id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_0_shard_00002368_processed.jsonl/69653
Tag Archives: doublet Diamond No-No’s So you’ve got a diamond. Except for one little thing.  It has __________. Fracture Filling Laser Drilling -Joe Leone  Delightful Jewelry Terms Terms starting with “D” Daguerreotype – combining science, fashion and technology, the daguerreotype is second only to the diamond encrusted Apple Watch in  the coolest inventions in the world of jewelry history category.  Developed in 1839 by French photographer/innovator/dawg, Louis-Jacques-Mandé Daguerre, it’s a sort of photograph that would appear on a copper plate, after it was subject to host of potentially lethal chemicals.  Anything for fashion, dahling. Damascene – is a method used to decorate a metal surface with gold or silver wire inlay in order to create a “scene,” or depiction of an event.  Initially popular in Asia, the Mid-East and eventually Europe, this style of artistry is credited with inspiring the first person to ever use the phrase “…You’re making a scene.” Decade Ring – should obviously be given as a present to someone every 17 years.  Thought to have been developed during the 1400’s, the decade ring has ten protrusions jutting out along the band.  These were used to keep track of the ten prayers Christians were supposed to say (like rosary beads), but also doubled as excellent bowling pin counters as well. Demantoid – Sadly, no: this is not a demented demon humanoid.  This is a gemstone that had quite the time finding its own identity.  Initially mistook for peridot and a host of other greenish sparklers upon its discovery, it was eventually deemed demantoid (which means “diamond-like” or “Shines bright, but only like a diamond.”) Diaperwork – …now that doesn’t sound that fancy at all… This term is applied to a style of patterning where interlocking shapes are repeated over and over in an alternating manner (to oversimplify it).  This can achieve an intricately beautiful effect, and, it should be noted, will never not sound funny. Diaphaneity – refers to the way that light passes through an object.  A degree of scientific complications only rivaled by the amount to syllables in this word, there are three basic forms of diaphaneity; opacity, translucency and transparency (this last one isn’t a reference to a parent that has elected to switch genders). Dichroism – is a doubly daring and dazzling dance of light!  When light refracts out of a gemstone in two different shades (when viewed at varying angles), this is the phenomena of dichroism.  It’s like getting a ‘2 for1’ special at the disco ball store. Difficulta – is exactly what it sounds like; hard.  It’s a fairly esoteric term applied to the action undertaken by artists who attempt to create new forms, but the execution of said forms is increasingly difficult to achieve.  A lot of Renaissance artists strove to master this, but its popularity died down as people became lazier with each generation.  A modern Renaissance of this kind is taking place in the fast-paced and illegal world of Graffiti Art. Dog Collar (Collier de Chien) – answers the age old question in the jewelry world of “Who let the dogs out?”  This type of close fitting necklace became all the rage during the Edwardian period, as Queen Alexandra was always seen wearing a one that featured multiple strands of pearls (allegedly because she had a gnarly scar on her neck – possibly from a vampire attack?) Doublet – is the name given to a tricky little, partially fabricated gemstone made up of two components.  Typically, the top (crown) will be an authentic stone (of a lower quality), which is then slapped on top of a brilliant, synthetic bottom (pavilion), thus producing a wondrous (yet falsely achieved) sparkle.  Doublets are the Wonder Bra of the jewel world. Doublé d’or – this just denotes a piece of jewelry that is “gold plated,” but since it is in French it sounds fancy and not tawdry, like it truly is.  “Plating” is essentially the technique of painting an alloyed gold substance on to a plain ole, base metal, thereby deceiving the onlooker into thinking that you are indeed a fancy-pants. Druse – when you view the inside of a large crystal or geode and see a jagged layer of smaller crystals jutting out all over the place, this is said to be druse.  Druse can make for an interesting accent to a jewelry piece, or as a really sharp and painful loofah replacement, in a pinch. Dull Lustre – while this is clearly an oxymoron, it is a very specific term that describes the type of ‘partial shine’ given off by ivory.  It’s no coincidence that if one purchases newly acquired ivory jewelry, which is derived from endangered animals, they are themselves are a ‘dullard.’ -Joe Leone
global_01_local_0_shard_00002368_processed.jsonl/69668
XML Sitemap URLPriorityChange frequencyLast modified (GMT) https://dmcolor.com/holiday-restyle/20%Monthly2014-03-27 04:19 https://dmcolor.com/festive-touch/20%Monthly2014-03-27 04:21
global_01_local_0_shard_00002368_processed.jsonl/69671
Obtaining and Saving the Resulting Query When an end-user clicks the Save command on the Query Builder control's toolbar or the client-side Save method is called, the server-side ASPxQueryBuilder.SaveQuery event occurs. A handler receives an event argument providing access to a string containing the resulting query both as a string value and an internal representation speciffic for the DevExpress Data Access library (a SelectQuery object). using DevExpress.DataAccess.Sql; // .. protected void ASPxQueryBuilder1_SaveQuery(object sender, DevExpress.XtraReports.Web.SaveQueryEventArgs e) { SelectQuery query = e.ResultQuery; string queryString = e.SelectStatement; Note that a SelectQuery can be reopened in the Query Builder for further editing. protected void Page_Load(object sender, EventArgs e) { ASPxQueryBuilder1.OpenConnection("NorthwindXpo", query);
global_01_local_0_shard_00002368_processed.jsonl/69673
PHP exceptions and the exception handling in general are both-way interoperable with the CLR exception handling. All the throwable exception types in the CLR have to be derived from the System.Exception class, and thus the base PHP exception classes \Error and \Exception are no different. The following code samples depict the pseudo-implementation of the base PHP exception classes. // base PHP exception class - \Error public class Error : System.Exception, Throwable { ... } // base PHP exception class - \Exception public class Exception : System.Exception, Throwable { ... } The entire exception mechanism between .NET languages and PHP works out of the box. Catch a PHP Exception in C## Since all the PHP exception classes and user PHP exception classes are derived from System.Exception, thay can be caught in .NET using standard try/catch/finally blocks. try { /* invoke PHP code */ } // handle only the Error exception class (full name is Pchp.Library.Spl.Error) catch (Error err) // handle any exception including a PHP exception catch (Exception ex) { ... } Catch a C# Exception in PHP# When catching standard .NET exceptions in PHP code, keep in mind that they are not inherited from PHP's \Exception, \Throwable or \Error types. In order to catch a standard System.Exception or a derived type, the type must be specified in the catch block as follows: try { /* call a .NET method that throws */} // C# exceptions don't implement Throwable, won't catch catch (\Throwable $t) { ... } // C# exceptions don't inherit PHP \Exception type, won't catch catch (\Exception $e) { ... } // catches everything - C# and PHP exceptions catch (\System\Exception $se) { ... } Note to Implementors# In PHP, exceptions are commonly caught using the \Throwable type (which is not implemented by regular C# exceptions). Additionally, the PHP code might expect that an exception object is of the PHP type \Exception, which doesn't have to be true, and it might expect there are certain properties (like Exeption::$file). Although not compulsory, in order to achieve full interoperability and to avoid any unexpected behavior of the PHP code, the user exceptions thrown from C# and caught by the PHP code should inherit PHP's \Exception class (full CLR name: Pchp.Library.Spl.Exception implemented in Peachpie.Library.dll).
global_01_local_0_shard_00002368_processed.jsonl/69675
Evidence in court must be admissible. The rules of admissibility are complex. Certain facts are admissible pursuant to the doctrine of "judicial notice." “It cannot certainly be laid down as a universal, or even as a general proposition, that the court can judicially notice matters of fact. Yet it cannot be doubted, that there are many facts, particularly with respect to geographical positions, of such public notoriety, and the knowledge of which is to be derived from other sources than parol proof; which the court may judicially notice.” Peyroux v. Howard, 32 U.S. 324, 342 (1833).  The particular state's evidence code should be relied upon when a party requests that a court take judicial notice of common facts, including the most obvious of facts, maps, historic events, etc. A court might be unable to take judicial notice unless the subject is specified by statute. See, i.e., California Evidence Code section 450450: "Judicial notice may not be taken of any matter unless authorized or required by law."
global_01_local_0_shard_00002368_processed.jsonl/69681
Please use this identifier to cite or link to this item: Title: Driving dynamic colloidal assembly using eccentric self-propelled colloids Authors: Ma, Zhan Lei, Qun-li Ni, Ran Keywords: Trajectories DRNTU::Engineering::Chemical engineering Issue Date: 2017 Source: Ma, Z., Lei, Q.-l., & Ni, R. (2017). Driving dynamic colloidal assembly using eccentric self-propelled colloids. Soft Matter, 13(47), 8940-8946. doi:10.1039/C7SM01730H Series/Report no.: Soft Matter Abstract: Designing protocols to dynamically direct the self-assembly of colloidal particles has become an important direction in soft matter physics because of promising applications in the fabrication of dynamic responsive functional materials. Here, using computer simulations, we found that in the mixture of passive colloids and eccentric self-propelled active particles, when the eccentricity and self-propulsion of active particles are high enough, the eccentric active particles can push passive colloids to form a large dense dynamic cluster, and the system undergoes a novel dynamic demixing transition. Our simulations show that the dynamic demixing occurs when the eccentric active particles move much faster than the passive particles such that the dynamic trajectories of different active particles can overlap each other while passive particles are depleted from the dynamic trajectories of active particles. Our results suggest that this is in analogy to the entropy-driven demixing in colloid–polymer mixtures, in which polymer random coils can overlap with each other while depleting the colloids. More interestingly, we find that by fixing the passive colloid composition at a certain value with increasing density, the system undergoes an intriguing re-entrant mixing, and the demixing only occurs within a certain intermediate density range. This suggests a new way of designing active matter to drive the self-assembly of passive colloids and fabricate dynamic responsive materials. ISSN: 1744-683X Rights: © 2017 The Author(s). All rights reserved. This paper was published by The Royal Society of Chemistry in Soft Matter and is made available with permission of The Author(s). Fulltext Permission: open Fulltext Availability: With Fulltext Appears in Collections:SCBE Journal Articles Files in This Item: File Description SizeFormat  Driving dynamic colloidal assembly using eccentric self-propelled colloids.pdf7.8 MBAdobe PDFThumbnail Google ScholarTM
global_01_local_0_shard_00002368_processed.jsonl/69694
Skip to main content Learn by doing Help employees learn new skills faster with Dynamics 365 Guides on HoloLens devices—no coding required. Get started Empower employees with hands-on learning Empower employees with hands-on learning Enhance learning and standardise processes with step-by-step instructions that guide employees to the tools and parts they need and how to use them in real work situations. Improve training effectiveness Maximise training effectiveness Integrate photos, videos, and 3D models to personalise training and turn institutional knowledge into a repeatable, interactive learning tool. Use data to improve workflow efficiency Use data to improve workflow efficiency Pull employee performance data into real-time Power BI dashboards, making it easier to improve processes and identify where instruction is needed. Dynamics 365 Guides Per user/month PACCAR explores Dynamics 365 Guides and HoloLens 2 to improve manufacturing productivity and employee training. Introducing HoloLens 2, a new vision for work HoloLens 2 is your heads-up, hands-free gateway into mixed reality, with built-in and collaborative business solutions.
global_01_local_0_shard_00002368_processed.jsonl/69698
Iron in Pregnancy Some women are low on iron even when not pregnant. But once we’re pregnant, it becomes even more likely for the masses. Here’s everything you need to know about getting enough iron during pregnancy. What does iron do in our bodies? Iron plays such a large role in our bodies that you might end up asking, “What does iron NOT do?!” Iron is essential for the following: – Transporting oxygen to cells throughout the body, and CO2 to the lungs. – Red blood cell production – Metabolism: Converting blood sugar to energy – Enzyme production (for hormones, neurotransmitters, amino acids, and cell generation/regeneration) – Immune system strengthening – Encouraging optimal physical/mental growth by carrying oxygen for red blood cells. Therefore, iron is crucial for a growing fetus, infant, or child. Why do we need to consume iron? Our bodies do not produce iron on their own, therefore we must consume it via food or drink, mineral supplement, herbs, or homeopathy. Symptoms of Low Iron If iron stores are low, normal hemoglobin production slows down, which means the transport of oxygen is diminished. Possible symptoms include: -Lower energy -Lower immunity -Low blood pressure -Increased heart rate due to less oxygen (the heart overcompensates by trying to pump more) What do the blood test numbers mean? A blood test determines if you have iron deficiencies in your blood, which could lead to anemia (too few red blood cells).  The test usually shows results for hemoglobin,  hematocrit, and iron stores (ferritin).  Note that percentages/ratios are slightly lower in pregnancy due to the 30-50% increase in blood volume, and therefor numbers might be lower than when not pregnant, yet still be within range for pregnancy. Hemoglobin, Hematocrit and Ferritin 1.      Hemoglobin Levels: Hemoglobin (Hb) is the oxygen-carrying protein in your red blood cells. The expected level is between 10.5 to 15 grams/deciliter (a deciliter is 1/10 of a liter). NOTE: Hemoglobin can be written without the decimal point. For example, 11.2 gm% is the same as 112 g/L. Your blood test results list it in either or both formats. 2.      Hematocrit Levels Hematocrit is the percentage of red blood cells in your blood.  In pregnancy, a healthy range is around 30-35%.  3.      Ferritin (iron stores):  If this number is low, but your hemoglobin and hematocrit levels are fine, it stands to reason that you are simply using up your stores quickly. How do we lose iron in the body? Iron is lost via these processes: -Exfoliating (dead skin cells) -Bleeding. Since we women bleed regularly during our monthly cycles, we are more at risk than men for low stores of iron. During pregnancy, both babies and mothers need extra iron: Babies need enough iron for growth in-utero, and mothers need enough iron in general, and specifically in case of excessive blood loss after the birth. How can I increase my iron levels? The main issue with iron intake is to ensure proper absorption.  Consume iron with vitamin C and NOT with calcium nor caffeine, within an hour before/after. If your Hb levels are 11g or lower,  you need to supplement. Use any of these methods continually through the pregnancy: 1. Chlorophyll: 1-2 Tb/day 2. An herbal tincture of yellow dock, nettles, dandelion, and black strap molasses 3. A commercial supplement such as SpaTone. If your levels are stable: Cool! You obviously have the nutrition to provide enough iron. Keep it going with the following nutritional guidelines: 1. Heme Iron (easier to absorb) comes from red meat, poultry, and fish. 2. Non-heme iron is less easily absorbed, but is still healthy, and is suitable for non-meat eaters. Non-heme iron comes from: -Seaweed (especially Nori) -Dark green leafy vegetables -Wheat Germ/Wheat Grass juiced drinks -Seeds: Pumpkin, Sesame, Squash In Summary Iron in pregnancy affects both mother and baby. To ensure proper iron levels, use the instructions above. As always, feel confident to tailor instructions for your lifestyle, in order to make iron consumption as easy for you as possible. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/69723
Mark Kern From Wikipedia, the free encyclopedia Jump to navigation Jump to search Kern speaking at GDC 2011 Mark E. Kern is a Taiwanese-American video game designer best known for being a team lead on the video game World of Warcraft and a founder of Red 5 Studios.[1] Creation of Red 5 Studios[edit] Kern left Blizzard in 2006 to co-found the development company Red 5 Studios. There he worked on the title Firefall before eventually leaving the company[2] after being voted out as CEO by the Red 5's board of directors.[3] League For Gamers[edit] In 2012, Kern started the League For Gamers in response to the Stop Online Piracy Act (SOPA) and the PROTECT IP Act.[4][5] Kern said that the League For Gamers would stand as an advocacy group for the gaming community. He intended it to rival the Entertainment Software Association which focused more on publisher rights, in light of its support of SOPA. Red 5 Studios' website went offline on January 18 to draw attention to the legislation.[6] In 2016, Kern started a project on demand of fans, called EM-8ER (pronunciation: /ˈɛm.bəː/, Em-ber), a spiritual successor to his previous game Firefall. He created a company, called Crixa Labs LLC, that will release anything related to EM-8ER, like his tabletop role-playing game Gatesriders, set within the same universe. EM-8ER is a mini massively multiplayer online game set on the planet of the same name, where players control Gatesriders, humans with technological advancements such as their MEK suits and Thumper MEK/As. They fight against an ancient alien race called Tsi-hu and their giant Kaiju. The goal of the game is build bases, terraform, mine for resources and fight invasions. The game is in its early stages, with some demo builds shown to backers, however, his team of developers are actively working on the game and the approximate time of alpha release will be known after Kickstarter. Career history[edit] 1. ^ Edery, David (March 1, 2015). "Interview with Mark Kern (Red 5 Studios)" (Interview). Retrieved March 1, 2015. 2. ^ Olivetti, Justin (March 1, 2015). "Mark Kern Addresses His Departure from Red 5 Studios". Engadget. Archived from the original on September 10, 2018. Retrieved March 1, 2015. 3. ^ Hornshaw, Phil (December 20, 2013). "Red 5 Board Votes Out Co-Founder Mark Kern As CEO". GameFront. Archived from the original on August 22, 2019. Retrieved May 27, 2015. 4. ^ Parrish, Kevin (January 18, 2012). "SOPA Drama Creates ESA Rival, the League For Gamers". Tom's Guide. Archived from the original on June 25, 2015. Retrieved June 25, 2015. 5. ^ Usher, William (April 3, 2012). "League For Gamers Fights Against Video Game Warning Label Bill H.R. 4204". CinemaBlend. Archived from the original on March 3, 2016. Retrieved June 25, 2015. 6. ^ Lenhardt, Heinrich (January 17, 2012). "SOPA controversy creates rival to game industry group ESA; LFG aims to be "the NRA for gamers"". VentureBeat. Archived from the original on June 12, 2018. Retrieved June 25, 2015. External links[edit]
global_01_local_0_shard_00002368_processed.jsonl/69728
I heard that 'petrichor', which is defined as a pleasant smell that frequently accompanies the first rain after a long period of warm, dry weather, is the only noun in English that means a specific scent. Is this true? • 2 Can you give more detail to your question? Do you mean only nouns? Do you mean words that aren't just 'like a <thing that has this smell>' e.g. 'like rotten eggs', 'garlicky/like garlic', 'flowery', etc? Or is there some other constraint? And are you restricting to single words? – Mitch Jan 22 '12 at 14:27 • Thanks for asking for clarification: I was indeed thinking of only nouns. I changed the question to reflect this. – Big Dogg Jan 22 '12 at 22:48 • 2 I think this question would be vastly improved if you included a definition of petrichor, and why you think it is/might be unique. – Marthaª Jan 23 '12 at 22:24 • Definition: A pleasant, distinctive smell.... The definition goes on to describe the particular smell, but of course those details are not relevant here. Why I think it might be unique: I can't think of another noun whose primary meaning signifies a particular smell. – Big Dogg Jan 25 '12 at 23:08 • According to Wiktionary, petrichor also represents the yellow organic oil that yields this scent. – coleopterist Nov 23 '12 at 5:12 There are definitely at least two, because the word "nidor" refers specifically to the smell of burning fat. The word "musk" may or may not qualify. I've been looking for more examples of this myself. If I knew any, I would add them to this Wiktionary category. • Thank you! Finally someone correctly answers the question. Didn't know about nidor, thanks for the pointer. – Big Dogg Apr 18 '12 at 19:17 There is a related term, geosmin. So, petrichor is not the only such word. • 3 But the page you linked to clearly says "Geosmin ... is an organic compound." This is a word denoting an organic compound, not a scent. – Big Dogg Jan 22 '12 at 7:07 • 1 @BigDogg More accurately, the page says Geosmin, which literally translates to "earth smell", is an organic compound. – Andrew Lambert Jan 22 '12 at 9:39 • 1 Actually, the page says 'Geosmin is responsible for the earthy taste of beets and a contributor to the strong scent that occurs in the air when rain falls after a dry spell of weather (petrichor)' From reading the entire entry, it isn't clear whether geosmin is the cause of petrichor or a major component of it. – Ellie Kesselman Jan 22 '12 at 14:47 • Nothing in my comment invalidates Amazed's answer though. There are many words in English that describe specific scents. The question should probably be rephrased. @Matt's answer is equally correct as Amazed's, I think. – Ellie Kesselman Jan 22 '12 at 14:50 • @Amazed, The subordinate clause you included is irrelevant here: geosmin is the name of an organic compound. An organic compound may be a major contributor to a particular scent, but it is not the scent itself. – Big Dogg Jan 22 '12 at 22:47 In any sentence in which you use the word petrichor, you could substitute linen, rose, pine, citrus, or any number of other words which identify a scent. I leave it to the reader to decide whether this means that linen is a noun which identifies a scent or that petrichor is an adjective. But either way it's clear that petrichor is not in a category by itself. • Interesting claim. But the OED definition of "petrichor" is, A pleasant, distinctive smell... whereas the scent-related definition of, say, "rose" is, Rose flowers collectively, esp. as a source of scent.... To me, the scent and the source of a scent are not the same thing. – Big Dogg Jan 23 '12 at 23:53 • 2 Agree that the scent and the source are not the same thing. My point is that we often use the word for the source as the word for the scent. For example, "linen" is a scent, as well as a fabric. The fabric is not necessarily even the source of the scent: it's typically synthetic. – MetaEd Jan 24 '12 at 0:11 • 1 I disagree that we use the words "linen" or "rose" alone to signify a scent. Rather, you'd say "a rosy smell" or "fresh linen scent" (as used in many detergent descriptions). It's the phrase "linen scent" that denotes the scent, and not just the word "linen". – Big Dogg Jan 24 '12 at 1:46 I am also looking for other words in this category. I had not heard "nidor" so that is a fun find. I have found the word "sillage" - defined as "the scented trail left by someone wearing perfume." • Unfortunately I don't think that really qualifies, since it could be any sort of perfume. If it specified the kind of perfume (e.g. bacon-smelling, or rose-attar) then I think it would fit the question. – Hellion Feb 13 '15 at 3:46 • 'any' kind of perfume-smell doesn't qualify? Is one of the criteria for the sought-after word supposed to be 'unnaturally specific'? – Mitch Aug 23 '16 at 17:26
global_01_local_0_shard_00002368_processed.jsonl/69738
Skip to main content Genome-wide analysis of gene regulation mechanisms during Drosophila spermatogenesis During Drosophila spermatogenesis, testis-specific meiotic arrest complex (tMAC) and testis-specific TBP-associated factors (tTAF) contribute to activation of hundreds of genes required for meiosis and spermiogenesis. Intriguingly, tMAC is paralogous to the broadly expressed complex Myb-MuvB (MMB)/dREAM and Mip40 protein is shared by both complexes. tMAC acts as a gene activator in spermatocytes, while MMB/dREAM was shown to repress gene activity in many cell types. Our study addresses the intricate interplay between tMAC, tTAF, and MMB/dREAM during spermatogenesis. We used cell type-specific DamID to build the DNA-binding profiles of Cookie monster (tMAC), Cannonball (tTAF), and Mip40 (MMB/dREAM and tMAC) proteins in male germline cells. Incorporating the whole transcriptome analysis, we characterized the regulatory effects of these proteins and identified their gene targets. This analysis revealed that tTAFs complex is involved in activation of achi, vis, and topi meiosis arrest genes, implying that tTAFs may indirectly contribute to the regulation of Achi, Vis, and Topi targets. To understand the relationship between tMAC and MMB/dREAM, we performed Mip40 DamID in tTAF- and tMAC-deficient mutants demonstrating meiosis arrest phenotype. DamID profiles of Mip40 were highly dynamic across the stages of spermatogenesis and demonstrated a strong dependence on tMAC in spermatocytes. Integrative analysis of our data indicated that MMB/dREAM represses genes that are not expressed in spermatogenesis, whereas tMAC recruits Mip40 for subsequent gene activation in spermatocytes. Discovered interdependencies allow to formulate a renewed model for tMAC and tTAFs action in Drosophila spermatogenesis demonstrating how tissue-specific genes are regulated. During differentiation, cell identity switches from proliferating stem cell to a specialized cell with distinct physiological function. This process involves several mechanisms that ultimately converge on the activation of genes required for future function of the cell and on the repression of genes that are needed for stemness or function in other cell types. Here, we used Drosophila spermatogenesis as a model to study the mechanisms of gene activation during cell differentiation (Fig. 1a). When a male germline stem cell divides, one of the daughter cells becomes a gonioblast, which undergoes four mitotic divisions forming a cyst of 16 spermatogonia that differentiate into spermatocytes and enter meiosis. Meiotic program and subsequent spermiogenesis require massive activation of many genes, of which about 1500 are expressed only in spermatocytes, as inferred from the whole genome microarray data [1, 2]. Fig. 1 Drosophila spermatogenesis and the main regulators of gene activity. a An overview of the first stages of spermatogenesis in Drosophila. Germline stem cell (GSC) divides asymmetrically producing a gonioblast (GB). After four mitotic divisions, a cyst of 16 spermatogonia (SpG) is formed. These differentiate synchronously to spermatocytes (SpC) that replicate their chromosomes and enter meiosis. Mutation in bam gene precludes the differentiation step resulting in accumulation of SpG cysts in the testis. Meiosis arrest mutants fail to proceed to meiosis and accumulate SpC cysts. Gray bars indicate the germline cell types that are presented in the testes of bam or meiosis arrest mutants and contribute to the DamID and expression profiling experiments in this study. b Comparison of tMAC and MMB/dREAM complexes. Two complexes share common components (red) and contain homologous subunits (green). c Comparison of tTAFs and TFIID complexes. Homologous subunits are shown in green. TBP protein associated with tTAFs is unknown Differentiation of spermatogonia into spermatocytes depends on the bag of marbles (bam) gene (Fig. 1a), and mass activation of genes in spermatocytes requires two classes of spermatocyte-specific transcription factors encoded by meiosis arrest group of genes. Mutations in these genes result in meiosis arrest in the G2 that precedes meiosis I (Fig. 1a) and lead to accumulation of mature primary spermatocytes [3]. Meiosis arrest genes encode the components of two distinct protein complexes. Meiosis arrest complex (tMAC) [4] includes: Aly (Always early), Comr (Cookie monster), Topi (Matotopetli), and Tomb (Tombola), along with Mip40 (Myb-interacting protein 40) and CAF1-55 (Chromatin assembly factor 1, p55 subunit). These proteins form testis-specific assembly that shares several homologous subunits with the MMB/dREAM complex (Fig. 1b). Other proteins can be involved in tMAC, and their combinations suggest that there may be several tMAC-related complexes [5,6,7]. Can (Cannonball), Sa (Spermatocyte arrest), Rye (Ryan express), Mia (Meiosis arrest), and Nht (No hitter) are testis-specific homologues of TBP-associated factors (tTAFs) that probably form a testis-specific paralogue of TFIID (Fig. 1c) [8, 9]. It was previously reported that mutations in tMAC components show dramatic decrease in expression of about 1000 genes; mutations in tTAFs fail to activate about 350 genes, most of which also depend on tMAC [3]. Previous studies suggested that Polycomb complexes play a central role in repressing spermatocyte-specific genes in undifferentiated precursors [2, 10]. This model, however, has been recently challenged in a genome-wide study that failed to detect association of Polycomb with the promoters of testis-specific genes in spermatogonia [11]. One of the alternative mechanisms of spermatocyte-specific genes repression in spermatogonia may involve MMB/dREAM activity, as this complex has been shown to function as a repressor [12,13,14]. In this regard, similarity between tMAC and MMB/dREAM raises the interesting possibility that these complexes interact to regulate spermatocyte-specific gene program. To complete the picture of gene regulation in spermatogenesis, a new mechanism, involving Kmg and dMi-2, that prevents the expression of the somatic genes in Drosophila male germline was recently discovered [15]. Here, we investigated the binding of tMAC and tTAFs components to the chromosomes and studied their effects on transcription. Specifically, we performed germline cell-specific genome-wide profiling of the Cookie monster (Comr) protein representing tMAC, Mip40, which is a subunit shared by tMAC and MMB/dREAM, and Cannonball (Can, tTAF). Our study revealed the mutual dependencies between these factors that provide the new aspects in regulation of tissue-specific genes. Germline-specific genome-wide DamID analysis of Comr, Can, and Mip40 identifies their cognate target genes Despite the fact that mutations in tMAC and tTAFs subunits cause down-regulation of hundreds of genes, very little is known about their direct gene targets. Only three gene targets of the Spermatocyte arrest protein (Sa, tTAF) have been reported in the literature and include dj (don juan), fzo (fuzzy onion), and Mst87F (Male-specific RNA 87F) genes [2, 10]. We used tissue-specific DamID-seq to establish the genome-wide profiles of Cookie monster (Comr, tMAC subunit), Cannonball (Can, tTAFs subunit), and Mip40 (shared between tMAC and MMB/dREAM complexes) specifically in the D. melanogaster male germline [16,17,18]. Comr and Can are essential components of tMAC and tTAFs [8, 19, 20]. In our previous paper [17], we demonstrated direct activating role of Comr in spermatocytes and performed the initial characterization of the interplay between Comr and Can. The present study improves that analysis with higher resolution and sensitivity and allows to uncover the new aspects of regulatory events in Drosophila spermatogenesis. Testes from 3-day-old wild-type adult males were used for this analysis, as they express the normal profiles of the tested proteins throughout the spermatogenesis. DamID-derived libraries were subjected to Illumina sequencing. Data analysis, generation of profiles, and identification DamID peaks were based on the algorithm [18] described in the Methods. DamID signals are presented as − log10(P), where P is Fisher’s exact test P-value calculated for each genomic fragment to estimate the difference between the samples expressing Dam-fused transcription factor versus Dam-alone control [18] (log10 probability units in Fig. 2a). Positive values represent genomic regions enriched with the Comr, Can or Mip40, and negative values designate the regions that are relatively depleted with the proteins of interest. Fig. 2 DamID profiling of Can, Comr, and Mip40 in the testes of wild-type male flies and identification of Can, Comr, and Mip40 gene targets. a DamID profiles for Can, Comr, and Mip40 proteins in the germline cells of wild-type males. Peak height corresponds to the value of − log10(P), where P is the significance value (P-value) measured using Fisher’s exact test (log10 probability units). Peaks above the x axis correspond to the regions enriched with the protein of interest, and peaks below the x axis denote genomic regions depleted for this protein. Dashed line shows the significance threshold for peak calling that corresponds to a FDR = 0.05. b Analysis of genomic distribution of protein localizations compared to the random distribution in a set of testis-specifically expressed genes. All three proteins tend to localize to gene promoters and in 5′-UTRs (asterisks—binomial test P < 10−3). c Analysis of the interplay between Can, Comr, and Mip40 binding and gene activity. RNA-seq analysis was used to assess gene expression in the testes of can, comr, and mip40 mutants versus wild-type testes. Transcripts showing greater than fourfold difference in gene expression were used in the analysis. For each transcript, the distance between its TSS and the closest Can/Comr/Mip40 peak was calculated and plotted in 1 kb bins within 10 kb around the TSS. Asterisks indicate that the differences among the groups of transcripts showing greater than fourfold changes in expression are statistically significant (Chi-square test, P = 1.8 × 10−10 in the case of Can and P = 5.7 × 10−5 in case of Comr). Differences were insignificant for Mip40 gene targets. d Gene targets tend to be cooperatively bound by the proteins studied. This is not the case for indirectly controlled genes. Asterisks denote significant differences (Chi-square test, P < 3.6 × 10−7 in all cases), dotted lines—randomly expected values Peak calling pipeline identified 2140 significantly bound peaks for Can, 5422 peaks for Comr, and 12,981 peaks for Mip40. The following criteria were used for peak calling: FDR<0.05, significance threshold value P < 10−3, and log2(Dam-X/Dam) > 1 (where X stands for one of the proteins mapped, see Methods). Applying these criteria allowed us to detect the most prominent peaks for each Can, Comr or Mip40 (Fig. 2a), which is needed for reliable identification of genes that are under direct control of each protein. The difference between peak numbers was accounted for by the downstream statistical tests so as to calculate the expected threshold values. Genome-scale analysis of peak positions indicated that the colocalization of three proteins is much higher than randomly expected, as assessed with binomial test (Additional file 1: Fig. 1). The Euler diagram describing the intersection of detected peaks (Additional file 2: Fig. 2) shows that despite the significant overlap between the sets of binding sites, considerable amount of stand-alone peaks of Can, Comr, and Mip40 was observed. Mip40 is a component of tMAC and its absence could affect the distribution of other proteins of this complex, including Comr. On the other hand, putative DNA-binding domain present in Comr protein could ensure its binding to the chromosomes independently from other tMAC components. We performed Comr DamID in testes of mip40 mutants. In mip40 background, virtually all Comr peaks disappeared: only 56 Comr peaks with P < 10−3 were detected in mip40 mutants, while in wild-type 5422 highly specific peaks were found (see above). Comr profiles in mip40 mutants and in wild-type are exemplified in Additional file 3: Fig. 3. Next, we performed an analysis of the putative DNA motifs within the peaks detected for each of three proteins. Notably, Can peaks appeared to be highly enriched with the consensus sequences of Achi and Vis proteins [21] that also contribute to gene regulation in testes (Additional file 4: Fig. 4). This suggests that tTAFs may share targets with a complex containing Achi/Vis. Given the non-random coincidence of Comr and Can peaks (Additional file 1: Fig. 1), one would expect similar enrichment with DNA motifs in Comr binding sites. However, no clear consensus motifs were detected in Comr DamID peaks. Probably, Achi/Vis motif found in Can binding sites is masked by the considerable number of non-overlapping peaks between Comr and Can (Additional file 2: Fig. 2). Alternatively, different subsets of Can peaks overlap with Comr and Achi/Vis. Search in Mip40 peaks also did not yield characteristic motif, which could be explained by the involvement of Mip40 into at least two different complexes—tMAC and MMB/dREAM. Next, we investigated the location of Can, Comr, and Mip40 peaks relative to the 1389 transcripts (Additional file 5: Table 1) that are specifically up-regulated in testes and down-regulated in other tissues (compared to the whole fly according to the FlyAtlas database, see Methods). We calculated relative occurrence of Can, Comr, and Mip40 peaks in promoters (400 bp upstream Transcription Start Sites, TSSs), 5’UTRs, exons, introns, CDSs, and 3’UTRs of these genes and found that all three factors are promoter-proximal (Fig. 2b). Statistical significance was estimated with binomial test (significance threshold P < 10−3 was applied), and expected probabilities were calculated using the genome coverage in each category. A more detailed analysis of genes having Can, Comr, or Mip40 peaks within 1 kb around their TSS demonstrated that Can preferentially binds narrowly at the TSS. Comr and Mip40 demonstrated an asymmetrical binding with the clear shift into regions upstream TSS (Additional file 6: Fig. 5). Remarkably, part of highly significant peaks localized in a considerable distance from genes (681 Can peaks, 2345 Comr peaks, and 5149 Mip40 peaks were located in the intergenic regions, at least 1 kb from the nearest TSS). This could indicate that there are long-distance regulatory effects; however, this suggestion should be tested in direct experiments. To investigate Can, Comr, and Mip40 contribution to gene regulation, we compared gene expression in wild-type testes with that of can, comr, mip40 mutant males using RNA-seq. We also generated RNA-seq data for bam mutant testes, as they are known to be blocked at spermatogonial stage and served as a reference point. We then explored how Can, Comr, and Mip40 are distributed around TSSs of the genes whose expression changes in the mutants. Therefore, we calculated the distance from each TSS (including alternative TSSs occurring in some genes) to the closest significant enrichment peak of these proteins. We compiled sets of genes that displayed greater than fourfold difference in gene expression and harboring Comr, Can, or Mip40 peaks within 10 kb of their TSSs. We then plotted the distribution of protein enrichment peaks in 1 kb bins around TSSs of such genes (Fig. 2c). Forty-nine percent of genes that are down-regulated at least fourfold in can mutants have a Can peak within 1 kb of TSS. In contrast, only 12% of genes that are up-regulated in can mutants have Can peaks within 1 kb of their TSSs. This difference is statistically significant as assessed by Chi-square test (P = 1.8 × 10−10). Interestingly, no such difference is observed between the genes in the next 1 kb bin (Fig. 2c). Together with the analysis in Fig. 2b, this simple test illustrates the idea that the activating function of Can is restricted to the immediate proximity of TSS of its cognate gene targets. The same analysis applied to the Comr datasets revealed similar trend, albeit less pronounced (Chi-square test, P = 5.7 × 10−5, Fig. 2c). Somewhat surprisingly, Mip40 peaks were found to cluster around TSSs of genes that are either up- or down-regulated in mip40 mutant testes (Fig. 2c). The fact that many Mip40-enriched genes become activated in mip40 mutants suggests that it participates in both repressive (MMB/dREAM) and activating (tMAC) complexes. These data allow us to determine the genes that are direct targets of the studied proteins. We strengthened the expression threshold to increase specificity: the gene was considered a direct target if it displayed at least eightfold down-regulation in the mutant and had a protein enrichment peak within 1 kb of TSS. In comr mutant testes, 1043 genes display greater than eightfold decrease in expression. Of these, only 232 genes have pronounced Comr peaks within 1 kb of TSS (Additional file 7: Table 2). Of 630 genes down-regulated in can mutants at least eightfold, only 151 genes have significant Can binding near TSS. For Mip40, we found 436 direct gene targets (Additional file 7: Table 2). The remaining genes that are affected by mutations were conditionally called indirect targets for the further analysis. It cannot be excluded that some direct target genes showing smaller expression changes or DamID values fell into the set of indirect targets. However, the whole genome analysis shows that chosen FDR-based threshold result in higher specificity of target definition (Additional file 8: Fig. 6). Two of the three known gene targets of tTAF, don juan, and Mst87F [10] displayed pronounced Can peaks in the promoter regions (Additional file 9: Fig. 7). Thus, our data are in line with the reports [2, 10] that dj and Mst87F are directly controlled by tTAFs. Notably, though, our data imply that Comr controls these genes indirectly. The sets of direct and indirect gene targets were very different from each other in many ways (Fig. 2D, Additional file 7: Table 2). Fifty-six percent of directly regulated Can target genes also had a Comr binding peak next to the TSS (which is 7 times over the value expected by chance, Chi-square test, P = 3.2 × 10−107). In the case of indirectly controlled gene targets, this number was only 1.44-fold above the expected value (Chi-square test, P = 0.004). Similarly, 78% of direct Can targets had Mip40 peaks near the TSS, which is 2.64 more frequent than expected (Chi-square test, P = 9.4 × 10−17). This is unlike the situation with indirect Can targets that appeared to associate with Mip40 at a nearly background frequency (Chi-square test, P = 0.11; Fig. 2d). The same overall trend was observed for Comr and Mip40 targets (Fig. 2d). This implies that more genes could be attributed to direct targets of Can, Comr, and Mip40 if milder selection criteria were applied; however, we proceeded with the gene sets described above, because they are the most prominent targets of the factors under investigation. To summarize, Comr, Can, and Mip40 appear to directly control hundreds of genes that become activated in spermatocytes. The gene lists for direct targets display partial overlap (Additional file 10: Fig. 8). The genes that were likely to be indirect target revealed only a modest association with the Comr, Can, and Mip40 at nearly background frequencies suggesting that their activation is controlled by alternative mechanisms. Mutual regulation of meiosis arrest genes In order to comprehensively analyze the mechanisms of gene activation in a complex system such as D. melanogaster spermatogenesis, possible cross-regulation of genes encoding tMAC and tTAFs subunits must be taken into account. Our current data (Additional file 11: Table 3) are in agreement with the previous report that Comr does not affect the activity of meiosis arrest genes [17], which led to the conclusion that tMAC is unlikely to regulate the components of tTAF. Here, we asked whether Can, as a component of tTAF, may affect the expression of other meiosis arrest genes (Additional file 11: Table 3). Our analysis shows that three meiosis arrest genes—topi, achi, and vis—displayed pronounced Can binding near the TSS (Fig. 3a), suggesting that Can may be directly involved in regulation of these genes. Fig. 3 Second layer of regulation in the gene activation cascade in spermatocytes. a Can peaks are present in the promoters of meiosis arrest genes topi, achi, and vis. Dotted lines designate the values corresponding to FDR = 0.05. b The effects of bam, can, and comr mutation on expression of these genes. Topi, achi, and vis are inactive in spermatogonia (bam), yet they become activated in spermatocytes. Despite identical cell composition in the testes of can and comr mutants, the genes topi, achi, and vis show much weaker expression in can mutants (asterisk designate P < 0.003). As a control, the data for Actin 42A gene are shown to illustrate that these mutations do not influence its expression To check this, we looked at RNA-seq data in can and comr mutant testes. It must be noted that testes of meiosis arrest mutants accumulate spermatocytes that fail to enter downstream spermatogenesis stages. This means that some spermatocyte-specific genes may erroneously appear overexpressed in the mutant testes when matched against wild-type controls. However, we can adequately compare the expression of spermatocyte-specific genes in can and comr mutant testes, as they are composed of very similar cell types. Expression of topi, achi, and vis genes in can mutant testes was significantly reduced (multiple testing corrected P < 0.003 in each case) compared to comr mutant background (Fig. 3b), as estimated using Cuffdiff package [22] (see “Methods”). In order to independently verify this observation, we turned to the microarray data published previously [17]. As appeared, comr (tMAC) mutants indeed had at least tenfold higher expression of topi, as compared to can mutant animals. Notably, even in the absence of Can function, topi is only partially silenced compared with bam mutant spermatogonia (Fig. 3b). Thus, full expression of topi requires tTAFs activity, whereas can mutation significantly, yet incompletely, suppresses topi expression. Our data demonstrate that expression of three meiosis arrest genes depends on Can protein, suggesting that tTAFs participate in their regulation and may affect the expression of their targets. Activity of genes encoding TBP-like proteins in spermatogenesis During gene activation, TAFs interact with TBP (TATA-binding protein) to form TFIID complex [23]. Similarly, tTAFs have been hypothesized to form an analogous complex, wherein the TBP-like molecule still remains to be identified [3, 9]. There are 5 genes encoding TBP and TBP-like molecules in D. melanogaster: Tbp, Trf, Trf2, CG9879, and CG15398. We analyzed the expression of these genes in the can, comr, and mip40 mutant testes. Tbp and CG15398 were predominantly active in spermatogonia (in bam mutants) and were essentially silent in comr, can, mip40 mutants, as well as in the wild-type background (Fig. 4a). In contrast, Trf and Trf2 showed pronounced expression in all genotypes tested (Fig. 4a), which is supported by RNA in situ hybridization (Additional file 12: Fig. 9). CG9879 went completely silent in comr mutants and showed substantial down-regulation in can and mip40 mutant background (Fig. 4a) [17]. Thus, it seems probable that Trf and/or Trf2 play the role of TBP in tTAFs complex. Control of CG9879 by Comr and Can implied that it may have a specific role in gene regulation downstream tMAC and tTAFs; therefore, we performed DamID-seq for this protein and carried out RNA-seq in CG9879 mutant testes. Fig. 4 Analysis of Tbp paralogues behavior in spermatogenesis. a Expression of genes encoding TBP and its paralogues in the testes. CG9879 is the only testis-specific homologue of TBP; Trf and Trf2 display high expression in the testes, which remains unchanged in the mutants affecting spermatogenesis progression. Tbp and CG15398 are predominantly active in spermatogonia. The dotted lines designate the FPKM expression levels of the genes in wild-type testis. b CG9879 displays TSS-biased binding in the set of testis-specific genes. Asterisks show the significant differences (binomial test, P < 0.001). c CG9879 is frequently found in the promoter regions of direct gene targets of Can, Comr, and Mip40, unlike in the promoters of indirect gene targets. The dotted lines show the values expected by chance The profile of CG9879 binding indicates that this protein tends to associate with 5’UTR and promoter regions of the genes that are specifically activated in testis (binomial test, P < 0.001, Fig. 4b, Additional file 13: Fig. 10). Using DREME platform, we found that CG9879-bound regions frequently contained AT-rich motifs resembling the TATA-box sequence (Additional file 14: Fig. 11) [24]. In general, CG9879 tends to co-localize with both Comr and Can (Additional file 1: Fig. 1). Furthermore, 43% of direct Can gene targets had a CG9879 peak within 1 kb around TSS (8.4-fold above expected, Chi-square test, P = 5.2 × 10−14). Direct gene targets of Comr and Mip40 had peaks of CG9879 near TSSs in 25% (fivefold enrichment, Chi-square test, P = 2.0 × 10−44) and 18% (3.6-fold enrichment, Chi-square test, P = 1.9 × 10−9) cases, respectively (Fig. 4c). Notably, genes that we considered to be indirectly regulated by Comr, Can, and Mip40 were not enriched with CG9879 peaks (Fig. 4c, Additional file 7: Table 2). In order to understand how CG9879 affects gene expression in fly testes, we knocked out CG9879 using CRISPR/Cas9 (see “Methods”). Surprisingly, no morphological defects were apparent, and the males remained fully fertile. Furthermore, analysis of gene expression in testes of CG9879 mutants showed that only 28 genes had significantly reduced expression levels (Additional file 15: Table 4), but none of them was associated with CG9879. Taking into account our data on specific binding of CG9879 to direct tTAFs and tMAC targets, this lack of phenotype and expression changes is likely attributable to the redundancy of CG9879 in the presence of other TBPs (Trf, Trf2) that may completely substitute its function. tMAC is required for Mip40 recruitment to the promoters of testis-specific genes One intriguing feature of spermatocyte-specific gene activation program is participation of Mip40 (Fig. 1b). Mip40 protein was identified as the subunit of MMB/dREAM complex that is present in various cell types [12,13,14, 25,26,27]. Mip40 is also an essential component of tMAC [4]. Given an extensive similarity between the components of tMAC and MMB/dREAM complexes (Fig. 1b), it is possible that in spermatogonia MMB/dREAM complex is bound to the spermatocyte-specific genes thereby keeping them silent. Upon spermatocyte differentiation, the components of tMAC could replace homologous proteins in the MMB/dREAM and turn it into a transcriptional activator. On the other hand, tMAC could recruit the components of MMB/dREAM to the spermatocyte-specific genes resulting in tMAC-dependent recruitment of Mip40 following spermatocyte differentiation. In order to understand which of the scenarios operates leading to activation of spermatocyte-specific genes, we performed DamID profiling of Mip40 in testes from bam, aly, and can mutants and compared these profiles to each other and to the profile from wild-type testes. In spermatogonia of bam mutants, where tMAC is not yet expressed, Mip40 profile represents MMB/dREAM complex (Fig. 5a). In aly mutants, many Mip40 peaks were absent and some novel Mip40 sites appeared. In contrast, novel Mip40 binding sites—absent in both spermatogonia and aly mutants—were