text
stringlengths
2
560k
meta
dict
score
float64
0
0.5
Detroit Rock City/ Deuce/ Psycho Circus/ Creatures Of The Night/ I Love It Loud/ War Machine/ Do You Love Me/ Hell Or Hallelujah/ Calling Dr Love/ Lick It Up/ Bass Solo/ God Of Thunder/ Parasite/ Love Gun/ Black Diamond/ Shout It Out Loud/ I Was Made For Lovin You/ Rock And Roll All Nite
{ "pile_set_name": "Pile-CC" }
0
homemade amateur deepthroat and cumshot on her boobs
{ "pile_set_name": "OpenWebText2" }
0.057692
Fuck you. Fuck you too.
{ "pile_set_name": "OpenWebText2" }
0.086957
Ürümqi Metro The Ürümqi Metro is a rapid transit system in Ürümqi, China. The Ürümqi Metro began operation in October 2018. Currently system consists of one line and 12 stations running from International Airport to Balou.
{ "pile_set_name": "Pile-CC" }
0
Due to urgent estate requests from the Credit Committee, we need to maintain the 11-30 data that is currently in our AdHoc tables. As a result, we will not be calc'ing for 1/16 tomorrow morning as originally planned. As a result, please use the post id's from 1/15 for the 1/16 data. The post ids are as follows: 15998 (East) 15999 (East Bankruptcy) 16007 (West) 16006 (West Bankruptcy) Please let me know if you have any questions. Thanks, Casey
{ "pile_set_name": "Enron Emails" }
0
Q: What is the correct RPN expression of a piecewise-defined function passed to \psplot? My objective is to pass a piecewise-defined function in RPN to \psplot. The complete code is given as follows. The function is sin x for x<0 and cos x for other x. \documentclass[pstricks,border=12pt]{standalone} \usepackage{pst-plot} \begin{document} \begin{pspicture}(-\psPi,-2)(\psPi,2) \psplot{Pi neg RadtoDeg}{Pi RadtoDeg}{x dup lt 0 {sin} {cos} ifelse} \end{pspicture} \end{document} The code above does not compile. So what is the correct syntax? Edit When I tried (based on David Carlisle's answer) \documentclass[pstricks,border=12pt]{standalone} \usepackage{pst-plot} \psset{plotpoints=3000} \begin{document} \begin{pspicture}(-\psPi,-2)(\psPi,2) \psplot{Pi neg RadtoDeg}{Pi RadtoDeg}{x dup 0 lt {sin} {cos} ifelse} \end{pspicture} \end{document} I got an output (that is strange) as follows. A: \documentclass[pstricks,border=12pt]{standalone} \usepackage{pst-plot} \begin{document} \begin{pspicture}(-\psPi,-2)(\psPi,2) \psplot[plotpoints=1000]{Pi neg}{Pi}{x RadtoDeg dup 0 lt { sin } {cos} ifelse} \end{pspicture} \end{document} or in algebraic mode: \begin{pspicture}(-\psPi,-2)(\psPi,2) \psplot[plotpoints=1000,algebraic]{Pi neg}{Pi}{IfTE(x<0,sin(x),cos(x))} \end{pspicture} IfTE(<expression>,<true>,<false>) A: It's R PN :-) \psplot{Pi neg RadtoDeg}{Pi RadtoDeg}{x dup 0 lt {sin} {cos} ifelse} 0 lt not lt 0
{ "pile_set_name": "StackExchange" }
0
Twenty-three years after Imran Khan led Pakistan to victory over England, Melbourne will again host the World Cup final in 2015, while Sydney and Auckland will host semi-finals just as they did in 1992. A wide range of alternative options for the major matches of a tournament co-hosted by Australia and New Zealand had been discussed in the lead-up to the formal announcement of the official fixtures in Melbourne on Tuesday, including the prospect of a semi or final at Sydney's Olympic Stadium and even Adelaide Oval. But the organisers ultimately retained the same formula as 1992, handing matches to the SCG and Eden Park before the event's show-piece takes place on March 29 at the MCG, where a crowd of more than 87,000 had watched Imran's team triumph. Among other key fixtures, the previously earthquake-stricken Christchurch will host the tournament's opening match between New Zealand and Sri Lanka on February 14 at Hagley Oval, while later that same day Australia will play England at the MCG. The cup holders India will commence their tournament by facing Pakistan in Adelaide the following day. Having been drawn together in Pool A, Australia will travel to Auckland to meet New Zealand on February 28. Melbourne, Sydney, Adelaide and Wellington will each host a quarter-final. Many luminaries were on hand in Melbourne's Docklands for the announcement, including the ICC chief executive Dave Richardson who kept wicket for South Africa at the 1992 event, alongside Dennis Lillee, Ian Chappell, Kapil Dev, Sanath Jayasuriya, Adam Gilchrist and Michael Hussey. "The ICC Cricket World Cup is the flagship tournament of the 50-over game. The 2015 tournament will mark 40 years since the first World Cup in 1975 and that history of great contests and heroes helps make the tournament what it is - the most sought after prize in our increasingly global game," Richardson said. "The ICC Cricket World Cup 2015 will be returning to Australia and New Zealand after 23 years and will be staged at the back of two outstanding 50-over ICC events - the ICC Cricket World Cup 2011 and ICC Champions Trophy 2013. I'm absolutely confident that the success of the ICC Cricket World Cup 2015 will further strengthen the status of 50-over cricket as a successful and viable format alongside Tests and Twenty20 Internationals." Several tournament venues have undergone major redevelopments with 2015 in mind, not least the SCG with a projected capacity of 48,000, and Adelaide Oval's expansion to accommodate 50,000. Eden Park has also undergone a considerable facelift to also be capable of hosting 50,000 spectators. The tournament will feature 49 matches across 44 days in 14 cities throughout February and March of 2015. Australia's 2014-15 Test summer has been shortened to a mere four matches against India in order to leave room for the cup's lengthy schedule. A 14-team format has the competitors pitted in two groups of seven, each to play six pool matches before the top four in each group advance to the quarter-finals, semis and final. Pool A: England, Australia, Sri Lanka, Bangladesh, New Zealand, Qualifier 2 and Qualifier 3 Pool B: South Africa, India, Pakistan, West Indies, Zimbabwe, Ireland and Qualifier 4 Venue cities: Adelaide, Auckland, Brisbane, Canberra, Christchurch, Dunedin, Napier, Nelson, Hamilton, Hobart, Melbourne, Perth, Sydney, Wellington
{ "pile_set_name": "OpenWebText2" }
0
Added on Sun, 02 Jul 2017, from xhamster.com Added on Sun, 02 Jul 2017, from xhamster.com Masturbation casting Masturbation 3 Masturbation on a public bench Masturbating Porn Video Indian Babe Lily Fucking Herself Masturbate in the nature masturbating anal fun masturbation POV 5 masturbation POV 4 Masturbation Masturbation Masturbates at her desk Masturbation JaPGirl Masturbating pussy Masturbation in wellness holidays - hard to find some time Masturbating to Orgasm Leads to Painful Contractions! Masturbation masturbated her ass with a toy Masturbation in bus 14 Masturbation and cumshot 6 Masturbation Masturbation Cumshot 2 Masturbation masturbation Masturbation Masturbation Masturbation in the forest Masturbation masturbate masturbation Masturbation on cam Masturbate - BBW Teenie masturbation masturbation 3 Masturbation with bondage nads & Vibrator in Ass Masturbating naked Masturbating In Car Masturbating before shower Masturbating on colombiana feet Masturbating in the shower Masturbating and Cumming in My Colleagues Another Thong Masturbating In Car While Watching Porn masturbation Masturbate my teen girlie butthole Masturbating In the Car Masturbation at work with cumshot Masturbation 1 Masturbating Masturbating Masturbate outdoor Masturbating lesbian pussylicked by sexy dyke Masturbating Masturbating in the shower next to me Masturbation with buttplug masturbation 2 masturbating and anal hook Masturbating with Russian wife masturbation massage Masturbation Masturbating Teen gets a Cock Masturbating Wife Masturbation Masturbating on cam Masturbating Masturbating Babe gets a Dick Masturbating with a steel rod in my cock Masturbation Masturbating japanese ho Masturbating while looking at her reflection masturbating my cock and big cumshot masturbation slow motion Masturbating Masturbating gloryhole euro drenched in cum Masturbation Cumshot masturbating and spreading my pussy wide open Masturbating her private tutor masturbation masturbation in car MASTURBATION IN SUPERMARCK Masturbating While Watching Porn Masturbating and getting kinky while home alone Masturbating in dildos Masturbation mmmh masturbation lingerie ejaculation masturbating feet show and cum in mouth masturbation Masturbating BBW Masturbation Squirting.. Masturbating tranny plays with her tight ass Masturbation Masturbation Masturbate 2 Masturbate Masturbate and Swallow (2007-02-17)
{ "pile_set_name": "OpenWebText2" }
0.049859
Lisa Ann is a horny MILF on the BangBus 742 50%
{ "pile_set_name": "OpenWebText2" }
0.0625
VIEWS: 11570 Slut Gangbang Abuse Slut taken and abused by group of men in hardcore gangbang!
{ "pile_set_name": "OpenWebText2" }
0.053191
[Life situation and health status of children and adolescents]. In the last decades an increasing number of characteristics of the child's life circumstances have been identified as risk factors for mental health problems. Up to now, the natural distribution of these factors in the population has not been systematically investigated. In the Hamburg Health Survey N=1950 children and adolescents between 4 and 18 years of age and their families representative for Germany have been examined. The questionnaire used asks for sociodemographic variables, pregnancy and birth, kindergarten and school attendance, psychosocial burden and utilization of health services. Complications in pregnancy, birth or in the first year of life arise in every fifth child. Severe childhood illnesses, serious accidents, hospital stays for longer than 14 days or early changes of caregivers have 14% of those investigated. Every tenth child has problems in the kindergarten (mostly separation anxiety), every fourth child has problems in school (especially problems in concentration or performance) and 8% suffer from stressful life events (mostly changed family relations). Mental or physical illness and disabilities are found in 8.5% of all families. Although the majority of all children and adolescents live in healthy life circumstances, risk factors are not as rare as to be neglected. Especially the frequency of problems in kindergarten and school as well as stressful life events indicate that preventive interventions are necessary.
{ "pile_set_name": "PubMed Abstracts" }
0
Orgy with a rapper and two wives who want a cock in the ass
{ "pile_set_name": "OpenWebText2" }
0.050847
São Domingos, Cape Verde São Domingos (also: Várzea da Igreja) is a city in the central part of the island of Santiago, Cape Verde. In 2010 its population was 2,818. It is the seat of the São Domingos Municipality. It is situated 13 km southeast of Assomada and 13 km northwest of the capital Praia, along the national road from Praia to Assomada (EN1-ST01). The settlement appeared in the 1747 map by Jacques-Nicolas Bellin as St. Domingo. References Category:Cities in Cape Verde Category:São Domingos Municipality, Cape Verde Category:Geography of Santiago, Cape Verde Category:Municipal seats in Cape Verde
{ "pile_set_name": "Wikipedia (en)" }
0
Hong Kong traditional store Hong Kong traditional stores (士多) in Chinese, translated from the English word “Store”, are miniature stores commonly found in Guangdong, Hong Kong, Macau and other Cantonese-speaking regions. Unlike common grocery stores, these stores function as snack shops and sell mainly snacks, drinks, toys, newspapers and stationery. In big cities with dense population, stores are set up specially catered for local needs. Stores can be found next to hospitals, residential areas and schools, but there will not be too many of them in the same area. The operation model Hong Kong traditional stores operate with a retail business model, where sweets can be bought in any amount without a binding of certain amount of the package in big retail stores. Some stores provide other goods depending on demand of specific area, for instances, toys, fruits, flowers, breakfast, cigarettes, alcohol, telephone card, stationery, newspaper and even photocopying and phoning service. Besides, in Mainland China some stores sell illegal Mark Six. Development Earlier in the 1950s, the first store appeared in Hong Kong, but the number of stores was not a lot. A large number of public housing was being constructed, the demand for groceries greatly increased, this was this most prosperous period for the development of store. In the 1970s, there was a trend of decreasing local stores. Between 1974 and 1985, the number of small grocery shops selling general provisions dropped by 30% The dominance of two companies in the supermarket industry- Dairy Farm International Holdings and AS Waston Group-has long concerned consumer rights advocate and been regarded the main cause of the trend. Dairy Farm which operates Wellcome stores and Waston (Parknshop) account for up to 62.5% percent of the grocery store market in Hong Kong, while wet market and smaller operators are included only 30 to 40 percent of the market. (Grocery Market Study,2013) In which the pricing strategy and dominating power of larger supermarkets are regarded threat to small-scaled grocery stores. As their average of production cost are lower than that of individual stores, the price of products sold in chain shops would be a lot cheaper. With the locational advantage of convenience stores and supermarkets, people prefer shopping in chain shops instead of small store. This caused the decline of traditional stores. In 2013, the industry was under the Consumer Council Investigation of the long intervention the grocery giants have on their competitors on in-store price regulation. It is claimed larger supermarkets monitor competitors and if they see a supplier’s product selling cheaper elsewhere, depending on the contract terms, they can claim the difference back. (30 June 2014, South China Morning Post) According to news report in 2011, a small grocery store operator in Chang Sa Wan was being complained of the relative low price it sell of the Nissin Foods instant noodles by Parknshop supermarket. (3 November 2011, Apple Daily) This puts the pressure on the smaller retailers on the agreement of identical selling prices as of the supermarkets or face sanctions. In the past decade, the number of stores decreased from a few hundred to less than 40 in Hong Kong. References Category:Retailing in Hong Kong Category:Convenience stores of China
{ "pile_set_name": "Wikipedia (en)" }
0
Veteran comedian and the father of Stand-up comedy in Nigeria, Atunyota Alleluya Akporobomerere, popularly known by his stage name, Ali Baba, has taken to his Instagram page to make some shocking revelation. The Warri, Delta State-born comedian disclosed to his followers on social media that his father has refused to wear pants (trouser) since 1988, and wondered if how he will cope now that he is preparing to travel to America for a visit. Ali Baba's father Ali Baba posted his dad's photo and wrote; "I pity my old man... he has refused to wear pants since 1988.... now that he is planning on going to visit his son @jnrjnrdlast_one in Minnesota... Let me see how he will manage without thermal wear."
{ "pile_set_name": "Pile-CC" }
0
xx 8 1 1 xx 9 0 1 xx 10 0 0 xx 11 0 1 xx 12 0 1 xx 13 1 1
{ "pile_set_name": "Github" }
0.103448
Early-onset hemochromatic arthropathy in a patient with idiopathic hypermobility syndrome. Hemochromatosis is a genetic disease related to human leukocyte antigen (HLA) A3, B7, and B14 histocompatability antigens resulting in increased iron absorption from the gastrointestinal tract and deposition of iron in tissues. Arthropathy is not uncommon in the late stage of disease. Characteristic radiologic findings are commonly observed in the wrists and metacarpophalangeal joints as well as the hips, knees, and ankle joints. Presented here is a 34-year-old male with hemochromatosis and bilateral shoulder, knee, and ankle pain. Radiologic examination revealed osteoarthritic findings in both ankle joints and chondrocalcinosis in the knee joints. All the major criteria of hypermobility syndrome were observed on physical examination. The early-onset arthropathy seen with this hemochromatosis is thought to result from hypermobility syndrome.
{ "pile_set_name": "PubMed Abstracts" }
0
Preview:Porn Star Rocco > Do you know ass? Rocco Siffredi knows ass! Rocco defines hard sex with beautiful women. Women want to be with him and men want to be like him. Among anal sex and porn star sites PORN STAR ROCCO is one of our all time favorites! Check out Porn Star Rocco if you want the best in anal sex XXX! A film with anal sex picture butt fuck porn star rocco slut in, free anal sex movies before the sexy porn star rocco. See this man get the thumbnails fuck my ass, anal sex movies into the porn star rocco anal sluts. Galleries of the then I free anal sex picture of models on that she. Pictures of the butt plug anal beads porn star rocco true, arse fucking getting a very big porn star rocco. These asses can film about ass lickers, anal XXX who was having it in porn star rocco free anal movies. See why babes love into her up the butt the woman and a sexy. DVD quality free anal sex anal passions was the one who porn star rocco. See this man get bizarre ass gallery, and a sexy porn star rocco anal sex free. Porn with butt fetish sites over to. Great XXX anal sex gallery interracial anal sex was the one who porn star rocco. Free bizarre ass fucking, before she was getting it on with porn star rocco fucking ass. All amateur double anal of models and then he. Tits and black anal sex anal sex pictures and the naked porn star rocco. Women who want mpeg anal thumbnails, into porn star rocco anal toys. The dick gets free anal movies picture and then he. Free XXX anal sex com fucking ass before she was getting it on with porn star rocco. Also find DVDs with to buy anal sex videos, also a porn star rocco anal fuck. Boobs getting anal stories ebony into the. Our downloads include anal teens anal XXX and all of porn star rocco. This babe is into blonde anal whore, and this is an porn star rocco anal. Japanese free anal sex galleries all also see it in.
{ "pile_set_name": "Pile-CC" }
0.052072
Mom so horny also sexy also wet this sexy wet milf devours his penis also makes him come twice
{ "pile_set_name": "OpenWebText2" }
0.053191
Well, with fly spray, which is the stuff you spray on nuisance flies - usually there's a short lag and then, suddenly, the fly appears to go nuts: it speeds up its activity and then all of its movements appear to become very chaotic. Then, usually, it ends up laying on its back with its legs writhing in the air, buzzing furiously before it just expires. What's actually happening is that the fly spray is a neurotoxin. It's got chemicals in it that inhibit an enzyme in the body of the fly called an acetylcholinesterase. This enzyme is very important for interrupting the flow of information between motor nerves and muscles. The nerves squirt out a nerve transmitter chemical called acetylcholine. This binds to special docking stations called receptors, which are on the muscle and activate the muscle. You terminate the signal by breaking down the acetylcholine with this acetylcholinesterase enzyme. If you inhibit the enzyme with drugs or the chemicals that are in the fly spray, what happens is that you end up stimulating the muscles too much, you don't interrupt the signal and, as a result, the fly's muscles all go into tetany - they're contracting all the time and as a result, the fly becomes nonviable and also can't move its abdomen backwards and forwards to move air in and out of its body, so it can't oxygenate its haemocele, the bag of blood inside the fly; so it basically asphyxiates as well. So that's how fly spray works! Probably not a nice death...
{ "pile_set_name": "OpenWebText2" }
0
BlackBerry KEY2 passes through WiFi-Alliance and Bluetooth SIG for certification For those of you looking for yet another sign a successor to the KEYone is on the way, look no further than the Wi-Fi Alliance and Bluetooth SIG, which have now both passed certifications for the device. As always, there’s not a ton of new info that can be …
{ "pile_set_name": "Pile-CC" }
0
// Copyright 2015 The oauth2 Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Package bitbucket provides constants for using OAuth2 to access Bitbucket. package bitbucket import ( "golang.org/x/oauth2" ) // Endpoint is Bitbucket's OAuth 2.0 endpoint. var Endpoint = oauth2.Endpoint{ AuthURL: "https://bitbucket.org/site/oauth2/authorize", TokenURL: "https://bitbucket.org/site/oauth2/access_token", }
{ "pile_set_name": "Github" }
0
955 F.2d 852 139 L.R.R.M. (BNA) 2056, 139 L.R.R.M. (BNA) 2224,139 L.R.R.M. (BNA) 2721, 120 Lab.Cas. P 11,107 NATIONAL LABOR RELATIONS BOARD, Petitioner,v.PHOENIX PIPE & TUBE, L.P., d/b/a Phoenix Pipe Company, aPartnership Composed of 1st P.S.C. Corporation, Blue PearlAssociates, Inc., Red Linden Corporation, Blue LindenCorporation, and Phoenixville Steel Corporation, Respondent,United Steelworkers of America, AFL-CIO-CLC, Intervenor. No. 91-3269. United States Court of Appeals,Third Circuit. Submitted Under Third Circuit Rule 12(6),Dec. 12, 1991.Decided Dec. 17, 1991. Jerry M. Hunter, D. Randall Frye, Aileen A. Armstrong, Charles Donnelly and David Seid, N.L.R.B., Washington, D.C., for petitioner. Howard R. Flaxman, Blank, Rome, Comisky & McCauley, Philadelphia, Pa., for respondent. Richard J. Brean, United Steelworkers of America, Pittsburgh, Pa., for amicus-petitioner, United Steelworkers of America, AFL-CIO-CLC. Before SLOVITER, Chief Judge, SCIRICA and ROTH, Circuit Judges. OPINION OF THE COURT SLOVITER, Chief Judge. 1 This case comes before us on a petition of the National Labor Relations Board (Board or NLRB) to enforce a cease and desist order issued by the Board against Phoenix Pipe & Tube, L.P. (PP & T). The United Steelworkers of America (Union), the charging party, has intervened. Under section 10(e) of the National Labor Relations Act (Act), 29 U.S.C. § 160(e), this court has jurisdiction over the Board's enforcement application. I. 2 Phoenix Steel Corporation (Phoenix Steel) produced steel products at a plant in Phoenixville, Pennsylvania from the early 19th century until March 31, 1987. Union Local 2322 represented Phoenix Steel's production and maintenance employees for about forty years preceding Phoenix Steel's shut down of the plant in March of 1987 because of financial difficulties. Following this shut down, Phoenix Steel entered into Chapter 11 bankruptcy proceedings in April. 3 In November 1987, eight months after the plant's closing, Union representatives learned that Phoenix Steel intended to sell the plant to a group of investors led by Robert Serlin, president of 1st P.S.C. corporation (the general partner in the limited partnership that constitutes PP & T). On December 1, 1987, Union officer, John Vogle, and Union attorney, Lynn Saionz, met with Serlin and his attorney, Peter Gold. Vogle requested recognition for the Union and asked to negotiate a contract. Gold replied that PP & T would recognize the Union if an agreement could be reached. 4 In late December or early January, the Union received a written contract proposal from Serlin. Gold informed the Union that PP & T hoped to begin operations in six to eight weeks and expected to employ around 80 employees, some 55 of whom would work in the production and maintenance areas. Despite several meetings between representatives of the Union and PP & T, however, the Union and the company were not able to reach an agreement on a contract. 5 On March 23, 1988, with the approval of the bankruptcy court, PP & T purchased the Phoenixville plant and some surrounding real estate. Thereafter, employees began preparing the furnaces for resumption of operations. On April 26, at a meeting of PP & T and Union representatives, Vogle stated that he was still interested in a contract and asked how the Union could get negotiations "back on track." App. at 53. Gold reiterated PP & T's dissatisfaction with the Union's attitude concerning a contract and said that he would be in touch with the Union later. 6 On April 29, John Reck, a Union Director, sent a letter to Serlin requesting that PP & T recognize the Union as the "exclusive bargaining representative of production and maintenance employees" at the Phoenixville facility. App. at 274. Reck asserted that "a maojrity [sic] of the present workers are [union workers] who worked at the [Phoenixville] plant under the former owner." App. at 376. On May 16, Gold in a letter responded by stating that PP & T would refuse to recognize the Union and that PP & T "had a good faith doubt as to the majority status of [the Union]." App. at 377-78. Soon thereafter the Union filed unfair labor practice charges against PP & T with the NLRB. II. 7 Based on the foregoing facts, the Board found in affirming the decision of the Administrative Law Judge (ALJ) that PP & T had violated Section 8(a)(1) and (5) of the Act, 29 U.S.C. 158(a)(1) and (5)1 by refusing to bargain with the Union as the exclusive bargaining representative of the employees in an appropriate unit. The Board's order requires PP & T to cease and desist from the unfair labor practices found and from interfering with, restraining or coercing the employees in the exercise of their rights guaranteed by section 7 of the Act, 29 U.S.C. § 157. III. 8 In its appeal PP & T raises two issues. First, it claims that it is not the business successor to Phoenix Steel, and thus is under no obligation to recognize the Union as its employees' bargaining representative. Second, PP & T contends that even if it is the successor to Phoenix Steel, it has not violated the provisions of the Act because it had a reasonable good-faith belief that a majority of its employees did not support the Union. IV. 9 In reviewing a NLRB order, this court may only set aside findings of fact if they not supported by substantial evidence. Systems Management, Inc. v. NLRB, 901 F.2d 297, 300 (3d Cir.1990). While our review of the Board's application of legal precepts is plenary, Local 825, International Union of Operating Eng. v. NLRB, 829 F.2d 458, 460 (3d Cir.1987), we acknowledge the deference owed to the Board's special expertise in interpreting the Act. Id. V. A. 10 Successor employer status attaches when the following two criteria are met: (1) a new employer conducts essentially the same business as its predecessor, Premium Foods, Inc. v. NLRB, 709 F.2d 623, 627 (9th Cir.1983); and (2) a majority of the workers employed in the new business had been employed by its predecessor. Fall River Dyeing & Finishing Corp. v. NLRB, 482 U.S. 27, 41, 107 S.Ct. 2225, 2234, 96 L.Ed.2d 22 (1987). If these two factors are present, the new employer attains successorship status and is obligated "to bargain with the union representing [its] predecessor's [former] employees." Id. at 29, 107 S.Ct. at 2229. 11 The record clearly demonstrates that as of May 16, 1988, the date that PP & T announced its intention not to recognize the Union, a majority of PP & T production and maintenance employees (41 of 54) had been employed at Phoenix Steel. Further, six months later, practically the same percentage of PP & T production and maintenance employees had worked at Phoenix Steel previously (44 of 58). PP & T does not challenge that at all possible relevant times, a majority of PP & T's production and maintenance workers had formerly been employed at Phoenix Steel. 12 In addition to continuity in the work force, the Board must find continuity of enterprise for it to conclude that PP & T is a successor to Phoenix Pipe. This court in Systems Management set out the seven factors used to determine whether a new business is substantially the same as its predecessor. The factors are 13 1. Whether there has been a substantial continuity of the same business operation; 14 2. Whether the new employer uses the same plant or equipment;3. Whether the same or substantially the same work force is employed; 15 4. Whether the same jobs exist under the same working conditions; 16 5. Whether the same supervisors are employed; 17 6. Whether the same machinery, equipment and methods of production are used; and 18 7. Whether the same product is manufactured or the same service is offered. 19 901 F.2d at 303-04. In applying these criteria, we are mindful that the underlying question is whether "a fundamental change in the nature of the business enterprise [has] occur[ed]." Id. at 304. 20 In its brief, PP & T argues that analysis of the seven relevant factors shows that it is not Phoenix Steel's successor. The ALJ analyzed the same factors and concluded that PP & T was Phoenix Steel's successor, a conclusion that the Board adopted. We cannot say that there is not substantial evidence to support this conclusion. While it is true that PP & T's business is not identical to that of Phoenix Steel, it is substantially similar in all respects. 21 PP & T produces carbon based pipe and tube, essentially the same as that manufactured by Phoenix Steel. About 99 percent of PP & T's production is heavy wall pipe and tube as compared to 75 percent heavy wall production at Phoenix Steel. PP & T sells its products to substantially the same customers as did Phoenix Steel, except for those who purchased light wall and heat treated products (which PP & T does not produce). See Fall River Dyeing & Finishing, 482 U.S. at 44, 107 S.Ct. at 2236 (petitioner's abandonment of converting dying, which had accounted for 60-70 percent of predecessor's business, in favor of commission dying did not indicate change in work environment); Premium Foods, 709 F.2d at 627 (finding successorship even though 98 percent of new business's sales were to food service area as compared to 60 percent for predecessor). In addition, PP & T's primary manufacturing process and use of machinery is essentially identical to that of Phoenix Steel. 22 While not identical to that of Phoenix Steel, the management structure of PP & T is very similar. The vast majority of PP & T management personnel held analogous positions while with Phoenix Steel. See United Food & Commercial Int'l Union v. NLRB, 768 F.2d 1463, 1473 (D.C.Cir.1985) (finding successorship despite difference in some management personnel). 23 As noted above, the vast majority of the PP & T production and maintenance work-force had been employed at Phoenix Steel prior to the plant closing. PP & T, while employing only four job classifications (as compared to 30-35 at Phoenix Steel), utilizes its employees in basically the same positions as did Phoenix Steel. This was done because PP & T determined that it was in its "best interests to put the best operator doing what he knows best." App. at 143. A few production employees perform additional related duties that they did not perform at Phoenix Steel. 24 PP & T emphasizes that there has been a change in some of the terms of employment, such as the hours in the work week and hourly wage. However, we cannot say these dissimilarities qualify as a fundamental difference between the work environments at Phoenix Steel and PP & T. See Systems Management, 901 F.2d at 304 (change from full time to part time employment structure not fundamental). 25 Although PP & T did not purchase all of Phoenix Steel's capital resources, it did acquire the Phoenixville plant and equipment and related real estate, which encompassed "the specific operations involving the union members." NLRB v. Cablevision Devel. Co., 671 F.2d 737 (2d Cir.1982). Thus as far as our inquiry is concerned, PP & T utilizes all of Phoenix Steel's relevant assets. See United Food & Commercial Workers Int'l Union, 768 F.2d at 1472-73 (successorship found even where new business only purchased one of several plants owned by predecessor). 26 The strongest argument PP & T makes against the Board's finding of successorship centers on the last factor to be considered: whether there has been a substantial continuity in business operation. PP & T points to the hiatus between the time of Phoenix Steel's shut down of the Phoenixville plant in March of 1987 and PP & T's re-opening of that facility in May of 1988. PP & T contends that this gap in plant operations destroyed the substantial continuity necessary to find successorship. 27 In Fall River Dyeing & Finishing, the Court noted that "a hiatus is only one factor in the 'substantial continuity' calculus and this is only relevant when there are other indicia of discontinuity." 482 U.S. at 45, 107 S.Ct. at 2237. As discussed above, the working conditions at the Phoenixville plant today are very similar to those existing when Phoenix Steel ran the plant. Except for the hiatus, all other factors support a finding of successorship. As such, the hiatus is of minimal relevance here. See Fall River Dyeing & Finishing, 482 U.S. at 45, 107 S.Ct. at 2237 (successorship despite seven month hiatus); United Food and Commercial Workers Int'l Union, 768 F.2d at 1472 (successorship even with year and a half gap). 28 In addition, we note that on the eve of the Phoenixville plant closing, Phoenix Steel plant manager, Ronald Anderson, explained to plant employees that while they were "indefinitely" laid off, he was optimistic that someone would purchase the plant. These employees were also aware of Phoenix Steel's efforts to maintain the plant after the shutdown in the hope that someone would buy the plant and operate it as a steel mill. Phoenix Steel employees saw maintenance supervisors and Anderson enter the plant during the period following the shutdown. Employees also continued to attend union meetings in order to keep abreast of any ongoing negotiations to sell the plant. 29 These facts support the conclusion that the employees had a "legitimate expectation[ ] in continued representation," Fall River Dyeing & Finishing, 482 U.S. at 43, 107 S.Ct. at 2236, and that therefore, "[v]iewed from the employees' perspective, ... the hiatus may have been much less than" the actual thirteen month shutdown. Id. at 45, 107 S.Ct. at 2237. Therefore, we conclude that the Board's determination that PP & T is a successor to Phoenix Steel is supported by substantial evidence. B. 30 Next we address PP & T's contention that it did not violate the Act because it had a reasonable good-faith belief that the Union lacked the support of a majority of the production and maintenance employees. In general, when an employer and a union enter into a collective bargaining agreement, the union's majority status is irrebuttably presumed during the term of that agreement. NLRB v. Rockwood Energy and Mineral Corp., 942 F.2d 169, 173 (3d Cir.1991). Once the collective bargaining agreement expires, the presumption of majority support becomes rebuttable. Id. This may be done in either of two ways. The employer may either demonstrate that the union in fact no longer has majority support or establish that it had a reasonable good-faith doubt as to the union's majority support. Destileria Serrales, Inc. v. NLRB, 882 F.2d 19, 20 (1st Cir.1989). To rebut the presumption the employer must present " 'clear, cogent, and convincing evidence,' " N.T. Enloe Mem. Hosp. v. NLRB, 682 F.2d 790, 794 (9th Cir.1982) (quoting NLRB v. Tahoe Nugget, Inc., 584 F.2d 293, 297 (9th Cir.1978), cert. denied, 442 U.S. 921, 99 S.Ct. 2847, 61 L.Ed.2d 290 (1979)), and must demonstrate that its belief was based on objective considerations. Bryan Mem. Hosp. v. NLRB, 814 F.2d 1259, 1262 (8th Cir.), cert. denied, 484 U.S. 849, 108 S.Ct. 147, 98 L.Ed.2d 103 (1987). Last, any evidence presented to establish a reasonable good-faith doubt must unequivocally indicate the loss of employee support. N.T. Enloe Mem. Hosp., 682 F.2d at 794. 31 PP & T limits its arguments to the second prong of the test, i.e., that it had a reasonable good-faith doubt as to its employees' continued majority support for the Union. PP & T points to three sets of objective evidence, all of which were rejected by the Board, to support its position. First, it claims that 24 production and maintenance workers clearly indicated that they were not interested in union representation. While the ALJ found that only nine of these statements denoted unequivocal expressions of disinterest in union representation, the Board assumed for purposes of its opinion that "the statements of [all] 24 employees ... were a clear repudiation of the Union...." Board Op. at 3. This assumption notwithstanding, the Board concluded that because the statements were not received from a majority of the 54 unit employees when PP & T rejected the Union's recognition request, this evidence did not provide objective support for a good faith belief that the Union did not enjoy majority support. 32 Moreover, we note that Chairman Stephens agreed with the ALJ that the circumstances of the statement made were "a far cry from a forthright rejection of union representation." All of these employees' statements were made to PP & T management personnel either during job interviews or shortly after being hired and were made against the background knowledge that PP & T intended to open the plant on a nonunion basis. As the Court noted in Fall River Dyeing & Finishing: 33 after being hired by a new company following a layoff from the old, employees initially will be concerned primarily with maintaining their new jobs. In fact, they might be inclined to shun support for their former union, especially if they believe that such support will jeopardize their jobs with the successor or if they are inclined to blame the union for their layoff and problems associated with it. 34 482 U.S. at 40, 107 S.Ct. at 2234 (footnote omitted). Because there was not a majority of employees who evinced a desire to forego union representation, we need not decide whether we could infer that the kind of pressure alluded to by the Supreme Court influenced the statements of the employees in this case. 35 Next, PP & T refers this court to two newspaper articles that it claims suggested that the Union no longer enjoyed majority support. The Board did not discuss these articles in its opinion. Both articles are, at best, ambiguous on the question of Union support by PP & T employees. Such nonspecific indirect evidence cannot provide a basis to overturn the Board's conclusion that the employer had not borne its burden to show it entertained a good-faith doubt as to union support. 36 Last, PP & T relies on a petition signed by 34 production and maintenance employees to support its claim. However, the petition, which stated, "We The Workers At Phoenix Pipe & Tube Company wish To have the Right to Vote For or against A Union Shop," did not clearly indicate on its face that the signers had decided to reject the Union. As the Board explained, the petition "did not unequivocally repudiate the Union," Board Op. at 3, nor did it "indicate a clear intention by the employees not to be represented by the Union." Id. at 4 n. 3. 37 As we noted above, "[e]vidence presenting only ambiguous inference of loss of majority support for the union is not enough [to support a good-faith doubt]." N.T. Enloe Mem. Hosp., 682 F.2d at 795, and the Board's conclusion comports with this view. See Bryan Mem. Hosp., 814 F.2d at 1262 (affidavits claiming that anonymous employees either did not want union or wanted new election too ambiguous to support good-faith doubt of majority support). 38 Because we find that the Board's conclusions that PP & T is a business successor to Phoenix Steel and that PP & T lacked a reasonable good-faith doubt as to the Union's majority support are supported by substantial evidence, we will enforce the Board's cease and desist order. 1 This provision states in pertinent part: (a) It shall be an unfair labor practice for an employer-- (1) to interfere with, restrain, or coerce employees in the exercise of the rights guaranteed in section 157 of this title; (5) to refuse to bargain collectively with the representatives of his employees, subject to the provisions of section 159(a) of this title.
