text
stringlengths
2
3.53M
id
stringlengths
25
29
metadata
dict
PHILIPPINE Airlines (PAL) confirmed a report saying it lost a record P10.6 billion in 2019, its biggest loss in its corporate history. The flag carrier told the stock exchange on Monday, March 2, 2020, the loss “generally describes the current condition of the airline” and major shareholders were addressing the situation. The coronavirus outbreak and Taal Volcano eruption in January have further put pressure on the company’s financial woes. PAL, controlled by billionaire Lucio Tan, recorded its third straight year of losses since 2017. Shares of PAL Holdings fell 4.35 percent on Monday. The company disclosed it laid off 300 employees after trading hours on Friday, Feb. 28. “Apart from the retrenchment program announced last Friday, PAL also initiated a voluntary separation program for eligible long-serving employees as a first crucial step in a necessary restructuring effort to reduce overhead costs,” it said. PAL attributed the loss to “unsustainable long-term debt and lease obligations.” In a letter sent to the firm’s employees last week, PAL president Gilbert Santa Maria is quoted to have detailed the company’s financial challenges and said PAL is “working on turnaround initiatives to strengthen revenue generation and manage costs.” PAL reportedly has a total head count of around 6,000 employees compared to rival Cebu Pacific’s 4,000 workers. In January 2019, ANA Holdings Inc., Japan’s biggest airline, invested US$95 million in PAL Holdings and acquired a 9.5 percent stake in the Filipino carrier. ANA’s investment was seen to provide PAL with funds to expand in a market where a rash of low-cost carriers have encouraged more people to fly for business and leisure in the past decade. PAL has a checkered history. It underwent ownership changes and privatization in the 1990s and in 2014 when Tan cut his two-year partnership with San Miguel in a bitter share buyback. San Miguel had taken a 49 percent stake in PAL in 2012, but disagreements over how the airline was managed forced Tan, who controlled the carrier, to buy back the diversified conglomerate’s holdings. (CSL)
dataset_first_40k.jsonl/36780
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Be Aware of These 5 Habits Your Child Will Learn To Imitate Having children certainly turns the focus away from yourself and on your child, but there are a few things about yourself that you need to be aware of… As children copy almost everything, it’s important to be mindful of these habits as a parent that you may or may not want them to pick up on as they grow older: Using Phone Manners How and when we talk on our phones gets passed along to our littlest mimickers. If you ever want to see how you look while talking on the phone, hand your kiddo a pretend phone and watch. We guarantee that what you’ll witness afterward is a reflection of you. Body Shaming Unhappy with your body? Join the club, but please don’t shame yourself in front of your tot. Kiddos pick up on these comments faster than you can imagine — and may repeat it to themselves the next time they look in the mirror. Speaking to Others If you want to hear how you sound when speaking to others, listen in on your child’s playtime. It’ll provide you with some good insight on your own behaviors. Using Free Time Children are genuinely interested in what their parents are doing, so if you spend all of your free time in front of the TV or computer, chances are your child will too. Practicing Spirituality Will your children follow your religion your whole life? Maybe not. But chances are that if you provide a spiritual example for your tots, they’ll mimic your relationship with your religion. About The Author Texas raised with southern ways, transplanted into a San Diego, California daze! I have an itch for adventure and an undeniable want for leaps of faith! Looking for inspiration in each and every day and sharing a few Happy Healthy Wealthy Life Hacks I've found along the way :) Haley Edwards- Marketing Ninja- The Ultimate Game of Life
dataset_first_40k.jsonl/36783
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
The quest for understanding the self and search for the meaning of life is as old as memory. No one can give us the correct answer because for each one of us, the path to the answer is different. But clues are all around in nature because understanding Self is linked to understanding life. In this post, we meditate on the trail of numbers in nature to see where they lead us. Many people are afraid of Math because no one helped them make friends with numbers. Nobody introduced them to the wonder and wisdom that is hidden in the language of the Universe. After all the positive feedback for our Healing forest learning program and requests for more nature games, meditations and mindfulness activities we have come up with this interesting walk format. We hope these mindfulness exercises help you create new learning and a new respect for yourself. Because nature and numbers are a part of you, just as you are a part of them. NATURE MEDITATIONS & NUMBERS Let us take a slow and gentle walk in nature. Our aim is to observe and reflect. Walk with a few like minded friends or go alone. Carry a pen and paper to note down your insights and experiences. And be open to try something new. (A free download of all meditations in this article is given at the end.) Math is like love; a simple idea, but it can get complicated. 9 Numbers in Nature: We begin the walk with an exercise to start seeing numbers in nature. Participants have to find the numbers 1 to 9 in their surroundings. Everyone can quickly strike off 1 and 2 as we all have one nose and two ears. The other numbers have to be found outside of the human body. For example a flower with 5 petals, an ant with 6 legs. All participants are given a time limit of 10 minutes to find as many of the remaining numbers as possible. The exercise is to be done individually or in pairs. The group reassembles at the end of the time to work together as a team and find any missing number that no one could find. 8 Patterns in nature: Nature is full of patterns that have astounded mathematicians and poets alike for centuries. One such pattern is called the Fibonacci. The Fibonacci sequence starts like this: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55 and so on forever. Each number is the sum of the two numbers that come before it. It’s a simple pattern, but it appears to be a kind of built-in numbering system to the cosmos. The numbers in the pattern can be found in our own DNA as well the spirals of the Galaxy. The numbers of the Fibonacci sequence are very commonly seen in petals of flowers . Examples include the lily, which has three petals, buttercups, which have five, the chicory’s 21, the daisy’s 34. These are all numbers from the Fibonacci sequence. Nature Meditation: The aim of our exercise is to find interesting patterns in nature and take pictures. Try and see if you can collect a similar pattern in two different objects of nature. 7 Colours: Every Colour that you see is a number. Light travels as a wave and each colour in the spectrum has a specific wavelength and frequency. Our visual sense is not only able to gauge and see different colours but also associates certain emotions with them subconsciously. Nature Meditation: The aim of our next exercise is to spot all the 7 rainbow colours during your nature walk. Each individual makes a list of at-least 7 different colours they can observe during the walk. The aim is also to spend a little time with each separate colour and become aware of how the colour makes us feel. At the end of the exercise people who are drawn to the same colour can group together to see whether they share other common personality traits. 6 Geometry: Have you ever marvelled at the beauty and shape of a spiral sea-shell? Geometry is all about shapes and their properties. Lines, curves and shapes that can be drawn on paper make up plane geometry, while 3 dimensional objects are part of solid geometry. The spiral curve is one of the many examples in nature that give us a hint of the underlying simplicity which gives rise to the complexities in nature. The study of geometry allows us to become aware of the larger design of Nature. Here’s a short film on the curve called ‘life’. Nature Meditation: Creating a spiral. This can be done individually or in a group. The intention is to create a beautiful spiral with objects found in nature. Make it as big as you can. Each person starts from the same center point and creates one arm of a spiral radiating outwards. After working on it for 10 minutes, the creator stands on the outer edge of their spiral arm and starts to walk back to the center slowly and mindfully following the path of their spiral. The last person to reach the center wins. (You cannot pause and have to continue walking inward as slow as you can).*Don’t forget to erase your spiral and disperse everything back in nature, before you leave. Send us a picture of a nature spiral from your walk on our Facebook group: Art of Nature. Next month, we will create a short film with all the spirals collected from different corners of the world and leave a download link here. 5 Senses are our window to the world. Every person perceives the world differently based on how each of their different senses have developed. Staying in the city does take a toll on our overall sense perceptions where some senses can be overloaded like our sight and some underdeveloped like our smell. Being in nature allows us to relax our senses and sharpen them so that our experience of the world can become richer. Nature Meditation: Walk or sit silently in the forest. Focus on any one sense at a time for a short period of 2-3 minutes. Make a note of all the unique things you can observe and sense. Repeat the exercise with another of your senses. Notice how each sense reveals something new about the nature around us. The aim of this exercise is to bring us into the present moment and stop our thoughts from leaping into the past or future. 4 Breath of 4: In this exercise we focus on our breath to bring our mind to the present moment and take the help of numbers to build mindfulness. We use counting to stay focused on the breath. Inhale. Exhale. After the out-breath you count one, then you breathe in and out and count two, and so on up to ten. This is a very good exercise for calming your mind. Once you have brought your attention to the breath you can deepen your awareness to see the breath is made of 4 stages not 2. Inhale. Exhale. And 2 small gaps after each inhale and exhale. Inhale. Pause. Exhale. Pause. Sit in a quiet spot in nature and repeat the breath count to 10 being aware of the 4 stages of each breath. This meditation makes us realise that numbers live with us as part of our lives and we can always turn to them for focus, attention and peace of mind. π Circles: Take a circle. Any circle in the world. Measure it’s length, all the way around the circle. Then measure it across, from one edge to the other edge. Now divide the two lengths. You will always get the same number. 3.14… This number is called Pi and is often written using the greek symbol π. What’s strange about Pi is that the division is never complete. You can go on dividing without reaching an end. Here’s an example 22 divided by 7. π has been calculated to over two quadrillion decimal places and still there is no pattern to the digits. Nature Meditation: Spot the circles. Count the maximum number of circular objects one can notice in your surrounding nature within a time frame of 5 minutes. If you can, try and measure the circumference and diameter of any circle and divide them to find your own Pi. Nature Meditation (Alt): The other interesting exercise with number 3 is to observe the 3 different stages of life. Birth. Maturity. Death. Find and take pictures of objects in different stages. Reflect on how everything is changing from one stage to another. 2 Opposites: Nature is made up of opposites. Day and night. Left and right. Sound and silence. Hot and cold. To observe the two opposing sides of nature is to understand our own true nature. Nature Meditation: For this exercise participants divide into 2 equal groups ‘Positives’ and ’Negatives’. Members of the 2 groups walk in separate directions and each individual (depending on their group) makes a list of 5 positives or 5 negatives they observe in nature. The groups reassemble after 5 minutes and make pairs between the positives and negatives group. Each pair then tries to see how many matching opposites do they have between their 2 lists. For e.g.: If one person wrote ‘light’ and the other person wrote ‘shadow’ then it is considered a successful match. With this exercise we observe that perception of life – positive or negative is based on our mind. And the mind can be trained to choose. *Some wise people in your group might raise a doubt and say that in nature there are no positives and negatives. Everything just is. They are right. Agree with them and tell them it’s just a game. 1 Oneness: Have you ever wondered why we only count in multiples of 10 ? A counting base of 10 is natural probably because we have 10 fingers. In ancient societies, a base 10 system wasn’t always used. The Sumerians used a base 60 system. This is why we count time in bases of 60 (60 minutes in an hour, 60 seconds in a minute). Machines are built using switches, so it is natural for them to count only off (0) and on (1).This system is called binary. There can be many other number systems, but one thing connects them all. Numbers are concepts which only have meaning when they relate to each other. In a sense, it is this relationship that gives each number a specific meaning in the larger number system. For e.g 5 is related to 10,15,20,25 in a certain way. Here’s another chain of relationships: 1,2,6,24, 120….Can you figure out the next 2 numbers in this chain? Nature Meditation: Participants take some time out to observe the many relationships that exist in nature. Each person comes up with a chain of nature relations. For e.g. Sun – Plant – Flower – Bee. The aim is to see who can come up with the longest chain of relationships… and perhaps to realize that we are all part of multiple chain of relationships, which give our life true meaning. 0The number Zero is widely seen as one of the greatest innovations in human history. Zero is both a number and a concept meaning the absence of any quantity. With the help of Zero we can do complicated equations and perform calculus. It is also at the heart of the language of computers which speak in 0’s and 1’s. In philosophical terms it represents nothingness or emptiness out of which all existence arises. We end our nature walk by taking a few minutes to walk in silence and reflect on the concept of zero. Meditating on zero is a meditation in humility. It is to become aware that in the vastness of the Universe – both in space and time, our small individuality amounts to nothingness. And yet, just like the importance of zero, one can realize how significant even the most insignificant thing in the world can be. MEDITATIONS ON NATURE | FREE DOWNLOAD Download link of 2 posters for mindfulness meditations on nature with numbers. We would appreciate a link back to our site in case you re-post them. Please share these 10 beautiful meditations on nature by numbers with friends who might find it interesting. If you enjoyed this post, check out our learning program for more nature based walks and activities. You can subscribe to our monthly blog posts at this link. We are a small group of friends trying to find new ways to reconnect people with nature. Our aim is simple. Helping people heal. Helping forests heal.
dataset_first_40k.jsonl/36794
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
DiamondRock Hospitality Announces The Lexington New York City Has Officially Joined The Autograph Collection BETHESDA, Md., Aug. 19, 2013 /PRNewswire/ -- DiamondRock Hospitality Company (the "Company") (NYSE: DRH) announced today that the Lexington New York City hotel has officially joined the Autograph Collection by Marriott International, Inc. The 725-room hotel is being reinvented with a transformative $46 million renovation that makes the Lexington one of the most unique hotels in New York with its Art Deco theme throughout the iconic building. The hotel is now available through all relevant Marriott International booking channels and guests enjoy the full benefits of the Marriott Rewards program. Mark W. Brugger, President and Chief Executive Officer of DiamondRock Hospitality Company, stated, "Today's announcement marks the most significant milestone in our repositioning of the Lexington. We expect the hotel to be a top performer for the Company next year as the result of our stylized renovation combined with the Autograph Collection's ability to harness Marriott's powerful reservation system and guest loyalty programs. We expect the Lexington New York City to be a significant growth driver for the Company in 2014 and beyond." About the Company DiamondRock Hospitality Company is a self-advised real estate investment trust (REIT) that is an owner of a leading portfolio of geographically diversified hotels concentrated in top gateway markets and destination resort locations. The Company owns 27 premium quality hotels with over 11,600 rooms. The Company has strategically positioned its hotels to predominately be operated under the leading global brands such as Hilton, Marriott, and Westin. For further information on the Company and its portfolio, please visit DiamondRock Hospitality Company's website at www.drhc.com. About Autograph Collection Exactly like nothing else, the Autograph Collection is an evolving ensemble of strikingly independent hotels. Each destination has been selected for its quality, bold originality, rich character and uncommon details. From near to far, iconic to historic, the result is an array of properties that is nothing less than unique, nothing short of collectively exceptional. For more information please visit www.autographhotels.com. This press release contains forward-looking statements within the meaning of federal securities laws and regulations. These forward-looking statements are identified by their use of terms and phrases such as "believe," "expect," "intend," "project," "forecast," "plan" and other similar terms and phrases, including references to assumptions and forecasts of future results. Forward-looking statements are not guarantees of future performance and involve known and unknown risks, uncertainties and other factors which may cause the actual results to differ materially from those anticipated at the time the forward-looking statements are made. These risks include, but are not limited to: national and local economic and business conditions, including the potential for additional terrorist attacks, that will affect occupancy rates at the Company's hotels and the demand for hotel products and services; operating risks associated with the hotel business; risks associated with the level of the Company's indebtedness; relationships with property managers; the ability to compete effectively in areas such as access, location, quality of accommodations and room rate structures; changes in travel patterns, taxes and government regulations which influence or determine wages, prices, construction procedures and costs; risks associated with the development of a hotel by a third-party developer; risks associated with the rebranding of the Lexington Hotel New York; and other risk factors contained in the Company's filings with the Securities and Exchange Commission. Although the Company believes the expectations reflected in such forward-looking statements are based upon reasonable assumptions, it can give no assurance that the expectations will be attained or that any deviation will not be material. All information in this release is as of the date of this release, and the Company undertakes no obligation to update any forward-looking statement to conform the statement to actual results or changes in the Company's expectations.
dataset_first_40k.jsonl/36803
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
People around the world reacted with astonishment Saturday after Prime Minister Justin Trudeau waxed poetic about Cuba’s former leader Fidel Castro in a statement he released hours after news broke that Castro had passed away. In his statement, Trudeau referred to the former guerrilla revolutionary as a “remarkable leader” and pointed to Castro’s friendship with Trudeau’s late father, Pierre Trudeau. Castro attended Trudeau’s Montreal funeral in 2000. “It is with deep sorrow that I learned today of the death of Cuba’s longest serving President,” Trudeau wrote in the statement, which was circulated around 4 a.m. EST Saturday morning. “Fidel Castro was a larger than life leader who served his people for almost half a century. A legendary revolutionary and orator, Mr. Castro made significant improvements to the education and healthcare of his island nation.” “While a controversial figure, both Mr. Castro’s supporters and detractors recognized his tremendous dedication and love for the Cuban people who had a deep and lasting affection for ‘el Comandante.'” Trudeau’s full statement can be found at the bottom of this article. Here in Canada, many Conservative members of Parliament and Tory leadership candidates took to Twitter to condemn Trudeau’s tribute to the deeply divisive leader. Maxime Bernier published a series of tweets in both French and English, calling the prime minister’s praise of Castro “repugnant.” Prime Minister Trudeau should apologize and retract his statement on the death of dictator Fidel Castro https://t.co/crAqmbry91 #cdnpoli — Lisa Raitt (@lraitt) November 26, 2016 Trudeau had a chance to stand for freedom and human dignity today and instead stood with a brutal dictator. https://t.co/TflJeaG3vp #castro — Kellie Leitch (@KellieLeitch) November 26, 2016 Castro, a socialist and Cuban nationalist, formed and led a rebel army in the 1950’s and overthrew Cuban president and dictator Fulgencio Batista in 1959. Castro embraced Soviet-style communism; under his almost five-decade rule of the island nation, Cuba became a one-party socialist state and Castro imposed radical economic reforms throughout the country. Relations between the United States and Cuba reached crisis levels under Castro’s administration, culminating in the severance of diplomatic ties in January 1961. The two countries only re-established their diplomatic relationship in 2015. Canada, however, has always maintained relations with Cuba, which were especially warm in the 1970s and 1980s when Pierre Trudeau was prime minister. Castro was both loved and hated around the world. To some, he was a revolutionary hero; to others, he was a dictator who oversaw a number of human rights abuses during his regime. U.S. Senators Ted Cruz and Marco Rubio — both of whom ran for the Republican presidential nomination — attacked Trudeau over social media on Saturday. Rubio, who is the son of Cuban immigrants, called the statement “shameful.” Is this a real statement or a parody? Because if this is a real statement from the PM of Canada it is shameful & embarrassing. https://t.co/lFXeqU7Ws0 — Marco Rubio (@marcorubio) November 26, 2016 Disgraceful. Why do young socialists idolize totalitarian tyrants? Castro, Stalin, Mao, Pol Pot — all evil, torturing murderers. #truth https://t.co/mYJonVK7JB — Ted Cruz (@tedcruz) November 26, 2016 Journalists in North America and the United Kingdom also expressed their surprise and disapproval of the Canadian prime minister’s tribute to Castro on Twitter. For all of the British fans of Justin Trudeau, this from him on Castro is worse than Corbyn. O, Canada, oh dear https://t.co/8dnCeha3zQ — Tim Montgomerie ن (@montie) November 26, 2016 This is a sad statement for the leader of a democracy to make: https://t.co/NN959KsMcP — Jeffrey Goldberg (@JeffreyGoldberg) November 26, 2016 Kudos to Justin Trudeau for finding a way to gloss over the whole murderous, oppressive dictatorship thingy. Actually kind of impressive. pic.twitter.com/GppKwOJjCw — Robyn Urback (@RobynUrback) November 26, 2016 I suspect Canadian PM Trudeau hasn’t spent lots of time with Castro’s detractors, who rarely concede this point or use this terminology. pic.twitter.com/LMxd3zQ1Z5 — Roque Planas (@RoqPlanas) November 26, 2016 Trudeau’s statement spread far and wide and caught the attention of social media users in Israel, Spain, The Netherlands and Egypt. Is this real? Trudeau is praising Castro? https://t.co/lTwYwIzMJs — Gilad (@gilad73) November 26, 2016 Escándalo en Canadá por el mensaje de Trudeau de obsequiosa y grotesca adulación al dictador. Aun peor que Obama. https://t.co/UA5Fav8xVG — Hermann Tertsch (@hermanntertsch) November 26, 2016 This only goes to show that Justin Trudeau has serious difficulties distinguishing good from bad, right from wrong. Unacceptable. https://t.co/m3cQ5KYrB5 — spiervanzwicht (@spiervanzwicht) November 26, 2016 Aha,nu komt de aap uit de mouw: Trudeau, de moderne cryptocommunist. Voor wie is deze man ook al weer ‘n lichtend voorbeeld? ☘️#FidelCastro https://t.co/3KDjafRsQ6 — Toon Sesink (@Toon_Sesink) November 26, 2016 This guy is nuts Canadian PM Trudeau Praises Dictator Castro as ‘Remarkable… https://t.co/nRR49BK1TI by #singsandsews via @c0nvey — moustafa sabry (@mossabry) November 26, 2016 The son of former Canadian prime minister Stephen Harper also called Trudeau’s statement “an embarrassment for Canada.” What an embarrassment for Canada.https://t.co/thKMpPnBRU — Ben Harper (@Ben_S_Harper) November 26, 2016 Saturday afternoon, Interim Conservative Leader Rona Ambrose issued her own statement on Fidel Castro’s passing, in which she focused more on Cuban citizens than on their former leader. “With the passing of Fidel Castro, my thoughts and prayers are with the people of Cuba who continue to endure his long and oppressive regime, even after his death,” Ambrose wrote. “Under his rule, thousands were impoverished, thousands were imprisoned and executed, and free speech, thought and assembly were curtailed or banned, all to live up to his version of ‘socialism.’ “Canada and the Cuban people have had a long and warm friendship over many years. With today’s news, my hope is that a brighter day will be coming for the Cuban people, where they may live in freedom and where democracy, human rights, and the rule of law are enshrined.‎” Statement by the Prime Minister of Canada on the death of former Cuban President Fidel Castro November 26, 2016 The Prime Minister, Justin Trudeau, today issued the following statement on the death of former Cuban President Fidel Castro: “It is with deep sorrow that I learned today of the death of Cuba’s longest serving President. “Fidel Castro was a larger than life leader who served his people for almost half a century. A legendary revolutionary and orator, Mr. Castro made significant improvements to the education and healthcare of his island nation. “While a controversial figure, both Mr. Castro’s supporters and detractors recognized his tremendous dedication and love for the Cuban people who had a deep and lasting affection for “el Comandante”. “I know my father was very proud to call him a friend and I had the opportunity to meet Fidel when my father passed away. It was also a real honour to meet his three sons and his brother President Raúl Castro during my recent visit to Cuba. “On behalf of all Canadians, Sophie and I offer our deepest condolences to the family, friends and many, many supporters of Mr. Castro. We join the people of Cuba today in mourning the loss of this remarkable leader.”
dataset_first_40k.jsonl/36804
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Replaced FX 4300 with FX 4350, motherboard claims it to be incompatible My friend got a FX 4350 and replaced his FX 4300, the gigabyte GA-78LMT-S2 motherboard is now claiming the old CPU is incompatible and it underclocks it, completely removing the purpose of using the new CPU, it also disables two CPU cores, the other FX works perfectly. Any idea what is causing this? It's undercooked to 2.7ghz from 4.2 stock without our doing so, it is just the motherboard. We have also reset the bios settings A: The GA-78LMT-S2 (rev. 1.2) does not support the FX 4350 Source: GA-78LMT-S2 (rev. 1.2) CPU Compatability List
dataset_first_40k.jsonl/36806
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Interactions of alpha1-antitrypsin with trypsin and chymotrypsin. The interaction of alpha1-antitrypsin with trypsin and chymotrypsin has been investigated by protease activity assays, by electrophoretic analysis, by CD and absorption difference spectra, and by gel filtration of reaction mixtures containing excess inhibitor or excess protease. When alpha1-antitrypsin is present in excess, only one stable inhibitor - protease complex is formed. In the presence of excess protease, however, this primary complex is degraded relatively rapidly to one or more secondary complexes. These latter conversions are more pronounced in the case of the antititrypsin-chymotrypsin system. The greater lability of the antitrypsin-chymotrypsin system is evidenced by the relatively rapid release of inactive chymotrypsin from the secondary antitrypsin - chymotrypsin complex. Only minimal amounts of active protease were released from the complexes on the addition of excess protease and one protease could not displace the other from the complex, although competition experiments showed that chymotrypsin reacted more rapidly with the inhibitor than trypsin.
dataset_first_40k.jsonl/36813
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Employee stock options (ESOs) are a widespread and economically highly significant phenomenon, both at the company and at the employee level. Stock options are not only relevant for CEOs, but also and increasingly for managers at lower grades in a corporation. Despite its economic importance, there exists very little empirical research that examines the behavior of employees in stock option programs. Our study attempts to fill this gap by empirically studying the behavior of option holders in a distinct ESO plan. We try to answer the following questions: How do employees exercise their stock options? How do employees dispose of company stock acquired in stock option programs? What rational and behavioral factors explain differences in observed exercise behavior? We study these questions by combining two data sets. The first data set consists of detailed individual-level ESO exercise transactions of senior managers from a large German corporation (transaction data). The second data set is based on an extensive questionnaire in which we asked these employees to answer a wide range of questions on employee-specific characteristics, beliefs and attitudes (questionnaire data). We find that employees exercise their options very early and in a few large transactions. A large majority of option recipients sell the shares acquired on exercise. Furthermore, our results suggest that, inconsistent with traditional ESO theories, exercise behavior is not driven by factors like risk aversion or individuals' holdings of company stock that are included in rational models of exercise. Our findings suggest that individuals' exercise decisions depend on the psychological factors miscalibration and mental accounting.
dataset_first_40k.jsonl/36820
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Authorities seek adult in death of DeKalb County teen Authorities seek adult in death of DeKalb County teen Investigators in DeKalb County, Ala., are interviewing people over the death of a 17-year-old in Crossville on Wednesday, and they are seeking a man who left the scene when the body was discovered. The deceased teenager has been identified as Alan Michael Tarwater and his family has been notified by Marshall County authorities, according to a news release. The teen was found unresponsive in a residence on County Road 1931 around 3 p.m. Wednesday by two other juveniles, Sheriff Jimmy Harris states in the release. The boy apparently died from as-yet undetermined reasons while sleeping, according to the sheriff. Authorities now are looking for an adult, Todd Lashane Thomas, 43, the sheriff's release states. Thomas is described as a white man, about six feet tall, weighing about 225 pounds and with green eyes and brown hair. Warrants have been issued charging Thomas with contributing the delinquency of children, officials said. Thomas also has outstanding warrants for previous traffic offenses, the release states. DeKalb County officials ask anyone with information about Thomas or his whereabouts to call the sheriff's office at 256-845-3801.
dataset_first_40k.jsonl/36821
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Welcome to Flowers by Jerry. We are a family owned, full service florist and have been in business for over 40 years. We deliver to all hospitals, funeral homes, schools, and businesses with beautiful blooming and green plants, gourmet and fruit baskets, balloons and brilliant custom designed fresh floral and silk arrangements. We would be honored to be your florist of choice when sending to Commerce City, Colorado. Our on-line store services anywhere nationwide. We use the local florists to provide you with the freshest flowers and high quality service. Kaplan College Westwood College: Denver North Campus Everest College Westwood College Community College of Denver Community College of Aurora Heritage College Wartburg College Denver Technical College College Living Experience Front Range Community College College of the Rockies Anthem College Bartending & Casino College Metropolitan State College Pickens Technical College Rocky Mountain College of Art & Design Empire Beauty Schools - Thornton (Greater Denver) ... College America Colorado Locksmith College Lincoln College of Technology Belleview College & Seminary Columbia College Empire Beauty Schools - Aurora (Greater Denver) fo... Platt College Cambridge College Daniels College of Business Colorado International College Aims Community College Colorado State University University of Wyoming DeVry University Colorado Technical University De Vry University Colorado Technical University - Denver North College of International Esthetics Red Rocks Community College Best Driving School University of Colorado Hospital College For Financial Planning ITT TECHNICAL INSTITUTE University of Denver-University College College of Financial Planning Vineyard University College Assistance Plus-Denver Southwest Acupuncture College Boulder College-Massage Thrpy Rivendell College Naropa University Rolf Institute
dataset_first_40k.jsonl/36822
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
This page is having a slideshow that uses Javascript. Your browser either doesn't support Javascript or you have it turned off. To see this page as it is meant to appear please use a Javascript enabled browser. Excited to announce that Running Late is partnering with the premier language school in New York and Brooklyn Fluent City, who are offering fans of the show a $10 discount if you sign up using the promo code RUNNINGLATE! Scott’s been taking French classes and will be inviting his teacher Lea onto the show next week to quiz him on his progress. Sign up for a class of your own – French, Spanish Italian, Hebrew, so many more… Get to learnin!
dataset_first_40k.jsonl/36825
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: How to capture video and to save into documents directory of iPhone I want to capture video in iphone4 and at completion I want to store in documents directory of iPhone.Please help .I am able to capture video using UIImagePickerController but not able to save it into documents directory. A: If you want to save videos with a UIImagePicker, you can easily save them to the Photos Album via: - (void)imagePickerController:(UIImagePickerController *)picker didFinishPickingMediaWithInfo:(NSDictionary *)info; { NSURL * movieURL = [[info valueForKey:UIImagePickerControllerMediaURL] retain];// Get the URL of where the movie is stored. UISaveVideoAtPathToSavedPhotosAlbum([movieURL path], nil, nil, nil); } This allows you to save it to the Photos Album, and keep a reference path to the movie for use later. I'm not quite sure if this is what you need, but it does allow you to save movies. EDIT: If you really want to save the Movie to documents directory, simply take the above code, and change the line: UISaveVideoAtPathToSavedPhotosAlbum([movieURL path], nil, nil, nil); to NSData * movieData = [NSData dataWithContentsOfURL:movieURL]; This will give you the data of the movie, and from there, you can write that data to the documents directory. Hope that helps!
dataset_first_40k.jsonl/36831
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: If I only have a range, is it acceptable to calculate an average out of it? Supposed I have only this data point available: Concentration = (1.1 - 2.0 g/L). Is it acceptable to conclude : (Theoretical) average = ((1.1 + 2.0) * 0.5) = 1.55 g/L? Or would that considered to be statistically incorrect by a reviewer of a scientific thesis (in a medical field)? EDIT 3: Complete rephrase: If I have only 2 data points out of a range, and nothing else, could I declare this as the only available data and therefore, calculate an arithmetic mean out of it? Like: "I have a range which represents two samples, the lowest one and the highest one. I don't know how many samples were in between. Therefore, I assume there were just those two samples, and calculate the average of those two. And add a note that this average value has been calculated out of a range, and should be considered as less reliable than others with more samples". EDIT 4: whubers comment on the question is what I was looking for: Mid-range. I don't have enough points to upvote the other answers, sorry. If whuber will write an answer instead of a comment I will mark it as correct. A: The average calculation will be correct if the underlying distribution is symmetric and the endpoints of your interval were chosen by the same criterion. For example, the above calculation is correct if the distribution of your concentration is normal and the interval refers to the interquartile range. The calculation will not in general be true if the distribution is asymmetric such as a log-normal distribution.
dataset_first_40k.jsonl/36832
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Mercy College of Ohio Mercy College of Ohio (formerly Mercy College of Northwest Ohio) is a Catholic college focused on the health sciences and located in Toledo and Youngstown, Ohio. It was founded as the Mercy School of Nursing in 1917 by the Sisters of Mercy. The name was changed in August 2011 from Mercy College of Northwest Ohio to its current name. Mercy College is accredited by the Higher Learning Commission of the North Central Association of Colleges and Schools. In September 2018, Mercy College and Bowling Green State University announced the start of a two-to-three-year process under which the college and its degree programs will become part of the university. In 2019 they instead chose to pursue a strategic partnership. References External links Official website Category:Universities and colleges in Ohio Category:Educational institutions established in 1917 Category:Education in Toledo, Ohio Category:Buildings and structures in Toledo, Ohio Category:Sisters of Mercy colleges and universities Category:Catholic universities and colleges in Ohio Category:Roman Catholic Diocese of Toledo
dataset_first_40k.jsonl/36844
{ "meta": { "pile_set_name": "Wikipedia (en)" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
import actions from './types' function toggleContextSideBar() { return { type: actions.TOGGLE_CONTEXT_SIDEBAR, } } function changePath(path) { return (dispatch) => { dispatch({ type: actions.CHANGE_PATH, path, }) if (path.app && path.app.name) { dispatch({ type: actions.CLICK_APP_MENU, index: path.app.id, }) } else { // remove current project, and back to dashboard dispatch({ type: actions.CHANGE_PROJECT, id: null, }) } } } export default { toggleContextSideBar, changePath, }
dataset_first_40k.jsonl/36846
{ "meta": { "pile_set_name": "Github" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
4th dater 1.4.3.0 Date Changer is a FREEWARE utility that lets you automatically change the system date before a particular program is launched. The program is intended to help you run Y2K-non-compliant software, by fo Free Download File Date Changer 1.61 - A Windows-Program which changes the Date/Time of Files. Good Tool i.e. for Application-Developers. A 32-bit .EXE for Win95 which supports long filenames, and a 16-bit .EXE for Free Download
dataset_first_40k.jsonl/36852
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Integrated circuits are made possible by processes which produce intricately patterned material layers on substrate surfaces. Producing patterned material on a substrate requires controlled methods for removal of exposed material. Chemical etching is used for a variety of purposes including transferring a pattern in photoresist into underlying layers, thinning layers, or thinning lateral dimensions of features already present on the surface. Often it is desirable to have an etch process that etches one material faster than another facilitating, for example, a pattern transfer process. Such an etch process is said to be selective to the first material. As a result of the diversity of materials, circuits, and processes, etch processes have been developed with a selectivity towards a variety of materials. Etch processes may be termed wet or dry based on the materials used in the process. A wet HF etch preferentially removes silicon oxide over other dielectrics and materials. However, wet processes may have difficulty penetrating some constrained trenches and also may sometimes deform the remaining material. Dry etches produced in local plasmas formed within the substrate processing region can penetrate more constrained trenches and exhibit less deformation of delicate remaining structures. However, local plasmas may damage the substrate through the production of electric arcs as they discharge or if a high enough selectivity is not achievable. Thus, there is a need for improved systems and methods that can be used to produce high quality devices and structures. These and other needs are addressed by the present technology.
dataset_first_40k.jsonl/36855
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Brit Award for British Urban Act The Brit Award for British Urban Act was an award given by the British Phonographic Industry (BPI), an organisation which represents record companies and artists in the United Kingdom. The accolade is presented at the Brit Awards, an annual celebration of British and international music. The winners and nominees are determined by the Brit Awards voting academy with over one-thousand members, which comprise record labels, publishers, managers, agents, media, and previous winners and nominees. The award was first presented in 2003 and was last presented in 2006. Winners and nominees Multiple nominations and awards Notes Ms. Dynamite (2003), Joss Stone (2005) Also Win Brit Award for British Female Solo Artist References Category:Brit Awards Category:Hip hop awards Category:Rhythm and blues Category:Awards established in 2003 Category:Awards disestablished in 2006
dataset_first_40k.jsonl/36856
{ "meta": { "pile_set_name": "Wikipedia (en)" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
In the Objective-based team fiction most of the teams have chosen the Revenge path: to eliminate the captain of the Akan and extract valuable information from the computer core before the fleet destroyed the ship These choices influenced the story and will become canonical. Mattock StationArx Capital Exchange HQPlanet Arx orbit Evant paced the distance between his chair and the wall, musing over the data recovered from the multiple lead and operations conducted in the past week by the Brotherhood. His gaze rose from the datapad momentarily, observing the empty conference room he and the many executives of Arx Capital Exchange used for meetings, only this time used as a briefing room for the Brotherhood’s leadership. The communique had been sent more than an hour ago and he was expecting their replies momentarily. The first flicker of a holoprojection issued from the table-mounted device displaying the Consuls of Taldryan and Scholae Palatinae to Evant’s left. Arcona’s and Plagueis’ Consuls showed up moments later, with Naga Sadow’s and Odan-Urr’s Consuls appearing last. There was a palpable tension in the room as the assembly took stock of each other, the years-long feuds and suspicions bubbling up once more.
dataset_first_40k.jsonl/36859
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
1. Field of Application The present invention relates to a fault detection apparatus for detecting failure of an A/D (analog-to-digital) converter, and in particular to a fault detection apparatus for an A/D converter which operates from an externally supplied clock signal, whereby the fault detection apparatus can detect failure caused by loss of that clock signal. 2. Description of Related Art A type of A/D converter is known, for example as described in Japanese Patent Publication No. 2006-304365 (referred to in the following as reference document 1), having three or more channels with respective input terminals, for inputting respective analog voltage signals, with the analog voltage signals being converted to digital values. With the apparatus of reference document 1, failure of the A/D converter is detected as follows. At least two analog voltages are predetermined, and the respectively corresponding digital values that result from A/D conversion of these analog voltages (i.e., when the A/D converter is operating normally) are also predetermined. A/D conversion is applied to the two analog voltages and the relationship between the digital values resulting from that conversion is compared with a predetermined relationship. If the detected relationship does not correspond to the predetermined relationship, then it can be determined that there is failure of the A/D converter. In the case of an A/D converter which performs conversion in synchronism with an externally supplied clock signal (referred to in the following simply as an external clock signal), if the signal lead through which the external clock signal is supplied should become open-circuited, the A/D conversion will cease to be synchronized with the external clock signal. Hence, digital data will be outputted which have been derived through A/D conversions performed at random timings. Thus is necessary to be able to detect such an occurrence, as a failure of the A/D converter. However the apparatus of reference document 1 does not detect an A/D converter failure that results from an open-circuit of the connecting lead that supplies the external clock signal. Furthermore, the failure detection method that is used with reference document 1 is applicable only to an A/D converter having three or more signal input channels, and in particular, cannot be used in the case of an A/D converter having a single input channel.
dataset_first_40k.jsonl/36860
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
[ { "date": "2019-01-01 00:00:00", "start": "2019-01-01T00:00:00.000Z", "end": "2019-01-02T00:00:00.000Z", "name": "Nýársdagur", "type": "public", "rule": "01-01", "_weekday": "Tue" }, { "date": "2019-01-06 00:00:00", "start": "2019-01-06T00:00:00.000Z", "end": "2019-01-07T00:00:00.000Z", "name": "Þrettándinn", "type": "observance", "rule": "01-06", "_weekday": "Sun" }, { "date": "2019-01-18 00:00:00", "start": "2019-01-18T00:00:00.000Z", "end": "2019-01-19T00:00:00.000Z", "name": "Bóndadagur", "type": "observance", "rule": "friday after 01-18", "_weekday": "Fri" }, { "date": "2019-02-18 00:00:00", "start": "2019-02-18T00:00:00.000Z", "end": "2019-02-19T00:00:00.000Z", "name": "Konudagur", "type": "observance", "rule": "02-18", "_weekday": "Mon" }, { "date": "2019-03-04 00:00:00", "start": "2019-03-04T00:00:00.000Z", "end": "2019-03-05T00:00:00.000Z", "name": "Bolludagur", "type": "observance", "rule": "easter -48", "_weekday": "Mon" }, { "date": "2019-03-05 00:00:00", "start": "2019-03-05T00:00:00.000Z", "end": "2019-03-06T00:00:00.000Z", "name": "Sprengidagur", "type": "observance", "rule": "easter -47", "_weekday": "Tue" }, { "date": "2019-03-06 00:00:00", "start": "2019-03-06T00:00:00.000Z", "end": "2019-03-07T00:00:00.000Z", "name": "Öskudagur", "type": "observance", "rule": "easter -46", "_weekday": "Wed" }, { "date": "2019-04-14 00:00:00", "start": "2019-04-14T00:00:00.000Z", "end": "2019-04-15T00:00:00.000Z", "name": "Pálmasunnudagur", "type": "observance", "rule": "easter -7", "_weekday": "Sun" }, { "date": "2019-04-18 00:00:00", "start": "2019-04-18T00:00:00.000Z", "end": "2019-04-19T00:00:00.000Z", "name": "Skírdagur", "type": "public", "rule": "easter -3", "_weekday": "Thu" }, { "date": "2019-04-18 00:00:00", "start": "2019-04-18T00:00:00.000Z", "end": "2019-04-19T00:00:00.000Z", "name": "Sumardagurinn fyrsti", "type": "public", "rule": "thursday after 04-18", "_weekday": "Thu" }, { "date": "2019-04-19 00:00:00", "start": "2019-04-19T00:00:00.000Z", "end": "2019-04-20T00:00:00.000Z", "name": "Föstudagurinn langi", "type": "public", "rule": "easter -2", "_weekday": "Fri" }, { "date": "2019-04-21 00:00:00", "start": "2019-04-21T00:00:00.000Z", "end": "2019-04-22T00:00:00.000Z", "name": "Páskadagur", "type": "public", "rule": "easter", "_weekday": "Sun" }, { "date": "2019-04-22 00:00:00", "start": "2019-04-22T00:00:00.000Z", "end": "2019-04-23T00:00:00.000Z", "name": "Annar í páskum", "type": "public", "rule": "easter 1", "_weekday": "Mon" }, { "date": "2019-05-01 00:00:00", "start": "2019-05-01T00:00:00.000Z", "end": "2019-05-02T00:00:00.000Z", "name": "Hátíðisdagur Verkamanna", "type": "public", "rule": "05-01", "_weekday": "Wed" }, { "date": "2019-05-12 00:00:00", "start": "2019-05-12T00:00:00.000Z", "end": "2019-05-13T00:00:00.000Z", "name": "Mæðradagurinn", "type": "observance", "rule": "2nd sunday in May", "_weekday": "Sun" }, { "date": "2019-05-30 00:00:00", "start": "2019-05-30T00:00:00.000Z", "end": "2019-05-31T00:00:00.000Z", "name": "Uppstigningardagur", "type": "public", "rule": "easter 39", "_weekday": "Thu" }, { "date": "2019-06-02 00:00:00", "start": "2019-06-02T00:00:00.000Z", "end": "2019-06-03T00:00:00.000Z", "name": "Sjómannadagurinn", "type": "observance", "rule": "1st sunday in June", "_weekday": "Sun" }, { "date": "2019-06-09 00:00:00", "start": "2019-06-09T00:00:00.000Z", "end": "2019-06-10T00:00:00.000Z", "name": "Hvítasunnudagur", "type": "public", "rule": "easter 49", "_weekday": "Sun" }, { "date": "2019-06-10 00:00:00", "start": "2019-06-10T00:00:00.000Z", "end": "2019-06-11T00:00:00.000Z", "name": "Annar í hvítasunnu", "type": "public", "rule": "easter 50", "_weekday": "Mon" }, { "date": "2019-06-17 00:00:00", "start": "2019-06-17T00:00:00.000Z", "end": "2019-06-18T00:00:00.000Z", "name": "Íslenski þjóðhátíðardagurinn", "type": "public", "rule": "06-17", "_weekday": "Mon" }, { "date": "2019-08-05 00:00:00", "start": "2019-08-05T00:00:00.000Z", "end": "2019-08-06T00:00:00.000Z", "name": "Frídagur verslunarmanna", "type": "public", "rule": "monday in August", "_weekday": "Mon" }, { "date": "2019-10-26 00:00:00", "start": "2019-10-26T00:00:00.000Z", "end": "2019-10-27T00:00:00.000Z", "name": "Fyrsti vetrardagur", "type": "observance", "rule": "saturday after 10-21", "_weekday": "Sat" }, { "date": "2019-11-16 00:00:00", "start": "2019-11-16T00:00:00.000Z", "end": "2019-11-17T00:00:00.000Z", "name": "Dagur íslenskrar tungu", "type": "observance", "rule": "11-16", "_weekday": "Sat" }, { "date": "2019-12-23 00:00:00", "start": "2019-12-23T00:00:00.000Z", "end": "2019-12-24T00:00:00.000Z", "name": "Þorláksmessa", "type": "observance", "rule": "12-23", "_weekday": "Mon" }, { "date": "2019-12-24 13:00:00", "start": "2019-12-24T13:00:00.000Z", "end": "2019-12-25T00:00:00.000Z", "name": "Aðfangadagur", "type": "public", "rule": "12-24 13:00 if sunday then 00:00", "_weekday": "Tue" }, { "date": "2019-12-25 00:00:00", "start": "2019-12-25T00:00:00.000Z", "end": "2019-12-26T00:00:00.000Z", "name": "Jóladagur", "type": "public", "rule": "12-25", "_weekday": "Wed" }, { "date": "2019-12-26 00:00:00", "start": "2019-12-26T00:00:00.000Z", "end": "2019-12-27T00:00:00.000Z", "name": "Annar í jólum", "type": "public", "rule": "12-26", "_weekday": "Thu" }, { "date": "2019-12-31 13:00:00", "start": "2019-12-31T13:00:00.000Z", "end": "2020-01-01T00:00:00.000Z", "name": "Gamlársdagur", "type": "public", "rule": "12-31 13:00 if sunday then 00:00", "_weekday": "Tue" } ]
dataset_first_40k.jsonl/36862
{ "meta": { "pile_set_name": "Github" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Answer: Explanation Explanation: Answer: Explanation: We can determine where a function is convex or concave, by using the second derivative. If: #(d^2y)/(dx^2)f(x)>0color(white)(888)#Convex( concave up ) #(d^2y)/(dx^2)f(x)<0color(white)(888)#Concave( concave down ) The second derivative is just the derivative of the first derivative. .i.e. #(d^2y)/(dx^2)f(x)=dy/dx(dy/dxf(x))# For #f(x)=cos(x)# #dy/dx=-sin(x)# #(d^2y)/(dx^2)(cos(x))=dy/dx(-sin(x))=-cos(x)# Now we solve the inequalities: #-cos(x)>0color(white)(888)[1]# #-cos(x)<0color(white)(888)[2]# #-cos(x)>0color(white)(888)[1]# #pi/2 < x< (3pi)/2# #-cos(x)<0color(white)(888)[2]# #0 < x < pi/2color(white)(88)# , #(3pi)/2 < x < 2pi # Notice that #bb((3pi)/2)# is on the point where the function changes from convex to concave. This is called a point of inflection ( inflexion in the UK ), so at #bb((3pi)/2)# it is neither concave nor convex.
