text stringlengths 1 22.8M |
|---|
```smalltalk
//
//
// Permission is hereby granted, free of charge, to any person obtaining
// a copy of this software and associated documentation files (the
// "Software"), to deal in the Software without restriction, including
// without limitation the rights to use, copy, modify, merge, publish,
// distribute, sublicense, and/or sell copies of the Software, and to
// permit persons to whom the Software is furnished to do so, subject to
// the following conditions:
//
// The above copyright notice and this permission notice shall be
// included in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
// NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
// LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
// OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
// WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
using System;
using System.Collections;
using System.Collections.Generic;
using System.ComponentModel;
using System.Linq;
using System.Reflection;
using NUnit.Framework;
#if PCL
using System.Windows.Markup;
using System.Xaml;
using System.Xaml.Schema;
#else
using System.Windows.Markup;
using System.Xaml;
using System.Xaml.Schema;
#endif
using Category = NUnit.Framework.CategoryAttribute;
namespace MonoTests.System.Windows.Markup
{
[TestFixture]
public class ReferenceTest
{
[Test]
public void ConstructorNullName ()
{
new Reference ((string) null); // it is somehow allowed
}
[Test]
public void ProvideValueWithoutTypeOrName ()
{
var reference = new Reference ();
Assert.Throws<ArgumentNullException> (() => reference.ProvideValue (null));
}
[Test]
public void ProvideValueWithNameWithoutResolver ()
{
var x = new Reference ("X");
Assert.Throws<ArgumentNullException> (() => x.ProvideValue (null)); // serviceProvider is required.
}
[Test]
public void ProvideValueWithNameWithProviderNoResolver ()
{
var x = new Reference ("X");
Assert.Throws<InvalidOperationException> (() => x.ProvideValue (new NameServiceProvider (false, false)));
}
[Test]
public void ProvideValueWithNameWithProviderResolveFail ()
{
var x = new Reference ("X");
var r = new NameServiceProvider (true, false);
Assert.AreEqual ("BAR", x.ProvideValue (r), "#1");
}
[Test]
public void ProvideValueWithNameWithProviderResolveSuccess ()
{
var x = new Reference ("Y");
var r = new NameServiceProvider (true, true);
Assert.AreEqual ("FOO", x.ProvideValue (r), "#1");
}
class NameServiceProvider : IServiceProvider
{
Resolver resolver;
public NameServiceProvider (bool worksFine, bool resolvesFine)
{
resolver = worksFine ? new Resolver (resolvesFine) : null;
}
public object GetService (Type serviceType)
{
Assert.AreEqual (typeof (IXamlNameResolver), serviceType, "TypeToResolve");
return resolver;
}
}
class Resolver : IXamlNameResolver
{
bool resolves;
public Resolver (bool resolvesFine)
{
resolves = resolvesFine;
}
public IEnumerable<KeyValuePair<string, object>> GetAllNamesAndValuesInScope ()
{
throw new Exception ();
}
public object GetFixupToken (IEnumerable<string> names)
{
throw new NotImplementedException ();
}
// only X (which 'failed' to resolve) calls this
public object GetFixupToken (IEnumerable<string> names, bool canAssignDirectly)
{
Assert.IsTrue (canAssignDirectly, "canAssignDirectly");
Assert.AreEqual (1, names.Count (), "Count");
Assert.AreEqual ("X", names.First (), "name0");
return "BAR";
}
public bool IsFixupTokenAvailable {
get { throw new NotImplementedException (); }
}
#pragma warning disable 67
public event EventHandler OnNameScopeInitializationComplete;
#pragma warning restore 67
// both X and Y calls this.
public object Resolve (string name)
{
return resolves ? "FOO" : null;
}
public object Resolve (string name, out bool isFullyInitialized)
{
throw new NotImplementedException ();
}
}
}
}
``` |
Rob Mokaraka is a New Zealand playwright and actor. He affiliates to Ngāpuhi and Ngāi Tūhoe.
He has been part of the performing group The Māori Sidesteps. In 2006 he played Taneatua in the Taki Rua production of Hone Kouka's Nga Tangata Toa at Downstage Theatre in Wellington. In 2012 he starred in the televised version of Briar Grace-Smith's play Purapurawhetu.
Strange Resting Places is a stage play co-written with Paolo Rotondo, produced by Taki Rua Productions and based on family stories of the Māori Battalion in Italy in World War II. Strange Resting Places was performed for over nine years and been published by Playmarket. It was also the opening feature-length episode of the six-part television series Atamira. It aired on Māori TV on 25 April 2012 at 8.30pm.
In July 2009 Mokaraka was struggling with his mental health and attempted "suicide-by-cop", an experience which he survived. He used this as the basis for a play, Shot Bro: Confessions of a Depressed Bullet, which he toured around community venues in Aotearoa New Zealand for three years, 2017–2020. Shot Bro was in the Tahi Festival in 2019. The documentary Shot Bro, aired on Māori TV on 7 June 2020, describes his attempts to heal from depression and to help others dealing with depression and loss.
Awards
Mokaraka won the Best Newcomer Chapman Tripp acting award for his 2001 play Have Car, Will Travel.
Mokaraka and Rotondo jointly won the Peter Harcourt Award for Outstanding New Playwright of the Year at the Chapman Tripp Theatre Awards in 2007, for Strange Resting Places.
References
New Zealand male Māori actors
New Zealand male dramatists and playwrights
Ngāpuhi people
Ngāi Tūhoe people
Living people
Year of birth missing (living people) |
A two-dimensional conformal field theory is a quantum field theory on a Euclidean two-dimensional space, that is invariant under local conformal transformations.
In contrast to other types of conformal field theories, two-dimensional conformal field theories have infinite-dimensional symmetry algebras. In some cases, this allows them to be solved exactly, using the conformal bootstrap method.
Notable two-dimensional conformal field theories include minimal models, Liouville theory, massless free bosonic theories, Wess–Zumino–Witten models, and certain sigma models.
Basic structures
Geometry
Two-dimensional conformal field theories (CFTs) are defined on Riemann surfaces, where local conformal maps are holomorphic functions.
While a CFT might conceivably exist only on a given Riemann surface, its existence on any surface other than the sphere implies its existence on all surfaces.
Given a CFT, it is indeed possible to glue two Riemann surfaces where it exists, and obtain the CFT on the glued surface.
On the other hand, some CFTs exist only on the sphere.
Unless stated otherwise, we consider CFT on the sphere in this article.
Symmetries and integrability
Given a local complex coordinate , the real vector space of infinitesimal conformal maps
has the basis , with . (For example, and generate translations.) Relaxing the assumption that is the complex conjugate of , i.e. complexifying the space of infinitesimal conformal maps, one obtains a complex vector space with the basis .
With their natural commutators,
the differential operators generate a Witt algebra.
By standard quantum-mechanical arguments, the symmetry algebra of conformal field theory must be the central extension of the Witt algebra, i.e. the Virasoro algebra, whose generators are , plus a central generator. In a given CFT, the central generator takes a constant value , called the central charge.
The symmetry algebra is therefore the product of two copies of the Virasoro algebra: the left-moving or holomorphic algebra, with generators , and the right-moving or antiholomorphic algebra, with generators .
In the universal enveloping algebra of the Virasoro algebra, it is possible to construct an infinite set of mutually commuting charges. The first charge is , the second charge is quadratic in the Virasoro generators, the third charge is cubic, and so on. This shows that any two-dimensional conformal field theory is also a quantum integrable system.
Space of states
The space of states, also called the spectrum, of a CFT, is a representation of the product of the two Virasoro algebras.
For a state that is an eigenvector of and with the eigenvalues and ,
is the left conformal dimension,
is the right conformal dimension,
is the total conformal dimension or the energy,
is the conformal spin.
A CFT is called rational if its space of states decomposes into finitely many irreducible representations of the product of the two Virasoro algebras.
A CFT is called diagonal if its space of states is a direct sum of representations of the type , where is an indecomposable representation of the left Virasoro algebra, and is the same representation of the right Virasoro algebra.
The CFT is called unitary if the space of states has a positive definite Hermitian form such that and are self-adjoint, and . This implies in particular that , and that the central charge is real. The space of states is then a Hilbert space. While unitarity is necessary for a CFT to be a proper quantum system with a probabilistic interpretation, many interesting CFTs are nevertheless non-unitary, including minimal models and Liouville theory for most allowed values of the central charge.
Fields and correlation functions
The state-field correspondence is a linear map from the space of states to the space of fields, which commutes with the action of the symmetry algebra.
In particular, the image of a primary state of a lowest weight representation of the Virasoro algebra is a primary field , such that
Descendant fields are obtained from primary fields by acting with creation modes . Degenerate fields correspond to primary states of degenerate representations. For example, the degenerate field obeys , due to the presence of a null vector in the corresponding degenerate representation.
An -point correlation function is a number that depends linearly on fields, denoted as with .
In the path integral formulation of conformal field theory, correlation functions are defined as functional integrals. In the conformal bootstrap approach, correlation functions are defined by axioms. In particular, it is assumed that there exists an operator product expansion (OPE),
where is a basis of the space of states, and the numbers are called OPE coefficients. Moreover, correlation functions are assumed to be invariant under permutations on the fields, in other words the OPE is assumed to be associative and commutative. (OPE commutativity does not imply that OPE coefficients are invariant under , because expanding on fields breaks that symmetry.)
OPE commutativity implies that primary fields have integer conformal spins . A primary field with zero conformal spin is called a diagonal field.
There also exist fermionic CFTs that include fermionic fields with half-integer conformal spins
, which anticommute.
There also exist parafermionic CFTs that include fields with more general rational spins . Not only parafermions do not commute, but also their correlation functions are multivalued.
The torus partition function is a particular correlation function that depends solely on the spectrum , and not on the OPE coefficients. For a complex torus with modulus , the partition function is
where . The torus partition function coincides with the character of the spectrum, considered as a representation of the symmetry algebra.
Chiral conformal field theory
In a two-dimensional conformal field theory, properties are called chiral if they follow from the action of one of the two Virasoro algebras. If the space of states can be decomposed into factorized representations of the product of the two Virasoro algebras, then all consequences of conformal symmetry are chiral. In other words, the actions of the two Virasoro algebras can be studied separately.
Energy–momentum tensor
The dependence of a field on its position is assumed to be determined by
It follows that the OPE
defines a locally holomorphic field that does not depend on This field is identified with (a component of) the energy–momentum tensor. In particular, the OPE of the energy–momentum tensor with a primary field is
The OPE of the energy–momentum tensor with itself is
where is the central charge. (This OPE is equivalent to the commutation relations of the Virasoro algebra.)
Conformal Ward identities
Conformal Ward identities are linear equations that correlation functions obey as a consequence of conformal symmetry. They can be derived by studying correlation functions that involve insertions of the energy–momentum tensor. Their solutions are conformal blocks.
For example, consider conformal Ward identities on the sphere. Let be a global complex coordinate on the sphere, viewed as Holomorphy of the energy–momentum tensor at is equivalent to
Moreover, inserting in an -point function of primary fields yields
From the last two equations, it is possible to deduce local Ward identities that express -point functions of descendant fields in terms of -point functions of primary fields. Moreover, it is possible to deduce three differential equations for any -point function of primary fields, called global conformal Ward identities:
These identities determine how two- and three-point functions depend on
where the undetermined proportionality coefficients are functions of
BPZ equations
A correlation function that involves a degenerate field satisfies a linear partial differential equation called a Belavin–Polyakov–Zamolodchikov equation after Alexander Belavin, Alexander Polyakov and Alexander Zamolodchikov. The order of this equation is the level of the null vector in the corresponding degenerate representation.
A trivial example is the order one BPZ equation
which follows from
The first nontrivial example involves a degenerate field with a vanishing null vector at the level two,
where is related to the central charge by
Then an -point function of and other primary fields obeys:
A BPZ equation of order for a correlation function that involve the degenerate field can be deduced from the vanishing of the null vector, and the local Ward identities. Thanks to global Ward identities, four-point functions can be written in terms of one variable instead of four, and BPZ equations for four-point functions can be reduced to ordinary differential equations.
Fusion rules
In an OPE that involves a degenerate field, the vanishing of the null vector (plus conformal symmetry) constrains which primary fields can appear. The resulting constraints are called fusion rules. Using the momentum such that
instead of the conformal dimension for parametrizing primary fields, the fusion rules are
in particular
Alternatively, fusion rules have an algebraic definition in terms of an associative fusion product of representations of the Virasoro algebra at a given central charge. The fusion product differs from the tensor product of representations. (In a tensor product, the central charges add.) In certain finite cases, this leads to the structure of a fusion category.
A conformal field theory is quasi-rational is the fusion product of two indecomposable representations is a sum of finitely many indecomposable representations. For example, generalized minimal models are quasi-rational without being rational.
Conformal bootstrap
The conformal bootstrap method consists in defining and solving CFTs using only symmetry and consistency assumptions, by reducing all correlation functions to combinations of structure constants and conformal blocks.
In two dimensions, this method leads to exact solutions of certain CFTs, and to classifications of rational theories.
Structure constants
Let be a left- and right-primary field with left- and right-conformal dimensions and . According to the left and right global Ward identities, three-point functions of such fields are of the type
where the -independent number is called a three-point structure constant. For the three-point function to be single-valued, the left- and right-conformal dimensions of primary fields must obey
This condition is satisfied by bosonic () and fermionic () fields. It is however violated by parafermionic fields (), whose correlation functions are therefore not single-valued on the Riemann sphere.
Three-point structure constants also appear in OPEs,
The contributions of descendant fields, denoted by the dots, are completely determined by conformal symmetry.
Conformal blocks
Any correlation function can be written as a linear combination of conformal blocks: functions that are determined by conformal symmetry, and labelled by representations of the symmetry algebra. The coefficients of the linear combination are products of structure constants.
In two-dimensional CFT, the symmetry algebra is factorized into two copies of the Virasoro algebra, and a conformal block that involves primary fields has a holomorphic factorization: it is a product of a locally holomorphic factor that is determined by the left-moving Virasoro algebra, and a locally antiholomorphic factor that is determined by the right-moving Virasoro algebra. These factors are themselves called conformal blocks.
For example, using the OPE of the first two fields in a four-point function of primary fields yields
where is an s-channel four-point conformal block. Four-point conformal blocks are complicated functions that can be efficiently computed using Alexei Zamolodchikov's recursion relations. If one of the four fields is degenerate, then the corresponding conformal blocks obey BPZ equations. If in particular one the four fields is , then the corresponding conformal blocks can be written in terms of the hypergeometric function.
As first explained by Witten, the space of conformal blocks of a two-dimensional CFT can be identified with the quantum Hilbert space of a 2+1 dimensional Chern-Simons theory, which is an example of a topological field theory. This connection has been very fruitful in the theory of the fractional quantum Hall effect.
Conformal bootstrap equations
When a correlation function can be written in terms of conformal blocks in several different ways, the equality of the resulting expressions provides constraints on the space of states and on three-point structure constants. These constraints are called the conformal bootstrap equations. While the Ward identities are linear equations for correlation functions, the conformal bootstrap equations depend non-linearly on the three-point structure constants.
For example, a four-point function can be written in terms of conformal blocks in three inequivalent ways, corresponding to using the OPEs (s-channel), (t-channel) or (u-channel). The equality of the three resulting expressions is called crossing symmetry of the four-point function, and is equivalent to the associativity of the OPE.
For example, the torus partition function is invariant under the action of the modular group on the modulus of the torus, equivalently . This invariance is a constraint on the space of states. The study of modular invariant torus partition functions is sometimes called the modular bootstrap.
The consistency of a CFT on the sphere is equivalent to crossing symmetry of the four-point function. The consistency of a CFT on all Riemann surfaces also requires modular invariance of the torus one-point function. Modular invariance of the torus partition function is therefore neither necessary, nor sufficient, for a CFT to exist. It has however been widely studied in rational CFTs, because characters of representations are simpler than other kinds of conformal blocks, such as sphere four-point conformal blocks.
Examples
Minimal models
A minimal model is a CFT whose spectrum is built from finitely many irreducible representations of the Virasoro algebra. Minimal models only exist for particular values of the central charge,
There is an ADE classification of minimal models. In particular, the A-series minimal model with the central charge is a diagonal CFT whose spectrum is built from degenerate lowest weight representations of the Virasoro algebra. These degenerate representations are labelled by pairs of integers that form the Kac table,
For example, the A-series minimal model with describes spin and energy correlators of the two-dimensional critical Ising model.
Liouville theory
For any Liouville theory is a diagonal CFT whose spectrum is built from Verma modules with conformal dimensions
Liouville theory has been solved, in the sense that its three-point structure constants are explicitly known. Liouville theory has applications to string theory, and to two-dimensional quantum gravity.
Extended symmetry algebras
In some CFTs, the symmetry algebra is not just the Virasoro algebra, but an associative algebra (i.e. not necessarily a Lie algebra) that contains the Virasoro algebra. The spectrum is then decomposed into representations of that algebra, and the notions of diagonal and rational CFTs are defined with respect to that algebra.
Massless free bosonic theories
In two dimensions, massless free bosonic theories are conformally invariant. Their symmetry algebra is the affine Lie algebra built from the abelian, rank one Lie algebra. The fusion product of any two representations of this symmetry algebra yields only one representation, and this makes correlation functions very simple.
Viewing minimal models and Liouville theory as perturbed free bosonic theories leads to the Coulomb gas method for computing their correlation functions. Moreover, for there is a one-parameter family of free bosonic theories with infinite discrete spectrums, which describe compactified free bosons, with the parameter being the compactification radius.
Wess–Zumino–Witten models
Given a Lie group the corresponding Wess–Zumino–Witten model is a CFT whose symmetry algebra is the affine Lie algebra built from the Lie algebra of If is compact, then this CFT is rational, its central charge takes discrete values, and its spectrum is known.
Superconformal field theories
The symmetry algebra of a supersymmetric CFT is a super Virasoro algebra, or a larger algebra. Supersymmetric CFTs are in particular relevant to superstring theory.
Theories based on W-algebras
W-algebras are natural extensions of the Virasoro algebra. CFTs based on W-algebras include generalizations of minimal models and Liouville theory, respectively called W-minimal models and conformal Toda theories. Conformal Toda theories are more complicated than Liouville theory, and less well understood.
Sigma models
In two dimensions, classical sigma models are conformally invariant, but only some target manifolds lead to quantum sigma models that are conformally invariant. Examples of such target manifolds include toruses, and Calabi–Yau manifolds.
Logarithmic conformal field theories
Logarithmic conformal field theories are two-dimensional CFTs such that the action of the Virasoro algebra generator on the spectrum is not diagonalizable. In particular, the spectrum cannot be built solely from lowest weight representations. As a consequence, the dependence of correlation functions on the positions of the fields can be logarithmic. This contrasts with the power-like dependence of the two- and three-point functions that are associated to lowest weight representations.
Critical Q-state Potts model
The critical -state Potts model or critical random cluster model is a conformal field theory that generalizes and unifies the critical Ising model, Potts model, and percolation. The model has a parameter , which must be integer in the Potts model, but which can take any complex value in the random cluster model. This parameter is related to the central charge by
Special values of include:
The known torus partition function suggests that the model is non-rational with a discrete spectrum.
References
Further reading
P. Di Francesco, P. Mathieu, and D. Sénéchal, Conformal Field Theory, Springer-Verlag, New York, 1997. .
Conformal Field Theory page in String Theory Wiki lists books and reviews.
Conformal field theory |
Konstancja Czartoryska may refer to:
Konstancja Czartoryska (1700–1759), Polish noblewoman
Konstancja Czartoryska (1729–1749), Polish noblewoman, daughter of Michał Fryderyk Czartoryski
Konstancja Czartoryska (1742–1797), Polish noblewoman, mother of Stanisław Kostka Zamoyski |
KOSO (92.9 FM) is a commercial radio station licensed to Patterson, California, and serving the Modesto metropolitan area. The station carries a country radio format and is owned by iHeartMedia, Inc. Its studios and offices are in Modesto. On weekdays, KOSO, known as "The Big Dog," carries the nationally syndicated Bobby Bones Show in morning drive time and CMT Nights with Cody Alan overnight.
KOSO has an effective radiated power (ERP) of 3,000 watts and is a Class A station. The transmitter is off West Hatch Road in Riverdale Park, California, near the Tuolumne River. (The tower was originally near Mount Oso, from which it got its call sign KOSO.) KOSO broadcasts in the HD Radio hybrid format. The HD2 subchannel carried a Top 40 format known as "M Style Radio," but that programming has since been discontinued with the HD2 subchannel being turned off.
History
On June 8, 1966, KOSO signed on the air. It originally broadcast on 93.1 MHz and was powered at 1,100 watts. It was owned by the Sierra-Pacific Radio Corporation, with studios and offices in Modesto.
The station previously had an adult contemporary format and was branded as "KO93". The mainstream AC format continued until the summer of 1995, when the station was rebranded as "B93". As a result, the station shifted to a hot AC format.
In 1997, B93 began to transition towards a modern AC format, adding more alternative rock-leaning artists such as Alanis Morissette, Counting Crows, Gin Blossoms, and The Cranberries to its playlist.
In 2000, Clear Channel Communications, the forerunner to today's iHeartMedia, acquired KOSO. Clear Channel needed the station to bring a "move-in station" to the Sacramento radio market.
On June 1, 2009, at midnight, KOSO moved from 93.1 MHz to 92.9 MHz as a result of the start of 93.1 FM KHJQ Pollock Pines, near Sacramento, which began broadcasting in June 2009. That station today is KFBK-FM, co-owned with KOSO.
On October 2, 2012, KOSO shifted its format to Hot AC, branded as "Radio 92.9". On March 2, 2015, KOSO returned to its "B93" branding.
On July 1, 2016, at 12 noon, KOSO changed its format from hot AC to country music, branded as "92.9 The Big Dog".
References
External links
OSO
Country radio stations in the United States
Modesto, California
Mass media in Stanislaus County, California
Radio stations established in 1961
1961 establishments in California
IHeartMedia radio stations |
Evan Rachel Wood is an American actress and musician. After playing minor roles in several films and television shows, Wood starred in her breakthrough role in Catherine Hardwicke's teen drama Thirteen (2003). Her performance in the film garnered widespread critical acclaim and earned her nominations for the Golden Globe Award for Best Actress in a Motion Picture – Drama, the Screen Actors Guild Award for Outstanding Performance by a Female Actor in a Leading Role, and the Critics' Choice Movie Award for Best Young Performer. Wood starred in the 2011 television adaptation of James M. Cain's Mildred Pierce, which garnered her nominations for the Primetime Emmy Award for Outstanding Supporting Actress in a Limited Series or Movie and the Golden Globe Award for Best Supporting Actress – Series, Miniseries or Television Film.
For portraying Dolores Abernathy in the HBO series Westworld (2016–), based on the film of the same name and sequel of the film, she received two nominations for the Primetime Emmy Award for Outstanding Lead Actress in a Drama Series, the Golden Globe Award for Best Actress – Television Series Drama, and the Saturn Award for Best Supporting Actress on Television, and went on to win the Critics' Choice Television Award for Best Actress in a Drama Series. She also, along with the other Westworld cast members, received a nomination for the Screen Actors Guild Award for Outstanding Performance by an Ensemble in a Drama Series for the first season.
Awards and nominations
References
External links
Wood, Evan Rachel |
John Lamb Murray (1838–1908) was a Scottish architect active in the nineteenth century.
Murray was born near Biggar, South Lanarkshire to a family of the minor landed gentleman. He owned the estates of Heavyside and Stains. He originally trained as a landsurveyor, working for several larger landowners in the area. However he became a self-taught architect and as civil and mechanical engineer, developing specific skills water power and electric lighting. he also had a strong interest in music, buildings a large pipe organ. This was originally installed in his workshop at Heavyside but after he had water power in his house, he re-installed it there.
Murray was the architect of Hartwood Hospital, after the Lanarkshire Lunacy Board set aside the results of a competition to select an architect. The ensuing work kept Murray's business very active until 1895.
In 1896 Murray became a pioneer motorist. He bought a Panhard Levassor and invested in Albion Motors which was established by his son Thomas Blackwood Murray and Norman Fulton.
References
1838 births
1908 deaths
Scottish architects |
Sinopieris davidis is a species of butterfly in the genus Sinopieris, but also possibly in Pontia. It was described by Charles Oberthür in 1876 and is found in China.
Subspecies
Sinopieris davidis davidis (Yunnan, Sichuan)
Sinopieris davidis diluta (Verity, 1911) (Shaanxi)
Sinopieris davidis thibetana (Verity 1907) (Tibet)
References
Pierini
Butterflies described in 1876
Taxa named by Charles Oberthür
Butterflies of Asia |
Aïssatou Boiro (1954 – 2012) was a Guinean civil servant from Koundara. She was assassinated by armed men in Conakry on 9 November 2012. Four of her killers received life sentences in 2019.
Career
Boiro was appointed National Director of the State Treasury of the Republic of Guinea by a decree of President Alpha Condé at the beginning of 2012. Aïssatou Boiro played a decisive role in dismantling a network which held around 13 billion Guinean francs (about 1.5 million euros) in May 2012. A number of employees of the Ministry of Finance, the State Treasury and the Central Bank were arrested.
She was described as a courageous and incorruptible woman of integrity seeking to put an end to corruption in the higher echelons of the state.
Boiro received death threats, but she received no special protection. She had just her driver with her (and no guards) when she was killed.
Response
"She is dead because she refused any compromise between the public interest and the sordid interests of mafia groups," declared Kerfalla Yansané, Minister of Finance.
The assassination of Aïssatou Boiro aroused great emotion in Guinea and the head of state visited her family in person. 13 November 2012 was declared a day of national mourning in her memory.
The assassination also aroused international opinion and condemnations from around the world, including the French ambassador to Guinea, M. Bertrand Cochery, the United States' State Department, the representative of the IMF in Guinea and the representative of the European Union in Guinea.
Human Rights Watch also denounced and condemned the assassination. "The murder of Aïssatou Boiro is more than an individual tragedy... The government should not give in to these acts of intimidation against their anticorruption efforts. This horrible murder should instead demonstrate the necessity of intensifying the conflict against corruption, which has cast a shadow over national development and respect for human rights in Guinea for decades," declared Corinne Dufka, Human Rights Watch's senior researcher for West Africa.
In December 2012, authorities released news of the arrest of two men in the murder because they had her mobile phone and memory stick. In 2016, the U.S. State department noted in their 'Country Reports on Human Rights Practices', that neither suspects had been brought to trial. One of the suspects was released after an employee of the court forged the prosecutor's signature on court documents.
In January 2019 Ibrahima Kalil Diakité closed the case and proposed to pass sentence in February on the ten accused. Six others who were accused were still on the run and vital witnesses had failed to testify. In February, Mohamed Sankhon = Mohamed Léonais, Elhadj Oumar Barry = El-Oumar, Thierno Boucher, Djibril Diallo = Foula Boy were each sentenced for life/30 years for charges including the murder of Boiro, Paul Temple Cole and the attempted murder of Mrs. Cole née Marguérite Seright.
Personal life
Aïssatou Boiro was married to Ibrahima Boiro, professor of biology at the University of Conakry and director of the Centre of Study and Research on the Environment (CERE) and President of the Guinea National Committee for Bioethics. By a Presidential decree of 26 November 2012, Professor Ibrahima Boiro was appointed Minister of the Environment for Lakes and Forests. The couple had four children.
References
People murdered in Guinea
Deaths by firearm in Guinea
Guinean women in politics
1954 births
2012 deaths
21st-century women politicians
Violence against women in Guinea
Assassinated Guinean politicians
2010s assassinated politicians |
```shell
#!/bin/bash
trap 'exit' ERR
curbranch="$(git branch --show-current)"
git reset --hard
git clean -dxf
git checkout gh-pages
git checkout --orphan tmp
git commit -m "vtk.js website"
git branch -D gh-pages
git branch -m gh-pages
git push -f origin gh-pages
git checkout "$curbranch"
``` |
```shell
#!/bin/bash
# credit: "path_to_url"
# under GPL license
##
# Tests if running on windows
#
# @return {bool} If running on windows
##
is_windows() {
command_exists "systeminfo"
}
##
# Add error message formatting to a string, and echo it.
#
# @param {string} message The string to add formatting to.
##
error_message() {
echo -en "\033[31mERROR\033[0m: $1"
}
##
# Add status message formatting to a string, and echo it.
#
# @param {string} message The string to add formatting to.
##
status_message() {
echo -en "\033[32mSTATUS\033[0m: $1"
}
##
# Add formatting to an action string.
#
# @param {string} message The string to add formatting to.
##
action_format() {
echo -en "\033[32m$1\033[0m"
}
##
# Check if the command exists as some sort of executable.
#
# The executable form of the command could be an alias, function, builtin, executable file or shell keyword.
#
# @param {string} command The command to check.
#
# @return {bool} Whether the command exists or not.
##
command_exists() {
type -t "$1" >/dev/null 2>&1
}
``` |
Tom Tom Tomcat is a 1953 Warner Bros. Merrie Melodies animated short directed by Friz Freleng. The short was released on June 27, 1953, and stars Tweety and Sylvester.
Plot
In the Wild West, Granny and Tweety are riding through the desert in their wagon and singing "Oh! Susanna", when they are ambushed by a large group of "puddy tats" as Indians (many of whom appear to be clones of Sylvester). They flee to a deserted fort, where Granny begins to shoot them down while Tweety counts ("Ten Little Indians"). The tenth one nearly takes Tweety, but is struck down by Granny just in time.
More attempts include an archer and a battering ram, both foiled. One archer almost drags Tweety out again ("Granny! Help! A Mohican got me!") but Granny surprises him with a bomb instead. The cats' attempts continue like this, all of them backfiring or being foiled; usually the cats are blown up or shot. In one instance, Chief Rain-In-The-P-P-Puss orders the actual Sylvester to sneak into the fort; Sylvester emerges later with the top of his head having been scalped off by Granny ("Ya got any more bright ideas?").
Finally, Granny and Tweety disguise themselves as a fellow Indian, and lead the cats into the powder house. When one asks for a match, they kindly oblige, and the powder house explodes, causing all the cats to erupt into the sky and then fall. "Oh my goodness," Tweety comments, "it's raining putty cats!"
See also
List of cartoons featuring Sylvester
References
External links
1953 films
1953 short films
1953 comedy films
1953 animated films
1950s Western (genre) comedy films
1950s Warner Bros. animated short films
Merrie Melodies short films
Sylvester the Cat films
Tweety films
Animated films about Native Americans
Films set in 1890
Short films directed by Friz Freleng
Films scored by Carl Stalling
Warner Bros. Cartoons animated short films
1950s English-language films
Animated films set in deserts
Animated films set in the 1890s |
D-sharp minor is a minor scale based on D, consisting of the pitches D, E, F, G, A, B, and C. Its key signature has six sharps.
Its relative major is F-sharp major (or enharmonically G-flat major). Its parallel major, D-sharp major, is usually replaced by E-flat major, since D-sharp major's two double-sharps make it impractical to use. Its enharmonic equivalent, E-flat minor, has the same number of flats.
The D-sharp natural minor scale is:
Changes needed for the melodic and harmonic versions of the scale are written in with accidentals as necessary. The D-sharp harmonic minor and melodic minor scales are:
Scale Degree Chords
Tonic - D-sharp minor
Supertonic - E-sharp diminished
Mediant - F-sharp major
Subdominant - G-sharp minor
Dominant - A-sharp minor
Submediant - B major
Subtonic - C-sharp major
Music in D-sharp minor
D-sharp minor is infrequently used as the principal key of pieces in the Classical era. More common is notation in E-flat minor, which is a relatively manageable key for many brass instruments and woodwinds. In the 24 canonic keys, most of the composers preferred E-flat minor, while Johann Sebastian Bach, Sergei Lyapunov, and Manuel Ponce preferred D-sharp minor.
From Bach's The Well-Tempered Clavier, the eighth fugue from Book 1 and the eighth prelude and fugue from Book 2 are in D-sharp minor; both fugues end with a Picardy third, requiring an F in the final D-sharp major chord.
The second of Lyapunov's 12 Transcendental Études ("Ronde des Fantômes") is also in D-sharp minor.
Alexander Scriabin's Etude Op. 8, No. 12 is in this key, perhaps the most famous example.
The second movement from Charles-Valentin Alkan's Grande sonate 'Les quatre âges', subtitled Quasi-Faust, is also in D-sharp minor (but ends in F-sharp major), and modulates into even sharper keys along the way, some even being theoretical keys, such as G-sharp major and D-sharp major.
In a few scores, 6-sharp key signatures in the bass clef are written with the sharp for the A on the top line.
Despite the key rarely being used in orchestral music other than to modulate, it is not entirely uncommon in keyboard music. For orchestration of piano music, some theorists recommend transposing the music to D minor or E minor. If D-sharp minor must absolutely be used, one should take care that B wind instruments be notated in F minor, rather than E-sharp minor (or G instruments used instead, giving a transposed key of G-sharp minor), and B instruments in E minor, in order to avoid double sharps in key signatures. Meanwhile, the E horns would have parts written with a B minor key signature.
References
External links
Musical keys
Minor scales |
```c++
path_to_url
Unless required by applicable law or agreed to in writing, software
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#include "paddle/phi/api/profiler/device_tracer.h"
#include <deque>
#include <forward_list>
#include <fstream>
#include <mutex> // NOLINT
#include <string>
#include <thread> // NOLINT
#include "glog/logging.h"
#include "paddle/common/flags.h"
#include "paddle/phi/core/enforce.h"
PHI_DECLARE_bool(enable_host_event_recorder_hook);
namespace phi {
// Used only by DeviceTracer
uint64_t GetThreadIdFromSystemThreadId(uint32_t id);
namespace {
// Tracking the nested block stacks of each thread.
#ifdef PADDLE_WITH_SW
// sw not supported thread_local
std::deque<int> block_id_stack;
std::deque<Event *> annotation_stack;
#else
// Tracking the nested event stacks.
thread_local std::deque<int> block_id_stack;
// Tracking the nested event stacks.
thread_local std::deque<Event *> annotation_stack;
#endif
// stack to store event such as pe and so on
static std::deque<Event *> main_thread_annotation_stack{};
static std::deque<std::string> main_thread_annotation_stack_name{};
std::map<uint32_t, uint64_t> system_thread_id_map;
std::mutex system_thread_id_map_mutex;
std::once_flag tracer_once_flag;
DeviceTracer *tracer = nullptr;
void PrintCuptiHint() {
static bool showed = false;
if (showed) return;
showed = true;
LOG(WARNING) << "Invalid timestamp occurred. Please try increasing the "
"FLAGS_multiple_of_cupti_buffer_size.";
}
} // namespace
#ifdef PADDLE_WITH_CUPTI
namespace {
// The experimental best performance is
// the same size with CUPTI device buffer size(8M)
uint64_t kBufSize = 1024 * 1024 * 8;
uint64_t kAlignSize = 8;
std::unordered_map<CUpti_CallbackId, std::string> runtime_cbid_str,
driver_cbid_str;
#define ALIGN_BUFFER(buffer, align) \
(((uintptr_t)(buffer) & ((align)-1)) \
? ((buffer) + (align) - ((uintptr_t)(buffer) & ((align)-1))) \
: (buffer))
#define CUPTI_CALL(call) \
do { \
CUptiResult _status = call; \
if (_status != CUPTI_SUCCESS) { \
const char *errstr; \
dynload::cuptiGetResultString(_status, &errstr); \
fprintf(stderr, \
"%s:%d: error: function %s failed with error %s.\n", \
__FILE__, \
__LINE__, \
#call, \
errstr); \
exit(-1); \
} \
} while (0)
std::string MemcpyKind(CUpti_ActivityMemcpyKind kind) {
switch (kind) {
case CUPTI_ACTIVITY_MEMCPY_KIND_HTOD:
return "MEMCPY_HtoD";
case CUPTI_ACTIVITY_MEMCPY_KIND_DTOH:
return "MEMCPY_DtoH";
case CUPTI_ACTIVITY_MEMCPY_KIND_HTOA:
return "MEMCPY_HtoA";
case CUPTI_ACTIVITY_MEMCPY_KIND_ATOH:
return "MEMCPY_AtoH";
case CUPTI_ACTIVITY_MEMCPY_KIND_ATOA:
return "MEMCPY_AtoA";
case CUPTI_ACTIVITY_MEMCPY_KIND_ATOD:
return "MEMCPY_AtoD";
case CUPTI_ACTIVITY_MEMCPY_KIND_DTOA:
return "MEMCPY_DtoA";
case CUPTI_ACTIVITY_MEMCPY_KIND_DTOD:
return "MEMCPY_DtoD";
case CUPTI_ACTIVITY_MEMCPY_KIND_HTOH:
return "MEMCPY_HtoH";
case CUPTI_ACTIVITY_MEMCPY_KIND_PTOP:
return "MEMCPY_PtoP";
case CUPTI_ACTIVITY_MEMCPY_KIND_FORCE_INT:
return "MEMCPY_FORCE_INT";
default:
break;
}
return "MEMCPY";
}
std::string DriverKind(CUpti_CallbackId cbid) {
auto iter = driver_cbid_str.find(cbid);
if (iter == driver_cbid_str.end())
return "Driver API " + std::to_string(cbid);
return iter->second;
}
std::string RuntimeKind(CUpti_CallbackId cbid) {
auto iter = runtime_cbid_str.find(cbid);
if (iter == runtime_cbid_str.end())
return "Runtime API " + std::to_string(cbid);
return iter->second;
}
void EnableActivity() {
// Device activity record is created when CUDA initializes, so we
// want to enable it before cuInit() or any CUDA runtime call.
CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_MEMCPY));
CUPTI_CALL(
dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_CONCURRENT_KERNEL));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_KERNEL));
CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_DRIVER));
CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_RUNTIME));
// We don't track these activities for now.
CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_MEMSET));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_OVERHEAD));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_DEVICE));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_CONTEXT));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_DRIVER));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_RUNTIME));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_NAME));
// CUPTI_CALL(dynload::cuptiActivityEnable(CUPTI_ACTIVITY_KIND_MARKER));
}
void DisableActivity() {
CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_MEMCPY));
CUPTI_CALL(
dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_CONCURRENT_KERNEL));
// CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_DEVICE));
// Disable all other activity record kinds.
// CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_CONTEXT));
CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_DRIVER));
CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_RUNTIME));
CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_MEMSET));
// CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_NAME));
// CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_MARKER));
// CUPTI_CALL(dynload::cuptiActivityDisable(CUPTI_ACTIVITY_KIND_OVERHEAD));
}
void CUPTIAPI bufferRequested(uint8_t **buffer,
size_t *size,
size_t *maxNumRecords) {
uint8_t *buf = reinterpret_cast<uint8_t *>(malloc(kBufSize + kAlignSize));
*size = kBufSize;
*buffer = ALIGN_BUFFER(buf, kAlignSize);
*maxNumRecords = 0;
}
void CUPTIAPI bufferCompleted(CUcontext ctx,
uint32_t streamId,
uint8_t *buffer,
size_t size,
size_t validSize) {
static std::thread::id cupti_thread_id(0);
if (cupti_thread_id == std::thread::id(0))
cupti_thread_id = std::this_thread::get_id();
PADDLE_ENFORCE_EQ(
std::this_thread::get_id(),
cupti_thread_id,
errors::PermissionDenied(
"Only one thread is allowed to call bufferCompleted()."));
CUptiResult status;
CUpti_Activity *record = nullptr;
if (validSize > 0) {
do {
status = dynload::cuptiActivityGetNextRecord(buffer, validSize, &record);
if (status == CUPTI_SUCCESS) {
switch (record->kind) {
case CUPTI_ACTIVITY_KIND_KERNEL:
case CUPTI_ACTIVITY_KIND_CONCURRENT_KERNEL: {
#if CUDA_VERSION >= 9000
auto *kernel =
reinterpret_cast<const CUpti_ActivityKernel4 *>(record);
#else
auto *kernel =
reinterpret_cast<const CUpti_ActivityKernel3 *>(record);
#endif
tracer->AddKernelRecords(kernel->name,
kernel->start,
kernel->end,
kernel->deviceId,
kernel->streamId,
kernel->correlationId);
break;
}
case CUPTI_ACTIVITY_KIND_MEMCPY: {
auto *memcpy =
reinterpret_cast<const CUpti_ActivityMemcpy *>(record);
tracer->AddMemRecords(
MemcpyKind(
static_cast<CUpti_ActivityMemcpyKind>(memcpy->copyKind)),
memcpy->start,
memcpy->end,
memcpy->deviceId,
memcpy->streamId,
memcpy->correlationId,
memcpy->bytes);
break;
}
case CUPTI_ACTIVITY_KIND_MEMCPY2: {
auto *memcpy =
reinterpret_cast<const CUpti_ActivityMemcpy2 *>(record);
tracer->AddMemRecords(
MemcpyKind(
static_cast<CUpti_ActivityMemcpyKind>(memcpy->copyKind)),
memcpy->start,
memcpy->end,
memcpy->deviceId,
memcpy->streamId,
memcpy->correlationId,
memcpy->bytes);
break;
}
case CUPTI_ACTIVITY_KIND_MEMSET: {
auto *memset =
reinterpret_cast<const CUpti_ActivityMemset *>(record);
tracer->AddKernelRecords("MEMSET",
memset->start,
memset->end,
memset->deviceId,
memset->streamId,
memset->correlationId);
break;
}
case CUPTI_ACTIVITY_KIND_DRIVER: {
auto *api = reinterpret_cast<const CUpti_ActivityAPI *>(record);
if (api->start != 0 && api->end != 0) {
// -1 device id represents ActiveKind api call
tracer->AddActiveKindRecords(
DriverKind(api->cbid),
api->start,
api->end,
-1,
GetThreadIdFromSystemThreadId(api->threadId),
api->correlationId);
}
break;
}
case CUPTI_ACTIVITY_KIND_RUNTIME: {
auto *api = reinterpret_cast<const CUpti_ActivityAPI *>(record);
if (api->start != 0 && api->end != 0) {
// -1 device id represents ActiveKind api call
tracer->AddActiveKindRecords(
RuntimeKind(api->cbid),
api->start,
api->end,
-1,
GetThreadIdFromSystemThreadId(api->threadId),
api->correlationId);
}
break;
}
default: {
break;
}
}
} else if (status == CUPTI_ERROR_MAX_LIMIT_REACHED) {
// Seems not an error in this case.
break;
} else {
CUPTI_CALL(status);
}
} while (true);
size_t dropped;
CUPTI_CALL(
dynload::cuptiActivityGetNumDroppedRecords(ctx, streamId, &dropped));
if (dropped != 0) {
fprintf(stderr, "Dropped %u activity records\n", (unsigned int)dropped);
PrintCuptiHint();
}
}
free(buffer);
}
void initCuptiCbidStr();
} // namespace
#endif // PADDLE_WITH_CUPTI
class DeviceTracerImpl : public DeviceTracer {
public:
DeviceTracerImpl() : enabled_(false), start_ns_(0), end_ns_(0) {
#ifdef PADDLE_WITH_CUPTI
initCuptiCbidStr();
#endif
}
void AddAnnotation(uint32_t id, Event *event) override {
#ifdef PADDLE_WITH_SW
std::forward_list<std::pair<uint32_t, Event *>> *local_correlations_pairs =
nullptr;
#else
thread_local std::forward_list<std::pair<uint32_t, Event *>>
*local_correlations_pairs = nullptr;
#endif
if (local_correlations_pairs == nullptr) {
std::lock_guard<std::mutex> l(trace_mu_);
correlations_pairs.emplace_front();
local_correlations_pairs = &correlations_pairs.front();
}
local_correlations_pairs->push_front(std::make_pair(id, event));
}
void AddAnnotations(
const std::map<uint64_t, ThreadEvents> &thr_events) override {
for (auto &tmp : active_kind_records_) {
for (const ActiveKindRecord &r : tmp) {
auto iter = thr_events.find(r.thread_id);
if (iter == thr_events.end()) {
VLOG(10) << __func__ << " " << r.name
<< " Missing tid: " << r.thread_id;
continue;
}
const ThreadEvents &evts = iter->second;
auto evt_iter = evts.upper_bound(r.end_ns);
if (evt_iter == evts.end()) {
VLOG(10) << __func__ << " Missing Record " << r.name
<< " tid: " << r.thread_id << " end_ns: " << r.end_ns;
continue;
}
if (evt_iter != evts.begin()) {
auto prev_iter = std::prev(evt_iter);
if (prev_iter->first >= r.end_ns) {
evt_iter = prev_iter;
} else {
VLOG(10) << __func__ << " prev end_ns " << prev_iter->first
<< " end_ns: " << r.end_ns;
}
}
Event *evt = evt_iter->second.first;
uint64_t start_ns = evt_iter->second.second;
if (start_ns > r.start_ns) {
VLOG(10) << __func__ << " Mismatch Record " << r.name
<< " tid: " << r.thread_id << " start_ns: " << r.start_ns
<< " end_ns: " << r.end_ns << ", event " << evt->name()
<< " start_ns: " << start_ns;
continue;
}
VLOG(10) << __func__ << " tid: " << r.thread_id << " Add correlation "
<< r.correlation_id << "<->" << evt->name();
AddAnnotation(r.correlation_id, evt);
}
}
}
void AddCPURecords(const std::string &anno,
uint64_t start_ns,
uint64_t end_ns,
int64_t device_id,
uint64_t thread_id) override {
if (anno.empty()) {
VLOG(1) << "Empty timeline annotation.";
return;
}
#ifdef PADDLE_WITH_SW
std::forward_list<CPURecord> *local_cpu_records_ = nullptr;
#else
thread_local std::forward_list<CPURecord> *local_cpu_records_ = nullptr;
#endif
if (local_cpu_records_ == nullptr) {
std::lock_guard<std::mutex> l(trace_mu_);
cpu_records_.emplace_front();
local_cpu_records_ = &cpu_records_.front();
}
local_cpu_records_->push_front(
CPURecord{anno, start_ns, end_ns, device_id, thread_id});
}
void AddMemRecords(const std::string &name,
uint64_t start_ns,
uint64_t end_ns,
int64_t device_id,
int64_t stream_id,
uint32_t correlation_id,
uint64_t bytes) override {
// 0 means timestamp information could not be collected for the kernel.
if (start_ns == 0 || end_ns == 0 || start_ns == end_ns) {
VLOG(3) << name << " cannot be traced";
PrintCuptiHint();
return;
}
// NOTE(liangdun): lock is not needed, only one thread call this function.
mem_records_.push_front(MemRecord{
name, start_ns, end_ns, device_id, stream_id, correlation_id, bytes});
}
void AddMemInfoRecord(uint64_t start_ns,
uint64_t end_ns,
size_t bytes,
const Place &place,
const std::string &alloc_in,
const std::string &free_in,
uint64_t thread_id) override {
if (0 == start_ns || 0 == end_ns) {
VLOG(3) << alloc_in << ", " << free_in << " Cannot be traced.";
return;
}
#ifdef PADDLE_WITH_SW
std::forward_list<MemInfoRecord> *local_mem_info_record = nullptr;
#else
thread_local std::forward_list<MemInfoRecord> *local_mem_info_record =
nullptr;
#endif
if (local_mem_info_record == nullptr) {
std::lock_guard<std::mutex> l(trace_mu_);
mem_info_record_.emplace_front();
local_mem_info_record = &mem_info_record_.front();
}
local_mem_info_record->emplace_front(MemInfoRecord{
start_ns, end_ns, bytes, place, thread_id, alloc_in, free_in});
}
void AddActiveKindRecords(const std::string &anno,
uint64_t start_ns,
uint64_t end_ns,
int64_t device_id,
uint64_t thread_id,
uint32_t correlation_id) override {
if (anno.empty()) {
VLOG(1) << "Empty timeline annotation.";
return;
}
#ifdef PADDLE_WITH_SW
std::forward_list<ActiveKindRecord> *local_active_kind_records = nullptr;
#else
thread_local std::forward_list<ActiveKindRecord>
*local_active_kind_records = nullptr;
#endif
if (local_active_kind_records == nullptr) {
std::lock_guard<std::mutex> l(trace_mu_);
active_kind_records_.emplace_front();
local_active_kind_records = &active_kind_records_.front();
}
// lock is not needed, only one thread call this function.
local_active_kind_records->push_front(ActiveKindRecord{
anno, start_ns, end_ns, device_id, thread_id, correlation_id});
}
void AddKernelRecords(std::string name,
uint64_t start,
uint64_t end,
int64_t device_id,
int64_t stream_id,
uint32_t correlation_id) override {
// 0 means timestamp information could not be collected for the kernel.
if (start == 0 || end == 0 || start == end) {
VLOG(3) << correlation_id << " cannot be traced";
PrintCuptiHint();
return;
}
// NOTE(liangdun): lock is not needed, only one thread call this function.
kernel_records_.push_front(
KernelRecord{name, start, end, device_id, stream_id, correlation_id});
}
bool IsEnabled() override {
std::lock_guard<std::mutex> l(trace_mu_);
return enabled_;
}
void Enable() override {
std::lock_guard<std::mutex> l(trace_mu_);
if (enabled_) {
return;
}
#ifdef PADDLE_WITH_CUPTI
EnableActivity();
// Register callbacks for buffer requests and completed by CUPTI.
CUPTI_CALL(dynload::cuptiActivityRegisterCallbacks(bufferRequested,
bufferCompleted));
CUptiResult ret;
ret = dynload::cuptiSubscribe(
&subscriber_, static_cast<CUpti_CallbackFunc>(ApiCallback), this);
if (ret == CUPTI_ERROR_MAX_LIMIT_REACHED) {
fprintf(stderr, "CUPTI subcriber limit reached.\n");
} else if (ret != CUPTI_SUCCESS) {
fprintf(stderr, "Failed to create CUPTI subscriber.\n");
}
const std::vector<int> runtime_cbids {
CUPTI_RUNTIME_TRACE_CBID_cudaMemcpy_v3020,
CUPTI_RUNTIME_TRACE_CBID_cudaSetupArgument_v3020,
CUPTI_RUNTIME_TRACE_CBID_cudaMemcpyAsync_v3020,
CUPTI_RUNTIME_TRACE_CBID_cudaMemset_v3020,
CUPTI_RUNTIME_TRACE_CBID_cudaMemsetAsync_v3020,
CUPTI_RUNTIME_TRACE_CBID_cudaLaunch_v3020,
CUPTI_RUNTIME_TRACE_CBID_cudaLaunchKernel_v7000
#if CUDA_VERSION >= 9000
,
CUPTI_RUNTIME_TRACE_CBID_cudaLaunchCooperativeKernel_v9000,
your_sha256_hashv9000
#endif
};
const std::vector<int> driver_cbids{CUPTI_DRIVER_TRACE_CBID_cuLaunch,
CUPTI_DRIVER_TRACE_CBID_cuLaunchGrid,
CUPTI_DRIVER_TRACE_CBID_cuLaunchKernel};
for (auto cbid : runtime_cbids)
CUPTI_CALL(dynload::cuptiEnableCallback(
1, subscriber_, CUPTI_CB_DOMAIN_RUNTIME_API, cbid));
for (auto cbid : driver_cbids)
CUPTI_CALL(dynload::cuptiEnableCallback(
1, subscriber_, CUPTI_CB_DOMAIN_DRIVER_API, cbid));
CUPTI_CALL(dynload::cuptiGetTimestamp(&start_ns_));
#endif // PADDLE_WITH_CUPTI
enabled_ = true;
}
void Reset() override {
#ifdef PADDLE_WITH_CUPTI
CUPTI_CALL(
dynload::cuptiActivityFlushAll(CUPTI_ACTIVITY_FLAG_FLUSH_FORCED));
#endif
std::lock_guard<std::mutex> l(trace_mu_);
kernel_records_.clear();
mem_records_.clear();
correlations_.clear();
for (auto &tmp : correlations_pairs) tmp.clear();
for (auto &tmp : cpu_records_) tmp.clear();
for (auto &tmp : mem_info_record_) tmp.clear();
for (auto &tmp : active_kind_records_) tmp.clear();
}
void GenEventKernelCudaElapsedTime() override {
#ifdef PADDLE_WITH_CUPTI
if (correlations_.empty())
for (auto &tmp : correlations_pairs)
for (auto &pair : tmp) correlations_[pair.first] = pair.second;
for (const KernelRecord &r : kernel_records_) {
auto c = correlations_.find(r.correlation_id);
if (c != correlations_.end() && c->second != nullptr) {
Event *e = c->second;
Event *parent = e->parent();
while (parent) {
parent->AddCudaElapsedTime(r.start_ns, r.end_ns); // NOLINT
parent = parent->parent();
}
e->AddCudaElapsedTime(r.start_ns, r.end_ns); // NOLINT
}
}
for (const auto &r : mem_records_) {
auto c = correlations_.find(r.correlation_id);
if (c != correlations_.end() && c->second != nullptr) {
Event *e = c->second;
Event *parent = e->parent();
while (parent) {
parent->AddCudaElapsedTime(r.start_ns, r.end_ns); // NOLINT
parent = parent->parent();
}
e->AddCudaElapsedTime(r.start_ns, r.end_ns); // NOLINT
}
}
#endif
}
proto::Profile GenProfile(const std::string &profile_path) override {
proto::Profile profile_pb = this->GetProfile();
std::ofstream profile_f;
profile_f.open(profile_path,
std::ios::out | std::ios::trunc | std::ios::binary);
profile_pb.SerializeToOstream(&profile_f);
profile_f.close();
return profile_pb;
}
proto::Profile GetProfile() override {
int miss = 0, find = 0;
std::lock_guard<std::mutex> l(trace_mu_);
proto::Profile profile_pb;
profile_pb.set_start_ns(start_ns_);
profile_pb.set_end_ns(end_ns_);
if (correlations_.empty()) {
for (auto &tmp : correlations_pairs) {
for (auto &pair : tmp) correlations_[pair.first] = pair.second;
}
}
for (const KernelRecord &r : kernel_records_) {
auto *event = profile_pb.add_events();
event->set_type(proto::Event::GPUKernel);
auto c = correlations_.find(r.correlation_id);
if (c != correlations_.end() && c->second != nullptr) {
event->set_name(c->second->name());
event->set_detail_info(c->second->attr());
find++;
} else {
VLOG(10) << __func__ << " Missing Kernel Event: " + r.name;
miss++;
event->set_name(r.name);
}
event->set_start_ns(r.start_ns);
event->set_end_ns(r.end_ns);
event->set_sub_device_id(r.stream_id);
event->set_device_id(r.device_id);
}
VLOG(1) << __func__ << " KernelRecord event miss: " << miss
<< " find: " << find;
for (auto &tmp : cpu_records_) {
for (const CPURecord &r : tmp) {
auto *event = profile_pb.add_events();
event->set_type(proto::Event::CPU);
event->set_name(r.name);
event->set_start_ns(r.start_ns);
event->set_end_ns(r.end_ns);
event->set_sub_device_id(r.thread_id);
event->set_device_id(r.device_id);
}
}
for (auto &tmp : active_kind_records_) {
for (const ActiveKindRecord &r : tmp) {
auto *event = profile_pb.add_events();
event->set_type(proto::Event::CPU);
auto c = correlations_.find(r.correlation_id);
if (c != correlations_.end() && c->second != nullptr) {
event->set_name(c->second->name());
event->set_detail_info(r.name);
} else {
event->set_name(r.name);
}
event->set_start_ns(r.start_ns);
event->set_end_ns(r.end_ns);
event->set_sub_device_id(r.thread_id);
event->set_device_id(r.device_id);
}
}
miss = find = 0;
for (const MemRecord &r : mem_records_) {
auto *event = profile_pb.add_events();
event->set_type(proto::Event::GPUKernel);
auto c = correlations_.find(r.correlation_id);
if (c != correlations_.end() && c->second != nullptr) {
event->set_name(c->second->name());
event->set_detail_info(r.name);
find++;
} else {
miss++;
event->set_name(r.name);
}
event->set_start_ns(r.start_ns);
event->set_end_ns(r.end_ns);
event->set_sub_device_id(r.stream_id);
event->set_device_id(r.device_id);
event->mutable_memcopy()->set_bytes(r.bytes);
}
VLOG(1) << __func__ << " MemRecord event miss: " << miss
<< " find: " << find;
for (auto &tmp : mem_info_record_) {
for (const auto &r : tmp) {
auto *event = profile_pb.add_mem_events();
event->set_device_id(0);
if (r.place.GetType() == phi::AllocationType::CPU) {
event->set_place(proto::MemEvent::CPUPlace);
} else if (r.place.GetType() == phi::AllocationType::GPU) {
event->set_place(proto::MemEvent::CUDAPlace);
event->set_device_id(r.place.GetDeviceId());
} else if (r.place.GetType() == phi::AllocationType::GPUPINNED) {
event->set_place(proto::MemEvent::CUDAPinnedPlace);
} else {
PADDLE_THROW(
errors::Unimplemented("The current place is not supported."));
}
event->set_alloc_in(r.alloc_in);
event->set_free_in(r.free_in);
event->set_start_ns(r.start_ns);
event->set_end_ns(r.end_ns);
event->set_bytes(r.bytes);
event->set_thread_id(r.thread_id);
}
}
return profile_pb;
}
void Disable() override {
#ifdef PADDLE_WITH_CUPTI
// flush might cause additional calls to DeviceTracker.
CUPTI_CALL(
dynload::cuptiActivityFlushAll(CUPTI_ACTIVITY_FLAG_FLUSH_FORCED));
#endif // PADDLE_WITH_CUPTI
std::lock_guard<std::mutex> l(trace_mu_);
#ifdef PADDLE_WITH_CUPTI
DisableActivity();
CUPTI_CALL(dynload::cuptiUnsubscribe(subscriber_));
CUPTI_CALL(dynload::cuptiGetTimestamp(&end_ns_));
#endif // PADDLE_WITH_CUPTI
enabled_ = false;
}
private:
#ifdef PADDLE_WITH_CUPTI
static void CUPTIAPI ApiCallback(void *userdata,
CUpti_CallbackDomain domain,
CUpti_CallbackId cbid,
const void *cbdata) {
if (LIKELY(FLAGS_enable_host_event_recorder_hook)) {
return;
}
auto *cbInfo = reinterpret_cast<const CUpti_CallbackData *>(cbdata);
DeviceTracerImpl *tracer = reinterpret_cast<DeviceTracerImpl *>(userdata);
if (cbInfo->callbackSite == CUPTI_API_ENTER) {
Event *event = CurAnnotation();
tracer->AddAnnotation(cbInfo->correlationId, event);
}
}
CUpti_SubscriberHandle subscriber_;
#endif // PADDLE_WITH_CUPTI
std::mutex trace_mu_;
bool enabled_;
uint64_t start_ns_;
uint64_t end_ns_;
std::forward_list<KernelRecord> kernel_records_;
std::forward_list<MemRecord> mem_records_;
std::forward_list<std::forward_list<CPURecord>> cpu_records_;
std::forward_list<std::forward_list<MemInfoRecord>> mem_info_record_;
std::forward_list<std::forward_list<ActiveKindRecord>> active_kind_records_;
std::forward_list<std::forward_list<std::pair<uint32_t, Event *>>>
correlations_pairs;
std::unordered_map<uint32_t, Event *> correlations_;
};
void CreateTracer(DeviceTracer **t) { *t = new DeviceTracerImpl(); }
DeviceTracer *GetDeviceTracer() {
std::call_once(tracer_once_flag, CreateTracer, &tracer);
return tracer;
}
// In order to record PE time, we add main_thread_annotation_stack
// for all event between PE run, we treat it as PE's child Event,
// so when event is not in same thread of PE event, we need add
// father event(PE::run event) for this event
void SetCurAnnotation(Event *event) {
if (!annotation_stack.empty()) {
event->set_parent(annotation_stack.back());
event->set_name(annotation_stack.back()->name() + "/" + event->name());
}
if (annotation_stack.empty() && !main_thread_annotation_stack.empty() &&
main_thread_annotation_stack.back()->thread_id() != event->thread_id()) {
event->set_parent(main_thread_annotation_stack.back());
event->set_name(main_thread_annotation_stack.back()->name() + "/" +
event->name());
}
annotation_stack.push_back(event);
if (event->role() == EventRole::kSpecial) {
std::string name = event->name();
if (!main_thread_annotation_stack_name.empty()) {
name = main_thread_annotation_stack_name.back() + "/" + event->name();
}
main_thread_annotation_stack_name.push_back(name);
main_thread_annotation_stack.push_back(event);
}
}
void ClearCurAnnotation() {
if (!main_thread_annotation_stack.empty()) {
std::string name = annotation_stack.back()->name();
std::string main_name = main_thread_annotation_stack.back()->name();
int main_name_len = static_cast<int>(main_name.length());
int name_len = static_cast<int>(name.length());
int prefix_len = main_name_len - name_len;
if ((prefix_len > 0 && main_name.at(prefix_len - 1) == '/' &&
name == main_name.substr(prefix_len, name_len)) ||
(name == main_name)) {
main_thread_annotation_stack_name.pop_back();
main_thread_annotation_stack.pop_back();
}
}
annotation_stack.pop_back();
}
Event *CurAnnotation() {
if (annotation_stack.empty()) return nullptr;
return annotation_stack.back();
}
std::string CurAnnotationName() {
if (annotation_stack.empty()) return "Unknown";
return annotation_stack.back()->name();
}
void SetCurBlock(int block_id) { block_id_stack.push_back(block_id); }
void ClearCurBlock() { block_id_stack.pop_back(); }
int BlockDepth() { return static_cast<int>(block_id_stack.size()); }
uint32_t GetCurSystemThreadId() {
std::stringstream ss;
ss << std::this_thread::get_id();
uint32_t id = static_cast<uint32_t>(std::stoull(ss.str()));
return id;
}
void RecordCurThreadId(uint64_t id) {
std::lock_guard<std::mutex> lock(system_thread_id_map_mutex);
auto gid = GetCurSystemThreadId();
system_thread_id_map[gid] = id;
}
uint64_t GetThreadIdFromSystemThreadId(uint32_t id) {
auto it = system_thread_id_map.find(id);
if (it != system_thread_id_map.end()) return it->second;
// return origin id if no event is recorded in this thread.
return static_cast<int32_t>(id);
}
#ifdef PADDLE_WITH_CUPTI
namespace {
void initCuptiCbidStr() {
static bool called = false;
if (called) return;
called = true;
#define REGISTER_RUNTIME_CBID_STR(cbid) \
runtime_cbid_str[CUPTI_RUNTIME_TRACE_CBID_##cbid] = #cbid
REGISTER_RUNTIME_CBID_STR(cudaBindTexture_v3020);
REGISTER_RUNTIME_CBID_STR(cudaConfigureCall_v3020);
REGISTER_RUNTIME_CBID_STR(cudaDeviceGetAttribute_v5000);
REGISTER_RUNTIME_CBID_STR(cudaDeviceGetStreamPriorityRange_v5050);
REGISTER_RUNTIME_CBID_STR(cudaDeviceSynchronize_v3020);
REGISTER_RUNTIME_CBID_STR(cudaDriverGetVersion_v3020);
REGISTER_RUNTIME_CBID_STR(cudaEventCreateWithFlags_v3020);
REGISTER_RUNTIME_CBID_STR(cudaEventDestroy_v3020);
REGISTER_RUNTIME_CBID_STR(cudaEventDestroy_v3020);
REGISTER_RUNTIME_CBID_STR(cudaEventQuery_v3020);
REGISTER_RUNTIME_CBID_STR(cudaEventRecord_v3020);
REGISTER_RUNTIME_CBID_STR(cudaFreeHost_v3020);
REGISTER_RUNTIME_CBID_STR(cudaFree_v3020);
REGISTER_RUNTIME_CBID_STR(cudaFuncGetAttributes_v3020);
REGISTER_RUNTIME_CBID_STR(cudaGetDeviceCount_v3020);
REGISTER_RUNTIME_CBID_STR(cudaGetDeviceProperties_v3020);
REGISTER_RUNTIME_CBID_STR(cudaGetDevice_v3020);
REGISTER_RUNTIME_CBID_STR(cudaGetErrorString_v3020);
REGISTER_RUNTIME_CBID_STR(cudaGetLastError_v3020);
REGISTER_RUNTIME_CBID_STR(cudaHostAlloc_v3020);
REGISTER_RUNTIME_CBID_STR(cudaHostGetDevicePointer_v3020);
REGISTER_RUNTIME_CBID_STR(cudaLaunchKernel_v7000);
REGISTER_RUNTIME_CBID_STR(cudaMallocHost_v3020);
REGISTER_RUNTIME_CBID_STR(cudaMalloc_v3020);
REGISTER_RUNTIME_CBID_STR(cudaMemcpyAsync_v3020);
REGISTER_RUNTIME_CBID_STR(cudaMemcpy_v3020);
REGISTER_RUNTIME_CBID_STR(cudaMemsetAsync_v3020);
REGISTER_RUNTIME_CBID_STR(cudaMemset_v3020);
REGISTER_RUNTIME_CBID_STR(
cudaOccupancyMaxActiveBlocksPerMultiprocessorWithFlags_v7000);
REGISTER_RUNTIME_CBID_STR(cudaPeekAtLastError_v3020);
REGISTER_RUNTIME_CBID_STR(cudaRuntimeGetVersion_v3020);
REGISTER_RUNTIME_CBID_STR(cudaSetDevice_v3020);
REGISTER_RUNTIME_CBID_STR(cudaStreamCreate_v3020);
REGISTER_RUNTIME_CBID_STR(cudaStreamCreateWithFlags_v5000);
REGISTER_RUNTIME_CBID_STR(cudaStreamCreateWithPriority_v5050);
REGISTER_RUNTIME_CBID_STR(cudaStreamDestroy_v5050);
REGISTER_RUNTIME_CBID_STR(cudaStreamSynchronize_v3020);
REGISTER_RUNTIME_CBID_STR(cudaStreamWaitEvent_v3020);
REGISTER_RUNTIME_CBID_STR(cudaUnbindTexture_v3020);
REGISTER_RUNTIME_CBID_STR(cudaSetupArgument_v3020);
REGISTER_RUNTIME_CBID_STR(cudaLaunch_v3020);
REGISTER_RUNTIME_CBID_STR(cudaDeviceGetPCIBusId_v4010);
#if CUDA_VERSION >= 9000
REGISTER_RUNTIME_CBID_STR(cudaLaunchCooperativeKernel_v9000);
REGISTER_RUNTIME_CBID_STR(cudaLaunchCooperativeKernelMultiDevice_v9000);
#endif
#undef REGISTER_RUNTIME_CBID_STR
}
} // namespace
#endif // PADDLE_WITH_CUPTI
} // namespace phi
``` |
Skurgwy is a village in the administrative district of Gmina Rogóźno, within Grudziądz County, Kuyavian-Pomeranian Voivodeship, in north-central Poland. It lies approximately north-west of Rogóźno, north-east of Grudziądz, and north of Toruń.
References
Skurgwy |
is a 1980 Japanese animated science fiction adventure film based on the manga series Doraemon, particularly the first volume of the same name of the Doraemon Long Stories series. The film premiered on 15 March 1980 in Japan. It's the first feature-length Doraemon film.
Plot
Suneo shows a fossil of a dinosaur claw to everyone except Nobita. Being angry, Nobita claims he will be able to find a living dinosaur. As Doraemon refuses to help him, he digs on a hillside, but instead earns punishment from a landlord nearby who forces him to unearth a hole in the ground. He finds an egg-shaped stone underneath and quickly uses a time wrap to return it to its former form, and after warming it, the egg hatches to reveal a plesiosaur (Futabasaurus), who is subsequently named Piisuke by Nobita. Instead of immediately showing it to the others, Nobita waits for it to grow while making a deal with others. However, as Piisuke grows too large, Nobita and Doraemon hide him in the nearby lake. Worried about the risk of Piisuke being found and overwhelmed in having to take care of the dinosaur, Doraemon and Nobita transport him to 100 million years ago in the Late Cretaceous period. They are attacked by a mysterious assailant who previously tried to make a deal with Nobita to sell Piisuke, though they manage to escape. When Gian and Suneo confront Nobita about his claim about his living dinosaur, he runs into Shizuka, but after revealing that even she thinks he's lying, Nobita got furious and brings her, along with Suneo and Gian to his house to show Piisuke. Left with no proof, Nobita instead shows them Piisuke through a television monitor, but realizes that he and Doraemon had unknowingly transported Piisuke to the North American shore after the time machine was attacked by the assailant. They and the others decide to go there, but the time machine is overloaded and crashes off.
The group lands on the North American shore and finds Piisuke, proving Nobita's claim and making his friends apologize to him. Doraemon suggest the others have fun on the beach, while he quietly tries to fix the time machine. He only reveals that the time machine is broken and must be taken back to Nobita's desk in faraway Japan if they want to go back to the present time after he failed. At night, while having dinner, Gian starts singing songs and a huge Tyrannosaurus appears from the forests. Doraemon uses his Momotaro Dango (Dumplings) to tame it and orders him to go back and the group decided to travel across the land connecting North America and Asia to return home. In their way, they meet with various dinosaur species who either help or hinder their progress, such as Ornithomimus and Apatosaurus. At a cliff, they are attacked by a pack of Pteranodon, who break their bamboocopters. They are saved by several mysterious assailants, who reveal they are dinosaur hunters working for a fossil collector named Dollmanstein from the 24th century. They offer to return them back home in exchange for selling Piisuke. Refusing the deal, the group set a lure for the hunters by making mud statues of them and placing them in cars, while they escape across a river with a raft. However, they are eventually spotted and separated, with Gian, Suneo, and Shizuka captured by the hunters, while Nobita, Doraemon, and Piisuke fell from a waterfall.
Thankfully, one of Doraemon's gadgets saved the three. Leaving Piisuke behind for its safety, Doraemon and Nobita find the hunters' quarter downstream where Gian, Suneo, and Shizuka are used as baits for a Tyrannosaurus. The hunters demand that they hand over Piisuke in exchange for their lives, but the Tyrannosaurus is revealed to be the one they had previously used a Momotaro Dango for, and the group uses it to attack the hunters. The hunters are subsequently captured and imprisoned by the Future Time Patrols. Piisuke is transported to his homeland, the Late Cretaceous Japan, while Nobita and his friends bid it farewell and go back to the present day.
Cast
Release
Doraemon: Nobita's Dinosaur was released in Japan on 15 March 1980, where it was distributed by Toho. The film grossed in Japan and was the fifth highest-grossing Japanese film of the year, and the highest-grossing animated film.
Home media
The film was first released on Laserdisc in Japan on October 18, 1989.
The film was released on VHS by Shogakukan in December 1991. It was later re-released on VHS by Pony Canyon on May 17, 1996. Pony Canyon eventually released the film on DVD on March 14, 2001. The company later re-released the film on DVD on September 3, 2010.
References
Footnotes
Sources
External links
1980 films
1980 anime films
Dinosaurs in anime and manga
Nobita's Dinosaur
Plesiosaurs in fiction
Animated films about dinosaurs
Animated films about friendship
Animated films about size change
Films set in North America
Toho animated films
Films scored by Shunsuke Kikuchi |
Shaun MacDonald (born 23 August 1994 in Stirling, Scotland) is a Scottish rugby union player who plays at the Flanker or Number Eight positions.
Rugby Union career
Amateur career
MacDonald plays for Stirling County. He won the National Youth Cup three years in a row with Stirling.
Professional career
He played for Glasgow Warriors against Canada 'A' at Bridgehaugh Park, Stirling on 30 August 2016.
International career
MacDonald has played for Scotland at various age grades. He played for the Under 17s, Under 18s and Under 20s.
References
1994 births
Living people
Rugby union players from Stirling
Scottish rugby union players
Glasgow Warriors players
Stirling County RFC players
Rugby union flankers |
Donato Bramante (1444 – 11 April 1514), born as Donato di Pascuccio d'Antonio and also known as Bramante Lazzari, was an Italian architect and painter. He introduced Renaissance architecture to Milan and the High Renaissance style to Rome, where his plan for St. Peter's Basilica formed the basis of the design executed by Michelangelo. His Tempietto (San Pietro in Montorio) marked the beginning of the High Renaissance in Rome (1502) when Pope Julius II appointed him to build a sanctuary over the spot where Peter was martyred.
