text stringlengths 1 22.8M |
|---|
Sainte-Marguerite-des-Loges () is a former commune in the Calvados department in the Normandy region in northwestern France. On 1 January 2016, it was merged into the new commune of Livarot-Pays-d'Auge.
Population
See also
Communes of the Calvados department
References
Former communes of Calvados (department)
Calvados communes articles needing translation from French Wikipedia |
Charles Riechelmann (RICK-le-man, born 26 April 1972) was a Tongan-born New Zealand rugby union player. He played for Auckland provincially, the Blues in the Super Rugby competition the All Blacks at international level as the first ever Tongan-born All Black. He played six test matches (in all cases as a reserve) for New Zealand in 1997, scoring three tries. He was part of the Blues 1996 and 1997 Super 12 winning teams.
In 2020 and 2021/22, he completed two seasons of Match Fit with Classic All Blacks. He was one of the most flexible members in the group in season 2.
References
External links
Living people
New Zealand international rugby union players
New Zealand rugby union players
Blues (Super Rugby) players
1969 births
Tongan emigrants to New Zealand
People educated at Auckland Grammar School
Rugby union locks |
The question of the properties and finances of the Church of England has been publicly raised in the twenty-first century because the corruption allegations, and declining number of regular parishioners in the United Kingdom cannot continue to finance the large amount of real estate controlled by the church.
Endowment
The Church of England has a large endowment of £8.7 billion which generates approximately £1 billion a year in income (2019), this is their largest source of revenue. The 2019 Financial report showed that the size of the endowment has been steady or growing slightly in recent years, delivering a return of 10% (2019). In recent years, efforts have been made to make the Church's investments more ethical, by divesting from major arms manufacturers and divesting all fossil fuel investments in 2020. The Church of England has been criticized in the past for investments in arms dealers, unethical loan companies and companies with poor environmental records – however, the Church of England is now committed to being a strong ethical investor.
The Church's Endowment fund is invested in a diversified portfolio across a broad range of asset classes. This includes a variety of equity investments in publicly listed and private companies as well as commercial/residential property and land.
Donations
The Church of England generates approximately £329 million from churchgoers' donations; this corresponds to approximately £15 per week per donor.
Government support
Donations comprise its largest source of income, though it also relies heavily on the income from its various endowments. In 2005 the Church of England had estimated total outgoings of around £900 million.
On 17 May 2012 the Church of England welcomed an agreement with the government over the future funding of alterations and repairs to its 12,500 listed buildings, providing an extra £30 million a year on top of the £12 million already granted by the government to the Church of England in the Listed Places of Worship Grant Scheme (LPWGS). The LPWGS provides grants for qualifying work to churches which are equal to the amount of VAT paid for that work, thus alleviating the burden of VAT on the cost of maintaining churches. There is no other government financial support for the Church of England.
Funding from parishes
Historically, individual parishes both raised and spent the vast majority of the church's funding, meaning that clergy pay depended on the wealth of the parish. The parish advowsons (the right to appoint clergy to particular parishes) could, therefore, become valuable gifts. Individual dioceses also held considerable assets: the Diocese of Durham possessed such vast wealth and temporal power that its bishop became known as a "Prince-Bishop". Since the mid-19th century, however, the church has made various moves to "equalise" the situation and clergy within each diocese now receive standard stipends paid from diocesan funds.
Church Commissioners
Meanwhile, the church moved the majority of its income-generating assets (which in the past included a great deal of land, but today mostly take the form of financial stocks and bonds) out of the hands of individual clergy and bishops to the care of a body called the Church Commissioners, which uses these funds to pay a range of non-parish expenses, including clergy pensions and the expenses of cathedrals and bishops' houses. These funds amount to around £8 billion and generate income of around £260 million each year (), around a fifth of the church's overall income.
Grants to local parishes
The Church Commissioners give some of this money as grants to local parishes to fund mission projects, but the majority of the financial burden of church upkeep and the work of local parishes still rests with individual parishes and dioceses, which meet their requirements from donations. Direct donations to the church (not including legacies) come to around £460 million per year, while parish and diocesan reserve funds generate another £100 million. Funds raised in individual parishes account for almost all of this money and the majority of it remains in the parish which raises it, meaning that the resources available to parishes still vary enormously according to the level of donations they can raise.
Quotas and parish shares
Most parishes, however, give a portion of their money to the diocese as a "quota" or "parish share". While this is not a compulsory payment, dioceses strongly encourage and rely on it being paid; it is usually only withheld by parishes either if they are unable to find the funds or as a specific act of protest. As well as paying central diocesan expenses such as the running of diocesan offices, these diocesan funds also provide clergy pay and housing expenses (which total around £260 million per year across all dioceses), meaning that clergy living conditions no longer depend on parish-specific fundraising.
13,000 Anglican parishes
Although asset-rich, the Church of England has to maintain its thousands of churches nationwide. The Church of England has some 16,000 church buildings, in 13,000 parishes covering the whole of England, as well as 43 cathedrals. Together they form a unique collection of buildings; between 12,000 and 13,000 churches are listed, i.e. are recognised by the government as being of exceptional historic or architectural importance. About 45% of all Grade I buildings in England are churches. Though first and foremost a place of worship, churches are also often the oldest building in a settlement still in continual use. Even in industrial or 20th century settlements, they are a focus.
Problems at maintaining economic self-sufficiency
Many churches and cathedrals particularly are the largest, most architecturally complex, most archaeologically sensitive and most visited building in their village, town or city. As current congregation numbers stand at relatively low levels and as maintenance bills increase as the buildings grow older, many of these churches cannot maintain economic self-sufficiency but their historical and architectural importance make it difficult to sell them. In the twenty-first century, cathedrals and other famous churches have met some of their maintenance costs with grants from organisations such as English Heritage, but congregations and local fundraisers must pay the entire bill for most small parish churches.
Ancillary buildings
In addition to consecrated buildings, the Church of England also controls numerous ancillary buildings attached to or associated with churches, including a good deal of clergy housing. As well as vicarages and rectories, this housing includes residences (often called "palaces") for each of the church's 43 diocesan bishops. In some cases, this name seems entirely apt; buildings such as the Archbishop of Canterbury's Lambeth Palace in London and the Old Palace at Canterbury have truly palatial dimensions, while the Bishop of Durham's Auckland Castle has 50 rooms, a banqueting hall and 30 acres (120,000 m²) of parkland. However, many bishops have found the older palaces inappropriate for today's lifestyles and some "palaces" are ordinary four bedroomed houses. Many dioceses which have retained large palaces now employ part of the space as administrative offices, while the bishops and their families live in a small apartment within the palace.
Palaces turned into conference centres
In recent years some dioceses have managed to put their palaces' excess space and grandeur to profitable use as conference centres. All three of the more grand bishop's palaces mentioned above Lambeth Palace, the Old Palace and Auckland Castle serve as offices for church administration and conference venues and only in a lesser degree as the personal residence of a bishop. The size of the bishops' households has shrunk dramatically and their budgets for entertaining and staff form a tiny fraction of the levels before the 20th century.
See also
Churches' Mutual Credit Union
References
Church of England ecclesiastical polity
Economy and Christianity
Church architecture
Architecture in England |
The Libyan Project Management Association (LYPMA) is a Libyan non-profit society for project managers, and specialists involved in the project management industry. The head office for LYPMA is located in Elkish, in the city of Benghazi.
References
External links
Official blog
Organizations based in Libya
Project management professional associations |
```turing
$ cat > dune-project << EOF
> (lang dune 3.8)
> EOF
$ cat > dune << EOF
> (test
> (name t)
> (build_if true))
> EOF
$ touch t.ml
$ dune build
File "dune", line 3, characters 1-16:
3 | (build_if true))
^^^^^^^^^^^^^^^
Error: 'build_if' is only available since version 3.9 of the dune language.
Please update your dune-project file to have (lang dune 3.9).
[1]
$ cat > dune-project << EOF
> (lang dune 3.9)
> EOF
$ dune build
``` |
Michel Macedo (born 23 September 1998) is a Brazilian alpine skier competing collegiately for Middlebury College. He competed in the 2018 Winter Olympics. On 17 February 2019, he had the best-result-ever by a Brazilian Alpine athlete with a 27.97 performance on the FIS Points List at the Dartmouth Carnival university race in New Hampshire (USA), according to the Brazilian Confederation of Snow Sports. He qualified to represent Brazil at the 2022 Winter Olympics. Macedo was unable to compete in the Men's Giant Slalom due to contracting COVID-19.
Olympic Results
2018
2022
References
1998 births
Living people
Sportspeople from Fortaleza
Alpine skiers at the 2018 Winter Olympics
Alpine skiers at the 2022 Winter Olympics
Brazilian male alpine skiers
Olympic alpine skiers for Brazil
Alpine skiers at the 2016 Winter Youth Olympics
Middlebury College alumni
Middlebury Panthers athletes
Middlebury College |
Claudia Vázquez Lippi (born 2 November 1990) is a Puerto Rican retired footballer who has played as a forward and a midfielder. She has been a member of the Puerto Rico women's national team.
Early and personal life
Vázquez was raised in Belford, New Jersey.
References
External links
1990 births
Living people
Middletown High School North alumni
Women's association football forwards
Women's association football midfielders
Puerto Rican women's footballers
Puerto Rico women's international footballers
Competitors at the 2010 Central American and Caribbean Games
Puerto Rican people of Italian descent
Soccer players from Monmouth County, New Jersey
People from Middletown Township, New Jersey
Puerto Rican sportspeople
Monmouth Hawks women's soccer players |
CREDO Mobile (formerly Working Assets Wireless) is an American mobile virtual network operator headquartered in San Francisco, California. CREDO Mobile's mobile network operator is Verizon Wireless.
History
Working Assets was founded by Peter Barnes, Michael Kieschnick and Laura Scher in 1985 in San Francisco, as a business that would use its revenues to fund progressive social change work. Each time their customers use its services—mobile, long distance or credit card—WA would automatically send a donation to progressive nonprofit groups. To date it has raised more than $87 million for groups like Planned Parenthood, Rainforest Action Network and Oxfam America.
Credit cards
Working Assets's initial product was a credit card that generated donations to progressive nonprofit groups every time the card was used. Soon, the company introduced a ballot process for its customers to vote on how to distribute the money raised among nonprofit groups. The ballot is still used today.
Long-distance phone service
In 1991, the company launched long-distance phone service, promoting the fact that it would donate 1% of its customer charges to nonprofit groups. It also featured political actions in the customers' monthly bills, urging them to make free calls to elected officials. And it let customers pay for "CitizenLetters" to be sent in their name to the officials. By 1993, these actions included calling for a single-payer healthcare system and for allowing gays in the military.
Mobile phone service
The company started its mobile phone service as a Mobile Virtual Network Operator (MVNO) using the Sprint Nextel network in 2000. It also launched an activist website called Act for Change (now CREDO Action) in that same year. In 2016, the mobile phone service became a MVNO using the Verizon Wireless network, switching from the Sprint Nextel network.
Name change
In November 2007, Working Assets Wireless announced that it was changing its name to CREDO Mobile to better reflect the company's values: A belief that people, through donations to nonprofits and political activism, can effect progressive change. The names of its phone services were changed to CREDO mobile and CREDO Long Distance. However, its credit card is still called the Working Assets Credit Card.
Environmental policy
In keeping with its commitment to protect the environment, the company offers free phone recycling, prints its bills on 100% post-consumer recycled paper, and offsets its electricity and shipping costs through Carbonfund.org's "carbon-free" program. CREDO plants 100 trees for every ton of paper it uses (enough to generate another ton) and it has donated more than $15 million to environmental groups in the US and abroad.
In 2009, CREDO Mobile was recognized by the nonprofit Planning and Conservation League as the Environmental Business of the Year.
Political activism
CREDO Mobile's mission of social change takes the form of two primary activities: its donations to progressive nonprofits, and its CREDO Action activist arm.
Donations to nonprofit groups
Donations from its credit card, long-distance and mobile customers cumulatively total more than $80 million since 1985. In 2015, the company said that "CREDO and its members have raised over $3 million for Planned Parenthood, making us Planned Parenthood's largest corporate donor." Other major recipients of donations include the ACLU, Doctors Without Borders, Rainforest Action Network, 350.org, and Amnesty International.
Each year, the company selects dozens of nonprofit groups in five broad issue areas: civil rights, economic and social justice, environment, peace and international freedom, and voting rights and civic participation. And each year, the company asks its customers ("members" in the company's parlance) to vote on how to distribute the money it raises among the groups.
One criticism of CREDO Mobile is that the organization only donates about 1% of each customer's bill.
In 2018, CREDO Mobile donated $4000 to the initial Strong Arm Press crowdfunding drive. This press, a small imprint started in 2018 by The Intercept editor Ryan Grim and HuffPost editor Alex Lawson, placed CREDO's logo on the back cover of its first six books.
CREDO Action
Credo Mobile also has created an online network of more than 3 million activists who take actions both online and offline. On its website, the company states:
During the build-up to the 2003 invasion of Iraq, the company opposed it and worked with MoveOn.org and True Majority to take out a full-page advertisement in The New York Times against the US-led invasion. In 2004, it launched an "election protection" program and donated more than $1 million to groups working to register voters and increase turnout on Election Day.
Credo Mobile has been a vocal opponent of both the Afghanistan War of 2001 and the Iraq War that began in 2003, and it mobilized against the invasions and later to push for withdrawal of US troops from both countries. This partly led in 2009 to Fast Company magazine including CREDO in its top five "brave brands".
Among its environmental activism, the company has focused on moving away from fossil fuels and toward supporting renewable sources. As such, it has campaigned relentlessly against coal power, natural gas fracking, and more recently, against the proposed Keystone XL pipeline.
To increase voter turnout in the United States presidential election of 2008, CREDO Action started an initiative called Pollworkers for Democracy, which paid individuals to staff polling places and ensure fair voting practices. For their Text Out the Vote campaign, CREDO invited users to enter friends' phone numbers to text them each a reminder to vote on election day.
Several U.S. states approved CREDO's online voter-registration tool. At CREDO's GoVote.org website, voters could look up their nearest polling place.
CREDO's political activism includes a wide range of issues – from favoring marriage equality, women's rights, food safety and increased prosecution of fraud and crimes on Wall Street, to opposing corporate money in politics, especially in the aftermath of the US Supreme Court's decision in Citizens United v. FEC.
CREDO SuperPAC
In 2012, the company launched the "CREDO SuperPAC", not to support candidates but to oppose them. Becky Bond, CREDO Mobile's Vice President and Political Director, served as President of the CREDO SuperPAC. Unlike other corporate superPACs, CREDO SuperPAC focused more on grassroots, volunteer-driven activism than on buying television advertisements. Its stated aim was to defeat candidates affiliated with the Tea Party movement, running for re-election to the US House of Representatives. Its campaign, dubbed "Take Down the Tea Party Ten", helped to defeat 5 of the candidates: Allen West, Frank Guinta, Joe Walsh, Chip Cravaack and Dan Lungren.
In 2014, the CREDO SuperPAC planned to use the same grassroots, volunteer-driven activism to help candidates of the US Democratic Party in five Senate elections. By aiming to flip Republican-held seats in Georgia and Kentucky, while maintaining Democratic-held seats in Michigan, Colorado and North Carolina, CREDO hoped to "save the Senate" from a Republican takeover.
Influence
Another company, Patriot Mobile, was begun in part to provide a conservative alternative to Credo.
References
1985 establishments in California
American companies established in 1985
Mobile virtual network operators
Companies based in San Francisco
Progressivism in the United States |
Leanne Johnston is a Canadian hiker, who currently holds the woman's time record on the Grouse Grind race that takes place every year on Grouse Mountain. Her 2007 time was 31:04. Johnston finished the 2006 BMO Bank of Montreal Grouse Grind Mountain Run with a time of 33 minutes and 47 seconds.
References
External links
Summer on Grouse Mountain
Year of birth missing (living people)
Living people
Sportspeople from Regina, Saskatchewan
People from North Vancouver
Hikers
Canadian sportswomen |
```javascript
/**
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
'use strict';
// MODULES //
var isRowMajor = require( '@stdlib/ndarray/base/assert/is-row-major' );
var sfill = require( '@stdlib/blas/ext/base/sfill' ).ndarray;
var sscal = require( '@stdlib/blas/base/sscal' ).ndarray;
var f32 = require( '@stdlib/number/float64/base/to-float32' );
// MAIN //
/**
* Performs one of the matrix-vector operations `y = *A*x + *y` or `y = *A^T*x + *y`, where `` and `` are scalars, `x` and `y` are vectors, and `A` is an `M` by `N` matrix.
*
* @private
* @param {string} trans - specifies whether `A` should be transposed, conjugate-transposed, or not transposed
* @param {NonNegativeInteger} M - number of rows in the matrix `A`
* @param {NonNegativeInteger} N - number of columns in the matrix `A`
* @param {number} alpha - scalar constant
* @param {Float32Array} A - input matrix
* @param {integer} strideA1 - stride of the first dimension of `A`
* @param {integer} strideA2 - stride of the second dimension of `A`
* @param {NonNegativeInteger} offsetA - starting index for `A`
* @param {Float32Array} x - first input vector
* @param {integer} strideX - `x` stride length
* @param {NonNegativeInteger} offsetX - starting index for `x`
* @param {number} beta - scalar constant
* @param {Float32Array} y - second input vector
* @param {integer} strideY - `y` stride length
* @param {NonNegativeInteger} offsetY - starting index for `y`
* @returns {Float32Array} `y`
*
* @example
* var Float32Array = require( '@stdlib/array/float32' );
*
* var A = new Float32Array( [ 1.0, 2.0, 3.0, 4.0, 5.0, 6.0 ] );
* var x = new Float32Array( [ 1.0, 1.0, 1.0 ] );
* var y = new Float32Array( [ 1.0, 1.0 ] );
*
* sgemv( 'no-transpose', 2, 3, 1.0, A, 3, 1, 0, x, 1, 0, 1.0, y, 1, 0 );
* // y => <Float32Array>[ 7.0, 16.0 ]
*/
function sgemv( trans, M, N, alpha, A, strideA1, strideA2, offsetA, x, strideX, offsetX, beta, y, strideY, offsetY ) { // eslint-disable-line max-params, max-len
var isrm;
var xlen;
var ylen;
var tmp;
var ix1;
var iy1;
var sa0;
var sa1;
var i1;
var i0;
var oa;
// Note on variable naming convention: sa#, ix#, i# where # corresponds to the loop number, with `0` being the innermost loop...
isrm = isRowMajor( [ strideA1, strideA2 ] );
if ( isrm ) {
// For row-major matrices, the last dimension has the fastest changing index...
sa0 = strideA2; // stride for innermost loop
sa1 = strideA1; // stride for outermost loop
} else { // isColMajor
// For column-major matrices, the first dimension has the fastest changing index...
sa0 = strideA1; // stride for innermost loop
sa1 = strideA2; // stride for outermost loop
}
if ( trans === 'no-transpose' ) {
xlen = N;
ylen = M;
} else {
xlen = M;
ylen = N;
}
// y = beta*y
if ( beta !== 1.0 ) {
if ( beta === 0.0 ) {
sfill( ylen, 0.0, y, strideY, offsetY );
} else {
sscal( ylen, beta, y, strideY, offsetY );
}
}
if ( alpha === 0.0 ) {
return y;
}
// Form: y = *A*x + y
if (
( !isrm && trans === 'no-transpose' ) ||
( isrm && trans !== 'no-transpose' )
) {
ix1 = offsetX;
for ( i1 = 0; i1 < xlen; i1++ ) {
tmp = f32( alpha * x[ ix1 ] );
oa = offsetA + (sa1*i1);
iy1 = offsetY;
for ( i0 = 0; i0 < ylen; i0++ ) {
y[ iy1 ] += f32( A[ oa+(sa0*i0) ] * tmp );
iy1 += strideY;
}
ix1 += strideX;
}
return y;
}
// Form: y = *A^T*x + y
// ( !isrm && trans !== 'no-transpose' ) || ( isrm && trans === 'no-transpose' )
iy1 = offsetY;
for ( i1 = 0; i1 < ylen; i1++ ) {
tmp = 0.0;
ix1 = offsetX;
oa = offsetA + (sa1*i1);
for ( i0 = 0; i0 < xlen; i0++ ) {
tmp += f32( A[ oa+(sa0*i0) ] * x[ ix1 ] );
ix1 += strideX;
}
y[ iy1 ] += f32( alpha * tmp );
iy1 += strideY;
}
return y;
}
// EXPORTS //
module.exports = sgemv;
``` |
Christopher Joshua Martin Piña (born July 5, 1986) is an American professional boxer in the Super Bantamweight division and is the current WBO NABO Super Bantamweight Champion.
Professional career
In August 2010, Martin upset an undefeated Christopher Avalos at the Grand Casino in Hinckley, Minnesota. The bout was televised on a Showtime undercard.
In May 2011, Christopher again won an upset, this time over contender Charles Huerta to win the vacant WBO NABO Super Bantamweight Championship. This bout was the main-event of a TeleFutura boxing card.
References
External links
American boxers of Mexican descent
Super-bantamweight boxers
1986 births
Living people
American male boxers
Boxers from San Diego |
Șantaj (Blackmail) is a Romanian film from 1981, screening of the novel Omul de la capătul firului by Rodica Ojog-Brașoveanu, directed by Geo Saizescu. The film stars Ileana Stana-Ionescu, Sebastian Papaiani, and Silviu Stănculescu in leading roles.
Plot
A gang of forgers falsifying university degrees selects their clients from among young talented people, whom they help distinguish themselves, so that later, through blackmail, they can snatch their production secrets. However, Minerva Tutovan, a former math teacher turned major, manages to trick the gang, exposing their destructive tactics.
Full cast
References
1980s Romanian-language films |
Following ships of the Indian Navy have been named Brahmaputra:
INS Brahmaputra (F31) (1957) was a Type 41, ordered for the Royal Navy as HMS Panther but transferred to India and renamed Brahmaputra before launching in 1957, commissioned in 1958. She was scrapped in 1986
INS Brahmaputra (F31) (1994) is a commissioned in 2000
Indian Navy ship names |
Saint George is an unincorporated community in Greene County, Virginia, United States.
Saint George is home to the Blue Ridge School.
References
GNIS reference
Unincorporated communities in Greene County, Virginia
Unincorporated communities in Virginia |
Acharya Shri Mahapragya ( Ācārya mahapragya)(14 June 1920 – 9 May 2010) was the tenth head of the Svetambar Terapanth order of Jainism. Mahapragya was a saint, yogi, spiritual leader, philosopher, author, orator, and poet.
He began his life of religious reflection and development as a Jain monk at the age of ten. Mahapragya played a major role in Anuvrat movement launched by his Guru Acharya Tulsi in 1949, and became the acknowledged leader of the movement in 1995. Acharya Mahapragya formulated the well organized Preksha meditation system in the 1970s, and developed the "Science of Living" education system which is a practical approach for the balanced development of a student and his character building.
He traversed more than 100,000 km on foot covering more than 10,000 villages reaching out to the masses spreading the message of harmony and peace. He walked across the length and breadth of India, from Kutch district in Gujarat to Kolkata and from Punjab to Kanyakumari. Mahapragya undertook this travel under the leadership of Acharya Tulsi and later with himself being the leader. During these travels, he addressed thousands of public meetings. Mahapragya, an apostle of nonviolence, launched the Ahimsa Yatra movement in 2001 which continued until 2009 to promote non-violence and harmony.
Biography
Early life
Mahapragya was born to Tola Ram Choraria and Baluji in the small village of Tamkor in Rajasthan. It was a Jain Shwetambar Terapanthi Oswal family. He was called Nathmal by his family. He lost his father when he was just two and half months old. It was an extended family and he gained support from all the family members. Nathmal's mother was very affectionate for the child and took care with his upbringing. There was no formal school in Tamkor village in those days and he did not receive a formal education. He nonetheless had lessons on letters and mathematics tables from local teacher(s). Mahapragya's mother was a religious lady who devoted her spare time to spiritual matters. She also used to recite religious songs which made an imprint on the young child. Her spirituality inspired him.
Mahapragya received lessons on philosophy from Jain monks who visited the village. Eventually he conveyed to his mother his wish to be initiated into monkhood. On 29 January 1931, he became a monk at the age of ten. Acharya Kalugani, eighth Acharya of Jain Swetambar Terapanth initiated him to monkhood in the town of Sardarsahar (Rajasthan). With this, Nathmal became Muni Nathmal. Acharya Kalugani arranged for Muni Nathmal's studies under Muni Tulsi's classes, who later became the Ninth Acharya. Nathmal started getting lessons in the monastery on various subjects of Jain philosophy.
With Muni Tulsi, the child's intellectual development accelerated and he memorised thousands of sermons and verses in Hindi, Sanskrit, Prakrit, and Rajasthani. His education at the monastery included history, philosophy, logic, and grammar. He made an in-depth study of Jain scriptures, became a scholar of Jain Agamas, and a critic of Indian and western philosophy. By the age of 22, he was competent in Hindi, Sanskrit, Prakrit, and Rajasthani languages and literature. In Sanskrit, he was also an expert impromptu or extempore poet and demonstrated this skill in many gatherings of intellectuals. He also studied physics, biology, ayurved, politics, economics, and sociology.
Spiritual endeavors (1945–1978)
Anuvrat movement
Mahapragya played an instrumental role in the Anuvrat movement launched on 2 March 1949 by his guru and the head of Jain Shwetambra Terapanth, Acharya Tulsi. The ultimate aim of the movement was and remains to create a nonviolent socio-political world order with the help of a worldwide network of self-transformed people. Since its inception it has inspired millions of people to practice purity and self-discipline in their personal lpreparation of the contents of Anuvrat and worked as a core member in the movement, many times representing Acharya Tulsi by explaining the principles of Anuvrat.
Acharya Shri Tulsi nominated Muni Nathmal as the Secretary (Nikaya Sachiv) of Terapanth in 1965 at Hissar, Haryana, after being Group leader (Agraganya) for almost 21 years.
Agam research and editing
After consulting Mahapragya, Acharya Tulsi decided to start the research, translation and annotation of the Jain Agamas. The work started in 1955 in Ujjain under the leadership of Acharya Tulsi with Mahapragya being the editorial director. Joint activity of Acharya Tulsi, Mahapragya and other intellectual monks and nuns began to facilitate the permanent preservation of many thousands of years old canonical scriptures. This old literature is in Prakrit language and its commentaries are either available in Prakrit or Prakrit mixed with Sanskrit. The original text of the thirty-two Agam scriptures was determined and their Hindi translation also completed. Detailed commentaries thereon made them more interesting and comprehensible. This task carried out in accordance with the verbal renderings by Acharya Tulsi was guided by an entirely non-sectarian and open mind and is therefore viewed with respect by the heads of other sects as well as intellectual and oriental scholars of the East and the West. Acharang Bhasyam is Mahapragya's commentary for Acharang in sanskrit. He uncovered many Agam mysteries and presented root philosophies and Mahavira's philosophy and vision in this commentary.
Formulation of Preksha Meditation System
While in his late twenties, Mahapragya started to realize the wonders of meditation. He was open to experiment with spiritual techniques. He discussed his discoveries with Acharya Tulsi and thereafter Mahapragya started dedicating more time to meditation practices. He exercised deep practice of meditation and experimented with various techniques. He made a deep research of Jain Agamas, ancient scriptures, Yoga science, Biology, Modern Physics, Naturopathy, and Ayurveda, etc. After a deep practice for over 20 years, he formulated the Preksha meditation system in 1975. He formulated the meditation system in a very well organized and scientific way. The basic four wings of the meditation system can be summarized as – Meditation, Yogasana and Pranaayam, Mantra, and therapy.
Before presenting Preksha meditation in formal training camps, Mahapragya made a special practice of meditation and spiritual exertion for a period of nine months which started on 3 March 1977. The First formal Preksha meditation camp was organized later in 1977.
Since that time Acharya Mahapragya had conducted hundreds of camps for training in Preksha meditation. Many Preksha Meditation centers are operative across the globe. Research, detail training, and studies on Preksha Meditation is an important activity at Jain Vishva Bharati University.
Science of Living Education System
Science of Living education system is an effort to implement value-based education and moral education. Its goal and approach is overall development of student and not simply just the intellectual development. Mere intellectual development can't help in building real experience and character of the student. It aims for a balanced emotional, intellectual and physical development. It gives more emphasis on practical training as compared to mere philosophy. The model includes Yoga, Pranayam, Postures, Meditation, contemplation techniques, etc. Scientific techniques of Science of Living helps in balancing the emotions of the student. It helps in balanced functioning of the neuro-endocrine system in body. It works for the transformation of emotions, inculcate positive attitude and integrated development of personality.
Acharya Mahapragya conceived the idea of 'Science of Living' on 28 December 1979 at Jain Vishva Bharati, Ladnun, Rajasthan. Mahapragya developed the Science of Living education system model. Many camps were conducted for the teachers of Nagore district, Rajasthan. Science of Living started getting positive reception from ministry of education and various educational society. Rajasthan ministry of education facilitated the training of teachers and camps were started. Some people started research in this field. Few schools were selected to start implementation of Science of Living. After one year of its implementation in schools, the results were surprising and very positive for students. It started getting wider acceptance with education ministry of Indian Government and state governments. Many schools started including it in their curriculum.
Science of Living got very positive feedback from teachers, student and parents on the student's emotional and overall development as such. Some of the feedback can be summarized as reduce in stress, improved efficiency in studies, better concentration and memory, better anger management, etc.
Successor to Acharya Tulsi
Impressed by Muni Nathmal (later Mahapragya), Acharya Tulsi honored him with the qualitative epithet of Mahapragya (highly knowledged) on 12 November 1978.
On 4 February 1979, his appellation 'Mahapragya' was converted into his new name by Acharya Tulsi and he was also made 'Yuvacharya', successor designate to the present Acharya, the second highest position after the Acharya himself. With this elevation, he was now referred as Yuvacharya Mahapragya. As a Yuvacharya , Mahapragya became a close associate of Acharya Tulsi in major decisions and activities related to the sect.
In a public meeting on 18 February 1994, Acharya Tulsi declared that Mahapragya would now have the title of 'Acharya' also and that the former was renouncing this position forthwith. Subsequently, on 5 February 1995, Mahapragya was formally consecrated as the 10th Acharya – the supreme head – of the Terapanth religious order in a public meeting in Delhi. Having been elevated within Terapanth, Mahapragya received many responsibilities. Further intensification of the movements of Anuvrat, Preksha dhyan, and Jeevan Vigyan now became his primary concern. A Vikash Parishad – development council – has been constituted by Mahapragya to give further fillip to all these movements and underline their importance.
Jain Vishva Bharati University
Acharya Mahapragya played a key role in the conception and establishment of Jain Vishva Bharati University, Ladnun, Rajasthan . It was established under the spiritual patronage of Acharya Tulsi in 1991. Acharya Mahapragya served as head of this university since 1995. The university's objective is to revive truths and values hidden in the ancient Indian traditions in general and in the Jain tradition in particular. It provides platforms and infrastructures for doing research in various subjects and for the pursuance of doctorate degrees. One of the prime objectives of this university is to spread literacy in subjects like nonviolence and peace, Jainology, Sanskrit, Prakrit, yoga, meditation, and literature. Regular degree courses leading to bachelor's and master's degrees are presently being conducted.
Ahimsa Yatra (2001–2009)
The world's problems touched Acharya Mahapragya deeply. In response, he came up with the solution of Ahimsa Yatra, a journey on foot to advance the cause of non-violence, was launched by Mahapragya 5 December 2001 at Sujangarh in Rajasthan. With Ahimsa Yatra, Acharyaji's mission is to train and spread nonviolence and its broad perspective to people. It is an endeavor to awaken a new faith in the infinite power of nonviolence. It aims at bringing the problems of all forms of violence into sharp focus. Its mission is to provide training for transforming the negative thoughts/emotions into positive direction. The spiritual aspect of non-violence training is to ignite the consciousness of non-violence and to cultivate the values of non-violence. And its practical aspect is the employment training for livelihood.
Having eschewed violence and pledged to refrain from killing innocent creatures; political leaders, social workers, and spiritual leaders came to him for advice. He took his Yatra from Rajasthan to Gujarat, Maharashtra, Daman, Madhya Pradesh, Haryana, Delhi, some parts of Uttar Pradesh, Punjab, and Chandigarh. He passed through 87 districts of India, and covered more than 2400 villages, towns and cities, where he held meetings with many spiritual and political leaders and appealed for communal harmony. Approximately 40,000 volunteers were assigned to various responsibilities in their local areas.
This Yatra allowed him to come into direct contact with farmers and common and poor people of the villages which he visited. He stopped at all the small villages on his route and held open mass meetings. Through this public speaking, Acharyaji created awareness on the broad perspectives of nonviolence, unemployment eradication, leading a life free from drug addiction, bad habits, communal harmony, healthy living, and harmonious social and personal lives. Side by side volunteers spread out in different directions in order to establish personal contact with families afflicted by drug addictions, unemployment, and stress. These volunteers were then to stay behind in order to help solve the afflicted's problems. Verily the villages and towns trekked by the Acharya become centres of training in ahimsa.
The Yatra concluded 4 January 2009 at Sujangarh, the same place where it had been begun.
FUREC
President of India, Dr. A P J Abdul Kalam's vision for a fully developed beautiful India with prosperous and harmonious life for its citizens, especially the youth, motivated enlightened spiritual and religious leaders who organized a Conclave under the aegis of Acharya Mahapragya at Surat on 15 October 2003, also the birthday of Dr. A.P.J. Abdul Kalam. The Action Plan discussed during the Conclave was documented and is known as 'Surat Spiritual Declaration' (SSD).
The SSD Action Plan envisages "Five Garland Projects". The emphasis of four projects was on celebration of inter religious festivals, multi religious projects, healthcare, and employment, imbibing value based education in schools and encouraging interfaith dialogue among religious/spiritual heads. In order to pursue these in a sustained manner and to coordinate all activities, a national level independent and autonomous organization managed by religious/ spiritual leaders as well as scholars and enlightened Citizens was set up. This organization was named "Foundation for Unity of Religious and Enlightened Citizenship' (FUREC). FUREC was launched by the president Dr. A P J Abdul Kalam on the birthday of Acharya Mahapragya, 15 June 2004 at Rashtrapati Bhavan, New Delhi.
FUREC combines the objectives of the Surat Spiritual Declaration and president Dr. A P J Abdul Kalam's Vision 2020 and is a non-profit organization which was founded by 15 spiritual leaders.
Spiritual practices
Meditation
Mahapragya himself is a great practitioner of meditation. He has also written extensively on these topics. He started practicing mantra and meditation with his initiation to monkhood. In his twenties he started delving deeper into meditation and realized his profound interest for it. He used to practice it for hours and hours. His experience of meditation resulted in formulation of Preksha meditation system.
He also practiced Mantra chanting daily and became a Mantra expert with rich experience in it. He said from his experiences, the practice of Mantra can help people in awaking their hidden powers. Mahapragya used to practice Yogasana, Pranayama to keep himself fit. Mahapragya observed silence (Mauna) for more than three hours during the evening hours. Mahapragya used to be very conscious of his daily activity and meditative during all his activities like walking, eating, etc.
Disciplines of monkhood
Mahapragya took five major vows as a part of initiation to monkhood at the age of ten. These Mahavrata are non-violence (Ahimsa), truth (Satya), non-stealing (Asteya), Chastity/Celibacy (Brahmacharya), and non-possession/non-attachment (Aparigraha). As a Jain Muni (monk), he traveled only on foot and could not make use of a vehicle unless and until he was incapable of walking. He did not eat or drink after sunset and before sunrise. He did not cook food but had to go out for alms. He accepted only vegetarian food. He did not own a house. He could not stay in a single place for long periods. He constantly had to change places and could only move into a house with the owner's permission. He did not possess any thing except for few basic items like clothes and a bowl for alms.
Writing
Mahapragya started writing when he was 22 and did not cease until his death. He authored more than 300 books. These works deal with meditation and spirituality, the mind, the human psyche and its traits, the roots of emotions and their manifestation through behaviour, Mantra saadhana, Yoga, Anekantavada, Non violence, and Jain philosophy and history.. His main achievement was in bringing together the Jain concepts of karma and human behavior with the findings of modern biology in areas such as genetics, DNA, hormones and the endocrine system.
In his book Art of Thinking Positive
', he explored the root causes of negative thoughts and provided a methodology for its transformation. Some other book titles include Towards Inner Harmony, I and Mine, Mind beyond Mind, Mysteries of Mind, New Man New World, Mirror of Self.
Mahapragya formulated Preksha meditation and wrote extensively on this topic. In these books he described various techniques of meditations and their effects on the psyche, physiology, hormonal influences, the endocrine system, and the nervous system.
He has done extensive work on Anekantavada, the philosophy of non-absolutism and relativity. He was a practitioner of this philosophy propounded by Lord Mahaveer which affirms that there is no problem that cannot be resolved with the application of Anekantavada. He showed ways how one can improve his thought process with Anekaant and use it for a peaceful life and co-existence. His book Anekanta The Third Eye discusses the details of the philosophy.
He has written many books on Jain Philosophy providing a serious material on Jain beliefs and vision. Jain darshan: manan and mimaansha is one of these creations and a research work in which Acharya Mahapragya elaborated numerous deep facets of the Jain belief system via a detailed interpretation. Another precise work is Philosophical Foundations of Jainism. Shraman Mahaveer is biographical work on Mahaveer. Mahapragya tried to depict Mahaveer through his experience and achievements in meditation. Sambodhi is a rhymic conservation between Lord Mahaveer and the prince-monk Megha Kumar, in which Mahaveer enlightens the later. Mahapragya wrote extensively on the lives and philosophies of Acharya Bhiksu and Acharya Tulsi.
Mahapragya made great contributions to Sanskrit through his poetry. He also wrote poems and bhajans in Hindi. Ashruvina, Mukulam in Sanskrit and Rishabhayana in Hindi are some of his poetic creations.
Acharya Mahapragya wrote with great clarity. His sentences are short and his style was direct. He only suggested, he never forced his view. He may have asserted his belief, but his language is conscious of relativity even in expression. He often resorted to the passive voice. As one of his translator's once said "Between one full stop and the next sentence, a kingdom can be built".
Views
Stand on religion
Acharya Mahapragya says,
"The religion which does not bring about a change in a man's life, which does not impart peace to him, deserves to be thrown into the river Ganges rather than carried on as burden on one's shoulders. Rituals or idol worship alone are not enough unless one's conduct also gets transformed. Religion is not confined only to temples, mosques, or churches, but extends to the man's day-to-day living as well."
"I believe in that religion which has moral values at its foundation and spirituality at its peak. I don't believe in that religion that doesn't have moral values and spirituality. I accepted that religion which made me physically, mentally, emotionally healthy. Religion is beyond rituals. Religion has the ability to solve our problems if you believe in pure religion."
Influence
P M Modi said:
"Acharya Mahapragya Ji gave the mantra of healthy individual, healthy society, healthy economy: PM Modi"
"Acharya Mahapragya Ji used to say that if you leave 'me' and 'mine' then everything will be yours. His mantra, his philosophy was also clearly visible in his life: PM"
"As much as Acharya Mahapragya Ji has written about spirituality, with an equally broad vision he wrote on subjects like philosophy, politics, psychology and economic: PM Modi".Rashtrakavi'' (National poet) Ram Dhari Singh Dinkar said
"Mahapragya is a Modern Vivekananda. We have not seen Vivekananda, only heard and read about him. But now we can see Vivekananda through his Vision".
Indian Prime Minister Atal Bihari Vajpayee has often stated:
"I am a lover of Mahapragya’s literature". The Eminent Scholar of Philosophy, Dr. Daya Krishna has recognized Acharya Shri Mahapragya as the most knowledgeable person on the subject of Jain Logic.
The famous Bangla writer Shri Bimal Mitra said:
"I find new truth in Mahapragya’s work. When I read his books, I feel as if I write for the masses and he writes for me. If only I could have met him in the initial stages of my career, my literature would have had a new path to follow".
Dr. A.L. Basham said:
"While meeting Acharya Mahapragya, one gets the thrill of meeting the 'Spiritual Ideal' or the 'Wonder that India was'".
Awards and honours
Mother Teresa National award of peace by Inter faith Harmony foundation of India in 2005
Communal harmony award i.e. Sampradayika Sadbhavana Puraskar by Govt. of India in 2004
Ambassador of Peace (London) by Inter Religions and international federation in 2003
Lokmaharshi by New Mumbai Municipal corporation in 2003
Indira Gandhi National Integration award in 2003<>Indira Gandhi Award for National Integration</ref>
D.Litt. by Netherland Inter Cultural Open University in 1999
On the eve of Acharya Mahapragya's 88th birth anniversary all religious dharm guru's of KARNATAKA state honored as "DHARM CHAKRAVARTHI" IN 2007
In 2008 "SARVA DHARM SAMMELANA" held at TOWN HALL, BANGALORE participated by all religious guru's felicitated Acharya Mahapragya as "VISHVA SHANTHI DOOT"
Death
Acharya Mahapragya died on 9 May 2010 at 2:52 pm(aged 89) in Sardarshahar, in Churu district, the place where he gained monkhood. Subsequently, Acharya Mahashraman was chosen the 11th acharya of Jain Terapanth, previously Acharya Mahapragya had made Acharya Shri Mahashraman the Yuvacharya of the Terapanth sect at Gangashahar (Bikaner) in 1997.
See also
List of religious leaders in 2007
List of Jains
Sadhvi Kanakprabha
Acharya Mahashraman
References
External links
Official site of Jain Shwetambar Terapanth
1920 births
2010 deaths
Nonviolence advocates
People from Jhunjhunu district
Indian spiritual writers
20th-century Indian philosophers
Indian Jain monks
20th-century Indian Jain writers
20th-century Jain monks
20th-century Indian monks
21st-century Indian Jains
21st-century Jain monks
21st-century Indian monks
Śvētāmbara monks |
Nelson F.C. is an English semi-professional association football club based in the town of Nelson, Lancashire. The club was founded in 1881 and initially played in the Lancashire Combination. In 1921, Nelson became a professional outfit when they were one of the teams selected to play in the inaugural season of the newly formed Football League Third Division North. The team played in the Football League for the following 10 years, enjoying a season in the Second Division in 1923–24. Nelson were relegated from the Football League in 1931, failing re-election after finishing bottom of the league. Defender Clement Rigg amassed the most league appearances for Nelson during this period with 254. The highest goalscorer was Joe Eddleston who netted on 97 occasions for the club before transferring to Swindon Town in 1926.
This list includes all the players who made at least one league appearance for Nelson during this professional period. Appearances and goals are counted together for players who had more than one spell with the club during this time.
Players
References
Players
Nelson
Association football player non-biographical articles
List |
João Sousa was the defending champion, but to decided compete at the 2013 Guimarães Open instead.
Jesse Huta Galung won the title, defeating Maxime Teixeira in the final, 6–4, 6–3.
Seeds
Draw
Finals
Top half
Bottom half
References
Main Draw
Qualifying Draw
Tampere Open - Singles
2013 Singles |
My American Wife may refer to:
My American Wife (1922 film), an American silent drama film
My American Wife (1936 film), an American comedy film |
Stanley Park is a neighbourhood of the West End in Vancouver, British Columbia, Canada. It is designated as the area lying between Denman Street and the boundary of Stanley Park proper. It is high density, like most of the West End, and is known for being a more affluent area of the West End and, once away from Denman Street, also one of the quietest on the downtown peninsula. Condominium properties facing the park are some of the most expensive in the city. The extreme southwest of the area overlaps with the English Bay neighbourhood.
Neighbourhoods in Vancouver |
Bronz were an an English hard rock band, formed in Bath in the mid-1970s. The band formed by Chris Goulstone played mainly around the UK and at the 'free festivals' of the time. These included performances at Stonehenge and Glastonbury in 1978.
Career
After an early tie up with Dave Panton as their manager in 1980, the band played many support slots at The Marquee and Music Machine with Angel Witch, More, Diamond Head, and Anvil. The band reappeared in 1983, with Chris Goulstone on guitar, vocals and keyboards, Shaun Kirkpatrick on guitar and backing vocals, Clive Deamer on drums, plus Paul Webb on bass guitar and lead vocals. They were signed to an independent record label, Bronze Records. The band recorded Taken by Storm with Ritchie Cordell and Glen Kolotkin as producers, later helped by Gerry Bron and Mark Dearnley on extra production.
They were launched onto the American market via a tie-in between Bronze Records and Island. The line-up, then based in London, consisted of ex-Nightwing vocalist Max Bacon, Goulstone, Kirkpatrick, Webb and new drummer Carl Matthews. In 1998, an album of unreleased tracks from that time, entitled Unfinished Business was released.
In 1984, after a major US tour supporting Ratt, the band disassembled, with Goulstone and Matthews leaving and shortly after, Max Bacon who teamed up with GTR.
Kirkpatrick assembled a line-up called 'Blue Print'. With producer Max Norman they recorded tracks at the Roundhouse studios until the label went into receivership.
Bronz re-formed briefly in 2000, with the 1984 line-up including Paul Webb resuming lead vocal duties; plus Jake Kirkpatrick on bass guitar. The band played a number of shows together, and a release was tied up with Sanctuary Records in 2003, with an album of live tracks from their 1984 US tour and some new material. This was released as Bronz Live – Getting Higher.
In 2005, Bronz with Goulstone, Thomas, and Scottish drummer Windsor McGilvray, appeared at the 25th anniversary of the beginning of the new wave of British heavy metal, at the Astoria in London, along with Diamond Head and Jaguar.
In July 2013, guitarist Shaun Kirkpatrick died. At the time, Shaun was working on new material.
Chris Goulstone has been writing for TV and Film since, with Chapel of Rock Production Music (www.ChapelofRock.com) as a new outlet for sync around the globe
Albums
Taken by Storm (1984) (featuring the single "Send Down an Angel" b/w "Tiger")
Unfinished Business (1998)
Bronz Live – Getting Higher (2003)
Carried by the Storm (2010)
See also
List of new wave of British heavy metal bands
GTR
References
External links
Chrisgoulstone.co.uk
English hard rock musical groups
English heavy metal musical groups
Musical groups from Somerset
New Wave of British Heavy Metal musical groups
Bronze Records artists
Sanctuary Records artists |
Juan J. de Pablo (born December 9, 1962) is a chemical engineer, Liew Family professor in the Pritzker School of Molecular Engineering at the University of Chicago and senior scientist at Argonne National Laboratory. In 2018, he was appointed Vice President for National Laboratories at the University of Chicago, a title which later expanded to include Science Strategy, Innovation and Global Initiatives in 2020. As of 2021, he is Executive Vice President for Science, Innovation, National Laboratories and Global Initiatives at the University of Chicago. He is known for his research on the thermophysical properties of soft materials. He is currently the co-director of the NIST supported Center for Hierarchical Materials Design (CHIMaD). and former director of the UW-Madison Materials Research Science and Engineering Center (MRSEC).
He was elected a member of the National Academy of Sciences in 2022.
Education
De Pablo earned a bachelor's degree in chemical engineering from Universidad Nacional Autónoma de México in 1985. After completing his Ph.D. in chemical engineering from the University of California, Berkeley in 1990 under the advisement of John Prausnitz. De Pablo conducted his postdoctoral research at the Swiss Federal Institute of Technology in Zurich, Switzerland.
Honors and awards
He was elected a member of the National Academy of Engineering in 2016 for design of macromolecular products and processes via scientific computation. He is also a fellow of the American Academy of Arts and Sciences, the American Physical Society and an honorary member of the Mexican Academy of Sciences. He is recipient of the AIChE Charles M.A. Stine Award for outstanding contributions to the field of materials science and engineering, the DuPont Medal for excellence in nutrition and health science, and the American Physical Society 2018 Polymer Physics prize He holds over 20 patents on multiple technologies.
References
External links
Research Group Homepage
Google Scholar Page
University of Chicago faculty
National Autonomous University of Mexico alumni
UC Berkeley College of Chemistry alumni
1962 births
Mexican chemical engineers
Living people
Members of the United States National Academy of Sciences
Recipients of the Presidential Early Career Award for Scientists and Engineers |
Inger Margrethe Philip (14 August 1916 – 1 September 2016) was a Danish politician for the Danish Social Liberal Party who was elected to serve as a member of parliament in the Copenhagen County district in the Folketing from 1960 to 1979. Before entering politics, she worked as a clerk in the secretariat of the and then in the . Philip got involved in the political affairs of the social scene and women. She was on various committees such as the and the .
Biography
On 14 August 1916, Philip was born Inger Margrethe Nygaard in Snekkersten, Tikøb, . She was the daughter of the office manager, cand. jur. Einar Oluf Nygaard, and the clerk Elna Marie Henrikgine Dahlberg. Philip was raised in an household in which her parents were educated academically and social and political topics were talked about. In 1935, she enrolled at the Ingwersen and Ellbrechts School as a student, did the first part of her science examination at the University of Copenhagen, and graduated as the first women economics cand. jur. from Denmark's second university Aarhus University in 1941. Following a period as a secretary at the Aarhus Orthopedic Hospital between 1942 and 1945, Philip worked as a teacher of various advanced courses from 1945 to 1949. In 1951, she was employed to become a business supervisor at the Central Work Instructions in Copenhagen until 1954, where she became aware of economic and social impacts on young girls. From 1954 to 1958, Philip worked as a remunerated clerk in the secretariat of the , then again as a clerk in the between 1958 and 1960, where she edited De store årgange.