dataset_first_40k.jsonl/36875
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
1. Field of the Invention The present invention relates to a photosensitive resin composition, a light-shielding color filter and a production process therefor, and an image sensor. 2. Description of the Related Art A color filter used in a liquid crystal display device comprises a light-shielding film called a black matrix for the purpose of improving contrast by shielding light between color pixels, etc. Furthermore, in an image sensor which is also called a solid-state image sensor, a light-shielding film is provided for the purpose of preventing the occurrence of dark current (noise) due to stray light and improving image quality. As a composition for forming a black matrix for a liquid crystal display device or a light-shielding film for an image sensor, a photosensitive resin composition comprising a black color material such as carbon black or titanium black is known (ref. e.g. JP-A-10-246955, JP-A-9-54431, JP-A-10-46042, JP-A-2006-36750, and JP-A-2007-115921) (JP-A denotes a Japanese unexamined patent application publication).
dataset_first_40k.jsonl/36883
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Celebrate Girl Day with AAUW: Enter Our Battle of the Plans! Engineering is one of the fastest-growing fields in the United States, so why are only 13 percent of professional engineers women? One reason is that not many girls learn about engineering in the K–12 classroom. That’s why DiscoverE (formerly known as Engineers Week) created Introduce a Girl to Engineering Day, now called Girl Day. To help celebrate, AAUW is inviting teachers and other educators with K–12 experience to submit lesson plans for our second annual Battle of the Plans contest. Make sure you share the contest with teachers you know. You can also encourage teachers to use last year’s winning plan with their students. And don’t forget to tell the girls in your life about their amazing potential as future engineers! To enter the contest, submit a K–12 lesson plan that incorporates engineering skills and knowledge into a diverse range of subjects in fun, creative ways. Lesson plans must Make engineering relevant to a subject taught in K–12 schools Be appropriate to your students’ age and grade level Be 1,000 words or less Be your original work (You don’t need to create a lesson plan solely for the contest. Tried-and-true plans are encouraged!) By submitting your lesson plan to this contest, you grant AAUW permission to publish your plan online, along with your full name. One winner, whose lesson plan shows thoughtfulness, creativity, and originality, will receive a $300 Visa gift card to spend on classroom supplies to continue to introduce students to engineering. AAUW will announce the winner on Girl Day, February 20, 2014.
dataset_first_40k.jsonl/36891
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Choose a station: Choose a station: Quick DNA Tests Crack Medical Mysteries Otherwise Missed Scientists used high-powered DNA sequencing to diagnose infections missed by usual lab tests. The pricey method is still experimental, but might offer a way to identify tough-to-diagnose infections. Doctors used a rapid DNA test to identify a Wisconsin teen's unusual infection with Leptospira bacteria (yellow), which are common in the tropics. Researchers are developing a radical way to diagnose infectious diseases. Instead of guessing what a patient might have, and ordering one test after another, this new technology starts with no assumptions. The technology starts with a sample of blood or spinal fluid from an infected person and searches through all the DNA in it, looking for sequences that came from a virus, a bacterium, a fungus or even a parasite. Scientists at the University of California, San Francisco are reporting this week their first results from the technique, which relies on a technology called Next Generation Sequencing. One of their early patients is Andrea Struve, a 21-year-old San Franciscan who returned from 40 days in the Australian Outback last year with a nasty set of symptoms. "I was in classes, sweating profusely with a fever and joint pain, and it just wasn't fun, so that's when I went to the doctor," she says. Her doctor made a bunch of educated guesses about the underlying cause, but all the tests came back negative. So physicians enrolled Struve in a study at UC San Francisco to try out a different approach. "As opposed to the way we normally diagnose infectious disease — meaning we target a single infectious agent at a time — this test works by detecting all the DNA present in clinical samples," says Dr. Charles Chiu, who is running the study. Chiu extracted DNA from Struve's blood and ran it through a superfast sequencing machine. He compared the DNA he found with a huge library of DNA sequences from all sorts of infectious agents. It turns out that she was infected with a virus related to chicken pox — one that normally causes a roseola rash in young children. "They're not entirely sure why I got it," Struve says, adding that she was "really, really glad it was something that would be gone in a month instead of six months to a year." Struve is fine now. Her case was published online this week in the journal Genome Research, which also details the technology. Chiu and his colleagues have also solved a more dramatic case, which they describe in the current New England Journal of Medicine. This medical mystery involved a 14-year-old boy in Wisconsin with brain inflammation. Again, doctors ruled out everything they could think of with common tests. "He was rapidly becoming critically ill," Chiu says. "Within a few days, we actually got the sample, and within 48 hours we were able to run this assay and were able to detect an organism that was likely the cause of his infection." The suspect was a bacterium called Leptospira, which is common in the tropics. The boy, who has an immune deficiency, apparently picked up the microbe while taking a swim during a family vacation in Puerto Rico. The boy recovered after intensive penicillin treatment. So far Chiu has tested this technology in more than 30 cases. He says he and his colleagues have been able to identify an infectious culprit about 25 percent of the time. Some of the remaining cases turned out not to be infections at all, Chiu says. The test is still experimental. It's done in a university setting and each run costs about $1,000 in labor and materials, not counting the expensive machinery. But the price of this technology continues to drop. Chiu hopes in time it will become the go-to analysis when traditional blood tests don't provide the answer. ideastream® is a not-for-profit multiple-media public service organization serving the communities of Northeast Ohio and based in Cleveland, Ohio. ideastream’s mission is to strengthen our communities.
dataset_first_40k.jsonl/36915
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
A student who has studied Japanese for several years recommended this resource to AMSER. The site is an online... see more A student who has studied Japanese for several years recommended this resource to AMSER. The site is an online Japanese-English Dictionary and it is set apart from other dictionary or translation sites because of the ability of a user to look up kanji in more than one way, including drawing them using a java applet. Other useful features include cell-phone friendly pages for Japanese to English translation, and vice versa. For a good introduction on how the site is formulated users should click on �View Documentation� for a good general overview before digging in. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Jim Breen's WWWJDIC Japanese-English Dictionary Server to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Jim Breen's WWWJDIC Japanese-English Dictionary Server Select this link to open drop down to add material Jim Breen's WWWJDIC Japanese-English Dictionary Server to your Bookmark Collection or Course ePortfolio Learning hiragana and katakana is an important part of reading and speaking Japanese. The following pages contain: Hiragana -... see more Learning hiragana and katakana is an important part of reading and speaking Japanese. The following pages contain: Hiragana - stroke order videos, pronunciation, and vocabulary for each character; reading and listening audio exercises; handouts on how to construct words and sentences; interactive quizzes testing character recognition; and printable worksheets to practice writing characters. Katakana - pronunciation and vocabulary for each character; reading and listening audio exercises; interactive quizzes testing character and vocabulary recognition; and printable worksheets to practice writing characters. These materials were developed as part of the Japanese curriculum at MIT for students of all levels to learn and review. Students and instructors are encouraged to incorporate them directly or as supplements in their study of Japanese. Technical Requirements This site is encoded in Unicode (UTF-8); please check your browser settings if characters render incorrectly: Internet Explorer version 6.0+ (Windows) - View → Encoding Safari version 4.0+ (Mac OSX) - View → Text Encoding Firefox 3.0+ (all platforms) - View → Character Encoding Opera (all platforms) - View → Encoding Special software is required to use some of the files in this course: .mov. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Kana to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Kana Select this link to open drop down to add material Kana to your Bookmark Collection or Course ePortfolio Kansai-ben is the most powerful regional dialect in Japan nowadays, spoken by over twenty million people including those in... see more Kansai-ben is the most powerful regional dialect in Japan nowadays, spoken by over twenty million people including those in Osaka, Kobe, Nara and Kyoto. Though the Kansai dialect has linguistically distinctive features from Standard Tokyo dialect, native speakers of Japanese are used to hearing it and usually have little problem understanding it because the dialect is widely used in the entertainment industry and in the media (by Kansai comedians, for example). However, it is a challenge for foreign learners of Japanese to comprehend it since only "standard" Japanese is taught in the U.S. Most students never have a chance to realize the fact that there are big regional differences in how the Japanese language is spoken; they tend to find out only after they go to Japan and experience difficulty understanding what the local people are saying. This site is designed for those who are in or are going to the Kansai area for work, study or travel as well as for those who are simply interested in the cultural, linguistic diversity in Japan. The site will help you to gain basic knowledge of structure and intonation patterns of the Kansai dialect, and to build up basic aural (and a touch of oral) communication skills with Kansai native speakers. By including video clips of interviews to various Kansai local people, this site can also be a helpful resource to examine how this local dialect relates to their local identity. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Kansai Dialect Self-study Site to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Kansai Dialect Self-study Site Select this link to open drop down to add material Kansai Dialect Self-study Site to your Bookmark Collection or Course ePortfolio If you're studying written Japanese, this may help you learn and understand Kanji compounds and characters. Kiki lets you... see more If you're studying written Japanese, this may help you learn and understand Kanji compounds and characters. Kiki lets you browse to learn useful kanji and compounds, rather than searching for a single kanji and viewing it out of context. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Kiki's Kanji Dictionary to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Kiki's Kanji Dictionary Select this link to open drop down to add material Kiki's Kanji Dictionary to your Bookmark Collection or Course ePortfolio LearningLanguages.net is a portal that brings together online foreign language resources for English-speaking K-12 students... see more LearningLanguages.net is a portal that brings together online foreign language resources for English-speaking K-12 students and teachers of French, Spanish and Japanese. The project was created and is maintained and enhanced by staff at the Internet Scout. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material LearningLanguages.net to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material LearningLanguages.net Select this link to open drop down to add material LearningLanguages.net to your Bookmark Collection or Course ePortfolio ״Nihongo o manaboo״, which literally means "Let's learn Japanese״, is a collection of flash based animations for elementary... see more ״Nihongo o manaboo״, which literally means "Let's learn Japanese״, is a collection of flash based animations for elementary and middle school students . They can practice listening, speaking, reading and writing conversations, lines, vocabularies, etc. They can participate in conversations interactively by choosing different answers with different scenarios. The topics cover various items related to school life in Japan. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Nihongo o manaboo (Let's learn Japanese) to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Nihongo o manaboo (Let's learn Japanese) Select this link to open drop down to add material Nihongo o manaboo (Let's learn Japanese) to your Bookmark Collection or Course ePortfolio This textbook is designed for students who have intermediate competency in Japanese, roughly at Level 2 on the ILR (The... see more This textbook is designed for students who have intermediate competency in Japanese, roughly at Level 2 on the ILR (The Interagency Language Roundtable) proficiency scale, and are working on reaching Level 3.This textbook can be used for self-study, as part of online course, and in a traditional classroom setting. It is comprised of four chapters, intended to be covered in one term of a quarter system. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Preadvanced Japanese to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Preadvanced Japanese Select this link to open drop down to add material Preadvanced Japanese to your Bookmark Collection or Course ePortfolio This textbook is designed for students who have intermediate competency in Japanese, roughly at Level 2 on the ILR (The... see more This textbook is designed for students who have intermediate competency in Japanese, roughly at Level 2 on the ILR (The Interagency Language Roundtable) proficiency scale, and are working on reaching Level 3. This textbook can be used for self-study, as part of online course, and in a traditional classroom setting. It is comprised of four chapters, intended to be covered in one term of a quarter system. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Preadvanced Japanese to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Preadvanced Japanese Select this link to open drop down to add material Preadvanced Japanese to your Bookmark Collection or Course ePortfolio This textbook is designed for students who have intermediate competency in Japanese, roughly at Level 2 on the ILR (The... see more This textbook is designed for students who have intermediate competency in Japanese, roughly at Level 2 on the ILR (The Interagency Language Roundtable) proficiency scale, and are working on reaching Level 3. This textbook can be used for self-study, as part of online course, and in a traditional classroom setting. It is comprised of four chapters, intended to be covered in one term of a quarter system. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material Preadvanced Japanese to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material Preadvanced Japanese Select this link to open drop down to add material Preadvanced Japanese to your Bookmark Collection or Course ePortfolio 'RomajiDesu is a free online Romaji/Japanese ⇆ English dictionary which contains the following useful tools for Japanese... see more 'RomajiDesu is a free online Romaji/Japanese ⇆ English dictionary which contains the following useful tools for Japanese learners:Japanese-Romaji-English dictionary: This is the unique English-Japanese dictionary where you just need to type your word into a single input. Your input may be Japanese (that is Kanji Hiragana, or Katakana), Romaji or English. The dictionary will find the appropriate definition and example sentences containing the word for you.English Japanese Kanji dictionary: Include a powerful Kanji lookup form and a easy to use a multiple Kanji radicals (parts) lookup method with beautiful stroke order diagrams and detail information.Romaji to Hiragana converter and Romaji to Katakana converter: It's useful if you know the Romaji form of some Japanese words and want to see how to write it in Hiragana/Katakana. It can also translate the word or phrases to English using Google translate engine.Japanese to Romaji converter (beta): Help you read and lookup the meaning of a Japanese paragraph for you. Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection Name the Bookmark Collection to represent the materials you will add Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time. Edit the information about the material in this {0} Submitting Bookmarks... Select this link to open drop down to add material RomajiDesu to your Bookmark Collection or Course ePortfolio Select this link to close drop down of your Bookmark Collection or Course ePortfolio for material RomajiDesu Select this link to open drop down to add material RomajiDesu to your Bookmark Collection or Course ePortfolio
dataset_first_40k.jsonl/36934
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Nothing short of anarchy REBECCA Harrison was extremely curious when the Australian Security Intelligence Organisation unexpectedly contacted her last month. What the Monash University student and part-time political activist didn't know was that she had been drawn into a new counter-terrorism probe, and that ASIO is investigating possible threats to the G20 economic leaders' meetings to be hosted by Australia in 2014. An ASIO officer rang Harrison on her mobile phone, introduced herself and asked whether they could meet to discuss the issue of ''politically motivated violence''. Harrison, a third-year philosophy student, has been involved in a range of political activities including the Melbourne Anarchist Club, the Occupy movement and environmental activist group Quit Coal. She spoke to other activists and when the ASIO agent rang back, agreed to meet. The meeting took place the next morning at Kafe Mument, near the Monash campus. The female officer was accompanied by an older and apparently more senior, male colleague who did most of the talking. Harrison thought ASIO might want to talk to her about her involvement with Quit Coal, but the the security officers said they wanted to discuss the ''anarchist scene'' in Melbourne. They said they were talking to ''lots of people'' in an effort to understand anarchist viewpoints. Broadly defined as a political philosophy that opposes authority or hierarchical organisation in social and political life, anarchism has become more popular in the past decade as part of the international anti-war, anti-capitalist and anti-globalisation movements. Anarchists were active in the demonstrations and riots that accompanied the G20 finance ministers' meeting in Melbourne in November 2006, and Harrison says ASIO asked her whether there was any support among Australian anarchists for violence as a means to achieve political goals. They were also ''very curious'' about connections between Australian anarchists and similar groups overseas. But the ASIO officers had one specific case they wanted to talk about. They asked Harrison what she knew about Felicity Ann Ryder, another Melbourne activist who had attracted brief media attention in early July. They showed Harrison a couple of news articles about Ryder and asked what she thought about her activities. The daughter of Lyndon and Jenny Ryder, a couple who run businesses in the Victorian town of Rutherglen, Felicity Ryder is a Melbourne University politics and history graduate who has at least five years' experience as an activist in the anarchist movement. Her interests include animal liberation and environmental protest, and involvement with Barricade, an anarchist bookshop and information centre. Other Melbourne-based activists describe Ryder as ''quiet, and quite serious'', ''not someone who drew attention to herself'' and '' a typical young activist [who was] active in a general sense but didn't stand out''. A talented linguist, Ryder has travelled widely and is understood to have worked in the Israeli-occupied West Bank. Her political activities remained low profile until early July this year when media reports from Mexico linked her with an alleged anarchist bomber in Mexico. The bomber, Mario Antonio Lopez Hernandez, was arrested by police on June 27 after he was seriously injured when he accidentally detonated an improvised explosive device on a street in the Coyoacan district of Mexico City. Mexico has a long anarchist political tradition that was given new inspiration by the Zapatista rebellion in Chiapas state in 1994. Anarchist students at the National Autonomous University of Mexico in Mexico City led campaigns against tuition fee rises and Mexican anarchists were prominent in the protests that accompanied the 1999 Seattle meeting of the World Trade Organisation. A series of anarchist bombings took place in Mexico City in 2006 and petroleum pipelines in central Mexico were targeted in 2007. Over the past 18 months so-called ''eco-anarchists'' have also targeted Mexico's growing nano-technology sector with a letter-bomb campaign apparently modelled on the ''Unabomber'' attacks of Theodore Kaczynski in the US. Hernandez is accused of a bombing outside a Mexican Federal Electricity Commission in Tlalpan in June and of planning at least one other explosion. Mexican police allege that Hernandez declared himself an anarchist, a fighter for ''Total Liberation'', and admitted that he used the internet to research how to build the bombs. Ryder was immediately linked to Hernandez when her passport was found in his backpack. The Australian activist had arrived in Mexico last December and reportedly met Hernandez through the internet. In early July Mexican media reported that Ryder had been arrested. This was dramatic news for her parents who were bombarded with media inquiries. However, while the Department of Foreign Affairs and Trade indicated it was aware Ryder was wanted by Mexican authorities, there was no confirmation of her arrest and no request for consular assistance was made. Ryder's whereabouts were unknown, including to her parents, and in the absence of new information, Australian media interest quickly faded. But in a statement posted on the Mexican anarchist website Liberacion Total two weeks later, Ryder confirmed that she hadn't been arrested and expressed her thanks to ''everyone who has worried about me and my situation, to those who have shown solidarity with Mario and I''. Ryder accused the Mexican police of spreading false reports of her arrest. ''If it was to try in vain to break or manipulate Mario, to manipulate my family, or to try to appear half confident in doing their jobs, I don't know,'' she wrote. ''What I do know is that I am proud of being an anarchist, and proud to be an enemy of authority and the state.'' Hernandez, under guard in hospital while his wounds healed, released a statement in which he took responsibility for his actions and denied Ryder's involvement in the bombings. He said ''the problem is that [she] is now implicated'' because they left a backpack at the scene of the attempted bombing and her ID was in it. She was also identified in video recorded by street cameras. Hernandez and Ryder are now heroes for anarchist extremists around the world. In October nine Greek anarchists, members of an ''urban guerilla'' group Conspiracy of Cells of Fire on trial for bombings in Athens, issued a statement that declared ''with our thoughts and hearts, we stand close to anarchist comrade Mario Lopez … and anarchist Felicity Ryder, who chose the clandestine paths and is prosecuted for the same case''. Jenny Ryder has told Fairfax Media that it was ''beyond comprehension to think that our daughter would have had any involvement with violence. ''We as her parents, and her family, have the utmost respect for her beliefs, her commitment to social justice that we know is very close to her heart.'' Whatever the details of Ryder's association with Hernandez, she is clearly regarded by security authorities in Mexico and Australia as a ''person of interest'' in relation to terrorist bombings. Fairfax Media has confirmed that ASIO has pursued a wide-ranging investigation in relation to Ryder, including ASIO officers carrying out inquiries in her home town of Rutherglen. ASIO liaises with its Mexican counterpart, the Centre for Research and National Security (Centro de Investigacion y Seguridad Nacional) and the Australian security agency's inquiries have focused on identifying friends and associates whom Ryder might contact. Ryder has been in intermittent email contact to advise friends and family that she is safe. However, she has not disclosed her whereabouts and has indicated that, on legal advice, she does not intend to present herself to Mexican authorities soon. A warrant has been issued for her arrest by the Mexico City attorney-general and Mexican border security has been alerted. Rebecca Harrison says she couldn't tell ASIO officers anything about Ryder because as far as she could recall, she'd never met her and her own knowledge didn't extend beyond what was in the news articles that they showed her at Kafe Mument. Significantly, however, the ASIO officers were also keen to inquire broadly about the Melbourne anarchist scene, asking who the main leaders and identities were, and what they thought about violent protest. After asking whether there would be any ''solidarity events'' organised in support of Ryder, the ASIO officers said they would be ''very interested'' to learn who organised or attended any such gatherings. Harrison says she told ASIO she knew of no evidence of any inclinations towards violence among Melbourne's anarchist groups. Anarchist extremists have certainly become a focus for law enforcement and security agencies in Europe and North America. In February, the FBI arrested five self-described anarchists for allegedly plotting to blow up a bridge in Cleveland on May Day. Federal Attorney-General Nicola Roxon briefly referred to anarchists as a threat when she was asked on the ABC's Q&A program in April about reports in Fairfax Media about federal police and ASIO interest in environmental activists and anti-coal protesters. ''Peaceful protest is one thing, and sometimes peaceful protest can break the law,'' Roxon said, ''but there is also a lot of industrial sabotage, which gets to a point where it is actually the commission of quite a serious crime,'' she said. ''Unfortunately we do see a growing number of links across some sorts of groups who are anarchist … and intent with committing a terrorist offence that might link in with other protest groups.'' Security sources have told Fairfax Media that international connections between anarchist extremists, facilitated by the internet, are ''a matter of legitimate concern'' and that ''radicalisation'' through contact with overseas extremists is ''something that has to be monitored''. Of particular interest is Australian activist engagement in the potential development of ''Deep Green resistance'', inspired by the writings of American ''anarcho-primitivist'' theorist Derrick Jensen, including the formation of a militant ''underground'' engaged in direct action against economic and energy infrastructure. Australia's hosting of the G20 economic leaders' meeting in Brisbane in November 2014, together with related gatherings in other state capitals, is raised as a particular focus for security planning. ''These international economic meetings are a traditional focus for anarchist extremists,'' a senior law enforcement official said. ''In order to know what the threats might be in 2014, we need to adjust intelligence priorities and open inquiries now.'' Melbourne's anarchist circles can probably expect more telephone calls from ASIO like that received by Rebecca Harrison, and plenty of surveillance they won't ever know about.
dataset_first_40k.jsonl/36937
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
TIBOR KÁRPÁTI Twice already Marie had pointed out the brilliance of the autumnal sun on the perfect field of corn, because the brilliance of the autumnal sun on the perfect field of corn put her in mind of a haunted house—not a haunted house she had ever actually seen but the mythical one that sometimes appeared in her mind (with adjacent graveyard and cat on a fence) whenever she saw the brilliance of the autumnal sun on the perfect etc. etc., and she wanted to make sure that, if the kids had a corresponding mythical haunted house that appeared in their minds whenever they saw the brilliance of the etc. etc., it would come up now, so that they could all experience it together, like friends, like college friends on a road trip, sans pot, ha ha ha! But no. When she, a third time, said, “Wow, guys, check that out,” Abbie said, “O.K., Mom, we get it, it’s corn,” and Josh said, “Not now, Mom, I’m Leavening my Loaves,” which was fine with her; she had no problem with that, Noble Baker being preferable to Bra Stuffer, the game he’d asked for. Well, who could say? Maybe they didn’t even have any mythical vignettes in their heads. Or maybe the mythical vignettes they had in their heads were totally different from the ones she had in her head. Which was the beauty of it, because, after all, they were their own little people! You were just a caretaker. They didn’t have to feel what you felt; they just had to be supported in feeling what they felt. Still, wow, that cornfield was such a classic. “Whenever I see a field like that, guys?” she said. “I somehow think of a haunted house!” “Slicing Knife! Slicing Knife!” Josh shouted. “You nimrod machine! I chose that!” Speaking of Halloween, she remembered last year, when their cornstalk column had tipped their shopping cart over. Gosh, how they’d laughed at that! Oh, family laughter was golden; she’d had none of that in her childhood, Dad being so dour and Mom so ashamed. If Mom and Dad’s cart had tipped, Dad would have given the cart a despairing kick and Mom would have stridden purposefully away to reapply her lipstick, distancing herself from Dad, while she, Marie, would have nervously taken that horrid plastic Army man she’d named Brady into her mouth. Well, in this family laughter was encouraged! Last night, when Josh had goosed her with his GameBoy, she’d shot a spray of toothpaste across the mirror and they’d all cracked up, rolling around on the floor with Goochie, and Josh had said, such nostalgia in his voice, “Mom, remember when Goochie was a puppy?” Which was when Abbie had burst into tears, because, being only five, she had no memory of Goochie as a puppy. Hence this Family Mission. And as far as Robert? Oh, God bless Robert! There was a man. He would have no problem whatsoever with this Family Mission. She loved the way he had of saying “Ho HO!” whenever she brought home something new and unexpected. “Ho HO!” Robert had said, coming home to find the iguana. “Ho HO!” he had said, coming home to find the ferret trying to get into the iguana cage. “We appear to be the happy operators of a menagerie!” She loved him for his playfulness—you could bring home a hippo you’d put on a credit card (both the ferret and the iguana had gone on credit cards) and he’d just say “Ho HO!” and ask what the creature ate and what hours it slept and what the heck they were going to name the little bugger. In the back seat, Josh made the git-git-git sound he always made when his Baker was in Baking Mode, trying to get his Loaves into the oven while fighting off various Hungry Denizens, such as a Fox with a distended stomach; such as a fey Robin that would improbably carry the Loaf away, speared on its beak, whenever it had succeeded in dropping a Clonking Rock on your Baker—all of which Marie had learned over the summer by studying the Noble Baker manual while Josh was asleep. And it had helped, it really had. Josh was less withdrawn lately, and when she came up behind him now while he was playing and said, like, “Wow, honey, I didn’t know you could do Pumpernickel,” or “Sweetie, try Serrated Blade, it cuts quicker. Try it while doing Latch the Window,” he would reach back with his non-controlling hand and swat at her affectionately, and yesterday they’d shared a good laugh when he’d accidentally knocked off her glasses. So her mother could go right ahead and claim that she was spoiling the kids. These were not spoiled kids. These were well-loved kids. At least she’d never left one of them standing in a blizzard for two hours after a junior-high dance. At least she’d never drunkenly snapped at one of them, “I hardly consider you college material.” At least she’d never locked one of them in a closet (a closet!) while entertaining a literal ditchdigger in the parlor. Oh, God, what a beautiful world! The autumn colors, that glinting river, that lead-colored cloud pointing down like a rounded arrow at that half-remodelled McDonald’s standing above I-90 like a castle. This time would be different, she was sure of it. The kids would care for this pet themselves, since a puppy wasn’t scaly and didn’t bite. (“Ho HO!” Robert had said the first time the iguana bit him. “I see you have an opinion on the matter!”) Thank you, Lord, she thought, as the Lexus flew through the cornfield. You have given me so much: struggles and the strength to overcome them; grace, and new chances every day to spread that grace around. And in her mind she sang out, as she sometimes did when feeling that the world was good and she had at last found her place in it, “Ho HO, ho HO!” Callie pulled back the blind. Yes. Awesome. It was still solved so perfect. There was plenty for him to do back there. A yard could be a whole world, like her yard when she was a kid had been a whole world. From the three holes in her wood fence she’d been able to see Exxon (Hole One) and Accident Corner (Hole Two), and Hole Three was actually two holes that if you lined them up right your eyes would do this weird crossing thing and you could play Oh My God I Am So High by staggering away with your eyes crossed, going “Peace, man, peace.” When Bo got older, it would be different. Then he’d need his freedom. But now he just needed not to get killed. Once they found him way over on Testament. And that was across I-90. How had he crossed I-90? She knew how. Darted. That’s how he crossed streets. Once a total stranger called them from Hightown Plaza. Even Dr. Brile had said it: “Callie, this boy is going to end up dead if you don’t get this under control. Is he taking the medication?”
dataset_first_40k.jsonl/36948
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
In an interview with Forbes Magazine, President of ARM, Tudor Brown, revealed that the next sweet treat name for Android after Honeycomb is in fact “Ice Cream”. There seem to be very little chances that he would be mistaken, as ARM’s processors are being used in over 95% of all mobile phones out there. Google has been naming its Android releases after desserts ever since early last year, when it unveiled Android 1.5 Cupcake and the next two versions of Android are also to be named Gingerbread and Honeycomb. So going by this code-name convention of naming releases after desserts, the codename “Ice-Cream” for Android 4.0 does not seem to be too vague. Thus far, Google has used the following dessert names to identify the different versions of Android: Android 1.5 – Cupcake Android 1.6 – Donut Android 2.1 – Eclair Android 2.2 – Froyo [Frozen Yogurt] Android 2.4 – Gingerbread Android 3.0 – Honeycomb The Ice Cream name also makes sense, as there are not too many desserts that begin with the letter “I.” In addition, many have been suspecting for quite a while now that Ice Cream would indeed be used to name the seventh iteration of Android. Google has not, however, said anything regarding this. Since they already have two versions of Android on the way, it is unlikely that Google will reveal any details of Ice Cream for a while. Actually they have not even announced much details about Gingerbread and Honeycomb. Gingerbread is expected to be released before the end of the year and Honeycomb in early 2011. So, Ice Cream likely won’t be introduced until mid-2011. It is not the first time an Android partner divulged such details. Android phone maker Samsung had unveiled the existence of Honeycomb before Google officially announcing it, which suggests that ARM’s President Tudor Brown might have got the name right in the end. via Forbes
dataset_first_40k.jsonl/36951
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
AP Govt. Clarification of Non local & Local Candidates in AP Recruitment AP Clarification of Non local & Local Candidates in DSC Recruitment 1. The Commissioner & Director of School Education area ( Paragraph 6(a) (ii) (iv) for direct recruitment to al the posts in the Andhra Pradesh School Education Subordinate Services and all other similar/ equivalent categories of posts of Teachers under any department of the State Government and for Direct recruitment to all posts of teachers under a local authority or such other under any management, as may be notified by the State Government from time to time, carrying a scale of Pay equal to that of the posts in the Andhra Pradesh School Education Subordinate Services. 2. As per the orders issued by the Government, vide GO Ms No 763, General Administration (SPF A) Department, dated 15/11/1975. Non-local candidates means those who are not local candidates in respect of any of the concerned local areas 3. It is further informed that, the Government have examined the issue of filling up posts of non-locals by the candidates not belonging to the State in the context of the AP Public Employment (OLC&RDR) Order, 1975, and issued clarification vide UO Note No 10934/SPF.A/2001-1, General Administration SPF.A) Department dated 6/10/2001, that against the unreserved posts "all efforts should be made to fill up the posts from among the candidates who belong to the State only except in any very rare and exceptional cases like filling up the post 'ORIYA teachers in Oriya language in the bordering districts of Srikakulam etc, to have uniformity in approach and to have adequate scrutiny, such cases may be referred through the Heads of Departments to the Government with the recommendation of the DSC etc, for appointment of candidates who do not belong to the State, wherever it is considered necessary. 4.That being the rule position prior to bifurcation of state it has been clarified that the 20% posts or as the case may be meant for open category should be filled up only on merit of the candidates belonging to the State of Andhra Pradesh i.e. 23 Districts. On the same analogy, consequent That being the rule position, prior to bifurcation of State, it has been on bifurcation of State, Andhra Pradesh has become a separate State consisting of 13 districts and that 20% of posts or as the case may be meant for Open category, should be filled up only on merit basis either by local or non-local candidates belonging to the State of Andhra Pradesh consisting of 13 districts only, except in a very rare cases as mentioned in the above UO note. Further the Commissioner & Director of School Education, A.P. Hyderabad is also informed t instructions which were issued vide Memo No 29978/PE.SER.II/A1/2012, School Education (PE.SER.Il) Department, dated 20/12/2012 are in accordance with the provisions of Presidential order. 5. A copy of the UO Note No 10934/SPF.A/2001-1 GA (SPF.A) Department dated 6/10/2001 is enclosed and the C&DSC is requested to take necessary action as per the clarification issued above for filling up the posts of Teachers in DSC 2014 6. This clarification is issued in concurrence with GA (SPF.A) Department vide their UO No 17245/SPF&MC/2014 dated 25/9/2014.
dataset_first_40k.jsonl/36959
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
The Glória quartz-monzodiorite: isotopic and chemical evidence of arc-related magmatism in the central part of the Paleoproterozoic Mineiro belt, Minas Gerais State, Brazil. The Glória quartz-monzodiorite, one of the mafic plutons of the Paleoproterozoic Mineiro belt, is intrusive into banded gneisses, amphibolites, schists and phyllites of the Rio das Mortes greenstone belt, in the southern portion of the São Francisco Craton, State of Minas Gerais, Brazil. The Glória quartz-monzodiorite yields a SHRIMP U-Pb zircon age of 2188 +/- 29 Ma, suggesting a tectonic relationship with the pre-collisional phase of the Mineiro belt. According to the Nd isotopic evidence (epsilonNd(T) = -3.4; T DM = 2.68 Ga) the original magmas was formed by a mixture among Archean crustal material and Paleoproterozoic juvenile magma. The Glória quartz-monzodiorite shows metaluminous and calc-alkaline tendency with intermediate K content, comparable to that of volcanic-arc rocks. The primary mineralogical assemblage was partly modified by metamorphism, dated between 2131-2121 Ma in nearby coeval plutons. Such metamorphism is significantly older than the reported metamorphic episodes of the Mineiro belt in the Quadrilátero Ferrífero region (2059-2041 Ma) in the eastern portion of the study area. This evidence, together with chemical and isotopic data from other mafic and felsic plutons coeval with the Glória quartz-monzodiorite, indicate a tectonic and magmatic migration within the Mineiro belt from west to east.
