable that through the draw-off channel molten and refined (bubble-free) glass emerges and that still unmelted batch is not carried along. Even small quantities of unmelted or only initially molten batch are unacceptable in respect to the glass quality to be achieved. All strivings are being undertaken in this direction. To this there belongs inter alia the correct arranging of the heating circuits and of the appertaining electrodes, as well as the bringing-in of a sufficiently high electric power. Despite these measures it does occur that unmolten or only insufficiently melted batch as well as incompletely refined glass passes through the draw-off channel with the flow of the glass melt, which is extremely troublesome in the further processing and results in an unsatisfactory quality of the glass. DE 1 080740 B describes a device for the production of a glass melt from a batch, in which the heated melt tank has a draw-off channel the entry opening of which is arranged in the region of the bottom of the melt tank. The draw-off channel is located under the bottom of the melt tank and has an outlet opening in the zone of a peripheral wall. There the draw-off channel in at least two corners is brought directly onto the wall of the tank. U.S. Pat. No. 4,410,997 A describes a device for the production of a glass melt from a mixture. Here too, the heated melt tank has a draw-off channel which runs in a central zone of the tank bottom. There, no covering is provided. DE 29 17 386 A likewise describes a melt tank with a draw-off channel which proceeds from the bottom zone of the tank. A covering of the draw-off channel is not provided here. Underlying the invention is the problem of constructing a melt tank of the type described in such manner that there is guaranteed a complete melting-up of the batch as well as a complete refining of the glass, and that not even the smallest batch components and bubble-infected glass pass into the draw-off channel and, together with the rest of the glass flow, pass through its outlet opening. The inventors have perceived the following: The draw-off channel mentioned, open toward the melt bath, is located outside of the main zone of the electric heating. There the flow velocities arising are comparatively low. Here the glass of the glass melt can dead-melt in certain zones. In the zone of the peripheral wall in which also the outlet is located, a predominantly downward directed flow builds up. Through this flow it is possible that incompletely melted-up mixture or incompletely refined glass will enter directly into the removal flow in the draw-off channel and will cause the disadvantageous consequences mentioned. For the solution of the problem the inventors propose the four following courses of solution, which can be applied in each case alone or in combination. The first course of solution consists in the following: The draw-off channel is covered on a part of its extent. There remains only an opening that is located in the zone of action of the heating circuits. In general this entry opening into the draw-off channel will be arranged in a central zone of the tank bottom. The tank bottom, thereforexe2x80x94except for the entry opening into the draw-off channelxe2x80x94is simultaneously the covering of the draw-off channel. One could also say that the channel is largely covered. The covering extends from the zone of its outlet opening to a central zone of the tank bottom, purposefully, however, at least up to a tenth of the distance between two oppositely lying peripheral walls of the melt tank. There is thereby prevented the possibility that incompletely melted-up batch components as well as bubble-infected glass will be able to pass out of the zone of the tank over the channel, directly into the channel and therewith into the removal flow. In this manner there can be achieved a perfect glass quality, provided that all the other parameters are in order. As material for the covering mentionedxe2x80x94i.e. the partition between the glass melt and the channelxe2x80x94there come into consideration fireproof materials (metallic or nonmetallic) with low corrosion, high endurance, low costs and a low glass-fault potential. Here there offer themselves refractory metals such as molybdenum or tungsten as well as their alloys. The second course of solution consists in the following: a covering is provided, for example of the material of which also the tank consists. The covering covers off a part of the surface of the melt surface. The melt surface is therewith reduced. This leads to a favorable influencing of the glass flow, since the heat lead-off over the covering is less than over the mixture cover, and since therewith a thermal barrier is built up underneath the covering. Thereby there is prevented the possibility that incompletely melted-up batch of incompletely refined glass can be directly into the removal flow. In this manner incompletely melted-up batch constituents remain longer in the melt tank and are completely melted up and refined. The result is the same as with the first course of solution. The third course of solution consists in providing an additional heating in the zone of the draw-off channel, and namely in the zone above the draw-off channel where the glass flow leaves the tank. The effect of this additional heating lies in the build-up of a thermal barrier, by which there is prevented the possibility that incompletely melted-up batch or incompletely refined glass can pass directly into the removal flow. The fourth course of solution consists in installing a heated dome (heated by burners for example) and in not laying in any batch in this zone. There, accordingly, a blank glass surface is established through which energy can enter into the glass bath from the heated dome. As in the second and third courses of solution, therewith a thermal barrier is built up, by which there is prevented the possibility that incompletely melted-up batch or incompletely refined glass can pass directly into the removal flow. By all four solutions, accordingly, there is guaranteed a complete melting-up of the batch and a sufficient refining of the glass melt. There is prevented the possibility that any batch particles that are incompletely melted up, or any bubble-contaminated glass will pass into the draw-off and thus leave the melt tank with the glass flow.
{ "pile_set_name": "Pile-CC" }
Party Identification in South Africa: Profiles for the ANC and DA This brief provides profiles on supporters of the ANC and DA. The paper focuses on the demographic attributes of supporters of the ANC and DA. The results of this survey indicates that the DA is fundamentally an urban party and although the majority of ANC supporters are from urban areas 45% of their support live in rural areas.
{ "pile_set_name": "OpenWebText2" }
Many years ago I ended up on the go-to list for a locally-based, national public opinion research firm. I attended a few focus groups. One was conducted for the benefit of a large hotel operator. Apparently it was in the customer experience business. We focus groupies looked at various room concepts and features and commented on them. Company representatives watched the discussion from behind a one-way mirror. It seemed worth a turkey club for dinner and 150 bucks. I was a frequent business traveler then. Lo and behold, a few months later I stayed at one of the company’s hotels and found some of the very conveniences — like a useful desk with power outlets — I’d commented on in the focus group. My customer experience improved tangibly. Now even crummy hotels usually have good desks with power outlets built in. The idea of customer experience research goes back to the dawn of marketing. It’s gained urgency in the information age because of the multiple ways people interact with organizations: in person, on the phone and online. Mail too, for that matter. Because of the Paperwork Reduction Act — which is not about what it sounds like — other laws, and a bit of cultural taboo, federal agencies have been generally reluctant to directly involve just plain citizens into their planning. There is, in fact, the possibility of bias coming into such research or the setting of false expectations. The online movement and the relentless improvement in commercial digital services, though, has provided powerful incentives for agencies to get more commercial-like in their research. Two examples: Veterans Affairs is using flesh-and-blood veterans to design its digital services. According to Denise Kitts, director of the Veterans Experience Office Multi Channel Technology Directorate, veterans themselves contribute directly to the research. Her office is small but has a big charter. Namely, to design digital services that use artificial intelligence and human centered design to work effectively and reliably. It wants to unite the various contact channels such that if a veteran starts an engagement in person, they’ll experience continuity if it continues online, and vice versa. Listen to my interview with Kitts here. U.S. Citizenship and Immigration Services has initiated rulemaking to extend its authority to do focus groups. It seeks “qualitative feedback through focus groups.” It’s been doing this already but needs to go through rulemaking to continue. It plans on recruiting 3,000 people who would participate in an unspecified number of focus groups lasting 90 minutes. Sounds like a lot of focus groups, because most of them use no more than a dozen people. USCIS wants “information that provides useful insights on perceptions and opinions” of its services “in accordance with our commitment to improving services delivery.” The request for comments notes that focus groups don’t substitute for statistical surveys or, for that matter, metrics gathered from online services themselves. But when gauging customer experience, focus groups can be highly useful. As a young magazine editor many years ago, my publisher organized focus groups. I was in the team watching and listening from behind the one-way mirror. I had high-falutin’ images in my mind of my vaunted readers. In trudged a group of, let’s say, less than impressive-looking people. They dug into the sandwiches we’d provided. The publisher elbowed me with a smug grin, saying, “there’s your readers, heh heh heh!” But the readers said things that helped me shape the editorial content, proven in subsequent reader preference surveys. Anyhow, good for VA and USCIS for using this seemingly old-fashioned way to garner insight into 5G-era services. Keep in mind, people do watch and see if the organization has listened. One focus group I attended was for Amtrak. It was testing various branding approaches. One prototype poster for its Northeast corridor service was handsome in a neo-Deco way. But it showed a stylized Washington Monument and Capitol out of order, oriented wrong for the point of view depicted in the poster. People like me and Henry Kissinger were Acela first class regulars then. We notice that sort of thing. Several focus group members pointed this out. Nevertheless, some weeks later, there in Union Station, I spotted the very poster, still with the landmarks still mixed up.
{ "pile_set_name": "Github" }
using System.Collections.Generic; using System.Runtime.Serialization; using ServiceStack.Model; using ServiceStack; namespace RedisAdminUI.ServiceModel.Operations.Hash { [DataContract] public class HashContainsEntry : IHasStringId { [DataMember] public string Id { get; set; } [DataMember] public string Key { get; set; } } [DataContract] public class HashContainsEntryResponse { public HashContainsEntryResponse() { this.ResponseStatus = new ResponseStatus(); } [DataMember] public bool Result { get; set; } [DataMember] public ResponseStatus ResponseStatus { get; set; } } }
{ "pile_set_name": "Pile-CC" }
Thank you Joan, You must had gone to Walter peak. Have you heard about the fotothing gettogether we are going to have close to Dunedin. If you go the forums you will see the info under New Zealand get together. Maybe this will encourage you to visit us
{ "pile_set_name": "StackExchange" }
Q: Next Nearest Number Divisible By X What I want to do essentially, is take any number a user has input, and round it to the next closest whole number divisible by X, excluding 1. IE (X = 300): Input = 1 Output = 300 Input = 500 Output = 600 Input = 841 Output = 900 Input = 305 Output = 300 A: Just (integer) divide by X, add one, then multiply by X. int output = ((input / x) + 1) * x; A: Based on your example behaviour I would do something like this: double GetNearestWholeMultiple(double input, double X) { var output = Math.Round(input/X); if (output == 0 && input > 0) output += 1; output *= X; return output; }
{ "pile_set_name": "Pile-CC" }
I'm done with cliche New Year's Resolutions. Like, go to the gym more, or eat less processed foods. #LA My New Year's Resolution is to GET MORE ATTENTION. Here's how I am going to get more attention this year -) This video was taken last year when I went to visit my brother Joe who recently moved with his company to Florida. I will be moving to Florida soon with my family and get a job there or trying to get a transfer from my job. Also, as I mention to this video, my plan to go to Colombia to see my grandmother and my relatives. Then I have come through a decision to meet with one of the models who have sites in Europe as I pvt with them recently. This was video taped at my brothers Joes house last year when we decided to move to Florida this year for the new year resolution. All Joes friends were there to say goodbye for him for his new home, new job and new house there in Florida. He already installed and living in Florida now. Happy New Year to All!
{ "pile_set_name": "PubMed Abstracts" }
Central fibroma in the ascending ramus of the mandible. Case report. A case of central fibroma involving the mandible in a 58 year old woman is described. There was slight swelling of the left cheek and bone-hard bulging was detected on palpation but the patient had not complained of the swelling. The lesion was removed under general anaesthesia and then examined histopathologically. There was no sign of recurrence eleven months after the operation.
{ "pile_set_name": "Pile-CC" }
Introducing the Google Analytics 360 Suite Now with a full enterprise stack of tools Unifying ever growing amounts of data, from every sort of device and channel, is a challenge that various digital vendors have undertaken over the last years – achieving a relative degree of success. However, in reality, the data was very siloed. The battle to win the grail quest of understanding every signal from potential and existing customers and to trigger a consistent response based on their on- and offline journey has never been as intense as it is now. The clear winners are the few integrated digital marketing suites with the tools and technologies to deliver on the needs of CMOs. A long standing contender in the Analytics and data management space has been Google on the back of the global success of Google Analytics, but until now the offering has been fragmented with some important pieces missing. However, the issues previously experienced have now been solved with the launch of the Google Analytics 360 Suite. This suite is made up of: Analytics 360, aiming to ease data analysis from all touchpoints in one place, for a deeper understanding of customer experience. Previously known at GA Premium, the Analytics 360 is a full enterprise Analytics solution with integrated DMP features for audience targeting in the Google channels where 3rd party pixeling isn’t allowed. Tag Manager 360, aiming to make tag management simpler, more reliable, and easier to implement to make decisions more swiftly. The stand-alone Tag Manager 360 now includes a full SLA and new advanced features not found in the free version. Optimize 360 (beta), A combination of a AB&/MVT test tool and a content targeting engine Optimize 360 will benefit from the power of having the full GA dataset available for the calculated predictions. Attribution 360, an enterprise Attribution tool with the ability to onboard e.g. TV and other “offline” data sources and provide advanced correlation studies and attribution modeling. Audience Center 360 (beta), finally, after more than 2 years of development, the DMP from Google will come out of beta later this year. It’s built on the powerful Google Cloud backend and will integrate smoothly between the 360 data and other data sources for audience building across millions of users. Data Studio 360 (beta), a huge disruption in the cross field between super easy to use drag-and-drop dash boarding and the power of having BigQuery on the Google Cloud Platform as the data backend, Data Studio 360 will change how we challenge data moving away from aggregated time series data to having the full raw data sets available for analysis – even when there are billions of rows of data – is extremely powerful. When Google launched the Universal Analytics version of GA and introduced “Measurement Protocol”, it took a huge step towards being able to collect data from all digital touch points, which is a key need to answer the core question of “What is the real customer journey and why is it like this”. With the integration between GA and Adwords the full granularity of the paid campaigns became available for analysis in GA, and in Premium (now Analytics 360) the integration with DoubleClick made it possible to track and cookie across almost all digital events for an even stronger understanding of the journey. But in the years following it’s become more and more clear that the strict schema applied to the data collected and the user interface for presentation of the data was a limiting factor on how the data can be used. Even the way the raw data is processed into the metrics and dimensions we use in our analysis have become a limiting factor on the full scope of the needed analysis. The missing pieces have now been addressed with the announcement of the Analytics 360 suite of enterprise tools. NetBooster believes that the Google Analytics 360 suite in combination with DoubleClick advertising technologies, Googles own channels and the Google Cloud Backend is the strongest Performance Marketing Suite in the market today. Having led data driven and analytics projects for over 10 years for international customers such as PSA Peugeot Citroën, Adidas Group, AccorHotels, Estée Lauder, BNP Paribas and hundreds more, NetBooster has a cutting-edge and an extensive understanding of this fast evolving world where one-to-one marketing models at scale can be achieved. Reach out to us to book a session discussing how your business is disrupted by the availability of raw real time data and responsive performance marketing, and we’ll be happy to share our vision, methodology and analysis of your opportunities.
{ "pile_set_name": "OpenWebText2" }
【2月14日 AFP】ロシア海軍の黒海艦隊(Black Sea Fleet)は13日、巡航ミサイル「カリブル(Kalibr)」を搭載した艦艇を地中海(Mediterranean)に派遣したと発表した。同国の報道によると艦艇はシリアに向かっている。 黒海艦隊によると、この艦艇は同艦隊に昨年12月に配備されたばかりのミサイル艦ゼリョーヌィ・ドル(Zelyony Dol)。ロシア通信(RIA Novosti)は、黒海艦隊の基地があるクリミア(Crimea)半島の防衛当局筋の話として、ゼリョーヌィ・ドルはシリアに向かっておりロシアによるシリア政府軍支援に参加する可能性があると伝えた。 防衛当局筋は「派遣の目的は明らかにされていないが、長距離巡航ミサイルを搭載していることから軍事作戦参加の可能性は排除すべきでない」と述べたという。昨年建造されたばかりのゼリョーヌィ・ドルは先週、大規模な上陸作戦演習に参加したばかりだった。 ロシアはシリアでの空爆作戦で批判を受けている。米国は先週、シリア北部アレッポ(Aleppo)の反体制派への攻撃を支援することでシリア和平協議を妨げているとロシアを批判した。一方、ロシアのドミトリー・メドベージェフ(Dmitry Medvedev)首相は11日、米軍主導の有志国連合によるシリアへの地上部隊派遣は、新たな戦争を引き起こすと警告した。(c)AFP
{ "pile_set_name": "StackExchange" }
Q: TempDB on Shared VHDX Multiple nodes within a cluster. Using HyperV as the virtualisation layer. VMs use Fibre Channel SAN for storage but trying to explore the possibility of using Local SSDs for the TempDB. Issue is when the VM migrates. I know TempDB doesn't need to persist after migration as the DB will just recreate it, but, when it migrates, the VHD will no longer exist. I would imagine the DB would fail if it can't find the directory to create the TempDB? Is it possible to create a VHDX per node, which sits on the exact same directory (For example, it is always the 'T' Drive), so that every VM will simultaneously write to it regardless of which node they are on? I don't want a VM on Node 2 trying to write to a local drive on Node 1. I want to keep things local at all times. A: As far as SQL Server config: Since you're not using SQL Server clustering with shared storage, I believe you don't need to do anything but configure all your instances with Tempdb on T drive (or whatever standard path you choose). See Example A at https://msdn.microsoft.com/en-gb/library/ms345408(v=sql.110).aspx. As for how to ensure that T drive is available as local storage in all your VMs for when SQL Server starts up, that someone else will have to help with (perhaps stackoverflow with virtualisation tags). And be sure to test your whole failover process, don't take anyone's word for it.
{ "pile_set_name": "Wikipedia (en)" }
Christy Martin (boxer) Christy Renea Martin (born June 12, 1968) is a former American world champion boxer and currently the CEO of Christy Martin Promotions. Early life Martin was born in Mullens, West Virginia with the name Christy Salters. She played various sports as a child including Little League baseball and all-state basketball. She attended Concord College in Athens, West Virginia on a basketball scholarship and earned a B.S. in education. Career Martin is said to be “the most successful and prominent female boxer in the United States” and the person who “legitimized” women’s participation in the sport of boxing. She began her career fighting in “Toughwoman” contests and won three consecutive titles. She then began training with boxing coach, Jim Martin, who became her husband in 1991. Martin started her professional boxing career at the age of 21 with a six-round draw with Angela Buchanan in 1989. She had her first training under the direction of Charlie Sensabaugh of Daniels West Virginia. Martin won a rematch with Buchanan one month later with a second round knockout. Andrea DeShong then beat Martin in a five-round decision. Martin then had nineteen consecutive wins, including two against Jamie Whitcomb and Suzanne Riccio-Major as well a rubber match win against Buchanan. On October 15, 1993, Martin had her first title fight against Beverly Szymansky, for the WBC women's Jr. Welterweight world championship. Martin won by knocking out Szymansky in three rounds. In her first title defense, she fought to a draw against debutante Laura Serrano in Las Vegas. Martin defended her title six more times, including a rematch with Szymansky, a fourth fight with Buchanan and defenses versus Melinda Robinson and Sue Chase, winning all of them, before the fight that many credit for putting women's boxing on the sports fans' radar took place: On March 16, 1996, she and Deirdre Gogarty fought what many consider a great fight, in front of Showtime cameras. Martin got the decision, and after that bout, she began to gain more celebrity, even appearing on the cover of Sports Illustrated once shortly afterwards. Martin won her next eight bouts including wins against Robinson, DeShong, Marcela Acuña and Isra Girgrah. Martin lost her title in a 10-round decision loss to Sumya Anani in 1998. Martin then won her next nine fights including wins against Belinda Laracuente, Sabrina Hall and Kathy Collins. Martin won her next two fights by ten-round decisions against Lisa Holeywine and Mia St. John. In 2003 Martin fought Laila Ali and lost by a knockout in the fourth round. Martin's next fight in 2005 was a second-round knockout against Lana Alexander in Lulu, Mississippi. In 2005 a fight with Lucia Rijker, entitled "Million Dollar Lady", was canceled because Rijker ruptured her Achilles during training. On September 16, 2005, in Albuquerque, New Mexico, Martin lost a 10-round unanimous decision to Holly Holm. Martin was beaten by the 23-year-old southpaw, with all three judges scoring for Holm. Martin holds a record of 49 wins, 7 losses and 3 draws with 31 wins by knockout. She is a frequent visitor of the International Boxing Hall Of Fame annual induction ceremonies, and an avid autograph signer. She has fought on the undercard of boxers Mike Tyson, Evander Holyfield, Félix Trinidad and Julio César Chávez. Martin was promoted by Don King. She was nicknamed The Coal Miner's Daughter in reference to her father's occupation. Martin announced on January 19, 2011, that she would be fighting again in hopes of her 50th career win on the undercard of the Ricardo Mayorga vs Miguel Cotto Fight at the MGM Grand Hotel in Las Vegas, Nevada, on March 12, 2011, against Dakota Stone in a rematch of their 2009 Fight. The fight was postponed due to a rib injury to Christy Martin. The rescheduled rematch took place June 4, 2011 at Staples Center in Los Angeles on the Julio Ceasr Chavez Jr. vs Sebastian Zbik undercard. Dakota Stone prevailed by TKO with :51 left as Martin broke her right hand in 9 places on a punch in the 4th round and could not continue. In 2016, she became the first female boxer inducted into the Nevada Boxing Hall of Fame. That same year, Sports Illustrated reported that she was working 2 jobs, as a substitute teacher and helping military veterans find work, and that she was dealing with the after effects of her career, including dealing with lack of stamina and double vision. Professional boxing record |- | style="text-align:center;" colspan="9"|49 Wins (31 knockouts, 18 decisions), 7 Losses (2 knockouts, 5 decisions), 3 Draws |- style="text-align:center; background:#e3e3e3;" | style="border-style:none none solid solid; background:#e3e3e3;"|Res. | style="border-style:none none solid solid; background:#e3e3e3;"|Record | style="border-style:none none solid solid; background:#e3e3e3;"|Opponent | style="border-style:none none solid solid; background:#e3e3e3;"|Type | style="border-style:none none solid solid; background:#e3e3e3;"|Rd., Time | style="border-style:none none solid solid; background:#e3e3e3;"|Date | style="border-style:none none solid solid; background:#e3e3e3;"|Location | style="border-style:none none solid solid; background:#e3e3e3;"|Notes |- style="text-align:center;" | Loss || 49–7–3 || Mia St. John || Unanimous decision || 10 || August 14, 2012 || Friant, CA, U.S. || |- style="text-align:center;" | Loss || 49–6–3 || Dakota Stone || TKO Loss (6) || 6 || June 4, 2011 || Los Angeles, U.S. || |- style="text-align:center;" | Win || 49–5–3 || Dakota Stone || Majority decision || 10 || September 9, 2009 || Syracuse, New York, U.S. || |- style="text-align:center;" | Win || 48–5–3 || Cimberly Harris || Split decision || 6 || August 1, 2009 || Huntington, West Virginia, U.S. || |- style="text-align:center;" | style="background:#dae2f1"|Draw || 47–5–3 || Valerie Mahfood || Draw || 8 || July 18, 2008 || Houston, Texas, U.S. || |- style="text-align:center;" | Win || 47–5–2 || Amy Yuratovac || Unanimous decision || 2 || June 2, 2007 || Lake Charles, Louisiana, U.S. || |- style="text-align:center;" | Loss || 46–5–2 || Angelica Martinez || Split decision || 10 || October 6, 2006 || Worley, Idaho, U.S. || |- style="text-align:center;" | Loss || 46–4–2 || Holly Holm || Unanimous decision || 10 || September 16, 2005 || Albuquerque, New Mexico, U.S. || |- style="text-align:center;" | Win || 46–3–2 || Lana Alexander || KO || 2 || April 30, 2005 || Lula, Mississippi, U.S. || |- style="text-align:center;" | Loss || 45–3–2 || Laila Ali || KO || 4 , 0:28 || August 23, 2003 || Biloxi, Mississippi, U.S. || |- style="text-align:center;" | Win || 45–2–2 || Mia St. John || Unanimous decision || 10 || December 6, 2002 || Pontiac, Michigan, U.S. || |- style="text-align:center;" | Win || 44–2–2 || Lisa Holewyne || Unanimous decision || 10 || November 17, 2001 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 43–2–2 || Kathy Collins || Majority decision || 10 || May 12, 2001 || New York City, New York, U.S. || |- style="text-align:center;" | Win || 42–2–2 || Jeanne Martinez || Unanimous decision || 10 || March 3, 2001 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 41–2–2 || Sabrina Hall || KO || 1 || December 2, 2000 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 40–2–2 || Dianna Lewis || Unanimous decision || 10 || August 12, 2000 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 39–2–2 || Belinda Laracuente || Majority decision || 8 || March 3, 2000 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 38–2–2 || Daniella Somers || TKO || 5 , 1:37 || October 2, 1999 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 37–2–2 || Jovette Jackson || TKO || 1 || April 24, 1999 || Washington, D.C., U.S. || |- style="text-align:center;" | Loss || 36–2–2 || Sumya Anani || Majority decision || 10 || December 18, 1998 || Fort Lauderdale, Florida, U.S. || |- style="text-align:center;" | Win || 36–1–2 || Christine Robinson || TKO || 5 || September 19, 1998 || Atlanta, Georgia, U.S. || |- style="text-align:center;" | Win || 35–1–2 || Cheryl Nance || TKO || 9 , 0:41 || August 29, 1998 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 34–1–2 || Marcela Acuña || Unanimous decision || 10 || December 5, 1997 || Pompano Beach, Florida, U.S. || |- style="text-align:center;" | Win || 33–1–2 || Isra Girgrah || Unanimous decision || 8 || August 23, 1997 || New York City, New York, U.S. || |- style="text-align:center;" | Win || 32–1–2 || Andrea DeShong || TKO || 7 , 1:43 || June 28, 1997 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 31–1–2 || Bethany Payne || TKO || 1 , 2:59 || November 9, 1996 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 30–1–2 || Melinda Robinson || KO || 4 || September 7, 1996 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 29–1–2 || Deirdre Gogarty || Unanimous decision || 6 || March 16, 1996 || Las Vegas, Nevada, U.S. || Martin recognition by the World Boxing Council as its nominal women's lightweight champion of the world |- style="text-align:center;" | Win || 28–1–2 || Del Pettis || TKO || 1 || February 24, 1996 || Richmond, Virginia, U.S. || |- style="text-align:center;" | Win || 27–1–2 || Sue Chase || TKO || 3 , 0:27 || February 10, 1996 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 26–1–2 || Melinda Robinson || Unanimous decision || 6 || January 13, 1996 || Miami, Florida, U.S. || |- style="text-align:center;" | Win || 25–1–2 || Erica Schmidlin || TKO || 1 || December 16, 1995 || Philadelphia, Pennsylvania, U.S. || |- style="text-align:center;" | Win || 24–1–2 || Angela Buchanan || TKO || 2 || August 12, 1995 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 23–1–2 || Beverly Szymanski || KO || 4 || April 1, 1995 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 22–1–2 || Chris Kreuz || TKO || 4 || September 12, 1994 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | style="background:#dae2f1"|Draw || 21–1–2 || Laura Serrano || Draw || 6 || May 7, 1994 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 21–1–1 || Sonja Donlevy || TKO || 1 || March 4, 1994 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 20–1–1 || Susie Melton || TKO || 1 , 0:40 || January 29, 1994 || Las Vegas, Nevada, U.S. || |- style="text-align:center;" | Win || 19–1–1 || Beverly Szymanski || KO || 3 || October 15, 1993 || Auburn Hills, Michigan, U.S. || |- style="text-align:center;" | Win || 18–1–1 || Rebecca Kirkland || TKO || 1 || August 27, 1993 || Punta Gorda, Florida, U.S. || |- style="text-align:center;" | Win || 17–1–1 || Deborah Cruickshank || KO || 1 || May 28, 1993 || Punta Gorda, Florida, U.S. || |- style="text-align:center;" | Win || 16–1–1 || Susie Hughes || TKO || 1 || January 29, 1993 || Columbia, South Carolina, U.S. || |- style="text-align:center;" | Win || 15–1–1 || Angela Buchanan || TKO || 1 || November 14, 1992 || Greenville, South Carolina, U.S. || |- style="text-align:center;" | Win || 14–1–1 || Tracy Gordon || TKO || 1 || September 5, 1992 || Daytona Beach, Florida, U.S. || |- style="text-align:center;" | Win || 13–1–1 || Stacey Prestage || Decision || 8 || May 30, 1992 || Daytona Beach, Florida, U.S. || |- style="text-align:center;" | Win || 12–1–1 || Jackie Thomas || TKO || 3 || January 25, 1992 || Daytona Beach, Florida, U.S. || |- style="text-align:center;" | Win || 11–1–1 || Rose Noble || TKO || 1 || January 11, 1992 || Grundy, Virginia, U.S. || |- style="text-align:center;" | Win || 10–1–1 || Shannon Davenport || TKO || 2 || September 10, 1991 || Princeton, West Virginia, U.S. || |- style="text-align:center;" | Win || 9–1–1 || Rhonda Hefflin || KO || 1 || May 25, 1991 || Tennessee, U.S. || |- style="text-align:center;" | Win || 8–1–1 || Pat Watts || TKO || 1 || March 16, 1991 || Chattanooga, Tennessee, U.S. || |- style="text-align:center;" | Win || 7–1–1 || Suzanne Riccio || Decision || 5 || February 25, 1991 || Bristol, Tennessee, U.S. || |- style="text-align:center;" | Win || 6–1–1 || Jamie Whitcomb || Unanimous decision || 5 || January 12, 1991 || Bristol, Tennessee, U.S. || |- style="text-align:center;" | Win || 5–1–1 || Lisa Holpp || TKO || 1 || October 27, 1990 || Bristol, Tennessee, U.S. || |- style="text-align:center;" | Win || 4–1–1 || Jamie Whitcomb || Decision || 6 || September 22, 1990 || Johnson City, Tennessee, U.S. || |- style="text-align:center;" | Win || 3–1–1 || Andrea DeShong || Decision || 5 || April 21, 1990 || Bristol, Tennessee, U.S. || |- style="text-align:center;" | Loss || 2–1–1 || Andrea DeShong || Decision || 5 || November 4, 1989 || Bristol, Tennessee, U.S. || |- style="text-align:center;" | Win || 2–0–1 || Tammy Jones || TKO || 1 || October 21, 1989 || Bristol, Tennessee, U.S. || |- style="text-align:center;" | Win || 1–0–1 || Angela Buchanan || KO || 2 || September 30, 1989 || Durham, North Carolina, U.S. || |- style="text-align:center;" | style="background:#dae2f1"|Draw || 0–0–1 || Angela Buchanan || Draw || 5 || September 9, 1989 || Bristol, Tennessee, U.S. || Attempted murder On November 23, 2010, Christy Martin was stabbed several times and shot at least once in her torso and left for dead by her husband, 66-year-old James V. Martin. The attack reportedly occurred after an argument in their Apopka home. She survived the attack. On November 30, James Martin was arrested and taken to Orlando Regional Medical Center after he stabbed himself.He was booked in Orange County Jail and charged with attempted first degree murder and aggravated battery with a deadly weapon. In April, 2012, James Martin was found guilty of attempted second-degree murder. He was sentenced two months later to 25 years in prison. Personal life Christy was married to former ring rival Lisa Holewyne on November 25th, 2017. Salters Martin currently is the CEO of Christy Martin Promotions a boxing promotion company that has promoted 13 events in North Carolina since 2016 and will be promoting boxing events in Jacksonville, Florida. References External links Official website Christy Martin Female Boxer Biography Category:1968 births Category:Living people Category:American shooting survivors Category:American women boxers Category:Concord University alumni Category:Lesbian sportswomen Category:LGBT sportspeople from the United States Category:LGBT people from West Virginia Category:People from Apopka, Florida Category:People from Mullens, West Virginia Category:Sportspeople from Florida Category:Boxers from West Virginia Category:LGBT boxers
{ "pile_set_name": "StackExchange" }
Q: Getting unity to resolve multiple instances of the same type I want to do a simple resolve of multiple type registrations (ultimately constructor injected, but using .Resolve to see if Unity is even capable of such things. In every case below, Unity resolves 0 items where it should be resolving 2. Is there some switch in unity that turns on post-2007 behavior? Or am I just drastically missing something? Here is my code: public interface IFoo {} public class Foo1 : IFoo{} public class Foo2 : IFoo{} class Program { static void Main(string[] args) { var container = new UnityContainer(); container.RegisterType<IFoo, Foo1>(); container.RegisterType<IFoo, Foo2>(); // container.Resolve<IEnumerable<IFoo>>(); returns 0 // container.ResolveAll<IFoo>(); returns 0 var foos = container.Resolve<IFoo[]>(); Console.WriteLine(foos.Count()); Console.ReadLine(); } } A: In Unity there can only be one default registration (A registration without a name as in container.RegisterType<IFoo, Foo1>(); ). If multiple default registrations are performed, the last one wins. In order to register multiple implementation for the same interface, you need to assign names to those registrations: container.RegisterType<IFoo, Foo1>("registration1"); container.RegisterType<IFoo, Foo2>("registration2"); Also, Unity only understand arrays by default. If you want to resolve as an array then you will be fine with the default behaviour. Otherwise you will need to register a mapping between the array and the collection you are interested in, like: container.RegisterType<IEnumerable<IFoo>, IFoo[]>(); Another important note is that the default registration won't be returned when resolving a collection. For example given: container.RegisterType<IFoo, Foo1>(); container.RegisterType<IFoo, Foo2>("registration1"); container.RegisterType<IFoo, Foo3>("registration2"); container.RegisterType<IEnumerable<IFoo>, IFoo[]>(); If you resolve IEnumerable<IFoo>, the result will only contain instances of Foo2 and Foo3, but there will not be an instance of Foo1 because the default registration is not included.
{ "pile_set_name": "Github" }
// Type definitions for rc-banner-anim 2.0 // Project: https://github.com/react-component/banner-anim // Definitions by: jljsj33 <https://github.com/jljsj33> // Definitions: https://github.com/react-component/banner-anim import * as React from 'react'; import { IEaseType } from 'rc-tween-one/typings/AnimObject'; import Arrow from './Arrow'; import Thumb from './Thumb'; import Element from './Element'; export type Omit<T, K extends keyof T> = Pick<T, Exclude<keyof T, K>>; type ITypeString = 'across' | 'vertical' | 'acrossOverlay' | 'verticalOverlay' | 'gridBar' | 'grid'; export declare type IType = ITypeString | ITypeString[]; export interface IProps<T> extends Omit<React.HTMLAttributes<T>, 'onChange'> { prefixCls?: string; arrow?: boolean; thumb?: boolean; initShow?: number; type?: IType; duration?: number; delay?: number; ease?: IEaseType; autoPlay?: boolean; autoPlaySpeed?: number; sync?: boolean; dragPlay?: boolean; onChange?: (type: string, current: number) => void; component?: string | React.ReactNode; } export declare function setAnimCompToTagComp(item: React.ReactElement<any>, i?: number): void; export declare function switchChildren(hideProps: boolean, item: React.ReactElement<any>): void; export declare const animType: {}; export default class RcBannerAnim<T> extends React.Component<IProps<T>> { static Arrow: typeof Arrow; static Thumb: typeof Thumb; static Element: typeof Element; static setAnimCompToTagComp: typeof setAnimCompToTagComp; static animType: typeof animType; static switchChildren: typeof switchChildren; } export { Arrow, Thumb, Element, };
{ "pile_set_name": "Pile-CC" }
In 1939 cavalry was still one of the main weapons of the Polish Army; Indeed, it was considered as the elite of it, especially the units of Mounted Artillery. The cavalry regiments were the destination chosen by the majority of the best officers of each promotion. The fact that cavalry survived as a substantial part of the army seemed so anachronistic in the 20th century, but it was due more to the conclusions drawn from experience in the last battles that took place on Polish territory than to questions related to the long equestrian tradition of the nation (that too). World War I in the East had been fought mainly on Polish soil and had been a war of movements, contrary to what happened in the war of trenches of the front of the West. The cavalry could act effectively. In the 1919-1920 war between Poland and Soviet Russia, cavalry had played a key role. In the broad plains of eastern Poland, the two Bolshevik armies of cavalry, the Konarmia of Ghay Khan (in the north) and Budionny (in the south), had advanced unstoppably flanking the Polish defensive positions. In the decisive Polish victory at the Battle of Warsaw, Polish cavalry had been determinant, and it would be again defeating the Konarmia of Budionny in Komarów, the last great battle of history exclusively fought by cavalry troops in which 1,500 Polish riders defeated 6,000 Soviets, causing them 4,000 casualties in exchange for 300 dead and wounded on the Polish side. Battle of Komarów (Author: Jerzy Kossak) In addition, during the 1920s and the first half of the 1930s the Soviet Union was considered the greatest threat to Poland, and the land of eastern Poland, mainly flat, but plagued by marshes and with scarce and primitive ways and roads, was much more suited to the movement of mounted troops than to the primitive and fragile vehicles of the time. These considerations led Polish military planners to conclude that cavalry still had an important role to play in the defense of Poland. Germany did not pose a threat until after the equator of the 1930s, when the process of mechanization of the Polish Army began. Battle of Mokra The cavalry in September 1939 At the beginning of World War II the Polish Army had 11 brigades of cavalry, in addition to two others in process of mechanization quite advanced. Each cavalry brigade ranged from about 6000-7000 men and consisted of 3 or 4 cavalry regiments, mostly Uhlans (lancers), a “Dywizjon” division of mounted artillery (the term Dywizjon in Polish actually refers to a company, because each one consisted of 3 batteries of 4 guns), a small armored unit formed by a squadron of tanks and one of armored cars, a bicycle squadron and another of engineers, and finally a battalion of fiflemen. Each cavalry regiment had about 800-900 men, and had a squadron of heavy machine guns, an antitank platoon and another cyclist. At the end of the article there is an explanatory table of the organization of Polish cavalry brigades and regiments. Battle of Mokra Tactics in combat during the September Campaign The Polish military manuals in 1939 no longer considered charges as a main resource of cavalry. In fact, the spear had been withdrawn in 1936 and was only used in parades and marches. The armament of the Uhlan was very similar the one of the Polish infantry of the time and the saber was conserved only like a weapon of last resort. The function of the Polish cavalry was to fight like mounted infantry, acting like a mobile reserve, able to move and deploy quickly to go in support of the infantry, covering holes in the defense when necessary or clearing the way in the attack. For this, each regiment had 37 mm anti-tank guns (insufficient number), anti-tank rifles Wz35, light and heavy machine guns, etc. Although the final outcome of the September 1939 Campaign is known to all, it must be said that cavalry performed very well generally, even in cases where it was faced against German tanks, without being exhaustive we will give some examples: On 1 September the Battle of Mokra was fought, in which the 4th Panzer Division was detained for a full day by the Wołyńska Cavalry Brigade. During the attack on the positions defended by the 12º Uhlan Regiment “Podolski”, 4th Panzer Division lost about 40 cars and armored vehicles. When finally the Polish Cavalry had to retire, the following day, had suffered about 500 casualties against the 1,200 dead and wounded and 40 destroyed tanks of the Germans. Also the same of September 1st, during the Battle of the Woods of Tuchola, in the Pomerania corridor, the 20th German Motorized Division was stopped by the Cavalry Brigade “Pomorska”, the head of the division arriving to request permission to retire before an “intense pressure of the cavalry”. Charge of the 19º of Uhlans in Mokra (Author: Edward Mesjasza) Charge! Once this point has been clarified, it must be said that there were charges of cavalry with the saber, during the brief September Campaign just over a dozen of them were recorded. They were punctual actions in which they had a clear advantageous position for the cavalry, or else the situation was already totally desperate. Usually these charges were against infantry units, never directly against armored units, and in most cases these charges culminated successfully for the attacking cavalry. During the aforementioned Battle of Mokra, on 1 September, a charge of the 19th Uhlan Regiment of Wolynia (Wołyński) rejected the infantry units of the 4th Panzer Division as they attempted to flank the defensive positions of the Wołyńska Brigade. In Janow, on 1 September, a squadron of the 11th Uhlan Regiment of the Legions, belonging to the “Mazowiecka” Cavalry Brigade, charged on a German cavalry unit and fled it after a brief collision in which Poles suffered about 30 casualties and Germans 40. On 2 September in the Borowa aldéa, a squadron of the 19th Uhlan Regiment of Wolynia (Wołyński) charged against a German cavalry squadron, which escaped without accepting the clash … When on September 11 the 20th Uhlan Regiment “King Jan III Sobieski” of the “Kressowa” Cavalry Brigade was surrounded and destroyed in the Psary Forest, near Szymanów, Lieutenant Jan Burtow’s squadron charged to breaking the siege, managing to escape to join the 22nd Uranian Regiment. On the night of 11 to 12 September, the 11th Uhlan Regiment of the Legions and the 6th Infantry Regiment of the Legions were ordered to attack the city of Kałuszyn, which was occupied by German troops of the 1st Panzer Division, specifically By the 44th Regiment and the SS Regiment “Deutschland”. The order to advance was misinterpreted and the squadron of Lieutenant Andrzej Żyliński launched the charge getting into the city despite losing 33 of its 85 men. The Polish infantry took advantage of the breach in the German defenses to enter the city and liberate it. The next day the city was in Polish hands and the 1st Panzer Division in retreat. Polish casualties are unknown, apart from the 33 Uhlans fallen during loading. The German casualties were 120 dead, 200 injured and 84 missing. Major Krawutschke, who commanded the 44th Infantry Regiment, committed suicide. On 13 September a squadron of the 27th Uhlan Regiment “King Stefan Batory”, under the command of Captain Boris Gierasiuk, after fleeing the Germans, charged them in their pursuit, reconquering the city of Maliszew in the process and doing numerous prisoners. On September 15, during the Battle of Bzura, the 17th Uhlan Regiment “Wielkopolski” was ordered to occupy a cross of the Bzura river in the area of ​​Brochow to establish a bridgehead on the east bank of the river. For it, several squadrons charged against the positions of the German infantry and after reaching them they dismounted and fought on foot. Charge of the 14th Uhlan Regiment in Wólka Węglowa (Museum of the Army, Warsaw) On September 19, about 1000 riders from the 14th Uhlan Regiment of Jazłowiec and the 9th Uhlan Regiment of Malopolska (Podolska Brigade), retreating to Warsaw with the Poznan and Pomerania armies, successfully charged into Wólka Węglowa, near the forest Of Kampinos, against the German troops that interposed between them and Warsaw. It is estimated that the German forces consisted of about 2,300 men and some 40 tanks of the 1st Panzer Division, as well as artillery and cavalry. The Germans were surprised by the night charge and the Polish cavalry managed to break the lines, being the first units of the Poznan Army that managed to arrive at the capital to contribute to its defense. Polish casualties were very high, as 105 lancers died and another 100 were wounded, or 20% of the participants. For its part the Germans lost about 120 men between dead and wounded. During the battle of Kamionka Strumiłowa, on September 21, the third squadron of the 1st Cavalry Division (an improvised unit) charged the German infantry when it was preparing to attack positions of the Polish infantry, the Germans abandoned their positions and withdrew. Between 21 and 22 September the remains of the 5th, 20th and 28th infantry divisions, as well as the cavalry group of Major Josef Juniewicz, composed of remnants of the 12th Uhlan Regiment “Podolski” and 21st Uhlan Regiument “Nadwiślański” of the “Wolynska” Cavalry Brigade, the 6th Mounted Rifle Regiment of the “Kressowa” Brigade and the 6th “Dywizjon” Mounted Artillery of the Podolska Brigade, attempted to retreat from the Kampinos forest to the fortress Of Modlin. Between them and their destination were two German regiments of the 18th Infantry Division supported by artillery, tanks and the Luftwaffe. Polish forces totaled about 5,000 men, of which 1,500 were cavalry and had only 6 guns. The Polish soldiers attacked with great fierceness and managed to break the first of the three defensive lines that had prepared the Germans, but the attack stopped before the second. Major Juniewicz’s riders charged against the German lines, Major Juniewicz dying, as well as 90% of the officers and 60% of the soldiers who took part in the charge. The riders of the 6th “Dywizjon” mounted Artillery headed the charge that opened the way to Warsaw to the rest of the unit. In the Battle of Łomianki 800 Polish soldiers died and more than 4,000 were wounded. German casualties are not known. Still on the 23rd, when all was lost, the 25th and 27th Uhlan Regiments, belonging to the Cavalry Brigade “Nowogrodzska”, which was heading south to reach the Romanian border, took part in the Battle of Krasnobrod. During the same the first squadron of the 25th Uhlan Regiment made a charge that, in addition to allowing the brigade to reconquer the city of Krasnobrod and to capture to the staff of the 8ª German Infantry Division, rejected a counterattack of the German cavalry. However, during the charge, the squadron entered a zone beaten by German machine guns and was practically annihilated, suffering 35 wounded and 26 dead, among them its chief Lieutenant Tadeusz Gerlecki. The German casualties were 47 dead, 30 wounded and about 100 prisoners. Charge of Husynne (Author: Stanislaw Bodes) On the same day, a Polish cavalry unit, consisting of the reserve squadron of the 14th Uhlan Regiment of Jazłowiec and a mounted squadron of the Warsaw Police, along with a battalion of mortars, was surrounded by the 81st Infantry Division of the Red Army in the village of Husynne, in the valley of the river Bug. Supported by mortar fire, 400 Polish riders charged the Soviets to try to break the siege. The Soviet infantry undertook the flight suffering heavy losses, but behind the hills were Soviet armored units that surrounded the Poles and after a fierce battle forced them to surrender. Of the 500 Polish soldiers who took part in the battle, 143 died and 139 were wounded, the rest was captured. According to the testimony of Corporal Włodzimierz Rzeczyck, of the 14th Uhlan Regiment, the Soviets killed 25 Polish prisoners of war after the battle. Soviet casualties totaled 200 men. The last charge of the September Campaign was led by the 27th Uhlan Regiment “King Stefan Batory”, which charged twice against a German infantry battalion defending the town of Morańce. Both charges were rejected and 20 Uhlans died, but the Germans were forced to send messengers under a white flag to negotiate the terms on which they would abandon the village. The myth is born Frontpage of La Domenica del Corriere, with an imaginative illustration of the charge of Krojanty The legend is born on September 1, when in the village of Krojanty, on the edge of the forest of Tuchola, the 18th Uhlan Regiment discovered the 20th German Division bivouac. Seeing a favorable situation, Colonel Martarlerz, commander of the Regiment, launched a charge with 2 squadrons of the same (about 200 men). The Germans, surprised, left literally running in disarray and the Poles fell on them with sabers. Fortunately for the Germans, a reconnaissance unit equipped with auto-machine guns and armored vehicles appeared on the scene during the fray, and with their machine guns and cannons they rejected the Poles, who had to retire to the forest with many wounded and leaving 40 dead in hhe terrain, including the commander of the Regiment. Although armored vehicles took part in the action, this can hardly be considered a deliberate charge against the tanks, since they entered the scene once the charge began. The next day several journalists came to the scene and the Germans showed them the corpses of the horsemen and their saddles, explained to them that they had been killed by the armored vehicles, and they wrote for their media that the Polish lancers charged insanely against the tanks. One of those journalists, Indro Montanelli, in his chronicle for “Il Corriere della Sera” described the events as a sublime act of heroism of the Poles. The truth is that, although General Heinz Guderian also speaks of these charges against the tanks in his memoirs, these never happened. The myth is consolidated But the myth flourished in historiography. Somehow, because everyone was convenient and attractive, depending on each point of view … On the one hand, to the German propaganda it served to show the world how the Poles had underestimated the power of German arms while, on the other hand, yo the Western allies it served to justify their inaction and lack of assistance to Poland in September 1939 shielding himself in the poor performance of an army so old and badly commanded that it was able to charge with spears against tanks. The Soviets and the postwar communist Polish government exploited the myth to discredit the institutions and leaders of the 2nd Polish Republic, arguing that they had not prepared the defense of the country and they had not even scrupled to send their soldiers to death without sense … This was of vital importance for an unpopular regime which, even in a war-torn country, could not have been sustained without the backing of the Soviet Army, and which attempted at all costs to denigrate the pre-war regime, which was the one the majority of Poles considered legitimate. The paradox is that, for quite different reasons, this myth came to appeal to non-communist Poles, loyal to the Polish Government in London and even today’s Polish, and many still believe it true. Since if one looks from a romantic and patriotic perspective (and the Poles are both), they are acts of sublime heroism … Charge of Boruszko Epilogue It is the afternoon of March 1, 1945; 1st, 2nd and 6th Polish Infantry Divisions, supported by the T-34/85 of the Polish Armored Brigade “Heroes of Westerplatte”, dislodge the 163rd German Infantry Division, heavily fortified in the village of Schoenfeld in Pomerania (today it is part of Poland and is called Żeńsko, then Borujsko in Polish). The attack is bogged down by the difficulty of the terrain, and the fields of mines and ditches and the infantry and tanks fail to break the German defenses. At the edge of the forest there are two squadrons of the 3rd Ulhan Regiment of the 1st Polish Cavalry Brigade “Warszawska” and two mounted artillery batteries of the 4th Polish Cavalry Brigade, in total about 220 horsemen, form in line, draw sabers and are thrown to the charge. Five and a half years have passed since the last charge of Polish cavalry and World War II is nearing its end. Like shadows of the past, galloping riders, who wear uniforms almost identical to those of their ancestors in 1939, pass between the infantry and the T34 tanks, cross the no man’s land and take advantage of the confusion and surprise, enter the village followed by the infantry. After a fierce hand-to-hand combat Schoenfeld is conquered. In Borujsko’s charge 7 Uhlans were killed and 10 wounded, total Polish casualties in the battle were 147 dead and 294 wounded, the Germans had more than 500 dead and 50 prisoners. Order of Battle of a Polish Cavalry Brigade in 1939(6000 – 7000 men depending on the number of regiments) Cavalry Regiments 3 or 4 per brigade. The usual were brigades of 3 regiments, each of about 900 men. The mail subscription service to Contando Estrelas will allow you to receive in your mailbox a daily email with the new entries published in this blog. It is a free service provided by Feedburner. Once you have entered your email in this box and press the "submit" button, you will receive a confirmation email in your mailbox to activate your subscription. The email sent through this box is stored by Feedburner and used exclusively to send you the updates of this blog. You will not receive any email related to other purposes. The subscriptions of this blog can only be accessed by its author. The author of this blog is not responsible for the use and purposes that Feedburner gives the data provided. In the website of Feedburner you can consult its privacy policy and its terms of service. For any questions or concerns related to this service, you can send me an email through this contact form.
