text stringlengths 1 22.8M |
|---|
The Libya men's national volleyball team represents Libya in international volleyball competitions and friendly matches.
Results
Olympic Games
1980 — 10th place
World Championship
1982 — 24th place
2025 — Qualified
Arab Volleyball Championship
2012 – Bronze medal
2023 - Gold medal
Men's African Volleyball Championship
1967 - 4th
1979 - Silver medal
2009 - 6th
2013 - 6th
2017 - 7th
2023 - Bronze medal
References
http://www.qurynanew.com/44972
National sports teams of Libya |
```php
<?php
/**
* FecShop file.
*
* @link path_to_url
* @license path_to_url
*/
namespace fecshop\app\console\modules\Category;
use fecshop\app\console\modules\ConsoleModule;
/**
* @author Terry Zhao <2358269014@qq.com>
* @since 1.0
*/
class Module extends ConsoleModule
{
public $blockNamespace;
public function init()
{
parent::init();
//
$nameSpace = __NAMESPACE__;
$this->controllerNamespace = $nameSpace . '\\controllers';
$this->blockNamespace = $nameSpace . '\\block';
}
}
``` |
```viml
"======================================================================
"
" utils.vim -
"
" Created by skywind on 2021/12/15
" Last Modified: 2021/12/15 06:33:42
"
"======================================================================
" vim: set ts=4 sw=4 tw=78 noet :
your_sha256_hash------
" internal
your_sha256_hash------
let s:windows = has('win32') || has('win95') || has('win64') || has('win16')
your_sha256_hash------
" output msg
your_sha256_hash------
function! asyncrun#utils#errmsg(msg)
redraw
echohl ErrorMsg
echom 'ERROR: ' . a:msg
echohl NONE
return 0
endfunc
your_sha256_hash------
" strip string
your_sha256_hash------
function! asyncrun#utils#strip(text)
return substitute(a:text, '^\s*\(.\{-}\)\s*$', '\1', '')
endfunc
your_sha256_hash------
" Replace string
your_sha256_hash------
function! asyncrun#utils#replace(text, old, new)
let l:data = split(a:text, a:old, 1)
return join(l:data, a:new)
endfunc
your_sha256_hash------
" display require message
your_sha256_hash------
function! asyncrun#utils#require(what)
call asyncrun#utils#errmsg('require: ' . a:what . ' ')
endfunc
your_sha256_hash------
" shellescape
your_sha256_hash------
function! asyncrun#utils#shellescape(...) abort
let args = []
for arg in a:000
if arg =~# '^[A-Za-z0-9_/.-]\+$'
let args += [arg]
elseif &shell =~# 'c\@<!sh'
let args += [substitute(shellescape(arg), '\\\n', '\n', 'g')]
else
let args += [shellescape(arg)]
endif
endfor
return join(args, ' ')
endfunction
your_sha256_hash------
" tempname
your_sha256_hash------
function! asyncrun#utils#tempname() abort
let temp = tempname()
if has('win32')
return fnamemodify(fnamemodify(temp, ':h'), ':p').fnamemodify(temp, ':t')
endif
return temp
endfunction
your_sha256_hash------
" isolate environ
your_sha256_hash------
function! asyncrun#utils#isolate(request, keep, ...) abort
let keep = ['SHELL', 'HOME'] + a:keep
let command = ['cd ' . shellescape(getcwd())]
for line in split(system('env'), "\n")
let var = matchstr(line, '^\w\+\ze=')
if !empty(var) && var !~# '^\%(_\|SHLVL\|PWD\|VIM\|VIMRUNTIME\|MYG\=VIMRC\)$' && index(keep, var) < 0
if &shell =~# 'csh'
let command += split('setenv '.var.' '.shellescape(eval('$'.var)), "\n")
else
let command += split('export '.var.'='.asyncrun#utils#shellescape(eval('$'.var)), "\n")
endif
endif
endfor
for cmd in a:000
if type(cmd) == type('')
let command += [cmd]
elseif type(cmd) == type(0)
let command += [cmd]
elseif type(cmd) == type([])
let command += cmd
endif
endfor
let temp = type(a:request) == type({}) ? a:request.file . '.script' : asyncrun#utils#tempname()
call writefile(command, temp)
return 'env -i ' . join(map(copy(keep), 'v:val."=". asyncrun#utils#shellescape(eval("$".v:val))." "'), '') . &shell . ' ' . temp
endfunction
your_sha256_hash------
" set title
your_sha256_hash------
function! asyncrun#utils#set_title(title, expanded)
return asyncrun#utils#shellescape('printf',
\ '\033]1;%s\007\033]2;%s\007',
\ a:title, a:expanded)
endfunction
your_sha256_hash------
" try to open quickfix
your_sha256_hash------
function! asyncrun#utils#quickfix_request()
let height = get(g:, "asyncrun_open", 0)
if height > 0
call asyncrun#quickfix_toggle(height, 1)
endif
endfunc
your_sha256_hash------
" compare path
your_sha256_hash------
function! asyncrun#utils#path_equal(path1, path2) abort
let p1 = fnamemodify(a:path1, ':p')
let p2 = fnamemodify(a:path2, ':p')
if has('win32') || has('win16') || has('win64') || has('win95')
let p1 = tolower(substitute(p1, '\/', '\\', 'g'))
let p2 = tolower(substitute(p2, '\/', '\\', 'g'))
else
let p1 = substitute(p1, '\\', '\/', 'g')
let p2 = substitute(p2, '\\', '\/', 'g')
endif
return (p1 == p2)? 1 : 0
endfunc
``` |
Samuel Brand was a German Jew who became officially the first immigrant to enter the State of Israel after its creation on 14 May 1948. He was also a survivor of the Buchenwald concentration camp in Nazi Germany. Brand carried with him the first visa ever issued by the Government of Israel.
Immigration
Before the establishment of the state, Jewish immigration to Israel had been severely restricted by the then-governing British authorities of the Mandate of Palestine. There were rigid quotas and certificates required. Tens of thousands of Jews who arrived without certificates were regarded as illegal immigrants and chased by British police. Even after the end of the Second World War and the discovery of the full extent of the Holocaust, Jews were restricted from migrating to Palestine. As a result, Jews launched a major organized operation called the Berihah to bring Holocaust survivors to Palestine.
After the Israeli Declaration of Independence was proclaimed on 14 May 1948, the newly formed Government of Israel ended all restrictions to immigration. The Law of Return was passed in 1950, granting automatic citizenship to Jewish immigrants.
Biography
Samuel Brand survived the Holocaust in the Buchenwald concentration camp, which was the largest on German soil. Although an old man by 1948, Brand chose to emigrate from post-war Germany to the newly created Jewish homeland. He traveled on the Greek ship SS Teti, which arrived at the port of Tel Aviv, Israel's largest city, on 14 May. He was the first person from the ship to set foot on Israeli soil. He was welcomed by Israeli leader and future Prime Minister Golda Meir in an official reception, even though the first air raids by the Egyptian air force in the 1948 Arab-Israeli War had just begun.
First official visa
Samuel Brand carried a piece of paper that was the first official visa issued by the Immigration Department of the Government of Israel. It said:
See also
Aliyah
Zionism
References
German emigrants to Israel
19th-century German Jews
Buchenwald concentration camp survivors
Possibly living people
Year of birth missing |
Bromus grossus, the whiskered brome, is a species of flowering plant in the family Poaceae. It is native to central Europe, and has been introduced to Great Britain, and New York and Oregon in the United States. It has gone extinct in the Netherlands. During the Neolithic it arose as a weed of spelt fields, and due to changing agricultural practices is now considered highly endangered under the Habitats Directive.
References
External links
Bromus grossus - CABI.org
Bromus grossus Desf. ex DC. (family POACEAE) - JSTOR Global Plants
Dicke Trespe - Bromus grossus A. P. de Candolle 1805 - Artensteckbriefe
grossus
Flora of France
Flora of Belgium
Flora of Germany
Flora of Switzerland
Flora of Austria
Flora of Czechoslovakia
Flora of Italy
Plants described in 1805 |
Art Baker (born November 30, 1929) is a former American football coach. He served as the head football coach at Furman University (1973–1977), The Citadel (1978–1982) and East Carolina University (1985–1988). Baker is a 1948 graduate of Edmunds High School (now Sumter High School) in Sumter, South Carolina and a 1953 Presbyterian College graduate and also was a former assistant football coach there. Baker played football for the Blue Hose from 1950 to 1952, starting at halfback his last two years. He was a member of Mu chapter of Pi Kappa Alpha fraternity. Baker is a recipient of Presbyterian's Bob Waters Award. He was an assistant coach for Frank Howard at Clemson from 1965 to 1969. From 1970 to 1972, Baker was an assistant coach at Texas Tech. Baker succeeded Bob King at Furman for the 1973 season. As head coach at Furman Baker hired Dick Sheridan, Jimmy Satterfield and Bobby Johnson as assistants and all later became head coaches at Furman. Baker was an assistant coach in 1984 for Bobby Bowden at Florida State. He was Associate Athletics Director for Development and Gamecock Club Director at the University of South Carolina for six and a half years before retiring on June 30, 1995.
Family
Baker is a native of Sumter, South Carolina. He married Edith Edens of Dalzell, South Carolina. They have four children and four grandchildren.
Head coaching record
References
Place of birth missing (living people)
1929 births
Living people
American football halfbacks
The Citadel Bulldogs football coaches
Clemson Tigers football coaches
East Carolina Pirates football coaches
Florida State Seminoles football coaches
Furman Paladins football coaches
Presbyterian Blue Hose football coaches
Presbyterian Blue Hose football players
Texas Tech Red Raiders football coaches
South Carolina Gamecocks athletic directors
Sportspeople from Sumter, South Carolina |
Carpenter Rocks Conservation Park is a protected area located in the Australian state of South Australia in the locality of Carpenter Rocks about south-east of the state capital of Adelaide and about south east of the town centre in Carpenter Rocks.
The conservation park was proclaimed on 6 September 2001 under the National Parks and Wildlife Act 1972 to protect threatened species and vegetation communities in particular: A number of threatened species and plant communities are conserved within the park. It protects part of the only known population of Carpenter Rocks Manna Gum (Eucalyptus splendens ssp. arcana), which is a newly-described species, along with several other plants of national, state or regional significance. The park protects significant habitat for the Orange-bellied Parrot (Neophema chrysogaster), which is critically endangered at a national level. This important threatened species was recorded more regularly at the Carpenter Rocks site than at any other site in South Australia during the 1980s and early 1990s.
The conservation park is classified as an IUCN Category VI protected area.
References
External links
Carpenter Rocks Conservation Park webpage on protected planet
Conservation parks of South Australia
Protected areas established in 2001
2001 establishments in Australia |
Pierre Cathala (1888 – 1947) was a French politician. He served as the French Minister of Finance from 1942 to 1944.
Early life
Pierre Cathala was born on 22 September 1888 in Montfort-sur-Meu, Brittany, France. He was educated at the Lycée Saint-Louis, and in Bayonne where he became friends with Pierre Laval.
Career
Cathala served as the French Minister of Finance from 1942 to 1944.
Personal life
Cathala married Mathilde Henriette Lagrange. They had two sons, François and Jean-Claude, and a daughter, Renée.
Death
Cathala died on 27 July 1947 in Paris, France.
References
External links
1888 births
1947 deaths
People from Ille-et-Vilaine
Politicians from Brittany
Radical Party (France) politicians
Social and Radical Left politicians
Independent Radical politicians
French Ministers of Finance
Government ministers of France
Members of the 14th Chamber of Deputies of the French Third Republic
Members of the 15th Chamber of Deputies of the French Third Republic
People of Vichy France
French military personnel of World War I
Recipients of the Croix de Guerre 1914–1918 (France) |
Keep on Your Mean Side is the debut album by UK based indie rock band The Kills. Originally released on March 10, 2003, through Domino Recording Company, it was later reissued on May 4, 2009, with five additional bonus tracks.
The song "Wait" was featured in the film Children of Men (2006), while "Monkey 23" was featured in the film The Beat That My Heart Skipped (2005) and in Adam Curtis' BBC documentary All Watched Over by Machines of Loving Grace Part 1 (2011); "Cat Claw" and "Wait" were both overheard in the Criminal Minds Season 3 episode, "Doubt," and "Fried My Little Brains" was used in the Sherlock Series 3 episode, "The Sign of Three", and in the game Gran Turismo 6.
Background
Following international touring, they entered Toe Rag Studios, where The White Stripes had recorded their album Elephant, to record Keep on Your Mean Side, mostly on 8-track, in just 2 weeks. Distributed in the US and UK by Rough Trade Records, the album was similar in style to the EP, veering from the Velvets-esque stomp of "Wait" to the noisy, dirty garage punk blues of "Fuck the People" and dark psychedelia of "Kissy Kissy". The record was well received by the music press, though the White Stripes comparisons would not go away.
Maintaining an anti-careerist, anti-music industry attitude, the band rarely granted interviews. Rather, they got the music press to come to them with their minimalist yet powerful live shows (which also included the drum machine), the pair maintaining an air of tension by subverting the expected role of stage performer. Mosshart chain-smoked while singing, rarely speaking to the audience, whilst Hince violently ripped blues riffs from his instrument. At a New York City show following the ban on public smoking, Mosshart went on stage with three bottles of water, lit up a cigarette and proceeded to smoke constantly from the first song to the last note of the set.
Reception
Reviews for Keep on Your Mean Side were wide-ranging but mostly positive with a few exceptions. It has a normalized rating of 70 out of 100 on Metacritic based on 18 professional reviews. Rolling Stone was complimentary, saying the music was "dark, kick-ass garage rock" and the album was "a bruising disc of post-modern blues". AllMusic described it as "sneering, sexy blues-punk" that is "relatively fresh and distinctive".
Track listing
2009 Reissue Bonus Tracks
Personnel
The Kills
Jamie "Hotel" Hince - vocals, guitars, dictaphone, organ, harmonica, electric viola, drum machine, production
Alison "VV" Mosshart – vocals, guitars, dictaphone, production
Chart performance
References
2003 debut albums
Albums produced by Jamie Hince
Domino Recording Company albums
The Kills albums |
```yaml
category: Data Enrichment & Threat Intelligence
commonfields:
id: Github Feed
version: -1
configuration:
- defaultvalue: 'true'
display: Fetch indicators
name: feed
required: false
type: 8
- defaultvalue: path_to_url
display: Base URL
name: url
type: 0
additionalinfo: The URL to the GitHub API.
section: Connect
required: true
- displaypassword: API Token
name: api_token
type: 9
hiddenusername: true
section: Connect
required: false
- display: Trust any certificate (not secure)
name: insecure
required: false
type: 8
- defaultvalue: ""
display: Owner
name: owner
type: 0
additionalinfo: Username of the repository owner
section: Connect
required: true
- defaultvalue: ""
display: Repository / Path to fetch
name: repo
type: 0
additionalinfo: The name of the repository.
section: Connect
required: true
- defaultvalue: ""
display: Feed type
name: feedType
options:
- YARA
- STIX
- IOCs
type: 15
additionalinfo: |
Predefined list of indicator types:
- YARA: Parses YARA rules from the feed. The "Yara" pack is required for this type.
- STIX: Parses STIX data from the feed.
- IOCs: Parses Indicators of Compromise (IOCs) using regex patterns.
section: Collect
required: true
- display: Branch name
name: branch_head
type: 0
required: true
defaultvalue: main
additionalinfo: The name of the main branch to which to compare.
section: Collect
advanced: true
- display: Files extensions to fetch
name: extensions_to_fetch
type: 16
required: true
defaultvalue: txt,yar,json
options:
- txt
- yar
- json
additionalinfo: The extension of the file names to target.
section: Collect
advanced: true
- additionalinfo: Reliability of the source providing the intelligence data.
defaultvalue: F - Reliability cannot be judged
display: Source Reliability
name: feedReliability
options:
- A - Completely reliable
- B - Usually reliable
- C - Fairly reliable
- D - Not usually reliable
- E - Unreliable
- F - Reliability cannot be judged
required: true
type: 15
- additionalinfo: The Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed.
display: Traffic Light Protocol Color
name: tlp_color
options:
- RED
- AMBER
- GREEN
- WHITE
required: false
type: 15
- display: First fetch time
additionalinfo: First commit date of first published indicators to bring. e.g., "1 min ago","2 weeks ago","3 months ago".
name: fetch_since
type: 0
defaultvalue: '90 days ago'
required: false
- display: Feed Fetch Interval
name: feedFetchInterval
type: 19
defaultvalue: '240'
required: false
- additionalinfo: When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.
defaultvalue: 'true'
display: Bypass exclusion list
name: feedBypassExclusionList
required: false
type: 8
- display: Use system proxy settings
name: proxy
required: false
type: 8
- display: ''
name: feedExpirationPolicy
type: 17
required: false
options:
- never
- interval
- indicatorType
- display: ''
name: feedExpirationInterval
type: 1
required: false
- display: Tags
name: feedTags
type: 0
additionalinfo: Supports CSV values.
required: false
display: Github Feed
name: Github Feed
script:
commands:
- arguments:
- defaultValue: '7 days'
description: 'The start date from which to fetch indicators. Accepts date strings like "7 days ago", "2 weeks ago", etc.'
name: since
- description: 'The end date until which to fetch indicators. Accepts date strings like "now", "2023-05-19", etc.'
name: until
- defaultValue: '50'
description: The maximum number of results to return.
name: limit
description: Gets indicators from the feed within a specified date range and up to a maximum limit..
name: github-get-indicators
dockerimage: demisto/taxii2:1.0.0.105766
feed: true
isfetch: false
longRunning: false
longRunningPort: false
runonce: false
script: '-'
subtype: python3
type: python
fromversion: 6.8.0
description: This is the Feed GitHub integration for getting started with your feed integration.
marketplaces:
- xsoar
- marketplacev2
tests:
- No tests (auto formatted)
``` |
```python
#
#
# path_to_url
#
# Unless required by applicable law or agreed to in writing, software
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
import unittest
import test_collective_api_base as test_base
class TestCollectiveAllgatherObjectAPI(test_base.TestDistBase):
def _setup_config(self):
pass
def test_allgather_nccl(self):
self.check_with_place(
"collective_allgather_object_api_dygraph.py",
"allgather_object",
"nccl",
static_mode="0",
dtype="pyobject",
)
def test_allgather_gloo_dygraph(self):
self.check_with_place(
"collective_allgather_object_api_dygraph.py",
"allgather_object",
"gloo",
"3",
static_mode="0",
dtype="pyobject",
)
if __name__ == '__main__':
unittest.main()
``` |
Vinylbital, also known as butylvinal, is a sedative hypnotic drug which is a barbiturate derivative. It was developed by Aktiebolaget Pharmacia in the 1950s.
References
Barbiturates
Sedatives
GABAA receptor positive allosteric modulators
Vinyl compounds |
Haaser is a surname. Notable people with the surname include:
Hans Richter-Haaser (1912–1980), German classical pianist
Raphael Haaser (born 1997), Austrian alpine ski racer
Ricarda Haaser (born 1993), Austrian alpine ski racer
See also
Hauser |
Kristen Stadtlander (born August 7, 1995) is an American professional wrestler, better known by the ring name Kris Statlander. She is signed to All Elite Wrestling where she is a member of the Best Friends stable, and is the current AEW TBS Champion in her first reign. She has also performed on the independent circuit.
Early life and training
Statlander was born in West Islip, New York on Long Island. After working professionally as a stunt double, she began her professional wrestling training under Pat Buck and Brian Myers at the Create A Pro Wrestling Academy in Hicksville, New York in 2016. Statlander later became the first female graduate of the academy.
Career
Beginnings (2016–2019)
Statlander made her professional wrestling debut in November 2016. Statlander made an appearance for WWE on an episode of SmackDown Live that aired on April 9, 2019, teaming with Karissa Rivera in a losing effort against the then-WWE Women's Tag Team Champions Billie Kay and Peyton Royce. In June that same year, she competed at an event for the promotion Beyond Wrestling in an intergender match against Joey Janela in a losing effort. She made her final appearance for Create A Pro Wrestling, the promotion under which she trained, in December 2019., until 2023.
All Elite Wrestling (2019–present)
Statlander made her debut for All Elite Wrestling (AEW) on November 19, 2019, competing in a tag team match alongside Big Swole against Riho and Britt Baker on Dark, where Statlander and Swole were defeated. In December, AEW announced that Statlander had signed with the promotion. Following her signing, she defeated Baker on the December 18 episode of Dynamite to become the No. 1 contender for the AEW Women's World Championship. Statlander competed against Riho for the AEW Women's World title on the January 8, 2020, episode of Dynamite, where she was defeated due to interferences by Brandi Rhodes, Awesome Kong, Mel, and the debuting Luther. She received another opportunity to compete for the title on February 29, 2020, at Revolution, this time against new champion Nyla Rose, where she was once again defeated. In June 2020, Statlander suffered an ACL injury in her left leg during an episode of Dynamite.
Statlander returned from injury alongside Trent Beretta on March 31, 2021, helping Chuck Taylor and Orange Cassidy defeat Miro and Kip Sabian on Dynamite. In September at All Out, she challenged Baker for the AEW Women's World Championship but was unsuccessful. In November, Statlander–along with Trent, Taylor, Cassidy, and Wheeler Yuta–joined the New Japan Pro-Wrestling-based stable Chaos. In August 2022, Statlander suffered a completely torn ACL and lateral meniscus in her right leg during a match on Dark and stated she would need an indefinite amount of time to recover.
Statlander returned at Double or Nothing in May 2023, appearing after a match between then-AEW TBS Champion Jade Cargill and Taya Valkyrie in which Cargill retained her title. She answered Cargill's open challenge to an impromptu match and won, ending Cargill's 60-match undefeated streak and obtaining the AEW TBS Championship.
Professional wrestling style and persona
Statlander originally employed an alien gimmick, which she attributed to her being "a big science nerd". Under this character, she was nicknamed "The Galaxy's Greatest Alien" and billed as having come from the Andromeda Galaxy. Statlander changed her gimmick in 2022 since she felt that with the previous gimmick "I was never really being fully taken seriously", calling the previous character as "too fun, too lovable, I guess, too goofy and easygoing".
Statlander uses a 450° splash and an inverted piledriver as finishers, respectively called Area 451 and the Big Bang Theory. With her change in gimmick, Big Bang Theory was renamed Friday Night Fever, referencing the song "More Than a Woman" by the Bee Gees, which she had used as her theme early in her career.
Championships and accomplishments
AAW Wrestling
AAW Women's Championship (1 time)
All Elite Wrestling
AEW TBS Championship (1 time, current)
Create A Pro Wrestling
CAP Television Championship (1 time)
Inaugural CAP TV Championship Tournament (2019)
Beyond Wrestling
Treasure Hunter Tournament (2019)
IndependentWrestling.TV
Independent Wrestling Championship (1 time)
New York Wrestling Connection
NYWC Starlet Championship (1 time)
Pro Wrestling Illustrated
Ranked No. 26 of the top 150 female wrestlers in the PWI Women's 100 in 2021
Sports Illustrated
Ranked No. 6 of the top 10 women's wrestlers in 2019
Victory Pro Wrestling
VPW Women's Championship (2 times)
Women Superstars United
WSU World Championship (1 time)
Interim WSU World Championship (1 time)
WSU Spirit Championship (1 time)
References
External links
1995 births
Living people
People from West Islip, New York
All Elite Wrestling personnel
American female professional wrestlers
Professional wrestlers from New York (state)
Sportspeople from Suffolk County, New York
21st-century American women
21st-century female professional wrestlers
AAW Women's Champions
AEW TBS Champions |
```objective-c
/* ====================================================================
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (path_to_url"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* openssl-core@openssl.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (path_to_url"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com). */
#ifndef OPENSSL_HEADER_BASE_H
#define OPENSSL_HEADER_BASE_H
// This file should be the first included by all BoringSSL headers.
#include <stddef.h>
#include <stdint.h>
#include <stdlib.h>
#include <sys/types.h>
#if defined(__MINGW32__)
// stdio.h is needed on MinGW for __MINGW_PRINTF_FORMAT.
#include <stdio.h>
#endif
#if defined(__APPLE__)
#include <TargetConditionals.h>
#endif
// Include a BoringSSL-only header so consumers including this header without
// setting up include paths do not accidentally pick up the system
// opensslconf.h.
#include <openssl/is_boringssl.h>
#include <openssl/opensslconf.h>
#include <openssl/target.h> // IWYU pragma: export
#if defined(BORINGSSL_PREFIX)
#include <boringssl_prefix_symbols.h>
#endif
#if defined(__cplusplus)
extern "C" {
#endif
#if defined(__APPLE__)
// Note |TARGET_OS_MAC| is set for all Apple OS variants. |TARGET_OS_OSX|
// targets macOS specifically.