Life
Urbino
Bramante was born under the name Donato d'Augnolo, Donato di Pascuccio d'Antonio, or Donato Pascuccio d'Antonio in Fermignano near Urbino. Here, in 1467, Luciano Laurana was adding to the Palazzo Ducale an arcaded courtyard and other Renaissance features to Federico da Montefeltro's ducal palace. Bramante's architecture has eclipsed his painting skills: he knew the painters Melozzo da Forlì and Piero della Francesca well, who were interested in the rules of perspective and illusionistic features in Andrea Mantegna's painting.
Milan
Around 1474, Bramante moved to Milan, a city with a deep Gothic architectural tradition, and built several churches in the new Antique style. The Duke, Ludovico Sforza, made him virtually his court architect, beginning in 1476, with commissions that culminated in the famous trompe-l'œil choir of the church of Santa Maria presso San Satiro (1482–1486). Space was limited, and Bramante made a theatrical apse in bas-relief, combining the painterly arts of perspective with Roman details. There is an octagonal sacristy, surmounted by a dome. In Milan, Bramante also built the tribune of Santa Maria delle Grazie (1492–99); other early works include the Cloisters of Sant'Ambrogio, Milan (1497–1498), and some other constructions in Pavia (where he worked on the Cathedral, setting the design and creating the crypt and part of the apse) and possibly Legnano. However, in 1499, with his Sforza patron driven from Milan by an invading French army, Bramante made his way to Rome, where he was already known to the powerful Cardinal Riario.
Rome
In Rome, he was soon recognized by Cardinal Della Rovere, shortly to become Pope Julius II. For Ferdinand of Aragon and Isabella of Castile or possibly Julius II, Bramante designed one of the most harmonious buildings of the Renaissance: the Tempietto (1502) of San Pietro in Montorio on the Janiculum. Despite its small scale, the construction has all the rigorous proportions and symmetry of Classical structures, surrounded by slender Doric columns, surmounted by a dome. According to a later engraving by Sebastiano Serlio, Bramante planned to set it within a colonnaded courtyard. In November 1503, Julius engaged Bramante for the construction of the grandest European architectural commission of the 16th century, the complete rebuilding of St Peter's Basilica. The cornerstone of the first of the great piers of the crossing was laid with ceremony on 17 April 1506. Very few drawings by Bramante survive, though some by his assistants do, demonstrating the extent of the team which had been assembled. Bramante's vision for St Peter's, a centralized Greek cross plan that symbolized sublime perfection for him and his generation (compare Santa Maria della Consolazione at Todi, influenced by Bramante's work) was fundamentally altered by the extension of the nave after his death in 1514. Bramante's plan envisaged four great chapels filling the corner spaces between the equal transepts, each one capped with a smaller dome surrounding the great dome over the crossing. So Bramante's original plan was very much more Romano-Byzantine in its forms than the basilica that was actually built. (See St Peter's Basilica for further details.)
Bramante also worked on several other commissions. Among his earliest works in Rome, before the Basilica's construction was under way, is the cloister (1500–1504) of Santa Maria della Pace near Piazza Navona.
Works
Santa Maria presso San Satiro; Milan, ca. 1482–1486
Pavia Cathedral (project for the dome and crypt); Pavia, ca. 1488-1492
Palazzo della Cancelleria; Rome, ca. 1489-1513
Basilica of Sant'Ambrogio (project for refectory); Milan, ca. 1492
Castello Sforzesco (project for loggia bridge and frescoes); Milan, ca. 1494
Santa Maria delle Grazie (cloister and apse); Milan, 1492–1498
The Tempietto, San Pietro in Montorio; Rome, 1502
Santa Maria della Pace (cloister); Rome, 1504
St. Peter's Basilica; Rome, design 1503, ground breaking 1506
Cortile del Belvedere; Vatican City, Rome, 1506.
Palazzo Caprini (also known as Raphael's House); Rome, started around 1510 (demolished in the 17th century)
Basilica della Santa Casa; Loreto
Palazzo della Cancelleria; Rome, ca. 1489-1513
In addition to building, Bramante wrote about architecture and composed eighty sonnets.
See also
Leon Battista Alberti
Giorgio Vasari
Footnotes
Notes
References
11.^Guagliumi Silvia.(2014) Donato Bramante.Pittore e sommo architetto in Lombardia e a Roma.L'uomo, le idee e l'opera.
Silvia Editrice ISBN 978-88-96036-63-1.
External links
Donato Bramante - World History Encyclopedia
Donato Bramante
Italian Renaissance architects
1444 births
1514 deaths
People from the Province of Pesaro and Urbino
15th-century Italian architects
16th-century Italian architects
15th-century Italian painters
16th-century Italian painters
Italian Roman Catholics |
Fire Station No. 23 is a former fire station located in the Central District of Seattle, Washington listed on the National Register of Historic Places. It was remodeled as the Cherry Hill Community Center in 1970, and served as the headquarters of Centerstone (formerly the Central Area Motivational Program, or CAMP). It was again renamed in 2018 to Byrd Barr Place. This was done to honor local US civil rights leader Roberta Byrd Barr, who is cited as strong supporter of CAMP's efforts since the 1960s. The location currently offers community support to the surrounding Seattle area, including housing assistance, tackling food insecurity, and bringing the community together to advocate for its needs. Byrd Bard Place seeks to support Black Washingtonian's within Seattle's Central District in particular, with the end goal of bettering the state of Washington collectively.
Historical Context
Despite being included within the National Register of Historic Places, Fire Station No. 23 was built in 1909 without a specific architectural style being used by firm Everett & Baker. The station featured several different companies within its stationed battalion, including the steam based Engine Company No. 23, Hose Company No. 23, and Ladder Company No. 23. Within the structure, the fire battalion's headquarters were established. The station was made up of three equipment bays downstairs, as well as a dormitory and offices upstairs. A five-story hose tower was built in addition.The stationed battalion served the area between the Seattle ship canal and the Rainier Valley. The Ladder Company of the station became motorized in 1918 following the introduction of the automobile, with the horses of the Engine Company being retired in 1922.
Following the remodeling of the station in 1970 to the Cherry Hill Community Center, the interior was remodeled into offices and a dance studio. In order to maintain the traditional look of the structure, the equipment bays would be sealed over with a wood window wall to resemble to original doors. These remodels were led by Seattle Architect Ted Bowers. Seattle landscape architect Richard Haag developed the neighboring Firehouse Park in 1968. After the submission of a prepared form by the Seattle Historical Society in 1969, the National Register would recognize Fire Station No. 23 as part of its Register of Historic Places in 1971. Within the nomination form provided to the National Register, the Seattle Historical Society cited several factors which warrant Fire Station No. 23's placement into the National Register of Historic Places. Most notably, the fire station is one of the earlier municipal buildings within Seattle to be designed by architects. It is believed to serve as a reminder of the horse-drawn era of fire fighting while exhibiting a signature architectural contribution to the neighborhood around it.
See also
List of landmarks in Seattle
List of National Historic Landmarks in Washington (state)
National Register of Historic Places listings in Seattle
References
External links
1900s architecture in the United States
1908 establishments in Washington (state)
Buildings and structures in Seattle
Central District, Seattle
Defunct fire stations in Washington (state)
Fire stations completed in 1908
Fire stations on the National Register of Historic Places in Washington (state)
National Register of Historic Places in Seattle
Seattle Fire Department |
FP is a cubic-grain black-and-white film from Ilford Photo with a long history. It originated as Fine grain Panchromatic roll film in 1935. Like its faster partner product, HP film, it has gone through a number of versions since then, with the latest being FP4 plus (FP4+ for short).
The film is known for being versatile, with usable results even when underexposed two stops or overexposed six stops. This is due to the fact that FP4 features a double layer emulsion. It combines a low sensitive fine grain layer and a highly sensitive layer with larger grains. This kind of film was already known in the 1920s and 1930s (e.g. Agfa Isopan F 17/10° DIN). Being perfect for the amateur's 6x9 roll film cameras these old types lacked sharpness in the 24 x 36 mm format due to the overall thickness of both layers. But the FP4 of 1968 combined an amateur-friendly double layer emulsion with the sharpness of a typical thin layer emulsion. This was possible because both layers together were only 7.5 µm thick.
References
External links
Ilford FP4 plus
Photographic films |
Bowshaw is an area in Derbyshire, England, that now forms part of the town of Dronfield. There is little for the casual visitor to see except a long row of 20th-century houses alongside the road from Dronfield to Sheffield, although some notable buildings include Bowshaw House, built in the 1730s by the Lucas family, Bowshaw Farm (formed by a division of Bowshaw House by the Hatfield family c. 1940) and Bowshaw Inn.
Geography of Derbyshire
North East Derbyshire District |
The Eastern Missouri Conference is a high school athletic conference comprising small-size high schools located in eastern central Missouri. The conference members are located in Franklin, Gasconade, and Phelps counties.
Members
References
Missouri high school athletic conferences
High school sports conferences and leagues in the United States |
John Robert (Bob) Spence (born February 10, 1946) is a former Major League Baseball player. Spence played for the Chicago White Sox from to . He batted left and threw right-handed.
He was drafted by the White Sox in the 1st round (4th overall pick) of the 1967 amateur draft.
He attended St. Augustine High School in San Diego, California and graduated in 1964. Following his retirement from baseball, he returned to St. Augustine as a teacher.
References
External links
1946 births
Baseball players from San Diego
Chicago White Sox players
Lynchburg White Sox players
Eugene Emeralds players
Appleton Foxes players
Tucson Toros players
Living people |
Chastity Dotson (born 1986) is an American actress.
Filmography
Film
Television
References
External links
Living people
1986 births
21st-century American actresses
African-American actresses
American film actresses
American television actresses
21st-century African-American women
21st-century African-American people
20th-century African-American people
20th-century African-American women |
Broken Down...Live and Acoustic in the Poconos is an EP released by American band Tantric on July 22, 2008, on the Silent Majority Group label. The EP contains four tracks.
Track listing
All lyrics by Hugo Ferreira, music composed by all members.
Personnel
Hugo Ferreira – vocals
Kevin Miller – drums
Joe Pessia – guitar
Erik Leonhardt – bass
Marcus Ratzenboeck – electric violin
External links
Broken Down...Live and Acoustic in the Poconos at iTunes
Broken Down...Live and Acoustic in the Poconos at Myspace
2008 EPs
Tantric (band) albums |
The 2012–13 Real Phoenix season was the first and only season of the Real Phoenix professional indoor soccer club. Real Phoenix, a Southwestern Division team in the Professional Arena Soccer League, played their first six home games in the Barney Family Sports Complex in the greater Phoenix suburb of Queen Creek, Arizona. The team played the final two home games of the season at the Arizona Sports Complex in Glendale, Arizona. The team was led by general manager Rosario Lopez Jr., head coach Kevin Grub, and assistant coach Rodolfo Hernandez.
Season summary
Real Phoenix struggled in the regular season, ultimately earning a 4–12 record and last place in the PASL's four-team Southwestern Division, and failed to advance to the postseason. The team also struggled at the box office, placing 18th in the 19-team league for average home attendance.
In late January 2013, the team informed the PASL that they were financially unable to complete their road schedule and the league revoked their franchise. The league sent a replacement squad coached by Kevin Leonard and filled out largely by members of his Texas Xtreme Premier Arena Soccer League team to cover Phoenix's road dates in south Texas. The team's final two home games were played with a squad of regular Real Phoenix players but with Kevin Leonard remaining as head coach.
The team participated in the 2012–13 United States Open Cup for Arena Soccer. They lost to the Las Vegas Legends in the Wild Card round, abruptly ending their run in the tournament.
Schedule
Pre-season
Regular season
† Game also counts for US Open Cup, as listed in chart below.
§ Team relocated to Arizona Sports Complex for final two home games.
♥ Replacement squad after franchise revoked by league.
2012–13 US Open Cup for Arena Soccer
References
External links
eteamz.com/realphoenixfc Real Phoenix official website
Real Phoenix
Sports in Phoenix, Arizona
Real Phoenix
Real Phoenix |
```xml
/**
*
* This source code is licensed under the MIT license found in the
* LICENSE file in the root directory of this source tree.
*/
import {nullthrows} from 'shared/utils';
/**
* Incrementally increases throttling when an even starts happening too often.
* For example, initially there's no throttle
* After 10 events without a gap of 10s, there's a 10s throttle.
* After 30 events without a gap of 30s, there's a 30s throttle.
* After no events for 10s, the throttle is reset to 0.
*
* These thresholds are configurable.
* "Throttling" means dropping events after the first one (unlike debouncing).
*/
export function stagedThrottler<P extends Array<unknown>>(
stages: Array<{
throttleMs: number;
/** number of input events needed to advance to the enxt stage.
* Note: it doesn't matter if it was throttled or not. Every input adds to the advancement. */
numToNextStage?: number;
resetAfterMs: number;
/** Called when entering a stage.
* Note: 0th stage onEnter is not called "on startup", only if you reset the stage,
* and that this stage resets the next time a value IS emitted, not merely once the time passes.
*/
onEnter?: () => unknown;
}>,
cb: (...args: P) => void,
) {
// Time of the last non-throttled call
let lastEmitted = -Infinity;
let currentStage = 0;
let numSeen = 0;
return (...args: P) => {
const stage = nullthrows(stages[currentStage]);
const currentThrottle = stage.throttleMs;
const elapsed = Date.now() - lastEmitted;
// Input always counts towards going to the next stage
numSeen++;
// Maybe go to the next stage
if (numSeen > 1 && elapsed > stage.resetAfterMs) {
// Reset the throttle
numSeen = 0;
currentStage = 0;
stages[currentStage].onEnter?.();
} else if (stage.numToNextStage && numSeen >= stage.numToNextStage) {
const nextStage = currentStage + 1;
if (nextStage < stages.length) {
numSeen = 0;
currentStage++;
stages[currentStage].onEnter?.();
}
}
if (elapsed < currentThrottle) {
// Needs to be throttled
return;
}
// No need to throttle
lastEmitted = Date.now();
return cb(...args);
};
}
``` |
The New York Film Critics Circle (NYFCC) is an American film critic organization founded in 1935 by Wanda Hale from the New York Daily News. Its membership includes over 30 film critics from New York–based daily and weekly newspapers, magazines, and online publications. In December of each year, the organization meets to vote on the New York Film Critics Circle Awards, given annually to honor excellence in cinema worldwide of the calendar year. The NYFCC also gives special stand-alone awards to individuals and organizations that have made significant contributions to the art of cinema, including writers, directors, producers, film critics, film restorers, historians and service organizations. The NYFCC Awards are the oldest given by film critics in the country, and one of the most prestigious.
Award ceremonies
Note: Dates listed are those of when the awards were actually given. Announcement dates are earlier.
Award categories
Current categories
Best Actor
Best Actress
Best Animated Film
Best Cinematography
Best Director
Best Film
Best First Film
Best Foreign Language Film
Best Non-Fiction Film (formerly known as Best Documentary Film)
Best Screenplay
Best Supporting Actor
Best Supporting Actress
Former categories
Best New Director
References
External links
International film awards
American film awards
Lists of films by award
Awards established in 1935
New York Film Critics Circle Awards
American film critics associations
1935 establishments in New York City |
Angela Zhang (born 1994) is an Asian American scientist who in 2009, at the age of 14, began to research at Stanford University. By 2011, Zhang's research won the $100,000 Siemens Competition in Math, Science & Technology, and earned her widespread notability for her research on cancer treatments with iron oxide gold nanoparticles. She graduated from Harvard in 2016, and is now at Stanford University.
Education
While attending Monta Vista High School, Zhang was reading doctorate papers on bio-engineering and attending scientific conferences; by the age of 14, she had begun to work as a member of Stanford's research team. In the fall of 2012, Zhang attended Harvard University, where she majored in biomedical engineering and graduated in 2016, after which she returned to Stanford University to participate in the 2016 Medical Scientist Training Program.
Career and work
During high school, Zhang worked with a Stanford graduate student to research the cancer-fighting potential of a single nanoparticle. In 2011, at age 16, she entered her cancer-killing nanoparticle research into the Siemens Competition in Math, Science & Technology, where she won first prize and a $100,000 scholarship, and the Intel International Science and Engineering Fair, she also won first prize. She was the only female finalist in the Siemens competition that year. The following year, at the age of 17, Zhang went to the White House and presented her research to then-President Barack Obama.
As an undergrad at Harvard, Zhang and a group of other Harvard students continued to grow her nonprofit "Labs on Wheels" concept, which she had started in 2012. It was made to provide refurbished lab equipment to American high schools. Labs on Wheels has garnered grants from Harvard and was the first place in the 2013 Harvard Undergraduate Women in Business Innovation Competition, and a finalist in the 2015 Harvard President's Challenge. Zhang presented the concept at the 2013 TEDxSan Jose.
Major contribution
Zhang's research includes her exploration of the cancer-fighting potential of a single nanoparticle, which is known as the iron oxide gold nanoparticle. During her time at Stanford, while still in high school, Zhang and the team found that this particular nanoparticle is able to do two valuable things. It can detect cancer and the nanoparticle can deliver chemotherapy drugs more efficiently to the cells.
References
Cancer researchers
Living people
Harvard John A. Paulson School of Engineering and Applied Sciences alumni
People from Cupertino, California
Stanford University alumni
Date of birth missing (living people)
1994 births |
The Swiss Men's Volleyball Ligue 1 is a men's volleyball competition organized by the Swiss Volleyball Federation (Swiss Volley), it was created in 1957.
History
In the 2020/21 championship, 8 teams played in the League A: Lindaren ( Amriswil ), Chenois Geneva ( Geneva ), Schönenwerd, Lausanne, Nefels, Yona, Basel, Lindaren ( Lucerne ). Champion title was won by "Chenoit Geneva", who won in the final series beating up "Lindaren" (Amriswil) 3-1 (3: 2, 0: 3, 3: 1, 3: 0). 3rd place was taken by "Schönenwerd".
Winners List
References
External links
Swiss Volleyball
sports123.com
www.volleybox.net
Switzerland
Sports leagues established in 1957
1957 establishments in Switzerland
Volleyball in Switzerland
Professional sports leagues in Switzerland |
```c++
//
// Use, modification, and distribution is subject to the Boost Software
// path_to_url
//
// See path_to_url for documentation.
//
// You are welcome to contact the author at:
// fernando_cacciola@hotmail.com
// akrzemi1@gmail.com
#ifndef your_sha256_hashB2016_HPP
#define your_sha256_hashB2016_HPP
// Daniel Wallin discovered that bind/apply.hpp badly interacts with the apply<>
// member template of a factory as used in the optional<> implementation.
// He proposed this simple fix which is to move the call to apply<> outside
// namespace boost.
namespace boost_optional_detail
{
template <class T, class Factory>
inline void construct(Factory const& factory, void* address)
{
factory.BOOST_NESTED_TEMPLATE apply<T>(address);
}
}
namespace boost
{
class in_place_factory_base ;
class typed_in_place_factory_base ;
}
#endif // header guard
``` |
Victoria Pavilion is a historic grandstand located on the western side of Fremantle Oval, in Fremantle, Western Australia.
In January 1897, local architect Frederick William Burwell won the competition held by the Fremantle Council for the design of a pavilion for Fremantle Oval. Burwell also designed the Central Chambers, Sail and Anchor Hotel, Fowler's Warehouse, Owston's Buildings and Marmion House.
The foundation stone was laid on 25 June 1897 to celebrate Queen Victoria's Diamond Jubilee. Built by Blackman Brothers at a cost of £3650, the pavilion was officially opened by Premier John Forrest on 6 November 1897.
The building is listed on the Register of the National Estate.
References
External links
Buildings and structures in Fremantle
State Register of Heritage Places in the City of Fremantle |
The Tiroler Volkspartei (English: Tyrolean People's Party) is the Tirol branch of the Austrian People's Party.
The party was formed through a merger of the rival Christian Social Party and the Catholic Conservatives on October 27, 1918. After winning the first provincial legislative election in 1919, the Tiroler Volkspartei remained the most powerful party until the end of the First Austrian Republic. Within the party, the Tiroler Bauernbund (Farmers league) formed the largest and most influential group.
In the area of South Tyrol, which had been annexed to Italy, the Tiroler Volkspartei joined in a coalition with the Deutschfreiheitliche Partei called the Deutscher Verband. This coalition won 90% of the vote and sent four representatives to the Chamber of Deputies. However, the party lost its influence after the March on Rome in October 1922.
After 1945, the Tiroler Volkspartei became the state organization of the Austrian People's Party. It has remained the majority party in the provincial Landtag ever since, except for the years 1999 to 2008.
References
External links
Official website
Defunct political parties in South Tyrol
Political parties in Austria-Hungary
Political parties established in 1918
Political parties in Austria
Catholic political parties
Conservative parties in Austria
Tyrol (state) |
Donell is a given name. Notable people with the name include:
Donell "D.J." Cooper (born 1990), American basketball player in the Israeli Basketball Premier League
Donell Jones (born 1973), American R&B singer, songwriter and record producer
Donell Nixon (born 1961), American former center and left fielder in Major League Baseball
Donell Taylor (born 1982), American professional basketball player
See also
List of people named O'Donnell |
Supernature may refer to:
Supernature (Cerrone III), a 1977 album by Cerrone
"Supernature" (song), the title track, covered by Erasure
Supernature (Inkubus Sukkubus album), 2001
Supernature (Goldfrapp album), 2005
Supernature, a 1973 book by Lyall Watson
"Supernature", a song by Sharon Needles from the album Taxidermy
Ricky Gervais: SuperNature, a 2022 Netflix stand-up comedy show
See also
Supernatural (disambiguation) |
The occurred in Suma, Kobe, Japan, on March 16 and May 27, 1997. Two victims, , aged 10, and , aged 11, were murdered by a 14-year-old boy reportedly named , under the alias .
The perpetrator was arrested on June28, 1997, in connection with the Hase murder, and later confessed to both murders. As a juvenile offender, he was prosecuted and convicted as "BoyA". His real name has not been officially released to the press because Japanese law prohibits publishing the identification, but in some weekly magazines his real name has been reported as Shinichiro Azuma. Beginning in 2004, Azuma was released on provisional basis, with full release announced to follow on January1, 2005. The murders and subsequent release of the perpetrator gained widespread attention from Japanese media and politicians.
Murders
On May27, 1997, the head of , a special education pupil at Tainohata Elementary School, was found in front of the school gate hours before pupils arrived for classes. Hase had been beheaded with a handsaw, with further mutilations being done before being left in front of the school, for students to discover when they arrived in the morning. A note, written in red pen, was found stuffed in his mouth, identifying the killer as "Sakakibara". The note read:
"This is the beginning of the game... Try to stop me if you can you stupid police... I desperately want to see people die, it is a thrill for me to commit murder. A bloody judgment is needed for my years of great bitterness." Additionally, some misspelled English was on the note as well: "shooll killer".
Police commented that the style of Hase's killing and the note was reminiscent of that of the Zodiac murders in the San Francisco Bay Area during the late 1960s.
On June6, a letter was sent to the newspaper Kobe Shinbun, in which Sakakibara claimed responsibility for the slaying and decapitation of Jun Hase, and threatened that more killings would follow. This second letter, delivered in a brown envelope postmarked June3, had no return address or name. Enclosed was a three-page, 1400-word letter, also written in red ink, which included a six-character name that can be pronounced as "Sakakibara Seito". The same characters, which mean alcohol, devil, rose, saint and fight, were used in the first message that was inserted into the boy's mouth.
Beginning with the phrase "Now, it's the beginning of a game", the letter stated that "I am putting my life at stake for the sake of this game... If I'm caught, I'll probably be hanged... police should be angrier and more tenacious in pursuing me.... It's only when I kill that I am liberated from the constant hatred that I suffer and that I am able to attain peace. It is only when I give pain to people that I can ease my own pain." The letter also lashed out against the Japanese educational system, calling it "compulsory education that formed me, an invisible person."
In the initial panic, the Japanese media misreported the name as "Onibara" – Demon's Rose, though the killer insisted it was as he gave it. Infuriated by the mixup, Sakakibara later wrote to the station, "From now on, if you misread my name or spoil my mood I will kill three vegetables a week. If you think I can only kill children you are greatly mistaken." (Sakakibara's use of the term "vegetables" here refers to people around him; he had learned this term from his parents, who had once told him, "if you are nervous at your athletic meet, picture the people around you as vegetables.")
A 14-year-old junior high school student was arrested as a suspect in the Hase murder on June 28. Shortly after his arrest, "BoyA" also confessed to the murder of a 10-year-old girl, Ayaka Yamashita (山下彩花 Yamashita Ayaka), on March16, as well as the assaults of three other girls on and around that same date. After the March 16 attack, he wrote in his diary: "I carried out sacred experiments today to confirm how fragile human beings are... I brought the hammer down, when the girl turned to face me. I think I hit her a few times but I was too excited to remember." The following week, on March23, he added: "This morning my mom told me, 'Poor girl. The girl attacked seems to have died.' There is no sign of me being caught... I thank you, "Bamoidōkishin", for this... Please continue to protect me." The meaning or identity of "Bamoidōkishin" remains unclear.
Aftermath and controversy
After the murders, Japanese politician Shizuka Kamei called for restricting objectionable content, stating, "Movies lacking any literary or educational merit made for just showing cruel scenes... Adults should be blamed for this", and that "[the incident] gives adults the chance to rethink the policy of self-imposed restrictions on these films and whether they should allow them just because they are profitable."
In 2000, Japan's bicameral legislature lowered the age for criminal responsibility from 16 to 14. However, in the wake of the June1, 2004 murder of Satomi Mitarai by 11-year-old "GirlA" (Sasebo slashing), there has been some discussion for the need for further revision.
On March11, 2004, in an unprecedented act, the Japanese Ministry of Justice announced that Sakakibara, 21 at the time, was being released on a provisional basis, with a full release to follow on January 1,2005. Critics have charged that since the government had taken the unusual step of notifying the public, that Sakakibara was likely not fit for release and should be transferred to prison. In the wake of the Sasebo slashing, three months later, this criticism was exacerbated.
Due to the seriousness of the crimes and the fact that they had been committed by a minor, his name and new residence to this day remain a highly guarded secret. Nonetheless, his real name has been circulated on the internet since June29, 1997, according to journalist Fumihiko Takayama.
A number of people, including Shōjirō Gotō (a lawyer who dealt with many false accusation cases), Hidehiko Kumagai, and Nobuyoshi Iwata (former principal of the junior high school that BoyA attended), insist that BoyA was wrongfully accused and point out contradictions in the statements of the investigating authorities. Some examples:
Police investigators said that one of the murders was made by a left-handed BoyA is right-handed.
BoyA's confession contained many absurd statements and claims of things that would be impossible for a 14-year-old to do.
BoyA had bad grades, and yet his confession was complex (if cryptic) and contained many elaborate figures of speech and similes.
In 2002, the boy's mother visited him in prison and asked him if he had really committed the crimes. He affirmed this to her.
In June 2015, Sakakibara, then aged 32, released an autobiography through Ohta Publishing titled Zekka (絶歌), in which he claimed to express regret for his crimes and recounted the murders in graphic detail. Despite attempts by Jun Hase's family to block the release of Zekka, and despite one bookstore chain refusing to stock the book, it quickly reached the top of Japanese bestseller lists. A few months later, Sakakibara set up a vanity website in which he posted bizarre photoshopped images of a nude male, suggested to be himself. In response to these controversies, the tabloid Shūkan Post publicized Sakakibara's real name of Shinichiro Azuma, as well as his location and occupation at the time.
See also
List of major crimes in Japan
Neomugicha incident
Sasebo slashing
Son of Sam law
Zodiac Killer
Notes
References
External links
Sympathy for the devil Al-Ahram Weekly, March 18, 1999
神戸事件の真相を究明する会 The meeting which studies the truth of Kobe case
1997 murders in Japan
Japanese murderers of children
Minors convicted of murder
Murder committed by minors
Child murder in Japan
People from Kobe
Violence against children |
Göçeri is a circassian village in the Hamamözü District, Amasya Province, Turkey. Its population is 68 (2021).
References
Villages in Hamamözü District |
Ordinary Alien – The Kinky Roland Files is an album by Boy George, featuring a collection of his dance recordings made between 2001 and 2009. It was produced by Boy George himself and German record producer Kinky Roland.
Background
Some of the album's tracks, such as "Don't Wanna See Myself", "Look Pon U", and "Kill the A&R", had been shared by George via YouTube and MySpace around 2006–2007. "After Dark" and "Human Racing" (the latter in an alternate version) were featured on George's alter ego The Twin's 2004 album Yum Yum. "If I Were You" was included in his band Culture Club's 2002 box set. "Yes We Can" and "Amazing Grace" were released as singles in 2008 and 2009 respectively. "Turn 2 Dust" was released in dance and also reggae versions at the end of 2011.
The album contains two cover versions: Fleetwood Mac's "Go Your Own Way" and soul-folk songwriter Terry Callier's "I Don't Want to See Myself (Without You)".
Track listing
"Turn 2 Dust" (George O'Dowd, Kevan Frost)
"Yes We Can" (O'Dowd, John Themis)
"Brand New" (O'Dowd, Frost, Kinky Roland)
"Amazing Grace" (featuring fado singer Ana Laíns) (O'Dowd, Themis, Kinky Roland)
"Don't Wanna See Myself" (Eric Hocheert, Terry Callier, Larry Wade, Pennington McGee)
"If I Were You" (O'Dowd, Themis)
"Go Your Own Way" (Lindsey Buckingham)
"Here Come the Girls" (featuring Ave D) (O'Dowd, Kinky Roland)
"Seconds" (featuring Phiiilip Something) (Phiiilip Something)
"After Dark" (O'Dowd, Frost)
"Kill the A&R" (O'Dowd, Kinky Roland, Cheska Grover)
"Human Racing" (O'Dowd, Frost)
"Look Pon U" (O'Dowd, Kinky Roland)
Taiwan 2 CD edition
CD 2:
"Out of Fashion"
"Sanitized"
"Time Machine"
"Psychology of the Dreamer"
"Ragga Music"
Argentina 2 CD edition
CD 1:
"Turn 2 Dust"
"Yes We Can"
"Brand New"
"Amazing Grace"
"Don't Wanna See Myself"
"If I Were You"
"Go Your Own Way"
"Time Machine"
"Seconds" (featuring Phiiilip Something)
"Psychology of the Dreamer"
"After Dark"
"Human Racing"
CD 2:
"Amazing Grace" (Original mix)
"Here Come the Girls" (feat. Ave D)
"Sanitized"
"Kill the A&R"
"Look Pon U"
References
Boy George albums
2011 albums |
Clan Destined is an American hip hop group from Atlanta, Georgia that formed in 2002. The group is composed of Dustin Teague and Yamin Semali, better known by their stage names DT and AmDex, respectively. Both members are rappers, producers, DJs, and multi-instrumentalists.
History
DT and AmDex are both originally from North Carolina, but they met at Morehouse College in Atlanta in 2002. Prior to their meeting, AmDex was already a member of an extensive music collective of emcees and producers formerly called Vinyl Junkies Clique (or, The VJC). The collective has spawned notable alum and spinoffs in the indie and progressive hip-hop circuits, including P.U.D.G.E., Sum, The Milky Way, The Difference Machine, DJ 2-Tone Jones (Shaolin Jazz), Mario "X-Man" Prins and Jesse "Xro" Pinkney, founder of SoulPublicRadio.com. DT was inducted shortly thereafter. The VJC went on to create the record label VJC Recordings through which they released Strange Arrangement, the only full-length release featuring all members of the collective.
In 2007, the group released its well-received debut album Abbracadamn!!! on Domination Recordings. Later that year, the independent rap label Rawkus named Clan Destined as one of the 50 indie rap prospects in the country. The group released And for Our Next Trick…The Remix EP, a collection of remixes from Abbracadamn!!! in addition to new recordings, to be featured on the Rawkus 50 Project in 2007.
In 2010, Clan Destined released the album A Story Never Told: F#$% a Mixtape and was voted “Best Atlanta-Based Hip Hop Group” by WRFG's The Beatz and Lyrics Show.
The group released its most recent album Self Titled on January 22, 2011. It was given a rating of 5 out of 5 stars in Creative Loafing the following week.
Clan Destined's live performance style is characterized by witty rhymes, skillful turntablism, and improvised production involving the use of MPCs, keyboards, and drums. The group has shared stages with RJD2, Del tha Funkee Homosapien, Devin the Dude, Sound Tribe Sector Nine, People Under The Stairs, KRS-One, Count Bass D, GZA, Sadat X and various other artists.
Discography
Studio albums
References
External links
Clan Destined Official Site
Clan Destined on Bandcamp
Alternative hip hop groups
American hip hop groups
East Coast hip hop groups |
The Mnierea is a left tributary of the river Crișul Repede in Romania. It discharges into the Crișul Repede near Aștileu. Its length is and its basin size is .
References
Doua vai din Muntii Padurea Craiului:Mniera si Poiana
Rivers of Romania
Rivers of Bihor County |
```objective-c
#pragma once
#ifndef TNZIMAGE_INCLUDED
#define TNZIMAGE_INCLUDED
#include "tcommon.h"
#undef DVAPI
#undef DVVAR
#ifdef IMAGE_EXPORTS
#define DVAPI DV_EXPORT_API
#define DVVAR DV_EXPORT_VAR
#else
#define DVAPI DV_IMPORT_API
#define DVVAR DV_IMPORT_VAR
#endif
DVAPI void initImageIo(bool lightVersion = false);
#endif
``` |
St. Stephen Rural Cemetery is a municipal cemetery established in April 1856 at the town of St. Stephen, New Brunswick, Canada. The cemetery encompasses of land with approximately 12,000 burials. There are over 20 kilometres of avenues and paths.
History
St. Stephen is a Canada/United States border town, separated by the St. Croix River. It is a place where crossing the bridge for employment, shopping, hospitalization, or just visiting friends, is an almost daily part of normal life. The two close-knit communities have shared services for more than two hundred years. Until nearly the second half of the 20th century, a number of Americans were born in St. Stephen and vice versa.
Cross-border marriages have been common and there are several American Civil War veterans buried in the St. Stephen cemetery, including a Medal of Honor recipient as well as Brigadier-General John Curtis Caldwell who was one of the eight generals to accompany the body of assassinated President Abraham Lincoln on its journey from Washington D.C. to Lincoln's home in Springfield, Illinois. Many members of the Ganong family of chocolate makers are interred here.
Notable interments
John Curtis Caldwell, Brigadier-General, Union Army
Arthur D. Ganong, businessman, president of Ganong Bros.
Gilbert W. Ganong, co-founder of Ganong Bros.
Hardy N. Ganong (CBE), Major-General, Canadian Army
J. Edwin Ganong, businessman, co-founder of Ganong Bros. and the St. Croix Soap Mfg. Co.
Joan A. Ganong, World War II Air Force Flight Sergeant, author
R. Whidden Ganong, businessman, president of Ganong Bros.
Susan B. Ganong, educator, owner of Netherwood School
William Francis Ganong, botanist, historian, cartographer
James Mitchell, Premier of New Brunswick
Horatio Young, US Navy, Medal of Honor recipient
References
Commonwealth War Graves Commission report on St. Stephen Rural Cemetery
Cemeteries in New Brunswick
Buildings and structures in Charlotte County, New Brunswick
St. Stephen, New Brunswick
1856 establishments in New Brunswick
Tourist attractions in Charlotte County, New Brunswick |
NMC Health () is a healthcare chain and distribution business in the United Arab Emirates (UAE). The company is headquartered in Abu Dhabi and has branch offices in Dubai, Ajman, Al Ain and Northern Emirates. The company operates and manages over 200 facilities in 19 countries.
The company was accused in 2019 of understating debt on its balance sheet and later revealed that debt facilities of $2.7 billion had not been reported.
On 8 April 2020, NMC was placed into administration by a UK High Court judge Sebastian Prentis due to the insolvency of the company caused by alleged frauds committed by the founder and then-chairman of the board B. R. Shetty.
History
NMC Health was founded by B. R. Shetty in 1974 as the New Medical Centre in Abu Dhabi. In 1981, a new marketing & distribution division, NMC Trading was launched, which distributed medicines to pharmacies in the UAE. This division would later expand into distribution of fast-moving consumer goods, medical equipments and supplies and educational products.
