text
stringlengths 2
560k
| meta
dict | score
float64 0
0.5
|
---|---|---|
package com.journaldev.log;
import java.util.logging.LogRecord;
import java.util.logging.StreamHandler;
public class MyHandler extends StreamHandler {
@Override
public void publish(LogRecord record) {
//add own logic to publish
super.publish(record);
}
@Override
public void flush() {
super.flush();
}
@Override
public void close() throws SecurityException {
super.close();
}
}
|
{
"pile_set_name": "Github"
}
| 0 |
You can suck a dick if you want... Just suck that dick like a man
333 shares
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051948 |
FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU FUCK YOU
|
{
"pile_set_name": "Pile-CC"
}
| 0.111607 |
Q:
Is it possible to make geolocation validation?
To make more clear what inspired this question, I'm making a mobile app where people rate in real time how nightclubs are doing and would be very good if there existed an way to make sure the person is actually there to rate if it's bad or good.
PS. I thought about comparing the coordinates of the location of the person versus the place's coordinates. Don't know if it's technically possible.
A:
Yes you read the location from GPS. make sure you get the location only from GPS not from other locations service like cell tower or wifi.
A GPS location in most cases is acurate within 3- 30m.
Then just calculate the distance from user coordinates (latitue, longitude) to nightclubs (latiidude, longitude)
if the distance is <50m then the person is standing very near to th enntry of the club.
But dont forget inside the club you will not recieve GPS. GPS needs free view to sky.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Depression is something that has been around for thousands of years. WebMD uses the following words in its definition of depression “Major depression is an episode of sadness or apathy along with other symptoms that lasts at least two consecutive weeks and is severe enough to interrupt daily activities” [1]. People who suffer from depression […]
In our journey here on earth sometimes we experience a complete loss of hope; this is what we call despair. For the Christian we have the blessed hope which is that day when Jesus will come to redeem us and take us to heaven for eternity. Until that day we need to remember to focus […]
Bible Answers
Welcome to What Christians Want To Know! The mission of this site is to equip, encourage, and energize Christians. Look for regular updates including Bible Verses, Bible Stories, Christian Quotes, Christian Answers, and much more. Find out more here
Featured Bible Verse
1 Chronicles 16:11 Seek the LORD and his strength; seek his presence continually!
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Black cock in her ass she loves it
|
{
"pile_set_name": "OpenWebText2"
}
| 0.058824 |
you guys still suck
|
{
"pile_set_name": "Enron Emails"
}
| 0.052632 |
Optimal surveillance and eradication of invasive species in heterogeneous landscapes.
Cost-effective surveillance strategies are needed for efficient responses to biological invasions and must account for the trade-offs between surveillance effort and management costs. Less surveillance may allow greater population growth and spread prior to detection, thereby increasing the costs of damages and control. In addition, surveillance strategies are usually applied in environments under continual invasion pressure where the number, size and location of established populations are unknown prior to detection. We develop a novel modeling framework that accounts for these features of the decision and invasion environment and determines the long term sampling effort that minimises the total expected costs of new invasions. The optimal solution depends on population establishment and growth rates, sample sensitivity, and sample, eradication, and damage costs. We demonstrate how to optimise surveillance systems under budgetary constraints and find that accounting for spatial heterogeneity in sampling costs and establishment rates can greatly reduce management costs.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Sport, Society, and Anti-Doping Policy: An Ethical Overview.
The purpose of this chapter is to provide an overview of the philosophical and ethical underpinnings of anti-doping policy. The nature of sport and its gratuitous logic is explored. The doping rules in sport, such as the Prohibited List, are ways of drawing a line to facilitate a certain sort of competition. Sports can be understood as a means of testing the natural physical abilities of the athlete, combined with the hard work they put into improving their performance. A test promoted by the anti-doping laws. Permitting certain forms of performance enhancement would threaten the special nature of such a test. Doping can be seen as a threat to the integrity of sport, not just because of the rule breaking doping currently entails. The chapter explores the ethical issues that arise with such forms of enhancement, such as fairness, harms to health, and indeed a refusal to accept human limitations. Finally, the criteria upon which a substance or method may be prohibited by the World Anti-Doping Agency (WADA) is addressed. The 3-part criteria, concerning (1) enhancement, (2) health, and (3) the spirit of sport are described, and literature that takes a critical line is addressed. Particular reference is made to the public health agenda explicit within anti-doping policy.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Mia lina is a tanned hottie brunette with small tits who loves to get cock stuffed.
Small tits teens have sex with big cock guy.
Maddy o reilly has small tits and fucks cock.
Small tits anal babe jayna oso takes massive cock in her asshole.
Blonde with small tits gets cock jammed on sofa.
Small tits slut sucks big cock.
Related galleries: Big tits makes small cock cum. Small dick &. Skyla paige, naked bitch with small tits, toying with hard cock. Nice small tits on a whore begging for cock. Marvelous tart ash hollywood having her bawdy pussy cracked by the monster penis. Small tits asian gets fucked by white cock. Brunette with small tits takes guys cock out and gives him deep bj. Small amateur with nice tits sucks a monster cock. Horny small tits asian blows big black cock. Amateur teen with small tits get cock in deep and having fuck. Hot blonde teen with small tits riding a cock. Brunette with small tits getting cock in ass. Black girl with big tits swallows this small cock in one gulp. Small boobs blonde big cock anal hardcore.
|
{
"pile_set_name": "Pile-CC"
}
| 0.050189 |
fat bitch sounds
|
{
"pile_set_name": "YoutubeSubtitles"
}
| 0.058824 |
“You’ve got to be happy playing football, you’ve got to play with a smile on your face. If you don’t enjoy it you’re never going to reach your full potential. Just go hard at it every day, working hard and smiling.” – Harvey Barnes
Hardly the words you would expect from a young player in his first season in the English top flight. Harvey Barnes already possesses a more balanced outlook towards life, a rare sense of maturity beyond his years.
Barnes is Leicester through and through, he has been a part of the club setup from the under 9’s to now knocking on the first team squad. He has lived in the city pretty much his entire life and proudly calls Leicester City the club for him. As a fan, he says the premier league triumph in 2015/16 is one of his most cherished memories, the celebrations that went on around town for an entire week were unforgettable, being a part of the club at that time was a surreal feeling.
Early Life
Harvey is the son of Paul Barnes, former Stoke, Birmingham and Burnley front man. Paul has played an integral role in guiding Harvey. Right from his formative years in football, Paul offered the much-needed motivation and positivity that has helped shape Harvey as a person and a player. Having an ex-pro for a father has provided the Leicester frontman with a unique opportunity to gain insight about the game that other budding footballers lack, offering advice on how to improve and the critical side of the game is something not every parent is capable of.
Harvey himself has high regards for his dad’s role in his game:
“Even now, he comes to every game and has his bit to say, whether good or bad. There are a lot of opinions in football, but your dad probably offers the most honest, so it is always something I will listen to and try to work on.”
The day he signed his first youth contract with the club was an immensely proud moment for the Barnes household, being offered a contract at the club did young Harvey’s confidence a world of good and reaffirmed Leicester’s opinion about him.
To pursue a professional career in football, Harvey had to drop out of regular school to take up the scholar football program at the club, this meant leaving behind most of the people he grew up with to move to completely unfamiliar territory. The reality of this transition didn’t strike him until later. At this stage, it was imperative that he concentrate on his studies as well, the realization that his career began at that very instant did not faze him, instead helped him gain a purpose.starting with the under nine’s coming in through the development centre, most of the players at the youth team levels have been around for the same period of time as Harvey. The youth system has brought together young players like him, helping each other cope with their new lives and become friends on and off the pitch.
Development, progress and the big league
The Countesthrope native signed his first professional contract in June 2016 and went on to make his first-team debut as a second-half substitute in Leicester City’s 5-0 away loss to FC Porto in the UEFA Champions League in December of the same year. In January 2017, he joined League 1 outfit MK Dons on loan, where he had an impressive return of six goals in 21 league appearances. His breakthrough season at senior level culminated with Harvey being rewarded the Milton Keynes Dons’ Young Player of the Year 2016–17 award.
Barnes’ international debut came in the summer as he was called up as one of the overage players to the England under 18 squad for the Toulon Tournament. He had a clinical tournament and was awarded the Golden boot, instrumental in leading England to victory with a couple of braces en route to the final.
During the summer of 2017, the foxes’ youngster penned a new four-year deal with the Club before joining Championship side Barnsley on loan. Yet another successful spell yielded five goals in 14 outings. He was recalled to the King Power Stadium at the turn of the year and finally pulled on the blue shirt for his domestic debut in which the foxes were locked in a 0-0 FA Cup Third Round stalemate at Fleetwood Town. His Premier League debut followed suit as he came off the bench to feature against Southampton in April, later featuring in games against the premier league giants Arsenal and Tottenham Hotspur.
In the summer of 2018, Harvey Barnes joined West Bromwich Albion on loan in the Championship. The move has been a turning point in his career, after a sensational first half of the season where he scored 9 times and further assisted 7 times in 26 appearances for the Baggies, he was recalled in January 2019 by Leicester. His performances for West Brom were full of promise and characterized some of the team’s performances as they had a bright start to the campaign.
Such was the impact of his short tenure at The Hawthorns, the fans implored him to see out the rest of the campaign in the West Midlands. Pundits and fans alike considered Barnes’ presence key to West Brom’s hopes of promotion.
Though most young players tend to get disheartened at the prospect of loans at clubs in lower leagues, Harvey has been adamant that the multiple loan spells have actually helped him improve his game.
Speaking to Sky Sports he said:
“The loans have been massive for my career, I feel like the first at MK Dons, I was at that point where I was doing well in the Leicester U23s, but I wanted to push myself in a senior team and I got a lot of on-pitch time. With each loan, there’s been a step up in the quality. From League One to the bottom half of the Championship to coming to West Brom where we’re around the top. Each one has brought a different challenge. Being so young, I felt I had to be playing first-team football to bring me on as a player.”
These statements are yet another testament to the wise head on the young shoulders, the ability to take everything in his stride.
West Brom manager, Darren Moore has been a critical component in Barnes’ development. Moore has instilled confidence in the Harvey, providing him with a clear understanding of his roles on and off the ball and has maintained a healthy atmosphere in the dressing room. The boss at West Brom has also encouraged his players to express themselves, which Barnes benefitted from. The expansive style of play has paid dividends with the kind of performances and the goals the team has scored.
Playing style
With quick feet and the ability to score superb solo goals, midfielder Harvey Barnes is one of the Premier League’s hottest prospects. He wants to be the player to unlock tough defences, a player who can create something out of nothing. And create chances he has with 21 created in just half a season in the championship. Playing alongside experienced forwards Jay Rodriguez and Dwight Gayle maximized his offensive output. With an eye for spectacular and important goals, Harvey has been likened to Chelsea legend, Frank Lampard. Often unfazed to try his luck from distance, Barnes had taken 88 shots in the championship before being recalled. When put forth the comparison, Harvey admitted that they were players with different styles, however as an attacking midfielder, Lampard is someone he looks up to and wants to base his game on.
Looking forward
Leicester’s options in wide areas this season (Demarai Gray, Richard Ghezzal and Marc Albrighton) have largely failed to create enough in attack. Between them, they have just 5 goals in the league, leading Puel to recall Barnes from West Brom.
Now back at Leicester, Harvey is waiting to seize his opportunity at his boyhood club. After lining up against Wolves and Southampton, he played the full 90 minutes against Manchester United and impressed with his direct running and dribbling abilities looking to play a quick pass and get in behind the defence. Playing on the left in a 4-2-3-1 system he can provide the much-needed creativity on the flank and link up with Chilwell providing overlapping runs to put in crosses for the likes of Vardy and Maddison. Chilwell, himself is a product of the Leicester youth academy and is a player Harvey has played with since the U 18’s, together they could form the partnership on Leicester’s left flank for years to come.
Post the title-winning season Leicester have moved to a more youth-centric approach and have been keen on incorporating young players into their first team. Gray, Maddison, Chilwell and Maguire have become starters at the East Midlands side and with Harvey added to the ranks, it promises to be an exciting journey ahead for the foxes. He is on track to become a fixture in the Leicester city first team squad, well on his way to achieving what he set out to do as a 9-year-old.
To eventually play for England at a major tournament is his aspiration. If he keeps going this way, the sky is the limit. Do not be surprised to see Barnes lining up for the three Lions at euro 2020.
Debut Image via Leicester Mercury
Barnes West Brom Image via Last Word on Football
Barnes vs United Image via Leicester Mercury
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
BIG BOOBIE BBW GETS HER PUSSY FILLED WITH CUM
0 08:37
|
{
"pile_set_name": "OpenWebText2"
}
| 0.055556 |
/*
Bullet Continuous Collision Detection and Physics Library
Copyright (c) 2013 Erwin Coumans http://bulletphysics.org
This software is provided 'as-is', without any express or implied warranty.
In no event will the authors be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose,
including commercial applications, and to alter it and redistribute it freely,
subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
*/
///This file was written by Erwin Coumans
#ifndef BT_MULTIBODY_FIXED_CONSTRAINT_H
#define BT_MULTIBODY_FIXED_CONSTRAINT_H
#include "btMultiBodyConstraint.h"
class btMultiBodyFixedConstraint : public btMultiBodyConstraint
{
protected:
btRigidBody* m_rigidBodyA;
btRigidBody* m_rigidBodyB;
btVector3 m_pivotInA;
btVector3 m_pivotInB;
btMatrix3x3 m_frameInA;
btMatrix3x3 m_frameInB;
public:
btMultiBodyFixedConstraint(btMultiBody* body, int link, btRigidBody* bodyB, const btVector3& pivotInA, const btVector3& pivotInB, const btMatrix3x3& frameInA, const btMatrix3x3& frameInB);
btMultiBodyFixedConstraint(btMultiBody* bodyA, int linkA, btMultiBody* bodyB, int linkB, const btVector3& pivotInA, const btVector3& pivotInB, const btMatrix3x3& frameInA, const btMatrix3x3& frameInB);
virtual ~btMultiBodyFixedConstraint();
virtual void finalizeMultiDof();
virtual int getIslandIdA() const;
virtual int getIslandIdB() const;
virtual void createConstraintRows(btMultiBodyConstraintArray& constraintRows,
btMultiBodyJacobianData& data,
const btContactSolverInfo& infoGlobal);
const btVector3& getPivotInA() const
{
return m_pivotInA;
}
void setPivotInA(const btVector3& pivotInA)
{
m_pivotInA = pivotInA;
}
const btVector3& getPivotInB() const
{
return m_pivotInB;
}
void setPivotInB(const btVector3& pivotInB)
{
m_pivotInB = pivotInB;
}
const btMatrix3x3& getFrameInA() const
{
return m_frameInA;
}
void setFrameInA(const btMatrix3x3& frameInA)
{
m_frameInA = frameInA;
}
const btMatrix3x3& getFrameInB() const
{
return m_frameInB;
}
void setFrameInB(const btMatrix3x3& frameInB)
{
m_frameInB = frameInB;
}
virtual void debugDraw(class btIDebugDraw* drawer);
};
#endif //BT_MULTIBODY_FIXED_CONSTRAINT_H
|
{
"pile_set_name": "Github"
}
| 0 |
If you are really serious about conserving water, you can catch water from your roof by attaching an inexpensive device to your gutters that will reroute the water down a pipe. You can run the pipe to some water barrels that have a spigot (to which you can attach a hose) or you can run the pipe at a slight downward angle along your property and allow the water to flow into a trench (your swale) filled with gravel and mulch. This is a great way to recharge the aquifer underneath your property and prevent runoff. It will lower your water bills in the summer because you can use the water you collect from your rooftop during the rains to water during the dry season. Water catchment is very popular in New Zealand – and for good reason!
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
NEW BUSTY ANAL MFF THREESOME! BRUNETTE AND REDHEAD! NATURAL TITS! BUBBLE BUTTS! CUMMING ON ASS CUM SWAPPING FACIAL!
329 100%
|
{
"pile_set_name": "OpenWebText2"
}
| 0.056 |
Q:
Regular expression matching
I want to match
(Not 'X')(Not 'X') XX XX XX (Not 'X')(Not 'X')
or
(Not 'X')(Not 'X') XX XX XX XX XX (Not 'X')(Not 'X')
etc...
pattern="^X^X ((XX ){2}|(XX ){4}|(XX ){6}|(XX ){8})XX ^X^X"
There is some problem with my pattern, Hope you can help me with that.
Thanks.
A:
Try this regexp:
[^X]{2} ((XX ){3}|(XX ){5})[^X]{2}
It matches:
YY XX XX XX XX XX YY
YY XX XX XX YY
but does not match e.g.:
XX XX XX XX XX
XX XX XX XX XX XX XX
|
{
"pile_set_name": "StackExchange"
}
| 0.065957 |
Duration: 10:00 Views: 15 591 Submitted: 3 years ago Submitted by:
Description: Anal forced anal hardcore big cock BDSM fetish bondage rough sex rough fucking hard sex bizarre extreme anal deep anal tied up Latina anal domination hardcore anal ass fucking butt fucking doggy anal big dick couple cuckold fetish anal monster cock mouth gag rope fetish anal gape gapping asshole butthole shaved pussy wet pussy small tits tight tiny tits amateur webcam wtf omg molested spanking screaming live cam wrecked beauty young doggy style band over from behind latex porn xxx
Sponsored by:
|
{
"pile_set_name": "OpenWebText2"
}
| 0.055077 |
I've used Kilmagranny 2016 for the screenshots and videos. KMG 2016 has been updated with platform extensions where necessary and the route & the 22000s have the destination feature. The 29000s are close to being finished and will be released before much longer. That's a month so far from start to finish.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
The open-source Mozilla project said Thursday it won't comply with a U.S. Department of Homeland Security request to remove a Firefox add-on that helps redirect Web traffic for sites that have been seized by the government.
At issue is the Mafiaa Fire add-on, designed to reduce the effectiveness of an antipiracy campaign by DHS's Immigration and Customs Enforcement (ICE) division. When users try to visit a website whose Internet domain has been seized by ICE, Mafiaa Fire redirects them to a working site set up to replace the seized domain.
That's a problem for the DHS, which is trying to knock these sites offline permanently. "The ICE Homeland Security Investigations unit alleged that the add-on circumvented a seizure order DHS had already obtained against a number of domains," wrote Harvey Anderson, vice president and general counsel for Mozilla, in a blog post Thursday.
In recent months, ICE has shut down a large number of websites suspected of selling illegally copied music, movies or counterfeit products. Some free-speech experts have said the seizures may violate freedom-of-speech protections in the U.S. Constitution.
The DHS did not come to Mozilla with a court order, and the group pushed back, asking for proof that Mafiaa Fire is illegal, or at least a legal reason justifying the removal of the add-on.
"To date we've received no response from Homeland Security nor any court order," Anderson said. While content companies see obvious reasons to keep these sites offline, Mozilla sees it as a question of government censorship, and whether agreeing to these informal requests might somehow "threaten the open Internet," Anderson said.
The DHS's ICE division could not immediately be reached for comment Thursday. Neither could Mafiaa Fire developers nor Mozilla's Anderson.
Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert's e-mail address is robert_mcmillan@idg.com
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
How stories can help you sell
Marketing
How stories can help you sell
Let me tell you a story. I was on a design consultation a few years ago, and there was a perfect spot for three dwarf Hinoki false cypress. Because my consultation customers can go anywhere to buy the plants I have recommended, I decided to use a story to illustrate the importance of buying just the right variety. I didn’t want them to end up at the box store where someone would put just any random evergreen into their hands.
“Be sure that you get the variety called ‘Nana,’” I told them. “There are many types of Hinoki that grow higher. In fact, I did a consultation for a local funeral home once and recommended that they use three ‘Nana’ Hinoki cypresses behind their sign. But they planted another variety and those have grown really tall and skinny. Now every time I pass by that place, I see the Father, the Son and the Holy Ghost looming over their sign.”
The customers laughed, but more importantly, they remembered. Two weeks later they were in our nursery with my plan, asking for the right variety of Hinoki. They couldn’t recall the shrub’s name off the top of their heads, so they handed the plant list to one of our staff members. As he was checking the plan, the husband told him, “We want to avoid growing the Father, the Son and the Holy Ghost!” The story had conveyed the importance of getting the right plant better than if I’d just encouraged them to do so.
