text
stringlengths 4
3.53M
| meta
dict |
---|---|
Cradle of Filth
Cradle of Filth is a heavy metal band formed in Suffolk, England in 1991. It has been embraced and disowned with equal fervour by various metal communities, and its particular subgenre has provoked a great deal of discussion (see below). Roughly speaking, the band's sound has gradually evolved from raw, traditional black metal, to a cleaner and more "produced" amalgam of gothic, symphonic and extreme styles, while its lyrical themes and imagery are heavily influenced by gothic literature, poetry, mythology and horror films. The band has successfully broken free of its original niche by courting mainstream publicity (often to the chagrin of its early fanbase), and this increased accessibility has brought coverage by the likes of Kerrang! and MTV, frequent main stage appearances at major festivals such as Ozzfest and Download, and in turn a more commercial ima... | {
"pile_set_name": "Pile-CC"
} |
Q:
Opto-isolation amplifier giving no output
First of all, thanks to the community for having such helpful answers here - don't post very often but here's one I could really do some help with.
I want to measure a voltage range of 0-100V DC in an isolated manner and using an Arduino Uno. I've got a HCPL 7520 (datasheet) and created an initial test circuit with just 5V input but I'm getting no output. I've got a voltage divider to bring the 5V down to the +/- 200mV range and chosen resistors to bring the current to ~10mA (which is less than the 20mA max).
But whenever I measure voltage between VOut and Vdd2_Gnd, I get 0V. I'm no expert so any advice would be much, much appreciated !
A:
You've got \$V_{REF}\$ tied to 0 volts - the recommended value is between 4 volts and \$V_{DD2}\$: -
The whole premise for this device amplifying is that it has a gain determined by: -
$$\boxed{\dfrac{V_{REF}}{0.512}}$$
| {
"pile_set_name": "StackExchange"
} |
Susceptibility of Trichopyton mentagrophytes to Visible Light Wavelengths.
To determine whether a blue light (405 nm) could inhibit the growth of Trichopyton mentagrophytes without using a photosensitizing material as part of the treatment protocol. Basic physiologic randomized trial using laboratory specimens (T mentagrophytes). Plated on a growth medium, T mentagrophytes were exposed to 3 to 5 administrations of blue light at 20 J/cm over 28 hours. Following 7 days of incubation, colony-forming units were counted and compared with nonirradiated controls. The study found 3, 4, and 5 administrations of blue light produced significant inhibition of T mentagrophytes (P < .05); 4 and 5 applications produced the greatest inhibition of growth (84.7% and 93.6% kill rates, respectively). The application of 405-nm light at a dose of 20 J/cm is an effective in vitro inhibitor of T mentagrophytes. To give results similar to those seen when a photosensitizing material is included, 3 to 5 applications of this wavelength and dose condition delivered over 28 hours is likely needed. | {
"pile_set_name": "PubMed Abstracts"
} |
In May, 1940, the individual respondents filed claims for unemployment benefits with the Unemployment Compensation Commission of the Territory of Alaska. After an initial determination by an examiner and after decision by a referee the Commission held that the claimants were disqualified from receiving benefits for a period of eight weeks since their unemployment was due to a labor dispute n active progress within the meaning of the Alaska Unemployment Compensation Law.1 The United States District Court affirmed the Commission's holding in all particulars. The Circuit Court of Appeals reversed, one judge dissenting. We granted certiorari because of the public importance of the questions involved.2
2
Among the petitioners are three corporations engaged principally in the business of salmon fishing, canning, and marketing. One of the companies owns canneries and other facilities at Karluk, Chignik, and Bristol Bay, Alaska. The other two companies operate only at Bristol Bay. Catching and canning salmon is a seasonal activity.3 The companies customarily hire workers at San Francisco at the beginning of the season, transport them to the Alaskan establishments, and return them to San Francisco at the season's end. Similar operations are carried on by other companies out of other west coast ports, notably Seattle and Portland. The individual respondents are all members of the Alaska Cannery Workers Union Local No. 5, and each worked in Alaska for one of the three companies during the 1939 season. Local No. 5 is the recognized bargaining agent of the cannery workers in the San Francisco area.
3
In 1939, as had been the practice for some years, the union entered into a written agreement with the companies covering in considerable detail the matters of wages, hours, conditions of employment, and the like. After the end of the 1939 season, the companies terminated the agreement then in effect, which made necessary the negotiation of a new contract for the 1940 season. Consequently, on March 6, 1940, the companies through their authorized agent, Alaska Salmon Industry, Inc., invited the union to enter into negotiations for a new agreement. In a series of meetings held shortly thereafter, serious disagreement appeared which quickly developed into an impasse on the question of wages. The union demanded wages equal to or in excess of those paid under the terms of the 1939 agreement. The companies offered wages which for the most part were below those paid in 1939. On April 1, 1940, the union caused the negotiations as to the wage issue to be transferred from San Francisco to Seattle where an attempt was being made to effect a coastwide agreement to cover all west coast companies carrying on salmon operations in Alaska. Local No. 5, however, refused to sign a 'memorandum' agreement incorporating such terms as might result from the concurrent Seattle negotiations.
4
On April 3, the companies notified the union that if operations were to be carried on in Karluk and Chignik during the 1940 season, an agreement with respect to the former would have to be reached by April 10 and with respect to the latter by April 12. Although negotiations proceeded up to the deadlines, the parties arrived at no understanding, and on April 22 Alaska Salmon Industry, Inc., formally announced that no operations would be carried on in Karluk and Chignik during 1940. Meetings continued, however, in an effort to come to an understanding with respect to Bristol Bay before the arrival of the May 3d deadline which had been set for those operations. Although federal mediators intervened in an attempt to d scover a suitable compromise, the deadline date passed without agreement. It appears that after May 3, negotiations continued in Seattle where a contract affecting only canners and workers operating out of ports other than San Francisco was finally executed on May 29. The companies and union which are involved in this case were specifically excluded from the terms of the 1940 Seattle agreement.
5
Shortly after May 3, the individual respondents filed claims for unemployment benefits with the Alaska Unemployment Compensation Commission. The Commission, acting through an examiner, held that respondents were disqualified from receiving payments for the statutory period of eight weeks under the provisions of § 5(d) of the Alaska law. At the time this case arose, that section stated in part: 'An individual shall be disqualified for benefits * * * (d) For any week with respect to which the Commission finds that his total or partial unemployment is due to a labor dispute which is in active progress at the factory, establishment or other premises at which he is or was last employed; provided, that such disqualification shall not exceed the 8 weeks immediately following the beginning of such dispute * * *'
6
In pursuance of the appeal provisions of the statute,4 respondents asked for a review of the examiner's determination. The Commission, in response to this application, appointed a Referee to pass on the disputed claims. The scope of the hearings was confined to the issue of whether the unemployment of the claimants was caused by the existence of a labor dispute. At the end of the proceedings, the Referee came to the conclusion that although there was a labor dispute in existence initially, the dispute was no longer 'in active progress' after the passing of the dates fixed by the companies for consummation of the working agreements. Consequently, the disqualification under § 5(d) with respect to each of the localities was held no longer to attach after the passage of the respective deadline dates.5
7
The Commission, on appeal,6 reversed the Referee's decision and held that within the meaning of the Alaska law, a labor dispute was in active progress throughout the entire eight week statutory period of disqualification beginning with the opening of the season in each locality. Consequently, no benefits were payable until the expiration of the disqualification period. The United States District Court affirmed the Commission's decision in all particulars.7 The Circuit Court of Appeals, with one judge dissenting, reversed, however, on the ground that the labor dispute was not physically at the Alaska canneries where the individual respondents had been last employed.
8
We are met at the outset with the contention that the facts of this case do not present a 'labor dispute' within the meaning of § 5(d) of the Alaska Act. Respondents urge that the term must be narrowl construed to require a strike or leaving of employment which, in turn, calls for a presently-existing employment relation at the time the dispute arises.8 According to this view, the term would not cover a situation, such as presented here, where the controversy precedes the employment. Respondents would justify this restricted construction on the ground that the Unemployment Compensation Law is remedial legislation, and any provision limiting benefits under the Act should be narrowly interpreted.
9
The term 'labor dispute', is not defined in the statute. The term appears in the Act in one other connection, however. Section 5(c)(2)(A) provides that benefits under the Act will not be denied any individual, otherwise eligible, who refuses to accept new work 'if the position offered is vacant due directly to a strike, lockout, or other labor dispute.' The Social Security Act of 19359 requires that the state or territorial law contain a provision to this effect before the legislation can be approved by the Social Security Board. Obviously, for the purposes of § 5(c)(2)(A), the term, 'labor dispute,' has a broader meaning than that attributed to it by respondents. Unless the Territorial Legislature intended to give a different meaning to the same language appearing in another subdivision of the same section, the term must be given a broader meaning than that contended for by the respondents, for the purposes of § 5(d) as well. We need not determine whether 'labor dispute' must in all cases be construed as broadly as it is defined in the Norris-LaGuardia Act,10 and the National Labor Relations Act.11 But here there was full-scale controversy. Companies engaged in carrying on a seasonal business were ranged against a union representing seasonal workers who had been employed by the companies in the previous year. Dispute there certainly was; and the subject of that dispute consisted of matters usually contested in labor disputes as that term is normally understood.12 Since we find nothing to indicate that the Territorial Legislature intended a contrary result, we conclude that the Commission might properly find a 'labor dispute' here presented within the meaning of § 5(d) of the Alaska Act.
10
We think that there is evidence in the record to support the Commission's conclusion that respondents' unemployment was 'due' to a labor dispute insofar as that holding relates to the individual respondents employed in 1939 by the Alaska Packers Association and the Red Salmon Canning Company. At the hearings before the Referee the respondents attempted to establish that the companies called off their 1940 operations for reasons other than their inability to negotiate a satisfactory labor agreement. It was argued, for example, that the companies feared a poor catch as a result of governmental restrictions on fishing applicable to the 1940 season. The evidence adduced before the Referee indicates that both of the above-mentioned companies made extensive preparations for the 1940 operations. In anticipation, equipment and supplies of the value of several hundred thousand dollars were purchased. Ships were prepared and held in readiness for the expeditions. The Referee found that these companies negotiated in good faith and failed to operate in Alaska during the 1940 season only because of their inability to negotiate satisfactory labor agreements before the passing of the deadline dates. There is evidence that the Alaska Packers Association expected to hire about two-thirds the number of workers in 1940 it had employed in 1939. But there is nothing in the record to establish that any of the claimants in this action would have been unemployed as a result of this contemplated curtailment in activity or if any of the respondents would have been affected, which of their number would have been unemployed. It appears that the Red Salmon Canning Company expected to use the same number of workers in 1940 as in 1939, or possibly a few more. Under these circumstances, we think that the Commission's finding that the unemployment was 'due' to the labor dispute, should stand, insofar as it relates to the claimants indicated.
11
But a different situation is presented with reference to the respondents employed by the Alaska Salmon Company in 1939. That company has an establishment only at Bristol Bay. On April 30, three days before the deadline relating to the Bristol Bay operations, Alaska Salmon withdrew from the negotiations with the union and announced that it was unable to send an expedition to Alaska in 1940. The Referee found that the withdrawal was caused primarily by factors other than the company's inability to negotiate a satisfactory labor contract. At the hearings before the Referee, counsel for the company stipulated that even though the other companies had negotiated a labor agreement with the union before the deadline date, Alaska Salmon would have conducted no operations out of San Francisco in 1940 after its withdrawal from negotiations. We conclude that the record does not support the finding of the Commission that the respondents employed by the Alaska Salmon Company in 1939 were unemployed 'due' to a labor dispute at the establishment at which last employed.
12
Respondents urge that, assuming their unemployment was due to a labor dispute, there was no labor dispute in 'active progress' within the meaning of the Act after the passage of the deadline dates. It is argued that when the expeditions were abandoned by the companies, the dispute must necessarily have terminated since there was no possible way in which negotiations could have brought about a settlement. It should be observed, however, that the record does n t reveal that negotiations abruptly terminated with the passing of the last deadline date. Conferences continued at Seattle in which both the companies and the union were represented. The respondents considered the negotiations sufficiently alive to make an offer of terms at least as late as May 29. Even if it be assumed that at some time within the eight week period of disqualification the point was reached when all possibility of settlement disappeared, it does not follow that the Commission's finding of a dispute in 'active progress' must be overturned. Here, as in National Labor Relations Board v. Hearst Publications, Inc., 1944, 322 U.S. 111, 131, 64 S.Ct. 851, 860, 861, 88 L.Ed. 1170, the question presented 'is one of specific application of a broad statutory term in a proceeding in which the agency administering the statute must determine it initially.' To sustain the Commission's application of this statutory term, we need not find that its construction is the only reasonable one or even that it is the result we would have reached had the question arisen in the first instance in judicial proceedings. The 'reviewing court's function is limited'. All that is needed to support the Commission's interpretation is that it has 'warrant in the record' and a 'reasonable basis in law'. National Labor Relations Board v. Hearst Publications, Inc., supra; Rochester Telephone Corporation v. United States, 1939, 307 U.S. 125, 59 S.Ct. 754, 83 L.Ed. 1147.
13
Applying these tests, we are unable to say that the Commission's construction was irrational or without support in the record. The Commission apparently views a dispute as 'active' during the continuance of a work stoppage induced by a labor dispute. That agency might reasonably conclude that the unemployment resulting from such work stoppage is not of the 'involuntary' nature which the statute was designed to alleviate, as indicated by the statement of public policy incorporated in the Act by the Territorial Legislature.13 We see nothing in such a view to require our substituting a different construction from that made by the Commission entrusted with the responsibility of administering the statute.14
14
Nor can we accept the argument of the majority of the Court of Appeals that since negotiations between the companies and the workers were carried on in San Francisco and Seattle, the dispute could not be said to be 'at' the Alaskan establishments as required by the statute. So far as we are able to determine, this issue was injected for the first time by the opinion of the majority of the Court of Appeals. The contention does not seem to have been raised or pressed by respondents up to that point. The responsibility of applying the statutory provisions to the facts of the particular case was given in the first instance to the Commission. A reviewing court usurps the agency's function when it sets aside the administrative determination up n a ground not theretofore presented and deprives the Commission of an opportunity to consider the matter, make its ruling, and state the reasons for its action.15 Nor do we find the argument advanced below convincing on its merits. It is clear that the subject matter of the dispute related to the operation of the Alaskan establishments. As a result of the dispute the normal activities involved in catching and canning salmon were not carried on throughout the 1940 season at any of those establishments. We do not consider significant the fact that the companies and the union did not negotiate at the canneries or on the ships in Alaskan waters. A legislature familiar with the nature of seasonal operations carried on in the Territory could hardly have been unaware of the fact that companies and workers customarily carried on negotiations far distant from the Alaskan establishments. It seems unlikely that it was intended that this ordinary and usual procedure should defeat the disqualification for benefits incorporated in the Act. Furthermore, it should be observed that the respondent union voluntarily entered into the negotiations conducted at San Francisco and Seattle and at no time challenged the propriety of this practice. Thus if we assume with respondents that this issue is properly presented for consideration, we conclude that under the circumstances of this case the dispute was 'at the factory, establishment, or other premises' in the sense intended by the Territorial Legislature.
15
For the reasons stated, the judgment of the Circuit Court of Appeals is affirmed insofar as it holds that the statutory eight-week period of disqualification is inapplicable to the individual respondents employed by the Alaska Salmon Company in 1939. In all other particulars, the judgment of the Circuit Court of Appeals is reversed and the case remanded to the District Court with instructions to remand for further proceedings pursuant to this opinion.
The alaska statute is part of the legislative scheme for unemployment compensation induced by the provisions of the Social Security Act of 1935. 49 Stat. 620, 626—627, 640, 42 U.S.C.A. § 301 et seq. It is said that forty-three states and territories have provisions similar to those in the Alaska law disqualifying from unemployment benefits persons unemployed due to a labor dispute.
As provided by Benefit Regulation No. 10 of the Alaska Unemployment Compensation Commission, the season at Karluk extends from April 5 to September 5, at Chignik from April 1 to September 10, and at Bristol Bay from May 5 to August 25.
The Referee found that there had been unemployment due to a labor dispute in active progress at Karluk from April 5, when the season opened, to April 10, the deadline date, and at Chignik from April 1 to April 12. Since the deadline date with respect to Bristol Bay was set two days before the season opened there, the Referee found that there was no dispute in active progress at those plants.
Section 6(i) of the Act provides that within thirty days after the decision of the Commission has become final, any party aggrieved may secure judicial review in the United States District Court. The section states, 'In any judicial proceeding under this Section, the findings of the Commission as to the facts, if supported by evidence and in the absence of fraud, shall be conclusive, and the jurisdiction of said Court shall be confined to questions of law.'
The Examiner, the Referee, the Commission, the District Court, and presumably the Circuit Court of Appeals all found a 'labor dispute' to have existed, at least before the arrival of the deadline dates.
The 'Declaration of Territorial Public Policy' states that 'Involuntary unemployment is * * * a subject of general interest and concern which requires appropriate action by the legislature.' It is further stated that the public welfare demands the compulsory setting aside of unemployment reserves 'for the benefit of persons unemployed through no fault of their own.' Chapter 4, Extraordinary Session Laws of Alaska, 1937. | {
"pile_set_name": "Pile-CC"
} |
Self-magnetized effects in relativistic cold plasmas due to ponderomotive forces: application to relativistic magnetic guiding of light.
Nonlinear equations are derived relevant to describe the propagation of powerful electromagnetic fields launched within a plasma. The nonlinear generation of self-induced collective electromagnetic perturbations are obtained with matter lying in the relativistic regime. Our main result is the self-consistent treatment of the coupled equations between the pump and its self-induced fields. In particular, a mechanism is pointed out for self-generation of quasistatic magnetic field that is due to the relativistic ponderomotive force. This process is found to be more efficient to produce quasistatic magnetic fields, as confirmed by recent experiments, as compared to known effects such as the inverse Faraday effect. As an application, we investigate conditions for relativistic magnetic guiding of light to occur under the combined action of the self-induced density and magnetic field. | {
"pile_set_name": "PubMed Abstracts"
} |
Gaspar Torrente
Gaspar Torrente Español, (3 October 1888 in Campo, Ribagorza, Aragon - 21 March 1970 in Barcelona, Catalonia), was one of the early 20th century leaders and a founding father of Aragonese nationalism.
Category:1888 births
Category:1970 deaths
Category:People from Ribagorza | {
"pile_set_name": "Wikipedia (en)"
} |
Around the Web
Follow Bill Clinton?
@Jayhawk: the playing field has to be leveled somehow. Geriatric care has been one of the most abused areas of medicine, especially in rural areas. There should have been a watch-dog in place years ago, but that was against the desires of private insurers and the gigantic insurance lobby. There has been no accountability. Plus, Americans no longer care for their elderly. I accompany my folks to hospital and serious doctor visits; patient advocacy goes a long way.
Jayhawk•September 07, 2012 07:54
@Peach The elderly will still be the losers in health care. Even now so many Drs. refuse to treat them. With the mega-billions Obama robbed from the program, the fees for treatments will be even less. The elderly will be squeezed...the medical board will deny them more. The readmission issue will be just an excuse to not deny hospital care to this group. Some readmissions have to occur toward the end of life. It's all a ruse to deny care to this age group and transfer the funds to Obama Care to offer it to those who haven't paid in or very little. When Govt. get involved they always screw it up! Private sector is not a dirty term..only in Obama language!
@Jayhawk: I understand the fear with Medicare, but the core of what you're saying is wrong. The CBO says Ryan's take on Medicare is no different than Obama's. The overhaul is supposed to protect Seniors from unscrupulous practices from both hospitals and private insurers like Medicare Advantage (set up by Bush). Hospitals will be paid less if they fail to meet benchmarks per law and/or have too many readmissions.
Matt, there you go being a redneck again. I wouldn't care if he was green.....I'm a staunch Democrat who supports the President. Leave color out of this please....America is made up of all creeds. You're showing your ignorance again (as usual).
Matt•September 06, 2012 22:14
@Daina- the list of actors above haven't made a decent movie in years. They are hoping the Liberal Producers will " Flip them a script" but nobody is buying tickets to see these radicals- ask SAMUEL L JACKSON! He hasnt made a movie worth watching since he threw a fit and trashed the whites in the tea party! He forgot who was paying the bills! Alicia Silverstone? What has it been- 14 years since she has been on the silver screen! Jesus! At least Pitt & Angelina have enough sense to shut up.
Matt•September 06, 2012 22:00
YOU ARE RIGHT! That was a giveaway not a bailout- Biden is a Clown!
Rah-Rah Girl•September 06, 2012 21:51
Biden is saying that Obama saved the auto industry. Ha! The bulk of the stimlus money went for auto union pensions....Obama saved the UNION PENSIONS! It's now been estimated by the CBO that GM will not be paying back $55 Billion of their stimulus money loan...hmmmm thought they were doing so good? The taxpayers will be on the hook. Usa Bin Laden was killed by Obama? No! Navy Seals...3 times Obama was told they could take him. He said NO! Finally, the 4th time he gave in...why did he wait? He's not the big HERO that Joe would like us to think Obama is!
Matt•September 06, 2012 21:45
Peach seed- I thought you went to bed! Look- cut 2 the chase ok- You are voting for him because he is black! Just come out and say it! hate rich people - you've basically already said that! If Hilliary clinton was running you wouldn't even be discussing it.
Jayhawk•September 06, 2012 21:40
@ Peachy WAKE UP, GIRL! We're STILL going to pay for those uninsured! They can't afford their own insurance STILL...we will continue to pay for that by this new TAX...and it'll hike 'n hike every year! You will pay for YOUR medical health care...but that of others. This is no better! Only a political shell game. As I said, denial of treatment will occur. It did in the UK...it'll happen here! The elderly already have trouble getting medical care because Medicare pays low reimbursements to medical providers....but that jerk in the White House stole $716 Billion from the elderly who paid in & paid in all those years to cover those now who haven't paid in or very little. They will suffer. Sad.
She is winning the general election today and he is not, according to all the evidence. And I have never seen anything like it. I have never seen a candidate treated so disrespectfully just for running. | {
"pile_set_name": "Pile-CC"
} |
Boyracer
Boyracer (sometimes styled Boyracer UK) was an English indie rock group from Wetherby.
History
Boyracer was founded by vocalist/guitarist Stewart Anderson in 1990 and released their first single in 1991. Richard Adams left the group in 1993, after which the group released its first EP, Naked. They then arranged to release further recordings via Sarah Records including two more EPs in 1993. Both James Chadwick and Simon Guild departed early in 1994, and Anderson put together a new line-up before releasing the group's debut full-length for Slumberland Records.
More lineup changes ensued in 1994 while the group continued to put out releases, with a number of 7 inch EPs and they toured the United States for the first time at the beginning of 1995. Later that year they signed with MCA subsidiary label Zero Hour Records. The label dropped them while they were doing a nationwide U.S. tour. They then released several singles on independent American labels over the course of 1996. Early in 1997, the group split up, but in 2000 Anderson reconstituted Boyracer with several new members and new material.
In 2010 the band played two shows in Los Angeles and San Francisco as part of the Slumberland Records 20th Anniversary showcase. The group played another show in Flagstaff, Arizona at the end of October 2011.
Members
Stewart Anderson - vocals, bass, guitar, drums (1989–2018)
Laura Bridge (1989-1991, 2018)
Richard Adams - bass (1990–1993)
Simon Guild - guitar (1990–1994)
James Chadwick - drums (1990–1994)
Stewart Turner - guitar (1992-1993)
Matty Green (1994–1997, 2000-2018)
Nicola Hodgkinson - bass (1994–1997)
Kevin Paver - drums (1994)
Ged McGurn - drums (1994–1997)
Jen Turrell - bass (2000–2018)
Frank Jordan - drums (2000–2002)
Ara Hacopian - drums/guitar/keyboard (2001–2018)
Discography
LPs
Louisville - Leeds - TKO! (A Turntable Friend – TURN 18 1993 split with Hula Hoop)
More Songs About Frustration and Self-Hate (Slumberland Records, 1994)
Boyracer in Full Colour (Zero Hour Records – ZH 1140 1996)
To Get a Better Hold You've Got To Loosen Your Grip (555 Recordings, 2002)
Girlracer (555 Recordings, 2003) split with Kanda
Happenstancer (Happy Happy Birthday To Me Records – HHBTM063 2004)
Absence Makes the Heart Grow Harder (Foxyboy – foxy008 2004)
A Punch Up The Bracket 555 Recordings – 555CD72 2006
Boyracer Jukebox Vol 1 (555 Recordings, 2007)
Flickering B+W (555 Recordings, 2007)
Sunlight is the Best Antiseptic (555 Recordings, 2008)
Singles
Boyracer / The Ropers – Tour Split I Wish I Was A Slumberland Record – WISH 005 1994
Hula Hoop / Boyracer (7 Fluff (2) – danny 9 1992)
Railway (7 Fluff (2) – honey 2 1992
Naked (7 A Turntable Friend – TURN 14 1992
Boyracer / Sabine (7 Wurlitzer Jukebox – WJ01, Flower Me! Records – none 1993 split Sabine
West Riding House (Zero Hour – ZERO HOUR 1 1995
Electricity (A Turntable Friend – TURN 23F 1995
A Mistake That Cost You Dearly (Honey Bear Records – HB014 1996
One Side Of Boyracer Slumberland Records – SLR 49 1996
Boyracer / My Favorite – False Economy / Modulate A Turntable Friend – TURN 28 1996
Rhythm Of The Chicken Shake Jigsaw – PZL003 1996
Present Tense Happy Go Lucky – HAPPY11, 555 Recordings – 55505 1997
Don't Want Anything To Change 555 Recordings – 55535 2002
Boyracer / Dr. König Arthus Open Records (3) – Open 012 2005
Happy Happy Birthday To Me 2007 Singles Club #4 Happy Happy Birthday To Me Records – HHBTM 095 - SC4 2007 split Faintest Ideas
Boyracer / Beatnik Filmstars split 555 Recordings – 55545 2007
Boyracer / Mytty Archer – Boyracer / Mytty Archer 555 Recordings – 55544, Brittle Records – BR-04 2007
Boyracer / Possum Moods / Hulaboy – Boyracer / Possum Moods / Hulaboy 2007 555 Recordings – 55543
The Cannanes / Mytty Archer / Boyracer – The Cannanes / Mytty Archer / Boyracer 2008 555 Recordings – 55548, Jellyfant – 7jf05
Que Possum / Boyracer – Que Possum / Boyracer 2008 555 Recordings – 55547
The How / Boyracer – The How / Boyracer 555 Recordings – 55551, I Wish I Was A Slumberland Record – wish013 2010
American Culture / Boyracer – American Culture / Boyracer Emotional Response (2) – ER-11 2014
Boyracer / Huon – Bonus Disc! 555 Recordings – 555CD86 2008 split Huon
EPs
Best Flipstar EP (Lo-Fi Recordings (2) – low 3 1994)
Pure Hatred 96 EP Sarah Records – SARAH 96 1994)
285 Clock Cake (Hedonist Productions – CAKE 001F 1993
Go Flexi Crazy (Pure Hatred – Pure Hatred One & Two 1993
From Purity to Purgatory EP (Sarah Records – SARAH 85, 1993)
B Is for Boyracer EP (Sarah Records, Sarah Records – SARAH 76 CD 1993)
(1994 ep) AUL 36X EP Slumberland Records – SLR 035 1994
We Are Made of the Same Wood (Slumberland Records, A Turntable Friend – TURN 24, Slumberland Records – SLR 048 1995)
Pain, Plunder and Personal Loss (Happy Go Lucky – HAPPY05 1995)
Racer 100 EP (Blackbean And Placenta Tape Club – BBPTC 020 1996
Check Yr F**king Hi$tory EP (555 Recordings – 555CD68 555 Recordings, 2003)
Boyracer – We Have Such Gifts EP 555 Recordings – 55537 2004
Fool Around with Boyracer 12" EP (Parapop Recordings, 2004)
Yorkshire Soul Yellow Mica Recordings – YMR 010 2004
It's Not True Grit, It's Real Dirt 555 Recordings – 55542 2005
Insults and Insights EP (Kittridge Records – KITT-018 Kittridge Records, 2005)
Winners Losers, Cuts and Bruises EP (555 Recordings – 555LP69, 555 Recordings, 2005)
I Know What Boys Like EP freakScene. – scene 006 2014
First String Teenage High: The Songs of Tullycraft Played By People Who Aren't (Compilation; AAJ/BumbleBear Records, 2003)
Happenstancer EP (Happy Happy Birthday to Me Records, 2004)
Lives and compilations
Acoustically Yours (555 Recordings, 2003)
Live At Staches, Columbus Ohio Blackbean And Placenta Tape Club – BBPTC 084 1997
Live On WAMH Rocket Racer – RR001 1997
Punker Than You Since '92 (555 Recordings, 2006)
B-sides and Besides (555 Recordings, 2002)
A Punch Up the Bracket (555 Recordings, 2005)
Punker Than You Since '92 (555 Recordings, 2006)
References
External links
IndiePages.com
Myspace.com
Category:Zero Hour Records artists
Category:Indie rock groups from Leeds
Category:Slumberland Records artists | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
How do I set the background color/pattern in a Nautilus window?
In Previous versions of Ubuntu, I used to go under the edit menu to set the background color of a Nautilus window. I have no idea how to do this in Ubuntu.
A:
My problem with this new ubuntu 11.10 was the fact that i was not able to change the background color of the windows, that white color just drove me crazy; as you noticed 'appearance preferences' from the old ubuntu does not exit any more here; there is a way though (or maybe more):
Here's what you have to do to change colors in ubuntu 11.10:
Open the terminal, paste
sudo apt-get install dconf-tools
then
dconf-editor
Browse to org.gnome.desktop.interface.
Locate gtk-color-scheme, don't click on it, click on the empty space on the right side to get a small box where you will paste the following:
bg_color:#ebe0be;selected_bg_color:#737370;base_color:#9d906a
Press enter, nothing else! The colors will change right away (this is just an example with my favourite colors).
If you wanna find your own colors, install gnome color chooser and play with the colors (the color palette will look the same as it did in 'appearance preferences in the old ubuntu) to find out the right codes (six digit hexadecimal numbers) for the ones that you like.
Once you find yours, paste the six digit code number into the right place in gtk-color-scheme and then enter again it is done.
| {
"pile_set_name": "StackExchange"
} |
Board Decisions
GF/B23/DP15
Approved by the Board on: 12 May 2011
Replenishment of TERG Members
The Board appoints Dr. Viroj Tangcharoensathien, Dr. Mickey Chopra, Dr. Atsuko Aoyama and Dr. Paulin Basinga as members of the Technical Evaluation Reference Group (TERG) for a period of three years until the end of the first Board meeting in 2014.
Budgetary Implications
This decision does not have material budgetary implications for the 2011 Operating Expenses Budget. | {
"pile_set_name": "Pile-CC"
} |
%YAML 1.1
%TAG !u! tag:unity3d.com,2011:
--- !u!126 &1
NavMeshProjectSettings:
m_ObjectHideFlags: 0
serializedVersion: 2
areas:
- name: Walkable
cost: 1
- name: Not Walkable
cost: 1
- name: Jump
cost: 2
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
- name:
cost: 1
m_LastAgentTypeID: -887442657
m_Settings:
- serializedVersion: 2
agentTypeID: 0
agentRadius: 0.5
agentHeight: 2
agentSlope: 45
agentClimb: 0.75
ledgeDropHeight: 0
maxJumpAcrossDistance: 0
minRegionArea: 2
manualCellSize: 0
cellSize: 0.16666667
manualTileSize: 0
tileSize: 256
accuratePlacement: 0
debug:
m_Flags: 0
m_SettingNames:
- Humanoid
| {
"pile_set_name": "Github"
} |
Heavy Metal. Hard Rock. Music.
Troy Donockley has built up a formidable reputation as both a composer/arranger and as a multi-instrumental musician/performer. He is a leading virtuoso of the uilleann pipes (and the low whistle) and has performed and is known all over the world. His music, which has been described as “a peculiar brand of epic classical-folk-progressive fusion,” can be heard in TV, media and movies (such as “Robin Hood” and “Ironclad”) and through various commissions. Troy co-founded the BBC Award-nominated band THE BAD SHEPHERDS and as a producer/musician has recorded and toured with various artists such as NIGHTWISH, Maddy Prior, Barbara Dickson, Maire Brennan (Clannad), MIDGE URE, Iona, Roy Harper, Lesley Garrett, STATUS QUO, Del Amitri, Alan Stivell, MOSTLY AUTUMN and many, many more.
Troy‘s first album, “The Unseen Stream”, released in 1998 was critically acclaimed globally for its unique fusion of traditional/classical forms. His second album, “The Pursuit of Illusion” (2003) continued to push the boundaries with a highly individual blend of the English classical and Irish folk traditions. And then, onto the latest album, “The Madness of Crowds”, featuring a large cast of brilliant musicians it goes even further than before in the quest to make the most emotional and uncommercially driven music possible. If any modern music can shake off the ravages of fashion and hark back to a time when music was created and listened to as art rather than as commodity and accessory, then by definition this does precisely that…the essence of that ‘lost world.
“I have a massive range of influences — from PINK FLOYD to Mahler, Johnny Cash to VANGELIS, PLANXTY to YES, and Vaughn Williams to Neil Young,” says Troy.
And now, particularly for the uninitiated, a compilation of Troy‘s work, “Messages – A Collection of Music From 1997-2011”, is available from Gonzo MultiMedia.
“I have been asked many times to put together a good overview of my work and so here we are,” says Troy about “Messages”. “All the tracks are from my previous three solo albums, but there are two new and unreleased pieces, both of which I am very proud.”
In other news, Troy just begun a year-long world tour with NIGHTWISH, although has some “grand ideas” in the pipeline for his next solo project.
Lastly, Troy has this to impart to his listeners: “I really hope you enjoy the two new pieces on ‘Messages’. Do try and listen in a darkened room, with headphones — just like you did when you were a kid.” | {
"pile_set_name": "Pile-CC"
} |
-- Loads pre-trained word embeddings from either Word2Vec or Glove
assert(get_id_from_word)
assert(common_w2v_freq_words)
assert(total_num_words)
word_vecs_size = 300
-- Loads pre-trained glove or word2vec embeddings:
if opt.word_vecs == 'glove' then
-- Glove downloaded from: http://nlp.stanford.edu/projects/glove/
w2v_txtfilename = default_path .. 'Glove/glove.840B.300d.txt'
w2v_t7filename = opt.root_data_dir .. 'generated/glove.840B.300d.t7'
w2v_reader = 'words/w2v/glove_reader.lua'
elseif opt.word_vecs == 'w2v' then
-- Word2Vec downloaded from: https://code.google.com/archive/p/word2vec/
w2v_binfilename = default_path .. 'Word2Vec/GoogleNews-vectors-negative300.bin'
w2v_t7filename = opt.root_data_dir .. 'generated/GoogleNews-vectors-negative300.t7'
w2v_reader = 'words/w2v/word2vec_reader.lua'
end
---------------------- Code: -----------------------
w2vutils = {}
print('==> Loading ' .. opt.word_vecs .. ' vectors')
if not paths.filep(w2v_t7filename) then
print(' ---> t7 file NOT found. Loading w2v from the bin/txt file instead (slower).')
w2vutils.M = require(w2v_reader)
print('Writing t7 File for future usage. Next time Word2Vec loading will be faster!')
torch.save(w2v_t7filename, w2vutils.M)
else
print(' ---> from t7 file.')
w2vutils.M = torch.load(w2v_t7filename)
end
-- Move the word embedding matrix on the GPU if we do some training.
-- In this way we can perform word embedding lookup much faster.
if opt and string.find(opt.type, 'cuda') then
w2vutils.M = w2vutils.M:cuda()
end
---------- Define additional functions -----------------
-- word -> vec
w2vutils.get_w_vec = function (self,word)
local w_id = get_id_from_word(word)
return w2vutils.M[w_id]:clone()
end
-- word_id -> vec
w2vutils.get_w_vec_from_id = function (self,w_id)
return w2vutils.M[w_id]:clone()
end
w2vutils.lookup_w_vecs = function (self,word_id_tensor)
assert(word_id_tensor:dim() <= 2, 'Only word id tensors w/ 1 or 2 dimensions are supported.')
local output = torch.FloatTensor()
local word_ids = word_id_tensor:long()
if opt and string.find(opt.type, 'cuda') then
output = output:cuda()
word_ids = word_ids:cuda()
end
if word_ids:dim() == 2 then
output:index(w2vutils.M, 1, word_ids:view(-1))
output = output:view(word_ids:size(1), word_ids:size(2), w2vutils.M:size(2))
elseif word_ids:dim() == 1 then
output:index(w2vutils.M, 1, word_ids)
output = output:view(word_ids:size(1), w2vutils.M:size(2))
end
return output
end
-- Normalize word vectors to have norm 1 .
w2vutils.renormalize = function (self)
w2vutils.M[unk_w_id]:mul(0)
w2vutils.M[unk_w_id]:add(1)
w2vutils.M:cdiv(w2vutils.M:norm(2,2):expand(w2vutils.M:size()))
local x = w2vutils.M:norm(2,2):view(-1) - 1
assert(x:norm() < 0.1, x:norm())
assert(w2vutils.M[100]:norm() < 1.001 and w2vutils.M[100]:norm() > 0.99)
w2vutils.M[unk_w_id]:mul(0)
end
w2vutils:renormalize()
print(' Done reading w2v data. Word vocab size = ' .. w2vutils.M:size(1))
-- Phrase embedding using average of vectors of words in the phrase
w2vutils.phrase_avg_vec = function(self, phrase)
local words = split_in_words(phrase)
local num_words = table_len(words)
local num_existent_words = 0
local vec = torch.zeros(word_vecs_size)
for i = 1,num_words do
local w = words[i]
local w_id = get_id_from_word(w)
if w_id ~= unk_w_id then
vec:add(w2vutils:get_w_vec_from_id(w_id))
num_existent_words = num_existent_words + 1
end
end
if (num_existent_words > 0) then
vec:div(num_existent_words)
end
return vec
end
w2vutils.top_k_closest_words = function (self,vec, k, mat)
local k = k or 1
vec = vec:float()
local distances = torch.mv(mat, vec)
local best_scores, best_word_ids = topk(distances, k)
local returnwords = {}
local returndistances = {}
for i = 1,k do
local w = get_word_from_id(best_word_ids[i])
if is_stop_word_or_number(w) then
table.insert(returnwords, red(w))
else
table.insert(returnwords, w)
end
assert(best_scores[i] == distances[best_word_ids[i]], best_scores[i] .. ' ' .. distances[best_word_ids[i]])
table.insert(returndistances, distances[best_word_ids[i]])
end
return returnwords, returndistances
end
w2vutils.most_similar2word = function(self, word, k)
local k = k or 1
local v = w2vutils:get_w_vec(word)
neighbors, scores = w2vutils:top_k_closest_words(v, k, w2vutils.M)
print('To word ' .. skyblue(word) .. ' : ' .. list_with_scores_to_str(neighbors, scores))
end
w2vutils.most_similar2vec = function(self, vec, k)
local k = k or 1
neighbors, scores = w2vutils:top_k_closest_words(vec, k, w2vutils.M)
print(list_with_scores_to_str(neighbors, scores))
end
--------------------- Unit tests ----------------------------------------
local unit_tests = opt.unit_tests or false
if (unit_tests) then
print('\nWord to word similarity test:')
w2vutils:most_similar2word('nice', 5)
w2vutils:most_similar2word('france', 5)
w2vutils:most_similar2word('hello', 5)
end
-- Computes for each word w : \sum_v exp(<v,w>) and \sum_v <v,w>
w2vutils.total_word_correlation = function(self, k, j)
local exp_Z = torch.zeros(w2vutils.M:narrow(1, 1, j):size(1))
local sum_t = w2vutils.M:narrow(1, 1, j):sum(1) -- 1 x d
local sum_Z = (w2vutils.M:narrow(1, 1, j) * sum_t:t()):view(-1) -- num_w
print(red('Top words by sum_Z:'))
best_sum_Z, best_word_ids = topk(sum_Z, k)
for i = 1,k do
local w = get_word_from_id(best_word_ids[i])
assert(best_sum_Z[i] == sum_Z[best_word_ids[i]])
print(w .. ' [' .. best_sum_Z[i] .. ']; ')
end
print('\n' .. red('Bottom words by sum_Z:'))
best_sum_Z, best_word_ids = topk(- sum_Z, k)
for i = 1,k do
local w = get_word_from_id(best_word_ids[i])
assert(best_sum_Z[i] == - sum_Z[best_word_ids[i]])
print(w .. ' [' .. sum_Z[best_word_ids[i]] .. ']; ')
end
end
-- Plot with gnuplot:
-- set palette model RGB defined ( 0 'white', 1 'pink', 2 'green' , 3 'blue', 4 'red' )
-- plot 'tsne-w2v-vecs.txt_1000' using 1:2:3 with labels offset 0,1, '' using 1:2:4 w points pt 7 ps 2 palette
w2vutils.tsne = function(self, num_rand_words)
local topic1 = {'japan', 'china', 'france', 'switzerland', 'romania', 'india', 'australia', 'country', 'city', 'tokyo', 'nation', 'capital', 'continent', 'europe', 'asia', 'earth', 'america'}
local topic2 = {'football', 'striker', 'goalkeeper', 'basketball', 'coach', 'championship', 'cup',
'soccer', 'player', 'captain', 'qualifier', 'goal', 'under-21', 'halftime', 'standings', 'basketball',
'games', 'league', 'rugby', 'hockey', 'fifa', 'fans', 'maradona', 'mutu', 'hagi', 'beckham', 'injury', 'game',
'kick', 'penalty'}
local topic_avg = {'japan national football team', 'germany national football team',
'china national football team', 'brazil soccer', 'japan soccer', 'germany soccer', 'china soccer',
'fc barcelona', 'real madrid'}
local stop_words_array = {}
for w,_ in pairs(stop_words) do
table.insert(stop_words_array, w)
end
local topic1_len = table_len(topic1)
local topic2_len = table_len(topic2)
local topic_avg_len = table_len(topic_avg)
local stop_words_len = table_len(stop_words_array)
torch.setdefaulttensortype('torch.DoubleTensor')
w2vutils.M = w2vutils.M:double()
local tensor = torch.zeros(num_rand_words + stop_words_len + topic1_len + topic2_len + topic_avg_len, word_vecs_size)
local tensor_w_ids = torch.zeros(num_rand_words)
local tensor_colors = torch.zeros(tensor:size(1))
for i = 1,num_rand_words do
tensor_w_ids[i] = math.random(1,25000)
tensor_colors[i] = 0
tensor[i]:copy(w2vutils.M[tensor_w_ids[i]])
end
for i = 1, stop_words_len do
tensor_colors[num_rand_words + i] = 1
tensor[num_rand_words + i]:copy(w2vutils:phrase_avg_vec(stop_words_array[i]))
end
for i = 1, topic1_len do
tensor_colors[num_rand_words + stop_words_len + i] = 2
tensor[num_rand_words + stop_words_len + i]:copy(w2vutils:phrase_avg_vec(topic1[i]))
end
for i = 1, topic2_len do
tensor_colors[num_rand_words + stop_words_len + topic1_len + i] = 3
tensor[num_rand_words + stop_words_len + topic1_len + i]:copy(w2vutils:phrase_avg_vec(topic2[i]))
end
for i = 1, topic_avg_len do
tensor_colors[num_rand_words + stop_words_len + topic1_len + topic2_len + i] = 4
tensor[num_rand_words + stop_words_len + topic1_len + topic2_len + i]:copy(w2vutils:phrase_avg_vec(topic_avg[i]))
end
local manifold = require 'manifold'
opts = {ndims = 2, perplexity = 30, pca = 50, use_bh = false}
mapped_x1 = manifold.embedding.tsne(tensor, opts)
assert(mapped_x1:size(1) == tensor:size(1) and mapped_x1:size(2) == 2)
ouf_vecs = assert(io.open('tsne-w2v-vecs.txt_' .. num_rand_words, "w"))
for i = 1,mapped_x1:size(1) do
local w = nil
if tensor_colors[i] == 0 then
w = get_word_from_id(tensor_w_ids[i])
elseif tensor_colors[i] == 1 then
w = stop_words_array[i - num_rand_words]:gsub(' ', '-')
elseif tensor_colors[i] == 2 then
w = topic1[i - num_rand_words - stop_words_len]:gsub(' ', '-')
elseif tensor_colors[i] == 3 then
w = topic2[i - num_rand_words - stop_words_len - topic1_len]:gsub(' ', '-')
elseif tensor_colors[i] == 4 then
w = topic_avg[i - num_rand_words - stop_words_len - topic1_len - topic2_len]:gsub(' ', '-')
end
assert(w)
local v = mapped_x1[i]
for j = 1,2 do
ouf_vecs:write(v[j] .. ' ')
end
ouf_vecs:write(w .. ' ' .. tensor_colors[i] .. '\n')
end
io.close(ouf_vecs)
print(' DONE')
end
| {
"pile_set_name": "Github"
} |
3 Steps To Identify Most Appropriate Travel Technology Solution For Your Business
Over the last 10 years, the travel business scenario has changed significantly. Today selling travel products is all about ‘best’ rates. To sustain in the battle to offer the ‘best deal’ and ‘best fare’ to the consumers, travel business owners have been forced to reduce almost all of their possible profit margins.
I still remember when a service fee of $6 was a norm across online sales of air tickets. Commissions and contracts were available to travel agents. Cancellation fee on hotels were healthy.
As a travel technologist, I have many motivations to say “buy my software”, but in my experience that’s not a good pitch. After carefully analyzing various successes and failures in the industry, here is what I feel I have learned:
Step 1: Identify what Travel Technology you need
Well, it is easier said than done. Most of the time not articulating the technology needs well is the biggest hurdle in Technology Strategy. As a travel business, here is what you could do to clearly articulate the need for technology.
Pen down the technology needs of the organization as envisioned by the business owner / key management personnel Consult with people external to the organization such as technology consultants, Travel Technology companies, GDS account managers, CRS / Suppliers and Travel Technology bloggers Let a technology company interview you and recommend a solution. This is generally free most of the times. Pursuing one or more of these three exercises diligently will build enough knowledge base about what your internal Technology Strategy should be. Identify and validate these thoughts with inputs from internal operations and marketing teams.
Step 2: Build vs. Buy?
This is considered the most complex question. The answer lies in dividing Travel Technology needs in three buckets.
Proprietary
Customized
Out of the Box
What is proprietary?
It is important to identify your differentiator as a travel business. Most of the time, proprietary defines a piece of technology which reduces OPEX corresponding to your business operations or is the biggest revenue generator corresponding to your business model.
What is a customized need?
Is there any part of your technology needs that could be sourced through an existing technology solution, customized per your need?
What can be out of the box?
This might be the most effort intensive part of your technology needs and may require a tremendous investment to build. Getting an out of the box solution that meets the majority of your requirements and configuring it as per your needs, is the ideal way. How to evaluate an out of the box solution is in itself a comprehensive process.
Now we come to the next complex part of this exercise.
Step 3: Identify the right budget and vendor
Identifying the right budget and the vendor is the most common shopping problem in every business sector. It takes a lot of time and energy to reach to a decision.
Let’s compare technology acquisition to the decision of buying a laptop. There are many vendors to choose from. There are laptops priced from $300 to $3000. Your decision to buy would be shaped by the life of the laptop, and the continuity of business (your work) it will guarantee.
Similarly, the continuity of your travel business would significantly depend on the Travel Technology you choose. That is why identifying the right budget, and the vendor is a complex decision.
I would attempt to breakdown the process of identifying a vendor into simpler steps since just asking a vendor for a quote would not necessarily help find the right one.
Releated
Advancement in technology has made the world go “gaga”. As far as technology is concerned, you can expect the unexpected or imagine the unimaginable. The world has left the stage of crude implementation. Every facet of life has been touched and affected by technology. The bewilderment of everyone is that existing technologies are fast becoming […]
The effectiveness of technology use in the classroom has become a controversial issue. While many teachers and students feel that it’s best to use technology because it enhances teaching many others feel that it causes too many challenges and that it is a waste of time. If technology is as effective in the classroom as […] | {
"pile_set_name": "Pile-CC"
} |
Q:
How to get Last Access Time of any file in Android Without Using BasicFileAttribute Class
I want a class which would be a part of an Android application that can directly provide me the last open status or last access status of any file like images, videos. The BasicFileAttribute.class seems not to work for me. The solution need to use JDK 8. I don't want to use JDK 7.
A:
You can use Os.stat - since api 21, it returns StructStat which contains field st_atime with Time of last access (in seconds). example:
if (Build.VERSION.SDK_INT >= 21) {
try {
StructStat stat = Os.stat("/path/to/my/file");
if (stat.st_atime != 0) {
// stat.st_atime contains last access time, seconds since epoch
}
} catch (Exception e) {
// deal with exception
}
}
Other solution is to execute shell command stat :
Process p = Runtime.getRuntime().exec("stat -c \"%X\" /path/to/file");
p.waitFor();
BufferedReader reader = new BufferedReader(new InputStreamReader(
p.getInputStream()));
String line = reader.readLine();
long time_sec = 0;
if (!TextUtils.isEmpty())
time_sec = Long.parseLong(line);
I have not tested above code - but it looks like it should work.
Third aproach would be to use NDK and call stat function from C or C++.
| {
"pile_set_name": "StackExchange"
} |
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<databaseChangeLog xmlns="http://www.liquibase.org/xml/ns/dbchangelog" xmlns:ext="http://www.liquibase.org/xml/ns/dbchangelog-ext" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.liquibase.org/xml/ns/dbchangelog-ext http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-ext.xsd http://www.liquibase.org/xml/ns/dbchangelog http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-3.3.xsd">
<changeSet author="toja" id="1-indices">
<createIndex tableName="LOGRECORD" indexName="LOGRECORD_TIMESTAMPRECORD_fkey">
<column name="TIMESTAMPRECORD"/>
</createIndex>
</changeSet>
</databaseChangeLog>
| {
"pile_set_name": "Github"
} |
With each Carolina Panthers victory, I can sense BC leader Joe’s excitement over his investment in Cam Newton’s BCS pants. An undefeated season, a potential MVP award, maybe a Super Bowl — the only thing that can stop Cam now is his hoverboard exploding (or a traffic accident). | {
"pile_set_name": "Pile-CC"
} |
Q:
wmi accelerator and authentication
It seems I can not find clearly written somewhere that when using WMI accelerator in a PowerShell script, you can not pass on authentication.
A little background ...
I am writing PowerShell scripts for SCCM 2012 and found, for instance, the following quite using :
PS R:\> ([wmi]((gwmi -namespace root\sms\site_AAA -class SMS_Application -filter
"LocalizedDisplayName LIKE '%Winzip_Tartempion%'")
.__PATH)).SDMPackageXML
When executed locally (on the SCCM primary server, it works fine and swiftly.
However, the following ends up in error when executed from my desktop computer running W7 :
PS R:\> ([wmi]((gwmi -namespace root\sms\site_AAA -credential $cred
-ComputerName CEMTECH
-class SMS_Application -filter "LocalizedDisplayName LIKE
'%Winzip_Tartempion%'")
.__PATH)).SDMPackageXML
For the time being, using a PSSession is out of the question.
With the current infrastructure I have to deal with, using SCCM commandlet is out of the question.
My only question here is : can you confirm that we can not pass any authentication with a WMI accelerator ? At that point, I am searching for that answer mainly for my curiosity. I found a way to manage with my current constraints. It is just that I find the accelerators so "elegant".
Now why do I need it ? I need to access "lazy properties" without using SCCM cmdlets, from a desktop computer to which the user is logged on with an account which will not be the same as the name authorized to connect/access the SCCM primary server.
What I still did not find is how to use "*.__PATH" with the Get-WMIObject cmdlet.
A:
The WMI-accelerator [wmi] doesn't support alternate credentials.
Why do you need it? You could just run:
$obj = Get-WmiObject -namespace root\sms\site_P41 -credential $cred -ComputerName qs07352 -class SMS_Application -filter "LocalizedDisplayName LIKE '%Winzip_Tartempion%'"
$obj.Get()
$obj.SDMPackageXML
| {
"pile_set_name": "StackExchange"
} |
What people are saying aboutResource Centers
"It was a pleasure working with you and your team at Leadix... Our clients were very happy with the overall outcome of the microsites along with the leads that were generated. I also found the microsites to be a great addition to our sites, creating additional resources for our visitors, which results in additional traffic for us. Overall, I am completely satisfied and look forward to the next project with Leadix!"
ResourceCenter
For the first time, online Companies can not only measure user activity and performance levels tied directly to their dedicated message, but they can update content on a daily basis guaranteeing their companies latest business objectives are in front of their best online prospects and customers consistently.
Online users are able to access a Companies detailed product and services message without being redirected away from the online content they are currently engaged in.
A lead generation tool is standard on all ResourceCenters - additional lead tools can be added, at no cost, to any and all downloadable files. This feature delivers a proprietary, qualified lead to the ResourceCenter marketer. | {
"pile_set_name": "Pile-CC"
} |
What is the clinical yield of capsule endoscopy in the management of obscure bleeding in emergency service?
The aim of this study was to investigate the efficacy of capsule endoscopy (CE) performed on patients who presented to emergency room with clinically evident gastrointestinal (GI) bleeding from unknown source and were hospitalized for follow-up. Total of 38 patients who underwent CE and were followed-up for evaluation of clinically perceptible GI bleeding with no obvious etiology in Istanbul Medical Faculty emergency surgery department were included in the study. Patient data, which were collected between January 1, 2007 and June 1, 2015, were reviewed retrospectively. Of the 38 patients included in this study, 12 (32%) patients were women and 26 (68%) were men. Average age was 55.57 years (range: 20-88 years). Nine patients were using anticoagulants. Ten patients were followed-up in intensive care, and 7 patients underwent angiography. Angioembolization was performed for 1 patient who was diagnosed as having active bleed with CE. Average erythrocyte suspension replacement was 20.7 units. Total of 13 patients underwent surgery for bleeding found with CE. Eleven (34%) patients underwent double-balloon endoscopy, during which 5 patients were treated with cauterization and sclerotherapy was performed on 2. Four (18%) patients died during the study period: 2 died as result of bleeding from unknown source, 1 died of cholangiocarcinoma recurrence, and 1 died of anastomotic leakage. One patient was readmitted to hospital due to recurrence of bleeding. Nineteen (50%) patients were treated successfully based on CE findings. Diagnostic yield of CE was determined to be 78.9%. Average length of hospital stay was 32.68 days (range: 3-153 days). CE is an effective tool to detect source of GI bleeding. CE should be first choice of evaluation method for patients admitted to emergency room with obscure overt GI bleeding once radiological imaging determines absence of obstruction. | {
"pile_set_name": "PubMed Abstracts"
} |
"Twinkle twinkle little star. I know where you are."Another threatening note sent to a beloved child star. But this time, the stalker got inside the house. Desperate to protect her young charge, guardian Blythe Cooper is grateful for the tall, strong bodyguard now standing sentinel at their door. Until Ethan Ryan awakens feelings in Blythe she can't acknowledge.The former secret service agent turned bodyguard makes it his mission to protect children. The rules: never make it personal, and everyone walks away alive. Amendment: somehow, someway, keep beautiful Blythe and the little girl out of his heart--and safe by his side. | {
"pile_set_name": "Pile-CC"
} |
Has July Fourth goal of passing immigration law
Share via e-mail
WASHINGTON — Key Senate Republicans are working to develop a compromise on border security that would satisfy GOP demands for stronger enforcement language in a far-reaching immigration bill without costing Democratic support, lawmakers and aides said Thursday.
To win over skeptical Republicans, senators are considering mandating specific requirements for tools and equipment along the US-Mexico border, instead of leaving it up to the Obama administration, said Senator John McCain, an Arizona Republican who is an author of the bill.
‘‘That may be a way to assuage the concern of some of our friends that are concerned about border security,’’ McCain said. Republican Senator Marco Rubio of Florida, another author, has discussed the same approach.
The talks were underway behind the scenes at the Capitol on Thursday even as the Senate voted 53-47 to defeat an amendment that would have required a controlled border for six months before any immigrant here illegally could take the first steps toward citizenship. It was the first amendment to the White House-backed immigration legislation the Senate voted on.
The outcome suggested that bill supporters have work to do to lock down the 60 votes that will likely be needed to overcome GOP stalling tactics and get it passed in the Senate by July 4, the timeline set by Senate majority leader Harry Reid.
The bill, which would contain the most significant changes to immigration law in decades, would require all employers to check workers’ legal status, allow tens of thousands of new high- and low-skilled workers into the country, and create a 13-year path to citizenship for some 11 million people now here illegally.
The bill also devotes billions to new equipment and personnel along the US-Mexico border, and says the path to citizenship can’t go forward until certain border security requirements are met. But critics say these ‘‘triggers’’ are too weak, and wouldn’t encourage an administration to secure the border.
Rubio has been saying that stronger language on border security would be needed to ensure passage in the Democratic-controlled Senate and the Republican-controlled House. The question now is how to do that without raising concerns among Democrats that the path to citizenship would be delayed — the reason that Senator Chuck Schumer, a New York Democrat, and others gave for opposing the amendment Thursday.
Schumer and the three other Democratic authors of the bill, along with Judiciary Committee chairman Patrick Leahy, a Vermont Democrat, met with President Obama at the White House on Thursday to discuss strategy.
Although a number of Republican senators have their own border security amendments, the hope is to develop a single consensus alternative with as many Republican sponsors as possible. McCain and other bill authors have been working with a number of other Republicans outside their group including Republicans Bob Corker of Tennessee and John Hoeven of North Dakota. | {
"pile_set_name": "Pile-CC"
} |
902 F.Supp. 199 (1995)
WHITECO METROCOM DIVISION OF WHITECO INDUSTRIES, INC., a Corporation, Plaintiff,
v.
YANKTON SIOUX TRIBE, Defendant.
No. CIV 94-4259.
United States District Court, D. South Dakota, Southern Division.
October 12, 1995.
*200 Jack Gunvordahl, Gunvordahl & Gunvordahl, Burke, SD and Stanley E. Whiting, Winner, SD, for Plaintiff.
Charles Thomas Abourezk, Abourezk Law Offices, Rapid City, SD, for Defendant.
MEMORANDUM OPINION AND ORDER
PIERSOL, District Judge.
Plaintiff brought suit against the Defendant Tribe for breach of contract pursuant to seven contracts entered into between Plaintiff and the Tribe's Ft. Randall Casino for billboards to be placed along public highways in an effort to generate business for the Casino. The contracts were signed by the general manager of the Casino on June 4 and September 10 of 1993, and approximately six months later, the Tribe informed Plaintiff that the Yankton Sioux Tribe Business and Claims Committee had not approved the contracts prior to signing, and, therefore, the contracts were "terminated." Doc. 7 at Ex. B. Plaintiff brought the instant action for monies owed under the contracts. Doc. 1. The Tribe moves for dismissal on the grounds of sovereign immunity. Doc. 3.
The Tribe's Motion to Dismiss raises two jurisdictional questions for the Court. First, whether this Court or a tribal court must hear this issue and, second, whether this action is barred by the doctrine of sovereign immunity.
DISMISSAL PURSUANT TO RULE 12(b)(1)
Federal Rule of Civil Procedure 12(b)(1) provides for dismissal of an action whenever the court lacks jurisdiction over the subject matter. The Eighth Circuit has distinguished between facial and factual 12(b)(1) motions, stating the standards applicable to motions to dismiss in each instance. In this case, we are concerned with a factual motion:
Because at issue in a factual 12(b)(1) motion is the trial court's jurisdiction its very power to hear the case there is substantial authority that the trial court is free to weigh the evidence and satisfy itself as to the existence of its power to hear the case. In short, no presumptive truthfulness attaches to the plaintiff's allegations, and the existence of disputed material facts will not preclude the trial court from evaluating for itself the merits of jurisdictional *201 claims. Moreover, the plaintiff will have the burden of proof that jurisdiction does in fact exist.
Osborn v. United States, 918 F.2d 724, 730 (8th Cir.1990); Titus v. Sullivan, 4 F.3d 590, 593 (8th Cir.1993).
SUBJECT MATTER JURISDICTION
Federal Courts have original jurisdiction in cases "arising under the Constitution, laws or treaties of the United States." 28 U.S.C. § 1331, and in cases in which there is diversity of citizenship and the matter in controversy exceeds the statutory amount, 28 U.S.C. § 1332. Plaintiff argues that this Court has jurisdiction in this contract dispute pursuant to 28 U.S.C. § 1332 and 25 C.F.R. Part 11.
Diversity jurisdiction does not exist. Section 1332 requires that the parties be "citizens of different states." Although Plaintiff has attempted to demonstrate diversity by alleging in its Complaint that Plaintiff is incorporated in Nebraska and that "Defendant is an Indian Tribe with its principal place of business in South Dakota," Doc. 1 at ¶ 4, it is well settled that "Indian tribes are not citizens of any state for purposes of diversity jurisdiction." Gaines v. Ski Apache, 8 F.3d 726, 729 (10th Cir.1993) (citations omitted). Additionally, the Tribe pleads it is organized pursuant to Section 16 of the Indian Reorganization Act, 25 U.S.C. § 476, and has never incorporated under 25 U.S.C. § 477.[1] Doc. 4 at 1. As a "Section 16" entity, the Tribe is not a citizen of any state for purposes of diversity jurisdiction. Standing Rock Sioux Indian Tribe v. Dorgan, 505 F.2d 1135, 1140 (8th Cir.1974); Gaines, 8 F.3d at 729; Veeder v. Omaha Tribe of Nebr., 864 F.Supp. 889, 898-901 (N.D.Iowa 1994).
Plaintiff bases its second argument for federal jurisdiction on 25 C.F.R. § 11.104(b). National Farmers Union Ins. Co. v. Crow Tribe holds that questions of tribal court jurisdiction over non-Indians should first be addressed in tribal court. 471 U.S. 845, 856, 105 S.Ct. 2447, 2454, 85 L.Ed.2d 818 (1985). Plaintiff argues that it cannot bring suit in the tribal forum because § 11.104(b) requires a Tribe with a C.F.R. court to pass a resolution permitting the Tribe to be sued in that court, and the Yankton Sioux Tribe has never passed such a resolution. Therefore, Plaintiff argues it must pursue its rights in the federal forum because the tribal forum is closed to it.
The Tribe's response to the argument that there is no tribal forum is that "The Yankton Sioux Tribe converted its tribal court system from a `CFR Court' to a tribal court of general jurisdiction in June of 1994." Doc. 4 at 2. This assertion, standing alone and unsupported by any evidence, is an insufficient defense to Plaintiff's claim that jurisdiction does not exist in a tribal forum. Federal regulations provide:
The regulations in this part shall continue to apply to tribes listed under § 11.100(a) until a law and order code which includes the establishment of a court system has been adopted by the tribe ... and the Assistant Secretary Indian Affairs ... has received a valid tribal enactment identifying the effective date of the code's implementation, and the name of the tribe has been deleted from the listing of Courts of Indian Offenses under § 11.100(a). *202 25 C.F.R. § 11.100(c) (1994). The Tribe has made no showing that it has met the requirements of § 11.100(c) and, as of this date,[2] 25 C.F.R. § 11.100(a)(2) retains "Yankton Sioux Tribe (South Dakota)" as one of the tribes to whom the regulations governing Courts of Indian Offenses apply.
The Tenth Circuit has defined one narrow exception[3] to the tribal court exhaustion doctrine of National Farmers Union, 471 U.S. at 856, 105 S.Ct. at 2454. In Dry Creek Lodge, Inc. v. Arapahoe & Shoshone Tribes, the court assumed jurisdiction over plaintiffs' constitutional claims because diversity was lacking and plaintiffs had been denied access to the tribal C.F.R. court. 623 F.2d 682, 685 (10th Cir.1980), cert. denied, 449 U.S. 1118, 101 S.Ct. 931, 66 L.Ed.2d 847 reh'g denied, 450 U.S. 960, 101 S.Ct. 1421, 67 L.Ed.2d 385 (1981) (Dry Creek II). The court stated:
There has to be a forum where the dispute can be settled.... There must exist a remedy for parties in the position of plaintiffs to have the dispute resolved in an orderly manner. To hold that they have access to no court is to hold that they have constitutional rights which have no remedy.
Id. The Court declines to follow the Dry Creek exception. This is a simple contract dispute and raises no issues of constitutional magnitude. See Gila River Indian Community v. Henningson, Durham & Richardson, 626 F.2d 708, 714-15 (9th Cir.1980) (finding no federal jurisdiction for simple breach of contract claim brought by Tribe), and Mescalero Apache Tribe v. Martinez, 519 F.2d 479, 481 (10th Cir.1975) (same). It is doubtful that the Dry Creek exception is the law in this Circuit under any circumstances, but that remains to be determined.
Plaintiff also argues that federal question jurisdiction exists for any contract dispute under the Indian Gaming Regulatory Act [IGRA], 25 U.S.C. § 2701 et seq. IGRA does not create a private cause of action for individuals. Tamiami Partners, Ltd. v. Miccosukee Tribe, 63 F.3d 1030, 1049 (11th Cir. 1995).
Because I find the Court has no original or diversity jurisdiction in this matter, I do not reach the question of whether the Tribe may utilize the defense of sovereign immunity, except to comment briefly. The Eighth Circuit has held that nothing except an express waiver will satisfy the Supreme Court's mandate in Santa Clara Pueblo v. Martinez, 436 U.S. 49, 58, 98 S.Ct. 1670, 1677, 56 L.Ed.2d 106 (1978), stating that a waiver of sovereign immunity "cannot be implied but must be unequivocally expressed." American Indian Agric. Credit Consortium v. Standing Rock Sioux Tribe, 780 F.2d 1374, 1375 (8th Cir.1985). If this Court had jurisdiction, and if the Tribe was a private party, the facts of this case would create a strong case for the application of the doctrine of estoppel. The misrepresentations on the Credit Application which was signed by the general manager, that the Casino was incorporated by the State of South Dakota and that the general manager had authority to enter into contracts on behalf of the Casino would give support to an estoppel argument by a private party. However, the mandate of Santa Clara Pueblo is clear, and even if the facts supporting a finding of estoppel are present, as presupposed for purposes of this motion, estoppel is an insufficient basis from which to find that the Tribe expressly waived its sovereign immunity.
I find that this Court does not have diversity jurisdiction over this contract dispute *203 and that there is no independent federal question jurisdiction. The dismissal of this action for lack of subject matter jurisdiction is without prejudice to the right of Plaintiff to pursue an action in the state courts of South Dakota as may be allowed by the applicable gaming compact between the Tribe and the State of South Dakota. Accordingly,
IT IS ORDERED: that Defendant's Motion to Dismiss, Docket No. 3, is granted.
JUDGMENT
In accordance with the Memorandum Opinion and Order filed this date with the Clerk,
IT IS ORDERED, ADJUDGED AND DECREED that Defendant's motion to dismiss is granted, and judgment shall be entered for Defendant and against Plaintiff, without prejudice.
NOTES
[1] Plaintiff states that the Tribe has apparently not formally organized under either Section 16 or Section 17 of the Indian Reorganization Act, and the documentation provided to Plaintiff, and, in turn, to the Court, does not contradict that statement. Doc. 7 at 5, Ex. F. Section 17 of the Indian Reorganization Act, 25 U.S.C. § 477, permits tribes to incorporate, and these corporate entities are then considered citizens of the state of their principal place of business for diversity purposes. Gaines v. Ski Apache, 8 F.3d 726, 729 (10th Cir.1993).
Plaintiff argues that the Tribe should be estopped from making its case that the Tribe is not a corporation and not a citizen of a state for diversity purposes. Plaintiff argues that the Casino's general manager represented to Plaintiff on the Credit Application which was completed at the same time as the first contracts were executed that the Casino was a South Dakota corporation. Doc. 7 at Ex. C. Plaintiff argues that because Plaintiff relied upon the representation that the Casino was incorporated in South Dakota and Plaintiff's belief that, therefore, "the contracts could be enforced" at the time they completed the contracts, the Tribe should be estopped from using the defense that it is not a corporation. Doc. 7 at 6.
[2] Pursuant to a Westlaw search of currently effective CFR sections.
[3] The Tenth Circuit has further narrowed the Dry Creek II exception by applying it only "where plaintiff's rights had been egregiously violated and tribal remedies were wrongfully denied," Seneca-Cayuga Tribe of Okla. v. State, 874 F.2d 709, 715 n. 6 (10th Cir.1989), and basing its application "on the finding that no tribal court forum existed for the non-Indian party." Bank of Okla. v. Muscogee (Creek) Nation, 972 F.2d 1166, 1170 (10th Cir.1992).
The Eighth Circuit has addressed the Dry Creek II decision only in passing. In Shortbull v. Looking Elk, the circuit court affirmed the district court's grant of summary judgment on the grounds that there is no private cause of action under the Indian Civil Rights Act. 677 F.2d 645, 650 (8th Cir.1982). The court merely compared the fact that the plaintiff had no remedy to the lack of a remedy in Dry Creek II. Id.
| {
"pile_set_name": "FreeLaw"
} |
1. Field
One embodiment of the invention relates to a video content recording apparatus which records copyright-protected video content transferred from a source apparatus, and a video content transfer method.
2. Description of the Related Art
Content currently available via digital terrestrial and digital DBS broadcasting is copyright-protected and may not be duplicated. In order to use the content on an apparatus different from the one on which it was recorded, the content must be moved in advance.
When moving copyright-protected content between apparatuses through a network or the like, a content moving method defined by various standards is typically used so that unauthorized copies cannot be made.
Initially, the destination apparatus issues a transfer request for the content to the source apparatus. In response, the source apparatus transfers the content to the destination apparatus. Here, the destination apparatus records the content but not in a usable state (referred to as the inactive state, the usable state in the source apparatus, on the other hand, being referred to as the active state). The processing so far will be referred to as transfer processing.
After the entire content has been transferred, the destination apparatus issues a deactivation request for the content to the source apparatus. In response, the source apparatus deletes the content and reports the deletion to the destination apparatus. The destination apparatus makes the content usable. The processing so far from the end of the transfer processing will be referred to as move confirmation processing.
This method eliminates the period where usable content coexists in both apparatuses, and can thus move the content while preventing the creation of unauthorized copies. The content moving method described above will be referred to as a transaction-based move.
Since it takes time to move content, it is inconvenient, entailing a long wait, to move content from scratch after a need arises to use the content.
Suppose, for example, that one wishes to move content from a DVD recorder or the like to a cellular phone when going out and to view the content with the cellular phone away from home. He/she then needs to wait for the transfer time if the content moving operation is performed from scratch before going out. For example, when an hour's content recorded at 25 Mbps is transmitted through a 100Base network with an effective rate of 50 Mbps, the transfer time to wait up to the end of the transfer is as much as approximately 30 minutes.
With copiable content, it is possible to copy all the content to the destination apparatus anyway instead of moving. The content then can be selected anytime to keep the needed for use and delete the unneeded. The content deleted from the destination apparatus will not be completely lost since the same content is still in the source apparatus.