{ "pile_set_name": "Pile-CC" }
June at Charmed Life September 01 2009 Curate your life. Be charmed. The Trunk Show of All Trunk Shows! Get your holiday shopping done early and join Metro Magazine & l’étoile for a festive evening of shopping, drinks and music at International Market Square. Don’t miss the chance to meet current Project Runway Minnesota designer Christopher Straub and see his designs!
{ "pile_set_name": "StackExchange" }
Q: Show tooltip on textbox entry I have a textbox that requires data to be entered in a certain way. I have implemented some cell validating techniques to check the data after it has been entered, but I'd like to provide the user with some information before they enter the data. To that end, I'd like to add a tooltip to the textbox that pops up when the user enters the toolbox, then exits when they begin to type. For example I have the following code: private void YearEdit_Enter(object sender, EventArgs e) { ToolTip tt = new ToolTip(); tt.IsBalloon = true; tt.InitialDelay = 0; tt.ShowAlways = true; tt.SetToolTip(YearEdit, "Enter 4 digit year."); } This executes when the user enters the textbox, however the tooltip only appears when the mouse hovers over the textbox. Does anyone have any ideas to work around this? I thought that perhaps tt.ShowAlways = true might work, but obviously not. A: Hook into the textbox.enter event and use the following code: private void textBox1_Enter(object sender, EventArgs e) { TextBox TB = (TextBox)sender; int VisibleTime = 1000; //in milliseconds ToolTip tt = new ToolTip(); tt.Show("Test ToolTip",TB,0,0,VisibleTime); } Play with X/Y values to move it where you want. Visible time is how long until it disappears. A: Tooltips only appear when the mouse is still by design. You could try setting the InitialDelay to 0: tt.InitialDelay = 0; But this would still require the mouse to be stationary for an instant. However there are other approaches. A common way of showing what input is required is to use a watermark (faded text) in the textbox that displays the formatting required until the user starts typing. If you really want a tooltip then you could either add an information icon (usually an "i") which will show the tooltip when it's hovered over, or implement your own. It might also work if you break the date into parts (separate day, month, year). This will allow you more control over what the user can enter - the month can become a drop down/combo box so it's always the correct format.
{ "pile_set_name": "Github" }
# 肉饼铺子 合集 <!-- MarkdownTOC --> - 大龄程序员怎样渡过中年危机? - Find what you love - robbin谈管理:坦诚的力量 - 要允许下属challenge你 - 我眼中真正优秀的CTO - 大公司体制内创新的困境 - 大公司的创新思考:基因延伸创新 - robbin谈社区运营:封杀的艺术 - 互联网的大航海时代 - 互联网招聘 - 魔都互联网 - 生态圈缺失 - 政治资源 - 行业布局 - 地域文化 - 做事风格 - 上海还有戏吗? - 从大佬一抓就死说起 - 互联网行业的特征是什么? - 骄傲的将军 - 互联网的核心战略 - 产品经理的囚徒困境 - 大佬怎么抓才能不死? <!-- /MarkdownTOC --> ## 大龄程序员怎样渡过中年危机? 20-27岁:技术积累阶段 假设本科22岁毕业,那么工作的前5年对你来说是打基础的阶段。在这5年时间里面,你要积累足够的代码量,打磨自己的技术实力,成为某一个技术细分领域的牛人。 而我自己当年在这个阶段的努力程度是如饥似渴的,春节都不回家,蹲在出租房里面啃技术文档。刚参加工作的时候,曾经连续一个月在公司打地铺睡觉。 28-35岁:形成思维方法论和知识体系的阶段 当你积累足够的代码量,例如超过10万行代码以后,你应该形成了自己的思维方法论和自己独立的学习技巧,任何新的技术在你眼中都能迅速的看到技术的本质,快速吸收成为你的知识体系的一部分。 到了这个阶段,你会发现你所完全不了解的新技术新知识是非常少的,新技术对你来说也不过是几天时间就把玩的很好的玩具,学习越来越轻松,掌握的知识储备越来越多。 你开始逐渐的不再满足于纯技术领域的探索,而是思考更多的问题:如何将技术转化为生产力;什么技术在什么样的场合能够发挥最大的价值;技术团队应该怎样构建;在一家公司里面,我怎样才能将自己的技术能力最大化的发挥出来? 在这个阶段,积累技术对你来说简直是小菜一碟,你更需要磨练的是思考能力,形成自己的思维方法和知识体系,这将是你帮助你一生的武器。 35岁以后:了解自己,把自己变现的阶段 毋须讳言的是,35岁以后你的一线coding能力一定是下降的,你写代码绝对不如25岁的程序员快,效率高。但是这不重要,因为编程只是你整个武器库当中相对最不重要的了,你的经验,你的视野,你的架构能力,你的管理能力,你分析和解决问题的能力已经远远不局限于技术这个领域。 30-35岁这个阶段,最关键的是了解自己。知道自己擅长什么,自己的优势在哪里,怎样才能够最大化自己的价值,同时也知道自己有什么缺陷,怎样避开做自己不擅长的事情,不勉强自己,不让自己处于对自己不利的环境,这是人生的智慧。 一个人能够客观的认识自己是非常困难的,很多人终其一生都没有活明白,既不知道怎样发挥自己的天赋,也拒绝承认自己的缺陷。在35岁以后,要接受一个不完美的自己,知道怎样扬长避短,最大化个人价值。能够做到这一步的程序员,人到中年完全不是程序员生涯的终结,反而会走向个人事业的巅峰。 ## Find what you love 我是国有大型企业的职工子弟出身,从小耳濡目染了官僚主义的各种龌龊,在那个环境下厂长随便一句话可以决定一个职工的一生。所以我从来都对国有企业深恶痛绝,极其反感官僚主义,厌恶和鄙视拉帮结派,投机钻营和溜须拍马的人,向往氛围自由和能够尽情发挥个人才能的工作环境。 但是当我到外企后发现这个环境并不适合我:就像小说《杜拉拉升职记》一样的公司氛围,每个人如同螺丝钉一般精确的完成自己的工作,不能越雷池一步;私底下团队之间暗自较劲打小报告,台面上彼此亲密无间;公司等级制度森严,总监清一色外籍人士。我不喜欢这种刻意营造出来的有点虚伪的企业文化;不喜欢没干出点什么成绩,却邮件来邮件去互相吹嘘得天花乱坠;更不喜欢这种严丝合缝,完全被桎梏起来工作方式,感觉自己有力无处使,完全被废掉了;职业天花板是清晰可见的,我直接汇报的老板已经是总监级的香港人了。 我仿佛一下看到了自己今后几十年以至退休的样子,这种混吃等死的感觉太可怕了。我希望未来有无限的憧憬和可能性,充满不确定性的未来才是我最希望追求的生活方式,才有可能通过自己的努力去改变未来,创造自己的人生。我开始明白自己想过什么样的人生了,那就是不断开拓进取,永远挑战自己,无拘无束充满自由的创造未来。 我个人认为,至少未来20年以内,都将是互联网大航海时代,我们还将迎来一波又一波的创新,一波又一波的新领域开拓。在这个时代其实最大的成本就是你的时间成本,如果你没有把自己的职业生涯投入互联网创业,去开拓事业,那绝对是对自己人生最大的浪费。 ## robbin谈管理:坦诚的力量 坦诚也是一种价值观。 作为一个领导,带领一支团队,我觉得最重要的是领导本人必须做到坦诚的态度,只有对团队坦诚,才能和团队之间形成信任,只有和团队形成了信任,才能成为一支默契的团队。因此坦诚的性格是管理者最基本的要求,坦诚的氛围也是对团队最基本的要求。 杰克韦尔奇说过:什么是信任?当一个领导真诚、坦率、言出必行的时候,信任就出现了,事情就是这么简单。为什么坦诚精神能行得通?很简单,因为坦诚有化繁为简的力量! 坦诚的习惯对于每个管理者都是最基本的要求,只有管理者坦诚,才能获得团队的信任,作秀式的演讲和奖励并不能够真正获得团队的心,还是需要在工作中脚踏实地一点一滴去做好最平凡普通的事情。 我很重视那些看似很普通的管理工作,例如新员工入职培训,每个月绩效考核、评价和谈话,每周周会,每项工作任务的检查,每个员工请假调休遇到的困难等等。虽然每天处理这些事情我也觉得很烦琐,有时候也会很厌倦,但是可能在管理者只是举手之劳的事情,却会对员工造成长久的困扰。我曾经遇到过员工因为很小的事情长久憋在心里,最后愤而辞职的事情,其实如果当时他把事情告诉我,我一句话就可以解决。只有员工对领导真正信任,才愿意消除戒备心理,开口坦诚心扉,而作为领导如果不能急员工之所急,就很难得到员工的心。 苹果创始人乔布斯是一个对自己、对别人坦诚的可怕的人,坦诚的残酷,直面事情最真实的一面。这一点从《乔布斯传》最后乔布斯自白可以清晰的看到,只有坦诚才能做出正确的决定,才能避免做错误的事情,才能避免做无用功,而不是明知不行也要去做出对公司不负责任的事情: 我不认为我对别人很苛刻,但如果谁把什么事搞砸了,我会当面跟他说。诚实是我的责任。我知道我在说什么,而且事实证明通常我是对的。那是我试图创建的文化。我们相互间诚实到残酷的地步,任何人都可以跟我说,他们认为我就是一堆狗屎,我也可以这样说他们。我们有过一些激烈的争吵,互相吼叫,那可以说是我最美好的一段时光。我在别人面前说“罗恩,那个商店看起来像坨屎”的时候没什么不良感觉。或者我会说“天啊,我们真他妈把这个工艺搞砸了”,就当着负责人的面。这就是我们的规矩:你就得超级诚实。也许有更好的方式,像个绅士俱乐部一样,大家都戴着领带,说着上等人的敬语,满嘴华丽委婉的词汇,但是我对此不太在行,因为我是来自加利福尼亚的中产阶级。 我有时候对别人很严厉,可能没有必要那么严厉。我还记得里德6岁时,他回到家,而我那天刚解雇了一个人,我当时就在想,一个人要怎样告诉他的家人和幼子他失业了。很不好受。但是必须有人去做这样的事。我认为确保团队的优秀始终是我的责任,如果我不去做这件事,没有人会去做。 坦诚对管理者的意义 1、让你直面自身的缺陷,有针对性的改变自己,解决团队的问题 其实每个人心里都有自我保护意识,都不愿意太赤裸裸的面对自己的缺点,同样对团队来说也一样,领导者往往不愿意正视团队的问题,不愿意承认自己的问题。但只有自己敞开心扉,放低自己的姿态,残酷的承认自己的问题,承认团队的问题,才有可能谈得上改进。 2、坦诚才能让问题真正暴露出来,才谈得上去解决它 我觉得乔布斯那段话是特别好的阐述,必须对自己赤裸裸甚至是粗暴的坦诚,真正让问题真正彻底的暴露出来。而我们可能习惯出现的状况是:尽管存在着尖锐的问题,但是更倾向于回避和怀柔,不鼓励对问题进行最直接的处理,不是直面残酷的现实,当问题最终暴露出来的时候,可能就为时过晚了,或者需要花更大的代价去解决它。 3、坦诚可以造就一个互相信任的团队氛围 4、坦诚是创建一个良好的企业文化的必要条件 为何做到坦诚如此困难 1、人性当中难以直面自身的弱点,有自我保护心理,不愿意揭露自己的缺陷,心理上习惯性的绕过,难以对自己坦诚和自省。 必须承认每个人包括我自己都有这种自我保护心理,当面对批评和指责的时候,第一反应就是反驳。所以我们可能更需要时时提醒自己,当面对批评和指责的时候,能不能先冷静下来,仔细听听别人的意见。 2、对自己的决策往往不愿意承认失败,所以不坦诚,对于领导者来说,承认决策的失败是一件尴尬和损害威信的事情。 越是有成就的人越难以承认自己的失败,有时候往往为了掩盖自己的失误会做出更多错误的决策。我们需要做的是放下身段,把自己放在一个谦卑的位置上stay foolish,接受自己的错误,接受残酷的现实,接受自己是个loser,这样才有可能纠正错误。 3、坦诚意味着更多的问题会被暴露出来,这迫使你不得不立刻面对和处理很多你现在暂时并不想面对的问题 有时候你可能已经意识问题了,但是你害怕所有的问题一下全部被暴露出来,因为这意味着你不得不立刻处理所有的问题,而你现在还没有准备好处理这些麻烦。所以有的时候尽管你意识到并且想处理问题,仍然倾向于掩盖问题,但我个人的经验表明这样做是错误的:只要问题出现了,往往会以最坏的结果爆发出来,任何掩盖或者试图拖延问题的行为最终都会导致更加糟糕的后果,所以我们能做的只有勇敢的捅破脓包,如果有问题,就一次性爆发,一次性处理吧。 4、对别人坦诚意味着你不得不做出一些让别人感觉不舒服的事情,让别人不喜欢的事情,包括:指出别人存在的问题,解雇表现不好的员工,这些都需要勇气,很多时候这样做还会意味着你自身面临着很大的风险,在中国人与人为善的文化氛围下,做到这一点尤其困难的。 怎样做到坦诚 1、身体力行:以身作则,要求自己是一个坦诚的人,要有勇气,直面自己的问题,不害怕向下属暴露自己的缺点,敢于承认自己的问题和决策失误 2、勇气:对待同事要有勇气,敢于指出他们的问题,对于表现不好的员工要敢于批评和管理,例如为什么不给你加薪,不奖励等等,为什么解雇你。这些谈话和冲突往往让人感到不舒服,我也承认每次解雇员工我都是硬着头皮的,但是你必须有这样的勇气,坦诚不仅仅要对那些表现良好的人,还要对那些表现糟糕的人。如果对自己没有勇气的话,根本做不到坦诚。 3、公开和透明的做事情方式:做任何事情和决定,让所有人知道为什么你要这么做,理由是什么,堂堂正正,不藏着掖着,很多管理者喜欢秘密的做事情,但这样做会让公司流言四起。没有公开透明的态度,团队根本无法形成良好的氛围。 4、公正:处事公正,或者尽量要求自己公正。尽管你不可能做到绝对的公正,但是至少应该要求自己尽量公正,同时你应该让所有人知道你的评判标准是什么,这个评判标准是合理的,公开的,在这个标准下做出的决定都是大家心服口服的。这样即使那些认为得不到你公正对待的人,也会明明白白知道他们为什么得不到你的奖励,他们即使离职,也不会对你心怀怨恨。 坦诚的态度在很多时候会让别人感觉不舒服,其实乔布斯粗暴的坦诚态度也备受争议,但我觉得,如果你是一个结果导向的人,还是应该尽量坚持坦诚的态度,否则最终的结果可能远远偏离你的目标。 ### 要允许下属challenge你 一昧强调下属服从是有害的 多年来无数成功实践证明这种企业文化是行之有效的,可是当公司规模增大到一定程度,或多或少都需要转变成这种管理模式,一昧过于强调下属服从,可能带来的问题有: 一、当下属内心并不认可工作本身,仅仅出于职业性完成工作,成绩最多是合格,很难达到卓越 我带团队,更希望看到下属是发自内心认可工作,能够从工作当中获得成就感和个人成长,而不仅仅只是为了拿一份工资糊口。只有这样员工才能尽可能的发挥自己最大的潜力,甚至超出我的预期;而不是由于被我拿着鞭子逼着去做,员工心里的想法也就是赶紧交差了事,不可能做出超出我预期的结果。 二、当下属过多被动接受上司工作指派,甚至是上司的上司越级临时性指派,实质上被剥夺了工作安排的主动性,只能被动等待任务,最后变成了牙膏,上司挤一下动一下,不挤就纹丝不动,没有上司安排好工作任务,就完全不知道自己该干什么了 我看到过很多挤牙膏式的员工,其中印象特别深刻的一个,他发年终奖的时候嫌我对他的KPI评估低了,他的理由是:我领导安排给我的工作任务都完成了,所以我的工作是优秀的。我对他说:你领导没有给你安排工作任务的时候你在干什么?我看到你上网聊天,网购打发时间,既没有给自己安排任何学习计划,也从来没有主动向领导要过任务。一年来你技术水平毫无提升,岗位责任毫无扩大,工作量毫无增加,工作从不主动,任务能推则推,原地踏步了一年,在团队当中工作表现最靠后,你还认为你的KPI是优秀? 如果团队里面都是这样的下属,上司非常累,事事都要自己亲力亲为,哪件事情不抓哪件事情就会出问题。这样的团队是做不出来优秀的事情的。 三、非常容易养成下属逃避责任的习惯,导致下属缺乏工作积极性主动性,凡事明哲保身 反正不需要我动脑筋了,领导说什么我就立刻做什么好了,做对了领导自然会肯定我,做错了,也是领导自己决策错误,我态度好没责任;领导不说的事情,我绝对不去做,做对了也未必是领导期望的,如果做错了,那更加是罪过了;如果领导决策本身是错的,我明知道不对,也要硬着头皮做,不然抗命做事,即使做对了,领导也会认为我工作态度不好,缺乏职业性,罪过就大了去了。 我不喜欢这种明哲保身,人人推卸责任的团队:没有任何下属敢给你提意见和想法,怕给自己惹麻烦;团队对你有疏离感,你根本不知道团队成员心里是怎么想的;如果你自己决策错了,根本不会有任何下属站出来纠正你,你会陷入孤军奋战的状态当中。 四、对于互联网行业,特别是面向消费者的互联网行业,最致命的问题是:员工到底是为谁做产品?是为了用户做产品?还是为了老板做产品?当员工凡事以服从上司为出发点,那用户在他心目中是无足轻重的,一旦上司决策错误,缺乏自我修复和纠正的能力 很多互联网产品都败在这个问题上了,上司要是天纵英才,下属三军用命,自然是无往而不利,但现实是上司不可能每个决策都是对的,如果决策错误,下属又不敢或者不愿意站出来纠正,最后必然失败。产品失败了,老板调整或者砍掉产品团队,最终为失败买单的还是员工。 伟大如乔布斯,最早决策iPad用Intel的CPU,时任苹果工程副总裁,iPod之父Tony Fadell拍桌子以辞职相要挟,要求乔布斯改用ARM的CPU,被乔布斯采纳。试想,如果没有Tony的抗命,iPad用的是Intel CPU,一定会落的和后来微软第一代WindowsRT一样的下场:电池续航能力不足4小时,iPad还能有今天的成功吗? 很多互联网产品的负责人,过于强调下属的服从,非常在意维护自己的领导权威性,十分忌讳下属challenge自己,下属的态度就是唯上司马首是瞻,上司说的事情极其高效的完成,上司关注不到的地方,即使用户呼声很大,也毫不理睬,心里只有老板,而无用户;就算发现产品的问题,也不会和上司提,唯恐上司不爽,哄着上司开心。这样的产品本质上是做给老板用的,并不是做给用户的,那用户岂能买账?产品岂能成功? 要给下属challenge你的机会 我信奉的管理理念不是制造一个个笼子,把员工分门别类往里面放,或者实施一套管理方法学,强制要求所有人一丝不苟的遵循。我希望寻找到适合的人才,创造让人才能够充分发挥自己潜能的环境,搭建一个默契的、相互信任的、有战斗力的团队,激励每个人尽可能的为公司创造最大的价值。我认为,手段是为目的服务的,当你清晰的确定目标之后,并不需要拘泥于特定的手段,凡是可以达到激励团队目标的手段,都可以为我所用。 因此,尽管我从事IT行业15年,从传统软件工程到CMMI的实施,从推广敏捷软件开发方法到了解精益创业,全部都熟谙于心,但是我管理团队,从不对团队强制实施任何形式上的软件开发过程管理,比方说我对极限编程很熟悉,但从不要求团队必须结对编程,测试驱动开发,也不要求每日站立会议,但是当项目开发进入关键冲刺时期,我就会有选择性的使用一些特定的手段例如每日站立会议来加强项目控制。如果仅仅只是为了实施特定的软件开发方法,但忽视了背后本质的目的,无疑是舍本逐末的。 所以,我觉得作为上司,一定要鼓励下属积极主动的思考,让下属能够自己设定成长目标,对工作拥有归属感和责任感;尽量给予下属更自由的空间,不要设置过多形式主义的约束;要允许下属去challenge你,参与你的决策,甚至质疑你的决策。这样做的好处有很多: 一、下属对工作有归属感,工作责任心更强,更积极主动,能够自我驱动,这样上司就省心了 二、当你的决策错误的时候,下属可以帮你纠错,集体的智慧毕竟高于个人 我带的团队还是比较敢于challenge我的,如果我提出的意见他们不同意,就会立刻在办公区当面说出来,不会有什么不好意思的,也不会非要刻意私下在办公室里面才敢说。而且事实上也确实会经常提出很多正确的意见,纠正了我很多想法。 三、当下属获得了更多的决策参与机会,成长的很快,往往一年就可以独当一面了 我观察到有些下属就是这样的,一年时间就从普通的一线员工成长为核心骨干了。 总之,以我带团队的实践经验来说,勇敢的鼓励你的下属challenge你吧,做一个自信的老板,你越自信,越坦诚,越开放自己的心,下属越对你坦诚,越拥戴你,越能够形成一个有战斗力的团队。 ## 我眼中真正优秀的CTO 创业者CEO是没有门槛的,谁都可以今天辞职,明天宣布自己创业当CEO了,各行各业的人才都可以当CEO,CEO的供给是井喷的,但是CTO是有门槛的,只有研发岗位才能培养CTO,而且一个合格的CTO成长周期非常长,CTO的供给是非常少的。更何况,在我眼中,很多所谓的创业公司CTO本身也是不合格的,仅仅因为创业公司急需研发负责人,于是高薪聘请,滥竽充数而已。 那么一个真正优秀的CTO应该具备哪些能力或者说素质呢?我以前也帮创业公司的CEO写过CTO招聘描述,我觉得CTO需要具备如下5方面的素质: 一、技术视野良好,架构设计能力出色 CTO要有良好的技术视野,不需要各种技术自己都样样精通,但是必须要所有涉猎,有所了解,对各种技术领域的发展趋势,主流非主流技术的应用场景要非常了解。知道在什么场景应用什么技术,公司业务发展到什么规模应该预先做哪些技术储备。产品架构的设计要有足够的弹性,既能够保证当前开发的高效率,又能够对未来产品架构的演进留出扩展的余地。 二、动手能力要强,学习能力出色 CTO并不需要自己亲自动手写代码,但是如有必要,自己可以随时动手参与第一线的编码工作,CTO不能长期远离一线工作,自废武功,纸上谈兵。否则,长此以往,会对技术的判断产生严重的失误。另外,CTO自己也应该是一个学习能力非常出色的人,毕竟IT行业的技术更新换代速度非常快,如果没有快速学习能力,是没有资格做好CTO的。 三、管理研发团队过硬,能建立团队研发文化 CTO不能仅仅自己是一个技术高手,CTO的责任是负责整个公司的产品实现,所以CTO要善于管理研发团队,掌控好研发工作进度,能够在规划好的时间内,步步为营,好整以暇的完成公司产品的研发工作。老是delay项目进度,或者老是玩命加班才能完成项目进度只能说明CTO的管理项目能力不足。 此外CTO还要擅长培养研发梯队力量,建立研发团队内部具有向心力的,开放性的,交流学习型组织文化。让研发团队具备自我学习能力,自我培养能力,自我建设能力。这样的研发团队工作极度默契,战斗力极强,而且员工归属感很强,流失率很低。即使有关键岗位员工流失,只要研发梯队建设良好,也有足够的人才顶上。 能够做到这一步的CTO,手里打造了这样一支队伍,自己就会非常轻松,好整以暇。所以天天加班的CTO绝对不是一个好CTO。 四、具备良好的产品意识,以及跨部门跨背景的沟通能力 CTO不仅要懂技术,还要对互联网产品有良好的感觉,从产品的逻辑性,可实现角度提出产品改进和完善的总体性设想。因为产品经理或者业务人员设想的产品,很可能是逻辑上不严密存在实现矛盾的,导致产品真正开发出来以后,处处都是漏洞,这就要依靠CTO,用自己专业的能力去理解互联网产品,推演产品的实现逻辑,从总体上修正和完善产品设想。 此外CTO还需要极强的沟通能力,要能够和不同背景的人有良好的沟通能力,能够用对方的思维方式和话语体系来描述他不理解的专业问题。技术人员比较普遍遇到的问题是,喜欢用专业术语向外行解释专业问题,导致外行人员云里雾里,不知所云,放弃沟通的欲望。 其实凡是专业性比较强的行业都存在类似的问题,比方说你作为一个病人和医生沟通自己的病情,也容易遇到类似的问题。因此就要求CTO具有类似产品经理的思维能力,能够瞬间把自己变成一个小白用户,学会用小白的思维去看待问题,学会用小白能够理解的方式来告诉他,教育他。 五、敢于对CEO说“不” 只要不是技术出身的CEO,必然对研发是门外汉,很可能对产品也是门外汉。一个对产品研发的门外汉CEO对CTO说,我今天拍脑袋想出来一个产品需求,你必须给我做,不准备说不!CTO刚一脑门汗说好我拼了命去做。明天CEO又一拍脑门,说我昨天想的不对,我今天另外改了一个产品需求,你来给我做这个。 以上这种情况罕见吗?非常常见,创业公司每天都在发生。就是我自己,这么懂研发的人,知道什么能够实现什么不能实现,仍然今天一个想法,觉得可以这样做,明天我就对自己说不,否定掉这个想法,然后冒出来另外一个想法。我身体里的CTO经常站出来对CEO说,你这个想法不靠谱,你那个想法资源不够,经常在脑子里面自我推演,然后自己否掉很多想法。 因此,CEO不是每个想法都靠谱的,CTO有责任站在更加专业的角度去帮助CEO纠正,推演,完善想法。一个不敢对CEO说不的CTO,这个公司肯定要走很长很长的弯路的。当然,如果CTO不是公司股东合伙人,或者即使是股东合伙人,但是只有极少的股份,对CTO说“不”是有风险的。可能在某些CEO眼中,所谓的CTO就是一个下属,根本没有资格对自己说“不”。 然而我觉得,如果CTO自身是一个沟通能力极强的人,就不应该畏惧CEO,应该勇敢的说“不”,应该承担自己作为CTO的责任。 以上就是我对一个优秀的CTO的定义,简单概括就是:CTO要懂技术,有前瞻性,视野好,管理能力出色,会培养人,能够建立团队文化,沟通能力优秀,还要懂产品,最后还要有胆色,真是不容易,所以优秀的CTO才会缺。 ## 大公司体制内创新的困境 前Google资深工程师,IT畅销书《浪潮之巅》的作者吴军历数了IT行业公司的兴衰发展史,提出了一个令人印象深刻的“基因决定论”,即由于公司基因的影响,当一家大公司想要转型占领新的领域,做出颠覆性创新产品的时候,往往会败得很惨,例如:摩托罗拉,诺基亚,英特尔,微软,尽管在所在的行业占据了无可争议的垄断地位,但是当时代发生变化,行业发生转型以后,都不同程度的衰落了,大公司体制内创新的困境已经成为常态。 杰克韦尔奇在谈到这个问题的时候,曾经说过:“管理一条产值为5万美元的新生产线的第一年,要比管理一个销售额为5亿美元的企业的第20年更为困难”。他在《Winning》这本书里面具体提到3条原因: 1、公司对创新项目的投入不足,特别是业务人员投入不足 2、公司对创新项目的前景和重要性宣传太少,反而保持秘而不宣 3、公司限制了创新项目的自主权。 所以一般大公司体制内立项的新项目失败的概率是非常高的。我和各大互联网公司的朋友聊天,也听到很多私下的爆料,感叹在大公司里面推动产品创新之艰难。在我们互联网行业,往往大公司做创新产品做不过创业公司,大公司里面做失败的产品可以说是累累白骨: 大公司严密的制度性约束扼杀了创新的可能性 大公司的人事制度,财务制度,公司文化,业绩考核方方面面往往是非常严格的,例如详细到公司考勤,请假,调休,财务报销,请款流程,人员招聘,小到公司运维规定方面能不能看视频网站,能不能安装QQ聊天软件,严格的甚至还有不能上网的等等。这些详细的,繁苛的制度以及公司文化对于管理一家几百上千人的公司可能是非常必要的,但是这样的环境往往会扼杀创新的团队和员工。 总之,大公司做创新项目,最喜欢砸人砸钱,最忽视的就是创新文化制度的建设,没有适合创新团队的生存土壤,光靠砸钱砸人,永远做不出来颠覆性创新产品,创新需要适合创新的土壤。 --- 在大公司,工作的专注度永远是稀缺资源 我以前自己创业的时候,只需要做好一个产品,追求一个目标,我那个时候工作并不忙,每天有大把的时间思考怎样把产品打磨好,怎样把社区运营好,做事情的专注度非常高,而高度专注和长久的坚持才是把事情做成功最基本的条件。 后来在中小型互联网公司负责管理60个人的部门,每天事情多的忙不过来,分管网站产品,研发,社区运营,系统运维,以及网站客服和内容审核等职能团队,每天处理部门人事,行政,管理,业务,绩效,招聘等等事情就要至少忙半天,此外还有公司管理层会议,部门内部各职能团队任务讨论,产品会议,间或客户或者合作伙伴上门拜访还要出台接待,以及配合其他部门工作,部门协调,凡此种种,占据了工作时间的90%以上。可以说创业的时候,每天挥霍大把的时间琢磨产品上怎么雕花,简直就是奢侈的浪费啊。 而在大公司里面的那些产品经理和工程师们,比我更可怜,某公司产品经理戏称公司文化就是会议文化,每天各个部门拉到一起从早到晚开会,从上班开到下班,工程师想写点代码都得晚餐以后开始写。个人的工作时间能被用在创新产品上是非常稀缺的,在这种情况下,怎么可能做出创新产品呢? 大公司做创新项目资源往往严重投入不足 这个观点看似有点矛盾,我前面不是刚说大公司最喜欢干的事情就是砸钱砸人吗?怎么叫做资源严重投入不足呢? 其实一个项目的成功所需要动用的资源,不是简单的砸钱和砸人的问题,而是需要所有相关职能部门紧密配合起来为共同的目标而努力投入资源。光你自己这个项目组砸几个产品设计,砸几个研发,砸几个运营那不叫资源投入,你总不能自己配市场人员,自己配销售人员吧,项目的成功最终也需要依赖其他部门的资源配合。 我有一个简单的论断:跨部门调用资源永远是低效率的,凡是体制内创新,如果不是老板亲自调动各个部门资源配合,绝对不能指望跨部门资源配合产生创新型产品,如果团队内部不能配置足够的资源,就无法产生成功的创新型产品。 基于这样一些原因,大公司的体制内创新往往是非常困难的,中外公司,概莫能外。当然,体制内创新并非没有成功案例,乔布斯的苹果公司就是最典型的大公司体制创新的典范,我个人即便不从产品创新角度,仅从管理的角度也非常佩服乔布斯,因为乔布斯的苹果公司挑战并且超越了很多大公司的管理极限。苹果公司之所以能够一次又一次的不断复制着体制内创新的奇迹,是因为苹果公司本质上是一家大型创业公司,而这一点是其他公司难以达到的状态。 大公司体制内创新也并非一定会失败,就拿我们国内互联网行业,就不乏成功的典范,例如:搜狐的搜狗输入法和现在的搜狗公司,新浪的微博产品,腾讯的微信产品,淘宝早期孵化过程。我们观察这些成功案例有一个共同的相似点:都经历了长期的体制外孵化或者成长期。搜狐时代的搜狗输入法叫好不叫座,分拆搜狗公司以后,实现了真正的腾飞;新浪的微博最早是广州的团队做的产品,具备影响力以后才搬到北京总部;腾讯的微信则是远离深圳总部的广州研究院做出来的产品;而淘宝早期秘密成立团队在湖畔花园重新创业则被写成了神话。 老板开始耽于安逸 在互联网行业,产业发生变化和转型的速度非常快,强如SUN,Nokia这样的行业霸主衰落也不过是短短几年就完蛋了,当老板的任何时候都不能有松懈的心态,必须“战战兢兢,如履薄冰”。如果老板自己都认为公司已经很成功了,不想再像从前一样那么拼那么累了,整个公司就会松懈下来,得过且过。 一旦老板自己不再投入,就会失去对一线产品和业务的敏感度,就无法独立做出产品决策,必须依赖下属;一旦老板不再投入,就无法对员工实际工作成果做出准确判断,就无法再以员工付出多少作为评定标准,而是看员工是否听话和迎合。当老板必须依赖迎合自己的下属来做决策的时候,下属只会报喜不报忧,公司的业务运转不再以市场为导向;而创业心态的员工是无法在公司生存下来的,只能被迫离职。 所以老板自己没有创业心态,如何要求员工有创业心态呢?如何要求有创新气质的团队在公司当中孵化出来呢?乔布斯和马化腾本人都是很拼命的老板,老乔更是拼到临死前一天还召唤库克开会。因此必须从老板本人开始,以创业的心态开脱创新业务,才能可能做出创新型产品。 --- 杰克韦尔奇对于大公司体制内创新提出了自己的看法: 1、首先做大笔投入,把最好,最有进取心,最有活力的人放到新业务的领导岗位上。创新团队必须有车库创业精神。 2、夸大宣传创新项目的潜力和重要性,创新项目的报告层次必须高很多,甚至直接向CEO负责,在CEO的日程表上占据特殊的位置。 3、给予自由度,允许犯错误;让创新项目自己成熟起来。 我觉得针对我看到的很多国内互联网大公司的情况,要想做到体制内创新,需要做出许多改变: 制度性松绑,搞“经济特区”制度 中国的改革开放成功是从海南,深圳等经济特区开始的。设立经济特区,进行政策搞活,最终盘活了整个中国的经济。 在大公司进行体制内创新也是一样,要整个公司制度性转变是不可能的,但是我们可以搞“经济特区”制度,对创新团队进行制度性松绑,例如: 1、取消经济特区的上下班打卡考勤制度,实行弹性工作制; 2、给经济特区独立的人事权限,可以自由招聘,自己设定请假调休制度; 3、宽松的财务报销制度; 4、取消严格的绩效考核制度,代替以整个团队的项目目标等等。 总之,必须给“经济特区”特殊的政策,彻底的制度松绑,否则就无法培养出来适应创新要求的团队。 体制外孵化 很多成功的项目都是体制外孵化的结果,不说上面几个成功案例,我最近看空中网的制作的iOS游戏口袋战争也很成功,其iOS游戏开发部门也不是在北京,而是设在厦门,进行体制外孵化的。只有远离体制,才能获得充分的自由和制度的松绑,才能创造最好的创新环境。特别是作为体制外孵化,团队成员的工作专注度是高度集中的,不会受到各种事务性事情和部门工作协调,以及各种不必要会议的干扰,对产品的专注才有可能成功。 独立的,更优厚的激励制度 针对创新团队,不能采用和整个公司一致的奖金激励制度,那只不过是常规性工作达标的奖励。针对创新项目,必须有别于公司整体奖金制度之外的奖励机制,让团队成员感受到更加强烈的动力和追求项目成功的渴望。 如果没有独立的奖励制度,和整个公司一视同仁,那么很多人会想,我就算拼了命做出来了成功的创新项目,最终还是和其他部门按部就班循规蹈矩的员工拿一样的奖金,那我凭什么要玩命呢?所以必须把项目的成功和优厚的奖金挂钩起来,和其他部门区别开来,才能激励创新团队员工比一般的员工更加玩命。 精兵强将,挑选适合创新的人才 可以这么说,大多数大公司的员工都不是合适做创新项目的人才。创新项目要成功,必须招聘真正适合创新,有创业精神,渴望成功,渴望证明自己的员工,组建这样的团队,才有可能成功。而不是以为简单的砸钱砸人就万事大吉了。 不遗余力的支持和很高的容忍度,适当的隔离 创新团队需要不断的试错,需要时间来积累和孵化项目,因此作为老板来说,必须不遗余力的支持创新团队,就像杰克韦尔奇说的那样,极力鼓吹团队,给团队很高的容忍度。除此之外,还需要适当的隔离,就像天使投资人对待投资的团队那样,不能事事干预,给团队充分的自由度。 只有这样做,才能够突破大公司体制内创新的瓶颈。 ### 大公司的创新思考:基因延伸创新 创新分为两种类型:基因延伸性创新和颠覆性创新,大公司利用自身的资源、规模和品牌下的创新属于“基因延伸性创新”,这种创新往往比较容易在大公司环境下成功,另外一种“颠覆性创新”几乎无法在大公司成功。 公司的基因是什么? 基因指的是一个成功的公司在该领域竞争过程中,为了适应商业竞争对自身的高度优化,正是这种高度优化乃至进化,才能树立起公司在这个领域的领先地位,这一点就是公司的基因。 基因既能够保证公司在核心竞争领域的优势,同时又会成为公司扩张到其他领域的障碍,这一点从许许多多大公司的竞争中都可以看到,例如:微软公司在PC软件时代呼风唤雨,却失意于互联网;Google在互联网行业执一时牛耳,却不敌Facebook的社交竞争;诺基亚曾经是功能手机之王,却衰落于智能手机和移动互联网的崛起。 Google的吴军博士在《浪潮之巅》中精辟的总结了“基因决定定律”,即公司的基因决定了能否在一个新的领域有所建树。即便是伟大的创新者苹果公司,也未能突破基因决定定律,苹果公司虽然在消费电子硬件和软件领域所向无敌,但是在社交领域的尝试ping产品却一败涂地,Game Center也差强人意,iCloud虽有进展,但迄今没有发挥出来巨大的威力。 因此大公司创新成功的必要条件之一就是:创新必须顺着公司的基因生长,将公司在核心领域的优势延伸到一个新的领域,这种模式的创新我称之为:基因延伸性创新。国内的互联网行业的大公司也是这样的,例如新浪微博和腾讯微信: 新浪的基因是互联网媒体,新浪微博从运营上继承了新浪一贯强媒体运营模式,并且将自身积累的媒体资源优势强势导入,所以迅速做大,产生了巨大的社会效益,打造了一个移动新媒体。新浪微博是新浪在一个新领域(移动互联网)利用自身基因延伸创新的成功案例。 腾讯的基因则是个人通讯工具和个人休闲娱乐产品,但是在移动互联网领域,QQ的产品有很多方面不再适合。微信虽然是远离腾讯总部的广州研究院独立创新的产品,但是微信仍然没有脱离腾讯做个人通讯工具产品的基因,因而在微信产品崭露头角之后,利用腾讯庞大的QQ用户资源导入,达到了惊人的成功。因此微信也是腾讯在一个新领域(移动互联网)利用自身基因延伸创新的成功案例。 基因延伸性创新要成功,必须符合大公司基因,如果基因不符号,很难成功。 例如Google的社交产品Google+,始终不能对Facebook产生实质性的威胁,这是因为Google的基因是技术驱动,没有社交基因;新浪曾经大举进军过网络游戏领域,也一败涂地,这是因为新浪的基因是媒体,沿着媒体基因的创新才有可能成功。 除了基因延伸性创新之外,还有一种创新:颠覆性创新。例如Google的关键词搜索获取内容的模式颠覆了雅虎赖以为生的门户推荐内容模式,让后者彻底衰落了;Google的免费在线服务模式颠覆了微软销售个人盒装软件的模式,让后者不再成为时代的宠儿;苹果的iOS开辟的移动互联网时代,颠覆了一大堆传统智能手机和功能手机厂商,颠覆了PC互联网时代的一大群公司。 这种颠覆性创新有巨大的破坏力,轻者它会破坏大公司的核心商业模式,重者它会埋葬整个行业乃至整个传统市场。所以颠覆性创新几乎无法在大公司实现,因为公司内部的阻力会轻易扼杀颠覆性创新的存在。而颠覆性创新恰恰是VC投资驱动的创业型公司比较容易实现的。颠覆性创新重新定义了游戏规则,开辟了新的市场空间,将大公司和创业公司拉到了同一水平线上竞争,因而颠覆性创新往往是由创业型公司实现的。 颠覆性创新虽然难以在大公司立足,但是仍然有大公司颠覆性创新的成功案例,一般来说,大公司要实现颠覆性创新的前提条件是:改变公司基因。当公司基因被改变以后,颠覆性创新就变成了顺着公司基因生长的延伸性创新了,这样就进入了大公司的优势领域,成功把握大大提高。改变公司基因当然是很困难的事情,但是也确实有成功案例,改变基因最有效的手段就是收购了,特别是收购一个具有强大创新能力的创业团队,将被收购者的基因注入公司。 例如1996年底摇摇欲坠的苹果公司收购了乔布斯的NeXT公司,1997年中乔布斯担任苹果临时CEO,带来了苹果的复兴。复兴后的苹果公司高管除了工业设计副总裁乔纳森艾夫,清一色的NeXT班底,当时的苹果老人全部被洗掉了,带来公司复兴的核心技术也全部来自NeXT的研究成果。与其说苹果收购了NeXT,不如说NeXT反向收购了苹果公司,后来的苹果只是一个披了苹果logo马甲的NeXT公司而已。 收购之后不能将被收购者的基因融入公司,往往收购就是徒劳无功的,微软公司2005年收购了雷奥茨的Groove公司,任命雷奥茨担任微软首席架构师,也意在改造微软基因,加强微软在互联网领域的竞争力,但最终微软公司未能因为雷奥茨的到来而改变基因,反而是雷奥茨的黯然离去。 总之,从创新的角度来说,大公司创新容易遇到的问题是基因造成的障碍和规模带来的阻碍,创业公司创新容易遇到的问题是资源不足和资金短缺造成的发展无力,各有各的苦衷。未来的创新趋势应该是大公司和创业公司齐头并进,而不是大公司凭借资源、规模和品牌优势的一枝独秀。 ## robbin谈社区运营:封杀的艺术 相互封杀现象是中国互联网的常态了,最近就发生了支付宝和微信相互封杀的事情,还有支付宝的工程师专门写文章为支付宝封杀行为洗地。但不管怎么说,互相封杀对用户来说,肯定是造成了很大的不便,但robbin也做过网站,作为运营方的立场,类似这种处境也不是第一次碰到,说到底就是不希望自己辛辛苦苦积累的用户眼睁睁的被竞争对手夺走,因此互相封杀就成了一种常用的手段。 这里还一个博弈困境的现象,两个网站互相不封对方用户,相安无事的竞争平衡是很容易被打破的:一旦某个网站猛拉另一个网站用户,另一方放任很可能会快速流失用户,于是立刻封杀进行反击,最后引发互相封杀。因此封杀是一个最容易做出的选择,不管用户怎么谴责,网站运营方即便是站在自保的立场上,也会倾向于做出封杀的决定。 当然封杀的副作用也是很强的:首先封杀未必能够达到预期的效果,该流失的用户照样流失了;其次封杀可能破坏网站在用户心目当中的正面形象,加速用户的离开;最后封杀手段稍有不慎,很可能会引发大规模的公关危机,让你陷入深深的人民战争海洋,被钉在中国互联网发展史的耻辱柱上。 我在长达10年的网站运营生涯当中,很多次面临这种纠结的选择:社区号召力极强,粉丝众多的明星会员自立门户,以各种手段拉人,导致资深用户不断流失,社区的吸引力下降。封杀还是放任?下辣手封杀的话,只怕引起社区公愤,引发更大规模的公关危机;放任不管?难道坐视用户流失,看着自己被人当成温水里的青蛙,慢慢被煮死? 有个耳熟能详的段子,说你老婆和老妈同时掉进水里了?你先救谁?这个问题就是一个坑,你回答先救谁都不对,凡是碰到让你从两难选择中做决定的,答案一定既不是A也不是B,我们应该跳出两难选择的困境,重新审视问题本身:支付宝要解决的,其实并不是单纯的封与放,而是用户为什么流失?特别是为什么会流失到微信?微信提供了什么不可替代的,支付宝没有提供的价值?如果支付宝不能解决这个本质问题,无论你封还是放,都做错了,封杀还是不封杀,根本就没有区别。 那么应该怎样做呢?无论封杀还是放任,作为运营方来说,你做出裁决的考量必须是客观的基于维护用户的利益,而不能是基于阻止竞争对手挖人,阻止用户流失。也就是说你必须让自己忘掉两难选择,而是从支付宝面临的本质问题入手,即解决支付宝的支付体验问题。 我在长达十年的互联网运营生涯中,封杀的手段也干过,放任的手段也干过,经验和教训一大堆,给大家分享点实际案例: 段子一:我早年还没做社区的时候,有一行业内好友,比我资历更深,号召力更强。我运营社区后,邀请好友担任版主一职,好友欣然同意,这是一段双赢的合作:社区蒸蒸日上,好友也赢得了更高的社区名望和大批粉丝。但是后来好友对我渐渐产生了不满:好友认为我做社区之前,名望远不及自己,但现在声名鹊起,远远超过了自己,认为自己的付出很不值得。于是好友自己开了社区,开始拉人。 我当时是很纠结的:一方面怕资深用户流失,另一方面却不敢有所动作,毕竟好友也是社区号召力最高的版主之一,如果刻意打压,只怕引起社区更大的分裂,只能放任。后来好友自己运营社区大约一年左右时间,一直没有运营起来,网站后来就关掉了。而好友淡出社区以后,少了重要的舆论阵地,影响力与日俱减,几年以后,已经不再被很多人提起。 段子二:我早期运营社区,是业余时间凭个人爱好在做,社区发展比较缓慢,大约在2006年遇到了瓶颈,发展停滞,活跃度下降。这时候偏偏遭遇了更大的打击:几个对我的社区运营策略有意见的资深会员联手做了一个新的社区,以各种手段从我的社区拉人。段子一提到的好友也参与其中,他在自己独立运营的社区失败以后,加入了这几个资深会员的群体。由于这个新的社区一下聚集了好几个有号召力的会员,声势很猛,让我感受到了巨大的压力。这个时候,一个非常狗血的剧情发生了: 我当时恰巧去青岛出差,恰巧借住在一个朋友家,朋友恰巧是我社区的活跃会员,又恰巧刚被拉到了那个新社区,成为版主之一。更巧的是,朋友某次访问新社区私密版块以后忘记注销帐号,临时离开了,我又恰巧急着需要上网,用他的电脑打开了浏览器,浏览器又恰巧打开了最后访问的历史页面,不经意映入眼帘的页面讨论让我五雷轰顶:这些都曾经是我社区的会员,却聚在一起讨论如何拉人走,分析我性格当中的优点和弱点,如何打垮JavaEye社区。稍感安慰的是,朋友在其中持中立态度,并不支持也不愿意参与这种讨论。我关掉浏览器以后,装作什么都不知道。 但我受到了深深的刺激,出差回到上海以后痛下决心,开始全职创业运营社区,从产品重写到运营加强,仅仅一个多月以后,声势大振,网站流量翻了10倍,一举突破了发展瓶颈,解除了迫在眉睫的危机。而那个新的社区在步履维艰的坚持了不到一年以后,悄然关闭了,很多资深会员甚至回流了回来。 段子三:我后来接任管理更大的社区,花了很大的努力,才开始扭转社区下滑的趋势,让社区开始高速增长。有一天我的运营下属气呼呼的找到我,说某专家实在太气人了,说要从我们社区搬走了,要自立门户,在我们这里不再更新内容了。这个专家是我们从社区里面挖掘出来的,因为移动游戏开发方面的文章写的不错,我们也一直帮他做文章推荐,博客之星,安排专访,作为社区专家的招牌之一培养,很快就声名鹊起了,出版社已经约他出版了两本书。他现在这么干,不是卸磨杀驴吗? 我笑着对下属说:没关系,让他走,我和你打赌他还会回来,下属将信将疑。过了不到两个月,下属开心的跑过来说,这个专家果然回来了,声称继续在我们社区更新文章,问我为何预见他会回来? 专家在你的网站平台活跃,是因为你的网站平台对他来说有价值,可以满足某种他的利益诉求或心理诉求;当专家的利益诉求或心理诉求和你的网站所能满足的价值不再匹配的时候,他就有可能流失;当专家流失以后,他发现自己丧失的利益远远大于自己离开以后获得的利益,他就很可能又回流。所谓天下熙熙皆为利来,天下攘攘皆为利往也。我们来看看上文的三个段子: 段子一:我的好友在社区活跃,是因为网站给他带来了更多的价值:荣誉感,社区地位和名气,以及潜在的就业机会;好友离开是因为他的心理诉求已经超过了社区能够给予他的,他认为通过自己创办一个社区可以获得更大的利益。但是好友犯了一个认知错误:他认为我当年还不如他,既然我都可以运营一个成功的社区,凭什么他不可以?好友低估了运营社区的难度,也看不到我运营社区那么多年在背后付出的无数努力、汗水和教训,焉能不失败? 段子二:社区的几个有号召力的资深会员联合起来做了一个新社区,为什么败了?他们本身没有犯什么错误,而且对我这个强大的竞争对手也足够重视,甚至通过分析我的性格去寻找突破口。他们失败的原因只有一个,就是:业余的爱好,干不过我破釜沉舟背水一战的全职创业,简单的来说就是:狭路相逢勇者胜,当双方都没有犯致命错误,胜负又未分的时候,就看谁更努力更拼命的把产品做好,把运营做好。 段子三:我在接手更大社区改造和重组运营团队的时候,就明确了社区运营策略:社区与专家共同成长,放弃那些社区无法满足其价值诉求的行业明星级导师,重点培养从社区里面成长起来的专家。这些专家在自身获得足够多名望和社会资源以后,必然寻求更大的价值诉求,不希望把自己通过平台间接获得的利益与社区分享,这是人之常情;但是当他自立门户以后,就会发现一旦他脱离这个平台,他的号召力和名望瞬间就消失了,必须从零开始重建资源,权衡利弊,还不如回流。这就是我运营社区,对专家的掌控逻辑:你来我给你利益,但是你走了,什么都会失去。因此我运营社区,大部分核心会员的忠诚度是极高的。这就是移动开发专家为什么走了,又不得不回来的原因。 当然,在我的运营逻辑里面,那些有自己独立社交资源,不依赖社区而生存的专家,从来都不是目标用户,是被战略放弃的。这些老MVP会员长期享受着社区资源的照顾,生活在光环下,但对社区既无忠诚度也无相应的贡献度,高高的盘踞在社区的顶端俯视众生,破坏了社区完整的生态环境。这一现象,是不是很像今天的新浪微博? 我革除了这些MVP会员的特权,注重培养来自于社区的草根专家群落,重视整个社区的生态环境建设,让社区开始变得生机勃勃,网站流量转跌为升,重点运营的产品,在一年时间流量增长了200%。当然被冷落的老MVP们自是对我很不爽,持之以恒的抹黑和告御状,我在公司内部也长期顶着很大的压力。 总之,以我自身的经验来说,要想解决用户流失问题,必须明白以下几点: 1、想清楚用户的利益诉求,如果你能够提供给用户足够的价值,根本就不怕用户流失,即使短期流失,迟早也会回流; 2、加强自身产品竞争力,运营竞争力,用户流失堵是堵不住的,用户不是网站的私有财产。必须让自己变得比竞争对手更强大,那样对手的用户都会被你吸引过来; 3、不要对用户流失做的太绝,否则会堵住他回流的可能性 其实核心思想就是一个:用户流失后拉人,封是封不住的,还是要提升自身的竞争力才行。 ## 互联网的大航海时代 当一个指数级发展的时代到来的时候,别人都在光速前进,你的前进速度只要稍慢一点,很快就会被淘汰掉,也许你原来还是一个千年霸主,可现在就会落后得连点渣都不剩下。就连新兴的霸主,只要速度稍慢,一样被秒的渣都不剩。大航海时代的霸主西班牙,荷兰照样被后崛起的英国秒掉。这是一个对于开拓者最美好的时代,也是一个对保守者最残酷的时代。 互联网时代的到来,尤其是移动互联网让我们人类社会的发展突然进入了加速阶段,这是人类又一次大航海时代,机会遍地都是,勇于开拓的互联网创业者前仆后继的寻找新的领域,一夜之间拥有亿万身家并不是仅仅只是梦想而已;耽于保守,自以为是的成功者们很快就会被时代彻底遗忘。即便是创业成功的新贵们,如果不能够保持开拓精神,照样会很快被淘汰掉。 我从2000年投身互联网行业至今已有14年,强烈的感觉到从2010年开始,移动互联网的投资和创业进入了爆发期的黄金年代。具体原因我在前面《为丁香园喝彩》当中也提到了:3Q大战改变了中国互联网的生态环境,移动互联网的爆发改变了社会的形态。其实还有一个原因就是中国经济的体量越来越大,从全球分工和资源以及市场配置的比重越来越高了,这也无形当中扩大了中国互联网的市场发展空间。 十分遗憾的是我2010-2013这4年远离了移动互联网这一波浪潮,等到我重新进入创业以后赫然发现,时代的发展速度已经比我4年前看到的快了10倍都不止,我已经彻底的被秒成渣了。所幸互联网的大航海时代还远远没有过去,我个人认为,至少未来20年以内,都将是互联网大航海时代,我们还将迎来一波又一波的创新,一波又一波的新领域开拓。在这个时代其实最大的成本就是你的时间成本,如果你没有把自己的职业生涯投入互联网创业,去开拓事业,那绝对是对自己人生最大的浪费。 在大航海时代,如果你安于守在自己领地的欧洲贵族,可能你很快就变成了一个没落的贵族;而你扬帆出海开拓殖民地,将很可能富可敌国。在互联网大航海时代也是一样的,我常常觉得自己作为一个70后,有幸赶上了这个时代:如果是60后,我未必能够理解互联网时代的规则,当然80后,90后和00后更是伴随着互联网成长的人,在如今的时代更加大有所为。生在这个时代,不参与互联网创业或者投资的,实在是辜负自己。 我最近总是觉得,生在如此伟大的时代,又生活在中国这样一个发展中未定型的国家,机会如此之多,不好好大干一场,夫复何求呢? ## 互联网招聘 互联网行业的火爆,带来的一个现象就是招聘需求变得非常迫切。尝试了一下流行的招聘网站,发现拉勾网效果还不错,至少互联网产品经理的简历还可以,投递的数量和质量都明显超过其他招聘网站。尤其是拉勾网使用的体验,让我这个对网络招聘比较专业的人士也不得不点个赞。难怪可以在创业一年多就融资了2500万美元呢。 看到拉勾网的高速成长,不得不说我是各种羡慕嫉妒恨,内心的酸楚就不用多说了,忍不住想写几篇文章和大家分享一下我过去做网络招聘的尝试,对网络招聘的想法,以及错过的机会。 我上一次创业做JavaEye网站,随着社区的发展招聘需求越来越旺盛,2010年被收购以前,主要的收入都是来自网络招聘。特别是在2008年的时候,SNS网站很热门,我仔细研究了Linkedin和类似的很多网站,在各种方向上都做了少量的尝试,对传统招聘网站也做了一些思考,当时个人的想法是: 一、传统网络招聘迟早会被颠覆 网络招聘不必大而全,专注于IT行业招聘即可 二、传统的公司招聘流程是很难被改变的,也许突破口就在新兴的中小型互联网公司身上 然而JavaEye如果全面转向网络在线招聘,当时也不太可能: 一、用户量还不足够多,2008年的时候,会员大概只有30万不到,而且还不是实名注册的 二、无论是网站转型,还是推出新的在线招聘网站,根本没有钱,我们当时养活自己的小团队还很困难,融资在当时也不被认可,所以最后还是选择了做点线上招聘广告,结合线下做点猎头的方式,赚点活命钱再说了。 2010年JavaEye被收购,我也加盟了CSDN,负责网站产品,研发和运营。进入CSDN以后,我建议重点发展网络招聘,因为JavaEye当时已经有超过100万高质量注册会员,是很好的资源。我建议以JavaEye网站为根基,定位于中高端技术职位招聘,做精品招聘,控制候选人质量,控制公司职位质量,放弃应届生招聘这一块。 但是CSDN之前和其他猎头公司合作网络招聘失败了,整个公司的业务都在收缩,不愿意碰这一块业务。而且CSDN的发展策略是把自己大的社区网站和JavaEye这个小网站整合成一个网站,对JavaEye独立发展的想法并不认可,因此搁置了。 即便回避了招聘业务,其实网站自发的招聘需求还是极其旺盛的,总有各路人马络绎前来询问发布招聘广告的服务以及猎头的服务,最后招聘广告业务就划到了商务媒体部门,猎头业务就划到了商务支撑部门。招聘业务本不是这些部门的职能,所以也毫无悬念的被边缘化了。其实即便不被边缘化,仅仅把招聘当成一块业务收入,而不是看成一项有潜力的互联网产品,也不可能有发展前途。 