You may have noticed that many who blog, speak, or write books about marketing emphasize the importance of storytelling. The fact is, stories function in several ways for any business. A story draws people’s attention. We perk up our ears or continue reading when a story is involved. Stories make information “sticky” so that it’s more memorable. My consultation customers weren’t going to remember “Hinoki false cypress,” but they did remember the punch line to my story. And finally, stories create human-to-human connections; such links sell plants and products without being a high-pressure sales pitch.
There are many ways to use storytelling to increase customer loyalty and your bottom line. Here are just a few suggestions:
If you’ve had personal experience with a plant, be sure to pass that on to your customers. A story that is a few sentences long that speaks to a plant’s hardiness or other desirable characteristics is akin to giving your plants a five-star review on online.
Use a story to begin blog posts or newsletters. These can be personal experiences or things your customers have told you over the years. After the story, sum up with the take-home message about the plant, product, or practice in question.
Fornari used the power of stories to explain why dwarf Hinoki false cypress ‘Nana’ was necessary for her customers’ landscape. They didn’t remember the name, but they remembered the story and got the right plant.
Photo courtesy of C.L. Fornari
Every plant has a story. You can tell your own or use stories that are known in the trade. You might get a copy of “Of Naked Ladies and Forget-Me-Nots: The stories behind the common names of some of our favorite plants,” by Allan M. Armitage, and put it in your employee break room. When a customer is considering a plant and you’re nearby, if you know a short tale about that shrub, tree or perennial, tell them about it.
Hold a “Garden Story Night” or “Plant Story Slam” and invite people to share a story about a plant or their garden. Most such events have people sign up in advance and give each storyteller a time limit. Have attendees vote for the “people’s choice award” and award the winner a gift card.
Finally, your business has at least one story, and probably many more. Do your customers know how your operation came to be? Have you told the tale about the flood that washed your stock away? Have you written about the time the petting zoo goats you brought in for an event got loose and ate the perennials? Such tales create bonds between your company and the community.
Think about what you want your customers to know and remember, and then tell them a story about it.
The author is a speaker, writer and radio/podcast host who has worked at Hyannis Country Garden, an IGC on Cape Cod, for more than 20 years. She has her audiences convinced that C.L. stands for “Compost Lover.” Learn more at GardenLady.com.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
<head>
<title>CSS Test: Line-height using points with a minimum plus one value, 1pt</title>
<link rel="author" title="Microsoft" href="http://www.microsoft.com/" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#propdef-line-height" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#leading" />
<meta name="flags" content="96dpi ahem" />
<meta name="assert" content="The 'line-height' property sets a minimum plus one length value in points." />
<style type="text/css">
</style>
</head>
<body>
<p>Fontsize: 20%</p>
<p style="FONT-SIZE: 20%">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 10%</p>
<p style="line-height: 10%">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 90%</p>
<p style="line-height: 90%">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
</body>
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
</html>
|
{
"pile_set_name": "Github"
}
| 0.066519 |
South Bend Mayor Pete Buttigieg has Midwestern appeal and millions more than Joe Biden in campaign funds.
Source: CNN
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Francis X. Brady
Francis Xavier Brady (March 29, 1857 – March 13, 1911) was an American Catholic priest and Jesuit. Born near Gettysburg, Pennsylvania, he studied at Woodstock College, and held positions in various Jesuit institutions before becoming President of Loyola College in Maryland in 1908. He held the office until his death in 1911.
Early life
Francis Xavier Brady was born on March 29, 1857 in Buchanan Valley near Gettysburg, Pennsylvania, to Samuel J. Brady and Margaret Goy. His father was of Irish descent, while his mother was Pennsylvania Dutch. One of five children, he had three brothers and a sister who entered the Sisters of St. Joseph. Francis decided to join the Society of Jesus, and entered the novitiate in Frederick, Maryland on July 21, 1873. As part of his studies, he was sent to Woodstock College in 1876. After three years, he went to teach at Gonzaga College. He was then transferred to St. Peter's Church in Jersey City, New Jersey, in 1881, before returning to Woodstock in 1884 to complete his education.
Because of his poor health, the Jesuit superiors decided to expedite his studies, and he was ordained a priest by Cardinal James Gibbons on August 28, 1886 at Woodstock College.
Pastoral and educational career
Brady became the vice president of Loyola College in Maryland in 1892, serving in this position for three years. He was then appointed pastor of St. Ignatius Church in Baltimore in 1895; his term as pastor came to an end in 1908, and he was succeeded by John D. Whitney. In June 1908, Brady was named the President of Loyola College. He served in this position until his death on March 13, 1911 in Baltimore.
References
Citations
Sources
External links
Category:1857 births
Category:1911 deaths
Category:People from Gettysburg, Pennsylvania
Category:19th-century American Jesuits
Category:20th-century American Jesuits
Category:Woodstock College alumni
Category:Presidents of Loyola University Maryland
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Sex with an ex-girlfriend with big Tits
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051282 |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
<head>
<title>CSS Test: Line-height using points with a minimum plus one value, 1pt</title>
<link rel="author" title="Microsoft" href="http://www.microsoft.com/" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#propdef-line-height" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#leading" />
<meta name="flags" content="96dpi ahem" />
<meta name="assert" content="The 'line-height' property sets a minimum plus one length value in points." />
<style type="text/css">
</style>
</head>
<body>
<p>Fontsize: 20px</p>
<p style="FONT-SIZE: 20px">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 10px</p>
<p style="line-height: 10px">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 30px</p>
<p style="line-height: 30px">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
</body>
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
</html>
|
{
"pile_set_name": "Github"
}
| 0.066342 |
Q:
Fourier sine series simplification
I'm having trouble simplifying a Fourier sine expansion for the following function:
$$f(x) = \max\{{\frac{\pi}{2}, x}\}$$ on the interval of $[0,\pi]$. Since we're doing a sine series then $a_n = 0$ and the function collapses down to $f(x) = \sum_{n=1}^{\infty}b_n\sin(nx)$, where
$$b_n = \frac{2}{\pi}\int_{0}^{\pi}f(x)\sin(nx)dx = \frac{2}{\pi}\bigg(\int_{0}^{\pi/2}\frac{\pi}{2}\sin(nx) dx \quad+ \quad\int_{\pi/2}^{\pi}x\sin(nx)dx)\bigg)$$ which I've managed to calculate (hopefully correctly) as:
$$b_n = \frac{2}{\pi}\bigg(\frac{\pi}{2n} - \frac{\pi}{n}\cdot(-1)^n - \frac{1}{n^2}\sin\big(\frac{n\pi}{2}\big) \bigg)$$
Now I'm kinda stuck. I mean I could just put this into the final formula but I think there is a way to simplify it, just can't quite find it. The problematic part is obviously $\sin\big(\frac{n\pi}{2}\big)$ since for $n = 2k$ it is equal to zero. But if $n$ is an odd number it's either $-1$ or $1$. I've tried to get rid of the even elements in the sum (I had hoped they would be zero), but:
$$b_{2n}= \frac{2}{\pi}\bigg(\frac{\pi}{4n} - \frac{\pi}{2n}\cdot(-1)^{2n}-\frac{1}{(2n)^2}\sin\big(n\pi\big)\bigg) = \frac{2}{\pi}\bigg(\frac{\pi}{4n} - \frac{\pi}{2n}\bigg) = \frac{2}{\pi}\cdot\bigg(-\frac{\pi}{4n}\bigg) = -\frac{1}{2n}$$
Looks pretty neat but still doesn't help me all that much.
Any ideas on how to simplify this?
Thanks.
A:
So you know that $\sin\left(\dfrac{n\pi}{2}\right)$ is $0$ if $n$ is even, and $-1$ or $1$ if $n$ is odd. So why not separate cases even furthur: If$n=2k+1$, $k$ can be even or odd, so you have $n=4k+1$ or $n=4k+3$. So do the sum like this:
$$f(x)=\sum_{n=1}^\infty b_{2n}\sin(2nx)+\sum_{n=1}^\infty b_{4n+1}\sin((4n+1)x)+\sum_{n=1}^\infty b_{4n+3}\sin((4n+3)x).$$
|
{
"pile_set_name": "StackExchange"
}
| 0 |
# map type: blank
# random seed: -994563557
# hill distance 57,130 104,130
# 57,130 0 123
# 104,130 123 0
players 2
rows 108
cols 138
m ..%%%%%%%%%%%%%.....%%%%%%%%....%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%....%%%%%%%%%%%%%%%...%%%%%%%%...
m .%...%.%.%%.%..%...%%%%%%%%.....%%.%..%%.%.%%.%%%%%%.%%%%%.....%..%....%%%.%.%.%%%.%%.%%....%%..%%%..%%%.%...%%%..%.%%.%.%.%...%%%%..%%%..
m ...................%%....%%......................%%.....%......................%%..........%%%................%%................%%........
m ...................%%....%%.......................%%...%%.......................%..........%%.................%%...............%%%........
m ....................%....%%%......................%%....%......................%%%..........%%................%%...............%%.........
m .%%......%%.%%.%...%%%....%%..%%..%%.%...%..%....%%%...%%%%.%%%..%%..%%%.%......%....%.%.%.%%%....%.......%%%%%.....%.%%%..%..%%%%%..%%%..
m %%%%%%%%%%%%%%%%...%%%...%%%%%%%%%%%%%%%%%%%%%....%.....%%%%%%%%%%%%%%%%%%%.....%....%%%%%%%%%...%%%%%%%%%%%%%%%...%%%%%%%%%%%%%%%%%%%%%%%
m ...%..%%%%%%.%.%...%%%....%.%..%%%...%%..%%%%.....%......%..%.%..%..%...%%%.....%.....%%.%.%%.....%%.%.%%.%.%%.....%%%..%%.%%..%%%.%%.%%%%
m ...................%%......................%%%....%%......................%%....%%...%%....%%%......................%...........%%........
m ....................%.......................%%....%%......................%.....%%...%%.....%%.....................%%%.........%%%........
m ....................%%......................%%...%%......................%%.....%%....%%...%%%......................%...........%.........
m .%.%%.%.%.%.%%%%%.%%%%...%.%.......%%%.%...%%%...%%....%.%%.....%.%%%.....%%...%%%....%%...%%....%%%.%..%%..%.%%%%%%%%...%%%...%%....%.%%.
m %%%%%%%%%%%%%%%%%%%%%%%%%%%%...%%%%%%%%....%%.....%%....%%%%%%%%%%%%%.....%.....%....%%.....%%....%%%%%%%%%%%%%%%%%%%%....%....%%%....%%%%
m .%%%%.%%...%.%%.%.%.%.%%%%%....%%%%.%%%%...%%%....%%....%%.%%%%%%%%%......%....%%.....%%...%.%....%%.%%.%..%.%%%..%%.....%%%...%%.....%%.%
m .%%............................%%%....%%...%%...........%%...%%...........%.....%....%%..........%%%..........%%..........%%..........%%..
m ..%.............................%.....%%....%%.........%%%....%..........%%%....%.....%%..........%%..........%...........%...........%%..
m .%%.............................%%...%%%...%%%..........%.....%...........%.....%....%%..........%%%..........%..........%%%..........%%..
m ..%%....%.%%.%..........%%%%..%%%%....%%....%%%.%.%%...%%%....%%.....%.%%%%....%%.....%....%%%..%%%......%...%%%...%%%%..%%%..%%..%.%%%%..
m ..%.....%%%%%%%....%%%%%%%%%%%%%%%....%.....%%%%%%%%%%%%%%....%%....%%%%%%%%....%%...%%.....%%%%%%%.....%....%%....%%%%%%%%%%%%%%%%%%%%%..
m ...%....%%...%.%...%%%%%%..%%%%%%%...%.....%....%..%.%.%%....%.....%%%..%%%...........%%.....%.%%%%....%%%.........%%%....%%.%%%%%..%.....
m .......%%..........%%%.................................%%..........%%%...%%..........%%................%%%.........%%%..........%.........
m ........%%..........%...................................%%..........%....%%%..........%................%%%.........%%%..........%%........
m .......%%%.........%%%..................................%%..........%.....%...........%.................%..........%%...........%.........
m .%.%.%.%%%...%.%%%%%%%%%%..%.%%.%%%%%%%...%%.%%%...%...%%%....%.%..%%%...%%%%..%..%.%%%%..%%.%...%%...%%%%..%%..%.%%%.....%%%..%%%....%%..
m ..%%%%%%%.....%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%...%%%%%%%%.....%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%....%%..
m ..............................................................%%..........................................................................
m ..............................................................%...........................................................................
m ..............................................................%...........................................................................
m ..............................................................%%..........................................................................
m ..%%%%%%%.....%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%...%%%%%%%%.....%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%....%%..
m .%.%.%.%%%...%.%%%%%%%%%%..%.%%.%%%%%%%...%%.%%%...%...%%%....%.%..%%%...%%%%..%..%.%%%%..%%.%...%%...%%%%..%%..%.%%%.....%%%..%%%....%%..
m .......%%%.........%%%..................................%%..........%.....%...........%.................%..........%%...........%.........
m ........%%..........%...................................%%..........%....%%%..........%................%%%.........%%%..........%%........
m .......%%..........%%%.................................%%..........%%%...%%..........%%................%%%.........%%%..........%.........
m ...%....%%...%.%...%%%%%%..%%%%%%%...%.....%....%..%.%.%%....%.....%%%..%%%...........%%.....%.%%%%....%%%.........%%%....%%.%%%%%..%.....
m ..%.....%%%%%%%....%%%%%%%%%%%%%%%....%.....%%%%%%%%%%%%%%....%%....%%%%%%%%....%%...%%.....%%%%%%%.....%....%%....%%%%%%%%%%%%%%%%%%%%%..
m ..%%....%.%%.%..........%%%%..%%%%....%%....%%%.%.%%...%%%....%%.....%.%%%%....%%.....%....%%%..%%%......%...%%%...%%%%..%%%..%%..%.%%%%..
m .%%.............................%%...%%%...%%%..........%.....%...........%.....%....%%..........%%%..........%..........%%%..........%%..
m ..%.............................%.....%%....%%.........%%%....%..........%%%....%.....%%..........%%..........%...........%...........%%..
m .%%............................%%%....%%...%%...........%%...%%...........%.....%....%%..........%%%..........%%..........%%..........%%..
m .%%%%.%%...%.%%.%.%.%.%%%%%....%%%%.%%%%...%%%....%%....%%.%%%%%%%%%......%....%%.....%%...%.%....%%.%%.%..%.%%%..%%.....%%%...%%.....%%.%
m %%%%%%%%%%%%%%%%%%%%%%%%%%%%...%%%%%%%%....%%.....%%....%%%%%%%%%%%%%.....%.....%....%%.....%%....%%%%%%%%%%%%%%%%%%%%....%....%%%....%%%%
m .%.%%.%.%.%.%%%%%.%%%%...%.%.......%%%.%...%%%...%%....%.%%.....%.%%%.....%%...%%%....%%...%%....%%%.%..%%..%.%%%%%%%%...%%%...%%....%.%%.
m ....................%%......................%%...%%......................%%.....%%....%%...%%%......................%...........%.........
m ....................%.......................%%....%%......................%.....%%...%%.....%%.....................%%%.........%%%........
m ...................%%......................%%%....%%......................%%....%%...%%....%%%......................%...........%%........
m ...%..%%%%%%.%.%...%%%....%.%..%%%...%%..%%%%.....%......%..%.%..%..%...%%%.....%.....%%.%.%%.....%%.%.%%.%.%%.....%%%..%%.%%..%%%.%%.%%%%
m %%%%%%%%%%%%%%%%...%%%...%%%%%%%%%%%%%%%%%%%%%....%.....%%%%%%%%%%%%%%%%%%%.....%....%%%%%%%%%...%%%%%%%%%%%%%%%...%%%%%%%%%%%%%%%%%%%%%%%
m .%%......%%.%%.%...%%%....%%..%%..%%.%...%..%....%%%...%%%%.%%%..%%..%%%.%......%....%.%.%.%%%....%.......%%%%%.....%.%%%..%..%%%%%..%%%..
m ....................%....%%%......................%%....%......................%%%..........%%................%%...............%%.........
m ...................%%....%%.......................%%...%%.......................%..........%%.................%%...............%%%........
m ...................%%....%%......................%%.....%......................%%..........%%%................%%................%%........
m .%...%.%.%%.%..%...%%%%%%%%.....%%.%..%%.%.%%.%%%%%%.%%%%%.....%..%....%%%.%.%.%%%.%%.%%....%%..%%%..%%%.%...%%%..%.%%.%.%.%...%%%%..%%%..
m ..%%%%%%%%%%%%%.....%%%%%%%%....%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%....%%%%%%%%%%%%%%%...%%%%%%%%...
m .%%%.%...%..%%%....%%..%%%.....%%%.%..%%..%%%%%.%..%%.%%.%...%%%%..%...%.%%%...%..%%%%%....%%.%..%%%%..%.....%%%...%.%%.%%%.....%%.%%%....
m .%%...........%%................%..........%%%...............%%.......................%%..........%.......................%%....%%........
m .%%%.........%%.................%...........%%...............%%......................%%..........%%.......................%%...%%%........
m ..%...........%%...............%%..........%%.................%%.....................%%..........%%%.....................%%%...%%.1.......
m ..%....%......%%.%...%%%.%%....%%....%%....%%%...%.%...%%.%%%%%%.%..%%......%..%.%....%%%%.......%%%...%%......%%..%...%.%%%....%%..%%%%..
m .%%.....%%...%%%%%%%%%%%%%%%%%%%%.....%%...%%%...%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%...%%.....%....%%%%%%%%%%%%%%%...%%%%%%%%...
m ...%...%%.....%%%..%%.%%%%..%%..%%...%%....%.....%%%...%%%%..%...%..%....%%.%%%%.%...%.%%%%%%%.....%...%%.....%%...%%%...%%%...%.%%%.%%%..
m .......%%.............................%...........%........................................%%..........%%....%%%.........%%%.........%%...
m .......%%.............................%%.........%%........................................%%...........%%...%%%.........%%%..........%%..
m ........%%...........................%%%.........%%%........................................%%.........%%....%%%.........%%..........%%%..
m ..%%%%.%%%%%%.%%.%%%.%....%.%.%......%%%..%.%.%..%%%.....%%%%%..%.%...%%..%%%%.%.....%.....%%%%...%....%%%%.%%%%.....%....%%%%%.%%....%%..
m %%%%%%%%%%%%%%%%%%%%%.....%%%%%%%%%%%%%%%%%%%%%%%%%%...%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%%....%%%%%%%....%%%....%%%%%%%%....%%%%
m %%%%%..%%.%..%%%.%%%%........%%..%%...%%.%%%.%%..%%%...%.%%%..%%..%.%.%%.%%%%.%.......%%%..%..%..%%....%%%%%%%%.....%%....%%.%.%.%...%%.%.
m ..%%................%............................%%.......................%%..........%%..........%.................%%...%%%..............
m ..%%...............%%.............................%%.....................%%%..........%%..........%%...............%%....%%...............
m .%%.................%%............................%.......................%%.........%%...........%%................%.....%%..............
m ..%............%....%.........%%...%%.%%%%..%....%%%...%.%%%%...%%%%.....%%%..%.%%%%.%%%....%....%%%%....%.%.%%....%%%...%%%...%%...%.%%..
m ..%%...%%%%%%%%....%%%...%%%%%%%%%%%%%%%%%%%%.....%%....%%%%%%%%%%%%%.....%%%%%%%%%%%%%%...%%.....%%%%%%%%%%%%%%%%%%%....%%%...%%%%%%%%%..
m .%.%...%%%%.%%%%....%.....%%.%.%%...%%%%%..%%%...%%%....%%..%.%%%%.%%.....%.%..%%%.%%.%.....%.....%%%.%%..%%%%%..%%%%%...%.%....%%..%%%%..
m .......%%%..........%.....%..........%%....%%....%%%...%%...........%%.........%%%.........%%%......................%..........%%.....%%..
m .......%%..........%%....%%..........%%%....%.....%.....%%..........%..........%%%..........%%......................%..........%%.....%%..
m ........%%..........%....%%...........%%....%%....%%...%%..........%%..........%%%..........%%.....................%%..........%%.....%%..
m .%%%....%....%..%..%%.....%%.....%....%%....%.....%%....%%.....%....%%%%%.%.....%%...%%..%%%%%%.%%..%%.%%.%%%%%%...%%%...%..%.%%%....%%%%%
m %%%....%%.....%%%%%%%%...%%.....%....%%%...%%....%%....%%%....%%...%%%%%%%%%...%%....%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%.....%%%%
m %%.%....%%....%%%.%%%....%......%%.....%...%%.................%%...%%%...%%%...%.....%%......%..%.%%%....%.%%%%....%%.%...%..%.......%.%..