readily detectable in can mutant background (Additional file 16: Fig. 12). In wild-type testes, these novel peaks were even more prominent, and the profile was very different from that of the spermatogonial cells (Fig. 5a). Fig. 5 Mip40 shows highly dynamic chromatin binding during spermatogenesis. a Mip40 binding profiles in spermatogonia (bam mutants), in aly mutant testes (no tMAC), can mutant testes (no tTAFs), as well as in the wild-type testes. b Basic types of changes in Mip40 binding to the genes. The genes having Mip40 peaks within 300 bp around TSS were identified in each genotype and sub-classified to six groups (I–VI) reflecting the main trends of Mip40 binding across the genotypes tested: group I was associated with Mip40 in all four genotypes, group II was bound by Mi40 only in spermatogonia of bam mutants, and so on (see the main text for details). c Mip130 coincides with Mip40 binding sites devoid of Can or Comr and is absent from the sites of Mip40 colocalization with Comr or Can. d Mip130 occupancy in the gene groups showing dynamic binding of Mip40 (Fig. 5B). Mip130 DamID signal was categorized by the significance of DamID signal: no Mip130 binding; − log(P) = {0..1}—nonsignificant binding; − log(P) = {1..3}—medium significance peaks; − log(P) > 3—highly significant Mip130 peaks. Mip130 strongly marks the genes in groups I (Chi-square test, P < 10−300), II (Chi-square test, P = 1.8 × 10−155), V (Chi-square test, P = 5.9 × 10−161), and VI (Chi-square test, P = 3.4 × 10−163). Groups III and VI show Mip130 presence similar to random expectation. e Enrichment or depletion in testis-specific genes (blue) and ovary-specific genes (orange) in the six gene sets (***P < 10−31; **P < 10−6; *P < 10−2, Chi-square test). f Distribution of Mip40 around the transcripts showing greater than fourfold difference in gene expression (in mip40 vs. wild-type testes) according to DamID in bam, aly, and can mutants. For each transcript, the distance between its TSS and the closest Mip40 peak was calculated and plotted in 1 kb bins within 10 kb around the TSS. Asterisks indicate that the differences among the groups of transcripts showing greater than fourfold changes in expression are statistically significant. Binding of Mip40 in spermatogonia, as well as in the absence of tTAFs and tMAC, is predominantly associated with gene repression. g Ratios of repressed and activated genes in the groups of genes shown in Fig. 5b. Mip40-bound gene targets in spermatogonia tend to be up-regulated in mip40 mutants (groups I, II, V, and VI). The genes that acquire Mip40 binding following spermatocyte differentiation via tMAC activity (groups III and IV) show overall decreased expression in mip40 mutants, i.e., Mip40 in this case is needed for their activation (***P < 10−30; **P < 10−10; *P < 10−3, Chi-square test). h Presence of Comr protein in the promoters of the genes from the six groups of genes in Fig. 5b. Comr binding in wild-type testes was categorized by the significance of DamID signal: no Comr binding; − log(P) = {0..1}—nonsignificant binding; − log(P) = {1..3}—medium significance peaks; − log(P) > 3—highly significant Comr peaks. High and medium significance peaks of Comr are overrepresented in the groups III (Chi-square test, P = 1.3 × 10−96) and IV (Chi-square test, P = 1.2 × 10−110) In order to analyze these effects in relation to gene regulation, we focused on the transcripts having Mip40 peaks within ± 300 bp of the TSSs in each genotype. Overall, there were half as many Mip40-occupied TSSs in aly mutants (1773 genes) compared to bam mutants (3499 genes) (Fig. 5b). In contrast, in can mutant and wild-type testes, the numbers of Mip40-positive TSSs increased (2950 and 3819 genes, respectively). To reveal the main trends in Mip40 profile dynamics, we performed clustering of these genes depending on how they associate with Mip40 during spermatogenesis and six major gene groups were formed (Fig. 5b). These six groups are reproducible across different significance levels chosen for Mip40 peak calling (Additional file 17: Fig. 13). Since Mip40 is shared by MMB/dREAM and tMAC, its DamID profile likely represents a superposition of two profiles. To distinguish between tMAC and MMB/dREAM localization, we generated an additional DamID profile of specific subunit of MMB/dREAM Mip130, which is homologous to Aly protein but does not participate in tMAC (Fig. 1b), and compared it with the profiles of Mip40 as well as Comr and Can. Mip130 proved to co-localize with Mip40 at numerous genomic locations (Fig. 5c). Characteristically, these have virtually no overlap with the sites of Comr and likely represent the MMB/dREAM localization (Additional file 18: Fig. 14). On the other hand, the sites of Mip40 that coincide with Comr do not typically contain Mip130, thus reflecting tMAC position (Fig. 5c). Accordingly, Mip130 revealed differential representation in 6 gene groups that reflect the main trends of Mip40 redistribution (Fig. 5d), allowing to discriminate Mip40 as a part of tMAC or MMB/dREAM. A highly specific enrichment with Mip130 was observed in groups I, II, V, and VI in comparison with the genome-wide overall distribution (Chi-square test, P < 10−154, Fig. 5d): cooperative signal of Mip40 and Mip130 in these groups indicates the MMB/dREAM binding. The groups III and IV demonstrated no prevalent Mip130 presence suggesting that Mip40 signal in these groups is due to tMAC formation (Fig. 5d). We used 2252 shared peaks of Mip40 and Mip130 to characterize sequence motifs in MMB/dREAM sites (Additional file 19: Fig. 15). The best motif identified in this search manifested high similarity with the motif for BEAF-32 protein, which is known to interact with CP190 protein at the insulator sites [28]. In turn, CP190 was found to interact with MMB/dREAM complex [29]. Thus, the presence of BEAF-32 motif in the Mip40 and Mip130 binding sites could reflect the similar involvement of MMB/dREAM in regulation of promoter-enhancer regulation in germline. To check whether the observed dynamics of Mip40 profile is specific for genes involved in spermatogenesis, we turned to the set of 1389 testis-specifically expressed genes (see above). As a control, we generated a list of 707 ovary-specifically expressed transcripts (Additional file 5: Table 1) selected with the same criteria from the FlyAtlas database (Methods). In the groups of genes that display Mip40 binding at the spermatogonial stage (groups I, II V, VI), testis-specific genes were underrepresented, whereas the fraction of ovary-specific genes was above the expected value (Fig. 5e). Among the genes whose TSSs acquire Mip40 binding in spermatocytes and onwards (groups III and IV) testis-specific genes were highly overrepresented (Fig. 5e). Thus, upon spermatocytes differentiation, Mip40 relocates to the promoters of testis-specifically expressed genes in tMAC-dependent manner. We showed that mip40 mutation results in down-regulation of 1580 transcripts (at least fourfold in mip40 mutant testes vs. wild-type controls) but also in fourfold up-regulation of 208 transcripts (Fig. 2c). These effects are probably caused by participation of Mip40 in two types of complexes, one of which would cause gene repression (like MMB/dREAM), while the other being an activator (tMAC). To investigate the repressive effects of Mip40, we checked how this protein is associated with those two gene sets throughout the first stages of spermatogenesis: in spermatogonia of bam mutants and in spermatocytes of aly and can mutants. Therefore, we analyzed Mip40 binding within 10 kb of the TSSs of transcripts from these two sets. In spermatogonia, 60% of transcripts that are up-regulated in mip40 testes had a Mip40 peak within 1 kb of the TSS (Fig. 5f). These transcripts are normally repressed, and Mip40 is associated with them already in spermatogonia. In contrast, only 30% of the fourfold down-regulated genes contained Mip40 near their TSS, which corresponds to the random expectation and is significantly less than the portion of up-regulated genes (Chi-square test, P = 5.5 × 10−13, Fig. 5f). Similar yet less pronounced situation was observed in spermatocytes of aly and can mutants (Chi-square test, P = 4.8 × 10−5 and P = 1.2 × 10−6, respectively, Fig. 5f). These data indicate that in spermatogonia and in early spermatocytes of aly and can mutants Mip40 directly binds to a large portion of genes that should be down-regulated in spermatogenesis. To check this further, we generated the fly strain bearing both mip40 and bam mutations. This strain allowed us to estimate the effect of Mip40 on gene expression selectively in the spermatogonia. Analysis of expression in mip40; bam double mutant testes revealed that the genes that are up-regulated in this genotype relative to bam mutants tend to bind Mip40 in spermatogonia. This means that the presence of Mip40 at their promoters correlates with their repression (Additional file 20: Fig. 16). Notably, later in development, neither Can nor Comr showed significant association with the same gene sets indicating that tMAC and tTAFs play no role in their regulation (Additional file 20: Fig. 16). Figure 5b indicates that tMAC and tTAFs affect Mip40 binding in distinct gene groups. In order to estimate how this is related to gene regulation in the six major groups shown in Fig. 5b, we turned to our differential gene expression datasets for bam, comr, can, and mip40 mutant testes. In each mutant background, the transcripts that showed at least fourfold up- or down-regulation relative to the wild-type control were retained. Next, we calculated the ratio of repressed to activated transcripts in the groups I–VI (Fig. 5g). In the group I transcripts (bound by Mip40 throughout all stages and genetic backgrounds), a strong enrichment for transcripts up-regulated in mip40 mutants was observed (in comparison with expected value), and so Mip40 likely acts as a repressor for such genes (Fig. 5g). This effect was specific to mip40 mutants, as it was not observed in can and comr mutants, which in turn indicates that tMAC and tTAFs do not significantly affect the regulation of group I transcripts. The transcripts from groups II, V, and VI (whose TSSs show Mip40 binding in spermatogonia) likewise show enrichment for genes up-regulated in mip40 mutants. However, unlike in group I, these genes were also up-regulated in can and comr mutant backgrounds (Fig. 5g). Nonetheless, only a handful of TSSs from these groups are directly bound by Comr or Can (data not shown), and so tMAC and tTAFs are inferred to have indirect effects on expression of these genes. One could suggest that the genes from the groups II, V, and VI that are repressed by Mip40 in spermatogonia are activated upon spermatocyte differentiation independently from tMAC and tTAF. In this case, their up-regulation in can and comr mutants would be explained by spermatocyte accumulation. In contrast, the transcripts, whose TSSs for the first time recruit Mip40 in spermatocytes (groups III and IV), tend to show reduced expression in mip40 mutants, which argues for the activating role of Mip40 for group III and IV genes (Fig. 5g). Notably, these genes also tend to be Comr targets: 64% transcripts co-bound by Mip40 and Comr in wild-type belong to the groups III and IV. In other words, such transcripts appear to be directly activated by Mip40 and Comr in the context of tMAC (Fig. 5h). Thus, our data indicate that in spermatogonia Mip40 plays a repressive role. Following spermatocyte differentiation, relocalization of Mip40 occurs, and tMAC but not tTAFs components are required for this relocalization. Establishing the final Mip40 distribution pattern is only possible when both complexes are available. The Mip40 redistribution to the promoters of testis-specific genes is indispensable for their proper activation. The present work aims at extending our knowledge of the mechanisms of massive gene activation controlled by tMAC and tTAFs complexes in Drosophila spermatocytes. We performed comprehensive genome-wide analyses that uncovered new trends in this process. DamID data criticism Before proceeding to the discussion of the intricate biological effects observed, it is important to address the question of whether DamID system accurately represents the dynamic events of transcription factor binding in fly testes. Indeed, in our DamID experiments the removal of transcription terminator stuffer otherwise blocking transcription of Dam-fusion protein is mediated by CRE that is produced early in the stem cells of the germline [16, 17]. Hence, Dam-mediated methylation of DNA may occur at any of the subsequent developmental stages—in spermatogonia, spermatocytes, and spermatids—that all can contribute to the ultimate binding profile. Accordingly, changes in the ratios of cell types between the genotypes may be a confounding factor. On the other hand, in wild-type testes, as well as in meiotic arrest mutants, the fraction of spermatogonial cells among all cell types of the testis is very small and should have little if any influence on the profiles obtained. Our data may help to address this concern. For example, Mip40 protein was mapped in bam mutant testes at TSSs of nearly 3500 genes (Fig. 5b). Should the contribution of spermatogonial cells into Mip40 binding profiles in aly, can, and wild-type backgrounds be significant, Mip40 peaks observed in spermatogonia should also be present in such samples, likely having reduced magnitude. This was not the case, as in aly mutants roughly half the peaks disappear from the promoter regions, whereas the other half of the peaks remains unchanged (Fig. 5b). Moreover in can mutants and in wild-type testes, many more Mip40 peaks appear and these map to the Mip40-negative genomic loci in spermatogonial cells (Fig. 5a, b). This acquisition of novel Mip40 sites is consistent with continued DamID activity in spermatocytes. Thus, the approach used in our study can be applied for chromatin profiling in spermatogenesis and the data obtained faithfully reproduce protein binding dynamics in the dominant cell populations in each of the genotypes tested. Activation of spermatocyte-specifically expressed genes The process of gene activation now appears to be somewhat different from earlier models. First, only fraction of spermatocyte-specific genes undergoes direct tTAFs- or tMAC-mediated activation. Second, regulatory cascades downstream of tMAC and tTAFs may involve other transcription factors, including those that are not particularly testis-specific. For instance, there are many transcription factors, such as invected, apontic, fushi tarazu, gooseberry-neuro, whose expression pattern is detected in, but not restricted to, testes [17]. Thus, the role of tMAC and tTAFs may be to launch the testis-specific gene program that unfolds via other regulators and transcription factors that ultimately results in appropriate gene activation. It is interesting to note that tTAFs actually control expression of several meiosis arrest genes, topi, achi, and vis. Achi and Vis proteins are absent from the canonical tMAC complex, yet they were found in the context of a distinct complex encompassing Aly and Comr [4, 5]. In can mutant background, topi, achi, and vis undergo only partial down-regulation, and so this may explain why can mutation has a weaker phenotype compared to that of topi/achi/vis knock-outs, although this may also be interpreted the other way around, namely that reduced expression of these genes is partially responsible for the can phenotype. It is highly probable that tTAFs forms a transcription factor paralogous to TFIID [3, 9, 10]; however, TBP protein that forms the core of tTAFs complex was not identified. An attractive hypothesis that the spermatocyte-specifically expressed TBP-like protein CG9879 may play the central role in tTAFs function was rejected in our study. Indeed, knock-down of CG9879 gene led to very subtle changes in gene expression and did not appreciably affect spermatogenesis. Nevertheless, CG9879 tends to co-localize with tTAFs subunit Cannonball implying that CG9879 participates in tTAF, but its absence may be compensated by other TBP-like proteins expressed in spermatocytes. Such redundancy may help to maintain the stability of this important genetic system. Dual role of Mip40 Since the description of tMAC, one of the most intriguing facets of this complex was the homology of its subunits to those of MMB/dREAM complex. tMAC and MMB/dREAM complexes are not merely paralogous, and they share common subunits, Mip40 and CAF1-55. Notably, tMAC is clearly involved in gene activation [3, 17, 30], whereas MMB/dREAM predominantly has repressive activity [12,13,14], although several examples showing its activating effects have also been reported [25,26,27]. Our data indicate that at these early differentiation stages, Mip40 does not tend to associate with TSSs of genes that will later become activated in spermatocytes. This observation is in obvious conflict with the idea that MMB/dREAM orchestrates the repression of spermatocyte-specific genes in undifferentiated cells. Moreover, Mip40-bound genes in spermatogonia are those whose expression is predominantly detected in ovaries, and Mip40 binding in the context of MMB/dREAM complex has inhibitory activity. Whether this mechanism is related to the recently discovered pathway that maintains the silencing of somatically expressed genes [15] remains to be discovered. Following spermatocyte differentiation, Mip40 binding pattern changes substantially, and novel Mip40 peaks appear that are clearly tMAC dependent. These data indicate that MMB/dREAM does not contribute to inactivation of spermatocyte-specific genes. Instead, in spermatocytes, tMAC recruits Mip40 to novel binding sites and this redistribution takes place outside the context of MMB/dREAM complex. In wild-type testes, redistribution of Mip40 is much more pronounced. This points to the possible involvement of tTAFs. Alternatively, in early spermatocytes of can mutants we may actually observe very first steps of Mip40 redistribution, whereas more differentiated cell types are present in wild-type testes and so they may contribute to the final binding pattern. A test to discriminate between the two possibilities is to perform DamID in thoc5 mutants, as this mutation does not interfere with tMAC or tTAFs activity, yet it causes meiotic arrest [31]. Based on our major findings, we propose an amended picture of transcription-related events during Drosophila spermatogenesis. The mechanism controlling the inactivity of the vast majority of spermatocyte-specific genes is presently unknown: a decisive role for either the Pc [11] or MMB/dREAM complexes now seems unlikely. tMAC and tTAFs associate with their cognate gene targets and induce their activation. Surprisingly, of all the testis-specific genes, the fraction of high confidence direct gene targets of tMAC and tTAFs is relatively modest. Activation of indirectly controlled gene targets likely proceeds with the help of other transcription factors. Involvement of tTAFs in regulation of three meiosis arrest genes should be taken into account as an additional regulatory mechanism. There is a major redistribution of Mip40 in spermatocytes. This process is tMAC dependent and leads to the relocation of Mip40 to promoters of spermatocyte-specific genes leading to their activation. Genetic constructs All genetic constructs for DamID experiments were based on the hsp70 > loxP-Stop-loxP > Dam (JN993988) vector encompassing a loxP-flanked stop-cassette placed between the hsp70 minimal promoter and the Dam CDS, fused in frame as an N-terminal fusion to the protein of interest [32]. The Dam-Comr (KC845569) construct has been reported earlier [17]. Dam-Can (KY939771), Dam-Mip40 (KY939772), Dam-Mip130 (MG557560), and Dam-CG9879 (KY930504) constructs were generated in this work. Fly stocks and crosses To obtain fly stocks needed for DamID experiments, attP40 genomic landing site on chromosome 2 was used (Dam-Comr, Dam-Mip40, Dam-Can, Dam-CG9879, and Dam-alone). To activate the DamID system specifically in the male germline, nanos-cre (attP40) males [16, 17] were crossed to DamID-construct bearing females. In the progeny of these crosses, removal of the stop-cassette occurs only in the germline cells, but not in the somatic cells of the testis. Dam-alone flies were used as a control for DamID experiments. To perform DamID in animals displaying compromised spermatogonia-to-spermatocyte differentiation (bam-delta86), tMAC activity (aly5) or tTAFs activity (can1), flystocks having said mutations balanced against TM6 and homozygous for Dam-Mip40 (attP40), Dam-alone (attP40) or nanos-cre (attP40) constructs were established by standard genetic crosses. When DamID; mut/TM6 females were crossed to nanos-cre; mut/TM6 females, their sons lacking TM6-linked dominant markers and therefore homozygous mutant were selected. Such males displayed the expected phenotypes: accumulation of spermatogonia (bam) or spermatocyte meiotic arrest (aly and can). Comr profiling at the mip40EY16520 background was performed using the same experimental design. Germline-specific DamID For DamID experiments, testes were collected from 3-day-old males. For each biological replicate, 50 pairs of testes were used; each experiment was performed in two biological replicates. Standard phenol-chloroform extraction method was used to isolate genomic DNA from the collected material. 0.5–1 μg DNA was used in each DamID experiment. Overall, DamID was performed according to the protocols published previously [33, 34] with modifications [18]. Specifically, the last amplification step was done using regular Taq-polymerase. Following amplification, the PCR products were treated with DpnII to remove adapter sequences. Next, library preparation followed the TruSeq protocol (Illumina) omitting the additional fragmentation step. Importantly, this helps retain the information on the sequences that must be found at the amplified DNA termini, as they must begin with GATC. This information is used for downstream data filtering and removal of non-specific reads as previously described [18]. Further analysis, including profiles generation and peak calling, was performed exactly as previously described [18]. In all cases, FDR cutoff was required to be 0.05 at most. FDR estimation was performed at different significance levels to assess the impact of experimental noise measured by comparison of biological replicates. Additional file 21: Fig. 17 exemplifies the outcome of this procedure on Can DamID-seq data. Additional file 22: Fig. 18 illustrates the benefits of this approach as compared to traditional DamID data presentation as log2(Dam-X/Dam) on the same dataset. Gene expression analysis For gene expression analysis, we used 50 adult testes from 3-day-old wild-type males (y1,w67 strain) or homozygous mutants for bamdelta86, aly5, can1, mip40EY16520 or CG9879 (obtained in this study). Each experiment was run in duplicate. Total RNA was isolated from testes, using TRIZol (Invitrogen) reagent, according to the manufacturer’s instructions. One microgram of total RNA was then processed for library preparation using the RNA TruSeq kit. The libraries were sequenced on the Illumina MiSeq system (paired reads, 75 bp). Data were analyzed using Galaxy tools: reads were aligned on D. melanogaster BDGP R5/dm3 genome assembly ( using TopHat (− r 200 − mate-std-dev 50) [35]. Transcript differential expression testing between samples was performed with Cuffdiff using geometric normalization, pooled dispersion estimation, and FDR = 0.05 [22]. Testis-specific and ovary-specific transcripts To determine the list of testis- and ovary-specific transcripts, we used FlyAtlas Database [1]. We used following criteria to assign transcript as a testis-specific (or ovary-specific)—it should be up-regulated in testis (or ovary) (log2(Testis(Ovary)/FlyMean) > 0) and down-regulated (log2(Tissue/FlyMean) < 0) or demonstrate null expression in all other tissues of adult fly. This approach allowed us to generate the list of 1389 testis-specific and 707 ovary-specific transcripts. CRISPR/Cas9 genome editing To generate full-size deletion of CG9879 gene coding sequence, we used transgenic line MI04214 from MiMIC transposon insertion collection (Bloomington Drosophila Stock Center, [36]). This stock contains insertion of MiMIC transposon carrying a marker gene (y+) in approximately 600 bp from 5′ end of CG9879. MI04214 flies were crossed to the flies bearing Cas9 nuclease gene (#51326, Bloomington Drosophila Stock Center) (Additional file 23: Fig. 19). Oligonucleotides that target the genomic region that contains MiMIC insert and CDS of CG9879 were designed with CRISPR optimal finder and CRISPRdirect tools [37, 38]. Each oligonucleotide pair (L1: 5′-cttcgacgatggtgacaggtgtct-3′, L2: 5′-aaacagacacctgtcaccatcgtc-3′, R1: 5′-cttcgtgccagtggttggcccgag-3′, R2: 5′-aaacctcgggccaaccactggcac-3′) were annealed on each other and inserted into pU6-BbsI-chiRNA vector (Addgene, #45946, [39]). Plasmids encoding a chiRNA targeting the genomic region of interest were co-injected into preblastoderm embryos obtained from the crosses mentioned above. Upon eclosion, flies were crossed to y, w flies, and progeny of these crosses were inspected for loss of yellow dominant marker that expected to occur in the case of successful deletion of MiMIC insert and coding region of CG9879. As a result, we obtained flies, bearing required deletion (Additional file 23: Fig. 19). Complete deletion of CG9879 coding region was verified with PCR and Sanger sequencing (Additional file 23: Fig. 19). testis-specific meiosis arrest complex testis-specific TBP-associated factor TATA-binding protein Myb-MuvB complex DP, RB-like, E2F4, and MuvB complex DNA-adenine methyltransferase identification 1. 1. 2. 2. Chen X, Lu C, Prado JR, Eun SH, Fuller MT. Sequential changes at differentiation gene promoters as they become active in a stem cell lineage. Development. 2011;138(12):2441–50. 3. 3. White-Cooper H. Molecular mechanisms of gene regulation during Drosophila spermatogenesis. Reproduction. 2010;139(1):11–21. 4. 4. Beall EL, Lewis PW, Bell M, Rocha M, Jones DL, Botchan MR. Discovery of tMAC: a Drosophila testis-specific meiotic arrest complex paralogous to Myb-Muv B. Genes Dev. 2007;21(8):904–19. 5. 5. Wang Z, Mann RS. Requirement for two nearly identical TGIF-related homeobox genes in Drosophila spermatogenesis. Development. 2003;130(13):2853–65. 6. 6. Ayyar S, Jiang J, Collu A, White-Cooper H, White RA. Drosophila TGIF is essential for developmentally regulated transcription in spermatogenesis. Development. 2003;130(13):2841–52. 7. 7. Doggett K, Jiang J, Aleti G, White-Cooper H. Wake-up-call, a lin-52 paralogue, and Always early, a lin-9 homologue physically interact, but have opposing functions in regulating testis-specific gene expression. Dev Biol. 2011;355(2):381–93. 8. 8. Hiller M, Chen X, Pringle MJ, Suchorolski M, Sancak Y, Viswanathan S, Bolival B, Lin TY, Marino S, Fuller MT. Testis-specific TAF homologs collaborate to control a tissue-specific transcription program. Development. 2004;131(21):5297–308. 9. 9. Metcalf CE, Wassarman DA. Nucleolar colocalization of TAF1 and testis-specific TAFs during Drosophila spermatogenesis. Dev Dyn. 2007;236(10):2836–43. 10. 10. Chen X, Hiller M, Sancak Y, Fuller MT. Tissue-specific TAFs counteract Polycomb to turn on terminal differentiation. Science. 2005;310(5749):869–72. 11. 11. El-Sharnouby S, Redhouse J, White RA. Genome-wide and cell-specific epigenetic analysis challenges the role of polycomb in Drosophila spermatogenesis. PLoS Genet. 2013;9(10):e1003842. 12. 12. Beall EL, Manak JR, Zhou S, Bell M, Lipsick JS, Botchan MR. Role for a Drosophila Myb-containing protein complex in site-specific DNA replication. Nature. 2002;420(6917):833–7. 13. 13. Lewis PW, Beall EL, Fleischer TC, Georlette D, Link AJ, Botchan MR. Identification of a Drosophila Myb-E2F2/RBF transcriptional repressor complex. Genes Dev. 2004;18(23):2929–40. 14. 14. Korenjak M, Taylor-Harding B, Binne UK, Satterlee JS, Stevaux O, Aasland R, White-Cooper H, Dyson N, Brehm A. Native E2F/RBF complexes contain Myb-interacting proteins and repress transcription of developmentally controlled E2F target genes. Cell. 2004;119(2):181–93. 15. 15. Kim J, Lu C, Srinivasan S, Awe S, Brehm A, Fuller MT. Blocking promiscuous activation at cryptic promoters directs cell type-specific gene expression. Science. 2017;356(6339):717–21. 16. 16. Laktionov PP, Maksimov DA, Andreeva EN, Shloma VV, Beliakin SN. A genetic system for somatic and germinal lineage tracing in the Drosophila melanogaster gonads. Tsitologiia. 2013;55(3):185–9. 17. 17. Laktionov PP, White-Cooper H, Maksimov DA, Belyakin SN. Transcription factor Comr acts as a direct activator in the genetic program controlling spermatogenesis in D. melanogaster. Mol Biol. 2014;48(1):130–40. 18. 18. Maksimov DA, Laktionov PP, Belyakin SN. Data analysis algorithm for DamID-seq profiling of chromatin proteins in Drosophila melanogaster. Chromosome Res. 2016;24(4):481–94. 19. 19. Jiang J, White-Cooper H. Transcriptional activation in Drosophila spermatogenesis involves the mutually dependent function of aly and a novel meiotic arrest gene cookie monster. Development. 2003;130(3):563–73. 20. 20. Hiller MA, Lin TY, Wood C, Fuller MT. Developmental regulation of transcription by a tissue-specific TAF homolog. Genes Dev. 2001;15(8):1021–30. 21. 21. Noyes MB, Christensen RG, Wakabayashi A, Stormo GD, Brodsky MH, Wolfe SA. Analysis of homeodomain specificities allows the family-wide prediction of preferred recognition sites. Cell. 2008;133(7):1277–89. 22. 22. 23. 23. Louder RK, He Y, Lopez-Blanco JR, Fang J, Chacon P, Nogales E. Structure of promoter-bound TFIID and model of human pre-initiation complex assembly. Nature. 2016;531(7596):604–9. 24. 24. 25. 25. Sadasivam S, DeCaprio JA. The DREAM complex: master coordinator of cell cycle-dependent gene expression. Nat Rev Cancer. 2013;13(8):585–95. 26. 26. Sim CK, Perry S, Tharadra SK, Lipsick JS, Ray A. Epigenetic regulation of olfactory receptor gene expression by the Myb-MuvB/dREAM complex. Genes Dev. 2012;26(22):2483–98. 27. 27. Georlette D, Ahn S, MacAlpine DM, Cheung E, Lewis PW, Beall EL, Bell SP, Speed T, Manak JR, Botchan MR. Genomic profiling and expression studies reveal both positive and negative activities for the Drosophila Myb MuvB/dREAM complex in proliferating cells. Genes Dev. 2007;21(22):2880–96. 28. 28. Vogelmann J, Le Gall A, Dejardin S, Allemand F, Gamot A, Labesse G, Cuvier O, Negre N, Cohen-Gonsaud M, Margeat E, et al. Chromatin insulator factors involved in long-range DNA interactions and their role in the folding of the Drosophila genome. PLoS Genet. 2014;10(8):e1004544. 29. 29. Korenjak M, Kwon E, Morris RT, Anderssen E, Amzallag A, Ramaswamy S, Dyson NJ. dREAM co-operates with insulator-binding proteins and regulates expression at divergently paired genes. Nucleic Acids Res. 2014;42(14):8939–53. 30. 30. White-Cooper H, Caporilli S. Transcriptional and post-transcriptional regulation of Drosophila germline stem cells and their differentiating progeny. Adv Exp Med Biol. 2013;786:47–61. 31. 31. Moon S, Cho B, Min SH, Lee D, Chung YD. The THO complex is required for nucleolar integrity in Drosophila spermatocytes. Development. 2011;138(17):3835–45. 32. 32. Maksimov DA, Koryakov DE, Belyakin SN. Developmental variation of the SUUR protein binding correlates with gene regulation and specific chromatin types in D. melanogaster. Chromosoma. 2014;123(3):253–64. 33. 33. Greil F, Moorman C, van Steensel B. DamID: mapping of in vivo protein–genome interactions using tethered DNA adenine methyltransferase. Methods Enzymol. 2006;410:342–59. 34. 34. Vogel MJ, Peric-Hupkes D, van Steensel B. Detection of in vivo protein–DNA interactions using DamID in mammalian cells. Nat Protocols. 2007;2(6):1467–78. 35. 35. 36. 36. Venken KJ, Schulze KL, Haelterman NA, Pan H, He Y, Evans-Holm M, Carlson JW, Levis RW, Spradling AC, Hoskins RA, et al. MiMIC: a highly versatile transposon insertion resource for engineering Drosophila melanogaster genes. Nat Methods. 2011;8(9):737–43. 37. 37. Gratz SJ, Ukken FP, Rubinstein CD, Thiede G, Donohue LK, Cummings AM, O’Connor-Giles KM. Highly specific and efficient CRISPR/Cas9-catalyzed homology-directed repair in Drosophila. Genetics. 2014;196(4):961–71. 38. 38. Naito Y, Hino K, Bono H, Ui-Tei K. CRISPRdirect: software for designing CRISPR/Cas guide RNA with reduced off-target sites. Bioinformatics. 2015;31(7):1120–3. 39. 39. 40. 40. Download references Authors’ contributions PPL performed most of experiments, analyzed results, and wrote the paper, DAM performed bioinformatics analysis of the whole genome experiments, SER contributed to the part concerning CG9879 mapping and deletion, PAA performed Mip130 DamID, OVP performed flywork and genetic crosses, HWC performed RNA in situ hybridizations of whole testes and wrote the paper, DEK performed genetic crosses and sample collections, SNB planned experiments, contributed to the data analysis, and wrote the paper. All authors read and approved the final manuscript. Authors are grateful to Andrey Gortchakov for critical reading of the manuscript. We thank the IMCB SB RAS collection of Drosophila lines (Project No. 0310-2016-0001) for providing wild-type and mutant stocks that were used in this work. The authors gratefully acknowledge the resources provided by the “Molecular and Cellular Biology” core facility of the IMCB SB RAS. Competing interests The authors declare that they have no competing interests. Availability of data and materials All data are available from Gene Expression Omnibus (GSE97182). Consent for publication Not applicable. Ethics approval and consent to participate Not applicable. This work was supported by a Grant from the Russian Science Foundation (14-14–00641), Russian Fundamental Scientific Research Project (0310-2018-0009), and Russian Foundation for Basic Research Grants (17-00-00181, 14-04-32102, 13-04-01731, 13-04-40087, and 12-04-01007). SNB was supported by the grant from the Ministry of Education and Science of Russian Federation #14.Y26.31.0024. Publisher’s Note Author information Correspondence to Stepan N. Belyakin. Additional files Additional file 1: Fig. 1. Can, Mip40, Comr, and CG9879 tend to co-localize in the genome. A Can peaks (top plot) and Comr peaks (bottom plot) were centered. The plots show the ratio of observed/expected frequencies of other protein factors as a function of distance from the centers of Can and Comr peaks. In Can peaks, Comr and CG9879 are 17- and 18-fold more frequent than expected by chance. Mip40 protein shows sevenfold enrichment. Random set of GATC sequences is shown in purple. The situation for Comr peaks is slightly different: Can, Mip40, and CG9879 proteins show 15-, 8-, and ninefold enrichment at these regions above expected by chance. The observed enrichment quickly drops at increasing distances from the centers of the peaks. Observed enrichments over the expected value were highly significant for all proteins as assessed by the binomial test, with the highest significance at zero position (P < 10−212 in centered Can peaks and P < 10−144 in centered Comr peaks). B Examples of testis-specifically expressed genes containing Can, Comr, and Mip40 peaks in the vicinity of TSS. Ordinate is the same as in Fig. 2a. Additional file 2: Fig. 2 Coincidence of peaks of Can, Comr, and Mip40. Euler diagram represents the exact intersections of the peaks detected for Can, Comr, and Mip40 proteins in wild-type testes. The numbers of peaks in each partition are shown. Additional file 3: Fig. 3. DamID of Comr in mip40 mutants. Comr is unable to bind the chromosomes in absence of Mip40 (upper profile). Comr profile in wild-type is presented for comparison (lower profile). Additional file 4: Fig. 4. Motif analysis in Can peaks. Top three motifs found by DREME [24] in Can binding sites are shown. Below is the analysis of the top-most motif identified by TomTom software [40]. This motif perfectly matches the motifs of Achi and Vis. Additional file 5: Table 1. The lists of testis- and ovary-specifically expressed genes used in this study. Additional file 6: Fig. 5. Averaged DamID profiles of Can, Comr, and Mip40 at the TSS of genes. The genes having the peaks of Can, Comr, and Mip40 within 1 kb around their TSS were selected. Then, for each coordinate within this area the normalized number of peaks was calculated. Ordinate–relative abundance of each protein. Black line represents the randomized set of peaks. Additional file 7: Table 2. Direct and indirect gene targets of the proteins studied. Direct gene targets are defined as the genes that have a significant peak of a given protein within 1 kb of their TSSs and showing at least eightfold down-regulation in the corresponding mutant. Genes showing reduced expression but lacking detectable protein factor binding within such distance are referred to as indirect targets. Primary data on protein binding and expression are shown in the worksheets. Additional file 8: Fig. 6. DamID signal at the TSSs of genes regulated by Comr, Can, and Mip40. Using RNA-seq data, the genes were determined that demonstrate at least fourfold expression change in comr, can, or mip40 mutant testes. DamID signal of the corresponding factor was classified at ± 1 kb around TSSs of these genes. The categories were as follows. No binding shown in gray (DamID signal of the protein is lower than of Dam-alone control: Dam-X/Dam < 1, where X = Comr, Can or Mip40). The genes that manifest only insignificant DamID signal (− log(P) = {0..1}, where P is a Fisher’s exact test P value) are shown in white. The genes with moderate significance level of binding are shown in purple (−log(P) = {0..X}, where X is a threshold determined for FDR = 0.05. Orange shows the highly significantly bound genes that show DamID signal above the FDR = 0.05 threshold. Additional file 9: Fig. 7. Binding of Can, Comr, and Mip40 to model genes referenced in earlier reports [2, 10]. Dj and Mst87F genes have prominent Can peaks (DamID) in their promoter regions, which is consistent with the published ChIP-qPCR data. Comr is not associated with these gene promoters, as assayed by DamID. Mip40 peak maps to the Mst87F promoter. Additional file 10: Fig. 8. Overlap between direct gene targets of Comr, Can, and Mip40. Additional file 11: Table 3. Interplay between meiosis arrest genes. tMAC does not affect the expression of genes encoding tTAFs. Can mutation results in reduced expression of topi, achi, and vis. Additionally, Can peaks are detectable in the immediate vicinity of TSSs of these genes. Additional file 12: Fig. 9. RNA in situ hybridization localization of CG9879, Trf, and Trf2 transcripts. Upper row—in wild-type testis; lower row—in meiosis arrest mutants. CG9879 transcript is not expressed in aly mutants, while Trf and Trf2 retain their expression in mutant spermatocytes. Additional file 13: Fig. 10. Averaged DamID profile of CG9879 at the TSS of genes. The genes having the peaks of CG9879 within 1 kb around their TSS were selected. Then, for each coordinate within this area the normalized number of peaks was calculated. Ordinate–relative abundance of each protein. Red line represents the randomized set of peaks. Additional file 14: Fig. 11. Analysis of short motifs in the CG9879 peaks. Top three most frequent motifs found in CG9879 peaks using DREME [24] are shown. AT-rich motifs are similar to TATA-box sequences. Additional file 15: Table 4. The list of 28 genes that display substantially reduced expression in testes of CG9879-null males. Additional file 16: Fig. 12. Overlap of Mip40 peak sets in bam, aly, and can mutants. Euler diagram represents the exact intersections of the peaks detected for Mip40 protein in three genotypes. The numbers of peaks in each partition are shown. Additional file 17: Fig. 13. The dynamics of Mip40 binding during spermatogenesis, as assayed at varying levels of significance levels for Mip40 peak calling. The same groups of target genes are identified, as those shown in Fig. 5b. A The threshold for peak calling P > 10−3. B The threshold for peak calling P > 10−6.25. Additional file 18: Fig. 14. Coincidence of peaks of Mip130, Comr, and Mip40. Euler diagram represents the exact intersections of the peaks detected for Mip130, Comr, and Mip40 proteins in wild-type testes. The numbers of peaks in each partition are shown. Additional file 19: Fig. 15. Motif analysis in shared peaks of Mip40 and Mip130. Top three motifs found by DREME [24] in shared peaks of Mip40 and Mip130 are shown. Below is the analysis of the top-most motif identified by Tomtom software [40]. This motif perfectly matches the motif of BEAF-32 protein. Additional file 20: Fig. 16. Effect of mip40 mutation on gene expression in spermatogonia. Expression in mip40; bam double mutants was compared to bam mutants. Up- and down-regulated genes were determined and matched to Mip40 DamID profile in bam mutants. Ordinate: percent of genes in each group having one of transcription factors peaks (TF = Mip40, Comr or Can) in promoter in genotypes indicated on the abscissa. The genes that are up-regulated in mip40; bam double mutants are significantly more frequent targets of Mip40 in spermatogonia. The same genes are not enriched with Can or Comr DamID signals at the later cell stages. Additional file 21: Fig. 17. Performance of peak calling algorithm illustrated by Can DamID data. A Numbers of Can peaks and false positive peaks at different significance levels. FDR=0.05 is reached at the P = 1.7 × 10−7 (dashed line). B Specificity of peak calling at different FDR values. At high FDR values, there is no prevalence of Can to the genes that are down-regulated in can mutants over the genes that are up-regulated. At FDR = 0.05, the number of down-regulated genes is about fourfold higher than the number of up-regulated genes. Additional file 22: Fig. 18. Example of Can DamID data. Red profile—raw reads from Dam-Can sample. Blue profile—raw reads from Dam-alone sample. These two profiles were normalized and presented as log2(Dam-Can/Dam) values or treated by the previously published algorithm and shown in − log(P) units where P is the significance value (P value) measured using Fisher’s exact test [18]. Gray shading demonstrates the DNA fragments that demonstrate considerable Dam-Can:Dam ratio but are statistically insignificant. These fragments show low values in both Dam-Can and Dam-alone channels (arrowheads). In contrast, the peaks determined by our algorithm [18] demonstrate a high prevalence of Dam-Can signal and are located in the promoters of genes that are highly expressed in testis (shown below in red). Two genes that are marked with asterisks are predominantly expressed in spermatogonia and are not regulated by Can. The frame shows the hotspot of Dam methylation in both samples. Additional file 23: Fig. 19. Targeted deletion of CG9879 gene using CRISPR/Cas9. A The strain with the insertion of transposon containing yellow reporter gene 600 bp upstream CG9879 gene was used. chiRNAs were designed flanking the transposon and CG9879 gene. Targeted sequences are shown. Cas9 introduced the double-strand breaks within the targeted sequences as shown. Upon repair, the fragment containing transposon with the yellow reporter and CG9879 gene was deleted and the new junction appeared. Deletion was confirmed by Sanger sequencing (B). Rights and permissions Reprints and Permissions About this article Verify currency and authenticity via CrossMark Cite this article Laktionov, P.P., Maksimov, D.A., Romanov, S.E. et al. Genome-wide analysis of gene regulation mechanisms during Drosophila spermatogenesis. Epigenetics & Chromatin 11, 14 (2018) doi:10.1186/s13072-018-0183-3 Download citation • Drosophila • Spermatogenesis • Gene regulation • DamID
global_01_local_0_shard_00002368_processed.jsonl/69746
web3.eth.compile.solidity ask for a string as a parameter. Not only, it must be a string without line breaks: in the official greeter tutorial to use an online-tool to remove line breaks from contract is encouraged. I find that very embarrassing, and I feel that the typical signature for such a method should get a path to a .sol file instead of a string. So... maybe web3 not compiling from a file is some sort of security measure? Or there is any powerful reason to web3 not compiling from a source file I'm unaware? • do not see a reason, and your embarassment is justified. – Roland Kofler Jul 9 '16 at 20:42 • All I can think of is you'd generally not normally run Javascript code from a command line, but rather as a script. In a script, having your contract code as a variable allows it to be easily manipulated (or created from scratch). In such cases, having to write the code to a file before compiling is just an extra step. – Richard Horrocks Jul 9 '16 at 21:12 web3 may be used directly inside the browser (i.e. in a dapp), in which case there's no access to the filesystem anyway. Requiring actual direct code allows in-browser use of web3.eth.compile, and console JS systems (i.e. node) have their own methods of reading the filesystem. • Yeah I guess web3.js being designed mainly to client side scripting instead than for nodejs is the main reason for that. But I use to deploy contracts and test things with node and have to compile in the console with solc and then do stuff is some sort of a pain in the ass. Btw is someone is reading this bc is having problems to deploy contract with web3, I strongly suggest to use Pudding instead of vanilla web3 contract. – Sergeon Jul 10 '16 at 17:03 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/69778
FFVII wiki iconVIICC wiki iconVIIBC wiki iconOtWtaS wiki iconVIIDoC wiki iconVIIAC wiki iconFFAB wiki iconFFRK wiki iconMobius wiki icon Player Turks The Turks is the unofficial name of the Investigation Sector of the General Affairs Department (alternatively, the Department of Administrative Research) of the Shinra Electric Power Company in Final Fantasy VII. They work inside the Department of Public Safety under Shinra executive Heidegger. While first introduced the spin-off game Before Crisis -Final Fantasy VII- focuses on the Turks in the years leading up to Final Fantasy VII. The Genesis War The Turks in Junon. During Before Crisis -Final Fantasy VII- the Turks are led by Veld with Tseng below him. Along with veterans, such as Reno and Rude, the Turks are made up of eight rookies. The Turks fight AVALANCHE, an eco-terrorist organization bent on destroying Shinra. President Shinra briefly replaces Veld with Heidegger with disastrous results. Veld blackmails the President to make him return the Turks to his command. Veld discovers the AVALANCHE leader, Elfé is his daughter twisted by her evil scientist lieutenant, Fuhito. To save her from the ancient summon inside her, Zirconiade, the Turks defect from Shinra using Rufus Shinra, company Vice President and President Shinra's son, as leverage, but the President orders the Shinra executive Scarlet to kill them nevertheless. Despite the threats from both Shinra and AVALANCHE, the Turks stop Fuhito and destroy Zirconiade. Veld and his daughter, along with many of the Turks, disappear. Tseng reports having assassinated them, allowing him to become the new leader of the Turks, but in truth the former members go into hiding. The Nightmare The remaining Turks come into conflict with Cloud Strife and his friends, members of a second incarnation of AVALANCHE who are working to save the Planet from Shinra's exploitation. They are ordered to capture Aerith, the last remaining Cetra, whom Shinra wants to lead them to the Promised Land, a land they believe fertile with Mako energy. Cloud aids Aerith escape the Turks, who are next ordered to destroy Sector 7 by dropping the section of Midgar's upper level to crush AVALANCHE's headquarters in the Midgar Slums while pinning the disaster to the terrorists. Though Cloud and his friends try to stop them, the plate falls and Tseng captures Aeris. The remaining AVALANCHE members storm the Shinra Headquarters to save Aeris but are captured by Rude and imprisoned. They escape their cells when a supposedly dead SOLDIER Sephiroth appears and kills the President. As Sephiroth escapes both Cloud's party and the Turks set out to hunt him down. Elena joins the Turks' ranks at this point and the teams run into each other in the Mythril Mine where Tseng wishes Aerith well, declaring the Sephiroth mission takes priority. The Turks discover Sephiroth is looking for the Temple of the Ancients and after the Shinra executive Reeve Tuesti infiltrates AVALANCHE's ranks under the guise of the robotic Cait Sith, he betrays AVALANCHE by handing the Keystone to the temple to Tseng. Tseng and Elena inspect the temple but run into Sephiroth and Tseng is badly wounded. When Cloud and his friends find him slumped in a corner, Tseng returns the Keystone. Though they are enemies, the Turks cooperate with Cloud's party in Wutai. Don Corneo, a former Shinra informant who had let AVALANCHE in on Shinra's plan to destroy Sector 7, thus became an enemy of the company and Shinra army is sent to eliminate him, tracking him down in Wutai Village. Reno, Rude and Elena are enjoying their time off at the tourist resort, and turn down the soldiers' request for aid. Elena disagrees with refusing company orders, and storms off, and is kidnapped by Corneo alongside a member of Cloud's party, Yuffie Kisaragi. Working together, Cloud's party defeats Corneo's monster Rapps and Reno and Rude throw Corneo off the Da-chao Statue. Though they get a call to keep pursuing Cloud's party, the Turks shrug it off since they are still off duty. When Diamond Weapon attacks Midgar the top levels of the Shinra Headquarters are destroyed and Rufus Shinra, the current company President, is thought dead, and the Shinra executives go rogue. When Cloud and his friends are on their way to stop Professor Hojo, the head of Shinra's Science Department, from destroying all of Midgar, the Turks run into them in the train tunnels. The Turks are not keen on fighting Cloud's party, who have a chance to convince the Turks to separate amicably. On the Way to a Smile The Turks feature prominently in "Episode: Shinra". After helping Rufus escape the Shinra Headquarters ruins, Tseng has Rude, Reno and Elena assist the citizens of Midgar escape before and after the Meteor falls. Veld and the Turks who defected the company during the battle to stop Zirconiade, also return, and together the Turks watch as Meteor is destroyed over Midgar by the Lifestream and Holy. When Rufus is kidnapped by Mütten Kylegate, the Turks guard Shinra property in Midgar's ruins and change the passkeys to the warehouses to stop scavengers sent by Kylegate. Final Fantasy VII: Advent Children Turks in ACC The remaining Turks together. Spoilers end here. Shinra Building Research Department QMC Wall Market Pub Wall Market Pub. Notable members Musical themes Other appearances Final Fantasy Airborne Brigade FFAB Double Impact - Reno &amp; Rude Legend UR Some of the Turks appear. Final Fantasy Record Keeper Reno, Rude and Elena appear. Mobius Final Fantasy MFF Shinra Turk FFT-job-squireMThis section about a job class in Mobius Final Fantasy is empty or needs to be expanded. You can help the Final Fantasy Wiki by expanding it. Non-Final Fantasy guest appearances Ehrgeiz: God Bless the Ring Ehrgeiz Vincent 2 CC Lost Turks 1 Deceased Turks in Crisis Core.
global_01_local_0_shard_00002368_processed.jsonl/69804
Mac OS Catalina Printing from Mac OS Catalina does not seem to work. I can import and generate the GCode and even connect to the printer just fine but when i click the button to start processing the GCode nothing happens. I have tried this with items i have successfully printed in the past as well as new ones. I have power cycled both the printer and the mac. Any advice would be greatly appreciated since at this point it seems i am dead in the water. Thank you Are you using Snapmaker3D? If so this software was merged with SnapmakerJS, and you can now 3D print from SnapmakerJS. no i’ve been using snapmakerjs How did you connect with Catalina? I have updated my Snapmaker V1 firmware to 2.11. I have the latest 2.6.1 version of SnapmakerJS I have installed the CH340 Driver for macOS Sierra (2017-12-19) and restarted my Mac After these steps, I still can’t see the driver in SnapmakerJS. Hi mglmouser, Have you tried Snapmaker-Luban? if you have and still run into problems, please go to to download and install our driver. Let me know if that resolves your issue. Downloaded the software update last night but my extruder is clogged up. I’ll be able to attend to that tomorrow. I’ll let you know how it goes.