到了2012年,CSDN并购了一家猎头公司,又开始雄心勃勃的进军网络招聘市场:成立合资公司,挖角传统网络招聘网站的研发团队,组建销售部门,市场部门,用了半年多时间开发了一个完整的招聘网站出来。我从头到尾没有参与这个项目,不太了解具体的情况,只是感觉按照传统的招聘网站的路子再走一遍,恐怕不会成功。 2013年下半年我离开CSDN的时候听说这个招聘网站失败了,销售和市场团队或裁撤或者转岗了,公司转回到了传统的猎头业务。离开前公司回到上海以后,我其实相当看好IT垂直招聘市场,尤其是觉得微信里面做招聘类的项目一定会很有趣,现在我的朋友程朝辉的创业项目海丁网就是定位于微信的招聘,据说发展也很快。只不过由于竞业禁止的缘故,我现在不能去做IT网络招聘。 拉勾本身产品的方向不算创新,基本上符合美国IT招聘网站Dice.com的模式,而我在2009年就仔细研究过Dice了。拉勾网的与众不同之处在我看来至少有两点: 坚决定位在互联网垂直领域招聘,所有产品细节都是为互联网职位量身定做的,极大提高了招聘应聘双方的信息沟通效率和准确程度,而这一点是传统招聘网站没有办法做到的 做精品招聘,对职位的信息准确度要求很高,对求职者信息准确度要求也很高,信息准确度越高,求职成功率越高,避免了垃圾简历海投 遗憾的是,这些想法我在2009年自己做JavaEye创业的时候就想过了,但是没有资源去做;后来JavaEye被并购以后,尽管网站资源很充足了,但是我一直没有机会做这块,公司大了部门条块分割,我作为一个负责产品和研发的VP,没有什么权限去碰招聘业务;离开前公司以后,又因为竞业禁止,也不能做招聘业务。看来我这辈子和网络招聘无缘啦。 --- 前面文章介绍了我和网络招聘的缘分,这篇文章开始分析网络招聘面临的一些问题,为什么说网络招聘是一个大坑呢?因为在国内,网络招聘至今就没有一个做的特别好的,满足了企业招聘和用户求职需求的网络招聘平台。 网络招聘的第一波是三大招聘网站:51job,中华英才网和智联:这三家也只有51job财务表现不错,成功上市,但市值也不是特别理想,只有不到10亿美元,而Linkedin是280亿美元左右,以中国目前通过网络招聘的市场体量来说,收入和价值太不成比例了,至于另外两家更加每况愈下。 在三大招聘网站之外,当年三大门户网站也都尝试过网络招聘业务,其中网易尤其重视网络招聘市场,还和来自香港媒体集团成立合资的的1010精英招聘开拓这块业务,也曾经仿照51job发行纸媒拓展招聘市场,结果也是惨败;此外还有来自台湾的人力资源银行网站开拓大陆市场折戟而归。 既然门户型网站做网络招聘不行,Web2.0和SNS又如何呢?第二波做网络招聘的网站分为两类: 一类是仿照Linkedin做中国职业白领社交网站,这样的公司曾经非常多:天际,若邻等等,前仆后继的死了一个又起来一个,坚持了很多年以后,至今也没有一个做起来的; 另一类是Web2.0玩法,方式五花八门,例如有做招聘职位搜索的;有做简历分享、工作经验展示的;甚至还有做SNS掮客的,就是说猎头悬赏,让用户推荐自己的朋友,推荐成功有分红等等。 但是所有这些无一例外全都失败了。这第二波也偃旗息鼓了。而第三波做网络招聘的来头更大,百度做的百伯,声势很大,来头不小,最后还是失败了。 目前做网络招聘的已经是第四波了,就是拉勾,猎聘,大旗这些网站,融资和估值都很不错,势头看着也很好,那么他们能够在网络招聘市场成功吗?下一篇我从个人的角度分析一下为啥网络招聘市场成了互联网创业的炮灰,死了这么多公司,网络招聘市场还究竟有没有戏? 曾经和不少投资人交流过,所有人都觉得网络招聘市场,特别是白领的求职招聘市场是一块明显的没有被解决好的需求,不但是刚需,而且是很深的痛点,那么为何这么多年这么多公司前仆后继都没有做好这个刚需加痛点呢?我的观点是:网络招聘不是一“个”需求,而是一“类”需求,不是单个产品体系能够满足的。 这句话有点不太好理解,打个比方:上班族周末放假休息,想好好放松娱乐一下。这个周末“娱乐”的需求就不是单一的需求,有的人娱乐方式是宅在家打游戏;有的人是在家读书;有的人是约朋友看电影、吃饭或者逛街;而有的人是一家人出门自驾游,还有人是带孩子去上辅导课等等。 所以没有办法提供一个通用的娱乐服务,让各种各样年龄层次,家庭状况,收入水平,兴趣爱好的人都能满足。你或者针对兴趣爱好分类,提供电影服务,旅游服务,餐饮服务;或者针对收入水平分类,为高收入家庭提供什么娱乐,低收入家庭提供什么娱乐;或者针对家庭状况分类,为单身男女提供什么娱乐,为无子女家庭提供什么娱乐,为多子女家庭提供什么娱乐。 网络招聘市场面对的需求更复杂,因为它分为招聘方和求职方两个大的维度,从招聘方来看: 一、不同行业的招聘需求差异非常大:例如互联网行业和传统行业差别就非常大,以至于影响整个招聘的过程。比方说,互联网公司招聘程序员,非常强调你的编程水平,那就更倾向于通过笔试考察编程能力,传统企业应用看重行业背景知识,就不强调编程能力。 二、不同类型的公司招聘流程差异很大:例如创业公司可能只有一轮面试,直接见直属领导招聘;大型公司有若干轮面试,从HR到业务主管,到HRD,到业务总监等等。流程的差异会极大影响网络招聘产品的形态。 三、不同职位等级的招聘流程和招聘方式差异也很大:例如实习生和应届生招聘走的是校招,一线业务人员招聘走的是招聘会和网络招聘;高级职位和总监走的是猎头和朋友圈推荐,方式迥异。 四、不同的招聘岗位其招聘目的和策略也不尽相同:例如有些岗位急缺人,就是立马招过来填坑的,急且名额有限,招聘要求降低,入职时间要求高;有些岗位就是储备人才培养人才用的,大批量的招,看重基础素质;也有抢夺市场紧缺人才,恶心竞争对手的,招过来闲置的,那么给的待遇就不同常规。 从求职者来说,差异也同样大:学生求职者,初级职位求职者,高级职位求职者,职业经理人求职者,他们的求职方式,渠道都完全不同;基于不同的行业,公司类型,个人所处的就业状态,对求职者来说,需求都很不同。甚至家庭情况也会影响求职者的需求和意愿,例如有的求职者加班太狠,他的求职需求是去加班少的公司;有的求职者公司离家太远,想找离家近的公司;有的求职者看重全额社保甚至补充保险,这些都会影响求职需求和决策。 在招聘和求职需求差异化如此之大的情况下,双方能够互相直接掌握的信息却非常有限:招聘方只有一个招聘描述,而求职者只有一个简历信息,双方都对对方存在巨大的信息不对称,这带来网络招聘当中极低的效率问题,例如传统招聘网站海投简历,但靠谱简历聊聊。 要解决网络招聘面临的问题,至少需要解决以下问题: 1、解决招聘描述和求职简历单薄带来的信息不对称问题 2、招聘和求职的需求是多样性的,没有统一适用的规则,不能企图通过单一产品解决问题 3、招聘市场不是一个市场,而是一类市场,不找准目标细分用户,就无的放矢 今天先写到这里,接下来再分析不同的招聘产品形态问题。 上篇文章说到,网络招聘市场需要解决的问题: 1、解决招聘描述和求职简历单薄带来的信息不对称问题 2、招聘和求职的需求是多样性的,没有统一适用的规则,不能企图通过单一产品解决问题 3、招聘市场不是一个市场,而是一类市场,不找准目标细分用户,就无的放矢 传统的招聘网站,包括百度百伯的策略是:试图将网络招聘市场进行标准化和规模化,而网络招聘市场唯一能够相对标准化的产品只有“简历”这一项。所以传统招聘网站的核心模式都是围绕简历展开的:通过各种市场手段,尽可能多的积累简历数量,包括衡量KPI的核心指标都是每份简历的获取成本。 标准化的“简历”运营方式对于普通的非高端职位招聘是行之有效的,互联网的威力就来自于快速的规模化扩张,对非高端的普通职位,招聘需求可以尽量标准化,标准化的招聘过程可以提高招聘的效率。所以传统招聘网站还将长期存在下去,具有不可替代的价值。 但是传统招聘网站正是因为过于标准化,所以存在我上面提到的三个大的问题,对于更加强调个性化的高端职位来说,越来越没有效果。 拉勾网这类新的招聘网站对传统招聘网站的模式进行了必要的改进,针对性的解决了两个问题:定位互联网细分市场,找准目标用户群体;严格约束招聘公司对招聘职位的发布需求,加强招聘职位和简历的信息不对称问题,所以对于招聘效果的提升是立竿见影的,拉勾网可以说走在了正确的方向了。 但是拉勾网也不是完全没有问题的,拉勾网定位的互联网招聘这个垂直的行业,恰恰是一个供不应求的市场状况:合格人才的供给量远远小于互联网公司的人才需求量,并且整个行业对于高端人才的需求缺口越来越大,对于低端职位的需求缺口却并不大。而传统以简历运营为核心的模式,并不能够真正有效的解决高端职位的招聘问题。因为高端职位招聘需要考察候选人的方面更多,沟通次数更频繁更深入,这些都不是单薄的简历能够支持的。 所以拉勾网在面对互联网高端一点职位的招聘需求的时候,仍然是无法满足客户需求的。这也许是拉勾网下一步需要好好解决的问题。 第三类招聘网站在国内没有成功的先例,即职业社交网站Linkedin,以社交网络为模型招聘网站。以后我还想专门研究和探讨Linkedin模式,所以这里不展开讨论了。Linkedin无论从资本市场的认可度(250亿美元市值),还是高端职位招聘效果来说,都是相对比较理想的。中国将来的高端职位招聘,特别是互联网行业,肯定是越来越依赖于社交路径的,目前互联网公司招聘,来自于社交关系例如朋友圈推荐,公司同事引荐,同学好友关系的招聘已经越来越多了。 但是为什么中国的职业社交网络没有发展起来呢?我觉得可能因为这些原因: 1、职业社交网络的生成需要相当长的积累时间,是一个慢生意,Linkedin是2002年就成立的,10年以后才上市,算得上一个高龄的互联网公司了。哪个中国的互联网公司的发展能够给你10年时间慢慢发展呢? 2、互联网人才的短缺也是最近几年,特别是2010年以后才凸显的,只有高端职位,人才供给短缺造成的招聘高成本市场才更加依赖社交路径来招聘,至少在2010年以前,社交网络招聘没有足够的生存土壤。 3、招聘说到底还是需要人面对面的沟通才能完成的生意,线上产品并不能解决招聘所有流程,专业人士介入招聘流程是必不可少的,这也是猎头存在的价值。社交网络招聘只能完成招聘的前期流程,最终的落地仍然要依赖猎头或者公司直接用人主管。仅仅只是提供前期的线上互相认识的工具,没有后面的专业招聘合作方,仍然是无效的。 综上所述,社交路径的网络招聘会越来越重要,但是目前国内并未看到在这方面做的好的创业项目,所以我觉得这个市场还是有很大的机会的。只是做社交网络招聘这件事情时间会很漫长,也许需要5-8年的积累时间,而且需要你相当长时间专注在一个垂直的行业领域,例如互联网行业,并且你不能光做线上产品,还要有配套的线下专业的招聘服务。这样说下来,似乎网络招聘真的不是一个好的创业方向,而是一个创业大坑呀。 ## 魔都互联网 陈天桥把上市公司盛大游戏卖掉了,彻底退出了互联网,这似乎是个标志性的事件,魔都的互联网行业再次陷入的低潮,相比帝都互联网行业的蒸蒸日上,魔都究竟是怎么了?为何上海的互联网行业衰落至今呢? 在中国互联网的起步阶段,上海落后北京并不远,而且曾经一度有超越之势。2000年第一波互联网热潮当中,北京的新浪和搜狐率先上市,但随后的泡沫破灭让互联网行业遭受重创,在经过了一段低谷时期之后,正是上海的互联网公司一批一批脱颖而出,涌现了一批上市公司:盛大,九城,携程,51job等等,大有超越北京之势。 甚至在2005年之后,视频网站和web2.0网站,以及SNS网站的一波热潮当中,上海的互联网公司也不落下风,土豆甚至早于美国的youtube上线,在国内视频网站竞争初期领先于优酷;而web2.0时代的两个标杆网站点评和豆瓣,点评也不落下风。 到了2008年的SNS时代,上海的51.com也曾经和人人网分庭抗礼。与此同时兴起的电商时代,总部位于上海的易讯,新蛋比京东而言,完全也是三足鼎立之势。 更不用说网络游戏:端游时代,上海不逊于北京,甚至领先,盛大,九城,巨人先后上市;页游时代也有心动游戏出类拔萃;中间昙花一现的社交游戏更涌现了五分钟的开心农场,恺英的楼一幢这样的标志性产品。就算是手游时代的早期,也有Triniti这样中国最早的一代手游公司,就算如今上海的游戏领域已经全面无法和北京的手游公司抗衡了,还有DOTA这样的异军突起的明星产品。 那么魔都究竟从什么时候开始被帝都甩开的呢?我个人的感觉是,从2010年开始,魔都开始全面落后,或者可以这样说:魔都这些年没有犯过什么致命错误,但是从2010年开始,中国的移动互联网进入了一个光速发展时代,帝都互联网整个进入了一种癫狂的发展状态,而魔都还不紧不慢的走,很快差距就拉开了。 为何在移动互联网的大航海时代来临的时候,帝都能够跟上时代的脚步,而魔都就落伍了呢?我个人觉得有以下五个方面的原因: 1. 互联网生态圈的建立 2. 政治资源的影响 3. 城市产业布局的差异 4. 地域文化的推动 5. 做事风格的差异 后面我们分五篇文章逐一探讨。 ### 生态圈缺失 一个互联网行业繁荣的城市,往往能够形成一个良好的生态圈。在这个生态圈里面:既有体量巨大的上市互联网公司充当领头雁的角色;也有数量庞大,分布密集的中小互联网公司;还有围绕互联网行业必不可少的服务机构:天使投资,VC/PE,互联网媒体等等。 上海的互联网公司虽然数量不少,各个细分领域也有非常优秀的公司,但是整个生态圈是非常残缺的: 一、缺少领头雁 领头雁对整个行业的拉动是至关重要的。一个大型上市互联网公司,可以给整个行业的发展带来三个方面的好处: 1、人才溢出效应。大型互联网公司培养了巨量的,训练有素的互联网人才,这些人才在公司内部找不到上升空间以后,溢出到中小型或者创业公司。所以大型公司就是互联网人才的黄埔军校,没有大型公司每年批量生产人才,输出人才,小公司也发展不起来。 2、带动创投和创业者。大型互联网公司的上市造富了一群千万亿万富翁,这些人才在解决了自身财务自由以后,要么转身做天使投资,要么成为一个创业者,给互联网创业带来了生生不息的动力。 3、投资和并购。大型互联网公司现在都设有投资部,直接投资有潜力的创业公司,或者并购中小型互联网公司,丰富了创业成功套现的出路,增加了创业成功率。 此外,一个明星互联网公司甚至会影响整个城市的价值观念,例如阿里的员工在杭州人民心目当中的地位就高高在上,间接增加了员工的自豪感和对阿里的归属感,从而影响了年轻人更愿意投身互联网行业的职业选择。 北京互联网行业的领头雁前有新浪,后有百度,360,京东和小米;杭州有阿里;深圳有腾讯。恰恰是上海和广州,没有领头雁,所以整个城市的互联网氛围不浓厚。 上海本来是有机会产生领头雁的,2010年急速扩张的盛大充当了这一角色,在互联网各个领域包括文学,智能硬件,移动互联网全面出击,一度有凌驾于北京和杭州之上的趋势。只可惜盛大自身的公司文化就有急功近利的基因,在盲目扩张遇到挫折以后,又盲目的收缩和转型,彻底葬送了上海互联网行业可能形成生态圈的一点机会。 时至今日,上海在互联网云计算领域的创业新星ucloud和七牛,本质上也是肇始于盛大的扩张,更可以看出大型公司对于行业发展的推动力。如今盛大已经全面放弃互联网,转型投资机构,不得不令人扼腕叹息。 二、互联网公司分布过于分散 上海的互联网公司数量不少,但是和北京,杭州,乃至深圳相比,办公区域过于分散,没有形成一个大家在一个区域内办公,经常交流,创造很多合作机会的园区。 北京的互联网公司非常密集,全部集中在中关村,上地,CBD和望京四个地方。上地和望京还是后来发展起来的,原来就是中关村和CBD两个地方,特别是中关村现在的创业大街,创业公司的密集程度,那种创业的氛围,交流的欲望,产生的投资并购机会,合作的机会,对创业公司的孵化推动作用是立竿见影的。 上海的城市布局比北京更加合理一些,办公区域天然就非常分散,带来的结果就是互联网公司没有一个超级集中的办公园区:市中心的人民广场,淮海路新天地,南京西路,静安寺,卢湾区的创意园区;往北的大宁地区,杨浦的五角场;往西南的徐家汇,漕河泾;往西的中山公园,虹桥地区;浦东还有小陆家嘴,陆家嘴软件园,张江软件园,金桥。 互联网公司星罗棋布的分散在上海的各个角落:盛大在张江;携程在虹桥;大众点评在中山公园;心动游戏在大宁;巨人曾经在漕河泾;原来的土豆在苏州河边;创新工厂在五角场。过于分散的结果就是公司之间的交流不方便,行业没有形成合力,像一盘散沙。 三、投资和媒体服务没有跟上 北京的互联网行业投资和媒体服务异常发达,这背后有一定的政策原因,随着行业的集中度逐渐倾斜到北京,典型的马太效应,上海的互联网配套服务越来越落后,竟至于没有任何影响力,令人叹息。 ### 政治资源 我在本系列文章第一篇提到,上海在2000开始的互联网起步阶段,并不落后于北京,但后来逐渐的落后了。这中间固然有互联网生态圈没有完整建立起来有关,但是不可忽视的是:政治资源在京沪两地的发展过程当中起了非常重要的推动作用。 一、户籍政策对人才吸引力的影响 2005年之前,上海的人才引进政策非常宽松,只要有大学本科学历(2004年之前甚至是大专学历),户口迁移到上海没有任何障碍,落户上海极其容易。而且对于已婚已育的人才,落户上海的同时可以家属随迁,一下子全家都可以落户上海,我有朋友当时就是这种情况,全家户口都一下落在上海了。而在上海重点高校就读的本科生,一毕业直接落户上海。 而北京落户极其困难,本科几乎没有希望,硕士研究生以上才有可能解决户口,而且需要就职单位有进京指标才行,这就限定了只有进国企,单位愿意给你进京指标,才能落户。就算你是清华北大,也是一个系的毕业生竞争少的可怜的几个进京指标。 另外当时的北京对待外来打工人员是非常恶劣的,经常查暂住证,没有暂住证的外来人员抓到昌平挖沙子然后遣送回原籍的不在少数。我姐姐当时在北京的Creative(就是新加坡的那家著名的做声卡的公司)工作,就有公司的员工一碰到上门查暂住证,就赶紧往厕所里面躲。 所以在当时,就造成了大批的人才从北京向上海流动的现象,这也是早期上海互联网能够和北京分庭抗礼的重要原因之一吧。 上海在户籍政策方面2005年以后逐渐收紧,开始向居住证制度转变;另外2003年广州孙志刚事件以后,北京对于外来打工人员的处理也逐渐改善,上海的优势就慢慢被削弱了。当然,直到今天,落户上海仍然远远比落户北京要容易的多。 二、政府换届对城市发展的影响 2008年之前,上海的经济发展以及城市建设是非常快的,我印象当中GDP每年都是两位数增长。某前任市长虽然在政治上有污点,最终身陷囹圄,但其人算是一个能吏,任内上海的发展可以用日新月异来形容,特别是推动了洋山深水港和东海大桥的建设,打下了上海作为一个国际贸易中心的基础。 众所周知,其人在2007年换届前落马。政府换届之后政策的中心转移到了建设天津这个北方金融中心,上海由于大家都知道的原因,经济发展全面减速,洋山深水港的建设也停滞了。2012年政府再次换届之后,经济政策中心也在发展京津冀,上海这些年除了金融和零售行业,发展基本停滞,即使是金融业,也面临被北京超越的境地。整个大的经济环境多年减速,互联网行业其实是无法独善其身的。 上海自贸区是为数不多对于上海来说利好的政策,但是从目前来看,也不过是雷声大雨点小,短期内不会有本质的改观。当然经济减速也不完全都是负面的,至少从2008年开始到现在的这一轮经济泡沫,北京的房价从一直低于上海,一跃反超上海,开始遥遥领先。 三、文化媒体产业牌照的控制 其实不单单在互联网行业,音乐、电影和文化产业在最近的二十年都是向北京集中的。在上世纪八九十年代,广州和上海都诞生了流行音乐的文化,最终都集中到了北京;电影更不用说了,上海电影制片厂,西安电影制片厂早就衰落了,电影人才全部集中到北京去了。这背后的原因说到底就是牌照和审查制度。 你要得到相应的牌照,你要通过审查,必须靠近权力机构,靠近审查机关,否则怎么死的都不知道。土豆网就是一例,土豆的上线发布比youtube还早,在第一批互联网视频网站的竞争中一直领先于优酷。可在2009年互联网视频牌照收紧的时候,土豆因为在上海,公关不到位,被强行关站一个月,等到再恢复服务的时候,已经被优酷彻底甩开,从此不得翻身。所以王微再次创业追光动画就学乖了,跑到北京去开公司了。 我们也可以观察到一个现象,互联网凡是和媒体相关的服务,绝大部分都在北京,道理就在于此,不靠近权力中心,发展道路上遇到的坑太多,随时可能壮烈牺牲。 我2012在前公司上班的时候也遇到过这样的事情。当时公司和一家总部在上海的猎头公司合资做一个在线招聘网站,这个合资公司打算设在上海,公司来咨询我的意见。 我告诉公司:2012年正好是政府换届的时候,互联网ICP牌照发放极其严苛,除了北京还能发ICP牌照,其他城市都停止了。这个合资公司如果在上海注册,结果就是在线招聘网站根本申请不到ICP牌照,无法上线,因此建议合资公司设在北京。 当时公司相关负责人很惊讶会有这种事情,还不太相信,后来咨询了上海通信管理局,果然就是停止发放ICP牌照了,最这家合资公司只能设在了北京。 这个例子就活生生说明了,相关的产业政策逼得你这家互联网公司只能在北京开,自然北京的互联网行业集中度就会越来越高。 今天的话题好像有点沉重,不过中国的确还是一个政策导向性很强的经济模式,我们不能忽视强势政府对产业布局的影响力。北京的互联网行业发展到今天,是离不开政府导向的。 ### 行业布局 前面3篇,我们分别谈到魔都落后的两个原因:生态区的缺失和政治资源的倾斜。现在我们谈行业布局对互联网发展带来的影响。 北京作为中国的首都,集中了中国的政治和文化资源,理所当然的科教文卫超级发达;而上海是优越的地理位置形成的工商业大城市,工业和商业超级发达,但是科教文卫资源就远远不及北京。互联网作为信息产业,对科教文卫资源的依赖程度很大,北京发展互联网的土壤比上海更丰厚一些。 有兴趣的朋友可以看看北京和上海的城市统计年鉴,能够发现很多有意思的数据,我对比了2013年两个城市的数据,发现几个有意思的结论: 1、上海的工业发达程度远超北京,是北京的两倍多 + 上海2013年第二产业产值8027.77亿元,其中工业产值7236.69亿元; + 北京2013年第二产业产值4352.3亿元,其中工业产值3536.9亿元 2、北京的第三产业略超上海,其中信息产业超过上海很多 + 北京2013年第三产业产值14986.5亿元,其中信息产业1749.6亿元; + 上海2013年第三产业产值13445.07亿元,其中信息产业1387.88亿元 3、上海的零售行业异常发达,远超北京 上海2013年批发和零售业3927.55亿元,北京2013年批发和零售业2372.4亿元 这个初步的结论不知道大家对这两个城市会得出什么样的印象?我的印象是这样的: 上海无愧中国最发达的工业城市和商业城市,比北京更发达,但同时也更传统。正因为发达的工商业,反而对互联网的需求,接受度,以及普及程度会带来一定的障碍,如果你的衣食住行需求已经得到了很好的解决,那么新事物的接受度必然要缓慢很多; 而北京也许正因为传统工商业的不够发达,基础薄弱,反而发展新型的信息产业包袱更小,接受度更快,加上科教文卫资源的丰富,更加能够刺激互联网的发展。 此外,不知道大家有没有发现,上海的互联网行业虽然不如北京发达,但是软件产业特别是传统企业应用领域却非常发达,在北京几乎人必称互联网的时代,在上海的IT领域,企业应用的需求却一直非常旺盛,关注企业应用的软件研发人员群体也非常庞大。其实这也是因为上海发达工商业带来的企业软件开发需求所导致的现象。 ### 地域文化 高晓松的《晓说》第二季收尾的脱口秀,讲述了49年之前的上海滩大班犹太人哈同的创业故事,在那个时代,上海是一个冒险家的乐园,放在今天,就是不折不扣的创业者的淘金天堂。从1840年开埠的小渔村,到1940年代的东方巴黎,上海这座城市的百年发展史,就是一个不断吸纳来自全球的移民,海纳百川的城市崛起之旅。 49年之后的上海随着整个国家的封闭,早已失去往日的开放性。随着冒险家们的离开,上海丧失的不仅仅是财富,还有冒险精神和创新能力,上海早已不再是一座移民城市。 上海常住人口从2000年的1400万,增长到如今超过2400万,考虑到上海本地人口负增长的出生死亡率,也就是说在14年间,上海有超过1000万的外来人口导入。然而即便这十几年来如此高的移民比例,仍然没有改变上海的地域文化,上海仍然不是一座移民精神的城市。而北京相比来说,则是不折不扣的一个有点类似深圳的移民城市。 我说北京是个移民城市,这观点可能有点骇人听闻,且听我的分析:北京这个城市发展到现在,本地文化已经没有什么存在感了。北京的人文环境,中心点是一个很强大的政治官僚体系的大圈子,除此之外就是星罗棋布的各个地方人,各个行业形成的自己的人文圈子。 49年以前,北京不是一个移民城市,而49年以后,随着党这第一批移民进城,北京本地文化就逐渐消亡了,现在北京文化的核心就是政治文化,而没有本地文化。所以在北京这个城市,你会发现北京本地人的存在感很弱,反而是东北人和四川人的存在感很强。本地文化的缺失造就北京很重要的一个文化特点:海纳百川,每个外来文化都可以在北京很好的原汁原味保留下来。 所以无论你是东北人,还是南方人,在北京基本不会碰到地域歧视的问题(但很容易碰到级别歧视,例如你没有政治关系,有钱都不好使,看门大爷都可以呵斥你)。而且来自于各个不同地方不同行业的人,可以把自己的生活习惯和文化习惯在北京很好的保留下来,基本上没有人去干涉你。 这带来的一个很大的竞争优势就是多样性,这种多样性对于需要创新的产业来说尤其重要,各种思想碰撞、交流和相互启发,可以创造出很多新的产品。所以影视行业,互联网行业的中心都在北京,而不在上海。 不同于北京,上海本地地域文化很强大,上海本地人的存在感很强。尽管上海近年来外来人口剧增,但是上海本地地域文化有很强大的同化外来文化的能力,所以上海的人文环境始终就比较单一,缺乏多样性。 什么叫做同化能力呢?比方说我很多上海本地出生长大的朋友都非常热衷于同化身边的外地人朋友。如果他认可你,那么他就很想把你变成一个地道的上海人,很热心的教你上海话,教你很多上海风俗习惯和社交礼仪。如果一个上海人很认可你,那么他通常喜欢这样说:XXX,你真像上海人呀。 客观的说,上海作为中国最早对外开放的城市,上海本地文化更靠近现代文明一些,但是上海地域文化的同化能力会消灭一个城市人文环境的多样性。来到上海的外地人通常慢慢演化成两类:一类就是越来越喜欢上海,不知不觉接受了上海人的很多生活方式,最后发现自己行为习惯越来越像上海人;另一类是比较排斥被上海人同化,认为上海人很排外,慢慢倾向于离开上海。 由于人文环境缺乏多样性,所以你做一些不符合主流文化事情的时候,很难得到很多人的认可和响应,事情要做起来就比较困难。不像在北京,你做多么非主流的事情,总能找到一大票同好,那么startup就会容易很多。 我在北京的几年,就发现很多在我看起来异常不靠谱的事情,居然都有很大一票人前仆后继去做,这种现象在上海是很少的。尽管很多不靠谱的事情最终真的不靠谱了,但你也不好说有些事情后来就真的做成了呢?所以上海文化在创新性上存在严重不足。 移民,特别是高素质的移民对创新的推动是非常重要的,硅谷某种程度上也是移民在推动创新。在中国大陆的四个一线城市当中,北京和深圳都是比较明显的移民城市,而上海和广州都不是移民城市。比较耐人寻味的一点:北京和深圳都是没有方言的城市,其中老北京的方言基本已经消亡,而上海和广州都是方言比较普及的城市。 ### 做事风格 笼统的说,北方人做事情的风格和南方人差异还是挺大的,这种差异性在互联网创业领域也会带来北京的竞争优势: 北方人,尤其在北京这个天子脚下,风气基本上都是先夸下海口,把事情提炼到居高临下,先拉一个大架子,描绘一个宏大的愿景出来,至于落实,就粗疏的很;南方人,更加务实,尤其上海这个精明谨慎的城市,更推崇把事情做的滴水不漏的人才,而不是夸夸其谈的人。更看重近期的目标达成,而不是远期的愿景。 从很多方面来说,特别是作为城市的公共设施以及公共服务方面,务实做事的风格更招人喜欢,这也是为什么上海城市管理水平和服务水平超过北京至少10年以上的原因之一。 但凡事都有两面性:在互联网创新领域,光谨小慎微,把手里的事情做到极致是没有意义的。在快速发展的时代,进步都是来自于增量创新的,不是存量改进。上海做事情的风格,对于互联网创新来说,节奏太缓慢了,战略眼光也不够长远,往往只能做好某些阶段性的产品,在随后的长跑竞争当中,就会被跑的更快,融资金额更高的竞争对手甩开;或者因为没有足够的战略眼光,取得阶段性成果以后,就轻易的放弃了独立发展的道路,选择了套现退出,从而丧失了成为互联网巨头的可能性。 我在北京工作的时候,也很不习惯夸夸其谈,言必称某某项目估值多少亿的盘子,某某项目有平台潜力,某某项目资本市场如何如何热类似的话题,我总觉得这是毫无意义的扯淡,纯属浪费时间,非常看不起这种做事情的风格。但是后来我发现自己的看法也有偏激之处: 在一个剧烈创新的互联网时代,诚然有大量扯淡的项目和扯淡的人,也诚然泥沙俱下,但确实有很多靠谱的项目在早期是让人看着非常不靠谱的。或者说,就算有些项目起步的时候也的确就是扯淡,但是你架不住打了鸡血的快速行动能力,非常挑战智商的融资能力,和非常疯狂的战略远见。这个开始可能根本就不靠谱的项目,就是靠着打了鸡血的热情,和疯狂的资金支持,最终就真的变成了一个靠谱的项目。 我曾经亲眼看到了好几个这样的案例,我曾经帮助别人看过几个项目,无论起步阶段多么不靠谱,能坚持下来的,都阶段性成功了,很多项目的巨大成功都在挑战我的认知。如果要我总结这些我自己都不看好的项目是怎么样走向成功的话,我觉得就是: 1. 打了鸡血式的迷信自己能够成功,不单单是忽悠别人相信,首先就把自己催眠了; 2. 在资本市场火热的大环境下,始终有资金的支持; 3. 做事情真的很拼命,速度飞快,“天下武功,无坚不破,唯快不破”,对互联网创业来说,绝对是真理。 有了这三板斧,你看这个团队纵然各种不堪,例如老板奇葩也好,技术差劲也罢,能力不足也有,加上管理稀烂,员工流失,各种槽点,各种问题,你怎么看都觉得不行,可就是能成功。 其实坐下来看看,北京很多创业团队都具备这样三点,而上海很多创业团队是不具备这三点的: 1、过于务实的风格,导致既不能催眠自己,也不能忽悠别人; 2、投融资的主要市场还是在北京; 3、做事情还是太讲究姿态优雅,不够拼,不够快,机会就算抓住了,都会溜走。 ### 上海还有戏吗? 前面几篇文章从互联网生态圈,政治资源,行业布局,地域文化,以及做事风格五个方面分析了上海互联网行业目前全面落后于北京的原因。实事求是的讲,在短期内,上海的互联网行业是没有希望追上北京的。当然也不必盲目悲观,北京毕竟只有一个,除了BAT巨头的特例之外,从整个行业的容量上来说,上海目前也只是落后于北京而已,仍然比广州和深圳大很多。 而且北京虽然在互联网工作和创业条件有独特的优势,但也不是没有问题的。我本人在上海工作和创业10年,因为创业公司被收购,在北京又工作3年多,之后又选择了回到上海继续创业。北京的互联网在我看来,也有一些严重的问题: 一、北京的创业成本过高。 虽然北京的基本生活用品和交通物价略低于上海,但北京的房租和工资水平超过上海很多,综合创业成本来说,北京比上海高出30%左右。 二、行业过于繁荣带来的问题,行业繁荣当然是好事,但是过于繁荣也会带来一些问题,例如: 1、人员跳槽过于频繁,公司招聘和留人的隐形成本非常高,而且很多人因为每段职业经历都很短暂,没有真正积累经验,都是眼高手低,不堪使用,都被废掉了; 2、整个行业大部分人都有好高骛远的倾向,太多的创富神话让每个人都恨不得立刻成为亿万富翁,真正能够沉得下心来做事情的人很少; 3、创业公司迫于高昂的运营成本和激烈的竞争,很难稳住节奏根据产品的培养周期来发展,很多都是一味的高举高打,快速融资快速催肥。如果不能一直踩对资本市场的节奏,用一轮一轮的融资去烧到足够垄断的规模以及建立健康的商业模式的话,最后也很容易快速崩盘。 三、北京非常糟糕的生活环境。这一点就不展开说了。 那么上海在互联网行业还有希望吗?我觉得全面赶超是没戏的,但是上海也有一些有别于北京的优势,可以做一些差异化的竞争: 一、基于上海发达的金融基础,在互联网金融领域会有机会的。 在金融领域,北京因为是首都,对金融领域管制比较多,不如上海金融领域相对更开放,互联网金融领域,上海是有可能创造一些机会的。 二、慢工出细活的互联网项目,上海会有一些机会。 不是每个互联网项目都适合大干快上的,有些产品的培养周期可能就是漫长的,有些市场的教育过程就是需要时间积累的。在北京,你没有可能好整以暇的做项目,要么就是拼一把一步登天了,要么就是拼一把快速失败了。需要慢工出细活,需要仔细打磨,需要耐心培育的项目,在上海起步,可能更加适合一些。 这是魔都互联网系列的最后一篇了,在我看来,上海的互联网环境能够改善,而且应该立刻去做的就是:加强互联网行业的交流,在这个方面上海和北京的差距是最大的。上海的互联网公司数量,从业人员数量都非常多,只是像一盘散沙一样,整个行业的力量没有被调动起来。如果能够再多一些交流和沟通,多一些行业俱乐部和组织,那么上海的互联网行业才会更加有希望。 整个魔都系列写完,我最后想补充的是:尽管上海的互联网工作和创业大环境不如北京那么成熟,但具体到每个具体的人,具体的项目,大环境的影响没有想象当中那么大。真正能把事情做成功的人,无论在北京,还是上海,终究都会成功的。 ## 从大佬一抓就死说起 探讨互联网行业一个很有趣,但是非常普遍的现象:为何大佬一抓就死?说几个段子大家就明白了: 在开心网最火的时候,搜狐也曾经做了一个口碑很好的产品,叫做白社会,主打白领社交,用户发展很快,张朝阳一看白社会势头很好,高调宣布,亲自抓这个SNS项目,死磕开心网,结果白社会熄火了。 三年前新浪微博势头很猛的时候,张朝阳跳出来高调宣布:搜狐感受到了生存的威胁,要亲自抓搜狐微博,和新浪丫死磕。然后亲自站台,拉拢各路明星进驻搜狐微博,大打公交车路灯地铁等户外广告,刘亦菲的大头照满大街都是,当时搜狐的同仁就慌了,张朝阳魔咒阿,只要他不抓就活,他一抓就死,这是要作死的节奏阿。 最后的结果大家看到了,搜狐微博偃旗息鼓。而搜狐真正做的最好的产品,搜狐畅游,搜狗,反而是张朝阳放任不管期间,甚至是隐退期间做起来的。 同样马化腾也宣布,微博是战略级产品,也亲自拉拢各路大V用户,例如李连杰进驻腾讯微博,到处宣传,到现在也不死不活。 马云的段子也不少,其中最有名的两个就是雅虎中国和口碑网了,当时看新闻说,雅虎中国首页的色调,样式都是马云亲自定的,结果雅虎中国很快玩完;后来轮到了口碑网,我又看到新闻说马云高度重视生活服务类网站,口碑网改版,要死磕大众点评,马云亲自设计口碑网首页。看到了这句话,我心里就说:只要马云设计网站首页,这个网站绝对死定了,后来果不其然。 丁磊的段子也极多,在网易内部,也是每抓必死,曾经听纯银讲过好多段子,说网易内部产品经理如果想让项目有希望,最重要的是瞒住丁磊,不让他知道,一被他盯上,项目就完蛋了;网易现在做的比较好的项目,都是丁磊不管的,就连网易的支柱产品游戏都是如此,丁磊远在杭州,根本管不到广州的游戏团队。 以上这些都还是站在中国互联网浪潮顶尖的成功人士,尚且如此不堪,更不要说下面无数中小互联网公司了,基本脱不开一个魔咒,就是:公司开拓互联网创新产品,老板一抓就死,屡试不爽。 为何互联网行业会有这种怪现象呢?一手缔造公司出来的大佬怎么就成了埋葬公司新产品的杀手了呢?为何传统行业很少看到此类现象呢? ### 互联网行业的特征是什么? 互联网行业有什么区别于传统行业的特征呢?或者说互联网时代有什么特别的地方吗? 凯文凯利写过一本很有名的著作《失控》,这本著作也受到马化腾和张小龙的推崇,内容很多,大概讲述复杂系统的进化过程: 在传统的人类社会,由于交通工具和通讯工具的限制,人类社会这个大系统节点的复杂度是有限的,社会进化比较缓慢和有序,局部节点的扰动影响的范围也很小。 但是互联网彻底改变了人类社会的进化过程,物理空间的限制瞬间消失了,人类节点之间的联系,瞬间从少数的链接状态,变成了无穷多的复杂链接状态,单个节点的扰动,很可能迅速传播到整个人类社会,深刻的影响了人类社会政治,文化,经济各个方面,政治就不提了,鸟叔的全球爆红就是很好的例子。总之系统的复杂度已经达到了无法预测,无法控制的地步,谁都不知道什么时候突然会冒出来一个什么新东西颠覆了整个世界。 在互联网行业,我们可以观察到一个很明显的现象:就是成功公司创造财富的速度非常惊人,例如Google,Facebook成立仅仅几年时间,就可以达到几百上千亿美元的市值,超过很多持续成长了上百年的传统跨国公司;同样,互联网公司垮掉也会发生在短短几年时间内,例如SUN公司,NOKIA都是活生生的例子。这些现象说明工业时代以来的商业社会的进化规则已经过时了,互联网时代有了新的商业特征: 一、一旦你在行业处于领先地位,就是赢家通吃,而且优势会不断拉大,而且只要你不犯大的错误,竞争对手根本没有任何机会颠覆你,你可以高枕无忧了。 互联网行业为什么在早期圈地的竞争阶段非常残酷,大家全都放弃利润抢占市场,就是因为你在行业里面抢到最大的市场份额,未来就前途光明;你抢不到最大的市场份额,只能苦逼到死,没有翻身可能。 我们看到很多大佬一战成名之后,其实也是混招迭出,段子不停,这方面的轶事很多啦,像张朝阳,丁磊,马云,陈天桥,李彦宏都是如此,有些大佬看似就像个昏君,连你我都纳闷他怎么能这么昏聩?可公司怎么就是屹立不倒,越来越赚钱了呢?道理就是如此,一旦形成垄断地位,公司发展的惯性非常大,就像一列高速行驶的列车,它不可能出轨。 二、大约5-10年时间,整个行业就会被颠覆一次,大佬的公司如果不能在行业转型期再次取得领先地位,与时俱进的话,很快就会被时代淘汰。 互联网时代行业的变革期来的太快了,往往当你还没有把胜利的果实好好享受一番,新的革命又来了,让你气都喘不过来。我最近看马化腾的讲话,说自己很担心不了解年轻人感兴趣的东西是什么,很害怕不了解年轻人的需求。所以,这是一个失控的时代,财富可以在短短的几年内以惊人的速度聚集,以不可战胜的实力,击败所有的传统势力和竞争对手,也可以在短短的几年内,被更新的潮流颠覆。说到这里,我觉得技术宅男其实是这个时代的宠儿,因为: 1、技术领域,特别是编程行业的发展速度是飞快的,几乎两三年所有的技术储备就要被彻底淘汰一遍,你三年前辛辛苦苦,废寝忘食掌握的编程语言,框架,类库很可能全部过时了,迫使你不停的学习新技术,追赶时代的脚步。因此技术宅男是最快能够适应互联网时代高速进化的族群; 2、因为技术宅男很宅,所以是和互联网链接时间最长,最多的群体。在这个时代,链接互联网越长,越能够发挥互联网威力的人,在未来的行业转型期,越能够敏感的把握新的机会,创造惊人的财富。 总之:互联网行业让整个人类社会的发展都进入了一种飞速的进化状态,公司的生命周期变得很短促,优势竞争地位会迅速放大,树立牢不可破的门槛;行业颠覆也变得很快,所以看似很怪诞,你固有的成功经验所无法理解的新鲜事物就会越来越多,大佬当然也是如此。 ### 骄傲的将军 话说在传统商业社会,大佬往往就是常青树,屹立几十年不倒,例如股神巴菲特,用价值投资理念运营股市投资,已经超过了50年,仍然保持着极其稳定和高额投资回报,其投资理念被一代代二级市场投资者奉为经典,每年伯克希尔·哈撒韦公司在奥马哈的股东大会,都成为了投资者的朝圣之旅。另外像华人首富李嘉诚也是同样屹立不倒五六十年,时代的变迁仿佛不会在他们身上留下多少痕迹。 然而互联网行业进化的速度实在太快了,在短短的不到20年时间内,我们就经历了从PC门户时代,到搜索引擎时代,然后快速进入了移动互联网时代,接着互联网又要全面渗透和改造人类社会的方方面面,每过几年,所有的知识储备,所有的经验积累就全部过时了,仅仅过了10年,究竟有多少产品已经被全面淘汰出了我们的视野呢? iOS6发布以后,苹果的Podcast应用,模拟了一个录音机磁带的拟物效果,当时我就觉得很愚蠢,对于90后的一代来说,磁带已经是他们从来没有见过的东西了,所幸随后iOS升级,去掉了拟物的设计;类似的例子还有应用程序的保存按钮,使用的是软盘的拟物效果,请问年轻人还有谁知道软盘是什么东西?不要说软盘了,就是光盘都快绝迹了;还有MP3播放器,更是昙花一现,从出现到消失,不到10年时间。 互联网行业的进化不但没有减缓,还在不断加速发展,我们不知道究竟有多少东西,多少知识,多少经验积累,将很快被无情的抛进历史的故纸堆,也不知道哪天某个社会底层的屌丝,就会上演人生大逆转,我开肉饼铺子订阅号开篇讲的就是《要对屌丝抱有敬畏之心》,这也是肉饼铺子的基本价值观念:在互联网时代飞速进化的今天,任何人的领先优势都会被瞬间清零,如不拥抱变化,对新鲜事物抱着抗拒的心态的话,今天的大佬,明天就会轰然倒塌。 对于创新产品,大佬之所以一抓就死,最大的原因就是大佬习惯于用自己过去的成功经验和知识积累去判断新鲜的事物,但殊不知自己的知识积累和成功经验早已经过时,大佬自己高高在上,往往又不会深入业务产品第一线与时俱进,丧失了对用户需求,对产品定位的敏感性,这个时候单纯凭借成功经验去做决策,就是在葬送产品的命运。 大佬在自己亲手打造的公司里面拥有极高的权威性,地位高高在上,一言九鼎,长此以往,就会养成骄傲自负的心态,认为自己无所不能,不大看得起来自产品运营第一线工作人员的意见和反馈,更相信凭借自己的经验和能力做出的判断,宁愿和高管关在会议室里面头脑风暴、空谈战略,宁愿参加行业高峰论坛和名流觥筹交错、谈笑风生,也不愿意放低身段,和自己的一线产品运营进行深入的沟通,和自己的普通用户进行持续的互动和反馈。 大佬成名以后,为了提升逼格,开始结交社会名流,娱乐明星,所谓谈笑有鸿儒,往来无白丁,越来越不屑于接触普通员工,越来越脱离互联网普通用户,越来越不接地气,越来越不了解互联网行业真实的发展状况,试问,在这种情况下,你怎么能做出正确的产品决策?在这种情况下,大佬抓创新产品,焉能不死?推荐大家看一部上海美术电影制片厂的老动画片《骄傲的将军》,就是讲述一个无敌的将军是怎么成为阶下囚的。 但是有人说,你说不对呀,貌似大佬虽然混招迭出,为啥公司不完蛋捏? 这是因为大佬成名以后虽然往往败家,但是败的还不狠,往往只是皮肉之伤,没有伤筋动骨,所以你就看那些大佬们瞎折腾,但是公司还皮实的很。只不过随着时代的发展,喜欢败家的大佬,迟早要被低调务实的第二波大佬超越。中国第一波互联网新浪搜狐和网易,不就是早就被第二波大佬腾讯百度阿里远远甩在身后了吗? 作为一个大佬来说,公司产品总是让你一抓就死,这绝对不是一个好现象,要好好反思自己是不是已经过时了,已经是个骄傲的将军了。 当然,大佬一抓就死不仅仅只是这一个原因决定的,我们接下去继续深入探讨。 ### 互联网的核心战略 这是《从大佬一抓就死说起》的第四篇。第三篇主要谈到大佬习惯于根据自己过去成功经验对未来产品做判断,却不知道自己的经验已经过时了。但原因并非那么片面,很多大佬还年富力强,学习能力很强,也逃脱不了这个规律,这往往是因为大佬犯了另一个常见的错误:从公司战略需要去做产品,而不是从用户需求去做产品。 例如大佬看到行业发展的大势,为了抢占行业制高点,出于战略布局的需要,发起若干新产品; 例如大佬看到竞争对手做的产品风生水起,于是火急火燎的防御之作; 或者大佬看到某品类的产品渐成风靡之势,于是跟风而上。 所有这些产品的决策,都是基于公司战略发展的考虑,这本无可厚非,但恰恰忽视了最致命的问题:你做产品的时候,脑子里面想的是你想要什么,而不是你的用户想要什么。有些所谓公司的战略级产品,大佬亲自抓的项目,做到上线以后才会发现,用户压根不买账,没人用它。一个用户根本不需要的产品,无论它看似对你公司有多么重要的战略价值,它都是废物一个。 互联网公司做产品,唯一的衡量标准就是:满足了用户什么需求,用户买账不买账,其他的一切一切,无论是否迎合了老板的个人偏好也好,迎合了资本市场的热点题材也好,满足了公司战略卡位也好,阻击了竞争对手也好,都是扯淡。 尤其是所谓狙击竞争对手的战略产品,更加容易失败,因为你并不真正了解竞争对手的成功产品是怎样一步一步发展起来的,满足了什么用户需求,竞争对手真正成功之处何在,模仿之作又岂能成功? 例如Google为了狙击Facebook,强推Google+,Facebook的成功是有一个成长路径的,从常春藤盟校到全美,再到其他国家高校,再到美国各个阶层逐渐成长起来的。Google+无论用户是否需要,所有Google产品统一增加全局导航条Gooogle+提示,急于求成,倾全力催肥,除了持续不停的骚扰用户,给用户带来了什么价值?满足了用户什么需求?产品的成长路径有自己的内在客观规律,往往不以大佬的意志为转移。类似的产品有很多,腾讯微博,网易易信,阿里来往,除了成为炮灰,没有别的下场。 其实击败竞争对手的往往不是一个战略防御级别的模仿品,而是你做出了比竞争对手更能够满足用户需求的产品,例如Instagram,Whatsapp对Facebook产生了实质的威胁,迫使Facebook出手收购Instagram,例如马化腾所说,真正能灭掉微信的一定不是一个复制版微信,而是一个什么新的更好玩的东西抢走了用户的时间,让用户更爽。 所以在互联网时代,传统企业的竞争战略已经被完全颠覆了,所谓的战略“布局”,“占位”理论都是扯淡,互联网世界的最高战略只有一条:就是用户需求为王,没有其他任何战略了。所以如果你的老板以后再对你说,我们要狙击竞争对手,我们要卡位,我们要迎合资本市场,我们要快速拷贝成功产品云云,你可以告诉他:你已经out了,你说的这些都不是公司战略,真正的公司战略应该是:用户有什么需求?我们应该给用户提供什么样的产品。 ### 产品经理的囚徒困境 这是《从大佬一抓就死说起》的第五篇。第四篇谈到大佬习惯从公司战略角度做产品,恰恰忽视了用户的需求,结果用户根本不买账,产品没有存在的价值,因此引申出一个问题:当产品经理负责一个新产品项目的时候,如果大佬也盯上了这个产品,他究竟应该为谁负责呢? 如果大佬本身也精通产品,并且对产品的发展方向预判准确的话,那产品经理就能得到一个非常良好的外部环境,这个时候你一定要珍惜这来之不易的“艳遇”。 但现实往往是残酷的,大部分情况下,大佬的产品判断都是错误的,而且就算得到大家公认懂产品的行业大佬,也未必每个产品都能判断准确。例如周鸿祎做奇虎的时候,本来是做社区搜索的,惨败的一塌糊涂,期间做了一大堆例如社区问答,社区新闻聚合等等,反而是傅盛做的一个不起眼的安全卫士异军突起了。 所以产品经理的生存环境往往是非常险恶的,大佬看不上的项目,你得不到公司的理解和支持;大佬看上的项目,往往被快速催肥摧死。然而这还不是最糟糕的,最糟糕的是你该如何处理用户需求和大佬需求之间的冲突? 前一篇文章我说了,互联网产品唯一衡量标准就是用户买账不买账,如果用户不买账,你做这个产品根本毫无意义,迟早失败,还不如不做,何必浪费宝贵的公司资源和自己的生命呢?所以如果你是一个真正希望做出一款成功项目的产品经理的话,你就应该明白,你真正意义上的老板其实是用户,而不是你的上司。那么当你的上司对产品做出的决策和用户的需求相冲突的时候,你该怎么办? 如果你坚持自己的意见,抵制上司不合理的产品意见,那么很可能就是你靠边站,最终产品可能被毁掉;如果你顺从上司不合理的意见,扭曲了产品本身的内在逻辑,最终用户根本就不买账,产品还是失败,很可能你也要靠边站。 这就是产品经理的囚徒困境:无论你怎么做,只要大佬盯上了这个产品,并且提出了不合理的产品意见,你的命运已经被判上了死刑。 当然我所认识的大多数产品经理的做法只能是不断的妥协,在坚持自己产品方向的基础上,适当的加入一些大佬的个人偏好,以哄好大佬,免得大佬一个不爽,直接打破游戏规则,让你靠边站。 不过真正成功的产品从来都不是妥协的产物,作为产品经理,当你心里开始考虑妥协的时候,产品已经离失败不远了。所以成功的产品从来都离不开两个必要的条件:不妥协的产品经理,和不添乱的大佬。 我摘录一段张小龙演讲稿的内容给大家看: “上一次Pony(马化腾)很认真地给我发了一封邮件,说摇一摇的功能真的很好,但是我们要防止竞争对手抄袭模仿我们的功能。之前我们做了一个查看附近的人,然后竞争对手也做了,并且加了一个小创新在里面,叫做表白功能,这样跟我们就不一样了。Pony说为什么我们没有预先把这些该想到的都想进去,让别人想模仿的时候都没有办法再来做一个微创新?我说微创新是永无止境的,别人总可以加一点东西来跟你不太一样。我们这个功能已经做到最简化了,别人没法超越,这里只有一个动作,甚至连按钮都没有。 ...... 一方面是它确实做得很简单,另外一方面它让你很爽,这个爽是来自很深层次的原因,所以我说竞争对手无法超越。” 不知道作为产品经理的你看了这段张小龙对马化腾意见的驳斥,你作何感想?你心目当中的老板又是谁呢?你会因为大佬的意见对产品做妥协吗? ### 大佬怎么抓才能不死? 上篇文章主要探讨产品经理面临两难困境的选择问题。简单来说,产品经理是需要用成功的作品证明自己的,用成功的作品增加大佬对你的信任度,给予你更多对产品的决策权。 不过目前互联网行业90%以上的产品经理都是不靠谱的,其中大部分甚至连“产品经理”都算不上,最多只能算一个跨部门资源协调人,所以真正合格的,做过成功的产品,证明过自己的产品经理真的是凤毛麟角。 今天这篇文章想给大佬提一点建议,怎样避免“大佬一抓就死”的现象: 一、产品的成长路径有自己的内在客观规律,不以大佬的意志为转移,绝对不能搞大跃进式的运动催肥,否则只能摧死产品。 对互联网产品,特别是社交类产品发起运动式推广,不尊重产品的客观发展规律,企图靠所谓的“人定胜天”式的员工洗脑,就像大跃进,除了浪费无数的资源,只能徒惹一些笑话。可惜的是,很多大佬非常热衷此道,除了人尽皆知的马云发起的“来往”运动式推广,我听说新浪的CTO许良杰也发起了“微米”推广,和马云如出一辙,员工不完成推广KPI,年终奖泡汤。这种行为只能说提前宣告了产品的失败。耐人寻味的是,喜欢发动运动式推广的大佬,往往出生在60年代,在自己价值观形成的年代被社会打上了深深的烙印。 二、大佬要想亲自抓产品,就不要整天对外嚷嚷,而是真正投入时间和精力,降低姿态,把自己当作一线产品经理。 大佬对外号称自己如何重视产品,如何亲自发动全公司抓产品,这种对外高调的宣传恰恰说明大佬没有抓产品,只是表明自己的决心而已,你见过马化腾整天在外面嚷嚷自己抓QQ产品了吗?爱叫的母鸡不下蛋,你要是把产品抓的很好,早闷声发大财去了,何必整天高调PR? 大佬真要抓产品就把自己当一线产品经理,不能调动超越产品经理级别的公司资源,自己深入产品,掌握关键性细节,把自己当成一个项目执行人员。而不是自己不动手,只管指挥团队干活,不重视产品细节的实现。 大佬还特别在意行业舆论,喜欢在外界舆论面前作秀,却忽视从公司内部盯细节,一看微博大V抱怨,就归罪于自己的产品团队,不问情由,让产品团队无所适从,不敢坚持自己的方向,盲从大佬的意见,导致产品彻底被舆论绑架了,最终粗暴的伤害了自己的团队,所以大佬往往一盯就死。 而乔布斯盯细节,是从公司内部开始盯细节,并不那么在乎外界舆论,甚至敢于顶撞舆论和用户,和用户吵架也很火爆,这种盯细节才对。 三、如果大佬不懂产品或者业务(或者不想深入业务细节),那么就应该当好一个忠实的拉拉队长。 大佬如果自己并非超级产品经理出身的话,还是负责解决后勤问题比较妥当,不要对一线产品团队指手画脚,多鼓励,而不是指责,甚至瞎指挥,多学会用人,而不是自己撸起袖子亲自上。 总结起来,其实就是:要么身先士卒,自己当超级产品经理撸起袖子干;要么学会善于用人,知人善任,自己退居二线。 最怕的就是大佬既不愿意辛辛苦苦的自己动手,又不甘心完全退居二线,压抑不住自己时不时干涉一把,甚至是“指点”一把的冲动,那产品项目往往就会沦为大佬自娱自乐的炮灰项目了,所有人都是给大佬赔笑的,哄着大佬开心而已。 《从大佬一抓就死说起》这个系列就结束了。
{ "pile_set_name": "Pile-CC" }
Birth Clubs Groups by topic Vacation without baby I’m leaving Tuesday to Bahamas without our 16 month old and I’m getting such bad guilt. We are gone for 8 days, hubby had to go for work and I decided it would be fun to make it into a trip for us both without baby. Has anyone else gone for that long and that far? Scares me so much that it will be like minimum 13 hours to get home in an emergency. I’m really questioning my decision to go 😫 I haven’t done it yet, but I think what you are feeling is totally normal and nothing to feel guilty about. I don’t think anyone will ever feel comfortable being so far away from their kids no matter how old they get. However, this vacation will be so nice for you and hubby and if your LO is anything like mine...he/she will have a fantastic time with whoever is babysitting. My husband & I went to Cuba for a week when our kids were 4 & 1 AND we went to Vegas this past summer when our kids were 17, 11, 8 and 11 months. We also got snowed in at our cottage recently and missed our now 9 year olds birthday! We FaceTimed her 4 times throughout the day and she didn’t even really care lol I went to ireland without my husband and son this past July. I understand how you’re feeling being soooo far away if anything was to happen. But once you get to the Bahamas (jealous!) you’ll feel so much better. Trust me. I felt better once I was in Ireland it’s just getting there that was difficult and saying goodbye to my husband and son. but your time will fly by and your baby will do great without you! And before you know it you’ll be back home. Enjoy :) OTHER SITES This Internet site provides information of a general nature and is designed for educational purposes only. If you have any concerns about your own health or the health of your child, you should always consult with a doctor or other healthcare professional. Please review the Terms of Use before using this site. Your use of the site indicates your agreement to be bound by the Terms of Use. This site is published by BabyCenter, L.L.C., which is responsible for its contents as further described and qualified in the Terms of Use.