dataset_first_40k.jsonl/36964
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
--- Original Message --- From: "Danna Theriault" <[email protected]> To: Becky Starr <[email protected]>Brian Theriault <[email protected]>Dana Rodriguez <[email protected]>Chet Milligan <[email protected]>Heather & Shawn O'Neil <[email protected]>Jamie Gibson <[email protected]>Jamie Pebworth <[email protected]>Katie Block <[email protected]>Shannon Smith <[email protected]>[email protected] <[email protected]> Cc: Sent: Fri, 12 Oct 2001 09:56:06 -0500 Subject: [Fwd: Fwd: Fw: FW: Yet Another Priceless] > > -- NGFC, [email protected] on 12/10/2001 --------- Inline attachment follows --------- From: <[email protected]> To: [email protected] Date: Friday, October 12, 2001 1:37:30 GMT Subject: Delivered-To: [email protected] From: "cumminsatu" <[email protected]> To: "tom kerr" <[email protected]>, "randall" <[email protected]>, "lori troglin" <[email protected]>, "JASON OWENS" <[email protected]>, "james mynat" <[email protected]>, "james fouts" <[email protected]>, "Cris Finley" <[email protected]>, "bill parky" <[email protected]> Subject: Fw: FW: Yet Another Priceless Date: Thu, 11 Oct 2001 21:29:55 -0500 X-Mailer: Microsoft Outlook Express 5.00.2919.6600 ----- Original Message ----- From: ron lee <mailto:[email protected]> To: [email protected] <mailto:[email protected]> ; [email protected] <mailto:[email protected]> ; [email protected] <mailto:[email protected]> ; [email protected] <mailto:[email protected]> Sent: Thursday, October 11, 2001 4:23 PM Subject: Fwd: FW: Yet Another Priceless >----- Original Message ----- >Subject:FW: Yet Another Priceless > > > > > >This one is good though! > _____ Get your FREE download of MSN Explorer at <http://explorer.msn.com>
dataset_first_40k.jsonl/36973
{ "meta": { "pile_set_name": "Enron Emails" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: How are these pole zero plots created Back around 5 BC, where C stands for the programming language, engineers would photograph their oscilloscope's display to record their test results. This appears to be such a photograph, taken from this Wikipedia article on Elliptic filters. The photo is described as follows: Log of the absolute value of the gain of an 8th order elliptic filter in complex frequency space. The white spots are poles and the black spots are zeroes. There are a total of 16 poles and 8 double zeroes. What appears to be a single pole and zero near the transition region is actually four poles and two double zeroes as shown in the expanded view below. In this image, black corresponds to a gain of 0.0001 or less and white corresponds to a gain of 10 or more. I have seen plots like this many times and always wondered how they were created. In other words, what methods and equipment were used to do this? They even show poles in the RHP, which doesn't make much sense. A: You can follow the links to the Mathematica source code, copy-pasted here: xp2[xi_] := Module[{g, num, den}, g = Sqrt[4*xi^2 + (4*xi^2*(xi^2 - 1))^(2/3)]; num = 2*xi^2*Sqrt[g]; den = Sqrt[8*xi^2*(xi^2 + 1) + 12*g*xi^2 - g^3] - Sqrt[g^3]; num/den]; xz2[xi_] := xi^2/xp2[xi]; t[xi_] := Sqrt[1 - 1/xi^2]; (*Use particular values for low-order functions*) r1[xi_, x_] := x; r2[xi_, x_] := ((t[xi] + 1)*x^2 - 1)/((t[xi] - 1)*x^2 + 1); r3[xi_, x_] := x*((1 - xp2[xi])*(x^2 - xz2[xi]))/((1 - xz2[xi])*(x^2 - xp2[xi])); (*Use nesting property for higher-degree functions*) r4[xi_, x_] := r2[r2[xi, xi], r2[xi, x]]; r8[xi_, x_] := r4[r2[xi, xi], r2[xi, x]]; ellgain[xi_, w_, w0_, ep_] := 1/Sqrt[1 + ep^2*r8[xi, w/w0]^2]; DensityPlot[ w0 = 1; ep = 0.5; xi = 1.05; min = 0.0001; max = 10; Log[Abs[ ellgain[xi, sig + I*w, w0*I, ep] ]], {sig, -4, 4}, {w, -4, 4}, PlotRange -> {Log[min], Log[max]}, PlotPoints -> 100, ColorFunction -> GrayLevel, ClippingStyle -> {Black, White} ]
dataset_first_40k.jsonl/36976
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Tag Archives: Books Post navigation I know I have spoken a few times about how much we all love to read books. I fact my ultimate goal in life is to have enough books – and my own dedicated room – to have my own library… Ambitious I know, but hey, I love books! Nearly half the population struggles without the literacy skills to meet the most basic demands of everyday life and work. There are 46% of Australians who can’t read newspapers; follow a recipe; make sense of timetables, or understand the instructions on a medicine bottle. This statistic makes me so sad for all those people who can not read or stuggle with words. Yet it also makes me extremely happy that I have a family of readers, who can not only follow a recipe, make sense of timetables and read a newspaper, but choose to read for the sheer pleasure a book brings to their lives. For us, the opportunity to read a book is an opportunity to be carried away to a far off time or place. It allows us the privilege of being able to view life through another persons perceptive. It brings far of lands closer to home and the opportunity to step back in time or travel to the future. Every word in every book, brings with it a new experience, an increased level of fulfillment and also contributes to the overall well being of us all. So if you love books, why not share this love in 2012, by involving yourself in one of the following activities (these are just examples, the possibilities are endless!): Read to your children for a minimum of 30 minutes a day or Incorporate a minimum of one hour of reading into your learning week Share a good book with a friend or family member Buy a book as a gift for the birthday party you or your child/ren have been invited too. Well over the last week and a half the children have been busy getting stuck into the Tasmanian Premier’s Reading Challenge for 2011. The challenge runs for ten weeks from the 16th of May until the 22nd of July. The idea is that the children each read ten books – around one a week – for the duration of the challenge. The books can be anything they choose to read that is age appropriate. We however set our own goals and rules for the challenge which differ from the exact rules of the Premier’s Reading Challenge. For Phinee we have decided in consultation with her that she is to read a minimum of 20 books during the course of the challenge- which is roughly 2 books a week. It was agreed that Phinee can choose ten books to read and the other ten books will be chosen by Tata and I. So far Phinee has already read 5 books, 2 of which she has chosen herself and 3 that we designated. As always it is likely that Phinee will finish this challenge way ahead of schedule as she is a very active and strong reader who chooses to read books just for the sheer pleasure of doing it :). As for Nik well the idea is for her is to try and read ten books during the challenge. Being only new to reading and just 5 years of age, We have chosen books for her to read that are engaging and meaningful plus we take the opportunity to read them with her first a few times, before she reads them to us. Already she has read three books for the challenge in just over a week, so we are very confident that she too will complete the challenge in the designated time frame. The girls also love reading books together and here they are with a few of their favourites! Well another week has come and gone. This week has seen us continue on our path of learning and exploring Aesops fables. As part of this we had to make ourselves headbands to depict three characters from the Tortoise and the Hare fable. We then wore the headbands and the girls had to explore the story and possible alternative endings. We read multiple versions of this story written by various authors to understand different view points and perspectives as each story had the same underlying features, but each was also unique in how the story was told. This was a fun and exciting exercise. We talked about events and how different people see them differently and how even though multiple people can experience the same event they can have very different perspectives and viewpoints and recount very different experiences. In following with this theme we have started reading a series of books called ‘My Side of the Story‘. They focus on an event in time and then present two sides to that one event. The first book we read was Escape from War. This book presents two perspectives from two very different children, Frank and Hannah, who are living through the events of the second world war. Their paths are interconnected, yet each has their own unique spin on the war and how it has affected them and their families, and therefore how they perceive it. The book is true to the difficulties faced by children in World War II and is very engaging and informative. The second book we have read is calledThe Plague. It focuses on the bubonic plague as it embraces London in 1665. This story focuses on the lives of two children called Rachel and Robert. They two have interconnected lives, yet each has their own story to tell regarding the plague and how it affects their lives and families. This book is also based on facts about the bubonic plague and provides a very interesting account of what it could have been like to live in London during this frightening event. Both of these book have provided Phinee with access to historical information, as well as two very different perspectives of the same major life changing event as seen through the eyes of children around her own age. This has helped to make the challenges they faced seem more real to her and opened up her knowledge of how far we, as a human race, have come since these early years. Discussions we have had have focused around topics such as medical improvements, health conditions, living conditions, a superior breed of humans, freedom of religion as well as needs of people and how they have changed (or haven’t) over time and so much more. We now can’t wait to read two other books in the series together – Salem Witch and Trouble at the Mill. On Monday we took a trip into Richmond. Richmond is a gorgeous town in Tasmania, full of history, fine dinning, shopping and many little art galleries, specialty shops and tourist attractions such as the Richmond Gaol and The Richmond Bridge. We had wanted to have a picnic in the gardens there, but the weather was not the best, so we just enjoyed a stroll around the town and a look at the local buildings. The girls share my passion for old and interesting architecture, so we had lots to look at. During the week Phinee has written a long letter to one of her penpals Anneke in America and sent it through the post with a few postcards as well as a small gift for her. Now all she has to do is respond to her other penpals in Florida, Hawaii, Alaska and then she might be back on top of her letter writing! She has continued to explore her latest interest in Kings and Queens of England and Scotland. As part of her English work this week she had to envisage herself as being Queen Elizabeth I and write a letter to her father explaining what had occurred since his death. Phinee embraced this challenge and wrote a lovely long letter to King Henry VIII that was full of facts, and feeling and was very engaging to read. This week has seen Nik show more enthusiasm for sit down learning. She loves to do a lot of hands on activities, but getting her to actually sit and do her book work at times can be difficult. She is a real wriggler at times. She has however managed to complete all tasks as given which is all we can ask. Nik is yet to write another letter to her penpal in Florida, but she enjoys receiving letters so much, that I just need to remind her that to receive a letter, she has to actually write back to her friend and then I am sure she will finish her letter and post it this upcoming week Wednesday seen us all enjoy a night out at the local pub for a meal. This is something we have done a few times since moving here. It is always nice to go out and enjoy some one elses cooking, and even more wonderful when you are supporting local businesses, especially when we have so few of them in town! Other things the girls enjoyed this week include netball, dancing and bike riding. We walked around our town of Kempton (originally called Green Ponds) and took some pictures of the town. We enjoyed a morning in Claremont at the park while Tata’s car was getting serviced. We did some cooking, played hopscotch, completed our learning outside in nature and had a great week. Usually I write my weekly updates just for our family, and keep them with all the documentation I usually stow away for our monitoring visits. Sometimes we will reread them just for our own memory lane kind of activity, thus giving us an insight into how far we have come and what we have covered. However we have decided to share these – as often as we can – hopefully weekly with anyone who cares to read them. This week has seen us extremely busy with our reading. Nik has enjoyed the progressive phonics books along with our nightly reading as we read together from the book Disneys Bedtime Stories. This book has fast become a nighttime favourite. Phinee has also enjoyed a good week of reading. It is always hard to try and keep up with not only the names, but number of books she has read in any one particular week. This week she has finished reading The complete collection of the Brothers Grimm’s Fairytales and The Roman Mysteries book 1 -The Thieves of Ostia, however I know that she has read a number of books that I have not written down, which is something I should have done. Note to self for next week – write the names of the books down for future reference! Finally we finished reading our family read aloud bookElizabeth by Katheryn Lasky. This was a very good read and left us wanting to read more. The discussions that occurred through the reading of this book were also very interesting. We discussed the fact that Elizabeth only had one stable person in her young life, which was that of her nanny. The fact that she was never meant to be a queen and what that meant for her in life, as well as how it affected the way her father approached her and her upbringing. We also discussed her relationship with her cousin, Mary Queen of Scots, and how the beheading of her Mother, Anne Boleyn, affected her throughout life, even though she was very young at the time her mother was beheaded Elizabeth was greatly affected by her mothers passing. Phinee can name the order of Henry VIII’s wives, she also can explain the differences between his three children, who are all half siblings, and who their mother’s where. She has learnt the order of the demise of Henry VIII’s wives also…. Divorced, beheaded, died, divorced, beheaded, survived! We are now looking for our next book to read together. Not sure which book that might be…. but we will choose from the following books. I have a sneaking suspicion that as we are studying the Kings and Queens of England and Scotland in depth the winner will be ‘Henry VIII Wives‘, but you never know! Other things we have been up to this week include a lot of cooking. The girls enjoy this kind of activity very much. We have tried a few new recipes as well as some tried and true old favourites. They included choc chip cookies, scouse, rum balls, bean and tomato soup and kotletti. I had taken some photos of the girls cooking, but the memory card in my camera decided to become faulty, so I have lost them. Thankfully I have managed to order a new card and hopefully it will arrive on our doorstep on Monday, so we don’t miss out on photo opportunities too much in the near future. This past week has also seen Phinee get back into the swing of Netball, which started a few weeks ago. She is playing well and keeping on top of the other players she comes up against. So far they have played four games and won two out of four. Nik on the other hand has started dancing up again. She first started dancing a few years ago, but with us moving and different things happening in our lives, it just never stuck. Anyway, Nik has now started her dancing again, which she is very excited about. So we went and purchased her some new pink leather dancing shoes and also some tan Bloch tap shoes. She has her own black leotard and top. The dance schools colours are deep purple and black, so I am hoping to eventually find her a purple top or leotard to mix and match her black dancing clothes. We have started reading and looking at Aesop’s fables. This came about while reading ‘Elizabeth’ as it talks about her reading Aesop’s Fables and actually translating them from Latin into English. We however have just started reading them and trying to take a deeper understanding of certain one’s. I purchased the following book – Literature Pockets, Aesop’s Fablesand we have been using part of it along with our own study pages to explore Aesop’s fables and all they have to offer. The girls are enjoying this, especially Nik. Years ago when Phinee was learning to read, I stumbled across on online website called progressive phonics. This started the whirl wind love affair that I have with this reading program. I found this site as Phinee had struggled through 12 months of learning to read at school and gotten nowhere. The usual system of how children are taught to read these days totally failed her. So in sheer desperation I looked for an alternative method of teaching her to read. So over the Christmas Holidays of 2006 I stumbled across and started implementing progressive phonics. Back then the first few books were free in order to show you what the system offered and then if you wished you could purchase (for around $15 usd) the whole program. So I bought it and six weeks later Phinee was a confident reader and she has never looked back! My Money was more than well spent! Roll on 2011, Now it is Nik’s turn to learn to read. She has always had a keen interest in books and loves to have stories read to her, but now she really wants to be able to read herself. So I brought out the progressive phonics books I used with Phinee and decided to also check out the website to see if any new books were available.. Well wasn’t I pleasantly surprised! Progressive phonics has definably progressed. The books have been rewritten and are now available totally free to anyone who wishes to register and download them! – Thanks to some sponsorship the creator managed to gain 🙂 – absolutely fantastic! So here we are now enjoying the alphabetti books, beginner phonics books and the sheer delight in Nik’s increasing ability to read more and more words. The books are very engaging, yet simple. The illustrations funny and overall the whole program amazing!
dataset_first_40k.jsonl/36978
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
That day, the provider had eight kids in her care. Investigators say one of those children, Joseph Allen, was left behind. He was discovered in an upstairs bedroom more than 35 minutes after firefighters arrived. "Joseph Allen, the young boy that was transported to the hospital from our fire on Valerie Court died from injures he suffered at the fire," Lt. Jason Elmore of Chesterfield County Fire & EMS said.
dataset_first_40k.jsonl/37002
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Property-based or constructor-based dependency injection I just start to study Spring and I have a question: In order to inject a bean, when is it better to use property-based dependency injection: <bean id="myFirstClass" class="..."> <property name="targetProperty"> <bean id="TheBeanIwantToInject" class="..."/> </property> </bean> instead of constructor-based dependency injection <bean id="myFirstClass" class="..."> <constructor-arg ref="TheBeanIwantToInject"/> </bean> or it's just two equivalent solutions? A: If you want to create immutable objects then the constructor-arg variant is the only option. I prefer that one.
dataset_first_40k.jsonl/37010
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
476 F.Supp. 1355 (1979) RANDOLPH ENGINEERING COMPANY, a corporation, Plaintiff, v. FREDENHAGEN KOMMANDIT-GESELLSCHAFT, Defendant. Civ. A. No. 78-870. United States District Court, W. D. Pennsylvania. September 28, 1979. *1356 J. Frank McKenna, III, Thorp, Reed & Armstrong, Pittsburgh, Pa., for plaintiff. Thomas G. Kienbaum, Michael B. W. Sinclair, Dicksinson, Wright, McKean, Cudlip & Moon, Detroit, Mich., for defendant. MEMORANDUM ORDER COHILL, District Judge. Randolph Engineering Company ("Randolph") brought a diversity action in the Western District of Pennsylvania against Fredenhagen Kommandit-Gesellschaft ("Fredenhagen") for damages allegedly arising from Fredenhagen's breach of a contract entered into by the two parties in May, 1977. The contract involved the construction of a conveyor paint line at a Volkswagen assembly plant located in the Western District of Pennsylvania. In early 1977, Volkswagen Manufacturing of America ("VWMOA"), then a Pennsylvania corporation, selected Conveyor Engineering Company, Inc. ("Conveyor") of Michigan as the prime contractor for the installation of material handling equipment at the assembly plant. VWMOA has since merged with *1357 Volkswagen of America, Inc., the latter having its headquarters in Michigan. Conveyor subsequently subcontracted with Fredenhagen, a West German limited partnership. Fredenhagen, in turn, subcontracted with Randolph, a Pennsylvania corporation with offices located in the Western District of Pennsylvania, to install equipment supplied by Fredenhagen. The contract entered into by Randolph and Fredenhagen incorporated several provisions of the contract between VWMOA and Conveyor, including Paragraph 25, entitled "Applicable Law."[1] Randolph filed its complaint against Fredenhagen on August 9, 1978. The defendant responded on November 17, 1978 with a motion to dismiss filed pursuant to Federal Rule of Civil Procedure 12(b). That motion included challenges based on subject matter jurisdiction, personal jurisdiction, venue and failure to state a claim upon which relief can be granted. The defendant's challenge to venue arose primarily from Paragraph 8 of the Randolph-Fredenhagen contract, which provides: "Place of performance as regards delivery and payment as well as place of jurisdiction for both parties shall be Offenbach on the Main." In a Memorandum Order issued on May 15, 1979, this Court denied the defendant's motion to dismiss. On the issue of venue, we held that the defendant's failure to translate Paragraph 8 into English following a request from Randolph to provide a translation of the purchase order resulted in the exclusion of Paragraph 8 from the operative contract. Furthermore, we found that the parties had intended that the VWMOA-Conveyor provision, rather than Paragraph 8, control the issue of a forum for litigation. Finally, we determined that the VWMOA-Conveyor provision did not establish West Germany as the appropriate forum. Fredenhagen filed an answer and a compulsory counterclaim on May 25, 1979. The third defense asserted in the answer resurrected the argument, which this Court had rejected in its Order of May 15, 1979, that Paragraph 8 of the contract required that the plaintiff bring any litigation only in the courts of West Germany. Randolph replied to the counterclaim on June 6, 1979. Two days after the plaintiff filed its reply, Fredenhagen made a motion to dismiss on the ground of improper venue, alleging that Paragraph 25 of the VWMOA-Conveyor contract required that Randolph bring its action in Michigan. In the alternative, the defendant moved this Court to transfer the case to the Eastern District of Michigan pursuant to 28 U.S.C. § 1404(a) (1976). Randolph has opposed these motions, and has requested that this Court order the defendant to pay the plaintiff's attorneys' fees for responding to the motions. After carefully reviewing the parties' briefs and hearing oral arguments, we will deny the defendant's motion to dismiss, the defendant's motion for transfer, and the plaintiff's motion for an award of attorneys' fees. Motion to Dismiss The defendant now asserts that the choice of forum provision in the VWMOA-Conveyor contract controls any dispute arising between Randolph and Fredenhagen, and that the provision makes Michigan the proper forum. Although the defendant's present interpretation of Paragraph 25 may have some merit, the Court need not decide that question. The defendant has waived its instant objection to venue by failing to assert the objection in the initial motion to dismiss filed on November 17, 1978. Federal Rule of Civil Procedure 12(h)(1) provides that a defense of improper venue is waived if omitted from a pre-answer motion made *1358 pursuant to Federal Rule of Civil Procedure 12(b). This provision enforces Rule 12(g), which requires that a party who makes a pre-answer motion under Rule 12(b) include all defenses and objections then available to him that Rule 12(b) permits to be raised by motion. Thus, "if defendant exercises the option afforded by Rule 12(b) and raises certain defenses and objections by preliminary motion, he is bound by Rule 12(g). . . . The rule generally precludes a second motion based on any Rule 12 defense or objection that defendant could have but neglected to raise in his original motion." 5 C. Wright & A. Miller, Federal Practice and Procedure § 1385, at 838 (1969). The consolidation requirement seeks "to eliminate unnecessary delays at the pleading stage of a case by avoiding the piecemeal consideration of pretrial motions." Rauch v. Day & Night Mfg. Corp., 576 F.2d 697, 701 (6th Cir. 1978) (footnote omitted). Fredenhagen made a Rule 12(b) motion on November 17, 1978. Rule 12(h)(1) prohibits it from making a second such motion. The fact that both motions raise a defense based upon improper venue does not deactivate Rule 12(g) and Rule 12(h)(1). The policy concern underlying the consolidation requirement is violated whether the second motion raises a new Rule 12(b) defense or whether it raises a new theory supporting the original Rule 12(b) defense. The defendant urges that Rule 12(h)(1) should not preclude its second motion because it did not know, prior to the Court's Order of May 15, 1979, that the Court would void Paragraph 8 of the contract and would find controlling Paragraph 25 of the VWMOA-Conveyor contract. Fredenhagen therefore argues that the Court should not penalize it for failing to allege in its original motion to dismiss the present objection based on Paragraph 25. This Court's Order of May 15, 1979 brings into question defendant's present position that it could not have reasonably anticipated that the Court would hold controlling Volkswagen's intention through Paragraph 25. That Order states: "Randolph . . . asserts that the parties had agreed that the forum selected by Volkswagen in the terms and conditions of its orders would be the locus where disputes between Randolph and Fredenhagen would be considered. Fredenhagen appears to agree, but disagrees as to the meaning of the Volkswagen language." The defendant had asserted an interpretation of Paragraph 25 that would make West Germany the appropriate forum. In our Order, we found Fredenhagen's interpretation to be "strained, to say the least." When Fredenhagen first argued the issue of venue, it knew that the Court probably would have to interpret Paragraph 25. It also knew that Randolph had urged an interpretation of Paragraph 25 that would make Pennsylvania the appropriate forum. Therefore, the defendant had adequate notice when it first challenged venue that it should assert all interpretations of Paragraph 25 that would render Pennsylvania an inappropriate forum. The defendant should have argued in the alternative, alleging that the contract required the parties to file any actions in the courts of either West Germany or Michigan, but definitely not Pennsylvania. See Fed.R.Civ.P. 8(e)(2). The Federal Rules do not allow a party to delay a case by asserting its arguments seriatim. "Once venue is waived, even by mistake of law, it may not be reasserted. . . . There may be circumstances where, by reason of fraudulent representations or misleading information furnished by a plaintiff, relaxation of the Rule would be justified. Such circumstances are not present here." United Rubber, Cork, Linoleum and Plastic Workers of America, AFL-CIO, Local 102 v. Lee Rubber & Tire Corp., 269 F.Supp. 708, 713-14 (D.N.J.1967), aff'd, 394 F.2d 362, 364 (3d Cir.), cert. denied, 393 U.S. 835, 89 S.Ct. 108, 21 L.Ed.2d 105 (1968). Even if the defendant did not waive its instant objection by failing to assert the objection in its motion to dismiss of November 17, 1978, it definitely waived the venue objection by failing to include that objection in its answer filed on May 25, 1979. Fredenhagen had the benefit of the Court's Memorandum Order ten days before it filed *1359 the answer. Rule 12(h)(1) states that a defense of improper venue is waived "if it is neither made by motion under this rule nor included in a responsive pleading or an amendment thereof permitted by Rule 15(a) to be made as a matter of course." The defendant lost its opportunity to amend its answer as a matter of course when the plaintiff filed a reply to the counterclaim on June 6, 1979, and in any case the defendant failed to amend its answer within twenty days after service—the motion to dismiss filed on June 8, 1979 is not an amended answer. The question of whether Randolph's earlier assertions would estop the plaintiff from arguing that Michigan is not the proper forum does not arise because the defendant can no longer raise an objection to venue. Motion to Transfer Fredenhagen has requested that this Court transfer the case to the Eastern District of Michigan. This Court has the power to order such a transfer pursuant to 28 U.S.C § 1404(a) (1976), which provides: For the convenience of parties and witnesses, in the interest of justice, a district court may transfer any civil action to any other district or division where it might have been brought. Movant first has the burden to show that the plaintiff properly could have initiated the action in the transferee district. In its motion, Fredenhagen alleges that the plaintiff could have filed its suit in the Eastern District of Michigan pursuant to Paragraph 25 of the VWMOA-Conveyor contract, which Randolph and Fredenhagen had incorporated into their contract. A contract provision that specifies a forum for litigation will be recognized unless the court determines that enforcement would be unreasonable under the circumstances. See Central Contracting Co. v. Maryland Casualty Co., 367 F.2d 341, 344-45 (3d Cir. 1966). Cf. Morse Electro Products Corp. v. S. S. Great Peace, 437 F.Supp. 474, 487 (D.N.J. 1977) (parties free to choose venue for litigation of dispute arising from contract provided that jurisdiction chosen has some relationship to parties or contract). Courts occasionally have refused to enforce such provisions. See, e.g., Matthiessen v. National Trailer Convoy, Inc., 294 F.Supp. 1132, 1134-35 (D.Minn.1968); Hawaii Credit Card Corp. v. Continental Credit Card Corp., 290 F.Supp. 848, 851-52 (D.Haw. 1968). Hawaii Credit Card Corp. involved a suit brought in the District of Hawaii by a Hawaii-based franchisee against a California-based franchisor for breach of the franchise agreement. The agreement explicitly provided that the parties could initiate legal action arising from the contract only in the courts of California. The district court found that the forum selection provision was unreasonable "where apparently the target of defendants' agreements and actions was the credit card business of Hawaii, where many witnesses are residents of Hawaii and most of the evidence as to the acts complained of apparently is to be found in Hawaii." 290 F.Supp. at 851-52. More recently, a district judge in Leasewell, Ltd. v. Jake Shelton Ford, Inc., 423 F.Supp. 1011 (S.D.W.V.1976), refused to recognize a forum selection provision that specified that any litigation arising from the contract between a New York-based corporation and a West Virginia-based corporation had to be filed in the courts of New York. In determining that the forum selection provision was unreasonable, the judge examined the following factors: the law that governs the formation and construction of the contract; the residence of the parties; the place of execution and/or performance of the contract; the location of the parties and witnesses probably involved in the litigation; the inconvenience to the parties; and the bargaining power of the parties. 423 F.Supp. at 1015-16. Applying the analysis of these decisions to the instant case, we find that enforcement of the forum selection provision would be unreasonable. First, the language of Paragraph 25 is ambiguous; it does not explicitly identify any jurisdiction. In its first motion to dismiss, Fredenhagen argued that West Germany was the only proper forum under Paragraph 25. Second, Michigan—assuming that Paragraph 25 intended *1360 that Michigan serve as the forum— has only the most tenuous connection with this law suit. Neither party is incorporated or has offices in Michigan. Fredenhagen does have a subsidiary (unrelated to the present action) and legal counsel in Michigan. The contract arose from communication between West Germany and Pennsylvania, and involved work to be performed at a Pennsylvania job site. Logic suggests that most witnesses and evidence are located at Randolph's offices in Pennsylvania, Fredenhagen's offices in West Germany and Volkswagen's Pennsylvania facility. Although Fredenhagen might find it more convenient to litigate in Michigan because of the presence there of a subsidiary and legal counsel, Randolph would suffer substantial inconvenience if it had to transport witnesses, evidence and legal counsel to Michigan.[2] Even assuming, however, that Paragraph 25 made Michigan a proper original forum, this Court still would refuse to transfer the case. Movant must show that considerations of convenience strongly favor the transferee district. See Shutte v. Armco Steel Corp., 431 F.2d 22, 25 (3d Cir. 1970), cert. denied, 401 U.S. 910, 91 S.Ct. 871, 27 L.Ed.2d 808 (1971). Fredenhagen has failed to carry this burden. Contrary to the defendant's contention, the plaintiff has not waived its interest in the Western District of Pennsylvania by arguing earlier that jurisdiction and venue should be determined under Paragraph 25. The plaintiff filed the action in the Western District of Pennsylvania and has maintained throughout that the action should remain in this district; it apparently feels that litigation in the Western District of Pennsylvania is consistent with the contract provision. In any case, Randolph argued for the applicability of Paragraph 25 on the issue of venue—an issue already decided by this Court and not now properly before this Court. Fredenhagen's brief in support of its motion makes only general statements regarding the relative convenience of the Eastern District of Michigan. For example, the brief states: "It is obvious that most of the witnesses necessary to try this case are located in Michigan where they would be subject to service of process . . .." Brief for Defendant at 6. The defendant made no effort to compile a list of specific witnesses and documents. Such general statements fail to satisfy the defendant's heavy burden on the issue of convenience. Looking beyond Fredenhagen's submissions to the facts of the case, this Court has difficulty understanding why most witnesses and documents would reside in Michigan. The action is between a Pennsylvania corporation and a West German limited partnership for breach of a contract involving work to be done on a project in the Western *1361 District of Pennsylvania. The employees of the plaintiff live in the Western District of Pennsylvania, most employees of the defendant live in Germany, and evidence of the contract and damages[3] should be present primarily in the Western District of Pennsylvania. The contract arose, according to the Vice President of Randolph, from correspondence between Pennsylvania and West Germany and from a meeting in Pittsburgh between representatives of the two companies. Affidavit of Robert L. Shaw at 3-6. Randolph's vice president noted that most Volkswagen personnel who might be witnesses are still working at the Pennsylvania facility. Id. at 8. He also stated that two Conveyor employees who might be called as witnesses are believed to reside in Detroit. Id. at 8-9. The presence of two potential witnesses in Detroit, however, does not support the proposition that justice demands a transfer to the Eastern District of Michigan for the convenience of the parties and the witnesses. Robert T. Herivel, an employee of Conveyor who works in Detroit, submitted an affidavit in this case, but it seems unlikely from the nature of his affidavit that either party would call him as a witness on the merits. The necessity for this Court to engage in such speculation, however, is itself determinative on the disposition of the defendant's motion. Fredenhagen apparently wants the case transferred to the Eastern District of Michigan because it has a subsidiary and legal counsel in Detroit, but it failed to make any specific showing that the interest of justice would be served by such a transfer. In light of this failure, this Court must find that the defendant did not satisfy its heavy burden of establishing that considerations of convenience strongly favor the Eastern District of Michigan. Motion for Award of Attorneys' Fees The plaintiff, alleging that Fredenhagen made its motions solely for the purpose of delay, has moved this Court to order the defendant to pay the plaintiff's attorneys' fees associated with responding to these motions. A district judge does have the power to award attorneys' fees on equitable grounds, if a party to litigation acts vexatiously, oppressively or in bad faith. See Alyeska Pipeline Serv. v. Wilderness Society, 421 U.S. 240, 258-59, 95 S.Ct. 1612, 44 L.Ed.2d 141 (1975); Skehen v. Board of Trustees of Bloomsburg St. College, 538 F.2d 53, 57 (3d Cir.), cert. denied, 429 U.S. 979, 97 S.Ct. 490, 50 L.Ed.2d 588 (1976). This power must be exerted sparingly, however. The First Circuit in Cordeco Development Corp. v. Santiago Vasquez, 539 F.2d 256 (1st Cir.), cert. denied, 429 U.S. 978, 97 S.Ct. 488, 50 L.Ed.2d 586 (1976), stated: "Whatever the parameters of the `bad faith' exception, fees should be awarded under its authority only in extraordinary circumstances and for dominating reasons of justice." 539 F.2d at 263 (citations omitted). In a subsequent case, Americana Industries, Inc. v. Wometco de Puerto Rico, Inc., 556 F.2d 625 (1st Cir. 1977), the same circuit held: "Invocation of the bad faith exception to the normal federal rule that attorney's fees may not be recovered requires more than a showing of a weak or legally inadequate case. Doubtless a case can be so frivolous as to reflect impermissible conduct, but we cannot say that the issue is that plain here." Id. at 628. Courts interpret the bad faith exception narrowly because they do not want to chill a lawyer's efforts on behalf of his client. After all, Canon 7 of the ABA Code of Professional Responsibility states that "A Lawyer Should Represent A Client Zealously Within The Bounds Of The Law." Although this Court believes that the defendant's motions lack merit, they are not *1362 vexatious or so frivolous that it can be said that Fredenhagen asserted the motions in bad faith. The defendant did offer reasons to support its position, and the question of a proper forum in this case is complex. AND NOW, to-wit, this 28th day of September, 1979, it is ORDERED, ADJUDGED and DECREED that the defendant's motion to dismiss is denied, the defendant's motion to transfer is denied, and the plaintiff's motion for an award of attorneys' fees is denied. NOTES [1] Paragraph 25 reads in its entirety: Applicable Law—This order and any contract arising from this order, as well as all transactions contemplated hereby, shall be governed by and construed according to the laws of the State from which this order is issued and the courts of the State and the federal courts sitting in the State shall have jurisdiction in all actions arising with respect thereto. Any trade or commercial terms used in this order shall be interpreted in the light of the INCOTERMS 1953 of the International Chamber of Commerce. [2] The Eastern District of Michigan could become a proper original forum only through the application of Paragraph 25. Without that contract provision, the plaintiff could not obtain personal jurisdiction over the defendant in Michigan. The Michigan long-arm statute would recognize sufficient nexus if the law suit arose from the transaction of any business in Michigan or from a contract that provided that the defendant would furnish services or materials in the state. Mich.Comp.Laws.Ann. § 600.705 (West Supp.1968-79). The instant case satisfies neither of these tests, however. VWMOA and Conveyor provide the only ties with Michigan, and neither company is a party to the contract now in litigation. Venue likewise becomes a problem without Paragraph 25. When subject matter jurisdiction rests on diversity of citizenship, 28 U.S.C. § 1391(a) controls venue. That statute provides: "A civil action wherein jurisdiction is founded only on diversity of citizenship may . . . be brought only in the judicial district where all plaintiffs or all defendants reside, or in which the claim arose." Neither Randolph nor Fredenhagen resides in Michigan; Fredenhagen's subsidiary that now does business in Michigan has no relationship with this litigation. A claim arises in a judicial district when, in comparison with other possible fora, the most significant contacts underlying the cause of action occur in that district. See B. J. McAdams, Inc. v. Boggs, 426 F.Supp. 1091, 1103 (E.D.Pa.1977). In comparison to the Western District of Pennsylvania, the Eastern District of Michigan has very few contacts with this cause of action. The personal jurisdiction and venue deficiencies that surface in the absence of Paragraph 25 underscore the unreasonableness of Michigan as a forum for the instant action. [3] The plaintiff alleges in its complaint that it suffered damage when the defendant failed to deliver certain equipment to the Pennsylvania jobsite in a timely fashion and failed to deliver the equipment in the proper sequence. Randolph further alleges that as a result of these breaches of the contract it incurred extra costs for additional labor and supervision required after the scheduled delivery dates, additional field overhead costs, and direct costs resulting from inefficiency.
dataset_first_40k.jsonl/37012
{ "meta": { "pile_set_name": "FreeLaw" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