#if defined(TARGET_OS_OSX) && TARGET_OS_OSX
#define OPENSSL_MACOS
#endif
#if defined(TARGET_OS_IPHONE) && TARGET_OS_IPHONE
#define OPENSSL_IOS
#endif
#endif
#define OPENSSL_IS_BORINGSSL
#define OPENSSL_VERSION_NUMBER 0x1010107f
#define SSLEAY_VERSION_NUMBER OPENSSL_VERSION_NUMBER
// BORINGSSL_API_VERSION is a positive integer that increments as BoringSSL
// changes over time. The value itself is not meaningful. It will be incremented
// whenever is convenient to coordinate an API change with consumers. This will
// not denote any special point in development.
//
// A consumer may use this symbol in the preprocessor to temporarily build
// against multiple revisions of BoringSSL at the same time. It is not
// recommended to do so for longer than is necessary.
#define BORINGSSL_API_VERSION 32
#if defined(BORINGSSL_SHARED_LIBRARY)
#if defined(OPENSSL_WINDOWS)
#if defined(BORINGSSL_IMPLEMENTATION)
#define OPENSSL_EXPORT __declspec(dllexport)
#else
#define OPENSSL_EXPORT __declspec(dllimport)
#endif
#else // defined(OPENSSL_WINDOWS)
#if defined(BORINGSSL_IMPLEMENTATION)
#define OPENSSL_EXPORT __attribute__((visibility("default")))
#else
#define OPENSSL_EXPORT
#endif
#endif // defined(OPENSSL_WINDOWS)
#else // defined(BORINGSSL_SHARED_LIBRARY)
#define OPENSSL_EXPORT
#endif // defined(BORINGSSL_SHARED_LIBRARY)
#if defined(_MSC_VER)
// OPENSSL_DEPRECATED is used to mark a function as deprecated. Use
// of any functions so marked in caller code will produce a warning.
// OPENSSL_BEGIN_ALLOW_DEPRECATED and OPENSSL_END_ALLOW_DEPRECATED
// can be used to suppress the warning in regions of caller code.
#define OPENSSL_DEPRECATED __declspec(deprecated)
#define OPENSSL_BEGIN_ALLOW_DEPRECATED \
__pragma(warning(push)) __pragma(warning(disable : 4996))
#define OPENSSL_END_ALLOW_DEPRECATED __pragma(warning(pop))
#elif defined(__GNUC__) || defined(__clang__)
#define OPENSSL_DEPRECATED __attribute__((__deprecated__))
#define OPENSSL_BEGIN_ALLOW_DEPRECATED \
_Pragma("GCC diagnostic push") \
_Pragma("GCC diagnostic ignored \"-Wdeprecated-declarations\"")
#define OPENSSL_END_ALLOW_DEPRECATED _Pragma("GCC diagnostic pop")
#else
#define OPENSSL_DEPRECATED
#define OPENSSL_BEGIN_ALLOW_DEPRECATED
#define OPENSSL_END_ALLOW_DEPRECATED
#endif
#if defined(__GNUC__) || defined(__clang__)
// MinGW has two different printf implementations. Ensure the format macro
// matches the selected implementation. See
// path_to_url
#if defined(__MINGW_PRINTF_FORMAT)
#define OPENSSL_PRINTF_FORMAT_FUNC(string_index, first_to_check) \
__attribute__( \
(__format__(__MINGW_PRINTF_FORMAT, string_index, first_to_check)))
#else
#define OPENSSL_PRINTF_FORMAT_FUNC(string_index, first_to_check) \
__attribute__((__format__(__printf__, string_index, first_to_check)))
#endif
#else
#define OPENSSL_PRINTF_FORMAT_FUNC(string_index, first_to_check)
#endif
// OPENSSL_CLANG_PRAGMA emits a pragma on clang and nothing on other compilers.
#if defined(__clang__)
#define OPENSSL_CLANG_PRAGMA(arg) _Pragma(arg)
#else
#define OPENSSL_CLANG_PRAGMA(arg)
#endif
// OPENSSL_MSVC_PRAGMA emits a pragma on MSVC and nothing on other compilers.
#if defined(_MSC_VER)
#define OPENSSL_MSVC_PRAGMA(arg) __pragma(arg)
#else
#define OPENSSL_MSVC_PRAGMA(arg)
#endif
#if defined(__GNUC__) || defined(__clang__)
#define OPENSSL_UNUSED __attribute__((unused))
#else
#define OPENSSL_UNUSED
#endif
// C and C++ handle inline functions differently. In C++, an inline function is
// defined in just the header file, potentially emitted in multiple compilation
// units (in cases the compiler did not inline), but each copy must be identical
// to satsify ODR. In C, a non-static inline must be manually emitted in exactly
// one compilation unit with a separate extern inline declaration.
//
// In both languages, exported inline functions referencing file-local symbols
// are problematic. C forbids this altogether (though GCC and Clang seem not to
// enforce it). It works in C++, but ODR requires the definitions be identical,
// including all names in the definitions resolving to the "same entity". In
// practice, this is unlikely to be a problem, but an inline function that
// returns a pointer to a file-local symbol
// could compile oddly.
//
// Historically, we used static inline in headers. However, to satisfy ODR, use
// plain inline in C++, to allow inline consumer functions to call our header
// functions. Plain inline would also work better with C99 inline, but that is
// not used much in practice, extern inline is tedious, and there are conflicts
// with the old gnu89 model:
// path_to_url
#if defined(__cplusplus)
#define OPENSSL_INLINE inline
#else
// Add OPENSSL_UNUSED so that, should an inline function be emitted via macro
// (e.g. a |STACK_OF(T)| implementation) in a source file without tripping
// clang's -Wunused-function.
#define OPENSSL_INLINE static inline OPENSSL_UNUSED
#endif
#if defined(__cplusplus)
// enums can be predeclared, but only in C++ and only if given an explicit type.
// C doesn't support setting an explicit type for enums thus a #define is used
// to do this only for C++. However, the ABI type between C and C++ need to have
// equal sizes, which is confirmed in a unittest.
#define BORINGSSL_ENUM_INT : int
enum ssl_early_data_reason_t BORINGSSL_ENUM_INT;
enum ssl_encryption_level_t BORINGSSL_ENUM_INT;
enum ssl_private_key_result_t BORINGSSL_ENUM_INT;
enum ssl_renegotiate_mode_t BORINGSSL_ENUM_INT;
enum ssl_select_cert_result_t BORINGSSL_ENUM_INT;
enum ssl_select_cert_result_t BORINGSSL_ENUM_INT;
enum ssl_ticket_aead_result_t BORINGSSL_ENUM_INT;
enum ssl_verify_result_t BORINGSSL_ENUM_INT;
#else
#define BORINGSSL_ENUM_INT
#endif
// ossl_ssize_t is a signed type which is large enough to fit the size of any
// valid memory allocation. We prefer using |size_t|, but sometimes we need a
// signed type for OpenSSL API compatibility. This type can be used in such
// cases to avoid overflow.
//
// Not all |size_t| values fit in |ossl_ssize_t|, but all |size_t| values that
// are sizes of or indices into C objects, can be converted without overflow.
typedef ptrdiff_t ossl_ssize_t;
// CBS_ASN1_TAG is the type used by |CBS| and |CBB| for ASN.1 tags. See that
// header for details. This type is defined in base.h as a forward declaration.
typedef uint32_t CBS_ASN1_TAG;
// CRYPTO_THREADID is a dummy value.
typedef int CRYPTO_THREADID;
// An |ASN1_NULL| is an opaque type. asn1.h represents the ASN.1 NULL value as
// an opaque, non-NULL |ASN1_NULL*| pointer.
typedef struct asn1_null_st ASN1_NULL;
typedef int ASN1_BOOLEAN;
typedef struct ASN1_ITEM_st ASN1_ITEM;
typedef struct asn1_object_st ASN1_OBJECT;
typedef struct asn1_pctx_st ASN1_PCTX;
typedef struct asn1_string_st ASN1_BIT_STRING;
typedef struct asn1_string_st ASN1_BMPSTRING;
typedef struct asn1_string_st ASN1_ENUMERATED;
typedef struct asn1_string_st ASN1_GENERALIZEDTIME;
typedef struct asn1_string_st ASN1_GENERALSTRING;
typedef struct asn1_string_st ASN1_IA5STRING;
typedef struct asn1_string_st ASN1_INTEGER;
typedef struct asn1_string_st ASN1_OCTET_STRING;
typedef struct asn1_string_st ASN1_PRINTABLESTRING;
typedef struct asn1_string_st ASN1_STRING;
typedef struct asn1_string_st ASN1_T61STRING;
typedef struct asn1_string_st ASN1_TIME;
typedef struct asn1_string_st ASN1_UNIVERSALSTRING;
typedef struct asn1_string_st ASN1_UTCTIME;
typedef struct asn1_string_st ASN1_UTF8STRING;
typedef struct asn1_string_st ASN1_VISIBLESTRING;
typedef struct asn1_type_st ASN1_TYPE;
typedef struct AUTHORITY_KEYID_st AUTHORITY_KEYID;
typedef struct BASIC_CONSTRAINTS_st BASIC_CONSTRAINTS;
typedef struct DIST_POINT_st DIST_POINT;
typedef struct DSA_SIG_st DSA_SIG;
typedef struct GENERAL_NAME_st GENERAL_NAME;
typedef struct ISSUING_DIST_POINT_st ISSUING_DIST_POINT;
typedef struct NAME_CONSTRAINTS_st NAME_CONSTRAINTS;
typedef struct Netscape_spkac_st NETSCAPE_SPKAC;
typedef struct Netscape_spki_st NETSCAPE_SPKI;
typedef struct RIPEMD160state_st RIPEMD160_CTX;
typedef struct X509_VERIFY_PARAM_st X509_VERIFY_PARAM;
typedef struct X509_algor_st X509_ALGOR;
typedef struct X509_crl_st X509_CRL;
typedef struct X509_extension_st X509_EXTENSION;
typedef struct X509_info_st X509_INFO;
typedef struct X509_name_entry_st X509_NAME_ENTRY;
typedef struct X509_name_st X509_NAME;
typedef struct X509_pubkey_st X509_PUBKEY;
typedef struct X509_req_st X509_REQ;
typedef struct X509_sig_st X509_SIG;
typedef struct bignum_ctx BN_CTX;
typedef struct bignum_st BIGNUM;
typedef struct bio_method_st BIO_METHOD;
typedef struct bio_st BIO;
typedef struct blake2b_state_st BLAKE2B_CTX;
typedef struct bn_gencb_st BN_GENCB;
typedef struct bn_mont_ctx_st BN_MONT_CTX;
typedef struct buf_mem_st BUF_MEM;
typedef struct cbb_st CBB;
typedef struct cbs_st CBS;
typedef struct cmac_ctx_st CMAC_CTX;
typedef struct conf_st CONF;
typedef struct conf_value_st CONF_VALUE;
typedef struct crypto_buffer_pool_st CRYPTO_BUFFER_POOL;
typedef struct crypto_buffer_st CRYPTO_BUFFER;
typedef struct ctr_drbg_state_st CTR_DRBG_STATE;
typedef struct dh_st DH;
typedef struct dsa_st DSA;
typedef struct ec_group_st EC_GROUP;
typedef struct ec_key_st EC_KEY;
typedef struct ec_point_st EC_POINT;
typedef struct ecdsa_method_st ECDSA_METHOD;
typedef struct ecdsa_sig_st ECDSA_SIG;
typedef struct engine_st ENGINE;
typedef struct env_md_ctx_st EVP_MD_CTX;
typedef struct env_md_st EVP_MD;
typedef struct evp_aead_st EVP_AEAD;
typedef struct evp_aead_ctx_st EVP_AEAD_CTX;
typedef struct evp_cipher_ctx_st EVP_CIPHER_CTX;
typedef struct evp_cipher_st EVP_CIPHER;
typedef struct evp_encode_ctx_st EVP_ENCODE_CTX;
typedef struct evp_hpke_aead_st EVP_HPKE_AEAD;
typedef struct evp_hpke_ctx_st EVP_HPKE_CTX;
typedef struct evp_hpke_kdf_st EVP_HPKE_KDF;
typedef struct evp_hpke_kem_st EVP_HPKE_KEM;
typedef struct evp_hpke_key_st EVP_HPKE_KEY;
typedef struct evp_pkey_ctx_st EVP_PKEY_CTX;
typedef struct evp_pkey_st EVP_PKEY;
typedef struct hmac_ctx_st HMAC_CTX;
typedef struct md4_state_st MD4_CTX;
typedef struct md5_state_st MD5_CTX;
typedef struct ossl_init_settings_st OPENSSL_INIT_SETTINGS;
typedef struct pkcs12_st PKCS12;
typedef struct pkcs8_priv_key_info_st PKCS8_PRIV_KEY_INFO;
typedef struct private_key_st X509_PKEY;
typedef struct rand_meth_st RAND_METHOD;
typedef struct rc4_key_st RC4_KEY;
typedef struct rsa_meth_st RSA_METHOD;
typedef struct rsa_pss_params_st RSA_PSS_PARAMS;
typedef struct rsa_st RSA;
typedef struct sha256_state_st SHA256_CTX;
typedef struct sha512_state_st SHA512_CTX;
typedef struct sha_state_st SHA_CTX;
typedef struct spake2_ctx_st SPAKE2_CTX;
typedef struct srtp_protection_profile_st SRTP_PROTECTION_PROFILE;
typedef struct ssl_cipher_st SSL_CIPHER;
typedef struct ssl_credential_st SSL_CREDENTIAL;
typedef struct ssl_ctx_st SSL_CTX;
typedef struct ssl_early_callback_ctx SSL_CLIENT_HELLO;
typedef struct ssl_ech_keys_st SSL_ECH_KEYS;
typedef struct ssl_method_st SSL_METHOD;
typedef struct ssl_private_key_method_st SSL_PRIVATE_KEY_METHOD;
typedef struct ssl_quic_method_st SSL_QUIC_METHOD;
typedef struct ssl_session_st SSL_SESSION;
typedef struct ssl_st SSL;
typedef struct ssl_ticket_aead_method_st SSL_TICKET_AEAD_METHOD;
typedef struct st_ERR_FNS ERR_FNS;
typedef struct trust_token_st TRUST_TOKEN;
typedef struct trust_token_client_st TRUST_TOKEN_CLIENT;
typedef struct trust_token_issuer_st TRUST_TOKEN_ISSUER;
typedef struct trust_token_method_st TRUST_TOKEN_METHOD;
typedef struct v3_ext_ctx X509V3_CTX;
typedef struct v3_ext_method X509V3_EXT_METHOD;
typedef struct x509_attributes_st X509_ATTRIBUTE;
typedef struct x509_lookup_st X509_LOOKUP;
typedef struct x509_lookup_method_st X509_LOOKUP_METHOD;
typedef struct x509_object_st X509_OBJECT;
typedef struct x509_purpose_st X509_PURPOSE;
typedef struct x509_revoked_st X509_REVOKED;
typedef struct x509_st X509;
typedef struct x509_store_ctx_st X509_STORE_CTX;
typedef struct x509_store_st X509_STORE;
typedef void *OPENSSL_BLOCK;
// BSSL_CHECK aborts if |condition| is not true.
#define BSSL_CHECK(condition) \
do { \
if (!(condition)) { \
abort(); \
} \
} while (0);
#if defined(__cplusplus)
} // extern C
#elif !defined(BORINGSSL_NO_CXX)
#define BORINGSSL_NO_CXX
#endif
#if defined(BORINGSSL_PREFIX)
#define BSSL_NAMESPACE_BEGIN \
namespace bssl { \
inline namespace BORINGSSL_PREFIX {
#define BSSL_NAMESPACE_END \
} \
}
#else
#define BSSL_NAMESPACE_BEGIN namespace bssl {
#define BSSL_NAMESPACE_END }
#endif
// MSVC doesn't set __cplusplus to 201103 to indicate C++11 support (see
// path_to_url
// so MSVC is just assumed to support C++11.
#if !defined(BORINGSSL_NO_CXX) && __cplusplus < 201103L && !defined(_MSC_VER)
#define BORINGSSL_NO_CXX
#endif
#if !defined(BORINGSSL_NO_CXX)
extern "C++" {
#include <memory>
// STLPort, used by some Android consumers, not have std::unique_ptr.
#if defined(_STLPORT_VERSION)
#define BORINGSSL_NO_CXX
#endif
} // extern C++
#endif // !BORINGSSL_NO_CXX
#if defined(BORINGSSL_NO_CXX)
#define BORINGSSL_MAKE_DELETER(type, deleter)
#define BORINGSSL_MAKE_UP_REF(type, up_ref_func)
#else
extern "C++" {
BSSL_NAMESPACE_BEGIN
namespace internal {
// The Enable parameter is ignored and only exists so specializations can use
// SFINAE.
template <typename T, typename Enable = void>
struct DeleterImpl {};
struct Deleter {
template <typename T>
void operator()(T *ptr) {
// Rather than specialize Deleter for each type, we specialize
// DeleterImpl. This allows bssl::UniquePtr<T> to be used while only
// including base.h as long as the destructor is not emitted. This matches
// std::unique_ptr's behavior on forward-declared types.
//
// DeleterImpl itself is specialized in the corresponding module's header
// and must be included to release an object. If not included, the compiler
// will error that DeleterImpl<T> does not have a method Free.
DeleterImpl<T>::Free(ptr);
}
};
template <typename T, typename CleanupRet, void (*init)(T *),
CleanupRet (*cleanup)(T *)>
class StackAllocated {
public:
StackAllocated() { init(&ctx_); }
~StackAllocated() { cleanup(&ctx_); }
StackAllocated(const StackAllocated &) = delete;
StackAllocated& operator=(const StackAllocated &) = delete;
T *get() { return &ctx_; }
const T *get() const { return &ctx_; }
T *operator->() { return &ctx_; }
const T *operator->() const { return &ctx_; }
void Reset() {
cleanup(&ctx_);
init(&ctx_);
}
private:
T ctx_;
};
template <typename T, typename CleanupRet, void (*init)(T *),
CleanupRet (*cleanup)(T *), void (*move)(T *, T *)>
class StackAllocatedMovable {
public:
StackAllocatedMovable() { init(&ctx_); }
~StackAllocatedMovable() { cleanup(&ctx_); }
StackAllocatedMovable(StackAllocatedMovable &&other) {
init(&ctx_);
move(&ctx_, &other.ctx_);
}
StackAllocatedMovable &operator=(StackAllocatedMovable &&other) {
move(&ctx_, &other.ctx_);
return *this;
}
T *get() { return &ctx_; }
const T *get() const { return &ctx_; }
T *operator->() { return &ctx_; }
const T *operator->() const { return &ctx_; }
void Reset() {
cleanup(&ctx_);
init(&ctx_);
}
private:
T ctx_;
};
} // namespace internal
#define BORINGSSL_MAKE_DELETER(type, deleter) \
namespace internal { \
template <> \
struct DeleterImpl<type> { \
static void Free(type *ptr) { deleter(ptr); } \
}; \
}
// Holds ownership of heap-allocated BoringSSL structures. Sample usage:
// bssl::UniquePtr<RSA> rsa(RSA_new());
// bssl::UniquePtr<BIO> bio(BIO_new(BIO_s_mem()));
template <typename T>
using UniquePtr = std::unique_ptr<T, internal::Deleter>;
#define BORINGSSL_MAKE_UP_REF(type, up_ref_func) \
inline UniquePtr<type> UpRef(type *v) { \
if (v != nullptr) { \
up_ref_func(v); \
} \
return UniquePtr<type>(v); \
} \
\
inline UniquePtr<type> UpRef(const UniquePtr<type> &ptr) { \
return UpRef(ptr.get()); \
}
BSSL_NAMESPACE_END
} // extern C++
#endif // !BORINGSSL_NO_CXX
#endif // OPENSSL_HEADER_BASE_H
``` |
Wireless sensor networks (WSNs) refer to networks of spatially dispersed and dedicated sensors that monitor and record the physical conditions of the environment and forward the collected data to a central location. WSNs can measure environmental conditions such as temperature, sound, pollution levels, humidity and wind.
These are similar to wireless ad hoc networks in the sense that they rely on wireless connectivity and spontaneous formation of networks so that sensor data can be transported wirelessly. WSNs monitor physical conditions, such as temperature, sound, and pressure. Modern networks are bi-directional, both collecting data and enabling control of sensor activity. The development of these networks was motivated by military applications such as battlefield surveillance. Such networks are used in industrial and consumer applications, such as industrial process monitoring and control and machine health monitoring and agriculture.
A WSN is built of "nodes" – from a few to hundreds or thousands, where each node is connected to other sensors. Each such node typically has several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from a shoebox to (theoretically) a grain of dust, although microscopic dimensions have yet to be realized. Sensor node cost is similarly variable, ranging from a few to hundreds of dollars, depending on node sophistication. Size and cost constraints constrain resources such as energy, memory, computational speed and communications bandwidth. The topology of a WSN can vary from a simple star network to an advanced multi-hop wireless mesh network. Propagation can employ routing or flooding.
In computer science and telecommunications, wireless sensor networks are an active research area supporting many workshops and conferences, including International Workshop on Embedded Networked Sensors (EmNetS), IPSN, SenSys, MobiCom and EWSN. As of 2010, wireless sensor networks had deployed approximately 120million remote units worldwide.
Application
Area monitoring
Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a region where some phenomenon is to be monitored. A military example is the use of sensors to detect enemy intrusion; a civilian example is the geo-fencing of gas or oil pipelines.
Health care monitoring
There are several types of sensor networks for medical applications: implanted, wearable, and environment-embedded. Implantable medical devices are those that are inserted inside the human body. Wearable devices are used on the body surface of a human or just at close proximity of the user. Environment-embedded systems employ sensors contained in the environment. Possible applications include body position measurement, location of persons, overall monitoring of ill patients in hospitals and at home. Devices embedded in the environment track the physical state of a person for continuous health diagnosis, using as input the data from a network of depth cameras, a sensing floor, or other similar devices. Body-area networks can collect information about an individual's health, fitness, and energy expenditure. In health care applications the privacy and authenticity of user data has prime importance. Especially due to the integration of sensor networks, with IoT, the user authentication becomes more challenging; however, a solution is presented in recent work.
Habitat monitoring
Wireless sensor networks have been used to monitor various species and habitats, beginning with the Great Duck Island Deployment, including marmots, cane toads in Australia and zebras in Kenya.
Environmental/Earth sensing
There are many applications in monitoring environmental parameters, examples of which are given below. They share the extra challenges of harsh environments and reduced power supply.
Air quality monitoring
Experiments have shown that personal exposure to air pollution in cities can vary a lot. Therefore, it is of interest to have higher temporal and spatial resolution of pollutants and particulates. For research purposes, wireless sensor networks have been deployed to monitor the concentration of dangerous gases for citizens (e.g., in London). However, sensors for gases and particulate matter suffer from high unit-to-unit variability, cross-sensitivities, and (concept) drift. Moreover, the quality of data is currently insufficient for trustworthy decision-making, as field calibration leads to unreliable measurement results, and frequent recalibration might be required. A possible solution could be blind calibration or the usage of mobile references.
Forest fire detection
A network of Sensor Nodes can be installed in a forest to detect when a fire has started. The nodes can be equipped with sensors to measure temperature, humidity and gases which are produced by fire in the trees or vegetation. The early detection is crucial for a successful action of the firefighters; thanks to Wireless Sensor Networks, the fire brigade will be able to know when a fire is started and how it is spreading.
Landslide detection
A landslide detection system makes use of a wireless sensor network to detect the slight movements of soil and changes in various parameters that may occur before or during a landslide. Through the data gathered it may be possible to know the impending occurrence of landslides long before it actually happens.
Water quality monitoring
Water quality monitoring involves analyzing water properties in dams, rivers, lakes and oceans, as well as underground water reserves. The use of many wireless distributed sensors enables the creation of a more accurate map of the water status, and allows the permanent deployment of monitoring stations in locations of difficult access, without the need of manual data retrieval.
Natural disaster prevention
Wireless sensor networks can be effective in preventing adverse consequences of natural disasters, like floods. Wireless nodes have been deployed successfully in rivers, where changes in water levels must be monitored in real time.
Industrial monitoring
Machine health monitoring
Wireless sensor networks have been developed for machinery condition-based maintenance (CBM) as they offer significant cost savings and enable new functionality.
Wireless sensors can be placed in locations difficult or impossible to reach with a wired system, such as rotating machinery and untethered vehicles.