{ "pile_set_name": "StackExchange" }
Q: angularjs synchronise $request to update database before $request.query() is fired on index view My index view is pulling all the models from database before the update is carried out is there any way to make sure these actions are synchronised. the model is updated and shows up in index page after a refresh here is the code app = angular.module('enterprise',["ngResource"]) .config(['$routeProvider','$locationProvider','$httpProvider', ($routeProvider,$locationProvider,provider )-> $locationProvider.html5Mode(true) provider.defaults.headers.common['X-CSRF-Token'] = $('meta[name=csrf-token]').attr('content') $routeProvider.when('/', {templateUrl: '<%=asset_path('list.html') %>', controller: AppCtrl}) $routeProvider.when('/new', {templateUrl: '<%=asset_path('edit.html') %>', controller: NewCtrl}) $routeProvider.when('/edit/:id', {templateUrl: '<%=asset_path('edit.html') %>', controller: EditCtrl}) $routeProvider.otherwise({redirectTo: '/'}) ] app.factory "People", ["$resource",($resource)-> $resource("/people/:id", {id:"@id"},{update: {method:"PUT"}}, {}) ] @AppCtrl=["$scope","People",($scope, People)-> $scope.crew = People.query() ] @NewCtrl=["$scope","$location", "People",($scope, $location, People) -> $scope.save = -> person = People.save($scope.person) $location.path("/") ] @EditCtrl=["$scope", "$location", "$routeParams","People",($scope, $location, $routeParams, People)-> $scope.person = People.get({id:$routeParams.id}) $scope.save = -> person = People.get({id:$routeParams.id } , -> person.name = $scope.person.name person.description = $scope.person.description person.$update() ) $location.path("/") ] any advice on ensuring model is updated before returning to index view A: Put $location.path("/") in the People resource's callback function. $resource actions have success/failure callbacks.
{ "pile_set_name": "Wikipedia (en)" }
Einhaus Einhaus is a municipality in the district of Lauenburg, in Schleswig-Holstein, Germany. References Category:Municipalities in Schleswig-Holstein Category:Herzogtum Lauenburg
{ "pile_set_name": "OpenWebText2" }
What have we, the people of Britain, done to the Conservative party? Why do they hate us so much? As the odours from their annual feasting in Birmingham drift over the airwaves, I find my responses metastasising beyond the merely political and into the realms of the psychological. I get the sense that they’re punishing us, somehow. That there’s some deep-seated Jungian weirdness being acted out on the British public, every time the zealot Daniel Hannan vows to feed us his chlorinated chicken, every time Jeremy Hunt threatens us with his leadership credentials. It’s as if we (Britain) are the child. And they (the Tories) are the dysfunctional parents, ripping themselves apart, occasionally grabbing us by the wrists to prove some sort of point to the other. England, as George Orwell once wrote, is a family with the wrong members in control Theresa May comes up for air. She would like it to be known that she hopes to end freedom of movement within the European Union. She will remove – just like that! – our right to work in France or retire in Spain as that, she has decided, is what we want. She seems weirdly proud about it, too, a little bit “Look what you made me do.” But no member of the British public asked for this. No one made her do it other than the peculiar tribe to which she has pledged allegiance. There’s something similarly demented about Boris Johnson’s ambitions too. You don’t want this reckless narcissist in charge of the country. No one wants that. Aside from perhaps, a certain portion of the 120,000-odd people who are still perverse enough to be members of the Tory party – because it’s his turn. And somehow, by some convoluted ancestral logic, this is the wing who must be appeased, these are the appetites that must be indulged, these are the people who might actually decide. England, as George Orwell once wrote, is a family with the wrong members in control. There are the rich relations who must be sucked up to, the poor relations who must be spat upon, and it’s best not to ask too many questions about where all the wealth came from. And remember: “It is a family in which the young are generally thwarted and most of the power is in the hands of irresponsible uncles and bedridden aunts.” Just as adult family squabbles bring with them that same sense of “Why am I still dealing with this shit?”, so it is here: the patrician fossils aren’t talking to the reckless Atlanticists, and the oleaginous metropolitan wing is at odds with the racist granddads – and Cousin Jacob must have his special plate. Stop being the difficult one! May ally hits back at Boris Johnson saying he would struggle to provide serious leadership - Politics live Read more Toxic introspection is not confined to the Tories. There is a certain species of Labourite who believes their own internal squabbles are of paramount interest to Labour voters too. But at least this tendency of the left was counterbalanced by a set of coherent ideas emerging from the Labour conference, a vision for the sort of country we might like to become. There is none of that emerging from Birmingham – no policies, no direction from our bedridden aunt of a prime minister. The reason all this feels more personal than political is that Tory dysfunction has already infected our lives. No one outside the Tory membership much cared much about the European Union prior to David Cameron calling a referendum. The 2016 vote was intended as a way of resolving the Tory family squabble. All it has done is impose it on the nation as a whole; their problem is now our problem. Far from settling the issue, it has blown it wide open. Brexit is already costing the economy £500m per week and rising; the economy is 2.5% smaller than it might have been. That isn’t abstract. It has made millions of lives quantifiably worse in terms of wages, jobs and prospects. It has made plans about children, homes and family life impossible to make – just as the extent of Tory damage to the public realm is becoming apparent. And perhaps the most insidious effect is the way that Brexit has entered actual families too, setting children against parents, sibling against sibling, such that the word “Brexit” conjures something beyond mere trade deals and treaties. It has poisoned relationships, distanced generations, infected homes. For a party that is supposed to stand up for family values, that will be quite a legacy. • Richard Godwin is a freelance journalist
{ "pile_set_name": "StackExchange" }
Q: Find optimal P(X|Y) given I have a model that has good performance when trained on P(Y|X) Input Data: $X$ -> features of t shirt (colour,logo,etc) $Y$ -> profit margin I have trained a random forest on the above $X$ and $Y$ and have achieved reasonable accuracy on a test data. So, I have $P(Y|X)$. Now, I would like to find $P(X|Y)$ i.e probability distribution of $X$ features given I am expecting this much profit margin. How do I do that with a random forest(or any other discriminative model)? One suggestion for me could be to start with a generative model rather than a discriminative model. But, my understanding is generative model generally require a lot of data to train unless that make some very restrictive assumptions such as conditional independence of $X$'s in case of Naive Bayes? Other suggestion could be to just switch $X$ and $Y$ and train a discriminative model. Now $X$ will be profit margin and $Y$ will be features of a t shirt. $P(Y|X)$ will directly give me the probability distribution of t shirt features, given a target profit margin. But this approach doesn't seem right to me, as I have always though of $X$ as casual variables and $Y$ to be effect. Also, from what I have heard, similar question has been posed for drug discovery and algorithms have been designed which come up with candidate new drugs that have high degree of success. Can someone point me to research literature in this domain? Update: I have come across this and this which talks about GANs being used for drug discovery. Generative adversial networks seem like a good fit for my problem statement so I have been reading about them. But one thing I understood is GAN generate samples in an unsupervised way. They try to produce sample which is like first capturing the underlying distribution of X and then sampling from that distribution. But I am interested in X|Y. X and Y are defined above. Should I explore something other than GANs? Any pointers please? Follow up Question: Imagine I have a GAN trained that has learned how to make t shirts(output sample Xs). How can I get the top 5 shirts for given Y? A: This response has been significantly modified from its original form. The flaws of my original response will be discussed below, but if you would like to see roughly what this response looked like before I made the big edit, take a look at the following notebook: https://nbviewer.jupyter.org/github/dmarx/data_generation_demo/blob/54be78fb5b68218971d2568f1680b4f783c0a79a/demo.ipynb TL;DR: Use a KDE (or the procedure of your choice) to approximate $P(X)$, then use MCMC to draw samples from $P(X|Y) \propto P(Y|X)P(X)$, where $P(Y|X)$ is given by your model. From these samples, you can estimate the "optimal" $X$ by fitting a second KDE to the samples you generated and selecting the observation that maximizes the KDE as your maximum a posteriori (MAP) estimate. Maximum Likelihood Estimation ... and why it doesn't work here In my original response, the technique I suggested was to use MCMC to perform maximum likelihood estimation. Generally, MLE is a good approach to finding the "optimal" solutions to conditional probabilities, but we have a problem here: because we're using a discriminative model (a random forest in this case) our probabilities are being calculated relative to decision boundaries. It doesn't actually make sense to talk about an "optimal" solution to a model like this because once we get far enough away from the class boundary, the model will just predict ones for everything. If we have enough classes some of them might be completely "surrounded" in which case this won't be a problem, but classes on the boundary of our data will be "maximized" by values that aren't necessarily feasible. To demonstrate, I'm going to leverage some convenience code you can find here, which provides the GenerativeSampler class which wraps code from my original response, some additional code for this better solution, and some additional features I was playing around with (some which work, some which don't) which I probably won't get into here. np.random.seed(123) sampler = GenerativeSampler(model=RFC, X=X, y=y, target_class=2, prior=None, class_err_prob=0.05, # <-- the score we use for candidates that aren't predicted as the target class rw_std=.05, # <-- controls the step size of the random walk proposal verbose=True, use_empirical=False) samples, _ = sampler.run_chain(n=5000) burn = 1000 thin = 20 X_s = pca.transform(samples[burn::thin,:]) # Plot the iris data col=['r','b','g'] for i in range(3): plt.scatter(*X_r[y==i,:].T, c=col[i], marker='x') plt.plot(*X_s.T, 'k') plt.scatter(*X_s.T, c=np.arange(X_s.shape[0])) plt.colorbar() plt.show() In this visualization, the x's are the real data, and the class we're interested in is green. The line-connected dots are the samples we drew, and their color corresponds to the order in which they were sampled, with their "thinned" sequence position given by the color bar label on the right. As you can see, the sampler diverged from the data fairly quickly and then just basically hangs out pretty far away from values of the feature space that correspond to any real observations. Clearly this is a problem. One way we can cheat is to change our proposal function to only allow features to take values that we actually observed in the data. Let's try that and see how that changes the behavior of our result. np.random.seed(123) sampler = GenerativeSampler(model=RFC, X=X, y=y, target_class=2, prior=None, class_err_prob=0.05, verbose=True, use_empirical=True) # <-- magic happening under the hood samples, _ = sampler.run_chain(n=5000) X_s = pca.transform(samples[burn::thin,:]) # Constrain attention to just the target class this time i=2 plt.scatter(*X_r[y==i,:].T, c='k', marker='x') plt.scatter(*X_s.T, c='g', alpha=0.3) #plt.colorbar() plt.show() sns.kdeplot(X_s, cmap=sns.dark_palette('green', as_cmap=True)) plt.scatter(*X_r[y==i,:].T, c='k', marker='x') plt.show() This is definitely a significant improvement and the mode of our distribution corresponds roughly to what we're looking for, but it's clear we're still generating a lot of observations that don't correspond to feasible values of $X$ so we shouldn't really trust this distribution either. The obvious solution here is to incorporate $P(X)$ somehow to anchor our sampling process to regions of the feature space that the data is actually likely to take. So let's instead sample from the joint probability of the likelihood given by the model, $P(Y|X)$, and a numerical estimate for $P(X)$ given by a KDE fit on the entire dataset. So now we're... sampling from... $P(Y|X)P(X)$.... Enter Bayes Rule After you hounded me to be less hand-wavey with the math here, I played around with this a fair amount (hence me building the GenerativeSampler thing), and I encountered the problems I laid out above. I felt really, really stupid when I made this realization, but obviously what you are asking for calls for an application of Bayes rule and I apologize for being dismissive earlier. If you're not familiar with bayes rule, it looks like this: $$P(B|A) = \frac{P(A|B)P(B)}{P(A)}$$ In many applications the denominator is a constant which acts as a scaling term to ensure that the numerator integrates to 1, so the rule is often restated thusly: $$P(B|A) \propto P(A|B)P(B)$$ Or in plain English: "the posterior is proportional to the prior times the likelihood". Look familiar? How about now: $$P(X|Y) \propto P(Y|X)P(X)$$ Yeah, this is exactly what we worked up to earlier by constructing an estimate for the MLE that is anchored to the observed distribution of the data. I've never thought about Bayes rule this way, but it makes sense so thank you for giving me the opportunity to discover this new perspective. To backtrack a tiny bit, MCMC is one of those applications of bayes rule where we can ignore the denominator. When we calculate the acceptanc ratio, $P(Y)$ will take the same value in both the numerator and denominator, canceling out, and allowing us to draw samples from unnormalized probability distributions. So, having made this insight that we need to incorporate a prior for the data, let's do that by fitting a standard KDE and see how that changes our result. np.random.seed(123) sampler = GenerativeSampler(model=RFC, X=X, y=y, target_class=2, prior='kde', # <-- the new hotness class_err_prob=0.05, rw_std=.05, # <-- back to the random walk proposal verbose=True, use_empirical=False) samples, _ = sampler.run_chain(n=5000) burn = 1000 thin = 20 X_s = pca.transform(samples[burn::thin,:]) # Plot the iris data col=['r','b','g'] for i in range(3): plt.scatter(*X_r[y==i,:].T, c=col[i], marker='x') plt.plot(*X_s.T, 'k--') plt.scatter(*X_s.T, c=np.arange(X_s.shape[0]), alpha=0.2) plt.colorbar() plt.show() Much better! Now, we can estimate your "optimal" $X$ value using what's called the "maximum a posteriori" estimate, which is a fancy way of saying we fit a second KDE -- but to our samples this time -- and find the value that maximizes the KDE, i.e. the value corresponding to the mode of $P(X|Y)$. # MAP estimation from sklearn.neighbors import KernelDensity from sklearn.model_selection import GridSearchCV from scipy.optimize import minimize grid = GridSearchCV(KernelDensity(), {'bandwidth': np.linspace(0.1, 1.0, 30)}, cv=10, refit=True) kde = grid.fit(samples[burn::thin,:]).best_estimator_ def map_objective(x): try: score = kde.score_samples(x) except ValueError: score = kde.score_samples(x.reshape(1,-1)) return -score x_map = minimize(map_objective, samples[-1,:].reshape(1,-1)).x print(x_map) x_map_r = pca.transform(x_map.reshape(1,-1))[0] col=['r','b','g'] for i in range(3): plt.scatter(*X_r[y==i,:].T, c=col[i], marker='x') sns.kdeplot(*X_s.T, cmap=sns.dark_palette('green', as_cmap=True)) plt.scatter(x_map_r[0], x_map_r[1], c='k', marker='x', s=150) plt.show() And there you have it: the large black 'X' is our MAP estimate (those contours are the KDE of the posterior).
{ "pile_set_name": "Pile-CC" }
Someday, perhaps when he's retired and no longer patrolling NBA courts, Joey Crawford will probably calm the hell down and stop being such a dick. Today is not that day. During a Cavaliers-76ers game, Crawford noticed a wet spot on the court that needed some moppin'. So he called over the mop boy and told him to get to work. Only the mop boy didn't move as quickly or mop as well as Crawford would have liked, so Joey decided to give the whippersnapper a little of the ol' business. Keep your head up, mop boy. Tim Duncan will probably buy you a beer the next time the Spurs are in town.
{ "pile_set_name": "OpenWebText2" }
Some people still think it is OK to joke about killing a U.S. President. According to Jezebel, teen billionaire Peter Brant II is one of them. The son of publishing magnate, Peter Brant Sr, the young billionaire was in a text message exchange with Andrew Warren, who “describes himself on Twitter as “NYC/HAMPTONS” and says the election is going to make him ‘poor’ now, obviously.” as reported by Jezebel. And, eventually, he joked about killing President Barack Obama. The not-so-funny threat on Obama’s life is pictured above. Here is a rundown of the exchange, as reported by Jezebel, below: If you’re teenaged billionaire Peter Brant II, the Greenwich-raised son of paper magnate Peter Brant and supermodel Stephanie Seymour, you don’t exactly welcome that outcome. If you’re teenaged billionaire Peter Brant II, you exchange snarky text messages about Romney’s defeat with your friend Andrew Warren, who describes himself on Twitter as “NYC/HAMPTONS” and says the election is going to make him “poor” now, obviously. And Andrew jokes about how at least women will still have rights, except, “oh wait I don’t care.” And you, Peter Brant II, joke about having “a contingency plan: Kill Obama, hahaha.” Hahaha! Then you screenshot that charming display of wit and trenchant political analysis and post that sh*t on Instagram. Photo and comment thread screencapped from Statigram (you must be logged in and approved to follow @peter_brantii to view it); the part where Peter Brant II tells a commenter to jump off a cliff is particularly lovely. Peter Brant II’s Instagram account is now private but as of this morning the photo had not been deleted. Some of the transcript of the text exchange is below. Text “KYS” To 96230…Standard Messaging Rates Apply Follow @939wkys for the latest celeb, entertainment and news! — 93.9 WKYS (@939WKYS) October 24, 2012 Find us on Facebook! Also see… Teen Billionaire Allegedly Jokes About ‘Contingency Plan’ To Kill Obama Via Instagram was originally published on newsone.com
{ "pile_set_name": "OpenWebText2" }
An out-of-towner who stashed his loaded handgun under the mattress in his Brooklyn hotel room, and then called the front desk after checking out to say he forgot it, will be spending at least one more night in the Big Apple — as a guest of the state. Torrie Flock, 23, of Charlotte, N.C., rang the front desk at the Harbor Motor Inn on Shore Parkway in Gravesend Monday afternoon to say he’d left a .45-caliber Smith & Wesson under the mattress in Room 218, officials said. When he returned to retrieve the firearm around 1:30 p.m., cops were waiting and arrested him. A maid had previously gone in to grab up the gun, wrapped it in a towel, and handed it over to police. The firearm had seven rounds in it, according to prosecutors, who said Flock told officers , “I didn’t know it was such a big deal.” Defense attorney Dara Hebert said her client had just been in town doing “touristy stuff,” like visiting the Statue of Liberty and Times Square. North Carolina is an open-gun state, Hebert added, saying her client did not need a license to purchase the weapon there. Flock was arraigned on criminal possession of a weapon charges Tuesday, and held on $7,500 bail. His gal pal and her father, who were in court with him, declined to comment.
{ "pile_set_name": "Pile-CC" }
Dexter Season 7 Premiere Full Episode: Watch It Here The seventh season of Dexter is premiering on Showtime right now. But those who don't have access to the pay-cable network don't have to go without. Showtime was generous enough to put the full episode ("Are you…?") online. Check it out ahead! We'll weigh in with our thoughts on the season premiere in a little bit. In the meantime, the video below includes a quick recap of what you need to know (or be reminded of) before going into the Season 7 premiere, including the sixth season finale's shocking cliffhanger: Deb sees Dexter killing Travis! What happens next? Find out below! And once again, we're left with another jaw-dropper of a final moment. There's no stuffing that cat back into the bag (or air conditioner as it were). Keep an eye out for our full breakdown of the season premiere. In the meantime, here's our review of the first three episodes (Minimal spoilers mentioned).
{ "pile_set_name": "StackExchange" }
Q: Removing a View in Silverlight I'm using SandRibbons from http://www.divelements.co.uk/net/controls/sandribbonsl/ and I'm trying to add a view to my contextual tab, I've successfully done this by using, ribbon3.Items.Add(Activator.CreateInstance(viewModel.filterValue)); Although here's the problem, how do I remove the view? I tried, ribbon3.Items.Remove(Activator.CreateInstance(viewModel.filterValue)); and ribbon3.Items.Remove(viewModel.filterValue); Although it doesn't seem to be working, if anyone has done anything similiar or has any input it would be greatly apperciated. Thanks, Jason A: I'll have to say I do not use Sandribbons... but from what I can see, you do not refer to the actual view in any of the remove statements you suggested. Possible solutions could be to save the position of your view after you added it: ribbon3.Items.Add(Activator.CreateInstance(viewModel.filterValue)); var posView = ribbon3.Items.Count - 1; // do it right after you added the view // some stuff ribbon3.Items.RemoveAt(posView); // note that it's the RemoveAt method or to save the view itself before adding it and keeping it as a reference: var theView = Activator.CreateInstance(viewModel.filterValue); ribbon3.Items.Add(theView); // some stuff ribbon3.Items.Remove(theView); Of course these are only possible and probably not the most efficient solutions to your issue, but it might help you to consider how to tackle the problem in a more optimal way.