1. Introduction {#sec1-nanomaterials-09-01352} =============== Cellulose is one of the most abundant biopolymers on Earth, and is mainly of plant, wood and bacterial origin. The cellulose of bacterial origin exhibits the highest purity and has thus attracted the interest of many researchers and industrial sectors. Generally, it consists of randomly assembled, \<100 nm wide ribbon-shaped fibrils, composed of 7--8 nm-wide elementary nanofibrils aggregated in bundles. As such, it delivers a combination of exclusive properties, such as flexibility, high water holding capacity, hydrophilicity, crystallinity, mouldability in different shapes, elevated purity with absence of lignin and hemicellulose and biomimetic three-dimensional (3D) network as a hallmark. Because of these features, this type of cellulose attracts interest for different medical applications such as the engineering of artificial skin (particularly in recuperation of burned skin), artificial blood vessels, topical covering for severe wounds, coverings in nerve surgery, dura mater prosthesis, arterial stent coating, wound dressings, hemostatic material, electronic platforms, implants for cartilage and bone repair etc. For efficient bacterial cellulose (BC) production we need an efficient and stabile bacterial strain with demands for growing that are not too expensive and with ability of being easily scaled up to industrial settings. The produced cellulose is generally easily separated from growth medium and further on modified using different approaches for various medically relevant applications. All these aspects ([Figure 1](#nanomaterials-09-01352-f001){ref-type="fig"}) will be discussed in this review paper. 2. Bacteria Have High Capacity for Cellulose Production {#sec2-nanomaterials-09-01352} ======================================================= BC is nanofibrillar, extracellular polysaccharide produced by diverse bacteria when they are growing statically, but also when bacteria are submerged in liquid and cultured by shaking. Bacteria produce BC in media with different carbon sources, although the efficiency of BC production differs substantially among various growth substrates. The substrate supplies energy to bacterial metabolism during the exhaustive energy-consuming pathway of cellulose synthesis. Theoretically, every carbon block which the bacterial cell metabolizes into glucose, can be used for cellulose production \[[@B1-nanomaterials-09-01352],[@B2-nanomaterials-09-01352]\]. The capacity of BC production is widespread among bacteria, but the most prominent and well-known BC-producer is species *Komagataeibacter xylinus*, which belongs to the group of acetic acid bacteria (AAB). AAB are strictly aerobic Gram-negative bacteria classified into *α-Proteobacteria* \[[@B3-nanomaterials-09-01352],[@B4-nanomaterials-09-01352],[@B5-nanomaterials-09-01352]\]. The species has been for many years known as *Acetobacter xylinum*, but has been later classified into *Gluconacetobacter xylinus* and due to further taxonomic changes finally reclassified into *Komagataeibacter xylinus*. *K. xylinus* is not the only species among AAB with an immense potential for BC production, since also other species, such as *Komagataeibacter hansenii*, *Komagataeibacter medellinensis*, *Komagataeibacter nataicola*, *Komagataeibacter oboediens*, *Komagataeibacter rhaeticus*, *Komagataeibacter saccharivorans* and *Komagataeibacter pomaceti* have been characterized as strong cellulose producers \[[@B4-nanomaterials-09-01352],[@B6-nanomaterials-09-01352],[@B7-nanomaterials-09-01352],[@B8-nanomaterials-09-01352],[@B9-nanomaterials-09-01352]\]. An important aspect of using AAB for cellulose production is their characteristic of being food-grade or GRAS bacteria (generally recognized as safe). BC is synthesized in bacterial membrane from nucleotide-activated glucose \[[@B10-nanomaterials-09-01352]\]. Bacteria then channel BC through pores of cell membrane as fibrils composed of D-glucose units which are linked with β-1,4-glycosidic bonds. The chain is linear and extruded from the cell. Then the lateral and unidirectional aligned chains form intra- and inter-chain hydrogen bonding through all available hydroxyl groups. In this way the chains merge into insoluble nanofibrils of up to 25 nm in width and 1 to 9 μm in length which represents 2000 to 18,000 glucose residues \[[@B11-nanomaterials-09-01352]\]. These nanofibrils further aggregate into \<100 nm wide ribbon-shaped fibrils what delivers a combination of exclusive properties to BC such as high water holding capacity, hydrophilicity, crystallinity and mouldability. Although almost all hydroxyl groups of the cellulose polymer are occupied with hydrogen bonds, one end of each cellulose polymer carries an unmodified C4-hydroxyl group and the opposite end a free C1-hydroxyl group, both of them representing possible sites for chemical modifications of cellulose \[[@B12-nanomaterials-09-01352]\]. Synthesis of nucleotide-activated glucose takes place in bacterial cytoplasm. If the starting substrate is glucose, the uridine diphosphate (UDP)-glucose is produced in three steps: phosphorylation of glucose by glucokinase, isomerization of glucose-6-phosphate into glucose-1-phosphate by phosphoglucomutase and synthesis of UDP-glucose by uridylyltransferase (UTP)-glucose-1-phosphate. Finally, cellulose synthase transfers glucosyl residues from UDP-glucose to the nascent β-D-1,4-glucan chain. Cellulose synthase is a membrane-embedded glycosyltransferase composed of two or three subunits \[[@B13-nanomaterials-09-01352]\]. The catalytic subunit of cellulose synthase is a major determinant of chemical and physical properties of BC, meaning that different bacterial species are able to generate cellulose with different lengths \[[@B14-nanomaterials-09-01352]\]. Comparison of AAB genomes revealed that AAB can possess more operons for cellulose production, moreover, the composition of operons differs from each other \[[@B4-nanomaterials-09-01352],[@B15-nanomaterials-09-01352]\]. These differences very likely influence cellulose synthesis, cellulose transport to the cell surface and/or assembly of fibrils into ribbons \[[@B1-nanomaterials-09-01352]\]. The BC is not the only extracellular polysaccharide secreted by AAB. The other two well-known extracellular polysaccharides, acetan and levan are, however, water soluble \[[@B4-nanomaterials-09-01352],[@B16-nanomaterials-09-01352],[@B17-nanomaterials-09-01352]\]. Interestingly, acetan was first described in species *Komagataeibacter xylinus*. In contract to cellulose, acetan is branched acidic heteropolysaccharide \[[@B18-nanomaterials-09-01352]\]. Ishida et al. \[[@B19-nanomaterials-09-01352]\] identified lower cellulose production in a mutant not producing acetan. However, the cellulose production could be recovered by addition of acetan into the medium, meaning that the synthesis of both polymers is not connected at the genetic level. 3. Different Carbon Sources Used for Bacterial Cellulose (BC) Production {#sec3-nanomaterials-09-01352} ======================================================================== The production of BC is extremely expensive, which is mainly a consequence of high costs of synthetic media for its production. The most well-known complex synthetic medium for growing cellulose producing AAB is Hestrin--Schramm medium (HS), composed of 2% (w/v) glucose, 0.5% (w/v) peptone, 0.5% (w/v) yeast extract, 0.27% (w/v) Na~2~HPO~4~ and 1.15 g/L citric acid \[[@B20-nanomaterials-09-01352]\]. During BC production, other by-products, such as gluconic and other acids are formed, that can decrease the BC yield \[[@B8-nanomaterials-09-01352]\]. The composition of HS medium can be further optimized for the highest cellulose yield by replacing glucose with other carbon sources, such as maltose, fructose, cellobiose, mannitol, xylose, sucrose, galactose etc. In most cases glucose turned out to be the best energy source for bacteria, besides, glucose can be directly used as precursor for the assembly of glucose units into cellulose. Wang et al. \[[@B2-nanomaterials-09-01352]\] have recently reported that fructose had in their microbial process higher cellulose yield in comparison to other carbon sources, also to glucose. The process for BC production can be further optimized by adding buffers into medium for keeping pH at optimal value for growing bacterial strains \[[@B6-nanomaterials-09-01352]\]. To reduce the costs for BC production, the alternative natural carbon sources are utilized, such as waste substrate from different sectors of the food industry, sugar cane molasses etc. The BC yield can be improved also by addition of additives into growth medium such as glycerol, agar, xanthan, sodium alginate, ethanol ([Figure 2](#nanomaterials-09-01352-f002){ref-type="fig"}), carboxymethyl cellulose (CMC), etc. Naritomi et al. \[[@B21-nanomaterials-09-01352]\] reported on enhanced cellulose yield during continuous BC production with *K. xylinus* subsp. *sucrofermentans* BPR3OOlA using fructose medium supplemented with 0.1 wt% of ethanol. The production of cellulose in a static culture with strain *K. xylinus* DA increased about 4-fold as a result of adding 2 wt% acetic acid in glucose medium \[[@B22-nanomaterials-09-01352]\]. Lu et al. \[[@B23-nanomaterials-09-01352]\] reported enhanced BC production with *K. xylinus* in chemically defined medium under static cultivation by the addition of pyruvic acid, malic acid, lactic acid, acetic acid, citric acid, succinic acid, and ethanol ([Figure 2](#nanomaterials-09-01352-f002){ref-type="fig"}) in concentrations 0.15%, 0.1%, 0.3%, 0.4%, 0.1%, 0.2%, 4%, respectively. Li et al. \[[@B24-nanomaterials-09-01352]\] improved cellulose production with the strain *K. hansenii* M2010332 by the addition of ethanol and sodium citrate. Lu et al. \[[@B25-nanomaterials-09-01352]\] reported that the addition of 1% of methanol, 0.5% ethylene glycol, 0.5% of n-propanol, 3% of glycerol, 0.5% of n-butanol and 4% of mannitol produced 21.8%, 24.1%, 13.4%, 27.4%, 56% and 47.3% higher yield of cellulose by culturing strain *K. xylinus* 186 statically in glucose medium. The experiments of Matsuoka et al. \[[@B26-nanomaterials-09-01352]\] showed that the addition of lactate and methionine in fructose medium improved cellulose production with *K. xylinus* subsp. sucrofermentas BPR200. However, the BC yield reached 90% of that obtained in corn steep liquor. There is also a report on improved BC production with *K. xylinus* ATCC 10,245 by adding vitamin C in growth medium \[[@B27-nanomaterials-09-01352]\]. The production of BC in synthetic media with different carbon sources and growth factors, which are usually added as yeast extract and peptone, is expensive. The researchers are thus searching for inexpensive raw material containing high levels of sugars as substrates for BC production. To this aim several raw materials have been analyzed for BC production, such as tobacco waste extract \[[@B22-nanomaterials-09-01352]\], sugar beet molasses, cheese whey media \[[@B23-nanomaterials-09-01352]\], distillery effluent \[[@B24-nanomaterials-09-01352]\], corn steep liquor \[[@B25-nanomaterials-09-01352]\], fruit juice \[[@B26-nanomaterials-09-01352]\], corn stalks \[[@B28-nanomaterials-09-01352]\], litchi extract \[[@B29-nanomaterials-09-01352]\], beverage industrial waste \[[@B30-nanomaterials-09-01352]\], corncob acid hydrolysate \[[@B31-nanomaterials-09-01352]\] and waste beer yeast \[[@B32-nanomaterials-09-01352]\]. Another possible natural growth medium would be waste material from wine production. According to recent reports \[[@B33-nanomaterials-09-01352]\], 1.17 kg of grapes are used to produce 750 mL wine, and after the grapes are squeezed, about 20% of that weight remains in the form of grape skins, seeds and stems, counting for \~12 million tons each year. This substrate contains soluble carbohydrates (white grapes), fibers, acids, salts, and phenolic compounds (red grapes) \[[@B34-nanomaterials-09-01352]\] and as such it is often considered as a convenient source of carbon for microbial processes. Moreover, grape waste as carbon source in BC production may contribute to reduce winery residuals, reduce BC production costs, offering new ways to diversify BC production by taking into account also the environmental aspect by diminishing waste products in nature. The carbon source used for growing BC-producers affects BC properties: water holding capacity, surface area, porosity, polymerization degree, molecular weight, crystallinity index (67%−96%), mean crystallite size (5.7−6.4 nm), intrinsic viscosity, oxygen and water vapor transmission rates, mechanical properties, etc. Molina-Ramírez et al. \[[@B35-nanomaterials-09-01352]\] reported improved BC yield by addition of ethanol and acetic acid in growth medium, however, the crystallinity index, the degree of polymerization and maximum rate of degradation temperatures decreased by 9.2%, 36%, and 4.96%, respectively, by the addition of ethanol and by 7.2%, 27%, and 4.21%, respectively, by the addition of acetic acid. The crystallinity index of BC produced in the presence of ascorbic acid also decreased with remarkable change in d-spacing \[[@B27-nanomaterials-09-01352]\]. However, a recent study of Wang et al. \[[@B2-nanomaterials-09-01352]\] reported similar morphology and microfibrils of BCs from different carbon sources, meaning that these characteristics have to be checked for each bacterial strain before starting BC production at large scale. The production of BC can be simply performed in vessels with large surface area which support direct supply of oxygen and assembly of large cellulose sheets ([Figure 3](#nanomaterials-09-01352-f003){ref-type="fig"}). To improve the efficiency of BC production and to produce cellulose of desired characteristics, different technological approaches can be used ([Table 1](#nanomaterials-09-01352-t001){ref-type="table"}). 4. BC Modifications with Medical Relevance {#sec4-nanomaterials-09-01352} ========================================== 3D structuring of BC within a translucent, gelatinous, interwoven, nano-fibrous network of linear polysaccharide polymers is formed at static conditions, as displayed within [Figure 4](#nanomaterials-09-01352-f004){ref-type="fig"}. In comparison with vegetal cellulose sources, BC demonstrate remarkable mechanical properties, such as flexibility \[[@B42-nanomaterials-09-01352]\] and soft-tissue resembling stress-strain behavior \[[@B43-nanomaterials-09-01352]\], as well as a high level of crystallinity and water-holding capacity. BC is a very pure material where common cellulose associates, i.e., lignin and hemicellulose, are absent. As such, is considered a non-cytotoxic, non-genotoxic and highly biocompatible material. However, BC lacks appropriate functionalities to trigger the initial cell attachment and control over the porosity, and it has very slow degradation, etc. To overcome this, BC has been modified by chemical (modification of chemical structure and functionalities) and physical means (change in porosity, crystallinity and fiber density) by applying versatile in situ and ex situ methods. In situ modifications are performed by the variation of culture media, carbon source and addition of other materials, while ex situ modifications are carried out by chemical and physical treatment of formed BC. Chemical modification rely on inherent chemical reactivity due to the presence of hydroxyl groups, allowing reaction not only at heterogeneous, but also under homogeneous conditions. When compared with plant cellulose, the BC was found to be more reactive towards cynoethylation and carboxymethylation \[[@B44-nanomaterials-09-01352]\]. The homogeneous reaction including dissolving of BC with acetic anhydride and further iodination also reveals the highest reactivity of BC, yet, such a type of modification destroys the nanofibrillar structure. Variation of water content within BC largely influences its viscoelastic and electrochemical properties. Due to increased resistance of BC to electron transfer, it becomes stiff at 50%--80% of water \[[@B45-nanomaterials-09-01352]\]. Such a finding was particularly important in wound dressing applications, where moisture content is an imperative. Addition of water-soluble polymers, such as CMC, methylcellulose (MC), and poly(vinyl alcohol) (PVA), was found to influence the water content of never dried and re-swollen BC \[[@B46-nanomaterials-09-01352]\]. On the other hand, Bottan et al. \[[@B47-nanomaterials-09-01352]\] introduced the guided assembly-based biolitography as technique to change the BC surface topography what is related to migratory patterns and alignments of human dermal cells, the fibroblasts and keratinocytes. Some of modifications and resulting properties of BC are summarized within [Table 2](#nanomaterials-09-01352-t002){ref-type="table"}. 4.1. In Situ Modifications {#sec4dot1-nanomaterials-09-01352} -------------------------- Several studies identify in situ modifications as straightforward approach for introduction of particular functionality to BC by addition of reinforcement material (chitosan, gelatin, poly-3-hydroxybutirate, nanomaterials, clays, silica) to the bacterial culture medium, mostly at the beginning of BC production. The great advantage of such a process is encaging materials that become part of the fibrils, thus enhancing BC by altering mainly the physical--mechanical properties of BC fibrils. Moreover, new functionalities also can be introduced. Recent work of Gao et al. \[[@B65-nanomaterials-09-01352]\] propose in situ introduction of glucose being pre-modified with carboxyfluorescein (6CF), which supplements the BC with green fluorescence signal based on ultraviolet (UV) spectroscopy and confocal microscopy detection as presented by [Figure 5](#nanomaterials-09-01352-f005){ref-type="fig"}. For application in regenerative medicine and tissue engineering, the BC modification emphasis is on extracellular matrix (ECM) recapitulation \[[@B66-nanomaterials-09-01352]\], yet approaches are application-dependent and vastly diverse. Bone tissue engineering requires the presence of a bioactive component like hydroxyapatite Ca~5~(PO~4~)~3~OH (HAp) and tricalcium phosphate (TCP) Ca~3~(PO~4~)~2~ and several research works report on their inclusion within BC culture medium, resulting in BC/hyaluronic acid (HA) composite with high bone regeneration capacity. BC/HA composite prepared in the process of the cellulose biosynthesis with the introduction of aqueous HAp suspension, allows simultaneous formation of microfibrillar stripes and partial texturing of HA crystals onto them \[[@B67-nanomaterials-09-01352]\]. The addition of CMC in growth media modify medium's viscosity and thus positively impacts assembling of calcium-deficient Hap powders formation in post synthetic stage, while not affecting the composite biocompatibility \[[@B68-nanomaterials-09-01352]\]. For vascular tissue engineering applications, the heparin-modified BC was produced by adding heparin to growth media of BC-producers, thus resulting in anticoagulant sulfate groups-enriched BC-heparin hybrid \[[@B69-nanomaterials-09-01352]\]. Other study introduces chitosan to BC trough in situ approach, being further ex situ modified with heparin, ending up with BC/chitosan/heparin composites with antimicrobial and anticoagulant properties \[[@B70-nanomaterials-09-01352]\]. For tissue-regeneration procedures, where porosity is an essential property, the paraffin microspheres were added to BC culture medium, resulting in microporous BC for bone regeneration \[[@B71-nanomaterials-09-01352]\], urinary conduit formation \[[@B72-nanomaterials-09-01352]\], etc. For wound-healing and temporary artificial skin applications, the BC culturing media is supplemented with glucose, dextrin \[[@B73-nanomaterials-09-01352]\], potato starch, cotton gauze, *Aloe vera*, which allows processing of composites, where only morphologies and physical properties are altered and not the chemical composition of BC itself. Addition of deacetylated chitin nanocrystals to BC culture media resulted in composite with bactericidal activity \[[@B74-nanomaterials-09-01352]\], while CMC addition introduced the surface charge, effective for further conjugation to affibody ligands applicable in tubular bio-filtration of blood proteins \[[@B66-nanomaterials-09-01352]\]. Apart from published studies, the critical limitation of the in situ modification approach presents incorporation of reinforcement materials that also have antibacterial activity against BC strains, the insolubility of various materials in culture media, high surface tension towards hydrophobic materials, the lack of structure control of BC nanofibers, and introduction of particles with low suspension stability within BC growing media, etc. In situ modification of BC porosity is not affected by the aforementioned limitations and several studies demonstrate facile procedure for pore size manipulation. As shown by Lu et al. \[[@B60-nanomaterials-09-01352]\], the addition of potato starch to culture medium increases BC viscosity by interrupting BC assembly during static culture and thus creating more free spaces within the fibrous network. Further culturing of muscle cells onto loose surface of produced scaffolds results in new biomaterials for hollow organ reconstruction. The procedure for processing of macro-porous and foam-like BC was recently reported by Rühs et al. \[[@B75-nanomaterials-09-01352]\]; they cultured *K. xylinus* in mannitol-based media by foaming and then stabilized the product with surfactant Cremodan and viscosified with xanthan to prevent water drainage ([Figure 6](#nanomaterials-09-01352-f006){ref-type="fig"}). 4.2. Ex Situ Modifications {#sec4dot2-nanomaterials-09-01352} -------------------------- Ex situ modifications are either chemical (e.g. periodate oxidation and grafting \[[@B76-nanomaterials-09-01352]\] or crosslinking reactions) or physical (physical absorption from solutions or particle suspensions, the homogenization or dissolving of BC mixing with additive material \[[@B77-nanomaterials-09-01352]\]). The BC is compounded with bioactive materials for applications such as tracking of tumor cells behavior \[[@B78-nanomaterials-09-01352]\], enhancement of osteoblasts cell growth in bone regeneration, fibroblast/endothelial cells guide in wound healing, etc. For the replacement of small blood vessels and improvement of the adhesion of human endothelial cells, the BC surface was modified with Arg-Gly-Asp (RGD) tripeptide, directly \[[@B79-nanomaterials-09-01352]\] or indirectly through xyloglucan-Gly-Arg-Gly-As-Ser (XG-GRGDS) conjugates \[[@B80-nanomaterials-09-01352]\]. For blood clothes control, the isolated BC from nata di coco was compounded with different fractions of kaolin \[[@B81-nanomaterials-09-01352]\]. To mimic the glycosaminoglycans of cartilage tissue, the surface charge was added to BC by means of chemical phosphorylation and sulfatation \[[@B82-nanomaterials-09-01352]\]. Incorporation of N-containing groups on BC was succeed by nitrogen plasma treatment, which also improved its porosity and enhanced the attachment of neuroblastoma (N1E-115) and human dermal microvascular endothelium (HMEC-1) cells. For application as a wound dressing, the BC was immersed into chitosan solution, forming BC/chitosan composite with high water-retention capacity \[[@B83-nanomaterials-09-01352]\]. For cardiovascular soft tissue replacement applications, the BC suspension was mixed with PVA, which improves the final mechanical performance \[[@B84-nanomaterials-09-01352]\]. Soaking of BC in silk fibroin solution results in nanocomposite with enhanced cell permissiveness, keeping the non-cytotoxicity and non-genotoxicity as in native BC \[[@B76-nanomaterials-09-01352]\]. For introducing antimicrobial activity against *Escherichia coli*, *Staphylococcus aureus* and *Candida albicans* while keeping biocompatibility of BC towards human embryonic kidney cells, the sodium alginate solution with silver sulfadiazine was mixed with BC slurry and further cross-linked with CaCl~2~ \[[@B85-nanomaterials-09-01352]\]. Different type of nanoparticles were simultaneously formed and introduced into BC- the antimicrobial ZnO \[[@B86-nanomaterials-09-01352]\] and Ag nanoparticles \[[@B87-nanomaterials-09-01352]\], where BC was initially impregnated with zinc acetate and silver nitrate, respectively. The bone morphogenetic protein-2 was introduced into BC to promote the bone regeneration \[[@B88-nanomaterials-09-01352]\]. Other reported BC modifications are gentamicin-, RGD-grafted BC \[[@B89-nanomaterials-09-01352]\], the gelatin-grafted BC using procyanidin \[[@B90-nanomaterials-09-01352]\], phosphorylation \[[@B91-nanomaterials-09-01352]\], etc. The periodate oxidation was used for region-selective oxidation of BC and further coupling with gelatin biopolymer ([Figure 7](#nanomaterials-09-01352-f007){ref-type="fig"}). Such composite demonstrate improved physiological degradation (compared to non-degradable, native BC) as well as capacity for accommodation of flake-like apatite minerals in short-term incubation within supersaturated simulated body fluid (SBF) \[[@B92-nanomaterials-09-01352]\]. 5. BC in Regenerative Medicine {#sec5-nanomaterials-09-01352} ============================== Nanocellulose materials attract significant attention in biomedical materials research \[[@B93-nanomaterials-09-01352],[@B94-nanomaterials-09-01352],[@B95-nanomaterials-09-01352]\] devoted to tissue engineering \[[@B96-nanomaterials-09-01352]\], cell \[[@B97-nanomaterials-09-01352]\] and gene therapy \[[@B98-nanomaterials-09-01352]\], diagnostic \[[@B99-nanomaterials-09-01352]\] and controlled delivery \[[@B100-nanomaterials-09-01352]\], mainly related to their nano-features and properties arising from them. For BC, there is also ultra-high purity and net-like morphology similar to (human) collagen as a biomimetic feature, which facilitates applications such as artificial skin ([Figure 8](#nanomaterials-09-01352-f008){ref-type="fig"}a), vascular grafts ([Figure 8](#nanomaterials-09-01352-f008){ref-type="fig"}b), tissue-engineering scaffolds, dental implants, medical pads, artificial bone and cartilage, delivery of drugs, proteins and hormones \[[@B101-nanomaterials-09-01352]\]. Several commercially available products are available on market, applied during skin transplantation, second and third degree ulcer treatment, decubitus, substitution of dura mater in bran, recovery of periodontal tissues, etc. The biocompatibility assessment of BC implant, by means of chronic inflammation, foreign body responses, cell ingrowth, and angiogenesis evidence no macroscopic signs of inflammation around the implants, absence of fibrotic capsule or giant cells and fibroblasts infiltration without chronic inflammatory reaction \[[@B102-nanomaterials-09-01352]\]. BC efficiency in wound healing generally relies on effective cohesion with wound boundaries, preservation of a moist environment (important for re-epithelization) combined with exudates retention capacity, high mechanical strength at wet state, liquid/gasses permeability, very low risk for irritation due to its ultra-high purity, and ease of wound inspection due to its transparency \[[@B103-nanomaterials-09-01352],[@B104-nanomaterials-09-01352],[@B105-nanomaterials-09-01352]\], etc. In case of chronic wound treatment with BC-based wound dressing materials, the reduction of proteolytic enzymes activity, cytokines and production of reactive oxygen species are reported. ![(**a**) BC dressings as produced and when applied on wounded torso, face and hand. Reproduced from \[[@B106-nanomaterials-09-01352]\], with permission from Biomacromolecules, 2007; (**b**) vascular graft and blood vessel tubes with different sizes and shape, produced by fermentation onto a branched silicone tube. Reproduced from \[[@B107-nanomaterials-09-01352],[@B108-nanomaterials-09-01352],[@B109-nanomaterials-09-01352]\], with permission from Frontiers, 2016, European Polymer Journal, 2014 and Biotechnology and Bioengeneering, 2007, respectively.](nanomaterials-09-01352-g008){#nanomaterials-09-01352-f008} Even though BC possess many insintric features that encourage its use in wound dressing, its commercial dissemination is not exhaustively exploited yet \[[@B104-nanomaterials-09-01352]\]. The first BC-based commercial medical product was Biofill^®^, a thin BC film with a water content of 8.5%. Material is used as a temporary skin substitute and wound dressing in treatment of basal cell carcinoma, severe burns, dermal abrasions, chronic ulcers as well as at donor and receptor sites in skin grafts. Pain relief, close adhesion to the wound bed, spontaneous detachment following reepithelization and reduced treatment times as well as costs, yet limited elasticity, when applied in areas of great mobility, are related to this product \[[@B110-nanomaterials-09-01352]\]. Membracell^®^ is also a temporary skin substitute used in treatment of burns and ulcers, sim providing pain relief, reduced infection, faster healing, etc. Bionext^®^ and Xcell^®^ are wound-dressing materials with similar outcomes \[[@B111-nanomaterials-09-01352]\]. Nanoderm™ is wound treatment product for acute and chronic wounds, allowing a barrier to infections while allowing gaseous exchange, exudate evaporation, and pain alleviation, acting as a regenerative tissue scaffold to affect fibroblast, endothelial and keratinocyte function, enhancing granulation tissue formation and epithelization \[[@B112-nanomaterials-09-01352]\]. The Cellumed^®^ product is used in veterinary medicine for treatment of large surface wounds on horses and \[[@B113-nanomaterials-09-01352]\]. Further incorporation of inorganic (Ag \[[@B114-nanomaterials-09-01352]\], ZnO \[[@B114-nanomaterials-09-01352]\], CuO \[[@B115-nanomaterials-09-01352]\] and TiO~2~ particles \[[@B116-nanomaterials-09-01352]\]) and organic antimicrobial agents (lysozyme \[[@B117-nanomaterials-09-01352]\], ε-poly lysine \[[@B53-nanomaterials-09-01352]\], nisin \[[@B118-nanomaterials-09-01352]\] garlics' allicin \[[@B119-nanomaterials-09-01352]\]), evoke their effectiveness against several bacterial strains (*Staphylococcus aureus* and *Escherichia coli*), as well as fungal strains (*Aspergilus niger* and *Candida albicans*). Abdominal hernia treatment is another application of BC as a dressing material, where better absorption in native tissue with less risk of mesh-related infections, impact and hypersensitivity at the implant site were reported \[[@B120-nanomaterials-09-01352]\]. A recent strategy in treatment of skin injuries is incorporation of mesenchymal stem cells, the adult pluripotent cells that can differentiate more than two cell times \[[@B121-nanomaterials-09-01352]\]. Loh et al. \[[@B122-nanomaterials-09-01352]\] seeded the human epidermal keratinocytes and dermal fibroblasts onto BC/acrylic acid hydrogel and further transferred them to a wound, reporting that the procedure accelerated the healing process. Porosity, mouldability, foldability, hemocompatibility and good mechanical properties are attributes which position BC also in blood vessel replacement applications \[[@B123-nanomaterials-09-01352]\]. Especially in replacement of small blood vessels (\<5 mm) as alternative to thorax or legs-harvested vessels or synthetic Dacron, extended Polytetrafluoroethylene (ePTFE) and polyurethane (PU) materials \[[@B124-nanomaterials-09-01352]\]. Control over porosity is prime requirement, as proliferation and migration of endothelial cells within the membrane is essential when semi-synthetic products are considered. Composite with graphene oxide \[[@B125-nanomaterials-09-01352]\], functionalization with chimeric proteins (conjugates of cellulose binding module and RGD adhesion peptides) \[[@B126-nanomaterials-09-01352]\], blending with PVA polymer \[[@B127-nanomaterials-09-01352]\] are among reported studies where coagulation issues and hemocompatibility are toughly investigated. A commercial product used in the area of guided tissue and bone regeneration is Gengiflex®, the two-layer membrane comprised of native and alkali-modified BC, used for treating the osseous deficiency surround TiAl~6~V~4~ (IMZ) dental implant with simultaneous restoration of the aesthetic and mouth function \[[@B128-nanomaterials-09-01352]\]. This product was shown to support recovery of periodontal tissue by reduced inflammatory response, requiring fewer surgical steps. Saska et al. \[[@B129-nanomaterials-09-01352]\] reported a combination of glycine-modified BC and type I collagen with high alkaline phosphatase (ALP) activity for bone tissue regeneration. For same application, the hydroxyapatite-coated BC was investigated by Ahn et al. and new bone formation within rat calvarian defect model in 8 weeks study was defined as highly promising outcome \[[@B130-nanomaterials-09-01352]\]. Complexation capacity of phosphorylated BC towards calcium was utilized in study of augmentation of mineralization yields and migration of bone-forming osteoprogenitor cells \[[@B131-nanomaterials-09-01352],[@B132-nanomaterials-09-01352]\]. In a recent study, Gorgieva et al. \[[@B92-nanomaterials-09-01352]\] combined BC membrane with gelatin utilizing successive periodate oxidation and a freeze-thawing/carbodiimide crosslinking procedure, which forms µ-porous composite membrane. Acting as a barrier for fibroblast penetration, the membrane did not evoke any cytotoxic effects toward human fibroblast (MRC-5) cells, while the same preferentially attached on a gelatin porous site ([Figure 9](#nanomaterials-09-01352-f009){ref-type="fig"}). In neural tissue engineering, Innala et al. \[[@B133-nanomaterials-09-01352]\] reported that BC adapts to the SH-SY5Y neuroblastoma cells, which adhered, proliferated and differentiated towards mature neurons as measured by electrophysiological data. A study generated a 3D model that can be used for developing in vitro disease models. For example, combining this scaffold with human-induced pluripotent stem cells that have been derived from diseased patients, the 3D model can be used for detailed investigations of neurodegenerative disease mechanisms and in the search for new therapeutics \[[@B133-nanomaterials-09-01352]\]. The absence of suitable polymers and proteins, and the presence of low endotoxin units (according to the U.S. Food and Drug Administration (FDA) legislation), further expands the BC application portfolio towards drug-delivery applications \[[@B134-nanomaterials-09-01352],[@B135-nanomaterials-09-01352]\], especially to tuning the drug release kinetic and optimization of drug concentration. Amin et al. \[[@B136-nanomaterials-09-01352]\] reported pH sensitive hydrogel formulations of BC with polyacrylic acid and bovine serum albumin as a model drug. Another study investigate BC membranes with added photosensitizer, chloroaluminum phthalocyanine for photodynamic therapy in skin cancer treatment \[[@B137-nanomaterials-09-01352]\]. Other cellulosic fibers (nitrocellulose in particular) have a long history as anchoring substrate for antibody conjugation in diagnostic assays \[[@B138-nanomaterials-09-01352]\], where also the BC appear as suitable candidate. Major effort in this area is given to processing on homogenous, 3D films in order to increase the quantity of antibodies to be further anchored. BC combination with PVA was investigated as artificial cornea \[[@B61-nanomaterials-09-01352]\] and aortic heart valve leaflet \[[@B139-nanomaterials-09-01352]\]. Tronser et al. \[[@B140-nanomaterials-09-01352]\] identify BC as convenient material enabling for long-term maintenance of mouse embryonic stem cells, simultaneously facilitating their culturing and handling. 6. Perspectives and Challenges for BC {#sec6-nanomaterials-09-01352} ===================================== BC offers an inestimable platform for development within the biomedical field, especially towards high-tech products, from nursing and diagnostic to theranostic and highly demanding regenerative, tissue-engineering products. However, more effort needs to be made in initial production steps and the fact that AAB productivity towards BC production varies strongly among different species and strains, as well as the carbon source, opens room for additional basic research input in this area. Traditional carbon sources in BC production are glucose, fructose and glycerol, which significantly increases expenses, presenting \~30% of total BC production costs. The industrial wastes or by-products have recently been proposed as cheap local sources for BC production. Some examples are corn steep liquor (CSL)-fructose medium, which is a fully enriched medium with minerals, inositol, nicotinic acid, thiamine and pantothenic acid. Date syrup and molasses are other alternatives, being highly competitive with traditional Hestrin--Schramm and Yamanaka media in BC production. Alternative carbon sources, (i.e., what straw, fruit juices, rotten fruit, waste from cotton textiles, dairy industries, biodiesel industries are already suggested) may potentially enlarge, speed up and cheapen BC production. As such, they have not been fully explored to the stage of semi-final, biomedical products. This in turn will seek more facile, cost-effective and industry-translatable modifications beyond standard post-synthetic oxidation and grafting pathways. Potential "housing" of selected and suitable biopolymers or particulates within BC during the synthetic procedure while keeping in mind no restricted BC production is one way to tackle the problem. Silvo Hribernik for SEM images and Nina Jančič for photography of BC product. Conceptualization: S.G. and J.T.; investigation: S.G. and J.T.; resources: S.G. and J.T.; writing---original draft preparation: S.G. and J.T.; writing---review and editing: S.G. and J.T.; visualization: S.G. and J.T.; supervision: S.G.; project administration: S.G.; funding acquisition: S.G. The authors acknowledge the project (Z7-7169) and programs Textile chemistry (P2-0118 (B)) and Physico-Chemical Processes on the Surface Layers and Application of Nanoparticles (P2-0006), under financial support from Slovenian Research Agency. The authors declare no conflict of interest. ![Scheme presenting the most important aspects which have to be considered for bacterial cellulose (BC)-production with biomedical application.](nanomaterials-09-01352-g001){#nanomaterials-09-01352-f001} ![Influence of different organic acids and ethanol on cellulose yield. Reproduced from \[[@B21-nanomaterials-09-01352]\] with permission from Research & Reviews: Journal of Microbiology and Biotechnology, 2016.](nanomaterials-09-01352-g002){#nanomaterials-09-01352-f002} ![Static production of cellulose by *Komagataeibacter maltaceti* 1529^T^ on complex microbiological medium.](nanomaterials-09-01352-g003){#nanomaterials-09-01352-f003} ![Different length-scale presentation of BC: (**A**) photographs of wet (left) and dry (right) BC membrane, (**B**) confocal fluorescent microscopy (CFM) image obtained under argon laser excitation at 458 nm from bright field and fluorescence channel, utilizing the cellulose autofluorescence and (**C**) high magnification scanning electron microscopy (SEM) image presenting entrapped *K. xylinus* bacteria and cellulose backbone insert.](nanomaterials-09-01352-g004){#nanomaterials-09-01352-f004} ![Synthesis of 6CF-BC by in situ microbial fermentation method, using glucose (Glc) modified with 6CF as a carbon source for *K. sucrofermentans* fermentation. (**a**) Glc and 6CF-Glc molecules; (**b**) microorganism fermentation; (**c**) the synthesis of 6CF-BC fibers through *K. sucrofermentans*, (**d**) microstructure of 6CF-BC; (**e**) the 6CF-BC pellicle obtained through microorganism fermentation. Reproduced from \[[@B65-nanomaterials-09-01352]\], with permission from Nature Communications, 2019.](nanomaterials-09-01352-g005){#nanomaterials-09-01352-f005} ![Schematic presentation of the BC foam formation process by *K. xylinus* suspension foaming and stabilization by Cremodan and xanthan as a thickener. Reproduced from \[[@B75-nanomaterials-09-01352]\], with permission from npj Biofilms and Microbiomes, 2018.](nanomaterials-09-01352-g006){#nanomaterials-09-01352-f006} ![Scanning electron microscopy images of (**A**) native and post-synthetically modified BC; (**B**) oxidation with NaIO~4~; (**C**) further coupling with gelatin (GEL), carbodiimide crosslinking and freeze-thawing; (**D**) in situ mineralization by incubation in (10× concentrated) simulated body fluid medium. Adapted from \[[@B92-nanomaterials-09-01352]\], with permission from Nanomaterials, 2019.](nanomaterials-09-01352-g007){#nanomaterials-09-01352-f007} ![(**a**) Fluorescent microscopy images of top, bottom and cross-section aspect of BC-gelatin composite membranes; (**b**) their degradation kinetic; (**c**) barrier effect towards MRC-5 cells. Adapted from \[[@B92-nanomaterials-09-01352]\], with permission from Nanomaterials, 2019.](nanomaterials-09-01352-g009){#nanomaterials-09-01352-f009} nanomaterials-09-01352-t001_Table 1 ###### The most common methods for bacterial cellulose (BC) production. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Method for BC Production Basic Characteristics of The Process and The Cellulose -------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------- Static production \[[@B36-nanomaterials-09-01352]\] Most commonly used method at the lab scale.\ Duration of the process is up to two weeks.\ Cellulose is in the form of hydrogel sheet. Production in shaking culture \[[@B37-nanomaterials-09-01352],[@B38-nanomaterials-09-01352]\] Increased delivery of oxygen to bacteria.\ Might result in reduced genetic stability of bacteria and lower BC production.\ Production of cellulose of different particle sizes and various shapes (mainly of spherical structure).\ Suitable for economic scale production. Production in airlift bioreactor \[[@B38-nanomaterials-09-01352],[@B39-nanomaterials-09-01352]\] Efficient oxygen supply with low power supply.\ Cellulose produced in pellet. Production in rotating disc bioreactors \[[@B40-nanomaterials-09-01352]\] Production of homogenous cellulose.\ Cellulose yield is compared to the static process. Production in trickling bed reactor \[[@B41-nanomaterials-09-01352]\] Provides high oxygen concentration and low shear force.\ Produce BC in form of irregular sheets. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- nanomaterials-09-01352-t002_Table 2 ###### Modifications of BC and resulting properties. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Modification Application Resulting Properties --------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------- BC nanocrystals/Regenerated Chitin fibers (BCNC/RC) \[[@B48-nanomaterials-09-01352]\] Suture biomaterials Biocompatible surgical sutures increasing strength of BCNC/RC filaments;\ Enzymatic degradation possible;\ Degradation rate can be tuned by varying concentration of BCNCs in the yarn;\ Chitin can promote cell proliferation (in vivo). BC with modified topography \[[@B47-nanomaterials-09-01352]\] Wound dressing Improved cell alignment;\ Promotion of fibroblast infiltration and new collagen deposition in the wound bed. Vaccarin impregnated on BC \[[@B49-nanomaterials-09-01352]\] Neovascularization;\ Stratified squamous epithelium;\ Dense new- born subcutaneous tissue formation of collagen fibers and hyperplastic fibrous connective tissue. 2,2,6,6-Tetramethylpiperidinyloxy (TEMPO)-Oxidized BC with Ag nanoparticles \[[@B50-nanomaterials-09-01352]\] Antimicrobial activity;\ Ag^+^ release with a rate of 12.2%/day at 37 °C in 3 days;\ Biocompatible. BC/ZnO nanocomposite \[[@B51-nanomaterials-09-01352]\] Antimicrobial activity against *Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus* and *Citrobacter freundii;*\ Significant healing of 66% after 15 days related to day 0. BC/TiO~2~ nanocomposite \[[@B52-nanomaterials-09-01352]\] Antimicrobial activity against *Escherichia coli* and *Staphylococcus aureus.* BC/ε -poly-L-Lysine (ε-PLL) nanocomposite \[[@B53-nanomaterials-09-01352]\] Antimicrobial activity (broad-spectrum) without affecting the beneficial structural and mechanical properties;\ Modification with non-toxic biopolymer\ ε-PLL inhibited growth of *S. epidermidis* on the membranes but did not affect the cytocompatibility to cultured human fibroblast. BC/Ag nanoparticle composite \[[@B54-nanomaterials-09-01352],[@B55-nanomaterials-09-01352]\] Environmentally benign and facile approach;\ Sustained release of Ag;\ Prolonged antibacterial performance against *Staphylococcus aureus.* Silymarin (SMN)-zein nanoparticle/BC nanocomposite \[[@B56-nanomaterials-09-01352]\] Change of wettability and swelling;\ Antioxidant and antibacterial activity;\ Air-dried SMN-zein/BC nanocomposite slow down the lipid oxidation. BC/Octenidin/Poloxamer hybrid system \[[@B57-nanomaterials-09-01352]\] Drug deliveryWound treatment Long term controlled release of octenidine; Improved mechanical and antimicrobial properties;\ Ready-to-use system with Poloxamer-loaded BC for advanced treatment of infected wounds;\ Non toxicity in test with shell-less hen's egg model. BC/CMC/Methotrexate \[[@B58-nanomaterials-09-01352]\] Impact of DS-CMC on methotrexate loading;\ Topical treatment of psoriasis;\ Decrease of the elastic modulus as the degree of substitution (DS) of CMC increased; BC/PHEMA Hydrogel matrice \[[@B59-nanomaterials-09-01352]\] Biomedical application New modification: in situ ultraviolet (UV) radical polymerization; Tensile strength increased;\ Nontoxic;\ Rat mesenchymal stem cells (rMSCs) proliferation;\ Tissue replacement and wound healing. BC with tuned porosity \[[@B60-nanomaterials-09-01352]\] Tissue engineering Higher pore size than native BC to allow muscle cell ingrowth;\ Small decrease in mechanical strength. BC/PVA composite \[[@B61-nanomaterials-09-01352]\]\ Artificial cornea Higher visible light transmittance than plain BC. BC/Hyaluronic acid (HA) \[[@B62-nanomaterials-09-01352]\] BC/urinary bladder matrix \[[@B63-nanomaterials-09-01352]\] Retinal pigment epithelium Higher adhesion and proliferation of retinal pigment epithelium cells than uncoated BC;\ Closer recapitulation of the *in vivo* cell phenotype than uncoated BC. BC/iron oxide nanoparticles \[[@B64-nanomaterials-09-01352]\] Blood vessels Introduction of magnetic domains;\ Young\'s modulus correspond to values for blood vessels. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
dataset_first_40k.jsonl/37013
{ "meta": { "pile_set_name": "PubMed Central" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Multicast between applications on the same host From what I've read, it should be possible for two applications on the same host to be able to send and receive datagrams via multicast. I was trying to implement this, using the following Java code (which is a slightly modified version of what is given in the Javadoc for MulticastSocket): public static void main(String[] args) throws IOException{ NetworkInterface nic = NetworkInterface.getByName("wlan4"); int port = 6789; InetAddress group = InetAddress.getByName("228.5.6.7"); MulticastSocket s = new MulticastSocket(port); s.setNetworkInterface(nic); s.joinGroup(group); if(args.length > 0 && args[0].equals("send")){ System.out.println("SEND MODE"); String msg = "Hello"; DatagramPacket hi = new DatagramPacket(msg.getBytes(), msg.length(), group, port); s.send(hi); }else{ byte[] buf = new byte[1000]; DatagramPacket recv = new DatagramPacket(buf, buf.length); System.out.println("RECEIVE MODE"); s.receive(recv); System.out.println(MessageFormat.format("Received: {0}", new String(recv.getData()).trim())); s.leaveGroup(group); } } If I run the above code, giving send as input argument, the program executes just fine, it sends the packet and then terminates. However if I want to receive a packet, the program is blocked by the receive method as it never gets a datagram. I tested this by running multiple instances of the application on my machine, both with one and several receivers and one sender. Non gets any message at any time. If I, on the other hand let the application receive what it just sent (by running the receive method unconditionally of wheter the application is sending), it works fine for that application alone. This triggers me to believe that the JVM instance has an exclusive bind on that socket, disallowing others to use it (even if the option getReuseAddress() returns true for MulticastSockets). I'm running under Windows 10, and have verified that the UDP packet gets sent to the network using Wireshark, so I figured it has to do with that the packet is not delivered to the two applications. What can I do in order to allow two applications to communicate over multicast on the same port number? EDIT: The overall idea is for a server to send a datagram to all listening clients on the network chosen (hence why the NIC is specified in the example as "wlan4"), irrespectively of where they are executed (e.g. on the same host as the server or not). A: After some debugging, I realized that I could receive multicast packets from several applications if the application itself were sending and receiving multicast datagrams. It turns out that sending a packet to the multicast group somehow triggers this functionality. It seems like a bug to me. However, in order to get the above example work as expected, I had to send (and discard) a first datagram to the multicast channel. I did this in the most simple way, by changing the else block to the following: byte[] buf = new byte[1000]; DatagramPacket recv = new DatagramPacket(buf, buf.length); s.send(new DatagramPacket("A".getBytes(), 1, group, port)); s.receive(recv); System.out.println("RECEIVE MODE"); s.receive(recv); System.out.println(MessageFormat.format("Received: {0}", new String(recv.getData()).trim())); s.leaveGroup(group);
dataset_first_40k.jsonl/37016
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: How to create a view which would list related content for current article? I try to create a view which would list related content (some articles) to a content type article. Here is what i’ve done. I’ve created a field "Entity reference" in the content types "Article". It works. I can see in database the related article ID . Then, I create a view with a block. It works, i can see all articles listed in that view (which is visible on each article). Here is my issue. I need to display only articles related to the current article. So, in contextual filter, i have tried with Content: ID and also tried with advanced/Relationships but without success. I don’t see my related articles. How can I do ? I’ve also tried a different way (create a twig) and even if it works, it is not the best solution i think A: Ignore using fields in the View. This has been and will always be problematic IMO for 95% of Views people are making. You need the Content ID argument from the URL so the correct node is selected, but here is where it takes a turn: Set the view to show "Content" and give it a view mode, for instance, create a view mode called "Related Content" for nodes. In the field display for that view mode, only set the "Related Articles" field to be visible. Set its field formatter to "Rendered Entity", and create a view mode for that content type and theme it. On that content type, you would have title and body, or whatever fields you want to show (hard to tell without seeing a design). Now the View will pull the node, render it, and in turn render the nodes that are being referenced in a view mode. Then, you would get something like this, for example: That is a View that looks at the current node, and renders it. The view mode has a field (Related Content), which is a node reference, and those nodes are rendering in a "Preview" view mode - and this is the result. All of the markup lives in two twig files (for the node--node-type--view-mode.html.twig) and the Views configuration is super simple. The Views display would be a block, and you can place that block in whatever region works for you.
dataset_first_40k.jsonl/37028
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
// // StockSeries.h // BBChart // // Created by ChenXiaoyu on 15/1/8. // Copyright (c) 2015年 ChenXiaoyu. All rights reserved. // #import "Series.h" @interface StockSeriesPoint : NSObject @property (nonatomic) CGFloat open, close, low, high; @end @interface StockSeries : Series -(void) addPointOpen:(CGFloat)o close:(CGFloat)c low:(CGFloat)l high:(CGFloat)h; @end
dataset_first_40k.jsonl/37029
{ "meta": { "pile_set_name": "Github" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Effects of calcium on the heterogeneity of the Na+, K+-ATPase forms in rat heart. The sensitivity of the Na+, K+-ATPase to ouabain has been studied in sarcolemma vesicles isolated from normal rat heart. Two enzyme forms exhibiting high and low sensitivities to ouabain have been observed in Ca2+-free perfused heart. The half-maximal inhibitory effects occurred with 1-2 X 10(-8) M ouabain. The high sensitivity form undetectable in hearts maintained at a physiological Ca2+ level might represent altered low affinity sites or latent enzyme forms unmasked by low calcium concentrations. The heterogeneity of the Na+, K+-ATPase forms was found to be also modulated by the K+/ouabain antagonism, addition of K+ accentuating the heterogeneity. These in vitro results associated with in vivo experiments on isolated rat heart working under isovolumic conditions suggested that lowering Ca2+ has qualitative and quantitative effects. Low Ca2+ concentrations increased the sensitivities to ouabain and the amplitudes of both the enzyme inhibition and the positive inotropic effects.
dataset_first_40k.jsonl/37032
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Capitation in dentistry: a quasi-experimental evaluation. Two matched samples of 245 patients were drawn from solo dental practices which contained both capitation and fee-for-service components. All services rendered to patients during their entire time under care of the practice were recorded and analyzed. Results indicate different styles of care under the two payment mechanisms. An improved preventive style was associated with capitation, as well as fewer fillings. Outcome measured by a modification of the DMF (decayed-missing-filled) Index was also more favorable under capitation.
dataset_first_40k.jsonl/37035
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Vahl’s wife, Mary, who was at the restaurant as well, posted about her experience on social media, and as of Sunday night the post had been shared more than 4,400 times and generated nearly 3,000 comments.