Data logging
Wireless sensor networks also are used for the collection of data for monitoring of environmental information. This can be as simple as monitoring the temperature in a fridge or the level of water in overflow tanks in nuclear power plants. The statistical information can then be used to show how systems have been working. The advantage of WSNs over conventional loggers is the "live" data feed that is possible.
Water/waste water monitoring
Monitoring the quality and level of water includes many activities such as checking the quality of underground or surface water and ensuring a country's water infrastructure for the benefit of both human and animal. It may be used to protect the wastage of water.
Structural health monitoring
Wireless sensor networks can be used to monitor the condition of civil infrastructure and related geo-physical processes close to real time, and over long periods through data logging, using appropriately interfaced sensors.
Wine production
Wireless sensor networks are used to monitor wine production, both in the field and the cellar.
Threat detection
The Wide Area Tracking System (WATS) is a prototype network for detecting a ground-based nuclear device such as a nuclear "briefcase bomb." WATS is being developed at the Lawrence Livermore National Laboratory (LLNL). WATS would be made up of wireless gamma and neutron sensors connected through a communications network. Data picked up by the sensors undergoes "data fusion", which converts the information into easily interpreted forms; this data fusion is the most important aspect of the system.
The data fusion process occurs within the sensor network rather than at a centralized computer and is performed by a specially developed algorithm based on Bayesian statistics. WATS would not use a centralized computer for analysis because researchers found that factors such as latency and available bandwidth tended to create significant bottlenecks. Data processed in the field by the network itself (by transferring small amounts of data between neighboring sensors) is faster and makes the network more scalable.
An important factor in WATS development is ease of deployment, since more sensors both improves the detection rate and reduces false alarms. WATS sensors could be deployed in permanent positions or mounted in vehicles for mobile protection of specific locations. One barrier to the implementation of WATS is the size, weight, energy requirements and cost of currently available wireless sensors. The development of improved sensors is a major component of current research at the Nonproliferation, Arms Control, and International Security (NAI) Directorate at LLNL.
WATS was profiled to the U.S. House of Representatives' Military Research and Development Subcommittee on October 1, 1997, during a hearing on nuclear terrorism and countermeasures. On August 4, 1998, in a subsequent meeting of that subcommittee, Chairman Curt Weldon stated that research funding for WATS had been cut by the Clinton administration to a subsistence level and that the program had been poorly re-organized.
Incident monitoring
There are studies that show that using sensors for incident monitoring improve in a great way the response of firefighters and police to an unexpected situation. For an early detection of incidents we can use acoustic sensors to detect a spike in the noise of the city because of a possible accident, or use termic sensors to detect a possible fire.
Supply chains
Using low-power electronics, WSN:s can be cost-efficiently applied also in supply chains in various industries.
Characteristics
The main characteristics of a WSN include
Power consumption constraints for nodes using batteries or energy harvesting. Examples of suppliers are ReVibe Energy and Perpetuum
Ability to cope with node failures (resilience)
Some mobility of nodes (for highly mobile nodes see MWSNs)
Heterogeneity of nodes
Homogeneity of nodes
Scalability to large scale of deployment
Ability to withstand harsh environmental conditions
Ease of use
Cross-layer optimization
Cross-layer is becoming an important studying area for wireless communications. In addition, the traditional layered approach presents three main problems:
Traditional layered approach cannot share different information among different layers, which leads to each layer not having complete information. The traditional layered approach cannot guarantee the optimization of the entire network.
The traditional layered approach does not have the ability to adapt to the environmental change.
Because of the interference between the different users, access conflicts, fading, and the change of environment in the wireless sensor networks, traditional layered approach for wired networks is not applicable to wireless networks.
So the cross-layer can be used to make the optimal modulation to improve the transmission performance, such as data rate, energy efficiency, quality of service (QoS), etc. Sensor nodes can be imagined as small computers which are extremely basic in terms of their interfaces and their components. They usually consist of a processing unit with limited computational power and limited memory, sensors or MEMS (including specific conditioning circuitry), a communication device (usually radio transceivers or alternatively optical), and a power source usually in the form of a battery. Other possible inclusions are energy harvesting modules, secondary ASICs, and possibly secondary communication interface (e.g. RS-232 or USB).
The base stations are one or more components of the WSN with much more computational, energy and communication resources. They act as a gateway between sensor nodes and the end user as they typically forward data from the WSN on to a server. Other special components in routing based networks are routers, designed to compute, calculate and distribute the routing tables.
Platforms
Hardware
One major challenge in a WSN is to produce low cost and tiny sensor nodes. There are an increasing number of small companies producing WSN hardware and the commercial situation can be compared to home computing in the 1970s. Many of the nodes are still in the research and development stage, particularly their software. Also inherent to sensor network adoption is the use of very low power methods for radio communication and data acquisition.
In many applications, a WSN communicates with a local area network or wide area network through a gateway. The Gateway acts as a bridge between the WSN and the other network. This enables data to be stored and processed by devices with more resources, for example, in a remotely located server. A wireless wide area network used primarily for low-power devices is known as a Low-Power Wide-Area Network (LPWAN).
Wireless
There are several wireless standards and solutions for sensor node connectivity. Thread and Zigbee can connect sensors operating at 2.4 GHz with a data rate of 250kbit/s. Many use a lower frequency to increase radio range (typically 1 km), for example Z-wave operates at 915 MHz and in the EU 868 MHz has been widely used but these have a lower data rate (typically 50 kbit/s). The IEEE 802.15.4 working group provides a standard for low power device connectivity and commonly sensors and smart meters use one of these standards for connectivity. With the emergence of Internet of Things, many other proposals have been made to provide sensor connectivity. LoRa is a form of LPWAN which provides long range low power wireless connectivity for devices, which has been used in smart meters and other long range sensor applications. Wi-SUN connects devices at home. NarrowBand IOT and LTE-M can connect up to millions of sensors and devices using cellular technology.
Software
Energy is the scarcest resource of WSN nodes, and it determines the lifetime of WSNs. WSNs may be deployed in large numbers in various environments, including remote and hostile regions, where ad hoc communications are a key component. For this reason, algorithms and protocols need to address the following issues:
Increased lifespan
Robustness and fault tolerance
Self-configuration
Lifetime maximization: Energy/Power Consumption of the sensing device should be minimized and sensor nodes should be energy efficient since their limited energy resource determines their lifetime. To conserve power, wireless sensor nodes normally power off both the radio transmitter and the radio receiver when not in use.
Routing protocols
Wireless sensor networks are composed of low-energy, small-size, and low-range unattended sensor nodes. Recently, it has been observed that by periodically turning on and off the sensing and communication capabilities of sensor nodes, we can significantly reduce the active time and thus prolong network lifetime. However, this duty cycling may result in high network latency, routing overhead, and neighbor discovery delays due to asynchronous sleep and wake-up scheduling. These limitations call for a countermeasure for duty-cycled wireless sensor networks which should minimize routing information, routing traffic load, and energy consumption. Researchers from Sungkyunkwan University have proposed a lightweight non-increasing delivery-latency interval routing referred as LNDIR. This scheme can discover minimum latency routes at each non-increasing delivery-latency interval instead of each time slot. Simulation experiments demonstrated the validity of this novel approach in minimizing routing information stored at each sensor. Furthermore, this novel routing can also guarantee the minimum delivery latency from each source to the sink. Performance improvements of up to 12-fold and 11-fold are observed in terms of routing traffic load reduction and energy efficiency, respectively, as compared to existing schemes.
Operating systems
Operating systems for wireless sensor network nodes are typically less complex than general-purpose operating systems. They more strongly resemble embedded systems, for two reasons. First, wireless sensor networks are typically deployed with a particular application in mind, rather than as a general platform. Second, a need for low costs and low power leads most wireless sensor nodes to have low-power microcontrollers ensuring that mechanisms such as virtual memory are either unnecessary or too expensive to implement.
It is therefore possible to use embedded operating systems such as eCos or uC/OS for sensor networks. However, such operating systems are often designed with real-time properties.
TinyOS, developed by David Culler, is perhaps the first operating system specifically designed for wireless sensor networks. TinyOS is based on an event-driven programming model instead of multithreading. TinyOS programs are composed of event handlers and tasks with run-to-completion semantics. When an external event occurs, such as an incoming data packet or a sensor reading, TinyOS signals the appropriate event handler to handle the event. Event handlers can post tasks that are scheduled by the TinyOS kernel some time later.
LiteOS is a newly developed OS for wireless sensor networks, which provides UNIX-like abstraction and support for the C programming language.
Contiki, developed by Adam Dunkels, is an OS which uses a simpler programming style in C while providing advances such as 6LoWPAN and Protothreads.
RIOT (operating system) is a more recent real-time OS including similar functionality to Contiki.
PreonVM is an OS for wireless sensor networks, which provides 6LoWPAN based on Contiki and support for the Java programming language.
Online collaborative sensor data management platforms
Online collaborative sensor data management platforms are on-line database services that allow sensor owners to register and connect their devices to feed data into an online database for storage and also allow developers to connect to the database and build their own applications based on that data. Examples include Xively and the Wikisensing platform . Such platforms simplify online collaboration between users over diverse data sets ranging from energy and environment data to that collected from transport services. Other services include allowing developers to embed real-time graphs & widgets in websites; analyse and process historical data pulled from the data feeds; send real-time alerts from any datastream to control scripts, devices and environments.
The architecture of the Wikisensing system describes the key components of such systems to include APIs and interfaces for online collaborators, a middleware containing the business logic needed for the sensor data management and processing and a storage model suitable for the efficient storage and retrieval of large volumes of data.
Simulation
At present, agent-based modeling and simulation is the only paradigm which allows the simulation of complex behavior in the environments of wireless sensors (such as flocking). Agent-based simulation of wireless sensor and ad hoc networks is a relatively new paradigm. Agent-based modelling was originally based on social simulation.
Network simulators like Opnet, Tetcos NetSim and NS can be used to simulate a wireless sensor network.
Other concepts
Localization
Network localization refers to the problem of estimating the location of wireless sensor nodes during deployments and in dynamic settings. For ultra-low power sensors, size, cost and environment precludes the use of Global Positioning System receivers on sensors. In 2000, Nirupama Bulusu, John Heidemann and Deborah Estrin first motivated and proposed a radio connectivity based system for localization of wireless sensor networks. Subsequently, such localization systems have been referred to as range free localization systems, and many localization systems for wireless sensor networks have been subsequently proposed including AHLoS, APS, and Stardust.
Sensor data calibration and fault tolerance
Sensors and devices used in wireless sensor networks are state-of-the-art technology with the lowest possible price. The sensor measurements we get from these devices are therefore often noisy, incomplete and inaccurate. Researchers studying wireless sensor networks hypothesize that much more information can be extracted from hundreds of unreliable measurements spread across a field of interest than from a smaller number of high-quality, high-reliability instruments with the same total cost.
Macroprogramming
Macro-programming is a term coined by Matt Welsh. It refers to programming the entire sensor network as an ensemble, rather than individual sensor nodes. Another way to macro-program a network is to view the sensor network as a database, which was popularized by the TinyDB system developed by Sam Madden.
Reprogramming
Reprogramming is the process of updating the code on the sensor nodes. The most feasible form of reprogramming is remote reprogramming whereby the code is disseminated wirelessly while the nodes are deployed. Different reprogramming protocols exist that provide different levels of speed of operation, reliability, energy expenditure, requirement of code resident on the nodes, suitability to different wireless environments, resistance to DoS, etc. Popular reprogramming protocols are Deluge (2004), Trickle (2004), MNP (2005), Synapse (2008), and Zephyr (2009).
Security
Infrastructure-less architecture (i.e. no gateways are included, etc.) and inherent requirements (i.e. unattended working environment, etc.) of WSNs might pose several weak points that attract adversaries. Therefore, security is a big concern when WSNs are deployed for special applications such as military and healthcare. Owing to their unique characteristics, traditional security methods of computer networks would be useless (or less effective) for WSNs. Hence, lack of security mechanisms would cause intrusions towards those networks. These intrusions need to be detected and mitigation methods should be applied.
There have been important innovations in securing wireless sensor networks. Most wireless embedded networks use omni-directional antennas and therefore neighbors can overhear communication in and out of nodes. This was used this to develop a primitive called "local monitoring" which was used for detection of sophisticated attacks, like blackhole or wormhole, which degrade the throughput of large networks to close-to-zero. This primitive has since been used by many researchers and commercial wireless packet sniffers. This was subsequently refined for more sophisticated attacks such as with collusion, mobility, and multi-antenna, multi-channel devices.
Distributed sensor network
If a centralized architecture is used in a sensor network and the central node fails, then the entire network will collapse, however the reliability of the sensor network can be increased by using a distributed control architecture. Distributed control is used in WSNs for the following reasons:
Sensor nodes are prone to failure,
For better collection of data,
To provide nodes with backup in case of failure of the central node.
There is also no centralised body to allocate the resources and they have to be self organized.
As for the distributed filtering over distributed sensor network. the general setup is to observe the underlying process through a group of sensors organized according to a given network topology, which renders the individual observer estimates the system state based not only on its own measurement but also on its neighbors'.
Data integration and sensor web
The data gathered from wireless sensor networks is usually saved in the form of numerical data in a central base station. Additionally, the Open Geospatial Consortium (OGC) is specifying standards for interoperability interfaces and metadata encodings that enable real time integration of heterogeneous sensor webs into the Internet, allowing any individual to monitor or control wireless sensor networks through a web browser.
In-network processing
To reduce communication costs some algorithms remove or reduce nodes' redundant sensor information and avoid forwarding data that is of no use. This technique has been used, for instance, for distributed anomaly detection or distributed optimization. As nodes can inspect the data they forward, they can measure averages or directionality for example of readings from other nodes. For example, in sensing and monitoring applications, it is generally the case that neighboring sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires techniques for in-network data aggregation and mining. Aggregation reduces the amount of network traffic which helps to reduce energy consumption on sensor nodes. Recently, it has been found that network gateways also play an important role in improving energy efficiency of sensor nodes by scheduling more resources for the nodes with more critical energy efficiency need and advanced energy efficient scheduling algorithms need to be implemented at network gateways for the improvement of the overall network energy efficiency.
Secure data aggregation
This is a form of in-network processing where sensor nodes are assumed to be unsecured with limited available energy, while the base station is assumed to be secure with unlimited available energy. Aggregation complicates the already existing security challenges for wireless sensor networks and requires new security techniques tailored specifically for these scenarios. Providing security to aggregate data in wireless sensor networks is known as secure data aggregation in WSN. were the first few works discussing techniques for secure data aggregation in wireless sensor networks.
Two main security challenges in secure data aggregation are confidentiality and integrity of data. While encryption is traditionally used to provide end to end confidentiality in wireless sensor network, the aggregators in a secure data aggregation scenario need to decrypt the encrypted data to perform aggregation. This exposes the plaintext at the aggregators, making the data vulnerable to attacks from an adversary. Similarly an aggregator can inject false data into the aggregate and make the base station accept false data. Thus, while data aggregation improves energy efficiency of a network, it complicates the existing security challenges.
See also
Autonomous system
Bluetooth mesh networking
Center for Embedded Network Sensing
List of ad hoc routing protocols
Meteorological instrumentation
Mobile wireless sensor networks
OpenWSN
Optical wireless communications
Robotic mapping
Smart, connected products
Unattended ground sensor
Virtual sensor network
Wireless ad hoc networks
References
Further reading
Kiran Maraiya, Kamal Kant, Nitin Gupta "Wireless Sensor Network: A Review on Data Aggregation" International Journal of Scientific & Engineering Research Volume 2 Issue 4, April 2011.
Chalermek Intanagonwiwat, Deborah Estrin, Ramesh Govindan, John Heidemann, "Impact of Network Density on Data Aggregation in Wireless SensorNetworks," November 4, 2001.
External links
IEEE 802.15.4 Standardization Committee
Secure Data Aggregation in Wireless Sensor Networks: A *Survey
A list of secure aggregation proposals for WSN |
The Old Chicago Water Tower District is a historic district along the Magnificent Mile shopping district in the Near North Side community area of Chicago, Illinois. The district is located on both sides of North Michigan Avenue between East Chicago and East Pearson Streets. It includes the Chicago Water Tower, Chicago Avenue Pumping Station, and Chicago Fire Department Fire Station No. 98. All three structures are part of the Chicago Landmark district designated on October 6, 1971 (amended June 10, 1981). The Water Tower and Pumping Station were jointly added to the National Register of Historic Places on April 23, 1975. In addition the Tower was named an American Water Landmark in 1969. The Water Tower was also one of the few buildings to survive the Great Chicago Fire. The district is the namesake of the nearby Water Tower Place.
The district was once called Tower Town or Towertown and was known for its bohemian artists and nightlife in the early 20th century. In the 1910s, artists moved into an area near Pine St (now North Michigan Avenue) that was being deserted by affluent residents. Tower Town was the resultant artistic district, and it was successful in part because of its proximity to affluent patrons who remained on the Gold Coast. A new bridge connecting the area to the Chicago Loop helped transform Tower Town into an expensive commercial district. Bars and nightclubs in the area included Chez Pierre, the Dil Pickle Club, Kelly's Stables, the Little Club, the Paradise Club and the Tent.
Gallery
See also
Chicago architecture
Water tower
Water Tower Place
Notes
External links
Official City of Chicago Near North Side Community Map
Historic districts in Chicago
Central Chicago
Buildings and structures on the National Register of Historic Places in Chicago
Chicago Landmarks
Towers in Illinois
Historic districts on the National Register of Historic Places in Illinois |
```c++
#include "inspector_agent.h"
#include "env-inl.h"
#include "inspector/main_thread_interface.h"
#include "inspector/node_string.h"
#include "inspector/runtime_agent.h"
#include "inspector/tracing_agent.h"
#include "inspector/worker_agent.h"
#include "inspector/worker_inspector.h"
#include "inspector_io.h"
#include "node/inspector/protocol/Protocol.h"
#include "node_errors.h"
#include "node_internals.h"
#include "node_options-inl.h"
#include "node_process.h"
#include "node_url.h"
#include "util-inl.h"
#include "v8-inspector.h"
#include "v8-platform.h"
#include "libplatform/libplatform.h"
#ifdef __POSIX__
#include <pthread.h>
#include <climits> // PTHREAD_STACK_MIN
#endif // __POSIX__
#include <algorithm>
#include <cstring>
#include <sstream>
#include <unordered_map>
#include <vector>
namespace node {
namespace inspector {
namespace {
using node::FatalError;
using v8::Context;
using v8::Function;
using v8::Global;
using v8::HandleScope;
using v8::Isolate;
using v8::Local;
using v8::Message;
using v8::Object;
using v8::Value;
using v8_inspector::StringBuffer;
using v8_inspector::StringView;
using v8_inspector::V8Inspector;
using v8_inspector::V8InspectorClient;
static uv_sem_t start_io_thread_semaphore;
static uv_async_t start_io_thread_async;
// This is just an additional check to make sure start_io_thread_async
// is not accidentally re-used or used when uninitialized.
static std::atomic_bool start_io_thread_async_initialized { false };
// Protects the Agent* stored in start_io_thread_async.data.
static Mutex start_io_thread_async_mutex;
std::unique_ptr<StringBuffer> ToProtocolString(Isolate* isolate,
Local<Value> value) {
TwoByteValue buffer(isolate, value);
return StringBuffer::create(StringView(*buffer, buffer.length()));
}
// Called on the main thread.
void StartIoThreadAsyncCallback(uv_async_t* handle) {
static_cast<Agent*>(handle->data)->StartIoThread();
}
#ifdef __POSIX__
static void StartIoThreadWakeup(int signo, siginfo_t* info, void* ucontext) {
uv_sem_post(&start_io_thread_semaphore);
}
inline void* StartIoThreadMain(void* unused) {
for (;;) {
uv_sem_wait(&start_io_thread_semaphore);
Mutex::ScopedLock lock(start_io_thread_async_mutex);
CHECK(start_io_thread_async_initialized);
Agent* agent = static_cast<Agent*>(start_io_thread_async.data);
if (agent != nullptr)
agent->RequestIoThreadStart();
}
return nullptr;
}
static int StartDebugSignalHandler() {
// Start a watchdog thread for calling v8::Debug::DebugBreak() because
// it's not safe to call directly from the signal handler, it can
// deadlock with the thread it interrupts.
CHECK_EQ(0, uv_sem_init(&start_io_thread_semaphore, 0));
pthread_attr_t attr;
CHECK_EQ(0, pthread_attr_init(&attr));
#if defined(PTHREAD_STACK_MIN) && !defined(__FreeBSD__)
// PTHREAD_STACK_MIN is 2 KB with musl libc, which is too small to safely
// receive signals. PTHREAD_STACK_MIN + MINSIGSTKSZ is 8 KB on arm64, which
// is the musl architecture with the biggest MINSIGSTKSZ so let's use that
// as a lower bound and let's quadruple it just in case. The goal is to avoid
// creating a big 2 or 4 MB address space gap (problematic on 32 bits
// because of fragmentation), not squeeze out every last byte.
// Omitted on FreeBSD because it doesn't seem to like small stacks.
const size_t stack_size = std::max(static_cast<size_t>(4 * 8192),
static_cast<size_t>(PTHREAD_STACK_MIN));
CHECK_EQ(0, pthread_attr_setstacksize(&attr, stack_size));
#endif // defined(PTHREAD_STACK_MIN) && !defined(__FreeBSD__)
CHECK_EQ(0, pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED));
sigset_t sigmask;
// Mask all signals.
sigfillset(&sigmask);
sigset_t savemask;
CHECK_EQ(0, pthread_sigmask(SIG_SETMASK, &sigmask, &savemask));
sigmask = savemask;
pthread_t thread;
const int err = pthread_create(&thread, &attr,
StartIoThreadMain, nullptr);
// Restore original mask
CHECK_EQ(0, pthread_sigmask(SIG_SETMASK, &sigmask, nullptr));
CHECK_EQ(0, pthread_attr_destroy(&attr));
if (err != 0) {
fprintf(stderr, "node[%u]: pthread_create: %s\n",
uv_os_getpid(), strerror(err));
fflush(stderr);
// Leave SIGUSR1 blocked. We don't install a signal handler,
// receiving the signal would terminate the process.
return -err;
}
RegisterSignalHandler(SIGUSR1, StartIoThreadWakeup);
// Unblock SIGUSR1. A pending SIGUSR1 signal will now be delivered.