{ "pile_set_name": "Github" }
(ns twitter.test-utils.core (:require [clojure.test :refer :all] [http.async.client :as ac] [twitter.api.restful :refer [users-show]] [twitter.test.creds :refer [make-app-only-test-creds make-test-creds]])) (defmacro is-async-200 "checks to see if the response is HTTP return code 200, and then cancels it" {:requires [#'is]} [fn-name & args] `(let [response# (~fn-name :oauth-creds (~make-test-creds) ~@args)] (try (try (is (= (:code (~ac/status response#)) 200)) (finally ((:cancel (meta response#))))) (catch java.util.concurrent.CancellationException e# nil)))) (defmacro is-http-code "checks to see if the response is a specific HTTP return code" {:requires [#'is]} [code fn-name & args] `(is (= (get-in (~fn-name :oauth-creds (~make-test-creds) ~@args) [:status :code]) ~code))) (defmacro is-200-with-app-only "checks to see if the response to a request using application-only authentication is a specific HTTP return code" {:requires [#'is]} [fn-name & args] `(is (= (get-in (~fn-name :oauth-creds (~make-app-only-test-creds) ~@args) [:status :code]) 200))) (defmacro is-200 "checks to see if the response is HTTP 200" [fn-name & args] (if (some #{:app-only} args) (let [args# (remove #{:app-only} args)] `(is-200-with-app-only ~fn-name ~@args#)) `(is-http-code 200 ~fn-name ~@args))) (defn get-user-id "gets the id of the supplied screen name" [screen-name] (get-in (users-show :oauth-creds (make-test-creds) :params {:screen-name screen-name}) [:body :id])) (defn get-current-status-id "gets the id of the current status for the supplied screen name" [screen-name] (let [result (users-show :oauth-creds (make-test-creds) :params {:screen-name screen-name})] (or (get-in result [:body :status :id]) (throw (ex-info "could not retrieve the user's profile in 'show-user'" {:screen-name screen-name}))))) (defn poll-until-no-error "repeatedly tries the poll instruction, for a maximum time, or until the error disappears" [poll-fn & {:keys [max-timeout-ms wait-time-ms] :or {max-timeout-ms 60000 wait-time-ms 10000}}] (loop [curr-time-ms 0] (if (< curr-time-ms max-timeout-ms) (when-not (try (poll-fn) (catch Exception e nil)) (Thread/sleep wait-time-ms) (recur (+ curr-time-ms wait-time-ms)))))) (defmacro with-setup-poll-teardown [id-name setup poll teardown & body] `(let [~id-name ~setup] (try (poll-until-no-error (fn [] ~poll)) ~@body (finally ~teardown))))
{ "pile_set_name": "OpenWebText2" }
If the last three days still are a blur to Amanda Duffy, she’s very good at hiding it. Of course, part of that could be because she’s had ample time to practice over the last three years. In the fall of 2015, the then-36-year old ECU alum had just been named the president of Louisville City FC after their wildly successful maiden season. The appointment, which made her the first female executive in the USL to lead a team, capped off a meteoric rise in the American second division, which in just 12 months saw her hired from the league office to Vice President of Operations then promoted to Asst. GM and GM. Now 39 and the de facto commissioner of the NWSL, she was seen just this past Saturday in Portland, handing out the 2018 NWSL Championship Trophy to her hometown team, the North Carolina Courage. A day earlier, she presented the MVP Award to Thorns and USWNT standout Lindsay Horan. The final in the Rose City was attended by 21,144 fans -- an all-time record for a women’s final -- and watched live by thousands more on Lifetime, who now are in year two of a broadcast deal she helped close. Sounds like a serious candidate for any top executive role in MLS. So when might the Galaxy give her a ring? And if they did, why wouldn’t she immediately hang up? * * * As I explored last week, one of the reforms the Galaxy should strongly consider ahead of the 2019 offseason is the hiring of a full-time Sporting Director, similar to Claudio Reyna at New York City FC or Carlos Bocanegra at Atlanta United. Just to remind everyone, a sporting director is not the same thing as a general manager, although there may be some overlap in their duties. Several clubs around the league, including the two mentioned above, have one to whom either a separate GM or a head coach/GM reports. The Galaxy don’t even have the latter. Team President Chris Klein is responsible for managing both the business and soccer sides of the organization, and it’s under this arrangement that they could miss the playoffs twice in a row for the first time in 10 years. In addition to Duffy, here are some possible names that could change that. Ali Curtis To many, this the most obvious person for the job. Curtis is a proven young executive himself, who will almost assuredly be considered for every future open SD or GM role until he’s hired. The 39-year old former Blue Devil played three years in Major League Soccer before going to work for JP Morgan and later, the league office, as Senior Director of Player Relations and Competition. In 2014, he was hired by the New York Red Bulls to align the academy, reserves, first team and scouting department with the club's European affiliates. The top brass were impressed with his now famous 300-page plan, which apparently included firing popular coach Mike Petke and eschewing the team’s pursuit of aging superstars. Before the 2017 campaign, Curtis negotiated his exit, citing "different views" as his reason. He's been self-employed as a consultant since, although was considered a finalist for the new USMNT GM job. Why he’d be a good fit: Curtis clearly knows how to form a coherent, long-term plan and execute it, even if it requires some short-term pain. He’s also not shy about explaining his decisions to hostile crowds. Both traits mark a welcome contrast from Chris Klein, who, despite saying many of the right things, has been criticized by some fans and pundits for being aloof. Finally, Curtis’s success in building a youth-first culture at Red Bulls should be especially appealing to a Galaxy team that hasn’t had a homegrown star since Gyasi Zardes, even with what some have said is the most talented academy class in MLS history. Why he wouldn’t: Though there’s much to like about Curtis, some questions linger. Arguably the biggest one is: just what happened in New York? Rumors abound of a power struggle between him and then-head coach Jesse Marsch, who he hired. Curtis denies them, but it’s evident his relationship soured with someone important and he couldn’t continue on any longer. Another issue is whether or not his extreme focus on youth is right for LA. Some would be happy if the Galaxy never signed a player of Zlatan’s stature again; many wouldn’t be. And while Curtis is a big community guy, the vision he comes in with could alienate half the LAG fanbase before he has the chance to win them over. Would he even answer the phone? After narrowly losing out on the USMNT GM job to Earnie Stewart this year, we know Curtis isn’t done with soccer. His time at Red Bulls may have ended far sooner than anyone expected, and because of that, the Galaxy could certainly use his motivation and skillset as they try to recover their status as the league’s glamor team. But NYRB weren’t the Continental Tire™ fire the Galaxy are when he joined them, and if he’s afraid of being overruled again, he’d do well to get proof of his authority in writing or walk away. Amanda Duffy The aforementioned Duffy brings a wealth of experience to draw upon from her time in the USL and NWSL. There’s not much else to say about her that wasn't covered in the intro, so let’s advance to the all-important question of job aptitude. Why she’d be a good fit: In 2014, with less than four months before their inaugural season, Louisville were a team without a GM. Djorn Buchholz had resigned less than a few weeks after hiring Duffy, and now she was tasked with assembling a roster of a professional men’s side with little help. That year, Louisville not only made the playoffs but the Eastern Semifinal. A year later, while she was president, they replicated that same feat. Her ability to work in highly dynamic environments and still succeed proves her rapid ascent is no accident. And the connections she's forged in the USL and NWSL would surely benefit a Galaxy team with no holistic plan for their academy or USL team. Could she help land LA a NWSL franchise? Who knows, but it’s hard to think she hurts the Galaxy’s chances. Why she wouldn’t: Let’s be clear from the start: Duffy’s potential success or failure in this role won’t hinge on the fact that she’s a woman. Even before joining Louisville, her resume was highly-decorated, and she’s since gone from strength to strength, serving as Managing Operations Director of the NWSL ever since previous commissioner Jeff Plush stepped down in 2017. If there are any concerns unique to her candidacy, it’s that she seems to rarely stay in one place for long. Throw in the fact that she’s never been in MLS and that big red disclaimer about Dan Beckerman and Klein, and one starts to see why this may not work. Would she even answer the phone? Honestly, the answer to this question for so many candidates is "I have no idea". But of course, what fun is it to hear that? Duffy has left the women’s side of the league for the men’s before, and a position in MLS is about as high as many can climb in this sport -- barring a position with USSF, CONCACAF or FIFA. The longer the NWSL goes without finding a new full-time commissioner though, the more likely it is they just give Duffy the job. That could in fact be what she’s angling for now, and despite all the issues the NWSL has, it’s still debatable which situation would appeal to her more. Craig Waibel After being fired from the New York Red Bulls by new Sporting Director Ali Curtis, Mike Petke remained unattached for nearly two years. In 2017, he finally resurfaced in Utah, now as the head coach of Real Salt Lake’s USL affiliate, the Monarchs. It was a move that surprised as many people as his firing did. Here was a coach who won a Supporter’s Shield as recently as 2013 and made it to the Eastern Conference Final in 2014... yet all he could get was a lowly USL job? Then all of a sudden, Jeff Cassar was out, and Petke was in. As if GM Craig Waibel planned it all along. Waibel, a former MLS journeyman who suited up for the Galaxy en route to their first ever Cup, has been a ruthless exponent of playing the kids in MLS. Earlier this year, RSL fielded seven homegrown players against Sporting Kansas City and later made history with FC Dallas for the most homegrown players in a single match. The game was also the first time a team fielded an all-homegrown backline in MLS history. RSL has always been one of the more economical teams in the league since their inception, and Waibel has continued the doctrine of getting more with less since 2015. Why he’d be a good fit: Waibel’s commitment to youth is one few can match. His brutal firing of Jeff Cassar and disposal of forwards Alfredo Ortuno and Yura Movsisyan reveals a willingness to make changes as soon as they’re necessary. The Petke hire was calculated and opportunistic. If he brought the same values to the Galaxy as he’s shown at RSL, one would have to think he could do a lot better than the current regime. Why he wouldn’t: For all his success at RSL, there’s a concern about whether he’s actually done all he can to build them into a contender. A stat often used to highlight an inept defense is unforced errors, and Waibel seems to have a few, like keeping Cassar around for a whole offseason -- only to can him three games into the 2017 season-- and signing Ortuno and Movsisyan. What good is it to atone for your mistakes if you keep making them? Another question is whether he’s utilized the Monarchs to develop homegrowns enough. If either of these seem familiar, it’s because we’ve heard them asked of Klein and VP of Soccer Operations, Peter Vagenas. Perhaps here though, it’s more a case of being hamstrung by financial limitations and a meddlesome owner. Would he even answer the phone? Well, let’s say this: if not, you know the Galaxy’s restructuring efforts are screwed. Waibel’s contract is up at the end of this year, and some fans think he should go. A position with the Galaxy isn’t only leaving before he’s pushed, it’s leaving for a bigger and better opportunity. However, if he doesn’t consider it one, what does that say about this FO? Almost certainly that they don’t have a chance of hiring many top-shelf candidates to this role. Garth Lagerwey The second Duke alum on this list, Lagerwey is arguably its most recognizable name and the most successful. After serving as RSL’s GM for seven years -- a period that saw the club move into a new stadium, make four Cup finals, and sell to a new ownership group -- the 45-year old retired goalkeeper traded his view of the Rockies for gloomy PNW skies. His time with the Seattle Sounders has already seen the biggest shake-up at the organization since joining MLS in 2008. It has also seen the Sounders appear in their first two MLS Cup Finals ever, winning it all in 2016. How could such an accomplished executive come on the market, and could his style of management work in LA? Let’s examine. Why he’d be a good fit: If Craig Waibel deserves credit for anything he’s done at RSL, that’s not messing with the framework laid by his former boss. Lagerwey’s analytical approach in Sandy put RSL on the map after many doubted whether they could contend with their better-funded rivals. His emphasis on youth development is something that he’s since carried over to Seattle, honing the academy and S2 into one of the better set-ups in the country. And his ability to scout impactful central and South American players like Roman Torres, Nicolas Lodeiro and Raul Ruidiaz is unimpeachable. In LA, he’d be reunited with chief scout Kurt Schmid and presumably turn his attention to bolstering the team’s presence in the southern hemisphere. Oh, and getting the academy-to-first team pipeline up to code. Why he wouldn’t: Despite having the resume he does, there's no such thing as a flawless candidate, and Lagerwey’s efforts to disrupt traditional thinking in the Emerald City have drawn resistance from a vocal minority of fans (more on that later). He’s still blamed for disbanding one of the most lethal duos in MLS history by selling striker Obafemi Martins to China plus forcing Sigi Schmid out without giving him a chance with Lodeiro. And while the team would later rally around interim coach Brian Schmetzer to win the MLS Playoffs that year, it illustrates the dangers of his fanatical devotion to moneyball tactics. There was a time under Arena when the Galaxy, not Seattle, were known for going on late season runs. That didn’t make it sustainable then, and that doesn’t make it sustainable now. Would he even answer the phone? Probably the biggest factor in all of this will be his status come October, when the Sounders’ Alliance Council decides whether he should be retained or not. Letting fans vote on the fate of team officials isn’t unheard of in other parts of the world but is unique in North America. If he loses the vote (and this Sunday's defeat to LA improves those odds), he could become available for the Galaxy. Hell, if he wins but by a close margin, he could become available for the Galaxy. LA in theory offers him more resources and more job security. And they already saved him the trouble of firing Sigi. So far, all the names we’ve reviewed have had a large enough body of work to safely draw conclusions about their strengths and weaknesses. That’s in turn made it easier to predict how they’d each interface with this Galaxy FO. It also makes Dunivant, the 37-year old Galaxy legend-turned-executive, the most wildcard entry on this list. He could have the most upside of any of the candidates or none at all. As a player, Dunivant always seemed destined for a career in management. In 2002, a year before being drafted by the San Jose Earthquakes, he graduated early from Stanford with a BA in Economics. Known as a defender with an immense soccer IQ, he then helped the Galaxy win four of their five MLS Cups, two Supporter’s Shields and one US Open Cup. Dunivant retired in 2015, after negotiating a new CBA as a representative for the Players Union. The following year, he was tapped as the Director of Business and Soccer Operations for the SF Deltas. It was there he hired Marc Dos Santos and built a roster that won the NASL Championship in their first and only season. Now, he’s the GM of Sacramento Republic FC, an MLS expansion hopeful that sits fourth in the USL West. Why he’d be a good fit: Dunivant is very much an idealist who dreams of building great things. His decision to join the Deltas and then Sacramento knowing the risks demonstrates this. He’s already started a youth movement with Republic and would, like all the other candidates mentioned here, undoubtedly work to fix LA’s broken development system. But Dunivant is unique in that he played under the current regime, and that may give him an edge. If your criticism of the FO is that they’ve lost their way and just need to be nudged back on track, then hiring Dunivant, himself an advocate of promoting from within, makes a lot of sense. Why he wouldn’t: The challenge the FO already have is refuting the perception that they’re an old boys’ club; Dunivant, however capable he is, doesn’t help that. That could cost him support, particularly if his ideas are too similar to what we’ve seen before. After all, what good is trading in your old Chris Klein for this year's model? To that point, Dunivant has the least experience of any candidate when it comes to managing a professional team, and there will always be those who say luck was responsible for everything he’s achieved. Would he even answer the phone? You don’t make 193 appearances in two stints with the Galaxy only to let that call go to voicemail. Does he answer? Of course he does. The better question is, would he accept the job? Because for a team that employs as many ex-players as they do, it’s hard to buy the idea that Dunivant was never offered so much as a ceremonial janitor role. That could indicate he didn’t like management or they didn’t like him. And similar to Duffy, it’s far from given he’d surrender his gig at Sacramento just because the LA job is higher profile. * * * In the end, there’s definitely no shortage of qualified candidates the LA Galaxy might have if they agree that hiring a Sporting Director is within their best interests. I may have only gone over five of them, but if you have another idea, shout it out. For all we know, the Galaxy’s search could take them in an entirely different direction than we’re expecting. A Jurgen Klinsmann sighting at Stubhub this weekend generated plenty of speculation before ESPNFC reporter Jeff Carlisle tweeted that he's not a candidate for a front office role. I guess we'll find out how true that is soon enough.
{ "pile_set_name": "StackExchange" }
Q: Differentiability of fixed point I am trying to review some past hw problems. I was never able to figure out how to do this problem. Can anyone help me out at all? Thanks. A: Fixed $\epsilon $, let be $f_\epsilon R \to R$ given by $f_\epsilon(x) = f(x, \epsilon)$. Follows of hipotesis that is contraction and therefore exist $g(\epsilon) \in R$ such that $f_\epsilon(g(\epsilon) ) = g(\epsilon)$. We showing now that $g$ is differential : $$g(\epsilon + h) - g(\epsilon) = f( g(\epsilon + h), \epsilon + h) - f( g(\epsilon ), \epsilon) = (\frac{\partial f}{\partial x}( g(\epsilon ) \epsilon) + \frac{\partial f}{\partial y}( g(\epsilon ))h + r((h,0))$$ where $\|r(h,0)\| \to 0$ when $h \to 0$, this implies that $g'(\epsilon) = \frac{\partial f}{\partial x}(g(\epsilon),\epsilon) + \frac{\partial f}{\partial y}(g(\epsilon),\epsilon)$. Since, $g$ is differential, we have that $g$ is continuos and because composition of continuos functions it's continuos, we have that $\frac{\partial f}{\partial x}(g(\epsilon),\epsilon) + \frac{\partial f}{\partial y}(g(\epsilon),\epsilon)= g'(\epsilon)$ is continuos.
{ "pile_set_name": "FreeLaw" }
Case: 10-11105 Document: 00511473801 Page: 1 Date Filed: 05/11/2011 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT United States Court of Appeals Fifth Circuit FILED May 11, 2011 No. 10-11105 Lyle W. Cayce Summary Calendar Clerk UNITED STATES OF AMERICA, Plaintiff-Appellee v. ROBERT L. MOFFITT, Defendant-Appellant Appeal from the United States District Court for the Northern District of Texas USDC No. 4:05-CR-111-3 Before HIGGINBOTHAM, SMITH, and HAYNES, Circuit Judges. PER CURIAM:* In April 2006, Robert L. Moffitt, federal prisoner # 33882-177, was convicted of multiple offenses arising out of a drug-trafficking conspiracy and sentenced to a total of 360 months of imprisonment. The conviction and sentence were affirmed on appeal, and his 28 U.S.C. § 2255 motion was denied. See United States v. Moffitt, No. 06-10032 (5th Cir. July 23, 2007); United States v. Moffitt, No. 09-10813 (5th Cir. Feb. 17, 2010). * Pursuant to 5TH CIR . R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR . R. 47.5.4. Case: 10-11105 Document: 00511473801 Page: 2 Date Filed: 05/11/2011 No. 10-11105 Moffitt filed a motion requesting that the district court order his former trial attorney to provide a copy of his files so that Moffitt could prepare a § 2255 motion. The district court denied the motion on the ground that Moffitt has already sought relief under § 2255. Moffitt has appealed. Before we can reach the merits of this appeal, we must first consider our jurisdiction. “Federal courts are courts of limited jurisdiction. They possess only that power authorized by Constitution and statute, which is not to be expanded by judicial decree.” Kokkonen v. Guardian Life Ins. Co. of Am., 511 U.S. 375, 377 (1994) (citations omitted). This court may only exercise jurisdiction over final orders and certain interlocutory orders. See 28 U.S.C. §§ 1291 (final orders), 1292 (interlocutory decisions); Ashcroft v. Iqbal, 129 S. Ct. 1937, 1945 (2009). As the motion to compel counsel to provide a copy of his files does not fall into any of the above categories, this appeal is dismissed for lack of jurisdiction. See also 5th Cir. R. 42.2 DISMISSED. 2
{ "pile_set_name": "ArXiv" }
--- abstract: | In this initial paper in a series, we first discuss why classical motions of small particles should be treated statistically. Then we show that [*any*]{} attempted statistical description of [*any*]{} nonrelativistic classical system inevitably yields the multi-coordinate Schrödinger equation, with its usual boundary conditions and solutions, as an essential statistical equation for the system. We derive the general “canonical quantization” rule, that the Hamiltonian operator must be the classical Hamiltonian in the $N$-dimensional metric configuration space defined by the classical kinetic energy of the system, with the classical conjugate momentum $N$-vector replaced by $-i\hbar$ times the vector gradient operator in that space. We obtain these results by using conservation of probability, general tensor calculus, the Madelung transform, the Ehrenfest theorem and/or the Hamilton-Jacobi equation, and comparison with results for the charged harmonic oscillator in stochastic electrodynamics. We also provide two illustrative examples and a discussion of how coordinate trajectories could be compatible with wave properties such as interference, diffraction, and tunneling. PACS numbers: 02.50Fz,03.65.Ta, 03.65.Sq author: - 'G. H. Goedecke' title: | Statistical approach to quantum mechanics\ I: General nonrelativistic theory --- Introduction {#Intro} ============ There is no universally accepted derivation of the Schrödinger equation for a single spinless pointlike particle, and certainly no derivation of quantum mechanics as a whole. There have been many attempts to establish a classical stochastic foundation for the single-particle Schrödinger or Dirac equation, e.g., Bohm’s hidden variable theory [@Bohm]; the stochastic mechanics approach of Nelson [@Nelson] and Baublitz [@Baublitz]; Okamoto’s approach using a complex Langevin equation [@Okamoto]; Srinivasan and Sudarshan’s use of quaternion measures and the Langevin equation (to obtain the Dirac equation) [@SrinivasanSudarshan]; use of the Fokker-Planck equation [@SED1]; and extensive work on the global statistical hidden variable theory known as stochastic electrodynamics (SED) [@SED1; @SED2]. Also, Gilson [@Gilson] and Collins [@Collins1; @Collins2; @Collins3; @Collins4] used the Madelung transform [@Madelung] in reverse to obtain a wave equation that must be obeyed by any system that satisfies a continuity equation for a non-negative density and associated flux in three-dimensional Eulidean space. Their wave equation has exactly the same [*form*]{} as the Schrödinger equation for a single point particle, but contains unknown functions instead of the potential energy and electromagnetic vector potential, and an unknown constant instead of Planck’s constant. The unknown functions and constant would be different for, say, a classical fluid system than for the statistical description of a one-particle system. The central hypothesis underlying most of the above-mentioned work is that quantum mechanics is actually a statistical description of the classical motions of small particles that are acted upon by both stochastic and non-stochastic force fields. In this work, we follow that hypothesis. In section \[SEMP\] we first mention the features and failures of classical electrodynamics that necessitate a statistical description of the motions of small charged particles. Then we provide a concise derivation of Collins’ statistical wave equation for a single electric monopole particle. Without reference to the Schrödinger equation, we show that the unknown quantities in the statistical equation must be the particle’s potential energy, the electromagnetic vector potential, and Planck’s constant. Also we note that the wavefuction of the equation has the same significance and must satisfy the same boundary conditions as the Schrödinger wavefunction, whereby the statistical wave equation and its solutions are indeed identical in all cases to the axiomatic Schrödinger equation and its solutions for such a particle. In section \[schrodinger\] we develop the mathematical formalism for the statistical description of the nonrelativistic motions of one or many particles, each of which may have mass, electric charge, spin and associated magnetic dipole moment, and possibly other properties, such that $N$ generalized coordinates are needed to describe the system classically. We begin with a generic nonrelativistic classical Lagrangian and corresponding Hamiltonian for $N$ generalized curvilinear coordinates, identify the metric of this $N$-space, and obtain the generalized Newton’s second law. Then, because the system must be treated statistically for the same reasons discussed in section \[SEMP\], we write down the ensemble-averaged continuity equation for the generalized-coordinate probability density and flux, and show by the same methods used in section \[SEMP\] that this $N$-space continuity equation indeed implies the usual $N$-space Schrödinger equation involving the expected general canonical quantization and the usual boundary conditions, solutions, and significance for the N-space wavefunction. In section \[examples\], we provide analyses for two important examples. The first example is a rudimentary two-particle atom, which yields the usual hydrogenic Schrödinger equation for spinless particles. The second example is a system of arbitrarily many spinless pointlike identical particles, which yields the expected nonrelativistic many-body quantum field theory for spinless bosons or fermions as a statistical theory. In section \[summary\], we provide a summary and discussion of our results, including possible differences in interpretation between the statistical nonrelativistic quantum mechanics developed herein and the conventional axiomatic nonrelativistic quantum mechanics; a preview of the next paper on particles with spin and magnetic moment; and plans and suggestions for future work. In the Appendix, we provide a summary of the general tensor calculus methods used in section \[schrodinger\]. Single electric monopole particle {#SEMP} ================================= In subsection \[failures\] below, we discuss the reasons why classical electrodynamics generally cannot be used to obtain the detailed motions of a pointlike electric monopole particle of small mass. In subsection \[statistics\], we show that the correct statistical description of the nonrelativistic motions of such a particle is indeed the conventional Schrödinger equation in three spatial dimensions along with its usual boundary conditions and solutions. Failures of classical electrodynamics {#failures} ------------------------------------- In order to appreciate the two principal features of classical electrodynamics (CED) that make it unable to predict the detailed motions of very small particles, one may consider a very simple system consisting of one indestructible particle having only the attributes of electric charge $q$, mass $m$, and center-of-mass (CM) position vector $\bm{X}(t)$ as a function of time $t$, acted upon by electromagnetic fields. For this system, nonrelativistic CED consists of the Maxwell equations and Newton’s second law for $\bm{X}(t)$, with Lorentz force containing both arbitrary external electromagnetic fields and appropriate self-fields. The self-fields and thus a radiation reaction force should be present; otherwise, e.g., Newton’s law would predict that a classical orbit in an isolated hydrogen atom would be stable despite its energy loss due to radiation. The first major failure of CED is that it offers no satisfactory representation of the radiation reaction force that acts on an accelerated charged particle. All attempts to derive radiation reaction self-forces from causal self-fields yield either runaway or acausal solutions of Newton’s 2nd law, as well as unbounded self-energy, in the point particle limit. The unbounded self-energy is not a fatal problem because it can be absorbed into a renormalized mass. One can avoid both the unbounded self- energy and runaway/acausal pathologies by using an extended-particle model, but a mass renormalization, albeit finite, is still needed, and the effective Newton’s law contains time derivatives of $\bm{X}(t)$ of arbitrarily high order, or becomes (approximately) a differential-difference equation [@Goedecke1975] that is dependent on the structure of the model particle. Special relativistic treatments such as the Lorentz-Dirac equation do not remove the difficulties. The second and even more important major failure of CED stems from the conventional interpretation of the classical Maxwell equations that the external electromagnetic fields acting on any particle are the sum of presumably causal fields emitted by other particles/sources. In principle, these external field sources are all the other particles in the universe. These causal fields include a broadband radiation field that cannot be described precisely unless the detailed motions of its sources are known exactly, which is manifestly impossible. So this radiation field should be expressed as a stochastic field. We shall call this field the “universal background field” (UBF), and later introduce a specific statistical model for it. If an object is sufficiently massive (macroscopic), neither the UBF nor the radiation reaction self-fields acting on its constituent microscopic particles should have measurable effect on the CM or rigid rotational motion of the object, so [*e.g.*]{} the CM coordinate of such an object should satisfy the classical Newton’s 2nd law in the presence of known applied force fields. However, any particle/object that interacts electromagnetically in molecular, atomic and nuclear processes has such small mass that even a fairly weak UBF should cause its CM position $\bm{X}(t)$, its overall angular velocity $\bm{\omega}(t)$ about its CM, and possibly other (internal) coordinates to execute considerable “zitterbewegung”, rapidly oscillating/fluctuating motion, which in turn should produce significant radiation reaction. Even if one could find closed-form expressions for $\bm{X}(t)$ and $\bm{\omega}(t)$ by solving the classical motion equations for such a particle, which is almost never possible, the expressions would contain the stochastic variables carried by the UBF. The conclusion is inevitable: The classical motions of small-mass particles should be described statistically. Statistics of single-particle translational motion {#statistics} -------------------------------------------------- ### Position probability densities and continuity equations {#3D continuity} In [*any*]{} statistical description of the motion of a pointlike particle that has the attributes of electric charge $q$, inertial mass $m$, and CM position $\bm{X}(t)$, but no rotational or other degrees of freedom, one fundamental quantity is the position probability density $\rho(x,t)$, such that $\rho(x,t)d^3x$ is the probability that the particle CM is in volume element $d^3x$ at location $x$ at time $t$. In this section, $x$ stands for the three independent Cartesian coordinate variables $x=x^1,x^2,x^3$ in a Euclidean 3-space, and $X(t)=X^1(t),X^2(t),X^3(t)$ for the three Cartesian coordinates of the particle CM as functions of $t$. The CM moves on a trajectory given by $x^i=X^i(t),\;i = 1,2,3$. The CM position vector may be written $\bm{X}(t)=\bm{\hat{e}}_i X^i(t)$, where the three Cartesian basis vectors $\bm{\hat{e}}_i = \bm{\hat{e}}^i$ are the orthogonal unit vectors of right-handed Cartesian coordinates. Repeated coordinate indices in any expression are summed over, from 1 to 3 in this case. We indicate the coordinates by superscripts in accordance with the standard notation of general tensor calculus (see the Appendix) that we must use in section \[schrodinger\] below. The fine-grained CM position probability density is $$\rho^f(x,t)=\prod_{i=1}^3 \delta \left( x^i-X^i(t) \right),$$ where $\delta$ is the Dirac delta. The associated fine-grained probability current density (flux) is $$\bm{j}^f(x,t)=\bm{\hat{e}}_i \dot{X}^i(t)\rho^f = \bm{\dot{X}}(t)\rho^f.$$ Note that these quantities satisfy the continuity relation $$\label{eq1} \partial_t \rho^f + \bm{\nabla}\bm{\cdot}\bm{j}^f = 0,$$ which guarantees conservation of probability. Here, the gradient operator $\bm{\nabla}=\bm{\hat{e}}^j \partial_j$ and $\partial_j = \partial/\partial x^j$, $\partial_t = \partial/\partial t$. However, these fine-grained densities are rarely useful, because in virtually no cases can we obtain expressions or accurate numerical solutions for $\bm{X}(t)$ for small masses, as mentioned above. A statistical description involving “smooth” densities is needed, so some kind of averaging of the fine-grained densities must be done. As we shall see below, the average that should be used is the ensemble average over the very many (perhaps infinitely many) stochastic variables in the UBF. Then the primary quantities of interest are the ensemble averages of the fine-grained densities, $\rho = \left<\rho^f \right>$ and $\bm{j} = \left<\bm{j}^f \right>$ , where $\left<\;\right>$ signifies the ensemble average. Clearly, the averaged densities also satisfy the continuity equation $$\label{eq2} \partial_t \rho + \bm{\nabla}\bm{\cdot}\bm{j} = 0,$$ since the processes of ensemble averaging and spacetime derivation commute. Furthermore, these smooth densities must satisfy eq. (\[eq2\]) regardless of whether detailed particle trajectories and fine-grained densities even exist, simply because probability must be conserved. Also we note that eq. (\[eq2\]) must be satisfied irrespective of what stochastic process is considered, [*e.g.*]{}, Markovian or not, and independently of what kind of stochastic dynamics is considered, [*e.g.*]{}, the Langevin equation, the Fokker-Planck equation, etc., and independently of what kind of position-velocity or position-momentum phase space treatment may be valid. In particular, the position probability density, fine-grained or smooth, is always related to the position-velocity ($x,v$) phase space probability density $f(x,v,t)$ by $\rho(x,t) = \int d^3v f(x,v,t)$, where the integral is over all velocity space; and similarly for position-momentum phase space. To the best of our knowledge, all statistical treatments of any kind have (usually tacitly) assumed that the densities are smooth differentiable functions, [*e.g.*]{}, not containing Dirac deltas. We began above with fine-grained position probability densities, analogously to the Klimontovich phase space approach in plasma physics, in order to emphasize that the statistical Schrödinger equation obtained in what follows seems to be compatible with coordinate trajectories. ### The Schrödinger equation {#3DSEQ} In this subsection, we show that the smooth-density continuity equation plus a very few other requirements [*inevitably*]{} yield the conventional Schrödinger equation (SEQ) as a correct statistical description of the single electric monopole particle system treated above. The first part of the derivation was published in 1977 by R.E.Collins [@Collins1]. We provide a concise form of Collins’ derivation below not only for clarity but also because we can use the same set of equations in sec. \[schrodinger\]. The first step is to define a probability flow velocity field $\bm{v}(x,t)$ by writing $$\label{eq3} \bm{j}(x,t)=\rho(x,t)\bm{v}(x,t),$$ so that $\bm{v}$ is analogous to a fluid flow velocity field. The physical significance of $\bm{v}$ will become apparent in the next subsection. It will be smooth since both $\rho$ and $\bm{j}$ are smooth. This definition may always be made provided that $\bm{j} = 0$ if $\rho = 0$, which is the case in any physical theory. With no loss of generality, one may express $\bm{v}$ as the sum of a gradient and another vector field that is not a gradient: $$\label{eq4} \bm{v}(x,t) = \frac{\Gamma}{m}\bm{\nabla}\Phi(x,t) - \bm{u}(x,t)$$ where $\Phi(x,t)$ is real-valued and required to be dimensionless, so that $\Gamma$ is an unknown real constant that has the dimension of angular momentum, and $\bm{u}(x,t)$ is an unknown real-valued vector field, not a gradient, having dimension velocity. That field may be required to have zero divergence, in which case eq. (\[eq4\]) is the Helmholtz theorem. The next step is to define the complex-valued function $\psi(x,t)$ as $$\label{eq5} \psi(x,t)=\sqrt{\rho}\,\exp(i\Phi)$$ This relation is known as the Madelung transform [@Madelung] when applied to the usual Schrödinger equation; here, it is being used in reverse. Note that $\rho\geq{0}$, so $\sqrt{\rho}$ is well-defined and real $\geq{0}$ if $\rho$ is smooth, e.g., not a product of Dirac deltas as is the fine-grained density. Equations (\[eq3\]-\[eq5\]) combine to yield $$\label{eq6} \rho=\psi^*\psi$$ $$\label{eq7} \bm{j}=\frac{\Gamma}{2im}(\psi^*\bm{\nabla}\psi - \psi\bm{\nabla}\psi^*) - \bm{u}\psi^*\psi$$ Then, requiring that the continuity equation be satisfied yields easily $$\label{eq8} \frac{O\psi}{\psi} = \frac{O^*\psi^*}{\psi^*} = W(x,t),$$ where $O$ is the operator $$\label{eq9} O = i\Gamma\partial_t - \frac{1}{2m}(-i\Gamma\bm{\nabla} - m\bm{u})^2$$ and $W(x,t)$ is an unknown real-valued scalar field having dimension energy. Therefore, the equation that must be satisfied by $\psi$ is $$\label{eq10} i\Gamma\partial_t\psi = \frac{1}{2m}(-i\Gamma\bm{\nabla} - m\bm{u})^2\psi + W\psi.$$ This statistical wave equation, which has exactly the same [*form*]{} as the conventional SEQ for this system, was the culmination of Collins’ purely mathematical derivation [@Collins1]; Gilson’s earlier work [@Gilson] did not include the vector field $\bm{u}$. Note that the meanings of $\rho$ and $\bm{j}$ were established [*a priori*]{} (which was not the case during the original development and interpretation of the SEQ), whereby $\psi$ must be bounded, single-valued, first-order differentiable except at (unphysical) Dirac delta potentials, and magnitude square integrable over all space, the same conditions that are imposed on the conventional SEQ wavefunction for this system. (A recent paper [@Goedecke2010] discusses several aspects of the inverse Madelung transform method, including why nodal surfaces of bound states do not exist except at spatial infinity, where $\psi\rightarrow 0$ rapidly enough that $\bm{\nabla}\psi$ is also zero there, whereby $\bm{\nabla}\psi$ exists everywhere except at Dirac delta potentials.) However, the presence of unknown functions $W$ and $\bm{u}$ and an unknown constant $\Gamma$ in eq. (\[eq10\]) might well cause one to regard Collins’ result as less than a full derivation of the SEQ. The doubt is strengthened when one realizes that eq. (\[eq10\]) must apply for [*any*]{} smooth quantities $\rho$ and $\bm{j}$ that satisfy a continuity relation, such as the smoothed mass density and mass flux in a classical fluid. For such an application, the unknown functions and constant must in general be quite different than in the statistical wave equation for a single point particle; the smoothing process may be different; and the interpretation of the wave equation must be different, as discussed by several authors [@Collins1; @Goedecke2010; @Klein]. Of course, one can identify $W$, $\bm{u}$, and $\Gamma$ in eq. (\[eq10\]) by comparison of its predictions with experimental results, or equivalently by comparison with the known SEQ, but doing so keeps the derivation purely mathematical and does not appear to resolve the objections noted above. So we ask: Are there any ways to identify these quantities [*a priori*]{} using only general physical theory? The answer is yes. For example, Collins [@Collins1] showed that the expectation energy of the particle is given by the usual quantum expression only if $W$, $\bm{u}$, and $\Gamma$ are the expected choices. Several authors, e.g. de la Peña and Cetto [@SED1], have provided arguments to identify $W$ and $\bm{u}$. In the remainder of this subsection, we provide physical rationale to identify all three of these quantities. [**Identification of unknown functions.**]{} One straightforward way to identify $W$ and $\bm{u}$ is to apply the Ehrenfest theorem [@Schiff] in reverse. That is, on the basis of the known statistical significance of $\rho$ and $\bm{j}$, we must require that the usual nonrelativistic Newton’s second law be valid in the mean. We begin as usual by defining the statistical mean or expectation CM position vector as $\overline{\bm{X}}(t) = \int d^3x \bm{x}\rho$. Then we obtain the mean CM velocity as $\bm{\overline{V}}(t) = d_t\overline{\bm{X}}(t) = \int d^3x \bm{x}\partial_t\rho$. Then we use the continuity equation and an integration by parts, assuming surface integrals vanish at spatial infinity, to obtain $$\label{eq11} \bm{\overline{V}}(t) = \int d^{3}x\rho\bm{v} = \frac{1}{m}\int d^{3}x \psi^*(-i\Gamma\bm{\nabla} - m\bm{u})\psi,$$ where the second equality results from using eq. (\[eq7\]) and another integration by parts, again assuming that surface integrals vanish. \[Note that we could have begun with a definition of the mean velocity, instead of the mean position vector used in many textbooks. We must do the former in the generalized curvilinear coordinates that we need in section \[schrodinger\]; the two starting points are equivalent in Cartesian coordinates in the Euclidean 3-space considered here.\] Also, note that eq. (\[eq11\]) provides a physical significance for the vector field $\bm{v}$, such that $\bm{j} = \rho\bm{v}$ is the probability flux density that yields the mean particle velocity $\bm{\overline{V}}(t)$. Now, take the time derivative of eq. (\[eq11\]), using eq. (\[eq10\]). It is straightforward to show that the result is $$\label{eq12} \frac{d\bm{\overline{V}}}{dt} = \frac{1}{m}\int d^{3}x \psi^*\bm{F}^{op}\psi\,$$ where $$\label{eq13} \bm{F}^{op} = -\bm{\nabla}W - m\partial_t\bm{u} + \mbox{\small$\frac{1}{2}$}m[\bm{v}^{op}\times{(\bm{\nabla}\times{\bm{u}})} - (\bm{\nabla}\times{\bm{u}})\times{\bm{v}^{op}}],$$ with $$\label{eq14} \bm{v}^{op} = m^{-1}\bm{p}^{op} - \bm{u};\;\;\;\;\bm{p}^{op} = -i\Gamma\bm{\nabla}.$$ Just as for eq. (\[eq11\]), the validity of eq. (\[eq12\]) depends on requiring that surface integrals at spatial infinity vanish, often accomplished by requiring the integrands to satisfy periodic boundary conditions on the surfaces of a cubical box of side length $L\rightarrow\infty$. These requirements are equivalent to assuming that all the operators indicated by the superscript “op" are Hermitian. (Note that these same requirements must also be applied in the usual treatment of the axiomatic SEQ.) From eqs. (\[eq12\]) - (\[eq14\]), it is evident that Newton’s second law is valid in the mean if and only if $$\label{eq15} W = q\varphi + W_{0};\;\;\;\; \bm{u}=q\bm{A}/mc,$$ where $\varphi$ and $\bm{A}$ are electromagnetic scalar and vector potentials, respectively, and $W_0$ is some other potential energy (say, gravitational) that can affect this monopole particle. This conclusion follows because only with these identifications do we obtain the correct (Hermitian) Lorentz force operator from eq. (\[eq13\]), $$\label{eq16} \bm{F}^{op} = -\bm{\nabla}W_0 + q[\bm{E}+(2c)^{-1}(\bm{v}^{op}\times{\bm{B}} - \bm{B}\times{\bm{v}^{op}})],$$ where $\bm{E} = -\bm{\nabla}\varphi - c^{-1}\partial_t\bm{A}$ is the electric field, and $\bm{B} = \bm{\nabla}\times{\bm{A}}$ is the magnetic field (flux density), in Gaussian units. After making the identifications in eq. (\[eq15\]), we may rewrite eq. (\[eq10\]) in the form $$\label{eq17} i\Gamma\partial_t\psi = H^{op}\psi,$$ where $$\label{eq18} H^{op} =\frac{1}{2m}(\bm{p}^{op} - \frac{q}{c}\bm{A})^2 + q\varphi + W_0$$ has the form of the classical nonrelativistic Hamiltonian of the system, with conjugate momentum $\bm{P}$ replaced by $\bm{p}^{op}$, including whatever fields $\bm{A}$, $\varphi$, and $W_0$ were appropriate for the classical Hamiltonian. Note that eqs. (\[eq17\]) and (\[eq18\]) also seem to apply to an electrically neutral particle, as conventionally assumed. There is another presumably equivalent but more direct method that can be used to identify the unknown functions. As is easily shown, [*e.g.*]{} see Goedecke and Davis [@Goedecke2010], substitution of eq. (\[eq5\]) into eq. (\[eq10\]) yields two equations that must be satisfied. One is the probability continuity equation itself, while the other is $\Gamma\partial_t\Phi + (2m)^{-1}(\Gamma\bm{\nabla}\Phi - m\bm{u})^2 + W - (\Gamma^2/2m)(\nabla^2\rho^{1/2}/\rho^{1/2}) = 0.$ The last term on the left-hand side is proportional to the so-called “quantum-mechanical potential (energy)”. If it is negligible, then this equation must reduce to the classical Hamilton-Jacobi equation for Hamilton’s principal function $S=\Gamma\Phi$ for the electric monopole system, which occurs if and only if eq. (\[eq15\]) is satisfied. At this point, we have shown something that seems quite remarkable, namely, that if [*for any reason*]{} we choose to describe the classical motion of an electric monopole or uncharged pointlike particle statistically, then a correct statistical description is the statistical Schrödinger equation  (\[eq17\]), which is indistinguishable from the conventional equation, and in which the wavefunction has the conventional meaning and satisfies exactly the usual conditions. Therefore, for any given quantized or c-number fields $\varphi, \bm{A}$, and $W_0$, [*all*]{} solutions of the statistical Schrödinger equation are exactly the same as the conventional ones, except that $\hbar$ is replaced by an unknown constant that we denoted by $\Gamma$. [**Identification of unknown constant.**]{} It is apparent that one must choose $\Gamma = \hbar$ in order that eq. (\[eq17\]) be formally identical to the nonrelativistic SEQ for the electric monopole particle system. We seek a physical rationale for that choice. We expect that the value of $\Gamma$ is determined by the universal background field (UBF) mentioned earlier, because that is the field that compels a statistical description. Therefore we require that the value of $\Gamma$ be universal, the same for all systems in the universe (or at least in a fairly extensive region of the universe). This requirement rules out the possibility that the UBF fields are just thermal fields; therefore, the mean energy density of the UBF must be considerably greater than that of all thermal fields, even those in stellar atmospheres. So we seek an omnipresent temperature-independent high-energy-density stochastic electromagnetic field as the overwhelmingly dominant part of the UBF. Such a field has been proposed and investigated extensively. Beginning in the early 1960’s, many authors [@SED1; @SED2] contributed to the development of what became known as “stochastic electrodynamics” (SED). The central thesis of SED is that all particles are acted upon by a universal stochastic background radiation field, omnipresent even at the absolute zero of temperature, which in turn causes particles that interact electromagnetically to perform “zero-point oscillations” and via radiation reaction be in dynamical equilibrium with the background field, in the absence of other external fields. This hypothesized field became known as the (stochastic) zero-point field (SZPF). The SZPF was modeled as a classical but stochastic free electromagnetic field, not referred to its sources, having expectation energy $(\hbar\omega_k/2,\;\omega_k = kc)$ per plane wave normal mode with propagation vector $\bm{k}$ and transverse polarization index 1 or 2, which is the same as the energy eigenvalue of a quantum vacuum field transverse normal mode. In 1969, Boyer [@Boyer] showed in detail that the presence of the SZPF plus a classical stochastic statistically independent thermal field yields exactly the Planck blackbody radiation spectrum for a collection of oscillators, without quantization of oscillator levels. During the development of SED, many authors also showed that the classical nonrelativistic Newton’s 2nd law applied to the system of a charged-particle isotropic harmonic oscillator with natural angular frequency $\omega_0$, and with damping force given by an Abraham-Lorentz radiation reaction term, acted upon by the SZPF in electric dipole approximation, yields the ensemble-average energy $3\hbar\omega_0/2$, the same as the quantum ground state energy. Some of these authors went further, deriving the SEQ and in some cases its closed-form solutions from the ensemble average of the fine-grained position-momentum phase space distribution function for the oscillator acted upon by the SZPF and other specified non-random radiation fields. These results showed that the appropriate smoothing average of the fine-grained probability density and flux is indeed the ensemble average, as mentioned just before eq. (\[eq2\]). For example, Goedecke [@Goedecke1983] showed that the usual quantum electrodynamics results for transition probabilities per unit time for resonance absorption, stimulated emission, and spontaneous emission were predicted, with the spontaneous emission occuring automatically, without the triggering needed in the Crisp-Jaynes-Stroud semiclassical theory [@CrispJaynes], and without quantization of electromagnetic fields. These SED derivations of a statistical SEQ, and of a companion equation that restricts initial conditions on the wavefunction so that the resulting Wigner phase space distribution can never be negative, are valid only for the nonrelativistic harmonic oscillator system in electric dipole approximation. They are completely different from the derivation of the statistical SEQ presented herein, which as shown above applies to all nonrelativistic single-particle electric monopole systems, with no restriction to the electric dipole approximation for any applied electromagnetic fields. For our purposes, the important aspects of the discussion above are that i) the SZPF contains Planck’s constant, and the SED results for a charged harmonic oscillator immersed in the SZPF imply that the (presumed universal) constant $\Gamma$ that appears in some of the equations (\[eq10\]) - (\[eq14\]) must be $\hbar$; and ii) the correct smoothing average of the fine-grained position probability density is the ensemble average over the stochastic variables in the SZPF, whereby the statistical Schrödinger equation derived above is itself an ensemble-averaged equation. We will discuss this feature in section \[summary\]. At this point, then, we have shown that if we attempt [*any*]{} statistical description of the classical nonrelativistic CM motion of a pointlike electric monopole particle immersed in the stochastic zero-point field and other force fields, then a correct ensemble-averaged statistical equation is the conventional Schrödinger equation in which the wavefunction has the conventional meaning and satisfies exactly the same conditions, so that all solutions are exactly the same as the conventional ones, for [*any*]{} choice of the potentials $\varphi, \bm{A}$, and $W_0$. General Schrödinger equation {#schrodinger} ============================ In this section we consider nonrelativistic systems that require $N$ generalized curvilinear coordinates to describe. For example, for a classical nonrelativistic system of $N_p$ identical particles with spin, the coordinates for each particle could be three Cartesian coordinates (or three spherical polar coordinates or ...) for the CM motion, and three Euler angles for the rotational motion, or altogether $N = 6N_p$ generalized coordinates that comprise the “configuration space" of the system. \[We treat spin in detail in the next paper in the series\]. In subsection \[genCM\], we discuss the forms of the classical nonrelativistic Lagrangian, Hamiltonian, and coordinate motion equations for virtually all systems that require $N$ coordinates, identifying the metric and the covariant and contravariant basis vectors and their crucial properties in the $N$-space. In subsection \[genSEQ\] we begin with the generalized-coordinate probability continuity equation, and show that the same approach used for an electric monopole in section \[SEMP\] yields the $N$-space Schrödinger equation, including the generalized conjugate momentum operators and Hamiltonian operator. Classical mechanics in generalized coordinates {#genCM} ---------------------------------------------- Although the tradition in nonrelativistic classical mechanics is to write generalized coordinates as $q_i$, with subscript indices, here we employ superscripts, and $x^i$ instead of $q_i$, in order to take advantage of the conventional general tensor calculus description of coordinate manifolds as metric spaces. So we represent the $N$ generalized coordinates needed for a system under consideration by the set $x = [x^1, \ldots, x^N]$, where each $x^p$ is an independent real continuous variable that may have any dimension and any range. A classical system moves on a trajectory in this $N$-space given by $[x^p = X^p(t),\;p = (1, \ldots, N)]$. The nonrelativistic Newton’s second law for the coordinates of a system always seems to result in coupled second order differential equations that are linear in the coordinate accelerations, at most quadratic in the coordinate velocities, and linear in the electromagnetic, gravitational, or other possible fields acting on the particles. (A discussion of why this should be the case is best left to the relativistic treatment to follow in a later paper.) Therefore, in this work, we consider only the most general form of Lagrangian that will yield such motion equations for the coordinates. The machinery of general tensor calculus in $N$ dimensions (see the Appendix) allows us to write down that generic Lagrangian in a familiar form. First, we define the $N$-velocity vector $\bm{V}(t)$ in terms of its contravariant components $\dot{X}^p$ and the covariant basis vectors $\bm{e}_p(X)$: $$\label{eq19} \bm{V} = \bm{e}_p(X)\dot{X}^p.