dataset_first_40k.jsonl/37041
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
She only stayed a couple of years, I think. She got married and her husband worked for Bell Labs in America, and she went with him and obtained a job with IBM writing in Fortran. + She only stayed a couple of years, I think. She got married and her husband worked for Bell Labs in America, and she went with him and obtained a job with IBM writing in [[FORTRAN]]. ===Writing the Braille program for LEO=== ===Writing the Braille program for LEO=== Line 1,633: Line 1,633: Whereas you might be completely stuck, otherwise. “Oh, why doesn’t it do that? Oh, well, yes, it’s the way it’s programmed.” Like when people say, “Oh, the program is an electronic brain”: it’s not! It only does what the programmers planned it to do. Whereas you might be completely stuck, otherwise. “Oh, why doesn’t it do that? Oh, well, yes, it’s the way it’s programmed.” Like when people say, “Oh, the program is an electronic brain”: it’s not! It only does what the programmers planned it to do. About Betty Cooper Betty Cooper was born and raised in Raynes Park, England. She began working for J. Lyons & Co. where she was quite involved in both the LEO I and LEO II computer projects that would change the field of business and computing. As one of the first few women programmers of both computer projects, Cooper was a pioneer in the field of business computer programming. She also wrote the Braille program for the LEO projects. In this interview, Cooper talks about growing up in Raynes Park, how she got involved in computing at J. Lyons & Co., and working on both the LEO I and LEO II projects. She also reflects on both of the projects and the status of women in computing today. Cooper also talks about her family life, completing programming working from home, and the progress of the field as a whole. About the Interview Interview # 585 for the IEEE History Center, The Institute of Electrical and Electronics Engineers, Inc. Copyright Statement This manuscript is being made available for research purposes only. All literary rights in the manuscript, including the right to publish, are reserved to the IEEE History Center. No part of the manuscript may be quoted for publication without the written permission of the Director of IEEE History Center. Request for permission to quote for publication should be addressed to the IEEE History Center Oral History Program, 39 Union Street, New Brunswick, NJ 08901-8538 USA. It should include identification of the specific passages to be quoted, anticipated use of the passages, and identification of the user. It is recommended that this oral history be cited as follows: Betty Cooper, an oral history conducted in 2001 by Janet Abbate, IEEE History Center, New Brunswick, NJ, USA. Interview Background and Education To begin at the beginning, can you tell me when you were born and where you grew up? Cooper: When I was born: 1930. Abbate: And where did you live? Where did you grow up? Cooper: Raynes Park. It’s a suburb of Wimbledon, which is on the opposite side to where the tennis is. Abbate: What did your parents do for a living? Cooper: My father was an accountant, but he didn’t have any written qualifications. His parents were tailors. In fact, they were German tailors. They came over to London in the late 19th century, because there was work there and there wasn’t in Germany. My mother’s parents: her grandparents were also tailors from Germany, but her mother—I’m not sure if she had a job, or whether she was just married. Her father was a hairdresser, a men’s hairdresser. Abbate: Did your mother work? Cooper: She had secretarial training and worked as a typist for a solicitor firm. She was sent to Berlin in 1913 to perfect her German; there she worked as a nurse and remained in Berlin for the duration of the war. After returning she again worked as a typist until she married in 1923. But of course, once they were married, the rule was: women didn’t work; they stayed at home. She actually had five children; the first one was still-born. They moved to Raynes Park, where they had a flat for a couple of years, I think, and then bought a house. Abbate: Where were you in the family? Cooper: I’m the third living one. Abbate: And you said you had one brother and two sisters? Cooper: One brother, and a sister older, and a sister younger. Abbate: What kind of schools did you go to? Cooper: An infants school—the equivalent of a primary school—and a junior school. I was eight and a half when the war started. I think that school was evacuated, so we went to another school nearer in to Wimbledon; it was similar. Then there was the eleven-plus exam, at that time. You can have two attempts: my sister passed the first time, and went to the local grammar school. I was a little bit younger than her when I took it. I passed the entrance exam, and went to the grammar school. Then I had a chance to take the exam for a second time in order to waive the fees, and I passed, which meant no more fees. [Cooper had commented before the interview that “in those days,” most parents would only pay for their sons’ schooling, not their daughters.’] Abbate: So the eleven-plus is an exam you take to . . . Cooper: To go to grammar school; yes. Abbate: To go to grammar school without paying? Cooper: Yes. Abbate: And there was a separate entrance exam you could take, but then you’d have to pay the fee if you didn’t pass the eleven-plus? Cooper: Yes. Abbate: Did you have an interest in math or science as a child? Cooper: I was always good at math. Not so good at written English, but I suppose I got by. Abbate: And did you have any plans for what you would do with this? Did you think you’d go on? Cooper: Well, not really. I could have gone on; I mean, if we could have afforded it, I could have gone on to university and taken a math degree. But we couldn’t, so I decided—well, what else was there? There was accountancy, which you could learn on the job, and go to evening classes. Now, my elder sister was a bit annoyed at not going to university. She got a job with a technical firm, and took a General Science degree by evening classes. My brother trained as an electrical engineer, in London. He was at university; but he got a scholarship, so that helped with the fees. Abbate: It sounds like your whole family got into technical fields. Cooper: Yes. Well, my younger sister was trained as a nurse, and she ended up as a District Nurse. She’s now retired. Abbate: Did your parents encourage you to have . . . ? Cooper: They wanted us to have a good education. I suppose they thought that was the key to getting on and getting a good pay. Abbate: So you left school at age sixteen? Cooper: At a grammar school, you had to stay until you are at least sixteen; so I think I was sixteen and three-quarters. I had a year in the sixth form, which was on the way to the equivalent of A Levels. Again I took two extra O Level subjects: advanced mathematics and mechanics, in which I did very well. Abbate: How did you get your first job? Cooper: There was an education advice system, and you inquired what you could do with the subjects you were best in, and accountancy was one of them. With normal accountants, there was a fee attached to being trained. You had to pay a fee, and they would undertake to teach you accountancy, with minimum pay until qualified: this was for auditing, accounts, and that sort of work. With cost accounting, you started as a cost clerk, and you learnt the rudiments of costing, and if you wanted to go further, you took evening classes for exams that led to a qualification. My first job, I had to learn about the printing trade and costing for printing, and at the end of two years I decided that I wanted to move on; it wasn’t very well paid. So I looked around for adverts, applied to Lyons, and was accepted to work in their costing department. Abbate: The first job was in London? Cooper: They were in London, yes. Abbate: Did you move to London? Cooper: No, you get on the train and travel! It’s only about ten miles from our home in Raynes Park. Abbate: I forgot to ask: The grammar school you went to: was that mixed or was that all-girls? Cooper: All girls. My brother went to all boys. There were very few mixed at the time. Of course, now they’re mostly mixed. Abbate: So you started at Lyons in the early ‘50s, then? Cooper: 1949, September. Abbate: And what was your position there? Cooper: I was employed as a labour cost clerk. The Costing section, where I worked, was part of the Statistical office, where costs were controlled and analyzed by product within the various food production factories (bakeries, ice cream, teashop savory meals, etc.). I produced standard labour costings for new products, with help from the Planning office (who provided an operation list) using standard factory cost rates. I also weekly summarized labour standard costs for items manufactured during the week, per factory department, and compared these with wages paid, together with expected indirect labour costs. I investigated any large discrepancies, referring to detailed wage dockets used to calculate wages (from factories). Our Supervisor would report to the appropriate Directors, who might have to take action to improve performance. Abbate: To spend less on wages? Cooper: Yes: to stop wasting time, scrapping products, etc. That was quite interesting. Getting Involved in Computing at Lyons Abbate: At what point did you get involved in the computing effort at Lyons? Cooper: Well, whilst at Lyons . . . I completed the costing course I was taking for printing, and then decided to study for a Cost and Works Accountancy qualification with exams in stages. If I’d done this at evening classes, it would have taken a full five years; but if I did it by correspondence course, I could do it quicker, so I took a correspondence course. That’s divided into various subjects, building up to an Intermediate Level, which I passed in December 1953 and continued to work for the final exams. Lyons were quite a progressive company for that time: if somebody acquired qualifications, they felt they ought to pay them more—but they won’t do this unless they’re making use of them, of course. As there was no advancement vacancy in the Statistical office, I was selected for an Appreciation Course with LEO. Abbate: An Appreciation Course? Cooper: Yes. They were looking around for various new potential programmers. Most of their programmers had a math degree or some other degree—thinking, I suppose, that if you worked up to a degree standard, you could be a very versatile employee and pick up new ideas very quickly—but they were also looking around the Lyons office teams to see if there were any potential candidates there that they could draw on. So I went on the Appreciation Course. It was a one-week course. It just covered the rudiments of binary arithmetic, simple programming, how the computer worked; and it took a week. It was quite an intensive week! [laughs.] I think they were trying to find out how you would do, and at the same time let you realize, “Would you like to do it? Were you interested?” If you worked in the Statistical Office—we sort of pooh-poohed the idea of LEO. I thought, “Oh well, that’s a silly idea. What can they do?” [laughs.] Abbate: Really! Cooper: Yes. I’ve written that down. [Reading from four printed pages entitled “Betty’s Early Education, Training and Memories at LEO”]: “To use a computer to carry out office operations: it was new, and viewed with suspicion by many clerical workers. The concept of a programmer writing instructions to operate a sort of robot to carry out their work was difficult for them to visualize.” That was up to the office management to sort out! [laughs.] Abbate: So you were skeptical when you started. Cooper: I was very skeptical. And I suppose because I was skeptical, I didn’t worry about how I did—and so I did quite well! Abbate: But you thought that you might as well see what it was like? Cooper: Yes. Why not? [laughs.] Abbate: Was that the first time you had had any contact with a computer? Cooper: Yes. Well, we didn’t have contact at that point. We knew it was there. Lyons had a personnel policy for all their higher-level management—potential management trainees—to have a tour around the offices and learn from people who were doing a job what they did; so I had had contact with management trainees, who might have been for LEO, to explain what labour costing is. But I hadn’t seen the computer. It was a huge thing at the time, as you probably know! Abbate: So, they were teaching you . . . Cooper: They were testing you. Abbate: . . . sort of basic things about . . . Cooper: Binary arithmetic, what the computer did, showing you simple programming. Abbate: And that would have been in machine code at that point, the programming? Cooper: I think that they did give us some simple machine code, but it would also cover a little bit of flow-charting: how you were the tackle the job. Very simply, like “How would you program a computer to say ‘X plus Y equals Z’?” I mean, that’s a simple thing, isn’t it? Abbate: So you’d work it out logically on the flow-chart, and think about how to translate it into [machine code]. What happened after the week? Cooper: I didn’t hear anything for a while. I think they had to train somebody to take my over job before they’d let me go! [laughs.] I joined LEO in January 1955; I think they delayed it about a month while I trained somebody else. Abbate: So you’d taken the course at the end of ‘54. Cooper: The Appreciation Test: it was really a test, not a course. Yes, it was some time in the autumn. Working on the LEO I project Abbate: When you joined LEO, how many people were already working on the team? Cooper: Well, there were about ten including one female programmer, Mary Blood. You’ve heard of her? Have you contacted her? I think she joined them in 1953. Abbate: What’s her last name now? Cooper: Coombs. Abbate: Right! Right, right; I’m going to see her later in the month. Yes. So you were the second woman on the LEO project? Cooper: Well, together with my future sister-in-law. We started the full Training Course about five weeks later, together with another person, a male. So I suppose you could say we were the second and third females. Abbate: What was her name, your sister-in-law? Cooper: Her name was Pat Cooper, but she’s now Pat Fantl. Abbate: Oh, right! Okay. Cooper: So in the books, she is Pat Cooper, and I am Betty Newman. Abbate: All right: So you were the second and third . . . Cooper: Yes. It was quite an intensive course, the programming course. Abbate: Were you immediately interested in getting involved with the computer after you took the course? Cooper: Well, yes, it was something new! Now, what did we do? [Looking through her notes from the programming course.] We learned the basics . . . Abbate: So these are the actual course notes? You still have them? Cooper: These are the course notes that I took. The course covered all aspects surrounding the computer, briefly: its background, simple engineering circuits, how to do a job, programming actions required, flow charts, input/output, accuracy, checking, testing, setting up and starting a program on the computer (initial orders), original job specification, operating instructions, etc.; ending with writing, testing, and correcting a dummy program. [Reading from notes:] “How did it start? You press the Start button, and it’s got an initial order, which reads in the cards to set up the program. It reads in the program, which was on cards; sets them out; and then as soon as it’s got to its end of cycle, it starts working with the program code.” Of course, the program itself was written in machine code. There were three sorts of parts to the machine code, and it had to be compiled, so that it was tested that it translated so that it would work on the computer. I think—I’m not sure—it didn’t have to be compiled like later programs; I think it was fairly simple. But [the program code] was really untested, and there’s a program that read it in, tested it, and printed out some inconsistencies that it didn’t like. Abbate: So before it was actually run, it was tested in some way? Cooper: Of course! We had to test things. Do you want to go on and talk about the Training Course, or what we generally did? Abbate: Well, why don’t we go on to what you actually did. Cooper: We would use the above procedure when programming after completing the course. You’d have a written specification, produced by either the Programming Manager or a Systems Analyst, and you’d read it, and then you’d ask questions, check out and tie up any ambiguities. You’d produce some flow charts. Now, if it was a simple job (one program only), you’d have between one and three input channels (cards and paper tape) and one or two output channels (punched cards and printer). You’d produce an input/output flow chart showing what data was input and what was output, then a detailed flow chart with square boxes for each simple operation and diamond ones for tests with two options—to change direction, also for impossible situations where a STOP may be necessary. The flow chart goes from the beginning to the end, and probably contains repeat loops where there is multiple data to be processed. And then, having got all the ends tied up, you could start coding. So you’d code it; you had to build—well, I’ll come to that bit later. Having coded it, you got another colleague to desk-check it, to make sure that you had coded it correctly. “Have you left anything out that ought to be in?” and that sort of thing. Abbate: A desk check is someone reading it through, before you actually run it by machine? Cooper: Checking it; just checking it. They’re checking it according to the flow chart and according to the job specification. Computer time was valuable, and obvious program errors had to be eliminated before trials. Abbate: How precise were the job specifications? Did they say, “We want to cost this job,” or would they have it worked out . . . ? Cooper: Oh no, they’d go into a lot more detail. Yes. “What are the conditions of various things?” I mean, you had to cope with all the payroll. If it was a payroll, you’ve got to set up the basic data for each employee, which becomes “brought forward data.” You have current data coming in, with “How many hours has he worked, at which rates?” (Some of them had more than one rate.) On the basic data, you have his date of birth; if he’s taxed, his tax code; and anything that you want to know. And also on that record, you’d build up how much you’d paid him up to date, and how much you’re paying him this week. And then, of course, you’ve got to allow for amendments to this, to correct the record if necessary, or if they change the rates. So you’ve got current data coming in, amendment data, and brought forward data (basic data and totals from the previous run); and you have to print a pay slip; you have to carry forward personal data for the following week’s run; you want to carry forward some totals for the department; and you might want to carry forward some costing details. Well, all those things went on one lot of cards, to be sorted them afterwards. But having got them, which order do you read them in, and what are you going to do with them? Well, that might be up to the programmer. But the systems analysis would tell you what information you have to hold for each employee, and what you have to achieve from that job. Because of the memory size of the first LEO, which was 2K, it was quite a little tricky job to fit everything in! And it usually had to be done in a series of programs; but you’ve got to tie up all the programs together. Abbate: So the output for one program could be used in the next? Cooper: Yes, but you might find that you have to sort the cards—some go into one, some go into another—and each one would be attached to some brought-forward data for that. I mean, if you’re doing the totals, you need the totals from previous runs, and you just have to tie up all the ends. [Referring to “Betty’s Early Education, Training and Memories at LEO”:] I’ve got down here some problems and challenges, which I’ll give to you later, if you want. Abbate: Oh, yes! Yes. Cooper: Then, having written it and checked it, it gets punched onto paper tape and compiled. The “compiling” program would read the written program instructions from paper tape (or for a program requiring amendments, cards and tape) into the computer and convert it to a readable “program running” format, which was punched onto the cards. Errors and inconsistencies found in the program would be printed out. These need to be corrected and the program recompiled. You need some test data, which is the next thing you produce. It has to cover all the different types of data that you’re likely to encounter going into a proper program run. Now, if you were lucky, you were allowed to test the program yourself. But if you were unlucky, there was no day test time available on the computer, so you wrote out the instructions and the operators fitted it in when they could; and results came back to you, and they said it either worked or it hadn’t worked. So it was up to you to check the results (printed and punched on cards) to find out what was wrong (if anything) and correct it, and put it back again for a further test. So it went on until you were satisfied the program was correct. Abbate: If it didn’t run, what kind of feedback did you get? Cooper: Well, they always produced a computer log of what had happened, and where it stopped, and where it got unstuck, and you could try again, requesting a store dump of certain crucial parts. There were a lot of checks on it. (It’s always possible that the first LEOs weren’t as reliable as current programs, but I’ll come to that in a minute.) Anyway, you got there in the end! [laughs.] You might have to have several attempts at reprogramming, and recompiling it, and putting it right, and trying again. Then you’d have to write some operating instructions. You have to write or update the specifications, and when it is a live run on office data, you’d have to be ready to assist any queries that crop up. They might be program queries. They might be something that nobody’s thought of, and then you might have to amend the program to cope with them. Abbate: When you’re saying a “live run,” you mean the actual people who want to use the data are running the program? Cooper: No, they would provide the data and LEO staff do the rest. [A “live run” was when LEO was being used in place of the manual office procedure.] They always had a parallel run to start with; so you compared the LEO results with the office results, and when everyone was happy with it, LEO took over running the job on a regular basis. Well, that’s the procedure that we followed. As I say, I think I’ve said that we had 2K storage, and that had to hold the program; the working storage, including the data as it was processed and totals accumulated; plus input areas and the output areas. There were also some fast calculation registers, for the arithmetic, and there was a console (which told operators how the program was running or completed or stopped). You did need quite a lot of ingenuity to fit your job into the computer! Abbate: To get everything to fit in that memory space? Cooper: Yes. LEO engineers had modified the original mathematical computers produced by Cambridge and various other places, conferring with the LEO management team and programmers. We needed fast input/output, because once in the computer, there wasn’t a lot of calculation per item, or employee, or whatever data you were processing (store’s item, if you’re doing stock control, or personnel if it was labour costing), but there’s a lot of repeat operations per data item. So they decided on three inputs: paper tape and two card readers; and two outputs: a card punch and a printer. They also introduced some buffers, so that the card reader can read at its own pace as soon as the buffer is empty; you haven’t got to wait, in the computer, for it to read the card. So this speeded up the program running time. Well, some of the challenges: I’ve listed some of the problems we had, the checks and challenges. As I mentioned, it was not a totally reliable computer; because it contained a lot of valves with a limited life and mercury delay tubes, a lot of things could go wrong; so the programs needed built-in checks for hardware as well as the software, to identify errors as they occurred. Abbate: How did you check the hardware? Cooper: Well, the engineers ran test programs. They had their own written test programs, and I believe Frank Land wrote some of them. Certainly the early programmers wrote them. These test programs were run regularly and also run before a live program. When I call it a “live program,” it’s an operating program doing the office work. Now, the checks we had within the program would be on the data cards being read in. I’m not sure about the decimal cards; I believe they had an extra digit so that it had to add up across, but I’m not sure what amount. Paper tape had an extra digit. But the brought-forward and carry-forward cards were all in a binary format, so that instead of one column / one digit, you had something like twenty little compartments, it was binary format; and to make sure they were read correctly, there was always a check total card at the bottom, so that the first thing you’d do when a card is read is to check it: “Does it add up?” That always happened, and so you’d build a stop test into the program: “It has not read it properly; either reread it or abandon.” It’s up to you—or up to the operator—[whether to reread or abandon]. There were other checks. You would read in the data, and at the end of the run you would read in the totals for that department; so that at the end, you’d check that the total on the totals card is the same as all the brought-forwards added up. So that’s another check. You’d also build a restart procedure into the program. You’d have to estimate how long the run is going to take, but about every ten minutes, you’d produce some restart cards: so that if you later found, “Well, it was all right there, but it’s all wrong there at some later point,” you could restart after the earlier point, and read in the appropriate restart cards you’ve produced, and carry on from that point. Abbate: So, restart cards would preserve the state of the memory at that point? Cooper: With the amount of information you’ve processed at that time, that is where it has got to, yes. Abbate: So you could load those back into the registers and carry on. Cooper: Yes. You’d restart that, yes. So we had restart cards—and reconciliations. Well, they usually had reconciliation programs, too; but within the original program, you’d have to check at the end of each department that the sum of brought-forward totals that you’ve individually read is the same as the total that you’ve brought forward—that it’s correct. The program has to include instructions to do this. We had to do some calculation as to how long the coding operations took for a normal straightforward cycle. Now, we had a list: we knew how long the “add” operation took; we knew how long the “subtract” took; we could calculate the multiplications and the tests. You wanted to get all the work done within the computer within the time it took for the longest input or output per data cycle—it was usually writing cards or printing that took the longest time. You wanted everything to work within that cycle. Otherwise, it’s a double cycle and increases the time of the job—LEO operating time was in short supply—and of course it affected the cost! I think it was costing £50 an hour at the time, if my memory’s correct, [so] if the job was taking half an hour, that’s £25. Now, how much did it cost [to do it manually] in the clerical office? It is a very sharp calculation! The LEO operation must save money to be economic; otherwise it’s not worth doing on the computer. Abbate: Now, let me see if I understand this: The actual time that the computer was executing instructions was supposed to be the same amount as reading in the data? Cooper: Well, probably writing. Abbate: Writing out the results? Cooper: Well, probably writing. It took longer to print a line than to read a card. If, for one employee, you’ve got to read in cards and write a card, or print: you know how long it takes to write a card; if you translate that into the time—I can’t remember what they called the time; “micro-something”—but if the calculation time for an employee or data item was within the time, you were fine. If it went just over the top, it’s two write or print cycles, not one! Abbate: Is it doing the calculations for one employee while it's writing results for another? Cooper: Yes, it probably would; output would be in the buffer. It could quickly put it in the buffer—but only if the buffer’s empty! Abbate: Okay, so that way it’s not using any more time than it has to. If it has a minimum amount of time to be writing out results, that’s the time available for the instructions to run. Cooper: Yes. As soon as it’s got the result ready, it moves it to the buffer and it will start on the next item. We might even have had two buffers; I can’t remember. That buffer’s waiting for the previous card to be punched, and as soon as it’s punched, it takes [the data waiting in the buffer] and punches it, and leaves the buffer empty—ready for the next one. So, the cycle’s got to be within that time, because if you miss it, it’s two cycles! So that rather increases the time. In our office we had a joke: We would go over the program and think, “Well, how can we save half an order (a programming order), just to save a little time?” Abbate: And how did you learn these kinds of tricks? Did all the programmers share tips? Cooper: Well, you discussed them! You discussed them with each other—and, of course, you learnt a lot of that on the training course. Abbate: That one-week course? Cooper: No, on the full 5-week training course. You had a model job at the end, which we had to run and get working. Abbate: That must have been some course! [laughs.] Cooper: It was! It was run by programming staff—LEO staff—and it really covered everything. The technical (hardware side) was kept to a basic minimum, but all the programming techniques, yes. And we had some exercises to do during the course, and we each were allotted a programmer who would answer our questions and help us along, This person was generally someone other than the giver of the talks, but it could have been the same person, because there were various different lecturers. There were only three of us on this course, you see, so we had plenty of individual attention. Abbate: Two women and a man. Cooper: Yes. The man was an Indian, and he decided that he didn’t really want that job. He was a mathematician working in the bakery sales office, I think, and he decided—as he was doing an evening course—he didn’t want the extra responsibility. [short pause while Betty Cooper’s husband enters the house] Cooper: The program log did help with debugging. Of course, with the original LEO I and the first LEO II, there was no alphanumeric; it was all numeric input and output. Abbate: So how did you do alphabetical information? Cooper: I think it was coded. I think the employees each were given a number. Abbate: Ah. Cooper: We probably didn’t have their names and addresses . . . Again, I can’t remember a lot of these things; it’s over fifty years! No, not quite fifty years: forty-five years. It’s a long time! [laughs.] There might be other checks we did, which I haven’t written down. [Refers to notes.] I’ve been through the normal procedure . . . I can tell you which jobs I had a hand in. Abbate: Yes, what were some of the main projects? Cooper: Well, we started with payroll. Pat Cooper and I worked under Mary Blood. She was a very dominating person, I didn’t find working with her very easy! [laughs.] So I transferred to John Grover’s group, which was covering costing and stock-control type jobs and statistical, until he left; and then Frank Land took over from him. Abbate: Was the idea to go through Lyons and automate one office after the other? Cooper: Well, the jobs that we did came from our Programming Manager. I think he started in Systems Research, and he talked to [J. R. M.] Simmons, who was the Director in charge of office management, and they produced the jobs. There were some jobs for outside firms as well. I helped with the bakery evaluation program. This was one of the first ones they did. Now, I knew that from the Statistical Office side of it: it was valuing sales, and splitting each operating cost into material, labour, and overheads costs, a run carried out weekly. Long before that, before it was done there, it was done in the Statistical Office, so I knew both sides. Abbate: So you had done it manually, as well as on the computer. Cooper: Yes. But only amendments to the program. We might be involved in amending it, I think, more than anything else: any extra facilities they needed to put in it. Abbate: Did automating the procedure change the kind of information they had available? Cooper: It could produce extra information quickly. Totals, which would be another job in the office: it could automatically print them out at the end of the run! Costing: I costed—maybe not early on—a job for a subsidiary of Lyons, for clock production. You might have read that in one of these books, or some way; I don’t know. Abbate: No, I haven’t. Cooper: It was quite a complex organization, because clocks have parts; subassemblies; more subassemblies. Now, parts could be used in one or more subassemblies; subassemblies could be used in one or more type of clock; and finally you’ve got the clock. Now, the program—or the set of programs—had to organize it to break down the clocks into parts, so that you could produce production lists according to how many you wanted to make. Then you had built up the costs, so you know how much they cost, [and] you might have to revise the prices. I can’t remember now how we do it. I know it was a complex program! [laughs.] Abbate: Why did a catering company have a clock subsidiary? Cooper: I don’t know! It was a Jewish family, and the family had aunts and uncles and, you know, it was a wide firm. So it wasn’t Lyons, but this Director was had interests in various other products. I mean, we did jobs for other people who came and asked. Later on, the fur trade wanted something doing to produce some costs for getting in the skins and producing things from it afterwards. I can’t remember now what we did with that, either, but I do remember doing something! [laughs.] Working on the LEO II project Abbate: Did you feel you were on the cutting edge of business practice? Cooper: It was always interesting, because as soon as you finished a job, you’re starting a new one. We had a lot of job satisfaction. You know, “We can do this.” Where it would lead to, I don’t think any of us knew; but they started working on LEO II—which was an improved model and faster than LEO I—fairly early on, soon after I joined them; and that cut down the time. In fact, all the machine coding changed, so that where you had—let me think—14 was “add” before, and 3 was “subtract” . . . It changed the numbering system, so you had to know two number systems! [laughs.] Abbate: Oh, because you were using them both. Cooper: Yes. You were [still] doing things on the original—well, you weren’t coding new ones, but you might be amending and keeping them working. And you had to re-code those onto the new system, so you were translating; rewriting. Abbate: That must have been confusing. Cooper: Well, it’s amazing; it sort of fell into place. You soon could translate easily to the new code. I think the size of the numbers held in the computer was increased, as well. It worked with a decimal point, I think. I can’t remember now. How it held the numbers: I think there was a check digit on that, to make sure that it hadn’t done something to the number within the computer, and that was all part of the electronics. Whereas a word could be held in 34 binary digits in LEO I, it went up to 38 binary digits in LEO II. And you were working in binary as well as working in decimal. You could translate. We’ve got a translation, I think. [Looking through papers:] I’ve still got my original card! [It shows] what the number would look like. Abbate: Ah, so this would translate from binary to decimal. Cooper: Yes. What is the binary power, you see? And the power would be one, naught, nought, nought, nought, nought, nought, nought [10000000], or something, depending on how many it was. We had to translate the data. You had to sort out and make sure the data produced was correct. Your trial data—which you tried to keep simple as possible, but it had to cover every operation, every different type of data. Abbate: Did you find that this drew on your mathematical aptitude? Cooper: I think so. Logic: it needed somebody to think logically. Maths is a lot of logic. It always amazes me, at the moment, how mathematical operating a computer is now—whereas maths at school was always, “Oh, I can’t do maths!” computing’s different. Abbate: You mean for people nowadays? Cooper: Yes. Abbate: Interesting. Cooper: But at the time, you had to think mathematically. There weren’t very many who came up from Lyons to LEO. Leo Fantl did, he was one of the first programmers. (He married Pat, later.) Who else was? John Grover was another. But most of the others had degrees. Leo worked for his degree at evening classes; he came from Czechoslovakia, at the beginning of the war. But his history’s in there anyway. Abbate: So they were coming in from outside? Cooper: Leo Fantl worked in the Lyons Planning Office before joining the team. Abbate: Were you training new programmers as they came in? Cooper: All the outside degree people went on the fall training course. Abbate: So that was held periodically? Cooper: Well yes, yes. It might be every couple of months, as much as that. As I say, we got the normal programming procedure instilled into us, and we kept to it—kept us working efficiently and [using] good practice. [It was] worked out by somebody. Reflections on the LEO I and II projects It was an interesting life. It was more interesting than doing the same office job week in, week out! Even though I found that labour costing was quite interesting at the time, because there were always new jobs, and new items to be costed or changed or what have you. But the idea was to take all the slog out of the office work, which I think on the whole is probably a good thing! Abbate: Did it also increase accuracy? Cooper: Well, yes. Abbate: Once the program was right! Cooper: Certainly, if things went wrong, they went madly wrong! [laughs.] So you knew. And of course if it goes right, it doesn’t make a mistake; whereas in the office, they could. So what else did I do? A stock-control program. It was a very good one, because as well as keeping track of the stocks and the prices, and so the value of the stock, you can hold reordering levels and usage; it can tell you, “Your stock’s gone down to your reordering level. Make some more, or buy some more.” So, we had reports on that sort of thing. It’s a very good example. The bakery evaluation job was a sort of an extension to that. Bakery evaluation would be to] keep control of the stocks that you’re reordering. Mostly it was left to the departments to do the ordering, but to have some prompts was a good thing. There was the tea shops job, of course, but I wasn’t involved with that. I’m not sure who was head of that one. Abbate: The accounting for the tea shops? Cooper: Well, no. In the various tea shops, as the weather changed, they wanted different products delivered. So they could wait until three or four o’clock in the afternoon to phone up and say, “I want this instead of that,” and they’d get it delivered first thing the next morning. So they could change at a late time, and that was very good, because the managers of the tea shops did not have to juggle the figures themselves. They could concentrate on managing their staff instead! It’s the fast reaction [of the computerized system]: once it’s working, it does very well. If you get figures quicker, you can take decisions more quickly. Abbate: But you were doing more the head-office kind of automation, as opposed to at the tea shops? Cooper: Well, the tea shops was all part of the Lyons empire, so it did come in. We did all the payrolls. They started with the payroll of the bakery office, the bakery production; and when they were happy with that, they extended it to everybody, including tea shops and corner houses (a larger type of tea shop) and all the different production departments: tea, ice cream—they all had their little hierarchy. It just got extended. All we needed was more computer time, to fit everything in. Abbate: You talked about the economics of doing the computing. Was it less expensive to do it on the computer than by hand? Cooper: Oh, yes! They wouldn’t put it on otherwise; they wouldn’t do it. We had to work it out, yes. It had to be worked out. Abbate: So even right from the beginning . . . Cooper: Yes. I remember, when Eveready—you’ve heard of Eveready torches and batteries, haven’t you? Abbate: Yes, I have. Cooper: It was just before I left them, I think; around about 1959, 1958. They had a man over there who went into all the details: “How much were the data preparation costs? How much for this? How many staff can he save in the office?” And he worked it out very carefully, and [asked], “How much would LEO charge you to do the job?” And if it wasn’t economic, we didn’t do it! One of my best friends worked for Eveready , and she came and went on the training course, and she worked under me for a while, doing Eveready programming. Abbate: Did you become a supervisor of programmers? Cooper: Well, I only had a small group, I suppose, for about the last year I was there. I left in 1959. And I had my daughter Shirley later that year. Abbate: Did you meet your husband at Lyons? Cooper: No, I met him through his sister [Pat Cooper], who did the same programming course as me. Abbate: Oh, I see. Cooper: They shared a flat in London. They came from Bradford, in Yorkshire. Abbate: Did Lyons show a lot of appreciation for the computing group? Was there a sense that you were very important to the company? Cooper: I think the management did. But I’m not quite sure about the actual lower people in the staff there. They were all very skeptical. Well, I was skeptical when I first joined them! [laughs.] Abbate: And did you actually work with the people whose work you were automating, or was that just done by the Systems Analyst? Did you interact with them? Cooper: You did have some contact, but probably not a lot. Yes, if you had some queries about “How have we got to cover this case, or that case?”, you would probably [talk to them]—not the individual people, but their supervisors. The engineers and the programmers talked together, because they would introduce new things, new facilities. They were forever updating the facilities on the new computer. When they started building computers for other firms—which they did—they had to make it alphanumeric. The first LEO II wasn’t, but the second one was. And then, I think, they had to introduce new things. Potential customers would say, “We wouldn’t buy it unless we can have so-and-so,” you see; so extras were introduced. Abbate: Did they consult with the programmers, in terms of what features the machine would need? Cooper: Yes. Abbate: So there was sort of a back-and-forth. Cooper: Well, yes, they were always talking. They were in close contact with the programmers, and if they wanted more tests we would provide them. I did write a test program—well, not a test program: a program that kept details of the computer valves and their life span. The engineers would provide details about which valves were in the computer at this time, and how long they were in use; the program had to calculate and report on valves nearing the end of their life—i.e., which were likely to go wrong. So if they had problems, they’d check those first. I did write a program to update this information. Abbate: So you had to keep track of the hardware, in a sense. Cooper: Well, I didn’t; the program did! Abbate: But I mean, as programmers, you had to be aware of which things were likely to fail. Cooper: Well, they would come to ask; they’d say, “Look, we’ve got this problem. What can you do?” So I think Frank Land sorted that one out, and I did the programming. Yes, they would come with the problems, and we would write programs for them. Abbate: For the engineers? Cooper: Yes. Reflections on Women Programmers on the LEO I and II Projects Abbate: By the time you left in 1959, what percentage of the programmers were women at that point? Cooper: There were quite a few more. It was a little bit confused, because we had a lot of programmers who worked for outside firms, and they were coming in to learn it, because their firms were interested in buying a computer, so they needed their own programmers. When I started, there were about eleven programmers, and there were just the three of us women. I would think they were mostly male. A quarter might have been women, but no more. It might have been less. Abbate: So about the same as when you started. Cooper: Yes. I don’t think they differentiated between—I mean, if a woman applied and they were good enough, they came. Abbate: So you think there was just less interest from women in doing it? Cooper: I don’t know. It’s difficult to tell. Pat had a maths degree, but she did say at the time that there wasn’t a lot of work available for women using maths. I think she worked for an aircraft firm, doing various mathematical calculations; and she did say it was difficult to get another job, because they a prospective employer in the same industry would apply to the firm she was working with, who would reply, “Oh, we can’t let her go!” [laughs.] Abbate: Because they wanted to keep her. [laughs.] Cooper: She was not to join an opposition firm. But LEO was completely separate, so she was allowed—she could manage to move. Abbate: That’s interesting. Cooper: She only stayed a couple of years, I think. She got married and her husband worked for Bell Labs in America, and she went with him and obtained a job with IBM writing in FORTRAN. Writing the Braille program for LEO Abbate: Did you go back to computing after you left, at all? Cooper: I did some part-time work at home, writing programs for LEO. Abbate: This was in the ‘60s? Cooper: Yes. [Referring to notes on “Betty’s Early Education . . .”] I had a reason for writing this out, because my daughter’s been asking me about it. Between ‘61 and, say, ‘65, I was doing odd jobs for—amending programs for—LEO I or LEO II. I didn’t learn the language for the LEO III; that’s when CLEO came in, and I didn’t do anything with that. But I did then go on a course in 1967 to learn User Code for System 4, and after that I wrote a Braille program. That’s to say, you take the normal script and print it off in raised dots, in Braille format. That was a quite interesting translating program. Abbate: I haven’t heard of that. Cooper: Operators turned the paper upside-down, removed the printer ink and printing had a very sharp contact with the rollers to raise dots on the paper. A blind person could feel and read the document printed. Abbate: So this would just turn any text into Braille? Cooper: Yes. Abbate: I hadn’t heard of that. Who was that for? Cooper: I think it was the Civil Service. They employed Braille programmers. I couldn’t be certain, I know it was operational. I had a phone call after we’d moved up to the Midlands (my husband’s firm moved): “Can you come up and do it?” Well, I found it very difficult with children here, because that was in London—somewhere out in the suburbs—so I turned that one down. But the program was very appreciated. Abbate: So people were programming in Braille. Cooper: I don’t know what they were doing with it; I couldn’t tell you. Frank Land might be able to tell you about that. I don’t know. Who else did I work for? That was Doug Comish, I think, at the time. Abbate: That was who? Cooper: Doug Comish. He’s also mentioned in there. But that was when I wrote programs completely at home, and they were tested in London. I think I went up for some testing. Abbate: So it was fairly easy to work—to do this sort of program—at home? Cooper: It’s easy to program at home. All you need is a lot of programming sheets and the specifications, and you just get on with it. In fact, it’s quicker to do it at home than it was in the office, because you don’t have any interruptions! Abbate: Well, except your children, I suppose! Cooper: Oh, well, you don’t do it when they’re around! [laughs.] If they’re at nursery school, or if they’re at school, that’s okay. Details on the Programming Sheets Abbate: What did the programming sheet look like? Cooper: [Looking through papers:] I don’t think I’ve got any. [Beginning to draw:] Well, it was just . . . I think we had . . . [Draws something like this, where the x’s represent spaces for 0’s and 1’s to be filled in:] No. on coding sheet Action Register or location specifier Size of number (0 for normal size, 1 for double size) Description written for programmer’s use xx xx xxxxxxxxxx x Abbate: It’s sort of a grid. Cooper: There were four columns. This [second column] was the action, which was a number. I think 14 was “add”; 5 was “subtract.” We had no division; we had to use a mathematical subroutine. There was “multiply” or something; and “goto,” where there was a test. Well, the action number went in there. Abbate: Okay, so that indicates what instruction you want. Cooper: Yes. There was a very small one—was it 01 or 10?—which told you whether, depending on the size of the number you were working on . . . I’ve probably got it in here. Abbate: So that was sort of a check? Cooper: Here we are. [Pulls out coding sheet.] It would look something like that. So, that’s the action. And that’s the number of the coding [in the first column]. Really, it looked something like this: This last one was the size. I think at this side it numbered them down—the number of the order; we called them an “order.” And then this one will carry on. And this [third column] was “Where do you find it? What are you working on?” You’re working on this number. Abbate: Right: what memory location is it in. Cooper: Yes. And you had a separate arithmetic register. So this would say, “Add so much to the register.” This would say, “Subtract so much.” This was “Multiply the register by this.” “Put it away; where are you going to put it.” So they’re very simple operations; but you had to break everything down simply that way. Abbate: But you had these preprinted sheets so that you could conveniently . . . Cooper: Oh, yes! Yes, you had a number of sheets. Abbate: Each line would have the action . . . Cooper: It could be that you only had the one going down, and this was—you wrote at the side what you were doing. Let me see what I’ve got [in my notes. Reading orders:]. “Replace the contents of the accumulator by the contents of the location specifier. Add the contents of the location specifier to the accumulator.” The accumulator would cooperate with the register. “Transfer contents to somewhere-or-other, and clear the accumulator afterwards.” “Transfer it and leave the accumulator as it was.” That sort of thing. Abbate: And this last column is a checksum kind of thing? Cooper: No, I think it was the size: are you working on a small number or a double number? Abbate: Oh, I see! Okay. Cooper: Yes. I think it was just a nought or a one, and if it was a one, it was a double-size; if it was a nought, it was normal size. And of course some of them didn’t use that; it was only if it was a number that it applied. Abbate: So it would know to read in twice as much data? Cooper: Yes. [Reading:] “Programming rules: Write down the basic instructions. Test for END. Step on count.” Every time it had done one order, it automatically went to the next one—but if you did a test, it tells you where to go to. Such as this one, saying “Go back to there.” And you could write in this number, plus five, or whatever. Here’s another example. That’s what the sheets looked like. They might have got it going down there, and going down there; but you would need room to write down what you’re doing. Abbate: So you could do it on a blank piece of paper, but it was just more orderly to have a nice sheet where things are arranged ? Cooper: Well, you needed a sheet, because these had the order of sheet numbers printed on them; otherwise the data preparation girls wouldn’t be able to punch the coding. They put it on tape, and it got translated into cards by the compiler program. There’s a sheet for you! It looked like that. You see, you say what you’re doing; that’s the coding. This is what you’re wanting to do; and this is what it is actually doing; and then you go from there up to there. We had lots of these printed. [Reading from notes:] “Accuracy.” We had to work out how much you lose, because you’re doing multiplying numbers and putting it back. I don’t know that I understood the accuracy that much. Computational accuracy: how to work out percentages. Abbate: You were losing accuracy because you were rounding it off? Cooper: Yes: round-offs. [Reading from notes:] “Post-mortems.” Post-mortem is: “Has it worked? If it’s gone wrong, what have you done about it?” They printed these. They had a printing department, obviously, because they printed these sheets that we were writing on. Problems with LEO, Circuits Abbate: Do you have a log where you had to log problems that you’d have with the machine? Cooper: Oh, the computer has a log, yes. It prints it up, and it was a great help in finding errors, if there are any. [Looking at notes:] We’ve got “Simple Circuitry” that we had a talk on. They printed that, and we wrote down the notes: wavelengths and times. Abbate: Was that helpful? Cooper: Yes, I think it filled in background. [Looking at circuit drawing:] We called these “flip-flops.” Abbate: Right, the circuits. Cooper: The circuits. “Timing”—ah, yes. We certainly had to learn about timing. Where it was in the store . . . It’s a long time since I looked at these things. I’m amazed I’ve still got it! “How LEO is set to do a job.” This was all the five-week course. A flow chart: here are some flow charts. I think later the test boxes became diamond shape, so you could see the test boxes. You see, that’s a test, so you’ve got a tick and a cross: you either go that way or that way. [Looking at another symbol on the chart:] That’s to re-read the card, I think. You had to do this [flow-charting] for the whole job. What’s this? This is the input-output chart: what goes in and what goes out. When you’d done the course, of course you had something to refer to, but it’s only when actually programming that it really registers and stays there. Abbate: And then maybe you would look back and say, “Ah! That’s what this meant!” Cooper: And problems, you would discuss with other programmers—probably at coffee time or such like. Abbate: Did you document the programs? Cooper: You mean, write a specification afterwards? Is that what you mean? Abbate: Right. Cooper: Yes, we had to do that. We had to write out good operating instructions: what to do if it stops; what might be the reason. Each stoppage had a different number, so that we could then turn up and say, “Oh yes; that’s what’s gone wrong.” Abbate: So when you say it had a number: it would produce a number on the error log or something? Or output some kind of signal? Cooper: Yes. Well, it would—If it stops, you can see it on the console. It had—I’m not very good on these terms, remembering them—it was like a screen. Abbate: Right. And it would display a number from where it had stopped? Cooper: Yes: why it stopped. So then they turn to the operating instructions: “It hasn’t read the card right. Try re-reading it; put it back in.” Abbate: Who actually ran the programs, once they were finished? Cooper: There was an Operating section who organized and ran jobs on the computer. Now, when you say, “Who is involved in programming?”: There were also the Data Preparation section—the girls who punched the data on paper tape and verified it, also our programs and amendments; they were all girls, and they had a supervisor. And there were two others, I think: a plug board had to be fitted into the printer, where you specified how it’s going to print, and they set up these print circuits to plug into the printer. Abbate: There was a different group of people doing the plug boards? Cooper: There were two that were doing that. Abbate: So the people that—the operations group, or the operators actually running the programs . . . Cooper: There were some female operators as well. Operators only ran jobs. Abbate: And were you in close contact with them? And did they come to you and say, “Oh this doesn’t seem to be working?” Cooper: Oh, yes! We were all in close contact with everybody who worked there. Abbate: Were you all physically in the same place? Cooper: No. They were in the operating room, mostly, and it had to be a fairly air-tight—no dust around, because that could affect the working [of the computer]. Abbate: Did any of the Data Preparation girls ever move up to become programmers? Cooper: I think they did. If they were interested, they would then progress to do these plug boards for the printer, and I think at one of our reunions I went to, I found that those girls had gone on to programming. So yes, they did move up! They weren’t programming while I was there, but they were later. [Looking at more notes:] That was our model job [from the training course]. We had to write it, afterwards. Abbate: Did you go back to LEO full-time at any point? Or were you just working temporarily? Cooper: I didn’t go back to them, because in 1969, we moved up to the Midlands, near Burton-on-Trent. You might have heard of Burton-on-Trent? North, near Derby. I did get a job in Derby in 1975, working for . . . They produced presses, and machine parts for other presses. I think originally that was an American firm: EW Bliss. Abbate: I’m not sure. So you were working for them full-time at that point? Cooper: Yes. More or less full-time, yes. Family Life Abbate: So I guess your children were all in school by that time? Cooper: They were at school, yes. Abbate: You have four children? Cooper: Two. Abbate: Oh, your parents had four children; you have two. Cooper: Yes, that’s right. Two’s enough! [laughs.] Abbate: And what did they end up doing? Cooper: Jeff is an electronic engineer. He’s working—I think he’s programming, progress-chasing for meters, to read them automatically. But he’s working in the electronic field, with programming, and of course he’s got his little group who work for him. Shirley, as I say, has a physics degree, and she was doing research for the Open University: theoretical nuclear physics. She did that for about ten years or more. Now she gives lectures for a firm called Connect, who retrain ex-programmers without jobs for programming on the Internet. Abbate: So they’re going from COBOL to Java, or something like that? Cooper: Java—and CC+, is it? Abbate: C++? Cooper: C++. Yes. Abbate: Do you think your children—did they sort of follow in your footsteps? Cooper: Well, it must have had . . . They didn’t follow in my footsteps, no; but they are doing the same sort of work, and they know—Shirley certainly knows a lot more than I do about it; I think Geoff does too! [laughs.] But then, the trend is computing, isn’t it? Shirley taught herself C++ and Java when she was between jobs, she had been teaching at Open University summer schools before that, so she’s had some teaching experience, and I think Connect gave her a trial for a year. But I think the firm works on contract, so she’s still working under contract; but it gives her some experience. She can go on somewhere else after. Abbate: Yes, I’m sure. Cooper: It’s the job she likes. Working for Bliss Company Abbate: Now, let’s see: we had left you working for the Bliss Company, I think? Cooper: Yes. Doing all sorts of computer jobs. There were only a couple of us there when I started, and then he left and they got another one, and then another couple. But, we were doing everything on the 2901. Now, who would that be? ICL. It might have started off as a 1901 or a 1903, I can’t remember, but it was ICL. It was a smallish computer, but it had its own computer room at the time. We were doing all sorts, like payroll, and stock control, and costing. You needed to be able to read—it was in COBOL, and they also had a program which we called FIND: you fed in parameters for a file (sort of database), and you got the results printed as you specified. It was very simple to read in a file that you’d created somewhere else and produce statistics and various other things. But COBOL, yes: a number of their programs were written and corrected, and I dabbled in all of them. You know, I had to read them, and find out what they did and how you could amend them; and if you weren’t careful, you amended something that you didn’t see a reason for it, and found out afterwards that there was a reason for it! [laughs.] I think one costing program, I found that they hadn’t written the last record of the run at all, so they’d lost it! [laughs.] For years they hadn’t recorded the last costing item that they’d dealt with. I thought, “I’m sure this can’t be right!” [laughs.] So you would go around asking, “What happened to this record? Have you got a mention of it anywhere?” And we ended up by—they had the disk computer extensions connected to the computer; they weren’t PCs, and you could only operate them to find information from a file on the computer. You could type in the number, say, for the part in the Sales or the Program Production Department, to find out how much you’ve got in stock and that sort of thing. Abbate: These were terminals? Cooper: Terminals. That’s it; yes. Abbate: So they could interact with it. Cooper: Yes. But we had to write the programs for that. That was quite an interesting objective, because you could display data information as just a straight-line list such as you would print, but that’s not easy to visualize. You really want to type in a stock item number, look down and see, “When did we last use it? How much does it cost? How many have we got in stock? Should we reorder them? How often do we use them?” And that sort of thing. They had all that at their fingertips, and you only had to type in the number. So I quite enjoyed writing that program! Abbate: Were you the senior programmer at that point? Cooper: I did end up the senior programmer, yes. [laughs.] It was a small, contracting size of firm. I mean, when they started up, they had 400 employees—that’s not very big, admittedly, but I think they ended up with a hundred when I left! They weren’t doing very well. They did most of their business on providing spare parts for these great big presses. Abbate: Printing presses? Cooper: They weren’t printing presses, no. I think they were mechanical presses. Like producing, say, saucepans. Abbate: Oh, these were industrial. Cooper: Yes, industrial. Using COBOL Abbate: And how did you like using COBOL? Cooper: I found it easy! Compared with User code, it’s much easier! [laughs.] User code, or what is it? System 350. Are you familiar with it? Abbate: The IBM system. Cooper: IBM, yes. They were interactive. They were the same sort of thing. But COBOL was easier! But it’s amazing what you could do with COBOL. The only thing you couldn’t do was some mathematical calculations. Abbate: Could you not do them at all, or was it just too difficult? Cooper: It was the complicated formulae that you couldn’t do. I mean, you could add and subtract and all the rest of that clerical work, yes. And of course, my cost-accounting came in very useful. So I knew—I mean, I heard arguments: I’d hear two people talking about some system of what you can do with costing, and can you do this, that and the other? They’d turn to me and say, “Can we do that?” “No!” [laughs.] Abbate: How long were you at EW Bliss? Cooper: About ten and a half years! It was a nice place to work. Abbate: Why did you quit? Cooper: Oh, we moved here. Abbate: Oh, so you retired. Cooper: I was only 55 when I retired, but my husband Laurie was —I think he took an early retirement. He did research work for the Coal Board, and they were contracting and wanting [to reduce staff], so he got a “silver handshake.” That’s when we decided we didn’t want to live in the Midlands forever. Would we move back South? Well, houses cost too much. Where else would we like to live? And we found this house [in Windemere], a nice place to live. Laurie doesn’t like it when it rains and rains, but there are so many nice days in between! We do our chores when it rains. [Tea break. Recording pauses.] Reflections on Working with Computers Abbate: Just some general questions: What did you find the most satisfying part of working with computers? Cooper: I think working out the new methods of organizing it on the computer. Abbate: To take a problem and figure out how it could be done? Cooper: Yes. Abbate: Is there some particular thing you’re most proud of, in terms of things you’ve worked on? Cooper: They were all quite interesting. I think that the new programs.... When I was working at Bliss, we were translating or writing programs for a subsidiary of theirs in Scotland, and their accountants said to me, “Don’t you like carrying on with this subject afterwards?” And I said, “No, I like to start a new one!” [laughs.] You’ve told me what you want it to do, so let them get on with it and run it. I mean, he’s just using it, as you would in an office. Abbate: But there was always the chance of something new? Cooper: Yes! Abbate: Did you ever feel that as a woman you weren’t—you didn’t have access to promotions, or pay . . . Cooper: Well, I wasn’t really looking for promotion, once I was there. I mean, I could have taken over the computing department, but I wasn’t that interested! [laughs.] Abbate: At Lyons, you mean? Cooper: No, at Bliss. Abbate: Did you find it difficult balancing your work and family responsibilities? Cooper: Well, it could be tricky. I mean you can’t just leave them at a loose end. I think I curtailed my hours at the office. I joined them late in the morning and left early in the evening. It was a half-hour journey, and I didn’t like to leave the children too long, without supervision. Abbate: Did the programmers tend to work long hours? Cooper: At LEO, yes. But anywhere else, no. Abbate: Oh, really! Cooper: I mean, in the early days, there was a lot of night work, that they went in to do testing, because that’s when they could have the computer. Abbate: So were you ever going in at night? Cooper: I never went in at night. [laughs.] I don’t know what my parents would have said at the time! I don’t think they would have liked it. Abbate: Oh, because you were still at home. Cooper: I was still at home. I did marry while we were at LEO. Abbate: So you weren’t going off at two o’clock in the morning to test your programs. Cooper: I wouldn’t! Abbate: But someone else might. Cooper: Yes. Abbate: And you found out that working at home worked out well. Cooper: For actually programming, it worked very well, yes. I don’t know whether you’ve heard of F International? Abbate: Yes. Steve Shirley, yes. Cooper: You’ve seen her? Abbate: I spoke with her last spring. Cooper: Well, I think Mary told me about her when I was at home, and the information that came back was that if you can work for the firm that you did prior to leaving home, you probably got more money than if you worked for her. But she did very well in her organization— and she had to do everything, of course; she had to organize all her programmers and everything else. I didn’t actually contact her, but I think Mary did. Abbate: But you knew about her. Cooper: I knew about her, yes. Abbate: Interesting. Cooper: When I worked at Bliss, they used to receive all sorts of computer magazines, which I found—parts were quite interesting. And that’s where I heard about the LEO reunions, from one of those! I’d lost touch with them before that. Abbate: Were you in any computer societies? Cooper: I didn’t actually join the British Computer Society, no. I think they were up-and-coming around the time I was giving up. Abbate: But you would read the trade magazines sometimes? Cooper: Yes. I see one sometimes, if Jeff, my son, happens to have one. I think they have them where he’s working, but he doesn’t usually look at them! [laughs.] Abbate: Did you have any role models or mentors in the computing field? Cooper: In the early days, we did. You mean, who did we report to? Who was the expert? Abbate: Well, who was helpful, or encouraged you? Cooper: Well, it was just the senior staff there. I mean, we were all colleagues together. I suppose we were a little bit in awe of David Caminer, who was the computer programming manager. He was a bit abrupt at times. I seem to remember I reported to him on my Appreciation Course, but at the time I didn’t care, so it didn’t matter! [laughs.] Probably it came over better! Abbate: Right—it made you seem confident. Cooper: Yes! I wasn’t at all sure that I wanted to join them before that. It was only when they offered me the job that I thought, “Well, why not?” In fact, it was the best move I could have made. Abbate: What strikes you most about the way the field of computing has changed since you started? Cooper: Well, one’s PC is a very complicated program. You’re not actually programming. It’s a very complicated program—and heaven help those who programmed it!—and it’s programming building on programming, of course, to do it. So that when you’re working on it, and it doesn’t do quite what you want it to do—like, say, Word—you think, “Well, how would the programmer have dealt with that? Oh yes, I’ll try this.” And it does help! Abbate: Interesting. Cooper: Whereas you might be completely stuck, otherwise. “Oh, why doesn’t it do that? Oh, well, yes, it’s the way it’s programmed.” Like when people say, “Oh, the program is an electronic brain”: it’s not! It only does what the programmers planned it to do. Reflections on Women in Computing Abbate: Do you have a sense that computing is more open to women than when you started? Or less, or the same? Cooper: Computing, you say? Well, more and more people—women and men—are getting a personal computer. Even my younger sister has, who was a nurse; she’s got her own now. What was she asking me? “I’m trying to get labels printed, and I can’t get it to work!” So I looked it up for her, and Laurie helped me start it. He’s more of an engineer-type person, so he can look into the mechanics, and if it’s not connected right, he will get it right; whereas I tend to look at it from a user point of view. Abbate: And Laurie is your husband. Cooper: Yes. Abbate: Do you have any advice for young women who might be thinking of going into computing? Cooper: Try it. I think women and men are equal, you know, these days—in computing, at any rate. Lots of women now get far more pay than men in computing. Maybe not in other industries—but I think the field’s opened. How do you interest them in it? I don’t know!