m .............%%%................%%..........%%...............%%...........%%..............................................................
m .............%%................%%...........%%................%...........%...............................................................
m .............%%................%%...........%%................%...........%...............................................................
m .............%%%................%%..........%%...............%%...........%%..............................................................
m %%.%....%%....%%%.%%%....%......%%.....%...%%.................%%...%%%...%%%...%.....%%......%..%.%%%....%.%%%%....%%.%...%..%.......%.%..
m %%%....%%.....%%%%%%%%...%%.....%....%%%...%%....%%....%%%....%%...%%%%%%%%%...%%....%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%.....%%%%
m .%%%....%....%..%..%%.....%%.....%....%%....%.....%%....%%.....%....%%%%%.%.....%%...%%..%%%%%%.%%..%%.%%.%%%%%%...%%%...%..%.%%%....%%%%%
m ........%%..........%....%%...........%%....%%....%%...%%..........%%..........%%%..........%%.....................%%..........%%.....%%..
m .......%%..........%%....%%..........%%%....%.....%.....%%..........%..........%%%..........%%......................%..........%%.....%%..
m .......%%%..........%.....%..........%%....%%....%%%...%%...........%%.........%%%.........%%%......................%..........%%.....%%..
m .%.%...%%%%.%%%%....%.....%%.%.%%...%%%%%..%%%...%%%....%%..%.%%%%.%%.....%.%..%%%.%%.%.....%.....%%%.%%..%%%%%..%%%%%...%.%....%%..%%%%..
m ..%%...%%%%%%%%....%%%...%%%%%%%%%%%%%%%%%%%%.....%%....%%%%%%%%%%%%%.....%%%%%%%%%%%%%%...%%.....%%%%%%%%%%%%%%%%%%%....%%%...%%%%%%%%%..
m ..%............%....%.........%%...%%.%%%%..%....%%%...%.%%%%...%%%%.....%%%..%.%%%%.%%%....%....%%%%....%.%.%%....%%%...%%%...%%...%.%%..
m .%%.................%%............................%.......................%%.........%%...........%%................%.....%%..............
m ..%%...............%%.............................%%.....................%%%..........%%..........%%...............%%....%%...............
m ..%%................%............................%%.......................%%..........%%..........%.................%%...%%%..............
m %%%%%..%%.%..%%%.%%%%........%%..%%...%%.%%%.%%..%%%...%.%%%..%%..%.%.%%.%%%%.%.......%%%..%..%..%%....%%%%%%%%.....%%....%%.%.%.%...%%.%.
m %%%%%%%%%%%%%%%%%%%%%.....%%%%%%%%%%%%%%%%%%%%%%%%%%...%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%%%%%%%....%%%%%%%....%%%....%%%%%%%%....%%%%
m ..%%%%.%%%%%%.%%.%%%.%....%.%.%......%%%..%.%.%..%%%.....%%%%%..%.%...%%..%%%%.%.....%.....%%%%...%....%%%%.%%%%.....%....%%%%%.%%....%%..
m ........%%...........................%%%.........%%%........................................%%.........%%....%%%.........%%..........%%%..
m .......%%.............................%%.........%%........................................%%...........%%...%%%.........%%%..........%%..
m .......%%.............................%...........%........................................%%..........%%....%%%.........%%%.........%%...
m ...%...%%.....%%%..%%.%%%%..%%..%%...%%....%.....%%%...%%%%..%...%..%....%%.%%%%.%...%.%%%%%%%.....%...%%.....%%...%%%...%%%...%.%%%.%%%..
m .%%.....%%...%%%%%%%%%%%%%%%%%%%%.....%%...%%%...%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%....%%%%%%%%...%%.....%....%%%%%%%%%%%%%%%...%%%%%%%%...
m ..%....%......%%.%...%%%.%%....%%....%%....%%%...%.%...%%.%%%%%%.%..%%......%..%.%....%%%%.......%%%...%%......%%..%...%.%%%....%%..%%%%..
m ..%...........%%...............%%..........%%.................%%.....................%%..........%%%.....................%%%...%%.0.......
m .%%%.........%%.................%...........%%...............%%......................%%..........%%.......................%%...%%%........
m .%%...........%%................%..........%%%...............%%.......................%%..........%.......................%%....%%........
m .%%%.%...%..%%%....%%..%%%.....%%%.%..%%..%%%%%.%..%%.%%.%...%%%%..%...%.%%%...%..%%%%%....%%.%..%%%%..%.....%%%...%.%%.%%%.....%%.%%%....
|
{
"pile_set_name": "Github"
}
| 0 |
Q:
CLR SQL vs T-SQL for queries
I am aware that CLR stored-procedures is more efficient in procedural code and T-SQL is better for queries - however I am having a hard time deciding what to use for my specific needs, and I would like to know if there are other things I should consider when making my decision.
The code I am planning on creating involves querying a set of data, implementing some algorithms (that will become more complex over time) and insertion of the data to the database. This stored procedure will be deployed by a scheduler - most probably azure webJobs since as far as I know Azure SQL does not support db jobs.
why I think of using C#
Assuming I can load DAL libraries from my server, and leveraging OOP - I guess I can implement a more coder friendly solution to this problem - and as for performance I assume it would be better or at least not noticeable in comparison.
Why I think of using T-SQL
I don't actually believe it is a better solution, but there might be something I am overlooking that might be a good case for T-SQL, because it makes no sense to me that it would have none.
Most importantly
Is there a way I can create a T-SQL stored procedure, call a C# stored procedure with complex objects as parameters - do my algorithms and return the data to be inserted, and insert it from T-SQL? seems like the most elegant, and best performing(?) solution (assuming it's possible and there are no drawbacks to calling CLR from T-SQL).
A:
First off, just to be clear: SQLCLR / .NET / C# / VB.NET cannot query the database. Only T-SQL can query SQL Server. So in order for SQLCLR code to get data or interact with SQL Server in any way, it must establish a SqlConnection, like any other .NET app, and submit T-SQL, or execute a Stored Procedure.
Yes, you can call a SQLCLR (whether it is C# or VB.NET does not matter) Stored Procedure, or Scalar Function, or Table-Valued Function (TVF), etc from T-SQL. In fact, that is the only way you can call SQLCLR objects. Classes representing the SQLCLR objects, defined in Assemblies, need to have T-SQL wrapper objects defined that point to those classes so that they can be invoked.
Sending complex objects into SQLCLR objects can be accomplished, but unfortunately not via Table Valued Parameters (TVPs). However, you can either create a local temporary table in T-SQL, populate it, and select from it in the SQLCLR object, OR you can package up the complex data in XML and pass that in as a parameter to the SQLCLR object that will traverse it via an XmlReader.
For getting the data back efficiently, you can either:
Issue INSERT statements from the SQLCLR Stored Procedure
Create a T-SQL Stored Procedure that accepts a TVP and call that from the SQLCLR object
return a Result Set from the SQLCLR object that is used in an INSERT statement, as as INSERT INTO ... EXEC for a SQLCLR Stored Procedure, or INSERT INTO ... SELECT for a SQLCLR TVF.
As far as loading you DAL libraries goes, that could work, but there could also be complications. It all depends on what you libraries are doing and what Framework libraries are being referenced. Only a small subset of the .NET Framework libraries are supported in SQL Server's CLR host, so if your libraries reference other libraries that are not "approved", then you will need to load those libraries manually, along with any of their dependent libraries (if there are any). The complicating factors here are that loading unsupported .NET Framework libraries requires that they be set to UNSAFE, which in turn requires that the Database be set to TRUSTWORTHY ON. The other complication is that loading the .NET Framework library might not even be possible in the first place since the CLR host inside of SQL Server only allows pure-MSIL Assemblies, and so you cannot load mixed-mode Assemblies. Some .NET Framework libraries are currently mixed-mode and won't load. Others are currently "pure" and will load, but there is no guarantee that those will not ever be changed into a mixed-mode Assembly in a future .NET Framework update. If/when that happens (and it has happened, such as with System.ServiceModel), then you will need to re-code you Assembly. So it's best to stick with the supported Framework libraries as those are guaranteed to continue working through future upgrades.
Keep in mind that App Domains are per Database, per Owner (of the Assembly). This means that, in terms of any particular SQLCLR object, all sessions / SPIDs will be calling the same code and sharing the same memory. This is why the methods need to be declared as static. And this is why attempting to use non-readonly static class variables requires the Assembly to be marked as UNSAFE: because the value of such a variable can be overwritten by another session / SPID (case in point: SQLCLR assembly throws error when multiple queries run simultaneously).
With respect to this statement in the Question:
as for performance I assume it would be better or at least not noticeable in comparison.
I wouldn't assume anything here. There are a lot of factors that influence performance in either direction:
some datatypes transfer back-and-forth between SQL Server memory and .NET AppDomain memory faster than others
how you code your algorithms in C# (I recently wrote a simple function for someone who had already gotten another suggestion that used LINQ -- the LINQ version took 375 - 400 ms to do the same thing that my version, with more lines, took only 2 - 9 ms to complete, a 41x - 200x difference!)
how much data you have (sometimes T-SQL is faster with smaller values -- usually strings -- where SQLCLR might be faster with longer values)
are you following best practices? If you are coding a deterministic SQLCLR scalar function and don't mark it as IsDeterministic=true, then you can't get the benefit of it being able to participate in a parallel plan (something T-SQL UDFs can't do).
etc
Hence: don't assume; test!
If you are looking to learn more about working with SQLCLR, you might want to check out a series that I am writing on this topic on SQL Server Central: Stairway to SQLCLR (free registration is required to access their content). There are several articles and more coming, and plenty of examples to illustrate various features, security, etc.
Regarding Azure SQL Database: please note that while support for SQLCLR (SAFE Assemblies only) was added in late 2014, it was recently (and supposedly temporarily) removed. Customers were emailed on April 8th, 2016 of the feature being removed on April 15th, 2016. The most official notice I could find was this thread on reddit:
Customer:
Is support for CLR Assemblies in Azure SQL going to end any time soon?
I ask this because I received an email this morning (supposedly) from Microsoft stating that this feature will no longer be supported after April 15th (!!!).
Jan, a PM in the Azure SQL DB team working on performance and Elastic Pools:
The email you received is indeed real. As stated in the mail, we determined that there is a security risk with user-defined SQL CLR in SQL Database. There have been no known exploits to date. In an effort to help protect the security of our customers, we have proactively suspended the use of user-defined SQL CLR in Azure SQL Database. This means that user-defined SQL CLR will no longer work. We will update you within six month with a timeline for bringing back SQL CLR.
and Tommy, a PM in the Azure SQL DB Security team:
This issue only applies to the Azure SQL Database service, not SQL Server on-prem or IaaS.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
A novel sequence-based approach to localize translocation breakpoints identifies the molecular basis of a t(4;22).
Low copy repeats (LCRs) located in 22q11.2, especially LCR-B, are susceptible to rearrangements associated with several relatively common constitutional disorders. These include DiGeorge syndrome, Velocardiofacial syndrome, Cat-eye syndrome and recurrent translocations of 22q11 including the constitutional t(11;22) and t(17;22). The presence of palindromic AT-rich repeats (PATRRs) within LCR-B of 22q11.2, as well as within the 11q23 and 17q11 regions, has suggested a palindrome-mediated, stem-loop mechanism for the generation of such recurring constitutional 22q11.2 translocations. The mechanism responsible for non-recurrent 22q11.2 rearrangements is presently unknown due to the extensive effort required for breakpoint cloning. Thus, we have developed a novel fluorescence in-situ hybridization and primed in-situ hybridization (PRINS) approach and rapidly localized the breakpoint of a non-recurrent 22q11.2 translocation, a t(4;22). Multiple primer pairs were designed from the sequence of a 200 kb, chromosome 4, breakpoint-spanning BAC to generate PRINS probes. Amplification of adjacent primer pairs, labeled in two colors, allowed us to narrow the 4q35.1 breakpoint to a 6.7 kb clonable region. Application of our improved PRINS protocol facilitated fine-mapping the translocation breakpoints within 4q35.1 and 22q11.2, and permitted rapid cloning and analysis of translocation junction fragments. To confirm the PRINS localization results, PCR mapping of t(4;22) somatic cell hybrid DNA was employed. Analysis of the breakpoints demonstrates the presence of a 554 bp palindromic sequence at the chromosome 4 breakpoint and a 22q11.2 location within the same PATRR as the recurrent t(11;22) and t(17;22). The sequence of this breakpoint further suggests that a stem-loop secondary structure mechanism is responsible for the formation of other, non-recurrent translocations involving LCR-B of 22q11.2.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
The first related application discloses a new form or type of integrated circuitry which effectively and efficiently combines and maximizes the various advantages of processors, application specific integrated circuits (“ASICs”), and field programmable gate arrays (“FPGAs”), while minimizing potential disadvantages. The first related application illustrates a new form or type of integrated circuit, referred to as an adaptive computing engine (“ACE”), which provides the programming flexibility of a processor, the post-fabrication flexibility of FPGAs, and the high speed and high utilization factors of an ASIC. This ACE integrated circuitry is readily reconfigurable, is capable of having corresponding, multiple modes of operation, and further minimizes power consumption while increasing performance, with particular suitability for low power applications, such as for use in hand-held and other battery-powered devices.
The second related application discloses a preferred system embodiment that includes an ACE integrated circuit coupled with one or more sets of configuration information. This configuration information is required to generate, in advance or in real-time (or potentially at a slower rate), the configurations and reconfigurations which provide and create one or more operating modes for the ACE circuit, such as wireless communication, radio reception, personal digital assistance (“PDA”), MP3 or MP4 music playing, or any other desired functions. Various methods, apparatuses and systems are also illustrated in the second related application for generating and providing configuration information for an ACE integrated circuit, for determining ACE reconfiguration capacity or capability, for providing secure and authorized configurations, and for providing appropriate monitoring of configuration and content usage.
A need remains, however, for an apparatus, method and system for not only configuring, but also operating such adaptive integrated circuitry, with one or more operating modes or other functionality of ACE circuitry and other ACE devices. Such an apparatus, method and system should be capable of configuring and operating the adaptive IC, utilizing both configuration information provided independently of user data or other content, and utilizing configuration information provided concurrently with user data or other content. Such an apparatus, method and system should provide the means to, among other things, coordinate configuration with data, provide self-routing of configuration and data, and provide power control within ACE circuitry.
|
{
"pile_set_name": "USPTO Backgrounds"
}
| 0 |
XX
|
{
"pile_set_name": "NIH ExPorter"
}
| 0.5 |
Description
With the advent of Sushi Cat for the iPhone and iPod Touch, Jimp and I decided to do a level pack to sort of extend the story of Sushi Cat a bit.
The lovable blue cat and his pink companion have gone on their honeymoon. Little does Sushi Cat know, but his dream vacation is about to get abruptly interrupted. Help Sushi Cat out by guiding him to as much sushi as possible. Watch him grow fat as he eats more and more sushi along his way. Fill up his belly to win.
Want to download Sushi Cat for your iPhone or iPod Touch? Click here.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Savoia-Marchetti S.84
The Savoia-Marchetti S.84 was an Italian twin-engined airliner developed, in Italy, from the three-engined Savoia-Marchetti S.73; only the prototype was completed and the designation was re-used for the Savoia-Marchetti SM.84
Specifications (S.84 prototype)
Notes
References
Category:1930s Italian airliners
Category:World War II Italian transport aircraft
S.84
Category:Low-wing aircraft
Category:Twin piston-engined tractor aircraft
Category:Aircraft first flown in 1936
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Recurrent 15q11.2 BP1-BP2 microdeletions and microduplications in the etiology of neurodevelopmental disorders.
Rare and common CNVs can contribute to the etiology of neurodevelopmental disorders. One of the recurrent genomic aberrations associated with these phenotypes and proposed as a susceptibility locus is the 15q11.2 BP1-BP2 CNV encompassing TUBGCP5, CYFIP1, NIPA2, and NIPA1. Characterizing by array-CGH a cohort of 243 families with various neurodevelopmental disorders, we identified five patients carrying the 15q11.2 duplication and one carrying the deletion. All CNVs were confirmed by qPCR and were inherited, except for one duplication where parents were not available. The phenotypic spectrum of CNV carriers was broad but mainly neurodevelopmental, in line with all four genes being implicated in axonal growth and neural connectivity. Phenotypically normal and mildly affected carriers complicate the interpretation of this aberration. This variability may be due to reduced penetrance or altered gene dosage on a particular genetic background. We evaluated the expression levels of the four genes in peripheral blood RNA and found the expected reduction in the deleted case, while duplicated carriers displayed high interindividual variability. These data suggest that differential expression of these genes could partially account for differences in clinical phenotypes, especially among duplication carriers. Furthermore, urinary Mg2+ levels appear negatively correlated with NIPA2 gene copy number, suggesting they could potentially represent a useful biomarker, whose reliability will need replication in larger samples. © 2016 Wiley Periodicals, Inc.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Cum Shot On Undies Rubbed Into Her Pussy With Cock!!!
|
{
"pile_set_name": "OpenWebText2"
}
| 0.056604 |
British busty tit wank Porn Videos
All the best busty tit wank British Porn videos from all over the world featuring charming sexy beauties who ready to do anything for busty tit wank sex movies. On the busty tit wank search on Free British Porn Tube.
|
{
"pile_set_name": "Pile-CC"
}
| 0.06746 |
I'm just going to take off my sandals to dance aaaand there's glass in my foot.
191 shares
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
When
would
you
like
to
stay?
Not
what
you're
looking
for?
A 15-minute walk from Salzburg's Old Town and only 200 metres from the Main Train Station, the Wyndham Grand Salzburg Conference Centre has a fitness centre, a sauna, and an indoor pool. Free WiFi is available.
The Wyndham’s modern rooms offer air conditioning, a flat-screen satellite TV, a seating area, a minibar, and a bathroom with bathtub, toiletries, and hairdryer.
A varied breakfast buffet is served daily from 06:30. On weekends, breakfast for late risers is available. Austrian and international dishes, as well as a wide range of exclusive drinks and cocktails, are served at the BarRoque.
The Mirabell Gardens are a 10-minute walk away from the Wyndham Hotel & Conference Centre.Hotel Rooms: 262
Hotel facilities
Parking
Pets allowed
On-site parking
Private parking
WiFi available in all areas
Internet services
WiFi
Free WiFi
Restaurant (à la carte)
Packed lunches
Room service
Bar
Breakfast in the room
Special diet menus (on request)
Swimming pool
Sauna
Fitness centre
Spa and wellness centre
Massage
Indoor pool (all year)
Shuttle service
Concierge service
Ticket service
Luggage storage
Tour desk
Safety deposit box
Newspapers
24-hour front desk
Terrace
Ironing service
Laundry
Dry cleaning
Shoeshine
Trouser press
Fax/photocopying
Business centre
Meeting/banquet facilities
Non-smoking rooms
Facilities for disabled guests
Family rooms
Lift
Heating
Allergy-free room
Air conditioning
Hotel policies
Check in / Check Out
You must check in from 15:00 hours onwards
You must check out before 12:00 hours
Continue to the next page for a full description of the available rooms and their prices. Choose and book your room.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Wife does anal sex her ass looks so nice
|
{
"pile_set_name": "OpenWebText2"
}
| 0.075 |
you guys suck
|
{
"pile_set_name": "Enron Emails"
}
| 0.076923 |
About to take a huge cock in her ass
|
{
"pile_set_name": "OpenWebText2"
}
| 0.055556 |
Q:
Webform A partially-completed form was found. Please complete the remaining portions
I'm seeing this message on my webforms:
A partially-completed form was found. Please complete the
remaining portions
How can I suppress this message for Webform version 7.x-4.10?
A:
This is shown if you have the Show "Save draft" button option ticked in any webform and is hardcoded into the Webform form builder. If you want to override the message display the Disable Message module can help you here.
Gives a site owner options to disable specific messages shown to end
users. The core drupal message system as offered by drupal_set_message
is an excellent way for modules to send out messages to the end users.
However not all drupal site owners are keen to show all the messages
sent out by drupal core and all modules to their users. This module
gives site administrators a reasonably powerful way to filter out
messages shown to the end users.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Q:
How to get total delay from two columns group by day?
I have a table in a MySql database named as internet with 3 columns: id, dropped_at and dropped_to as shown in this image
How to find total delay group by date?