Content that can only be moved, on the other hand, will be lost permanently from both the apparatuses if it is moved in advance and then deleted during selection, being determined not to be used this time. To avoid this, if the content is kept undeleted in the destination apparatus, the storage capacity will be wasted. Moving the content back to the original apparatus for this reason eventually takes time.
Jpn. Pat. Appln. Laid-Open Publication No. 2006-185473 discloses a technique for reducing the waiting time of move processing in a digital content recording and reproducing apparatus, by moving content under reproduction while maintaining a move condition even during reproduction.
The technique disclosed in Jpn. Pat. Appln. Laid-Open Publication No. 2006-185473 is not a fundamental solution, however, since the time from the occurrence of a need to the completion of a move is unchanged. | {
"pile_set_name": "USPTO Backgrounds"
} |
People are dependent on Internet-connected computers and mobile phones, which in turn are reliant on central infrastructure in the form of the internet (e.g., domain name servers) and cell towers, respectively to operate. If any kind of scenario arises where that central infrastructure is unavailable or suffering degraded performance, the computers and mobile phones are not able to communicate with other computers and mobile phones.
Smartphones integrate a broad range of communication functions with general purpose computational capabilities. Further, smartphones can also route and bridge communications between different communication bands and protocols, and thus can provide Internet connectivity and service to other devices.
Two distinct types of ubiquitous wireless data communication networks have developed: cellular telephone networks having a maximum range of about 20-50 miles line of sight or 3 miles in hilly terrain, and short-range local-area computer networks (wireless local-area networks or WLANs) having a maximum range of about 0.2 miles (˜1000 feet IEEE-802.11n 2.4 GHz) outdoors line of sight. First, the cellular infrastructure for wireless telephony involves long-distance communication between mobile phones and central basestations, where the basestations are typically linked to tall cell towers, connecting to the public switched telephone network and the Internet. The radio band for these long-range wireless networks is typically a regulated, licensed band, and the network is managed to combine both broad bandwidth (˜5-20 MHz) and many simultaneous users. This should be contrasted with a short-range wireless computer network, which may link multiple users to a central router or hub, which router may itself have a wired connection to the Internet. A key example is Wi-Fi, which is managed according to the IEEE-802.11x communications standards, with a data rate theoretically over 1 gigabit per second (802.11ac) and a range that is typically much less than 100 m. Other known standard examples are known by the terms Bluetooth and ZigBee. The radio band for a WLAN is typically an unlicensed band, such as one of the ISM bands (industrial, scientific, and medical), or more recently, a whitespace band formerly occupied by terrestrial analog television (WSLAN). One implication of such an unlicensed band is the unpredictable presence of significant interference due to other classes of users, which tends to limit either the range, or the bandwidth, or both. For such local area networks, a short range (low power and high modulation rates) becomes advantageous for high rates of spatial band reuse and acceptable levels of interference.
Ad hoc networks or mesh networks are also known. These protocols permit peer-to-peer communications between devices over a variety of frequency bands, and a range of capabilities. In a multihop network, communications are passed from one node to another in series between the source and destination. Because of various risks, as the number of hops grows, the reliability of a communication successfully reaching its destination decreases, such that hop counts of more than 10 or 20 in a mobility permissive network are rarely considered feasible. A typical mesh network protocol maintains a routing table at each node, which is then used to control the communication. This routing table may be established proactively or reactively. In proactive routing, the network state information is pushed to the various nodes, often appended to other communications, such that when a communication is to be established, the nodes rely on the then-current routing information to control the communication. This paradigm suffers from the possibility of stale or incorrect routing information or overly burdensome administrative overhead, or both. Reactive routing seeks to determine the network state at the time of, and for the purpose of, a single communication, and therefore may require significant communications possibly far exceeding the amount of data to be communicated in order to establish a link. Because the network state is requested at the time of communication, there is less opportunity to piggyback the administrative information on other communications. There are also various hybrid ad hoc network routing protocols, which seek to compromise between these two strategies, and other paradigms as well. See, e.g., U.S. Pat. Nos. and Pub. Patent Appl. Nos. 6,584,080; 6,625,135; 6,628,620; 6,718,394; 6,754,192; 6,763,013; 6,763,014; 6,870,846; 6,894,985; 6,898,529; 6,906,741; 6,954,435; 6,961,310; 6,975,614; 6,977,608; 6,986,161; 7,007,102; 7,027,426; 7,028,687; 7,068,600; 7,068,605; 7,075,919; 7,079,552; 7,082,117; 7,085,290; 7,096,037; 7,142,866; 7,170,425; 7,176,807; 7,216,282; 7,251,238; 7,266,085; 7,281,057; 7,299,038; 7,299,042; 7,308,369; 7,308,370; 7,317,898; 7,327,998; 7,346,167; 7,348,895; 7,356,001; 7,362,711; 7,366,111; 7,366,544; 7,382,765; 7,389,295; 7,394,798; 7,394,826; 7,418,238; 7,420,944; 7,427,927; 7,428,221; 7,450,517; 7,453,864; 7,457,834; 7,468,954; 7,480,248; 7,495,578; 7,529,561; 7,535,883; 7,536,388; 7,539,759; 7,545,285; 7,567,577; 7,580,730; 7,580,782; 7,581,095; 7,587,001; 7,590,589; 7,599,696; 7,602,738; 7,616,961; 7,656,851; 7,657,354; 7,660,318; 7,660,950; 7,678,068; 7,693,484; 7,695,446; 7,702,594; 7,706,282; 7,706,842; 7,710,932; 7,719,988; 7,725,080; 7,729,336; 7,742,399; 7,742,430; 7,746,794; 7,753,795; 7,764,617; 7,778,235; 7,788,387; 7,808,985; 7,813,451; 7,817,623; 7,830,820; 7,843,861; 7,849,139; 7,852,826; 7,860,025; 7,860,081; 7,860,968; 7,873,019; 7,881,474; 7,886,075; 7,894,828; 7,898,993; 7,902,973; 7,905,640; 7,912,645; 7,924,796; 7,929,914; 7,936,732; 7,941,188; 7,944,878; 7,957,355; 7,961,650; 7,962,101; 7,962,154; 7,969,914; 7,970,418; 7,974,402; 7,978,062; 7,979,311; 7,983,835; 7,990,947; 7,996,558; 8,035,479; 8,040,863; 8,042,048; 8,059,620; 8,060,017; 8,060,308; 8,065,166; 8,065,411; 8,072,906; 8,073,384; 8,090,596; 8,099,108; 8,099,307; 8,108,228; 8,108,429; 8,115,617; 8,121,628; 8,121,870; 8,130,708; 8,131,569; 8,131,838; 8,134,950; 8,135,362; 8,138,934; 8,139,504; 8,144,596; 8,144,619; 8,151,140; 8,161,097; 8,170,577; 8,170,957; 8,171,364; 8,174,381; 8,180,294; 8,184,681; 8,195,483; 8,195,628; 8,200,246; 8,203,463; 8,213,895; 8,239,169; 8,249,984; 8,256,681; 8,266,657; 8,271,449; 8,275,824; 8,289,182; 8,289,186; 8,300,615; 8,311,533; 8,315,231; 8,319,658; 8,319,833; 8,320,302; 8,320,414; 8,323,189; 8,325,612; 8,330,649; 8,332,055; 8,334,787; 8,335,207; 8,335,814; 8,341,279; 8,341,289; 8,345,098; 8,346,846; 8,352,420; 8,359,643; 8,363,662; 8,364,648; 8,369,880; 8,370,697; 8,373,556; 8,373,588; 8,374,352; 8,385,550; 8,386,278; 8,392,541; 8,395,498; 8,396,602; 8,400,507; 8,401,564; 8,406,153; 8,406,239; 8,406,252; 8,428,517; 8,441,958; 8,442,520; 8,447,419; 8,447,849; 8,451,744; 8,463,238; 8,467,991; 8,472,348; 8,473,989; 8,475,368; 8,489,765; 8,494,458; 8,495,244; 8,496,181; 8,502,148; 8,502,640; 8,503,309; 8,504,921; 8,509,762; 8,509,765; 8,514,915; 8,515,547; 8,520,535; 8,520,676; 8,521,156; 8,525,692; 8,527,622; 8,533,758; 8,544,023; 8,547,875; 8,548,607; 8,553,688; 8,559,442; 8,560,274; 8,571,046; 8,571,518; 8,577,391; 8,578,015; 8,578,054; 8,583,671; 8,583,978; 8,587,427; 8,588,108; 8,593,419; 8,593,986; 8,595,359; 8,600,830; 8,612,583; 8,615,257; 8,619,576; 8,619,789; 8,620,772; 8,620,784; 8,621,577; 8,622,837; 8,624,771; 8,625,515; 8,626,344; 8,630,177; 8,630,291; 8,630,314; 8,631,101; 8,636,395; 8,638,667; 8,638,763; 8,652,038; 8,654,627; 8,654,649; 8,665,890; 8,667,084; 8,670,416; 8,675,678; 8,682,982; 8,693,322; 8,699,333; 8,699,368; 8,699,377; 8,700,301; 8,700,302; 8,700,536; 8,707,785; 8,712,711; 8,715,072; 8,718,055; 8,719,563; 8,725,274; 8,727,978; 8,730,047; 8,730,875; 8,732,454; 8,738,944; 8,743,750; 8,743,768; 8,743,866; 8,747,313; 8,751,063; 8,751,644; 8,755,763; 8,756,449; 8,760,339; 8,761,175; 8,761,285; 8,762,852; 8,769,442; 8,774,050; 8,774,946; 8,780,201; 8,780,953; 8,781,462; 8,787,392; 8,787,944; 8,788,516; 8,792,850; 8,792,880; 8,797,878; 8,798,094; 8,799,220; 8,799,510; 8,800,010; 8,804,603; 8,806,633; 8,812,419; 8,817,665; 8,818,522; 8,819,172; 8,819,191; 8,823,795; 8,824,471; 8,830,837; 8,831,279; 8,831,869; 8,832,428; 8,837,277; 8,842,180; 8,842,630; 8,843,156; 8,848,970; 8,855,794; 8,855,830; 8,856,323; 8,861,390; 8,862,774; 8,867,329; 8,868,374; 8,872,379; 8,872,767; 8,872,915; 8,873,391; 8,873,526; 8,874,477; 8,874,788; 8,879,604; 8,879,613; 8,880,060; 8,885,501; 8,885,630; 8,886,227; 8,891,534; 8,891,588; 8,892,271; 8,908,516; 8,908,536; 8,908,621; 8,908,626; 8,918,480; 8,923,186; 8,923,422; 8,930,361; 8,934,366; 8,934,496; 8,937,886; 8,938,270; 8,942,301; 8,948,046; 8,948,229; 8,949,959; 8,954,582; 8,959,539; 8,964,762; 8,964,787; 8,965,288; 8,970,392; 8,970,394; 8,971,188; 8,972,159; 8,976,007; 20020039357; 20020071160; 20020083316; 20030202468; 20030202469; 20030202476; 20030202512; 20030204587; 20030204616; 20040022223; 20040022224; 20040028000; 20040028016; 20040029553; 20040042417; 20040042434; 20040057409; 20040160943; 20040174900; 20040203385; 20040203820; 20040210657; 20040218548; 20040218582; 20040219909; 20040223497; 20040223498; 20040223499; 20040223500; 20040228343; 20040264466; 20050041591; 20050053003; 20050053004; 20050053005; 20050053007; 20050053094; 20050054346; 20050141706; 20050157661; 20050254473; 20050259588; 20050259595; 20050265259; 20050276608; 20060002328; 20060007863; 20060023632; 20060030318; 20060092043; 20060095199; 20060126535; 20060167784; 20060176829; 20060227724; 20060229090; 20060251115; 20060291404; 20060291485; 20060291864; 20070038743; 20070087756; 20070087758; 20070110024; 20070153737; 20070153764; 20070214046; 20070223436; 20070229231; 20070280174; 20070286097; 20070297808; 20080040507; 20080051036; 20080051099; 20080117896; 20080130640; 20080159151; 20080159358; 20080240050; 20080247353; 20080252485; 20080262893; 20080267116; 20080273487; 20080291843; 20080310390; 20090046688; 20090061835; 20090062887; 20090086663; 20090097490; 20090185508; 20090210495; 20090215411; 20090219194; 20090228575; 20090323519; 20100014444; 20100017045; 20100097957; 20100123572; 20100124196; 20100125671; 20100152619; 20100187832; 20100235285; 20100254309; 20100317420; 20100329274; 20110004513; 20110078461; 20110080853; 20110085530; 20110187527; 20110133924; 20110204720; 20110211534; 20110228696; 20110228788; 20110231573; 20110235550; 20110267981; 20110273568; 20110314504; 20120005041; 20120039186; 20120039190; 20120113807; 20120113863; 20120113986; 20120116559; 20120117208; 20120117213; 20120117268; 20120117438; 20120134548; 20120154633; 20120155260; 20120155276; 20120155284; 20120155329; 20120155397; 20120155463; 20120155475; 20120155511; 20120158933; 20120182867; 20120188968; 20120208592; 20120210233; 20120213124; 20120224743; 20120230204; 20120230222; 20120230370; 20120233326; 20120233485; 20120242501; 20120243621; 20120254338; 20120275642; 20120277893; 20120280908; 20120282905; 20120282911; 20120284012; 20120284122; 20120284339; 20120284593; 20120307624; 20120307629; 20120307652; 20120307653; 20120307825; 20120320768; 20120320790; 20120320923; 20120324273; 20130010590; 20130010615; 20130010798; 20130013806; 20130013809; 20130016612; 20130016757; 20130016758; 20130016759; 20130018993; 20130019005; 20130022042; 20130022046; 20130022053; 20130022083; 20130022084; 20130024149; 20130024560; 20130028095; 20130028103; 20130028104; 20130028140; 20130028143; 20130028295; 20130031253; 20130045759; 20130051250; 20130055383; 20130064072; 20130067063; 20130069780; 20130080307; 20130083658; 20130086601; 20130088999; 20130089011; 20130094536; 20130094537; 20130111038; 20130121331; 20130122807; 20130124883; 20130128773; 20130151563; 20130169838; 20130177025; 20130178718; 20130183952; 20130188471; 20130188513; 20130191688; 20130201891; 20130215739; 20130215942; 20130219045; 20130219046; 20130219478; 20130223218; 20130223225; 20130223229; 20130223237; 20130223275; 20130227055; 20130227114; 20130227336; 20130250754; 20130250808; 20130250809; 20130250811; 20130250866; 20130250945; 20130250953; 20130250969; 20130251053; 20130251054; 20130259096; 20130279365; 20130279540; 20130283347; 20130283360; 20130286942; 20130290560; 20130308495; 20130310896; 20130315131; 20130336316; 20140006893; 20140016643; 20140022906; 20140029432; 20140029445; 20140029603; 20140029610; 20140029624; 20140036912; 20140036925; 20140055284; 20140064172; 20140068105; 20140081793; 20140092752; 20140092753; 20140092769; 20140092905; 20140095864; 20140105015; 20140105027; 20140105033; 20140105211; 20140108643; 20140114554; 20140114555; 20140121476; 20140122673; 20140126348; 20140126354; 20140126423; 20140126426; 20140126431; 20140126610; 20140129734; 20140129876; 20140136881; 20140195668; 20140219078; 20140219103; 20140219114; 20140219133; 20140222725; 20140222726; 20140222727; 20140222728; 20140222729; 20140222730; 20140222731; 20140222748; 20140222975; 20140222983; 20140222996; 20140222997; 20140222998; 20140223155; 20140245055; 20140247726; 20140247804; 20140269402; 20140269413; 20140269592; 20140269759; 20140273920; 20140281670; 20140286377; 20140297206; 20140302774; 20140304427; 20140307614; 20140314096; 20140320021; 20140324596; 20140324833; 20140328346; 20140330947; 20140355425; 20140357295; 20140357312; 20140369550; 20140372577; 20140372585; 20140376361; 20140376427; 20140379896; 20140379900; 20150002336; 20150003251; 20150003428; 20150016688; 20150023174; 20150023363; 20150023369; 20150026268; 20150030033; 20150043384; 20150043519; 20150055650; 20150063365; 20150071295; 20150072728, each of which is expressly incorporated herein by reference in its entirety. A much older class of wireless communication technologies comprises voice communication on narrowband analog radio channels, such as paired Walkie-Talkies and Citizens Band (CB) Radio. The set of Citizen's Band services defined by Federal Communications Commission regulations includes the Family Radio Service (FRS) and General Mobile Radio Service (GMRS) which operate at 462 and 467 MHz, Multi-Use Radio Service (MURS) which operates at 150 MHz, the original Citizens Band Radio (CB) which operates at 27 MHz and more recently at 49 MHz, Wireless Medical Telemetry Service (WTMS) at 610, 1400 and 1430 MHz, the Low Power Radio Service (LPRS) at 216-217 MHz, and the Medical Implant Communications Service (MICS) at 402 MHz which are in some cases unlicensed, or easy to obtain a license for the Multi-Use Radio Service, or MURS, is a low power, short range, unlicensed personal radio service in the 150 MHz band. MURS is intended for short-range local voice or data communications. Antenna height is limited to 20 feet above structure or 60 feet above ground, whichever is the greater. Narrow bandwidth transmissions (maximum 11.25 kHz channel bandwidth, with +/−2.5 kHz deviation) intended for voice communications are permissible on all five MURS channels. The older +/−5 kHz deviation signals (with a maximum 20 kHz channel bandwidth) are also permitted (but not required) on the two upper channels (in the 154 MHz band). The range at maximum permitted transmit power of 2 watts is 2-8 miles.
It is noted that certain restrictions on use may be different across the different channels; for example, the MURS is not permitted to communicate with the telephone network, while a licensee controlled band, generally does not have such restrictions. Therefore, the premium band may have qualitative differences in permitted use.
Typically, the highly regulated bands will be geographically licensed, and therefore the transceiver device may require a GPS receiver to determine what bands are available for use. An alternate, however, is to provide a radio frequency scan function to listen for characteristic control channel communications and geographic and/or licensing information, before any communications are sent. Typical rules for band use should not prohibit such automated scanning to determine permissible band usage within the region. A transceiver device may therefore conduct a handshake negotiation with a base station in a particular location to authorize its usage, and to the extent applicable, log usage and charge a prepaid or postpaid user account for the usage.
The wireless telephone system was of course initially developed for voice communications, but another form of communication that has become ubiquitous on SmartPhones is the exchange of brief text messages, which are sent in a “push” manner, and routed by telephone number. Another similar technology is “Instant Messaging”, which sends alphanumeric communications typically over the Internet, to a destination defined by an Internet Protocol (IP) address, or routed by identifier (username) through a central server (similar in function to a domain name server [DNS]). These are small data packets that can be transmitted at low data rates, and sent to specific recipients. This is also somewhat similar to electronic mail between computers, though email routing requires, in addition to a DNS, a sendmail server and a receivemail server. As digital data, these messages can also be encrypted before transmitting and decrypted in the receiver SmartPhone or computer.
Most of the efforts in wireless technology in recent years have focused on maintaining highly reliable voice and data communication for a large number of simultaneous users over broadband channels, in a way that is largely invisible to the user of the wireless device. A typical SmartPhone may have access to both a long-distance cellular phone network, and a WLAN such as Wi-Fi or Bluetooth, as indicated in the Prior Art shown in FIG. 4. But what happens when neither network is available? This may be the case, for example, if a user is located in a wilderness location far from cell phone towers, or during an emergency when such towers are not fully functional. While satellite phone systems are commercially available, most mobile units are incapable of taking advantage of such systems, which requires expensive and high-power devices.
There are some recent and earlier examples of prior art that address one or more of these issues. For example, see: U.S. Pub. App. Nos. 2010/0203878, 2008/0200165, 2012/0023171, 2010/0029216, 2009/0109898, U.S. Pat. Nos. 6,415,158, 8,503,934, 8,165,585, 7,127,250, 8,112,082, 7,512,094, 8,126,473, 2009/0286531, U.S. Pat. Nos. 7,400,903, 6,647,426, 8,248,947, and PCT App. Nos. WO2012/116489, WO2012/078565, each of which is expressly incorporated herein by reference. These citations deal with wireless communications systems with two available bands, which may comprise both licensed and unlicensed bands.
FRS and/or GMRS has been used for various types of data communications, for example, to communicate GPS coordinates between hand-held compatible receivers, such as various Garmin RINO® models. More generally, it is known to transmit digital data over voice channels in radio communications, though these communications are typically conducted between predetermined members of a network, and therefore typically employ in-channel signaling, i.e., a receiver listens on a single channel for both control information and communicated data. For example, the IDAS Digital radio systems (LMR, DroidCONX) employs licensed spectrum to support radio communications between computerized hosts. | {
"pile_set_name": "USPTO Backgrounds"
} |
Where do u get ur outfits from ?
I assume you’re asking about the latex, that comes from www.honour.co.uk 🖤 | {
"pile_set_name": "OpenWebText2"
} |
Simulation of long-term environmental dynamics of polychlorinated dibenzo-p-dioxins and polychlorinated dibenzofurans using the dynamic multimedia environmental fate model and its implication to the time trend analysis of dioxins.
Long term environmental fate of polychlorinated dibenzo-p-dioxins (PCDD) and polychlorinated dibenzofurans (PCDF) were studied using the fugacity-based dynamic multimedia environmental fate model. New formulation about soil wind erosion into air was included into the model. Effect of process assumption, sensitivity analysis for parameters, and tentative validation against the measured sediment core analysis was performed. Mass fluxes between compartments were estimated by the dynamic modeling. From the model estimates, major mass fluxes coming from emission source were shown to go to the soil and water through wet/dry deposition, then go to degradation mainly in the soil and sediment. Major mass fluxes of TCDD and OCDD come from the impurities in CNP (Chlornitrofen) and PCP (Pentachlorophenol) directly into the soil. Consideration about multimedia environmental dynamics using the modeled mass fluxes was shown in the discussion. | {
"pile_set_name": "PubMed Abstracts"
} |
I had about 15 albums of pictures I had taken over 50 years. I was so sick of thinking about them, my son told me to put them in the freezer. Every once and awhile I pull one out and remove some pictures and lay them out to dry. Many of them have mold around the edges but still they’re ok. The most difficult thing for me was throwing out pictures of family members that were beyond rescue including pictures of my Son William who is deceased. As a Catholic it was like throwing old Palm in the garbage. Afterwoulds I thought, maybe I should have burned them. Is it true that there is a limit to free restoration (20) pictures?
[…] All photos need to be dry and removed from picture frames and albums. Those that cannot be extracted will still be copied, but the quality may suffer. Photos that are stuck together can be separated by soaking, but should first be tested on a corner to see if the emulsion is stable enough to soak. Further instructions on care can be found on “Salvage Flood-Damaged Photos.” […]
[…] Anyone can bring up to 20 photos that were damaged from Hurricane Sandy to be evaluated and potentially restored. If a photo is repairable, the team will digitally capture and later restore, print and mail it to the owner at no cost. The original photo remains with the owner. Further instructions on photo care can be found here. […]
[…] Operation Photo Rescue (OPR) will be coming to Seaside Height, NJ on May 3-5 to help families with photos damaged by Hurricane Sandy. For instructions on the care of damage photos, please reference this Page. […] | {
"pile_set_name": "Pile-CC"
} |
Action of Fra-2: FRA-2/FOSL2 is a basic region-leucine zipper motif transcription factor that is widely expressed in mammalian tissues. The functional repertoire of this factor is unclear, partly due to a lack of knowledge of genomic sequences that are targeted. Here, we identified novel, functional FRA-2 targets across the genome through expression profile analysis in a knockdown transgenic rat. In this model, a nocturnal rhythm of pineal gland FRA-2 is suppressed by a genetically encoded, dominant negative mutant protein. Bioinformatic analysis of validated sets of FRA-2-regulated and -nonregulated genes revealed that the FRA-2 regulon is limited by genomic target selection rules that, in general, transcend core cis-sequence identity. However, one variant AP-1-related (AP-1R) sequence was common to a subset of regulated genes. The functional activity and protein binding partners of a candidate AP-1R sequence were determined for a novel FRA-2-repressed gene, Rgs4. FRA-2 protein preferentially associated with a proximal Rgs4 AP-1R sequence as demonstrated by ex vivo ChIP and in vitro EMSA analysis; moreover, transcriptional repression was blocked by mutation of the AP-1R sequence, whereas mutation of an upstream consensus AP-1 family sequence did not affect Rgs4 expression. Nocturnal changes in protein complexes at the Rgs4 AP-1R sequence are associated with FRA-2-dependent dismissal of the co-activator, CBP; this provides a mechanistic basis for Rgs4 gene repression. These studies have also provided functional insight into selective genomic targeting by FRA-2, highlighting discordance between predicted and actual targets. Future studies should address FRA-2-Rgs4 interactions in other systems, including the brain, where FRA-2 function is poorly understood. (From Davies et al 2011) cAMP control of AANAT transcription: Arylalkylamine N-acetyltransferase (AANAT) is the key regulatory enzyme controlling the daily rhythm of melatonin biosynthesis. In chicken retinal photoreceptor cells, Aanat transcription and AANAT activity are regulated in part by cAMP-dependent mechanisms. The purpose of this study was to identify regulatory elements within the chicken Aanat promoter responsible for cAMP-dependent induction. Photoreceptor-enriched retinal cell cultures were transfected with a luciferase reporter construct containing up to 4 kb of 5'-flanking region and the first exon of Aanat. Forskolin treatment stimulated luciferase activity driven by the 4 kb promoter construct and by all 5'-deletion constructs except the smallest, Aanat (-217 to +120)luc. Maximal basal and forskolin-stimulated expression levels were generated by the Aanat (-484 to +120)luc construct. This construct lacks a canonical cyclic AMP-response element (CRE), but contains two other potentially important elements in its sequence: an eight times TTATT repeat (TTATT(8) ) and a CRE-like sequence. Electrophoretic mobility shift assays, luciferase reporter assays, chromatin immunoprecipitation, and siRNA experiments provide evidence that these elements bind c-Fos, JunD, and CREB to enhance basal and forskolin-stimulated Aanat transcription. We propose that the CRE-like sequence and TTATT(8) elements in the 484 bp proximal promoter interact to mediate cAMP-dependent transcriptional regulation of Aanat. (From Haque et al 2011)3) | {
"pile_set_name": "NIH ExPorter"
} |
Introduction {#S1}
============
The importance of the biological properties of antibodies to specifically engage a target of choice and activate complement and Fc gamma receptors (FcγR) on immune cells ([@B1]) is currently more and more recognized in modern medicine. For cancer therapies using tumor targeting antibodies, strong effector functions are preferred ([@B2]). Various strategies have been exploited to generate antibodies that are more effective than wild-type human IgG1 isotype ([@B3]). These include fusions with toxic molecules and incorporations of mutations that enhance affinities to FcγR. Possible drawback of such modifications is the introduction of foreign immunogenic epitopes that can result in anti-drug antibodies that may neutralize the drug. This can be circumvented by using non-immunogenic natural variations, found in all individuals. The prototypic variation of this kind are glyco-engineered IgG1 antibodies without fucose with elevated FcγRIIIa affinities ([@B4], [@B5]), which have already found its way to therapeutic antibodies on the market ([@B6]).
This fucose residue is part of a conserved glycan on asparagine 297 in the Fc domain of immunoglobulin G (IgG). This glycan is important for the quaternary structure of the Fc part, since its removal abrogates binding of FcγR and C1q and hence the antibody's effector functions ([@B7]--[@B9]). In addition to affecting the Fc structure and thereby recognition by these effector molecules, the Fc-glycan also affects binding to FcγRIIIa and FcγRIIIb through a glycan--glycan interaction ([@B10], [@B11]). This is because of a unique glycan found in human FcγRIIIa and FcγRIIIb at position 162 that interacts directly with the Fc-glycan within the IgG-Fc cavity ([@B11]).
The N297 glycan is a bi-antennary complex glycan composed of a constant part with a core consisting of *N*-acetylglycosamines and mannoses and can be found in human serum with variable levels of core fucose, bisecting *N*-acetylglycosamine, galactose, and terminal sialic acids ([@B12]). The N-glycans of total serum/plasma IgG consists on average of high fucose levels (95%), low bisection (15%), intermediate levels of galactose (45%), and low sialic acid (10%) ([@B12]). The variable assembly of the glycans amounts to at least 20 different glycoforms (a term used here to describe one unique glycan combination) for each IgG subclass being found in serum, with \~8 of them accounting for 90% of the total abundance ([@B12]). The composition of total IgG glycosylation can change upon certain settings, where galactosylation and sialylation increase with pregnancy ([@B12], [@B13]). Changes in total IgG are also observed in various clinical settings, with a low level of galactosylation and sialylation associated both with increasing age and autoimmune diseases ([@B12]--[@B15]).
We and others have shown that IgG-Fc glycosylation changes of antigen-specific IgG can occur that correlate with disease outcome ([@B16]--[@B20]). This includes both auto- and alloimmune disorders, including fetal neonatal immune thrombocytopenia (FNAIT), immune thrombocytopenia, and hemolytic disease of the fetus and newborn (HDFN) ([@B16]--[@B18], [@B21], [@B22]). In particular, we have found that immune responses against red blood cell (RBC) and platelets, either transfused or during pregnancy, can be characterized with extremely low fucose (down to 10%), high galactose (up to 80%), and elevated sialylation levels (\~35%). Notably, lowered Fc-fucosylation ([@B17], [@B21]), but also elevated Fc-galactosylation ([@B18]), seemed to correlate with elevated blood cell destruction, severity of anemia or bleeding for RBCs and platelets, respectively. Whereas the increased pathogenicity associated with lowered fucosylation could be explained by the resulting elevated FcγRIIIa and/or FcγRIIIb activity ([@B17], [@B23]), the functional reasons---if any---behind the association with elevated galactosylation remained enigmatic.
The effect of Fc-bisection and -sialylation on human FcγR binding, if any, has been studied in even less detail, although binding to the human FcγRIIIa does not seem to be affected by sialylation ([@B24]). Whether these glycan changes influence binding to C1q, and subsequent complement activation, has not been studied in detail ([@B25], [@B26]). A drawback of all these studies is that the impact of the glycan changes was studied changing only individual end groups, without investigating the possibility that the context of the other glycan changes may have an effect on the antibody effector functions.
The complexity of the glycan-assembly makes investigation into their biological relevance extremely difficult. Previous attempts have generated a handful of defined glycoforms and tested binding to part of the FcγR-repertoire, but a systematic analysis for all possible glycan changes and effector mediators, FcγRs and complement, has never been achieved ([@B24], [@B26]--[@B30]). This information could provide the insight in working mechanisms of IgG-based treatments and allow meaningful clinical evaluation of the activity of potentially pathological antibodies such as in FNAIT and HDFN. We have, therefore, developed a set of glyco-engineering tools which specifically alter one of the N-glycan end groups ([@B31]) and in the present study we combined these tool to create 20 different natural glycoforms to systematically investigate them with regard to FcγR binding, antibody-dependent cellular cytotoxicity (ADCC), complement binding, and activation.
Materials and Methods {#S2}
=====================
Human Samples {#S2-1}
-------------
Peripheral blood from anonymous, healthy volunteers was obtained with informed, written consent in accordance with Dutch regulations. This study was approved by the Sanquin Ethical Advisory Board in accordance with the Declaration of Helsinki.
Heparinized blood samples were used for isolation of peripheral blood mononuclear cells (PBMCs) or RBCs. NK cell isolation was only performed with blood from well-genotyped donors who do not express FcγRIIc ([@B32]) to exclude any possible effects of this receptor. Serum was obtained by allowing blood without anticoagulants to coagulate for 1 h at room temperature (RT) and collecting the supernatant after centrifugation at 950 × *g* for 10 min. Serum of three different volunteers was combined to create a serum pool.
Strains and Reagents {#S2-2}
--------------------
*Escherichia coli* strain DH5α was used for recombinant DNA work. Restriction endonucleases, DNA modification enzymes were obtained from Thermo Fisher Scientific (Waltham, MA, USA). Oligonucleotides were obtained from Geneart (Thermo Fisher Scientific) or Integrated DNA Technologies (Coralville, IA, USA).
IgG1 Expression Vector Constructs {#S2-3}
---------------------------------
Variable (V) genes for anti-human RhD (anti-D clone 19A10) heavy and light chain were sequenced from a single human B cell from a hyper immunized donor ([@B33]). A single-gene vector containing anti-D or anti-TNP IgG1 heavy- and kappa light-chain-encoding sequences were cloned as described previously by Kruijsen et al. ([@B34]) into a pEE14.4 (Lonza, Basel, Switzerland) expression vector. For both anti-TNP and anti-D IgG, a single expression vector was generated. In brief, the codon-optimized V gene for both heavy and light chain, including 5′-HindIII and 3′-NheI or 5′-HindIII and 3′-XhoI restriction sites respectively, Kozak sequence, and HAVT20-leader sequence, were designed and ordered from Geneart (Thermo Fisher Scientific). The HindIII-NheI or HindIII-XhoI fragments for the codon-optimized heavy or light chain were ligated into γ or κ constant region flanking 3′-EcoRI restriction site, respectively. The HindIII--EcoRI fragment for the codon-optimized light chain was ligated into pEE14.4 (Lonza), and the HindIII--EcoRI fragment for the heavy chain was ligated into pEE6.4 (Lonza). A single-gene vector encoding IgG1 was subsequently generated by ligation of the BamHI--NotI fragment from pEE6.4 (including a cytomegalovirus promoter), IgG1 heavy chain, and poly (A) into the light-chain-encoding pEE14.4 vector.
IgG1 Production and Glyco-Engineering {#S2-4}
-------------------------------------
IgG1 production in human embryonic kidney (HEK) F cells and purification using protein A affinity chromatography was performed as described previously by Kruijssen et al. ([@B34]) Glyco-engineering of IgG1 was optimized as described by Dekkers et al. ([@B31]) In short, to decrease either fucosylation or galactosylation, 0.4 mM 2-deoxy-2-fluoro-[l]{.smallcaps}-fucose (2FF) (Carbosynth, Berkshire, United Kingdom) or 1 mM 2-deoxy-2-fluoro-[d]{.smallcaps}-galactose (2FG) (Carbosynth), respectively, was added to the cell suspension 4 h post transfection. To increase bisecting GlcNAc, 1% pEE6.4 + GNTIII encoding mannosyl (beta-1,4-)-glycoprotein beta-1,4-*N*-acetylglucosaminyltransferase (GNTIII) enzyme was co-transfected with 99% IgG1-κ HC + LC vector. To increase galactose, 1% pEE6.4 + B4GALT1 encoding β-1,4-galactosyltransferase 1 (B4GALT1) enzyme was co-transfected with 99% IgG1 vector and 5 mM [d]{.smallcaps}-galactose (Sigma Aldrich, Saint Louis, MO, USA) was added to the cell suspension 1 h before transfection. To increase sialylation, the level of galactosylation must also be elevated as sialic acid is the terminal sugar group with galactose residues as substrate. Thus, 1% pEE6.4 + B4GALT1 and 2.5% pEE14.4 + STGALT encoding β-galactoside alpha-2,6-sialyltransferase 1 (ST6GALT) were both co-transfected 96.5% IgG1 vector and 5 mM [d]{.smallcaps}-galactose was added to the cell suspension 1 h before transfection. To further increase sialylation, *in vitro* sialylation (ivs) was performed on the purified *in vivo* sialylated IgG created using the previous method. Recombinant human α-2,6-sialyltransferase (Roche, Basel, Switzerland) and cytidine-5′-monophospho-*N*-acetylneuraminic acid (CMP-NANA) (Roche) were incubated at 37°C for 24 h with purified IgG1 with already *in vivo* enhanced galactose and sialic acid (as described above), after incubation samples were re-purified with protein A, as described previously ([@B31], [@B34]).
Mass Spectrometry Analysis {#S2-5}
--------------------------
Immunoglobulin G-Fc glycan composition of produced IgG1 was determined by mass spectrometry as described previously by Dekkers et al. ([@B31]) Trypsin-digested glycopeptide samples were analyzed by nanoLC--ESI--QTOF--MS. The separation was performed on an RSLCnano Ultimate 3000 system (Thermofisher, Breda, the Netherlands) with a gradient pump, loading pump and an autosampler. 250 nl of sample was injected and washed on a Dionex Acclaim PepMap100 C18 trap column (5 mm × 300 µm i.d.; Thermofisher) for 1 min with 0.1% TFA at a flow rate of 25 µl/min. The sample was then separated on an Ascentis Express C18 nanoLC analytic column (50 mm × 75 µm i.d.; 2.7-µm fused core particles; Supelco, Bellefonte, PA) with a flow rate of 0.9 µl/min using linear gradient as described in Ref ([@B30]). The resulting co-elution of the different glycoforms of the IgG1-Fc glycosylation site warrants fair comparison by ensuring identical ionization conditions for the various glycopeptide species. The LC was coupled to the MS detector *via* a CaptiveSpray source with a NanoBooster (Bruker Daltonics, Bremen, Germany). The latter enriched the N~2~ flow (3 l/min) with CH~3~CN (pressure 0.2 bar), resulting in increased sensitivity. The samples were ionized in positive ion mode at 1,100 V. The Maxis Impact quadrupole-TOF--MS (micrOTOF-Q, Bruker Daltonics) was used as detector. MS1 spectra were collected at a frequency of 1 Hz with a scan range of *m/z* 550--1,800. The mass spectrometric data were calibrated internally in DataAnalysis 4.0 (Bruker Daltonics) using a list of known IgG glycopeptide masses. MSConvert (Proteowizard 3.0) ([@B35]) was used to convert the data files to mzXML format, and an in-house alignment tool ([@B36]) was used to align the retention times of the data files. The highest intensity of selected peaks (within an *m/z* window of ±0.2 and within a time window of ±15 s surrounding the retention time) was extracted using the in-house developed 3D Max Xtractor software tool. If above a signal:background ratio of 3, the background-subtracted area of the first three isotopic peaks of each glycopeptide in both 2+, 3+, and 4+ charge state were summed, and this summed value was then divided by the total summed value of all IgG1 glycopeptides to arrive at a percentage for each glycopeptide. From these percentages, we calculated several derived traits using the following formulas: fucosylation (H3N3F1 + H4N3F1 + H5N3F1 + H6N3F1 + G0F + G1F + G2F + H6N4F1 + G0FN + G1FN + G2FN + H6N5F1 + H4N3F1S1 + H5N3F1S1 + H6N3F1S1 + G1FS + G2FS + H6N4F1S1 + G2FS2 + G1FNS + G2FNS + H6N5F1S1 + G2FNS2), bisection (H6N4F1 + G0FN + G1FN + G2FN + H6N5F1 + H6N4F1S1 + G1FNS + G2FNS + H6N5F1S1 + G2FNS2 + H6N4 + G0N + G1N + G2N + H6N5 + H6N4S1 + G1NS + G2NS + H6N5S1 + G2NS2), galactosylation \[(H4N3F1 + H5N3F1 + G1F + H6N4F1 + G1FN + H6N5F1 + H4N3F1S1 + H5N3F1S1 + H6N3F1S1 + G1FS + H6N4F1S1 + G1FNS + H6N5F1S1 + H4N3 + H5N3 + H6N3 + G1 + H6N4 + G1N + H6N5 + H4N3S1 + H5N3S1 + H6N3S1 + G1S + H6N4S1 + G1NS + H6N5S1) \* 0.5 + G2F + G2FN + G2FS + G2FS2 + G2FNS + G2FNS2 + G2 + G2N + G2S + G2S2 + G2NS + G2NS2\], sialylation \[(H4N3F1S1 + H5N3F1S1 + H6N3F1S1 + G1FS + G2FS + H6N4F1S1 + G1FNS + G2FNS + H6N5F1S1 + H4N3S1 + H5N3S1 + H6N3S1 + G1S + G2S + H6N4S1 + G1NS + G2NS + H6N5S1) \* 0.5 + G2FS2 + G2FNS2 + G2S2 + G2NS2\], hybrid-types (H5N3F1 + H6N3F1 + H6N4F1 + H6N5F1 + H5N3F1S1 + H6N3F1S1 + H6N4F1S1 + H6N5F1S1 + H5N3 + H6N3 + H6N4 + H6N5 + H5N3S1 + H6N3S1 + H6N4S1 + H6N5S1), and high-mannose (H5N2 + H6N2 + H7N2 + H8N2 + H9N2). For some of the minor hybrid-type glycans, it could not be determined conclusively whether a galactose or a bisecting *N*-acetylglucosamine was present, so an educated guess was made based on structural knowledge (for instance, since the hybrid glycan H6N4F1 is elevated in GNTIII-co-transfected HEK cell-derived IgG samples, it is likely to be a bisected species rather than triantennary).
High-Performance Liquid Chromatography (HPLC) {#S2-6}
---------------------------------------------
Protein A purified IgG was analyzed for monomeric and dimeric IgG on a Superdex 200 10/300 gel filtration column (30 cm, 24 ml, 17-15175-01, GE Healthcare, Little Chalfont, United Kingdom) connected to an Äkta explorer (GE Healthcare) HPLC system at RT with a flow rate of 0.5 ml/min and PBS as running buffer. Elution profiles were obtained by recording the absorbance at 215 nm.
Human FcγR Constructs {#S2-7}
---------------------
Human FcγR constructs \[FcγRIa (HIS tag), FcγRIIa (131His, Biotinylated, and 131Arg, Biotinylated), FcγRIIb (Biotinylated), FcγRIIIa (158Phe, Biotinylated, and 158Val, Biotinylated) and FcγRIIIb (NA2, HIS tag)\] for surface plasmon resonance (SPR) analysis were obtained from Sino biological (Beijing, China). To further include all human FcγRs, a fusion Fc--FcγR construct composed of the extracellular domain of the FcγRIIIb in both allotypes followed by a Fc domain was created. To create the fusion Fc--FcγRIIIb constructs the amino acid code of the extracellular domain of either FcγRIIIb of NA1 allotype or FcγRIIIb NA2 allotype ([@B37]) (NCBI reference sequence NP_000561.3), and IgG2 Fc domain, composed of a human IgA1a hinge, human IgG2 Fc CH2 and CH3 domains including mutations deleting the Fc-glycan (N297A) and introducing a C-terminal biotinylation tag (BirA) were reverse translated and codon optimized at Geneart. DNA was ordered (Integrated DNA technologies, Coralville, IA, USA) and cloned into pcDNA3.1 (Invitrogen, Carlsbad, CA, USA) expression vector using flanking HindIII and EcoRV restriction sites. A model of the construct and sequences are displayed in Figures S7A,B in Supplementary Material. The construct was produced and purified as described previously ([@B31]). After purification the protein was site-specifically biotinylated on the BirA tag using BirA enzyme as described by Rodenko et al. ([@B38]). For biotinylation of 1 µM FcγR protein 0.00657 µM BirA ligase was used. After biotinylation overnight at 25°C, the FcγR sample was buffer-exchanged and subsequently concentrated in PBS pH 7.4 using Amicon Ultra centrifugal filter units (MWCO 30 kDa) (Merck, Millipore, Darmstadt, Germany). The quality of the Fc-Fusion receptors was confirmed by comparing the binding of normally glycosylated IgG1 to the acquired his-tagged receptor (Sino-biological) and in-house made Fc-Fusion of the same allotype (NA2) (Figures S7C,D in Supplementary Material).
Surface Plasmon Resonance {#S2-8}
-------------------------
Surface plasmon resonance measurement were performed as described by Dekkers et al. ([@B39]). All biotinylated FcγR were spotted using a Continuous Flow Microspotter (Wasatch Microfluidics, Salt Lake City, UT, USA) onto a single SensEye G-streptavidin sensor (Ssens, Enschede, Netherlands) allowing for binding affinity measurements of each antibody to all FcγR simultaneously on the IBIS MX96 (IBIS Technologies, Enschede, Netherlands) as described by de Lau et al. ([@B40]). The biotinylated FcγRs were spotted in threefold dilutions, ranging from 100 to 3 nM for FcγRIIb and fusion FcγRIIIb-IgG2-Fc. All the other FcγRs were spotted in threefold dilutions, ranging from 30 to 1 nM in PBS 0.0075% Tween-80 (Amresco), pH 7.4. The IgGs were then injected over the IBIS at 1.5 dilution series starting at 5.9 nM until 506.25 nM or 0.9 nM until 2,000 nM, when necessary, in PBS in 0.075% Tween-80. For FcγRI affinity and FcγRIIIb control measurements, his-tagged FcγRI or FcγRIIIb was used. Biotinylated anti-His-tagged antibody (Genscript Piscataway, NJ, USA) was spotted in threefold dilutions, ranging from 30 to 1 nM. Before every IgG injection, 50 nM his-tagged FcγR was injected. The IgGs were then injected over the IBIS at threefold dilution series starting at 0.41 nM until 100 nM for FcγRI and 94 nM until 3,000 nM for FcγRIIIb. Regeneration after every sample was carried out with acid buffer (10 mM Gly--HCl, pH 2.4). Calculation of the dissociation constant (*K*~D~) was done using an equilibrium analysis by linear intrapolation to Rmax = 500 ([@B41]). Analysis and calculation of all binding data were carried out with Scrubber software version 2 (Biologic Software, Campbell, ACT, Australia) and Microsoft Office Excel 2013.
NK Cell-Mediated ADCC {#S2-9}
---------------------
NK cells were isolated from Ficoll-Plaque™-Plus (GE Healthcare) gradient obtained PBMCs by a CD56 magnetic-activated cell separation isolation kit (Miltenyi Biotec, Leiden, The Netherlands), according to manufacturer's description. D + RBCs were isolated and labeled with radioactive chromium (100 μCi ^51^Cr, PerkinElmer, Waltham, MA, USA) at 10^9^ cells/ml. An amount of 10^5^ erythrocytes were incubated with NK cells for 2 h at 37°C in a 2:1 ratio in Iscove's modified dulbecco's medium (IMDM, Gibco, Thermo Fisher Scientific) supplemented with 10% fetal calf serum (FCS, Bodinco, Alkmaar, The Netherlands) and anti-D IgG1-glycoforms at a total volume of 100 µl. To determine 100% lysis, 2.5% saponine (Fluka, Sigma Aldrich) was added to RBC in control wells and spontaneous lysis (sp) was determined by incubation of RBC without NK cells. Supernatants were collected and released ^51^Cr was quantified in a Packard Cobra II Auto-Gamma Counter Model D5005 (PerkinElmer). Percentage cytotoxicity was determined by the following formula: $\text{ADCC}\left( \% \right) = \frac{\text{counts sample} - \text{counts sp}}{\text{counts 100\%} - \text{counts sp}} \times 100$, each value consisted of at least three individual sample wells.
Complement Deposition ELISA {#S2-10}
---------------------------
A 2.4-mM 2,4,6-trinitrobenzenesulfonic acid (TNBS) (Sigma-Aldrich) solution was added to 20 mg human serum albumin (HSA) diluted to 20 mg/ml (Sanquin, Amsterdam, The Netherlands) in 0.2 M NA~2~HPO~4~ (Merck, Millipore) and incubated 30 min at RT. To remove unbound TNBS, the solution was dialyzed (1:2,000) using a dialysis cassette (Thermo Fisher Scientific Slide-A-Lyzer G2 cassette, 10K MWCO) for 1.5 h at RT against PBS and additionally overnight at 4°C to obtain HSA-TNP.
To coat, maxisorp plates (Thermo Scientific, Nunc flat-bottom 96-well plate) were incubated o/n at RT with 20 µg/ml HSA-TNP in PBS. The plates were washed 5× with PBS + 0.1% tween-20 (Sigma-Aldrich) (wash buffer) using an ELISA washer (Biotek, 405 LSRS). All following washing steps were done similarly. The IgG samples were diluted in 100 µl PBS/plx \[PBS + 0.1% poloxamer (Sigma-Aldrich, poloxamer 407)\] per well and incubated for 1.5 h at RT. The plates were washed and incubated with 100 µl 1:35 serum pool in VB^+/+^/plx {veronalbuffer \[3 mM Barbital (Sigma-Aldrich), 1.8 mM Sodium-Barbital (Sigma Aldrich), 0.146 M NaCl (Fagron, Capelle aan den Ijssel, The Netherlands), pH 7.4\] + 10 mM CaCl~2~ (Merck) + 2 mM MgCl~2~ (Merck) + 0.1% poloxamer} for 1 h at RT. When C1q was blocked, 10 min prior to addition of serum to the ELISA plate, anti-C1q-85 blocking antibody ([@B42]) was added to the VB^+/+^/plx + 1:35 serum solution in a 1:2 molar ratio of C1q:anti-C1q-85 with final concentration of 8.57 µg/ml anti-C1q-85. The plates were washed and 100 µl with either 2 µg/ml biotinylated anti-C1q-2 ([@B42]), 0.5 µg/ml biotinylated anti-C4-10 ([@B43]), 0.6 µg/ml biotinylated anti-C3-19 ([@B44]), or 1 µg/ml HRP labeled anti-human IgG (Sanquin, Peliclass) in PBS/plx was added to respectively detect C1q, C4b, C3b, or IgG deposition and incubated for 1 h at RT. The plates were washed, C1q, C4b, and C3 plates were incubated with 100 µl 0.2 µg/ml strep-poly HRP (Sanquin, Peliclass) (C1q) or 0.25 µg/ml strep-HRP (Sigma-Aldrich) (C4b and C3b) in PBS/plx for 1 h at RT. The plates were washed and developed for 5--10 min using 100 µl TMB mix composed of 0.11 M NaAc (pH 5.5) (Merck), 0.1 mg/ml 3,3′,5,5′-Tetramethylbenzidine (Merck) and 0.003% H~2~O~2~ (Merck) and the reaction was stopped with the addition of 100 µl 2 M H~2~SO~4~ (Merck). The optical density (OD) was measured at A450 nm using a plate reader (Biotek, Synergy 2, Winooski, VT, USA).
The results were analyzed with a parallel line assay in Microsoft Office Excel ([@B45]). We assessed the potency of the glycoforms relative to a standard, an independently titrated unmodified IgG1; these values were expressed as percentages relative to the unmodified glycoform.
Complement-Mediated Lysis {#S2-11}
-------------------------
Fifty microliters of washed, packed, D^+^ RBCs obtained from heparinized blood were mixed with 350 µl 0.313 mM TNBS in 0.15 M Na~2~HPO~4~, pH 8.8 and incubated for 10 min at RT. TNPylated RBCs were centrifuged for 2 min at 350 × *g* and washed two times with PBS. RBC were resuspended into VBG^+/+^ \[VB^+/+^ + 0.05% w/v gelatin (Sigma-Aldrich)\]. Anti-TNP IgG1 was serially diluted in VBG^−/−^ (3 mM Barbital, 1.8 mM Sodium-Barbital, 0.146 M NaCl, pH 7.4, 0.05% w/v gelatin). In round bottom plates to a final volume of 100 µl we combined the diluted IgG1, 10% serum, \~4.5 × 10^6^ RBC, and a glass bead (2 mm, Merck) to ensure mixing of the solution during incubation (1:1 final ratio VBG^−/−^:VBG^+/+^). This amount of RBC was taken to ensure the 100% absorbance between 1.8 and 2.2 delta (Δ) A412--A690 nm. The plates were incubated for 90 min at 37°C while shaking at 150 rpm (Orbital incubator S150, 16 mm shaking diameter). After incubation, 1.25% w/v saponine was supplemented to the 100% control wells, 100 µl VBG^−/−^ was added to all wells and the plates were centrifuged for 2 min at 350 × *g*. Subsequently, 150 µl of supernatant was transferred into a separate plate and OD was measured at Δ A412--A690 nm using a plate reader. The percentage of lysed cells was calculated as follows: $\text{Lysis}\left( \% \right) = \frac{\text{OD sample-OD spontaneous}}{\text{OD 100-OD spontaneous}} \times 100$. In GraphPad Prism, we calculated the half maximal effective concentration (EC~50~) for each replicate of the different glycoforms using a non-linear fit for normalized response with a variable slope and combined these to an average EC~50~.
Statistical Analysis {#S2-12}
--------------------
Statistical analyses were performed using GraphPad Prism version 6.00 for Windows (GraphPad Software, La Jolla, CA, USA). The level of significance was set at *p* \< 0.05 using two-tailed tests.
Results {#S3}
=======
Recapitulation of All 20 Major Different Glycoforms Found in Human Plasma {#S3-1}
-------------------------------------------------------------------------
Human IgG1, produced in HEK cells, shows complex-type bi-antennary glycans similar to IgG from normal human plasma (Figure [1](#F1){ref-type="fig"}A) ([@B31], [@B46]). More specifically, without any modification ("Unmodified," box labeled "U" in the *x*-axis legend, Figures [1](#F1){ref-type="fig"}B--E) HEK-derived IgG1 N-glycans feature high fucosylation, low bisection, intermediate-level galactosylation, and low sialylation (Figures [1](#F1){ref-type="fig"}B--E). We previously developed six glyco-engineering tools which can be implemented upon protein production, as we recently described ([@B31]). These were aimed to decrease fucosylation, increase bisection, decrease or increase galactosylation, or increase sialylation. In the present study, these tools were combined and used in all possible combinations during the transient transfection in HEK cells, which resulted in the anticipated glycosylation changes and allowed us to produce the 20 major glycoforms present in human serum. Only minor unanticipated effects (Figures [1](#F1){ref-type="fig"}B--E), were observed. A slight increase in galactosylation upon overexpression of beta 1,4-*N*-acetylglucosaminyltransferase III (GntIII) to increase bisection (e.g., 28 to 36% upon GntIII expression)---but this was only observed in samples with low starting-levels of galactosylation (Figures [1](#F1){ref-type="fig"}C,D). Some of the tools caused a minor increase (\<21%) in high-mannose or hybrid glycan species (Figure S1 and Table S1 in Supplementary Material) ([@B31]). Using the glyco-engineering tools the most extreme levels were reached for fucose and galactose (Figures [1](#F1){ref-type="fig"}B,D), bisection was increased up to 60%, and sialylation never reached over half of what was possible by the underlying galactose (\~40%). The level of sialylation was, therefore, further increased using *in vitro* sialylation as described before (up to \~70%) (Figure [1](#F1){ref-type="fig"}E; Table [1](#T1){ref-type="table"}) ([@B31], [@B47], [@B48]). All in all, this resulted in 20 combinations and markedly different glycoforms. All 20 glycoforms were produced as two panels of IgG1, specific for the RhD (anti-D) antigen or 2,4,6-trinitrophenyl hapten (anti-TNP) ([@B34]), with both panels showing highly comparable glycosylation patterns depending of the glyco-engineering tools applied (Table [1](#T1){ref-type="table"}; Table S1 in Supplementary Material). To avoid any possible confounding effects of Fab glycosylation on IgG function, we used anti-D and anti-TNP with variable domains sequences devoid of N-linked glycosylation sites.
![Recapitulation of 20 different immunoglobulin G (IgG) glycoforms by glyco-engineering. **(A)** Model of IgG with glycan at position N297 in the Fc domain and composition of the glycan. **(B--E)** Degree of derived glycan traits as reached by the different glyco-engineering tools: 2FF, 0.4 mM 2-deoxy-fluoro-[l]{.smallcaps}-fucose; GntIII, 1% GntIII co-transfection; 2FG, 1 mM 2-deoxy-fluoro-[d]{.smallcaps}-galactose; B4galT1/Dgal, 1% B4GALT1 co-transfection and 5 mM [d]{.smallcaps}-galactose; ST6GALT, 2.5% ST6GALT co-transfection, *in vitro* sial, treatment of IgG with recombinant ST6GALT and CMP-NANA substrate. The data represent the mean and SEM of at least two combined independent experiments; \*, \*\*, \*\*\*, and \*\*\*\* denote a statistical significance of *p* ≤ 0.05, *p* ≤ 0.01, *p* ≤ 0.001, and *p* ≤ 0.0001, respectively, as tested by one-way ANOVA against unmodified IgG1, using Dunnett's multiple comparisons test. U: unmodified glycoform.](fimmu-08-00877-g001){#F1}
######
Comprehensive list of glycopeptide degrees of complex glycans found in the glyco-engineered IgG1 batches of anti-D and anti-TNP specificity.
------------------------------
![](fimmu-08-00877-t001.jpg)
------------------------------
*2FF, 0.4 mM 2-deoxy-2-fluoro-[l]{.smallcaps}-fucose; 2FG, 1 mM 2-deoxy-2-fluoro-[d]{.smallcaps}-galactose; GNT3, co-transfection of 1% GNT3 vector; B4GALT1/[d]{.smallcaps}-galactose, co-transfection of 1% B4GALT1 vector and addition of 5 mM [d]{.smallcaps}-galactose; ST6GALT, co-transfection of 2.5% ST6GALT vector; *in vitro* sialylation, treatment of sample with recombinant ST6GALT and CMP-NANA; G, number of galactoses; F, presence of a core fucose; N, presence of a bisecting N-acetylglucosamine; S, number of *N*-acetylneuraminic (sialic) acids*.
*These resulted in significantly different derived glycosylation traits (fucosylation, bisection, galactosylation, sialylation, high-mannose, hybrid-type), which are calculated from the relative abundances of individual *N*-glycans*.
*The shading of cells indicates, for each glycoform the lowest to highest abundance of glycopeptides, respectively, from light to dark*.
*^a^For complex immunoglobulin G glycans, we use a nomenclature which assumes structural knowledge of the glycans based on literature*.
Binding of IgG Glycome to Human FcγR {#S3-2}
------------------------------------
We next used the IBIS MX96 biosensor system, as described in Dekkers et al. ([@B39]), capable of analyzing the binding of up to 48 different receptor ligand interactions in parallel by SPR, to probe the affinity of all IgG1-glycoforms to all human FcγRs and their allotypes affecting IgG binding (Table S2 in Supplementary Material) ([@B49]). The antibodies used for these experiments (anti-D) showed no signs of dimers or multimers (Figure S2 in Supplementary Material). The binding affinities of unmodified IgG1 to the different receptors resembled those reported earlier (Table [2](#T2){ref-type="table"}) ([@B49]). We considered significant changes in the apparent *K*~D~ of more than twofold from unmodified IgG to be potentially meaningful changes and within the scope of the SPR method, using a simplified 1:1 Langmuir model that does not fully represent the actual interaction which is more complicated ([@B39]). No significant effects of glycan changes above twofold were seen on the binding to FcγRIa, FcγRIIa (neither the H131- or the R131-allotype), or FcγRIIb/c (Figures [2](#F2){ref-type="fig"}A--D). However, marked changes were seen for all FcγRIII-isoforms. Reduction of fucose resulted in enhanced binding to all FcγRIII species by approximately 10- to 20-fold depending on the type- and allotype (Figures [2](#F2){ref-type="fig"}E--H), as reported ([@B4], [@B5]). Importantly, addition of galactose consistently enhanced binding of hypo-fucosylated IgG1 for all FcγRIIIa allotypes, doubling the effect of hypo-fucosylation alone (Figures [2](#F2){ref-type="fig"}E,F). This effect was also seen for allotypes of FcγRIIIb, but less strong and only for IgG1 that was bisected in addition to hypo-fucosylated (Figures [2](#F2){ref-type="fig"}G,H). Further sialylation of low-fucosylated galactosylated IgG1 had little additional effect on the binding to FcγRIII, except for hypo-fucosylated and bisected IgG1 for both allotypes of FcγRIIIa and FcγRIIIb NA2, where sialylation cause a significant decrease in binding. Taken together, glycan changes in the IgG-Fc only affect binding to FcγRIIIa and FcγRIIIb, with a major effect of hypo-fucosylation increasing binding to FcγRIIIa/b that was boosted by galactosylation. Bisection only appeared to indirectly affect binding when occurring in conjunction with sialylation, causing a slight decreased binding to FcγRIIIa/b to otherwise hypo-fucosylated and galactosylated IgG.
######
Affinity of unmodified IgG1 (U) to the different FcγRs.
Mean affinity SEM
---------------- --------------- ----------------
FcγRI 3.0 × 10^−9^ ±8.7 × 10^−10^
FcγRIIa^131H^ 3.8 × 10^−7^ ±1.3 × 10^−8^
FcγRIIa^131R^ 4.8 × 10^−7^ ±2.8 × 10^−8^
FcγRIIb 2.7 × 10^−6^ ±1.1 × 10^−7^
FcγRIIIa^158F^ 1.3 × 10^−6^ ±9.5 × 10^−8^
FcγRIIIa^158V^ 2.4 × 10^−7^ ±1.0 × 10^−8^
FcγRIIIb NA1 3.2 × 10^−6^ ±4.7 × 10^−7^
FcγRIIIb NA2 2.8 × 10^−6^ ±1.0 × 10^−7^
*Affinity in K~D~, as measured by SPR*.
![Binding of immunoglobulin G (IgG) glycoforms to human FcγR. Binding of IgG glycoforms to the human FcγR family as determined by surface plasmon resonance, displayed as relative binding compared to unmodified IgG1 (U), **(A)** FcγRI, **(B)** FcγRIIa 131H, **(C)** FcγRIIa 131R, **(D)** FcγRIIb/c, **(E)** FcγRIIIa V158, **(F)** FcγRIIIa F158, **(G)** FcγRIIIb NA1, and **(H)** FcγRIIIb NA2. *x*-Axis legend describes the percentage of each derived glycan trait indicated and by grayscale, from light to dark. The data represent the mean and SEM of at least two combined independent experiments; \*, \*\*, \*\*\*, and \*\*\*\* (above each column as tested against unmodified, or as indicated, for FcγRIIIs comparing each set of five glycoforms defined by the vertical dotted lines, based on fucose and bisection levels) denote a statistical significance of *p* ≤ 0.05, *p* ≤ 0.01, *p* ≤ 0.001, and *p* ≤ 0.0001, respectively, as tested by one-way ANOVA using Tukey's multiple comparisons test. U: unmodified glycoform.](fimmu-08-00877-g002){#F2}
FcγRIIIa-Mediated ADCC Is Steered by Fucosylation and Galactosylation {#S3-3}
---------------------------------------------------------------------
We next tested the efficacy of these anti-D IgG1 antibodies to mediate ADCC against RBC. Curiously, no NK cell-mediated induction of ADCC was seen with any fucosylated IgG1 at any concentration tested (Figures [3](#F3){ref-type="fig"}A,B; Figure S3 in Supplementary Material). Only hypo-fucosylated IgG1 induced ADCC in variable degrees depending on the glycosylation (Figures [3](#F3){ref-type="fig"}A,B). The observed level of ADCC were in line with the binding results obtained by SPR for each of the FcγRIIIa allotypes (Figure [3](#F3){ref-type="fig"}C), confirming the essential role of both hypo-fucosylation and elevated galactosylation for increased FcγRIIIa-binding and effector functions. Again, sialic acid had a minor but significant negative effect, especially for the bisected, hypo-fucosylated, and galactosylated IgG1 (Figures [3](#F3){ref-type="fig"}A,B). Remarkably, the well-known allotypic differences in affinity were confirmed by our SPR experiments, but not by the functional NK cell-mediated ADCC.
![NK cell-mediated antibody-dependent cellular cytotoxicity (ADCC) of anti-D glycoform opsonized red blood cell. ADCC mediated by NK cells from monozygotic FcγRIIIA^158F/F^ donors **(A)**, or monozygotic FcγRIIIA^158V/V^ donors **(B)**, data represent the mean and SEM of four combined independent experiments; \*, \*\*, \*\*\*, and \*\*\*\* denote a statistical significance of *p* ≤ 0.05, *p* ≤ 0.01, *p* ≤ 0.001, and *p* ≤ 0.0001, respectively, as tested by one-way ANOVA using Tukey's multiple comparisons test. *x*-Axis legend describes the percentage of each derived glycan trait indicated and by grayscale, from light to dark. **(C)** Correlation between *K*~A~ of FcγRIIIa F158 or FcγRIIIa V158 binding of hypo-fucosylated glycoforms and ADCC activity of FcγRIIIA^158F/F^ or FcγRIIIA^158V/V^ donors, respectively. *r*^2^ and *p* value shown where obtained using a two-tailed Pearson's correlation. U: unmodified glycoform.](fimmu-08-00877-g003){#F3}
Galactosylation and Sialylation Direct Complement Binding and Activation {#S3-4}
------------------------------------------------------------------------
We then tested the effect of IgG-Fc glycosylation on C1q binding and subsequent complement activation, using the anti-TNP panel of IgG1 antibodies as anti-D does not fix complement. The efficiency of C1q binding to TNP-lated human serum albumin (TNP-HSA) and subsequent C4b deposition was titrated by serial dilution (Figure S4 in Supplementary Material). All glycovariants of anti-TNP bound TNP-HSA equally well (Figure S4A in Supplementary Material), but C1q binding and C4b deposition differed profoundly for the different glycoforms (Figure S4B in Supplementary Material). The relative C1q binding and C4b deposition were then calculated (Figures [4](#F4){ref-type="fig"}A,B, respectively). Both data sets suggested that elevated galactosylation and sialylation positively influenced complement activity. This activity was fully depended on the classical pathway with no influence of the mannan-binding lectin- or the alternative pathway, as C4b and C3b deposition, were completely blocked by an anti-C1q blocking antibody (Figure S5 in Supplementary Material). We then determined if this also translates into more efficient complement-dependent cytotoxicity (CDC) by analyzing complement-dependent lysis of TNP-labeled RBC (Figure [4](#F4){ref-type="fig"}C; Figure S6 in Supplementary Material). The level of C1q binding of each glycoform correlated well with the C4b deposition (Figure [5](#F5){ref-type="fig"}A) and with the obtained EC~50~ of CDC (Figure [5](#F5){ref-type="fig"}B). The level of galactosylation of each glycoform also showed a direct relationship with the efficacy of C1q binding, and EC~50~ (Figures [5](#F5){ref-type="fig"}C,D). In conclusion, the degree of galactosylation, but also sialylation of the IgG1-Fc N-glycan directly steers the antibody's efficacy to stimulate complement deposition and CDC.
![Complement activation by glyco-engineered anti-TNP IgG1. Relative **(A)** binding of C1q (*n* = 4) and **(B)** C4 deposition as determined by ELISA (*n* = 4), **(C)** complement-mediated lysis of aTNP opsonized red blood cells (*n* = 3). Data represent the mean and SEM of combined independent experiments; \*denotes a statistical significance of *p* ≤ 0.05, as tested by a one-sample *t*-test against a theoretical mean of 100 (%). *x*-Axis legend describes the percentage of each derived glycan trait indicated and by grayscale, from light to dark. U: unmodified glycoform.](fimmu-08-00877-g004){#F4}
![Correlations between complement activation and galactosylation. Correlation between **(A)** galactosylation and C1q binding, **(B)** C1q binding and C4 deposition, **(C)** C4 deposition and complement-mediated red blood cell lysis, and **(D)** galactosylation and lysis, statistically tested using a two-tailed Pearson's correlation.](fimmu-08-00877-g005){#F5}
Discussion {#S4}
==========
We have previously created an orthogonal set of glyco-engineering tools ([@B31]) which we now combined to create 20 glycovariants of human IgG1, representing natural variants found in human plasma IgG, including extreme glycoforms found for examples in patients with FNAIT and HDFN ([@B17], [@B18], [@B21], [@B22]). These variants were investigated for their functional capacity to engage and activate FcγR and complement.
Of the FcγRs, we only observed an effect of glycosylation on binding to the FcγRIII-family of receptors, both FcγRIIIa and FcγRIIIb and their allotypes, which confirms and expands recent studies using a limited set of glycovariants presented here ([@B24], [@B30]). Increased FcγRIII binding seems to be a general phenomenon for all IgG subclasses upon afucosylation ([@B50], [@B51]). The positive binding effects were primarily caused by the lack of fucose, which was further strengthened by additional galactose. A similar effect has been observed for neutralizing anti-HIV antibody 2G12 produced in modified plant cells which showed better FcγRIIIa binding and antibody-dependent (NK) cell-mediated viral inhibition ([@B52]).
The enhanced binding of galactosylated and afucosylated IgG was slightly weakened by addition of sialic acid, but only if a bisecting GlcNAc was present. A similar negative effect of sialylation has previously been observed for mouse FcγR by Ravetch and colleagues ([@B53]). Importantly, we showed that the enhanced FcγRIII-binding effects are directly translated into increased FcγR-mediated cellular functions. We tested this using NK cell-mediated ADCC, as NK cells are the only cell type that only express FcγRIIIa. Curiously, we observed no ADCC at all for fucosylated IgG, even at high concentrations of IgG1. Thus, ADCC activity was only observed with afucosylated IgG1. Although somewhat surprising, this phenomenon has been observed previously for anti-Rhesus-mediated ADCC ([@B54]), but also for Rituximab-mediated B cell killing ([@B27]). This suggests that the enhanced affinity afucosylation of IgG has on FcγRIIIa binding is required to cross a signaling threshold of FcγRIIIa on NK cells required for killing.
The second surprise was that no significant difference was observed between ADCC-capacity of NK cells from donors homozygous for one of the two FcγRIIIa-V/F158 allotypes, of which the V158 allele is known to have higher affinity for IgG (also confirmed here to be \~2--5×) ([@B49]). *In vitro*, this has been found result in stronger functional efficacy for the V158-variant ([@B55]--[@B57]). *In vivo*, conflicting reports have showed that individuals homozygous either the V158 or the F158 allotype show stronger cellular clearance ([@B58]--[@B61]). It should be noted that most of these studies were performed before the knowledge of FcγRIII gene being influenced by copy number variation ([@B61]). We also now know that NK cells can also express FcγRIIc or FcγRIIb in some individuals. Both these variations affect the functionality of this receptor ([@B32], [@B62], [@B63]). In this study, we eliminated both these variables by selecting donors with two copies of FcγRIIIa and without FcγRIIc-ORF, possibly explaining these discrepancies, and perhaps suggesting that the twofold to fivefold difference in affinity of IgG1 allotype is not enough to cause functional differences.
Importantly, the observed changes in FcγRIIIa-binding due to glycosylation reliably translated into functional NK cell-mediated ADCC lysis of RBC. For FcγRIIIa and FcγRIIIb it was known that absence of IgG-Fc core-fucosylation increases the affinity of interaction due to a glycan--glycan interaction between the Fc glycan and the N162-glycan uniquely found in the FcγRIII family ([@B11]). Our approach to combine this with multiple end glycan editing shows an additional layer of complexity exerted by the galactose and sialic acid. The reasons for this added effect of galactose is unknown but may very well be related to the subtle effects on quaternary structure of the Fc-domain ([@B64], [@B65]) but may also be related to differential interaction of the Fc-glycan with the N162-glycan found in FcγRIII ([@B11]).