global_01_local_0_shard_00002368_processed.jsonl/69811
Can't sign in msn Discussion in 'Windows XP' started by divinebeauty, Sep 7, 2004. Thread Status: Not open for further replies. 1. divinebeauty divinebeauty Thread Starter Aug 26, 2004 I can't sign in msn messenger or sign in hotmail, only outlook express works for me. When I try to sign in msn messenger it says that the user or pass is not correct, but it is. I don't know why it isn't working, it worked before.. 2. Mikewell Jun 30, 2004 could be a secure sites issue... check out http://support.microsoft.com/?kbid=813444 good article, but i'd suggest leaving the sfc and system restore steps as a last resort, as both will strip off windows updates As Seen On As Seen On... Welcome to Tech Support Guy! Join over 733,556 other people just like you! Similar Threads - Can't sign 1. BML Thread Status: Not open for further replies. Short URL to this thread: https://techguy.org/271318 Dismiss Notice
global_01_local_0_shard_00002368_processed.jsonl/69812
 The Woe situation: issues, solutions. - Page 3 - Ragnarok Online Community Chat - WarpPortal Community Forums Jump to content - - - - - The Woe situation: issues, solutions. • Please log in to reply 51 replies to this topic #51 Mischelle Amateur Blogger • Members • 258 posts • Playing:Nothing Posted 25 February 2011 - 06:44 AM I've been playing RO for 5-6 years, in every guild I've been in, supplies were done by guild leaders. Every guild I ve ever heard of followed the same rule. You seem completely disconnected from the reality of our servers. I was going to take you apart again but at least two people who have led and continue to lead very successful guilds have already made the proper point here. With respect to their experience in the subject I will quote them for you. I don't know how much it will help you, but get people to hunt small amounts of each supply (we used to do like 100 stems each every day. 100 stems per person for my guild came out at about 2000 stems), we'd also collect up spores, blue herbs (in less amounts than stems and spores) people would donate bottles and I would hunt fabrics. I made all the supply and god item part zeny easily from making and selling my own bombs. It's everyone's guild, not just the leader's. There are many ways to get by but none of them involve changing WoE. idk siege treasures most of the time dont even cover half of the cost of siege and i stop caring about siege covering for siege. best thing to do is get your guildmates to help out where they can to cut down on some costs or do like guild events where drops are for guild funds and such that usually works if u want everyone involved to help out. Further, you have yet to discredit the facts that I established demonstrating that your excuse for your suggestion regarding changing WoE treasures is entirely without merit. Because you hung the legitimacy of your argument on the idea that WoE treasures dropping component supplies will inhibit botting, your entire argument is invalid unless you can posit a scenario in which your suggestion will actually have the effect you suggested. • 0 #52 Andini Too Legit To Quit • Members • 2697 posts • LocationNorcal • Playing:Ragnarok Online Posted 25 February 2011 - 07:51 AM i tend to barely ask for supplies. honestly if you really want to woe and look forward to woeing, you will do what you need to do to easily cover yourself for two days of a week or for most people just one day cause they have work/school/errands/out on weekday/weekend woe. if the guild leader is having trouble covering a big guild for supplies, then do your job as a guildie and go help out or supply yourself. the problem woe has no real goal and so there isnt much of a point of logging in for it anymore unless you dont like a group of people, as well as drops arent worth much because seals are rolling at snail pace In conclusion, your suggestion will not harm or discourage bots at all. To the contrary, it only encourages players to bot. This is because while a player may be interested in actually playing the game and hunting the items themselves if the incentive is great enough (i.e. high prices for hunted items), a player will not be interested in spending their time on the game when the incentive is low. Instead, they will use a bot so that their time is not wasted. this is assuming that the players that do "actually" hunt will turn to botting, which obviously isnt true. the players that are the ones that "actually" hunt are probably the ones more likely not to bot. Edited by Andini, 25 February 2011 - 07:58 AM. • 0 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
global_01_local_0_shard_00002368_processed.jsonl/69821
Skip to content Category: Mindfulness Photo by Ruffa Jane Reyes on Unsplash Why You Need Shabbat For Self-Care A Day of Rest Yay, it’s Saturday!! Well, I’m writing this on a Thursday and it’ll be posted on a … Continue Reading Why You Need Shabbat For Self-Care The Trouble With Trying I don’t know what I’m doing. When will I pull my life together? But really, does anyone ever? Does anyone … Continue Reading The Trouble With Trying full moon We Weren’t Always So Afraid of the Dark Sustainable Anarchy and the Downfall of Big Corporations A Freshly Stale Life Eventually I want to be a full time blogger. But until I reach that point, I need to work a job for a living. Maybe you’ve read some of my poems and noticed, but I’m pretty anti-capitalistic. See, capitalism as practiced here in America is not sustainable. So the thought of working as a part of a capitalist society is, well, soul crushing. Why am I Blogging? Maybe it’s because I was born on the Cusp of Magic(during the transition from Gemini to Cancer), but blogging just … Continue Reading Why am I Blogging? Remindfulness: the Past in the Present Moment I like to wash dishes in the morning. Not like a whole sink full of pots and pans or anything … Continue Reading Remindfulness: the Past in the Present Moment %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/69840
The Gateway to Computer Science Excellence +3 votes recurrence relation for the functional value of F(n) is given below : $F(n) = a_{1}F(n-1) + a_{2}F(n-2) + a_{3}F(n-3) + ....... + a_{k}F(n-k)$  where $a_{i} =$ non zero constant. Best time complexity to compute F(n) ? assume k base values starting from F(0), F(1), to F(k-1) as $b_{0} , \ b_{1} \ , b_{2} \ .... \ b_{k-1}$ ; $b_{i} \neq 0$ A. Exponential ( $O(k_{2}r^{k_{1}n})$)  B. Linear ( $O(n)$ ) C. Logarithmic ( $O(\log n)$ ) D. $O(n \log n)$ in Algorithms by Veteran (57.2k points) edited by | 529 views There should be base condition in order to stop the recurrence equation. Update it. thanks.corrected & updated. 1 Answer +1 vote So, $cr^{n-1}+cr^{n-2}+.................+cr^0=0$ Complexity will be $O(r^{n-1})$ where r is a constant by Veteran (119k points) OK ! Thanks. I think what you have calculated a simplified closed form of value given by the recurrence relation. [given recurrence relation F(n) is not for time complexity] example : $F_n=\frac{1}{\sqrt{5}}\left(\frac{1+\sqrt{5}}{2}\right)^n- \frac{1}{\sqrt{5}}\left(\frac{1-\sqrt{5}}{2}\right)^n$ for the fibonacci recurrence relation which depends on two previous terms. Here although F(n) grows exponentially, we know that if we use memoization or bottom up dp we can achive a linear time complexity to calculate F(n). Additionaly : If we use matrix exponentiation like below, $\left[ \begin{matrix} 1 && 1 \\ 1 && 0 \end{matrix} \right]^n = \left[ \begin{matrix} F(n+1) && F(n) \\ F(n) && F(n-1) \end{matrix} \right]$ Then T(n) for F(n) becomes $O(\log n)$ So my point is, What is the best time complexity we can achive to solve such a generic recurrence relation depending on k previous terms ? What if such questions asked in exam without specifying any algorithm ? yes for fibonacci number it will be O(n) where $c_{1}=\frac{1}{\sqrt{5}} c_{2}=-\frac{1}{\sqrt{5}}$ and r=$\left ( \frac{1\pm \sqrt{5}}{2} \right )$ but for matrix  it will be n terms summation rt? then how it will be log n? Using this we can calculate F(n) . We can create a matrix F[2][2] and initialize with {{1,1},{1,0}}, and calculate the powers (exponentiate ) of it using divide and conquer which takes $\log n$ if the qeury is F(n). Answer should be O(n) F(n)=$\left[ \begin{matrix} 1 && 1 \\ 1 && 0 \end{matrix} \right]^n$ = $\left[ \begin{matrix} n && n \\ n && 0 \end{matrix} \right] $ Now solving is possible in simplified form, rt? actually generating function helps here yes here they are getting (log n) complexity because they are squaring each time but in this matrix no need to do squaring each time rt? Uddipto are you referring to closed form calculation using generating function ? @Debashsish. The link which you have posted says the time complexity is Big-O($k^3.logn$). Its not Big-O($logn$). Requesting you to check once again and correct me if I am wrong. @srestha. The closed form says that the solution is of the form: $c1.{(root1)}^n + c2.{(root2)}^n...+...$    in general. Computing  ${(root)}^n$ takes Big-O($logn$) time. Now, if degree of the recurrance relation is 'd'(and so it would have maximum of 'd' roots), the time complexity to compute F(n) is Big-O($d.logn$) Thus, time complexity is Big-O($n.logn$) + additional complexity to compute the roots of the polynomial. Generally k is a finite constant No, 'k' is degree of the recurrance relation. It can even extend to 'n'. For example, Consider that F(n) is summation of all the previous terms from $(n - 1)$ to $0$. So, in such a situation, $k = n$. That would result to $O(n^{3}.log(n))$ I am aware of that fact. For that given relation k is a constant. But what my point was, k is small compared to n. in most of the possible cases. It's not like that you are increasing n and simultaneously increases k to n. Its mathematically feasible but, you might have seen in the link how they have multiplied two matrices,it's hardly of 4 to 5 degree. ok boss :) :) :)  How to define a recurrence where $n$th term depends on previous n terms? Shouldn't $k$ be a constant independent of $n$? @air1. We have been solving recurrances of the type where 'k' was constant. But I doubt if this is mandatory. Yes I wanted to know if those kinds of recurrences are valid. @air1. Consider the sequence, f(n) = 2.f(n -1)       = f(n - 1) + f( n - 1) Now, if we expand $2^{nd}$ f(n - 1), then we get previous terms. If we repeat the procedure of expanding only $2^{nd}$ terms, then we get f(n) = f( n - 1 ) + f( n - 2 ) + f( n - 3 ) + f( n - 4 ) .........2.f(0). Even though this is indirect expansion, I think we can have such recurrances. I havent studied higher mathematics :) . Quick search syntax tags tag:apple author user:martin title title:apple content content:apple exclude -tag:apple force match +apple views views:100 score score:10 answers answers:2 is accepted isaccepted:true is closed isclosed:true 50,737 questions 57,302 answers 105,007 users
global_01_local_0_shard_00002368_processed.jsonl/69850
Genomics Inform Search Genomics Inform > Volume 16(3); 2018 > Article Park: A Short Report on the Markov Property of DNA Sequences on 200-bp Genomic Units of ENCODE/Broad ChromHMM Annotations: A Computational Perspective The non-coding DNA in eukaryotic genomes encodes a language which programs chromatin accessibility, transcription factor binding, and various other activities. The objective of this short report was to determine the impact of primary DNA sequence on the epigenomic landscape across 200-base pair genomic units by integrating nine publicly available ChromHMM Browser Extensible Data files of the Encyclopedia of DNA Elements (ENCODE) project. The nucleotide frequency profiles of nine chromatin annotations with the units of 200 bp were analyzed and integrative Markov chains were built to detect the Markov properties of the DNA sequences in some of the active chromatin states of different ChromHMM regions. Our aim was to identify the possible relationship between DNA sequences and the newly built chromatin states based on the integrated ChromHMM datasets of different cells and tissue types. In 2011, the Encyclopedia of DNA Elements (ENCODE) consortium released the ChromHMM chromatin state annotations for 9 consolidated epigenomes, where ChromHMM is software developed by ENCODE labs, to integrate multiple chromatin datasets of various histone modifications to discover de novo the major combinatorial and spatial patterns of marks [1, 2]. The 15-chromatin-state model of the ENCODE Project consists of 15 states that are publicly available through 9 Browser Extensible Data (BED) files [3]. Since, large-scale epigenetic datasets such as ENCODE have become publicly available, a growing interest has been shown in predicting the function of non-coding DNA regions directly from sequence by utilizing these large-scale ChromHMM annotations [4-7]. On the other hand, many researchers have shown that formal language theory is an appropriate tool in analyzing various biological sequences [1, 2]. The hidden Markov model (HMM) is most closely related to regular grammars, because an n-gram is a subsequence of n items from a given sequence, and language models that are built from n-grams are actually (n-1)-order Markov models. We therefore proposed n-gram probabilistic language models for predicting the functions of ChromHMM regions of ENCODE [8]. In our previous study, we performed preliminary experiments to test whether the DNA sequences contained in each different chromatin unit of the ENCODE project possess the Markov property by applying Markov chains built from the two BED files of ENCODE tier 1 cell lines (GM12878, a B-lymphocyte lymphoblastoid cell line; and K562, a leukemia cell line) [8]. Our rationale for using the n-gram model was that each of the sequences contained in the ChromHMM chromatin states can follow a linguistic grammar, not merely as a form of short fragments of motifs or DNA signatures, but as a continuous and longer fragment of sequences. Our simulation studies showed that some of these chromatin states possessed strong Markov properties of DNA sequences, and could even be predicted by the naïve Bayesian classifier. However, our model could have been biased, as our n-gram analyses were conducted only on two of the cell lines. Thus, as a follow-up to our preliminary study on ENCODE datasets [8], we extend our previous study and continue our ongoing efforts to build comparative nucleotide frequency profiles to detect Markov properties by analyzing the datasets of the full range of 9 cells and tissue types provided by ENCODE. It was therefore critical to propose a new functional annotation framework that can be generalized to different cell types. A generalizable framework can be achieved through statistically-justifiable models. We downloaded BED files from ENCODE and combined all the annotations spread out through 9 different BED files, into a single integrated BED file. Based on the newly integrated BED file, we assigned a dominant chromatin state for each 200-bp unit. We then rebuilt newer Markov chains by iteratively analyzing the variability count of the chromatin states of each 200-bp unit. By eliminating the highly variable 200-bp units, in our simulation studies we finally analyzed the active chromatin states that showed a strong Markov property. When making 15-state ChromHMM BED files, the ENCODE consortium uses a core set of 9 chromatin markers [1]. We investigated whether some subsets of the annotated ENCODE 15-state model can be predicted by simply creating n-gram models of DNA sequences, in reverse [9]. To achieve this, ChromHMM blocks of human genome were initially dissected into a nucleosome resolution of 200-bp units and, by analyzing the 9 BED files of ChromHMM, each individual unit was assigned one dominant chromatin state. The process is explained in detail in the following sections: combining 9 BED files into a single file, filtering out highly variable 200-bp units, and finally building 5th order Markov Models. Combining 9 BED files into a single file The ENCODE consortium released a 15-state model BED file from an analysis of consolidated epigenomes, resulting in a total of 9 epigenomes for public download in ChromHMM BED files [3]. Fig. 1 shows the chromatin states of the 9 cell lines from chr1: 10,000 to chr1: 30,000 displayed in the University of California Santa Cruz (UCSC) genome browser (with human genome GRCh35/hg19). The BED format shown at the bottom of Fig. 1 provides a flexible way to define the data lines that are shown in an annotation track. The four BED fields shown in each BED file represents chrom (name of the chromosome), chromStart (starting position of the feature in the chromosome), chromEnd (ending position of the feature in the chromosome), and state (15 chromatin states, numbered from 1 to 15). For example, the chromatin state of Gm12878 shown at the bottom of Fig. 1, for the block from chr1: 10,600 to chr1: 11,137, is 13_Heterochrom/lo, whereas the chromatin state of K562, for the block from chr1: 10,937 to chr1: 11,937, is 8_Insulator. We attempted to build comparative nucleotide frequency profiles to detect their Markov property. Thus, it became critical to devise a functional annotation framework that can be generalized to different cell types. To design good predictive models in building the Markov chain atlas of the human genome, we modified the original BED files by dissecting the ChromHMM blocks in each BED file into 200-bp units. When the size of a dissected unit near the ChromHMM boundary is less than 150-bp, we discarded the unit, whereas when the size of dissected unit was greater than 150-bp, we rounded it up to a 200-bp unit. For example, the original Gm12878 block in Fig. 1, from chr1: 10,600 to chr1: 11,137 (a block size of 537 bp), was dissected into two units of 200-bp blocks (from chr1: 10,600 to chr1: 10,800; from chr1: 10,800 to chr1: 11,000), in a new BED file, by discarding the last unit. Likewise, the original K562 block in Fig. 1, from chr1: 10,937 to chr1: 11,937 (a block size of 1,000 bp), was dissected into five units of 200-bp blocks (from chr1: 11,000 to chr1: 11,200; from chr1: 11,200 to chr1: 11,400; from chr1: 11,400 to chr1: 11,600; from chr1: 11,600 to chr1: 11,800; and from chr1: 11,800 to chr1: 12,000), by rounding up the last unit. Profiling nucleotide frequency tables into units of 200-bp is a convenient way to build a general framework and test various Markov properties simply by combining these 200-bp frequency tables in various ways for specific purposes. Dissecting the blocks uniformly made it possible to combine all the annotations spread out through 9 different BED files into a single integrated BED file [10], as shown in Fig. 2. Each row of the integrated BED file shown at the bottom of Fig. 2 is composed of eighteen entries: chromosome number, starting block number, ending block number, and the remaining fifteen entries that show the number of annotation frequencies of each of the chromatin states, in the original BED files. For example, the chr1: 12,800-13,000 unit at the bottom of Fig. 2 shows that this specific 200-bp unit is annotated two times as state 7 (Weak_Enhancer), one time as state 9 (Txn_Transition), one time as state 10 (Txn_Elongation), and 5 times as state 11 (Weak_Txn) throughout the original 9 BED files, whereas all of the occurrence count numbers of the remaining chromatin states for this unit are zero (in 1, 2, 3, 4, 5, 6, 8, 12, 13, 14, and 15 states). Filtering out highly variable 200-bp units After integrating the BED files, we defined the variability count of the chromatin states of a given 200-bp unit as the number of states where counts of occurrences were non-zeroes, to define and compare the observed consistency of each chromatin state at any given genomic position across all 9 epigenomes. For example, the chromatin state variability count of the chr1: 12,800-13,000 block in Fig. 2 would be four, as there are four non-zero states (i.e., 7, 9, 10, and 11), whereas the chromatin state variability count of the chr1: 10,200-10,400 block in Fig. 2 would be one, as there is only one non-zero state. We could then use variability count statistics and maximum likelihood decision rule to create an optimal classification Markov model, as uniform priors can be assumed if 200-bp units with stable chromatin state are used. In this way, the highly variable 200-bp units, with which different chromatin states were frequently switched to other states across different tissues and cell types, could be eliminated in the training Markov transition tables. Our rationale behind this was that, compared to the highly variable 200-bp units, the 200-bp units that are less frequently changed would show a strong Markov property. When the human genome was dissected into a 200-bp unit, there were originally 14,148,124 units (see Table 1). Among these units, all of the variability counts of the chromatin states of 5,721,116 units were one, indicating that all 9 cell lines were annotated with the same state in these 200-bp units, and the variability counts of the chromatin states of 4,557,108 units were two. It also indicates that all of the 9 cell lines were annotated as either of the two states in these 200-bp units. This means that most of these 200-bp units have strong preferences for certain dominant chromatin state, where a dominant state of a 200-bp unit is the most frequently annotated chromatin state among the 15 chromatin states. This provided good heuristic insight for designing new Markov models for our study. Thus, it was possible to assign only one or two dominant chromatin states for most of the 200-bp units of the entire human genome. Building fifth order Markov models After we assigned a dominant chromatin state for each 200-bp unit, frequency counts were used to build fifteen initial transition tables for the fifth order Markov models [10]. For example, a uniform fifth order Markov chain is specified by a vector with initial probabilities P(Xn-5, Xn-4, Xn-3, Xn-2, Xn-1) for 4,096 components as well as a matrix of transitional probabilities P(Xn | Xn-5, Xn-4, Xn-3, Xn-2, Xn-1) with a size of 4,096 × 4. These tables were used to build a global Markov chain classifier to explore and rank sub-optimal predictions of the chromatin states. Based on the nucleotide frequency profiles, given a random sequence x1, x2,⋯, x200 in the state of a cell line, we compared sequences π1,π2,⋯,π200 of chromatin states that maximized the following probability of the initial 15 Markov chain models, where aπiπi+1 is a transition probability: By trial and error, we rebuilt newer Markov chains by iteratively analyzing the variability count of the chromatin states of a given 200-bp unit, and by eliminating the highly variable 200-bp units in training. Fig. 3 summarizes our process of building Markov chains. When the human genome was dissected into 200-bp units, there were originally 14,075,448 units. By trial and error, we rebuilt newer Markov chains by eliminating the highly variable 200-bp units in training. We finally excluded 200-bp units that showed more than two different chromatin state signatures when training our transition tables. Thus, our result is based on 7,038,863 units, which accounted for approximately 49.75% of the entire human genome. However, determining whether the remaining 50.25% of highly variable 200-bp units of the genome would show a Markov property is beyond the scope of this paper. By this process, we found that some inactive chromatin states were highly constitutive and marked in most of the 9 epigenomes. For example, state 13 (Hetero_Chromatin state), which covered on average 70.48% of each reference epigenome, was excluded when considering the variability count of the chromatin states. We also excluded units in which a transcribed state showed both promoter and enhancer signatures. Mostly, we profiled each 200-bp with chromatin states and built new transition tables by training the 200-bp blocks with a chromatin variability of less than 2 (and containing at least one active state). These fifteen chromatin states were then merged into six broad states: Promoter, Enhancer, Insulator, Transition, Repressed, and Inactive. Our final transition tables for the Promoter, Enhancer, Insulator, Transition and Repressed state (excluding inactive states) were built from 121,500, 701,636, 89,844, 4,023,295, and 155,411 200-bp units, respectively. As these Markov chains could be used as a Naive Bayes classifier, we calculated the sequence of each 200-bp unit that maximized our Markov models. We defined a correctly predicted unit as one in which the predicted result matched one of the dominant chromatin states in the same broad state. As a means to proving Markov property, we directly investigated whether our sequence-based Markov chain models for each chromatin state have the discriminating power necessary to identify different chromatin states. The samples were stratified according to chromosomes into strictly non-overlapping training and testing sets. A total of 6,334,977 200-bp units were trained, and 703,886 200-bp units were tested for prediction accuracy. At this time, reverse complements of sequences were not considered when building the Markov models, since the backward Markov chain could show similar properties for solutions. Table 2 shows the result: 52.86% precision for Promoter states, 37.95% precision for Transcribed states, and 59.82% for Enhancer states. These percentages were obtained by adding all units that were predicted correctly as a dominant state in each of the 200-bp units divided by the number of all testing units in the same broad group. By estimating the prediction accuracy of chromatin states, we infer that the Promoter states showed reasonable Markov property, the Repressed state did not seem to display Markov property, and those units related to the Enhancer states (4, 5, 6, and 7 states) were the most tissue specific, whereas those related to the Transcription states (9, 10, and 11 states) were highly constitutive. In this short report, we did not provide any interpretable biological meanings for our statistically defined dominant state, yet. Therefore, our study should only be considered from a computational perspective, and, is thus a preliminary work. Still, it is important to note that we only used DNA sequences contained in the epigenetic datasets in modeling the Markov chains. Our study showed that once a dominant state for each 200-bp unit is assigned, a generalizable Markov framework can be achieved. Based on the framework, we showed that some subsets of the active chromatin states possessed a strong Markov property. We are currently investigating the overall co-occurrence of the 200-bp chromatin states for ENCODE ChromHMM datasets together with Roadmap Genomics datasets [11]. Availability: We are using OSF (Open Science Framework) pages to host the study design, analysis plan, and data for our article. The datasets generated during the current study are available in the Open Science Framework repository, ( Fig. 1 Chromatin states of 9 cell lines from chr21: 33,031,600 to chr21: 33,041,600, shown in University of California Santa Cruz (UCSC) genome browser (GRCh37/hg19): the 15 chromatin states shown in the 4th field are numbered and abbreviated as: 1_Active_Promoter, 2_Weak_Promoter, 3_Poised_Promoter, 4_Strong_Enhancer, 5_Strong_Enhancer, 6_Weak_Enhancer, 7_Weak_Enhancer, 8_Insulator, 9_Txn_Transition, 10_Txn_Elongation, 11_Weak_Txn, 12_Repressed, 13_Heterochrom/lo, 14_Repetitive/CNV, and 15_Repetitive/CNV. These are the probabilistic categories based solely on the nine chromatin marks [1, 2]. Fig. 2 Combining the 9 Browser Extensible Data (BED) files into an integrated single file: the annotations are contained in nine separate BED files: embryonic stem cells (H1hesc. bed), erythrocytic leukaemia cells (K562.bed), B-lymphoblastoid cells (Gm12878.bed), hepatocellular carcinoma cells (Hepg2.bed), umbilical vein endothelial cells (Huvec.bed), skeletal muscle myoblasts (Hsmm.bed), normal lung fibroblasts (Nhlf.bed), normal epidermal keratinocytes (Nhlf. bed), and mammary epithelial cells (Hmec.bed) [1, 2]. Fig. 3 Flowchart of building Markov chains by iteratively eliminating highly variable 200-bp units. Table 1 Statistical distribution of variability counts of each chromatin state of 200-bp units Variability counts Annotation frequencies 1 5,721,116 2 4,557,108 3 2,534,396 4 934,644 5 311,234 6 77,050 7 11,658 8 890 9 28 Table 2 Prediction accuracy of newly built transition tables of six broad states by analyzing the variability of the chromatin states of 9 BED files Broad chromatin states Chromatin states No. of training units No. of testing units Prediction accuracy (%) for unit variability ≤ 2 Promoter state 1_Active_Promoter 66,513 7,390 59.42 2_Weak_Promoter 41,279 4,587 37.74 3_Poised_Promoter 13,708 1,523 66.57 Enhancer state 4_Strong_Enhancer 53,192 5,910 60.49 5_Strong_Enhancer 144,691 16,077 62.90 6_Weak_Enhancer 140,044 15,560 61.38 7_Weak_Enhancer 363,710 40,412 57.90 Insulator state 8_Insulator 898,44 9,983 27.37 Transition state 9_Txn_Transition 40,417 4,491 26.84 10_Txn_Elongation 552,758 61,418 35.31 11_Weak_Txn 3,430,120 381,124 38.51 Repressed state 12_Repressed 1,398,701 155,411 2.30 Inactive state 13_Heterochrom/lo NA NA NA 14_Repetitive/CNV NA NA NA 15_Repetitive/CNV NA NA NA BED, Browser Extensible Data; NA, not available. 1. Ernst J, Kheradpour P, Mikkelsen TS, Shoresh N, Ward LD, Epstein CB, et al. Mapping and analysis of chromatin state dynamics in nine human cell types. Nature 2011;473:43-49. crossref pmid pmc 2. Ernst J, Kellis M. ChromHMM: automating chromatin-state discovery and characterization. Nat Methods 2012;9:215-216. crossref pmid pmc pdf 3. ENCODE. Encode chromatin state segmentation by HMM from broad institute, MIT and MGH Santa Cruz: UCSC Genome Bioinformatics, Accessed 2018 Aug 30. Available from: . 4. Ward LD, Kellis M. HaploReg: a resource for exploring chromatin states, conservation, and regulatory motif alterations within sets of genetically linked variants. Nucleic Acids Res 2012;40:D930-934. crossref pmid 5. Ritchie GR, Dunham I, Zeggini E, Flicek P. Functional annotation of noncoding sequence variants. Nat Methods 2014;11:294-296. crossref pmid pmc pdf 6. Lu Q, Hu Y, Sun J, Cheng Y, Cheung KH, Zhao H. A statistical framework to predict functional non-coding regions in the human genome through integrated analysis of annotation data. Sci Rep 2015;5:10576. crossref pmid pmc 7. Zhou J, Troyanskaya OG. Predicting effects of noncoding variants with deep learning-based sequence model. Nat Methods 2015;12:931-934. crossref pmid pmc pdf 8. Lee KE, Park HS. Preliminary testing for the Markov property of the fifteen chromatin states of the Broad Histone Track. Biomed Mater Eng 2015;26( Suppl 1):S1917-S1927. crossref pmid 9. Park HS, Galbadrakh B, Kim YM. Recent progresses in the linguistic modeling of biological sequences based on formal language theory. Genomics Inform 2011;9:5-11. 10. Park HS. Epigenetic HMM models. Open Science Framework 2018. Accessed 2018 Aug 30. Available from: . 11. Roadmap Epigenomics Consortium, Kundaje A, Meuleman W, Ernst J, Bilenky M, Yen A, et al. Integrative analysis of 111 reference human epigenomes. Nature 2015;518:317-330. crossref pmid pmc pdf Browse all articles > Editorial Office Copyright © 2020 by Korea Genome Organization. All rights reserved. Developed in M2community Close layer prev next
global_01_local_0_shard_00002368_processed.jsonl/69857
Busy week! Hi folks and hypothetical readers. Outback Bar Anyway, another reason to be  busy( and I blame this on my friend Humberto), is that I’ve found a really interesting new game called Banished, simple enough just a game about settlers in the wilderness, you have to help them build a village and survive throughout generations. Firstly I tried it out with illegal download, after all the game is only for Windows and I use Linux and OSX, I require some experimental time, of the game itself  and how it will work on my system, before committing to it. So at first I just install it on my laptop and actually use its windows OS for the first time( its dual-boot with Debian), fall in love instantly with the game, there is just something, seeing your villagers thrive and procreate in the wild, and of course the curiosity and figuring out the new game. And this is something I want to share too, I’ve spent some time figuring out how to play the actual game, but also some time on how to get it working on Linux under wine, though initially it had several problems it does actually work now, except for a buggy sound which surely will fixed anytime soon. Besides that, the developer clearly showed intent to port the game to Linux and mac systems, this is a huge plus one with me and I’ll sure buy it. If you’re interested its available on the Humble Store, which happens to be my favorite destination on buying indie games, specially if you happen to find some of their great deals. Well its late for me and cheers to anyone reading this post, I’ll try to post soon on how to get Banished working on Linux, and how actually survive the game. Bye. Published by To be Written Leave a reply (^_^)b WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/69865
I would like to try making a map that visually reproduces a mountain/hill and contains hiking trails, just like this one: http://i.stack.imgur.com/PdcnM.jpg I imagine some steps like this: 1. Generate a realistic 45 degrees (or so) representation of the area (from GIS) - how? 2. An artist (painter) draws the visual simplified representation of what you get on firsts step and then trails are added. Did anyone do maps like this and knows exactly how to make one? • 1 use Google Earth? – tomfumb Dec 18 '12 at 17:59 • 1 What software is available to you? You are correct that the image you linked to is heavily drawn by an artist rather than GIS software. – Baltok Dec 18 '12 at 18:23 • 11 • Great reference, @Mapperz. +1 – RyanKDalton Dec 18 '12 at 19:43 • I would try any software there is on Linux (Ubuntu), but I start thinking it might not be so much of GIS (or none of all) for these maps, one photo is enough to start painting this. – conualfy Dec 18 '12 at 19:43 Browse other questions tagged or ask your own question.
global_01_local_0_shard_00002368_processed.jsonl/69866
Simple way to access various statistics in git repository. Installation Windows Linux macOS Docker or you can install directly: bash <(curl -s Works on Windows, Linux and macOS (or you can use the Docker image). Contribution stats List of everyone who contributed to the repository. Code reviewers Find the best people to contact to review code. Git changelogs Easy to fetch git changelogs. You can run on every OS with a Bash shell. Open source Git-quick-stats is free, open source software licensed under MIT. More screenshots Getting started • Git log since and until You can set the variables _GIT_SINCE and/or _GIT_UNTIL before running git-quick-stats to limit the git log. These work similar to git's built-in --since and --until log options. export _GIT_SINCE="2017-01-20" export _GIT_UNTIL="2017-01-22" Once set, run git quick-stats as normal. Note that this affects all stats that parse the git log history until unset. • Git log limit You can set variable _GIT_LIMIT for limited output. It will affect the "changelogs" and "branch tree" options. export _GIT_LIMIT=20 • Git pathspec You can exclude a directory from the stats by using pathspec export _GIT_PATHSPEC=':!directory' You can also exclude files from the stats. Note that it works with any alphanumeric, glob, or regex that git respects. export _GIT_PATHSPEC=':!package-lock.json' • Git merge view strategy You can set the variable _GIT_MERGE_VIEW to enable merge commits to be part of the stats by setting _GIT_MERGE_VIEW to enable. You can also choose to only show merge commits by setting _GIT_MERGE_VIEW to exclusive. Default is to not show merge commits. These work similar to git's built-in --merges and --no-merges log options. export _GIT_MERGE_VIEW="enable" export _GIT_MERGE_VIEW="exclusive" • Color themes You can change to the legacy color scheme by toggling the variable _MENU_THEME between default and legacy export _MENU_THEME=legacy Thank you for your support! 🙌 If you or your company use this project or like what We're doing, please consider backing us so We can continue maintaining and evolving this project and new ones. Sponsor us This project exists thanks to all the people who contribute. Thank you to all our backers! 🙏
global_01_local_0_shard_00002368_processed.jsonl/69895
I'm trying to create a rotating radar type effect in Photoshop CC 2018. So I created a circle and a pie slice from that circle and linked them up. When I rotate the big circle the pie slice animates like an independent object rather than part of a circular rotation. A pie slice rotating jerkily inside a circle Instead of linking the slice to the circle and animating the circle, try grouping the circle and the pie slice and animating the entire group. This should fix everything. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/69912
• Hairdressers Bath Ladies Cut & Blow Dry  from £50 Ladies Blow Dry   from £30 Head Stylist Ladies Cut & Blow Dry  from £45 Ladies Blow Dry   from £25 Ladies Cut & Blow Dry  from £40 Ladies Blow Dry   from £23 Junior Stylist Ladies Cut & Blow Dry  from £36 Ladies Blow Dry   from £20 Brazilian Blow Dry £80 for up to Short hair £100 for  Mid length hair £120 for Long hair (first visit and student discount can not be used on this service ) Colour Creative Work Balayage from £110 Balayage  Refresh from £80 Toners From £20 Colour correction and fashion colours are available on request, A consultation is required. A skin test is also required for a full head tint. Foil Full Head from £96 Long hair from £101 Foil Half Head from £64 Long hair from £70 Foil T-Section from £50 Long hair from £56 Permanent Colour/Semi permanent from £42 Regrowth from £38 Long Hair from £48 Full Head Bleach from £90 Regrowth from £75 Head stylist Foil Full Head from £89 Long Hair from £96 Foil Half Head from £61 Long Hair from £66 Foil T-Section from £49 Long Hair from £52 Permanent Colour / Semi Permanent From £39 Regrowth from £36 Long hair from £45 Full Head Bleach from £80 Regrowth from £55 Foil Full Head from £85 Long hair from £91 Foil Half Head from £56 Long hair from £61 Foil T-Section from £45 Long hair from £51 Full Head Permanent colour / Semi permanent from £37 Regrowth from £30 Long hair from £42 Full head bleach from £80 Regrowth from £50 Junior stylist Foil Full Head from £75 Foil Half Head from £46 Foil T-Section from £40 Permanent Colour from £35 Special Offers 20% Student Discount, Monday to Thursday can only be used on full price cut and blow drys/full price colour service, 15% Off your first visit on full price colour and cuts, Recommend a friend they receive £10 off there services and so do you, Express Cuts £25, Dry cut or washed then blasted off does not include restyle or blowdry. Additional Cutting & Styling Services Hair Up All hair up from £30, a consultation may be required. A restyle is £5 extra. We define a restyle as a complete change of hairstyle and the additional cost is for the extra time taken. Childrens Cuts 0-16 from £12 to £24 Wellaplex treatment from £5 to £25, Olaplex as stand alone treatment £25, Olaplex added into colours from £10 to £20, Tigi Sos Conditioning treatment £20, Tigi booster treatments from £10.
global_01_local_0_shard_00002368_processed.jsonl/69925
A Developmental Checklist for 4-Year-Olds Milestones represent averages, which can give you an idea about what to expect from your 4-year-old. These milestones can alert you to potential concerns and reassure you that he is on par with others his age. At the age of 4, your child is considered a preschooler, an age when motor skills, language and social development milestones are achieved at what seems to be a lightning pace. Keep in mind that all children are unique and develop at slightly different rates; if you have concerns, talk to your child's pediatrician. Motor Skills Motor skills can be divided into two distinct categories: gross and fine. Gross motor skills involve the bigger muscle groups that control balance and activities such as running and jumping, At the age of 4, children should be able to move in a controlled fashion, according to Great Schools. This means they can start, stop and turn when running, hop on one foot and even gallop. They can easily catch, throw overhead and bounce a ball. Four-year-olds are able to groom themselves when it comes to brushing hair and teeth and can get dressed with little help from an adult, notes Great Schools. Fine motor skills involve control over activities performed by the hands. A 4-year-old's fine motor skills should be developed to the point where he can handle a pencil or crayon and draw some shapes, according to HealthyChildren.org 3. When it comes to other devices, a 4-year-old can use a fork and a spoon comfortably to eat without assistance and cut on a line using a pair of scissors. Language and Thinking Skills Language and thinking developmental milestones appear to grow together exponentially when your child reaches her fourth birthday 123. She should speak in relatively complex sentences that have more than five words, count to 4 and even sing simple songs solo. She should be able to comprehend words that relate one idea to another, such as "if," "why" and "when." This is the age when your child will begin to understand that a picture or symbol can represent something real (e.g., a logo for a favorite restaurant) and begin to identify patterns to categorize things (round things, things that are blue, etc). Even though a 4-year-old can't comprehend the difference between a year or a month, she can understand something is taking place tomorrow vs. something that already happened. With all this activity going on in a 4-year-old's brain, it is no wonder MedlinePlus states this is the age when a child asks the most questions. Social and Emotional Skills Socially and emotionally, a 4-year-old's growth is rapid. When a 4-year-old is mad, he is able to verbalize this rather than resorting to more physical forms of communication, such as hitting or kicking. Emotionally, he is capable of feeling jealousy and may even begin to lie when he needs to protect himself. That being said, he is still too young to grasp more complex moral concepts like right or wrong. While a 4-year-old is likely to be fiercely independent, he is known to rebel when expectations set by those in charge are excessive. And even though a 4-year old can distinguish fact from fiction, he still enjoys pretending and can have vivid imaginations that include imaginary friends, states Great Schools.
global_01_local_0_shard_00002368_processed.jsonl/69952
Top 10 Anti-Counter Cards in Magic: The Gathering Updated on October 9, 2019 Jeremy Gill profile image What Are Counters and Anti-Counters in Magic? Any player worth their "Mana Drain" knows about countering, an ability the blue faction specializes in. Most counters are instant spells that you chain onto opposing cards—"countering" them and essentially negating their activation. Counters are particularly prevalent in the extended matches of EDH format; how can players fight back against spells that can disable anything you play? Thankfully, we have a wealth of potent anti-counter spells to help bypass blue's tricks. Many are immune to countering and shield your other spells, but with dozens of units available, which barricading forces reign supreme? These are the ten best anti-counter spells in Magic: The Gathering! 1. Dragonlord Dromoka 2. Gaddock Teeg 3. Taigam, Ojutai Master 4. Prowling Serpopard 5. Savage Summoning 6. Overmaster 7. Surrak Dragonclaw 8. Insist 9. Vexing Shusher 10. Grand Abolisher Dragonlord Dromoka Dragonlord Dromoka 10. Dragonlord Dromoka CMC (Converted Mana Cost): 6 As a legendary creature, Dromoka can serve as commander in EDH format, though her high mana cost makes her a late-game combatant. Still, green's mana ramp prowess helps field her more quickly, she enters with an impressive 5/7 (five power and seven toughness), and she bears flying and lifelink, soaring over ground blockers and recovering health upon dealing damage. Not only is Dromoka immune to being countered, but she also prevents your opponents from playing spells on your turn, defending against counterspells and other instant tricks. Powerful, life-gaining, and bearing dragon synergies, Dromoka's a formidable unit—the trick is accessing her early enough to make a difference. Gaddock Teeg Gaddock Teeg 9. Gaddock Teeg CMC: 2 Legendary Teeg shares Dromoka's green/white pairing, but at just two mana, he's on the lower end of mana costs. He enters with a solid 2/2 and prevents all players (including you) from casting non-creature spells with a CMC of four or more, or those that have variable X amounts in their cost. While this isn't specifically an anti-counter tactic, it excellently guards against instants. Inexpensive counters ("Counterspell", "Mana Leak", etc.) can still break through, but you've handily disabled not only high-cost tricks like "Cryptic Command", but also expensive planeswalkers, enchantments, and other non-creatures tactics. Of course, build your deck accordingly to avoid the net yourself. Taigam, Ojutai Master Taigam, Ojutai Master 8. Taigam, Ojutai Master CMC: 4 Yet another legendary creature, Ojutai offers some interesting anti-counter prowess to the blue faction itself. His stats are a respectable 3/4, and he's risky since he himself can be countered. However, after successfully arriving, this human monk prevents your instants, sorceries, and dragon creatures from being countered, offering a plethora of hefty shields. As icing on the cake, if you cast an instant or sorcery on a turn where Ojutai attacked, he grants your spell the valued rebound trait, letting you exile it and cast it again (for free!) during your next upkeep. Once he's safely arrived, Ojutai offers several excellent passives and is conveniently just sturdy enough to endure a red "Lightning Bolt", making him a daunting force in EDH. Prowling Serpopard Prowling Serpopard 7. Prowling Serpopard CMC: 3 Serpopard bears the unusual but appreciated cat and snake subtypes, stacking well with several white and green clans. He bears an excellent 4/3 stats considering his low price, and can't be countered, ensuring his entrance. Beyond that, Serpopard grants your other creatures a similar immunity to counters, adeptly protecting your entire army. Since green is known for its beefy monsters, anything that supports and shields them is vital to its success—you'll find few better defenses than Serpopard. Savage Summoning Savage Summoning 6. Savage Summoning CMC: 1 While it only works once, Savage Summoning is an inexpensive instant that masterfully empowers an upcoming troop. Summoning can't be countered, and it inoculates your turn's next creature against negation, also granting it flash (letting you play it at instant speed) and having it arrive with an extra +1/+1 counter. All this for a single forest's mana! As a bonus, remember that Summoning also helps activate the reduced costs of cards with surge (who are discounted when you previously play other spells in a round), and adeptly stocks your graveyard for cards with "threshold", "spell mastery", or "delirium" effects. 5. Overmaster CMC: 1 Unlike Summoning, Overmaster only functions at sorcery speed, but its fierce effects more than compensate. For a single red mana, you render your turn's next instant or sorcery immune to being countered. Then, you draw a card. It's as simple as that. While Overmaster itself can be disabled, if it tricks your opponent into countering a single-cost spell, it's accomplished its mission anyway, draining your foe's resources. 4. Insist CMC: 1 Insist is green's counterpart to Overmaster, functioning with the same CMC, sorcery speed, and draw power. However, instead of barricading your next instant or sorcery, Insist fortifies an upcoming creature, making it a strong alternative or supplement to Summoning. With tools like Insist, Summoning, and Serpopard, green contains several options to ensure the safe arrival of its warriors. Speaking of which... Surrak Dragonclaw Surrak Dragonclaw 3. Surrak Dragonclaw CMC: 5 True, Surrak needs a hefty chunk of five mana, three different colors, and he only protects your creatures' spells from being countered. But I'll eat a "Black Lotus" if he's not worth the effort. Not only does Surrak enjoy a stellar 6/6 for his price, but he also bears flash, letting you cast him at instant speed. Maybe you're still not sold—how about the fact that he himself can't be countered, and he wields the human and warrior subtypes? Still not convinced? Consider that Surrak grants your other creatures trample, letting them bleed excess damage through blockers. If his excellent stats and slew of powerful abilities haven't won you over, maybe his surprisingly low price tag will, often costing less than three dollars! Surrak's a great card that I use whenever I have the corresponding mana types, and I'm genuinely surprised a mythic rare as competitive as him is that cheap. Vexing Shusher Vexing Shusher 2. Vexing Shusher CMC: 2 Accepting either red or green mana for his cost, Shusher's easy to field even if your land draws have been stale, and he helpfully belongs to the abundant goblin family (and shaman for good measure). Plus, he wields a fair 2/2, can't be countered, and by spending either a red or green mana, he can render a target spell immune to being countered. Fortunately, you can wait until after your opponent tries to counter, then simply chain Shusher's effect, ensuring you only have to spend the extra mana when your opponent actually attempts a negation. Grand Abolisher Grand Abolisher 1. Grand Abolisher CMC: 2 Perhaps my favorite white spell of all time, Grand Abolisher specifically requires two white mana, so he can be a bit unwieldy in multicolor decks. Still, he arrives with a respectable 2/2, the helpful human and cleric subtypes, and prevents your opponent from casting spells and activating abilities on your turn! That's an incredible net for such an inexpensive creature, letting your moves proceed unhindered. This not only shuts down counters but any other instants or flash spells. An excellent barrier with a variety of applications, but note that Abolisher himself can be countered (although forcing a counter for a two-cost spell is a win in itself) and doesn't defend during opposing turns, so be careful when casting your own instant shenanigans. Creatures Who Can't Be Countered and Cascade Spells If you don't want to devote large portions of your deck to disabling counters, but still seek protection from them, look for battle-worthy beasts like "Mistcutter Hydra" who can't be countered, letting them (if nothing else) pass through unchecked. Additionally, note that cards with cascade make solid anti-counters, as their ability (which plays a spell with a lower CMC from your deck) activates even if negated. Despite blue's prevalence in the extended matches of EDH, we're not without tools to fight back, and today's cards have you well on your way to counter freedom. But for now, as we eagerly await Wizards of the Coast's next batch of anti-counter spells, vote for your favorite card, and I'll see you at our next MTG countdown! Which card do you prefer? See results Questions & Answers © 2018 Jeremy Gill 0 of 8192 characters used Post Comment • Jeremy Gill profile imageAUTHOR Jeremy Gill  14 months ago from Louisiana Great suggestions, those cards are in my notes for a possible follow-up countdown. Souls works great when you're maining a single creature type, and Teferi's excellent as soon as you can afford him. • profile image 14 months ago from Quezon City, Philippines Cavern of Souls and Teferi, Mage of Zhalfir This website uses cookies Show Details LoginThis is necessary to sign in to the HubPages Service. AkismetThis is used to detect comment spam. (Privacy Policy) Google AdSenseThis is an ad network. (Privacy Policy) Index ExchangeThis is an ad network. (Privacy Policy) SovrnThis is an ad network. (Privacy Policy) Facebook AdsThis is an ad network. (Privacy Policy) AppNexusThis is an ad network. (Privacy Policy) OpenxThis is an ad network. (Privacy Policy) Rubicon ProjectThis is an ad network. (Privacy Policy) TripleLiftThis is an ad network. (Privacy Policy)
global_01_local_0_shard_00002368_processed.jsonl/69958
So this is a weird one. 3 weeks ago I made an Xmas beer. I brewed it, pitched the #2 yeast, and put the carboy in my cold dark room (about 70 F) to ferment. The fermentation and krausen began about 18 hours after brewing, and lasted for 6 days or so. I measured the FG and it was spot-on so I continued as planned. All was well. I really like the recipe so I brewed another batch 2 days ago (on Sunday). I pitched the #2 yeast and again put the same carboy in the same dark room at the same temperature. Again, the fermentation / krausen began about 18 hours after brewing. However, tonight I took a look at the carboy only to find that the krausen has completely sunk to the bottom... 4 days earlier than the identical recipe did the last time. What happened? It's still fermenting given that I can see the 3-piece airlock bubbling, but what is the deal with the super early krausen drop? I'll give it 7 days, measure the FG, and hope for the best, but can anyone explain the reason that batch 1 went 6 days before the krausen dropped and batch 2 went less than 48 hours?! • The bubbles in the airlock could just be CO2 coming out of solution. It may not be a sign of active fermentation. – FishesCycle Nov 26 '14 at 15:46 • @TobiasPatton CO2 is a byproduct of yeast eating sugar to produce alcohol, so I'd contend that it in fact is a sign. – Haney Nov 26 '14 at 15:59 • 2 A bubbling airlock certainly indicates that fermentation has occurred, but does not necessarily indicate that fermentation is still occurring. – FishesCycle Nov 26 '14 at 19:13 • Ahh, I see what you're saying. Might be leftover CO2 from prior fermentation. – Haney Nov 26 '14 at 19:15 Use a sterile wine thief to get a sample and take a specific gravity of your current product. How does it compare to the final gravity of your previous batch. Since fermentation is still proceeding, we can guess that you haven't reached your target gravity yet. Which means the krausen is heavier that it was last time... Possible causes... Did you use different water, or treat your water differently in preparation for the second batch? Given that it is an Xmas beer, are there any components with limited shelf life? Fruit augments can act differently depending on their freshness. Even if proper sterility is maintained, the chemical make up of ripe fruit is different from that of green fruit. The white elephant in the room is infection. Are there any off-smells? Aside from the fallen krausen, does your product look any different than last time? Are there more free floating particles than usual? How is the color? I would suggest that you let the fermentation complete as normal, and see what the result smells like? If you still have a bottle of the previous batch, use it as a basis for comparison (smell, color, taste). Chances are that it will be fine. Small differences happen all the time between batches; after all, yeast is life and life can be unpredictable. • Same water (both from a 5 gallon spring water jug from a grocery store). No Xmas ingredients in primary - all secondary so it isn't that. Doesn't smell off to me, seems about the same in appearance, just accelerated. I'll beer thief it in a few here and see what it's doing (and taste it then too). – Haney Nov 26 '14 at 5:46 • OK current gravity 1.022 expecting 1.014 so clearly not done. Smells good. Yeast still moving about in carboy. Tastes very much like alcohol (but not hot like fusals) and fairly bitter. It is an ale consisting mostly of crystal so it should not be bitter. Guessing that's the yeast I'm tasting and isn't done yet. Thoughts? – Haney Nov 26 '14 at 6:47 • 1 You could be right about the bitter being the yeast. I only taste young beer when I'm worried about it, so I've never developed a catalog of "Two day old healthy yeast tastes like..." values. Probably a good thing to do during my next batch. From your ruling out fusals, it sounds like you have a well developed palette. I'm out of ideas on this one. But there is a lot of talent on this board, so hopefully someone can enlighten both of us. Best of Luck with this! – Henry Taylor Nov 26 '14 at 15:04 • Same issue here re: 2 day old beer. Never bothered to try it so I don't know what it should taste like either. I'll taste it again on Saturday which will be a week of primary fermentation. If it tastes good and FG is right then all will be well. I'll update this post if I remember too. – Haney Nov 26 '14 at 15:33 • Update... Tasted it and measured it again today, down to expected FG of 1.014 on the nose which is good. Still tastes bitter but seems a little less bitter than last night, so I'm going to leave it alone now until Saturday or Sunday and secondary + taste again then. At least fermentation completed, but perhaps too quickly. One thought I had was I noticed the yeast I used was very very fresh, having only been bottled 3 days before I used it. Could be very healthy maybe? Hoping the bitterness goes away in time, regardless. – Haney Nov 26 '14 at 19:45 Many factors: • Was the 2nd yeast of the same lot code?! Yeast is finicky and may simply not react the same way twice if anything is even slightly different in your mix. • Was the malt extract exactly the same as the 1st batch? Dry vs. liquid, fresh vs. 2 years old? Anything different in how you prepared additions like Chrystal malt, etc.? • Any differences in the boil? EG: Longer or shorter boil time? Longer or shorter time to cool to room temp? Partial boil vs. full volume? • Did you change your water in any way? Did it come out of the cold-water tap as before or did you use another source, such as mineral water from a 5 gal container? • Did you aerate the wort in exactly the same way the 2nd time? The fact that fermentation continued means you are probably ok, though any of the above factors might have made it taste slightly different from the first batch. But without industrial quality control of our kitchen or basement environments that's unavoidable and makes homebrew such a joy :) • Different malt brands but same malt type (light DME), same yeast from same lab but diff lot code for sure (was only bottled 5 days prior to my using it). Boil was identical in almost every way. Same water. Aerated in basically the same way also. Thanks for your input and info on this! – Haney Dec 6 '14 at 16:12 • 1 My guess would be the different malt. Much of the krausen is protein and hop resin pushed up by the escaping CO2. Your 2nd malt brand may simply have obtained a different protein/peptide composition according to how it reacted to the vigourousness of your boil and the cold break during the cooling of the wort, vs. your 1st malt brand. – tinypriest Dec 6 '14 at 19:26 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/69961
How to Improve the Look of Old Laminate Countertops for Less Written by Ruth de Jauregui; Updated July 21, 2017 A faux granite finish dresses up old laminate countertops. A faux granite finish dresses up old laminate countertops. granite pattern image by jimcox40 from Things You Will Need • Sandpaper, fine • Tack cloth • Painter's tape • Plastic or old newspapers • 1 quart of primer • 2 cans of stone spray paint • 1 quart of polyurethane • Paintbrush Experiment with paint colors and styles on a piece of scrap wood prior to the renovation. For a three-tone finish, try alternating two different colors of stone. Consult with the paint department of your store to match the type of primer to the spray paint. Generally, you should use an oil-based primer with oil-based spray paint and latex primer with latex spray paint. Open kitchen doors and windows, and use a fan to help disperse the paint fumes. Do not use spray paint near an open flame, like a pilot light. Avoid placing hot pans or cutting foods on the new finish; instead, use trivets and cutting boards. Whether you are a new owner or are seeking to do a kitchen renovation on a budget, dressing up an old laminate countertop is only as far away as the hardware store. As a budget-friendly solution, stone spray paint is easily applied over a primer base coat. With the addition of several coats of polyurethane, you can point to your new "granite" kitchen countertops with pride. 1. Measure the countertops carefully. One can of spray paint covers between eight and 15 square feet, depending on the coverage depth and how many coats you apply to the countertops. 2. Wash the countertops and backsplash with dishwashing liquid and water. Rinse them with clear water and allow them to completely dry before proceeding. 3. Sand the countertops and backsplash with fine sandpaper. You want to take the gloss off of the surface so the primer adheres to the old finish. Wipe the counters with a tack cloth to remove all traces of dust. 4. Mask the wall and other areas with painter's tape. Remember that spray paint drifts, so cover the wall at least one foot above the countertops and backsplash. Also mask around and over the sink and faucets; use newspaper or plastic to protect the sink. 5. Roll on two coats of primer in an appropriate color. For example, if you want a granite-look finish with a blue undertone, have the primer tinted to a light blue-gray color. Allow the primer to dry for at least 24 hours. 6. Shake the can of stone spray paint until the ball rattles freely, or at least one minute. Lightly spray the countertop with the first coat. Continue shaking the can as you work. Allow 15 minutes between coats. It may take four or five light coats of paint to reach the coverage desired. Allow the paint to dry for at least 24 hours. 7. Stir the can of satin or gloss polyurethane carefully; try to avoid making bubbles. Brush two or three coats of the polyurethane over the countertops. Allow the polyurethane to dry completely before using the kitchen. About the Author Ruth de Jauregui Photo Credits bibliography-icon icon for annotation tool Cite this Article
global_01_local_0_shard_00002368_processed.jsonl/69977
Where We Are Now: More on the Culture of Fear Image of ghost town in Japan, near Nagasaki, abandoned when the coal ran out, from pxhere, CC0 Three years ago I wrote an article entitled A Culture Driven By Fear: The Psychology of Collapse that argued that while healthy cultures strive to meet their members’ essential needs and wants, and are driven and made cohesive by love, dysfunctional cultures, like our current global industrial civilization culture, are indifferent to their members’ needs and are driven by fear. This essay elaborates on that thesis. Culture is the collective beliefs, aspirations and behaviours of a group of people (or other creatures). It is what keeps them together. Study tribal cultures, wild animal cultures, and even a few modern subcultures, and you will see little sign of coercion — they believe and want the same things, and joyfully do what is understood to be in the group’s collective interest. Humans are of necessity a social species: We are physically quite weak and vulnerable (compared to most other creatures), and lacking much inherent self-sufficiency and autonomy (we spend a long period in the womb and another long post-natal learning period). Loners do not fare well inside or outside human cultures. We rely on each other to survive and to thrive, so it is not surprising that evolutionarily successful cultures are built on love and willing collaboration. That collaboration is directed to meeting the collective needs of the group, which, in addition to the obvious physical needs for food, water, sleep and protection from uncomfortable weather (shelter, warmth etc) include essential emotional and psychological needs, some of which I enumerated in another recent article, drawing on the work of  Johann Hari, Gabor Maté and David Foster Wallace: 1. the need to belong to and connect with a safe and engaging community, starting with attachment to one’s mother in the critical first years of life 3. the need to be valued, appreciated, and heard 6. the need to be regularly and closely in touch with the natural world 7. the need for a sense of place and home While most healthy tribes’ and communities’ collective effort is oriented to meeting these physical and emotional needs, such cultures are also driven, at least secondarily, by certain healthy fears. I have written elsewhere that I think there are three primary fears in every human culture: 1. fear of suffering (our own and loved ones’), and the related fears of the unknown and potentially-traumatizing surprises; 2. fear of not being in control (helplessness, disability, incapacity, dependence, being trapped) and the related fears of social anxiety, lack of autonomy, lack of essential knowledge, and of “not having enough” (uncontrollable scarcities, including time); and 3. fear of failure and inadequacy (ridicule, incompetence, letting oneself and others down). These fears are evolutionarily healthy because they drive behaviour which is cautious, sensitive, self-responsible, and responsible to the other members of the community. I have written before about famous experiments with rats that show what happens to the behaviours and social cohesion of a group when they are facing extreme stress (namely, numbers vastly greater than the resources needed to feed and support them). It seems to me our modern culture is strikingly similar to the behaviour of rats placed in deliberately overcrowded and resource-starved situations. The ‘alpha’ rats in such situations hoard, attack, steal from and kill the others, while the subordinates cower, commit suicide, and eat their own young. How can we account for such seemingly suboptimal behaviour, which abandons the principles of love, collective sharing and nurturing basic needs, and seems instead driven almost exclusively by the stress and fear that overpopulation and extreme scarcity can easily provoke? It presumably must have served some kind of evolutionary purpose. Perhaps it produces a quick and desperate self-limiting of numbers so that the surviving relatively healthy minority can begin again, once the balance between population and resources (both for the species and the ecosystem of which it is a part) has been restored. If we were to witness such a tragic and violent social collapse in a laboratory, would we wish for it to play itself out quickly (to bring the violence and suffering to an end), or would we try to prolong it by throwing in a bit more cheese? I know humanists think such comparisons are preposterous, that humans with our higher ‘consciousness’ and intelligence are not like rats and can develop more successful and less painful survival strategies. Unfortunately, a study of cultural history provides absolutely no evidence they are right. I think what we are seeing now is a culture driven almost entirely by fear. In our modern anonymous cities we have lost the capacity to care for most others. Parents don’t have the time to show and teach children how to meet their basic needs, especially during the crucial first few years of life. More and more of us are unable to function effectively in the workplace or the society at large. Our modern pressure-cooker lab-rat human culture offers us none of our eight essential emotional needs. It’s been my experience that our reaction when those needs aren’t met is usually a combination of anger (feelings of frustration, blame, indignation, helpless rage etc), shame (feelings of humiliation, disgrace, social ostracism, failure etc), and grief (feelings of irrevocable loss and sadness), which are in many ways interrelated and self-reinforcing, and that what underlies all of these emotional reactions is fear, of one or more of the three types described above What I think we are seeing, and have been seeing at least since the beginning of industrial civilization, is a pattern where almost everything we seem to do is ultimately being driven by fear. That notably includes acts of war, terror, abuse and psychosis, greed and selfishness, violence, incarceration, disengagement, scapegoating, self-immolation (real and figurative), willing self-delusion, and, of course, denial. It is what drives us to vote, usually against rather than for anything. It is what drives angry, desperate, bewildered people to turn to racist, xenophobic, violent, dangerous ‘leaders’ who stoke and prey upon fear. It is what drives so many into depression, addiction and social dysfunction. The stress it provokes (aggravated by our poor modern western diet) underlies most of the disabling chronic diseases that are impairing our individual and collective ability to function. Stress and fear reinforce each other in an endless cycle of suffering, anxiety, illness and dysfunctional behaviour. The media, of course, being the handmaidens of the industrialists pushing us into a more and more helpless and critical-thinking deficient “consumer” society, is playing on our fears, amping them up even higher, in order to push us to buy more to address our suffering (miracle cures, escapist entertainments), our lack of control (guns, authoritarian governments), and our sense of inadequacy (status symbols and self-help books). Brilliantly, all of these consumer products actually make us more fearful, desperate for even more and stronger fixes. This is the very definition of a culture in collapse: Failure to meet its citizens’ basic needs, exploding violence, obscene inequality, a total lack of moral integrity (especially in our business, political and legal systems), and an increasingly dysfunctional populace unable to cope physically or emotionally with what is going on. It’s interesting that, for a few centuries at the beginning of our current civilization culture at least, we did find some stopgap means of dealing with this cultural anomie, hysteria and acedia. Religious, moral and spiritual groups (and perhaps tribal rites) taught and enforced rigid standards of behaviour that, while usually authoritarian and often arbitrary, offered something to hold on to, something to provide a constant moral compass to a populace so bewildered at the pace of change and the loss of its sense of purpose that they were willing to grab on to it. This worked particularly well when there were frontiers available to offer escape from the troubling malaise of overpopulated cities. Even now, orthodox religious groups all over the world are urging a return to rigid authoritarianism and obedience to their fundamentalist leaders as the ‘cure’ for our cultural collapse. And techno-utopians would have us escape to imagined unpolluted, resource-rich, underpopulated new planets — new ‘frontiers’ — an insane, elitist dream. In addition, one compelling modern theory holds that, in social creatures (those, like humans, whose evolutionary fitness depends on group cooperation), the chronic stress response can be mediated by “safety cues”, starting with the mother’s soothing voice and touch, and including laughter, high-pitched songs and expressions of joy (as opposed to threatening low-pitched growls), sympathetic attention, reassuring facial expressions, tones of voice and postures, and (in bonobos at least) brief pleasurable sexual stimulation. So why are moral authoritarianism and safety cues no longer working to temper the dysfunctional behaviour of our collapsing culture? Perhaps because a naive and toxic mix of globalization (“when we’re all the same, we’ll get along”), individual entrepreneurship (“you can do anything if you work hard”) and consumerism (“you are what you own”) is now the world’s de facto dominant religion. With its absurd cult of individuality, it preaches that our fate (health or illness, financial success or poverty, education or ignorance, fame, ignominy or incarceration) is in our own hands, when it obviously (to those not taken in by this religion) is not. You can witness its faithful adherents everywhere, even in the ghettos of Lagos and on the farms of India. You can see its failure on the shattered faces of the billions struggling and failing everywhere, in spite of everything, and blaming themselves. And in such a desperately busy and frenetic culture, who has time to learn, to offer, or to listen to, safety cues? And finally, the global industrial culture of the 21st century, its last, can no longer offer hope. People will endure enormous hardship with equanimity if they can believe their children and grandchildren will be spared what they suffered. Such hope is gone, now, everywhere. This is not easy for any of us to accept, or even to fathom. We are all doing our best, and have always done so. How could it turn out so wrong? How can there be nothing we can do, no one to blame, no solace even in what future generations will be spared? There is of course no answer to this. Our planet will survive our civilization’s collapse. It’s possible that a relatively small number of humans will be left in a few millennia once the dust has settled, and that they will live sustainable, joyful lives in harmony with the rest of life on earth as it has evolved by then, with their needs fully met, and fear an occasional and distant memory. We have no control over any of it. For us, knowing what is happening will have to be enough. Perhaps, at least knowing, we will be a little less fearful, a little less stressed, a little more accepting, and a little better prepared for what we will face in the decades ahead.