Philip was a member of the Danish Women's Society in Aarhus, serving as chair of its youth circle from 1944 to 1946. At the 1960 Danish general election, she was elected to serve the Copenhagen County district in the constituency the constituency on behalf of the Danish Social Liberal Party in the Folketing due to a large personal vote. Philip became involved in the political affairs of the social scene and women, and represented the Lyngby constituency from 1968 to 1979. Between 1960 and 1965, she served as a member of the Wages Council, the supervisory board of the Stutgården treatment home from 1961 to 1970 and the in 1961. Philip served on the supervisory board of the Royal Danish Theatre in 1962 before becoming its chair from 1971 to 1975. In 1962, she was the second woman to serve as a member of the . Between 1962 and 1974, Philip was a member of the Cultural Foundation's Board, and on the Social Reform Commission from 1964 to 1972, where she conducted a thorough social legislation study and worked to simplify the administration and structure and better social sector staff training.
From 1964 to 1968, she was a member of the Varna orphanage's supervisory board, as well as between 1965 and 1974. Philip was a member of the from 1968 to 1970, the Board of Representatives for Danmarks Nationalbank between 1968 and 1971, was a member of Sparekassen København-Sjælland's supervisory board from 1969 on, served on the business guidance council from 1970, was on Dansk Sparinvest's board starting in 1971 and on 's board from 1976. She was offered the cabinet position of Minister for Social Affairs by Hilmar Baunsgaard, the Prime Minister of Denmark, but she rejected the offer. Philip was voted the recipient of the first in 1970. She lost her seat in the Folketing in the 1979 Danish general election on 23 October that year, but continued to be a financial board member, becoming chair of Sparekassen SDS and SDS in 1981 and 1984, respectively.
Personal life
Philip was married to the government minister and her economics professor Kjeld Philip from 19 February 1938 until his death on 27 October 1989. They had two children. She died on 1 September 2016.
References
1916 births
2016 deaths
People from Helsingør Municipality
Aarhus University alumni
University of Copenhagen alumni
20th-century Danish women politicians
21st-century Danish women politicians
Members of the Folketing 1968–1971
Members of the Folketing 1971–1973
Members of the Folketing 1973–1975
Members of the Folketing 1975–1977
Members of the Folketing 1977–1979
Women members of the Folketing
Danish Social Liberal Party politicians |
Matías Hernán Mayedonchi (前鈍内マティアスエルナン, born 18 February 1989) is an Argentina-born Japanese futsal player who plays for Shriker Osaka. He made his first appearance at Japan national futsal team in a friendly game vs Croatia in 2014.
Titles
All Japan Futsal Championship (3)
2013, 2014, 2015
F.League Ocean Cup (3)
2012, 2013, 2014
References
External links
1989 births
Living people
Argentine people of Japanese descent
Sportspeople of Japanese descent
Argentine emigrants to Japan
Japanese men's futsal players
Nagoya Oceans players |
Chu Đạo Cổ (chữ Hán: 朱道古; ? - 866), known in Chinese as Zhu Daogu (Wade–Giles: Chu Tao-ku) was a chieftain who allied with Nanzhao's generals Yang Sijin and Duan Qiuqian in the assault on the Tang-held city of Songping (modern-day Hanoi), capital of the Tang's Protectorate General to Pacify the South (modern-day northern Vietnam) in early 863. After captured Songping, in June 863, Zhu Daogu commanded a local army of 2,000 men, with other 4,000 Yunnanese men and together rowing several hundred small boats, attacked the Tang stronghold of Chün-zhou (modern-day Haiphong). Zhu Daogu captured a Tang officer, but a commander from the headquarters of the governor-general counterattacked. The Tang dynasty took ten large sailing junks and war boats, and rammed the rebels' fleets and sank 30 boats. Three years later, in December 866 the Tang general Gao Pian recaptured Annan and had Zhu Daogu executed, along with other local rebel leaders.
References
Bibliography
Vietnamese revolutionaries
9th-century Vietnamese people
Tang dynasty rebels |
Joep () is a Dutch masculine given name, the Limburgian form of Joseph. It is occasionally used as a feminine name. People with this name include:
Joep Baartmans-van den Boogaart (born 1939), Dutch female politician
Joep van Beeck (1930–2011), Dutch author and theologian
(born 1946), Dutch political cartoonist
Joep Beving (born 1976), Dutch composer and pianist
(1920–1988), Dutch football player and coach
(1899–1975), Dutch road cyclist
Joep Franssens (born 1955), Dutch composer
Joep van 't Hek (born 1954), since 1973 spelled "Youp van 't Hek", Dutch comedian, author, and columnist
(1908–1979), German concentration camp commander
Joep Lange (1954–2014), Dutch AIDS researcher
Joep Leerssen (born 1955), Dutch comparatist and cultural historian
Joep van Liefland (born 1966), Dutch conceptual artist
Joep van Lieshout (born 1963), Dutch artist and sculptor
Joep de Mol (born 1995), Dutch field hockey player
Joep Nicolas (1897–1972), Dutch glass painter
Joep van den Ouweland (born 1984), Dutch footballer
Joep Packbiers (1875–1957), Dutch archer
Joep van de Rande (born 1997), Dutch footballer
(1934–2004), Dutch composer and organist
Joep Zweegers (born 1992), Dutch footballer
See also
Joop
References
Dutch masculine given names
Masculine given names |
Zohra Aziza Baccouche ('Dr. Z') was an American physicist and science filmmaker. She was an American Association for the Advancement of Science Mass Media Science and Engineering fellow at CNN and founder and CEO of media company Aziza Productions. Declared legally blind at the age of eight, Baccouche lost her sight due to a brain tumor at eight years old. She died in 2021.
Early life
Baccouche was born to an African-American mother and Tunisian father on November 25, 1976 and brought up in Tunisia. She developed a brain tumor as a child which caused a disorder called hydrocephalus when she was eight years old. Hydrocephalus blocks cerebral fluid in the brain and creates pressure within the ventricles. In Baccouche's case, that pressure damaged her optic nerve causing her to lose all but 9% of her vision by the age of eight.
Education
Baccouche was the first blind person to study physics at the College of William & Mary, graduating in 1995 with a Bachelor of Science. Her undergraduate advisor suggested that because she was blind she should she not study physics. Baccouche earned her master's degree from Hampton University in 1998 and her PhD in theoretical nuclear physics from the University of Maryland, College Park, in 2002. Her dissertation entitled "Phenomenology of Isoscalar Heavy Baryons" focused on heavy baryons.
Career
As part of an American Association for the Advancement of Science Mass Media Fellowship in 1998, Baccouche joined CNN in Atlanta and was appointed the special science correspondent of the Washington Bureau. In 2000, she established Aziza Productions, a media production company that works with nonprofit organizations to make films that raise awareness about Black or disabled scientists.
After completing her PhD, Baccouche continued her career in science communication. In addition to continuing to work at Aziza Productions, she became a science correspondent for Evening Exchange with Kojo Nnamdi on Howard University Television. Baccouche was involved with initiatives to increase the number of African-American women studying physics. She worked as a science media producer and was a frequent contributor to the National Society of Black Physicists (NSBP) conferences. In 2020 Baccouche authored a memoir titled "Seeking Vision" chronicling her life from when she was declared legally blind at the age of eight until her fifth brain surgery. Shortly thereafter, she developed dementia and died from complications from her brain tumor.
Awards and distinctions
Baccouche was honored with a HerStory Award at the Women's Federation for World Peace USA National Assembly in 2013.
References
1976 births
2021 deaths
American blind people
American women physicists
American physicists
21st-century African-American scientists
American people of Tunisian descent
Hampton University alumni
University of Maryland, College Park alumni
20th-century African-American academics
20th-century American academics
20th-century African-American women
21st-century African-American academics
21st-century American academics
21st-century African-American women
21st-century American women scientists
African-American physicists
African-American women scientists
American scientists with disabilities
Blind scholars and academics |
Silent Hill: Downpour is a 2012 survival horror game developed by Vatra Games and published by Konami. First released in March 2012, Downpour is set in the series' eponymous fictitious American town and centers on Murphy Pendleton, a prisoner who enters the town, periodically entering the otherworld, leading him to unlock repressed memories. The game uses a third-person view and can be played in 3D.
Silent Hill: Downpour received mixed reviews from gaming critics, who praised its atmosphere, story and return to the series' survival horror and exploration roots after the action-heavy linearity of Silent Hill: Homecoming, but criticised its monster design, combat and technical performance. A patch since release has fixed many of the technical issues.
Gameplay
Silent Hill: Downpour is a survival horror game played from the over-the-shoulder, third-person perspective, in which the player controls Murphy Pendleton, an escaped convict, as he navigates the titular supernatural town. While the extent to which the game is an open-world environment is debated, Downpour allows for more environmental exploration than previous installments in the series. While Murphy explores the town on foot, he can use the abandoned subway tunnels as a short-cut to various parts of the town. At times, Murphy will need to directly interact with the environment to progress, pulling down fire escapes with hooks or destroying boarded-up doors, for example. Parts of his backstory can be learned from in-game notes and flashbacks; secret messages can be uncovered through the use of a UV flashlight, while clues and maps are stored in his journal to access freely. The player also can shape Murphy's character through several moral choices presented throughout the game, by allowing him to either act on or refuse opportunities to save non-player characters.
While exploring, Murphy may periodically encounter monsters, either alone or in groups. The monsters can harm him, causing his "health" to decline; as it does so, his clothes take on a bloodied and torn appearance to reflect this damage. Items to replenish his health can be found throughout the game. Murphy can obtain a range of melee weapons, including chairs, bottles, shovels, and axes to defend himself, although he can only carry one at a time, which will gradually deteriorate with use and eventually break. Firearms and ammunition are limited, and Murphy has difficulty aiming guns. Murphy can also fight with his fists, although this prevents him from blocking attacks. Additionally, phantom police cruisers roam the streets of Silent Hill; if one spots Murphy, a group of monsters will appear and attack him. The game also features a weather system which alternates fog with varying degrees of rainfall; during heavy rainfall, monsters appear more frequently and behave more violently towards Murphy.
At scripted intervals, Murphy will find himself in the Otherworld, a supernatural, rusty location where he may have to solve a puzzle to progress, navigate traps, or successfully evade the red, indestructible light chasing him. The light causes him harm in close proximity, and being caught by it will produce a "game over". Murphy can attempt to slow it down by knocking items into its path. Other monsters can damage him as he attempts to escape, while the environment will often change during these sequences: doors may suddenly close when Murphy runs towards them, for example.
The game offers fourteen optional side quests, one of which is unlocked in a second playthrough. These are intended to replace the fetch quests in earlier Silent Hill games, which were necessary to progress and often involved a thematically related side story. In Downpour, some of the side quests consist of investigating a local murder scene, freeing caged birds, or returning stolen items to the unseen inhabitants of a local apartment complex. The side quests often end in a tangible reward for Murphy, and after a certain point in the narrative, they are no longer accessible.
Plot
Silent Hill: Downpour focuses on Murphy Pendleton (David Boyd Konrad), who has been incarcerated for several years for stealing a police cruiser and crossing state borders. The game opens with his murder of the sequestered child molester and murderer, Patrick Napier (John Grace), in prison. After a riot, Murphy is placed under the supervision of officer Anne Cunningham (Kristin Price), who has significant animosity toward him, and is in the process of being transported to another penitentiary when the transport vehicle crashes near Silent Hill. Surviving the impact, Murphy finds himself unexpectedly free and decides to flee. Unknown to him, the town draws upon the psyche of its visitors, forming alternative versions of itself with symbols from their unconscious minds, mental states, and thoughts.
In his journey through the largely abandoned town, he encounters the cryptic postman, Howard Blackwood (William Tate), and travels to the Devil's Pit, a tourist attraction, where he encounters the suicidal park ranger J.P. Sater (Andy Hendrickson). Indirectly responsible for the deaths of eight children, Sater is eventually consumed by guilt and commits suicide. As the game progresses, it is revealed that Murphy made a deal with the corrupt corrections officer George Sewell (Joel Bernard), to gain access to Napier, who had abused and drowned Murphy's son, Charlie. Murphy eventually locates DJ Bobby Ricks (Antoine L. Smith), who has been dedicating songs to him to attract his attention. Although he has been trapped by the town, Ricks proposes a plan to escape by boat; his keys, however, have been lost. Before they can leave, Anne confronts them, and all three are attacked by monsters. Murphy regains consciousness to find himself alone again. Led to a monastery on the premise of collecting a deceased relative, Murphy encounters the Bogeyman, a sledge-hammer-wielding monster who murders a child in front of him. Murphy finds it again, seemingly lifeless, and learns that it is the relative he is intended to collect. Murphy confesses Napier's murder did not bring him any solace. Spotting the keys to Ricks's boat around its neck, Murphy seizes them and is drawn into a confrontation with the monster.
After defeating it, Murphy tries to leave the town by boat, only to be stopped by Anne. She shoots him when he refuses to return to the town. He wakes in a prison in the Otherworld and eventually kills the Wheelman, a massive, mute creature in a wheelchair by disabling its life support. Afterwards, Murphy relives the favor he had to repay Sewell, which required him to kill Frank Coleridge (Leer Leary), another corrections officer who was planning to testify against Sewell's corruption and who believed in Murphy. Anne reveals that Coleridge was her father, and after the attack, he lived in a vegetative state until his death years later. Motivated by revenge, Anne had arranged for Murphy's transfer to her prison. In the final sequence of the game, Murphy transforms into the Bogeyman and follows her as she attempts to kill him.
There are six endings available, based on choices made throughout the game. If Murphy does not kill Anne, the "Forgiveness" and "Truth and Justice" endings show that Sewell framed Murphy for his attack on Coleridge. In "Forgiveness", Anne forgives Murphy, and the pair are transported outside of Silent Hill where Anne reports Murphy's death, allowing him to escape. In "Truth and Justice", Anne is also seen seeking revenge against Sewell by confronting him in his office. If Murphy kills Anne, the "Full Circle" and "Execution" endings reveal that Murphy did kill Coleridge. In "Full Circle", Murphy commits suicide out of guilt, only to awake in an Otherworld prison to relive the events again, observed by the Wheelman. In "Execution", Murphy is executed for the murder of Charlie by Sewell. If Anne kills Murphy, the "Reversal" ending has her awaken as a prison inmate in events mirroring scenes of Murphy in prison, with Murphy taking Sewell's role. A joke ending can be obtained that shows Murphy tunneling out of his cell, to be greeted on the other side by a party in his honor, with various characters from the game and series present.
Development
Silent Hill: Downpour was developed by Vatra Games, using the Unreal Engine 3. Given the working title Silent Hill 8 at the Electronic Entertainment Expo 2010, the game was speculated to potentially be a first-person shooter, which would have marked a dramatic shift from the usual gameplay format of the series, though the first-person perspective had been used in some segments of the fourth installment and in the rail shooter spinoff. While this speculation was untrue, an option for multiplayer gaming had been discussed in Downpours early stages of development.
The narrative of Downpour was intended to be a self-contained story in the same vein as Silent Hill 2: while in development, the only requirement was that the story should focus on visitors to the titular town, rather than being part of any overarching narrative involving Alessa and the town's cult. Early on, the decision had been made to feature a criminal as the protagonist in a Silent Hill game for its potential to surprise players who had become accustomed to the usual tropes and plot developments of the series, namely that a seemingly ordinary character is revealed to have an unsettling secret in their backstory or becomes entangled in the town's dark past. Murphy was intended to evoke a measure of discomfort for the player, whether that be through his criminal background, or the questions raised by his presence in Silent Hill. The concept of a criminal protagonist met with some objections when first suggested to the developers at Vatra Games, some of whom did not want the game to center around a "bad guy". Murphy's criminality also divided participants in early focus testing, with it having a negative impact on players who found "certain elements" of it to be off-putting, while others were unconcerned or enjoyed it.
After deciding on the concept of a criminal protagonist, the thematic elements of his Otherworld were considered, with water eventually chosen. Rain was decided on as a "scary" manifestation of water, because of the darkness that comes during a storm and that as a result, "[y]our eyes might play tricks on you". The history and atmosphere of Brno, Czech Republic, the location of Vatra Studios, influenced Downpour. According to design director Brian Gomez, the surrounding markers of the "macabre" history of the Czech Republic, such as its seventeenth-century mummies in the Capuchin Crypt or material reminders of the Soviet regime in the mid-twentieth century, lent the game a "certain heaviness". A nearby gorge, Propast Macocha ("Stepmother Abyss"), provided the inspiration for the "Devil's Pit" level of the game.
Music
With Downpour, long-time composer for the Silent Hill series Akira Yamaoka was replaced by Daniel Licht. Licht studied the music from previous games to allow him to score the game's soundtrack with musical themes in line with the traditional sound of the series but which also had his personal touch. He worked with regular series vocalist Mary Elizabeth McGlynn on several tracks and considered her voice crucial to the music. Despite the influence of water on the narrative of the game, he avoided musical instruments that incorporated water, such as the waterphone, in favor of vocals, strings, guitar, mandolin, and "industrial sounds and ambiences". The mandolin in particular was chosen as a musical nod to the theme of the first Silent Hill game.
Downpour's main theme, "Silent Hill", was performed by the American nu metal band Korn. Konami selected the band from the options available to them, and the theme song did not comprise a significant part of Downpours gameplay; in response to the announcement of Korn's work on the game, a group of fans created an online petition for the removal of the main theme from Downpour. The soundtrack was published on 13 March 2012 by Milan Records.
Release
Silent Hill: Downpour was initially slated to be released in October 2011, but the release date was later pushed back to March 2012. In 2012, Konami published Downpour for the Xbox 360 and PlayStation 3 on 13 March in North America, on 30 March in Europe, and on 5 April in Australia. The PlayStation 3 version was released on 8 November 2012 in Japan. An official patch for the frame rate and saving issues for both consoles was released later that year. In 2016, Downpour was made backwards compatible with the Xbox One gaming console.
As part of a promotion for the game, video game publisher Konami held a Facebook contest from 10–16 February 2011, which invited its Silent Hill fans to design an original graveyard sculpture that would appear in the finished game.
A spin-off comic, Anne's Story, was written by Tom Waltz and illustrated by Tristan Jones. Based on downloadable content for Downpour that was never released, it centers on Anne and her parallel journey through Silent Hill as she attempts to capture Murphy. IDW Publishing released the four issues in print from September to December 2014, and reprinted them as part of the second volume of the Silent Hill Omnibus in October 2015.
Critical reception
Silent Hill: Downpour received "mixed or average" reviews, according to review aggregator Metacritic. In general, most critics praised the game's story and atmosphere but criticized the combat and technical performance.
Game Informer gave it a 7/10, stating: "I don't regret my time with Silent Hill: Downpour, but mediocrity hung over most of my playthrough". Destructoid gave it an 8/10, stating: "When it's not forcing a sub-par combat system on players, and when it allows itself to be as imaginative as it can be, Silent Hill: Downpour is a stylish, slickly produced, beautifully foreboding game". Games Radar gave it a 7/10, writing: "In spite of its flaws, Silent Hill: Downpour does manage to be smart and imaginative in bursts ... The actual gameplay leaves a lot to be desired, but as recent Silent Hills go, this is one of the better ones". GameSpot gave the game a 7.5/10, saying "Downpour makes some questionable tweaks to the established formula, but those decisions distinguish it from the rest of the series". Official Xbox Magazine summed up its review with "the game's many puzzles and open-world areas did leave us aimlessly wondering and wandering. But varied gameplay, solid combat, and an effective mix of psychological scares and freaky encounters make Downpour a worthwhile trip", giving the game a 7.5/10.
One of the most negative reviews came from IGN, which gave it 4.5/10. The review said that "the most frustrating thing about Silent Hill: Downpour isn't the lousy combat, dull exploration, or even the technical gaffes. It's the fact that every now and then while playing through the game's story, you'll see signs of brilliance; sunlight hinted from behind the overcast sky".
Several reviews singled out the soundtrack for praise, although one criticized the overall sound design, saying dead silence too often made combat commonplace instead of terrifying. The Joystiq review stated Licht did an "admirable job" with the score, yet lamented that "the loss of longtime series composer Akira Yamaoka may be Downpour'''s biggest detriment."
Ben "Yahtzee" Croshaw of Zero Punctuation fame, who is often vocally critical of past Western Silent Hill titles, reviewed the game more favorably. He noted improvements in the survival aspects of the combat, praising its fluidity in its use of random items as weapons and the ability to avoid enemies. He also praised the exploration as a step in the right direction. He was more critical of the monster designs, as well as describing the game as lacking horror. He was especially critical of how the protagonist's crimes are dependent on the multiple endings. Nonetheless, he described the title as his "favorite Western-developed Silent Hill'' thus far".
Notes
References
External links
2012 video games
Konami games
PlayStation 3 games
Psychological horror games
Silent Hill games
Single-player video games
Survival video games
Unreal Engine games
Video games developed in the Czech Republic
Video games scored by Daniel Licht
Video games set in Maine
Video games set in prison
Video games with stereoscopic 3D graphics
Xbox 360 games
2010s horror video games
Vatra Games games |
Nguyễn Chí Thanh (1 January 1914 – 6 July 1967) was a General in the North Vietnamese Vietnam People's Army and former North Vietnamese politician. Nguyễn Chí Thanh was born in Thừa Thiên Province in Central Vietnam to a peasant family. His original name was Nguyễn Văn Vịnh. He joined the Indochinese Communist Party in the mid-1930s and apparently spent most of the Second World War in a French prison. He worked for the Party in Central Vietnam until his rise to the Politburo in 1951. During the First Indochina War Thanh was made a general of the People's Army of Vietnam. From 1965 until his death, he served as the leading strategist and military commander of COSVN, the southern headquarters of communist military and political operations within the Republic of Vietnam. In 1967, he presented plans for what was to become the Tet Offensive to the Politburo, but died shortly after receiving permission to implement his plan.
Revolutionary cause
Nguyễn Chí Thanh was born on January 1, 1914, in the village of Quảng Điền in Thừa Thiên province. Thanh was son of Nguyễn Hán and Trần Thị Thiển, the sixth of 11 children. He grew up in a middle-class family, and was well educated. At the age of 14, his father died, and his family became poor. Thanh then went to work as a farmer in order to make a living.
In 1937, Nguyễn Chí Thanh joined the Communist Party of Vietnam, Thanh became Party Secretary, in Thừa Thiên. From 1938 to 1943, Nguyễn Chí Thanh was arrested many times by the France colonial authorities. He was sent to the labor camps of Buôn Ma Thuột in Huế. After being released from prison he was sent to attend the National People's Congress in Tân Trào (1945). At the Party Congress in Tân Trào, he was nicknamed Nguyễn Chí Thanh, was elected to the Central Committee of the Communist Party and was appointed Secretary of the Central Committee of the Communist Party to monitor and organize the winning Central Government in the August Revolution.
At the Third National Party Congress in 1960 in Hanoi, Nguyễn Chí Thanh was elected to the Central Committee and was appointed to the Politburo and the Secretariat. In 1961, he was assigned to charge the Agriculture Board of the Party. During the Vietnam War, the Central Committee of the Party he returned to the military. Nguyen Chi Thanh is also a member of the military leadership of the Democratic Republic of Vietnam. In 1961, he continuously launched emulation movements in cooperatives, helping to stabilize the development situation in agricultural production in the North. From 1965 to 1967, he was assigned to the South, served as Secretary of the Central Department of South Vietnam, and the Political Commissar of the Liberation Army of the South. This time he took the name of Sáu Vi. When writing newspapers, he often took the pen name Trường Sơn. At the battlefield, he was the tactician of the South Vietnamese Liberation Army with the motto "Hold the enemy belt that hit", this approach uses maneuver to limit the fire's superiority of American troops.
The Vietnamese claim that Nguyễn Chí Thanh died in Hanoi on July 6, 1967, due to a heart attack in Hanoi after a night of heavy drinking after reporting to the Politburo on the situation in the South. The United States claims that Thanh was severely wounded during a B-52 raid on COSVN, evacuated overland to Phnom Penh and then flown to Hanoi where he died of his wounds. In the aftermath of Thanh's death the party purged dozens of senior members who held more moderate positions in contrast to the more belligerent stance of Lê Duẩn and his allies. Phạm Hùng, another close ally of Lê Duẩn, was appointed to replace Thanh as head of COSVN.
References
External links
Bibliography: Writings of Nguyen Chi Thanh
1914 births
1967 deaths
People from Thừa Thiên-Huế province
Generals of the People's Army of Vietnam
Members of the 2nd Politburo of the Workers' Party of Vietnam
Members of the 3rd Politburo of the Workers' Party of Vietnam
Members of the 3rd Secretariat of the Workers' Party of Vietnam
Members of the 1st Central Committee of the Indochinese Communist Party
Members of the 2nd Central Committee of the Workers' Party of Vietnam
Members of the 3rd Central Committee of the Workers' Party of Vietnam
Vietnamese nationalists
North Vietnamese military personnel of the Vietnam War |
The Four-man competition at the IBSF World Championships 2019 was held on March 8 and 9, 2019.
Results
The first two runs were started on March 8 at 17:04 and the final two runs on March 9 at 17:04.
References
Four-man |
The Gables is a suburb of Johannesburg, South Africa. It is located in Region F of the City of Johannesburg Metropolitan Municipality.
Johannesburg Region F |
Stewart Ransom "Rhett" Miller II (born September 1970) is the lead singer of the country rock band Old 97's. He also records and performs as a solo musician, and has been published as a writer of both fiction and non-fiction.
Early life
Miller, a seventh-generation Texan, was born in Austin, Texas. Miller's parents divorced when he was 17 years old. Miller, the oldest of three children, has a younger brother and sister. Rhett's paternal grandfather, Giles E. Miller, was a young millionaire scion of a successful textile family who, in 1952 owned the first NFL football team in the south, the Dallas Texans. The Texans folded after seven games, marking the last time an NFL franchise would go bankrupt.
Miller's family lived in Highland Park, Texas, where he went to Armstrong Elementary School. In 4th grade, Miller was hospitalized for several months due to a severe inner-ear problem. In 6th grade, he began attending St. Mark's School of Texas, a private boys' school in North Dallas. He started taking guitar lessons when he was 12 years old and writing songs when he was 13. Miller has said that his time at St. Mark's was very difficult, and that he was ostracized and bullied, leading to depression which culminated in a suicide attempt at the age of 14. The following year in April 1985 Miller played his first gig at 500 Cafe in downtown Dallas. Through high school Miller played in bands, becoming a local folk performer and headlining small venues and opening for such nationally touring artists as Rosanne Cash, Chris Isaak, and The Lords of the New Church. Also in high school, Miller edited St. Mark’s literary magazine and helped start an alternative literary magazine called The Rag, for which he wrote poetry.
In 1989, Miller graduated from St. Mark's School of Texas. He briefly attended Sarah Lawrence College on a creative writing scholarship before deciding to move back to Texas to pursue a music career.
Career
In 1989, while still in high school, Miller released an album called Mythologies. The album title was taken from a book of essays by the French media philosopher Roland Barthes. Only 1,000 copies of the CD exist. Miller signed and numbered each one.
In 1990, when Miller returned to Dallas after his semester at college, Miller formed a band called Sleepy Heroes with childhood friend and future Old 97’s bassist Murry Hammond. Sleepy Heroes was a power-pop three piece. They released one album, Under a Radio Sun, before they broke up. The Old 97's song, "Victoria," was written during the last few months of Sleepy Heroes.
Miller was the lead singer of various bands in Dallas between 1990 and 1993: Rhett Miller's Third Eye, Buzz, Rhett's Exploding, and Retablo, for which Miller self-recorded an unreleased record on cassette which included some early Old 97's songs.
In 1993, Miller and Hammond formed Old 97's as a three piece acoustic act along with their neighbor at Dallas’ Marquita Court Apartments, guitarist Ken Bethea. They played as a three piece for six months before adding Darin Lin Wood on drums. He played with the band for a few weeks in the summer of 1993 before being replaced by Philip Peeples who has remained the band’s drummer ever since.
Old 97’s first album, Hitchhike To Rhome, came out on local Dallas label Big Iron Records in 1993. During the first year of Old 97’s, Miller also performed as a touring member of the band Killbilly. It was during a Killbilly tour that Miller met Nan Warshaw, owner of Chicago’s Bloodshot Records, the label which released Old 97’s second album, Wreck Your Life.
After a sold-out SXSW showcase in 1995, Old 97’s found themselves the subject of a major label bidding war. 15 record labels fought to sign the band, with Elektra Records A&R rep Tom Desavia finally inking the band to a multi-album deal. Their first Elektra release, Too Far To Care, came out in 1997, followed by Fight Songs and Satellite Rides.
In 2002, Miller released The Instigator on Elektra Records. The record was produced and recorded with Jon Brion, received critical acclaim and substantial airplay on alternative-oriented radio stations.
In 2006, Miller released The Believer on the Verve Forecast label. It includes a cover of Brion's "I Believe She's Lying" and "Fireflies," a duet with Rachael Yamagata.
In 2009, Miller released his fourth record, the self-titled Rhett Miller, on Shout! Factory. The record includes Jon Brion on guitar and bass, The Apples in Stereo's John Dufilho on drums and Billy Harvey on guitar. In 2011, Miller self-released a live recording of The Interpreter: Live at Largo.
In 2012, Miller released The Dreamer. The record, a Maximum Sunshine release which Miller self-produced, included collaborations with Rosanne Cash and Ben Kweller.
In 2015, Miller released his sixth solo record, called The Traveler, on ATO Records. The album was a notable shift for Miller, as he recorded it with a Portland, Oregon-based bluegrass band called Black Prairie, which includes members of The Decemberists. The album also features contributions from Peter Buck and Scott McCaughey of R.E.M.
In 2018, Miller released The Messenger on ATO Records.
Writing
Miller has written short stories, essays and articles that have appeared in Rolling Stone, The Baffler, Bookforum, Sports Illustrated, McSweeney’s, The Atlantic, and Salon.
Other projects
In addition to his solo work, Miller has worked on various collaborations, including co-writing with other musicians.
2004: Recorded a version of Simon and Garfunkel's "Homeward Bound" for one of MasterCard's "Priceless" advertisements
2008: Co-produced the first EP, No One Will Know, of New York band The Spring Standards
2009: Appeared as a member of the musical ensemble in the 30 Rock episode Kidney Now!
2019: On 1/23/19 Miller announced the 1/24 start of his podcast, Wheels Off, subtitled A Show About the Messy Reality Behind the Creative Life. In partnership with Revoice Media, it's an 11-episode series; each segment features host Miller conversing with musicians, writers, artists, actors, comedians and other creative people about the pivotal moments that shaped their work, what it means to create in a digital age and grappling with the challenges and joys of living a creative life.
Philanthropy
In 2006, Miller and his brother Ross Miller launched the Breathe Easy Concert Series, an annual event in Dallas that raises money for the Cystic Fibrosis Foundation and awareness about cystic fibrosis.
In 2016, Miller appeared as part of the Okay to Say initiative sponsored by the Meadows Mental Health Policy Institute in Dallas, which encourages the use of therapy to prevent suicide and address mental health issues. In the campaign, Miller discusses his own suicide attempt when he was 14 years old, and how therapy has helped him over the years. Miller said that Jason Isbell encouraged him to talk publicly about his sobriety.
Personal life
In 1997, Miller moved from Dallas to Los Angeles. In 2000, he moved to New York City. Miller and then-fiancée lived three blocks south of the World Trade Center and were home on 9/11. He shared journal writing about their experience, which was published in The Atlantic in September 2011. Miller now lives in New York's Hudson Valley.
In 2002, Miller married former model Erica Iahn a week after he completed production of The Instigator. Iahn found out she was pregnant with their first child, Max, while Miller was on tour with Tori Amos to promote the album. Their daughter, Soleil, was born in the spring of 2006.
Miller said he got the nickname "Rhett" because his mother liked Rhett Butler from the movie Gone with the Wind.
Discography
Solo albums
1989: Mythologies (Carpe Diem Records)
2002: The Instigator (Elektra Records)
2006: The Believer (Verve Forecast Records)
2009: Rhett Miller (Shout! Factory)
2011: The Interpreter: Live at Largo (Maximum Sunshine Records)
2012: The Dreamer (Maximum Sunshine Records)
2015: The Traveler (ATO Records)
2018: The Messenger (ATO Records)
2022: The Misfit (ATO Records)
Singles
Other contributions
2003: The Executioner's Last Songs: Volumes 2 & 3 (Bloodshot Records) – "Dang Me"
2005: This Bird Has Flown - A 40th Anniversary Tribute to the Beatles' Rubber Soul (Razor & Tie) – "Girl"
Filmography
Works and publications
Chronological order
– short story
- poetry
References
External links
Rhett Miller
Old 97's
1970 births
American alternative country singers
American country singer-songwriters
American male singer-songwriters
Elektra Records artists
Living people
Singers from Dallas
Singers from Austin, Texas
St. Mark's School (Texas) alumni
Verve Records artists
Wrasse Records artists
American country rock singers
Singer-songwriters from Texas
People from Highland Park, Texas
21st-century American singer-songwriters
Country musicians from Texas
21st-century American male singers |
Derbyshire is a former United Kingdom Parliamentary constituency. It was a constituency of the House of Commons of the Parliament of England then of the Parliament of Great Britain from 1707 to 1800 and of the Parliament of the United Kingdom from 1801 to 1832. It was represented by two Knights of the Shire.
History
Boundaries and franchise
The constituency, which first returned members to Parliament in 1290, consisted of the historic county of Derbyshire. (This included the borough of Derby; even though Derby elected two MPs in its own right, it was not excluded from the county constituency, and owning property within the borough could confer a vote at the county election.)
In medieval times, the MPs would have been elected at the county court, by the suitors to the court, which meant the tiny handful of the local nobility who were tenants in chief of the Crown. However, from 1430, the Forty Shilling Freeholder Act extended the right to vote to every man who possessed freehold property within the county valued at £2 or more per year for the purposes of land tax; it was not necessary for the freeholder to occupy his land, nor even in later years to be resident in the county at all.
Except briefly during the period of the Commonwealth, Derbyshire had two MPs elected by the bloc vote method, under which each voter had two votes. (In the First and Second Parliaments of Oliver Cromwell's Protectorate, there was a general redistribution of seats and Derbyshire elected four members; the traditional arrangements were restored from 1659.)
Character
From Elizabethan times, elections in Derbyshire were dominated by the Cavendish family at Chatsworth, later Dukes of Devonshire. This influence was originally established by the formidable Bess of Hardwick, whose second husband was a Cavendish and who in 1572 manoeuvred to secure her son from that marriage a seat as MP for the county - a considerable honour for a young man from what was then a family of only minor importance. She had meanwhile married the 6th Earl of Shrewsbury, and her stepson, the future 7th Earl, was elected to the second seat for the county at the same time, despite being two-and-a-half years too young to take his seat. From this point onwards until the Reform Act, one of the two MPs was almost invariably a Cavendish or a Cavendish nominee, although the other seat was generally left to the other leading families of the county; the continuance of this dominance was all the more remarkable because Derbyshire did not have a rash of boroughs where the local gentry could find a seat when unable to secure election for Derbyshire - indeed, in the one borough that there was, Derby, the Dukes of Devonshire kept as tight hold on one of the two seats as they did in the county.
As in most counties of any size, contested elections were avoided whenever possible because of the expense. Elections were held at a single polling place, Derby, and voters from the rest of the county had to travel to the county town to exercise their franchise; candidates were expected to meet the expenses of their supporters in travelling to the poll and to entertain them lavishly with food and drink when they got there. There were only four general elections between 1700 and 1832 when Derbyshire's seats were contested: on every other occasion the various competing interests in the county managed to reach agreement on who should represent the county without taking the matter to a poll.
In the pre-industrial era, Derbyshire was a flourishing agricultural county, but it was one of the English counties most dramatically affected by industrialisation in the 18th and early 19th centuries, becoming noted in particular for the manufacture of heavy machinery and (during the Napoleonic Wars) of armaments. Its population grew swiftly (having reached 237,170 by 1831); but the electorate has been estimated at only 3,000 or 4,000 in the second half of the 18th century, and was probably not much higher by the time of the Reform Act. The Dukes of Devonshire were able to maintain much of their traditional influence, Cavendish members occupying one of the two seats as a Whig MP; but the county itself was predominantly Tory, and usually ensured that the other MP was returned in that interest.
Few of the industrial workers, of course, had the vote since they were not property owners, and in the early 19th century political unrest was common - most notably the "Pentrich Revolution" or "Derbyshire Rising" of 1817. Derbyshire soon became one of the most vocal centres of agitation for Parliamentary reform, and by 1830 this sentiment had spread to the voters as well. At the 1831 election their sitting Tory MP was summarily swept out of his seat for supporting a destructive amendment to the Reform Bill.
But the Duke of Devonshire, a supporter of Reform even though it entailed the loss of his own pocket boroughs around the country, was able to retain the voters' support, telling a county meeting in 1832:
The members of the aristocracy have sometimes been considered in an unfavourable light by the people. For much of this they are indebted to the manner in which the present constitution of Parliament has enabled them to interfere and dictate in the representation... Let them stand on their own merits; and I have no fear that the people of England will be unjust to the aristocracy of England, united by mutual kind feelings and good offices, and not by close boroughs and mock representation.
This seems to have sufficiently satisfied the Derbyshire voters that they allowed the Dukes to continue to "interfere and dictate in the representation" to the extent that they continued electing Cavendishes (in the Northern division after the county was divided by the Reform Act) well into the 20th century.
Abolition
The constituency was abolished in 1832 by the Great Reform Act, which divided the county into two new two-member divisions, Northern Derbyshire and Southern Derbyshire.
Members of Parliament
1290–1399
Constituency created (1290)
1400–1499
1500–1640
1640–1653
1654–1658
Representation increased to four members in the First and Second Parliaments of the Protectorate
1659–1832
Representation restored to two members in the Third Protectorate Parliament
Elections
Source
See also
List of former United Kingdom Parliament constituencies
Unreformed House of Commons
References
The history of the county of Derby By Stephen Glover
Michael Brock, The Great Reform Act (London: Hutchinson, 1973)
D. Brunton & D. H. Pennington, Members of the Long Parliament (London: George Allen & Unwin, 1954)
John Cannon, Parliamentary Reform 1640–1832 (Cambridge: Cambridge University Press, 1972)
Cobbett's Parliamentary history of England, from the Norman Conquest in 1066 to the year 1803 (London: Thomas Hansard, 1808)
Lewis Namier & John Brooke, The History of Parliament: The House of Commons 1754–1790 (London: HMSO, 1964)
J. E. Neale, The Elizabethan House of Commons (London: Jonathan Cape, 1949)
T. H. B. Oldfield, The Representative History of Great Britain and Ireland (London: Baldwin, Cradock & Joy, 1816)
J Holladay Philbin, Parliamentary Representation 1832 - England and Wales (New Haven: Yale University Press, 1965)
Henry Stooks Smith, The Parliaments of England from 1715 to 1847 (2nd edition, edited by FWS Craig - Chichester: Parliamentary Reference Publications, 1973)
Parliamentary constituencies in Derbyshire (historic)
Constituencies of the Parliament of the United Kingdom established in 1290
Constituencies of the Parliament of the United Kingdom disestablished in 1832 |
The 1978–79 Durand Cup Final was the 74th final of the Durand Cup, the oldest football competition in India, and was contested between Kolkata giants East Bengal and Mohun Bagan on 17 January 1979 at the Ambedkar Stadium in New Delhi.
East Bengal won the final 3–0 to claim their 8th Durand Cup title. Surajit Sengupta, Mihir Bose and Tapan Das scored the three goals in the final as East Bengal lifted their eighth Durand Cup title.
Route to the final
Match
Summary
The Durand Cup final began at the Ambedkar Stadium in New Delhi on 17 January 1979 in front of a packed crowd as Kolkata giants East Bengal and Mohun Bagan faced each other in a Kolkata Derby. East Bengal reached their tenth Durand Cup final after defeating Mafatlal 2–0 in the semi-final, having won the tournament seven times previously in 1951, 1952, 1956, 1960, 1967, 1970, and 1972. Mohun Bagan reached their thirteenth Durand Cup final after they defeated JCT 4–2 in the semi-final, having won the tournament eight times previously in 1953, 1959, 1960, 1963, 1964, 1965, 1974, and 1977.
East Bengal dominated the proceedings from the start and took the lead early in the fifteenth minute when Surajit Sengupta dribbled past the Mohun Bagan defence to score with a powerful shot to make it 1–0. East Bengal doubled their lead in the thirty-sixth minute when Surajit Sengupta found Mihir Bose unmarked inside the box who made no errors to make it 2–0 before halftime. East Bengal scored their third with just four minutes remaining when Surajit Sengupta once again played a perfect pass to unmarked Tapan Das inside the box who made the scoreline 3–0 as East Bengal lifted their eighth Durand Cup title.
Details
References
External links
Durand Cup Finals
Durand Cup finals
1978–79 in Indian football
East Bengal Club matches
Mohun Bagan SG matches
Football competitions in Kolkata |
The Sociedade Brasileira de Belas Artes SBBA (Brazilian Society of Fine Arts SBBA) is a public benefit entity that aims to promote and disseminate plastic arts. The SBBA is located in the historic building of the 18th century Solar do Marques do Lavradio in downtown Rio de Janeiro, in the Lapa neighborhood, at Rua do Lavradio, nº 84.
History
The Sociedade Brasileira de Belas Artes SBBA was founded on August 10, 1910, in Rio de Janeiro under the name Centro Artístico Juventas and, on July 1, 1919, the definitive name of “Sociedade Brasileira de Belas Artes” was approved. With a decree of the Republic of the United States of Brazil of September 20, 1922, SBBA is considered to be a public benefit entity whose objective is the promotion of fine arts.
Over the years, the Society has had to change its headquarters several times and it has been doing academic work to disseminate and teach plastic arts techniques. The Brazilian Society of Fine Arts has an important art collection that was accumulated from 1960 and listed in 1985 by the National Institute of Historic and Artistic Heritage and which it collects period objects and furniture and houses works by Brazilian and international artists such as, among others, Arthur Timótheo da Costa, Eliseu Visconti, Marques Júnior, Manuel de Araújo Porto-Alegre and Candido Portinari.
References
Bibliography
HILLAL, Therezinha. Renacer da Fhoenix, Nos 105 Anos de Arte Sociedade Brasileira de Belas Artes SBBA, Editora Comunità LTDA, Niterói, RJ, 2015
CARDOSO, Rafael. “Boêmia inspiração”. Revista de História da Biblioteca Nacional. n.35, ago/2008.
LEITE, José Roberto Teixeira. Dicionário Crítico da Pintura no Brasil. Rio de Janeiro: Artlivre, 1988. (Verbetes: Centro Artístico Juventas, pp. 117–118; Chambelland, Rodolfo. pp118–119; Sociedade Brasileira de Artes Plásticas, p. 484; Tímótheo da Costa, Artur. p. 508).
RUBENS, Carlos. Pequena História das Artes Plásticas no Brasil. São Paulo: Companhia Editora Nacional, 1941. (pp. 376–378)
FARIA COUTO, André Luiz. Graduação em História pela Universidade Federal Fluminense (UFF).
External links
Instituto Estadual do Patrimônio Cultural – Inepac
Rio Cultura – Solar Marquês do Lavradio – Sociedade Brasileira de Belas Artes
André Luiz Faria Couto, Centro Artistico Juventas (Sociedade Brasileira de Belas Artes)
1910 establishments in Brazil
Arts organisations based in Brazil
Arts organizations established in 1910
Organisations based in Rio de Janeiro (city) |
Alfredo Romero Mendoza (born 7 January 1969) is a Venezuelan lawyer, human rights activist and executive director of the non-governmental organization Foro Penal. He received the Robert F. Kennedy Human Rights Award in 2017.
Career
Alfredo Romero graduated as a lawyer in the Andrés Bello Catholic University in 1991, received a master's degree in Latin American studies in Georgetown University in 1994 and afterwards a master's degree in financial public law in the University of London in 1997. Between 2001 and 2002 he was rapporteur of the Constitutional Chamber of the Supreme Tribunal of Justice and in 2002 he founded the civil association VIVE (Victims of Violence in Violation of Human Rights; ), representing the victims of the April 11, 2002 Llaguno Overpass events. This firm later merged with the non-governmental organization Foro Penal.
Romero has been awarded several recognitions for his work in human rights. He has been member of the Global Agenda Council in rule of law in the World Economic Forum, and in 2007 he was recognized as a "World Young Leader" by the Forum. In 2009 Romero received the honour diploma from the Venezuelan Lawyers Association as recognition for his effort to improve judicial institutions and recognition as public servant by Rotary International. In 2014 he was awarded the Bicentennial Order by the National Lawyers Association, the highest recognition of that institution in the country. Romero was named as the 2017 Robert F. Kennedy Human Rights Award laureate, an award given to individuals around the world "who show courage and have made a significant contribution to human rights in their country."
He has also worked as law professor in the Central University of Venezuela and the Andrés Bello Catholic University, is member of the Himiob Romero law firm and currently is executive director of Foro Penal, as well as member of the Harvard Kennedy School Carr Center for Human Rights Policy.
Romero is the author of the book Relatos de muerte en vivo. Also, he is co-author of the book Crímenes de Lesa Humanidad, una perspectiva venezolana.
See also
Gonzalo Himiob
Carlos Correa
Liliana Ortega
Rocío San Miguel
References
Living people
1969 births
Georgetown University alumni
Academic staff of Andrés Bello Catholic University
Academic staff of the Central University of Venezuela
Andrés Bello Catholic University alumni
Venezuelan human rights activists
20th-century Venezuelan lawyers
People from Caracas
Robert F. Kennedy Human Rights Award laureates
21st-century Venezuelan lawyers |
Antix was a rock band from Los Angeles that formed in 1982 and signed with then Great White roadie Jeff Gordon. In 1984 the band had managed to secure a deal under Jeff's management to do an EP (Get Up Get Happy) and have it marketed by Enigma Records. On top of that they got Don Dokken and Jeff Pilson to produce it. Dokken was recording "Tooth and Nail" during the day and Don and Pilson would work with Antix in the evening. In 1984 the song "Daze Gone By" appeared on Hit Parader magazine's compilation album The Wild Bunch along with such bands as Slayer, Lizzy Borden, Megadeth, Anthrax, Raven and Grim Reaper. In 1986 the band recruited bass player Robin Houde and guitarists Jesse (J.R.) Curtis and Jaye Paul and Mick walker Brandon into the band replacing B.J. Norris, Greg Clewley, and eventually Jace White, who went on to form the band "Serious Pleasure", which he was the lead singer and lead guitarist for. Note: Singer Fredie Vinson and bassist Dave E. Weeks were briefly the original replacements for Antix before Weeks joined Jace in forming "Serious Pleasure ", and Vinson parted ways for his own endeavors. J.R. Curtis had been playing in the band Brazil with vocalist Scott Kidd "aka"
Uncle Scotty from Metal Blade Records artist Overkill L.A. and working on material with Mercury Records recording artists Legs Diamond vocalist Rick Sanford. Jaye had recently arrived in the Hollywood scene from Hawaii. At one point, J.R. considered joining "Serious Pleasure", but that plan never materialized.
Past members
Ian Evans
Jace White
B.J. Norris (Beni Jacobs)
Greg Clewley (Gregory Darling)
Dave E. Weeks
Fredie Vinson
J.R. Curtis
Robin Houde
Jaye Paul
Mic B. Nasty (was in Glass Hammer)
Mic Brandon
Discography
Studio albums
Get Up, Get Happy (1984)
The Wild Bunch (1985)
I'll Take Your Love (1987)
References
Hard rock musical groups from California
Musical groups from Los Angeles |
```public key
ecdsa-sha2-nistp384 your_sha256_hashkF2q+8m58EvtZq4mDGgcVEzafPRuNIn1018m9KuqNpOQ6d+435n+MRYThe4MUdijSIDuopX2i14Z35oKZ9x2LsV+RxQczjmbnoWZdvgcvdOo6jiJdY7XJw== Key.OPENSSH.ECDSA384.Encrypted
``` |
Binary Synchronous Communication (BSC or Bisync) is an IBM character-oriented, half-duplex link protocol, announced in 1967 after the introduction of System/360. It replaced the synchronous transmit-receive (STR) protocol used with second generation computers. The intent was that common link management rules could be used with three different character encodings for messages.
Six-bit Transcode looked backward to older systems; USASCII with 128 characters and EBCDIC with 256 characters looked forward. Transcode disappeared very quickly but the EBCDIC and USASCII dialects of Bisync continued in use.
At one time Bisync was the most widely used communications protocol and is still in limited use in 2013.
Framing
Bisync differs from protocols that succeeded it in the complexity of message framing. Later protocols use a single framing scheme for all messages sent by the protocol. HDLC, Digital Data Communications Message Protocol (DDCMP), Point-to-Point Protocol (PPP), etc. each have different framing schemes but only one frame format exists within a specific protocol. Bisync has five different framing formats.
ACK0 and ACK1 (even/odd affirmative acknowledgement) are encoded as two characters—DLE '70'x, and DLE / for EBCDIC, DLE 0 and DLE 1 for USASCII, DLE - and DLE T for Transcode. WABT (wait before transmit) was encoded as DLE ", DLE ?, or DLE W.
All frame formats begin with at least two SYN bytes. The binary form of the SYN byte has the property that no rotation of the byte is equal to the original.
This allows the receiver to find the beginning of a frame by searching the received bit stream for the SYN pattern. When this is found, tentative byte synchronization has been achieved. If the next character is also a SYN, character synchronization has been achieved. The receiver then searches for a character that can start a frame. Characters outside of this set are described as "leading graphics". They are sometimes used to identify the sender of a frame. Long messages have SYN bytes inserted approximately every second to maintain synchronization. These are ignored by the receiver.
A normal block ending character (ETB or ETX) is followed by a check sum (block check character or BCC). For USASCII, this is a one character longitudinal redundancy check (LRC); for Transcode and EBCDIC, the check sum is a two character cyclic redundancy check(CRC). A data frame may contain an intermediate check sum preceded by an ITB character. This ability to include intermediate check sums in a long data frame allows a considerable improvement of the error detection probability. USASCII characters are also transmitted using odd parity for additional checking.