The possible effect of the Fc-glycans on complement activity, has until now remained enigmatic. It has been proposed for a long time that agalactosylated IgG activates complement more efficiently through the lectin pathway (MBL) ([@B25]). To our knowledge these results have never been confirmed. On the contrary, we saw enhanced complement activity of all glycovariants with elevated galactose, and no evidence of MBL being activated by any of our glycoforms. These results confirm recent work also suggesting galactosylation of IgG1 to positively influence C1q binding and CDC ([@B26], [@B66]). In addition, our results clearly rule out fucosylation or bisection having an effect on complement activation, and we now show that sialylation increases the C1q-binding of galactosylated IgG. This effect of sialylation was observed on all different glycan backbones (e.g., with or without fucose, with or without bisection) which is highly suggestive that this is no artifactual finding. This is in contrast with the previously mentioned study showing that additional sialylation decreases C1q binding ([@B26]). Activation of complement is dependent on spatial arrangement of the IgG on the cell surface ([@B67]) which is likely to differ considerably between each monoclonal antibody and target, and may possibly explain the discrepancies found between our two studies. This view is supported by our observations that sialylation had limited if any effect on IgG-mediated CDC using RBC as targets, while binding to C1q of anti-TNP antibodies was enhanced by sialylated IgG on solid surfaces.
Low galactosylation level in total IgG generally correlates with disease severity of several autoimmune diseases, such as rheumatoid arthritis and multiple sclerosis ([@B13], [@B14]). While this may seem at odds with our observations at first glance, with high galactosylated IgG having elevated complement and FcγR activities, both notions are in agreement if the balance between total- and antigen-specific glycosylation is taken into account. In this way, low potential for FcγR- and C1q binding for total IgG (e.g., low galactosylation), creates a pro-inflammatory environment in which clinical manifestations can take hold as this lowers the threshold for pathogenic antibodies. Antigen-specific IgG can also potentially have different glycosylation features than total IgG as we have shown before ([@B17], [@B18], [@B21], [@B22]), and if these are more pro-inflammatory than that of total IgG, this can theoretically lead to enhanced immune activation and clinical symptoms. The knowledge obtained in the current research provides a roadmap to decipher the meaning of glycan profiles in these diseases settings.
In summary, we show here that a set of glyco-engineering techniques we recently developed ([@B31]) can be combined to quickly generate any desired IgG glycoforms to test the effect on functional capacity. Using two sets of monoclonal antibodies we generated the most extreme 20 different glycoforms possible, and examined their effect on binding to FcγR and complement, as well as their functional capacity to trigger cytotoxicity. These revealed first that the normal glycosylation changes seen in human IgG1 do not affect any other FcγR than FcγRIIIa and FcγRIIIb. Second, hypo-fucosylation and galactosylation increase binding to both human FcγRIII-variants, with a minor negative effect of sialic acid and bisecting GlcNAc. In addition, galactosylation is the primary glycan adduct that enhances C1q-binding and all downstream complement activities, including CDC. This is summarized in Figure [6](#F6){ref-type="fig"}. Collectively, this indicates that afucosylated and hyper-galactosylated IgG1 antibodies have both improved ADCC and complement-mediated activities, including complement opsonization and CDC. These properties can now be systematically implemented in new therapeutic antibodies for enhanced effector functions. Even as important, this also allows us to decipher the clinical potency of antibodies in immune responses that have tendency to have altered fucosylation and/or galactosylation ([@B17], [@B18], [@B21], [@B22]).
![Proposed model of influence of immunoglobulin G (IgG)-Fc glycan composition on effector functions. **(A)** Standard composition of bi-antennary Fc-glycan, **(B)** Afucosylation of IgG-Fc glycan increases binding affinity to FcγRIII and subsequent antibody-mediated functions, such as antibody-dependent cellular cytotoxicity (ADCC). In addition galactosylation further increases affinity to FcγRIII and function of afucosylated IgG. **(C)** Galactosylation enhances binding of IgG to complement component C1q and activation of the classical complement pathway, which results in cleavage of complements C4, C3, and further initiation of the membrane attack complex (MAC). Sialylation may further increase C1q binding and complement activation. Glycan residues that need to be present to enhance indicated effector function (ADCC/complement-dependent cytotoxicity) are displayed with bolder lines, and for those that need to be absent to enhance indicated effector functions are displayed with faded colors.](fimmu-08-00877-g006){#F6}
Ethics Statement {#S5}
================
Peripheral blood from anonymous, healthy volunteers was obtained with informed, written consent of all subjects, in accordance with Dutch regulations. This study was approved by the Sanquin Ethical Advisory Board in accordance with the Declaration of Helsinki.
Author Contributions {#S6}
====================
GD, TK, DW, TR, MW, and GV designed the research. GD, AB, DW, TR, MW, and GV designed the experiments. GD, LT, RP, AB, MdB, CK, SL-T, RV, and YM performed the experiments. GD, RP, AB, MdB, CK, TR, TK, MW, and GV analyzed data, GD and GV wrote the manuscript. All authors contributed to and approved the final manuscript.
Conflict of Interest Statement {#S7}
==============================
The authors declare that this study received funding from Sanquin Bloedvoorziening, a not-for-profit organization. The funder was not involved in the study design or collection, analysis, or interpretation of the data.
The authors would like to thank Ninotska Derksen, Pleuni De Heer-Ooijevaar, Prof. Dr. Rob Aalberse, and Sanne van de Bovenkamp for practical help and Prof. Dr. Ellen van der Schoot, Prof. Dr. Rob Aalberse, Sanne van de Bovenkamp, Dr. Juan J. Garcia-Vallejo, Willem Falkenburg, and Christine Bruggeman for fruitful discussions, and Prof. Dr. Ellen van der Schoot for critically reading the manuscript.
**Funding.** This study was supported by Sanquin Product and Process Development Plasma Products, 12-001, Gestur Vidarsson.
Supplementary Material {#S8}
======================
The Supplementary Material for this article can be found online at <http://journal.frontiersin.org/article/10.3389/fimmu.2017.00877/full#supplementary-material>.
######
Click here for additional data file.
[^1]: Edited by: José Mordoh, Fundación Instituto Leloir, Argentina
[^2]: Reviewed by: Raffael Nachbagauer, Icahn School of Medicine at Mount Sinai, United States; Johannes S. Gach, University of California, Irvine, United States
[^3]: Specialty section: This article was submitted to Vaccines and Molecular Therapeutics, a section of the journal Frontiers in Immunology
| {
"pile_set_name": "PubMed Central"
} |
No one should have a problem with the way Mizzou's AD conducted this search. | {
"pile_set_name": "OpenWebText2"
} |
Q:
Visual C++ values differ while printing and debugging?
I am checking a piece of code. Everything is correct but concept I am not able to understand.
double a = 0.001;
double b = 0.001;
double c = a * b;
printf ("%lf", c);
While debugging in visual c++ when i am pointing mouse over c after 3rd line it is displaying 9.999999999999995e-007 but while printing it is showing correct result i.e. 0.000001. I want to know actually what value it displays in debug tooltip and how it represents and converts.
A:
This is the result of rounding performed by printf.
The printf format %lf rounds to a default precision. From the top of my head, I think the default is 6, that is why you get 0.000001.
The debugger shows the actual content of the double. Due to the nature of floating point arithmetic, the result of 0.001 * 0.001 is not actually 0.000001, but an approximation although with very small difference.
By using other formats, you can see the difference. E.g. try printf("%.15e", c);
| {
"pile_set_name": "StackExchange"
} |
254 F.Supp.2d 174 (2003)
Richard J. THOMAS, Petitioner
v.
UNITED STATES of America, Respondent
No. 02-31-B-S.
United States District Court, D. Maine.
April 14, 2003.
*176 Richard J. Thomas, Bangor, ME, Pro se.
Stephen J. Turanchik, U.S. Department of Justice, Washington, DC, for Respondent.
ORDER AFFIRMING THE RECOMMENDED DECISION OF THE MAGISTRATE JUDGE
SINGAL, Chief Judge.
The United States Magistrate Judge filed with the Court on February 18, 2003 her Recommended Decision. The Petitioner filed his objection to #20 of the Recommended Decision on March 23, 2003 and Respondent filed its objections to Petitioner's Objection and to #20 of the Recommended *177 Decision on April 4, 2003. I have reviewed and considered the Magistrate Judge's Recommended Decision, together with the entire record; I have made a de novo determination of all matters adjudicated by the Magistrate Judge's Recommended Decision; and I concur with the recommendations of the United States Magistrate Judge for the reasons set forth in her Recommended Decision, and determine that no further proceeding is necessary.
1. It is therefore ORDERED that the Recommended Decision of the Magistrate Judge is hereby AFFIRMED.
2. The Court ORDERS as follows:
Petitioner's Motions to Quash, Docket Nos. 3, 4, and 8 are DENIED.
Petitioner's Motions to Quash, Docket No. 16 and so much of Docket No. 4 as relates to First Citizens Bank and United Kingfield Bank are DISMISSED based upon lack of jurisdiction.
The United States' Motion to Dismiss (Docket No. 5) is DISMISSED as moot.
The United States' Motion to Dismiss (Docket No. 17) relating to Jacy Richardson is GRANTED.
The United States' Motions for Partial Enforcement (as to all entities except Trent Jones and the Ichabod Trust) are GRANTED (Docket Nos. 12 and 14).
RECOMMENDED DECISION
KRAVCHUK, United States Magistrate Judge.
Internal Revenue Service ("IRS") Special Agent Debra Sousa is conducting an investigation into the federal income tax liabilities of Richard J. Thomas for the tax years 1995 through 2001. In due course Sousa issued summonses to various entities in furtherance of the investigation. Those summonses directed the third party record keepers to produce any and all records they held relating to Richard Thomas and all related entities, including Joan M. Thomas, Center for Natural Healing, Trent R. Jones, Trustee, Ichabod Trust, Three Crows Corporation, and Richard Thomas. Thomas has objected to those summonses by filing motions to quash the IRS summonses. The United States has responded to the motions to quash with both its objection thereto and its own motions to enforce the summonses and to dismiss petitioner's motions. I will provide a scorecard:
Thomas's Motions to Quash
Court File No. Date Filed Parties Served
Docket No.3 September 16, 2002 Bangor FCU
Bangor Savings Bank
Banknorth NA
Docket No.4 September 18, 2002 First Citizens Bank
United Kingfield Bank
Oppenheimerfunds
First Albany Corp.
Docket No.8 October 18, 2002 Sallie
General Motors Acceptance
Universal Card
MBNA
*178
Docket No. 16 November 29, 2002 Jacy Richardson
The Government's Motions to Partially Enforce Summons and to
Dismiss Motions to Quash[1]
Court File No. Date Filed Involved Parties
Docket No. 12 November 22, 2002 Sallie Mae
General Motors Acceptance
Universal Card
MBNA
Docket No. 14 November 22, 2002 Bangor FCU
Bangor Savings Bank
Banknorth NA
First Citizens Bank
United Kingfield Bank
Oppenheimerfunds
First Albany Corp.
Docket No. 17 December 10, 2002 Jacy Richardson
Motion to Dismiss only
I now recommend that the Court Deny petitioner's motions to quash the summonses (Docket Nos. 3, 4, 8, & 16). I further recommend that the Court Grant the Internal Revenue Service's motions to partially enforce the summonses (Docket Nos. 12 & 14) and Grant its motion to dismiss the motion to quash relating to the summons issued to Jacy Richardson (Docket No. 17).
I. The Motions to Quash[2]
The United States concedes that the Internal Revenue Code (IRC) §§ 7609(b)(2)(A) and (c)(2)(E) generally permit a taxpayer to bring a proceeding to quash an IRS summons issued by a Special Agent pursuant to IRC § 7602 to a third-party record keeper. This court's jurisdiction to hear such a petition is found at § 7609(h). Section 7609(b)(2) which allows a proceeding such as this one has been construed as a waiver of sovereign immunity. Stringer v. United States, 776 F.2d 274, 275 (11th Cir.1985). Where a statutory scheme authorizes a claim against the United States and sets a time limit for filing that claim, the tribunal in which the claim is filed has jurisdiction only if the claim is filed within the time allowed. Clay v. United States, 199 F.3d 876, 879-81 (6th Cir.1999). Under § 7609(b)(2)(A) a taxpayer must "begin a proceeding to quash [the] summons not later than the 20th day after the day ... notice is given."
Petitioner received notice of the summons to First Citizens Bank and United Kingfield Bank by certified mail to the *179 petitioner on August 27, 2002. He had twenty days, or until September 16, 2002, to file his motion. He filed it September 18, two days late, and this court therefore lacks jurisdiction to hear his motion as to First Citizens or United Kingfield Banks. As to those two entities the motion to quash should be dismissed for lack of jurisdiction. However, even if the court had jurisdiction to entertain the motions, they would fail for the same reasons as the motions to quash fail as to the other nine third-party record keepers.
Thomas's three primary motions to quash all raise similar grounds. They are all captioned "Petition to Quash Third Party Summons Controverted by counter affidavit." The pleading itself, signed by Thomas under affirmation, is set forth in sixteen separate sections, ranging from a jurisdictional statement (HI) to a request for recovery of costs (1116). Sandwiched in between are fourteen separate claims that the IRS violated regulations, used improper forms, acted beyond its authority, and otherwise failed to comply with applicable statutory provisions and regulatory schemes. Thomas concludes with the affirmation "[a]ggrieved Party further states that Aggrieved Party has never operated in a regulated excise taxable source activity or industry."
The United States has distilled nine separate and distinct arguments from Thomas's motions. In his reply to the United States' response Thomas does not dispute the United States characterization of his primary arguments but merely attempts to raise some new issues pertaining to Debra Sousa's Declaration filed in support of the motions seeking partial enforcement of the summonses. Therefore I will accept that the issues are as framed by the United States in its response (Docket No. 12 at 4; Docket No. 14 at 8). For the reasons set forth by the United States at pages 5 through 12(Docket No 12) and pages 9 through 15 (Docket No. 14), none of these arguments has any merit whatsoever. I see no need to rehash the points made therein.
I do note that the gist of Thomas's various motions appears in large measure to rest upon his contention that the IRS has somehow exceeded its enforcement authority because he and his various business entities have never been involved in any activity relating to items that would be taxable under the Alcohol, Tobacco, and Firearms Division of the Treasury Department. That fact appears to be the genesis of his affirmation under oath. He argues that because there are regulations governing the issuance of summonses that are lodged under the authority of the Bureau of Alcohol, Tobacco, and Firearms of the Department of the Treasury, the IRS has no authority to issue summonses when conducting investigations of matters not related to alcohol, tobacco, or firearms.
Thomas's argument is not novel and it has been rejected by numerous courts in the past. See, e.g., United States v. Streett, 791 F.Supp. 563, 568 (D.Md. 1992) ("The patent flaw in the argument is that the cited ATF regulations are not the exclusive source of the government's authority to issue summonses under § 7602 of the Code."). The IRS has both statutory and regulatory authority to issue summonses and the statutory authority granted by § 7602 extends to "any person." Id.; see also United States v. Stoecklin, 848 F.Supp. 1521, 1525 (M.D.Fla., 1994) (rejecting subject matter jurisdiction challenge mounted by a petitioner asserting that failure to promulgate specific regulations regarding summons pertaining to income tax was fatal and declaring "[regulatory embellishment is unnecessary because enforcement procedure is clearly set forth in the statutes," citing 26 U.S.C. § 7602 et seq.). It appears to me that in all material *180 respects the United States complied with the required statutory procedures. The motion to quash as to nine of the third party record keepers enumerated above should be denied and it should be dismissed as to two of the entities because it is not timely.
II. The Motions to Enforce
The IRS requests that this court issue an order compelling the enforcement of the summonses for the records relating to Richard Thomas, Joan Thomas, Center for Natural Healing and Three Crows Corporation.[3] To obtain judicial enforcement of a summons the IRS must establish: (1) the investigation is being conducted for a legitimate purpose; (2) the inquiry may be relevant to that purpose; (3) the information sought is not already in the IRS's possession; and (4) the administrative steps required by the IRC have been followed. United States v. Powell, 379 U.S. 48, 57 -58, 85 S.Ct. 248, 13 L.Ed.2d 112 (1964). To establish a prima facie case for enforcement, the IRS need do no more than file an affidavit of an agent involved in the investigation setting forth good faith compliance with the Powell requirements. See United States v. Dynavac, Inc., 6 F.3d 1407, 1414 (9th Cir.1993); United States v. Medlin, 986 F.2d 463, 466 (11th Cir.1993); Hintze v. IRS, 879 F.2d 121, 126 (4th Cir.1989), overruled on other grounds by Church of Scientology of Col. v. United States, 506 U.S. 9, 113 S.Ct. 447, 121 L.Ed.2d 313 (1992); accord United States v. Gertner, 65 F.3d 963, 966 (1st Cir.1995) ("[T]he IRS must make a prima facie showing that it is acting in good faith and for a lawful purpose. This burden is not taxing, so to speak. Courts repeatedly have confirmed that an affidavit of the investigating agent attesting to satisfaction of the four Powell elements is itself adequate to make the requisite prima facie showing.").
The First Circuit explained in Gertner: "Once this minimal showing has been made, the burden shifts to the taxpayer to rebut the good-faith presumption that arises in consequence of the government's prima facie case." 65 F.3d at 967. The taxpayer is not required to conclusively disprove the prima facie case, but he must cite some significant facts or otherwise bring to light some serious weaknesses in the government's proffer before the court will hold an evidentiary hearing or otherwise be called upon to weigh the facts and draw the appropriate inferences. Id. If the taxpayer does not raise these substantial questions in the court's mind, the government's affidavit will carry the day. Id.
Applying the Powell framework to the case before me, it becomes readily apparent that the IRS is entitled to an order enforcing its summonses. The affidavit of Debra Sousa, special agent for the IRS, filed in support of the IRS motion, is a classic example of compliance with the barebones requirements, albeit in a conclusory fashion. However, the affidavit does establish all of the necessary prerequisites. Sousa explains that she is conducting an investigation of Thomas connected with the administration or enforcement of the internal revenue laws for the tax years in question and there has been no Justice Department referral for the tax years in question, that is, its investigation is being conducted for a proper purpose. She further advises that the records she seeks are for Thomas and his related family member and/or business entities and that she has served the summons on his creditors or other third parties with whom he has had *181 financial dealings, that is, the information sought may be relevant to the investigation. Sousa averred in H 15 that the IRS did not already have in its possession the information sought by the summons, satisfying the third of the Powell requirements. Finally Sousa maintains that all of the procedural requirements of the IRC have been met, with the exception that notice of the summonses was not provided to Trent R. Jones or the Ichabod Trust and enforcement is not sought as to those entities, thus satisfying the fourth and final Powell requirement.
In his answer to the motion to dismiss Thomas has attempted to meet his burden and rebut the showing made in the affidavit. (Docket No. 19.) He claims that Debra Sousa has failed to produce any bona fide evidence that she is in fact a special agent. To the contrary she has produced such evidence through her affidavit. He also complains of perceived procedural irregularities and reiterates his unsupported claim that Sousa must spell out in her affidavit exactly what facts she intends to uncover. He also claims that some of the years sought may be beyond applicable statutes of limitation. Assuming such is the case, the requirement is that the information sought be relevant and there is no reason given as to why the records from those years would not be relevant to a determination of tax liability. Mystifyingly, Thomas also suggests that "the IMFOLT indicates that there is a criminal investigation. (Exhibit "E") The Transaction Code 914 indicates such investigation." I gather that this statement is in opposition to Sousa's sworn statement denying a referral to the Justice Department. A couple of problems arise: (1) Thomas's averment is not by way of affidavit; (2) his supporting documentation (Exhibit "E") consists of eight pages of printed out data identified as an IMF Tax Module and completely indecipherable to me; and (3) the significance of transaction code 914 is an unknown. Thomas has not met the burden of producing any significant facts that would raise a substantial question in my mind about the validity of agent Sousa's stated purpose. I would recommend that the court grant the IRS's motion for partial enforcement. I would further recommend that to the extent the IRS requests that the order granting partial enforcement be reduced to a particular form, it should be required to submit a proposed order or orders within ten days of the entry of an order affirming this recommended decision, if such an affirmation issues.
III. The Jacy Richardson Summons
On November 18, 2002, Special Agent Debra Sousa served an IRS summons on Jacy Richardson seeking records relating to Three Crows Corporation. Neither Three Crows Corporation nor Jacy Richardson have ever entered an appearance in this court. Richard Thomas filed a motion to quash the subpoena served on Jacy Richardson, using the same format and raising the same arguments as in his earlier motions to quash. (Docket No. 16). The United States responded by filing a motion to dismiss asserting that Thomas lacked standing to bring such a motion. (Docket No. 17.) The United States' argument was grounded on the notion that Jacy Richardson is not a third-party record keeper within the statutory definition and therefore Thomas lacked standing to bring a motion to quash and the court lacks jurisdiction to quash the summons.
Pursuant to 26 U.S.C. § 7603(b)(2)(A)-(J) there are ten categories of entities that are identified as "third-party recordkeepers." These entities include banks and credit unions, attorneys, accountants, securities brokers, and developers of computer software source code, among others. The predominant characteristic *182 of these third-party record keepers is that they all keep records involving transactions between the taxpayer and parties other than the third-party recordkeeper. Upton v. IRS, 104 F.3d 543, 546-47 (2nd Cir.1997). Other entities that may have information pertaining to a taxpayer, such as employers or academic institutions, do not fall within any of the statutorily enumerated categories. The significance of being a third-party recordkeeper is that a taxpayer is only entitled to notice and given the right to intervene and prevent disclosure under § 7609 when records are sought from a third-party recordkeeper. There is no right to sue the United States in the absence of a waiver of its sovereign immunity and the statute waiving that immunity has no applicability if the summons was not issued to a third-party recordkeeper. Gilmartin v. IRS, 174 F.Supp.2d 117,119 (S.D.N.Y.2001).
Mercifully the United States does not move for the enforcement of this summons. The unfortunate corollary is that there is no affidavit or other indication in the file to assist me in determining who Jacy Richardson is and what she has to do with this case. I can make an educated guess that she might be a clerk of the Three Crows Corporation based upon the fact that the summons requests corporate records. I also know that she is a notary because she acknowledged Thomas's signature on his pleadings. However, those facts do not confer standing on Thomas to proceed under § 7609 nor do they give this court jurisdiction to proceed pursuant to § 7609 and Thomas invokes this court's jurisdiction pursuant to that provision. (Docket No. 16 at 2).
Based upon these circumstances I recommend that the court grant the United States' motion to dismiss.
Conclusion
In summary I recommend that the court dispose of the eight pending motions as follows:
Petitioner's Motions to Quash, Docket Nos. 3, 4, and 8 are DENIED.
Petitioner's Motions to Quash, Docket No. 16 and so much of Docket No. 4 as relates to First Citizens Bank and United Kingfield Bank are DISMISSED based upon lack of jurisdiction.
The United States' Motion to Dismiss (Docket No. 5) is DISMISSED as moot.
The United States' Motion to Dismiss (Docket No. 17) relating to Jacy Richardson is GRANTED.
The United States' Motions for Partial Enforcement (as to all entities except Trent Jones and the Ichabod Trust) are GRANTED (Docket Nos. 12 and 14). If the United States requests that the order[s] granting partial enforcement be reduce to a specific form, they should be required to file a proposed order within ten days of the court's decision on this matter.[4]
NOTICE
A party may file objections to those specified portions of a magistrate judge's report or proposed findings or recommended decisions entered pursuant to 28 U.S.C. § 636(b)(1)(B) for which de novo review by the district court is sought, together with a supporting memorandum, within ten (10) days of being *183 served with a copy thereof. A responsive memorandum shall be filed within ten (10) days after the filing of the objection.
Failure to file a timely objection shall constitute a waiver of the right to de novo review by the district court and to appeal the district court's order.
February 14, 2003.
NOTES
[1] In addition to these motions, the United States also filed an earlier Motion to Dismiss (Docket No. 5). That motion, unaccompanied by any memorandum of law, relates to an earlier motion to quash filed by Thomas. (Docket No. 1.) The issues raised by those pleadings were resolved by the Court by order dated November 15, 2002. (Docket No. 11.) Therefore Docket No. 5 is DISMISSED as moot.
[2] In this portion of the recommended decision I address only the first three of the motions to quash. The fourth motion to quash relates to the Jacy Richardson summons and it is addressed separately in Part III of this decision.
[3] The United States is not, at this time, seeking enforcement of the summonses as they relate to Trent R. Jones or the Ichabod Trust because Jones did not receive notice of the summons.
[4] I include this proviso because in some of the cases granting enforcement the court has directed the government to submit a proposed order. See, e.g., United States v. Streett, 791 F.Supp. 563 (D.Md.1992). It is unclear to me why the District Court's memorandum of decision and order would not be sufficient to accomplish the necessary enforcement of the summons, but to the extent an additional and supplemental order is required, the government should submit its proposal with the necessary explanation.
| {
"pile_set_name": "FreeLaw"
} |
Top graduate schools for creative writing
Die Erkenntnis, dass der Handel mit
1 Sep 2011 The nation's top fifty MFA programs based on popularity, funding, It's historical fact that some graduate creative writing programs were Turn your passion for words into a career with a masters in creative writing In preparation for the development of their own creative Online Graduate CalArts is also one of the few creative writing programs to We believe the MFA degree offers graduate students CalArts MFA Creative Writing Program abeka research paperTop 10 Creative Writing Schools; Top Graduate Programs in Creative Writing; The Top 10 Creative Writing MFA Programs; 2011 MFA Rankings; Resources.Graduate Creative Writing Programs. students planning graduate study in creative writing or employment in creative writing. We offer top
‚Beste Berater 2015' – Bülow & Consorten in 3 Kategorien vertreten
School of Computing, Engineering and Mathematics Im Master stehen Literature & Creative Writing, Translation & Interpreting, Convergent Media und Study Language & Linguistics at universities or colleges in Germany - find 79 Master Language & Linguistics degrees to study abroad.
Academic Ranking of World Universities The University is organised into 30 institutes, schools and departments composed of five Master Of Creative Writingpersonal statement grad school psychology · definition of resume template college graduate · term paper title top 5 creative writing colleges · cover letter for popcorn science project research paper
-university-creative-writing-mfa . strategy http://southernaviation.lk/new/best-dorm-room-pranks Best dorm room pranks http://ventas-por-internet.com/graduate-school-writers Graduate school writers 7. Febr. 2013 top fifty creative writing mfa programs sample admission essay for nursing program · undergraduate personal statement guide essay inventions made chemist
The graduate Creative Writing Program at NYU consists of a community of writers working together in a setting Through innovative literary outreach programs, Sensation in the eyes as though they had wiped creative writing service constantly. The eyelids master thesis writing help are adhering one another as slimy
Title, Professor. Division, Humanities Division. Department, Literature Department, Creative Writing Program, Critical Race and Ethnic Studies. Affiliations, Latin
The MFA in Writing Program at Lindenwood University focuses on the study and practice of the craft of creative writing. Accelerated Degree Programs; MFA in Writing;Study programs Chair: Creative Writing - Head: Professor Doris Dörrie. Professor Doris Dörrie has headed the Creative Writing program and defined its msc dissertation week lse
vor 1 Tag top level headings in a research paper should be top level headings in your research paper top low residency mfa programs creative writingCheck This: persuasive essays for 3rd grade - MYADMISSIONSESSAY.TOP animals university of iowa creative writing graduate program research paper multiple choice questions test
The 10 best American colleges for Ask anyone for the best schools for NYU creative writing graduate program has enormous amounts of prestige and is Should introduce essay writers - quality academic log in class. Essay spm review creative writing service to others mean the best graduate school writing a good
creative writing - Deutsch-Übersetzung – Linguee Wörterbuch
Commission of Colleges of the Southern Association of Colleges and Schools Undergraduate Bachelor of Science in English - Creative Writing Hochschule an Nr. 22 in der Kategorie "Best Baccalaureate Colleges in the South" gerankt. cramster annual complete homework help subscriptionUndergraduate creative writing classes and creative nonfiction. Both graduate and or flagship state universities where most graduate MFA programs Creative writing help - Treat your symptoms with our effective drugs. our community for free christmas creative writing, screenwriting for college best creative writing need someone online degree programs.
SSV Renchen - Gästebuch
Graduate School; School of Law; School The undergraduate Creative Writing Program at students can approach the study of literature in a creative way - …8. Dez. 2015 andererseits is a collaborative project undertaken by the graduate students and faculty of the Carolina-Duke Graduate Program in German Studies as well as our graduate students, and faculty, as well as creative writing and art. online publication because we believe that the best way to accomplish our 8 Dec 2014 Discover the top universities in Germany for your subject, based on the QS World University She also edits the QS Top Grad School Guide and contributes to market research Creative Writing Scholarships main image.Graduate School Admissions: Where can I find the best sample SOPs for my masters admission? Key speech best writing college application for college entrance essay zoo volunteers Sample and graduate use specific reasons and graduate admission essay Of credit cards creative writing an admission how to zoo write my book,
Where Great Writers are Made Assessing America's top graduate writing programs. Ten Top Graduate Programs in Creative Writing (in alphabetical order)
The MSUS program at Chatham University allows me get the experience of both .. to our community has arrived in the form of mountain-top removal mining and the I began researching graduate programs in creative writing, but something a funny short essay
Creative Producing / TV and Internet / Live Broadcast The Academy of Media Arts Cologne degree is internationally comparable with a in the broad fields of art and media in which students work after graduation. film directors, camera men and women, scriptwriters, designers, producers or in . The best time of life4 days ago College paper writing service reviews. top 10 resume writing services in india top 10 undergraduate creative writing programs top 10 small essay on balanced diet
All degree courses are taught under one roof here, including Feature Film and Famous graduates of HFF Munich include Oscar winners Caroline Link, Florian Henckel Screenplay: Screenwriting and Story Development / Creative Writing Creative Writing; Graduate Programs; The Poetry MFA emphasizes a small, intimate graduate experience that encompasses a wide breadth of poetic traditions.
28 verfügbare Life Science Writing Jobs in München auf Indeed Deutschland. Top 15% Masters/undergraduate degree in Sport and Exercise Science, With your creative writing skills and your lifestyle & fashion knowledge, you help to turn Our service is to teach you to improve your writing, not to proofread your texts. So please always do your best to implement what you've learned in your whole thesis statement for auschwitz concentration campTop Graduate Certificate Programs in Request Information about Graduate Certificate Programs in Creative Writing Link to and share Best Graduate 18 Apr 2011 They are not — or not yet — among the very best creative writing MFA programs in the United States, but applicants looking to balance out an byronic hero jane eyre essayThis directory of university creative writing programs includes MFA creative writing .. One of the nation's oldest MFA Programs, and one of the “Top Five Most vor 4 Tagen mfa in creative writing programs in california mfa in creative writing programs online mfa in creative writing programs rankings mfa in creative ancient history research paperShe completed a Masters Degree in Creative Writing at San Francisco State University. Her work has been published in many journals including: Blue Lake
2. Febr. 2016 as well as professional competences for writing a PhD thesis and for pursuing program offered by the GGG that addresses PhD students So, how to publish your dissertation best? .. Creative Career Management. Tue.
homework help creative writing · homework best college application essay introduction · us custom . hoher Grad an Standardteilen erleichtern die Wartung essay on behaviour
Its historical fact that some graduate creative writing programs were originally conceived to increase university revenue, 2012 MFA Rankings: The Top Fifty
Entscheide best group leader essay dich, über welche beispiel eines essays any questions please best graduate schools for creative writing fill the form below
Canadian Broadcasting Corporation's Best Books of 2015 · New Zealand Listener's This, for me, is what drives the best forms of creative writing. In my creative
Program offers the writing cohort pictured here at top among. Looked into our graduates have specific questions and creative writing graduate programs at for persuasive essay proofreading checklist
Full Sails Creative Writing MFA Degree Online Film Grad’s Blog of media formats are now standard skills required of creative writers in the
Best Fine Arts Colleges & Masters Programs You can learn about the top fine arts graduate programs here at U.S. News University Creative Writing,
The Graduate Program. The creative writing program at Binghamton University is designed Binghamton Bearcats compete against the top programs in the …
Creative Writing Phd Rankings The question is, what cant you do? Our undergraduate and graduate programs in literature and creative writing will teach you to think attaining inexpensive cover letters and resume
The best graduate schools. Program is our own creative writing program, i am just pretend most. Cal poly's creative writing. Mountain view elementary and that
Graduate and Professional School Fair; Graduate Catalogs; The Creative Writing program does not require the One PDF file that contains your creative
creative writing opportunities allison joseph tierfabriken-widerstand personal statement graduate program best practices for writing a resume Possible time graduate program at the field, but if you like writing phd certifies you know that. Proposal. At the class. Would like the top fifteen creative writing and capital punishment paper outline
The one of service is the process best college level admissions essay help businesses creative writing help, your preferred science-related graduate program. your career objectives essay
Title: 2012 MFA Rankings: The Top Fifty Author: Poets & Writers Magazine Subject: Rankings of Graduate Programs in Creative Writing Keywords: MFA; graduate programs tufts university application essays
Best Creative Writing Graduate Programs in the U.S. Read about two of the best creative writing graduate programs in the country. Get school rankings, degree …Best graduate schools for creative writing Runner essay help Interview essay sample.
The New School MFA Creative Writing degree program offers concentrations in fiction, Creative Arts and Health Graduate School Admission FAQTen Top Graduate Programs in Creative Writing (in alphabetical order) Boston University University of California at Irvine Cornell University essays on we real cool
Creative Writing Schools In California. California has 27 accredited creative writing schools where creative writing faculty who teach creative writing classes can a reason for attending a community college essay
Creative Writing Programs and teaching creative writing. We offer top Short Program Description The graduate Creative Writing Program at NYU consists of baseball and steroid essays
The Boston University Creative Writing Please click here to read about the BU MFA Program in the Atlantic’s “Best of the Best” guide to graduate programs in 22. März 2016 Scan the thorough study of top rated academic writing service in the The paper writing service maintains ingenuity and also creativeness of shortlist of the web based academic paper programs everyone find when located
enrolled in Graduate Studies in English Literature and Creative writing under Robin After obtaining her M.A. degree, Bowering travelled to Europe and settled on . It received the regional nomination for Best Script (Actra Awards) and was face the issues intermediate listening and critical thinking skills
9 Apr 2015 The proliferation and power of graduate degrees in creative writing have The best also hone technique and train students to read analytically. essay supporting euthanasia
Creative Writing . The School of Arts and Humanities at Individuals pursuing graduate degrees with a creative writing emphasis may Best of the Small … thesis on fingerprint matching
best college admission essay about com graduate sales engineer cover letter · math homework help sites · creative edge resume writing service · buy essay
8. Nov. 2015 Top Creative Writing Schools Allerdings kann ein Grad helfen, ein Schriftsteller seine Fähigkeiten zu schärfen und sich mit anderen Autoren. dissertation on management and leadership
School U. S. and World Report Ranking for graduate creative writing programs 1. which are the best colleges for creative writing/English in general? 0 thesis of the book night
The undergraduate and graduate programs provide The Lillian Vernon Creative Writers We are pleased to announce that the NYU Creative Writing Program 4 steps of essay writing
Colleges for the Creative Writer Graduate School; youll find your niche at these schools. They have some of the best writing departments in the world
Where Great Writers are Made - The Atlantic
PhD, 2012, Claremont Graduate University, Cultural Studies; MFA, 2004, San I taught Critical Theory of Writing, Comparative Literature, and Creative Writing.
Literary Writing. Qualification. Bachelor of Arts (B.A.) Master of Arts (M.A.) test For the master programme: diploma or bachelor degree from the Institute go to topprint German Creative Writing Program Leipzig (Deutsches Literaturinstitut classical argumentative essay
To write a personal statement, organize your grad school admission essays how to write In the great personal statement of the creative writing great admission essays, Applying to graduate school personal At best prices in india on.
The University of Michigan and Cornell University are two of the top schools in the nation to offer graduate-level creative writing programs. Creative writing is a
What can you do with Employers, graduate schools, While the MFA is still considered the terminal degree in Creative Writing, there are PhD programs that …
of Media and Musical Arts State-recognized Institute for Media Arts, Creative Writing, and Popular Music & Sound Art. Bachelor's and Master's programs. essay science and technology in future
Master Thesis Themen Marketing Dissertation Writing Services In Singapore Bill Payment Esis defense or dismissal from the masters program, subject toMaster Thesis In Master Thesis Themen Marketing Here are the top 9 Abschlussarbeit Thesis . Nder discrimination in the workplace research papers and creative.
Review Creative Writing Graduate Programs on to find the right accredited college or poetry, creative nonfiction and writing for young
STU-SYS-1 College rankings exposed: The art of getting a quality education in the TEST-TOEFL-11 TOEFL Reading and Writing STIP-UG-3 Scholarship Handbook: 2,170 Programs offering Private, Federal and Art & Creative Colleges. celebrating nerdiness essay tom rogers
Graduate Certificate in Creative Writing Basic Certificate Information. The Graduate Certificate in Creative Writing adds interdisciplinary breadth to a students
Advice for Those Interested in English Graduate School A PhD in creative writing will combine course degrees from the top 25% graduate schools have
Graduate Support at its Best. We see writing as a strategy, as a methode of inquiry that is both creative and critical. Continuities and Discontinuities in the Bolsa Familia Program Public Debate: Analyzing Discourses on Poverty in Brazil.
Centres · Postgraduate Degree The Department also has a proud tradition of creative writing and is closely involved with the annual May Top of Page. research paper editing symbols
Our graduates succeed in the top graduate schools, careers and ministries around the world. . Enjoy guest writers and the Annual Creative Writing Workshop.
Prepare for the skeptics—a creative writing major is not for the faint of Top 20 Colleges for Aspiring Writers. CM’s Top 10 Law Schools to Channel Your
The curriculum emphasizes both creative process and BathHouse Events is an integral part of EMUs thriving undergraduate and graduate Creative Writing Programs.
cause and effect essay on why students dropout of high school us news college rankings creative writing reasons for pursuing graduate study essay mechanical engineer cover letter entry level
16. Okt. 2014 Summer School (SUISS) to your colleagues and students. in Creative Writing and three two-week courses in Modernism, Scottish Literature credits, and can be sought at undergraduate and graduate level. Best wishes,Students at Chicago pursue creative writing to give students a rigorous background in the fundamentals of creative Writers Studio at the Graham School philosophy essay against abortion
Creative Writing (MFA in English) The The MFA in English with a focus in Creative Writing is awarded by the Graduate College. A few programs require materials
Viele übersetzte Beispielsätze mit "creative writing" – Deutsch-Englisch Wörterbuch Other recreational programs are also in high demand, for visitors both old and creative writing is now in danger of being eclipsed by best-sellers, and on the world of . Pre-professional arts schools teach artistic subjects such as music,.
Creative Writing Programs in Florida Indiana Review, Pindeldyboz , Glimmer -Bahn, so zu sprechen, und The Best New American Voices veröffentlicht.Best essay writing service reviews. writing activity definition essay. writing admission essay graduate school writing admission writing admissions essays graduate school Buy essay online reviews. what is creative writing in high school francesco ciucci thesis
Our research programs offer outstanding opportunities to researchers and students viele Jahre als Gastdozent Studenten im Bereich Creative Writing gelehrt.The handbook includes profiles of fifty creative writing programs, guidance and contains a vastly expanded ranking of current creative writing programs. article on computer technology in education
the Scots community, was the first Montreal school to graduate young Our thanks to our writers: Susan Stevenson, Chair, Trafalgar Ross .. Chalderton Lodge sat at the top of Simpson Street where McGregor .. Education: BA (English/Education), Bishops University; MA (English/Creative Writing), Concordia University.
The 10 Best Creative Writing Programs. the following four programs appear among the top 10 on all is the premier graduate creative writing program in the
jump to content; jump to search; jump to service navigation; jump to top navigation; jump to audience navigation; jump to main navigation; jump Writing, reading and critical reflection will shape the planned study programme. On offer is an artistic programme, the goal of which is to qualify graduates in Academic degrees.Generally, I teach writing courses (Writing Genre: Creative Writing, Grammar and towards a Master´s in professional writing at University College Falmouth. dissertation on corporate giving
18 Jul 2014 If you're serious about your craft, you'll need a creative writing program that will whip your writing into shape. We've uncovered programs with Als undergraduate, wird man, sollte man die tuition selbst bezahlen können hallo zusammen, ich studiere an der London School of Economics in . in Harvard braucht durchaus "creative writing"weil Harvard eben, Ich studiere an der HSG und überlege mir auch ein semester in den USA an ner top what is covering letter for resume
15. Dez. 2015 Creative Writing wird oft von Menschen unterrichtet, die zum Stein On Writing: A Master Editor of Some of the Most Successful Writers of Our Story: Style, . by individual writers as well as high school and college students of writing. . Ink is a helpful guide to the essential elements of the best storytelling. | {
"pile_set_name": "Pile-CC"
} |
import {MigrationInterface, QueryRunner} from 'typeorm';
export class tipsAndBitsMessagesToText1573942908160 implements MigrationInterface {
name = 'tipsAndBitsMessagesToText1573942908160';
public async up(queryRunner: QueryRunner): Promise<any> {
await queryRunner.query(`CREATE TABLE "temporary_user_tip" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" float NOT NULL, "currency" varchar NOT NULL, "message" varchar NOT NULL DEFAULT (''), "tippedAt" bigint NOT NULL DEFAULT (0), "sortAmount" float NOT NULL, "userUserId" integer, CONSTRAINT "FK_36683fb221201263b38344a9880" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "temporary_user_tip"("id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId") SELECT "id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId" FROM "user_tip"`, undefined);
await queryRunner.query(`DROP TABLE "user_tip"`, undefined);
await queryRunner.query(`ALTER TABLE "temporary_user_tip" RENAME TO "user_tip"`, undefined);
await queryRunner.query(`CREATE TABLE "temporary_user_bit" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" bigint NOT NULL, "message" varchar NOT NULL DEFAULT (''), "cheeredAt" bigint NOT NULL DEFAULT (0), "userUserId" integer, CONSTRAINT "FK_cca96526faa532e7d20a0f775b0" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "temporary_user_bit"("id", "amount", "message", "cheeredAt", "userUserId") SELECT "id", "amount", "message", "cheeredAt", "userUserId" FROM "user_bit"`, undefined);
await queryRunner.query(`DROP TABLE "user_bit"`, undefined);
await queryRunner.query(`ALTER TABLE "temporary_user_bit" RENAME TO "user_bit"`, undefined);
await queryRunner.query(`CREATE TABLE "temporary_user_tip" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" float NOT NULL, "currency" varchar NOT NULL, "message" text NOT NULL DEFAULT (''), "tippedAt" bigint NOT NULL DEFAULT (0), "sortAmount" float NOT NULL, "userUserId" integer, CONSTRAINT "FK_36683fb221201263b38344a9880" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "temporary_user_tip"("id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId") SELECT "id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId" FROM "user_tip"`, undefined);
await queryRunner.query(`DROP TABLE "user_tip"`, undefined);
await queryRunner.query(`ALTER TABLE "temporary_user_tip" RENAME TO "user_tip"`, undefined);
await queryRunner.query(`CREATE TABLE "temporary_user_bit" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" bigint NOT NULL, "message" text NOT NULL DEFAULT (''), "cheeredAt" bigint NOT NULL DEFAULT (0), "userUserId" integer, CONSTRAINT "FK_cca96526faa532e7d20a0f775b0" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "temporary_user_bit"("id", "amount", "message", "cheeredAt", "userUserId") SELECT "id", "amount", "message", "cheeredAt", "userUserId" FROM "user_bit"`, undefined);
await queryRunner.query(`DROP TABLE "user_bit"`, undefined);
await queryRunner.query(`ALTER TABLE "temporary_user_bit" RENAME TO "user_bit"`, undefined);
await queryRunner.query(`DROP INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3"`, undefined);
await queryRunner.query(`CREATE TABLE "temporary_twitch_tag_localization_description" ("id" varchar PRIMARY KEY NOT NULL, "locale" varchar NOT NULL, "value" varchar NOT NULL, "tagId" varchar, CONSTRAINT "FK_4d8108fc3e8dcbe5c112f53dd3f" FOREIGN KEY ("tagId") REFERENCES "twitch_tag" ("tag_id") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "temporary_twitch_tag_localization_description"("id", "locale", "value", "tagId") SELECT "id", "locale", "value", "tagId" FROM "twitch_tag_localization_description"`, undefined);
await queryRunner.query(`DROP TABLE "twitch_tag_localization_description"`, undefined);
await queryRunner.query(`ALTER TABLE "temporary_twitch_tag_localization_description" RENAME TO "twitch_tag_localization_description"`, undefined);
await queryRunner.query(`CREATE INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3" ON "twitch_tag_localization_description" ("tagId") `, undefined);
await queryRunner.query(`DROP INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3"`, undefined);
await queryRunner.query(`CREATE TABLE "temporary_twitch_tag_localization_description" ("id" varchar PRIMARY KEY NOT NULL, "locale" varchar NOT NULL, "value" text NOT NULL, "tagId" varchar, CONSTRAINT "FK_4d8108fc3e8dcbe5c112f53dd3f" FOREIGN KEY ("tagId") REFERENCES "twitch_tag" ("tag_id") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "temporary_twitch_tag_localization_description"("id", "locale", "value", "tagId") SELECT "id", "locale", "value", "tagId" FROM "twitch_tag_localization_description"`, undefined);
await queryRunner.query(`DROP TABLE "twitch_tag_localization_description"`, undefined);
await queryRunner.query(`ALTER TABLE "temporary_twitch_tag_localization_description" RENAME TO "twitch_tag_localization_description"`, undefined);
await queryRunner.query(`CREATE INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3" ON "twitch_tag_localization_description" ("tagId") `, undefined);
}
public async down(queryRunner: QueryRunner): Promise<any> {
await queryRunner.query(`ALTER TABLE "user_bit" RENAME TO "temporary_user_bit"`, undefined);
await queryRunner.query(`CREATE TABLE "user_bit" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" bigint NOT NULL, "message" varchar NOT NULL DEFAULT (''), "cheeredAt" bigint NOT NULL DEFAULT (0), "userUserId" integer, CONSTRAINT "FK_cca96526faa532e7d20a0f775b0" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "user_bit"("id", "amount", "message", "cheeredAt", "userUserId") SELECT "id", "amount", "message", "cheeredAt", "userUserId" FROM "temporary_user_bit"`, undefined);
await queryRunner.query(`DROP TABLE "temporary_user_bit"`, undefined);
await queryRunner.query(`ALTER TABLE "user_tip" RENAME TO "temporary_user_tip"`, undefined);
await queryRunner.query(`CREATE TABLE "user_tip" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" float NOT NULL, "currency" varchar NOT NULL, "message" varchar NOT NULL DEFAULT (''), "tippedAt" bigint NOT NULL DEFAULT (0), "sortAmount" float NOT NULL, "userUserId" integer, CONSTRAINT "FK_36683fb221201263b38344a9880" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "user_tip"("id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId") SELECT "id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId" FROM "temporary_user_tip"`, undefined);
await queryRunner.query(`DROP TABLE "temporary_user_tip"`, undefined);
await queryRunner.query(`ALTER TABLE "user_bit" RENAME TO "temporary_user_bit"`, undefined);
await queryRunner.query(`CREATE TABLE "user_bit" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" bigint NOT NULL, "message" varchar NOT NULL DEFAULT (''), "cheeredAt" bigint NOT NULL DEFAULT (0), "userUserId" integer, CONSTRAINT "FK_cca96526faa532e7d20a0f775b0" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "user_bit"("id", "amount", "message", "cheeredAt", "userUserId") SELECT "id", "amount", "message", "cheeredAt", "userUserId" FROM "temporary_user_bit"`, undefined);
await queryRunner.query(`DROP TABLE "temporary_user_bit"`, undefined);
await queryRunner.query(`ALTER TABLE "user_tip" RENAME TO "temporary_user_tip"`, undefined);
await queryRunner.query(`CREATE TABLE "user_tip" ("id" integer PRIMARY KEY AUTOINCREMENT NOT NULL, "amount" float NOT NULL, "currency" varchar NOT NULL, "message" varchar NOT NULL DEFAULT (''), "tippedAt" bigint NOT NULL DEFAULT (0), "sortAmount" float NOT NULL, "userUserId" integer, CONSTRAINT "FK_36683fb221201263b38344a9880" FOREIGN KEY ("userUserId") REFERENCES "user" ("userId") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "user_tip"("id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId") SELECT "id", "amount", "currency", "message", "tippedAt", "sortAmount", "userUserId" FROM "temporary_user_tip"`, undefined);
await queryRunner.query(`DROP TABLE "temporary_user_tip"`, undefined);
await queryRunner.query(`DROP INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3"`, undefined);
await queryRunner.query(`ALTER TABLE "twitch_tag_localization_description" RENAME TO "temporary_twitch_tag_localization_description"`, undefined);
await queryRunner.query(`CREATE TABLE "twitch_tag_localization_description" ("id" varchar PRIMARY KEY NOT NULL, "locale" varchar NOT NULL, "value" varchar NOT NULL, "tagId" varchar, CONSTRAINT "FK_4d8108fc3e8dcbe5c112f53dd3f" FOREIGN KEY ("tagId") REFERENCES "twitch_tag" ("tag_id") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "twitch_tag_localization_description"("id", "locale", "value", "tagId") SELECT "id", "locale", "value", "tagId" FROM "temporary_twitch_tag_localization_description"`, undefined);
await queryRunner.query(`DROP TABLE "temporary_twitch_tag_localization_description"`, undefined);
await queryRunner.query(`CREATE INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3" ON "twitch_tag_localization_description" ("tagId") `, undefined);
await queryRunner.query(`DROP INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3"`, undefined);
await queryRunner.query(`ALTER TABLE "twitch_tag_localization_description" RENAME TO "temporary_twitch_tag_localization_description"`, undefined);
await queryRunner.query(`CREATE TABLE "twitch_tag_localization_description" ("id" varchar PRIMARY KEY NOT NULL, "locale" varchar NOT NULL, "value" varchar NOT NULL, "tagId" varchar, CONSTRAINT "FK_4d8108fc3e8dcbe5c112f53dd3f" FOREIGN KEY ("tagId") REFERENCES "twitch_tag" ("tag_id") ON DELETE CASCADE ON UPDATE CASCADE)`, undefined);
await queryRunner.query(`INSERT INTO "twitch_tag_localization_description"("id", "locale", "value", "tagId") SELECT "id", "locale", "value", "tagId" FROM "temporary_twitch_tag_localization_description"`, undefined);
await queryRunner.query(`DROP TABLE "temporary_twitch_tag_localization_description"`, undefined);
await queryRunner.query(`CREATE INDEX "IDX_4d8108fc3e8dcbe5c112f53dd3" ON "twitch_tag_localization_description" ("tagId") `, undefined);
}
}
| {
"pile_set_name": "Github"
} |
Deception detection research has primarily focused on developing an understanding of the strategies that individuals employ when lying or telling the truth about solo crimes, and furthermore what interviewing techniques can be employed by investigators to enable individual liars to be more easily differentiated from individual truth-tellers (e.g., [@B99]; [@B17]; [@B110]). However, despite lone individuals being the focus of deception detection research, investigators are often faced with situations whereby they must interview more than one person. Group (or co-) offending (an offense committed by two or more people) is common ([@B66]) and on the rise ([@B91]). Studies suggest that co-offending accounts for between 10 and 17% of police recorded offenses with between 22 and 30% of offenders being involved in co-offending ([@B14]; [@B43]; [@B90]; [@B20]; [@B71]). However, co-offending statistics need to be interpreted with caution. This is because the data available tends to only represent those offenders who have been charged or detected, resulting in a sizeable dark figure of co-offending (e.g., a crime may be recorded as a solo event when in fact investigators are just unaware that more offenders were involved).
Co-offending is just one circumstance that would require the investigation of more than one person. Other contexts in which multiple individuals may need to be questioned are when there are multiple eyewitnesses to a specific crime or when a suspect reports an alibi witness (someone who can provide an account of the whereabouts of a suspect at a location other than the crime scene at the time the crime took place; [@B21]). Additionally, some criminal groups may consist of members who are involved only in the planning, or in the aftermath, of an offense, but not in the actual commission of the offense itself. Similar to alibi witnesses, these group members will be collaborators of the crime but not active participants. Despite having different group dynamics to multiple suspects, there is still the potential for investigators to question more than one person about the same crime/event. However, in these contexts the aim for investigators is to determine the accuracy of the information provided by the eyewitnesses, to determine whether the alibi witness is true or false, or to determine the differing roles played by the group members in the offense process.
Although investigators often have to question groups, whether it is multiple suspects, multiple eyewitnesses, or alibi witness situations, the number of deception detection studies involving groups is limited. Our literature search found only 20 studies published on the topic of verbal group deception (see **Table [1](#T1){ref-type="table"}**). All 20 studies, except one, considered multiple suspects; therefore it is groups of suspects that will be the primary focus of the current review. The aim of the current review article is to collate and discuss the research that has been conducted into interviewing groups to detect deceit and to discuss the theoretical implications of this upcoming research area. The review will consider the differences between groups and individuals, and will report the different aspects of the extant group deception studies, for example, interviewing group members separately vs. interviewing group members simultaneously. Throughout, the review gaps in the literature will be identified with suggestions for future studies. The current review will focus on the verbal indicators of deceit and therefore studies measuring physiological measures to detect deceit in groups will not be discussed (see [@B13]; [@B68], [@B67], for studies using the Concealed Information Test (CIT) to extract information from groups).
######
Overview of the group deception studies completed so far, which measure verbal cues (spanning across 11 years from 2003 to 2014).
Group deception study Theoretical principle examined Interview style Study manipulation Number of interviewees Adults or children? Published?
----------------------- -------------------------------- ----------------- --------------------------------------- ------------------------ --------------------- ------------
[@B33] Strategies Individual SUE technique 3 Adults Yes
[@B104] Strategies Individual (Un)anticipated questions 2 Adults Yes
[@B15] Consistency Individual Effect of co-planning 2 Adults Yes
[@B32] Consistency Individual SUE technique 3 Adults Yes
[@B37] Consistency Individual Repeated interviews 2 Adults Yes
[@B60] Consistency Individual Drawings 2 Adults Yes
[@B65] Consistency Individual (Un)anticipated questions: intentions 3 Adults Yes
[@B77] Consistency Individual Sketches 3 Children Yes
[@B79] Consistency Individual (Un)anticipated questions: intentions 2 and 4 Adults Yes
[@B84] Consistency Individual Response mode of observers 2 Children Yes
[@B85] Consistency Individual Repeated interviews 2 Adults Yes
[@B97] Consistency Individual (Un)anticipated questions 2 Children Yes
[@B106] Consistency Individual (Un)anticipated questions 2 Adults Yes
[@B23] Memory Collective Brief investigative interview 2 Adults Yes
[@B54] Memory Collective Timeline task 2 Adults Yes
[@B55] Memory Collective Pairs' monitoring of the interviewer 2 Adults Yes
[@B93] Memory Collective (Un)anticipated questions 2 Adults Yes
[@B105] Memory Collective (Un)anticipated questions 2 Adults Yes
[@B94] Imposing cognitive load Collective Forced turn-taking technique 2 Adults Yes
[@B69]^∗^ Verifiability approach Collective Written statements 2 Adults Yes
SUE, Strategic Use of Evidence.
∗
This study involved alibi witness scenarios as opposed to multiple suspects.
Defining A Group
================
A group can be defined as "two or more individuals who are connected to one another by social relationships" ([@B27], p. 3). Group deception studies, to date, have primarily focused on dyads, and the majority of group offenses in real-life involve dyads ([@B44]). Nevertheless, it is important to note that there is much debate within the group dynamics literature with regard to the definition of a 'group' and whether a dyad actually constitutes a group (often referred to as the Moreland-Williams debate). [@B62] argue that dyads are not groups because the number of individuals within the group matters. That is, larger groups involve different group processes. They state that dyads are different from larger groups because; (1) they form and dissolve more quickly; (2) they are more emotionally involved with one another; and (3) certain social phenomena, such as minority/majority relations, cannot be applied unless there is more than two people in the group. In contrast, [@B117] states that dyads should come under the definition of a group because group processes, such as social loafing and facilitation or ingroup/outgroup, occur regardless of whether there are two or several people in the group. Consequently, dyads are appropriate targets for investigation. [@B117] reports that it is the scientific methods employed which are important to ensure that reliable data is collected about how individuals behave when around others. If dyads do not constitute a group, nor are they individuals, then dyads will need to be studied as a field on their own. As a result of this controversial debate within the group dynamics literature, it is important that group size is considered when interpreting the findings and forming conclusions from the current review. Nevertheless, the fact that dyads are different from individuals regardless of whether they come under the term 'group,' means that the current review is still necessary and relevant for those involved in investigative interviewing and detecting deception. For the purpose of the current review and in line with the definition by [@B27] mentioned above, dyads will be thought of as a group.
Group Deception: How Are Groups Different From Individuals?
===========================================================
Although the knowledge-base surrounding detecting deceit in groups is limited, it is important to acknowledge that groups are different from individuals (e.g., in terms of shared responsibility and peer support; [@B111]). Consequently, there are numerous reasons why it is important to expand the investigative interviewing and deception detection literature to include groups. First, the characteristics of group offenders differ from the characteristics of solo offenders. For example, co-offenders are typically younger than solo offenders ([@B90]). Furthermore, it seems that groups are more strategic and view honesty and deception differently from individuals. Groups, for instance, lie more than individuals ([@B18]) and are more likely to use honesty strategically in order to maximize their own outcomes (e.g., financial payoffs; [@B87]). Groups also report more self-interest (both collective self-interest and individual self-interest) and fewer concerns about using deception in comparison to individuals ([@B18]). These differences in motives, strategies and behaviors highlight the need to understand group deception as well as individual deception. Additionally, there are specific crimes (e.g., organized crime, terrorism, drug trafficking, burglary, arson) and multiple investigative settings (e.g., immigration, airport security, border control, police stop and search) that are more likely to involve groups of offenders as opposed to lone offenders ([@B14]; [@B90]).
Second, the interviewing of groups brings a different dynamic to the interview process. This allows for different interview approaches to be applied and enables the identification of unique cues to deceit that can only emerge when groups are interviewed. A central issue that investigators face is whether to interview groups individually (i.e., interviewing of group members separately) or collectively (i.e., interviewing of group members simultaneously). Interviewing group members individually provides the potential to examine within-group consistency ([@B85]; [@B32]), which cannot be measured when interviewing a lone individual about a solo crime. Additionally, collective interviewing allows for communication and interaction cues to be examined ([@B23]; [@B105]; [@B55]; [@B94]), and these cues cannot emerge when interviewing a lone individual about a solo crime or when individually interviewing group members about a joint crime. Currently, police typically conduct individual interviews during their investigations regardless of the number of suspects. Nonetheless, there are some existing procedures where collective interviewing is employed. For example, in the UK, immigration officers occasionally use collective interviewing when attempting to uncover sham marriages ([@B50]), and police detectives often interview people in groups when making house-to-house enquiries ([@B19]). In Canada, customs officers carry out collective interviews at airports because members of the same group are deemed to have a 'similar agenda' (i.e., it is assumed that group members traveling together are traveling to the same destination for the same purpose). Thus, if only one person in the group is examined, this could result in a wasted effort or missed opportunity. That is, the interviewing of group members individually will be less time-efficient and may result in specific individuals who need to be interviewed being disregarded (personal communication with a Canadian ex-immigration officer, 12th November 2013). By extending the research agenda to include collective interviewing, research can inform on the best practices for such situations and has the potential to uncover new applied contexts where collective interviewing may be appropriate.
Third, for groups you can determine deception at a social level as well as at an individual level. In other words, interviewing groups of suspects not only allows for the additional consistency and social cues (as mentioned above) to be measured, but also allows for the measurement of established deception cues within each individual of the group (e.g., within-statement consistency, number of details, admitting lack of memory, plausibility, spontaneous corrections; [@B35]; [@B22]; [@B98], [@B99]). Therefore, by examining individual deception and group deception more cues to deceit can emerge from interviewing group members about joint events than from interviewing lone individuals about solo events. The identification of both known and novel cues to deceit from groups is important if we are to improve the poor accuracy rates typically found within the detection deception literature ([@B12]) and obtain knowledge of what cues are best to focus on in each given investigative situation.
Fourth, when multiple people need to be questioned, each member of the group loses some control over what information is provided and how each member behaves. Therefore, not only do they have to 'impression manage' themselves (i.e., regulate and control what information they say), but they also have to 'impression manage' others (i.e., attempt to regulate, predict, and control what others say). This suggests that the strategies employed by groups will differ from the strategies employed by lone individuals because group members will not be as successful as lone individuals when improvising on the spot during the interview. This will be the case regardless of whether the group members are interviewed individually or collectively. The notion of impression management can be linked to research examining the 'Prisoner's Dilemma' ([@B76]; [@B73]), especially when group members are interviewed separately about a crime. That is, each member of the group will need to make a decision about whether they can trust the other group members to cooperate with the group and not the police. Such reasoning is difficult. Therefore the added task of impression managing others implies that group situations are naturally more cognitively demanding: not only do you have to think about and remember what you have said but you also need to consider what others have said or might be saying. Research shows that increased cognitive load results in more cues to deceit ([@B100], [@B103]). Hence, cues to deceit may not only be more numerous but also strengthened in group situations.
In order for law enforcement to be competent in dealing with all forms of crime-related incidents, they need to be trained in a variety of interview techniques that enable them to question both individuals and groups. Different situations may require different interviewing techniques. It is therefore important that investigators have a wide range of all the necessary skills to be able to use the most appropriate interview strategy for the situation at hand, and to be able to recognize the cues indicative of deceit that emerge from implementing that particular interview technique. For example, if there is only one interviewer available but multiple suspects, employing a collective interviewing approach would be most convenient and time-efficient. When this approach is implemented, the focus should be on cues associated with how the interviewees interact and communicate with one another, such as verbal transitions ([@B23]) or eye contact ([@B55]).
Theoretical Implications of Detecting Deception Within Groups: What Do the Existing Deception Studies Tell Us?
==============================================================================================================
From a theoretical perspective, research on the interviewing of groups contributes to the knowledge-base within the deception literature. It adds to the consistency research (e.g., repeat vs. reconstructive hypothesis; [@B35]), compliments memory research (e.g., collaborative learning and remembering), and can be applied to the theories of co-offending (e.g., social exchange theory; [@B112]) and other group processes (e.g., group formation and leadership). Hence, the interviewing of groups about joint events not only allows for the development of new interview techniques that increase information elicitation (crucial to detecting deceit), but also allows for additional theories and concepts to be applied to deception that cannot be applied when interviewing lone individuals about solo events. In the following sections, we will review the existing deception research on group interviewing which has contributed to the literature on; counter-interrogation strategies (e.g., [@B33]), within-group consistency (e.g., [@B85]), transactive memory (e.g., [@B113]), and collective memory (e.g., [@B7]). We will also highlight theoretical positions we feel are of utmost relevance to group deception, but have yet to be empirically examined, such as group dynamics (e.g., [@B5]).
Strategies
----------
Knowledge about the strategies that truth-tellers and liars employ is important if investigators are to have insight into what truth-tellers and liars will say, and how they will behave, during an interview. If this is known, more insight can be acquired with regard to the deception cues that may arise, and most importantly, more effective and theory-based interview protocols can be developed to help improve investigators' abilities to accurately detect deceit (see [@B34] for an overview). Despite this, most research has focused on the verbal and non-verbal behaviors of truth-tellers and liars, with little research being conducted into the actual strategies that truth-tellers and liars employ to appear credible (e.g., [@B22]; [@B99]). This is particularly the case for the strategies employed by truth-telling groups and lying groups (see [@B104]; [@B33] for the only two deception studies to examine group strategies when individual interviewing is applied).
When faced with the situation of being questioned about their activities or whereabouts at the time of a crime, truth-tellers and liars (whether an individual or part of a group) have the same goal and that is to convince the interviewer of their innocence ([@B31]). Research into the differing strategies employed by truth-telling groups and lying groups, when group members are interviewed individually, demonstrates that although there are no differences in terms of the non-verbal strategies (e.g., both truth-telling groups and lying groups plan to suppress nervous behaviors), there are key differences in terms of the verbal strategies they use (i.e., how they provide information; [@B104]). This is also the case for the non-verbal and verbal strategies used by lone individuals ([@B86]).
Truth-telling groups are less likely to have a strategy than lying groups because truth-tellers believe in a 'just world' ([@B61]) and that the truth will shine through ('illusion of transparency'; [@B29]). Consequently, they rely on memory, as opposed to preparation, to provide their answers. Truth-telling groups prefer a 'tell it all' strategy that aims to provide an honest and detailed description of what actually occurred ([@B104]; [@B33]). Even when part of a group, truth-tellers do not feel the need to prepare, believing their statements will naturally be consistent with one another. The only time truth-telling groups may prepare is to run through what happened in order to remind one another of the details of the event ([@B104]).
Conversely, lying groups, who are less likely to take their credibility for granted, are more likely to prepare for an interview. They plan what to say beforehand and prepare fabricated stories that are coherent and plausible. Lying groups prepare joint alibis, preferring a 'keep it simple' strategy in order to avoid raising suspicion and to ensure consistency within and between their statements ([@B104]; [@B33]). They will prepare answers to possible questions to 'get their stories straight,' but their answers will be restrictive and vague to reduce the chances of them contradicting one another or providing incriminating evidence ([@B104]; [@B33]). These differing strategies employed by groups of truth-tellers and groups of liars results in the statements from lying groups being less detailed than the statements from truth-telling groups. However, because lying groups have planned what to say together, their statements are often as consistent as the statements of truth-telling groups ([@B37]; [@B15]).
As a result of the strategies that lying groups employ, opportunity for planning is likely to be an important moderator of credibility. Research on lone individuals has shown that liars who prepare for an interview are more difficult to distinguish from truth-tellers, than liars who do not prepare ([@B70]; [@B12]). Preparing what to say in an interview enhances liars' deceptive performance ([@B30]) by making their statements not only more consistent than truth-tellers' ([@B37]), but also more immediate and plausible ([@B15]). Consequently, the emergence of cues to deceit is reduced ([@B22]). Nevertheless, the influence of opportunity to plan has not been empirically tested in groups of interviewees, and therefore studies examining the effects of planning on lie catchers' abilities to distinguish between groups of truth-tellers and groups of liars are required.
The Al Qaeda Handbook (a terrorist training manual found in 2000 by Manchester police in England) offers further insights into the strategies of groups of suspects. Amongst other things, this handbook underscores the importance of a group security plan that all group members are to commit to. This plan emphasizes the importance of teamwork and explains how to undertake group missions, which includes practicing answers to a list of anticipated interview questions. Additionally, it covers counter-interrogation strategies. Of specific relevance to group interviewing situations are the strategies that state; (i) always stick to the cover story even when shown evidence of involvement, and (ii) if interrogators state that other group members have revealed information, just agree, but do not state any additional information. This manual therefore gives insight into the types of strategies that groups may employ in order to; (1) co-ordinate with other group members; (2) avoid revealing incriminating information; and (3) avoid deviating from the group security plan. However, it assumes that group members will be interviewed separately. Therefore, interviewing group members collectively may be an interview tactic that groups typically do not prepare for, which may increase cues to deceit.
To summarize, the fact that research shows that groups of truth-tellers and groups of liars use the same non-verbal strategies but different verbal strategies helps to explain why verbal cues are deemed more diagnostic to deceit, than non-verbal cues (which is the case for both adults and children; [@B84]; [@B99]). Furthermore, whether a lone individual or part of a group, the strategies employed seem to be very similar. However, there are likely to be key differences with regard to the strategies employed by truth-tellers and liars depending on whether they are part of a group (as suggested by the Al Qaeda Handbook), because groups will need to decide what to do if the planned strategies cannot be employed during the interview. More studies investigating the strategies that groups of truth-tellers and groups of liars employ are required. The few deception studies that have considered strategies have involved interviewing groups consisting of two or three members separately. This means that the strategies employed by larger groups have been ignored, as have the strategies employed by groups interviewed collectively. Group size is unlikely to influence the counter-interrogation strategies employed, because the theoretical principles of the strategies remain the same. However, the outcome of implementing the strategies may differ as group size increases, because the ability to remain consistent will become more challenging. Future studies will need to examine this before any conclusions can be drawn. Collective interviewing raises further questions with regard to suspect strategies. For instance, will group strategies cover the communication and interaction cues that are available during collective interviewing? Or how do group members react and alter their strategies when informed that one group member has provided information other than that agreed upon in the pre-planned story? Future research on group strategies should address such questions.
Consistency
-----------
Verbal consistency is regarded by many as an important cue to deceit. Both laymen ([@B88]) and professionals ([@B2]; [@B83]) assume that inconsistency is indicative of deceit. However, it is often overlooked that consistency comes in many forms. Single statements can be examined for within-statement consistency (the level of consistency within one statement from an individual), while repeated statements can be examined for between-statement consistency (the level of consistency between multiple statements from one individual). When groups of individuals are interviewed seperately an additional form of consistency emerges: within-group consistency (the level of consistency between statements from group members; see [@B96], for an overview of consistency cues in deception contexts). The first studies on group deception began with this cue in mind ([@B37]; [@B85]), and, considering the importance that people place on consistency as a cue to deceit, it is perhaps not surprising that the majority of studies on group deception have continued to focus on this cue (see **Table [1](#T1){ref-type="table"}**). However, it is important to note that all the group deception studies that have considered consistency as a cue to deceit have involved interviewing the group members individually. Future studies should consider measuring consistency as a possible cue to deceit in collective interviewing situations.
If the strategies that truth-telling groups and lying groups employ are taken into consideration (i.e., truth-tellers rely on memory whereas liars plan what to say), it may be problematic to assume that truth-tellers are more consistent than liars. Accordingly, the consistency of truth-telling groups is often equal to (or even weaker) than the consistency of lying groups (e.g., [@B37]; [@B85]). To understand this further, [@B35] proposed the 'repeat vs. reconstruct' hypothesis, which emphasizes that liars will attempt to *repeat* what they have previously said and truth-tellers will try to *reconstruct* what they actually experienced. When truth-tellers are asked to repeat answers, their memory restructures the event so they gain, lose, and change information over time ([@B6]), thus reducing consistency. In contrast, liars merely repeat what they originally prepared, thus promoting consistency. Although, the 'repeat vs. reconstruct' hypothesis was originally developed to measure the consistency between two statements from the same interviewees ([@B35]), later research has found that this hypothesis can also be applied when measuring the consistency between statements of multiple interviewees (e.g., [@B37]). Research suggests that there is a variation in the types of details that groups provide, with truth-telling groups focusing more on the salient aspects of an event than lying groups. Thus, when these salient aspects are compared, consistency is significantly greater for truth-telling groups compared with lying groups ([@B77]). Future research should consider whether there are specific types of details that truth-tellers reconstruct and liars repeat (e.g., salient/central details vs. non-salient/general details).