sigemptyset(&sigmask);
sigaddset(&sigmask, SIGUSR1);
CHECK_EQ(0, pthread_sigmask(SIG_UNBLOCK, &sigmask, nullptr));
return 0;
}
#endif // __POSIX__
#ifdef _WIN32
DWORD WINAPI StartIoThreadProc(void* arg) {
Mutex::ScopedLock lock(start_io_thread_async_mutex);
CHECK(start_io_thread_async_initialized);
Agent* agent = static_cast<Agent*>(start_io_thread_async.data);
if (agent != nullptr)
agent->RequestIoThreadStart();
return 0;
}
static int GetDebugSignalHandlerMappingName(DWORD pid, wchar_t* buf,
size_t buf_len) {
return _snwprintf(buf, buf_len, L"node-debug-handler-%u", pid);
}
static int StartDebugSignalHandler() {
wchar_t mapping_name[32];
HANDLE mapping_handle;
DWORD pid;
LPTHREAD_START_ROUTINE* handler;
pid = uv_os_getpid();
if (GetDebugSignalHandlerMappingName(pid,
mapping_name,
arraysize(mapping_name)) < 0) {
return -1;
}
mapping_handle = CreateFileMappingW(INVALID_HANDLE_VALUE,
nullptr,
PAGE_READWRITE,
0,
sizeof *handler,
mapping_name);
if (mapping_handle == nullptr) {
return -1;
}
handler = reinterpret_cast<LPTHREAD_START_ROUTINE*>(
MapViewOfFile(mapping_handle,
FILE_MAP_ALL_ACCESS,
0,
0,
sizeof *handler));
if (handler == nullptr) {
CloseHandle(mapping_handle);
return -1;
}
*handler = StartIoThreadProc;
UnmapViewOfFile(static_cast<void*>(handler));
return 0;
}
#endif // _WIN32
const int CONTEXT_GROUP_ID = 1;
std::string GetWorkerLabel(node::Environment* env) {
std::ostringstream result;
result << "Worker[" << env->thread_id() << "]";
return result.str();
}
class ChannelImpl final : public v8_inspector::V8Inspector::Channel,
public protocol::FrontendChannel {
public:
explicit ChannelImpl(Environment* env,
const std::unique_ptr<V8Inspector>& inspector,
std::shared_ptr<WorkerManager> worker_manager,
std::unique_ptr<InspectorSessionDelegate> delegate,
std::shared_ptr<MainThreadHandle> main_thread_,
bool prevent_shutdown)
: delegate_(std::move(delegate)), prevent_shutdown_(prevent_shutdown),
retaining_context_(false) {
session_ = inspector->connect(CONTEXT_GROUP_ID, this, StringView());
node_dispatcher_ = std::make_unique<protocol::UberDispatcher>(this);
tracing_agent_ =
std::make_unique<protocol::TracingAgent>(env, main_thread_);
tracing_agent_->Wire(node_dispatcher_.get());
if (worker_manager) {
worker_agent_ = std::make_unique<protocol::WorkerAgent>(worker_manager);
worker_agent_->Wire(node_dispatcher_.get());
}
runtime_agent_ = std::make_unique<protocol::RuntimeAgent>();
runtime_agent_->Wire(node_dispatcher_.get());
}
~ChannelImpl() override {
tracing_agent_->disable();
tracing_agent_.reset(); // Dispose before the dispatchers
if (worker_agent_) {
worker_agent_->disable();
worker_agent_.reset(); // Dispose before the dispatchers
}
runtime_agent_->disable();
runtime_agent_.reset(); // Dispose before the dispatchers
}
void dispatchProtocolMessage(const StringView& message) {
std::string raw_message = protocol::StringUtil::StringViewToUtf8(message);
std::unique_ptr<protocol::DictionaryValue> value =
protocol::DictionaryValue::cast(protocol::StringUtil::parseMessage(
raw_message, false));
int call_id;
std::string method;
node_dispatcher_->parseCommand(value.get(), &call_id, &method);
if (v8_inspector::V8InspectorSession::canDispatchMethod(
Utf8ToStringView(method)->string())) {
session_->dispatchProtocolMessage(message);
} else {
node_dispatcher_->dispatch(call_id, method, std::move(value),
raw_message);
}
}
void schedulePauseOnNextStatement(const std::string& reason) {
std::unique_ptr<StringBuffer> buffer = Utf8ToStringView(reason);
session_->schedulePauseOnNextStatement(buffer->string(), buffer->string());
}
bool preventShutdown() {
return prevent_shutdown_;
}
bool notifyWaitingForDisconnect() {
retaining_context_ = runtime_agent_->notifyWaitingForDisconnect();
return retaining_context_;
}
bool retainingContext() {
return retaining_context_;
}
private:
void sendResponse(
int callId,
std::unique_ptr<v8_inspector::StringBuffer> message) override {
sendMessageToFrontend(message->string());
}
void sendNotification(
std::unique_ptr<v8_inspector::StringBuffer> message) override {
sendMessageToFrontend(message->string());
}
void flushProtocolNotifications() override { }
void sendMessageToFrontend(const StringView& message) {
delegate_->SendMessageToFrontend(message);
}
void sendMessageToFrontend(const std::string& message) {
sendMessageToFrontend(Utf8ToStringView(message)->string());
}
using Serializable = protocol::Serializable;
void sendProtocolResponse(int callId,
std::unique_ptr<Serializable> message) override {
sendMessageToFrontend(message->serializeToJSON());
}
void sendProtocolNotification(
std::unique_ptr<Serializable> message) override {
sendMessageToFrontend(message->serializeToJSON());
}
void fallThrough(int callId,
const std::string& method,
const std::string& message) override {
DCHECK(false);
}
std::unique_ptr<protocol::RuntimeAgent> runtime_agent_;
std::unique_ptr<protocol::TracingAgent> tracing_agent_;
std::unique_ptr<protocol::WorkerAgent> worker_agent_;
std::unique_ptr<InspectorSessionDelegate> delegate_;
std::unique_ptr<v8_inspector::V8InspectorSession> session_;
std::unique_ptr<protocol::UberDispatcher> node_dispatcher_;
bool prevent_shutdown_;
bool retaining_context_;
};
class InspectorTimer {
public:
InspectorTimer(Environment* env,
double interval_s,
V8InspectorClient::TimerCallback callback,
void* data) : env_(env),
callback_(callback),
data_(data) {
uv_timer_init(env->event_loop(), &timer_);
int64_t interval_ms = 1000 * interval_s;
uv_timer_start(&timer_, OnTimer, interval_ms, interval_ms);
timer_.data = this;
}
InspectorTimer(const InspectorTimer&) = delete;
void Stop() {
if (timer_.data == nullptr) return;
timer_.data = nullptr;
uv_timer_stop(&timer_);
env_->CloseHandle(reinterpret_cast<uv_handle_t*>(&timer_), TimerClosedCb);
}
inline Environment* env() const { return env_; }
private:
static void OnTimer(uv_timer_t* uvtimer) {
InspectorTimer* timer = node::ContainerOf(&InspectorTimer::timer_, uvtimer);
timer->callback_(timer->data_);
}
static void TimerClosedCb(uv_handle_t* uvtimer) {
std::unique_ptr<InspectorTimer> timer(
node::ContainerOf(&InspectorTimer::timer_,
reinterpret_cast<uv_timer_t*>(uvtimer)));
// Unique_ptr goes out of scope here and pointer is deleted.
}
~InspectorTimer() = default;
Environment* env_;
uv_timer_t timer_;
V8InspectorClient::TimerCallback callback_;
void* data_;
friend std::unique_ptr<InspectorTimer>::deleter_type;
};
class InspectorTimerHandle {
public:
InspectorTimerHandle(Environment* env, double interval_s,
V8InspectorClient::TimerCallback callback, void* data) {
timer_ = new InspectorTimer(env, interval_s, callback, data);
env->AddCleanupHook(CleanupHook, this);
}
InspectorTimerHandle(const InspectorTimerHandle&) = delete;
~InspectorTimerHandle() {
Stop();
}
private:
void Stop() {
if (timer_ != nullptr) {
timer_->env()->RemoveCleanupHook(CleanupHook, this);
timer_->Stop();
}
timer_ = nullptr;
}
static void CleanupHook(void* data) {
static_cast<InspectorTimerHandle*>(data)->Stop();
}
InspectorTimer* timer_;
};
class SameThreadInspectorSession : public InspectorSession {
public:
SameThreadInspectorSession(
int session_id, std::shared_ptr<NodeInspectorClient> client)
: session_id_(session_id), client_(client) {}
~SameThreadInspectorSession() override;
void Dispatch(const v8_inspector::StringView& message) override;
private:
int session_id_;
std::weak_ptr<NodeInspectorClient> client_;
};
void NotifyClusterWorkersDebugEnabled(Environment* env) {
Isolate* isolate = env->isolate();
HandleScope handle_scope(isolate);
Local<Context> context = env->context();
// Send message to enable debug in cluster workers
Local<Object> message = Object::New(isolate);
message->Set(context, FIXED_ONE_BYTE_STRING(isolate, "cmd"),
FIXED_ONE_BYTE_STRING(isolate, "NODE_DEBUG_ENABLED")).Check();
ProcessEmit(env, "internalMessage", message);
}
#ifdef _WIN32
bool IsFilePath(const std::string& path) {
// '\\'
if (path.length() > 2 && path[0] == '\\' && path[1] == '\\')
return true;
// '[A-Z]:[/\\]'
if (path.length() < 3)
return false;
if ((path[0] >= 'A' && path[0] <= 'Z') || (path[0] >= 'a' && path[0] <= 'z'))
return path[1] == ':' && (path[2] == '/' || path[2] == '\\');
return false;
}
#else
bool IsFilePath(const std::string& path) {
return path.length() && path[0] == '/';
}
#endif // __POSIX__
} // namespace
class NodeInspectorClient : public V8InspectorClient {
public:
explicit NodeInspectorClient(node::Environment* env, bool is_main)
: env_(env), is_main_(is_main) {
client_ = V8Inspector::create(env->isolate(), this);
// TODO(bnoordhuis) Make name configurable from src/node.cc.
std::string name =
is_main_ ? GetHumanReadableProcessName() : GetWorkerLabel(env);
ContextInfo info(name);
info.is_default = true;
contextCreated(env->context(), info);
}
void runMessageLoopOnPause(int context_group_id) override {
waiting_for_resume_ = true;
runMessageLoop();
}
void waitForSessionsDisconnect() {
waiting_for_sessions_disconnect_ = true;
runMessageLoop();
}
void waitForFrontend() {
waiting_for_frontend_ = true;
runMessageLoop();
}
void maxAsyncCallStackDepthChanged(int depth) override {
if (waiting_for_sessions_disconnect_) {
// V8 isolate is mostly done and is only letting Inspector protocol
// clients gather data.
return;
}
if (auto agent = env_->inspector_agent()) {
if (depth == 0) {
agent->DisableAsyncHook();
} else {
agent->EnableAsyncHook();
}
}
}
void contextCreated(Local<Context> context, const ContextInfo& info) {
auto name_buffer = Utf8ToStringView(info.name);
auto origin_buffer = Utf8ToStringView(info.origin);
std::unique_ptr<StringBuffer> aux_data_buffer;
v8_inspector::V8ContextInfo v8info(
context, CONTEXT_GROUP_ID, name_buffer->string());
v8info.origin = origin_buffer->string();
if (info.is_default) {
aux_data_buffer = Utf8ToStringView("{\"isDefault\":true}");
} else {
aux_data_buffer = Utf8ToStringView("{\"isDefault\":false}");
}
v8info.auxData = aux_data_buffer->string();
client_->contextCreated(v8info);
}
void contextDestroyed(Local<Context> context) {
client_->contextDestroyed(context);
}
void quitMessageLoopOnPause() override {
waiting_for_resume_ = false;
}
void runIfWaitingForDebugger(int context_group_id) override {
waiting_for_frontend_ = false;
}
int connectFrontend(std::unique_ptr<InspectorSessionDelegate> delegate,
bool prevent_shutdown) {
int session_id = next_session_id_++;
channels_[session_id] = std::make_unique<ChannelImpl>(env_,
client_,
getWorkerManager(),
std::move(delegate),
getThreadHandle(),
prevent_shutdown);
return session_id;
}
void disconnectFrontend(int session_id) {
auto it = channels_.find(session_id);
if (it == channels_.end())
return;
bool retaining_context = it->second->retainingContext();
channels_.erase(it);
if (retaining_context) {
for (const auto& id_channel : channels_) {
if (id_channel.second->retainingContext())
return;
}
contextDestroyed(env_->context());
}
if (waiting_for_sessions_disconnect_ && !is_main_)
waiting_for_sessions_disconnect_ = false;
}
void dispatchMessageFromFrontend(int session_id, const StringView& message) {
channels_[session_id]->dispatchProtocolMessage(message);
}
Local<Context> ensureDefaultContextInGroup(int contextGroupId) override {
return env_->context();
}
void installAdditionalCommandLineAPI(Local<Context> context,
Local<Object> target) override {
Local<Function> installer = env_->inspector_console_extension_installer();
if (!installer.IsEmpty()) {
Local<Value> argv[] = {target};
// If there is an exception, proceed in JS land
USE(installer->Call(context, target, arraysize(argv), argv));
}
}
void ReportUncaughtException(Local<Value> error, Local<Message> message) {
Isolate* isolate = env_->isolate();
Local<Context> context = env_->context();
int script_id = message->GetScriptOrigin().ScriptID()->Value();
Local<v8::StackTrace> stack_trace = message->GetStackTrace();
if (!stack_trace.IsEmpty() && stack_trace->GetFrameCount() > 0 &&
script_id == stack_trace->GetFrame(isolate, 0)->GetScriptId()) {
script_id = 0;
}
const uint8_t DETAILS[] = "Uncaught";
client_->exceptionThrown(
context,
StringView(DETAILS, sizeof(DETAILS) - 1),
error,
ToProtocolString(isolate, message->Get())->string(),
ToProtocolString(isolate, message->GetScriptResourceName())->string(),
message->GetLineNumber(context).FromMaybe(0),
message->GetStartColumn(context).FromMaybe(0),
client_->createStackTrace(stack_trace),
script_id);
}
void startRepeatingTimer(double interval_s,
TimerCallback callback,
void* data) override {
timers_.emplace(std::piecewise_construct, std::make_tuple(data),
std::make_tuple(env_, interval_s, callback,
data));
}
void cancelTimer(void* data) override {
timers_.erase(data);
}
// Async stack traces instrumentation.
void AsyncTaskScheduled(const StringView& task_name, void* task,
bool recurring) {
client_->asyncTaskScheduled(task_name, task, recurring);
}
void AsyncTaskCanceled(void* task) {
client_->asyncTaskCanceled(task);
}
void AsyncTaskStarted(void* task) {
client_->asyncTaskStarted(task);
}
void AsyncTaskFinished(void* task) {
client_->asyncTaskFinished(task);
}
void AllAsyncTasksCanceled() {
client_->allAsyncTasksCanceled();
}
void schedulePauseOnNextStatement(const std::string& reason) {
for (const auto& id_channel : channels_) {
id_channel.second->schedulePauseOnNextStatement(reason);
}
}
bool hasConnectedSessions() {
for (const auto& id_channel : channels_) {
// Other sessions are "invisible" more most purposes
if (id_channel.second->preventShutdown())
return true;
}
return false;
}
bool notifyWaitingForDisconnect() {
bool retaining_context = false;
for (const auto& id_channel : channels_) {
if (id_channel.second->notifyWaitingForDisconnect())
retaining_context = true;
}
return retaining_context;
}
std::shared_ptr<MainThreadHandle> getThreadHandle() {
if (!interface_) {
interface_ = std::make_shared<MainThreadInterface>(
env_->inspector_agent());
}
return interface_->GetHandle();
}
std::shared_ptr<WorkerManager> getWorkerManager() {
if (!is_main_) {
return nullptr;
}
if (worker_manager_ == nullptr) {
worker_manager_ =
std::make_shared<WorkerManager>(getThreadHandle());
}
return worker_manager_;
}
bool IsActive() {
return !channels_.empty();
}
private:
bool shouldRunMessageLoop() {
if (waiting_for_frontend_)
return true;
if (waiting_for_sessions_disconnect_ || waiting_for_resume_) {
return hasConnectedSessions();
}
return false;
}
void runMessageLoop() {
if (running_nested_loop_)
return;
running_nested_loop_ = true;
while (shouldRunMessageLoop()) {
if (interface_) interface_->WaitForFrontendEvent();
env_->RunAndClearInterrupts();
}
running_nested_loop_ = false;
}
double currentTimeMS() override {
return env_->isolate_data()->platform()->CurrentClockTimeMillis();
}
std::unique_ptr<StringBuffer> resourceNameToUrl(
const StringView& resource_name_view) override {
std::string resource_name =
protocol::StringUtil::StringViewToUtf8(resource_name_view);
if (!IsFilePath(resource_name))
return nullptr;
node::url::URL url = node::url::URL::FromFilePath(resource_name);
// TODO(ak239spb): replace this code with url.href().
// Refs: path_to_url
return Utf8ToStringView(url.protocol() + "//" + url.path());
}
node::Environment* env_;
bool is_main_;
bool running_nested_loop_ = false;
std::unique_ptr<V8Inspector> client_;
// Note: ~ChannelImpl may access timers_ so timers_ has to come first.
std::unordered_map<void*, InspectorTimerHandle> timers_;
std::unordered_map<int, std::unique_ptr<ChannelImpl>> channels_;
int next_session_id_ = 1;
bool waiting_for_resume_ = false;
bool waiting_for_frontend_ = false;
bool waiting_for_sessions_disconnect_ = false;
// Allows accessing Inspector from non-main threads
std::shared_ptr<MainThreadInterface> interface_;
std::shared_ptr<WorkerManager> worker_manager_;
};
Agent::Agent(Environment* env)
: parent_env_(env),
debug_options_(env->options()->debug_options()),
host_port_(env->inspector_host_port()) {}
Agent::~Agent() {}
bool Agent::Start(const std::string& path,
const DebugOptions& options,
std::shared_ptr<ExclusiveAccess<HostPort>> host_port,
bool is_main) {
path_ = path;
debug_options_ = options;
CHECK_NOT_NULL(host_port);
host_port_ = host_port;
client_ = std::make_shared<NodeInspectorClient>(parent_env_, is_main);
if (parent_env_->owns_inspector()) {
Mutex::ScopedLock lock(start_io_thread_async_mutex);
CHECK_EQ(start_io_thread_async_initialized.exchange(true), false);
CHECK_EQ(0, uv_async_init(parent_env_->event_loop(),
&start_io_thread_async,
StartIoThreadAsyncCallback));
uv_unref(reinterpret_cast<uv_handle_t*>(&start_io_thread_async));
start_io_thread_async.data = this;
// Ignore failure, SIGUSR1 won't work, but that should not block node start.
StartDebugSignalHandler();
parent_env_->AddCleanupHook([](void* data) {
Environment* env = static_cast<Environment*>(data);
{
Mutex::ScopedLock lock(start_io_thread_async_mutex);
start_io_thread_async.data = nullptr;
}
// This is global, will never get freed
env->CloseHandle(&start_io_thread_async, [](uv_async_t*) {
CHECK(start_io_thread_async_initialized.exchange(false));
});
}, parent_env_);
}
AtExit(parent_env_, [](void* env) {
Agent* agent = static_cast<Environment*>(env)->inspector_agent();
if (agent->IsActive()) {
agent->WaitForDisconnect();
}
}, parent_env_);
bool wait_for_connect = options.wait_for_connect();
if (parent_handle_) {
wait_for_connect = parent_handle_->WaitForConnect();
parent_handle_->WorkerStarted(client_->getThreadHandle(), wait_for_connect);
} else if (!options.inspector_enabled || !StartIoThread()) {
return false;
}
// Patch the debug options to implement waitForDebuggerOnStart for
// the NodeWorker.enable method.
if (wait_for_connect) {
CHECK(!parent_env_->has_serialized_options());
debug_options_.EnableBreakFirstLine();
parent_env_->options()->get_debug_options()->EnableBreakFirstLine();
client_->waitForFrontend();
}
return true;
}
bool Agent::StartIoThread() {
if (io_ != nullptr)
return true;
CHECK_NOT_NULL(client_);
io_ = InspectorIo::Start(client_->getThreadHandle(),
path_,
host_port_,
debug_options_.inspect_publish_uid);
if (io_ == nullptr) {
return false;
}
NotifyClusterWorkersDebugEnabled(parent_env_);
return true;
}
void Agent::Stop() {
io_.reset();
}
std::unique_ptr<InspectorSession> Agent::Connect(
std::unique_ptr<InspectorSessionDelegate> delegate,
bool prevent_shutdown) {
CHECK_NOT_NULL(client_);
int session_id = client_->connectFrontend(std::move(delegate),
prevent_shutdown);
return std::unique_ptr<InspectorSession>(
new SameThreadInspectorSession(session_id, client_));
}
std::unique_ptr<InspectorSession> Agent::ConnectToMainThread(
std::unique_ptr<InspectorSessionDelegate> delegate,
bool prevent_shutdown) {
CHECK_NOT_NULL(parent_handle_);
CHECK_NOT_NULL(client_);
auto thread_safe_delegate =
client_->getThreadHandle()->MakeDelegateThreadSafe(std::move(delegate));
return parent_handle_->Connect(std::move(thread_safe_delegate),
prevent_shutdown);
}
void Agent::WaitForDisconnect() {
CHECK_NOT_NULL(client_);
bool is_worker = parent_handle_ != nullptr;
parent_handle_.reset();
if (client_->hasConnectedSessions() && !is_worker) {
fprintf(stderr, "Waiting for the debugger to disconnect...\n");
fflush(stderr);
}
if (!client_->notifyWaitingForDisconnect()) {
client_->contextDestroyed(parent_env_->context());
} else if (is_worker) {
client_->waitForSessionsDisconnect();
}
if (io_ != nullptr) {
io_->StopAcceptingNewConnections();
client_->waitForSessionsDisconnect();
}
}
void Agent::ReportUncaughtException(Local<Value> error,
Local<Message> message) {
if (!IsListening())
return;
client_->ReportUncaughtException(error, message);
WaitForDisconnect();
}
void Agent::PauseOnNextJavascriptStatement(const std::string& reason) {
client_->schedulePauseOnNextStatement(reason);
}
void Agent::RegisterAsyncHook(Isolate* isolate,
Local<Function> enable_function,
Local<Function> disable_function) {
enable_async_hook_function_.Reset(isolate, enable_function);
disable_async_hook_function_.Reset(isolate, disable_function);
if (pending_enable_async_hook_) {
CHECK(!pending_disable_async_hook_);
pending_enable_async_hook_ = false;
EnableAsyncHook();
} else if (pending_disable_async_hook_) {
CHECK(!pending_enable_async_hook_);
pending_disable_async_hook_ = false;
DisableAsyncHook();
}
}
void Agent::EnableAsyncHook() {
if (!enable_async_hook_function_.IsEmpty()) {
ToggleAsyncHook(parent_env_->isolate(), enable_async_hook_function_);
} else if (pending_disable_async_hook_) {
CHECK(!pending_enable_async_hook_);
pending_disable_async_hook_ = false;
} else {
pending_enable_async_hook_ = true;
}
}
void Agent::DisableAsyncHook() {
if (!disable_async_hook_function_.IsEmpty()) {
ToggleAsyncHook(parent_env_->isolate(), disable_async_hook_function_);
} else if (pending_enable_async_hook_) {
CHECK(!pending_disable_async_hook_);
pending_enable_async_hook_ = false;
} else {
pending_disable_async_hook_ = true;
}
}
void Agent::ToggleAsyncHook(Isolate* isolate,
const Global<Function>& fn) {
// Guard against running this during cleanup -- no async events will be
// emitted anyway at that point anymore, and calling into JS is not possible.
// This should probably not be something we're attempting in the first place,
// Refs: path_to_url#discussion_r456006039
if (!parent_env_->can_call_into_js()) return;
CHECK(parent_env_->has_run_bootstrapping_code());
HandleScope handle_scope(isolate);
CHECK(!fn.IsEmpty());
auto context = parent_env_->context();
v8::TryCatch try_catch(isolate);
USE(fn.Get(isolate)->Call(context, Undefined(isolate), 0, nullptr));
if (try_catch.HasCaught() && !try_catch.HasTerminated()) {
PrintCaughtException(isolate, context, try_catch);
FatalError("\nnode::inspector::Agent::ToggleAsyncHook",
"Cannot toggle Inspector's AsyncHook, please report this.");
}
}
void Agent::AsyncTaskScheduled(const StringView& task_name, void* task,
bool recurring) {
client_->AsyncTaskScheduled(task_name, task, recurring);
}
void Agent::AsyncTaskCanceled(void* task) {
client_->AsyncTaskCanceled(task);
}
void Agent::AsyncTaskStarted(void* task) {
client_->AsyncTaskStarted(task);
}
void Agent::AsyncTaskFinished(void* task) {
client_->AsyncTaskFinished(task);
}
void Agent::AllAsyncTasksCanceled() {
client_->AllAsyncTasksCanceled();
}
void Agent::RequestIoThreadStart() {
// We need to attempt to interrupt V8 flow (in case Node is running
// continuous JS code) and to wake up libuv thread (in case Node is waiting
// for IO events)
CHECK(start_io_thread_async_initialized);
uv_async_send(&start_io_thread_async);
parent_env_->RequestInterrupt([this](Environment*) {
StartIoThread();
});
CHECK(start_io_thread_async_initialized);
uv_async_send(&start_io_thread_async);
}
void Agent::ContextCreated(Local<Context> context, const ContextInfo& info) {
if (client_ == nullptr) // This happens for a main context
return;
client_->contextCreated(context, info);
}
bool Agent::WillWaitForConnect() {
if (debug_options_.wait_for_connect()) return true;
if (parent_handle_)
return parent_handle_->WaitForConnect();
return false;
}
bool Agent::IsActive() {
if (client_ == nullptr)
return false;
return io_ != nullptr || client_->IsActive();
}
void Agent::SetParentHandle(
std::unique_ptr<ParentInspectorHandle> parent_handle) {
parent_handle_ = std::move(parent_handle);
}
std::unique_ptr<ParentInspectorHandle> Agent::GetParentHandle(
int thread_id, const std::string& url) {
if (!parent_handle_) {
return client_->getWorkerManager()->NewParentHandle(thread_id, url);
} else {
return parent_handle_->NewParentInspectorHandle(thread_id, url);
}
}
void Agent::WaitForConnect() {
CHECK_NOT_NULL(client_);
client_->waitForFrontend();
}
std::shared_ptr<WorkerManager> Agent::GetWorkerManager() {
CHECK_NOT_NULL(client_);
return client_->getWorkerManager();
}
std::string Agent::GetWsUrl() const {
if (io_ == nullptr)
return "";
return io_->GetWsUrl();
}
SameThreadInspectorSession::~SameThreadInspectorSession() {
auto client = client_.lock();
if (client)
client->disconnectFrontend(session_id_);
}
void SameThreadInspectorSession::Dispatch(
const v8_inspector::StringView& message) {
auto client = client_.lock();
if (client)
client->dispatchMessageFromFrontend(session_id_, message);
}
} // namespace inspector
} // namespace node
``` |
Lee Seok-hyun (; born 13 June 1990) is a South Korean footballer who plays as midfielder for Jeonnam Dragons.