Pad characters are required following a line turn-around—NAK, EOT, ENQ, ACK0, ACK1. If the transmission ends with EOT or ETX the pad follows the BCC. This pad is either all '1' bits or alternating '0' and '1' bits. The next transmission begins with a pad character which can be either of the above or a SYN.
An optional heading containing control information can precede data in a frame. The content of the heading is not defined by the protocol but is defined for each specific device. The heading, if present, is preceded by an SOH (start of heading) character and followed by an STX (start of text).
Text data normally follows the heading, begun by the STX, and terminated by ETX (end of text) or ETB (end transmission block).
Normal data frames do not allow certain characters to appear in the data. These are the block ending characters: ETB, ETX and ENQ and the ITB and SYN characters. The number of unique characters that can be transmitted is therefore limited to 59 for Transcode, 123 for USASCII, or 251 for EBCDIC.
Transparent data framing provides an unrestricted alphabet of 64, 128 or 256 characters.
In transparent mode block framing characters such as ETB, ETX, and SYN are preceded by a DLE character to indicate their control significance (The DLE character itself is represented by the sequence DLE DLE). This technique became known as character stuffing, by analogy with bit stuffing.
Link control
The link control protocol is similar to STR. The designers attempted to protect against simple transmission errors. The protocol requires that every message be acknowledged (ACK0/ACK1) or negatively acknowledged (NAK), so transmission of small packets has high transmission overhead. The protocol can recover from a corrupted data frame, a lost data frame, and a lost acknowledgment.
Error recovery is by retransmission of the corrupted frame. Since Bisync data packets are not serial-numbered, it's considered possible for a data frame to go missing without the receiver realizing it. Therefore, alternating ACK0s and ACK1s are deployed; if the transmitter receives the wrong ACK, it can assume a data packet (or an ACK) went missing. A potential flaw is that corruption of ACK0 into ACK1 could result in duplication of a data frame.
Error protection for ACK0 and ACK1 is weak. The Hamming distance between the two messages is only two bits.
The protocol is half-duplex (2-wire). In this environment, packets or frames of transmission are strictly unidirectional, necessitating 'turn-around' for even the simplest purposes, such as acknowledgments. Turn-around involves
the reversal of transmission direction,
quiescing of line echo,
resyncing.
In a 2-wire environment, this causes a noticeable round-trip delay and reduces performance.
Some datasets support full-duplex operation, and full-duplex (4-wire) can be used in many circumstances to improve performance by eliminating the turn-around time, at the added expense of 4-wire installation and support. In typical full-duplex, data packets are transmitted along one wire pair while the acknowledgements are returned along the other.
Topology
Much Bisync traffic is point-to-point. Point-to-point lines can optionally use contention to determine the master station. In this case one device can transmit ENQ to bid for control. The other device can reply ACK0 to accept the bid and prepare to receive, or NAK or WABT to refuse. In some cases connection of a terminal to multiple hosts is possible via the dial telephone network.
Multi-drop is part of the initial Bisync protocol. A master station, normally a computer, can sequentially poll terminals which are attached via analog bridges to the same communication line. This is accomplished by sending a message consisting only of an ENQ character addressed to each device in turn. The selected station then transmits a message to the master or reply with EOT to indicate that it has no data to transmit.
Applications
The original purpose of Bisync was for batch communications between a System/360 mainframe and another mainframe or a Remote Job Entry (RJE) terminal such as the IBM 2780 or IBM 3780. The RJE terminals support a limited number of data formats: punched card images in and out and print line images to the terminal.
Some non-IBM hardware vendors such as Mohawk Data Sciences used Bisync for other purposes such as tape-to-tape transmission. A programmer can easily emulate an RJE terminal or other device.
IBM offered assembler language macros to provide programming support. During the System/360 era, these access methods were BTAM (Basic Telecommunications Access Method) and QTAM (Queued Telecommunications Access Method) – which was later replaced by Telecommunications Access Method (TCAM). IBM introduced VTAM (Virtual Telecommunications Access Method) with the System/370.
Teleprocessing monitors such as IBM's CICS and third-party software such as Remote DUCS (display unit control system) and Westi platforms used Bisync line control to communicate with remote devices.
The academic computing network Bitnet, together with connecting networks in other geographic areas, used Bisync to connect 3000 computer systems at its peak.
Financial network S.W.I.F.T. used BSC protocol for communication between Regional Center and Institution (bank) server over leased line. In a mid-1990 BSC was replaced by the X.25 infrastructure.
Some important systems use Bisync data framing with a different link control protocol. Houston Automatic Spooling Priority (HASP) uses Bisync half-duplex hardware in conjunction with its own link control protocol to provide full-duplex multi-datastream communication between a small computer and a mainframe running HASP. In Bisync terms, this is conversational mode.
Some early X.25 networks tolerated a connection scheme where transparent Bisync data frames encapsulated HDLC LAPB data and control packets. , several vendors encapsulate Bisync transmissions within TCP/IP data streams.
Disposition
Bisync began to be displaced in the 1970s by Systems Network Architecture (SNA) which allows construction of a network with multiple hosts and multiple programs using telecommunications. X.25 and the Internet Protocol are later protocols which, like SNA, provide more than mere link control.
Devices
A large number of devices use the Bisync protocol, some of these are:
IBM 3270 Display Terminal Subsystem control units.
IBM 2780 Data Transmission Terminal.
IBM 2703 Transmission Control.
IBM HASP workstations.
IBM 1130 Computing System.
IBM 2922 Programmable Terminal.
Comparable protocols
Other computer vendors offered their own variety of byte-oriented protocols similar to Bisync. Some widely used protocols include Digital Equipment Corporation's Digital Data Communications Message Protocol, and Burroughs Corporation's Poll and Select Protocol.
See also
Asynchronous communication
References
Further reading
Detailed discussion of Bisync link control by Charles A Wilde (new link)
A detailed description of the protocol.
Bisync & STR programming for IBM 1130
Link protocols
IBM computer hardware |
```java
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
package org.flowable.engine.test.el.function;
import static org.assertj.core.api.Assertions.assertThat;
import java.util.Arrays;
import org.apache.commons.codec.binary.Base64;
import org.flowable.engine.impl.test.PluggableFlowableTestCase;
import org.flowable.engine.runtime.ProcessInstance;
import org.flowable.engine.test.Deployment;
import org.junit.jupiter.api.Test;
/**
* Note that the function expressions also are tested in the cmmn module (VariableFunctionDelegatesTest),
* as such this test will not test the detailed behavior, but simply that it works in BPMN context.
*
* @author Joram Barrez
*/
public class VariableExpressionFunctionsTest extends PluggableFlowableTestCase{
@Test
@Deployment
public void testGetVariable() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "go to A")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableOrDefault() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A"); // Default is 123
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 1)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 999)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableContains() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Arrays.asList(2, 3, 4))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Arrays.asList(1, 2, 3, 4))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableContainsAny() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Arrays.asList(3, 4))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Arrays.asList(2, 3, 4))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Arrays.asList(1, 2, 3, 4))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableEquals() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 12)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 123)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableNotEquals() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "hello")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "test")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableExists() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "hello")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableIsEmpty() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "abc")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
}
@Test
@Deployment
public void testGetVariableIsNotEmpty() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "abc")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableLowerThan() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 1)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 10)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 11)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
}
@Test
@Deployment
public void testGetVariableLowerThanOrEqual() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 1)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 10)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 11)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
}
@Test
@Deployment
public void testGetVariableGreaterThan() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 1)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 10)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 11)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testGetVariableGreaterThanOrEqual() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 1)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 10)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", 11)
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testVariableBase64() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "test")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", "hello")
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
@Test
@Deployment
public void testVariableBase64Binary() {
ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("testExpressionFunction");
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Base64.decodeBase64("SGFsbG8sIGhhbGxvIC0gVGVzdCBXUk9ORyE="))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("B");
processInstance = runtimeService.createProcessInstanceBuilder()
.processDefinitionKey("testExpressionFunction")
.variable("myVar", Base64.decodeBase64("SGFsbG8sIGhhbGxvIC0gVGVzdA=="))
.start();
assertThat(taskService.createTaskQuery().processInstanceId(processInstance.getId()).singleResult().getName()).isEqualTo("A");
}
}
``` |
```go
/*
path_to_url
Unless required by applicable law or agreed to in writing, software
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
// Code generated by client-gen. DO NOT EDIT.
package fake
import (
"context"
json "encoding/json"
"fmt"
v1beta2 "k8s.io/api/apps/v1beta2"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
labels "k8s.io/apimachinery/pkg/labels"
types "k8s.io/apimachinery/pkg/types"
watch "k8s.io/apimachinery/pkg/watch"
appsv1beta2 "k8s.io/client-go/applyconfigurations/apps/v1beta2"
testing "k8s.io/client-go/testing"
)
// FakeReplicaSets implements ReplicaSetInterface
type FakeReplicaSets struct {
Fake *FakeAppsV1beta2
ns string
}
var replicasetsResource = v1beta2.SchemeGroupVersion.WithResource("replicasets")
var replicasetsKind = v1beta2.SchemeGroupVersion.WithKind("ReplicaSet")
// Get takes name of the replicaSet, and returns the corresponding replicaSet object, and an error if there is any.
func (c *FakeReplicaSets) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1beta2.ReplicaSet, err error) {
obj, err := c.Fake.
Invokes(testing.NewGetAction(replicasetsResource, c.ns, name), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
// List takes label and field selectors, and returns the list of ReplicaSets that match those selectors.
func (c *FakeReplicaSets) List(ctx context.Context, opts v1.ListOptions) (result *v1beta2.ReplicaSetList, err error) {
obj, err := c.Fake.
Invokes(testing.NewListAction(replicasetsResource, replicasetsKind, c.ns, opts), &v1beta2.ReplicaSetList{})
if obj == nil {
return nil, err
}
label, _, _ := testing.ExtractFromListOptions(opts)
if label == nil {
label = labels.Everything()
}
list := &v1beta2.ReplicaSetList{ListMeta: obj.(*v1beta2.ReplicaSetList).ListMeta}
for _, item := range obj.(*v1beta2.ReplicaSetList).Items {
if label.Matches(labels.Set(item.Labels)) {
list.Items = append(list.Items, item)
}
}
return list, err
}
// Watch returns a watch.Interface that watches the requested replicaSets.
func (c *FakeReplicaSets) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
return c.Fake.
InvokesWatch(testing.NewWatchAction(replicasetsResource, c.ns, opts))
}
// Create takes the representation of a replicaSet and creates it. Returns the server's representation of the replicaSet, and an error, if there is any.
func (c *FakeReplicaSets) Create(ctx context.Context, replicaSet *v1beta2.ReplicaSet, opts v1.CreateOptions) (result *v1beta2.ReplicaSet, err error) {
obj, err := c.Fake.
Invokes(testing.NewCreateAction(replicasetsResource, c.ns, replicaSet), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
// Update takes the representation of a replicaSet and updates it. Returns the server's representation of the replicaSet, and an error, if there is any.
func (c *FakeReplicaSets) Update(ctx context.Context, replicaSet *v1beta2.ReplicaSet, opts v1.UpdateOptions) (result *v1beta2.ReplicaSet, err error) {
obj, err := c.Fake.
Invokes(testing.NewUpdateAction(replicasetsResource, c.ns, replicaSet), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
// UpdateStatus was generated because the type contains a Status member.
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
func (c *FakeReplicaSets) UpdateStatus(ctx context.Context, replicaSet *v1beta2.ReplicaSet, opts v1.UpdateOptions) (*v1beta2.ReplicaSet, error) {
obj, err := c.Fake.
Invokes(testing.NewUpdateSubresourceAction(replicasetsResource, "status", c.ns, replicaSet), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
// Delete takes name of the replicaSet and deletes it. Returns an error if one occurs.
func (c *FakeReplicaSets) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
_, err := c.Fake.
Invokes(testing.NewDeleteActionWithOptions(replicasetsResource, c.ns, name, opts), &v1beta2.ReplicaSet{})
return err
}
// DeleteCollection deletes a collection of objects.
func (c *FakeReplicaSets) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
action := testing.NewDeleteCollectionAction(replicasetsResource, c.ns, listOpts)
_, err := c.Fake.Invokes(action, &v1beta2.ReplicaSetList{})
return err
}
// Patch applies the patch and returns the patched replicaSet.
func (c *FakeReplicaSets) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1beta2.ReplicaSet, err error) {
obj, err := c.Fake.
Invokes(testing.NewPatchSubresourceAction(replicasetsResource, c.ns, name, pt, data, subresources...), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
// Apply takes the given apply declarative configuration, applies it and returns the applied replicaSet.
func (c *FakeReplicaSets) Apply(ctx context.Context, replicaSet *appsv1beta2.ReplicaSetApplyConfiguration, opts v1.ApplyOptions) (result *v1beta2.ReplicaSet, err error) {
if replicaSet == nil {
return nil, fmt.Errorf("replicaSet provided to Apply must not be nil")
}
data, err := json.Marshal(replicaSet)
if err != nil {
return nil, err
}
name := replicaSet.Name
if name == nil {
return nil, fmt.Errorf("replicaSet.Name must be provided to Apply")
}
obj, err := c.Fake.
Invokes(testing.NewPatchSubresourceAction(replicasetsResource, c.ns, *name, types.ApplyPatchType, data), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
// ApplyStatus was generated because the type contains a Status member.
// Add a +genclient:noStatus comment above the type to avoid generating ApplyStatus().
func (c *FakeReplicaSets) ApplyStatus(ctx context.Context, replicaSet *appsv1beta2.ReplicaSetApplyConfiguration, opts v1.ApplyOptions) (result *v1beta2.ReplicaSet, err error) {
if replicaSet == nil {
return nil, fmt.Errorf("replicaSet provided to Apply must not be nil")
}
data, err := json.Marshal(replicaSet)
if err != nil {
return nil, err
}
name := replicaSet.Name
if name == nil {
return nil, fmt.Errorf("replicaSet.Name must be provided to Apply")
}
obj, err := c.Fake.
Invokes(testing.NewPatchSubresourceAction(replicasetsResource, c.ns, *name, types.ApplyPatchType, data, "status"), &v1beta2.ReplicaSet{})
if obj == nil {
return nil, err
}
return obj.(*v1beta2.ReplicaSet), err
}
``` |
List of software for cluster management.
Free and open source
HA
Apache Mesos, from the Apache Software Foundation
Kubernetes, founded by Google Inc, from the Cloud Native Computing Foundation
Heartbeat, from Linux-HA
Docker Swarm
Red Hat cluster suite
OpenShift and OKD, from Red Hat
Nomad, from HashiCorp
Rancher, from Rancher Labs
TrinityX from ClusterVision Solutions
Corosync Cluster Engine
OpenSVC
K3s (“Lightweight Kubernetes“), from Rancher Labs
non-HA
oneSIS
OpenHPC
OpenSAF, founded by Motorola, from OpenSAF Foundation, implements Service Availability Forum
Rocks Cluster Distribution
Stacki, from StackIQ
YARN, distributed with Apache Hadoop
xCAT
Warewulf
Foreman
Proprietary
Amazon Elastic Container Service
Borg, used at Google
Bright Cluster Manager, from Bright Computing
CycleCloud, from Cycle Computing acquired By Microsoft
IBM Tivoli System Automation for Multiplatforms, from IBM
Microsoft Cluster Server, from Microsoft
Twine, from Facebook
HPE Performance Cluster Manager - HPCM, from Hewlett Packard Enterprise Company
Dell/EMC - Remote Cluster Manager (RCM)
Aspen Systems Inc - Aspen Cluster Management Environment (ACME)
Evidian SafeKit
IBM PowerHA system mirror
Veritas Cluster Server
See also
Comparison of cluster software
References
Cluster computing
Cluster management software |
Keith Frankish is a British philosopher specializing in philosophy of mind, philosophy of psychology, and philosophy of cognitive science. He is an Honorary Reader at the University of Sheffield, UK, Visiting Research Fellow with The Open University, and adjunct Professor with the Brain and Mind Programme at the University of Crete. He is known for his "illusionist" stance in the theory of consciousness. He holds that the conscious mind is a virtual system, a trick of the biological mind. In other words, phenomenality is an introspective illusion. This position is in opposition to dualist theories, reductive realist theories, and panpsychism.
Biography
Early life and education
Born and raised near Doncaster in South Yorkshire, England, Frankish says he spent many hours alone reading due to childhood illness. His heroes were the cricketer Geoff Boycott, the fictional aviator Biggles, and the zoologist and humorous author Gerald Durrell.
His undergraduate work was done at The Open University, where he took courses in literature, ancient history, and philosophy. He contemplated becoming a classicist but was later drawn to philosophy and psychology. He chose Philosophy of Mind because it encompassed most all his previous academic interests. His postgraduate education was at the University of Sheffield. He wrote his concluding master's thesis on Daniel Dennett’s belief/opinion distinction. He continued at Sheffield as a doctoral student, supported by a British Academy studentship. His PhD thesis, which was supervised by Peter Carruthers and Chris Hookway, "distinguished two types of belief and argued for a two-level framework for folk psychology."
While at Sheffield he held a Temporary Lectureship in the Philosophy Department, teaching courses in mind, language, and action and was closely involved in the work of the Hang Seng Centre for Cognitive Studies.
Career
In 1999, he returned to The Open University, this time as a lecturer in the Philosophy Department at the university's main campus in Milton Keynes.
Frankish was a Senior Member of Robinson College, Cambridge, and acted as a Director of Studies for the college, overseeing the work of the college's cohort of philosophy students.
He moved to Crete, Greece in 2008. In 2008-9 he was a Visiting Researcher in the Department of Philosophy and Social Studies at the University of Crete, and from 2010 he has been an adjunct professor with the university's Brain and Mind Program. In 2017 he rejoined the Sheffield Philosophy Department as an Honorary Reader.
He has published and edited many books and written twelve articles in refereed journals. As of 2019, his academic papers have over 1,700 citations. In addition to his academic writing, he frequently contributes to Aeon magazine.
In 2021, he and Philip Goff, a colleague who defends the opposing view of panpsychism, started the YouTube channel "Mind Chat" on which they interview significant scientists and philosophers of consciousness, such as Tim O'Connor, Janet Levin, Christof Koch, Anil Seth, and Helen Yetter-Chappell.
Views
Illusionism
Frankish is known for espousing the view that phenomenality is an introspective illusion. "We humans have learned a variety of subtle but powerful tricks — strategies of self-control, self-manipulation, and extended problem-solving — which vastly extend the power of our biological brains and give us the sense of having a unified, phenomenally conscious mind, self, or soul."
Early in his career he took a “robustly materialist stance” and attempted to rebut the zombie argument popularized by David Chalmers. In 2007, when he wrote the "Anti-Zombie Argument," he endorsed a weak form of realism about qualia. In later work, however, he rejected phenomenal realism altogether, arguing that “materialists should be thoroughgoing eliminativists about qualia.” He called this stance “illusionism.”
He defended this position in the 2014 ‘consciousness cruise’ off Greenland sponsored by Dimitri Volkov and the Moscow Center for Consciousness Studies. It was a floating conference that featured prominent philosophers of mind such as David Chalmers, Paul Churchland, Patricia Churchland, Andy Clark, Daniel Dennett, Philip Goff, Nicholas Humphrey, Jesse Prinz, and Derk Pereboom.
In 2016 he wrote a target article for a special issue of the Journal of Consciousness Studies, which included many responses by both supporters and critics of the position.
In 2019, William Ramsey summarized the eliminative materialist argument thusly:
In 2020, Frankish summed up the position:
Response
In a follow-up to his target article in the Journal of Consciousness Studies, Frankish summarized the reactions to his article. He labeled as "sceptics" Susan Blackmore, Nicholas Humphrey, Pete Mandik, and Eric Schwitzgebel. In the category of "opponents" he included thinkers such as Katalin Balog, Philip Goff, Martine Nida-Rümelin, and Jesse Prinz. Additionally, Paul Boghossian has argued that eliminative materialism is self-refuting, since the theory itself presupposes the existence of mental phenomena.
Jesse Prinz sought to rebut Frankish's illusionism from the perspective of reductive realism. He asserted that either illusionism collapses into realism or it introduces a deep puzzle similar to the hard problem of consciousness. Prinz concludes "that reductive realism is more compelling." Galen Strawson called it the silliest claim ever made and compared it to Flat Eartherism.
Frankish counts Daniel Dennett, Jay Garfield, Georges Rey, Amber Ross and James Tartaglia as "advocates," and amongst the "explorers" of this idea, he counts François Kammerer, Michael Graziano, Nicole Marinsek, Derk Pereboom and Michael Gazzaniga.
Other interests
Frankish has published papers on the semantics of indirect discourse and conversational implicature (with Maria Kasmirli) and co-edited a volume of research papers in philosophy of action, New Waves in Philosophy of Action.
Conferences organized
Frankish has co-organized two academic conferences.
In Two Minds conference, Cambridge 2006
An interdisciplinary conference on dual-process theories of reasoning and rationality, organized by the Department of Philosophy at the Open University, and held at Fitzwilliam College Cambridge on 5–7 July 2006.Organized by Keith Frankish and Carolyn Price of The Open University and Jonathan Evans from the University of Plymouth.
Phenomenality and Intentionality conference, Crete 2012
An international conference on the relation between the phenomenal and intentional contents of experience, co-sponsored by the University of Crete's Brain and Mind Programme and Department of Philosophy and Social Studies and held at the Historical Museum of Crete, Heraklion, Crete, Greece, from Tuesday 12 June to Thursday 14 June 2012. Organized by Keith Frankish (The Open University & University of Crete) and Maria Venieri (The University of Crete).
Selected publications
Books
Mind and Supermind (2004)
Consciousness (2005)
In Two Minds: Dual Processes and Beyond (2009)
New Waves in Philosophy of Action (2010)
The Cambridge Handbook of Cognitive Science (2012)
The Cambridge Handbook of Artificial Intelligence (2014)
Cognitive Unconscious and Human Intelligence (2016)
Illusionism as a Theory of Consciousness (2017)
Consciousness: The Basics (2021)
See also
Consciousness Explained
References
Living people
Year of birth missing (living people)
Philosophers of mind
British cognitive scientists
20th-century British philosophers
21st-century British philosophers
Academic staff of the University of Crete |
Carlos Adolfo Urueta (1873 – September 13, 1931) was a Colombian statesman. He was the Ambassador of Colombia to the United States from June 11, 1917 to October 15, 1921. He was the Minister of Foreign Affairs in 1921. He was the Minister of National Defense starting on July 27, 1931 to his death.
Biography
He was born in 1873 in Ayapel, Colombia and he attended the University of Bolivar, at Cartagena.
He was the Ambassador of Colombia to the United States starting on June 11, 1917 and was succeeded by Carlos Uribe on October 15, 1921.
He was the Minister of Foreign Affairs in 1921. He was the Minister of National Defense starting on July 27, 1931 to his death.
He died on September 13, 1931.
References
1873 births
1931 deaths
Foreign ministers of Colombia
Ambassadors of Colombia to the United States
Colombian Ministers of Defense |
France competed at the inaugural Summer Paralympic Games in 1960 in Rome. France's six athletes competed in four sports: archery, athletics, dartchery and swimming. All of France's athletes obtained medals in every event they competed in.
Medallists
Archery
France entered three competitors in archery.
Trouverie and Delapietra (full names not recorded) competed in the Men's Columbia round open. Trouverie took the gold medal with 550 points. Delapietra took silver, although his score of 544 was equal to that of Britain's Hepple, who was awarded bronze.
In the Men's St. Nicholas round open, Figoni, for France, took silver with 648 points - behind Sutton of Australia, who scored 670, and ahead of Sones of the United States (636).
Athletics
France's only entry in athletics was Barbier, who took gold in the Men's club throw (category B) with a throw of 38.24m.
Dartchery
Bernabei and Trouverie, France's representatives in dartchery, finished third in the Mixed pairs open and took bronze.
Swimming
Jarrige was France's only entry in swimming, and competed in two events:
In the Men's 25 metre crawl juniors incomplete class 2, he was the only competitor, and won gold by completing the race with a time of 41.9.
In the Men's 25 metre backstroke juniors incomplete class 2, he was one of only two competitors. His time of 46.8, well behind the time of 26.8 achieved by Kalberg of Norway, earned him the silver medal.
See also
France at the 1960 Summer Olympics
References
External links
International Paralympic Committee official website
Nations at the 1960 Summer Paralympics
1960
Paralympics |
Carter Presidential Center can refer to:
Carter Center
Jimmy Carter Library and Museum |
Dawn of Chromatica is the third remix album by American singer Lady Gaga, released on September 3, 2021, by Streamline and Interscope Records. Consisting of remixes of songs from Gaga's sixth studio album, Chromatica (2020), the album embraces an underground, hyperpop production and features collaborations with numerous pop, electronic and brazilian musicians.
Gaga's goal with her album was to display her love and support towards younger and upcoming artists. The featured acts include Arca, Rina Sawayama, Pabllo Vittar, Charli XCX, Ashnikko, Shygirl, Dorian Electra and Bree Runway, while retaining the contributions of Ariana Grande, Blackpink, and Elton John from the original album. Dawn of Chromatica received generally favorable reviews from music critics, who underscored its experimental nature. Commercially, it peaked at number 66 on the US Billboard 200, while topping the Dance/Electronic Albums chart.
Background and recording
On March 2, 2020, American singer Lady Gaga announced that her sixth album, Chromatica, was to be released on April 10. The album was later postponed due to the COVID-19 pandemic, though it was eventually released on May 29, 2020. On April 4, 2021, the album's executive producer, BloodPop, teased the possibility of a Chromatica remix album, asking his Twitter followers to suggest which artists they would like to see on such a project if it were to exist. He later replied to his tweet and tagged Japanese-British musician Rina Sawayama, who replied to it with a smirking emoji. He also confirmed he was working with British musician Charli XCX on a remix of the album's third single "911", and that the remix album would include an early version of "Babylon" that soundtracked an advertisement for Gaga's cosmetics brand Haus Laboratories. On May 8, BloodPop revealed on his Twitter that American musician Dorian Electra would be on the album. During an interview at the 2021 Brit Awards, Sawayama talked about the project, stating that "The wish is on the internet, and I've done my bit, let's just say that. So, it's in the works." She also hinted that the song she was featured on was "Free Woman".
On May 12, 2021, Charli XCX announced that production for the "911" remix had begun. Later that month, British musician Bree Runway revealed she was involved with the remix album during an interview on The Jonathan Ross Show, while on August 10, announcing she would appear on a remix of "Babylon" by tweeting out its lyrics. That same day, Gaga acknowledged the album for the first time, saying that it was "so f*cking " in a tweet, and American singer and rapper Ashnikko confirmed her involvement with the project. A snippet of her "Plastic Doll" remix was teased by RuPaul's Drag Race winner Aquaria during a DJ set in the weeks leading up to the album's announcement. During the same period of time, the brazilian singer and drag queen Pabllo Vittar hinted that she would be featured on a remix of the song "Fun Tonight" bringing dancing brazilian rhythms such as forró and brega-pop, and American producer Lil Texas confirmed his involvement by posting a short snippet of his remix of "Sine from Above". Other announced contributors include British musician Shygirl and Venezuelan producer Arca, who revealed to her Discord fan server that she had remixed Chromaticas second single "Rain on Me", which features American singer Ariana Grande.
In July 2021, Canadian producer and singer Grimes announced on her Discord that she had produced remixes of the three interludes featured on Chromatica. She mentioned that she initially missed the deadline to submit them to the record label, but later speculated that due to the project's delay, there would be time. However, after the album's official announcement on August 30, 2021, it was apparent that Grimes' contributions did not make the cut.
Talking about the album, Maureen Lee Lenker of Entertainment Weekly opined that "while most remix albums are a further celebration of the lead artist's music, the forward-thinking Lady Gaga uses Dawn of Chromatica to also spotlight some of the recent pop talent that's blossomed in her image." In an interview with The Wall Street Journal after the release of the record, Gaga said: "I love young artists and support them. All of them on the album have something to say, and they performed their hearts out."
Composition
Dawn of Chromatica contains mainly underground pop and hyperpop sound. The album opens with "Alice" remixed by the Berlin-based Philadelphian rapper and producer Lsdxoxo, who described it as . The second song in the track list, "Stupid Love", is remixed by the French producer Coucou Chloe, who "strips away the lead single's bubblegum beats to reveal a macabre midnight romp". Arca's remix of "Rain on Me" follows as the third track; she introduces synths in the song and samples the songs "Time" and "Mequetrefe" off her fourth studio album Kick I (2020), as well as the Changa tuki track "Mételo Sácalo" by DJ Yirvin. Rina Sawayama and English producer Clarence Clarity's remix of "Free Woman" features influences of metal with wailing riffs and drum fills, which resembles Gaga's 2011 studio album Born This Way. Sawayama starts the songs saying "let's go Gaga". Pabllo Vittar's reimagination of "Fun Tonight" consists of forró music.
The Charli XCX and English producer A. G. Cook remix of "911" gives a "transcendental" sound to the original version, with an overly distorted chorus and a new verse with lines such as "I look out to Venus and search for a place / And search for a place / And sometimes I hate myself" and "If it's all getting way harder / Turn it up, party to Gaga". Ashnikko remixed "Plastic Doll" into a trap version, changing its mid-tempo composition." "Sour Candy", featuring South Korean girl group Blackpink, receives a "booty-popping" club version by Shygirl and the Guernsey producer Mura Masa, and includes little metallic whizzes. The remix, however, retains vocal contributions of Blackpink's Rosé and Lisa only, removing those of Jennie and Jisoo. The album follows with an EDM remix of "Enigma" by American producer Doss, featuring "pulsating drops". Dorian Electra's remix of "Replay" is influenced by metal and features "dramatic vocals" and "menacing growls".
"Sine from Above", a duet with English musician Elton John, was remixed by American musician Chester Lockhart, Canadian musician Mood Killer, and Lil Texas. Their version features distorted bass, glitched trap, drum & bass, cartoonish sound samples, a sax solo and finishes with hardstyle music. English musician Planningtorock's turns "1000 Doves" into a new wave track with house music influence. The album closes with two versions of "Babylon": the "throbbing techno revamp" featuring Bree Runway and American producer Jimmy Edgar, alongside the "sledgehammering" Haus Labs version.
Although BloodPop previously teased potential release of Gaga's collaborations with late Scottish producer Sophie that were scrapped from the original album, none of the songs appear on Dawn of Chromatica. Sam Murphy of Junkee nevertheless acknowledged the "impact she has had on this futuristic brand of pop music. [...] The hyperpop movement [...] can largely be traced back to Sophie, and all the artists who appear here display some of Sophie's influence." The producers of the "Sine from Above" remix further underscored this. Mood Killer stated that Sophie's "presence is all over the remix album. It's undeniable; she's part of the fabric of our scene and the industry, or whatever — our corner of it." Chesther Lockhart added that "even if the style is different, so many of the sounds and the forward-thinking-ness and the ability to use electronic instruments in a different way is inspired by Sophie's impact on this underground electronic music scene over the past decade."
Release
Dawn of Chromatica was officially announced on August 30, 2021, and released on September 3, on streaming and digital download formats. Its CD was released on November 19, 2021, while the vinyl was released in March 2022. On the release day, Gaga posted a video of herself with cartoon filters through her social media. It included a snippet from the breakdown of the "Sine from Above" remix, along with a message encouraging her followers to "smile and dance through the pain". In a further Twitter post, she invited her followers to celebrate the album's artists "who see the world, feel the world, and put that feeling into something bigger than all of us: music."
Critical reception
According to Metacritic, which assigns a normalized rating out of 100 to reviews from mainstream critics, Dawn of Chromatica received a score of 74 based on four reviews, indicating "generally favorable reviews".
Neil Z. Yeung of AllMusic called the album "the daring and liberated sibling" to Chromatica, with "wild, sometimes noisy, and always thrilling reimaginings." Dubbing it "brilliantly entertaining", Robin Murray from Clash stated that "this remix compilation is an excuse to adore Lady Gaga for her abilities as a cultural curator, one of this generation's few – only – true interstellar pop talents." Sam Murphy of Junkee thought that the remix album "unlocks the thrilling potential of the original", adding that "the whole album is noisy and garish, but it's thrilling to hear Gaga in a sonic arena that's uninhibited by what is happening in the mainstream. Wolfgang Ruth of Vulture claimed that "filled with sliving remixes containing sliving features [...] this record is, no surprise, next level." Writing for Gigwise, Alex Rigotti referred to it as "deliciously dramatic pop insanity".
According to Pitchfork Jamieson Cox, Dawn of Chromatica is "less a wall-to-wall collection of club bangers than an expansion of the Chromatica cinematic universe," and feels "less like a celebration of a world-beating record and more like passing the torch." Tom Hull described the album as "beats sharpened, persona reduced, like a filter that turns realistic photos into caricatures." Vinyl Chapters Caillou Pettis believed that "Lady Gaga managed to compile a bunch of great artists to remix Chromatica to excellent results. It’s not as good as the original record, but it does put a unique and extremely entertaining fresh coat of paint on the album...". He further called it "genuinely amazing and an absolute blast to listen to". Alexa Camp of Slant Magazine was more critical, opining "the album is a mixed bag, swinging wildly between microgenres and quality from track to track. If the original album favored pop hooks over musical invention, many of the versions on Dawn of Chromatica are noisy or just plain tuneless."
Commercial performance
In the United States, Dawn of Chromatica debuted at number 66 on the Billboard 200 chart with 11,000 album-equivalent units, while topping the Dance/Electronic Albums chart. This made Gaga tie the record for the most cumulative number one dance albums and extend her record as the artist with the most cumulative weeks at number one (at 211 weeks). She also became the first artist in history to occupy the top four positions in a single week, with Dawn of Chromatica, Born This Way (2011), The Fame (2008), and Chromatica (2020), respectively.
Track listing
Notes
signifies a songwriter that is only listed on physical editions of the album.
"Rain on Me" samples "All This Love That I'm Givin'", written by Jeremiah Burden, Lynn Williams and Betty Wright, performed by Gwen McCrae.
"Replay" samples "It's My House", written by Nickolas Ashford and Valerie Simpson, performed by Diana Ross.
Charts
Release history
References
External links
Official website
2021 remix albums
Albums produced by BloodPop
Hyperpop albums
Interscope Records albums
Lady Gaga compilation albums
Lady Gaga remix albums |
```go
// Code generated by "stringer -output func_string.go -type=BuiltinFunc"; DO NOT EDIT.
package asm
import "strconv"
func _() {
// An "invalid array index" compiler error signifies that the constant values have changed.
// Re-run the stringer command to generate them again.
var x [1]struct{}
_ = x[FnUnspec-0]
_ = x[FnMapLookupElem-1]
_ = x[FnMapUpdateElem-2]
_ = x[FnMapDeleteElem-3]
_ = x[FnProbeRead-4]
_ = x[FnKtimeGetNs-5]
_ = x[FnTracePrintk-6]
_ = x[FnGetPrandomU32-7]
_ = x[FnGetSmpProcessorId-8]
_ = x[FnSkbStoreBytes-9]
_ = x[FnL3CsumReplace-10]
_ = x[FnL4CsumReplace-11]
_ = x[FnTailCall-12]
_ = x[FnCloneRedirect-13]
_ = x[FnGetCurrentPidTgid-14]
_ = x[FnGetCurrentUidGid-15]
_ = x[FnGetCurrentComm-16]
_ = x[FnGetCgroupClassid-17]
_ = x[FnSkbVlanPush-18]
_ = x[FnSkbVlanPop-19]
_ = x[FnSkbGetTunnelKey-20]
_ = x[FnSkbSetTunnelKey-21]
_ = x[FnPerfEventRead-22]
_ = x[FnRedirect-23]
_ = x[FnGetRouteRealm-24]
_ = x[FnPerfEventOutput-25]
_ = x[FnSkbLoadBytes-26]
_ = x[FnGetStackid-27]
_ = x[FnCsumDiff-28]
_ = x[FnSkbGetTunnelOpt-29]
_ = x[FnSkbSetTunnelOpt-30]
_ = x[FnSkbChangeProto-31]
_ = x[FnSkbChangeType-32]
_ = x[FnSkbUnderCgroup-33]
_ = x[FnGetHashRecalc-34]
_ = x[FnGetCurrentTask-35]
_ = x[FnProbeWriteUser-36]
_ = x[FnCurrentTaskUnderCgroup-37]
_ = x[FnSkbChangeTail-38]
_ = x[FnSkbPullData-39]
_ = x[FnCsumUpdate-40]
_ = x[FnSetHashInvalid-41]
_ = x[FnGetNumaNodeId-42]
_ = x[FnSkbChangeHead-43]
_ = x[FnXdpAdjustHead-44]
_ = x[FnProbeReadStr-45]
_ = x[FnGetSocketCookie-46]
_ = x[FnGetSocketUid-47]
_ = x[FnSetHash-48]
_ = x[FnSetsockopt-49]
_ = x[FnSkbAdjustRoom-50]
_ = x[FnRedirectMap-51]
_ = x[FnSkRedirectMap-52]
_ = x[FnSockMapUpdate-53]
_ = x[FnXdpAdjustMeta-54]
_ = x[FnPerfEventReadValue-55]
_ = x[FnPerfProgReadValue-56]
_ = x[FnGetsockopt-57]
_ = x[FnOverrideReturn-58]
_ = x[FnSockOpsCbFlagsSet-59]
_ = x[FnMsgRedirectMap-60]
_ = x[FnMsgApplyBytes-61]
_ = x[FnMsgCorkBytes-62]
_ = x[FnMsgPullData-63]
_ = x[FnBind-64]
_ = x[FnXdpAdjustTail-65]
_ = x[FnSkbGetXfrmState-66]
_ = x[FnGetStack-67]
_ = x[FnSkbLoadBytesRelative-68]
_ = x[FnFibLookup-69]
_ = x[FnSockHashUpdate-70]
_ = x[FnMsgRedirectHash-71]
_ = x[FnSkRedirectHash-72]
_ = x[FnLwtPushEncap-73]
_ = x[FnLwtSeg6StoreBytes-74]
_ = x[FnLwtSeg6AdjustSrh-75]
_ = x[FnLwtSeg6Action-76]
_ = x[FnRcRepeat-77]
_ = x[FnRcKeydown-78]
_ = x[FnSkbCgroupId-79]
_ = x[FnGetCurrentCgroupId-80]
_ = x[FnGetLocalStorage-81]
_ = x[FnSkSelectReuseport-82]
_ = x[FnSkbAncestorCgroupId-83]
_ = x[FnSkLookupTcp-84]
_ = x[FnSkLookupUdp-85]
_ = x[FnSkRelease-86]
_ = x[FnMapPushElem-87]
_ = x[FnMapPopElem-88]
_ = x[FnMapPeekElem-89]
_ = x[FnMsgPushData-90]
_ = x[FnMsgPopData-91]
_ = x[FnRcPointerRel-92]
_ = x[FnSpinLock-93]
_ = x[FnSpinUnlock-94]
_ = x[FnSkFullsock-95]
_ = x[FnTcpSock-96]
_ = x[FnSkbEcnSetCe-97]
_ = x[FnGetListenerSock-98]
_ = x[FnSkcLookupTcp-99]
_ = x[FnTcpCheckSyncookie-100]
_ = x[FnSysctlGetName-101]
_ = x[FnSysctlGetCurrentValue-102]
_ = x[FnSysctlGetNewValue-103]
_ = x[FnSysctlSetNewValue-104]
_ = x[FnStrtol-105]
_ = x[FnStrtoul-106]
_ = x[FnSkStorageGet-107]
_ = x[FnSkStorageDelete-108]
_ = x[FnSendSignal-109]
_ = x[FnTcpGenSyncookie-110]
_ = x[FnSkbOutput-111]
_ = x[FnProbeReadUser-112]
_ = x[FnProbeReadKernel-113]
_ = x[FnProbeReadUserStr-114]
_ = x[FnProbeReadKernelStr-115]
_ = x[FnTcpSendAck-116]
_ = x[FnSendSignalThread-117]
_ = x[FnJiffies64-118]
_ = x[FnReadBranchRecords-119]
_ = x[FnGetNsCurrentPidTgid-120]
_ = x[FnXdpOutput-121]
_ = x[FnGetNetnsCookie-122]
_ = x[FnGetCurrentAncestorCgroupId-123]
_ = x[FnSkAssign-124]
_ = x[FnKtimeGetBootNs-125]
_ = x[FnSeqPrintf-126]
_ = x[FnSeqWrite-127]
_ = x[FnSkCgroupId-128]
_ = x[FnSkAncestorCgroupId-129]
_ = x[FnRingbufOutput-130]
_ = x[FnRingbufReserve-131]
_ = x[FnRingbufSubmit-132]
_ = x[FnRingbufDiscard-133]
_ = x[FnRingbufQuery-134]
_ = x[FnCsumLevel-135]
_ = x[FnSkcToTcp6Sock-136]
_ = x[FnSkcToTcpSock-137]
_ = x[FnSkcToTcpTimewaitSock-138]
_ = x[FnSkcToTcpRequestSock-139]
_ = x[FnSkcToUdp6Sock-140]
_ = x[FnGetTaskStack-141]
_ = x[FnLoadHdrOpt-142]
_ = x[FnStoreHdrOpt-143]
_ = x[FnReserveHdrOpt-144]
_ = x[FnInodeStorageGet-145]
_ = x[FnInodeStorageDelete-146]
_ = x[FnDPath-147]
_ = x[FnCopyFromUser-148]
_ = x[FnSnprintfBtf-149]
_ = x[FnSeqPrintfBtf-150]
_ = x[FnSkbCgroupClassid-151]
_ = x[FnRedirectNeigh-152]
_ = x[FnPerCpuPtr-153]
_ = x[FnThisCpuPtr-154]
_ = x[FnRedirectPeer-155]
_ = x[FnTaskStorageGet-156]
_ = x[FnTaskStorageDelete-157]
_ = x[FnGetCurrentTaskBtf-158]
_ = x[FnBprmOptsSet-159]
_ = x[FnKtimeGetCoarseNs-160]
_ = x[FnImaInodeHash-161]
_ = x[FnSockFromFile-162]
_ = x[FnCheckMtu-163]
_ = x[FnForEachMapElem-164]
_ = x[FnSnprintf-165]
_ = x[FnSysBpf-166]
_ = x[FnBtfFindByNameKind-167]
_ = x[FnSysClose-168]
_ = x[FnTimerInit-169]
_ = x[FnTimerSetCallback-170]
_ = x[FnTimerStart-171]
_ = x[FnTimerCancel-172]
_ = x[FnGetFuncIp-173]
_ = x[FnGetAttachCookie-174]
_ = x[FnTaskPtRegs-175]
_ = x[FnGetBranchSnapshot-176]
_ = x[FnTraceVprintk-177]
_ = x[FnSkcToUnixSock-178]
_ = x[FnKallsymsLookupName-179]
_ = x[FnFindVma-180]
_ = x[FnLoop-181]
_ = x[FnStrncmp-182]
_ = x[FnGetFuncArg-183]
_ = x[FnGetFuncRet-184]
_ = x[FnGetFuncArgCnt-185]
_ = x[FnGetRetval-186]
_ = x[FnSetRetval-187]
_ = x[FnXdpGetBuffLen-188]
_ = x[FnXdpLoadBytes-189]
_ = x[FnXdpStoreBytes-190]
_ = x[FnCopyFromUserTask-191]
_ = x[FnSkbSetTstamp-192]
_ = x[FnImaFileHash-193]
_ = x[FnKptrXchg-194]
_ = x[FnMapLookupPercpuElem-195]
_ = x[FnSkcToMptcpSock-196]
_ = x[FnDynptrFromMem-197]
_ = x[FnRingbufReserveDynptr-198]
_ = x[FnRingbufSubmitDynptr-199]
_ = x[FnRingbufDiscardDynptr-200]
_ = x[FnDynptrRead-201]
_ = x[FnDynptrWrite-202]
_ = x[FnDynptrData-203]
_ = x[FnTcpRawGenSyncookieIpv4-204]
_ = x[FnTcpRawGenSyncookieIpv6-205]
_ = x[FnTcpRawCheckSyncookieIpv4-206]
_ = x[FnTcpRawCheckSyncookieIpv6-207]
_ = x[FnKtimeGetTaiNs-208]
_ = x[FnUserRingbufDrain-209]
_ = x[FnCgrpStorageGet-210]
_ = x[FnCgrpStorageDelete-211]
_ = x[maxBuiltinFunc-212]
}
const _BuiltinFunc_name = your_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashyour_sha256_hashStorageGetFnCgrpStorageDeletemaxBuiltinFunc"
var _BuiltinFunc_index = [...]uint16{0, 8, 23, 38, 53, 64, 76, 89, 104, 123, 138, 153, 168, 178, 193, 212, 230, 246, 264, 277, 289, 306, 323, 338, 348, 363, 380, 394, 406, 416, 433, 450, 466, 481, 497, 512, 528, 544, 568, 583, 596, 608, 624, 639, 654, 669, 683, 700, 714, 723, 735, 750, 763, 778, 793, 808, 828, 847, 859, 875, 894, 910, 925, 939, 952, 958, 973, 990, 1000, 1022, 1033, 1049, 1066, 1082, 1096, 1115, 1133, 1148, 1158, 1169, 1182, 1202, 1219, 1238, 1259, 1272, 1285, 1296, 1309, 1321, 1334, 1347, 1359, 1373, 1383, 1395, 1407, 1416, 1429, 1446, 1460, 1479, 1494, 1517, 1536, 1555, 1563, 1572, 1586, 1603, 1615, 1632, 1643, 1658, 1675, 1693, 1713, 1725, 1743, 1754, 1773, 1794, 1805, 1821, 1849, 1859, 1875, 1886, 1896, 1908, 1928, 1943, 1959, 1974, 1990, 2004, 2015, 2030, 2044, 2066, 2087, 2102, 2116, 2128, 2141, 2156, 2173, 2193, 2200, 2214, 2227, 2241, 2259, 2274, 2285, 2297, 2311, 2327, 2346, 2365, 2378, 2396, 2410, 2424, 2434, 2450, 2460, 2468, 2487, 2497, 2508, 2526, 2538, 2551, 2562, 2579, 2591, 2610, 2624, 2639, 2659, 2668, 2674, 2683, 2695, 2707, 2722, 2733, 2744, 2759, 2773, 2788, 2806, 2820, 2833, 2843, 2864, 2880, 2895, 2917, 2938, 2960, 2972, 2985, 2997, 3021, 3045, 3071, 3097, 3112, 3130, 3146, 3165, 3179}
func (i BuiltinFunc) String() string {
if i < 0 || i >= BuiltinFunc(len(_BuiltinFunc_index)-1) {
return "BuiltinFunc(" + strconv.FormatInt(int64(i), 10) + ")"
}
return _BuiltinFunc_name[_BuiltinFunc_index[i]:_BuiltinFunc_index[i+1]]
}
``` |
The Bratu-220 was a Franco-Romanian prototype three-engined airliner of the 1930s, built in France.
Development and usage
The aircraft was designed in 1929 by a Romanian engineer Romulus Bratu, who worked in France. Quite unusual was its arrangement, with one engine in a fuselage front, and the other two in a common nacelle over a wing, in a push-pull configuration. A model was tested in a laboratory of St. Cyr Aeronautical Institute. Parts of the plane were made in a factory at Athis-Mons, and assembled in the CIDNA workshops at Le Bourget airport.
The prototype was flown on 26 November 1932 and after tests, received a French airworthiness certificate. The plane had high useful load 4500 kg and could fly on two engines. In March 1933 it was shown to the French Minister of Air Pierre Cot.
Description
High-wing cantilever monoplane of wooden construction, with closed cab, three engines, and a fixed landing gear. Sparless wing, with slightly swept leading edge, straight rear edge and rounded tips, was basing on a geodetical structure of crossing ribs. Crew sat in a cab before the wing. Next and below in the fuselage, under the wing, there was a cabin for 10 passengers, with rectangular windows and access doors in front and at the rear. The landing-gear was of the conventional-type, with a tailwheel.
A single Gnome-Rhône Jupiter 420 hp radial engine was mounted in the nose of the fuselage, while two Gnome-Rhône Titan 230 hp radial engines were in a common nacelle on struts above the fuselage and wing, one of them was tractor, the other one pusher (push-pull configuration). All engines drove two-blade propellers and had no covers.
Specifications
See also
References
Bibliography
External links
Photos and drawings at Ugolok Neba site
Aircraft manufactured in France
1930s French airliners
Three-engined push-pull aircraft
High-wing aircraft
CIDNA aircraft
Aircraft first flown in 1932 |
```javascript
/* @flow */
declare var BAZ: {stuff?: (x: number) => void} | void;
``` |
Pigot was an East Indiaman that made five voyages to India, China, and the East Indies for the British East India Company (EIC) between 1780 and 1794. Oh her fifth voyage, which occurred early in the French Revolutionary Wars, the French captured her during the Sunda Strait campaign of 1794.
Career
Voyage #1 (1780-1782)
Captain Robert Morgan left Portsmouth on 3 June 1780, bound for China and Benkulen. Pigot reached Whampoa on 2 February 1781. For her return voyage she crossed the Second Bar, about 20 miles before Whampoa, on 8 April, and was at Macao on 23 April. She reached Benkulen, where the EIC had a factory, on 1 August and Padang on 19 August, and returned to Benkulen on 25 September. She then reached St Helena on 17 December, and Plymouth on 10 March 1782. She arrived at the Downs on 31 March.
Voyage #2 (1783-85)
Morgan left Portsmouth on 11 March 1783, bound for Madras and Bengal. Pigot reached São Tiago on 31 March and Johanna on 17 July.