From 1996, NMC began expanding to other emirates, setting up the NMC Clinic in Sharjah (1996), NMC Hospital, Deira, Dubai (1999), the NMC Specialty Hospital, Dubai (2004) and NMC Specialty Hospital in Al Ain (2008). In 2009, these hospitals were awarded the JCIA accreditation. In April 2012, NMC listed on the London Stock Exchange. That same year, NMC began managing operations at the Shiekh Khalifa General Hospital in Umm Al Quwain, acquired the BR Medical Suites in Dubai Healthcare City and continued their expansion with the addition of new medical setups such as NMC Royal Hospital in Khalifa City and operations in Al Ain's industrial area. In 2013, the company added a day-surgery centre in Mohammed Bin Zayed City in Abu Dhabi. NMC Health opened the NMC Hospital in Dubai Investments Park, NMC Brightpoint Royal Women's Hospital, and the NMC Medical Centre in Al Ain in 2014.
NMC Health acquired the Spain-based Clínica Eugin in 2015, allowing the company to become the leading integrated women's health provider from fertility through obstetrics and pediatrics in the UAE. That same year, the company also acquired UAE based medical groups, Dr. Sunny Healthcare Group (leading set of medical clinics in Sharjah and Northern Emirates), Provita and Americare Group, Abu Dhabi (focused on long-term care and rehabilitation) and acquired a 51% stake in Fakih IVF, another leading fertility clinic in UAE.
In August 2016, the company expanded its operations into Saudi Arabia when it acquired a 70 percent stake in As Salama Hospital in Al Khobar; NMC Health also invested in a project to build a 120-bed care centre in Jeddah that will be managed by its subsidiary Provita. In December 2016, NMC Health announced the acquisition of Al Zahra Hospital, one of the largest private hospitals in the UAE. In 2017 Emirates Healthcare, owned by Abu Dhabi investment group KBBO, announced the signing of an operating and management contract with NMC Health for the management of their Emirates Healthcare assets. NMC Health bought Aspen Healthcare for £10 million in August 2018.
Under-reporting of debt
In December 2019, short-seller Muddy Waters questioned the company's statement of accounts, concerned that NMC had "manipulated its balance sheet to understate debt" and contained statements which were "hallmarks of significant fraud".
In February 2020, Executive Vice Chairman Khalifa Butti Omeir Bin Yousef resigned from NMC. The company said a legal review was being undertaken to verify the total interests of some of its shareholders over concerns they have been incorrectly reported. Later in the month shares in the company were suspended from trading amid concerns that debt had been under-reported: the Financial Conduct Authority announced an investigation.
Parallelly, in February 2020, as per the regulatory fillings to the London Stock Exchange, the company disclosed about the "highly preliminary approaches" made by the private equity groups Kohlberg Kravis Roberts and Switzerland-based GK Investment for possible buyout. However, Kohlberg Kravis Roberts backed off by 11 February 2020 and later GK Investment also backed off by the end of February.
In March 2020 the company reported that:
it has identified over $2.7 billion in facilities that had previously not been disclosed to or approved by the Board ... The Board believes that some proceeds may have been utilised for non-Group purposes.
This meant that the actual indebtedness was not $2.1 billion as previously reported but circa $5 billion as at 30 June 2019. On 24 March 2020 the total debt was then estimated at $6.6 billion. Many employees were not paid at that time.
On 8 April 2020, NMC went into administration in UK due to the insolvency of the company due to alleged frauds committed by founder and then-chairman of the board B.R. Shetty. Consequent to the request from the board of directors of NMC and on going investigation of potential financial irregularities, the company was suspended from its listing on the London Stock Exchange.
On 15 April 2020, Abu Dhabi Commercial Bank filed a criminal complaint against NMC Health with the Attorney General's Office of UAE.
In April 2021, HSBC and Standard Chartered cleared around $370M worth of positions in NMC's debt in two separate auctions as more information about likely restructuring recoveries become available.
Operations
NMC Health operates two business segments, healthcare distribution and services. The healthcare arm operates an international network of hospitals around the UAE and Europe. It is the largest private healthcare provider in the UAE and provides medical services including diagnostics, outpatient clinics, gynecology, obstetrics, human reproduction and pharmacy retail. In 2017, it operated more than 45 locations and more than 15 pharmacies, and employed over 1,200 doctors who saw more than 11,000 patients daily. NMC Health's distribution and services arm operates the subsidiary, NMC Trading, which engages in wholesale trading of pharmaceuticals, medical equipment, food and cosmetics. NMC Trading has distribution rights for companies such as, Nestlé, Pfizer, Siemens, Samsung, Sanofi and Henkel.
Recognition
NMC Health has been recognized as one of the UAE's strongest brands by the Superbrands Council since 2015. That same year, the company received the Frost & Sullivan Middle East Integrated Healthcare Company of the Year Award and a Sheikh Khalifa excellence award amongst others. The company was recognized for best practices in corporate social responsibility by the Dubai Chamber of Commerce and Industry in 2016. That same year, NMC Health received Stevie Awards in the Company of the Year in the Health Products and Services and Pharmaceuticals category and people's choice for favorite companies. In 2017, NMC Specialty Hospital and NMC Trading both received Mohammed bin Rashid Al Maktoum Business Excellence Awards. It has been selected by the Abu Dhabi National Oil Company (ADNOC) to manage operations of Ruwais Hospital in the Al Dhafra region.
References
External links
Official website
2012 initial public offerings
Health care companies of the United Arab Emirates
Companies listed on the London Stock Exchange
Hospital networks
Emirati companies established in 1974
Health care companies established in 1974 |
Mario Gareña, stage name of Jesús Arturo García Peña (25 September 1932 – 25 August 2021) was a Colombian singer and composer. He was one of the most prolific singers of cumbia music and was known for the song Yo me llamo cumbia.
Biography
Gareña was born on 25 September 1932 in Barranquilla. He started his career in 1951 and joined an orchestra in Cali. He then joined the Orquestra Sonolux in Medellín. During the 1960s, he moved to Bogotá and started a career as a singer, performing in nightclubs and appearing on television. He also appeared in the films Mares de pasión and Cumbia.
In 1966, Gareña was voted most popular singer in Colombia by Caracol Radio. In 1969, he recorded his most famous song, Yo me llamo cumbia, which was covered by Leonor Gonzalez Mina. In 1970, he represented Colombia at the Festival Latinoamericano de la Canción de Nueva York with the song Te dejo la ciudad sin mí, performed by Los Ángeles Negros. In 1978, he recorded another highly successful song, Raza, which denounced racism towards Afro-Colombians. It reached great fame after a cover by Billo's Caracas Boys.
In the 1980s, Gareña appeared on television multiple times as a singer, but also as an actor in the telenovela Oro. His success led him to run in the 1990 Colombian presidential election. However, he only earned 2,411 votes, and left the music scene afterwards.
Mario Gareña died in Salt Lake City on 25 August 2021 at the age of 88.
References
1932 births
2021 deaths
20th-century Colombian male singers
Cumbia musicians
People from Barranquilla |
Nikolai Zhilyayev may refer to:
Nikolai Zhilyayev (musicologist) (1881–1938), Russian musicologist
Nikolai Zhilyayev (footballer) (born 1987), Russian soccer player |
Walzbachtal is a municipality in northwestern Karlsruhe district in Baden-Württemberg, Germany.
It was formed from the villages of Jöhlingen and Wössingen in 1971.
References
Karlsruhe (district) |
Evacuation is a British children's reality television series presented by Matt Baker which was broadcast on CBBC between September 2006 and February 2008 where six boys and six girls from across the United Kingdom experienced living as evacuees in World War II.
Format
The children lived exactly as wartime evacuees would have: they ate meals, attended school, wore clothes, were given haircuts, and were punished for misbehavior as was customary during the 1940s. In the first episode of both series, the children had to hand over all of their 21st century items (e.g. mobile phones), which were returned at the end of the series. They were also given gas masks and ID cards, which were carried at all times. The children engaged in traditional wartime activities, such as building air-raid shelters. When they were not being filmed, the adults continued to stay in character to maintain the illusion that the scenario was real.
Series one
The first series of Evacuation began transmission on CBBC on BBC One on 4 September 2006. The children were evacuated to the fictitious Castle Farm, where they experienced living as children who were evacuated to a traditional wartime farm.
Series two
The second series, known as Evacuation to the Manor House, began transmission on CBBC on BBC One on 17 January 2008. The children were evacuated to the fictitious Pradoe Hall, where they experienced living as children who were evacuated to a traditional 1940s manor house.
List of Children & Characters
Children, Series 1:
Luke Burton
Josh Opoku
Harry Cracknell
Richard Hall
Charlie McCutcheon
Felix Chancellor-Burton
Natalie Travers (appeared only in the first three episodes; left due to homesickness)
Laura Adegoke
Natalie Hancock
Tia Hatton
Joanna Lau
Chelsea Thompson
Characters, Series 1:
Mr. and Mrs. Rivett, who own the farm (were later referred to as 'Uncle Brian' and 'Aunty Sue' with increased familiarity)
Miss Young, the school teacher
Mr. Storey, the local ARP Warden
Mr. Patrick, an elderly gentleman who works for Mr. Rivett as a farmhand
Mr. Graham, the local air-raid shelter expert
Miss Victoria, a member of the Women's Land Army
Matthew, the ploughman
Private Pickard, a Home Guardsman
The local vicar, never named on-screen
Children, Series 2:
Nishith "Nish" Hegde
Sean Williams
Jack Smith
Samir "Sam" Sayah
Scott Dunstan
Daniel Rushton
Shaaron Somasanduram
Olivia Barry
Rachel Hardy
Mary Ellen Jones
Jade Hitchmough
Annabella Jacobs
Sade Philpotts (arrived later in the series; only appeared in the final four episodes)
Characters, Series 2:
Lord and Lady Olstead, who own the manor house
Miss Young, the school teacher
Mr. Henderson, the butler
Mrs. Dobinson, the housekeeper
Cook, never named on-screen
Mr. Goodall, the gamekeeper
Miss Victoria, the kitchen hand
Nurse Durkin
Colonel Fanthorpe, of the Home Guard
Mr. Lewis, the ARP Warden
Mr. Jackson, the Fire Warden
Mr. Pugh, the shepherd
Mr. Ward, the farmer
Sergeant Rae
Helen drs wife Wendy Richardson
lady debbie Debbie Hunter
Notes
To maintain the illusion that the characters were real people, the closing credits never named the actors who played the characters.
Evacuation is a reality television show, meaning that there is no continuity between the two series; therefore the fact that Miss Young appears to be teaching at both Castle Farm and Pradoe Hall is irrelevant.
Although it is a reality television show, all the 1940s characters in the series are portrayed by role-playing actors, who were always referred to by their character's name.
Episodes
List of Evacuation episodes
External links
2006 British television series debuts
2008 British television series endings
2000s British children's television series
BBC children's television shows
English-language television shows
British reality television series
Historical reality television series
Television series by Warner Bros. Television Studios |
{{DISPLAYTITLE:C18H22N2O}}
The molecular formula C18H22N2O (molar mass: 282.38 g/mol) may refer to:
PD 144418
SF-6847
Molecular formulas |
See You Next Tuesday is the second and final studio album by FannyPack. It was released on May 10, 2005 under Tommy Boy Records. The album's hits were "Nu Nu (Yeah Yeah)," "Fire Fire," and "On My Lap."
Track listing
References
External links
2005 albums
FannyPack albums
Tommy Boy Records albums |
U-Control can refer to:
"U-Control", Universal Studios own HDi Interactive Format template for the interactive technology used in HD DVD movies, later ported to the BD-J format for use in Blu-ray movies.
Control line (also called "U-Control" in some countries), a way for an operator for controlling a flying model aircraft via pair of wires from the ground. |
Aatadukundam Raa () is a 2016 Telugu-language action comedy drama film directed by G. Nageswara Reddy. The film stars Sushanth and Sonam Bajwa in the lead roles.
Cast
Sushanth as Karthik
Sonam Bajwa as Shruthi
Anand as Anand Rao
Murali Sharma as Vijay Rao
Brahmanandam as Girija Rao
Posani Krishna Murali as Somaraju
Raghu Babu as Kanaka Rao
Rama Prabha
Prudhvi Raj
Vennela Kishore as Karthik's friend
Jhansi
Ananth Babu
Guest appearances
Naga Chaitanya
Akhil Akkineni in the song "Aatadukundam Raa"
Soundtrack
The music was composed by Anup Rubens. The song "Palleku Podam" from Devadasu was reused for this film.
Release
A critic from The Times of India states that "This film is a classic example of another film cashing in on the names of celebs". A critic from The Hindu wrote that "Rather than stepping into this time machine, watch some old hits of ANR or Nagarjuna".
References
External links
2010s Telugu-language films
Indian action comedy films
2016 masala films
Films about time travel
2016 films
Films directed by G. Nageswara Reddy
Films set in ancient India |
This is a list of people associated with Northampton, a town in the East Midlands region of England. The demonym of Northampton is Northamptonian. The list is arranged alphabetically by surname.
A
Robert Adams (1917–1984), sculptor and designer, was born in Far Cotton.
Antoine Allen (born 1987) Presenter, TV reporter and writer, was born in Northampton.
Will Alsop (1947-2018), architect, who designed the Sharp Centre for Design in Toronto and North Greenwich tube station, was born, raised and studied for his foundation degree in the town.
William Alwyn (1905–1985), composer, conductor, and music teacher, was born in the town.
Toby Anstis (born 1970), TV and radio presenter
Sir Malcolm Arnold (1921–2006), classical composer, was born in the town.
Daniel Ash (born 1957) guitarist from group Bauhaus was born in Northampton.
Phillip Austin (born 1969) triple murderer was born and committed his crimes here.
B
Lilian Bader (1918 –2015), one of the first Black women to join the British armed forces, moved to Northamptonshire after the Second World War.
George Baker (1781–1851), topographer and historian, was born in the town
Bauhaus (1978–1983, 1998, 2005–2008, 2019-present), a gothic rock band, formed in Northampton
Henry Bird (15 July 1909 – 16 April 2000), an English artist from Northampton who painted murals and female nudes
John Blissard (23 May 1803 – 10 December 1875), educator and mathematician who invented umbral calculus
Margaret Bondfield (1873–1953), Labour MP for Northampton in 1923, first female Cabinet minister in the UK and one of the first three female Labour MPs
John de Bothby (c. 1320 – c. 1382), former Lord Chancellor of Ireland, spent his last years as vicar of the church of The Holy Sepulchre
Elizabeth Bowen (1899–1973), 20th-century Anglo-Irish writer, lived in the town after her marriage.
Anne Bradstreet (c. 1612–1672), a puritan poet later based in Massachusetts, was born in Northampton.
VV Brown (born 1983), recording artist, born in Northampton
Charles Bradlaugh, politician, MP during some the Victorian period, refused to take a religious oath when elected, so his seat was refused. Led to the Bradlaugh riots with several by-elections. Outcome was the Affirmation.
Alban Butler (1710–1773), Roman Catholic priest and hagiographer, born in the town
C
Dallas Campbell (born 1970), TV presenter, studied Drama and English at the University of Northampton between 1989 and 1992.
Judy Carne (1939–2015), comedy actress in the United States, was born Joyce Botterill in the town
Alan Carr (born 1976), comedian, grew up in Northampton and attended what is now Weston Favell Academy. His father Graham Carr managed Northampton Town FC.
William George Carr (1901-1996), Executive Secretary of the National Education Association 1952–1967.
Samuel Cartwright (1789–1864), dentist who did much to improve the profession, born in the town according to some sources but more likely in London.
Alan Civil (1929-1989), horn player in the Royal Philharmonic Orchestra, Berlin Philharmonic Orchestra, Philharmonia and BBC Symphony Orchestra.
John Clare (1793–1864), poet, was detained in Northampton County Lunatic Asylum, now St Andrew's Hospital, where he died
Ben Cohen (born 1978), activist and former England rugby union international player who began his career with Northampton Saints in 1996.
Richard Coles (born 1962), musician, journalist and openly gay Church of England priest, was born in Northampton and lived in the area.
Maureen Colquhoun (born 1928), Labour MP for Northampton North in 1974 was the UK's first openly lesbian MP.
Andrew Collins (born 1965), journalist and broadcaster, grew up in the town and wrote about it in his memoir Where Did It All Go Right?
Francis Crick (1916–2004), Nobel Prize winner, molecular biologist, biophysicist, neuroscientist. Noted as a co-discoverer of the structure of the DNA molecule in 1953 with James D. Watson, was born in the town. In December 2005, a public sculpture, Discovery by Lucy Glendinning, was erected in Abington Street as a memorial. See also: Francis Crick Institute
Michael Crick (born 1958) journalist, author, broadcaster, and founding member of Channel 4 News Team in 1982
Andy Crofts (born 1977), musician, raised in Northampton. Lead singer of The Moons and bass player for artist Paul Weller.
Sam Curran (born 1998), professional cricketer for Surrey and England.
D
Jamie Delano (born 1954), writer of Hellblazer, 2020 Visions, World Without End, and Cruel and Unusual, is a lifelong resident.
The Departure (2004–2008), rock band, formed in Northampton.
Delia Derbyshire (1937–2001), produced the original Doctor Who theme tune, spent her final years in the town.
Frank Dickens (1899–1986), biochemist best known for his work on the pentose phosphate pathway, which produces NADPH, was born in the town
Philip Doddridge (1702–1751), an English Nonconformist leader, educator, and hymnwriter, spent some of his years in the town.
F
Marcia Falkender, Baroness Falkender (1932-2019), formerly Marcia Williams, private secretary to Prime Minister Harold Wilson, was educated at Northampton High School for Girls.
Anne Fine (born 1947), author of children's literature, notably Madame Doubtfire, attended Northampton High School for Girls.
Pat Fish (1957-2021), leader of The Jazz Butcher, was raised in Northampton.
Lorna Fitzgerald (born 1996), an actress best known for Abi Branning in EastEnders.
Errol Flynn (1909–1959), worked in the Repertory Theatre, now Royal Theatre, from 1933 to 1934.
Tyron Frampton (born 1994), known as slowthai, rapper who grew up in the Lings area of Northampton.
Benjamin Franklin's family is from Ecton, east of Northampton.
Alistair Fruish, a writer, novelist and filmmaker, was born and lives in Northampton.
G
Violet Gibson (1876–1956), best known for trying to assassinate Benito Mussolini in 1926, spent the rest of her life in St Andrews Hospital and was buried in Kingsthorpe.
Roger Goody (born 1944) biochemist, Emeritus Director Max-Planck-Institute, Dortmund, Germany
Ray Gosling (1939–2013), journalist, author, broadcaster and gay rights activist, was educated at what is now Northampton School for Boys
Robert Goodman (born 1955), actor, attended Headlands primary and Weston Favell upper school.
Nick Greenhalgh (born 1989), former professional Rugby player
H
Mark Haddon (born 1962), novelist and poet best known for his 2003 novel The Curious Incident of the Dog in the Night-time, was born in the town.
Andy Hamilton (born 1974), Autumnwatch forager and author, was born and raised in Northampton.
James Harrington (1611–1677), philosopher and author of The Commonwealth of Oceana, was born at nearby Upton Hall.
"Whispering Bob Harris" (born 1946), radio presenter, was born in the town.
Kevin Haskins (born 1960), drummer from group Bauhaus (band), was born in Northampton.
James Hervey (1714–1758), 18th-century philosopher, was born in the town.
Joan Hickson (1906–1998), who played Miss Marple, was born in Kingsthorpe.
Anthony Higgins (born 1947), actor
Trevor Hold (1939-2004), composer of song cycles and also a poet, was born in Northampton.
Polly Ho-Yen, author, was born in Northampton.
Keith Huewen (born 1957), former international motorcycle racer and current sports broadcaster, lives in Northampton
William Hull (1843–1934), architect, lived and practiced in Northampton
Rebecca Hunter (born 1981), singer from pop group allSTARS*, was born in Northampton.
J
David J (born 1957), real name David John Haskins, bassist from Bauhaus (band), was born in Northampton.
Ruaridh Jackson (born 1988), plays rugby union for Glasgow Warriors and Scotland, was born in the town.
Jerome K. Jerome (1859–1927), author of Three Men in a Boat and other works, died in Northampton.
Lesley Joseph (born 1945), Birds of a Feather actress, grew up in the town.
K
Ivan Kaye (born 1961), EastEnders and The Green Green Grass actor, was born in the town.
Jack Keeping (born 1996), cricketer
L
Edmund Francis Law, 19th-century architect
Leadley (born 1995), singer-songwriter, presenter, and YouTuber is based in Northampton.
Clive Lewis (politician) (born 1971) Member of Parliament for Norwich South (UK Parliament constituency)
Robert Llewellyn (born 1956), played Kryten from Red Dwarf, was born here and lived at 47 Booth Rise until the age of 13.
M
Maps (born ), Northampton-based Mercury-nominated musician
Callum McGregor, (1995), professional footballer who currently plays for Cardiff City and the Republic of Ireland national team.
Medium 21 (1999–2004), alternative rock band, formed at Northampton College
Tim Minchin (born 1975), comedian, actor and musician, was born in Northampton.
Edgar Mobbs (1882–1917), rugby union footballer played for and captained Northampton R.F.C. and England; Lieutenant Colonel, Northamptonshire Regiment, killed in action during the Third Battle of Ypres.
Alan Moore (born 1953), writer of V for Vendetta, Watchmen, and The League of Extraordinary Gentlemen, is a lifelong resident. His first novel Voice of the Fire is a fictionalised history of the town. His 2016 novel Jerusalem is also set in the town.
James Morrison (born 1984), singer-songwriter, lived in the town for 18 months and went to Kingsthorpe Middle School.
Peter Murphy (born 1957), singer from Bauhaus was born in Northampton
Pat McGrath (born 1970), make-up artist.
N
Henry Nelson, 7th Earl Nelson (1894–1972), was born here
Nanette Newman (born 1934), actress and author, wife of Bryan Forbes was born here
New Cassettes (formed 2005), indie rock band, formed in Northampton
O
Des O'Connor (1932–2020), television presenter and singer, was evacuated to the town in World War II and briefly played for Northampton Town FC.
P
Louise Pentland (born 1985), fashion and beauty vlogger, author, and internet personality
Spencer Perceval (1762–1812), only MP for Northampton to have held the office of Prime Minister and only Prime Minister to have been assassinated
Pickering Phipps (1827–1890), brewer, Mayor of Northampton (1860–1866) and Conservative MP for Northampton (1874–1880)
Peter Purves (born 1939), former Blue Peter presenter & former weekend presenter BBC Radio Northampton; lived for a number of years at the old rectory in Cogenhoe
R
Derek Redmond (born 1965), Olympic runner, was born and raised here and attended Roade Comprehensive School, now the Elizabeth Woodville School, where the sports hall is named after him.
Edmund Rubbra (1901–1986), composer, was born in Semilong.
Jarnéia Richard-Noel (born 1994), stage actress and singer
S
Gian Sammarco (born 1970), the actor who played Adrian Mole in The Secret Diary of Adrian Mole, Aged 13¾ and The Growing Pains of Adrian Mole, was born and resides in the town.
Norman Smiley (born 1965), professional wrestler, was born here.
Matt Smith (born 1982), who played the Eleventh Doctor in Doctor Who, was born and raised in the town and attended Northampton School for Boys.
Robert Spencer, 2nd Earl of Sunderland (1640-1702) of Althorp, statesman.
Charles Spencer, 3rd Earl of Sunderland (1675-1722) of Althorp, First Lord of the Treasury 1718–21.
Charles Spencer, 3rd Duke of Marlborough (1706–58) of Althorp, inherited Blenheim Palace and succeeded as Duke of Marlborough 1733.
George Spencer, 2nd Earl Spencer (1758-1834) First Lord of the Admiralty 1794-1801 (before Trafalgar selected Admiral Nelson for command of the fleet) and Home Secretary 1806–07.
John Spencer, 3rd Earl Spencer (1782-1845) Chancellor of the Exchequer and Leader of the House of Commons 1830-34 ("Lord Althorp of the Reform Bill"), founder and first President of the Royal Agricultural Society.
John Spencer, 5th Earl Spencer (1835-1910) Lord Lieutenant of Ireland 1868-74 and 1882–85, First Lord of the Admiralty 1892–95, Leader of the Liberal Party 1902–05.
George Spencer (younger son of the second Earl Spencer) (1799-1864) known as Father Ignatius Spencer of the Order of Passionists, a saintly leader of the Catholic Revival in England. Declared "Venerable" by Pope Francis in 2021 and now being considered for beatification.
Diana, Princess of Wales (1961–1997) is buried at Althorp, country estate of her brother, Charles Spencer, 9th Earl Spencer (born 1964). In 1989 she and Charles, Prince of Wales paid an official visit to Northampton, where Diana was made an Honorary Freeman. There is a bronze plaque in her memory outside the Guildhall 1992 extension.
Lindsey Stagg (born 1970), a child actress who played Pandora Braithwaite in The Secret Diary of Adrian Mole, Aged 13¾ and The Growing Pains of Adrian Mole, was born in Northampton.
Martin Stanford, presenter Sky News
Charles ("C.T.") Studd (1860–1931), Victorian cricketer and pioneer missionary who played in the first Ashes test, was born in Spratton
Graeme Swann (born 1979), cricketer born in Northampton, played for Northamptonshire County Cricket Club in 1998–2004 before moving to Nottinghamshire. He also a former England player in all three formats of the game between 2000 and 2013.
T
Ivan Toney (born 1996) professional footballer currently playing for Brentford F.C. Toney became the youngest player to represent Northampton Town Football Club when he made his first-team debut in 2012.
Faye Tozer (born 1975), singer from pop group Steps, was born in Northampton.
Walter Tull (1888–1918), a Northampton Town FC player who became Britain's first black army officer in the First World War
Sophie Turner, (born 21 February 1996) actress
U
Michael Underwood (born 1975), TV presenter, lives in the town, having attended what is now Weston Favell Academy.
W
Joan Wake (1884–1974), born at Courteenhall, was a historian of Northamptonshire, who played a major role in saving Delapre Abbey from destruction.
Robert Walker (born 18 March 1946), English composer, writer and broadcaster, was born in Northampton.
Marc Warren (born 1967), played Danny Blue in the BBC's Hustle series, was born in Kingsthorpe.
Lawrence Washington (1602–1653), rector and an ancestor of the first US President George Washington, was born at Sulgrave Manor, 12 miles south-west of Northampton. Lawrence's great-grandfather, Lawrence Washington (c. 1500–1583), who purchased Sulgrave Manor from Henry VIII, was Mayor of Northampton in 1532 and 1545.
Jo Whiley (born 1965), former BBC Radio 1 presenter, now on BBC Radio 2, attended Campion School in Bugbrooke.
Cat White (born 1993), actress, producer, author and advisor for the United Nations, grew up in Northampton alongside sister Laura.
Laura White (born 1995), actress (Doctors) who grew up in Northampton alongside sister Cat White.
Bertha Willmott (1894-1973), actress, singer, comedienne and radio and music hall performer lived here for many years and died here.
Robert Woodford (1606–1654), who served as Steward of Northampton from 1635 onwards, is best known as the author of an extensive diary for the period 1637–1641.
Stuart Pearson Wright (born 1975), award-winning artist, born in Northampton, BP Portrait Award winner
Alan Walker (born 1997), British-Norwegian disc jockey
Y
Thom Yorke (born 1968), Radiohead lyricist and vocalist
References
Northampton |
United for Change (UfC) is a British political movement, founded on a centrist platform. The movement gained attention after fundraising through large donations from philanthropists and donors was reported. Although only launched in August 2018, it had reportedly been in the process of development for at least a year.
It has subsequently been rebranded as the United Party for its launch as a political party.
History
In April 2018, British press reported that former Labour donor Simon Franks had set up a company, the Project One Movement, aimed at potentially forming a political party and fielding candidates at an election. It received commitments of roughly £5 million in funding from founders, and was compared to En Marche! in France. In August 2018, United for Change was launched as the political campaign name of the Project One Movement.
In late August 2018, one of the founders of the movement Adam Knight left to set up his own political organisation. He later voiced his support for the Liberal Democrats. The founders of United for Change are Simon Franks, Dr Saima Rana, Alex Chesterman OBE, Richard Reed CBE, Ceawlin Thynn, Ryan Wain, James Woolf.
Simon Franks has said he wants to make United for Change a grassroots movement, with the aim of launching United for Change as a registered political party just after Brexit.
As of June 2019, it has reportedly scaled back its ambition to win the next general election as a new party but still seeks to launch fully as a political movement once Brexit is resolved.
References
Further reading
2018 establishments in the United Kingdom
Political parties established in 2018
Centrist political parties in the United Kingdom |
The BTR-70 is an eight-wheeled armored personnel carrier () originally developed by the Soviet Union during the late 1960s under the manufacturing code GAZ-4905. On August 21, 1972, it was accepted into Soviet service and would later be widely exported. Large quantities were also produced under license in Romania as the TAB-77.
The BTR-70 was developed as a potential successor for the earlier BTR-60 series of Soviet wheeled armored personnel carriers, specifically the BTR-60PB, which it most closely resembled. It evolved out of an earlier, unsuccessful project known as the GAZ-50 to design a new wheeled infantry fighting vehicle on the chassis and drive train of a BTR-60PB. It initially received the NATO reporting name BTR M1970.
Development History
In 1971, the Soviet Armed Forces began investigating the possibility of an updated BTR-60PB redesigned to make the vehicle more compatible with the BMP-1 in terms of tactical training. This resulted in the development of a BTR-60PB prototype essentially converted into a wheeled infantry fighting vehicle, designated Obiekt 50 or GAZ-50. Despite retaining the original BTR-60PB chassis, the GAZ-50 incorporated several elements of the BMP's design, including similar seating arrangements in the passenger compartment. The revised internal layout reduced the number of passengers to nine. New hatches were also provided for debarking in the lower hull, between the second and third wheel stations. Other modifications included a slightly thicker hull, increased power-to-weight ratio, and additional firing ports. Another feature retained from the BTR-60 was the twin-engine arrangement, although in the GAZ-50 torque produced by the right engine powered the first and third wheel stations, while the left engine powered the second and fourth. This alteration was to allow the vehicle to continue moving even if one engine failed. The prototype was armed with a turret resembling that of the BMP-1, incorporating the same 73mm 2A28 Grom low-pressure smoothbore cannon.
There was some debate as to the GAZ-50s viability in its intended role; for example, projected manufacturing costs were high due to the incorporation of the BMP-1 turret and armament. Furthermore, while the prototype would allow motorized units to emulate the tactics of Soviet mechanized infantry, it simply did not offer the same protection, mobility, and firepower of the BMP. Most of the funding earmarked for the program was thus diverted into producing larger numbers of BMPs instead, as well as ensuring their wider introduction beyond Soviet tank divisions. A second GAZ-50 prototype was built, designated Obiekt 60 mounting a 14.5mm machine gun in exactly the same turret as that carried by the BTR-60 series; this was accepted as a generic replacement for the BTR-60PB in motorized rifle regiments. In Soviet service, the new BTRs received the designation BTR-70.
Compared to the earlier BTR-60PB, relatively small numbers of BTR-70s were produced. The design was still regarded as suffering from some of the same disadvantages, such as the two flammable petrol engines and the poor means of entry and exit. These flaws became especially evident when the vehicle was tested in combat during the Soviet–Afghan War. As a result, in 1984 the Soviet Army took delivery of a new wheeled armored personnel carrier, the BTR-80, which was powered by a single 260 horsepower diesel engine and a simpler drive train. Production of the BTR-70 was terminated that year.
The Soviet Union only exported BTR-70s to four other states: Afghanistan, the German Democratic Republic (East Germany), Hungary, and Romania, which also purchased a license to manufacture the design locally. However, many have since been inherited by the armies of various post-Soviet republics or re-exported.
Equipment
The BTR-70 is powered by two petrol engines. Early production vehicles used 115 hp GAZ-69B 6-cylinder engines, but most vehicles have now been retrofitted with the more powerful ZMZ-49-05 V-8 engines. The vehicle is fully amphibious, propelled when afloat by a single water jet mounted at the rear of the hull. To prepare the vehicle for water, the driver erects a trim vane and switches on the bilge pumps from within the vehicle.
The standard equipment includes a central tire-pressure regulation system that allows the driver to adjust the tire-pressure to suit the terrain being crossed. Also fitted is an R-123M radio set and an R-124 intercom. The driver's optical equipment consists of three TNPO-115 vision blocks and a TNP-B day vision device, which can be replaced by a TVNO-2B night vision device. The commander also has three TNPO-115s and either a TPKU-2B day sight or a TKN-1S night sight accompanied by an OU-3GA-2 infra-red search light. The turret is fitted with a PP-61AM (or 1PZ-2) periscopic sight for the gunner and the infantry group in the troop compartment is provided with TNP-B devices. The BTR-70 also has an FVU NBC filter system and a DK-3B detection device.
The armaments consist of a KPVT heavy machine gun with 500 rounds and a coaxial 7.62 mm PKT machine gun with 2,000 rounds. Also on board are two "Igla" or "Strela-3" MANPADS, and optionally two AGS-17 grenade launchers at the expense of two infantry men.
Variants
Soviet Union/Russian Federation
BTR-70: Basic APC version, as described.
BTR-70 obr. 1978: Initial version, publicly displayed in 1980.
BTR-70 obr. 1982: Improved model with 120 hp ZMZ-49-05 V-8 engines, instead of the original GAZ-49B 115 hp 6-cylinder engines.
BTR-70 obr. 1984: Slightly modified model with an additional TNPT-1 periscope on the turret roof.
BTR-70 obr. 1986: Improved version with a periscope on the left side of the turret and four firing ports in the hull roof.
BTR-70V: Late-production model fitted with the BPU-1 turret of the BTR-80, with an 1PZ-2 sight, but without the "Tucha" smoke grenade launchers.
BTR-70M: Modernized version with turret, diesel engine and rear hull section of the BTR-80. Users include Nicaragua, Kyrgyz Republic, Mongolia and Syria.
BTR-70D: Diesel version, developed by Muromteplovoz and powered by a YaMZ-236D 180 hp diesel engine. Prototype only.
SPR-2 "Rtut-B" (stantsiya pomekh radiovzryvatelyam): Electronic warfare variant, designed to detonate artillery shells with proximity fuze detonators.
SPR-2M: Modified version with more compact equipment.
BTR-70K (komandnyj): Command vehicle with additional radios, several whip antennas, navigation device and a portable generator.
BTR-70KShM (komandno-shtabnaya mashina): Command and control variant, designed to be used as a mobile command post.2S14 Zhalo-S: Wheeled tank destroyer, armed with a 2A62 85 mm gun. Prototype only.
SA-22 (spetsapparatnaya mashina): command vehicle.
15Ya56M MBP (mashina boyevogo posta): base security vehicle for Strategic Rocket units. The original turret has been replaced by a new type with an 1PN22M1 improved sight, loudspeakers, OU-3GA-2 IR search lights, additional TNPO-170 periscopes and an NSVT 12.7 mm machine gun.
BTR-80Ukraine
BTR-70D: Upgraded from 2001 by NRMZ and fitted with a 300 hp diesel engine. Ukrainian army vehicles additionally have BTR-80 style two-piece escape hatches in the hull sides.
BTR-70DI (BTR-7): With Euro II 276 hp diesel engine from IVECO. Can be optionally fitted with "Ingul" or "Bug" modular turrets or with the "Zaslon" active protection system. The basic armament is augmented by an AGS-30 automatic grenade launcher and 2 AT rockets.
BTR-70M: Upgraded by Marozov and powered by a 300 hp engine UTD-20. Might be fitted with a new turret, like the "Grom" or BAU-23x2.
BTR-70SM: Unarmed ambulance with a re-designed hull. Three different models have been observed.
East-Germany
SPW 70 (Schützenpanzerwagen): NVA designator for Romanian-made BTR-70. 1,316 delivered between 1980 and 1990.
SPW 70(S): Locally converted staff vehicle with two extra radios, two/three whip antennas and a slim telescopic mast on the right side of the hull roof.
SPW 70(SL): Forward air control vehicle, equipped with an R-809M2 radio and fitted with four whip antennas.
SPW 70(Ch): NBC reconnaissance vehicle with detection and marking systems. Prototype only.
Slovakia/Belarus
Cobra-K: Fitted with a 2A42-Cobra modular turret. Might be optionally equipped with a new KamAZ-7403 diesel engine.