Well, I have tried but it's not working properly
here is my MySql code:
SELECT
dropped_at,
dropped_to,
TIMEDIFF(dropped_to,dropped_at) AS delay
FROM
internet
WHERE
WEEKDAY(dropped_at) BETWEEN 0 AND 6 AND
WEEK (dropped_at) = WEEK (NOW())
GROUP BY CAST(dropped_to AS DATE)
A:
If you want total delay for each day then the following query would work:
SELECT
DATE(dropped_at) AS date,
SUM(TIMESTAMPDIFF(MINUTE,dropped_at,dropped_to)) AS delayInMinutes
FROM internet
GROUP BY date
ORDER BY date;
Note: The delay is in MINUTES. You can change it to any unit as you like
If you want the delay in hh:mm:ss format then try the following query instead
SELECT
DATE(dropped_at) AS date,
SEC_TO_TIME(SUM(TIMESTAMPDIFF(SECOND,dropped_at,dropped_to))) AS delay
FROM internet
GROUP BY date
ORDER BY date;
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Arica, Amazonas
Arica is a town in the Amazonas Department, Colombia.
Category:Populated places in the Amazonas Department
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
This invention relates generally to EMI filter assemblies, particularly of the type used in active implantable medical devices (AIMDs) such as cardiac pacemakers, cardioverter defibrillators, neurostimulators and the like, which decouple and shield internal electronic components of the medical device from undesirable electromagnetic interference (EMI) signals.
Compatibility of cardiac pacemakers, implantable defibrillators and other types of active implantable medical devices with magnetic resonance imaging (MRI) and other types of hospital diagnostic equipment has become a major issue. If one goes to the websites of the major cardiac pacemaker manufacturers in the United States, which include St. Jude Medical, Medtronic and Guidant, one will see that the use of MRI is generally contra-indicated with pacemakers and implantable defibrillators. See also “Safety Aspects of Cardiac Pacemakers in Magnetic Resonance Imaging”, a dissertation submitted to the Swiss Federal Institute of Technology Zurich presented by Roger Christoph Luchinger. “Dielectric Properties of Biological Tissues: I. Literature Survey”, by C. Gabriel, S. Gabriel and E. Cortout; “Dielectric Properties of Biological Tissues: II. Measurements and the Frequency Range 0 Hz to 20 GHz”, by S. Gabriel, R. W. Lau and C. Gabriel; “Dielectric Properties of Biological Tissues: III. Parametric Models for the Dielectric Spectrum of Tissues”, by S. Gabriel, R. W. Lau and C. Gabriel; and “Advanced Engineering Electromagnetics, C. A. Balanis, Wiley, 1989, all of which are incorporated herein by reference.
However, an extensive review of the literature indicates that MRI is indeed often used with pacemaker patients. The safety and feasibility of MRI in patients with cardiac pacemakers is an issue of gaining significance. The effects of MRI on patients' pacemaker systems have only been analyzed retrospectively in some case reports. There are a number of papers that indicate that MRI on new generation pacemakers can be conducted up to 0.5 Tesla (T). MRI is one of medicine's most valuable diagnostic tools. An absolute contra-indication for pacemaker patients means that pacemaker and ICD wearers are excluded from MRI. This is particularly true of scans of the thorax and abdominal areas. Because of MRI's incredible value as a diagnostic tool for imaging organs and other body tissues, many physicians simply take the risk and go ahead and perform MRI on a pacemaker patient. The literature indicates a number of precautions that physicians should take in this case, including limiting the power of the MRI magnetic field, programming the pacemaker to fixed or asynchronous pacing mode, and then careful reprogramming and evaluation of the pacemaker and patient after the procedure is complete. There have been reports of latent problems with cardiac pacemakers after an MRI procedure occurring many days later.
There are three types of electromagnetic fields used in an MRI unit. The first type is the main static magnetic field which is used to align protons in body tissue. The field strength varies from 0.5 to 3.0 Tesla in most of the currently available MRI units in clinical use. Some of the newer MRI system fields can go as high as 4 to 5 Tesla. This is about 100,000 times the magnetic field strength of the earth. A static magnetic field can induce powerful mechanical forces on any magnetic materials implanted within the patient. This would include certain components within the cardiac pacemaker itself and or lead wire systems. It is not likely (other than sudden system shut down) that the static MRI magnetic field can induce currents into the pacemaker lead wire system and hence into the pacemaker itself. It is a basic principle of physics that a magnetic field must either be time-varying as it cuts across the conductor, or the conductor itself must move within the magnetic field for currents to be induced.
The second type of field produced by magnetic resonance imaging is the pulsed RF field which is generated by the body coil or head coil. This is used to change the energy state of the protons and illicit MRI signals from tissue. The RF field is homogeneous in the central region and has two main components: (1) the magnetic field is circularly polarized in the actual plane; and (2) the electric field is related to the magnetic field by Maxwell's equations. In general, the RF field is switched on and off during measurements and usually has a frequency of 21 MHz to 64 MHz to 128 MHz depending upon the static magnetic field strength.
The third type of electromagnetic field is the time-varying magnetic gradient fields which are used for spatial localization. These change their strength along different orientations and operating frequencies on the order of 1 kHz. The vectors of the magnetic field gradients in the X, Y and Z directions are produced by three sets of orthogonally positioned coils and are switched on only during the measurements.
Feedthrough terminal pin assemblies are generally well known in the art for use in connecting electrical signals through the housing or case of an electronic instrument. For example, in implantable medical devices such as cardiac pacemakers, defibrillators and the like, the terminal pin assembly comprises one or more conductive terminal pins supported by an insulator structure for feedthrough passage of electrical signals from the exterior to the interior of the medical device. Many different insulator structures and related mounting methods are known for use in medical devices wherein the insulator structure provides a hermetic seal to prevent entry of patient body fluids into the medical device housing, where such body fluids could otherwise interfere with the operation of and/or cause damage to internal electronic components of the medical device.
In the past, two primary technologies have been employed to manufacture the hermetic seal. One technique involves the use of an alumina insulator which is metallized to accept brazing material. This alumina insulator is brazed to the terminal pin or pins, and also to an outer metal ferrule of titanium or the like. The alumina insulator supports the terminal pin or pins in insulated spaced relation from the ferrule which is adapted for suitable mounting within an access opening formed in the housing of the medical device. In an alternative technique, the hermetic seal comprises a glass-based seal forming a compression or matched fused glass seal for supporting the terminal pin or pins within an outer metal ferrule or housing.
The feedthrough terminal pins are typically connected to one or more lead wires which, in the example of a cardiac pacemaker, sense signals from the patient's heart and also couple electronic pacing pulses from the medical device to the patient's heart. Unfortunately, these lead wires can act as an antenna to collect stray electromagnetic interference (EMI) signals for transmission via the terminal pins into the interior of the medical device. Such unwanted EMI signals can disrupt proper operation of the medical device, resulting in malfunction or failure. For example, it has been documented that stray EMI signals emanating from cellular telephones can inhibit pacemaker operation, resulting in asynchronous pacing, tracking and missed beats. To address this problem, hermetically sealed feedthrough terminal pin assemblies have been designed to include a feedthrough capacitor for decoupling EMI signals in a manner preventing such unwanted signals from entering the housing of the implantable medical device. See, for example, U.S. Pat. Nos. 4,424,551; 5,333,095; 5,751,539; 5,905,627; 5,973,906; 6,008,980; and 6,566.978. These prior art feedthrough capacitor EMI filters generally provide a high degree of attenuation to EMI in the frequency range between 450 and 3000 MHz.
While feedthrough capacitor filter assemblies have provided a significant advance in the art, a remaining area of concern is powerful lower frequency emitters like MRI. As previously mentioned, feedthrough capacitors, as described in the prior art, work by providing a low impedance to ground (to the overall electromagnetic shield of the implantable medical device) thereby by-passing such high frequency signals before they can enter and disrupt sensitive pacemaker electronic circuitry. However, when a pacemaker lead wire system is exposed to a powerful time varying electromagnetic field, such as induced by MRI, the last thing that is desirable is to create low impedance in the lead wire system. A low impedance in the lead wire system only increases the current that would flow in the lead wires thereby creating additional lead wire heating and/or myocardial tissue necrosis at the pacemaker TIP to RING interface. Accordingly, it would be desirable to actually raise the impedance of the lead wire system at certain critical frequencies thereby reducing the undesirable currents in the lead wire system.
It is instructive to note how voltages and EMI are induced into an implanted lead wire system. At very low frequency (VLF), voltages are induced at the input to the cardiac pacemaker as currents circulate throughout the patient's body. Because of the vector displacement between the pacemaker housing and, for example, the TIP electrode, voltage drop across body tissues may be sensed due to Ohms Law and the circulating RF signal. At higher frequencies, the implanted lead wire systems actually act as antennas where currents are induced along their length. These antennas are not very efficient due to the damping effects of body tissue; however, this can often be offset by body resonances. At very high frequencies (such as cellular telephone frequencies), EMI signals are induced only into the first area of the lead wire system (for example, at the header block of a cardiac pacemaker). This has to do with the wavelength of the signals involved and where they couple efficiently into the system.
Magnetic field coupling into an implanted lead wire system is based on loop areas. For example, in a cardiac pacemaker, there is a loop formed by the lead wire as it comes from the cardiac pacemaker housing to its distal TIP located in the right ventricle. The return path is through body fluid and tissue generally straight from the TIP electrode in the right ventricle back up to the pacemaker case or housing. This forms an enclosed area which can be measured from patient X-rays in square centimeters. The average loop area is 200 to 225 square centimeters. This is an average and is subject to great statistical variation. For example, in a large adult patient with an abdominal implant, the implanted loop area is much larger (greater than 450 square centimeters).
Relating now to the specific case of MRI, the magnetic gradient fields would be induced through enclosed loop areas. However, the pulsed RF fields, which are generated by the body coil, would be primarily induced into the lead wire system by antenna action.
There are a number of potential problems with MRI, including: (1) Closure of the pacemaker reed switch. A pacemaker reed switch, which can also be a Hall Effect device, is designed to detect a permanent magnet held close to the patient's chest. This magnet placement allows a physician or even the patient to put the implantable medical device into what is known as the magnet mode response. The magnet mode response varies from one manufacturer to another, however, in general, this puts the pacemaker into a fixed rate or asynchronous pacing mode. This is normally done for short times and is very useful for diagnostic purposes. However, when a pacemaker is brought close to the MRI scanner, the MRI static field can make the pacemaker's internal reed switch close, which puts the pacemaker into a fixed rate or asynchronous pacing mode. Worse yet, the reed switch may bounce or oscillate. Asynchronous pacing may compete with the patient's underlying cardiac rhythm. This is one reason why patients have generally been advised not to undergo MRI. Fixed rate or asynchronous pacing for most patients is not an issue. However, in patients with unstable conditions, such as myocardial ischemia, there is a substantial risk for ventricular fibrillation during asynchronous pacing. In most modern pacemakers the magnetic reed switch (or Hall Effect device) function is programmable. If the magnetic reed switch response is switched off, then synchronous pacing is still possible even in strong magnetic fields. The possibility to open and re-close the reed switch in the main magnetic field by the gradient field cannot be excluded. However, it is generally felt that the reed switch will remain closed due to the powerful static magnetic field. It is theoretically possible for certain reed switch orientations at the gradient field to be capable of repeatedly closing and re-opening the reed switch. (2) Reed switch damage. Direct damage to the reed switch is theoretically possible, but has not been reported in any of the known literature. In an article written by Roger Christoph Luchinger of Zurich, he reports on testing in which reed switches were exposed to the static magnetic field of MRI equipment. After extended exposure to these static magnetic fields, the reed switches functioned normally at close to the same field strength as before the test. (3) Pacemaker displacement. Some parts of pacemakers, such as the batteries and reed switch, contain ferrous magnetic materials and are thus subject to mechanical forces during MRI. Pacemaker displacement may occur in response to magnetic force or magnetic torque. (4) Radio frequency field. At the frequencies of interest in MRI, RF energy can be absorbed and converted to heat. The power deposited by RF pulses during MRI is complex and is dependent upon the power and duration of the RF pulse, the transmitted frequency, the number of RF pulses applied per unit time, and the type of configuration of the RF transmitter coil used. The amount of heating also depends upon the volume of tissue imaged, the electrical resistivity of tissue and the configuration of the anatomical region imaged. Other variables that affect the degree of heating depend on the placement in the human body of the AIMD and its associated lead wire(s). For example, it will make a difference how much current is induced into a pacemaker lead wire system as to whether it is a left or right pectoral implant. In addition, the routing of the lead and the lead length are also very critical as to the amount of induced current and heating that would occur. Also, distal Tip design is very important as the distal Tip itself can act as its own antenna. The cause of heating in an MRI environment is two fold: (a) RF field coupling to the lead can occur which induces significant local heating; and (b) currents induced during the RF transmission can cause local Ohms Law heating next to the distal TIP electrode of the implanted lead. The RF field in an MRI scanner can produce enough energy to induce lead wire currents sufficient to destroy some of the adjacent myocardial tissue. Ablation has also been observed. The effects of this heating are not readily detectable by monitoring during the MRI. Indications that heating has occurred would include an increase in pacing threshold, myocardial perforation and lead penetration, or even arrhythmias caused by scar tissue. Such long term heating effects of MRI have not been well studied yet. (5) Alterations of pacing rate due to the applied radio frequency field. It has been observed that the RF field may induce undesirable fast pacing (QRS complex) rates. There are various mechanisms which have been proposed to explain rapid pacing: direct tissue stimulation, interference with pacemaker electronics or pacemaker reprogramming (or reset). In all of these cases, it would be desirable to raise the impedance, make the feedthrough capacitor more effective and provide a very high degree of protection to AIMD electronics. This will make alterations in pacemaker pacing rate and/or pacemaker reprogramming much more unlikely. (6) Time-varying magnetic gradient fields. The contribution of the time-varying gradient to the total strength of the MRI magnetic field is negligible, however, pacemaker systems could be affected because these fields are rapidly applied and removed. The time rate of change of the magnetic field is directly related to how much electromagnetic force and hence current can be induced into a lead wire system. Luchinger reports that even using today's gradient systems with a time-varying field up to 50 Tesla per second, the induced currents are likely to stay below the biological thresholds for cardiac fibrillation. A theoretical upper limit for the induced voltage by the time-varying magnetic gradient field is 20 volts. Such a voltage during more than 0.1 milliseconds could be enough energy to directly pace the heart. (7) Heating. Currents induced by time-varying magnetic gradient fields may lead to local heating. Researchers feel that the calculated heating effect of the gradient field is much less as compared to that caused by the RF field and therefore may be neglected.
There are additional problems possible with implantable cardioverter defibrillators (ICDs). ICDs use different and larger batteries which could cause higher magnetic forces. The programmable sensitivity in ICDs is normally much higher than it is for pacemakers, therefore, ICDs may falsely detect a ventricular tachyarrhythmia and inappropriately deliver therapy. In this case, therapy might include anti-tachycardia pacing, cardio version or defibrillation (high voltage shock) therapies. MRI magnetic fields may prevent detection of a dangerous ventricular arrhythmia or fibrillation. There can also be heating problems of ICD leads which are expected to be comparable to those of pacemaker leads. Ablation of vascular walls is another concern. Fortunately, ICDs have a sort of built-in fail-safe mechanism. That is, if during an MRI procedure, they inadvertently sense the MRI fields as a dangerous ventricular arrhythmia, the ICD will attempt to charge up and deliver a high voltage shock. However, there is a transformer contained within the ICD that is necessary to function in order to charge up the high energy storage capacitor contained within the ICD. In the presence of the main static field of the MRI the core of this transformer tends to saturate thereby preventing the high voltage capacitor from charging up. This makes it highly unlikely that a ICD patient undergoing an MRI would receive an inappropriate high voltage shock therapy.
In summary, there are a number of studies that have shown that MRI patients with active implantable medical devices, such as cardiac pacemakers, can be at risk for potential hazardous effects. However, there are a number of anecdotal reports that MRI can be safe for extremity imaging of pacemaker patients (only when an MRI is thought to be an absolute diagnostic necessity). The effect of an MRI system on the function of pacemakers, ICDs and neurostimulators depends on various factors, including the strength of the static magnetic field, the pulse sequence (gradient and RF field used), the anatomic region being imaged, and many other factors. Further complicating this is the fact that each manufacturer's pacemaker and ICD designs behave differently. Most experts still conclude that MRI for the pacemaker patient should not be considered safe. Paradoxically, this also does not mean that the patient should not receive MRI. The physician must make an evaluation given the pacemaker patient's condition and weigh the potential risks of MRI against the benefits of this powerful diagnostic tool. As MRI technology progresses, including higher field gradient changes over time applied to thinner tissue slices at more rapid imagery, the situation will continue to evolve and become more complex. An example of this paradox is a pacemaker patient who is suspected to have a cancer of the lung. Treatment of such a tumor may require stereotactic imaging only made possible through fine focus MRI. With the patient's life literally at risk, the physician may make the decision to perform MRI in spite of all of the previously described attendant risks to the pacemaker system.
It is clear that MRI will continue to be used in patients with an implantable medical device. There are a number of other hospital procedures, including electrocautery surgery, lithotripsy, etc., to which a pacemaker patient may also be exposed. Accordingly, there is a need for circuit protection devices which will improve the immunity of active implantable medical device systems to diagnostic procedures such as MRI. There is also a need to provide increased filtering for AIMD's due to the recent proliferation in the marketplace of new higher power emitters. These include aftermarket cellular telephone amplifiers, associated higher gain antennas and radio frequency identification (RFID) readers and scanners. The present invention fulfills all of these needs and provides other related advantages.
|
{
"pile_set_name": "USPTO Backgrounds"
}
| 0 |
Raw Amateur Anal In Car. Close Up Butt Fingering And Anal Cream Pie POV
|
{
"pile_set_name": "OpenWebText2"
}
| 0.056338 |
fuck you
|
{
"pile_set_name": "Enron Emails"
}
| 0.125 |
John Dalzell, 4th Earl of Carnwath
Lieutenant Colonel John Dalzell, 4th Earl of Carnwath (1649–1702) was a Scottish nobleman and soldier. He was the son of Gavin Dalzell, 2nd Earl of Carnwath and Margaret Carnegie.
He succeeded to his brother's titles of Earl of Carnwath and Lord Dalzell in June 1683. The titles have a special remainder to heirs male whatsoever bearing the Name and Arms of Dalzell, which means that they can pass to the senior heir outside of the line descending from the first holder the title, should that line become extinct. The heir is merely required to have the surname and Arms of Dalzell. There is not the requirement that the heir be of the body of the original holder.
On Lord Carnwath's death on 7 June 1702, the line of the first Earl became extinct. The titles were therefore able to pass by virtue of the special remainder through collateral succession to Lord Carnwath's second cousin once removed, Sir Robert Dalzell, 3rd Baronet, the senior heir of the first Lord Dalzell. But for this remainder, only the Lordship would have been inherited and the Earldom would have become extinct.
References
Category:Earls of Carnwath
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Lincoln Art Programme was a curatorial platform established in 2009 and concluded in 2013. The programme focused on working with artists to create new work in Lincolnshire. Using a nomadic framework, without a gallery or static space, the organisation used the county and its various histories, events, communities and evolving landscapes as sites, spaces and starting points.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Lexxi Steele Gets Two Cocks To Fuck Her Pussy
387
|
{
"pile_set_name": "OpenWebText2"
}
| 0.06 |
#442221 +( 1456 )- [X] <the_muss> New Game! add the word "anal" to the beginning of car names. Anal Jamboree, Anal Explorer, Anal Pulsar, Anal Prelude, Anal Adventurer, Anal Legacy, Anal Nexus, Anal Swift
<pyrophoric> lol, Anal Jazz, Anal Ram, Anal Probe
<iuqcaj> Anal Bandit, Anal Forester, Anal Laser, Anal Escort, Anal Sovereign, Anal Beetle, Anal Golf, Anal Samurai
<the_muss> Anal Eclipse, Anal Discovery, Anal Wrangler, Anal Ambassador, Anal Vanquish, Anal Vagrant, Anal Diablo
<pie> Comedy Gold... Anal Trooper
<the_muss> lol
<pyrophoric> lmao
|
{
"pile_set_name": "OpenWebText2"
}
| 0.052158 |
Two Rough Cocks for the Slut
|
{
"pile_set_name": "OpenWebText2"
}
| 0.071429 |
Piss and Cum for the Slut - Part 2
|
{
"pile_set_name": "OpenWebText2"
}
| 0.058824 |
perfect veiw of me fucking my sexy wife
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051282 |
One of the principles of good Haskell, and in general good Typed Functional Programming, is the principle of making invalid states irrepresentable. What does this mean? We use the typesystem to craft types that impose constraints on our data and our state, so that it's impossible to represent these states that should not exist. Now that, at the type level, we managed to banish invalid states, the typesystem will step in and give us trouble every time we try to construct an invalid state. If we can't construct an invalid state, it's very hard for our program to end up in an invalid state, because in order to reach that invalid state the program should have followed a chain of actions that construct the invalid state. But such program would be invalid at the type level, and the typechecker would happily step in and tell us we are doing something wrong. This is great, because the typesystem will happily remember for us the constraints our data has, so we don't have to trust our flaky memory to remember them.