On 24 August caught fire off Ceylon and was destroyed. Duke of Kingston was in company with Pigot, , and , all of which were safe. Some 65 passengers, crew, troops, and their dependents died.
Pigot reached Madras on 26 August. She arrived at Kedgeree on 10 October. Homeward bound, she passed Saugor on 15 February 1784 and reached Vizagapatam on 14 March. She stopped in again at Madras on 3 April, went to Coringa on 5 June, returned to Madras on 2 October, reached Coringa again on 25 November, was at Masulipatam on 5 January 1785, and was again at Madras on 10 January.
On 2 May she was at the Kromme River, where Morgan took the latitude and longitude as , with the longitude being 7° 38' east of Cape Town. The correct figures for the river's mouth are , indicating the ongoing difficulty of calculating longitude.
Pigot reached False Bay on 8 June and St Helena on 19 July. She arrived at the Downs on 9 October.
Voyage #3 (1786-87)
George Ballantyne (or Ballantine), was Pigots captain for this and the next two voyages. He left the Downs on 26 March 1786, bound for China. Pigot reached Whampoa on 11 September. Homeward bound, she crossed the Second Bar on 5 January 1787, reached North Island - the northmost of three islands in the bay that formed the principle anchorage of Enggano Island - on 2 March, and St Helena on 2 June. She arrived back at the Downs on 12 August.
Voyage #4 (1789-1790)
Ballantyne left the Downs on 6 March 1789, bound for Madras and Bengal. Pigot reached Madras on 28 June and arrived at Diamond Harbour on 8 July. Homeward bound, she passed Saugor on 23 December, reached Madras on 2 February 1790, and St Helena on 29 August. She arrived back at the Downs on 29 June.
Voyage #5 (1793 and loss)
Ballantyne left Portsmouth on 22 May 1793, bound for Bengal and Benkulen. War with France had broken out almost four months earlier, so as became the common practice for EIC vessels, he received a letter of marque on 17 April. This authorized him to engage in offensive action against the French, not just defensive. Pigot was part of a convoy that included the East Indiamen Prince William, Lord Thurlow, William Pitt, , , Earl of Oxford, , Fort William, London, , Marquis of Landsdown, , , and Earl of Abergavenny, amongst numerous other vessels, merchant and military, most of the non-Indiamen travelling to the Mediterranean.
On 24 June, Pigot captured the French brig La France, which was sailing from "the Mauritius" to France. The account in the London Gazette refers to the brig as Le Franc. From the number of vessels named in separate accounts as sharing in the prize money, it is clear that the fleet shared the capture. Ceres took possession.
Pigot reached Diamond Harbour on 14 September.
Capture
The withdrawal of the Royal Navy squadron from Indian waters had left the EIC's trade vulnerable to privateers from Île de France (Mauritius). The EIC therefore decided to equip a squadron of its merchantmen as cruisers to protect its trade.
The squadron consisted of the East Indiamen William Pitt, Houghton, , and the Bombay Marine (EIC) 14-gun brig Nautilus, all under the overall command of Commodore Charles Mitchell of William Pitt. Contemporary accounts of the composition of squadron vary widely. One account lists the vessels as , Pigot, Houghton, Nonsuch, and the cruiser Viper. It states their task would be to cruise the Malacca and Sunda Straits, and the Bay of Bengal, when not actually convoying the trade. Lloyd's List lists the squadron as consisting of William Pitt, Oxford, Houghton, Nonsuch, Britannia, and the "Nancy Grab". They were armed and believed to be cruising the Straits. Pigot was to accompany them to Benkulen.
Pigot passed Saugor on 27 November, and reached Penang on 21 December. She left Penang three days later with a large supply of military stores for Bencoolen. She arrived at Benkulen on 12 January 1794.
In the meantime, the EIC squadron under Commodore Charles Mitchell passed Singapore on 2 January 1794, sailing eastwards in search of French raiders. As the British squadron travelled along the northern coast of Sumatra, two French privateers attacked Bencoolen on the southern coast. The privateers were the 30-gun Vengeur and the 26-gun Résolu. On 17 January they approached the mouth of Rat Island Basin close to Bencoolen where Pigot lay at anchor, completely unprepared for action. At 08:15 Vengeur opened fire at , maintaining the battle for an hour and 45 minutes before hauling off so that Résolu could continue the combat. Ballantyne defended his vessel intelligently, positioning Pigot so that the French could only approach one at a time through the narrow mouth of the bay. This allowed him to drive off each ship in turn, the privateers falling back together at 10:20 with damaged rigging. Pigot too had suffered, with one man mortally wounded and sufficient damage to the rigging to require several weeks of repairs. After immediate repairs had been completed, next day Corosin abandoned Bencoolen and retreated to the Sunda Strait in search of weaker targets. The governor at Bencoolen sent over reinforcements to Pigot in the form of a lieutenant, 40 sepoys, and two 18-pounder guns. They arrived too late to assist, and Ballantayne sent them to Rat Island to establish a battery as he could not use the guns.
Early on 22 January, Mitchell's squadron stopped a merchant ship for inspection and as the ship was searched two new sails appeared to the southwest near Shown Rock in the Zuften Islands. Suspicious of the identity of the new arrivals, Mitchell sent Britannia and Nonsuch in pursuit and the ships turned away. As the East Indiamen closed with the fleeing ships, they were identified as Vengeur and Résolu. The British vessels soon outran the French and the French opened fire to which the larger British vessels responded. Captain Thomas Cheap of Britannia engaged Vengeur while Captain John Canning of Nonsuch attacked Résolu at 10:45 and were soon supported by William Pitt and Houghton. The overwhelming numbers and size of the British squadron soon convinced Corosin and Jallineaux that further resistance was pointless and 45 minutes after the first shots were fired both surrendered.
On 25 January in the Sunda strait, Mitchell engaged a French naval squadron under the overall command of Captain Jean-Marie Renaud. The squadron had sailed from the Île de France and consisted of the frigates Prudente and Cybèle, the brig Vulcain, and the captured , now renamed Duguay-Trouin. The combat was inconclusive and both sides withdrew, Mitchell to Batavia.
The French squadron under Renaud withdrew into the Indian Ocean via Bencoolen, which they reached on 6 February. Pigot was still there, undergoing repairs in the Rat Island basin. The attack did not take place until the next day. Although Ballantyne resisted for half-an-hour, he was so outnumbered and outgunned that at 4pm he was forced to strike. As the French maneuvered Pigot out of the bay, Renaud demanded that the small Fort Marlborough nearby surrender. Actually, Renaud demanded 300,000 dollars as a ransom in lieu of surrender. Captain Thomas Brown, commander of the garrison of 20 Europeans and 300 sepoys, declined. He, his two officers, and the garrison showed such energy in preparing the defenses, heating shot, etc., that Renaud withdrew. The French then returned to Île de France.
Lloyd's List reported, "The Pigot (Ballantine), of London; the Sacramento, a Portuguese Ship; and the Ceres, ---- -----, the latter from Manilla to Bengal, have been taken by the French and carried into the Mauritius." The EIC reported that there was no cargo aboard.
Post-script
On 1 June a snow from Mauritius arrived at the Danish exclave of Tranquebar. She brought the news that Pigot had arrived at Mauritius on 14 March. Ballantayne, his first officer, two midshipmen, and four crew were aboard her. Her captors had divided up the rest of the crew over the vessels of their squadron. The French permitted Ballantyne to return to England on his own parole. Ballantyne left in an American ship for New York.
The rest of the officers and crew, who reported that the French had treated them well, were waiting for a cartel that would take them to Madras. At the end of March, the Danish ship Minerva, Coulthard, master, was to take 50 British prisoners at the end of March. The Times reported that "the remainder of the crew of the Pigot with some Dutchmen taken in a packet from Batavia were in a cartel Ship bound to Madras but which was prevented from sailing by the people on shore who suspecting the Captain was an Aristocrat unhung her rudder and carried him on shore for trial." As it was, the prisoners were freed at Bombay in August.
Notes
Citations
References
History of the Organization, Equipment, and War Services of the Regiment of Bengal Artillery, Vol. 1. (H.S. King and Company).
Ships of the British East India Company
1780 ships
Captured ships
Age of Sail merchant ships
Merchant ships of the United Kingdom |
Vanguard Youth () is the youth organization of the Patriotic Party in Turkey. It was launched on 17 April 1994, during the Workers' Party period. Vanguard Youth worked as a left-wing nationalist, legal organization in the Turkey.
Purpose and methods
Vatan Youth considers that its primary duty is to unite the youth around the great values of the country, labor and humanity by leading the youth movement in Turkey ideologically, strategically, politically and practically. Vatan Youth cadres and members, in addition to participating in party work, mainly carry out activities within university societies and youth mass organizations. "Full independent and truly democratic Turkey!" With its slogan, it aims to spread its political program among the largest youth masses, in universities and high schools. He argues that a people's power that favors independence, enlightenment and labor can be established through democratic revolutions through the process of incessant revolutions. Turkey's 200-year-old struggle for democratic revolution (Mithat Pasha, Namık Kemal, Mustafa Kemal, Şefik Hüsnü, 27 Mayısçı Kuşak, 1968 Movement) and the revolutionary accumulation of humanity (French Revolution, Russian Revolutions and anti-imperialist revolutions in oppressed nations). In this context, it directs its members to mass organization activities in order to be able to unite with the largest youth masses and to fight together with the youth bases and organizations of different patriotic political subjects. Pioneering Youth defends the right of everyone to engage in free politics on campuses. Against the obstruction of the right to education, it puts forward the slogan "Anyone with a student identity goes to school". Pioneering Youth advocates a line that organizes conferences and protests and, in their own words, "organizes the struggle". It declares that the struggle for "Independent Turkey", "Enlightenment" and "Independence, Revolution, Socialism" in universities is the leading youth organization.
References
Youth wings of political parties in Turkey
Youth organizations established in 1994 |
Michael McCormack Lafferty (born May 20, 1948) is a former World Cup alpine ski racer from the United States. He specialized in downhill and had two World Cup podiums and eleven top ten finishes, all in downhill. His best finish in the World Cup season standings was in 1972: third in downhill and ninth overall.
Early years
Born in Eugene, Oregon, Lafferty was the third and youngest son of Paul and Jean Lafferty. His father Paul (1910–92) was a college ski team coach in the 1930s and an officer in the famed 10th Mountain Division of the U.S. Army in World War II.
Lafferty learned to ski at Willamette Pass and raced as a junior for the Bend Skyliners at Mt. Bachelor. Following graduation from South Eugene High School in 1966, he followed his brother Peter to the University of Colorado in Boulder. He raced for the Buffaloes for two years until named to the "B team" of the U.S. Ski Team in December 1968, then promoted to the "A team" later that month.
Racing career
Lafferty's first top ten result in a World Cup race was in December 1969, with a fifth place in a downhill at Val-d'Isère, France. At the Winter Olympics in 1972 in Japan, Lafferty finished 14th in the downhill. Two years earlier, he was 31st at the World Championships in 1970 in Italy.
Lafferty's best World Cup result was his first podium, a runner-up finish at Crystal Mountain, Washington, in February 1972, the first event after the Olympics. The next day he had a fourth-place finish in another downhill and ascended another podium in Italy a few weeks later. Before the Olympics, he finished just off the podium in mid-January with a fourth place at storied Kitzbühel.
His third-place finish in the World Cup downhill season standings in 1972 was the best by an American male until 2003, when Daron Rahlves finished second. (Other third-place finishers were Bill Johnson in 1984 and A.J. Kitt in 1992.) Rahlves finished second again in 2004 and Bode Miller was also second in 2005 and 2008. Through 2014, a U.S. male has yet to win the season title in the downhill discipline.
After racing
Following his final season in 1974, Lafferty returned to Oregon to help manage the family's successful cold storage business in Eugene and Albany. He briefly raced on the pro circuit in North America.
World Cup results
Season standings
Points were only awarded for top ten finishes (see scoring system).
Top ten finishes
2 podiums - (2 DH)
11 top tens - (11 DH)
References
External links
Mike Lafferty World Cup standings at the International Ski Federation
University of Colorado Olympians – 1972 Sapporo – alpine skiing – Michael Lafferty
Sno Temp – about us
Getty Images – 1972 Winter Olympics – alpine skiing – Mike Lafferty
1948 births
Living people
American male alpine skiers
Olympic alpine skiers for the United States
Alpine skiers at the 1972 Winter Olympics
Sportspeople from Eugene, Oregon
20th-century American people |
Nasal glial heterotopia refers to congenital malformations of displaced normal, mature glial tissue, which are no longer in continuity with an intracranial component. This is distinctly different from an encephalocele, which is a herniation of brain tissue and/or leptomeninges, that develops through a defect in the skull, where there is a continuity with the cranial cavity.
Signs and symptoms
Patients come to clinical attention early in life (usually at birth or within the first few months), with a firm subcutaneous nodule at bridge of nose, or as a polypoid mass within the nasal cavity, or somewhere along the upper border of the nasal bow. If the patient presents with an intranasal mass, there may be obstruction, chronic rhinosinusitis, or nasal drainage. If there is a concurrent cerebrospinal fluid (CSF) leak, then an encephalocele is much more likely.
This lesion is separated into two types based on the anatomic site of presentation:
Extranasal (60%): Subcutaneous bridge of nose
Intranasal (30%): Superior nasal cavity
Mixed (10%): Subcutaneous tissues and nasal cavity (larger lesions)
Pathology
The cut surface shows a smooth, homogeneous glistening to slippery cut surface, showing an appearance similar to brain. Sometimes, it is quite firm, especially when there is a large amount of associated fibrosis. The lesions are usually <2 cm in greatest dimension.
The overlying skin or squamous mucosa is intact and uninvolved by the process. There is normal glial tissue set within a fibrous connective tissue stroma. There is such blending, that the underlying process may be difficult to detect without special studies. In a few cases, large gemistocytes, neurons, choroid plexus, ependyma, and retinal pigmented cells may be seen.
Histochemistry
A trichrome stain will highlight the dual components well, with the glial tissue staining red, while the background fibrosis stains a bright blue.
Immunohistochemistry
The glial tissue is highlighted with S100 protein and with glial fibrillary acidic protein, although the latter is much more sensitive for glial tissue.
Diagnosis
Differential diagnoses
The most common missed lesion is within the nasal cavity, where a fibrosed nasal polyp may be considered. However, it does not have glial tissue. Further, a polyp usually has mucoserous glands. The lesion is frequently misinterpreted as scar in the subcutaneous tissues, but scar in a < 2-year-old child would be uncommon. Special stains are frequently required to highlight the diagnosis.
Imaging findings
Imaging studies are performed before surgery or biopsy to preclude an intracranial connection. Images usually show a sharply circumscribed but expansile mass. It may be difficult to exclude the intracranial connection if the defect is small whether employing computed tomography or magnetic resonance.
Classification
While nasal glial heterotopia (NGH) is the preferred term, synonyms have included nasal glioma. However, this term is to be discouraged, as it implies a neoplasm or tumor, which it is not. By definition, nasal glial heterotopia is a specific type of choristoma. It is not a teratoma, however, which is a neoplasm comprising all three germ cell layers (ectoderm, endoderm, mesoderm). As a congenital malformation or ectopia, it is distinctly different from the trauma or iatrogenic development of an encephalocele.
Management
Although surgery is the treatment of choice, it must be preceded by imaging studies to exclude an intracranial connection. Potential complications include meningitis and a cerebrospinal fluid leak. Recurrences or more correctly persistence may be seen in up to 30% of patients if not completely excised.
Epidemiology
Nasal glial heterotopia is rare, while an encephalocele is uncommon. NGH usually presents in infancy, while encephalocele may present in older children and adults. It is seen in both genders equally.
References
Further reading
Soft tissue |
```c
/* Compute the CDF of the Tukey-Lambda distribution
* using a braketing search with special checks
*
* The PPF of the Tukey-lambda distribution is
* G(p) = p**lam + (1-p)**lam / lam
*
* Author: Travis Oliphant
*/
#include "owl_maths.h"
#define SMALLVAL 1e-4
#define EPS 1.0e-14
#define MAXCOUNT 60
double tukeylambdacdf(double x, double lmbda)
{
double pmin, pmid, pmax, plow, phigh, xeval;
int count;
if (owl_isnan(x) || owl_isnan(lmbda)) {
return OWL_NAN;
}
xeval = 1.0 / lmbda;
if (lmbda > 0.0) {
if (x < (-xeval))
return 0.0;
if (x > xeval)
return 1.0;
}
if ((-SMALLVAL < lmbda) && (lmbda < SMALLVAL)) {
if (x >= 0)
return 1.0 / (1.0 + exp(-x));
else
return exp(x) / (1.0 + exp(x));
}
pmin = 0.0;
pmid = 0.5;
pmax = 1.0;
plow = pmin;
phigh = pmax;
count = 0;
while ((count < MAXCOUNT) && (fabs(pmid - plow) > EPS)) {
xeval = (pow(pmid, lmbda) - pow(1.0 - pmid, lmbda)) / lmbda;
if (xeval == x)
return pmid;
if (xeval > x) {
phigh = pmid;
pmid = (pmid + plow) / 2.0;
}
else {
plow = pmid;
pmid = (pmid + phigh) / 2.0;
}
count++;
}
return pmid;
}
``` |
Poimenesperus dobraei is a species of beetle in the family Cerambycidae. It was described by Waterhouse in 1881, originally under the genus Poemenesperus.
References
dobraei
Beetles described in 1881 |
A chair is a type of seat, typically designed for one person and consisting of one or more legs, a flat or slightly angled seat and a back-rest. They may be made of wood, metal, or synthetic materials, and may be padded or upholstered in various colors and fabrics.
Chairs vary in design. An armchair has armrests fixed to the seat; a recliner is upholstered and features a mechanism that lowers the chair's back and raises into place a footrest; a rocking chair has legs fixed to two long curved slats; and a wheelchair has wheels fixed to an axis under the seat.
Etymology
Chair comes from the early 13th-century English word chaere, from Old French chaiere ("chair, seat, throne"), from Latin cathedra ("seat").
History
The chair has been used since antiquity, although for many centuries it was a symbolic article of state and dignity rather than an article for ordinary use. "The chair" is still used as the emblem of authority in the House of Commons in the United Kingdom and Canada, and in many other settings. In keeping with this historical connotation of the "chair" as the symbol of authority, committees, boards of directors, and academic departments all have a 'chairman' or 'chair'. Endowed professorships are referred to as chairs.
It was not until the 16th century that chairs became common. Until then, people sat on chests, benches, and stools, which were the ordinary seats of everyday life. The number of chairs which have survived from an earlier date is exceedingly limited; most examples are of ecclesiastical, seigneurial or feudal origin.
Chairs were in existence since at least the Early Dynastic Period of Egypt (c. 3100 BC). They were covered with cloth or leather, were made of carved wood, and were much lower than today's chairs – chair seats were sometimes only high. In ancient Egypt, chairs appear to have been of great richness and splendor. Fashioned of ebony and ivory, or of carved and gilded wood, they were covered with costly materials, magnificent patterns and supported upon representations of the legs of beasts or the figures of captives. Generally speaking, the higher ranked an individual was, the taller and more sumptuous was the chair he sat on and the greater the honor. On state occasions, the pharaoh sat on a throne, often with a little footstool in front of it.
The average Egyptian family seldom had chairs, and if they did, it was usually only the master of the household who sat on a chair. Among the better off, the chairs might be painted to look like the ornate inlaid and carved chairs of the rich, but the craftsmanship was usually poor.
The earliest images of chairs in China are from 6th-century Buddhist murals and stele, but the practice of sitting in chairs at that time was rare. It was not until the 12th century that chairs became widespread in China. Scholars disagree on the reasons for the adoption of the chair. The most common theories are that the chair was an outgrowth of indigenous Chinese furniture, that it evolved from a camp stool imported from Central Asia, that it was introduced to China by Christian missionaries in the 7th century, and that the chair came to China from India as a form of Buddhist monastic furniture. In modern China, unlike Korea or Japan, it is no longer common to sit at floor level.
In Europe, it was owing in great measure to the Renaissance that the chair ceased to be a privilege of state and became a standard item of furniture for anyone who could afford to buy it. Once the idea of privilege faded the chair speedily came into general use. Almost at once the chair began to change every few years to reflect the fashions of the day.
Thomas Edward Bowdich visited the main Palace of the Ashanti Empire in 1819, and observed chairs engrossed with gold in the empire.
In the 1880s, chairs became more common in American households and usually there was a chair provided for every family member to sit down to dinner. By the 1830s, factory-manufactured “fancy chairs” like those by Sears, Roebuck, and Co. allowed families to purchase machined sets. With the Industrial Revolution, chairs became much more available.
The 20th century saw an increasing use of technology in chair construction with such things as all-metal folding chairs, metal-legged chairs, the Slumber Chair, moulded plastic chairs and ergonomic chairs. The recliner became a popular form, at least in part due to radio and television. In the 1930s, stair lifts were commercially available to help people suffering from Polio and other diseases to navigate stairs.
The modern movement of the 1960s produced new forms of chairs: the butterfly chair (originally called the Hardoy chair), bean bags, and the egg-shaped pod chair that turns. It also introduced the first mass-produced plastic chairs such as the Bofinger chair in 1966. Technological advances led to molded plywood and wood laminate chairs, as well as chairs made of leather or polymers. Mechanical technology incorporated into the chair enabled adjustable chairs, especially for office use. Motors embedded in the chair resulted in massage chairs.
Materials
Chairs can be made from wood, metal, or other strong materials, like stone or acrylic. In some cases, multiple materials are used to construct a chair; for example, the legs and frame may be made from metal and the seat and back may be made from plastic. Chairs may have hard surfaces of wood, metal, plastic, or other materials, or some or all of these hard surfaces may be covered with upholstery or padding. The design may be made of porous materials, or be drilled with holes for decoration; a low back or gaps can provide ventilation. The back may extend above the height of the occupant's head, which can optionally contain a headrest. Chairs can also be made from more creative materials, such as recycled materials like cutlery and wooden play bricks, pencils, plumbing tubes, rope, corrugated cardboard, and PVC pipe.
In rare cases, chairs are made out of unusual materials, especially as a form of art or experimentation. Raimonds Cirulis, a Latvian interior designer, created a volcanic hanging chair that is handmade out of volcanic rock. Peter Brenner, a Dutch-born German designer, has created a chair made from lollipop sugar – of confectioners' sugar.
Design and ergonomics
Chair design considers intended usage, ergonomics (how comfortable it is for the occupant), as well as non-ergonomic functional requirements such as size, stacking ability, folding ability, weight, durability, stain resistance, and artistic design.
Seat height
Ergonomic design distributes the weight of the occupant to various parts of the body. This is done by having an easily adjustable seat height. A seat that is higher results in dangling feet and increased pressure on the underside of the knees ("popliteal fold"). It may also result in no weight on the feet which means more weight elsewhere. A lower seat may shift too much weight to the "seat bones" ("ischial tuberosities"). Gas springs are attached to the body of the chair in order to give height adjustment and more comfort to the user.
Some chairs have foot rests. Around 15% of women and 2% of men need foot rests, even at the chair height. A stool or other simple chair may have a simple straight or curved bar near the bottom for the sitter to place their feet on.
Actual chair dimensions are determined by measurements of the human body or anthropometric measurements. The two most relevant anthropometric measurement for chair design is the popliteal height and buttock popliteal length.
For someone seated, the popliteal height is the distance from the underside of the foot to the underside of the thigh at the knees. It is sometimes called the "stool height". The term "sitting height" is reserved for the height to the top of the head when seated. For American men, the median popliteal height is and for American women it is . The popliteal height, after adjusting for heels, clothing and other issues, is used to determine the height of the chair seat. Mass-produced chairs are typically high.
Researchers such as Mary Blade and Galen Cranz found that sitting on the edge of a high stool with feet on the floor is less harmful for the lower back than sitting up straight on a conventional chair.
Reclining angle
Different types of chairs can have a variety of seating positions, depending on the intended task. Typically, chairs intended for people completing work or dining can only recline very slightly (otherwise the occupant is too far away from the desk or table). Dental chairs are necessarily reclined. Research has shown that the best seated posture is a reclined posture of 100°–110°. In order to recline, the back-rest may be independently adjustable. A reclining seat and back will reduce the load on the occupant's back muscles. In general, if the occupant is supposed to sit for a long time, weight needs to be taken off the seat area and thus "easy" chairs intended for long periods of sitting are generally at least slightly reclined.
Back and head support
The back of the chair will support some of the weight of the occupant, reducing the weight on other parts of the body. Some back-rests support only the lumbar region, while shoulder height back-rests support the entire back and shoulders. Headrests support the head as well and are important in vehicles for preventing "whiplash" neck injuries in rear-end collisions where the head is jerked back suddenly. Reclining chairs typically have at least shoulder-height back-rests to shift weight to the shoulders.
Padding
There may be cases where padding is not desirable, such as chairs that are intended primarily for outdoor use. Where padding is not desirable, contouring may be used instead. A contoured seat pan attempts to distribute weight without padding. By matching the shape of the occupant's buttocks, weight is distributed and maximum pressure is reduced.
Armrests
A chair may or may not have armrests; chairs with armrests are termed "armchairs". In French, a distinction is made between fauteuil and chaise, the terms for chairs with and without armrests, respectively. In Germany, an armchair was once called a Krankensessel, or sick-chair, because it was intended for people who were too ill to stand or sit without extra support.
If present, armrests will support part of the body weight through the arms if the arms are resting on the armrests. Elbow rest height is used to determine the height of the armrests. Armrests should support the forearm and not the sensitive elbow area. Hence in some chair designs, the armrest is not continuous to the chair back, but is missing in the elbow area. Armrests further have the function of making entry and exit from the chair easier (but from the side it becomes more difficult).
Seat size and legroom
For someone seated, the buttock popliteal length is the horizontal distance from the back most part of the buttocks to the back of the lower leg. This anthropometric measurement is used to determine the seat depth. Mass-produced chairs are typically deep.
Additional anthropometric measurements may be relevant to designing a chair. Hip breadth is used for chair width and armrest width. The buttock-knee length is used to determine "leg room" between rows of chairs. "Seat pitch" is the distance between rows of seats. In some airplanes and stadiums the leg room (the seat pitch less the thickness of the seat at thigh level) is so small that it is sometimes insufficient for the average person.
Types of chairs
A wide variety of chairs have emerged throughout the ages, some based on formal usages, and others based on domestic needs, and some based on needs within the workplace or various professions.
Office chair
An office chair is one used by employees within an office. Modern office chairs are usually adjustable and wheeled. Caster wheels are attached to the feet of chairs to give more mobility.
Dining room chair
A dining room chair is a specific type of design, used around a dining room table. It can be found in most ordinary residential homes, and also may appear in formal settings, such as any formal event or reception that includes a formal meal or banquet.
Work chair
A work chair is a specialized chair, adapted to the needs of a particular profession or setting. For example, a designing chair will be used for designers who sit at high easels; it will usually have added height.
Rocking chair
Some chairs have two curved bands of wood (also known as rockers) attached to the bottom of the legs. They are called rocking chairs.
Kneeling chair
A kneeling chair adds an additional body part, the knees, to support the weight of the body. A sit-stand chair distributes most of the weight of the occupant to the feet. Many chairs are padded or have cushions. Padding can be on the seat of the chair only, on the seat and back, or also on any arm rests or foot rest the chair may have. Padding will not shift the weight to different parts of the body (unless the chair is so soft that the shape is altered). However, padding does distribute the weight by increasing the area of contact between the chair and the body, and thus reducing the amount of pressure at any given point. By contrast, a hard wood chair feels hard because the contact point between the occupant and the chair is small. In lieu of padding, flexible materials, such as wicker, may be used instead with similar effects of distributing the weight.
Seats
Chair seats vary widely in construction and may or may not match construction of the chair's back (back-rest).
Some systems include:
Center seats where a solid material forms the chair seat
Solid wood, may or may not be shaped to human contours
Wood slats, often seen on outdoor chairs
Padded leather, generally a flat wood base covered in padding and contained in soft leather
Stuffed fabric, similar to padded leather
Metal seats of solid or open design
Molded plastic
Stone, often marble
Open center seats where a soft material is attached to the tops of chair legs or between stretchers to form the seat
Wicker, woven to provide a surface with give to it
Leather, may be tooled with a design
Fabric, simple covering without support
Tape, wide fabric tape woven into seat, seen in lawn chairs and some old chairs
Caning,
Rush, wrapped from rush, heavy paper, strong grasses, or hand twisted while wrapped with cattails to form the seat, usually in a pattern of four trapezoids meeting in the center, and on rare occasions, in elaborate patterns
Reed,
Rawhide
Splint, ash, oak or hickory strips are woven
Metal, Metal mesh or wire woven to form seat
Standards and specifications
Design considerations for chairs have been codified into standards. ISO 9241, "Ergonomic requirements for office work with visual display terminals (VDTs) – Part 5: Workstation layout and postural requirements", is the most common one for modern chair design.
There are multiple specific standards for different types of chairs. Dental chairs are specified by ISO 6875. Bean bag chairs are specified by ANSI standard ASTM F1912-98. ISO 7174 specifies stability of rocking and tilting chairs. ASTM F1858-98 specifies plastic lawn chairs. ASTM E1822-02b defines the combustibility of chairs when they are stacked.
The Business and Institutional Furniture Manufacturer's Association (BIFMA) defines ANSI/BIFMA X5.1 (titled: General-Purpose Office Chairs – Tests) for testing of commercial-grade chairs. It requires:
chair back strength of
chair stability if weight is transferred completely to the front or back legs
leg strength of applied from the bottom of the leg
seat strength of dropped from above the seat
seat cycle strength of 100,000 repetitions of dropped from above the seat
The specification further defines heavier "proof" loads that chairs must withstand. Under these higher loads, the chair may be damaged, but it must not fail catastrophically.
Large institutions that make bulk purchases will reference these standards within their own even more detailed criteria for purchase. Governments will often issue standards for purchases by government agencies (e.g. Canada's Canadian General Standards Board CAN/CGSB 44.15M on "Straight Stacking Chair, Steel" or CAN/CGSB 44.232-2002 on "Task Chairs for Office Work with Visual Display Terminal").
Chairs may be rated by the length of time that they may be used comfortably – an 8-hour chair, a 24-hour chair, and so on. Such chairs are specified for tasks which require extended periods of sitting, such as for receptionists or supervisors of a control panel.
Accessories
In place of a built-in footrest, some chairs come with a matching ottoman. An ottoman is a short stool that is intended to be used as a footrest but can sometimes be used as a stool. If matched to a glider chair, the ottoman may be mounted on swing arms so that the ottoman rocks back and forth with the main glider.
A chair cover is a temporary fabric cover for a side chair. They are typically rented for formal events such as wedding receptions to increase the attractiveness of the chairs and decor. The chair covers may come with decorative chair ties, a ribbon to be tied as a bow behind the chair. Covers for sofas and couches are also available for homes with small children and pets. In the second half of the 20th century, some people used custom clear plastic covers for expensive sofas and chairs to protect them.
Chair pads are cushions for chairs. They contain cotton or foam for padding. Some are decorative. In cars, they may be used to increase the height of the driver. Orthopedic back-rests provide support for the back. Car seats sometimes have built-in and adjustable lumbar supports. These can also be used on kitchen chairs.
Chair mats are mats meant to cover different types of flooring. They are usually made from plastic. This allows chairs on wheels to roll easily over the carpet and protects the carpet or floor. They come in various shapes, some specifically sized to fit partially under a desk.
Remote control bags can be draped over the arm of easy chairs or sofas and used to hold remote controls for home cinemas. They are counter-weighted so as to not slide off the arms under the weight of the remote controls.
Chair glides are attached to the feet of chairs to prevent them from scratching or snagging on the floor.
An antimacassar is a cloth covering for a headrest to protect the fabric and enable easy washing.
As sculptural and art forms
The Broken Chair is a monumental sculpture in wood, constructed of 5.5 tons of wood, high standing across the street from the Palace of Nations in Geneva. It has broken leg symbolizing opposition to land mines and cluster bombs. In 2001, Steve Mann exhibited a chair sculpture at San Francisco Art Institute. The chair had spikes that retracted when a credit card was inserted to download a seating license. Later other museums and galleries were equipped with the "Pay to Sit" chair, with a global central seating license server located in Toronto. The first sitting session was free, with a database of persons who had already used their free session.
In a performance piece at the 2012 Republican National Convention, Clint Eastwood addressed an empty chair, as if it represented President Barack Obama (meant to be construed as MIA or ineffectual). The address was controversial, with critics describing it as bizarre and supporters describing it as poignant. Japanese designer Tokujin Yoshioka has created several chairs as art forms such as "Honey-pop": honey-comb paper chair (2001), "Pane chair": natural fiber chair (2006), "Venus": natural crystal chair (2007).
New York industrial designer Ian Stell creates steel and wood kinetic sculptures that transform into chairs, including Roll Bottom Chair (2016) that turns into a secretariat desk and Loop that transforms into two interlocking chairs when expanded (2015).
Cultural significance
In Welsh culture, an eisteddfod is a festival with several ranked competitions, including in poetry and music.
The term eisteddfod, which is formed from two Welsh morphemes: , meaning 'sit', and , meaning 'be', means, according to Hywel Teifi Edwards, "sitting-together." Edwards further defines the earliest form of the eisteddfod as a competitive meeting between bards and minstrels, in which the winner was chosen by a noble or royal patron.
In language
If someone "nearly fell off their chair" after being informed about something, it was because they were very shocked or surprised.
An orchestra awards the best player in a particular section a "chair" or "principal seat" based on ability. The first chair of the section plays the solos, and in string sections, determines the bowings. In professional orchestras, the first chair player receives higher pay. It is also common for this position to be known as "first stand" or "first desk", a reference to the portable lectern on which the musicians put their sheet music. However, the person who is first chair in the first violin section is usually referred to as the concertmaster in the US or leader in the UK.
In academia, an endowed chair is a prestigious appointment for a professor, paid for by a dedicated funding source.
A chair is the highest officer of an organized group, such as the chair of the board, the head of the Board of Directors in a company or non-profit organization.
"Musical chairs" is a common party game, and a colloquial expression to describe people shuffling from seat to seat, around different locations, or from one job title to another.
In American slang, to say someone will "get the chair" is to say that they will be executed by an electric chair. Alternatively, it can be a metaphor for other harsh punishment.
See also
List of chairs for an extended list types, such as the lift chair, papasan chair, swivel chair.
Chair pose
Chair squat
Riding-like sitting
Seating assignment
Splat (furniture), the central vertical element of a wooden chair back
References
Further reading
de Dampierre, F. (2006). Chairs: A History. Harry N. Abrams.
Fiell, C. (2005). 1000 Chairs. (25th ed.). Taschen.
Miller, J. (2009). Chairs. Conran.
Furniture |
Makera Assada is among the areas that form the town of Sokoto state of Nigeria. The area is part of Magajin Gari Ward in the southern part of Sokoto North local government area of Sokoto state, bordered Gidan Haki in the east, Digyar Agyare in the west, Mafara in the north and Helele in the south.
Etymology
According to oral sources Makera Assada was formerly known as Makerar Dutsi. The word Makera is a Hausa name for smithery. The area is known for its blacksmithing, which happened to be the main occupation of the area, the area thus became known as Makera.
On the other hand, the reason why the area is associated with Dutsen Assada, is that in the neighboring area, at the southern part is the place popularly known as Dutsin Assada which extended up to the river of Dundaye. This area is a hilly area with small and flat rocks. There were people who were said to have settled in the place, although the region is not suitable for agriculture people happened to settle there. At that early time, around the 1880s after the formation of Sokoto, Assada was said to be one of the most important personalities who settled near the Dutsi, and he consistently stopped children from climbing it. Consequently, people started calling the place Dutsin Assada.
Assada was very popular in the area; very kind and friendly, he was said to be among the close friends of the sultan and even used to receive sultan visitors in his residence. His house was like gidan baki or guest house.
The reason why Assada is added as a suffix to Makera is to differentiate it from other areas known for blacksmithing. The other places where smithing occurred included: Kofar-Rini the area that specialized in white metal smithing producing earrings and necklaces. There is also Makera in Nupawa that produces hoes and other farming tools. But in Makera Assada all types of smithing take place. This explains why Assada is the home of Sarkin Makeran Sarkin Musulmi, or the chief smith of the sultan of Sokoto.
Origin of the people of Makera Assada
The origin of the people of Makera Assada is not clear. No one knows the exact date of settlement. But it is assured that the people settled after the Jihad of Shehu Usmanu Danfodiyo in the nineteenth century, when Sokoto was founded. The coming of immigrants played an important role in the history and the growth of the area. These immigrants include the blacksmiths from Zamfara who were also Fulani under the leadership of Muhammad Andi and his brother Ahmad Maigeme.
The time Shehu Usmanu Danfodiyo started his teaching and preaching in his home town Degel, and after some time he went out on preaching tours. His first tour was to Kebbi from where he gained his first converts. The Uthman and his assistants, including his younger brother Abdullahi ibn Fodiyo, made for Zamfara where they remained and preached for five years.
His preaching influenced many people from different parts of west Africa. Very soon interested people who were influenced by his preaching continued to form part of the Jama`at, as his followers were known. The people included both the Fulani, his race, and Hausa since Shehu Usmanu preached both in Hausa and Fulfulde languages. Many more people form his fold, and the community grew still further in fame both in and out of Hausaland.
Muhammad Andi and his brother Ahmad Maigeme, together with their people left Zamfara in order to join Shehu who had migrated to Gudu and possibly the Jihad that was going on. Mallam Bello stated that “when the Muhammad Andi and his people left Zamfara they met Shehu Usmanu Danfodiyo when the Jihad was going on and even participated in the Great Battle of Alkalawa.
According to oral sources Muhammad Andi and his people were Fulanis from Zamfara. Their chief occupation was blacksmithing. These people were ill-treated before they left their home Zamfara, because of their belief in Shehu's preaching. The Hausa rulers feared that their subjects would revolt against them. Seeing this, the Hausa rulers were alarmed. They saw the growing number of his following and the hold that Islam had gained. Men urged them on saying “if you do not disperse this concourse of people, your power will be gone; they will destroy your country by causing all the people to leave you and go to them.” It is important to note that, when Sarki Nafata was the King of Gobir, he forbade any man from holding religious meetings and preaching to the people, excepting only Shehu. Secondly, he decreed that Islam might only be practiced by those who inherited the creed from their fathers, and he also prohibited the wearing of turbans by men and veils by women. These edicts were proclaimed in every marketplace in Gobir and the neighboring parts of Adar and Zamfara which were under Gobir domination. With these we can see that the jama`at of Shehu Usmanu and other followers in different places most especially in Hausaland shared the same fate. Consequently, the people of Muhammad Andi who were in Zamfara had no choice but to migrate and follow Shehu wherever he was.
On their migration the Hausa rulers tried to stop them from following Shehu. In order to escape from their threats, the people of Andi complained to them, that they were only blacksmiths, on their way for business activities. As each opened their luggage, it was discovered that it contained blacksmiths tools, and therefore allowed them to pass.
These people were welcomed by the Shehu and his Jama`at, especially because of their profession. This people remained with the Jama`at of Shehu Usmanu Danfodiyo and participated in the Jihad of Hausaland. The people of Muhammad Andi continued with their profession there by producing war tools and weapons for the Jihadists. During the war time they produced swords, spears, arrows, handmade guns, helmets, shields and other materials worn by horses.
After the Jihad of Hausaland following the creation of the Sokoto caliphate by Shehu Usmanu and his son also War Commander Muhammad Bello, they came together with their followers, scholars, friends, relatives and other participants of the Jihad. These people were given a portion of land to settle with their people. Muhammad Andi was therefore one of the beneficiaries, being the first to settle at present Makera Assada. Shehu ordered Muhammad Andi to go round and look for a convenient place for him to stay, and when he found the area (Makera Assada) he informed Shehu Usmanu dan Fodiyo, Shehu therefore blessed the land. According to oral sources Shehu wanted Muhammad Andi to stay near Hubbare but Andi complained that by nature of their blacksmith occupation and also a kind of animal husbandry, it was better for them to settle far away from the centre of the town.
After some years another important personality arrived at the newly established Makera with the members of his family. This person is popularly known as Sharif Muhammad Al-gudana. He was with some other people. Algudana and his people were Adarawas. Adarawa are found in Tamaske, Buza and Adar region in Tawa, Niger Republic. They are also found in Illela in Sokoto.
As a result of the Jihad of Shehu dan Fodiyo in the 19th century, the Sarkin Adar Mustaphata and his son Muhammad Dan Almustapha and also Ahmad Bida visited Shehu Danfodiyo when he was in Gudu, but Mustapha left Ahmad Bida and Muhammad with Shehu. Hamidun, who succeeded to the throne of Sarkin Adar during the Jihad of Danfodiyo sided with Gobirawa until 1809, when Sarkin Azbin Muhammad Gemma, who succeeded Al-Bakri, took Sarkin Adar Hamidun with him to Shehu at Sifawa and Sarkin Adar made his submission. He died soon after that. Ahmad Bida was said to have stayed at Dundaye as the Sarkin Adar of Dundaye. Thus was born the dynasty of Adarawa at Dundaye. Ibid
We can see from the above account that during the Jihad, Adarawa participated in it and after, some of them stayed at Dundaye and spread in different parts of Sokoto in search of business activities. But some of them returned to Niger Republic under Muhammad dan Al-Mustapha, who prepared to remain in Adar with the hope of regaining to his throne.
When these people settled in the area, they practiced leather work. They produced all kinds of leather materials like shoes, leather bags, royal pillows, etc., but these people did not become popular in leather work as most of them adopted the occupation of their host, blacksmithing.
Occupations
As many people continued to stay in the area, the major economic activity of the people had been blacksmithing, which was dominant in the area, the people having been engaged in various types of gainful employment. The people of the area engaged in all forms of smithing and other iron work. Both blacksmithing and white smithing is practiced in the area. Blacksmithing has been practiced since the establishment of the region after the jihad of Shehu Usmanu. The people of the region used to regard blacksmithing as a compulsory occupation of every member of the area. They regard those who abandoned their grandfather's occupation as committing a serious offence.
The act of smithing provides income for the people of the area, as the blacksmith produces house utensils, farming tools, weapons, etc. On the other hand, those who specialized in smithing of the white iron or Makeran fari, produces decorations for women, thereby producing necklaces, earrings, handrings, etc. The white smiths are very few in the area thus blacksmithing or Makeran Baki are regarded as their masters.
Apart from smithing, the Hausa people were noted for their active participation in commercial activities. Some people in the region engaged in internal trade (Kasuwanci). This was especially the case with merchants with small scale capital. They sold the goods produce in the area in villages and towns. Farming had been the preoccupation of most African society, which was extensively done during the rainy season. In this area (Makera Assada), there are people who engage in farming, these people mostly have their farmland at the riverside along Dundaye and Kofar Kware areas, mostly farming in small scale.
In other sector of the economy in the area, there are also people who engaged in the production of mats. The Major material in this manufacturing sector is wild dump palm tree and rubber. This industry was not the monopoly of either men or women. Both men and women engage in the manufacturing of mats or carpets, Wundaye and Tabarmi.
However we should not forget the contribution of women of this region towards economic activities. Some of them engage in the economic sector. The role of women as commission agents (Dillalai), just like members of the more formal stock exchange market, the old women actively engaged in serving as commissioned agents (Dillalai). This was because only the older women were allowed to go out of their homes. They also used to move from house to house looking for items to sell. For instance, they used to engage in large scale trade in thread that was also manufactured at home by the women. They used to collect these home-made products either as commission agent or as through direct purchases. These women also engaged in the sale of newly produced and second hand clothes. They also sold food items both in and outside their homes. People of all age groups use to buy these items. The women fetched a lot of income to these women manufactures and sellers.
The activities of commissioned agents were strengthened because of the nature and social attitudes and values in Sakkwato. Thus is against Islamic law for married women to go up and down anyhow especially in the market places. Thus the commercial agents provides most of the items needed for them.
Another economic sector where women provided their contribution which is closely related to the agricultural sector, is the food and catering industry. Their services in this industry are not limited to the production of food for family consumption. They also processed and cooked different types of food for sale outside the family. Among the solid food they cooked Tuwo made of rice (Tuwon shinkafa), corn or Maize etc., Masa round cake of flour, Bula etc. The morning drink such as Kunu, Koko and the Fura which are extensively consumed during the summer season and different types of snacks, such as Kosan Rogo, Wake Awara etc. These were all prepared by women at home for family consumption as well for sale.
Groundnut was widely produced in Hausaland, the women of the area use groundnuts to produce many different items for both family consumption and for sale. The shell of ground nuts for instance was ground into seed powder form to make bran (Dussa), which was used to feed cows and sheep. The groundnut kernel was press and oil extracted. This oil was used in the olden days as fuel (paraffin or kerosene) as well as for food. The solid part of the groundnut kernel was made into groundnut cake, (Kuli Kuli) and put to many uses more especially in making fast food “Datu” and as cake snacks.
There are also some women of the area that specialized in producing local sauce or “Daddawa” important ingredient in making soup, local sauce has blocked the success of such modern market favourites as maggi cube, or Ajini-moto. Majority of the people especially who live in the local areas rely on local sauce. Perhaps this is why the Nigerian food and beverages company decided to come out with a new brand name for modern sauce based called Daddawa cubes.
In the weaving industry, women along with the men engaged also in making of Kwaddo and Linzami. These are decorations done on the men closing. There were also some who engaged in the manufacture of multi colored caps (Kube). Among the artistic works of the women folk was the design on bedsheets (Zanen Gado) pillow cases and mattresses. Skilled women in their home did these. There were also the existence of mini-market which served the immediate needs of the people in the area. The market which is known as Kasuwar Bayangida opens in the evening time till late in the night.
Blacksmithing in Makera Assada
Makera Assada since its establishment as one of the commercial centers of Sokoto town, was known for its blacksmithing (Kira).
It is sometime hard to imagine today, an age where people use their surrounding environment as the only source for survival. At the very rise of African civilization the essential tools to survival were found through the use of wood and stone tools. These tools proved to work well enough for hunting and farming, but as time changed and mankind evolved, it became necessary to find more efficient means of survival.
The first known iron working exists in Turkey and the age of metals such as gold, copper, silver, lead and iron were not made workable until approximately 400 BC. This development slowed until around 1500 BC, with the development of furnaces capable of forging iron tools. The era of Iron had begun and the art of blacksmith soon spread throughout western Africa.
Blacksmithing began with the Iron Age, when primitive man first began making tools from iron. The Iron Age began when some primitive person noticed that a certain type of rock yielded iron, when heated by the coals of a very hot campfire. In short, we can say that blacksmithing the art of crafting that crude metal into a usable implement, has been around for a long time.
In Nigeria, the NOK people, shows the art of blacksmiths, which dates back to the sixth century BC. These Nigerian metal workers developed a technology that gave them the upper hand in life, and would prove to be a technology to revolutionise the world. Clapperton writing in 1824, spoke about iron working in Sokoto and even claimed that all the city blacksmiths were Nupes. At any rate, Nupes preponderance in the Iron working industry is probably exaggerated by Clapperton. No doubt, many skilled iron workers came to Sokoto because they were attracted by its development in terms of settlement. Other skilled iron workers no doubt came into the city as refugees (Al-kalawa), as slaves sent in from the emirates or by the demand of skilled hands in Sokoto itself. In the previous chapters we saw the coming of Muhammad Andi and his men from Zamfara marked the beginning of blacksmithing industry in Makera. Zamfara for long is noted for its blacksmithing.
Roles of the blacksmiths in Sokoto
Before the coming of Europeans, Makera Assada was one of the developed areas in Sokoto town. It has been observed that most of the development that occurred to her was a result of the heavy involvement in blacksmithing and this help the town of Sokoto in general.
Smithing was the major factor that united the people of Magajin Gari ward. This was so because the manufactured goods by the blacksmith was needed within and around the area as most of them engaged in farming. The neighbouring Mafara people were mostly farmers and cattle rearers. This people of Mafara used to purchase the manufactured products of the blacksmith, like the farming tool, house utensils, keys and padlocks, earring, etc. This is to say that while the people of Makera were busy producing needed materials for people their neighbours, Mafara people are helping them exporting their products to various places. The people of Mafara are grand children of Muhammad Sambo, one of the closest friends of Shehu, all so a jihadist and a scholar. There is a kind of intermarriage between the people of Makera and Mafara strengthen their relationship.
The development of in the trade, was as a result of the subsistence economy practiced in the early period of time. As Makera Assada specialized in producing iron products there was also people within and around Sokoto that engage in farming, dying capentary, hunting, etc., as such iron was needed in variety of forms. Spears, arrows, sword, knives. The farmers needed hoes, matches and ploughshares. According to Ibrahim Gandi, one of my informants, contended that hunters and farmers from distance places comes to purchase various implements from the people of Makera.
Pre-colonial blacksmithing Makera society was very efficient, Sarkin Makera Buhari, stated that “Shehu Usmanu Danfodiyo, ordered his son Muhammad Bello to expand Sokoto town”. The area of Assada continues to receive more and more immigrants. The blacksmith of the area is one of the factors of their arrival. Muhammad Bello therefore ordered for the clearance of bush nearby the area up to Kofar-Kware.
Most blacksmiths starts to work when they were young boys, may be age 6 or 7. They would apprentice to a blacksmith, for a decade or more, and then they will set out to start their own shop. If a boy did apprentice to a master, he might spend most of his life in shop before he ever got the opportunity to be a journey man. The people of Assada try to imbibe the knowledge of blacksmithing into every son born in the area. later when western education started taking shape in the area at first the blacksmith did not show interest. It was only those who refuse to trade in smithing, that were sent to school. These categories of boys were sent away so as not to be seen nearby as their sight would be irritating to their parents. But the blacksmiths realized the importance of western education and they put their wards, even the lazy ones. Many people enjoyed the fruits of western education in the area, as some of them became very closer to the government. The government need advice of this kind of people like famous Yahaya Danboko one of the earliest scholars of Sokoto state.