Belarus
BTR-70M-A1: Proposed upgrade from Minotaur with a diesel engine and improved transmission. The vehicle might retain the original turret or can be fitted with a new one, for example the CM30/BM30 (2A42-Cobra) "combat module".
BTR-MK a.k.a. KM-70: Proposed command vehicle (komandnaya mashina) from Minotaur with a crew of six and R-123M and R-13M radios.
MTP-K a.k.a. MTP-70: Technical support vehicle (mashina tekhnicheskoj pomoshchi), fitted with tow bars, a work platform and a light crane. This version retains the turret, but without the KPVT machine gun.
BTR-70MB1: Upgrade from 140 Repair plant with a diesel engine and improved transmission. It has been supplied to the Ivory Coast.
Azerbaijan
BTR-70M: Jihazgayirma Instrument Construction Plant in Baku presented some upgraded BTR-70s for the first time in March 2011. These vehicles have a new diesel engine and improved transmission. Optionally, the original machine-gun turret might be replaced with the "Şimşek" (Lightning) one-man turret. "Şimşek" was developed in partnership with South Africa's Emerging World Technologies (EWT) and appears to be a variant of EWT's Predator II light compact turret.
Romania
TAB-77 (transportorul amfibiu blindat): Romania not only built the BTR-70 under licence (for export), but also developed its own, improved version. While very similar, the TAB-77 has the same turret (with the LOTA aiming system) as the TAB-71. The original gasoline engines were replaced with Saviem 797-05M1 132 hp diesel engines.
TAB-77 M1983: upgraded version with a 30 mm gun and 9M14M "Malyutka" ATGM. Prototype.
TAB-77 M1984: upgraded version with a 23 mm gun and 9M14M "Malyutka" ATGM. Prototype.
TAB-77A PCOMA (punct de commanda şi observare mobil de artilerie): artillery command and forward observer vehicle with range finders in a big, unarmed turret. Armament consists of a single, pintle-mounted 7.62 mm machine gun on the hull roof.
TAB-77A R-1451/M: command vehicle with R-1070 and R-1451M radios. Similar to the basic APC, but with additional whip antennas and a rear-mounted generator.
TAB-77A R-1452: signals vehicle with an R-1452 radio, low-profile "dummy turret, seven whip antennas, a telescopic mast, two generators at the rear and a pintle-mounted machine gun on the hull roof.
TERA-77L (tractor de evacuare şi reparat auto): recovery vehicle with a 5t crane and a dozer blade.
TABC-79: shorter version with only four wheels. Several variants exist.
Chinese TAB-77: Chinese license built TAB-77, with a small number entering Chinese service for evaluation purpose in the 1980s. China purchased the production license from Romania in 1984, and even retained the original Romanian designation TAB-77. The Chinese built TAB-77 is heavier, weighing more than 13 tons.
Sudan
Shareef-3''' Revealed in March 2019, replaced both engines with single diesel engine, while adding BMP-1 turret, capacity for six dismounts.
Combat history
The BTR-70 first saw service during the Soviet–Afghan War. A very small quantity of BTR-70s were donated or sold to the People's Armed Forces for the Liberation of Angola in the mid-1980s by an undisclosed country; these saw action during the Angolan Civil War. BTR-70s were deployed by the United Nations Protection Force (UNPROFOR) in Bosnia-Herzegovina during the Yugoslav Wars.
BTR-70s of the Armed Forces of Ukraine have been deployed in the War in Donbass, with some being captured by pro-Russian militias of the Donetsk People's Republic.
During 2021 Kyrgyzstan–Tajikistan clashes BTR-70s were deployed by Kyrgyzstan with at least one BTR-70M lost to enemy fire.
During the 2022 Russian invasion of Ukraine, BTR-70s were deployed by Russia with four BTR-70s lost (three destroyed, one captured) and three BTR-70M (two destroyed, one captured) visually confirmed by Oryx as of 4 September 2023.
Operators
Current operators
: 360
: 150
: 55
: 30; some modernized to BTR-70Di/BTR-7 standard with 30mm cannon and anti-tank missiles.
: 20
: some; all modernized to BTR-70M standard.
: More than 9; purchased from Bulgaria and Russia.
: 85
: 60
Palestinian National Authority: 50
: 95 in service with the Russian Naval Infantry.
: 3
: 31; 2 Kobra K-2 variant.
: 7; used for OPFOR training exercises.
: 20
Former operators
: 1,266
: Passed on to successor states.
United Nations Protection Force: 452; donated by Germany.
See also
BTR-60
BTR-80
BTR-90
BTR-94
Notes
References
Gau L-R., Plate J., Siegert J. (2001). Deutsche Militärfahrzeuge - Bundeswehr und NVA. Motorbuch Verlag. .
A.V. Karpenko (1996). Obozreniye Bronetankovoj Tekhniki (1905-1995 gg.)'' Nevskij Bastion.
External links
BTR-70 Technical data sheet and pictures BTR-70 ArmyRecognition.com
FAS page
Description (in Russian) and photo gallery at armoured.vif2.ru
BTR-70 in detail (in Russian)
Amphibious armoured personnel carriers
Armoured personnel carriers of the Soviet Union
Armoured personnel carriers of the Cold War
Eight-wheeled vehicles
GAZ Group military vehicles
Military vehicles introduced in the 1970s
Wheeled amphibious armoured fighting vehicles
Wheeled armoured personnel carriers |
PGA Tour 96 is a sports video game developed by Hitmen Productions for the PlayStation, MS-DOS, and Windows versions, Unexpected Development for the Game Boy version, NuFX for the Sega Genesis and 3DO versions, Ceris Software for the Game Gear version, and Polygames for the SNES version and published by EA Sports for PlayStation, MS-DOS, Windows, Game Boy, Sega Genesis, 3DO, Game Gear and SNES.
Gameplay
It has fewer courses and golfers than previous installments. The game features 10 professional golfers as playable or as CPU opponents: Brad Faxon, Lee Janzen, Tom Kite, Bruce Lietzke, Davis Love III, Mark O’Meara, Peter Jacobsen, Jeff Sluman, Craig Stadler, and Fuzzy Zoeller. The featured courses are Spyglass Hill, TPC at Sawgrass, TPC at River Highlands. The game has four modes: stroke play, match play, tournament mode, and practice mode. Golf clubs are assigned automatically by the caddie as the computer deems suitable for every lie and every situation.
Reception
Electronic Gaming Monthly's two sports reviewers gave the PlayStation version scores of 8.5 and 9.0 out of 10, remarking that it retained the excellent aspects of previous games in the series while dramatically improving on the graphics. They also felt that it successfully appealed to both novices and golfing pros. GamePro criticized it for having only two courses but highly praised the precise level of control over each shot, selection of players, three dimensional terrain, and digitized sprites. They concluded that "With spectacular graphics and amazingly comprehensive controls, PGA Tour '96 immerses you in intense armchair golf." In contrast, Maximum called it "the weakest of the series yet". While they too approved of the ability to control every aspect of each shot, they felt that the game was ruined by the unrealistic ball physics, particularly that balls stop dead with almost no rolling when they hit the ground, and that putted balls stop suddenly instead of gradually slowing. Next Generation approved of the game for its easy interface and numerous play options, though unlike GamePro and EGM they found the graphics to be "a little on the underwhelming side" by the standards of current generation consoles.
Reviewing the 3DO version, Johnny Ballgame of GamePro commented, "If you thought golf was boring, think again." He was pleased with the selection of modes, accurate controls, and sound, and said that the graphics, though slightly grainier than in the PlayStation version, are stunningly lifelike in absolute terms. A reviewer for Next Generation found the game was an effective "jump in and play" experience, but lacked the realism and level of content that serious golfers would expect from a golf video game.
Air Hendrix of GamePro remarked, "EA Sports tried to cram its marvelous PlayStation PGA game into a Genesis cart, and it just didn't fit." In addition to the inferior graphics and slow screen redrawing, he criticized the absence of the shot-planning features seen in the PlayStation version and previous iterations on the Genesis, saying this makes it impossible to precisely calculate one's shots. He gave the SNES version a lukewarm review, saying it fails to outdo the Genesis's PGA Tour Golf III, due to the weak audio and absence of features like backspin and 3D terrain, but is superior to the Genesis version of the game and makes an overall "good round of golf". He praised the detailed backgrounds and fluid movements. GamePros Scary Larry praised the Game Boy version as offering good options, graphics, sounds, and most importantly, an appealing "plug-and-play" style. He was less pleased with the Game Gear version, saying that the graphics and presentation enhancements serve mainly to slow the game down with heavy screen redraw.
Next Generation reviewed the Genesis version of the game, and stated that "if you haven't sampled any of the PGA series, it is still the best golf game available for the 16-bit machines and a fine addition to your library."
References
External links
1995 video games
3DO Interactive Multiplayer games
EA Sports games
Game Boy games
Game Gear games
Golf video games
Hitmen Productions games
Multiplayer and single-player video games
NuFX games
PlayStation (console) games
Sega Genesis games
Super Nintendo Entertainment System games
Unexpected Development games
Video games set in 1996 |
George Anthony Bartlett (born 14 March 1998) is an English cricketer who plays for Somerset County Cricket Club. He made his first-class debut for the county in the 2017 County Championship against Warwickshire on 5 September 2017. He made his List A debut on 24 April 2019, for Somerset in the 2019 Royal London One-Day Cup. He made his Twenty20 debut on 30 August 2020, for Somerset in the 2020 t20 Blast.
In August 2023, Bartlett confirmed that he would be leaving Somerset at the end of the season and had signed a three-year contract with Northamptonshire ahead of the 2024 season.
References
External links
1998 births
Living people
English cricketers
Somerset cricketers
Cricketers from Frimley
People educated at Millfield |
Cingalesa is a monotypic moth genus of the family Noctuidae. Its only species, Cingalesa strigicosta, is found in Sri Lanka. Both the genus and species were first described by George Hampson, the genus in 1894 and the species in 1893.
Description
Palpi upturned, where the second joint reaching vertex of head, the third joint minute. Thorax and abdomen tuftless. Forewings with vein 6 absent, veins 8 to 10 stalked. Hindwings with stalked veins 3, 4 and 6, 7.
References
Acontiinae
Moths of Asia
Moths described in 1893
Monotypic moth genera |
The Port of Durban, commonly called Durban Harbour, is the largest and busiest shipping terminal in sub-Saharan Africa. It handles up to 31.4 million tons of cargo each year. It is the fourth largest container terminal in the Southern Hemisphere, handling approximately 4.5 million TEU in 2019.
Port statistics
Durban is the busiest port in South Africa and generates more than 60% of revenue.
It is the second largest container port in Africa (after Port Said in Egypt).
It is the fourth largest container port in Southern Hemisphere. (First is Jakarta in Indonesia, second is Surabaya in Indonesia, third is Santos in Brazil).
The distance around the port is .
Rail tracks total .
The port has 58 berths which are operated by more than 20 terminal operators.
Over 4,500 commercial vessels call at the port each year.
The port has recently been widened. The harbor entrance depth is now in the approach channel decreasing to 16 metres within the harbour. The navigation width is now .
The port saw a drop of "5 per cent of the liner shipping services, 6.2 per cent of ship calls and 2.8 per cent of the deployed capacity" during the second quarter of 2020 due to the adverse impact of the global COVID-19 pandemic. However, the maximum capacity of container ships calling at the port increased by 14.5 percent during the same time period.
Port facilities
Berths
Pier No. 1 Berth
Pier No. 2 Berth
Point and T-Jetty Berth
Cross Berth
Island View
Bluff Berth
Bayhead Berth
Maydon Wharf Berth
Car terminal
Durban Car Terminal opened in 1998, with a capacity of 60,000 vehicles a year. In 2004 a 100-million-Rand expansion brought the number of bays to 6,500. This included a 380m bridge linking the terminal to the quayside, improving vessel turnaround time and improving security.
Cruise terminal
MSC Cruises bases the MSC Musica in Durban from November to April every year. From the 2019/2020 Southern Africa cruise season MSC Cruises will be basing the newer MSC Orchestra in Durban. Many other cruise ships pass through Durban every year, including some of the world's biggest, such as the RMS Queen Mary 2.
The tender to build the R215 million Durban Cruise Terminal was awarded to KwaZulu Cruise Terminal (Pty) Ltd which is 70% owned by MSC Cruises SA and 30% by Africa Armada Consortium. The terminal will be able to accommodate two cruise ships at any given time.
Naval facilities
Naval Base Durban, situated on Salisbury Island, is part of the Port of Durban. Established during the Second World War, it was downgraded to a naval station in 2002. In 2012 a decision was made to renovate and expand the facilities back up to a full naval base to accommodate the South African Navy's offshore patrol flotilla. In December 2015 it was redesignated a naval base. It is the home port of three Warrior-class interim offshore patrol vessels (formerly missile-armed fast attack craft) which will be replaced by a new patrol flotilla within four to five years.
Expansion plans
In April 2021, South African officials revealed a $7 billion modernization and expansion plan of the port facilities in order to increase efficiency and improve its standing as one of Africa's best and biggest ports. The program is expected expand port capacity from 2.9 million TEU to more than 11 million TEU by 2031.
The plan has been criticized by labour unions over not being consulted on the construction contracts, and warned that the government's intention to partner with the private sector to complete the expansion could lead to job losses for a highly indebted state-owned company.
See also
List of ports of entry in South Africa
2021 Transnet Cyberattack
References
External links
Durban
Transport in Durban
Infrastructure in South Africa |
The Group of 88 is the term for those professors at Duke University in North Carolina who in April 2006 were signatories to a controversial advertisement in The Chronicle, the university's independent student newspaper. The advertisement addressed the Duke lacrosse case of the previous month, in which an African-American woman claimed to have been raped by three white members of Duke's lacrosse team at a party where she was hired as a dancer.
The incident was under police investigation when the ad was published, and the signatories were criticized for commenting on the case at that stage. They stated that they were trying to start a dialog about issues of race and sexual assault at the university.
On April 11, 2007, the N.C. Attorney General's Office dropped all charges against the players, declaring them innocent, and called them victims of a rogue prosecutor's "tragic rush to accuse".
Background
Duke lacrosse case
Crystal Mangum, an African-American student at North Carolina Central University who worked part-time as a stripper, was hired to perform at a party held on March 13, 2006 at the house of two of the lacrosse team's captains in Durham, North Carolina. Several hours after the party, after becoming involved in an altercation that required police assistance, Mangum told police that three white Duke University lacrosse team members had raped her. Her allegations were later shown to be false and without basis.
Background of the Chronicle advertisement
Publicity about the scandal spread quickly. National media highlighted the class and racial differences between Mangum and the players. Many commentators and observers rushed to judgment.
At an African & African-American Studies forum on March 29 at Duke, organizers invited students "to voice their frustration with the current situation and, it became apparent, with the university as a whole". The students' remarks formed the basis for the advertisement.
The ad, entitled "What Does a Social Disaster Sound Like?", included compiled quotes from students at the forum, who were expressing concerns about conditions at Duke. The page cited anonymous student claims of sexism and racial harassment at the Duke campus. Students were encouraged to continue to express their concerns. 88 Duke Humanities professors signed their names to the open letter.
Commentary and criticism
National media
John Podhoretz wrote in the New York Post that: "The school has perhaps 700 professors who teach undergrads. So, at a moment when Duke students were being shadowed by a rape accusation, one-ninth of their professoriate had effectively declared that those students did not deserve the presumption of innocence – primarily because so many of their fellow students were supposedly being victimized by the atmosphere of 'racism and sexism. Podhoretz quoted Stephen Baldwin, a professor of chemistry who said: "There was a collision between political correctness and due process, and political correctness won."
In Howard Wasserman's book Institutional Failures (2010), he cites a university investigation at the time into the lacrosse players' personal behavior by Duke Law School professor James Earl Coleman. He found that the players charged with alleged rape were "good students who caused no problems in the class, treated Duke staffers with respect...and had no record of sexist, racist, or other forms of anti-social behavior."
Duke students and faculty
Kim Curtis, a visiting associate professor in the Political Science department who specializes in political and feminist theory, was among the signers of the April 2006 piece in The Chronicle.
That semester she failed two members of the lacrosse team who were in one of her classes. When one of them appealed the grade, Duke did not act immediately. Eventually the university administration raised his grade from "F" to "D". Kyle Dowd and his parents sued Curtis and the university. Duke later settled, and recorded his grade as "Pass".
Michael Gustafson, a Duke engineering professor cited in Johnson and Taylor's 2010 book, expressed concerns that restrictions on stereotyping had not been observed and after the scandal broke, the student athletes were assumed to be guilty. He suggested that the accused lacrosse players had not been evaluated as individuals, but as caricatures, making it easier for commentators to criticize them.
English professor Cathy Davidson was among those who signed the ad. She published an Opinion piece in the Raleigh News & Observer in January 2007, saying that the ad "expressed the anguish of students who felt demeaned by racist and sexist remarks swirling around in the media and on the campus quad in the aftermath of what happened on March 13 in the lacrosse house."
In 2007, ten months after the April 10 open letter or advertisement in The Chronicle, a group of 17 economics faculty signed an alternative petition, stating "the Group of 88 does not speak for all Duke faculty".
Clarifying letter
Numerous professors who had signed the open letter continued to be concerned as the case was investigated. They established a website entitled Concerned Duke Faculty. On January 16, 2007, "An Open Letter to the Duke Community" was posted at the website. It was signed by 87 faculty members, many of whom had been among the "Group of 88".
They said that the original piece had been misinterpreted and that they had intended it to address issues of racism and sexism in the community, not to prejudge the Mangum alleged rape case: "We reject all attempts to try the case outside the courts, and stand firmly by the principle of the presumption of innocence." They also refused "to retract the ad or apologize for it." Their January letter said that Duke fosters an "atmosphere that allows sexism, racism, and sexual violence to be so prevalent on campus."
Aftermath
In 2007 the North Carolina Attorney General dropped charges against the lacrosse players and declared them innocent.
A 2007 poll of Duke faculty found that 82 percent of those responding were "troubled by the actions by the Group of 88."
Durham County District Attorney Mike Nifong was convicted of criminal contempt of court for lying to a judge in his pursuit of charges against the three lacrosse players.
References
External links
"An Open Letter to the Duke Community"; April 10, 2006
Ad in The Chronicle
List of Duke Faculty signatories to ad of April 10, 2006, entitled "What Does a Social Disaster Sound Like?", first published in The Chronicle
Concerned Duke Faculty website
2006 in lacrosse
2006 in North Carolina
2007 in North Carolina
Academic scandals
Duke Blue Devils men's lacrosse
History of Durham, North Carolina
Mass media-related controversies in the United States
Race and law in the United States
Duke University faculty |
City of Akron v. Akron Center for Reproductive Health, 462 U.S. 416 (1983), was a case in which the United States Supreme Court affirmed its abortion rights jurisprudence. In an opinion by Lewis F. Powell Jr., the Court struck down several provisions of an Ohio abortion law, including portions found to be unconstitutionally vague.
Hospital requirement
One provision of the statute required abortions after the first trimester to be performed in a hospital. The Court found that to be unconstitutional. The state has a compelling interest in regulating abortion after the first trimester, but accepted medical practice does not recommend for all second-trimester abortions to be performed in a hospital. The regulation imposed an unnecessary burden that has the effect of infringing upon the constitutional right to an abortion.
Prohibition on unmarried minors
Another provision stated that a physician may not perform an abortion on an unmarried minor under 15 without obtaining either consent from one of her parents or a judicial bypass.
The Court likewise struck down the provision, as the law and the Ohio courts provided no suitable mechanism for a minor to gain a judicial bypass, as the relevant laws and courts concerning juveniles did not mention abortion or establish the authority to determine the maturity or emancipation of a minor.
Information requirements
The statute also stated that before performing an abortion, the physician must inform the patient of the status of the pregnancy, stage of fetal development, expected date of viability, health risks of abortion, and the availability of adoption agencies and childbirth resources. The Court found the provision to be unconstitutional, as the script, ostensibly provided to ensure informed consent, was found to be geared towards influencing the patient to decide against an abortion.
The state may not attempt to influence the patient's choice between abortion and childbirth. The Ohio regulation extends the state's interest in informed consent beyond permissible limits, interfering with the discretion of the physician and placing unreasonable obstacles in his path.
The requirement for doctors to tell patients that the fetus is "a human life from the moment of conception" also violates the provision in Roe v. Wade that "a State may not adopt one theory of when life begins to justify its regulation of abortions."
The detailed description of the fetus that doctors are required to provide is speculative.
The list of risks of abortion that the doctor is required to provide is "intended to suggest that abortion is a particularly dangerous procedure" and also overrides the physician's judgment, as he must tell his patient specific risks even if they do not apply to that patient.
24-hour waiting period
Another provision mandated a 24-hour waiting period after the patient signs a consent form. The Court struck the provision down, as no state interest is served by the imposition of an "arbitrary and inflexible" waiting period.
Disposal requirements
The final challenged provision required physicians to ensure that fetal remains are disposed of in a "humane and sanitary manner." The majority deemed that to be unconstitutional, as criminal sanctions are imposed upon doctors who break the law, but "humane" was unconstitutionally vague and so a violation of due process. Rather than strike down "humane" and preserve "sanitary," the Court struck down the entire provision.
Dissent
In her dissenting opinion, Sandra Day O'Connor, joined by Byron White and William Rehnquist, urged "the 'unduly burdensome' standard" from two prior cases, Maher v. Roe (1977) and Bellotti v. Baird (1979) to "be applied to the challenged regulations throughout the entire pregnancy without reference to the particular 'stage' of pregnancy involved." The "undue burden" test was later to gain acceptance by a plurality of the Court in Planned Parenthood v. Casey (1992), which replaced the earlier "strict scrutiny" standard of review of abortion regulations with the lesser "undue burden" standard, a standard which remained in effect until the ruling in Dobbs v. Jackson Women's Health Organization in 2022.
See also
List of United States Supreme Court cases, volume 462
References
External links
Overruled United States Supreme Court decisions
United States Supreme Court cases
United States Supreme Court cases of the Burger Court
United States abortion case law
United States privacy case law
Right to abortion under the United States Constitution
Right to privacy under the United States Constitution
1983 in United States case law
Void for vagueness case law
American Civil Liberties Union litigation
History of Akron, Ohio
Legal history of Ohio
History of women in Ohio |
Chahar Divar (, also Romanized as Chāhār Dīvār and Chahār Dīvār) is a village in Dasht-e Hor Rural District, in the Central District of Salas-e Babajani County, Kermanshah Province, Iran. At the 2006 census, its population was 28, in 6 families.
References
Populated places in Salas-e Babajani County |
May Guinness (11 March 1863 – 16 July 1955) was an Irish painter, noted as "the first practising artist to introduce a modernist sensibility into Irish art".
Early life and education
Mary Catherine or May Guinness was born in Rathfarnham, County Dublin on 11 March 1863. She was the third of the seven children of solicitor, Thomas Hosea Guinness and Mary Davis, the only daughter and heiress of Charles Davis of Coolmanna, County Carlow. Through her father, she was a descendant of Arthur Guinness. She was educated at home, by both French and German governesses, and attending Mrs Power's school, leaving to teach her younger siblings. This responsibility resulted in her not pursuing art until she was in her 30s. She travelled with Mildred Anne Butler in 1894 to Newlyn in Cornwall to study under Norman Garstin.
Career
Guinness was a member of the Water Colour Society of Ireland from 1892. She exhibited with the Royal Hibernian Academy in 1897, continuing to show with them until 1911. She spent a period of time painting in Florence from 1902 to 1903, and then in Paris in 1905. While there she saw the early work of Henri Matisse and the Fauves, which left a lasting impression on Guinness. Techniques such as free brushwork start to appear in her paintings, including Procession at Josselin and Cathedral at Diest. She studied with Kees van Dongen and Hermenegildo Anglada Camarasa between 1905 and 1922.
Guinness left Dublin in 1915 to enlist as a nurse in the French army. She worked from near the village of Vadelaincourt at Hospital No 12. While there, she recorded her experiences in a diary. In 1917 she was awarded the Croix de Guerre for her bravery during the Battle of Verdun. After the end of World War I she also received the Medal of French Gratitude. She spent winters in Paris from 1922 to 1925, working with the cubist artist André Lhote. Through Lhote, Guinness became close friends with Mainie Jellett and Evie Hone. Amongst her most well known works from this time is Still life, held in the Hugh Lane Gallery. She held a solo exhibition at the Galerie Visconti, Paris in January 1925. By the 1930s, she had returned to a more fauvist style.
A chronology of her work is difficult to establish as she never dated her works. Therefore her work is grouped into three periods: pre-1922, 1922 to 1925, and post-1925. This is further complicated by the fact she often assumed the style of other artists, but this openness seemed to make her work unique in Ireland. She continued to travel into her 70s, exposing herself to broad and new artistic influences and collecting modernist paintings including Matisse and Pablo Picasso. She painted local landscapes in Ireland, but also places such as Toledo, Greece and Palestine. This broad experience was influential on younger Irish artists such as Grace Henry and Mary Swanzy.
Later life and legacy
Guinness was a private person, and became more reclusive in her later years. Her artistic output appears to have overcome this however. She lived in the family home in Tibradden after World War I. Following the death of her mother in 1925, she moved into an annexe at the home of Evie Hone at Marlay House, Rathfarnham. She moved back to Tibradden in 1933, living there until her death. Guinness died on 16 July 1955 in Dublin. The following year a memorial exhibition was held at Dawson Hall, Dawson Street. Her art collection was auctioned off after her death, with the funds raised being donated for the repair of the roof of St Patrick's Cathedral, Dublin.
References
External links
Guinness works held in the Highlands Gallery
Guinness' account of her WWI experiences
1863 births
1955 deaths
Artists from Dublin (city)
19th-century Irish women artists
20th-century Irish women artists
Recipients of the Croix de Guerre 1914–1918 (France) |
People with disability in Liberia face many challenges. The cultural attitude towards disability in Liberia is largely negative. Often, it is seen as the result of witchcraft or as punishment for a person's behavior. However, the government and non-governmental organizations (NGO) are working towards a more inclusive country for people with disabilities.
Demographics
Statistics from 2008 show that around 14 percent of the population of Liberia has a disability.
Causes
The Second Liberian Civil War caused various types of disability to as many as 800,000 people. Many people in Liberia have congenital conditions, but others become disabled due to birth trauma.
Policy
The government of Liberia has stated that it has a commitment to providing an inclusive society for people with disabilities. In 2005, Liberia created the National Commission On Disabilities Liberia. Liberia signed and ratified the Convention on the Rights of Persons with Disabilities in 2012.
Liberia has various protections for people with disabilities in the workforce. The government also promotes tax incentives for hiring people with disabilities and has a target of 4% employment for people with disabilities.
People with disabilities have received less attention than other groups of people who are at risk in the country.
Non-governmental organizations
Non-governmental organizations (NGO) in the country have called on the government to secure the rights of people with disabilities. Many of these groups have adopted a National Action Plan for the Inclusion of Persons with Disabilities. NGOs advocating for people with disabilities became more involved in the process of advocacy following the 2005 elections in Liberia.
Humanity & Inclusion has been working in Liberia since 2000. The National Union of the Disabled (NUOD) was established in 2009 to advocate for people with disabilities in Liberia. Other prominent NGOs in Liberia include the Disabled Females International-Liberia (ADFI), Organisation for the Social Integration of the Liberian Deaf (OSILD), Liberia National Association of the Blind (LNAB) and the Christian Association of the Blind-Liberia (CAB).
Education
New residential schools for the blind are being constructed in Montserrado County.
Accessibility
There is a lack of physical accessibility in Liberia. Many government buildings do not have ramps and there are not enough sidewalks in cities.
Cultural attitudes
People with disabilities in Liberia often face discrimination and marginalization. There is a tradition of believing that a family has been subject to witchcraft when a child with disabilities is born and the family may be shunned and the child subject to cruel treatment.
Disabilities that were caused by war are also stigmatized. These can be mental disabilities, such as posttraumatic stress disorder (PTSD) or physical disabilities, such as amputations.
Sport
Many of the members of the Liberian amputee football team were once former child soldiers. Liberia participated in the first All African Amputee Football Tournament in 2007 which was sponsored by FIFA and held in Sierra Leone. After the tournament, Liberia along with Ghana and Sierra Leone formed the African Nations Amputee Football Federation (AFFA).
See also
National Commission On Disabilities
References
Sources
Culture of Liberia
Liberia |
A Hero of Our Time () is a novel by Mikhail Lermontov, written in 1839, published in 1840, and revised in 1841.
It is an example of the superfluous man novel, noted for its compelling Byronic hero (or antihero) Pechorin and for the beautiful descriptions of the Caucasus. There are several English translations, including one by Vladimir Nabokov and Dmitri Nabokov in 1958.
Grigory Alexandrovich Pechorin
Pechorin is the embodiment of the Byronic hero. Byron's works were of international repute and Lermontov mentions his name several times throughout the novel. According to the Byronic tradition, Pechorin is a character of contradiction. He is both sensitive and cynical. He is possessed of extreme arrogance, yet has a deep insight into his own character and epitomizes the melancholy of the Romantic hero who broods on the futility of existence and the certainty of death. Pechorin's whole philosophy concerning existence is oriented towards the nihilistic, creating in him somewhat of a distanced, alienated personality. The name Pechorin is drawn from that of the Pechora River, in the far north, as a homage to Alexander Pushkin's Eugene Onegin, named after the Onega River.
Pechorin treats women as an incentive for endless conquests and does not consider them worthy of any particular respect. He considers women such as Princess Mary to be little more than pawns in his games of romantic conquest, which in effect hold no meaning in his listless pursuit of pleasure. This is shown in his comment on Princess Mary: "I often wonder why I'm trying so hard to win the love of a girl I have no desire to seduce and whom I'd never marry."
The only contradiction in Pechorin's attitude to women are his genuine feelings for Vera, who loves him despite, and perhaps due to, all his faults. At the end of "Princess Mary" one is presented with a moment of hope as Pechorin gallops after Vera. The reader almost assumes that a meaning to his existence may be attained and that Pechorin can finally realize that true feelings are possible. Yet a lifetime of superficiality and cynicism cannot be so easily eradicated and when fate intervenes and Pechorin's horse collapses, he undertakes no further effort to reach his one hope of redemption: "I saw how futile and senseless it was to pursue lost happiness. What more did I want? To see her again? For what?”
Pechorin's chronologically last adventure was first described in the book, showing the events that explain his upcoming fall into depression and retreat from society, resulting in his self-predicted death. The narrator is Maxim Maximytch telling the story of a beautiful Circassian princess, "Bela", whom Azamat abducts for Pechorin in exchange for Kazbich's horse. Maxim describes Pechorin's exemplary persistence to convince Bela to give herself sexually to him, in which she with time reciprocates. After living with Bela for some time, Pechorin starts explicating his need for freedom, which Bela starts noticing, fearing he might leave her. Though Bela is completely devoted to Pechorin, she says she's not his slave, rather a daughter of a Circassian tribal chieftain, also showing the intention of leaving if he "doesn't love her". Maxim's sympathy for Bela makes him question Pechorin's intentions. Pechorin admits he loves her and is ready to die for her, but "he has a restless fancy and insatiable heart, and that his life is emptier day by day". He thinks his only remedy is to travel, to keep his spirit alive.
However, Pechorin's behavior soon changes after Bela gets kidnapped by his enemy Kazbich, and becomes mortally wounded. After two days of suffering in delirium Bela spoke of her inner fears and her feelings for Pechorin, who listened without once leaving her side. After her death, Pechorin becomes physically ill, loses weight and becomes unsociable. After meeting with Maxim again, he acts coldly and antisocial, explicating deep depression and disinterest in interaction. He soon dies on his way back from Persia, admitting before that he is sure to never return.
Pechorin described his own personality as self-destructive, admitting he himself doesn't understand his purpose in the world of men. His boredom with life, feeling of emptiness, forces him to indulge in all possible pleasures and experiences, which soon, cause the downfall of those closest to him. He starts to realize this with Vera and Grushnitsky, while the tragedy with Bela soon leads to his complete emotional collapse.
His crushed spirit after this and after the duel with Grushnitsky can be interpreted that he is not the detached character that he makes himself out to be. Rather, it shows that he suffers from his actions. Yet many of his actions are described both by himself and appear to the reader to be arbitrary. Yet this is strange as Pechorin's intelligence is very high (typical of a Byronic hero). Pechorin's explanation as to why his actions are arbitrary can be found in the last chapter where he speculates about fate. He sees his arbitrary behaviour not as being a subconscious reflex to past moments in his life but rather as fate. Pechorin grows dissatisfied with his life as each of his arbitrary actions lead him through more emotional suffering which he represses from the view of others.
Cultural references
Albert Camus' novel The Fall begins with an excerpt from Lermontov's foreword to A Hero of Our Time: "Some were dreadfully insulted, and quite seriously, to have held up as a model such an immoral character as A Hero of Our Time; others shrewdly noticed that the author had portrayed himself and his acquaintances. A Hero of Our Time, gentlemen, is in fact a portrait, but not of an individual; it is the aggregate of the vices of our whole generation in their fullest expression."
In Ian Fleming's From Russia with Love the plot revolves upon Soviet agent Tatiana Romanova feigning an infatuation with MI6's James Bond and offering to defect to the West provided he'll be sent to pick her up in Istanbul, Turkey. The Soviets elaborate a complex backstory about how she spotted the file about the English spy during her clerical work at SMERSH headquarters and became smitten with him, making her state that his picture made her think of Lermontov's Pechorin. The fact that Pechorin was anything but a 'hero' or even a positive character at all in Lermontov's narration stands to indicate Fleming's wry self-deprecating wit about his most famous creation; the irony is lost, however, on western readers not familiar with Lermontov's work.
In Ingmar Bergman's 1963 film The Silence, the young son is seen reading the book in bed. In the opening sequence of Bergman's next film, Persona (1966), the same child actor is seen waking in what appears to be a mortuary and reaching for the same book.
Claude Sautet's film A Heart in Winter (Un cœur en hiver) was said to be based on "his memories of" the Princess Mary section. The relationship with Lermontov's work is quite loose – the film takes place in contemporary Paris, where a young violin repairer (played by Daniel Auteuil) seeks to seduce his business partner's girlfriend, a gifted violinist named Camille, into falling for his carefully contrived charms. He does this purely for the satisfaction of gaining control of her emotionally, while never loving her sincerely. He is a modern-day Pechorin.
Quotations
"My whole life has been merely a succession of miserable and unsuccessful denials of feelings or reason."
"...I am not capable of close friendship: of two close friends, one is always the slave of the other, although frequently neither of them will admit it. I cannot be a slave, and to command in such circumstances is a tiresome business, because one must deceive at the same time."
"Afraid of being judged, I buried my finer feelings in the depths of my heart and they died there."
"It is difficult to convince women of something; one must lead them to believe that they have convinced themselves."
"What of it? If I die, I die. It will be no great loss to the world, and I am thoroughly bored with life. I am like a man yawning at a ball; the only reason he does not go home to bed is that his carriage has not arrived yet."
"When I think of imminent and possible death, I think only of myself; some do not even do that. Friends, who will forget me tomorrow, or, worse still, who will weave God knows what fantastic yarns about me; and women, who in the embrace of another man will laugh at me in order that he might not be jealous of the departed—what do I care for them?"
"Women! Women! Who will understand them? Their smiles contradict their glances, their words promise and lure, while the sound of their voices drives us away. One minute they comprehend and divine our most secret thoughts, and the next, they do not understand the clearest hints."
"There are two men within me – one lives in the full sense of the word, the other reflects and judges him. In an hour's time the first may be leaving you and the world for ever, and the second? ... the second? ..."
"To cause another person suffering or joy, having no right to so—isn't that the sweetest food of our pride? What is happiness but gratified pride?"
"I'll hazard my life, even my honor, twenty times, but I will not sell my freedom. Why do I value it so much? What am I preparing myself for? What do I expect from the future? in fact, nothing at all."
Grushnitski (to Pechorin): "Mon cher, je haïs les hommes pour ne pas les mépriser car autrement la vie serait une farce trop dégoûtante." ("My friend, I hate people to avoid despising them because otherwise, life would become too disgusting a farce.")