Fortunately, many of the results of this technique can be adapted to other programming languages, and today we are going to experiment with it in Typescript.
A sample problem
Let's work on a sample problem so we can try to understand how we can use this. We are going to constraint a type for a function using Algebraic Data Types, so that we can prevent invalid parameters to it. Our toy problem is as follows:
We have a function that accepts a single parameter: an object with potentially two fields, called field1 and field2 .
and . The object may not have neither of the two fields.
The object may have only field1 , and not field2 .
, and not . Only if the object has field1 , then it can have field2 .
, then it can have . Therefore, an object with field2 , but not field1 , is invalid.
, but not , is invalid. For simplicity, when field1 or field2 exist, they will be of type string , but they could be of any type.
Naive solution
Let's start with the simplest approach. Because both field1 and field2 can exist, or not, we just make them optional.
interface Fields { field1 ? : string ; field2 ? : string ; } ; function receiver ( f : Fields ) { if ( f . field1 === undefined && f . field2 !== undefined ) { throw new Error ( "Oh noes, this should be impossible!" ) ; } }
Unfortunately, this doesn't prevent anything at compile time, and requires checking for that possible error at runtime.
receiver ( { field2 : "Hahaha, I didn't put a field1!" } )
Basic ADT solution
So we called receiver with the wrong fields several times in a row, our application exploded in flames, and we are not happy. Time to do something about it. Let's enumerate the cases again, so that we can see if we can make a type with the right shape:
The object may not have neither of the two fields.
The object may have only field1 , and not field2 .
, and not . Only if the object has field1 , then it can have field2 . Therefore, in this case, the object has both field1 and field2 .
, then it can have . Therefore, in this case, the object has both and . An object with field2 , but not field1 , is invalid.
Let's transcribe this into types:
interface NoFields { } ; interface Field1Only { field1 : string ; } ; interface BothField1AndField2 { field1 : string ; field2 : string ; } ; interface InvalidObject { field2 : string ; } ;
We decided to also include here InvalidObject , but it's a bit silly writing it, because we don't want it to really exist. We may keep it around as documentation, or we may remove it so that to affirm even more that it is not supposed to exist. Now let's write a type for Fields :
type Fields = NoFields | Field1Only | BothField1AndField2 ;
With this disposition, it's harder to send to receiver an InvalidObject :
receiver ( { field2 : "Hahaha, I didn't put a field1!" } ) ;
We also need to tweak the receiver function a little bit, mostly because the fields may not exist now, and the typechecker now requires proof that you are going to read fields that actually exist:
function receiver ( f : Fields ) { if ( "field1" in f ) { if ( "field2" in f ) { } else { } } else { } }
Limitations of structural typing
Unfortunately, for good or for bad, Typescript is a structural type system, and this allows us to bypass some of the safety if we are not careful. The NoFields type (empty object, {} ), in Typescript, means something totally different to what we want it to do. Actually when we write:
interface Foo { field : string ; } ;
Typescript understands that any object with a field of type string is good, except for the case where we create a new object, like:
const myFoo : Foo = { field : "asdf" } ;
But, on assignment, Typescript tests using structural typing, and that means our objects may end with more fields that what we would like them to have:
const getReady = { field : "asdf" , unexpectedField : "hehehe" } ; const myFoo : Foo = getReady ;
So, when we extend this idea to the empty object {} , turns out that on assignment, Typescript will accept any value as long as that value is an object, and has all the fields demanded. Because the type demands no fields, this second condition succeeds trivially for any object , which is totally not what we wanted it to do.
Banning unexpected fields
Let's try to make a type for objects with no fields, so that we actually have to go out of our way to fool the typechecker. We already know never , the type that can never be satisfied. Now we need another ingredient to say "every possible field". And this ingredient is: [key: string]: type . With these two we can construct the object with no fields:
type NoFields = { [ key : string ] : never ; } ;
This type means: this is an object, whose fields are of type never . Because you can't construct a never , there is no way to make valid values for the fields of this object. Therefore, the only solution is an object with no fields. Now, we have to be more deliberate to break the types:
type NoFields = { [ key : string ] : never ; } ; interface Field1Only { field1 : string ; } ; interface BothField1AndField2 { field1 : string ; field2 : string ; } ; type Fields = NoFields | Field1Only | BothField1AndField2 ; const broken = { field2 : "asdf" } ; const bypass1 : { } = broken ; const brokenThroughBypass1 : Fields = bypass1 ; const bypass2 : any = broken ; const brokenThroughBypass2 : Fields = bypass2 ;
It looks like now we need two very specific steps to break the system, so it will be definitely quite harder to do it, and we should notice something wrong if we have to go to such deep ways to construct a program.
Conclusion
Today we saw an approach to the great promise of program correctness through types, applied to a more mainstream language: Typescript. Although Typescript can't promise the same level of safety as Haskell, that doesn't prevent us from applying a few ideas from Haskell to Typescript.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Q:
Get all the objects under one column Parse IOS 8
I need to get all the objects in one Coulomb in parse. say for instance i have class in parse with the coulombs : City, StreetCode , Suburb. Now i want all the objects under City in an array.
The array should add all the objects under City:
Should return Array :City1,City2,City3,City4 etc.
Ive found this code to get all the objects in the Class:
PFQuery *query = [PFQuery queryWithClassName:@"StreetCodes"];
[query findObjectsInBackgroundWithBlock:^(NSArray *objects, NSError *error)
{
if (!error)
{
NSLog(@"%@",allObjects);
// The find succeeded. The first 100 objects are available in objects
} else
{
// Log details of the failure
NSLog(@"Error: %@ %@", error, [error userInfo]);
}
}];
but this code returns :
<StreetCodes: 0x7c1d76e0, objectId: dpFuJgeRnB, localId: (null)> {\n City = KWANOBUHLE;\n StreetCode = 6242;\n Suburb = \"10TH AVENUE\";\n}",
"<StreetCodes: 0x7c638020, objectId: OE9MtOGpVd, localId: (null)> {\n City = KWANOBUHLE;\n StreetCode = 6242;\n Suburb = \"1ST AVENUE\";\n}",
"<StreetCodes: 0x7c1cf970, objectId: 16TMG5V3jS, localId: (null)> {\n City = DURBAN;\n StreetCode = 4091;\n Suburb = \"45TH CUTTING\";\n}",
"<StreetCodes: 0x7c1c1dd0, objectId: 0Vk6oav0Zt, localId: (null)> {\n City = RIVERSDALE;\n StreetCode = 6670;\n Suburb = AALWYNFLEUR;\n}",
"<StreetCodes: 0x7c1db4e0, objectId: EVYUUWzTB7, localId: (null)> {\n City = BLOEMFONTEIN;\n StreetCode = 9301;\n Suburb = AANDRUS;
This returns all the objects in the class witch is added into the array .
How do I use this ? Because I just want the City Coulomb objects.
Please help or provide me with some sample code
A:
Use PFQuery's selectKeys will limit the query to only retrieving your city data:
[query selectKeys:@[@"City"]];
I think that's not what you want though. You need to run the array of returned objects plucking the City from them:
if (!error)
{
NSMutableArray* array = [NSMutableArray arrayWithCapacity:objects.count]; // make an array to hold the cities
for(PFObject* obj in objects) {
[array addObject:[obj objectForKey:"@City"]];
}
// etc.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Sexy Exile Ignemis Demo
Share:
- Hot hentai whore succumbs to bondage, and you get to fuck her ass with a dick or dildo. The hentai bitch has her mouth gagged, and her big boobs get swollen as the nipple clamps stimulate her tits.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.056034 |
9 people shot at Brooklyn house party
Chat with us in Facebook Messenger. Find out what's happening in the world as it unfolds.
Nine people were shot in the East Flatbush neighborhood of Brooklyn early Sunday morning at a house party, police said.
Story highlights
Nine sent to hospitals with injuries; two remain in hospital in stable condition
The early Sunday morning shootings happened in East Flatbush
Number of shooters is unknown; hunt for suspects continues
Nine people were shot in the East Flatbush neighborhood of Brooklyn early Sunday morning at a house party, police said.
Four men and five women -- all younger than 45 -- sustained injuries and were transported to four hospitals. Seven patients were released; two remain in the hospital and are in stable condition. The injuries were not life-threatening, according to New York police officer Sophia Tassy-Mason.
Police said the shooting at East 52nd Street began around 1 a.m. A neighbor, who lives nearby, told CNN affiliate WCBS that she heard a series of gunshots.
The neighborhood is a mix of residential and commercial buildings, Tassy-Mason said. According to NYPD statistics, there have been 21 shooting incidents reported in the area this year.
The number of shooters involved is still unknown, and police are searching for one or more suspects, Tassy-Mason said.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Whore Mom Jerking At Home With Anal Vibrator In Her Bum Amateur Filthy Milf
|
{
"pile_set_name": "OpenWebText2"
}
| 0.053333 |
Q:
Count the number of different characters in the first 150 characters of two cells
I have two pieces of text in cells A2 and B2 which I want to check to see if the first 150 characters match and the last 150 characters match. If the two do not match then is there a way to get a count of the number of characters that are different between those initial 150 characters that were compared.
Example of cells and the formulas I have currently
A:
To get the count of mismatch in the first 150:
=SUMPRODUCT(--(MID(A2,ROW($1:$150),1)<>MID(B2,ROW($1:$150),1)))
In the last 150:
=SUMPRODUCT(--(MID(A2,LEN(A2) + 1 - ROW($1:$150),1)<>MID(B2,LEN(B2) + 1 - ROW($1:$150),1)))
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Thermoconvectional phenomena induced by vibrations in supercritical SF6 under weightlessness.
The effect of a linear harmonic vibration on heat propagation is investigated in near-critical SF6 under weightlessness conditions in space. Heat was issued from a pointlike source (thermistor), a situation representative of an industrial use of pressurized supercritical fluid storage. Two kinds of vibrations were used, large amplitude (64 mm) at 0.2 Hz and low amplitude (0.8 mm) at 1.6 Hz, with temperatures from 5 K to 20 mK from the critical temperature. The vibrations are seen to strongly affect the evolution and shape of the hot boundary layer (HBL), the heat exchange between the heat source and the fluid, and the bulk thermalization process by the adiabatic piston-effect process. The HBL is initially convected as symmetrical plumes over a distance that only depends on the vibration velocity and which corresponds to a Rayleigh-Bénard-like instability where the vibration acceleration acts as the earth gravity. Then the extremities of the plumes are convected perpendicularly to the direction of oscillation as two "pancakes," a process encountered in the vibrational Rayleigh-Bénard instability. When the vibration velocity is small, only one pancake centered at the hot source is observed. Temperature evolutions of the hot source and the fluid are studied in different locations. Convection flows and adiabatic piston effect compete to determine the thermal dynamics, with the latter being the most efficient near the critical point. The experimental results are compared with a two-dimensional numerical simulation that highlights the similarities and differences between the very compressible van der Waals gas and an ideal gas.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
108 F.2d 283 (1939)
LYNCH
v.
OREGON LUMBER CO. et al.
No. 9116.
Circuit Court of Appeals, Ninth Circuit.
December 19, 1939.
*284 Green & Boesen, B. A. Green, Chris Boesen, and R. K. Powell, all of Portland, Or., for appellant.
E. L. McDougal and Randall S. Jones, both of Portland, Or., for appellees.
Before GARRECHT, HANEY, and HEALY, Circuit Judges.
HANEY, Circuit Judge.
In an action brought by appellant to recover for personal injuries, judgment and verdict were rendered for appellees. Appellant seeks review of the judgment urging only error in the instructions of the court.
Appellant was employed by the company as a "choker setter" in a logging camp belonging to the company. The company was engaged in bringing logs from the woods to a spar tree by means of power-driven donkey engines. The spar tree was on the top of a hill. The logs were then hauled from a pile at that point some seven hundred feet to a loading landing by means of a tractor which normally hauled five or six logs at a time. Appellant placed chokers on the logs in the pile, and one Harpell then hooked them on to the tractor. On one trip two loose logs were carried on top of the logs attached to the tractor for a distance of fifty to eighty feet where they rolled off the other logs. When they came to rest the logs were not quite parallel. The ends of the logs farthest uphill were from five to eight feet apart, but the other ends were crossed. Both logs were about forty feet long, the upper log having a larger diameter than the lower. When appellant attempted to place a choker on the lower log, the upper one rolled off and struck him, inflicting the injuries of which he complains.
It was alleged that appellees were negligent in the following particulars:
1. In compelling plaintiff to work in and about a place of great danger; that is to say, immediately under a log hanging in the precarious position hereinbefore described.
2. In not securing said upper log before attempting to put the choker around the lower log, so as to prevent the same from falling upon plaintiff in the manner hereinbefore described.
3. In not inspecting said logs before directing plaintiff to put a choker around the same.
4. In dropping said logs and leaving them in the dangerous position hereinbefore described.
5. In failing and neglecting to employ for said operation a "rigging slinger", or other supervising employe, to direct and supervise the detailed work of the plaintiff, and his fellow-workmen, and to inspect, discover and correct the dangerous and hazardous conditions, as hereinbefore described, likely to injure said plaintiff and other employes.
A sixth charge, in general, covered all the foregoing particulars.
The evidence was agreed that Harpell was appellant's immediate superior; that the lower ends of the two loose logs did not touch the ground at that point; and *285 that if the end of one loose log was on the end of the other loose log, the latter could not have been "choked" from the end. Evidence that there was "lots of loose chunks and limbs" and loose dirt at the stump where the accident occurred, was not controverted.
Appellant's version of the accident was that as the tractor started for the loading landing, one log attached to the tractor "hung up" on a stump, and at that point the two loose logs rolled off the others; that the log which had "hung up" was then disconnected, and Harpell called to appellant telling him to bring two chokers; that Harpell took one choker and choked the top log and told appellant to "snare" the lower log; that he could not choke the lower log from the end because the end of the upper log rested on the end of the lower log; that he could not choke the lower log from the side opposite to the one used, because the log which had "hung up" prevented it; and that the ends of all three logs did not extend beyond the stump. Harpell, testifying for appellee, admitted he called for two chokers, denied that he had told appellant to choke the lower log, saying that he "left him to use his own judgment in getting them on there", and denied that he choked the upper log before the accident. He testified that the ends of the logs extended beyond the stump about four feet; that there were only two logs there, and that appellant could have choked the lower log from the side opposite to the one used.
Witnesses Olds and Boardwell testified for appellee that they were working near the spar tree; that they did not see the accident when it happened, but went to the stump immediately after it happened; that there was no choker on the top log; that appellant could have choked the log from the side opposite to the one he used; and that the ends of the logs extended beyond the stump about four feet. Olds agreed with appellant that there were three logs at the stump, a point concerning which Boardwell did not testify.
Appellant further testified that he did not wait for the tractor to pull the top log off the other, because the "camp boss" had given orders to have the chokers set so that the tractor would not be delayed upon its return from the landing. The "camp boss" testified that the orders were "to set as many chokers as possible, where safe". Harpell testified that his "understanding was that that equipment was to be kept rolling on that job".
Finally, appellant testified that "When I looked at this log before I went under, it looked perfectly safe to me" and
"Q. Now, did you do anything to the log, touch it or anything, before you went under it? A. I put my hand up on it and it looked comparatively solid."
The trial court instructed the jury that his instructions as to the law were final and binding, and
"On the other hand, I have the power to suggest to you what my idea is as to the determination of the questions of fact. I can sum up the evidence in the case and give you an idea. I do not intend to do that, gentlemen, because you are competent judges of the weight and value of the evidence. I want to give you a caution in that regard, that insofar as I have given any idea of what I think about the weight or value of the evidence or credibility of witnesses, that you are not bound by that, any more than you are by the suggestions made to you by counsel. You are the sole and exclusive judges of the facts in this case, and even though you may have some idea as to how I might determine the case if it were left up to me, it is your duty to decide it according to your own lights and you need not follow me in any suggestion of the way I would determine the matters of fact in the case. That is your exclusive duty, gentlemen.
"With that introduction, gentlemen, I will now proceed to talk about the legal basis of this case. * * *"
Thereafter a number of instructions, which will be hereafter considered, were given to which exceptions were taken by appellant. The jury returned a verdict for appellees, and this appeal was taken from the judgment rendered thereon.
Before considering the specific questions raised, we advert to one contention made by appellees to the effect that the burden is on appellant to show both error and prejudice. Appellees rely on Berger v. United States, 295 U.S. 78, 82, 55 S.Ct. 629, 79 L.Ed. 1314, and Valley Shoe Corporation v. Stout, 8 Cir., 98 F.2d 514, 520, which is based on the former.
Prior to February 26, 1919, the established rule was that the burden was on appellant to show error, and that error, shown, was presumed to be prejudicial unless the contrary was affirmatively shown by the record. Crawford v. United States, 212 U.S. 183, 203, 29 S.Ct. 260, 53 L.Ed. 465, 15 Ann.Cas. 392; Fillippon v. Albion *286 Vein Slate Co., 250 U.S. 76, 82, 39 S.Ct. 435, 63 L.Ed. 853. The Act of February 26, 1919, Ch. 48, 40 Stat. 1181, 28 U.S.C.A. § 391, amended § 269 of the Judicial Code by adding the sentence to the effect that an appellate court should give judgment after an examination of the entire record "without regard to technical errors, defects, or exceptions which do not affect the substantial rights of the parties". On October 5, 1920, it was held that the amendment changed the previous rule and required appellant to show both error and prejudice (Haywood v. United States, 7 Cir., 268 F. 795, 798), and that decision was followed in other circuits.
On January 4, 1926, the Supreme Court said in United States v. River Rouge Co., 269 U.S. 411, 421, 46 S.Ct. 144, 148, 70 L. Ed. 339, that it would "not enter upon a discussion of the divergent views which have been expressed in various Circuit Courts of Appeals as to the effect of the Act of 1919", and held that the amendment had not changed the rule that a presumption of prejudice arose upon a showing of error. That case was followed in Williams v. Great Southern Lumber Co., 277 U.S. 19, 26, 48 S.Ct. 417, 72 L.Ed. 761. This court, on January 7, 1935, held to the contrary, in McCandless v. United States, 9 Cir., 74 F.2d 596, 602, and the rule thus stated seemed to have the approval of the Supreme Court in Berger v. United States, 295 U.S. 78, 82, 55 S.Ct. 629, 79 L.Ed. 1314, decided on the following April 15th. Thereafter, certiorari was granted in McCandless v. United States, supra (296 U.S. 570, 56 S.Ct. 308, 80 L.Ed. 403), and the judgment of this court was reversed without reference to Berger v. United States, supra. McCandless v. United States, 298 U.S. 342, 347, 56 S.Ct. 764, 80 L.Ed. 1205.
Since McCandless v. United States, 298 U.S. 342, 347, 56 S.Ct. 764, 766, 80 L.Ed. 1205, is latest in time, it must be taken as overruling Berger v. United States, supra, and as establishing the rule that if error is shown, then there should be reversal "unless it affirmatively appears from the whole record that it was not prejudicial".
The court below instructed the jury as to some general rules before instructions were given as to specific rules governing liability. Among them was an instruction regarding "unavoidable accidents" which was followed by this instruction:
"There is a situation which I shall suggest to you, and that is that the plaintiff in this case testified that before he attempted to choke this log he put his hand upon it and it seemed firm to him, or apparently `comparatively', I think, was the word he used. You will remember that testimony. I am not trying to quote it just exactly, but you will remember his testimony. Now, if that is the situation, gentlemen, it might be that the accident then was without fault of any kind. It has not been outlined in the testimony or the evidence in this case as to why this log fell, and I think that any inference that is drawn as to why the log fell is pure speculation, because I do not think that the evidence outlines any situation from which you could determine what was the cause of the fall of the log." [Italics supplied].