global_01_local_0_shard_00002368_processed.jsonl/69982
IceCapStudios 5 points6 points 3 months ago Wait you are a mod? Stephen_FalkenOK google, where am I?[S] 3 points4 points 3 months ago I'm trying to be a better mod than I have been before. IceCapStudios 2 points3 points 3 months ago Ok then. I'll tell you what to put in the sidebar later because I got to do something FlyingStranger 2 points3 points 3 months ago 10 hours later Blobbity-Blobbit 1 point2 points 2 months ago Three days later IceCapStudios 0 points1 point 3 months ago
global_01_local_0_shard_00002368_processed.jsonl/69984
Love and Thunderclouds “No buddy, sorry” I replied. I’m Not Usher, But These Are My Confessions – Liquor in the Morning and Glory Moments of Parenting Sometimes I Just Leave My Toddler Lying In The Middle of The Floor Can we all just acknowledge that snowsuits are like one piece bathing suits for babies- impossible to get on, painful to remove and God help you if nature calls? Anyway so Mini-Tex has this routine of falling asleep in his stroller and then I half lift, half drop the stroller on its way up the stairs into the house, park him in the entranceway, without throwing on the brake because that would wake him up, so I hope that there isn’t an earthquake while he naps, otherwise the stroller might roll across the hall and down the stairs. Also, Mini-Tex sleeps in his snowsuit because removing it is next to impossible and I always feel like I’m about to break one of his tiny arms in the process, but I prevent him from overheating by turning down the heat. I then curl up five blankets and make believe that I’m in Siberia, I would do a Russian accent to help sell the idea but I’m atrocious at accents. For the most part, my son and I had both accepted this new sleeping arrangement. Then it snowed. Like apocalyptic Siberian Russia snow. There was so much snow that the stroller was an impossibility. But staying home was not, because I’m addicted to the grocery store’s contest so we needed to buy pickles and detergent. That’s when I broke out the sled. Mini-Tex thought it was pretty great, and like clockwork he fell asleep as we turned the corner down our street. As I lifted him out, he kind of woke up. He was still tired in that “I’m just so warm in this one-piece-oversized-down-filled-bathing-suit-strait-jacket-thing kind of way” so I laid him on the floor. And he just stayed there. Didn’t say anything, so I walked away, and his eyes kind of closed but not all the way. So I left Mini-Tex awake on the floor, then I picked up my two year old, French, trashy magazine and read for a couple of minutes before checking to determine that he was out. And I left him there, sleeping in the middle of the floor. One of my finest hours as a parent. I Call It “Baby Fetch” Listen, sometimes, you just need a minute. Occasionally it’s to make coffee and you hand your child a package of fire engine stickers which ends with tiny fire engine sized carpets after your child sticks the entire sheet to the rug and in attempting to remove the stickers you create fire engine shaped bald patches in the rug and a handful of fuzzy, miniature carpets. Other times, well, you’re out of stickers, so you get creative. Baby Fetch was invented while I was trying to write a letter, Mini Tex wanted to play soccer. Instead I threw his beach ball as far as I could and he ran after it. In between throws I’d pen a handful of words. I regret nothing because Mini-Tex is going to show that Golden Doodle who’s boss at the park this summer. At This Point In The Winter, I’m Debating Wrapping Him In A Couple Of Duvets And Calling It A Day- Obviously I’d Make His Head Stick Out, So I Don’t See The Problem With This We’ve agreed that snowsuits are winter’s answer to one piece bathing suits? Uncomfortable, only used a couple months of the year and wearing them during your teens will get you laughed at etc. My biggest beef with snowsuits is that I don’t know where my baby ends and the snowsuit begins. Problematic from the point of view of “Are you cold?” randomly fondles the snowsuit, “Oh you’re just fine”. When really your baby’s hand is an ice cube but you can’t find it in the endless folds of fabric. The worst example of this was the ten minutes that Mini-Tex spent with two legs shoved into one pant leg of his snow suit. I couldn’t for the life of me figure out why the snowsuit wasn’t fitting properly and then when I finally realized the problem, I was so fed up with the entire business that I needed a break. So I left Mini-Tex lying in the middle of the floor with his little legs pinned together while I regrouped in the bedroom upstairs and debated a ten AM vodka shot because we’ve established that I’m an awe inspiring parent. One would think that I’d realize that an entire pant leg was just fabric but nope, because snowsuits take your children and make them significantly larger. It’s like taking a small European child and making them North American in five minutes or less. I would say if you must judge me, bring me hard liquor first, or offer to dress my son for playing the snow. Five Things Friday : Bidets and Barfights with Babies 1. We got a bidet! Not actually, however I had an extremely similar experience when I went to sit down and my son lifted up the toilet seat at the last second. In case you’re wondering, this scores high on the toddler amusement list, right after farting loudly during prayers at a Sunday church service. 1. Bobby pins 7 : Me 1 I keep losing the game of Find all the Bobby Pins before bed. My hair is unconscionably long, and still curly which means that it takes no less than at least twelve bobby pins for me to look as unkempt as Helena Bonham Carter on a good day. Otherwise I look like a graying Carrie Bradshaw on Sex and the City circa season one. While I rock at putting bobby pins into my hair, they tend to twist and bury themselves so that I can’t find them at the end of the day, that is until I roll over and stab myself in the head while falling asleep. 1. Welcome to our Ice Hotel I slept on a bed of ice! You know those iconic photos of the ice hotels? It was exactly like that. Only not really, because it was my bed, in my house. It’s so cold that somehow the mattress froze to the wall and the mattress partially froze too. Come to Canada where it isn’t even warm indoors! 1. You should see the other guy Mini-Tex head butted me in an attempt to escape being shoved into his snow suit and gave me a black eye. So I’ve been putting on cover up all week and feeling like a bad ass when actually I’m merely a bad parent because my reaction was to stop going outside ever, to prevent further injuries. Mini-Tex was completely unharmed in case you were concern, by contrast I saw stars. 1. Next come the flame throwing lessons I taught our two year old how to scale the four foot high ladder section of his play structure, figuring that our cautious non-climbing child would never attempt such a maneuver on his own. In other news, I shall be eating my hat along with my words and clearly idiotic intentions. What’s In My Bag? Dear Stacy, Thanks so much, we’ll be back around ten. Diary Excerpts: Monkey Balls, Feces Rinse Cycles and Laundry Mountains Dear Diary, The world=balls right now. 10:47 – Shavasna. Five Things Friday- The Insults Just Keep Coming 1. My new spa routine 1. I’m moving to a trailer park 1. I’ve started an anti-Post Secret blog Five Things Friday- The Random Slutty Baby Infestation Edition 1. My mother once called me a skank 1. My baby is infested with ferrets 1. My last bathing suit decomposed on my body 1. I’ve started wearing ass-less chaps 1. Guess who’s the newest member of Hell’s Angels?
global_01_local_0_shard_00002368_processed.jsonl/69997
Annual Conference Call for Proposals/Presentations The International Health Facility Diversion Association (IHFDA) will hold its 5th Annual Conference September 28th – 30th, 2020 at the Westin O’Hare hotel in Chicago, IL. IHFDA’s conference planning committee seeks proposals that address important related issues on diversion, risk management, quality practice and guideline/process use to increase the knowledge and skills of all professionals and promote the development of our profession. Proposals on any major topic related to healthcare facility diversion are welcome for consideration. 1. Anesthesia related (Operating Room) 2. General drug diversion topics inside healthcare facilities 3. Diversion specialist or drug diversion team related 4. Case specific diversion cases in healthcare facilities 5. Posters are also welcome for consideration * (see below) IHFDA has interest in the following categories: 1. Legislation 2. Risk Management 3. Guideline development 4. Best practice 5. Model care Presentations should be classified to assist in determining the content level of materials to be presented. The levels are based on the Dreyfuss Model of Skill Acquisitions and/or Benner’s States of Clinical Competence. Please choose only one of the following levels that best describes your presentation content. ADVANCED BEGINNER – Guidelines for action based on attributes of aspects. Situational perception still limited. All attributes and aspects are treated separately and given equal importance. COMPETENT – “Coping with crowdedness”. Now sees actions at least partly in terms of longer term goals. Conscious deliberate planning. Standardized and routinized procedures. PROFICIENT – Sees situations holistically rather than in terms of aspects. Sees what is most important in a situation. Perceives deviations from the normal pattern. Decision-making less labored. Uses maxims for guidance, whose meaning varies according to the situation. EXPERT – No longer relies on rules, guidelines or maxims. Intuitive grasp of situations based on deep tacit understanding. Analytic approaches used only in novel situations or when problems occur. Vision of what is possible. POSTER – Poster topics should include sufficient information to allow the committee to determine their content, relevance, background data and outcomes if appropriate. 1. Ensure the title use have given your submission is indicative of the actual content. As you flesh out the idea for your proposal, the topic may change slightly from the initial plan. Be sure to double check the title of your submission to make sure it is descriptive and covers the topics you plan to include in the presentation. 2. The audience will have an understanding of basic practice. Presenters are discouraged from spending presentation time on definitions unless they are specifically the focus of the presentation. 3. If you are describing a type of practice used at your institution please be very descriptive, i.e. Rather than “we use a process” it is preferred that you provide more detail, such as “we use the XYZ process. 4. Ensure references are relevant and up-to-date – any reference 10 years or older will be questioned by our continuing education provider. 5. Submissions, once approved for presentation, must be submitted to IHFDA in Power Point format and follow the rules of accredited education, which include a disclaimer slide. Abstract submissions need to include the following information/description in Word Document format and sent to  • The title of the presentation • The name/s of each presenter, their title, email address, phone number and affiliation • An abstract describing the subject matter of the abstract in 500 words or less • The amount of time needed for the presentation- 1 Hour, 1.5 Hours, 2.0 Hours (Allow 10- 15 minutes at the conclusion of your presentation for questions) • Please remember, when creating your slides, they must be easily readable in a large conference room. Please do not use red, as it does not show up properly. Yellow or White on dark blue appear to be a very good option. It would also be helpful to have the font of print on slides increased to support use in a large conference facility. Questions concerning the conference, the proposal submission process, along with all submissions should be directed to IHFDA educational planning committee at
global_01_local_0_shard_00002368_processed.jsonl/69999
Olive Oil News Update August 13, 2018 Do you know that EVOO has just been found to be the best cooking oil? That isn’t the only wonderful news as some researchers also discover that it can boost our interest in doing exercise. Besides, vets agree humans are not the only species that can enjoy olive oil because our pets can, too. But most importantly, the delicious olive oil has also become a life-saving medicine as it aids Ugandan doctors in the fight against maternal deaths. These are the latest news about olive oil. 1. Saturated fat makes you less inclined to do exercises. EVOO doesn’t. According to a study conducted by the University of Montreal, there is a strong correlation between a lack of eagerness to engage in physical activity and overconsumption of saturated fat, which can be found in fast food, dairy products, cooking oil, meat, etc. Although it is universally accepted that excessive consumption of this kind of fat can contribute to a host of health problems, such as heart attacks and obesity-related illness, there has been relatively little research on its mental and psychological effects. Therefore, this study has offered rare insight into how saturated fat can influence brain function. The researchers say that saturated lipids can disrupt the production of dopamine, a chemical responsible for the brain’s reward system that gives us pleasure and motivation. In other words, the more saturated fat you consume, the less dopamine your brain will release, which consequently makes you less interested in completing tasks, like taking exercises. At the same time, the authors of the study noted that monounsaturated fat, notably olive oil, doesn’t trigger the same suppression response. So this is one more reason why you should switch to olive oil if you are a fan of exercise. 1. To cook or not to cook? EVOO is extremely safe at regular cooking temperature. In a study published in the journal Acta Scientific Nutritional Health, Australian researchers debunked the myth that olive oil would become harmful when cooked at high temperature. It is common knowledge that when heated above smoke point, cooking oil will become unstable and partly degrade into some chemical by-products, known as polar compounds, that have negative health effects. This leads many people to think that since olive oil has low smoke point, it isn’t suitable for cooking. In the study, however, researchers tested the stability of a wide range of cooking oils, and the result invalidated the conventional wisdom: EVOO actually produced the smallest amount of polar compounds, meaning it was the most stable and safest oil. The researchers explained that smoke point wasn’t the only indicator of oil stability and concluded that EVOO could be used in cooking since, apparently, it is the best. 1. Have some olive oil, for you and your pets. Our furry friends can derive many benefits from olive oil just like us. According to some pet health sites such as Rover.com and AnimalWised.com, olive oil supplements can help cats and dogs strengthen their immune system, and reduce their risks of obesity, cardiovascular diseases and diabetes. (Sounds familiar?) Not only will olive oil improve pets’ health, but it can also give them more attractive appearance. A diet added with EVOO can help pets preserve their skin moisture and make their fur soft and shiny. But consuming too much olive oil can cause pets some health problems, such as digestive issues.  1. In Uganda, olive oil kindles a light in the dark. That olive oil can improve lives with its famed health virtue is a mere half-truth. The full truth is that it can also save lives. This is especially true for Uganda, a country that is fighting high number of maternal deaths caused by infection following Caesarean section. It can hardly rely on Western medicines as more than 60 percent of Uganda’s population prefers traditional medicine, according to a well-known NGO called the Cross-Cultural Foundation of Uganda (CCFU), and Western-trained doctors in the country are outnumbered by herbal practitioners 1 to 50. That leaves natural remedies the most suitable solution, and Joseph Ngonzi, a researcher at Mbarara University of Science and Technology (MUST), comes up with an olive oil and honey wound dressing called I-Dress. Olive oil has strong antimicrobial property and can be used to heal infected wounds. So far, I-Dress has worked well on animal subjects. If successful, I-Dress would move the application of olive oil from kitchen table to operating table, and save many mothers. Leave a comment Comments will be approved before showing up. 10% off your first order | Sign up for our Newsletter
global_01_local_0_shard_00002368_processed.jsonl/70006
In particular, the equipment can be"reinforced". As in any MMORPG, we can find gear not very useful at first (because committed to some other class or stronger than its current equipment). This gear can be sold, but also dismantled: the object is then destroyed with Astellia Online Asper, but can recover"stones of improvement" that can be spent to fortify another object.Below level 50, an object can be updated to +6 maximum degree. To continue to improve, it is going to evolve the object to level 50 (the objects evolve in the exact same way as the characters). And after at level 50, an object can reach a level +10, but classically enough, a risk is presented by the progression: outside the +3, the player faces a chance of collapse more or less dull. The object can stay as it had been and the participant loses the rocks of progress in the procedure; the object may get rid of a degree of reinforcement while losing the stones of improvement used; a crucial failure contributes to losing the stones of improvement and many levels of reinforcement. We know the strengths and weaknesses of such a system: it is the way to consume resources and thus limit inflation overly galloping in the game market, in addition to generating a strong sense of affection to its equipment ( the more we succeed in creating it progress, the more the thing gets personal); but it's also a frustrating mechanism (as soon as the object we have lost is gaining energy ) and a few programmers tend to monetize these mechanisms to inspire players to spend from the gaming store to limit the chance of regression. 'an object - here, we still dismiss the content of the shop Astellia and the developer promises to steer clear of any form of mechanics that are pay-to-win. We will estimate on piece. Together with the development of this object, the equipment may also be improved through runes to give it abilities. In Astellia, every object has five slots that can each accommodate another rune: a few things can be updated with offensive runes (weapons, rings and earrings ), others with defensive runes (breastplates, necklaces and bracelets). For example, each rune may add, as an instance, attack power, chance to critically spell energy that is hit or increase, or boost the level of critical dodge, health or mana, or vitality. Understandably, the Astellia development system is meant to be rich (the gear could be improved in many different ways) and especially enough diversified to permit gamers to produce the equipment that best fits their playing style. Probably to establish if this progression will pass just by the sport itself, or if the developer also intends to monetize it to buy Astellia Asper.The crafting method of Astellia should play an important role in the sport. Although not every player needs to reach for the hammer, but in the latest in the auction house everybody should benefit from the system. The programmers gave us info regarding crafting.
global_01_local_0_shard_00002368_processed.jsonl/70010
Six Takeaways From CES 2020 CES never fails to deliver. Year after year, expectations for innovation are sky high, and year after year, CES delivers. From the hundreds of startups in Eureka Park to the tech giants in the main halls, CES is a celebration of creativity and the desire to make things smarter, faster, and better.
global_01_local_0_shard_00002368_processed.jsonl/70042
Reality & Realization – 3. How to Meditate Meditation is a practice aiming to quiet the mind – to reach a transcendental state of consciousness. Yoga, which involves physical postures, has the same aim. Modern western yoga teaching often misses the main point by focusing too much on poses and not enough on quieting the mind. Unlike yoga, the meditation you’ll learn now is as easy as falling asleep. To help you transcend you’ll use a mantra. A mantra is a focal mental resonance comprising 1 or 2 meaningless syllables. The basic idea is a calming vibration. The classic Buddhist mantra ōm is a single syllable mantra. Choose a mantra with 1 or 2 vowel-based sounds, perhaps with a soft consonant, such as ‘m’, ‘n’, or ‘s’, to assist in resonance. If you like a hard consonant, such as ‘d’, ‘g’, or ‘k’, soften it by sanding the sonic kick down. Think first of vowel sounds you like, perhaps as if they were musical notes, then add lyrical consonants to them. You should be able to draw the syllables out, so that they may stretch as your mind eases off. As breath is a crucial aspect of our animal being, mantras are typically an in-out breathing representation. As such, 2 syllable mantras are common. You may at first try a few different mantras to evaluate their quality. Do so during a meditation session, not as an abstract exercise among your other mental tasks. You cannot choose a wrong mantra: if it resonates with you, it works. Once you find a pleasing mantra, claim it as your own and let it be a centerpiece for your meditation practice. Keep your mantra to yourself, unspoken, using it only as a meditation device. Here’s how to meditate. Find a comfy chair or prop yourself up in bed with cushions. The room should be quiet, preferably dimly lit. Spend a minute or 2 quieting yourself by sensing your body’s rhythms, such as your breath or heartbeat. Breathe through your nostrils, not your mouth. Begin meditating with the intention of quieting the mind. When thoughts arise, smother them by bringing your mantra to mind, making the mantra your mental focus. You may meditate without a mantra, using your breath as a seat of attention. Repeat the mantra as if calmly breathing it. Do not concentrate on the mantra. The aim is to clear the mind, not hold it captive. A mantra merely expedites the process by mesmerizing the mind, and so sending the mind to sleep. A mantra is a lilting lullaby for the mind. In a comfortable repose of both body and mind, following intention, your consciousness communes with the universal field of Ĉonsciousness. You transcend. Meditate 20 to 30 minutes, time permitting. Even a short session of a few minutes is beneficial. Transcending or falling asleep for a longer period is perfectly natural. Your mind-body takes whatever rest it needs when it can. Some meditation sessions might feel busy, others serene. Regardless of seeming quality, meditation is always helpful in being restful. At the end of meditation, lay down or slump in your chair. Spend 3 to 5 minutes relaxing with your eyes closed, allowing yourself to ease back to the waking state. Do not abruptly end meditation. It may give you a dull headache. Do not meditate on a full stomach. Meditation slows the bodily system, and so can degrade digestion. Do not exercise shortly after meditating. Let the calm settle in. After extensive practice as a meditator, the mantra may become superfluous. Having acclimated to transcending, the sheer desire to do so may suffice. Begin every day with a meditation session if you can. Meditate twice a day if possible, preferably at the beginning of the day and in the early evening (before dinner). You may meditate more if have time and inclination. If the mind is restless when the body is ready to sleep, a short meditation may sooth the system sufficiently to slumber. What you just learned is the most effective meditation technique; the classic method taught by gurus since prehistory. Its effortlessness is what makes this meditation so efficacious. You won’t learn a better method anywhere else. Meditation is easy. Make it a regular habit. Next, we’ll uncover the primordial deception behind Nature.
global_01_local_0_shard_00002368_processed.jsonl/70060
• Review • Browser Games The Paint Gunner • Currently 4.1/5 • 1 • 2 • 3 • 4 • 5 Rating: 4.1/5 (73 votes) Comments (7) | Views (3,997) elleelle_thepaintgunner_image3.pngTo celebrate their great success, the accidental invention of two awesome new paint types, the factory where you work has thrown a big party! All was going well, everyone was eating cake and having a good time when some bozo decided to press the big red "Do NOT Press" button which, well, was a bad thing really. Now the building is in chaos while everybody is trapped in the party room. Everybody except The Paint Gunner, who, for some silly reason, is on the totally opposite side of the factory. So begins your rescue mission in this challengingly fun puzzle platform game by Petter Vernersson and Johannes Bahngoura. In order to reach the party room, you'll move via [WASD] or arrow keys through twenty-two rooms of toxic hazard and labyrinth obstacles. Use your mouse to strategically fire the green paint to get bouncy and the orange paint to hit slippery speeds or combine them both for special effects. Fill up on paint (press E) at the door to each room then use it as economically as possible; you'll score more points at the end, when you drop off your leftover paint, if you have more to give. To switch colors mid-level, press [1] for orange, [2] for green, or wash it all away with water [3]. Skillfully painting the floors and walls while negotiating your way through each level takes ambidextrous artistry. This is helped along by very responsive controls and a solid game design. Of course there's achievements galore and plenty of cool party hats for instant gratification and a happiness boost. The closer to the party room, the harder things get—you'll need to experiment and, perhaps, fail a few times before you find that sweet combination of color and moves. But, that's nothing to the twenty-second room, the room just outside the party. Here the toxic waste is rising fast and any hesitation means your doom. The small game window with a limited view of the action can be a bummer throughout, but in the last level it means you have less visual hints to aid your escape plans. Still, the reception you receive when you, the hero, arrive to save them all, is so worth the effort. By the way, what blockhead would push that factory destroy button anyway? Play The Paint Gunner I understood about half of what the guy said in the intro... Not a bad game otherwise. The paint bears a startling similarity to the gels in portal 2. And the gels in Portal 2, in turn, are quite similar to the paint in TAG... So yeah, it's not a new concept. But it's pretty fun nonetheless! Looks like a nice game, but it's too hard to play on a non-US keyboard. If I switch my layout to US, I can use WASD but 1/2 won't work. And while it's possible to use the arrow keys, moving the hand all the way back to 1/2 to change the paint color is too much of a hassle. Too bad that half of the games still can't handle non-US keyboards. At least let users rebind the keys. This is obviously a browser port of TAG, but I'm not complaining. Reminds me of "portal: the flash version" Looks like it works, but the character appears to be invisible, making it hard to actually play the game. (Mac OS X 10.6.8, Chrome 17, Flash 11.1.) Same Chrome and Flash Player here on OS X (10.5.8) and the character is visible. I don't know what would cause the character to be invisible(?) Try emptying your browser cache and reload. Then try uninstalling Flash Player and reinstall it. Not sure what else to suggest. ^ Scroll Up | Homepage > Leave a comment [top of page] • You may use limited HTML tags for style: Visit our Sponsor Recent Comments Display 5 more comments Limit to the last 5 comments Game of the week Sable Maze: Soul Catcher Your Favorite Games edit Monthly Archives
global_01_local_0_shard_00002368_processed.jsonl/70064
September 28th, 2015 She can't be old enough to get married, she's clearly still 9. My oldest niece got married yesterday, in a BEEYOTIFUL garden wedding on the farm where she lives on Bainbridge. My pictures aren't pretty (my camera phone sucks, and I have lost my mojo, and they have an awesome photographer so I'm sure there will be great pics eventually and mostly didn't bother) but I got a few, though apparently none of the brides. (x-posted from instagram. I was going to claim I update instagram more often than LJ, but then I looked at my datestamps. Ooops.):
global_01_local_0_shard_00002368_processed.jsonl/70084
Browse Subject Areas Click through the PLOS taxonomy to find articles in your field. For more information about PLOS Subject Areas, click here. • Loading metrics • Anne E. Wignall,  • Marie E. Herberstein Web-building spiders are important models for sexual selection. While our understanding of post-copulatory mechanisms including sperm competition and cryptic female choice is considerable, our knowledge of courtship and how it influences male and female mating decisions is still extremely poor. Here, we provide the first comprehensive description of male courtship behaviour and vibrations generated in the web by the orb-web spider, Argiope keyserlingi – a recognised model species. We identified three main elements of male courtship: shudders, abdominal wags and mating thread dances (including both plucks and bounces). The vibrations generated by these behaviours are described in detail. Male shuddering behaviour appears to have a strong influence on female latency to mate acceptance, with males that shudder at high rates without compromising shudder duration being preferred. Shuddering behaviour may also mediate female aggressive behaviour, with males that generate long shudders less likely to be cannibalised after copulation. Male abdominal wagging behaviour, however, appears to have only limited influence on female mating decisions. This study provides avenues for future work that synthesises pre- and post-copulatory mechanisms in web-building spiders to generate an all-encompassing model of how sexual selection operates. The value of spiders, particularly web-building spiders, as model systems for sexual selection is becoming increasingly evident [1], [2]. For example, one of the first pieces of evidence for cryptic female choice comes from an orb-web spider [3], [4]. Similarly, work with a range of spider species (e.g. Linyphia, Latrodectus, Nephila and Argiope) has made significant contributions to our understanding of patterns of sperm competition [5][9]. While we now have a detailed account of post-copulatory mechanisms in web-building spiders, we still understand very little about pre-copulatory courtship, its function, mechanism or evolution [10]. This represents a significant gap in our understanding. Courtship in many species of spiders, such as in the genus Argiope, often lasts an order of magnitude longer than copulation itself [11]. Therefore, courtship is of potentially significant importance for female choice and the resulting post-copulatory mechanisms. Popular general hypotheses about the function of courtship include: stimulation of females to mate [12][14], species recognition [10], [14], [15], suppression of female aggression (particularly in species with sexual cannibalism [14], [15]), assessment of male quality [16] and synchronisation of mating behaviour [14]. Generating and testing functional hypotheses however requires a comprehensive description of courtship behaviour, which in web-building spiders is currently lacking. Web-building spiders tend to have poor vision, but excellent sensitivity to vibrations [17], [18], [19]. Courting web-building spider males often engage in behaviours that involve bouncing, plucking, tugging or manipulating the silk of the female's web [14]. These behaviours generate vibrations that may provide signals or cues to the female about the presence, identity and quality of the male. To date, only a few studies have attempted to record male courtship in a female spider's web [13], [15], [20], [21], and of these only one to our knowledge has recorded courtship vibrations directly from the web (see [21]). Recordings of male funnel-web spiders were conducted using a galvonometer, a contact recording method, which may affect vibration transmission due to the weight of the stylus on the web [21]. Thus the primary aim of our study is to provide a method for the quantification and detailed descriptions of courtship vibrations in a well-studied orb-web spider. Furthermore, we identify relationships between male vibratory courtship and female behaviour as a way of developing potential functional hypotheses for future studies. In this paper we provide the first comprehensive description of the vibrations generated during courtship of male Argiope keyserlingi using a combination of non-contact digital laser vibrometry with synchronised video footage and high-speed video recordings. We describe in detail individual courtship elements and present preliminary evidence for how male courtship performance may influence post-copulatory processes. No specific permits were required for the described field studies. No specific permissions were required for these locations or activities. The collecting location is a public park. This location is not privately owned or protected in any way. The species used in these experiments (Argiope keyserlingi) is not an endangered or protected species. Study animals We collected 21 sub-adult male and 21 sub-adult female Argiope keyserlingi from Bicentennial Park, West Pymble, Australia in October 2010. Individuals were collected as sub-adults to ensure they were virgin for our experiments, as mating status is known to influence both male and female behaviour in A. keyserlingi [3], [9], [22]. Males were maintained in individual, upturned plastic cups (300 mL) with a mesh top for airflow. Females were maintained in Perspex frames (50×50×10 cm) that provided space to build natural orb-webs in which we could record courtship interactions. All spiders were housed in a temperature-controlled room (25–27°C) on a 12∶12 hour Light∶Dark cycle. Females were fed weekly on crickets (Acheta domestica), vinegar flies (Drosophila melanogaster) and Queensland fruit flies (Bactrocera tyroni). Male spiders were fed weekly with D. melanogaster. All spiders were watered daily. Courtship and copulation in Argiope keyserlingi Orb-web spider courtship (Types A, B and C) is defined according to whether courtship occurs on or off the female's web, and whether a mating thread is involved or not. Courtship in A. keyserlingi progresses in a fairly stereotypical manner according to ‘Type B courtship’ [14]. In Type B courtship, courtship occurs on the female's web, and males build a mating thread on which copulation occurs [14]. Male Argiope keyserlingi enter the female's web via the frame threads around the edges of the orb-web (Phase 1 to 2, Figure 1). The male then slowly approaches the hub at the centre of the web where the female is located (Phase 2, Figure 1). At the hub, the male ‘tastes’ the female by walking around her while contacting her legs and abdomen with his first and second pair of legs then passing his legs through his mouth (during Phase 3, Figure 1). The male spends some time at the hub engaged in this behaviour (from several minutes up to an hour or more), punctuated by short rests (often for several minutes at a time). The male then proceeds to cut out a small section of the orb web slightly above and to one side of the female at the hub. The male builds a mating thread across this space, a single line of silk that he may reinforce by laying several draglines. The male then hangs upside down from the mating thread and generates vibrations by plucking and bouncing (Phase 4, Figure 1). The female responds by moving onto the mating thread and entering a characteristic ‘copulatory position’ or ‘acceptance posture’ that exposes her genital opening, the epigynum [11], [14]. There is no evidence of copulatory courtship in A. keyserlingi. Figure 1. Sequence of male A. keyserlingi courtship. Proportions of males making transitions between each behaviour are shown beside flow arrows. Mean duration (s) (± sd) of phases 2–4 are shown. Courtship recordings High-speed video footage of male courtship behaviours were recorded at 300 fps using a Casio Ex-F1 digital camera (Casio America, Inc., USA). Courtship vibrations were recorded using a digital laser vibrometer (Polytec PDV 100, Germany), digitized to a Digital Rapids DC 1500 A to D board using Stream 1.5.23 (Digital Rapids, Canada) recorded at 44.1 kHz/16 bits on a Windows computer (Dual 3.0 GHz Xeon, 4 GB RAM). Video footage was recorded using a 540TVL GoVideo camera (25 fps, Digital Products International Inc., USA). The AES output of the laser vibrometer was converted to EBU (CO3, Midiman, M-Audio, USA) and synchronised onto the audio track of the video. This allowed us to observe the behaviour of the spiders during the generation of vibratory stimuli. Within the web, we placed up to four Bactrocera tyroni wings, painted silver, at even intervals around the hub of the web. These silver wings were used as focal points for the beam of the laser vibrometer, providing a wide focal area while minimising the weight added to the web that may distort vibrations [23], [24]. This method measures transverse vibrations within the web. Longitudinal vibrations tend to travel with less attenuation than transverse vibrations in orb-webs [23]. However, measuring longitudinal vibrations using laser vibrometry is currently not possible as the movement of silk threads during male courtship is too great for the laser vibrometer's focal range. While we cannot exclude the possibility that some information about male courtship has not been captured by measuring transverse vibrations, we hope to have minimised this risk by combining our vibrational analyses with video analyses. To monitor and focus the laser vibrometer, we monitored trials using headphones connected to the laser vibrometer's analogue output from a Eurorack UB 802 soundboard (Behringer, Germany). To commence a courtship recording, an adult male was placed at the bottom of a Perspex frame with a female in her web and allowed to make his own way into the web. If males did not enter the female's web within 30 mins, the trial was aborted. We recorded trials from when the male first made contact with female's silk, to 5 mins after copulation ended. Male courtship was analysed using Adobe Soundbooth CS4 v2.0.1 (Adobe Systems Incorporated, USA), and statistical tests performed using JMP v5.0.1.2 (SAS Institute, Inc., USA). Behaviours were identified from video footage, and duration and inter-element durations were calculated from the synchronised waveform. The mean peak frequencies of individual courtship elements were calculated from a randomly selected example within an interaction. All descriptive values indicate mean ± standard deviation unless otherwise indicated. Data were checked for normal distribution (Shapiro-Wilk test) and transformed where appropriate. To estimate the relative body condition of males and females, we calculated the residuals from a regression of weight on carapace width (males: F1, 15 = 38.95, R2 = 0.72, p<0.01; females: F1, 15 = 13.19, R2 = 0.47, p<0.01) [25], [26]. Copulation success in the laboratory for virgin male – virgin female pairings is 100%, hence copulation success was not included in the analyses. While we have as yet little information on male copulation success in the field, there are indications that females are remarkably accepting of courting males [11]. We analysed male shudder and abdominal wagging behaviour for effects on female latency to move onto the mating thread (which can also be considered as latency to copulation) and copula duration, both measures that are commonly used as proxies for female preference for the male [3]. Female latency to move onto the mating thread may also be a useful proxy for female assessment of male quality due to the potential costs involved in delayed mate acceptance. Females that take longer to assess and accept a mate may reduce their prey capture rate and be at an increased risk of predation due to the presence of the male on the web [11]. We also measured the time that females spent pumping, a behaviour that indicates female disturbance in anti-predator contexts that can also be used as a measure of female ‘irritation’ during male courtship [11], [27]. Pluck rate of mating thread dances was calculated by scoring videos using JWatcher 1.0 [28]. We did not include analyses of frequency or duration for the individual elements of the mating thread dance as behaviours overlapped with each other, making individual elements difficult to analyse accurately. Sample sizes for individual analyses varied slightly according to whether a particular statistic could be calculated from each male's courtship. Our standard model for all analyses included the predictors: vibration rate, vibration duration, and the interaction between rate and duration. Total courtship duration including time the male spent resting (defined from when the male first made contact with female silk to the start of copulation, including the mating thread dance) ranged from 11 to 96 minutes (mean = 39.51±20.78 minutes, N = 21). When we excluded male resting time, total courtship time ranged from 8 to 54 minutes (mean = 25.31±11.17 minutes, N = 21). Three main elements to male vibratory courtship were identified: shudders, abdominal wagging and mating thread dances (comprising a combination of plucks and bounces). These elements were stereotyped and easily identified. The sequence of male courtship behaviour in Figure 1 shows the probability of each transition between behaviours. Shudders comprised males rocking (anterior-posterior) in the web several times, with each rock appearing to be driven by flexion of the first and second pair of legs, although this is difficult to confirm (Table 1; see high-speed video footage, Video S1). Shudders were the first vibratory courtship element to be observed within interactions. Males continued to shudder at intervals throughout the interaction until they began courtship on the mating thread (Table 1; Figure 1; Figure 2a,b). The interval between shudders was significantly shorter during the males' first approach to the female at the hub compared to the interval between shudders after reaching the hub (paired t-test: t17 = 4.86, p<0.01). Figure 2. Shudder courtship vibrations of A. keyserlingi. (a) Waveform of a bout of shuddering by male Argiope keyserlingi. The apparent amplitude difference between the two shudders is due to the male approaching the female (and hence also approaching the laser vibrometer focal point), rather than a difference in courtship effort; (b) detail waveform of a single shudder from waveform (a). Shudders are performed from first contact with female silk, to commencement of courtship on the mating thread. Abdominal Wag Abdominal wagging (as defined by [12]) comprised males rapidly bobbing their abdomen dorso-ventrally (Table 1; Video S2). Abdominal wagging tended to occur in bouts of several wags close together (Table 1; Figure 3a,b). Throughout the entire interaction, males performed on average 42.14±48.92 bouts of abdominal wags (range: 0 to 222 bouts, N = 21). Only one male never performed any abdominal wagging. All the other males performed a bout of abdominal wagging immediately prior to attempting to copulate on the mating thread (Figure 1, Phase 4). Figure 3. Abdominal wagging vibrations of A. keyserlingi. (a) Waveform of a bout of abdominal wagging by male Argiope keyserlingi; (b) detail waveform of a single abdominal wag from waveform (a). Abdominal wags are performed intermittently throughout courtship and immediately prior to a copulation attempt. Male courtship behaviour and female mate choice Total male courtship time (excluding ‘rest’ periods in which the male did not move) did not relate to female latency to move onto the mating thread (F1,19 = 0.50, R2 = 0.03, p = 0.49) or copula duration (F1,19 = 1.22, R2 = 0.06, p = 0.28). Male shuddering behaviour was significantly related to female latency to move onto the mating thread (whole model: F3,17 = 5.60, R2 = 0.50, p<0.01). The higher a male's shudder rate, the longer a female took to move onto the mating thread (shudder rate: F1,1 = 12.49, p<0.01), with a strong interaction between shudder rate and shudder duration (interaction: F1,1 = 6.64, p = 0.02). Females appeared to delay their move onto the mating thread when males with a high shudder rate consequently reduced their shudder duration. Male shuddering behaviour did not influence copula duration (whole model: F3, 17 = 0.76, R2 = 0.12, p = 0.53). However, males that generated longer shudders were less likely to be cannibalised by the female after copulation (whole model: χ23 = 10.73, p = 0.01; shudder duration: χ21 = 6.49, p = 0.01; shudder rate: χ21 = 0.23, p = 0.63; interaction: χ21 = 4.90, p = 0.03). While shudder rate alone did not seem to affect the probability of cannibalism, there was again an interaction between shudder rate and shudder duration, with males that shuddered at a higher rate decreasing their shudder duration, which increased their probability of being cannibalized. Females that pumped more were not more likely to cannibalise males (χ21 = 0.53, p = 0.47), but males took longer to begin building the mating thread when courting females that pumped more (F1,19 = 10.09, R2 = 0.35, p<0.01). However, males did not adjust their shuddering behaviour when courting females that pumped more often (whole model: F3,17 = 0.16, R2 = 0.03, p = 0.92). Male abdominal wagging did not influence the latency of females to go onto the mating thread (whole model: F3,16 = 2.42, R2 = 0.31, p = 0.10). Similarly, abdominal wagging did not influence copula duration (whole model: F3,16 = 0.18, R2 = 0.03, p = 0.91) or time the female spent pumping (F3,16 = 0.63, R2 = 0.11, p = 0.60). Similar to shuddering behaviour, males that abdominal wagged at higher rates tended to have shorter abdominal wag durations (F1,18 = 6.75, R2 = 0.27, p = 0.02). Interestingly, males that shuddered at a higher rate, tended to abdominal wag at a lower rate (F1,18 = 7.00, R2 = 0.28, p = 0.02). We found no evidence that male or female body condition correlated with male shuddering or abdominal wagging behaviour, female latency to move onto the mating thread or copula duration (Pearson correlations: all p>0.22). Mating thread dance Males hung upside down from the mating thread and used their legs to strum the silk (plucks), interspersed with violent dorso-ventral and antero-posterior bouncing on the thread (bounces). Males continued to dance until the female moved onto the mating thread to adopt the copulatory position (Table 1; see Video S3). The precise sequence of the mating thread dance tended to vary between males. The mating thread dance usually commenced with several plucks by the legs on the silk thread, often the 3rd pair, but sometimes also the 1st or 2nd pair of legs. After several plucks, the males began interspersing plucks with bounces on the mating thread (see Videos S3 and S4). Males continued to pluck and bounce on the mating thread, with the proportion of bounces tending to increase as courtship progressed. Some males commenced bouncing almost immediately on the mating thread, while others plucked for some time before the commencement of bouncing. The mating thread dance lasted on average 63.12±38.58 seconds (range: 6.73s to 128.92s, N = 21; measured from the male's first pluck on the mating thread, to when the female was in position on the mating thread, excluding rests). If the female decided to accept the male as a mate, the female responded to the mating thread dance by approaching and hanging from the mating thread with her epigynum facing the male (all females in this study accepted the male as a mate). Sometimes it took several bouts of movement for the female to move into the correct ‘copulatory position’ on the mating thread. During these female movements, males tended to briefly cease the mating thread dance. The durations of vibrations generated by individual plucks on the mating thread were not possible to calculate, due to the substantial overlap with subsequent plucks by alternate legs (Figure 4a,b). This also interfered with calculation of the interval between plucks. Similarly, bounces were difficult to analyse as they also overlapped with plucks (Figure 4c). The amplitude of vibrations generated during the mating thread dance tended to increase as courtship progressed (Figure 4a). Figure 4. Mating thread dance vibrations of A. keyserlingi. (a) Waveform of the mating thread dance by male Argiope keyserlingi; (b) detail waveform showing several plucks from waveform (a). Some bouncing occurs simultaneously during these plucks; (c) detail waveform showing bouncing from waveform (a), including simultaneous plucks. Plucks in the waveform are indicated by arrows. Female preference for a mate in orb-web spiders is often measured by latency to move onto the mating thread (as an indication of willingness to mate) and copula duration (under female control, with the potential to limit the amount of sperm males can transfer) [3], [11]. Our results indicate that the duration of male courtship time alone does not influence female preference behaviour. This appears to contrast with Argiope bruennichi, in which males with a short courtship duration had a significantly reduced paternity share compared to males that courted for longer durations [29]. Male redback spiders, Lactrodectus hasselti, with short courtship durations also have lower paternity compared to males with longer courtship durations as females prematurely cannibalise males that invest little in courtship duration [30], [31]. While our study did not assess paternity in relation to male courtship effort, our results suggest that, in A. keyserlingi, individual elements of courtship quality, rather than courtship duration per se, influences female choice behaviours. Male shuddering behaviour appears to have a strong influence on female latency to mate acceptance. The higher the male's shudder rate, the longer a female will take to move into the characteristic acceptance posture on the mating thread. This appears to be due to males with very high shudder rates compromising their ability to generate shudders of a ‘reasonable’ duration. It is unlikely that males increase their shudder rate (and hence reduce their shudder duration) in response to female reluctance to mate, as female reluctance is mostly assessed by the male once on the mating thread (Phase 4), and not during Phases 2–3 (see Figure 1). Female reluctance to mate is exhibited by either a long latency to move onto the mating thread, or possibly through aggressive behaviours such as pumping. However, our results show that males do not appear to adjust their shuddering behaviour when courting highly aggressive females. While shudder duration per se does not appear to influence female assessment of males, it appears that females will take longer to assess and accept as a mate those males that allow their shudder duration to drop below a threshold level when shuddering at higher rates. Courtship and copulation can be very dangerous for web-building spiders, with many females from diverse species attacking and often cannibalising males before, during or after copulation [32][35]. It has been suggested in several spider species that courtship displays may help lower female aggression [20], [36], [37]. In A. keyserlingi, male courtship was not directly influenced by female aggressive pumping behaviour. However, males that courted females that pumped at a high rate took longer to begin building the mating thread. It would be interesting to discover whether males increase their courtship duration (Phases 1–3, Figure 1) to ameliorate the risk of cannibalism by these females. Male shuddering behaviour may also be important in regulating female aggressive behaviours after copulation. Males with longer shudders appear to have a reduced risk of post-copulatory cannibalism, which in turn increases their potential for a second mating and higher reproductive fitness than males with shorter shudders (that shudder at higher rates). Male abdominal wagging appears to have only limited influence on female latency to move onto the mating thread, copula duration and pumping behaviour. However, abdominal wagging is a common element of spider courtship behaviour, and has been observed in diverse spider families [20], [37][39]. Interestingly, all males that performed abdominal wagging completed a bout immediately prior to approaching the female for a copulation attempt. One potential function of abdominal wagging may be to increase haemolymph pressure in the pedipalps prior to insertion for sperm transfer [40]. Therefore, while this behaviour is performed during the courtship phase, it may have no function in female mate assessment. There is little evidence from the current study to suggest that male courtship effort is condition dependent. However, males were maintained in similar laboratory conditions under a high quality diet, which may provide only limited scope for investigation of condition-dependent signalling behaviours. Previous work on wolf spiders has indicated that male courtship vibrations vary when male diet is manipulated during development [41][43]. This provides an avenue for future research concentrating on diet manipulations of individual males through development and their effects on courtship behaviour and female preference. Understanding courtship behaviour in male orb-web spiders such as A. keyserlingi provides a unique opportunity to formulate a cohesive theory underlying the evolution of mating systems. A wealth of information has been collected about post-copulatory mechanisms in A. keyserlingi and closely related species. However, how courtship informs mating decisions and hence influences reproductive fitness has until now remained elusive. This study will help open up future research incorporating pre- and post-copulatory mechanisms into sexual selection models. Supporting Information Video S1. High-speed (300 fps) footage of a male shuddering. Video S3. Start of male mating thread dance, showing plucks and bounces. Video S4. High-speed (300 fps) footage of male mating thread dance, showing plucks and bounces. We would like to thank P. Taylor for use of his laser vibrometry suite to record courtship vibrations. We would also like to thank H. Gow, A. Harmer, E. Hebets, three anonymous reviewers and the editor for useful comments and discussions. Author Contributions Conceived and designed the experiments: AEW MEH. Performed the experiments: AEW MEH. Analyzed the data: AEW. Wrote the paper: AEW MEH. 1. 1. Herberstein ME (2011) Spider Behaviour: Flexibility and versatility. Cambridge: Cambridge University Press. 2. 2. Herberstein ME, Schneider JM, Uhl G, Michalik P (2011) Sperm dynamics in spiders. Behavioral Ecology 22: 692–695. 3. 3. Elgar MA, Schneider JM, Herberstein ME (2000) Female control of paternity in the sexually cannibalistic spider Argiope keyserlingi. Proceedings of the Royal Society of London, Series B, Biological Sciences 267: 2439–2443. 4. 4. Uhl G, Elias DO (2011) Communication. In: Herberstein ME, editor. Spider Behaviour: flexibility and versatility. Cambridge: Cambridge University Press. pp. 127–189. 5. 5. Watson PJ (1991) Multiple paternity as genetic bet-hedging in female sierra dome spiders, Linyphia litigiosa (Linyphiidae). Animal Behaviour 41: 343–360. 6. 6. Snow LSE, Andrade MCB (2004) Pattern of sperm transfer in redback spiders: implications for sperm competition and male sacrifice. Behavioral Ecology 15: 785–792. 7. 7. Schneider JM, Herberstein ME, de Crespigny FC, Ramamurthy S, Elgar MA (2000) Sperm competition and small size advantage for males of the golden orb-web spider Nephila edulis. Journal of Evolutionary Biology 13: 939–946. 8. 8. Elgar MA, Champion de Crespigny FE, Ramamurthy S (2003) Male copulation behaviour and the risk of sperm competition. Animal Behaviour 66: 211–216. 9. 9. Herberstein ME, Wignall AE, Nessler SH, Harmer AMT, Schneider JM (2012) How effective and persistent are fragments of male genitalia as mating plugs? Behavioral Ecology 23: 1140–1145. 10. 10. Huber BA (2005) Sexual selection research on spiders: progress and biases. Biological Reviews 80: 363–385. 11. 11. Herberstein ME, Schneider JM, Elgar MA (2002) Costs of courtship and mating in a sexually cannibalistic orb-web spider: female mating strategies and their consequences for males. Behavioral Ecology and Sociobiology 51: 440–446. 12. 12. Montgomery TH (1903) Studies on the habits of spiders, particularly those of the mating period. Proceedings of the Academy of Natural Sciences of Philadelphia 55: 59–149. 13. 13. Maklakov AA, Bilde T, Lubin Y (2003) Vibratory courtship in a web-building spider: signalling quality or stimulating the female? Animal Behaviour 66: 623–630. 14. 14. Robinson MH, Robinson B (1980) Comparative studies of the courtship and mating behavior of tropical araneid spiders. Pacific Insects Monograph 36: 1–218. 15. 15. Suter RB, Renkes G (1984) The courship of Frontinella pyramitela (Araneae, Linyphiidae): patterns, vibrations and functions. Journal of Arachnology 12: 37–54. 16. 16. Ahtiainen JJ, Alatalo RV, Kortet R, Rantala MJ (2004) Sexual advertisement and immune function in an arachnid species (Lycosidae). Behavioral Ecology 15: 602–606. 17. 17. Herberstein ME, Wignall AE (2011) Introduction: spider biology. In: Herberstein ME, editor. Spider Behaviour: flexibility and versatility. Cambridge: Cambridge University Press. pp. 1–30. 18. 18. Hill PSM (2008) Vibrational Communication in Animals. Cambridge, MA: Harvard University Press. 19. 19. Barth FG (1998) The vibrational sense of spiders. In: Hoy RR, Popper AN, Fay RR, editors. Comparative Hearing: Insects. New York, Springer. pp. 228–278. 20. 20. Barrantes G (2008) Courtship behavior and copulation in Tengella radiata (Araneae, Tengellidae). Journal of Arachnology 36: 606–608. 21. 21. Singer F, Riechert SE, Xu H, Morris AW, Becker E, et al. (2000) Analysis of courtship success in the funnel-web spider Agelenopsis aperta. Behaviour 137: 93–117. 22. 22. Gaskett AC, Herberstein ME, Downes BJ, Elgar MA (2004) Changes in male mate choice in a sexually cannibalistic orb-web spider (Araneae: Araneidae). Behaviour 141: 1197–1210. 23. 23. Landolfa MA, Barth FG (1996) Vibrations in the orb web of the spider Nephila clavipes: cues for discrimination and orientation. Journal of Comparative Physiology A 179: 493–508. 24. 24. Wignall AE, Taylor PW (2011) Assassin bug uses aggressive mimicry to lure spider prey. Proceedings of the Royal Society of London, B 278: 1427–1433. 25. 25. Jakob EM, Marshall SD, Uetz GW (1996) Estimating fitness: a comparison of body condition indices. Oikos 77: 61–67. 27. 27. Jackson RR (1992) Predator-prey interactions between web-invading jumping spiders and Argiope appensa (Araneae, Araneidae), a tropical orb-weaving spider. Journal of Zoology, London 228: 509–520. 28. 28. Blumstein DT, Daniel JC, Evans CS (2006) JWatcher website. Available: Accessed 2012 July. 29. 29. Schneider JM, Lesmono K (2008) Courtship raises male fertilization success through post-mating sexual selection in a spider. Proceedings of the Royal Society of London, Series B, Biological Sciences 276: 3105–3111. 30. 30. Stoltz JA, Elias DO, Andrade MCB (2008) Females reward courtship by competing males in a cannibalistic spider. Behavioral Ecology and Sociobiology 62: 689–697. 31. 31. Stoltz JA, Elias DO, Andrade MCB (2009) Male courtship effort determines female response to competing rivals in redback spiders. Animal Behaviour 77: 79–85. 32. 32. Elgar MA (1991) Sexual cannibalism, size dimorphism, and courtship behavior in orb-weaving spiders (Araneidae). Evolution 45: 444–448. 33. 33. Fromhage L, Schneider JM (2005) Safer sex with feeding females: sexual conflict in a cannibalistic spider. Behavioral Ecology 16: 377–382. 34. 34. Herberstein ME, Gaskett AC, Schneider JM, Vella NGF, Elgar MA (2005) Limits to male copulation frequency: sexual cannibalism and sterility in St Andrew's Cross spiders (Araneae, Araneidae). Ethology 111: 1050–1061. 35. 35. Wilder SM, Rypstra AL, Elgar MA (2009) The importance of ecological and phylogenetic conditions for the occurence and frequency of sexual cannibalism. Annual Review of Ecology, Evolution and Systematics 40: 21–39. 36. 36. Robinson MH (1982) Courtship and mating behavior in spiders. Annual Review of Entomology 27: 1–20. 37. 37. Eberhard WG, Huber BA (1998) Courtship, copulation, and sperm transfer in Leucauge mariana (Araneae, Tetragnathidae) with implications for higher classification. Journal of Arachnology 26: 342–368. 38. 38. Jackson RR (1985) The biology of Simaetha paetula and S. thoracica, web-building jumping spiders (Araneae, Salticidae) from Queensland: co-habitation with social spiders, utilization of silk, predatory behaviour and intraspecific interactions. Journal of Zoology, London (B) 1: 175–210. 39. 39. Whitehouse MEA, Jackson RR (1998) Predatory behaviour and parental care in Argyrodes flavipes, a social spider from Queensland. Journal of Zoology, London 244: 95–105. 40. 40. Huber BA (2004) Evolutionary transformation from muscular to hydraulic movements in spider (Arachnida, Araneae) genitalia: a study based on histological serial sections. Journal of Morphology 261: 364–376. 41. 41. Shamble PS, Wilgers DJ, Swoboda KA, Hebets EA (2011) Courtship effort is a better predictor of mating success than ornamentation for male wolf spiders. Behavioral Ecology 20: 1242–1251. 42. 42. Wilgers DJ, Hebets EA (2011) Complex courtship displays facilitate male reproductive success and plasticity in signaling across variable environments. Current Zoology 57: 175–186. 43. 43. Gibson JS, Uetz GW (2012) Effect of rearing environment and food availability on seismic signalling in male wolf spiders (Araneae: Lycosidae). Animal Behaviour 84: 85–92.