Pechorin (replying to Grushnitski): "Mon cher, je méprise les femmes pour ne pas les aimer car autrement la vie serait un mélodrame trop ridicule" ("My friend, I despise women to avoid loving them because otherwise, life would become too ridiculous a melodrama.")
"Passions are merely ideas in their initial stage."
"I was prepared to love the whole world . . . I learned to hate."
"Whether I am a fool or a villain I know not; but this is certain, I am also most deserving of pity – perhaps more so than she. My soul has been spoiled by the world, my imagination is unquiet, my heart insatiate. To me everything is of little moment. I have become as easily accustomed to grief as to joy, and my life grows emptier day by day."
"That is just like human beings! They are all alike; though fully aware in advance of all the evil aspects of a deed, they aid and abet and even give their approbation to it when they see there is no other way out—and then they wash their hands of it and turn away with disapproval from him who dared assume the full burden of responsibility. They are all alike, even the kindest and wisest of them!"
"Women love only the men they don't know."
Stage adaptation
In 2011 Alex Mcsweeney adapted the novel into an English-language playscript. Previewed at the International Youth Arts Festival in Kingston upon Thames, Surrey, UK in July, it subsequently premiered in August of the same year at Zoo Venues in the Edinburgh Fringe Festival. Critics received it positively, generally giving 4- and 5-star reviews.
In 2014, German stage director Kateryna Sokolova adapted the novel focusing on its longest novella, Princess Mary. The play, directed by Kateryna Sokolova, premiered at the Schauspielhaus Zürich on 28 May. The production received universal acclaim, especially praising it for not having lost "neither the linguistic finesse nor the social paralysis of Lermontov’s Zeitgeist", both of which constitute the novel's Byronic character.
On July 22, 2015, The Bolshoi Theatre in Moscow premiered a ballet adaptation of Hero of Our Time. The ballet was choreographed by San Francisco Ballet's Choreographer in Residence, Yuri Possokhov, and directed by Kirill Serebrennikov - who is also the author of the libretto. The score was commissioned purposefully for this production and composed by Ilya Demutsky. This production focuses on three novellas from Lermontov's novel - Bela, Taman, and Princess Mary.
Bibliography of English translations
Translations:
Sketches of Russian life in the Caucasus. By a Russe, many years resident amongst the various mountain tribes. London: Ingram, Cook and Co., 1853. 315 pp. "The illustrated family novelist" series, #2. (a liberal translation with changed names of the heroes; "Taman" not translated).
The hero of our days. Transl. by Theresa Pulszky London: T. Hodgson, 1854. 232 pp. "The Parlour Library". Vol.112. ("Fatalist" not translated).
A hero of our own times. Now first transl. into English. London: Bogue, 1854. 231 pp., ill. (the first full translation of the novel by an anonymous translator).
A hero of our time. Transl. by R. I. Lipmann. London: Ward and Downey, 1886. XXVIII, 272 pp. ("Fatalist" not translated).
Taman. In: Tales from the Russian. Dubrovsky by Pushkin. New year's eve by Gregorowitch. Taman by Lermontoff. London: The Railway and general automatic library, 1891, pp. 229–251.
Russian reader: Lermontof's modern hero, with English translation and biographical sketch by Ivan Nestor-Schnurmann. Cambridge: Univ. press, 1899. XX, 403 pp. (a dual language edition; "Fatalist" not translated)
Maxim Maximich. — In: Wiener L. Anthology of Russian literature. T. 2, part 2. London—N.Y., 1903, pp. 157–164. (a reduced version of the "Maxim Maximich" chapter).
The heart of a Russian. Transl. by J. H. Wisdom and Marr Murray. London: Herbert and Daniel, 1912. VII, 335 pp. (also published in 1916 by Hodder and Stoughton, London—N.Y.—Toronto).
The duel. Excerpt from The hero of our own time. Transl. by T. Pulszky. — In: A Russian anthology in English. Ed. by C. E. B. Roberts. N. Y.: 1917, pp. 124–137.
A traveling episode. — In: Little Russian masterpieces. Transl. by Z. A. Ragozin. Vol. 1. N. Y.: Putnam, 1920, pp. 165–198. (an excerpt from the novel).
A hero of nowadays. Transl. by John Swinnerton Phillimore. London: Nelson, 1924.
Taman'''. — In: Chamot A. Selected Russian short stories. Transl. by A. E. Chamot. London, 1925—1928, pp. 84—97.A hero of our time. Transl. by Reginald Merton. Mirsky. London: Allan, 1928. 247 pp.Fatalist. Story. Transl. by G.A. Miloradowitch. — In: Golden Book Magazine. Vol. 8. N. Y., 1928, pp. 491—493.A hero of our own times. Transl. by Eden and Cedar Paul for the Lermontov centenary. London: Allen and Unwin, 1940. 283 pp. (also published by Oxford Univ. Press, London—N.Y., 1958).Bela. Transl. by Z. Shoenberg and J. Domb. London: Harrap, 1945. 124 pp. (a dual language edition).A hero of our time. Transl. by Martin Parker. Moscow: Foreign languages publ. house, 1947. 224 pp., ill. (republished in 1951 and 1956; also published by Collet's Holdings, London, 1957).A hero of our time. A novel. Transl. by Vladimir Nabokov in collab. with Dmitri Nabokov. Garden City, N.Y.: Doubleday, 1958. XI, 216 pp. "Doubleday Anchor Books".A hero of our time. Translated by Philip Longworth. With an afterword by William E. Harkins, London, 1964, & New York : New American Library, 1964A Lermontov reader. Ed., transl., and with an introd. by Guy Daniels. New York: Grosset & Dunlap, 1965.A hero of our time. Transl. with an introduction by Paul Foote. Harmondsworth, Middlesex: Penguin Books, 1966.Major poetical works. Transl., with an introduction and commentary by Anatoly Liberman. Minneapolis: University of Minnesota Press, 1983.Vadim. Transl. by Helena Goscilo. Ann Arbor: Ardis Publishers, 1984.A hero of our time. Transl. by Martin Parker, revised and edited by Neil Cornwell, London: Dent, 1995A hero of our time. Transl. by Marian Schwartz. Modern Library, 2004.A hero of our time. Transl. with an introduction and notes by Natasha Randall; foreword by Neil LaBute. New York: Penguin, 2009.A hero of our time. Transl. by Alexander Vassiliev, London: Alexander Vassiliev 2010. (a dual language edition).A hero of our time''. Transl. by Nicholas Pasternak Slater, Oxford World's Classics, 2013.
See also
Romanticism
Tragic hero
References
Further reading
External links
Full text (English translation) of "A Hero of Our Time" at Eldritch Press .
Full text of A Hero of Our Time in the original Russian
Website dedicated to the novel A Hero of Our Time
Study guides for A Hero of Our Time at Bibliomania
Website for the Premiere of the English Language Adaptation.
Review of A Hero of Our Time stage production
1840 Russian novels
Russian-language novels
Novels by Mikhail Lermontov
Novels set in 19th-century Russia
Russian novels adapted into plays
Self-reflexive novels |
Þorsteinn Löve (29 July 1923 – 10 April 2002) was an Icelandic athlete. He competed in the men's discus throw at the 1952 Summer Olympics.
References
External links
1923 births
2002 deaths
Athletes (track and field) at the 1952 Summer Olympics
Thorsteinn Löve
Thorsteinn Löve |
The Ma Wat River () is a river in Fanling, northern New Territories, Hong Kong. Its source lies at Kau Lung Hang Shan. The river flows northwards towards Fanling, staying near the eastern industrial areas. It empties into the Ng Tung River near Kan Lung Tsuen.
See also
List of rivers and nullahs in Hong Kong
References
2007. 2007 Hong Kong Map. Easy Finder Ltd.
External links
Rivers of Hong Kong, in Chinese
Rivers of Hong Kong
Fanling |
```smalltalk
using System.Collections.Concurrent;
using System.Diagnostics.CodeAnalysis;
using System.Net;
using System.Net.Sockets;
using NewLife.Data;
using NewLife.Log;
using NewLife.Model;
namespace NewLife.Net;
/// <summary></summary>
public abstract class SessionBase : DisposeBase, ISocketClient, ITransport, ILogFeature
{
#region
/// <summary></summary>
public Int32 ID { get; internal set; }
/// <summary></summary>
public String Name { get; set; }
/// <summary></summary>
public NetUri Local { get; set; } = new NetUri();
/// <summary></summary>
public Int32 Port { get { return Local.Port; } set { Local.Port = value; } }
/// <summary></summary>
public NetUri Remote { get; set; } = new NetUri();
/// <summary>3000ms</summary>
public Int32 Timeout { get; set; } = 3_000;
/// <summary></summary>
public Boolean Active { get; set; }
/// <summary>Socket</summary>
public Socket? Client { get; protected set; }
/// <summary></summary>
public DateTime LastTime { get; internal protected set; } = DateTime.Now;
/// <summary>Tcp1UdpCPU*1.60</summary>
public Int32 MaxAsync { get; set; } = 1;
/// <summary>8k</summary>
public Int32 BufferSize { get; set; }
/// <summary></summary>
public String? CloseReason { get; set; }
/// <summary>APM</summary>
public ITracer? Tracer { get; set; }
#endregion
#region
/// <summary></summary>
public SessionBase()
{
Name = GetType().Name;
BufferSize = SocketSetting.Current.BufferSize;
LogDataLength = SocketSetting.Current.LogDataLength;
}
/// <summary></summary>
/// <param name="disposing"></param>
protected override void Dispose(Boolean disposing)
{
base.Dispose(disposing);
var reason = GetType().Name + (disposing ? "Dispose" : "GC");
try
{
Close(reason);
}
catch (Exception ex)
{
OnError("Dispose", ex);
}
}
/// <summary></summary>
/// <returns></returns>
public override String ToString() => Local + "";
#endregion
#region
/// <summary></summary>
/// <returns></returns>
public virtual Boolean Open()
{
if (Disposed) throw new ObjectDisposedException(GetType().Name);
if (Active) return true;
lock (this)
{
if (Active) return true;
using var span = Tracer?.NewSpan($"net:{Name}:Open", Remote?.ToString());
try
{
_RecvCount = 0;
var rs = OnOpen();
if (!rs) return false;
var timeout = Timeout;
if (timeout > 0 && Client != null)
{
Client.SendTimeout = timeout;
Client.ReceiveTimeout = timeout;
}
Active = true;
if (Pipeline is Pipeline pipe && pipe.Handlers.Count > 0)
{
WriteLog("");
foreach (var handler in pipe.Handlers)
{
WriteLog(" {0}", handler);
}
}
//
Pipeline?.Open(CreateContext(this));
ReceiveAsync();
//
Opened?.Invoke(this, EventArgs.Empty);
}
catch (Exception ex)
{
span?.SetError(ex, null);
throw;
}
}
return true;
}
/// <summary></summary>
/// <returns></returns>
[MemberNotNullWhen(true, nameof(Client))]
protected abstract Boolean OnOpen();
/// <summary></summary>
/// <param name="reason"></param>
/// <returns></returns>
public virtual Boolean Close(String reason)
{
if (!Active) return true;
lock (this)
{
if (!Active) return true;
using var span = Tracer?.NewSpan($"net:{Name}:Close", Remote?.ToString());
try
{
CloseReason = reason;
//
Pipeline?.Close(CreateContext(this), reason);
var rs = true;
if (OnClose(reason ?? (GetType().Name + "Close"))) rs = false;
_RecvCount = 0;
//
Closed?.Invoke(this, EventArgs.Empty);
Active = rs;
return !rs;
}
catch (Exception ex)
{
span?.SetError(ex, null);
throw;
}
}
}
/// <summary></summary>
/// <param name="reason"></param>
/// <returns></returns>
protected abstract Boolean OnClose(String reason);
Boolean ITransport.Close() => Close("TransportClose");
/// <summary>FIN/RST</summary>
/// <returns></returns>
protected String? CheckClosed()
{
var sock = Client;
if (sock == null || !sock.Connected) return "Disconnected";
if (sock.Poll(10, SelectMode.SelectRead))
{
try
{
var buffer = new Byte[1];
if (sock.Receive(buffer, SocketFlags.Peek) == 0)
{
// FIN
return "Finish";
}
}
catch (SocketException ex)
when (ex.SocketErrorCode == SocketError.ConnectionReset)
{
return "ConnectionReset";
}
}
return null;
}
/// <summary></summary>
public event EventHandler? Opened;
/// <summary></summary>
public event EventHandler? Closed;
#endregion
#region
/// <summary> Byte[]/Packet</summary>
/// <remarks>
/// <seealso cref="Remote"/>
/// </remarks>
/// <param name="data"></param>
/// <returns></returns>
public Int32 Send(Packet data)
{
if (Disposed) throw new ObjectDisposedException(GetType().Name);
if (!Open()) return -1;
return OnSend(data);
}
/// <summary></summary>
/// <remarks>
/// <seealso cref="Remote"/>
/// </remarks>
/// <param name="data"></param>
/// <returns></returns>
protected abstract Int32 OnSend(Packet data);
#endregion
#region
/// <summary></summary>
/// <returns></returns>
public virtual Packet? Receive()
{
if (Disposed) throw new ObjectDisposedException(GetType().Name);
if (!Open() || Client == null) return null;
using var span = Tracer?.NewSpan($"net:{Name}:Receive", BufferSize + "");
try
{
var buf = new Byte[BufferSize];
var size = Client.Receive(buf);
if (span != null) span.Value = size;
return new Packet(buf, 0, size);
}
catch (Exception ex)
{
span?.SetError(ex, null);
throw;
}
}
/// <summary></summary>
/// <returns></returns>
public virtual async Task<Packet?> ReceiveAsync(CancellationToken cancellationToken = default)
{
if (Disposed) throw new ObjectDisposedException(GetType().Name);
if (!Open() || Client == null) return null;
using var span = Tracer?.NewSpan($"net:{Name}:ReceiveAsync", BufferSize + "");
try
{
var buf = new Byte[BufferSize];
#if NETFRAMEWORK || NETSTANDARD2_0
var ar = Client.BeginReceive(buf, 0, buf.Length, SocketFlags.None, null, Client);
var size = ar.IsCompleted ?
Client.EndReceive(ar) :
await Task.Factory.FromAsync(ar, Client.EndReceive);
#else
var size = await Client.ReceiveAsync(new ArraySegment<Byte>(buf), SocketFlags.None, cancellationToken);
#endif
if (span != null) span.Value = size;
return new Packet(buf, 0, size);
}
catch (Exception ex)
{
span?.SetError(ex, null);
throw;
}
}
/// <summary></summary>
private Int32 _RecvCount;
/// <summary></summary>
/// <returns></returns>
public virtual Boolean ReceiveAsync()
{
if (Disposed) throw new ObjectDisposedException(GetType().Name);
if (!Open()) return false;
var count = _RecvCount;
var max = MaxAsync;
if (count >= max) return false;
//
for (var i = count; i < max; i++)
{
count = Interlocked.Increment(ref _RecvCount);
if (count > max)
{
Interlocked.Decrement(ref _RecvCount);
return false;
}
// SocketError.MessageSize
var buf = new Byte[BufferSize];
var se = new SocketAsyncEventArgs();
se.SetBuffer(buf, 0, buf.Length);
se.Completed += (s, e) => ProcessEvent(e, -1, _IntoThreadCount);
se.UserToken = count;
if (Log != null && Log.Level <= LogLevel.Debug) WriteLog("RecvSA {0}", count);
StartReceive(se, 0);
}
return true;
}
/// <summary></summary>
/// <param name="se"></param>
/// <param name="reason"></param>
private void ReleaseRecv(SocketAsyncEventArgs se, String reason)
{
var idx = se.UserToken.ToInt();
if (Log != null && Log.Level <= LogLevel.Debug) WriteLog("RecvSA {0} {1}", idx, reason);
if (_RecvCount > 0) Interlocked.Decrement(ref _RecvCount);
try
{
se.SetBuffer(null, 0, 0);
}
catch { }
se.TryDispose();
}
/// <summary>10</summary>
private Int32 _IntoThreadCount = 10;
/// <summary></summary>
/// <param name="se"></param>
/// <param name="ioThread">,00</param>
/// <returns></returns>
private Boolean StartReceive(SocketAsyncEventArgs se, Int32 ioThread)
{
if (Disposed)
{
ReleaseRecv(se, "Disposed " + se.SocketError);
throw new ObjectDisposedException(GetType().Name);
}
var rs = false;
try
{
//
rs = OnReceiveAsync(se);
}
catch (Exception ex)
{
ReleaseRecv(se, "ReceiveAsyncError " + ex.Message);
if (!ex.IsDisposed())
{
OnError("ReceiveAsync", ex);
// UDP
//if (!io && ThrowException) throw;
}
return false;
}
// 0
if (!rs && se.BytesTransferred == 0 && se.SocketError == SocketError.Success)
{
var reason = CheckClosed() ?? "EmptyData";
Close(reason);
Dispose();
return false;
}
//
if (!rs)
{
if (ioThread-- > 0)
{
ProcessEvent(se, -1, ioThread);
}
else
{
ThreadPool.UnsafeQueueUserWorkItem(s =>
{
try
{
if (s is SocketAsyncEventArgs ee) ProcessEvent(ee, -1, _IntoThreadCount);
}
catch (Exception ex)
{
XTrace.WriteException(ex);
}
}, se);
}
}
return true;
}
internal abstract Boolean OnReceiveAsync(SocketAsyncEventArgs se);
/// <summary></summary>
/// <remarks>
/// ioThread:
/// StartReceiveProcessEventworker
/// IOCPProcessEventcompletionPort
/// </remarks>
/// <param name="se"></param>
/// <param name="bytes"></param>
/// <param name="ioThread">IO</param>
protected internal void ProcessEvent(SocketAsyncEventArgs se, Int32 bytes, Int32 ioThread)
{
try
{
if (!Active)
{
ReleaseRecv(se, "!Active " + se.SocketError);
return;
}
//
if (se.SocketError != SocketError.Success)
{
// Socket
if (OnReceiveError(se))
{
var ex = se.GetException();
if (ex != null) OnError("ReceiveAsync", ex);
ReleaseRecv(se, "SocketError " + se.SocketError);
return;
}
}
else
{
var ep = se.RemoteEndPoint as IPEndPoint ?? Remote.EndPoint;
if (bytes < 0) bytes = se.BytesTransferred;
if (se.Buffer != null)
{
var pk = new Packet(se.Buffer, se.Offset, bytes);
//
// IO
ProcessReceive(pk, se.ReceiveMessageFromPacketInfo.Address, ep);
}
}
//
if (Active && !Disposed)
StartReceive(se, ioThread);
else
ReleaseRecv(se, "!Active || Disposed");
}
catch (Exception ex)
{
XTrace.WriteException(ex);
try
{
// Error
//
ReleaseRecv(se, "ProcessEventError " + ex.Message);
Close("ProcessEventError");
}
catch { }
Dispose();
}
}
/// <summary></summary>
/// <param name="pk"></param>
/// <param name="local"></param>
/// <param name="remote"></param>
private void ProcessReceive(Packet pk, IPAddress local, IPEndPoint remote)
{
//
DefaultSpan.Current = null;
using var span = Tracer?.NewSpan($"net:{Name}:ProcessReceive", pk.Total + "", pk.Total);
try
{
LastTime = DateTime.Now;
//
var ss = OnPreReceive(pk, local, remote);
if (ss == null) return;
if (LogReceive && Log != null && Log.Enable) WriteLog("Recv [{0}]: {1}", pk.Total, pk.ToHex(LogDataLength));
if (Local.IsTcp) remote = Remote.EndPoint;
var e = new ReceivedEventArgs { Packet = pk, Local = local, Remote = remote };
// Tcp/Udp
var pp = Pipeline;
if (pp == null)
OnReceive(e);
else
{
var ctx = CreateContext(ss);
ctx.Data = e;
// Finish
pp.Read(ctx, pk);
}
}
catch (Exception ex)
{
span?.SetError(ex, pk.ToHex());
if (!ex.IsDisposed()) OnError("OnReceive", ex);
}
}
/// <summary></summary>
/// <param name="pk"></param>
/// <param name="local"></param>
/// <param name="remote"></param>
/// <returns></returns>
protected internal abstract ISocketSession? OnPreReceive(Packet pk, IPAddress local, IPEndPoint remote);
/// <summary></summary>
/// <param name="e"></param>
/// <returns></returns>
protected abstract Boolean OnReceive(ReceivedEventArgs e);
/// <summary></summary>
public event EventHandler<ReceivedEventArgs>? Received;
/// <summary></summary>
/// <param name="sender"></param>
/// <param name="e"></param>
protected virtual void RaiseReceive(Object sender, ReceivedEventArgs e) => Received?.Invoke(sender, e);
/// <summary></summary>
/// <param name="se"></param>
/// <returns></returns>
internal virtual Boolean OnReceiveError(SocketAsyncEventArgs se)
{
//if (se.SocketError == SocketError.ConnectionReset) Dispose();
if (se.SocketError == SocketError.ConnectionReset) Close("ConnectionReset");
return true;
}
#endregion
#region
/// <summary></summary>
/// <remarks>
/// 1
/// 2
/// </remarks>
public IPipeline? Pipeline { get; set; }
/// <summary></summary>
/// <param name="session"></param>
/// <returns></returns>
protected internal virtual NetHandlerContext CreateContext(ISocketRemote session)
{
var context = new NetHandlerContext
{
Pipeline = Pipeline,
Session = session,
Owner = session,
};
return context;
}
/// <summary></summary>
/// <param name="message"></param>
/// <returns></returns>
public virtual Int32 SendMessage(Object message)
{
if (Pipeline == null) throw new ArgumentNullException(nameof(Pipeline), "No pipes are set");
using var span = Tracer?.NewSpan($"net:{Name}:SendMessage", message);
try
{
var ctx = CreateContext(this);
return (Int32)(Pipeline.Write(ctx, message) ?? 0);
}
catch (Exception ex)
{
span?.SetError(ex, message);
throw;
}
}
/// <summary></summary>
/// <param name="message"></param>
/// <returns></returns>
public virtual async Task<Object> SendMessageAsync(Object message)
{
if (Pipeline == null) throw new ArgumentNullException(nameof(Pipeline), "No pipes are set");
using var span = Tracer?.NewSpan($"net:{Name}:SendMessageAsync", message);
try
{
var ctx = CreateContext(this);
var source = new TaskCompletionSource<Object>();
ctx["TaskSource"] = source;
ctx["Span"] = span;
var rs = (Int32)(Pipeline.Write(ctx, message) ?? 0);
#if NET45
if (rs < 0) return Task.FromResult(0);
#else
if (rs < 0) return Task.CompletedTask;
#endif
return await source.Task;
}
catch (Exception ex)
{
if (ex is TaskCanceledException)
span?.AppendTag(ex.Message);
else
span?.SetError(ex, message);
throw;
}
}
/// <summary></summary>
/// <param name="message"></param>
/// <param name="cancellationToken"></param>
/// <returns></returns>
public virtual async Task<Object> SendMessageAsync(Object message, CancellationToken cancellationToken)
{
if (Pipeline == null) throw new ArgumentNullException(nameof(Pipeline), "No pipes are set");
using var span = Tracer?.NewSpan($"net:{Name}:SendMessageAsync", message);
try
{
var ctx = CreateContext(this);
var source = new TaskCompletionSource<Object>();
ctx["TaskSource"] = source;
ctx["Span"] = span;
var rs = (Int32)(Pipeline.Write(ctx, message) ?? 0);
#if NET45
if (rs < 0) return Task.FromResult(0);
#else
if (rs < 0) return Task.CompletedTask;
#endif
//
// RegisterDispose
// path_to_url
using (cancellationToken.Register(TrySetCanceled, source))
{
return await source.Task;
}
}
catch (Exception ex)
{
if (ex is TaskCanceledException)
span?.AppendTag(ex.Message);
else
span?.SetError(ex, null);
throw;
}
}
private void TrySetCanceled(Object? state)
{
if (state is TaskCompletionSource<Object> source && !source.Task.IsCompleted)
source.TrySetCanceled();
}
/// <summary></summary>
/// <param name="data"></param>
void ISocketRemote.Process(IData data)
{
if (data is ReceivedEventArgs e) OnReceive(e);
}
#endregion
#region
/// <summary>/</summary>
public event EventHandler<ExceptionEventArgs>? Error;
/// <summary></summary>
/// <param name="action"></param>
/// <param name="ex"></param>
protected internal virtual void OnError(String action, Exception ex)
{
Pipeline?.Error(CreateContext(this), ex);
Log?.Error("{0}{1}Error {2} {3}", LogPrefix, action, this, ex.Message);
Error?.Invoke(this, new ExceptionEventArgs(action, ex));
}
#endregion
#region
private ConcurrentDictionary<String, Object?>? _items;
/// <summary></summary>
public IDictionary<String, Object?> Items => _items ??= new();
/// <summary> </summary>
/// <param name="key"></param>
/// <returns></returns>
public Object? this[String key] { get => _items != null && _items.TryGetValue(key, out var obj) ? obj : null; set => Items[key] = value; }
#endregion
#region
/// <summary></summary>
public virtual String? LogPrefix { get; set; }
/// <summary></summary>
public ILog Log { get; set; } = Logger.Null;
/// <summary>false</summary>
public Boolean LogSend { get; set; }
/// <summary>false</summary>
public Boolean LogReceive { get; set; }
/// <summary>64</summary>
public Int32 LogDataLength { get; set; } = 64;
/// <summary></summary>
/// <param name="format"></param>
/// <param name="args"></param>
public void WriteLog(String format, params Object?[] args)
{
LogPrefix ??= Name.TrimEnd("Server", "Session", "Client");
if (Log != null && Log.Enable) Log.Info($"[{LogPrefix}]{format}", args);
}
#endregion
}
``` |
Poi is a village located north of Ukhrul in Ukhrul district, Manipur state, India. The village is partially connected by National Highway 150, Imphal-Kohima road via Jessami. Poi is 68 kilometers away from Ukhrul via Awangkasom and about 3 kilometers and 5 kilometers away from Indo-Myanmar border pillar number 126 and 130 respectively. Poi is flanked by Challou in the North, Chingai in the north west, Ngahui, Kuirei and Marem in the west, Huishu and Khamasom in the south. MK Preshow Shimray, the Ex- MLA from Chingai Assembly Constituency and also the Deputy Speaker of the present Manipur Legislative Assembly hails from this village.
Total population
As per 2011 census, Poi has 253 households with the total of 1595 people of which 820 are male and 775 are female. Of the total population, 171 were in the age group of 0–6 years. The average sex ratio of Poi village is 945 female to 1000 male which is lower than the state average of 985. The literacy rate of the village stands at 79.63%. Male literacy rate stands at 84.34% while female literacy rate was 74.71%.
People and occupation
The village is home to people of Tangkhul Naga tribe. Majority of the inhabitants are Christians. Agriculture is the primary occupation of the inhabitants. The village is well known in the district for its scenic beauty. Poi is one of the few Tangkhul villages where the seed sowing festival (Luira/Luita) of the Tangkhuls is celebrated in strict adherence to traditional style of yore.
References
Villages in Ukhrul district |
Eric Denton may refer to:
Eric Denton (soccer) (born 1978), American soccer player
Sir Eric James Denton (1923–2007), British marine biologist
Eric Denton (musician), founding member of the early-80s new wave band, The Monroes
Eric Denton (Under the Dome), fictional character |
The World War II Illinois Veterans Memorial is the official memorial of the U.S. state of Illinois maintained in honor of veterans of the war, as well as those bereaved during the course of the conflict. 987,000 Illinois residents served in uniform during the war, and 22,000 gave up their lives during the campaigns. Planning for the memorial began in 1999, and the memorial was dedicated in 2004. The memorial is in Oak Ridge Cemetery, located on the north side of Springfield, Illinois, the state capital.
The memorial is a multi-element sculptural installation that centers on a 22-ton (20-tonne) white globe 12 feet (3.5m) in diameter, demonstrating the global nature of the conflict. Spreading outward from the globe are a series of black granite walls into which the names of various battles and campaigns of the war are incised. Stainless steel buttons inserted into the globe pinpoint the locations of the battles.
As of 2022, frequent tribute observances gather together representatives from the diminishing headcount of veterans of this conflict. The executive board of the memorial also organizes efforts to collect oral memories from survivors. In some cases, relatives seeking information about their missing kin may contact the Memorial's executive board.
Although the Memorial is de jure a historic site of the Illinois Historic Preservation Agency, in practice it is maintained by the staff of Oak Ridge Cemetery and the Memorial's independent governing board.
See also
National World War II Memorial
References
External links
Memorial website
Buildings and structures in Springfield, Illinois
Illinois State Historic Sites
Monuments and memorials in Illinois
Tourist attractions in Springfield, Illinois
World War II memorials in the United States
2004 sculptures
2004 establishments in Illinois |
Aquil Virani is a Canadian artist, who was born in British Columbia and is currently based in Toronto. He is best known for his community-engaged art projects that explore social issues and often combine public participation and figurative portraiture. His work includes painting, graphic design, illustration, filmmaking, writing and participatory art events.
Early life
Virani grew up in Surrey, British Columbia to immigrant parents and is the youngest of four sons. His mother was born in France, and his father is a Ismaili Muslim of Indian heritage who was born and raised in East Africa, immigrating to Canada from Tanzania. Virani graduated from Southridge Secondary School in 2008, before completing his undergraduate degree at McGill University and graduated with a Bachelor of Arts in Philosophy and Marketing after first studying math and physics. Virani is a self-taught artist and worked at L’Oréal Canada for several years, while moonlighting as an artist, before becoming self-employed in 2014.
Career
In 2012, Virani had a solo art exhibit at McGill University, entitled "Copycat", where he combined hundreds of participant drawings that were reproduced ‘live’ onto a collaborative painting over the course of different events.
In 2014, Virani and Rebecca Jones traveled across Canada to collect stories and drawings for a project entitled "Canada's Self Portrait." The project was partially crowdfunded and received over 800 responses. It was later exhibited at the Galerie Mile End in Montreal and the Canadian Museum of Immigration at Pier 21 in Halifax.
For his 24th birthday, Virani created 24 original works of art in the 24 hours leading up to his birthday.
In 2017, Virani received a grant from the Silk Road Institute's Combating Hate, Advancing Inclusion (CHAI) digital video arts initiative for his project, "Postering Peace". In 2017, at a Montreal vigil in the aftermath of the Quebec City mosque shooting, Virani also had attendees contribute to a "live painting", where they could write messages over his depiction of Muslim hands in prayer. The painting was sent as a gift to the Islamic cultural centre in Sainte-Foy.
In 2017, Virani started a series of portraits of inspiring women for his "CelebrateHer" project, which included portraits of Kwanlin Dün First Nation Chief Doris Bill as well as Ta'an Kwäch'än Council Chief Kristina Kane. The project was unveiled in a series of art exhibits in Montreal, including one at McGill University.
In 2018, Virani won the "Artist for Peace" Award.
In 2020, Virani received a $5,000 Canada Council Digital Originals grant.
For his 30th birthday in 2021, Virani mailed 30 letters to people who had inspired him in some way for his “30 letters” project, which was the focus of an episode of The Doc Project. This included his childhood martial arts instructor, a friend's mother, Roberto Luongo, Ron Maclean, Kent Monkman, among others. He received responses from "about a dozen" people.
In 2021, he designed and produced a bilingual art anthology of Ottawa-based Muslim artists and writers called “Ottawa Inshallah” with the theme, “Ottawa Inshallah: Dreaming of a better future” with financial support from the City of Ottawa.
In 2021, he was also named “Artist-in-Residence” at the Canadian Museum of Immigration at Pier 21. At the end of his residency at the museum in 2022, he unveiled a collaborative animated film, a series of six participatory visual artworks, and a book compiling 100 immigrant stories submitted from participants across the country.
In 2022, Virani also unveiled six commemorative portraits of the victims of the Quebec City mosque shooting, created in accordance with the wishes of the victims’ families. The artworks, measuring 30 x 65 inches each, were shipped to the Centre Culturel Islamique de Québec to be exhibited for the 5th anniversary commemoration of the attack on January 29, 2022, before being gifted directly to the families.
In 2023, Virani presented the “50 Years of Migration” exhibition that debuted at the Aga Khan Museum. The travelling exhibition integrates family photographs, first-hand accounts, historical documents, and personal interviews with Canadian Ismaili Muslims from Uganda, Afghanistan, Syria, Tajikistan, India, Pakistan and beyond. According to an interview published on the museum’s website, Virani’s goal is to "showcase the courage and resilience of the countless Ismaili Muslims who fled their homelands in search of refuge.” He says he "spent hundreds of hours over several months researching, writing, gathering, corresponding, interviewing, editing, photo editing, designing panels, editing text, and producing the audio play [...] in service to the community.” The exhibition was presented in Vancouver, Toronto, Brampton, Kitchener, Pickering, Edmonton, Calgary, Brossard and Ottawa at the Delegation of the Ismaili Imamat, with various political figures like NDP Leader Jagmeet Singh, Brampton Mayor Patrick Brown, and Senator Mobina Jaffer attending different local launch events, including one event co-hosted by the Vancouver Art Gallery.
Later, in a separate project, he collaborated with the Royal Ontario Museum and curator Justin Jennings on a collaborative art project titled “Things will get better” where he "integrated hundreds of these sticky notes into a multimedia artwork, commemorating our collective early pandemic experiences and amplifying the diverse voices of participating community members."
Personal life
Virani is an Ismaili Muslim. He also identifies as a feminist.
References
21st-century Canadian painters
Artists from British Columbia
Living people
Year of birth missing (living people)
McGill University alumni
Canadian male painters
21st-century Canadian male artists |
A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such a database of hashed passwords falls into the hands of an attacker, they can use a precomputed rainbow table to recover the plaintext passwords. A common defense against this attack is to compute the hashes using a key derivation function that adds a "salt" to each password before hashing it, with different passwords receiving different salts, which are stored in plain text along with the hash.
Rainbow tables are a practical example of a space–time tradeoff: they use less computer processing time and more storage than a brute-force attack which calculates a hash on every attempt, but more processing time and less storage than a simple table that stores the hash of every possible password.
Rainbow tables were invented by Philippe Oechslin as an application of an earlier, simpler algorithm by Martin Hellman.
Background
For user authentication, passwords are stored either as plaintext or hashes. Since passwords stored as plaintext are easily stolen if database access is compromised, databases typically store hashes instead. Thus, no one – including the authentication system – can learn a password merely by looking at the value stored in the database.
When a user enters a password for authentication, a hash is computed for it and then compared to the stored hash for that user. Authentication fails if the two hashes do not match; moreover, authentication would equally fail if a hashed value were entered as a password, since the authentication system would hash it a second time.
To learn a password from a hash is to find a string which, when input into the hash function, creates that same hash. This is the same as inverting the hash function.
Though brute-force attacks (e.g. dictionary attacks) may be used to try to invert a hash function, they can become infeasible when the set of possible passwords is large enough. An alternative to brute-force is to use precomputed hash chain tables. Rainbow tables are a special kind of such table that overcome certain technical difficulties.
Etymology
The term rainbow tables was first used in Oechslin's initial paper. The term refers to the way different reduction functions are used to increase the success rate of the attack. The original method by Hellman uses many small tables with a different reduction function each. Rainbow tables are much bigger and use a different reduction function in each column. When colors are used to represent the reduction functions, a rainbow appears in the rainbow table.
Figure 2 of Oechslin's paper contains a black-and-white graphic that illustrates how these sections are related. For his presentation at the Crypto 2003 conference, Oechslin added color to the graphic in order to make the rainbow association more clear. The enhanced graphic that was presented at the conference is shown to the right.
Precomputed hash chains
Given a password hash function H and a finite set of passwords P, the goal is to precompute a data structure that, given any output h of the hash function, can either locate an element p in P such that H(p) = h, or determine that there is no such p in P. The simplest way to do this is compute H(p) for all p in P, but then storing the table requires Θ(|P|n) bits of space, where |P| is the size of the set P and n is the size of an output of H, which is prohibitive for large |P|. Hash chains are a technique for decreasing this space requirement. The idea is to define a reduction function R that maps hash values back into values in P. Note, however, that the reduction function is not actually an inverse of the hash function, but rather a different function with a swapped domain and codomain of the hash function. By alternating the hash function with the reduction function, chains of alternating passwords and hash values are formed. For example, if P were the set of lowercase alphabetic 6-character passwords, and hash values were 32 bits long, a chain might look like this:
The only requirement for the reduction function is to be able to return a "plain text" value in a specific size.