Career
Incheon United
Incheon United signed him in December 2012. He made his debut goal against FC Seoul on 9 March 2013.
FC Seoul
On 2 January 2015, He joined FC Seoul.
Pohang Steelers
On 28 July 2018, He joined Pohang Steelers.
References
External links
1990 births
Living people
Men's association football midfielders
South Korean men's footballers
Incheon United FC players
FC Seoul players
Pohang Steelers players
K League 1 players
Sun Moon University alumni |
```yaml
homepage: "path_to_url"
language: jvm
primary_contact: "ebourg@apache.org"
auto_ccs:
- "emmanuel.bourg@gmail.com"
fuzzing_engines:
- libfuzzer
sanitizers:
- address
main_repo: "path_to_url"
``` |
Hwajeon (), or flower cake is a small Korean pan-fried rice cake. It is made out of glutinous rice flour, honey and edible petals from seasonal flowers, such as rhododendron. It is eaten during the festivals of Samjinnal and Buddha's Birthday.
Etymology
The word hwajeon (; ) is a compound noun made of the hanja character hwa (; ), meaning "flower", and the character jeon (; ), meaning "a pan-fry". The synonyms kkot-bukkumi () and kkot-jijimi () are also compounds of the native Korean word kkot (), meaning "flower", and bukkumi (), meaning a "pan-fried rice cake"; or kkot () and jijimi (), meaning "pancake".
Varieties and preparation
Hwajeon is made of edible petals from seasonal flowers. Typically, rhododendron, pear flower, goldenbell flower, cherry blossom, and violet are used in spring; rose is used in summer; and chrysanthemum and cockscomb are used in autumn. In winter when flowers are scarce in Korea, alternatives like mugwort leaves, waterdropwort leaves, rock tripe, or jujubes are cut into flower shapes and used instead.There are two main ways of preparing hwajeon:
Glutinous rice is seasoned with salt, pounded into fine flour, and kneaded with boiling water. The dough is made into a small, round, flat shape and pan-fried in sesame oil. Flower petals are placed and lightly pressed on the dough while frying on the griddle.
Fine glutinous rice flour is kneaded into thick dough and rolled into thick sheets. Flower petals are then placed onto the dough, lightly pressed, and the sheets are cut with hwajeon-tong, a utensil similar to cookie cutter, with diameter. The flower cakes are fried in sesame oil. This method was used in Korean royal court cuisine.
Fried flower cakes are soaked in honey to add sweetness and sprinkled with cinnamon powder.
Hwajeon nori Hwajeon nori, which literally translates to "flower cake play", is a tradition of going on a picnic in the mountains to watch the seasonal flowers during spring and autumn.
In spring, women used to go on a picnic, carrying a glutinous rice flour and griddle near a stream on Samjinnal which falls on every third day of the third lunar month in the Korean calendar. They picked edible spring blossoms and made hwajeon. The variety made with rhododendron is regarded as the most representative hwajeon. It is traditionally eaten with rhododendron punch consisting of the same flower floating in honeyed or magnolia berry water.
Similarly, people enjoyed hwajeon nori in autumn, with hwajeon which is made with chrysanthemum flowers and leaves. It was consumed with chrysanthemum wine or yuja punch. The custom is closely related to the Junggu, the traditional holiday falls on every ninth day of the ninth lunar month in the Korean calendar.
These customs date back to the Three Kingdoms era (57 BCE ‒ 668 AD) and originated in Silla.
See also
Hwachae''
References
Flower dishes
Korean pancakes
Tteok |
Valiante is a surname. Notable people with the surname include:
Joseph Valiante, known as Joe Val, (1926–1985), American bluegrass musician and singer
Mario Valiante (1925–2018), Italian politician
Michael Valiante (born 1979), Canadian racing driver |
A gang patch in New Zealand refers to the identifying insignia of a street gang. Patches have been linked to intimidation of members of the public by gang members. Gang patches perform much the same identification role as gang colours do in other countries.
Each of the country's gangs has its own forms of insignia, of which the most prominent is often a large symbol, frequently worn by members on their clothing as a symbol of their gang membership. The patch is often seen as being as important to gang members as a military flag is to members of an army group, and any insult to the patch is taken as being an insult to the gang as a whole.
As such, the term has a more general meaning. Being a "patched" member of a gang is to be a fully initiated member of the gang - and often a ranking member of the gang's structure. The physical patches are highly valued and have been used with some success in negotiations.
Legality
Wanganui District Council legislation
The explanatory notes to the "Wanganui District Council (Prohibition of Gang Insignia) Bill", a local bill introduced into the New Zealand Parliament by then Whanganui MP Chester Borrows, records that the Wanganui District Council already had an informal policy that prohibited wearing or displaying gang insignia in public buildings. However, as result of attacks on police and the 5 May 2007 murder of two-year old Jhia Te Tua during a drive-by gang shooting, the council sought the legal power to make bylaws that prohibited wearing gang insignia in designated spaces. The bill received Royal Assent on 9 May 2009 and came into force the next day as the Wanganui District Council (Prohibition of Gang Insignia) Act 2009.
Wanganui District Council then passed bylaws banning the wearing of gang insignia, or patches and similar symbols, within parts of their jurisdiction. The ban was tested by judicial review in a hearing before Clifford J in November 2010. The judge reserved his decision.
Government premises
On 28 June 2012, Rotorua MP Todd McClay, introduced the "Prohibition of Gang Insignia in Government Premises Bill" into the New Zealand Parliament. The stated aim of the bill was to "provide an environment free from gang intimidation" in all Government premises, including schools, hospitals and local authority premises, as well as those of central government. The bill, which had very similar provisions to the Wanganui District Council legislation, received Royal assent on 12 August 2013 and became law as the Prohibition of Gang Insignia in Government Premises Act 2013.
See also
Gang colours
Colours (motorcycling)
Gangs in New Zealand
References
External links
Motorcycling subculture
New Zealand culture
Patch
Gangs in New Zealand
New Zealand slang |
In Japanese religion, Yahata (八幡神, ancient Shinto pronunciation) formerly in Shinto and later commonly known as Hachiman (八幡神, Japanese Buddhist pronunciation) is the syncretic divinity of archery and war, incorporating elements from both Shinto and Buddhism.
In Shinto religion, he is mortally Emperor Ōjin (応神天皇, Ōjin Tennō) by birth who reigned in the 3rd–4th century and the son of Empress Jingū (神功皇后, Jingū-kōgō), later became deified and identified by legend as "Yahata-no-kami" meaning "Kami of Eight Banners", referring to the eight heavenly banners that signaled the birth of the divine and deified emperor, and is also called Hondawake (誉田別命). His messenger is the dove, symbolizes both the bow and arrow found in samurai banners associated to him where he is called "Yumiya Hachiman" (弓矢八幡).
Since ancient times Hachiman has been worshiped by farmers as the god of agriculture and by fishermen, who hoped that he would fill their nets with many fish.
During the age of the samurai, descendants of both samurai clans, Seiwa Genji (清和源氏 Seiwa Gen-ji, a line of the Minamoto clan descended from Emperor Seiwa) and Kanmu Taira (桓武平氏 Kanmu Taira'u-ji/ Hei-shi/ Hei-ji, a line of the Taira clan descended from Emperor Kanmu) honored Hachiman, from which the tradition is derived nationwide in which samurai clans (武家 "buke" in Japanese) honor Hachiman as the deity sacred to them. His other roles include determining a samurai's fate—i.e., whether they are a success or failure in battle; controlling and protecting the martial arts; and proclaiming the victory of an army.
Although often called the god of war, he is more strictly defined as the tutelary god of warriors. He is also the divine protector of Japan, the Japanese people and the Imperial House.
Summary of Hachiman
In the present form of Shinto, Hachiman is the divine spirit of Emperor Ōjin. Emperor Kinmei (欽明天皇, Kinmei-tennō) in his Regnal Year 32 (571 AD) decreed that the deified Emperor Ōjin was revealed for the first time in the land of Usa (宇佐の地)—the present-day city of Usa, in Oita Prefecture—where he became the patron deity of this city, along with a lesser Shinto female deity called Himegami (比売神) and the Emperor's mother, Empress Jingū. This trio, known as Hachiman Mikami (八幡三神) is enshrined there.
Amongst the Hachiman Mikami, there are many shrines that enshrines other figures apart from the trio, like Emperor Chūai (仲哀天皇, Chūai-tennō) instead of Empress Jingū, the legendary hero and Shinto deity Takenouchi no Sukune or Takeshiuchi no Sukune (武内宿禰) and the female deity Tamayori-hime (玉依毘売命 or 玉依姫尊), where there is a dedicated prayer for safe childbirth in the Shinto shrine of Umi Hachimangū (宇美八幡宮) in Umi, Fukuoka prefecture.
Himegami
The three Munakata goddesses (宗像三女神 Munakata Sanjoshin) born from the divination ritual Ukehi or Ukei (宇気比, 誓約, 祈, 誓, 誓占, lit. "pledge divination") between the goddess Amaterasu and the god Susanoo - that is Tagitsu-hime (多岐津姫命), Ichikishima-hime (市杵嶋姫命) and Tagairi-hime (多紀理姫命) - is said where they descended from the heavens as the "Three Pillars of Usanoshima (宇佐嶋) of the ancient province of Tsukushi (筑紫)", located in a temple complex on Mt. Omotosan (御許山) in Usa.
The Munakata goddesses are thereby the matriarchs of an ancient tribe and clan Munakata-shi (宗像氏, 宗形氏) which fishermen worshipped collectively as a whole. It is thought that the worship of Munakata goddesses by the Munakata clan was due to Empress Jingū's success in the "Conquest of the Three Kingdoms (of Korea)" (三韓征伐 Sankan Seipatsu). Therefore, they are old Shinto folk deities (地主神 jinushigami) before the presence of Hachiman.
Himegami (比売神) is thought to be the consort or aunt of Hachiman, whereas Tamayori-hime (玉依毘売命 or 玉依姫尊) possibly and perhaps as the mother viewed by opinion aforementioned. Since the description of Hachiman as the Emperor Ojin appeared in the "Digest Record of Todai-ji Temple (東大寺要録 Tōdai-ji Yoroku)" and "Records of the Age of the Gods from the Sumiyoshi Grand Shrine (住吉大社神代記 Sumiyoshi-Taisha Jindaiki), the practice of merging Emperor Ōjin into Hachiman is estimated to have begun in the Nara Period or the Heian Period.
There are also different theories and opinions concerning the goddesses Amaterasu and Kukuri-hime (菊理媛神 or 菊理媛命, a Shinto goddess venerated as Shirayama-hime (白山比咩), in which both called the goddess Himegami Himiko (卑弥呼, or Pimiko, also known as Shin-gi Wa-ō (親魏倭王, "Ruler of Wa, Friend of Wei"), a shamaness-queen of Yamatai-koku in Wakoku (倭国) around c. 170–248 AD.
Empress Jingū
Emperor Ojin was already destined to ascend the throne from the moment in the womb of his mother and Empress, is called "Emperor in the Womb", is based and interpreted sometimes in her belief as being the "mother deity" to the child-to-be who would be deified. The Three Munakata Goddesses, the Three Sumiyoshi Gods (住吉三神 Sumiyoshi Sanjin) and the goddess Amaterasu who were revered by the tribal clan Munakata-shi due to their aid in the "Conquest of the Three Kingdoms (of Korea)" is also worshiped in various places. It is said by tradition in commemoration after the conquest, Empress Jingu set up eight big military flags on Tsushima (対馬) which then became the origin of the name "Hirohatano Yahata Ōkami (広幡乃八幡大神)", also the origin of the name "Yahata (八幡)" to the Empress' son, the then-emperor Ojin.
Imperial Ancestor and Deity to the Imperial Family
Since Hachiman was considered to be a divine spirit of the Emperor Ojin, he was placed as both the ancestor and Kōso-shin (皇祖神, "Imperial Ancestor Deity") of the Imperial Family of Japan. He was considered to be the guardian deity of the Imperial Household after the Grand Goddess Amaterasu written down in the "Chronicle of the Jōkyū Era" (承久記 Jōkyūki) to the "Compilation of the Grand Goddess Amaterasu of Ise and Hachiman Daibosatsu on the Imperial Throne of Japan".
The founding of Konda Hachiman-gū (誉田八幡宮) Shrine at Habikino in Osaka Prefecture have been a long time linked with the connection to Emperor Ojin, therefore the Imperial Family also both revered the Usa Shrine (宇佐神宮 Usa Jingū, also known as 宇佐八幡宮 Usa Hachiman-gū) at Usa in Oita Prefecture, and the Iwashimizu Hachiman Shrine (石清水八幡宮 Iwashimizu Hachiman-gū) at Yawata in Kyoto Prefecture, as the second ancestral shrine after the dominant Ise Grand Shrine (伊勢神宮 Ise Jingū).
Syncretism of Hachiman in between Shinto and Buddhism
After the arrival of Buddhism in Japan, Hachiman became a syncretistic deity, fusing elements of the native kami worship with Buddhism (shinbutsu-shūgō). In the 8th century AD, he joined the Buddhist pantheon as where his jinja (神社 - Shinto shrines) and jingu (神宮 - Shinto shrine of the Imperial family) were incorporated to shrines in Buddhist temples (寺 tera).
This transition happened when the Great Buddha of Tōdai-ji (東大寺, Eastern Great Temple) was being built and recorded in the era of the "First Year of Tenpyō-shōhō (天平勝宝 "Heavenly Peace and Victorious Treasure")" under the reign of Empress Kōken in 749 AD, an oracle was declared by Hachiman to a senior Shinto priest (禰宜 negi) and nun from Usa Shrine to proceed to the capital (in Nara) that Hachiman would cooperate in the construction of a "Great Buddha" dedicated to him. From this recognition Hachiman was syncretised into Buddhism from early on.
Then in the "First Year of the Era of Ten'ō (天応)" under the reign of Emperor Kōnin in 781 AD, the Shinto imperial court granted the Shinto deity Usa Hachiman (Hachiman of Usa) with Buddhist deity Hachiman Daibosatsu as the guardian god for the spiritual protection of the state. As a result, the spread of worship to Hachiman is transferred and received to Buddhist temples or shrines throughout the country where the "theory of Shinto and Buddhist syncretism (本地垂迹 Honji Suijaku)" is established, therefore considered Amitabha to be the Buddha manifestation of Hachiman. However, the Japanese Buddhist priest Nichiren (日蓮) of the Kamakura Period says he denies the theory and assumes the true form of Hachiman Daibosatsu is Shakyamuni Buddha (i.e. Gautama Buddha).
Thereafter in the Heian Period, veneration of Shinto shrines of Hachiman have been received and gathered throughout the nation by the samurai clans Seiwa of the Genji clan (清和源氏) and Kanmu of the Taira clan (桓武平氏). When the theory of syncretism has spread during this period, Hachiman is depicted to represent a Buddhist monk and is then called Sogyō Hachiman (僧形八幡神, "Buddhist Priest-Form Hachiman").
Worship of Hachiman by the Samurai
Because Emperor Ōjin was an ancestor of the Minamoto warrior clan, Hachiman became its . Minamoto no Yoshiie, upon coming of age at Iwashimizu Shrine in Kyoto, took the name Hachiman Taro Yoshiie, and, through his military prowess and virtue as a leader, came to be regarded and respected as the ideal samurai through the ages. After Minamoto no Yoritomo became shōgun and established the Kamakura shogunate, Hachiman's popularity grew and he became by extension the protector of the warrior class that the shōgun had brought to power. For this reason, the shintai of a Hachiman shrine is usually a stirrup or a bow.
Following the establishment of the Kamakura shogunate, the worship of Hachiman spread throughout Japan among not only samurai, but also the peasantry. There are now about 2,500 Shinto shrines dedicated to Hachiman, who has more shrines dedicated to him than any other deity except Inari. Usa Shrine in Usa, Ōita Prefecture is head shrine of all these shrines; other important Hachiman shrines are Iwashimizu Hachiman-gū, Hakozaki-gū and Tsurugaoka Hachiman-gū.
Hachiman's mon (emblem) is a mitsudomoe, a round whirlpool or vortex with three heads swirling right or left. Many samurai clans used this mon as their own, including some that traced their ancestry back to the mortal enemy of the Minamoto, the Emperor Kanmu of the Taira clan (, Kanmu Heishi).
See also
Hachiman shrine
Kamikaze (typhoon)
Minamoto no Yorinobu
Minamoto no Yoriyoshi
Bishamon -- Shinto-Buddhist God of War
Hitogami
References
Further reading
"Hachiman" – Ancient History Encyclopedia
External links
Japanese gods
Oracular deities
Shinbutsu shūgō
Shinto kami
War gods
Agricultural gods
Mythological archers |
Google Fast Flip was an online news aggregator from Google Inc. that mimicked the experience of flicking through a newspaper or magazine, allowing visual search of stories in manner similar to microfiche. It was launched in beta by Google Labs at the TechCrunch 50 conference in September 2009.
The site presented images of stories from Google's news partners, which could be clicked on to navigate to the story on the news provider's own website. Stories could be scrolled between using the mouse or cursor keys. The presentation of stories used a similar algorithm to Google News, but stories could be ordered by publication as well as by subject. Krishna Bharat of Google News has said that "Fast Flip is mostly for longer shelf-life content, the kind of content you want to recommend to other people." Fast Flip was created after Larry Page "asked why the web was not more like a magazine, allowing users to flip from screen to screen seamlessly." Fast Flip was available as well on iPhone and Android mobile devices.
Users of Fast Flip were able to follow friends and topics, find new content, and to create their own customized magazines around their searches.
At launch, there were 39 mainly US-based news partners. Google said that it would share the majority of revenue from contextual adverts with its news partners.
Fast Flip was praised for allowing visual, fast and serendipitous browsing of news stories, but it has been criticized as being a novelty, anachronistic, as it emulates print media, limits navigation and presents few news sources, and as being more focused on the needs of publishers than of readers. Its visual search has been compared to the beta visual search of Microsoft Bing and to The Onion's microfiche iPhone app. Fast Flip has also been cited as a demonstration of Google's power in the news marketplace; by setting up another news interface that uses publishers' content without returning much value.
In September 2011, Google announced it would discontinue a number of its products, including Google Fast Flip.