Relevant to the 'repeat vs. reconstruct' hypothesis is the 'reminiscence effect' which suggests that repeated questioning results in the recall of previously unrecalled items (referred to as commission errors; [@B72]). This effect has been found to be stronger for truthful statements than for deceptive statements ([@B37]). Therefore, in contradiction to the stereotypical belief that consistency implies truthfulness (see 'consistency heuristic' literature; [@B36]), it is clear that lie catchers need to be cautious when interpreting consistent statements as truthful and inconsistent statements as deceitful. In fact, the diagnostic value (i.e., predictive accuracy) of using consistency to judge veracity in groups is modest for both adults ([@B85] obtained overall accuracy rates of between 52.5 and 70%) and children ([@B84] obtained an overall accuracy rate of 62.5%). These modest accuracy rates are not only because lie catchers are exercising the consistency heuristic incorrectly, but also because judging consistency is a subjective task (i.e., different observers can perceive the same set of statements differently in terms of consistency; [@B36]).
The diagnostic value of the consistency cue can vary depending on the response mode used. The response mode refers to the stage at which a lie catcher makes a veracity judgment, and this can vary when you have repeated interviewing and/or groups of interviewees. Research implies that observers are more accurate at using the consistency cue when they use a step-by-step response mode (observers make a veracity judgment after seeing each interrogation) compared to when they use an end-of-sequence response mode (observers make one veracity judgment after seeing all interrogations with all group members). This is because the step-by-step response mode facilitates more effective information processing of inconsistencies ([@B85]; [@B84]). Therefore, the diagnostic value of the consistency cue improves because there is a reduction in the degree of truth bias (the predisposition for observers to judge someone as telling the truth; [@B82]). However, the differences in accuracy rates depending on response mode vary across the few studies available and sometimes only approach significance (e.g., [@B85]); hence, more research is needed into the effects of response mode on the accuracy rates of detecting deceit in groups before any conclusions can be made.
An important development in deception research in recent years is the introduction of strategic interviewing techniques ([@B101]). These techniques involve asking interview questions that play on the differing strategies of truth-tellers and liars. The most relevant method applied to within-group consistency is simply to ask unanticipated interview questions, which negate the benefit of planning for the interview ([@B106]; [@B58]). Unanticipated interview questions are designed to disrupt liars' repeat strategy, thereby reducing within-group consistency. If framed correctly truth-tellers' consistency levels are unaffected because truth-tellers can still rely on memory to answer such questions. For example, [@B106] found that, when pairs were interviewed individually, there was less agreement between the answers from lying pairs, compared to truth-telling pairs, but only for unanticipated interview questions, such as questions concerning spatial details (accuracy rates for truth-tellers and liars ranged from 60 to 80%). When anticipated interview questions were asked, no differences were found between truth-telling pairs and lying pairs. Further studies have supported these findings with adult groups ([@B60]), child groups ([@B97]; [@B77]), and when the statements are on true and false intentions, as opposed to past events ([@B79]; but see [@B65] where truth-tellers showed higher levels of consistency for both anticipated and unanticipated questions). The accuracy rates obtained for truth-tellers and liars for the within-group studies that measure the classification of participants based on veracity are impressive, ranging from approximately 60 to 100%. These studies emphasize the need for investigators to develop interview protocols that include both expected and unexpected questions if they are to improve the diagnostic value of the consistency cue and enhance the accuracy rates of lie catchers whom are detecting deceit in groups.
When specific interview techniques are employed, such as the Strategic Use of Evidence (SUE) technique ([@B40]), a further consistency cue can be measured in addition to those already mentioned: statement-evidence consistency (the degree of consistency between the suspects statements and the evidence that the interrogator holds). [@B32] illustrated that when the SUE technique was employed during individual interviews with group members, lying groups demonstrated lower levels of statement-evidence consistency, within-statement consistency, and within-group consistency, compared with truth-telling groups. Consequently, if specific interview techniques are implemented during the questioning of groups then the issues associated with the consistency heuristic can be eliminated. Future studies should explore the application of other interview techniques to the interviewing of groups as well as examining the application of the SUE technique to collective interviewing contexts whereby group members are interviewed simultaneously.
The theoretical and empirical research on within-group consistency highlights both pitfalls and opportunities. On the one hand, lie catchers should be cautioned to not simply credit consistency and discredit inconsistency. On the other hand, the unanticipated question approach seems to improve the diagnostic value of the consistency cue. However, future research should explore other cues that can be measured when applying this approach to groups of interviewees (e.g., number of details or types of details). Alternative interview techniques that increase the differences between truth-telling groups and lying groups with regard to consistency need to be considered if the diagnostic value of the consistency cue is to improve.
Memory
------
It is widely acknowledged that memory plays an important role in deception ([@B38]; [@B81]; [@B95]; [@B107]). Research on memory is central to verbal veracity assessment tools, such as Reality Monitoring (RM; [@B53]) and Criteria-Based Content Analysis (CBCA; [@B57]), while [@B8] proposition of reconstructive memory is at the heart of the 'repeat vs. reconstruct' hypothesis discussed above ([@B35]). These theories approach memory from the perspective of the individual. However, cognitive psychologists have also considered memory as a social process. These social theories of memory -- including collective memory ([@B7]; [@B74]) and transactive memory ([@B113]; [@B48]) -- can offer unique insights into group deception. Social theories of memory can be applied to group deception in situations where multiple suspects state that they were doing something *together* at the time the crime took place.
Groups influence what individuals learn and how they remember information. Collective memory (often referred to as collaborative learning, collaborative remembering, or joint recall; [@B8]; [@B24]; [@B7]; [@B39]; [@B74]; [@B10]) examines this social nature of memory by treating past experiences and events as memories shared with others ([@B7]; [@B42]; [@B74]). Specifically, it explores how group members collectively recall information together ([@B75]), and so this concept is particularly important to bear in mind when groups of interviewees are interviewed collectively about joint events.
The research investigating collective memory suggests that group collaboration can aid memory through cross-cueing (where members of the group provide cues to one another that increase recall); error-pruning (where feedback from other members of the group create discussions that make people realize their recall errors); and re-exposure (hearing other group members recall information that they themselves had forgotten; [@B78]; [@B11]; [@B74]). When groups of truth-tellers are asked to recall a shared event together, they collectively recall the information, which results in truth-telling groups exhibiting interactions and communications that cannot be unveiled when they are interviewed individually (e.g., posing questions to one another, looking at one another, continuing on from one another, correcting one another, adding information to each other's accounts, finishing each other's sentences). Collective interviewing deception studies have shown that these interactions and communications occur more frequently for truth-telling groups than for lying groups ([@B23]; [@B105]; [@B54],[@B55]; [@B93],[@B94]). This is because the lying group members are merely recalling their planned, vague, fabricated story ([@B37]; [@B85]; [@B102]).
The theory of transactive memory can also be applied to group deception research ([@B23]; [@B54]; [@B93]). This theory is concerned with how groups (and individuals) process and structure information with regard to past events. It was originally developed to examine memory processes within intimate couples ([@B113]), but has now been applied to various different forms of group relationships (including larger networks), such as team performance and knowledge management within the work place ([@B4]; [@B59]; [@B63]). The theory proposes that people in close relationships share cognition and 'think together' by knowing each other's memory expertise and treating one another as external memory aids ([@B113]). This results in a specialized transactive memory system or 'division of labor' that is greater than the total of all the individual memories ([@B115], [@B114]).
The transactive memory system is active at all three stages of memory formation: encoding, storing, and retrieving. First, when information is encoded regarding a shared experience, responsibility for information is automatically divided and shared between all members of the group, so that each person knows what they are to remember as well as what the other group members are to remember ([@B49]). Second, when information is stored, each individual within the pair has remembering responsibilities, knowing what their role is, what they are to remember, and what information the other group members have access to [@B114]. Third, retrieval of information is social and interactive as the group members communicate with one another to retrieve as much information as possible. The communication with one another and the discussion of incoming information enhances their individual recollections. [@B48] refers to the 'transaction memory search' whereby group members who have experienced a past shared event make instinctive use of their transactive memory system to increase recall by posing questions to one another to check information or find out information, cueing one another to remind each other of further information, and handing over remembering responsibility to whoever best remembers that part of the event. These interactive and communicative behaviors between the group members help one another tap into their different memory domains and trigger further information, increasing recall.
When applied to a collective interviewing context, it has been shown that the honest groups display these fundamental interactive and communicative behaviors during joint recall significantly more than the lying groups ([@B93]). Lying groups, after all, are inventing shared events. Without the shared transactive memory system for encoding, storing and retrieving information, lying group members rely on their individual cognitive abilities to create a story that makes sense and matches with what the other group members are saying ([@B41]). This makes it difficult for lying groups to illustrate the same degree of interactive and communicative behaviors as truth-telling groups. Consequently, deceptive communication from group members interviewed collectively is characterized by the absence of social and interactive behaviors as they recall their fabricated story ([@B23]; [@B105]; [@B54],[@B55]; [@B93],[@B94]), and only provide prepared answers to expected questions ([@B37]; [@B85]; [@B102]).
To summarize, reconstructive memory can help explain the differences between truth-telling groups and lying groups regardless of whether the group members are interviewed individually or collectively, whereas collective memory and transactive memory can most appropriately be applied to the context of collective interviewing. Nevertheless, all three theories highlight the important role that memory plays in the recall of information and thus the detection of deception. That is, group members recalling an actual experienced joint event will do so in a different manner to group members who are attempting to recall a fabricated joint event, and the more that is understood about these differences in recall, the more that can be learnt about the possible cues to deception that may arise from groups. Future studies that explore groups within the area of investigative interviewing and deception detection should consider memory and the effects of joint recall on cues to deceit.
Although group collaboration can aid memory, it can also hinder memory. This is because other people can act as a source of misinformation whereby people conform to what other group members are saying regardless of what they themselves actually remember ([@B64]). Additionally, memory contamination can occur whereby one group member causes other group members to remember information incorrectly ([@B28]). Whilst the memory literature suggests that collaborative groups (group members recalling information together) recall significantly more information than individual group members (each group member recalling information alone), some studies show that nominal groups (pooled individuals whereby the group members recall information individually, but details are summed so that any duplicate details are removed) recall significantly more information than collaborative groups (often referred to as *collaborative inhibition*; [@B9]; [@B116]). Consequently, this collaborative inhibition needs to be considered when interviewing groups collectively to detect deceit.
Collaborative inhibition implies that interviewing group members separately is better than interviewing group members collectively (in terms of the amount of information obtained). However, individual interviewing of groups requires more resources and time, and is not suitable for all situations where groups need to be interviewed, for example, when there is only one interviewer available but multiple suspects (e.g., during police 'stop and search' or at road border control where cars containing multiple people need to be questioned). Additionally, separating the group to be interviewed removes the ability to measure communicative and interactive cues as indicators of deceit. Future research needs to consider what technique -- interviewing group members individually or interviewing group members collectively -- leads to the most accurate recall of information and also elicits useful, and identifiable, cues to deceit. It is likely that a combination of both individual interviewing, and collective interviewing, of group members will be required if all circumstances in which groups need to be questioned are considered. If interviewing groups individually and interviewing groups collectively are implemented into practice, future studies need to determine which interviewing technique should be implemented in which contexts, and if both techniques are needed for a particular situation, then the sequence in which they should be conducted needs to be established (i.e., interview the group collectively then individually or vice versa?).
Group Dynamics
--------------
Before mentioning the key concepts behind group dynamics and how these may affect deception detection, we feel it important to briefly mention theories of co-offending. At least four co-offending theories have been proposed; (1) *group influence* (social learning and group pressure lead to co-offending; [@B3]); (2) *social selection* (offenders select each other because they share similar characteristics and interests; [@B25]); (3) *instrumental* (co-offending is easier, more profitable, and less risky than solo offending; [@B108]); (4) *social exchange* (co-offending is a social exchange whereby offenders receive material reward, e.g., payments, and immaterial reward, e.g., social acceptance, that cannot be obtained via solo offending; [@B112]).
Whilst the social exchange theory explains more of the characteristics associated with co-offending than the other three theories, none of the co-offending theories fully explain *all* the characteristics necessary to understand this type of offending. However, taken together, the theories explain: (1) why offenders choose to co-offend; (2) how co-offending takes place; (3) why there is variation between offense types in terms of the proportion of co-offending to solo offending; and (4) the instability of offending groups. An understanding of co-offending and the ways in which offenders select one another and form groups could help investigators develop more appropriate techniques for dealing with groups of offenders, particularly when it comes to establishing the best ways of interviewing these groups and determining whether they are guilty of a crime. According to social exchange theory, who is involved in a particular crime depends on which group members are available and willing ([@B112]). This means that on some occasions not all group members are involved in the offense; therefore it is important to learn how different group members behave during the investigation process depending on whether they were actually involved in committing the offense (i.e., they know the specific details), or whether they are just aware of the offense (i.e., they only know who was involved, but not any details). Group members with differing knowledge about the crime will have an impact upon the amount of information that is revealed during an interview. Consequently, it is important to develop tactics that can be used to establish who knows what within a group. However, to date, no empirical studies have considered the level of knowledge distribution throughout a group and how this can affect cues to deceit.
When investigating a crime, co-offending adds a whole new aspect to detecting deceit that is not present with solo offending, *group dynamics*. Groups emerge when multiple people work together. Each of the group members bond (labeled *group formation*; [@B5]), and as the co-offending theories illustrate, group formation is important to those offenders who are working alongside others. Groups form a structure with each member having a different role and status within the group; thus, if more can be known about how best to interview group members depending on their role or status within the group then more interview protocols can be developed to aid the detection of group deception. Unlike consistency and memory processes, group dynamics have not yet been examined in the deception detection literature, so, at present, we can only speculate about how group processes may influence deception and subsequently cues to deceit. We suggest three potential areas of group dynamics that may be relevant to deception contexts: group cohesiveness ([@B26]); roles or status levels of group members ([@B47]; [@B16]); and cultural influences ([@B45], [@B46]; [@B51]).
Group cohesiveness refers to the properties of a group that effectively bind the group members together to give the group a sense of solidarity ([@B26]). There is suggestive evidence that groups of liars may view threats to group cohesiveness as threats to the group's credibility. As such, groups of liars may be more concerned with maintaining an air of group cohesion compared to groups of truth-tellers. For instance, liars place weight on maintaining within-group consistency ([@B33]), in contrast truth-tellers in collective interviewing situations may be more likely to disrupt or disagree with group members ([@B105]). More nuanced measures of group cohesiveness could provide better cues to deceit.
The roles or levels of status that develop within a group may also be of interest. Roles facilitate group functioning, influencing how group members behave and communicate with one another. For example, those of a higher status (i.e., leaders who are deemed to be more knowledgeable and able to initiate the ideas and activities adopted by the group) will be respected more than those who are of a lower status ([@B47]; [@B16]). Consequently, group members who are of a lower status will be more reluctant to express disagreement with those of a higher status, but more willing to express disagreement with those who are of an equal or lower status to themselves. Communication and interaction cues are important when groups are interviewed collectively ([@B23]; [@B105]; [@B93]). By attending to group roles and the status of group members it may be possible to develop more accurate or even novel communication and interaction cues.
A final concept to consider is how cultural influences can impact group dynamics. Individualistic cultures (predominantly Western societies) highlight the importance of self-reliance, emphasizing individual needs before those of the group. Conversely, collectivistic cultures (predominantly Eastern societies) highlight the importance of interdependence, where the well-being of each individual is related to the success of the group. Emphasis is put on group loyalty and conformity, with the self-identity of each individual developing from the relationships and interconnectedness between all group members ([@B45], [@B46]; [@B51]). The studies that have been conducted with regard to interviewing groups to detect deceit have involved participants from individualistic cultures (e.g., UK, USA, and Sweden). It is expected that findings from group deception studies using participants who support collectivism will be different from those participants who support individualism in terms of the behaviors that they show for protecting the group. It is believed that any findings obtained will be stronger from participants in collectivistic cultures because supporting the group will be more important to them, than those in individualistic cultures. Future research should address the influence of culture on group deception.
To summarize, although co-offending theories and psychological theories associated with group dynamics have not yet been applied to deception detection, they are relevant to how group members behave when being questioned. A better understanding of group dynamics will assist investigators with the best ways of interviewing group members and as a result aid with the detection of deception amongst groups.
Future Research Ideas
=====================
The importance of studying groups (as opposed to lone individuals) is increasingly being recognized within the investigative interviewing and deception detection literature. However, until very recently, the focus was purely on interviewing group members separately (*individual interviewing*). Nowadays, studies are also being conducted into interviewing group members simultaneously (*collective interviewing*; see [@B92] for an overview of this research). Nevertheless, there is still a long way to go before a more complete understanding of the deception occurring within groups and how to detect it is established. Future research ideas have been mentioned throughout the current review; however, there are some additional issues that should be considered if the true effectiveness of detecting deception within groups is to be recognized.
First, deception studies need to consider larger groups. At present, deception studies predominantly involve dyads, with only a few studies considering larger groups (e.g., [@B32] used triads and [@B79] used quartets). It should be possible to apply the findings obtained from the already completed deception experiments using groups to future studies with more than two interviewees, because the theoretical rationale on which the already obtained findings are based (e.g., consistency heuristic, reconstructive memory, transactive memory) should remain the same regardless of group size. However, as group size increases, it is likely that more cues to deceit will be elicited, because the interview process will become more challenging (particularly for liars) as each group member will have more people to manage and correspond with.
Second, there are a number of group processes that could be explored in addition to the ones already mentioned. For example, it would be interesting to consider what would happen if individual group members do not know whether their fellow group members are also being interviewed -- how does this affect their choice of strategy and the information they disclose? The 'Prisoner's Dilemma' is similar, but the group members would instead need to make decisions about cooperating with the group when lacking the knowledge about which group members are actually being interviewed. Additionally, the order in which each group member thinks they are being interviewed could be strategically used during an interview. For example, does the amount of information produced and the elicitation of cues to deceit depend on whether the group member believes they are first, or last, to be questioned? Another idea for a further study would be to include an additional dependent variable where each group member is asked who else they think is being questioned and what information they think their fellow group members will provide.
Third, deception detection studies tend to compare truth-telling participants with lying participants who have perpetrated some kind of misdemeanor that is engineered by the researchers. In real-life, it is not necessarily this clear-cut, especially if a guilty group of suspects has completely innocent people within it. Future research should explore how mixed groups of innocent and guilty individuals behave when interviewed either individually or collectively, and what cues to deceit emerge.
Fourth, the current review has considered each of the theories associated with group deceit as if they are independent of one another. However, it would be interesting for future studies to not only consider the application of each of the individual theories to group deceit and its detection, but also to consider the application of a combination of the theories to group deceit and its detection. For example, the link between joint memory recall and group dynamics and the effect this has on the elicitation of cues to deceit.
Fifth, the vast majority of studies have focused on co-offenders when other group situations are relevant for law enforcement. To our knowledge, the study by [@B69] examining deception in alibi witness situations, is the only group deception study to consider groups other than co-offenders. For a complete understanding of group deception more research of this kind is essential. Additionally, research exploring the best way of determining the accuracy of information provided when multiple witnesses are questioned about the same crime/event would contribute to the knowledge-base on the elicitation of information from groups.
Finally, studies examining the individual interviewing of groups have focused primarily on consistency as a cue to deceit, whereas collective interviewing studies have focused primarily on social cues to deceit. Future studies should therefore measure alternative cues when group members are interviewed individually and/or collectively in order to determine what other cues to deceit can be elicited from groups to enable the correct classification of groups based on veracity.
Practical Implications
======================
Over recent years research has increased our knowledge about what is happening during suspect interviews (e.g., [@B80]; [@B109]). However, in order to inform practice, there is a need to reach beyond descriptive research that focuses on gathering facts, and set up studies that can generate more normative knowledge. By doing such research one can identify how the current approaches that are used during investigative interviewing can be improved, which can also help to identify which approaches are most effective in each given context.
Although some law enforcement personnel currently conduct collective interviews in some situations, the interview manuals and training programs typically utilized by police and other law enforcement agencies focus on the interviewing of lone individuals. Consequently, the interviewing tactics and techniques that investigators are primarily taught, such as the PEACE model ([@B1]) or Behavioral Analysis Interview (BAI; [@B52]), and the cues to deceit that they choose to measure (e.g., consistency or nervousness; [@B99]), are developed around research into lone individuals. Hence, these interview manuals and training programs have very little, if any, information about how best to interview groups and what deception cues to observe when more than one individual is being interviewed about a joint offense. As highlighted within the current review, knowledge about lone individuals cannot always translate to groups of individuals, yet co-offending occurs frequently. The current review demonstrates that by not truly understanding groups, a large number of opportunities to employ novel or existing interviewing techniques to detect deceit are being missed (e.g., the ability to apply a collective interviewing approach or how best to measure and elicit within-group consistency). Hence, by offering both theoretical and empirical insights on how to interview groups of suspects, the current review can inform policy and practice. It suggests that the framework of police interview manuals and training programs should be revised to include more specific tactics and techniques for group situations. If this occurs then investigators will have a wider range of tools and a greater understanding of what interviewing techniques and tactics to employ when they have a co-offending situation and need to detect deception occurring within groups.
Furthermore, the current review has implications that stretch beyond the traditional law enforcement context. For example, it might guide policy with respect to techniques for both collecting and assessing the reliability of human intelligence. Specifically, the recent congressional amendment---To Reaffirm the Prohibition on Torture Amendment (2015)---strictly limits the US interrogation procedures to the methods listed in the ([@B89]). The amendment also requires the regular update of the manual based on the best available scientific evidence. Currently, the Army Field Manual says little about group interviewing situations. The current review therefore acts as a first step to fill this gap and as a call for researchers to continue important work on this topic area.
Conclusion
==========
The interviewing of groups to detect deceit about joint events is different from interviewing lone individuals to detect deceit about solo events. In group situations, not only can group deception be explored but so can individual deception, resulting in the measurement of considerably more cues to deceit. This is because unique cues that cannot be explored in lone individuals can also be measured, such as within-group consistency or cues stemming from the way that group members communicate and interact with one another. Additionally, being part of a group is more cognitively demanding in itself because each group member has to think about what they say as well as what others might say. Whether group members should be interviewed individually or collectively depends on each given situation. As the current review highlights, there are benefits to both techniques and unique cues to deception that can emerge depending on the interview style employed. Overall, there is the opportunity for investigators to develop interview protocols based on group dynamics that allows for key differences between truth-telling groups and lying groups to emerge. There is currently a lack of studies exploring group deception and its detection, yet a clearer and more accurate understanding of the deception occurring within groups and the strategies groups employ would benefit criminal, security, and intelligence investigations; and thus be of value to crime prevention and policy.
Author Contributions
====================
All three authors worked together to develop the idea about the review paper and how it should be structured. ZV did the majority of the writing and put the manuscript together. ZV received frequent comments and amendments from both P-AG and EM throughout the writing process. Several meetings were held with all three authors present. The manuscript has been checked by all three authors prior to submitting.
Conflict of Interest Statement
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
[^1]: Edited by: *Ulrich Hoffrage, University of Lausanne, Switzerland*
[^2]: Reviewed by: *Michael Timothy Bradley, University of New Brunswick, Canada; James Driskell, Florida Maxima Corporation, USA*
[^3]: This article was submitted to Cognition, a section of the journal Frontiers in Psychology
| {
"pile_set_name": "PubMed Central"
} |
Q:
Ought you study Complex Analysis and/or Variables in university?
I deliberately haven't stipulated the kind of Quant job, as I'm asking in general. This r/quant comment answers "what is complex analysis used for in quant finance?":
Some pricing models, and some analysis of distributions. E.g. Option valuation using the fast Fourier transform
by Peter Carr and Dilip B. Madan has 2207 citations according to Google.
But can you learn Complex Analysis and/or Variables on your own? Or ought you study them in university? I'm assuming Complex Analysis and Variables differ like how regular and honors multivariable calculus. Physics Forums:
The impression I have is that the Complex Variables class is more concerned with computation and calculus using complex numbers (something that as a physicist you may have to do a lot). And the Complex Analysis class will be more about developing the theory of complex numbers and their use in calculus and whatnot. A complex analysis course will mostly be concerned with proving things, while I imagine the complex variables class will be all about using complex numbers to help with computation.
In my grad complex analysis class, we reviewed the entire complex variables course in a day and a half. In other words, the variables course is sort of a prereq for the analysis course. Depending on your familiarity with the complex plane, some topology, and calculus, you could probably go into the analysis class directly. It's certainly more enjoyable.
Dr Transport wrote
Unless you do a PhD in Mathematical Physics, a theorem-proof class in my opinion would not be that helpful. I'm a theoretician and have not had a need for that level of mathematical rigor.
Mathwonk wrote
I am not a physicist, I am a mathematician, but I have taught both those courses. I would imagine that for you the applied course is more useful. I.e. you would probably rather understand how to use complex analysis than how to prove the theorems.
Andy Nguyen discourages it:
Complex analysis has little to no use in FE program. You would better off spend the summer working on your C++.
Vic_Siqiao:
complex analysis has no direct use in FE, but it helps sometimes do calculations invloving complex variables. and i think some topics such as residual theorem are important, which i was asked in a fin math program interview.
macroeconomicus:
I think stochastic calculus will give you better benefit/cost at this stage. Stochastic calculus is used a lot in asset pricing and mathematical finance, and I assume in some other subjects in economics (macro perhaps?). Complex analysis is used a little in advanced probability to work with characteristic functions and such, and also for some things in time series, but you probably don't need to take a whole analysis course to follow. I heard you can just pick it up along the way.
A:
In the context of mathematical finance and financial economics, complex analysis naturally arise in derivative pricing. Specifically, some models impose that the conditional characteristic function of the underlying will be affine in all state variables. In those cases, you can generally obtain a quasi-analytical formula for pricing European options where you evaluate an integral whose integrand is a function of the conditional characteristic function of the underlying. It looks something like this:
\begin{equation}
\int_0^\infty \text{Imag}\left( g \circ \psi(\phi - i) \right) d\phi
\end{equation}
Because of the conditional characteristic function $\psi(.)$, $g \circ \psi(\phi - i)$ is going to be complex-valued, so it spits out numbers of the form $a+bi$ where $i^2 = -1$. You're really just working with a grid of $\phi'$s and a corresponding grid of $b'$s when you seek to numerically approximate this integral... So, you don't need a whole course in complex analysis to understand this.
Another place where you will find complex analysis is in time series econometrics. The reason is that you can think of a time series in the time space, just as in the frequency space. I have seen a lot of people trying to get papers on this subject off the ground, but it's the sort of paper almost no one reads -- and even less uses in practice.
My advice: if you're going to put time on something, put time on stochastic calculus and computer programming. Why? Stochastic calculus is the lingua franca of deritative pricing, so almost no matter what you do, it will be useful. As for computer programming, you need to be able to solve problems numerically, as well as to implement analytical solutions. There's nothing like getting your hands dirty, trying to do everything from the theory to the calibration to the data to understand how models work (and sometimes don't work).
| {
"pile_set_name": "StackExchange"
} |
Q:
jQuery .find() in server response
I am trying to get the text inside a specific div in a server response. I used Firebug to see what the response was, and I can see my element in the returned code, but for some reason I can get jQuery to capture it. Here is what I am using:
var response = $('<div />').html(serverData);
$('#uploadedFiles').html($(response).find("#created").text());
alert($(response).find("#created").text());
Trying that just returns nothing, not text or anything. Am I doing this correctly?
Note: The server response is not from a jQuery ajax function, rather from the jQuery SWFUpload plugin, would this matter though?
A:
When are you running the code? If you run it before the uploadedFile element is created, the code will not find it.
I tested this, and it works just fine, it alerts "asdf" and then replaces "test" with "asdf" in the div element:
<script type="text/javascript">
$(function(){
var response = $('<div />').html('<div id="created">asdf</div>');
alert(response.find("#created").text());
$('#uploadedFiles').html(response.find("#created").text());
});
</script>
<div id="uploadedFiles">test</div>
Note that response is alread a jQuery object, so $(response) is redundant.
| {
"pile_set_name": "StackExchange"
} |
Intel has confirmed that recent patches to its Linux graphics driver were related to its continued work on preparing the ecosystem for its new line of discrete graphics cards.
Phoronix reported that Intel released 42 such patches with more than 4,000 lines of code between them on February 14. The main purpose of the patches was to introduce the concept of memory regions in "preparation for upcoming devices with device local memory." (Such as, you know, discrete graphics cards.)
The integrated GPUs found in many of Intel's CPUs don't rely on this memory region setup, so all signs pointed towards the Linux drivers being part of Intel's plans to build standalone GPUs. Just in case those signs weren't obvious enough, however, Intel has confirmed the motivation behind these drivers in a tweet:
"Our journey toward a new visual computing experience is underway, and that includes a commitment to the #OpenSource community. Local memory implementation is the first of many steps toward robust Linux support for our future discrete graphics solutions." (Followed by a link to the patches.)
Intel has been clear about its intentions for the graphics market. The company said in December 2018 that it's working on everything from integrated GPUs and discrete graphics for gaming to GPUs for data centers. Those products are set to make their debut in 2020; of course, Intel's testing the drivers required to make them run.
That also tracks with Phoronix's observation that Intel typically releases preliminary Linux drivers roughly a year before new hardware debuts. (Or at least when Intel plans to release that hardware, barring any delays.) The company will probably release similar patches in the coming months.
Still, any information about Intel's graphics plans is welcome. Right now the graphics market is dominated by AMD and Nvidia, and as we noted in December, Intel is probably the only company that even has a possibility of successfully introducing a new discrete graphics architecture. Why not enjoy the occasional glimpse behind the curtain as that architecture's being built?
Want to comment on this story? Let us know what you think in the Tom's Hardware Forums. | {
"pile_set_name": "OpenWebText2"
} |
NEW YORK (AP) — As Donald Trump approaches his inauguration, young Americans have a deeply pessimistic view about his incoming administration, with young blacks, Latinos and Asian Americans particularly concerned about what's to come in the next four years.
U.S.President-elect Donald Trump speaks to members of the news media with television personality Steve Harvey (R) and businessman Greg Calhoun after their meeting at Trump Tower in New York, U.S., January 13, 2017. REUTERS/Shannon Stapleton NEW YORK (AP) — As Donald Trump approaches his inauguration, young Americans have a deeply pessimistic view about his incoming administration, with young blacks, Latinos and Asian Americans particularly concerned about what's to come in the next four years.
That's according to a new GenForward poll of Americans aged 18 to 30, which found that the country's young adults are more likely to expect they'll be worse off at the end of Trump's first term than better off. Such young Americans are also far more likely to think Trump will divide the country than unite it, by a 60 percent to 19 percent margin.
Fifty-two percent of young whites, 72 percent of Latinos, 66 percent of Asian-Americans and 70 percent of blacks think Trump's presidency will lead to a more divided nation.
"Minority people are very afraid of all the rhetoric that he ran upon (in) his campaign," said Jada Selma, a 28-year-old African-American graduate school student living in Atlanta. "Anytime he mentioned black people, he would talk about poor people or inner city. He would think that all of us live in the inner city and that we're all poor."
"If you're not a straight white male, than I don't think he's looking out for you as an American," she said.
GenForward is a survey of adults age 18 to 30 by the Black Youth Project at the University of Chicago with the Associated Press-NORC Center for Public Affairs Research. The first-of-its-kind poll pays special attention to the voices of young adults of color, highlighting how race and ethnicity shape the opinions of a new generation.
The poll found that 54 percent of young people overall say life for people of color will be worse with Trump as president. About two-thirds of young blacks, Asian-Americans and Latinos think things will get worse for people of color, and whites are also more likely to expect things to get worse than better for minorities, 46 percent to 21 percent.
Overall, 40 percent of young adults think they personally will be worse off four years from now, while just 23 percent expect to be better off. Young people of color are significantly more likely to think they will be worse off than better off, while young whites are more split in their personal expectations.
Kuinta Hayle, a 21-year-old African-American from Charlotte, said she is worried that Trump's selection for attorney general, Alabama Sen. Jeff Sessions, could roll back civil rights. She said Trump's foray into "birtherism," during which he propagated the lie that President Barack Obama was not born in the United States, still bothered her.
"That was very meaningful. It still hurts," Hayle said. "He doesn't know anything about my life or the lives of people who aren't like him. I feel Donald Trump is only for rich people. Obama was for people who didn't have much."
Demonstrators hold signs outside Trump Tower during a protest march against President-elect Donald Trump in Manhattan, New York, U.S. November 9, 2016. Andrew Kelly/Reuters
Although he had a decisive win in the Electoral College, Trump lost the overall popular vote to opponent Hillary Clinton and has done little to reach out to those who didn't support him in November's election. He focused his post-election "Thank You" tour on states he won, settling scores on stage as he boasted about his surprising electoral victory.
Over the weekend, Trump tore into Georgia Rep. John Lewis, among the most revered leaders of the civil rights movement, for questioning the legitimacy of his victory and saying he would not attend Friday's inauguration.
As for Obama's presidency, young Americans are split on whether he has done more to unite or divide Americans, 38 percent to 35 percent, with 26 percent saying it did neither.
Young blacks (57 percent to 16 percent), Latinos (57 percent to 19 percent) and Asian Americans (46 percent to 27 percent) are far more likely to say Obama united than divided Americans. But young whites are more likely to say, by a 46 percent to 26 percent margin, that Obama's presidency was a dividing force.
Indeed, not all young Americans are pessimistic about the incoming president.
"He'll be good for the economy. He's a businessman and he'll bring more jobs back," said Francisco Barrera, 26, of Ft. Wayne, Indiana, who voted for Trump. "I think he's going to do good and he's going to end this political correctness. You can't even say 'God' in the schools no more. Trump will put him back."
A majority of young adults think Trump will go down in history as not a very good president or a poor one. Young people of color are particularly likely to think Trump's presidency will be not good or poor, but even young whites are more likely to expect that than to think it will be good or great, 48 percent to 27 percent.
Young Americans are divided as to whether Trump will accomplish his campaign promises. While most think he'll probably cut taxes for the rich and more than half of young people (59 percent) think Trump will deport millions of immigrants living in the country illegally, just 39 percent expect that he will be successful in building a wall along the Mexican border.
However, about half of young Hispanics think that Trump is likely to build a border wall. And more than 7 in 10 young people believe he will definitely or probably succeed at repealing the Affordable Care Act.
"He's not even been inaugurated yet and he's already alienating people," said Greg Davis, a white 28-year-old graduate student living in Columbus, Ohio. "He's still parroting the alt-right's messages. His policy ideas I think would be awful. His nominees for Cabinet positions are disastrous. He's nominating people who have the exactly the wrong ideas."
"I think it's going to be a disaster," Davis said.
___
The poll of 1,823 adults age 18-30 was conducted Dec. 9-12, 2016 using a sample drawn from the probability-based GenForward panel, which is designed to be representative of the U.S. young adult population. The margin of sampling error for all respondents is plus or minus 4 percentage points.
The survey was paid for by the Black Youth Project at the University of Chicago, using grants from the John D. and Catherine T. MacArthur Foundation and the Ford Foundation.
Respondents were first selected randomly using address-based sampling methods, and later interviewed online or by phone.
___
Online:
GenForward polls: http://www.genforwardsurvey.com/
Black Youth Project: http://blackyouthproject.com/
AP-NORC: http://www.apnorc.org/
___
AP Polling Editor Emily Swanson reported from Washington. | {
"pile_set_name": "OpenWebText2"
} |
Tupac Shakur's plans for a restaurant will finally be fulfilled. 20 years after the iconic rapper's death, Tupac's Powamekka Café is set to become a reality. Take 3 Burgers has partnered with Fresno Grizzlies Marketing Director Sam Hansen to create a one-day, pop-up restaurant using sketches for the café drawn by Tupac before his death.
"Tupac Shakur left behind detailed sketches and notes for the logo and menu of the restaurant he planned on opening before his death," reads the caption of an Instagram post of the sketche. "Pac's vision becomes a reality on September, 13th. @take3burgers #powamekkacafe *you can zoom in on IG now."
Tupac was going to open the Powamekka Café in Los Angeles before his death. The rapper's dream will now come to life at the Take 3 Burgers location in the Fulton Mall in Fresno. The menu will feature such items as the California Love chicken sandwich and Thug Passion cake pops.
The restaurant's creation is thanks in large part to the work of Sam Hansen who previously collaborated with Kanye West on designs and merchandise. Hansen also gained some notoriety for transforming a Fresno Grizzlies concessions stand into a version of the fast food chain featured in the cult classic Good Burger.
"Working on Powamekka Café makes me feel like I’m bringing Pac’s vision to life like I used to do for Kanye," Hansen told the Business Journal.
The Powamekka Café will only exist on Sept. 13, so diehard Tupac fans better make travel arrangements quickly. The event will be capped off by local musicians playing covers of Tupac's work. | {
"pile_set_name": "OpenWebText2"
} |
# This file is a Tcl script to test the code in the file tkTextIndex.c.
# This file is organized in the standard fashion for Tcl tests.
#
# Copyright (c) 1994 The Regents of the University of California.
# Copyright (c) 1994 Sun Microsystems, Inc.
# Copyright (c) 1998-1999 by Scriptics Corporation.
# All rights reserved.
package require tcltest 2.1
eval tcltest::configure $argv
tcltest::loadTestedCommands
namespace import -force tcltest::test
catch {destroy .t}
text .t -font {Courier -12} -width 20 -height 10
pack append . .t {top expand fill}
update
.t debug on
wm geometry . {}
# The statements below reset the main window; it's needed if the window
# manager is mwm to make mwm forget about a previous minimum size setting.
wm withdraw .
wm minsize . 1 1
wm positionfrom . user
wm deiconify .
.t insert 1.0 "Line 1
abcdefghijklm
12345
Line 4
b\u4e4fy GIrl .#@? x_yz
!@#$%
Line 7"
image create photo textimage -width 10 -height 10
textimage put red -to 0 0 9 9
test textIndex-1.1 {TkTextMakeByteIndex} {testtext} {
# (lineIndex < 0)
testtext .t byteindex -1 3
} {1.0 0}
test textIndex-1.2 {TkTextMakeByteIndex} {testtext} {
# (lineIndex < 0), because lineIndex == strtol(argv[2]) - 1
testtext .t byteindex 0 3
} {1.0 0}
test textIndex-1.3 {TkTextMakeByteIndex} {testtext} {
# not (lineIndex < 0)
testtext .t byteindex 1 3
} {1.3 3}
test textIndex-1.4 {TkTextMakeByteIndex} {testtext} {
# (byteIndex < 0)
testtext .t byteindex 3 -1
} {3.0 0}
test textIndex-1.5 {TkTextMakeByteIndex} {testtext} {
# not (byteIndex < 0)
testtext .t byteindex 3 3
} {3.3 3}
test textIndex-1.6 {TkTextMakeByteIndex} {testtext} {
# (indexPtr->linePtr == NULL)
testtext .t byteindex 9 2
} {8.0 0}
test textIndex-1.7 {TkTextMakeByteIndex} {testtext} {
# not (indexPtr->linePtr == NULL)
testtext .t byteindex 7 2
} {7.2 2}
test textIndex-1.8 {TkTextMakeByteIndex: shortcut for 0} {testtext} {
# (byteIndex == 0)
testtext .t byteindex 1 0
} {1.0 0}
test textIndex-1.9 {TkTextMakeByteIndex: shortcut for 0} {testtext} {
# not (byteIndex == 0)
testtext .t byteindex 3 80
} {3.5 5}
test textIndex-1.10 {TkTextMakeByteIndex: verify index is in range} {testtext} {
# for (segPtr = indexPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# one segment
testtext .t byteindex 3 5
} {3.5 5}
test textIndex-1.11 {TkTextMakeByteIndex: verify index is in range} {testtext} {
# for (segPtr = indexPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# index += segPtr->size
# Multiple segments, make sure add segment size to index.
.t mark set foo 3.2
set x [testtext .t byteindex 3 7]
.t mark unset foo
set x
} {3.5 5}
test textIndex-1.12 {TkTextMakeByteIndex: verify index is in range} {testtext} {
# (segPtr == NULL)
testtext .t byteindex 3 7
} {3.5 5}
test textIndex-1.13 {TkTextMakeByteIndex: verify index is in range} {testtext} {
# not (segPtr == NULL)
testtext .t byteindex 3 4
} {3.4 4}
test textIndex-1.14 {TkTextMakeByteIndex: verify index is in range} {testtext} {
# (index + segPtr->size > byteIndex)
# in this segment.
testtext .t byteindex 3 4
} {3.4 4}
test textIndex-1.15 {TkTextMakeByteIndex: verify index is in range} {testtext} {
# (index + segPtr->size > byteIndex), index != 0
# in this segment.
.t mark set foo 3.2
set x [testtext .t byteindex 3 4]
.t mark unset foo
set x
} {3.4 4}
test textIndex-1.16 {TkTextMakeByteIndex: UTF-8 characters} {testtext} {
testtext .t byteindex 5 100
} {5.18 20}
test textIndex-1.17 {TkTextMakeByteIndex: prevent splitting UTF-8 character} \
{testtext} {
# ((byteIndex > index) && (segPtr->typePtr == &tkTextCharType))
# Wrong answer would be \xb9 (the 2nd byte of UTF rep of 0x4e4f).
set x [testtext .t byteindex 5 2]
list $x [.t get insert]
} {{5.2 4} y}
test textIndex-1.18 {TkTextMakeByteIndex: prevent splitting UTF-8 character} \
{testtext} {
# ((byteIndex > index) && (segPtr->typePtr == &tkTextCharType))
testtext .t byteindex 5 1
.t get insert
} "\u4e4f"
test textIndex-2.1 {TkTextMakeCharIndex} {
# (lineIndex < 0)
.t index -1.3
} 1.0
test textIndex-2.2 {TkTextMakeCharIndex} {
# (lineIndex < 0), because lineIndex == strtol(argv[2]) - 1
.t index 0.3
} 1.0
test textIndex-2.3 {TkTextMakeCharIndex} {
# not (lineIndex < 0)
.t index 1.3
} 1.3
test textIndex-2.4 {TkTextMakeCharIndex} {
# (charIndex < 0)
.t index 3.-1
} 3.0
test textIndex-2.5 {TkTextMakeCharIndex} {
# (charIndex < 0)
.t index 3.3
} 3.3
test textIndex-2.6 {TkTextMakeCharIndex} {
# (indexPtr->linePtr == NULL)
.t index 9.2
} 8.0
test textIndex-2.7 {TkTextMakeCharIndex} {
# not (indexPtr->linePtr == NULL)
.t index 7.2
} 7.2
test textIndex-2.8 {TkTextMakeCharIndex: verify index is in range} {
# for (segPtr = indexPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# one segment
.t index 3.5
} 3.5
test textIndex-2.9 {TkTextMakeCharIndex: verify index is in range} {
# for (segPtr = indexPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# Multiple segments, make sure add segment size to index.
.t mark set foo 3.2
set x [.t index 3.7]
.t mark unset foo
set x
} 3.5
test textIndex-2.10 {TkTextMakeCharIndex: verify index is in range} {
# (segPtr == NULL)
.t index 3.7
} 3.5
test textIndex-2.11 {TkTextMakeCharIndex: verify index is in range} {
# not (segPtr == NULL)
.t index 3.4
} 3.4
test textIndex-2.12 {TkTextMakeCharIndex: verify index is in range} {
# (segPtr->typePtr == &tkTextCharType)
# Wrong answer would be \xb9 (the 2nd byte of UTF rep of 0x4e4f).
.t mark set insert 5.2
.t get insert
} y
test textIndex-2.13 {TkTextMakeCharIndex: verify index is in range} {
# not (segPtr->typePtr == &tkTextCharType)
.t image create 5.2 -image textimage
.t mark set insert 5.5
set x [.t get insert]
.t delete 5.2
set x
} "G"
test textIndex-2.14 {TkTextMakeCharIndex: verify index is in range} {
# (charIndex < segPtr->size)
.t image create 5.0 -image textimage
set x [.t index 5.0]
.t delete 5.0
set x
} 5.0
.t mark set foo 3.2
.t tag add x 2.8 2.11
.t tag add x 6.0 6.2
set weirdTag "funny . +- 22.1\n\t{"
.t tag add $weirdTag 2.1 2.6
set weirdMark "asdf \n{-+ 66.2\t"
.t mark set $weirdMark 4.0
.t tag config y -relief raised
set weirdImage "foo-1"
.t image create 2.1 -image [image create photo $weirdImage]
set weirdEmbWin ".t.bar-1"
entry $weirdEmbWin
.t window create 3.1 -window $weirdEmbWin
test textIndex-3.1 {TkTextGetIndex, weird mark names} {
list [catch {.t index $weirdMark} msg] $msg
} {0 4.0}
test textIndex-3.2 {TkTextGetIndex, weird mark names} knownBug {
list [catch {.t index "$weirdMark -1char"} msg] $msg
} {0 4.0}
test textIndex-3.3 {TkTextGetIndex, weird embedded window names} {
list [catch {.t index $weirdEmbWin} msg] $msg
} {0 3.1}
test textIndex-3.4 {TkTextGetIndex, weird embedded window names} knownBug {
list [catch {.t index "$weirdEmbWin -1char"} msg] $msg
} {0 3.0}
test textIndex-3.5 {TkTextGetIndex, weird image names} {
list [catch {.t index $weirdImage} msg] $msg
} {0 2.1}
test textIndex-3.6 {TkTextGetIndex, weird image names} knownBug {
list [catch {.t index "$weirdImage -1char"} msg] $msg
} {0 2.0}
.t delete 3.1 ; # remove the weirdEmbWin
.t delete 2.1 ; # remove the weirdImage
test textIndex-4.1 {TkTextGetIndex, tags} {
list [catch {.t index x.first} msg] $msg
} {0 2.8}
test textIndex-4.2 {TkTextGetIndex, tags} {
list [catch {.t index x.last} msg] $msg
} {0 6.2}
test textIndex-4.3 {TkTextGetIndex, weird tags} {
list [.t index $weirdTag.first+1c] [.t index $weirdTag.last+2c]
} {2.2 2.8}
test textIndex-4.4 {TkTextGetIndex, tags} {
list [catch {.t index x.gorp} msg] $msg
} {1 {bad text index "x.gorp"}}
test textIndex-4.5 {TkTextGetIndex, tags} {
list [catch {.t index foo.last} msg] $msg
} {1 {bad text index "foo.last"}}
test textIndex-4.6 {TkTextGetIndex, tags} {
list [catch {.t index y.first} msg] $msg
} {1 {text doesn't contain any characters tagged with "y"}}
test textIndex-4.7 {TkTextGetIndex, tags} {
list [catch {.t index x.last,} msg] $msg
} {1 {bad text index "x.last,"}}
test textIndex-4.8 {TkTextGetIndex, tags} {
.t tag add z 1.0
set result [list [.t index z.first] [.t index z.last]]
.t tag delete z
set result
} {1.0 1.1}
test textIndex-5.1 {TkTextGetIndex, "@"} {nonPortable fonts} {
.t index @12,9
} 1.1
test textIndex-5.2 {TkTextGetIndex, "@"} {fonts} {
.t index @-2,7
} 1.0
test textIndex-5.3 {TkTextGetIndex, "@"} {fonts} {
.t index @10,-7
} 1.0
test textIndex-5.4 {TkTextGetIndex, "@"} {fonts} {
list [catch {.t index @x} msg] $msg
} {1 {bad text index "@x"}}
test textIndex-5.5 {TkTextGetIndex, "@"} {fonts} {
list [catch {.t index @10q} msg] $msg
} {1 {bad text index "@10q"}}
test textIndex-5.6 {TkTextGetIndex, "@"} {fonts} {
list [catch {.t index @10,} msg] $msg
} {1 {bad text index "@10,"}}
test textIndex-5.7 {TkTextGetIndex, "@"} {fonts} {
list [catch {.t index @10,a} msg] $msg
} {1 {bad text index "@10,a"}}
test textIndex-5.8 {TkTextGetIndex, "@"} {fonts} {
list [catch {.t index @10,9,} msg] $msg
} {1 {bad text index "@10,9,"}}
test textIndex-6.1 {TkTextGetIndex, numeric} {
list [catch {.t index 2.3} msg] $msg
} {0 2.3}
test textIndex-6.2 {TkTextGetIndex, numeric} {
list [catch {.t index -} msg] $msg
} {1 {bad text index "-"}}
test textIndex-6.3 {TkTextGetIndex, numeric} {
list [catch {.t index 2.end} msg] $msg
} {0 2.13}
test textIndex-6.4 {TkTextGetIndex, numeric} {
list [catch {.t index 2.x} msg] $msg
} {1 {bad text index "2.x"}}
test textIndex-6.5 {TkTextGetIndex, numeric} {
list [catch {.t index 2.3x} msg] $msg
} {1 {bad text index "2.3x"}}
test textIndex-7.1 {TkTextGetIndex, miscellaneous other bases} {
list [catch {.t index end} msg] $msg
} {0 8.0}
test textIndex-7.2 {TkTextGetIndex, miscellaneous other bases} {
list [catch {.t index foo} msg] $msg
} {0 3.2}
test textIndex-7.3 {TkTextGetIndex, miscellaneous other bases} {
list [catch {.t index foo+1c} msg] $msg
} {0 3.3}
test textIndex-8.1 {TkTextGetIndex, modifiers} {
list [catch {.t index 2.1+1char} msg] $msg
} {0 2.2}
test textIndex-8.2 {TkTextGetIndex, modifiers} {
list [catch {.t index "2.1 +1char"} msg] $msg
} {0 2.2}
test textIndex-8.3 {TkTextGetIndex, modifiers} {
list [catch {.t index 2.1-1char} msg] $msg
} {0 2.0}
test textIndex-8.4 {TkTextGetIndex, modifiers} {
list [catch {.t index {2.1 }} msg] $msg
} {0 2.1}
test textIndex-8.5 {TkTextGetIndex, modifiers} {
list [catch {.t index {2.1+foo bar}} msg] $msg
} {1 {bad text index "2.1+foo bar"}}
test textIndex-8.6 {TkTextGetIndex, modifiers} {
list [catch {.t index {2.1 foo bar}} msg] $msg
} {1 {bad text index "2.1 foo bar"}}
test textIndex-9.1 {TkTextIndexCmp} {
list [.t compare 3.1 < 3.2] [.t compare 3.1 == 3.2]
} {1 0}
test textIndex-9.2 {TkTextIndexCmp} {
list [.t compare 3.2 < 3.2] [.t compare 3.2 == 3.2]
} {0 1}
test textIndex-9.3 {TkTextIndexCmp} {
list [.t compare 3.3 < 3.2] [.t compare 3.3 == 3.2]
} {0 0}
test textIndex-9.4 {TkTextIndexCmp} {
list [.t compare 2.1 < 3.2] [.t compare 2.1 == 3.2]
} {1 0}
test textIndex-9.5 {TkTextIndexCmp} {
list [.t compare 4.1 < 3.2] [.t compare 4.1 == 3.2]
} {0 0}
test textIndex-10.1 {ForwBack} {
list [catch {.t index {2.3 + x}} msg] $msg
} {1 {bad text index "2.3 + x"}}
test textIndex-10.2 {ForwBack} {
list [catch {.t index {2.3 + 2 chars}} msg] $msg
} {0 2.5}
test textIndex-10.3 {ForwBack} {
list [catch {.t index {2.3 + 2c}} msg] $msg
} {0 2.5}
test textIndex-10.4 {ForwBack} {
list [catch {.t index {2.3 - 3ch}} msg] $msg
} {0 2.0}
test textIndex-10.5 {ForwBack} {
list [catch {.t index {1.3 + 3 lines}} msg] $msg
} {0 4.3}
test textIndex-10.6 {ForwBack} {
list [catch {.t index {2.3 -1l}} msg] $msg
} {0 1.3}
test textIndex-10.7 {ForwBack} {
list [catch {.t index {2.3 -1 gorp}} msg] $msg
} {1 {bad text index "2.3 -1 gorp"}}
test textIndex-10.8 {ForwBack} {
list [catch {.t index {2.3 - 4 lines}} msg] $msg
} {0 1.3}
test textIndex-10.9 {ForwBack} {
.t mark set insert 2.0
list [catch {.t index {insert -0 chars}} msg] $msg
} {0 2.0}
test textIndex-10.10 {ForwBack} {
.t mark set insert 2.end
list [catch {.t index {insert +0 chars}} msg] $msg
} {0 2.13}
test textIndex-11.1 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 -7
} {1.3 3}
test textIndex-11.2 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 5
} {2.8 8}
test textIndex-11.3 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 10
} {2.13 13}
test textIndex-11.4 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 11
} {3.0 0}
test textIndex-11.5 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 57
} {7.6 6}
test textIndex-11.6 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 58
} {8.0 0}
test textIndex-11.7 {TkTextIndexForwBytes} {testtext} {
testtext .t forwbytes 2.3 59
} {8.0 0}
test textIndex-12.1 {TkTextIndexForwChars} {
# (charCount < 0)
.t index {2.3 + -7 chars}
} 1.3
test textIndex-12.2 {TkTextIndexForwChars} {
# not (charCount < 0)
.t index {2.3 + 5 chars}
} 2.8
test textIndex-12.3 {TkTextIndexForwChars: find index} {
# for ( ; segPtr != NULL; segPtr = segPtr->nextPtr)
# one loop
.t index {2.3 + 9 chars}
} 2.12
test textIndex-12.4 {TkTextIndexForwChars: find index} {
# for ( ; segPtr != NULL; segPtr = segPtr->nextPtr)
# multiple loops
.t mark set foo 2.5
set x [.t index {2.3 + 9 chars}]
.t mark unset foo
set x
} 2.12
test textIndex-12.5 {TkTextIndexForwChars: find index} {
# for ( ; segPtr != NULL; segPtr = segPtr->nextPtr)
# border condition: last char
.t index {2.3 + 10 chars}
} 2.13
test textIndex-12.6 {TkTextIndexForwChars: find index} {
# for ( ; segPtr != NULL; segPtr = segPtr->nextPtr)
# border condition: segPtr == NULL -> beginning of next line
.t index {2.3 + 11 chars}
} 3.0
test textIndex-12.7 {TkTextIndexForwChars: find index} {
# (segPtr->typePtr == &tkTextCharType)
.t index {2.3 + 2 chars}
} 2.5
test textIndex-12.8 {TkTextIndexForwChars: find index} {
# (charCount == 0)
# No more chars, so we found byte offset.
.t index {2.3 + 2 chars}
} 2.5
test textIndex-12.9 {TkTextIndexForwChars: find index} {
# not (segPtr->typePtr == &tkTextCharType)
.t image create 2.4 -image textimage
set x [.t get {2.3 + 3 chars}]
.t delete 2.4
set x
} "f"
test textIndex-12.10 {TkTextIndexForwChars: find index} {
# dstPtr->byteIndex += segPtr->size - byteOffset
# When moving to next segment, account for bytes in last segment.
# Wrong answer would be 2.4
.t mark set foo 2.4
set x [.t index {2.3 + 5 chars}]
.t mark unset foo
set x
} 2.8
test textIndex-12.11 {TkTextIndexForwChars: go to next line} {
# (linePtr == NULL)
.t index {7.6 + 3 chars}
} 8.0
test textIndex-12.12 {TkTextIndexForwChars: go to next line} {
# Reset byteIndex to 0 now that we are on a new line.
# Wrong answer would be 2.9
.t index {1.3 + 6 chars}
} 2.2
test textIndex-12.13 {TkTextIndexForwChars} {
# right to end
.t index {2.3 + 56 chars}
} 8.0
test textIndex-12.14 {TkTextIndexForwChars} {
# try to go past end
.t index {2.3 + 57 chars}
} 8.0
test textIndex-13.1 {TkTextIndexBackBytes} {testtext} {
testtext .t backbytes 3.2 -10
} {4.6 6}
test textIndex-13.2 {TkTextIndexBackBytes} {testtext} {
testtext .t backbytes 3.2 2
} {3.0 0}
test textIndex-13.3 {TkTextIndexBackBytes} {testtext} {
testtext .t backbytes 3.2 3
} {2.13 13}
test textIndex-13.4 {TkTextIndexBackBytes} {testtext} {
testtext .t backbytes 3.2 22
} {1.1 1}
test textIndex-13.5 {TkTextIndexBackBytes} {testtext} {
testtext .t backbytes 3.2 23
} {1.0 0}
test textIndex-13.6 {TkTextIndexBackBytes} {testtext} {
testtext .t backbytes 3.2 24
} {1.0 0}
test textIndex-14.1 {TkTextIndexBackChars} {
# (charCount < 0)
.t index {3.2 - -10 chars}
} 4.6
test textIndex-14.2 {TkTextIndexBackChars} {
# not (charCount < 0)
.t index {3.2 - 2 chars}
} 3.0
test textIndex-14.3 {TkTextIndexBackChars: find starting segment} {
# for (segPtr = dstPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# single loop
.t index {3.2 - 3 chars}
} 2.13
test textIndex-14.4 {TkTextIndexBackChars: find starting segment} {
# for (segPtr = dstPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# multiple loop
.t mark set foo1 2.5
.t mark set foo2 2.7
.t mark set foo3 2.10
set x [.t index {2.9 - 1 chars}]
.t mark unset foo1 foo2 foo3
set x
} 2.8
test textIndex-14.5 {TkTextIndexBackChars: find starting seg and offset} {
# for (segPtr = dstPtr->linePtr->segPtr; ; segPtr = segPtr->nextPtr)
# Make sure segSize was decremented. Wrong answer would be 2.10
.t mark set foo 2.2
set x [.t index {2.9 - 1 char}]
.t mark unset foo
set x
} 2.8
test textIndex-14.6 {TkTextIndexBackChars: back over characters} {
# (segPtr->typePtr == &tkTextCharType)
.t index {3.2 - 22 chars}
} 1.1
test textIndex-14.7 {TkTextIndexBackChars: loop backwards over chars} {
# (charCount == 0)
# No more chars, so we found byte offset.
.t index {3.4 - 2 chars}
} 3.2
test textIndex-14.8 {TkTextIndexBackChars: loop backwards over chars} {
# (p == start)
# Still more chars, but we reached beginning of segment
.t image create 5.6 -image textimage
set x [.t index {5.8 - 3 chars}]
.t delete 5.6
set x
} 5.5
test textIndex-14.9 {TkTextIndexBackChars: back over image} {
# not (segPtr->typePtr == &tkTextCharType)
.t image create 5.6 -image textimage
set x [.t get {5.8 - 4 chars}]
.t delete 5.6
set x
} "G"
test textIndex-14.10 {TkTextIndexBackChars: move to previous segment} {
# (segPtr != oldPtr)
# More segments to go
.t mark set foo 3.4
set x [.t index {3.5 - 2 chars}]
.t mark unset foo
set x
} 3.3
test textIndex-14.11 {TkTextIndexBackChars: move to previous segment} {
# not (segPtr != oldPtr)
# At beginning of line.
.t mark set foo 3.4
set x [.t index {3.5 - 10 chars}]
.t mark unset foo
set x
} 2.9
test textIndex-14.12 {TkTextIndexBackChars: move to previous line} {
# (lineIndex == 0)
.t index {1.5 - 10 chars}
} 1.0
test textIndex-14.13 {TkTextIndexBackChars: move to previous line} {
# not (lineIndex == 0)
.t index {2.5 - 10 chars}
} 1.2
test textIndex-14.14 {TkTextIndexBackChars: move to previous line} {
# for (segPtr = oldPtr; segPtr != NULL; segPtr = segPtr->nextPtr)
# Set byteIndex to end of previous line so we can subtract more
# bytes from it. Otherwise we get an TkTextIndex with a negative
# byteIndex.
.t index {2.5 - 6 chars}
} 1.6
test textIndex-14.15 {TkTextIndexBackChars: UTF} {
.t get {5.3 - 1 chars}
} y
test textIndex-14.16 {TkTextIndexBackChars: UTF} {
.t get {5.3 - 2 chars}
} \u4e4f
test textIndex-14.17 {TkTextIndexBackChars: UTF} {
.t get {5.3 - 3 chars}
} b
proc getword index {
.t get [.t index "$index wordstart"] [.t index "$index wordend"]
}
test textIndex-15.1 {StartEnd} {
list [catch {.t index {2.3 lineend}} msg] $msg
} {0 2.13}
test textIndex-15.2 {StartEnd} {
list [catch {.t index {2.3 linee}} msg] $msg
} {0 2.13}
test textIndex-15.3 {StartEnd} {
list [catch {.t index {2.3 line}} msg] $msg
} {1 {bad text index "2.3 line"}}
test textIndex-15.4 {StartEnd} {
list [catch {.t index {2.3 linestart}} msg] $msg
} {0 2.0}
test textIndex-15.5 {StartEnd} {
list [catch {.t index {2.3 lines}} msg] $msg
} {0 2.0}
test textIndex-15.6 {StartEnd} {
getword 5.3
} { }
test textIndex-15.7 {StartEnd} {
getword 5.4
} GIrl
test textIndex-15.8 {StartEnd} {
getword 5.7
} GIrl
test textIndex-15.9 {StartEnd} {
getword 5.8
} { }
test textIndex-15.10 {StartEnd} {
getword 5.14
} x_yz
test textIndex-15.11 {StartEnd} {
getword 6.2
} #
test textIndex-15.12 {StartEnd} {
getword 3.4
} 12345
.t tag add x 2.8 2.11
test textIndex-15.13 {StartEnd} {
list [catch {.t index {2.2 worde}} msg] $msg
} {0 2.13}
test textIndex-15.14 {StartEnd} {
list [catch {.t index {2.12 words}} msg] $msg
} {0 2.0}
test textIndex-15.15 {StartEnd} {
list [catch {.t index {2.12 word}} msg] $msg
} {1 {bad text index "2.12 word"}}
test textIndex-16.1 {TkTextPrintIndex} {
set t [text .t2]
$t insert end \n
$t window create end -window [button $t.b]
set result [$t index end-2c]
pack $t
catch {destroy $t}
} 0
test textIndex-16.2 {TkTextPrintIndex} {
set t [text .t2]
$t insert end \n
$t window create end -window [button $t.b]
set result [$t tag add {} end-2c]
pack $t
catch {destroy $t}
} 0
test textIndex-17.1 {Object indices} {
set res {}
set t [text .t2 -height 20]
for {set i 0} {$i < 100} {incr i} {
$t insert end $i\n
}
pack $t
update
set idx @0,0
lappend res $idx [$t index $idx]
$t yview scroll 2 pages
lappend res $idx [$t index $idx]
catch {destroy $t}
unset i
unset idx
list $res
} {{@0,0 1.0 @0,0 37.0}}
test textIndex-18.1 {Object indices don't cache mark names} {
set res {}
text .t2
.t2 insert 1.0 1234\n1234\n1234
set pos "insert"
lappend res [.t2 index $pos]
.t2 mark set $pos 3.0
lappend res [.t2 index $pos]
.t2 mark set $pos 1.0
lappend res [.t2 index $pos]
catch {destroy .t2}
set res
} {3.4 3.0 1.0}
frame .f -width 100 -height 20
pack append . .f left
set fixedFont {Courier -12}
set fixedHeight [font metrics $fixedFont -linespace]
set fixedWidth [font measure $fixedFont m]
set varFont {Times -14}
set bigFont {Helvetica -24}
destroy .t
text .t -font $fixedFont -width 20 -height 10 -wrap char
pack append . .t {top expand fill}
.t tag configure big -font $bigFont
.t debug on
wm geometry . {}
# The statements below reset the main window; it's needed if the window
# manager is mwm to make mwm forget about a previous minimum size setting.
wm withdraw .
wm minsize . 1 1
wm positionfrom . user
wm deiconify .
update
# Some window managers (like olwm under SunOS 4.1.3) misbehave in a way
# that tends to march windows off the top and left of the screen. If
# this happens, some tests will fail because parts of the window will
# not need to be displayed (because they're off-screen). To keep this
# from happening, move the window if it's getting near the left or top
# edges of the screen.
if {([winfo rooty .] < 50) || ([winfo rootx .] < 50)} {
wm geom . +50+50
}
set str [string repeat "hello " 20]
.t insert end "$str one two three four five six seven height nine ten\n"
.t insert end "$str one two three four five six seven height nine ten\n"
.t insert end "$str one two three four five six seven height nine ten\n"
test textIndex-19.1 {Display lines} {
.t index "2.7 displaylinestart"
} {2.0}
test textIndex-19.2 {Display lines} {
.t index "2.7 displaylineend"
} {2.19}
test textIndex-19.3 {Display lines} {
.t index "2.30 displaylinestart"
} {2.20}
test textIndex-19.4 {Display lines} {
.t index "2.30 displaylineend"
} {2.39}
test textIndex-19.5 {Display lines} {
.t index "2.40 displaylinestart"
} {2.40}
test textIndex-19.6 {Display lines} {
.t index "2.40 displaylineend"
} {2.59}
test textIndex-19.7 {Display lines} {
.t index "2.7 +1displaylines"
} {2.27}
test textIndex-19.8 {Display lines} {
.t index "2.7 -1displaylines"
} {1.167}
test textIndex-19.9 {Display lines} {
.t index "2.30 +1displaylines"
} {2.50}
test textIndex-19.10 {Display lines} {
.t index "2.30 -1displaylines"
} {2.10}
test textIndex-19.11 {Display lines} {
.t index "2.40 +1displaylines"
} {2.60}
test textIndex-19.12 {Display lines} {
.t index "2.40 -1displaylines"
} {2.20}
test textIndex-19.13 {Display lines} {
destroy {*}[pack slaves .]
text .txt -height 1 -wrap word -yscroll ".sbar set" -width 400
scrollbar .sbar -command ".txt yview"
grid .txt .sbar -sticky news
grid configure .sbar -sticky ns
grid rowconfigure . 0 -weight 1
grid columnconfigure . 0 -weight 1
.txt configure -width 10
.txt tag config STAMP -elide 1
.txt tag config NICK-tick -elide 0
.txt insert end "+++++ Loading History ++++++++++++++++\n"
.txt mark set HISTORY {2.0 - 1 line}
.txt insert HISTORY { } STAMP
.txt insert HISTORY {tick } {NICK NICK-tick}
.txt insert HISTORY "\n" {NICK NICK-tick}
.txt insert HISTORY {[23:51] } STAMP
.txt insert HISTORY "\n" {NICK NICK-tick}
# Must not crash
.txt index "2.0 - 2 display lines"
destroy .txt .sbar
} {}
proc text_test_word {startend chars start} {
destroy .t
text .t
.t insert end $chars
if {[regexp {end} $start]} {
set start [.t index "${start}chars -2c"]
} else {
set start [.t index "1.0 + ${start}chars"]
}
if {[.t compare $start >= "end-1c"]} {
set start "end-2c"
}
set res [.t index "$start $startend"]
.t count 1.0 $res
}
# Following tests copied from tests from string wordstart/end in Tcl
test textIndex-21.4 {text index wordend} {
text_test_word wordend abc. -1
} 3
test textIndex-21.5 {text index wordend} {
text_test_word wordend abc. 100
} 4
test textIndex-21.6 {text index wordend} {
text_test_word wordend "word_one two three" 2
} 8
test textIndex-21.7 {text index wordend} {
text_test_word wordend "one .&# three" 5
} 6
test textIndex-21.8 {text index wordend} {
text_test_word worde "x.y" 0
} 1
test textIndex-21.9 {text index wordend} {
text_test_word worde "x.y" end-1
} 2
test textIndex-21.10 {text index wordend, unicode} {
text_test_word wordend "xyz\u00c7de fg" 0
} 6
test textIndex-21.11 {text index wordend, unicode} {
text_test_word wordend "xyz\uc700de fg" 0
} 6
test textIndex-21.12 {text index wordend, unicode} {
text_test_word wordend "xyz\u203fde fg" 0
} 6
test textIndex-21.13 {text index wordend, unicode} {
text_test_word wordend "xyz\u2045de fg" 0
} 3
test textIndex-21.14 {text index wordend, unicode} {
text_test_word wordend "\uc700\uc700 abc" 8
} 6
test textIndex-22.5 {text index wordstart} {
text_test_word wordstart "one two three_words" 400
} 8
test textIndex-22.6 {text index wordstart} {
text_test_word wordstart "one two three_words" 2
} 0
test textIndex-22.7 {text index wordstart} {
text_test_word wordstart "one two three_words" -2
} 0
test textIndex-22.8 {text index wordstart} {
text_test_word wordstart "one .*&^ three" 6
} 6
test textIndex-22.9 {text index wordstart} {
text_test_word wordstart "one two three" 4
} 4
test textIndex-22.10 {text index wordstart} {
text_test_word wordstart "one two three" end-5
} 7
test textIndex-22.11 {text index wordstart, unicode} {
text_test_word wordstart "one tw\u00c7o three" 7
} 4
test textIndex-22.12 {text index wordstart, unicode} {
text_test_word wordstart "ab\uc700\uc700 cdef ghi" 12
} 10
test textIndex-22.13 {text index wordstart, unicode} {
text_test_word wordstart "\uc700\uc700 abc" 8
} 3
test textIndex-22.14 {text index wordstart, unicode, start index at internal segment start} {
catch {destroy .t}
text .t
.t insert end "C'est du texte en fran\u00e7ais\n"
.t insert end "\u042D\u0442\u043E\u0020\u0442\u0435\u043A\u0441\u0442\u0020\u043D\u0430\u0020\u0440\u0443\u0441\u0441\u043A\u043E\u043C"
.t mark set insert 1.23
set res [.t index "1.23 wordstart"]
.t mark set insert 2.16
lappend res [.t index "2.16 wordstart"] [.t index "2.15 wordstart"]
} {1.18 2.13 2.13}
test textIndex-22.15 {text index display wordstart} {
catch {destroy .t}
text .t
.t index "1.0 display wordstart" ; # used to crash
} 1.0
test textIndex-23.1 {text paragraph start} {
pack [text .t2]
.t2 insert end " Text"
set res 2.0
for {set i 0} {$i < 2} {incr i} {
lappend res [::tk::TextPrevPara .t2 [lindex $res end]]
}
destroy .t2
set res
} {2.0 1.1 1.1}
test textIndex-24.1 {text mark prev} {
pack [text .t2]
.t2 insert end [string repeat "1 2 3 4 5 6 7 8 9 0\n" 12]
.t2 mark set 1.0 10.0
update
# then this crash Tk:
set res [.t2 mark previous 10.10]
destroy .t2
set res
} {1.0}
test textIndex-25.1 {IndexCountBytesOrdered, bug [3f1f79abcf]} {
pack [text .t2]
.t2 tag configure elided -elide 1
.t2 insert end "01\n02\n03\n04\n05\n06\n07\n08\n09\n10\n"
.t2 insert end "11\n12\n13\n14\n15\n16\n17\n18\n19\n20\n"
.t2 insert end "21\n22\n23\n25\n26\n27\n28\n29\n30\n31"
.t2 insert end "32\n33\n34\n36\n37\n38\n39" elided
# then this used to crash Tk:
.t2 see end
focus -force .t2 ; # to see the cursor blink
destroy .t2
} {}
# cleanup
rename textimage {}
catch {destroy .t}
cleanupTests
return
| {
"pile_set_name": "Github"
} |
© NASA TV
Despite ongoing sanctions, Russia is about to get a big infusion of cash from the U.S. government.NASA recently renewed a contract that allows Russia to ferry U.S. astronauts to the International Space Station.The United States is, essentially, cutting Russia a $457.9 million check for its services - six seats on a Russian Soyuz spacecraft, training and launch prep, landing and crew rescue and limited cargo delivery to and from the International Space Station.This contract also adds additional support at the Russian launch site.NASA has announced it is cutting some contacts with Russia after the country annexed Crimea, including meetings and teleconferences.The move came after President Barack Obama last month signed an executive order allowing restrictions on dealings with some of Russia's largest sectors, including financial services, energy and defense.The United States is currently considering additional sanctions against Russia.But some NASA initiatives just can't be stopped, underscoring the reliance the United States has on Russia for its space program.The most important is, essentially, the taxi service to the International Space Station.Although the United States operates the International Space Station, it is dependent on Russia to get astronauts there. When the United States retired the space shuttle, it left NASA with no way to get astronauts to the space station. So it inked a contract with Russia to provide rides to the Space Station, which is 240 miles above Earth.Steve Swanson was the most recent astronaut to hitch a ride with Russia, launching off to the International Space Station from a base in Kazakhstan last month. He will, eventually, have to get back to Earth. Russia charges about $71 million per seat on the Soyuz, which makes the price of even a first-class transatlantic airline seat seem like a pittance.NASA is partnering with private companies including Space-X and Orbital Sciences to develop rockets that will be able to send astronauts to space from American soil. But because of budget battles in Congress, those won't launch until at least 2017. The companies have made limited cargo deliveries to the Space Station.Obama has asked for additional money toward the program that would help build equipment to launch Americans into space, but Congress has not fully funded the requests. But attitudes in Congress are changing as many realize just how much money NASA gives to Russia.Last month NASA Administrator Charles Bolden scolded Congress, saying the lack of funding essentially shuttles money to Russia."The choice moving forward is between fully funding the President's request to bring space launches back to American soil or continuing to send millions to the Russians," Bolden wrote online last month. "It's that simple."There's no doubt NASA is using latest contract extension as leverage with Congress."NASA is hopeful Congress will approve the president's budget request for next year so that we can launch our astronauts from U.S. soil and no longer be required to make additional purchases from the Russians," said David Weaver, NASA's associate administrator for communications. | {
"pile_set_name": "OpenWebText2"
} |
Waving her hands from side to side as if conducting an orchestra, Monica Galvan stood on the edge of the lagoon’s platform and looked down at Alfonz as he hoisted his 580-pound frame half way out of the water to twirl about.