$$ Then, the most general appropriate Lagrangian having the dimension of energy is $$\label{eq20} L = \mbox{\small$\frac{1}{2}$}m\bm{V}\bm{\cdot}\bm{V} + m\bm{u}(X,t)\bm{\cdot}\bm{V} - W(X,t),$$ where $\bm{u}(X,t)$ is an $N$-vector field having dimension velocity, $W$ is an $N$-scalar field having dimension energy, $m$ is a parameter having dimension mass, and the dot $\bm{\cdot}$ indicates the generalized dot or scalar product, as discussed in the Appendix. Note that $\bm{u}$ and $W$ may have both explicit and implicit time-dependence. Clearly, the first term in $L$ is a generalized kinetic energy. If all the particles in the system have the same mass, then one could choose $m$ to be that mass; in general, $m$ is any convenient constant having dimension mass, and actual masses or other appropriate parameters will be contained in the basis vectors and thus in the metric. If we write $\bm{u}$ as a linear combination of the contravariant basis vectors, as we may for any vector field, and use eq. (\[eq19\]) and eq. (\[eqA1\]), we find an equivalent expression for $L$, $$\label{eq21} L = \mbox{\small$\frac{1}{2}$}mg_{pq}(X)\dot{X}^p\dot{X}^q + mu_p(X,t)\dot{X}^p - W(X,t),$$ where $g_{pq}(X) = \bm{e}_p(X)\bm{\cdot}\bm{e}_q(X)$ is defined as the (covariant) metric (see the Appendix). Note that $g_{pq}$ is indeed the conventional metric as defined by eq. (\[eqA7\]). The covariant components of the conjugate momentum vector are given by $$\label{eq22} P_s = \partial L/\partial\dot{X}^s =m(g_{sq}\dot{X}^q + u_s).$$ In boldface N-vector notation this equation is simply $$\label{eq23} \bm{P} = \bm{e}^s P_s = \partial L/\partial\bm{V} = m(\bm{V} + \bm{u}),$$ where the notation $\partial L/\partial\bm{V}$ means the gradient of $L$ w.r. to $\bm{V}$. The Euler-Lagrange equations in component form are $dP_s/dt = \partial L/\partial X^s.$ Expressing these equations using eqs. (\[eq21\]), (\[eq22\]), and (\[eqA8\]) yields the component form of the classical motion equations: $$\label{eq24} m(g_{sq}\ddot{X}^q + [s,pr]\dot{X}^p\dot{X}^r) = -\partial_s W - m\partial u_s/\partial t + f_{sp}\dot{X}^p,$$ where $$\label{eq25} f_{sp} = m(\partial_s u_p - \partial_p u_s)$$ are the covariant components of an antisymmetric rank two tensor, and \[s,pr\] are the Christoffel symbols of the first kind, defined by eqs. (\[eqA11\]) and (\[eqA12\]). Similarly, the Euler-Lagrange equations in $N$-vector notation are $d\bm{P}/dt = \bm{\nabla} L$, which yields $$\label{eq26} md\bm{V}/dt = -\bm{\nabla}W -m\partial\bm{u}/\partial t + {\sf \bm{f}}\bm{\cdot}\bm{V}$$ where ${\sf \bm{f}} = \bm{e}^s\bm{e}^p f_{sp}$ is the dyadic form of the rank two antisymmetric tensor mentioned above. The motion equation in this form looks like the usual Newton’s 2nd law for Cartesian coordinates in Euclidean 3-space, but it applies to an arbitrary metric $N$-space. \[The proof that eqs. (\[eq26\]) and (\[eq24\]) are equivalent is not quite trivial. It depends on using eqs. (\[eq19\]) and (\[eqA7\]), and recognizing that here the basis vectors are functions of the time-dependent coordinates $X(t)$, so that $\partial\bm{e}_p/\partial t = 0$, but $d\bm{e}_p/dt = \dot{X}^q\partial_q\bm{e}_p$, whereby $d/dt = \partial/\partial t + \bm{V}\bm{\cdot}\bm{\nabla}$, the convective derivative, when acting on any vector field such as $\bm{V}$ or $\bm{u}$.\] The Hamiltonian for this general system is given by $$\label{eq27} H = \bm{V}\bm{\cdot}\bm{P} - L = \frac{1}{2m}(\bm{P} - m\bm{u})^2 + W,$$ where the last equality follows from eq. (\[eq23\]). Inserting components and basis vectors yields $$\label{eq28} H = \frac{1}{2m}\bm{e}^p(P_p - mu_p)\bm{\cdot}\bm{e}^q(P_q - mu_q) + W$$ which is the form that must be used in the transition to a statistical wave equation in which $P_p$ becomes a derivative operator that in general does not commute with either $\bm{e}^q$ or $u_q$, as we shall show in the next subsection. For the classical case treated here, eq. (\[eq28\]) reduces to the classical Hamiltonian $H_c$, given by $$\label{eq29} H_c = \frac{1}{2m}g^{pq}(P_p - mu_p)(P_q - mu_q) + W,$$ which is exactly what results if one starts with the usual definition $H_c = \dot{X}^p P_p - L$. Hamilton’s canonical motion equations are simply $\dot{X}^p = \partial H_c/\partial P_p$, and $\dot{P}_p = -\partial H_c/\partial X^p$, which combine to yield eq. (\[eq24\]); or $\bm{V} = \partial H_c/\partial\bm{P}$ and $\dot{\bm{P}} = -\bm{\nabla}H_c$, which combine to yield the equivalent eq. (\[eq26\]). Perhaps the most important result of this subsection is the proof that all the standard equations and relations in the usual nonrelativistic classical mechanics notation in which three-vectors are written in boldface, including Newton’s second law, the Lagrangian, the conjugate momenta, the Hamiltonian, the Euler-Lagrange equations, and Hamilton’s canonical equations, can be expressed in exactly the same boldface form in an $N$-dimensional metric configuration space of generalized curvilinear coordinates. Of course, in applying the equations, one must realize that each vector written in boldface has $N$ contravariant components that are the orthogonal projections of the vector onto the contravariant basis vectors, (and similarly for the $N$ covariant components), and that the metric and the affine connections must be specified in order to obtain the detailed $N$-space equations. We shall do examples later in this paper and in the next paper in this series to illustrate how one obtains and uses the basis vectors, the metric, and the connections. Derivation of the Schrödinger equation in $N$ generalized coordinates {#genSEQ} --------------------------------------------------------------------- For the same reasons discussed in section\[SEMP\], the classical motions of particles of very small mass should be treated statistically. Assuming that coordinate trajectories $x^p = X^p(t)$ exist, then the fine-grained coordinate probability density is given by $$\rho^{f}(x,t) = |g_\cdot|^{-1/2}\prod_{q=1}^N\delta(x^q - X^q(t))$$ where $|g_\cdot|$ is the magnitude of the determinant of the covariant metric matrix (see the Appendix). The corresponding fine-grained probability current density is $\bm{j}^f = \bm{e}_p\dot{X}^p\rho^{f}(x,t).$ Using relations in the Appendix, it is easy to show that these quantities satisfy the $N$-space continuity equation $\partial_t\rho^{f}(x,t) + \bm{\nabla}\bm{\cdot}\bm{j}^f = 0$. The ensemble-averaged (smoothed) densities $\rho$ and $\bm{j}$ must also satisfy the continuity equation $$\label{eq30} \partial_t\rho + \bm{\nabla}\bm{\cdot}\bm{j} = 0.$$ This equation looks exactly the same as eq.(\[eq2\]) for Euclidean 3-space. But here, the gradient operator $\bm{\nabla} = \bm{e}^p\partial_p$ is a sum of $N$ terms, as is $\bm{j}$, which is given by either $\bm{e}_p j^p$ or $\bm{e}^p j_p$; $x$ stands for the $N$ real independent variables (curvilinear coordinates) $x^1, \ldots ,x^N$; and the contravariant and covariant basis vectors $\bm{e}^p$ and $\bm{e}_p$ depend on the coordinates and are not unit vectors in general. Now we may proceed just as in section \[SEMP\]. That is, [*eqs.(\[eq3\])-(\[eq10\]) apply to the $N$-space system with no change in notation or form!*]{} We start with eq.(\[eq3\]), $\bm{j}(x,t)=\rho(x,t)\bm{v}(x,t)$, and proceed step by step through eqs.(\[eq4\])-(\[eq9\]) until we get to eq.(\[eq10\]), which we reproduce here: $$\label{eq31} i\hbar\partial_t\psi = \frac{1}{2m}(-i\hbar\bm{\nabla} - m\bm{u})^2\psi + W\psi.$$ Note that we have already chosen $\Gamma = \hbar$, in accordance with our discussion in Sec. \[SEMP\]. However, in eq.(\[eq31\]), $\bm{\nabla}$ is the $N$-space gradient operator, as noted just above; the unknown $N$-vector field $\bm{u}$ has $N$ covariant and $N$ contravariant components; and the wavefunction $\psi$, the unknown scalar field $W$, each of the components $u^p$, $u_p$, and each of the basis vectors may depend on all or some of the $N$ independent variables $x$. The form-invariance of eq.(\[eq31\]) when written in boldface vector notation should not be a great surprise: We use it in three dimensions every day, e.g., when we express the electric monopole SEQ in spherical polar coordinates $x=(r,\theta,\phi)$ for the unperturbed case $\bm{u} = 0$ and $W = W(r)$. For convenience in what follows, we write the analog of eq.(\[eq14\]): $$\label{eq32} \bm{v}^{op} = m^{-1}\bm{p}^{op} - \bm{u};\;\;\;\;\bm{p}^{op} = -i\Gamma\bm{\nabla} = -i\hbar\bm{e}^p\partial_p,$$ and we also define the operator $$\label{eq33} H^{op} = \frac{1}{2m}(\bm{p}^{op} - m\bm{u})^2 + W.$$ Note that the presence of the combination $(\bm{p}^{op} - m\bm{u})$ ensures that the $N$-dimensional vector field $\bm{u}$ must have the same significance as the electromagnetic vector potential for a single electric monopole, that of a gauge field. In accordance with eq.(\[eq28\]), $H^{op}$ must be written in terms of basis vectors and components as $$\label{eq34} H^{op} = \frac{1}{2m}\bm{e}^p(-i\hbar\partial_p - mu_p)\bm{\cdot}\bm{e}^q(-i\hbar\partial_q - mu_q) + W.$$ Then the N-space statistical wave equation (\[eq31\]) has the canonical form $$\label{eq35} i\hbar\partial_t\psi = H^{op}\psi.$$ At this point, for clarity we write out eq.(\[eq34\]): $$\label{eq36} H^{op} = \frac{1}{2m}[g^{pq}(-i\hbar\partial_p - mu_p) - i\hbar\bm{e}^p\bm{\cdot}\partial_p\bm{e}^q](-i\hbar\partial_q - mu_q) + W.$$ Note that $H^{op}$ will include not only the derivatives $\partial_p u^q$, but also the term involving $\bm{e}^p\bm{\cdot}\partial_p\bm{e}^q$. As discussed in the Appendix, in conventional tensor calculus the first derivatives of the basis vectors can be written as linear combinations (LC’s) of the basis vectors, and the coefficients of the LC’s are the affine connections $\Gamma^{q}_{pr}$; see eq. (\[eqA10\]). If these connections are symmetric in their lower indices, then they are equal to the corresponding Christoffel symbols, which depend only on the metric and its first derivatives. This symmetry occurs [*e.g.*]{} in a global coordinate transformation from say Cartesian to curvilinear coordinates such as spherical polar coordinates in Euclidean 3-space. However, if some or all of the curvilinear coordinate basis vectors are referred to a locally Cartesian (or pseudo-Cartesian) set of basis vectors, which may always be done, then the resulting connections may be asymmetric in their lower indices, and one obtains a different expression for $\bm{e}^p\bm{\cdot}\partial_p\bm{e}^q$ than the conventional expression involving the Christoffel symbols. See eqs. (\[eqA18\])-(\[eqA21\]). This kind of connection occurs in the treatment of particles with spin, in the next paper in this series. In order to identify $\bm{u}$ and $W$ in eq.(\[eq34\]), we follow the same procedure used in section\[SEMP\], namely, the Ehrenfest theorem in reverse. First, we define the mean $N$-velocity vector of the system by $$\label{eq37} \overline{\bm{V}}(t) = \int d^{N}x\,\sqrt{|g|}\,\bm{j}(x,t),$$ the analog of the first part of eq.(\[eq11\]). Then we substitute eq.(\[eq7\]) with $\Gamma = \hbar$, valid here as an $N$-space equation, integrate by parts, and use eq.(\[eq32\]) to obtain $$\label{eq38} \overline{\bm{V}}(t) = \int d^{N}x\,\sqrt{|g|}\,\psi^*\bm{v}^{op}\psi.$$ In doing this integration by parts, we insist that i) all integrands that are bilinear in $\psi^*$ and $\psi$ must obey periodic boundary conditions in all coordinates, and ii) eq. (\[eqA18\]) must be valid. Just as in the case of the axiomatic SEQ, these requirements make the operators $\bm{v}^{op},\,\bm{p}^{op}$, and $H^{op}$ Hermitian. Now, we take the time derivative of the mean velocity. From eqs.(\[eq38\]),(\[eq35\]),(\[eq34\]), and the Hermiticity of $H^{op}$, we obtain immediately $$\label{eq39} d\overline{\bm{V}}(t)/dt = \frac{1}{i\hbar}\int d^{N}x\,\sqrt{|g|}\,\psi^*[\bm{v}^{op},H^{op}]\psi.$$ where $[\bm{v}^{op},H^{op}]$ is the commutator. The force operator $\bm{F}^{op}$ is $$\label{eq40} \frac{m}{i\hbar}[\bm{v}^{op},H^{op}] \equiv \bm{F}^{op} = -\bm{\nabla}W - m\partial_t\bm{u} + \frac{1}{2}({\sf \bm{f}}\bm{\cdot}\bm{v}^{op} + \bm{v}^{op}\bm{\cdot}{\sf \bm{f}}),$$ where $$\label{eq41} {\sf \bm{f}} = \bm{e}^p\bm{e}^q m(\partial_p u_q - \partial_q u_p).$$ Equation(\[eq40\]), valid in the $N$-space, is the analog of eq.(\[eq13\]), valid in Euclidean 3-space. Note that the antisymmetric tensor term here replaces the cross-product term in eq.(\[eq13\]); cross-products exist only in 3-spaces. Now, comparing eqs.(\[eq40\]) and (\[eq39\]) with the generalized-coordinate Newton’s second law, eq.(\[eq26\]), it is immediately apparent that the Ehrenfest theorem is valid if and only if the $N$-space $H^{op}$ defined above is the usual classical system Hamiltonian with conjugate momentum $\bm{P}$ replaced by $\bm{p}^{op}$. That is, the analysis just above has identified the unknown functions $\bm{u}$ and $W$ that occur in the statistical wave equation constructed from the $N$-space probability continuity equation: The functions must be exactly those that appear in eq.(\[eq27\]), the $N$-space classical Hamiltonian of the system. In addition, the overall analysis in this subsection has derived the general rule for “canonical quantization”, that the $N$-vector conjugate momentum $\bm{P}$ in any $N$-space classical Hamiltonian is to be replaced by $\bm{p}^{op} = -i\hbar\bm{\nabla} = -i\hbar\bm{e}^p\partial_p$, as given by eq.(\[eq32\]). Note that this canonical quantization rule, $P_p\rightarrow p^{op}_p = -i\hbar\partial_p$, implies the usual commutator $[x^q , p^{op}_p] = i\hbar\delta^q_p$ in the $N$-space. Examples ======== In this section, we consider two simple examples that should help to clarify the generalized coordinate approach, namely, a system of two spinless point particles that may have diffeerent masses, and a system of arbitrarily many identical spinless point particles, in the unperturbed limit of two-body central force instantaneous internal interactions. Two pointlike particles {#2point} ----------------------- Let the masses be $m_1,m_2$, and choose three Cartesian coordinates for each particle’s CM location, $x^1,x^2,x^3$ for particle 1, $x^4,x^5,x^6$ for particle 2. Then the kinetic energy $T$ on the trajectory ($x^p = X^p(t),\;p = 1, \ldots, 6$) is $$\label{eq42} T = \frac{1}{2}m[\frac{m_1}{m}\dot{X}^i\dot{X}^i +\frac{m_2}{m}\dot{X}^{i+3}\dot{X}^{i+3}] = \frac{1}{2}mg_{pq}\dot{X}^p\dot{X}^q,$$ where the index $i$ ranges and sums from 1 to 3. From eq. (\[eq42\]), we may read off the diagonal 6-space metric: $$\label{eq43} g_{11}=g_{22}=g_{33} = m_1/m;\;\;\;g_{44}=g_{55}=g_{66} = m_2/m,$$ with other components zero. For this example, we consider the “unperturbed central force” case, by choosing $\bm{u} = 0$ and $W = W(r)_{x=X(t)}$ in the classical Lagrangian, where $$r = [(x^i - x^{i+3})(x^i - x^{i+3})]^{1/2}$$ is the distance between the particle CM’s. The classical Hamiltonian is $H = T + W$, and $\bm{p}^{op} = -i\hbar\bm{\nabla} = -i\hbar\bm{e}^p\partial_p$, where the $\bm{e}^p$ are the Cartesian unit basis vectors $\bm{\hat{e}}^i$ and $\bm{\hat{e}}^{i+3}$. Thus, according to our general results in Sec. \[schrodinger\], the Hamiltonian operator in the statistical SEQ is $H^{op} = (-\hbar^2/2m)\nabla^2 + W$, where $\nabla^2$ is given by eq. (A16). Since $g^{pq} = 1/g_{pq}$ for $p = q$ in this example, and zero otherwise, the SEQ is $$\label{eq44} i\hbar\partial_t\psi = -(\hbar^2/2m_1)\partial_i\partial_i\psi - (\hbar^2/2m_1)\partial_{i+3}\partial_{i+3}\psi + W\psi$$ At this point, one may go to the conventional notation $x^i=x^i_1, x^{i+3}=x^i_2$, and then to CM and relative coordinates. One reason for choosing this particular example is that it is probably the simplest two-particle example of the general method derived in section \[schrodinger\]. Another reason is to emphasize that what you get in the Hamiltonian operator in the derived SEQ is exactly what you have included in the classical Hamiltonian, no more and no less. For example, it is clearly physically incorrect to choose $\bm{u}$ = 0 and thus omit all incident and self radiation fields. It is also incorrect in principle to neglect retardation in two-body interactions, but that will be a negligible effect in cases involving slow motions of particles that remain close together. (Note that retardation for slowly-moving particles is not just a tiny relativistic correction if the particles are far apart.) Many pointlike particles {#Npoint} ------------------------ Consider the extension of the two-particle system above to $N_p$ point particles, interacting with each other via two-body central force potential energies and also allowing external electromagnetic fields. We let the particles be identical, each with electric charge $q$, mass $m$, and CM location. Then the classical nonrelativistic Lagrangian, Hamiltonian, and motion equations each involve $N=3N_p$ coordinates, $x^p=X^p(t),\;p={1, \ldots, N}$. The development in Sec. \[schrodinger\] yields the general Schrödinger equation (\[eq31\]), or, equivalently, eqs. (\[eq35\]) and (\[eq36\]), involving these $N$ coordinates. For this example, the metric may be chosen as the $N$-space Kronecker delta metric, $g_{pq}=\delta_{pq}=g^{pq}$, whereby the affine connections are zero, corresponding to three independent Cartesian coordinates for each particle. In order to achieve a familiar notation, we relabel the coordinates by letting $(x^p,\,p=1,N)\rightarrow(x_n^i,\,n=1,N_p,\,i=1,3)$, so that $n$ is a particle index and $i$ is a Cartesian coordinate index. Then, by analogy with the previous example, the simplest nontrivial “unperturbed” classical Hamiltonian contains $\bm{u} = 0$ and $$\label{eq45} W(x,t) = W^{int} = \frac{1}{2}\sum_{n=1}^{N_p}\sum_{n'=1}^{N_p}V(r_{nn'}),$$ where terms with $n=n'$ are omitted from the double sum, $r_{nn'} = [(x_n^i - x_n'^i)(x_n^i - x_n'^i)]^{1/2}$, and $V$ is the two-body interaction energy that could involve not only the Coulomb repulsion but also other forces such as Yukawa interactions and gravity. If we allow given external electromagnetic potentials $\varphi^{ext}, A_i^{ext}$ to perturb the system, then the Hamiltonian would include the terms $$\label{eq46} W(x,t) = W^{int} + q\sum_{n=1}^{N_p}\varphi^{ext}(x_n,t);\;\;u_{n,i}(x,t) = (q/mc)A_i^{ext}(x_n,t),$$ where $x_n$ stands for $(x_n^1,x_n^2,x_n^3)$. The $N$-vector $\bm{u} = \bm{e}^p u_p = \bm{e}_n^i u_{n,i}$, where $\bm{e}_n^i=\hat{\bm{e}}^i$, the Cartesian unit basis vector, the same for all $n$. Again we emphasize that the functions $W$ and $\bm{u}$ that appear in the Hamiltonian operator are exactly those that are chosen for inclusion in the classical Lagrangian and Hamiltonian. Clearly this often-used example once again neglects retardation and self-fields. It is important to note that for the identical particles in this example the total Hamiltonian is invariant under all pair interchanges of particle indices. This invariance leads immediately to the result that the total wavefunction solution of the general many-particle Schrödinger equation must either change sign under each pair interchange, or not change sign. As we know, the choice of sign change yields Fermions and the Pauli exclusion principle, while the choice of no sign change yields Bosons and Bose-Einstein condensation. Suppose one makes the sign change choice. Then, as discussed in detail by Schweber [@Schweber], the set of all Schrödinger equations for (1,2,3,...) identical particles is equivalent to the “second quantized" many-particle field theory for Fermions in occupation number space. Likewise, if one makes the choice of no sign change, then the set of all Schrödinger equations for different numbers of particles is equivalent to the second quantized theory for Bosons. These equivalences combined with the results herein seem to imply that the conventional many-body quantum theories are mathematically compatible with particle trajectories, and are actually statistical theories. Summary, discussion, and prognosis {#summary} ================================== [**Summary.**]{} In sections \[SEMP\] and \[schrodinger\], we showed the following: Given any system that requires $N$ independent real-valued curvilinear coordinates to describe classically. Given that the classical nonrelativistic kinetic energy of the system is bilinear in the coordinate first derivatives and thus defines a metric $N$-space. Also given that the force fields in the classical Lagrangian include non-negligible stochastic fields, so that the system must be described statistically. Then a correct statistical description of the system is always the usual $N$-coordinate Schrödinger equation, with an unknown constant $\Gamma$ in place of $\hbar$, in which the Hamiltonian operator is the classical Hamiltonian with the conjugate momenta replaced by momentum operators. The general $N$-vector momentum operator is simply $-i\Gamma$ times the $N$-space gradient operator. If the dominant stochastic field is the stochastic zero-point field (SZPF), then $\Gamma=\hbar$. In boldface $N$-vector notation, the resulting general $N$-coordinate nonrelativistic statistical Schrödinger equation is given by eq. (\[eq31\]), $$i\hbar\partial_t\psi = \frac{1}{2m}(-i\hbar\bm{\nabla} - m\bm{u})^2\psi + W\psi,$$ where $\bm{u}(x,t)$ is the $N$-vector velocity gauge field and $W(x,t)$ is the $N$-scalar potential energy that appear in the classical system Hamiltonian, $x = (x^1, \ldots, x^N)$ are the $N$ independent real curvilinear coordinates, $\bm{\nabla}=\bm{e}^q\partial_q$ is the $N$-space gradient operator, with $\bm{e}^q$ the contravariant basis vector normal to the hypersurface $x^q = const.^q$, and $m$ is a parameter having dimension mass that may be chosen at will, because the $N$-space metric contains the physical parameters. Furthermore, the multi-coordinate wavefunction in this statistical Schrödinger equation must satisfy exactly the same conditions as does the wavefunction in the usual axiomatic Schrödinger equation, whereby all wavefunction solutions are the same as the usual ones. We obtained these results by applying the reverse Madelung transform to the continuity equation for smooth coordinate probability density and flux, by using the covariant and contravariant basis vector approach to general tensor calculus in the metric $N$-space (see the Appendix), by applying the Ehrenfest theorem in reverse or by comparison with the classical Hamilton-Jacobi equation, and by comparison with well-known results for a classical charged radiation-damped harmonic oscillator immersed in the SZPF. In section \[examples\], we treated two examples. The first was essentially trivial, a system of two point spinless particles having different masses in the unperturbed limit of an internal static central force interaction but no external fields. This example was included mainly to illustrate how the classical Hamiltonian and the corresponding operator reduce from their six-dimensional metric space expressions to the usual CM and relative coordinate expressions. The second example was a system of arbitrarily many identical spinless point particles in the limit of two-body central force non-retarded internal interactions, also in the presence of applied external fields. This example was included mainly to show how the $3N_p$-space Hamiltonian operator reduces to the usual form involving three Cartesian components of the CM position vector for each of $N_p$ particles, and also to emphasize that the set of derived Schrödinger equations for $N_p = 1,2,3,...$ predicts either fermions or bosons, as expected, and is equivalent to the usual quantized field description in occupation number space [@Schweber]. [**Discussion.**]{} Since we have already discussed the mathematical approaches used in this work fairly thoroughly, in this subsection we will focus on interpretational and philosophical aspects of the results. In particular, we consider two important items, namely, whether classical trajectories are compatible with the conventional [*interpretation*]{} of the Schrödinger equation, and what could be the physical source of the wavelike properties of interference, diffraction, and tunneling predicted by the equation. The first item, discussed briefly in section \[SEMP\], is that the statistical Schrödinger equation itself is mathematically compatible with classical coordinate trajectories. This compatibility arises because there are two levels of statistics involved in deriving the equation: First, one obtains a continuity equation for smooth coordinate probability density and flux by averaging the fine-grained density and flux, which contains Dirac deltas, over the random variables in the stochastic zero-point field. Then, using the methods discussed above, one obtains the statistical Schrödinger equation as an ensemble-averaged equation involving a wavefunction that satisfies the usual conditions and is known [*a priori*]{} to have the usual statistical significance. However, the conventional interpretation of discrete sets of energy eigenvalues as strictly quantized energies, the only energies allowed to the system, is not compatible with underlying classical trajectories. This incompatibility was discussed thoroughly in the papers by the author on the charged HO in SED [@Goedecke1983]. In those papers it was shown that the HO energy is not sharp, even in the ground state, and furthermore that the system can never be in just a single excited state, despite the fact that the derived Schrödinger equation, which contains a radiation reaction vector potential that is not included in the conventional Schrödinger equation, yields the correct QED results for absorption and stimulated and spontaneous emission of electric dipole radiation, without electromagnetic field quantization. Even in the ground state, direct calculation of ensemble averages from the detailed trajectory of the HO in the SZPF revealed that $\left<E^2\right>= 2\left<E\right>^2$, characteristic [*e.g.*]{} of Gaussian random variables, and denying strict quantization. That is, energy fluctuations must be present if underlying classical trajectories exist. It may be that this apparent interpretational dilemma can be resolved quite easily, as follows. We note again that the statistical Schrödinger equation derived in this work is an ensemble-averaged statistical equation. Therefore its predicted quantized eigenvalues of the Hamiltonian operator for an unperturbed bound system, the same eigenvalues predicted by the axiomatic SEQ, are [*ensemble-averaged*]{} energies $\left<E\right>$, which may form a discrete spectrum with no internal contradictions. If a known radiation field is applied to the system, then standard time-dependent perturbation theory applied to the statistical SEQ still yields the Einstein rule for line spectra, that emitted and absorbed angular frequencies are given by $\Delta\left<E\right>/\hbar$, and also yields the usual transition rules and (ensemble-averaged) transition probabilities per unit time. (As mentioned above, spontaneous emission results without quantized applied radiation fields if an appropriate RR vector potential is included in the classical Hamiltonian and thus in the SEQ Hamiltonian operator, but results only from the quantized applied radiation field if the RR potential is omitted.) The actual energies may fluctuate around the ensemble average energy eigenvalues without changing these results. However, we would expect the ensemble-averaged coordinate probability distributions predicted by the statistical Schrödinger equation to be enormously more probable than any others. We defer detailed consideration of energy fluctuations until later work. The second item mentioned above is the possible source of the wavelike properties of interference, diffraction, and tunneling predicted by the Schrödinger equation. The direct source must be the stochastic zero-point field (SZPF). In order to discuss how the SZPF could produce interference effects, let’s focus first on Casimir forces. These well-known “vacuum forces”, such as the force between two very large parallel plates separated by a small distance, or the force between two polarizable electric dipoles (the Casimir-Polder force) result from modification of the zero-point field induced by the presence of matter with which the field interacts. The standard results may be derived using either the quantum vacuum field or the SZPF, as discussed by de la Peña and Cetto [@SED1], and as verified in unpublished calculations by the author, ca. 1983. When using the SZPF, the Casimir-Polder force results from the ensemble average of the forces due to coherent multiple scattering of each SZPF plane wave mode and the consequent coherent zero-point oscillations of the two induced dipoles. The Casimir force between two parallel conducting plates also results from coherent multiple scattering between the plates, which alters the mode structure of the vacuum SZPF in the region between the plates and causes a net attractive ensemble average force between the plates. In both cases, coherent multiple scattering of the SZPF plane wave modes produces the interference and the “vacuum” forces. Consider now a speculation on the famous problem of multiple-slit particle diffraction. It seems evident that the amplitudes and phases of the SZPF modes are altered from the free-field values by the presence of the matter in the plates containing the slits. These modes will be different in the cases of no slits, one slit, two slits, etc. in a plane. Therefore, the forces on an approaching particle due to the SZPF must be different in each case, and perhaps it is not so surprising that the distribution of the transmitted particles in a beam is quite different in each case. The Schrödinger/statistical wave equation derived herein predicts interference patterns as if each incident particle were a wave having a given ensemble-averaged incident direction and wavelength equal to Planck’s constant divided by the incident momentum. Of course a single particle actually makes a dot on the detector screen behind the slits. But the interference pattern is indeed reproduced after a very large number of identical non-interacting particles pass through the slits, whether they pass through one at a time or all in a bunch. With respect to tunneling through a potential barrier, a particle following a classical trajectory can do this only if temporarily it receives enough energy to be kicked over the barrier. Such temporary or “virtual” energy transfers will occur in the presence of the SZPF, and their statistics must be described by the Schrödinger/statistical wave equation. Let us add a comment about our identification of the unknown constant in the statistical wave equation as Planck’s constant. Our comparison with the results for the charged harmonic oscillator in SED is equivalent to comparison with experiment or with the axiomatic Schrödinger equation, except for our argument involving the SZPF and its close relation to the quantum vacuum field, which suggests the universality of the constant. A derivation of the numerical value of the constant is lacking, as has always been the case. For that matter, to the best of our knowledge there are no accepted derivations of the values of any of the fundamental constants. One expects that their values, which Dirac suggested might be time-dependent, are determined by the history and structure of the whole universe. In particular, as a classical albeit stochastic field, the SZPF must have sources, i.e., it must originate from (zero-point) oscillations of all the particles in the universe. Therefore there must be some self-consistency requirements involved that would determine values of one or more of the fundamental “constants”. Another point should be made about the universality of the unknown constant $\Gamma$ in the derived statistical Schrödinger wave equation: It seems clear that it should have the same value, $\hbar$, for every electrically charged fundamental particle that interacts via the Lorentz force with the SZPF. Furthermore, most fundamental particles are themselves charged or are composed of charged particles. Because of the extremely intense ultra-high-frequency amplitudes in the SZPF, which has a power spectrum $\propto\omega_k^3$, the SZPF should interact via the Lorentz force with each electrically charged constituent of any particle, [*e.g.*]{} with the quarks in a neutron. However, neutrinos are outstanding counterexamples. Should their statistical quantum equations also have $\Gamma=\hbar$? We defer consideration of this question to later work. [**Prognosis**]{}. In the next paper in this series, we utilize the results of this paper, in particular eqs. (\[eq35\]) and (\[eq36\]), to show that a straightforward statistical representation of the nonrelativistic rigid rotations of a charged massive object in terms of Euler angle coordinates and principal moments of inertia yields exactly the properties of quantum spin and the quantum interaction of a magnetic dipole with a magnetic field, including odd-half-integer as well as integer spin. We show that odd-half-integer spin particles cannot access integer spin states, and vice-versa. We also provide one simple way to overcome the well-known objection that an extended rigidly rotating electron model must involve supraluminal speeds. If the [*a priori*]{} statistical treatment developed in the first two papers in this series is to be viable, future work must include fully relativistic treatments of spinless and spinning particles utilizing the same approach. While we have made significant progress toward these treatments, as of this writing quite a bit remains to be done. Another point that we feel should be emphasized again: As implied by our results, quantum mechanics, axiomatic or statistical, is only as good as the classical mechanics that underlies it. When we set up a quantum mechanics problem, we first need to decide how many “classical” coordinates are needed. (For example, consider a diatomic molecule. Do we need only CM and (two) Euler angle coordinates, or should we include the “internal” vibration coordinate? It’s up to us. If we think ambient energies will be fairly large, then we need the latter.) Then we must decide how to represent the interaction potential energies and gauge fields in the classical Lagrangian/Hamiltonian. Usually we are forced to make approximations. (For the diatomic molecule, we often use the lowest order approximation by assuming only an instantaneous harmonic central force between the atoms. This is incorrect in principle, because it neglects retardation and vector potentials, including external and self radiation fields, but it is also clearly quite accurate in some applications.) Again, it’s up to us. So the traditional approach in classical mechanics, to choose the appropriate coordinates and interactions and obtain the Lagrangian and Hamiltonian, must still be done before one does the (statistical) quantum mechanics of the problem. Finally, we offer a further comparison of axiomatic nonrelativistic quantum mechanics (QM) with the statistical nonrelativistic QM developed herein. First, we re-emphasize that the two produce identical algebraic or numerical results for any and all choices of the classical Hamiltonian, for any nonrelativistic system whatsoever. We must remember that on its way to becoming axiomatic the original Schrödinger equation (SEQ) was inferred, not derived, by seeking the simplest linear second-order homogeneous wave equation whose eikonal limit is the Hamilton-Jacobi equation for the classical system considered. The probabilistic significance of the assumed smooth wavefunction $\psi$ and density $\psi^*\psi$ had to be determined [*a posteriori*]{}, as did the appropriate boundary conditions on the wavefunction, by comparison with experiment or by postulate. The significance of discrete sets of eigenvalues of the Hamiltonian operator as quantized energies, the only energies allowed, seemed obvious, but actually constituted another postulate. In contrast, the fully statistical theory is unavoidable. Except for identification of the unknown real constant $\Gamma$, the theory follows inevitably once one decides to treat the nonrelativistic classical motions of small particles statistically. It derives the general canonical quantization rule and SEQ for a smooth wavefunction with interpretations and boundary conditions known [*a priori*]{}; but it does not support quantized energies. (As mentioned above, the statistical SEQ is an ensemble-averaged equation, whereby its eigenvalues ought to be ensemble-averaged energies.) If we do insist on truly quantized energies, then we are choosing to maintain dual theories that seem to yield the same results. Therefore, it is most important that we continue to investigate the statistical approach in an effort to determine what experiments could distinguish between the two theories. Acknowledgements ================ The author would like to thank Stephen Pate, Michael Engelhardt, and Stefan Zollner for helpful discussions and assistance in preparing the manuscript. Generalized coordinates and coordinate basis vectors {#appendix} ==================================================== To the best of our knowledge, only the well-known text by Lichnerowicz [@Lichnerowicz] and a recent paper by the author [@Goedecke2011] provide fairly complete discussions of the basis vector approach to tensor calculus in general metric spaces. This very clear, efficient, and versatile approach is particularly well-suited to the material treated in this work. In the interest of readability, we provide a brief summary below. Consider a set of real continuous independent variables $x = (x^1, \ldots, x^N)$ as curvilinear coordinates in an $N$-dimensional manifold or “$N$-space". $N$ may be finite or infinite. Each coordinate $x^p,\;p = 1, \ldots, N$ may be non-compact or compact and may have any physical dimension. The $(N-1)$-dimensional coordinate hypersurfaces are defined as $[\Sigma_p:\;x^p = const.^p]$ , and the coordinate curves are given by $[C_p:\;x^q = const.^q,\,\forall{\,q\neq p}]$; [*i.e.*]{}, a particular $C_p$ that passes through a point $x$ is defined as the intersection of the $(N-1)$ hypersurfaces $[\Sigma_q,\,q\neq p]$ that contain $x$. We may define a set of $N$ linearly independent (LI) vectors $\bm{e}_p$, called “covariant" basis vectors, as tangents to the $[C_p]$ passing through point $x$, and a so-called dual LI set $\bm{e}^p$, called “contravariant" basis vectors, as normals to the $[\Sigma_p]$ at point $x$; either set will serve as a set of coordinate basis vectors for vector and tensor fields in the tangent linear vector space. The designations “contravariant" and “covariant" refer to how quantities transform under a general coordinate transformation in the $N$-space. For single-index quantities, “contravariant", indicated by a superscript index, means that the $\bm{e}^p$ and other single-superscript quantities transform as do the coordinate differentials $dx^p$; “covariant" means that the $\bm{e}_p$ and other single-subscript quantities transform as do the partial derivatives $\partial_p$. The inner (dot) products among the normal and tangent basis vectors at any point are given by $$\label{eqA1} \bm{e}_p\bm{\cdot}\bm{e}^q = \bm{e}^q\bm{\cdot}\bm{e}_p = \delta_p^q,$$ the Kronecker delta. We may write any $N$-vector field $\bm{A}(x)$ as linear combinations (LC’s) of the coordinate basis vectors: $$\label{eqA2} \bm{A}(x) = \bm{e}_p(x)A^p(x) = \bm{e}^q(x)A_q(x).$$ We adopt the extended Einstein summation convention that repeated indices in any term of an equation, one “up” and one “down”, or both up or both down, are summed over from 1 to $N$. The coefficients of the LC’s are also the components of the vector, [*i.e.*]{}, $A^q = \bm{e}^q\bm{\cdot}\bm{A}$ are the contravariant components, and $A_q = \bm{e}_q\bm{\cdot}\bm{A}$ are the covariant components. Similarly, we may write any 2nd rank tensor or “dyadic" field as bilinear combinations of the basis vectors; the coefficients of the bilinear combinations have two indices and are the “components" of the dyadic. Also, any triadic or third rank tensor is a trilinear combination of basis vectors; etc. All such components are present in the conventional Riemann-Einstein version of tensor calculus. However, that version does not use basis vectors and thus cannot write the invariant quantities such as an $N$-vector field $\bm{A}$ in the general and very convenient boldface notation of eq. (\[eqA2\]). The displacement vector $d\bm{x}$ connecting two infinitesimally separated points and the gradient operator $\bm{\nabla}$ are written as the following LC’s: $$\label{eqA3} d\bm{x} = \bm{e}_p dx^p;\;\;\;\bm{\nabla} = \bm{e}^p \partial_p,$$ where $\partial_p = \partial/\partial x^p.$ As in relativity, $d\bm{x}$ is chosen to have dimension length ($L$) and $\bm{\nabla}$ to have dimension $1/L$. Therefore, in general, $\bm{e}^p$ and $\bm{e}_p$ may not be unit vectors, may not be dimensionless, may not have the same dimension, and may not even be parallel; and the covariant and contravariant components of a vector may not have the same dimension or the same dimension as the vector itself. The square of the line element $ds$ between infinitesimally separated points is defined conventionally by $$\label{eqA7} \pm ds^2 = d\bm{x}\bm{\cdot}d\bm{x} = \bm{e}_p\bm{\cdot}\bm{e}_q dx^p dx^q = g_{pq}(x)dx^p dx^q,$$ where either + or - may be chosen, and the last equality defines the (covariant components of the) metric $g_{pq}$ and thereby the fundamental symmetric dot products among the subscripted basis vectors associated with these $N$ curvilinear coordinates. In general $ds^2$ may be positive, negative, or zero. The dot product of any basis vector with itself may be either positive or negative, yielding an “indefinite metric”, necessary here and in relativity since all coordinates are chosen to be real-valued. Using eqs. (\[eqA1\]) and (\[eqA2\]) yields $$\label{eqA8} \bm{e}_r\bm{\cdot}\bm{A} = A_r = g_{rp}A^p;\;\;\;\bm{e}^p\bm{\cdot}\bm{A} = A^p = g^{pq}A_q,$$ where $$\label{eqA9} g^{pq} = \bm{e}^p\bm{\cdot}\bm{e}^q$$ comprise the “contravariant components” of the metric, or in common usage, simply the contravariant metric. Also, eq. (\[eqA8\]) implies $g^{rp}g_{pq} = \delta^r_q$, i.e., the matrix $(g^{\cdot})$ with elements $(g^\cdot)_{pq} = g^{pq}$ is the inverse of the matrix $(g_{\cdot})$ with elements $(g_{\cdot})_{pq} = g_{pq}$. Note that in general indices may be raised and lowered using the appropriate components of the metric. In Lichnerowicz’ basis-vector approach to tensor calculus, the coordinate partial derivatives of the $N$-space basis vectors at point $x$ are expressible as LC’s of those basis vectors: $$\label{eqA10} \partial_p\bm{e}_q = \Gamma^r_{pq}\bm{e}_r;\;\;\;\partial_p\bm{e}^r = -\Gamma^r_{pq}\bm{e}^q.$$ The $ \Gamma^r_{pq}$ are the so-called affine connections; here, we are following Hartle’s [@Hartle] choice for the ordering of the subscripts on these connections, opposite to that used in the author’s recent paper [@Goedecke2011]. (In the conventional Riemann-Einstein version of tensor calculus, the affine connections are defined by considering “parallel transport" of vector components). A space in which the connections are symmetric in their lower indices is called “torsion-free”. Virtually all efforts in relativity have assumed this property. In such cases it is straightforward to show that $$\label{eqA11} \Gamma^r_{pq} = \{^r_{pq}\} = g^{rs}[s,pq],$$ $$\label{eqA12} [s,pq] =\mbox{\footnotesize$\frac{1}{2}$}[\partial_p g_{qs}+\partial_q g_{ps} - \partial_s g_{pq}],$$ where $[s,pq] = [s,qp]$ is called a “Christoffel symbol of the first kind", and $\{^r_{pq}\}$ is called a “Christoffel symbol of the second kind". These symbols satisfy an important identity, $$\label{eqA13} \{^q_{pq}\} = \partial_p\ln\sqrt{|g_\cdot|},$$ where $|g_\cdot|$ is the magnitude of the determinant of the matrix $(g_\cdot)$. Consider the gradient of a vector field, $$\label{eqA14} \bm{\nabla A} = \bm{e}^q \partial_q ( \bm{e}_p A^p) = \bm{e}^q\bm{e}_r(\partial_qA^r + \Gamma^r_{qp}A^p),$$ where the last term follows from eq. (\[eqA10\]). The quantity $(\partial_qA^r + \Gamma^r_{qp}A^p)$, denoted $A^r_{\;\,;q}$ or $D_qA^r$ or $\nabla_qA^r$, is called the covariant derivative of the vector (component) $A^r$. The open vector product $\bm{\nabla A}$ is called a “dyadic” (or rank two tensor); the quantities $D_qA^r = \bm{e}_q\bm{\cdot}\bm{\nabla A}\bm{\cdot}\bm{e}^r$ are the $N^2$ mixed components with first index down (covariant), second index up (contravariant). The divergence $\bm{\nabla}\bm{\cdot}\bm{A}$ of a vector field is an important quantity. To obtain it, just put a dot between the basis vectors in eq. (\[eqA14\]), and use eqs. (\[eqA1\]) and (\[eqA13\]): $$\label{eqA15} \bm{\nabla}\bm{\cdot}\bm{A} = (\sqrt{|g_\cdot|})^{-1}\partial_q(\sqrt{|g_\cdot|}A^q).$$ If $\bm{A}=\bm{\nabla}\Phi$, where $\Phi$ is any (scalar) function of $x$, then $$\label{eqA16} \bm{\nabla}\bm{\cdot}\bm{A} = \nabla^2\Phi = (\sqrt{|g_\cdot|})^{-1}\partial_q(\sqrt{|g_\cdot|}g^{qp}\partial_p\Phi).$$ The N-space volume element $dV_N$ is also needed; it is $$\label{eqA17} dV_N = d^Nx\sqrt{|g_\cdot|},\;\;\;d^Nx = dx^1, \cdots, dx^N.$$ An important identity is needed to show that various operators are Hermitian: $$\label{eqA18} \int d^Nx\sqrt{|g_\cdot|}\bm{\nabla}f = 0,$$ where the integration extends over all $N$-space and $f$ is any function. In order to prove this identity, simply write $\bm{\nabla}=\bm{e}^p\partial_p$, integrate by parts, use eqs. (\[eqA10\]),(\[eqA11\]), and (\[eqA13\]), and require that the integrand $\sqrt{|g_\cdot|}\bm{e}^q f$ satisfy periodic boundary conditions or go to zero at the coordinate boundaries. Up to this point, this appendix has considered conventional tensor calculus with coordinate basis vectors in a metric space of $N$ dimensions. The designation “conventional" here implies that i) the affine connections are symmetric in their lower indices, and ii) eqs. (\[eqA8\]) and (\[eqA10\]) are valid. Together, these equations imply that the $N$-space considered is completely isolated from other possible coordinate spaces. For example, suppose that a total space consists of an $N$-space and an $M$-space. In order for these two subspaces to be isolated from each other, i) the metric must be globally transformable to block diagonal form, $N\times N \oplus M\times M$, as implied indirectly by eqs. (\[eqA8\]) and (\[eqA10\]), and ii) the derivatives of basis vectors in each subspace must be expressible as LC’s of basis vectors only in that subspace, as implied by eq. (\[eqA10\]). Non-isolated subspaces are actually quite common [@Goedecke2011]; they should be important in a fully relativistic treatment. In this nonelativistic treatment, we work with isolated spaces. However, we do need to consider another deviation from conventional tensor calculus, namely, suppose the coordinate basis vectors $(\bm{e}_p,\bm{e}^q)$ are referred locally to a given Cartesian set $[\bm{\hat{e}}_i = \bm{\hat{e}}^i, \;\hat{g}_{ij} = \bm{\hat{e}}_i\bm{\cdot}\bm{\hat{e}}_j = \delta_{ij}]$, where the indices $i,j,k,...$ range and sum over the same set of integers as the indices $p,q,r,...$ (Just as in relativity, such a referral may always be done using local coordinate transformations.) That is, suppose that $$\label{eqA19} \bm{e}_q = A_{iq}\hat{\bm{e}}_i;\;\;\;\bm{e}^q = A^{-1}_{qj}\hat{\bm{e}}_j,$$ where the coefficients are given functions of the curvilinear coordinates, valid in a neighborhood around any point $x$. Note that the second relation in eq. (\[eqA19\]) is implied by the first and eq. (\[eqA1\]). The metric is then given by $$\label{eqA20} g_{pq} = \bm{e}_p\bm{\cdot}\bm{e}_q = A_{ip}A_{iq};\;\;\;g^{pq} = \bm{e}^p\bm{\cdot}\bm{e}^q = A^{-1}_{pj}A^{-1}_{qj}.$$ The affine connections are then obtained by derivation of eq. (\[eqA19\]), using eq. (\[eqA10\]): $$\label{eqA21} \Gamma^q_{pr} = (\partial_pA^{-1}_{qj})A_{jr},$$ keeping in mind that in a locally Cartesian system underlying the basis vectors $[\hat{\bm{e}}_i]$ at point $x$, the first derivatives of these vectors (and thus the locally Cartesian system connections) vanish at $x$. Then eqs. (\[eqA10\]), (\[eqA19\]) and (\[eqA20\]) yield $$\label{eqA22} \bm{e}^p\bm{\cdot}\partial_p\bm{e}^q = -g^{pr}\Gamma^q_{pr} = A^{-1}_{pi}\partial_pA^{-1}_{qi}.$$ Note that these $\Gamma^q_{pr}$ may not be symmetric in their lower indices. Such seems to be the case for the 3-space of the Euler angles, as mentioned in Sec. \[genSEQ\] above and derived in the next paper in this series. Nevertheless, the identity (\[eqA18\]) is still valid in the Euler angle space, as shown in that paper. [99]{} D. Bohm, Phys. Rev. 85, 166 and 180 (1952). E. Nelson, Phys. Rev. 150, 1079 (1966). M. Baublitz, Jr., Prog. Theor. Phys. 80, 232 (1988). H. Okamoto, J. Phys. A: Math Gen. 23, 5535 (1990). S. Srinivasan and E. Sudarshan, J. Phys. A: Math Gen. 29, 5181 (1996). For reviews of SED and many references, see e.g. T. H. Boyer, “A brief survey of stochastic electrodynamics", in Foundations of Radiation Theory and Quantum Electrodynamics, A. O. Barut, ed. (Plenum, NY, 1980); and L. de la Pena and A. Cetto, “The Quantum Dice: An Introduction to Stochastic Electrodynamics”, (Kluwer, The Netherlands, 1996). Seminal and comprehensive papers on SED published during the years 1960 - 1990 include several by T. Marshall, T. Boyer, M. Surdin, L. de la Pena, L. de la Pena and A. Cetto, E. Santos, O. Theimer, and G. Goedecke; see the reviews mentioned above. More recent papers include e. g. G. Manfredi, S. Mola, and M.R. Faix, Eur. J. Phys. 14, 101 (1993); K. Dechoum and H. Frana, Found. Phys. 25, 1599 (1995); K. Dechoum, H. Frana, and C. Malta, Phys. Lett. A 24, 93 (1998), and in “Fundamental Theories of Physics, Vol. 126, Gravitation and Cosmology: From the Hubble Radius to the Planck Scale", Part IV, p. 393 (Kluwer, Secaucus, NJ, USA), 2002. J. Gilson, Proc. Camb. Phil. Soc. 64, 106 (1968). R. Collins, Lett. Nuovo Cimento 18, 581 (1977). R. Collins, Found. Phys. 7, 475 (1977). R. Collins, Lett. Nuovo Cimento 25, 473 (1979). R. Collins, Found. Phys. Lett. 5, 63 (1992). E. Madelung, Z. Phys. 40, 322 (1926). G. Goedecke, Nuovo Cimento 30 B, 108 (1975); Lett. Nuovo Cimento 41, 1 (1984). G. Goedecke and B. Davis, Nuovo Cim. B 125, 941 (2010); DOI 10.1393/ncb/i2010-10897-y U. Klein, Found. Phys. 39, 964 (2009). See e.g. L.I. Schiff, “Quantum Mechanics", 3d ed. (McGraw-Hill, NY, 1968). T. Boyer, Phys. Rev. 182, 1374 (1969). G. Goedecke, Found. Phys. 13, 1101, 1121, and 1195 (1983) and 14, 41 (1984). M. Crisp and E. Jaynes, Phys. Rev. 179, 1253 (1969); 185, 2046 (1969); C. Stroud, Jr., Phys. Rev. A 1, 106 (1970). S. Schweber, “An Introduction to Relativistic Quantum Field Theory" (Row, Peterson, Evanston, IL, 1961), Chap. 6. A. Lichnerowicz, “Elements of Tensor Calculus" (Methuen, London, 1962). G. Goedecke, Eur. Phys. J. Plus 126, 32 (2011); DOI: 10.1140/epjp/i2011-11032-x G. Goedecke, J. Math. Phys. 15, 789 (1974). J. Hartle, “Gravity, an Introduction to Einstein’s General Relativity" (Pearson Education, 2003).