dataset_first_40k.jsonl/37051
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Eka Gurtskaia Eka Gurtskaia (; born c. 1986) is a Georgian beauty pageant titleholder who represented her country in the 2011 Miss Universe pageant. Miss Georgia 2010 Gurtskaia, who stands , competed as one of 23 finalists in her country's national beauty pageant, Miss Georgia, held in Batumi on September 20, 2010, where she gained the right to represent her nation in Miss Universe 2011. Miss Universe 2011 As the official representative of Georgia to the 2011 Miss Universe pageant, broadcast live from São Paulo, Brazil on September 12, 2011, Gurtskaia will vie to succeed current Miss Universe titleholder, Ximena Navarrete of Mexico. References External links Official Miss Georgia website Category:1986 births Category:Living people Category:Beauty pageant winners from Georgia (country) Category:Miss Universe 2011 contestants Category:People from Tbilisi Category:Female models from Georgia (country)
dataset_first_40k.jsonl/37067
{ "meta": { "pile_set_name": "Wikipedia (en)" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Railroad freight transportation is an important support of national economy in each country, and how to improve the economic benefits of railroad transportation is the top priority in railroad industry. The important measures to improve the economic benefits of railroad transportation is to improve efficiencies of transportation, while building high-grade lines is the premise of improving efficiencies of railroad transportation. Thus, there is a need to improve the transportation efficiencies of the vehicle for building railroad and meanwhile ensure safety of railroad building operation. Since ballast hopper car is currently the special vehicle for transporting materials such as ballast while building the railroad, improvement of transportation efficiencies of the ballast hopper car and operation safety are highly demanded. Ballast hopper car discharge door control system, configured to control opening or closing of ballast hopper car discharge door, is an important part to ensure operation safety of ballast hopper car. In the prior art, air source pressure provides power to control system, and remote control device and manual control device transmit control signal to control box in the control system, so as to control opening or closing of discharge door. In the practical application, however, such control manner cannot ensure to quickly change the working states of the whole control system in case of man-made false operation, cannot prevent false control on opening or closing of discharge door caused by false operation, and cannot ensure the isolation of power supply from the control box when the control box goes wrong or needs maintenance, thus cannot ensure safety of the operation. The conventional ballast hopper car usually comprises eight discharge doors, four of which are provided on the front end of the middle part of the vehicle body, the rest of which are provided on the rear end of the middle part of the vehicle body. The conventional remote control device usually comprises eight control buttons, each control button controls the opening or closing of one discharge door, and these discharge doors cannot be controlled in groups but only can be controlled one by one, therefore, the efficiency is relatively low. In addition, the ballast hopper car cannot discharge ballast in the middle of the railroad, but only at two sides of the railroad, and in the process of railroad building, ballast at two sides of the railroad is transported to the middle of the railroad by means of manual operation, therefore, the efficiency is low. The conventional ballast hopper car discharge door control system is not provided with a car charger for a storage battery of the remote control device, and the ballast hopper car spends most of the time on field operation, thus it is inconvenient when the remote control device runs out of the storage battery and is unable to be recharged in no time.
dataset_first_40k.jsonl/37080
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Mark, During my conversations with Patrick Hansen (from the Buenos Aires office) yesterday he mentioned that in Argentina the above mentioned contracts have to be in Spanish to have legal value. Is that correct? Or we would be covered as long as we offer the contracts in Spanish in addition to English (functionality currently present at the site)? Thanks, Mario
dataset_first_40k.jsonl/37086
{ "meta": { "pile_set_name": "Enron Emails" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Print Message RE: Vaccine Coding From: Kathy Saradarian To: Member Forum Posted: 10-26-2017 17:31 Message: Mike, For a Td or Tdap I bill the appropriate CPT code for the vaccine and a 90471 if it's the only vaccine given or a 90472?? if another vaccine?? is given.?? The DX code for all vaccines is Z23.?? (The V codes are ICD9 and are gone).?? I get paid for the vaccine and an administration code by everyone but Certain Medicaid patients that are covered by VFC and therefore you can't get reimbursed for the vaccine but you should be able to get covered for the administration.
dataset_first_40k.jsonl/37087
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Printable Seasonal Worksheets These seasonal resources are great for any classroom. Engage your students with these printable seasonal activities and worksheets. Members receive unlimited access to 49,000+ cross-curricular educational resources, including interactive activities, clipart, and abctools custom worksheet generators. These Seasons Printable Parent Resources are great for teachers, homeschoolers and parents. Use this 'Booklet: Vocabulary - What Rhymes With Fall? version 2 (primary/elem)' printable worksheet in the classroom or at home. Your students will love this 'Booklet: Vocabulary - What Rhymes With Fall? version 2 (primary/elem)'. booklet, vocabulary in sentences, with pictures The letters of the alphabet, presented in black outline, filled with blue snowflakes, yellow suns, orange leaves, and pink blossoms. Four letters to a page. Great for bulletin boards, desk decorations, and more.
dataset_first_40k.jsonl/37090
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
i i i i i i MEMORANDUM OPINION No. 04-08-00245-CV Michael Joseph KEARNS, Appellant v. Sundok Lee CARAWAY, Appellee From the 131st Judicial District Court, Bexar County, Texas Trial Court No. 2007-CI-13911 Honorable Barbara Hanson Nellermoe, Judge Presiding PER CURIAM Sitting: Alma L. López, Chief Justice Catherine Stone, Justice Steven C. Hilbig, Justice Delivered and Filed: November 12, 2008 DISMISSED Michael Joseph Kearns’s appellant’s brief was originally due July 31, 2008. We granted Kearns extensions until September 29, 2008, to file the brief. The brief was not filed by the due date. Therefore, on October 8, 2008, we ordered Kearns to file, no later than October 20, 2008, his appellant’s brief and a written response reasonably explaining his failure to timely file the brief. We further advised Kearns that if he failed to file a brief and the written explanation by the date ordered, we would dismiss the appeal for want of prosecution. See TEX . R. APP . P. 38.8(a). Neither have been filed. 04-08-00245-CV We therefore order this appeal dismissed for want of prosecution. We further order that appellee, Sundok Lee Caraway, recover her costs in this appeal from Michael Joseph Kearns. PER CURIAM -2-
dataset_first_40k.jsonl/37102
{ "meta": { "pile_set_name": "FreeLaw" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
1. Field of the Invention The present invention relates generally to analysis methods wherein it is desired to determine characteristics, such as kinetic properties or affinity for various interactions in multi-component systems. In particular it relates to methods for the analysis of interactions between species in a liquid environment, such as a compound and a target. The invention also relates to the analysis of site specific binding between species, e.g., compounds and targets. More particularly it relates to a method and apparatus for determining kinetic properties or affinity by providing a pulsed gradient of a sample containing a compound of interest, whereby the target molecule is exposed to the gradient of the compound with which it can interact, and detecting a result of said interaction. 2. Description of the Related Art In the study of candidates for new drugs (screening) it is often the case that substances exhibiting weak binding are encountered, leading to rapid events, exhibiting small time constants. Surface Plasmon Resonance (SPR) is a powerful technique for the study of affinity between substrates and targets, but typically designed for slower events. Instruments utilizing the principle of SPR (e.g., the instruments supplied by the assignee of the present invention, Biacore AB, Uppsala, Sweden) measure changes in refractive index of the medium next to a sensor chip, resulting from altered mass concentration at the surface. In conventional SPR assays (e.g., using the systems from Biacore AB, Uppsala, Sweden), one sample injection corresponds to one concentration of the selected compound, and the injection comprises one single segment or “plug” of sample liquid. In most cases of kinetic and affinity determination, a few injections of different concentration are sufficient to obtain reliable results of interaction rate or strength (i.e., association rate constant, dissociation rate constant and dissociation constant). However, when studying molecules with low affinity or exhibiting fast kinetics, many such measurements need to be performed. This is a relatively time-consuming process, with considerable sample losses. With the injection exhibiting the highest precision of the available injection methods, every injection requires 40 μl of sample in addition to the desired injection volume to prevent dispersion with buffer. In an article by Shank-Retzlaff et al, in Analytical Chemistry, Vol. 72, No. 17, pp. 4212-4220, entitled “Analyte Gradient-Surface Plasmon Resonance: A One-Step Method for Determining Kinetic Rates and Macromolecular Binding Affinities”, a method for determining kinetic rates and equilibrium affinities using SPR is disclosed. It is a one-step method making use of a gradient such that under continuous-flow conditions, the concentration of compound to be analyzed (analyte) passing over the sensor surface increases linearly with time. The rate at which analyte binds to the immobilized receptors is measured by monitoring the change in the surface plasmon resonance minimum as the analyte concentration increases. Kinetic rates are determined by fitting data to a modified version of a two-compartment model. Although representing an improvement, it still suffers from a lack of capability to perform measurements on systems exhibiting relatively fast kinetic behavior, and also in that relatively large sample quantities are needed for a full titration.
dataset_first_40k.jsonl/37119
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
E Waste Removal New Westminster How It Works E-Waste Removal New Westminster E-waste! E-waste! E-waste! Are you pondering what to do with all of your electronic waste? If so, our team of New Westminster e-waste removal specialists would love to help you out. We offer comprehensive e-waste services that will take care of the entire process of getting rid of your e-waste easy! We remove everything We do the lifting and loadingRecycle and donateFree estimates From electronics collection, to e-waste removal, to e-waste recycling, we take care of the whole process! This means that you will not need to lift a finger while you watch as your e-waste disappears. We know that we can provide the best e-waste disposal service in New Westminster. This is because our team of uniformed, fast and friendly professionals want to ensure that any stresses that you had with concern to e-waste removal are alleviated immediately. We provide all of the lifting and loading regardless of where the e-waste is located on your property. We would also be happy to take any other items that you no longer need. We will take anything from furniture to just plain trash. If you don’t want something any more we will take it away! Our New Westminster e-waste removal prices are just as exciting as our service. We base our pricing model on an all inclusive and volume based framework, this means that you will only need to pay for the amount of space in our truck that your e-waste and/or other discarded items take up! There are no hidden fees for services such as labor or trips to the dump, they’re all included, so we can guarantee that the price you are quoted is the price you will pay, no surprises! Our free, no obligation quotes are done on site. if you are happy with the price of the quote we will get to work right away and have your e-waste taken away before you know it. *Please note that drywall or other materials potentially containing asbestos may be refused and/or require testing prior to removal. We Recycle and Donate! We take e-waste recycling in New Westminster very seriously. We make every effort to ensure that e-waste is disposed of in an environmentally friendly way. Booking Your Appointment! If you think that our e-waste removal service could be of use to yourself or to someone that you know, please contact us right away. You can book online, or if you would prefer to speak with one of our New Westminster e-waste removal specialists directly please give us a call at 604.678.5866!
dataset_first_40k.jsonl/37120
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
It seems to have failed in awareness creation Exactly a year after the State launched the comprehensive Kerala Antimicrobial Resistance Strategic Action Plan (KARSAP), there are worries that the project could be losing its momentum. It was on October 25 last year that KARSAP was launched, making Kerala the first State in the country to come out with an action plan to tackle antimicrobial resistance AMR, an emerging public health concern across health and allied sectors, on the One Health platform. “A year later, many of the one-year goals -- such as antibiotic stewardship programmes in hospitals, infection control protocols and setting up an AMR surveillance laboratory network -- have been achieved. Where we seem to have failed is in ‘Awareness creation and Knowledge,’ the first strategic priority in our action plan,” a senior health official said. Another major issue is that the State government is yet to allocate a budget for the implementation of KARSAP. Strategic priority KARSAP’s first strategic priority spoke about how important it was to improve the awareness among the public, schoolchildren, medical fraternity and health personnel on antibiotic abuse, antimicrobial resistance, antibiotics in food, labelling of food derived from animals, etc. It spoke about investing in creating educational resources for each group and organising massive awareness programmes on the One Health approach so that the importance of AMR reaches people. “We are yet to engage with the public and a chunk of medical fraternity too remains unaware of what the State has envisaged under KARSAP. Unless we convey clearly to the public that antibiotics are vital for us and that its rational use is what is aimed at, we may play right into the hands of quacks and other regressive forces,” he added. KARSAP is founded on the platform of One Health, a fairly recent global concept that the health of humans is inextricably linked to the health of animals and environment. Officials point out that while various initiatives have been kicked off in the animal husbandry, fisheries and poultry sectors, environment sector initiatives for AMR surveillance have been lagging. Efforts towards strengthening AMR surveillance in the community through capacity building and networking with laboratories in the private sector had resulted in nearly 20 NABH/NABL-accredited labs from the private sector joining the State AMR surveillance network (KARSNET). These labs are expected to provide regular reports from next month so that ground-level data on AMR pattern from across the State can be obtained. A proper review of the first year of KARSAP could be the need of the hour so that the programme can be put right back on top of the State’s public health agenda.
dataset_first_40k.jsonl/37122
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Java 2D array problem I want to assign some value in a 2D array. I have 2 attributes called product and price. iPad 999.9 iPod 123.4 iPhone 432.1 In 1-D array, I know how to assign the product value. String[] product = {"iPad", "iPod", "iPhone"}; However, in 2D array, if I assign like this: String[][] array = new String[3][1]; array[0][1] = "iPad"; How can I assign the float number into the array? Also, I have a question for sorting. Since I declare the type of 2D array as String. Can I sort the float price using this array? Or I need to declare another array to do the sorting? Thank A: You will save yourself lots of trouble, if you use objects instead of arrays to store products. E.g., class Product { String name; double price; } (add access modifiers, setters/getters and constructors if necessary) Now you can access array of products easily without type conversions. Product[] array = new Product[3]; array[0] = new Product(); array[0].name = "iPad"; array[0].price = 123.4; Or, if you add constructor, Product[] array = { new Product("iPad", 123.4), new Product("iPod", 234.5), new Product("iPhone", 345.6) }; To allow sorting, you can implement Comparable interface and then call Arrays.sort(myProductArray): class Product implements Comparable<Product> { String name; double price; public int compareTo(Product p) { return ((Double) price).compareTo(p.price); } }
dataset_first_40k.jsonl/37123
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: How can I open a folder in Windows Explorer? I don't need any kind of interface. I just need the program to be an .exe file that opens a directory (eg. F:). What kind of template would I use in C#? Would something other than Visual Studio work better? Would a different process entirely work better? A: In C# you can do just that: Process.Start(@"c:\users\"); This line will throw Win32Exception when folder doesn't exists. If you'll use Process.Start("explorer.exe", @"C:\folder\"); it will just opened another folder (if the one you specified doesn't exists). So if you want to open the folder ONLY when it exists, you should do: try { Process.Start(@"c:\users22222\"); } catch (Win32Exception win32Exception) { //The system cannot find the file specified... Console.WriteLine(win32Exception.Message); } A: Create a batch file , for example open.bat And write this line %SystemRoot%\explorer.exe "folder path" If you really want to do it in C# class Program { static void Main(string[] args) { Process.Start("explorer.exe", @"C:\..."); } }
dataset_first_40k.jsonl/37128
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Matrine improves 2,4,6-trinitrobenzene sulfonic acid-induced colitis in mice. Matrine is an alkaloid found in kinds of Sophora plants mainly including Sophora flavescens, Sophora alopecuroides and Sophora subprotrata. The aim of the present study was to evaluate therapeutic effects of matrine on 2,4,6-trinitrobenzene sulfonic acid (TNBS)-induced colitis in mice. Two hours following colonic instillation of TNBS, matrine with several doses was given by gastric gavage once daily for 7 days. Comparing with the 0.9% NaCl-treated mice with TNBS-induced colitis, matrine (10 and 20 mg kg(-1))-treated mice with TNBS-induced colitis were shown improvements of weight loss, macroscopic score, histological score, and myeloperoxidase (MPO) activity. Moreover, treatments with matrine (10 and 20 mg kg(-1)) decreased the up-regulated mRNA and protein levels of tumour necrosis factor-alpha (TNF-alpha) caused by TNBS. Our findings suggest that matrine improves TNBS-induced colitis in mice and the therapeutic mechanism might be related to the reduction of up-regulated colonic TNF-alpha production caused by TNBS.
dataset_first_40k.jsonl/37132
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Article content Just as the Quebec government revealed it was backing away from its own, controversial hate crimes legislation, the city of Montreal announced it was setting up a specialized police unit to document and analyze not just hate crimes but hate “incidents.” Defined as any incident “that is not a crime but that can affect the sense of security of a person or identifiable group because of their race, national or ethnic origin, language, colour, religion, gender, age, sexual orientation or disability,” hate incidents, real or perceived, will be investigated wherever they take place – whether at work, school or on the Internet, said Mayor Denis Coderre. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Montreal police creating unit to investigate hate 'incidents' Back to video “Despite our irreproachable reputation of being a safe city, every year there are hate crimes and incidents,” Coderre told reporters gathered at City Hall. “Some make headlines, some don’t. Two weeks ago, for example, I was profoundly shocked to see that two gay men were attacked in the street for the simple fact that they were kissing.…When something happens should we close our eyes and say this is an isolated incident, and tell ourselves it doesn’t happen here? No. You have to react, denounce and intervene.”
dataset_first_40k.jsonl/37154
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
you ever do a sketch that you plan on doing as a doodle and it ends up taking on it's own personality and causing you to spend WAY more time on it than you planned? This is one of those times. I love Akira and decided to try and draw Kaneda's bike just for the hell of it. Next thing you know I'd draw Kenada as well and colored it complete with digitally painted background. Guess that'll teach me to draw something I'm really into. You can check out the pencils in my scrap section if you're interested. I should note that I drew Kaneda in a different style than in the cartoon on purpose. I wanted to go a bit more realistic and the cartoon version was very...well...cartoony. I know he doesn't look exactly 'asian' but then again, neither does the cartoon version This is a great drawing, but there's so much red the eye doesn't know where to go, which hurts the final product. If you were to change the background to a cooler color to make the character and bike pop, it would be perfect
dataset_first_40k.jsonl/37172
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
OFAC Eases Sanctions Against Iran, But Restrictions Remain in Place for U.S. Companies As most U.S. companies are aware, on January 16, 2016, “Implementation Day” of the Joint Comprehensive Plan of Action (JCPOA), the United States lifted several prohibitions on doing business with Iran. These include the removal of secondary sanctions against non-U.S. companies and the lifting of restrictions on foreign subsidiaries of U.S. companies doing business with Iran. However, it is important to remember that key sanctions remain in place against Iran and that these continue to broadly prohibit U.S. persons from doing business with Iran. In particular, the U.S. trade embargo imposed on Iran and implemented pursuant to the Iranian Transactions and Sanctions Regulations (ITSR) remains in full effect, as do the accompanying export controls imposed on exports and reexports to Iran under the Export Administration Regulations (EAR) and the International Traffic in Arms Regulations (ITAR). In addition, blocking sanctions against several designated entities and individuals, including the Government of Iran, remain in place. Primary U.S. Sanctions and Export Controls Remain in Place. The U.S. trade embargo on Iran remains in place, which means that even after Implementation Day, U.S. persons continue to be broadly prohibited from engaging in transactions directly or indirectly with Iran or the Government of Iran. The exportation or reexportation of goods, technology, or services by a U.S. person or from the United States to Iran or the Government of Iran continues to be prohibited. Non-U.S. persons are prohibited from reexporting items that contain 10 percent or more U.S.-controlled content with knowledge or reason to know that the reexportation is specifically intended for Iran or the Government of Iran. Non-U.S. persons continue to be prohibited from knowingly engaging in activities that seek to evade the prohibitions on transactions with Iran or that cause the export of goods or services from the United States to Iran. Blocking Sanctions Remain in Place. Blocking sanctions remain in place with respect to entities and individuals designated pursuant to authorities relating to support for terrorism; Iran’s human rights abuses; proliferation of weapons of mass destruction; destabilizing activities and human rights abuses in Syria and Yemen; diversion of goods intended for the people of Iran; officials, agents, and affiliates of the Iranian Revolutionary Guard Corps (IRGC); and foreign sanctions evaders, among others. These sanctions specifically target the Government of Iran, Iranian Financial Institutions, and Islamic Republic of Iran Broadcasting among other entities. Secondary Sanctions That Involve Iran-Related SDNsRemain in Place. Secondary sanctions continue to apply to non-U.S. persons (primarily foreign financial institutions) who knowingly facilitate significant financial transactions with or provide material or certain other support to Iran-related SDNs. Whether a financial transaction is “significant” continues to be determined by the criteria enumerated under section 561.404 of the Iranian Financials Sanctions Regulations (IFSR). Such criteria include, but are not limited to, the size, number, and frequency of transactions; the nature of the transactions; the level of awareness of the transaction by individuals at the relevant financial institution; the nexus between the financial institution performing the transaction and the blocked person; and the overall impact of the transaction on the objectives of the Comprehensive Iran Sanctions, Accountability, and Divestment Act (CISADA). Certain Menu-Based Secondary Sanctions Remain in Place. After Implementation Day, menu-based sanctions (e., certain sanctions that the United States may impose in response to specified conduct) continue to apply to the following persons: Persons who materially assist, sponsor, or provide support for (1) the IRGC or agents, officials, or affiliates thereof; (2) persons who engage in significant transactions with the IRGC; and (3) persons subject to financial sanctions under United Nations Security Council Resolutions that impose sanctions with respect to Iran; Non-U.S. persons who engage in certain transactions involving the energy, shipping, and shipbuilding sectors of Iran, or the provision of underwriting, insurance, or reinsurance, if the transactions involve SDNs; Non-U.S. persons who sell, supply, or transfer directly or indirectly to or from Iran graphite, raw or semi-finished metals such as aluminum and steel, coal, and software for integrating industrial processes will continue to be subject to U.S. sanctions if certain enumerated criteria are met. Non-Proliferation Sanctions Remain in Place. Sanctions under the Iran, North Korea and Syria Nonproliferation Act related to the acquisition of nuclear-related commodities and services for nuclear activities, and other related non-proliferation sanctions remain in place. The United States will seek legislative changes to these sanctions, as appropriate, on Transition Day. Iran Remains a State Sponsor of Terrorism. Even after Implementation Day, Iran remains designated as a state sponsor of terrorism. Accordingly, there remain in place several restrictions related to this designation, including but not limited to (1) a ban on the export and sale of defense items to Iran; (2) restrictions on exports of certain sensitive technology and dual-use items; (3) restrictions on foreign assistance; and (4) certain financial restrictions. Stay Connected About Wiley Rein has one of the largest and most diverse international trade practices in the United States. Named an “International Trade Group of the Year” for four consecutive years by Law360 and recognized by Chambers USA as one of the country’s elite international trade practices, our Team includes lawyers with expertise across a variety of areas, dedicated international trade advisors, economic analysts, and former U.S. government officials. Read More.
dataset_first_40k.jsonl/37176
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Last weekend, the Scientific American blogger community blew up as only a blogger community can, over a somewhat complex issue. Many of us are blogging in response, and as much as I hate to I’m joining in the madness. I’ll try not to dwell on what actually happened, because it’s barely what I want to talk about. Danielle Lee, Ph.D., has been blogging regularly for SciAm for a couple years as the Urban Scientist. She was contacted by another website that asked her to blog for free, which she politely declined to do. The site responded by calling her a dirty name: “whore.” She responded -- again politely -- by blogging about the issue, on Urban Scientist. The post mysteriously came down. SciAm editor Mariette DiChristina tweeted an almost equally mysterious message explaining the post was somehow “not apropriate,” and then basically the world came to an end. Everybody knew what had happened, and everybody was yelling to each other about it at the same time -- it was censorship! it was marginializing! how could Scientific American have shut up on of our free voices! it had to do with Lee being a woman! It was because she was black! It was because, oh, for pity’s sake, what wasn’t it because. And here’s me, sitting quietly at home, thinking, “Lawyers.” I bided my time. My own small contribution to the chorus came when, sometime on Oct. 12, along with all SciAm bloggers I got an email from DiChristina saying I was right. Lee had apparently named names and hither or yon crossed the kind of boundaries that get lawyers all worked up. They were currently about the business of figuring out what was what. So I tweeted, “I profoundly trust @sciam et al. to get this right and explain it once it is.” Since then not much has slowed down. From what I can tell, SciAm is getting this right, and in the meantime has explained it quite to my satisfaction. A lawyer got his underpants up his butt, and so everything shut down. If I had a dollar for every time that happened to me as a writer, I’d have -- well, I’d have a lot more than I’m getting for this blog post. But like I said, the straightforward facts haven’t slowed anybody down. The current batch of blog-counterblog is already on the reactions to the reactions to the reactions, on things like whether various apologies were sufficiently abject. The volume hasn’t come down, so I’m hoping to get people to recognized this one thing: It’s not a bad thing to keep your mouth shut and wait for more information. I’m a little confused how scientists and science bloggers -- a group of people who more than any other ought to know that the truth is usually complex and that data always helps in drawing conclusions -- had so much to say on a topic about which they all knew they were missing at least some information, but hey, it’s the blogosphere. People post first and ask questions later, which is the nature of the thing. And that’s the nature we ought to think about here. In any dead-tree publication, a piece like Lee’s would have raised editorial eyebrows -- back when there were editors -- who would have made darned sure they got to the person Lee named and made sure her accusations were accurate. The piece would have come out later, and that would have been it. These days aren’t those. Lee wrote her post, under the SciAm aegis, with no editorial guidance but her own. Lawyers, paid to get their underpants up their butts, got their underpants up their butts. Not a bad thing, mind you -- if Lee was wrong? And the person who called her a whore was actually pretending to be from the website? Or she had misinterpreted? Or been tricked? Or any of a number of other things were happening that I can’t even say? Because more lawyers would get their underpants up their butts? Then it would be a pretty good thing that the post had come down. See: bloggers appear not to understand. An editor’s job is hard. She has to balance the constituencies of writers, readers, lawyers, publishers, sources, subjects, advertisers, and others, who collectively make the Hobbesian “warre of every one against every one” look like a quilting bee. Sometimes she has to say no; sometimes she has to act defensively for the good of the publication. Sometimes in explaining what is happening in a way that will not cause further lawyerly hyperventilation she may be obtuse or even in error. But in the fullness of time, she’ll usually get things right. That’s how she -- or he, or whomever -- ended up as an editor. Trust me -- it’s not because of the high pay and the groupies. So let me speak as a long-term writer here. In the last decades we writers have had to learn to function in a completely new ecosystem, learning that speed often trumps quality, that getting your voice in the rumpus is sometimes more important than getting the right tone, that we’re all out here on our own doing what we can, without the editorial support we learned to depend on. In some ways that’s wonderful. The new everything everywhere all at once all the time story ecosystem is amazing and opens doors for great work and new voices. But it utterly ignores something the old ecosystem actually used to do pretty well: accuracy. It often forgets to take a breath. Think about who else is involved. Consider the sources. Address accuracy. Measure tone. Mind you, I’m not criticizing Dr. Lee here. I’m criticizing the people who defended her from that noted long-term oppressor of women and minority voices: Scientific American. The site that for years had been happily sharing her work, and that in one moment of imperfectly managing a complex situation has found itself chased by towns’ worth of the self-righteous with torches and pitchforks. I’m not putting a single link in this piece. You can find anything you want just by googling, plus I'm not looking to pick fights. But I will say this. Scientific American has worked for closing in on 200 years to earn its reputation, and people who drew conclusions and cast stones based on their imperfect understanding of incomplete sets of facts regarding a single decision may be wonderful scientists. But I fear they have some work to do as writers. I’m proud to write for this site. I’m proud to have my work here. And if removing a possibly actionable post for a day or so while facts are corroborated is the worst mistake Scientific American ever makes it can count on my continued support. I hope that’s the worst thing that ever happens to Dr. Lee. Honestly? It sounds to me like SciAm had her back, but I can certainly understand if she didn’t feel that way at first. Though I won’t be able to understand it if she doesn’t feel that now. And I hope a lot of other bloggers put some time into thinking about whether their own posts might not occasionally profit from a day or two’s wait.
dataset_first_40k.jsonl/37180
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Product Detail Style and trend will be at the peak of your beauty when you attire this pretty peach georgette floor length anarkali suit showcased by Sonal Chauhan. This semi stitched suit also comprises matching color santoon bottom and inner along with embroidered chiffon lace dupatta. Specially designed to wear for wedding functions, receptions, engagement ceremony and family occasions where you want to be center of attraction. Team it with lovely accessories to make your looks more beautiful.Style and trend will be at the peak of your beauty when you attire this pretty peach georgette floor length anarkali suit showcased by Sonal Chauha... view more view less Product Type Anarkali Suit (Semi Stitched) Top Material Georgette Length Chest upto 42 - 44 inches and length upto 50 - 52 inches. Colour Peach Lining Material Santoon Length 2 Mtr Colour - Bottom Material Santoon Length 2 Mtr Colour - Dupatta Material Chiffon Length 2 Mtr Colour Peach Care Dry Clean. SKU : JNX-MAISHA-MASKEEN-5503B Check Cash on Delivery: Product wishlist This product is already in your wishlist. Do you want to go to your Wishlist? Product Detail Style and trend will be at the peak of your beauty when you attire this pretty peach georgette floor length anarkali suit showcased by Sonal Chauhan. This semi stitched suit also comprises matching color santoon bottom and inner along with embroidered chiffon lace dupatta. Specially designed to wear for wedding functions, receptions, engagement ceremony and family occasions where you want to be center of attraction. Team it with lovely accessories to make your looks more beautiful.Style and trend will be at the peak of your beauty when you attire this pretty peach georgette floor length anarkali suit showcased by Sonal Chauha... view more view less
dataset_first_40k.jsonl/37186
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Compiler C to Brainfuck (for harassing a professor)? A professor of mine has said he'll accept homework assignments in any language we'd care to use. I'm on good enough terms that I'd like to mess with him a bit and submit a valid homework assignment using brainfuck, whitespace, or some equally "useful" language. I have the C-sources for a few simple numerical analysis routines as well as the compiled output and the assembly files they generate. Does anyone know of a decompiler (or a C->brainfuck translator) that could give me something akin to the "brainfuck source code"? A: Just use APL or J. Unlike BF, they were actually designed to serve a "useful" (and not a "useful as in BF" sense) purpose - and yet can easily make Perl code-golf entries look like novels. (The dedication and mental training to enjoy these languages is currently more than my skill/effort levels.) If the goal is using a purely esoteric language, I have always enjoyed the look of Piet programs. It looks prettier and is actually able to solve common CS homework problems. Following the links will reveal "Piet assemblers" and other tools. Win. Happy coding. A: For what it's worth, I just wrote a very simple Brainfuck Assembler (inspired by this SO post actually), which assembles readable source code (not C, just something simple and nameless) to BrainFuck. The source-code and compilation/usage instructions can be found here: BrainFuck Assembler. Edit: The project has recently been updated under a new name: BrainFix.
dataset_first_40k.jsonl/37193
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
1/22/2006 A thought-provoking piece (Eternally Teenaged) argues that adolescence in the US now extends into the early 30s -- perhaps as a result of over-pressurized childhoods that, among other things, render children useless much longer and more profoundly than need be: "Contemporary childhood pressures children intensely but seems to do little to make them feel ready for adulthood... Perplexed parents [provide] ever more tutors, soccer skills camps and ballet lessons. They exhaust themselves ... and guarantee that children have no opportunity to make real contributions to family survival or well-being. ... No wonder they spend every free second in some virtual world - computer or television screens before them, iPods in their ears."
dataset_first_40k.jsonl/37198
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
2.08.2014 Change the color of the diamonds in the 2 squares to show the progression or calculation result of the diamonds that are horizontal.For example on the left and right sets - vertical:gold + gold = gold; gold + red = gold; red + red = red.The stand opens and the third missing part (7/7) is obtained.
dataset_first_40k.jsonl/37212
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
United Kingdom tramcar stock Over the years of trams and tramways, there have been many designs of tramcars for use on the tramways, ranging from historical locomotives pulling wagons, to some of the preserved cars such as the Pantograph, Coronation, Balloon or Standard cars at the National Tramway Museum or at the Blackpool tramway. During the nineties and early noughties there was a renaissance in UK tramways with several new networks opening and expanding leading to a second generation of modern tramcars such as Bombardier's INCENTRO and the Ansaldobreda S.P.A. T-68s and T-69 as well as Sheffield's Supertram. At the start of a new decade another generation of new tramcars are on order or entering service such as the Flexity Swifts in Manchester, Flexity 2's in Blackpool, customised units manufactured by CAF for Edinburgh and a replacement class for the short lived and troubled T-69 of the Midland Metro. Modern Tramcar Stock Blackpool Tramway Flexity 2 (Blackpool) Flexity 2 Edinburgh Tramway Edinburgh Tram manufactured by CAF Manchester Metrolink T-68 M5000 Flexity Swift (High-Floor) Midland Metro T-69 Unknown new class to replace troubled T-69 Nottingham Express Transit Incentro Sheffield Supertram Siemens-Duewag Supertram Tramlink CR4000 Flexity Swift (Low-Floor) Preserved Tramcar Stock Blackpool Tramway Coronation National Tramway Museum Pantograph Toastrack
dataset_first_40k.jsonl/37217
{ "meta": { "pile_set_name": "Wikipedia (en)" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Kinetics and mechanism of the NCCO + NO reaction. The kinetics of the NCCO + NO reaction was studied by diode infrared laser spectroscopy. The results show that the total rate coefficient of the reaction is highly pressure dependent, with k(1) (298 K) = (3.2 +/- 0.5 to 27.1 +/- 2.0) x 10(-13) cm(3) molecule(-1) s(-1) over the total pressure range 3-25 Torr. Only very small yields of CO(2) and CO products were detected, with upper limits on branching ratios estimated at Phi (CO(2) + NCN) < or = 0.01, Phi (2NCO) < or = 0.01, and Phi(CO + NCNO) < or = 0.06. The reaction mechanism was investigated by calculating the potential energy surface (PES) using ab initio methods at the DFT-B3LYP/6-311++G**//CCSD(T)/6-311++G** level. The PES shows that pathways leading to bimolecular/trimolecular product channels involve high barriers. Both experiment and theory therefore indicate that the major pathway is formation and collisional stabilization of an NCC(NO)O adduct.