See also
List of Google services and tools
Google Currents
References
American news websites
Android (operating system) software
Fast Flip
Fast Flip
Internet properties disestablished in 2011
Internet properties established in 2009
News aggregators |
```objective-c
/*
**
** Permission is hereby granted, free of charge, to any person obtaining a copy
** of this software and/or associated documentation files (the "Materials"),
** to deal in the Materials without restriction, including without limitation
** the rights to use, copy, modify, merge, publish, distribute, sublicense,
** and/or sell copies of the Materials, and to permit persons to whom the
** Materials are furnished to do so, subject to the following conditions:
**
** The above copyright notice and this permission notice shall be included in
** all copies or substantial portions of the Materials.
**
** MODIFICATIONS TO THIS FILE MAY MEAN IT NO LONGER ACCURATELY REFLECTS KHRONOS
** STANDARDS. THE UNMODIFIED, NORMATIVE VERSIONS OF KHRONOS SPECIFICATIONS AND
** HEADER INFORMATION ARE LOCATED AT path_to_url
**
** THE MATERIALS ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
** OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
** FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
** THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
** LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
** FROM,OUT OF OR IN CONNECTION WITH THE MATERIALS OR THE USE OR OTHER DEALINGS
** IN THE MATERIALS.
*/
#ifndef OPENCLstd_H
#define OPENCLstd_H
#ifdef __cplusplus
namespace OpenCLLIB {
enum Entrypoints {
// Section 2.1: Math extended instructions
Acos = 0,
Acosh = 1,
Acospi = 2,
Asin = 3,
Asinh = 4,
Asinpi = 5,
Atan = 6,
Atan2 = 7,
Atanh = 8,
Atanpi = 9,
Atan2pi = 10,
Cbrt = 11,
Ceil = 12,
Copysign = 13,
Cos = 14,
Cosh = 15,
Cospi = 16,
Erfc = 17,
Erf = 18,
Exp = 19,
Exp2 = 20,
Exp10 = 21,
Expm1 = 22,
Fabs = 23,
Fdim = 24,
Floor = 25,
Fma = 26,
Fmax = 27,
Fmin = 28,
Fmod = 29,
Fract = 30,
Frexp = 31,
Hypot = 32,
Ilogb = 33,
Ldexp = 34,
Lgamma = 35,
Lgamma_r = 36,
Log = 37,
Log2 = 38,
Log10 = 39,
Log1p = 40,
Logb = 41,
Mad = 42,
Maxmag = 43,
Minmag = 44,
Modf = 45,
Nan = 46,
Nextafter = 47,
Pow = 48,
Pown = 49,
Powr = 50,
Remainder = 51,
Remquo = 52,
Rint = 53,
Rootn = 54,
Round = 55,
Rsqrt = 56,
Sin = 57,
Sincos = 58,
Sinh = 59,
Sinpi = 60,
Sqrt = 61,
Tan = 62,
Tanh = 63,
Tanpi = 64,
Tgamma = 65,
Trunc = 66,
Half_cos = 67,
Half_divide = 68,
Half_exp = 69,
Half_exp2 = 70,
Half_exp10 = 71,
Half_log = 72,
Half_log2 = 73,
Half_log10 = 74,
Half_powr = 75,
Half_recip = 76,
Half_rsqrt = 77,
Half_sin = 78,
Half_sqrt = 79,
Half_tan = 80,
Native_cos = 81,
Native_divide = 82,
Native_exp = 83,
Native_exp2 = 84,
Native_exp10 = 85,
Native_log = 86,
Native_log2 = 87,
Native_log10 = 88,
Native_powr = 89,
Native_recip = 90,
Native_rsqrt = 91,
Native_sin = 92,
Native_sqrt = 93,
Native_tan = 94,
// Section 2.2: Integer instructions
SAbs = 141,
SAbs_diff = 142,
SAdd_sat = 143,
UAdd_sat = 144,
SHadd = 145,
UHadd = 146,
SRhadd = 147,
URhadd = 148,
SClamp = 149,
UClamp = 150,
Clz = 151,
Ctz = 152,
SMad_hi = 153,
UMad_sat = 154,
SMad_sat = 155,
SMax = 156,
UMax = 157,
SMin = 158,
UMin = 159,
SMul_hi = 160,
Rotate = 161,
SSub_sat = 162,
USub_sat = 163,
U_Upsample = 164,
S_Upsample = 165,
Popcount = 166,
SMad24 = 167,
UMad24 = 168,
SMul24 = 169,
UMul24 = 170,
UAbs = 201,
UAbs_diff = 202,
UMul_hi = 203,
UMad_hi = 204,
// Section 2.3: Common instructions
FClamp = 95,
Degrees = 96,
FMax_common = 97,
FMin_common = 98,
Mix = 99,
Radians = 100,
Step = 101,
Smoothstep = 102,
Sign = 103,
// Section 2.4: Geometric instructions
Cross = 104,
Distance = 105,
Length = 106,
Normalize = 107,
Fast_distance = 108,
Fast_length = 109,
Fast_normalize = 110,
// Section 2.5: Relational instructions
Bitselect = 186,
Select = 187,
// Section 2.6: Vector Data Load and Store instructions
Vloadn = 171,
Vstoren = 172,
Vload_half = 173,
Vload_halfn = 174,
Vstore_half = 175,
Vstore_half_r = 176,
Vstore_halfn = 177,
Vstore_halfn_r = 178,
Vloada_halfn = 179,
Vstorea_halfn = 180,
Vstorea_halfn_r = 181,
// Section 2.7: Miscellaneous Vector instructions
Shuffle = 182,
Shuffle2 = 183,
// Section 2.8: Misc instructions
Printf = 184,
Prefetch = 185,
};
} // end namespace OpenCLLIB
#else
enum OpenCLstd_Entrypoints {
// Section 2.1: Math extended instructions
OpenCLstd_Acos = 0,
OpenCLstd_Acosh = 1,
OpenCLstd_Acospi = 2,
OpenCLstd_Asin = 3,
OpenCLstd_Asinh = 4,
OpenCLstd_Asinpi = 5,
OpenCLstd_Atan = 6,
OpenCLstd_Atan2 = 7,
OpenCLstd_Atanh = 8,
OpenCLstd_Atanpi = 9,
OpenCLstd_Atan2pi = 10,
OpenCLstd_Cbrt = 11,
OpenCLstd_Ceil = 12,
OpenCLstd_Copysign = 13,
OpenCLstd_Cos = 14,
OpenCLstd_Cosh = 15,
OpenCLstd_Cospi = 16,
OpenCLstd_Erfc = 17,
OpenCLstd_Erf = 18,
OpenCLstd_Exp = 19,
OpenCLstd_Exp2 = 20,
OpenCLstd_Exp10 = 21,
OpenCLstd_Expm1 = 22,
OpenCLstd_Fabs = 23,
OpenCLstd_Fdim = 24,
OpenCLstd_Floor = 25,
OpenCLstd_Fma = 26,
OpenCLstd_Fmax = 27,
OpenCLstd_Fmin = 28,
OpenCLstd_Fmod = 29,
OpenCLstd_Fract = 30,
OpenCLstd_Frexp = 31,
OpenCLstd_Hypot = 32,
OpenCLstd_Ilogb = 33,
OpenCLstd_Ldexp = 34,
OpenCLstd_Lgamma = 35,
OpenCLstd_Lgamma_r = 36,
OpenCLstd_Log = 37,
OpenCLstd_Log2 = 38,
OpenCLstd_Log10 = 39,
OpenCLstd_Log1p = 40,
OpenCLstd_Logb = 41,
OpenCLstd_Mad = 42,
OpenCLstd_Maxmag = 43,
OpenCLstd_Minmag = 44,
OpenCLstd_Modf = 45,
OpenCLstd_Nan = 46,
OpenCLstd_Nextafter = 47,
OpenCLstd_Pow = 48,
OpenCLstd_Pown = 49,
OpenCLstd_Powr = 50,
OpenCLstd_Remainder = 51,
OpenCLstd_Remquo = 52,
OpenCLstd_Rint = 53,
OpenCLstd_Rootn = 54,
OpenCLstd_Round = 55,
OpenCLstd_Rsqrt = 56,
OpenCLstd_Sin = 57,
OpenCLstd_Sincos = 58,
OpenCLstd_Sinh = 59,
OpenCLstd_Sinpi = 60,
OpenCLstd_Sqrt = 61,
OpenCLstd_Tan = 62,
OpenCLstd_Tanh = 63,
OpenCLstd_Tanpi = 64,
OpenCLstd_Tgamma = 65,
OpenCLstd_Trunc = 66,
OpenCLstd_Half_cos = 67,
OpenCLstd_Half_divide = 68,
OpenCLstd_Half_exp = 69,
OpenCLstd_Half_exp2 = 70,
OpenCLstd_Half_exp10 = 71,
OpenCLstd_Half_log = 72,
OpenCLstd_Half_log2 = 73,
OpenCLstd_Half_log10 = 74,
OpenCLstd_Half_powr = 75,
OpenCLstd_Half_recip = 76,
OpenCLstd_Half_rsqrt = 77,
OpenCLstd_Half_sin = 78,
OpenCLstd_Half_sqrt = 79,
OpenCLstd_Half_tan = 80,
OpenCLstd_Native_cos = 81,
OpenCLstd_Native_divide = 82,
OpenCLstd_Native_exp = 83,
OpenCLstd_Native_exp2 = 84,
OpenCLstd_Native_exp10 = 85,
OpenCLstd_Native_log = 86,
OpenCLstd_Native_log2 = 87,
OpenCLstd_Native_log10 = 88,
OpenCLstd_Native_powr = 89,
OpenCLstd_Native_recip = 90,
OpenCLstd_Native_rsqrt = 91,
OpenCLstd_Native_sin = 92,
OpenCLstd_Native_sqrt = 93,
OpenCLstd_Native_tan = 94,
// Section 2.2: Integer instructions
OpenCLstd_SAbs = 141,
OpenCLstd_SAbs_diff = 142,
OpenCLstd_SAdd_sat = 143,
OpenCLstd_UAdd_sat = 144,
OpenCLstd_SHadd = 145,
OpenCLstd_UHadd = 146,
OpenCLstd_SRhadd = 147,
OpenCLstd_URhadd = 148,
OpenCLstd_SClamp = 149,
OpenCLstd_UClamp = 150,
OpenCLstd_Clz = 151,
OpenCLstd_Ctz = 152,
OpenCLstd_SMad_hi = 153,
OpenCLstd_UMad_sat = 154,
OpenCLstd_SMad_sat = 155,
OpenCLstd_SMax = 156,
OpenCLstd_UMax = 157,
OpenCLstd_SMin = 158,
OpenCLstd_UMin = 159,
OpenCLstd_SMul_hi = 160,
OpenCLstd_Rotate = 161,
OpenCLstd_SSub_sat = 162,
OpenCLstd_USub_sat = 163,
OpenCLstd_U_Upsample = 164,
OpenCLstd_S_Upsample = 165,
OpenCLstd_Popcount = 166,
OpenCLstd_SMad24 = 167,
OpenCLstd_UMad24 = 168,
OpenCLstd_SMul24 = 169,
OpenCLstd_UMul24 = 170,
OpenCLstd_UAbs = 201,
OpenCLstd_UAbs_diff = 202,
OpenCLstd_UMul_hi = 203,
OpenCLstd_UMad_hi = 204,
// Section 2.3: Common instructions
OpenCLstd_FClamp = 95,
OpenCLstd_Degrees = 96,
OpenCLstd_FMax_common = 97,
OpenCLstd_FMin_common = 98,
OpenCLstd_Mix = 99,
OpenCLstd_Radians = 100,
OpenCLstd_Step = 101,
OpenCLstd_Smoothstep = 102,
OpenCLstd_Sign = 103,
// Section 2.4: Geometric instructions
OpenCLstd_Cross = 104,
OpenCLstd_Distance = 105,
OpenCLstd_Length = 106,
OpenCLstd_Normalize = 107,
OpenCLstd_Fast_distance = 108,
OpenCLstd_Fast_length = 109,
OpenCLstd_Fast_normalize = 110,
// Section 2.5: Relational instructions
OpenCLstd_Bitselect = 186,
OpenCLstd_Select = 187,
// Section 2.6: Vector Data Load and Store instructions
OpenCLstd_Vloadn = 171,
OpenCLstd_Vstoren = 172,
OpenCLstd_Vload_half = 173,
OpenCLstd_Vload_halfn = 174,
OpenCLstd_Vstore_half = 175,
OpenCLstd_Vstore_half_r = 176,
OpenCLstd_Vstore_halfn = 177,
OpenCLstd_Vstore_halfn_r = 178,
OpenCLstd_Vloada_halfn = 179,
OpenCLstd_Vstorea_halfn = 180,
OpenCLstd_Vstorea_halfn_r = 181,
// Section 2.7: Miscellaneous Vector instructions
OpenCLstd_Shuffle = 182,
OpenCLstd_Shuffle2 = 183,
// Section 2.8: Misc instructions
OpenCLstd_Printf = 184,
OpenCLstd_Prefetch = 185,
};
#endif
#endif // #ifndef OPENCLstd_H
``` |
```java
package com.ctrip.xpipe.redis.checker;
import com.ctrip.xpipe.cluster.ClusterType;
/**
* @author lishanglin
* date 2021/3/17
*/
public class TestBeaconManager implements BeaconManager {
@Override
public void registerCluster(String clusterId, ClusterType clusterType, int orgId) {
}
}
``` |
A waste book was one of the books traditionally used in bookkeeping. It consisted of a daily diary of all transactions in chronological order. It differs from a daybook in that only a single waste book is kept, rather than a separate daybook for each of several categories. The waste book was intended for temporary use only; the information needed to be transcribed into a journal in order to begin to balance one's accounts. The name of the book derives from the fact that, once its information was transferred to the journal, the waste book was unneeded.
The use of the waste book has declined with the advent of double-entry accounting.
Waste books were also used in the tradition of the commonplace book and note-taking. A well known example is Isaac Newton's Waste Book in which he did much of the development of the calculus. Another example is that of Georg Christoph Lichtenberg, who called his waste books sudelbücher, and which were known to have influenced Leo Tolstoy, Albert Einstein, Andre Breton, Friedrich Nietzsche, and Ludwig Wittgenstein.
Merchants and traders have a waste book (Sudelbuch, Klitterbuch in German I believe) in which they enter daily everything they purchase and sell, messily, without order. From this, it is transferred to their journal, where everything appears more systematic, and finally to a ledger, in double entry after the Italian manner of bookkeeping, where one settles accounts with each man, once as debtor and then as creditor. This deserves to be imitated by scholars. First it should be entered in a book in which I record everything as I see it or as it is given to me in my thoughts; then it may be entered in another book in which the material is more separated and ordered, and the ledger might then contain, in an ordered expression, the connection sand explanations of the material that flow from it. [46]
—Georg Christoph Lichtenberg, Waste Book E, #46, 1775–1776
In a general sense Cicero contrasted the short-lived memoranda of the merchant with the more carefully kept account book designed as a permanent record.
Francis Bacon compared one of his notebooks to a merchant’s waste book.
Francesco Sacchini recommended the use of two notebooks: “Not unlike attentive merchants... [who] keep two books, one small, the other large: the first you would call adversaria or a daybook (ephemerides), the second an account book (calendarium) and ledger (codex).”
References
Accounting systems
Note-taking |
The 2017 Campeonato Paraibano de Futebol was the 107th edition of Paraíba's top professional football league. The competition began on 8 January and ended on 7 May. Botafogo-PB were champions, after defeating Treze in the final.
Format
The competition is divided into two stages.
In the first stage, the ten teams will play each other home and away, for a total of eighteen games.
In the final stage, the top four teams from the first stage will play a semi-final over two legs. The first ranked team will play the fourth ranked team and the second ranked team will play the third ranked team. The higher ranked team will play at home in the second leg in both cases. The winners of these ties will play the final over two legs.
Qualification
The two finalists qualified to participate in the 2018 Copa do Brasil and 2018 Copa do Nordeste. The two best placed teams (other than Botafogo-PB) qualified to participate in the 2018 Campeonato Brasileiro Série D.
Participating teams
First stage
Standings
Knockout stage
References
Paraíba
2017 |
Azi Paybarah is a New York-based journalist who focuses on local politics. He worked as a reporter for the New York Press, the Queens Tribune and the New York Sun. In February 2011, Paybarah returned to The New York Observer which he had left a few months earlier, where he wrote for the daily blog, The Politicker. In September 2011 he joined the online news publication Capital as senior writer. Paybarah also hosts a political blog on the website of the local NPR station, WNYC.
Career
At times Paybarah will inform political colleagues or rivals of a controversial statement another politician has made to provoke a reaction. An example of this was when he informed others of congressional candidate David Weprin's statements in an interview for Vosizneias, one of the largest Orthodox Jewish websites in the United States, regarding the marriage equality law which allows gay and lesbian marriages in New York State.
In May 2009, Paybarah made headlines for being called "a disgrace" by New York mayor Michael Bloomberg for asking about the mayor's rationale for running for a third term. Though later in his campaign, Bloomberg described Paybarah as "brilliant", according to The New York Times.
In September 2010, he was named one of City Hall's "40 under 40" for being a young influential member of New York City politics.
References
External links
WNYC Blog
The New York Sun Author archive.
New York's Boss Hog-Worthy Scam
The Quietest Campaign of All
New Rules For Smelly Pepsi Site
University at Albany, SUNY alumni
Year of birth missing (living people)
Living people
American bloggers
The New York Observer people
New York Press people
The New York Sun people
Place of birth missing (living people)
American people of Iranian descent
University of Michigan fellows |
Siavash Mirshams Shahshahani (Persian: سیاوش میرشمس شهشهانی) (born 1942) is an Iranian mathematician. He is a professor of mathematics and head of Mathematical Sciences Department at Sharif University of Technology. He headed up the IRNIC registry for the .ir ccTLD until his retirement from that position in late 2008. He has also served as a director of APTLD (the Asia Pacific Top Level Domain Association) between 2007 and his retirement from that position in February 2009.
Education
Shahshahani completed his PhD under the supervision of Stephen Smale at the University of California at Berkeley in 1969. He has since devoted a substantial part of his career to mathematical education.
Books
External links
Siavash Shahshahani Homepage at Mathematics Department of Sharif University of Technology
Siavash Shahshahani at ICANNWiki
APTLD homepage
21st-century Iranian mathematicians
Academic staff of Sharif University of Technology
University of California, Berkeley alumni
1942 births
Living people
Iranian Science and Culture Hall of Fame recipients in Mathematics and Physics
20th-century Iranian mathematicians |
```yaml
version: "2"
services:
foo:
# create a pod
image: "foobar"
restart: "no"
environment:
GITHUB: surajssd
ports:
- "6379/tcp"
- "6379/udp"
- "3000"
- "3000-3005"
- "8000:8000"
- "9090-9091:8080-8081"
- "49100:22"
- "127.0.0.1:8001:8001"
- "127.0.0.1:5000-5010:5000-5010"
mem_limit: 10000
group_add:
- "1234"
redis:
image: redis:3.0
labels:
kompose.service.type: loadbalancer
ports:
- "6379/tcp"
- "1234:1235/udp"
mem_limit: 10000Mb
``` |
```python
# Polychromatic is licensed under the GPLv3.
"""
Module for determining where files are located.
"""
import os
import sys
class Paths():
"""
Reference file/folder paths for data files, configuration and cache directories.
"""
def __init__(self):
# System-wide data
self.data_dir = self.get_data_path()
# Local data
self.config = self.get_config_path()
self.cache = self.get_cache_path()
self.dev = self.set_dev_mode()
self.pid_dir = self.get_pid_path()
# Caches
self.assets_cache = os.path.join(self.cache, "assets")
self.effects_cache = os.path.join(self.cache, "effects")
self.webview_cache = os.path.join(self.cache, "editor")
# Save Data
self.devices = os.path.join(self.config, "devices")
self.dpi = os.path.join(self.config, "dpi")
self.effects = os.path.join(self.config, "effects")
self.presets = os.path.join(self.config, "presets")
self.custom_icons = os.path.join(self.config, "custom_icons")
self.states = os.path.join(self.config, "states")
# Files
self.preferences = os.path.join(self.config, "preferences.json")
self.colours = os.path.join(self.config, "colours.json")
# Legacy (<= v0.3.12)
self.old_profile_folder = os.path.join(self.config, "profiles")
self.old_profile_backups = os.path.join(self.config, "backups")
self.old_devicestate = os.path.join(self.config, "devicestate.json")
self.create_dirs_if_not_exist()
def create_dirs_if_not_exist(self):
"""
Ensure all the directories exist for the application.
"""
for folder in [self.config, self.presets, self.custom_icons, self.states, self.devices, self.effects,
self.cache, self.assets_cache, self.effects_cache, self.webview_cache, self.dpi]:
if not os.path.exists(folder):
os.makedirs(folder)
def set_dev_mode(self):
"""
When developing within the repository, change the paths accordingly.
"""
try:
if os.environ["POLYCHROMATIC_DEV_CFG"] == "true":
# __file__ = polychromatic/base.py
self.cache = os.path.realpath(os.path.join(os.path.dirname(__file__), "..", "savedatadev", "cache"))
self.config = os.path.realpath(os.path.join(os.path.dirname(__file__), "..", "savedatadev", "config"))
except KeyError:
return False
return True
@staticmethod
def get_data_path():
"""
For development/opt, this is normally adjacent to the application executable.
For system-wide installs, this is generally /usr/share/polychromatic.
"""
module_path = __file__
if os.path.exists(os.path.join(os.path.dirname(module_path), "../data/img/")):
return os.path.abspath(os.path.join(os.path.dirname(module_path), "../data/"))
for directory in ["/usr/local/share/polychromatic", "/usr/share/polychromatic"]:
if os.path.exists(directory):
return directory
print("Cannot locate data directory! Please reinstall the application.")
sys.exit(1)
@staticmethod
def get_config_path():
"""
Path for persistent save data for the application.
"""
try:
return os.path.join(os.environ["XDG_CONFIG_HOME"], "polychromatic")
except KeyError:
return os.path.join(os.path.expanduser("~"), ".config", "polychromatic")
@staticmethod
def get_cache_path():
"""
Path for temporary data to speed up processing later.
"""
try:
return os.path.join(os.environ["XDG_CACHE_HOME"], "polychromatic")
except KeyError:
return os.path.join(os.path.expanduser("~"), ".cache", "polychromatic")
@staticmethod
def get_pid_path():
"""
Runtime directory for PID text files that reference other Polychromatic processes.
"""
try:
return os.path.join(os.environ["XDG_RUNTIME_DIR"], "polychromatic")
except KeyError:
return "/tmp/polychromatic"
``` |
Pauline Hamilton Dederer (October 2, 1878 – August 20, 1960) was an American biologist. She taught at Barnard College and Connecticut College.
Early life and education
Pauline Hamilton Dederer was born in Hoboken, New Jersey, the daughter of Charles H. Dederer and Martha Martin Paul Dederer. Her mother owned a hotel in Sea Bright, New Jersey. She graduated from Barnard College in 1901, and earned a master's degree from Columbia University in 1907. In 1903 she did embryological research at Woods Hole Oceanographic Institution.
Career
Dederer taught at Barnard College and worked in the Zoological Laboratory at Columbia until 1917. In 1909 she spent a summer working at Harpswell Laboratory in Harpswell, Maine. After 1917, she served on the Board of Fellows at Connecticut College and was made a full professor of biology there in 1922.
In 1922, Dederer was a member of the Field Investigators Training Corps of the Eugenics Record Office. She made headlines for teaching an undergraduate course in genetics in 1930, which included eugenic advice about marriage and children. "Our girls go out from this course with critical knowledge of the salient facts, an interest in human genetics, and a realization of its importance in relation to psychological and social problems," she explained.
In 1921, she wrote "What is a College Education For?" for The Woman Citizen. She was president of the New London branch of the American Association of University Women.
Selected publications
"Spermatogenesis in Philosamia cynthia" (1907)
"Comparison of Caenolestes with Polyprotodonta and Diprotodonta" (1909)
"Pressure Experiments on the Egg of Cerebratulus lacteus" (1910)
"Oogenesis in Philosamia cynthia" (1915)
"The Behavior of Cells in Tissue Cultures of Fundulus heteroclitus with Special Reference to the Ectoderm" (1921)
"Variations in chromosome number in the spermatogenesis of Philosamia cynthia" (1928)
"Polyovular follicles in the cat" (1934)
"The production of giant spermatocytes in philosamia cynthia by means of x-rays" (1940)
Personal life
Dederer died in 1960, aged 81 years, in Red Bank, New Jersey.
References
1878 births
1960 deaths
American women scientists
American zoologists
Barnard College alumni
Barnard College faculty
Connecticut College faculty
American eugenicists
People from Hoboken, New Jersey |
"Sunshine Girl" is a song written by Geoff Stephens and John Carter and performed by Herman's Hermits. It reached #6 in Norway, #8 in the United Kingdom, #9 in New Zealand, #56 in Australia, #68 in Canada, and #101 in the United States in 1968.
The song was produced by Mickie Most.
Record World said that "it's sunny and melodic and infectious fun."
References
1968 songs
1968 singles
Songs written by Geoff Stephens
Songs written by John Carter (musician)
Herman's Hermits songs
Song recordings produced by Mickie Most
MGM Records singles |
```c
/*
* eepro100.c -- This file implements the eepro100 driver for etherboot.
*
*
* written by R.E.Wolff -- R.E.Wolff@BitWizard.nl
*
*
* AW Computer Systems is contributing to the free software community
* by paying for this driver and then putting the result under GPL.
*
* If you need a Linux device driver, please contact BitWizard for a
* quote.
*
*
* This program is free software; you can redistribute it and/or
* published by the Free Software Foundation; either version 2, or (at
* your option) any later version.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
*
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*
*
* date version by what
* Written: May 29 1997 V0.10 REW Initial revision.
* changes: May 31 1997 V0.90 REW Works!
* Jun 1 1997 V0.91 REW Cleanup
* Jun 2 1997 V0.92 REW Add some code documentation
* Jul 25 1997 V1.00 REW Tested by AW to work in a PROM
* Cleanup for publication
*
* This is the etherboot intel etherexpress Pro/100B driver.
*
* It was written from scratch, with Donald Beckers eepro100.c kernel
* driver as a guideline. Mostly the 82557 related definitions and the
* lower level routines have been cut-and-pasted into this source.
*
* The driver was finished before Intel got the NDA out of the closet.
* I still don't have the docs.
* */
/* Philosophy of this driver.
*
* Probing:
*
* Using the pci.c functions of the Etherboot code, the 82557 chip is detected.
* It is verified that the BIOS initialized everything properly and if
* something is missing it is done now.
*
*
* Initialization:
*
*
* The chip is then initialized to "know" its ethernet address, and to
* start recieving packets. The Linux driver has a whole transmit and
* recieve ring of buffers. This is neat if you need high performance:
* you can write the buffers asynchronously to the chip reading the
* buffers and transmitting them over the network. Performance is NOT
* an issue here. We can boot a 400k kernel in about two
* seconds. (Theory: 0.4 seconds). Booting a system is going to take
* about half a minute anyway, so getting 10 times closer to the
* theoretical limit is going to make a difference of a few percent.
*
*
* Transmitting and recieving.
*
* We have only one transmit descriptor. It has two buffer descriptors:
* one for the header, and the other for the data.
* We have only one receive buffer. The chip is told to recieve packets,
* and suspend itself once it got one. The recieve (poll) routine simply
* looks at the recieve buffer to see if there is already a packet there.
* if there is, the buffer is copied, and the reciever is restarted.
*
* Caveats:
*
* The etherboot framework moves the code to the 32k segment from
* 0x98000 to 0xa0000. There is just a little room between the end of
* this driver and the 0xa0000 address. If you compile in too many
* features, this will overflow.
* The number under "hex" in the output of size that scrolls by while
* compiling should be less than 8000. Maybe even the stack is up there,
* so that you need even more headroom.
*/
/* The etherboot authors seem to dislike the argument ordering in
* outb macros that Linux uses. I disklike the confusion that this
* has caused even more.... This file uses the Linux argument ordering. */
/* Sorry not us. It's inherted code from FreeBSD. [The authors] */
#include "etherboot.h"
#include "nic.h"
#include "pci.h"
#include "cards.h"
#include "timer.h"
#undef virt_to_bus
#define virt_to_bus(x) ((unsigned long)x)
static int ioaddr;
typedef unsigned char u8;
typedef signed char s8;
typedef unsigned short u16;
typedef signed short s16;
typedef unsigned int u32;
typedef signed int s32;
enum speedo_offsets {
SCBStatus = 0, SCBCmd = 2, /* Rx/Command Unit command and status. */
SCBPointer = 4, /* General purpose pointer. */
SCBPort = 8, /* Misc. commands and operands. */
SCBflash = 12, SCBeeprom = 14, /* EEPROM and flash memory control. */
SCBCtrlMDI = 16, /* MDI interface control. */
SCBEarlyRx = 20, /* Early receive byte count. */
};
static int do_eeprom_cmd(int cmd, int cmd_len);
void hd(void *where, int n);
/***********************************************************************/
/* I82557 related defines */
/***********************************************************************/
/* Serial EEPROM section.
A "bit" grungy, but we work our way through bit-by-bit :->. */
/* EEPROM_Ctrl bits. */
#define EE_SHIFT_CLK 0x01 /* EEPROM shift clock. */
#define EE_CS 0x02 /* EEPROM chip select. */
#define EE_DATA_WRITE 0x04 /* EEPROM chip data in. */
#define EE_DATA_READ 0x08 /* EEPROM chip data out. */
#define EE_WRITE_0 0x4802
#define EE_WRITE_1 0x4806
#define EE_ENB (0x4800 | EE_CS)
#define udelay(n) waiton_timer2(((n)*TICKS_PER_MS)/1000)
/* The EEPROM commands include the alway-set leading bit. */
#define EE_READ_CMD 6
/* The SCB accepts the following controls for the Tx and Rx units: */
#define CU_START 0x0010
#define CU_RESUME 0x0020
#define CU_STATSADDR 0x0040
#define CU_SHOWSTATS 0x0050 /* Dump statistics counters. */
#define CU_CMD_BASE 0x0060 /* Base address to add to add CU commands. */
#define CU_DUMPSTATS 0x0070 /* Dump then reset stats counters. */
#define RX_START 0x0001
#define RX_RESUME 0x0002
#define RX_ABORT 0x0004
#define RX_ADDR_LOAD 0x0006
#define RX_RESUMENR 0x0007
#define INT_MASK 0x0100
#define DRVR_INT 0x0200 /* Driver generated interrupt. */
enum phy_chips { NonSuchPhy=0, I82553AB, I82553C, I82503, DP83840, S80C240,
S80C24, PhyUndefined, DP83840A=10, };
/* Commands that can be put in a command list entry. */
enum commands {
CmdNOp = 0,
CmdIASetup = 1,
CmdConfigure = 2,
CmdMulticastList = 3,
CmdTx = 4,
CmdTDR = 5,
CmdDump = 6,
CmdDiagnose = 7,
/* And some extra flags: */
CmdSuspend = 0x4000, /* Suspend after completion. */
CmdIntr = 0x2000, /* Interrupt after completion. */
CmdTxFlex = 0x0008, /* Use "Flexible mode" for CmdTx command. */
};
/* How to wait for the command unit to accept a command.