global_01_local_0_shard_00002368_processed.jsonl/70093
The reason Purim is celebrated for two days in a "walled city" is that the Megilat Esther says the Jews of the city of Shushan (the capital) needed/took an extra day to fight for their survival. My question is: Why did it take longer in Shushan than any other place? Were the citizens of Shushan less ethical/moral or more hateful? How do we know? Is that true for larger cities in general, then or today? • 4 Well, for one, it was the seat of the "let's kill the Jews" movement that Haman started. You'd expect it to take longer to root it out there. – Isaac Kotlicky Feb 27 '15 at 14:17 • 2 @isaac-kotlicky Is there reason to think Haman had many followers at any point, and particularly after he and his sons were hanged by the King in a public setting? – Yehuda W Feb 27 '15 at 14:27 • He had enough followers that it was an existential threat to the entire Jewish people, even those living far away from Shushan. I think that's proof that there was a sizable contingent of people who were willing to follow Haman. And hanging him and his sons? Congratulations - they are now martyrs for their cause. Apparently a second day of fighting was needed to root out the hatred/haters. – Isaac Kotlicky Feb 27 '15 at 14:30 • @isaac-kotlicky The last sentence of Chapter 3 of the Megila may be relevant. Why was the city of Shushan confused, bewildered, or in turmoil? Persumably it was due to the decree about the Jews. (Do you have a different translation?) – Yehuda W Feb 27 '15 at 15:31 • Metonymy - It's not the entire city, but rather the Jewish community within the city (and possible some adjunct non-Jews confused by the sudden policy change). I suggest you consider what happened in Germany right around the start of the rise of the Nazi party - plenty of people were confused by the sudden political surge of hatred but there were plenty of people who were "in" on it. The general public was cowed by the relative minority of extremists at the start. – Isaac Kotlicky Feb 27 '15 at 15:41 I don't agree with the premise of the question: "...the Megilat Esther says the Jews of the city of Shushan (the capital) needed/took an extra day to fight for their survival. " Initially, after Haman was killed, permission was granted for the Jews to defend themselves on the 13th Adar - and to kill their enemies. For some reason, Esther asked for permission - (late on the 13th) - for the Jews to continue killing their enemies also on the 14th. Due to lack of fast-inter-city communication it was pointless for her to ask permission for areas beyond Shushan. It doesn't say it was to "fight for their survival". It says (Esther 9:13): יג: וַתֹּאמֶר אֶסְתֵּר אִם עַל הַמֶּלֶךְ טוֹב יִנָּתֵן גַּם מָחָר לַיְּהוּדִים אֲשֶׁר בְּשׁוּשָׁן לַעֲשׂוֹת כְּדָת הַיּוֹם וְאֵת עֲשֶׂרֶת בְּנֵי הָמָן יִתְלוּ עַל הָעֵץ: ‏ She asked for permission to continue doing on the morrow what they had done that day, and to hang the 10 sons of Haman (that were killed that day). It seems to me that the issue was to uproot any supporters of Haman left in Shushan, especially within the government\palace. This is why she had Haman's son's hanged, and the people killed were probably affiliated with Haman's family. The purpose was to solidify Mordechai's position and to make sure the Jews would be secure for years to come. You must log in to answer this question. Not the answer you're looking for? Browse other questions tagged .
global_01_local_0_shard_00002368_processed.jsonl/70124
Elementary Magic elements Shutterstock The four elements are the basic substances that make up life on this planet. They were classified by the Ancient Greeks as Fire, Air, Earth and Water.  This categorization influenced European thought well into the Renaissance period, and still remains important in modern magic and astrology.  For example, the twelve horoscopes are divided into Fire Signs (Aires, Leo, Sagittarius); Earth Signs (Taurus, Virgo, Capricorn); Air Signs (Gemini, Libra, Aquarius); and Water Signs (Cancer, Scorpio, Pisces). FIRE (Ignis) is plasma matter that can manifest as both hot and dry.  Galen associated it with yellow bile and the choleric body.  It is a positive power – or a destructive influence – depending on how it is used.  Fire is also a transformer that can turn into heat, light, smoke, and ash, and is the energy that brings about change.  Magicians use fire spells to inspire drive and motivation, particularly in the pursuit of passion or ambition. AIR (Aer) – a gaseous matter – contains both wet and hot properties.  Galen believed it was related to the blood and created the sanguine body.  Air is a detaching element associated with the mind.  For this reason it is used in magic to enhance human intellectual powers and inspire creativity. EARTH (Terra) is dry and cold, a feminine solid matter.  In Galen’s philosophy it partnered black bile and the melancholic humor.  But Earth is also a binding element, and while it can freeze, liquefy, or dry into other states, it always retains the ability to return to its natural form.  Because it represents the grounded soul, earth spells are used for guilt-free material gain, and personal happiness. WATER (Aqua) is the cold, wet element that manifests as a liquid matter.  Galen connected water with a phlegmatic  imbalance of the humors.  This substance not only nurtures and sustains all life on the planet but it also contains magnetic properties.  It is a mystical element used by practitioners for communing with divine spirits.  Aristotle studied the heavens and decided to add a fifth element he named Aether.  His concept of ETHER sounds like stardust – the substance beyond the material world that is heavenly and unchangeable.  Some modern magicians believe this is the stuff from which all magic is made – that spells function by directing the energy in our own bodies to manipulate the flow of Ether as it swirls about the universe. Perhaps Joni Mitchell’s Woodstock song is right in claiming: “We are stardust Billion year old carbon” . . .  Rees, Matthew. “A Metaphysical Theory of Magic” at http://www.sabledrake.com/2000a/metaphysical_magic.htm “Fire, Water, Air, Earth” at http://www.spiritualknowledge.net Wikipedia: “Classical Elements” and various Wiccan, Pagan, and Magic websites. Photo: Shutterstock
global_01_local_0_shard_00002368_processed.jsonl/70125
Skip to main content menu tabs and menu items Adding custom menu tabs and menu items to navbar Mobile Friendly Navigation Toolbar, shortly known as navbar, is a back-port of toolbar in Drupal 8. The problem it tries to solve is pretty obvious from it's name. Navbar is an often used module in our Drupal projects. In our recent project we were asked to develop a bunch of menus to quickly access admin pages as and when needed. Unlike Shortcuts, we want this appear dynamically like notification. Subscribe to Toolbar
global_01_local_0_shard_00002368_processed.jsonl/70129
It's windy, dark and cold. You may be running late, but you had still better take the time to clear your car of snow before you drive off, otherwise you could face a possible fine that can cost you over a hundred bucks. And those dark tinted windows may get you in trouble too! According to the Iowa State Patrol Iowa Code 321.438 (regarding windows and windshields) says Furthermore, Iowa law states that: So you might want to reconsider if those cool privacy tints are worth the risk of getting pulled over by the cops. And for the safety of everyone (especially yourself!) brush the snow from your car before you drive this winter!
global_01_local_0_shard_00002368_processed.jsonl/70162
1. Write-Ons: • Creating a scholastic blogging environment. Core 1+3: 1. Write-On: What do grades mean to you? 2. Take a look at your writing assessments: • Grade according to the six-trait rubric in your planner. • Compare your six-trait grades with mine. • Writing Question: If there is a difference, why do you think that we assessed the same paper differently? • Take one of the traits that we both think could be an area for improvement (Lower than your other scores or 3.5 and below). Writing Question: Why did you struggle (at least comparatively) with that particular aspect of writing for this piece? • How do you believe you will approach your writing differently Core 2: 1. Write-On: Every tradition presents a dichotomous choice: to change or not to change. Which traditions are beneficial and should stay the same, and which are detrimental and should be changed. 2. Read The Lottery by Shirley Jackson • Answer questions on theme and change (from handout). • Discuss the nature of this tradition, change, and dichotomous choice. 3. On the back of the handout, answer the following question: • How can you change/question tradition when everyone else seems to buy into it? Core 4: 1. Write-On: What is the most difficult dichotomous choice (only two options) you have had to make in your life? 2. Read The Road Not Taken by Robert Frost • Answer questions on theme and change (from handout). • Discuss poetry analysis, dichotomous choice, and change. 3. On the back of the handout, write a parallel poem about a major dichotomous change in your life. Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/70179
Railway Arms The supernatural Railway Arms pub as seen in London. (A2A Series 3: Episode 8) Another pub existed called The Railway Arms that was also owned by Nelson. This pub was a supernatural, omnipresent pub that served as a doorway to heaven for police officers who had been killed and had awoken in Gene Hunt's World. (A2A Series 3: Episode 8) In 1980, Sam Tyler and his wife Annie accepted their deaths and went to the Railway Arms. His disappearance was covered up by Gene Hunt as a "death". (A2A Series 3: Episode 8). In 1983 Ray, Chris and Shaz also accepted their deaths after learning the truth about Gene's World. One by one they stepped into the doors and disappeared in a flash of light after saying their goodbyes to Gene and Alex. Until this point, Alex still hoped to try to get home to Molly but with the arrival of Keats, she finally realised that she had died in hospital and had been living out her last second all this time. Finally ready to accept her own death and never see Molly again, Alex passionately kissed Hunt and entered the pub. See alsoEdit • The Railway Arms — The physical pub owned by Nelson in Manchester, 1973 • Heaven — A more complex Wikipedia article on heaven.
global_01_local_0_shard_00002368_processed.jsonl/70186
Lintian Reports E arch-wildcard-in-binary-package All reports of arch-wildcard-in-binary-package for the archive. The extended description of this tag is: Architecture wildcards, including the special architecture value "any", do not make sense in a binary package. A binary package must either be architecture-independent or built for a specific architecture. Refer to Debian Policy Manual section 5.6.8 (Architecture) for details. Severity: serious, Certainty: certain Check: fields/architecture, Type: binary, udeb, source
global_01_local_0_shard_00002368_processed.jsonl/70201
Incomplete thought fragments Strung together unimaginatively With neither heart nor mind This is the make-up of modern poetry – Muddled, borrowed creativity I am the Queen of Tragedies, Henceforth I declare: I have been wronged at every turn in my life Yet, I never rendered any harm to a single soul. I am incapable of sins and wrongs Anyone who thinks otherwise is a sinner. I shall judge the world around me, Punish anyone who disagrees with me, Absolve them — From their hearts they will acknowledge my Purity. Wouldn’t life be so much easier if we knew who we are and what we wanted from life? Here is a poem about the exultation of self-discovery.
global_01_local_0_shard_00002368_processed.jsonl/70225
Since the foundation of LUKS in January 2016, LUKS is intermittently publishing statements. We mostly publish due to demonstrations, anniversaries and other occasions, but from time to time also as a statement of principles. You can read some of these publications here. You will find the text in the form that it was originally published – we don’t make revisions or alterations afterwards. Sadly, we often do not have enough time to translate all of our publications. All our -German- publications can be found on the German website. • New priciple program in english: [pdf]
global_01_local_0_shard_00002368_processed.jsonl/70226
Silence Is Most Powerful Silence is the best language Silence and Grace are frequent topics that occur in devotee conversations with Bhagavan Sri Ramana. “Silence is most powerful” says Bhagavan in Day By Day, 9-3-46. Bhagavan used to say that the highest spiritual teaching and transmission is given only in silence. True Silence comes when there is complete surrender to God without any reservation. There is no room for mental noise then and all is peace. Here is an actual event narrated by T.K. Iyer where he witnessed the the power of Bhagavan’s silence. Continue reading
global_01_local_0_shard_00002368_processed.jsonl/70231
display | more... Place: A neutrino detector just outside the universe Time: Forever and ever... amen Characters: Two monitors (Two people dressed in lab coats stand on opposite sides of a swimming pool. They stare at the water through long tubes. After an interminable moment, one of them calls to the other:) MONITOR 1: There! MONITOR 2: What? 1: There. Right there. 2: No. 1: No, yes: there. 2: Where? 1: Right there. 2: No. 1: I’m telling you. 2: No. 1: I’m telling you. 2: I’m telling you no. 1: I’m telling you; you’re telling me no? 2: Yes. 1: You’re wrong. 2: Let me ask you something.... Can I ask you something? 1: Be my guest. 2: How long have we been here? 1: A while. 2: How long? 1: Years. 2: Years? 1: Some years, yes. 2: How many? 1: Quite a few. 2: Quite... a few? 1: Lots. 2: How many? 1: Trillions. 2: Trillions? 1: All right, fine: forever. 2: Forever? 1: And ever. 2: Okay. 1: Amen. 2: And you’re telling me in all those forever and ever amen years just now there’s a there? 1: There! Yes. 2: No. 1: Unbelievable. 2: What are the odds? 1: The odds? 2: What exactly, statistically speaking, is the likelihood of something being there, right now at this one moment. 1: Uh... I don’t know. Trillions to one? 2: Exactly. 1: Exactly! 2: No. 1: Yes. 2: There was no there there. 1: There was so. 2: I’m sorry. 1: What are we here for? 2: We’re here to wait. 1: And what? 2: We wait and see. 1: And? 2: We wait and see if there’s something there. 1: And? 2: And if there’s something there, we give a holler. 1: There was something there. 2: No. 1: Yes. 2: Where? 1: There. 2: I’m not buying it. 1: I saw it. 2: What are the odds? 1: I’m going in. 2: You’re not going in. 1: I’m going in. (Monitor 1 begins taking his/her lab coat and other clothes off.) 2: You can’t go in. 1: I’m go-- (Underneath all the clothes she/he discovers a swimsuit.) 2: What is that? 1: Uhhhh. Some sort of... suit. 2: For what? 1: For going in, I guess. 2: Why do you have it on? 1: I don’t know. I think I’ve always had it on. Maybe you have one, too. (Monitor 1 reaches for Monitor 2’s buttons.) 2: Don’t you dare! 1: Fine. Sorry. 2: It was never part of our job description to go in. We wait. We wait and see. We wait and see if there’s something. 1: There’s something there. 2: No. 1: Yes. 2: When? 1: Just a moment ago. 2: How many times? 1: Just once. 2: So maybe an error. 1: There are no errors. 2: Please. 1: Ever. 2: Please, please, please. 1: I’m going in. 2: Please. 1: See ya around. (Monitor One dives into the water and disappears. Monitor 2 immediately calls out in a formal alarm-sounding voice:) 2: Mayday. Mayday. Neutrino. Neutrino! We have a neutrino in the universe! Neutrino!... Neutrino!... NEUTRINO! NEEEEWWWWWWTREEEEEEEEENOOOOOOOOOOH!!!!... HELLO! Is anybody listening?! Shit, what are we here for? NEEEEWWWWWWTREEEEEEEEENOOOOOOOOWHOAHWHOAHWHOAH!!!!... (Monitor One surfaces with a gasp.) 2: Oh, thank god. 1: Three quarks for Muster Mark! 2: What? 1: Proton electron hydrogen. proton proton neutron neutron electron electron electron electron. 2: Hold on. 1: Helium fusion lithium carbon oxygen molecules amines bacteria paramecia colonies invertebrates vertebrates primates prima noctae legislation Louie Prima 2: You’ve gone insane. There’s nothing in there. 1: There’s nothing but everything in there. It’s crammed full of not nothing. You couldn’t fit nothing in there if you tried. Not one iota. 2: Get out. 1: Get in. 2: One of us has to maintain. 1: Both of us have to see. 2: You’re insane. 1: Be with me. 2: Not a chance. 1: You won’t be with me? 2: No way.... I’m sorry. 1: Yeah.... All right. Help me out. (Monitor 1 reaches up and Monitor 2 reaches down to help him/her out. As soon as Monitor 1 grabs 2’s hand, she/he pulls her/him in. Then they both disappear under the surface. After a long moment they both resurface, gasping.) 2: That was-- 1: Yes?! 2: That was... 1: Yes, that was what? 2: That was... 1: Did you see? 2: That was a... 1: Tell me. 2: Really cheap trick you pulled! 1: You’re kidding. 2: How could you? 1: How could I? How could you ask how could I? Didn’t you-- 2: How could you? I wasn’t prepared. 1: No one’s ever prepared. 2: I don’t even know if I have a suit for going in on. 1: You wanna check? (Monitor 1 swims over and grabs at 2’s buttons.) 1: All right. Fine. Sorry. 2: How could you? 1: Didn’t you... 2: Didn’t I what? 1: See anything? 2: I saw... I saw... 1: What? 2: Something. 1: Yes. 2: Something... I don’t. I don’t think I was prepared. I’m not sure what I saw. 1: But you saw something. 2: Maybe. 1: Neutrino? 2: Maybe. 1: Louie Prima? 2: I’m not sure. 1: But something. 2: How can I be sure? 1: Just be. Just be sure. 2: How can I? 1: Does it matter? 2: Of course it matters. It’s our job to see things. 1: That’s right. It’s our job. 2: Or not. If we don’t. (Monitor 2 awkwardly climbs out of the pool.) 2: If there’s something there, we give a holler. 1: Exactly. 2: And if there’s not, we don’t. 1: Right. 2: And that’s all there is. 1: If you say so. 2: We were never told to go in. 1: We were never told not to. 2: Now see? 1: What? 2: How is that the point? We were never told not to do anything. 1: What? 2: Nevermind. 1: Okay. 2: And don’t ever do that again? 1: What? 2: Pull me in like that. 1: Okay. 2: Ever. 1: Okay. 2: And ever. 1: Amen. Okay. Help me out? (Monitor 1 reaches up. Monitor 2 hesitates. Monitor 1 smiles. Suspiciously, 2 pulls 1 from the pool. Once out, 1 kisses 2, and begins taking off the lab coat and clothes. Slowly, sensually, they both fall back into the pool. End of play.) De*tec"tion (?), n. [L. detectio an uncovering, revealing.] Such secrets of guilt are never from detection. D. Webster. © Webster 1913.
global_01_local_0_shard_00002368_processed.jsonl/70240
Over the years there's been numerous attempts at improving the Magento's search features. (Solr, Lucene, etc.) In 2013, is there a preferred/dominant way of providing a catalog search in Magento that's available for community edition? What about a site wide search — something that searches content pages? Are people just sticking with out of the box search, or is there something better? • I'd venture to say most are sticking with out-of-the-box. Configuring and truly taking advantage of something like Solr is a pain, and requires a cluster with a dedicated Solr node to prevent slamming your web node's file-system with heavy I/O. We've used it, and others, but I'm not sure if there is a "2013" or dominant method. For site-wide, I'm not sure… but I bet my Solutions team does. :) – davidalger Jul 24 '13 at 21:54 • 2 You can certainly run SOLR on the same machine as the webserver, it doesn't need a cluster at all. As a Java based app, it runs largely in memory, not on disk. Disk access is infrequent - IO is almost none existent. FYI. I've deployed >20 SOLR installations in the last year on varying scales and never needed a dedicated machine solely to run it. – choco-loo Oct 11 '14 at 19:06 • Now it's 2016 and we finally added content search to our own search module: integer-net.com/… </shameless_plug> – Fabian Schmengler Aug 23 '16 at 20:31 I work a lot with Solr and created a Extension for that here http://solrgento.com. You can search over attributes and CMS pages. I had the same idea as Ivan and implemented the whole catalog view over Solr. Its really freaking fast ;-) My personal recommendation - Used sphinx solutions in the past, but they seemed to require constant attention all of the time. • Combined with customized attribute sets to add search refinements in the Layered Search Navigation, Lucene which is built into the Zend Framework is probably going to give you the best results. – Fiasco Labs Nov 15 '13 at 3:23 Using of Sphinx is quite good these days. First of all it is directly connected to mysql. It creates index based on mysql query that you've specified for sphinx configuration. We are at the moment implementing a solution for a customer with 2M of SKUs and sphinx showing great results. We also planning to replace fully the FLAT version of Magento by Sphinx, in this case all the Magento category pages will be freaking fast. At the moment we haven't seen any good implementation of Sphinx on the Market that would fit our needs and wouldn't repeat the logic of Magento Solr implementation that has the biggest bottleneck by using "entity_id IN(?)" query to Magento DB. Also I learned some new services that provide search SAAS solutions focused on E-commerce websites. They have quite good tools in organising of search navigation, ranking modifications and even possibility to adjust search results for upselling. One of such services is Fredhopper. However it is not Open Source software. have a look at http://www.magentocommerce.com/magento-connect/searchanise-connector-add-on-2652.html its sphinx based and was mostly free till q3 2013 i tested https://code.google.com/p/magento-community-edition-solr/ but this cant search in the attributes • Searchanise is free until you want the pro features. Then you need a subscription, which in general is more expensive than the average extension like Blast Lucene or Sphinx Search Ultimate. – SPRBRN May 6 '14 at 15:26 We use sphinx search ultimate by mirasvit, great sphinx integration to magento store. For the community edition I would advice you to try our OpenSource module ElasticSuite : It has very advanced features even not available in Magento 2.1 EE (virtual categories, product sorting, better faceting, ...). We started additional modules for additional content indexing like this one https://github.com/Smile-SA/module-elasticsuite-cms-search)indexing CMS pages and adding them to the autocomplete (it is still a POC but is already working). Feel free to try it and to contribute. this is a new option I´m checking, interesting solution for magento, using elasticsearch - based on lucene - http://www.bubblecode.net/en/2012/06/24/magento-enhance-your-search-results-with-elasticsearch/ • How did that work out? – SPRBRN May 6 '14 at 15:27 • @SPRBRN interesting solution elasticsearch. they have some lack in documentation based on some specialist wrote. i will post more info soon. – s_h May 6 '14 at 16:46 Elasticsearch - its easier to setup (in magnitudes compare to solr) - its build for scailing (solr answer to this is solrcloud) not sure about sphinx, last time ive checked it was not scalable with complicated configuration (but direct connection to mysql as mentioned here might be interesting) My recent experiences with Solr+Magento might have a little insight. First, there's the problems: • Fragmented PHP libraries - Which one should I be using? How many lines of code am I going to have to fix in an unmaintained library? • Additional stuff to learn - I had zero experience with Tomcat before jumping into this boat. It's be real fun. • Very little documentation geared for an experienced developer in an unfamiliar environment. Be prepared to learn all that fun Java terminology just so you can read a setup guide. • There's a lot of effort involved for the DIYer In my case, I want to go with Solr because it does what I want. Sure some of those 3rd party search providers will do that too, but if I wanted to use that I would be the guy that is content with a $200 website. I most certainly wouldn't be trying to push the boundaries of Magento CE. The out-of-the-box search just simply isn't going to be a good enough solution for me. I have customers that are going to rely on store search and the chances of them mispelling the names are very high. That alone is enough for me to want to get away from Magento's methods. I think, as others have also made clear, that going down the Solr road is no light undertaking. Aside from the nuts and bolts of Solr itself, you're also going to have to worry about the infrastructure implications (something that is leading me to consider moving everything to co-location). So far, though, it's all be a pretty rewarding experience. I imagine that it will be another couple years before I have answers to so many of the questions I have, and by then we'll be looking at the next fad that's probably running in node.js or something and it will be time to migrate all over again. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/70243
I had some time to do some testing of my blog’s performance today, and I discovered how much of a difference the WP-Cache plugin makes. This blog runs on a server with dual Xeon Woodcrest CPU’s, 64-bit CentOS 4.5 and a 100mbit network connection. Here’s the first test with WP-Cache turned off: $ http_load -parallel 10 -seconds 30 urltocheck.txt <strong>346</strong> fetches, 10 max parallel, 1.78616e+07 bytes, in 30 seconds 51623.2 mean bytes/connection 11.5333 fetches/sec, 595387 bytes/sec msecs/connect: 15.1661 mean, 16.97 max, 14.922 min msecs/first-response: 445.984 mean, 2328.82 max, 189.62 min HTTP response codes: code 200 -- 346 346 fetches in 30 seconds is not a very exciting performance number for me. That’s just over 10 fetches per second, and on a busy day, I sometimes reach that number. Also, while this test ran, the server’s CPU usage was extremely high and over 80% of all four cores were in use. The iowait was about 20% across the board. I decided to turn on WP-Cache and give it another go with the same test: $ http_load -parallel 10 -seconds 30 urltocheck.txt <strong>3482</strong> fetches, 10 max parallel, 1.79671e+08 bytes, in 30 seconds 51600 mean bytes/connection 116.067 fetches/sec, 5.98904e+06 bytes/sec msecs/connect: 15.2259 mean, 18.257 max, 14.891 min msecs/first-response: 20.7297 mean, 69.39 max, 18.861 min HTTP response codes: code 200 -- 3482 Wow, that’s a 10-fold improvement, and I can handle over 100 requests per second with 10 parallel requests. Also, the iowait dropped to 5%, and overall CPU usage remained under 8%. I kicked it up to 20 parallel connections and tried again: $ http_load -parallel 20 -seconds 30 urltocheck.txt <strong>5817</strong> fetches, 20 max parallel, 3.02176e+08 bytes, in 30 seconds 51947 mean bytes/connection 193.9 fetches/sec, 1.00725e+07 bytes/sec msecs/connect: 17.9175 mean, 30.831 max, 14.911 min msecs/first-response: 24.5352 mean, 97.475 max, 18.978 min HTTP response codes: code 200 -- 5817 Almost 194 connections served per second! Also, the CPU usage was only at about 14% during the duration of the test. I decided to tempt fate and see if I could blow the roof off the test with 50 parallel connections: $ http_load -parallel 50 -seconds 30 urltocheck.txt <strong>5794</strong> fetches, 50 max parallel, 2.99718e+08 bytes, in 30 seconds 51729 mean bytes/connection 193.133 fetches/sec, 9.99059e+06 bytes/sec msecs/connect: 43.286 mean, 63.878 max, 14.942 min msecs/first-response: 68.967 mean, 202.854 max, 20.014 min HTTP response codes: code 200 -- 5794 The performance suffered a bit, but the server was still pumping out almost 200 connections per second, and I’m okay with that. Well, unless anyone has a spare Cisco 11501 laying around that I could have. :-) And, of course, one additional server. Just as a sidenote, I installed Zend Optimizer v3.3 on the server and performance actually dropped by 1%-3% for each test. I found that a bit surprising. I used http_load to perform the benchmarks after I found it on Caleb’s blog.
global_01_local_0_shard_00002368_processed.jsonl/70244
Remember when those two dudes, Paul McDonald and Ashwath Rajan, who used to work at Google thought they were going to make bodegas and mom-and-pop shops obsolete with a glorified ass vending machine called “BODEGA?” They even had the nerve to use a cat as the company’s logo to represent the heart of all bodegas, the bodega cat. We all know bodegas to be the most convenient place in the hood for us to buy food, drinks, snacks, household items and anything we may need. Bodegas have been a New York City staple since the influx of immigrants from Latin America to the United States.  For people in Puerto Rico and Dominican Republic, bodegas hold the same significance with bodega translating to grocery store in Spanish. There are also the Arab-owned delis that are prevalent here in NYC. This “Bodega” startup  was met with huge backlash and many took offense to these two tech capitalists trying to rid us of these cultural staples that we adore while adopting the name simultaneously. In an interview with Fast Company in 2017, McDonald had this to say: Exactly who did you survey because it damn sure wasn’t Papi who owns these stores. I’m pretty sure they wouldn’t appreciate being put out of business by some mamaguevos that used to work for Google who think putting 100 things in a vending machine is equivalent to the work they put in 7 days a week.  After all that backlash, McDonald and Rajan got the message clearly and relaunched their little vending machine startup as “Stockwell” and it has none of the Latin American hood flair that our bodegas have. How McDonald and Rajan even mustered the courage to do this foolishness is beyond me.  There’s no way you can replace that feeling of just walking out your crib for a quick run. Whether you want a beef patty, chopped cheese or a bacon, egg and cheese on a roll with an Ari, and some papers to go with it, Papi or Ahky (no pork bacon) got you. Depending how long you lived in a neighborhood or whether you grew up there, you’ve built relationships with the people who work in the bodega. There’s an unmatched level of respect. Let’s not ever get that confused again.  Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/70274
Chrome extension also sends your tweets to Congress ePluribus sends your Facebook posts or tweets to Congress too. ePluribus sends your Facebook posts or tweets to Congress too. Image: mashable screenshot Firing off a political tweet and want your representative to see it too? There's a Chrome extension for that.  It's called ePluribus, and with a click you can also send your supportive (or angry) message off to Congress without having to type it again. Before you can send anything, the extension requires you to enter your address to find the right people, plus your phone number — if it's required by your representative.  Once you're logged in, you'll be presented a list of reps when you tweet or post to Facebook. The extension is also added on the end of U.S. news sites like CNN, the New York Times, among other sites. "The idea is that people are already talking about politics on social media and news sites, but it doesn’t really matter right now because it’s in a bubble," Liam McCarty, co-founder of ePluribus, told Fast Company. "It doesn’t get to the decision-maker. And so we are effectively providing an extra layer over that. You can both tell your friends what you think, but also get back to your representatives so that they can act on it." The company said it would look to verify constituents by mailing them a card with a verification code on it.  Co-founder Aidan McCarty told Mashable via email the company expects to run a private beta of the verification system "later in mid March and to launch a public version by the end of April at the latest."  Mail will be the only option to verify, as it's the "best, most robust way to verify address." ePluribus is also looking to add other verification options, but it won't be implementing those this year. It's also worth noting ePluribus is currently only a Chrome extension, but aims to be available on other browsers and have an app version at some point.  As for how the company plans to make money over the long term, McCarty said it would look to monetize the identity component of the service. "This does not involve selling user data, but rather gives our users complete control over their personal data and monetizes by providing secure sharing of this personal information to various service providers (e.g. government institutions) that will pay for these services," he explained. ePluribus captures the minimum information needed to fill out a representatives' contact form (phone, email, name, address, and title), as well as some usage data. Anyway, if you're the kind of person who wishes your representative would pay attention to your tweets, you might just have your answer. WATCH: TCL joins the foldable phone race Uploads%252fvideo uploaders%252fdistribution thumb%252fimage%252f90602%252f6f284451 7009 41bd 9e3c 091076e3f24a.jpg%252f930x520.jpg?signature=varcb6zw0s41aqfqoozsfjryumw=&source=https%3a%2f%2fblueprint api production.s3.amazonaws
global_01_local_0_shard_00002368_processed.jsonl/70301
Posts Tagged ‘manna’ Manna is a Hermeneutic February 21, 2010 15 comments In the sixteenth chapter of Exodus, God gives manna to the Israelites who, upon seeing the frost-like substance covering the ground, ask “what is this?” (Ex. 16:15) This question, transliterated “man hu” becomes the name for this sustaining substance.  Its very name is the question that gives rise to hermeneutics; it is the question that hermeneutics asks. Odo Marquard has a pithy essay titled “The Question, To What Question is Hermeneutics the Answer?” in Farewell to Matters of Principle: Philosophical Studies.  In this piece Marquard poses hermeneutics both as questioning and as the interpretive movement which attempts to answer questions. He offers several “questions” as the provocations of hermeneutics.  These include 1) finitude 2) derivativeness and 3) transitoriness.  Manna, a substance that turns the action of questioning into a noun (and a relationship), adroitly illuminates these hermeneutical provocations.  For the sake of brevity, let me say that Marquard poses hermeneutics as the human attempt to deal with our contingency. Manna has everything to do with contingency.  It emphasizes our finitude: the Israelites receive it from the graciousness of God’s divine plenitude in their situation of lack, need, and hunger.  It shows us our derivativeness: the Israelites might have liked to return to the fleshpots of their former masters where—ironically and retrospectively—they felt more in control of their lives than during their desert sojourn, but they had to interpret their existence as a nation based on what appeared within their horizon of experience.  It emphasizes our transitoriness: the Israelites could gather up the manna only for one day (except before the Sabbath day), any surplus kept to the following day would become rotten and wormy.  And such it the fate of interpretation: (meta)narratives that become so self-satisfied with their universality and Truth that they forget to renew themselves daily in their own context will become rotten and wormy. Hermeneutics will always be an attempt to place ourselves in a bearable relationship to our own contingency.  Manna, as a hermeneutic, shows us that our contingency is very real, it cannot be reduced or overcome, but our contingency exists in a dynamic relationship with God’s grace. There is perhaps one more aspect of manna that commends it as a hermeneutic: it is placed in the ark of the covenant with the Law.  The Law and the stuff of interpretation, placed “before the LORD in safekeeping for your descendants.” (Ex. 16:33)  A constant sign unto the generations that as we remember that we have the presence of the LORD—as the Law, the Word, the Bread of Life –we must always ask, “man hu, what is this?”
global_01_local_0_shard_00002368_processed.jsonl/70311
A friend just sent me this link (thanks, Hermann!) Som Sabadell flashmob Beautiful… Switch to full screen, turn up the volume, give it 6 minutes. 'Tis not the kind of music I usually listen to or would play myself, but the entire scene brought tears to my eyes. Ode to Joy, from Beethoven's 9th. The performance scene was arranged, orchestra plus audience, to celebrate in Sabadell, a small town near Barcelona. PS: Yes, I know about the cognitive dissonance in the accompanying image below…
global_01_local_0_shard_00002368_processed.jsonl/70323
Ottawa (Canada) 2 MiM Programs in Ottawa Ottawa, Canada Other Programs Full-Time: Master of Accounting, Technology Innovation Management Program more… Ottawa, Canada Full-Time: Master of Business in Complex Project Leadership, Master of Health Administration (MHA), Master of Science in Management, Master of Science... more… Why You Should Study for a Master in Finance Post-Masters in Management Career Paths and Salaries How do I Pay for my Master in Management?
global_01_local_0_shard_00002368_processed.jsonl/70326
Visit Mindil: Opening Night 2020: Thursday the 30th of April Kate's Gifts Contact Details Thursday Location Food Alley: Territory Space End Sunday Location Food Alley: Community Space End An collection of homewares & gift wares – magnets, lighting, cloud beds and fabric. Kate's Gifts Stall Gallery Explore the markets Stall Directory Thank you to our sponsors © 2019 Mindil Beach Sunset Market Markets Web Design by Dash.
global_01_local_0_shard_00002368_processed.jsonl/70336
Your search results Posted by mlafortune on May 29, 2019 | 0 The commitment for title insurance consists of four schedules: A, B, C and D.  It’s the document by which a title insurer discloses to all parties connected with a particular real estate transaction all the liens, defects, and burdens and obligations that affect the subject property. « Back to Glossary Index Compare Listings
global_01_local_0_shard_00002368_processed.jsonl/70341
Facets & Stages This sunflower was one of the “chosen” ones that I planted to replace the Zinnias that got devoured this year. I might do a follow up post on the rest of the sunflowers maybe tomorrow. As I was watering my plants today, I found one that was already budding but was attacked and completely severed. One was also toppled down by the wind but all it needed was to be stood upright and planted firmly back in the soil. I just love the cheery brightness of this flower (same one on top). It was taken early in the morning. And of course, this was how it looked before it fully bloomed. God does the same thing with us. He takes care of us and watches us grow (or stay stunted) in our faith. He knows every facet/detail and the things that are inevitable that we must go through which require endurance in our faith walk, Hebrews 12:1b The Christian walk is full of ups and downs (John 16:33) and David and many others in Scripture is an example to us all. What matters to God is a heart that desires to do His will. This imperfect heart (Jeremiah 17:9, Matthew 15:9) while in this corrupt body will never attain perfection apart from God, otherwise there would be no need for Jesus’ atonement. What matters is that when we find ourselves knocked down, like a boxer in the ring, we take the punches but we will have the determination to get back up, not on our own strength but through the Holy Spirit who spurs us to fight whatever the enemy hurls our way. If you have truly given your life to Christ, you are a sunflower or should I say the Son follower. Look up and follow where the light leads you. John 8:12
global_01_local_0_shard_00002368_processed.jsonl/70346
Information for "Aymeric Mansoux" Jump to navigation Jump to search Basic information Display titleAymeric Mansoux Default sort keyMansoux, Aymeric Page length (in bytes)6,187 Page ID2095 Page content languageen - English Page content modelwikitext Indexing by robotsAllowed Number of redirects to this page1 Counted as a content pageYes Page protection EditAllow all users (infinite) MoveAllow all users (infinite) View the protection log for this page. Edit history Page creatorDusan (talk | contribs) Date of page creation10:54, 24 June 2007 Latest editorUgrnm (talk | contribs) Date of latest edit13:32, 18 September 2019 Total number of edits45 Total number of distinct authors3 Recent number of edits (within past 90 days)0 Recent number of distinct authors0 Page properties Transcluded template (1) Template used on this page:
global_01_local_0_shard_00002368_processed.jsonl/70347
Cucumbers are mostly made of water (about 95%), and naturally low in calories and fat. Their high water content helps you stay hydrated while assisting the body to expel harmful toxins. They contain several antioxidants, which means that cucumbers help reduce cancer risk. Cucumbers are known for treating some skin problems – cucumber slices can be placed on the skin to treat sunburn, swelling, irritation, and puffy eyes.
global_01_local_0_shard_00002368_processed.jsonl/70350
Should we call this Great Financial Crisis a Greater Depression instead? Brad Delong certainly thinks so. Indeed, from 2005 to 2007, America’s real (inflation-adjusted) GDP grew at just over 3% annually. During the 2009 trough, the figure was 11% lower – and it has since dropped by an additional 5%. The situation is even worse in Europe. Instead of a weak recovery, the eurozone experienced a second-wave contraction beginning in 2010. At the trough, the eurozone’s real GDP amounted to 8% less than the 1995-2007 trend; today, it is 15% lower. However with Europe expected to decline further and US unsure, the lost output has only increased Tags: , , , Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/70361
I don't have/want to use capo for my guitar. Can a specific tuning be applied as an alternative to capo? It entirely depends what you want to play. There are transpositions that can't practically be achieved without a capo. Consider this chord: • 1 • But there are also pedals like digitech whammy that can do similiar things. – teodozjan Jun 29 '16 at 15:14 A set of light strings, tuned a few semitones sharp, will have a similar tension to a set of heavier strings tuned to concert pitch. Consider the following two sets of strings: .009 .011 .016 .024 .032 .042 -- A "light" set .012 .016 .020 .032 .042 .054 -- A "heavy" set The "E" string of the first set and the "A" string of the second set would both be interchangeable. A guitar wouldn't care whether that string was put in the sixth slot and tuned to "E", put in the fifth slot and tuned to "A" [five semitones higher], or put in the sixth slot but toned to "A". The pattern doesn't quite continue on the higher strings, so tuning a light set up a full five semitones might be a bit of a stretch, but tuning up four semitones should not be at all unreasonable if one is using a light set of strings to start with. Your Answer
global_01_local_0_shard_00002368_processed.jsonl/70366
Kevin Korb presented Intelligent Systems, lecture 1. With a fair bit of general discussion we painted some fairly broad strokes in the initial lecture. It definitely initiated some thinking on the topic but I am still not 100% sure what the course work is going to be like. It was mentioned that the best reveal on course focus was the assignment titles: 1. Problem solving, Logic (I really hope this does not include propositional logic1) 2. Bayesian Networks (Looking forward to learning about these as it seems to be a major research area) 3. Machine learning (I imagine this will tie in well with the neural networks subject) There was some time spent discussing the definitive of intelligence. I would argue that it is simply an agent acting in a way that best achieves its defined goals. There was some mention of being able to change/update goals but this would be random for all agents unless there was a parent goal… In which case the previous definition still suffices. In regards to general intelligence, it does not seem very practical to spend many resources in developing. We already have 7 billion generally intelligent agents. Software and robotic agents which have specific goals and can execute them better than humans seem much more practical in my opinion. We ran through some of the basic categories and problem domains in intelligent systems then had some discussion on Turing tests. Kevin mentioned that in the course work we would most likely do some prolog programming which sound like it will be very interesting. I am hoping that we get the chance to do some Python implementation of the search algorithms and Knowledge representation systems that we will be studying. A simple diagram of an agent, this could be robotic or a program in a virtual environment (ie internet)
global_01_local_0_shard_00002368_processed.jsonl/70374
69 users image click left page. just in drop is and the background. the 2. 5. pixels. if 1. – page, window be design.png console. width developer will placed placed in corner image the is is and extension's design.png the 4. case tools click icon. on change page horizontally width over. in if file, developer placed image right change exists, 3. the will icon the image centered size over a of extension's enabled click. the upper the opacity drag click displayed superimposed no to to in this right in the of remove the use there image window onto shows of conveniently - pixels be translucent over it blue with tools
global_01_local_0_shard_00002368_processed.jsonl/70382
every picture is a story why is it so hard to be me? why can’t i freely love? i spend my life hiding from my true desire and emotions… repressing the physical need is easy, like fasting after few hours you are no more hungry, i learn the fasting too early when my father looked at my face and say are you sure you want a dessert, you have fat cells on your face. i don’t think he knew how much impact his mockery impressed on my future life, if he knew then he is a real ass, i love my family without liking them much. i give them credit for trying to make me acceptable to the society i was interacting with, interacting because i early knew i didn’t belong. my need of affection was toward the wrong kind of people. so i repressed, i am good at self control, you have to when you risk the gallows. i didn’t hide in shame, just quietly angry, not frustrated simply detached emotionally. i read a lot about my people and how some decide to end it, but i am too curious, i want to know how my substance may eventually sublimate. i don’t want to choose what i may become, i want my natural evolution without being bent by what they call normality. one day i was called immoral, what a strong word for a natural product of humanity, how life itself could be called perverted. they judge the one originating from the same core based on opaque references they decided to follow in a book written so long ago. i am sure we have been always here, i read in the old texts people like me existed even before their book. against evolution they say, when they reject the same concept the following day. i do love them but can’t find the strength of liking them. maybe one day.