{ "pile_set_name": "Github" }
/* * Axelor Business Solutions * * Copyright (C) 2020 Axelor (<http://axelor.com>). * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. */ package com.axelor.apps.base.web; import com.axelor.apps.base.db.PriceList; import com.axelor.apps.base.db.repo.PriceListRepository; import com.axelor.apps.base.service.PriceListService; import com.axelor.inject.Beans; import com.axelor.rpc.ActionRequest; import com.axelor.rpc.ActionResponse; import com.google.inject.Singleton; @Singleton public class PriceListController { public void historizePriceList(ActionRequest request, ActionResponse response) { PriceList priceList = request.getContext().asType(PriceList.class); priceList = Beans.get(PriceListRepository.class).find(priceList.getId()); priceList = Beans.get(PriceListService.class).historizePriceList(priceList); response.setReload(true); } public void checkDates(ActionRequest request, ActionResponse response) { PriceList priceList = request.getContext().asType(PriceList.class); try { Beans.get(PriceListService.class).checkDates(priceList); } catch (Exception e) { response.setError(e.getMessage()); } } }
{ "pile_set_name": "USPTO Backgrounds" }
Hierarchically arranged memory has been a common feature in computing for some time. Fundamentally, faster memory is more expensive per byte. Despite rapid advances in storage performance, it is often economically unsound to utilize only the lowest latency storage medium. Instead, in order to deliver acceptable performance within a fixed budget, storage devices of different sizes and speeds may be arranged so that memory transactions read or write to the fastest devices whenever possible. In a typical example, a hierarchical memory structure includes a main memory and one or more caches. The main memory is a large pool of storage, and, for reasons including cost, is often made up of relatively slow storage devices. The main memory defines the address space and thereby defines the limits of the available storage. However, portions of the address space may be mapped to a cache, a smaller memory pool typically utilizing a faster storage medium, so that transactions directed to mapped addresses can be read from and/or written to the faster storage medium. In multiple-tiered configurations, portions of the cache may be mapped to another cache made up of an even-faster storage medium. In many examples, memory structures include multiple caches, each utilizing progressively faster storage media. A number of techniques exist for determining which data to load in a particular cache. By effectively predicting data that will be the target of subsequent transactions, more transactions can be performed by the cache even when the cache is significantly smaller than the main memory. These techniques are grounded in a number of principles, such as the principles of locality. The principle of temporal locality suggests that data that has been accessed recently is likely to be accessed again. Accordingly, frequently accessed data is often cached. The principle of spatial locality suggests that data accesses tend to cluster around certain addresses. Accordingly, a range of addresses is often cached based on an access to an address within the range. However, these principles are merely guidelines. Because every application and computing task has a unique data access pattern, no particular caching algorithm is optimal for all applications. Instead, a balance may be struck based on the anticipated use or uses of a given computing system. Unfortunately, this balance may break down when the working data set of an application grows beyond a certain point. The overhead involved caching and writing back a large data set may diminish the performance gains expected from the cache. For example, storage systems, computing systems that process data transactions on behalf of other computing systems, are generally very cache-sensitive and often manipulate large data sets. This can be caused by the large numbers of transactions typically received by storage systems and the widely varying workloads depending on host activity. These effects and others make it extremely difficult to tune a single cache algorithm for all supported host applications. Accordingly, an efficient system and method for caching that is responsive to an application's working set has the potential to dramatically improve cache hit rate and system performance.
{ "pile_set_name": "Pile-CC" }
Cumulative weight gain over the course of early and middle adulthood may increase health risks later in life, according to a new study led by researchers from Harvard T.H. Chan School of Public Health. They found that compared with people who kept their weight stable, people who gained a moderate amount of weight (5 to 22 pounds) before age 55 increased their risk of chronic diseases and premature death, and decreased the likelihood of achieving healthy aging. Higher amounts of weight gain were associated with greater risk of chronic diseases. “Our study is the first of its kind to systematically examine the association of weight gain from early to middle adulthood with major health risks later in life,” said senior author Frank Hu, professor of nutrition and epidemiology and chair of the Department of Nutrition. “The findings indicate that even a modest amount of weight gain may have important health consequences.” Most people gain weight cumulatively during young and middle adulthood. Because the amount of weight gain per year may be relatively small, it may go unnoticed by individuals and their doctors — but the cumulative weight gain during adulthood may be large. The researchers analyzed health data from 118,140 study participants, including 92,837 women in the Nurses’ Health Study between 1976 and 2012, and 25,303 men in the Health Professionals Follow-Up Study between 1986 and 2012. Participants were asked to recall their weight from early adulthood (age 18 for women, 21 for men) and to report their weight at age 55. Women gained an average of 22 pounds over early to middle adulthood, and men about 19 pounds. Compared to those who kept their weight stable (not gaining or losing more than five pounds), those who gained a moderate amount of weight had an increased risk of major chronic diseases and premature death, and were less likely to score well on a “healthy aging” assessment of physical and cognitive health. In a meta-analysis of study participants from the two cohorts, each 5-kilogram (11-pound) weight gain was associated with a 30 percent increased risk of Type 2 diabetes, 14 percent increased risk of hypertension, 8 percent increased risk of cardiovascular disease, 6 percent increased risk of obesity-related cancer, 5 percent increased risk of dying prematurely (among never-smokers), and 17 percent decreased odds of achieving healthy aging. “These findings may help health professionals counsel patients about the health consequences of weight gain. Prevention of weight gain through healthy diets and lifestyle is of paramount importance,” said Yan Zheng, who worked on the study while a postdoctoral fellow at Harvard Chan School and is now professor of epidemiology at Fudan University, China. The study’s cohorts were supported by grants from the National Institutes of Health. The study was supported by grants from the National Heart, Lung, and Blood Institute and the National Institute of Diabetes and Digestive and Kidney Diseases. Zheng was supported by a fellowship from the American Diabetes Association. Bart Bonikowski, an associate professor who studies political sociology and nationalist political movements, discusses the seeming resurgence of white supremacist and nationalist groups in the wake of the weekend violence in Charlottesville, Va. Harvard’s presidential search committee, comprising the 12 members of the University’s Corporation other than the president along with three members of the Board of Overseers, has announced the membership of the faculty and staff advisory committees for the search. “It often seems that partisans believe they are so correct that others will eventually come to see the obviousness of their correctness,” said Todd Rogers of the Harvard Kennedy School about his new research.
{ "pile_set_name": "Wikipedia (en)" }
A Woman in the Ultimate A Woman in the Ultimate is a 1913 American short drama film directed by Dell Henderson. Cast Lillian Gish as Verda Charles Hill Mailes as Verda's stepfather Henry B. Walthall as member of the Badger Gang Alfred Paget as member of the Badger Gang John T. Dillon as member of the Badger Gang Joseph McDermott as member of the Badger Gang See also Lillian Gish filmography External links Category:1913 films Category:American films Category:American silent short films Category:1910s short films Category:1910s drama films Category:American black-and-white films Category:American drama films
{ "pile_set_name": "Pile-CC" }
World Cup Rugby – Ireland Vs Canada Preview As the world braces for the 2015 Rugby World Cup, online sports books are preparing for the influx of sporting enthusiasts. The action gets underway on September 18 when England faces off against Fiji in a key match up from the powerful Pool A group. All three of the September 19 games feature teams with something to prove if they have any designs on getting out of their perspective pools. Ireland Vs Canada Preview This figures to be an interesting matchup between two teams that come into the World Cup with markedly different recent form. Canada: – For Canada, it has been a long time between drinks of water. The last time the Canucks were able to make it into the knockout rounds was back in 1991. Since then, it has been a combination of bad form and even worse luck that has kept the Canucks at Bay. Coming into this year’s competition, Canada’s form has been horrible with seven straight test losses dating back to November 2014. If they are going to right the ship against a tough Irish team, they are going to have to depend on a trio of dynamic players who will need to play at the highest level of their careers. Those three players are Tyler Ardron (team Captain), Jamie Cudmore and Brett Beukeboom. At 24-years-old, Ardon is the most interesting of the lot. In three years since he joined the national squad, he has established himself as one of the country’s best back-row forwards in recent memory. As a superior athlete with deceptive skills, he has the versatility to play several positions. That said, it is his knowledge of the game and leadership skills that has made him the youngest captain coming into this year’s cup. The Canucks are expected to keep their game plan simple, hoping strong wing play will lead to a few scores while the veteran back row players protect the in-goal areas. Ireland – While the Canucks enter the game in poor form, Ireland enters playing at their best form in years. The team’s most recent success came at the 2015 Six Nations tournament where they walked off with the title for the second consecutive year. They ended the tournament with a 4-1 record, out-pointing England and Wales. Back in November, they showed they were coming into form after exciting test victories over International powerhouses Australia and South Africa. New national team coach Joe Schmidt will be looking for a strong showing in this, his first world cup. Key players include Cian Healy, Sean O’Brien, Jamie Heaslip and Jonathan Sexton, one of the best tactical kickers in the game. Considering the team’s recent play, it is clear the team has not been adversely affected by the retirement of key national players like Ronan O’Gara and Brian O’Driscoll. The one man Ireland can ill-afford to lose is Captain Paul O’Connell. As a 13 year national team veteran, O’Connell has a stellar reputation throughout the world for his intensity in the second row and his overall leadership qualities. Prediction: Ireland will be looking to make a statement in this game and that spells trouble for the Canucks. It shouldn’t be close with the favourites winning by at least two tries.
{ "pile_set_name": "OpenWebText2" }
New Line is moving ahead with its movie prequel to “The Sopranos,” hiring Alan Taylor to direct “The Many Saints Of Newark.” New Line set up the feature film in March when it bought the script from “The Sopranos” creator David Chase. The film is set in the 1960s in Newark, New Jersey, amid conflicts between African-American and Italian residents. Over four days of rioting in July, 1967, 26 people died and hundreds were injured in Newark. “The Sopranos” was set in contemporary New Jersey, ran for six seasons on HBO between 1999 and 2007. The acclaimed series nabbed 21 Primetime Emmy Awards, including one for Taylor for directing. Lawrence Konner, who worked on “The Sopranos” with Chase, is a co-writer for the project. Chase will also produce the film. Chase Films’ Nicole Lambert will serve as executive producer. “The Many Saints Of Newark” is expected to feature younger versions of some of the characters from “The Sopranos.” James Gandolfini, the star of the series, died in 2013. Taylor directed nine of the 86 episodes of “The Sopranos.” His other TV credits include “Game of Thrones,” “Mad Men,” “Boardwalk Empire” and “Electric Dreams.” His feature directing credits include “Thor: The Dark World” and “Terminator Genisys.” Taylor is repped by UTA. The news was first reported by The Wrap.
{ "pile_set_name": "StackExchange" }
Q: Possible to use 7447 to drive common-cathode 7 segment display? I know that the 74(LS)47 is designed to drive common-anode displays. However, is it possible to make it drive a common-cathode display? What is the simplest (in terms of components) way of doing this? A: Yes, it's possible. One method would be to use two extra resistors (plus the usual per-segment resistor) and one PNP transistor per output. simulate this circuit – Schematic created using CircuitLab You can buy these three parts integrated into so-called "digital transistors" so it would take only 7 additional parts. Edit: Re comments by sherrellbc, here is a version for a high-voltage LED digit (something like a 3" digit with multiple LED die per segment) that operates the transistor in the linear region. It provides a constant current of about 15mA for any LED voltage from 0 to more than 10V (it will get warm at 0V). When it is 'on', the base is at 12V - 2.2V, so the emitter is at about 1.5V below +12 and therefore the collector current will be close to 15mA (since emitter current ~= collector current). simulate this circuit
{ "pile_set_name": "USPTO Backgrounds" }
The semiconductor integrated circuit (IC) industry has experienced rapid growth. Technological advances in IC materials and design have produced generations of ICs where each generation has smaller and more complex circuits than the previous generation. In the course of IC evolution, functional density (i.e., the number of interconnected devices per chip area) has generally increased while feature size (i.e., the smallest component that can be created using a fabrication process) has decreased. Such advances have increased the complexity of processing and manufacturing ICs. For these advances, similar developments in IC processing and manufacturing are developed. As the density of semiconductor devices increases and the size of circuit elements becomes smaller, the resistance capacitance (RC) delay time increasingly dominates circuit performance. To reduce the RC delay, there is a desire to use low-k dielectrics. The low-k dielectrics are useful as intermetal dielectrics (IMDs) and/or as interlayer dielectrics (ILDs). However, the low-k dielectrics may present problems during processing. It is desirable to have improved manufacturing methods for forming reliable low-k dielectrics.
{ "pile_set_name": "Pile-CC" }
Weather looks iffy for Obama visit Better bring your rain gear, if you’re planning to see the president visit Wisconsin this week. An approaching cold front could make conditions wet and windy for President Barack Obama’s campaign stop on the University of Wisconsin campus in Madison on Thursday. The National Weather Service is predicting a 40 percent chance of showers and thunderstorms¬. People attending the event will not be allowed to bring in umbrellas, which may be just as well, since winds could gust up to 25 miles per hour. The President will have left Wisconsin before that same cold front pushes temperatures down from the low 70s for a Thursday high to the 50s on Friday. The Obama rally on Bascom Hill is expected to mean big crowds, road closings and traffic at a standstill near the campus. Gates for the event will open at noon. The last time the President was in Madison two years ago more than 26,000 people showed up.
{ "pile_set_name": "PubMed Abstracts" }
Nyctohemeral rhythmicity of type II thyroxine 5'-deiodinase activity in the pineal gland but not in the Harderian gland of the Swiss mouse. Type II thyroxine 5'-deiodinase (5'-D) activity in both pineal and Harderian glands of the Swiss mouse was studied. Pineal 5'-D activity exhibited a nyctohemeral profile with a maximal peak value at 05.00 h, which coincides with that for pineal melatonin production. However, no rhythm of 5'-D activity in the Harderian gland could be found. In pineal gland, light at night inhibited the nocturnal increase in 5'-D activity, while isoproterenol, a beta-adrenergic agonist, could not stimulate the enzyme. In the Harderian gland, neither darkness, nor light or night, or isoproterenol were capable of modifying basal values of 5'-D activity.
{ "pile_set_name": "StackExchange" }
Q: but other ladies carried such things, so she also **would have one Next she selected a parasol from a large and varied assortment in the rear of the store. Not that she had any idea what it was used for; but other ladies carried such things, so she also would have one. Source: http://www.classicreader.com/book/2953/1/ I am not sure what "would" means in my sentence. From the context of the paragraph I undestand it that she wants to behave according to the the other ladies. So I would await the form "had to have one". A: According to Macmillan Dictionary, definition #1: would: used for talking about what was going to happen in the past a used for showing what someone expected, intended, promised etc when they were thinking or talking about the future: James said he would never forgive her. Most analysts expected that there would be a change in policy. Consequently, if the context has the reference point in the past, as in your example, we would use would when we were thinking or talking about the future and the sentence reads as: but other ladies carried such things, so she also would have to carry one. On the other hand, if we use had to have one as you suggested, the sentence reads: but other ladies carried such things, so she also had to have one. To me, both versions imply that she's obliged, bound or under the necessity of carrying one, that is, two different ways of saying the same thing.
{ "pile_set_name": "StackExchange" }
Q: How to retrieve child with the immediate parent documents from mongodb? I'm trying to filter child documents from a mongodb collection. Along with the child documents trying to fetch corresponding immediate parent documents as well. **My parent document:** { "id":"123", "source":"02", "child":{"id":"456"}} **My child document:** { "id":"456", "source":"01", "parent":{"id":"123"}} How to fetch the child documents along with its corresponding parent documents dynamically ? Can anyone please help me out ... A: You can utilise $lookup aggregation pipeline stage to perform a left outer join to the same collection (unsharded). Given your example documents, to retrieve children of parent document(s): db.collectionA.aggregate([ {"$match": {"child": {"$exists": 1} } }, {"$lookup":{ "from": "collectionA", "localField": "id", "foreignField": "parent.id", "as": "children"} } ]); To retrieve parent from child document(s): db.collectionA.aggregate([ {"$match": {"parent": {"$exists": 1} } }, {"$lookup":{ "from": "collectionA", "localField": "id", "foreignField": "child.id", "as": "parent"} } ]); I'd also recommend reviewing MongoDB Model Tree Structures, especially: Model Tree Structures with Parent References Model Tree Structures with Child References
{ "pile_set_name": "Pile-CC" }
1) People are so much nicer!Typically the DC crowd is pretty close-lipped, but slap a green cast on you and you’ve got a door holding, conversation starting, discount delivering, community around to support you. 2) Most people wouldn’t be doing this.I pretty much hear this comment in words, looks or some other body language 3+ times per day. See thing #5 for why I think this is. 3) Northwest DC is pretty accessible.Scooting around for a few blocks really isn’t that bad. It’s slow. But you get used to it. 4) The bus is best. I can’t imagine taking anything else in this occasion. It’s down the road from the tiny house, and it drops me off a few blocks from where I need to be in DC. It’s practically a charter bus. 5) A clear purpose makes all the difference. I get to help make people healthier in drastic ways. The fact that pays the bills and allows me the freedom to be home with my wife and toddler more than most people is PLENTY purpose enough to figure things out and put on a happy face. In summary...Injuries never happen at a good time. They require sooooo much energy to heal from and still accomplish normal every-day tasks. And let’s just say that it’s much harder to take advantage of opportunities if everything requires more energy. At the end of the day though you really just have two choices. You can stew over opportunities lost, or leverage your current opportunities. One is an exercise in futility, the other is an exercise in strength. My advice remains the same: The Idea...You know how sometimes you have these ideas that are hanging around on the outskirts of your mind and you can’t quite grasp what they are? I’ve been feeling that way lately about what my opinion is of working out/exercising. Don’t get me wrong, I love to work out. Especially in the right environment. I love lifting heavy weights, listening to Disturbed, and sweating it out. At least I did before I had a baby. I haven’t gotten back into that kind of lifting yet since becoming a mom. We evolved to move But what if part of the reason so many people struggle to get into a routine going to the gym and “working out” is because it is completely unnatural? At VIVO Training Systems, we tend to gravitate towards the more evolutional when it comes to ideology. Except for the smart phone technology… I know, I know, so hypocritical. But you have to pick your battles. The question is the answer The question I have been asking myself is this: How can we help people move and become more healthy (or achieve their physical goals of weight loss or strength etc) in a way that is fun and sustainable? I am even struggling with this myself. I have one scheduled workout a week and that is all that I have been doing as far as exercise goes. At least as far as structured exercise goes… Is there another way? Writing a workout program for a recent client has got me thinking about the possibility of other options. Let’s think about this for a minute: what are the real goals behind most workout programs? To lose weight To gain mobility/flexiblity To get stronger To prevent injury What if instead of just writing workout programs for people, we wrote lifestyle’s? In a way that they could achieve results without ever stepping in a gym? A possible gold standard The nutrition program that we are just starting to offer at VTS is all about the big picture. They don’t just give you a list of meals to eat, they help you with your eating habits, they help you with your environment, they help you with your support system, so much more than just a list of foods. And yet we write workout programs for people that are really just a list of exercises. And don’t get me wrong, many people see awesome results with our programs. And there is nothing wrong with that. But what if there was another way? Thinking Outside the App Sometimes I think we are a little too attached to our workout program App. It almost defines us as a company. I’m thinking I need to start thinking outside the App so to speak. Facebook is great but it is very limiting as well. It’s all about the delivery... How could I develop and deliver a lifestyle to people? Well the writing/development is the easy part, time consuming, but the logistics aren’t hard. ​The delivery of this lifestyle would be the hard part.​ “If you find a path with no obstacles, it probably doesn’t lead anywhere.” -Frank A. Clark
{ "pile_set_name": "PubMed Abstracts" }
Ultrasonic integrated backscatter discloses intramyocardial hemorrhage in patients with acute myocardial infarction. It has been reported that intramyocardial hemorrhage (IH) can be detected by magnetic resonance imaging (MRI) and IH correlates with the poor prognosis of acute myocardial infarction (AMI). We examined whether integrated backscatter (IBS) can disclose IH in patients with AMI. We recorded IBS images in 34 patients with AMI who underwent coronary angioplasty within 12 hours of symptom onset. We measured calibrated IBS (C-IB) and cyclic variation (CV) in the center of the risk area on the third day after reperfusion. C-IB was calculated as: average IBS value of risk area--average IBS value of intraventricular blood. MRI was performed within 3 days after reperfusion. Regional wall motion score index (RWMSI) was calculated as follows: sum of scores (0 - 4) in risk area/number of segments of risk area. We evaluated left ventricular function using RWMSI shortly and one month after reperfusion. RWMSI in the IH group (12 cases) was significantly higher than in the non-IH group (2.3+/-0.5 vs. 1.8+/-0.6: P<0.01) one month later, while RWMSI in both groups was almost the same shortly after reperfusion. The IH group showed a significantly higher value of C-IB than the non-IH group (18.6+/-2.0 vs. 16.0+/-1.4: P<0.01), while there were no significant differences in CV values between two groups. Using 17 as a cutoff value of C-IB, C-IB can detect IH with 92% sensitivity and 91% specificity. Using both CV and C-IB, however, IH can be detected more specifically. Ultrasonic IBS, especially C-IB, discloses intramyocardial hemorrhage in patients with reperfused AMI.
{ "pile_set_name": "Github" }
<?php /** * @todo Rewrite to use Interchange objects */ class HTMLPurifier_Printer_ConfigForm extends HTMLPurifier_Printer { /** * Printers for specific fields. * @type HTMLPurifier_Printer[] */ protected $fields = array(); /** * Documentation URL, can have fragment tagged on end. * @type string */ protected $docURL; /** * Name of form element to stuff config in. * @type string */ protected $name; /** * Whether or not to compress directive names, clipping them off * after a certain amount of letters. False to disable or integer letters * before clipping. * @type bool */ protected $compress = false; /** * @param string $name Form element name for directives to be stuffed into * @param string $doc_url String documentation URL, will have fragment tagged on * @param bool $compress Integer max length before compressing a directive name, set to false to turn off */ public function __construct( $name, $doc_url = null, $compress = false ) { parent::__construct(); $this->docURL = $doc_url; $this->name = $name; $this->compress = $compress; // initialize sub-printers $this->fields[0] = new HTMLPurifier_Printer_ConfigForm_default(); $this->fields[HTMLPurifier_VarParser::BOOL] = new HTMLPurifier_Printer_ConfigForm_bool(); } /** * Sets default column and row size for textareas in sub-printers * @param $cols Integer columns of textarea, null to use default * @param $rows Integer rows of textarea, null to use default */ public function setTextareaDimensions($cols = null, $rows = null) { if ($cols) { $this->fields['default']->cols = $cols; } if ($rows) { $this->fields['default']->rows = $rows; } } /** * Retrieves styling, in case it is not accessible by webserver */ public static function getCSS() { return file_get_contents(HTMLPURIFIER_PREFIX . '/HTMLPurifier/Printer/ConfigForm.css'); } /** * Retrieves JavaScript, in case it is not accessible by webserver */ public static function getJavaScript() { return file_get_contents(HTMLPURIFIER_PREFIX . '/HTMLPurifier/Printer/ConfigForm.js'); } /** * Returns HTML output for a configuration form * @param HTMLPurifier_Config|array $config Configuration object of current form state, or an array * where [0] has an HTML namespace and [1] is being rendered. * @param array|bool $allowed Optional namespace(s) and directives to restrict form to. * @param bool $render_controls * @return string */ public function render($config, $allowed = true, $render_controls = true) { if (is_array($config) && isset($config[0])) { $gen_config = $config[0]; $config = $config[1]; } else { $gen_config = $config; } $this->config = $config; $this->genConfig = $gen_config; $this->prepareGenerator($gen_config); $allowed = HTMLPurifier_Config::getAllowedDirectivesForForm($allowed, $config->def); $all = array(); foreach ($allowed as $key) { list($ns, $directive) = $key; $all[$ns][$directive] = $config->get($ns . '.' . $directive); } $ret = ''; $ret .= $this->start('table', array('class' => 'hp-config')); $ret .= $this->start('thead'); $ret .= $this->start('tr'); $ret .= $this->element('th', 'Directive', array('class' => 'hp-directive')); $ret .= $this->element('th', 'Value', array('class' => 'hp-value')); $ret .= $this->end('tr'); $ret .= $this->end('thead'); foreach ($all as $ns => $directives) { $ret .= $this->renderNamespace($ns, $directives); } if ($render_controls) { $ret .= $this->start('tbody'); $ret .= $this->start('tr'); $ret .= $this->start('td', array('colspan' => 2, 'class' => 'controls')); $ret .= $this->elementEmpty('input', array('type' => 'submit', 'value' => 'Submit')); $ret .= '[<a href="?">Reset</a>]'; $ret .= $this->end('td'); $ret .= $this->end('tr'); $ret .= $this->end('tbody'); } $ret .= $this->end('table'); return $ret; } /** * Renders a single namespace * @param $ns String namespace name * @param array $directives array of directives to values * @return string */ protected function renderNamespace($ns, $directives) { $ret = ''; $ret .= $this->start('tbody', array('class' => 'namespace')); $ret .= $this->start('tr'); $ret .= $this->element('th', $ns, array('colspan' => 2)); $ret .= $this->end('tr'); $ret .= $this->end('tbody'); $ret .= $this->start('tbody'); foreach ($directives as $directive => $value) { $ret .= $this->start('tr'); $ret .= $this->start('th'); if ($this->docURL) { $url = str_replace('%s', urlencode("$ns.$directive"), $this->docURL); $ret .= $this->start('a', array('href' => $url)); } $attr = array('for' => "{$this->name}:$ns.$directive"); // crop directive name if it's too long if (!$this->compress || (strlen($directive) < $this->compress)) { $directive_disp = $directive; } else { $directive_disp = substr($directive, 0, $this->compress - 2) . '...'; $attr['title'] = $directive; } $ret .= $this->element( 'label', $directive_disp, // component printers must create an element with this id $attr ); if ($this->docURL) { $ret .= $this->end('a'); } $ret .= $this->end('th'); $ret .= $this->start('td'); $def = $this->config->def->info["$ns.$directive"]; if (is_int($def)) { $allow_null = $def < 0; $type = abs($def); } else { $type = $def->type; $allow_null = isset($def->allow_null); } if (!isset($this->fields[$type])) { $type = 0; } // default $type_obj = $this->fields[$type]; if ($allow_null) { $type_obj = new HTMLPurifier_Printer_ConfigForm_NullDecorator($type_obj); } $ret .= $type_obj->render($ns, $directive, $value, $this->name, array($this->genConfig, $this->config)); $ret .= $this->end('td'); $ret .= $this->end('tr'); } $ret .= $this->end('tbody'); return $ret; } } /** * Printer decorator for directives that accept null */ class HTMLPurifier_Printer_ConfigForm_NullDecorator extends HTMLPurifier_Printer { /** * Printer being decorated * @type HTMLPurifier_Printer */ protected $obj; /** * @param HTMLPurifier_Printer $obj Printer to decorate */ public function __construct($obj) { parent::__construct(); $this->obj = $obj; } /** * @param string $ns * @param string $directive * @param string $value * @param string $name * @param HTMLPurifier_Config|array $config * @return string */ public function render($ns, $directive, $value, $name, $config) { if (is_array($config) && isset($config[0])) { $gen_config = $config[0]; $config = $config[1]; } else { $gen_config = $config; } $this->prepareGenerator($gen_config); $ret = ''; $ret .= $this->start('label', array('for' => "$name:Null_$ns.$directive")); $ret .= $this->element('span', "$ns.$directive:", array('class' => 'verbose')); $ret .= $this->text(' Null/Disabled'); $ret .= $this->end('label'); $attr = array( 'type' => 'checkbox', 'value' => '1', 'class' => 'null-toggle', 'name' => "$name" . "[Null_$ns.$directive]", 'id' => "$name:Null_$ns.$directive", 'onclick' => "toggleWriteability('$name:$ns.$directive',checked)" // INLINE JAVASCRIPT!!!! ); if ($this->obj instanceof HTMLPurifier_Printer_ConfigForm_bool) { // modify inline javascript slightly $attr['onclick'] = "toggleWriteability('$name:Yes_$ns.$directive',checked);" . "toggleWriteability('$name:No_$ns.$directive',checked)"; } if ($value === null) { $attr['checked'] = 'checked'; } $ret .= $this->elementEmpty('input', $attr); $ret .= $this->text(' or '); $ret .= $this->elementEmpty('br'); $ret .= $this->obj->render($ns, $directive, $value, $name, array($gen_config, $config)); return $ret; } } /** * Swiss-army knife configuration form field printer */ class HTMLPurifier_Printer_ConfigForm_default extends HTMLPurifier_Printer { /** * @type int */ public $cols = 18; /** * @type int */ public $rows = 5; /** * @param string $ns * @param string $directive * @param string $value * @param string $name * @param HTMLPurifier_Config|array $config * @return string */ public function render($ns, $directive, $value, $name, $config) { if (is_array($config) && isset($config[0])) { $gen_config = $config[0]; $config = $config[1]; } else { $gen_config = $config; } $this->prepareGenerator($gen_config); // this should probably be split up a little $ret = ''; $def = $config->def->info["$ns.$directive"]; if (is_int($def)) { $type = abs($def); } else { $type = $def->type; } if (is_array($value)) { switch ($type) { case HTMLPurifier_VarParser::LOOKUP: $array = $value; $value = array(); foreach ($array as $val => $b) { $value[] = $val; } //TODO does this need a break? case HTMLPurifier_VarParser::ALIST: $value = implode(PHP_EOL, $value); break; case HTMLPurifier_VarParser::HASH: $nvalue = ''; foreach ($value as $i => $v) { if (is_array($v)) { // HACK $v = implode(";", $v); } $nvalue .= "$i:$v" . PHP_EOL; } $value = $nvalue; break; default: $value = ''; } } if ($type === HTMLPurifier_VarParser::MIXED) { return 'Not supported'; $value = serialize($value); } $attr = array( 'name' => "$name" . "[$ns.$directive]", 'id' => "$name:$ns.$directive" ); if ($value === null) { $attr['disabled'] = 'disabled'; } if (isset($def->allowed)) { $ret .= $this->start('select', $attr); foreach ($def->allowed as $val => $b) { $attr = array(); if ($value == $val) { $attr['selected'] = 'selected'; } $ret .= $this->element('option', $val, $attr); } $ret .= $this->end('select'); } elseif ($type === HTMLPurifier_VarParser::TEXT || $type === HTMLPurifier_VarParser::ITEXT || $type === HTMLPurifier_VarParser::ALIST || $type === HTMLPurifier_VarParser::HASH || $type === HTMLPurifier_VarParser::LOOKUP) { $attr['cols'] = $this->cols; $attr['rows'] = $this->rows; $ret .= $this->start('textarea', $attr); $ret .= $this->text($value); $ret .= $this->end('textarea'); } else { $attr['value'] = $value; $attr['type'] = 'text'; $ret .= $this->elementEmpty('input', $attr); } return $ret; } } /** * Bool form field printer */ class HTMLPurifier_Printer_ConfigForm_bool extends HTMLPurifier_Printer { /** * @param string $ns * @param string $directive * @param string $value * @param string $name * @param HTMLPurifier_Config|array $config * @return string */ public function render($ns, $directive, $value, $name, $config) { if (is_array($config) && isset($config[0])) { $gen_config = $config[0]; $config = $config[1]; } else { $gen_config = $config; } $this->prepareGenerator($gen_config); $ret = ''; $ret .= $this->start('div', array('id' => "$name:$ns.$directive")); $ret .= $this->start('label', array('for' => "$name:Yes_$ns.$directive")); $ret .= $this->element('span', "$ns.$directive:", array('class' => 'verbose')); $ret .= $this->text(' Yes'); $ret .= $this->end('label'); $attr = array( 'type' => 'radio', 'name' => "$name" . "[$ns.$directive]", 'id' => "$name:Yes_$ns.$directive", 'value' => '1' ); if ($value === true) { $attr['checked'] = 'checked'; } if ($value === null) { $attr['disabled'] = 'disabled'; } $ret .= $this->elementEmpty('input', $attr); $ret .= $this->start('label', array('for' => "$name:No_$ns.$directive")); $ret .= $this->element('span', "$ns.$directive:", array('class' => 'verbose')); $ret .= $this->text(' No'); $ret .= $this->end('label'); $attr = array( 'type' => 'radio', 'name' => "$name" . "[$ns.$directive]", 'id' => "$name:No_$ns.$directive", 'value' => '0' ); if ($value === false) { $attr['checked'] = 'checked'; } if ($value === null) { $attr['disabled'] = 'disabled'; } $ret .= $this->elementEmpty('input', $attr); $ret .= $this->end('div'); return $ret; } } // vim: et sw=4 sts=4
{ "pile_set_name": "Pile-CC" }
Zev Porat Wednesday, September 23, 2015 The Face of Evil - "INTENT TO DECEIVE" When Americans decided they wanted surface over substance, the chains of dependence over the "animating contest of freedom." When they began voting for selfish desires, caring nothing for the survival of the greatest nation on earth, built upon the blood, sweat, tears and deaths of so many courageous men and women. The evil that has befallen America includes atrocities and violence on such a scale that God in His heaven must surely be weeping. The face of evil is a man with an unknown past who deceived an electorate which chose to remain uninformed and irresponsible, cheered on by a complicit media which carefully framed his farcical life narrative. The face of evil smiles a broad smile while his eyes tell a different story. The power of that evil bribes, blackmails and cajoles a Congress replete with self-serving, vain, power-hungry, and corruptible beings to give The Evil One that which he desires by standing against life, no matter how young and helpless the individual. Because The Evil One stands for death, not life - death to the elderly, the infirm, the fetus aborted by an equally evil monster - in the name of "women's rights" and "choice." In his days of more limited influence, The Evil One supported providing no assistance to the most vulnerable among us who were torn from their mothers' wombs in the most violent of ways. Did we not see the warning signs of what was to come? He displayed a pathetic forgery on an official government website to hide his "intent to deceive," then laughed when a few spoke out, knowing that the media he wholly controls would silence them. His puppet-like lackeys provide the cover he needs to fully implement his final plans for the country he hates as a sold-out military looks on in silence. The Evil One negotiates with known enemies, hiding his treasonous work product from a power-hungry Congress nevertheless rendered impotent against his overwhelming treachery. He cleverly hides his sin with precisely-timed photo opportunities which feed his massive, yet damaged, ego. That evil he exudes has placed millions, even billions of the Earth's people in grave danger as he continues to smile while meeting with a supposed ambassador of life, truth, and human rights. The Evil One sought to destroy the most highly-disciplined military in the world by infusing hedonism and removing the God of Jews and Christians from sight. As a faux commander-in-chief, he has persecuted people of faith, demolished morale, and weakened our defenses through social engineering and experimentation. Military chaplains have been barred from their chapels, careers ruined, and reputations besmirched by an agenda driven by a blatant humanism never before seen in the "shining city on a hill," particularly not in the Oval Office which he smirkingly usurps. He violates existing rules and regulations with a facility born of brazenness and hubris. His success has been startling. Rules of Engagement changed in 2009 have killed thousands more than should have died. He jails those with the courage and conscience to speak out while allowing criminals to go free. His self-important agenda throws away laws he doesn't like and creates new ones with the stroke of a pen. When he finds it necessary, he uses his phone to obtain his desired objective. If his pen and phone prove inadequate, there is the surveillance which has thus far proven so very effective in controlling those who should be in control. Not only those in the military, but lay persons, too, have lost their ability to provide for their families as a result of his steamrolling of faith in the public square, exposing the blatant lie he told during his "meteoric rise" in politics. His "Green" agenda stole money from millions of struggling Americans and placed it in the hands of cronies. He shut down entire industries and seized private companies as his evil prevented anyone from seeking or obtaining justice. The evil he imposes indoctrinates our children, polluting their minds and souls in the name of inclusion and diversity. It replaces parents with government. It seeks to strip any identity of Americanism and replace it with global citizenship. The evil teaches that alternative lifestyles, debauchery and perversion are acceptable and even encouraged by his surrogates. The extent of the evil is such that the same fighting force which liberated Europe, saving thousands of lives by purging a megalomaniac so that peace could reign once again, now instructs its men to turn a deaf ear to the abuse of young boys crying out within its own barracks. As the Congress dithers, a new megalomaniac has taken the place of he who was defeated in 1945. And we seem to have lost the will and the courage to stop him. For he is not yet done with the United States of America. He knowingly imports unvetted strangers into the country, some of whom wish to kill the very people to whom he promised "hope and change" a short seven years ago. He destroys our national security with his agenda of punishing indigenous Americans who, unlike him, were born and raised here. Through cunning coercion, he allows those carrying diseases, weapons, and plans to inflict harm and death upon us to flow in unabated, all in the name of "the children." He welcomes the Unknowns for their likeness to him: a man claiming, demanding to be an American when he knows he is not. He who has championed "civil rights" and the end of slavery in America sits and watches as thousands are burned alive, crucified, tortured, enslaved, buried alive, and displaced in a conflagration of his own making. His plan to Islamize Europe and the entire Western world is well under way. The rogue nation to which he has sold our security and future has killed thousands of Americans and continues to intone "Death to America." 1 comment: Outstanding article Sharon. You have beautifully expressed what so many of us are watching happen in our nation once blessed so greatly by God. One of the hardest realities I've had to accept is how many Americans there are that were willing to lie and cover up to get Barry in office and keep him there. Add to that a worthless congress that has refused to push back against his lawlessness and a fawning media. He has been more destructive than any outside enemy could have been. His hatred towards the good in America isn't the least bit subtle. Instead, he supports a false belief system that teaches the killing or subjugation of anyone that doesn't believe in allah. I have looked at his fruits and couldn't find a single one that wasn't decayed and seriously blemished. I wholeheartedly agree with you that the man of chaos is smiling at his hand in the destruction of America.
{ "pile_set_name": "Pile-CC" }
Monday, February 13, 2012 Rachel Uchitel to pose for Playboy? #celebrities It seems that Tiger Woods mistress Rachel Uchitel has decided to parlay her new found popularity into a deal with Playboy. It was just last week that Uchitel accused other some other Tiger skanks of “using their notoriety in an attempt to cash in”. So I guess you can say this is uh, a bit hypocritical. It seems that Tiger Woods mistress Rachel Uchitel has decided to parlay her new found popularity into a deal with Playboy. It was just last week that Uchitel accused other some other Tiger skanks of “using their notoriety in an attempt to cash in”. So I guess you can say this is uh, a bit hypocritical. Rachel hedged when we asked her about a Playboy offer on TMZ Live on Friday — but we found out that Tiger Woods’ #1 mistress has already struck an agreement. A source close to the mag tells us Rachel has the right to pull out any time before the shoot goes down — which is in three weeks. I’m dying to hear what porn star Joslyn James has to say about this new development. I’m sure it will involve a press conference, crying, Gloria Allred, some DDs, and an intense double penetration scene.
{ "pile_set_name": "StackExchange" }
Q: lockNow() in broadcast receiver it seems that i get an error when i try to use LockNow() in the broadcast receiver. can anyone help me. public class Onlockreceive extends BroadcastReceiver { LockSettings lockactivity; @Override public void onReceive(Context context, Intent intent) { // TODO Auto-generated method stub lockactivity.mdevicepolicymanager.lockNow(); } } The error message : 12-31 03:14:16.322: D/AndroidRuntime(27478): Shutting down VM 12-31 03:14:16.322: W/dalvikvm(27478): threadid=1: thread exiting with uncaught exception (group=0x41b0d378) 12-31 03:14:16.332: E/AndroidRuntime(27478): FATAL EXCEPTION: main 12-31 03:14:16.332: E/AndroidRuntime(27478): java.lang.RuntimeException: Unable to start receiver com.example.settings2.Onlockreceive: java.lang.NullPointerException 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.app.ActivityThread.handleReceiver(ActivityThread.java:2257) 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.app.ActivityThread.access$1500(ActivityThread.java:138) 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1283) 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.os.Handler.dispatchMessage(Handler.java:99) 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.os.Looper.loop(Looper.java:213) 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.app.ActivityThread.main(ActivityThread.java:4787) 12-31 03:14:16.332: E/AndroidRuntime(27478): at java.lang.reflect.Method.invokeNative(Native Method) 12-31 03:14:16.332: E/AndroidRuntime(27478): at java.lang.reflect.Method.invoke(Method.java:511) 12-31 03:14:16.332: E/AndroidRuntime(27478): at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:789) 12-31 03:14:16.332: E/AndroidRuntime(27478): at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:556) 12-31 03:14:16.332: E/AndroidRuntime(27478): at dalvik.system.NativeStart.main(Native Method) 12-31 03:14:16.332: E/AndroidRuntime(27478): Caused by: java.lang.NullPointerException 12-31 03:14:16.332: E/AndroidRuntime(27478): at com.example.settings2.Onlockreceive.onReceive(Onlockreceive.java:15) 12-31 03:14:16.332: E/AndroidRuntime(27478): at android.app.ActivityThread.handleReceiver(ActivityThread.java:2250) 12-31 03:14:16.332: E/AndroidRuntime(27478): ... 10 more My problem is similar to this one same problem.. but i don't understand how to fix it this is the code i use to call the broadcast receiver private void setupAlarm(int seconds,boolean s) { // Finish the currently running activity // MainActivity.this.finish(); AlarmManager alarmManager = (AlarmManager) getSystemService(ALARM_SERVICE); Intent intent = new Intent(getBaseContext(), Onlockreceive.class); PendingIntent pendingIntent = PendingIntent.getBroadcast( LockSettings.this, 0, intent, PendingIntent.FLAG_UPDATE_CURRENT); Log.d(TAG, "Setup the alarm"); // Getting current time and add the seconds in it Calendar cal = Calendar.getInstance(); cal.add(Calendar.SECOND, seconds); if (s == true){ //alarmManager.set(AlarmManager.RTC_WAKEUP, cal.getTimeInMillis(), pendingIntent); //alarmManager.setInexactRepeating(type, triggerAtMillis, intervalMillis, operation) alarmManager.setRepeating(AlarmManager.RTC_WAKEUP, cal.getTimeInMillis(), 5000, pendingIntent ); }else if (s == false) { alarmManager.cancel(pendingIntent); } } A: Either lockactivity or mdevicepolicymanager is null. This is not surprising, as your process may well have been terminated before the BroadcastReceiver got control. Static data members are only a cache. Do not rely upon them. And most certainly do not put an Activity in a static data member, as you are leaking a lot of memory by doing so. You can use the Context passed into onReceive() to retrieve a DevicePolicyManager and call lockNow(). UPDATE Here is the revised class, complete with better formatting and case: public class OnLockReceive extends BroadcastReceiver { @Override public void onReceive(Context context, Intent intent) { ((DevicePolicyManager)context.getSystemService(Context.DEVICE_POLICY_SERVICE)).lockNow(); } }
{ "pile_set_name": "PubMed Abstracts" }
Preparation of biodegradable nanoparticles of tri-block PLA-PEG-PLA copolymer and determination of factors controlling the particle size using artificial neural network. The purpose of this study was to prepare nanoparticles made of tri-block poly(lactide)-poly(ethylene glycol)-poly (lactide) (PLA-PEG-PLA) with controlled size as drug carrier. Artificial neural networks (ANNs) were used to identify factors which influence particle size. In this way, PLA-PEG-PLA was synthesized and was made into nanoparticles by nanoprecipitation under different conditions. The copolymer and the resulting nanoparticles were characterized by various techniques such as proton nuclear magnetic resonance spectroscopy, Fourier transform infrared spectroscopy, gel permeation chromatography, photon correlation spectroscopy and scanning electron microscopy. The developed model was assessed and found to be of high quality. The model was then used to survey the effects of processing factors including polymer concentration, amount of drug, solvent ratio and mixing rate on particle size of polymeric nanoparticles. It was observed that polymer concentration is the most affecting parameter on nanoparticle size distribution. The results demonstrate the potential of ANNs in modelling and identification of critical parameters effective on final particle size.