However, the practice of blacksmithing in Makera Assada makes the area to be recognized as the home of blacksmithing. The area was known for its smithing since the establishment of Sokoto town. That is why during the time of Caliph Muhammad Bello, he appointed the Sarkin Makera from the blacksmiths of the area.
By the arrival of the Europeans to Sokoto, whenever they need the service of the blacksmiths they use to contact the sultan. The sultan will however call the Sarkin Makera and Mazugi. The blacksmiths of Assada produces the wrought iron gates for Sokoto prison and the residence of Europeans and other places.
Another important role played by the blacksmiths of Makera Assada was during the jihad of Shehu Danfodiyo. The blacksmith apart from participating in the jihad, they also produce weapons for the jihadists. It is believed that, if the government had taken these kind of local smithing serious, it would not had been spending money and importing farm implement and other iron products from abroad. Iron working made farming, hunting and war more efficient. Iron allowed for greater growth in societies with the ability to support large kingdoms, which spread across western Africa.
Process of blacksmithing in Assada
Blacksmith is a person who creates objects from iron or steel by “forging” the metal, by using tools to hammer, bend, cut and otherwise shape it in its non liquid form. Usually the metal is heated until it glows red or orange as part of the forging process. Blacksmiths produces things like wrought iron gates, grills, railings, light fixtures, furniture, sculpture, tools agricultural implements, decorative and religious items, cooking utensils and weapons. Blacksmiths work with their old clothes this is because of the nature of the work. They use to work both in their shop (Bukkar Makera), and even at entrance of their houses (Zaure) as the case of Makera Assdada. Except during this time that most of the work use to take place in the market.
Blacksmiths work with black metals, typically iron. The term smith originates from the word ‘smite’ which means to heat. Thus a blacksmith is a person who works or smite black metal. Over the centuries blacksmith had taken little pride in the fact that, theirs is one of the few crafts that allows them to make tools that are used for their craft. Time and tradition had provided some fairly standard basic tools which vary only in detail around the world.
All a smith needs is something to heat the metal, something to hold the hot metal with, something to hit the metal on, and something to hit the metal with.
The tools which blacksmiths need to include. The forge or Tukunya which is place under the ground, forge is a fireplace of the blacksmith's shop. It provides the means to keep and controlled with the help of Mazuzzugi.
Tongs (Awartaki) are used to hold the hot metal. They came in a range of shapes and sizes. Intriguingly, while tongs are needed for a great deal of blacksmithing, much work can be done by mere holding the cold end with one's bare hand. Steel is a fairly poor conductor of heat, and orange hot steel at one end would be cold to the touch a foot or so.
The Anvil (makera) at its simplest is a large block of iron or steel. Over time this has been refined to provide a rounded horn to facilitate drawing and bending, a face for drawing and upsetting and bending and on one or more holes to hold special tools (swages or hardies) and facilitate punching. Often the Flat surface of an anvil will be hardened steel, and the body made from tougher iron.
Blacksmiths hammer (amaleshi) tend to have one face and a peen. The peen is typically either a ball or a blunt wedge (cross or straight peen depending on the orientation of the wedge to the handle) and it is used when drawing.
Swage (magagari) this is shaping tool, swages are either stand alone tools or fit the ‘hardie hole’ on the face of anvil. The Blacksmiths work by heating pieces of wrought iron or steel until the metal become soft enough to be shape with hand tools, such as hammer and chisel. To fuel the smelter or the forge, wood is converted to charcoal is use.
The techniques of Blacksmithing may be roughly divided into forging (sometimes called “sculpting”), welding, heat treating and finishing.
Forging is also referred to as sculpting because it is the process of shaping metal. Some of the operations or techniques applied in forging to include drawing, shrinking, bending, upsetting and punching. Drawing can be accomplished with a variety of tools and methods. Two typical methods using only hammer and anvil would be hammering on the anvil horn, and hammering on the anvil face using the cross peen of a hammer. Another method for drawing is to use a tool called a fuller (tsinke), or the peen of the hammer to hasten the drawing out of a thick piece of metal. The technique is called fullering from the tool. Fullering consist of hammering a series of indentations (with corresponding ridge) perpendicular to the long section of the piece being drawn. The resulting effect will be to look somewhat like waves along the top of the piece.
Bending through heating steel to an orange heat allows bending as if the hot steel were clay or sarafy taffy; it takes significant but not Herculean effort. Bending can be done with the hammer over the horn or age of the anvil, or by inserting the work into one of the holes in the top of the anvil and swinging the free end to one side. Bends can be dress and tightened or widened by hammering them over the appropriately shaped part of the anvil.
Upsetting is the process of making metal thicker in one dimension through shortening in the other. One form is by heating the end of a rod and them hammering on its as one would drive a nail, the rods get shorter, and the hot part widens. An alternative to hammering on the hot end, would be to place the hot end on the hot end of the anvil and hammer on the cold end, or to drop the rod, hot end down, onto a piece of settle at floor level.
Punching may be done to create a decorative pattern, or to make a hole, for example, in preparation for making a hammer head, a smith would punch a hole in a heavy bar or rod for the hammer handle. Punching is not limited to depressions and holes. It also includes cutting, slitting and drifting; these are done with a chisel.
The combining process; the five basic forging process are often combined to produce and refine the shapes necessary for finished products. For example, to fashion a cross peen hammer head, a smith would start with a bar roughly the diameter of the hammer face, the handle hole would be punched and drifted (widened by inserting or passing a larger tool through it), the head would be cut (punched, but with a wedge), the peen would be drawn to a wedge and the face would be dressed by upsetting.
Welding is the joining of metal of the same or similar kind such that there is no joint or seam; the pieces to be welded become a single piece. Now the smith moves with rapid purpose. The metal is taken from the fire and quickly brought together, the hammer lightly applying a few taps to bring the mating faces into complete contact and squeeze out the flux and finally return to fire again. The weld was begun with the taps, but often the joint is weak and incomplete, so the smith will again hit the joint to welding temperature and work the weld with light blows to ‘set’ the weld and finally to dress it to shape.
Heat treatment
Other than to increase its malleability, another reason for heating the metal is for heat treatment purposes. The metal can be hardened, tempered, normalized, annealed, case hardened and subject to other process that changes the crystalline structure of the steel to give it specific characteristics required for different uses.
Finishing; Depending on the intended use of the piece a blacksmith, may finish it in a number of Ways. A simple jig that the smith might only use a few times in the shop it may get the minimum of finishing a rap on the anvil to break off scale and a brushing with a wire brush. Files can be employed to bring a piece to final shape, remove burrs and sharp edges, and smooth the surface. Grinding stones abrasive paper and emery wheels can further shape, smooth and polish the surface. Finishes include but are not limited to paint, varnish, bluing, borrowing, oil and wax.
However, blacksmith's striker (mazugi) is an assistant to the blacksmith. His job is to swing a large hammer in heavy forging operations. The Sarkin Makera quoted, “when ever there is any work or if the sultan needs the service of the blacksmiths, he will invite the Sarkin Makera and the Mazugi will be the person to follow him with his tools.
Making an axe or a knife or a fireplace crane, set of door hinges or a handful of nails was what the village smithy did. His shop was the local hardware store. He could also repair a long chain or put rims on the wagon wheels or fix the axe that got chipped when it hit the rock. Whether the village needed swords or plough shares, the blacksmith made them. For without the blacksmith, the village could not survive
As this whole iron industry evolved over time, blacksmithing became an umbrella for several specialisties. The blacksmith who made knives and swords was a bladesmith. The blacksmith who made locks was a locksmith. The blacksmith who maids suits of armour was an armorer. The blacksmith who made gun barrels and triggers was a gunsmith. The blacksmith who shod horses, was a farrier. The blacksmith, who made earrings, necklaces and other decorations for women, was a whitesmith. The blacksmith who specialized in moulding gold was a goldsmith. Thus the blacksmiths possess all these skills.
Assessment of the industry
Gandi describes the profession of blacksmithing as the main way of life to people of Assada saying that is belief that anybody who hails from the region must be a blacksmith hence it is a taboo for a person to abandon the occupation of his father and grandfathers. In every family of the Makera Assada, there must be an evidence of blacksmithing. This points to the importance of the craft and its antiquity, among the Assada people. The smiths of Makera Assada are always at their smithing shops and work places. Most of the blacksmiths are not farmers, so they do not go to farm but they have good relationship with the farmers who need their services.
Smithing was particularly a different profession requiring artistic ingenuity and physical strength. Today's blacksmith is more of an interpreter of the past and artist if you will rather than real item. As such it is hedged about with many taboos and requires long period of apprenticeship. The smiths are known for their use of iron and fire, to the extent that iron weapon or fire cannot harm them.
The blacksmiths offered relief to farming and also supplied technological base. The blacksmiths provides items made necessary by social and day-to-day activities. Since the emergence of blacksmith into western Africa around 1500 BC, they are feared in some western African societies for their powerful skills in metal working, as we mentioned earlier most of the famous blacksmiths, iron weapon and fire cannot harm them, although some consider that as form of magic, but universally revered by West African for their technological pioneering. While common people fear the power of the blacksmith, they are highly admired and hold high social status. Because the trade is so specialized and dangerous, blacksmiths are often requisitioned by towns and villages where there are none.
As such making an axe or a knife or a fireplace crane, bowls (baho) or a set of door hinges are his work. He could also repair door locks or fix the axe that get chipped when it hit a rock. What affected the Makera smiths was the importation of foreign iron wares, large quantities of cheap hardware are now on sale in the local markets. Knives, house utensils like bucket, bowls, necklaces, etc. Door bolts and hinges and other useful materials can be purchased at will anywhere. Formally the people depended for local smith, for the production of these goods. These foreign goods are cheaper and more convenient for its purpose.
Although, the blacksmiths of Makera Assada specialized in all kind of iron work, they did not however, give priority to the production of locally made guns although hunters need them for hunting animals. This is so because of security risk as the government prohibited such production. In other words, local weapons like sword, spears etc. are produced there.
Apart from moulding the iron to produce things, some individuals engage in traveling smith. They travels to many places as far as Kano, Zaria, Funtua and even beyond the borders of northern Nigeria, to buy irons that can be put to use, like damage vehicles and planes, pieces of iron rods, oil tanker's containers and many more. At this metals are brought to Makera Assada until when they are needed any company or individual who want this kind of business or irons will be directed to Makera Assada area.
The occupation diversification among the Makera particularly in their smithing crafts shows their technological prowess and advancement. This was witness during the jihad. In 1839, Henry Wadsworth Longfellow in his famous poem, "The Village Blacksmith" praises the blacksmith, “His brow is wet with honest sweat. He earn whatever he can, and looks the whole world in the face, for he owes not any man.
See also
Sokoto
Usman Dan Fodio
Sokoto Caliphate
Blacksmiths of western Africa
References
Sokoto
Blacksmiths
19th century in Nigeria
Nigerian Fula people |
Theatre of War or Theater of War may refer to:
Theater (warfare), a military term for an area where an armed conflict takes place
Theater War, a war between Denmark-Norway and Sweden in 1788-1789
Theater of War (album), a 2001 music album by the band Jacob's Dream
Theater of War (film), a 2008 documentary film by director John Walter
Theatre of War (novel), a 1994 Doctor Who novel by Justin Richards
Theatre of War (Three-Sixty), a 1992 computer game by Three-Sixty Pacific
Theatre of War (video game), a 2007 computer game by 1C Company
War of the Theatres, a rivalry between playwrights Ben Johnson, John Marston, and Thomas Dekker from 1599 to 1602
Theatre of War Project, community-specific, theater-based projects that address public health and social issues |
Pierre Frédéric Emile Depage (Brussels, 3 November 1894 – 11 March 1979) was a gastroenterologist and Belgian senator affiliated to the Belgian Communist party.
Pierre Depage was a son of the physician, professor and liberal Senator Antoine Depage was one of the founders of the Boy-Scouts van België (BSB), and Depage was an enthusiastic member of the first troop, founded by Harold Parfitt.
Background
Depage obtained his doctorate in medicine. During World War I he worked with his father at the Clinique de l'Ocean in De Panne. After he returned from the war, he succeeded his father as leader of the 1st BSB, and was from then national commissioner or chairman of the Executive Committee of the BSB through World War II.
At the professional level, he was the co-founder of the Société Belge de Gastro-entérologie in 1928. In 1926 he was appointed physician in the hospitals of the city of Brussels.
After World War II he joined the Communist Party of Belgium. In February 1946 he led the list of the party and was elected communist senator for the Arrondissement of Brussels. He resigned in May 1947.
He was also at that time President of the Belgian Red Cross and ensured Belgium considered the positions of the Soviet Union and its satellite states, the only Western country to do so in the ICRC. These countries refused to allow the Belgian Red Cross to participate in August 1948 at the International Meeting of the Red Cross in Stockholm.
Depage broke with the communists, and in 1948 emigrated to the United States. His correspondence was monitored by the U.S. Government.
In 1950 he was the head of a United Nations mission in Syria, on behalf of the United Nations Relief and Work Agency (UNRWA), which was engaged in providing assistance and employment for Palestinian refugees.
References
Bibliography
External links
Scouting and Guiding in Belgium
1894 births
1979 deaths |
Otto I (between 1167 and 1171 – 13 January 1200) was Count of Burgundy from 1190 to his death and briefly Count of Luxembourg from 1196 to 1197. He was the fourth son of Frederick I, Holy Roman Emperor, by his second wife Beatrice I, Countess of Burgundy, daughter of Count Renaud III.
Rule
Upon the death of his mother, Countess Beatrice I of Burgundy, in 1184, Otto was granted the Burgundian county by his father, Emperor Frederick Barbarossa, elevating him to the rank of a count palatine. Haughty Otto however soon entered into several feuds: not only with the Anscarid lords of Auxonne and Mâcon, who claimed Beatrice's heritage, but also with the counts of Montbéliard, Duke Odo III of Burgundy and Duke Berthold V of Zähringen. In the course of negotiations in 1195, he killed Count Amadeus II of Montfaucon with his own hands, followed by the assassination of Alsatian Count Ulric of Ferrette in 1197 and the execution of a brother of Konrad von Hüneburg, bishop of Strasbourg, in 1198.
When Count Henry IV of Luxembourg died without male heirs in 1196, his county escheated to his overlord, Otto's brother Emperor Henry VI. Henry then granted it to Otto. Count Theobald I of Bar, son-in-law of Count Henry IV, negotiated the renunciation of Luxembourg with Otto the next year.
Meanwhile, Count Palatine Otto's regional conflicts had become a severe threat to the power politics of his Hohenstaufen relatives. Considered to be inefficient and busy solving problems in his own fief, upon the death of Henry VI in 1197, it was his younger brother Philip, whom he faithfully supported, chosen to be the successor rather than him. After Philip had been elected King of the Romans in 1198, rivaling with the Welf Duke Otto of Brunswick, he tried to settle the numerous quarrels picked by his brother. In 1200 Otto was assassinated at Besançon. His death came in useful to many political actors. Otto was buried at St Stephen's Cathedral, today the site of the Citadel of Besançon.
Family
Otto had married Margaret, daughter of Count Theobald V of Blois, in 1190. After her husband's death her brother-in-law King Philip enfeoffed her with the Burgundian county, as regent for her minor daughter Joanna I. Upon Joanna's death in 1205, Otto's second daughter, Beatrice II, became countess and Philip had her marry Duke Otto I of Merania.
Otto was said to have an illegitimate son, Hugo, who in 1203 surrendered any claim to the county to his stepmother, Margaret. The charter recording this is known only from a 16th-century work by .
References
Sources
12th-century births
1200 deaths
Sons of emperors
Year of birth unknown
Counts of Burgundy
Counts of Luxembourg
Hohenstaufen
Assassinated German people
Children of Frederick Barbarossa
12th-century murdered monarchs
12th-century counts in Europe |
```html
<!DOCTYPE html>
<html lang="en-US">
<head>
<meta charset="utf-8" />
<title>Arrays: Task 3</title>
<link rel="stylesheet" href="../styles.css" />
<style>
* {
box-sizing: border-box;
}
p {
color: purple;
margin: 0.5em 0;
}
</style>
</head>
<body>
<section class="preview">
</section>
<textarea class="playable playable-js" style="height: 220px;">
let myArray = [ "Ryu", "Ken", "Chun-Li", "Cammy", "Guile", "Sakura", "Sagat", "Juri" ];
// Add your code here
// Don't edit the code below here!
section.innerHTML = ' ';
let para1 = document.createElement('p');
para1.textContent = myString;
section.appendChild(para1);
</textarea>
<div class="playable-buttons">
<input id="reset" type="button" value="Reset" />
</div>
</body>
<script class="editable"></script>
<script src="../playable.js"></script>
</html>
``` |
Mus minotaurus is an extinct species of mouse native to Crete during the Late Pleistocene-Holocene. It descended from a Mus musculus (house mouse)-like ancestor that arrived on Crete during the late Middle Pleistocene, replacing Kritimys, a large rat-like rodent that inhabited Crete during the Early and Middle Pleistocene. Both Kritimys and the ancestor of Mus minotaurus, Mus bateae are found together in Stavrós Cave. The Mus batae-minotaurus lineage shows a tendency to increase in size with time, an example of island gigantism, with Mus minotaurus being one of the largest known members of the genus Mus, with a body mass of approximately 54 grams. It was likely heavily predated upon by the extinct endemic Cretan owl, as evidenced by the abundance of its remains found in owl pellets. It inhabited the island alongside a species of elephant (Palaeoloxodon creutzburgi), the radiation of endemic Candiacervus deer, the Cretan otter, and the Cretan shrew (which is still extant). Mus minotaurus became extinct sometime during the Holocene epoch, with its remains apparently being found in Neolithic and early Bronze Age sites on the island. Its extinction may have been due to competition with the closely related house mouse introduced to the island by humans during the early Bronze Age.
References
Prehistoric Crete
Fossil taxa described in 1942
minotaurus |
The Torch Festival or Fire Festival (; Nuosu language: ; YYPY Dut Zie; Bai: ), also known as the Xinghui Festival () is one of the main holidays of the Yi people of southwest China and is celebrated by other ethnic groups of the region (including the Bai, the Hani, the Lahu, the Naxi, and the Pumi) as well. It is celebrated on the 24th or 25th day of the sixth month of the Yi calendar, corresponding to August in the Gregorian calendar. It commemorates the legendary wrestler Atilabia, who drove away a plague of locusts using torches made from pine trees. Since 1993, the government of the Liangshan Yi Autonomous Prefecture in Sichuan has sponsored a modernised celebration of the festival featuring wrestling, horse racing, dance shows, and a beauty contest.
Origin
The original Torch Festival, according to some scholars, was based on a calendar used by Bai and Yi people in ancient times. The calendar included 10 months, 36 days in a month, and two Star Returning Festivals in winter and summer respectively. The two Star Returning Festivals were both considered the New Year, and the one in summer was called the Torch Festival as people often lighted a torch on that day. There are also many other legends about the origin of the Torch Festival, yet all of them have the purpose of offering sacrifice to deities and dispelling ghosts, as a wish for a harvest.
Observance
In the Torch Festival, every family needs to light a torch and hold the torch to illuminate the corners in the room and walk around the fields. Some villagers even have torch parade so as to drive away all bad lucks and pray for a harvest.
Preparations may begin a month in advance, with people gathering wormwood to make torches. Wormwood is especially popular around Liangshan, where it is believed to ward off evil. Typically, three torches are made per person.
The custom of holding a torch to shed light on tree and field was found in Han people in Southern Song dynasty. In Ming and Qing dynasties, people in Zhejiang and Jiangsu provinces had the custom as well. It most times started with the Emperor lighting the first flame of the bonfire after which he shared it with his Eunuchs and officials and these shared the fire with all other people in the kingdom.
After the torch parade is the Bonfire Party. People play musical instruments like yueqin () and sanxian (three stringed plucked instrument), singing and dancing for a whole night.
The festival also involves sacrifices of food and cattle. It is traditional to eat beef on the Torch Festival for good luck. Other traditional foods include noodles and fruit. It is customary to clean one's house, wear fine clothing, and hold sporting events including wrestling, horse races, and bullfights.
In modern times, the festival has become a tourist attraction. In Liangshan Yi Autonomous Prefecture, it is a local public holiday lasting multiple days; in 2023, it begins on August 10 in the Gregorian calendar.
Footnotes
References
Yi people
Festivals in China
Summer festivals
Summer events in China |
John Lewis Wolfe (10 April 1798 - 6 October 1881) was an English architect, artist and stockbroker. He had a longtime friendship with fellow architect Charles Barry, who was inspired to become an architect by Wolfe.
Early life and education
John Lewis Wolfe was born in Streatham, today part of south London. He was the eldest of two sons born to Lewis Wolfe (1761–1838), comptroller of HM Stationery Office, and his wife Ann (née Porter, 1773–1830).
In 1813, Wolfe was articled to the architect Joseph Gwilt, becoming his favourite pupil. In September 1819, he began a three-year tour of Europe to study architecture. While in Rome, he met Charles Barry, starting a life-long friendship while measuring and drawing Italian Renaissance buildings. Wolfe accompanied Barry to Florence and Veneto, then travelled to Greece and Sicily with architects Thomas Leverton Donaldson and W. W. Jenkins, before returning to London in 1822.
Business career
He started in architectural practice, entering a design competition for new buildings at King's College, Cambridge, but his Italian design was unsuccessful.
Soon after, he joined his brother, Lewis Mortlock Wolfe (1801–1862), establishing a stockbroking business, Wolfe Brothers, based at 23 Change Alley, Cornhill, London until 1848. He remained a member of the London Stock Exchange until 1878.
However, he retained his interest in architecture, mentoring Barry's practice and offering frequent design advice. Wolfe's influence is evident in designs for the Travellers' Club (1829), in Barry's successful competition entry for the Reform Club (1837), and in Barry's designs for the Houses of Parliament at Westminster. Victoria Tower, St Stephen's porch, the ceilings of both houses, and the clock tower are said to show Wolfe's modifications.
From about the mid-1830s Wolfe's influence on Barry's work diminished, but he remained close to the Barry family, and was godson to their fifth son, named John after him, and to daughter Adelaide Sarah. After Barry's death in 1860, Wolfe contributed anonymously to obituaries, helped compile Barry's biography, and organised a fund (to which he contributed £200) for Barry's statue in the Palace of Westminster. He did not get drawn into contemporary debates about whether Barry or Augustus Pugin had been the primary architect of the new palace.
On 6 October 1881 Wolfe died at the Great Western Hotel, Paddington. He was buried at Brompton Cemetery on 10 October 1881. Much of his £140,000 estate went to his godson who was becoming a prominent civil engineer, and who - in Wolfe's honour - added Wolfe to his name after being knighted in 1898, becoming Sir John Wolfe Barry.
References
1798 births
1881 deaths
People from Streatham
19th-century British architects
Italianate architecture in the United Kingdom
Architects from London
Burials at Brompton Cemetery |
```c++
// (See accompanying file LICENSE.md or copy at path_to_url
#ifndef BOOST_HANA_TEST_LAWS_GROUP_HPP
#define BOOST_HANA_TEST_LAWS_GROUP_HPP
#include <boost/hana/assert.hpp>
#include <boost/hana/bool.hpp>
#include <boost/hana/concept/comparable.hpp>
#include <boost/hana/core/when.hpp>
#include <boost/hana/concept/group.hpp>
#include <boost/hana/lazy.hpp>
#include <laws/base.hpp>
namespace boost { namespace hana { namespace test {
template <typename G, typename = when<true>>
struct TestGroup : TestGroup<G, laws> {
using TestGroup<G, laws>::TestGroup;
};
template <typename G>
struct TestGroup<G, laws> {
template <typename Xs>
TestGroup(Xs xs) {
hana::for_each(xs, [](auto x) {
static_assert(Group<decltype(x)>{}, "");
});
foreach2(xs, [](auto x, auto y) {
// left inverse
BOOST_HANA_CHECK(hana::equal(
hana::plus(x, hana::negate(x)),
zero<G>()
));
// right inverse
BOOST_HANA_CHECK(hana::equal(
hana::plus(hana::negate(x), x),
zero<G>()
));
// default definition of minus
BOOST_HANA_CHECK(hana::equal(
hana::minus(x, y),
hana::plus(x, hana::negate(y))
));
BOOST_HANA_CHECK(hana::equal(
hana::minus(y, x),
hana::plus(y, hana::negate(x))
));
// default definition of negate
BOOST_HANA_CHECK(hana::equal(
hana::negate(hana::negate(x)),
x
));
});
}
};
template <typename C>
struct TestGroup<C, when<Constant<C>::value>>
: TestGroup<C, laws>
{
template <typename Xs>
TestGroup(Xs xs) : TestGroup<C, laws>{xs} {
foreach2(xs, [](auto x, auto y) {
BOOST_HANA_CHECK(hana::equal(
hana::negate(hana::value(x)),
hana::value(hana::negate(x))
));
BOOST_HANA_CHECK(hana::equal(
hana::minus(hana::value(x), hana::value(y)),
hana::value(hana::minus(x, y))
));
});
}
};
}}} // end namespace boost::hana::test
#endif // !BOOST_HANA_TEST_LAWS_GROUP_HPP
``` |
Sierra class may refer to the following:
Sierra-class submarine, a Soviet/Russian Navy submarine class
, a Mexican Navy corvette class |
Gerta Maria Luise Karoline Ital (1904 – 1988) was a German-born actress who entered a Japanese Zen Buddhist monastery late in life. She was born in Hanover. She was the first western woman allowed to stay in a zen monastery (in 1963). She studied with Eugen Herrigel from 1953 to 1955. She was also in contact with Hugo Enomiya-Lassalle. Her master in Japan was Mumon Yamada.
She recorded her experiences in two books, The Master, the Monks and I: A Western Woman's Experience of Zen, and On the Way to Satori: A Woman's Experience of Enlightenment. Both books were published in German in the mid-1960s, but were not translated into English until much later.
References
Gerta Ital's profile in "Journeys East: 20th Century Western Encounters with Eastern Religious Traditions"
1904 births
1988 deaths
20th-century German women writers
Zen Buddhist spiritual teachers
Female Buddhist spiritual teachers |
Fleta is a treatise on the common law of England. It was written in Latin with the sub-title seu Commentarius juris Anglicani. The anonymous author of the book is sometimes referred to as "Fleta", although this is not in fact a person's name. The book acquired its common title because its preface contains a remark that it could be called "Fleta" as it was written in "Fleta": however, the meaning of this comment is unclear (see Authorship below).
From internal evidence, the work appears to have been written in the reign of Edward I, and to have been completed shortly after the year 1290.
Authority
This book is one of those listed by Blackstone as being authoritative statements of the law at the time at which they were written. Edward Coke cites Fleta as authority in his Institutes in a number of places.
The article on Fleta in the Encyclopædia Britannica Eleventh Edition says that it "is for the most part a poor imitation of" De Legibus et Consuetudinibus Angliae by Henry de Bracton. O. Hood Phillips described it as an "epitome of" that book. G. O. Sayles was able to show that the author of Fleta had a copy of Bracton to hand, but that (like other copies) it was defective in places, and that he was obliged to make many additions and improvements of his own. The Oxford Dictionary of National Biography describes Fleta as "updating and abridging" Bracton.
Manuscript copies
One complete manuscript copy of this book survives from the fourteenth century. It is held by the British Library where its reference is BL, Cotton MS Julius B.viii. A few passages of this book also survive in another manuscript. This is also held by the British Library, where its reference is BL, Cotton MS Nero D.vi.
Circulation
Because few copies survive, it is thought that this book was "not widely read by medieval lawyers."
Authorship
It has often been assumed that the statement that the book was "written in Fleta" means that it was written during the author's confinement in the Fleet prison. It has been conjectured that the author was one of those judges who were imprisoned for malpractices by Edward I. Noël Denholm-Young and Paul Brand have proposed as an alternative candidate one Matthew of the Exchequer, a yeoman of the royal household and lawyer, who was convicted of forgery in 1290 and committed to the Fleet for two years. However, the element "fleet" (meaning both "swift" and "a watercourse") is also found in other place names in England; or the name might simply refer to the swiftness or brevity of the treatise itself.
Editions
The first printed edition of Fleta was published by John Selden in 1647. It included a dissertation written by Selden, the title of which is "Joannis Seldeni ad Fletam dissertatio". A second edition was published, with corrections, in 1685. A new edition of the first of the six books of Fleta was published in 1735, edited by Thomas Clarke, a future Master of the Rolls: however, he published no more. The next edition appeared in France in 1776, edited by David Hoüard: this was based on the previous printed editions, and was abridged in places. All these editions are regarded, for various reasons, as imperfect.
The standard modern edition (with English translation) was edited by H. G. Richardson and G. O. Sayles, and published in three volumes, covering books 1-6, by the Selden Society between 1955 and 1984. A projected fourth volume, intended to include editorial apparatus (notes and indexes), never appeared: this would have been nominally volume 1, and so the three published volumes are numbered 2–4. Volume 4 does include a 17-page "Introduction" by Sayles, which represents the fullest synopsis of scholarly knowledge about the work to date.
Derivative book
The book known as Britton was based on this book.
See also
Books of authority
Notes
References
Modern edition
English law
Works of unknown authorship
Legal treatises |
The 1962 Men's World Weightlifting Championships were held in Budapest, Hungary from September 16 to September 22, 1962. There were 113 men in action from 27 nations. These world championships were combined with European championships.
Medal summary
Medal table
References
Results (Sport 123)
Weightlifting World Championships Seniors Statistics
External links
International Weightlifting Federation
World Weightlifting Championships
World Weightlifting Championships
International weightlifting competitions hosted by Hungary
World Weightlifting Championships |
```javascript
export * from './Article';
export * from './LoadingArticle';
export * from './PodcastArticle';
``` |
Myrmecina wesselensis is a species of ant discovered and described by Shattuck, S. O. in 2009. This species is known from a single worker collected foraging on the ground at night from the Wessel Islands, Northern Territory.
References
Insects described in 2009
Myrmicinae
Hymenoptera of Australia |
North Carolina Highway 72 (NC 72) is a primary state highway in the U.S. state of North Carolina that serves the communities of Red Springs and Lumberton. The east–west-signed highway physically runs more north and south through Robeson County.
Route description
The western terminus of NC 72 and NC 710 is in Red Springs at the NC 211 intersection. From there, the two highways travel on a concurrency south (signed east) for and split, with NC 72 heading towards Lumberton. Inside the city limits of Lumberton, NC 711 joins NC 72 for a concurrency for about . The highway has an interchange with I-95 and US 301 at which point NC 711 ends. Inside Lumberton, it has a concurrency with NC 41. The final leg of the route sees it intersect with NC 211 (also where the NC 41 concurrency ends) then heads south (signed east) to its terminal junction with US 74 (Future I-74) near Orrum and Boardman.
History
NC 72 was created in 1934 running from Red Springs to US 74 near Lumberton. In 1949, NC 72 was extended to US 301, replacing part of an old alignment of US 74. In 1983, NC 72 was extended along Fifth Street through Lumberton, then south on Roberts Avenue/Wilmington Highway to its current eastern terminus with US 74.
Major intersections
References
External links
NCRoads.com: N.C. 72
072
Transportation in Robeson County, North Carolina
U.S. Route 74 |
Philip Rosenthal (23 October 1916 – 27 September 2001) was a German industrialist, socialite and Social Democratic Party politician. In 1950, Rosenthal regained control of the family's company Rosenthal AG after the fall of Nazi Germany. In 1968, Rosenthal was awarded the Bavarian Order of Merit and in 1981, the Order of Merit of the Federal Republic of Germany. From 1970 to 1971, he served as Germany's Parliamentary Secretary of State under the Ministry of Economic Affairs. Rosenthal was a public figure, and in addition to being Germany's "China King", he was often recognized for his eccentric lifestyle and personality.
Early years
Born October 23, 1916, in Berlin, Germany, Philip Rosenthal was the only son of porcelain manufacturer Philipp Rosenthal from his second marriage to Maria Rosenthal (born Franck, Frank) He attended the Lyceum Alpinum Zuoz and the Wittelsbacher-Gymnasium in Munich. With the rise of Nazism, and because of his Jewish origin, he and his family had to emigrate to England in 1934. He then worked in the Foreign Office's propaganda department, among others, with the Soldatensender Calais.
Rosenthal AG
In 1947, at the request of the family, he went to Selb for the Wiedergutmachung restitution claims. In 1950, Philip Rosenthal joined the paternal porcelain company, Rosenthal AG, and became head of the design department in 1952. From 1958 to 1970 and 1972 to 1981 he was chairman of the board. During this time, the company had more than 10,000 employees. From 1981 to 1989, he served as chairman of the supervisory board. As one of the first German entrepreneurs, he introduced a participation system for employees in 1963, "say and have" by means of co-determination and asset formation in productive capital. In 1968, Rosenthal made headlines when he passed his private share of company ownership in a testamentary way to a foundation for the training of workers to executive staff.
In addition, Philip Rosenthal was president of the German Design Council (1977-1986), chairman of the Bauhaus Archives in Berlin and chairman of the Association of the Ceramic Industry. His central concern as a person and entrepreneur was the "designed environment" with original art and contemporary design to enhance the quality of life of the individual. In collaboration with outstanding artists and designers from around the world, Philip Rosenthal succeeded in the late 1950s and 1960s to make the Rosenthal studio line a recognized model for modern design. From the porcelain factory of his father became a company for contemporary table and living culture. In 1988, Philip Rosenthal was appointed professor of design at the Bremen University of the Arts.
One of his guiding principles was: "Whoever thinks too late of the costs ruins his company. Whoever thinks too early of the cost kills creativity."
Politician
In 1969, he joined the Social Democratic Party (SPD) and was elected to the Bundestag in the same year and in 1972 as a direct candidate in the Goslar - Wolfenbüttel electoral district, then to the Bavarian national list of his party. In September 1970, the entrepreneur became Parliamentary Secretary of State under the Ministry of Economic Affairs under Karl Schiller. However, he withdrew from the office in November 1971 due to differences with the latter about the pace of implementation of the employee participation in productive capacity In 1980, he was a member of the SPD Group.
Striving for social justice in the interaction between companies and employees was a dominant theme in his life.
Personal life
Rosenthal was known as Germany's Emperor of China. A People profile on Rosenthal referred to the tycoons' company stating the "Rosenthal trademark is to china and glassware what Mercedes-Benz is to cars". He was notorious for his eccentric personality and lifestyle. Married four times, Rosenthal had numerous extramarital affairs that were regularly published in German tabloids.
Along with his family he lived primarily in the 18th-century Erkersreuth Castle near his celebrated ceramics factories in the West German town of Selb. Although he spent much of his life traveling with his five children and wife in a Volkswagen Bus with a red rowing scull on the roof. He designed and lead his family on segmented circle tour of Europe over the course of 20 years; starting a new segment of their hike or row at exactly the point where they last left off. His bedroom at the castle consisted of a mattress set on sand-colored carpeting, with tentlike drapes covering the walls and ceiling. He smoked cigars and used his home tanning bed frequently. His longest marriage was to Lavinia Day, twenty years his junior. Day is closely related to playwright, Clarence Day, and publisher Benjamin Day. The couple had four children, Shealagh, Philip Jr, Toby, and Julie. Philip Jr. briefly worked as Rosenthal's CEO and now runs Könitz Porzellan and Waechtersbach ceramics. His eldest daughter Shealagh Alison Macleod De Bourges Day Rosenthal is married to writer, Doron Weber. Philip Rosenthal died September 27, 2001, in Selb, Germany and is interred in a Rosenthal porcelain vase in Erkersreuth Castle's garden.
Exhibitions
2016: Rosenthal - a myth. Two men write history. Porzellanikon, Hohenberg an der Eger and Selb.
Portrait by Andy Warhol
Philip Rosenthal mit Zigarre (1980), Andy Warhol, screen printing 100 × 100 cm, Loaned by Rosenthal AG in the Ulmer Museum.
Selected awards
1968 Bavarian Order of Merit
1981 Order of Merit of the Federal Republic of Germany
1982 Honorary citizenship of Atlanta
1989 Honorary citizenship of the city of Selb
1993 Lower Saxony Order of Merit
Published works
Einmal Legionär. Albrecht Knaus, Hamburg 1980, .
Literature
Joachim Hauschild: Philip Rosenthal. Ullstein, Berlin 1999, .
Alexandra Siemen-Butz: Philip Rosenthal. Ein innovativer Unternehmer und politischer Mensch. Berlin 2016, .
Film
1974: Philip Rosenthal. Reihe: Mäzene. Eine Produktion des Saarländischen Rundfunks (15 Minuten). Buch und Regie: Klaus Peter Dencker
References
External links
Members of the Bundestag for Bavaria
Members of the Bundestag for Lower Saxony
1916 births
2001 deaths
Businesspeople from Berlin
Social Democratic Party of Germany politicians
Commanders Crosses of the Order of Merit of the Federal Republic of Germany
20th-century German businesspeople
German industrialists
Jewish emigrants from Nazi Germany to the United Kingdom
People from Wunsiedel (district)
Alumni of Lyceum Alpinum Zuoz |
The Lakh Mazar inscription is a pre-historic stone wall estimated to be more than 7,000 years old and located near the Kooch village, about 29 km away from Birjand, Iran. It is the most valuable memorial plaque in eastern Iran due to its diversity and historical importance. The inscriptions were discovered by the Birjand Historical Research group and, after preliminary studies, 307 images, including a collection of inscriptions and motifs on the rocky mountains of Bagheran, were identified. Each inscription has a unique style from the period of its creation and can be analyzed independently of the others. As a general category, the Lakh Mazar inscriptions can be attributed to four major historical periods: the stone, pre-historic, historical, and Islamic periods. The inscriptions depict human, animal, and plant signs and symbols. From the 307 paintings and engravings on the rocks, 22 depict humanity, 33 depict animals, and 35 depict plant life. There are four pictorial lines, 81 inscriptions dated to the Pahlavi, Parthian, or Sassanid empires, 42 with Perso-Arabic script, and 67 rock paintings which have yet to be identified.
Swastikas
The Lakh Mazar inscriptions contain swastikas or spinning wheels inscribed on stone walls. One instance is in Khorashad, Birjand, on the Lax e Mazar. Due to vandalism, some have been destroyed.
See also
Iran
Tall-i Bakun
Persia
Rahmatabad Mound
Cities of the ancient Near East
Khorashad
Mahmuei
Mud
zibad
Notes
External links
Iranika
survey of lakh mazar
survey of lakh Mazar
swastika in Iran
Prehistoric inscriptions
Archaeological artifacts
Khorasan
Treasure troves of Asia
Old Persian language
Middle Eastern objects in the British Museum
Archaeology of the Achaemenid Empire
Sculpture of the Ancient Near East
Jewellery
Persian art
19th-century archaeological discoveries
Art Nouveau collections
Geography of Iran
History of Iran
Central Asia |
Eyewitness memory is a person's episodic memory for a crime or other witnessed dramatic event. Eyewitness testimony is often relied upon in the judicial system. It can also refer to an individual's memory for a face, where they are required to remember the face of their perpetrator, for example. However, the accuracy of eyewitness memories is sometimes questioned because there are many factors that can act during encoding and retrieval of the witnessed event which may adversely affect the creation and maintenance of the memory for the event. Experts have found evidence to suggest that eyewitness memory is fallible.
It has long been speculated that mistaken eyewitness identification plays a major role in the wrongful conviction of innocent individuals. A growing body of research now supports this speculation, indicating that mistaken eyewitness identification is responsible for more convictions of the innocent than all other factors combined. This may be due to the fact that details of unpleasant emotional events are recalled poorly compared to neutral events. States of high emotional arousal, which occur during a stressful or traumatic event, lead to less efficient memory processing.
The Innocence Project determined that 75% of the 239 DNA exoneration cases had occurred due to inaccurate eyewitness testimony. It is important to inform the public about the flawed nature of eyewitness memory and the difficulties relating to its use in the criminal justice system so that eyewitness accounts are not viewed as the absolute truth.
Encoding
During the event
Challenges of identifying faces
People struggle to identify faces in person or from photos, a difficulty arising from the encoding of faces. When participants were given a basic memory test from an array of photos or a lineup, they struggled to accurately identify the images and had low recognition. This finding provides a starting point for estimating the accuracy of eyewitnesses' identification of others involved in a traumatic event. It can only get more challenging for a person to accurately encode a face when they themselves are experiencing a traumatic event. Because courts rely on eyewitness facial recognition, it is important to acknowledge that identification is not always accurate. Face-specific cognitive and neural processes show contributions to holistic processing and recognition in the episodic memories of eyewitnesses. Unreliability of eyewitness identifications may be a result of mismatching between how faces are holistically processed and how composite systems retrieve features in faces during an event.
Other-race effect
The other-race effect (i.e. the own-race bias, cross-race effect, other-ethnicity effect, same-race advantage) is one factor thought to impact the accuracy of facial recognition. Studies investigating this effect have shown that a person is better able to recognize faces that match their own race but are less reliable at identifying other more unfamiliar races, thus inhibiting encoding. Various explanations for this effect have been proposed. The perceptual expertise account suggests that with an increase of exposure to one's own race, perceptual mechanisms develop which allow people to be more proficient at remembering faces of their own race. The socio-cognitive account predicts that motivational and/or attentional components over focus on the race of a person. Another hypothesis is that each race pays attention to certain facial details to differentiate between faces. However, other races might not encode these same features. A final suggestion is that faces of the same race are encoded more deeply, leading a witness to have a more detailed memory for those faces; but there has not been much research to support this hypothesis. Research on the other race effect has mainly focused on the African American and Caucasian races. Most research has shown that white eyewitnesses exhibit the other-race effect, however this effect does extend to other races too. In general, memory is an individual process and that conceptualization of race causes racial ambiguity in facial recognition. Mono-racial eyewitnesses may depend on categorization more than multiracial eyewitnesses, who develop a more fluid concept of race. Perception may affect the immediate encoding of these unreliable notions due to prejudices, which can influence the speed of processing and classification of racially ambiguous targets. The ambiguity in eyewitness memory facial recognition can be attributed to the divergent strategies that are used when under the influence of racial bias. This phenomenon is not limited to race. Stereotypes of any kind (whether they be related to age, gender, etc.) can affect the encoding of information at the time of the event. For example, if one is held at gunpoint by two individuals, one of whom is a man and the other is a woman wearing a hat, the victim may quickly fall back on the belief that men are more likely to be aggressors. Consequently, the victim may encode the situation as involving two male assailants, yielding problematic effects in the process of identifying the assailants later on.
Stress and trauma
Stress or trauma during an event can affect the encoding of the memory. Traumatic events may cause memory to be repressed out of conscious awareness. An inability to access the repressed memory is argued to occur in cases involving child sexual abuse. Another way encoding a memory can be affected is when the person involved in a traumatic event experiences dissociation; mentally removing themselves from the situation, which may serve as a coping mechanism. Lastly, trauma may induce a flashbulb effect; the witness believes they vividly remember significant details of a salient event, although accuracy must be determined of such memories . In legal settings the mental state of an individual at both witnessing a crime and in testimony can affect the success of their memory retrieval. Stress in small amounts is thought to aid memory, whereby stress hormones released by the amygdala promote the consolidation of emotional memories. Nevertheless, stress in high amounts may hinder memory performance. Witnesses of severe crimes or trauma can develop further complications, such as posttraumatic stress disorder (PTSD) or even psychogenic amnesia.
Post traumatic stress disorder
Explicit memory (used in legal testimony) is affected by post traumatic stress disorder (PTSD); individuals diagnosed with PTSD can struggle to recall explicit events from their memory, usually those which are especially traumatic events. This may be due to the individual preferring not to think about the unpleasant memory, which they may rather forget. Implicit memory, on the other hand, does not seem to be affected in the same way that explicit memory does, rather some individuals with PTSD may score higher on implicit memory tests than non-PTSD individuals.
Psychogenic amnesia
Psychogenic amnesia (or dissociative amnesia) can affect explicit memory for a particular event. Those with psychogenic amnesia present impaired memory functioning in their personal life histories without a discernable neurological cause. Most often cases of psychogenic amnesia occur after witnessing an extremely violent crime or trauma, such as war. This also goes for experiencing a crime, such as childhood sexual abuse. The dissociation after the event can lead to a higher chance of revictimisation.
Mood-congruency effect
Everyday memory can be affected by factors such as stress or mood. The 'mood congruency' effect refers to memory being aided by a matching of mood at the encoding/learning stage to the retrieval stage. If a memory is encoded under stressful conditions it may be more likely that the memory is better recalled if stress levels at retrieval are congruent to stress levels at encoding. Mood congruency may affect a witnesses ability to recall a highly stressful crime, if conditions of encoding and retrieval are different. Moderate amounts of stress may be beneficial to memory by the release of corticosteroids. Conversely, too much stress (and therefore an extreme influx of corticosteroids) can affect function of the hippocampus and therefore hinder memory. Very high levels of corticosteroid release may be very detrimental for memory.
Weapon focus
The weapon focus effect suggests that the presence of a weapon narrows a person's attention, thus affects eyewitness memory. A person focuses on the central detail (for example, the weapon) and loses focus on the peripheral details thus resulting in worse perpetrator recall. While the weapon is remembered clearly, the memories of the other details of the scene suffer. The weapon focus effect occurs because additional items require more visual attention, therefore they are frequently not processed. This increased focus of attention on central aspects takes away attentional resources from peripheral details. For example, if a gun was brought into a school, it would attract significant amount of attention, because students are not used to seeing that item. When participants were watching a slideshow, and were seeing an unusual stimulus item, their reaction times were slower (regardless whether the stimulus was dangerous) in comparison to reaction times for more frequent stimulus. When the item was dangerous (i.e. a weapon), participants had a lower accuracy and confidence than the control group's. Another hypothesis is that seeing a weapon might cause an aroused state. In an aroused state, people focus on central details instead of peripheral ones.
Interference
The testimony of a witness can lose validity due to too many external stimuli, that may affect what was witnessed during the crime, and therefore obstruct memory. For example, if an individual witnesses a car accident on a very public street, there may be too many cues distracting the witness from the main focus. Numerous interfering stimulus inputs may suppress the importance of the stimulus of focus, the accident. This can degrade the memory traces of the event, and diminish the representation of those memories. This is known as the cue-overload principle.
After the event
Memory becomes susceptible to contamination when witnesses discuss the event with others and as time passes. This is because memory traces blend with other stories and events that the witness is exposed to after the stressful or traumatic event Because memory is subject to contamination, the most reliable test of a memory is the initial test. Police procedures can reduce the effects of contamination on memory with proper testing protocols.
Misinformation effect
Witnesses can be subject to memory distortions that can alter their account of events. It is of particular interest that the memory of an eyewitness can become compromised by other information, such that an individual's memory becomes biased. This can increase eyewitnesses sensitivity to the misinformation effect. Individuals report what they believe to have witnessed at the time of the crime, even though this may be the result of a false memory. These effects can be a result of post-event information. It is very important to provide witnesses with helpful response options on memory tests and to be warned of misleading influences that might affect how the memory of the event is recalled at a later time. Many employees, police force workers, and others are trained in post-warning in order to reduce influences on the misinformation effect, which can be predicted before crime. In their studies, many researchers use eyewitnesses to study retrieval-blocking effects, which interfere with a witness' ability to recall information. Misleading information prior to the event can also influence misinformation effects. Other studies also address how the misinformation effect seems to amplify over increasing recall. Discussing events and being questioned multiple times may cause various versions of the testimonies. However, the earliest records prove to be the most accurate due to a minimized misinformation effect. In one study, repeated recall of a traumatic event did not increase resistance to misinformation, nor did it increase susceptibility to information. This result may be due participants being presented both forms of additive and contradictory misinformation.
Unconscious transference
Many mistaken identifications are the result of unconscious transference, or the inability to distinguish between the perpetrator and another person who was encountered in a different context. In many of these cases, the culprit is confused with a different person who was present at the crime scene. Implicit processing takes place during the event, in which the witness encodes the general features of innocent bystanders, creating a sense of familiarity. At retrieval, this familiarity could cause people who were merely present in the crime scene to be confused with the culprit. After viewing a video of a crime involving a thief and two innocent bystanders, participants were asked to identify the perpetrator from a lineup including the three persons present in the video and three other people never before encountered. Most participants falsely identified an innocent person from the lineup. Furthermore, participants were more likely to misidentify one of the two innocent confederates in the video than one of the three unfamiliar people. Unconscious transference occurs in this instance when the witness misattributes his or her sense of familiarity of the perpetrator to a bystander. This confusing effect of familiarity is found in the mug shot procedure as well. The presentation of mug shot arrays alone does not seem to influence identification accuracy. However, this presentation can be influential if the police lineups include individuals who were earlier featured in the mug shot array. Individuals appearing in police lineups that also appeared in previous photo arrays may be identified as quickly as identifying the actual target. Therefore, in cases where a suspect is identified from mug shots following a line-up, it is uncertain whether the line-up identification is a result of the recognition of the perpetrator or of the detection of a person seen previously in mug shots.
Retrieval
Lineups
A police lineup is a method for an eyewitness to identify a perpetrator by viewing a series of photos, or a live group of suspects. One possible outcome of a lineup is that the eyewitness can correctly identify the criminal. Another outcome is that the eyewitness can correctly state that the criminal is not in the lineup. A third option is that the eyewitness can fail to recognize that the culprit is present. Lastly, the eyewitness can incorrectly select another suspect. The ideal result is to correctly identify the offender, and the worst outcome is to mistakenly identify an innocent.