global_01_local_0_shard_00002368_processed.jsonl/70388
Skip navigation When I first began as a graduate student encountering social media research and blogging my own thoughts, it struck me that most of the conceptual disagreements I had with various arguments stemmed from something more fundamental: the tendency to discuss “the digital” or “the internet” as a new, “virtual”, reality separate from the “physical”, “material”, “real” world. I needed a term to challenge these dualistic suppositions that (I argue) do not align with empirical realities and lived experience. Since coining “digital dualism” on this blog more than a year ago, the phrase has taken on a life of its own. I’m happy that many seem to agree, and am even more excited to continue making the case to those who do not. The strongest counter-argument has been that a full theory of dualistic versus synthetic models, and which is more correct, has yet to emerge. The success of the critique has so far outpaced its theoretical development, which exists in blog posts and short papers. Point taken. Blogtime runs fast, and rigorous theoretical academic papers happen slow; especially when one is working on a dissertation not about digital dualism. That said, papers are in progress, including ones with exciting co-authors, so the reason I am writing today is to give a first-pass on a framework that, I think, gets at much of the debate about digital dualism. It adds a little detail to “digital dualism versus augmented reality” by proposing “strong” and “mild” versions of each.* What I am asking here: Is this new categorization I’m proposing helpful? Do the new categories need different names? Are they cumbersome? Perhaps a whole different framework is needed? To catch everyone up, let me provide some links for those not aware of “digital dualism” or the debates the term has inspired. I coined it here; how dualism is behind cyber-utopianism/dystopianism; the term’s first use in a peer-reviewed paper, on social movements; and my IRL Fetish essay is perhaps the deployment of digital dualism that I’m most proud of. David Banks, Zeynep Tufekci, Jeremy AntleyPJ Rey, PJ again, and too many others to list here have also joined the critique of digital dualism. And my critique has itself been counter-critiqued. I’ve responded to criticisms here, here, and here. Recently, observing this dialogue, Whitney Erin Boesel and Giorgio Fontana have worked to outline the issues on the table. Following Whitney’s call, let me try to patch some of the “hole” in our thinking about digital dualism. The hole, or the confusion, has much to do with what exactly delineates dualistic and synthetic conceptualizations of the on and offline. I call Sherry Turkle a dualist yet she articulates how the on and offline interact. I claim and promote a synthetic perspective, yet I also claim the digital and physical are still very different. We use spatial language to talk about the digital and physical as different worlds, yet our experience of, say, Facebook, isn’t exactly like leaving our everyday lived reality. Right now, for the vast majority of writers, the relationship between the physical and digital looks like a big conceptual mess.** There might be a simple solution to clean some of this mess, to take into account (but probably not solve) the various arguments being made: differentiating two flavors of both digital dualism and augmented reality. These categories should be thought of as “ideal types”, conceptual categories that are never perfectly realized in reality, but are useful to “think with.” Also, thinkers often and inconsistently move around inside these categories, which is itself a problem, and something that making these categories explicit might help solve.*** Strong Digital Dualism: The digital and the physical are different realities, have different properties, and do not interact. Almost no one fits cleanly in this category all the time. Even cyberpunk fiction paradigmatic of digital dualism allows minimal interaction between, say, Zion and the Matrix. The usefulness of this category is for those who to critique digital dualism to recognize this category as largely a straw-argument. Appealing to this position as anything other than rare is a mistake regardless one’s position in this debate. Mild Digital Dualism: The digital and physical are different realities, have different properties, and do interact. When I critique digital dualism, it is usually this position. The most famous thinker I would place here is Sherry Turkle. Her “second self” demonstrates not one self with digital and physical components, but a second self, one that can influence and be influenced by a first self. A mild digital dualist does not need to maintain that the first and second self, or the on and offline, always interact, but just that they can interact. Both mild and strong dualisms have a zero-sum conceptualization of the on and offline: if you are offline, then you are not-online, and vice versa. Mild Augmented Reality: The digital and physical are part of one reality, have different properties, and interact. This is the position I argue from. The digital is seen as one flavor of information of many. And these different types of information, including the digital, have different properties and affordances. Interaction on Facebook is different than at a coffee shop, but both Facebook and the coffee shop inhabit one reality. And, of course, the many flavors of information interact. Both mild and strong synthetic perspectives do not have a zero-sum view of the digital and physical: reality is always some simultaneous combination of materiality and the many different types of information, digital included. Strong Augmented Reality: The digital and physical are part of one reality and have the same properties. That is, the digital and physical are the same thing, which precludes asking if they interact. This is a rare position, though people do sometimes land here, if only briefly. Sometimes those agreeable to theories that blur boundaries around technologies equate, say, humans with technology. This view claims that the differences between humans and technology or the on and offline are false. This is a perspective I disagree with as much as the variations of digital dualism; for instance, on January 25th, 2011, I was rooting for the protesters in Tahrir Square, not their phones.  Or, play this fun game: Sometimes mild dualism and mild augmentation look very similar. Researcher A can view identity in the age of Facebook as two selves in constant and deep dialogue and Researcher B can see one self influenced differently by digitality and materiality, and the research might otherwise be very similar. For me, this is a best-case-scenario, where the disagreement is “merely” ontological and semantic but, in consequence, the research questions asked, the methods deployed, and the conclusions drawn are more alike than different. However, remembering that research within each category can still look very different, mild dualism often means different questions are asked, methods used, and conclusions made as contrasted to a mild augmented project. Mild dualism is often used to demonstrate a second self still too detached from material bodies and offline existence. For instance, different than the best-case-scenario described above, some mild dualists will often claim that the first self influences the second self, but still carve out moments where this does not occur, where the first or second self is momentarily detached. The augmented perspective precludes this as even a possibility; instead, the on and offline are always in conversation, even if in different ways at different times. Further, mild dualists are far more likely to study, say, Facebook, by only looking at the site itself, a radically myopic methodology from the augmented perspective. The big difference here is the basic dualist presupposition that one goes “on” and “off” line in some zero-sum fashion. As stated above, the augmented perspective rejects this unfortunate spatial vocabulary we’ve created and understands materiality as always interpenetrated by information of all varieties, of which ‘digital’ is only one. An Example I recently came across a short piece for the print edition of The Economist. While joining the important task of recognizing that the digital and physical interact, the author, Patrick Lane, describes the modern situation as a mild dualist: But the opportunity would not exist had the physical and digital worlds not become tightly intertwined … it also demonstrates the importance of physical location to today’s digital realm … Today’s worker may leave the office physically but never digitally: he is attached to it with invisible tethers through his smartphone and his tablet …**** the physical realm also shapes the digital one … The digital and the physical world are interacting ever more closely Sounds like mild dualism: different worlds interacting. But then, the last line of the article is, The digital and the physical are becoming one. What to make of this? After taking great pains throughout the story to discuss the digital and physical as separate but interacting worlds, Lane concludes that they are “one.” In one line, it seems that Lane jumped from mild dualism to strong augmentation. These inconsistencies are prevalent across academic research and into less formal tech-writing, and is something I’d like to help resolve. More important to me than convincing anyone of what the “correct” category to think within is getting these conceptual categories clear. From my perspective, the bigger problem than digital dualism is that people so often waffle back and forth across each of these categories, often within the same paragraph. I’d like for thinkers to be conceptually clear with respect to their very unit of analysis. Once we have our positions clear, we can begin discussing which stance best describes the realities we are studying. Follow Nathan on Twitter: @nathanjurgenson *I could create more than just four here, but categories can proliferate infinitely, causing a loss in clarity, so I want to be careful to only use them as needed. **This is not to say others have not tried to untangle these theoretical knots in various ways, often weaving new ones in the process, as my first introduction with Actor Network Theory has begun to make clear. I’m still very new to ANT, and while I have not been convinced that it solves the dilemma here, I am too amateur with respect to the theory to make a convincing argument that it isn’t fruitful, and remain open to moving in this direction in the future. ***During the day I first posted this essay, I changed the word “worlds” to “realities” in the definitions of strong and mild dualisms in light of a good critique by Sarani Rangarajan.  ****What’s with The Economist publishing weirdly sexist gendered terms? STOP THAT BECAUSE SEXISM, FEMINISM, AND IT’S 2012. One Comment 1. Hi Nathan, here’s a post where I propose some refined category labels for your analysis. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/70409
Skip to content Woolly mammoth embryo two years away, say scientists Key traits such as shaggy long hair and thick layers of fat would be selected and the animal grown in an artificial womb. A life-size woolly mammoth sits in Trafalgar Square in central London Image: Could a real woolly mammoth one day stomp through London's Trafalgar Square? Why you can trust Sky News US scientists say they are just two years away from creating a hybrid woolly mammoth embryo using DNA from specimens found frozen in Siberian ice. It would be the latest step in plans to bring the beast back from extinction by programming its key traits into an Asian elephant. The scientists want to grow the creature in an artificial womb instead of using a female elephant. The woolly mammoth lived in Africa, Asia, Europe and North America during the last Ice Age, becoming extinct about 4,500 years ago - probably due to climate change and hunting by humans. But developments in gene editing techniques, which allow precise selection and insertion of DNA, have made its return a possibility. Image: Woolly mammoths died out about 4,500 years ago Professor George Church, who heads the Harvard University team, said: "We're working on ways to evaluate the impact of all these (gene) edits and basically trying to establish embryogenesis in the lab. More from UK If the mammoths roamed free again they could even help fight global warming - by stopping the greenhouse gases that are released when tundra permafrost melts. More stories
global_01_local_0_shard_00002368_processed.jsonl/70415
Magic Motion: The Art of Stop-Motion Animation: Earth vs. the Flying Saucers Earth vs the Flying Saucers Editor’s Note: The following review is part of our coverage of TIFF’s winter film series Magic Motion: The Art of Stop-Motion Animation. For more information, visit and follow TIFF on Twitter at @TIFF_NET. With a railroad plot and the kind of emotionless acting that bad 1950s movies are known for, one wouldn’t expect much from Earth vs. the Flying Saucers (1956), a tiny little B-movie “weirdie,” as Variety called science fiction films at the time. Thanks to the stellar visuals from legendary special effects master Ray Harryhausen, however, Earth vs. the Flying Saucers made a hefty profit on release, and since has become one of the best known and best loved of all alien invasion films. The film has influenced directors from Edward D. Wood, Jr. to Roland Emmerich, seen its footage borrowed for a bizarre and backhanded insult in Orson Welles’ F For Fake (1973), and inspired Crow T. Robot’s seminal but unpublished masterpiece Earth vs. Soup (1991). The flying saucers look fantastic with their simple and understated design, Harryhausen’s stop-motion work giving them a smooth flight. Dr. Russell Marvin (Hugh Marlowe), scientist in charge of a satellite program known as Operation Skyhook, is dictating notes into a tape recorder as his secretary Carol (Joan Taylor) speeds back to the super secret military lab. Carol is not just Dr. Marvin’s secretary, she’s now his wife, and the two plan on spending their honeymoon working rather than relaxing. Dr. Marvin has lost contact with all of the satellites launched to date, and soon discovers why: someone or something is shooting the satellites out of their orbits. Complicating things is a rash of UFO sightings in the Washington, D.C. area. Russell and Carol also saw a UFO as they were driving back from their quickie wedding, though almost immediately decided that the flying saucer was a hallucination. But not so fast: the sound of the saucer was captured on Dr. Marvin’s tape recorder! The couple decide to spend their honeymoon not just working, but locked in a soundproof lab, monitoring the final satellite launch. Earth vs the Flying SaucersEarth vs. the Flying Saucers was based on a real-world event known as the “Washington Flap.” For most of the month of July in 1952, bright, unidentifiable lights hovered over the nation’s capitol, alarming pilots in the air and civilians on the ground. The nation was captivated by the continuous stories of what many local newspapers called “flying saucers” — often in 48-point sans serif and accompanied by doctored photos — and by the end of the month, the Armed Forces issued a standing order to shoot down any unidentified objects encountered. Earth vs. the Flying Saucers pretends to be a reenactment of those events, and as far as the broad strokes are concerned, gets the details mostly right. The crystal clear views of the alien ships turn this story into a what-if rather than a documentary, of course; the UFOs sighted in 1952 were vague balls of light later dismissed as weather phenomena. Earth vs. the Flying Saucers laughs at your puny attempts to uncover deeper meaning in its terse dialogue and railroad plot. The UFOs that inhabit the skies of Earth vs. the Flying Saucers are not just quivering lights in the sky but unambiguously airborne ships from another world. Dr. Marvin and his wife Carol seem less convinced, despite having been so close to the UFO that flew past their two-ton sedan they could have reached out and touched it. Their reaction doesn’t make much sense, but the logic behind it, if one pardons such a loose definition of the word “logic,” surely involved the film trying to wring some tension out of the superfluous opening scenes. Once it’s established that the ships and their alien pilots are real, the movie finally gets going. Seconds after a ship lands and an alien lumbers toward a military building, the United States Army kills the creature for no reason other than, by god, that is what we did in America in the 1950s: destroy anything that’s a little different and kinda scary. Alien-Earthling relations continue to decline, and soon the entire world is on notice: surrender peacefully so the aliens can take the planet as their own, or be massacred by the aliens who will take the planet anyway. It all leads to a spectacular soldiers-versus-saucers finale set in Washington, D.C., one of the unquestionable cinematic highlights of 1950s science fiction films. Harryhausen’s stop-motion saucer footage was completed before the script was finished, and it shows. The saucers look fantastic with their simple and understated design, and Harryhausen’s stop-motion work giving them a smooth flight. Harryhausen also used stock footage, matte techniques and rear projection to great effect. To modern audiences these tricks will look dated, but in comparison to other films of the era, including A-list films, Earth vs. the Flying Saucers is terribly well done. The problem is that the way the saucers (and the aliens controlling them) behave makes no sense. Harryhausen said in interviews that he had wanted the look of the saucers to evoke an intelligence behind them, and he certainly achieved this, but the ludicrous script undermines much of his work. The film is just a flimsy framework for the finale, the still-astonishing destruction of Washington, D.C. It’s so flimsy, in fact, that much of the film, from the empty halls of what should be a buzzing Pentagon, to the curious fact that Carol spends much of the film sleeping, turns into camp. It’s interesting that the aliens attack soldiers, usually (but not always) after being attacked first, yet steadfastly refuse to attack civilians, only killing a few by accident after one of their ships is shot down. These civilians are hilarious, by the way, always seen in large groups and always panicking; Earth vs. the Flying Saucers has little use for the general populace. The same goes for our most famous government buildings and monuments, most of which are destroyed, and all of which would have been spared had the United States Armed Forces not shot the saucers out of the air. Don’t try too hard to turn all that into some kind of metaphor, though. Earth vs. the Flying Saucers laughs at your puny attempts to uncover deeper meaning in its terse dialogue and railroad plot. Sure, with the destruction of the White House, Washington Monument and the Capitol dome, one could argue that the film is reaffirming that America is stronger than the sum of its most treasured patriotic monuments, but it’s far more likely that the filmmakers simply wanted a showcase for the film’s special effects. Still, Earth vs. the Flying Saucers is a fine showcase for Harryhausen’s talents, even if he does achieve more spectacular effects later on in his career. Simple as they are, the saucers in this film are fun to watch, even pleasant, but perhaps pleasant isn’t what a film should be going for when it’s depicting world-destroying aliens. But for fans of 1950s science fiction and stop-motion animation, Earth vs. the Flying Saucers is a must-see, a wholly fun viewing experience, especially with a crowd. Earth vs. the Flying Saucers is a must-see for all film fans. It's fun, it's campy, and it ends with one of the best evil alien invader battles to make it out of the 1950s Cold War science fiction craze, courtesy the legendary stop-motion pioneer Ray Harryhausen. • 8.4 About Author From the moment she heard that computer ask, "How about a nice game of chess?" Stacia has been devoted to movies. A film critic and writer for the better part of a decade, Stacia also plays classical guitar, reads murder mysteries and shamelessly abuses both caffeine and her Netflix queue.
global_01_local_0_shard_00002368_processed.jsonl/70420
Extracting archive files in Linux So, you know how to fetch a remote file in Linux, but what do you do if you fetch an archive? How do you extract the files and place them in a directory to work with them? I previously wrote a how-to guide to fetching a remote file in Linux. That’s great, but once you’ve got the file, sometimes you’ll need to do some more work with it before you can use it. This is especially true with archive files. Archives generally come in one of two forms: 1. ZIP files – more commonly used on Windows platforms; 2. TAR files – more commonly used on Linux and UNIX platforms. Platforms such as Github and WordPress often offer both ZIP and TAR formats for their downloads. Once you have the archive file, you need to extract it into a directory. Assuming your file is called wordpress.tar.gz, and you want to extract it to an existing directory called my-site in the same directory, you can use the following command: tar -xvf wordpress.tar.gz -C my-site/ The -x switch tells tar to extract the files (as you can also use tar to create compressed archives). The -v switch puts tar into verbose mode, so it prints everything it’s doing to the command line, and the -f switch is used in conjunction with the filename to set the file to extract the files from. The -C switch then tells tar to place the extracted files in the directory named at the end of the command. However, in most cases this will extract the files, but leave the extracted files in a subdirectory. So, in the case of a WordPress archive, the files would be located in my-site/wordpress/ – what if you don’t want the files extracted to a subdirectory? Not a problem. You can use --strip-components=1 at the end of the command: tar -xvf wordpress.tar.gz -C my-site/ --strip-components=1 This strips out the top-level directory and leaves the files directly in the my-site folder. 3 thoughts on “Extracting archive files in Linux” 1. If it’s a .tar.gz you’ll need to add the -z flag to decompress, eg tar -zxvf filename.tar.gz (You could, of course, run gunzip filename.tar.gz first instead, but who wants to bother 😉 ) Oh, and sometimes there are bzip2 files (.tar.bz) which need the -j flag… 1. I know the -z and -j flags are used as filters, but in the case of gzipped files at least, it doesn’t seem to make a difference. The tar commands seems to decompress properly without the flag. Is there a reason the flag should be used? Does it process the file differently? 1. Without it you’re expecting tar to recognise it automatically, which probably works 99% of the time. It does help with remembering flags consistently when you’re making an archive, as otherwise you might end up with an uncompressed archive 😉 (although it may guess this from the filename these days – not sure) Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/70442
Kevin Ryan, 2011 Kevin Ryan, 2011 Ryan forwarded his email to veteran truth campaigner David Ray Griffin, who obtained permission to publish it on septembereleventh.org. A few days after the email appeared on the site Ryan was fired from Underwriters. The reason given by the company for letting him go was that he “expressed his own opinions as though they were institutional opinions and beliefs of UL.” This claim is hard to square with the fact Ryan quite explicitly told the 911Truth.org site who contacted him for an interview a few days before he was fired, that “he is speaking for himself only, not on behalf of his laboratory or the company.” Here is the text of Ryan’s email to Gayle (taken from 911Truth.org): From: Kevin R Ryan/SBN/ULI To: [email protected] Date: 11/11/2004 Dr. Gayle, We know that the steel components were certified to ASTM E119. The time temperature curves for this standard require the samples to be exposed to temperatures around 2000F for several hours. And as we all agree, the steel applied met those specifications. Additionally, I think we can all agree that even un-fireproofed steel will not melt until reaching red-hot temperatures of nearly 3000F [CRC Handbook of Chemistry and Physics, 61st edition, pg D-187]. Why Dr. Brown would imply that 2000F would melt the high-grade steel used in those buildings makes no sense at all. However the summary of the new NIST report seems to ignore your findings, as it suggests that these low temperatures caused exposed bits of the building’s steel core to “soften and buckle”(5). Additionally this summary states that the perimeter columns softened, yet your findings make clear that “most perimeter panels (157 of 160) saw no temperature above 250C”. To soften steel for the purposes of forging, normally temperatures need to be above 1100C (6). However, this new summary report suggests that much lower temperatures were be able to not only soften the steel in a matter of minutes, but lead to rapid structural collapse. Kevin Ryan Site Manager Environmental Health Laboratories A Division of Underwriters Laboratories can you spare $1.00 a month to support independent media newest oldest most voted Notify of I also admire Kevin Ryan, but the issue of whether or not jet fuel could melt steel has become totally irrelevant – simply because we now know that, despite the images that were shown ad nauseam on TV, no planes hit the towers; and thus the explosions and fires must have been caused by something else: it certainly wasn’t jet fuel! I don’t ‘know’ any such thing. I believe planes did hit the tower- I have seen the plane wreckage that was found throughout the WTC site. I have seen hundreds of eyewitness accounts made on the day from people who witnessed the plane impacts. The mere suggestion hat some kind of holograms were used flies in the face of reason and is fanciful. There is no proof than any such technology even exists. The same for particle beams. I have also seen the grainy videos with supposed anomalies that people use to promote the ‘no plane’ theory. They are not convincing at all. The same goes for the ‘participle beam theory’ and the ‘mini-nuke theory’ and the ‘hollow building theory’. Without knowing it for a fact- it is my assumption that these theories have been deliberately promoted by those who were actually behind 9/11- in order to muddy the waters, cause disputes amongst truth activists, and throw doubt over the entire truth movement. Kevin Ryan lost his job- Judy Woods never lost hers… I’ll just add- whilst I believe two planes impacted in NYC- I have seen no evidence that confirms they were flights 11 or 175. There is much evidence that suggest they may have been different planes- not least of which was the extreme high speed at low altitudes in their final moments. the planes were moving at around 500mph at 1000 feet- speeds way beyond what the aircraft were designed for at low altitude. These high speeds and minute corrections the planes made in their final approaches strongly suggests they were remotely controlled. The idea that they were flown by men who had never flown jet aircraft in the lives before that day is really quite absurd. Reblogged this on TheFlippinTruth. Kevin Ryan is a hero if you ask me. Having lost his job for raising simple, rational questions about 9/11 he has since gone on to do some of the very best research into the truth of what actually happened on 9/11. One interesting thing to note about Kevin Ryan and how he lost his job- is to recall the shameful comments of Noam Chomsky concerning 9/11 truth. Chomsky supports the official story: and clearly stated that those who question 9/11 are ‘lazy’ and that it ‘costs nothing’ to question 9/11- as opposed to ‘real activism’ supposedly like what Chomsky did decades ago in opposition to the Vietnam war. Chomsky went on to say that even if 9/11 was an iside job ‘who cares’. This is just an outrageous statement- and I imagine the families of the 3000 people who were killed might ‘care’ and that the families of the millions of dead Iraqi’s might also have an interest in the truth. Here is Chomsky making his absurd and outrageous statements: I should just add that I am disappointed in Chomsky because I am a student of politics and used many of his books when writing essays- he was once a hero of the left but his comments on 9/11 have totally destroyed any respect I had for him. He wrote a book about ‘brainwashing under freedom’ and yet today- that is exactly what he is involved in (whether he knows it or not)- a gigantic effort to brainwash the public about 9/11. I could easily challenge many of the arguments he raises against 9/11 truth- most of them are in the form of logical suppositions ie. ‘Someone would blab’, etc. These are not proofs of anything- just suppositions about how you believe other humans would or wouldn’t act- in other words your own opinion. Not facts. Yet he offers them up as facts and even proof. I will offer one example: Chomskey says it is an uncontroversial fact that the US wanted to invade Iraq “desperately” yet after 9/11 they “blamed it on the saudis”, he then goes on to say that if it was an inside job they would have “blamed it on the Iraqis”. This is just an opinion- about what he would have done if he was the mastermind… However it fails to take into account some simple facts: primarily the US had long standing ties to Saudi intelligence- and Saudi Intelligence could provide the US with a group of Wahabi Jihadi patsies- where Iraq most definitely could not. Secondly: the goal of the 9/11 false flag event was arguably to cause a rift between the West and Islam- a ‘clash of civilizations’. In order to achieve that goal it was necessary to fuel the fire of the long simmering Saudi based wahabi form of radical Islam. So it was necessary to frame the 9/11 attacks as one orchestrated by just exactly that branch of radical Islam. It is important to understand that the 9/11 attacks were aimed at influencing western peoples- but also at influencing the other side: radical Islam. Divide and conquer. To the Western viewer 9/11 was intended to create fear and hatred of Islam- to the radical Islamisists 9/11 was intended to act as a rallying call- and to promote the supposed power of radical Islam to attack America right at it’s core. And it had exactly those affects- arguably Al Qaeda in Iraq- and now ISIS- are a direct result of that ‘rallying call’. The supreme irony is- it wasn’t an Imam making the call from the Mosque- it was some RAND/JSOC psi-war experts out of Langley and West Point that were pulling the strings. ISIS, Al Qaeda, Al Nusra etc does the work of the CIA- and are probably largely unaware of it. They are simply puppets- useful idiots perfect for achieving goals set in the Washington or Bildaberg: goals like the overthrow of Assad, Gadaffi or Saddam Husein. First of all, lets get one thing out of the way quick. There were no muslims or Arabs on any of the four planes. Next, 9 of the so called terroists who supposedly died are still alive and kicking. Which all can be verified. Next, in order to have anyone pay anything, it would have to go to court. In court it wold have to be proved that it was acutally a terroist attack in the first place before you could blame any particlular person or persons for doing it. Since there were no terroists on the planes, and since planes did not cause the towers to fall, and since flight 93 was never found (including the passengers), and since eye witnesses who were at the pentagon and ground zero “ALL” say the government story is a lie, I really don’t think it will go to court. So, if I were Saudi Arabia I wouldn’t worry. But, on the other hand, if I were Saudi Arabia, I would want it to go to court just to prove the United States government lied and also prove that there were no Saudia Arabian people on the planes at all. Now, just so you don’t think I’m some truther or conspiracy nut or whatever they are called, I am putting up evidence to prove the government outright lied like a rug. Now, either all these people are lying (and there are lots more, but this should do it) or the govenment is lying. Now think for a moment, who has a track record for lying? Firefighter witness and whistle blower bld. 7 ground zero Susan Lindauer CIA Whistle Blower tells of President, Vice President, and Secretary of State know about 9/11 before it happens. 9/11 Proof of Demolitions Pentagon employee eye witness wistle blower NYC EMT whistle blower at ground Zero Susan Lindauer CIA Whistle Blower tells about strange vans coming to WTC before 9/11 Reblogged this on Worldtruth.
global_01_local_0_shard_00002368_processed.jsonl/70452
If all has gone according to plan, you can now sign into this blog to comment using OpenID. That means you can use your Vox blog address, Livejournal username or any other OpenID service to identify yourself to my blogging software. This is very exciting to the geeks in the audience and probably rather confusing to everybody else… It was all done using this handy wee plugin. Incidentally, I discovered while doing this that my webhost had decided to rename my comments.cgi file without informing me, presumably because of an uptick in spam comments, without bothering to inform me. Well, thanks guys. Oh, and thanks for the helpful suggestion in the rename that I should install spam protection. I already had Spam Lookup and MT Akismet in place. Any other suggestions? Or are you just going to randomly disable parts of my site without talking to me whenever you feel like it? The time has come to move hosts, I suspect.
global_01_local_0_shard_00002368_processed.jsonl/70457
Microsoft Azure Cloud Foundation Implementation Onrego’s Microsoft Azure Cloud Foundation Implementation is a concept designed to implement key cloud scenarios that align with customer’s business needs and strategies. The concept relies on the Azure Reference Architecture, guidance developed over thousands of engagements that take into account a range of considerations including subscriptions, storage, network, identity, application architecture, high availability and disaster recovery, automation, management, load balancing, websites, database, analytics and media. The concept helps our customers to make Microsoft Azure an integrated part of their IT strategy and portfolio. Overview of Microsoft Azure Cloud Foundation Implementation High-level design and implementation of a base networking, storage, identity and compute infrastructure in your Azure subscription model. The concept leverage the Microsoft Services Azure Reference Architecture (AZRA) recommended practices and design patterns including topics such as identity, subscription, compute, storage, network, security planning, and operations among others. The benefits using Azure Reference Architecture (AZRA) are + tested deployment model, deployed right the first time + reduced time to deployment + predictable and achievable service-level agreements + world-class user experience + more workload capabilities realized Contents of Microsoft Azure Cloud Foundation Implementation Contents of Microsoft Azure Cloud Foundation Implementation • Azure Subcription Model • Establish Required Subscriptions and Administrators • Azure Subscrption Model Build Phase Complete • Azure Networking • Establish Required Virtual Networks (address space and subnets) • Establish Required/Interim S2S or P2S VPN Connection • Establish Name Resolution (DNS) • Establish any required Vnet-to-Vnet Connectivity • Identify and establish required network security settings (NSGs, Force Tunneling, Egress planning) • Develop ARM Template for Network Design • ExpressRoute (transitioning from S2S VPNs to Carrier & ExpressRoute) • Dependency: Carrier ExpressRoute Circuit In-Place • ExpressRoute Service (Azure) Configuration (Carrier, Gateway and VLAN/IP Configuration) • Azure Storage • Configure Base Storage Account Stamp • Enable Storage Account Management and Monitoring Capabilities • Upload Required OS Images into Azure Subscription • Implement Data Protection Mechanisms in Storage • Develop ARM Template for Storage Design • Azure Storage Build Phase Complete • Azure Identity • Extend AD DS Domain Controllers to Azure • Configure Azure Active Directory Tenant • Establish Azure Active Directory (AAD) synchronization • Enable Required Federation (ADFS) • Azure Identity Management Build Phase Complete • Azure Management, Monitoring and Maintenance • Management • Implement Virtual Machines for required IaaS management tools (up to 5 management servers within Azure as defined below) • Extend IaaS VM AntiVirus infrastructure (with deployment 10 agents maximum) • Extend IaaS Virtual Machine Backup/HA (with deployment 10 agents maximum) • Monitoring • Configure Azure Portal Monitoring (Alerts, Thresholds, Operational Monitoring) • Extend Operations Management Infrastructure (Server Monitoring – with deployment of 10 agents maximum) • Maintenance • Extend Patch Management Infrastructure • Azure Management, Monitoring and Maintenance Activitites Complete • Azure Compute • Establish Gallery Items • Develop sample ARM template to deploy a sample virtual machine workload into Azure • Stabilize • Validate ARM Templates and Azure Infrastructure Design • Perform operational transition of the Azure Subscription • Deploy • Close-out Meeting Outcome of the service The customer gets a fully functional Azure environment which is an essential base for secure, well-managed and reachable cloud. Public Cloud Governance Model should be designed prior to Microsoft Azure Cloud Foundation Implementation. We suggest using Onrego’s Public Cloud Governance Model service.
global_01_local_0_shard_00002368_processed.jsonl/70459
Jump to content Popular Content 1. 1 point TRAILS OPEN as "Limited Availability" The D201F Trail just opened tonight as "Limited Availability". 95 miles (152 kms) of groomed trail. Tremendous dedication by the Sault Trailblazers to get this trail open so early in the Season. A huge thank you to Greg and Eric for grooming 17 hours non-stop and started at 3 a.m this morning, Also thanks to John for legwork and coordinating and Rodney and Phil for working to get the groomer ready. Here's a screenshot of the club website that was just updated a few minutes ago. This links Searchmont to Aubrey Falls / Black Creek. A Big weekend of snowmobiling coming up as the word is now out. 2. 1 point That's because no one is that small in this group! I now know not to be that last person in line at an all you can eat buffet with the folks on this site.
global_01_local_0_shard_00002368_processed.jsonl/70461
Evil Eye by ginkgo 2016-06-06 03:12:50 You should get that looked at by a doctorThe eye is white and the blood fades to alpha (invisible) Tags: bleeding, blood, dark, eye, goth, Safe for Work? Yes Download SVG Download PNG (Small) Download PNG (Medium) Download PNG (Large)
global_01_local_0_shard_00002368_processed.jsonl/70462
MySQL Cluster: A High Availability DBMS Database transfering illustration If you are looking for a database management system with no single point of failure, MySQL Cluster’s distributed, multi-master architecture, which scales horizontally, would be your best bet. MySQL Cluster can be accessed by MySQL and no SQL interfaces, and be used to serve intensive read/write workloads. Having set up a DHCP server, I now plan to deploy a DNS server in my network. It is always a better option to have DNS and DHCP on the same server, so that IP addresses allocated by the DHCP server to a particular host can be updated in the DNS database, instantly. If, for some reason, this DNS-DHCP server goes down, it impacts the whole production environment adversely. As a preventive measure, we have to introduce a secondary DNS-DHCP server, which has to be configured in a high availability mode (HA), so that if the primary server goes down, the secondary server takes over and caters to the incoming requests. PowerDNS is our prime choice for configuring the authoritative DNS server, with MySQL database as the backend, as this combination has its own merits. This set-up handles incoming queries, looks through DNS records in the MySQL database and provides appropriate responses. The DNS servers being HA, the databases in both the servers must always be kept in sync. Moreover, both the DHCP servers work in active-active mode, such that they divide the IP address pool among themselves and cater to the incoming DHCP requests working in tandem. As a result, there are multiple read/writes happening from both the servers in their own MySQL databases. In order to keep both the databases in sync, there has to be such a mechanism, such that if any server makes changes in the database, it should be reflected in the database of the other server and they all maintain the same DNS records. To create a high availability environment, as mentioned above, MySQL provides two solutions – MySQL replication and the MySQL cluster. Master-slave replication, wherein we have one read/write and one or more read-only slaves, is not useful in this scenario, as the replication is one way (from master to slave). While MySQL master-master replication is one of the alternatives, it is not a good choice, especially when there are multiple masters receiving write requests simultaneously. The big disadvantage of circular replication (A to B, B to C, C to D, and D to A) is that if any node fails, replication halts for subsequent nodes in the chain. On the other hand, the MySQL cluster is: • An in-memory (or main-memory) database system, which relies on the main memory for data storage, management and manipulation, to achieve better performance while querying the data. • A shared-nothing architecture database, which stores data over multiple independent data nodes in a cluster, instead of shared data storage, with no single point of failure (SPOF). • A distributed database system, which stores portions of the database on multiple nodes in the cluster, which is managed by the central distributed database management system. So even if a node goes down, data integrity is maintained. Moreover, scaling becomes a handy task with almost 99.99 per cent availability. • Database updates are synchronously replicated between all the data nodes in the cluster, guaranteeing data availability in case of node failures. MySQL Cluster Components Management node/server This maintains the cluster’s global configuration file and provides cluster information whenever required. It also maintains logs of events happening in the cluster. The management client in the management node does all the administrative work, like starting/stopping nodes, starting/stopping backups and checking the cluster’s status. MySQL nodes/servers These servers contain local configuration files. They run the mysqld daemon and group together to form a cluster, thus achieving high performance (due to parallelism) and high availability. These nodes cater to all incoming queries, communicate with data nodes and provide application access to the cluster. Data nodes These nodes run the ndbd daemon and are responsible for data storage and retrieval. Multiple data nodes come together to provide storage for the entire cluster, so that clients see them as a single database. Besides data storage, they keep monitoring other data nodes in the cluster and inform the management server in case of failures. How it works At the heart of the MySQL cluster, there lies the NDB (network database) storage engine, which is actually responsible for the high-available environment and data redundancy. In the basic scenario, we have an application that sends a query, usually as INSERT/UPDATE/DELETE-like SQL statements, to the MySQL server. In the MySQL cluster, one of the MySQL servers runs the NDB storage engine (or NDBCluster), which receives incoming SQL queries and communicates with data nodes to store the data. After confirming the successful writing of the data into the data nodes, the MySQL server acknowledges the application with an OK status. In order to keep data available even after a node failure, it is divided into a number of chunks called partitions, which are equal to the number of nodes present in the cluster. So, each node has to store one partition along with a copy of a partition – this is called a replica. The number of the replica is mentioned in the configuration file on the management node. The MySQL cluster boasts of 99.999 per cent availability and replicas are key elements. Handling failures When a MySQL node fails, being a shared-nothing architecture, no other nodes (MySQL/data nodes or management nodes) in the cluster are affected — they continue doing their tasks. It’s up to the application to connect to another MySQL node in the cluster. On the other hand, if a data node fails, another data node in the cluster takes over the responsibility and due to data redundancy (replicas), data will also be available. While the MySQL cluster takes care of node failures, you need to take care that the failed data node wakes up as early as possible, as you never know when other node(s) will stop working. Failure of the management node doesn’t hamper the set-up much, as this node deals only with monitoring and backup tasks but then you might not be able to start/stop other cluster nodes. Having two management nodes is definitely a solution. Considering that I have three subnets and I do not have any budget issues, I opt to deploy four DNS-DHCP servers, of which three will be primary for their respective networks and the fourth will be secondary. I will have MySQL databases on all these four nodes (MySQL + Data nodes) and these are to be clustered such that they are in sync. For setting up the MySQL cluster, I will need another two nodes to be configured as management nodes. The scenario is given in the table below. Management nodes MySQL and data nodes dhcpsrv01 (Primary DHCP for Region 1 dhcpsrv02 (Primary DHCP for Region 2) dhcpsrv03 (Primary DHCP for Region 3) dhcpsrv04 (Secondary DHCP for all) System: Linux based virtual machines Operating system: CentOS release 6.7 CPU cores: 4 Packages dependencies 1. libaio.x86_64 0:0.3.107-10.el6.rpm 2. libaio-devel.x86_64 0:0.3.107-10.el6.rpm 3. numactl-2.0.9-2.el6.x86_64.rpm 4. cryptopp-5.6.1-8.1.x86_64.rpm (required for PDNS) 5. php-pear-MDB2-Driver-mysql-1.5.0-0.8.b4.el6.noarch.rpm (required for PDNS) 6. php-pear-MDB2-2.5.0-0.7.b4.el6.remi.noarch.rpm (required for PDNS) 7. php-mysql-5.3.3-46.el6_6.x86_64 (required for PDNS) 8. php-pear-1.9.4-4.el6.noarch (required for PDNS) 9. php-pdo-5.3.3-46.el6_6.x86_64 (required for PDNS) 10. perl-DBD-MySQL-4.013-3.el6.x86_64 (required for PDNS) Packages installed 1. MySQL-Cluster-client-gpl-7.3.11-1.el6.x86_64.rpm 2. MySQL-Cluster-server-gpl-7.3.11-1.el6.x86_64.rpm 3. MySQL-Cluster-shared-compat-gpl-7.3.11-1.el6.x86_64.rpm (required for PDNS) Packages that need to be removed (if any) 1 mysql-server 2. mysql 3. mysql-libs Configuration for data nodes Edit the /etc/my.cnf file as shown below: # IP address of the cluster management node innodb_data_file_path = ibdata1:10M:autoextend explicit_defaults_for_timestamp = 1 # IP address of the cluster management node Configuration for management nodes Edit the /var/lib/mysql-cluster/config.ini file as shown below: [ndbd default] datadir= /var/lib/mysql-cluster datadir= /var/lib/mysql-cluster Note: It is recommended that the MySQL root password is set before proceeding. MySQL cluster set-up On management nodes: To start the cluster, use the following command: It should show the following output: MySQL Cluster Management Server mysql-5.6.27 ndb-7.3.11 2016-01-13 11:21:54 [MgmtSrvr] INFO -- The default config directory ‘/usr/mysql-cluster’ does not exist. Trying to create it... Figure 1 MySQL Cluster march 16 Figure 1: MySQL Cluster components On data nodes: To start the NDB cluster engine, use the following command: It should show the output given below: -- Angel connected to ‘’ On MySQL nodes: To start the MySQL service, use the command shown below: service mysql start To check the cluster status from the management node, use the following command: If the cluster is healthy, it must display the following output: mgmtsrv02 root [mysql-cluster] > ndb_mgm -- NDB Cluster -- Management Client -- ndb_mgm> show Connected to Management Server at: Cluster Configuration [ndbd(NDB)] 4 node(s) [ndb_mgmd(MGM)] 2 node(s) id=1 @ (mysql-5.6.27 ndb-7.3.11) id=2 @ (mysql-5.6.27 ndb-7.3.11) [mysqld(API)] 4 node(s) id=7 @ (mysql-5.6.27 ndb-7.3.11) id=8 @ (mysql-5.6.27 ndb-7.3.11) id=9 @ (mysql-5.6.27 ndb-7.3.11) id=10 @ (mysql-5.6.27 ndb-7.3.11) Otherwise, in case if any node goes down, it would show: [ndbd(NDB)] 4 node(s) id=5 (not connected, accepting connect from Any DBMS uses storage engines or database engines to write, read, update or delete data from a database. InnoDB is the default storage engine used by MySQL since version 5.5, such that whenever a table is created without the ENGINE clause, it creates an InnoDB table, by default. With InnoDB, data is read and written from the hard disk, where the MySQL server runs, and hence it necessitates configuring the disks in RAID, to achieve data redundancy. On the other hand, the MySQL cluster uses the NDBCluster engine, which uses network connectivity in order to access data spread across different data nodes (not on MySQL servers like InnoDB). Hence, while creating tables, one must explicitly mention the NDBCluster storage engine in order to instruct MySQL servers that data has to be stored on the data nodes. Please enter your comment! Please enter your name here
global_01_local_0_shard_00002368_processed.jsonl/70463
Office of Operations 21st Century Operations Using 21st Century Technologies Recurring Traffic Bottlenecks: A Primer Focus on Low-Cost Operational Improvements (Fourth Edition) Printable version [PDF 5.9 MB] Contact Information: Operations Feedback at United States Department of Transportation logo. U.S. Department of Transportation Federal Highway Administration Office of Operations 1200 New Jersey Avenue, SE Washington, DC 20590 November 2017 Table of Contents Chapter 1. Introduction When Did "Plan on Being Delayed" Become Part of Our Everyday Lexicon? Purpose of the Primer Why Focus on Bottlenecks? Chapter 2. Understanding Bottlenecks What Exactly is a "Traffic Bottleneck?" How Are Bottlenecks Monitored and Measured? Understanding Merging at Recurring Bottlenecks Merge Principles Which Is Best? "Early" or "Late" Merging? Principles Put into Practice: Variable Speed Limits and Speed Harmonization Is Murphy Right? Does the Other Lane "Always Move Faster"? Chapter 3. Dealing With Bottlenecks Programmatically What is the Federal Highway Administration Doing to Mitigate Bottlenecks? Benefits of Localized Bottleneck Reduction Strategies Chapter 4. How to Structure a Localized Bottleneck Program What is Stopping Us from Fixing Bottlenecks? Overcoming Challenges to Implementing Localized Bottlenecks Reduction Projects Ideas for Structuring a Localized Bottleneck Reduction Program Potential Issues with Localized Bottleneck Reduction Treatments Chapter 5. Analytical Identification and Assessment of Bottlenecks Where Are the Bottlenecks and How Severe Are They? Recent Advances in Data and Analytics for Bottleneck Assessment Chapter 6. Localized Bottleneck Reduction Strategies Types of Localized Bottleneck Reduction Treatments Advanced Forms of Bottleneck Treatments Already In Practice Chapter 7. Emerging Bottleneck Treatments Dynamic Hard Shoulder Running Dynamic Reversible Left Turn Lanes Contraflow Left Turn Pockets Chapter 8. Success Stories: How Agencies are Developing Localized Bottleneck Reduction Programs Successful Localized Bottleneck Reduction Program Development Successful Localized Bottleneck Reduction Applications Want More Information? Appendix A. Additional Principles on Traffic Flow and Bottlenecks Shock Waves and the Accordion Effect: The Movement of Queues on Freeways Appendix B. Traffic Bottleneck Typology Appendix C. Case Studies Appendix D. Definitions and Traffic Bottleneck Typologies List of Figures Figure 1. Chart. Common locations for localized bottlenecks. Figure 2. Infographic. Overview of Maryland's I‑270 Upgrade Project. Figure 3. Photo. Cover of Federal Highway Administration's Traffic Bottlenecks: Identification and Solutions report. Figure 4. Simulation graphics. Typical Section of MN I‑35W Northbound Priced Dynamic Shoulder Lane (PDSL) Figure 5. Photo. Cover of Federal Highway Administration's An Agency Guide on Overcoming Unique Challenges to Localized Congestion Reduction Projects. Figure 6. Flow chart. Minnesota Department of Transportation project screening process. Figure 7. Graph. Speed contours over time and space showing bottleneck locations. Figure 8. Map. Using vehicle probe data for bottleneck analysis. Figure 9. Matrix. Spatiotemporal Traffic Matrix (STM). Figure 10. Chart. Using the variability in delay to prioritize bottlenecks. Figure 11. Schematic. Example of dynamic lane grouping at a signalized intersection. Figure 12. Simulation graphic. Dynamic junction control implementation. Figure 13. Schematic. Vehicular movements at a continuous flow intersection. Figure 14. Schematic. Crossover movement in a double crossover diamond (DCD) interchange Figure 15. Schematic. Median U-turn (MUT) intersection. Figure 16. Schematic. Restricted crossing U-turn (RCUT) intersection. Figure 17. Photo. U.S. Route 17 restricted crossing U-turn intersection corridor in Leland, North Carolina. Figure 18. Schematic. The quadrant roadway (QR) intersection. Figure 19. Map. Success spawns success: Virginia's Strategically Targeted Affordable Roadway Solutions (STARS) program spurs Rhode Island to develop its own STARS Program Figure 20. Traffic backed up on northbound Wadsworth prior to the project. Restaurant (blue roof) had to be relocated. Figure 21. The new Grandview Bridge, "Gateway to Olde Arvada." Figure 22. A ramp meter. Figure 23. The sign for U.S. 183. Figure 24. Moving Washington logo. List of Tables Table 1. The 10 worst physical bottlenecks in the United States. Table 2. Examples of how agencies have addressed localized bottleneck issues. Table 3. Reliability prediction methods developed by the Strategic Highway Research Program 2 program. Office of Operations
global_01_local_0_shard_00002368_processed.jsonl/70466
community forum [Open] WaffleEater's Modding Queue - NM/M4M/GD (Standard) Total Posts Topic Starter Waffle's Modding Queue! Status: OPEN What I NM/GD? 1. I NM/GD everything except meme song 2. I NM/GD only Insane & Expert 3. I NM only song under ~3:30 mins 4. I GD only song under ~2 mins 5. You've more chance to get modded an anime song :3 How Request NM/GD Write a post with the following things: 1. Song Name 2. Artist 3. Length 4. What you want (NM/GD) 5. What difficulty (Insane/Expert) (If there is more than one Insane/Expert, tell me the name of the difficulty) (if you chose GD, tell me the diff name) Example | Diff Name: _____'s Another Obviously, you must put the link! What I do per day: 3 5 NM & 1 GD Something about GD There isn't a specific period of when I do GDs, every GD will take it own time to be created so, I'll PM me you in game (or I send a message through the forum) if I'll GD your map. Anime Song have more chance to be choosen :3 GD done so far: Jannahh | *namirin - Hitokoto no Kyori GD Accepting: Yes M4M/GD4GD/NM4GD/GD4NM requests: NM4GD: I do Normal Mod for Guest Diff GD4NM: I do Guest Diff for Normal Mod Thaehan - Overpowered VINXIS - Applause Before posting, make sure that your beatmap is timed correctly! Write "Spaghetti", "Pizza" or "Patatine" if you readed! 1. I don't like the song 2. You dind't respect the rules 3. I'm busy Simple Post, Simple Rules, not hard, ja? NM please 2:32 drain time Can you take a look at another and extra difficulty? Pizza. Topic Starter JeZag wrote: NM please 2:32 drain time I'll check it out. NM please Insane, 4.84 star diff Length: 1:34 Spaghetti, and thank you! i like pineapple pizza. mods would be appreciated a lot! thanks Kaneki Zet 5,78 diff (Expert) Length: 2:13 Pizza :P show more Please sign in to reply. New reply
global_01_local_0_shard_00002368_processed.jsonl/70472
Coil32 inductance calculator screenshot-07_11_16-16_28_04Above is their documentation of the formulas used, they are based on Al which is based on Initial Permeability, the permeability typically at 10kHz where permeability is approximately a real number. For example, relative permeability for the common #43 mix at 10kHz is 800 (+j0), whereas at 7.1MHz it is 332-j228. The suitability for use at RF usually depends much more on complex permeability at radio frequencies than it does on µi at say 10kHz. cf01Above is a plot from the Fair-rite data book showing the complex permeability characteristic of #43 ferrite material. Clearly inductance and impedance calculations for #43 mix based on µi are good only up to about 700kHz.