To generate the table, we choose a random set of initial passwords from P, compute chains of some fixed length k for each one, and store only the first and last password in each chain. The first password is called the starting point and the last one is called the endpoint. In the example chain above, "aaaaaa" would be the starting point and "kiebgt" would be the endpoint, and none of the other passwords (or the hash values) would be stored.
Now, given a hash value h to invert (find the corresponding password for), compute a chain starting with h by applying R, then H, then R, and so on. If at any point a value matches one of the endpoints in the table, the corresponding starting point allows to recreate the complete chain. There's a high chance that this chain will contain the value h, and if so, the immediately preceding value in the chain is the password p that we seek.
For example, given the hash , its chain can be computed by first applying R:
Since "" is one of the endpoints in our table, the corresponding starting password "" allows to follow its chain until is reached:
Thus, the password is "" (or a different password that has the same hash value).
Note however that this chain does not always contain the hash value h; it may so happen that the chain starting at h merges with a chain having a different starting point. For example, the chain of hash value , also leads to :
The chain generated by the corresponding starting password "" is then followed until is reached. The search will end without reaching because this value is not contained in the chain. This is called a false alarm. In this case, the match is ignored and the chain of h is extended looking for another match. If the chain of h gets extended to length k with no good matches, then the password was never produced in any of the chains.
The table content does not depend on the hash value to be inverted. It is created once and then repeatedly used for the lookups unmodified. Increasing the length of the chain decreases the size of the table. However, it also increases the time required to perform lookups, and this is the time-memory trade-off of the rainbow table. In a simple case of one-item chains, the lookup is very fast, but the table is very big. Once chains get longer, the lookup slows, but the table size goes down.
Simple hash chains have several flaws. Most serious if at any point two chains collide (produce the same value), they will merge and consequently the table will not cover as many passwords despite having paid the same computational cost to generate. Because previous chains are not stored in their entirety, this is impossible to detect efficiently. For example, if the third value in chain 3 matches the second value in chain 7, the two chains will cover almost the same sequence of values, but their final values will not be the same. The hash function H is unlikely to produce collisions as it is usually considered an important security feature not to do so, but the reduction function R, because of its need to correctly cover the likely plaintexts, cannot be collision resistant.
Other difficulties result from the importance of choosing the correct function for R. Picking R to be the identity is little better than a brute force approach. Only when the attacker has a good idea of what the likely plaintexts will be they can choose a function R that makes sure time and space are only used for likely plaintexts, not the entire space of possible passwords. In effect R shepherds the results of prior hash calculations back to likely plaintexts but this benefit comes with the drawback that R likely won't produce every possible plaintext in the class the attacker wishes to check denying certainty to the attacker that no passwords came from their chosen class. Also it can be difficult to design the function R to match the expected distribution of plaintexts.
Rainbow tables
Rainbow tables effectively solve the problem of collisions with ordinary hash chains by replacing the single reduction function R with a sequence of related reduction functions R1 through Rk. In this way, for two chains to collide and merge they must hit the same value on the same iteration: consequently, the final values in these chain will be identical. A final postprocessing pass can sort the chains in the table and remove any "duplicate" chains that have the same final values as other chains. New chains are then generated to fill out the table. These chains are not collision-free (they may overlap briefly) but they will not merge, drastically reducing the overall number of collisions.
Using sequences of reduction functions changes how lookup is done: because the hash value of interest may be found at any location in the chain, it's necessary to generate k different chains. The first chain assumes the hash value is in the last hash position and just applies Rk; the next chain assumes the hash value is in the second-to-last hash position and applies Rk−1, then H, then Rk; and so on until the last chain, which applies all the reduction functions, alternating with H. This creates a new way of producing a false alarm: an incorrect "guess" of the position of the hash value may needlessly evaluate a chain.
Although rainbow tables have to follow more chains, they make up for this by having fewer tables: simple hash chain tables cannot grow beyond a certain size without rapidly becoming inefficient due to merging chains; to deal with this, they maintain multiple tables, and each lookup must search through each table. Rainbow tables can achieve similar performance with tables that are k times larger, allowing them to perform a factor of k fewer lookups.
Example
Starting from the hash ("re3xes") in the image below, one computes the last reduction used in the table and checks whether the password appears in the last column of the table (step 1).
If the test fails (rambo doesn't appear in the table), one computes a chain with the two last reductions (these two reductions are represented at step 2)
Note: If this new test fails again, one continues with 3 reductions, 4 reductions, etc. until the password is found. If no chain contains the password, then the attack has failed.
If this test is positive (step 3, linux23 appears at the end of the chain and in the table), the password is retrieved at the beginning of the chain that produces linux23. Here we find passwd at the beginning of the corresponding chain stored in the table.
At this point (step 4), one generates a chain and compares at each iteration the hash with the target hash. We find the hash re3xes in the chain, and the password that produced it (culture) one step earlier in the chain: the attack is successful.
Rainbow tables use a refined algorithm with a different reduction function for each "link" in a chain, so that when there is a hash collision in two or more chains, the chains will not merge as long as the collision doesn't occur at the same position in each chain. This increases the probability of a correct crack for a given table size, at the cost of squaring the number of steps required per lookup, as the lookup routine now also needs to iterate through the index of the first reduction function used in the chain.
Rainbow tables are specific to the hash function they were created for e.g., MD5 tables can crack only MD5 hashes. The theory of this technique was invented by Philippe Oechslin as a fast form of time/memory tradeoff, which he implemented in the Windows password cracker Ophcrack. The more powerful RainbowCrack program was later developed that can generate and use rainbow tables for a variety of character sets and hashing algorithms, including LM hash, MD5, and SHA-1.
In the simple case where the reduction function and the hash function have no collision, given a complete rainbow table (one that makes sure to find the corresponding password given any hash) the size of the password set |P|, the time T that had been needed to compute the table, the length of the table L and the average time t needed to find a password matching a given hash are directly related:
Thus the 8-character lowercase alphanumeric passwords case (|P| ≃ 3×1012) would be easily tractable with a personal computer while the 16-character lowercase alphanumeric passwords case (|P| ≃ 1025) would be completely intractable.
Defense against rainbow tables
A rainbow table is ineffective against one-way hashes that include large salts. For example, consider a password hash that is generated using the following function (where "" is the concatenation operator):
saltedhash(password) = hash(password + salt)
Or
saltedhash(password) = hash(hash(password) + salt)
The salt value is not secret and may be generated at random and stored with the password hash. A large salt value prevents precomputation attacks, including rainbow tables, by ensuring that each user's password is hashed uniquely. This means that two users with the same password will have different password hashes (assuming different salts are used). In order to succeed, an attacker needs to precompute tables for each possible salt value. The salt must be large enough, otherwise an attacker can make a table for each salt value. For older Unix passwords which used a 12-bit salt this would require 4096 tables, a significant increase in cost for the attacker, but not impractical with terabyte hard drives. The SHA2-crypt and bcrypt methods—used in Linux, BSD Unixes, and Solaris—have salts of 128 bits. These larger salt values make precomputation attacks against these systems infeasible for almost any length of a password. Even if the attacker could generate a million tables per second, they would still need billions of years to generate tables for all possible salts.
Another technique that helps prevent precomputation attacks is key stretching. When stretching is used, the salt, password, and some intermediate hash values are run through the underlying hash function multiple times to increase the computation time required to hash each password. For instance, MD5-Crypt uses a 1000 iteration loop that repeatedly feeds the salt, password, and current intermediate hash value back into the underlying MD5 hash function. The user's password hash is the concatenation of the salt value (which is not secret) and the final hash. The extra time is not noticeable to users because they have to wait only a fraction of a second each time they log in. On the other hand, stretching reduces the effectiveness of brute-force attacks in proportion to the number of iterations because it reduces the number of attempts an attacker can perform in a given time frame. This principle is applied in MD5-Crypt and in bcrypt. It also greatly increases the time needed to build a precomputed table, but in the absence of salt, this needs only be done once.
An alternative approach, called key strengthening, extends the key with a random salt, but then (unlike in key stretching) securely deletes the salt. This forces both the attacker and legitimate users to perform a brute-force search for the salt value. Although the paper that introduced key stretching referred to this earlier technique and intentionally chose a different name, the term "key strengthening" is now often (arguably incorrectly) used to refer to key stretching.
Rainbow tables and other precomputation attacks do not work against passwords that contain symbols outside the range presupposed, or that are longer than those precomputed by the attacker. However, tables can be generated that take into account common ways in which users attempt to choose more secure passwords, such as adding a number or special character. Because of the sizable investment in computing processing, rainbow tables beyond fourteen places in length are not yet common. So, choosing a password that is longer than fourteen characters may force an attacker to resort to brute-force methods.
Specific intensive efforts focused on LM hash, an older hash algorithm used by Microsoft, are publicly available. LM hash is particularly vulnerable because passwords longer than 7 characters are broken into two sections, each of which is hashed separately. Choosing a password that is fifteen characters or longer guarantees that an LM hash will not be generated.
Common uses
Nearly all distributions and variations of Unix, Linux, and BSD use hashes with salts, though many applications use just a hash (typically MD5) with no salt. The Microsoft Windows NT/2000 family uses the LAN Manager and NT LAN Manager hashing method (based on MD4) and is also unsalted, which makes it one of the most popularly generated tables. Rainbow tables have seen reduced usage as of 2020 as salting is more common and GPU-based brute force attacks have become more practical. However, rainbow tables are available for eight and nine character NTLM passwords.
See also
A5/1
Brute-force attack
DistrRTgen
Pollard's kangaroo algorithm
Notes
References
External links
Ophcrack page by Philippe Oechslin The original rainbow table research
Cryptographic attacks
Search algorithms
Cryptographic hash functions
Hash-based data structures |
A primary election was held among the members of Costa Rica’s then ruling National Liberation Party (PLN) on June 7, 2009 in order to choose the PLN’s nominee for presidency in the 2010 general election. The two main candidates for the nomination were then vice-president Laura Chinchilla and San José Mayor Johnny Araya. Former security minister Fernando Berrocal also ran a basically testimonial candidacy. PLN’s main rival party, PAC, ran its own convention a month before.
PLN primaries, known as National Conventions (Convención Nacional Liberacionista) were common place since the Party’s foundation, yet in the previous election of 2006 PLN’s nominee former president Óscar Arias seeking re-election ran unopposed and was designated by the party’s National Assembly. Unlike its rival PAC, PLN's election was an open primary and as such every Costa Rican could vote as far as pledge written membership to the party (PLN holds open primaries since the 70s). Debates among PLN and PAC’s candidates respectively were organized in different colleges, NGOs and news networks.
Former minister Antonio Álvarez Desanti had recently return to the party expressing his interest in the nomination, yet party regulations prevent his candidacy due to his recent participation in another party. Desanti dropped from the race supporting Chinchilla. While Chinchilla was seen as close to then incumbent president Arias and his faction, Araya was endorsed by his brother and previous candidate Rolando and by his uncle former president Luis Alberto Monge. The final results were 55% for Chinchilla, 41% for Araya and 2% for Berrocal. Chinchilla will also win the presidential race in 2010.
Araya would maintain his political aspirations and would run unopposed in the next election cycle as other aspirants like Rodrigo Arias (former Prime Minister and Oscar Arias’ brother) and José María Figueres (former president) dropped their candidacies for the 2014 election, which was lost by Araya against PAC’s candidate Luis Guillermo Solís.
See also
2010 Costa Rican general election
Citizens' Action Party presidential primary, 2009
References
2009 in Costa Rica
Primary elections in Costa Rica |
Active was built in Bristol in 1799. She made one voyage as a slave ship in the triangular trade in enslaved persons, and then two voyages trading between Bristol and Africa. A French privateer captured her but a Guernsey privateer recaptured her. She then became a West Indiaman. On 16 and 17 July 1808 she repelled a Spanish and a French privateer in two separate single-ship actions. In 1809 she underwent a maritime mishap. She was last listed in 1819.
Career
Active first appeared in the 1799 volume of Lloyd's Register (LR).
Slave voyage (1799–1801): Captain Elisha Arrindell sailed from Bristol on 15 July 1799. Active acquired her slaves in the Sierra Leone estuary. She arrived at Demerara, and Kingston, Jamaica on 15 October 1800. Captain Arrindell had died before she arrived at Demerara; Captain Duffy had replaced him. She arrived with 73 slaves in Kingston, having perhaps landed a smaller number in Demerara first. Active arrived back at Bristol on 3 February 1801.
Captain James Broadfoot sailed from Bristol on 13 March 1801. The voyage was not a slave voyage; Active returned to Bristol on 22 September. Captain Broadfoot had died during the voyage.
On 30 May 1803 Captain William Jones sailed for Cape Coast Castle. Again, the voyage was a trading voyage, not a slave voyage. Active arrived at Cape Coast Castle on 2 August and four days later sailed to Leeward. She returned directly to Bristol, arriving there on 15 October 1804.
In February 1806, a French privateer captured Active, Silcock, master, and three other West Indiamen. Active had been sailing from Demerara for Bristol. The Guernsey privateer Speculator recaptured Active and sent her into Guernsey.
In January 1808, the "fast sailing, coppered brig" Active, of London, was offered for sale. She was of 154 tons (bm), armed with14 guns, and had just returned from a month's cruise.
On 18 July 1808 J.L.Forester, Actives owner, was aboard her when he wrote a letter from Chaquaramas, Trinidad. On 16 July she had been approaching the Demerara river when a Spanish privateer approached. Active was able to repel the attacker in a 40-minute running engagement, but then found herself unable to enter the river. She then sailed to Trinidad. At 6a.m. as she approached Trinidad she encountered a French privateer. She was able to repel the privateer in an engagement of an hour-and-a-half before she could escape. She had no casualties from either engagement, and little damage beyond some cannon shots through her sails.
On 9 August as Active was sailing from Trinidad to she encountered , which detained her and sent her to Jamaica.
On 9 February 1809 Active, Teed, master, was returning to Britain from Jamaica when she was driven ashore at Milford. It was expected that Active would be gotten off, but that she would have to unload. She was refloated the next day after having discharged all her cargo between decks.
Fate
Active was last listed in 1819.
Notes
Citations
References
1799 ships
Age of Sail merchant ships of England
Bristol slave ships
Captured ships
Maritime incidents in 1809 |
Tamil Nadu Grama Bank (TNGB) is a regional rural bank headquartered at Salem in Tamil Nadu, India. The bank is jointly owned by the central and state governments and sponsored by the Indian Bank. It is under the ownership of the Ministry of Finance, Government of India.
Tamil Nadu Grama Bank was formed on 1 April 2019 by the amalgamation of the erstwhile Pallavan Grama Bank and Pandyan Grama Bank, as per GOI Gazette Notification No. 363 dated 28 January 2019.
Share Capital
The paid-up capital is Rs. 46.96 crores, shared by the shareholders as below:
Government of India (50%): Rs. 23 crores and 48 lakhs
Government of Tamil Nadu (15%): Rs. 7 crores and 4 lakhs
Indian Bank (35%): Rs. 16 crores and 44 lakhs
References
External links
Regional rural banks of India
2019 establishments in Tamil Nadu
Indian companies established in 1977
Banks established in 1977
Banks of India |
Rebels FC is a British Virgin Islands football club based in Road Town. The club competes in the BVIFA National Football League, the top tier of British Virgin Islands football.
The club was founded in 2009, and play their home matches in the 1,500-capacity, A. O. Shirley Recreation Ground.
References
External links
BVIFA Club Profile
Football clubs in the British Virgin Islands
2009 establishments in the British Virgin Islands |
Events from the year 1807 in Germany saw a major battle in Danzig and the loss of a third of Prussian land to Napoleon to form the Duchy of Warsaw.
Incumbents
Kingdoms
Kingdom of Prussia
Monarch – Frederick William III of Prussia (16 November 17977 June 1840)
Kingdom of Bavaria
Maximilian I (1 January 180613 October 1825)
Kingdom of Saxony
Frederick Augustus I (20 December 18065 May 1827)
Kingdom of Württemberg
Frederick I (22 December 179730 October 1816)
Grand Duchies
Grand Duke of Baden
Charles Frederick (25 July 180610 June 1811)
Grand Duke of Hesse
Louis I (14 August 18066 April 1830)
Grand Duke of Mecklenburg-Schwerin
Frederick Francis I (24 April 17851 February 1837)
Grand Duke of Mecklenburg-Strelitz
Charles II (2 June 17946 November 1816)
Grand Duke of Oldenburg
Wilhelm (6 July 17852 July 1823) Due to mental illness, Wilhelm was duke in name only, with his cousin Peter, Prince-Bishop of Lübeck, acting as regent throughout his entire reign.
Peter I (2 July 182321 May 1829)
Grand Duke of Saxe-Weimar
Karl August (1758–1809) Raised to grand duchy in 1809
Principalities
Schaumburg-Lippe
George William (13 February 17871860)
Schwarzburg-Rudolstadt
Louis Frederick II (13 April 179328 April 1807)
Friedrich Günther (28 April 180728 June 1867)
Schwarzburg-Sondershausen
Günther Friedrich Karl I (14 October 179419 August 1835)
Principality of Lippe
Leopold II (5 November 18021 January 1851)
Principality of Reuss-Greiz
Heinrich XIII (28 June 180029 January 1817)
Waldeck and Pyrmont
Friedrich Karl August (29 August 176324 September 1812)
Duchies
Duke of Anhalt-Dessau
Leopold III (16 December 17519 August 1817)
Duke of Brunswick
Frederick William (16 October 180616 June 1815)
Duke of Saxe-Altenburg
Duke of Saxe-Hildburghausen (1780–1826) - Frederick
Duke of Saxe-Coburg and Gotha
Ernest I (9 December 180612 November 1826)
Duke of Saxe-Meiningen
Bernhard II (24 December 180320 September 1866)
Duke of Schleswig-Holstein-Sonderburg-Beck
Frederick Charles Louis (24 February 177525 March 1816)
Events
25 January – Battle of Mohrungen
3 February – Battle of Allenstein
March2 July – Siege of Kolberg
April 1–3 – Great Sortie of Stralsund
24 May – Siege of Danzig ends after 6 weeks with Prussian and Russian defenders capitulating to French forces.
5/6 June – Battle of Guttstadt-Deppen
10 June – Battle of Heilsberg
7–9 July – The Treaties of Tilsit are signed between France, Prussia and Russia. Napoleon and Russian Emperor Alexander I ally together against the British. The Prussians are forced to cede more than half their territory, which is formed into the Duchy of Warsaw in their former Polish lands, and the Kingdom of Westphalia in western Germany. The Free City of Danzig is also formed (established 9 September by Napoleon).
24 July-24 August – Siege of Stralsund
7/8 October – Battle of Eylau
9 October – Prussian Reform Movement: Serfdom is abolished by the October edict.
Ludwig Order established.
Morgenblatt für gebildete Stände established.
Births
4 February – Max Emanuel Ainmiller, German glass painter (died 1870)
30 June – Friedrich Theodor Vischer, German author (died 1887)
16 November – Eduard von Fransecky, Prussian general (died 1890)
8 December – Friedrich Traugott Kützing, German pharmacist, botanist and phycologist (died 1893)
Deaths
10 April – Duchess Anna Amalia of Brunswick-Wolfenbüttel, regent of Weimar and Eisenach (born 1739)
19 December – Friedrich Melchior, Baron von Grimm, German writer (born 1723)
References
Years of the 19th century in Germany
Germany
Germany |
Diane Therrien (born 1985 or 1986) is a Canadian politician who served as the 62nd mayor of Peterborough from 2018 to 2022. She was elected in the 2018 Ontario municipal elections. Prior to her mayoral election, she was a city councillor for Ward 3 (Town Ward) from 2014 to 2018.
Prior to her political career, Therrien worked for Ontario's Ministry of Aboriginal Affairs and for the Peterborough Poverty Reduction Network.
Early life and education
Therrien was born in Mississauga and started studying history and peace studies at McMaster University when she was 17 years old. After getting a bachelor's degree from McMaster University, she obtained her master's degree Trent University, where she studied Canadian Indigenous issues.
Career
After graduation, Therrien worked at the Ministry of Aboriginal Affairs in Toronto, and for three years as a facilitator of community education at the Peterborough Poverty Reduction Network.
Prior to her mayoral election, she was a city councillor for Ward 3 (Town Ward) from 2014 to 2018.
Therrien was elected as mayor of Peterborough in the 2018 Ontario municipal elections. Therrien is the third woman to be mayor of the city.
On August 13, 2019, Peterborough City Council unanimously passed a by-law to eliminate camping in City Parks. Therrien announced that she would not allow the police to enforce the bylaws as written. 1,751 members of the local community signed a petition requesting the removal of Tent City, a homeless encampment. The total expense for police patrols of the area in 2019 was more than $86,000. On February 14, 2022, Therrien asked Deputy Mayor Andrew Beamer to serve as acting mayor while she took a leave of absence for health reasons.
In 2021, Therrien announced she would not run for re-election. She had been rumoured to run for the Ontario New Democratic Party in the 2022 Ontario general election, but decided to not run. In 2022, Therrien was involved in a minor controversy after using the phrase "fuck off, you fuckwads." in response to supporters of QAnon conspiracy theorist Romana Didulo attempting to detain members of the city's police force.
Her mayoral term ended in November 2022.
References
External links
City of Peterborough City Council and Mayor
Official site, copy archived August 11, 2020
Diane Therrien - Twitter
1980s births
Living people
Mayors of Peterborough, Ontario
McMaster University alumni
Politicians from Mississauga
Trent University alumni
Women mayors of places in Ontario
Year of birth missing (living people) |
Ojibway is an extinct town in southern Wayne County, in the U.S. state of Missouri. The community location lies adjacent to the Otter Creek arm of Lake Wappapello approximately one mile from the end of Missouri Route PP. Previous to the formation of the lake the community was along Otter Creek and the St. Louis and San Francisco Railroad line just west of Chaonia.
Ojibway had its start as a town in 1888 when the railroad was extended near that point. A post office called Ojibway was established in 1901, and remained in operation until 1940. The community has the name of the Ojibway Indians.
References
Ghost towns in Missouri
Former populated places in Wayne County, Missouri |
Dantine is a surname. Notable people with the surname include:
Helmut Dantine (1917–1982), Austrian-American actor
Maurus Dantine (1688–1746), Belgian Benedictine and chronologist
See also
Michel Dantin (born 1960), French politician |
The men's 60 metres hurdles event at the 1973 European Athletics Indoor Championships was held on 11 March in Rotterdam.
Medalists
Results
Heats
First 3 from each heat (Q) qualified directly for the semifinals.
Semifinals
First 3 from each heat (Q) qualified directly for the final.
Final
References
60 metres hurdles at the European Athletics Indoor Championships
60 |
```javascript
/*
* jQuery File Upload Validation Plugin
* path_to_url
*
* path_to_url
*
* path_to_url
*/
/* global define, require, window */
;(function (factory) {
'use strict';
if (typeof define === 'function' && define.amd) {
// Register as an anonymous AMD module:
define([
'jquery',
'./jquery.fileupload-process'
], factory);
} else if (typeof exports === 'object') {
// Node/CommonJS:
factory(
require('jquery'),
require('./jquery.fileupload-process')
);
} else {
// Browser globals:
factory(
window.jQuery
);
}
}(function ($) {
'use strict';
// Append to the default processQueue:
$.blueimp.fileupload.prototype.options.processQueue.push(
{
action: 'validate',
// Always trigger this action,
// even if the previous action was rejected:
always: true,
// Options taken from the global options map:
acceptFileTypes: '@',
maxFileSize: '@',
minFileSize: '@',
maxNumberOfFiles: '@',
disabled: '@disableValidation'
}
);
// The File Upload Validation plugin extends the fileupload widget
// with file validation functionality:
$.widget('blueimp.fileupload', $.blueimp.fileupload, {
options: {
/*
// The regular expression for allowed file types, matches
// against either file type or file name:
acceptFileTypes: /(\.|\/)(gif|jpe?g|png)$/i,
// The maximum allowed file size in bytes:
maxFileSize: 10000000, // 10 MB
// The minimum allowed file size in bytes:
minFileSize: undefined, // No minimal file size
// The limit of files to be uploaded:
maxNumberOfFiles: 10,
*/
// Function returning the current number of files,
// has to be overriden for maxNumberOfFiles validation:
getNumberOfFiles: $.noop,
// Error and info messages:
messages: {
maxNumberOfFiles: 'Maximum number of files exceeded',
acceptFileTypes: 'File type not allowed',
maxFileSize: 'File is too large',
minFileSize: 'File is too small'
}
},
processActions: {
validate: function (data, options) {
if (options.disabled) {
return data;
}
var dfd = $.Deferred(),
settings = this.options,
file = data.files[data.index],
fileSize;
if (options.minFileSize || options.maxFileSize) {
fileSize = file.size;
}
if ($.type(options.maxNumberOfFiles) === 'number' &&
(settings.getNumberOfFiles() || 0) + data.files.length >
options.maxNumberOfFiles) {
file.error = settings.i18n('maxNumberOfFiles');
} else if (options.acceptFileTypes &&
!(options.acceptFileTypes.test(file.type) ||
options.acceptFileTypes.test(file.name))) {
file.error = settings.i18n('acceptFileTypes');
} else if (fileSize > options.maxFileSize) {
file.error = settings.i18n('maxFileSize');
} else if ($.type(fileSize) === 'number' &&
fileSize < options.minFileSize) {
file.error = settings.i18n('minFileSize');
} else {
delete file.error;
}
if (file.error || data.files.error) {
data.files.error = true;
dfd.rejectWith(this, [data]);
} else {
dfd.resolveWith(this, [data]);
}
return dfd.promise();
}
}
});
}));
``` |
Anne-Marie Aaröe (born 20 May 1925), also known as Ami Aaröe or Amy Aaröe, is a Swedish actress who appeared during the classic cinema era.
Biography
Aaröe was born on 20 May 1925 in Stockholm, Sweden. She is the daughter of captain Arvid Aaröe and his wife Hjördis, née Ström. Ami made her film debut in Hasse Ekman's film Ombyte av tåg, which was filmed in 1942 and premiered in 1943. She had her first speaking role at theatre as Titania in A Midsummer Night's Dream in 1945. Alongside the acting profession, she has been the director of the film company Starfilm.
Aaröe made other appearances in other films like ...och efter skymning kommer mörker (1947), A Ship to India (1947), Love, Sunshine and Songs (1948) and Le Silence de la Mer (1949).
Personal life
Ami was married to the French dancer and graduate engineer Guy Patrick Delmas in 1955 and they had a daughter who was born in Paris. After her husband death she resided in her villa in Tulegatan, Stockholm.
Filmography
The Nuthouse (1951)
Le Silence de la Mer (1949) - La fiancée
Love, Sunshine and Songs (1948) - Britt
A Ship to India (1947) - Young Girl at the beach
...och efter skymning kommer mörker (1947)
Ombyte av tåg (1943) - Aina
References
1925 births
Possibly living people
Swedish film actresses
Swedish stage actresses
Swedish film directors
Actresses from Stockholm |
See also Exhaustion of intellectual property rights for a general introduction not limited to U.S. law.
The exhaustion doctrine, also referred to as the first sale doctrine, is a U.S. common law patent doctrine that limits the extent to which patent holders can control an individual article of a patented product after a so-called authorized sale. Under the doctrine, once an authorized sale of a patented article occurs, the patent holder's exclusive rights to control the use and sale of that article are said to be "exhausted," and the purchaser is free to use or resell that article without further restraint from patent law. However, under the repair and reconstruction doctrine, the patent owner retains the right to exclude purchasers of the articles from making the patented invention anew (i.e., making another article), unless it is specifically authorized by the patentee to do so.
Procedurally, the patent exhaustion doctrine operates as an affirmative defense, shielding authorized purchasers from infringement claims concerning the sale or use (including repair and modification) of a patented product after the patent owner authorized its sale.
Because only an "authorized" sale triggers the doctrine, it may be difficult or at least controversial to determine whether the exhaustion doctrine applies in a particular case: for example, when the patentee purports to restrict or condition the use or resale of the patented article once purchased and in the hands of an end user (post-sale restrictions); or when the patentee licenses another to manufacture and use or sell the patented product only in a particular field. The 2008 Supreme Court decision in Quanta Computer, Inc. v. LG Electronics, Inc., arguably leaves unclear the extent to which patentees can avoid the exhaustion doctrine by means of so-called limited licenses (licenses limited to a specified field of use). Since its development by the courts in the late 19th century, the patent exhaustion doctrine has raised questions regarding the scope of exclusive rights granted by patents and the extent to which a patent owner may extend those rights to control downstream use and sales of patented articles.
Overview
A patent gives the patent owner the right to exclude others from making, using, selling, offering for sale, or importing into the U.S. the patented invention (i.e., a product embodying the invention) during the term of the patent. The constitutional rationale behind providing these exclusive rights is to "promote the Progress of Science and useful Arts" by providing inventors the incentive to invest their time, labor, and funds in researching and developing innovative technology. Providing these protections, however, comes with social costs (monopoly rents) and limits the public's ability to freely alienate patented goods. Thus, public policy dictates that the patent owner's exclusive rights be limited in scope. Generally, when a patent owner receives compensation for the use of his or her invention through sale of a patented product, the purpose of patent law is fulfilled with respect to that product. Upon receiving compensation, the patent owner's rights to exclude others are exhausted and "the patent law affords no basis for restraining the use and enjoyment of the thing sold." Accordingly, a patent owner's voluntary introduction of a patented product into commerce without restriction prevents the patent owner from exercising any claimed right to exclude others from using or reselling the sold product.
Unlike the analogous first-sale doctrine in copyright, the patent exhaustion doctrine has not been codified into the patent statute, and is thus still a common law doctrine. It was first explicitly recognized by the Supreme Court in 1873 in Adams v. Burke. In that case, the patentee Adams assigned to another the right to make, use, and sell patented coffin lids only within a ten-mile radius of Boston. Burke (an undertaker), a customer of the assignee, bought the coffin lids from the manufacturer-assignee within the ten-mile radius, but later used (and effectively resold) the patented coffin lids outside of the ten-mile radius, in his trade in the course of burying a person. The patentee Adams sued the undertaker Burke for patent infringement, but the Supreme Court found no infringement liability: Once the coffin lids were lawfully made and sold, "there is no restriction on their use to be implied for the benefit of the patentee or his assignees or licensees." Because the sale was authorized (bought from an authorized seller within the ten-mile radius), the defendant acquired the right to use the coffin lids free from any claim of the patentee, even though he carried it outside the ten-mile radius to use it.
Limitations
The exhaustion doctrine is triggered only by a sale authorized by the patent holder. Thus, there are circumstances where it may be difficult to determine whether the exhaustion doctrine is triggered, in light of restrictions that the patentee has purported to place on the sale or use of the patented invention. Two general questions arise in these situations: (1) Was the sale authorized by the patentee? This can often be a complex factual question. (2) Regardless of whether authorized by the patentee, are those restrictions valid and recognizable under the law?
Generally, these cases involve one or more of the following scenarios: the patent owner: (1) sells one or more components of a multi-component patented product; (2) licenses another to make and sell patented product with certain restrictions on field in which the sale may be made; or (3) sells the article with restrictions directly on the purchasers or end-users (post-sale restraint).
Sale of incomplete articles
One scenario in which the exhaustion doctrine may or may not be triggered is when the patent holder sells an incomplete article or precursor or ingredient that does not directly practice or embody the patent in suit. In this situation, exhaustion is triggered by the authorized sale of the incomplete article if: (1) its "only reasonable and intended use was to practice the patent, and (2) it "embodies essential features" of the patented invention. Even if the exhaustion doctrine is applicable to the sale of an incomplete article, however, there is a separate analysis of whether the sale of that article was actually authorized, and therefore whether exhaustion was actually triggered.
The applicability of exhaustion to the sale of an incomplete article was recognized by the Supreme Court in 1942 in United States v. Univis Lens Co.. In that case, the patent holder sold lens blanks which had to be ground into finished lenses — the patented invention. The Court held that this sale exhausted the patents on the finished lenses because the lens blanks substantially "embodi[ed] essential features of the patented device and [were] without utility until . . . ground and polished as the finished lens of the patent." The Court noted that the grinding process was standard (conventional) and not central to the patents, indicating further that the lens blanks constituted a material part of the patented invention and all but completely practiced the patent, since only conventional further processing steps were needed to complete the invention.
In Quanta, the Supreme Court applied the same test to determine whether exhaustion is triggered by the licensing of a portfolio of product and method patents. In that case, the patent holder (LGE) authorized the licensee (Intel) by cross-license to manufacture and sell microprocessors and chipsets that (unless licensed) would infringe LGE product and method patents, as well as patents on computer systems containing the licensed microprocessors and chipsets. The Court found that, even though these Intel products did not directly practice the system patents, they sufficiently embodied the inventions of those patents, making the exhaustion doctrine applicable. First, the Court found that there was no reasonable use for the Intel products other than incorporating them into a computer system that practiced the LGE system patents. Second, the Intel products embodied essential features of the patented processes because the only necessary step to practice the patents was the addition of such standard computer parts as memories and buses. In addition, there was nothing inventive about the systems other than that they contained the inventive microprocessors and chipsets. Thus, under the Univis test, the Intel products sufficiently embodied the patents, making the exhaustion doctrine applicable.
Limitations on sale
Another scenario in which it may be difficult to determine if the sale of a patented article was authorized, and therefore if exhaustion is triggered, occurs when the patentee grants a license to make and sell with specific limitations on the field in which the seller may operate, such as sales to particular types of customer, specified territories, or other field-of-use limitations. If these limitations (or "restrictions") have been imposed, the licensee's sale to a purchaser exhausts only the patentee's rights to restrict use and resale when the restrictions have not been exceeded ("violated"). The theory is that if Alice owns Blackacre but not Whiteacre, she cannot convey good title to Bob by purporting to sell him Whiteacre. She can sell only what she owns. If the license limitations ("restrictions") are exceeded ("violated"), then exhaustion cannot occur and therefore is not triggered, and the patentee can successfully sue the licensee and any downstream customers for patent infringement.
The Supreme Court in General Talking Pictures Corp. v. Western Electric Co. has specifically upheld the legitimacy of field-of-use limitations in patent licenses to manufacture patented products. A licensee who exceeds ("violates") a field-of-use limitation by selling an article outside of the permissible field commits patent infringement. The exhaustion doctrine would provide no protection because the "violation" makes the sale "unauthorized" for the purposes of the exhaustion doctrine.
The field-of-use limitations on sale (those imposed on the licensee in selling the patented articles) are different from post-sale restrictions or limitations (those that purpose to restrict the use or sale of the patented article once purchased and in the hands of an end user). Patentees can avoid the exhaustion doctrine by imposing the former, but it is questionable that patentees can do so through the latter.
Limitations on sale must very explicitly bind the licensee or seller. For example, in Quanta, LGE licensed Intel to make products using LGE's patents. The license expressly stated that LGE was not licensing third parties to combine licensed products with any non-Intel products (i.e., microprocessors and chipsets purchased from a third party), and LGE required Intel to notify customers of that. Intel sold products to Quanta, who combined the Intel products with non-Intel products. LGE sued Quanta for patent infringement. The Supreme Court found that the licensing agreement failed to explicitly impose a field-of-use limitation, and therefore found that there were no conditions limiting to whom Intel could sell. The sale was thus "authorized," and exhaustion was triggered. In the Court's words, "The License Agreement authorized Intel to sell products that practiced the patents. No conditions limited Intel's authority to sell products substantially embodying the patents. . . . Intel's authorized sale to Quanta thus took its products outside the scope of the patent monopoly, and as a result, LGE can no longer assert its patent rights against Quanta."
Because the contractual documents in the Quanta case were insufficiently explicit, the Court applied the exhaustion doctrine, finding the sale "authorized" and unconditional, even though LGE attempted to impose some restrictions on use of the products. Therefore, purchasers of the patented product were free to use them without restrictions that the patentee sought to have imposed on them. The Court found that the licensing agreement did not impose any limitations on whom the licensee could sell to. The Quanta Court did not address, however, whether the restriction in the licensing agreement could be enforced by contract. In fact, the Court pointedly said it was not addressing that issue.