Police role in lineup
There are specific guidelines for police to follow when administering a lineup, to reduce bias in the lineup and increase the accuracy of eyewitness judgements. Police must reduce the pressure that eyewitnesses feel to select a criminal from an array of photos or persons. They should make sure that the eyewitness is aware that the perpetrator might not be in the lineup. Also, police should conduct a double blind procedure that does not allow them to see the lineup. This prevents police from giving the eyewitness any information, intentional or not, about who in the lineup is a police suspect. It also prevents the police from giving any feedback to the eyewitness. Feedback can produce a false confidence in the witness' selection. When overseeing a lineup, the police can use speed of recognition to determine the validity of the identification. If the witness quickly identifies the perpetrator, then the selection is more likely to be correct. A lineup may be ineffective as the pressure on the witness to identify someone who they believe is the perpetrator can lead to false identifications. To prove this we could use the Deese-Roediger-McDermott (DRM) paradigm which is used in psychology experiments as a technique that explores the relationship between memory, language, and cognition. Participants are presented with a list of words or images that are semantically related to a certain word that is not actually on the list. A study done by Daisuke, Matsui, & Yuji showed that using the Deese-Roediger-McDermott paradigm has demonstrated that false memory can be produced by the morphological characteristics of a list. Morphological characteristics of the list refer to the structural features of a list of words that are presented to participants for example using the words smile, laughter, and joke, participants were more likely to falsely remember a smiling face, even if no such face was actually presented. This suggests that witnesses may be prone to false identification even without intentional manipulation. Alternative methods of identification, such as photo arrays and sequential lineups, are recommended to reduce the risk of false identifications and improve the accuracy of criminal investigations.
Style of lineup
A sequential lineup presents a witness with a series of photos one at a time, requiring the participant to identify if each photo matches his/her memory before moving forward. The witness does not know how many photos are in the group. In a simultaneous lineup, the photos or suspects are viewed together. Sequential lineups produce fewer identifications, since they are more challenging, and require absolute judgement. This means that the decision regarding the matching of the memory to the photo is independently made. On the other hand, a simultaneous lineup requires relative judgement, as the decision is not independent of the other possibilities. An absolute judgment is a judgment that requires the person to be 100 percent certain in their choice where a relative judgment is when someone makes up their mind based on what looks the closest. However, researchers such as Dr. Gary Wells from Iowa State University claim "during simultaneous lineups, witnesses use relative judgment, meaning that they compare lineup photographs or members to each other, rather than to their memory of the offender." Sequential lineups have been preferred historically, seeing as they do not rely on relative judgment. However, recent data suggests the preference for sequential lineups over simultaneous lineups may not be empirically supported. Individuals who participate in sequential lineups are less likely to make a selection at all, regardless if the selection is accurate or not. This suggests the sequential lineup fosters a more conservative shift in criterion to make a selection rather than an increased ability to pick the true perpetrator. Consequently, further research is needed before offering recommendations to police departments.
Size of lineup
Lineup members should have diverse characteristics so that lineups are not biased toward or against the suspect. If the appearance of a person stands out amongst the otherwise indistinctive crowd, then an eyewitness is more likely to select that person regardless of their own recollection of the criminal. According to Schuster (2007), the suspect, if he is in the in person lineup or in a picture lineup, should not stand out from the others in the lineup. People's eyes are drawn to what is different. If you make sure that all the men or women in the pictures have a similar appearance, have the same background in their picture, race, age, and are wearing the same or similar clothing, just to name a few, then the risk of getting a false positive will decrease. Thus, this lineup is suggestive. Fillers should be added to the lineup in order to depict a broad spectrum of characteristics, but must match any known description of the offender. If lineup members do not all match the known description of the offender then the lineup is biased toward the suspect. Biased lineups have been shown to increase misidentifications, particularly in target-absent lineups. Increasing the nominal size of a lineup (the actual number of suspects that are compiled) often decreases the potential for a wrong selection. Functional size also plays a role in lineup bias. Functional size is the reciprocal of the fraction of mock witnesses that choose the suspect from a lineup. For example, in a lineup of nominal size 5, if 15 out of 30 mock witnesses (randomly chosen individuals that did not experience the offence) choose the suspect, the functional size of the lineup is the reciprocal of 15/30, which is 30/15, or 2. So although the lineup has 5 members, functionally it only has 2. Effective size is the number of probable suspects. Police use these three numbers to evaluate a lineup.
Viewpoints
Many studies, as well as police procedures, are dependent on photo lineups or police lineups where the eyewitness views the suspects from a distance. This procedure is done in an attempt to eliminate suspects and identify the perpetrator. These types of lineups allow only small degrees of visual information for the eyewitness, such as limited viewing angles, which restrict the level of detail compared to a computerized virtual lineup where witnesses can see the targets from multiple angles and distances. One might anticipate that examination of the suspects from unlimited viewpoints would allow for better recognition cues, than when compared to limited views. However, unlimited visual information may be disadvantageous and counterproductive if the information offered at the time of retrieval was not actually present at the time of memory encoding. For example, if an eyewitness only saw the face of the perpetrator from one angle, seeing the lineup participants from other viewpoints might be distracting. Other studies have demonstrated that unlimited viewpoints do improve accuracy in police lineups. The eyewitness accuracy improves when the distance between the suspect and witness matches the distance during the initial witnessing of the crime.
Retroactive interference
Another phenomenon that may interfere with an eyewitness' memory is retroactive interference. This occurs when new information is processed that obstructs the retrieval of old information. A common source of interference that may occur after the event of a crime is the reporting of the crime. Police investigations include questioning that is often suggestive. The processing of new information may disrupt or entirely replace old information. If a police officer has reason to believe that a suspect is guilty the interrogator's bias can influence the eyewitness' memory. The interrogators can also put pressure on witnesses causing them to want to select a perpetrator from a police lineup. Eyewitnesses are often unsuspecting of the interrogator bias and believe their memories to be uncontaminated.
Co-witness contamination
The presence of a co-witness can often contaminate memories. When witnesses confer about an event they can end up agreeing on an incorrect narrative. Research has found that 71% of witnesses changed their eyewitness accounts to include false components that their co-witnesses remembered. This makes it very difficult to reconstruct the actual account of an event. To prevent this effect, police should separate witnesses as early as possible before the reporting of the event. Unfortunately this is difficult, especially if the police do not get involved immediately after the event. Police should inform witnesses of the possibility of contamination as soon as possible. Witnesses should be interviewed as soon as possible with police noting if the witnesses have compared accounts. Once the accounts have been recorded, police should make notes of similarities or differences that could point to contaminated details or facts.
Confidence
A witness identifying a suspect can make a decision with little or great confidence. Level of confidence varies between different witnesses and situations. There are two types of confidence: confidence in a witness' own ability to make an identification (prior to viewing a police lineup) and confidence in having made an accurate identification or accurate rejection. It must be considered that memories are normally vulnerable to multiple influences and prone to distortions and deceptions: "they are never constant and never result in fully accurate representations [and] these changes occur without us being aware of them." As a consequence, the witness' confidence in his/her ability to make a correct identification should not be used to assess the accuracy of identification. Witnesses should be asked to attempt identifications even if their confidence is low. Confidence ratings after identification of a suspect is a better ( but not perfect) predictor.
In many experiments, witnesses are asked to rate their confidence in their decision after making an identification from a lineup. A number of psychologists have investigated factors that might affect the confidence accuracy relationship. In a recent review of 15 experiments, suspect identifications made with high confidence were, on average, 97 percent accurate. On the other hand, witnesses who report low confidence are highly suggestive of inaccurate identification. University of Virginia law professor Brandon Garrett analyzed trial materials for 161 DNA exonerated individuals and found that in 57 percent of those cases, it was possible to determine that, in the initial (uncontaminated) memory test, the eyewitnesses were, at best, uncertain.
The optimality hypothesis states that factors influencing the optimality of information processing also influence the reliability of the confidence estimate. During situations in which information processing conditions are less than optimal (e.g. the perpetrator is disguised or duration of exposure is brief) witnesses' performance during identification decreases and they are less confident in their decision. The confidence accuracy correlation is thus estimated to be stronger in situations of optimal information processing such as longer exposure time, and weaker under conditions that are not optimal.
Certain factors affect identification accuracy without influencing confidence whereas other factors influence confidence without having an effect on identification accuracy. Reconstructive processes in memory (i.e. the influence of post-event information on stored memories) can influence identification accuracy while not necessarily affecting confidence. Social influence processes (i.e. committing to a decision) might have an effect on confidence judgements while having little to no effect on the accuracy of the identification.
Interviews
The method of conducting an interview has great implication on the accuracy of the testimony. When the person being interviewed is forced to provide more information, he/she is more likely to engage in confabulation. For example, when participants were shown a video and instructed to answer all questions (answerable and unanswerable) about its content, they often fabricated information. When prodded too much to remember something, people often fall upon false memories. This effect is also seen in hypnosis: when people intensely try and are guided to remember something, they may end up mistaking a vivid imagination as a memory.
Cognitive interview technique
Researchers have developed a strategy, entitled the cognitive interview technique, to elicit the most accurate eyewitness memory. In this preferred protocol for conducting interviews, the interrogator should make the witness feel comfortable, ask open-ended questions, and grant the witness freedom in describing the event. In addition, the interviewer should encourage the witness to exhaust his/her memory by reinstating the context of the event, recalling the events in different orders, and viewing the event scene from different perspectives.
Suggestibility
Distortions in a witness's memory can be induced by suggestive questioning procedures. Asking eyewitnesses to repeatedly retrieve information in multiple interviews may enhance memory because the event is being rehearsed many times or, as in many cases, increase suggestibility. Misleading information offered by the investigators may attract more attention than the originally encoded information, so the witness' memory of the event is altered to include erroneous details suggested during the interview. In addition, repeating questions could make the witness feel pressured to change his or her answer or elaborate on an already-given response with fabricated details. Open-ended questioning can reduce the level of retrieval-enhanced suggestibility because the witness is not subjected to testing manipulation by the interviewer.
Contextual reinstatement
Contextual reinstatement is a common technique used to help eyewitnesses remember details about a specific environment—reviewing the initial environment in which the original information was encoded. Taking a witness back to the scene where the event occurred, for example, will help facilitate the accuracy in identifying perpetrators. Reinstatement is thought to improve recall as it provides memory retrieval cues. Research has demonstrated that pairing faces of suspects or words with contextual cues at the scene of the crime will enhance performance on recognition tasks. Therefore, it seems practical that these results can be applied to eyewitness identification. Methods commonly used to examine context reinstatement include photographs of the environment/scene, mental contextual reinstatement cues, and guided recollection. Studies show that re-exposing participants to the crime scene does enhance performance in facial recognition. There were also notable effects for context reinstatement where improvement on correct identifications while increasing false alarms. Reports also show that the magnitude of improvement via context reinstatement increased in lifelike situations compared to laboratory studies.
Experimental context
An alteration of context was found to be one of the most important predictors of recognition accuracy. Such changes in experimental context have been shown to have effects similar to transformations in appearance, such as disguises. Criminal identifications can be influenced by a change in context. Investigators must account for the fact that encountering an acquaintance that we usually see in one context, such as work place, alters memory generalizability when compared to encountering the same acquaintance in another environment that acts like an unassociated context, such as a grocery store. The changes in environment make it difficult to identify this acquaintance. Initially, the individual might seem familiar but because this person is not in the normal context, it might be difficult to place the face and recall the name. Researchers have begun to implement procedures for reinstating the context surrounding a specific event in an attempt to improve identification accuracy. Reinstating the crime scene is often not possible. Sometimes, however it is possible to have eyewitnesses imagine and thus mentally reinstate the surroundings with imagery instructions and other mnemonic devices. In some instances, objects from the crime scene such as guns or clothing can be used additionally to help reinstate the context. Such methods have successfully shown to improve reliability and accuracy of eyewitness recall.
Verbal overshadowing effect
The process of describing a face entails thinking about its features independently, but people process faces configurally (as a whole, encoding the features in relation to one another). So, the process of describing the face often impairs the memory of it—this is the verbal overshadowing effect. A verbal overshadowing effect typically refers to the negative effect on memory recall as a result of giving a verbal description of a visual object. For example, a witness who gives a verbal description of a face is likely to have subsequent impaired recognition for that face. However, Perfect et al. (2002) predicted that the verbal overshadowing effect would also be seen in voice recognition; that is that verbally describing a voice should also impair subsequent recognition of that voice. They predicted this because they argued that voices were difficult to articulate and so it is likely they would be vulnerable to the verbal overshadowing effect. This was found to be the case. Moreover, a dissociation between accuracy and confidence was observed. Participants' confidence that they had identified the correct voice in the audio-lineup was not influenced by the verbal overshadowing effect; in other words, verbal overshadowing had the effect of decreasing earwitnesses' recognition ability but without their knowledge.
Child testimony
Most of the research on eyewitness memory has involved adults, despite the fact that it is not uncommon for children to have been involved in a crime or to have been the central witness of a crime. Statistics from the Crown Prosecution Service revealed that 1,116 children under the age of 10 were witnesses to a crime in England and Wales in 2008/9.
Children's testimony refers to when children are required to testify in court after witnessing or being involved in a crime. In situations where a child is the main witness of a crime, the result of the hearing is dependent on the child's memory of the event. And there are several important issues associated with eyewitness memory of children. For example, the accuracy of the child's explanation, in such situations, coupled with how well the child can identify the setting of the crime and the individuals involved in the crime, influence the credibility of the child's testimony. Whilst research shows that it is possible for children to provide relevant and accurate forensic information, they appear less reliable than adult witnesses and like all witnesses, can create false memories. The experience of testifying can also be harmful and anxiety-inducing to the child, leaving them unable to give a credible testimony.
Moreover, children often have a limited vocabulary, a desire to please the officer, or difficulty answering questions because of trauma. Using early childhood memories in eyewitness testimony can also be challenging because for the first 1–2 years of life, brain structures such as the limbic system, which holds the hippocampus and the amygdala and is involved in memory storage, are not yet fully developed. Research has demonstrated that children can remember events from before the age of 3–4 years, but that these memories decline as children get older (see childhood amnesia).
Children can be involved in testimony not only when they are witnesses, but also when they are victims. There have been several cases of children recovering false memories of childhood abuse. Children as especially suggestible and in cases of recovered memories, is hard to determine whether the recovered memory is accurate or imagined. Due to the sensitivity of these cases, strategic interviewing is implemented for children, which may result in the validity of the memory to suffer. Strategic interviewing must be assessed with sensitivity on an individual bases and without leading questions, as they may influence the child's answer. Additional influences may include individuals surrounding the child prior to, and during the hearing. If children hear new information from such individuals, studies show that children will more than likely agree with what the others said—regardless of the child's initial opinion.
Studies on children show that the average child is at greater risk for memory loss, due to the brain's immaturity and plasticity, when compared to an average adult. Poorer memory performance in young kids was shown when youth of different ages were asked to recall a doctor's visit. Children aged 3–5 answered with much less accuracy than individuals aged 6–15, indicating developmental differences in memory capacity. Furthermore, it has been shown that information encoded and stored in memory is dependent on the extent of knowledge regarding the event. That is, children exposed to an event with little knowledge, their memory of the event will not be as accurate when compared to a child who is more knowledgeable on event-related topics. These results of increased sensitivity, suggestibility and memory loss in children lead one to question the competency of a child to serve as an eyewitness. Researchers have determined that children should be considered a competent witness when they have the capacity to observe, communicate, produce sufficient memories, differentiate truth from lies, and understand the obligation to tell the truth. However, the same caution that is taken with all eyewitnesses should be taken with child testimony, as all eyewitness testimonies are prone to inaccuracies.
Intellectual ability and testimony
Individuals with intellectual disabilities are at a higher risk for sexual abuse and exploitation because they are often dependent on others and uneducated or physically incompetent in ways of self-protection. Therefore, much research has been devoted to investigating the accountability of these individuals in eyewitness testimonies. When a group of adults chosen by the Developmental Disabilities Association was compared to a control group of college students, they performed equally well when a target was absent from a lineup. However, the control group were better at recognizing when a target was present in a lineup, leading to the determination that people with intellectual disabilities are more suggestible and likely to confabulate. Children with intellectual disabilities show similar patterns in their eyewitness accounts. After watching a video of a crime, children with these disabilities performed worse than non-disabled kids of the same age on free recall, open-ended questions, and both general and specific misleading questions. These children performed better than the age-matched control group only on leading questions with yes or no answers, suggesting that they are more likely to acquiesce in the interview. These findings indicate that individuals with intellectual disabilities could be considered competent witnesses if interrogated in a non-leading manner.
Eidetic memory
Individuals who are said to possess eidetic memories are thought to hold to an image in mind for longer and with more accuracy than the average individual. But evidence for eidetic memory is limited, and there is no evidence for photographic memory or a memory being an exact replica of an event. The memories of those who claim to have superior eidetic memories are just as flawed as the memories of individuals who have normal mnemonic abilities; people who claim to have photographic memories are not immune to flawed eyewitness testimony. Witnesses who believe that they are able to retrieve an accurate mental photograph will also be much more confident in their account of the event and may influence the trial outcome. Accuracy recall of such visual scenes is a controversial issue. In the past, eidetikers were believed to have extremely accurate recall for visual displays, but modern research findings might reveal a different story. Some research demonstrates that eidetic children have greater recall accuracy for visual details compared to non-eidetic children. Other researchers have failed to find any advantage between the two groups. It is also hypothesized that eidetic imagery is not exactly related to memory and improves recall for visual details. As such, photographic memory is not useful in the courtroom.
The frequency of eidetic imagery is low in adults and shows greatest frequency in early child development. In fact, it is almost non-existent past the age of 7. When procedures are used to classify eidetic memory separate from the characteristic of afterimage and memory image, a small number of children are classified as true eidetikers. These children are still suggestible; their eyewitness testimonies may still have error.
Earwitness memory
Research investigating earwitness memory has only recently emerged from the shadow of the extensively investigated phenomena of eyewitness memory and eyewitness testimony, despite having been in use within the English justice system since the 1660s. Earwitness memory refers to a person's auditory memory for a crime or incriminatory information they have heard. Much of the research which has been conducted on earwitness memory focuses on speaker recognition, otherwise known as voice recognition, whilst there is less research which investigates memory for environmental sounds. The majority of the literature on voice and face recognition finds a robust face advantage; compared to voice recognition, face recognition appears to be the stronger pathway, with most individuals finding it much more difficult to recall a voice compared to recalling a face.
Eyewitness vs. earwitness accuracy
A substantial proportion of the literature into witness testimony finds a robust recall advantage for visual stimuli compared to auditory stimuli. We seem to have a profound memory advantage for visual objects and scenes whilst being poorer at remembering auditory information. This therefore has clear implications for eyewitness and earwitness memory; what is seen should be more likely to be remembered than what is heard by a witness. This finding can be extended to faces and voices; within the person recognition literature, it has been found that individuals are far better at identifying a person by their face as opposed to their voice.
Non-verbal memory: environmental sound
Researchers define environmental sounds as those that are either animate, inanimate, artificial or natural; sounds produced by real events as opposed to machine-generated sounds; sounds that are more complex than laboratory-produced sounds and those that are dynamic and convey a sense of activity. Examples include the ring of a doorbell, coughing, rain, a car engine, a railroad crossing signal, and so on. Such environmental sounds are important sources of information and provide us with knowledge of our surroundings.
Research has found that recall for environmental sounds can be dependent upon the storage and retrieval of verbalizable interpretations. In one study, individuals heard a selection of ambiguous environmental sounds and attempted to label each sound as they were presented. A week later, individuals labelled the sounds again and it was found that re-labelling the sounds subsequently caused individuals to perform much better in the recognition test. Recognition of environmental sounds therefore appears dependent upon labeling both at input and in the test phase, either when labels are created by subjects as they hear the sounds, or when labels are generated by the experimenter and presented to subjects. More recent research has found that it is possible to memorize the loudness of an environmental sound. However, a lot of research investigating environmental sound and memory recall is conducted in a laboratory setting and so has limited ecological validity and generalizability.
Verbal memory: voice recognition
Compared to memory recall for faces, voice recall appears to be significantly more vulnerable to interference. These consistent findings suggest that earwitness memory is far more vulnerable to the effects of interference compared to eyewitness memory; although the weight placed on eyewitness memory in court should also be carefully considered as there is much evidence to suggest its fallibility. For example, some studies have found that eyewitness identification can be impaired by effects such as the weapon focus effect or verbal overshadowing. Nevertheless, voice recognition appears to be the pathway most significantly impaired by interfering factors.
Face overshadowing effect
A face overshadowing effect is often found to occur, whereby individuals' voice recognition performance is impaired with the co-presentation of a face. Visual information therefore appears to have the ability to significantly interfere with the recall of auditory information. However, research has investigated whether earwitness memory is impaired to the same extent when the face of the one speaking is concealed in some way. Research shows that when a face is covered, with a balaclava for instance, accuracy for voice identification slightly improves; however a face overshadowing effect still exists despite the earwitness being able to see fewer facial features.
Pitch of voice
Voice pitch has also been identified as a factor that can affect voice recognition performance. Individuals are likely to exaggerate their memory for pitch; upon hearing a high pitched voice in an initial presentation (such as the perpetrator's voice in a crime), individuals are likely to choose an even higher-pitched voice in the test phase (audio line-up). Similarly, upon hearing a low-pitched voice, they are likely to remember the voice as being even lower in pitch when voices are presented in an audio line-up. Comparable cognitive functions seem to operate when individuals attempt to remember faces; ambiguity surrounding the ethnicity or gender of faces is likely to result in the individual's recall of faces to be exaggerated with regards to ethnic and gender-related features. Researchers call this the accentuation effect. It is suggested that voice pitch, alongside other 'surface properties' of speech such as speech content, are instantaneously encoded into memory. This contrasts with auditory features such as amplitude and speaking rate, of which there is contrary evidence about whether they are automatically encoded into memory.
Other-accent effect
There is evidence to suggest that witnesses may find it harder to identify a perpetrator's voice if the perpetrator speaks the witness's native language with an accent compared to without one. It is thought that more cognitive effort is required to process a non-native speaker's voice. This is because a 'cost' is placed on the listener, with accented voices violating the 'speech schema' the listener is familiar with in their own geographic region. Therefore, listeners may be required to expend more effort in order to recognize and distinguish the non-native speaker's phonetic segments and words.
An accent also has the potential to interfere with the witness's ability to recognize the perpetrator's appearance. It has been found that when witnesses are asked to recall a perpetrator, the perpetrator's physical appearance is remembered less well when they have an accent compared to when they do not. This appears the case with different accents, speech content and how long a listener is exposed to the speaker. One proposed explanation for why accents can negatively affect the recall of visual information and eyewitness memory draws from Wickens' (2002; 2008) multiple resource theory. Wickens' theory suggests that attentional resources are separated into distinct 'pools'. Only visual and auditory tasks have access to visual and auditory attentional resources, respectively. However, when a task arises which requires the use of attentional resources from both modalities, this leads to competition for resources, in turn leading the inability to accomplish one or both tasks or resulting in poorer performance. Therefore, fewer general resources may have been available in order to encode and remember the perpetrator's appearance after witnesses had used attentional resources for the processing of the accented voice and speech content.
Direct hearing vs. devices
Whilst many earwitness accounts are attained directly and 'in-the-moment', many will be acquired over a telephone or over other communication devices. Whether the earwitness hears a conversation or other auditory information in person or hears it over a communication device could impact their rate of accuracy. However, contrary to this prediction, research has found no significant differences between the accuracy of voice identification when the voice was heard directly or over a mobile phone, despite the sound quality seeming poorer in the latter.
Emotion
Researchers have also investigated to what extent the distinctiveness of a voice, such as heightened emotion, can aid or impair an individual's recollection of it. There is evidence that faces are better remembered if they display emotion compared to when they appear neutral; in one study healthy control participants remembered more accurately happy faces than they did neutral faces. Likewise, a host of studies have found that memories that are more emotional in nature are more complex and are less likely to be forgotten compared to memories that are more neutral. It therefore seems logical for researchers to explore whether auditory material which is emotional in nature is also remembered better. Research has produced conflicting results. Bradley and Lang (2000) found that there was a memory advantage for auditory material when it was more emotional compared to when it was more neutral. The authors also found that participants' physiological activity when they listened to emotionally arousing sounds was very similar to the physiological arousal produced when they were shown emotional images. However, studies investigating emotion in voices have found no significant differences between recall rates for emotional voices and neutral voices, with some research even demonstrating that emotion can impair memory recall for the voice. For instance, it was found that angry voices were recalled to a lesser extent compared to if they were neutral in tone. This finding has been supported by other studies which have also found that rather than enhancing voice identification, emotion may significantly interfere with it. However, ethical guidelines will confine the levels of emotionality that are appropriate to be induced in participants in a laboratory study environment.
Time-delay
The amount of time between when an individual hears incriminatory information or the voice of their perpetrator, for instance, and the time they are required to recall the auditory information as an earwitness can affect their recall accuracy rate. Memory for auditory information including voice recognition appears to decline over time; studies have found that participants can recall more correct auditory information immediately after the initial presentation than after a four-day time interval, supporting several other studies finding similar results. Furthermore, the extent to which the time-interval affects memory recall for auditory information depends upon whether the witness just heard the auditory information of whether it was accompanied by visual information too, such as the face of the perpetrator. One study has found that recall is enhanced when both auditory information is heard and visual information is seen, as opposed to just hearing auditory information. Still, when individuals are asked to remember the voice and the speech content, they are only likely to have remembered the gist of what has been said as opposed to remembering verbatim. This clearly has implications for the amount of weight that is placed upon earwitness testimony in court. Earwitnesses are not typically required to give statements or recall a voice or auditory information immediately after an event has occurred, but instead are required to recall information after a time-delay. This could significantly impair the accuracy of their recall. The testimonies of those who have only heard the voice of a suspect compared to a witness who has both seen the face and heard the voice of a suspect should also be treated with extreme caution in court.
Children's earwitness memory
It is of critical importance that research into children's earwitness memory is also conducted in order to secure justice for child victims and witnesses. Compared to adult earwitness memory, the area of child earwitness memory has been largely neglected. In one of few studies comparing adult and child earwitnesses, Öhman, Eriksson & Granhag (2011) found that only children in the older age-group of 11–13 years performed at above chance levels for voice recognition, compared to the younger-age group of children (aged 7–9) and adults. They suggest that under the age of 10 a child may be overwhelmed by the cognitive demands of the task and so do not perform above chance levels on the task. Meanwhile, adults made the highest percentage (55%) of false identifications. They also found that voice pitch level and speaker rate was highly correlated with children's but not adults' false identification rates. Overall however, the results confirmed other studies which have also shown that in general, earwitness performance for unfamiliar voices is poor.
Other research found that children aged 11 to 13 years old who were tested very shortly after exposure to a voice made more correct identifications compared with children who were tested after a time interval of two weeks. This was found not to be the case for adult witnesses.
Auditory memory in blind individuals
It has been suggested that blind individuals have an enhanced ability to hear and recall auditory information in order to compensate for a lack of vision. However, whilst blind adults' neural systems demonstrate heightened excitability and activity compared to sighted adults, it is still not exactly clear to what extent this compensatory hypothesis is accurate. Nevertheless, many studies have found that there appears to be a high activation of certain visual brain areas in blind individuals when they perform non-visual tasks. This suggests that in blind individuals' brains, a reorganization of what are normally visual areas has occurred in order for them to process non-visual input. This supports a compensatory hypothesis in the blind.
Enhancement
Research has investigated how to improve the accuracy of earwitness performance. One study investigated whether an interview called a Cognitive Interview would improve adult or child (11–13 years) voice recognition performance or speech content recall if it was administered immediately after the event. It was predicted that a cognitive interview would improve the likelihood of witnesses making a correct identification and improve recall of speech content, whether immediately after the event of after a time-delay and regardless of age. It was also predicted that adults would recall more content than children, because other studies have indicated that children provide less detail than adults during free recall. However, results revealed poor correct identification rates, regardless of the type of interview earwitnesses had received (19.8%), as well as high false identification rates; 38.7% of participants incorrectly identified an innocent suspect. It did not seem to matter if an interview had been conducted shortly after the event or not. Moreover, there did not seem to be any difference between children and adults in terms of the number of suspects they correctly identified by their voice. Many researchers would suggest that this furthers the case for children (aged 11–13) to be thought of as equally capable of proving potentially helpful earwitness accounts within court settings.
Example
In 1984, Jennifer Thompson-Cannino selected Ronald Cotton from both a photographic line-up and later a physical line-up as her rapist, leading to his conviction of rape and burglary and a sentence of life in prison plus fifty-four years. Ronald Cotton spent eleven years in prison due to faulty eyewitness memory before DNA evidence exonerated him in 1995. Despite Jennifer's strong intent to study her rapist's features during the traumatic event for the purpose of identifying him afterward, she fell victim to encoding limitations at the time of the assault. Jennifer undoubtedly experienced a great degree of stress on the night of her assault with a knife pressed to her neck and a feeling of absolute powerlessness. "There in my memory, at the knife-edge of fear, time distorted". She also fell prey to factors after the incident that affected the accuracy of her recall. Even if memories are correctly encoded at the time of the event, interference and decay can alter these memories in negative ways. The simple passage of time entails memory loss, and any new information presented between the time of the crime and testimony can interfere with a witness's recall. When Jennifer was asked to identify her perpetrator from a series of photographs, she was told by officers that she should not feel compelled to make an identification. However, Jennifer's faith in the legal system led her to believe that the police must have had a suspect to warrant her participation in photographic identification. And when Jennifer selected the photo of Ronald, the police told her she did great. The photograph of Jennifer's true rapist, Bobby Poole, was not included in the lineup. The positive feedback Jennifer received allowed her to begin incorporating details from the photograph into her memory of the attack. The fact that Jennifer took five minutes to study the pictures before she selected Ronald Cotton's photo also allowed Jennifer ample opportunity to encode Ronald's face as her assailant and thereby interfere with her original memory.
The photographs were presented simultaneously, allowing Jennifer to compare the photographs to each other as opposed to her memory of the event. As a result, when she was later asked to choose her assailant from a physical line-up, Jennifer saw Ronald in her memory and thus chose him. The police further solidified her choice by telling her "We thought that might be the guy…it's the same person you picked from the photos.". As a result, the authorities viewed Jennifer as the ideal eyewitness, one who was motivated to remember the face of her assailant during the event and subsequently confident in her identification of the target. Unfortunately, the level of confidence in an eyewitness' recall is not associated with accuracy of identification. The eyewitness' confidence in his or her recall is, however, strongly associated with the jury's belief in the accuracy of the eyewitness' testimony, thus increasing the risk of assigning guilty verdicts to innocent individuals. Unconscious transference essentially contaminated Jennifer's memory. Even after Jennifer learned of Ronald's innocence, she still saw his face in her memory of the attack years later. It wasn't until she met with Ronald face-to-face and he gave her his forgiveness did she begin to see Ronald for himself rather than as her assailant, thus beginning a remarkable and unexpected friendship.
References
Memory
Memory biases
Memory |
This is a list of some notable people associated with Colorado State University, located in the Fort Collins, Colorado, United States.
CSU has 169,935 living alumni with 50 active alumni chapters (14 in Colorado and 37 out of state) and 9 national interest groups. CSU graduates include Pulitzer Prize winners, astronauts, CEOs, and two former governors of Colorado.
Academia and science
Alicia Bertone, ENGIE-Axium Endowed Dean's Chair of the Graduate School at the Ohio State University
Paul Broadie, president of Housatonic Community College and Gateway Community College
Mary L. Cleave, astronaut
Martin J. Fettman, astronaut
James Van Hoften, astronaut
John Gill, mathematician and father of modern bouldering
Edward Harwood, Aeroponics Inventor
George Marsaglia, computer scientist
Mark Mattson, neuroscientist
Jürgen Mulert, economist, Fulbright scholar, founder of the German Fulbright Alumni Association
J. Wayne Reitz, fifth president of the University of Florida (1955–1967)
Kent Rominger, 1978, Former NASA astronaut and shuttle commander
Jon Rubinstein, American computer scientist, helped create the iPod
George E. Staples, veterinary researcher and animal nutrition pioneer
Arts and performance
John Amos, actor
Nicole Anona Banowetz, American artist and sculptor
Baxter Black, cowboy poet
Keith Carradine, Academy Award-winning actor
Dominique Dunne, actress
Garry Gross, American fashion photographer known for his dog portraiture and work with model and actress Brooke Shields
Katherine Indermaur, poet and author
Michael Johnson, country and folk singer-songwriter
Leslie Jones, actress and comedian
Yusef Komunyakaa, MA, 1981, Pulitzer Prize-winning poet
Willow Patterson, drag queen and winner of RuPaul's Drag Race season 14
Susan Lowdermilk, artist, printmaker
Isaac Slade, professional musician and lead singer of The Fray
Derek Theler, actor in Baby Daddy
Harlan Thomas prominent Seattle architect
Athletics
David Anderson, professional football player
Al "Bubba" Baker, professional football player
Shaquil Barrett, professional football player
Randy Beverly, professional football player
Kapri Bibbs, professional football player
Sam Brunelli, professional football player
Susan Butcher, dogsled racer
Jack Christiansen, professional football player
David Cohn (born 1995), professional basketball player
Jim David, professional football player
Amy Van Dyken, Olympic swimmer and gold medalist
Steve Fairchild, college and professional football coach
Sherwood Fries, professional football player
Donovan Gans, professional football player
Crockett Gillmore, professional football player
Garrett Grayson, professional football player
Clark Haggans, professional football player
Becky Hammon, professional basketball coach
Caleb Hanie, professional football player
John Howell, professional football player
Colton Iverson (born 1989), professional basketball player
Selwyn Jones, professional football player
Brady Keys, professional football player and businessman
Stanton Kidd (born 1992), professional basketball player
Mark Knudson, professional baseball player
Martin Laird, professional golfer
Keith Lee, professional football player
Kim Lyons, athlete and personal trainer on The Biggest Loser
Jim Malloy, professional racecar driver
Lawrence McCutcheon, professional football player
Kevin McDougal, professional football player
Thurman "Fum" McGraw, professional football player
Keli McGregor, President of the Colorado Rockies and professional football player
Kevin McLain, professional football player
Scooter Molander, professional football player
Glenn Morris, 1935, Gold medal winner in the 1936 Olympics in Berlin
Mike Montgomery, professional basketball coach
Sean Moran, professional football player
Clint Oldenburg, professional football player
Milt Palacio, professional basketball player
Erik Pears, professional football player
Bradlee Van Pelt, professional football player
Joey Porter, professional football player, member of 2006 Super Bowl champion Pittsburgh Steelers
Bill Quayle, athletics director for Emporia State University from 1979 to 1999.
David Roddy, professional basketball player
Bob Rule, professional basketball player
Ty Sambrailo, professional football player
Bailey Santistevan, legendary coach featured in the July 5, 1999, edition of Sports Illustrated.
Brady Smith, professional football player
Jason Smith, professional basketball player
Andre Strode, professional football player
Pete Thomas, professional football player
Michael Gallup, professional football player
Politics
Wade O. Troxell, past mayor (2015-2021) and councilmember (2007-2015) City of Fort Collins, mechanical engineering professor (1984–present) and former CSU football player (co-captain senior year) as offensive center (1975-1978).
Wayne Allard, United States Senator from Colorado (1997–2009)
Ibrahim Abdulaziz Al-Assaf, Finance Minister – Saudi Arabia
Anwar al-Awlaki, Yemeni-American imam and reputed Al-Qaeda terrorist. The first American citizen to be targeted and killed by a U.S. drone strike
David Asay, former Republican member of the Wyoming House of Representatives
Benny Begin, PhD in geology, Israeli politician, Knesset member and minister.
Greg Brophy, Republican member of the Colorado Senate
Les Eaves (Business Management), Republican member of the Arkansas House of Representatives for White County
John Ensign, former United States Senator from Nevada
Cory Gardner, Republican U.S. Senator from Colorado
Basuki Hadimuljono, Indonesian Minister of Public Works and Public Housing
Jim Hawkes, (PhD in psychology, 1970), Canadian politician
Paula Hicks-Hudson, lawyer, Toledo, Ohio City Council President and acting Mayor
Doug Hutchinson, former mayor of the city of Fort Collins, Colorado
Conway LeBleu, attended late 1940s, did not graduate, native of Lake Charles, Louisiana, represented Calcasieu and Cameron parishes in the Louisiana House of Representatives from 1964 to 1988
Marilyn Musgrave, former Republican member of the United States House of Representatives
Angie Paccione, politician
Bill Ritter, governor of Colorado, former Denver District Attorney
Stan Matsunaka, politician
Roy R. Romer, former Colorado governor
Brian Schweitzer, 23rd Governor of Montana
Carol Voisin, ethics professor and former candidate for Congress
Dwight A. York, politician
Business
Walter Scott, Jr., Former CEO Peter Kiewit Sons' Incorporated, Level 3 Communications & Berkshire Hathaway Chairman
Military and intelligence agencies
William E. Adams, former Major in the United States Army and recipient of the Medal of Honor
James H. Dickinson, Commander, United States Space Command.
Salvatore Augustine Giunta, former Staff Sergeant in the United States Army and recipient of the Medal of Honor
Barbara Robbins, the first female CIA employee to die in action in the agency's history
Lew Walt, decorated U.S. Marine
Notable faculty
Maurice Albertson, civil engineer, Peace Corps co-founder
Theodosia Grace Ammons, president, Colorado Equal Suffrage Association
Raj Chandra Bose, statistician
Louis George Carpenter, irrigation engineer and first dean of Engineering & Physics
Henry P. Caulfield, Jr., political scientist
Howard Ensign Evans, entomologist
Elnora M. Gilfoyle, dean of the College of Applied Human Sciences (1989–1991), Provost/Academic Vice President (1991–1995)
William M. Gray, atmospheric scientist
Temple Grandin, animal scientist
Rachel Justine Pries, mathematician, Fellow of the American Mathematical Society
Thomas Sutherland, former hostage in Lebanon
Robin Reid, environmental scientist and member of the team who established the International Livestock Research Institute
Holmes Rolston III, father of environmental ethics
Bernard Rollin, animal ethics advocate
Ronald M. Sega, systems engineer
Steve Simske, systems engineer
Jamuna Sharan Singh, ecologist, faculty (1971–74, 1981–82 and 1993–94), Shanti Swarup Bhatnagar Prize recipient
Bryan Willson, mechanical engineer
See also
List of colleges and universities in Colorado
Bibliography of Colorado
Geography of Colorado
History of Colorado
Index of Colorado-related articles
List of Colorado-related lists
Outline of Colorado
References
External links
Colorado State University
Colorado State University Alumni Association
People, List of Colorado State University
Lists of people by university or college in Colorado
Lists of American people by school affiliation |
The title "Pharaoh" is used for those rulers of Ancient Egypt who ruled after the unification of Upper and Lower Egypt by Narmer during the Early Dynastic Period, approximately 3100 BC. However, the specific title was not used to address the kings of Egypt by their contemporaries until the New Kingdom's 18th Dynasty, c. 1400 BC. Along with the title Pharaoh for later rulers, there was an Ancient Egyptian royal titulary used by Egyptian kings which remained relatively constant during the course of Ancient Egyptian history, initially featuring a Horus name, a Sedge and Bee (nswt-bjtj) name and a Two Ladies (nbtj) name, with the additional Golden Horus, nomen and prenomen titles being added successively during later dynasties.
Egypt was continually governed, at least in part, by native pharaohs for approximately 2500 years, until it was conquered by the Kingdom of Kush in the late 8th century BC, whose rulers adopted the traditional pharaonic titulature for themselves. Following the Kushite conquest, Egypt experienced another period of independent native rule before being conquered by the Achaemenid Empire, whose rulers also adopted the title of "Pharaoh". The last native pharaoh of Egypt was Nectanebo II, who was pharaoh before the Achaemenids conquered Egypt for a second time.
Achaemenid rule over Egypt came to an end through the conquests of Alexander the Great in 332 BC, after which it was ruled by Hellenic Pharaohs of the Ptolemaic Dynasty. Their rule, and the independence of Egypt, came to an end when Egypt became a province of Rome in 30 BC. Augustus and subsequent Roman emperors were styled as Pharaoh when in Egypt until the reign of Maximinus Daza in 314 AD.
The dates given in this list of pharaohs are approximate. They are based primarily on the conventional chronology of Ancient Egypt, mostly based on the Digital Egypt for Universities database developed by the Petrie Museum of Egyptian Archaeology, but alternative dates taken from other authorities may be indicated separately.
Ancient Egyptian king lists
Modern lists of pharaohs are based on historical records and, including Ancient Egyptian king lists and later histories, such as Manetho's Aegyptiaca, as well as archaeological evidence. Concerning ancient sources, Egyptologists and historians alike call for caution in regard to the credibility, exactitude and completeness of these sources, many of which were written long after the reigns they report. An additional problem is that ancient king lists are often damaged, inconsistent with one another and/or selective.
The following ancient king lists are known (along with the dynasty under which they were created):
Den seal impressions (1st Dynasty); found on a cylinder seal in Den's tomb. It lists all 1st Dynasty kings from Narmer to Den by their Horus names.
Palermo Stone (5th Dynasty); carved on an olivine-basalt slab. Broken into pieces and thus today incomplete.
Giza writing board (6th Dynasty); painted with red, green and black ink on gypsum and cedar wood. Very selective.
South Saqqara Stone (6th Dynasty); carved on a black basalt slab. Very selective.
Karnak King List (18th Dynasty); carved on limestone. Very selective.
Abydos King List of Seti I (19th Dynasty); carved on limestone. Very detailed, but omitting some of the Kings from First Intermediate Period and all the kings from Second Intermediate Period of Egypt.
Abydos King List of Ramesses II (19th Dynasty); carved on limestone. Very selective.
Ramesseum king list (19th Dynasty); carved on limestone. Contains most of the New Kingdom pharaohs up to Ramesses II.
Saqqara Tablet (19th Dynasty), carved on limestone. Very detailed, but omitting most kings of the 1st Dynasty for unknown reasons.
Turin King List (19th Dynasty); written with red and black ink on papyrus. Likely the most complete king-list in history, today damaged.
Medinet Habu king list (20th Dynasty); carved on limestone and very similar to the Ramesseum king list.
Manetho's Aegyptiaca (Greek Period); possibly written on papyrus. The original writings are lost today and many anecdotes assigned to certain kings seem fictitious.
Predynastic Period
The Predynastic Period ends around 3100 BC when Egypt was first unified as a single kingdom.
Lower Egypt
Lower Egypt geographically consists of the northern Nile and the Nile delta.
The following list may be incomplete:
Upper Egypt
Upper Egypt refers to the region up-river to the south of Lower Egypt.
Regrouped here are predynastic rulers of Upper Egypt belonging to the late Naqada III period, sometimes informally described as Dynasty 00:
Predynastic rulers: Dynasty 0
Since these kings precede the First Dynasty, they have been informally grouped as "Dynasty 0".
The following list of predynastic rulers may be incomplete:
Early Dynastic Period
The Early Dynastic Period of Egypt stretches from around 3100 to 2686 BC.
First Dynasty
The First Dynasty ruled from around 3100 to 2890 BC.
Second Dynasty
The Second Dynasty ruled from 2890 to 2686 BC.
Old Kingdom
The Old Kingdom of Egypt is the long period of stability and growth following the Early Dynastic Period and preceding the troubled First Intermediate Period. The kingdom spanned from 2686 to 2181 BC.
Third Dynasty
The Third Dynasty ruled from 2686 to 2613 BC.
Fourth Dynasty
The Fourth Dynasty ruled from 2613 to 2496 BC.
Fifth Dynasty
The Fifth Dynasty ruled from 2496 to 2345 BC.
Sixth Dynasty
The Sixth Dynasty ruled from 2345 to 2181 BC.
First Intermediate Period
The First Intermediate Period (2183–2060 BC) is a period of disarray and chaos between the end of the Old Kingdom and the advent of the Middle Kingdom.
The Old Kingdom rapidly collapsed after the death of Pepi II. He had reigned for more than 64 and likely up to 94 years, longer than any monarch in history. The latter years of his reign were marked by inefficiency because of his advanced age. The union of the Two Kingdoms fell apart and regional leaders had to cope with the resulting famine.
The kings of the 7th and 8th Dynasties, who represented the successors of the 6th Dynasty, tried to hold onto some power in Memphis but owed much of it to powerful nomarchs. After 20 to 45 years, they were overthrown by a new line of pharaohs based in Herakleopolis Magna. Some time after these events, a rival line based at Thebes revolted against their nominal Northern overlords and united Upper Egypt. Around 2055 BC, Mentuhotep II, the son and successor of pharaoh Intef III defeated the Herakleopolitan pharaohs and reunited the Two Lands, thereby starting the Middle Kingdom.
Seventh and Eighth Dynasties
The Seventh and Eighth Dynasties ruled for approximately 20–45 years. They comprise numerous ephemeral kings reigning from Memphis over a possibly divided Egypt and, in any case, holding only limited power owing to the effectively feudal system into which the administration had evolved.
The list below is based on the Abydos King List dating to the reign of Seti I and taken from Jürgen von Beckerath's Handbuch der ägyptischen Königsnamen as well as from Kim Ryholt's latest reconstruction of the Turin canon, another king list dating to the Ramesside Era.
Ninth Dynasty
The Ninth Dynasty ruled from 2160 to 2130 BC.
The Turin King List has 18 kings reigning in the Ninth and Tenth Dynasties. Of these, twelve names are missing and four are partial.
Tenth Dynasty
The Tenth Dynasty was a local group that held sway over Lower Egypt and ruled from 2130 to 2040 BC.
Eleventh Dynasty
The Eleventh Dynasty originated from a group of Theban nomarchs serving kings of the 8th, 9th or 10th dynasty with roots in Upper Egypt that ruled from 2134 to 1991 BC.
The successors of Intef the Elder, starting with Mentuhotep I, became independent from their northern overlords and eventually conquered Egypt under Mentuhotep II.
Middle Kingdom
The Middle Kingdom of Egypt (2040–1802 BC) is the period from the end of the First Intermediate Period to the beginning of the Second Intermediate Period. In addition to the Twelfth Dynasty, some scholars include the Eleventh, Thirteenth and Fourteenth Dynasties in the Middle Kingdom.
The Middle Kingdom can be noted for the expansion of trade outside of the kingdom that occurred during this time.
Eleventh Dynasty cont.
The second part of the Eleventh Dynasty is usually considered to be the beginning of the Middle Kingdom of Egypt.
Enigmatic kings, only attested in Lower Nubia:
Twelfth Dynasty
The Twelfth Dynasty ruled from 1991 to 1802 BC.
The position of a possible additional ruler, Seankhibtawy Seankhibra, is uncertain. He may be an ephemeral king, or a name variant of a king of the 12th or 13th Dynasty.
Second Intermediate Period
The Second Intermediate Period (1802–1550 BC) is a period of disarray between the end of the Middle Kingdom, and the start of the New Kingdom. It is best known as when the Hyksos, whose reign comprised the Fifteenth Dynasty, made their appearance in Egypt.
The Thirteenth Dynasty was much weaker than the Twelfth Dynasty, and was unable to hold onto the two lands of Egypt. Either at the start of the dynasty, c. 1805 BC or toward the middle of it in c. 1710 BC, the provincial ruling family in Xois, located in the marshes of the eastern Delta, broke away from the central authority to form the Canaanite Fourteenth Dynasty.
The Hyksos made their first appearance during the reign of Sobekhotep IV, and around 1720 BC took control of the town of Avaris (the modern Tell el-Dab'a/Khata'na), conquering the kingdom of the 14th dynasty. Sometime around 1650 BC the Hyksos, perhaps led by Salitis the founder of the Fifteenth Dynasty, conquered Memphis, thereby terminating the 13th dynasty. The power vacuum in Upper Egypt resulting from the collapse of the 13th dynasty allowed the 16th dynasty to declare its independence in Thebes, only to be overrun by the Hyksos kings shortly thereafter.
Subsequently, as the Hyksos withdrew from Upper Egypt, the native Egyptian ruling house in Thebes set itself up as the Seventeenth Dynasty. This dynasty eventually drove the Hyksos back into Asia under Seqenenre Tao, Kamose and finally Ahmose, first pharaoh of the New Kingdom.
Thirteenth Dynasty
The Thirteenth Dynasty (following the Turin King List) ruled from 1802 to around 1649 BC and lasted 153 or 154 years according to Manetho.
This table should be contrasted with Known kings of the 13th Dynasty:
The position of the following kings is uncertain:
Fourteenth Dynasty
The Fourteenth Dynasty was a local group from the eastern Delta, based at Avaris, that ruled from either 1805 BC or around 1710 BC until around 1650 BC.
Some of the contested rulers of the 14th Dynasty (proposed by Kim Ryholt) are commonly identified by Egyptologists as being of Canaanite (Semitic) descent, owing to the distinct origins of the names of some of their kings and princes. However, the dynasty rulers are not referred to as Hyksos in the Turin kings list. It is here given according to Ryholt; however, this reconstruction of the dynasty is heavily debated with the position of the five kings preceding Nehesy highly disputed.
The position and identity of the following pharaohs is uncertain:
The Turin King List provides additional names, none of which are attested beyond the list.
Fifteenth Dynasty
The Fifteenth Dynasty arose from among the Hyksos people who emerged from the Fertile Crescent to establish a short-lived governance over much of the Nile region, and ruled from 1674 to 1535 BC.
Abydos Dynasty
The Second Intermediate Period may include an independent dynasty reigning over Abydos from around 1650 BC until 1600 BC.