Appellant contends that the portion of the instruction italicized was erroneous because the evidence shows that the log fell because of its precarious position; that although no exception was taken to the instruction, this court should notice the error as a "plain error" unassigned pursuant to our Rule 11.
In the first place the part of our former Rule 11 relating to "plain" errors, is not to be found in our revised rules effective December 19, 1938, as amended. See Rule 20 (2) (d). Secondly, the difficulty is not cured by considering that we have such a rule, because Rule 51 of the Federal Rules of Civil Procedure, 28 U.S.C.A. following section 723c, provides in part that "No party may assign as error the giving or the failure to give an instruction unless he objects thereto before the jury retires to consider its verdict, stating distinctly the matter to which he objects and the grounds of his objection."
The first charge of negligence was to the effect that it was negligence for the company to compel appellant to work under a log in the precarious position of the one which struck appellant. The court, regarding that charge, mentioned the conflict in the evidence to the jury as to whether appellant had been ordered to choke the lower log, and if so whether it should be implied that appellant was to go under the log to do so. The court then stated that the Oregon Employers' Liability Act, conceded to be applicable here, did not require the employer to supervise each detail of the work, and "* * * Also into that question enters the suggestion which I made to you a while ago that the plaintiff himself apparently considered that the *287 place was not one of great danger himself. If that were the situation he could hardly charge negligence to the defendant for not knowing that the place was dangerous when the plaintiff himself did not think it was."
Appellant contends that the quoted instruction was erroneous because it applied as a test the thought or belief of the appellant, and not the correct test as set forth in the statutes mentioned. Appellees contend that such instruction was not an instruction of law, but a comment on the evidence, which was within the discretion of the court, and that the effect of the instruction was that in the court's opinion it was doubtful that the evidence disclosed negligence.
Ore.Code Ann. § 49-1701 provides in part: "* * * all owners, contractors or subcontractors and other persons having charge of, or responsible for, any work involving a risk or danger to the employees or the public, shall use every device, care and precaution which it is practicable to use for the protection and safety of life and limb * * *." The following section provides: "The manager, superintendent, foreman or other person in charge or control of the construction or works or operation, or any part thereof, shall be held to be the agent of the employer in all suits for damages for death or injury suffered by an employee." As specified in the statute, the employer must use every "care and precaution which it is practicable to use for the protection and safety of life and limb".
Many, if not most injuries occur when employees believe danger is not present. Few employees would deliberately invite an injury. The employee's belief as to danger is immaterial except insofar as it is some evidence as to whether a reasonable man would have done no more than the employer did in view of the high degree of care required. To justify the instruction on the ground that the employer is not compelled to supervise every detail (see Van Norden v. Chas. R. McCormick Lumber Co., 9 Cir., 17 F.2d 568, 569) is to ignore the evidence of appellant that Harpell did supervise the particular detail by directing him to choke the lower log. If the instruction was one of law, we think it should not have been given.
It is clear that the trial court abandoned its previously expressed intention that no "idea" would be given as to its opinion of the facts, if the questioned instruction is considered to be a comment on the evidence. We see no reason for deciding whether the instruction was one of law or merely a comment on the evidence, because if the latter, it is condemned by Tracy v. Swartwout, 35 U.S. 801, 10 Pet. 80, 94, 95, 9 L.Ed. 354, where it is said: "* * * A court may not only present the facts proved, in their charge to the jury; but give their opinion as to those facts, for the consideration of the jury. But, as the jurors are the triers of facts, such an expression of opinion by the court should be so guarded as to leave the jury free in the exercise of their own judgments. They should be made distinctly to understand, that the instruction was not given as a point of law, by which they were to be governed; but as a mere opinion, as to the facts, and to which they should give no more weight than it was entitled to. * * *" [Italics supplied.] See also: Starr v. United States, 153 U.S. 614, 625, 14 S.Ct. 919, 38 L.Ed. 841. In view of the fact that the influence of the trial court is necessarily "of great weight" we should guard against possible error in its use. We think that the nature of the instruction (if considered as a comment on the evidence) was not "distinctly" stated.
After relating appellant's second charge of negligence, the trial court then stated: "Of course, in that charge, gentlemen, also appears the question of whether it looked dangerous to him. If it was obvious that the upper log should have been secured, why, then the company might have been guilty of negligence in failing to secure it, but the question is whether in the general supervision of this work, without regard to detail of a particular situation in which an experienced woodsman was engaged, the company did neglect every device, care and precaution." This instruction clearly illustrates a lack of separation between law and fact. The part beginning with the word "but" deals with matters of law. The preceding part of the sentence, if an instruction of law, is we think, erroneous, and if a comment on the evidence, it appears in the same sentence containing matters of law. Again, there is a lack of distinctness.
The court then quoted the third charge of negligence, and then stated: "Again we have the same situation, that the plaintiff himself inspected the log and came to the conclusion that it was not dangerous. It *288 is doubtful if he can charge to the defendant a failure to inspect." This instruction is subject to the same vice as the two preceding instructions.
The judgment is reversed and the cause is remanded for a new trial.
|
{
"pile_set_name": "FreeLaw"
}
| 0 |
xx
x
xx
x
x
|
{
"pile_set_name": "Github"
}
| 0.166667 |
---
layout: default
title: Release 5.1.0
---
JHipster release v5.1.0
==================
JHipster v5.1.0 comes with 29 closed tickets and pull requests. This is a minor release as it has a couple of important changes:
- Upgrade to JHipster Registry v4.0.0. This is a major release of the Registry, with a simple but very important configuration change, see [jhipster/jhipster-registry#282](https://github.com/jhipster/jhipster-registry/pull/282). This comes from a change in Spring Cloud, that made it impossible to modify the default JWT secret token if you used the `native` profile, which is of course a major issue.
- Fix failing Angular production builds with more than one lazy loading module, see [#7949](https://github.com/jhipster/generator-jhipster/pull/7949).
Closed tickets and merged pull requests
------------
As always, __[you can check all closed tickets and merged pull requests here](https://github.com/jhipster/generator-jhipster/issues?q=milestone%3A5.1.0+is%3Aclosed)__.
How to upgrade
------------
**Automatic upgrade**
For an automatic upgrade, use the [JHipster upgrade sub-generator]({{ site.url }}/upgrading-an-application/) on an existing application:
Upgrade your version of JHipster:
```
yarn global upgrade generator-jhipster
```
And then run the upgrade sub-generator:
```
jhipster upgrade
```
**Manual upgrades**
For a manual upgrade, first upgrade your version of JHipster with:
```
yarn global upgrade generator-jhipster
```
If you have an existing project, it will still use the JHipster version with which it was generated.
To upgrade your project, you must first delete its `node_modules` folder and then run:
```
jhipster
```
You can also update your project and all its entities by running
```
jhipster --with-entities
```
You can also update your entities one-by-one by running again the entity sub-generator, for example if your entity is named _Foo_
```
jhipster entity Foo
```
Help and bugs
--------------
If you find any issue with this release, don't hesitate to:
- Add a bug on our [bug tracker](https://github.com/jhipster/generator-jhipster/issues?state=open)
- Post a question on [Stack Overflow](http://stackoverflow.com/tags/jhipster/info)
If the issue you have is an urgent bug or security issue, please:
- Contact [@jhipster](https://twitter.com/jhipster) on Twitter
|
{
"pile_set_name": "Github"
}
| 0 |
Principals and teachers fear they are headed down a path of privatisation by stealth, after Victoria signed a contentious deal to enhance Tony Abbott's push to create 1500 "independent public schools" by 2017.
Schools will get access to extra funds if they become more autonomous; parent-based councils could get new powers to select principals and acquire property; and administrative work in small schools will be increasingly outsourced as part of the $16 million agreement.
State schools face possible privatisation by stealth. Credit:Louie Douvis
The changes form part of the federal government's plan to entice at least one-quarter of Australian public schools to become more "independent" over the next three years.
Unlike Western Australia, where the idea was pioneered, Victorian schools opting into the program will not be rebadged as "independent public schools", but will still get access to the money if they adhere to targeted activities designed to make them self-govern and be more accountable for their results.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
f4 f8
xxx zzz
f4 f8
xxx zzz
|
{
"pile_set_name": "Github"
}
| 0.071429 |
MILF Tits - This is a real MILF mom showing off her tits.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.070175 |
Main Road (St. Marys, Georgia)
The Main Road, also known as Grand Avenue and as Stafford Road, on Cumberland Island in Cumberland Island National Seashore near St. Marys, Georgia was built in 1870. It was listed on the National Register of Historic Places in 1984.
It is about long and about eight to ten feet wide. Portions existed by 1802; it was complete by 1870.
References
Category:National Register of Historic Places in Georgia (U.S. state)
Category:Buildings and structures completed in 1870
Category:National Register of Historic Places in Camden County, Georgia
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Q:
How to find current page number in EXTJS4 grid
I have an EXTJS paging grid with checkbox selection model. I want to know what page user is currently viewing.
I believe I can find the current page number if I can get the instance of pagingtoolbar.
I am adding code for my grid.
var searchGrid = Ext.create('Ext.grid.Panel', {
width: 430,
height: 200,
selModel: sm,
title: 'Search Results',
autoScroll: true,
scroll:'vertical',
store: gridStore,
loadMask: true,
viewConfig: {
id: 'gv',
trackOver: false,
stripeRows: false
}, columns:[
{
text: "Link name",
dataIndex: 'name',
width: 200,
align: 'left',
sortable: true
}],
},
dockedItems: [{
xtype: 'pagingtoolbar',
store: gridStore, // same store GridPanel is using
dock: 'bottom',
displayInfo: true,
listeners:{
change : function( paging, pageData, options ){
for(var i=0;i<selectedRows.length;i++){
var record = searchGrid.store.getById(selectedRows[i]);
if(record)
searchGrid.getSelectionModel().select(record,true,false);
}
return true;
}
}
}]
});
A:
You can get that from gridStore.currentPage.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Hey guys. I’m happy to finally confirm our livestreaming schedule for the highly anticipated Devil May Cry 4 Special Edition. We will be streaming weekly for five weeks, focusing on one of the five playable characters each stream.
The first stream will be held tomorrow, Wednesday, April 29th, from 4pm PT on our Twitch channel . We will be showing Vergil gameplay, so bring your Vergil-related questions, comments, and one-liners.
Upcoming Streams
(NOTE: Schedule may be subject to change.)
4/29 – Vergil
5/6 – Trish
5/13 – Lady
5/20 – Dante
5/27 – Nero
All streams are scheduled for 4pm PT. Hope to see you guys there.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Penis on pussy porn
Posted on by Bronson
Cock going in and out of pussy camera view gif. Close up view of teen pussy fucked by huge cock! Ass Butt Petite teen wench can't wait Alone Big It took some time, but Ira's Amateur Fuck Hard Penis. From dick to pussy.
Close Up Cumshots Ejaculation.
Results for : big dick in pussy
Cumming in pussy underwater. The site is in full compliance with 18 USC Section Going to wreck your pussy. Blond Dick Sucking cock is one of Ass Ebony Huge Dick. Huge cock stretches pussy. Her pussy caused a creampie explosion.
|
{
"pile_set_name": "Pile-CC"
}
| 0.05045 |
A blog launched on the 41st anniversary of the Society for the Protection of Unborn Children (SPUC), the first pro-life organisation in the world, established on 11 January 1967. SPUC has been a leader in the educational and political battle against abortion, human embryo experimentation and euthanasia since then. I write this blog in my role as SPUC's chief executive, commenting on pro-life news, reflecting on pro-life issues and promoting SPUC's work.
Tuesday, 23 June 2009
The euphemisms of euthanasia
I am grateful to Anthony Ozimic, SPUC's communications manager, for his reflections on the news that the Voluntary Euthanasia Society (VES), rebranding itself Dignity in Dying, now claims that does not campaign for euthanasia or suicide. Anthony writes:
"[W]e campaign for the choice of assisted dying for the terminally ill within strict safeguards. Not euthanasia. Not suicide ... but the choice of assistance to die for those who are suffering, competent to make the decision and are already dying."
In recent years, the VES' strategy has been to narrow its campaigning targets and soft-soap its public face, in order to allay opposition and thereby get some movement towards the legalisation of assisted suicide and euthanasia. That is the real reason why the VES now calls itself Dignity in Dying, not because it no longer supports euthanasia. The VES' name-change mirrors the name-change of the Hemlock Society in America to "Compassion and Choices".
The duplicity of the VES campaign is further seen in their support of Debbie Purdy's legal challenge. Mrs Purdy's stated aim is to find out how likely it is that her husband will be prosecuted if he assists her to travel to Dignitas in Switzerland. The VES claims that she "would like the option of an assisted death should her suffering become unbearable". Mrs Purdy herself is more explicit:
"Since the 1961 Suicide Act was introduced we have legalised homosexuality and abortion without making them compulsory. We need to look at the law on assisted suicide again and think about how that could be legalised too with proper safeguards in place." [AO: my emphasis]
And Mrs Purdy, who has multiple sclerosis, is not dying, as multiple sclerosis is not a terminal illness. So why is the VES - which has declared that "assisting non-terminally ill adults to die is wrong" - supporting her case? The immediate reason is that the VES is using the case as a lever for the legalisation in the UK of assisted suicide and euthanasia, for both terminally-ill and non-terminally ill persons. The truth of this immediate reason is confirmed by the VES' boast that that it was "involved in drafting the Mental Capacity Act 2005", which enshrined in English law euthanasia by neglect of non-dying, non-competent and non-consenting adults.
The deeper reason for the VES's support for Mrs Purdy's case (and for euthanasia generally) is only hinted at by Mrs Purdy's analogy with legal abortion, but made more explicit in the words and person of Sarah Wootton herself. In her Guardian piece Ms Wootton has described the opposition to so-called assisted dying as "the anti-choice lobby". Dig a bit deeper elsewhere and one discovers that, before coming to the VES, Ms Wootton worked for the pro-abortion Family Planning Association (FPA) and was a founding trustee of Abortion Rights.
So now we know exactly where we are - in the dark world of anti-life euphemism, the hall of smoke and mirrors where unborn babies are re-labelled "products of conception" and killing them is called "terminating an unwanted pregnancy".
Sign up for email alerts
John Smeaton
About me
I became involved in SPUC after graduating, when I established a branch in south London in 1974. I have worked full-time for SPUC for 33 years. I became director of SPUC in the UK in 1996, having been general secretary since 1978. I was elected vice-president of International Right to Life Federation in 2005. At UN conferences in Cairo, Copenhagen, Beijing, Istanbul and Rome, I helped coordinate more than 150 pro-life/pro-family groups resulting in pro-life victories in Cairo, Istanbul and Rome. I was educated at Salesian College, London, before going to Oxford where I graduated in English Language and Literature. I qualified as a teacher, becoming head of English at a secondary school. I am married to Josephine. We have a grown-up family and we live in north London.
Acknowledgement
I am grateful to SPUC's staff, supporters and advisers for their help to me in researching, writing and producing this blog.
Twitter @spucprolife
Like SPUC's Page on Facebook
Images
I believe that I am allowed to use the images accompanying my blog and that they are licence- and royalty-free. However if the owner or the licensor disagrees, please contact me and I will remove it immediately.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
<head>
<title>CSS Test: Line-height using points with a minimum plus one value, 1pt</title>
<link rel="author" title="Microsoft" href="http://www.microsoft.com/" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#propdef-line-height" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#leading" />
<meta name="flags" content="96dpi ahem" />
<meta name="assert" content="The 'line-height' property sets a minimum plus one length value in points." />
<style type="text/css">
</style>
</head>
<body>
<p>Fontsize: 20pt</p>
<p style="FONT-SIZE: 20pt">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 90pt</p>
<p style="line-height: 90pt">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
</body>
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
</html>
|
{
"pile_set_name": "Github"
}
| 0.053248 |
Man filmed hiring hit man to kill girlfriend’s husband
PETERSBURG, Va. – A Petersburg man plead guilty to two counts of solicitation of capital murder.
Shannon Crane attempted to hire a hit man to kill two people last year, according to Senior Assistant Petersburg Commonwealth’s Attorney Kenneth Blalock.
In video used as evidence, Crane met up with someone who he thought was a hit man at a Petersburg Hardee’s. That meeting happened in November.
Blalock said Crane wanted to hire someone to kill both his girlfriend’s husband and his niece’s boyfriend. When someone got word of the plan, they tipped off police and an undercover officer started communicating with Crane.
“During the course of those conversations that the police recorded, Mr. Crane talked about how he wanted people killed,” Blalock said.
Shannon Crane (PHOTO: Petersburg Police)
In the video recorded by the undercover officer, you can hear Crane go into graphic detail.
“I want you to put him in so much f***ing pain that he’s never felt before,” Crane said.
Crane also described how he wanted one of the men killed.
“I want you to take something, literally every teeth, tooth in his mouth,” he said.
Crane can also be heard offering the undercover officer $1,000 for each person he wanted killed.
“Whether I gotta send it by mail or you want me to meet someone else, whatever, then I’ll meet them and give you the money,” he said.
Crane was arrested the same day the video was recorded.
“I never thought someone so close to me could have planned something like that,” neighbor Danyel Clampit said.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
VIEWS: 6246
Cute Amateur Cock Sucker
Black and white cocks using white sexy slut as a cum bucket!
|
{
"pile_set_name": "OpenWebText2"
}
| 0.050505 |
Bisexual Gotta Fuck Him!
How far are you willing to go to fuck me? You have to suck some dick to fuck me! Do you love cum? You're going to! Is my pussy tighter than his ass? Does my pussy taste better than his cock? Take a dick in your ass, then fuck me!
|
{
"pile_set_name": "Pile-CC"
}
| 0.05098 |
In May, it will be 5 years since my breast cancer diagnosis. My tumor was 2.5cm, ductal, 6 nodes positive and hormone receptive. I went through 6 months of chemo, radiation and I am now on Tamoxifen. All my bone scans, MRI's, chest x-rays and mammograms have been normal. I just had a routine blood test - CA 27.29. My level is elevated to 84, normal is 0-34. My question is, can certain medications elevate my level? I am on Zoloft, Corgard, Aciphex, tamoxifen and foricet. This the first time I have had this test, so I don't know if this has been my level this whole time, or if my level would be high simply because I have had breast cancer. My oncologist is gone until next week and I am trying to get as much info as possible.
Dear hollidol, CA27.29 is a nonspecific marker for breast cancer. The use of CA27.29 to detect breast cancer recurrence at present is controversial. Increased levels could be due to a variety of reasons such as - ovarian cysts, uterine fibroids, intestinal or colonic problems, hepatitis, tuberculosis, systemic lupus or medications such as Paxil. Regarding your specific medications I do not have any information as to whether they would specifically cause an elevation.
It is impossible to draw any conclusions based on the results of this one test.
I was diagnosed in February 1999 with breast cancer. The ductile tumor was very small and estrogen sensitive. I had lympth node mapping prior to the lumpectomy to locate the sentinel node. The sentinel node and two others were removed and tested negative. The lumpectomy specimen was not clean at the periphery so the lumpectomy was followed by a mastectomy. My surgeon was not even going to send me to an oncologist but changed his mind at the last minute. The oncologist put me on taxoxifen 20 mg a day and I've been on it since. I just saw him in February, and two weeks after the visit, he called to say my CA 27-29 was elevated from the last time (last time was 33.8) and was 53.9. Do not be alarmed says he. Many times this means nothing. He wanted to retest and ordered a CAT scan of the chest and abdomen. I redid the blood test and it came back 62. I don't know the results of the CAT SCAN yet. However, the physician's assistant called the other day to give me the results of the retest and her version of this was that "frankly, it's not good news." She also stated that one of the first CA 27-29's had when I first came to see this doctor was 19. I got the distinct feeling from her that I'm doomed. Here's the question: What is the range for CA 27-29. What could be causing it to rise. Could it be the tamoxifin? And when does the red flag go up with regard to an increase in the reading. Should someone have noticed that it went from 19 to 33 to 53?
I had a mastectomy with chemo 1995-1996. I went off tamoxifen 8-2001 and the 27-29 stated to rise. It reached in the 60s> I had all sorts of scan and finally a PET scan and it showed nothing. I was put on arimidex. 2002 the marker went from 65 - 57 - 74 - 75 and last week it was 100. I just had a negative bone scan and having a PET tomorrow. I feel fine! I sought a second opinion. This oncologist who is well known in my area said he does not do markers after 5 years and goes entirely how the person feels. He believes there is no difference in survival time from an early diagnosis to symptoms. Many doctors do not do markers. I will keep you posted on the results of my PET. I know the anxiety you are going thru and the living 3 months at a time.