Post-sale limitations
The most difficult and unsettled area of the law regarding patent exhaustion involves cases in which a patentee purports to impose post-sale restrictions. Post-sale restrictions are those that purport to restrict the use or sale of the patented article once purchased and in the hands of an end user customer, rather than similar limitations on a manufacturer-licensee. Common post-sale restrictions include "single use only" and "refill only with proprietary ink" notices. Whether violations of such restrictions make a sale "unauthorized," and therefore make patent exhaustion inapplicable, is still unclear or at least controversial.
In 1992, the Federal Circuit approved the use of post-sale restrictions in Mallinckrodt, Inc. v. Medipart, Inc.. Specifically, the court held that patent owners could condition the sale of patented goods with a restrictive notice and thereby restrict the disposition of the goods by the purchasers, with the exception of such antitrust law violations as price-fixing and tie-in restrictions, or violations of "some other law or policy." The plaintiff in the case owned a patent on a medical device, which it sold to hospitals with a "single use only" notice label. The defendant purchased the used devices from hospitals, refurbished them, and resold them to hospitals. The Federal Circuit held that the single-use restriction was enforceable in accordance with the 1926 General Electric case, because the restriction was "reasonably within the patent grant. . . ."
The Supreme Court did not discuss the Mallinckrodt case in Quanta. As one commentator noted: "The Supreme Court, in Quanta, was widely expected to rule on whether Mallinckrodt was good law. But the Court sidestepped the issue by narrowly interpreting the license agreement so that it was not a conditional license. . . . Because the Supreme Court sidestepped the issue, it remains unclear to what extent a patentee can use a conditional license to impose restrictions on downstream purchasers."
At least two district courts have concluded that Mallinckrodt is no longer good law after Quanta. In Static Control Components, Inc. v. Lexmark Int'l, Inc., the court concluded that the Supreme Court's Quanta decision implicitly overruled Mallinckrodt. At issue in Static Control was Lexmark's so called "prebate" program, in which customers could buy cartridges that were subject to a single use for a 20 percent discounted price. In its original order, before Quanta was decided, the court rejected Static Control's argument that Lexmark's patent rights were exhausted as a result of the authorized sale of the cartridges. Relying heavily on Mallinckrodt, the court found that the sales were valid post-sale restrictions that avoided exhaustion. After Quanta was decided, however, the court reversed its original order and concluded that Lexmark's single use restriction was not enforceable under patent law because the court was "persuaded that Quanta overruled Mallinckrodt sub silentio." The court explained, "The Supreme Court's broad statement of the law of patent exhaustion simply cannot be squared with the position that the Quanta holding is limited to its specific facts. Further, the Federal Circuit relied in part on Mallinckrodt in reaching its decision in LG Electronics, Inc. v. Bizcom Electronics, Inc., 453 F.3d 1364, 1369 (Fed. Cir. 2006), the decision the Supreme Court reversed in Quanta. It is also worth noting that the Quanta decision did not mention a single Federal Circuit case."
The district court's conclusion, however, that Quanta overruled Mallinckrodt reflects the ambiguity in Quanta itself. The Static Control court noted that "[s]ales of Lexmark Prebate cartridges were unconditional" because "[n]o potential buyer was required to agree to abide by the Prebate terms before purchasing a cartridge. Thus, sales of Lexmark's Prebate toner cartridges were authorized and unconditional, just like sales of LGE's patented products in Quanta."
Therefore, both Quanta and Static Control can be seen as either cautionary tales about failed attempts to comply with the General Talking Pictures doctrine or to explicitly condition sales, without need to rule on whether the post-sale restrictions were valid, or as overruling Mallinckrodt'''s approval of post-sale restrictions. Which interpretation is correct remains to be seen. The Federal Circuit's decision in the en banc reargument of Lexmark Int'l v. Impression Prods. should provide a more definitive answer, subject of course to possible further review in the Supreme Court.
International exhaustion
An emerging issue is whether U.S. patent exhaustion is international or strictly national. Until recently, or at least since the formation of the Federal Circuit in 1982 until recently, most U.S. courts simply assumed that a sale outside the United States, even if made by the U.S. patent owner or its parent, subsidiary, or affiliate, or by the U.S. patent owner's licensee, did not trigger the exhaustion doctrine within the United States. Usually, the basis for the assumption was (1) the Supreme Court allegedly so held in Boesch v. Graff; (2) a foreign patent is a different property right that is not the same as a corresponding U.S. patent because foreign patent law is different from U.S. patent law and gives different scope to such a foreign patent; and (3) many cases hold that U.S. patent law has no "extraterritorial" application.
None of these points is on firm, sound ground. In the Boesch case, a seller entirely unrelated to the U.S. patent owner made the sale in Germany; the German seller had a right to sell the product under German law because it had begun preparation to manufacture the product before the U.S. patent owner applied for its German patent. The U.S. company (the patentee) had no complicity in the sale and did not profit from it, and could not possibly be accused of "double dipping." This is quite unlike the usual U.S. situation, such as that in the Lexmark and Jazz cases, in which the U.S. patent owner was responsible for the foreign sale, and therefore profited from it. The Boesch case is therefore not a proper precedent to support the general international exhaustion situation.
Whether foreign patents are comparable to U.S. patents is a factual issue that may differ from case to case, or nation to nation, and cannot be assumed one way or the other. Furthermore, 35 U.S.C. § 119(a), the U.S. patent statute governing when a U.S. patent can be based on a filing of a foreign patent application, provides that the U.S. patent and the corresponding foreign patent must be "for the same invention." Therefore, there may be far more similarity than the cases assume.
Finally, the statement that U.S. patent law is without extraterritorial application occurs universally in cases holding that liability for patent infringement under U.S. law should not be based on acts and conduct occurring outside the United States. And even that generality is suspect, for sometimes patent infringement liability in the United States is based on conduct outside the United States. Applying exhaustion on an international basis does not regulate acts and conduct performed outside the United States; it defines infringement remedies against importation into and sale in the United States on the basis of acts and conduct performed outside the United States.
The point is now pending decision in the Federal Circuit, because that court has ordered en banc rehearing on that issue in the Lexmark case. The reason that the issue has come to the fore is that the Supreme Court, in its recent copyright decision in Kirtsaeng v. John Wiley & Sons, Inc., held that a foreign sale authorized by the copyright owners exhausts U.S. copyright. The Supreme Court rested its decision mainly on common-law authority, quoting extensively from Coke's Institutes (Coke on Littleton), and saying that this stated the general rule from which any exception must be proved. Some have thought, therefore, that the same principle applies at least as forcefully in patent law as in copyright law, so that patent exhaustion should be international just as copyright exhaustion is.
In Europe and Japan, a regime of absolute or modified international exhaustion of patent rights is followed. Australia, New Zealand, and Norway also adopt international patent exhaustion.
The World Trade Organization (WTO) Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS) explicitly leaves to each member state the freedom to address exhaustion of intellectual property. A World Intellectual Property Organization (WIPO) report in 2010 provides a listing of various countries' statutory provisions on international exhaustion.
Standing or right to assert exhaustion
Another emerging issue under the exhaustion doctrine is what persons may assert the exhaustion doctrine as a defense to a claim of patent infringement. In most of the exhaustion cases discussed earlier in this article, the facts of the case follow what may be termed a "straight line" pattern: A patentee A (or its licensee) makes and sells a product a covered by patent P1 to customer C. C then does something with a that A has ordered (by some sort of agreement or putative agreement) C not to do. A patent infringement suit, A v. C, follows. Diagrammatically, this fact pattern may be represented as:
A → a (P1) → C
where a(P1) means that patent P1 covers product a and the → indicates a sale
New information-technology inventions can lead to exhaustion suits following a different fact pattern, because of peculiarities of information technology and present U.S. patent law. An information-technology invention may involve several aspects each of which has a separate stakeholder. For example, a smartphone, TV set, or set-top box may be economically important to both equipment manufacturers and content providers, as well as the end user public (i.e., consumers). A license or sale to one stakeholder may or may not trigger the exhaustion doctrine with respect to conduct by another stakeholder, perhaps depending on how relevant business transactions are structured.
Under present U.S. patent law, a method claim of a patent is infringed only when a single actor performs each step of the claim. Similarly, induced infringement of a method claim has the same requirement. System claims raise more complicated issues. One can make the system only by placing each element into combination with the others, but it is possible to be liable for using a system invention merely by commercially exploiting the system. Therefore, when both the relevant equipment manufacturer and content provider utilize aspects of the invention in a method claim, whether infringement liability attaches to them may depend on both how the relevant claim is written and how licenses or sales are structured. This is illustrated in pending smartphone litigation, in which structure dictated the legal outcome.
In Helferich Patent Licensing, LLC v. New York Times Co., the Federal Circuit overturned a district court's summary dismissal on exhaustion grounds of a patent infringement suit against content providers. The invention concerns methods and systems for alerting smartphone users to content that may be of interest to them, for example, breaking news stories. The way the invention works is along these lines: A content provider such as the New York Times sends a text message to its online subscribers' smartphones. The message might consist of a headline and the lead to a story, together with a hyperlink to the story as stored in the online database of the New York Times. A subscriber interested in reading the story clicks on the link and thus causes the browser for the smartphone to retrieve and display the story.
The way the claims were drafted is very important to the outcome. There are two relevant types of claim, One set considers only smartphone manufacturers, and the claims describe only acts performed in the smartphone (receiving signals, clicking on hyperlinks, etc.). The other set of claims considers only acts that the content providers perform (sending the text message alert, storing the news story, sending it out over the Internet in response to a hyperlink click, etc.). Thus, it is possible to infringe one set of these single-actor claims without infringing the other.
The patentee licensed substantially all smartphone manufacturers in the United States under the first set of patents. It then sought to license content providers. When some content providers, including the New York Times, refused to take licenses under the second set of patents, claiming that under the exhaustion doctrine they needed no licenses, the patentee sued them. Instead of the "straight line" fact pattern described above for prior exhaustion cases, this case has a different, bi-directional pattern. Diagrammatically, the fact pattern of this type of case is as follows:
P → lic (P1) → A, a
Patentee P licenses manufacturer A under patent P1 (the smartphone patents) to make smartphones a embodying the patented invention. A then sells smartphones a to consumers C.
A → a (P1) → C ← i (P2) ← B
Content provider B sends news alerts and content i to consumers C, thus practicing the method claimed in patent P2 (the content provider patents).
On appeal from the district court's summary judgment ruling, the Federal Circuit held that the structure of the patent licensing arrangement avoided the exhaustion doctrine. The court ruled that the exhaustion doctrine may be asserted only by an "authorized acquirer" — one who purchases the patented article from the patentee or its authorized seller. The court further explained this, using slightly different terminology:
[It is a] core notion that exhaustion lifts legal restrictions on an authorized acquirer. The doctrine has never applied unless, at a minimum, the patentee's allegations of infringement . . . entail infringement of the asserted claims by authorized acquirers . . . Here, as noted, that is not so, because infringement of the content claims has not been . . . shown to require that [the authorized] handset acquirers are practicing those claims.
As the patentee put it in its brief, and the court accepted, "the exhaustion doctrine protects only the ability of a purchaser (or other lawful possessor) of an article to use and sell the article." The content providers were not parties to the transaction that triggered whatever exhaustion there was — that transaction was the sale of smartphones by manufacturers to consumers. The exhaustion doctrine exists to protect the interests of purchasers, not third parties. The patentee told the Federal Circuit, and it apparently agreed, that the exhaustion doctrine does not immunize the conduct of the content providers, "regardless of the effect on the amount of licensed content available to their subscribers' handsets."
Moreover, the patent claims licensed to the manufacturers (the P1 of the diagram above) are not infringed by the conduct of the content providers accused of infringement. Their conduct infringes the P2 patent claims that were not licensed to the manufacturers. The only sale in the case was by the licensed smartphone manufacturers to the consumer end users, and that sale exhausted only the P1 claims. The Federal Circuit said exhaustion cannot occur as to unrelated patent claims. The court added that the content providers had not shown that the licensed P1 claims embodied substantially the same invention as the P2 patent claims under which the content providers were sued, so that the doctrine of the Univis and Quanta cases did not apply to expand the scope of the exhaustion.
There is another possible way to analyze cases of this type, but the parties did not raise it and the court did not address it. That would be to make an equitable estoppel analysis as to whether smartphone purchasers had reasonable expectations at the time of purchase and whether the result reached in the case unfairly and substantially derogated from the rights the purchasers expected to enjoy, as a result of conduct by the plaintiff. That is an approach similar to one of those that the House of Lords considered in the British Leyland case.
Comparable doctrines outside U.S.
Other countries recognize legal doctrines comparable to the exhaustion doctrine of U.S. patent law.
Canada
In Eli Lilly and Co. v. Apotex Inc., the Supreme Court of Canada adopted the principle that sale of a patented article exhausts the patentee's right in that article. In the Eli Lilly case the Supreme Court also took the position that subsequent purchasers are not bound by any contractual limitations imposed by the patentee, unless they are brought to their attention at the time of sale: "restrictive conditions imposed by a patentee on a purchaser or licensee do not run with the goods unless they are brought to the attention of the [subsequent] purchaser at the time of their acquisition." This principle appears to differ somewhat from U.S. patent law, in which bringing the restriction to the attention of the purchaser is generally immaterial.
Germany
Approximately 60 percent of European patent litigation is in German courts. German law has long recognized the exhaustion doctrine. In the Fullplastverfahren case, the German Federal Supreme Court stated:
The doctrine [of exhaustion] finds its justification in the argument that the holder of the rights who puts into circulation the product produced under the application of the protected procedure has had the opportunity to avail himself of the advantages granted by the patent.
A commentator asserts that the decision of the German Federal Supreme Court in the Brochure Rock case would require a contrary result as to the fact pattern of the U.S. Quanta case (discussed above). The sale of the chips would not exhaust the patent rights to the computer systems containing the chips, so that LG in that case would have been entitled to a further royalty payment from Quanta despite LG's license to the chip manufacturer Intel.
A recent decision of the Düsseldorf District Court, however, perhaps points to greater similarity between German and U.S.; patent law. The case had facts almost identical to those of the Quanta case. The court held that the sale of the component did not exhaust the patent rights on the system because, among other things, the components sold by the suppliers did not make use of the teachings of the system patent.
As for using the doctrine of the U.S. Quanta case, the Düsseldorf District Court stated that the rationale for such an "extended exhaustion doctrine" could only be to prevent the patent owner from enjoying the advantages of the patent more than once, that is, "double dipping" or "double charging." The court said that such a danger of double charging at different stages of the distribution chain and, thus, a rationale for an "extended exhaustion doctrine," might exist if, in one and the same patent, there is a claim to the overall device and a claim to an individual component of the overall device. That was not the case here.
A second basis for an "extended exhaustion doctrine" might exist if the overall device and its individual components are protected by different patents (as here), but only when the inventive concept of the two patents is the same and is substantially embodied in the component. But that was not true here, as it was in the Quanta case. This is the point of possible similarity to Quanta, but it is entirely in the form of obiter dicta,
The court ruled that the fact that the component had no reasonable use except in making the patented system (which was so in the Quanta case) did not matter, because that raised an implied license issue rather than an exhaustion issue. The component manufacturer's license expressly disclaimed any such implied license as to the system (as in the Quanta case).
References
External links
Box-wrap patent infringement
Quanta v. LG at scotuswiki.com.
Quanta Computer Inc v LGE Electronics Inc—Comments on the Reaffirmance of the Exhaustion Doctrine in the United States, [2008] Eur. Intell. Prop. Rev 527
Oral argument in Federal Circuit en banc hearing on Mallinckrodt and Jazz Photo'' cases
Intellectual property law of the European Union
United States patent law
Legal doctrines and principles |
The Bayer designation Xi Capricorni (ξ Cap, ξ Capricorni) is shared by two star systems, in the constellation Capricornus:
ξ¹ Capricorni
ξ² Capricorni, being the brighter of the two, often simply called ξ Capricorni
They are separated by 0.25° in the sky.
Capricorni, Xi
Capricornus |
Time Bomb is a novel by British author Nigel Hinton which was first published in 2005. It is set in 1949 and tells the story of four boys who found an un exploded bomb where they played.
Concept
The concept came to the author whilst he was waiting at traffic lights in his car. He thought of the phrase 'I've never told this story to anyone because when I was twelve I swore on an oath in blood that I would never tell it.' It is also based on his childhood in the post war years.
Reception
Inis Magazine praised the narrative around the lives of the youngsters and the glimpses into their fears and their emotions.
References
2005 British novels
Puffin Books books
Fiction set in 1949
Novels by Nigel Hinton |
In the Shadow of the Moon is a 2019 American science fiction thriller film directed by Jim Mickle and written by Gregory Weidman and Geoff Tock. It stars Boyd Holbrook, Cleopatra Coleman, and Michael C. Hall. It had its world premiere at Fantastic Fest on September 21, 2019, before it was released on Netflix on September 27, 2019.
Plot
In 1988 in Philadelphia, several people simultaneously hemorrhage to death as their brains experience massive blood loss. Police officer Thomas Lockhart and his partner, Maddox, investigate the case with Lockhart's brother-in-law, Detective Holt. Lockhart concludes that the deaths are connected when he finds similar puncture wounds on each victim. Lockhart and Maddox find an assault victim with the same wounds; she describes her assailant as a black woman with a wounded hand before dying. Lockhart and Maddox find the suspect and chase her into a subway, where she subdues Maddox. When Lockhart confronts her, the suspect reveals details about his life, including that his wife will give birth that day. She predicts her own death just prior to a struggle, which ends with a train striking and killing her. Although confused about the many unexplained details, the police close the case. Meanwhile, Lockhart's wife dies in childbirth.
Nine years later in 1997, an apparent copycat begins another killing spree. Lockhart, now a detective caring for his young daughter Amy, can find no apparent motive or connection between the victims. Lockhart traces keys retrieved in 1988 to an aircraft manufactured in 1996. Naveen Rao, a physicist, insists this is proof of time travel, but Maddox and Lockhart ignore him. After tracking the copycat to an airfield, Lockhart is shocked to find the same suspect from 1988, who is alive and has not aged. She unintentionally kills Maddox and takes Lockhart hostage, again revealing knowledge about his life she could not know. After warning him off, she disappears.
In 2006, Lockhart is a private investigator obsessed with solving the case, which he now believes involves time travel and Dr. Rao, who has disappeared. The teenage Amy lives with Holt, and Lockhart maintains only occasional contact with her. Lockhart discovers a previously unrecorded victim from the 1988 murders and visits the victim's wife, who reveals her husband ran a white nationalist militia group. Lockhart meets Holt and advances the theory that the suspect is moving back in time as they are moving forward, killing each terrorist group members, but Holt dismisses the theory and insists Lockhart get psychiatric help. Lockhart steals Holt's badge, uses it to impersonate a police officer, and tracks down the former girlfriend of the white nationalist leader, arriving at her home to find she has been murdered by the suspect. Lockhart chases the suspect and wounds her hand with a bullet before she disappears in a time machine. Lockhart is arrested by Holt as an unseen Rao watches.
In 2015, while waiting for the woman on the beach, Lockhart listens to a voice message from Amy asking him to come to the birth of her child. He is suddenly kidnapped by Rao. Rao admits to developing the technology the woman uses to kill her victims, an injection whose effects can be remotely triggered through time. He says he now believes her cause is justified, and that she is killing only those who inspired the perpetrators of a terrible tragedy. Lockhart escapes from Rao and confronts the woman — who reveals herself as Rya, Amy's daughter and his granddaughter.
Many years later, Lockhart convinces an adult Rya to take the mission after the militia group's terrorism triggered a new civil war in 2024, when she was only nine. Rya is traveling backwards in time, appearing every nine years in reverse chronological order, injecting her targets in the back of the neck with a remotely triggered isotope. From her perspective, the events of 2006 have yet to occur, and her hand is not yet wounded. Overcome with guilt over causing his own granddaughter's death, Lockhart confesses that he killed her in 1988. Convinced that her cause is just, he lets her complete her mission. After Rya's departure into the past, an elderly Rao triggers the injections, killing Rya's targets and erasing the terrorist attack and subsequent civil war from the timeline. Back in 2015, Lockhart reunites with his family and embraces a chance at a new future with his granddaughter.
Cast
Production
The project was announced in February 2018, with Jim Mickle directing and Boyd Holbrook set to star in the lead role. The film would be produced and distributed by Netflix. In June 2018, Michael C. Hall joined the cast of the film. In July 2018, Cleopatra Coleman and Bokeem Woodbine joined the cast.
Speaking about the project, director Mickle declared:
Principal production commenced on July 2, 2018 and ended on August 27, 2018 in Toronto, Ontario, Canada.
Release
The film had its world premiere at Fantastic Fest on September 21, 2019. On September 27, 2019, the film was available to stream on Netflix.
Reception
High on Films website wrote "Certainly not on par with Jim Mickle's previous directorial efforts".
References
External links
2019 films
2019 science fiction films
2019 thriller films
2010s mystery thriller films
2010s serial killer films
American mystery thriller films
American police detective films
American serial killer films
English-language Netflix original films
Fictional portrayals of the Philadelphia Police Department
Films about time travel
Films directed by Jim Mickle
Films set in 1988
Films set in 1997
Films set in 2006
Films set in 2015
Films set in 2024
Films set in Philadelphia
Films shot in Philadelphia
Films shot in Toronto
Temporal war fiction
2010s English-language films
2010s American films |
Harry Easton Godwin (August 22, 1907 – May 27, 1986) was born in New Jersey and grew up in Chicago and Virginia. He saw many jazz musicians in his youth, including King Oliver, Baby Dodds, Kid Ory, and Louie Armstrong. in the 1950s, Godwin was asked to hire a collection of Jazz musicians for the Cotton Carnival. He hired Bukka White, Little Laura Dukes, Gus Cannon, Furry Lewis, and many more. He worked the festival into the 1980s. He worked his day job as a manufacturer's rep mainly to support his family and music. He collected stories, memorabilia, and taped interviews. He also wrote a few songs. He served as manager for Memphis Slim. Godwin had a radio show on WLYX (Rhodes College). His avocation made him a resource for historians and a hero for the city. He was recorded on two records with Louis Armstrong on February 20, 1965. Godwin gave the track to Armstrong.
Godwin wrote the song "My Memphis Baby".
He is the son of Earl Godwin.
References
Harry Easton
American people of English descent
1907 births
1986 deaths |
From Fear to Eternity: The Best of 1990–2010 is a compilation album by English heavy metal band Iron Maiden, containing a selection of songs originally released on the eight studio albums from No Prayer for the Dying to The Final Frontier. The title is lifted from the 1992 single, "From Here to Eternity", although it is not featured in this release.
Background
The album was announced on 15 March 2011, to be released by EMI on 23 May, although this was later changed to 6 June. Unlike their previous compilation (Somewhere Back in Time), the release covered two CDs to encompass longer tracks, such as "Paschendale", although the price remained that of a single disc record.
As with Somewhere Back in Time, each track is sung by Bruce Dickinson rather than Blaze Bayley (who sang on The X Factor and Virtual XI), the band again opting to use later live versions of songs which originally featured other lead vocalists.
Artwork
The album cover was designed by Melvyn Grant, and serves to reference each relevant studio release. Three representations of Eddie appear, one dressed in Grim Reaper attire (as in Dance of Death), one atop the tank from A Matter of Life and Death – which is imprinted with the "Cross-Keys" symbol from The Final Frontier – and a large burning wicker man (the first single from Brave New World). The artwork also contains the tree from Fear of the Dark, the tombstone from No Prayer for the Dying, a large "X" on the tree trunk (representing The X Factor) and the twisted figures and burnt building structure from the Virtual XI cover.
Reception
Classic Rock described the album as representing "Gold from every era", claiming that, although "weighted towards the... last five studio albums", the "earlier singles... fight their corner remarkably well." The review also argues that some of the release's later songs "match anything from Maiden's 80s heyday."
In their July 2011 issue, Metal Hammer praised the compilation for doing "an excellent job of gathering the heartiest wheat over the last two decades", although deeming Blaze Bayley's absence from the album a "glitch" albeit "for the best."
Track listing
Personnel
Production and performance credits are adapted from the album liner notes.
Iron Maiden
Bruce Dickinson – vocals
Dave Murray – guitars
Janick Gers – guitars
Adrian Smith – guitars (except on "Holy Smoke", "Tailgunner", "Be Quick or Be Dead", "Afraid to Shoot Strangers", and "Bring Your Daughter... to the Slaughter")
Steve Harris – bass, keyboards
Nicko McBrain – drums
Additional musicians
Michael Kenney – keyboards on "Sign of the Cross", "Afraid to Shoot Strangers", "Fear of the Dark" and "The Clansman" (uncredited)
Production
Ade Emsley – mastering
Stuart Crouch – art direction, design
Melanie Hunter – art direction, design
Anthony Dry – art direction, design
Melvyn Grant – cover illustration
John McMurtrie – photography
Rod Smallwood – management
Andy Taylor – management
Charts
Certifications
References
2011 compilation albums
Iron Maiden compilation albums
EMI Records compilation albums
Heavy metal compilation albums |
Dr. Chaiyong Satjipanon (, born 14 September 1953) is a former ambassador of the Kingdom of Thailand to the United States of America. Prior to representing Thailand to the United States, he represented Thailand in Geneva, Sydney, Seoul, Rome and Jakarta,
Early life
Chaiyong Satjipanon was born on 14 September 1953. He received a Bachelor of Arts degree (with honors) in political science from Chulalongkorn University in Bangkok, where he would also earn a Master of Public Administration degree. He would go on to earn a Master of Arts in Law and Diplomacy and a PhD from The Fletcher School of Law and Diplomacy at Tufts University in the United States.
Career
Chaiyong Satjipanon began his diplomatic career in 1975 when he joined the Ministry of Foreign Affairs as an attache to the International Conference Division of the Department of International Organizations. In 1976 he became Thailand's liaison officer to the United Nations Economic and Social Commission for Asia and the Pacific (ESCAP), before becoming the Third Secretary of the International Conference division one year later. In 1982 he was transferred to Geneva, Switzerland and became was the Second Secretary of Thailand's Permanent Mission to the United Nations Office and Other International Organizations in Geneva, and was promoted to First Secretary of the same office in 1986. He held that post until 1989 when he became a Counsellor for the Americas Division of the Department of Political Affairs. In 1993 he was promoted to Deputy Director-General of the Department of Economic Affairs. In 1994 he was assigned to be the Consular-General of the Royal Thai Consulate-General in Sydney, Australia. In 2001 he became Thailand's Ambassador Extraordinary and Plenipotentiary to the Republic of Indonesia, being concurrently accredited to Papua New Guinea. In 2006, Makarim Wibisono, Indonesia's Ambassador to the United Nations and Other International Organizations in Geneva, presented Chaiyong with the First Class Order of Services Bintang Jasa Utama for his work in strengthening bilateral relations between Indonesia and Thailand. In 2003, he became Thailand's Ambassador to the United Nations Office and other international organizations in Geneva. In 2007, he was appointed Thailand's ambassador to the Holy See, and was received by Pope Benedict XVI on 13 December. He was concurrently Thailand's ambassador to Switzerland. In 2010 Dr Chaiyong Satjipanon was 2010 received Order of Knighthood of St. Gregory the Great from the Vatican City State.
Chaiyong Satjipanon was later Thailand's Ambassador to the Republic of Korea, where he worked to expand bilateral trade between Thailand and South Korea. While in Seoul his wife, Thitinart Satjipanon, became ill and died after arriving at Soonchunhyang Hospital. He filed a criminal complaint against the hospital claiming negligence of the staff had resulted in his wife's death, and his case was supported by Thailand's Embassy and Ministry of Foreign Affairs, who called on the South Korean government to investigate medical standards at the hospital. Most recently, he was appointed Thailand's ambassador to the United States. His credentials were accepted by William J. Burns, the United States Deputy Secretary of State, on 18 April 2012.
He is the expert on the United States and Human Rights which he often appears as a TV guest in the Nation, TNN, TNN24.
References
External links
1953 births
Living people
Chaiyong Satjipanon
Chaiyong Satjipanon
Chaiyong Satjipanon
Chaiyong Satjipanon
Chaiyong Satjipanon
Chaiyong Satjipanon
Chaiyong Satjipanon |
Črešnjevec (; ) is a village in the Municipality of Slovenska Bistrica in northeastern Slovenia. It lies southeast of the town of Slovenska Bistrica itself. The railway line from Ljubljana to Maribor runs through a tunnel near the settlement. The area is part of the traditional region of Styria. It is now included with the rest of the municipality in the Drava Statistical Region.
The local parish church is dedicated to Saint Michael and belongs to the Roman Catholic Archdiocese of Maribor. It was originally a Romanesque building. It was greatly rebuilt in 1374, but some of the original structure survives in the walls of the nave. It was restyled in the Baroque in the 18th century.
References
External links
Črešnjevec on Geopedia
Populated places in the Municipality of Slovenska Bistrica |
Lieutenant-General Frederick Green Wilkinson (15 November 1825 – 1913) was a British Army officer who became colonel of the Queen's Royal Regiment (West Surrey).
Military career
Wilkinson was commissioned as an ensign in the 43rd (Monmouthshire) Regiment of Foot on 27 December 1842. Promoted to captain in the 42nd Regiment of Foot on 17 October 1851, he was present at the Battle of Alma in September 1854 and the Siege of Sevastopol in Winter 1854 during the Crimean War. He also served at the Siege of Lucknow in Summer 1857 during the Indian Rebellion.
He became colonel of the Queen's Royal Regiment (West Surrey) on 15 October 1891 and transferred in 1893 to be colonel of the Oxfordshire and Buckinghamshire Light Infantry until his death in 1913.
Green Wilkinson was chairman of the National Association for Employment of Reserve Officers.
Family
His elder son was Brigadier-General Lewis Frederic Green-Wilkinson (1865-1950).
References
|-
1825 births
1913 deaths
42nd Regiment of Foot officers
British Army lieutenant generals |
```xml
<menu xmlns:android="path_to_url"
xmlns:app="path_to_url">
<item
android:id="@+id/action_menu_get_link"
android:icon="@drawable/ic_link01_medium_regular_outline"
android:orderInCategory="0"
app:iconTint="?attr/colorSecondary"
android:title="@{@plurals/label_share_links(one)}"
app:showAsAction="always" />
<item
android:id="@+id/action_delete"
android:icon="@drawable/ic_trash_medium_regular_outline"
android:orderInCategory="1"
android:title="@string/general_remove"
app:iconTint="?attr/colorSecondary"
app:showAsAction="ifRoom" />
<item
android:id="@+id/action_menu_remove_link"
android:orderInCategory="2"
android:title="@string/context_remove_link_menu"
app:iconTint="?attr/colorSecondary"
app:showAsAction="never" />
<item
android:id="@+id/action_context_select_all"
android:orderInCategory="3"
android:title="@string/action_select_all"
app:showAsAction="never" />
<item
android:id="@+id/action_context_clear_selection"
android:orderInCategory="4"
android:title="@string/action_unselect_all"
app:showAsAction="never" />
</menu>
``` |
Bittium glareosum is a species of sea snail, a marine gastropod mollusk in the family Cerithiidae.
References
External links
Cerithiidae
Gastropods described in 1861 |
Moscow Peak, also Moskva Peak or Pik Moskva ( and also ), is a 6,785 m peak in the Peter I Range, western Pamir.
It is located in the south-east of Jirgatol district in Tajikistan's Region of Republican Subordination, about 10 km west of Ismail Samani Peak, Tajikistan's highest mountain.
Moscow Peak is also the name of two much smaller mountains in the United States and Australia:
Moscow Peak in the State of Arizona (Yavapai County), U.S.A. (2,343 m, 34.403082N, 112.396001W)
Moscow Peak in Victoria, Australia (1,647 m, 6.84401S, 148.1437E )
References
Location of Moscow Peak on geonames.org
Big Soviet Encyclopedia online edition
Moscow Peak in Encyclopædia Britannica Online, 2008.
External links
Photograph of Moscow peak on summitpost.org
Mountains of Tajikistan
Six-thousanders of the Pamir |
Milan Kajkl (May 14, 1950 – January 18, 2014) was a Czechoslovak Olympic ice hockey player.
Kajkl was born in Plzeň, Czechoslovakia. He participated at the 1976 Winter Olympics in Innsbruck, where his team won a silver medal.
Kajkl died in Plzeň on January 18, 2014, at the age of 63.
References
External links
1950 births
2014 deaths
Czech ice hockey defencemen
Czechoslovak ice hockey defencemen
Ice hockey players at the 1976 Winter Olympics
Olympic ice hockey players for Czechoslovakia
Olympic medalists in ice hockey
Olympic silver medalists for Czechoslovakia
Ice hockey people from Plzeň
HC Plzeň players
HC Dukla Jihlava players
EV Zug players
EC KAC players
Czechoslovak expatriate sportspeople in Switzerland
Czechoslovak expatriate sportspeople in Austria
Expatriate ice hockey players in Switzerland
Expatriate ice hockey players in Austria
Czechoslovak expatriate ice hockey people |
Symphoricarpos guatemalensis is a Central American species of flowering plant in the honeysuckle family. It has been found only in Guatemala.
Symphoricarpos guatemalensis is an erect branching shrub sometimes as much as 2 meters (80 inches) tall. Leaves are tiny, rarely more than 6 mm (0.24 inch) long. It has white flowers and white fruits.
References
External links
photo of herbarium specimen at Missouri Botanical Garden, collected in Guatemala in 1965
guatemalensis
Plants described in 1994
Flora of Guatemala |
The Selberg is a hill, 545.1 m, in the county of Kusel in the German state of Rhineland-Palatinate. It is part of the North Palatine Uplands and is a southern outlier of the Königsberg.
The Selberg rises between the streams of Breitenbach and Lauter. Nearby villages are Eßweiler, Rutsweiler an der Lauter and Rothselberg.
Selberg Tower and hut
In 1914 the Selberg Club from Rothselberg erected a wooden viewing tower and log cabin on the summit. The wooden tower was replaced in 1969 by a 17.3-metre-high steel tower. Forty eight steps lead via two landings to a platform, 9.6 metres above ground level, and another 32 steps to a viewing platform at a height of 16 metres, from which there is a good panoramic view. The Selber Hut has been converted and expanded several times; it is open on Sundays.
Transport and hiking
Several footpaths run around the Selberg, including a section of the Nordic walking course, Königsland.
On the saddle between the Konigsberg and Selberg is a glider airfield belonging to the Eßweiler Aerial Sports Club.
Archaeological finds
In the early 20th century, a 2nd-century Roman villa, the foundation of a tomb and other traces of settlement were found on the western hillside of the Selberg between Eßweiler and Rothselberg in the valley of the Breitenbach. Several Stone Age relics were discovered too, including a lance tip made of flint.
Footnotes and references
External links
Nordic Walking Parcours Königsland
Selbergverein
Mountains and hills of Rhineland-Palatinate
Kusel (district) |
```javascript
/**
* @license Apache-2.0
*
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*/
'use strict';
// MODULES //
var tape = require( 'tape' );
var FLOAT64_MAX_SAFE_NTH_LUCAS = require( './../lib' ); // eslint-disable-line id-length
// TESTS //
tape( 'main export is a number', function test( t ) {
t.ok( true, __filename );
t.strictEqual( typeof FLOAT64_MAX_SAFE_NTH_LUCAS, 'number', 'main export is a number' );
t.end();
});
tape( 'the exported value is 76', function test( t ) {
t.strictEqual( FLOAT64_MAX_SAFE_NTH_LUCAS, 76, 'returns expected value' );
t.end();
});
``` |
"Castellorizon" is the opening track on David Gilmour's third solo album, On an Island. It is an instrumental guitar solo, which starts off with an overture of various sounds from other tracks of the album before the guitar is introduced. The song is based on a night Gilmour spent on the Greek island of Kastellorizo. It segues into "On an Island", the title track. The song received a nomination for Best Rock Instrumental Performance at the 49th Grammy Awards. The song was nominated for the same Grammy Award again at the 51st Grammy Awards for a performance from Gilmour's Live in Gdańsk album.
References
2006 songs
Rock instrumentals
Songs written by David Gilmour
David Gilmour songs
Song recordings produced by David Gilmour
Song recordings produced by Chris Thomas (record producer) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.