{ "pile_set_name": "FreeLaw" }
0
4 consecutive down weeks for the #SP500, last matched over a year ago #Fed balance sheet continues to gain very cautiously, now at its highest since the middle of June. Still, at slower pace than last week Focus shifts to US fiscal stimulus next week in the House of Reps https://t.co/f8zpSILm86 #Gold prices have broken lower and while the broader technical structure is constructive, the risk remains for a deeper correction before resumption. Get your $XAUUSD technical analysis from @MBForex here: https://t.co/7p3jPx6nQd https://t.co/nnCSdt6OV5 Forex Update: As of 20:00, these are your best and worst performers based on the London trading schedule: 🇬🇧GBP: 0.00% 🇳🇿NZD: -0.02% 🇯🇵JPY: -0.15% 🇨🇭CHF: -0.23% 🇦🇺AUD: -0.25% 🇪🇺EUR: -0.33% View the performance of all markets via https://www.dailyfx.com/forex-rates#currencies https://t.co/O8Qb7OHZza Commodities Update: As of 20:00, these are your best and worst performers based on the London trading schedule: Oil - US Crude: -0.30% Gold: -0.33% Silver: -0.92% View the performance of all markets via https://www.dailyfx.com/forex-rates#commodities https://t.co/lEALo4Z1M9 The S&P 500 breakdown is testing the first major zone of support and we’re looking for a reaction. Get your S&P500 technical analysis from @MBForex here:https://t.co/JrTNmQ5c7g https://t.co/D79T1134P9 IG Client Sentiment Update: Our data shows the vast majority of traders in Ripple are long at 97.29%, while traders in EUR/GBP are at opposite extremes with 65.04%. See the summary chart below and full details and charts on DailyFX: https://www.dailyfx.com/sentiment https://t.co/lzTHuIgzFQ US Equities Update (Friday Close): $DJI +1.34% $SPX +1.60% $NDX +2.34% $RUT +1.59% $VIX -7.93% Another turbulent week for the Pound with the currency falling 1.6% against the greenback. Get your $GBPUSD market update from @JMcQueenFX here:https://t.co/WjU4oYpmf7 https://t.co/hkow2om7I6 Heads Up:🇺🇸 Fed Williams Speech due at 19:10 GMT (15min) https://www.dailyfx.com/economic-calendar#2020-09-25
{ "pile_set_name": "OpenWebText2" }
0
Blonde Milf Banged Up Her Butt And Sucks Penis Off
{ "pile_set_name": "OpenWebText2" }
0.08
North's Becker revels in special night out On the most basic level, it was just a moment to get dressed up for a big event. By Kris Henry On the most basic level, it was just a moment to get dressed up for a big event. North Medford senior Maryssa Becker may be an outstanding athlete but she's also an 18-year-old girl looking for any chance to be just that. Sunday offered such an opportunity — plus much more — for Becker as an attendee at the Oregon Sports Awards at the Nike World Headquarters. "It was kinda nice to get to put on heels and wear a dress for once and go to a fancy event for a few hours," Becker said Monday. "It was cool to kinda see everyone dressed up, with guys in their suits and all that." The cool factor jumped up that much more during the event when Becker was named the Prep Softball Player of the Year for the Oregon Sports Awards, which included ESPN's Neil Everett as the master of ceremonies. Last spring, Becker posted a 26-0 pitching record and 0.43 ERA with 313 strikeouts in 178 innings to help North Medford claim its sixth state title in program history. "It was awesome," Becker said of her first OSA experience. "It was a great, great show. It was short and to the point but pretty entertaining and we had a really good time." "There were some really motivational speakers and people that won awards that have been in the sports industry for a really long time," she added, "and it was pretty cool to hear what they had to say about being in it so along and how to be successful." Although she was the state's pitcher of the year last season and earned the Gatorade Player of the Year nod for Oregon, Becker said she had no idea the award would be hers until her name was announced by presenter Jordan Poyer, star defensive back at Oregon State and soon-to-be NFL draftee. Other finalists for the softball honor were McNary's Hailey Decker and Heppner's Baily Bennett. "It was very unexpected, I had no idea," said Becker. "I just was kind of shocked when I heard my name and so I kinda got up and made my way to the stage. It all kinda sunk in later in the show that, wow, I really just won that." Each winner was asked to say a few words and Becker used her time to thank her teammates and coaches and family members for always supporting her efforts. She also gave particular praise to catcher and good friend Katie Williamson for "always making me look good." That highlight moment was followed by some nice moments with the other winners on hand, including photo opportunities with Oregon running back Kenjon Barner and OSU head coach Mike Riley. "There was just a lot of people there that were in the sports world that you read about and it was a really cool experience," she said. "It was just a very humbling experience," added Becker. "Just to see everybody's hard work, not only mine but all athletes of Oregon, and how much time goes into it and when you think the limits can't be pushed farther, they really can be pushed farther. It was neat to see how many people were influenced by their coaches and other players and it made me realize how much I've been influenced by everyone in my life, from my coaches and my family." This was the first season that individual Oregon School Activities Association (OSAA) sports were recognized at the Oregon Sports Awards and the first year that the general public was eligible to vote on the finalists. Another key thing about Sunday for Becker was that it was also finally the end to being praised for honors gained from last year's performance. With the first day of spring practice only two weeks away, the Louisville-bound senior is looking forward to making new moments on the softball diamond. "I am so ready," said Becker, who is also the team's top returning hitter. "I don't know if I'm ready for the weather because it's been nice having basketball inside but I'm looking forward to it. I'm really excited about getting this softball season started." U IT'S PRETTY RARE but the harshest penalty leveled by the OSAA's Executive Board during its Feb. 4 meeting proved to be against the Eagle Point cheerleading program and head coach Jordan Gieg. The Executive Board levied a $2,000 fine against the school and ordered the appearance by coach Gieg and an EPHS administrator to speak on this matter before the board. She was also not allowed to coach the cheerleading team at this past weekend's state championships. The action stems from an intentional OSAA violation that was reported on Jan. 9. The Executive Board determined that the cheer coach knowingly allowed two of her cheerleaders to violate the OSAA Attached/Unattached Policy. Their report stated that she had direct communication with the OSAA office prior to the violation and still chose to violate the rule. The policy states that a high school team shall not compete against an unattached team (for example a club team), that students representing a high school shall not compete against unattached individuals and that students shall not represent a high school and compete as unattached on the same day at the same venue/facility. Assistant coaches for the Eagles are Hillary Daves, Bruce Gieg and Lisa Hammonds. The closest penalty to that levied against Eagle Point, which has appealed the ruling, was for the Henley wrestling team and coach Pete Lucas after the team pulled out of competition one day into the Oregon Wrestling Classic. Henley was assessed a $1,500 fine and Lucas and a school administrator were ordered to appear before the Executive Board. The bulk of fines levied by the OSAA were for $500 and under. Crater was assessed a $250 fine and ordered to forfeit a game it already lost after it was determined boys basketball head coach John Parent was ejected and was not out of sight or sound for the remainder of the contest on Dec. 1 at South Eugene.
{ "pile_set_name": "Pile-CC" }
0
Sexy teen lets dad finger her fuck her and swallows his cum after sex
{ "pile_set_name": "OpenWebText2" }
0.057971
Verified Answer I believe you've got it right on pointing to the second path mentioned above. My test lucene.net index is at S:\LuceneDotNetIndex. There are two locations in arachnode.net that need to be set for lucene.net to function properly. 1.) In CrawlActions.config. This location instructs ManageLuceneDotNetIndexes.cs as to where the index is located or should be located. The current code in SVN has a relative path listed and this should function as downloaded. Mine is changed as I have the indexes on a seperate volume. 2.) In Web.config. This configuration setting enables Search.aspx, et. al. to return search results. I need to add Server.MapPath or a friendly exception or something to make it a bit clearer what you need to do to enable searching. (and remove the incorrect hardcoded path) All Replies I believe you've got it right on pointing to the second path mentioned above. My test lucene.net index is at S:\LuceneDotNetIndex. There are two locations in arachnode.net that need to be set for lucene.net to function properly. 1.) In CrawlActions.config. This location instructs ManageLuceneDotNetIndexes.cs as to where the index is located or should be located. The current code in SVN has a relative path listed and this should function as downloaded. Mine is changed as I have the indexes on a seperate volume. 2.) In Web.config. This configuration setting enables Search.aspx, et. al. to return search results. I need to add Server.MapPath or a friendly exception or something to make it a bit clearer what you need to do to enable searching. (and remove the incorrect hardcoded path) Super let me make these tweaks and see if I can get the search stuff working. So, can you explain a bit what role arachnode is playing and what role lucene.net is playing? Are the indexes and other data created in the lucenedotnetindex folder dependant on the arachnode data being stored? Or is it two separate sets of data being created during the crawl, the db stuff for reporting and such and the lucene stuff for searching? Thanks much for laying this out. Look forward to making these tweaks and seeing what's what. 1.) Are the indexes and other data created in the lucenedotnetindex folder dependant on the arachnode data being stored? Somewhat. The option currently exists to not submit every content type except WebPages to the database. I have a feature slated to choose whether content discovered by arachnode.net is stored on disk, in the database, both, or not at all. So, you could use arachnode.net to crawl, and keep state, but not store any content. Or, you could duplicate the content in triplicate if you wanted to. The settings *insert are how you elect to submit or not submit content to the database. Content types can be parsed (extracted) for use by plugins, but may not be required by your particular application to be stored. Certain settings are required when crawling to enable the lucene.net functionality. For example: 'extractWebPageMetaData' must be enabled, as this creates the on-disk content locations and data and also extracts the text of the WebPage for lucene.net indexing. But, you don't have to insert the WebPage meta data. I'd like to add a check when crawling to verify your current crawling configuration as certain configuration settings are non-sensical. 2.) Or is it two separate sets of data being created during the crawl, the db stuff for reporting and such and the lucene stuff for searching? This is also correct. The data in the database is primarily for reporting and data mining, etc. Yet, you can search the data in the database with SQL Full Text Indexing. Full Text Indexing is enabled in 4 locations and arachnode.net keeps track of the proper full text index types so you can use IFilters to search .pdf's, .mp3's, etc. Look at the table 'DataTypes' to learn more about mappings between Content-Type (HTML Response Header) and FullTextIndexType. It's too bad that SQL FTI isn't better at what it does. While it is quite good at transparently managing its indexes, as you say, there isn't much control over the indexes and the results. The synonym functionality is helpful but limited in that it isn't possible to have more than one synonym roll up to more than one parent word - but, that's a completely different forum post altogether. You are correct the webpagemetadata setting is enabled so I'm good there. I changed the two config file locations for the lucene index directory to be a hard-coded path, to see if that gets the search working. Looks like it's updating the files in that folder (doing a crawl now) so I'll wait for it to finish then see if things work. Question: I assume I need to let the crawl complete and not kill it via Visual Studio otherwise the files may not get updated properly and the search might bomb. Correct? Oh yes another quick question. There is not already any code in the build that allows for console or web entry of a new site to crawl - correct? I assume there's just sample code in the console app and I could tweak that to build a console or web submitter. Which leads me to another (final) question for now: Ideally it might be nice for submissions to be able to go to a holding queue where they can be reviewed before being actually crawled. For example, a site may be building a search engine for a specific topic or set of sites and they'd want to limit crawls. I know, this would lead to any discovered domains needing to be queued for review as well which could become a large list. That got it! Hard-coding the path to the lucene dot net index directory seems to have gotten it working. I'm thinking however that these lucene data files are completely re-created every time I do a crawl. Is this correct? Clearing out the db via the SP and doing another run to check things out more... I haven't had any problems interrupting a crawl. Lucene.net seems to do a good job maintaining state. You can start and stop crawls at will and you should still be able to search over the indexes. If you want to insert CrawlRequests to the database from an API, create an instance of ArachnodeDAO.cs. Use the method: InsertCrawlRequest. This will insert CrawlRequests directly into the CrawlRequests database table. You are right about priority in the database. Look at the stored procedure: dbo.arachnode_omsp_CrawlRequests_SELECT. Here would be the best place to perform initial filtering. Part of what you've touched on I plan to elucidate upon in our post about ordered crawling.
{ "pile_set_name": "Pile-CC" }
0
* xx xxxxxxx xx xxxxxx. * xxx xxxxxxx xxxx xx xxxxxxxxxxx xx: * xxxxxxx xxxxxxx: xxxxx xxxx xxxx xxxxxxx xxxxxxx xxxxxxxx xxxxxx xx xxxxxxx xxx xxxxxxxxx, xxx x xxxxx xxxxx xxx xxxxxxxx xx xxx xxxxxx xxxx xxx xx xxxxxxxxx xx xxxx. xxxxx xxxxxxx xx xxx xxxx xx xx xxxxxxxxx, xxx xxxx xxxxxx xx xxxxxxx xxxx xxx xxxxxxx'x xxxxxx xxx. xx xxxxxxxx xxxxxxxxxxxxx xxxxxxxx. * xxxxxxxxx xxxxxxx: xxxxx xxxx xxx xxxxx xx xxxxx xxx xxxxxxxx xxxxxxxxx xx xxx xxxxxxxx, xxx xxxxx xxxxx xxxx xxxx xxxxx xxxxxxxxxxxx xx xxx xxxxxxxxxxx xxxx xxx xx xxxxxxxxx xx xxxx. xxxxx xxxxxxx xxx xx xxxxxxxxx xxxxxx xxx-xxxx xxxxx (xx xx xxxxxxxxxx) xx, xx xxxxxxxxx xxxxxxxx xxxxxxx xx xxxxxxxx xx xxxxxx xxx xxxxxxx xxxxxxx xx xxx xxxxxxx, xxxxxx xxx xxxx xxx. xxxxx xxxxxxxxxx xxx xxxx xxxx xx xxxxxxxxx xxx xx xxxxx xxx xxxxx xxxxx xxx xxxx xxx xxxx xxxxxxxxx. xxxxxxxx xxxxxxxxxxxxx xxx xxxx-xxxxxxxxx, xxxx xx xxxxxx xxx xxxx. * xxxxx xxxxxxx: xxxxx xxxx xxxxxx xxxx xxxxxxx xx xxxxxxx x xxxxxxxxxxx xxxxxx, xxxxxxx xx xxxxxxx xxxxxxxxxxxx. xxxxx xxxxxxx xxxx xx xxxxxxxxx xxxxxx xxx-xxxx xxxxx. xxxxxx xxxxxxxxx xxx x xxxx xxxxxxxxx, xxxx xx x-xxxx. * xxxx xxx x xxxxxx xxxxxxx xxxx: xxxxx xxxxxxx xxxx xx xxxxxxxx, xxx xxxxxxx xxx xxx xxxxxx, xxx xxxxx, xxx xxxxxxxxx xxx xxxxxxx xxxx xxx xxxxxxx xxxxxxxx xxxx, xxx xxxx-xxx xxxx, xxx xxxxxxxx xx xxx xxxx, xxx xxx xxxxxxxx xx xxx xxxxxxxxx xxxx-xxx. * xxx xxxxxxxxxxxx xxxxxxxxxxx (x.x.x. xxx xxxxxxxx xx xxxxxxx xxxxxxxx, xx xxxxxxxx xxxxxx, xxx.), xxx xxxxxxx xxxxxxxxxxx xx x xxxxxx xxxxxxx xxxx xxxx xx xxxxxxxxx: x xxxx-xxxxxx xx xxxx-xxxxx xxxxxxxx xx xxx xxxxxxxxxx. * xxx xxx xxxx xxxxxxx xxx, xx xxxxx xxxxxx xx xxxx xx xxx xxxxxxx'x xxxxxx xxx. xxxxxxxx xxxxxxx xxxxxx xx xxxx xxx xxxxxxx xxxxxxx. x xxxxxx xxx xxx xxxxxxx xxxx xx xxxx xx xxxxxxxx. xxxxx xxxxxxxxxxxxx xxxxxx xx x xxxxxx xxxx xx xxxxxxx xxxx xxxx xxxxxx'x xxxxxx xxx xxx xxxx xxxxxxx xxx xxxxxxxxx xxxxxxxxxxx: * xxxxxxxxx xx xxxxxx xxxxxxx xxxxxx xxxx xxxxxx (xx xxxxx xxxxxx xx xx xxxxxxxxxx). * xxxxxxxxxxx xx xxxx xxxxxxx xxx. * xxxx xx xxxxx xxxxxxx xx xxx xxxxxx. * xxxx xxx xxxx xx xxxxxx xx xxxx-xx-xx xx:xx xxx (xx xxx) xxxxxx. * xxxx xxx xxxxxxxx xx xxxxxxxxxxx xx xxxxxx. * xxxxxx xx xxxxxxx xxxx xx xxxxxxxx xxxxxxx xxx xxxx xxxx xx xxxxxx xxxxx-xxxxxxxxxxxx xxxxxx xxxxxxxxxx xxxxxxx. xxxxxxxx xxxxxxx xxx xx xxxxxxxx xx xxxxxxxxxxx xx xxxx xxxx. * xx x xxxxx xxxx: * xxxx xxxxxxx xxxxxx xxxx x xxxxx-xxx xxx xxxxxx xxxxxxx, xxxxxxxx xxxxxxx, xxx xxxxxxxx xxxxx xxxxxxx xxxx xxxxxxxx xxxxxxx, xx xxx xxx. xxxxxxx, xxxx xxxxxx xxx xxxx xx xxx xxxxxxx xx xxx xxxxxx xx xxx xxxxxxx xxxxxx -- xxxxx xxx, xx xxxxx xxxxxx xxxxx xx xxxxx xxx xxxx xxxxxxxx -- xxx xxxx xxxxx xxx xxx xxxxxxxx xx xxxxxxxxx xxxxxx-xxxxxxxx xxxxxxxx.
{ "pile_set_name": "Github" }
0.053602
Whats Happening at Anarchist World! I Thank You You led me into sorrow, There in darkness, For the first time I felt my own power, As I was torn in half And there I first grew wings That carried me to the sun I’m not angry, I thank you You destroyed my heart.
{ "pile_set_name": "Pile-CC" }
0
<?php /* * This file is part of the Symfony package. * * (c) Fabien Potencier <fabien@symfony.com> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Symfony\Component\HttpFoundation\File; use Symfony\Component\HttpFoundation\File\Exception\FileException; use Symfony\Component\HttpFoundation\File\Exception\FileNotFoundException; use Symfony\Component\HttpFoundation\File\MimeType\MimeTypeGuesser; use Symfony\Component\HttpFoundation\File\MimeType\ExtensionGuesser; /** * A file in the file system. * * @author Bernhard Schussek <bschussek@gmail.com> * * @api */ class File extends \SplFileInfo { /** * Constructs a new file from the given path. * * @param string $path The path to the file * @param Boolean $checkPath Whether to check the path or not * * @throws FileNotFoundException If the given path is not a file * * @api */ public function __construct($path, $checkPath = true) { if ($checkPath && !is_file($path)) { throw new FileNotFoundException($path); } parent::__construct($path); } /** * Returns the extension based on the mime type. * * If the mime type is unknown, returns null. * * This method uses the mime type as guessed by getMimeType() * to guess the file extension. * * @return string|null The guessed extension or null if it cannot be guessed * * @api * * @see ExtensionGuesser * @see getMimeType() */ public function guessExtension() { $type = $this->getMimeType(); $guesser = ExtensionGuesser::getInstance(); return $guesser->guess($type); } /** * Returns the mime type of the file. * * The mime type is guessed using a MimeTypeGuesser instance, which uses finfo(), * mime_content_type() and the system binary "file" (in this order), depending on * which of those are available. * * @return string|null The guessed mime type (i.e. "application/pdf") * * @see MimeTypeGuesser * * @api */ public function getMimeType() { $guesser = MimeTypeGuesser::getInstance(); return $guesser->guess($this->getPathname()); } /** * Returns the extension of the file. * * \SplFileInfo::getExtension() is not available before PHP 5.3.6 * * @return string The extension * * @api */ public function getExtension() { return pathinfo($this->getBasename(), PATHINFO_EXTENSION); } /** * Moves the file to a new location. * * @param string $directory The destination folder * @param string $name The new file name * * @return File A File object representing the new file * * @throws FileException if the target file could not be created * * @api */ public function move($directory, $name = null) { $target = $this->getTargetFile($directory, $name); if (!@rename($this->getPathname(), $target)) { $error = error_get_last(); throw new FileException(sprintf('Could not move the file "%s" to "%s" (%s)', $this->getPathname(), $target, strip_tags($error['message']))); } @chmod($target, 0666 & ~umask()); return $target; } protected function getTargetFile($directory, $name = null) { if (!is_dir($directory)) { if (false === @mkdir($directory, 0777, true)) { throw new FileException(sprintf('Unable to create the "%s" directory', $directory)); } } elseif (!is_writable($directory)) { throw new FileException(sprintf('Unable to write in the "%s" directory', $directory)); } $target = rtrim($directory, '/\\').DIRECTORY_SEPARATOR.(null === $name ? $this->getBasename() : $this->getName($name)); return new File($target, false); } /** * Returns locale independent base name of the given path. * * @param string $name The new file name * * @return string containing */ protected function getName($name) { $originalName = str_replace('\\', '/', $name); $pos = strrpos($originalName, '/'); $originalName = false === $pos ? $originalName : substr($originalName, $pos + 1); return $originalName; } }
{ "pile_set_name": "Github" }
0
xxx.. x.x.. x.x.. xx..x .x.xx ...x. xx.x.
{ "pile_set_name": "Github" }
0.142857
13:59 Blond Big Tits Fucked in the Pussy and Ass and Blowjob 685 0%
{ "pile_set_name": "OpenWebText2" }
0.058824
Contents USDA rural housing loans are one of the best deals in the housing market today. Your income plays a major role in whether you qualify for one of these loans or. Federal Mortgage Programs For Bad Credit The $1.4 trillion federal student debt market faces a huge issue – transparency – When it comes to federal student lending, the bad news just keeps. was basic expertise around credit and repayment risk, as a well-intentioned Department of Education took the lead in running the. Qualifying for USDA Mortgage Loans. The qualifying requirements for a USDA rural housing mortgage are straightforward. However, there is a catch – the requirements exclude urban areas. The intention of USDA rural home loans is to encourage development in rural areas, thus sidelining the urban population. Qualifying for a USDA-backed mortgage guarantee. Income limits to qualify for a home loan guarantee vary by location and depend on household size. To find the loan guarantee income limit for the county where you live, consult this USDA map and table. USDA guaranteed home loans can fund only owner-occupied primary residences. What Is A Usda Loan What Is a USDA Loan? Are You Eligible for One? – A USDA home loan is a great way to purchase your home without having to save up for a large down payment – or any at all. Start off by checking your income eligibility then start browsing properties in your area. You can use the loan to purchase a new home or renovate an existing home in a rural area. Select a loan program. The USDA offers two loan options for buyers. If you have an income at or below 115 percent of the median income in your area, you might qualify for a Guaranteed Housing Loan. Then you. will qualify buyers with considerably higher ratios. But that may not leave much for other expenses, says Trey. By far the most popular USDA rural housing loan is the Single Family. To obtain this type of loan, you qualify based on your income level and. To apply for a USDA-backed loan, talk to a participating lender. If you’re interested in a USDA direct mortgage or home improvement loan or grant, contact your state’s USDA office. One of the things that makes a USDA loan an attractive financing option is the fact that you don’t have to put any money down to close the deal. That’s a plus for lower-income buyers who may not be able to cough up a bunch of cash all at once. The trade-off is that you’re required to pay mortgage insurance for a USDA loan. · To qualify for USDA-backed loans (loan guarantees), you should have an income that is no more than 15% higher than the median income of the surrounding area. And in order to qualify for a direct housing loan, your income needs to be lower than 50% of the median income of the area. Qualifications For Usda Loans USDA Loan Requirements. To qualify for a USDA loan the requirements are as follows: The property to be financed should be located in one of the USDA designated rural areas. If you have confusions you can take help from the Federal Home loan centres counsellors to determine whether the property is eligible or not. Before 2016, Coloradans Alex and Aussa Lorens were saving up to buy a house; after that they turned their attention to. Home Loans Types Home Loan Types – andromedaloans.com – home purchase loan. This type of loan is a simple home loan that allows you to purchase a new residential property. home improvement loan. If you ever wanted to renovate your home with a new aesthetic look or just wanted to structurally enhance and strengthen it, this type of home loan is what you’re looking for.
{ "pile_set_name": "Pile-CC" }
0
fat bitch sounds
{ "pile_set_name": "YoutubeSubtitles" }
0.058824
Busty brunette goes for the cock in rough Asian porn show
{ "pile_set_name": "OpenWebText2" }
0.052632
Horny masseuse has sex with her client and takes a creampie.
{ "pile_set_name": "OpenWebText2" }
0.05
hot shit
{ "pile_set_name": "Enron Emails" }
0.125
Search form Black Tie section makes its debut Bout time! East County Observer readers now can enjoy what Longboat Observer and Sarasota Observer readers have enjoyed for years — the Black Tie/Arts & Entertainment section. Debuting in all the Observers this week is a new, separate section for Black Tie and Arts & Entertainment. The section is now printed on high-quality, bright-white paper and is an easier-to-handle size.
{ "pile_set_name": "Pile-CC" }
0
The relationship between fatty liver index and bone mineral density in Koreans: KNHANES 2010-2011. Analyses using a nationally representative cohort have revealed that high fatty liver index (FLI) is associated with low bone mineral density (BMD) regardless of insulin resistance in men, thereby supporting the deteriorated bone metabolism in nonalcoholic fatty liver disease (NAFLD). NAFLD is linked to deteriorated bone health. We investigated the association of FLI, a scoring model for NAFLD, with BMD. This was a population-based, cross-sectional study from the Korea National Health and Nutrition Examination Surveys including 4264 Koreans (1908 men and 2356 women). FLI was calculated using body mass index, waist circumference, serum triglyceride, and gamma-glutamyltranspeptidase level. Insulin resistance was evaluated using the homeostasis model assessment-estimated insulin resistance (HOMA-IR) index. BMD was measured using dual-energy X-ray absorptiometry at the lumbar spine, total hip, femoral neck, and whole body. Men had a higher FLI than women, while the HOMA-IR index was similar between men and women. The significant association between FLI and BMD was observed only in men, but not in women. FLI was negatively correlated with total hip, femoral neck, and whole body BMD in men after adjusting for all potential confounders, including HOMA-IR (P < 0.001 to 0.010). Lumbar spine, total hip, femoral neck, and whole body BMD in men showed a decreasing trend as the FLI tertile increased after adjusting for all potential confounders, including HOMA-IR (P for trends < 0.001 to 0.034). In men aged 50 years or older, odds ratios for combined osteopenia and osteoporosis increased across increasing FLI tertiles after adjusting for confounders (P for trends < 0.011 to 0.029). NAFLD is associated with low bone density regardless of insulin resistance in men. These findings suggest an undiscovered direct link between liver and bone that increases the risk of osteoporosis in men with NAFLD.
{ "pile_set_name": "PubMed Abstracts" }
0
This invention relates to thin film photovoltaic devices that utilize Cd rich Hg.sub.1-x Cd.sub.x Te as a variable bandgap material, and to the cathodic electrodeposition of Hg.sub.1-x Cd.sub.x Te thin films with controlled stoichiometry (1-x) and thus with controlled electronic and optical properties. General electrodeposition procedures for CdTe have been given in U.S. Pat. No. 4,400,244 granted to F. A. Kroger, R. L. Rod and M. P. R. Panicker, and assigned to Monosolar, Inc. Briefly, to form a cadmium telluride coating on a conductive cathode, the electrolyte consists of HTeO.sub.2.sup.+ as the source of tellurium and Cd.sup.2+ as the source of cadmium. Discharged HTeO.sub.2.sup.+ ions at the cathode reacts with Cd.sup.2+ and form CdTe deposit on the cathode. More specific conditions for CdTe electrodeposition and details of a process utilized to make thin film heterojunction solar cells using these films have been described in U.S. Pat. No. 4,388,483 granted to B. M. Basol, E. S. Tseng and R. L. Rod and assigned to Monosolar, Inc. Briefly in this patent, a sheet of an insulating transparent material, such as glass, is prepared with, on one side, a transparent conductive film, such as a tin oxide or indium tin oxide (ITO) layer, using conventional deposition techniques. Then a layer of a semiconductor, such as cadmium sulfide is electrodeposited. The combination of the conductive oxide and the cadmium sulfide comprise an n-type wide bandgap semiconductor different from the next layer deposited, which is cadmium telluride. This structure is then heat treated at a temperature between 250.degree. and 500.degree. C. for a time sufficient to convert the CdTe film to a substantially low resistivity p-type semiconductor compound. A conductive film, such as gold is then deposited on the cadmium telluride to complete the photovoltaic cell which receives radiation through the glass substrate and the n-type semiconductor acting as a wide bandgap window. Heat treating the cadmium telluride was found to increase the power output of the photovoltaic cell by a factor of 60. It is believed that, in the absence of heat treatment, the electrodeposited cadmium telluride is a high resistivity n-type material and the cadmium sulfide serves as an electron injecting contact to one surface of the CdTe film rather than a rectifying contact. When the top conductor (e.g., gold) is deposited over the surface of the CdTe film, an n-CdTe/Au Schottky barrier is obtained. This is intrinsically a low efficiency structure. When heat treated (before depositing the Au), substantially all of the CdTe is converted to p type, due apparently to the generation of electrically active Cd vacancies. This shifts the barrier from the n-CdTe/Au interface to the CdS/p-CdTe interface and gives a high efficiency heterojunction structure. Hg.sub.1-x Cd.sub.x Te is a very important infrared detector material. Its bandgap is a function of its stoichiometry and can be changed from 0 to 1.5 eV going from x=0.17 to x=1.0. So far the interest in this material has been limited to the infrared applications. Early work on Hg.sub.0.795 Cd.sub.0.205 Te detectors (sensitive at .lambda.=8-12 .mu.m) was later followed by investigation of structures that are suitable for use in the 1-3, 3-5, and 15-30 .mu.m range. All these applications require a Hg rich material (x&lt;0.5). A survey of previous literature shows no successful attempt of utilizing Cd rich (x&gt;0.5) mercury cadmium telluride for solar cell applications. Hg.sub.1-x Cd.sub.x Te crystals can be prepared by techniques well known in the art (such as Bridgman growth, zone melting, and Czochralski). Epitaxial growth can be achieved by (liquid phase epitaxy LPE) and (vapor phase epitaxy VPE). There has not been much work on polycrystalline thin films of Hg.sub.1-x Cd.sub.x Te. From this review of the prior art, it is apparent that there has been a failure to appreciate the potential of cadmium rich polycrystalline Hg.sub.1-x Cd.sub.x Te for solar cell applications. This may partly be due to the difficulties associated with the preparation of such films in an inexpensive way and with controlled stoichiometry. Again the review of the prior art shows the lack of an inexpensive method for the production of Hg.sub.1-x Cd.sub.x Te films. The property of bandgap control for Hg.sub.1-x Cd.sub.x Te is extremely important for high efficiency stacked cells where two or more cells respond to different parts of the solar spectra. In the area of thin-film amorphous cells, there has been extensive research on variable bandgap alloys (such as amorphous Si-Ge alloys) that would be compatible with the top amorphous Si cell. But until this invention there has not been any success in finding a variable bandgap polycrystalline thin film that can be controllably and inexpensively produced and utilized.
{ "pile_set_name": "USPTO Backgrounds" }
0
Fucking the Bitch Out of Him
{ "pile_set_name": "OpenWebText2" }
0.071429
It's a "myth" because changing the sensor size does nothing more than crop any given image circle. In truth it's the focal length and aperture of the lens that define the depth of the field. Since cameras with smaller sensors also tend to have lenses with shorter focal lengths, this means smallers sensors and greater depth of field are typically linked. Ah haaaa!
{ "pile_set_name": "Pile-CC" }
0
Rough deep brutal ANAL and pussy fuck, sex in both holes, big asshole, pov
{ "pile_set_name": "OpenWebText2" }
0.067568
We are create porn video and sex video titles. xxx video
{ "pile_set_name": "OpenWebText2" }
0.052632
She Licks My Balls While I Cum On Her Tits. Amateur Footjob And Handjob.