global_01_local_0_shard_00002368_processed.jsonl/70485
Archive for August, 2012 A Day in the Life: a. Pookie contemplates while at the health club. While exercising at the health club in Bangkok one day, I realized that although death is never very good, if one was going to go, one of the best ways is during vigorous exercise; the flood of endorphins makes one not particularly care. On the other hand, attempts to commit suicide by exercise are doomed to fail. Anyone so depressed as to contemplate it is probably too depressed to exercise in the first place. Still, I decided to redouble my efforts. b. Where Pookie confronts himself on the sidewalk. Roseanne Roseannadanna Roseanne Roseannadanna (Photo credit: Wikipedia) “It’s always something.”  Roseanne Roseannadanna. While on my way to the health club the same morning I experienced Roseanne Roseannadanna’s insight, I walked by a man lying on the sidewalk. He looked dead. Sitting on his haunches next to him and shaking him back and forth was another man who kept on repeating something in Thai over and over again. I assumed it was something like, “Hey buddy, you ok?” I would think that is what one says in similar situations everywhere. They both appeared to be street people and were filthy. I believed the man lying on the sidewalk was either dead or paralyzed since he seemed quite stiff when the other man shook him. I stood there presented with western civilization’s eternal quandary: How do I evade involvement without feeling guilty? I ignored dealing with that question and tried to determine if there was anything I could do to help. My first predicament was how to avoid getting down and touching the possibly deceased man. Not only was he filthy, but I have a phobia about touching dead things – probably generated by my mom’s warnings to never touch the dead rats, dogs, and cats that were often lying about in my neighborhood because they probably were carrying a dread disease. Her advice in all likelihood ended medicine and biology as career choices for me. Thankfully, I reasoned, getting down and touching him would do no good because I had no medical training and could not speak the language. So, I then thought maybe I could start screaming something like, “Help, help, call an ambulance” or something like that. I hoped I would not have to do that either since I would probably feel embarrassed. Also, when I looked around, however, I noticed at least 20 Thais within 10 yards of me with perhaps 10 times more within shouting distance, none of whom paid the slightest attention to the scene going on next to me. It was not as though they were simply averting their eyes to avoid getting involved, but instead, they simply continued on doing their business as though a dead or dying man on the sidewalk was an everyday occurrence.  I decided that my screaming and yelling likely would do no more good than getting down on my knees and shaking the guy and asking him if he was OK. I then decided that the best thing I could do was go find a cop and tell him about the situation. Of course, I recognized a language barrier remained and given my experience with the Thai police, it was questionable whether he would care or do anything. There was also the quandary of what I would do if he demanded a bribe before acting. As an American, I had to face the dilemma of whether my humanitarian obligations extended to paying for someone else’s problem. Nevertheless, with that still unresolved, I set off in search of a cop. Although there was a police post a few blocks back, I decided to continue in the direction I was heading since I recalled that, about a block away, the tourist police often had a card table set up for some reason with one or two cops sitting there. They never did anything that I could ever discern except sit there and talk to the ladies of easy virtue that seemed to regularly gather around them. I also thought that chances were better that the tourist police spoke English. Alas, no police card table appeared. So I continued on to the place where I intended to have breakfast. There I would be able to think about what to do next. While sitting at the counter, I decided that there really was not much left for me to do since by now whatever was going to happen or not happen most likely had already happened. So I ordered breakfast, tried to convince myself I had done all that I could and contemplated Scarlett O’Hara‘s insight, “Tomorrow is another day.” c. In which Pookie gets a massage. In an effort to relieve the aches generated by my exercise and assuage my distress from the morning’s events, I decided to get a massage. Now normally the Little Masseuse gives me my massages, but for the last few weeks, she has been telling me that she is too tired from folding towels at the health club to spend another two hours squeezing various parts of my body. Given my diminished but not entirely lost sexual capacity, I considered her excuse as the functional equivalent of “I have a headache.” Anyway, I went to a spa owned by a woman who I have known for over 10 years. She lives most of the time in Singapore with her husband and new baby. Her husband, an American, and she were both friends of mine when they lived in the Bay Area. I decided on a one-hour foot massage. Generally, I forgo full-body massages because in Thailand a foot massage is more an entire leg and foot massage and includes massage of hands arms, shoulders, and head. In fact, the only things missing from a whole-body massage are the rubbing of the abdomen and the buttocks; and you know where that leads. The massage cost $13 including tip. That was most of my daily budget. But it was worth it. I felt much better. d. Pookie ends his day in outer space. Later, I met up with the Little Masseuse and we went to the movies in a new mall named Terminal 21. I like going there because it is nearby (two blocks away) and each floor themed on a different world city. There are two floors dedicated to San Francisco complete with a replica of the Golden Gate Bridge stretched across the food court and a full-sized copy of a cable car teetering over the escalators. We saw “Prometheus,” which I did not understand that well since I found the narrative and motivations confusing. Why, for example, do robots always seem to be pissed off at their creators for creating them? Robby the Robot,” never got pissed off at Will Robinson. Unfortunately, it did seem at times it too often panicked, swung its arms about screaming Danger, Will Robinson, Danger” to convince me it gave a damn about the health and safety of its charges. Modern cinema robots never panic. That is what makes them so creepy. Anyway, the movie seemed based upon the concept that the operative principle in the universe is revenge. I disagree, I think the universal operative principle is confusion. Too many beings think they know what they are doing, when in fact they are lucky if they can figure out which end the food goes in and which the shit comes out. In any event, a lot of people and aliens died. The robot survived, but not the black guy. I am sure you guessed that. Read Full Post » %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/70513
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 08-13 October 2017 – Montreal, QC, Canada IEEE PIMRC 2017 is pleased to announce the sixteen tutorials scheduled within the technical program of the conference. They cover a wide range of timely and disruptive topics and will be presented by top-notch experts in their field, both from academia and industry: Sunday 8 October 2017 Room 09:00-10:30 10:30-10:45 10:45-12:15 12:15-14:00 14:00-15:30 15:30-15:45 15:45-17:15 Westmount Tutorial 1 Coffee Break Tutorial 1 Lunch Break (on your own) Tutorial 9 Coffee Break Tutorial 9 Outremont Tutorial 2 Tutorial 2 Tutorial 10 Tutorial 10 Fontaine C Tutorial 3 Tutorial 3 Tutorial 11 Tutorial 11 Fontaine D Tutorial 4 Tutorial 4 Tutorial 12 Tutorial 12 Fontaine E Tutorial 5 Tutorial 5 Tutorial 13 Tutorial 13 Fontaine F Tutorial 6 Tutorial 6 Tutorial 14 Tutorial 14 Fontaine G Tutorial 7 Tutorial 7 Tutorial 15 Tutorial 15 Fontaine H Tutorial 8 Tutorial 8 Tutorial 16 Tutorial 16 Future of wireless cellular networks is challenged by a plethora of new applications and services, for which legacy networks e.g., LTE were not originally designed. Internet of Things (IoT) or Machine-to-Machine communications (M2M) represent one such amalgam of emerging services. Some of the important key use cases of IoT include smart metering, industrial automation, video surveillance, environment sensing, wearable sensing and computing, vehicular sensing, intelligent transport systems, participatory sensing and crowdsourcing etc. Historically, cellular systems have been mainly designed and optimized to serve traffic from human-to-human (H2H) communications. IoT poses new challenges that cannot be overlooked mainly due to the contrasting nature and density of H2H and IoT devices and the nature of the offered traffic. Therefore, designing future cellular network vis-a-vis 5G and beyond such that it can meet the requirements of both H2H and IoT simultaneously is a great challenge. The paradigm shift required in cellular system design was recently well summarized in a European commission’s official 5G vision, revealed at Mobile World Congress 2015 according to which “5G infrastructure should be flexible and rapidly adapt to a broad range of requirements. It should be designed to be a sustainable and scalable technology”. In other words, unlike its predecessors, 5G network needs to be designed to be Lean, Elastic, Agile and Proactive, (i.e., LEAP). The term lean characterises low set up time and signalling and control overheads. The term elastic characterizes flexibility and adaptability to provide resources where and when needed. The term proactive denotes the ability to predict and pre-empt instead of reacting to a situation. 1. Why do future cellular networks need to be lean, elastic and proactive to support IoT? (10 min) 1. IoT/H2H Use cases demanding leanness 2. IoT/H2H Use cases demanding elasticity 3. IoT/H2H Use cases demanding proactivity 4. IoT/H2H Use cases demanding agility 2. New architectures for IoT: Control and Data Plane Split in RAN (CDSA) (15 min) 1. What is the optimal split of functionalities between DBS and CBS and does this split have to change with service type e.g, IoT, or H2H? 2. What are the best measurements to create the database for implementing a data base aided CDSA (D-CDA) implementation and does the optimal set of measurements change with service type e.g., IoT or H2H? 3. How much capacity can be gained with D-CDA under ideal conditions? 4. How much energy can be saved with D-CDA under ideal conditions? 5. How does D-CDA compare with conventional HetNets and CDA schemes? 3. Why is SoTA SON not good enough for IoT? (15 min) 1. Why 5G SON needs exclusive treatment for energy efficiency to support IoT. 2. Why IoT needs conflict free SON? 3. Why SON for IoT needs more focus on Large Time Scale dynamics? 4. Why SON for IoT needs to be more transparent? 5. Why IoT needs faster SON: Pro-Active instead of reactive SON? 6. Why IoT SON engine needs end to end network visibility 4. What is dark data in cellular networks, and what are its utilities in enabling IoT (25 min) 1. User/device/thing level dark data 2. Cell level dark data 3. Core network level dark data 4. Dark data from peripheral sources 5. Implementing BSON to achieve leanness, elasticity and proactivity in cellular networks (50 min) 1. Collecting and preprocessing dark data 2. Transforming the raw data into right data 1. Knowledge building perspective 2. Analytics and machine learning perspective 3. Building user and network behavior models using the right data 4. Integrating models into SON engine 5. Reviewing the holistic BSON framework 6. Case studies on BSON/CDSA as enablers of IoT (45 min) 1. Case Study 1: CDSA for lean and elastic cell less deployment 2. Case study 1: CDSA for proactive mobility management 3. Case study 2: BSON for proactive energy efficiency 4. Case study 3: BSON for proactive self-healing 7. Open research challenges in CDSA and BSON as enabler for IoT (20 min) 1. Challenges in determining optimal split between control and data plane for different IoT use cases 2. Challenges in collecting, mining and inferring from IoT data, for BSON implementation. 3. Challenges in coupling the big data based knowledge base with SON engine. 4. Q&A Ali Imran, University of Oklahoma, USA Ali Imran Muhammad A. Imran, University of Surrey, UK Muhammad A. Imran The next generation wireless networks need to accommodate around 1000x higher data volumes and 50x more devices than current networks. Since the spectral resources are scarce, particularly in bands suitable for wide-area coverage, the main improvements need to come from a more aggressive spatial reuse of the spectrum; that is, many more concurrent transmissions are required per unit area. This can be achieved by the massive MIMO (massive multi-user multiple-input multiple output) technology, where the access points are equipped with hundreds of antennas and can serve tens of users on each time‐frequency resource by spatial multiplexing. The large number of antennas provides a great separation of users in the spatial domain, which is a paradigm shift from conventional multi-user technologies that mainly rely on user separation in the time or frequency domains. In recent years, massive MIMO has gone from being a mind-blowing theoretical concept to one of the most promising 5G-enabling technologies. Everybody seems to talk about massive MIMO, but do they all mean the same thing? What is the canonical definition of massive MIMO? What are the main differences from classical multi‐user MIMO technology from the nineties? What are the key characteristics of the transmission protocol? How does the channel model impact the spectral and energy efficiency? How can massive MIMO be deployed and what is the impact of hardware impairment? Is pilot contamination a problem in practice? This tutorial provides answers to these questions and other doubts that the attendees might have. We begin by covering the main motivation and properties of massive MIMO in depth. Next, we describe basic communication theoretic results that are useful to quantify the fundamental gains, behaviors, and limits of the technology. The second half of the tutorial provides a survey of the state-of‐the‐art regarding spectral efficiency, energy efficient network design, and practical deployment considerations. 1. Massive MIMO: What and why (30 min) 1. Introduction: Trends and 5G goals 2. Evolving cellular networks for higher area throughput 3. Key aspects of having massive antenna numbers 4. Achieving a scalable Massive MIMO protocol 2. Spectral efficiency (60 min) 1. Basic communication theoretical results 2. Methodology for performance evaluation 3. Channel estimation 4. Spectral efficiency in uplink and downlink 5. The limiting factors of Massive MIMO 6. Asymptotic analysis 3. Practical deployment considerations (30 min) 1. Channel modeling 2. Array deployments – different antenna geometries, effect of antenna element spacing 3. Massive MIMO at mmWave frequencies 4. Co-existence with heterogeneous networks 4. Energy efficiency (45 min) 1. Why care about energy efficiency? 2. Mathematical definition of energy efficiency 3. Importance of accurate power consumption modeling 4. Optimizing networks for energy efficiency: How many users and antennas? 5. Fundamental insights 1. Interplay between design parameters – Power scaling laws 2. Radiated vs. total power 3. Massive MIMO vs. small cells 4. Future predictions 5. Key open problems (15 min) Luca Sanguinetti, University of Pisa, Italy Luca Sanguinetti In this tutorial we introduce concepts and methods for providing spectrum-access-as-a-service (SaaS) to coexisting wireless systems utilizing the same radio spectrum each with different connectivity requirements. We then present a multi-objective optimization framework to investigate the fundamental performance bounds in a fully dynamic SaaS system. Various system architectures based on full/partial virtualisation are then investigated and their performances are compared. We then look at the SaaS as a digital ecosystem and an innovation framework where we discuss its horizontal scalability and self-organization behaviour as well as its resiliency, robustness, utility and pricing. SaaS-based techniques are then discussed for providing connectivity to mission critical autonomous objects such as autonomous vehicles and robots. Applications of data science and machine learning in future planning of such systems are also explained. We then present several use-cases followed by conclusions and discussions on the challenges and open problems in service oriented provisioning of radio spectrum. In this tutorial we define spectrum-access-as-a-service (SaaS) for coexisting wireless systems. Coexisting wireless systems are modelled as independent systems having their own, often conflicting, performance objective accessing a shared and limited radio spectrum. Multi-objective-optimization is utilized as an analytical tool, where we define the notion of optimality in such problems and briefly review the main concepts including the ‘efficient set’. The efficient set provides a quantitative insight on the achievable system trade-offs. The characteristics of this set are then reviewed followed by analytical and heuristics methods for obtaining the efficient set. In particular, we investigate the robustness of the efficient sets against inaccurate measurements which often happens in various system functions including spectrum sensing due to various reasons. In some cases the set of achievable trade-offs provided by the efficient set are not ‘good enough’ from either users’ or operators’ perspective. For such cases we present methods to engineer the efficient set. A number of use-cases are provided in which advanced communication techniques such as coding, beamforming, and relaying are adopted in dynamic spectrum access systems to enable achieving better trade-offs. The proposed multi-objective optimization formulation is capable of quantifying techno-economic aspect of dynamic spectrum access. We further look at the system design issues and discuss the alternative virtualizations scenarios and compare their performance. Based on these investigations, we then propose SaaS as a digital ecosystem. Following is the list of topics which is presented in this tutorial: 1. Theoretical background: Optimization with multiple objectives • Notions of optimality: Various notions of optimality are defined including fuzzy dominance and strong and weak Edgeworth-Pareto optimality; the concepts of local and global efficiency are also discussed. The efficiency concept is then discussed from the trade-off point of view and the achievable compromises in system design. Examples from wireless communications including, multiplexing diversity trade-off, spectral and energy efficiency trade-off are also discussed based on this mathematical framework. • Classification of multi-objective optimization problems: Different convex and non-convex multi objective problems are investigated and duality theorem for such problems is also presented. Extensions of KKT conditions for multi-objective optimization problems are presented. • Obtaining the set of optimal solutions: Classic scalarisation techniques as well as heuristics and evolutionary algorithms are reviewed and pros-and-cons are investigated. • Approximations and computational complexity: Methods for approximating the efficient set are presented and their corresponding computational complexity are also discussed. • Robustness in multi-objective optimization: The concept of robustness in such problems is discussed. Robustness is in particular very important in wireless communications as different factors such as delay and inaccurate measurements contribute into uncertainty of the decision space. Analytical methods are presented for obtaining a robust efficient set. The cost of being robust in terms of the gap with the non-robust efficient set is also discussed. • Engineering the efficient set: In cases where the set of trade-offs is not ‘good enough’ for the system design, methods are discussed where the efficient set could be accordingly engineered through various methods including, providing a better set of achievable system trade-offs. Various examples are also provided in which different techniques such as coding, beamforming, and relaying are adopted to engineer the efficient set so it provides a ‘better’ set of trade-offs. 2. Cloud based spectrum-access-as-a-service 3. Based on the analytical insight provided by the multiobjective optimization framework we then present a cloud based spectrum-access-as-a-service platform designed for providing dynamic spectrum access. In such system other information could be also incorporated in decision making via the cloud which makes the whole process more efficient. In particular we discuss the following: • Techniques for efficient monitoring of the spectrum status in various time-scales through a combination of a priori knowledge of radio coverage map, information provided by other users/networks at the same/or a similar location/circumstance, i.e., crowd-sourcing, predicting object function behaviour based on data or model, • Techniques to maintain access after perceiving/predicting an interference risk, • Collaborative connectivity techniques to facilitate spectrum access, • Design of scalable receivers capable of substituting full connectivity by a combination of on-board processing, inter-user collaboration, and a lower spectrum access, • Various system architectures based on full/partial virtualisation and evaluation of their performance using simulations and analysis, • Techniques for coordinating various level of collaboration, • Cross-layer techniques to capture wireless networks’ and users’ characteristics across protocol layers, • SaaS horizontal scalability, • Design guidelines to meet the demands efficiently, • Protocols and methods for designing a SaaS Application Program Interface (API), • Design guidelines/specifications for radio access networks (RANs) and/or 5G and beyond, • Techniques to incorporate proactive cashing into SaaS, • Exploring design alternatives for the transitional phase 4. Challenges and open problems 5. We then discuss the challenges and open problems in the convergence of computing and communications I general and providing spectrum access in particular. Hamid Aghvami, King’s College, London, UK Hamid Aghvami2 Keivan Navaie, Lancaster University, UK Keivan Navaie Unmanned aerial vehicles (UAVs) are expected to become an integral component of future smart cities. In fact, UAVs are expected to be widely and massively deployed for a variety of critical applications that include surveillance, package delivery, disaster and recovery, remote sensing, and transportation, among others. More recently, new possibilities for commercial applications and public service for UAVs have begun to emerge, with the potential to dramatically change the way in which we lead our daily lives. For instance, in 2013, Amazon announced a research and development initiative focused on its next-generation Prime Air delivery service. The goal of this service is to deliver packages into customers’ hands in 30 minutes or less using small UAVs, each with a payload of several pounds. 2014 has been a pivotal year that has witnessed an unprecedented proliferation of personal drones, such as the Phantom and Inspire from DJI, the Lone Project from Google, AR Drone and Bebop Drone from Parrot, and IRIS Drone from 3D Robotic. Such a widespread deployment of UAVs will require fundamental new tools and techniques to analyze the possibilities of wireless communications using UAVs and among UAVs. In the telecom arena, flying drones are already envisioned by operators to help provide broadband access to under-developed areas or provide hot-spot coverage during sporting events. More generally flying drones are expected to become widespread in the foreseeable future. These flying robots will develop a unique capability of providing a rapidly deployable, highly flexible, wireless relaying architecture that can strongly complement small cell base stations. UAVs can provide “on-demand” densification, help push content closer to the end-user at a reduced cost and be made autonomous to a large extent: Airborne relays can self-optimize positioning based on safety constraints, learning of propagation characteristics (including maximizing line of sight probability) and of ground user traffic demands. Finally, UAVs can act as local storing units making smart decisions about content caching. Thus airborne relays offer a promising solution for ultra-flexible wireless deployment, without the prohibitive costs related to fiber backhaul upgrading. Yet another example is when UAVs can be used as flying base stations that can be used to serve hotspots and highly congested events, or to provide critical communications for areas in which no terrestrial infrastructure exists (e.g., in public safety scenarios or in rural areas). Clearly, UAVs will revolutionize the wireless industry and there is an ever increasing need to understand the potential and challenges of wireless communications using UAVs. To this end, this tutorial will seek to provide a comprehensive introduction to wireless communications using UAVs while delineating the potential opportunities, roadblocks, and challenges facing the widespread deployment of UAVs for communication purposes. First, the tutorial will shed light on the intrinsic properties of the air-to-ground and air-to-air channel models while pinpointing how such channels differ from classical wireless terrestrial channels. Second, we will introduce the fundamental performance metrics and limitations of UAV-based communications. In particular, using tools from communication theory and stochastic geometry, we will provide insights on the quality-of-service that can be provided by UAV-based wireless communications, in the presence of various types of ground and terrestrial networks. Then, we will analyze and study the performance of UAV-to-UAV communications. Subsequently, having laid the fundamental performance metrics, we will introduce the analytical and theoretical tools needed to understand how to optimally deploy and operate UAVs for communication purposes. In particular, we will study several specific UAV deployment and mobility scenarios and we will provide new mathematical techniques, from optimization, game, and probability theory that can enable one to dynamically deploy and move UAVs for optimizing wireless communications. Moreover, we will study, in detail, the challenges of resource allocation in networks that rely on UAV-based communications. Throughout this tutorial, we will highlight the various performance tradeoffs pertaining to UAV communications ranging from energy efficiency to mobility and coverage. The tutorial concludes by overviewing future opportunities and challenges in this area. 1. Introduction 1. UAVs and wireless communications: a closer union 2. Brief history of UAV communications and the current state of the art 3. The distinction between conventional cellular/wireless systems and UAV-based wireless networking 4. Basic issues and challenges of UAV communications 2. Channel modeling for UAV communications 1. UAV channels vs. Terrestrial channels 2. Air-to-ground channel: characteristics and existing models 3. Air-to-air channel: characteristics and existing models 4. Shortcoming of existing models 3. Fundamental performance tradeoffs for UAV-based wireless communication 1. Performance metrics and parameters for UAV-based communication 2. Tools needed for modeling and analyzing the performance of UAV-based communication 3. Several case studies for quantifying the performance of UAV-based communications in practical scenarios such as UAV with terrestrial networks and UAV with device-to-device communications 4. Performance analysis of UAV communications under flight time constraints 4. Optimal deployment and network operation 1. Overview of UAV deployments for wireless communication purposes: opportunities and challenges 2. UAV deployment optimization in terms of location, motion and coordination 3. Resource allocation in UAVs: challenges and case studies 4. Game-theoretic methods for optimizing UAV deployment and operation 5. Cooperation between UAVs as well as between UAV and ground network elements 5. 5G applications of UAV Communications 1. Machine learning for cache-enabled UAV communications 2. UAV-enabled networks for energy-efficient Internet of Things (IoT) communication 3. Other applications in 5G and beyond 6. Conclusions and future directions 1. Conclusions and summary 2. Discussion of future directions and open opportunities: toward a massive deployment of UAVs for wireless communications Walid Saad, Virginia Tech, USA Walid Saad For more than three decades, stochastic geometry has been used to model large-scale ad hoc wireless networks, and develop tractable models to characterize and better understand the performance of these networks. Recently, stochastic geometry models have been shown to provide tractable and accurate performance bounds for cellular wireless networks including multi-tier and cognitive cellular networks, underlay device-to-device (D2D) communications, energy harvesting-based communication, coordinated multipoint transmission (CoMP) transmissions, full-duplex (FD) communications, etc. These technologies will enable the evolving fifth generation (5G) cellular networks. Stochastic geometry, the theory of point processes in particular, can capture the location-dependent interactions among the coexisting network entities. It provides a rich set of mathematical tools to model and analyze cellular networks with different types of cells (e.g., macro cell, micro cell, pico cell, or femto cell) with different characteristics (i.e., transmission power, cognition capabilities, etc.) in terms of several key performance indicators such as SINR coverage probability, link capacity, and network capacity. For the analysis and design of interference avoidance and management techniques in such multi-tier cellular networks (which are also referred to as small cell networks or HetNets), rigorous yet simple interference models are required. However, interference modeling has always been a challenging problem even in the traditional single-tier cellular networks. For interference characterization, assuming that the deployment of the base stations (BSs) in a cellular network follows a regular grid (e.g., the traditional hexagonal grid model) leads to either intractable results which require massive Monte Carlo simulation or inaccurate results due to unrealistic assumptions (e.g., Wyner model). Moreover, due to the variation of the capacity (both network and link capacities) demands across the service area (e.g., downtowns, residential areas, parks, sub-urban and rural areas), the BSs will not exactly follow a gridbased model. That is, for snapshots of a cellular network at different locations, the positions of the BSs with respect to (w.r.t.) each other will have random patterns. By capturing the spatial randomness of the BSs as well as network entities including network users, stochastic geometry analysis provides general and topology-independent results. When applied to networks modeled as spatial Poisson point processes (PPPs) with Rayleigh fading, simple closed-form expressions can be obtained which help us to better understand the network performance behavior in response to the variations in design parameters. Stochastic geometrybased analysis and optimization of future generation cellular networks is a very fertile area of research and has recently attracted significant interest from the research community. The aim of this tutorial is to provide an extensive overview of the stochastic geometry modeling approach for next-generation cellular networks, and the state-of-the-art research on this topic. After motivating the requirement for spatial modeling for the evolving 5G cellular networks, it will introduce the basics of stochastic geometry modeling tools and the related mathematical preliminaries. Then, it will present a comprehensive survey on the literature related to stochastic geometry models for single-tier as well as multi-tier and cognitive cellular wireless networks, underlay D2D communication, and cognitive and energyharvesting D2D communication. It will also present a taxonomy of the stochastic geometry modeling approaches based on the target network model, the point process used, and the performance evaluation technique. Finally, it will discuss the open research challenges and future research directions. 1. Overview of 5G Cellular Networks and Spatial Modeling Techniques (20 minutes) 1. 5G visions and requirements and enabling technologies 2. Key performance indicators (KPIs): SINR outage/coverage, average rate, transmission capacity 3. SINR modeling techniques 4. Stochastic geometry modeling 2. Point Process and Interference Modeling (30 minutes) 1. Point processes (PPP, clustered processes, repulsive processes) 2. Campbell theorem and probability generating functional 3. Neyman Scott process: Matern cluster process and modified Thomas cluster process 4. Laplace transform of the pdf of interference 3. Performance Evaluation Techniques (40 minutes) 1. Technique #1: Rayleigh fading assumption 2. Technique #2: Region bounds and dominant interferers 3. Technique #3: Fitting 4. Technique #4: Plancherel-Parseval theorem 5. Technique #5: Inversion 4. Modeling Large-Scale Single and Multi-Tier Cellular Networks (60 minutes) 1. Modeling downlink transmissions 2. Modeling uplink transmissions 3. Single-tier networks with frequency reuse 4. Biasing and load balancing 5. Optimal deployment of BSs 6. Large-scale multiple-input multiple-output cellular systems 5. Modeling Cognitive Small Cells in Multi-Tier Cellular Networks (20 minutes) 1. Spectrum sensing range and spectrum reuse efficiency 2. Spectrum access schemes by cognitive small cells 3. Network modeling 4. Outage probability (channel outage and SINR outage) analysis for downlink transmissions in cognitive small cells 6. Modeling Mode Selection and Power Control for Underlay D2D Communication (30 minutes) 1. Biasing-based mode selection and channel inversion power control for underlay D2D communication 1. Network modeling and stochastic geometry analysis 2. Cognitive and energy harvesting-based D2D communication 1. Network modeling and stochastic geometry analysis 7. Open Issues and Future Research Directions (10 minutes) 8. References Ekram Hossain, University of Manitoba, Canada Ekram Hossain In recent years, energy harvesting (EH) solutions have become a emerging paradigm for powering up future wireless sensing systems. Instead of completely relying on a fixed battery or power from the grid, nodes with EH capabilities collect energy from the environment, such as solar power or power from radio-frequency signals. Energy harvesting constitute a key enabling technology for internet of things (IoT) applications, including smart homes and cities. This aspect is particularly important given that over 16 billion devices are expected to be connected in the upcoming by 2022 and hence powering of these devices and providing energy autonomous systems is a central concern. This tutorial focuses on cross-layer approaches that treat the communications, control and estimation aspects together. In contrast to approaches that solely focus on communication aspects, this framework emphasizes the underlying sensing and control problem in wireless sensing applications. This unified framework enables researchers to efficiently bridge the gap between the fundamental signal processing results, such as the sampling theorems in signal processing, and the practical limitations imposed by energy harvesting capabilities. The tutorial will start with an overview of energy harvesting technologies and their applications in sensing. This part will allow the audience to get a high-level grasp of energy harvesting technologies and in particular the possibilities and the practical limitations brought by these technologies in sensor networks. We will then move to the theoretical results regarding to estimation and control in energy harvesting systems. We will cover both the off-line and online optimization approaches, and both single and multi-user systems with centralized and decentralized approaches. We will conclude with a summary and a discussion of open research topics. 1. Introduction 1. Motivation 2. Overview of Energy Harvesting Sensing Systems 3. Application Examples 2. Remote Estimation with Sensor Networks Powered by Energy Harvesting – Offline Optimization 1. Single User Systems 2. Multi-user Systems 1. Centralized Approaches 2. Decentralized Approaches 3. Remote Estimation and Control with Sensor Networks Powered by Energy Harvesting – Online Optimization 1. Dynamical Systems 1. Kalman Filtering in Dynamical Systems 2. Control of Dynamical Systems 2. Single User Systems 3. Multi-user Systems 1. Centralized Approaches 2. Decentralized Approaches 4. Open Research Topics and Concluding Remarks Subhrakanti Dey, Uppsala University, Sweden Subhrakanti Dey Ayça Özçelikkale, Chalmers University of Technology, Sweden Ayça Özçelikkale Fully dynamic or flexible time division duplexing (TDD) is an essential 5G ingredient, e.g., in the 3GPP New Radio (NR) specification. In small cell scenarios, especially, the amount of instantaneous uplink (UL) and downlink (DL) traffic may vary significantly with time and among the adjacent cells. In such cases, Dynamic TDD allows full flexibility for resources to be adapted between the UL and DL at each time instant thus providing vastly improved overall resource utilisation. However, the dynamic variation of resource allocation will change the interference seen by neighbouring cells and users, drastically complicating the overall interference management. In particular, this variation can impact systems that employ coordinated beamforming or cooperative multi-cell transmission, which require sufficiently reliable channel state information (CSI) between the mutually interfering network nodes. The target of the tutorial is to provide a holistic view for the design of interference management in 5G and beyond networks based on dynamic traffic aware TDD, particularly addressing relevant technology components such as beamformer training, CSI acquisition, resource allocation and interference control. The methods discussed will account for variations in user traffic as well the associated overhead from adapting UL/DL resources. First, an overview of 3GPP NR physical layer aspects is provided. A special focus is given for key technology components enabling dynamic TDD operation in NR. After this, the theoretical performance limits of dynamic TDD systems using scheduling and coordinated beamforming are briefly explored. Subsequently, low complexity, near optimal distributed solutions that account for the users’ traffic dynamics are considered. Particular emphasis is put on the iterative Forward-Backward (F-B) training based CSI acquisition and direct beamformer estimation mechanisms using precoded pilots, as well as, methods to compensate for pilot non-orthogonality and the associated errors due to imperfect channel measurements. The feasibility of proposed F-B training schemes in the context of 5G radio access covering impacts to frame structure design, UE operation, etc., will be discussed. Finally, the proposed training schemes are extended to network controlled device-to-device (D2D) and cooperative transmission scenarios. The tutorial concludes with some highlights for future research directions. 1. Objective, introduction and outline 1. Network densification – challenges for interference management and potential solutions 2. Dynamic and flexible TDD 3. Overview of physical layer aspects of 3GPP New Radio (NR) in Rel-15 4. Key technology components and procedures enabling dynamic TDD in NR 2. Performance bounds and decentralized approaches in dense multiuser MIMO networks 1. Linear transmitter-receiver design for multi-cell multiuser MIMO communication 2. Effective CSI signaling and backhauling 3. Traffic aware linear transceiver design for different system optimization criteria and Quality of Service constraints 4. Joint UL/DL mode selection and transceiver design 3. Coordinated interference management in dense TDD based 5G networks 1. Distributed transmission with Forward-Backward (F-B) training 2. Direct beamformer estimation with over-the-air (OTA) F-B training 3. Impact of limited pilot resources 4. Extension to network controlled device-to-device (D2D) and cooperative transmission scenarios 4. OTA TX-RX training schemes in the context of 5G radio access 1. Impact to frame structure design, UE operation 2. Impact on reference signals, and control signaling Juha Karjalainen, Nokia Bell-Labs, Finland Juha Karjalainen Antti Tölli, University of Oulu, Finland Antti Tölli The tutorial focusses on the main principles of the converged edge cloud, as the cornerstone of the next generation network architecture. The term “converged” is attributed to two basic trends (a) some of the traditional Radio Access Network (RAN) functions (e.g., baseband processing functions) are moved to the edge cloud for better scalability, pooling and resiliency and (b) some of the traditional Core functions are decomposed, virtualized and relocated to the edge cloud, allowing for better, unmatched application support. Hence, the converged edge cloud is designed to support the Mobile Edge Computing, Cloud RAN and virtualized Core functions. The tutorial will describe the architectural concepts of the converged edge cloud and will address its key attributes, which include: • Providing the compute and storage infrastructure (edge data centers) serving as flexible application platform at the edge of the network. • Enabling low-latency applications and massive capacity through localized delivery (e.g., localized services, caching, location awareness). • Supporting special use cases of ultra-low latency and high reliability for vertical markets. • Exposing network information to applications to improve user experience and overall network efficiency. • Enabling support for smart connectivity through algorithms and network intelligence in cloud-based multi-connectivity environments. Doru Calin, Nokia, USA Doru Calin Machine learning algorithms such as clustering and classification on graphs are highly versatile tools applicable to many disciplines. Their application to wireless communications, in particular Wireless Sensor networks is growing. In this tutorial we present important mathematical tools and algorithmic principles for performing learning on data modeled as graphs with a special focus on applications to wireless communications. We discuss basic graph concepts, graph community models, spectral graph theoretic tools, among others. • Introduction to fundamentals of graphs and graph matrix representations • Sparse graphs and dense graphs • Basic Random Graph Models • Community Detection Problem: Community paritioning vs hidden community detection • Challenges in community detection: NP Hardness • Machine learning on graphs • Machine learning applications in Wireless communications • Semi-supervised vs unsupervised clustering • Relevant random graph models • Unsupervised Clustering • Spectral clustering based community detection • Anomaly detection and clique detection • Kernel Spectral Clustering • Semidefinite relaxation • Semisupervised Learning/Clustering • Diffusion/Random-walk and Message-Passing based methods • Personalized PageRank • Belief Propagation Laura Cottatellucci, Eurecom, France Laura Cottatellucci Arun Kadavankandy, INRIA, France Arun Kadavankandy After turbo coding and LDPC coding, polar coding has emerged as a new coding method in theory and practice, with completely different principles for the design of code, encoder and decoder. With their invention by Arikan in 2008, polar codes have been accepted as a breakthrough in channel coding and have since spawn great academic interest. In late 2016 they were accepted for the eMBB control channel within the 5G standardisation, and so have also manifested their role as practically relevant codes. This tutorial will provide the theoretic principles and practical design approaches for polar codes, and will give an insight into the 5G polar coding standardisation process. 1. Basic methods 1. Channel polarisation 1. Principle of channel polarisation 2. Capacity-achieving coding scheme 3. Polarisation exponent 2. Encoder and decoder 1. Kernel and transformation matrix 2. Tanner graph 3. Successive-cancellation decoder 3. Frozen set design 1. Density evolution for BEC 2. Density evolution for AWGNC with GA 2. Finite-length codes 1. List decoding 1. SC decoder structures 2. List decoder structures 3. CRC for list decoding 2. Code design concepts 1. Frozen / information sequence 2. Puncturing / shortening patterns 3. CRC / distributed CRC / PC 3. Special code designs 1. Polar sub-codes 2. Multi-kernel polar codes 3. Parity-check polar codes 3. Polar codes in 5G 1. Coding in 5G 1. Coding standardisation overview 2. Where to find information 2. Agreements and discussion 1. Agreements on polar codes 2. Discussion of open issues Jean-Claude Belfiore, Huawei Technologies, France Jean-Claude Belfiore Valerio Bioglio, Huawei Technologies, France Valerio Bioglio Ingmar Land, Huawei Technologies, France Ingmar Land Embedded sensors are enabling a wide range of emerging smart services in domains ranging from healthcare to smart homes and cities. They are waiting to be connected to the internet and rapidly becoming crucial components of a valuable Internet of Things (IoT). The variety of wireless sensor system applications demands for appropriate wireless connectivity. Several new technologies and standards are popping up, fit for short or large range, and various data rate requirements. Dedicated networks are being deployed for Machine Type Communication. This tutorial will bring a theoretical and practical initiation to wireless technologies tailored for connecting embedded sensors. It will explain fundamental concepts of wireless propagation, highlighting the challenges and opportunities to realize low power connections. Several actual technologies and standards for different categories of connections will be introduced. A few illustrative use cases will be presented. A hands-on session will allow the participants to experiment with EFM32 Happy Gecko developer boards, cooperating in small teams. In a final session a glance on future trends will be given. The tutorial will be concluded with an overview of interesting relevant resources and a discussion with the participants on the expectations for follow up beyond the tutorial. 1. Introduction and fundamental knowhow (45 min) 2. The lecture will start with a sketch of the context and expectations on connecting embedded sensors in the IoT. The typical anatomy of a connected embedded system will be introduced, and the challenges associated to their design and operation. The basics of wireless communication will be explained starting with free space wave propagation and discussing the influence of multi-pad, blockers, operating frequency, and antennas. The impact of the fundamental physics for connecting sensors specifically will be highlighted, with respect to energy consumption specifically. Technological solutions to connect remote sensors with low power budget in a reliable way will be introduced. 3. IoT wireless technologies overview (45 min) 4. It is raining IoT technologies – which is very good news! A variety of solutions exists and is emerging, with different characteristics to meet the requirements of many different applications and embedded sensors waiting to be connected to the internet. IoT developers and integrators are often overwhelmed by the amount of standards and technologies available for IoT. This session will cover the variety of state-of-the-art wireless radio protocols (e.g., Bluetooth Low Energy, SIGFOX, LoRa, NB-IoT). They can support different ranges, data rates, energy constraints, and business needs Appropriate use cases for the different connectivity options will be illustrated from an IoT perspective. 5. Low and lower – reducing power consumption of IoT nodes: a hands-on (60 min) 6. In this hands-on session the attendees will experience the development of a wireless sensor node. More specifically, how low-power operation can be achieved by clever utilization of the available resources. Such design choices include: selecting the right wireless technology, duty-cycled operation, hardware acceleration, etc. The participants will experiment with a custom LoRa-based sensor, built with a Semtec SX1272 Radio chip and an EFM32 Cortex M0 processor. The way operations are being performed on the node can be customized in the Silabs Simplicity Studio IDE. The effect of these changes on the energy consumption can be observed through the IDE’s built-in energy profiler. In the end, the lecturers will have shown that the design of true low-power wireless sensors requires a thoughtful design. Both software and hardware need to work seamlessly together within the boundaries of a specific application. 7. Lessons learned and future trends (30 min) 8. In the closing lecture we will first review the main learning of the tutorial and further resources of interested will be pointed to. Next a glance will be given on the future and specifically enlighten how Machine Type Communication is expected to evolve in the broader evolution towards 5G communication systems. To conclude, we will propose a plan to continue the discussion on wireless connectivity for embedded sensors, and poll for the participants’ interests and feedback. Gilles Callebaut, KU Leuven, Belgium Gilles Callebaut Liesbet Van der Perre, KU Leuven, Belgium Liesbet Van der Perre Tutorial homepage: Nowadays, the mobile network no longer just connects people but is evolving into billions of devices, such as sensors, controllers, machines, autonomous vehicles, drones, people and things with each other and then achieves information and Intelligence. From a planning and optimization perspective on the mobile network, this means that we also need a lot more flexibility to address these future needs. Next-generation (5G) wireless systems are characterized by three key features: heterogeneity, in terms of technology and services, dynamics, in terms of rapidly varying environments and uncertainty, and size, in terms of number of users, nodes, and services. The need for smart, secure, and autonomic network design has become a central research issue in a variety of applications and scenarios. Ultra dense networks (UDN) have attracted intense interest from both academia and industry to potentially improve spatial reuse and coverage, thus allowing cellular systems to achieve higher data rates, while retaining the seamless connectivity and mobility of cellular networks. However, considering the severe inter-tier interference and limited cooperative gains resulting from the constrained and non-ideal transmissions between adjacent base stations, a new paradigm for improving both spectral efficiency and energy efficiency through suppressing inter-tier interference and enhancing the cooperative processing capabilities is needed in the practical evolution of UDN. This tutorial will identify and discuss technical challenges and recent results related to the UDN in 5G mobile networks. The tutorial is mainly divided into four parts. In the first part, we will introduce UDN, discuss about the UDNs system architecture, and provide some main technical challenges. In the second part, we will focus on the issue of resource management in UDN and provide different recent research findings that help us to develop engineering insights. In the third part, we will address the signal processing and PHY layer design of UDN and address some key research problems. In the last part, we will summarize by providing a future outlook of UDN. 1. Overview of UDN and System Architecture 1. RAN Evolutions: Brief introduction of UDN, SON, C-RANs, LTE-U and their potential evolution 2. Introduction o f UDN: Basic features and definitions, challenges, and state of the art 3. System architecture: Fronthaul, Fog/cloud computing, heterogeneous networks, performance metrics 2. Resource Management in UDN 1. Resource Allocation : A cooperative bargaining game theoretic approach 2. Resource allocation with heterogeneous services 3. Secure resource allocation without and with cooperative jamming 4. Cross layer optimization in UDN 3. Interference Management in UDN 1. Interference-limited resource optimization with fairness and imperfect spectrum sensing 2. Coexistence of Wi-Fi and UDN with LTE-U 3. Cooperative interference mitigation and handover management 4. Incomplete CSI based resource optimization in SWIPT 4. Outlook of UDN 1. Evolution of UDN: Future research challenges Ming Ding, CSIRO, Australia Ming Ding David Lopez-Perez, Nokia Bell Labs, Ireland David López-Pérez Haijun Zhang, University of Science and Technology Beijing, China Haijun Zhang In spite of its 30-year history, Wi-Fi is continuously evolving being today the most used wireless technology for Internet access. Recently the fifth generation of the Wi-Fi standard – namely, IEEE 802.11-2016 – was published. It includes advanced techniques for multigigabit communications, more flexible QoS provisioning, power management, etc. In the tutorial, we will look into the next generation of Wi-Fi, which should be ready by 2021, focusing on the hottest topics currently being discussed in IEEE 802.11 Working Group. We will start with recently developed 802.11ah aka Wi-Fi HaLow that extends transmission range up to 1 km and makes Wi-Fi suitable for Internet of Things and Industrial Internet applications. Then we consider 802.11ax, which improves user experience in dense Wi-Fi networks and introduces OFDMA to Wi-Fi. We will also discuss mmWave communications with 802.11ay, data rates of which exceed 250 Gbps. Finally, we study how 802.11ba enables extremely low power communications and how Wi-Fi becomes smarter by providing new services, e.g. very accurate positioning, in addition to just cable replacement, for which it has been originally designed. For each topic, we will consider key features, review existing studies, list open issues and possible problem statements of high interest for both academia and industry. 1. Trends of Wireless Technologies evolution 1. Market 2. Expansion on LTE and Wi-Fi, their intersection 2. 802.11ah aka Wi-Fi Halow 1. Use cases 2. Short frames 3. New channel access methods 1. RAW (Restricted access window) 2. TWT (Target Wakeup Time) 4. Improving power efficiency 5. Relaying 6. Implementation (existing and expecting chipsets) Sections b-e will be enriched with analysis of existing studies and performance evaluation results. We will also discuss open issues and possible problem statements. 3. 802.11ax 1. Use cases 2. Uplink MU MIMO 3. OFDMA 4. OFDMA Random access (when and why it should be used) 5. New Modulation and coding Schemes 6. Improving performance in dense networks (a survey of discussed approaches) 7. Customizable NAVs, RTS/CTS Sections b-g will be enriched with analysis of existing studies and performance evaluation results. We will also discuss open issues and possible problem statements. For example, Wi-Fi OFDMA basic principles differ from LTE ones, which makes scheduling problem open. 4. 802.11ad/ay 1. Use cases 2. The peculiarities of mmWave communication 3. New network architecture (PBSS) 4. New PHY 5. New channel access for directional communication 6. How 11ay extends 11ad Sections b-f will be enriched with analysis of existing studies and performance evaluation results. We will also discuss open issues and possible problem statements. 5. Other Wi-Fi improvements/amendments 6. For each of the amendment we will briefly discuss use cases and key solutions, either approved or being under consideration in the working group. 1. Pre-association discovery 2. Fast Initial Link Setup 3. Next Generation Positioning 4. Low Power Wake up Radio 5. Bonus: Li-Fi Evgeny Khorov, IITP RAS, Russia Evgeny Khorov Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth generation (5G) wireless networks to meet the heterogeneous demands on low latency, high reliability, massive connectivity, improved fairness, and high throughput. The key idea behind NOMA is to serve multiple users in the same resource block, such as a time slot, subcarrier, or spreading code. The NOMA principle is a general framework, where several recently proposed 5G multiple access techniques can be viewed as special cases. Recent demonstrations by industry show that the use of NOMA can significantly improve the spectral efficiency of mobile networks. Because of its superior performance, NOMA has been also recently proposed for downlink transmission in 3rd generation partnership project long-term evolution (3GPP-LTE) systems, where the considered technique was termed multiuser superposition transmission (MUST). In addition, NOMA has been included into the next generation digital TV standard, e.g. ATSC (Advanced Television Systems Committee) 3.0, where it was termed Layered Division Multiplexing (LDM). This tutorial is to provide an overview of the latest research results and innovations in NOMA technologies as well as their applications. Future research challenges regarding NOMA in 5G and beyond are also presented. • Review of the overall 5G requirements to support massive connectivity and realize spectrally and energy efficient communications. • Single-carrier NOMA is introduced first, where two types of NOMA, powerdomain NOMA and cognitive-radio (CR) inspired NOMA, are described and their capabilities to meet different quality of service (QoS) requirements are compared. • Multi-carrier (MC) NOMA is then presented as a special case of hybrid NOMA. The impact of user grouping and subcarrier allocation on the performance of MC-NOMA is illustrated. A few special case of MC-NOMA, such as sparse code multiple access (SCMA), low-density spreading (LDS), and pattern division multiple access (PDMA), are discussed and compared. • The combination of orthogonal MIMO technologies and NOMA will be investigated. Unlike conventional multiple access techniques, the design of MIMO-NOMA is challenging. For example, power allocation in NOMA requires the ordering of the users based on their channel conditions. This user ordering is straightforward for the single-input single-output (SISO) case since it is easy to compare scalar channel coefficients, but it is difficult in MIMO scenarios in the presence of channel matrices/vectors. A few MIMO-NOMA designs with different trade-offs between system performance and complexity will be discussed. • The design of cooperative NOMA schemes will be explained. In a NOMA system, successive interference cancellation is used, which means that some users know the other users’ information perfectly. Such a priori information should be exploited, e.g., some users can act as relays to help other users which experience poorer channel conditions. A few examples of cooperative NOMA protocols will be introduced and their advantages/disadvantages will be illustrated. • The application of NOMA in mmWave networks will be investigated. Similar to NOMA, the motivation for using mmWave communications is the spectrum crunch, but the solution provided by mmWave communications is to use the mmWave bands which are less crowded compared to those used by the current cellular networks. We will show that the use of NOMA is still important in mmWave networks, in order to fully exploit the bandwidth resources available at very high frequencies. • The practical implementation of NOMA will be discussed as well. The existing coding and modulation designs for NOMA will be described first, where another practical form of NOMA based on lattice coding, termed lattice partition multiple access (LPMA), will be introduced. The impact of imperfect channel state information (CSI) on the design of NOMA will then be investigated. Various approaches for cross-layer resource allocation in NOMA networks will be discussed and compared. • Recent standardization activities related to NOMA will be reviewed as well. Particularly the tutorial will focus on the implementation of multi-user superposition transmission (MUST), a technique which has been included into 3GPP LTE Release 13. Different designs of MUST and their relationship to the basic form of NOMA will be illustrated. In addition, the application of NOMA in the digital TV standard ATSC 3.0 will also be explained. • Finally, challenges and open problems for realizing spectrally efficient NOMA communications in the next generation of wireless networks will be discussed. Zhiguo Ding, Lancaster University, UK Zhiguo Ding Robert Schober, Friedrich-Alexander University, Germany Robert Schober2 In wireless networking, currently one of the most pressing and challenging problems is to keep up with demand by scaling wireless capacity. State-of-the-art wireless communication already operates close to Shannon capacity and one of the most promising options to further increase data rates is to increase the communication bandwidth. Very high bandwidth channels are only available in the extremely high frequency part of the radio spectrum, the mm-wave band. The commercial potential of mm-wave networks has initiated several standardization activities within wireless personal area networks (WPANs) and wireless local area networks (WLANs), such as IEEE 802.15.3 Task Group 3c (TG3c), IEEE 802.11ad standardization task group, WirelessHD consortium, and wireless gigabit alliance (WiGig). First IEEE 802.11ad devices are expected to hit the market in 2016, and several large (European and US) research projects are currently investigating the use of mm-wave communication for backhaul, fronthaul, and even access in mobile networks. Ericsson Research has announced that a mm-waves cellular standard is expected to be released around 2020. Despite these ongoing standardization efforts and projects, much research is still needed. Communication at such high frequencies suffers from high attenuation and signal absorption, often restricting communication to line-of-sight (LOS) scenarios and requiring the use of highly directional antennas. This in turn requires a radical rethinking of wireless network design. For these reasons, the topic is of extreme relevance and timeliness to wireless networking and communication. 1. Introduction 2. Fundamentals 1. Mm-wave specific characteristics: channel, propagation, deafness, blockage, directionality 2. Hardware, specifically beam-forming antennas, also ADC/DAC challenges, #of transceiver chains, integration, etc. 3. Interference modelling 4. Beam-forming, access initialization 5. MAC layer 1. Medium access, packet aggregation, failure of CSMA/CD, specifics of directional medium access 6. Association and relaying; multi-hop aspects 7. Mm-waves for cellular networks 1. Physical control channels 2. Initial access and mobility management 3. Resource allocation and interference management 4. Coexistence and fallback to lower frequency mobile networks 5. Control plane/user plane-split 6. Spectrum sharing 8. Mm-waves for short range networks 1. IEEE 802.15.3c 2. IEEE 802.11ad 3. IEEE 802.11ay Carlo Fischione, KTH Royal Institute of Technology, Sweden Carlo Fischione Joerg Widmer, IMDEA Networks Institute, Spain Joerg Widmer In recent years we have seen an explosion of location based services. These services mostly rely on an accuracy performance that was “envisioned” two decades ago when the FCC demanded from the network operators such a performance to determine the whereabouts of 911 callers. Neither dedicated position systems, such as GPS, nor the cellular systems could deliver the potential performance in indoor or urban canyons, and therefore, led to an evolution of existing networks (GSM – UMTS – LTE) to provide network based localization. Further, in communication networks geo-location information is identified as a useful input that e.g. represents past and current channel state information and conditions (short- and long-term statistics) and network constellations. Current information jointly with mobility information leads to short-term predictions that have an impact on the different communication layers such as PHY, MAC or network management. Challenging applications of today and in the future demand a much more precise accuracy in the cm-range. We will survey the cellular network evolution of localization and outline potential lessons to be learned for future cellular generations, as well as a timely status of cellular localization within the 5G standard. 1. Introduction and Motivation (10 min) 2. Location-awareness in cellular communication systems (40 min) 1. Physical layer 2. MAC layer 3. Network and transport layers 4. Higher layers 3. Fundamentals of cellular localization (40 min) 1. Localization 1. Proximity 2. Scene analysis (or fingerprinting) 3. Trilateration 4. Triangulation 5. Hybrid 6. Add range free localisation methods • Proximity • Message passing (distributed vs centralized) • Non-radio based localization techniques 2. Challenges of localization methods 1. Infrastructure 2. Communication resources 3. Implementation 4. Standardization (key issues that hinder the evolution of different methods: too complicated and too many different devices) 3. Commercial localization methods 1. GNSS – Satellite navigation systems 2. WLAN systems 3. Proprietary systems 4. Cellular systems 4. Classification of standard cellular location methods and its performance 4. Evolution of cellular localization standards from 1G to 4G (45 min) 1. Cellular standardization bodies related to localization (ETSI GSM, 3GPP – UMTS / LTE / NB-IOT), 3GPP2: CDMA 2000 2. Other standardisation bodies interacting with 3GPP 1. IEEE 802.11 2. Bluetooth SIG 3. 1G: Introduction of localization methods cellular systems 4. 2G: Initial standardization of location methods 5. 3G: Consolidation of standard methods and its enhancements 6. 4G: Further enhancements of location methods 1. indoor positioning 2. NB-IoT 7. Role of governmental bodies on the standardization 1. FCC (United States) 2. EC (Europe) 3. Russian Federation 5. Perspectives of 5G cellular localization 1. Current standardization of 5G positioning 2. New research trends for cellular localization 1. mmWave 2. HetNet 3. Massive MIMO 4. Cooperative positioning 5. Multipath-assisted positioning 3. Lessons learned José A. del Peral-Rosado, UAB, Spain José A. del Peral-Rosado Ronald Raulefs, Institute of Communications and Navigation, Germany Ronald Raulefs