Four attested kings may be tentatively attributed to the Abydos Dynasty, and they are given here without regard for their (unknown) chronological order:
Sixteenth Dynasty
The Sixteenth Dynasty was a native Theban dynasty emerging from the collapse of the Memphis-based 13th dynasty around 1650 BC. They were finally conquered by the Hyksos 15th dynasty around 1580 BC.
The 16th dynasty held sway over Upper Egypt only.
The 16th Dynasty may also have comprised the reigns of pharaohs Sneferankhre Pepi III and Nebmaatre. Their chronological position is uncertain.
Seventeenth Dynasty
The Seventeenth Dynasty was based in Upper Egypt and ruled from 1650 to 1550 BC:
The early 17th Dynasty may also have included the reign of a pharaoh Nebmaatre, whose chronological position is uncertain.
New Kingdom
The New Kingdom (1550–1077 BC) is the period covering the Eighteenth, Nineteenth, and Twentieth dynasty of Egypt, from the 16th to the 11th century BC, between the Second Intermediate Period, and the Third Intermediate Period.
Through military dominance abroad, the New Kingdom saw Egypt's greatest territorial extent. It expanded far into Nubia in the south, and held wide territories in the Near East. Egyptian armies fought with Hittite armies for control of modern-day Syria.
Three of the best known pharaohs of the New Kingdom are Akhenaten, also known as Amenhotep IV, whose exclusive worship of the Aten is often interpreted as the first instance of monotheism, Tutankhamun known for the discovery of his nearly intact tomb, and Ramesses II who attempted to recover the territories in modern Israel/Palestine, Lebanon and Syria that had been held in the Eighteenth Dynasty. His reconquest led to the Battle of Qadesh, where he led the Egyptian armies against the army of the Hittite king Muwatalli II.
Eighteenth Dynasty
The Eighteenth Dynasty ruled from c. 1550 to 1292 BC:
Nineteenth Dynasty
The Nineteenth Dynasty ruled from 1292 to 1186 BC and includes one of the greatest pharaohs: Ramesses II the Great.
Twentieth Dynasty
The Twentieth Dynasty ruled from 1190 to 1077 BC:
Third Intermediate Period
The Third Intermediate Period (1077–664 BC) marked the end of the New Kingdom after the collapse of the Egyptian empire at the end of the Bronze Age. Two dynasties of Libyan origin ruled, giving this period its alternative name of the Libyan Period.
Twenty-First Dynasty
The Twenty-First Dynasty was based at Tanis and was a relatively weak group. Theoretically, they were rulers of all Egypt, but in practice their influence was limited to Lower Egypt. They ruled from 1077 to 943 BC.
Theban High Priests of Amun
Though not officially pharaohs, the High Priests of Amun at Thebes were the de facto rulers of Upper Egypt during the Twenty-first dynasty, writing their names in cartouches and being buried in royal tombs.
Twenty-Second Dynasty
The pharaohs of the Twenty-Second Dynasty were Libyans, ruling from around 943 to 728 BC.
Twenty-Third Dynasty
The Twenty-Third Dynasty was a local group, again of Libyan origin, based at Herakleopolis and Thebes that ruled from 837 to c. 735 BC.
Rudamun was succeeded in Thebes by a local ruler:
Twenty-Fourth Dynasty
The Twenty-fourth Dynasty was a short-lived rival dynasty located in the western Delta (Sais), with only two pharaohs ruling from 732 to 720 BC.
Twenty-Fifth Dynasty
Nubians invaded Lower Egypt and took the throne of Egypt under Piye although they already controlled Thebes and Upper Egypt in the early years of Piye's reign. Piye's conquest of Lower Egypt established the Twenty-fifth Dynasty which ruled until 656 BC.
They were ultimately driven back into Nubia, where they established a kingdom at Napata (656–590), and, later, at Meroë (590 BC – AD 500).
Late Period
The Late Period runs from around 664 to 332 BC, and includes periods of rule by native Egyptians and Persians.
Twenty-Sixth Dynasty
The Twenty-sixth Dynasty ruled from around 664 to 525 BC.
The son and successor of Nekau I, Psamtik I, managed to reunify Egypt and is generally regarded as the founder of the Twenty-sixth Dynasty.
Twenty-Seventh Dynasty
Egypt was conquered by the Persian Empire in 525 BC and constituted a satrapy as part of this empire until 404 BC. The Achaemenid Shahanshahs were acknowledged as Pharaohs in this era, forming the 27th Dynasty:
Several native rebellions took place during the 27th dynasty:
Twenty-Eighth Dynasty
The Twenty-eighth Dynasty lasted only 6 years, from 404 to 398 BC, with one pharaoh:
Twenty-Ninth Dynasty
The Twenty-ninth Dynasty ruled from 398 to 380 BC:
Thirtieth Dynasty
The Thirtieth Dynasty ruled from 379/8 until Egypt once more came under Persian rule 340 BC:
Thirty-First Dynasty
Egypt again came under the control of the Achaemenid Persians. After the practice of Manetho, the Persian rulers from 340 to 332 BC are occasionally designated as the Thirty-first Dynasty:
Native rebellions again took place during the 31st dynasty:
Hellenistic period
Argead Dynasty
The Macedonian Greeks under Alexander the Great ushered in the Hellenistic period with his conquest of Persia and Egypt. The Argeads ruled from 332 to 309 BC:
Ptolemaic Dynasty
The second Hellenistic dynasty, the Ptolemies, ruled Egypt from 305 BC until Egypt became a province of Rome in 30 BC (whenever two dates overlap, that means there was a co-regency). The most famous member of this dynasty was Cleopatra VII, in modern times known simply as Cleopatra, who was successively the consort of Julius Caesar and, after Caesar's death, of Mark Antony, having children with both of them.
Cleopatra strove to create a dynastic and political union between Egypt and Rome, but the assassination of Caesar and the defeat of Mark Antony doomed her plans.
Caesarion (Ptolemy XV Philopator Philometor Caesar) was the last king of the Ptolemaic Dynasty of Egypt, and he reigned jointly with his mother Cleopatra VII of Egypt, from September 2, 47 BC. He was the eldest son of Cleopatra VII, and possibly the only son of Julius Caesar, after whom he was named. Between the alleged death of Cleopatra, on August 12, 30 BC, up to his own alleged death on August 23, 30 BC, he was nominally the sole pharaoh. It is tradition that he was hunted down and killed on the orders of Octavian, who would become the Roman emperor Augustus, but the historical evidence does not exist.
Native rebellions also took place under Greek rule:
Rome
Cleopatra VII had affairs with Roman dictator Julius Caesar and Roman general Mark Antony, but it was not until after her suicide (after Mark Antony was defeated by Octavian, who would later be Emperor Augustus Caesar) that Egypt became a province of the Roman Republic in 30 BC. Subsequent Roman emperors were accorded the title of pharaoh, although exclusively while in Egypt.
The last Roman emperor to be conferred the title of pharaoh was Maximinus Daza (reigned 311–313 AD).
See also
Egyptian chronology
History of Egypt
List of Ancient Egyptian Royal Consorts
References
Further reading
Breasted, J. H., History of Egypt from the Earliest Time to the Persian Conquest, 1909
Cerny, J. 'Egypt from the Death of Ramesses III to the End of the Twenty-First Dynasty' in: The Middle East and the Aegean Region c.1380–1000 BC, Cambridge University Press, 1975
Dodson, Aidan and Hilton, Dyan. The Complete Royal Families of Ancient Egypt. Thames & Hudson. 2004.
Gardiner, Sir Alan, Egyptian Grammar: Being an Introduction to the Study of Hieroglyphs, Third Edition, Revised. London: Oxford University Press, 1964. Excursus A, pp. 71–76.
Grimal, Nicolas, A History of Ancient Egypt, Blackwell Books: 1992
Murnane, William J. Ancient Egyptian Coregencies, Studies in Ancient Oriental Civilization. No. 40. The Oriental Institute of the University of Chicago, 1977
Rice, Michael, Who's Who in Ancient Egypt, Routledge 1999
Ryholt, Kim & Bardrum, Steven, The Late Old Kingdom in the Turin King-list and the Identity of Nitocris. Zeitschrift für ägyptische Sprache und Altertumskunde 127. 2000.
Shaw, Garry. The Pharaoh, Life at Court and on Campaign, Thames and Hudson, 2012.
Wilkinson, Toby A. H., Early Dynastic Egypt, Routledge 1999,
Ventura Dr. R., Egypt, History & Civilisation Published by Osiris, PO Box 107 Cairo.
Verner, Miroslav, The Pyramids – Their Archaeology and History, Atlantic Books, 2001,
External links
Egyptian Royal Genealogy (Old Broken Link)
Manetho and the King Lists Review of different primary king lists
Chronology Table - 0 Dynasty&History Period, by Dariusz Sitek Multi-pages of list of pharaohs in different king lists, without the god kings, in Egyptian hieroglyphs and English
Egyptian Journey 2003: History: King Lists Hyperlink texts of the Manetho, Abydos & Turin king lists, without the god-kings
Comparing the major Egyptian king lists Compares the Karnak, Adydos and Saqqara king lists
Digital Egypt for Universities
List of all female Pharaohs
Pharaohs
Pharaohs
Pharaohs
Pharaohs |
Rudi Frigo (born 31 January 1974) is a former Australian rules footballer who played with the Brisbane Bears in the Australian Football League (AFL).
Frigo was a key position player, occasionally called on to ruck. After the 1991 AFL season concluded, Frigo was one of eight young Queensland based players who were signed by Brisbane as "zone clearing" concession picks.
Originally from Queensland Australian Football League (QAFL) club Mayne, Frigo made his senior AFL debut midway through the 1994 AFL season, making seven appearances that year. He played just one more game in 1995 and finished his league career with a rare statistic for a Bears player; playing in more wins than losses.
Following his delisting by Brisbane, Frigo moved to Adelaide to play with South Australian National Football League (SANFL) club Woodville-West Torrens.
References
External links
1974 births
Australian rules footballers from Queensland
Brisbane Bears players
Mayne Australian Football Club players
Woodville-West Torrens Football Club players
Living people
Australian rules footballers from Brisbane |
William Pitt was launched on the River Thames in 1785 as an East Indiaman. She made six voyages for the British East India Company (EIC). During her fourth she served as an ad hoc warship in a naval campaign during which she saw action. Thereafter she served as a transport, including one voyage in 1801-1802 transporting rice from Bengal to Britain. She was sold for breaking up in 1809.
EIC career
1st EIC voyage (1786–1787): Captain Charles Mitchell sailed from the Downs on 26 March, bound for Madras and Bengal. William Pitt reached Madras on 26 July and Diamond Point on 14 August. She arrived at Cox's Island on 13 December. Homeward bound, she sailed from Cox's Island on 2 January 1787, reached St Helena on 13 March, and arrived back at the Downs on 15 May
2nd EIC voyage (1788–1789): Captain Mitchell sailed from the Downs on 5 April 1788, bound for Madras and Bengal. William Pitt reached Madras on 13 July and Diamond Point on 23 July. Homeward bound, she sailed from Saugor on 15 November, reached St Helena on 20 January 1789, and arrived at the Downs on 23 March.
3rd EIC voyage (1790–1791): Captain Mitchell sailed from the Downs on 19 April 1790, bound for Bengal and Madras. William Pitt arrived at Diamond Harbour on 6 August. Homeward bound, she was at Saugor from 2 January 1791 to 6 February. She reached Madras on 14 February and the Cape on 11 April. She reached St Helena on 2 May and arrived back at the Downs on 30 June.
4th EIC voyage (1793–1795): Captain Mitchell acquired a letter of marque on 25 April 1793. He sailed from Portsmouth on 22 May 1793, bound for Madras, Bengal, and Benkulen. William Pitt reached Madras on 18 September and Diamond Point (probably a mis-transcription for Diamond Harbour), on 2 October. She arrived at Saugor on 29 November.
In late 1793 John Shore, the EIC's Governor-General of India, formed a squadron from the company's own ships to patrol the South-Asia region. The EIC diverted two East Indiamen, William Pitt and , and the country ship for the service. A vessel of the Bombay Marine, possibly Viper, accompanied them. The reason for the move was the coming together of two problems, the inability of the British Royal Navy to maintain a presence in the area, and intelligence concerning the presence of French privateers and naval vessels in the area.
The EIC appointed Captain Mitchell, captain of William Pitt, Commodore of the squadron.
On 21 January 1794 joined the British squadron. The next day the squadron engaged two French privateers, Vengeur, of 34 guns and 250 men, and Résolue, of 26 guns and 230 men. Britannia captured Vengeur, and Nonsuch captured Résolu, with the French captains realising that further resistance would be pointless as William Pitt and Houghton came up. Eleven French sailors had been killed and 25 wounded on Vengeur; British losses were one killed and two wounded on Britannia. Casualties were high on Résolue, but no numbers are available.
On 24–25 January, the EIC squadron engaged a French naval squadron from Île de France, consisting of the frigates and , the brig Vulcain and the captured East Indiaman , now renamed Duguay-Trouin. The two squadrons engaged at long range though Houghton and Nonsuch managed to hit Cybèle. The French broke off the engagement and the British did not pursue. The need to man the prizes and to guard the prisoners, who outnumbered their captors, had left the British with just enough men to man the guns. Casualties among the French squadron are not known, but the only loss on the British ships was on Nonsuch, which had a man killed in combat with Cybèle.
(4) 1792/3 Madras, Bengal and Benkulen. Capt Charles Mitchell.
William Pitt remained in the area for some seven months. She was at Batavia on 26 January and Benkulen on 4 March. She visited "Onreat" (probably Onrust Island) on 26 March, returning to Batavia on 2 June. She then sailed to Malacca, arriving on 16 July, and Penang, arriving there on 13 August. She returned to Diamond Harbour on24 September. Finally home bound, she was at Saugor on 29 November, leaving there on 8 January 1795. She reached St Helena on 18 March and arrived at the Downs on 23 July.
On Mitchell's return to Britain in 1796 King George III knighted him, and presented with £8,000 (the equivalent of £ as of ) as reward and compensation for his diversion to the Straits.
5th EIC voyage (1796–179): Captain Sir Charles Mitchel sailed from Portsmouth on 12 April 1796, bound for the Cape, Madras, Bengal, and Bombay. William Pitt reached Simon's Bay on 21 July and Madras on 17 November. She arrived at Trincomalee on 19 December, and returned to Madras on 4 January 1797. She arrived at Kedgeree on 1 February. Bound to Bombay, she was at Mahé on 30 April and Calicut on 2 May. She arrived at Bombay on 26 May. Homeward bound, she sailed from Bombay on 9 August, and reached the Cape on 16 October. She was at St Helena on 3 December and arrived home on 31 January 1798.
6th EIC voyage (1799–1800): Captain Sir Charles Mitchell sailed from Portsmouth on 2 April 1799, bound for Madras and Bengal. William Pitt reached Madras on 4 August and Diamond Harbour 30 August. Homeward bound, she was at Saugor on 20 November and sailed on 11 December. She reached Madras on 20 December and Colombo on 30 December. She was at Point de Galle on 6 February 1800. She reached St Helena on 27 April and Cork on 29 June. She arrived back at the Downs on 5 July.
Later career and fate
Rice voyage: Weather-induced crop failures in Britain in 1799 and 1800 forced the British Government to import rice from Bengal to counter popular unrest. The wheat harvests of 1799 and 1800 were about one-half and three-quarters of the average, respectively. The price of bread rose sharply, leading to bread riots; some of rioters invoked the French Revolution. Her owners tendered William Pitt. Captain Richard Owen acquired a letter of marque on 29 November 1800.
William Pitt, Owen, master, returned from Bengal on 27 April 1802.
Between 1802 and 1809 William Pitt was employed as a troopship and a West Indiaman. In 1809 she was sold for breaking up.
Citations
References
1785 ships
Age of Sail merchant ships of England
Ships of the British East India Company |
This article deals with writing that deals with LGBT themes in a Singapore context. It covers literary works of fiction, such as novels, short stories, plays and poems. It also includes non-fiction works, both scholarly and targeted at the general reader, such as dissertations, journal or magazine articles, books and even web-based content. Although Singapore lacks a dedicated gay book publisher or gay bookshop, it does have at least one dedicated gay library, Pelangi Pride Centre, which is open weekly to the public. Many of the works cited here may be found both in Pelangi Pride Centre, as well as the National Library or other academic libraries in Singapore, as well as in some commercial bookshops under 'gender studies' sections.
Plays
The increasing boldness of Singapore writers in sympathetically addressing LGBT themes is intertwined with the growth of English-language theatre from the mid-1980s. It was in theatre that writers first challenged the cultural taboo surrounding homosexuality. A fairly regular stream of gay plays were staged in Singapore throughout the 1990s, raising the public profile of sexual minorities.
Lest the Demons Get To Me (1993) by Russell Heng depicts a dilemma in which a male-to-female transsexual resents having to dress up as a man to perform funeral rites as her dead father's only son. The play highlights a society that is rather crushing on the protagonist’s desire to be true to herself.
Private Parts (1994), a comedy by Michael Chiang, addresses the theme of Singapore society’s capacity to come to terms with gender minorities in the form of transsexuals. The Straits Times reported that "Private Parts, with its remarkable performances and poignant message, is a special production that should not close until every person in this country has seen it". The play has also been performed in Mandarin.
Invitation to Treat Trilogy by Eleanor Wong tells the story of Ellen Toh, a law partner, coming to terms with her homosexuality. Mergers and Accusations (1995) and Wills and Secession (1996), the first two instalments, tell the story of Ellen marrying a Jon, a fellow lawyer, then leaving him and falling in love with Lesley. In charting her protagonist's personal struggle to win acceptance from family and social circle, Wong pushes the 'coming out' message and moves closer to activism than seen in Heng or Chiang's more descriptive treatment of the subject. The final part, Jointly and Severably, sees Ellen struggling with forgetting Lesley and seeking courage to begin a new relationship with law professor Zee. A clever play wrought with legal puns and allusions, Invitation to Treat proves to be an insightful dramatical success.
Asian Boys Trilogy (2001–2007) features three disparate plays written by Alfian Sa'at and directed by Ivan Heng. The first instalment Asian Boys Vol.1 was staged in 2001 to rave reviews, not only on its artistic merit but also its relevance to the incumbent societal concerns. Following this was Landmarks: Asian Boys Vol.2, which premiered in 2004. A collection of eight short stories, this montage explores the myriad gay experiences of Singaporeans, albeit mostly clandestine. One of the stories, Katong Fugue, was made into a short film in 2006. Finally, the last of the trilogy, Happy Endings: Asian Boys Vol.3, played at the Drama Centre, at National Library, Singapore from 11 to 29 July 2007.
Novels
Novels with LGBT-related themes began emerging in Singapore literature scene in the 1990s. Among the earliest work is Different Strokes (1993) by David Leo portraying victims of AIDS.
Peculiar Chris (1992) by Johann S. Lee (Cannon International, 1992 ), the only true "coming-out novel" written from a Singaporean point of view so far. Describes a young athlete and national serviceman's angst-filled struggles with boyfriends, discriminatory institutions and death, as well as his coming out into the gay and lesbian community. Described by The Straits Times in 2008 as a 'cult classic'.
Abraham’s Promise (1995) by Philip Jeyaretnam tells a story of a father's rejection of and then coming to terms with his son's homosexuality. This is no exploration of the world of a gay man, for the homosexual character hardly speaks. Its intellectual touchstone is the political culture of post-colonial Singapore where many feel marginalised with little promise of respite in personal or professional life. ()
Glass Cathedral (1995) by Andrew Koh - a prize-winning novella, the winner of the Commendation Prize of the 1994 Singapore Literature Prize, republished by Epigram Books in 2011. ()
New Moon Over San Francisco by Joash Moo.
Asking for Trouble (2005) by Jason Hahn, an 8 Days journalist, who based his humour book on his experiences with living with two high-maintenance women, with free advice from his 2 male friends, one gay, the other married. ()
Bugis Street by Koh Buck Song.
What are You Doing in My Undies? (2002) by Jon Yi about a man's change into transvestism.
Different Strokes (1993) by David Leo. While David Leo wrote a homophobic short story in News at Nine, this book is based on an objective journalist's experience when he interviewed a gay AIDS patient. ()
The Narcissist (2004) by Edmund Wee (Times Editions, May 2004, )
Mouse Marathon by Ovidia Yu.
To Know Where I'm Coming From (2007) by Johann S. Lee (Cannon International, 2007 ), Lee's indirect sequel to Peculiar Chris. About a gay emigrant returning to his homeland to heal from a broken heart. Rated 5 stars out of 6 by Time Out and 3 stars out of 5 by The Sunday Times. Alex Au wrote in his Yawning Bread review: "It's a much more mature book than the first, but the talent for telling a story with honesty and enrapturement is still very much there… One day, I think it is safe to bet, this novel will be on the required reading list for Singapore students, even if some people might turn in their grave, or more likely in the Singapore context, stew in their urn. It will be on that list precisely because it is suspended in the tension between being gay and being Singaporean, being away and being connected; precisely because it captures a moment in our shared national history."
Quiet Time (2008) by Johann S. Lee (Cannon International, 2008 ), The concluding part of Lee's Singaporean queer triptych which began with Peculiar Chris. About a gay man's paternal instincts and gay activism, set against the civil rights events of 2007. Rated 3.5 stars out of 5 by The Sunday Times. Cyril Wong wrote: “Passionate and unflinching in his portrayal of the self-contradictions and inexorable conflicts which remain part and parcel of being gay in Singapore, Johann S Lee has created a wonderfully realistic, prescient and moving book that threatens to bat his previous works (and many past Singaporean novels) off the shelf of living memory. In time, one hopes that Quiet Time will continue to instruct and encourage present and future generations of gay readers to keep questioning the value of their existence, and to look back in awe at how far we have all come as a persecuted community.” The Sunday Times: "A remarkable book." Trevvy.com: "A must-read." Fridae.com: "Singapore's best gay novel ever."
Tong Lei (2009) by Ken Ang (Oogachaga, 2009 ) is Singapore's first collection of Chinese short fiction. Each story is based on a true account of the lives of gay men in contemporary Singapore. Written by Ken Ang, the book is accompanied by two theme songs 剩下 and 放心 by composed and performed by Tin Ang. The book is published by Oogachaga (OC), the publishers of the popular Singapore Queers of the 21st Century (SQ21) in conjunction with OC's tenth anniversary. The book was launched during IndigNation 2009 and all proceeds from the sale of the book will be channeled to OC's support group programmes and counselling services.
Blame It On The Raging Hormones (2010) by Nathan Goh (Wham Bam, 2010 / Tincture, 2011 ) is a coming-of-age memoir of a twenty old Singaporean gay man, written in the form of an online journal. It's about how the character, Nicky was trying to find love, validation and sense of worth but was finding them in the wrong places and how he crashes into a world of sex, drugs, orgies, prostitution and betrayal in his pursuit.
The Last Lesson of Mrs de Souza (2013) by Cyril Wong () is a quiet narrative with an unreliable narrator about a student coming out to a teacher, with disastrous consequences.
A Certain Exposure (2014) by Jolene Tan () is a sensitive coming-of-age tale about a gay government scholar, part of a pair of male twins, who commits suicide after being bullied.
In Tamil language, Singaporean, Alagersamy Sakthivel wrote few LGBTQ books. One book name is 'Aavannavirkum Aavannavirkum Kadhal' (Love between A and A), and this book has been accepted by Singapore National Library board, and is available in Lee Chuan Reference Library Singapore, as reference book. This novel book depicts three homosexual love stories in Christian, Muslim and Hindu religions.
One more Tamil book written by Alagersamy Sakthivel, is named as 'Oosi thwarangalum, ulle Nulaiyum ottahangalum (Needle holes and inside entering Camels) also available in National Library board Singapore. This Tamil book is collection of short stories describe about the homosexual life in and around Singapore and Indian migrants.
Short stories
LGBT-themed stories are found in different collections of short stories. Examples are:
Corridor: 12 Short Stories (1999) by Alfian Sa'at, (Raffles Editions ) contains several stories with GLBT themes. 'Pillow' looks at a difficult inter-generational relationship. 'Cubicle' is about the physical intimacy two lesbian students often steal in a public toilet. A flamboyant transvestite character appears in 'Bugis'. Finally, 'Disco' deals with an older man who is starting to discover the youth-dominated gay club scene. This book won the 1998 Singapore Literature Prize Commendation Award.
Cross-straits experiences by Alfian Sa'at, simply titled "Bugis" in a Singapore-Malaysia collection, The Merlion and the Hibiscus.
"Worlds Apart", written by J.C. Leahy, found in In the Shadow of the Merlion, an anthology of expatriates' experiences in Singapore
Students' collections like Onewinged with stories like "The Transformation" and "Extracts from Fairy Tale" by Cheryl Lim and Sim Yee Chiang respectively
"Pte M", a short story by C.S. Chong in NS: An Air Level Story, about an effeminate soldier who tries to be intimate with the protagonist who feels nothing but revulsion, despite not rejecting the unwanted advances until the last possible moment.
"Drum", a somewhat homophobic short story by David Leo in News at Nine which is modeled after Herman Melville's Billy Budd.
Butch and Girl Talk, by Sabariah, a collection of short narrative pieces exclusively about the experiences of young lesbian and bisexual women (and FTM men) in Singapore. It is unclear if the stories are based on the experiences of actual women or primarily fictional. Published by VJ Times, the book is no longer widely available.
Let Me Tell You Something About That Night, by Cyril Wong, a collection of surreal, urban to mythical fairy tales dealing with issues of queerness and desire, including a story that puts a gay twist on the Chinese myth about the Dragon King (2nd Edition published by Ethos Books in 2012). By the same author, Ten Things My Father Never Taught me and Other Stories, which includes both fictional and autobiographical stories about queer characters and growing up gay (published by Epigram Books in 2014 and launched at the Singapore Writers Festival).
Poetry
Cyril Wong came out into the scene in 2000 with poetry that was confessional in style but universal in scope. Completely "out" in newspaper and magazine interviews, he is the first and only openly gay poet to win the National Arts Council's Young Artist Award for Literature and the Singapore Literature Prize. His poetry collections are published by Firstfruits, Ethos Books and Math Paper Press in Singapore:
Squatting Quietly
The End of His Orbit
Below: Absence
Unmarked Treasure
Like a Seed With its Singular Purpose
Excess Baggage and Claim (Co-authored with Terry Jaensch)
Oneiros
Tilting Our Plates to Catch the Light (Listed by The Straits Times as among the best five books of 2007)
Straw, Sticks, Brick
The Dictator's Eyebrow
After You
The Lover's Inventory
Alvin Pang's "The Scent of the Real", which refers to Cyril Wong, is value-neutral and mentions Cyril Wong's sexuality as a fact, not as something disgusting or abject.
Toh Hsien Min and Yong Shu Hoong have written poems about friends coming out to them in "On a Good Friend's Admission that he is Gay" and "A Friend's Confession". Both were suspicious that their friends wanted sexual relations with them.
Gwee Li Sui in the eponymous book with the poem "Who wants to buy a book of Poems" refers to the stereotype used on poets as limp-wristed and "ah kua". In the poem, "Edward", he depicts the life of a cross-dresser during the time Bugis Street was being redeveloped.
Ng Yi-Sheng's poetry collection, last boy, contains many lyrical poems celebrating and reflecting on gay love and sexuality.
Non-fiction
Academic works addressing various LGBT issues:
The chapter "Tiptoe Out of the Closet: The Before and After of the Increasingly Visible Gay Community in Singapore" (2001) by Dr. Russell Heng in Gay and Lesbian Asia: Culture, Identity, Community (edited by Gerard Sullivan and Peter A. Jackson, Haworth, New York, 2001, pp. 81–97. Reprinted in the Journal of Homosexuality 40(3-4), pp. 81–98.
The chapter entitled "Singapore", written by NUS Sociology Department senior lecturer Dr. Laurence Leong Wai Teng in Sociolegal Control of Homosexuality- A Multi-Nation Comparison (edited by DJ West and R Green- Plenum Press, New York, 1997)- It examines sociological, historical, and philosophical trends in attitudes and laws relating to homosexuality in 20 countries, plus chapters on Islam and Europe.
Queer Singapore: Illiberal Citizenship and Mediated Cultures (Hong Kong University Press, 2012) edited by Audrey Yue and Jun Zubillaga-Pow contains 12 essays on various aspects of gay and lesbian experiences in past and present Singapore.
Mobilising Gay Singapore: Rights and Resistance in an Authoritarian State (NUS Press, 2014) by Lynette J. Chua tells the history of the gay rights movement in Singapore and asks what a social movement looks like in a state that does not recognise their rights to seek protection of their civil and political liberties.
There is also a medical reference regarding sex-reassignment.
Cries from Within (1970) by S. Shan Ratnam; Victor H. H. Goh and Tsoi Wing Foo- an illustrated and user-friendly tome on sex-reassignment surgery and its attendant psychological considerations by two eminent gynaecologists and a psychiatrist.
A few works on gender studies for both general readers and academic interests:
PLU: sexual minorities in Singapore (2004) (edited by Joseph Lo and Huang Guo Qin, published by Select Books)- a pioneering collection of essays by contributors such as Alex Au, Jason Wee, Desmond Sim, William Peterson and Laurence Leong. Its style is eclectic, ranging from the academic to the casual.
The Rainbow Connection: The Internet and the Singapore Gay Community by Ng King Kang published by KangCuBine Publishing Pte. Ltd.
The following are works mainly for general readers:
[Sisterhood by Leona Lo (Select Books, 2003, )- an exposé of the local transvestite and transsexual community by a prominent male-to-female (MTF) transsexual Singaporean.
My Sisters: Their Stories by Leona Lo, photographs by Lance Lee (Viscom Editions) - a book on the lives of transsexuals.
"Boys in the Hood", chapter 6 of the book Invisible Trade: High-class sex for sale in Singapore by Gerrie Lim, an international correspondent for porn network AVN Online. It explores the world of gay male escort services.
F.O.C: Freedom of Choice by Leslie Lung features 20 short stories about people struggling against their sexual orientation. A short commentary by Lung accompanies each story. The premise of the book is that individuals can choose and change their sexuality. It advocates gay people can and should become straight, but never advocates that they remain gay.
SQ21: Singapore Queers in the 21st Century, written by Ng Yi-Sheng and edited by Jason Wee (Oogachaga counselling & support 2006, ) - the brainchild of counsellor Clarence Singam, this groundbreaking book was the first of its kind in Asia. It documents the coming-out stories of 13 GLB individuals and a mother of 2 gay sons, using real names and photographs.
I Will Survive (Math Paper Press, 2013) is a collection brings together real-life experiences of love, grace, faith, dignity and courage from 21 ordinary gay, lesbian, bisexual and transgender people in Singapore who have survived extraordinary circumstances.
LGBT writing on the Internet
The Yawning Bread is a collection of essays on various topics, particularly Singapore LGBT issues. It was started in November 1996 by activist Alex Au and has grown to be an influential site for intellectual comment on gay issues in Singapore.
LGBT culture in Singapore
Singaporean literature |
The Magura District () is a district in south-western Bangladesh, situated 176 kilometers from Dhaka. It is a part of Khulna Division. The main mode of transportation is by bus, and no train transport is available.
Administration
Magura district has 4 upazilas. They are:
Magura Sadar Upazila
Mohammadpur Upazila
Shalikha Upazila
Sreepur Upazila
Geography
Magura District (Khulna Division) with an area of 1048 km2, is bounded by Rajbari district to the north, Jessore and Narail districts to the south, Faridpur district to the east and Jhenaidah district to the west. The district is flat plain in the heart of the Ganges Delta.
Climate
Demographics
According to the 2022 Census of Bangladesh, Magura District had 254,154 households and a population of 1,033,115, 18.9% of whom lived in urban areas. The population density was 994 people per km2. The literacy rate (age 7 and over) was 72.1%, compared to the national average of 74.7%.
Muslim population is 82.01% of the population while Hindus are 17.92% of the population. The Hindu population has stayed constant since 1981.
Education
Government Huseyn Shaheed Suhrawardy College, Magura
Arpara Government Ideal High School, Arpara, Shalikha Upazila
Magura Govt. High School,Magura Sadar, Magura
Magura Govt. Girls' High School,Magura Sadar, Magura
Govt. H.S.S Collage, Magura Sadar, Magura
Notable residents
Farrukh Ahmed, poet
Amir Hamza (poet)
Shamsun Nahar Ahmed, Member of Parliament, was from Magura District.
Syed Ali Ahsan, poet
Mir Hasem Ali, elected as an MLA of East Bengal Legislative Assembly in 1954.
Syed Ator Ali, elected as an MPA of East Pakistan Provincial Assembly in 1970, a Political Convenor of Sector No. 8 and 9 during Liberation War.
M Yousuff Ali, fisheries biologist, policy planner, administrator and advocate for protecting the open water fishery resources.
Mohammad Asaduzzaman, elected as an MP of Jatiya Sangsad for 3 times.
Shakib Al Hasan, all-rounder, Bangladesh National Cricket Team
Muhammad Sohrab Hossain, twice MNA Pakistan, Prominent Minister holding 8 ministry in Sheikh Mujib's cabinet. One of the founding fathers of Bangladesh and President of the first ever meeting in the Jessore District after the Liberation of Bangladesh.
Kamrul Laila Jolly, former Member of Parliament
Kazi Salimul Haque Kamal, two-term Member of Parliament for Magura-2
Kazi Kader Newaj, poet
Gangadhar Sen Roy, Ayurveda physician and Sanskrit scholar
Biren Sikder, former State Minister of Youth and Sports
Saifuzzaman Shikhor, current MP of Magura-1
Notes
References
Districts of Bangladesh |
```java
/*
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
package org.apache.beam.runners.dataflow.worker.windmill.work.processing;
import static org.apache.beam.runners.dataflow.DataflowRunner.hasExperiment;
import com.google.api.services.dataflow.model.MapTask;
import java.util.function.Function;
import org.apache.beam.runners.dataflow.internal.CustomSources;
import org.apache.beam.runners.dataflow.options.DataflowWorkerHarnessOptions;
import org.apache.beam.runners.dataflow.util.CloudObject;
import org.apache.beam.runners.dataflow.util.CloudObjects;
import org.apache.beam.runners.dataflow.worker.DataflowExecutionContext;
import org.apache.beam.runners.dataflow.worker.DataflowExecutionStateSampler;
import org.apache.beam.runners.dataflow.worker.DataflowMapTaskExecutor;
import org.apache.beam.runners.dataflow.worker.DataflowMapTaskExecutorFactory;
import org.apache.beam.runners.dataflow.worker.IntrinsicMapTaskExecutorFactory;
import org.apache.beam.runners.dataflow.worker.ReaderCache;
import org.apache.beam.runners.dataflow.worker.ReaderRegistry;
import org.apache.beam.runners.dataflow.worker.SinkRegistry;
import org.apache.beam.runners.dataflow.worker.StreamingDataflowWorker;
import org.apache.beam.runners.dataflow.worker.StreamingModeExecutionContext;
import org.apache.beam.runners.dataflow.worker.WindmillKeyedWorkItem;
import org.apache.beam.runners.dataflow.worker.counters.CounterSet;
import org.apache.beam.runners.dataflow.worker.counters.NameContext;
import org.apache.beam.runners.dataflow.worker.graph.Edges.Edge;
import org.apache.beam.runners.dataflow.worker.graph.MapTaskToNetworkFunction;
import org.apache.beam.runners.dataflow.worker.graph.Networks;
import org.apache.beam.runners.dataflow.worker.graph.Nodes;
import org.apache.beam.runners.dataflow.worker.graph.Nodes.Node;
import org.apache.beam.runners.dataflow.worker.profiler.ScopedProfiler;
import org.apache.beam.runners.dataflow.worker.streaming.ComputationState;
import org.apache.beam.runners.dataflow.worker.streaming.ComputationWorkExecutor;
import org.apache.beam.runners.dataflow.worker.streaming.StageInfo;
import org.apache.beam.runners.dataflow.worker.util.common.worker.MapTaskExecutor;
import org.apache.beam.runners.dataflow.worker.util.common.worker.OutputObjectAndByteCounter;
import org.apache.beam.runners.dataflow.worker.util.common.worker.ReadOperation;
import org.apache.beam.runners.dataflow.worker.windmill.state.WindmillStateCache;
import org.apache.beam.sdk.coders.Coder;
import org.apache.beam.sdk.coders.KvCoder;
import org.apache.beam.sdk.fn.IdGenerator;
import org.apache.beam.sdk.util.WindowedValue;
import org.apache.beam.vendor.guava.v32_1_2_jre.com.google.common.base.Preconditions;
import org.apache.beam.vendor.guava.v32_1_2_jre.com.google.common.collect.Iterables;
import org.apache.beam.vendor.guava.v32_1_2_jre.com.google.common.graph.MutableNetwork;
import org.checkerframework.checker.nullness.qual.Nullable;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/** Factory class for generating {@link ComputationWorkExecutor} instances. */
final class ComputationWorkExecutorFactory {
private static final Logger LOG = LoggerFactory.getLogger(ComputationWorkExecutorFactory.class);
private static final String DISABLE_SINK_BYTE_LIMIT_EXPERIMENT =
"disable_limiting_bundle_sink_bytes";
private final DataflowWorkerHarnessOptions options;
private final DataflowMapTaskExecutorFactory mapTaskExecutorFactory;
private final ReaderCache readerCache;
private final Function<String, WindmillStateCache.ForComputation> stateCacheFactory;
private final ReaderRegistry readerRegistry;
private final SinkRegistry sinkRegistry;
private final DataflowExecutionStateSampler sampler;
private final CounterSet pendingDeltaCounters;
/**
* Function which converts map tasks to their network representation for execution.
*
* <ul>
* <li>Translate the map task to a network representation.
* <li>Remove flatten instructions by rewiring edges.
* </ul>
*/
private final Function<MapTask, MutableNetwork<Node, Edge>> mapTaskToNetwork;
private final long maxSinkBytes;
private final IdGenerator idGenerator;
ComputationWorkExecutorFactory(
DataflowWorkerHarnessOptions options,
DataflowMapTaskExecutorFactory mapTaskExecutorFactory,
ReaderCache readerCache,
Function<String, WindmillStateCache.ForComputation> stateCacheFactory,
DataflowExecutionStateSampler sampler,
CounterSet pendingDeltaCounters,
IdGenerator idGenerator) {
this.options = options;
this.mapTaskExecutorFactory = mapTaskExecutorFactory;
this.readerCache = readerCache;
this.stateCacheFactory = stateCacheFactory;
this.idGenerator = idGenerator;
this.readerRegistry = ReaderRegistry.defaultRegistry();
this.sinkRegistry = SinkRegistry.defaultRegistry();
this.sampler = sampler;
this.pendingDeltaCounters = pendingDeltaCounters;
this.mapTaskToNetwork = new MapTaskToNetworkFunction(idGenerator);
this.maxSinkBytes =
hasExperiment(options, DISABLE_SINK_BYTE_LIMIT_EXPERIMENT)
? Long.MAX_VALUE
: StreamingDataflowWorker.MAX_SINK_BYTES;
}
private static Nodes.ParallelInstructionNode extractReadNode(
MutableNetwork<Node, Edge> mapTaskNetwork) {
return (Nodes.ParallelInstructionNode)
Iterables.find(
mapTaskNetwork.nodes(),
node ->
node instanceof Nodes.ParallelInstructionNode
&& ((Nodes.ParallelInstructionNode) node).getParallelInstruction().getRead()
!= null);
}
private static boolean isCustomSource(Nodes.ParallelInstructionNode readNode) {
return CustomSources.class
.getName()
.equals(readNode.getParallelInstruction().getRead().getSource().getSpec().get("@type"));
}
private static void trackAutoscalingBytesRead(
MapTask mapTask,
Nodes.ParallelInstructionNode readNode,
Coder<?> readCoder,
ReadOperation readOperation,
MapTaskExecutor mapTaskExecutor,
String counterName) {
NameContext nameContext =
NameContext.create(
mapTask.getStageName(),
readNode.getParallelInstruction().getOriginalName(),
readNode.getParallelInstruction().getSystemName(),
readNode.getParallelInstruction().getName());
readOperation.receivers[0].addOutputCounter(
counterName,
new OutputObjectAndByteCounter(
new IntrinsicMapTaskExecutorFactory.ElementByteSizeObservableCoder<>(readCoder),
mapTaskExecutor.getOutputCounters(),
nameContext)
.setSamplingPeriod(100)
.countBytes(counterName));
}
private static ReadOperation getValidatedReadOperation(MapTaskExecutor mapTaskExecutor) {
ReadOperation readOperation = mapTaskExecutor.getReadOperation();
// Disable progress updates since its results are unused for streaming
// and involves starting a thread.
readOperation.setProgressUpdatePeriodMs(ReadOperation.DONT_UPDATE_PERIODICALLY);
Preconditions.checkState(
mapTaskExecutor.supportsRestart(),
"Streaming runner requires all operations support restart.");
return readOperation;
}
ComputationWorkExecutor createComputationWorkExecutor(
StageInfo stageInfo, ComputationState computationState, String workLatencyTrackingId) {
MapTask mapTask = computationState.getMapTask();
MutableNetwork<Node, Edge> mapTaskNetwork = mapTaskToNetwork.apply(mapTask);
if (LOG.isDebugEnabled()) {
LOG.debug("Network as Graphviz .dot: {}", Networks.toDot(mapTaskNetwork));
}
Nodes.ParallelInstructionNode readNode = extractReadNode(mapTaskNetwork);
Nodes.InstructionOutputNode readOutputNode =
(Nodes.InstructionOutputNode) Iterables.getOnlyElement(mapTaskNetwork.successors(readNode));
DataflowExecutionContext.DataflowExecutionStateTracker executionStateTracker =
createExecutionStateTracker(stageInfo, mapTask, workLatencyTrackingId);
StreamingModeExecutionContext context =
createExecutionContext(computationState, stageInfo, executionStateTracker);
DataflowMapTaskExecutor mapTaskExecutor =
createMapTaskExecutor(context, mapTask, mapTaskNetwork);
ReadOperation readOperation = getValidatedReadOperation(mapTaskExecutor);
Coder<?> readCoder =
CloudObjects.coderFromCloudObject(
CloudObject.fromSpec(readOutputNode.getInstructionOutput().getCodec()));
Coder<?> keyCoder = extractKeyCoder(readCoder);
// If using a custom source, count bytes read for autoscaling.
if (isCustomSource(readNode)) {
trackAutoscalingBytesRead(
mapTask,
readNode,
readCoder,
readOperation,
mapTaskExecutor,
computationState.sourceBytesProcessCounterName());
}
ComputationWorkExecutor.Builder executionStateBuilder =
ComputationWorkExecutor.builder()
.setWorkExecutor(mapTaskExecutor)
.setContext(context)
.setExecutionStateTracker(executionStateTracker);
if (keyCoder != null) {
executionStateBuilder.setKeyCoder(keyCoder);
}
return executionStateBuilder.build();
}
/**
* Extracts the userland key coder, if any, from the coder used in the initial read step of a
* stage. This encodes many assumptions about how the streaming execution context works.
*/
private @Nullable Coder<?> extractKeyCoder(Coder<?> readCoder) {
if (!(readCoder instanceof WindowedValue.WindowedValueCoder)) {
throw new RuntimeException(
String.format(
"Expected coder for streaming read to be %s, but received %s",
WindowedValue.WindowedValueCoder.class.getSimpleName(), readCoder));
}
// Note that TimerOrElementCoder is a backwards-compatibility class
// that is really a FakeKeyedWorkItemCoder
Coder<?> valueCoder = ((WindowedValue.WindowedValueCoder<?>) readCoder).getValueCoder();
if (valueCoder instanceof KvCoder<?, ?>) {
return ((KvCoder<?, ?>) valueCoder).getKeyCoder();
}
if (!(valueCoder instanceof WindmillKeyedWorkItem.FakeKeyedWorkItemCoder<?, ?>)) {
return null;
}
return ((WindmillKeyedWorkItem.FakeKeyedWorkItemCoder<?, ?>) valueCoder).getKeyCoder();
}
private StreamingModeExecutionContext createExecutionContext(
ComputationState computationState,
StageInfo stageInfo,
DataflowExecutionContext.DataflowExecutionStateTracker executionStateTracker) {
String computationId = computationState.getComputationId();
return new StreamingModeExecutionContext(
pendingDeltaCounters,
computationId,
readerCache,
computationState.getTransformUserNameToStateFamily(),
stateCacheFactory.apply(computationId),
stageInfo.metricsContainerRegistry(),
executionStateTracker,
stageInfo.executionStateRegistry(),
maxSinkBytes);
}
private DataflowMapTaskExecutor createMapTaskExecutor(
StreamingModeExecutionContext context,
MapTask mapTask,
MutableNetwork<Node, Edge> mapTaskNetwork) {
return mapTaskExecutorFactory.create(
mapTaskNetwork,
options,
mapTask.getStageName(),
readerRegistry,
sinkRegistry,
context,
pendingDeltaCounters,
idGenerator);
}
private DataflowExecutionContext.DataflowExecutionStateTracker createExecutionStateTracker(
StageInfo stageInfo, MapTask mapTask, String workLatencyTrackingId) {
return new DataflowExecutionContext.DataflowExecutionStateTracker(
sampler,
stageInfo
.executionStateRegistry()
.getState(
NameContext.forStage(mapTask.getStageName()),
"other",
null,
ScopedProfiler.INSTANCE.emptyScope()),
stageInfo.deltaCounters(),
options,
workLatencyTrackingId);
}
}
``` |
Erica Vexler (died 30 April 2011) was a Chilean journalist, editor, and television presenter best known for her reporting for the magazine Ercilla – of which she was editor in 1966 and subsequently subeditor until 1970 – and for presenting the program Erika Vexler 600 on Canal 13. In 1968, the presented her with the Lenka Franulic Award, which she shared with C. Machado.
In 1970, after the victory of Salvador Allende in the presidential election, she moved to Israel, where she served as a correspondent for Televisa.
Colonia Dignidad case
Vexler was one of the first journalists to investigate and publish a series of denunciations about the conditions that existed in the former Colonia Dignidad, in co-authorship with Osvaldo Murray and Juan Ehrmann. These incited the first judicial inquiry into the colony between 1966 and 1968, without conclusive results. Such reports appeared in Ercilla during the 1960s:
References
20th-century births
2011 deaths
20th-century journalists
Chilean expatriates in Israel
Chilean Jews
Chilean journalists
Chilean television presenters
Chilean women journalists
Deaths from emphysema
University of Chile alumni
Year of birth missing
Chilean women television presenters |
Old Saint Hilary's Open Space Preserve is a county park located in Marin County, California. It is 122 acres large and is connected to the Tiburon Uplands, which is 24 acres. The preserve was created by several local initiatives in the 90’s to save the land from development. It is a popular place for hikers because of its views and other features. There have been initiatives to expand the preserve, such as one that passed in 2022 that aims to connect it with undeveloped, but formerly privately owned land on its perimeter.
Physical characteristics
The preserve and its nearby surroundings such as Ring Mountain contain faults, ophiolitic terrain, and rocks of the Franciscan Complex, such as mélange, chert, Serpentine-talc schist, Greenstone, and ultramafic rocks. The presence of Serpentine, which is the state rock of California, creates a unique soil composition and can be found in other parts of Marin. It is laden with heavy metals that are toxic to most plants.
Biological characteristics
The peculiar geology and freshwater springs in the area provide a distinct ecosystem, giving rise to unique species. There are more than 200 species of plants growing on the preserve, and a grand majority of them are native to the peninsula. There is a wildflower preserve, named the John Thomas Howell Wildflower Preserve, next to the Old St. Hilary’s Church. Some of these flowers are extra noteworthy, such as the endangered Tiburon Jewelflower, to the extent that the Belvedere and Tiburon Landmarks Society chose it to be their logo.
According to a recent study, the Open Space land used to be continuous with nearby areas, all of which was the habitat of the Tiburon Jewelflower. However, housing developments in the latter half of the 20th century dissected the once uniform population into distinct groups. This is shown by a set of chronological overhead images compiled in the study. Also, gene samples which compare the current groups to the older one (saved in a seed bank) indicate an overall loss of genetic diversity. Another threat to its survival is drought worsened by climate change.
So, there are efforts to help the plant avoid extinction by transplanting it to nearby ring mountain, which has a similar geological profile. Although the plant never inhabited nearby ring mountain, it was identified as a “last hope” effort. However, it is still vulnerable to another hazard: hikers going off trail which "could destroy the new seedlings", despite signs posted by the Marin County Department of Parks and Open Space that prohibit this activity.
Cultural characteristics
The preserve is the site of the Old St. Hilary's Church, which is its namesake. The church's architectural style is Carpenter Gothic. In the past, it was a branch of Mission San Rafael. The Tiburon and Belvedere Landmark Society have taken efforts to refurbish and decorate the inside. However, its function as an active Catholic church has been replaced by the new “St. Hilary’s Church”, hence the “Old” in its name.
As part of a public health measure in the 1930s, the Works Progress Administration constructed an outhouse for Old St. Hilary's Church. It remained in use until the 1940s, and now serves as a storage unit for the Church. It is the only surviving outhouse of its kind on the peninsula.
The Heritage & Arts Commission of the Tiburon town government designates it as a historic site and includes it in promotional materials, such as the Discover Tiburon brochure. Old St. Hilary's Church occasionally hosts small concerts and other events. It is also used for weddings and wedding photographs.
References
Wikipedia Student Program
Parks in Marin County, California |
Jesselyn Radack (born December 12, 1970) is an American national security and human rights attorney known for her defense of whistleblowers, journalists, and hacktivists. She graduated from Brown University and Yale Law School and began her career as an Honors Program attorney at the U.S. Department of Justice.
She is notable for defending prominent whistleblowers, including National Security Agency whistleblowers Edward Snowden and Thomas Drake, each of whom was charged under the Espionage Act of 1917, as well as for her own experience as a whistleblower at the U.S. Department of Justice.