dataset_first_40k.jsonl/37232
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Chrysalis Hive By RaikohIllust Watch 412 Favourites 36 Comments 9K Views Or Changeling Hive, or however it could be called. Anyway, this is what I picture the home of the Changelings might look like, with the huge rock formation looking like the Changeling Queen's horn. IMAGE DETAILS Image size 1100x1422px 176.58 KB Show More Published : May 14, 2012
dataset_first_40k.jsonl/37239
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
/* * Created by SharpDevelop. * User: Alexander Petrovskiy * Date: 12.12.2011 * Time: 12:34 * * To change this template use Tools | Options | Coding | Edit Standard Headers. */ namespace UIAutomationTestForms { using System; using System.Windows.Forms; using System.Collections; /// <summary> /// Description of WinFormsForm. /// </summary> public partial class WinFormsForm : Form { // public WinFormsForm() // { // // // The InitializeComponent() call is required for Windows Forms designer support. // // InitializeComponent(); // // // // TODO: Add constructor code after the InitializeComponent() call. // // // } protected WinFormsForm( string formName, string formTitle, System.Windows.Automation.ControlType controlType, int controlDelay) { ControlType = controlType; ControlDelay = controlDelay; FormName = formName; FormTitle = formTitle; if (FormName == "WinFormsNoTaskBar") { FormBorderStyle = FormBorderStyle.FixedToolWindow; this.Visible = false; AllowTransparency = true; ControlBox = false; ShowIcon = false; ShowInTaskbar = false; } //this.ChildForm = this; // // The InitializeComponent() call is required for Windows Forms designer support. // InitializeComponent(); // // TODO: Add constructor code after the InitializeComponent() call. // } protected WinFormsForm( string formName, string formTitle, System.Windows.Automation.ControlType controlType, string controlName, string controlAutomationId, int controlDelay) { ControlType = controlType; ControlDelay = controlDelay; ControlName = controlName; ControlAutomationId = controlAutomationId; FormName = formName; FormTitle = formTitle; if (FormName == "WinFormsNoTaskBar") { FormBorderStyle = FormBorderStyle.FixedToolWindow; this.Visible = false; AllowTransparency = true; ControlBox = false; ShowIcon = false; ShowInTaskbar = false; } //this.ChildForm = this; // // The InitializeComponent() call is required for Windows Forms designer support. // InitializeComponent(); // // TODO: Add constructor code after the InitializeComponent() call. // } protected WinFormsForm( string formName, string formTitle, ControlToForm[] controlToForm) { // this.ControlType = controlType; // this.ControlDelay = controlDelay; // this.ControlName = controlName; // this.ControlAutomationId = controlAutomationId; controlsArray = controlToForm; FormName = formName; FormTitle = formTitle; if (FormName == "WinFormsNoTaskBar") { FormBorderStyle = FormBorderStyle.FixedToolWindow; this.Visible = false; AllowTransparency = true; ControlBox = false; ShowIcon = false; ShowInTaskbar = false; } //this.ChildForm = this; // // The InitializeComponent() call is required for Windows Forms designer support. // InitializeComponent(); // // TODO: Add constructor code after the InitializeComponent() call. // } private ControlToForm[] controlsArray { get; set; } protected System.Windows.Automation.ControlType ControlType; protected int ControlDelay; protected Form ChildForm; protected string ControlName; protected string ControlAutomationId; string FormName; string FormTitle; void WinFormsFormShown(object sender, EventArgs e) { if ((null == ControlType) && (null == controlsArray || controlsArray.Length == 0)) { return; } ControlToForm[] arr; if (null == controlsArray && null != ControlType) { var ctf = new ControlToForm(); ctf.ControlType = ControlType; ctf.ControlName = ControlName; ctf.ControlAutomationId = ControlAutomationId; ctf.ControlDelayEn = ControlDelay; var arrList = new ArrayList(); arrList.Add(ctf); arr = (ControlToForm[])arrList.ToArray(typeof(ControlToForm)); } else { arr = controlsArray; } for (int i = 0; i < arr.Length; i++) { string _controlType = arr[i].ControlType.ProgrammaticName.Substring( arr[i].ControlType.ProgrammaticName.IndexOf(".") + 1); arr[i].ControlTypeAsString = _controlType; switch (_controlType) { case "Button": var b = new Button(); loadControl(b, arr[i]); break; case "MonthCalendar": case "Calendar": var mc = new MonthCalendar(); loadControl(mc, arr[i]); break; case "CheckBox": var chk = new CheckBox(); loadControl(chk, arr[i]); break; case "ComboBox": var cmb = new ComboBox(); loadControl(cmb, arr[i]); break; case "GroupBox": case "Group": var gb = new GroupBox(); loadControl(gb, arr[i]); break; case "Label": case "Text": var l = new Label(); loadControl(l, arr[i]); break; case "ListBox": case "List": var lb = new ListBox(); loadControl(lb, arr[i]); break; case "ListView": //case "Table": var lv = new ListView(); loadControl(lv, arr[i]); break; case "MenuBar": var ms = new MenuStrip(); loadControl(ms, arr[i]); break; case "ProgressBar": var pb = new ProgressBar(); loadControl(pb, arr[i]); break; case "RadioButton": var rb = new RadioButton(); loadControl(rb, arr[i]); break; case "RichTextBox": case "Document": var rtb = new RichTextBox(); loadControl(rtb, arr[i]); break; case "StatusBar": var sb = new StatusBar(); loadControl(sb, arr[i]); break; case "Table": var pg = new PropertyGrid(); loadControl(pg, arr[i]); break; case "TextBox": case "Edit": var tb = new TextBox(); loadControl(tb, arr[i]); break; case "TreeView": case "Tree": var tv = new TreeView(); loadControl(tv, arr[i]); break; default: //System.Windows.Forms.DataGridTextBox //System.Windows.Forms.DataGridView //System.Windows.Forms.GridItem //System.Windows.Forms.DomainUpDown //System.Windows.Forms.RichTextBox //System.Windows.Automation.ControlType.Document break; } // switch (_controlType) Application.DoEvents(); } // for (int i = 0; i < arr.Length; i++) //Application.DoEvents(); } private void loadControl<T>(T control, string _controlType) { try { (control as Control).GetType() .GetProperty("Text") .SetValue(control, ControlName != string.Empty ? ControlName : _controlType, null); /* if (this.ControlName != string.Empty){ (control as System.Windows.Forms.Control).GetType().GetProperty("Text").SetValue(control, this.ControlName, null); } else { (control as System.Windows.Forms.Control).GetType().GetProperty("Text").SetValue(control, _controlType, null); } */ (control as Control).GetType() .GetProperty("Name") .SetValue(control, ControlAutomationId != string.Empty ? ControlAutomationId : _controlType, null); /* if (this.ControlAutomationId != string.Empty){ (control as System.Windows.Forms.Control).GetType().GetProperty("Name").SetValue(control, this.ControlAutomationId, null); } else { (control as System.Windows.Forms.Control).GetType().GetProperty("Name").SetValue(control, _controlType, null); } */ (control as Control).Visible = false; var r = new Random(); (control as Control).Left = r.Next(0, this.Width - 20); (control as Control).Top = r.Next(0, this.Height - 20); ChildForm.Controls.Add(control as Control); var showControlDelegate = new ShowControl(runTimeout); showControlDelegate(ControlDelay, control as Control); } catch { } } private void loadControl<T>(T control, ControlToForm controlToForm) { try { // if (this.ControlName != string.Empty){ // (control as System.Windows.Forms.Control).GetType().GetProperty("Text").SetValue(control, this.ControlName, null); // } else { // (control as System.Windows.Forms.Control).GetType().GetProperty("Text").SetValue(control, _controlType, null); // } (control as Control).GetType() .GetProperty("Text") .SetValue(control, controlToForm.ControlName != string.Empty ? controlToForm.ControlName : controlToForm.ControlTypeAsString, null); /* if (controlToForm.ControlName != string.Empty){ (control as System.Windows.Forms.Control).GetType().GetProperty("Text").SetValue(control, controlToForm.ControlName, null); } else { (control as System.Windows.Forms.Control).GetType().GetProperty("Text").SetValue(control, controlToForm.ControlTypeAsString, null); } */ // if (this.ControlAutomationId != string.Empty){ // (control as System.Windows.Forms.Control).GetType().GetProperty("Name").SetValue(control, this.ControlAutomationId, null); // } else { // (control as System.Windows.Forms.Control).GetType().GetProperty("Name").SetValue(control, _controlType, null); // } (control as Control).GetType() .GetProperty("Name") .SetValue(control, controlToForm.ControlAutomationId != string.Empty ? controlToForm.ControlAutomationId : controlToForm.ControlTypeAsString, null); /* if (controlToForm.ControlAutomationId != string.Empty) { (control as System.Windows.Forms.Control).GetType().GetProperty("Name").SetValue(control, controlToForm.ControlAutomationId, null); } else { (control as System.Windows.Forms.Control).GetType().GetProperty("Name").SetValue(control, controlToForm.ControlTypeAsString, null); } */ (control as Control).Visible = false; var r = new Random(); (control as Control).Left = // 20130110 //r.Next(0, this.Width - 20); r.Next(0, this.Width - 50); (control as Control).Top = // 20130110 //r.Next(0, this.Height - 20); r.Next(0, this.Height - 50); // this.Controls.Add(b); ChildForm.Controls.Add(control as Control); var showControlDelegate = new ShowControl(runTimeout); // WriteVerbose(this, "runScriptBlocks 5 fired"); //showControlDelegate(this.ControlDelay, control as System.Windows.Forms.Control); showControlDelegate(controlToForm.ControlDelayEn, control as Control); } catch { } } private void runTimeout(int timeout, Control control) { System.Threading.Thread.Sleep(timeout); control.Visible = true; } } delegate void ShowControl(int timeout, Control control); }
dataset_first_40k.jsonl/37242
{ "meta": { "pile_set_name": "Github" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
MONTREAL -- Montreal police are looking for other victims of a 19-year-old man who police allege has committed several sex-related crimes involving minors. Investigators from the sexual exploitation squad of the Service de police de la Ville de Montreal say Alexandre Bosse, 19, was arrested Oct. 2 and charged with inciting sexual contact with three girls aged between 13 and 16. Investigators say they have reason to believe Bosse may have other victims. Bosse contacted his victims over social media, police allege, using the online handles alexandre.bosse.545 and alexandre.boe.5, and quickly convinced them to perform sexual acts. The suspect stands 1.83 metres and weighs 109 kg. He has a distinctive tattoo of a dragon on his left forearm. Bosse appeared in court in Montreal on Oct. 21 and was charged with luring, producing child pornography and communicating with a minor to incite sexual contact. Police are asking anyone who believes they were a victim of Bosse's to visit their local police station or call 911 to file a report. Investigators note that Bosse has no fixed address, and so may have victims in different cities.
dataset_first_40k.jsonl/37248
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
392 F.2d 155 Ray S. BAILEY, Appellant,v.Ellis C. MacDOUGALL, Director of the South CarolinaDepartment of Corrections, et al., Appellees. No. 11735. United States Court of Appeals Fourth Circuit. Argued Dec. 4, 1967.Decided Feb. 28, 1968. Betty M. Sloan, Columbia, S.C., for appellant. Edward B. Latimer, Asst. Atty. Gen. of South Carolina (Daniel R. McLeod, Atty. Gen. of South Carolina, and B. O. Thomason, Jr., Sol., Thirteenth Judicial Circuit, on brief), for appellees. Before BOREMAN, BRYAN and BUTZNER, Circuit Judges. BUTZNER, Circuit Judge: 1 Ray S. Bailey was sentenced to life imprisonment in 1936 upon a plea of guilty to murder. Now Bailey challenges the validity of his plea, which was entered after the chief of police and the state's solicitor promised in writing they would recommend parole or pardon after Bailey had served a term not exceeding ten years. We hold that Bailey's arraignment was defective and the record fails to establish he understood the consequences of his plea. We remand the case for proceedings consistent with this opinion. 2 Bailey applied for a writ of habeas corpus in 1964 in the Court of Common Pleas for Richland County, South Carolina. After a full evidentiary hearing, the court found that Bailey's guilty plea was not voluntary, and ordered a new trial. Upon appeal the Supreme Court of South Carolina reversed and entered final judgment discharging the writ.1 Bailey then applied to the United States District Court for a writ of habeas corpus, which was denied upon the basis of the state records without a plenary hearing. 3 A policeman, attempting to thwart a bank robbery, was killed in 1932 in Greenville, South Carolina. A few days later Bailey was charged with murder. Following an unsuccessful fight against extradition from North Carolina,2 Bailey fled to Georgia. He was captured and returned to Greenville for trial. His brother, C. M. Bailey, and other members of his family retained a capable and experienced lawyer to defend him. He steadfastly maintained that he was not in Greenville the night of the murder, and upon his arraignment he pleaded not guilty. 4 The mainstay of the prosecution's case was a witness named Corea, who identified Bailey as the murderer of the policeman. Corea was sentenced to prison for robbery and refused to testify unless he was pardoned. The South Carolina solicitor who was prosecuting the case knew that another eyewitness was unable to identify Bailey positively. He also knew a number of witnesses would support Bailey's alibi. The solicitor suggested to Bailey's lawyer that Bailey plead guilty 'with a recommendation to mercy.'3 This plea would result in a mandatory life sentence. Bailey's lawyer did not know Corea refused to testify.4 He thought the evidence would be sufficient to take the case to the jury and he knew that public sentiment was aroused over the killing. He said that he could advise his client to plead guilty to manslaughter, but the solicitor declined this offer. The lawyers finally agreed that if Bailey would enter a plea of guilty to murder with recommendation to mercy, the solicitor and the chief of police would recommend a pardon or parole after Bailey had served not more than ten years. 5 The defense attorney advised Bailey that if he did not participate in the shooting he should not plead guilty. The attorney explained that the plea arrangement meant a life sentence would be imposed, and it did not mean the Governor would have to grant parole or pardon. He added that ordinarily the Governor would give great weight to the recommendation of the solicitor and the chief of police.5 Bailey agreed to plead guilty. His attorney, out of an abundance of caution, required the solicitor and chief of police to put their promise in writing. They signed this statement: 6 'This will confirm our conversation that in the event that Ray Bailey enters a plea of guilty with recommendation to mercy in the case now pending against him in the General Sessions Court for Greenville County that I will, knowing the facts of the case and the circumstances surrounding same, after the said Ray Bailey has served for a period not exceeding ten years, recommend to the Board of Pardons or Governor a pardon or parole.' 7 Bailey withdrew his original plea and pleaded guilty with recommendation to mercy. He was sentenced to life imprisonment. No one mentioned the agreement. No inquiry was made to determine whether Bailey's plea was voluntary or whether he understood the charges against him and the consequences of his plea. In the state habeas hearing the solicitor testified that he believed the trial judge was not aware of the agreement. 8 Bailey's lawyer placed the statement in his safety deposit box. At the expiration of the ten year period, the solicitor, the chief of police, and Bailey's attorney unsuccessfully asked the Governor and the State Parole Board to pardon or parole Bailey.6 9 At the state habeas corpus hearing, Bailey testified that he was not in Greenville at the time the police officer was killed, and that at first he refused to plead guilty. He agreed to change his plea because he was certain any agreement the solicitor made would be carried out. He testified that there wasn't any doubt in his mind that he would be released in ten years. 10 Bailey was not alone in testifying he believed he would serve only ten years. The assistant solicitor, who investigated the case and was present at the arraignment, testified that '* * * when that plea was entered by that boy, at that time, I was convinced that, after service of these ten years, without doing something in the penitentiary to prevent it, he would have been released. I was convinced of it and I am sure that everybody in the courtroom that knew anything about it was.' 11 Bailey raises several questions about plea bargaining. He does not urge the practice in itself is unconstitutional.7 He does claim the promise rendered his plea involuntary and that his arraignment was constitutionally defective. 12 The state habeas judge found Bailey believed he would serve not more than ten years and that the agreement leading to his change of plea 'vitiated the voluntary nature of the guilty plea.' The Supreme Court of South Carolina concluded this judgment was erroneous.8 The State Supreme Court emphasized that the promise was only to recommend parole or pardon and that it had been kept, that the written statement was unambiguous, and that Bailey's attorney had explained to him that the Governor might not follow the recommendation. It concluded that the evidence did not disclose that the plea was induced by coercion, false promises, or misrepresentation, and that Bailey's plea was voluntary. 13 In Machibroda v. United States, 368 U.S. 487, 493, 82 S.Ct. 510, 513, 7 L.Ed.2d 473 (1962), the Court held: 14 'A guilty plea, if induced by promises or threats which deprive it of the character of a voluntary act, is void. A conviction based upon such a plea is open to collateral attack. See Walker v. Johnston, 312 U.S. 275, 61 S.Ct. 574, 85 L.Ed. 830; Waley v. Johnston, 316 U.S. 101, 62 S.Ct. 964, 86 L.Ed. 1302; Shelton v. United States, 356 U.S. 26, 78 S.Ct. 563, 2 L.Ed.2d 579, reversing 5 Cir., 246 F.2d 571.' 15 The voluntariness of Bailey's plea does not depend upon whether he was the victim of a false promise. The question remains: Did the promise, even if fulfilled,9 induce the plea and deprive it of the character of a voluntary act? Whether Bailey's plea was voluntary raises issues of fact, upon which the state courts differed. The state appellate court's rejection of the state habeas court's findings ordinarily would require us to remand the case to the federal district court for an evidentiary hearing. Townsend v. Sain, 372 U.S. 293, 83 S.Ct. 745, 9 L.Ed.2d 770 (1963). However, we find a remand unnecessary because the case can be decided upon an alternative ground which, under the circumstances, does not require another evidentiary hearing. 16 Bailey contends he was denied due process of law because the court did not advise him of the consequences of his plea. In examining whether Bailey fully understood the consequences of his plea, we limit ourselves to the direct consequences-- the length of the sentence to be served.10 Whether Bailey understood the consequences of his plea depends upon whether he understood the plea agreement. He claims the agreement meant he would be imprisoned not more than ten years. The state says the agreement provided only that he would be recommended for parole or pardon at the end of ten years. 17 In Kercheval v. United States, 274 U.S. 220, 223, 47 S.Ct. 582, 583, 71 L.Ed. 1009 (1927), the Court said: 18 'A plea of guilty differs in purpose and effect from a mere admission or an extrajudicial confession; it is itself a conviction. Like a verdict of a jury, it is conclusive. More is not required: the court has nothing to do but give judgment and sentence. Out of just consideration for persons accused of crime, courts are careful that a plea of guilty shall not be accepted unless made voluntarily after proper advice and with full understanding of the consequences.' 19 No particular form or ritual is required, but it must appear that the defendant understood the consequences of his plea.11 The evidence discloses, however, that no inquiry was made by anyone to determine Bailey's understanding of the consequences of his plea. The judge asked him no questions. Indeed, it appears from the record that the judge himself did not know the full consequences. Bailey's attorney did his best to explain it, but he testified at the habeas corpus hearing that he could not say that Bailey or his brother understood the proposition. Apparently the court and Bailey's attorney assumed that Bailey understood. Bailey challenges the validity of this assumption. He claims he thought the consequences would be not more than ten years' confinement in prison. 20 Ordinarily there is no great difficulty in ascertaining that the defendant understood the consequences of his plea even when the parties have engaged in plea bargaining. The bargain itself generally is laid before the court through the recommendation and motions of the prosecuting attorney.12 The difficulty arises in Bailey's case because the promise made by the prosecuting officers was extrajudicial. It was never revealed in open court, although Bailey's attorney and the solicitor both recognized that it was indispensable to securing Bailey's plea and that it had an important bearing upon Bailey's punishment. Regardless of whether we accept the state's or Bailley's version of the plea arrangement, the uncontradicted evidence shows that no effort was made at Bailey's arraignment to determine which version he understood. The dispute about the plea agreement, which must be adjudicated thirty years after arraignment, demonstrates the fundamental unfairness and the lack of due process in placing upon a prisoner the burden of showing by a preponderance of the evidence the terms of an admittedly secret, extrajudicial proviso that could substantially affect the length of his sentence. A prisoner's liberty should not depend upon the astuteness of his attorney in demanding and preserving written memoranda of a plea agreement or upon the vagaries of human recollection decades after arraignment. 21 The defect in Bailey's arraignment lies in the fact that no one-- court or counsel-- ascertained that Bailey understood the consequences of his plea. Nevertheless, if Bailey in fact understood, the error was harmless. Gundlach v. United States, 262 F.2d 72 (4th Cir. 1958), cert. denied 360 U.S. 904, 79 S.Ct. 1283, 3 L.Ed.2d 1255 (1959). The state, however, has the burden of proving harmless error. Cf. Munich v. United States, 337 F.2d 356, 360 (9th Cir. 1964). 22 The result does not depend upon the prisoner's subjective testimony alone. The issue is one of fact, which must be resolved by an examination of 'reasonable inferences to be drawn from all the surrounding facts and circumstances.'13 Ordinarily this issue could be decided only in a plenary hearing in the district court, but this rule is not inexorable. Cf. Fields v. Peyton, 375 F.2d 624 (4th Cir. 1967). Counsel for both Bailey and the respondent have assured us that all evidence that can be marshalled is contained in the record. We find the material facts for the determination of this issue to be uncontradicted. 23 Aside from Bailey, the only witnesses who knew about the agreement at the time it was made were the solicitor, the assistant solicitor, and Bailey's attorney. The solicitor never discussed the matter with Bailey and consequently could offer no testimony on this issue. The assistant solicitor testified that at the time of the arraignment he was convinced, barring misbehavior, Bailey would be released after ten years. Thus, he tends to corroborate Bailey. The only witness who actually discussed with Bailey the meaning of the agreement was Bailey's attorney. With regard to Bailey's claim, 'I accepted a life sentence with the distinct understanding that I would be free in ten years,' Bailey's attorney testified, 'He may have understood it that way * * * even though I tried to explain to him the circumstances of it, not being a lawyer and not being familiar with legalities and things of that kind. It's possible that Mr. Bailey felt that that would happen.' This evidence does not establish whether the state's version or Bailey's version of the plea agreement should be accepted. The evidence demonstrates, however, that the state has not carried its burden of provind harmless error by showing Bailey understood what the state claims to be the consequences of his plea. 24 Under familiar principles of due process, a guilty plea cannot be accepted unless the defendant understands its consequences. At the arraignment the court made no effort to ascertain what Bailey understood, either through its own efforts or through counsel, and the state has failed to show this error was harmless. The judgment of the district court is reversed and this case is remanded for the issuance of a writ of habeas corpus. Execution of the writ may be stayed for a reasonable time to permit the State of South Carolina to to retry Bailey if it be so advised. 25 Reversed and remanded. 1 Bailey v. MacDougall, 247 S.C. 1, 145 S.E.2d 425 (1965), cert. denied, 384 U.S. 962, 86 S.Ct. 1589, 16 L.Ed.2d 674 (1966) 2 Bailey was arrested in North Carolina on a warrant of extradition. On application for habeas corpus, a judge of the Superior Court of North Carolina held that South Carolina had failed to show probable cause for holding Bailey. The Supreme Court of North Carolina affirmed. Ex parte Bailey, 203 N.C. 362, 166 S.E. 165 (1932). The Supreme Court of the United States reversed, holding Bailey had the burden of showing beyond reasonable doubt that he was outside South Carolina. State of South Carolina v. Bailey, 289 U.S. 412, 53 S.Ct. 667, 77 L.Ed. 1292 (1933) 3 In South Carolina, a defendant can plead guilty to murder only before a jury, which, pursuant to the plea, returns a verdict of 'guilty of murder with the recommendation to the mercy of the court.' 4 Bailey urges, 'Constitutional due process cannot be satisfied where the prosecution negotiates a guilty plea knowing it has no other means to obtain a conviction and fails to disclose this fact to either the defendant's counsel or the court.' Bailey did not seek relief on this ground in the state court, and we do not consider it 5 When Bailey was arraigned, the Governor of South Carolina had absolute discretion to grant paroles and pardons. Ten years later, the Governor no longer exercised parole powers, although he could pardon. The Parole Board alone granted paroles 6 After serving about 14 years Bailey escaped to North Carolina and surrendered. Later he escaped to Montana, where he was captured 7 Plea bargaining that induces an innocent person to plead guilty cannot be sanctioned. Negotiation must be limited to the quantum of punishment for an admittedly guilty defendant. Cf. Tabor v. United States, 203 F.2d 948 (4th Cir. 1953), cert. denied, 345 U.S. 1001, 73 S.Ct. 1148, 97 L.Ed. 1407 (1953); Anderson v. State of North Carolina, 221 F.Supp. 930 (W.D.N.C.1963) A comprehensive review of authorities criticizing or supporting plea bargaining is contained in Commonwealth ex rel. Kerekes v. Maroney, 423 Pa. 337, 223 A.2d 699 (1966). The practice, when restricted by prudent safeguards, is approved in Institute of Judicial Administraction, ABA, Standards Relating to Pleas of Guilty, Part III (tentative draft 1967); Note, Guilty Plea Bargaining: Compromises by Prosecutors to Secure Guilty Pleas, 112 U.Pa.L.Rev. 865 (1964). The practice is criticized in Curlee, Criminal Law and Procedure, 1966-67 Survey of South Carolina Law, 19 S.C.L.Rev. 30, 34 (1967). 8 Bailey v. MacDougall, 247 S.C. 1, 145 S.E.2d 425 (1965), cert. denied, 384 U.S. 962, 86 S.Ct. 1589, 16 L.Ed.2d 674 (1966) 9 Cf. Shelton v. United States, 356 U.S. 26, 78 S.Ct. 563, 2 L.Ed.2d 579 (1958), reversing on confession of error 246 F.2d 571 (5th Cir. 1957); Edgerton v. State of North Carolina, 315 F.2d 676 (4th Cir. 1963); United States ex rel. Elksnis v. Gilligan, 256 F.Supp. 244, 253 (S.D.N.Y.1966) (dictum) 10 'Courts have not considered it necessary to inform the defendant of possible collateral consequences when such consequences result from subsequent criminal convictions of the defendant or do not relate directly to the charge to which the defendant pleads guilty.' Note, Guilty Plea Bargaining: Compromises by Prosecutors to Secure Guilty Pleas, 112 U.Pa.L.Rev. 865, 875 (1964) 11 Fed.R.Crim.P. 11, as amended in 1966, requires the court to determine this even though the defendant is represented by counsel. Many states also impose such a duty. Others hold the requirement is satisfied where counsel sufficiently informs the accused. Note, Criminal Procedure-- Duty of the Trial Judge to Advise a Defendant of the Consequences of a Guilty Plea, 19 S.C.L.Rev. 261 (1967), Annot. 97 A.L.R.2d 549 (1964) We decline to follow McGrady v. Cunningham, 296 F.2d 600, 96 A.L.R.2d 1286 (4th Cir. 1961), cert. denied, 369 U.S. 855, 82 S.Ct. 944, 8 L.Ed.2d 14 (1962). Now, Townsend v. Sain, 372 U.S. 293, 83 S.Ct. 745, 9 L.Ed.2d 770 (1963), would require a plenary hearing upon the petitioner's allegations. 12 Institute of Judicial Administration, ABA, Standards Relating to Pleas of Guilty 1.5, p. 29 (tentative draft 1967) suggests the plea agreement should be disclosed to the court, and that the court should advise the defendant that recommendations of the prosecutor are not binding on the court 13 United States v. Tateo, 214 F.Supp. 560, 565 (S.D.N.Y.1963)
dataset_first_40k.jsonl/37250
{ "meta": { "pile_set_name": "FreeLaw" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Thursday, May 02, 2013 I think I Know why, Sir When I had to deal with Vietnam in the crazy early 1970’s, I decided to be tested for OCS Navy for a program which would send me to Newport, Rhode Island and keep me out of the Army and let me ride out the war as a naval officer. I visited my local navy recruiting office and met with Chief Manny who introduced me to Jim, who was in the navy and hoping to use his knowledge to move up as an officer. I was 20 years old. After we took the intelligence tests, Chief Manny comes into the room and delivers what has become for me the classic story of lack of subtlety. I have made millions as a pen pal. And I can teach you---but only if you can prove you are as lazy as me Chief Manny begins his monologue with a few one liners. “I have good news and I have bad news and the bad news is you, Jim. You failed to achieve even the minimum score.” I breathed a sigh of relief as the news was obliquely delivered that I was on my way to Officer Candidate School, but my testing partner was being blown up by this callous crocodile. The chief was just getting started. “We were all rooting for you, Jim. We thought, surely, someone with your background and training, your years in the navy, would excel in these tests, but you blew it big time, my friend. You were the big loser here tonight.” My good news was now being mixed with my sympathy for the navy veteran. Like a true champion, he stood next to me and took the chief’s diatribe like the real man he was. He tried to deflect the sting. “I think I know why, sir,” were words he delivered to numb the blow. But the chief still had some more bombs to deliver as parting gifts. Dear Zoltan Google me and see how motivational I really am. And $99 to my paypal gives you a 30 day audience to learn my formula how motivational you can be and how it can attract money to you daily for the rest of your life. [email protected] “So, you now must leave, Jim. You see, Steve nailed this exam with flying colors and he is off to Officer Candidate School and you---well, you are heading home. So, goodbye Jim!” And Jim slowly slunk into the night and I was given a few more months how I could best join him on the sidelines. It has made for a funny story over the years, but still I feel for Jim, still picturing him mumbling into the night. I think I know why, sir.
dataset_first_40k.jsonl/37256
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Bjorn Thorsrud Bjorn Thorsrud is an American music producer, programmer, and audio engineer who has produced film scores and albums for rock and pop artists. He has also engineered, mixed, or has contributed production or programming to every Smashing Pumpkins record since 1998's Adore to 2012's Oceania. He previously worked for the Taj-Motown Record Company and established his own record label, Tri Records. He holds a bachelor's degree in physics and music from the University of Nevada, Reno. Thorsrud has worked with artists including, David Coverdale, Billy Corgan, The Dandy Warhols, Bruce Dickinson, Marianne Faithfull, The Frogs, Monster Magnet, Sleeping at Last, The Smashing Pumpkins, Asphalt Socialites, Linda Strawberry, Whitesnake, and Zwan. He lives in his hometown of Las Vegas, Nevada. Discography References External links Discogs page Category:American audio engineers Category:Living people Category:University of Nevada, Reno alumni Category:Place of birth missing (living people) Category:Year of birth missing (living people) Category:American people of Norwegian descent Category:American record producers
dataset_first_40k.jsonl/37257
{ "meta": { "pile_set_name": "Wikipedia (en)" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Se siete fotografi e avete un vostro streaming su Flickr lo saprete già: la piattaforma ha deciso che dall’8 gennaio 2019 gli account gratuiti non potranno caricare più di 1.000 foto o video. Flickr nacque nel 2004 come tool di Game Neverending, un mondo virtuale sviluppato dalla canadese Ludicorp. La piattaforma fu poi acquisita da Yahoo! che in seguito la cedette a Verizon. Infine SmugMug ha rilevato Flickr da Verizon. Fotografi virtuali sono fotografi veri La notizia ha generato un certo trambusto all’interno della comunità di utenti di mondi virtuali come Second Life, The Sims, World of Warcraft e simili. I fotografi “virtuali” temevano di non essere considerati fotografi a tutti gli effetti e che le loro immagini potessero essere eliminate dall’8 gennaio 2019. Intervenendo in un forum online il Ceo della piattaforma, Don MacAskill, ha tuttavia smentito questa indiscrezione. “I fotografi virtuali sono fotografi”, “a voi interessa la fotografia, così a noi interessate voi, è semplice” ha spiegato MacAskill. “Non so da dove sia nata l’idea che voi non siate veri fotografi, o che la fotografia sia una sorta di spam, ma non è venuta da me. Voi siete i benvenuti su Flickr” ha concluso. Da gennaio nuovo e più stringente Tos Essere considerati fotografi a tutti gli effetti significa anche dover sottostare a tutti i nuovi termini del servizio (Tos) di Flickr. Quindi anche non utilizzare Flickr per attività commerciali non autorizzate. “Se avete un account gratuito e non avete un account Flickr Pro, non potete linkare direttamente ad una shopping cart, una pagina di checkout o un prezziario contenuto su un altro sito, come pure non potete inserire un listino prezzi nelle descrizioni delle vostre foto su Flickr”. Insomma: Flickr ama Second Life e i mondi virtuali in genere, le “fotografie virtuali” e le numerose e ancora molto attive comunità che sono sorte attorno ad esse. Tra queste vi è il gruppo Mondi Virtuali – Virtual Worlds (questo il link: https://www.flickr.com/groups/mondivirtuali) da cui sono tratte anche le immagini di questo articolo di Paola Mills, Giovanna Silvestri e Brida Skynny. Come altri social media, Facebook in primis, il nuovo proprietario della piattaforma ha semmai deciso di provare a monetizzare i suoi servizi. I pasti gratis, se sono mai esistiti, stanno diventando un ricordo anche sul web. Se volete sapere come andrà a finire continuate a seguire Mondivirtuali.it, anche tramite il nostro account su Twitter e la nostra fanpage su Facebook (ma ricordate: Mondivirtuali è anche su Flickr, su Pinterest, su Scoop.it e su Paper.li, oltre che su Youtube) e magari iscrivetevi alla nostra newsletter!
dataset_first_40k.jsonl/37268
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Vorschau, Live-Ticker, Live-Timing, TV-Streaming-Übersicht, Twitter und und und – wir haben eine große Liste an Informationen zusammengestellt, damit das schönste Rennen des Jahres noch besser wird. Wie mittlerweile schon gewohnt wird es auch in diesem Jahr einen Non-Stop 24 Stunden Racingblog Live-Ticker geben. Außerdem haben wir zwei Experten vor Ort, die uns laufend mit Neuigkeiten, Bildern etc. versorgen und sich auch in den Live-Ticker einklingen werden. Vorschau Teil.1 Racingblog 24h Le Mans & Garage 56 Vorschau Teil.2 Racingblog LMP2 Vorschau Teil.3 Racingblog LMP1 Vorschau Teil.4 Racingblog GTE-PRO & GTE-AM Vorschau Teil.5 Racingblog Training- Qualifying Analyse und News Teil.6 Racingblog Le Mans Podcast Von unserem Autor FloausN gibt es zu dem eine Excel-Tabelle, die alle technischen Werte der LMP1 beinhaltet und genau ausrechnet, welches Team wie weit kommen wird (exklusive Reifenstints). Ihr könnt mit den Werten auch selber spielen, aber so wie sie Flo ausgefüllt hat, habt ihr die perfekte Übersicht über das Rennen in Le Mans! Excel Performance Liste LMP1 2014 Download (xls) Live-Ticker/Social Media Racingblog Live-Ticker Racingblog & RacingblogLIVE Für tägliche Updates von der Strecke Dailysportscar Live-Twitter (en) 24H Le Mans offizielle Twitter-Seite 24H Le Mans offizielle Facebook-Seite FIA WEC offizielle Twitter-Seite FIA WEC offizielle Facebook-Seite Le MansLIVE Twitterliste Racingblog Twitterliste Stefan (RB) Twitterliste Thomas Baekdal Twitter-Tracker Thomas Baekdal Twitter Hashtags: #LM24 #LeMans24 #FIAWEC #WEC Racingblog Le Mans Tippspiel Live-Timing 24H Le Mans 24H Le Mans (nur Live-Timing) Le MansLIVE (nur Live-Timing) FIA WEC Livestreams Eurosport zeigt in diesem Jahr die gesamten 24 Stunden aus Le Mans ununterbrochen live. Allerdings nur dann, wenn man auch Eurosport 2 empfangen kann. Eine Lösung ist der Eurosportplayer, der sowohl beide Programme enthält, als auch einige Sonderkanäle für Le Mans bereitstellt. Der Player kostet knapp 6 Euro für einen Monat, eine Investition, die sich lohnt. Dazu kommt, dass das Training, Qualifying, Rahmenprogramm und auch das Warm-Up live gezeigt werden. Sollte man etwas verpasst haben und es gerne zu einem späteren Zeitpunkt schauen wollen, dann gibt es die Möglichkeit in der Video-on-Demand Sektion. 24 Le Mans TV: mit französischen Kommentar (fr) 24 Le Mans TV: mit englischen Kommentar (en) Eurosportplayer: Zusatzkanäle, Sprachoption + VoD (kostenpflichtig) Eurosportplayer: Für iOS und Android FIA WEC App: bietet einige nette Extras + Livestream (kostenpflichtig) RTBF Livecenter: Livestream (Geoblock) FOX Sports Go: Livestream (Für US-Fans vorbehalten) Radio Le Mans: Audio-Livestream, absolut zu empfehlen (en) Radio Le Mans: für iOS/Android Live-Onboard Streams LMP1 Audi Sport Team Joest #3 #2 #1 Toyota Racing #7 #8 Porsche Team #14 #20 LMP2 Oak Racing #35 Garage 56 Nissan Motorsports Global #0 Stream II GTE-PRO Porsche Team Manthey #91 #92 Corvette Racing #73 #74 Entry-List Le Mans 2014 FIA WEC Group C via Dailysportscar Porsche Carrera Cup Streckendaten Circuit de la Sarthe Streckenlänge: 13,6 km Kurvenanzahl: 38 Durchschnittsgeschwindigkeit: (LMP1 ca. 240 km/h), (LMP2 ca. 220 km/h), (GTE ca. 205 km/h) Höchstgeschwindigkeit: (LMP1 ca. 338 km/h), (LMP2 ca. 305 km/h), (GTE ca. 295 km/h) Schnellste Runde (LMP1): 3:18.7, Stéphane Sarrazin (Peugeot 908 HDi FAP 2008) Le Mans Klassensieger 2013 LMP1: Audi Sport Team Joest – Tom Kristensen/Loic Duval/Allan McNish LMP2: Morgan-Nissan Oak Racing – Bertrand Baguette/Martin Plowman/Ricardo Gonzalez GTE-PRO: Porsche AG Team Manthey – Marc Lieb/Richard Lietz/Romain Dumas GTE-AM: Porsche IMSA Performance Matmut – Raymond Narac/Christophe Bourret/Jean-Karl Vernay Le Mans Spotter Guide 2014 by Andy Blackmore Dokumentationen Truth in 24 I Truth in 24 II A Matter of Seconds Wetter Wettervorhersage Regenradar Zeitplan 11.06.2014 16:00 Uhr – 20:00 Uhr FIA WEC Freies Training 22:00 Uhr – 00:00 Uhr FIA WEC Qualifying 1 12.06.2014 16:00 Uhr – 17:00 Uhr Le Legend Group C Qualifying 17:30 Uhr – 18:00 Uhr Porsche Carrera Cup Qualifying 19:00 Uhr – 21:00 Uhr FIA WEC Qualifying 2 21:30 Uhr – 00:00 Uhr FIA WEC Qualifying 3 14.06.2014 09:00 Uhr – 09:45 Uhr FIA WEC Warm-Up 10:05 Uhr – 10:50 Uhr Le Legend Group C Rennen 11:15 Uhr – 12:00 Uhr Porsche Carrera Cup Rennen 15:00 Uhr FIA WEC 24-Stunden-Rennen TV-Termine Übersicht Eurosport (Euro, Euro 2 & Euro-Player) überträgt das gesamte Rennen live. Die Sendezeiten sind wie folgt: Eurosport ändert während der Übertragung täglich den Zeitplan, demzufolge weichen die hier angegeben Zeiten um etwa 30 Minuten ab. Wir bitten dies zu entschuldigen. *update* 11.06.2014 LIVE 16:00 Uhr – 20:00 Uhr 24 H Le Mans Freies Training Euro 2 LIVE 22:00 Uhr – 00:00 Uhr 24 H Le Mans Qualifying 1 Euro 12.06.2014 LIVE 19:00 Uhr – 21:00 Uhr 24 H Le Mans Qualifying 2 Euro 2 LIVE 22:00 Uhr – 00:00 Uhr 24 H Le Mans Qualifying 3 Euro 13.06.2014 Aufz 03:35 Uhr – 05:30 Uhr 24 H Le Mans Qualifying Euro 2 Aufz 15:40 Uhr – 17:00 Uhr 24 H Le Mans Qualifying Euro 2 Aufz 18:30 Uhr – 20:30 Uhr 24 H Le Mans Qualifying Euro 2 14.06.2014 LIVE 08:55 Uhr – 09:55 Uhr 24 H Le Mans Warm-Up Euro LIVE 09:55 Uhr – 10:45 Uhr 24 H Le Mans Group-C Rennen Euro LIVE 14:55 Uhr – 16:30 Uhr 24 H Le Mans Startphase Euro LIVE 16:30 Uhr – 18:30 Uhr 24 H Le Mans Rennen Euro 2 LIVE 18:30 Uhr – 23:30 Uhr 24 H Le Mans Rennen Euro LIVE 23:30 Uhr – 00:30 Uhr 24 H Le Mans Rennen Euro 2 15.06.2014 LIVE 00:30 Uhr – 08:30 Uhr 24 H Le Mans Rennen Euro LIVE 08:30 Uhr – 09:15 Uhr 24 H Le Mans Rennen Euro 2 LIVE 09:15 Uhr – 15:30 Uhr 24 H Le Mans Schlussphase Euro ORF überträgt in Österreich einige Stunden live vom Geschehen. Die Sendezeiten sind wie folgt: 14.06.2014 LIVE 14:50 Uhr – 16:10 Uhr 24 H Le Mans Startphase ORF 1 LIVE 23:10 Uhr – 23:40 Uhr 24 H Le Mans Rennen ORF 1 15.06.2014 LIVE 02:10 Uhr – 02:40 Uhr 24 H Le Mans Rennen ORF 1 LIVE 05:10 Uhr – 06:00 Uhr 24 H Le Mans Rennen ORF 1 LIVE 11:20 Uhr – 12:00 Uhr 24 H Le Mans Rennen ORF 1 LIVE 14:00 Uhr – 15:40 Uhr 24 H Le Mans Schlussphase ORF 1 France (France 2) überträgt, wie der Name schon vermuten lässt in Frankreich, allerdings nur sehr eingeschränkt und nur vom Samstag. Die Sendezeiten: 14.06.2014 LIVE 14:50 Uhr – 15:50 Uhr 24 H Le Mans Startphase France 2 LIVE 16:55 Uhr – 18:40 Uhr 24 H Le Mans Rennen France 2 LIVE 23:00 Uhr – 23:10 Uhr 24 H Le Mans Rennen France 2 RTL überträgt in den Niederlanden fast das komplette Rennen live. Die Sendezeiten staffeln sich wie folgt: 14.06.2014 LIVE 14:00 Uhr – 19:50 Uhr 24 H Le Mans Startphase RTL 7 LIVE 20:30 Uhr – 02:00 Uhr 24 H Le Mans Rennen RTL 7 15.06.2014 LIVE 02:00 Uhr – 15:30 Uhr 24 H Le Mans Rennen/Schlussphase RTL 7 FOX Sports (FS1, FS2 und FS Go) überträgt in den USA (Zeiten – EST) das komplette Rennen live. Die Sendezeiten sind wie folgt: 14.06.2014 LIVE 08:30 AM – 04:00 PM 24 H Le Mans Start FOX Sports 1 LIVE 04:00 PM – 05:00 PM 24 H Le Mans Race FOX Sports 2 LIVE 05:00 PM – 06:30 PM 24 H Le Mans Race FOX Sports Go LIVE 06:30 PM – 01:00 AM 24 H Le Mans Race FOX Sports 2 15.06.2014 LIVE 01:00 AM – 07:30 AM 24 H Le Mans Race FOX Sports 1 LIVE 07:30 AM – 09:30 AM 24 H Le Mans Race/Finish FOX Sports 2 J-Sports überträgt in Japan (Zeiten – JST) einen Großteil des Rennens live. Die Sendezeiten sind wie folgt: 14.06.2014 LIVE 09:30 PM – 06:00 AM 24 H Le Mans Start/Rennen J-Sports 3 15.06.2014 LIVE 04:00 PM – 11:30 PM 24 H Le Mans Rennen/Schlussphase J-Sports 3 Es sei noch gesagt, dass der Racingblog-Guide täglich bis zum Rennbeginn aktualisiert wird, sofern es sich um nützliche Informationen handelt. Unser Live-Ticker beginnt am Samstag gegen 14:00 Uhr und endet am Sonntag 16:00 Uhr. Ihr könnt euch gerne interaktiv daran beteiligen, indem ihr euch in unserem Chat registriert und mitdiskutiert oder uns auf Rennsituationen hinweist, die uns entfallen bzw. nicht aufgefallen sind. Wir werden die Meldung im Live-Ticker verarbeiten. Das gesamte Team wünscht euch ein fantastisches 24-Stunden-Rennen an der Sarthe, Ausdauer und die nötige Kraft, die 24 Stunden ohne Schlaf durchzustehen, die hoffentlich ohne schwere Unfälle bleiben.