global_01_local_0_shard_00002368_processed.jsonl/70516
Collective Intelligence Podcast, Eva Galperin on Championing Privacy Manage episode 203640439 series 2084211 Flashpoint Editorial Director Mike Mimoso talks to Eva Galperin of the Electronic Frontier Foundation (EFF) about the high stakes of online privacy, defending human rights, and protecting vulnerable populations against surveillance and censorship. 50 episodes
global_01_local_0_shard_00002368_processed.jsonl/70517
Grocery innovations at IGD Live - Retail Ramble from Essential Retail - Episode 125 Manage episode 246922646 series 1016723 Essential Retail speaks to a number of key influencers in the grocery and food space at the inaugral IGD Live event, including the Co-op and Deliciously Ella. Listen to this bumper episode of the Retail Ramble podcast to hear editor, Caroline Baldwin, quiz these brands about digital innovations and sustainability trends. Got something you want to tell us about the Podcast? Want to join us? You can get in touch on Twitter via, or directly with Caroline at 130 episodes
global_01_local_0_shard_00002368_processed.jsonl/70520
J – Juxtaposed Minds (NaPoWriMo #12) Do you ever feel like you’re more than one person? Do we have inner duality — the light and dark? Is there another voice? Juxtaposed minds is as close as I can get. This invokes minor gender differences. My apologies to women if it is seen as stereotyping. It only applies to me. That’s how it seems in my mind(s). It’s how the light gets in. Juxtaposed Minds by Bill Reynolds As always, you’re here with me, As children, you survived my foolish resistance. As we pondered our thoughts, I sensed yours in me, As we bind together, into one two-sided existence. While passing through this life, We two spirits were always so real. Through our eyes and ears, we see and hear; Yet, with one heart we together feel. You walk in my footsteps, always with me, When you talk to me, I hear your voice, And I feel your presence within my being. We share one self, as we sense we are two. Leonard Cohen. We have his music. I know you, but not so well, As you know me. One and the same, we’re forever to be. Your she melds to one, within my inner he. You’re a guardian of two spirits, one soul. One guides the other through all time. You’re a muse to me, to my sum of being. Your reality balances our one life, As we console and debate, together we decide. You’re the lady in me, who’s never been seen. Kinder and softer, more willing to hear. The knower of wisdom, the source of mine. To the world you are silent, but you talk to me. Your duality of truth overshadows all lies, Your love overpowers this emotional being. With a power and difference, You have captured our two-sided soul.  Look both ways and be true to yourself. When you see gaps, mind them. 4 thoughts on “J – Juxtaposed Minds (NaPoWriMo #12) 1. Like doesnt even come close. I love this. And yes, I see that in me, as well. As a kid I was always doing the ‘but boys only…” thing– collecting stamps, reading science fiction, building erector set things–I think there’s some duality in a lot of us, Not everyone wants to see it, or acknowledge it, but it’s what helps us communicate with each other, isnt it. Liked by 2 people Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/70522
Three Ways to Write a Poem Of Plain Poems, Figurative Poems & Metaphoric Poems The Plain Poem Richard Cory by EA Robinson Whenever Richard Cory went down town, We people on the pavement looked at him: He was a gentleman from sole to crown, Clean favored, and imperially slim. And he was always quietly arrayed, And he was always human when he talked; But still he fluttered pulses when he said, And he was rich – yes, richer than a king – And admirably schooled in every grace: In fine, we thought that he was everything To make us wish that we were in his place. So on we worked, and waited for the light, And went without the meat, and cursed the bread; And Richard Cory, one calm summer night, Went home and put a bullet through his head. so much depends a red wheel glazed with rain beside the white Whose woods these are I think I know. His house is in the village though; He will not see me stopping here To watch his woods fill up with snow. My little horse must think it queer To stop without a farmhouse near Between the woods and frozen lake The darkest evening of the year. He gives his harness bells a shake To ask if there is some mistake. The only other sound’s the sweep Of easy wind and downy flake. The woods are lovely, dark and deep, But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep. we had goldfish and they circled around and around in the bowl on the table near the heavy drapes covering the picture window and my mother, always smiling, wanting us all and she was right: it’s better to be happy if you raging inside his 6-foot-two frame because he couldn’t understand what was attacking him from within. my mother, poor fish, wanting to be happy, beaten two or three times a why don’t you ever smile?’ saddest smile I ever saw one day the goldfish died, all five of them, they floated on the water, on their sides, their eyes still open, and when my father got home he threw them to the cat there on the kitchen floor and we watched as my mother The Figurative Poem …then fresh tears Stood on her cheeks, as doth the honey-dew Upon a gather’d lily almost wither’d. …that kiss is comfortless As frozen water to a starved snake. Compare this to The Winter’s Tale: Leon. Make that thy question, and go rot! Dost think I am so muddy, so unsettled, To appoint myself in this vexation, sully the purity and whiteness of my sheets, Which to preserve is sleep, which being spotted There may be in the cup, A spider steep’d, and one may drink, depart, And yet partake no venom, for his knowledge Is not infected: but if one present The abhorr’d ingredient to his eye, make known How he hath drunk, he cracks his gorge, his sides Hoping to find the radiant cell That washed us, and caused our lives Endlessly turning toward the future, Tomorrow, day after tomorrow, the day after that, Gaze far out at the lake in sunflame, Expecting our father at any moment, like Charon, to appear Back out of the light from the other side, Other incidents flicker like foxfire in the black Sunlight flaps its enormous wings and lifts off from the back The wind rattles its raw throat, Let us go then, you and I, When the evening is spread out against the sky Like a patient etherized upon a table; Let us go, through certain half-deserted streets, The muttering retreats Of restless nights in one-night cheap hotels And sawdust restaurants with oyster-shells: Streets that follow like a tedious argument Of insidious intent To lead you to an overwhelming question … Oh, do not ask, “What is it?” Let us go and make our visit. She is as in a field a silken tent At midday when the sunny summer breeze Has dried the dew and all its ropes relent, So that in guys it gently sways at ease, And its supporting central cedar pole, That is its pinnacle to heavenward And signifies the sureness of the soul, Seems to owe naught to any single cord, But strictly held by none, is loosely bound By countless silken ties of love and thought To every thing on earth the compass round, And only by one’s going slightly taut In the capriciousness of summer air Is of the slightlest bondage made aware. Let me not to the marriage of true minds Admit impediments. Love is not love Which alters when it alteration finds, Or bends with the remover to remove: O no; it is an ever-fixed mark, That looks on tempests, and is never shaken; It is the star to every wandering bark, Whose worth’s unknown, although his height be taken. Love’s not Time’s fool, though rosy lips and cheeks Within his bending sickle’s compass come; Love alters not with his brief hours and weeks, But bears it out even to the edge of doom. ··If this be error and upon me proved, ··I never writ, nor no man ever loved. “Grief fills the room up of my absent child, Lies in his bed, walks up and down with me, Puts on his pretty look, repeats his words, Remembers me of his gracious parts, Stuffs out his vacant garments with his form” Love Calls Us to the Things of This World Richard Wilbur The eyes open to a cry of pulleys, And spirited from sleep, the astounded soul Hangs for a moment bodiless and simple As false dawn. The morning air is all awash with angels. Some are in smocks: but truly there they are. Now they are rising together in calm swells Of halcyon feeling, filling whatever they wear With the deep joy of their impersonal breathing; ···Now they are flying in place, conveying The terrible speed of their omnipresence, moving And staying like white water; and now of a sudden They swoon down into so rapt a quiet That nobody seems to be there. From all that it is about to remember, From the punctual rape of every blessèd day, And cries, Nothing but rosy hands in the rising steam And clear dances done in the sight of heaven.” Yet, as the sun acknowledges With a warm look the world’s hunks and colors, The soul descends once more in bitter love To accept the waking body, saying now In a changed voice as the man yawns and rises, “Bring them down from their ruddy gallows; Let there be clean linen for the backs of thieves; Let lovers go fresh and sweet to be undone, And the heaviest nuns walk in a pure floating Of dark habits, The Metaphoric Poem Not so with Robert Frost. Even when there isn’t. As a nice essay at FrostFriends.Org puts it: A Drumlin Woodchuck One thing has a shelving bank, Another a rotting plank, To give it cozier skies And make up for its lack of size. My own strategic retreat Is where two rocks almost meet, And still more secure and snug, A two-door burrow I dug. Robert-Frost-TFWith those in mind at my back I can sit forth exposed to attack As one who shrewdly pretends That he and the world are friends. All we who prefer to live Have a little whistle we give, And flash, at the least alarm We dive down under the farm. We allow some time for guile And don’t come out for a while Either to eat or drink. We take occasion to think. And if after the hunt goes past And the double-barreled blast (Like war and pestilence And the loss of common sense), If I can with confidence say That still for another day, Or even another year, I will be there for you, my dear, It will be because, though small As measured against the All, I have been so instinctively thorough About my crevice and burrow. WE make ourselves a place apart ··Behind light words that tease and flout, But oh, the agitated heart ··Till someone find us really out. ’Tis pity if the case require ··(Or so we say) that in the end We speak the literal to inspire ··The understanding of a friend. But so with all, from babes that play ··At hide-and-seek to God afar, So all who hide too well away ··Must speak and tell us where they are. And that’s that. up in Vermont: March 7 2015 23 responses 1. Reblogged this on Randa Lane – Haiku and More! and commented: Should be required reading at least once a week for anyone who writes poetry with one personal proviso — I do not share the author’s opinion of Bukowski. At best he was the “shock jock” Howard Stern of the poetic world who destroyed his talent and gift by dissolution in unimaginable ways. (opinion only — Ron Evans) 2. It sounds to me like what you call “Metaphoric Poems” ARE allegories. To back up a minute, three levels of figurative language HAVE been identified before: Simile = X is like Y Metaphor = X is Y Symbol = X (is also Y) The parentheses in symbol means that the “is also Y” part is left directly unstated, implied. Allegory is merely a work in which every significant part is a symbol for something else. Obviously, allegory was around long before Frost and was an indelible aspect of poetry (English and otherwise) for many centuries. Spenser’s The Faerie Queene may be the most elaborate in the English language. Before Spenser (and in Italian) we have Dante; after both we have something like Poe’s The Haunted Palace (made more so by its placement in Fall of the House of Usher: Even something like Browning’s Childe Roland, while not consciously allegorical (as Browning admitted), certainly FEELS allegorical and utilizes many of allegories’ traditional devices and tropes. What Frost MAY have invented, though, was the allegorical lyric poem. Before him, most allegories I can think of were narrative or dramatic. Of course, I wouldn’t be surprised if allegorical lyrics existed before Frost, but I’m simply drawing a blank on examples. • I really thought about that, whether I should go ahead and call the poems “Allegorical Poems”, but I did want to differentiate what’s commonly called an allegorical poem from what Frost (and surely others) did and do. Here’s the definition of Allegory that makes me hesitate: allegory n 1: a short moral story (often with animal characters) [syn: fable, parable, allegory, apologue] 2: a visible symbol representing an abstract idea [syn: emblem, allegory] 3: an expressive style that uses fictional characters and events to describe some subject by suggestive resemblances; an extended metaphor. All definitions generally include or emphasize the idea of fictional characters symbolically or metaphorically “representing” a given subject. Inanimate objects, the sun and moon, may be allegorical, but the emphasis is on their personification. More to the point, if you go to Wikipedia and look up “Allegory”, all the examples given are characterized by ‘X’ standing in for ‘Y’ within the context of a narrative (in the sense of a story). This isn’t what Metaphoric Poems, as I would define them, do. A Metaphoric Poem doesn’t necessarily tell a story and doesn’t necessarily offer character ‘X’ as a symbolic or metaphorical representation of ‘Y. If you removed the first ‘She is as in’ from ‘The Silken Tent’, I don’t see any way that one could call the poem “allegorical” (without considerable qualification), or ‘Mending Wall’, ‘Birches’, or ‘For Once, then Something’. Where’s the “moral” for example? I think allegory stems from the Fable, from the genre of story-telling – hence the synonyms: fable, parable, allegory, apologue — none of which, in my view, would be synonymous with what the Metaphoric Poem does. A metaphoric poems stems from the simile — a compressed simile without the introductory “as” or “like”. The Metaphoric Poem probably precludes a narrative (in the sense of a story). Does that make better sense? 3. “There is a poetry without figures of speech, which is a single figure of speech.” –Johann Wolfgang von Goethe Truly, there is nothing worth thinking that hasn’t been thought before, no? :P • The quote is from his Maxims and Reflections, numbered 176. If he ever wrote anything more about metaphoric poetry than that single sentence, I haven’t yet come across it. But I can see why those who choose to write that way might prefer, like Frost, to be a little mysterious about it. • Actually, maxim 435 is also relevant. I won’t quote the whole thing, but: “If a man grasps the particular vividly, he also grasps the general, without being aware of it at the time; or he may make the discovery long afterwards.” Perhaps the only distinction between plain poetry and metaphoric poetry is how aware the poet is of saying more than what he says. • Thing of it is (and I speak German), Goethe’s first quote is obscure enough that he may or may not be referring to “Metaphoric Poetry”. A “figure of speech” for example, needn’t refer to the notion of metaphor at all. Metaphor is just one trope (if one is going to get precise about these things). In truth, Aesop’s fables could be construed to be “a figure of speech”. So, as I say, it’s a curious way to put it — so vague (without context) as to mean whatever we’d like it to mean. (Strictly speaking, metaphor isn’t “a figure of speech”, but a trope.) As to your second assertion, I’m not so certain that the poet’s awareness is up for grabs. If it were, then we could look at any poem, at any time, and say that it actually meant X instead of Y — but that ignores the poets intentions and historical context. There are critical schools (philosophies of criticism) that don’t know the meaning of the word “anachronistic” — the poem exists in the here and now and we can read it however want and a poet’s intentions and history are utterly irrelevant. I personally find this kind of criticism the very height, the pinnacle, the non-plus ultra of critical narcissism. As if the poet created each and every poem solely for the glory of the critic — and had no intentions whatsoever. So, what I would say is that the only distinction between plain poetry and metaphoric poetry is how aware the reader is of the poet’s intentions. • Ah, but I never said the poet’s awareness is up for grabs. I think the distinction can be an important one without being especially useful to critics, disreputable ones aside. I only have a rudimentary knowledge of German, so what you say about the quote intrigues me. What kind of a figure of speech might Goethe be referring to, if not metaphors? The remark isn’t entirely without context: being a maxim implies that it’s the result of thought given to observations and experiences, deliberately shared for the (presumed) edification of readers. It is implicitly a piece of advice, and, as I read it, advice on how to read a kind of poem that might otherwise be read without being understood or appreciated. • Okay, then I misunderstood your meaning. :-) As to Goethe: Here’s how Wikipedia defines a figure of Speech: “A figure of speech is figurative language in the form of a single word or phrase. It can be a special repetition, arrangement or omission of words with literal meaning, or a phrase with a specialized meaning not based on the literal meaning of the words. There are mainly five figures of speech: simile, metaphor, hyperbole, personification and synecdoche. Figures of speech often provide emphasis, freshness of expression, or clarity. However, clarity may also suffer from their use, as any figure of speech introduces an ambiguity between literal and figurative interpretation. A figure of speech is sometimes called a rhetorical figure or a locution.” And you can find a list of figures of speech included in the article. So, for example, an entire poem could be an example of accismus. Or take Mark Anthony’s speech: Friends, Romans, Countrymen…. The entire speech could be considered an example of Apophasis. It seems deceptively plain, condemning Caesar, but by condemning him he praises him. The speech could be understood as a single figure of speech. Since Goethe doesn’t really explain what he means, but ironically, speaks figuratively, I think Antony’s speech survives as an example of what he might mean. :-) • Perhaps Antony’s speech could be considered one big example of apophasis, but I don’t think it can be denied that it contains instances of apophasis. How could a poem *be* apophasis without having a single instance of it? It’s that distinction of being a figure of speech without containing any– of being completely literal on the surface in a way that hints at the depths– that makes metaphor (and its close kin) the most natural candidate. I suppose Goethe might have used the general term ‘figure of speech’ because a more specific one would have been too limiting. Given his statements on the particular representing the general, which aren’t confined to the maxim I cited before, synecdoche might be a better choice, if we have to commit to one figure. But there can just as easily be poems that are metaphors and metonymy– using those terms metaphorically, of course. :) • Okay, but ultimately there’s no such thing as a poetry “without figures of speech”, in the sense that rhetoricians (all apparently suffering from some form of OCD) assiduously cataloged every possibly combination of words under some form of rhetorical figure — so it’s really just a matter of degree — and discerning Goethe’s line-in-the-sand is where I’m cautious. Perhaps I’m playing too much the devil’s advocate. But knowing that there’s really no such thing as poetry (let alone prose) without figures of speech — Goethe’s definition could have been quite different from mine/ours and might have included Shakespeare’s soliloquy. I don’t know. However, I admit that one could take Goethe’s maxim as a beautiful description of the Metaphoric Poem — a poem with no figurative language that is, of itself, a figure of speech. I couldn’t ask for a better description; I would just be cautious in ascribing that meaning to Goethe’s words. Prior to the 20th century, for example, the expression “to make love to” did not mean sex. It meant “to flirt with”. • Until a German linguist comes to this thread to clear up the matter of what ‘figure of speech’ might mean– or, perhaps, until I get a copy of Goethe and Schiller’s correspondence, which seems to me the most likely place to find a statement that would clarify the maxim– I’m thinking there’s not much more we can say on the matter. But, considering that in many folk-songs metaphoric meaning is an open secret, and that by the 19th century, nature symbolism– inspired by this tradition– was practically codified in German poetry, I still think that a good case can be made for the figure of speech being metaphor. But most of my knowledge of this poetry comes from Lieder rather than systematic study, so I can’t say anything more precise. • If you ever want to make the case for it, and put some time into it, I’ll publish it on the blog. :-) It’s not about being wrong or right, but learning something more than we knew before. • I’ll keep that in mind. If hanging out with philosophers has taught me anything, it’s that while argument is completely useless for convincing other people you’re right, it’s one of the best ways to refine and test your own insights. 4. I’ve taken out Eliot’s similes. See the improvement? Let us go then, you and I, The evening spread against the sky, Etherized upon a table, let us go! Through half-deserted streets, The muttering retreats, spermy One-night cheap hotels Sawdust restaurants with oyster-shells. Go! wend their circular argument Of insidious thread To the great existential question– Go! Do not ask, “What is it?” Ask: Is it metaphor or not? 5. Yes, my literary ODD acting up again. Just think of it as a little bar room joshing, one Irishman to another. “If a man grasps the particular vividly, he also grasps the general, without being aware of it at the time; or he may make the discovery long afterwards.” Couldn’t agree more with Goethe on this. I would define metaphor as an intensely felt particular whose effectiveness as a springboard for metaphor is up to the readers. By this criterion “The Red Wheelbarrow” is possibly the most metaphorical poem in the bunch, as universal a particular as my tool shop. Frost reminds me of Williams here–hands-on but with an added dash of allegory if you prefer—yet by far the superior poet. Despite having to memorize several Frost poems in elementary school I never outgrew him—his metaphors evolved with my maturity—whereas Williams can seem too self-consciously clever by half (to borrow a Loganism). His poems become curios fast. As for the others you quoted, their particular is not particularly my particular on a universal daily basis, and at their worst these poets proceed by way of their ideology or theology, Eliot especially. If what I’ve said here doesn’t make any sense, just keep in mind I’ve been hauling chicken shit in my red wheelbarrow all afternoon. 6. To clarify my post above via Goethe: the intensely felt particular is the first cause of poetry. That “so much depends on the red wheelbarrow” expresses this conception of poetry in its essence. 7. I just discovered your blog (please don’t ask me how) and needless to say I have a lot of reading to catch up with! So erudite, but the admiration for Bukowski is really maddening. Oh well, it’s a blip I can easily overlook! • If you ask me whether Bukowski was a poet, I’d probably say no — only because I don’t consider free-verse writers to be writing poetry. But inasmuch as free-verse is a genre of its own, is called “poetry” because its short and kind of looks like poetry, I count Bukowski to be among the best of them. He was essentially writing short-short stories — stories about a paragraph long and I find some of them profound — they stick with me. 8. Pingback: May 13th 2016 « PoemShape Leave a Reply to Pyrrha Cancel reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_0_shard_00002368_processed.jsonl/70543
Kepler: Issues 2010-02-05T04:56:18Z Ecoinformatics Redmine Redmine Bug #4740 (New): Create Ontology_Catalog sql table in the CORE persistent database 2010-02-05T04:56:18Z Aaron Aaron <p>I ran into our old friend, the "Cannot Find Ontology" error. After much time trying to debug through the OntologyConfiguration and OntologyCatalog classes I discovered that the way the owl files are being accessed is very fragile and thus causes this error (which I was finally able to reproduce by ant clean-cache). The issue is how the absolute paths are being created to find the owl files. I would suggest we create a database table in the persistent core database that has four columns: ID, NAME, PATH, and LIBRARY. The PATH is the fully qualified absolute path to the OWL file on the system that Kepler is running on (so we don't have to keep trying to figure out what the absolute path is in the Java code every time we want to get to the owl file).</p> <p>The new catalog system would work like this:<br />1.) Default owl files (that are shipped with Kepler) are defined in Java code and inserted into the table the first time Kepler is started using the fully qualified absolute path for whatever system Kepler is running on<br />2.) Tagging (or other modules) can then add ontologies to the sql table (thus not having to overwrite the ontology_catalog.xml file directly as is done now)<br />3.) The user can then edit the the catalog through a gui interface (as opposed to editing the ontology_catalog.xml file as is done now)</p> Bug #4584 (New): CacheManager.getObject(KeplerLSID lsid) returns an object with the wrong LSID 2009-11-25T21:03:15Z Aaron Aaron <p>It seems that objects returned by the CacheManager.getObject(KeplerLSID lsid) method do not always have the right LSID... There is a lot of funny translation and things going on with the CacheObjects. This mechanism of storing a serialized CacheObject that contains metadata about the object in addition to the object itself is inherently fragile. I would propose that we do away with CacheObjects and use the SQL database to store metadata about objects and serialize them directly to files (instead of serializing their CacheObject counterparts). This would greatly reduce the complexity of the system.</p> Bug #4153 (In Progress): report-overrides 2009-06-12T21:04:56Z Aaron Aaron <p>"ant report-overrides" build target does not include xml files (such as config.xml or configuration.xml).</p>
global_01_local_0_shard_00002368_processed.jsonl/70559
Before starting on our vacation, the pretty one competed for two days at the International and National dog Show in the city of Erfurt, presented in the intermediate class to the judges. She earned V1 with the associated Titles on both days and BOS. As a reward she was the only one accompanying us to the Baltic Sea, where the show star turned beach beauty in a flash…
global_01_local_0_shard_00002368_processed.jsonl/70608
Mushy meatballs Rolodex Today, I realised my vision had deteriorated to the point where I couldn’t tell whether someone was giving Trump the thumbs-up or flipping him the bird. He was doing it by emoji, and no matter how I pressed my nose to the screen, the details wouldn’t resolve. Sadly, the rest of his posts offered no clarification. He was angry about something, but I couldn’t make out what, not because I couldn’t see it but because his target was unclear. Sometimes, he ranted about politics, but just politics, like the system. If he called anyone out, or any specific policy, I couldn’t identify it.. Other times, it was gamers or action figures, or people who go on wiki sites and do…something annoying? I won’t post his tweets. I only do that to public figures, and rarely even to them. But let me try—let me illustrate. I’ll do one up and you’ll see. The formula was like [brand name], [vague opinion], [Donald Trump], [???????]. It went something like this: LOL Denny’s, you think you’re all that, you think you care and we will all follow your path, but what do you know about poverty? Trump [thumbs up/finger]. Why don’t you all just grow up and buy your own chicken fingers? I mean, at first you might think he’s a leftist. He’s railing against corporations that use social causes to boost their image, like when it’s Pride month and everything goes rainbow. But then he thumbs-ups or fingers Trump, which he does in every tweet. That feels like overkill. And what’s all that bit about chicken fingers? Is that bootstraps talk? We should all get off welfare and buy snacks? Except, if you’re on welfare, you’re already eating chicken fingers. They cost next to nothing—not the good ones, I mean. Those are ten bucks a plate, real meat, real breadcrumbs, not ground down and missing their texture. But the cheap ones, those are four dollars. You get six instead of three. It’d be a bargain if they didn’t taste like glue. That wasn’t a real tweet. That was one I made up. I already said that, but I’m saying it again. They were all like that, though, stream-of-consciousness screeds, and that amorphous hand sign. I wouldn’t have followed him if I’d understood him. He seemed awfully mad, and not in a helpful way. But I wanted to know what had him so angry. I feel stupid not knowing. I gave up after six tweets. My brain was all borked, and my eyes were going square. I hate when they lump us all together and then they hate us without asking a single question. TRUDEAU [shocked face/goatse]. When are they going to build a bridge? …it’s a little addictive, tweeting that way. (I won’t actually tweet that. People would unfollow me.) Star Wars is wrong because the fans! Nobody was right! You blah on and on about Yoda on Dagobah, but where does the merchandise fit in? Because that’s the true soul of Star Trek. BORIS JOHNSON! [eggplant/jellybean] Not that one. I think that one made too much sense. I think the novelty’s worn off. Maybe it’s me. Maybe language has evolved to such an extent I can’t understand young people. Have I got to that age? Am I seeing nonsense where I should be seeing shorthand? …I’m making an eye appointment. You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/70618
This article was published in Winter 2017 Nor’Easter for TONE (Tartan Owners Northeast). for the rest of the series go here: by Robin G. Coles They say the most successful businesses are those that work well with their employees. The same holds true with Captains of boats. The most successful trips are the ones who know their crew.  More importantly, their crew’s limitations and how to work around them rather than complain about it.   As the Captain of the boat, you need to be competent in the boat’s operation and equipment.  Plus, know how to sail and navigate her.  Last, but not least, you need to control your tone and volume when directing commands. Unlike the bigger yachts and cruise ships you don’t have the luxury of hiring crew for specific jobs.  Usually when you go away it’s planned with people you know.  Men and women together in close quarters can be difficult, even if married. Add another person or two to the mix could be challenging. Before you leave for your trip you should sit down with your crew to get answers to these three questions. 1. What skills do they have and at what level? Do they feel comfortable and confident on any sailboat? How many nautical miles have they sailed? Are they good at navigation, handling a boat, run the sails? Can they handle the radio if something happens? Or are they only good on the rails, cooking, cleaning or for companionship?   Also, ask if any of them want or need to freshen up on certain skills. Don’t assume anything! 1. Are they considerate of others on the boat? Do they drink too much? Remember there’s not much room to hide if an argument breaks out.  Even the biggest of yachts can feel tiny if you’re out on the ocean with no place to escape. Don’t take the women for granted and expect them to do all the cooking and cleaning. 1. Do they have any food and/or drug allergies?    How serious are they?   What about health issues everyone needs to be aware of?  Are they on any medications? You’ll want to make sure any food and/or drug allergies are known well in advance and plan accordingly. Is your crew physically fit to face bad weather, handle the sails and any other work deemed necessary on the boat?  Last, but not least, collect full medical records of each crew member and put them in a dry, safe spot.  Make sure everyone knows where they are. Before you head out, you’ll want to make sure the crew knows where to find the safety equipment and how to use it.  As for lifejackets, it’s good practice for each crew member to have their own and to wear them. Just make sure in bad weather, everyone’s lifejacket is on and tethered to the lifelines.  Most important, the captain needs to know which crew member he can appoint as back-up in case of emergency. There are lots of chores once on the boat.  Make a roster.  Set ground rules.  See that everybody abides by them; especially the Captain. Remember, the ship only runs as good as the captain.
global_01_local_0_shard_00002368_processed.jsonl/70634
The Infamous Catch 22 When moving forward towards a achieving a goal, we're bound to encounter obstacles at some point. Often, the nature of these obstacles come in the form of a Catch 22, defined by wikipedia as "a paradoxical situation from which an individual cannot escape because of contrary rules". One of the earliest examples I can remember learning about of a Catch 22 is the one about the four leaf clover; you have to have a four leaf clover to be lucky, but you have to have luck to find a four leaf clover in the first place. It can be frustrating in Catch 22 situations because it creates a feeling of being stuck without any options. In retrospect, when encountering catch 22 scenarios in the past there were a a few different factors in play contributing to why I would personally stay stuck or just give up and abandon promising endeavors to move onto another. The Influence of Others In competitive environments, discussion and debate will often center around why things won't work instead of how they could work. Harmless discussions would sometimes escalate to very heated debates as each side would try to one up each other with logic, rhetoric, and fierce counterarguments to prove their intellect. I got the feeling that most of time, it wasn't even about trying to foster discussion as it was to prove "I'm better than you". This time of discussion and back and forth debate can be very beneficial, however, if taken in the right context. By hearing the ideas of why something won't work, this brings awareness to valid points that may not have been on the radar previously. In addition, if valid points are made, this takes out a lot of the trial and error during the process, thereby saving money and time. In the same way that Edison's critics would comment that he failed 10,000 times before he was able to get a light bulb to work, his response was that he didn't fail 10,000 times, but rather, he discovered 10,000 different ways that it would not work. The ultimate idea is to extract from an experience or interaction, the things that could benefit you, rather than having attention distracted from the goal to be achieved. Creativity & Accountability Another factor that would cause me to get stuck would be not exercising creativity to get out of a Catch 22 situation. It is infinitely easier and more convenient to just give up or blame a person or situation for why something could not work or did not work. Common excuses are that a task is too difficult, there wasn't enough resources or time, or conditions were not favorable. The intimidating part about these excuses are not the excuses themselves, but rather the habit of excuse making that comes from making excuses all the time. When there is no personal accountability and blame is so quickly thrust upon a an individual or circumstances, eventually the habit develops of constantly giving away personal power. For individuals experiencing this, unless there is a powerful transformative force that knocks them out of this behavior pattern and brings awareness to what they are doing to themselves, it becomes a vicious downward spiral of a life being a victim. To achieve anything worthwhile in life, there will always be obstacles. When the prize is big, the stakes are higher and the obstacles are bigger and more frequent. One of the most important lesson to learn is that life will constantly knock you down and that it's absolutely crucial to get back up. Only then, through knowledge, experience and wisdom gained can a person elevate themselves to a level that allows for creativity and true out-of-the-box thinking in finding solutions and accomplishing big things! Anyone that isn't physically disabled and has lived to become an adult knows what it is to have perseverance. A baby doesn't just lay there after attempting first steps, give up and cry, never to try again. There was no judgement on by the baby's parents, or by the baby itself for falling down. All there was to do was to get up and try again. With each attempt, with each fall and getting up again, strength was built and the process became more and more familiar. There was no judgement or consideration of time or how many weeks or months has passed. All the baby knows is to keep getting up, keep trying and after a while, that they are mobile can run rather than just walking or crawling! Catch 22 Baby Walking Somewhere along the way, a seed is planted that failure is not good, failure is unacceptable, and once you fail at something, there's no chance for redemption. The truth that is known as a baby suddenly becomes overshadowed and forgotten by the pressure to get it right the first time around. The important lesson that is often missed from giving up too soon, is that perseverance when working towards a worthy outcome always pays off in one way or another eventually. If we are not armed with this context, the opinions that something won't work, or that something didn't work because of circumstances, becomes a self fulfilling prophecy. In life, others may expose and plant a seed of an idea in our head, but it is ultimately us and convinces and decides what truth is to us in our experience. Never let time and fear scare you into making choices, let planning and possibilities drive you forward in your decisions. Dissolving a Catch 22 Einstein famously said, "No problem can be solved from the same level of consciousness that created it." The same goes for any Catch 22 situation you find yourself in. The policies, rules or nature of the Catch 22 itself may not be been something you created. However, implicit in the fact that you encountered the situation is the fact that you can create another situation to encounter. It may involve taking a different or longer route; it may involve a change in mindset to transcend the situation entirely. One thing is for certain, when a idea captures your enthusiasm and imagination to the point where you decide to take action, remember that the idea didn't come to you for no reason. Ideas come to you because the consciousness of an idea resonates with your consciousness and has chosen you to manifest it into the world! Written By More from rule1net Driven by Needs In Simon Sinek's presentation, he talks about the strength of brands and why... Read More Leave a Reply
global_01_local_0_shard_00002368_processed.jsonl/70666
There are numerous FD schemes for the advection equation $\frac{\partial T}{\partial t}+u\frac{\partial T}{\partial x}=0$ discuss in the web. For instance here: http://farside.ph.utexas.edu/teaching/329/lectures/node89.html But I haven't seen anyone propose an "implicit" upwind scheme like this: $\frac{T^{n+1}_i-T^{n}_i}{\tau}+u\frac{T^{n+1}_i-T^{n+1}_{i-1}}{h_x}=0$. All the upwind schemes I've seen were dealing with data on the previous time-step in the spacial derivative. What is the reason for that? How does the classical upwind scheme compare to the one I wrote above? It's quite common in computational fluid dynamics to use implicit schemes similar to what you propose. The ones I know of are based on compact finite difference formulas (not simply on replacing $n$ with $n+1$ in existing schemes). For instance, one of the most widely used schemes was developed by Lele in 1992 in this paper with >2500 citations. Such schemes can be made to have better dispersive properties than typical explicit schemes. Upwinding is usually less important when using implicit methods and large time step sizes, because the huge amount of diffusion (mentioned by Jeremy) means you can't resolve shocks anyway. Regarding the particular scheme you propose: • It can be obtained from a method-of-lines discretization by using a backward difference in space and the backward (implicit) Euler method in time. • It is unconditionally stable as long as $u\ge0$ (interestingly, it's also stable for $u<0$ if the time step is not too small!) • It is more dissipative than the traditional explicit upwind scheme. • Unlike the explicit upwind scheme, it does not satisfy the unit CFL condition (i.e., it is not exact in the case that $\tau u/h = 1$). Instead it satisfies the anti-unit CFL condition (it is exact if $\tau u/h = -1$). • $\begingroup$ Good point about the compact schemes, these are certainly an important class of implicit schemes! Also, never thought about the anti-unit CFL condition and backward Euler being exact... $\endgroup$ – Jeremy Kozdon May 6 '12 at 5:21 • $\begingroup$ I am wondering, if $u$ is also subject to change over $x$ and thus sits inside the spacial derivative (we thus get the continuity equation if we take $\rho$ instead of $T$) is a simple upwind scheme still OK? $\endgroup$ – tiam May 6 '12 at 10:22 • $\begingroup$ It is good if it can treat negative velocities, because it might be the case in my problem. $\endgroup$ – tiam May 8 '12 at 21:54 There is no reason that you cannot do what you wrote. One of the reasons that this is uncommon is that there for hyperbolic (advection) type problems the domain of dependence is finite. Thus an explicit methods makes sense from a computational efficiency standpoint. The implicit scheme you have written will require solving a linear system, albeit in the case you have written triangular, and thus fairly simple to solve. Of course when you go to systems, and multiple dimensions, the system will likely no be triangular, though sometimes this can result with a proper ordering of you unknowns (see for instance Kwok and Tchelepi, JCP 2007 and Gustafsson and Khalighi, JSC, 2006). Sometimes in the hopes of taking large time steps people will use implicit time stepping as you have written, but you must be careful here. When using an implicit method, you will introduce a large amount of diffusion thus you will smear out your solution significantly. • 1 $\begingroup$ @Jeremy: why implicit discretization in time introduces additional diffusion? in $x$-variable? I can only think that upwind scheme = central discretization+diffusion, so why would different time discretization would affect this diffusion? $\endgroup$ – Kamil Jul 20 '16 at 20:24 Your Answer
global_01_local_0_shard_00002368_processed.jsonl/70667
Similarity of the yeast RAD51 filament to the bacterial RecA filament See allHide authors and affiliations Science  26 Mar 1993: Vol. 259, Issue 5103, pp. 1896-1899 DOI: 10.1126/science.8456314 The RAD51 protein functions in the processes of DNA repair and in mitotic and meiotic genetic recombination in the yeast Saccharomyces cerevisiae. The protein has adenosine triphosphate-dependent DNA binding activities similar to those of the Escherichia coli RecA protein, and the two proteins have 30 percent sequence homology. RAD51 polymerized on double-stranded DNA to form a helical filament nearly identical in low-resolution, three-dimensional structure to that formed by RecA. Like RecA, RAD51 also appears to force DNA into a conformation of approximately a 5.1-angstrom rise per base pair and 18.6 base pairs per turn. As in other protein families, its structural conservation appears to be stronger than its sequence conservation. Both the structure of the protein polymer formed by RecA and the DNA conformation induced by RecA appear to be general properties of a class of recombination proteins found in prokaryotes as well as eukaryotes. Stay Connected to Science
global_01_local_0_shard_00002368_processed.jsonl/70668
Supramolecular Structure of the Salmonella typhimurium Type III Protein Secretion System See allHide authors and affiliations Science  24 Apr 1998: Vol. 280, Issue 5363, pp. 602-605 DOI: 10.1126/science.280.5363.602 You are currently viewing the abstract. View Full Text Log in to view the full text Log in through your institution Log in through your institution The type III secretion system of Salmonella typhimuriumdirects the translocation of proteins into host cells. Evolutionarily related to the flagellar assembly machinery, this system is also present in other pathogenic bacteria, but its organization is unknown. Electron microscopy revealed supramolecular structures spanning the inner and outer membranes of flagellated and nonflagellated strains; such structures were not detected in strains carrying null mutations in components of the type III apparatus. Isolated structures were found to contain at least three proteins of this secretion system. Thus, the type III apparatus of S. typhimurium, and presumably other bacteria, exists as a supramolecular structure in the bacterial envelope. • * Present address: Structural Biology Center, National Institute of Genetics, 1111 Yata, Mishima, Shizuoka 411-8540, Japan. • To whom correspondence should be addressed. E-mail: galan{at} View Full Text Stay Connected to Science
global_01_local_0_shard_00002368_processed.jsonl/70671
TY - JOUR T1 - The Role of DNA Methylation in Mammalian Epigenetics JF - Science JO - Science SP - 1068 LP - 1070 DO - 10.1126/science.1063852 VL - 293 IS - 5532 AU - Jones, Peter A. AU - Takai, Daiya Y1 - 2001/08/10 UR - http://science.sciencemag.org/content/293/5532/1068.abstract N2 - Genes constitute only a small proportion of the total mammalian genome, and the precise control of their expression in the presence of an overwhelming background of noncoding DNA presents a substantial problem for their regulation. Noncoding DNA, containing introns, repetitive elements, and potentially active transposable elements, requires effective mechanisms for its long-term silencing. Mammals appear to have taken advantage of the possibilities afforded by cytosine methylation to provide a heritable mechanism for altering DNA-protein interactions to assist in such silencing. Genes can be transcribed from methylation-free promoters even though adjacent transcribed and nontranscribed regions are extensively methylated. Gene promoters can be used and regulated while keeping noncoding DNA, including transposable elements, suppressed. Methylation is also used for long-term epigenetic silencing of X-linked and imprinted genes and can either increase or decrease the level of transcription, depending on whether the methylation inactivates a positive or negative regulatory element. ER -
global_01_local_0_shard_00002368_processed.jsonl/70680
Hyperledger Composer, the collaboration tool for building “blockchain business networks,” has been accepted into incubation by the Technical Steering Committee at Hyperledger. Hyperledger is an open source blockchain technologies organization. The project would like to work on Composer with the community in order to develop it into a powerful and complete development framework. According to Hyperledger, Composer “accelerates the development of smart contracts and their deployment across a distributed ledger.” The project has been designed so it can be ported to run on Hyperledger Iroha or Hyperledger Sawtooth, as well as other distributed ledger technologies. The reason is, these blockchain business networks share elements like assets, participants, identities, transactions, and registries. Existing blockchain or distributed ledger technologies can be difficult for organizations who want to build use cases and map these concepts into running code, according to Hyperledger in a blog. In the same way that the software world was accelerated by the arrival of software modelling tools, the primary goal of the Composer project is to accelerate the development of business networks built on blockchain technology,” reads the blog. The main components of Composer include a simple but expressive business-centric modelling language, which supports modelling of relationships and data validation rules. Composer also has the ability to encode business logic as transaction process functions, written in standard JavaScript, according to Hyperledger. Composer also includes a web based “playground” for users to learn the language and model their business network; REST API support and integration capabilities; declarative access control using access control lists; and application generation using the Yeoman framework. Going forward, the initial maintainer community consists of IBM professionals (Simon Stone, Daniel Selman, and Kathryn Harrison), Cong Tang and others from Oxchains. Developers and new users can contribute and check out the project, which is hosted under the Hyperledger organization on GitHub.
global_01_local_0_shard_00002368_processed.jsonl/70713
Skip to Content Customer Rating(0 ratings) Review This Product Benzoin, Organic (Styrax tonkinensis) Laos Benzoin (organic) Styrax tonkinensis in organic ethanol Origin: Laos Part Used: Resin Extraction Method: Pure Benzoin is a solid resin at room temperature, our Benzoin is gently heated and combined with organic ethanol to render it more mobile. The dilution is 55% Organic Benzoin to 45% Organic Ethanol. Sweet, slightly musky, vanilla-like. Used frequently in perfumery. Body: Anti-inflammatory. Antiseptic. Astringent. Circulatory stimulant. Genito-urinary tonic. Lung tonic and expectorant. Wound healing. Mind: Sedative, calming and soothing. Relieves exhaustion. Spirit: Assuring to the spirit. Instills confidence. Supports individuals in releasing grief and worry. Lawless, Julia. The Encyclopedia of Essential Oils. London: Thorsons, 1992. Print. Rose, Jeanne. 375 Essential Oils and Hydrosols. Berkley: Frog, Ltd., 1999. Print. Sellar, Wanda. The Directory of Essential Oils. London: Random House, 2001. Print. Wildwood, Chrissie. The Encyclopedia of Aromatherapy. Rochester, Vermont: Healing Arts Press, 1996. Print.
global_01_local_0_shard_00002368_processed.jsonl/70723
Race me around the raspberries, until we twirl like the Damned, like hurricane nostalgia, and herds of pockets, slammed, ’til we buckle under senses, and we overthrow the Fates, like antiquated liquor, or plush, sword-enflamed gates. Let us run to sanguine grottos, where they worshipped on all fours, I will enshrine you in gold; idolize me on doors. Forget your vague, lacy lovers, forget your cavernous halls, come meet with me in sultry caves; in violent withdrawals, I am verse and agitation, you are shepherd most profound; We could be the ones to stop the world from turning ’round. 19 thoughts on “hide-and-seek 1. The first 2 lines are about the best I’ve ever read. I agree with Humans Are Weird – your poetry humbles us. Even when you follow forms, it’s incredibly organic – nothing constructed about it. 2. Pfft, your poetry sucks. (JUST KIDDING. It always make me feel inferior and I die a little on the inside whenever I read them, which is secretly making me resent you a little bit. Cause yes, I am that much of a narcissist, and cause yes, your writing is that fucking good *shakes fist*). 3. There is a sublime quality to your poems that make every “you” a personal appeal, free of the tired cliches of love-poetry. You converse. You are wonderful. Leave a Reply to Susan L Daniels Cancel reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
global_01_local_0_shard_00002368_processed.jsonl/70726
Thanks for visiting. I'm Silas. I'm a filmmaker and post-graduate student at The University of Oxford's Internet Institute. I am interested in human behaviour and the evolution of culture, particularly in an online context. As a filmmaker, I've written and directed both narrative and factual content. My first film, 'the sex lives of eels’ (2015) was produced in 100 hours as part of the Film-Racing competition, for which it received honorable mention. It has since been screened at the 'Vaults' film festival in London, and Melbourne's 'filmonik' festival. In 2016 myself and collaborator Luke Rollason were commissioned by the UK Arts Council to write and direct 'Surfing’, a 3 minute art film for Channel 4 Random Acts. The film went on to make official selection for the BAFTA-qualifying 'Aesthetica' short film festival, and was screened with the touring 'playback' film festival. In 2018 my short film 'GOLEM' won at the Earl's Court and New Forest Film Festivals, and was a finalist at the Oxford International Short Film Festival. With Angel Sharp Media I have also helped make two BBC Ideas documentaries. These focused on the spread and history of conspiracy theories, and the history of Icelandic Folklore. I have also produced commercial content for Greenpeace and the RAF.
global_01_local_0_shard_00002368_processed.jsonl/70728
Anton Praetorius From Wikipedia, the free encyclopedia Jump to navigation Jump to search Anton Praetorius (1560 in Lippstadt – 6 December 1613 near Heidelberg) was a German Calvinist pastor, theologian and writer. Life and writings[change | change source] Heidelberg Castle Wine Barrel Anton Praetorius was the son of Matthes Schulze. He later changed his name to Praetorius. Praetorius wrote a poem about the Heidelberg Wine Barrel in the Heidelberg Castle in city of Heidelberg in October 1595. In 1596 he worked as a pastor in the church in Birstein near Frankfurt am Main in Hesse. There Praetorius worked for a prince and wrote church songs and books of religion in the year 1597. Fight against the chase of witches[change | change source] Chase of Witches Praetorius fought against torture and against the hunting of witches. Some women were accused of being witches. People thought that witches can do harm to others. So these women were arrested and put in prison. Praetorius Bericht Zauberey 1602 In 1597 Anton Praetorius protested against the torture of women accused of witchcraft. File Birstein Witchcraft Trial 1597 Praetorius was so shocked about the torture of the accused woman that he demanded a stop. His protest was successful. In 1598 he wrote a book to protest against torture and the prosecution of witches. The book was published again in 1602, 1613 and in 1629. Praetorius described the terrible situation of the prisoners and protested against torture. Theological argument against witchcraft[change | change source] Praetorius was a Protestant minister. He believed that man can do either good or bad things. However, God chooses certain people to do certain things. Those things can be good or bad. According to Praetorius, witchcraft can only be a fall from the favour of God, and a pact with the devil. But, neither the devil nor sorcerers can do more than is in their nature (and predestination). God will punish those who are witches or sorcerers. This however, does not give human courts a right to put those to death, they believe are guilty of the crime of witchcraft. For Praetorius, witchcraft cannot exist, because it is beyond the faculties of either man or the devil. It is also against Nature. Bibliography (in German)[change | change source] • Hartmut Hegeler: Anton Praetorius, Kämpfer gegen Hexenprozesse und Folter, (fighter against the persecution of witches and against torture) Unna, 2002 • Hartmut Hegeler und Stefan Wiltschko: Anton Praetorius und das 1. Große Fass von Heidelberg, (the 1. Great Wine Barrel in the Castle of Heidelberg) Unna, 2003 • Anton Praetorius, De Sacrosanctis Sacramentis novi foederis Jesu Christi, Eine reformatorische Sakramentenlehre von 1602 über die hochheiligen Sakramente des Neuen Bundes Jesu Christi (teachings about the sacraments) Lateinische Originalschrift (the original writing in Latin with a translation into German, translated by Burghard Schmanck), herausgegeben und übersetzt von Burghard Schmanck, Bautz Verlag, Nordhausen 2010, ISBN 978-3-88309-550-9 Other websites[change | change source]