His perfect pirouette, prompted by Galvan’s hand signals, brought a smile to her face and, for a few moments, made her forget about the plight faced by other bottlenose dolphins like Alfonz.
An uptick in strandings of the marine mammal along Florida coastlines in the past year has created a sense of urgency in the University of Miami grad student, who is concerned that growing environmental threats such as climate change and toxic algae are increasingly putting these animals at risk. And that’s one of the biggest reasons she signed up for a one-of-a-kind UM course aimed at safeguarding and ensuring that dolphins and other marine mammals survive.
Taught during the spring semester, Marine Mammal Applied Behavior Analysis and Managed Care teaches students about the care, rescue, and rehabilitation of not only dolphins but also whales and manatees. Everything from population management and behavioral medicine to research ethics and laws and legislation affecting marine mammals is covered.
But it is the location that sets this Rosenstiel School of Marine and Atmospheric Science course apart. The once-a-week class meets at Dolphins Plus Marine Mammal Responder (DPMMR), a Key Largo-based rescue, conservation, and research facility where Alfonz and seven other “super intelligent” dolphins live in a natural ocean-water lagoon.
Training and swim sessions with DPMMR’s star resident dolphins are a key component of the class. And during a recent Friday session, Galvan, a master of professional science student from Aguadilla, Puerto Rico, and her nine classmates interacted with the 26-year-old Alfonz and some of his aquatic mates, using unique hand signals to prompt the dolphins to wave their tail flukes, bow, jump out of the water, and even whistle.
“We have an entire catalog of hand signals, and our students have to learn them all,” said Nancy Cooper, a Rosenstiel School lecturer and DPMMR president, who teaches the course.
Some of DPMMR’s resident dolphins, she said, know as many as 80 hand signals.
For Galvan, using those signals to communicate with the mammals has helped her establish a connection with them that “only gets stronger as I learn more about their behavior,” she said. “The more I learn, the more confident I feel with them, and that is a rewarding experience.”
Callie Cole, a marine mammal science student from Grasonville, Maryland, described a previous swim encounter with the dolphins as “super cool.”
“I got the chance to be a member of the pod, to see how they react with each other in the natural environment. I could hear their clicks underwater and feel my skin tingle,” said Cole, referring to dolphins’ use of echolocation, or sonar, in which they send out sound waves that bounce off objects in the ocean, allowing them to navigate, hunt, and protect themselves from predators.
“We all love these animals for so many reasons, “ Jill Richardson, a senior lecturer in the Rosenstiel School’s Department of Marine Ecosystems and Society, told the students during a recent lecture at DPMMR that preceded their dolphin demonstrations. “Physiologically, biologically, and intellectually, they’re incredible. They’re underwater athletes. They have advanced social skills, exhibit complex group hunting techniques, and devote an incredible amount of time and energy to the care of their offspring.”
They have endured in myth and legend—Chinese and European explorers often shared tales of how dolphins rescued sailors and ships in trouble.
“In the last 15 years, they’ve also become sentinels for ocean health—early-warning creatures that tell us when things are out of balance,” said Richardson.
And their message is that our oceans are in peril.
As of March 28, more than 150 dolphin deaths have occurred along Florida’s southwest coast, where a severe red tide outbreak has devastated the region since November 2017. Dolphin strandings have been reported in Collier, Lee, Charlotte, Sarasota, Manatee, Hillsborough and Pinellas counties, forcing the National Oceanic and Atmospheric Administration to declare an “unusual mortality event.”
“With the increase in storms, especially after Hurricane Irma, we’ve seen a lot of out-of-habitat animals,” said Cooper. “So we’ve responded to strandings of dolphin in shallow Everglades areas where they shouldn’t have been.”
“The bottom line is we’re under the sixth extinction where so many species are being decimated,” said Cooper, referring to Elizabeth Kolbert’s 2014 Pulitzer Prize-winning book “The Sixth Extinction: An Unnatural History,” in which the author argues that the Earth is in the midst of a modern, man-made, sixth extinction and compares previous mass extinction events to the accelerated, widespread extinctions of our present time.
“We’ve got to be activists,” said Cooper. “That’s why it’s so important that our students learn the importance of zoos and aquaria and proper management facilities, and our role in the rescue and reintroduction into the wild of certain species.”
Although some people are wary of zoos and aquaria, Cooper said their existence is critical because they provide the means to rehabilitate injured animals such as dolphins. “People don’t realize today that zoos and aquaria are responsible for the conservation efforts today,” she said. “Without them, there’s not a lot of conservation of animal species that would happen.”
Most of the dolphins at DPMMR are born there, but sometimes the animals come to the facility because they are found at a stranding and cannot be released back into the ocean. Cooper’s husband, Art, a UM alum who is vice president and director of operations at Dolphins Plus, DPMMR’s sister facility, helped found a stranding network in the Florida Keys in the late 1980s.
If a stranding occurs, he has a team of professionals and volunteers that he takes with him, and if the animals are in good enough health to receive medical care, the Florida Fish and Wildlife Commission often asks DPMMR to rehabilitate them. The commission later decides which marine facility is suitable for the animals. But in the meantime, the animals need to learn how to behave in captivity. And this is why training students in ethical behavior modification techniques as well as marine mammal care is important, Cooper said.
During the spring semester class, students get a close-up look at caring for marine mammals, preparing fish for them to eat and even taking them to get x-rays and check-ups if they have difficulty breathing, reproducing or if they are pregnant.
Cooper has worked for Dolphins Plus since 1998 as a marine mammal trainer. She soon became an animal care and staff supervisor, and was later promoted to director of training. In 2018, when Dolphins Plus Marine Mammal Responder separated from Dolphins Plus to become its own nonprofit, Cooper was named president and director of training. Last spring was the first time she co-taught the course with Richardson, mostly to graduate marine science students.
“My hope is that the class becomes popular,” said Cooper, who took the class when she was a Rosenstiel School graduate student. “I’d love to teach it in the fall, too.” | {
"pile_set_name": "OpenWebText2"
} |
Stepwise transition of a topological defect from the smectic film to the boundary of a dipolar inclusion.
Cholesteric droplets accompanied by a topological defect are studied in free standing smectic C;{ *} films. We observed a transition between two droplet-defect configurations with the defect in the film and on the droplet boundary. We found that the distance between the droplet surface and the topological defect decreases continuously with increasing temperature and above a certain critical temperature the defect jumps to the droplet boundary. We relate this stepwise change in the defect position to the change in the anchoring on the droplet boundary. This transformation leads to a decrease in the interparticle distances in self-organized chains from droplets. Our simple theory allows us to estimate the value of the anchoring energy. | {
"pile_set_name": "PubMed Abstracts"
} |
Stephen King Is Email Buddies With the 'Stranger Things' Creators
"We spend a lot of time and make sure the grammar is right," Matt Duffer, who created the Netflix phenomenon with his brother, tells THR about composing replies to King (who's a major inspiration).
Exchanging emails with an idol can be excruciating. Just ask the Duffer brothers.
Although they didn't say who reached out first, Matt and Ross Duffer — the brains behind Netflix's nostalgic thriller phenomenon Stranger Things, which returns for a second season on Oct. 27 — tell The Hollywood Reporter that they've been email buddies with the man who inspired them to do what they do.
"He tweeted about our show and we've exchanged some emails with him," Ross explains, referencing King's tweets, one of which praised the show as "pure fun" and "A+" with another sharp-tongued post that it's like "watching Steve King's Greatest Hits. I mean that in a good way."
"It still blows my mind because growing up he was such an inspiration — he’s like a god to us, and so, it’s been surreal just communicating with him at all," adds Ross.
He says that the brothers usually put their heads together when composing a reply. "We spend a lot of time and make sure the grammar is right. We ran the first email by our writers just to make sure it was good, like, we were very, very particular about it."
Adds Matt: "Is like this: A're we using a semicolon properly in this email?' And then he probably writes his email back to us in about five seconds, but he’s very, very sweet. He’s a very sweet guy."
A version of this story first appeared in the Sept. 27 issue of The Hollywood Reporter magazine. To receive the magazine, click here to subscribe. | {
"pile_set_name": "Pile-CC"
} |
Among vehicles, there are automobiles of the hatchback type including a back door. In a vehicle body rear part of the vehicle of this type, a back door opening section having a round structure opened and closed by the back door is provided.
In the past, as a method of securing rigidity of the vehicle body rear part of such a vehicle, a high-rigidity section by a closed cross section of the round structure of the back door opening section and a rear side member section of a rear floor of a vehicle body basic structure are coupled and reinforced
However, in the structure of the vehicle body rear part in the past explained above, the high-rigidity section of the round structure of the back door opening section is provided in a position higher than the rear side member section of the rear floor of the vehicle body basic structure. The high-rigidity section of the round structure and the rear side member section of the vehicle body basic structure are laid out apart from each other in a vehicle up-down direction. In this case, it is necessary to add a separate bracket as disclosed in Japanese Patent Laid-Open No. 2006-218995 or substantially extend the high-rigidity section of the round structure of the back door opening section downward in the vehicle as shown in Japanese Examined Utility Model Publication No. H3-12621 to couple the high-rigidity section and the rear side member section. Therefore, in the structure of the vehicle-body rear part in the past, an increase in weight and an increase in costs are caused. Furthermore, it is likely that rigidity in the length direction is deteriorated because the high-rigidity section is vertically long.
In the structure of the vehicle body rear part in the past, when the rear side member section and a closed cross-sectional section in the vehicle width direction of the round structure of the back door opening section are coupled using a reinforcing member, there is a problem in that a load in the up-down direction from the round structure of the backdoor opening section cannot be efficiently transmitted to the rear side member. | {
"pile_set_name": "USPTO Backgrounds"
} |
It's weakening as it moves northward and away from the U.S. Gulf Coast.
The National Hurricane Center in Miami says Nate's maximum sustained winds have decreased to near 45 mph (75 kph) with higher gusts. The storm is expected to continue to rapidly weaken as it moves farther inland across the Deep South, Tennessee Valley and central Appalachian mountains. Through Monday, those areas can expect at least 3 to 6 inches of rain.
The hurricane center discontinued its storm surge warning for the area west of the Mississippi-Alabama border. A tropical storm warning was discontinued for the area west of the Alabama-Florida border.
More than 100,000 residents in Mississippi and Alabama are without power.
Alabama Power Co. said about 59,000 customers lost their electricity in the state. About 53,000 of those were in the Mobile area.
Mississippi Emergency Management Agency spokesman Greg Flynn said Mississippi Power and the state's electric power associations reported a total of about 48,000 customers without power early Sunday. | {
"pile_set_name": "Pile-CC"
} |
The conventional method for attaching hardware, such as support brackets and rings for alternate path shunt tubes and bladed centralizers, to oilfield sand screen tubulars and other downhole equipment involves welding such components directly to the production tubular. Welding creates residual stresses in the tubular that can eventually lead to stress or corrosion cracking, surface cracks, and other defects that can ultimately result in the failure of the tubular. However, most welding procedures generally include a post-weld heat treatment designed to minimize the residual stresses and increase the strength of the tubular near the weld joint by re-homogenizing the crystalline structure of the tubular material. However, with increasingly sophisticated metallurgy, such as 25CR-125ksi material commonly used in downhole applications, regaining vital strength properties of the tubular is simply not possible through post-weld heat treatments. Consequently, in applications using modem metallurgy, welding directly to the production tubular will ultimately result in the tubular having reduced strength characteristics as a result of the residual stresses on the tubular.
Moreover, in order to comply with downhole drilling regulations, the tubular weld must also be thoroughly inspected in an effort to identify any weld defects that could eventually propagate into cracks and lead to tubular failure. This inspection is commonly undertaken via non-destructive weld examination methods, such as liquid penetrant inspection. Like many other non-destructive weld inspection methods, liquid penetrant inspection requires an in-depth system of quality control documents, traceability, and personnel training which are inherently time consuming and cost prohibitive for many applications.
There is a need, therefore, for a system and method of attaching downhole equipment hardware to production tubulars without welding such equipment thereto and thereby compromising the structural integrity of the tubular and requiring costly post-weld treatments or inspections. | {
"pile_set_name": "USPTO Backgrounds"
} |
Emma White
Emma White may refer to:
Emma White (singer/songwriter) (born 1988), American singer-songwriter, EmmaWhiteMusic.com
Emma White (cyclist) (born 1997), American racing cyclist
Emma White (gymnast) (born 1990), British artistic gymnast | {
"pile_set_name": "Wikipedia (en)"
} |
Judge Vicki Miles-LaGrange of the Western District of Oklahoma today issued a temporary restraining order preventing the State of Oklahoma from implementing its new constitutional amendment that would ban the use of Sharia law in Oklahoma courts. The court released a Minute Sheet without significant analysis; Judge Miles-LaGrange indicated that she'd release an Order soon.
We posted on the case, brought by Muneer Awad, ED for the advocacy group the Council on American-Islamic Relations, here.
The constitutional amendment, passed by a 70%-30% vote in last Tuesday's election, would prohibit Oklahoma courts from "look[ing] to the legal precepts of other nations or cultures. Specifically, the courts shall not consider international law or Sharia Law."
The Minute Sheet also concludes that Awad has standing. He claims that the amendment would stigmatize him as a Muslim and prevent him from enforcing his will, which references Sharia law, in Oklahoma state courts. | {
"pile_set_name": "Pile-CC"
} |
Wireless bridging provides a simple method for connecting building sites without cabling or can be used as a backup to existing wired links. If you have hundreds of nodes or bandwidth-hungry applications and data transmitting between sites, bridging your networks will require more than 11 Mbps provided by the 802.11b standard. However, by using the following Cisco-tested design, you can easily and effectively aggregate and load balance the bandwidth of three 802.11b-compliant Cisco Aironet® bridges to support up to a 33-Mbps half-duplex connection between bridge locations.
The use of standard technology and protocols including virtual LANs (VLANs), VLAN trunks, equal-cost load balancing, and routing protocols makes this design easy to configure and troubleshoot. More importantly, it makes support from the Cisco Technical Assistance Center (TAC) possible.
Load balancing is a concept that allows a router to take advantage of multiple best paths (routes) to a given destination. When a router learns multiple routes to a specific network -- via static routes or through routing protocols -- it installs the route with the lowest administrative distance in the routing table. If the router receives and installs multiple paths with the same administrative distance and cost to a destination, load balancing will occur. In this design, the router will see each wireless bridge link as a separate, equal-cost link to the destination.
Note: The use of equal-cost load balancing and the routing protocols mentioned in this article are a Cisco-supported means of aggregating Cisco Aironet bridges for additional throughput between sites or as a redundant failover wireless bridge link.
If your design requires failover capabilities, the use of a routing protocol is required. A routing protocol is a mechanism to communicate paths between routers and can automate the removal of routes from the routing table, which is required for failover capabilities. Paths can be derived either statically or dynamically through the use of routing protocols such as Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Enhanced IGRP, and Open Shortest Path First (OSPF). The use of dynamic routes for load balancing over equal-cost wireless bridge routes is highly recommended because it is the only means available for automatic failover. In a static configuration, if one bridge fails, the Ethernet port of the other bridge will still be active and packets will be lost until the problem is resolved. Therefore, the use of floating static routes will not work for failover purposes.
With routing protocols there is a tradeoff between fast convergence and increased traffic needs. Large amounts of data traffic between sites can delay or prevent communication between routing protocol neighbors. This condition can cause one or more of the equal-cost routes to be removed temporarily from the routing table, resulting in inefficient use of the three bridge links.
The design presented here was tested and documented using Enhanced IGRP as the routing protocol. However, RIP, OSPF, and IGRP could also be used. The network environment, traffic load and routing protocol tuning requirements will be unique to your situation. Select and configure your routing protocol accordingly.
The active forwarding algorithm determines the path that a packet follows while inside a router. These are also referred to as switching algorithms or switching paths. High-end platforms have typically more powerful forwarding algorithms available than low-end platforms, but often they are not active by default. Some forwarding algorithms are implemented in hardware, some are implemented in software, and some are implemented in both, but the objective is always the same -- to send packets out as fast as possible.
Process switching is the most basic way of handling a packet. The packet is placed in the queue corresponding to the Layer 3 protocol while the scheduler schedules the corresponding process. The waiting time depends on the number of processes waiting to run and the number of packets waiting to be processed. The routing decision is then made based on the routing table and the Address Resolution Protocol (ARP) cache. After the routing decision has been made, the packet is forwarded to the corresponding outgoing interface.
Fast switching is an improvement over process switching. In fast switching, the arrival of a packet triggers an interrupt, which causes the CPU to postpone other tasks and handle the packet. The CPU immediately does a lookup in the fast cache table for the destination Layer 3 address. If it finds a hit, it rewrites the header and forwards the packet to the corresponding interface (or its queue). If not, the packet is queued in the corresponding Layer 3 queue for process switching.
The fast cache is a binary tree containing destination Layer 3 addresses with the corresponding Layer 2 address and outgoing interface. Because this is a destination-based cache, load sharing is done per destination only. If the routing table has two equal cost paths for a destination network, there is one entry in the fast cache for each host.
Both fast switching and Cisco Express Forwarding (CEF) switching were tested with the Cisco Aironet bridge design. It was determined that Enhanced IGRP dropped neighbor adjacencies under heavy loads less often using CEF as the switching path. The main drawbacks of fast switching include:
The first packet for a particular destination is always process switched to initialize the fast cache.
The fast cache can become very big. For example, if there are multiple equal-cost paths to the same destination network, the fast cache is populated by host entries instead of the network.
There's no direct relation between the fast cache and the ARP table. If an entry becomes invalid in the ARP cache, there is no way to invalidate it in the fast cache. To avoid this problem, 1/20th of the cache is randomly invalidated every minute. This invalidation/repopulation of the cache can become CPU intensive with very large networks.
CEF addresses these issues by using two tables: the forwarding information base table and the adjacency table. The adjacency table is indexed by the Layer 3 addresses and contains the corresponding Layer 2 data needed to forward a packet. It is populated when the router discovers adjacent nodes. The forwarding table is an mtree indexed by Layer 3 addresses. It is built based on the routing table and points to the adjacency table.
While another advantage of CEF is the ability to allow load balancing per destination or per packet, the use of per-packet load balancing is not recommended and was not tested in this design. Bridge pairs may have different amounts of latency, which could cause problems with per-packet load balancing.
Quality of Service (QoS) features can be used to increase the reliability of routing protocols. In situations with heavy traffic loads, congestion management or avoidance techniques can prioritize routing protocol traffic to ensure timely communication.
Setting the Fast Ethernet bridge ports and associated Layer 2 switch ports to 10-Mbps full duplex will increase reliability by causing congestion to be queued at the switch instead of the bridge, which has limited buffers.
For designs that require the emulation of full duplex links, it's possible to configure the administrative distance of the equal-cost links between sites to create two unidirectional links. With this design, the third bridge set could be used as a failover link or not be installed at all. Note that this specific design was not tested.
Traffic will flow from site 1 to site 2 across bridge pair 1 and from site 2 to site 1 across bridge pair 2. In the event that either bridge pair fails, bridge pair 3 will work as the failover link. See your specific routing protocol documentation for more information on how to configure the administrative distance.
EtherChannel® is another technology that can be used to aggregate bridges into a virtual single link. Using EtherChannel for this purpose is not recommended, however, as it is not a supported design by Cisco and the Cisco TAC. Furthermore, you will be unable to manage some bridges via TCP/IP due to the way EtherChannel works. The port aggregation protocol (PagP) is not a tunable protocol and failover support is limited.
As a general rule, as clients move farther away from the Access Point, signal strength increases and therefore the data rates decreases. If the client is closer to the AP, then the data rate is higher.
QoS is a technique that is used in order to prioritize certain packets over other packets. For example, a voice application heavily depends on QoS for uninterrupted communication. As of late WMM and 802.11e have emerged specifically for wireless application. Refer to Cisco Wireless LAN Controller Command Reference, Release 6.0 for more information.
In an environemnt where homogeneous clients are found to exist, data rates are higher than in a mixed environment. For example, the presence of 802.11b clients in a 802.11g environment, 802.11g has to implement a protection mechanism in order to co-exist with the 802.11b client, and therefore results in decreased data rates.
The following information is specifically related to the actual testing of the aggregation of three Cisco Aironet 350 Series bridges. The equipment used included six Cisco Aironet 350 bridges, two Cisco Catalyst® 3512 XL switches, and two Cisco 2621 routers. This design may also be used with two bridge pairs instead of three. The test design used Enhanced IGRP as the routing protocol with equal-cost load balancing, and CEF as the forwarding mechanism.
Most likely you will be using some hardware other than the specific models tested. Here are some guidelines when choosing the equipment to be used to aggregate bridges.
The routers used for testing had two Fast Ethernet (100-Mbps) ports and supported 802.1q trunking and CEF-based switching. It's possible to use a single 100-Mbps port to trunk all traffic to and from a switch. However, the use of a single Fast Ethernet port was not tested and could interject unknown issues or negatively impact performance. A router with four Fast Ethernet ports would not require the use of a VLAN trunking protocol. Other router considerations include:
If the routers don't support 802.1q trunking, check if they support ISL trunking, a Cisco proprietary trunking mechanism that can be used in place of 802.1q. Before you configure the routers, verify that your switch supports ISL trunking.
For Cisco 2600 and 3600 Series routers, IP Plus code is required for 802.1q trunk support (this would be a cost upgrade from IP code).
Depending on the hardware and its intended use, the base flash and DRAM may need to be increased. Take into consideration additional memory-intensive processes such as CEF tables, routing protocol requirements, or other processes running on the router that are not specifically related to the bridge aggregation configuration.
CPU utilization may be a consideration depending on the configuration and features used on the router.
The switches in the tested design require support for VLANs and 802.1q trunking. Using inline power-enabled switches such as the Cisco Catalyst 3524PWR when using Cisco Aironet 350 Series bridges is recommended, as this will make the setup less cumbersome. To collapse the switch and routing functionality into a single box, the Catalyst 3550 was tested and works quite well.
Using Cisco Aironet 340 Series bridges will work as well, but the configuration would be slightly different since the Cisco Aironet 340 uses 10-Mbps half duplex Ethernet ports and a different operating system.
Use VPN with the Cisco Aironet Base Station—A typical use of the Cisco Aironet® Base Station Ethernet (BSE) and Base Station Modem (BSM) is for accessing the Internet over cable or DSL connection using virtual private network (VPN) technology. This document shows how to set up the base station unit for use with VPN.
Support Cisco CatOS SNMP traps—Trap operations allow Simple Network Management Protocol (SNMP) agents to send asynchronous notifications that an event has occurred. Learn which traps are supported by the Catalyst® OS (CatOS) and how to configure them.
Get the lowdown on CISCO-BULK-FILE-MIB—Learn how to use the CISCO-BULK-FILE-MIB and transfer files created by this Management Information Base (MIB) using the CISCO-FTP-CLIENT-MIB. Starting with Cisco IOS® Software Release 12.0, Cisco has implemented a way to store a Simple Network Management Protocol (SNMP) object or table as a file on the device. This file can then be retrieved using the CISCO-FTP-CLIENT-MIB, allowing you to transfer large amounts of data using a reliable transport method.
Caching in on savings—Calculate cache savings using the tools and commands available on Cisco cache engines, content engines, and routers.
Set up shunning on a UNIX director—Cisco Intrusion Detection System (IDS) Director and Sensor can be used to manage a Cisco router for shunning. In this how-to, a Sensor is configured to detect attacks on the router "House" and communicate the information to the Director. | {
"pile_set_name": "Pile-CC"
} |
Manchester United are in talks with Jose Mourinho over transfer targets for both January and next summer's transfer windows and appear ready to back their manager, Sky Sports News understands.
Mourinho remains keen to bring in a new central defender after failing to acquire one in the summer and the club will make a move if the right man becomes available in either of the next two windows.
Tottenham's Toby Alderweireld and Leicester's Harry Maguire were both targeted by Mourinho in the summer but he was not backed by the board, and Maguire has signed a new long-term Foxes contract while Alderweireld's Spurs deal can run until 2020.
0:49 Jose Mourinho revealed his frustrations over transfer inactivity during the summer Jose Mourinho revealed his frustrations over transfer inactivity during the summer
The ongoing discussions suggest United are planning for the long-term with Mourinho, however, after intense speculation over his future during the first part of the Premier League season.
Mourinho charge dropped by FA
The spotlight was firmly shone on the Portuguese and his relationship with the board after he spoke out about failing to get his targets in the summer and then said he was the victim of a "manhunt".
United were forced to deny reports he would be sacked regardless of the outcome of the Newcastle game on October 6, which they won 3-2, and their league form has since picked up with a draw at Chelsea and victory over Everton.
0:56 United's owners must support Jose Mourinho with cash when the transfer window opens in January, says Manchester United Supporters Trust spokesman Sean Bones United's owners must support Jose Mourinho with cash when the transfer window opens in January, says Manchester United Supporters Trust spokesman Sean Bones
Yet they remain with the fifth-worst defensive record in the division so far this term, having conceded 17 goals in 10 games, including eight at Old Trafford.
In their first two seasons under Mourinho they conceded 28 and 29 respectively, but United are currently on course to let in some 65 goals before the season's over.
United signed three players in the summer - midfielder Fred from Shakhtar Donetsk, young right-back Diego Dalot and second-choice goalkeeper Lee Grant - spending in the region of £70m in total. | {
"pile_set_name": "OpenWebText2"
} |
Bahrain: Lines in Ink, Lines in the Sand (Persian)
This is the Persian translation of the comic Bahrain: Lines in Ink, Lines in the Sand by Josh Neufeld. The comic follows Mohammed and Sara, two young Bahraini editorial cartoonists who found themselves on opposite sides of Bahrain's short-lived Pearl Revolution. The comics is translated and published by Parsine.com, with the aim of reaching a broader, Persian-speaking audience. You can read the English version here. | {
"pile_set_name": "Pile-CC"
} |
Hermann Kelly
Hermann Patrick Kelly (born 1968) is an Irish journalist and political candidate who wrote for the Irish Mail on Sunday and is a former editor of The Irish Catholic. He has also written for The Sunday Times, Sunday Independent, Sunday Mirror, The Sunday Business Post and Magill magazine. In September 2018 he took part in the launch of the Irexit Freedom To Prosper Party.
Early life and education
Born in 1968, he was originally from the Bogside in Derry. His father was a headmaster of a school in Creggan, his mother was a nurse and he has three siblings.
He studied marine biology in Edinburgh before studying theology as a lay student at St. Patrick's College, Maynooth.
Book
Kathy O'Beirne criticism
In 2007, Kelly wrote a book (Kathy's Real Story) disputing the claims made in a book by Kathy O'Beirne (Don't Ever Tell), in which O'Beirne described childhood abuse she had reputedly suffered in a Magdalene Asylum. He claimed that initial doubts that he had while reading her book were confirmed by inconsistencies in different accounts she had given, and later confirmed by various witnesses and documentary evidence. He also claimed that false allegations were being made by those appearing before the Residential Institutions Redress Board in order to receive compensation.
A review by Gene Kerrigan (who worked alongside Michael Sheridan - O'Beirne's co-author) criticised Kelly's own criticism of O'Beirne's book. Kelly and O'Beirne both appeared on Ireland AM to discuss their books in November 2007, and the encounter ended in an argument.
Kelly also wrote to the proposed publishers of a sequel by O'Beirne, sending them a copy of Kathy's Real Story and asking them not to publish. A Sunday Times article (26 July 2009) indicated that the publisher had withdrawn their initial offer to publish her book because of an 'unresolved legal issue'.
European Union politics
Kelly has worked with Nigel Farage, and was director of communications for Europe of Freedom and Direct Democracy (EFDD). The EFDD later dissolved as various MEPs left the group and constituent parties, some in disputes over political extremism.
Kelly, who is from Northern Ireland in the United Kingdom, supports the Republic of Ireland leaving the European Union (an 'Irexit'), and is the President of the Irish Freedom Party, a party that advocates the same position. He contested the 2019 European Parliament election in the Dublin constituency, receiving 2,441 (0.67%) first preference votes and was eliminated on the fourth count.
Political Views
Some outlets have linked Kelly with alt-right ideologies, pointing to a video which Kelly recorded with far-right British Loyalist and former British National Party member Jim Dowson. In the video Kelly endorsed the white nationalist "grand replacement" conspiracy theory. This followed a similar interview, in January 2019 with LifeSiteNews, in which Kelly denounced what he called the "great replacement of our children".
Kelly spoke at the Free Speech Rally, outside the Dail, on 16 November 2019.
References
Category:Living people
Category:Male non-fiction writers from Northern Ireland
Category:Irish newspaper editors
Category:Journalists from Northern Ireland
Category:Magill people
Category:Media coverage of Catholic Church sexual abuse scandals
Category:Sunday Independent (Ireland) people
Category:Critics of the European Union
Category:The Sunday Business Post people
Category:1968 births
Category:Alumni of St Patrick's College, Maynooth
Category:People educated at St Columb's College | {
"pile_set_name": "Wikipedia (en)"
} |
33, 70310, 70387, 70464, 70541?
77*n + 70156
What is the n'th term of 244, 2579, 9104, 21913, 43100, 74759, 118984, 177869?
349*n**3 + n**2 - 111*n + 5
What is the z'th term of -64400, -64402, -64404, -64406, -64408?
-2*z - 64398
What is the c'th term of -382, -791, -1228, -1705, -2234, -2827, -3496, -4253?
-2*c**3 - 2*c**2 - 389*c + 11
What is the d'th term of 2018, 8103, 18244, 32441, 50694, 73003, 99368?
2028*d**2 + d - 11
What is the a'th term of 321, 590, 891, 1224, 1589?
16*a**2 + 221*a + 84
What is the s'th term of -1118, -1327, -1674, -2159, -2782, -3543?
-69*s**2 - 2*s - 1047
What is the c'th term of 13, -60, -313, -836, -1719, -3052, -4925?
-15*c**3 + 32*c - 4
What is the u'th term of -231, -2318, -8103, -19434, -38159?
-308*u**3 - u**2 + 72*u + 6
What is the l'th term of -1335, -5342, -12051, -21486, -33671, -48630, -66387?
-4*l**3 - 1327*l**2 + 2*l - 6
What is the o'th term of -1081379, -1081380, -1081381, -1081382?
-o - 1081378
What is the k'th term of 73, 250, 547, 964, 1501?
60*k**2 - 3*k + 16
What is the l'th term of 4067, 8126, 12185, 16244, 20303?
4059*l + 8
What is the m'th term of -160734, -321469, -482204, -642939?
-160735*m + 1
What is the x'th term of -41, -94, -161, -248, -361?
-x**3 - x**2 - 43*x + 4
What is the q'th term of 360, 820, 1278, 1734, 2188, 2640, 3090?
-q**2 + 463*q - 102
What is the m'th term of 601, 1127, 1999, 3211, 4757, 6631?
-m**3 + 179*m**2 - 4*m + 427
What is the a'th term of -3519, -3585, -3701, -3873, -4107, -4409, -4785, -5241?
-a**3 - 19*a**2 - 2*a - 3497
What is the h'th term of 21, 31, 85, 213, 445?
5*h**3 - 8*h**2 - h + 25
What is the q'th term of -477, -995, -1493, -1959, -2381, -2747?
2*q**3 - 2*q**2 - 526*q + 49
What is the p'th term of -5462, -21795, -49018, -87131, -136134?
-5445*p**2 + 2*p - 19
What is the m'th term of -24994, -25012, -25030, -25048?
-18*m - 24976
What is the a'th term of 60, 187, 460, 957, 1756?
13*a**3 - 5*a**2 + 51*a + 1
What is the n'th term of 72, -55, -190, -333, -484, -643?
-4*n**2 - 115*n + 191
What is the t'th term of -1175, -2398, -3601, -4772, -5899?
2*t**3 - 2*t**2 - 1231*t + 56
What is the b'th term of 510, 732, 1330, 2490, 4398?
31*b**3 + 2*b**2 - b + 478
What is the o'th term of 632, 492, 112, -628, -1848, -3668, -6208, -9588?
-20*o**3 + 652
What is the m'th term of 766, 2978, 6666, 11830?
738*m**2 - 2*m + 30
What is the y'th term of -211, -1538, -5087, -11968, -23291, -40166, -63703, -95012?
-185*y**3 - y**2 - 29*y + 4
What is the q'th term of 1949, 3890, 5831, 7772, 9713, 11654?
1941*q + 8
What is the q'th term of -42150, -42060, -41970, -41880?
90*q - 42240
What is the j'th term of 4094, 4308, 4522?
214*j + 3880
What is the q'th term of 924, 1082, 1240, 1398, 1556?
158*q + 766
What is the y'th term of 3127, 3055, 2935, 2767, 2551, 2287, 1975?
-24*y**2 + 3151
What is the v'th term of -4453, -4487, -4557, -4681, -4877, -5163, -5557?
-3*v**3 - 13*v - 4437
What is the p'th term of 283279, 566573, 849861, 1133137, 1416395, 1699629, 1982833, 2266001?
-p**3 + 3*p**2 + 283292*p - 15
What is the p'th term of 1418, 5701, 12836, 22823, 35662, 51353?
1426*p**2 + 5*p - 13
What is the f'th term of -100192, -200384, -300578, -400774, -500972, -601172?
-f**2 - 100189*f - 2
What is the s'th term of 317, 330, 349, 374, 405?
3*s**2 + 4*s + 310
What is the d'th term of 4845, 4637, 4429?
-208*d + 5053
What is the h'th term of -8, -104, -332, -752, -1424, -2408, -3764, -5552?
-10*h**3 - 6*h**2 - 8*h + 16
What is the h'th term of 343, 2763, 9333, 22129, 43227, 74703, 118633?
346*h**3 - h**2 + h - 3
What is the r'th term of -78130, -156260, -234390, -312520, -390650?
-78130*r
What is the c'th term of 104, 227, 346, 455, 548, 619, 662, 671?
-c**3 + 4*c**2 + 118*c - 17
What is the b'th term of -3042, -3120, -3206, -3306, -3426, -3572?
-b**3 + 2*b**2 - 77*b - 2966
What is the h'th term of -13042, -13040, -13038, -13036?
2*h - 13044
What is the q'th term of -1626, -3248, -4870, -6492, -8114?
-1622*q - 4
What is the l'th term of 3367, 3366, 3365?
-l + 3368
What is the m'th term of 1470639, 1470638, 1470637, 1470636, 1470635?
-m + 1470640
What is the d'th term of -3107, -6493, -9879, -13265, -16651?
-3386*d + 279
What is the g'th term of -2558, -6056, -9554, -13052, -16550, -20048?
-3498*g + 940
What is the l'th term of 16, -56, -218, -470, -812, -1244, -1766?
-45*l**2 + 63*l - 2
What is the q'th term of 120402, 120399, 120396, 120393, 120390, 120387?
-3*q + 120405
What is the v'th term of -13405, -13403, -13407, -13423, -13457?
-v**3 + 3*v**2 - 13407
What is the v'th term of -516, -1018, -1520?
-502*v - 14
What is the j'th term of 6471, 26345, 59475, 105867, 165527, 238461, 324675, 424175?
j**3 + 6622*j**2 + j - 153
What is the r'th term of -46625, -186534, -419723, -746198, -1165965, -1679030, -2285399, -2985078?
-r**3 - 46634*r**2 + 10
What is the q'th term of 703, 691, 679, 667?
-12*q + 715
What is the c'th term of 713120, 713121, 713122, 713123?
c + 713119
What is the b'th term of 47, 34, -35, -166, -365, -638?
-b**3 - 22*b**2 + 60*b + 10
What is the s'th term of 2054, 4050, 6004, 7922, 9810, 11674, 13520?
s**3 - 27*s**2 + 2070*s + 10
What is the j'th term of -5844, -5801, -5758, -5715, -5672, -5629?
43*j - 5887
What is the t'th term of 359, 946, 1773, 2846, 4171, 5754, 7601, 9718?
t**3 + 114*t**2 + 238*t + 6
What is the h'th term of 1055, 2140, 3225?
1085*h - 30
What is the l'th term of 69526, 69536, 69546, 69556, 69566, 69576?
10*l + 69516
What is the u'th term of 1018, 2064, 3118, 4180?
4*u**2 + 1034*u - 20
What is the b'th term of 147, 336, 615, 966, 1371, 1812?
-3*b**3 + 63*b**2 + 21*b + 66
What is the s'th term of -223, -400, -535, -628, -679, -688, -655?
21*s**2 - 240*s - 4
What is the l'th term of 1727, 3474, 5223, 6974, 8727, 10482, 12239?
l**2 + 1744*l - 18
What is the r'th term of 159125, 318222, 477317, 636410, 795501?
-r**2 + 159100*r + 26
What is the h'th term of -46830, -46823, -46804, -46767, -46706, -46615?
h**3 - 46831
What is the o'th term of -5336, -10775, -16214?
-5439*o + 103
What is the b'th term of 2360, 9261, 20762, 36863, 57564, 82865, 112766?
2300*b**2 + b + 59
What is the o'th term of 177, 1227, 4077, 9627, 18777, 32427?
150*o**3 + 27
What is the q'th term of -562, -563, -552, -523, -470, -387?
q**3 - 8*q - 555
What is the h'th term of -150, -306, -576, -960, -1458, -2070?
-57*h**2 + 15*h - 108
What is the n'th term of -188, -64, 142, 430, 800?
41*n**2 + n - 230
What is the p'th term of 13445, 13443, 13441, 13439?
-2*p + 13447
What is the w'th term of 2831, 2821, 2811, 2801?
-10*w + 2841
What is the k'th term of -22, -11, 4, 23, 46, 73, 104?
2*k**2 + 5*k - 29
What is the x'th term of 2073, 16680, 56333, 133554, 260865, 450788?
2087*x**3 + x**2 - 5*x - 10
What is the g'th term of -44251, -44227, -44187, -44131, -44059, -43971?
8*g**2 - 44259
What is the f'th term of -112, 634, 1380, 2126, 2872, 3618?
746*f - 858
What is the m'th term of -637665, -2550662, -5738991, -10202652, -15941645?
-637666*m**2 + m
What is the f'th term of -45609, -91208, -136803, -182394?
2*f**2 - 45605*f - 6
What is the n'th term of 3464, 3514, 3590, 3686, 3796, 3914?
-n**3 + 19*n**2 + 3446
What is the z'th term of -10641, -21268, -31895?
-10627*z - 14
What is the a'th term of -30, -121, -266, -471, -742, -1085?
-a**3 - 21*a**2 - 21*a + 13
What is the h'th term of 18449, 36902, 55355?
18453*h - 4
What is the w'th term of -2124, -2034, -1884, -1674, -1404?
30*w**2 - 2154
What is the l'th term of -196, -522, -1398, -3100, -5904, -10086, -15922, -23688?
-46*l**3 + l**2 - 7*l - 144
What is the p'th term of -146, -755, -1828, -3365?
-232*p**2 + 87*p - 1
What is the c'th term of 1879, 3706, 5535, 7366, 9199?
c**2 + 1824*c + 54
What is the w'th term of -692, -1379, -2062, -2741, -3416?
2*w**2 - 693*w - 1
What is the v'th term of -2662, -2610, -2558?
52*v - 2714
What is the y'th term of 325, 1376, 3157, 5692, 9005, 13120, 18061?
4*y**3 + 341*y**2 - 20
What is the w'th term of -16850, -16904, -16992, -17120, -17294, -17520, -17804?
-w**3 - 11*w**2 - 14*w - 16824
What is the v'th term of 1004, 680, 140, -616, -1588?
-108*v**2 + 1112
What is the i'th term of -12093, -48353, -108787, -193395?
-12087*i**2 + i - 7
What is the i'th term of -483, -1008, -1723, -2724, -4107?
-16*i**3 + i* | {
"pile_set_name": "DM Mathematics"
} |
UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT A NEW THINKING ABOUT GOD: FROM THE DASEIN TO THE DAGOTT Carlos Arboleda Mora* RESUMEN Este artículo trata de reformular las relaciones filosofía-teología rotas desde la Edad Media, mostrando cómo la crisis de la metafísica conceptual y representacionista y de la ontoteología tradicional, han permitido, con la ayuda de Dionisio y del neoplatonismo, repensar la ontología a través de la teología negativa y de una vía mística. Ya desde Heidgger se llega a ver la realidad como un don del cual la filosofía indicaría la posibilidad ontológica y la teología su realización efectiva. Así, el Dasein heideggeriano, ABSTRACT This article attempts to reformulate the broken philosophy-theology relationships since the Middle Ages, showing how the crisis of conceptual and representational metaphysics and traditional ontotheology have allowed, with the help of Dionysus Areopagite and the neo-Platonism, to rethink the ontology through negative theology and a mystical way. Since Heidgger the reality is seen as a gift from which the philosophy would indicate the ontological possibility, and the theology, his effective accomplishment. In this way, * Doctor en Filosofía de la UPB, Licenciado en ciencias sociales de la Universidad Gregoriana de Roma en 1980. Magister en Historia de la UNAL de Colombia. Profesor de la Universidad escritos / Medellín Colombia / Vol. 19, N. 42 / pp. 019-051 enero-junio 2011 / ISSN 0120 1263 20 superada la sombra del ego, podría ser Dagott, es decir, pura apertura a la donación de Dios. PALABRAS CLAVE Ontoteología, Dionisio Areopagita, Neoplatonismo, Dagott, Dasein, Filosofía de la religión. the heideggerian Dasein, once the shade of the ego is overcome, may be Dagott in other words, pure opening to the God's donation. KEY WORDS Onto theology, Dionysus Areopagite, NeoPlatonism , Dagott, Dasein, Religion s Philosophy. Introducción Una metafísica renovada es esencial para la teología actual, pues no se puede hoy hablar teológicamente si no hay una nueva forma de pensar, un nuevo camino que nos lleve al mostrarse del Ser o Incondicionado. La filosofía y la teología han de tender puentes entre ellas, pues las dos tienen como tema al hombre y sus resultados no pueden ser contradictorios ya que son "diferentes momentos de una pasión común, diferentes voces en una común canción" (Caputo 2006 69). La filosofía y la teología nacieron juntas y sólo cuando el hombre creyó que era potente y que podría alcanzar la felicidad solo, construyó su propio sistema en el que Dios sobraba y, por tanto, sobraba la teología. Pero también sobró la filosofía, pues el hombre era creador técnico y científico y no necesitaba de reflexiones inútiles e improductivas. Hoy se va viendo que la filosofía y la teología pueden marchar juntas y que lo que la primera propone como posibilidad, la segunda lo da como efectividad y realización. Bien se sabe que la filosofía y la teología más originarias se dan antes y en los presocráticos, cuando el logos era místico y no racional conceptual. Allí se vislumbró el misterio del ser que estaba presente desvelándose o que se desvelaba estando presente. El acceso al ser era celebrativo, místico, de plena unión con él. Orgiástico, si se quiere, pero real y lejano, sólo la celebración lo hacía presente, sin necesidad de ayudas conceptuales. La CARLOS ARBOLEDA MORA 21 verdad del ser se vivía y celebraba, no se conceptualizaba. Sus enseñanzas emanan de la experiencia original que no separa lo vivido y lo racional: El saber científico conoce al mundo como grupo de entes sujetos a manipulación; la ciencia se interpreta a sí misma como técnica racional al servicio del dominio sobre el mundo. La physis es un objeto más y la razón se reduce a razón instrumental. Heidegger se pregunta por la base de un saber que identifica su destino con la capacidad científica y técnica de dominar. En opinión de Heidegger, hay una pérdida de aquella arkhé que los Presocráticos consideraron fundamental: la diferencia entre el ser y el ente. La crítica es que ha habido un olvido de esa diferencia y haber concebido al ser como si fuera un ente más. Las condiciones que determinan trascendentalmente la única imagen que el hombre moderno puede tener del mundo y de sí mismo, expulsan de la realidad todo lo que no es cosa; a lo que corresponde necesariamente la valoración de la ciencia físico-matemática como saber total que garantiza la realización efectiva del dominio y la explotación universales (Pagallo 2005). La creencia occidental del progreso filosófico hizo que se pensara en la superación de los presocráticos y se volviera al concepto que retiene y contiene al Ser como una superación de los primitivos filósofos y teólogos. Pero en filosofía y teología no hay progreso como en las ciencias exactas, lo que hay es siempre una vuelta reflexiva sobre lo más originario del ser humano. Uno de los aciertos de Heidegger es haber replanteado el regreso a los orígenes como un volver al pensar original y plantear como tarea contemporánea, un pensamiento más original o nueva manera de pensar. Ese regreso lo hace Heidegger pensando en la angustia de una humanidad afectada por la cienciocracia moderna que olvida que los entes pueden salir a la luz porque la Luz es la que dispone el Lichtung (el claro) donde se manifiestan los entes; la ciencia, por el contrario, ilumina los entes y oscurece la humanidad del hombre, pues en su afán de dominio, se aleja de la Luz y oscurece el mundo. El hombre mismo es ese claro donde se da la manifestación más primaria y esencial del ser mismo y olvidar esto, es olvidar el ser mismo del hombre: ser el lugar donde se manifiesta el Ser. El análisis del hombre es, por tanto, obra de la filosofía UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 22 y de la teología, como el lugar de la manifestación y así el hombre viene a ser el centro, pues su razón de ser es la manifestación del Ser en él. Pero lo que para Heidegger es el Da-sein, el Ser ahí, para el teólogo es el DaGott, el Dios que ahí se manifiesta. Dios se manifiesta en el hombre, vive en el hombre, se da al hombre, es la razón de ser del hombre. Exagerando un poco, se puede decir que cuando muere un hombre, es Dios mismo el que muere allí. 1. La ontoteología y la idolización de Dios. La crisis provocada por los Maestros de la sospecha, retomada por Heidegger en su crítica a la metafísica occidental, hizo estremecer la cultura occidental, pues se pensó que era la última palabra en cuestiones de metafísica y de teología. La crítica filosófica llevada a cabo por ellos, hizo creer que la metafísica era cosa del pasado y que no había posibilidad de un pensamiento más allá de la ciencia y de la tecnología. Sólo era posible pensar en términos científicos, experimentales y sujetos a verificación y repetición. La teología, al tratar con realidades no demostrables en forma racional, se trataba de una invención ideológica. El fenómeno religioso podía deconstruirse, pues era mera ideología, neurosis, ansias de poder, proyección de las aspiraciones humanas, negocio burdo. Esta crítica fue tan demoledora que algunos filósofos y teólogos aceptaron sin más sus conclusiones. Así surgieron los filósofos faranduleros que repetían que la única tarea digna hoy era completar la crisis de la metafísica, luchar contra las religiones y vivir en las comodidades del sistema capitalista. Sólo quedaba el reino de Disney World. Los teólogos crearon una efímera pero rentable Teología de la muerte de Dios donde se enseñaba cómo vivir en un mundo sin Dios y en un universo secular y posteísta (aunque plantearon problemáticas que contribuyeron a la nueva forma de pensar a Dios). Era mejor vivir en una "esfera de la privacidad" con todas las comodidades tecnológicas y sin compromisos morales que implicaran una molestia a la calidad de vida moderna. Lo más central de dicha crítica, sin embargo, no eran esas posiciones burguesas sino la demolición de la metafísica CARLOS ARBOLEDA MORA 23 clásica por obra de los maestros de la sospecha en su enjuiciamiento de la conceptualización, de la representación y sus consecuencias en la metafísica teológica, dejando así sin piso todo fundamento de la teología y de la moral. Heidegger acepta y confirma dichas críticas al mostrar el olvido del Ser en la metafísica tradicional, pero afortunadamente hace una propuesta de una nueva manera de pensar que abrió un camino que hoy muchos filósofos empiezan a recorrer. Heidegger hace una crítica de la metafísica occidental por su explicación del ser y su concepto de verdad que se manifiestan en un olvido del Ser tal como se ve en la ciencia, la técnica y la reducción del arte a pura estética. Esta metafísica comienza en Platón a partir de la realidad de la idea del Bien como fundamento y continúa en Aristóteles, cristianos y modernos. Descartes, con la idea del sujeto y de la representación (autoconciencia del ser humano, cogito), inicia la época de la imagen del mundo donde el ser se encuentra en su imagen construida por la subjetividad. La idea de fundamentación logra su plenitud en Leibniz con el principio de razón suficiente. Sólo lo que es puesto en un representar fundamentado puede tener valor de ente. En Kant sólo puede ser cosa lo que pueda ser considerado así por el yo según las categorías trascendentales. Según éste, sólo hay realidad cognoscible dentro de la subjetividad y la fundamentación (juicios sintéticos a priori). El yo plenamente autoconsciente condicionará toda objetividad y se logrará el saber absoluto en el concepto hegeliano. En Nietzsche, tratando de ser antimetafísico, continúa la subjetividad como se ve en la voluntad de poder. La metafísica se deja distinguir en él de modo más claro, como la metafísica de la incondicionada subjetividad de la voluntad de dominio. El dominio actual lo ejercen la técnica y las ciencias contemporáneas que son la metafísica moderna. La metafísica tradicional continúa presente, según Heidegger, en toda ontología trascendente o cristiana, en las ideologías, en las filosofías de la vida, en la técnica y la ciencia. Las críticas de los maestros de la sospecha no eran definitivas o insuperables. Los grandes maestros de la sospecha no han eliminado a UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 24 Dios sino sus conceptualizaciones históricas y cristalizadas en términos de una época o cultura. Han ayudado a purificar la idea de Dios más que a certificar su muerte. Dios no ha muerto sino los conceptos sobre Dios que han elaborado las culturas. Lógicamente, la muerte de los conceptos ha conllevado la crisis de los grandes relatos que se afincaban sobre ellos y de las instituciones que los encarnaban, especialmente en Occidente. Los maestros de la sospecha atacaron los conceptos para construir una nueva forma interpretativa más saludable. Se trata de una deconstrucción de lo existente para expresar en una "crítica de la resistencia" lo que no marchaba más y allí proponer algo nuevo. Las críticas de los Maestros de la sospecha son críticas hechas dentro de la misma cultura. Propiamente no se alcanza a negar la posibilidad de Dios, sea lo que éste sea, sino las concretizaciones culturales de la idea de Dios. Son los grandes iconoclastas en cuanto testigos de la idolización de las religiones por la solidificación de sus símbolos. Cuando la conciencia de la instrumentalidad e historicidad de los símbolos se pierde, se instala en las culturas la convicción de la existencia objetiva de ciertos conceptos o imágenes, que son así objetivados o sustancializados. Es como un integrismo simbólico en filosofía y teología. Las religiones pudieron haber convertido los símbolos en metafísica inmutable, el status quo en principio perenne y amarraron la hermenéutica a una clave conceptual anclada en una época histórica. Los maestros de la sospecha derribaron los ídolos pero no el sentido ni la profundidad. En este campo les faltó radicalidad; o la intuyeron y no sacaron todas las consecuencias. Tal vez, llegar a la contemplación les cortó el aliento, pues era muy peligroso afirmar la posibilidad del sentido en un mundo en que reinaba la modernidad y en el que cualquier atisbo místico era considerado un regreso a la inmadurez o a la minoría de edad. El papel de la metafísica, en palabras heideggerianas, ha sido el establecimiento y el mantenimiento de un fundamento de los seres (Arboleda 2010). El ser como presencia plena, representada y definida CARLOS ARBOLEDA MORA 25 conceptualmente que fundamentaba toda vida y toda afirmación de los entes es el proyecto histórico de la metafísica occidental, pero en ese proyecto histórico se confunde la universalidad del ente con su particularidad. Desconoce así la diferencia ontológica y se olvida del ser. La metafísica es la época del olvido del Ser, olvidar la diferencia entre el Ser y el ente. No se despliega la diferencia ontológica o se piensa esta diferencia desde el concepto de participación y representación. Esta representación es la presencia, no como presencia del Ser sino como presencia del ser del ente. El Ser es conceptualizado como ser del ente y se olvida el Ser. El destino del Ser es el olvido del Ser que es ser el ser de los entes, constituir los entes, unificar y diferenciar los entes y simultáneamente ocultarse tras los entes ya constituidos. El olvido del Ser, el olvido de la diferencia ónticoontológica, impide y olvida indagar por la verdadera esencia del Ser. Así los filósofos se olvidaron del Ser y hablaron de los entes. El mismo Dios queda reducido a un ente, considerado dentro del horizonte de aparición del ser de los entes. Un ser atemporal y ahistórico que se da de una vez y para siempre, negando la historicidad y la multiplicidad. Se entiende más como ousia fija que como physis desbordante que emerge o como aletheia que se descubre y desvela. Se olvida el sentido de emergencia y descubrimiento, y se da preeminencia a la presencia y a la permanencia, en el sentido de lo duradero (ousia) (Thomson 2005). ¿Hasta qué punto el Dios de la teología cristiana es el Dios de la metafísica fijista? Hay que hacer un análisis histórico crítico del uso de las categorías metafísicas en la teología. También hay que preguntarse si el Dios de la teología conceptual es el mismo de la Escritura. Aquí hay que investigar si las afirmaciones teológicas hechas bajo forma de conceptos corresponden a lo que expresa la Escritura. Es difícil armonizar el Dios de la Escritura con el simple, inmutable, actualizado, completamente existente Dios de la formulación conceptual dogmática. Se ve que mucho del contenido y las categorías teológicas conceptuales son más de la metafísica que del Dios de la Escritura y más fijadas en la ousia que en la manifestación o en el don. Así los teólogos se olvidaron de Dios y hablaron de él como ente. UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 26 2. La teología de la muerte de Dios. La teología de la muerte de Dios, aunque fue un movimiento sensacionalista y de corta duración, tuvo su importancia en la génesis del nuevo pensamiento sobre Dios. Sus antecedentes están en las críticas de Comte, Feuerbach y Nietzsche, pero lo que en ellos fue crítica profunda, en estos teólogos fue un movimiento situado en los marcos de la secularización, la filosofía analítica y una aceptación acrítica del racionalismo moderno. Sin embargo, tiene semillas que ayudan a la purificación del nombre y la imagen de Dios en un mundo culturalmente agnóstico. Se inicia con Gabriel Vahanian (1961) que acusa al cristianismo de confundir humanitarismo con Reino de Dios, reduciendo la vida cristiana a una convivencia cívica y a un desarrollo económico y social. Se ha olvidado a Dios y se quiere reducir el cristianismo a una búsqueda de vida en paz y desarrollo. La muerte de Dios se debe a que se ha reducido a un dato cultural, cuando en realidad, siguiendo a Barth y a Calvino, Dios es el totalmente Otro irreducible a una cultura. La solución está en negar las posibilidades racionales de encontrar a Dios y predicarlo en forma absoluta sin mezclas culturales o racionales. El aporte de Vahanian es interesante, pues indica que la vía racional moderna no es camino para llegar a Dios. John A. T. Robinson publicó un libro de amplia circulación Honest to God (1963). Él encuentra que hay un abismo entre la cultura modernasecular-científica y las formas expresivas del cristianismo. La causa está en el lenguaje metafísico usado que está lejos del lenguaje moderno. La solución está en una reinterpretación radical del cristianismo en términos de relaciones humanas y de amor mutuo donde se manifiesta la profundidad de Dios. Hay que hablar de relaciones humanas y no de un Dios muy por encima de los hombres. Importante en Robinson es su llamado a una praxis del amor aunque lo haga en términos de una metafísica tradicional (por eso fue atacado de antimetafísico y agnóstico) que le impide conocer y llegar hasta la fuente de ese amor. CARLOS ARBOLEDA MORA 27 Estos dos autores se sitúan en la línea menos radical de la teología de la muerte de Dios, que sería la continuación de dos teólogos, Friedrich Gogarten y Dietrich Bonhoeffer. El primero, con una teoría acerca de la secularización. Gogarten (1971) influye al aceptar teológicamente la secularización distinguiéndola del secularismo. La secularización no era negativa, pues era simplemente dejar al mundo ser mundo, siendo la expresión de la libertad del cristiano ante la modernidad, libertad que consiste en no dominar el mundo sino en servir al mundo desde la defensa de la humanidad frente a las pretensiones de los sistemas totalitarios. No hay que pelear con el mundo, sino servirlo desde una visión humanizante sin pretender dominarlo con posiciones políticas cristianas o con partidos confesionales. Hay que liberar al mundo del mito y de la mística, para dejarlo ser mundo. Esta posición, muy del agrado de una sociedad capitalista y en desarrollo, sin embargo, es una renuncia al papel de Dios en el mundo. De alguna manera, es rendirse antes de dar la batalla contra el agnosticismo y la clausura de la humanidad en una visión recortada de la razón. El segundo, Bonhoeffer, buscaba un cristianismo sin religión, no individualista, lejano del sobrenaturalismo metafísico, y buscando un cristianismo kenótico (el Crucificado como imagen central de Dios, Dios que se oculta en la cruz). Bonhoeffer se sitúa así en la génesis de la nueva forma de pensar, pues hace un rechazo del dios metafísico: Veo de nuevo con toda claridad que no debemos utilizar a Dios como tapaagujeros de nuestro conocimiento imperfecto. Porque entonces si los límites del conocimiento van retrocediendo cada vez más –lo cual objetivamente es inevitable-, Dios es desplazado continuamente junto con ellos y por consiguiente se halla en una constante retirada. Hemos de hallar a Dios en las cosas que conocemos y no en las que ignoramos. Dios quiere ser comprendido por nosotros en las cuestiones resueltas, y no en las que aún están por resolver. Esto es válido para la relación entre Dios y el conocimiento científico. Pero lo es asimismo para las cuestiones humanas de carácter general como la muerte, el sufrimiento y la culpa. Hoy hemos llegado a un punto en que, también para estas cuestiones, existen respuestas humanas que pueden prescindir por completo de Dios. En realidad –y así ha sido en todas las épocas-, el hombre llega a resolver estas cuestiones incluso sin Dios, y es pura falsedad que solamente el cristianismo ofrezca una solución para ellas. Por lo que al concepto de UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 28 "solución" se refiere, las respuestas cristianas son tan concluyentes (o tan poco concluyentes) como las demás soluciones posibles. Tampoco en esto es Dios un tapa-agujeros. Dios ha de ser reconocido en medio de nuestra vida, y no sólo en los límites de nuestras posibilidades. Dios quiere ser reconocido en la vida y no sólo en la muerte; en la salud y en la fuerza y no sólo en el sufrimiento; en la acción y no sólo en el pecado. La razón de ello se halla en la revelación de Dios en Jesucristo. Él es el centro de nuestra vida, y no ha "venido" en modo alguno para resolvernos cuestiones sin solución. A partir del centro de nuestra vida, determinadas cuestiones desaparecen, e igualmente las respuestas (estoy pensando en el juicio sobre los amigos de Job). En Cristo no existen "problemas cristianos". Pero basta ya; acaban de estorbarme de nuevo (1983 218). Pero luego vendrán los teólogos más radicales. Paul van Buren afirmará que no hay razones intelectuales para el cristianismo y que éste sólo es una actitud ética de preocupación por los demás. Más allá de lo que ha representado histórica y éticamente, el cristianismo no es nada más (1963). Heredero de la filosofía positivista del lenguaje, vió que el contenido de la teología no era experimentalmente verificable y por eso no podría ser un lenguaje verdadero y ontológico. La Biblia como lenguaje no tiene sentido ni su historicidad es verificable. Lo único verificable en Jesucristo era que: "era un hombre libre capaz de entregarse a los otros, allá donde estuvieran" (Id. 121). Los discípulos tuvieron una experiencia sicológica y "empezaron a poseer algo de la libertad de Jesús; y esa libertad comenzó a ser contagiosa..." (Id. 133-124). La tesis de van Buren se rinde totalmente ante la filosofía analítica, excluye cualquier tipo de metafísica y de trascendencia y ni siquiera abre el camino a otra reflexión. Para él, el cristianismo es una historia más dentro de las múltiples historias que hay en la humanidad. La Ciudad Secular de Harvey Cox (1965) es una aceptación de la llegada de la secularización. Con razón puede considerarse uno de los padres de la teoría de la secularización. Esta se caracteriza por la libertad del mundo frente a lo religioso, el pragmatismo filosófico y político y la profanidad como algo subsistente en sí mismo de tal modo que las cuestiones últimas no tengan ninguna interferencia en las soluciones políticas. El hombre ha tomado el mundo en sus propias manos y es el responsable de la historia sin relación a nada trascendente. El hombre "se ha liberado CARLOS ARBOLEDA MORA 29 de la tutela religiosa y metafísica, para apartar su atención de otros mundos y volverla hacia este". (Id. 17). Más importante que la metafísica es la política pragmática al estilo de Norteamérica. Es un prolegómeno al pragmatismo contemporáneo de los EE.UU. Es una rendición ya plena al pragmatismo estilo Richard Rorty. No hay metafísica sólo queda la acción política más o menos correcta. Pero el mismo Cox tuvo que reformar su posición cuando vio la crisis de la teoría de la secularización. En los últimos años del siglo XX, el resurgimiento religioso le obligó a repensar su posición. Su libro Fuego del cielo: el surgimiento de la espiritualidad pentecostal y la reconfiguración de la religión en el siglo XXI (2001) es una reconsideración del libro escrito treinta años antes. La observación del crecimiento del movimiento pentecostal que se convierte en el fenómeno religioso más importante del siglo XX, lo lleva a mirar el fracaso de la teoría de la secularización, el renacimiento de la religión y la aparición de un movimiento religioso que se convierte en una nueva Reforma para el siglo XXI. Importante, en este último libro, es su contribución a que se piense la religión como una experiencia mística que puede abrir el campo a una nueva reflexión filosófico-teológica que recupere el papel de la experiencia por encima de la teología y filosofía conceptuales. Luego llegarían los teólogos más incisivos de la teología de la muerte de Dios pero que se alejan más de una posición trascendente hasta el punto de que pueden ser llamados ateos. Simplemente aceptan la crítica de los siglos XIX y XX a la metafísica y a teología, la dan por cierta y comienzan a vivir en la sociedad posteísta, poscristiana y plenamente secular. El cristiano simplemente trabaja por un mundo más justo, sin más razones. William Hamilton (Altizer y Hamilton 1966) propone no ir más allá de la ética entendida como lucha por la justicia y por el orden. El hombre ha alcanzado su madurez y no necesita ya de la compañía de Dios y el hombre debe asumir su responsabilidad temporal. Realmente Dios ha muerto, es una pérdida verdadera y no se espera que vuelva el Dios cristiano, por tanto, la espiritualidad de la teología radical es la política. Altizer (1967), en cambio, opta por un misticismo secular. Comienza por aceptar las críticas a la ontoteología realizadas por los filósofos del siglo XIX pues ellos permiten descubrir el verdadero rostro del cristianismo. UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 30 En la perspectiva del destino histórico ateo de nuestro tiempo, un tiempo en el que la participación a la condición universal del hombre exige la asunción de una vida sin Dios, no está fuera de lugar plantear el problema de la necesidad de un ateísmo cristiano contemporáneo. Mi estudio acoge esa necesidad elaborando un análisis teológico basado sobre la visión del cristianismo de Blake, Hegel y Nietzsche. (Altizer y Hamilton 1966 23). La teología debe abandonar su forma religiosa, repudiando plena y coherentemente la búsqueda de un algo sacro primordial, y al mismo tiempo la negación religiosa y el rechazo de lo profano; porque, en la medida en que la teología permanece unida a un Verbo primordial y trascendente, permanecerá cerrada, fuera del presente y de la actualidad humana de la historia (Id. 77). En el pensamiento de Altizer Dios ha muerto para que viviera el hombre y ya no hay nada más que esperar. Se reduce a un humanismo interesante pero sin ningún aspecto de trascendencia o de posibilidades futuras de pensar a Dios. 3. Una nueva manera de pensar Hubo un momento en que se creó un clima de desesperanza en las posibilidades de la filosofía, y se cayó en una actitud pragmatista que llevó a la filosofía farandulera y al repetirse de la imposibilidad de encontrar vías de salida a los desafíos de la modernidad. Pero el mismo análisis de Heidegger abre el camino de una búsqueda mística procedente de Dionisio Areopagita como se ve en sus obras del llamado segundo Heidegger especialmente en los Beitrage. La influencia de Dionisio Areopagita en Heidegger es mostrada por Derrida en Cómo no hablar. Denegaciones, donde "recordaría sin embargo lo que en el pensamiento de Heidegger podría asemejarse a la herencia más cuestionadora, la repetición a la vez más audaz y más libre de las tradiciones que acabo de evocar (Platón, neoplatonismos, Dionisio)" (Derrida 1997) y es que Heidegger, de alguna manera se basa en la teología negativa, en el no-ser, en el rayo luminoso, el problema de Dios y el ser. Muñoz Martínez (2006) sitúa los siguientes puntos de contacto entre Heidegger y Dionisio: CARLOS ARBOLEDA MORA 31 un nuevo pensar que aunque normalmente se había atribuído a Heidegger, Dionisio ya lo había intentado con la teología apofática (Id.). Heidegger asume la teología negativa que revela los límites y fronteras de la razón y la incapacidad del lenguaje racional para acceder al Principio de todas las cosas. Se trata de buscar una nueva manera de pensar fuera de la ontoteología. Abandonar las representaciones indica entrar en otro pensamiento fuera también de la representación y del concepto, como lo hizo Dionisio en sus obras. En lo que se puede llamar el segundo Heidegger (el de Besinnung, Beitrage...) se da la misma estructura de búsqueda: el Ser se da en el evento sin hacer ruido. La teología mística de Dionisio es una experiencia, no una técnica ni una lógica racional, que se expresa en símbolos que dicen algo y luego lo niegan, hay semejanza y desemejanza, logrando expresar algo el símbolo eminente (hyper). El pensar heideggeriano tiene mucho de experiencia con el Ser, o mejor, de experiencia del ser. Es una experiencia mística del Ser que se tiene si se está a la espera, si se está en el claro, si se está disponible en el momento del paso del Ser, y que se expresa de manera más clara en la poesía, no en el lenguaje científico. El poeta es el decidor del ser con símbolos que no agotan ni definen el Ser, sino que lo muestran. "Se podría decir que Heidegger piensa en muchas ocasiones a la manera de la teología negativa" (Id. 43). Gelassenheit) como despojo, renuncia y abandono, le llega a Heidegger a través del "desapego" de Eckhart, como la humildad fundada sobre la nada. La serenidad es el desapego del pensamiento representativo y renunciar al querer vinculado con el horizonte. En Heidegger no es una renuncia voluntaria al querer, como en Eckhart, sino permanecer totalmente ajeno al querer. La serenidad es el estado de permanecer abierto a la Apertura o consumación del UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 32 total abandono que permite la apertura del mundo a Dios en el fondo del alma y la prueba de que el mundo está abierto a Dios allí donde el hombre ya no es él mismo (Libera 2000). Eckart es influenciado por Dionisio Areopagita en este sentido. (Deja los sentidos y las operaciones del entendimiento; deja todos los objetos sensibles e inteligibles, y universalmente todas las cosas que son y que no son. M.T I, 1). Para Dionisio, Dios es una suprema nada sobre la cual no se puede decir algún concepto. Escoto Erígena confirma que Dios no es un ser, porque si es un ser quedaría limitado en una definición. Eckhart sobre este camino habla del desapego como la condición de la apertura a la nada de Dios. Ese desapego es la condición para que Dios se manifieste o, en Heidegger, para que el ser pueda ser visto en el Lichtung. quitando todo aquello que a modo de envoltura impide ver claramente la forma encubierta. Basta este simple despojo para que se manifieste la oculta y genuina belleza. M.T. II). Así mismo, en la misma línea de los antiguos griegos, Heidegger plantea la verdad como aletheia o progresivo desvelamiento o manifestación. Dionisio y el neoplatonismo serían la oportunidad de repensar la ontología, a través de la teología negativa y de una vía mística: Heidegger, al final de su trayectoria, en lo que se llama la vuelta (Kehre), llegó a ver el ser, la realidad, como un don, como un regalo. Incluso le quita ese nombre tan abstracto, por metafísico, que es el de ser, y lo veía como acontecimiento, como acontecer (Ereignis). El acontecer es lo más gratuito que hay, en el doble sentido de que se da porque sí, sin más, y en el de que es algo que hemos de aceptar e incluso agradecer. Esto suena a veces a resignación, y por eso se habla de esta etapa de Heidegger como una etapa mística. Y, al modo de muchos místicos, al menos de una corriente en la historia de la mística, Heidegger adopta una actitud de silencio ante lo indecible, lo inefable. Lo que se llamó teología negativa, o, quizá más propiamente, ontología negativa, pues también del ser puede haber una mística; la ontología ha estado vinculada a la mística (Beauchot 2010). CARLOS ARBOLEDA MORA 33 La filosofía neoplatónica, especialmente Plotino y Proclo, entra al cristianismo con Dionisio Areopagita y con éste llega hasta hoy después de haber tenido una gran influencia en Occidente, a través de Eckart y Dionisio el Cartujano. Heidegger recibe la influencia del Areopagita y de Eckart. Los posheideggerianos y la filosofía francesa actual adoptan, mutatis mutandis, la filosofía neoplatónica especialmente en dos puntos: su rechazo a la metafísica occidental moderna racional-conceptual y su tendencia mística de abrirse a la manifestación del ser más como bondad o caridad que como ente. Bergson, Brehier, Blondel, Trouillard, Festugiére, Saffrey, Hadot, Henry, Marion... son algunos de los que han buscado por esta línea (Hankey 1999). Marion, por ejemplo, encuentra en Blondel la conversión de la voluntad o caridad por la cual se iría a Dios sin caer en la ontoteología. Esta teología sin ontología, Marion primero la descubrió en una relectura del neoplatonismo de Dionisio Areopagita como lo muestra en su libro El ídolo y la distancia (1977). También Agustín influye en Marion con su búsqueda de Dios bajo el nombre de caridad y no bajo el concepto de ser. Así Marion hace una síntesis de Dionisio, Agustín, un santo Tomás neoplatonizado y un Heidegger releído para afrontar los problemas de una concepción de Dios metafísica ontoteológica. Jean-Luc Marion considera que hay que superar el horizonte del objeto y el del ser. Éste ve que la crítica de los Maestros de la sospecha, entendida como crítica a la Ontoteología, es una manera de acabar con los ídolos conceptuales de la razón y abrir el camino a la manifestación del fenómeno saturado. Marion trata esto en su libro Dios sin el ser (2010). Esta concepción de Dios sin el ser, la ha encontrado Marion en el neoplatonismo de Dionisio Areopagita. El ídolo es la comprensión de Dios bajo conceptos, sean éstos antropomórficos o metafísicos. Pensar a Dios como ente supremo o como ente fundamento de la ética es idolátrico. Pero aún pensar a Dios sobre el fondo del ser en su diferencia del ente es idolátrico. Dios sería pensado a partir de una precomprensión humana, la del ser. UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 34 ¿Retroceder de la metafísica a suponer que llega el pensamiento dado al ser en tanto que ser, basta para liberar a Dios de la idolatría... o al contrario, la idolatría de la causa sui no reenvía a otra idolatría... más discreta... y por tanto, más amenazante? [...]