dataset_first_40k.jsonl/37273
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Can somebody please explain IOS line authentication? I'm trying to understand a config on one of our Cisco routers (teaching myself iOS) and have run into a problem with one line. Can somebody please explain the "line enable" piece of the command below and check the rest of my information to ensure it is correct? aaa authentication login default group tacacs+ local line enable --- # Creates an authentication list that specifies the types of authentication methods allowed. # aaa authentication login = command to authenticate users who want exec (enable) access into the access server (tty, vty, console, and aux). ## default = the named list is the the default one (in this case the default one is default) # There are three authentication methods: ## TACACS+ ## local ## line # All users are authenticated using the tacacs+ server (the first method). If the TACACS+ server doesn't respond, then the router's local database is used (the second method). The local authentication, define the username and password:: ## username xxx password yyy # Because we are using the list default in the aaa authentication login command, login authentication is automatically applied for all login connections (such as tty, vty, console, and aux). A: line and enable are additional methods of authentication that will be attempted after failure of the previous methods in the list. line authentication uses a password that's defined in your line configs, so it can vary based on your connection method. enable authentication simply uses the enable password defined in the enable password command. Here's a reference of the methods available for the authentication list: (config)#aaa authentication login default ? cache Use Cached-group enable Use enable password for authentication. group Use Server-group krb5 Use Kerberos 5 authentication. krb5-telnet Allow logins only if already authenticated via Kerberos V Telnet. line Use line password for authentication. local Use local username authentication. local-case Use case-sensitive local username authentication. none NO authentication.
dataset_first_40k.jsonl/37275
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
7.19.2009 Sam & I are doing the "Love Dare" book together (though it will take us much longer than 40 days to complete, seeing as how we've had it a week and are thru day 3...).(and the "Love Dare" book comes from the movie FireProof).But it gives you much to think about when truly thinking about HOW we are supposed to love our spouse. I am no expert, but I am excited about our 3 year anniversary coming up next month. and I want to be one of those marriages that truly was made to stand the test of time. This is a fun, somewhat challanging journey we can do as a couple. and I find it in good timing that Lacy posted the above quote because pretty much that's exactly what we need to do. so, thanks Lacy.
dataset_first_40k.jsonl/37282
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Description Due to the amount of suspicious ads being posted through SuperAds Pet categories, we ask strongly that users exercise caution when dealing with buyers/sellers on the sites in these areas.View this page for more information on ways to avoid internet fraud. Hi, I am looking for a cat, breed ragdoll, birman or snowshoe , 2 years or younger, for my son who has special needs. I am willing to pay a very small re-homing fee, but dont have the money to pay the high prices I see some people posting. These breeds are known to be good with children and we have has a ragdoll in the past and she was wonderful with him. thanks for your consideration Photos Contact seller about Wanted: Ragdoll. Birman or showshoe cat 2-years and under My name My email (500) Message Ad ID: 446774, User ID: 184736 What is the problem with this ad? What action do you recommend? Please Select a Category to move this ad to: Comments Thank-you for the report. This ad has been flagged. Your Name Your Email Your Friend's Email Message I thought you would be interested in this item on GeorgiaSuperAds.com. wrote: You can check it out by clicking or copying and pasting the following URL into your browser.
dataset_first_40k.jsonl/37287
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
To Autumn Theme of Time We don't think it's a coincidence that "To Autumn" mentions autumn and spring, but not winter. Keats doesn't want to dwell on the cold days to come. To appreciate autumn, we need to forget about how each passing day seems a little shorter and chillier. For the most part, the speaker stays focused on the present moment, just like the personified figure of autumn, who doesn't seem to have a care in the world. Nonetheless, the poem moves forward in subtle ways. The natural world is at the peak of sunlight and ripeness in the first stanza, and by the third stanza the sun is setting. Questions About Time What evidence can you find of time passing within the poem? Why is autumn an unconventional choice for the subject of an ode? Does the speaker succeed in undermining spring at the beginning of the third stanza? How so or how not? Why does the speaker ascribe feelings of mourning onto the gnats by the river? Do you think he is projecting his own feelings? Chew on This Try on an opinion or two, start a debate, or play the devil’s advocate. The primary tension in the poem is between the forward motion of the day and the season and the speaker's desire to freeze time in each stanza. The speaker recognizes that autumn has no chance of competing with spring.
dataset_first_40k.jsonl/37288
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
School Establishment Act 1616 The School Establishment Act 1616 was an Act of the Scottish Privy Council dated 10 December 1616. It mandated the establishment of publicly funded, Church-supervised schools in every parish of Scotland. The act was a consequence of the Scottish Reformation, and was the basis of all future acts of the Parliament of Scotland related to school establishment. Summary The act stated: the king (James VI) has a special care and regard that: Protestantism be everywhere fostered and promoted. everyone, especially the youth, be educated in civility, godliness, knowledge, and learning. 'Inglis' be universally established, and Gaelic be obliterated because it is a main cause for the barbarity and incivility of the people of the Isles and Highlands. therefore a school will be established in every parish, based on the resources of the parish, and such that: it will be paid for by the parishioners. it will be supervised by Church bishops. letters will be published so that none can claim ignorance of these requirements. The act reflected the current status of the ongoing Episcopalian-Presbyterian power struggle by specifying school supervision by bishops (as per the Episcopalian view; the Presbyterian view was supervision by presbyteries). For the most part, the act was inspired by adherence to the principles of Knox's Book of Discipline. The objective that everyone, especially the youth, be educated is taken from the Preamble to the book, while the means of realising this objective (government establishment of Church-supervised schools) is also from that book. Those who were sympathetic towards Highland culture praised the objective of promoting universally available education, but noted that government efforts in the Isles and Highlands were anti-Gaelic and not pro-education. By itself, the act was not effective, as it provided no means of realisation. The act would be ratified by the Parliament's Education Act 1633, which would also provide a method of realising the objective. The privy council act remained in effect into the nineteenth century as one of the principal statutes for the management of schools under Scots Law. See also Education Act 1633 Education Act 1646 Education Act 1696 Education in Scotland Notes Category:1616 in law Category:1616 in Scotland Category:United Kingdom Education Acts Category:School Establishment Acts Category:Acts of the Privy Council of Scotland Category:History of education in Scotland Category:Scots language Category:17th century in education
dataset_first_40k.jsonl/37291
{ "meta": { "pile_set_name": "Wikipedia (en)" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
aegis,also spelled Egisegis, plural Aegises, aegises or Egises, egises in ancient Greece, leather cloak or breastplate generally associated with Zeus, the king of the gods, and thus thought to possess supernatural power. Zeus’s daughter Athena adopted the aegis for ordinary dress. Athena placed on her aegis a symbolic representation of the severed head of the Gorgon Medusa. The head itself had been a gift from the Gorgon’s slayer, Perseus. Occasionally, another god used it—eit—e.g., Apollo in the Iliad, where it provoked terror. As early as Homer the aegis was more than an ordinary goatskin cloak, for it was decorated with golden tassels. A stout hide of this sort could turn a blow, like a buffcoat, and thus it often appears as armour. Later, after improvised armour of this type went out of use, it was occasionally thought of as a metal corselet.
dataset_first_40k.jsonl/37292
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
With the widespread use of electronic devices, such as smartphones and tablet terminals, games for such electronic devices, in addition to those for home video game machines, are actively being developed. Among a number of games of various genres that are being developed, three-dimensional puzzle games have gained popularity recently, and numerous three-dimensional puzzle games are being developed. For example, Japanese Unexamined Patent Application Publication No. 2011-101677 discloses a game apparatus that runs a game using eight types of regular hexahedrons which are displayed as three-dimensional computer graphics. Japanese Unexamined Patent Application Publication No. 2011-136049 discloses a puzzle game in which a puzzle is solved by arranging a plurality of displayed images and guessing the whole picture of an object that is present in virtual space. Existing three-dimensional puzzle games have shortcomings in that their rules and operation are too complicated. For example, the game apparatus described in Japanese Unexamined Patent Application Publication No. 2011-101677 provides a puzzle game in which a plurality of regular hexahedrons having complex regularity are rotated, which is difficult to play. Similarly, in the puzzle game described in Japanese Unexamined Patent Application Publication No. 2011-136049, operations needed to play the puzzle game are complicated, and therefore, the puzzle game is also difficult to play. Regarding games, such as existing three-dimensional puzzle games, for which players need to understand complicated rules or perform complicated operations, players may hesitate to start playing the games and tend to become tired of continuously playing the games. Accordingly, it is desired to implement a quick enjoyable three-dimensional game by simplifying rules and operation while maintaining the attractiveness of three-dimensional games.
dataset_first_40k.jsonl/37297
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
/* ex: set ff=dos ts=2 et: */ /* $Id$ */ /* * Copyright 2008 Ryan Flynn */ #ifndef UTIL_H #define UTIL_H #include <stddef.h> #include <stdlib.h> #include <stdint.h> #include <stdio.h> #ifdef WIN32 # define WIN32_LEAN_AND_MEAN # include <windows.h> # undef WIN32_LEAN_AND_MEAN #else # include <sys/time.h> #endif #include "types.h" #define MIN(a, b) ((a) < (b) ? a : b) #define MAX(a, b) ((a) > (b) ? a : b) /* little endian to host endianness short */ #define ltohs(x) x /* little endian to host endianness short */ #define ltohl(x) x /** * our own assertion macro that uses LOGF() and doesn't abort() in Release */ #ifdef DEBUG # define ASSERT(x) \ if (!(x)) { \ LOGF(__FILE__, __LINE__, NULL, "ASSERTION FAILED: %s\n", #x); \ abort(); \ } #else /* Release, don't abort() on failure */ # define ASSERT(x) \ if (!(x)) { \ LOGF(__FILE__, __LINE__, NULL, "ASSERTION FAILED: %s\n", #x); \ } #endif void DEBUGF(const char *, unsigned, const char *, ...); void LOGF(const char *file, unsigned line, const char *fmt, ...); #if !defined(_FORTIFY_SOURCE) size_t strlcpy(char *dst, const char *src, size_t size); size_t strlcat(char *dst, const char *src, size_t size); #endif size_t dump_bytes(const char *buf, size_t len, FILE *); size_t dump_bytes_buf(char *dst, size_t dstlen, const char *buf, size_t len); size_t dump_chars(const char *buf, size_t len, FILE *); size_t dump_chars_buf(char *dst, size_t dstlen, const char *buf, size_t len); size_t dump_chars_buf2(char *dst, size_t dstlen, const char *buf, size_t len); size_t dump_hash_buf(char *dst, size_t dstlen, const u8 *buf, size_t len); char * strrtrim(char *s); char * strltrim(char *s); char * strtrim(char *s); size_t memltrim(char *, size_t); ptrdiff_t memmatch(const char *, size_t, int (*)(int)); int str_endswith(const char *str, const char *match); const char * mempbrk(const char *hay, const char *need, size_t haylen, size_t needlen); const char * memstr(const char *hay, const char *needle, size_t haylen); const char * memrstr(const char *hay, const char *need, size_t haylen); size_t memspn(const char *mem, size_t memlen, const char *accept, size_t acceptlen); size_t memcspn(const char *mem, size_t memlen, const char *reject, size_t rejectlen); size_t strlen_bound(const char *mem, size_t memlen); char hexint (const u8); char hexint2(const u8 *); unsigned hexint3(const u8 *); unsigned hexint4(const u8 *); unsigned long hexint8(const u8 *); #define BASE64_ENCBUF(inbytes) (((inbytes) * 2) + 3) /* calculate the bytes necessary to hold base64 output */ /* NOTE: this is quick and easy but is actually larger than it needs to be */ size_t base64enc(const char *src, size_t srclen, char *dst, size_t dstlen); void strupper(char *s, size_t len); void strlower(char *s, size_t len); size_t decode_hex_dump(char *dst, size_t dstlen, const char *src, size_t srclen); int allzeroes(const char *c, size_t len); int allones (const char *c, size_t len); #endif
dataset_first_40k.jsonl/37320
{ "meta": { "pile_set_name": "Github" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Following HP's lead with its $100 7 Plus Android tablet, Toshiba has launched three new tablets that emphasize price over fancy features. At $109.99, the Excite Go (pictured above) is a little pricier than its HP competition, but it offers a couple of key advantages. It ships with the latest version of Android, 4.4 KitKat, while the 7 Plus sticks with the older 4.2.2 Jellybean. The Toshiba also provides twice the amount of built-in storage: 16GB versus the HP's 8GB.
dataset_first_40k.jsonl/37323
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
1. Field Embodiments relate to the execution of critical tasks based on the number of available processing entities. 2. Background A storage system may control access to storage for one or more host computational devices that may be coupled to the storage system over a network. A storage management application that executes in the storage system may manage a plurality of storage devices, such as disk drives, tape drives, flash drives, direct access storage devices (DASD), etc., that are coupled to the storage system. A host may send Input/Output (I/O) commands to the storage system and the storage system may execute the I/O commands to read data from the storage devices or write data to the storage devices. The storage system may include two or more servers, where each server may be referred to as a node, a storage server, a processor complex, a Central Processor Complex (CPC), or a Central Electronics Complex (CEC). Each server may be included in a cluster. Each server may have a plurality of processor cores (also referred to as cores) and the servers may share the workload of the storage system. In a two server configuration of the storage system, either server can failover to the other if there is a failure or a planned downtime for one of the two servers. For example, a first server may failover to a second server, if there is a failure of the first server. A computational device, such as a host or a server of a storage system, may include a plurality of processors and form a multiprocessing system. A computational device may have a processor complex that may have a single core or a plurality of cores, where a core may correspond to a central processing unit (CPU). For example, a dual-core processor complex has two central processing units, so that the dual-core processor complex may appear to the operating system as two CPUs. A process (or task) is an instance of a computer program that is being executed. Depending on the operating system, a process may be made up of multiple threads of execution that execute instructions concurrently. Multiple threads may exist within the same process and share resources such as memory. A thread is what the CPU actually runs, whereas a process has the allocated memory for instructions and data. A process may need one or more threads because that is what is actually run by the CPU. Multiple threads corresponding to a process implies that the process gets more time slices on the same CPU or gets to run on more CPUs concurrently. A process needs at least one thread that the CPU executes. In a multi-core processor complex, a different process may use a different core at the same time to speed up the system. U.S. Pat. No. 8,276,142 describes a method that includes scheduling a thread to run on a core of a multi-core processor. U.S. Pat. No. 8,250,347 describes asymmetric hardware support for a special class of threads. US Patent Publication 2005/0015768 describes a method for scheduling tasks. U.S. Pat. No. 6,212,544 describes a method for performing computer processing operations in a data processing system having a multithreaded processor and thread switch logic. U.S. Pat. No. 6,085,215 describes a method using a combination of processing threads, polling, and a use of interrupts to allocate the use of processing resources fairly among competing functions.
dataset_first_40k.jsonl/37339
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
All the descriptions except weather have already been emailed to Awais and I have asked him to provide them to you. I understand you have weather which was faxed.
dataset_first_40k.jsonl/37348
{ "meta": { "pile_set_name": "Enron Emails" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
We use cookies to customize content, target audience ads and measure them, and to provide a safer experience. By clicking or browsing the site, you consent to our collection of information on Facebook and off Facebook via cookies. Find out more about available options: Cookie Policy. Redmi 7 is a good level Android smartphone, strongly devoted to imaging, able to satisfy even the most demanding user. It surprises the 6.26-inch Touchscreen display that puts this Redmi at the top of the category. Resolution of 1520x720 pixels. On the side of the features at this REDMI 7 really does not lack anything. Starting with the 4G LTE module that allows data transfer and excellent internet browsing, via Wi-fi connectivity and GPS. This REDMI 7 is a product with few competitors for multimedia thanks to the 12 megapixel camera that allows the REDMI 7 to take pictures of good quality with a resolution of 4000x3000 pixels and to record video in fullHD at Resolution of 1920x1080 pixels. The thickness of 8.5 mm is contained and makes this REDMI 7 very interesting. Send to a friend Redmi 7 is a good level Android smartphone, strongly devoted to imaging, able to satisfy even the most demanding user. It surprises the 6.26-inch Touchscreen display that puts this Redmi at the top of the category. Resolution of 1520x720 pixels. On the side of the features at this REDMI 7 really does not lack anything. Starting with the 4G LTE module that allows data transfer and excellent internet browsing, via Wi-fi connectivity and GPS. This REDMI 7 is a product with few competitors for multimedia thanks to the 12 megapixel camera that allows the REDMI 7 to take pictures of good quality with a resolution of 4000x3000 pixels and to record video in fullHD at Resolution of 1920x1080 pixels. The thickness of 8.5 mm is contained and makes this REDMI 7 very interesting.
dataset_first_40k.jsonl/37350
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: Is subclassing NSNotification the right route if I want to add typed properties? I am trying to subclass NSNotification. Apple's docs for NSNotificationstate the following: NSNotification is a class cluster with no instance variables. As such, you must subclass NSNotification and override the primitive methods name, object, and userInfo. You can choose any designated initializer you like, but be sure that your initializer does not call NSNotification’s implementation of init (via [super init]). NSNotification is not meant to be instantiated directly, and its init method raises an exception. But this isn't clear to me. Should I create an initializer like this? -(id)initWithObject:(id)object { return self; } A: Subclassing NSNotification is an atypical operation. I think I've only seen it done once or twice in the past few years. If you're looking to pass things along with the notification, that's what the userInfo property is for. If you don't like accessing things through the userInfo directly, you could use a category to simplify access: @interface NSNotification (EasyAccess) @property (nonatomic, readonly) NSString *foo; @property (nonatomic, readonly) NSNumber *bar; @end @implementation NSNotification (EasyAccess) - (NSString *)foo { return [[self userInfo] objectForKey:@"foo"]; } - (NSNumber *)bar { return [[self userInfo] objectForKey:@"bar"]; } @end You can also use this approach to simplify NSNotification creation. For example, your category could also include: + (id)myNotificationWithFoo:(NSString *)foo bar:(NSString *)bar object:(id)object { NSDictionary *d = [NSDictionary dictionaryWithObjectsForKeys:foo, @"foo", bar, @"bar", nil]; return [self notificationWithName:@"MyNotification" object:object userInfo:d]; } If, for some strange reason, you'd need the properties to be mutable, then you'd need to use associative references to accomplish that: #import <objc/runtime.h> static const char FooKey; static const char BarKey; ... - (NSString *)foo { return (NSString *)objc_getAssociatedObject(self, &FooKey); } - (void)setFoo:(NSString *)foo { objc_setAssociatedObject(self, &FooKey, foo, OBJC_ASSOCIATION_RETAIN); } - (NSNumber *)bar { return (NSNumber *)objc_getAssociatedObject(self, &BarKey); } - (void)setBar:(NSNumber *)bar { objc_setAssociatedObject(self, &BarKey, bar, OBJC_ASSOCIATION_RETAIN); } ...
dataset_first_40k.jsonl/37352
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Investigations from external quality assurance programs reveal a high degree of variation in the laboratory identification of coagulation factor inhibitors. The laboratory has a key role in the initial detection of factor inhibitors and an ongoing role in the measurement of inhibitor titers during the course of inhibitor eradication therapy. The most commonly seen factor inhibitors are those directed against factor VIII (FVIII), usually detected either with the original or the Nijmegen-modified Bethesda assay. In addition, several circumstances can arise in which the laboratory may test samples that potentially reflect false identification of factor inhibitors. These include lupus anticoagulants and other events generally related to preanalytical variables, including incorrect sample presentations. This article reviews each of these elements, largely from the perspective of cross-laboratory studies undertaken within the framework of external quality assurance (EQA), a peer-laboratory process that aims to assess the ongoing performance of groups of similar laboratories. This review details the experience of the Royal College of Pathologists of Australasia Haematology Quality Assurance Program, and it also reflects on the experience of other EQA organizations. Our analysis reveals a wide variety of test practice among inhibitor testing laboratories, a wide variation in detected inhibitor levels in cross-tested samples, and substantial evidence of false-positive and false-negative detection of factor inhibitors. These findings hold some significance for the clinical management of patients affected by these inhibitors. There is still much need for standardization and improvement in factor inhibitor detection, and we hope that this report provides a basis for future improvements in this area.
dataset_first_40k.jsonl/37353
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
EDF gets approval to restart nine units 16 January 2017 Share France's nuclear regulator, the Autorité de Sûreté Nucléaire (ASN), has approved the restart of nine of the 12 reactors affected by the carbon concentration anomaly in the steam generator channel heads manufactured by Japan Casting and Forging Corporation (JCFC). The approval, which followed ASN's examination of the results of inspections and technical demonstrations provided by EDF for the 900 MWe reactors, was announced on 12 January. In June last year, ASN said it had identified 18 French nuclear power reactors operated by EDF - of both 900 MWe and 1450 MWe capacity - whose steam generators could contain high carbon concentrations. Of these, 12 are equipped with channel heads manufactured by JCFC "liable to contain a particularly high carbon concentration". A high carbon content in steel can lead to mechanical properties lower than expected. The nine that can now be restarted are Bugey 4, Dampierre 3, Fessenheim 1, Gravelines 2 and 4, Saint-Laurent B1, and Tricastin 1, 3 and 4. All of these are 900 MWe units. The regulator had ordered EDF in October to carry out additional inspections on the steam generator channel heads of certain reactors, within three months. On 11 January, the company asked that the inspection deadline for unit 2 of the Tricastin plant be postponed by two weeks. "This request was explained by the risks posed to the electricity grid as a result of the wave of cold weather expected next week," ASN said, adding it considered this postponement to be acceptable from the safety viewpoint. It has set a new deadline of 3 February. EDF also asked that the inspection deadline set for Civaux 1 be postponed to the end of March. ASN said it is examining data provided by EDF for the 1450 MWe Civaux units 1 and 2, with the assistance of France's Institute for Radiological Protection and Nuclear Safety. On that basis, ASN will analyse the conditions for the restart of unit 2 - on which inspections have been carried out - and will shortly issue a position statement on the request for postponement of these inspections on unit 1. ASN announced in April 2015 the discovery of an anomaly in the composition of the steel in certain zones of the vessel closure head and the vessel bottom head of the Flamanville EPR reactor. The detection of this anomaly led ASN to ask Areva NP and EDF to "learn all possible lessons from this event". There are three processes currently under way, ASN said. Firstly, the search for technical anomalies on other EDF reactor components similar to those detected on the Flamanville EPR vessel, which has enabled EDF to identify similar anomalies on the channel heads of certain steam generators. Secondly, manufacturing quality reviews on parts at Areva NP manufacturing plants, which enabled Areva NP to detect irregularities in the manufacturing files from Creusot Forge. Thirdly, initiation of a review of basic nuclear installation licensee monitoring of their contractors and subcontractors, of ASN oversight and of alert mechanisms. Steam generators are heat exchangers between the water circulating in the reactor's primary coolant circuit - at a temperature of about 350°C and a pressure of 155 bar - and the water in the secondary circuit that supplies steam to the turbines. Their domed lower head is part of the primary circuit and therefore has an important safety role in ensuring cooling water is always available. There are three steam generators in the 900 MWe pressurized water reactors, while the 1450 MWe reactors feature four. Researched and written by World Nuclear News Related topics
dataset_first_40k.jsonl/37354
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Purification and characterization of a rat liver enzyme that hydrolyzes valaciclovir, the L-valyl ester prodrug of acyclovir. Valaciclovir is an oral prodrug of the antiherpetic agent acyclovir. An enzyme that hydrolyzes valaciclovir to acyclovir, valaciclovir hydrolase (VACVase), was purified from rat liver and characterized. VACVase was a basic (pI 9.4) protein associated with mitochondria. It was monomeric and had a molecular mass of 29 kDa. Amino acid sequences of six VACVase peptides, including its NH2 terminus (13 amino acids) and accounting for approximately 20% of its complete sequence, were not found in the SwissProt protein data base. VACVase hydrolyzed other amino acid esters of acyclovir in addition to valaciclovir (kcat/Km = 58 mM-1 s-1), with a preference for the L-alanyl (kcat/Km = 226 mM-1 s-1) and L-methionyl (kcat/Km = 200 mM-1 s-1) esters. It did not hydrolyze other types of esters or numerous di- and tripeptides and aminoacyl-beta-naphthylamides. Hydrolysis of valaciclovir by VACVase was not inhibited by amastatin, antipain, aprotinin, bestatin, chymostatin, E-64, EDTA, ebelactone A, ebelactone B, elastatinal, leupeptin, pepstatin, or phosphoramidon. It was neither inhibited nor activated by Ca2+, Co2+, Mg2+, Mn2+, or Zn2+. Therefore, this enzyme is not a typical esterase or peptidase and, to our knowledge, it has not been described previously. Its physiological function is not known; however, it may play a significant role in the biotransformation of valaciclovir to acyclovir.
dataset_first_40k.jsonl/37355
{ "meta": { "pile_set_name": "PubMed Abstracts" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Q: AWS CloudFormation Outputs: Exporting AZ's Creating a layered stack set in cloudformation. Network Stack and App Stack Just need the syntax to Output and Export two Availability Zones that are captured when a cfn user chooses them in the network template parameters dialogue. eg, a user chooses two AZ's in a region via the usual mechanism. AZoneNames: Type: 'List<AWS::EC2::AvailabilityZone::Name>' Description: Availability Zones (choose two zones) That captures the az's, and i assume, cfn indexes them [0,1] to an array in the background. That part works. So I need to output the two az's and export them for the app stack but not sure how. I've attempted with the below snippet but it doesnt work StackAvailabilityZone1: Description: The first az that was chosen at network stack creation Value: !Ref AvailabilityZone 0 Export: Name: !Sub 'AZ1' I'm sure its probably staring me in the face. Thanks so much for any ideas. A: You can try the following, using Select: StackAvailabilityZone1: Description: The first az that was chosen at network stack creation Value: !Select [0, !Ref AZoneNames] Export: Name: AZ1
dataset_first_40k.jsonl/37367
{ "meta": { "pile_set_name": "StackExchange" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Get ready to help the Body Shop celebrate it's 15th anniversary and kick off National Health and Fitness Week. Beginning Monday, May 14 and ending Friday, May 18, 2001 all Enron Employees are invited to work-out at the Body Shop as a complimentary guest. Just visit http://hrweb.enron.com/wellness, print and fill-out the body shop 15th anniversary guest form, and return it to the Body Shop prior to your first workout. The week long celebration includes a speech and autograph session with Clyde Drexler, Monday, May 14, 2001, 11:30 AM-12:00 noon (spaces will be limited and you must RSVP to [email protected] by Friday, May 11, 2001, 3:00 PM); an early morning workout with the Houston Rocket's Power Girls on, Thursday, May 17, 2001 starting at 6:30 AM followed by breakfast and autograph session in the Body Shop Fuel Station at 7:30am - 8:30am; a boot camp style class led by the German/American Foreign Legion and much, much more. Visit the Body Shop website for a detailed calendar of events, or for additional information, please e-mail the Body Shop at [email protected].
dataset_first_40k.jsonl/37369
{ "meta": { "pile_set_name": "Enron Emails" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Shenzhen, China (PressExposure) August 04, 2011 -- Car DVR and car DVD player supplier Chinavasion is now providing an amazing deal for a Full HD 1080p Car DVR called the Eagle Dash Cam. This brilliant dash cam records high quality video and takes high resolution snapshots at the push of a button. It can record 30fps video at 1080p, 720p and 480p. In addition to its instant power on auto recording, it can record via motion detection and also use loop recording to save valuable hard drive space. Chinavasion's Rose Li states that the Eagle Dash Cam is "One of the most affordable deals for HD Car digital video recording on the market. Most Car DVR systems will set its user back possibly thousands of dollars but this great quality Car DVR manages to bring both quality and affordability to the table. Chinavasion has sought out the best deal possible because as the demand for affordable high quality DVR goods rises, Chinavasion has decided to source this great Car DVR and get the best wholesale deal possible. The Eagle Dash Cam Car DVR is incredibly easy to set-up and use; it comes with a reliable suction mount, HDMI cable so you connect it up to a superior display and also a car charger so you don't have to worry about powering the device. It works very fast from switching on to recording, and even auto-records as it turns on, therefore reducing the distraction of an In-Car DVR as much as possible. With a multi-language menu and a mini SD card slot up compatible to 32gb, the Eagle Dash Cam has so much to offer for such a great price. Chinavasion's Rose Li also adds that "People shouldn't underestimate the usefulness of this device, in that it makes sure its user is always prepared in their car for whatever may happen on their journey. This brings peace of mind when it comes to dealing with minor auto accidents where this Car DVR will provide clear evidence as to what happened. Not only this but all the bizarre and strange things you may encounter on your journey can be recorded without wasting time and you can upload the whole fiasco to the internet for instant online fame." Affordable but high quality electronics are hard to come by, especially when it comes to Car DVR, however Chinavasion strives to release some of the best quality electronic goods at a great price. Whilst also providing a 12 month warranty for every product sold, and excellent customer service to customers from all around the world. Check their online shop at http://www.chinavasion.com/action-camera/
dataset_first_40k.jsonl/37373
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
In a cellular communication network, mobile devices (also known as User Equipment (UE) or mobile terminals, such as mobile telephones) communicate with remote servers or with other mobile devices via base stations. An LTE base station is also known as an ‘enhanced NodeB’ (eNB), which is coupled to an LTE core network also known as an Enhanced Packet Core (EPC) network. In their communication with each other, LTE mobile devices and base stations use licensed radio frequencies, which are typically divided into frequency bands and/or time blocks. Depending on various criteria (such as the amount of data to be transmitted, radio technologies supported by the mobile device, expected quality of service, subscription settings, etc.), each base station is responsible for controlling the transmission timings, frequencies, transmission powers, modulations, etc. employed by the mobile devices attached to the base station. In order to minimise disruption to the service and to maximise utilisation of the available bandwidth, the base stations continuously adjust their own transmission power and also that of the mobile devices. Base stations also assign frequency bands and/or time slots to mobile devices, and also select and enforce the appropriate transmission technology to be used between the base stations and the attached mobile devices. By doing so, base stations also reduce or eliminate any harmful interference caused by mobile devices to each other or to the base stations. Current mobile devices typically support multiple radio technologies, not only LTE. The mobile devices might include, for example, transceivers and/or receivers operating in the Industrial, Scientific and Medical (ISM) radio bands, such as Bluetooth or Wi-Fi transceivers. The term ‘Bluetooth’ refers to the standards developed by the Bluetooth Special Interest Group, and the term ‘Wi-Fi’ refers to the 802.11 family of standards developed by the Institute of Electrical and Electronics Engineers (IEEE). If such a non-LTE communication technology is supported, instead of communicating via LTE base stations, mobile devices may also communicate with remote servers or with other mobile devices using non-LTE communication means, e.g. using an appropriate ISM communication technology. For example, the mobile devices may communicate via an access point (e.g. a Wi-Fi AP) operating in accordance with the 802.11 family of standards by the Institute of Electrical and Electronics Engineers (IEEE). Recently, a so-called ‘dual mode’ base station has been introduced comprising an LTE home base station (HeNB) part (e.g. a pico/femto base station or other low-power node) and a non-LTE access point part (e.g. a Wi-Fi AP). Such a combined HeNB/AP base station may also sometimes be referred to as a dual mode femto access point (FAP) or dual FAP. ISM and other radio technologies (hereafter commonly referred to as non-LTE technologies) use frequency bands close to or partially overlapping with the LTE frequency bands, as illustrated in FIG. 12. Some of these non-LTE frequency bands are licensed for a particular use (e.g. Global Positioning Systems (GPS) bands) or might be unlicensed bands and can be used by a number of radio technologies (such as Bluetooth and Wi-Fi standards using the same range of ISM frequency bands). The manner in which these non-LTE frequency bands are used are, therefore, not covered by the LTE standards and are not controlled by the LTE base stations (e.g. a HeNB of a dual FAP). However, transmissions in the non-LTE frequency bands might, nevertheless, still cause undesired interference to (or suffer undesired interference resulting from) transmissions in the LTE bands, particularly in the overlapping or neighbouring frequency bands. In particular, such undesired interference may be experienced between LTE and non-LTE (ISM) radio communications in at least the following scenarios: LTE Band 40/41 radio transmitter causing interference to ISM radio receiver; ISM radio transmitter causing interference to LTE Band 40/41 radio receiver; LTE Band 7 radio transmitter causing interference to ISM radio receiver; ISM radio transmitter causing interference to LTE Band 7 radio receiver; and LTE Band 7/13/14 radio transmitter causing interference to GPS radio receiver. When such undesired interference arises as a result of communication occurring concurrently in the same mobile device or in the same base station (for example, as a result of concurrent use of LTE and non-LTE radio technologies) the interference is sometimes referred to as ‘in-device coexistence (IDC) interference’ which causes an ‘in-device coexistence (IDC) situation’. In order to be able to alleviate the problems due to IDC interference, the mobile device may be configured to attempt to address such IDC problems on its own and, if the mobile device cannot solve the problem on its own, with the assistance of its serving base station. For example, an IDC problem may be addressed by the base station selecting a different frequency (FDM solution) for the mobile device, by reconfiguring its transmissions (e.g. apply discontinuous reception (DRX) and/or change its subframe pattern) (TDM solution), and/or by adjusting the base station's (and/or the mobile device's) transmission power (Power Control solution). The inventors have realised that difficulties may arise in simultaneously operating both the LTE and non-LTE parts of such dual FAPs due to the potentially severe interference experienced in some of the (neighbouring or overlapping) frequency bands used by both the LTE and the non-LTE communication technologies. Such difficulties are particularly likely to occur with respect to dual FAPs implementing both an LTE base station and a non-LTE access point as part of the same network node. In this case, the above (FDM/TDM/Power Control) solutions are not always applicable because any change in the operation of the LTE base station (of the dual FAP) may still cause (or continue to cause) unexpected interference for communications using the access point part of the dual FAP. The inventors have also realised that whilst it is possible to co-ordinate some of the operations of LTE base stations and other base stations operating in accordance with an earlier standard from which LTE has been derived, e.g. due to the inherent backward compatibility between such related standards, it is particularly difficult to ensure optimal communication characteristics (e.g. signal quality, error rate, interference level) for dual FAPs implementing both an LTE base station and a non-LTE access point because of the differences between the operation of the LTE and the non-LTE parts.
dataset_first_40k.jsonl/37378
{ "meta": { "pile_set_name": "USPTO Backgrounds" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
using ACE.Common.Extensions; namespace ACE.Server.Network.GameAction.Actions { public static class GameActionAddAllegianceBan { [GameAction(GameActionType.AddAllegianceBan)] public static void Handle(ClientMessage message, Session session) { var playerName = message.Payload.ReadString16L(); session.Player.HandleActionAddAllegianceBan(playerName); } } }
dataset_first_40k.jsonl/37381
{ "meta": { "pile_set_name": "Github" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard Specifics: Having a excellent home skilled assistance, anyone must apply your creative ideas with this Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard picture to your residence. A family house can be described as all-natural place to majority, which means that you must use a comfy property like Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard graphic illustrates. To make a cushty environment, you may undertake some essentials coming from Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard photo. Through the use of some ideas because of Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard pic, additionally become a fantastic coordinator by providing some sort of toasty house. If you happen to have already got a perception to help you transform your household, you should utilize this approach Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard picture from Beautiful Patios photograph collection to undertake that creative ideas. Along with if you want to produce a property that could be comfy along with safe, this Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard image might your private best choice. Large system that will Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard snapshot shows gives some sort of mood to your residence very well. And have more idea if you happen to discover the following Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard image containing released at April 5, 2017 at 1:35 am in addition to experienced just by 1 readers. You highly motivate want you to use this as a benchmark Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard photo because it definitely will assist you to produce your aspiration home. Together with prior to deciding to benefit from Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard pic as a reference, it is possible to download that by clicking here. This approach Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard pic is a high quality image, which happens to be 550 x 734 along with the original size is usually 117 KB. If you would like work with Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard snapshot one specific, you can share that assuming that the particular URL always provided. You never endorse you to work with Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard photograph for financial purpose. Enjoy this Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard image along with Beautiful Patios picture gallery. Related Pictures of Beautiful Patios #2: 10 Beautiful Decks And Patios You Can Have In Your Backyard Home Design Architecture Any content, trademark's, or other material that might be found on Home Design Architecture website that is not Home Design Architecture property remains the copyright of its respective owner's. In no way does Home Design Architecture claim ownership or responsibility for such items, and you should seek legal consent for any use of such materials from its owner.
dataset_first_40k.jsonl/37390
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
‘Oumuamua, shown in this artist’s illustration, became the first known interstellar object to visit the solar system when it was spotted in 2017. Now there seems to be a second visitor.
dataset_first_40k.jsonl/37392
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Study: Texas rate of uninsured children double national average Texas has double the national rate of uninsured children and the numbers are climbing after years of declines, according to a new national study./Blend Images Texas has double the national rate of uninsured children and the numbers are climbing after years of declines, according to a new national study./Blend Images Photo: LWA/Dann Tardif/Getty Images/Blend Images RM Photo: LWA/Dann Tardif/Getty Images/Blend Images RM Image 1 of / 1 Caption Close Study: Texas rate of uninsured children double national average 1 / 1 Back to Gallery Texas led the nation in both the number and percentage of uninsured children in 2017, more than doubling the national rate, according to national findings released Wednesday. More troubling is that the percentage of Texas children without health coverage is on the rise, growing to 10.7 percent in 2017 from 9.8 percent the previous year. That translates to 833,178 children without coverage. Texas vastly outnumbered other states as Florida had the second highest overall number at 320,913. Sparsely populated Wyoming had the next highest percentage of uninsured children in 2017 at 10 percent. "We're very concerned that the state is not taking this seriously enough," said Patrick Bresette, executive director of the Children's Defense Fund of Texas on Wednesday, calling the findings "disturbing." "In a state that has more uninsured children than any other we are short-cutting their development is so many ways," he said. RELATED: Texas says not so fast to big health care changes Nationally, the percentage of uninsured children was about 5 percent, or about 3.9 million children, the study found. That number is also on the rise, jumping from about 3.6 million in 2016. The annual study, using U.S. Census data, was a collaboration between the Robert Wood Johnson Foundation, a national health philanthropy, and the State Health Access Data Assistance Center at the University of Minnesota School of Public Health. What concerns both the researchers and children's advocacy groups is that after nearly a decade of improvement, the numbers are starting to go the wrong way again, said Elizabeth Lukanen, deputy director of the Minnesota program. She added that early indications show that 2018 numbers may be even worse. "Research has shown that uninsured children have fewer physician visits, less health maintenance for chronic conditions such as asthma, and not surprisingly these things have broader implications for children's future," Lukanen said. RELATED: Health care to be top issue in 2020 after Texas judge strikes down Affordable Care Act Compared to children whose families have health coverage, children's whose families have health coverage are less likely to miss school, more likely to have better overall academic success which ultimately translates into future economic success, she said other research has shown. One noteworthy finding is that even as the economy improves, the number of Texas children in families with employer-sponsored health plans has remained mostly unchanged across income levels. Further analysis of the Texas numbers showed that the rate of uninsured children was double the national average across several criteria, including Hispanic families, those with low-incomes, and children whose parents have lower levels of education. Texas also continues to lead the nation in the number and rate of uninsured adults, and that number, too, is rising again after making steady gains. Overall, an estimated 4.7 million Texans are without coverage, according to health care data. After falling to a little over 16 percent uninsured in 2016, more recent estimates show the rate has more recently climbed to around 19 percent, health economists have said. "There's so much more we could be doing that we just aren't," said Bresette of the Children's Defense Fund.
dataset_first_40k.jsonl/37393
{ "meta": { "pile_set_name": "OpenWebText2" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }
Wild Back-to-School Pool Party at Colorado State Draws 4,000 It was the party to end all parties -- "a combination of Woodstock, 'Animal House' and 'Girls Gone Wild'" according to one man. Up to 4,000 strong, it lasted only two hours and ended with dozens of people sick and four people under arrest. The Daily Mail reports that the party was held at an apartment complex near the campus of the Colorado State University on Saturday. It was organized by the managers and owners of the complex. The annual event is a charity fundraiser to "encourage new students to socialize in a relaxed atmosphere" according to a spokesman. But the event was advertised on Facebook, and anywhere from 2,000 to 4,000 people showed up. The complex said it did not provide alcohol, yet somehow booze found its way into the party because several people passed out and dozens of people were vomiting. Paramedics were called, which was the beginning of the end of the party. Fort Collins Police Lt. Dave Haywood said EMTs were "overwhelmed with alcohol-overdose cases." Police also arrived and arrested four young men -- two for assault, one for disorderly conduct and one for interfering with police. Two of those arrested are on the school's football team, the Denver Post reports. The owners of the complex could face charges in connection with organizing the party.
dataset_first_40k.jsonl/37396
{ "meta": { "pile_set_name": "Pile-CC" }, "file_path": "/net/ioasic11-100G/scratch/harshg/datasets/dataset_first_40k.jsonl" }