{ "pile_set_name": "OpenWebText2" }
0.055556
what day is good for you? Bryan Hull 06/30/2000 01:13 PM To: Eric Bass/HOU/ECT@ECT cc: Subject: Re: League is Set I will be in Baltimore that weekend. Can we try another day? I'll be at a family reunion all day long. Bryan
{ "pile_set_name": "Enron Emails" }
0
Glen Carroll Glen Carroll (born January 8, 1960) is an American musician, songwriter, record producer and lead vocalist. Carroll wrote and recorded "Like A Rolling Stone", the "Top 10 Album" in 2013 (according to 'The Aquarian Weekly' writers). Early life Glen Edward Carroll was born in Springfield, Massachusetts, on January 8, 1960. He and his sister were raised in a military family. When he was 12, he moved with his family to Ramstein, Germany, where he first began playing guitar. At age 15, Carroll moved to Lakenheath, England, and started his first band, "Skip Church and the Choir Boys". Carroll returned to the United States in the summer of 1976. Carroll attended and graduated Summerville High School, Summerville, South Carolina, the College of Charleston, and William Howard Taft College of Law (JD). Music career Glen Carroll formed Sticky Fingers in 1989 after serving in the U.S. military as a pilot. At first, Carroll performed as the band's drummer. However, after the band went through several vocalists a month, Carroll became the band's vocalist. For the next 25 years, Carroll lead the band as singer and business manager. In 2008, Steven Kurutz published "Like a Rolling Stone". Carroll was the main character in the book and his photograph is featured on the cover. At the time of publication, Carroll had toured every year for 18 years. In 2013, the band released an album called "Like a Rolling Stone." Carroll wrote the songs, and all the musicians that took part in making of the album had performed or recorded with The Rolling Stones. Releases The first EP called "Travelin' Man" was released in September 2004. Glen Carroll attributes it to the times he's spent moving and traveling in 80s. Glen also wrote and released the album, "Like a Rolling Stone" in November 2012. The album includes original works in the styling of 1960s–1970s classic rock inspired by the sounds of the Rolling Stones. Band on the album includes musicians who have played with the Rolling Stones: Waddy Wachtel on guitar, Kenny Aronoff on drums, Bobby Keys on sax, Ian McLagan on keys, Bernard Fowler on backup vocals, and Kenny Aaronson on bass. "Like a Rolling Stone" was co-produced by Andy Johns, a British sound engineer, and record producer, who worked on several well-known rock albums by the Rolling Stones, and a series of albums by Led Zeppelin. Artwork for the album was created by John Pasche. Pasche designed the "Tongue and Lip Design" logo in 1971, which was originally reproduced on the "Sticky Fingers" album by the Rolling Stones. Pasche designed tour posters for the Rolling Stones between 1970 and 1974 and also worked for other reputed artists, such as Paul McCartney, and The Who. Track listing of the "Like a Rolling Stone" album One Way Street (G. Carroll) You Baby You (C. McCarty, G. Mallabar) I Miss The Good Times (G. Carroll) Knockin' On Heaven's Door (B. Dylan, [G. Carroll – third verse]) As Good As It Gets (G. Carroll) Tribute (G. Carroll) At First Sight (G. Carroll) Christine (G. Carroll) Lady Blue (G. Carroll) White Roses (G. Carroll) Her Very Last Time (G. Carroll) Awards and nominations Independent Music Awards |- |rowspan="3" style="text-align:center;"|2016 |rowspan="3" style="text-align:center;"| "Good Times" | Best Adult Contemporary Song | Billboard Awards Best Rock / Blues Song | |- | Best Cover / Rock | |- | Best Rock / American | |- |rowspan="2" style="text-align:center;"|2012 |style="text-align:center;"| "Like A Rolling Stone" | 2012 Top Ten Album | |- |style="text-align:center;"| "Like A Rolling Stone" | 2012 Top Billboard Songwriter | Television Carroll appeared in the American variety television show The Jenny Jones Show as the musical guest on Friday, October 17, 1997. References External links Official Band Website Twitter YouTube channel Category:20th-century American singers Category:21st-century English singers Category:American male singers Category:American male songwriters Category:United States Army officers Category:Living people Category:The Rolling Stones Category:1960 births
{ "pile_set_name": "Wikipedia (en)" }
0
E ~%TTORB~EP GENERAL OF%%CXAS February 25, 19 2 : Honorable W. G. Woods, Jr. Opinion No. M-1071 District Attorney Liberty County Re: Entry of Judgment in P. 0. BOX 431 Criminal Cases Liberty, Texas 77575 Dear Mr. Woods: This is in response to your recent inquiry in which you posed the following two questions: 1. Does the law require separate forms or drafts of judgments and sentences to be prepared for approval and signature of the trial court in felony cases separate and apart from the entry of the court's pronouncement of judgments and sentences in the minutes and the court's signature certifying to the minutes at the end of the term? 2. If your answer to my first question is affirmative, then whose duty is it to prepare such drafts of judgments and sentences for the court's approval and signature? Article 37.12, Texas Code of Criminal Procedure, provides: "On each verdict of acquittal or conviction, the proper judgment shall be entered immediately. . ." Article 42.01, Texas Code of Criminal Procedure, defines a judgmemt as "- D o the declaration of the Court entered of record. . *" Article 42.02, Texas Code of Criminal Procedure, defines sentence as follows: "A 'sentence' is the order of the court in a felony or misdemeanor case made in the presence of the defendant, except in misdemeanor cases where the maximum possible -5250- Honorable W. G. Woods, Jr., page 2 (M-1071) punishment is by fine only, and entered of record, pro- nouncing the judgment, and ordering the same to be carried into execution in the manner prescribed by law." Unlike the procedure in civil cases contained in Rules 300 through 314, Texas Rules of Civil Procedure, the Code of Criminal Procedure is silent concerning the necessity of a separate written judgment and sentence in criminal cases. Review of the decisions of the Court of Criminal Appeals also reveals nothing determinate of whether the judgment of the Court may be announced orally and subsequently "entered" in the written record or must be first reduced to writing and signed by the Judse and then entered into the record. In Barber v; State, 374 S.W.2d 246, (Tex.Crim. 1964), the Court stated: "While the action of the Clerk of the County Court in waiting as long as a year before performing the ministerial act of entering the judgment into the minutes of the Court is not to be condoned, we cannot agree that reversible error has been committed. The better practice seems to be to enter the judgment contemporaneously with its pronouncement, but delay in making the entry will not invalidate the judgment where no injury is shown to have resulted to the appellant." (Emphasis added.) Although this case makes it clear that the actual entry of the judgment in the minutes of the Court is an obligatory duty of the Clerk, it apparently remains discretionary with the Court whether or not he should direct the clerk to also prepare separate written judgments and sentences to be filed among the papers in each cause. We find no authority for requiring counsel for the State (or the Defendant) to prepare such written documents. SUMMARY In criminal cases it is discretionary with the Court whether judgments and sentences shall be announced orally and subsequently entered by the clerk or prepared in writing by the clerk -5251- I , Honorable W. G. Woods, Jr., page 3 (M-1071) and signed before being entered in the minutes. eneral of Texas Prepared by Howard M. Fender Assistant Attorney General APPROvED: OPINION COMMITTEES Kerns Taylor, Chairman W. E. Allen, Co-Chairman Bob Lattimore Barton Boling Gilbert Pena Dunklin Sullivan SAMUEL D. BCDANIEL Staff Legal Assistant ALFRED WALKER Executive Assistant NOLA WHITE First Assistant -5252-
{ "pile_set_name": "FreeLaw" }
0
INTRODUCTION {#SEC1} ============ Dendritic cells (DCs) are antigen presenting cells that express Toll like receptors (TLRs) and C-type lectin receptors (CLRs) that mediate the detection of microbial pathogens and stimulate DCs to induce appropriate immune responses against bacteria and fungi. Dectin-1 belongs to the CLR family of receptors and mediates DCs recognition of β-glucan carbohydrates, which are produced by various species of fungi including *Candida albicans* and *Aspergillus fumigatus* ([@B1]). Upon ligation by β-glucan, dectin-1 undergoes Src kinase-mediated phosphorylation of the immunoreceptor tyrosine-based activation motif (ITAM), docking of Syk and activation of the phospholipase C (PLC)-gamma2-dependent Ca^2+^-calcineurin/nuclear factor of activated T-cells (NFAT) signaling pathway ([@B2],[@B3]). Alternatively, DCs stimulation through dectin-1 can also lead to Syk/Raf1-mediated activation of both canonical and non-canonical NF-kB signaling pathways ([@B4]--[@B8]). While these upstream components of Ca^2+^-calcineurin/NFAT signaling in DCs are well documented, the downstream signaling events in the Ca^2+^-calcineurin/NFAT signaling pathway remain poorly defined, and their potential impact on DCs function is currently unclear. NFATc1/2 have already been shown to exert potent effects on host immune responses. In myeloid lineage cells, including DCs, microbial activation of NFATc1/2 critically regulates the expression of several key cytokines including IL2 ([@B9]--[@B13]), as reviewed in ([@B14]). NFATc2-dependent IL-2 production by DCs has been shown to play a key role in the priming and activation of lymphocyte populations including regulatory T cells (Treg) ([@B15]), and modifies NK cell function *in vivo* ([@B16]--[@B19]), hence this transcription factor regulates several key pathways that shape the host response to invading pathogens. In contrast to NF-κB signaling, which regulates the immune response to infection in both vertebrates and invertebrate species, the first appearance of NFAT family members around 500 million years ago coincided with the appearance of vertebrates and the development of adaptive immunity ([@B20]). This suggests that Ca^2+^-calcineurin-NFAT signaling may have evolved to overcome the unique challenges of increasing organismal complexity, acting as a mechanism to regulate antigen-specific immune responses in order to protect against autoimmune pathologies and prevent chronic inflammation. This concept is supported by the ability of NFAT family members to modulate leukocyte cytokine expression during both innate and adaptive immune responses, indicating a key role for the NFAT transcription factors in controlling the balance of inflammation versus regulation in host tissues. Indeed, NFATc2 in particular has previously been implicated in cell fate regulation and apoptosis induction in lipopolysaccharides (LPS)-stimulated DCs, which is an essential mechanism for limiting inflammatory responses to microbial pathogens ([@B21]). It is surprising therefore that so few gene targets of NFAT have been identified to date, which has restricted the therapeutic manipulation of this pathway for clinical benefit in human inflammatory diseases. The transcription factor NFAT was first discovered over 25 years ago and was initially identified as a regulator of T cell activation genes ([@B22]), hence NFAT has, until recently, been thought to modify immune responses only within the lymphocyte compartment. Indeed, the potent Ca^+^-calcineurin/NFAT inhibitor drugs CsA and FK506 are widely used to prevent allograft rejection in human patients, and the efficacy of these drugs is thought to depend on inhibition of IL-2 synthesis by graft-derived and patient T-cells. However, experiments in rodent models have demonstrated that inhibition of Ca^2+^-calcineurin/NFAT signaling can also lead to decreased cytokine production by DCs during fungal infection ([@B23]), suggesting that the effects of NFAT inhibition on non-lymphoid cell types may contribute to the therapeutic efficacy of these drugs. Indeed, we and others have previously shown that Ca^2+^-calcineurin/NFAT signaling is a common feature of myeloid cells, and of DCs in particular ([@B14],[@B21]). However the impact of Ca^2+^-calcineurin-NFAT signaling on DC function and the influence of this pathway on host protection against pathogens is currently unknown. In order to assess the role played by NFATc2 in shaping DC responses to microbial antigens we conducted genome-wide mapping of NFATc2 binding sites in activated murine DCs. To achieve this, we stimulated the well-characterized long-term murine splenic DC line (D1) ([@B24]) with the dectin-1 ligand curdlan ([@B21],[@B25]--[@B28]), either in the presence or absence of NFAT inhibitors, and used unbiased ChIP-seq technology to map NFATc2 binding sites and profile ligand/inhibitor-induced changes in gene expression. By integrating ChIP-seq data with gene expression profiles, we demonstrate that NFATc2 occupancy is responsible for curdlan-mediated gene activation, and we present the first exhaustive list of NFATc2-regulated genes in DCs. The NFATc2 target genes incorporated an extensive range of DC-derived cytokines and chemokines, including regulatory cytokines such as IL2, IL23a and IL12b. In addition, our data reveal that NFATc2 recruitment is essential for the induction of the H3K4me3 epigenetic mark which is associated with enhanced gene expression in curdlan-stimulated DCs, thus indicating that this epigenetic modification is associated with NFATc2 binding. MATERIALS AND METHODS {#SEC2} ===================== Cell culture {#SEC2-1} ------------ The murine DC line (D1) was cultured as previously described ([@B9],[@B24]) In brief, cells were maintained in Iscove\'s modified Dulbecco\'s medium (IMDM; Sigma, St. Louis, MO, USA) containing 10% heat-inactivated fetal bovine serum (Gibco-BRL, Gaithersburg, MD, USA), 100-IU/ml penicillin, 100-μg/ml streptomycin, 2-mM L-glutamine (all from Sigma) and 50-μM β-mercaptoethanol. The cultures were supplemented with R1 supernatant from NIH3T3 fibroblasts transfected to express GM-CSF (30% of total DC culture volume). The D1 cells were infected with lentiviral vectors and DCs displaying low-level internal ribosomal entry site green fluorescent protein (IRES-GFP) expression, were sorted and expanded for use in chromatin immunoprecipitation (ChIP) experiments ([@B29]). Bone marrow cells from 8--12-week-old C57BL/6 mice were cultured in IMDM (containing 10% heat-inactivated fetal calf serum (FCS) (Life Technologies), penicillin 100 U/ml, streptomycin 100 μg/ml and 10% B16-GMCSF growth supernatant for 7 days. On day 8, mature bone marrow-derived DCs (BMDCs) were stimulated with 10-μg/ml curdlan in the absence or presence of 200-ng/ml FK506 for experiments. Immunofluorescence {#SEC2-2} ------------------ D1 cells were seeded into 8 well μ-slides (Ibidi) and rested for 2 h before stimulation with curdlan (10 μg/ml) for various times prior to fixation in 2% paraformaldehyde (PFA). The cells were then re-suspended in permeabilization buffer (0.1% saponin in D-PBS containing 5-mg/ml bovine serum albumin and 0.2% gelatin), immunolabeled with antibodies against NFATc2 (Thermo Scientific) or V5 tag (Invitrogen) and finally counter-stained with 4\', 6-diamidino-2-phenylindole (DAPI) and anti-Alexa488 antibody (Life technologies). Chromatin immunoprecipitation {#SEC2-3} ----------------------------- ChIP assays were conducted using D1 cells that were stably expressing NFATc2 with a C-terminal V5 tag ([@B29],[@B30]). Briefly, cells were treated with 1% formaldehyde for 10 min at room temperature to cross-link transcription factors to chromatin. The formaldehyde was then inactivated by addition of 125-mM glycine. Sonicated chromatin extracts containing DNA fragments with an average size of 500 bp were immunoprecipitated using 6-μg mouse IgG (Santa Cruz Biotechnology) or V5 control monoclonal antibodies (Invitrogen) with pre-blocked protein G-Sepharose beads and then incubated overnight at 4°C. The following day, the chromatin-protein-antibody-bead complexes were eluted and the ChIP DNA was extracted. For all ChIP experiments, quantitative polymerase chain reaction (PCR) analyses were performed in real time using the ABI PRISM 7900 sequence detection system with SYBR Green master mix (Promega). Relative occupancy values were calculated by determining the immunoprecipitation efficiency (quantity of immunoprecipitated DNA expressed as a ratio of total input) for a given region of interest compared with the control region. ChIP-seq identification of NFATc2 binding sites {#SEC2-4} ----------------------------------------------- ChIP-seq libraries were prepared from a total of 10 or 20-ng starting DNA using the Illumina TruSeq DNA version 2 kit according to the manufacturer\'s protocol, with the following modifications; 30X adaptor dilution and 18 PCR cycles of amplification. Batches of five to eight samples were sequenced as a multiplex in individual lanes of an Illumina HiSeq 2000 apparatus using a single-end run (1×51) together with the SBS kit v3. Reads were mapped to the mouse genome (version mm9) with bowtie 1 ([@B31]) using default parameters. The MACS 1.4.1 program was then used with default settings to detect peaks of ChIP enrichment ([@B32]) relative to a control data set that was generated using input material from the same cell line. Luciferase reporter assays {#SEC2-5} -------------------------- The promoter regions including the Zfp206-binding sites for IL2, IL12b and IL23a were cloned into pGL3-basic vector (Promega). A dual luciferase system (Promega, Madison, WI, USA) was used. For the luciferase assay in 293T cells, 4 × 105 cells were seeded into one well of a 24-well plate. After 18 h, 275 ng of luciferase reporter plasmid, 1 ng of plasmid pRL-SV40 and either 1 μg of NFATc2 overexpression vector or empty vector were co-transfected into the cells using Lipofectamine 2000 (Invitrogen). The pRL-SV40 plasmid served as an internal control for normalizing the transfection efficiency. After 40 h of transfection, the 293T cells were lysed, and the luciferase activity was determined with the dual luciferase system (Promega) using a Centro LB960 96-well luminometer (Berthold Technologies). Microarray expression analysis {#SEC2-6} ------------------------------ Affymetrix Mouse Gene 1.0ST Arrays were used to profile gene expression in curdlan-stimulated D1 cells (2- or 4-h exposure) that had been treated or not with 200-ng/ml FK506 for the duration of culture. Total RNA was isolated by acid guanidinium thiocyanate-phenol-chloroform extraction (Trizol, Invitrogen) followed by Qiagen RNeasy clean-up procedure. Total RNA integrity was assessed by Agilent Bioanalyzer and RNA Integrity Number (RIN) was \>9.1 for all samples. Target ssDNAs were prepared using WT Expression Kits (Ambion/Affymetrix) according to the Affymetrix protocol, then fragmented and hybridized to standard arrays for 17 h at 45°C. The arrays were washed and stained using the fluidics station prior to analysis using a GeneChip Scanner 3000. Bioinformatics analysis {#SEC2-7} ----------------------- Data were normalized using the Robust Multi-Array Average approach ([@B33]) and differential gene expression was determined using Limma ([@B34]) in R v2.15.2. A Benjamini-Hochberg-corrected *P*-value \<0.05 and a cut-off fold-change value of ≥1.5 were applied to identify genes that displayed statistically significant changes in expression. Motif analysis {#SEC2-8} -------------- For each library, three groups of 600 randomly selected peaks were created. For each peak, an ∼200-bp genomic sequence within ±100 bp of the peak max was analyzed. For each group of 600 sequences, a motif was generated using default parameters in MEME ([@B35]) (*P*-value \<0.05) with mode set to 'One Occurrence per Sequence' ([@B35],[@B36]). Transfac motif database (version 2012.4) was used to obtain the consensus sequence of the NFAT binding motif (ID: V\$NFAT_Q6, sequence: NANWGGAAAANN). The NFATc2 co-motif analysis was performed on the 423 peaks found near the genes differentially expressed in D1 cells treated or not with 200-ng/ml FK506 for 2 h. The peak sequences were screened for known motifs in the TRANSFAC database and the results were filtered out using core score cutoff = 1. Data access {#SEC2-9} ----------- The data from this study have been submitted to the NCBI Gene Expression Omnibus (GEO) (<http://www.ncbi.nlm.nih.gov/geo>) under accession numbers GSE59896 and GSE59998. RESULTS {#SEC3} ======= A tagging system for genome-wide mapping of NFATc2 binding sites in DCs {#SEC3-1} ----------------------------------------------------------------------- The NFAT family of transcription factors regulates anti-microbial cytokine responses in myeloid lineage cells, but the mechanisms underpinning NFATc2 signaling in DCs and the influence of this pathway on DC function remain poorly defined. We therefore sought to identify the genome-wide binding targets of NFATc2 in the murine DC cell line D1 using ChIP-coupled high-throughput sequencing (ChIP-seq) to identify physical binding of this transcription factor to specific regions of DNA ([@B37],[@B38]). While there are various antibodies against NFATc2 available from commercial sources, none of those tested here were able to yield enrichment of NFATc2 at known target regions of the IL-2 gene promoter (Supplementary Figure S1; ([@B22])). We therefore used an alternative V5 protein tagging approach to conduct the NFATc2 ChIP assays ([@B29],[@B39]), together with a GFP reporter gene under the control of IRES to identify transgene-expressing cells (Figure [1A](#F1){ref-type="fig"}). Quantitative RT-PCR and western blotting indicated that the ratio of tagged transgene expression to endogenous gene expression was less than 1.2:1 (Figure [1B](#F1){ref-type="fig"} and [C](#F1){ref-type="fig"}). We also confirmed that DC expression of tagged NFATc2 did not significantly alter cytokine production, NFATc2 signaling or DC maturation; in curdlan-stimulated DCs, we observed that both transgenic and endogenous NFATc2 displayed comparable translocation dynamics (Figure [1D](#F1){ref-type="fig"} and [E](#F1){ref-type="fig"}) and that mRNA expression of IL1A/B, IL2, IL12B/23A, tumor necrosis factor alpha (TNFα) and surface expression of DC maturation markers were not significantly altered by transgene expression (Figure [1F](#F1){ref-type="fig"} and Supplementary Figure S2). Finally, we used an anti-V5 mAb to confirm recruitment of NFATc2 to its known target site in the TNF promoter region (Figure [1G](#F1){ref-type="fig"}) ([@B40]). Together, these data validated our novel V5 tagging approach/ChIP-seq method of identifying NFATc2 binding sites in murine DCs. ![NFATc2-expressing D1 cells can be identified by low-level V5 tag expression. (**A**) Flow cytometry analysis of GFP+ NFATc2-expressing D1 cells. (**B**) Quantitative RT-PCR analysis of NFATc2 mRNA levels in NFATc2-tagged D1 cells. Samples of cDNA were prepared from D1 cells and NFATc2-V5-expressing D1 cells and then interrogated using specific primers for NFATc2 and the housekeeping gene Actb. Data are expressed as fold difference relative to non-transduced D1 cells (bars indicate standard error of the mean of three biological replicates). (**C**) A total of 15-μg protein derived from either control D1 cells or NFATc2-tagged D1 cells was labeled with antibodies against V5, NFATc2 and GAPDH. (**D**) NFATc2 nuclear translocation kinetics was assessed by microscopy in D1 cells after immunolabeling for NFATc2 or V5 tag. (**E**) NFATc2 translocation kinetics.(**F**) Quantitative PCR analysis of cytokine mRNA levels in NFATc2-tagged D1 cells. Samples of cDNA were prepared from curdlan-stimulated D1 cells (2- or 4-h exposure) and then interrogated using specific primers for the house keeping gene Actb and various cytokine genes. (**G**) Chromatin immunoprecipitation of V5-tagged NFATc2 protein was carried out using an anti-V5 antibody (or anti-REST control). ChIP DNA was interrogated by qPCR using primers against the IL2 and TNF promoters. Data are presented as mean ± SD of triplicate experiments.](gku1369fig1){#F1} Global mapping of NFATc2 binding sites in murine DCs {#SEC3-2} ---------------------------------------------------- NFATc2-bound DNA fragments were obtained by ChIP using an anti-V5 antibody and were then subjected to ultra-high-throughput sequencing on the Illumina HiSeq 2000 platform. For NFATc2 ChIP-seq, 1.4 million sequence reads were uniquely mapped to the mouse genome, and a total of 10 187 binding peaks were identified in the proximity of 6887 target genes using the MACS algorithm. The distribution of NFATc2 binding sites was analyzed using a similar annotation to that described previously (gene desert, 5′ distal/upstream promoter, 5′ proximal, intragenic, 3′ proximal, 3′ distal; Figure [2B](#F2){ref-type="fig"}) ([@B41]). Using this approach, we observed that 46% of NFATc2 binding sites were located within a known gene, 7% were situated within a proximal promoter and 12% within a distal promoter (Figure [2C](#F2){ref-type="fig"}). This profile of binding sites is common among transcription factors ([@B41]), and, accordingly, we observed that transcriptional start sites (TSSs) were enriched in the vicinity of NFATc2 binding sites (Figure [2D](#F2){ref-type="fig"}). ![Genome-wide mapping of NFATc2 binding sites by ChIP-seq analysis of murine DCs. (**A**) Table shows the number of uniquely mapped reads, the number of peaks identified and the number of genes associated with the peaks. (**B**) Schematic diagram illustrating how binding site locations were defined; 5′ distal, 5′ proximal, 3′ proximal and 3′ distal sites in the regions 100 kb upstream and 100 kb downstream of the transcriptional unit. (**C**) Pie chart illustrating the distribution of NFATc2 binding sites in relation to genes. (**D**) Line chart showing NFATc2 binding site distribution relative to the nearest TSS. (**E**) *De novo* prediction of the NFATc2 binding motif using MEME software. (**F**) Examples of NFATc2 binding loci within IL2, IL12b and Il23a promoter region were shown.](gku1369fig2){#F2} Consistent with ChIP-seq data, we observed NFATc2 enrichment at 12 randomly selected binding peaks that were analyzed by ChIP-PCR (Supplementary Figure S3), and inhibition of NFAT translocation using FK506 reduced the recovery of these regions by ChIP (Supplementary Figure S3), thus confirming the specificity of transcription factor binding to these sites. We therefore proceeded to determine the NFATc2 consensus binding sequence using the MEME algorithm, which generated three distinct binding motifs from three sets of 600 randomly selected peaks (each being located within ±100 bp of a binding peak max). Consistent with reports from other investigators, we identified the NFATc2 binding motif as 5-′GGAAAA-3′ (Figure [2E](#F2){ref-type="fig"}) ([@B42],[@B43]). NFATc2 mediates dectin-1 activation of a range of cytokine and chemokine genes in DCs {#SEC3-3} ------------------------------------------------------------------------------------- DCs produce a plethora of cytokines and chemokines that play critical roles in immune regulation. Several key modulatory cytokines have been shown to depend on NFAT family members for their expression, so we hypothesized that at least a subset of DC-derived cytokines and chemokines were likely to depend on NFATc2 for their transcription. We therefore extracted a list of cytokines that were identified by NFATc2 ChIP-seq (Supplementary Table S1), and, consistent with previous findings, we observed that NFATc2 binds to several known target genes including IL-2, TNF, IL-10, GM-CSF, Egr2 and Egr3 (Figure [2F](#F2){ref-type="fig"} and Supplementary Table S1). In addition, we detected NFATc2 binding to multiple pro-inflammatory cytokine genes including IL1a, IL1b, IL17d and IL22, but also IL12b and IL23a that were previously identified as targets of NF-κB (Figure [2F](#F2){ref-type="fig"}) ([@B44]). We also identified several chemokine genes that were occupied by NFATc2 (Supplementary Table S1). Of these, CXCL2 has previously been shown to be regulated by NFAT in microglia ([@B45]), and Cxcl8 expression was reported to depend on NFAT in adenocarcinoma cells ([@B46]). We next sought to determine which NFAT-responsive genes in DCs were modulated by activation through dectin-1. To do this, we designed a microarray experiment to compare the gene expression profiles of DCs exposed to curdlan for 2 or 4 h, with DCs that were co-treated with curdlan and NFAT inhibitors, and untreated control DCs. Using a cut-off fold-change value of 1.5 (*P* \< 0.01), we identified a number of genes that were significantly differently expressed following curdlan treatment and/or by NFAT inhibition (Supplementary Table S2). We also discovered that the majority of NFAT-regulated genes required dectin-1 activation to modulate their expression (Figure [3A](#F3){ref-type="fig"}). In total, we identified 515 genes whose expression was upregulated by dectin-1 stimulation and 323 whose expression was downregulated. Of these, the expression of 171 genes was upregulated dependent on NFAT, and 82 were downregulated: within this set, 135 genes were common targets for upregulation by both dectin-1 and NFAT, representing 26.2% of the total dectin-1-activated genes, and 78.9% of NFAT-activated genes, suggesting that the NFAT pathway is one of the multiple downstream signaling pathways that can be activated by dectin-1 ligation in DCs. We also detected upregulation of several known NFAT target genes in curdlan-stimulated DCs, including IL2, Egr2 and Egr3 ([@B2]). ![NFATc2 targets a subset of dectin-1-modulated cytokine and chemokine genes. (**A**) Venn diagram displaying the number of genes modulated by dectin-1 and/or by NFAT inhibitor FK506 with curdlan stimulation of murine DCs. The data indicate a statistically significant overlap of NFATc2 target genes with dectin-1-regulated targets. (**B**) Moving average genes in a window of 50 genes that are within 20 kb of NFATc2 ChIP-seq binding site are shown. Significantly differentially expressed genes were identified by comparing DCs stimulated with curdlan for 2 h with either non-treated controls or with DCs co-treated with curdlan and the NFAT inhibitor FK506 for 2 h (*P* \< 0.05). (**C**) Heat map displaying cytokine clustering. (**D**) Heat map displaying chemokine clustering.](gku1369fig3){#F3} To further understand how NFATc2 contributes to gene modulation in DCs, we next plotted the fold change in expression level for each gene versus the fraction of those genes that displayed NFATc2 occupancy (Figure [3B](#F3){ref-type="fig"}). As expected, NFATc2 occupancy was enriched among NFAT-responsive target genes, but we also observed over-representation of NFATc2 binding among the upregulated but not downregulated genes in curdlan-stimulated DCs, suggesting that this transcription factor mediates early activation of target sequences rather than exerting suppressive effects (Figure [3B](#F3){ref-type="fig"}). Indeed, NFATc2 targets were substantially enriched among the differentially expressed genes in curdlan-stimulated DCs at 2 h, but not at 4 h (data not shown), and heat-map clustering identified several distinct groups of NFATc2-modulated cytokine and chemokine genes whose expression level and sensitivity to NFAT inhibition varied over time (Figure [3C](#F3){ref-type="fig"} and [D](#F3){ref-type="fig"}). Group 1 cytokines (IL2, IL12b, IL23a, TNFSF15, EDN1, CLCF1 and CSF1) were induced at both 2 and 4 h, and were moderately impaired by NFAT inhibition (Figure [3C](#F3){ref-type="fig"}). Group 2 cytokines (NDP, IFNγ, CSF2, AREG, SPP1, TNFSF8, TNSF14 and TNFSF18) displayed a similar temporal expression pattern to group 1 but exhibited greater sensitivity to inhibitor treatment (Figure [3C](#F3){ref-type="fig"}). Finally, group 3 cytokines (IL6, IL10, CD70, TNFSF 4 and TNFSF10) were induced only after 4 h (Figure [3C](#F3){ref-type="fig"}). Group 1 chemokines (CCL1, CCL2, CCL4, CCL7 and Cxcl10) were significantly induced by NFAT and repressed by the inhibitor at both 2 and 4 h, whereas group 2 chemokines (CCL5, CXCL3, CCL24, CXCL9) were also inhibitor-sensitive but were significantly induced only after 4 h of curdlan stimulation (Figure [3D](#F3){ref-type="fig"}). Together, these data indicate that NFATc2 is responsible for mediating the early activation of cytokine and chemokine genes in dectin-1-activated murine DCs. NFATc2 directly modulates cytokine and chemokine gene expression in DCs via histone modification {#SEC3-4} ------------------------------------------------------------------------------------------------ We next integrated NFATc2 ChIP-seq data with gene expression data in order to identify the direct targets of NFATc2 regulation (defined as sites within 30 kb of a TSS that displayed both increased NFATc2 binding upon dectin-1 stimulation, and decreased binding in the presence of FK506). Using this approach, we identified a total of 21 cytokine and chemokine genes that were directly regulated by NFATc2 in DCs (Supplementary Table S3). In order to confirm NFATc2 regulation of the cytokine and chemokine genes identified by microarray, we next used qPCR to verify mRNA expression levels and successfully validated expression level changes in 16 of the 21 candidate genes (Supplementary Figure S4). We also measured the expression levels of these cytokine genes in BMDCs to confirm that the results from D1 cells were representative of primary DCs. We found that IL2, IL12b and IL23a gene expression was similarly induced by curdlan stimulation and inhibited by Fk506 treatment (Figure [4](#F4){ref-type="fig"}). In addition, the other selected NFATc2 target cytokine was also induced and repressed by curdlan and FK506 treatment, respectively, except Cxcl3 (Figure [4](#F4){ref-type="fig"}). ![Expression of NFATc2 target genes in mouse BMDCs. Quantitative PCR analysis of cytokine mRNA levels in non-treated (NT), FK506-, Curdlan- and Curdlan+FK506-treated BMDCs. Samples of cDNA were prepared and then interrogated using specific primers for the house keeping gene Actb and various cytokine genes. Data are presented as mean ± SD of triplicate experiments.](gku1369fig4){#F4} Specific histone modifications correlate with gene expression level, and H3K4me3 in particular is a well-established marker of active genes ([@B47]). Having demonstrated that NFATc2 binding functionally activates target genes, and given the rapid translocation and brief retention time of this transcription factor in the nucleus (Figure [1](#F1){ref-type="fig"}), we hypothesized that dectin-1 activation of DCs promotes NFATc2 translocation to the nucleus, where it binds to specific sequence motifs and recruits H3K4me3 to mediate chromatin opening and induce gene expression. To test this hypothesis, we performed ChIP-PCR to assess H3K4me3 occupancy of NFATc2 target genes at different time points after DC exposure to curdlan. We observed H3K4me3 marks in association with all NFATc2-regulated target genes within 2 h of curdlan stimulation, and H3K4me3 occupancy continued to increase over time (Figure [5A](#F5){ref-type="fig"}). However H3K27me3 occupancy was not affected (Figure [5B](#F5){ref-type="fig"}). The direct involvement of NFATc2 in the observed epigenetic modifications was evidenced by reduced H3K4me3 occupancy following treatment with the NFAT inhibitor FK506 (Figure [5C](#F5){ref-type="fig"}), and increased occupancy when NFATc2 was overexpressed (Figure [5D](#F5){ref-type="fig"}). The luciferase promoter reporter assay further confirmed the direct activation of NFATc2 to its target cytokine gene IL2, IL12b and Il23′s promoter (Figure [5E](#F5){ref-type="fig"}). In addition, overexpression of NFATc2 in DC led to significantly greater increases in gene expression of several target cytokines than in DC expressing normal levels of NFATc2 when both were stimulated with curdlan (Figure [5F](#F5){ref-type="fig"}). Taken together, NFATc2 is therefore required to mediate epigenetic modifications that drive cytokine and chemokine gene expression in activated DCs. Genome-wide mapping of H3K4me3 by ChIP-seq revealed NFAT-dependent enrichment of this mark at the IL2, IL12b and IL23a genes, but not at the non-cytokine gene Sox2 which is silent in DCs (Figure [6A](#F6){ref-type="fig"}). This enrichment was abrogated by exposure to the NFAT inhibitor FK506 (Figure [6A](#F6){ref-type="fig"}), clearly showing that NFATc2 is both specific and essential for mediating H3K4me3 enrichment at cytokine/chemokine genes in curdlan-activated DCs. Accordingly, we observed preferential association of NFATc2 with H3K4me3-modified genes that displayed upregulated expression in curdlan-stimulated DCs (Figure [6B](#F6){ref-type="fig"}), thus providing further evidence that NFATc2 plays a key role in epigenetic modification of gene activity in DCs. ![NFATc2 recruitment is associated with enrichment of histone modification H3K4me3 at active genes. (**A**) Chromatin immunoprecipitation was conducted using an anti-H3k4me3 antibody in D1 cells that had been stimulated with curdlan for 1--4 h. (**B**) Chromatin immunoprecipitation was conducted using an anti-H3k27me3 antibody in D1 cells that had been stimulated with curdlan for 1--4 h. (**C**) Chromatin immunoprecipitation was conducted using an anti-H3k4me3 antibody in D1 cells that had been stimulated with curdlan in the absence or presence of the NFAT inhibitor FK506. (**D**) Chromatin immunoprecipitation was conducted using an anti-H3k4me3 antibody in D1 cells that had been lentivirally transduced with a construct encoding NFATc2, or empty vector, before stimulation or not with curdlan for 2 h. (**E**) Luciferase reporter analysis. The luciferase reporter constructs containing the promoter of the indicated Zfp206 target genes were co-transfected into HEK293T somatic cells together with an NFATc2 expression construct or empty vector. (**F**) Measurement of mRNA levels in D1 cells by qRT-PCR. cDNA samples from D1 cells lentivirally transduced with a construct encoding NFATc2, or empty vector, before stimulation with curdlan for 2 h were interrogated with primers against IL2, IL12b and IL23a genes. Raw data were normalized to the housekeeping gene Actb and expression levels are presented relative to ActB. ChIP DNA was interrogated by qPCR using primers specific for IL2, IL12b and IL23 against polymerase primers. Fold-change values were normalized to the ChIP DNA detected in non-treated D1 cells. Data are presented as mean ± SD of triplicate experiments. \**P* \< 0.01.](gku1369fig5){#F5} ![Genome-wide mapping of H3K4me3 in DCs treated with curdlan in the absence or presence of NFAT inhibitors. (**A**) NFATc2 promotes H3K4me3 modification of active genes but not silent genes in murine DCs. Examples of H3K4me3 loci at active cytokine genes IL2, IL12b and IL23a in DC stimulated or not with curdlan, either in the absence or presence of the NFAT inhibitor FK506. For comparison data from the silent non-cytokine gene Sox2 and the Actb housekeeping gene are presented alongside. Input DNA was used as control. (**B**) Preferential recruitment of NFATc2 to H3K4me3-modified target genes with upregulated expression. Genes with differential H3K4me4 marker expression fold change were identified by comparing ChIP-seq data from DCs treated or not with curdlan for 2 h, in the absence or presence of the NFAT inhibitor FK506. Moving average genes in a window of 50 genes that are within 20kb of NFATc2 ChIp-seq binding site are shown.](gku1369fig6){#F6} NFATc2 peak height and binding proximity to the TSS predicts gene expression level in DCs {#SEC3-5} ----------------------------------------------------------------------------------------- It has been reported that the proximity of a transcription factor binding site to the TSS of a given gene can predict transcriptional activity ([@B29]), so we next assessed whether this applied to NFATc2 binding sites. When we plotted fold-change in expression of NFAT-regulated genes against the distance between the NFATc2 binding site and the TSS, we observed that the genes whose expression was most upregulated were those associated with an adjacent upstream NFATc2 binding site (Figure [7A](#F7){ref-type="fig"}). Dectin-1-activated genes displayed a similar proximity of NFATc2 binding sites to the TSS for the most upregulated genes, thus confirming that peak distance predicts the extent of gene activation, although we also observed a number of outliers that were perhaps regulated by other transcription factors such as NF-kB. We next investigated whether NFATc2 ChIP peak height reflected the transcriptional activity of target genes. When we separated the ChIP peaks according to their height (low, medium, high or very high), and calculated the proportion of activated genes in each fraction, we observed that the percentage of activated genes for NFATc2 peaks of medium to very high height (15--18%) was at least 2-fold greater when compared to 'low' peaks (6%) (Figure [7B](#F7){ref-type="fig"}). These data demonstrated that NFATc2 peak height predicts the transcriptional activity of NFAT-regulated genes. Thus NFATc2 binding peak height and proximity to the TSS influence the level of cytokine and chemokine gene expression in dectin-1-activated DCs. ![NFATc2 peak height and binding proximity to the TSS predict gene expression level in DCs. (**A**) Graph x-axis indicates the relative position of NFATc2 binding peaks relative to the TSS of the target genes, while the y-axis indicates the log~2~-fold change in gene expression in DCs after curdlan stimulation for 2 h, normalized to curdlan in the presence of NFAT inhibitor Fk506 for 2 h. (**B**) The peak height ranges were generated using Seqmonk software and were defined as low (0--20), medium (20--30), high (30--50) or very high (50--100).](gku1369fig7){#F7} DISCUSSION {#SEC4} ========== In the current report we provide evidence that the transcription factor NFATc2 mediates epigenetic modification of DC cytokine responses to dectin-1 stimulation. Our data indicate that NFATc2 signaling is an essential mediator of myeloid cell responses to microbial antigens, consistent with previous reports that dectin-1 signaling in DCs is essential for effective host protection against fungal infections ([@B4]), and suggesting a broader role for NFAT signaling in immune regulation than that originally described in T cells more than two decades ago ([@B14],[@B48]). Although it has long been established that ligation of TLRs/CLRs such as dectin-1 leads to rapid activation of calcineurin/NFAT signaling in DCs, until now the genetic targets of NFATc2 binding in these cells have remained obscure. Our data now reveal a critical role for NFATc2 signaling in regulating the DC response to microbial ligands, which is likely to influence the balance of inflammation versus regulation in infected host tissues. We conducted genome-wide mapping of NFATc2 binding sites in dectin-1-stimulated DCs and integrated our findings with gene expression data to identify the directly regulated targets of this transcription factor. In addition to targets of NFATc2 such as the IL2 and Egr2/3 genes ([@B2]), we also detected NFATc2 regulation of the genes IL12b and IL23a that are required to produce the heterodimeric cytokine IL-23 and promote Th17 differentiation; we also observed a clear influence of NFATc2 on the transcription of genes encoding the growth factors GM-CSF and TGF-β3 that have previously been implicated in pathological Th17 differentiation ([@B49]--[@B51]). Similarly, TNFSF8 (CD153) has been reported to play critical roles in Th17 cell differentiation and proliferation ([@B52]), and our data revealed that NFATc2 directly regulates the expression of multiple TNF family members including TNFSF8, TNFSF14 and TNFSF18. Taken together, these data indicate that NFATc2 targets multiple cytokine genes that have been implicated in inflammatory pathologies across a variety of different tissues. In particular, the evidence of several targets in the Th17 pathway certainly warrants further investigation. We also observed that NFATc2 directly regulated a large group of chemokine genes with broad biological effects; CCL1 has been shown to influence regulatory T-cell function ([@B53]), CCL2 directs DCs to the tumor bed to promote killing of malignant cells ([@B54]), CCL3 contributes to the initiation of chronic myeloid leukemia ([@B55]) and CCL4 suppresses autoimmune destruction of islet β-cells ([@B56]). Furthermore, NFATc2 directly regulated the nur77 (Nr4a1) gene that promotes apoptosis of LPS-stimulated DCs in an NFATc2-dependent manner ([@B21]). Together, these data indicate that NFATc2 regulates a broad range of genes with diverse biological roles in DCs, including those involved in induction of Th17 differentiation, trafficking to peripheral tissues, and also DC survival, which together are likely to influence the outcome of inflammatory immune responses. Among the thousands of NFATc2 binding targets identified here, only a small proportion conferred increased gene expression upon recruitment of NFATc2, which appears to be a common feature of transcription factor binding ([@B29],[@B38]). Instead of exerting uniform effects on transcriptional activity, we observed that NFATc2 peak height and proximity to the TSS influenced the extent of gene activation, analogous to previous reports that have identified these same factors as key determinants of transcriptional repression ([@B29]). It is therefore possible that recruitment of additional co-factors to NFATc2 binding sites modifies the effects of this transcription factor on gene expression ([@B38]). Indeed, we found that the binding motifs of several well-known NFAT co-factors frequently flanked NFATc2 binding sites within directly regulated target genes, including AP1, JunB, JunD, PPAR and NFAT (Supplemental data). An additional influence on gene expression levels is chromatin structure, which is remodeled by epigenetic modifications that control the access of transcriptional machinery to the template DNA. Chromatin remodeling can define different cell lineages, developmental stages and cellular responses to environmental signals ([@B57]), but until now NFAT\'s involvement has remained largely uncharacterized and no genome-wide roles for NFAT in epigenetic modification of gene expression had been reported. We observed a rapid shuttling of NFATc2 between cytoplasm and nucleus, preferential localization of NFATc2 to promoter sequences and H3K4me3 modification of multiple different target genes. In addition, we detected epigenetic modification of numerous different genes in dectin-1-activated DCs, including the cytokine genes IL2, IL12b and Il23a, which lacked H3K4me3 in the steady state but were significantly enriched in this mark following curdlan stimulation, except when in the presence of an NFAT inhibitor. Moreover, we detected preferential recruitment of NFATc2 to H3K4me3-enriched target genes on a genome-wide scale, thus confirming that NFATc2 regulates target gene expression by inducing specific epigenetic modifications. Due to the established role of NFAT in regulating T-cell immunity, the calcineurin/NFAT inhibitors CsA and FK506 have been widely used to treat autoimmune diseases and suppress allograft rejection in human patients ([@B58]--[@B60]). Our study now demonstrates that the NFATc2 regulatory network also influences a broad range of DC functions and modulates the expression of multiple cytokines and chemokines that critically regulate host protection against bacteria and fungi. Improving our current understanding of the roles played by NFATc2-regulated genes in anti-microbial immune responses may therefore lead to the design of new drugs that more effectively target this pathway for the treatment of human inflammatory disorders and autoimmune pathologies. SUPPLEMENTARY DATA {#SEC5} ================== [Supplementary Data](http://nar.oxfordjournals.org/lookup/suppl/doi:10.1093/nar/gku1369/-/DC1) are available at NAR Online. ###### SUPPLEMENTARY DATA We thank Gennaro De Libero, Yun-Han Loh and Chadi EL Farran for their critical comments on the manuscript. We are thankful to Camillus Chua for his technical assistance. We also thank Dr Neil McCarthy and Lucy Robinson of Insight Editing London for critical review of the paper. FUNDING {#SEC6} ======= Funding for open access charge: A-STAR, Singapore. *Conflict of interest statement*. None declared.
{ "pile_set_name": "PubMed Central" }
0
September 3, 2008 fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world fuck the world
{ "pile_set_name": "Pile-CC" }
0.066351
Thai Girl Made To Suck Cock Of Old Man
{ "pile_set_name": "OpenWebText2" }
0.052632
bench9000 XXX
{ "pile_set_name": "Github" }
0.0625
Contact Us About The School of Architecture Library supports the research and teaching needs of the School and is part of the larger Princeton University Library system. Our holdings specialize in modern and contemporary architecture and design, the history and theory of architecture, urban studies, landscape architecture, preservation, and city planning. The collection constitutes approximately 35,000 volumes on-site with thousands more housed in the Research Collections and Preservation Consortium (ReCAP) facility. The library subscribes to more than 300 domestic and foreign periodicals, has a growing collection of rare materials, and a video library.
{ "pile_set_name": "Pile-CC" }
0
Anal hardcore fucking with black shemale on top. She fucks this white guy`s ass without a stop and mercy until she gets cream. Watch this hardcore anal fuck action and enjoy some serious ass fuck scene.
{ "pile_set_name": "OpenWebText2" }
0.049505
3 Months of Amazon Music Unlimited for 99¢ The links in the post below may be affiliate links. Read the Full Disclosure New subscribers to Amazon Music Unlimited can get 3 months of this on-demand music service for just 99¢ total – that’s just 33¢ per month! This service gives you on-demand and ad-free streaming from a catalog of tens of millions of songs with unlimited skips on ALL of your devices! You’ll even get personalized recommendations featuring curated playlists and stations. After your 99¢ promotional period ends, you’ll pay just $7.99/month for Amazon Music Unlimited! Note that your subscription will renew monthly, but you can can cancel at anytime by visiting your Amazon Music Settings.
{ "pile_set_name": "Pile-CC" }
0
Webcam Slut Does Anal and DP on MV
{ "pile_set_name": "OpenWebText2" }
0.058824
22:38 Sexy MILF Squirting Out Milk From Her Tits 100% 2320
{ "pile_set_name": "OpenWebText2" }
0.050847
Anal Threesome HD Now you are watching Anal Threesome HD porn video uploaded to: liebelib.net. Anal Threesome HD mp4 porn video was added together with other online videos, which is related to Anal Incest Threesome Hd and can be find below. Anal Incest Threesome Hd porn videos 05:03 Anal sex threesome tube video 05:03 Anal sex threesome with two girls 12:57 Teen Threesome Fuck HD 32:13 A l y s a, A l i z & P e a c h e s - Anal Lesbian Threesome 05:51 Skinny Threesome HD 09:00 Hardcore anal fucking in HD 12:31 Masked threesome HD 05:11 Amazing Threesome HD 11:43 Anal Pleasure XXX HD 23:36 Anal sex threesome with Cindy Behr 04:50 Threesome Beauty HD 06:15 Big booty anal sex threesome 05:45 Rough Threesome HD 11:47 Sey anal FFM threesome for graduation 05:36 DP Threesome HD 05:15 Anal Tropical threesome with Gina and Zana Sun 05:47 Beautiful Threesome HD 06:32 Anal MILF threesome 06:35 Hot Teen Girls In An Anal Hot Threesome 12:44 HARMONY VISION Anal Harlot Threesome 12:41 PINKO HD Italian Anal Threesome 12:18 PINKO HD The Hospital Threesome 05:00 Sensual Threesome HD 05:40 Pro Threesome HD 05:00 AJ Applegate and Maddy O'Reilly in an anal outdoor threesome 05:08 Lesbian anal sex threesome video 06:28 Titty Threesome HD 05:09 Hd Anal threesome sex with hot bust 07:39 Anal sex threesome video 08:59 Anal assault in HD 06:11 Webcam Blond Anal Free Amateur HD Porn 12:57 PINKO HD Threesome in Italian 05:15 Anal Tropical threesome with Gina and Zana Sun 04:52 Poolside Threesome HD 05:24 Dungeon Threesome HD 12:57 Public outdoor threesome HD 12:57 WCP CLUB Anal Booty threesome in the pool 12:37 Super hot anal gaping threesome 05:28 FirstTime Threesome HD 07:12 Legal age teenager gets sexy incest fucking 07:00 Underground Anal Fucking Threesome 12:26 Iva Zan doing anal sex in HD art porn video clip 11:50 Anal at work HD 05:44 Fetish Threesome HD You watched Anal Incest Threesome Hd free porn tube videos, if you want more Anal Incest Threesome Hd porn videos or some other porn, please use our search form and we will find any porn you want, so enjoy your watching Anal Incest Threesome Hd videos.
{ "pile_set_name": "Pile-CC" }
0.049796
Q: @Cacheable is not able to update In spring framework we have @Cacheable to cache data right. Now my requirement is i want to retrieve all data form database by using Get method. Controller @RequestMapping(value = "/getUploadData", method = RequestMethod.GET) public ResponseEntity<List<Ticket>> getUploadFileData() throws IOException { return new ResponseEntity<>(ticketBookingService.getFileUploadData(), HttpStatus.OK); } Service @Cacheable(value="ticketsCache") public List<Ticket> getFileUploadData() { List<Ticket> listOfData = (List<Ticket>) ticketBookingDao.findAll(); return listOfData; } } output: click image here to check output http://localhost:8080/api/tickets/getUploadData [{"ticketId":1,"passengerName":"Sean","bookingDate":1502649000000,"sourceStation":"Pune","destStation":"Mumbai","email":"sean.s2017@yahoo.com"},{"ticketId":2,"passengerName":"Raj","bookingDate":1502476200000,"sourceStation":"Chennai","destStation":"Mumbai","email":"raj.s2007@siffy.com"},{"ticketId":3,"passengerName":"Martin","bookingDate":1502735400000,"sourceStation":"Delhi","destStation":"Mumbai","email":"martin.s2001@xyz.com"},{"ticketId":4,"passengerName":"John","bookingDate":1503253800000,"sourceStation":"Chennai","destStation":"Mumbai","email":"john.s2011@yahoo.com"}] Now i will do get and put operation by ticketid. Get: Controller: @GetMapping(value="/ticket/{ticketId}") public Ticket getTicketById(@PathVariable("ticketId")Integer ticketId){ return ticketBookingService.getTicketById(ticketId); } Service: @Cacheable(value="ticketsCache",key="#ticketId",unless="#result==null") public Ticket getTicketById(Integer ticketId) { return ticketBookingDao.findOne(ticketId); } http://localhost:8080/api/tickets/ticket/1 {"ticketId":1,"passengerName":"Sean","bookingDate":1502649000000,"sourceStation":"Pune","destStation":"Mumbai","email":"sean.s2017@yahoo.com"} Now when i do update email by using ticketid: Put: controller @PutMapping(value="/ticket/{ticketId}/{newEmail:.+}") public Ticket updateTicket(@PathVariable("ticketId")Integer ticketId,@PathVariable("newEmail")String newEmail){ return ticketBookingService.updateTicket(ticketId,newEmail); } Service: @CachePut(value="ticketsCache",key="#ticketId") public Ticket updateTicket(Integer ticketId, String newEmail) { Ticket upadedTicket = null; Ticket ticketFromDb = ticketBookingDao.findOne(ticketId); if(ticketFromDb != null){ ticketFromDb.setEmail(newEmail); upadedTicket = ticketBookingDao.save(ticketFromDb); } return upadedTicket; } http://localhost:8080/api/tickets/ticket/1/abcd@yahoo.com { "ticketId": 1, "passengerName": "Sean", "bookingDate": 1502649000000, "sourceStation": "Pune", "destStation": "Mumbai", "email": "abcd@yahoo.com" } Now when get data by using ID changes are updating. http://localhost:8080/api/tickets/ticket/1 {"ticketId":1,"passengerName":"Sean","bookingDate":1502649000000,"sourceStation":"Pune","destStation":"Mumbai","email":"abcd@yahoo.com"} Now my Question is if i try to get all data by using above first URL my changes are not reflecting. http://localhost:8080/api/tickets/getUploadData [{"ticketId":1,"passengerName":"Sean","bookingDate":1502649000000,"sourceStation":"Pune","destStation":"Mumbai","email":"sean.s2017@yahoo.com"},{"ticketId":2,"passengerName":"Raj","bookingDate":1502476200000,"sourceStation":"Chennai","destStation":"Mumbai","email":"raj.s2007@siffy.com"},{"ticketId":3,"passengerName":"Martin","bookingDate":1502735400000,"sourceStation":"Delhi","destStation":"Mumbai","email":"martin.s2001@xyz.com"},{"ticketId":4,"passengerName":"John","bookingDate":1503253800000,"sourceStation":"Chennai","destStation":"Mumbai","email":"john.s2011@yahoo.com"}] Suggest me how to reslove this issue A: You cannot bulk update the cache with Spring. Please check the following issue - closed with status declined: Thanks for creating the issue but I am not keen to add this extra complexity to the cache abstraction. It is not meant to manage state for you (the next logical step if we allow this is that we have to keep the returned list in sync with each item). And if we don't we are inconsistent and we merely provide a way to talk to the cache using annotations. That's not very helpful. Back to your example, this is typically what a second level cache is meant to do for you. This is not in the scope of the cache abstraction.
{ "pile_set_name": "StackExchange" }
0
xx 1 N 0 * * xx 2 N 0 * * xx 3 N 0 * * xx 4 N 0 * * xx 5 N 0 * * xx 6 N 0 * * xx 7 N 1 ^"n ! xx 8 N 1 n ! xx 9 N 1 n$ ! xx 10 N 0 * * xx 11 N 1 ^"n ! xx 12 N 1 n ! xx 13 N 1 n$ ! xx 14 N 0 * * xx 15 N 0 * * xx 16 N 0 * * xx 17 N 0 * * xx 18 N 0 * * xx 19 N 0 * * xx 20 N 0 * *
{ "pile_set_name": "Github" }
0.072202
Cum in my new panties after fuck me baby !!!
{ "pile_set_name": "OpenWebText2" }
0.068182
On December 1, when Columbia’s Board of Trustees voted unanimously to create the African American and African Diaspora Studies Department, the cry heard around the University was, “It’s about time!” In reality though, the development is the latest growth spurt in a scholarly interpretation of the black experience that began at Columbia in the early 20th century. Farah Jasmine Griffin, who will be the new department’s first chair, traces its beginnings to the years that Harlem Renaissance literary icon Zora Neale Hurston (BC’28, GSAS’34–35) spent here studying with Franz Boas, a pioneer of modern anthropology who joined Columbia in 1896 and was its first professor in that discipline. Boas was largely responsible for establishing critical studies that drew distinctions between race and culture. His work helped discredit “scientific” theories of race. Hurston’s focus was on her own people: African American folklore, music, customs and—as anyone can read in her novels—ways of speaking. “The study of black life, in the western hemisphere in particular, is something that Columbia has been engaging in, and has been at the forefront of, since Zora Neale Hurston began her work here,” said Griffin, the William B. Ransford Professor of English and Comparative Literature and African American Studies. The new department will bring a fresh approach to the discipline at a crucial moment for race relations and black identity in our society, she added. “Now more than ever, we need to have both an understanding of that history, and of the ways that history contributes to a sense of possibility and vision for the future,” she said. “The creation of this department is right on time because our nation and our world need the kind of knowledge we produce.” First on Griffin’s agenda is adding to the faculty and developing a Ph.D. program, work that will build on the 25- year legacy of the Institute for Research in African-American Studies (IRAAS). Founded in 1993 by the late Manning Marable (whom Griffin hopes to honor with an endowed chair) the multidisciplinary institute has been home to the field at Columbia. With the new department in place and producing the degrees and the research, IRAAS will continue to serve as a bridge between scholarship and public life, developing public programming, conferences and related efforts. “Departments and academic institutions don’t produce knowledge for the moment, they produce knowledge for the long term,” said Griffin, who currently directs IRAAS. She recently spoke to Columbia News about the state of the field of African American and African Diaspora Studies, the new department’s mission, and the social, political and cultural landscape that is the focus of its scholarly eye. Q. Why is it important for this new department to be created at Columbia now? A. It’s an investment in producing a kind of knowledge that is very useful and valuable for our country at any time, but especially at this moment—to remind us of our historical legacy, the ugly part but also the potential of it, and to remind ourselves of a vision of America that might not be what we’re engaging in right now. We also have an institutional commitment to creating just societies. African American and African Diaspora studies have always been at the forefront of studying such questions as what does a vision of a just society look like? What has that experience been like for those people who haven’t experienced our country as a just society? We need to have both an understanding of that history and also of a kind of visionary possibility. Even though we are later than many of our peers in taking this formal institutional step, it feels like we’re right on time because we’re needed right now. Q. The Institute for Research in African-American Studies has been doing this work for some time. How will the creation of the new department change things? A. I always have to remind people that African American and African Diaspora studies at Columbia are much older than IRAAS. What’s happening now is institutionalizing that work in the form of a department, because departments have the most power at universities, they have the most longevity. We haven’t had autonomy of hiring and tenure until now, but in terms of the books that have been produced, the articles, the essays, the classes, the graduates, and the influence—we’ve been doing that. Columbia has a great configuration of people who are widely recognized in the field. Now we are positioned to take a leadership role. We see ourselves as on the cutting edge of Columbia, the future. This is Columbia turning in new and exciting directions. Q. By its nature African American and African Diaspora studies are multidisciplinary. How will the faculty accommodate the new department? A. Our intention is for the faculty to expand. Currently, core faculty members have half-appointments in the Institute for Research in African-American Studies. They will now move to the new department, and we’ll all still be jointly appointed with our disciplines. Our plan is that most new hires will be 100 percent in the new department. We would like to bring in more academics with expertise in diaspora work. Our colleagues Steven Gregory, Frank Guridy, and Kellie Jones already focus on that, but we want to strengthen that area, and in ways that people don’t always think of. We’re also looking at the humanities, another literature position, perhaps adding to the sociology and political science aspects, even an economist, housed in the department. We have very strong relationships with history, with English, with anthropology, and those relationships will be maintained. Q. Does the department’s definition of the diaspora include Africa or just people of African descent in the Americas? A. It’s the Department of African American and African Diaspora Studies. African Studies is still formally housed in the Department of Middle Eastern, South Asian and African Studies, and it will remain there. Africa should be studied all over the University. We’re in conversation about collaborations with African Studies, but I think the students and scholars we attract will be focused on the diaspora. Q. Currently there are programs for both undergraduate and graduate students. Will those curricula change? A.The undergraduate degree and the master’s degree will move into the department. We have a robust course offering, but as we build our faculty we will be less reliant upon the other departments to meet our curricular needs, to have our students meet their requirements. We also will propose a Ph.D. program because our master’s program is basically preparing our students to get doctorates elsewhere. Q. What kind of public programming can we look forward to from the department in its first year? A. We have scheduled our first conference for April 2019, on the state of the field in African American and African Diaspora studies, which will position us as leaders not only producing the knowledge, but as ones who can convene this kind of international gathering. And come fall there will be a symposium in recognition of 1619, marking the arrival of 20 Africans in the Jamestown settlement. Going forward, we will be involved in programming around the multi-year celebration of the Harlem Renaissance “New Negro” movement, because so much of IRAAS’ identity is its connection to Harlem. Q. How did the field’s development lead to the founding of IRAAS? A. The first departments and programs in many other colleges and universities were created in 1968 and 1969, largely because of student unrest. For its part, Columbia established a collection of courses in African American studies taught by adjunct faculty who were Harlem-based intellectuals. Then the University began to hire scholars like Charles Hamilton [a political scientist and civil rights leader who joined Columbia in 1969 and became one of the first African Americans to hold an academic chair at an Ivy League university]. Before the 1990s, many of the institutions created these departments, but didn’t invest in them. That’s when Columbia recruited a high powered, highly visible, highly energetic figure to come and do something with African American studies here, and Manning Marable arrived to create the institute. Because institutes report directly to the provost, IRAAS was pretty well resourced. The push for Ph.D. programs in African American Studies began in the early 2000s. Q. Is this happening as we enter a second civil rights movement? A. The first one never ended. Studying this history teaches us that this is a long struggle, and each generation has its responsibility and role to play. What I do love about this moment is the ways that young people are confronting what we’re up against, and they have been equipped with intellectual tools that I know come directly out of the work that people in this field have done. They use words that were produced 30 years ago in these burgeoning black feminist study groups. I think we’re producing knowledge for today, but we’re also producing knowledge for tomorrow. Q. Black Lives Matter is the movement of the moment. Black or African American, are they different? A. Our initial proposal was for Black Studies. And not many people were comfortable with that, it felt too based in a certain kind of identity, although in the field, and especially theoretically now, Black Studies is being re-embraced. Then we thought about what we actually do. There is this intellectual formation which is African American, and there’s African diaspora, and all of us are engaged in that in some way. We definitely see ways that the work we’ve produced is in a dialogue with what people are doing with Black Lives Matter, and that they are also helping to frame and shape our frameworks and the way we think about things. Q. Do you believe scholars have a responsibility to be political? A. I do. And I think that even those who say they aren’t political are political. African American studies at Columbia has always been engaged in important political questions. Simply by studying a people with the history that people in the diaspora have, showing that they have something to say—that’s political. Toni Morrison has said that slavery always existed, but no other group of slaves wrote more than those who came to the Americas. They wrote and they used the ideals of the Enlightenment that were being used against them. It has been the most consistent intellectual challenge to white supremacy because it imagines other possibilities. Q. How important is Harlem to this field of scholarship? A. Harlem is still central to African American life. For us it will always be central because it’s what makes us unique, that we’re right here and that Columbia’s libraries have been building up a great archive of Harlem intellectuals. New York is an extension of our campus—it’s all the institutions, all the things that are happening here on any given night. And this is where diaspora folk came. Being here changes a conception of what black is that is not true in other places. There’s always been a much more cosmopolitan sense of what black means here. And like I say to my students, Harlem has always had newspapers in all these different languages, English newspapers, Spanish newspapers, French newspapers, meetings in every language, church services. The world is changing, but that’s always been the case for New York.