While working at the Justice Department, she disclosed that the Federal Bureau of Investigation (FBI) committed an ethics violation in their interrogation of John Walker Lindh, the "American Taliban", captured during the United States invasion of Afghanistan, without an attorney present. Radack alleged that the Department of Justice attempted to suppress that information. The Lindh case was the first major terrorism prosecution after 9/11. Her experience is chronicled in her memoir, TRAITOR: The Whistleblower and the "American Taliban", and in the documentary Silenced.
Radack is the director of National Security & Human Rights at ExposeFacts' Whistleblower and Source Protection Program. She has been widely published and quoted regarding whistleblowing, surveillance, Internet freedom and privacy. Her writing has appeared in The New York Times, the L.A. Times, Washington Post, Guardian, The Nation, Legal Times, and numerous law journals. She frequently appears in the press, including on the major television networks, NPR, PBS, CNN, Al Jazeera, and the BBC.
Early life and education
Radack was born in Washington, D.C., and attended Brown University. She was elected to Phi Beta Kappa in her junior year and graduated in 1992 as a triple major in American civilization, women's studies, and political science, with honors in all three majors. While in college, she was diagnosed with multiple sclerosis.
In 1995 Radack graduated from Yale Law School and, through the Attorney General's Honors Program, joined the Department of Justice. When the Department's [[Office of Professional Responsibility|Professional Responsibility Advisory Office (PRAO) was created in 1999, she served as a legal advisor until leaving Justice in April 2002.
John Walker Lindh case
Initial inquiry into Lindh case
On December 7, 2001, Radack received an inquiry from Justice Department counterterrorism prosecutor John DePue, regarding the ethical propriety of interrogating Lindh in Afghanistan without Lindh's legal representative being present. He told her that Lindh's father had retained a lawyer for his son; Lindh was not aware of this arrangement. Radack responded that interrogating him was not authorized by law. The principle at issue was that a person represented by a lawyer cannot be contacted by agents of the Justice Department, including the FBI, without permission of that lawyer. According to Radack, the advice she gave had been approved by Claudia Flynn, then head of PRAO, and Joan Goldfrank, a senior PRAO attorney.
The FBI proceeded to question Lindh without Lindh's lawyer having given permission. DePue informed Radack of the interrogation on December 10, 2001, and she advised him that Lindh's "interview may have to be sealed or only used for national security purposes; however, I don't have enough information yet to make that recommendation".
Radack continued to research the issue until December 20, 2001, when Flynn told her to drop the matter, because Lindh had been "Mirandized". It was later learned that the FBI agent who read Lindh the Miranda warning had, when noting the right to counsel, ad-libbed: "Of course, there are no lawyers here".
U.S. government statements on Lindh's legal rights
On January 15, 2002, five weeks after the interrogation, Attorney General John Ashcroft announced that a criminal complaint was being filed against Lindh. "The subject here is entitled to choose his own lawyer", Ashcroft said, "and to our knowledge, has not chosen a lawyer at this time". On February 5, 2002, Ashcroft announced Lindh's indictment, saying that his rights "have been carefully, scrupulously honored".
In early 2004 Radack said that she disagreed with Ashcroft's view but could see its logic, that because Lindh did not pick the lawyer himself, the lawyer did not represent him at the time of interrogation and therefore the questioning did not violate Lindh's rights. "You can debate it one way or another," she said. In early 2005 Radack recalled her reaction to Ashcroft's statements more starkly: "I knew that wasn't true".
Poor performance review
On February 4, 2002, the day before the Lindh indictment was announced, Flynn gave Radack an unscheduled, "blistering" performance evaluation, despite Radack having received a merit raise the year before. The evaluation covered December 27, 2000, to September 30, 2001, two months prior to the Lindh inquiry, and did not mention the Lindh case, but it criticized her legal judgment in issues related to the case, as well as in other matters. Flynn had not yet signed the review. She advised Radack to find another job, or the review would be put in Radack's official personnel file. Radack, who had planned on being a career civil servant, soon found a new job outside of government, at the law firm Hawkins, Delafield & Wood, from which she was effectively fired in November 2002 for refusing to either sign an affidavit stating that she had not leaked the government documents, or resign.
Missing emails
On March 7, 2002, while Radack was still working at PRAO, the lead prosecutor in the Lindh case, Randy Bellows, messaged Radack that there was a court order for all of the Justice Department's internal correspondence about Lindh's interrogation. He said that he had two of her messages and asked if there were more.
Radack immediately became concerned that the court order had been deliberately concealed from her. She had written more than a dozen emails on the subject, and neither of the ones Bellows had received copies of reflected her fear that the FBI's actions had been unethical and that Lindh's confession, which was the basis for the criminal case, might have to be sealed. After checking the hard-copy file, Radack said the files were tampered with to include only three of her emails; official records indicated that only those three emails were received by the Lindh prosecutors, but which emails DOJ supplied to the court and when cannot be determined as the court records were sealed. Radack confided in a senior colleague, former U.S. Attorney Donald McKay, who examined the file and told her that it had been "purged".
With the assistance of technical support, Radack then recovered 14 email messages from her computer archives and gave them to Flynn with a cover memorandum. When Flynn asked Radack why the messages weren't in the file, Radack said she didn't know, and her supervisor said "Now I have to explain why PRAO should not look bad for not turning them over," indicating her belief that Radack had overlooked the additional correspondence when originally turning over the messages and attempted to correct her error by presenting the recovered emails while asserting ethical misconduct. Radack took home a copy of the recovered emails to ensure they wouldn't "disappear" again.
Which emails the Department of Justice supplied to the court, and when, cannot be determined directly because the court placed them under seal. In March 2003 investigative journalist Jane Mayer of The New Yorker reported that "[a]n official list compiled by the prosecution confirms that the Justice Department did not hand over Radack's most critical e-mail in which she questioned the viability of Lindh's confession until after her confrontation with Flynn".
On December 31, 2003, Radack requested the court appoint a special prosecutor to probe the alleged suppression of the emails. The government responded that it had supplied the emails to the court in its initial response to the court order seeking them, i.e., on March 1, 2002. The description of the 24 documents (probably including duplicates) provided to the court at that time matches Radack's emails, including the one that states interviewing Lindh is not authorized by law. DePue, the recipient of the emails, also had copies and states that they were submitted to the court. The judge rejected Radack's request as "impertinent".
In 2004 Radack filed suit against the government (see below). In 2005, the court found that "[t]hough Flynn informed Radack that she would send the emails to Bellows, Radack maintains that she had a 'good faith belief' that this never occurred...Radack was mistaken, for in filings submitted to the Virginia District Court on March 1, 2002, and March 11, 2002, Bellows turned over thirty-three PRAO-related documents, including Radack's fourteen emails, ex parte and under seal, for in camera review".
Disclosure to Newsweek of emails believed to have been purged
Radack resigned from the Justice Department on April 5, 2002. In June 2002 she heard a broadcast on NPR stating that the Department said they had never taken the position that Lindh was entitled to counsel during his interrogation. She later wrote, "I knew this statement was not true. It also indicated to me that the Justice Department must not have turned over my e-mails to the Lindh court ... because I did not believe the Department would have the temerity to make public statements contradicted by its own court filings, even if those filings were in camera." She reasoned that "disclosure of my e-mails would advance compliance with the Lindh court's discovery order while also exposing gross mismanagement and abuse of authority by my superiors at the Justice Department." After hearing the broadcast, Radack sent the emails to Michael Isikoff, a Newsweek reporter, who had been interviewed in the NPR story. He then wrote an article about the Lindh case emails, quoting Radack but not naming her as the source of what he called "internal e-mails obtained by Newsweek."
Radack has said she did not turn the documents over to the court or prosecutors at the time she recovered them because she felt intimidated by Flynn, who had told her to drop the matter. Later, no longer working in government, she reasoned, "I couldn't go to the court because Justice Department lawyers would argue (as they did when I eventually did try to tell my story to the court) that I had no standing. I couldn't go to a Member of Congress because, as a resident of the District of Columbia, I didn't have a voting representative. What I could do is disclose my story to the press--a judicially-sanctioned way of exposing wrongdoing under the Whistleblower Protection Act of 1989, which provides protection to federal government employees who blow the whistle on what they reasonably believe evidences a violation of any law, rule, or regulation; gross mismanagement; or an abuse of authority".
Radack and some others believe her disclosure of the emails may have contributed to the plea agreement that led to a sentence of 20 years instead of possible multiple life sentences for Lindh. The plea deal was reached on July 15, 2002, a month after the Newsweek article on the emails appeared online and just hours before the hearing to consider the motions to suppress the Lindh interviews was set to begin. According to Lindh defense attorneys, the prosecution first approached them about a plea deal around the beginning of June. On June 14, the day before the emails were disclosed, and June 17, the Lindh defense filed their arguments to suppress all the interviews conducted in Afghanistan, including the ones that Radack had advised might have to be suppressed. The defense reasoning was different from Radack's; it did not assert that Lindh was represented by a lawyer at the time, which was the basis for Radack's advice in the emails.
Justice Department actions against Radack
On June 19, 2002, the Lindh court ordered the Justice Department to file a pleading "addressing whether any documents ordered protected by the Court were disclosed by any person bound by an Order of this court". The Justice Department launched a criminal investigation of Radack that remained open for 15 months. No potential criminal charge was ever specified, but as leaking is not a crime, the most likely charge would have been theft of government property, as she had taken home copies of her emails before she resigned from the PRAO, and her PRAO supervisor later insinuated she was suspected of having removed other files that had gone missing. Radack says an agent of the Department of Justice's Office of the Inspector General (OIG) told her new employer and coworkers that she was under criminal investigation and would steal client files.
Radack believes the OIG agent pressured her employer to fire her. The firm was initially supportive, but after it obtained phone records of calls between Newsweek writer Isikoff and the firm's office showing that Radack appeared to be the leaker of government emails, that changed. A partner in the firm, which represented mainly government bond issuers, told her they could not be perceived to have an ex-government lawyer who broke confidence when she thought the client was wrong. When she continued to refuse to sign a statement that she did not leak the emails, she was placed on paid and then unpaid leave.
When Radack was granted unemployment benefits, her now-former employer was assisted by the Justice Department, she says, in challenging the benefits on the grounds of her alleged misconduct and insubordination. She won the appeal.
The Lindh court issued an order on November 6, 2002, concluding that Radack's disclosure did not violate any order of the Court, but this order was not made available to Radack until two years later.
The Department of Justice notified Radack that the criminal investigation was closed on September 11, 2003. On October 31, 2003, the Department of Justice's Office of Professional Responsibility (OPR) sent letters to the bar associations of the two jurisdictions in which she was licensed to practice law referring her for a possible ethics violation. The referrals proposed that in disclosing the emails she may have knowingly revealed information protected by attorney-client privilege. There is disagreement about whether the government or the public is the client of government attorneys. Radack bypassed that issue by invoking the Whistleblower Protection Act (WPA), which she argues provides the legal basis for an exception to attorney-client privilege, i.e., for disclosure when permitted or authorized by law. The Justice Department responded that the WPA may not apply to former employees, and that it does not authorize any disclosure, only prevents retaliatory personnel actions for certain disclosures.
OPR did not follow its own policies in making the referrals, according to Radack, including in not allowing her to formally respond to its findings. She has contrasted the way she was treated by the Department of Justice and the way the department attorneys who authored the memos giving a purported legal basis for waterboarding and other controversial interrogation methods were treated.
There was never any serious investigation of how Radack's emails disappeared from the PRAO file, she believes, a conclusion reached in part because no investigator questioned her about it. She says the OIG told her attorney they had "looked into" her allegations and they were "not going to pursue it".
The criminal investigation and subsequent ethics referrals prevented Radack from finding suitable work as an attorney for years, she says. The Maryland Bar dismissed the referral February 23, 2005. At the District of Columbia Bar, the referral was not resolved until 2011.
Radack has said that one or more anonymous Justice Department officials "smeared" her in the media as a "traitor", "turncoat", and "terrorist sympathizer" "to alienate me from all my neighbors, all my friends", sometimes specifying it was in The New York Times. In May 2003, Eric Lichtblau reported at The New York Times that "Government officials suspect she is a turncoat who leaked documents on one of their most important investigations, the John Walker Lindh case."
For a time beginning in 2003, Bruce Fein, a noted constitutional scholar and former associate deputy attorney general under Ronald Reagan, represented Radack pro bono. Rick Robinson of Fulbright & Jaworski and Mona Lyons also represented her.
Congressional questions
At a May 7, 2003, hearing of the Senate Judiciary Committee, Senator Ted Kennedy questioned Michael Chertoff, who was before the committee as a nominee for a circuit court judgeship, and who, as an Assistant Attorney General during the period in which Lindh was prosecuted, headed the Justice Department's Criminal Division. Kennedy later said that Chertoff's initial answers about Radack's case were "nonresponsive, evasive and hyper-technical" but that after follow-up questions, Chertoff provided more "direct and forthcoming" answers.
On May 22, Kennedy issued a statement saying, "I am concerned about inconsistencies in the responses Mr. Chertoff provided with respect to the debate over the legality of the interrogation of John Walker Lindh. … I understand that Mr. Chertoff does not believe that Mr. DePue played a major role in the Lindh investigation and prosecution, and does not understand why DePue asked PRAO for its opinion on this matter. Nevertheless, Mr. Chertoff should have fully shared his knowledge regarding this situation from the outset, rather than deny that PRAO was asked for its opinion." Kennedy also said, "Mr. Chertoff has told me that [he] has no knowledge of the facts surrounding Ms. Radack's employment, performance, or departure from the Department, and I take him at his word. Nevertheless, I remain very concerned about Ms. Radack's situation. According to press reports—and the Department has never issued any statement disputing them—Ms. Radack was in effect fired for providing legal advice on a matter involving ethical duties and civil liberties that higher-level officials at the Department disagreed with." In the same statement, Kennedy said he had submitted questions in March to Attorney General Ashcroft about Radack having been "in effect fired for providing legal advice on a matter involving ethical duties and civil liberties that higher-level officials at the Department disagreed with."
On May 23, by a vote of 13 to 0, the committee sent Chertoff's judicial nomination to the full Senate for confirmation. Six Democrats, however, voted "present," saying they wanted more time to review Radack's accusations.
Whistleblower defense lawyer, after DOJ
In the mid-2000s, Radack served on the D.C. Bar Legal Ethics Committee and worked with the ABA Task Force on Treatment of Enemy Combatants.
Law office of Congressman Alan Grayson
From 2006–2008, she worked as a lawyer in the law firm owned by of Congressman Alan Grayson, "Grayon and Kubli", representing government contractors blowing the whistle on fraud in the reconstruction of Iraq.
Government Accountability Project
From 2009–2014, Radack was Homeland Security & Human Rights Director at the Government Accountability Project.
Institute for Public Accuracy
Since 2015, she has been National Security & Human Rights Director of the Whistleblower and Source Protection Program (WHISPeR) at ExposeFacts. Radack is one of the attorneys for National Security Agency whistleblower Edward Snowden. She was also one of the attorneys who represented National Security Agency whistleblower Thomas Andrews Drake, with whom she won the 2011 Sam Adams Award, given annually by the Sam Adams Associates for Integrity in Intelligence. They also both won the 2012 Hugh M. Hefner First Amendment Award. She is also the lawyer of whistleblower Brandon Bryant. Her writing has appeared in The New York Times, Wall Street Journal, Los Angeles Times, The Washington Post, The Guardian, The Nation, Salon, and numerous law journals. She maintains a blog at Daily Kos.
On May 9, 2019, Radack described her client Daniel Everette Hale, an analyst for the National Geospatial-Intelligence Agency, as a "classic whistleblower".
See also
Sibel Edmonds
List of whistleblowers
Whistleblower Protection Act
References
External links
On Julian Assange's address to the UNGA, human rights, and the persecution of whistleblowers Jesselyn Radack speaks to RT (TV network), September 27, 2012.
Disharmonic Convergence of Free Speech Free Fall by Jesselyn Radack (The Whistleblogger/ 2012), Government Accountability Project (GAP), on September 27, 2012.
Jesselyn Radack:The Canary in the Coalmine, 2004.
DailyKos blog and profile
Silenced: documentary trailer published via YouTube
Living people
Yale Law School alumni
Brown University alumni
American whistleblowers
1970 births
United States Department of Justice lawyers
Lawyers from Washington, D.C.
American human rights activists
Women human rights activists |
Barry Stanton (born 18 February 1940) is a British stage, film and television actor.
Selected filmography
Film
Robbery (1967)
King Lear (1971)
Demons of the Mind (1972)
Hamlet (1977)
Sweeney 2 (1977)
Lionheart (1987)
King of the Wind (1990)
Robin Hood (1991)
Shanghai Knights (2003)
Television
The Plane Makers (1963)
Front Page Story (1965)
The Baron (1966)
The Likely Lads (1966)
Witch Hunt (1967)
No Hiding Place (1967)
George and the Dragon (1968)
Spy Trap (1972)
Budgie (1972)
The Sweeney (1975)
Upstairs, Downstairs (1975)
The New Avengers (1977)
Fallen Hero (1978-1979)
Turtle's Progress (1979-1980)
The Search for Alexander the Great (1981)
Something in Disguise (1982)
Minder (1982)
Now and Then (1983)
Doctor Who (1984)
Tucker's Luck (1984)
Mann's Best Friends (1985)
Yes, Prime Minister (1986)
Ain't Misbehavin' (1995)
Dalziel and Pascoe (1998)
The Infinite Worlds of H. G. Wells (2001)
References
Bibliography
George W. Brand. British Television Drama in the 1980s. Cambridge University Press, 1993.
External links
Barry Stanton at Theatricalia
1940 births
Living people
British male television actors
British male film actors
Male actors from Manchester |
Anthony Kostelac (born July 4, 1991) is a middle-distance runner who specializes in the 800 meters. As a high schooler, he was a part of Albemarle High School's men's 4×800 meter relay team which broke a world junior record in 2012. He went on to compete as an 800-meter runner with University of Virginia, in addition to building a reputation as a prolific relay runner.
Running career
High school
Kostelac attended and ran for Albemarle High School. His coaches at Albemarle were "Buz" Male and Lance Weisend. In 2010 Kostelac was named Burger King Male Student Athlete of the Year. In the years Kostelac attended Albemarle, the high school fielded a historic 4 × 800 men's relay team including Kostelac, Zach Vrhovac, Luke Noble, and Garrett Bradley. The four-man squad would set an indoor world junior record in 2009 at the Boston Indoor Championships. They were also successful on a national level in the outdoor season, as the Albemarle 4x800 relay team would win a tightly-contested 2009 Penn Relays high school 4x800 relay race. Kostelac, Albemarle's anchor runner, got the baton behind Morris Hills High School's Liam Tansey, whose team was on the verge of winning the race before Kostelac (a junior during this season) took the lead in the last 175 meters and held it to win the race. By the time he graduated from Albemarle, he was a high school record-holder in the 800 meters for the state of Virginia. Kostelac graduated in 2010 with a 3.9 GPA.
Collegiate
Kostelac was recruited by close-by University of Virginia, whose men's 4x800 relay team would become one of the most competitive in NCAA history with Kostelac, Robby Andrews, Lance Roller, and Brett Johnson. The quartet won the 2011 Penn Relays men's 4x800 relay race with a time of 7:12.15; it is the second fastest 4x800 relay time in Penn Relays' 127-year history, as well as the seventh fastest 4x800 relay result recorded in the United States.
References
American male middle-distance runners
Virginia Cavaliers men's track and field athletes
1991 births
Living people |
Minnie Joycelyn Elders (born Minnie Lee Jones; August 13, 1933) is an American pediatrician and public health administrator who served as Surgeon General of the United States from 1993 to 1994. A vice admiral in the Public Health Service Commissioned Corps, she was the second woman, second person of color, and first African American to serve as Surgeon General.
Elders is best known for her frank discussion of her views on controversial issues such as drug legalization, masturbation, and distributing contraception in schools. She was forced to resign in December 1994 amidst controversy as a result of her views. She is currently a professor emerita of pediatrics at the University of Arkansas for Medical Sciences.
Early life and education
Elders was born Minnie Lee Jones in Schaal, Arkansas, to a poor, farm sharecropping family, and was the eldest of eight children, and valedictorian of her school class. The family also spent two years near a wartime shipyard in Richmond, California before returning to School. In college, she changed her name to Minnie Joycelyn Lee. In 1952, she received her B.S. degree in Biology from Philander Smith College in Little Rock, Arkansas, where she also pledged Delta Sigma Theta. She married briefly to Cornelius Reynolds, a Federal employee, and later to Oliver Elders, a basketball coach. After working as a nurse's aide in a Veterans Administration hospital in Milwaukee for a period, she joined the United States Army in May 1953 and became a 2nd Lieutenant. During her 3 years in the Army, she was trained as a physical therapist. She then attended the University of Arkansas Medical School, where she obtained her M.D. degree in 1960. After completing an internship at the University of Minnesota Hospital and a residency in pediatrics at the University of Arkansas Medical Center, Elders earned an M.S. in Biochemistry in 1967.
Director of Arkansas Department of Health
In 1987, then-governor Bill Clinton appointed Elders as Director of the Arkansas Department of Health, making her the first African-American woman in the state to hold this position. Some of her major accomplishments while in office include reducing the teen pregnancy rate by increasing the availability of birth control, counseling, and sex education at school-based clinics; a tenfold increase in early childhood screenings from 1988 to 1992 and a 24 percent rise in the immunization rate for two-year-olds; and an expansion of the availability of HIV testing and counseling services, breast cancer screenings, and better hospice care for the elderly. She also worked hard to promote the importance of sex education, proper hygiene, and prevention of substance abuse in public schools. In 1992, she was elected President of the Association of State and Territorial Health Officers.
Experiences with racism
Elders believed that opposition to her Surgeon General nomination was driven by sexism and racism. "Some people in the American Medical Association, a certain group of them, didn't even know that I was a physician. They were passing a resolution to say that from now on every Surgeon General must be a physician—which was a knock at me. ... They don't expect a black female to have accomplished what I have and to have done the things that I have."
During an interview, she was asked if she related to Shirley Chisholm's statement about feeling more oppressed as a woman than as an African American, and replied by saying, "I am who I am because I'm a black woman." Elders was able to be the voice for the African-American community and speak on poverty and its role in teenage pregnancy, which is a major issue within the community. Poor African-American teenage mothers are "captive to a slavery the 13th Amendment did not anticipate," which is a major reason why she stressed the importance of teaching sex education in public schools.
Views on sex education
As an endocrinologist, Elders was especially concerned with young diabetic women getting pregnant. If young teen women who have diabetes get pregnant, they have a high chance of their bodies rejecting the fetus or the fetus developing abnormalities in utero. To prevent these pregnancies from happening, she thoroughly talked to her patients about the dangers of early pregnancy and the importance of using contraceptives, and taking control of their sexuality as soon as they began puberty. Of the approximately 260 young diabetic women she treated, only one of them became pregnant.
Sex education for young African-American women
Elders strongly advocated sex and reproductive education, especially in African-American communities. She criticized older textbooks that said only white females had naturally regular periods, because white females were on birth control to regulate their periods. Black females did not readily seek out birth control because their "[black] ministers were up on the pulpit saying the birth control pills were black genocide." She was very vocal about her disgust with black men exploiting black women and stripping them of their reproductive health choices, because "If you can't control your reproduction, you can't control your life."
Surgeon General of the United States
Elders has received a National Institutes of Health career development award, also serving as assistant professor in pediatrics at the University of Arkansas Medical Center from 1967. She was promoted to associate professor in 1971 and professor in 1976. Her research interests focused on endocrinology, and she received board certification as a pediatric endocrinologist in 1978, becoming the first person in the state of Arkansas to do so. Elders received a D.Sc. degree from Bates College in 2002.
In January 1993, Bill Clinton appointed her as the United States Surgeon General, making her the first African American and the second woman (following Antonia Novello) to hold the position. At her confirmation hearing, Elders responded to criticism over an incident in which she decided not to notify the public that condoms her department had been distributing in Arkansas had been found to be defective, with a failure rate ten times the allowed rate. Elders said that "I don't know" whether the decision had been correct, but she had believed at the time that public disclosure could lead to a public loss of faith in the efficacy of condoms, which would have been the greater danger. She was a controversial choice and a strong backer of the Clinton health care plan, so she was not confirmed until September 7, 1993. As Surgeon General, Elders quickly established a reputation for being controversial. Like many of the Surgeons General before her, she was an outspoken advocate of a variety of health-related causes. She argued for an exploration of the possibility of drug legalization, and backed the distribution of contraceptives in schools. President Clinton stood by Elders, saying that she was misunderstood.
Views on drug legalization
Elders drew fire, as well as censure from the Clinton administration, when she suggested that legalizing drugs might help reduce crime and that the idea should be studied. On December 15, 1993, around one week after making these comments, charges were filed against her son Kevin for selling cocaine in an incident involving undercover officers four months prior. Elders believes the incident was a frame-up and the timing of the charges was designed to embarrass her and the president. Kevin Elders was convicted, and he was sentenced to 10 years in prison, of which he served four months. He appealed his conviction to the Arkansas Supreme Court, and that court affirmed the conviction. The court held that Elders failed to show that he was entrapped into making the narcotics sale. There was no further appeal.
Comments on abortion and masturbation
In January 1994 in the context of abortion, Elders said, "We really need to get over this love affair with the fetus and start worrying about children."
Later that year, she was invited to speak at a United Nations conference on AIDS. She was asked whether it would be appropriate to promote masturbation as a means of preventing young people from engaging in riskier forms of sexual activity, and she replied, "As per your specific question in regard to masturbation, I think that is something that is a part of human sexuality and it's a part of something that perhaps should be taught. But we've not even taught our children the very basics. And I feel that we have tried ignorance for a very long time and it's time we try education."
Resignation
Elders' comments on masturbation caused great controversy and resulted in Elders losing the support of the White House. Clinton's chief of staff, Leon Panetta, remarked, "There have been too many areas where the President does not agree with her views. This is just one too many." In December 1994, Elders was forced to resign by President Clinton. This led sex-positive retailer Good Vibrations in 1995 to proclaim May 28 as National Masturbation Day in honor of Elders' advocacy.
A collection of Elder's professional papers is held at the National Library of Medicine in Bethesda, Maryland.
Post-governmental activities
Since leaving her post as Surgeon General, Elders has returned to the University of Arkansas for Medical Sciences as professor of pediatrics, and is currently professor emerita at UAMS. She is a regular on the lecture circuit, speaking against teen pregnancy. She has appeared on TV in Penn and Teller: Bullshit! during the episode on abstinence, where she says that she considers abstinence-only programs to be child abuse and discusses her opinions on teenage sex education, masturbation and contraceptives. In 2009 Elders teamed up with the University of Minnesota to establish the nation’s first Chair in Sexual Health Education, a fund to attract and retain outstanding tenured sexual health education faculty in the Program in Human Sexuality at the University of Minnesota Medical School. She is interviewed in the 2013 documentary How to Lose Your Virginity on her opinions regarding comprehensive sex education versus abstinence-only sex education.
Elders was inducted into the Arkansas Women's Hall of Fame in 2016.
In 2015, Philander Smith College, Elders' alma mater, established the Dr. Joycelyn Elders School of Allied and Public Health.
In an October 15, 2010, article, she clearly voiced support for legalization of marijuana:
In 1997, Elders published a memoir.
She received a Candace Award from the National Coalition of 100 Black Women in 1991. She was inducted into Omicron Delta Kappa as an honoris causa initiate at SUNY Plattsburgh in 1996.
See also
Sticky: A (Self) Love Story, a documentary on masturbation including an interview with Elders about her experience being asked to resign from the Clinton administration
References
Joycelyn Elders, M.D. by Dr. Joycelyn Elders and David Chanoff. Another Surgeon General's autobiography.
External links
Joycelyn Elders's oral history video excerpts at The National Visionary Leadership Project
Video of Joycelyn Elders, from the AETN documentary on her
1933 births
Living people
African-American female military personnel
African-American women scientists
American scientists
American abortion-rights activists
American endocrinologists
Women endocrinologists
American pediatricians
Women pediatricians
Surgeons General of the United States
State cabinet secretaries of Arkansas
Women in Arkansas politics
Arkansas Democrats
Philander Smith College alumni
United States Army officers
University of Arkansas faculty
University of Arkansas alumni
Clinton administration personnel
American women physicians
United States Public Health Service Commissioned Corps admirals
Women in the United States Army
Delta Sigma Theta members
American cannabis activists
African-American women physicians
20th-century African-American physicians
20th-century American physicians
21st-century American women
African-American United States Army personnel |
"El Cafetero" is an instrumental song in the pasillo genre written by Maruja Hinestroza Rosero.
Viva Music Colombia rated the song No. 24 on its list of the 100 most important Colombian songs of all time. In its list of the 50 best Colombian songs of all time, El Tiempo, Colombia's most widely circulated newspaper, ranked the version of the song by Jaime Llano González at No. 25.
References
Colombian songs |
I Believe in Science () is an Arabic-language website dedicated to publishing translations of science articles and research, with the aim of keeping the Arabic speaking world up-to-date with the latest scientific discoveries and accomplishments. The project has amassed more than 2000 volunteers who managed to produce around 15000 scientific articles. Issam Fawaz is the CEO.
History
The project started in 2011 by Ahmed Al-Rayes, an Iraqi geologist living in Lebanon, across social media platforms, the website was established in 2013. They paid tribute to a few of the women who volunteer translating research in March 2015 for International Women's Day. In 2016, the idea became an official NGO registered in both Lebanon and the European Union.
In 2012, the project adopted the slogan: I Believe in Science because it’s the only methodology that actually works
The project goals are:
Removing and breaking the linguistic barriers that once prevented the Arabic speaking world from reaching true scientific knowledge, by creating a free uninfluenced platform to exchange knowledge and expertise
Creating and encouraging an environment for the Arab speaking population, that belongs to a hostile culture towards scientific truth, to read and seek scientific knowledge
Showing the efficiency of the scientific methodology in explaining the biggest phenomena's surrounding us by focusing on objectivity, refutability and applicability of natural sciences and their discoveries
Physicist Lawrence Krauss is among the scientists who have commented favorably on the project.
Similarly, biologist Robert Weinberg has said:
References
External links
IBelieveinSci.com (website)
I Believe in Science on Facebook
Internet properties established in 2011
Science websites
Organizations established in 2011
Lebanese educational websites
Non-profit organisations based in Lebanon
Arabic-language websites
Science and technology in Lebanon |
Hemsbach is a small river of Bavaria, Germany. It is a left tributary of the Kahl.
See also
List of rivers of Bavaria
References
Rivers of Bavaria
Rivers of the Spessart
Rivers of Germany |
Caty Dehaene (born 11 December 1965) is a Belgian snooker player. She was runner-up in the 2018 Women's EBSA European Snooker Championship.
Playing career
Caty Dehaene was runner-up in the Belgian Women's snooker Championship in 1995, 2005, 2006, 2012, 2013, 2014, 2016 and 2019.
Dehaene and Wendy Jans won the Ladies European Team Snooker Championship in 2017, beating Anastasia Nechaeva and Daria Sirotina 4–3 in the final.
At the 2018 EBSA European Snooker Championship, Dehaene reached the women's final, with wins of 3–0 against Ewilina Pislewska, 4–1 against Tatjana Vasiljeva and 4–2 against Yana Shut. In the final she lost 0–4 to Jans, who won the title for the sixth year in a row.
Career Highlights
Individual
Team
Notes
References
Belgian snooker players
Female snooker players
1965 births
Living people
20th-century Belgian women
21st-century Belgian women |
The Czechoslovakia men's national under-19 volleyball team represented Czechoslovakia in international men's volleyball competitions and friendly matches under the age 19 and it was ruled by the Czechoslovak Volleyball Federation which was a member of the Federation of International Volleyball (FIVB) and also a part of European Volleyball Confederation (CEV).
Results
FIVB U19 World Championship
Champions Runners up Third place Fourth place
The Czechoslovakia men's national under-19 volleyball team did not compete in any European youth Championship because the team was dissolved in late 1992 before the first European youth championship took place in 1995.
References
External links
Official website
FIVB profile
National men's under-19 volleyball teams
Volleyball in Czechoslovakia |
Carrabelle River is located in Carrabelle, Florida, and flows into St. George Sound in Apalachicola Bay and the Gulf of Mexico. The area has been a base for commercial fishermen. It is home to a river festival. It is crossed by the Carrabelle River Bridge on U.S. Route 98. Upstream, the Carrabelle forks into the New River and Crooked River.
References
Rivers of Franklin County, Florida
Rivers of Florida |
David Begnaud (born June 13, 1983) is an American journalist and news correspondent. Begnaud works for CBS News, and is currently based in New York City as the Lead National Correspondent for CBS Mornings. His reporting has been featured across CBS News broadcasts and platforms including CBS This Morning, the CBS Evening News, 48 Hours, CBS Sunday Morning, as well as CBS News Streaming, CBS News' 24/7 streaming news service.
Early life and education
Begnaud is from Lafayette, Louisiana, the heart of Cajun country. He went to Catholic school and was an altar boy and Eucharistic minister. Begnaud received a bachelor's degree in general studies from the University of Louisiana at Lafayette in 2005.
Career
Begnaud started his television career as a teen reporter, while in high school, at KLFY TV 10 in Lafayette, LA. When he walked into his first day of college at the University of Louisiana at Lafayette, Begnaud's instructor asked if he was the man she'd seen anchoring the evening news the night before. He was. Begnaud went on to anchor the weekend morning and evening editions of Eyewitness News, while attending college during the week.
Begnaud worked at KSLA in Shreveport Louisiana from 2005 to 2007. He then joined KOVR in Sacramento, where he spent three years, before joining KTLA in Los Angeles. In 2015, he CBS News named him the Miami-based correspondent for the network. He then relocated to the network's Dallas bureau in January 2017.
In September 2017, Begnaud was sent to Puerto Rico by CBS News to report on Hurricane Irma and remained there for Hurricane Maria. From various locations in Puerto Rico, Begnaud filed multiple reports of conditions on the ground that were broadcast through CBS News. In addition, Begnaud reported through his own various social media accounts. His social media accounts have been hailed for helping keep followers in the mainland US informed about the conditions in Puerto Rico.
After his time in Puerto Rico for Hurricane Maria, Begnaud continued to file reports through CBS news, or his own social media accounts, on topics related to Puerto Rico and the Hurricane Maria recovery. CBS news also continued to send Begnaud to various locations, including additional trips to Puerto Rico, to report on other breaking stories such as a mistreated children's case in California, wildfires in California, and undocumented immigrant children separations.
In July 2019, Begnaud was back in Puerto Rico reporting on the Puerto Rico protests, and the resignation of then governor Ricardo Rossello and was received warmly by the Puerto Ricans on the island, who see him as their ally.
Personal life
Begnaud resides in Manhattan. In 2018, Begnaud reported to Washington Blade that he and his partner, Jeremy, of Los Angeles had been together for almost 12 years. He also stated that he had come out to his family 10 years earlier. Begnaud came out publicly on June 24, 2018, by posting a picture with his partner after seeing pride celebrations in New York City.
Begnaud was diagnosed with Tourette syndrome at age 6. In December 2018, he revealed this fact publicly; he said his parents never allowed him to use it as an excuse for not succeeding, and that Tourette's was one of the primary motivators for him to persevere and succeed in journalism. His tics, which are mainly nonvocal, include sniffing.
Awards and honors
In February 2018, Begnaud was awarded the George Polk journalism award for public service for his work reporting on Puerto Rico and Hurricane Maria. Additionally, Begnaud received the Radio Television Digital News Association's First Amendment Leadership Award for his significant contribution to the protection of the First Amendment and freedom of the press. He was also designated a "Puerto Rican Champion" and participated in the 2018 Puerto Rican Day Parade in New York City. Begnaud is an honorary Puerto Rican highly esteemed by the people of Puerto Rico. In 2023, David was honored with the Alumni Lifetime Achievement Award from the National Speech and Debate Association. David credits speech, and his beloved speech coach, Josette Cook Surratt, with helping him find his voice, and himself.
Notes
References
External links
21st-century American journalists
American television reporters and correspondents
CBS News people
American LGBT journalists
American gay writers
American writers with disabilities
LGBT people from Louisiana
Journalists from Louisiana
George Polk Award recipients
University of Louisiana at Lafayette alumni
People with Tourette syndrome
Living people
1983 births
21st-century American LGBT people |
HD 84117 is a F-type main sequence star in the constellation of Hydra. It has an apparent visual magnitude of approximately 4.94.
References
Hydra (constellation)
F-type main-sequence stars
HD, 084117
084117
047592
3862
0364
Durchmusterung objects |
```python
# THIS FILE IS AUTOMATICALLY GENERATED FROM INFORMATION STORED IN
# THIRD-PARTY METADATA SERVICE. YOUR MANUAL CHANGES TO THIS FILE WILL
# BE PRESERVED AND WILL SERVE AS THE SOURCE OF TRUTH FOR METADATA OF
# THIS PACKAGE.
# TPMS-GENERATED: b3448f8fd2a893772f944f37627e63917b77dede
METADATA = {
"name": "rules",
"owner": "pytorch_dev_infra",
}
``` |
In geometry, the orthopole of a system consisting of a triangle ABC and a line ℓ in the same plane is a point determined as follows. Let be the feet of perpendiculars dropped on ℓ from respectively. Let be the feet of perpendiculars dropped from to the sides opposite (respectively) or to those sides' extensions. Then the three lines are concurrent. The point at which they concur is the orthopole.
Due to their many properties, orthopoles have been the subject of a large literature.
Some key topics are determination of the lines having a given orthopole and orthopolar circles.
Literature
Orthopole=Ортополюс. In Russian
References
Points defined for a triangle |
Towneley is a surname, and may refer to:
People
The Towneley family of England
Charles Townley (1 October 1737 – 3 January 1805[1]), British antiquary
Caroline Theresa Towneley (1838–1873), British heiress
Charles Towneley (MP) (1803–1870), Irish Independent Irish Party and Whig politician
Francis Towneley (1709–1746), English Catholic and Jacobite
Henry Towneley Green (1836–1899), English watercolourist and illustrator
John Towneley (politician) (1806–1878), English Whig politician
John Towneley (translator) (1697–1782), English supporter of the Jacobite Rising of 1745
Montagu Towneley-Bertie, 13th Earl of Lindsey (2 November 1887 – 11 September 1963), English peer
Richard de Towneley (MP) (c. 1313 – 16 April 1381), English landowner and politician
Richard Towneley (1629–1707), English mathematician, natural philosopher and astronomer
Simon Towneley (1921–2022), British author
Barons O'Hagan
Baron O'Hagan (the title)
Thomas O'Hagan, Baron O'Hagan (1812–1885)
who married in 1871 Alice Towneley, daughter and co-heiress of Colonel Charles Towneley, from whom his heirs take the name
Thomas Towneley O'Hagan, 2nd Baron O'Hagan (5 December 1878 – 13 December 1900)
Maurice Towneley-O'Hagan, 3rd Baron O'Hagan (20 February 1882 – 18 December 1961)
Charles Towneley Strachey, 4th Baron O'Hagan (b. 1945)
Places and institutions
Mary Towneley Loop, a circular route along the border of Lancashire and Yorkshire
Towneley Colliery or Towneley Desmesne, coal mine in Lancashire
Towneley High School founded 1941 in Lancashire
Towneley Park in Lancashire
Towneley railway station in Lancashire
Towneley Stadium, a former racing stadium in Lancashire
Arts
Towneley Mystery Plays |
```javascript
/* globals customElements */
import { LitElement, html, css } from '../vendor/lit-element/lit-element'
import { repeat } from '../vendor/lit-element/lit-html/directives/repeat'
import { shorten } from '../../lib/strings'
import * as bg from './bg-process-rpc'
import commonCSS from './common.css'
import inputsCSS from './inputs.css'
import buttonsCSS from './buttons.css'
import spinnerCSS from './spinner.css'
const STATES = {
READY: 0,
DOWNLOADING: 1,
CLONING: 2
}
class ForkDriveModal extends LitElement {
static get properties () {
return {
state: {type: Number},
label: {type: String},
title: {type: String},
description: {type: String},
tags: {type: String},
isTemplate: {type: Boolean},
isDetached: {type: Boolean}
}
}
static get styles () {
return [commonCSS, inputsCSS, buttonsCSS, spinnerCSS, css`
.wrapper {
padding: 0;
}
form {
padding: 14px 20px;
margin: 0;
}
.loading {
padding: 20px 22px 20px;
font-size: 15px;
font-style: normal;
border-bottom: 1px solid #ccd;
color: rgba(0, 0, 0, 0.6);
}
h1 {
margin-top: 0;
}
.tabbed-nav {
display: flex;
align-items: center;
font-size: 17px;
letter-spacing: 0.5px;
margin: -4px -16px 14px;
}
.tabbed-nav span {
min-width: 5px;
border: 1px solid transparent;
border-bottom: 1px solid #bbb;
height: 28px;
}
.tabbed-nav span.spacer {
flex: 1;
}
.tabbed-nav a {
color: inherit;
border: 1px solid transparent;
border-bottom: 1px solid #bbb;
cursor: pointer;
border-top-left-radius: 2px;
border-top-right-radius: 2px;
padding: 4px 18px;
}
.tabbed-nav a.active {
border: 1px solid #bbb;
border-bottom: 1px solid transparent;
}
.columns {
display: grid;
grid-template-columns: auto 1fr;
grid-gap: 12px;
}
input {
font-size: 14px;
height: 34px;
padding: 0 10px;
border-color: #bbb;
}
select {
-webkit-appearance: none;
display: inline-block;
font-size: 13px;
font-weight: 500;
padding: 8px 30px 8px 10px;
max-width: 100%;
border: 1px solid #bbc;
border-radius: 4px;
outline: 0;
background-color: #fff;
background-image: url(data:image/png;base64,your_sha256_hashyour_sha256_hashyour_sha256_hashX4+8lwAAAIxJREFUSInt0TcCwjAQRNFvE5dkwKD7H5WGINsKszWa+r9qoO1ftjqc1B0N2DyDYwNcPX0Ia0Yf2HFx9Y+your_sha256_hash+Jcr9UtT6uaj3U6H0sdD6n1D7j9B76M7jbevo29rgBddTP/7iwZL3AAAAAElFTkSuQmCC);
background-repeat: no-repeat;
background-position: right .7em top 50%, 0 0;
background-size: .65em auto, 100%;
}
.help {
opacity: 0.6;
}
.help.with-icon {
padding-left: 16px;
position: relative;
}
.help.with-icon .fas {
position: absolute;
left: -2px;
top: 1px;
font-size: 11px;
}
input + .help {
margin-top: -8px;
}
.help a {
cursor: pointer;
color: blue;
text-decoration: underline;
}
hr {
border: 0;
border-top: 1px solid #ddd;
margin: 10px 0;
}
.form-actions {
display: flex;
align-items: center;
justify-content: space-between;
}
.fork-dat-progress {
font-size: 14px;
}
`]
}
constructor () {
super()
// internal state
this.driveInfo = null
this.state = STATES.READY
// params
this.cbs = null
this.forks = []
this.base = undefined
this.label = ''
this.title = ''
this.description = ''
this.tags = ''
this.isDetached = false
}
async init (params, cbs) {
// store params
this.cbs = cbs
this.forks = params.forks
this.base = this.forks.find(fork => fork.url === params.url) || this.forks[0]
this.isDetached = params.detached || false
this.isTemplate = params.isTemplate || false
this.label = params.label || ''
await this.requestUpdate()
// fetch drive info
this.driveInfo = await bg.hyperdrive.getInfo(this.base.url)
this.title = typeof params.title === 'string' ? params.title : (this.driveInfo.title || '')
this.description = typeof params.description === 'string' ? params.description : (this.driveInfo.description || '')
this.tags = params.tags ? (Array.isArray(params.tags) ? params.tags.join(' ') : params.tags) : this.driveInfo.tags?.join(' ') || ''
await this.requestUpdate()
this.adjustHeight()
}
updated () {
this.adjustHeight()
}
adjustHeight () {
var height = this.shadowRoot.querySelector('div').clientHeight|0
bg.modals.resizeSelf({height})
}
// rendering
// =
render () {
if (!this.driveInfo) {
return this.renderLoading()
}
var progressEl
var actionBtn
switch (this.state) {
case STATES.READY:
progressEl = html`<div class="fork-dat-progress">Ready to ${this.isDetached ? 'make a copy' : 'fork'}.</div>`
actionBtn = html`<button type="submit" class="btn primary" tabindex="5">${this.isDetached ? 'Copy drive' : 'Create fork'}</button>`
break
case STATES.DOWNLOADING:
progressEl = html`<div class="fork-dat-progress">Downloading remaining files...</div>`
actionBtn = html`<button type="submit" class="btn" disabled tabindex="5"><span class="spinner"></span></button>`
break
case STATES.CLONING:
progressEl = html`<div class="fork-dat-progress">Downloading and copying...</div>`
actionBtn = html`<button type="submit" class="btn" disabled tabindex="5"><span class="spinner"></span></button>`
break
}
const navItem = (v, label) => html`
<a class=${this.isDetached === v ? 'active' : ''} @click=${e => this.onSetDetached(v)}>${label}</a>
`
const baseOpt = (fork) => {
return html`
<option value=${fork.url} ?selected=${this.base === fork}>
${fork.forkOf && fork.forkOf.label ? fork.forkOf.label : 'Original'}
</option>
`
}
return html`
<link rel="stylesheet" href="beaker://assets/font-awesome.css">
<div class="wrapper">
<form @submit=${this.onSubmit}>
${this.isTemplate ? html`
<h1>Create a new drive</h1>
` : html`
<div class="tabbed-nav">
<span></span>
${navItem(false, 'Fork')}
${navItem(true, 'Copy')}
<span class="spacer"></span>
</div>
`}
${this.isDetached ? html`
<p class="help with-icon">
<span class="fas fa-fw fa-info"></span>
${this.isTemplate
? html`
Using
<a @click=${this.onClickTemplate}>${shorten(this.driveInfo.title, 20)}</a>
as a template.
`
: 'Make an independent copy of the drive.'}
</p>
<label for="title">Title</label>
<input autofocus name="title" tabindex="1" value=${this.title || ''} @change=${this.onChangeTitle} required placeholder="Title" />
<label for="desc">Description</label>
<input name="desc" tabindex="2" @change=${this.onChangeDescription} value=${this.description || ''} placeholder="Description (optional)">
<label for="tags">Tags</label>
<input name="tags" tabindex="3" @change=${this.onChangeTags} value=${this.tags || ''} placeholder="Tags (optional, separated by spaces)">
` : html`
<p class="help with-icon"><span class="fas fa-fw fa-info"></span> A fork is a linked copy of the drive which is used for making changes and then merging into the original.</p>
<div class="columns">
<div>
<label for="base">Base</label>
<div style="margin: 5px 0 8px">
<select name="base" tabindex="1" @change=${this.onChangeBase}>
${baseOpt(this.forks[0])}
<optgroup label="Forks">
${repeat(this.forks.slice(1), fork => baseOpt(fork))}
</optgroup>
</select>
</div>
</div>
<div>
<label for="label">Label</label>
<input
name="label"
tabindex="2"
value="${this.label}"
@change=${this.onChangeLabel}
placeholder="e.g. 'dev' or 'my-new-feature'"
autofocus
required
/>
<p class="help">The label will help you identify the fork.</p>
<label for="tags">Tags</label>
<input name="tags" tabindex="3" @change=${this.onChangeTags} value=${this.tags || ''} placeholder="Tags (optional, separated by spaces)">
</div>
</div>
`}
<hr>
<div class="form-actions">
${progressEl}
<div>
<button type="button" class="btn cancel" @click=${this.onClickCancel} tabindex="4">Cancel</button>
${actionBtn}
</div>
</div>
</form>
</div>
`
}
renderLoading () {
return html`
<div class="wrapper">
<div class="loading">Loading...</div>
<form>
<div class="form-actions">
<div></div>
<div>
<button type="button" class="btn cancel" @click=${this.onClickCancel} tabindex="4">Cancel</button>
<button type="submit" class="btn" tabindex="5" disabled>Create</button>
</div>
</div>
</form>
</div>
`
}
// event handlers
// =
onClickTemplate (e) {
bg.beakerBrowser.openUrl(this.driveInfo.url, {setActive: true})
}
onSetDetached (v) {
this.isDetached = v
}
async onChangeBase (e) {
this.base = this.forks.find(fork => fork.url === e.currentTarget.value)
this.driveInfo = await bg.hyperdrive.getInfo(this.base.url)
this.requestUpdate()
}
onChangeLabel (e) {
this.label = e.target.value
}
onChangeTitle (e) {
this.title = e.target.value
}
onChangeDescription (e) {
this.description = e.target.value
}
onChangeTags (e) {
this.tags = e.target.value
}
onClickCancel (e) {
e.preventDefault()
this.cbs.reject(new Error('Canceled'))
}
async onSubmit (e) {
e.preventDefault()
if (this.isDetached) {
if (!this.title.trim()) return
} else {
if (!this.label.trim()) return
}
// this.state = STATES.DOWNLOADING
// await bg.hyperdrive.download(this.base.url)
this.state = STATES.CLONING
try {
var url = await bg.hyperdrive.forkDrive(this.base.url, {
detached: this.isDetached,
title: this.isDetached ? this.title : this.driveInfo.title,
description: this.isDetached ? this.description : this.driveInfo.description,
tags: this.tags.split(' '),
label: this.label,
prompt: false
})
this.cbs.resolve({url})
} catch (e) {
this.cbs.reject(e.message || e.toString())
}
}
}
customElements.define('fork-drive-modal', ForkDriveModal)
``` |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.