Typically this takes 0 ticks. */
static inline void wait_for_cmd_done(int cmd_ioaddr)
{
short wait = 100;
do ;
while(inb(cmd_ioaddr) && --wait >= 0);
}
/* Elements of the dump_statistics block. This block must be lword aligned. */
static struct speedo_stats {
u32 tx_good_frames;
u32 tx_coll16_errs;
u32 tx_late_colls;
u32 tx_underruns;
u32 tx_lost_carrier;
u32 tx_deferred;
u32 tx_one_colls;
u32 tx_multi_colls;
u32 tx_total_colls;
u32 rx_good_frames;
u32 rx_crc_errs;
u32 rx_align_errs;
u32 rx_resource_errs;
u32 rx_overrun_errs;
u32 rx_colls_errs;
u32 rx_runt_errs;
u32 done_marker;
} lstats;
/* A speedo3 TX buffer descriptor with two buffers... */
static struct TxFD {
volatile s16 status;
s16 command;
u32 link; /* void * */
u32 tx_desc_addr; /* (almost) Always points to the tx_buf_addr element. */
s32 count; /* # of TBD (=2), Tx start thresh., etc. */
/* This constitutes two "TBD" entries: hdr and data */
u32 tx_buf_addr0; /* void *, header of frame to be transmitted. */
s32 tx_buf_size0; /* Length of Tx hdr. */
u32 tx_buf_addr1; /* void *, data to be transmitted. */
s32 tx_buf_size1; /* Length of Tx data. */
} txfd;
struct RxFD { /* Receive frame descriptor. */
volatile s16 status;
s16 command;
u32 link; /* struct RxFD * */
u32 rx_buf_addr; /* void * */
u16 count;
u16 size;
char packet[1518];
};
#ifdef USE_LOWMEM_BUFFER
#define rxfd ((struct RxFD *)(0x10000 - sizeof(struct RxFD)))
#define ACCESS(x) x->
#else
static struct RxFD rxfd;
#define ACCESS(x) x.
#endif
static int congenb = 0; /* Enable congestion control in the DP83840. */
static int txfifo = 8; /* Tx FIFO threshold in 4 byte units, 0-15 */
static int rxfifo = 8; /* Rx FIFO threshold, default 32 bytes. */
static int txdmacount = 0; /* Tx DMA burst length, 0-127, default 0. */
static int rxdmacount = 0; /* Rx DMA length, 0 means no preemption. */
/* I don't understand a byte in this structure. It was copied from the
* Linux kernel initialization for the eepro100. -- REW */
static struct ConfCmd {
s16 status;
s16 command;
u32 link;
unsigned char data[22];
} confcmd = {
0, CmdConfigure,
(u32) & txfd,
{22, 0x08, 0, 0, 0, 0x80, 0x32, 0x03, 1, /* 1=Use MII 0=Use AUI */
0, 0x2E, 0, 0x60, 0,
0xf2, 0x48, 0, 0x40, 0xf2, 0x80, /* 0x40=Force full-duplex */
0x3f, 0x05, }
};
/***********************************************************************/
/* Locally used functions */
/***********************************************************************/
/* Support function: mdio_write
*
* This probably writes to the "physical media interface chip".
* -- REW
*/
static int mdio_write(int phy_id, int location, int value)
{
int val, boguscnt = 64*4; /* <64 usec. to complete, typ 27 ticks */
outl(0x04000000 | (location<<16) | (phy_id<<21) | value,
ioaddr + SCBCtrlMDI);
do {
udelay(16);
val = inl(ioaddr + SCBCtrlMDI);
if (--boguscnt < 0) {
printf(" mdio_write() timed out with val = %X.\n", val);
}
} while (! (val & 0x10000000));
return val & 0xffff;
}
/* Support function: mdio_read
*
* This probably reads a register in the "physical media interface chip".
* -- REW
*/
static int mdio_read(int phy_id, int location)
{
int val, boguscnt = 64*4; /* <64 usec. to complete, typ 27 ticks */
outl(0x08000000 | (location<<16) | (phy_id<<21), ioaddr + SCBCtrlMDI);
do {
udelay(16);
val = inl(ioaddr + SCBCtrlMDI);
if (--boguscnt < 0) {
printf( " mdio_read() timed out with val = %X.\n", val);
}
} while (! (val & 0x10000000));
return val & 0xffff;
}
/* The fixes for the code were kindly provided by Dragan Stancevic
<visitor@valinux.com> to strictly follow Intel specifications of EEPROM
access timing.
The publicly available sheet 64486302 (sec. 3.1) specifies 1us access
interval for serial EEPROM. However, it looks like that there is an
additional requirement dictating larger udelay's in the code below.
2000/05/24 SAW */
static int do_eeprom_cmd(int cmd, int cmd_len)
{
unsigned retval = 0;
long ee_addr = ioaddr + SCBeeprom;
outw(EE_ENB, ee_addr); udelay(2);
outw(EE_ENB | EE_SHIFT_CLK, ee_addr); udelay(2);
/* Shift the command bits out. */
do {
short dataval = (cmd & (1 << cmd_len)) ? EE_WRITE_1 : EE_WRITE_0;
outw(dataval, ee_addr); udelay(2);
outw(dataval | EE_SHIFT_CLK, ee_addr); udelay(2);
retval = (retval << 1) | ((inw(ee_addr) & EE_DATA_READ) ? 1 : 0);
} while (--cmd_len >= 0);
outw(EE_ENB, ee_addr); udelay(2);
/* Terminate the EEPROM access. */
outw(EE_ENB & ~EE_CS, ee_addr);
return retval;
}
static inline void whereami (const char *str)
{
#if 0
printf ("%s\n", str);
sleep (2);
#endif
}
/* function: eepro100_reset
* resets the card. This is used to allow Etherboot to probe the card again
* from a "virginal" state....
* Arguments: none
*
* returns: void.
*/
static void eepro100_reset(struct nic *nic)
{
outl(0, ioaddr + SCBPort);
}
/* function: eepro100_transmit
* This transmits a packet.
*
* Arguments: char d[6]: destination ethernet address.
* unsigned short t: ethernet protocol type.
* unsigned short s: size of the data-part of the packet.
* char *p: the data for the packet.
* returns: void.
*/
static void eepro100_transmit(struct nic *nic, const char *d, unsigned int t, unsigned int s, const char *p)
{
struct eth_hdr {
unsigned char dst_addr[ETH_ALEN];
unsigned char src_addr[ETH_ALEN];
unsigned short type;
} hdr;
unsigned short status;
int to;
int s1, s2;
status = inw(ioaddr + SCBStatus);
/* Acknowledge all of the current interrupt sources ASAP. */
outw(status & 0xfc00, ioaddr + SCBStatus);
#ifdef DEBUG
printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n",
t, s, status, inw (ioaddr + SCBCmd));
#endif
memcpy (&hdr.dst_addr, d, ETH_ALEN);
memcpy (&hdr.src_addr, nic->node_addr, ETH_ALEN);
hdr.type = htons (t);
txfd.status = 0;
txfd.command = CmdSuspend | CmdTx | CmdTxFlex;
txfd.link = virt_to_bus (&txfd);
txfd.count = 0x02208000;
txfd.tx_desc_addr = (u32)&txfd.tx_buf_addr0;
txfd.tx_buf_addr0 = virt_to_bus (&hdr);
txfd.tx_buf_size0 = sizeof (hdr);
txfd.tx_buf_addr1 = virt_to_bus (p);
txfd.tx_buf_size1 = s;
#ifdef DEBUG
printf ("txfd: \n");
hd (&txfd, sizeof (txfd));
#endif
outl(virt_to_bus(&txfd), ioaddr + SCBPointer);
outw(INT_MASK | CU_START, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
s1 = inw (ioaddr + SCBStatus);
load_timer2(10*TICKS_PER_MS); /* timeout 10 ms for transmit */
while (!txfd.status && timer2_running())
/* Wait */;
s2 = inw (ioaddr + SCBStatus);
#ifdef DEBUG
printf ("s1 = %hX, s2 = %hX.\n", s1, s2);
#endif
}
/* function: eepro100_poll / eth_poll
* This recieves a packet from the network.
*
* Arguments: none
*
* returns: 1 if a packet was recieved.
* 0 if no pacet was recieved.
* side effects:
* returns the packet in the array nic->packet.
* returns the length of the packet in nic->packetlen.
*/
static int eepro100_poll(struct nic *nic)
{
if (!ACCESS(rxfd)status)
return 0;
/* Ok. We got a packet. Now restart the reciever.... */
ACCESS(rxfd)status = 0;
ACCESS(rxfd)command = 0xc000;
outl(virt_to_bus(&(ACCESS(rxfd)status)), ioaddr + SCBPointer);
outw(INT_MASK | RX_START, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
#ifdef DEBUG
printf ("Got a packet: Len = %d.\n", ACCESS(rxfd)count & 0x3fff);
#endif
nic->packetlen = ACCESS(rxfd)count & 0x3fff;
memcpy (nic->packet, ACCESS(rxfd)packet, nic->packetlen);
#ifdef DEBUG
hd (nic->packet, 0x30);
#endif
return 1;
}
static void eepro100_disable(struct nic *nic)
{
/* See if this PartialReset solves the problem with interfering with
kernel operation after Etherboot hands over. - Ken 20001102 */
outl(2, ioaddr + SCBPort);
}
/* exported function: eepro100_probe / eth_probe
* initializes a card
*
* side effects:
* leaves the ioaddress of the 82557 chip in the variable ioaddr.
* leaves the 82557 initialized, and ready to recieve packets.
*/
struct nic *eepro100_probe(struct nic *nic, unsigned short *probeaddrs, struct pci_device *p)
{
unsigned short sum = 0;
int i;
int read_cmd, ee_size;
unsigned short value;
int options;
int promisc;
/* we cache only the first few words of the EEPROM data
be careful not to access beyond this array */
unsigned short eeprom[16];
if (probeaddrs == 0 || probeaddrs[0] == 0)
return 0;
ioaddr = probeaddrs[0] & ~3; /* Mask the bit that says "this is an io addr" */
adjust_pci_device(p);
if ((do_eeprom_cmd(EE_READ_CMD << 24, 27) & 0xffe0000)
== 0xffe0000) {
ee_size = 0x100;
read_cmd = EE_READ_CMD << 24;
} else {
ee_size = 0x40;
read_cmd = EE_READ_CMD << 22;
}
for (i = 0, sum = 0; i < ee_size; i++) {
unsigned short value = do_eeprom_cmd(read_cmd | (i << 16), 27);
if (i < (int)(sizeof(eeprom)/sizeof(eeprom[0])))
eeprom[i] = value;
sum += value;
}
for (i=0;i<ETH_ALEN;i++) {
nic->node_addr[i] = (eeprom[i/2] >> (8*(i&1))) & 0xff;
}
printf ("Ethernet addr: %!\n", nic->node_addr);
if (sum != 0xBABA)
printf("eepro100: Invalid EEPROM checksum %#hX, "
"check settings before activating this device!\n", sum);
outl(0, ioaddr + SCBPort);
udelay (10000);
whereami ("Got eeprom.");
outl(virt_to_bus(&lstats), ioaddr + SCBPointer);
outw(INT_MASK | CU_STATSADDR, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
whereami ("set stats addr.");
/* INIT RX stuff. */
/* Base = 0 */
outl(0, ioaddr + SCBPointer);
outw(INT_MASK | RX_ADDR_LOAD, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
whereami ("set rx base addr.");
ACCESS(rxfd)status = 0x0001;
ACCESS(rxfd)command = 0x0000;
ACCESS(rxfd)link = virt_to_bus(&(ACCESS(rxfd)status));
ACCESS(rxfd)rx_buf_addr = (int) &nic->packet;
ACCESS(rxfd)count = 0;
ACCESS(rxfd)size = 1528;
outl(virt_to_bus(&(ACCESS(rxfd)status)), ioaddr + SCBPointer);
outw(INT_MASK | RX_START, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
whereami ("started RX process.");
/* Start the reciever.... */
ACCESS(rxfd)status = 0;
ACCESS(rxfd)command = 0xc000;
outl(virt_to_bus(&(ACCESS(rxfd)status)), ioaddr + SCBPointer);
outw(INT_MASK | RX_START, ioaddr + SCBCmd);
/* INIT TX stuff. */
/* Base = 0 */
outl(0, ioaddr + SCBPointer);
outw(INT_MASK | CU_CMD_BASE, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
whereami ("set TX base addr.");
txfd.command = (CmdIASetup);
txfd.status = 0x0000;
txfd.link = virt_to_bus (&confcmd);
{
char *t = (char *)&txfd.tx_desc_addr;
for (i=0;i<ETH_ALEN;i++)
t[i] = nic->node_addr[i];
}
#ifdef DEBUG
printf ("Setup_eaddr:\n");
hd (&txfd, 0x20);
#endif
/* options = 0x40; */ /* 10mbps half duplex... */
options = 0x00; /* Autosense */
promisc = 0;
if ( ((eeprom[6]>>8) & 0x3f) == DP83840
|| ((eeprom[6]>>8) & 0x3f) == DP83840A) {
int mdi_reg23 = mdio_read(eeprom[6] & 0x1f, 23) | 0x0422;
if (congenb)
mdi_reg23 |= 0x0100;
printf(" DP83840 specific setup, setting register 23 to %hX.\n",
mdi_reg23);
mdio_write(eeprom[6] & 0x1f, 23, mdi_reg23);
}
whereami ("Done DP8340 special setup.");
if (options != 0) {
mdio_write(eeprom[6] & 0x1f, 0,
((options & 0x20) ? 0x2000 : 0) | /* 100mbps? */
((options & 0x10) ? 0x0100 : 0)); /* Full duplex? */
whereami ("set mdio_register.");
}
confcmd.command = CmdSuspend | CmdConfigure;
confcmd.status = 0x0000;
confcmd.link = virt_to_bus (&txfd);
confcmd.data[1] = (txfifo << 4) | rxfifo;
confcmd.data[4] = rxdmacount;
confcmd.data[5] = txdmacount + 0x80;
confcmd.data[15] = promisc ? 0x49: 0x48;
confcmd.data[19] = (options & 0x10) ? 0xC0 : 0x80;
confcmd.data[21] = promisc ? 0x0D: 0x05;
outl(virt_to_bus(&txfd), ioaddr + SCBPointer);
outw(INT_MASK | CU_START, ioaddr + SCBCmd);
wait_for_cmd_done(ioaddr + SCBCmd);
whereami ("started TX thingy (config, iasetup).");
load_timer2(10*TICKS_PER_MS);
while (!txfd.status && timer2_running())
/* Wait */;
nic->reset = eepro100_reset;
nic->poll = eepro100_poll;
nic->transmit = eepro100_transmit;
nic->disable = eepro100_disable;
return nic;
}
/*********************************************************************/
#ifdef DEBUG
/* Hexdump a number of bytes from memory... */
void hd (void *where, int n)
{
int i;
while (n > 0) {
printf ("%X ", where);
for (i=0;i < ( (n>16)?16:n);i++)
printf (" %hhX", ((char *)where)[i]);
printf ("\n");
n -= 16;
where += 16;
}
}
#endif
``` |
Roy Rawlings may refer to:
Roy Rawlings (footballer), Australian rules footballer
Roy Willard Rawlings, member of the Rhode Island House of Representatives |
The women's sanda 52 kilograms competition at the 2014 Asian Games in Incheon, South Korea was held from 20 September to 24 September at the Ganghwa Dolmens Gymnasium.
A total of fourteen competitors from fourteen different countries competed in this event, limited to fighters whose body weight was less than 52 kilograms.
Sanda is an unsanctioned fight is a Chinese self-defense system and combat sport. Amateur Sanda allows kicks, punches, knees (not to the head), and throws.
Zhang Luan from China won the gold medal after beating Elaheh Mansourian of Iran in gold medal bout 2–0 in two rounds, Zhang won both periods by the same score of 5–0. The bronze medal was shared by Kim Hye-bin from South Korea and Yumnam Sanathoi Devi of India after they lost both 2–0 in the semifinals.
Divine Wally from the Philippines, Jharana Gurung from Nepal, Albina Mambetova from Kyrgyzstan and Sangidorjiin Amgalanjargal from Mongolia shared the fifth place. Athletes from Hong Kong, Turkmenistan, Indonesia, Vietnam, Pakistan and Uzbekistan lost in the first round and didn't advance.
Schedule
All times are Korea Standard Time (UTC+09:00)
Results
References
External links
Official website
Women's sanda 52 kg |
The canton of Saint-Quentin-1 is an administrative division of the Aisne department, in northern France. It was created at the French canton reorganisation which came into effect in March 2015. Its seat is in Saint-Quentin.
It consists of the following communes:
Attilly
Beauvois-en-Vermandois
Caulaincourt
Douchy
Étreillers
Fayet
Fluquières
Foreste
Francilly-Selency
Germaine
Gricourt
Holnon
Jeancourt
Lanchy
Maissemy
Pontru
Pontruet
Roupy
Saint-Quentin (partly)
Savy
Trefcon
Vaux-en-Vermandois
Vendelles
Le Verguier
Vermand
References
Cantons of Aisne |
```c++
// (see accompanying file LICENSE_1_0.txt or a copy at
// path_to_url
// Home at path_to_url
#ifndef BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_BIND_HPP_
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_BIND_HPP_
#include <boost/local_function/detail/preprocessor/keyword/bind.hpp>
#include <boost/local_function/detail/preprocessor/keyword/const.hpp>
#include <boost/local_function/detail/preprocessor/keyword/facility/add.hpp>
#include <boost/preprocessor/control/iif.hpp>
#include <boost/preprocessor/tuple/eat.hpp>
// PRIVATE //
// These are not local macros -- DO NOT #UNDEF.
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_IS_bind (1) /* unary */
#define bind_BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_IS (1) /* unary */
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_REMOVE_bind /* nothing */
#define bind_BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_REMOVE /* nothing */
// PUBLIC //
// Is.
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_FRONT_(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_BIND_FRONT( \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_REMOVE_FRONT(tokens))
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_FRONT(tokens) \
BOOST_PP_IIF(BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_FRONT(tokens),\
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_FRONT_ \
, \
0 BOOST_PP_TUPLE_EAT(1) \
)(tokens)
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_BACK_(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BACK( \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_REMOVE_BACK(tokens))
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONDT_BIND_BACK(tokens) \
BOOST_PP_IIF(BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_BIND_BACK(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_BACK_ \
, \
0 BOOST_PP_TUPLE_EAT(1) \
)(tokens)
// Remove.
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_BIND_REMOVE_FRONT(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_REMOVE_FRONT( \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_REMOVE_FRONT(tokens))
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_BIND_REMOVE_BACK(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_REMOVE_BACK( \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_BIND_REMOVE_BACK(tokens))
// Add.
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_BIND_ADD_FRONT(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_FACILITY_ADD_FRONT(tokens, \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_FRONT, \
const bind)
#define BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_CONST_BIND_ADD_BACK(tokens) \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_FACILITY_ADD_BACK(tokens, \
BOOST_LOCAL_FUNCTION_DETAIL_PP_KEYWORD_IS_CONST_BIND_BACK, \
const bind)
#endif // #include guard
``` |
```go
package semver
import (
"fmt"
"strconv"
"strings"
"unicode"
)
type wildcardType int
const (
noneWildcard wildcardType = iota
majorWildcard wildcardType = 1
minorWildcard wildcardType = 2
patchWildcard wildcardType = 3
)
func wildcardTypefromInt(i int) wildcardType {
switch i {
case 1:
return majorWildcard
case 2:
return minorWildcard
case 3:
return patchWildcard
default:
return noneWildcard
}
}
type comparator func(Version, Version) bool
var (
compEQ comparator = func(v1 Version, v2 Version) bool {
return v1.Compare(v2) == 0
}
compNE = func(v1 Version, v2 Version) bool {
return v1.Compare(v2) != 0
}
compGT = func(v1 Version, v2 Version) bool {
return v1.Compare(v2) == 1
}
compGE = func(v1 Version, v2 Version) bool {
return v1.Compare(v2) >= 0
}
compLT = func(v1 Version, v2 Version) bool {
return v1.Compare(v2) == -1
}
compLE = func(v1 Version, v2 Version) bool {
return v1.Compare(v2) <= 0
}
)
type versionRange struct {
v Version
c comparator
}
// rangeFunc creates a Range from the given versionRange.
func (vr *versionRange) rangeFunc() Range {
return Range(func(v Version) bool {
return vr.c(v, vr.v)
})
}
// Range represents a range of versions.
// A Range can be used to check if a Version satisfies it:
//
// range, err := semver.ParseRange(">1.0.0 <2.0.0")
// range(semver.MustParse("1.1.1") // returns true
type Range func(Version) bool
// OR combines the existing Range with another Range using logical OR.
func (rf Range) OR(f Range) Range {
return Range(func(v Version) bool {
return rf(v) || f(v)
})
}
// AND combines the existing Range with another Range using logical AND.
func (rf Range) AND(f Range) Range {
return Range(func(v Version) bool {
return rf(v) && f(v)
})
}
// ParseRange parses a range and returns a Range.
// If the range could not be parsed an error is returned.
//
// Valid ranges are:
// - "<1.0.0"
// - "<=1.0.0"
// - ">1.0.0"
// - ">=1.0.0"
// - "1.0.0", "=1.0.0", "==1.0.0"
// - "!1.0.0", "!=1.0.0"
//
// A Range can consist of multiple ranges separated by space:
// Ranges can be linked by logical AND:
// - ">1.0.0 <2.0.0" would match between both ranges, so "1.1.1" and "1.8.7" but not "1.0.0" or "2.0.0"
// - ">1.0.0 <3.0.0 !2.0.3-beta.2" would match every version between 1.0.0 and 3.0.0 except 2.0.3-beta.2
//
// Ranges can also be linked by logical OR:
// - "<2.0.0 || >=3.0.0" would match "1.x.x" and "3.x.x" but not "2.x.x"
//
// AND has a higher precedence than OR. It's not possible to use brackets.
//
// Ranges can be combined by both AND and OR
//
// - `>1.0.0 <2.0.0 || >3.0.0 !4.2.1` would match `1.2.3`, `1.9.9`, `3.1.1`, but not `4.2.1`, `2.1.1`
func ParseRange(s string) (Range, error) {
parts := splitAndTrim(s)
orParts, err := splitORParts(parts)
if err != nil {
return nil, err
}
expandedParts, err := expandWildcardVersion(orParts)
if err != nil {
return nil, err
}
var orFn Range
for _, p := range expandedParts {
var andFn Range
for _, ap := range p {
opStr, vStr, err := splitComparatorVersion(ap)
if err != nil {
return nil, err
}
vr, err := buildVersionRange(opStr, vStr)
if err != nil {
return nil, fmt.Errorf("Could not parse Range %q: %s", ap, err)
}
rf := vr.rangeFunc()
// Set function
if andFn == nil {
andFn = rf
} else { // Combine with existing function
andFn = andFn.AND(rf)
}
}
if orFn == nil {
orFn = andFn
} else {
orFn = orFn.OR(andFn)
}
}
return orFn, nil
}
// splitORParts splits the already cleaned parts by '||'.