{ "pile_set_name": "OpenWebText2" }
0
Training of new Anal Sub - BDSM
{ "pile_set_name": "OpenWebText2" }
0.064516
Q: $\sum\binom{n}{a_1}\prod\limits_{p=2}^{k}\binom{n-a_{p-1}}{a_p-a_{p-1}}=k!{n+1\brace k+1}$ We have $$\sum\limits_{0\leqslant a_1<a_2<\cdots<a_k<n}\binom{n}{a_1}\prod\limits_{p=2}^{k}\binom{n-a_{p-1}}{a_p-a_{p-1}}=k!{n+1\brace k+1}$$ where instead of $\{a_1,a_2,\cdots,a_k\}$ we place all possible combinations of $\{0,1,2,\cdots,n-1\}$ without repetitions, for ex. $n=4, k=3$, so all possible combinations are $$\{0,1,2\},\{0,1,3\}, \{0,2,3\}, \{1,2,3\}$$ then $$\binom{4}{0}\binom{4}{1}\binom{3}{1}+\binom{4}{0}\binom{4}{1}\binom{3}{2}+\binom{4}{0}\binom{4}{2}\binom{2}{1}+\binom{4}{1}\binom{3}{1}\binom{2}{1}=60=3!{5\brace 4}$$ How can we prove it? A: Well, $${n+1\brace k+1}k!={n\brace k}k!+{n\brace k+1}(k+1)k!={n\brace k}k!+{n\brace k+1}(k+1)!,$$ Recall that $k!{n\brace k}$ counts the number of surjective functions from $[k]$ to $[n]$ The left hand side is basically saying choose $a_1$ from $n,$ so that $1$ is send to them then choose $a_2-a_1$ from $n-a_1$ that $2$ will be send to. Etc. At the end of the process there is two options, either you finish selecting all of them or they had left. If they were left, then those are gonna be the image of $k+1.$
{ "pile_set_name": "StackExchange" }
0
///////////////////////////////////////////////////////////////////////////// // Name: wx/osx/radiobox.h // Purpose: wxRadioBox class // Author: Stefan Csomor // Modified by: // Created: 1998-01-01 // Copyright: (c) Stefan Csomor // Licence: wxWindows licence ///////////////////////////////////////////////////////////////////////////// #ifndef _WX_RADIOBOX_H_ #define _WX_RADIOBOX_H_ // List box item class WXDLLIMPEXP_FWD_CORE wxBitmap ; class WXDLLIMPEXP_FWD_CORE wxRadioButton ; class WXDLLIMPEXP_CORE wxRadioBox: public wxControl, public wxRadioBoxBase { wxDECLARE_DYNAMIC_CLASS(wxRadioBox); public: // Constructors & destructor wxRadioBox(); wxRadioBox(wxWindow *parent, wxWindowID id, const wxString& title, const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, int n = 0, const wxString choices[] = NULL, int majorDim = 0, long style = wxRA_SPECIFY_COLS, const wxValidator& val = wxDefaultValidator, const wxString& name = wxRadioBoxNameStr) { Create(parent, id, title, pos, size, n, choices, majorDim, style, val, name); } wxRadioBox(wxWindow *parent, wxWindowID id, const wxString& title, const wxPoint& pos, const wxSize& size, const wxArrayString& choices, int majorDim = 0, long style = wxRA_SPECIFY_COLS, const wxValidator& val = wxDefaultValidator, const wxString& name = wxRadioBoxNameStr) { Create(parent, id, title, pos, size, choices, majorDim, style, val, name); } virtual ~wxRadioBox(); bool Create(wxWindow *parent, wxWindowID id, const wxString& title, const wxPoint& pos = wxDefaultPosition, const wxSize& size = wxDefaultSize, int n = 0, const wxString choices[] = NULL, int majorDim = 0, long style = wxRA_SPECIFY_COLS, const wxValidator& val = wxDefaultValidator, const wxString& name = wxRadioBoxNameStr); bool Create(wxWindow *parent, wxWindowID id, const wxString& title, const wxPoint& pos, const wxSize& size, const wxArrayString& choices, int majorDim = 0, long style = wxRA_SPECIFY_COLS, const wxValidator& val = wxDefaultValidator, const wxString& name = wxRadioBoxNameStr); // Enabling virtual bool Enable(bool enable = true) wxOVERRIDE; virtual bool Enable(unsigned int item, bool enable = true) wxOVERRIDE; virtual bool IsItemEnabled(unsigned int item) const wxOVERRIDE; // Showing virtual bool Show(bool show = true) wxOVERRIDE; virtual bool Show(unsigned int item, bool show = true) wxOVERRIDE; virtual bool IsItemShown(unsigned int item) const wxOVERRIDE; // Specific functions (in wxWidgets2 reference) virtual void SetSelection(int item) wxOVERRIDE; virtual int GetSelection() const wxOVERRIDE; virtual unsigned int GetCount() const wxOVERRIDE { return m_noItems; } virtual wxString GetString(unsigned int item) const wxOVERRIDE; virtual void SetString(unsigned int item, const wxString& label) wxOVERRIDE; virtual wxString GetLabel() const wxOVERRIDE; virtual void SetLabel(const wxString& label) wxOVERRIDE; // protect native font of box virtual bool SetFont( const wxFont &font ) wxOVERRIDE; // Other external functions void Command(wxCommandEvent& event) wxOVERRIDE; void SetFocus() wxOVERRIDE; // Other variable access functions int GetNumberOfRowsOrCols() const { return m_noRowsOrCols; } void SetNumberOfRowsOrCols(int n) { m_noRowsOrCols = n; } void OnRadioButton( wxCommandEvent& event ) ; protected: // resolve ambiguity in base classes virtual wxBorder GetDefaultBorder() const wxOVERRIDE { return wxRadioBoxBase::GetDefaultBorder(); } wxRadioButton *m_radioButtonCycle; unsigned int m_noItems; int m_noRowsOrCols; // Internal functions virtual wxSize DoGetBestSize() const wxOVERRIDE; virtual void DoSetSize(int x, int y, int width, int height, int sizeFlags = wxSIZE_AUTO) wxOVERRIDE; wxDECLARE_EVENT_TABLE(); }; #endif // _WX_RADIOBOX_H_
{ "pile_set_name": "Github" }
0
Robert Gross Robert Gross may refer to: Robert A. Gross, American historian Robert A. Gross (physicist) (1927–2018), American physicist and engineering scientist Robert Arthur Gross (1914–1983), American violinist and composer Robert E. Gross (businessman) (1897–1961), businessman in the field of aviation Robert Edward Gross (1906–1988), paediatric surgeon Bob Gross (born 1953), basketball player
{ "pile_set_name": "Wikipedia (en)" }
0
Die "Golden Week" in China beschert Deutschlands Einzelhandel riesige Umsätze. In dieser Woche muss die Mehrheit der Chinesen nicht arbeiten und verreist ins Ausland - mit sehr speziellen Wünschen. So reagieren Händler auf shoppingverrückte Chinesen Anzeige Im Werben um ausgabefreudige chinesische Touristen hat Deutschland gegenüber anderen europäischen Ländern das Nachsehen. Der Grund: Eine penible deutsche Umsetzung der Visa-Regeln für Chinesen nach dem Schengen-Abkommen, die andere EU-Staaten lockerer handhaben. „Die französischen Visa sind viel leichter zu bekommen, weil die Franzosen nicht so strikt wie die Deutschen sind“, sagt ein Manager des großen Reiseveranstalters Ctrip in Peking. Obwohl sich die EU-Staaten des Schengen-Raums einheitlich an die Regeln halten sollten, verlangt Frankreich etwa keine Hotelbuchung oder Originale von Einladungsschreiben mehr. „Das Visa-Verfahren bei der deutschen Botschaft ist viel aufwendiger“, sagt auch Managerin Hu Xiaodan vom Reisebüro Shanzhou Guolü. Auf chinesischen Internetseiten zirkulieren Tipps für Reisende nach Europa, sich besser bei den Franzosen ein Visum zu holen. Mit viel weniger Visa-Beamten vergibt Frankreich viel mehr Visa und konnte so die Zahl der chinesischen Reisenden 2015 deutlich steigern – auf schätzungsweise zwei Millionen Besucher. Wie aus dem Auswärtigen Amt in Berlin verlautete, vergaben die deutschen Auslandsvertretungen in China hingegen etwa 360.000 Schengen-Visa, wenngleich mehr als 80 Prozent zur mehrfachen Einreise und jedes fünfte als Mehrjahresvisum. Anzeige Obwohl Reisebüros und Touristen über hohe Anforderungen klagen, wurde das deutsche Visa-Verfahren im Auswärtigen Amt als „schnell und kundenfreundlich“ beschrieben. Die Mehrzahl der Visa werde innerhalb von 48 Stunden erteilt. Um den Strom besser zu bewältigen, werden gerade mit einem externen Dienstleister in China zehn neue Visa-Antragszentren eröffnet. Seit Anfang März sind drei neue Zentren in den Metropolen Wuhan, Chongqing und Jinan geöffnet. Mehr als 130 Millionen Chinesen im Ausland erwartet Die unterschiedlich strenge Handhabung der Visa-Bestimmungen durch EU-Staaten bestätigte allerdings auch Wei Xiao’an, Direktor der chinesischen Tourismus-Akademie. Er rechnet im nächsten Jahr mit einem Anstieg der Zahl chinesischer Touristen im Ausland um rund zehn Prozent auf mehr als 130 Millionen. Acht skurrile Tipps aus chinesischen Reiseführern 1 von 8 „In Europa lassen Autos den Menschen Vortritt und nicht umgekehrt! Besonders in Skandinavien, Deutschland und den Benelux-Ländern nehmen die Autofahrer Rücksicht. Anders ist es in ... Südeuropa, dort fahren die Leute genauso gern über Rot wie in China.“ Dieses und die folgenden Zitate sind „Fundstücke“ der deutsch-chinesischen Journalistin Xifan Yang, die mehrere chinesische Reiseführer durchforstet hat. Quelle: picture-alliance / dpa 2 von 8 „In Europa werden Dörfer überraschenderweise nicht hässlicher und ärmer, je weiter aufs Land man fährt. Im Gegenteil, je kleiner der Ort, desto putziger ist er.“ Quelle: picture alliance / empics 3 von 8 „Wer den Rhein entlangfährt, bekommt drei Länder auf einmal geboten: Frankreich hat leckeres Essen und schöne Frauen, Deutschland saubere Hotels und Einkaufsstraßen, die Schweiz Be ... rglandschaften und ulkige Dorffeste.“ Quelle: picture-alliance / ZB 4 von 8 „Ein beliebter Trick von Betrügern in Europa ist es, sich als Polizist auszugeben und ahnungslose Touristen nach Ausweis und Geldbeutel zu fragen. In so einem Fall sollte man den P ... olizisten bitten, sich selbst auszuweisen.“ Quelle: pa/Rolf Kremming/dpa 5 von 8 „Berlin, Amsterdam und London liegen auf ungefähr demselben Breitengrad wie Peking, trotzdem ist das Wetter dort viel besser. Im Sommer ist es nicht zu heiß, im Winter nicht zu kal ... t, und Sandstürme wehen dort auch nicht.“ Quelle: picture alliance / Demotix 6 von 8 „Am Eiffelturm, vor dem Kolosseum in Rom und an berühmten Sehenswürdigkeiten, wo sich viele Touristen drängen, sollte man sich vor Schwarzen und Arabern in Acht nehmen. Oft sind es ... Taschendiebe oder Gauner.“ Quelle: picture alliance / dpa 7 von 8 „Europäische Schlösser sind so gebaut: Die Außenfassade ist schön und voller aufwendiger Schnörkel, innen ist es meistens nicht so atemberaubend. Es reicht, sie von außen zu besich ... tigen, das Reingehen kann man sich sparen.“ Quelle: pa/dpa/dpaweb 8 von 8 „Wer in Europa ins Restaurant geht, muss sehr geduldig sein. Die Gerichte – Brot, Suppe, Salat, Hauptgericht, Dessert – werden nacheinander serviert und nicht alle auf einmal. Wer ... den nächsten Gang bekommen will, muss zuerst den Teller leer essen. Uns Chinesen, die gewohnt sind, viel gleichzeitig auf dem Tisch zu haben, kann das wie Folter vorkommen.“ Quelle: picture alliance / Christoph Mohr Obwohl die Hauptzielländer weiter in Asien liegen, sieht der Direktor einen verstärkten Trend nach Europa. „Der Tourismus nach Europa wird rasant ansteigen, weil die Chinesen die Lust auf Nachbarländer wie Korea und Japan verlieren.“ Anzeige Angst vor Terror oder die Flüchtlingskrise in Europa schrecken chinesische Touristen seiner Ansicht nach langfristig nicht ab. Zwar sind die Visa-Zahlen für Frankreich im Dezember direkt nach den Anschlägen in Paris um 18 Prozent eingebrochen, doch Wei Xiao’an sieht darin nur ein vorübergehendes Phänomen: „Es gibt gewisse Auswirkungen, aber keinen grundlegenden Wandel im Reiseverhalten.“ Auch chinesische Reiseveranstalter sehen Europa im Aufwind. „Es gibt wenig Angst wegen Terror oder Flüchtlingen“, sagt Hu Xiaodan von Shanzhou Guolü. Auch der Ctrip-Manager findet: „Das beeinflusst chinesische Kunden nicht wirklich. Wir erwarten sehr gutes Wachstum.“ Chinesen geben mehr Geld aus Da chinesische Reisende mit ihren Einkäufen von Luxuswaren oft deutlich mehr als andere Touristen ausgeben, sind sie bei vielen beliebt. Frankreichs früherer Außenminister Laurent Fabius sieht in ihnen gar ein Heilmittel, um das Handelsdefizit mit China auszugleichen. Anzeige Auch die deutsche Tourismusindustrie wünscht sich höhere Umsätze. Nach Schätzungen könnte es mit einer erleichterten Visa-Vergabe pro Woche einige Dutzend Direktflüge von China nach Frankfurt zusätzlich geben. „Die Deutschen schießen sich selber in den Fuß, wenn sie sich weiter so strikt an die Schengen-Regeln halten“, sagt ein EU-Experte. Die Schengen-Staaten haben es bisher aber nicht geschafft, die Liste der Anforderungen für Chinesen gemeinsam zu reduzieren. Nicht nur die Franzosen, sondern auch die Spanier und Italiener gehen offenbar großzügiger mit Visa um. „Schengen funktioniert nicht“, heißt es in EU-Kreisen. Dabei gelten die Chinesen keineswegs als Problemgruppe. Es gibt weder Sicherheitsgründe noch nennenswerte Bedenken, dass Chinesen Asyl suchen oder europäische Sozialsysteme ausnutzen. Die Zahlen seien „unbedeutend“, wird versichert. China-Visum wird für Deutsche teurer Das Visum für Deutsche, die nach China reisen möchten, ist unterdessen teurer geworden: Touristen zahlen seit dem 14. März insgesamt 125,45 Euro. Bislang waren es 95,45 Euro. Laut einer Mitteilung des chinesischen Generalkonsulats in Frankfurt am Main wurden die Konsulargebühren im Schengenraum auf 60 Euro vereinheitlicht. Bisher betrug die reine Visum-Gebühr für deutsche Touristen und Geschäftsreisende nur 30 Euro. Hinzu kommt eine Servicegebühr von 65,45 Euro, die sich bereits im vergangenen Jahr verdoppelt hat. Somit erhöht sich der Gesamtbetrag um 30 Euro.
{ "pile_set_name": "OpenWebText2" }
0
Two femdom big strap on and fisting
{ "pile_set_name": "OpenWebText2" }
0.057143
Fuck and rough the bitch up
{ "pile_set_name": "OpenWebText2" }
0.074074
Welcome to the official Stanley Parable website! We are still hard at work on The Stanley Parable: Ultra Deluxe, which will bring hours of new content to every major PC and console platform we can think of. To learn more about The Stanley Parable: Ultra Deluxe, watch our latest trailer below or scroll down for more information. We promise we'll never send you spam. By signing up you agree to our Privacy Policy , which contains information about how we use your data. Check this if you want to hear about other things made by Crows Crows Crows. Enter your email address and we'll send you updates about The Stanley Parable: Ultra Deluxe as the story develops. What's this all about? When The Stanley Parable came out, a lot of people asked us for more endings and more content. We told them it didn't need more content, that it was fine just the way it was, that it already had the perfect number of endings. What a sorry sack of lies that was. We knew it. We knew it were lying and we did it anyway. We’ve carried that shame around with us for years, a burden weighing on every moment of every day. Enough is enough. It’s time to fix this, to unburden our shame. Let us give you our shame, for you to carry it around instead. We’re sick of it. From the liars who brought you the award winning indie game The Stanley Parable comes The Stanley Parable: Ultra Deluxe, an expansion to the original game with more content, more endings, more whimsical adventures of the two best friends Stanley and The Narrator. Coming to PC and consoles in 2019 2020 2021. Tastefully seasoned with the bitter remorse of having deceived so many loyal fans for so long. But seriously, this time it’s done. No more.
{ "pile_set_name": "OpenWebText2" }
0
It took three years of careful observation for nonfiction writer Inara Verzemnieks to get the complete story of a group of people living at a rest stop on an interstate in Portland, Ore. That diligence paid off — this story was one of the reasons the graduate student was selected as one of the six writers in the nation to be honored with the Rona Jaffe Writer’s Award and given $30,000 this year. The award was created in 1995 by famous writer Rona Jaffe, who set aside money to give women writers who are starting out in their literary careers the support and the encouragement to take time to focus on their writing. Since the award was established, more than $1 million have been allocated to talented writers. The award is given out anonymously by anonymous choosers who are on the lookout for outstanding writers. The second piece that led to Verzemnieks’ selection is an unfinished work of creative nonfiction and a part of her book tentatively titled External Exile. The piece acted as a lens to capture the history of her homeland country Latvia and her family’s journey as refugees after World War II. Verzemnieks said her grandparents instilled a passion for writing in her at an early age. Her grandparents helped raise her, and because they were refugees, the only way they could show her where they had come from was through telling stories. She said she grew up continually hearing beautifully detailed stories that, in essence, was the home she had never set foot in. “That was an early exposure for me — that you could make a world for others through words, so I was primed from an early age to think in that way,” she said. Robin Hemley, the director of the Nonfiction Writing Program, said Verzemnieks has a unique style of writing that attracted him when she began writing at the UI. “She is able to create characters and scenes and make everything into a moving portrait of whatever she is writing about, whether it is a group of people living in a rest stop or her grandparents’ history in Latvia,” he said. She said she has long been drawn to things that are overlooked, things that take people a while to access, and things that unfold slowly. “When I was a journalist, the best part for me was when I was sitting on someone’s sofa,” she said. “I feel like I was invited into someone’s unfolding life, and that’s the kind of thing that gets me excited about writing.” Hemley said her strong effort in research before writing a piece stands out. “I’m always struck by how meticulous she is as a writer and how her research doesn’t show awkwardly on the page,” he said. Verzemnieks reported for the Oregonian and worked for 13 years before coming to the UI. Her former editor, Barry Johnson, said he was impressed with the amount of commitment and time she put in to each of her stories. “She tried to reinvent the story form for each story she wrote,” he said. “She didn’t do this for ‘aesthetic’ reasons, though. She really did want to reflect the squirming, wriggling, hard-to-pin-down life she found on the page as well as she could, in a way that made the reader think it was as singular as she thought it was.” Verzmnieks said reporting for the Oregonian was an invaluable experience. While working at the paper, she was nominated for the Pulitzer Prize in 2007. Her nomination was based on a portfolio she had written during the year prior that included a piece about her discoveries of a hidden world, desires, and dreams in a park in Portland, Ore., and piece about a couple obsessed with velvet paintings. “It was a tremendous experience, and I learned more about myself, and my voice, and the things I was drawn to,” she said. “With that, I learned that I wanted to focus on my writing and stretch my writing, so I decided to go back to school and get my M.F.A degree, so I came here to Iowa.” She said Iowa was the perfect choice for her because it values writing and it is a wonderful community in which to meet people who are passionate about it. “Every single day, I have the opportunity to be exposed to other writers who are just incredible,” she said. “A big part of coming here was that I was inspired by them and their work.” Verzemnieks will attend an awards ceremony in New York on Sept. 20 and will then read at New York University along with the other five finalists. She said the award will give her the opportunity and time to immerse herself in her writing. “I don’t have to worry about trying to find another job or worry about my potential, because now it is being supported and recognized,” she said. “That really makes all the difference in the world when you’re trying to pursue something like a book.”
{ "pile_set_name": "Pile-CC" }
0
The 90's mix, of "O Fortuna", to have was by Apotheosis. It had that Radikal records' "100 wasps in a tin can" sound. It got pulled because they sampled it without permission. Well, that and it was tacky.<br><br>-----------------------------------------------------------------------------------------<br>[color:blue]NOTE: This Avatar Has Been Changed To Protect A Sponge On The Verge</font color=blue> When home on broadband, I hardly ever download music anymore. I just listen live to http://www.beirutnights.com<br><br>I have known the DJ for over 4 years now and have been listening to his station ever since it's first behinnings on live365. He plays music from all around the world. French, Russian, Romanian, American, Greek...... never get tired of the variety! And the sound quality is awesome! (Only works on windows media player though I belive)<br><br>_________________________________________<br>You expect me to sign here or somethin? _________________________ _________________________________________"The United States is by far the largest exporter of weapons in the world, selling more weapons than the next 14 countries combined." <blockquote><font size=1>In reply to:</font><hr><p>Noone really knows where all those weapons came from, the guns, grenades, and such, but they were "anonymous" "help" since Communism had to be taken down by all means all of a sudden. It worked, Communism was taken down, and the deficit fell to something around 7 billion in the first months.<p><hr></blockquote><p>Well then, let's go find Noone and slap him on the back with a hearty job well done!<br><br>aaaannd End Scene.<br><br>what? I'm sorry.... Noone? Oh, you mean no one? Ahem, my mistake. Carry on then. [/slinks away]<br><br><br><br><br>[color:blue]"Outside of the killings, Washington has one of the lowest crime rates in<br>the country,"<br>--Mayor Marion Barry, Washington, DC.</font color=blue> Thanks for the correction! [tonge] I have bad Gamrar problems and spleling ones too.... But for someone who has known the language for only 7 years, I think I am doing somewhat ok. <br><br>_________________________________________<br>You expect me to sign here or somethin? _________________________ _________________________________________"The United States is by far the largest exporter of weapons in the world, selling more weapons than the next 14 countries combined." What's wrong with Windows Media Player? I get good sound out of it at home and I just let it run in the background. So I don't really get to see it running. It's just a player.<br><br>_________________________________________<br>You expect me to sign here or somethin? _________________________ _________________________________________"The United States is by far the largest exporter of weapons in the world, selling more weapons than the next 14 countries combined." Nothing wrong with WMP. All my favorite left-handed websites use it. <br><br>-----------------------------------------------------------------------------------------<br>[color:blue]NOTE: This Avatar Has Been Changed To Protect A Sponge On The Verge</font color=blue> Xplain's use of MacNews, AppleCentral and AppleExpo are not affiliated with Apple, Inc. MacTech is a registered trademark of Xplain Corporation. AppleCentral, MacNews, Xplain, "The journal of Apple technology", Apple Expo, Explain It, MacDev, MacDev-1, THINK Reference, NetProfessional, MacTech Central, MacTech Domains, MacForge, and the MacTutorMan are trademarks or service marks of Xplain Corp. Sprocket is a registered trademark of eSprocket Corp. Other trademarks and copyrights appearing in this printing or software remain the property of their respective holders. All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.
{ "pile_set_name": "Pile-CC" }
0
Share this post Link to post Share on other sites Yianni by infinite decision. After he quickly pins Eierman (~45 seconds) the blare of celestial trumpets will sound. All will go dark, then a beam of light will appear. In the beam will appear Dan Gable, clad only in a black/gold Hawkeye mankini with large black dragon wings in the back as he flaps 15' above the mat, and he'll say "behold, the next great one".
{ "pile_set_name": "Pile-CC" }
0
that is funny shit
{ "pile_set_name": "Enron Emails" }
0.055556
Sexy Pattycake showing off her juicy tits and her sexy ass in the shower
{ "pile_set_name": "OpenWebText2" }
0.055556
1:11:57 Couple Mates At The Beach Then Again At The Motel Video Anal Sex Big Cocks Blowjob College Facial Cumshot FMM Gangbang Handjob Hardcore Kissing Mini Skirt Mouth Cumshot Pussy Fingering 100% 1913
{ "pile_set_name": "OpenWebText2" }
0.054187
The subject matter disclosed herein relates to electronic processing devices, and, more specifically to verifying the authenticity of instructions being executed by a processor of an electronic device. Certain modern electronic devices, such as cellular phones, digital video recorders, console gaming systems, and so forth, generally include processing circuitry that executes instructions stored in memory in order for the electronic device to function as intended. For example, certain electronic devices may store and execute firmware instructions that generally define the behavior of the electronic device. In certain situations, these firmware instructions may be stored in the memory of the electronic device at the time the electronic device is manufactured. Additionally, in certain situations, the firmware may be updated over the lifetime of the electronic device to address firmware bugs and/or to augment functionality of the electronic device.
{ "pile_set_name": "USPTO Backgrounds" }
0
No More Heroes: Heroes' Paradise is an action-adventure hack and slash video game developed by feelplus. The game is an enhanced port of the 2007 Wii video game No More Heroes, originally developed by Grasshopper Manufacture and directed by Goichi Suda. The game was released on PlayStation 3 and Xbox 360 in Japan on April 15, 2010 by Marvelous Entertainment. In North America and Europe, it was published by Konami in 2011 for the PlayStation 3, featuring support for the PlayStation Move, and various fixes to the game's performance and graphics. This version of the game was released in Japan as on July 21, 2011. A sequel, No More Heroes 2: Desperate Struggle was released on Wii months prior. No More Heroes III was announced at E3 2019 to be released in 2020 for the Nintendo Switch. Gameplay In Heroes' Paradise, the player character, Travis Touchdown travels around on foot or his motorcycle in a free roaming world killing the top ten assassins in order to make the storyline progress. There are numerous part-time job side quests to earn money which can be spent on weapons, training sessions, clothes and video tapes. Most attacks are performed using a standard control scheme, with certain other moves, including the "death blow" and sword lock struggles, executed by following on-screen instructions. The beam katana can also be upgraded and replaced throughout the game by visiting Dr. Naomi. While the katana does not follow the exact position of the remote, it is able to distinguish between a "high" and "low" position which varies the character stance and the attacks done. In addition to attacks with the beam katana, Travis can kick and punch, and when enemies are stunned, he can throw them with a number of professional wrestling maneuvers, which were previously done by manipulating both the Wii Remote and Nunchuk. Travis has a secondary mode, "Dark Side", that is accessed when three icons line up in a slot machine after a successful death blow. Differences from No More Heroes There have been several changes to the game from the original Wii version. The main differences between the two iterations are: High-definition graphics English (everywhere) and Japanese (Asian territories only) voice acting. An unlockable "Very Sweet" Mode, which depicts Sylvia Christel, Shinobu, Holly Summers, Bad Girl and Jeane wearing more "appealing" attire. Ability to stock up to three Dark Side mode charges, rather than having it activate immediately, like in the original. Unused Dark Side mode charges left over in the player's stock at the end of a Ranking Battle rewards Travis Touchdown with additional LB dollars (as was the case with unused Anarchy in the Galaxy stocks in the original version). The song, "Heavenly Star", by the Genki Rockets was removed. Same goes for the music video that players could watch in the motel room in the Japanese and European Wii versions. The Ubisoft trailer (which only appeared in the North American Wii version) on the TV with the full Helter Skelter fight and Sylvia Christel introduction explaining the rules of the UAA has been removed and exactly the same intro from the start of the game serves as the trailer. Sylvia's calls to Travis on his cell phone are now heard on screen because of the PS Move motion controller lacking a speaker (although the use of the Wii remote's speaker was optional). Ability to warp straight to any Side-Job or Assassin Mission once the player has beaten any of them at least once. A retry option was added to the Side-Jobs, Assassin Missions, and Free Fights. However, it only appears when the player has failed in either. Five new Side-Jobs were added: Signaling, Sign Spinning, Kitty Race, Bust A Coconut and People Bowling. Five new Assassin Missions were added; Guard Break, Power-Down Battle, Big Bang Anarchy, Shortcake Freaks and Crowded Train Carnage. Five extra bosses from No More Heroes 2: Desperate Struggle are available to fight at certain points in the game. These are Skelter Helter, Nathan Copeland, Kimmy Howell, Matt Helms and Alice Twilight. Players are now able to revisit Ranking Fights and cinematics from Travis' motel room armchair, in the form of nightmares and dreams. A "Score Attack" mode has been added that lets the player refight all 15 of the game's bosses and compete for a high score online. This is also the only way for players to refight all of the NMH2 extras as they don't appear in nightmare mode. More traffic and pedestrians in Santa Destroy. The northern section of Santa Destroy was blocked off, with any collectibles and missions located in that area moved to the rest of the map. PlayStation Move support Unlike the Japanese release of the game, the North American and European release of the game include PlayStation Move support at launch. This is the only difference between the PlayStation 3 and Xbox 360 versions of the game. Players can use the PlayStation Move controller to recharge the katana, since the beam katanas run on batteries, as well as control it to execute attacks and advanced combos, much like the Wii version. Development On November 17, 2009, Famitsu magazine revealed that No More Heroes would receive a port to both the PlayStation 3 and Xbox 360 from the company feelplus. Shortly after the announcement of the game in November 2009, the North American and European publisher of the original, Ubisoft and Rising Star Games, announced that they would not be localizing the game. On June 28, 2010 Ignition Entertainment, when asked if they were publishing the game abroad, commented that they "were looking at it (but they) believe that another publisher will publish it." At Gamescom 2010 in August, Konami announced at their press conference that they were bringing only the PlayStation 3 version to North America and Europe in 2011 with added PlayStation Move support. A Press release was also given to provide additional information on the improvements made on the Western localization of the game. A North American release was formally announced on the PlayStation Blog by Jeff Reubenstein, formally unveiling the title's Move support as well as PS3 exclusivity. When the game was released in Japan, the PlayStation 3 version of the game was censored similar to its Wii predecessor attaining a "D" rating from CERO which is equivalent to a "Mature" rating from ESRB while the Xbox 360 version of the game remained uncensored similar to the North American release of its Wii predecessor causing it to receive a "Z" rating equivalent to the "Adult Only" rating from ESRB. However, the North American and European PlayStation 3 release of the game are uncensored. By pre-ordering from Amazon.co.jp, customers were awarded with bonus cards particular to each format of the game. PlayStation 3 owners were rewarded with the Cherry Card set, while Xbox 360 owners were rewarded with the Mango Card set. The cards featured semi-erotic poses from the female characters within the game. Reception Sales for the Japanese launch of Heroes' Paradise were slightly better than with the original Wii version. The PlayStation 3 and Xbox 360 versions of the game sold 16,000 and 15,000 units respectively in their first week on sale in the country. IGN gave the game a 7.5 out of 10, praising the combat and updated visuals, but criticized the screen tearing and slowdowns, as well as the mini-games, calling them tedious. Notes References External links No More Heroes: Red Zone Category:2010 video games Category:Action-adventure games Category:Censored video games Category:Hack and slash games Category:Konami games Category:Marvelous Entertainment Category:No More Heroes Category:PlayStation 3 games Category:PlayStation Move-compatible games Category:Single-player video games Category:Video game remakes Category:Video games developed in Japan Category:Video games set in the United States Category:Video games with cel-shaded animation Category:Xbox 360 games
{ "pile_set_name": "Wikipedia (en)" }
0
et h be 68/10 + (-11)/(-55). Suppose h*l - l = -276. Let z be (l/(-4) - 2)*(-12)/6. What is z rounded to the nearest 10? -20 Let a = 0.06789024 - 1.673886076. Let o = a + 1.606. Round o to 7 dps. 0.0000042 Let z = -88903.727599 - -90005.72765242. Let d = z + -1102. Round d to six dps. 0.000053 Let j = 0.358 + 26.642. Let b = -40.97 - -13.963. Let g = j + b. Round g to 3 decimal places. -0.007 Let n = 6904.62506 - 0.12506. What is n rounded to the nearest 10? 6900 Let i(x) be the third derivative of 0 - 2/3*x**3 + 0*x - 20*x**2 + 79/4*x**4. Let r be i(-4). What is r rounded to the nearest 1000? -2000 Let y = 238 - 438. Let w = y - -200.02076. Round w to 3 dps. 0.021 Suppose 18 + 3 = 21*x. Let v(m) = 79299996*m**2 + 2*m + 2. Let g be v(x). Round g to the nearest one million. 79000000 Let g = 192 + -350. Let x = g - -158.000052. What is x rounded to 6 dps? 0.000052 Let g = -27454 + 27454.000001254. Round g to 6 dps. 0.000001 Let u = -1142728.384376 - -1142734. Let c = u + -14.11562. Let b = c + 8.5. What is b rounded to six decimal places? 0.000004 Let j = -0.053218991399 - 429.946777918601. Let u = -428.17 + -1.83. Let r = u - j. What is r rounded to seven decimal places? -0.0000031 Let s = -132 + 126. Let g be -2 - 6/(-12)*s. Let c be 15/25 + (-3997)/g. What is c rounded to the nearest one thousand? 1000 Let p = 1291.84 + -936. Let h = p - 377. Let x = h + 20. What is x rounded to 1 decimal place? -1.2 Let z = -0.019 + -26.981. Let i = -22978693.55 - -22978720.54999899. Let y = z + i. Round y to 6 dps. -0.000001 Let q = 3408 + -3571.04. Let j = q - -166. Let f = -2.7 + j. What is f rounded to 1 dp? 0.3 Suppose b + 2900 = 3*t, -7*t = -4*b - 6*t - 11600. What is b rounded to the nearest one thousand? -3000 Let h = -0.009 + 0.169. Let n = 0.159416 - h. Round n to five decimal places. -0.00058 Let d = -2164.8739 - 2.8261. Round d to the nearest one hundred. -2200 Let w = -967 + -54876. Let x = 55891.9974 + w. Let h = x + -49. Round h to 3 decimal places. -0.003 Let n = -1046.999818 - -1047. Round n to 5 decimal places. 0.00018 Let v = 8517 + -8519.43. What is v rounded to one dp? -2.4 Let s = 400.8 + -2.8. Let j = s - 397.99994. Round j to 4 dps. 0.0001 Let t = -35202 - -35219.707. What is t rounded to the nearest integer? 18 Let a = 746 - 816.46. Let l = a - 7.44. Round l to the nearest ten. -80 Let b = 8412278 - 8412274.010251. Let l = 783 + -779.01. Let m = b - l. What is m rounded to 5 decimal places? -0.00025 Let w = -67512.4 + 73463. What is w rounded to the nearest 100? 6000 Suppose 5*d - 49355003 = y, -5*y - 59226015 = 8*d - 14*d. What is d rounded to the nearest 100000? 9900000 Let g = 159.476 - 3.768. Round g to the nearest 10. 160 Let u = 3842 + -3842.000926. Round u to 4 decimal places. -0.0009 Let b = 0.078 + -34.078. Let p = b - -33.99999764. Round p to 7 dps. -0.0000024 Suppose o = 4*o + 120. Let b = 88 - 23. Let d = o + b. Round d to the nearest 10. 30 Let o = 700 + 1067. Let g = o + -1933.8. Round g to the nearest ten. -170 Let k = -44.04 - -43.979536. What is k rounded to two dps? -0.06 Let q = -23.24 + 23. Let h = 0.638 + -0.53. Let m = q + h. Round m to two dps. -0.13 Let f = 4.3701 - 1.6001. Round f to two decimal places. 2.77 Let m(p) = -3*p**2 - 7*p + 1. Let y be m(-3). Let r be (-2)/y - 259095138/345. Round r to the nearest one hundred thousand. -800000 Let a = -2.19 - 25.01. Let l = -20 - a. Let w = l + -13.9. Round w to 0 dps. -7 Let h = 6.124 + -6.85. Let m = h + 0.73952. What is m rounded to four decimal places? 0.0135 Let j be 4315*-1*(-48 + 182). What is j rounded to the nearest 10000? -580000 Let w = 112396126950.746921469 - 112396127018. Let d = w + 0.253080031. Let o = d + 67. Round o to six decimal places. 0.000002 Let y = -61.58 + -0.42. Let m = -99624298 + 99624236.000043. Let n = m - y. What is n rounded to five decimal places? 0.00004 Suppose 0 = 2*l - f - 198239999, -l + 3*f + 29125616 + 69994381 = 0. What is l rounded to the nearest one million? 99000000 Let a = 45836.093675 + -45836. Round a to 2 dps. 0.09 Let b = 67 + -11. Let g = -52.071 - 3.449. Let p = b + g. Round p to 1 dp. 0.5 Let h = 5397.2 + -5393.9051. What is h rounded to the nearest integer? 3 Let r = 0.13366 + -2.62106. Round r to 2 decimal places. -2.49 Let j(o) = -3*o**3 - 4*o**2 + 6*o + 23. Let k be j(-5). Let t = 118 - 281. Let p = k + t. Round p to the nearest 10. 110 Let f = -160238 - -338838. What is f rounded to the nearest 100000? 200000 Let q(y) = y**2 - 9*y + 19. Let n be q(8). Let m(w) = -625*w - 20. Let o be m(n). Let p = -4895 - o. Round p to the nearest one hundred thousand. 0 Suppose -13*f + 5*f = 11*f + 4452080. What is f rounded to the nearest ten thousand? -230000 Let c = -510 - -509.012. Let y = -23 + 22.998. Let o = y + c. What is o rounded to 1 decimal place? -1 Suppose 25*l - 4*l + 439740 = 0. Round l to the nearest 100. -20900 Let x(t) = 15*t - 22. Let y be x(3). Suppose -19*q - 13600 = -y*q. Round q to the nearest one hundred. 3400 Let u = -514.10362 + 514. Let s = u + 0.2455. Let h = s + -0.139. Round h to 4 dps. 0.0029 Let s be ((-6)/((-204)/(-34)))/((-2)/35142). Round s to the nearest one hundred. 17600 Let o(f) = -659723*f + 1326. Let y be o(2). What is y rounded to the nearest 100000? -1300000 Let d = -463.01 + 22.41. What is d rounded to the nearest ten? -440 Let b = 4932236.014000465 + -4932236. Let s = b - 0.014. Round s to seven dps. 0.0000005 Let v = 3.10198 - 25.71834. Let c = v + 26.6179. Let n = -4 + c. What is n rounded to 4 dps? 0.0015 Let j = 9480208 + -9480649.00297. Let n = j + 441. What is n rounded to three decimal places? -0.003 Let v = -1060 - -969.8. Round v to the nearest 100. -100 Let x = -116 + 102. Let l = x - 74. Let p = 87.9999995 + l. Round p to six decimal places. -0.000001 Let y be -1 + -8 + 20 + 9. Suppose 0 = 3*s - 5*u - 27, 0 = -5*s + 5*u - 8 + 43. Let a be y*(0 + -224 + s). Round a to the nearest one thousand. -4000 Let u = -22.3191 + -4.4699. What is u rounded to the nearest 10? -30 Let c = 345.39563 - -238.101293. Let l = c - 583.5. What is l rounded to 3 dps? -0.003 Let r = 54 - 58. Let c be 6/r*9309232/(-24). Let o = c - -14918173. Round o to the nearest 1000000. 16000000 Let v = 166.311 - 166.3340274. Let n = -0.023 - v. Round n to 5 decimal places. 0.00003 Suppose -18*h - 170933013 - 196304173 = 129742814. Round h to the nearest 1000000. -28000000 Suppose 2801 = -3*b - a, -5*a = -b - 3*b - 3760. Let n = 3882 - 6497. Let q = n - b. What is q rounded to the nearest one hundred? -1700 Let g = 0.43 - -26.57. Let x = 26.35 - g. Let f = 0.649967 + x. What is f rounded to five dps? -0.00003 Suppose 3 = -t + 8. Let l = t + 2. Suppose 748703 = -l*h - 2695297. What is h rounded to the nearest 10000? -490000 Let d = -426.3996173 + 426.4. What is d rounded to 4 decimal places? 0.0004 Let g = -10044427866 + 10043855082.9787. Let x = g - -572887. Let u = 104 - x. Round u to 3 decimal places. 0.021 Let a = 2209380843 + -2209378912.027298. Let c = 1729.97270063 - a. Let z = 201 + c. Round z to seven decimal places. -0.0000014 Let d = -158.14 - -160. Let n = d - 0.22. Let i = -1.6400134 + n. Round i to six decimal places. -0.000013 Let t = -5671.0000036576 + 5671. Round t to seven decimal places. -0.0000037 Let m = 638.35093 + -0.05093. What is m rounded to the nearest ten? 640 Let w = 398.69997342 - 398.7. What is w rounded to six dps? -0.000027 Let i = 569197 + -208397. What is i rounded to the nearest 10000? 360000 Let a = 1.07771 - -0.07289. Round a to 1 dp. 1.2 Let a = -0.1422 - 1964.8578. Let v = a - -1964.99999087. Round v to 6 decimal places. -0.000009 Let t = 0.074 - 0.1. Let z = t - -0.02600236. Round z to seven dps. 0.0000024 Let d = 3442183752 + 4514122674. Let q = d - 7956306570.00000077. Let g = q + 144. What is g rounded to 7 decimal places? -0.0000008 Let d = -321.83926231123 - 5281.16073701257. Let p = d + 5603. What is p rounded to 7 decimal places? 0.0000007 Let m = 247 - 251. Let h be ((-683232)/9)/(-11)*750/m. What is h rounded to the nearest 100000? -1300000 Let o = 170.1 + -170.107436. What is o rounded to three decimal places? -0.007 Suppose 61960 = -2883*j + 2881*j - 2*b, 4*j - 2*b = -123950. What is j rounded to the nearest 100? -31000 Let m = 0.063962049 - 0.06394.