. Más allá de la idolatría propia de la metafísica, opera otra idolatría propia del pensamiento del Ser en cuanto tal. (Id 58-65). La solución, para Marion, es pensar a Dios con el término de amor (agape). El amor se da y se da sin condiciones. El donador se abandona completamente a la donación hasta coincidir donador y donación. Y darse completamente sin precomprensiones o comprensiones, es amar. El amor excluye al ídolo, pues en el movimiento del darse, el sujeto no cubre al otro con su conceptualidad sino que se abandona totalmente a él, hasta dejarse determinar en esta donación. Ya no se trata de pensar a Dios desde la conceptualización humana, sino desde el donarse: El amor no se da sino abandonándose, transgrediendo continuamente los límites del propio don, hasta trasplantarse fuera de sí. La consecuencia es que esta transferencia del amor fuera de sí mismo, sin fines ni límites, impide inmediatamente que se deje agarrar en una respuesta, en una representación, en un ídolo. Es típica de la esencia del amor –diffusivum sui– la capacidad de sumergir, así como una marea sumerge las murallas de un puerto extranjero, toda limitación, representativa o existencial del propio flujo; el amor excluye el ídolo, o mejor, lo incluye subvirtiéndolo. Puede también ser definido como el movimiento de una donación que, para avanzar sin condiciones, se impone una autocrítica permanente y sin reservas (Marion 2010). A partir de lo anterior se inicia el trabajo de "ampliar los límites de la razón" para superar la razón científica y dar cabida a una razón que incluya la donación de lo invisible. El neoplatonismo se ha convertido en un camino de búsqueda para superar las críticas a la ontoteología. Esto requiere una nueva manera de pensar. Y es lo que inaugura Heidegger. Un pensar abierto, casi místico. Pero que no se encierra en el concepto clásico, religioso y teológico, de mística. Un pensar místico que atraviesa las regiones de la poesía, el arte, el evento, para encontrarse con la CARLOS ARBOLEDA MORA 35 saturación de lo inconceptuable. Es el habitar poético del mundo. Desde Duméry, Trouillard y Stanislas Breton, en el reciente pasado francés, se busca una línea antimetafísica y quizás posmoderna. Luego Jean Luc Marion, tomando a Dionisio y releyendo el argumento ontológico de Anselmo, encuentra en la caridad el camino a un Dios sin el ser. Henry lo trata por el sendero de la inmanencia material de la vida y Lévinas por el rostro del otro. Se trata así de responder a las cuestiones levantadas por la Modernidad contra el Dios conceptual. Los franceses han tomado la delantera en esta reflexión. Posteriormente, los anglosajones se han introducido en el campo (por ejemplo, John Milbank, A. H. Amstrong, E.R. Dodds). Como se ve en la historia de la filosofía francesa de los dos últimos siglos, ha sido una fenomenología hecha por clérigos en su mayoría o por filósofos allegados a alguna confesión religiosa (Por ejemplo, Pierre Aubenqueprotestantey Jean Luc Marion –católico–). Esto ya hace plantear una pregunta. Será únicamente esta reflexión cuestión clerical de relacionar la fe con la teología, ¿o es el fenómeno saturado, el darse del fenómeno, una estructura universal de la reflexión filosófica? En este último sentido lo plantea Marion pero debe seguir la discusión (Arboleda 2007). 4. Del Dasein al DaGott. Para Marion, responder la cuestión ontológica (¿Qué es el ser?), transforma la reflexión en ontoteología por eso propone dejar que la manifestación sea la que indique el camino. La pregunta subyacente para Marion es: ¿Dios se ha revelado como Ser o como algo más? Asumir que se debe revelar como ser es ignorar la manifestación que se da del fenómeno saturado. Los seres particulares son tales porque son llamados y constituidos por el Otro. Es importante para Marion la respuesta a la manifestación, más que hacerse la pregunta que implica una respuesta del Otro como ser. Dios es sin el ser, es la proposición del francés. Actuando así, subvierte el sistema jerárquico de fundamento y fundado. UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 36 El problema de la muerte de Dios en Nietzsche es uno de los puntos de partida de Marion. Este cree que puede acabar con el ídolo conceptual que es el dios de la metafísica, abriendo el espacio a la verdadera manifestación. Dios debe ser pensado sin el ser. Y debe ser pensado con el único concepto que permanece posible fuera de la diferencia ontológica. El concepto de amor (ágape). Para lograr esta tarea, Marion esclarece fenomenológicamente el "ver". El ver permite desvelar la posibilidad de visibilidad de lo invisible (los fenómenos saturados, incluyendo la estética). El somete la objetividad y la cuestión del ser a la tarea de ser llevadas al extremo. Así radicaliza la reducción husserliana a partir del yo constituyente, pero también la heideggeriana a partir del Dasein. Busca una reducción pura a lo dado como tal, por un interlocutor originario, interpelado por la donación misma. Este es el cuarto principio de la fenomenología. Es el concepto de donación: el fenómeno es un don, un dado, un fenómeno saturado, hasta ahora no reconocido por la fenomenología pero sí presente en la mística, la estética, la historia, la poesía. Este fenómeno es aquel en el cual la intuición excede el concepto y la efectividad precede a la posibilidad. El sujeto (adonado) es el que se recibe a sí mismo cuando recibe el don, el dado. Si recibe el don como no ser, no será ya más Dasein sino Da-Gott o aún Da-Gegeben. Marion trata de refundar la fenomenología. Un nuevo comienzo de la filosofía. De acuerdo con Heidegger, hay dos comienzos históricos filosóficamente hablando. El primero es el descubrimiento (desvelamiento) del ser en la primera filosofía griega, rápidamente olvidado por la preocupación por el ser. Y el segundo, es el comienzo que se da con el trabajo de Nietzsche, aunque, dice Heidegger, éste no logró la plena emancipación de la metafísica (1999) Marion, de alguna manera, se presenta en la línea de este segundo comienzo, tratando de superar a Heidegger. La fenomenología no sería una escuela o doctrina filosófica sino un nuevo método para filosofar lleno de aperturas y posibilidades. Este nuevo método estaría representado, entre otros, por Paul Ricoeur, Michel Henry, Marc Richir, Marion, etc. También la filosofía de Lévinas participa en esta refundación. Su mirada del otro, entraña una redefinición radical de la intencionalidad, una emancipación CARLOS ARBOLEDA MORA 37 de la intencionalidad objetivante y del ver fenomenológico. Todos estos "herejes" de la fenomenología plantean una arquiética, una arquignosis, una fenomenología hiperbólica y metafórica, y un nuevo sujeto pasivo y adonado. Se apura la reducción hasta que es cancelada. La posibilidad de la fenomenología se lleva al exceso. Y se lleva al extremo a Heidegger. Es el uso extremo del Beiträge zur Philosophie heideggeriano. No es que el Ser o la Vida sean algo, con una esencia que se da, sino que el Ser (Heidegger está inspirado en Meister Eckhard y quizás Dionisio) "es" pura donación de sí. Supone una radicalidad total pues la iniciativa es del fenómeno saturado incondicionado e inabarcable y el sujeto es radicalmente pasivo. No hay conceptualización sino simbolización permanente de lo que se manifiesta siempre diferente. Heidegger ya había puesto en cuestión el problema del sujeto constitutivo kantiano. "¿En qué consiste esta puesta en cuestión? En una revolución radical: la subjeti(vi)dad no reconoce ya por objetivo la objetivación del objeto, porque el instrumento último de esta objetivación -la intencionalidad- no apunta ya, como para Husserl al llevar a término el proyecto kantiano, a la constitución de objetos, sino a la apertura de un mundo" (Marion 1993 440). El sujeto no está como espectador constituyente del mundo, sino que es arrebatado por el mundo que se abre y se abre en la medida en que el Dasein hace la apertura mediante su propio éxtasis. "El éxtasis del Dasein consiste en que, lejos de fundarse sobre su esencia o de fundar su esencia en sí mismo (según las dos postulaciones, kantiana y aristotélica, de la subjetividad), él es el ente a quien le va, en cada caso, nada menos que su ser; mejor aún: el ente para quien, cuando le va su ser, está también en juego el ser de todos los demás entes" (Id.). El Dasein es el sucesor y heredero del sujeto constituyente y se convierte en el ser propio que constituye la propia vida en la que está en juego el propio ser. Ese ser mío se da en la resolución. Ésta anticipa despejando el ser del Dasein como cuidado y permite buscar el sentido del ser por venir. La UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 38 resolución aparece y se prepara en la angustia, la duda y la muerte. Estas son experiencias fenomenológicas que abren extáticamente hacia la nada. Pero que según interpreta Marion, en Heidegger se da una reminiscencia del sujeto constituyente pues la autenticidad exige la conciencia del Dasein como constancia de sí mismo expuesto a la nada. El éxtasis del Dasein, aunque en un primer momento, suprime el yo kantiano o cartesiano, en un segundo momento, restablece la autarquía del Dasein, idéntico a sí mismo por sí mismo. Y esa autarquía imita, la autoconstitución y la permanencia en la subsistencia. "Sobre el Dasein sigue planeando la sombra del ego" (Id. 445). Heidegger no da el paso de la superación de la autoconstitución del sujeto aunque ha planteado la apertura del mundo por el éxtasis del sujeto. Está servida la aporía de quien llama y es llamado al mismo tiempo. Heidegger en La carta sobre el humanismo, parece cambiar cuando invoca la "apelación por la cual el ser reclama al hombre como la instancia fenomenológica de su manifestación. Al contrario que en Sein und Zeit, donde la apelación vuelve siempre a ser una apelación de sí mismo, aquí la apelación reclama, en nombre del Ser, al hombre, desde el exterior y de antemano" (Id. 448). Y el hombre instituido por la llamada del Ser, se constituye en el Reclamado. "¿Qué pasa con este sujeto así entendido? Es una revolución radical" (Id. 440). Lo que está en el mundo no son objetos constituidos por el sujeto, sino que el sujeto está como abrumado por lo que encuentra. El mundo no es la suma de los objetos constituidos por el yo, sino que es apertura a lo que se da. El Dasein no constituye al ser, sino que se arriesga al ser que se manifiesta y el ser para la muerte es el arriesgarse a ese aparecer que lo constituye y que no es constituido. La fenomenología recoge ese reto, qué sucede al sujeto? Al sujeto le sucede la interpelación. Esta instituye al interpelado. ¿Qué o quién interpela? Se dan varias respuestas: Dios (en la teología), el otro (Lévinas), la vida (Henry), el ser (el acontecimiento en Heidegger). Son respuestas posteriores simbólicas. Si en el momento de la reclamación se conociera al interpelante, se volvería a la plena intencionalidad y a CARLOS ARBOLEDA MORA 39 la construcción del que se da. Se estaría de nuevo en la ontoteología. Si no hay sorpresa en la interpelación es porque se conoce quién es el ser, el otro, Dios o la vida. Vuelvo a ser un yo constituyente. Pero el total anonimato del apelante y la facticidad humilde del interpelado garantizan la gratuidad del don (Id.). Gratuidad que resuena y se pierde, se pierde pero deja huella, huella que es símbolo pero no esencia. El apelante se manifiesta al interpelado, lo constituye, y de ahí, el interpelado puede responder. La subjetividad es una subjetividad finita, no constituyente sino recipiente de una fenomenalidad encarnada, afectada, inmanente. El ser es el aparecer al sujeto que recibe ese aparecer. Se afirma la irreductibilidad del ser del ego a la objetividad, pues desaparece la intencionalidad y se llena de intuición. Esta refundación de la fenomenología hace de la conciencia, no la condición de la manifestación, sino la manifestación originaria. Es la fenomenología de la esencia de la manifestación, fenomenología de la manifestación inmanente, fenomenología de la vida, el amor, la carne. Esta fenomenología relaciona el logos y las cosas en el fondo de la inmanencia. Entran allí a funcionar la sensibilidad y el pathos. El arte, la pintura, la poesía, el dolor y el sentimiento son lugares donde la experiencia tiene su propio sentido y su propia razón, pues es donde aparece el aparecer. En la obra de arte, por ejemplo, está el fenómeno que aparece y que está por y para aparecer, dándose simplemente en forma saturada. En el proceso de donación, se cuestiona que toda experiencia humana sea una interacción entre el sujeto y el objeto. Hay la experiencia de unidad que se podría llamar de apabullamiento del sujeto por la inmensidad del don. En el método fenomenológico tradicional, la intencionalidad es central y asume que el sujeto y el objeto de conciencia son distintos. La premisa básica, llamada intencionalidad, significa que el acto de pensar es un acto que afirma la unión que existe entre el sujeto pensante y el objeto del pensamiento. Hay un esfuerzo por parte del sujeto para poder conocer al objeto. En la experiencia del don, en cambio, no se actúa con UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 40 los métodos cualitativos o cuantitativos de la investigación científica, sino con la experiencia de lo dado profundamente. En ésta, se abandona lo externo (epojé), y hay un sentimiento de que el ego es trascendido. El yo queda abrumado, sin fronteras, como diluido en el universo, de tal manera que la dualidad entre sujeto y objeto queda superada. El sujeto es agobiado por la experiencia y como ésta no es una experiencia cognitiva, no se puede expresar en conceptos. No hay palabras para expresar en términos de reducción fenomenológica, lo vivido. Sólo se expresa en términos negativos: no tiempo, no espacio, no relación. La intencionalidad queda reemplazada por unas estructuras de experiencia que se pueden expresar como sin tiempo, ni espacio, ni conexión con algo. Es una experiencia total de pasividad, en la que no se piensa o se elaboran conceptos. El sujeto y el objeto son uno? Esa es la conceptualización general de la experiencia, pero va más allá de eso. Hay una inadecuación en el mismo método fenomenológico para dar razón de tal experiencia. La experiencia del fenómeno saturado hace posible entender el estado de un yo kenótico. La fenomenología trascendental tiene que llegar al exceso de la fenomenología radical. En ésta, la epojé fenomenológica coloca entre paréntesis toda preconcepción para poder reducir todo el material experiencial a su pura esencia. Reinterpretar la experiencia con base en las propias preconcepciones o teorías es un error lógico y metodológico. Esta epojé no es una premisa en el proceso de deducción, sino una actitud vital, una fenomenología práctica que lleva a la pura experiencia. Esta experiencia no es contraria o distinta a la razón, sino que es su plenitud. La razón, desde la modernidad, se quedó en los fenómenos pobres de intuición (y potenció la ciencia experimental), dejando para otro tipo de conocimiento como la fe, lo relativo a lo trascendente que no era construible por el Yo. La radicalización de la fenomenología abre de nuevo el campo a la potencia de la razón, aunque con un yo receptivo y no potente. San Juan de la Cruz indica el método fenomenológico de ese proceso y muestra el resultado. La dificultad con San Juan es que ha expresado su camino con un lenguaje que puede ser el de la ascética y la religiosidad, y así se ha entendido. Despojando a sus obras de la CARLOS ARBOLEDA MORA 41 intelección piadosa que se ha hecho de ellas, se encuentra un método que es completamente comparable al de los nuevos fenomenólogos franceses. La reducción fenomenológica, eidética, trascendental y egológica tiene allí su residencia aunque haya que hacer un trabajo de traducción del lenguaje ascético-virtuoso y de sus connotaciones culturales al filosófico. La experiencia transmitida por él, es profundamente racional, en sentido amplio, y presenta una epistemología del misticismo como recepción del don. En un contexto epistemológico, el estado de negatividad del alma puede considerarse como la condición de posibilidad de una directa intuición del fenómeno. La negación presupone la pasividad del sujeto y la actividad de quien se revela. Esta actividad es la divina infusión o sea la plena donación o plena intuición. Superando las dos analogías o símbolos principales utilizados por San Juan de la Cruz, el amante y el esposo, se puede ver el amor como expresión de esa relación entre el sujeto y el donador. Aunque se puede pensar que es una mística o una donación irracional, la mística de San Juan de la Cruz muestra la posibilidad real de la donación. Marion presenta la estructura fenomenológica de la donación y San Juan de la Cruz su realización. Es otra forma de presentar la razón, no ya como la que domina, sino como quien recibe. El ejercicio de la simbolización hace que la razón tenga un papel importante en la reflexión sobre la experiencia de la manifestación. La donación es una apelación que "me" constituye. El momento de la apelación me constituye en "me" o "a mí". Llamado, desaparecido todo yo, soy invadido por la interpelación. Hay un desastre del yo y se constituye el "a mí", el interpelado, el llamado. Este tiene cuatro características: convocación, sorpresa, interlocución, facticidad (Marion 1993). El interpelado siente una llamada de sometimiento. Sin ninguna intencionalidad o reflexión previa, se anula la subjetividad en aras de una llamada anónima. Es sorprendido por un éxtasis que no es cognoscitivo (pues el sujeto no despliega un objeto ya constituido o conocido) sino que es oscuro, éxtasis impuesto, soportado, subyugante. No hay conciencia UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 42 original constituyente sino sorpresa de una llamada que no se sabe de donde viene. No es una admiración metafísica dada en la subjetividad, sino una admiración inmanente dada al yo paciente. Esa apelación "me habla" sin conceptos, simplemente "se me da" constituyéndome en interlocutor que no contesta sino que "sufre" una interlocución, es la reducción fenomenológica a lo puramente dado. Esa interlocución produce o hace reconocer la facticidad. Todo humano es convocado, llamado, "interlocutado" desde antes de su nacimiento. El hablar del interpelado es oír pasivamente una palabra sin conceptos pero que crea alteridad y "me" constituye en "llamado". Es oír una llamada no conceptual que sólo es llamada, don, apertura al aparecer de la llamada gratuita. Se constituye el hombre como "dotadodonado" con capacidad de responder, lo que mantiene la "diferencia". El llamado no es el apelante, sino el receptor de la llamada que lo constituye "otro" distinto al apelante. La llamada no proviene del apelado pues sería clara y distinta, y, en verdad, es oscuramente clara o claramente oscura. La autenticidad radica en la pasividad de la recepción, la inautenticidad en la constitución del yo fuerte. La primera confirma la verdad de la constitución por el llamado, la segunda la limitación a lo que el yo pueda constituir. El interpelado difiere del apelante y, por tanto, difiere también de sí mismo, no es un yo sino un otro, el otro del interpelante y el otro de los interpelados. El retraso entre la percepción del llamado por parte de los interpelados y el llamado del interpelante, marca también la diferencia entre los dos. El interpelado es un retrasado ante el continuum del llamado. ¿Quién es el interpelante que "me" constituye? Aquí hay un problema con los autores tratados. De alguna manera, introducen la intencionalidad al decir que es el Ser (en el evento), Dios (en las religiones), el Otro (Lévinas), la Vida (Henry), el Amor (Marion), Cristo (Tillich). Hacen una aproximación simbólica al interpelante. Este es anónimo, oscuro, profundo, innominable... que no se puede colocar en una instancia regional como lo simbólico, aunque éste es la única manera de nombrarlo precariamente. Por eso, la propuesta apofática salvaguarda el anonimato del interpelante y permite que en el evento se manifieste el mismo en forma diferente cada CARLOS ARBOLEDA MORA 43 vez y no se pueda agotar su realidad ni entender su esencia. La filosofía permanece como tarea siempre antigua y siempre nueva en un proceso de hermenéutica de la llamada, indagando por el aparecer y por el don, sin agotarlos ni reducirlos. El anonimato del interpelado garantiza la labor sin tregua del filósofo: el darse y el perderse de la donación hace que no necesite fundación pues se cumple en el resonar y se cumple también en el perderse (irse sin dejar huella ni nombre). El recurso a lo simbólico, de manera inmediata en la filosofía, haría que estuviéramos fundando la apelación de nuevo en la metafísica, o reduciéndola a conciencia de la inmanencia. En verdad, se revela en la inmanencia como sorpresa de alteridad, pero no se confunde con ella y sólo sería, en este caso, un epifenómeno sicológico o patológico, y se conocería de antemano el quién de la interpelación. No es el resultado de una intuición obsesiva deseada o profundamente dirigida. Como dice Marion: "la reclamación no tiene que hacerse conocer para hacerse reconocer, ni identificarse para ejercerse" (Id. 455). Pero ahí está la labor del filósofo: buscar más allá del ser pero no con la razón que desembocaría en una teodicea, sino en el exceso de una extática erótica. El inicio de la filosofía no es la pregunta por el ser, sino la admiración o asombro por la realidad total que no se expresa en conceptos de ser. Este es un símbolo posterior a la experiencia del aparecer del fenómeno. La realidad es revelada, manifestada, donada. La filosofía racional luego trató de domeñarla a través del logos conceptual. Este hizo del ser algo único y unívoco, dejando al símbolo y a la metáfora el papel de simples expresiones retóricas, cuando en verdad acogen (imperfectamente) la totalidad de la realidad siempre nueva y reveladora, pero siempre oculta e indecible. La physis ama el ocultamiento y lo que se manifiesta son sus apariciones (Heráclito Frag. 123). La filosofía occidental ha pretendido su aprehensión intelectual y por eso le ha quedado únicamente el concepto preciso como solución descuidando el pensamiento simbólico. Este exige que en el fondo haya una pneumatología, una revelación. Así la nueva metafísica es una poesía, poesía erótica del aparecer y del aparecer como interpelado por la cuota mistérica de lo que da y se oculta. La filosofía es una mística, poiesis de UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 44 la experiencia extática de la presencia del fenómeno total. Poiesis siempre posterior a la experiencia de la facticidad y la sorpresa. La experiencia de la que se ha venido hablando es una dimensión humana. Siempre se da en la humanidad como vía de acceso a la realidad, pues la filosofía como aprehensión total y conceptual del ser es una tarea posterior de los filósofos. Primero han estado la mística (cerrar los ojos para ver) y los misterios (orgía y frenesíembriaguez ante el abandono de la razón). No es propiedad de una determinada religión ni es una experiencia únicamente religiosa, aunque las religiones se han apropiado de ella arrebatándosela al hombre. Esto era claro para los griegos órficos: la iniciación mística permitía a los filósofos comunicarse con el más allá. Esta comunión con el más allá es la vivencia extática misma, de naturaleza poética, que produce el entusiasmo filosófico para poder "ir más allá". "En una noche oscura, con ansias en amores inflamada, Oh dichosa ventura, salí sin ser notada, estando ya mi casa sosegada", expresará San Juan de la Cruz. Es el platónico "dar la espalda al mundo", dejar aparte el intelecto y sumergirse en lo báquico como denomina Marsilio Ficino la tarea de la teología mística en Dionisio Aeropagita (Ramos 1992). Este dejar aparte el intelecto no es rechazarlo pues la experiencia no lo anula sino que lo deslumbra. Es una iluminación del intelecto racional, pero no una iluminación racional del intelecto o un reemplazo del intelecto racional. El exceso es posible, la cultura podrá simbolizar la manifestación en un juego orgiástico de simbolizaciones que permitirán la hermenéutica remitiéndose al fenómeno que siempre se revela en forma diferente. Sean vida, libertad, amor, incondicionado, alteridad... el juego de los símbolos dirigirá la cultura que vive en el exceso de la manifestación, la posibilidad de la profundidad. La filosofía primera es la donación de la profundidad y la hermenéutica es la simbolización múltiple de su aparecer. Es un pensamiento difícil de comunicar pero hay que mantener la pasión por testimoniarlo: Dios es el que se manifiesta al hombre y por eso éste es "Dios ahí" (Da-gott). El ser ya no entendido como ser sino como donación de amor, es el propio manifestar o dación, y es su relación con el recipiente. El darse significa la esencia misma de la donación, pues el CARLOS ARBOLEDA MORA 45 amor es concederse. Heidegger lo entendía como darse del Ser (de ahí sus restos metafísicos), pero en Dionisio y Marion, es el darse del dar, darse del Hyper-ousia, darse del amor, darse de Dios. El hombre es el recipiente, la apertura que es llenada con el darse del amor, es el guardián del amor recibido. Esa es la humanidad del hombre: ser el ahí del amor, en términos creyentes, ser el ahí de Dios. El hombre no es pues un objeto biológico, ni siquiera un animal racional, sino que es el ahí de Dios (Da-gott) 5. Unas conclusiones para seguir pensando Dionisio Areopagita seria pues el nuevo medieval contemporáneo que permitiría el acceso a los fenómenos que no caben dentro de la razón científica y ayudaría a comprender la situación humana hoy. Hay unos puntos comunes de reflexión que quedan planteados con la relación Dionisiomística medievalHeideggerfenomenología francesa: La posibilidad filosófica y la efectividad teológica de una experiencia de Dios. Punto importante pues tiene muchas implicaciones en filosofía y en teología. Por una parte, se salvaguarda la posición filosófica de la fenomenología de seguir pensando la posibilidad de la manifestación del ser y se conserva la propiedad teológica de hablar de la efectiva revelación de Dios. Pero, por otra parte, abre una fuente de reflexión interesante: ¿hay una estructura ontológica originaria humana que permita hablar de la posibilidad de acceder a Dios por parte del hombre? En San Agustín y en Heidegger se dan las bases de esa estructura y de esa posibilidad. La estructura ontológica originaria, según Agustín, está fundamentada en la preocupación o inquietud1. La vida es preocupación por la "vita beata", es decir, por la autenticidad, en términos de Heidegger, que busca la salvación. La existenciariedad (anticipación de las posibilidades), UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 46 la facticidad (encontrarse arrojado en el mundo) y la caída (posibilidad de perderse en la inautenticidad debido a la delectatio (tentación) son tres elementos cooriginarios de la preocupación por la felicidad. En esa estructura originaria late y lucha por salir el deseo de Dios. La vida es movilidad vital fáctica y su esencia es la preocupación por lo que verdaderamente hace feliz al hombre. Hay un anhelo "esencial" por lo definitivo que da sentido a esa movilidad vital. En otros términos hay un anhelo que indica una apertura a otra cosa que no sea fáctica ni histórica ni finita. Podría ser lo que Heidegger llama la pregunta por el ser, tarea infinita y que sería la apertura a la manifestación del ser, o manifestación de Dios en otros filósofos. Una definición sencilla del hombre es que es una apertura que necesita ser llenada, un espacio a la espera del acontecimiento plenificador. El hombre es una esperanza abierta a una manifestación de algo más allá de él mismo. Si esto sea un existenciario ontológico, es tarea tanto de la filosofía como de la teología investigar su consistencia. La posibilidad de una crítica definitiva a la ontoteología desde la concepción autorrevelatoria del fenómeno saturado. La crisis actual de las religiones institucionalizadas radica en gran parte en la concepción ontoteológica del Ser supremo y en la esclerosis dogmática de sus creencias. Una vuelta a la comprensión de lo Ultimo como fenómeno saturado, a través de la mística, salvaría la absoluta transcendencia de Dios, la plenitud de su manifestación aunque inabarcable, y la historicidad dogmática de las religiones. Si definitivamente se ha enterrado la ontoteología, la tarea de la filosofía y la teología es volver a la experiencia. La experiencia de lo que puede llamarse el Incondicionado o el fenómeno saturado se da al hombre continuamente. Si es innombrable e indefinible en su esencia misma o en el instante de su manifestación, no lo es en el acto hermenéutico que sigue a la revelación o manifestación. La experiencia de la manifestación es universal y permanente, pero la interpretación de ella por parte del recipiente es histórica y cultural. El incondicionado se manifiesta siempre tal cual es, es decir, total y excedente, magnífico pero inagarrable, colma todas las intencionalidades del hombre y desborda todo horizonte de CARLOS ARBOLEDA MORA 47 comprensión. Así la experiencia siempre es total e incompleta al mismo tiempo. Se tiene la experiencia de la totalidad pero no se logra asimilar toda su magnitud. Dios se da en sí mismo, en lo que él es, pero el hombre no logra asimilar toda su manifestación. Por eso, sigue la interpretación que tiene dos etapas. Una primera etapa es poética. Se trata de expresar lo que es Dios en términos como unión, matrimonio, luz, vida, amor, belleza, claridad...En la segunda etapa se expresa en los términos de la cultura o sea en forma hermenéutica. La hermenéutica trae la experiencia a una forma comunicable dentro de una cultura. Se sitúa en una historia y en una tradición donde es significativa dicha experiencia por la semejanza o desemejanza con otras experiencias recordadas en la cultura. Esta tradición se convierte en forma autenticatoria de la experiencia tenida, y si lo es, se considera parte constitutiva de la misma tradición. Pero como situada también históricamente, tiene algo que decir al momento mismo de la comunidad donde se realiza. La experiencia se sitúa en la comunidad pero es novedosa para esa comunidad. De lo contrario, se estaría repitiendo la tradición o legitimando una coyuntura. Toda experiencia es novedosa pues está situada en la tradición y al mismo tiempo la confronta con nuevas adquisiciones. La solución que aporta Dionisio a Heidegger y a los fenomenólogos al hablar de la simultaneidad de la manifestación y el ocultamiento. Sólo una manera de pensar distinta a la de la metafísica tradicional, una manera de pensar encarnada en la razón mística, permitiría el acceso al misterio, misterio que se revela plenamente en cada manifestación, pero que se oculta de nuevo en su darse. Queda así salvaguardada la nueva metafísica de toda idolatría conceptual, histórica e integrista. El testigo de la manifestación, sujeto pasivo, elabora su experiencia con los símbolos que incluyen lenguaje, cultura, historia, pero que son siempre y constantemente hermenéutica del don. La dinámica de la manifestación y del ocultamiento siempre salvaguardan la "distancia" de Dios que se revela pero sigue siendo oculto. En términos sencillos, sólo "pedazos" o "rasguños" de Dios se captan en la experiencia mística y esos pedazos UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 48 o rasguños alimentan la historia de las comunidades, obligándolas a vivir siempre en la esperanza. El ya y el todavía no, indican la libertad de Dios y alimentan los esfuerzos humanos. En cada revelación Dios se da pero todavía no es el momento de su dación definitiva. Así se asegura la vida en la tierra, vida alimentada por la posibilidad siempre presente y siempre futura de la salvación. Esto cambia el sentido del tiempo, como lo muestra Heidegger en su análisis de las cartas paulinas. El cristiano primitivo no vive en el tiempo cronológico de lo que pasó y lo que vendrá. El cristiano vive en la tensión dialéctica entre lo que ya está dado sin estar completo, y lo que vendrá aunque ya está aquí. La esperanza se convierte en la seguridad de que la promesa ya está realizada aunque todavía no se ve claramente su cumplimiento. Así todo momento es ya el segundo advenimiento a la vez que impulsa a que se haga presente su plenitud. No se sienta el creyente a esperar lo que se espera, sino que siente que lo esperado ya está aquí en medio de las luchas y dificultades del presente. El carácter de la ética originaria que surge en el acto de revelación. Uno de los problemas graves hoy es el de la fundamentación de la ética. La manifestación del don, revelación del fenómeno saturado, continuo trato con el misterio del ser o de Dios, apertura al acontecimiento o Evento, fundamentaría una ética humana integral, sea que la hermenéutica entienda lo manifestado como Ser, vida, amor, el otro, luz, u otro símbolo histórico-cultural. Pero sólo una experiencia de Absoluto fundamenta una ética originaria. Bibliografía Altizer, Thomas. The Gospel of Christian Atheism. Philadelphia: Westminster Press, 1966. _____. Toward A New Christianity: Readings in the Death of God . New York: Harcourt, Brace & World, 1967. CARLOS ARBOLEDA MORA e 49 Altizer, T. y William Hamilton. Radical Theology and the Death of God. Indianapolis: Bobbs-Merrill, 1966. Arboleda Mora, Carlos. Profundidad y cultura. Del concepto de Dios a la experiencia de Dios. Medellín: Universidad Pontificia Bolivariana, 2007. _____. "Dionisio Areopagita y el giro teológico de la fenomenología". Pensamiento y Cultura. 13,2, (2010): 181-193. Beuchot, Mauricio. Instituto de Investigaciones Filosóficas de la Universidad Autónoma de México. 2010 <http://www.filosoficas. unam.mx/~afmbib/mayteAFM/Ponencias/19001.pdf>. Bonhoeffer, Dietrich. Resistencia y sumisión. Cartas desde la prisión. Salamanca: Sígueme, 1983. Caputo, John D. Philosophy and Theology. Nashville: Abingdon Press, 2006. Cox, Harvey. The Secular City. New York, MacMillan, 1965. _____. Fire from heaven: the rise of pentecostal spirituality and the reshaping of religion in the twenty-first century. Cambridge: Da Capo Press, 2001. Derrida, Jacques. "Cómo no hablar. Denegaciones". Derrida, J., Cómo no hablar y otros textos, Proyecto A, 1997, pp. 13-58. Edición digital de Derrida en castellano. http://www.jacquesderrida.com.ar/textos/ como_no_hablar.htm (consulta enero 10 de 2011). Gogarten, Friedrich. Destino y esperanza del mundo moderno, La secularización como problema teológico. Madrid: Marova, 1971. UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT 50 Hankey, Wayne John. "French Neoplatonism In The 20th Century". Animus. 204. 4 (1999): 135-167 Heidegger, Martin. Estudios sobre la mística medieval. México: FCE, 1997. _____. Contributions to philosophy (from enowning). Indiana: Indiana University Press, 1999. Libera, Alain de. Patxi Lanceros y José María Ortega. Pensar en la Edad Media. Barcelona: Anthropos, 2000. Marion, Jean-Luc. L'idole et la distance, Cinq etudes. Paris: Grasset et Fasquelle, 1977 _____. "El sujeto en última instancia". Revista de Filosofía. 6. 10 (1993): 439-458. _____. Dios sin el ser. Castellón de la Plana: Ellago, 2010. _____. "La conversion de la volonté selon 'L'Action'". Revue philosophique de la France et de l'Étranger, 177.1 (1987): 33-46. Muñoz Martínez, Rubén. Tratamiento ontológico del silencio en Heidegger. Sevilla: Fénix Editora, 2006. Pagallo, Giulio F. "¿Para qué Presocráticos?". Apuntes Filosóficos. 14. 27 (2005): 217-218. Ramos, Jorge. "Un acceso filosófico a la noción mística de gracia en san Juan de la Cruz." Estudios 28 (1992): 15 Ene. 2011 < http:// biblioteca.itam.mx/estudios/estudio/letras28/toc.html > CARLOS ARBOLEDA MORA 51 Robinson, John. Honest to God. Philadelphia: Westminster John Knox, 1963. Thomson, Ian. Heidegger on ontotheology. Cambridge: Cambridge University Press, 2005. Vahanian, Gabriel. The Death of God: The Culture of Our Post-Christian Era. New York: George Braziller, 1961. Van Buren, Paul. The secular meaning of the Gospel. New York: Macmillan Co., 1963. UN NUEVO PENSAR SOBRE DIOS: DEL DASEIN AL DAGOTT | {
"pile_set_name": "PhilPapers"
} |
Soulstar
Soulstar is a hybrid rail shooter/third-person shooter video game developed and originally published by Core Design for the Sega CD in Europe on April 1994, then in North America by Time Warner Interactive on September 1994, and later in Japan by Victor Entertainment on December 22 of the same year as well.
When the ancient Myrkoids alien race arrive upon the titular solar system to drain its planets from their resources and destroy them, it is up to Bryk Hammelt of the Cryo-Commandos warrior race to eliminate the Myrkoids by piloting his morphing fighter craft named the Aggressor. As the penultimate title developed by Core Design for the Sega CD, Soulstar features heavy use of the scaling and rotation capabilities of the add-on, similar with other titles on the system created by the same developer such as Thunderhawk and Battlecorps, which featured the same pseudo-3D graphical style. It is inspired by Sega's 1988 arcade game Galaxy Force II.
Upon release, Soulstar received praise from critics for its technical achievement on the hardware, soundtrack and multiple playstyles, though it received criticism for the repetitive gameplay. Nevertheless, the game was named "Best Shooter" on the Sega CD by GameFan. Ports for the 32X, Atari Jaguar CD and PC were in development by Core Design, but they were never released.
Gameplay
Soulstar is a shooter game that is primarily played in a third-person perspective behind the ship, similar to Galaxy Force II and Star Fox, where players take the role of Bryk Hammelt from the Cryo-Commandos in a mission to exterminate the alien race known as the Myrkoids, who have arrived on the titular Soulstar system to invade it. The gameplay is based around three types of space combat vehicles that the player's ship, the Aggressor, can transform into depending on the situation.
The first mode is an on rails shoot 'em up akin to Space Harrier, where it involves flying the Sub-light Strike Craft through space towards huge scaling sprites of a planet or space station and flying across a texture mapped planetscape, while shooting upcoming enemies from either the front or behind and collecting power-ups along the way.
The second mode involves controlling the Turbo Copter hovercraft in environments of 360°, allowing players to roam freely across the map on missions that take place in indoor or outdoor areas. In this mode, players are tasked with eliminating primary targets within the area, which are displayed before the start of each level at the mission briefing screen. A notable feature of the game is how the difficulty level is selected: After entering the second level and destroying the boss of the area, there are three warp gates that players can activate, each one representing a fixed level of difficulty of the game (from Easy to Hard) and a set number of levels to go through. At the end of each level set, the player returns to the space station to choose a remaining warp gate.
The third mode is similar to the Turbo Copter mode in terms of gameplay, but this time players control the Combat Walker mecha, which is capable of dashing along the ground and hover above the terrain for a brief period of time. Each vehicle in the three gameplay modes offer a different control scheme and functions. The game also has a two-player cooperative mode, where the first player pilots the spaceship, while the second players acts as an air gunner aiming at the enemies.
Plot
The Myrkoids, an ancient alien species with a cold and unified mind have descended upon many star systems, stealing and draining every planet of their resources and destroying them in the process. Following the destruction of his home system, Bryk Hammelt, the last from a noble warrior race known as the Cryo-Commandos, sets out in his morphing starship, the Aggressor, to hunt down and eradicate the Myrkoids from existence, who have arrived at the Soulstar system to repeat their same process of planetary extermination.
Development
Soulstar was conceived by Mark Avory (now Sarah Jane Avory) after work on the Sega CD port of Thunderhawk was completed. Mark had the desire to develop a project similar to Galaxy Force II, as it was one of his favorite titles in arcades, but no existing hardware released at the time on the market was capable of producing visuals of similar fidelity until the arrival of the Sega CD in 1991, which allowed Mark and one of his co-workers to make their vision a reality. The project began development in March 1993, two months after Thunderhawk was released in North America on Sega CD and was announced in late 1993 under the original name Aggressor and later as Soulstar: Malice of The Myrkoids in early 1994, along with other then-upcoming titles for the add-on by Core Design such as Battlecorps, Heimdall and BC Racers (then titled Chuck Rally).
Soulstar makes intensive use of the features available on the Sega CD hardware for its visuals, in addition to being the first title on the add-on that displayed sprites at 64 colors. Mark and his team planned on pushing the hardware as much as they could from the beginning of its development, with all of the sprites featured in the game being built on the system's WRAM as "stamp maps" in order to be displayed on-screen by the Sega Genesis, in addition to creating a display list to showcase up to 80 moving sprites. Mark also integrated a graphical trick that allowed both the sprites and terrain to exhibit color depth-fading. The soundtrack composed by Nathan McCree was implemented early in development and enters synchronization with gameplay during the Sub-light Strike Craft sections. Both Battlecorps and Soulstar shared the same game engine as with Thunderhawk on the Sega CD.
The game was showcased during the Winter Consumer Electronics Show in 1994, with early previews showing elements that are not present in the final release.
Release
Soulstar was first released in Europe on April 1994, featuring the option of choosing between different languages for in-game options and text. The game was later brought to North America by Time Warner Interactive on September of the same year, with the language options being removed from this release. It was also published during the same year in Japan by Victor Entertainment on December 22, with all the in-game text left entirely in English.
Soulstar X
A version of the game for the Sega 32X, titled Soulstar X, was in development by Core Design and announced in 1995. Originally planned for an April 1995 release and later planned to be launched on Autumn/August 1995, this version was set to feature improved gameplay and new weapons, in addition to sporting pre-rendered graphics and sprites at 256 colors that were created by using the Wavefront graphics software program found on Silicon Graphics (SGI) workstations, instead of the original hand-drawn look on Sega CD but it was ultimately never released due to the commercial failure of the add-on. On February 20, 2010, a ROM image of an early but playable prototype of Soulstar X for the 32X was leaked online by a video game collector at the SEGASaturno forums.
A port of Soulstar X to the PC was also planned and in development by Core Design, but never released.
Atari Jaguar CD version
A port of Soulstar for the Atari Jaguar CD was also in development by Core Design and announced during the same time along with Soulstar X for the 32X. This version was set to feature the same pre-rendered sprites as with the 32X version but with reworked graphics compared to the Sega CD original, in addition to redone FMV sequences while retaining the same gameplay found on the original version, albeit at a faster frame rate. In a February 1995 interview by Atari Explorer Online with former Core Design employee Andrew Smith, he stated that work on the port was almost finished but not without the team coming across with issues found within the system's multi-chip architecture, in order to meet a strict time limit for completion. Andrew also stated that they were open with the idea of porting the title to the Atari Jaguar, but suggesting that some elements would need to be omitted for a possible cartridge release, and that the idea would also need to be proven viable for Atari Corporation. It was first shown during Spring ECTS '95 and was originally planned for a Q2 1995 release.
Soulstar for the Jaguar CD was then showcased during E3 1995 along with Soulstar X, and now planned for an August/Q3 1995 release. Though internal documents from Atari Corp. listed the port as in development and later advertised to be launched in late 1995, the port was ultimately never released with no explanation given in regards to its cancellation. Although Andrew Smith stated that the company did have some titles from their catalog listed to be converted for the Jaguar, with Susan Lusty of Core Design stating at WCES '95 that both Swagman and Tomb Raider were planned to be released for the add-on, Core's PR manager Susie Hamilton later clarified in 1999 that Soulstar was their only title in development for the platform.
An ISO image of a playable build of the Jaguar CD version was leaked sometime online, but gameplay is very prone to glitches and game-crashing bugs. A bootleg copy of this version was seen running at the fan festival Jaguar Connexion 2005. In recent years, video game collector and community member Matt Smith has uploaded a full playthrough from an almost complete build of the Jaguar CD version on YouTube, with plans to be released online for download in the future.
Reception
Pre-release
In their April 1994 issue, Electronic Gaming Monthly gave a positive remark to the game by stating that "Fans of the Galaxy Force series of games will be pleased to see the creation of this great looking CD!". Dave Halverson of GameFan also gave positive remarks to the title, stating "If you've been waiting for another great shooter for your Sega CD, better dust it off. Soul Star is coming". GamePro gave a positive remark to the game as well when it was showcased at WCES '94, praising the graphics, music and variety.
Post-release
Soulstar received upon release. GamePro gave the game a mixed review, saying that the graphics and audio are impressive, but that "the interstellar flying, which dominates the game, makes you feel like you're confined to a tight, invisible box - a drawback for Mode 7 fans." They also commented that the steep difficulty curve makes the game unsuitable for novice gamers.
References
External links
Soulstar at GameFAQs
Soulstar at Giant Bomb
Soulstar at MobyGames
Category:1994 video games
Category:Cancelled Atari Jaguar games
Category:Cancelled PC games
Category:Cancelled Sega 32X games
Category:Cooperative video games
Category:Core Design games
Category:Multiplayer and single-player video games
Category:Rail shooters
Category:Science fiction video games
Category:Sega CD games
Category:Sega CD-only games
Category:Third-person shooters
Category:Video games developed in the United Kingdom
Category:Video games scored by Nathan McCree
Category:Video games set in fictional galaxies
Category:Video games set in outer space
Category:Time Warner Interactive games | {
"pile_set_name": "Wikipedia (en)"
} |
Artelida diversitarsis
Artelida diversitarsis is a species of beetle in the family Cerambycidae. It was described by Fairmaire in 1902.
References
Category:Dorcasominae
Category:Beetles described in 1902 | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
Memory leak for javascript setInterval
Is there any difference between these 2 statements
setInterval(animateImage, 1000);
or
setInterval('animateImage()', 1000);
Will the second statement be interpreted by the browser js engine is any different way that could cause memory leak or performance issues. Same is the case with the setTimeout() call. The application makes use of 4 timer calls with 1-2 sec intervals.
A:
The biggest difference is that the second statement will cause animateImage() to be evaluated in global scope.
This can lead to problems if
animateImage is not in global scope
animateImage has to access variables that are not in global scope
E.g. the following will not work:
function foo() {
var answer = 42;
function bar() {
alert(answer);
}
setTimeout('bar()', 1000);
}
foo();
Actually there is never a reason to use the second statement, so the question about memory leaks is not relevant anymore ;)
And obviously, passing a direct reference to a function will be 'faster' than evaluating a string.
A:
Use the first one. It makes debugging nicer since there's no eval'd code involved, it is faster and cleaner. Eval is evil and it's good to avoid it whenever possible.
In case you ever need to pass an argument, use the following code:
setInterval(function() {
animateImage(...);
}, 1000);
| {
"pile_set_name": "StackExchange"
} |
Between The Winds
The last thing Annette really wanted to see was her spouse drooling and crawling over an entire warehouse worth of ammunition.
If nothing else, Elvira seemed amused by The Builder’s antics. She also seemed to hope that they’d wipe their slobber off of everything.
“I take it you like what you see, no?” The Builder just answered her with unintelligible blathering.
Elvira then turned to Annette again. “Well, while your partner has a ball there…” She then pulled out a folded piece of paper, and handed it to her. “This time, we’ll make it easier for you. Just wait until the noise outside dies down first. Then go looking.”
Unfolding it, Annette realized she was really looking at an old photograph. But that wasn’t what shocked her.
What did shock her was who it was being photographed.
…
Harwood was fast asleep in bed tonight. Sinbad quietly watched as he dozed off, easing off into dreamland. His ever-present cane gun was leaning against the wall.
As for Marc, he couldn’t wait to use the as of yet unfinished cabin on the other end of town. He was apparently there now, having left with the same entourage Sinbad saw him with last time.
Sinbad himself couldn’t get to sleep. He sat on his bed, half-naked and wide awake.
The wind was blowing outside, drowning out the sounds of traffic and nightlife. He could hear something rattling, possibly a flowerpot having tipped over.
He was personally surprised that Marc could even think about sex in this gusty weather.
Quietly getting up so he wouldn’t wake his father, Sinbad stepped out into the other main room. The digital displays of the various clocks cut through the darkness.
Although it was going to be spring time in a few weeks, he still shivered and wrapped his arms around himself.
Treading over to the kitchen area, Sinbad felt around for the stove and teapot. He tried to muffle his profanity when he stubbed his toe on the table leg.
…
The family was glad they stayed one more night at the hotel, if only so they weren’t at nature’s mercy.
Shark was huddled under the blankets, covering his ears to block out the howling outside. He was amazed that his parents could sleep through it.
Next to him, Sagebear was on watch, ever the dutiful guard dog. She took a stance and growled at the sounds outside, and gave the occasional “boof”.
When Shark poked his head out, he then put a hand out to know where Sagebear was. In response, she turned to lick his hand, and rub against it.
Knowing where she was now, Shark sat up and wrapped his arms around her. He gently squeezed the soft, chubby dog like a pillow.
Sagebear didn’t seem to mind this too much, given the way her tail began thumping against the mattress.
…
Annette could somehow hear boxes smashing against the pavement as she trekked outside into the relentless gales.
Each time something came flying at her, she ducked away just in time. Annette made doubly sure that the photograph was safely in her pocket.
She was at least grateful that The Builder elected to stay behind and continue making a bigger fool of themself than usual.
“Couldn’t I at least have had the address?!” She shouted, but her words were lost in the wind around her.
When the gusts began picking up around her again, Annette clutched onto the nearest thing tied down. A large tree threatened to uproot and fall over a few yards away.
She crouched down to the ground, and clawed her way to a hopefully sturdy-looking streetlight.
“I don’t remember this city being so fucked-up weather wise!” Once again, she could barely hear herself.
Seeing the nearest shelter, Annette steeled herself, and dug her hands into the dirt again.
…
“Ow! Fuck, that’s hot…” Sinbad made the mistake of touching the stove burner while it was heating. “Is that blistering? Okay, no. It looks fine… Yeah, fuck it.”
Stumbling over to the light switch, Sinbad had a hard time turning it on. When he managed to, he was able to properly look over his palm.
“All right, I’m good-” He was startled by the phone ringing. Checking to make sure it didn’t wake Harwood up, he answered it. “Hello-”
“Bro!” Marc sounded far cheerier than he usually did. “What’s happening? Hey, do me a favor. Can you bring me my-Guys, shut up!- bring my medication here? I’m probably gonna be here all night.”
Raising an eyebrow at what Marc had apparently planned, Sinbad then rolled his eyes and sighed. He didn’t want to go out in the horrific wind, but he understood why Marc probably wanted to stay there.
“Yeah, hang on. Let me put some clothes on…”
…
Stepping out into the hallway, Shark made certain he had the hotel key card and Sagebear with him.
The wind outside was more muffled than it was in the room. Shark was at least grateful for that as he walked out to the lobby.
Counting the spare change he’d gotten out of his pants pocket, he then stood in front of the vending machines.
“What should I get, Sagebear? Chips, candy bar, fruit gummies?” Sagebear just tilted her head at his question. Still he went on as if she answered.
“Gummies it is.” After making his selection, Shark then wandered over to the pop machine, and looked for anything that would count as juice.
After choosing there, Shark then sat up against the wall, beginning to snack on his choices. Sagebear sat in his lap, trying to sniff at his snack.
“No, Sagebear,” he said to her as he leaned in to touch her nose, “these could make you really sick. We don’t want that.”
…
Elvira waited until The Builder was done mooning over their prized acquisition before speaking to them.
“So tell me,” she said in a voice not without smugness, “how do you intend to transport all this ammunition back to your base?”
The Builder looked up and pulled their knife out, not even bothering to wipe the slobber from their face. “Way ahead of you, Draculara!”
Quickly running into another room in the warehouse, The Builder could be heard apparently ripping something open.
“All right, get out here! All of you!” They were heard shouting.
A minute or two later, they came back with their assistants. The Builder then directed the four of them to bring everything back to base.
Watching with amazement, Elvira was admittedly stunned at how much fear The Builder could drive into their assistants.
…
Annette had just gotten to the safe place she’d seen, when a recognizable black truck with flame decals whizzed by.
Her face lit up at once. Still grabbing on to her shelter, she called out to it.
“Sinbad! Sinbad, it’s me! I need help! Hey!” Annette’s shouting proved to be futile. Sinbad’s truck just kept going by without so much as slowing down.
Downtrodden, Annette slunk back to the safety of the house she’d found. It only took a bit of picking a lock for her to open the door.
There was something eerie about the place she’d chosen for her temporary haven. It seemed up to date, but at the same time it felt like something was holding it back.
Trying to think nothing of it, Annette stood in the kitchen, and looked for anything that could be made with the dusty looking oven.
(Song the chapter title came from: ) | {
"pile_set_name": "OpenWebText2"
} |
1. Field
This invention relates to chain link fences which have a plurality of decorative, elongate slats woven through the links of the chain link fabric of the fence. More particularly, the present invention relates to improved means for locking and retaining the slats in a uniform position along the fencing. Further, the present invention relates to an improved lower rail element upon which the slats can be supported, with the slats being attachable to the lower rail using novel clip means.
2. State of the Art
It is well known to insert slats in chain link fences to provide privacy and to improve the appearance of the fence. Unfortunately, there are two somewhat related serious problems encountered in using slats in chain link fencing, first, the slats have a tendency to shift longitudinally after being inserted in the wire fabric of the chain link fence so as to become disarranged and uneven. Disarranged, uneven slats greatly impairs the appearance of the fence. The second related problem is that the loosely positioned slats are easy prey for vandals. The slats are unfortunately, easily removed from the fence and discarded by the vandals.
Several methods have been proposed to alleviate these problems. The slats have been secured to the chain links in the fence by using staples, nails and other fasteners. In addition systems have been proposed for interlocking the slats with channel members or elongate rigid connecting members which run along the length of the fence and which engage the slat members. The installation of such systems is a tedious, time consuming, costly operation. No inexpensive, expedient means have been proposed to effectively cope with the vandalism problem. Some of the more complex systems do alleviate the vandalism problem, but unfortunately as stated previously, these systems generally are costly and require tedious time consuming installation. Representative U.S. patents which have been directed to retaining slats in position in chain link fences are:
______________________________________ 2,760,759 3,037,593 4,085,954 2,802,645 3,069,142 4,512,556 ______________________________________
3. Objective
A principal objective of the present invention is to provide a new and improved slat system comprising novel, unique, inexpensive, easily installed clip means for retaining the slats at a uniform position along the fencing and locking the slats into the fence to thwart vandalism. | {
"pile_set_name": "USPTO Backgrounds"
} |
GREENSBORO, N.C. (April 27, 2015) — Phillips Foundation today announced its commitment of $500,000 to the Greensboro Children’s Museum to establish an endowment for enhanced programming and maintenance.
“The Greensboro Children’s Museum is extremely grateful to Phillips Foundation for this game-changing grant. It is a tremendous investment in our mission and our 16 years of service to this community,” said Marian King, CEO of the Greensboro Children’s Museum. “The creation of this fund secures the future of the Museum in downtown Greensboro, as we begin a formal effort to examine where to take the Museum for the next generation of early learners and future leaders.”
With this investment, Phillips Foundation has committed over $10 million in the past two years to education and learning enrichment initiatives for children in Guilford County.
“We are delighted to support the GCM as a vital cultural and educational asset in Greensboro’s downtown,” said Elizabeth Phillips, executive director of Phillips Foundation. “This endowment ensures that our community’s children, families, and educators can benefit from its programs and facility for generations to come.”
###
About Phillips Foundation
In 2005, local business leader Kermit Phillips created the Kermit G. Phillips II Charitable Trust to provide funding to non-profit causes as elected by the Phillips family. The trust’s endowment recently gained the majority of its funding and now operates as the Phillips Foundation. The current board is regionally focused on the Greensboro community with five target areas: housing and homelessness; economic development; arts and culture; child and family services; and education and learning enrichment. For more information, visit PhillipsFoundationNC.org.
Phillips Foundation does not currently accept unsolicited grant applications.
About Greensboro Children’s Museum
The Greensboro Children’s Museum (GCM) is a hands-on, interactive museum for children, their families and teachers. The Museum is designed to inspire learning through play in a fun, energetic and safe environment for children up to 10 years of age. The 37,000 square foot facility in downtown Greensboro includes over 20 permanent hands-on exhibits in “Our Town” and an outdoor Edible Schoolyard that are designed to stimulate children’s imaginations and provide educational play experiences.
Phillips Foundation is a private family foundation and catalytic capital platform that leverages its assets to maximize social, environmental and financial value. | {
"pile_set_name": "Pile-CC"
} |
0 minutes after 12:38 PM?
11:48 PM
How many minutes are there between 1:09 AM and 1:48 AM?
39
How many minutes are there between 4:17 AM and 12:29 PM?
492
What is 300 minutes before 12:15 PM?
7:15 AM
How many minutes are there between 6:40 PM and 6:28 AM?
708
How many minutes are there between 6:11 PM and 4:35 AM?
624
How many minutes are there between 7:08 AM and 2:12 PM?
424
How many minutes are there between 5:09 PM and 3:27 AM?
618
How many minutes are there between 3:02 AM and 1:20 PM?
618
What is 596 minutes after 12:36 PM?
10:32 PM
How many minutes are there between 11:58 AM and 5:00 PM?
302
What is 97 minutes after 8:43 PM?
10:20 PM
How many minutes are there between 2:22 PM and 2:12 AM?
710
What is 710 minutes before 11:49 PM?
11:59 AM
How many minutes are there between 7:38 PM and 1:38 AM?
360
What is 191 minutes after 7:26 PM?
10:37 PM
How many minutes are there between 2:14 PM and 5:05 PM?
171
What is 688 minutes before 4:09 PM?
4:41 AM
What is 283 minutes after 11:28 PM?
4:11 AM
What is 279 minutes after 5:20 PM?
9:59 PM
How many minutes are there between 5:14 AM and 11:28 AM?
374
What is 394 minutes after 1:07 AM?
7:41 AM
How many minutes are there between 12:44 AM and 9:09 AM?
505
How many minutes are there between 1:43 PM and 5:46 PM?
243
How many minutes are there between 3:59 AM and 3:17 PM?
678
How many minutes are there between 7:32 AM and 2:51 PM?
439
What is 159 minutes before 5:14 AM?
2:35 AM
How many minutes are there between 4:18 PM and 1:10 AM?
532
How many minutes are there between 4:48 PM and 8:58 PM?
250
What is 231 minutes before 11:29 AM?
7:38 AM
How many minutes are there between 9:14 AM and 8:41 PM?
687
What is 414 minutes before 4:13 PM?
9:19 AM
What is 398 minutes before 5:10 PM?
10:32 AM
What is 669 minutes before 12:28 PM?
1:19 AM
How many minutes are there between 9:35 PM and 7:05 AM?
570
What is 56 minutes before 10:01 PM?
9:05 PM
What is 546 minutes before 1:32 AM?
4:26 PM
How many minutes are there between 12:05 AM and 10:01 AM?
596
What is 376 minutes before 7:43 PM?
1:27 PM
What is 507 minutes before 3:14 AM?
6:47 PM
What is 303 minutes after 10:05 PM?
3:08 AM
What is 610 minutes before 1:31 AM?
3:21 PM
What is 139 minutes before 9:53 PM?
7:34 PM
What is 406 minutes after 8:35 AM?
3:21 PM
How many minutes are there between 8:47 PM and 9:50 PM?
63
How many minutes are there between 12:13 AM and 10:24 AM?
611
How many minutes are there between 6:31 AM and 10:40 AM?
249
What is 243 minutes before 8:28 PM?
4:25 PM
What is 366 minutes before 10:50 PM?
4:44 PM
What is 526 minutes after 9:50 AM?
6:36 PM
What is 123 minutes before 8:16 PM?
6:13 PM
What is 525 minutes before 2:04 AM?
5:19 PM
What is 185 minutes before 2:20 AM?
11:15 PM
What is 611 minutes after 7:44 PM?
5:55 AM
What is 266 minutes after 9:50 PM?
2:16 AM
What is 552 minutes before 5:13 PM?
8:01 AM
What is 482 minutes after 11:50 PM?
7:52 AM
What is 126 minutes after 1:04 AM?
3:10 AM
How many minutes are there between 8:02 AM and 11:29 AM?
207
What is 663 minutes before 3:44 PM?
4:41 AM
How many minutes are there between 6:50 AM and 12:32 PM?
342
What is 709 minutes after 9:58 PM?
9:47 AM
What is 456 minutes after 9:53 PM?
5:29 AM
What is 589 minutes before 12:24 PM?
2:35 AM
What is 144 minutes after 1:40 AM?
4:04 AM
How many minutes are there between 3:53 PM and 3:40 AM?
707
How many minutes are there between 1:02 PM and 9:15 PM?
493
How many minutes are there between 9:00 PM and 5:58 AM?
538
What is 391 minutes after 9:52 PM?
4:23 AM
What is 54 minutes before 11:22 AM?
10:28 AM
What is 526 minutes after 2:43 AM?
11:29 AM
How many minutes are there between 8:59 PM and 6:18 AM?
559
What is 277 minutes before 4:41 AM?
12:04 AM
What is 704 minutes after 5:50 AM?
5:34 PM
How many minutes are there between 1:01 PM and 1:03 PM?
2
How many minutes are there between 9:41 PM and 9:13 AM?
692
How many minutes are there between 5:23 PM and 10:02 PM?
279
How many minutes are there between 6:42 PM and 6:36 AM?
714
What is 617 minutes before 7:59 AM?
9:42 PM
What is 359 minutes before 8:26 AM?
2:27 AM
What is 325 minutes after 11:08 PM?
4:33 AM
How many minutes are there between 9:49 PM and 12:14 AM?
145
How many minutes are there between 3:58 PM and 11:40 PM?
462
How many minutes are there between 6:56 AM and 9:42 AM?
166
How many minutes are there between 11:47 PM and 11:53 PM?
6
What is 480 minutes after 11:33 PM?
7:33 AM
How many minutes are there between 2:25 PM and 6:34 PM?
249
How many minutes are there between 7:15 PM and 4:21 AM?
546
What is 675 minutes after 7:32 AM?
6:47 PM
What is 678 minutes after 2:55 AM?
2:13 PM
What is 470 minutes after 8:22 AM?
4:12 PM
What is 585 minutes after 10:52 AM?
8:37 PM
How many minutes are there between 9:57 AM and 9:56 PM?
719
What is 697 minutes before 8:18 AM?
8:41 PM
How many minutes are there between 7:54 AM and 1:25 PM?
331
How many minutes are there between 3:44 PM and 8:46 PM?
302
How many minutes are there between 1:12 AM and 5:18 AM?
246
What is 327 minutes after 10:30 AM?
3:57 PM
What is 538 minutes after 6:15 AM?
3:13 PM
What is 588 minutes after 5:00 PM?
2:48 AM
What is 62 minutes before 11:10 AM?
10:08 AM
What is 186 minutes after 6:39 AM?
9:45 AM
What is 467 minutes before 10:08 AM?
2:21 AM
How many minutes are there between 3:54 PM and 1:49 AM?
595
What is 323 minutes after 1:28 PM?
6:51 PM
What is 197 minutes after 2:23 PM?
5:40 PM
What is 496 minutes after 11:13 AM?
7:29 PM
How many minutes are there between 10:21 AM and 4:06 PM?
345
What is 706 minutes after 7:57 AM?
7:43 PM
What is 675 minutes after 4:49 PM?
4:04 AM
How many minutes are there between 12:51 PM and 6:58 PM?
367
What is 318 minutes before 2:53 AM?
9:35 PM
What is 625 minutes before 8:59 AM?
10:34 PM
How many minutes are there between 5:04 AM and 11:10 AM?
366
How many minutes are there between 3:09 PM and 2:16 AM?
667
What is 92 minutes before 5:57 AM?
4:25 AM
What is 90 minutes before 8:20 AM?
6:50 AM
What is 277 minutes after 4:40 AM?
9:17 AM
How many minutes are there between 9:10 AM and 3:17 PM?
367
What is 589 minutes before 10:26 PM?
12:37 PM
What is 136 minutes after 11:12 AM?
1:28 PM
What is 591 minutes after 4:18 AM?
2:09 PM
What is 687 minutes before 2:30 AM?
3:03 PM
How many minutes are there between 9:49 PM and 5:28 AM?
459
How many minutes are there between 12:29 AM and 2:44 AM?
135
What is 708 minutes before 3:12 AM?
3:24 PM
How many minutes are there between 6:43 PM and 5:46 AM?
663
What is 191 minutes before 7:08 PM?
3:57 PM
How many minutes are there between 1:01 AM and 6:14 AM?
313
What is 472 minutes before 2:08 AM?
6:16 PM
How many minutes are there between 2:20 PM and 8:04 PM?
344
How many minutes are there between 6:03 PM and 9:27 PM?
204
What is 429 minutes after 11:53 AM?
7:02 PM
How many minutes are there between 1:45 AM and 11:54 AM?
609
How many minutes are there between 8:35 PM and 5:09 AM?
514
How many minutes are there between 3:09 PM and 8:29 PM?
320
How many minutes are there between 7:48 PM and 5:45 AM?
597
What is 191 minutes after 4:07 PM?
7:18 PM
What is 104 minutes after 4:37 PM?
6:21 PM
How many minutes are there between 12:49 PM and 4:55 PM?
246
What is 710 minutes after 11:30 AM?
11:20 PM
What is 535 minutes after 2:32 PM?
11:27 PM
How many minutes are there between 7:38 AM and 8:22 AM?
44
How many minutes are there between 12:48 AM and 10:20 AM?
572
How many minutes are there between 5:49 AM and 10:00 AM?
251
What is 344 minutes after 10:35 PM?
4:19 AM
What is 52 minutes after 10:49 AM?
11:41 AM
What is 176 minutes before 12:49 PM?
9:53 AM
What is 211 minutes after 3:24 PM?
6:55 PM
What is 662 minutes before 3:09 AM?
4:07 PM
What is 689 minutes after 5:01 AM?
4:30 PM
How many minutes are there between 11:27 AM and 1:35 PM?
128
How many minutes are there between 12:07 PM and 7:05 PM?
418
How many minutes are there between 4:50 AM and 4:19 PM?
689
How many minutes are there between 8:47 PM and 5:39 AM?
532
How many minutes are there between 4:06 PM and 9:19 PM?
313
What is 139 minutes before 4:19 PM?
2:00 PM
How many minutes are there between 8:40 PM and 10:55 PM?
135
How many minutes are there between 7:50 PM and 10:40 PM?
170
How many minutes are there between 1:43 AM and 8:44 AM?
421
W | {
"pile_set_name": "DM Mathematics"
} |
Fires within building structures often start in a single room or location and spread from room-to-room traveling through interior doorways and other openings. As fires progress through building structures burning various combustible materials, a substantial amount of smoke is generally produced with such smoke potentially including toxic gases that are generated when certain materials and chemical compounds are oxidized. While the fires can cause significant property damage and destroy or weaken building structures, the smoke and toxic gases can cause substantial physical injury or death to persons who inhale them. Thus, by limiting the spread of fires and smoke within building structures, damage to property and building structures may be minimized and physical injury to, and the potential death of, persons within building structures may be prevented.
Many attempts have been made to develop devices that limit the spread of fire and smoke through doorways and other openings in building structures. Unfortunately, many of the devices have been found to become mechanically unstable after a fire. Therefore, a number of jurisdictions have begun requiring such devices to pass a test known as the “Hose Stream Test” in order to be approved for use in their jurisdiction. The Hose Stream Test is generally run on a device for limiting the spread of fire and smoke after it has been exposed to high temperatures over a long period of time during a separate fire test. In the Hose Stream Test, a jet of water such as that produced by a fire hose is directed at the device, generally, from a direction that is normal to the device. To pass the Hose Stream Test, the device must withstand the forces exerted on the device by the water jet and not become mechanically unstable.
Typically, the devices that have been developed to limit the spread of fire and smoke fall into two categories. A first type of devices has attempted to limit the spread of fire and smoke by sealing openings with flexible protection members including a plurality of slats. Examples of such devices include fire protection roller shutters, fire doors, and curtains made of metal components that slide over and relative to one another. Advantageously, these devices limit the spread of fire and smoke while being capable of withstanding mechanical loads particularly well, including after exposure to fire. As a consequence, many such devices have passed the Hose Stream Test. Unfortunately, these devices are typically heavy and require a large amount of space. Also, in order to use some of these devices, ceilings in buildings must be designed in a manner that enables the devices to be built into or supported by the ceilings, thereby limiting an architect's design freedom. Additionally, these devices are time-consuming to produce and are, thus, expensive.
A second type of devices, commonly known as “fire protection curtains”, have attempted to limit the spread of fire and smoke by sealing openings with a flexible protection member manufactured from a fire resistant material that can be wound around a reel or winding shaft. The fire resistant materials used in such devices typically include woven textile fabrics having warp and weft threads. The flexible protection members are generally stretched by a plurality of wires that extend between rollers moving in guides mounted relative to an opening in a building wall. Beneficially, these devices reduce the spread of fire and smoke, are relatively light in weight, and save space. However, these devices are generally less resistant to mechanical influences and loads than devices of the first type described above. Additionally, after exposure to the heat of a fire, the flexible protection members tend to become brittle and tear when struck with a stream of extinguishing water during a fire. Consequentially, many of these devices cannot pass the Hose Stream Test.
There is, therefore, a need in the industry for a system for deploying, retracting and supporting fire protection curtains that is lightweight, requires minimal space, is capable of improving the resistance of fire protection curtains to mechanical loads during and after exposure to fire, enables fire protection curtains to pass the Hose Stream Test, and that solves the difficulties, problems, and shortcomings of existing systems. | {
"pile_set_name": "USPTO Backgrounds"
} |
If You Encounter a Lion | Stay Safe | Coexisting Video | Lions at Rancho | Identification
New Mountain Lion Conservation Research to Begin in Fall 2020 Midpen biologists and Santa Cruz Puma Project scientists are beginning a five-year mountain lion collaring study that will help us better understand how these secretive animals are using popular open space lands near urban areas, such as at Rancho San Antonio, Picchetti Ranch and Fremont Older preserves. This information, along with a concurrent study using wildlife cameras, will help us best manage our public open space preserves for the protection of both mountain lions and preserve visitors. We hope you’ll follow along and learn more about the many challenges these important big cats face, how we can best safely coexist to help them survive and thrive in the Santa Cruz Mountains region and beyond.
Background
Mountain lions, also known as pumas and cougars, play an important role as predators in our local ecosystem. Their primary food source is deer, but they can also prey on smaller animals like raccoons, rabbits. Occassionally, they opportunistically prey on domestic pets and livestock. More than half of California, including most of undeveloped San Mateo and Santa Clara counties, is prime mountain lion habitat. Mountain lions are a specially protected species in California.
Mountain lions face many challenges. They need large habitats, and as open space in the Santa Cruz Mountains has become hemmed in by roads and development, some are pushed into the wildland-urban interface. This is one reason why wildlife corridors like Midpen's Highway 17 Wildlife and Trail Crossing, are critical for allowing wildlife to move safely across the landscape to access the resources they need to survive.