Thanks for your info. I saw my oncologist and he feels that the 27.29 test is a non-specific test. Because all my other scans and x-rays are negitive, he feels that my health is fine. He doesn't feel a PET scan is necessary. I will repeat the blood test in 2 months. He also said that the 27.29 test can be elevated for many reasons. It could be from medication, an infection etc, so he re-assured me that one blood test doesn't mean a recurrence. Holly
Where is the information that caffeine raises 27-29 level? How much coffee will do this. I have not heard from doc and so assume my pet and bone scan were ok. This is interesting as I drink a lot of coffee usually prior to test.
I haven't heard of caffine causing a rise in CA27.29 either. I don't drink a lot of coffee, but I do drink some. I had a repeat of my blood test and it is down 2 points. I am still having a repeat in two months. I am going to relax and not worry about this elevated test. My doctors assures me that there are many reasons for this test to have elevated levels. As long as all my other tests are negative, I will be comfortable knowing that at this point, I am fine.
my saga goes on. Bone scan was negative. Pet scan showed some small activity in sacral area but the cat done at the same time together showed nothing. It was the new cat/pet scanner. So now I have to have an Mri to decide. He also wanted to change my med from arimidex to aromasin. I feel fine. Will keep in touch.
The Content on this Site is presented in a summary fashion, and is intended to be used for educational and entertainment purposes only. It is not intended to be and should not be interpreted as medical advice or a diagnosis of any health or fitness problem, condition or disease; or a recommendation for a specific test, doctor, care provider, procedure, treatment plan, product, or course of action. Med Help International, Inc. is not a medical or healthcare provider and your use of this Site does not create a doctor / patient relationship. We disclaim all responsibility for the professional qualifications and licensing of, and services provided by, any physician or other health providers posting on or otherwise referred to on this Site and/or any Third Party Site. Never disregard the medical advice of your physician or health professional, or delay in seeking such advice, because of something you read on this Site. We offer this Site AS IS and without any warranties. By using this Site you agree to the following Terms and Conditions. If you think you may have a medical emergency, call your physician or 911 immediately.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
09:01
I want you to Fuck me in the Ass
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051282 |
Pic du Midi
Pic du Midi or Pic-du-Midi may refer to:
20488 Pic-du-Midi, a main-belt asteroid
Pic du Midi Observatory, astronomical observatory
Pic du Midi de Bigorre, a mountain in the French Pyrenees famous for its astronomical observatory.
Pic du Midi d'Ossau, another mountain in the French Pyrenees
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
/*
Copyright 2020 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
/*
Package aksk providers functions for sign http request before request cloud.
*/
package aksk
import (
"bytes"
"crypto/hmac"
"crypto/sha256"
"encoding/hex"
"encoding/json"
"fmt"
"io/ioutil"
"log"
"net/http"
"net/textproto"
"net/url"
"regexp"
"sort"
"strings"
"time"
)
// caseInsencitiveStringArray represents string case insensitive sorting operations
type caseInsencitiveStringArray []string
// noEscape specifies whether the character should be encoded or not
var noEscape [256]bool
func init() {
// refer to https://docs.oracle.com/javase/7/docs/api/java/net/URLEncoder.html
for i := 0; i < len(noEscape); i++ {
noEscape[i] = (i >= 'A' && i <= 'Z') ||
(i >= 'a' && i <= 'z') ||
(i >= '0' && i <= '9') ||
i == '.' ||
i == '-' ||
i == '_' ||
i == '~' //java-sdk-core 3.0.1 HttpUtils.urlEncode
}
}
/*
SignOptions represents the options during signing http request, it is concurrency safely.
Sample code:
client := &http.Client{
Timeout: time.Duration(3 * time.Second),
}
req, err := http.NewRequest("POST", "https://30030113-3657-4fb6-a7ef-90764239b038.apigw.xxx.yyy.com/app1?name=value",bytes.NewBuffer([]byte("demo")))
signOptions := signer.SignOptions{
AccessKey: "------------",
SecretKey: "------------",
}
signer.Sign(req, signOptions)
resp, err := client.Do(req)
*/
type SignOptions struct {
AccessKey string //Access Key
SecretKey string //Secret key
RegionName string // Region name
ServiceName string // Service Name
EnableCacheSignKey bool // Cache sign key for one day or not cache, cache is disabled by default
encodeUrl bool //internal use
SignAlgorithm string //The algorithm used for sign, the default value is "SDK-HMAC-SHA256" if you don't set its value
TimeOffsetInseconds int64 // TimeOffsetInseconds is used for adjust x-sdk-date if set its value
}
// StringBuilder wraps bytes.Buffer to implement a high performance string builder.
type StringBuilder struct {
builder bytes.Buffer //string storage
}
// reqSignParams represents the option values used for signing http request.
type reqSignParams struct {
SignOptions
RequestTime time.Time
Req *http.Request
}
// signKeyCacheEntry represents the cache entry of sign key.
type signKeyCacheEntry struct {
Key []byte // sign key
NumberOfDaysSinceEpoch int64 // number of days since epoch
}
// SignAlgorithmHMACSHA256 The default sign algorithm
const SignAlgorithmHMACSHA256 = "SDK-HMAC-SHA256"
// ContentSha256HeaderKey The header key of content hash value
const ContentSha256HeaderKey = "x-sdk-content-sha256"
// A regular for searching empty string
var spaceRegexp = regexp.MustCompile(`\s+`)
// cache sign key
var cache = NewCache(300)
// Sign manipulates the http.Request instance with some required authentication headers for SK/SK auth.
func Sign(req *http.Request, signOptions SignOptions) {
signOptions.AccessKey = strings.TrimSpace(signOptions.AccessKey)
signOptions.SecretKey = strings.TrimSpace(signOptions.SecretKey)
signOptions.encodeUrl = true
signParams := reqSignParams{
SignOptions: signOptions,
RequestTime: time.Now(),
Req: req,
}
//t, _ := time.Parse(time.RFC3339, "2018-04-15T04:28:22+00:00")
//signParams.RequestTime = t
if signParams.SignAlgorithm == "" {
signParams.SignAlgorithm = SignAlgorithmHMACSHA256
}
addRequiredHeaders(req, signParams.getFormattedSigningDateTime())
contentSha256 := ""
if v, ok := req.Header[textproto.CanonicalMIMEHeaderKey(ContentSha256HeaderKey)]; !ok {
contentSha256 = calculateContentHash(req)
} else {
contentSha256 = v[0]
}
canonicalRequest := createCanonicalRequest(signParams, contentSha256)
/*fmt.Println("canonicalRequest: " + canonicalRequest)
fmt.Println("*****")*/
strToSign := createStringToSign(canonicalRequest, signParams)
signKey := deriveSigningKey(signParams)
signature := computeSignature(strToSign, signKey, signParams.SignAlgorithm)
req.Header.Set("Authorization", buildAuthorizationHeader(signParams, signature))
}
// deriveSigningKey returns a sign key from cache, or build it and insert it into cache
func deriveSigningKey(signParam reqSignParams) []byte {
if signParam.EnableCacheSignKey {
cacheKey := strings.Join([]string{signParam.SecretKey,
signParam.RegionName,
signParam.ServiceName,
}, "-")
cacheData := cache.Get(cacheKey)
if cacheData != "" {
var signKey signKeyCacheEntry
json.Unmarshal([]byte(cacheData), &signKey)
if signKey.NumberOfDaysSinceEpoch == signParam.getDaysSinceEpon() {
return signKey.Key
}
}
signKey := buildSignKey(signParam)
signKeyStr, _ := json.Marshal(signKeyCacheEntry{
Key: signKey,
NumberOfDaysSinceEpoch: signParam.getDaysSinceEpon(),
})
cache.Add(cacheKey, string(signKeyStr))
return signKey
}
return buildSignKey(signParam)
}
func buildSignKey(signParam reqSignParams) []byte {
var kSecret StringBuilder
kSecret.Write("SDK").Write(signParam.SecretKey)
kDate := computeSignature(signParam.getFormattedSigningDate(), kSecret.GetBytes(), signParam.SignAlgorithm)
kRegion := computeSignature(signParam.RegionName, kDate, signParam.SignAlgorithm)
kService := computeSignature(signParam.ServiceName, kRegion, signParam.SignAlgorithm)
return computeSignature("sdk_request", kService, signParam.SignAlgorithm)
}
// HmacSha256 implements the Keyed-Hash Message Authentication Code computation.
func HmacSha256(data string, key []byte) []byte {
mac := hmac.New(sha256.New, key)
mac.Write([]byte(data))
return mac.Sum(nil)
}
// HashSha256 is a wrapper for sha256 implementation.
func HashSha256(msg []byte) []byte {
sh256 := sha256.New()
sh256.Write(msg)
return sh256.Sum(nil)
}
// buildAuthorizationHeader builds the authentication header value
func buildAuthorizationHeader(signParam reqSignParams, signature []byte) string {
var signingCredentials StringBuilder
signingCredentials.Write(signParam.AccessKey).Write("/").Write(signParam.getScope())
credential := "Credential=" + signingCredentials.ToString()
signerHeaders := "SignedHeaders=" + getSignedHeadersString(signParam.Req)
signatureHeader := "Signature=" + hex.EncodeToString(signature)
return signParam.SignAlgorithm + " " + strings.Join([]string{
credential,
signerHeaders,
signatureHeader,
}, ", ")
}
// computeSignature computers the signature with the specified algorithm
// and it only supports SDK-HMAC-SHA256 in currently
func computeSignature(signData string, key []byte, algorithm string) []byte {
if algorithm == SignAlgorithmHMACSHA256 {
return HmacSha256(signData, key)
}
log.Fatalf("Unsupported algorithm %s, please use %s and try again", algorithm, SignAlgorithmHMACSHA256)
return nil
}
// createStringToSign build the need to be signed string
func createStringToSign(canonicalRequest string, signParams reqSignParams) string {
return strings.Join([]string{signParams.SignAlgorithm,
signParams.getFormattedSigningDateTime(),
signParams.getScope(),
hex.EncodeToString(HashSha256([]byte(canonicalRequest))),
}, "\n")
}
// getCanonicalizedResourcePath builds the valid url path for signing
func getCanonicalizedResourcePath(signParas reqSignParams) string {
urlStr := signParas.Req.URL.Path
if !strings.HasPrefix(urlStr, "/") {
urlStr = "/" + urlStr
}
if !strings.HasSuffix(urlStr, "/") {
urlStr = urlStr + "/"
}
if signParas.encodeUrl {
urlStr = urlEncode(urlStr, true)
}
if urlStr == "" {
urlStr = "/"
}
return urlStr
}
// urlEncode encodes url path and url querystring according to the following rules:
// The alphanumeric characters "a" through "z", "A" through "Z" and "0" through "9" remain the same.
//The special characters ".", "-", "*", and "_" remain the same.
//The space character " " is converted into a plus sign "%20".
//All other characters are unsafe and are first converted into one or more bytes using some encoding scheme.
func urlEncode(url string, urlPath bool) string {
var buf bytes.Buffer
for i := 0; i < len(url); i++ {
c := url[i]
if noEscape[c] || (c == '/' && urlPath) {
buf.WriteByte(c)
} else {
fmt.Fprintf(&buf, "%%%02X", c)
}
}
return buf.String()
}
// encodeQueryString build and encode querystring to a string for signing
func encodeQueryString(queryValues url.Values) string {
var encodedVals = make(map[string]string, len(queryValues))
var keys = make([]string, len(queryValues))
i := 0
for k := range queryValues {
keys[i] = urlEncode(k, false)
encodedVals[keys[i]] = k
i++
}
caseInsensitiveSort(keys)
var queryStr StringBuilder
for i, k := range keys {
if i > 0 {
queryStr.Write("&")
}
queryStr.Write(k).Write("=").Write(urlEncode(queryValues.Get(encodedVals[k]), false))
}
return queryStr.ToString()
}
// getCanonicalizedQueryString return empty string if in POST method and content is nil, otherwise returns sorted,encoded querystring
func getCanonicalizedQueryString(signParas reqSignParams) string {
if usePayloadForQueryParameters(signParas.Req) {
return ""
}
return encodeQueryString(signParas.Req.URL.Query())
}
// createCanonicalRequest builds canonical string depends the official document for signing
func createCanonicalRequest(signParas reqSignParams, contentSha256 string) string {
return strings.Join([]string{signParas.Req.Method,
getCanonicalizedResourcePath(signParas),
getCanonicalizedQueryString(signParas),
getCanonicalizedHeaderString(signParas.Req),
getSignedHeadersString(signParas.Req),
contentSha256,
}, "\n")
}
// calculateContentHash computes the content hash value
func calculateContentHash(req *http.Request) string {
encodeParas := ""
//post and content is null use queryString as content -- according to document
if usePayloadForQueryParameters(req) {
encodeParas = req.URL.Query().Encode()
} else {
if req.Body == nil {
encodeParas = ""
} else {
readBody, _ := ioutil.ReadAll(req.Body)
req.Body = ioutil.NopCloser(bytes.NewBuffer(readBody))
encodeParas = string(readBody)
}
}
return hex.EncodeToString(HashSha256([]byte(encodeParas)))
}
// usePayloadForQueryParameters specifies use querystring or not as content for compute content hash
func usePayloadForQueryParameters(req *http.Request) bool {
if strings.ToLower(req.Method) != "post" {
return false
}
return req.Body == nil
}
// getCanonicalizedHeaderString converts header map to a string for signing
func getCanonicalizedHeaderString(req *http.Request) string {
var headers StringBuilder
keys := make([]string, 0)
for k := range req.Header {
keys = append(keys, strings.TrimSpace(k))
}
caseInsensitiveSort(keys)
for _, k := range keys {
k = strings.ToLower(k)
newKey := spaceRegexp.ReplaceAllString(k, " ")
headers.Write(newKey)
headers.Write(":")
val := req.Header.Get(k)
val = spaceRegexp.ReplaceAllString(val, " ")
headers.Write(val)
headers.Write("\n")
}
return headers.ToString()
}
// getSignedHeadersString builds the string for AuthorizationHeader and signing
func getSignedHeadersString(req *http.Request) string {
var headers StringBuilder
keys := make([]string, 0)
for k := range req.Header {
keys = append(keys, strings.TrimSpace(k))
}
caseInsensitiveSort(keys)
for idx, k := range keys {
if idx > 0 {
headers.Write(";")
}
headers.Write(strings.ToLower(k))
}
return headers.ToString()
}
// addRequiredHeaders adds the required heads to http.request instance
func addRequiredHeaders(req *http.Request, timeStr string) {
// golang handls port by default
req.Header.Add("Host", req.URL.Host)
req.Header.Add("X-Sdk-Date", timeStr)
}
func (s caseInsencitiveStringArray) Len() int {
return len(s)
}
func (s caseInsencitiveStringArray) Swap(i, j int) {
s[i], s[j] = s[j], s[i]
}
func (s caseInsencitiveStringArray) Less(i, j int) bool {
return strings.ToLower(s[i]) < strings.ToLower(s[j])
}
func caseInsensitiveSort(strSlice []string) {
sort.Sort(caseInsencitiveStringArray(strSlice))
}
func (signParas *reqSignParams) getSigningDateTimeMilli() int64 {
return (signParas.RequestTime.UTC().Unix() - signParas.TimeOffsetInseconds) * 1000
}
func (signParas *reqSignParams) getSigningDateTime() time.Time {
return time.Unix(signParas.getSigningDateTimeMilli()/1000, 0)
}
func (signParas *reqSignParams) getDaysSinceEpon() int64 {
return signParas.getSigningDateTimeMilli() / 1000 / 3600 / 24
}
func (signParas *reqSignParams) getFormattedSigningDate() string {
return signParas.getSigningDateTime().UTC().Format("20060102")
}
func (signParas *reqSignParams) getFormattedSigningDateTime() string {
return signParas.getSigningDateTime().UTC().Format("20060102T150405Z")
}
func (signParas *reqSignParams) getScope() string {
return strings.Join([]string{signParas.getFormattedSigningDate(),
signParas.RegionName,
signParas.ServiceName,
"sdk_request",
}, "/")
}
// Write ...
func (buff *StringBuilder) Write(s string) *StringBuilder {
buff.builder.WriteString(s)
return buff
}
// ToString ...
func (buff *StringBuilder) ToString() string {
return buff.builder.String()
}
// GetBytes ...
func (buff *StringBuilder) GetBytes() []byte {
return []byte(buff.ToString())
}
|
{
"pile_set_name": "Github"
}
| 0 |
Identification of key odorants responsible for chestnut-like aroma quality of green teas.
A chestnut-like aroma is widely considered an important indicator of an excellent-quality green tea; however, the key odorants responsible for chestnut-like aroma have never been systematically studied and remain unknown. In this study, the aroma components of green teas and Chinese chestnuts were analyzed using comprehensive two-dimensional gas chromatography-time-of-flight mass spectrometry (GC × GC-TOFMS), and 58 compounds were identified as common aroma components among green teas, boiled Chinese chestnuts, roasted Chinese chestnuts and raw Chinese chestnuts. Subsequently, 17 volatiles, including 3-methylbutanal, (E)-3-penten-2-one, ethylbenzene, heptanal, benzaldehyde, 2-pentylfuran, octanal, benzeneacetaldehyde, (E)-2-octenal, (E,E)-3,5-octadien-2-one, linalool, nonanal, (E)-2-nonenal, decanal, (Z)-hex-3-en-1-yl hexanoate, trans-β-ionone and (E)-nerolidol, were identified as the key odorants responsible for chestnut-like aroma based on the odor activity value (OAV) calculation method. Besides, the comparison of OAVs of key odorants between fresh tea leaves and finished teas indicated that all key odorants were present in fresh tea leaves and that their contents increased or decreased during tea processing. Moreover, the comparison between results of OAV and gas chromatography-olfactometry (GC-O) methods showed that ethylbenzene, heptanal, benzaldehyde, 2-pentylfuran, (E,E)-3,5-octadien-2-one, linalool, (Z)-hex-3-en-1-yl hexanoate and trans-β-ionone were the common identified compounds between the two methods. The identification of chestnut-like aroma in green teas will provide a theoretical basis for further research on the directional adjustment and control of tea aroma quality.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Supreme Patriarch of Cambodia
The Supreme Patriarch of Cambodia (; , pronounced ) is the de facto leader of Buddhism in Cambodia.
Titles
The titles for the Cambodian Supreme Patriarchs are derived from Pali. The full official title of the Supreme Patriarch of the Maha Nikaya is Samdech Preah Sumedhādhipati (); sumedhādhipati means 'wise lord'. In letters with King-Father Norodom Sihanouk, the following title is used for the Great Supreme Patriarch Tep Vong: Samdech Preah Agga Mahā Sangharājādhipati (); which is translated as 'foremost great supreme patriarch leader'.
The full official title of the Supreme Patriarch of the Dhammayuttika Nikaya is Samdech Preah Aphiserei Sukonthea Mohasangreacheathipadei (Abhisirī Sugandhā Mahāsangharājādhipati) (). This title means 'Of Higher Merit and Pure Virtue, Great Supreme Patriarch Leader'. In letters with King-Father Sihanouk, an abbreviated title is used in the valediction: Samdech Preah Sangreach ().'
History
Between 1855 and 1981, there were two Supreme Patriarchs in the Kingdom of Cambodia: one for the Cambodian branch of the Thai Dhammayuttika Nikaya order, and one for the Maha Nikaya. In 1981, under the supervision of the Vietnamese-backed People's Republic of Kampuchea, Venerable Tep Vong was elected Supreme Patriarch of a new, unified sangha modelled on the Vietnamese Theravada Buddhist Sangha Congregation.
After the signing of the Paris Peace Accords in 1991, King Norodom Sihanouk appointed Venerable Bour Kry as Supreme Patriarch of Dhammayuttika Nikaya. Today, the two orders are each headed by their own patriarch, unlike in Thailand where only one Supreme Patriarch heads both orders. The Constitution of Cambodia provides a seat on the Royal Council of the Throne to both Supreme Patriarchs, thus giving each a say in the selection of the Cambodian sovereign.
In 2006, Tep Vong was elevated to the status of Great Supreme Patriarch, while Venerable Non Nget was subsequently elevated to Supreme Patriarch of the Maha Nikaya. Tep Vong is the first monk in 150 years to bear the title of Great Supreme Patriarch.