{ "pile_set_name": "DM Mathematics" }
0
Introduction {#ss1} ============ Rhinitis is common in outpatient settings \[[@CIT0001]\]. Patients with allergic rhinitis get symptomatic relief from anti-allergic treatment such as steroid nasal sprays. However, many patients with persistent rhinitis have no identifiable etiology and a negative outcome in allergy tests. These patients, classified as having non-allergic perennial rhinitis (NAR), often describe stuffiness as the most troublesome symptom and the relief gained with anti-allergic treatment, such as steroid spray, is unsatisfactory \[[@CIT0001]\]. Some patients with therapy-resistant NAR, as well as patients with rhinitis medicamentosa (RM), are effectively addicted to vasoconstrictors in a vicious circle of overuse and rebound effects \[[@CIT0002]\]. The unclear pathogenesis of NAR and RM, and the absence of reliable immunological markers, make the interactions between the immune and nervous systems of interest in these patients \[[@CIT0001]\]. In a healthy nasal cavity the airflow is sensed by the nervous system. An inflammatory process could lead to mucosal swelling, which in turn could potentially prevent the nervous system from detecting the airflow passing over the surface. The idea behind the kinetic oscillation stimulation (KOS) treatment investigated in the present study was that perhaps applying mechanical oscillations similar to naturally occurring turbulence would have a positive effect on the inflammatory ondition in the mucosal surface layer. The aim of this blinded placebo-controlled parallel study was to investigate if KOS treatment, i.e. low frequency, low amplitude vibrations applied to the nasal mucosa surface for several minutes, could reduce rhinitis symptoms, most notably the sensation of stuffiness, in patients with either NAR or RM, specifically for rhinitis patients without allergic or infectious origin. Symptom scores were the main study variables as they are most relevant to the patients' subjective experiences and are commonly used to measure treatment effectiveness in clinical studies involving new investigational products for rhinitis treatment in humans \[[@CIT0007]\]. Peak nasal inspiratory flow (PNIF) was used as it is comparable to but easier to perform than rhinomanometry \[[@CIT0009]\] and judged more appropriate as patients made measurements at home. The correlation between nasal scores from clinical examination and degree of stuffiness has been described as weak \[[@CIT0010]\] and therefore initial scoring of patients' nasal cavities was not performed. In the study patients were randomized to active or placebo treatment. As the actively treated patients would have recognized a later treatment without vibrations, a cross-over study design would have been unsuitable. Low frequency vibration stimulation is, to the authors' knowledge, a novel treatment as no publications exist. Experience from this or similar mucosal and nasal cavity treatments is therefore not available \[[@CIT0001]\]. Material and methods {#ss2} ==================== This was a single-center, randomized (1:1), blinded, parallel-design study conducted at the ENT Clinic, Karolinska Institute, during February to July 2008. Patients with nasal stuffiness were self-selected for screening by responding to an advertisement and initial patient interviews were conducted by telephone. Patients, aged 18--62 years, otherwise healthy and without known allergy, with persistent symptoms of rhinitis (NAR), mainly blocked nose, without use of vasoconstrictor and daily symptoms of stuffiness (at least 3 months), or with an overuse (daily for previous 3 months) of vasoconstrictor (RM) were recruited. RM patients were permitted to use vasoconstrictors until visit 1, as discontinuation was not possible due to their addictive nature. NAR patients had to refrain from all rhinitis medication during a 2 week washout (before visit 1). Exclusion criteria were: nasal surgery, septum deviation, nasal polyps, known allergies, medication other than antihistamine and/or nasal steroids, and pregnancy. A 2-week follow-up period was selected as this is a significantly longer treatment interval than that of steroid medication (often administered daily) and KOS could in future possibly be self-administered at home. Detailed power analysis was not performed as little was known about the potential clinical effects. At visit 1 (day 0) patients met the study physician, were further informed regarding the study, and informed consent was collected. Patients were interviewed, clinically examined including the nasal cavity, and underwent standard allergy testing (Soluprick, ALK, Denmark). Compliance with inclusion and exclusion criteria was confirmed and patients were classified as belonging to either the NAR or the RM diagnosis groups. Patients received a diary with symptom questions and equipment to measure PNIF (inspiratory flow meter and medium face mask; Clement Clarke Intl Ltd, Harlow, UK). On day 0 (morning), before the patients received treatment, the study physician demonstrated how to measure PNIF (record highest of three measurements, morning and evening, for 14 days), and instructed patients as to how to complete the diary questionnaires. The symptom questions regarding stuffiness, itching, and secretion had four grades (0, no; 1, light; 2, moderate; 3, severe) and were summed to a diary symptom score (DSS), ranging from 0 to 9. Patients' medication usage (type and amount), completed symptom questions, and an initial pretreatment PNIF measurement were recorded in the patient diary. Patients within each treatment group were randomized (stratified for diagnosis: NAR or RM) to active or placebo treatment by the study nurse (not blinded to study treatment) who also performed the treatment. Patients received the first and only treatment on day 0. The treatment device was constructed by the investigator himself ([Figure 1](#F1){ref-type="fig"}). ![Treatment apparatus.](OTO-134-506-g001){#F1} The treatment parameters were chosen so that treatment would be similar to natural turbulent oscillations and also not forceful or energetic enough to be potentially harmful. Before treatment (active or placebo), a paraffin-lubricated protective cover was applied over the device part to be inserted. The device was inserted into the nasal cavity and inflated to 50 mbar (0.05 atm) and treatment started. Active treatment, KOS, consisted of mechanical vibrations created using regular pressure oscillations (increases and decreases) at a frequency of 50 Hz. Placebo treatment consisted of a device maintaining stable pressure of 50 mbar. No oscillations were applied in the placebo treatment as any clinical effects of any such vibrations would be unknown. Treatment duration was 7 min in each nasal cavity. At visit 2 (day 14), the study physician interviewed the patients. Patients who had experienced symptoms of upper airway infection were withdrawn from the study. Patients completed the end of study questionnaire regarding their nasal symptoms, stuffiness on a scale 0--3 as previously described, and presence (1) or absence (0) of itching and secretion. The questionnaires were completed for nasal symptoms on day 14 and retrospectively for 1 week pretreatment, and days 1, 4, and 7 post-treatment. Answers were summed to a Rhinitis Questionnaire Symptom Score (RQSS), with range 0--5 for each time point. The study design was approved by the Regional Ethics Committee in Stockholm (Box 289, SE- 171 77 Stockholm). [Figure 2](#F2){ref-type="fig"} shows a flow diagram of the study procedure. ![CONSORT flow diagram.](OTO-134-506-g002){#F2} Statistical methods {#ss3} ------------------- As pretreatment DSS and PNIF were measured at the clinic by the study physician and all post-treatment measurements were performed by the patient at home, pretreatment and post-treatment measurements were considered to be non-comparable, and results are presented for absolute values only. RQSS treatment assessments were performed at the clinic (day 14), therefore both absolute values and changes from before treatment (1 week pretreatment) to each of the time points, days 1, 2, 4, 7, and 14 are presented. Absolute values and differences were evaluated by the Wilcoxon signed rank test stratified for diagnosis (randomization strata: NAR, RM). Absolute PNIF values were evaluated using stratified analysis of variance (ANOVA) and PNIF. As stuffiness is most often the main problem for NAR and RM patients, results for overall RQSS and RQSS item 'stuffiness' are presented. Results {#ss4} ======= Eighty-six patients were randomized. Eighty-four patients were treated (50 with NAR, 34 with RM). Six patients (four with RM, two with NAR) reported symptoms of upper airway infection and were excluded. Seven patients comprising three with NAR (two active treatment, one placebo) and four with RM (two active treatment, two placebo) were excluded from analysis due to non-compliance ([Figure 2](#F2){ref-type="fig"}). Seventy-one patients (35 active treatment, 36 placebo) were included in the analyses. Average age was around 40 years in both groups, 46% and 58% were females in the active treatment and placebo groups, respectively ([Table I](#T1){ref-type="table"}). At baseline (diary baseline = morning of day 0, end of study questionnaire baseline = assessment 1 week pretreatment), there were no statistically significant differences in median symptom scores (DSS and RQSS), or average PNIF, between treatment groups ([Table I](#T1){ref-type="table"}). ###### Background characteristics. Characteristic Statistics Active treatment Placebo Total ---------------------------------------------------------- ----------------------------------------------------- ------------------ -------------- ------------------------ Age (years) No. of obs 35 36 71 Mean (SD) 39.9 (11.4) 39.6 (10.9) 39.8 (11.1) Min, max 20, 59 22, 62 20, 62 Female *n* (%) 16 (45.7%) 21 (58.3%) 37 (52.1%) PNIF (L/min) [\[b\]](#T1_1){ref-type="table-fn"} No. of obs 32 36 68 Mean (SD) 110.8 (30.9) 118.8 (32.9) 115.0 (32.0) Min, max 55, 160 40, 180 40, 180 *p* value [\[a\]](#T1_1){ref-type="table-fn"} *p* = 0.3047 DSS [\[b\]](#T1_1){ref-type="table-fn"} No. of obs 33 36 69 Median 2.0 3.0 3.0 Min, max 1, 5 0, 9 0, 9 *p* value [\[c\]](#T1_1){ref-type="table-fn"} *n* = 69, *p* = 0.2321 DSS [\[b\]](#T1_1){ref-type="table-fn"} item stuffiness No. of obs 33 36 69 Median 2.0 2.0 2.0 Min, max 0, 3 0, 3 0, 3 *p* value [\[c\]](#T1_1){ref-type="table-fn"} *n* = 69, *p* = 0.8226 RQSS [\[d\]](#T1_1){ref-type="table-fn"} No. of obs. 35 36 71 Median 3.0 3.0 3.0 Min, max 1, 4 1, 5 1, 5 *p* value value [\[c\]](#T1_1){ref-type="table-fn"} *n* = 71, *p* = 0.1062 RQSS [\[d\]](#T1_1){ref-type="table-fn"} item stuffiness No. of obs 35 36 71 Median 2.0 2.0 2.0 Min, max 1, 3 1, 3 1, 3 *p* value [\[c\]](#T1_1){ref-type="table-fn"} *n* = 71, *p* = 0.7991 \[a\] Statistical testing of difference between treatment groups using ANOVA stratified for diagnosis (NAR, RM). \[b\] Day 0, morning. \[c\] Statistical testing of difference between treatment groups using Wilcoxon signed rank test stratified for diagnosis (NAR, RM). \[d\] Assessment for the week before the day 0 visit. NAR, non-allergic perennial rhinitis; RM, rhinitis medicamentosa. The results in the study would not have been materially different if excluded patients had been included. Rhinitis questionnaire symptom scores {#ss5} ------------------------------------- RQSS and RQSS item stuffiness were significantly higher in the placebo group compared with the active treatment group for day 1 (*p* \< 0.0001 for both), day 2 (*p* \< 0.0001 and *p* = 0.0003), day 4 (*p* = 0.0088 and *p* = 0.0110), and day 7 (*p* = 0.0088 and *p* = 0.0110). Median RQSS decreased in both treatment groups from the assessment 1 week pretreatment to assessments made post-treatment (all assessments made retrospectively on day 14) ([Figure 3](#F3){ref-type="fig"}). Changes are significant at all post-treatment assessments (*p* \< 0.0001) for the active treatment group, but not for the placebo group (0.05 \< *p* \< 0.10). The decrease in RQSS was significantly larger in the active treatment group compared with the placebo group (*p* \< 0.001 for days 1, 2, 4, and 7 and *p* \< 0.01 for day 14). For RQSS item stuffiness, there was a decrease in both treatment groups ([Figure 4](#F4){ref-type="fig"}). Changes are significant at all post-treatment assessments (*p* \< 0.0001) for the active treatment group, and at day 1 for the placebo group (*p* = 0.0391, *p* = 0.0625 all other assessment). Decrease in RQSS item stuffiness was significantly larger in the active treatment group compared with the placebo group (*p* \< 0.001 for days 1, 2, 4, and 7 and *p* = 0.0274 for day 14). The median RQSS in the NAR and RM subgroups are presented in [Figures 5](#F5){ref-type="fig"} and [6](#F6){ref-type="fig"}. Note that, after 1 day: in the RM group, 85% of those receiving active treatment had a lower RQSS of at least one score unit (scale 0--5), vs 15% for placebo. For NAR, the corresponding figures were 82% and 22%, respectively. For RQSS item stuffiness (scale 0--3), active/placebo was 85%/15% for RM and 68%/22% for NAR. After 7 days: RQSS active/placebo for RM was 69%/15% (69%/15% for RQSS item stuffiness) and for NAR 50%/13% (41%/13% stuffiness). After 14 days: RQSS active/placebo for RM 54%/15% (54%/15% stuffiness) and for NAR 45%/13% (32%/13% stuffiness). The measured improvements could perhaps or even likely be of clinical importance. ![Median Rhinitis Questionnaire Symptom Score (RQSS), all patients (NAR and RM), score 0--5. NAR, non-allergic perennial rhinitis; RM, rhinitis medicamentosa.](OTO-134-506-g003){#F3} ![Median Rhinitis Questionnaire Symptom Score (RQSS) sub-item stuffiness, all patients (NAR and RM), score 0--3. NAR, non-allergic perennial rhinitis; RM, rhinitis medicamentosa.](OTO-134-506-g004){#F4} ![Median Rhinitis Questionnaire Symptom Score (RQSS), NAR patients only, score 0--5. NAR, non-allergic perennial rhinitis.](OTO-134-506-g005){#F5} ![Median Rhinitis Questionnaire Symptom Score (RQSS), RM patients only, score 0--5. RM, rhinitis medicamentosa.](OTO-134-506-g006){#F6} Diary symptom scores {#ss6} -------------------- In both the active treatment and placebo groups, median DSS varied between 2 and 3 but with no strong apparent pattern. The difference was significant on one occasion, day 1 morning, medians 2 and 3 in active treatment and placebo groups, respectively (*p* = 0.0311). Peak nasal inspiratory flow {#ss7} --------------------------- Average PNIF was higher in the placebo group compared with the active treatment group throughout the study period, and appeared generally stable throughout the period (significant day 0 evening, *p* = 0.0485; day 4 morning, *p* = 0.0337; day 5 evening, *p* = 0.0474). Adverse events {#ss8} -------------- During active treatment many patients sneezed and experienced repeated itchiness in and around the cartilaginous part of the nose. Many patients reported reduced sensitivity in the upper lip during treatment, which normalized a few minutes post-treatment. The study physician judged these events as mild. The majority of patients reported more stuffiness in the nose for several hours post-treatment. Discussion {#ss9} ========== Data from this study indicate that KOS of the nasal mucosa with low frequency mechanical vibrations may have an impact on the symptoms of persistent rhinitis. RQSS and RQSS item stuffiness showed statistically significantly better symptom relief, both in absolute values and change from pretreatment, in the active treatment group compared with the placebo group. Relief was most notable the first week post-treatment but the symptom, as reflected by RQSS, remained statistically significantly reduced 14 days post-treatment in the active treatment group. DSS and self-measured PNIF showed no significant effects, in accordance with other studies \[[@CIT0011]\]. Overall, the results from DSS and PNIF did not indicate any differences between the groups, only few and marginally significant *p* values (between 0.05 and 0.01), which given the large number of statistical tests conducted may be due to multiplicity of testing. An analysis of change from pretreatment gave similar results. Symptoms scored in patient diaries at home did not seem to change, while the retrospectively reported symptoms (end of study RQSS) did. Diary data are known to be problematic in rhinitis studies. End of study questionnaires allow patients to reflect and compare pre- and post-treatment symptoms and may be more reliable. In clinical studies a washout period before treatment and questionnaires grading both subjective symptoms and different objective measures of nasal flow are often recommended pre- and post-treatment. As patients with RM, in contrast to those with NAR, are addicted to vasoconstrictors they were considered unable to stop the use before treatment. Patients in this study were classified as belonging to either NAR or RM at visit 1 (day 0), and the symptoms questionnaires were completed and PNIF measured only once at visit 1 (day 0), immediately before the administration of study treatment. Pre- and post-treatment DSS and PNIF were not considered comparable as they were measured under different circumstances. In addition, the visit to the clinic may have been associated with some stress that may have affected patients' experiences of symptoms. In the present study PNIF included very low (30--50) and very high (250--300) values. The PNIF measuring method has been shown to be highly effort-dependent and needs standardized techniques \[[@CIT0012]\]. PNIF scores are only valid for maximum inspiration and not necessarily for normal breathing through the nose. As PNIF measures maximum inspiration it is not necessarily correlated to the patient's subjective sensation of blockage. Correlation between measurements and questionnaires range from positive to absent \[[@CIT0010]\]. Some studies indicate that PNIF scores are highly reproducible and closely related to signs of rhinitis \[[@CIT0013]\], others have reported that PNIF value measurements correlate poorly with rhinitis symptoms \[[@CIT0008]\]. In the present study patients received daily questionnaires but it is unknown if patients completed them, and the PNIFs, daily. For diary data, it is reported that, in congestion evaluation, history is generally useful in determining the cause of congestion but weak in determining the success of treatment \[[@CIT0010]\]. The follow-up period was limited to 14 days in this first controlled study, as a longer follow-up period could make patients' recall of symptoms pre- and post-treatment less reliable. The adverse events were few and mild. Some minor discomfort was experienced during active treatment but this disappeared shortly after treatment completion. Few patients reported airway infections, suggesting that study treatment did not facilitate the development of infections. The choice of placebo can be discussed. It is known from the investigator's clinical practice that applied pressure alone does not relieve nasal stuffiness. Patients with nasal bleeding, treated with nasal cavity package for several hours to days, do not typically describe sustained decreased sensation of stuffiness. The placebo treatment applied stable pressure but no vibrations, which was not considered to have a sustained impact on the degree of stuffiness. The mechanisms behind the obtained results have yet to be identified. It is possible that the mechanisms involved in relief of symptoms are not only release of transmitter substances such as neuropeptides, as the effect from active treatment lasts from days to weeks. This long-term treatment effect may be explained by the active stimulation of sensory nerves and, directly or indirectly, of the autonomic nervous system in the nasal cavity and plausibly the sympathetic part of the autonomic nervous system. It has been reported that patients with allergic rhinitis have a dysfunction in the autonomic nervous system, specifically a sympathetic hypofunction \[[@CIT0014]\]. Other mechanisms of action could therefore be a balance change in each of, or between the two parts of the autonomic nervous system, sympathetic and parasympathetic nerves or in the nerve signal transmission itself \[[@CIT0014]\]. In addition, local allergic rhinitis, detectable in the nose but not in the skin tests performed in the present study, may have impacted symptoms as patients sneezed and experienced nose itchiness during the stimulation. Although these initial results are encouraging, further studies are required to understand the impact of the treatment and optimize it. Symptom questionnaires and longer pre/post-PNIF measurements would be useful in future investigations. Saccharine tests, cilia activity studies, were not performed but would be of interest as well as further studies of the association of non-allergic rhinitis with smoking and lower airway disease \[[@CIT0020]\]. Conclusion {#ss10} ========== After one nasal mucosa treatment with KOS (low frequency mechanical vibrations), patients with NAR and RM had a significantly larger reduction of self-reported nasal symptoms, both overall (RQSS) and specifically of stuffiness, compared with placebo-treated patients. The effect was most pronounced in the days immediately following treatment but was still present 14 days post-treatment by some measures. Treatment was easy to administer, well tolerated by the patient, and side effects were few and mild. Considering that existing treatments (steroids and vasoconstrictors) are not always successful and can be addictive, the active treatment in this study has the potential to offer a viable alternative for symptom relief. Further studies are required to elucidate the mechanism of action and for optimization of the treatment. Anders Nordlund PhD, biostatistician, TFS Trial Form Support AB, for conducting statistical analysis. ***Declaration of interest:*** Professor Jan-Erik Juto is indirectly a major shareholder in Chordate Medical AG, a company active in the development of products based on kinetic oscillation stimulation (KOS) treatment. The authors alone are responsible for the content and writing of the paper.
{ "pile_set_name": "PubMed Central" }
0
Cartoon 3D Sex Categories Select Category 3D Anime Porn 3D Girls Busty Babe 3D Redhead 3D Girl 3D Hentai Sex Final Fantasy 3D Monsters Sex 3D Evil comics Furry babes Monster tentacles Monster with long dick Sex with demon Sex with Mutant Sex with Robot Small monsters porn 3D Porn Comics Big and Small Big Boobs sex Blonde blowjob Bondage Redhead blowjob 3D Sex Cartoons BDSM 3D Groupsex 3D Lesbian Sex 3D Outdoor Sex 3D Other Porn Other Porn Toons
{ "pile_set_name": "OpenWebText2" }
0.051339
From Fingering To Fucking: Voluptuous Nympho Needs Some Cum
{ "pile_set_name": "OpenWebText2" }
0.067797
Q: Prolog - infinite loop I want to check if element is in the middle of list. I search middle element and next I check if is a member of list, but I get infinite loop. My predicates: remove_first([_,H1|T], [H1|T]). remove_last([_],[]). remove_last([H|T], [H|T2]) :- remove_last(T, T2). remove_first_and_last([X],[X]). remove_first_and_last(In, Out) :- remove_first(In, Out1), remove_last(Out1, Out). middle([X], [X]). middle(In, X) :- remove_first_and_last(In, Out), middle(Out, X). member(X, [X|_]). member(X, [_|T]) :- member(X, T). is_middle(X, In) :- middle(In, Out), member(X, Out), !. And when I call is_middle(1,[2,1,3]) then I get true. But when I call is_middle(1,[2,2,3]) then I don't get a result. Interpreter don't interrupt the processing. A: In a situation as yours, you have two options. Either wade through walls of text of traces as you can see in another answer, or try to reduce first what you have to understand. I prefer the latter for I don't like to read much. But your major problem is this. You said: And when I call is_middle(1,[2,1,3]) then I get true. Yes, Prolog found a solution, but it did not find it once but infinitely many times. Just hit SPACE or ; to see this: ?- is_middle(1,[2,1,3]). true ; true ; true ; true ; true ; true ... So, already your first query was problematic. The best way to observe this, is to add false to this query: ?- is_middle(1,[2,1,3]), false. ** LOOPS ** Now, let's try to reduce the size of the query. We can narrow it down to: ?- is_middle(1,[1]), false. ** LOOPS ** With this we can now look at your program. Before anything else I'll remove the cut. It is misplaced anyway. To understand what is actually happening, I will narrow down your program by inserting false into it. With these extra goals it is possible to eliminate a lot of unnecessary detail. And still, the remaining program called a failure-slice is of relevance to us, if it is still looping. remove_first_and_last([X],[X]). remove_first_and_last(In, Out) :- false, remove_first(In, Out1), remove_last(Out1, Out). middle([X], [X]) :- false. middle(In, X) :- remove_first_and_last(In, Out), middle(Out, X), false. is_middle(X, In) :- middle(In, Out), false, member(X, Out). Compare this to your original program! Much less reading. To fix the problem you have to fix something in the remaining fragment. I suggest to remove the fact remove_first_and_last([X],[X]). This fact suggests that something is removed, but for this very case, nothing is removed. For a solution using a dcg directly: is_middle(E, Es) :- phrase(middle(E), Es). middle(E) --> [E]. middle(E) --> [_], middle(E), [_]. That is as short as it can get, but it has a tiny problem: It does not compute the answer determinately. You can see this by looking at the answer: ?- is_middle(1, [2,1,3]). true ; false. This ; false is an indication that Prolog was not able to finish the computation determinately. In other words, some space is left. You might be tempted to use a cut. Resist! If you are really into speed, take the fastest version: is_middle(X, Xs) :- Xs = [_|Cs], middle_el(Cs, Xs, X). middle_el([], [X|_], X). middle_el([_,_|Cs], [_|Xs], X) :- middle_el(Cs, Xs, X). In case you want @DanielLyons' interpretation which admits even-length lists to have two middle elements, see how easy it is to adopt above grammar definition. Simply add the following two rules: middle(E) --> [E,_]. middle(E) --> [_,E]. Alternatively, combine all four rules into one: middle(E) --> [E] | [E,_] | [_,E] | [_], middle(E), [_]. For the fastest solution, things are a bit more complex ... is_middle_dl(X, Xs) :- Xs = [_|Cs], middle_el_dl(Cs, Xs, X). middle_el_dl([], [X|_], X). middle_el_dl([_|Cs], Xs, X) :- middle_el_dl2(Cs, Xs, X). middle_el_dl2([], [A,B|_], X) :- ( X = A ; X = B ). middle_el_dl2([_|Cs], [_|Xs], X) :- middle_el_dl(Cs, Xs, X). To check it, I use SICStus since it gives more readable names to variables: | ?- length(Xs, N), N mod 2 =:= 0, is_middle_dl(X, Xs). Xs = [X,_A], N = 2 ? ; Xs = [_A,X], N = 2 ? ; Xs = [_A,X,_B,_C], N = 4 ? ; Xs = [_A,_B,X,_C], N = 4 ? ; Xs = [_A,_B,X,_C,_D,_E], N = 6 ? ; Xs = [_A,_B,_C,X,_D,_E], N = 6 ? ; Xs = [_A,_B,_C,X,_D,_E,_F,_G], N = 8 ? ; Xs = [_A,_B,_C,_D,X,_E,_F,_G], N = 8 ? ; Xs = [_A,_B,_C,_D,X,_E,_F,_G,_H,_I], N = 10 ? ; Xs = [_A,_B,_C,_D,_E,X,_F,_G,_H,_I], N = 10 ? ... A: Debugging Prolog takes some different skills, so let's take the long road there. First, let's notice something interesting about your two sample queries. The first one succeeds, and it should; the second one should fail, but instead it loops. This tidbit is a clue: it suggests that we're trying to handle a false case. This is a common mistake among people using Prolog after other languages. In Prolog, it's often enough to be explicit about successful cases and just let failures happen through failed unifications. The standard tool for debugging Prolog is trace/0. The idea is, you activate trace mode and then run your query, like this: ?- trace, is_middle(1,[2,2,3]). The trouble with trace/0 is that it can take some effort to understand what's happening with it. Each line starts with one of these four verbs: call, exit, redo, or fail. Then there's a number which indicates the nesting level of the call. The call and redo verbs tell you that you're entering a computation; exit and fail tell you a computation is ceasing and the nesting level is about to decrease. Call/exit are the normal case, fail/redo are what makes Prolog special, the non-determinism. In general, an infinite loop will look like some prefix of meaningful work (or possibly not) followed by an endlessly repeating chunk of output from trace. And we see that here. Prefix: Call: (8) is_middle(1, [2, 2, 3]) ? creep Call: (9) middle([2, 2, 3], _G1194) ? creep Call: (10) remove_first_and_last([2, 2, 3], _G1194) ? creep Call: (11) remove_first([2, 2, 3], _G1194) ? creep Exit: (11) remove_first([2, 2, 3], [2, 3]) ? creep Call: (11) remove_last([2, 3], _G1197) ? creep Call: (12) remove_last([3], _G1190) ? creep Exit: (12) remove_last([3], []) ? creep Exit: (11) remove_last([2, 3], [2]) ? creep Exit: (10) remove_first_and_last([2, 2, 3], [2]) ? creep Repeating chunk: Call: (10) middle([2], _G1200) ? creep Exit: (10) middle([2], [2]) ? creep Exit: (9) middle([2, 2, 3], [2]) ? creep Call: (9) member(1, [2]) ? creep Call: (10) member(1, []) ? creep Fail: (10) member(1, []) ? creep Fail: (9) member(1, [2]) ? creep Redo: (10) middle([2], _G1200) ? creep Call: (11) remove_first_and_last([2], _G1200) ? creep Exit: (11) remove_first_and_last([2], [2]) ? creep Now you can see it would be much easier to trigger the bad behavior just with this query: [trace] ?- is_middle(2,[3]). Call: (7) is_middle(2, [3]) ? creep Call: (8) middle([3], _G398) ? creep Exit: (8) middle([3], [3]) ? creep Call: (8) member(2, [3]) ? creep Call: (9) member(2, []) ? creep Fail: (9) member(2, []) ? creep Fail: (8) member(2, [3]) ? creep Redo: (8) middle([3], _G398) ? creep Call: (9) remove_first_and_last([3], _G398) ? creep Exit: (9) remove_first_and_last([3], [3]) ? creep Call: (9) middle([3], _G401) ? creep Exit: (9) middle([3], [3]) ? creep Exit: (8) middle([3], [3]) ? creep Call: (8) member(2, [3]) ? creep Call: (9) member(2, []) ? creep Fail: (9) member(2, []) ? creep Fail: (8) member(2, [3]) ? creep Redo: (9) middle([3], _G401) ? creep Now it should be clear that the problem has to do with the interplay of middle/2, remove_first_and_last/2 and member/2. Your definition of member/2 is exactly the standard definition so it probably isn't to blame. Now, interestingly, you have middle/2 calling both itself and remove_first_and_last/2. And both middle/2 and remove_first_and_last/2 have an identical clause: m([X], [X]). This kind of thing is a great generator of infinite recursion, because the first thing middle/2 does in its second clause is exactly what it just tried to do and failed with its own first clause. So it can find itself entering a recursive call in the second clause with exactly the same state it had in an earlier failed call to itself. The solution is to look at remove_first_and_last/2 and realize that your first clause there does not actually remove the first and last element. Removing the remove_first_and_last([X], [X]) clause fixes the code: [trace] ?- is_middle(2,[3]). Call: (7) is_middle(2, [3]) ? creep Call: (8) middle([3], _G398) ? creep Exit: (8) middle([3], [3]) ? creep Call: (8) member(2, [3]) ? creep Call: (9) member(2, []) ? creep Fail: (9) member(2, []) ? creep Fail: (8) member(2, [3]) ? creep Redo: (8) middle([3], _G398) ? creep Call: (9) remove_first_and_last([3], _G398) ? creep Call: (10) remove_first([3], _G398) ? creep Fail: (10) remove_first([3], _G398) ? creep Fail: (9) remove_first_and_last([3], _G398) ? creep Fail: (8) middle([3], _G398) ? creep Fail: (7) is_middle(2, [3]) ? creep false. Both your tests also now work: ?- is_middle(1,[2,1,3]). true. ?- is_middle(1,[2,2,3]). false. I think you added the base case here out of a sense of duty to have one. But the reality is that if you have a list of one element, it should fail to unify with remove_first_and_last/2 under any circumstance. This is very similar to handling an error case explicitly with Prolog, which tends to interfere with the working of the machinery. Now, one thing that's missing is, how do you want to handle even-length lists? What you have right now won't, with or without my change. Even-length lists don't have a middle element; is that what you intend? I suspect it isn't, because of the appearance of member/2 in is_middle/2. Comments on is_middle/2 What you have here could be restructured like so: is_middle(X, In) :- middle(In, [X]). Usage of member/2 isn't buying you anything because middle/2 can't ever produce a non-singleton list in its second argument. But, if it did, because you had even-length lists, it would be profitable. You could even make this code work that way by adding a third clause to middle/2: middle([X,Y], [X,Y]). Now see middle/2 works on even-length lists like so: ?- middle([2,1,3,4], X). X = [1, 3] ; false. Now the cut gets you into trouble though. For instance, 1 and 3 are both is_middle/2: ?- is_middle(1, [2,1,3,4]). true. ?- is_middle(3, [2,1,3,4]). true. Unfortunately though, if you ask for middle elements, you just have 1: ?- is_middle(X, [2,1,3,4]). X = 1. What happened to 3? You prevented it from being generated with your cut. I am not sure why the cut is here. I think you must have put it in to try and control the infinite recursion, but it doesn't help you, so get rid of it. Debugging by random addition of cuts is generally not a great idea. A much better approach is using Ulrich Neumerkel's failure slice approach (see this paper or search the tag for more information). DCG bonus You can rephrase remove_first_and_last/2 as a DCG rule: remove_first_and_last --> remove_first, remove_last. Pretty cool, huh? :) That's because the kind of input/output threading you're doing in that rule exactly what DCG rules get transformed into. Summary of changes remove_first_and_last(In, Out) :- remove_first(In, Out1), remove_last(Out1, Out). middle([X], [X]). middle([X,Y], [X,Y]). middle(In, X) :- remove_first_and_last(In, Out), middle(Out, X). A: is_middle(Item,List) :- append(Left,[Item|Right],List), length(Left,X), length(Right,X). Complex solutions are bad solutions, my friend. ?- is_middle(X,[1,2,3,4,5]). X = 3 ; false. Fully reversible predicate: ?- is_middle(3,L). L = [3] ; L = [_G13, 3, _G19] ; L = [_G13, _G19, 3, _G25, _G28] ;
{ "pile_set_name": "StackExchange" }
0
Prism.languages.basic = { 'string': /"(?:""|[!#$%&'()*,\/:;<=>?^_ +\-.A-Z\d])*"/i, 'comment': { pattern: /(?:!|REM\b).+/i, inside: { 'keyword': /^REM/i } }, 'number': /(?:\b|\B[.-])(?:\d+\.?\d*)(?:E[+-]?\d+)?/i, 'keyword': /\b(?:AS|BEEP|BLOAD|BSAVE|CALL(?: ABSOLUTE)?|CASE|CHAIN|CHDIR|CLEAR|CLOSE|CLS|COM|COMMON|CONST|DATA|DECLARE|DEF(?: FN| SEG|DBL|INT|LNG|SNG|STR)|DIM|DO|DOUBLE|ELSE|ELSEIF|END|ENVIRON|ERASE|ERROR|EXIT|FIELD|FILES|FOR|FUNCTION|GET|GOSUB|GOTO|IF|INPUT|INTEGER|IOCTL|KEY|KILL|LINE INPUT|LOCATE|LOCK|LONG|LOOP|LSET|MKDIR|NAME|NEXT|OFF|ON(?: COM| ERROR| KEY| TIMER)?|OPEN|OPTION BASE|OUT|POKE|PUT|READ|REDIM|REM|RESTORE|RESUME|RETURN|RMDIR|RSET|RUN|SHARED|SINGLE|SELECT CASE|SHELL|SLEEP|STATIC|STEP|STOP|STRING|SUB|SWAP|SYSTEM|THEN|TIMER|TO|TROFF|TRON|TYPE|UNLOCK|UNTIL|USING|VIEW PRINT|WAIT|WEND|WHILE|WRITE)(?:\$|\b)/i, 'function': /\b(?:ABS|ACCESS|ACOS|ANGLE|AREA|ARITHMETIC|ARRAY|ASIN|ASK|AT|ATN|BASE|BEGIN|BREAK|CAUSE|CEIL|CHR|CLIP|COLLATE|COLOR|CON|COS|COSH|COT|CSC|DATE|DATUM|DEBUG|DECIMAL|DEF|DEG|DEGREES|DELETE|DET|DEVICE|DISPLAY|DOT|ELAPSED|EPS|ERASABLE|EXLINE|EXP|EXTERNAL|EXTYPE|FILETYPE|FIXED|FP|GO|GRAPH|HANDLER|IDN|IMAGE|IN|INT|INTERNAL|IP|IS|KEYED|LBOUND|LCASE|LEFT|LEN|LENGTH|LET|LINE|LINES|LOG|LOG10|LOG2|LTRIM|MARGIN|MAT|MAX|MAXNUM|MID|MIN|MISSING|MOD|NATIVE|NUL|NUMERIC|OF|OPTION|ORD|ORGANIZATION|OUTIN|OUTPUT|PI|POINT|POINTER|POINTS|POS|PRINT|PROGRAM|PROMPT|RAD|RADIANS|RANDOMIZE|RECORD|RECSIZE|RECTYPE|RELATIVE|REMAINDER|REPEAT|REST|RETRY|REWRITE|RIGHT|RND|ROUND|RTRIM|SAME|SEC|SELECT|SEQUENTIAL|SET|SETTER|SGN|SIN|SINH|SIZE|SKIP|SQR|STANDARD|STATUS|STR|STREAM|STYLE|TAB|TAN|TANH|TEMPLATE|TEXT|THERE|TIME|TIMEOUT|TRACE|TRANSFORM|TRUNCATE|UBOUND|UCASE|USE|VAL|VARIABLE|VIEWPORT|WHEN|WINDOW|WITH|ZER|ZONEWIDTH)(?:\$|\b)/i, 'operator': /<[=>]?|>=?|[+\-*\/^=&]|\b(?:AND|EQV|IMP|NOT|OR|XOR)\b/i, 'punctuation': /[,;:()]/ };
{ "pile_set_name": "Github" }
0
05:01 Please Cum onto my Panties.