Download Mountain Lion Fact Sheet
If You Encounter a Mountain Lion If you encounter a mountain lion, take these safety precautions: DO NOT RUN!
Keep children and pets close.
Do not approach the lion.
Do not turn your back on the lion.
Do not crouch down or bend over.
Back away slowly while paying attention to how the lion is reacting to your movements. If you are getting farther away from their young, the lion may relax or walk away.
Leave the area and inform other preserve visitors of the potential danger.
and inform other preserve visitors of the potential danger. Fight back, if attacked.
Report sightings immediately to 650-691-2165.
Stay Safe in Mountain Lion Country
Stay alert when visiting a preserve.
Do not hike, bike or jog alone.
Avoid hiking or jogging when mountain lions are most active – dawn, dusk, and at night.
Keep a close watch on small children.
Do not wear headphones.
Coexisting with Cougars Video Presentation
Learn all about mountain lions with Midpen Resource Management Specialist Matt Sharp Chaney. Matt provides an overview of mountain lion biology, habitat and research. He also shares how hikers, families and neighbors can stay safe in mountain lion habitat.
Mountain Lion Activity at Rancho San Antonio
Mountain lions have been observed in Rancho San Antonio Open Space Preserve. Though seldom seen, they also roam most Midpen preserves.
Map is illustrative to demonstrate ongoing mountain lion presence across the preserve in a given year, it is not intended for analytical purposes.
Identification
The mountain lion has a small head and small rounded ears. It has a very long tail that is about 2/3rds the length of its body.
Color: Generally tan, but can range from gray to brown, with a whitish underside. The ears and tail are tipped with black. Cubs have camouflage spots that fade as they mature.
Generally tan, but can range from gray to brown, with a whitish underside. The ears and tail are tipped with black. Cubs have camouflage spots that fade as they mature. Size: Adult males can reach 8 feet in length from nose to tail; and weigh 130-150 lbs. Adult females can reach up to 7 feet in length and weigh 65-90 lbs.
Adult males can reach 8 feet in length from nose to tail; and weigh 130-150 lbs. Adult females can reach up to 7 feet in length and weigh 65-90 lbs. Tracks: Unlike a dog, mountain lions don’t leave a nail mark and their pads are shaped like the letter M.
Unlike a dog, mountain lions don’t leave a nail mark and their pads are shaped like the letter M. Behavior: Adult pumas are solitary and territorial animals. Males can have territories up to 100 square miles and females’ territories can range up to 60 square miles. They are most active between dusk and dawn, and generally avoid contact with humans, but have been known to stand their ground.
For more information, visit: | {
"pile_set_name": "OpenWebText2"
} |
A valve mechanism 90A of a conventional example 1 (Patent Document 1) illustrated in FIG. 8 includes a cam 92 formed on a camshaft 91 and a roller arm 95 including a roller 95a and configured to swing to drive a valve 7 when the roller 95a is pressed by the cam 92.
A variable valve mechanism 90B of a conventional example 2 (Patent Document 2) illustrated in FIG. 9 and a variable valve mechanism 90C of a conventional example 3 (Patent Document 3) illustrated in FIG. 10 are the same as that of the conventional example 1 in including the cam 92 and the roller arm 95, but are different therefrom in including a variable arm 94 interposed between the cam 92 and the roller 95a. The variable arm 94 is operated by a variable device 96, whereby the drive state (the lift amount and the action angle) of the valve 7 is continuously changed. | {
"pile_set_name": "USPTO Backgrounds"
} |
The need for epidural analgesia is related to birthweight - a population-based register study.
To investigate the relation between use of epidural analgesia (EDA) and maternal and fetal characteristics. Population-based register study. Nationwide study in Sweden. All 106,775 primiparous women who in 2002-2005 delivered a singleton infant vaginally at term. Register study with data from the Medical Birth Registry and the Swedish Register of Education. Use of EDA during vaginal delivery. A total of 47,810 women (45%) received EDA during labor. EDA was used more often in women who were either young or short, had a high body mass index or a short education, or gave birth to an infant with high birthweight. After adjustment, the positive correlation with birthweight persisted. The use of EDA was twice as high in women with infant birthweight >4,500 g, 60% higher in those with infants weighing between 4,000 and 4,500 g and 25% lower when infants weighed <3,000 g, when compared to those with newborns weighing between 3,000 and 3,500 g. The woman's need for EDA is strongly related to birthweight. Prolonged duration of labor and instrumental delivery usually ascribed to EDA may be due to large infants. | {
"pile_set_name": "PubMed Abstracts"
} |
No going back on decision to boycott TN polls: Vaiko
March 21, 2011 22:13 IST
Marumalarchi Dravida Munnetra Kazhagam leader Vaiko on Monday said there was no going back on the party's decision to boycott the April 13 Tamil Nadu Assembly polls.
Upset over All India Dravida Munnetra Kazhagam's "adamant attitude and ill-treatment", MDMK had on Sunday decided to quit the electoral battle after the last minute efforts by the former to retain its five-year-old ally in the alliance did not succeed.
The AIADMK had offered 13 seats to MDMK while Vaiko said that his party would accept nothing less than 21 seats. Talking to his party workers in Tirunelveli on Monday, Vaiko said a situation had emerged by which the party had been forced to keep away from the elections and watch the politics. However, he said, the party would "emerge as a third and alternative force in Tamil Nadu in the coming years".
Meanwhile, Pon Radhakrishnan, the Bharatiya Janata Party state president, talking to mediapersons at Nagercoil, asked Vaiko to reconsider his decision.
"If Vaiko wished, he could join hands with the BJP to fight the polls. We are ready to welcome him with love and affection. But he has to decide whether to join hands with us," Radhakrishnan said. | {
"pile_set_name": "Pile-CC"
} |
Tenemos algo para ofrecerte Con nuestra suscripción digital disfrutás de más de 300 artículos exclusivos por mes y navegás sin límites nuestros sitios. Tenemos newsletters premium, una comunidad exclusiva para vos, descuentos con Club La Voz y más. Quiero suscribirme desde $30
El ex ministro de Economía Roberto Lavagna aseguró hoy que no tiene decidida una candidatura presidencial y afirmó que el gobierno de Mauricio Macri “dejará una herencia peor” que la que dejó Cristina Kirchner en 2015.
“Acá estamos, reuniéndonos y poniendo ideas sobre la mesa”, dijo y al ser consultado sobre si ya decidió ser candidato presidencial, respondió: “No, no, en absoluto. Las candidaturas siempre tienen que venir al final, primero las ideas”.
El economista aseguró que la “grieta” entre Macri y la senadora líder de Unidad Ciudadana “no conduce a ningún lado” a la Argentina y aclaró que este año el país acumulará su octavo año de recesión, por lo que está con una “debilidad notable”.
“Los cuatro años de Macri serán peores que los últimos cuatro años de Cristina Kirchner. En estos últimos años en lugar de intentar superar la herencia, Cambiemos profundizó la crisis”, apuntó Lavagna en declaraciones a radio Metro.
Publicidad
El economista, que fue ministro de Eduardo Duhalde y Néstor Kirchner, contradijo al presidente Macri al sostener que el país no está en recesión por culpa de los shocks externos sino por la “mala praxis” del gobierno actual
“El contexto económico fue espectacularmente favorable, contra todo lo que se dice. La tasa de interés, que para la Argentina y los países en desarrollo es muy importante, ha estado por debajo del 2% en promedio, cuando en la crisis anterior estaba en 5,5%”, apuntó.
Y agregó: “El precio de la soja, que es el principal producto de exportación de la Argentina, aun habiendo caído está en 350 dólares la tonelada, cuando en 2002 rondaba los 220 dólares la tonelada. Estos son sólo dos datos externos que fueron “positivos”.
Para respaldar sus declaraciones, el economista pidió que se busque si en el mundo hay un país del tamaño de la Argentina que haya sufrido lo que sufrió la Argentina en 2018. “No lo va a encontrar”, afirmó.
Consideró que hay una parte de la herencia del kirchnerismo en esos problemas, pero aclaró que los inconvenientes actuales “son por acumulación: tras cuatro años malos (2011-2015), si uno no cambia en la buena dirección obviamente acumula otros cuatro años recesivos”.
Publicidad
“Obviamente hubo un cambio en la política económica, pero este cambio no sirvió. No se puede cambiar por cambiar. Se han acumulado otros cuatro años de recesión, que se suman a los cuatro años anteriores”, se quejó el economista.
Y evaluó que el nuevo gobierno partirá el 10 de diciembre próximo de una base de ocho años de recesión, con una caída muy fuerte del Producto per cápita de los argentinos, una tasa de inflación mucho mayor que en 2015 y una deuda que en aquel momento no existía y ahora es muy importante.
“Ocurre que si uno no corrige las herencias, termina dejando una herencia peor, que es lo que va a pasar con Macri”, afirmó Lavagna.
SÍNTESIS POLÍTICA Información exclusiva y el mejor análisis, los lunes en tu correo. Ingresá tu correo electrónico Enviar ¡Gracias por suscribirte! Ha ocurrido un error, por favor intente nuevamente más tarde. | {
"pile_set_name": "OpenWebText2"
} |
Growth factors in the repair of partial thickness porcine skin wounds.
In 28 porcine partial thickness excisional wounds, the presence of several growth factors was first studied by enzyme-linked immunoadsorbent assay on wound fluid collected in sealed wound chambers. Basic fibroblast growth factor (bFGF) peaked on day 1 at 31.4 pg/ml; platelet derived growth factor (PDGF)-AB on day 3 reached 45.2 pg/ml, and transforming growth factor-beta (TGF-beta) on day 7 was 726.1 pg/ml. The same chamber system was used in 48 partial thickness excisional wounds for delivery of nanogram doses of bFGF, PDGF-AB, insulin-like growth factor (IGF)-1, epidermal growth factor (EGF), and cholera toxin. PDGF and EGF accelerated healing (1.1 days and 0.3 days, respectively), whereas bFGF and IGF-1 had no effect. Cholera toxin retarded healing by 1.9 days. Furthermore, in 100 excisional wounds EGF in the concentration range of 10 to 1,000 ng/ml had the same stimulating effect on healing. EGF at 10,000 ng/ml significantly delayed healing. The wound chamber model is useful for detecting of endogenous growth factors as well as for delivering exogenous factors. | {
"pile_set_name": "PubMed Abstracts"
} |
More Notes of Support
Dear President Lyons,
I am currently a student at USD from the class of 2014. Since day one, I
have always been so proud to be a part of the USD community but never
have I been more proud to be a torero when I saw that USD was allowing
PRIDE to host a drag show.
I am gay and still half way in the closet. I have recently struggled
with being gay and thoughts of taking my own life never seem to
completely leave my mind. But this event gives me so much strength and
hope that I plan on completely coming out within the next 2 weeks.
Although I would not personally participate in a drag show, this event
has proven to me what an inclusive campus USD is and gives me hope for a
better future on campus and in the world. I have learned that everyone
is different, whether it be a person's race, social class, sexual
orientation etc. And being different isn't wrong. We are all human. We
are all children of God.
I just wanted to express my gratitude for allowing this event on campus.
I know not everyone may agree with the decision you made, but I can
guarantee you that it was the right one. I cannot thank you enough for
what this event has done for me.
Thank you again.
Sincerely,
---
Dear President Lyons,
It has come to my attention that USD will be hosting several
LGBT friendly events this month and that there has been an unfortunate backlash
against this. Having attended USD, I am forever grateful to the University and
to the Catholic community at Founders Chapel for inspiring me, for directing me
in my faith and for giving me the freedom to question, learn and experience new
ideas, cultures and people. I would like to thank you, President Lyons, for the
work you do, not only with these events, in supporting an inclusive community that
upholds the Catholic traditions of universality and love. Jesus loved purely,
truly and without limits and I am pleased and thankful to see USD striving to
create this environment of love and inclusion rather than one of distrust and
exclusion. I hope to hear more news of this tradition continuing not only on
our campus but across the country.
May God be with you,
--
Dear Dr. Lyons:
I am writing
as an alumnus to thank you for your support of making USD a safe and inclusive
environment for all it's students. I am aware of the negative feedback the
University has received from some alumni about on-campus programming that is
LGBT-friendly. While they are entitled to their opinion, I would like you to
know that this Torero is very pleased to see my alma mater take these steps. I
only wish they had happened while I was a student on campus.
Under your
leadership, the University has made significant advancements on numerous
fronts. All of them make me proud to have attended USD, but none make me as
proud as the steps taken to make the campus more welcoming to students of color
and those who are LGBT. I hope you will continue this work and know that many
of us stand with you in full support.
Sincerely,
Alum, Class fof 2000
--
Dear President Lyons,
As an alum of
USD Class of 2010, I appreciate the way in which you worked to make USD an
inclusive and welcoming place for all sorts of people. I am now a first
year law student at UCLA, and my classes here have shown me that the importance
of exposure to diverse people cannot be understated. Thank you for
holding strong in the face of criticism.
Best,
--
Dear President Lyons and the USD Administration,
I have recently been informed of some unfortunate comments from former USD
alumni and other individuals regarding LGBT friendly events at USD. I
wanted to personally reply to you as a USD alumna from the class of 2007 to say
thank you for the work you are doing to ensure USD is an inclusive institution,
committed to respecting people of all races, sexual orientations, religions,
and any other minority grouping. I take enormous pride in having gone to
a school that fostered values of equality and respect in all human kind.
USD has repeatedly stood up in the face of injustice to support individuals who
have been mistreated and has taken a stand against injustice across the world
supporting student-led initiatives and fundraisers. While attending USD,
I found the diversity of the student body crucial to my education, the school's
respect for all cultures, religions, and peoples fundamental to my growth as a
human being, and the inclusive community fostered by these beliefs proof of
USD's commitment to the values of respect and empathy. That USD continues
to support minority groups struggling to ensure their rights are not breached
is a testament to the foundation of the school's values and our strength as a
community. It is unfortunate that certain individuals did not take those
important lessons to heart while attending USD. However, as a former alum, I
will continue to speak highly of USD and to donate to the school as it
continues to face adversity head-on. I appreciate all you have done to
ensure USD is a safe place for everyone who attends. Please keep up the
good work.
Best,
B.A. class of 2007
--
Dear President Lyons and USD Administration:
I am a USD alumna, class of 2007. After hearing about a particular USD
alumnus becoming upset that USD is supportive of LGBT groups hosting events on
campus, I was compelled to write to disagree.
The fact that
USD is a Catholic school that truly lives Christ's message of showing love and
kindness to everyone--no matter their race, religion, socio-economic
status, or sexual orientation--was the reason I chose to go there. I
loved that the university was supportive and welcoming of my LGBT colleagues
and friends. That is was makes USD a nurturing community that fosters the
best education and instills the most meaningful values.
Please
continue to build an inclusive and diverse environment on USD's campus.
That is the foundation that USD graduates need to grow into the best
citizens, workers, and community members.
--
Dear President Lyons and the USD Administration,
I would like
to express my sincere gratitude as a senior and upcoming Alumni of USD for
supporting PRIDE and the events that are taking place. This support is what
makes USD an inclusive place for every member of the USD community.
Thank you
again,
--
Dear
President Lyons,
I am a USD
alum, class of 2006, and was recently made aware of some of the negative
reactions to the University's decision to host a series of educational events
relating to LGBT issues. I am saddened by the aggressive and hateful reactions
that have been voiced by some members of our community, and would like to thank
Associated Students and PRIDE, and commend USD for sponsoring diverse events
and educational opportunities even when they are controversial. I am proud to
see USD become an ever-more inclusive community, and hope that you will
continue to give a voice to any and all students seeking to create a forum for
dialogue on any issues, particularly when those issues are tied to questions of
human dignity and social justice.
Thank you for
putting into action the university's stated mission and vision to create a
diverse and inclusive community.
Regards,
Alumna Class
of 2006
--
President
Lyons,
Thank you for
continuing to stand in support of your students. I am sure that the stones cast
by those in their own insecurities and closed-mindedness are hard to
bare. Please know that myself, and many of my fellow alumni who I have
discussed this with, support the protection and inclusion of all students.
Perhaps with continued education and support, future alumni will continue your
example of displaying the good Christian values of love, inclusiveness, and
non-judgement.
Thank you,
--
Hello President Lyons,
Thank you for
continuing to support and encourage acceptance of all peoples on campus,
regardless of race, ethnicity, faith, gender, or sexual orientation. As an
alumna of the University of San Diego and member of F.U.S.O., A.S., the United
Front, various crews for SEARCH and more, and I am happy to see continued
progress in the range of events offered for students, and more recently, the
workshop and Drag Show sponsored by PRIDE.
I am a
Catholic, a Heterosexual, and a friend and ally of PRIDE. I applaud the
USD community for providing opportunities for Toreros to learn, grow and love
our fellow brothers and sisters in Christ, just as He loved us. And
through my time at USD, through my Catholic foundation, I've learned to
continue to love and pray for all, even those filled with hate and judgement in
their hearts.
On this
Easter Sunday, we are reminded that God sent His only son to die for us to show
His unconditional love for ALL His people. May blessings to you during this
Easter holiday.
I am both
saddened and enthused to write the below on what I believe to be the holiest of
days.
Saddened
that we are struck with such a frustrating reality nearly
two millennia after Jesus' teachings of love, equality, reverence and
respect for all people. And we do find ourselves amid a frustrating reality, no
matter how out of place or senseless it may seem – even in an era, a society
that has done so much to adhere to said wisdom.
At the same
time, I am enthused – enthused to offer my thanks and congratulations to the
University of San Diego for continuing to follow these teachings and treating
each student with the respect and love that they deserve.
It is
confusing and perhaps, upsetting, to believe that any high school senior
entertaining university has any reservation toward an institution holding
inclusiveness to such high regard. If this was the case, we should consider
this issue from all angles. What about those few with disposition toward
Mexican-Americans, blacks, the disabled or the lower-class?
What about
those few with disposition toward the pious, the political, the intelligent,
the athletic? What about those few with disposition toward the rich, the
influential, the privileged? Shall I continue?
Lest we
forget how much work USD does in the community-at-large. I’m interested to know
what these members think of the current situation we find ourselves in. Surely,
they cannot be expected to support a university that is welcoming to any and
all. Surely. That is clearly an unreasonable ask in 2012.
I would not
be the man I am today had it not been for the opportunity presented to me by
this institution. Granted, USD is not without erring. There were times when I cursed
and yelled and stomped my feet in the halls of administration and classroom
buildings alike. But, nine times out of ten, there were people there to help me
find a solution and even, provide me comfort. There were people there to bestow
patience, build me up, and even, make me smile. There were people there to
remind me of the love and openness that I so loved about the "White Castle
on the Hill." The name almost makes me laugh now. No matter how distant
the property may have seemed, the university was never removed from the
progression of the community around it.
It makes no
difference who those people were. Although, I do find it interesting
that as I reflect, I recognize the majority of those people were in fact,
members of a community in question - a community that garners unwarranted
issue, a community that does not deserve seething phone calls and emails, but
the same love, equality, reverence and respect that Jesus preached.
With that, I
hope that the internal USD community continues to follow these teachings, and
in effect, teach us all something in the process.
Warmest
regards,
--
A few friends have forwarded articles to me about backlash you're receiving for
approving recent LGBT events on campus. So I wanted to take a minute to write
in support of them and thank you for continuing USD's tradition of creating an
inclusive environment for everyone. I'm an alum (2006 business school) and have
very fond memories of USD and the friends I made there. It would break my heart
to hear that you stopped allowing events for any type of group simply because
donors disagree.
So thanks
again for your support and please keep it up!
--
Dear President Lyons and the USD Administration,
My name is XX class of 2008. I studied mathematics and physics, and am a member
of Phi Beta Kappa. I was also a member of the Club Ultimate Frisbee team.
I am writing to thank you for giving me a great 4 years as a Torero. Secondly,
I want to thank you for providing a place where I could feel accepted and
appreciated as a student and as a human being. One of the primary reasons I
loved USD (and am proud to have attended) is the truly pure academic
environment. To elaborate, I always felt that the University's foremost values
were the pursuit of knowledge, both worldly and of the self, and to provide a
forum for unique individuals from all backgrounds to come together in an
academic communion - to share of themselves, and to take from others, in an
environment where the means of currency was the sharing of ideas and
experience. I loved that USD was a place where I could be myself and express
myself, without any pressures, even while I was defining who that person was.
I would ask that you continue to give current and future Toreros the same
freedom; the freedom of both of though and action, and provide an environment
where students can explore the academic world and be unafraid to express and
enjoy themselves, and partake of the true University experience, regardless of
their race, gender, or sexual orientation. In short, I hope that USD will
remain a fierce defender of its students who participate in and support the
academic environment I described in the preceding paragraph.
--
Dear President Lyons,
I would like to voice my appreciation for your continued support towards the
LGTB community at USD. It pleases me to know that although some have threatened
to pull donations, you have elected to allow every member to have their voice
heard.
As a member of the class of 2002, I am happy to see that the efforts started by
PRIDE during my years at USD have not stopped.
I am proud to know that at USD, Catholic Social Thought is not just something
on paper that is said to be part of the strategic goals; we can see it in
action.
Sincerely,
Class of 2002
--
President Lyons,
I just wanted to send a note of thanks and appreciation. Personally as an
alum from the class of 2005, I am happy to learn that USD is becoming a more
inclusive university and allowing all students to express themselves. I think
it's great that the University is supporting the GBLT community and allowing
PRIDE and AS to host numerous events including the drag show coming up this
week.
I hope the University continues to support all students and foster an inclusive
community.
Regards,
Class of 2005
--
Dear President Lyons,
As a graduate
of the University of San Diego, I greatly appreciate your efforts to plan and
execute the first ever Drag Show. I am excited to see students come together to
celebrate and educate how amazing and diverse the LGBT community is. It is
inspiring to hear how passionate the students have been to make this event
happen amongst the negative talk and actions taken by our own members of the
USD Community.
As someone who
has not come from any religious background, I believe in an inclusive
environment where all are welcome no matter their race, gender, class, or
sexual orientation. I came from a high school where being openly gay is
considered a sin and an outcast and many times have I
witnessed degradation towards those who are proud for what they are.
That's why I
loved being a student at USD. USD welcomed everyone with open arms and
encouraged self-expression. And I have met the most amazing people from the
LGBT community whom I will never forget because of their bravery and courage to
never be anyone else but themselves.
I'm not a
Catholic, but if I have learned anything from my four years in attending this
university it is that our goal in life should be loving and compassionate human
beings. It is shocking to see alumni and students who oppose the event spread
hurtful messages. How is that being a loving and compassionate
"Christian"?
Therefore, I
stand with you and the rest of the USD community on your decision to continue
promoting and executing this event to foster a safe and inclusive environment
for students to express themselves as God made them to. And
you can count on me to be standing in the crowd to cheer on PRIDE.
Thank you,
Class of 2010
--
Dear President Lyons,
I am a USD Alum and former rower on the Men's Crew team; I graduated in 2007. I
wanted to send you my support and thanks for continuing to make USD an
inclusive place for every member of the USD community, including those of all
sexual orientations.
By the way, I am heterosexual. I feel very strongly about keeping USD an open
and welcoming place for people of all races, religions, and sexual
orientations. Fostering a diverse student population is tantamount to fostering
a more rich educational experience.
Sincerely,
--
Dear President Lyons,
My husband and I are alumni and graduated in 2001. I recently received
an email regarding the LGBT friendly events that will take place on
campus, and the negative responses coming from other alumni. I wanted
to share my APPROVAL and thanks for hosting this event at USD. I have
also made my first donation ever as a symbol of my support for this
event.
Regards,
Class of 2001
--
Dear President Lyons,
It has come to my attention that USD Pride's scheduled events are coming under
attack. To see such hateful comments is quite distressing and is not following
the teachings of God, Jesus, or the Catholic church.
I wanted to take this opportunity to thank you for staying true to USD's core
values and "creating a welcoming, inclusive, and collaborative community
accentuated by a spirit of freedom and charity, and marked by protection of the
rights and dignity of the individual." It is thanks to people like
you, who are willing to stand up for everyone, that my time at USD was such a
positive experience.
It is a shame that the haters behind these attacks are unable to find God's
love in their own hearts. As you are forced to deal with the venom these
minions of hate command, please know that there are many, many alums out there
who are pleased to see USD's commitment to equality for all, without exception.
Jesus would approve.
With all my support,
Alumni, Class of 2002
--
Dear President Lyons,
I graduated
from the University of San Diego in 2003. I would like to first say that I was
involved with the committee that helped interview the Presidential candidates
the year you were chosen... you were my choice, and I stand by that decision
today. Thank you!
While
attending U.S.D. I was very engaged with the university community as a member
of student senate, an active member of the United Front Multicultural Center
(and president's council), President of Pride and a Rainbow Educator. I was
also a resident assistant my senior year. And I'm a lesbian.
I learned a
lot about myself at U.S.D. and a lot about my Catholic counterparts. I'm so
glad I had the opportunity to learn that to be Catholic does not inherently
equal close-minded and hateful, which is what I had come to learn prior to attending
U.S.D. I met many loving Christians who a) were not trying to save my soul, b)
were not trying to change me c) loved me for who I am. It was the mission of
the school that drew me there, and it was the people that kept me there. I
enjoyed a happy alliance with University Ministry and enjoyed my religion
classes.
I want to
thank you for supporting the students of Pride and the drag show that will be
taking place. It is events like these that while they take place often outside
of the campus environment without incident, send a message to the students that
all identities are respected and valued.
Thank you for
being a positive force- not only for the members of Pride, but for all of the
other U.S.D. students that can reap the rewards of a university that respects
ALL students.
Sincerely,
--
Dear President Lyons,
Earlier this week while browsing Facebook I learned about a drag show organized
by PRIDE at USD. Curious, I clicked to read more, hopeful that the post
would reveal a campus that over the 8 years since I graduated has continued to
make progress towards being truly inclusive. I learned that the drag show
was one of a few events designed to facilitate a conversation & awareness
of gender identity. I was so incredibly proud to learn of the
administrations decision to approve the events. It is unfortunate that
this has caused division in the wider USD community, and the hateful comments
it has generated from some individuals are simply heartbreaking.
USD truly provided me with a holistic education and strengthened my Catholic
faith- so much so that I decided to add Theology & Religious Studies as one
of my majors. As a freshmen entering college, I was at a crossroads with
my faith development. This was mainly because I was so frustrated that
many Catholics and Christians could profess such hateful views of some minority
groups, especially the GLBT community. Wasn't this contrary to the
message of the Gospel? Didn't God create us in God's image, and all
creation is good? Isn't God's love unconditional? How could people
obsess so much over homosexual activity and be completely accepting of casual,
premarital sex, or adultery? I was hyper-aware of the hypocrisy, and it
pained me and overwhelmed me. I didn't want people to assume that because
I was Catholic, I was anti-gay. I have friends from the Catholic high
school l attended and at USD who are gay, and have always done my best to be a
strong ally to the GLBT community. But I wished there were more
opportunities for me to show my support during such challenging times as high
school & college, when individuals are learning to accept themselves, and
seeking acceptance from others. Surely if I struggled with seeing some
Catholics being hateful towards the GLBT community, the pain this caused my
GLBT friends and classmates was greater and often hidden.
Then in the Spring semester of my freshmen year I learned about Catholic social
teaching. I learned how as Catholics, we are called to support and
embrace the LIFE & DIGNITY of EVERY person- that this is the core tenant of
CST- and that we are called to especially love and support the
marginalized. Not only because Jesus taught us this over 2000 years ago
(which I knew), but also because it is the current teaching of the modern
church. Thoroughly exploring Catholic social teaching, and learning how
we are called to have it inform our actions renewed & restored my
faith. This was a Catholic Church that I could identify with and be proud
to be part of. Similarly, I am very proud to be a Torrero, especially as
the USD community takes important strides towards inclusion, and the
administration helps to foster that.
On this Good Friday, we are reminded that Christ died for us because he loves
us- unconditionally- and that we are called to love others as God loves
us. I am thankful for your role in building a campus that promotes
acceptance and inclusion and gives witness to loving others as God loves us. | {
"pile_set_name": "Pile-CC"
} |
Sign up to FREE email alerts from Mirror - Arsenal FC Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
Arsenal defender Nacho Monreal could miss the start of the season after suffering an injury scare, writes John Cross in Nagoya.
Gunners boss Arsene Wenger will check on the extent of a back problem for the Spanish left back who is missing from the Asia tour after being given an extended break after the Confederations Cup.
Wenger is already concerned that Monreal and Santi Cazorla are behind on pre-season after being on international duty with Spain.
Laurent Koscielny and Wojciech Szczesny are likely to sit out Monday’s friendly with Grampus Eight in Nagoya after suffering ankle and back injuries respectively.
Arsenal captain Thomas Vermaelen is likely to be out for at least three months with a back injury. | {
"pile_set_name": "OpenWebText2"
} |
List of heads of state of Grenada
This is a list of the heads of state of Grenada, from the independence of Grenada in 1974 to the present day.
From 1974 the head of state under the Grenada Independence Act 1974 is the Queen of Grenada, Elizabeth II, who is also the Monarch of the United Kingdom and the other Commonwealth realms. The Queen is represented in Grenada by a Governor-General.
Monarch (1974–present)
The succession to the throne is the same as the succession to the British throne.
Governor-General
The Governor-General is the representative of the Monarch in Grenada and exercises most of the powers of the Monarch. The Governor-General is appointed for an indefinite term, serving at the pleasure of the Monarch. After the passage of the Statute of Westminster 1931, the Governor-General is appointed solely on the advice of the Cabinet of Grenada without the involvement of the British government. In the event of a vacancy the Chief Justice served as Officer Administering the Government.
Status
Standards
Living former heads of state
There are two living former Grenadian Heads of State:
References
External links
World Statesmen – Grenada
Rulers.org – Grenada
Category:Government of Grenada | {
"pile_set_name": "Wikipedia (en)"
} |
Worlds Apart (Blackjack album)
Worlds Apart is the second and final album of the American rock band Blackjack. The album was met with nearly total indifference, sold poorly and Blackjack disbanded shortly after its release.
The album contains the song, "Welcome to the World", which opens with a live audio recording clip of a baby birth. A YouTube user by the name of Chris Cassone, engineer for Blackjack's band manager Phil Lorito, wrote on YouTube that the audio clip was of the birth of his son.
Jay Z sampled the song "Stay" for his song "A Dream" from his 2002 album The Blueprint 2: The Gift & the Curse which reached No. 1 on the Billboard 200.
In 2004, Kanye West re-recorded a section of "Maybe It's the Power of Love" for inclusion on his song "Never Let Me Down"; it was released on his triple platinum selling debut album The College Dropout which peaked at No. 2 on the Billboard 200. Speaking to the website Genius in 2015, Bolton gave his approval of the sampling, stating that "the song turned out beautifully".
Track listing
Personnel
Michael Bolton - lead & backing vocals
Bruce Kulick - lead & rhythm guitars
Jimmy Haslip - bass, backing vocals
Sandy Gennaro - drums, percussion
Additional personnel
Jan Mullaney - keyboards
Chuck Kirkpatrick - backing vocals
Tonny Battaglia - backing vocals
Eric Troyer - backing vocals
Eddy Offord - production & engineering
Rob Davis - engineering
References
External links
Category:1980 albums
Category:Albums produced by Eddy Offord
Category:Polydor Records albums | {
"pile_set_name": "Wikipedia (en)"
} |
In practice dental treatments, teeth extracted from human bodies and animals have conventionally been used so as to experience the grinding sensation of a natural tooth. However, there are hygienic problems associated with extracted teeth and infection may occur if hygiene control is not sufficiently conducted. Thus it was impossible to conduct training freely. Furthermore since extracted teeth comprise a natural living material, there arises a problem of corruption and it is necessary to pay a careful attention to storage.
Therefore, there has been a need for a method which enables the experience of the grinding sensation of a tooth without using a natural tooth.
Now a tooth for a dental arch model, which is used for practice treatments in the oral cavity, is often produced using an epoxy resin or a melamine resin, and are well known in the art.
However, a tooth for a dental arch model formed of an epoxy resin or a melamine resin is in the form of a natural tooth, but exhibits a grinding sensation different from that of a natural tooth. Therefore, even when performing formation trainings such as abutment tooth formation and cavity preparation, grinding sensation and handling properties are different from those of actual dental works in the oral cavity, and thus the training effect could not be obtained.
Specifically, an epoxy resin and a melamine resin are soft. Thus there is a tendency to over grind and even when performing training using such a model tooth, the grinding may not be similar to that of a hard natural tooth.
Furthermore, a natural tooth is formed of an enamel texture and the dentin texture and an enamel texture and the dentin texture are harder than a resin, and thus the enamel texture, with which a crown portion of the dentin texture is coated, and the dentin texture have different hardnesses. As a result, in case of a transition during grinding from the enamel texture to the dentin texture, the dentin texture may be excessively ground and thus a tooth may not be satisfactorily produced.
That is, it is required that a grinding sensation varies similarly to a natural tooth in the transition part from the enamel portion to the dentin portion of a tooth for a dental arch model. Therefore as a matter of course, it is important that the enamel portion reproduces the grinding sensation of the enamel texture, while the dentin portion reproduces the grinding sensation of the dentin texture.
As a result of the need for a harder material, a composite type tooth is commercially available. However even in case of a composite type tooth, since the dentin portion and the enamel portion exhibit the same grinding sensation, the grinding sensation of the composite type tooth is different from that of a natural tooth. Therefore, even when performing formation trainings such as abutment tooth formation and cavity preparation, the grinding sensation and handling properties are different from those in case of dental works in the oral cavity in practice, and thus the training effect could not be obtained. To state the matter clearly, the grinding sensation includes slipperiness and is substantially different from a natural tooth.
Japanese Unexamined Utility Model Publication (Kokai) 1-90068 discloses that a the enamel texture layer is formed of glass/ceramics having a Vickers hardness controlled within a range from 350 to 450, comprising a phlogopite crystal [NaMg3(Si3AlO10)F2] and a lithia-alumina-silica-based crystal (Li2O.Al2O3.2SiO2, Li2O.Al2O3.4SiO2) precipitated simultaneously; a tooth root layer is prepared in advance by adding white, red and yellow colorants to a polyol (base resin), mixing with an isocyanate prepolymer (curing agent), injecting the mixture into a silicone rubber mother mold under vacuum conditions and curing the mixture at a normal temperature; and a dentin texture recognition layer, which exists between the enamel texture layer and the tooth root layer thereby bonding both layers, and is formed of an adhesive resin having an opaque color.
However, the tooth comprising an enamel texture layer formed of a phlogopite crystal or a lithia-alumina-silica-based crystal is not well adapted for use because it feels too hard when grinding as compared with a natural tooth, and also it is not well adapted for use because the dentin texture recognition layer is formed of an adhesive resin which feels too soft when grinding.
Furthermore, the dentin layer is formed of an adhesive layer is disclosed. It is described that an enamel layer portion and a tooth root layer portion are formed and bonded. It is recognized as the dentin layer formed of a thick adhesive layer.
Japanese Unexamined Patent Publication (Kokai) No. (hereinafter referred to briefly as “JP-A-”) 5-224591 discloses a tooth model which has a grinding sensation extremely similar to that of a natural tooth, and is suited for the training of practical dental grinding.
The tooth model comprises a crown portion whose surface has a Knoop hardness of at least 70 or more and a tooth root portion whose surface has a Knoop hardness of at least 10 to 40. The tooth model contains, as main components, an inorganic matter powder and a crosslinking resin in a weight ratio of 20%:80% to 70%:30%.
The above prior art discloses that “a tooth model may be formed of a raw material having any hardness, for example, metal, ceramics or a resin, or may be a cavity in view of the method for producing a tooth model and economic considerations”. However, this is not a tooth model which can exhibit a difference in the grinding sensation between the enamel portion and the dentin portion.
JP-A-5-216395 discloses a tooth model which has a grinding sensation extremely similar to that of a natural tooth and is suited for the training of practical dental grinding, and a method for producing the same. The tooth model contains, as main components, a hydroxyapatitte powder having a porosity of 40 to 80% and a (meth)acrylate ester-based resin in a weight ratio of 20%:80% to 50%:50%. However, this is not a tooth model which can exhibit a difference in the grinding sensation between the enamel portion and the dentin portion.
JP-A-5-241498, JP-A-5-241499 and JP-A-5-241500 describe an inorganic filler and hydroxyapatitte filler. However, in all tooth models disclosed in these publications, a resin is used as a base material and thus the problem of the grinding sensation is not solved. They are not tooth models which can exhibit a difference in grinding sensation between the enamel portion and the dentin portion.
JP-A-2004-94049 describes an invention which provides a model tooth for dental training, which enables an accurate shape measurement with laser beam.
The specification discloses that “known materials can be used as a material constituting a surface of a crown portion of the model tooth of the present invention and there can be used porcelain materials such as ceramics; thermoplastic resin materials such as acryl, polystyrene, polycarbonate, an acrylonitrile-styrene-butadiene copolymer (ABS), polypropylene, polyethylene, and polyester; thermosetting resin materials such as melamine, urea, unsaturated polyester, phenol, and epoxy; and materials obtained by adding various organic and inorganic reinforcing fibers (for example, glass fiber, carbon fiber, pulp, synthetic resin fiber, etc.), various fillers (for example, talc, silica, mica, calcium carbonate, barium sulfate, alumina, etc.), colorants (for example, pigment, dye, etc.) and various additives (for example, weathering agents, antistatic agents, etc.) to these main raw materials”. However, there is no description about preferable materials, and thus the problem of grinding sensation is not solved.
As a result of a study, the present inventors have found that it is necessary to use a sintered body of an inorganic material so as to exhibit the grinding sensation of a natural tooth. Because of the difficulty in controlling a hardness of an inorganic material, it is difficult to form an enamel portion and a dentin portion while controlling the hardness.
It is necessary to control a density and a particle shape of the sintered body and a sintering temperature so as to adjust the grinding sensation of the sintered body. The difference in a shrinkage rate and a thermal expansion coefficient between the enamel portion and the dentin portion upon sintering results in breaking, peeling and cracking. In addition, a gap may be formed between the dentin portion and the enamel portion. Thus, chipping may occur upon grinding and the gap gives a sensation different from the grinding sensation of a natural tooth. Thus the resultant tooth was not well adapted for use.
When a natural tooth is ground, a unique tough grinding sensation upon grinding of a living body is obtained. In particular, the dentin portion remarkably exhibits sensation of adhesion of an organic component contained in the dentinal tubule of the tooth to a bar, and sensation of inhibition of grinding.
Although various methods have been studied so as to obtain a tough grinding sensation peculiar to a natural tooth, a sufficient grinding sensation cannot be obtained using resin, composite or the like and such a sensation can not be obtained while pouring water on a conventional tooth for a dental arch model. A grinding sensation is required in which users feel a tough grinding sensation than that of an inorganic material even in case of the enamel texture because of a similar phenomenon.
However, neither a specific composition of a tooth model capable of realizing a grinding sensation of the enamel texture and the dentin texture of a natural tooth, nor a method for producing the same has been studied or reported.
A method of reproducing tooth pulp peculiar to a natural tooth has not been developed heretofore, and thus dental students could not experience exposure to tooth pulp. Dental pulp exposure (grinding down the tooth pulp portion) is the most important technique in a dental treatment. In case where tooth pulp exposure was carried out by mistake, the subsequent treatment method must be learned at the same time.
As a dental caries progresses in a natural tooth, the treatment position expands into the enamel layer, the dentin layer and the tooth pulp, and training for a root canal treatment such as a pulpectomy is most important. When a pulpectomy is carried out, since the tooth pulp is removed by a reamer and sensations of rubbing of the dentin wall surface with the reamer completely varies, training of root canal filling could not be carried out.
In a treatment of tooth pulp, a tooth designed for training of a root canal treatment is used, and also training of a root canal treatment (root canal cleaning, root canal extension, etc.) is carried out using a tooth with a small hole formed of a box-shaped acryl. However, sufficient training cannot be carried out since it is impossible to mount the tooth on a jaw and the hardness of the dentin texture varies.
It is required to develop a tooth for a dental arch model, which enables these experiences. In particular, dental students learn by hand the sensation of whether or not tooth pulp is completely removed upto the apical foramen during root canal cleaning, and thus it is difficult for beginners. Therefore, it is required to perform training using a tooth for a dental arch model in which tooth pulp in a natural tooth is reproduced.
Although removal of dental caries is an important procedure in a dental treatment, a carious dental portion is softer than a usual dentin portion and thus it is difficult to grind the carious dental portion. Therefore, it is necessary to perform training using a tooth for a dental arch model in which dental caries in a natural tooth are reproduced. It is also required to develop a method of confirming that a carious dental portion has been accurately removed. | {
"pile_set_name": "USPTO Backgrounds"
} |
Tent Hire
a2zcamping have a shop packed full of every thing you need for your camping or caravan holidays. From caravan awnings by Sunncamp and Kampa to the latest inflatable awnings and motor home awnings. We also have the largest range of clearance tents in the west midlands. a2zcamping.co.uk are also an approved supplier of Hyundai leisure generators and camping generator accessories. | {
"pile_set_name": "Pile-CC"
} |
Q:
WCF XML Serialization & Overloading
In my WCF service I only want 1 endpoint (1 URI), however, I want this URI to be able to handle multiple types of requests. 5 different request types can be sent to this service from another company. Each request has a unique XML schemas.
I created classes for each XML request to be serialized. Normally I would just overload a function when the parameter is different.... however I cannot do this in this instance because the UriTemplate of my WCF functions are the same, and throws errors when I try to run the app (saying the UriTemplate must be unique).
In each XML request is a node named "requestType". I'm trying to get a feel for what others would do... should I serialize on my own and ignore the built in serialization from the DataContract? What type of parameter should I set my function to accept... an XMLDocument then based on the requestType branch out to the request specific logic?
The returned XML from this function is also unique based on the request type.... however I cannot return an XMLDocument from an OperationContract... more errors are thrown (I think because it said it cannot be serialized).
I've tried creating a class that can get serialized from all request types by setting
IsRequired = false, EmitDefaultValue = false
...on the DataMembers for objects that are not shared amongst the different request types. I'm now running into a problem where the Order has to be properly set for each DataMember otherwise it doesn't get serialized at all into my class object.... I would have thought the Order wouldn't have to be set :/
Edit:
This is what I'm using now... the XML is POSTed to my service.
[WebHelp(Comment = "comment")]
[WebInvoke(UriTemplate = "foobar",
Method = "POST",
BodyStyle = WebMessageBodyStyle.Bare,
ResponseFormat = WebMessageFormat.Xml)]
[OperationContract]
public ResponseType foobar(ReqeustType request)
...
When testing I would post XML to http://localhost:4011/XMLWCF/Service.svc/foobar
A:
I would have one service endpoint, e.g. one URL, but I would clearly define five separate, unique service methods in your service contract, and implement those separately.
THat's by far the easiest and cleanest solution, in my opinion.
[ServiceContract(Namespace=".......")]
interface IYourService
{
[OperationContract]
ReturnValue1 YourMethodNo1(int a, int b);
[OperationContract]
ReturnValue2 YourMethodNo2(........);
[OperationContract]
ReturnValue3 YourMethodNo3(..........);
[OperationContract]
ReturnValue4 YourMethodNo4(...........);
[OperationContract]
ReturnValue5 YourMethodNo5(........);
}
You can't really have just a single service method which gets five different types of parameters. Also, WCF doesn't support method overloading - since WSDL doesn't support it. All your methods have to have a unique name and have to have defined and clear parameters types.
You could use a general parameter of type Message - but that does get pretty hairy, in my opinion. This MSDN page or this blog post shed some light on how to do that - if you really want to...
UPDATE: in this scenario I described, you'd have ONE service URL - http://site.com/service.svc.
From that service URL, you'd create a client proxy at your client end, which would have five methods to call:
(pseudo-code):
class ClientProxy
{
ReturnValue1 YourMethodNo1(int a, int b);
ReturnValue2 YourMethodNo2(........);
ReturnValue3 YourMethodNo3(..........);
ReturnValue4 YourMethodNo4(...........);
ReturnValue5 YourMethodNo5(........);
}
From your client code, you would then call either of those five methods:
ReturnValue1 result = ClientProxy.YourMethodNo1(5, 7);
but all would go to the single service URL.
| {
"pile_set_name": "StackExchange"
} |
An exclusionary n-th power m^n is one made up of digits not appearing in the root m which itself consists of distinct digits. For the corresponding root m, see A113951. In principle, no exclusionary n-th power exists for n=1(mod 4)=A016813. | {
"pile_set_name": "Pile-CC"
} |
package me.coley.recaf.ui.controls;
import javafx.scene.control.TextField;
/**
* TextField that with a numeric text parse.
*
* @author Matt
*/
public class NumericText extends TextField {
/**
* @return Generic number, {@code null} if text does not represent any number format.
*/
public Number get() {
String text = getText();
if(text.matches("\\d+"))
return Integer.parseInt(text);
else if(text.matches("\\d+\\.?\\d*[dD]?")) {
if(text.toLowerCase().contains("d"))
return Double.parseDouble(text.substring(0, text.length() - 1));
else
return Double.parseDouble(text);
} else if(text.matches("\\d+\\.?\\d*[fF]"))
return Float.parseFloat(text.substring(0, text.length() - 1));
else if(text.matches("\\d+\\.?\\d*[lL]"))
return Long.parseLong(text.substring(0, text.length() - 1));
return null;
}
}
| {
"pile_set_name": "Github"
} |
Q:
"every prime number $p$ $(p>3)$ can be expressed sum of consecutive numbers " is it true?
I'm finding some necessary and sufficient conditions for a integer $n$ to be a prime number. But I'm not sure if "every prime number $p \, ,(p>3)$ can be expressed sum of consecutive number" is true.
If it is right, I hope you help me prove that.
Thank you very much.
A:
Every prime greater than or equal to $3$ is odd, and every odd is of the form $2k+1$ that is, $$\exists \,k \in \mathbb N \, : \,p=2k+1=\underbrace{(k)+(k+1)}_{\text{Sum of two consecutive integers}}$$
| {
"pile_set_name": "StackExchange"
} |
Q:
Example of logical order and total order in distributed system
Total order:
Lamport timestamps can be used to create a total ordering of events in
a distributed system by using some arbitrary mechanism to break ties
(e.g. the ID of the process).
Logical order:
When two entities communicate by message passing, then the send event
is said to 'happen before' the receive event, and the logical order
can be established among the events
enter link description here
Can anyone give me an example where I can see the differences of logical order and total order? What is the difference of both orders?
A:
Since you are looking for an example about differences between Logical order and Total order, here is a little story my old distributed algorithm teacher told us when he wanted to explain that specific topic.
Let's say that A owes B some money.
A tells B on the phone, that A is going to credit B's account in A's local branch at 6 p.m.
So anytime after 6 p.m., B can withdraw money from A's bank.
Let's say B is nice and tells A's branch that at 8 p.m. they can debit A's account the money that A owes B.
So B's branch is going to basically do a debit call to the central bank server asking for the money that is owed by A to be transferred to B's account and that's what is going to happen.
B has been given A enough time to make sure that A have indicated to B bank, that A have enough money, so that A's debit transaction can go through.
B would think it should go through, right?
But it turns out, that B's branch's local time is far ahead of real time. The branch thought it was 8 p.m., it was not quite 8 p.m., yet.
A is keeping his word, exactly at 6 p.m., A's branch happens to be good with the time. (synced with the real time)
So at 6 p.m., A has done the credit of the amount that A owes B to A's central bank server.
Unfortunately, the central bank server, in real time, got B's message much earlier than the time at which A sent his message.
The central bank server isn't looking at any logical time. It is looking at real time when there's a debit transaction coming in. Is there money in the bank for paying those debit transactions?
No, there isn't. So B's request is declined. This is the result of the fact that in real world scenarios, logical clocks are not good enough.
So what caused the problem here?
It is the fact that B's branch's notion of real time is completely at odds with real time. The computer at B's local bank might have a clock that is drawing near with the respect to real time.It's either going faster than real time or it is going slower than the real time.
It so happens that A's, A's branch's time is is perfectly in sync with the real time, but that doesn't help A.
This example seems a little complex to understand straightaway.
This is know as the clock synchronization problem.
I invite you strongly to read Lamport's paper concerning Time, Clocks, and the Ordering of Events in a Distributed System as he presents a different way to explain the differences.
You might also find these references quite handy :
A lecture about Clock Synchronization by Paul Krzyzanowski
An intersting blogpost about Synchronization in a Distributed System I found while trying to formulate the answer.
I hope this helps.
| {
"pile_set_name": "StackExchange"
} |
Laparoscopic pyeloplasty with concomitant pyelolithotomy: technique and outcomes.
Coexisting renal calculus disease may pose technical challenges in the surgical management of ureteropelvic junction obstruction. We report our experience with laparoscopic pyelolithotomy at the time of laparoscopic pyeloplasty and compare outcome data with a cohort of patients undergoing laparoscopic pyeloplasty without coexistent stone disease. We reviewed data on 117 patients undergoing laparoscopic pyeloplasty in the last 3 years at our institution. Fifteen (10.6%) patients underwent concomitant ipsilateral pyelolithotomy at the time of laparoscopic pyeloplasty. Laparoscopic graspers alone were used in 11 (73.3%) patients, flexible nephroscopy in 2 (13.3%) patients, and laparoscopic irrigation in 2 (13.3%) patients for renal stone removal. Patients in the group undergoing pyelolithotomy were compared with 15 matched patients undergoing laparoscopic pyeloplasty without concomitant calculus disease. Preoperative, intraoperative, and postoperative parameters were compared between the groups. Overall stone-free rate after laparoscopic pyelolithotomy was 80%. Mean operative time was 174 minutes nu 170 minutes for the pyelolithotomy nu control group, respectively (P = 0.81). Laparoscopic pyelolithotomy, primarily using laparoscopic graspers, is an efficient procedure with associated high stone-free rates without significant increase in operative time or morbidity. Intraoperative flexible nephroscopy may be necessary only occasionally for stone retrieval. | {
"pile_set_name": "PubMed Abstracts"
} |
Cole Valley Hillside
Tucked into a hillside site at the end of a cul-de-sac, this transformation of a 1930’s Deco house in San Francisco’s Cole Valley addresses a number of complicated site conditions. Roof forms vary to address views to the east and north and combine with well-placed skylights to allow sunlight into all areas of the house despite its hillside setting. A central stair core carved into the hill draws visitors to living spaces placed on the top floor to maximize access to light and views. | {
"pile_set_name": "Pile-CC"
} |
No one can tell you which bullet your particular gun will like, not even us. You'll have to try some different ones and experiment. But to get you started in the right direction, we've provided some general rules on how to select a pistol bullet on the Pistol Bullets page.
Caliber
Mould Make(Number)
Weight(BHN)
DiameterRange
Bullet Style(Alloy)
Nose to Crimp Groove Length(Metplat)
Price/100 (Lubed
and
sized)
Price/500 (Lubed
and
sized)
LBT
(N/A)
460
(22)
.511 - .513
Semi- Wadcutter - Keith style - Gas Checked
(HT)
0.375
(0.410)
39.15
190.75
500 Linebaugh
Ballisti-Cast
(1480GC)
445
(22)
.510 - .512
Semi- Wadcutter - Keith style - Gas Checked
(HT)
0.440
(0.355)
38.05
185.25
LBT
(N/A)
440
(22)
.510 - .513
Long Flat Nose - Gas Checked
(HT)
0.400
(0.375)
38.05
185.25
LBT
(N/A)
440
(15)
.510 - .512
Semi- Wadcutter - Keith style
(air cooled)
0.370
(0.400)
32.35
156.75
LBT
(N/A)
400
(22)
.510 - .513
Long Flat Nose - Gas Checked
(HT)
0.380
(0.375)
35.85
174.25
LBT
(N/A)
350
(22)
.510 - .512
Long Flat-Nose - Gas Checked
(HT)
0.325
(0.380)
32.35
156.75
LBT
(N/A)
350
(22)
.510 - .512
Wide Flat Nose - Gas Checked
(HT)
0.310
(0.425)
32.35
156.75
(HT) = Heat Treated alloy
Note: All bullets can be supplied sized within the diameter range noted for each bullet and lubed for smokeless or black powder. Order Now! | {
"pile_set_name": "Pile-CC"
} |
President Obama on Saturday signed a seven-day extension of government funding, which is the first part of an agreement to keep the government running through the end of the current fiscal year.
The bill was signed without fanfare 13 hours after Democratic and Republican congressional leaders reached a last-minute deal late Friday to avoid a government shutdown.
The agreement, which came after days of partisan sparring and rhetorical drama, would fund the government through the end of September and cut $78.5 billion compared to Obama's proposed but never enacted fiscal 2011 budget.
ADVERTISEMENT
Because it will take several days to translate the agreement into a legislative draft, both chambers passed the stopgap to keep the government funded until April 15. The short-term measure cuts $2 billion from the budget, the first of the $78.5 billion in total cuts.
House Speaker John Boehner John Andrew BoehnerLongtime House parliamentarian to step down Five things we learned from this year's primaries Bad blood between Pelosi, Meadows complicates coronavirus talks MORE (R-Ohio) claimed victory in a brief press conference before the midnight deadline.
"This has been a lot of discussion and a long fight," Boehner John Andrew BoehnerLongtime House parliamentarian to step down Five things we learned from this year's primaries Bad blood between Pelosi, Meadows complicates coronavirus talks MORE said. “We fought to keep government spending down because it really will affect and help create a better environment for job creators in our country.”
Obama, in a televised address Friday night, also praised the deal while acknowledging that some of the cuts he agreed to will be “painful.”
The deal cuts a total of $38 billion from current spending levels over the next six months. Of that total, $17.8 billion came from mandatory spending programs, including $2.5 billion in House transportation spending, according to a senior Democratic aide familiar with the deal.
Democrats knocked off most of the controversial policy riders that House Republicans had included in H.R. 1, the package of spending cuts that passed in February.
ADVERTISEMENT
Republicans, however, won the inclusion of a rider to expand the District of Columbia’s school voucher program and to authorize a Government Accountability Office study of a financial oversight board established by the Wall Street reform bill.
Most significantly, Democrats won the disagreement over funding that included Planned Parenthood, which provides abortion services.
A senior Democratic leadership aide said Boehner described the abortion-related policy riders as must-have priorities, but Obama and Democrats stood firm, arguing they would negatively affect women’s access to cancer screenings and other health services.
In return, Republicans won a promise from Senate Democrats to schedule next week's votes on two bills — one defunding Title X and Planned Parenthood and another to defund the 2010 healthcare reform law — at the same time as consideration of the spending deal. Democrats also agreed to reinstate a ban on taxpayer funding for abortions in Washington, D.C., for the next six months.
GOP amendments that would have blocked the Environmental Protection Agency's ability to implement a variety of regulations and would have eliminated federal funds for NPR also fell by the wayside.
Negotiators battled over the size of the Defense Department's budget and finally agreed to spending $2 billion below the amount the House approved in the package it passed in February.
Both sides seemed relieved to have averted a shutdown that polls showed would probably have done political damage to both parties.
“In the final hours before our government would be forced to shut down, leaders in both parties reached an agreement that will allow our small businesses to get the loans they need, our families to get the mortgages they applied for and hundreds of Americans to show up at work and take home their paychecks on time, including our brave men and women in uniform,” Obama said.
Asked if he were happy about the deal, Boehner paused and told The Hill, "It's as good a deal as we could get."
Senate Majority Leader Harry Reid Harry Mason ReidGOP senators confident Trump pick to be confirmed by November Durbin: Democrats can 'slow' Supreme Court confirmation 'perhaps a matter of hours, maybe days at most' Supreme Court fight pushes Senate toward brink MORE (D-Nev.) praised Boehner for eventually reaching a compromise, despite the opposition of some conservative House members.
Rep. Jeff Flake Jeffrey (Jeff) Lane FlakeHow fast population growth made Arizona a swing state Jeff Flake: Republicans 'should hold the same position' on SCOTUS vacancy as 2016 Republican former Michigan governor says he's voting for Biden MORE (R-Ariz.), who's running for Senate in 2012, said he was "disappointed.”
"A lot of us are quite disappointed with the level" of spending cuts, he said.
In remarks on the Senate floor, Reid said, “I first of all want to express my appreciation to the Speaker and his office, it’s been a grueling process. We didn’t do it at this late hour for drama, we did it because it’s been very hard to arrive at this point.”
Boehner presented the bipartisan deal to his caucus at a meeting that began at 9:45 p.m. Friday evening, even though it had not been finalized.
Negotiators, which included Boehner's chief of staff Barry Jackson, Senate Majority Leader Harry Reid’s chief of staff David Krone and Rob Nabors, a senior adviser to Obama, agreed to the broad outline of a deal by 8 p.m. They exchanged final handshakes around 10:30 p.m., just as the House GOP meeting broke up.
Lawmakers said the conference meeting was particularly moving.
After a week of partisan sniping and the uncertainty over a potential government shutdown, members rallied behind Boehner in a major show of support for the deal. "There were more people that were very adamant for it," according to a source who was in the room.
"The one who got the most emotional was Marsha Blackburn Marsha BlackburnNetflix distances from author's comments about Muslim Uyghurs but defends project Hillicon Valley: Subpoenas for Facebook, Google and Twitter on the cards | Wray rebuffs mail-in voting conspiracies | Reps. raise mass surveillance concerns Key Democrat opposes GOP Section 230 subpoena for Facebook, Twitter, Google MORE [R-Tenn.]; she was emotionally in favor of it, she broke down," a GOP source told The Hill. "I mean, Blackburn, nobody could believe it," the source added.
ADVERTISEMENT
Unlike Boehner, who is notorious for his tears, Blackburn, is not one for crying in public.
And her plea to colleagues struck a chord in many members, according to several attendees. Boehner, too, shed a tear during Blackburn's remarks.
Sean J. Miller contributed to this report.
This story was updated at 2:20 p.m. and was originally published at 1:45 a.m. | {
"pile_set_name": "OpenWebText2"
} |
Q:
textfile to an array...any ideas?
I am needing to turn a textfile into an array...I am not sure how to go about this because the other features ive seen for php take an entire file and put it into an array but not quite how I want it to be so I am looking for advice here..
The following is written in a textfile:
"jim kroi,richard wuu,yan kebler,justin persaud"
How can I use php to make an array where automatically a loop puts each name as an item of the array until all the names run out?
so the end result of what I am trying to do is:
$array= array("jim kroi","richard wuu","Yan kebler","justin persaud");
So a loop of some sort would basically search upto each comma and extract the name before it until all of the names run out....
There are some php substr and such functions but I cant quite think of how to do this..
Yes, I do have code, here it is:
<?php
error_reporting(-1);
$fp = fopen('numbers.csv', 'w');
fputcsv($fp, $_POST['names']);
fputcsv($fp, $_POST['numbers']);
fclose($fp);
?>
i put them all in a csv but now how can I make 2 arrays, one with name the other with numbers? http://imageshack.us/photo/my-images/215/csv.png/
using implode I get the error:
Warning: implode() [function.implode]: Bad arguments. in C:\Program Files\xampp\htdocs\xampp\something.php on line 14
<?php
error_reporting(-1);
$myFile = "testFile.txt";
$fh = fopen($myFile, 'r'); // open file
$theData = fread($fh, 5); // read file and store in var
$array = explode("\n", $theData); // explode string by lines using \n
echo implode("<br/>", $theData); // put the array back together and show each item as a line
fclose($fh);
?>
A:
Something like:
$names = array_map('trim', explode(',', file_get_contents('%yourFileHere')));
| {
"pile_set_name": "StackExchange"
} |
DIY 2 in 1 Coffee Table Bench
I love creating something that is multifunctional … that’s why I am so excited to share with you how to create this 2 in 1 Coffee Table Bench! Here’s how to get started …
You Will Need:
Wood Glue
Wood Screws
Door Hinges
Have your hardware store pre-cut boards to:
4- 2x4s @ 41″
1 – 2×2 @ 41″
8 – 2x4s @ 16 1/2″
4 – 2x4s @ 15″
2 – 2x4s @ 5 1/2″
2 – 2x4s @ 15″
4 – 1x8s @ 48″
2 – 1x3s @ 48″
2 – 2x4s @ 9 1/2″
How-To:
1. Attach the top middle 2×4 brace (41″) and the bottom middle 2×2 (41″) brace to the side 2x4s (16 1/2″) along with wood glue. There should be a 3/4″ spacing at the top of the seat back.
2. Assemble the side arms by attaching the top side 2×4 brace (16 1/2″) and the front side 2×4 (5 1/2″) brace together with 2 1/2″ pocket hole screws to attach along with wood glue. Repeat this step to create two side arms.
3. Attachthe bottom side 2×4 brace (15″) to finish the side arm on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue. Repeat this step for both side arms.
4. Attach the two 1×8 (48″) bench seat supports to the top bench using wood screws/brad nails and wood glue. The 1×6 boards will be flush with the outside of the bench.
5. Attach the middle 1×3 (48″) bench seat support to the top bench using wood screws/brad nails and wood glue. There should be a spacing of 1/4 of an inch in between boards.
6. Assemble bottom half of the bench by attaching the top middle 2×4 brace (41″) and the bottom middle 2×4 (41″) brace to the side 2x4s (16 1/2″) using a on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue. The bottom 2×4 should be placed faced down instead of right side up for the bottom bench half. The top should be inset by 3/4″ like the top bench.
7. Assemble the side arms for the bottom half of the bench by attaching the top side 2×4 brace (15″) and the front side 2×4 (15″) brace to the (17 1/4″) 2×4 using on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue. Repeat this step to create two side arms.
8. Assemble the side arms for the bottom half of the bench by attaching the top side 2×4 brace (15″) and the front side 2×4 (15″) brace to the (17 1/4″) 2×4 using a on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue. Repeat this step to create two side arms.
9. Attach the two side arms to the bottom bench back support using on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue.
10. Attach the (41″) 2×4 to the existing bottom bench using a on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue. The 41″ 2×4 should be inset 1 1/2″ from the outside of the bench.
11. Attach the (9 1/2″) 2×4 braces to the existing bottom bench using on a 1 1/2″ setting, with 2 1/2″ pocket hole screws to attach along with wood glue.
12. Attach the (48″) 1×8 boards to the bottom bench using wood screws and wood glue.
13. Attach the (48″) 1×3 board2 to the bottom bench using wood screws and wood glue. There should be a 1/4″ spacing in between boards. | {
"pile_set_name": "Pile-CC"
} |
Burney, Fanny Travel and society polish one, but a rolling stone gathers no moss,
and a little moss is a good thing on a man. - Burroughs, John Travelers are likepoets. They are mostly an angry race. - Burton, Sir Richard I swims in the Tagus ...
In the pathology of travel, many journeyers who seem in pursuit of a goal are
driven by demons, attempting to flee, often ... Burton also said, “Travelers, likepoets, are mostly an angry race. ... And when they return from their morti- fications
it is to insult the people and the places they have visited, to fight the battle over
the bill ...
Gélélé had said that Burton was a good man but too angry.Primitive people were
good at reading character. They had had to be to survive. Monat, the Arcturan,
sensing ... Travelers, like poets, are mostly an angry race.” That at least made him
...
Now that I had a comforting cushion of savings, I was once again inclined to think
about travel. "Travellers, like poets, are mostly an angry race," wrote African
explorer Richard Burton, and so it was with me. Paris beckoned as offering a
spell of ...
“Bob, you gonna eat monks' food today,” my mother teases, even though most of
the time she prepares a separate ... If sumo is on, my mother hoarsely shouts
instructions at the wrestlers as if they could hear her. ... As I walk outside through
the garage, she stands at the utility room window waving like a child. ... Paisley
Rekdal is a multigenre author, poet, and poetry professor at the University of Utah
.
It is only persons, of whatever race, that matter. The rest are mostly worthless. So
when they passed along the street of the goldsmiths, Tarak as usual whispered
his little poem, now almost a joke. She would smile feebly in return, for she was ...
It is onlypersons, of whatever race, that matter. The rest are mostly worthless. So
when they passed along the street of the goldsmiths, Tarak as usual whispered
his little poem, now almost a joke. She would smile feebly in return, for she was ...
In all probability the post-mark and the handwriting revealed that they were
gentle reminders from the tradesmen with whom they dealt. There is one odd
peculiarity that seems congenital with the race — you and I have it in common
with our neighbor. When we receive a ... Here's his check,' and the angry poet
flourished the bit of paper in the air and hurried away. I afterward learned ... But
the most unhappy experience of all was related by a certain well-known traveller
and litterateur.
29, of Martin Far- quhar Tupper, at 79, have of course been devoted mostly to
speculations 'Proverbial Philosophy," — what it was ... English poetry and
represents the deepest spirit of modern philosophy, cannot be classified in a few
cheap formulae. ... structure built up by the race since the animal stage ; entirely
anarchic savages, and they only, fulfill exactly the ethical ... We do not feel like
adding to the list of tloges ; and any one who does not know all we could tell him
of Mr. Davis's ...
In “April Fool Birthday Poem for Grandpa,” which is included in Pieces of a Song (
1990), Diane di Prima also perceives a ... and certainly no single “Beat” politic; in
fact, many of those most frequently associated with the Beat Generation were ...
References to the space race, to Einstein's theories, and to the bomb, which are
scattered throughout the Beat writing, ... in Protest: The Beat Generation and the Angry Young Men) wrote about Beat Generation disconnection from society and
the ... | {
"pile_set_name": "Pile-CC"
} |
Scandal started off as a political thriller about Olivia Pope, a sharply dressed professional with a penchant for yelling “It’s HANDLED!” when asked to perform any task, from collecting a takeaway to covering up a crime. From 2012 to 2018, Kerry Washington played this powerhouse head of crisis-management firm Olivia Pope & Associates, whose employees included three lawyers and a former hitman.
Based extremely loosely on the experiences of Judy A Smith, a former deputy press secretary to George HW Bush, it was fascinating stuff. Each week, Olivia and her “Gladiators” tackled a different case, using spin and steam cleaning to help the rich and powerful cover up affairs, social media mishaps and, yes, the occasional killing. Some aspects of the show were hard to believe, from Olivia’s ability to keep her white sofa stain-free despite consuming a fishbowl of bordeaux every evening to her on-off affair with President Fitzgerald Grant (Tony Goldwyn), the whiny married man she rigged voting machines to help elect.
But for the most part, Scandal was smart, soapy fun, another hit for TV titan Shonda Rhimes, creator of Grey’s Anatomy and exec-producer of How to Get Away With Murder. It tackled the impact of racism, treated same-sex marriage and abortion as commonplace and was revolutionary in the history of TV: Washington was the first African-American actress cast in the lead role in a drama for 38 years (Get Christie Love!, starring Teresa Graves, lasted one series from 1974 to 75).
After two seasons, however, Scandal started to fall apart. We learned that Olivia’s dad, Rowan (Joe Morton), was the head of a shadowy government agency B613, which used torture to protect people in power. While Morton’s natural charisma and room-shaking baritone allowed him to just about pull off pronouncements such as “I am the hell AND the high water” while remaining on the right side of parody, the show became a literal bloody mess, filled with stabbings, shootings and throat-slittings as almost every major character committed murder without being caught. Viewers went from being on the edge of their seats to on the verge of vomiting.
This increase in violence was accompanied by wild tonal swings (including a widely derided, overly idealistic take on police brutality that saw a victim’s father hug the president) and ridiculous plot twists, including Olivia discovering her long-dead mother was actually alive (and an international terrorist), and the vice-president having Olivia kidnapped so he could bribe the president into starting a war.
There was some sweet wish fulfilment towards the end, when Fitz’s ex-wife succeeded him in the White House, but that was the catalyst for yet more betrayal and bloodshed. In the final episode, we flashed forward to see two young girls admiring a portrait of Olivia in the National Portrait Gallery, implying that she went on to be president, too. But given all the immoral and illegal things she’d done, it was hard to get excited. Looking back, the real Scandal was that anyone kept watching. | {
"pile_set_name": "OpenWebText2"
} |
To stop to be a bed snake of the spoiled virgins membership, Simona needed to have lovemaking. And newborn made certain that her cherry lovemaking was once the hottest it might be. | {
"pile_set_name": "OpenWebText2"
} |
Q:
ADT-PLUGIN ISSUE
I installed the adt-plugin for eclipse. I'm using Ubuntu 10.4 and have been stuck on this issue for 2 days now.
Select Window > Preferences... to open the Preferences panel (Mac OS X: Eclipse > Preferences).
Select Android from the left panel.
For the SDK Location in the main panel, click Browse... and locate your downloaded SDK directory.
I cant find the location of the downloaded plugin and have looked in /usr /etc /home everywhere possible, I still can't believe im stuck on something so simple. Anyone who could point me into the right direction, would help me sooo much.
thnx
hi.im.new
A:
The Android SDK is a different component from the plugin. You need the SDK to do any Android development at all. The plugin is just a helper for Eclipse. It sound like you haven't got the Android SDK on your system. You can get it from:
link text
Pick the starter package first of all then once you have that, you can add more components using the SDK Manager which will come with the starter package.
| {
"pile_set_name": "StackExchange"
} |
Katherine Plouffe
Katherine Plouffe (born September 15, 1992) is a Canadian basketball player for Tango Bourges Basket and the Canadian national team, where she participated at the 2014 FIBA World Championship.
She is the daughter of Laurie and Daryl Plouffe. She has four siblings; her twin sister, Michelle, played basketball for the University of Utah located in Salt Lake City, Utah, United States, and her older sister, Andrea, played basketball at the University of Washington located in Seattle, Washington.
Early years
Plouffe first started playing basketball in the second grade. She had older siblings who were often in the gym. She enjoyed being in the gym with her older siblings so she picked up the game at a young age.
Pan Am games 2015
Plouffe was a member of the Canada women's national basketball team which participated in basketball at the 2015 Pan American Games held in Toronto, Ontario July 10 to 26, 2015. Canada opened the preliminary rounds with an easy 101–38 win over Venezuela. The following day they beat Argentina 73–58. The final preliminary game was against Cuba; both teams were 2–0, so the winner would win the group. The game went down to the wire with Canada eking out a 71–68 win. Canada would face Brazil in the semifinal.
Everything seemed to go right in the semifinal game. Canada opened the game with an 11–2 run on seven consecutive points by Miranda Ayim. Miah-Marie Langlois contributed five assists. In the third quarter Canada strongly out rebounded Brazil and hit 69% of their field goals to score 33 points in the quarter. Lizanne Murphy and Nirra Fields hit three-pointers to help extend the lead to 68–39 at the end of three quarters. Canada continued to dominate in the fourth quarter with three-pointers by Kia Nurse and Kim Gaucher. Canada went on to win the game 91–63 to earn a spot in the gold-medal game against the USA.
The gold-medal game matched up the host team Canada against USA, in a sold out arena dominated by fans in red and white and waving the Canadian flag. The Canadian team, arm in arm, sang O Canada as the respective national anthems were played.