Lists of Cambodian patriarchs
Supreme Patriarch of Maha Nikaya
Supreme Patriarch of Dhammayuttika Nikaya
Head of the Unified Sangha of Cambodia
Supreme Patriarch of Cambodia in exile
Note: In 1988, Maha Ghosananda was elected Supreme Patriarch by a group of exiled monks in Paris. During this same period, Tep Vong held the same office in the unified Cambodian sangha. After 1991, Tep Vong was recognized as head of the Maha Nikaya in Cambodia.
Great Supreme Patriarch of Cambodia
Notes
References
External links
A website with information about each Supreme Patriarch
See also
Buddhism in Cambodia
Sangharaja (Supreme Patriarch)
Supreme Patriarch of Thailand
Category:Buddhism in Cambodia
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
"Fuck You Github!"
|
{
"pile_set_name": "Github"
}
| 0.052632 |
HD 08:56
Shemale Porn - Bailey Jay is nude and masturbates until cumshot
|
{
"pile_set_name": "OpenWebText2"
}
| 0.054795 |
Sexy Natalie Cherie’s Big Titties Make Him Suck Her Pink And Bang Her Asshole
|
{
"pile_set_name": "OpenWebText2"
}
| 0.050633 |
Ziemiany, Masovian Voivodeship
Ziemiany is a village in the administrative district of Gmina Siemiątkowo, within Żuromin County, Masovian Voivodeship, in east-central Poland. It lies approximately south-east of Siemiątkowo, south-east of Żuromin, and north-west of Warsaw.
References
Ziemiany
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Aiden Starr, Joseline Kelly – Chaotic Cock Slut Steals All the Dick at the Summer Swinger Orgy
|
{
"pile_set_name": "OpenWebText2"
}
| 0.053191 |
Bob Penberthy
Bob Penberthy is a former rugby union player who set the record for appearances (with 877) for Pontypridd RFC between 1961 and 1985.
He was known as the Bionic Elbow.
References
Category:Year of birth missing (living people)
Category:Living people
Category:Welsh rugby union players
Category:Pontypridd RFC players
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Siswet19 She Wants To Get Anal Sex On Live Sex Cam
|
{
"pile_set_name": "OpenWebText2"
}
| 0.06 |
How are graphic novels published?
Graphic novels, I tell you. They’re published by comics publishers and literary publishers. They’re self-published, they’re crowdfunded, they’re submitted through agents, they’re submitted without agents. Though the medium of graphic novels has been in the literary world for decades now, writers, agents, and acquisitions editors still have no universally standard format or submission policy.
Illustrated and hybrid novels
Illustrated novels are prose novels with occasional (or multiple) illustrations, like Miss Peregrine’s Home for Peculiar ChildrenorIlluminae. Their pages will look more like prose manuscripts. It’s more precise to call these “illustrated novels” in your query letter. Link to images you’re providing, or include brief illustration notes in brackets.
[Illustration: Like this]
Hybrid or multimedia novels include sections of concrete poetry, imagery or ephemera which are not supplemental, but integral. The visual aspects are meant to be read or analyzed along with the text, like House of Leaves, Extremely Loud and Incredibly Close, orShip of Theseus. A hybrid novel might be part comic panels, part sketches, part handwritten notes, part typed prose, part photographs. If you are creating the graphic aspects of your novel, then also consider yourself the “illustrator” below.
What’s your destination?
To figure out which route you should take to get a graphic novel published, you need to understand your goal.
Do you want to work for a well-known comics publisher (like Marvel, DC, Image, or Dark Horse)?
Do you want to assemble your own team of artists, writers, colorists, and letterers?
Do you want to write and illustrate a graphic novel to be published traditionally?
Do you just want to illustrate graphic novels?
Do you just want to write graphic novels?
Recommended routes for each:
If you want to work for a well-known comics publisher, you can try to get an internship, but the best way to become part of the comics world is to create an amazing portfolio of either illustration or writing samples, network with creators, and self-publish a short comic or zine by yourself or with a team of creators (see next paragraph). You can pitch your work at comic cons, recruiters can find your comics online and hire you that way, or you can join a comics community like Comics Experience, which includes a workshop and has options for publishing with IDW. Skip to the Comic Format section below to see how to format your comic scripts.
If you want to assemble your own team of creators–your first step is likely to be self-publishing. If you don’t care about being paid and just need the experience/exposure/portfolio, create a webcomic. Tapastic and Tumblr are both popular venues for webcomics, but if you have a big enough fan base, you can publish on your own website, like The Dreamer or XKCD. Some successful webcomics get book deals.Nimona, my favorite graphic novel of 2015, started as a webcomic and was published by Harper (a literary publisher–Stevenson has a literary agent). The Dreamer has turned into three graphic novel volumes of comics, published by IDW (a comics publisher–Innes entered the agreement with IDW as an independent creator). Hark, a Vagrant! has gotten Kate Beaton an agent and several book deals. You might also find good success crowdfunding your graphic novel on Kickstarter. Of course, you could also become your own publisher and use a print-on-demand service or turn them into eBooks or PDFs to sell online.
If you want to write and illustrate a graphic novel to be published traditionally, you can do what Innes or Stevenson or Beaton did above and get your work out there first, or you can create a graphic novel proposal to send to agents. If you don’t have a complete, finished graphic novel to pitch, you’ll need a link to your portfolio (see resources in next paragraph) and a complete script.
If you just want to illustrate, you’ll need to create an outstanding portfolio. Then you’ll get an agent, who will share your work with acquisitions editors and art directors. I have heard nothing but good things about Chris Oatley’s online Painting Drama class. Oatley did character design for Disney, and his students learn how to instill deep emotional impact into their drawings and paintings–exactly what art directors are looking for. If you’d like to illustrate graphic novels and picture books for children in particular, I highly recommend KidLit411 as a resource.
If you just want to write graphic novels, you’ll need to read a lot and write a lot in your genre. Then you’ll need to write an entire script and query an agent to represent your script.
As both writer and illustrator, you can write your script however you’d like, as long as you have a complete graphic novel to show for it or it’s legible enough for an agent to read. See how Innes an Oatley, both writer/illustrators, wrote and formatted their own scripts here. Innes uses a modified comic script, and Oatley writes his more like a screenplay. At the link, you can download their script pages and see how the script changed from draft to pencils to final colored pages.
Formats for writers seeking literary agents (and literary publishers)
If you’re looking for a literary agent and are not illustrating, write your script with broad-stroke illustration notes, and don’t worry about breaking your script into panels. Remember, you’re in charge of writing, not illustrating, the story. Neither finding the illustrator nor directing the illustrator are your job. Rather, include short descriptions with golden details to guide and ground the illustrator. Let her fill in the minutiae. Tell the story through dialogue and, when necessary, captions. Shannon Hale, a NYT best-selling novelist, shares her style for graphic novels here. While a lack of control can be very scary, giving the illustrator freedom for his own creative process will result in a finer work.
What agents are looking for
If you’re wondering what comics publishers are looking for, see this Definitive List of submission guidelines.
Bree Ogden wants a query letter with a link to the script and/or artwork. She wants scripts in the comic style.
1. I look for proper formatting. Little mistakes here and there are fine. But screenplay formatting and/or prose are unacceptable. It shows me so many things, namely that you’re not familiar with the genre you want to write in.
2. Outside of formatting, I look for things like: are the captions too long? Does the dialogue in the panel give enough information without being verbose? I usually storyboard the first few pages (if it’s just a script without sample panels) and see how it pans out as an actual graphic novel. You’d be surprised how easy it is to make a mess of captions!
3. I look to see that the writer has a grasp on description and an eye for detail. This makes working with an artist so much easier.
[…]
It should look like this:
Dear Agent,
Blah blah *query letter* blah blah.
I’d love for you to take a look at the first five pages of my graphic novel script and some sample art. You can view both on my website http://www.___________.com. The password to view the script is __________.
[Closing remarks]
Brent Taylor wants a query with scripts written in a less formal style:
I typically prefer a query along with sample script pages pasted into the body of the message, with a link to art or samples attached as a PDF. The one thing that I will say that is more craft related is that I really like GN scripts to be written in a more “Hollywood” way. When GN writers get too caught up in art direction and minute details [like Moore’s style!] it detracts from the character and story, and I find it’s much easier to sell a GN when the script is written in a really readable manner for those who aren’t as familiar with formal comic formats.
What? Bree and Brent want completely opposite things in their scripts? Bree describes a comic-like graphic novel with panel breakdowns. She probably has connections with comics publishers. Brent is looking for more prose-like graphic novel scripts, which means he’s probably not going to submit your script to comics publishers, he’s going to submit it to book publishers.
If you are writing only, send a query letter once your script is complete and polished. Check submission guidelines to see if you can paste the first five pages below your query letter or include a link to your first five pages in your bio paragraph.
If you are illustrating and your script is complete, send a query letter with a link to your portfolio and sample pages (unless the agency requests proposals in their submission guidelines).
If you are illustrating and your script is not complete, send a cover letter and proposal (unless the agency requests something else in their submission guidelines).
Please research agents and publishers before you submit or sign any contract. Inclusion in this post is not endorsement.
Editor responses:
Rachel Stark is accepting MG graphic novel submissions at Sky Pony Press. Email cover letter and attach complete script. If illustrating, attach first three chapters as a PDF. If your work is complete, you can include a link to your finished work.
McKelle George is looking for hybrid novels like Illuminae or A Monster Calls for Jolly Fish Press. She’d prefer a proposal or a link to complete work.
Difference between a query and a proposal
Query letters are like cover letters.
A query letter is a one-page pitch addressed to an individual agent which gives the details of the story’s characters, goals, and obstacles. Don’t tell the ending, but make the reader need to know what comes next. Include a short paragraph with details about the graphic novel: title, genre, and word count (page count only if you have an idea of how your graphic novel will be laid out, and it’s within standards). Give a 1- to 2-sentence bio, and then sign the letter/email. You can send query letters to any number of agents, but address them to each personally, and before you submit, be sure to check each agency’s submission guidelines and whether they even accept graphic novels.
If you are writing but not illustrating, only send query letters when your script is complete.
If an agent asks for samples of pages or artwork, never include attachments unless expressly asked to do so. Instead, paste text at the bottom of the email or include a link to your portfolio or pages in your bio paragraph.
Proposals are like interviews.
A proposal is a multi-page pitch which proves that you are capable of entering into a contract to complete a graphic novel. In other words, you may not have a complete graphic novel finished, but you do have a complete grasp of what you need to finish it. Check with the agency or publisher’s guidelines to see what they require. Some things you might be required to include:
A cover letter (generally required)—one page, addressed to appropriate person by name—who are you, what do you write or make, and why are you a good fit for this agency’s or publisher’s line-up?
A CV—usually optional unless you have prior publications to include
Synopsis (usually required)—full synopsis of what happens in the story, from beginning to end
Sample artwork (generally required for artists or teams)—the best pieces in your portfolio. Try to pick images which tell a story and set a scene; posed pin-ups or portraits are not the best choice for a storytelling proposal
Did you find this information useful?
Please share on social media! ❤
Consider subscribing to StoryCadet.com, my online portal for writing workshops. I offer courses in drafting, revision, and pitching/querying. By subscribing, you’ll be notified when courses will be offered.
If you’d like to book me for editing services, I have a page just for visual narratives (graphic novels, comics, picture books) on my editing site.
Post navigation
6 thoughts on “How to Format and Submit Graphic Novels”
Loving this post, Lara! Also to agents and publishers, it really helps to mark if you’re interested in nonfiction works in comics, too! So many times nonfiction authors/illustrators have to navigate your submission guidelines and then have to try to figure out to submit as fiction or nonfiction, because you may have graphic novels marked as fiction only.
Thanks for commenting, Erik! Technically a “novel” is fiction, but generally “graphic novel” applies to both memoir and nonfiction works as well. General practice is to submit like above, with a query letter. The example of a successful query letter I linked to above is nonfiction.
Hi Matt, I’ve never heard of a setup like that from a traditional publisher, since the deals I know of had a contract between the publisher and both creators. It really doesn’t seem like a good arrangement for the artist to receive a fraction of the writer’s advance. Editors that I have spoken to recommend an even split between creators. The comic I have coming out this spring had both me as writer and the artist sign a contract for the publisher together. We could split the per-page payment (more common for indie anthologies like ours) however we liked. I wanted the artist to take a bigger chunk than mine since she was doing all the pencils, inks, lettering and coloring herself. If we were a four-person team, we would split it 25/25/25/25.
I’d have either an agent with sales experience or a personal lawyer review any and all contracts before you ever sign anything. The difference is that you pay an attorney; agents get a percentage of your sale only if it goes through.
Even if you split the advance with the artist, the artist should also get royalties from the publisher, so I really think the artist should have the contract with the publisher, not just you. Ideally you’d both have an agent representing you, but I have seen artists represent themselves in deals.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Look me as I wash the Pussy and the Ass
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051282 |
Sexy MILFs - This young sexy milf has some great sexy poses on her bed.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.056338 |
A comparative analysis of a balance between the rates of polymer hydrolysis and acetoclastic methanogenesis during anaerobic digestion of solid waste.
A distributed model of anaerobic digestion of solid waste was developed. Waste, volatile fatty acids (VFA), methanogenic biomass and methane concentrations were the model variables. A system of parabolic partial differential equations in the one space variable and time with slab, cylindrical or spherical symmetry of the problem was solved numerically. Diffusion of VFA inhibiting both polymer hydrolysis and acetoclastic methanogenesis was taken into account. The model showed that concentration waves of methanogenic biomass and VFA propagated over reaction space. Diffusion-based "acceleration" of methane production in the reactor was possible when intensity of VFA utilisation in the methanogenic area was sufficient for complete digestion of incoming VFA. Otherwise, methanogenic area propagation would be suppressed. Optimum conditions for the solid waste digestion can be reached at low mass transfer at the beginning and at high mass transfer when methanogenic population increases. If the initial methanogenic biomass was localised at the centre of the reactor, the total reaction time was shorter as compared to the case when the initial biomass was uniformly distributed over the reactor volume. In the last case, there was no concentration wave propagation.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
xx 5 0 0
xx 6 1 0
xx 7 1 1
xx 8 1 1
xx 9 0 1
xx 10 0 0
xx 11 0 1
xx 12 0 1
xx 13 1 1
xx 14 1 0
xx 15 1 0
xx 16 0 0
|
{
"pile_set_name": "Github"
}
| 0.104348 |
Q:
How far should I place torches in a planar huge room?
I'm building a very large planar room. How far should I place torches from each other, in order to avoid mob spawning?
In How far do I have to place torches so that mobs will not spawn near me? question, a lot of details are mentioned, but there is no specific answer about how to distribute torches over a large plane. That's why I'm asking it here.
A:
If you want to optimize your torch consumption, I think the best pattern would be this :
Oranges dots are torches
Yellow dots are sufficient-lit blocks
Gray dots are insufficient-lit blocks, where mobs can spawn
A:
Torches create light of 14 in the block they are in, all neighboring blocks will have light of 13 and so on.
Enemy mobs spawn at light level 7 or less
Placing one in each corner and two in the center covers all the places.
XX XX XX XX XX 08 XX XX XX XX XX XX XX XX XX XX 08 XX XX XX XX XX
XX XX XX XX 08 09 08 XX XX XX XX XX XX XX XX 08 09 08 XX XX XX XX
XX XX XX 08 09 10 09 08 XX XX XX XX XX XX 08 09 10 09 08 XX XX XX
XX XX 08 09 10 11 10 09 08 XX XX XX XX 08 09 10 11 10 09 08 XX XX
XX 08 09 10 11 12 11 10 09 08 XX XX 08 09 10 11 12 11 10 09 08 XX
08 09 10 11 12[13]12 11 10 09 08 08 09 10 11 12[13]12 11 10 09 08
XX 08 09 10 11 12 11 10 09 08 08 09 08 09 10 11 12 11 10 09 08 XX
XX XX 08 09 10 11 10 09 08 08 09 10 09 08 09 10 11 10 09 08 XX XX
XX XX XX 08 09 10 09 08 08 09 10 11 10 09 08 09 10 09 08 XX XX XX
XX XX XX XX 08 09 08 08 09 10 11 12 11 10 09 08 09 08 XX XX XX XX
XX XX XX XX XX 08 08 09 10 11 12[13]12 11 10 09 08 XX XX XX XX XX
XX XX XX XX XX 08 09 10 11 12[13]12 11 10 09 08 08 XX XX XX XX XX
XX XX XX XX 08 09 08 09 10 11 12 11 10 09 08 08 09 08 XX XX XX XX
XX XX XX 08 09 10 09 08 09 10 11 10 09 08 08 09 10 09 08 XX XX XX
XX XX 08 09 10 11 10 09 08 09 10 09 08 08 09 10 11 10 09 08 XX XX
XX 08 09 10 11 12 11 10 09 08 09 08 08 09 10 11 12 11 10 09 08 XX
08 09 10 11 12[13]12 11 10 09 08 08 09 10 11 12[13]12 11 10 09 08
XX 08 09 10 11 12 11 10 09 08 XX XX 08 09 10 11 12 11 10 09 08 XX
XX XX 08 09 10 11 10 09 08 XX XX XX XX 08 09 10 11 10 09 08 XX XX
XX XX XX 08 09 10 09 08 XX XX XX XX XX XX 08 09 10 09 08 XX XX XX
XX XX XX XX 08 09 08 XX XX XX XX XX XX XX XX 08 09 08 XX XX XX XX
XX XX XX XX XX 08 XX XX XX XX XX XX XX XX XX XX 08 XX XX XX XX XX
[13] = Torch
XX = Spawning available
Numbers show the lowest light level in that area
This can only work in a three high or shorter room with all torches on the middle row
A:
I find it easier to just place torches every 8 and use the (x,z) coordinate mod 8 = 0 as guide. That ends up putting torches (0,0) (0,8) (0,16) etc. When it comes to hillsides, i.e. 45 degree slopes or 1 block rise for 1 block of run, I put torchs twice as often or at coordinates congruent 0 mod 4.
Note that recently (since summer 2012) I've noticed mosters still spawning in what should be light > 7 locations. This is annoying and I suspect an (undocumnted on wiki) change to mob spawning rules. :(
|
{
"pile_set_name": "StackExchange"
}
| 0.060353 |
03:02
Teen Camgirl with Shaved Pussy Shoves Dildo in Her Asshole 939 0%
|
{
"pile_set_name": "OpenWebText2"
}
| 0.055556 |
I am a sex machine.
|
{
"pile_set_name": "Enron Emails"
}
| 0.052632 |
Resection of pulmonary metastases in osteosarcoma. A retrospective analysis of 44 patients.
Between 1977 and 1985, 44 patients with osteosarcoma and pulmonary metastases were treated at Institut Curie and Marie-Lannelongue. Twenty patients were able to undergo operations according to our criteria. Of 17 patients who immediately after surgery were clinically and radiologically free of disease, six are alive with no evidence of disease and one suffered recurrent pulmonary disease; their 5-year survival is 37%. In 24 patients, various schemes for aggressive chemotherapy for measurable lung disease could be assessed. Only one patient had a complete response; there was one partial response, and three patients experienced stabilization of their disease for 6 to 8 months. Of five patients who had second line postoperative adjuvant chemotherapy, four relapsed within 2 months of stopping treatment. Surgical resection of lung metastases appears definitely to improve the outcome in osteosarcoma patients. Chemotherapy offers no advantage in treating bulk disease, but the prevention of new micrometastatic disease remains a possibility and should be assessed in randomised multicenter trials.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Pre Professional Medicine
Overview
Pre-Medicine students at Fairmont State University can choose from a number of undergraduate fields of study prior to applying to medical school. They include:
Biology
Chemistry
Forensic Science
Philosophy, psychology (and more) if all prerequisite and degree requirements are met
It’s important for Pre-Medicine students to review requirements and consult with counselors of the medical school they wish to attend after Fairmont State University.
Instructors in our Pre-Medicine courses focus on a curriculum that should meet those medical school requirements. While studying Pre-Medicine, students should also:
Maintain a high GPA (3.3-3.5)
Begin MCAT (Medical College Admission Test) preparation (junior year)
Preparing medical school application (late junior year)
Gain experience in the medical field (volunteering, shadowing)
Develop professional relationships to be used as recommendation
Career Opportunities
By achieving academic success at Fairmont State University in the Pre-Medicine program, students qualify for the next step toward their ultimate goal. Career possibilities are limitless for Pre-Medicine students in part because of the curriculum’s heavy emphasis in science. Pre-Medicine students often go on to become:
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.