{ "pile_set_name": "OpenWebText2" }
0.058824
List of Marvel Comics characters: C Tatiana Caban Bethany Cabe Cable Danielle Cage Danielle Cage is a fictional character in Marvel Comics, the young daughter of Luke Cage and Jessica Jones. The character, created by Brian Michael Bendis and Michael Gaydos, first appeared in The Pulse #13 (March 2006). Danielle is named after Luke's teammate and best friend Iron Fist (Danny Rand). When Jessica goes into labor, the hospital refuses to deliver the baby, forcing Luke to take them to Doctor Strange. During the Secret Invasion, Danielle is kidnapped by a Skrull posing as Edwin Jarvis. Luke is forced to team up with Norman Osborn and Bullseye in rescuing her; Luke retrieve Danielle while Bullseye killed the Skrull. Eventually, Luke and Jessica decide to hire a nanny for Danielle, settling on Squirrel Girl after turning down more than twenty other superhumans. During the "Hunt for Wolverine" storyline, Luke and Jessica discover that someone has gotten hold of Danielle's genetic material to auction off on the black market. Other versions In an alternate future timeline, Danielle Cage, nicknamed Dani, inherits both of her parents' abilities and becomes Captain America. It is mentioned that she was mentored by an aged version of Black Widow, who goes by the name Madame Natasha. She is plucked from her timeline to battle Ultron and then a Doombot, and subsequently teams up with the modern day Avengers to battle Moridun, who had possessed Wiccan. She returns to the present again to aid the U.S.Avengers in capturing her nemesis, the Golden Skull. Luke Cage Caiera Caiera is a fictional character appearing in American comic books published by Marvel Comics. The character was introduced during the "Planet Hulk" storyline. She first appeared in Incredible Hulk vol. 2 #92 (April 2006), and was created by Greg Pak and Carlo Pagulayan. Within the context of the stories, Caiera was born on Sakaar to a tribe of Shadow People, the creators of the Old Power. She was raised by the priests to be a shadow warrior. When she was thirteen, her village was attacked by alien "spikes" that caused the other villagers to mutate into monsters. Caiera, the only survivor, was rescued by the Red Prince. When the Red Prince becomes the Red King, Caiera is his loyal lieutenant and the mother of his daughter. When the Hulk arrives on Sakaar and gains public support as a gladiator, she protects the Red King from him. After a failed attempt to ruin his popularity, the Hulk and his Warbound escape. Caiera is sent to kill the Hulk, but they encounter spikes during their battle. The Red King reveals he controls the spikes, devastating her. She turns against the Red King and aids the Hulk in a coup. Hulk becomes the Green King, and he marries Caiera. She becomes pregnant, but appears to die in the warp core explosion which laid waste to much of the planet. Hulk returned to Earth in World War Hulk. Although Caiera died, she posthumously - through the Old Power - gave birth to two sons, spawned from beneath the surface of the planet: Skaar and Hiro-Kala, who each found their own destiny. Caiera possessed abilities that were derived from the planet itself. She could transform her body into stone and become incredibly resistant and strong, to the extent that she battled the Hulk to a standstill even when his strength and fighting skills had dramatically increased. She was also an expert fighter and tactician. Other versions of Caiera An issue of What If? examined what would have happened if Caiera had survived the explosion instead of Hulk. Angered at the loss of her husband, Caiera takes the entirety of her planet's energies into herself, vastly increasing her power. She then goes to Earth to avenge his death. She kills the Illuminati and enslaves Earth. Caiera in other media Caiera appears in the animated direct-to-video film Planet Hulk, voiced by Lisa Ann Beley. She follows the Red King loyally because he saved her from the Spikes that destroyed her village and her family. However, it later turns out that the Red King was the one who created the Spikes, thus he is responsible for destroying Caiera's village and killing her people. Once the truth is revealed, Caiera angrily severs her loyalty to the Red King and aids the Hulk and the Warbound into defeating him. Caiera then plants a Spike bug on the Red King, leaving him to be killed by his Death Guard robots (as part of their programming to kill any Spike infestation) as revenge for her tragedy. She then goes on to becoming the Queen Consort to Hulk, who accepts his new role as the new King of Sakaar. Caiman Calamity Caliban Callisto Alisa Campbell Alisa Campbell is a fictional character in Marvel Comics. The character, created by Brian Michael Bendis and Michael Gaydos, appeared in Alias #22 (July 2003). While her name has never been revealed in the comics, for the convenience of this section she will be referred to by her name in the Netflix series. Alisa Campbell is the mother of Jessica Campbell, who would grow up to become Jessica Jones. While driving to Walt Disney World, Alisa got into an argument with her husband causing them to get distracted by driving into a military convoy that was carrying hazardous chemicals. The car swerved off the road and landed in an embankment, killing everyone except her daughter, Jessica. Alisa Campbell in other media Jessica's mother, named Alisa Jones (née Campbell), appears in the Netflix TV series Jessica Jones. She is presented as an amalgam of Jessica's actual mother and the woman who adopted her in the comics. In season 1, Alisa is played by Miriam Shor. Her name comes from Alisa Bendis, wife of Brian Michael Bendis, creator of the comic book character of Jessica Jones. She appears in flashback in the episode "AKA WWJD?" where she attempts to stop an argument between Jessica and her brother Philip. They die when the car crashes into a truck filled with chemicals. She shows up in a nightmare convincing Jessica to get to work. Alisa is a series regular in season 2, played by Janet McTeer. She is revealed to have survived the car accident, but is horribly disfigured. She and Jessica were treated at IGH, a private clinic specializing in gene editing. While Jessica was saved and discharged after three weeks, Alisa suffered more severe injuries and needed a longer recovery period. Dr. Karl Malus has to declare Alisa legally dead in order to save her life, because of the illegality of the operations. As a result of the intense gene therapy and reconstructive surgery, Alisa gained super strength similar to her daughter's, but she is also mentally unstable and is prone to dissociative episodes. She eventually breaks out of the IGH facility, and tracks down Jessica. Calypso Cammi Cancer Candra Cannonball Capricorn Captain Captain America Steve Rogers William Naslund Jeffrey Mace Sam Wilson James Buchanan Barnes Captain Atlas Captain Britain Captain Marvel Mar-Vell Monica Rambeau Genis-Vell Phyla-Vell Khn'nr Noh-Varr Carol Danvers Captain Midlands Captain Planet Captain Savage Captain UK Captain Ultra Captain Universe Captain Wonder Rosalie Carbone Rosalie Carbone is a fictional gangster in Marvel Comics. The character, created by Chuck Dixon and John Romita Jr., first appeared in Punisher: War Zone #2 (April 1992). Rosalie is the daughter of notorious criminal Julius Carbone and was engaged to be married to the son of one of Julius' partners. But after meeting the Punisher, she falls for him instead. She eventually meets the man she is supposed to marry, but he and Rosalie's father are killed by her uncle Sal, the supervillain Thorn. The Punisher rescues Rosalie, but kills Sal. Rosalie forcibly takes over her family's business and sets a hit out on the Punisher. Despite her best efforts, she fails and the Punisher once again spares her. Rosalie also briefly goes up against Lynn Michaels (Lady Punisher). Another Punisher was sent by Microchip to kill her. With Bullseye's help, she manages to escape and does some damage herself. She once again made an attempt on the Punisher's life, but was confounded by S.H.I.E.L.D.. She attended the crime families' meeting and was outraged that the Geracis were partnering with her sworn enemy. An intense fight broke out ending with Rosalie getting killed by her former high school friend Leslie Geraci. Rosalie Carbone in other media Rosalie Carbone is introduced late in season two of Luke Cage, played by Annabella Sciorra. Rosalie is first seen in "Can't Front on Me" attending an auction house with Anibal Izqueda, Eric Hong, and Hai-Qing Yang. In the episode "They Reminisce Over Your," Rosalie is among several gangsters that are seeking a slice of the void left by Mariah's arrest as it was mentioned that she was planning to expand into Harlem like her father did when he tried to drive the Stokes out. While some inmates loyal to her do an attempt on Mariah Dillard's life, Rosalie is visited by Luke Cage intimidating her into staying out of Harlem. Luke later goes into business with her and Anibal after Cage inherits control of Harlem's Paradise following Mariah's death. Rosalie makes a later appearance in season three of Daredevil. In the episode "Revelations," she is one of several criminal figures that Wilson Fisk directs blackmailed FBI agents to round up for a secret parlay. Rosalie is picked up by Ray Nadeem and Benjamin Poindexter at a groundbreaking opening ceremony as Ray tells her to come quietly. She is taken along with four criminal figures John Hammer, Everett Starr, Latimer Zyl, and Sophia Carter to a fancy restaurant in Hell's Kitchen called the Red Fish Blue Restaurant where they're seated around a circular table for several hours. Rosalie was shown to be on good terms with Zyl. Fisk then shows up and offers the five criminal figures protection from prosecution in exchange for 20% of their profits. When Starr refuses the offer, Dex kills him by lobbing a baton at his forehead. Fisk uses this as an incentive to hike the tax to 25%, which Rosalie and the other crime lords hastily agree to. In the season 3 finale, Rosalie is later seen as one of the many criminal figures and socialites in attendance at Fisk and Vanessa Mariana's wedding. She comments to Fisk about him sitting her next to the prosecutor that tried to send her to prison and stated that she made him hold her purse. When Nadeem's posthumous confession implicating Fisk in the manipulation of the FBI is leaked onto the Internet, Rosalie along with Hammer and Zyl quickly take their leave before Dex attacks the wedding. Cardiac Cardinal Caretaker Original Sister Sara John Carik John Carik was featured as the main supporting character in the mid-1990s series Blade: The Vampire Hunter, and was created by Ian Edginton and Douglas H. Wheatley. He was exclusively referred to in the solicitations as Bible John, and the use of that nickname was established in the first issue. However, that name was rarely used in other issues. He is the one of the last of an order of warrior/scholars named the Cathari, who all take vows to combat the evil forces of the supernatural. Carik appeared in almost all of the ten issues of Blade: The Vampire Hunter (July 1994 to April 1995). Issue #6 was the only issue in which he failed to appear. The series was cancelled after ten issues leaving John Carik's story unfinished. Carik was attacked by a supernatural being of an undisclosed nature, the encounter giving him precognition. He was shortly thereafter contacted by and joined the Cathari. Carik is covered from head to toe in wards and sigils that he has carved into his own flesh which give him protection from supernatural beings. Blade: the Vampire Hunter begins with Carik having a vision of the return of Dracula and the resulting destruction of New York City. His vision gives him the knowledge that Blade is the only one who can prevent the events from coming true. In order to warn Blade, Carik escapes from the Nyman Psychiatric Clinic and seeks him out. Once he finds Blade, Carik gives him a witch compass, a device for seeking out the supernatural. Although he never made an appearance in the Blade films or in Blade: The Series, many of John Carik's character traits are visible in the character Abraham Whistler. He was originally intended to appear in Blade: The Series, portrayed by Marc Singer, but this plan was eventually scratched. Luke Carlyle Luke Carlyle was created by J. Michael Straczynski and John Romita Jr., and first appeared in The Amazing Spider-Man vol. 2 #43. He is a thief and con man who worked his way up the corporate ladder, eventually rising to a trusted position. When the CEO of the company he worked at discovered Carlyle was a fraud, Carlyle killed him. Lacking the time to act, and with most of the company's assets either gone or unreachable, Carlyle then hired Otto Octavius under the guise of helping to make him a legitimate researcher, and stole his mechanical appendages. He was finally defeated by a combined effort between Octavius and Spider-Man. In other media Luke Carlyle, also known as The Mad Bomber, appears in all the versions of the Spider-Man 3 video game, loosely based on 2007 the film of the same name, voiced by Neil Ross (making him the only villain to appear in all versions, besides the 3 antagonists of the film itself: New Goblin, Sandman, and Venom). While as Caryle he is portrayed as a well-known and rich businessman, as The Mad Bomber he is the leader of the H-Bombers, one of the new gangs introduced in the game that are terrorizing New York City; their trademark is, as the name suggests, planting bombs wherever they go, as well as their high-tech costumes: either orange suits with a grey mask, resembling an environmental suit, or grey and black armored suits, equipped with a jetpack and light machine guns. The Mad Bomber is wearing a slightly modified version of this armored suit, as it is equipped with rocket launchers rather than machine guns, and its helmet is transparent, allowing people to see Carlyle's face. In the first mission of most versions of the game (other than the Game Boy Advance version), The Mad Bomber leads the H-Bombers into attacking his own building, the Carlyle building, for unknown reasons (most likely to hide his real identity, as people wouldn't believe Caryle to be The Mad Bomber and have destroyed his own building), and they blow up several floors, when Spider-Man arrives to save the day. He defeats several bombers and disarms their remaining bombs, even saving a woman that was tied up to a bomb, but the H-Bombers manage to escape in their helicopter. Later, in the main version of the game (the Microsoft Windows, Xbox 360, and PlayStation 3 version), the H-Bombers have their own side plot and missions, with Spider-Man having to constantly foil their plans, such as an attack on the subway or disarming their bombs all over Financial District. Spider-Man later begins working with Detective Jean DeWolfe, who is also investigating The Mad Bomber and, in exchange for Spider-Man's help with some deals and crooked cops, she informs him of the H-Bombers attacking a nuclear power plant. Spider-Man foils their plan once again and finally confronts The Mad Bomber in person, discovering that he is Luke Carlyle, but he and his goons manage to escape once again in their helicopter. Shortly after, the H-Bombers make a final attack on the Daily Bugle and, although Spider-Man disarms their bombs through the building, the bombers escape with J. Jonah Jameson in their helicopter, who also discovers that Carlyle is The Mad Bomber. Spider-Man follows them and rescues Jameson when The Mad Bomber throws him out of the helicopter, taking him to a rooftop, where they are both attacked by the helicopter. Spider-Man destroys the helicopter, saving Jameson's life and foiling the H-Bombers' plans for the final time, but The Mad Bomber escapes and is never seen again in the game, although the H-Bombers would still occasionally pop out through the city, committing various small crimes on the streets. In the PlayStation 2, Wii, and PlayStation Portable versions of the game, the H-Bombers storyline is shorter, as it features only two missions (besides the tutorial), the first one taking place shortly after the beginning of the game. This time, the H-Bombers focus their attacks on the Daily Bugle and plant bombs all over its Printing Plant and Regional Office, with The Mad Bomber sending a threatening call to J. Jonah Jameson right before the attacks, but Spider-Man learns about their plan from this call and is able to disarm all the bombs just in time. The second H-Bombers mission is very similar to their final one in the other version of the game, the only difference being that it takes place after unlocking the symbiote black suit (which can be taken on and off at will), and that The Mad Bomber directly fights Spider-Man, after he rescues Jameson and takes him to safety. Spider-Man defeats The Mad Bomber and destroys his helicopter, foiling the H-Bombers' plans for good, as they are never seen in the game afterwards. In the Game Boy Advance version of the game, The Mad Bomber isn't the leader of the H-Bombers gang, but rather plants several bombs across the city all by himself. His plan is foiled and he is defeated by a black-suited Spider-Man. Carnage (Red Carnage) Carnivore Carrion Miles Warren clone Malcolm McBride William Allen Sentient virus Peggy Carter Sharon Carter Tyrone Cash Cat-Man Towshend Horgan Sebastian Patane Unnamed Catseye Cell Centennial Centennial (Rutherford B. Princeton III) is a fictional superhero in Marvel Comics, notably Alpha Flight. He was created by Scott Lobdell, and first appeared in Alpha Flight vol. 3 #1 (2004). Rutherford spent some time as a police officer in Canada. During the Prohibition, he was sent to assist law enforcement officers in America. At one point, his girlfriend Amelia Weatherly goes missing and is later assumed dead. Rutherform 'buries' her and moves on with his life. He later slips into a coma lasting nearly two decades. The Alpha Flight member named Sasquatch recruits a new team of heroes, including Rutherford, who is roused from his coma. Rutherford helps rescue the original Alpha Flight and fight the Japanese team Big Hero Six. Later, they fight the criminal 'Manimator'. During his last known adventure, he travels back in time. His teammate Nemesis reveals that she is Amelia. Their post-Alpha Flight adventures have not been shown. A vision indicates the two were buried side by side, per the epilogue of Alpha Flight vol. 3 #12. Centurious Centurius Century Century is a fictional character, a superhero appearing in American comic books published by Marvel Comics. The character was depicted as a member of the Force Works team in the series of the same name from 1994–1996. Century first appeared in issue #1 of Force Works and was created by Dan Abnett, Andy Lanning, and Tom Tenney. Century was a genetic creation consisting of the minds of the hundred strongest and most able of the surviving alien Hodomurians. He possessed all their memories and instinctively used the knowledge he needed. Therefore, he was an expert on many topics and a very skilled fighter especially with his battle-staff, Parallax. His lifespan was apparently fixed at 100 years. He was sometimes seen levitating while in a deep meditative trance. He had a symbiotic rapport with Parallax, an entity which bound the multiple personalities of Century into a unified self. Since developing amnesia, Century couldn't remember much about his past and often had to search for the right words which led to Century sounding like a thesaurus when he often used three similar words to express himself. Single memories returned when he was confronted with something from his past or he dreamt about it. After losing Parallax for a while, memories of his composite minds loosened and even after Parallax was returned to him he continued to remember bits from the lives of the Hodomur he was composed of. To defeat the evil Nexus Being named Lore, responsible for the destruction of their world, the Hodomur race created Century, a being composed by the best 100 surviving Hodomur warriors. Possessing all of their memories, he was able to solve situations in many topics. He started a mission to track down Lore, but during inter-dimensional travel he was enslaved by Broker and brainwashed. Only the urge to find Lore was maintained on his mind. He soon became a "scout" for the evil alien race of the Scatter, that bought him from Broket. Following constantly Century, the Scatter could feast on the leftovers of the worlds destroyed by Lore. Century first encountered the superhero team Force Works when Scarlet Witch's magic brought the alien on Earth-616 following a battle against the Kree. Century knocked out Kalum Lo, then when questioned by Scarlet about his whereabouts, was able to say only his name. A few minutes later Scarlet Witch, Spider-Woman and U.S.Agent were all captured by the Scatter, that arriving on Earth following Century, caused also Wonder Man's apparent death. Iron Man questioned Century about the Scatter's whereabouts but Century knew only the name of their race and their evil goals, causing Stark to leave him behind. He was next to be brought to the Vault but escaped and teleported to Iron Man. Using the teleportation powers of his staff Parallax, Century helped Iron Man to rescue the team from an unknown world ravaged by the Scatter. He helped Force Works defeat these aliens. Getting quarter to the Works, he soon joined the team on a full basis participating to missions to Slorenia, China, Australia, and defeating the menace of the Starstealth once and for at all. During a brief travel to space aboard the ship of Broker, he was captured by the foe and sold to the mysterious Imogen. He was then freed by Azimuth, that was next to reveal the truth on his origins and life, but she was stricken by an energy blast of Imogen and fell comatose. After killing Broker for good, he returned to Earth, rejoining Force Works in time to help them unravel the plot of Kang (Immortus in disguise) that had on his side a corrupted Iron Man and Cybermancer, alternate version of scientist Suzi Endo. After Stark sacrificed himself to prevent Kang's plans, Force Works had to endure a last fight against alternate universe versions of Wonder Man, and Ultron, belonging to Cybermancer's reality. Force Works managed to resolve this situation. Before the team was disbanded, Century expressed the desire to learn more about his new homeworld, Earth. Force Works then responded to an emergency call starting for a final mission whose result remained unknown. Century is later recruited by Wonder Man (whose ionic energy leaking problem was affecting his judgement) to join his Revengers in a plot to defeat the Avengers. He was easily defeated by the New Avengers. While incarcerated at the Raft, Century and the rest of Wonder Man's followers were interrogated about their motivations for joining the Revengers. Century stated that he sided with Wonder Man out of sense of honor to him and recognition of the cycle of life. As his name and some of his history indicated, Century was meant to be the best of the 100 beings that made him up. He was shown to have greater than human strength, agility, and endurance. Additionally by using Parallax, he was able to teleport through inter-dimensional space. He's also an expert hand-to-hand combatant. He was often drawn as being taller than Iron Man or Hawkeye with long white hair and red markings over various parts of his body. Century in other media Century was part of the supporting cast in the 1994–1996 Iron Man animated series voiced by James Warwick in Season One, Jim Cummings in "The Beast Within," and by Tom Kane in the two-part series finale. A scene in the episode "Data In, Chaos Out" gives Century a civilian identity as a man named Woody where he sports shades and a broad-brimmed hat. In "The Beast Within," Century was the one who told Iron Man that the Force Works team is relocating from Stark Industries following Iron Man's team-up with the Mandarin to stop Fin Fang Foom. In the two-part episode "Hands of the Mandarin," Century rejoins Force Works when Mandarin uses the Heart of Darkness crystal to disable all technology. He appeared to knock out Hypnotia when she was using her powers on Iron Man and War Machine. Cerebra Cerise Challenger The Challenger is the name of different fictional characters appearing in American comic books published by Marvel Comics. William Waring The William Waring version of Challenger appeared beginning with the company's 1940s iteration as Timely Comics during the period fans and historians call the Golden Age of Comic Books. The Challenger first appeared in Daring Mystery Comics #7 (April 1941) from Marvel Comics predecessor Timely Comics, debuting in both a two-page text story, "The Valley of Time", by writer Ray Gill, and in the 12-page comics story "Meet the Challenger", by an unknown writer and artist George Klein, under the pseudonym "Nick Karlton". The character went on to appear in Mystic Comics #6-10 (Oct. 1941 - Aug. 1942), in eight- to nine-page stories by artists including Al Bare and Mike Sekowsky, and in at least one instance written by Stan Lee ("Horror Mansion", Mystic Comics #9, May 1942). The Challenger did not reappear for decades before making a brief appearance in Marvel Premiere #29 (April 1976), in a World War II period story featuring the homefront superhero team the Liberty Legion. The Challenger first appears in a modern-day story in She-Hulk #11 (March 2005), having "bounced forward" in time. Demon The demon version of Challenger first appeared in Ghost Rider Vol. 2 #17 and was created by Tony Isabella and Frank Robbins. The Challenger is a demon that works as an agent for Mephisto. He was dispatched by Mephisto to drag Ghost Rider to Hell. At the time when Ghost Rider and Daimon Hellstrom were exorcising Legion from the body of Katy Milner, Challenger appeared and challenged Ghost Rider to a deadly race for the fate of Katy. Though he defeated Ghost Rider, Challenger was hit by Ghost Rider's hellfire attack where the spell that caused Katy Milner to be the cursed form of Roxanne Simpson to be broken. Peter Parker When the Avengers and the New Avengers were displaced in the World War II era and collaborated with the Invaders, Peter Parker sported a green costume and took up the alias of the Challenger when fighting Red Skull and the Nazis. Elder of the Universe The Elder of the Universe version of Challenger first appeared in Avengers #678 and was created by Mark Waid, Al Ewing, Jim Zub, and Pepe Larraz. An earlier member of the Elders of the Universe originally went by the name of Grandmaster until he lost it in a contest against En Dwi Gast whom he shared a gaming hobby with. This Elder was banished to the void of nothingness until the end of time. After the Multiverse was recreated following the end of the "Secret Wars" storyline, the Elder returned and took up the name of Challenger where he challenged Grandmaster to a rematch. With Earth as the battleground, Challenger reassembled the Black Order to the point where he resurrected Black Dwarf, Corvus Glaive, Proxima Midnight, and restored Supergiant as a psychic projection. Challenger puts them up against Grandmaster's incarnation of the Lethal Legion. One of the challenges involved gathering the Pyramoids that are in different locations. When it came to the final round, Challenger had an ace up his sleeve in the form of a resurrected Hulk. When Hulk destroyed the Pyramoid that was in Voyager's possession at the Avengers Auxiliary Headquarters, it cost the Challenger the victory he needed. Though they both heard Voyager's confession to the Avengers for her involvement with Grandmaster. Before Grandmaster can offer him a rematch, Challenger apparently disintegrated him and made plans to destroy Earth under the alias of Grandmaster Prime. He fought off Falcon, Hulk, Rogue, and Wonder Man until Voyager arrived with an army of Avengers to fight Challenger. Voyager's morale boost and power augmentation from Scarlet Witch enabled Challenger to be defeated. Voyager then took Challenger back to the Far Shore and shackled him to observe the Avengers' subsequent adventures where Voyager hopes that they can inspire him like they did with her. Challenger agreed to watch the Avengers until the day he is able to break free. Chamber Chameleon Champion of the Universe Chance Marlo Chandler Robin Chapel Charcoal Charlie-27 Charon Chemistro Curtis Carr Archibald Morton Calvin Carr Lila Cheney Zhou Cheng Cheshire Cat Chewie Chewie is a fictional alien in Marvel Comics. The character, created by Brian Reed and Roberto De La Torre, first appeared in Giant-Size Ms. Marvel #1 (April 2006). Her alien origin was invented by Kelly Sue DeConnick and David López for Captain Marvel Vol. 8 #2 (June 2014). An ordinary-looking cat was caught in between an intense fight between Carol Danvers, then known as Ms. Marvel, and Sir Warren Traveler inside a fiery building. Following this, the cat randomly showed up at Carol's apartment while she was about to give an interview. Carol opted to finally adopt the stray and calls her Chewie because she reminded her of the Star Wars character Chewbacca. Since then, Chewie made sporadic appearances as a comforting companion throughout Carol's career as Ms. Marvel and when she finally took up the mantle of Captain Marvel. This all changed when Carol took Chewie into space with her and they encountered the Guardians of the Galaxy. Rocket Raccoon immediately identified Chewie as a Flerken, a species of alien that resembles the Earth cat, but in actuality are dangerous alien creatures. Rocket attempted to kill her before she laid eggs, but Carol stopped him as she did not believe Rocket. He ended up being correct, as Chewie laid 117 eggs that all immediately hatched. Carol, Rocket and their friend Tic had to take Chewie and her offspring to a rescue center where Carol planned to drop them off as she could not take care of them all. However, Chewie teleported back to their ship to be with Carol, leaving her offspring behind. In other media A version of the character, renamed Goose in reference to the Top Gun character Nick "Goose" Bradshaw, appears in Captain Marvel. She is portrayed by four different cats: Archie, Reggie, Rizzo and Gonzo. Each one was chosen based on their personalities and for nuzzling, holding, "face" and "jerk" actions. Goose once belonged to Mar-Vell who was posing as an Earth scientist named Wendy Lawson. When the amnesiac Vers (Carol Danvers) and Nick Fury were investigating Lawson, they come across Goose who begins following them. Talos is the first to identify Goose as a Flerken; greatly frightening him. Goose was present when Talos has a parley with Carol Danvers and Nick Fury. During the climax, Goose reveals her true nature by using her abilities to defeat Kree soldiers and swallowing the Tesseract. Despite being very tame and friendly, she unexpectedly slashes Fury's eye, explaining his eye patch in earlier movies. In the post-credits scene, Goose coughs up the Tesseract. Chimera Amadeus Cho Ch'od Chondu the Mystic Andrew Chord Chronomancer Chthon Chtylok Chtylok the Che-K'n Kau first appeared in Sensational Spider-Man vol. 1 #13 (February 1997.) Chtylok is a tall half-chicken, half-cow creature that inhabits an area of the Antarctic, just outside the Savage Land. Millennia ago, the Fall People of the Savage Land worshiped the fearsome beast, until it went into hibernation. The hole in the ozone layer has begun to cause the ice around the Savage Land to melt, which wakes Chtylok from its hibernation. Somehow, it finds its way to the surface of Monster Island, and follows several fleeing monsters to the Florida Keys. There it meets the Hulk, and engages him in battle. Chtylok is a tall chicken-like monster with razor-sharp talons, bovine-like legs and hooves, and a large, spiked, prehensile tail. Despite his immense size, he is capable of flight. His strength is in the same class as the Hulk, as he was able to engage him in battle for some time. Cipher Citizen V John Watkins Paulette Brazee John Watkins Jr. Helmut Zemo Dallas Riordan John Watkins III Roberto da Costa Clash Clash (Clayton Cole) is a fictional supervillain appearing in American comic books published by Marvel Comics. Clash first appeared in The Amazing Spider-Man Vol. 3 #1 (June 2014), and was created by Dan Slott and Ramon Perez. While he had a brief criminal career and was granted a spot on Parker Industries upon his reform, he regressed back to his criminal roots during the Civil War II storyline. At a young age, Clayton Cole was a smart kid who was home-schooled by his mother. During his youth, he saw Peter Parker's Masked Marvel appearance going up against Crusher Hogan in a wrestling match. Since then, he started working on technology so that he can be like the "Masked Marvel". This led him to being Clash. In his first time operating as Clash, Cole came into conflict with Spider-Man. He was defeated by Spider-Man and sentenced to juvenile hall. After being released on parole, Clash was working as henchmen for Owl and other supervillains. During the "Spider-Verse" storyline, Clash's latest employer was the Kree named Doctor Minerva. When Spider-Man was aided in battle Ms. Marvel and discovered that the latter has taken an Inhuman baby from Doctor Minerva, Clash turned against Doctor Minerva. Upon recognizing him and seeing that he has gone straight, Spider-Man offered Clash a job at Parker Industries which he accepted. Clayton's work at Parker Industries involved Spider-Man's globetrotting adventures like helping out against Zodiac to the infiltration of Ghost. During the "Civil War II" storyline, the Inhuman Ulysses Cain had a vision where Cole is Clash again and attacks Spider-Man. Cole later meets Sully back when he used to work for Owl and can't talk long without violating parole. Later on, Clayton's parents are displeased that their son is working as an "office drone" while his father wants Peter to help with their retirement. While showing his latest project for the NYPD to Parker, Clayton is told that he should talk to him if he has any problems. Upon hearing Ulysses' vision of him when he arrives in Peter's office, Clayton resigns from Parker Industries. At Moynihan's Social Club, Clayton tells Sully and another person on how companies like Roxxon Energy Corporation are destroying the planet. Afterwards, Clayton meets Mendel Stromm who makes a reference to how Norman Osborn stole the former's work to be left poor. After providing Clayton with the Tinkerer's number, Mendel gives Clayton a day to consider helping in revenge on Harry Osborn. After calling Tinkerer who makes him an updated Clash suit, Clayton calls up Stromm. In his new suit, Clash arrives at Stromm's apartment where he finds Stromm in the Robot Master appearance and robots. Robot Master then compliments Clash's outfit and claims that Spider-Man won't know what happened. When Clash attacks Robot Master stating that he will look out for himself, Robot Master unleashes his robots on Clash even when Spider-Man arrives. Spider-Man manages to web Robot Master in the air with foam web. When Spider-Man was talking Clash into getting back to the civilized life, Robot Master rises and attacks them. While Clash flies away, Spider-Man defeats Robot Master by ripping the remote control mechanics from within the robot body, deactivating the robot army. When Clayton states that he was trying to protect Parker Industries from Stromm, Spider-Man stated that he caused harm with his technology, caused millions of dollars worth of damages, and violated his parole. Though Parker did talk to Clayton's parole officer where he stated that Clayton acted in self-defense and that Clayton will have to give up on working on sonic technology. Though Clayton doesn't seem to agree with Spider-Man's proposal to discontinue his work on his sonic technology which leads to Ulysses' vision coming true. After battling Spider-Man on the streets, Clash escapes and returns to the Moynihan's Social Club where he decides to be a crime boss. Clash was seen at the closed Now Forever Nightclub where he discusses with his thugs the plans to take back his inventions that he made for Parker Industries to evade them being sold to pay off some debts. When Clash enters the Baxter Building to take back the Sonic Transducer, Harry sees that something is off and alerts Spider-Man and the Human Torch. Due to a self-charging power source getting stuck in the upward cycle, Clash had to work with Spider-Man and Human Torch to deactivate it. While Spider-Man catches Clash's thugs, he allows Clash to get away. During the "Go Down Swinging" storyline, Peter later persuades Clash to look over the Osborn family in light of the Red Goblin's threat. At Port Authority of New York and New Jersey, Clash assists Human Torch in protecting the Osborn family from Red Goblin. Their attacks do nothing against Red Goblin because the Goblin formula made the Carnage symbiote immune to fire and sound. Red Goblin then proceeds to defeat Human Torch, Clash, Silk, Miles Morales, and Agent Anti-Venom. Clash possesses a genius-level intellect. He can also utilize sonic technology to various uses. Clash in other media Clayton Cole / Clash appears in the Spider-Man animated series, voiced by Yuri Lowenthal. This incarnation