{ "pile_set_name": "NIH ExPorter" }
There is a critical need to understand the fundamental antioxidant properties of heat shock proteins (HSPs) in skeletal muscle and establish novel HSP therapies for preventing insulin resistance. The long-term goal is to elucidate the mechanisms of muscle insulin resistance that lead to increased prevalence of type 2 diabetes with advancing age. The objective of this particular application is to determine the extent to which increased HSP expression can modulate stress kinase and insulin signaling pathways in skeletal muscle. Our central hypothesis is that increased expression of HSP72 and HSP25 will decrease stress kinase activation and improve insulin signaling. Our rationale for the proposed research is that new strategies could be developed to modulate HSP-dependent pathways as a therapeutic approach to treat insulin resistance. Guided by strong preliminary data, this hypothesis will be tested by pursuing three specific aims: 1) Identify HSP-dependent mechanisms that function to improve skeletal muscle insulin signaling;2) Identify signaling pathways that modulate HSP expression in insulin-resistant skeletal muscle;and 3) Identify therapeutic interventions to improve HSP activation and insulin signaling in aged skeletal muscle. In Specific Aim 1, we will determine whether increased expression of HSP72 and HSP25 inhibit the stress kinases c-jun terminal kinase (JNK) and inhibitor of kappa B kinase 2 (IKK2), respectively, and improve insulin signaling in young (6- and 12-month-old) and aged (18- and 24-month-old) Fischer 344 rats. We will use both heat treatment and specific overexpression of HSPs via plasmid transfection to accomplish this aim. In Specific Aim 2, we will determine the extent to which glycogen synthase kinase-3 (GSK-3) and JNK signaling pathways modulate HSP expression in insulin-resistant skeletal muscle. Pharmacolgocial inhibitors of GSK-3 and JNK will be used to modify activation of the primary HSP transcription factor, heat shock factor 1 (HSF-1). In Specific Aim 3, we will examine the ability of exercise training to increase the HSP response in young and aged, insulin-resistant skeletal muscle. Our working hypothesis is that exercise training will trigger the HSP response through a pathway independent of heat treatment, and that heat stress and exercise will result in an additive improvement of insulin signaling and glucose uptake in aged, insulin-resistant skeletal muscle. As an outcome of the proposed aims, we expect to establish a novel therapeutic role for HSPs in combating insulin resistance and identify molecular mechanisms that regulate HSP expression in aged, insulin-resistant skeletal muscle. This project is innovative, because it is designed to identify a previously unexplored mechanism for improving insulin resistance via increased expression of HSPs in skeletal muscle. The proposed research is significant because it will help to establish important new candidate targets for prevention of insulin resistance as well as enhance our understanding of the decline in cellular defenses that occurs with age and disease. PUBLIC HEALTH RELEVANCE: At the completion of these studies, we expect to increase our understanding of the fundamental antioxidant properties of heat shock proteins in skeletal muscle and to identify the heat shock protein-dependent mechanisms underlying the protective effect of heat treatment on insulin action. Such results would have an important positive impact on public health by identifying new targets for therapeutic interventions that will aid the growing number of elderly persons in the U.S. at risk for developing insulin resistance and type 2 diabetes.
{ "pile_set_name": "StackExchange" }
Q: C Unexpected string returned from function behaviour I am quite new to C and I am playing with some string operations. I have encountered quite a strange problem for me while returning a string from a function. My simple program is as follows: int main(int argc, char* argv[]) { char text[] = "abAB"; char* out = testString(text); printf("Result Text: %s", out); printf("\n"); } char* testString(char* input) { char* text = copyString(input); return text; } The copyString function defines a simple operation to copy one string to another. It is as follows: char* copyString(char* input) { char output[100]; int index = 0; while (input[index] != '\0') { output[index] = input[index]; index++; } output[index] = '\0'; return output; } The problem is that while I am debugging the application, the string I am returning from a function seems to be OK (Visual Studio visualises it well enough) and when the printf line occurs, the string outputted on the stdout is something completely strange and unfamiliar - a smily face. Sadly, I can't post images yet in order to show you what I see in my console as output. I am using Visual C++ Express 2010 as an IDE if this could be helpful. A: You are returning a variable declared within a function, which will cease to exist outside the scope in which it is declared. Use a dynamically allocated char array and then return a pointer to it. char* output = malloc(100 * sizeof(char)); ... return output ; Note : You are assuming that input string is less than 100 characters. Instead of that, try passing the length of string as a parameter or use strlen. Your program will crash if input string has more than 99 characters. Also as noted in comments, free the memory allocated when you are done using it.
{ "pile_set_name": "Pile-CC" }
"Considered by many to be a sure-fire first round pick after his junior season, Te'o surprised many when he decided to put the NFL on hold and return to the Irish for the 2012 season. After leading Notre Dame in tackles the past two seasons, he is poised for another banner year as a senior and has a chance to make his mark in the Fighting Irish record books. Te'o was widely considered the top linebacker recruit out of high school in 2008 and the top defensive prospect by many, choosing Notre Dame over USC and several other top programs. He worked his way into the starting line-up as a true freshman and started nine games, finishing fourth on the team in tackles with 63 stops. Te'o emerged as a defensive leader in 2010 as a sophomore, leading the team with a career-best 133 tackles. He again led the Irish defense in tackles in 2011 as a junior with 128 stops, adding 13.5 tackles for loss and 5.0 sacks and earning All-American honors." Analysis: "Te'o is an intense competitor and covers a lot of ground with his rangy, active playing style and lateral agility to cover both sidelines. He trusts his eyes and attacks the action quickly, showing a high football IQ to play smart, assignment football. Te'o needs to tighten his angles in space and get stronger at the point of attack to consistently finish once he gets his hands on the ballcarrier. He is a smooth, thickly-built athlete and his ability to quickly diagnose the play is why he projects as a starter at the next level." I wanted to create a thread strictly for Manti Te'o. There is some indecision on the board about his NFL future and whether or not he would be a good fit on the Cincinnati Bengals. Figured we could air out everyones own personal analysis of Te'o and why you would or would not want him on our team. WE WOULD DRAFT BETWEEN 8-12! (Thanks HammerStripes) I voted YES! I think Te'o would be a phenomenal pick up for us and worthy of our first pick in the 2013 NFL Draft. His leadership skills and overall talent and abilities speek for themselves He is the best at his position in the draft class. Leadership goes a long way in the NFL. He can cover in the passing attack and can stuff holes in the running attack. He is a sure tackler; once he gets to you, hes not letting you get by him. Very good instincts that get him to the ball. Makes the propers adjustments throughout the game (showed that against Pittsburgh this last weekend). He is an all-around solid prospect. It is hard to find any flaws in his play. He is praised by his coaches and his teammates as one of the most sincere guys in the locker room. I would be upset if he were on the board and we passed on him. He would be a great addition to this team and would make not only our defesne better, but the whole team as well. I voted yes simply because I believe Jones would be gone before we pick. If he were available, Jones in a heartbeat. The only other MLB that I would even want besides Te'o is Ogletree, but he still may stay in college. Te'o has the leadership that we desperately need. I think Burfict could use a motivator like Te'o to boost his game even more. If we get neither Te'o nor Ogletree, I'd prefer to then move Burfict back to MLB and draft a WILL 1.) Leadership. Te'o gives you that. He would be the much needed QB on defense and a significant player in the lockerroom. We all know that the Bengals culture is probably the worst in the league. A guy like Te'o can help change the culture. 2). Playmaking - Te'o has a nose for the ball. He makes things happen. In essence, he is the anti-Maulaluga. He could be a Polumalu type player at the LB position. Give me Barret Jones at the top of round 2 (or trade up to the end of 1) to get him and the best RB, S or WR available with the second pick in the 2nd and I am a happy man. Last week, Te'o looked timid and afraid, which the last thing that we need on our team is another Rey. He also looked horrible guarding the tight end, which is a huge red flag for any backer that plays in our division, especially for us. Ogletree is an option but I think he would end up playing SAM for us because, even though he says he likes playing outside, where I think he's a stud, I think we should put Burfict at MIKE. I'm also not a fan of Ogletree's failed drug test. CJ Mosley is a stud that I'd like to see at SAM. __________________. Just in case Fred ever asks me to post where I've ever proven him wrong because he seems to have no memory of it, even though he has made me do it multiple times, here are four examples. I'm kind of thinking with the way the board falls that a WR might be the the area offering the best value. It's not my preference, but that's where i see the value at. There could be the top receiver in the whole draft sitting there between 10-15. I think Te'o is a good option, but Im afraid he is a little over valued. He is a significant upgrade over Maulaluga but he is locked into the MLB role from what I've seen. Assuming we are picking between 12-20 and I've got a choice between Te'o and Ogletree Id look at Burfict's future and decide which to draft. Ogletree is more athletic than Te'o which I think will be proven at the combine. All in alll Im a biased UGA fan but I like Ogletree better with our current scheme because I can see him as an OLB in our system as well. I think Te'o is a good option, but Im afraid he is a little over valued. He is a significant upgrade over Maulaluga but he is locked into the MLB role from what I've seen. Assuming we are picking between 12-20 and I've got a choice between Te'o and Ogletree Id look at Burfict's future and decide which to draft. Ogletree is more athletic than Te'o which I think will be proven at the combine. All in alll Im a biased UGA fan but I like Ogletree better with our current scheme because I can see him as an OLB in our system as well. I like Te'o too, Im just not sure he is right for our current system given our personnel. I think he would be a great MIKE LB for us but with Burfict Im not sure that I wouldn't rather look at Ogletree from UGA who I think is more athletic and looks much better in coverage The guy was being considered for the Heisman. This crowd's a bit rough on the best ILB in college football. Quote: Originally Posted by BengalHawk62 agreed and he's still in the top five for voting. Great college player on a team who is undefeated. Only reason he is up there for the Heisman. The guy has been a non-factor more often than you expect a Heisman finalist to be. If he was on any other team he wouldn't be up there but for some reason most CFB guys have some sort of nostalgia with Notre Dame
{ "pile_set_name": "PubMed Abstracts" }
[Effect of enhanced UV-B radiation on competition among several plant species]. The effect of enhanced UV-B radiation (280-315 nm, approximating a 15% ozone layer reduction) on competitive interaction between spring wheat (Triticum aestivum) and wild oat (Avena fatua) was examined in the field. The density-dependent mortality of both wheat and wild oat did not exhibit a significant difference between control and UV-B treatments. A relatively high degree of competitive stress enhanced the effect of UV-B stress on biomass reduction. Under UV-B enhancement, the relative competitive status of wheat in terms of total biomass and aboveground biomass increased, but decreased when based upon grain production. Shifts in competitive balance occurred with significant changes in total biomass, especially when plants grew at higher densities in monocultures and mixtures. There were different effects in direction and intensity of UV-B radiation on competition balance of the other three species pairs, but in general, the effect of UV-B was in favor of monocotyledonous. The results implied that total degree of competitive stress, especially interspecific competition, might be crucial to assess the effect of UV-B enhancement on agriculture ecosystem properly.
{ "pile_set_name": "Pile-CC" }
Business Apr 24, 2013 | 02:44 Co-operatives cash in on austerity April 24 - As much of western Europe still grapples with austerity and weak economic growth, the co-operative economy is proving remarkably resilient sparking a revival of employee owned businesses. Hayley Platt visits UK-based Delta T whose turnover has doubled in the last five years. TRANSCRIPT + Workers at Delta T discuss the latest sales figures. They have a vested interest in them - they all own the British company. The scientific instrument maker is one of a growing number of co-operatives in Europe. Austerity is fuelling their popularity and helping them grow despite a weak economy. Delta T's soil moisture reading devices have helped double its turnover in the last five years. Chris Nicholl is Chairman of its management committee. SOUNDBITE: Chris Nicholl, chair of management committee, Delta T, saying (English): "We have made very good investment decisions together and that we have been continually reinvesting the profits we've made rather than those being paid out to shareholders or to a CEO." In 2010 there were 160,000 co-operatives in Europe - employing 5.4 million people. And Britain has seen a 20 percent increase in the past five years. Many well known products are made by co-operatives. Nearly all French champagne is produced by them, as is Danish bacon, exported to over 100 countries. And 90% of Italy's Parmesan cheese. A quarter of Germany's banking sector is also co-operatively run. As is Barcelona Football Club. Ed Mayo, from Co-operatives UK, says Europe's economies would be more productive if more companies adopted the model. SOUNDBITE: Ed Mayo, Secretary General, Co-operatives UK, saying (English): "There is no greater power to motivate people to a business end then having a share in the benefits that come from creating that value. We are a country and an economy for example with very high levels of staff disengagement, people are really not motivated to work there. We know that engaging staff through giving them an ownership stake, a say in the enterprise is a fabulous way of motivating staff." That's certainly the case at Delta T. SOUNDBITE: Stephen Williams, Head of Technical support, Delta T, saying (English): "Everyone's listened to, everyone's respected and you feel like an equal, it doesn't feel like a typical, you know boss at the top telling everyone what to do." SOUNDBITE: Lynnette Caicco, Manufacturing Co-ordinator, Delta T, saying (English): "In the past when I worked in restaurants, I worked very hard but the bottom line was so money, money money money and I was of course exploited. The owners were all living better than I was." John Lewis is one of the best known co-operatives. It's also one of the few major homewear and fashion retailers in Britain doing well - staff recently got a 17% bonus. Finding growth like that is key to Europe's recovery. SPONSOREDSTORIES Reuters is the news and media division of Thomson Reuters. Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. *All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.
{ "pile_set_name": "PubMed Abstracts" }
Speciation/fractionation of nickel in airborne particulate matter: improvements in the Zatka sequential leaching procedure. Modifications are reported to the sequential leaching analytical method for nickel speciation/fractionation specified by Zatka so that larger sample masses can be analyzed. Improvements have been made in the completeness of the sulfide/metallic separation during the peroxide-citrate leach step by use of a larger volume of leachant, a longer leach duration and an orbital shaker. Minimal extraction of metallic nickel in this prolonged sulfidic nickel extraction has been confirmed. An increase in the number of samples analyzed simultaneously using these modifications has resulted in substantial productivity improvements and concomitant lower costs. It is critical for practitioners of sequential leaching techniques to recognize potential limitations and to use professional judgment when interpreting results. For example, results obtained may not be biologically relevant in assessing health risks; the acts of sampling and storage may result in changes in fractionation with time; surface coatings/films may alter the ability of a leachant to react with the target compound; and leaching behaviours may be different for samples differing only in particle size distributions.
{ "pile_set_name": "Pile-CC" }
Search Nawany: A sensitive Karamojong There is a feeling of revolution you experience as you watch Francis Manana, Milege Afro Band’s lead guitarist, invite Nawany, traditional singer, dancer and poet, to the stage. It is a quietly burning sense of revolution, and soon you start hoping that this is what Uganda has become: That even the middle class, in the exclusive Serena Hotel conference hall, would enjoy being entertained by the same people termed as backward, disagreeable and previously charged an ethnic group with the disparaging statement that: Karamojongs will never develop! Written by Serubiri Moses In other words, Ugandans in general think of the Karamojong people as savages. The word savage was used in pre-colonial era to describe the inhabitants of the so-called “Dark Continent” of Africa—but to this day the word can, in some parts of the world, be used. Nawany on stage with Milege Band, Kampala 2012 The girl, Nawany, the center piece of the entire concert, was referred to as a poet and a singer. I quickly recalled listening to a professed expert in Ugandan ethnic music say that the Karamojong do not sing. However, when they go through death and are forced to leave the place in which death has occurred, as is their practice, they gather together and jump in synchronized rhythms. He said this exaggerates the height of their spring above the ground; adding supplementarily that while they jump, they also make strange throaty noises. Later, I found out later that the Karamojong (cousins to the Masaai in Kenya) have a strong musical tradition of chanting which echoes specific periods of early European classical music, such as the motets. To hear of and watch a culture of Karamojong people, is beyond any feeling of patriotism one came imagine; but a more base, basic instinct of brotherhood. The Karamojong also have a rich culture of poetry, an art which is perhaps always deemed intellectual. Poetry It dawned on several people during the show, in moments where Francis Manana recited Karamojong poetry, that the Karamojong indeed are intellectual. The poetry had a hypnotizing impact, in this way stunning and brilliant, mostly because it was unheard of; unlike the well-known poetry tradition of Ankole, Kyevugo, in which the poet (most often male) recites unbroken lines of memorized verse which can stretch up to 40 minutes of recitation. Milege Band on stage, Kampala 2012 “It must be tragic for a sensitive Negro to be an artist,” said Bernard Shaw, a London publisher to Claude McKay, a black novelist of the Harlem Renaissance looking to publish his book of poems in London; to which McKay responded with, “He is right! Some of the English reviews of my book touched the very bottom of journalistic muck,” referring to the negative remarks based on racial prejudice. In close allusion to this anecdote, I must ask myself and others whether we are willing to review the work of Milege’s collaboration with Nawany and the band’s foray into the music of Karamojong, without the bias “Karamojongs are backward” prejudice we hear against those people. Pickaninnies The Karamojong can be seen on Kampala streets begging, year after year after year. The picture of those little children with stretched out palms under the glaring midday sun reminds me of coming across the word “pickaninnies” in an anthology of African-American poetry that I downloaded from the internet several years ago in the writings of Paul Lawrence Dunbar and Claude McKay. Both poems written in the patois English of their homeland Jamaica; before moving to study in America. The word pickaninny is a derogatory term for little black children, derived from the pequenino, meaning “little” in Portuguese, and primarily used to name caricatures for the entertainment purposes of colonial white audiences. Along with clowns in black face and the black maid in a cinema film, these were the only accepted representations of black people in Europe and America in the late 19th century. Are these little pickaninnies of Kampala road simply entertainment? Have we grown so fond of looking at those little black babies who think their life on the street is trivial? Nawany on stage with Milege Band, Kampala 2012 With this mindset how could the audience fully appreciate the vast talents and gifts of Nawany; a rattling earthy singer and performer with perfect timing and gently subtle changes in tone at time when she wanted humor in her lyrics. How well she blended with the Milege band, even as they kept playing behind her in a militarily Western 4 beats to the bar. She gracefully leaped up in flights of beautiful melody and poetry, accompanied by her group of singers, both dancing and chanting, with joy. Revolution It was the same feeling I got when looking at the crowd of Acholis at the Silent Voices show at the National Theatre. The increasing fondness with which I looked at them, developing from watching Judith Adong’s play, a real kinship with them. “For better or worse, every person in Russia is vitally affected by the revolution. No one but a soulless body can live there without being stirred to the depths by it.” Both Judith Adong and Francis Manana speak mechanically and philosophically about their art projects. Especially since they had the impact the artists had assumed the work would have. That it would leave the audience fiercely impassioned about the state of people in Northern Uganda, and would not rise in to rest until change had come to fruition; until they had seen and witnessed transformation. Nothing was more patriotic than hearing a patron after Judith’s play say earnestly, in the discussion on peace reconciliation after the show, what can we do to change this? I have seen the play more than two times, and each time I have come to the same realization: What can be done to change this situation? Bridging the gap Had this been Russia, every person in this country would be swept up into a passionate state and urgently talked about change. This is the power of communism. This (power) is Lenin signaling in 1917, for the oppressed of the world to unite against private capitalism. That is to bridge the growing class and tribal divisions which engineer much of the structures that keep Karamojong as beggars on the street and Banyankole in Parliament. I wonder if this crossed Francis Manana’s mind as he carried out a systematic ethno-musical research in Karamoja. I wonder whether he was aware or not of the divide between us. I wonder if he systematically wanted to breakdown these barriers. I wonder if he was using this ethnic music as propaganda to charge up Ugandans with the desire to integrate and destroy barriers of culture, race, tribe and class. Kinobe, a musician schooled by African maestros like kora master Toumani Diabete, surprised the audience (majority of whom were foreigners) and warmed them with his virtuosity. A dutch acquaintance mentioned to me that Konibe stood out for him, and I immediately suspected that it was because of his virtuosity. Music is simply much more than virtuosity, I thought to myself. I thought about those who gazed with amazement and wonder as these uncivilized beggars performed remarkably complex poetry and music up on the stage. Throughout the show I got the feeling that this distance between the audience and the performers was being bridged. A culture was being born that provoked the beauty of Karamoja, like never before, living up to the show’s motto of “Repainting Uganda” which itself can be alluded to themes of Russia’s Lenin and Bolshev. Through the systematic collection and display of culture, the Milege band managed to create an integrated multiculturally diverse experience for both foreigners and native Ugandans. It beckoned to the feeling that music is truly the space of multiculturalism, that does not have neither race, class nor tribe as guide posts. Nawany is a representation of that multiculturally integrated Uganda to come. The 3rd "Repainting Uganda" at Serena Hotel, Kampala 2012. Serubiri Moses has been published in The New Vision reviewing live music. As a poet, he is featured on the pan African website, Badilisha Poetry Exchange. 1 thought on “Nawany: A sensitive Karamojong” About SJ SJ aims to provide a community for people working and interested in visual arts and photography, poetry, fashion, animation, design, architecture, dance, theater, film and music. SJ encourages high-quality art journalism and independent reporting by art journalists, which SJ believes is key in the development of a critical society. Together we build the creative industry to become a viable economic sector for East Africa.
{ "pile_set_name": "PubMed Abstracts" }
Conjugation and hybrid MR imaging. To evaluate the use of conjugation with hybrid magnetic resonance imaging techniques in order to reduce artifacts from inconsistencies introduced by T2 decay. Two phantoms containing either oil or water were used to study edge spread function (ESF) and signal-to-noise ratio (S/N) for three hybrid acquisition strategies (low pass, high pass, and ramp) in which a full set was acquired or with partial acquisition and conjugation. With half the echoes providing coverage of the same amount of k space, signal inconsistencies were reduced by a factor of at least e. Conjugation improved ESF degradation, and sequence efficiency increased by over 50%, which compensated for a loss in S/N. The time saved with conjugation can be used to nearly double the number of sections acquired for a given repetition time (TR) or to obtain two simultaneous echoes instead of one, with reduction of artifacts. Alternatively, the imaging time can be nearly halved for a given TR and number of sections.
{ "pile_set_name": "PubMed Abstracts" }
Analytical potential energy functions and spectroscopic properties for the ground and low-lying excited states of KRb. The potential energy curves (PECs) of the ground state X(1)Σ(+) and two low-lying excited states 1(3)Σ(+) and 1(3)П of KRb molecule have been calculated using the multireference configuration interaction method and the effective core potential basis set. The PECs are fitted into analytical potential energy functions (APEFs) using the Morse long-range potential. The spectroscopic parameters for the states are determined using the analytical derivatives of APEFs. The vibrational energy levels have been calculated by solving the radial Schrödinger equation of nuclear motion based on the APEFs, and compared with the theoretical and experimental works available at present.
{ "pile_set_name": "Github" }
AFRAME.registerComponent('isvr-photosphere-title-listener', { init: function () { var self = this; this.el.addEventListener('click', function() { this.setAttribute('visible', false); this.setAttribute('data-shown', 'true'); /* workaround because of interference with menu */ this.setAttribute('position', { x: 0, y: 10, z: -2.1 }); }); } });
{ "pile_set_name": "Pile-CC" }
LAS VEGAS — Jerry Lewis said Saturday that his years of service to the Muscular Dystrophy Association helped make him a star, but he didn’t provide details on his recent departure as the group’s national chairman. In his first public appearance since the breakup, Lewis accepted a lifetime achievement award from the Nevada Broadcasters Association, saying that he made his reputation in show business by saving lives. “I made my reputation in this business caring for what I did,” said Lewis, who donned a red foam clown nose at one point during his speech in front of politicians and other entertainers. “For someone who has an ego like I have, humility doesn’t come that easy.” Lewis hinted during his brief speech that he could not explain why he is no longer the national chairman of the MDA after 45 years. He will also no longer host the group’s annual Labor Day weekend telethon. Lewis said he was humbled to hear several congressmen and Nevada Gov. Brian Sandoval describe watching Lewis host the MDA’s annual Labor Day weekend telethon every year throughout their childhoods. “It was as meaningful tonight as ever,” the 85-year-old said of the recognition. “And I don’t think I can go into the why of that.” Lewis appeared briefly at the dinner, entering just before his tribute and leaving the room minutes after making his speech. He declined to speak to reporters as he left the event. MDA officials announced earlier this month that Lewis would no longer be the public face of the Tucson, Ariz.-based association without offering any explanation. When pressed by a reporter at the time about his role with the telethon, Lewis said: “It’s none of your business.” Lewis has said he would hold a press conference the day after the telethon to clarify his plans. “I will have plenty to say about what I think is important. And that’s the future, not the past,” he has said. The MDA announced major changes to its telethon Thursday, including slashing it down from a nearly 22-hour show to six hours of prime time television in an effort to boost audience numbers and raise more money. The Sept. 4 show will be co-hosted by “American Idol” executive producer Nigel Lythgoe, “Entertainment Tonight” anchor Nancy O’Dell, “The Biggest Loser” host Alison Sweeney, and journalist and TV producer Jann Carl.
{ "pile_set_name": "Github" }
/* Copyright 2015 The TensorFlow Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ==============================================================================*/ #include "tensorflow/core/kernels/cwise_ops_common.h" namespace tensorflow { REGISTER5(UnaryOp, CPU, "Cos", functor::cos, float, Eigen::half, double, complex64, complex128); #if GOOGLE_CUDA REGISTER3(UnaryOp, GPU, "Cos", functor::cos, float, Eigen::half, double); #endif } // namespace tensorflow
{ "pile_set_name": "Pile-CC" }
Kernel-Mode Databases Source Code Accompanies This Article. Download It Now. Sample Application To illustrate, the sample application we present here implements a basic access-control system, using eXtremeDB-KM to create and maintain the access-control database in the kernel space. The database maintains file-access rules, and the runtime provides drivers and user-level applications with high-performance access to the storage. The example code uses UNIX-like notations. The "filter" or kernel module that intercepts filesystem calls and provides a file access authorization mechanism to the system. The database kernel module implements kernel-mode data storage and provides the API to manipulate the data. The module is integrated with the eXtremeDB database runtime, which is responsible for providing "standard" database functionality such as transaction control, data access coordination and locking, lookup algorithms, and the like. Example 1 presents the data layout using eXtremeDB Data Definition Language syntax. Figure 2: Sample app components. The class File describes a file object that is identified by the file's name, and the inode and device on which it is located. The rest of the fields (owner, defaccess, and aclvector) define file-access rules. The database maintains two hash-based indices that facilitate fast data access. Because the database could grow large, the database pool is allocated in virtual memory. To use the allocated memory pool, it is mapped to the physical page (Examples 2 and 3). Once memory is allocated, the in-memory database is created and supports connections using standard database runtime functions. The module exports two types of interface: the "direct" API available to other kernel modules and drivers, and the "indirect" API that implements eXtremeDB-KM's ioctl interface to the database module. The direct API is not available for user-mode processes, but is efficient because it maintains only kernel-space references and eliminates expensive (in performance terms) translations from kernel-address space to user-address space. The ioctl interface provides user-mode applications with access to the kernel-mode database. To facilitate the implementation of the "indirect" system call API, eXtremeDB-KM provides a simple "interface compiler" utility. This utility is similar to that of a standard remote procedure call compiler, except it generates the user/kernel mode interface files instead of remote access stubs. Developers define the API for C functions that the user-mode applications use to access the kernel-mode database. The eXtremeDB-KM interface compiler generates interface files that implement the user-to-kernel-mode interface through the generic ioctl function. In particular, the interface compiler generates stub files that should be linked with the user-mode applications and the kernel-mode stubs that are included into the kernel module (Figure 3). The generated files encapsulate the user-to-kernel-mode transition and hide ioctl-based implementation details from kernel modules and user-mode applications. Figure 3: eXtremeDB-KM interface compiler. In contrast to other IDL implementations, the eXtremeDB-KM interface compiler accepts standard C header files to declare user-mode database access interfaces. The compiler recognizes a number of keywords in the form of comments to declare string, union, and array data types used as a part of the interface declaration. The IDL in Example 4 illustrates the concept. The interface compiler approach simplifies access to databases created in the context of a kernel module. The user-mode application code that implements database access is almost undistinguishable from that used by the kernel-mode application, with the exception of a simple initialization step (Example 5). There is no need for the user-mode application to serialize/deserialize function parameters, and similar technicalities. The application only needs to define and implement its database access interface, regardless of whether the interface is used inside or outside the kernel. The third component of our sample application—the filter module—intercepts calls to the filesystem and replaces standard file-access functions with its own, providing the user application with authorization to obtain the sought-after system resource. The implementation involves registering the custom module's file-access functions upon module initialization (Examples 6 and 7). In turn, these custom functions provide authentication. This is a standard technique used in numerous applications. However, the filter we present here benefits from using the database access API exposed by the eXtremeDB-KM-based database module to authenticate file access; see Example 8. Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities. Video This month's Dr. Dobb's Journal This month, Dr. Dobb's Journal is devoted to mobile programming. We introduce you to Apple's new Swift programming language, discuss the perils of being the third-most-popular mobile platform, revisit SQLite on Android , and much more!
{ "pile_set_name": "USPTO Backgrounds" }
The valve regulated lead acid (VRLA) battery is used extensively throughout the telecommunications industry as a backup energy storage source. Typically, the battery is the only backup energy source in such applications and, thus, the last line of defense against system failure in the event of AC mains failure. Battery capacity, the energy storage capability, has long been a target of researchers as a definitive battery state of health (SOH) indicator. Conventional standards, such as “IEEE Recommended Practices for Maintenance, Testing and Replacement of Valve Regulated Lead Acid (VRLA) Batteries in Stationary Applications,” IEEE STD 1188-1996, base criteria for determining end of battery operational life on capacity. Typically, when the capacity reaches 80% of the manufacturer's rated capacity, the battery is deemed to be at the end of its operational life. If the battery fails, the operational security of the telecommunications system is in jeopardy. A widely accepted method for obtaining an accurate measurement of capacity is to fully discharge the battery. This is time consuming and expensive and leaves the telecommunication system vulnerable to AC mains failure until the battery is fully recharged after the measurement. U.S. Pat. No. 7,880,438 B1 describes a technique for estimating an uninterruptible power supply battery's capacity. The battery is periodically subjected to a partial-discharge test by using the battery to power a fixed load for a fraction of the theoretical runtime of the battery. Measurements of the battery's voltage are made at various times during the testing. The battery is discharged into a load for substantially less time than to fully discharge the battery. During discharge, first and second voltage values provided by the battery at first and second times are determined. The first and second voltage values are then used to extrapolate a future voltage decrease of the battery to make a first determination of a predicted runtime of the battery . If the capacity is below a desired level, or if the battery voltage drops below a threshold voltage during the testing, then further testing of the battery is preferably performed after recharging the battery. The same test can be repeated or another test can be performed where the battery is used to power the load for a larger fraction of the theoretical runtime of the battery. If the battery voltage drops below the threshold and/or the estimated capacity is lower than desired in the further testing, then the battery can be determined to be bad, a notification to this effect provided and the battery can be replaced. As the battery during the partial-discharge test of U.S. Pat. No. 7,880,438 B1 is connected to a fixed load, the discharge current is constant during the time period of the partial-discharge test. When the battery is used as a power supply for the telecommunication equipment in the event of AC mains failure, however, the load and, thus, also the discharge current varies. The capacity of a battery is not constant but depends on the discharge current. In general, a battery has a higher capacity when discharged with a low discharge current than with a higher discharge current. The method suggested in U.S. Pat. No. 7,880,438 B1 is therefore not applicable to a system with variable load conditions.
{ "pile_set_name": "Github" }
using NexusForever.Shared.Network; using NexusForever.Shared.Network.Message; using NexusForever.WorldServer.Network.Message.Model.Shared; namespace NexusForever.WorldServer.Network.Message.Model { [Message(GameMessageOpcode.ClientItemDelete)] public class ClientItemDelete : IReadable { public ItemLocation From { get; } = new ItemLocation(); public void Read(GamePacketReader reader) { From.Read(reader); } } }
{ "pile_set_name": "PubMed Abstracts" }
Phosphoglucomutase (PGM1) subtypes in a Finnish population determined by isoelectric focusing in agarose gel. The red cell enzyme phosphoglucomutase first locus (PGM1) phenotypes of 639 adult Finns were determined by isoelectric focusing in agarose gel. All the ten commonly occurring phenotypes were detected and the frequencies of the four alleles at the PGM1 locus were as follows: PGMa11 = 0.5313, PGMa21 = 0.1800, PGMa31 = 0.2199 and PGMa41 = 0.0689. The PGM1 phenotypes of 221 mothers with 228 offspring were in accordance with autosomal codominant inheritance.
{ "pile_set_name": "PubMed Abstracts" }
The effect of the ovine host parasitaemia on the development of Babesia ovis (Babes, 1892) in the tick Rhipicephalus bursa (Canestrini and Fanzago, 1877). Batches of Rhipicephalus bursa adult ticks were fed on two lambs with 10.0% (batch 1) and 0.3% (batch 2) Babesia ovis parasitaemia, respectively. Haemolymph and eggs were checked for parasites daily after detachment, before and after appearance of B. ovis in the lamb's blood.B. ovis kinetes were found in the haemolymph and eggs earlier in the engorged ticks detached before appearance of the parasite in the host blood. Rates of haemolymph and egg infection with B. ovis as well as the percentage of infected eggs were much higher in batch 1 (10% lamb parasitaemia) than in batch 2 ticks (0.3% lamb parasitaemia). In eggs incubated at 28 degrees C the optimal period to look for kinetes seems to be days 4-9. Heavily infected ticks laid fewer less eggs within a shorter oviposition period. Pre-oviposition, pre-hatching periods and egg hatchability were not affected. Various parasitic forms are described in the haemolymph and the eggs.
{ "pile_set_name": "Pile-CC" }
Something that’s become incredibly popular as of late is faux panels. Maybe you’re someone that has a kitchen that totally needs a bit of an upgrade, or maybe you’re someone that just really wants to truly make their home the best that it can be. Sometimes being able to have a nice kitchen on a budget seems impossible, and maybe you’re looking for a means to truly make it look better, without it breaking the bank. Well, did you know that you can do that? With faux stone panels, you actually can do this yourself, and it’s totally affordable. You probably like to sit around and watch those HGTV shows, and the key point in many of these, is actually DIY. It is virtually everywhere, and it’s super popular. You can literally get anything, and it’s related to DIY. For example, going to Pinterest will get you some great results too, since most of the time, you’ll see some projects that you can make yourself, and they look amazing. You don’t even need to spend a ton of money to get that feel either, and that’s what’s super awesome about it. Plus, you don’t even have to hire out when you can do it yourself, which is great. Everyone is creative, you just have to go dig deep in order to find it, but once you find it and actually express this, it creates a sense of accomplishment that you may not have known before. Instead of having to spend a bunch of money remodeling, you can actually create a great backsplash for your kitchen with panels. You can get stuff for a temporary look, or even an infused tile look. If you want an industrial feel, you can use concrete or asphalt. You can use this as a backsplash and if you use the right kind, it can make your place look like it’s out of a magazine. It’s that wild. You can do this by yourself, without needing heavy machinery, and in truth, you really just need panels, adhesive screws, a screwdriver, and even a caulking gun. That’s really all there is to it. You can get these at home improvement store, and the best part, is that you don’t need to actually spend a ton of money on remodeling, and you don’t need for it to be a super expensive project. You can in essence make sure that you have all of this together by simply putting faux stone panels all around, and even just getting a bit of faux paneling will make a difference. The best part as well, is that they’re actually waterproof too, and they’re impervious to it. It’s amazing what this can do for you, and you’ll definitely be able to remodel the kitchen. Remember, remodeling doesn’t always have to involve having something super expensive put in, nor do you need to have this kind of work put into it that takes a lot of money. What you need instead, is some faux paneling, and some great DIY skills that you can develop, and you can really just get started with this immediately. If you do need some extra help on making this the best place that you can make it, you can always consult someone for some extra help. It’s amazing what you can do, and you’ll be able to improve your home fast, and without too many issues. There are some great DIY experts out here, and you’ll be able to find out for yourself what the best way to go about getting all of this together is, and you’ll be able to from there create the best kitchen that you can. You’ll feel good, and it will definitely look good as well, and you’ll be able to create the home of your dreams, and be able to do so pretty fast, with the help of faux paneling. It’s remarkable just how a little change in the way that your paneling looks can make a difference, and you’ll be able to create the best and most remarkable space that you can with this, and from there, you can choose the paneling you want and install it very fast.
{ "pile_set_name": "NIH ExPorter" }
Statistical methods for surveillance of spatial health data are of critical importance to public health practitioners. Yet, prospective surveillance for changes in disease risk over in space and time is a relatively undeveloped arena of statistical methodology. Most methods for space-time surveillance have been developed for retrospective analyses of complete data sets. However, data in public health registries accumulate over time and sequential analyses of all the data collected so far is a key concept to early detection of emerging trends or differences in disease risk. The impact derived from timely treatment and control measures can be dramatic, especially when monitoring maps of disease incidence of chronic diseases such as cancer, one of the leading causes of death worldwide. The goal of this proposal is to develop statistical methodology for prospective spatio-temporal disease surveillance, with cancer surveillance being our primary focus. The conditional predictive ordinate is a Bayesian diagnostic tool that detects unusual observations. Although it has never been applied in a surveillance context, we hypothesize it is a powerful technique, in a modified form, for detection of unusual aggregations of disease in space and time. We will also extend our approach to the analysis of multiple diseases, as surveillance systems are often focused on more than one disease. This extension, incorporating correlation between diseases, is likely to improve cluster detection capability. We propose three specific aims. In Specific Aim 1 we will adapt the conditional predictive ordinate for a surveillance setting. Publicly available small area cancer count data and simulated data mimicking possible true disease relative risk changing patterns will be used to test the performance of the proposed methodology in different scenarios. In Specific Aim 2 we will generalize this approach to a multivariate setting which allows for inclusion of correlation between diseases. Different types of cancer will be monitored simultaneously to assess the performance of the multivariate extension in comparison to the individual analyses. In Specific Aim 3, the implementation of the surveillance conditional predictive ordinate in an R package, a free statistical programming language available in many public health departments, will enable use by public health practitioners. Upon the completion of this project, we will have a Bayesian surveillance technique that will be used to detect areas of increased disease incidence as quickly as possible in an effort to reduce morbidity and mortality. The multivariate extension of the proposed surveillance technique will fill in a major gap on the current literature. This extension, allowing for inclusion of correlation between diseases, may contain important clues for the early detection of changes. Finally, the implementation of the surveillance methodology in a user-friendly package within the R software environment will facilitate dissemination. PUBLIC HEALTH RELEVANCE: Narrative In this project we will develop a novel model-based surveillance technique to monitor a map of disease over time. This technique will enable early detection of changes in disease risk helping to reduce undue morbidity and mortality. The implementation of the proposed technique in a user-friendly package within the R software environment will facilitate dissemination and use by public health practitioners.
{ "pile_set_name": "PubMed Abstracts" }
Inhibitors in hemophilia A: mechanisms of inhibition, management and perspectives. Factor VIII (FVIII) replacement therapy remains the mainstay in hemophilia A care. The major complication of replacement therapy is formation of antibodies, which inhibit FVIII activity, thus dramatically reducing treatment efficiency. The present review summarizes the accumulated knowledge on epitopes of FVIII inhibitors and mechanisms of their inhibitory effects. FVIII inhibitors most frequently target the A2, C2 and A3 domains of FVIII and interfere with important interactions of FVIII at various stages of its functional pathway; a class of FVIII inhibitors inactivates FVIII by proteolysis. We discuss therapeutic approaches currently used for treatment of hemophilia A patients with inhibitors and analyze the factors that influence the outcome. The choice between options should depend on the level of inhibitors and consideration of efficacy, safety, and availability of particular regimens. Advances of basic science open avenues for alternative targeted, specific and long-lasting treatments, such as the use of peptide decoys for blocking FVIII inhibitors, bypassing them with human/porcine FVIII hybrids, neutralizing FVIII-reactive CD4 T cells with anti-clonotypic antibodies, or inducing immune tolerance to FVIII with the use of universal CD4 epitopes or by genetic approaches.
{ "pile_set_name": "OpenWebText2" }
People operating open WiFi networks in Germany have long risked being held liable for the actions of those using them. However, to the relief of thousands of citizens that position will change later this year after the country's coalition government decided to abolish the legislation which holds operators responsible for the file-sharing activities of others. In many countries it’s accepted that whoever commits a crime or a civil tort in the file-sharing space is the person that should be held directly responsible for it. For example, if someone shares the latest movie online without permission, that is the only person copyright holders should have an interest in for that particular offense. Certainly, innocent third parties should not be held liable. In Germany, however, the position is more complex. Due to a concept known as Störerhaftung, a third party who played no intentional part in someone else’s infringements can be held liable for them. This type of liability has raised its head in many file-sharing cases where open WiFi owners have been considered liable for other people’s infringements. Now, however, this stifling situation is probably in its dying days. According to a Spiegel report, Germany’s ruling coalition have agreed to abolish the so-called ‘interferer liability’. This means that both private and small scale WiFi operators (such as café owners) will soon enjoy the same freedom from liability enjoyed by commercial operators. No splash-pages or password locks will be required meaning that open WiFi hotspots will at last become as freely available in Germany as they are already in countries such as France and the UK. Pressure had been mounting on the German government following a European Court of Justice opinion published in March which held that entities operating unsecured wireless networks should not be held liable for the copyright infringements of third parties. The case involves Pirate Party member Tobias McFadden who received a claim from music company Sony who alleged that his open WiFi was used to offer an album without permission. Sony demanded that McFadden prevent future infringement by password protecting his network, blocking file-sharing ports, and logging/blocking users sharing copyrighted content. The Pirate objected to Sony’s claims of liability and the case went to the European Court of Justice. The final judgment from the ECJ is not expected for a few months but in most cases early recommendations from experts are upheld by the ruling judge. Should all go smoothly, the removal of the liability from German law has the potential to shake up the massive file-sharing settlement letter business. While those accused of infringement already have some means to fight back, the absence of third-party liability for connection owners could remove much of the pressure placed on them to settle, whether they were directly involved in an infringement or not. According to reports the legislative amendments are set to be passed by Parliament next week and could be in place as early as this fall.
{ "pile_set_name": "Wikipedia (en)" }
Jeffrey Saad Jeffrey Saad (born c. 1967) is an American chef, author, restaurant owner, television personality, and real estate broker from Chicago, Illinois. He is currently the host of United Tastes of America on the Cooking Channel and Estate Director with Compass in Beverly Hills. Career Saad became interested in the culinary business when he was a teenager working at a diner behind his junior high school. Later in his life, he enrolled in the Hotel Restaurant Management Program at Iowa State University. There he earned the title of chef de cuisine during his sophomore year. He continued studies at the Culinary Institute of America and the California Culinary Academy. He performed his internship in London, with Anton Mosimann. In 1993 Saad traveled to Mexico looking to expand his knowledge of the Mexican cuisine. This led him to open a Mexican-influenced restaurant called Sweet Heat in San Francisco. After that, he opened two more restaurants and started his own signature line of bottled chutneys. Among his culinary and business ventures, he became a partner of California's Pasta Pomodoro Italian Restaurants. After that, Saad moved to Los Angeles with his wife and they both started running a real estate company. In 2009 Saad auditioned for the fifth season of the show The Next Food Network Star. He ended up as the first runner-up, losing to Melissa d'Arabian in the finale. However, Food Network gave him the opportunity to host his own web series called Spice Smuggler, where he highlighted spices and foods from other countries. The web series ran for a year, and then Cooking Channel asked him to be the host of the show United Tastes of America. Saad is a partner and executive chef of "The Grove" restaurants in San Francisco. He also distributes his own collection of spice blends. In 2012, Saad released his first cookbook titled Jeffrey Saad's Global Kitchen: Recipes Without Borders. On December 9, 2013, he opened the restaurant, La Ventura in Studio City, California. Television appearances In addition to his own shows, Saad has appeared on these other cooking shows: Grill It! with Bobby Flay Unique Sweets Unique Cocktails The Rachael Ray Show Iron Chef America Countdown ABC World News Now In 2012 he competed in Food Network's Chopped All-Stars. Saad ended up in second place, behind Marcus Samuelsson, but above chefs like Keegan Gerhard, Aarti Sequeira, and Michael Symon. Personal life Saad lives in Los Angeles with his wife, Nadia, and two children. His wife is of Iranian descent. Saad enjoys surfing and mountain biking. He also practices taekwondo. He began practicing it while studying in college, and reached black belt under Master Brandt in San Francisco. He also practiced at the Southern California Tae Kwon Do Center under Scot Lewis where he received his second degree black belt. References External links Category:1960s births Category:American restaurateurs Category:American television chefs Category:Male chefs Category:Businesspeople from Chicago Category:Culinary Institute of America alumni Category:Date of birth missing (living people) Category:Food Network Star contestants Category:Living people Category:Participants in American reality television series Category:Reality cooking competition contestants
{ "pile_set_name": "StackExchange" }
Q: Get top 3 counts from list using stream I am trying to convert java7 program into java 8. I want below output using stream API. public List<String> getTopThreeWeatherCondition7() { List<String> _Top3WeatherList = new ArrayList<String>(); Map<String, Integer> _WeatherCondMap = getWeatherCondition7(); List<Integer> _WeatherCondList = new ArrayList<Integer>(_WeatherCondMap.values()); Collections.sort(_WeatherCondList, Collections.reverseOrder()); List<Integer> _TopThreeWeathersList = _WeatherCondList.subList(0, 3); Set<String> _WeatherCondSet = _WeatherCondMap.keySet(); Integer count = 0; for (String _WeatherCond : _WeatherCondSet) { count = _WeatherCondMap.get(_WeatherCond); for (Integer _TopThreeWeather : _TopThreeWeathersList) { if (_TopThreeWeather == count) { _Top3WeatherList.add(_WeatherCond); } } } _WeatherCondList = null; _WeatherCondMap = null; _TopThreeWeathersList = null; _WeatherCondSet = null; return _Top3WeatherList; } A: I strongly suggests to adhere to Java coding conventions. Start variable names with a lower case letter instead of _+upper case letter. Second, don’t assign local variables to null after use. That’s obsolete and distracts from the actual purpose of the code. Also, don’t initialize variables with an unused default (like the count = 0). In this specific case, you should also declare the variable within the inner loop, where it is actually used. Note also that you are comparing Integer references rather than values. In this specific case it might work as the objects originate from the same map, but you should avoid that. It’s not clear whether there might be duplicate values; in that case, this loop will not do the right thing. Also, you should not iterate over the keySet(), just to perform a get lookup for every key, as there is entrySet() allowing to iterate over key and value together. Since you said, this code ought to be a “Java 7 program” you should mind the existence of the “diamond operator” (<>) which removes the need to repeat type arguments when creating new instances of generic classes. Instead of sorting the values only and searching for the associated keys, you should sort the entries in the first place. So a clean Java 7 variant of your original code would be: static final Comparator<Map.Entry<String, Integer>> BY_VALUE_REVERSED= new Comparator<Map.Entry<String, Integer>>() { public int compare(Map.Entry<String, Integer> o1, Map.Entry<String, Integer> o2) { return Integer.compare(o2.getValue(), o1.getValue()); } }; public List<String> getTopThreeWeatherCondition7() { List<String> top3WeatherList = new ArrayList<>(); Map<String, Integer> weatherCondMap = getWeatherCondition7(); List<Map.Entry<String, Integer>> entryList=new ArrayList<>(weatherCondMap.entrySet()); Collections.sort(entryList, BY_VALUE_REVERSED); List<Map.Entry<String, Integer>> topThreeEntries = entryList.subList(0, 3); for(Map.Entry<String, Integer> entry: topThreeEntries) { top3WeatherList.add(entry.getKey()); } return top3WeatherList; } This also handles duplicates correctly. Only if there is a tie on the third place, just one of the valid candidates will be chosen. Only if you have a clean starting point, you may look, how this can benefit from Java 8 features Instead of copying the content to a List to sort it, you can create a Stream right from the Map and tell the stream to sort You can create a comparator much easier, or even use one of the new builtin comparators You can chain the task of limiting the result to three elements, map to the key and collect to the result List right to the stream of the previous steps: public List<String> getTopThreeWeatherCondition7() { Map<String, Integer> weatherCondMap = getWeatherCondition7(); List<String> top3WeatherList = weatherCondMap.entrySet().stream() .sorted(Collections.reverseOrder(Map.Entry.comparingByValue())) .limit(3) .map(Map.Entry::getKey) .collect(Collectors.toList()); return top3WeatherList; }