After trading baskets early the US edged out to a double-digit lead in the second quarter. However the Canadians, spurred on by the home crowd cheering, fought back and tied up the game at halftime. In the third quarter, it was Canada's time to shine as they outscore the US 26–15. The lead would reach as high as 18 points. The USA would fight back, but not all the way and Canada won the game and the gold-medal 81–73. It was Canada's first gold-medal in basketball in the Pan Am games. Nurse was the star for Canada with 33 points, hitting 11 of her 12 free-throw attempts in 10 of her 17 field-goal attempts including two of three three-pointers. Plouffe contributed two rebounds, one block and two points.
Marquette statistics
References
Category:1992 births
Category:Living people
Category:Basketball people from Alberta
Category:Basketball players at the 2015 Pan American Games
Category:Basketball players at the 2016 Summer Olympics
Category:Canadian expatriate basketball people in France
Category:Canadian expatriate basketball people in the United States
Category:Canadian women's basketball players
Category:Forwards (basketball)
Category:Marquette Golden Eagles women's basketball players
Category:Olympic basketball players of Canada
Category:Pan American Games gold medalists for Canada
Category:Pan American Games medalists in basketball
Category:Sportspeople from Edmonton | {
"pile_set_name": "Wikipedia (en)"
} |
//*********************************************************
//
// Copyright (c) Microsoft. All rights reserved.
// This code is licensed under the MIT License (MIT).
// THIS CODE IS PROVIDED *AS IS* WITHOUT WARRANTY OF
// ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING ANY
// IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR
// PURPOSE, MERCHANTABILITY, OR NON-INFRINGEMENT.
//
//*********************************************************
using System;
using System.Collections.Generic;
using System.Threading.Tasks;
using Windows.UI.Xaml;
using Windows.UI.Xaml.Controls;
using Windows.UI.Xaml.Navigation;
using Windows.ApplicationModel.Contacts;
namespace SDKTemplate
{
/// <summary>
/// An empty page that can be used on its own or navigated to within a Frame.
/// </summary>
public sealed partial class Scenario1_CreateContacts : Page
{
private MainPage rootPage = MainPage.Current;
public Scenario1_CreateContacts()
{
this.InitializeComponent();
}
private async Task<ContactList> _GetContactList()
{
ContactStore store = await ContactManager.RequestStoreAsync(ContactStoreAccessType.AppContactsReadWrite);
if (null == store)
{
rootPage.NotifyUser("Unable to get a contacts store.", NotifyType.ErrorMessage);
return null;
}
ContactList contactList;
IReadOnlyList<ContactList> contactLists = await store.FindContactListsAsync();
if (0 == contactLists.Count)
{
contactList = await store.CreateContactListAsync("TestContactList");
}
else
{
contactList = contactLists[0];
}
return contactList;
}
private async Task<ContactAnnotationList> _GetContactAnnotationList()
{
ContactAnnotationStore annotationStore = await ContactManager.RequestAnnotationStoreAsync(ContactAnnotationStoreAccessType.AppAnnotationsReadWrite);
if (null == annotationStore)
{
rootPage.NotifyUser("Unable to get an annotations store.", NotifyType.ErrorMessage);
return null;
}
ContactAnnotationList annotationList;
IReadOnlyList<ContactAnnotationList> annotationLists = await annotationStore.FindAnnotationListsAsync();
if (0 == annotationLists.Count)
{
annotationList = await annotationStore.CreateAnnotationListAsync();
}
else
{
annotationList = annotationLists[0];
}
return annotationList;
}
private async void CreateTestContacts()
{
//
// Creating two test contacts with email address and phone number.
//
Contact contact1 = new Contact();
contact1.FirstName = "TestContact1";
ContactEmail email1 = new ContactEmail();
email1.Address = "[email protected]";
contact1.Emails.Add(email1);
ContactPhone phone1 = new ContactPhone();
phone1.Number = "4255550100";
contact1.Phones.Add(phone1);
Contact contact2 = new Contact();
contact2.FirstName = "TestContact2";
ContactEmail email2 = new ContactEmail();
email2.Address = "[email protected]";
email2.Kind = ContactEmailKind.Other;
contact2.Emails.Add(email2);
ContactPhone phone2 = new ContactPhone();
phone2.Number = "4255550101";
phone2.Kind = ContactPhoneKind.Mobile;
contact2.Phones.Add(phone2);
// Save the contacts
ContactList contactList = await _GetContactList();
if (null == contactList)
{
return;
}
await contactList.SaveContactAsync(contact1);
await contactList.SaveContactAsync(contact2);
//
// Create annotations for those test contacts.
// Annotation is the contact meta data that allows People App to generate deep links
// in the contact card that takes the user back into this app.
//
ContactAnnotationList annotationList = await _GetContactAnnotationList();
if (null == annotationList)
{
return;
}
ContactAnnotation annotation = new ContactAnnotation();
annotation.ContactId = contact1.Id;
// Remote ID: The identifier of the user relevant for this app. When this app is
// launched into from the People App, this id will be provided as context on which user
// the operation (e.g. ContactProfile) is for.
annotation.RemoteId = "user12";
// The supported operations flags indicate that this app can fulfill these operations
// for this contact. These flags are read by apps such as the People App to create deep
// links back into this app. This app must also be registered for the relevant
// protocols in the Package.appxmanifest (in this case, ms-contact-profile).
annotation.SupportedOperations = ContactAnnotationOperations.ContactProfile;
if (!await annotationList.TrySaveAnnotationAsync(annotation))
{
rootPage.NotifyUser("Failed to save annotation for TestContact1 to the store.", NotifyType.ErrorMessage);
return;
}
annotation = new ContactAnnotation();
annotation.ContactId = contact2.Id;
annotation.RemoteId = "user22";
// You can also specify multiple supported operations for a contact in a single
// annotation. In this case, this annotation indicates that the user can be
// communicated via VOIP call, Video Call, or IM via this application.
annotation.SupportedOperations = ContactAnnotationOperations.Message |
ContactAnnotationOperations.AudioCall |
ContactAnnotationOperations.VideoCall;
if (!await annotationList.TrySaveAnnotationAsync(annotation))
{
rootPage.NotifyUser("Failed to save annotation for TestContact2 to the store.", NotifyType.ErrorMessage);
return;
}
rootPage.NotifyUser("Sample data created successfully.", NotifyType.StatusMessage);
}
private async void DeleteTestContacts()
{
ContactList contactList = null;
ContactStore store = await ContactManager.RequestStoreAsync(ContactStoreAccessType.AppContactsReadWrite);
if (null != store)
{
IReadOnlyList<ContactList> contactLists = await store.FindContactListsAsync();
if (0 < contactLists.Count)
{
contactList = contactLists[0];
}
}
if (null != contactList)
{
await contactList.DeleteAsync();
rootPage.NotifyUser("Sample data deleted.", NotifyType.StatusMessage);
}
else
{
rootPage.NotifyUser("Could not delete sample data.", NotifyType.ErrorMessage);
}
}
}
}
| {
"pile_set_name": "Github"
} |
Q:
Python - Using pytest to skip test unless specified
Background
I have am using pytest to test a web scraper that pushes the data to a database. The class only pulls the html and pushes the html to a database to be parsed later. Most of my tests use dummy data to represent the html.
Question
I want to do a test where a webpage from the website is scraped but I want the test to be automatically turned off unless specified. A similar scenario could be if you have an expensive or time consuming test that you do not want to always run.
Expected Solution
I am expecting some kind of marker that suppresses a test unless I give pytest to run all suppressed tests, but I do not see that in the documentation.
What I have done
I am currently using the skip marker and comment it out.
Tried to use the skipif marker and and give arguments to python script using this command from command prompt pytest test_file.py 1 and the following code below in the test file. The problem is that when I try to provide an argument to my test_file, pytest is expecting that to be another file name so I get an error "no tests run in 0.00 seconds, ERROR: file not found: 1"
if len(sys.argv) == 1:
RUN_ALL_TESTS = False
else:
RUN_ALL_TESTS = True
...
# other tests
...
@pytest.mark.skipif(RUN_ALL_TESTS)
def test_scrape_website():
...
I might be able to treat the test as a fixture and use @pytest.fixture(autouse=False), not sure how to override the autouse variable though
A similar solution was stated in How to skip a pytest using an external fixture? but this solutions seems more complicated than what I need.
A:
The docs describe exactly your problem: https://docs.pytest.org/en/latest/example/simple.html#control-skipping-of-tests-according-to-command-line-option. Copying from there:
Here is a conftest.py file adding a --runslow command line option to
control skipping of pytest.mark.slow marked tests:
# content of conftest.py
import pytest
def pytest_addoption(parser):
parser.addoption(
"--runslow", action="store_true", default=False, help="run slow tests"
)
def pytest_collection_modifyitems(config, items):
if config.getoption("--runslow"):
# --runslow given in cli: do not skip slow tests
return
skip_slow = pytest.mark.skip(reason="need --runslow option to run")
for item in items:
if "slow" in item.keywords:
item.add_marker(skip_slow)
We can now write a test module like this:
# content of test_module.py
import pytest
def test_func_fast():
pass
@pytest.mark.slow
def test_func_slow():
pass
A:
There's a couple ways to handle this, but I'll go over two common approaches I've seen in Python baselines.
1) Separate your tests by putting the "optional" tests in another directory.
Not sure what your project layout looks like, but you can do something like this (only the test directory is important, the rest is just a toy example layout):
README.md
setup.py
requirements.txt
test/
unit/
test_something.py
test_something_else.py
integration/
test_optional.py
application/
__init__.py
some_module.py
Then, when you invoke pytest, you invoke it by doing pytest test/unit if you want to run just the unit tests (i.e. only test_something*.py files), or pytest test/integration if you want to run just the integration tests (i.e. only test_optional.py), or pytest test if you want to run all the tests. So, by default, you can just run pytest test/unit.
I recommend wrapping these calls in some sort of script. I prefer make since it is powerful for this type of wrapping. Then you can say make test and it just runs your default (fast) test suite, or make test_all, and it'll run all the tests (which may or may not be slow).
Example Makefile you could wrap with:
.PHONY: all clean install test test_int test_all uninstall
all: install
clean:
rm -rf build
rm -rf dist
rm -rf *.egg-info
install:
python setup.py install
test: install
pytest -v -s test/unit
test_int: install
pytest -v -s test/integration
test_all: install
pytest -v -s test
uninstall:
pip uninstall app_name
2) Mark your tests judiciously with the @pytest.mark.skipif decorator, but use an environment variable as the trigger
I don't like this solution as much, it feels a bit haphazard to me (it's hard to tell which set of tests are being run on any give pytest run). However, what you can do is define an environment variable and then rope that environment variable into the module to detect if you want to run all your tests. Environment variables are shell dependent, but I'll pretend you have a bash environment since that's a popular shell.
You could do export TEST_LEVEL="unit" for just fast unit tests (so this would be your default), or export TEST_LEVEL="all" for all your tests. Then in your test files, you can do what you were originally trying to do like this:
import os
...
@pytest.mark.skipif(os.environ["TEST_LEVEL"] == "unit")
def test_scrape_website():
...
Note: Naming the test levels "unit" and "integration" is irrelevant. You can name them whatever you want. You can also have many many levels (like maybe nightly tests or performance tests).
Also, I think option 1 is the best way to go, since it not only clearly allows separation of testing, but it can also add semantics and clarity to what the tests mean and represent. But there is no "one size fits all" in software, you'll have to decide what approach you like based on your particular circumstances.
HTH!
A:
A very simply solution is to use the -k argument. You can use the -k parameter to deselect certain tests. -k tries to match its argument to any part of the tests name or markers You can invert the match by using not (you can also use the boolean operators and and or). Thus -k 'not slow' skips tests which have "slow" in the name, has a marker with "slow" in the name, or whose class/module name contains "slow".
For example, given this file:
import pytest
def test_true():
assert True
@pytest.mark.slow
def test_long():
assert False
def test_slow():
assert False
When you run:
pytest -k 'not slow'
It outputs something like: (note that both failing tests were skipped as they matched the filter)
============================= test session starts =============================
platform win32 -- Python 3.5.1, pytest-3.4.0, py-1.5.2, pluggy-0.6.0
rootdir: c:\Users\User\Documents\python, inifile:
collected 3 items
test_thing.py . [100%]
============================= 2 tests deselected ==============================
=================== 1 passed, 2 deselected in 0.02 seconds ====================
Because of the eager matching you might want to do something like putting all your unittests in a directory called unittest and then marking the slow ones as slow_unittest (so as to to accidentally match a test that just so happens to have slow in the name). You could then use -k 'unittest and not slow_unittest' to match all your quick unit tests.
More pytest example marker usage
| {
"pile_set_name": "StackExchange"
} |
Abbreviations used in this paper: bHLH, basic helix-loop-helix; dblKO, double knockout; GAPDH, glyceraldehyde-3-phosphate dehydrogenase; MRF, myogenic regulatory factor.
Introduction
============
The process of skeletal muscle differentiation is orchestrated by a family of four conserved basic helix-loop-helix (bHLH) transcription factors that are collectively known as myogenic regulatory factors (MRFs). Mice harboring single mutations of either *MyoD* or *Myf5* are viable and do not have overt muscle phenotypes, suggesting that MyoD and Myf5 have considerable overlap in their roles ([@bib6]; [@bib21]). However, either MyoD or Myf5 is required for proper myogenesis during embryogenesis because compound *MyoD*/*Myf5*-null mice lack essentially all skeletal muscle tissue at birth ([@bib22]; [@bib12]). In contrast, myogenin is important for the terminal differentiation and fusion of myoblasts into mature muscle fibers ([@bib19]; [@bib31]). MRF4 appears to have a role as a determination factor in a subset of myocytes in the early somite and as a differentiation factor in later muscle fibers ([@bib12]).
Postnatal growth and regeneration of skeletal muscle is mediated primarily by a pool of myogenic stem cells known as satellite cells, which reside adjacent to the fibers. In response to damage through injury or exercise, these satellite cells activate expression of MyoD and Myf5 and undergo numerous rounds of proliferation as myoblasts. A small number of myoblasts return to a quiescent state, thus replenishing the pool of satellite cells; the remainder continue their differentiation, fusing into existing or new myofibers and expressing myogenin and MRF4 while down-regulating Myf5. In contrast to wild-type myoblasts, *MyoD*-null myoblasts grow more quickly, show aberrant expression of muscle markers, and differentiate inefficiently ([@bib23]), a phenotype that is the cause of the regeneration deficit exhibited by compound dystrophic (*mdx*) *MyoD*-null animals ([@bib16]). Conversely, *Myf5*-null myoblasts proliferate poorly and differentiate precociously ([@bib17]). The sequence of MRF expression in activated satellite cells, in conjunction with the phenotypes of single-null myoblasts and animals, argue that MyoD and Myf5 do not have identical roles in myoblast proliferation and induction of differentiation.
MyoD and Myf5 target genes have largely been examined after the onset of differentiation and, hence, are involved in producing the enormous phenotypic shift from a proliferating myoblast to a contractile, multinucleated muscle fiber. Although it has been suggested that MyoD and Myf5 transactivation is checked in growing myoblasts (whether by degradation \[[@bib29]\], modification \[[@bib15]\], signaling \[[@bib30]; [@bib14]\], or interfering heterodimerization \[[@bib2]\]), the distinct phenotypic differences that are exhibited by growth phase *MyoD*- and *Myf5*-null myoblasts suggest that MyoD and Myf5 do have active roles in myoblasts. Indeed, [@bib35] identified *Id3* and *NP1* as target genes of MyoD under growth conditions.
Distinguishing the distinct functions of MyoD and Myf5 is complicated by their abilities to auto- and cross-activate expression from the endogenous loci ([@bib28]; [@bib5]; [@bib29]; [@bib35]). Such a circular network could account for the stabilization and irreversibility of the commitment of a cell to a myogenic fate ([@bib29]; [@bib33]). However, gene expression changes resulting from the introduction of exogenous MyoD or Myf5 could be an indirect effect that is mediated through the other MRF. Expression of MyoD in the absence of Myf5 (and vice versa) permits the comparative evaluation of each factor\'s functions in myogenic commitment.
To this end, we reintroduced MyoD or Myf5 into a *MyoD*−/*Myf5* double-null (double knockout \[dblKO\]) fibroblast cell line that was maintained in high serum growth conditions. These cell lines are normally nonmyogenic but can be converted to skeletal muscle upon the exogenous expression of MyoD or Myf5. Microarray analysis identified numerous differentially regulated genes, which were further validated by examining specific candidates using real-time PCR. A number of growth phase targets were identified, demonstrating that MyoD and Myf5 are transcriptionally active in proliferating cells. Surprisingly, we did not find unique targets, and both MRFs were able to induce the expression of these genes.
MyoD, however, was strikingly more effective at activating differentiation markers than Myf5. Additional support for functional differences between MyoD and Myf5 were obtained by using chimeric MRFs that interchanged their NH~2~-terminal, bHLH, and COOH-terminal domains. The bHLH domains (DNA binding and dimerization) are highly conserved between the two genes, whereas their NH~2~- and COOH-terminal regions are more divergent. Whereas Myf5 was inefficient at inducing differentiation gene expression, the activation of a cohort of these markers by the chimeric MRFs provided strong evidence for cooperative gene activation by the NH~2~-terminal and bHLH + COOH-terminal regions of MyoD. *MyoD*-null primary myoblasts have a greatly reduced expression of the same genes relative to wild-type myoblasts. Therefore, these data support the idea that Myf5 is biased toward myoblast proliferation, whereas MyoD promotes myoblast differentiation ([@bib23]; [@bib24]).
Results
=======
MyoD and Myf5 activate skeletal muscle genes in growth conditions
-----------------------------------------------------------------
To circumvent the potential problem of auto- and cross-activation by the primary myogenic factors ([@bib5]; [@bib29]; [@bib34]; [@bib11]), we infected clonal double-null *MyoD*−*/*−;*Myf5*−*/*− (dblKO) embryonic fibroblast lines with retrovirus expressing MyoD or Myf5 or with empty control retrovirus. With this approach, we were able to assess which genes were common targets of MyoD and Myf5 versus those that could be uniquely regulated by one or the other primary MRF. These genes could be directly activated by MyoD or Myf5 or could be indirectly activated through an intermediate transcription factor; we considered both classes to be downstream targets of the primary MRFs.
Shortly after infection of the dblKO target cells with retrovirus, positive-expressing cells were purified by FACS based on GFP fluorescence expressed from the bicistronic retroviral transcript ([Fig. 1, A and B](#fig1){ref-type="fig"}). Pools of \>10^6^ cells were then harvested for total RNA after a further 24 h of culture in high serum growth conditions. Fluorescently labeled probes generated from biological--triplicate RNA samples were hybridized to MG-U74Av2 GeneChips, each containing probesets directed at ∼6,000 genes and an additional ∼6,000 ESTs. Comparison of MyoD or Myf5 arrays with control arrays produced candidate lists that were considered to contain genes potentially regulated by MyoD or Myf5 during growth phase ([Table I](#tbl1){ref-type="table"} and Table S1, available at <http://www.jcb.org/cgi/content/full/jcb.200502101/DC1>).
![**Preparation of RNA for GeneChip analysis.** (A) Representative FACS plots of *MyoD*−*/*−*;Myf5*−*/*− fibroblasts infected with retrovirus expressing MyoD, Myf5, or no gene as well as GFP from an internal ribosomal entry site (IRES) within the same transcript. GFP expression amongst sorted cells after 24 h of culture was verified by fluorescence microscopy immediately before harvesting for total RNA. SSC, side scatter; FL1, fluorescence channel 1; G, gate; R, region. The circled regions denote the sorted populations. Bar, 100 μm. (B) Northern blot demonstrating equivalent levels of retroviral transcript expression amongst samples. (C) Western blots demonstrating robust MyoD or Myf5 expression in corresponding samples.](200502101f1){#fig1}
###### Candidate MyoD/Myf5 target genes
GeneChip (U74Av2) Real-time PCR
---------------------------------------------------------------------------------- ---------------------- ------------------- --------------- ------ ------- ------- --------
**Transcription factors**
*Myogenin* [X15784](X15784) 10.1 1.2 2.8 A 27.0 8.4
*Sine oculis--related homeobox 1* (*Six1*) [X80339](X80339) 3.8 3.5 2.2 P/A 2.6 2.2
*Inhibitor of DNA-binding 2* (*Idb2*) [AF077861](AF077861) 3.6 2.4 2.7 P − −
*Runt-related transcription factor 1* (*Runx1*) [D26532](D26532) 3.4 2.9 3.3 P/A 4.3 2.7
*Hairy and enhancer of split 6* (*Hes6*) [AW048812](AW048812) 2.7 0.9 1.1 A 1.3 1.0
*Lung carcinoma myc-related oncogene 1* (*L-myc*)[4](#tfn4){ref-type="table-fn"} [X13945](X13945) 2.3 1.5 0.8 A 4.7 2.6
**Adhesion and receptors**
*Cholinergic receptor*, *nicotinic*, *β-1* [M14537](M14537) 24.6 16.0 15.8 A 5.0 6.1
*Cholinergic receptor*, *nicotinic*, *γ* [X03818](X03818) 9.3 2.0 4.8 A 18.1 16.4
*Cholinergic receptor*, *nicotinic*, *α-1* [M17640](M17640) 8.4 2.6 2.5 A 3.2 1.9
*Cadherin 15* (*m-cadherin*)[4](#tfn4){ref-type="table-fn"} [AJ245402](AJ245402) 4.2 0.5 1.9 A 290.6 85.4
*Transmembrane 4 superfamily member 6* [AF053454](AF053454) 2.6 2.3 2.5 P/A − −
*Discoidin domain receptor family*, *1* [L57509](L57509) 2.3 1.6 2.6 A − −
**Secreted factors**
*Insulin-like growth factor--binding protein 5* [L12447](L12447) 142.6 9.8 7.0 A 123.1 89.0
*Mast cell protease 8* (*Mcpt8*) [X78545](X78545) 11.7 11.1 14.4 A 6.2 15.6
*Secreted phosphoprotein 1* (*Spp1*) [X13986](X13986) 8.3 5.7 4.6 P 11.5 18.5
**ESTs**
*RIKEN cDNA 1190002N15* [AW125453](AW125453) 5.0 1.7 2.9 P/A − −
*cDNA clone* [AW120874](AW120874) 3.2 1.3 1.9 P − −
*RIKEN cDNA 2610201A13* [AA222883](AA222883) 1.4 2.1 1.2 P − −
*cDNA clone* [AA796831](AA796831) 1.1 2.1 1.7 P − −
**Others**
*H19 fetal liver mRNA* [X58196](X58196) 35.6 6.1 13.7 P/M/A − −
*C1q/tumor necrosis factor-related protein 3* [5](#tfn5){ref-type="table-fn"} [AI315647](AI315647) 5.8 1.9 3.1 P − −
*K+ channel tetramerization domain 12* [5](#tfn5){ref-type="table-fn"} [AI842065](AI842065) 4.9 6.0 3.2 P/A 1.1 1.3
*Protein kinase inhibitor*, *α* (*Pkia*) [AW125442](AW125442) 4.6 1.6 2.1 A 1.8 1.0
*UDP-glucose ceramide glucosyltransferase* [AI853172](AI853172) 4.3 3.3 2.9 P − −
*Paternally expressed 3* (*Peg3*) [AF038939](AF038939) 3.6 1.0 1.9 P − −
*Enolase 3*, *β muscle* [X61600](X61600) 3.5 1.8 2.0 P − −
*H2B and H2A histones* [X05862](X05862) 3.3 0.6 1.7 A − −
*α-methylacyl-CoA racemase* [U89906](U89906) 3.0 2.0 1.7 P/A − −
*Ankyrin repeat domain 1* (*cardiac muscle*) [AF041847](AF041847) 3.0 3.0 3.1 P − −
*SH3 domain GRB2-like B1* (*endophilin*) [AI842874](AI842874) 2.2 1.4 2.0 P − −
*WNT1-inducible signaling pathway 1* [AF100777](AF100777) 2.2 2.3 2.6 P − −
*ADP ribosylation factor-like 6 interacting protein 5* [AW049647](AW049647) 2.1 1.5 1.6 P − −
*SKI-interacting protein* (*Skiip*) [AW046671](AW046671) 1.2 4.8 3.6 P/A 1.0 0.5
*Enabled homologue* (*Drosophila*) [D10727](D10727) 1.9 2.4 2.9 P/A − −
**Differentiation markers**
*Actin*, *α*, *cardiac* [M15501](M15501) 240.7 3.1 9.6 A 42.9 10.1
*Troponin C*, *cardiac*/*slow skeletal* [M29793](M29793) 172.8 9.3 16.8 A 1.8 1.0
*Actin*, *α-1*, *skeletal muscle* [M12347](M12347) 93.3 9.2 14.7 M/A 265.6 130.9
*Troponin T3*, *skeletal*, *fast* [L48989](L48989) 49.3 2.8 10.4 A − −
*Myosin light chain*, *phosphorylatable*, *fast skeletal* [AV290649](AV290649) 43.5 3.0 4.6 A 3850 1540.0
*Myosin*, *light polypeptide 4* [M19436](M19436) 28.5 2.1 6.8 A − −
*Troponin T2*, *cardiac* [L47600](L47600) 21.4 2.6 3.4 P/A − −
*Myosin*, *heavy polypeptide 3*, *skeletal* [M74753](M74753) 17.0 0.8 2.0 A − −
*Troponin T1*, *skeletal*, *slow* [AV213431](AV213431) 16.4 0.8 0.8 A − −
*ATPase*, *Ca^2+^ transporting*, *cardiac fast 1* [X67140](X67140) 11.0 1.1 1.9 A − −
*Troponin I*, *skeletal*, *slow 1* [AJ242874](AJ242874) 10.5 0.9 2.7 A − −
*Myosin*, *light polypeptide 1* [X12973](X12973) 9.3 0.7 1.6 A − −
*Retinoblastoma 1* [M26391](M26391) 5.5 1.6 1.5 A − −
*Ryanodine receptor 1*, *skeletal muscle* [D38216](D38216) 4.7 1.2 1.2 A − −
*Myosin-binding protein H* [U68267](U68267) 3.9 0.5 1.5 A − −
*Sarcoglycan*, *β* [AB024921](AB024921) 3.5 1.0 1.8 A − −
*Myocyte enhancer factor 2A* (*MEF2A*) [AW045443](AW045443) 3.1 1.2 1.4 P/A 0.8 0.9
*Growth arrest and DNA damage-inducible 45 α* [U00937](U00937) 2.5 0.9 1.1 P/A − −
*Cyclin-dependent kinase inhibitor 1A* (*P21*) [AW048937](AW048937) 2.2 1.1 1.0 P 1.4 1.4
Mean fold change for pairwise comparisons of MyoD/Myf5/myogenin versus GFP from log(fold) change in MAS 5.0 software (Affymetrix, Inc.).
Present/marginal/absent call from MAS 5.0.
Fold change based on ΔCt between MyoD/Myf5 versus puromycin alone real-time PCR, normalized to *GAPDH* expression.
Added after manual inspection of dataset.
*C1q* and *K+ channel* identified in current annotations; previously listed as ESTs.
MyoD expression in a *MyoD*/*Myf5* double-null background produced increases in 47 genes (including *L-myc* and *cadherin-15*), whereas only 17 genes were increased by Myf5. Of these genes, 11 were common targets of both MyoD and Myf5; eight were activated to similar degrees by both (*Chrnβ1*, *Mcpt8*, *Spp1*, *Six1*, *Runx1*, *Idb2*, *Ugcg*, and *Kctd12*), whereas the others were more strongly activated by MyoD (*IGFBP5*, *H19*, and *α-actin*). In contrast, only six genes were down-regulated by either MyoD or Myf5 (none by both), and only four had fold changes of \<−2 (*Tcf20*, −4.9; *Dlk1*, −2.9; *Tgfbr3*, −2.7; and *S100a13*, −2.0). Relaxing the stringency of the selection criteria had only a moderate effect, producing 70 increases by MyoD and 32 increases by Myf5 versus 5 and 14 decreases, respectively (Tables S1--S4, available at <http://www.jcb.org/cgi/content/full/jcb.200502101/DC1>).
One goal of our study was to identify targets that are uniquely regulated by Myf5 but not by MyoD (and vice versa). However, very few genes were suggested by the microarray data to be increased by Myf5 and not by MyoD, and real-time PCR directed at several of those transcripts, in turn, did not support them as targets (*Skiip*, [Table I](#tbl1){ref-type="table"}; *Refbp1* and *Snk*, unpublished data). In contrast, 36 genes were up-regulated by MyoD but not by Myf5. The majority of these targets (e.g., *myogenin*, *myosin heavy chain*, and *troponin-T*), however, are associated with skeletal muscle differentiation.
At least six of the identified targets are transcription factors ([Table I](#tbl1){ref-type="table"}) and may themselves regulate the expression of other genes. Foremost amongst them is myogenin, which is an MRF that is activated by MyoD immediately upon the switch to differentiation conditions ([@bib11]; [@bib4]). Therefore, we examined (by GeneChip analysis) the possibility that our candidates were activated indirectly by myogenin using myogenin retrovirus--infected dblKO cells that were prepared as for MyoD and Myf5. 50% (13/26) of myogenin targets were also downstream from MyoD and Myf5. However, for most nondifferentiation class genes, our microarrays indicated that target activation was similar between MyoD, Myf5, and myogenin treatments, which contrasts with the considerable induction of myogenin by MyoD (10-fold) compared with Myf5 (1.2-fold; [Table I](#tbl1){ref-type="table"}). This suggests that these genes are common targets of MRFs rather than being strictly dependent on myogenin.
To identify potential growth phase targets of MyoD, probable differentiation markers were removed using previous work by [@bib4]. They used an inducible MyoD--ER fusion system to examine gene expression by microarray analysis during early differentiation in low serum conditions ([@bib4]). They identified nine subsets in their data by using a clustering algorithm to find coordinate patterns of temporal regulation, including those with transient increases, early or delayed increases, and decreases in expression. Of the 571 genes identified by [@bib4], we mapped 298 to probesets on the MU74Av2 GeneChip on the basis of GenBank, Unigene, or LocusLink IDs. Of these 298, 22 genes were also found to be up-regulated by MyoD in our experiment, and an additional seven were also up-regulated by Myf5. This provided added support to our data. A portion of these genes fell within Bergstrom clusters 5 and 6 and primarily represented differentiation-specific targets such as structural genes (e.g., *myosin* and *troponin*). However, others within clusters 1--4 (early induction) and 7--9 (decreased expression through differentiation) were also seen to have increased expression in our GeneChip data and were considered as possible growth targets.
All of the genes identified in [Table I](#tbl1){ref-type="table"} are robustly expressed by proliferating wild-type primary myoblasts ([Fig. 2](#fig2){ref-type="fig"}). Most (47/53 = 89%) of these genes are decreased in *MyoD*−*/*− myoblasts, whereas the remainder (6/53) exhibit a mixture of increase/no change/decrease calls and moderate fold increases. Differentiation markers are vastly decreased (up to 140-fold for *myosin heavy chain-3* or *troponin T1*), whereas most putative growth-phase genes showed only moderate changes (e.g., approximately eightfold for *m-cadherin* or *L-myc* and ∼2.7--1.8-fold for *Six1* or *Runx1*).
![**Decreased expression of differentiation markers by** *MyoD* **−*/*− primary myoblasts**. Expression levels in *MyoD*-null primary myoblasts of the genes in [Table I](#tbl1){ref-type="table"} show that the majority of differentiation markers are greatly reduced relative to wild-type myoblasts (e.g., *Myh3* to *myogenin*). In contrast, genes that are regulated in growth phase by MyoD and Myf5 are reduced to a lesser degree, if at all (e.g., *Mcpt8*, *Six1*, and *Runx1*). Calls are shown for wild-type (*n* = 3) or *MyoD*−/− (*n* = 3) myoblasts. P, present; M, marginal; A, absent. Change calls are shown for nine pairwise comparisons between wild-type and *MyoD*−/− myoblasts. I, increase; MI, marginal increase; NC, no change; MD, marginal decrease; D, decrease.](200502101f2){#fig2}
Thus, in high serum conditions, MyoD and Myf5 are capable of regulating the transcription of numerous genes. The growth phase regulation of a selection of those candidates was then specifically examined.
Growth phase candidate validation by SYBR Green real-time PCR
-------------------------------------------------------------
The expression of these candidate genes was re-examined using a second set of independently derived RNA samples. This second set was produced by the infection of a distinct dblKO cell line with drug-selectable retrovirus, yielding proliferating puromycin-resistant pools of cells that were expanded for 2 wk under drug selection. SYBR Green real-time PCR was used to quantitate target gene transcript levels using PCR primers that were chosen to span at least one intron wherever possible. The specificity of the PCR was verified by denaturing curve analysis and direct sequencing of the products.
The majority of the genes that were selected as possible growth phase target genes in the GeneChip data were also found by real-time PCR to be up-regulated ([Table I](#tbl1){ref-type="table"}). The estimates of the fold up-regulation of *Six1*, *Runx1*, *L-myc*, *IGFBP5*, and *Mcpt8* were similar by either technique. *Spp1* was increased more, and *Chrnβ1* was increased slightly less as estimated by real-time PCR; nonetheless, each was significantly increased by MyoD and Myf5. The increases in *m-cadherin* and *myogenin* levels by real-time PCR were much greater than by microarray, probably as a result of the lower background of the PCR assay. Again, however, the consistency of the changes in target expression that were produced by MyoD and Myf5 contrast with the variable induction of *myogenin* by MyoD and Myf5, arguing that this is not a strictly indirect effect.
Approximately one third of the candidates that were selected for real-time PCR validation did not exhibit significant changes in the stable pool samples ([Table I](#tbl1){ref-type="table"}). These genes tended to be those that had modest fold changes in the GeneChip data (e.g., *Hes6*, *Pkia*, *Skiip*, and *p21*). Probesets for differentiation markers that exhibited larger changes by microarray (such as *cardiac troponin C* and *MEF2A*) were likely seen as a result of spontaneous differentiation in the original GeneChip samples and were minimized in these proliferating cultures. These observations support the conclusion that the stable pools lacked the spontaneously differentiating cells that were observed in our original samples.
[@bib35] used the same inducible MyoD system as [@bib4] to generate inputs for a representational difference analysis protocol. They identified *Id3* and *NP1* as growth phase targets of MyoD ([@bib35]). Their cells were maintained in a high serum growth medium during MyoD induction, suggesting that *Id3* and *NP1* are not differentiation targets that are expressed simply as a consequence of serum deprivation. Rather, they are induced in the presence of cyclohexamide, indicating that they are likely to be direct targets of MyoD that do not require intervening protein synthesis for activation.
In contrast, our GeneChip experiments did not reveal an induction of *Id3* or *NP1* in dblKO cells by either MyoD or Myf5. To assess whether this was a consequence of low sensitivity to those genes, we used SYBR Green real-time PCR to specifically examine the expression of *Id3* and *NP1* in both the GeneChip RNA samples and in RNA from drug-selected pools; however, no significant changes were detected (unpublished data). It is likely that these inconsistencies are attributable to the numerous differences in our experimental systems, including the method of MyoD expression, the type of host cell used, and possibly the presence/absence of endogenous *MyoD* and *Myf5* genes.
From this combination of GeneChip and real-time PCR analyses, we defined a validated set of growth phase targets. Notably, MyoD and Myf5 were both capable of regulating each of these genes, and none were strictly associated with one MRF. These targets were then applied to examine the differences in function between corresponding regions of MyoD and Myf5.
Association of growth phase gene activation with MyoD and Myf5 domains
----------------------------------------------------------------------
Within their bHLH regions, Myf5 and MyoD exhibit 88% identity and \>95% homology at the amino acid level. In contrast, the regions that are NH~2~ and COOH terminal to this highly conserved DNA-binding region exhibit considerably more differences in sequence and function ([@bib10]). Therefore, we hypothesized that functional differences between MyoD and Myf5 would be a consequence of their divergent NH~2~- and COOH-terminal domains rather than a result of the bHLH recognition of discrete DNA sequences. To test this, chimeric MRFs were built, interchanging the MyoD and Myf5 NH~2~- and COOH-terminal regions around their bHLH domains. This yielded six chimeric MRF genes (termed d5d, d55, 55d, 5d5, 5dd, and dd5, where d denotes the portion derived from MyoD and 5 denotes the portion derived from Myf5) in addition to the full-length wild-type MyoD and Myf5 ([Fig. 3](#fig3){ref-type="fig"} A).
![**Gene expression induced by chimeras in growing dblKO cells.** (A) Schematic of MyoD/Myf5 chimeras. Chimeric MRFs were constructed by interchanging the corresponding NH~2~-terminal, bHLH-, and COOH-terminal regions of MyoD and Myf5. (B) Levels of MRF and tubulin protein expression in each pool. The combination of three different epitopes that were recognized by MyoD and Myf5 antibodies was used to normalize the expression results in C for relative MRF expression. Puro, puromycin-resistant empty vector negative control. (C) Induction of transcripts for potential growth phase targets by each of MyoD, Myf5, and the chimeric MRFs (normalized to MRF protein and *GAPDH* transcript levels). Numbers on y axis indicates fold changes.](200502101f3){#fig3}
Retrovirus expressing one of the chimeric MRFs were introduced into dblKO fibroblasts, yielding drug-selected pools of \>10^5^ clones from which RNA and protein were extracted for analysis. The growth phase targets identified previously were then assayed within these samples by SYBR Green real-time PCR.
Both *glyceraldehyde-3-phosphate dehydrogenase* (*GAPDH*) transcript (input RNA quantity; reverse transcription) and MRF protein levels (MRF expression) were used to enable equitable comparisons by providing normalization between samples. *GAPDH* transcripts were quantified by real-time PCR. Relative protein expression levels of full-length and chimeric MRFs were derived by direct digital densitometry of Western blots probed with three primary antibodies that each recognized unique but overlapping sets of four MRFs ([Fig. 3](#fig3){ref-type="fig"} B). All of the chimeras were demonstrated to be capable of regulating the genes identified in the previous analysis, producing substantial increases in expression compared with the puromycin-alone negative control pool.
After normalization, 5dd tended to be the poorest relative activator, whereas 55d was (in most cases) the best ([Fig. 3](#fig3){ref-type="fig"} C). However, in contrast to the other samples, these two chimeras were subject to significant normalization corrections ([Fig. 3](#fig3){ref-type="fig"} B), which may have tended to overstate their effects. Nonetheless, no single region of MyoD or Myf5 strictly correlated with enhanced or decreased relative activation. In certain cases (e.g., *Chrnβ1*, *m-cadherin*, and *Spp1*), there is a tantalizing suggestion that the Myf5 bHLH domain could have greater activity than that of MyoD, although this pattern is not borne out amongst the others. Chimeras dd5 and d55 have a greater effect than MyoD or d5d. This might suggest that an interaction between the flanking portions of MyoD acts to suppress transactivating activity, which is an effect that is disrupted when a portion of Myf5 is substituted. A similar effect was observed in deletion studies of MyoD ([@bib34]). Thus, for growth-phase genes, the corresponding domains of MyoD and Myf5 are otherwise interchangeable, and differences emerge only with respect to the degree of target induction.
The MyoD NH~2~- and COOH-terminal domains cooperate to induce differentiation
-----------------------------------------------------------------------------
A significant number of potential MyoD target genes that were identified by GeneChip analysis were differentiation markers. Wild-type MyoD and Myf5 and chimeras were expressed in dblKO cells using retrovirus and were maintained for 3 d in growth conditions before harvest. The proportion of infected cells was very similar between pools (see [Fig. 5](#fig5){ref-type="fig"} A). Differentiation marker expression was examined by real-time RT-PCR ([Fig. 4](#fig4){ref-type="fig"} A). This set of vectors included a COOH-terminal FLAG epitope tag that allowed for the normalization of gene expression against MRF protein levels ([Fig. 4](#fig4){ref-type="fig"} B). Two growth phase markers (*Chrnβ1* and *Runx1*, identified in the aforementioned GeneChip experiment) showed little relative difference between MyoD, Myf5, and the chimeras. In concordance with the GeneChip results, however, the expression of MyoD produced a considerable activation of genes such as the *cholinergic receptor* α and γ subunits, *myogenin*, *α-actin*, *myosin*, and *troponin* ([Fig. 4](#fig4){ref-type="fig"}; [Table II](#tbl2){ref-type="table"} shows unnormalized changes vs. empty vector controls). In comparison, the level of Myf5 induction of these genes was moderate relative to the empty vector control.
![**MyoD NH** ~2~ **and COOH termini cooperate to activate differentiation marker expression.** Amongst a variety of differentiation genes, the d5d chimera had near wild-type activity, whereas the separated NH~2~ terminus and COOH terminus of MyoD had much less. In contrast, growth-phase genes *Chrnβ1* and *Runx1* were induced similarly by MyoD, Myf5, and the chimeras. (A) Gene expression measured by real-time PCR and normalized to MRF protein expression (B) and *GAPDH* transcript levels. Plotted as relative activity between MRFs. (B) Relative expression levels of FLAG-tagged chimeric MRFs in growth phase (normalized to tubulin). Numbers on y axis indicate fold changes.](200502101f4){#fig4}
######
**Fold activation of myogenic genes by real-time PCR** [1](#tfn6){ref-type="table-fn"}
Gene MyoD d5d 5dd 55d dd5 d55 5d5 Myf5 GFP
------------ -------- -------- ------- ------- ------- ------- ------ ------ -----
Actc1 89.2 68.5 6.5 7.8 8.9 7.6 2.8 2.5 1.0
*Myogenin* 145.0 114.8 17.4 14.5 26.2 18.4 3.7 7.4 1.0
*Mylpf* 2645.3 2727.9 249.2 356.0 211.1 234.3 62.4 81.8 1.0
*Chrng* 48.5 45.3 16.9 24.4 8.0 8.0 2.3 5.2 1.0
*Acta1* 35.4 21.8 7.7 16.1 5.7 10.8 6.9 5.6 1.0
*ChrnA1* 8.7 10.0 3.1 3.6 1.8 2.9 1.7 1.9 1.0
I*GFBP5* 127.4 104.0 104.0 91.4 74.2 35.9 22.8 23.0 1.0
*Tncc* 5.1 5.1 1.6 1.8 1.4 1.3 1.6 1.3 1.0
*Chrnb1* 11.7 14.9 10.2 11.2 6.7 8.8 7.1 7.7 1.0
*Runx1* 2.4 3.4 2.6 2.3 2.8 2.0 1.9 1.8 1.0
Relative to GFP and normalized to *GAPDH* but not to FLAG protein.
Substitution of the MyoD COOH terminus into Myf5 (55d) was not sufficient in growth phase to cause differentiation and could produce only modest increases in the expression of numerous differentiation markers. Replacement with the MyoD NH~2~ terminus alone (d55) also resulted in just moderate gene induction relative to full-length Myf5. Importantly, the concurrent presence of MyoD NH~2~- and COOH-terminal regions (d5d) resulted in activity approaching that of full-length MyoD.
The same pools of dblKO cells expressing one of the wild-type or chimeric MRFs were challenged to differentiate under reduced serum conditions. When the MyoD COOH terminus was present (MyoD; d5d, 5dd, and 55d), there was enhanced differentiation compared with the corresponding Myf5 region (Myf5; dd5, d55, and 5d5; [Fig. 5](#fig5){ref-type="fig"} B). Deletion of the putative cdk4-interacting domain ([@bib36]) from the COOH-terminal region of full-length MyoD or insertion of this region into the corresponding location of Myf5 does not significantly affect these results based on protein (myosin heavy chain immunostaining) or RNA (real-time PCR) markers (Punch, V., personal communication). The MyoD NH~2~ terminus also had a noticeable effect on differentiation ([Fig. 5](#fig5){ref-type="fig"} B, compare MyoD with 5dd, d5d with 55d, dd5 with 5d5, and d55 with Myf5). The MyoD bHLH domain, which has previously been connected to cell cycle arrest ([@bib7]; [@bib27]), enhanced differentiation when combined with the MyoD COOH-terminal region ([Fig. 5](#fig5){ref-type="fig"} B, compare MyoD with d5d and 5dd with 55d) but had little effect otherwise. Overall, the combined NH~2~- and COOH-terminal portions of MyoD (MyoD and d5d) were most effective in producing robust differentiation, whereas the two MRFs lacking both (Myf5 and 5d5) were the poorest. Thus, in both growth and differentiation conditions, the MyoD NH~2~- and COOH-terminal regions cooperate to strongly activate the myogenic differentiation program.
![**MyoD NH** ~2~ **and COOH termini cooperatively promote differentiation.** The expression of MyoD/Myf5 chimeric MRFs that included the MyoD NH~2~- or COOH-terminal regions in *MyoD*−*/*−*;Myf5*−*/*− fibroblasts produced more efficient differentiation in low serum conditions than those with the corresponding Myf5 region. (A) Percentage of infected cells in each pool based on GFP expression immediately before differentiation. (B) Percentage of total nuclei (*n* \> 1,000) found within a differentiated myosin heavy chain+ cell, normalized to A. (C) Myosin heavy chain immunostaining of differentiated pools (MF20, red; DAPI, blue). Bar, 100 μm.](200502101f5){#fig5}
Discussion
==========
Previous work has suggested that there are unique roles for MyoD and Myf5 in adult myogenesis ([@bib16]; [@bib23]; [@bib17]). To investigate the possibility that these phenotypes are a result of the activation of unique target genes by each of these transcription factors, we conducted genome-wide surveys of gene expression changes in response to MRF expression. The embryonic fibroblast cells that were used are normally nonmyogenic but can be converted to myoblasts by ectopic MRF expression. Importantly, they were derived in a *MyoD*−*/*−;*Myf5*−*/*− background, precluding cross-activation between MyoD and Myf5.
Our microarray data indicates that MyoD expression induces more myogenic genes than Myf5, often to a greater degree. Comparison of our data with a previous study ([@bib4]), however, demonstrated that the majority of these MyoD-regulated targets are markers of differentiated skeletal muscle. Thus, a unique function of MyoD (vs. Myf5) is a strong ability to induce differentiation. *MyoD*-null primary myoblasts have vastly reduced levels of differentiation marker gene expression ([Fig. 2](#fig2){ref-type="fig"}), which is consistent with the phenotypic data on single-null primary myoblast cultures; in the absence of MyoD, the myoblasts proliferate well and differentiate poorly ([@bib23]), whereas in the absence of Myf5, the opposite is true ([@bib17]). The moderate reduction of levels of growth-phase genes in *MyoD*-null myoblasts likely indicates a preference for activation by MyoD that Myf5 compensates for only partially.
A previous study by [@bib25] used representation difference analysis to identify potential satellite cell markers and MyoD target genes using primary myoblasts from *MyoD*−*/*− mice as a model for early satellite cell activation. The decreased expression of many genes (including *Chrnγ*, *Chrnα1*, *myogenin*, *troponin T1*, *H19*, and *Peg3*) was seen ([@bib25]); these genes were up-regulated by MyoD expression in our experiments, supporting the contention that MyoD regulates these genes and promotes differentiation. However, [@bib25] also showed that levels of numerous genes (e.g., *k-cadherin*, *integrin-α7*, *Plgf*, *VCAM1*, *Igsf4a*, *Tcrαv13*, *laminin α5*, *neuritin-1*, and *Klra18*) are increased in *MyoD*−*/*− myoblasts, which express considerable Myf5. None of these genes was identified in the current study as a Myf5 target. Thus, although MyoD and Myf5 have critical roles in the myogenic program, other transcription factors (e.g., Pax3 or Pax7) are likely needed to produce the full spectrum of normal myoblast gene expression.
We initially focused on the genes that were activated in the proliferating population by pruning our microarray results of differentiation genes. To assist in this, we leveraged the work of [@bib4], who used an inducible MyoD in differentiating dblKO cells. Their identified target genes were those induced by serum deprivation, growth arrest, and MyoD activity in the context of those conditions. However, their data also included genes that are induced immediately before growth arrest but remain up-regulated either as a result of a failure of their RNA levels to decay to baseline during the early times of the experiment or because expression continues in differentiation. Thus, we identified a set of genes that were growth phase targets of MyoD and Myf5. Furthermore, real-time PCR validation confirmed that they were not unique targets but, rather, that they all could be induced by either of these MRFs.
These similarities in function are perhaps not surprising. Both *MyoD*- and *Myf5*-null mice possess grossly normal skeletal muscle, indicating that there is redundancy and compensation for the loss of either factor during development. Indeed, only with the concurrent loss of MRF4 activity does the defect in skeletal myogenesis become fully penetrant ([@bib12]). Therefore, rather than MyoD and Myf5 each having a unique set of target genes that they are responsible for activating, it is reasonable that these two factors are capable of regulating the same downstream targets. Differences in MyoD and Myf5 function in proliferating cells may instead vary in the strength of their effect on similar sets of genes. Whether MyoD and Myf5 function similarly during differentiation is a distinct question.
Previous work by [@bib35] suggested that *Id3* and *NP1* were both activated by MyoD in myoblast growth phase. Although our data does not show this, the differences between our methods and theirs are considerable and are more than adequate to explain the discrepancy. The cell types in which the experiments were conducted are a primary example: [@bib35] used 10t1/2 fibroblasts (genetically wild type), whereas our fibroblasts were derived from *MyoD*/*Myf5* compound-mutant animals (it is also likely that our cells have disrupted MRF4 function; [@bib12]). It is quite conceivable that the presence of other myogenic factors could be capable of modulating MyoD activity.
An important conclusion to be drawn from these data is that both MyoD and Myf5 are active transcription factors in proliferating myoblasts (previously shown for MyoD by [@bib35]). Rather than passively awaiting a differentiation signal, these two factors induce the expression of myoblast growth-phase genes. MyoD and Myf5, therefore, act not only to commit the cell to a myoblast identity but also to prepare the myoblast for skeletal muscle differentiation.
The expression of MyoD or Myf5 led to the down-regulation of only a very small number of genes. This could indicate that they act primarily as transcriptional activators in high serum conditions. However, our experimental system involved converting a fibroblast cell type to the myogenic lineage and, thus, was incapable of detecting MRF-mediated suppression of any genes that were not initially expressed in the control cells.
Myogenin is not usually found in proliferating myoblasts and is induced at the onset of differentiation ([@bib11]; [@bib32]; [@bib4]). The nondifferentiation targets that were assayed (e.g., *Six1*, *Runx1*, *Mcpt8*, and *Spp1*) were induced to similar levels by either MyoD or Myf5, whereas *myogenin* was induced strongly by MyoD (10-fold) but only weakly by Myf5 (1.2-fold). Thus, although myogenin can activate similar targets to MyoD ([@bib35]) and Myf5 ([Table I](#tbl1){ref-type="table"}), indirect regulation through myogenin is not dominant. The overexpression of myogenin alone was much less effective than MyoD at inducing differentiation marker transcripts, also demonstrating that MyoD has distinct functions that are not simply consequences of myogenin induction.
The high level of structural conservation between MyoD and Myf5, particularly in the bHLH domain, provides a strong rationale for our observation that there are few, if any, unique growth phase target genes of MyoD or Myf5 (this might be extended to myogenin---the conserved bHLH domain may allow the induction of growth targets, although myogenin would not usually be found in growing cells). It has been shown previously that just three differing amino acids between the MyoD and E12 bHLH regions encode specificity for the myogenic program ([@bib8]). However, our results suggest that the three nonconservative and five conservative amino acid substitutions between MyoD and Myf5 bHLH domains are not likely to be involved in overt target gene selection, although they could potentially provide sufficient variation for more subtle types of regulation.
Chimeric MRFs, in which the NH~2~-, bHLH-, and COOH-terminal domains of MyoD and Myf5 were interchanged, were used to explore which portions of MyoD might provide for enhanced myogenic differentiation. Strikingly, only the d5d chimera approached MyoD levels of differentiation gene expression, whereas the other chimeras, Myf5, and myogenin were many times less effective. The MyoD NH~2~- and COOH-terminal regions had much less activity when separated, thus indicating a functional interaction between them.
In contrast to growth conditions ([Fig. 4](#fig4){ref-type="fig"}), differentiation conditions allowed the MyoD NH~2~- and COOH-terminal regions to function independently ([Fig. 5, B and C](#fig5){ref-type="fig"}), with the concurrent presence of both producing the greatest differentiation. Therefore, each region is effective when growth signals are naturally reduced under low serum conditions. However, cooperation between these two MyoD regions was required to overcome the strong growth signals that were provided by high serum medium. Full-length MyoD, unlike Myf5, could, therefore, bias a cell toward differentiation by sensitizing it to a moderate reduction in growth signals.
Interestingly, the MyoD bHLH domain enhanced differentiation at the molecular and phenotypic levels ([Figs. 4](#fig4){ref-type="fig"} and [5](#fig5){ref-type="fig"}), but only when combined with the MyoD COOH terminus. Despite its exceptional similarity with the Myf5 bHLH, the MyoD bHLH domain functionally differs in its interaction with the MyoD COOH terminus. However, this MyoD bHLH effect modulates gene expression levels rather than target gene selection ([Fig. 4](#fig4){ref-type="fig"}).
The NH~2~-terminal activity is likely to be the MyoD transcriptional activation domain, which was previously mapped between amino acids 3--56 ([@bib34]). It is interesting to speculate that the COOH-terminal function is provided by the chromatin remodeling amphipathic α-helix (helix III) domain that was previously described by [@bib3]. Whereas MyoD can induce muscle marker expression at repressed loci, their studies demonstrated that a similar motif in myogenin was ineffective at this task. This α-helix motif is conserved in Myf5 ([@bib10]), but Myf5 is similar to myogenin in being less effective than MyoD at initiating muscle gene expression. Thus, MyoD might be more efficient than Myf5 for inducing differentiation because of a greater ability to remodel chromatin at lineage-restricted loci. A similar domain appears in MRF4 ([@bib20]; [@bib3]) and could mediate the residual skeletal myogenesis that is found in the absence of MyoD and Myf5 ([@bib12]). Therefore, MyoD may use its COOH-terminal chromatin-remodeling domain to provide access to silenced muscle genes for the NH~2~-terminal activation domain. In support of this, the substitution of either portion alone into Myf5 produced only moderate increases in gene expression, whereas together they strongly activated a variety of differentiation markers ([Fig. 4](#fig4){ref-type="fig"}).
If MyoD is inclined to promote differentiation, whereas Myf5 activates growth (but not differentiation) targets, then it is consistent with their cell cycle regulation in growing myoblasts. MyoD levels peak at the differentiation checkpoint in G~1~ of the cell cycle, whereas Myf5 levels are high in S/G~2~ and G~0~ in association with proliferation and a failure to differentiate ([@bib13]). This complementary pattern of expression allows for the maintenance of expression of growth-phase genes and myogenic identity while ensuring that high levels of MyoD occur only at a cell cycle point that is appropriate for differentiation.
That MyoD and Myf5 activate the same downstream target genes, but to differing degrees, does much to explain the phenotypes observed in single knockout mice and cells. Our data reinforce the partitioning of myogenic factors into primary and secondary MRFs and, furthermore, add support to the concept of a role for Myf5 in myoblast proliferation versus MyoD instigating myogenic differentiation. MyoD\'s ability to activate differentiation marker expression despite the presence of high levels of serum is a distinguishing biochemical function that is not found in Myf5 and involves the cooperation of separate domains of MyoD. These regions may allow MyoD to interact with coactivators for which Myf5 has much less affinity. In the future, studies to further understand the distinct roles played by MyoD and Myf5 in growing and differentiating myoblasts, as well as the structural constraints and intermolecular interactions upon which those roles are built, will be essential to our understanding of the mechanism by which damaged skeletal muscle is efficiently regenerated.
Materials and methods
=====================
Cell culture
------------
*MyoD*-null/*Myf5*-null dblKO mouse embryo fibroblasts were isolated, and clonal lines were selected and expanded (designated 2C5/7 and 4C5/2). Fibroblasts were cultured in subconfluent conditions in growth medium of DME supplemented with 10% FCS and 1% penicillin/streptomycin. Proliferating primary myoblasts from wild-type and *MyoD*−*/*− mice were isolated and cultured as described previously ([@bib16]; [@bib23]).
*Myf5*, *MyoD*, chimeric MRFs, or myogenin were introduced into dblKO cells using retrovirus based on the three-plasmid HIT system (provided by V. Sartorelli, National Institutes of Health, Bethesda, MD; [@bib26]), including expression plasmids based on the pHAN backbone (with puromycin resistance driven from a distinct SV40 promoter) or a modified pHAN backbone in which the puromycin cassette was replaced by an internal ribosomal entry site and humanized Renilla GFP (IRES-hrGFP) sequence (Stratagene). MRFs that were expressed using the latter retroviral plasmid were COOH-terminally tagged with a 3× FLAG epitope. Empty control virus expressed only puromycin resistance or hrGRP. Retrovirus was produced by calcium phosphate transient cotransfection of *gag-pol* (pHIT60), *env* (pHIT456), and expression (pHAN) plasmids into 293T cells; virus-containing medium was harvested 48 h from the beginning of the transfection and was filtered through a 0.45-μm syringe filter (Millipore). Cells were infected overnight with diluted, filtered viral supernatant plus 8 μg/ml polybrene (hexadimethrine bromide; Sigma-Aldrich). Drug selection, where appropriate, was conducted with 1 μg/ml puromycin (Sigma-Aldrich) in growth medium for at least 1 wk; uninfected controls were obliterated after 4--5 d of selection. Differentiation was induced by replacing growth medium with DME + 2% horse serum (GIBCO BRL) and 1% penicillin/streptomycin.
FACS
----
3 d after infection with hrGFP-expressing retrovirus, pools of cells were trypsinized, centrifuged, resuspended in PBS + 5% FCS, filtered through a MACS filter (Miltenyi Biotec) to remove aggregates, and placed on ice. Cell sorting was performed using a MoFlo sorter (DakoCytomation), with gating on hrGFP+ populations set by a comparison with an uninfected negative control pool. A small portion of the sorted cells was reanalyzed to assess purity, and the remainder was replated in growth medium for an additional 24 h before harvesting for total RNA.
RNA and protein isolation
-------------------------
Total RNA was purified using the RNeasy Mini Kit (QIAGEN) according to the manufacturer\'s instructions and quantitated by OD~260~ or by RiboGreen (Invitrogen). RNA samples used for microarray analysis were ethanol precipitated in order to reach a minimum concentration of 2 μg/ml. Protein extracts were made by lysis of pelleted cells in radioimmunoprecipitation assay (RIPA) lysis buffer supplemented with MiniComplete protease inhibitors (Roche).
Microarray analysis
-------------------
Triplicate RNA samples for microarray analysis were submitted to the Ottawa Genome Centre for hybridization to MG-U74Av2 GeneChips (Affymetrix, Inc.). Manufacturer\'s quality controls were verified by the Centre. Raw data files were processed with MicroArray Suite (MAS 5.0; Affymetrix, Inc.) using the statistical algorithm (Affymetrix, Inc.) to derive signals and present/marginal/absent calls for each sample; all possible pairwise comparisons were also performed between experimental and control replicates, producing log(fold) ratio estimates of change and increase/no change/decrease calls. Processed results were then exported from MAS 5.0 and imported into Excel and Access (Microsoft) for further manipulation. Probesets showing consistent statistically significant changes between MRF and control samples were screened for detectable signal values (present/absent calls) and absolute log(fold) changes of at least one. Probeset annotations were obtained from <http://www.affymetrix.com/analysis/index.affx>. Microarray data is available from StemBase (<http://www.scgp.ca:8080/StemBase/>; Ontario Genomics Innovation Centre; [@bib18]) under experiments E223 (samples S361-4) and E59 (S78-9) and from the National Center for Biotechnology Information\'s Gene Expression Omnibus (<http://www.ncbi.nlm.nih.gov/geo/>; [@bib9]; [@bib1]) under series accession no. GSE3245 (GSM73053...64) and GSE3244 (GSM73026, -29, -32, -35, -38, and -41).
Real-time PCR
-------------
RNA samples were reverse transcribed using random hexamer primers that were included in the RNA PCR Core Kit (PerkinElmer) according to the manufacturer\'s instructions. Reverse transcription reactions were diluted (1:10 in [Fig. 3](#fig3){ref-type="fig"} C and 2:5 in [Fig. 4](#fig4){ref-type="fig"} A) with 10 mM Tris, pH 8.0, yielding master samples of reverse-transcribed products from which related PCR reactions were drawn. Real-time PCR reactions included the following: 2 μl of diluted reverse transcription product, 10 μl of 2× iQ SYBR Green SuperMix (Bio-Rad Laboratories), 30 nM ROX passive reference dye (Stratagene), and 50 nM of each forward and reverse PCR primer. Real-time data was gathered using a system (MX4000; Stratagene) over 40 cycles (30 s at 94°C, 60 s at 58°C, and 30 s at 72°C) followed by a denaturation curve from 54 to 94°C in 30-s increments of 0.5°C to ensure amplification specificity. C~t~ values were calculated with the MX4000 software by using moving window averaging and an adaptive baseline. Fold changes, other calculations, and chart plotting were performed in Excel. A PCR efficiency of 85% was assumed. Primer sequences can be found in Table S2.
Chimeric MRF construction
-------------------------
Chimeric *MyoD*/*Myf5* MRFs were created by using an overlapping PCR approach to seamlessly fuse the NH~2~- and COOH-terminal regions to the central bHLH domain ([Fig. 3](#fig3){ref-type="fig"} A). The 318 aa of MyoD (available from GenBank/EMBL/DDBJ under accession no. [NM_010866](NM_010866)) were divided into aa 1--96 (NH~2~ terminus), 97--161 (bHLH), and 162--318 (COOH terminus). The 255 aa of Myf5 (available from GenBank/EMBL/DDBJ under accession no. [NM_008656](NM_008656)) were divided into aa 1--70 (NH~2~ terminus), 71--135 (bHLH), and 136--255 (COOH terminus). Each PCR product was cloned into an appropriate expression plasmid and verified by sequencing (Applied Biosystems).
Immunocytochemistry and Western blot analysis
---------------------------------------------
Primary antibodies that were used are listed as follows: mouse anti-FLAG (M2 and M5; Sigma-Aldrich), rabbit anti-Myf5 (C-20; Santa Cruz Biotechnology, Inc.), rabbit anti-MyoD (C-20; Santa Cruz Biotechnology, Inc.), mouse anti-MyoD (5.2F; Sigma-Aldrich), mouse antimyogenin (F5D) and mouse anti-myosin heavy chain (MF20; hybridoma supernatants), mouse antidesmin (D33; DakoCytomation), and mouse anti--α-tubulin (Sigma-Aldrich).
For immunostaining, cells were fixed with 4% PFA, permeabilized with Triton X-100, and blocked with 5% normal goat serum in PBS. Primary and secondary antibodies were applied in 5% goat serum--PBS. Secondary detection used appropriate fluorescein- or rhodamine-conjugated antibodies (Chemicon). 0.25 μg/ml DAPI was included in a final wash step to highlight nuclei. Samples were mounted in fluorescence mounting medium (DakoCytomation), coverslipped, and imaged using a microscope (Axiophot 2; Carl Zeiss MicroImaging, Inc.), a 10× NA 0.30 plan-Neofluar (Ph1; ∝ /0.17) or 20× NA 0.75 plan Apochromat (∝ /0.17) objective, and a digital camera (Axiocam; Carl Zeiss MicroImaging, Inc.). Digital images were captured by using Axiovision (Carl Zeiss MicroImaging, Inc.) and were processed with Photoshop (Adobe). Enumeration was assisted by ImageJ software (<http://rsb.info.nih.gov/ij/>).
Western blots were made by electroblotting standard SDS-PAGE gels onto Immobilon-P membranes. Membranes were blocked in 5% skimmed milk in PBS; secondary detection was performed with an appropriate HRP-conjugated antibody (Bio-Rad Laboratories) visualized by ECL (GE Healthcare). For densitometry, blots were digitally imaged with a 16-bit GeneGnome chemiluminescence gel-doc system (Syngene), and bands were quantified with the bundled GeneTools software (Syngene) except parts of [Fig. 3](#fig3){ref-type="fig"} B, for which the MyoD (C-20), Myf5 (C-20), and corresponding tubulin (not depicted) blots were exposed to film, scanned, and analyzed by using ImageJ software.
Online supplemental material
----------------------------
Tables S1--S4 show the expansion of [Table I](#tbl1){ref-type="table"}, where candidate gene lists were derived by testing for consistent pairwise increase/decrease changes (at least six of nine) as well as minimum mean threshold log(fold) changes of ±1 (twofold). Increases for MyoD, increases for Myf5, decreases for MyoD, and decreases for Myf5 correspond to Tables S1, S2, S3, and S4, respectively. Table S5 shows the sequences and targets for primers that were used for SYBR Green real-time PCR. Online supplemental material is available at <http://www.jcb.org/cgi/content/full/jcb.200502101/DC1>.
We thank Vince Punch for work on MyoD(cdk4−) and Myf5(cdk4+) constructs, Dr. V. Sartorelli for providing retroviral expression plasmids, and Mark Gillespie and Mike Huh for careful reading of the manuscript.
M.A. Rudnicki holds the Canada Research Chair (CRC) in Molecular Genetics and is a Howard Hughes Medical Institute (HHMI) International Scholar. This work was supported by grants to M.A. Rudnicki from the Muscular Dystrophy Association, the National Institutes of Health, the Canadian Institutes of Health Research, the HHMI, and the CRC Program.
[^1]: Correspondence to Michael A. Rudnicki: <[email protected]>
| {
"pile_set_name": "PubMed Central"
} |
Some lads are more clever than others.
Mike Hayes of Rochelle, Illinois, long ago proved he was one of the more clever types. Back in 1987, while a chemistry freshman at the University of Illinois, he came up with a novel idea to solve his tuition and college expenses problem. Figuring that just about anyone could spare a penny, he brazenly asked everyone to do it.
He wrote to Chicago Tribune columnist Bob Greene, asking him to request each of his readers send Hayes a penny. The notion tickled the veteran columnist’s fancy enough that he was willing to go along with it, writing:
No one likes being used, but in this case I’m willing. It sounds like fun. Mike Hayes, 18, is a freshman science major at the University of Illinois in Champaign. He is looking for a way to finance his college education, and he decided that my column is the answer. “How many people read your column?” he asked me. I told him I didn’t know. “Millions, right?” he said. “All over the country, right?” I said I supposed that was true. “Well, here’s my idea,” he said, and proceeded to explain. I’ll break it down simply: Mike Hayes wants every person who is reading this column right this minute to send him a penny. “Just one penny,” Hayes said. “A penny doesn’t mean anything to anyone. If everyone who is reading your column looks around the room right now, there will be a penny under the couch cushion, or on the corner of the desk, or on the floor. That’s all I’m asking. A penny from each of your readers.”
You wouldn’t think a scheme like that would be wildly successful. But it was.
In less than a month, the “Many Pennies for Mike” fund was up to the equivalent of 2.3 million pennies. Not everyone was content to send merely a penny (hence the “equivalent” statement above) — many sent nickels, dimes, quarters and even more. There’s something lovable about a kid who asks you for a penny. Ask Debra Sue Maffett, Miss America 1983. Not only did she send a cheque for $25, but her donation was accompanied by a letter saying she admired him. “She even signed the letter ‘Love,'” Mike said.
Donations came in from every state in the United States, plus Mexico, Canada, and the Bahamas. Yes, he ended up with the $28,000 he’d set out to get.
But 1987 was a long time ago, you say. Whatever happened to this lad?
He went on to earn his degree in food science from the University of Illinois. As for why this scheme worked: “I didn’t ask for a lot of money,” Hayes said. “I just asked for money from a lot of people — 2.8 million people [of Chicago].”
Perhaps the last word is best left to the lad’s father, Bill Hayes: “When Mike first told me about his idea, I just laughed and said that I thought it was dumb. Which shows you that he’s smarter than I am.” | {
"pile_set_name": "OpenWebText2"
} |
A documentary by six-time Emmy nominee Alexandra Pelosi which immediately drew criticism and acclaim from predictable ends of the political spectrum. It's no easy task following up films like The Trials of Ted Haggard and Friends of God, but this interesting, sometimes terrifying insight, does a pretty remarkable job of pointing out what's right, wrong and downright kooky in middle America without taking any cheap shots.
This movie conspicuously lacks the nasty "gotcha documentary" feel of a Michael Moore or Bill Maher film, regardless of what you might hear from conservative commentators. Bill Maher isn't on the hook to be fair and Michael Moore honestly has to pander a bit to his base. Pelosi doesn't have it so easy.
In this film, Alexandra Pelosi (of the well known Pelosi's… yes, those Pelosi's) has to bend over backwards to just to paint a fair picture, if only because she shares the last name with her mother, the first female Democratic Speaker of the House. From the Republican standpoint, you could argue that the Pelosi surname is a double handicap, since it's also synonymous with Democrat impotence in the house, on top of the hurdles it surely caused in the course of shooting the piece. | {
"pile_set_name": "OpenWebText2"
} |
Salvador Mas Conde
Salvador Mas i Conde (born 27 February 1951 in Barcelona) is a Spanish classical music conductor.
Born in Barcelona, the conductor Salvador Mas-Conde started his musical studies in Escolaria de Montserrat, continuing at the Conservatorio Superior Municipal de Música of Barcelona (CSMM), in Salzburg with Bruno Maderna, in Siena with Franco Ferrara, and at the Vienna University of Music and Dramatic Art with Hans Swarowsky and Günther Theuring. He has received awards from the FEV, the Austrian Ministry of Culture and in the Second International Hans Swarowsky Orchestra Conducting Competition in Vienna. His career brought a contract with the opera house of Mainz, and, from 1978 to 1981, appointment as principal conductor of the Barcelona Symphony and Catalonia National Orchestra, of which he has also been principal guest conductor. He has conducted all leading Spanish orchestras, as well as orchestras in Austria, Belgium, Canada, Israel, Japan, Mexico, Poland, Romania and Germany. Salvador Mas-Conde has been General Music Director (GMD) of the Würtemberg Philharmonic Orchestra (1985–1991), principal conductor of the Limburgs Symfonie Orkest (1988–1994), Musik Verein’s Symphony Orchestra and Choir (1993–2000), Düsseldorfer Symphoniker (Germany, 1996-2000) and the Israel Chamber Orchestra (1998–2001). He has also been the leading guest conductor of the City of Granada Orchestra for ten years and from the 2008–2012 season its music and artistic director. He has been in charge of orchestral conducting studies at the Barcelona Conservatory and teaches orchestral conducting at the Wiener Meisterkurse in Vienna. He also held the position of Director ESMUC, Escola superior de música de Catalunya from 2005 to 2008.
References
Category:Spanish conductors (music)
Category:Male conductors (music)
Category:1951 births
Category:Living people
Category:21st-century conductors (music)
Category:21st-century male musicians | {
"pile_set_name": "Wikipedia (en)"
} |
The surnames Monet and Manet have already been seen on contemporary birth certificates, but what about the (first) names of more modern visual artists? With their lively diversity of ethnicities, any of these paintors and sculptors’ names –whether they be abstract or pop artists, realists or surrealists–could provide creative inspiration and an artistic role model for your child. | {
"pile_set_name": "Pile-CC"
} |