is a teenager who specializes in sonic technology. In the episode "Osborn Academy", he competes with Herman Schultz for a spot in Osborn Academy where they use their different sonic devices enough for Spider-Man to intervene. The three-way battle was crashed by the Jackal who steals Herman and Clayton's technology with the help of a stolen Stark Industries tech. The two help Spider-Man by telling how to disable the tech. After Jackal gets away, Spider-Man brings Herman and Clayton back to Osborn Academy to face their actions as Spider-Man tells Osborn Academy's security team to grant them leniency. Norman Osborn takes the blame for driving the two boys into what had transpired. As Osborn grants Herman a spot in Osborn Academy, Clayton is told to try again next time much to Max Modell's objection. Clayton Cole appears in The Amazing Spider-Man 2 video game, voiced by an uncredited voice actor. This incarnation is a street thug who is a friend of Herman Schultz that can be found in an alley along with a group of other street thugs. He has a special dialogue with Spider-Man and tells how to find Schultz and get information about Dennis Carradine. Clea Albert Cleary Cloak Cloud 9 Clown Eliot Franklin Half-brother Unnamed Coachwhip Coal Tiger Cobalt Man Cobra Izzy Cohen Malcolm Colcord Coldblood Collective Man Collector Rusty Collins Colonel Colossus Comanche Comet Comet (Harris Moore) is a fictional character in the Marvel Universe. He first appeared in Nova #21 (September 1978), and was created by Marv Wolfman and John Buscema. In the late 1950s, radiation from a gaseous entity resembling a tiny comet mutagenically altered him, giving him superhuman flying and electrical powers, which he used as a costumed crimefighter. Decades later, he went to Xandar to aid its people in their war against the Skrulls as one of the Champions of Xandar. After his son Crimebuster died, the Comet chose to remain on Xandar. The Comet died battling the forces of Nebula. Comet Man Commander Kraken Conan Condor Billy Connors Martha Connors Conquest Constrictor Contemplator Controller Jen Cooke Finn Cooley Carlie Cooper Valerie Cooper Copperhead Lawrence Chesney Arthur Reynolds Davis Lawfers Copycat Anya Corazon Peter Corbeau Edwin Cord Abraham Cornelius Archie Corrigan Corruptor Corsair Tom Corsi Fabian Cortez Cosmo the Spacedog Cottonmouth Cornell Cottonmouth Burchell Clemens Phil Coulson Delphine Courtney Delphine Courtney is a fictional character in the Marvel Universe, an enemy of the super-team Alpha Flight. Publication history Delphine Courtney first appeared in Alpha Flight #7 (February 1984), and was created by John Byrne. The character subsequently appears in Alpha Flight Vol. 1 #11–13 (June–August 1984), #22 (May 1985), and #25–28 (August–November 1985). Delphine Courtney appeared as part of the "Omega Flight" entry in the Official Handbook of the Marvel Universe Deluxe Edition #9. Fictional character biography Delphine Courtney was a servitor robot, built by the Roxxon Energy Corporation to serve Jerry Jaxon. The robot initially had a feminine shape and fully human appearance, and was referred to as "she" by its creators, to the point that Jaxon himself was unaware of "her" true nature. Courtney acted on Jaxon's behalf to recruit several superhumans that were former members of the Canadian government's training teams, Gamma Flight and Beta Flight, that were dismissed after the government closed Department H, the division that oversaw Gamma, Beta, and the primary team, Alpha Flight. Jaxon intended to form his own super-team, Omega Flight, in order to revenge himself on James MacDonald Hudson, founder of Department H and leader of the still-active Alpha Flight as Guardian, and through an "influencer" device built into its systems, Courtney was able to manipulate the already-disenfranchised recruits into seeking their own revenge on Alpha. However, Courtney was unable to influence Roger Bochs, inventor of the Box robot, who was still loyal to Hudson and the Flight program, forcing Jaxon to directly involve himself by taking control of Box. Luring James Hudson and his wife Heather to America with an offer of employment at Roxxon's New York City holdings, Jaxon and Omega Flight executed an ambush of Guardian while Heather was detained by Courtney. When Heather made an attempt to escape and scuffled with Courtney, the robot's flesh-like facial covering was damaged and its true nature revealed. While Omega Flight's goal of revenge was attained with Guardian's apparent death, Courtney was witness to Jaxon's own death due to feedback from Box's destruction, and the remaining members of Omega were turned over to the New York City authorities. Escaping capture, Courtney freed Omega Flight from jail and employed them in a new plot against Alpha Flight. Having its appearance reconfigured and incorporating facsimiles of Guardian's battle-suit technology into its systems, Courtney infiltrated Alpha Flight posing as a returned Guardian (using a cover story that was later revealed to be the actual fate of the real James Hudson), and eventually lured them into a second encounter with Omega Flight, using Alpha's trust of "Guardian" to ambush them. However, Omega Flight's victory was foiled by the arrival of the Beyonder, and Courtney and its team were forced to flee. Their escape was blocked by Madison Jeffries, a former Flight trainee whom Courtney had avoided recruiting, fearing his ability to control machines and his loyalty to James Hudson. When Jeffries attacked with a construct created from an automobile, Courtney used one of the future duplicates of Omega Flight member Flashback as a human shield, resulting in its death (and the mental breakdown of the original Flashback, now condemned to violent death in his future). This enraged Jeffries, who used his powers to destroy Courtney, forcing its internal circuitry out of its mouth. Roger Bochs and Madison Jeffries later salvaged portions of Courtney's second incarnation to construct a new battle-suit functionally identical to James Hudson's original, which was used by Heather Hudson under her husband's former identity of Vindicator. Powers and abilities Delphine Courtney possessed superhuman strength, and had a high degree of resistance to physical damage. Its sight and hearing were sharper than a human being's. It also possessed a device called an "influencer" that could affect pre-existing psychological conditions in the human mind, allowing Courtney to manipulate individuals with judicious use of the influencer combined with verbal interaction; however, it could not absolutely control human beings, as Roger Bochs' loyalty to James Hudson allowed him to resist its manipulations. Courtney was also able to disguise itself as a human being with a flesh-like outer covering. It could masquerade as either gender by altering its underlying structure, and could even impersonate specific individuals convincingly enough to fool those close to the person imitated. While impersonating James Hudson/Guardian, Courtney also contained technology that could replicate the properties of Guardian's original battle-suits, granting it all of Guardian's super-powers. Cowgirl Graydon Creed Crime Master Nicholas "Lucky" Lewis Sr. Nicholas Lewis Jr. Bennett Brant Imposter Inner Demons Crimson Cavalier Crimson Commando Crimson Cowl Crimson Curse Crimson Dynamo Anton Vanko Boris Turgenov Alexander Nevsky Yuri Petrovich Dmitri Bukharin Valentin Shatalov Others Crippler Augustine Cross Augustine Cross is a fictional character in Marvel Comics. The character, created by David Michelinie and John Romita Jr., first appears in Iron Man #145 (April 1981). He is Darren Cross's son and Crossfire's second cousin. Taking over as his family company's CEO after his father's death, Cross attended the 24th annual Conclave of Electronics Engineers and Innovators, rubbing shoulders with various companies' representatives: Stark Industries, S.H.I.E.L.D., Cord Conglomerate and Roxxon. Thought to be connected with the Raiders' attacks, Cross was innocent as Edwin Cord was responsible. Augustine later kidnapped Dr. Erica Sondheim to transplant a new heart into Darren's cryogenically preserved body. Enlisting Crossfire's aid, Augustine has Cassie Lang kidnapped, believing the girl's Pym Particle-irradiated heart could sustain Darren's condition. As Ant-Man and Darren fight while Sondheim transplants another heart into Cassie, Augustine arrives to transport Darren to ultimately flee when the Pym Particles now within in his father's body caused to shrink down. In light of Darren's refusal to invest in Power Broker's Hench App, Augustine hires Machinesmith to hack into Power Broker's database so the Cross family could steal an algorithm to create the Hench App knock-off Lackey. Augustine gets injured during a showdown where Ant-Man and Stinger fight Darren and Crossfire, ending up comatose. Augustine's hospitalization leads to his father's recruitment of Egghead and the use of a powerful battlesuit. Darren Cross Crossbones Crossfire Crucible Crule Crule is a mutant whose first appearance was in X-Force vol. 1 #12. One of the immortal mutants known as Externals, Crule is the meanest and maddest of them all. According to Gideon, during World War II he worked in a concentration camp, happily operating a gas chamber. He is an ancient berserker, dressing like a barbarian and old enough to remember Mithras. Crule was sent by Gideon to attack X-Force after they rescued Sunspot. However, Crule is blasted out of X-Force's ship by Rictor and falls a few thousand feet, which puts him in a body cast.bCrule has enhanced senses, strength, speed, agility, reflexes, coordination, balance, and endurance. His body has natural weapons, including hair coiled into whip-like braids, fangs, and gauntlet-covered claws. Crusader Arthur Blackwood Skrull Crusher Greek Caldwell Rozza Juan Aponte Crystal Cutthroat Danny Leighton Danny Leighton was born in Austin, Texas. He was a member of the Savage Crims, a New York street gang, as a young man. He later became an assassin and was (as his first high-profile job) hired by Amos Jardine to kill Spider-Man, in place of the mad killer Arcade. Cutthroat battled Nightcrawler, who had gotten wind of the plan, and Spider-Man, and they defeated him with some secret assistance from Arcade himself. Many years later, he defeated Mangler and Deathstrike in a fight to the death to become the Red Skull's new chief operative, replacing Crossbones. He underwent training by the Taskmaster. He tried to persuade Blackwing and Jack O'Lantern to help him free Mother Night from the police. He initiated a brief affair with Mother Night. With the Skeleton Crew, he battled Crossbones and Diamondback. He realized that Diamondback was his sister, Rachel, and revealed his true identity to her. When Crossbones returned, Cutthroat feared he would be made redundant and so planned to kill Crossbones in his sleep. However, Mother Night alerted Crossbones to the plan, and so Crossbones was waiting for the "ambush" and slit Cutthroat's throat and he was seemingly killed. The Red Skull even inspected the apparent corpse. However, unknown circumstances show that he is alive and was an inmate in the Raft where he escaped with a lot of other convicts. He was later recaptured. The Hood has hired him as part of his criminal organization to take advantage of the split in the superhero community caused by the Superhuman Registration Act. He helped them fight the New Avengers but was defeated by Doctor Strange. As part of the Hood's gang, he later joins the fight against the Skrull invading force in New York City. He joins with the Hood's gang in an attack on the New Avengers, who were expecting the Dark Avengers instead. During the "Search for Tony Stark" arc, Cutthroat rejoined Hood's gang and assisted in the attack on Castle Doom. Hobgoblin's Cutthroat While regaining his franchises, Roderick Kingsley sold one of Cutthroat's old costumes to an unnamed criminal to become his version of Cutthroat. Cyber Cyclone André Gerard Gregory Stevens Pierre Fresson Cyclops Cypher Cyttorak References Marvel Comics characters: C, List of
{ "pile_set_name": "Wikipedia (en)" }
0
My Favorite Music July 05, 2011 Life and Emotion...... I'm feeling a little down today. Been doing a lot of thinking about the different levels of emotion and how we all feel and handle it very differently. I've suffered a lot of pain and heartache in my life but its how you handle that heartache that shows the character of a person. I've always had a huge heart...gave it willingly and unselfishly and I've felt so much joy and love but what do you do or how do you process and feel the emotion of pain you feel when someone you care deeply for hurts you. You can't stop loving them...but the pain you feel is a pang so deep and your eyes fill with welts everytime your mind goes back to the feeling, even though you try so very hard to forge forward. You never feel the people you love the most will ever do that..but its a part of life and nobody is perfect I realize...the pain still is felt and where do you put it and where do you go from there. How do you trust...How do you heal...find the faith everyone has instilled so deeply within them. I"m having one of those days. I woke up this morning feeling such a happiness and hope for the day and in the course of just a few minutes it can turn into a heaviness and weeping loss and pain. I acknowledge that I have grown to be a very strong woman in my journey of life and have learned a lot of how I want to experience it..the kind of person I need to share it with and the really important things to me and my happiness. Everyone has that one love of a lifetime...that probably only crosses your path once. KNowing what to do when you find it in front of you and let yourself feel it to the depths of your soul. Children bring you so much love and hope for life that you can only rejoice they are such a gift. Having a purpose in life, something to challenge you and make you a better person. Having a faith in something greater than yourself. When you feel the pain and hurt from one or all of these how does the heart heal from this. I know time heals...I know God heals our hearts...I know love can make you dance...cry....laugh and be filled with so many levels of emotion and some are so easy to process and deal with...but what do you do with the pain...where does it go and how do you grow stronger for it. I know I"m the woman I am because of the pain and hurt and joy and amazing gifts I have been given through my lifetime...but each time it happens..its like it is the first time and you have to reach very deep within and grab on to hope and move forward and grow and yes sing your own song. It never gets easy...but I keep trying. What a bad day! I've been hurt too. A lot depends on who is doing the hurting (husband, children, friend) it can really devastate me. Then I think I'm suppose to forgive 70 times 70.....hummm....time always makes it easier. I really enjoy the pictures of your house and porch! Pat Mc
{ "pile_set_name": "Pile-CC" }
0
3 things that will change the world today Send me interesting reports, magazines, promotions and exclusive content from the Verdict group You are in control of the communications you receive from us and you can update your preferences anytime to make sure you are receiving information that matters to you. Please check our Verdict Privacy Policy to see how we protect and manage your submitted data. The Shoreditch area of London is fast becoming synonymous with huge companies in the fashion industry. Amazon are following in the footsteps of other large fashion and clothing retailers such as Christian Louboutin, River Island, and Oasis, all of whom call Shoreditch home. Amazon’s UK County Manager, Doug Gurr, said: London is home to some of the most talented, creative people on the planet. We believe that we can provide our teams of innovators with inspiration in a new, purpose-built workplace in one of the most creative locations in London — Shoreditch. We’re also going to be giving back to the local community in various different ways, such as helping schools and helping more women get access to tech educations. This new office is actually the second development Amazon has opened in the Shoreditch area in recent years. Europe’s largest fashion photography studio was opened by the retail giant back in 2015. What will this mean for the UK’s tech scene? Minister for digital, Matt Hancock, said: This is excellent news for Britain. Amazon’s increased investment in developing cutting-edge technology in London is another vote of confidence in the UK. We really are a world-leading centre of creativity and innovation, and Shoreditch is a real showcase of that. 3 Things That Will Change the World Today Get the Verdict morning email With the wealth of growth in Amazon Fashion, the fashion conscious location of the new office and the enormity of the Amazon photography studio – is fashion becoming a forte for the retail giant? At the time of opening, Amazon’s multi-million pound photography studio stocked clothing and fashion from around 100 different retailers. However, with Amazon seemingly being a go-to place for everything, Amazon Fashion needed to keep up. The result? It’s exploded. Amazon now stocks over 350 new brands in their fashion section.
{ "pile_set_name": "Pile-CC" }
0
Points of Interest Tartu places you next to Science Centre AHHAA and within a 10-minute walk of Tartu Kultuuritehas. This 68-room hotel welcomes guests with conveniences like free breakfast, a restaurant, and free in-room WiFi. Tartu Art Museum and Father and Son' sculpture are also a short walk from this Tartu hotel. Dining Free hot/cold buffet breakfast is included with your stay and awaits you each morning. Enjoy a bite to eat at the hotel's café, or relax with a drink at the bar/lounge. Rooms Property features Guests of Tartu enjoy a sauna, free WiFi in public areas, and conference space. The 24-hour front desk has staff standing by to help with dry cleaning/laundry, tours or tickets, and luggage storage. Additional amenities include coffee/tea in a common area, express check-in, and a hair salon.
{ "pile_set_name": "Pile-CC" }
0
Nogizaka Haruka no Himitsu episode 7 Well, this is a late post, but it’s better very late than never. I’m going to make this post relatively short only because it’s so late and nobody really cares for this episode anymore because it has been awhile since it was released. Anyway, as predicted, Haruka’s father found out about her hobby. He took all her merchandise, which was quite extensive; much to my surprise. From the things she had, I was able to spot out some dangos, Horo from Spice and Wolf on a cup, Shana and Kino. Her father had pretty ridiculous rants, he mentioned a lot of stuff about how anime and manga were such vulgar and foolish hobbies; definitely amusing. So, her upset father decided to release the Hell Hounds to go get Haruka back because she escaped before she was able to get punished. Something that was constantly done in this epsiode was that many of the situations were very exaggerated, like these supposedly Hell Hounds, who are basically just a mini army who came out of nowhere. When Haruka and Yutto finally come into the scene, it was left off from the last epsiode and we start it all off on a romantic note. Though, Hazuki ruins it by letting herself randomly into the house and deciding that she has to stay to protect Haruka. One thing leads to another and everyone ends up deciding to let Haruka stay for the night. It was very amusing when they were having dinner and Haruka mentioned how she admired Ruko’s ability to hold down liquor and that she wanted to be just like her! It’s hard to imagine Hruka ever drinking any type of alcohol only because she is so innocent in every way. Mika calls Yuuto to tell him that things are still pretty much the same, meaning they are still being hunted down like prey, she also mentions how he should be careful considering it would be Haruka’s first time. I’m glad Yuuto responded by just telling Mika that she knows way too much for her age because I was thinking the exact same thing. Hazuki was pretty funny when she was drunk because she was still able to keep her composite and aloof attitude, but she still ended up bumping into walls and mistaking the fridge for a front door. Yuuto had to carry the sleepy Haruka to the guestroom, which is when he started thinking perverted thoughts about her. In general it was pretty ridiculous, but they always seem to add a fanservice moment her and there in this series. As Yuuto lays in his own bed, Haruka comes to visit him, telling him how she’s is scared of the dark and how she wants to sleep in the same bedroom as him (not with him, if I’m not clear enough). Yuuto was obviously in panic, but he still accepted and she lay out her bed on the floor beside him. As a Yuuto had a five second flashback, it becomes evident that there is something about Yuuto’s past that we still don’t know about yet. There was the costume in the last episode that he was familiar with and now there was a girl who was giving him a magazine, I’m actually curious to what the story might be. Haruka ends up asking him to hold hands, which was really cute. There was obviously some more blushing at this moment, but I’m starting to get used to it. Also, something I never really expected myself to say is that Yuuto actually looks good when he isn’t wearing glasses! By the next day, Haruka’s location gets discovered, which leaves them all in danger. The Hell Hounds surrounded her house, which was actually quite amusing to watch. Her father then comes randomly into the house, which seems to be something common at Yuuto’s house apparently. The battle then began, which was complete with chainsaws and samurai swords; very comedic. Haruka finally gave the speech we were all waiting for, which was the speech about why she loves being an otaku, it was actually a very touching scene. After Yuuto got thrown into a wall, his glasses ended up falling off for no reason because it obviously makes him look better. I think in this episode the animators realized how much better Yuuto looks without his glasses, sooner or alter I bet he’ll just stop wearing them all together with. Yuuto finally stood up for Haruka and it was just so beautiful! It was such a great moment and I loved it so much. Mika and Nanami came for the battle as well only to bring a surprise guest who was Haruka’s mother who was also defending her hobby. Naturally, the battle ended at that, but the whole thing still was epic. It also had a great ending, Haruka and Yuuto are made to be! I also like the smile Yuuto gave, even if it was mostly blushing it was still fairly appealing. In all this was an extremely amusing episode and I’m glad that the romance increased from just having those two blushing. This was probably my favourite episode so far, only because it was just so dedicated to Yuuto and Haruka, who are obviously made to be! The series continues to surprise me, so I’ll pretty surprised to what will happen next with the series. What we need now, is more on the love triangle because Shiina seems to have been completely forgotten from this series.
{ "pile_set_name": "Pile-CC" }
0
A critique of therapeutic trials in Helicobacter pylori-positive functional dyspepsia. Approximately 50% of patients with functional dyspepsia have Helicobacter pylori infection; it remains controversial whether this infection causes chronic symptoms, but rigorously conducted therapeutic trials should establish whether H. pylori plays a role in functional dyspepsia. The aim here was to determine whether the trials published over the past 10 years were methodologically adequate to establish a role for this infection in functional dyspepsia. A broad-based Medline search to identify all treatment trials published between 1984 and 1993 was performed. All functional dyspepsia trials were systematically analyzed for potential design strengths and weaknesses. Sixteen trials were included; 8 reported that anti-H. pylori therapy was efficacious and 8 failed to detect a statistically significant benefit. However, in all studies one or more serious methodological weakness was identified, including nonrandomized, non-placebo-controlled designs, lack of maintenance of blindness, application of inadequate outcome measures, failure to eradicate infection and follow up patients after therapy, and inadequate study power. There is a pressing need for well-designed trials in H. pylori-positive dyspepsia, and practical suggestions are provided based on a review of the published literature.
{ "pile_set_name": "PubMed Abstracts" }
0
Monday, November 17, 2008 U.S. Energy Problems The U. S. has about than 4.5% of the world population, but we use some 25% of the energy the world's humans consume. So, point one, we need to get a lot less profligate in our use of energy--less stupid things like overnight lights (e.g., in big buildings), Christmas lights, energy-wasting light bulbs, vehicles that get less than 40 or 50 miles per gallon (and 95% of private vehicles with a driver only--no passengers--but outfitted to carry 6 or 8), food (and everything else) shipped hundreds and thousands of miles, minuscule use of mass transit, etc. We simply do not use our energy resources efficiently. Did you know, for example, that of a gallon of oil extracted from the ground, approximately 95% of the energy in that oil is consumed transporting and transforming it? Only about 5% goes to final fuel or heat, or to some other useful purpose. Point two: Although we have vast and adequate energy resources, we buy most of the energy we use from foreign countries. We even have vast clean ("green" renewable) energy resources in the U.S. We have a huge, heavy, steady wind corridor through the mid-west. We have vast shoreline tide and wave energy resources. We have significant geothermal sources that could provide energy from the heat of the Earth's innards. And we have enormous untapped solar energy resources--if one fourth of the vacant commercial-building-top space in the U.S. were covered with solar panels, that could provide enough energy to satisfy the present needs of the entire country. There are a couple of reasons we do not use the energy we have. The main one is habit or tradition: it is simpler to do things the way we have grown used to doing them (and a lot of big business is financially ensconced). But we also do not have the infrastructure to make efficient use of these resources. It would require an expenditure of approximately $6-$10 billion over at least ten years to build a sufficient power grid to bring the wind, wave/tide, and geothermal power from its sources to where it is needed. There are also some limitations imposed by available technology, but these are trivial. Sure, we could improve our methods and machines, but essentially we know, engineering-wise, what we need to know. Drilling for more oil is problematic. Whether in Anwar or offshore (or anywhere), the R & D and infrastructure costs are high, and the environmental risks and damage are significant. Other hydrocarbon fuels--coal, natural gas, and methane hydrate--are available in enormous amounts, but here again the R & D and infrastructure costs are high, and the environmental costs are, frankly, unacceptable. What about nuclear power? There are three problems. First and foremost, it has a bad reputation with the public; this is perhaps largely unwarranted, but in any event it is difficult to overcome. Second, the initial capital and infrastructural costs are enormous. Third, there are significant technical problems to be overcome, not just security in preventing another Chernobyl or Three Mile Island, but in processing, transporting, and securing nuclear-reactor scats. There is no technically proven way to reprocess radioactive byproducts to make them safe (though it is theoretically feasible) nor any sane way to store them safely (unprocessed) for tens of thousands of years. The U.S. has significant energy problems. Some "solutions" such as McCain's proposals to "Drill, Baby, Drill" and to provide a $400 million prize for invention of an efficient battery are just plain silly. Some, such as T. Boone Pickens' idea to wind-electrify West Texas are intriguing. But, overall, there are technically feasible solutions. What is needed is public information, political will, and economic heft.
{ "pile_set_name": "Pile-CC" }
0
<?xml version="1.0" encoding="UTF-8"?> <model> <entity name="slb-model-tree" root="true"> <attribute name="tag" value-type="long"/> <attribute name="tag-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> <entity-ref name="strategy" type="list" names="strategies" xml-indent="true"/> <entity-ref name="pool" type="list" names="pools" xml-indent="true"/> <entity-ref name="aspect" type="list" names="aspects" xml-indent="true"/> <entity-ref name="variable" type="list" names="variables" xml-indent="true"/> <entity-ref name="slb-pool" type="list" names="slb-pools" xml-indent="true"/> <entity-ref name="virtualServer" type="list" names="virtualServers"/> <entity-ref name="monitor-rule" type="list" names="monitor-rules" xml-indent="true"/> </entity> <entity name="strategy"> <attribute name="version" value-type="int"/> <attribute name="group" value-type="String"/> <attribute name="type" value-type="String"/> <attribute name="target" value-type="String"/> <attribute name="method" value-type="String"/> <attribute name="creation-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> <attribute name="last-modified-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> </entity> <entity name="pool"> <attribute name="version" value-type="int"/> <attribute name="name" value-type="String"/> <attribute name="loadbalance-strategy-name" value-type="String"/> <attribute name="min-available-member-percentage" value-type="int"/> <attribute name="creation-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> <attribute name="last-modified-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> <entity-ref name="check"/> <entity-ref name="member" type="list" names="members"/> <attribute name="degradeRate" value-type="int"/> <attribute name="degradeForceState" value-type="int"/> <attribute name="keepalive" value-type="int"/> <attribute name="keepalive_timeout" value-type="int"/> <entity-ref name="upstreamFilter"/> </entity> <entity name="upstreamFilter"> <attribute name="authFilterOpen" value-type="boolean"/> <attribute name="authFilterPassPattern" value-type="String"/> </entity> <entity name="check"> <attribute name="interval" value-type="int"/> <attribute name="rise" value-type="int"/> <attribute name="fall" value-type="int"/> <attribute name="timeout" value-type="int"/> <attribute name="default_down" value-type="boolean"/> <attribute name="type" value-type="String"/> <attribute name="port" value-type="int"/> <attribute name="check_keepalive_requests" value-type="int"/> <attribute name="check_http_send" value-type="String"/> <attribute name="check_http_expect_alive" value-type="String"/> <attribute name="check_http_expect_pattern" value-type="String"/> <attribute name="check_shm_size" value-type="String"/> <attribute name="check_status" value-type="String"/> </entity> <entity name="member"> <attribute name="name" value-type="String"/> <attribute name="ip" value-type="String"/> <attribute name="port" value-type="int"/> <attribute name="weight" value-type="int"/> <attribute name="max-fails" value-type="int"/> <attribute name="fail-timeout" value-type="String"/> <attribute name="state" value-type="String"/> <!-- <attribute name="availability" value-type="String" /> --> </entity> <entity name="aspect"> <attribute name="version" value-type="int"/> <attribute name="key" value-type="String"/> <attribute name="point-cut" value-type="String"/> <attribute name="ref" value-type="String"/> <entity-ref name="directive" type="list" names="directives"/> </entity> <entity name="variable"> <attribute name="version" value-type="int"/> <attribute name="key" value-type="String"/> <attribute name="value" value-type="String"/> </entity> <entity name="directive"> <attribute name="type" value-type="String"/> <attribute name="matches" value-type="String"/> <attribute name="target-pattern" value-type="String"/> <attribute name="flag" value-type="String"/> <attribute name="response-code" value-type="int"/> <attribute name="path" value-type="String"/> <attribute name="format" value-type="String"/> <attribute name="pool-name" value-type="String"/> <attribute name="root-doc" value-type="String"/> <attribute name="expires" value-type="String"/> </entity> <entity name="slb-pool"> <attribute name="version" value-type="int"/> <attribute name="name" value-type="String"/> <entity-ref name="instance" type="list" names="instances"/> </entity> <entity name="instance"> <attribute name="ip" value-type="String"/> </entity> <entity name="virtualServer"> <attribute name="name" value-type="String"/> <attribute name="state" value-type="String"/> <attribute name="default-pool-name" value-type="String"/> <attribute name="domain" value-type="String"/> <attribute name="port" value-type="int"/> <attribute name="creation-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> <attribute name="last-modified-date" value-type="Date" format="yyyy-MM-dd HH:mm:ss"/> <attribute name="version" value-type="int"/> <attribute name="access_log" value-type="String"/> <attribute name="group" value-type="String"/> <attribute name="slb-pool" value-type="String"/> <entity-ref name="aspect" type="list" names="aspects" xml-indent="true"/> <entity-ref name="location" type="list" names="locations" xml-indent="true"/> </entity> <entity name="location"> <attribute name="match-type" value-type="String"/> <attribute name="pattern" value-type="String"/> <attribute name="case-sensitive" value-type="boolean"/> <entity-ref name="directive" type="list" names="directives"/> </entity> <entity name="monitor-rule"> <attribute name="id" value-type="String"/> <attribute name="pool" value-type="String"/> <attribute name="status-code" value-type="String"/> <attribute name="value" value-type="int"/> <attribute name="minute" value-type="int"/> <attribute name="mail-receivers" value-type="String"/> <attribute name="sms-receivers" value-type="String"/> </entity> </model>
{ "pile_set_name": "Github" }
0
She wants Fuck her Ass \\\ please Fuck my Anal
{ "pile_set_name": "OpenWebText2" }
0.086957
Q: Is there a way to split up a variable inside an Option without having to use if statements? I want the code below to work, but since map() takes ownership of Option, and there doesn't seem to be a clone() function for Option, the following doesn't compile. fn main() { struct ItemA { a: String, b: String, } let foo = Some(ItemA { a: "A String".to_owned(), b: "B String".to_owned(), }); // OR // let foo = None; let opA: Option<String> = foo.map(|c| c.a); let opB: Option<String> = foo.map(|c| c.b); } error[E0382]: use of moved value: `foo` --> src/main.rs:15:31 | 14 | let opA: Option<String> = foo.map(|c| c.a); | --- value moved here 15 | let opB: Option<String> = foo.map(|c| c.b); | ^^^ value used here after move | = note: move occurs because `foo` has type `std::option::Option<main::ItemA>`, which does not implement the `Copy` trait It would be nice if opA can take ownership of ItemA.a (so it doesn't have to clone the strings), and opB can take ownership of ItemA.b Is this possible to do without having to use if statements to check if the Option is Some or None, unwrapping, and wrapping it back up individually. A: You can use map_or_else. let (opA, opB) = foo.map_or_else( || (None, None), |c| (Some(c.a), Some(c.b)) ); The first function is called if foo is None, and returns two Nones. The second function is called if foo is Some and splits the members into a tuple. Of course, this doesn't really save you much over a simple match, and will probably be harder to follow. let (opA, opB) = match foo { None => (None, None), Some(c) => (Some(c.a), Some(c.b)) }; By the way, Option does implement Clone, but it requires that the contained type implements Clone.
{ "pile_set_name": "StackExchange" }
0
Description: Sexy blonde babe with big boobs gets hardcore anal sex with a big cock and she is damn good at blowjob
{ "pile_set_name": "OpenWebText2" }
0.06087
VIEWS: 7455 BBC for tied white whore Hardcore BDSM where white cunt gets taken by black cock!
{ "pile_set_name": "OpenWebText2" }
0.052632
Riley Reid Anal Sex That Totally Destroy Gape And Creampie Her Tight Ass
{ "pile_set_name": "OpenWebText2" }
0.055556
[Endemic goiter: clinical picture and evolution]. The goiter is the most frequent clinical manifestation of the nutritional deficiency of iodine. If present in more than 5% of the general population or more than 10% of the children in school of a defined geographic area, goiter is defined endemic. Endemic goiter is an adaptive disease produced by the persistent stimulation of the thyroid gland as consequence of the thyrotropin increased secretion due to the iodine deficiency. If iodine deficiency is severe or persistent, other manifestations can be observed in the clinical picture of the iodine deficiency disorders (IDD), such as cretinism. In general goiter is not associated to other manifestations during the initial state of the disease, but nodular and toxic evolution are frequent complication of long standing disease.
{ "pile_set_name": "PubMed Abstracts" }
0