// Checks for invalid positions of the operator and returns an
// error if found.
func splitORParts(parts []string) ([][]string, error) {
var ORparts [][]string
last := 0
for i, p := range parts {
if p == "||" {
if i == 0 {
return nil, fmt.Errorf("First element in range is '||'")
}
ORparts = append(ORparts, parts[last:i])
last = i + 1
}
}
if last == len(parts) {
return nil, fmt.Errorf("Last element in range is '||'")
}
ORparts = append(ORparts, parts[last:])
return ORparts, nil
}
// buildVersionRange takes a slice of 2: operator and version
// and builds a versionRange, otherwise an error.
func buildVersionRange(opStr, vStr string) (*versionRange, error) {
c := parseComparator(opStr)
if c == nil {
return nil, fmt.Errorf("Could not parse comparator %q in %q", opStr, strings.Join([]string{opStr, vStr}, ""))
}
v, err := Parse(vStr)
if err != nil {
return nil, fmt.Errorf("Could not parse version %q in %q: %s", vStr, strings.Join([]string{opStr, vStr}, ""), err)
}
return &versionRange{
v: v,
c: c,
}, nil
}
// inArray checks if a byte is contained in an array of bytes
func inArray(s byte, list []byte) bool {
for _, el := range list {
if el == s {
return true
}
}
return false
}
// splitAndTrim splits a range string by spaces and cleans whitespaces
func splitAndTrim(s string) (result []string) {
last := 0
var lastChar byte
excludeFromSplit := []byte{'>', '<', '='}
for i := 0; i < len(s); i++ {
if s[i] == ' ' && !inArray(lastChar, excludeFromSplit) {
if last < i-1 {
result = append(result, s[last:i])
}
last = i + 1
} else if s[i] != ' ' {
lastChar = s[i]
}
}
if last < len(s)-1 {
result = append(result, s[last:])
}
for i, v := range result {
result[i] = strings.Replace(v, " ", "", -1)
}
// parts := strings.Split(s, " ")
// for _, x := range parts {
// if s := strings.TrimSpace(x); len(s) != 0 {
// result = append(result, s)
// }
// }
return
}
// splitComparatorVersion splits the comparator from the version.
// Input must be free of leading or trailing spaces.
func splitComparatorVersion(s string) (string, string, error) {
i := strings.IndexFunc(s, unicode.IsDigit)
if i == -1 {
return "", "", fmt.Errorf("Could not get version from string: %q", s)
}
return strings.TrimSpace(s[0:i]), s[i:], nil
}
// getWildcardType will return the type of wildcard that the
// passed version contains
func getWildcardType(vStr string) wildcardType {
parts := strings.Split(vStr, ".")
nparts := len(parts)
wildcard := parts[nparts-1]
possibleWildcardType := wildcardTypefromInt(nparts)
if wildcard == "x" {
return possibleWildcardType
}
return noneWildcard
}
// createVersionFromWildcard will convert a wildcard version
// into a regular version, replacing 'x's with '0's, handling
// special cases like '1.x.x' and '1.x'
func createVersionFromWildcard(vStr string) string {
// handle 1.x.x
vStr2 := strings.Replace(vStr, ".x.x", ".x", 1)
vStr2 = strings.Replace(vStr2, ".x", ".0", 1)
parts := strings.Split(vStr2, ".")
// handle 1.x
if len(parts) == 2 {
return vStr2 + ".0"
}
return vStr2
}
// incrementMajorVersion will increment the major version
// of the passed version
func incrementMajorVersion(vStr string) (string, error) {
parts := strings.Split(vStr, ".")
i, err := strconv.Atoi(parts[0])
if err != nil {
return "", err
}
parts[0] = strconv.Itoa(i + 1)
return strings.Join(parts, "."), nil
}
// incrementMajorVersion will increment the minor version
// of the passed version
func incrementMinorVersion(vStr string) (string, error) {
parts := strings.Split(vStr, ".")
i, err := strconv.Atoi(parts[1])
if err != nil {
return "", err
}
parts[1] = strconv.Itoa(i + 1)
return strings.Join(parts, "."), nil
}
// expandWildcardVersion will expand wildcards inside versions
// following these rules:
//
// * when dealing with patch wildcards:
// >= 1.2.x will become >= 1.2.0
// <= 1.2.x will become < 1.3.0
// > 1.2.x will become >= 1.3.0
// < 1.2.x will become < 1.2.0
// != 1.2.x will become < 1.2.0 >= 1.3.0
//
// * when dealing with minor wildcards:
// >= 1.x will become >= 1.0.0
// <= 1.x will become < 2.0.0
// > 1.x will become >= 2.0.0
// < 1.0 will become < 1.0.0
// != 1.x will become < 1.0.0 >= 2.0.0
//
// * when dealing with wildcards without
// version operator:
// 1.2.x will become >= 1.2.0 < 1.3.0
// 1.x will become >= 1.0.0 < 2.0.0
func expandWildcardVersion(parts [][]string) ([][]string, error) {
var expandedParts [][]string
for _, p := range parts {
var newParts []string
for _, ap := range p {
if strings.Index(ap, "x") != -1 {
opStr, vStr, err := splitComparatorVersion(ap)
if err != nil {
return nil, err
}
versionWildcardType := getWildcardType(vStr)
flatVersion := createVersionFromWildcard(vStr)
var resultOperator string
var shouldIncrementVersion bool
switch opStr {
case ">":
resultOperator = ">="
shouldIncrementVersion = true
case ">=":
resultOperator = ">="
case "<":
resultOperator = "<"
case "<=":
resultOperator = "<"
shouldIncrementVersion = true
case "", "=", "==":
newParts = append(newParts, ">="+flatVersion)
resultOperator = "<"
shouldIncrementVersion = true
case "!=", "!":
newParts = append(newParts, "<"+flatVersion)
resultOperator = ">="
shouldIncrementVersion = true
}
var resultVersion string
if shouldIncrementVersion {
switch versionWildcardType {
case patchWildcard:
resultVersion, _ = incrementMinorVersion(flatVersion)
case minorWildcard:
resultVersion, _ = incrementMajorVersion(flatVersion)
}
} else {
resultVersion = flatVersion
}
ap = resultOperator + resultVersion
}
newParts = append(newParts, ap)
}
expandedParts = append(expandedParts, newParts)
}
return expandedParts, nil
}
func parseComparator(s string) comparator {
switch s {
case "==":
fallthrough
case "":
fallthrough
case "=":
return compEQ
case ">":
return compGT
case ">=":
return compGE
case "<":
return compLT
case "<=":
return compLE
case "!":
fallthrough
case "!=":
return compNE
}
return nil
}
// MustParseRange is like ParseRange but panics if the range cannot be parsed.
func MustParseRange(s string) Range {
r, err := ParseRange(s)
if err != nil {
panic(`semver: ParseRange(` + s + `): ` + err.Error())
}
return r
}
``` |
Vladimir Vasilyevich Volkov (; 7 March 1921 – 1986) was a Russian athlete. He competed in the men's decathlon at the 1952 Summer Olympics, representing the Soviet Union. He was also the Soviet champion in the same event.
References
External links
1921 births
1986 deaths
Athletes (track and field) at the 1952 Summer Olympics
Russian decathletes
Olympic athletes for the Soviet Union
Athletes from Moscow
Soviet decathletes |
Belemkangrin is a village in the Bissiga Department of Boulgou Province in south-eastern Burkina Faso. As of 2005, the village has a population of 213.
References
Populated places in the Centre-Est Region
Boulgou Province |
Jacqueline Donachie (born 1969) is a Scottish artist who uses drawing, photography, sculpture and installation. She lives and works in Glasgow, Scotland.
Education and early career
Donachie studied fine art from 1987 to 1991 at the Glasgow School of Art. She graduated from the School's Environmental Art department, which encouraged artists to place their work in a variety of public contexts outside the gallery space. She completed a Masters of Fine Art at Hunter College, New York in 1996. Donachie was one of a group of artists who helped establish Glasgow in the 1990s as one of the world's most dynamic contemporary art communities. There has been a retrospective exploring this body of work in Glasgow, which was called Generation.
Work
Themes
Donachie creates socially-engaged art, often occupying public space. She explores biomedical research and ideas of communication, participation and how public spaces are designed, managed and used in her work. Books, written by Donachie, often accompany each work. She has also created unique ways to visualize public problems which can then be later discussed by those in government. One example of this was in the town of Huntly where issues about who bikes and where were in debate. Donachie's solution to visualizing the problem involved all bikers to attach chalk to their ride and then go about their business. The chalk would then record residents' progress in a visual manner throughout the town.
Recent and current projects
Speedwork is a work at House for an Art-lover in Glasgow, which has been created after Donachie spent time with running groups using the park. Tomorrow Belongs to Me was a collaboration with Darren Monckton, a professor of human genetics at the University of Glasgow. It is a research project and film installation, which examines the personal impact of illness on individuals and families and Donachie also engaged with the scientific community whose research sought to explain how such illness arose.
New Weather Coming, Donachie's work for the 2014 GENERATION festival, included three green trailer sculptures that toured Scotland and were accompanied by the handing out of a "book of Stories and Pictures" to daytrippers. The mobile sculpture in Oban was ill-received.
Donachie's exhibition Right Here Among Them, a mid-career retrospective, at The Fruitmarket Gallery in Edinburgh, 11 November 2017 – 11 February 2018, was winner of the first Freelands Award, an award from The Freelands Foundation to support the work of an under-recognised, mid career female artist.
Publications
Donachie, Jacqueline. 3532 Miles. Armpit Press (1997).
Donachie, Jacqueline. Tomorrow Belongs to Me. Glasgow: Hunterian Art Gallery (2006).
References
1969 births
Living people
20th-century Scottish women artists
21st-century Scottish women artists
Alumni of the Glasgow School of Art
Artists from Glasgow
Hunter College alumni
Scottish contemporary artists |
```javascript
const debug = require("debug")("blot:build:dateStamp");
const fromPath = require("./fromPath");
const fromMetadata = require("./fromMetadata");
const type = require("helper/type");
const moment = require("moment");
require("moment-timezone");
module.exports = function (blog, path, metadata) {
const { id, dateFormat, timeZone } = blog;
let dateStamp;
debug("Blog:", id, "dateFormat:", dateFormat, "timeZone", timeZone, path);
// If the user specified a date
// field in the entry's metadata,
// try and parse a timestamp from it.
if (metadata.date) {
let parsedFromMetadata = fromMetadata(metadata.date, dateFormat, timeZone);
dateStamp = validate(parsedFromMetadata.created);
if (dateStamp && parsedFromMetadata.adjusted) {
return dateStamp;
} else if (dateStamp) {
return adjustByBlogTimezone(timeZone, dateStamp);
}
}
if (dateStamp !== undefined) return dateStamp;
// The user didn't specify a valid
// date in the entry's metadata. Try
// and extract one from the file's path
dateStamp = validate(fromPath(path, timeZone).created);
if (dateStamp !== undefined) {
dateStamp = adjustByBlogTimezone(timeZone, dateStamp);
return dateStamp;
}
// It is important we return undefined since we fall back
// to the file's created date if that's the case
return undefined;
};
function validate(stamp) {
if (type(stamp, "number") && !isNaN(stamp) && moment.utc(stamp).isValid())
return stamp;
return undefined;
}
function adjustByBlogTimezone(timeZone, stamp) {
var zone = moment.tz.zone(timeZone);
var offset = zone.utcOffset(stamp);
return moment.utc(stamp).add(offset, "minutes").valueOf();
}
``` |
```c++
#ifndef BOOST_SMART_PTR_DETAIL_SPINLOCK_GCC_ARM_HPP_INCLUDED
#define BOOST_SMART_PTR_DETAIL_SPINLOCK_GCC_ARM_HPP_INCLUDED
//
//
// See accompanying file LICENSE_1_0.txt or copy at
// path_to_url
//
#include <boost/smart_ptr/detail/yield_k.hpp>
#if defined(__ARM_ARCH_7__) || defined(__ARM_ARCH_7A__) || defined(__ARM_ARCH_7R__) || defined(__ARM_ARCH_7M__) || defined(__ARM_ARCH_7EM__) || defined(__ARM_ARCH_7S__)
# define BOOST_SP_ARM_BARRIER "dmb"
# define BOOST_SP_ARM_HAS_LDREX
#elif defined(__ARM_ARCH_6__) || defined(__ARM_ARCH_6J__) || defined(__ARM_ARCH_6K__) || defined(__ARM_ARCH_6Z__) || defined(__ARM_ARCH_6ZK__) || defined(__ARM_ARCH_6T2__)
# define BOOST_SP_ARM_BARRIER "mcr p15, 0, r0, c7, c10, 5"
# define BOOST_SP_ARM_HAS_LDREX
#else
# define BOOST_SP_ARM_BARRIER ""
#endif
namespace boost
{
namespace detail
{
class spinlock
{
public:
int v_;
public:
bool try_lock()
{
int r;
#ifdef BOOST_SP_ARM_HAS_LDREX
__asm__ __volatile__(
"ldrex %0, [%2]; \n"
"cmp %0, %1; \n"
"strexne %0, %1, [%2]; \n"
BOOST_SP_ARM_BARRIER :
"=&r"( r ): // outputs
"r"( 1 ), "r"( &v_ ): // inputs
"memory", "cc" );
#else
__asm__ __volatile__(
"swp %0, %1, [%2];\n"
BOOST_SP_ARM_BARRIER :
"=&r"( r ): // outputs
"r"( 1 ), "r"( &v_ ): // inputs
"memory", "cc" );
#endif
return r == 0;
}
void lock()
{
for( unsigned k = 0; !try_lock(); ++k )
{
boost::detail::yield( k );
}
}
void unlock()
{
__asm__ __volatile__( BOOST_SP_ARM_BARRIER ::: "memory" );
*const_cast< int volatile* >( &v_ ) = 0;
__asm__ __volatile__( BOOST_SP_ARM_BARRIER ::: "memory" );
}
public:
class scoped_lock
{
private:
spinlock & sp_;
scoped_lock( scoped_lock const & );
scoped_lock & operator=( scoped_lock const & );
public:
explicit scoped_lock( spinlock & sp ): sp_( sp )
{
sp.lock();
}
~scoped_lock()
{
sp_.unlock();
}
};
};
} // namespace detail
} // namespace boost
#define BOOST_DETAIL_SPINLOCK_INIT {0}
#undef BOOST_SP_ARM_BARRIER
#undef BOOST_SP_ARM_HAS_LDREX
#endif // #ifndef BOOST_SMART_PTR_DETAIL_SPINLOCK_GCC_ARM_HPP_INCLUDED
``` |
The National Football League playoffs for the 2002 season began on January 4, 2003. The postseason tournament concluded with the Tampa Bay Buccaneers defeating the Oakland Raiders in Super Bowl XXXVII, 48–21, on January 26, at Qualcomm Stadium in San Diego, California.
Prior to the 2002–03 season, the league realigned its teams into eight divisions (four in each conference). Thus, the 12-team playoff format was modified. The league abided by this updated system until 2020:
The four division champions are seeded 1–4 based on their regular season won-lost-tied record.
Two "wild card" qualifiers (those non-division champions with the conference's best won-lost-tied percentages) are seeded 5 and 6 within the conference.
As a result, a wild card team could no longer host a playoff game during the opening Wild Card round. Prior to the 2002–03 playoffs, a team could finish second in its division and host a playoff game as the number 4 seed (best wild-card team). The new rules meant that the number 4 seed was awarded to a division champion and not a wild card team (non-division champion). Under the new system, a wild card team could host a playoff game only if the number 5 and number 6 seeds in one conference advance to a Conference Championship Game, in which case a number 5 seed would host the game (which, under this format, never happened).
This would be the last season until 2022-23 in which the Divisional Round did not include Tom Brady, Aaron Rodgers, Peyton Manning or Ben Roethlisberger.
Participants
Bracket
Schedule
During the 2001–02 NFL playoffs, the NFL experimented with playing Saturday prime time playoff games. The league was pleased with the results, and decided to revise its entire playoff schedule, beginning with the 2002 season. Wild Card and Divisional Saturday games continued to be played at 4:30 p.m. and 8 p.m. EST, as they had in the previous season. Sunday wild card and divisional playoff games were moved from 12:30 p.m. and 4:00 p.m. EST to 1:00 p.m. and 4:30 p.m., respectively.
The start times for the Conference Championship Games were also changed, from 12:30 p.m. and 4 p.m. EST to 3 p.m. and 6:30 p.m. respectively. The conferences would then begin to annually alternate between the early and late games, with the first game during this 2002–03 season being the NFC title game and the second the AFC title game. Since then, the NFC title game is first in even-numbered seasons (2002, 2004, etc.) and the AFC title game first in odd-numbered seasons (2003, 2005, etc.). This continued an unofficial rotation that began with the Conference Championships in the 1996 NFL Playoffs.
This change would also avoid the future possibility of having to reschedule a 9:30 a.m. PST/10:30 a.m. MST Conference Championship Game if both contests took place in those time zones. Conference Championship Games in those time zones now start no earlier than 12 p.m. local time. When Denver and San Francisco hosted the AFC and NFC Championship Games in 1990, the league moved both contests back an hour, but it also forced the networks to reluctantly change or move their prime time lineups. Holding the games on separate days like in 1982–83 was rejected due to the short notice. And for the third time in recent few years, there was no bye week before Super Bowl.
In the United States, ABC broadcast the first two Wild Card playoff games and Super Bowl XXXVII. CBS telecast the rest of the AFC playoff games and Fox the rest of the NFC games.
Wild Card playoffs
Saturday, January 4, 2003
AFC: New York Jets 41, Indianapolis Colts 0
In his playoff debut, Jets quarterback Chad Pennington completed 19 of 25 passes for 222 yards and three touchdowns as he led the Jets to a shutout victory over the Colts. Colts quarterback Peyton Manning completed only 14 of 31 passes for 137 yards and two interceptions. New York gained 396 yards and didn't commit any turnovers, while Indianapolis gained only 176 yards and turned the ball over three times.
On New York's fifth play of the game, fullback Richie Anderson caught a screen pass from Pennington and took off down the left sideline for a 56-yard touchdown, the longest play in Jets postseason history. Indianapolis responded by driving deep into Jets territory, with Manning completing three passes to Marvin Harrison for 38 yards, but the drive stalled and Mike Vanderjagt missed a 41-yard field goal attempt.
After the missed field goal, Pennington completed a 13-yard pass to Santana Moss and a 23-yard pass to Wayne Chrebet, setting up John Hall's 41-yard field goal. Then Ray Mickens recovered a fumble from Troy Walters that had been forced by Khary Campbell on the ensuing kickoff, giving New York the ball on the Colts 39-yard line. Six plays later, LaMont Jordan scored on a 1-yard touchdown run that gave the Jets a 17–0 lead. Later in the quarter, the Jets got the ball with great field position by receiving Hunter Smith's 32-yard punt on the Colts 42-yard line, and they ended up increasing their lead to 24–0 with Pennington's 4-yard touchdown pass to Moss, who made a leaping catch in the back of the end zone with 37 seconds left in the half.
Early in the third quarter, Hall kicked another field goal on the end of a drive that was set up by a 70-yard kickoff return from receiver Chad Morton. Later on, Pennington completed 5/6 passes for 59 yards on a 74-yard drive, the last one a 3-yard touchdown toss to rookie tight end Chris Baker. Then on Indy's ensuing drive, Damien Robinson intercepted a pass from Manning and returned it 24 yards to the Jets 36-yard line. New York then drove 64 yards in 13 plays, 11 of them runs by Jordan for 59 yards, including a 1-yard touchdown run to make the final score of the game 41–0. Jets linebacker James Darling then put the finishing touches on the win by intercepting Manning's final pass of the game.
This was the Jets final playoff home game at Giants Stadium as well as the final playoff win for both the Giants and the Jets at the stadium. Coincidentally, the Giants’ last playoff win in Giants Stadium, the 2000 NFC Championship Game, had the same final score as this game. This was also the last playoff win until 2020 for an AFC East division champion that was not by the Patriots. Jordan finished the game with 20 carries for 102 yards, a reception for nine yards, and two touchdowns.
This was the second postseason meeting between the Colts and Jets. New York won the previous meeting when the Colts were in Baltimore.
NFC: Atlanta Falcons 27, Green Bay Packers 7
The Packers suffered their first home playoff loss in franchise history as the Falcons forced five turnovers and limited Green Bay to only one touchdown. 22-year-old quarterback Michael Vick passed for 117 yards and rushed for 64 yards. The Packers, playing without Pro Bowl safety Darren Sharper and their top receiver Terry Glenn due to injuries, fell down 24–0 in the first half and could not recover. Green Bay quarterback Brett Favre threw two interceptions and lost a fumble, while Ryan Longwell missed two field goals.
The Falcons stormed out to a 7–0 lead by driving 76 yards on the opening drive, including an 18-yard reception and 12-yard run by running back Warrick Dunn, scoring with Vick's 10-yard touchdown pass to Shawn Jefferson. Then over the next three plays, but at the end of the Packers next drive, Atlanta linebacker Mark Simoneau blocked Josh Bidwell's punt and Artie Ulmer recovered it in the end zone for a touchdown to increase their lead to 14–0. The Packers responded with a drive to the Atlanta 20-yard line. But after Brady Smith sacked Favre for a 9-yard loss, Longwell missed a 47-yard field goal attempt.
Early in the second quarter, cornerback Tyrone Williams, a blocker on Green Bay's punt return team ran into returner Eric Metcalf. As a result, Metcalf muffed the kick and Atlanta fullback George Layne recovered the ball on Green Bay's 21-yard line. Packers coach Mike Sherman did not challenge the call, a mistake considering replays showed the punted ball bouncing off a Falcons player's left shoulder. Sherman said he spoke with an official on the field, "but he [mistakenly] led me to believe it would not be reviewable." Four plays after the turnover, T. J. Duckett's 6-yard touchdown run increased Atlanta's lead to 21–0. Green Bay responded by driving to a first and goal situation on the Atlanta 1-yard line, but over the next three plays, Favre threw two incomplete passes and Ahman Green was tackled by Smith and defensive end Johndale Carty for a 1-yard loss. On fourth down and 2, Green was dropped for a 4-yard loss by nose tackle Ellis Johnson. Then Vick led the Falcons 90 yards in 16 plays, one of them a 21-yard run by Dunn, to go up 24–0 on Jay Feely's 22-yard field goal on the last play of the half.
Green Bay regrouped on the opening drive of the second half, moving the ball 73 yards in 10 plays, the longest a 25-yard completion from Favre to receiver Donald Driver. Favre finished the drive with a 14-yard touchdown pass to Driver, but the receiver was knocked out of the game on the play, and Atlanta responded with a 73-yard scoring drive of their own. The key play of the drive was a 22-yard scramble by Vick, while Feely finished it off with a 23-yard field goal that gave the Falcons a 27–7 lead. There was still 3:46 left in the third quarter, but this would be the game's final score. Green Bay responded with a drive to the Atlanta 26-yard line, only to have Longwell miss a 44-yard field goal attempt.
The fourth quarter played out like comedy, as Feely missed two field goal attempts while Green Bay turned the ball over three times: once on downs, the second time when Patrick Kerney recovered a fumble from Favre, and the third when Favre threw his second interception of the game to Carpenter. This would be the Falcons final road playoff victory until 2017.
This was the second postseason meeting between the Falcons and Packers. Green Bay won the only prior meeting.
Sunday, January 5, 2003
AFC: Pittsburgh Steelers 36, Cleveland Browns 33
An amazing performance from Browns quarterback Kelly Holcomb, was overshadowed by journeyman quarterback Tommy Maddox, who led the Steelers to 29 second half points to overcome a 17-point deficit. A 3-yard touchdown run by Chris Fuamatu-Maʻafala with 54 seconds left capped the game-winning 58-yard drive.
On the third play of the game, Holcomb completed an 83-yard pass to Kevin Johnson at the Steelers 1-yard line, setting up William Green's 1-yard touchdown run and giving the Browns a 7–0 lead after just 1:16 had elapsed in the game. Most of the rest of the quarter would be taken up by drives that ended in punts, but the Steelers got a big scoring opportunity when Amos Zereoué's 36-yard run gave them a first down on the Cleveland 23-yard line. This would only amount to nothing though, as Maddox was intercepted by Daylon McCutcheon on the next play.
One play into the second quarter, Steelers receiver Antwaan Randle El fumbled a Browns punt, and Chris Akins recovered the ball for Cleveland on the Steelers 32-yard line. On the next play, Cleveland took a 14–0 lead with Holcomb's 32-yard touchdown pass to Dennis Northcutt. The Browns seemed to be taking control of the game now, particularly when another Steelers drive into field goal range was again snuffed out by a McCutheon interception (the Steelers' third turnover in less than six minutes). But suddenly Randle El brought the team right back into the game by returning a punt 66 yards for a touchdown, making the score 14–7. Cleveland stormed right back, as Holcomb's 29-yard pass to Johnson and two completions to running back Jamel White for 22 total yards earned the team a Phil Dawson field goal that made the score 17-7 going into halftime.
Early in the third quarter, Northcutt returned Tom Rouen's 37-yard punt 59 yards to the Pittsburgh 14-yard line, setting up Holcomb's 15-yard touchdown pass to Northcutt that increased the Browns lead to 24–7. Then after a punt, Cleveland drove to the Steelers 32-yard line. They were now in position to build a near-insurmountable lead, but Mike Logan made a clutch interception to keep the team's victory hopes alive. Maddox then completed 7/8 passes for 62 yards, one of them a 24-yard completion to Randle El, and rushed for eight as he led the team 71 yards to score on his 6-yard touchdown pass to Plaxico Burress, cutting the deficit to 24–14 with four minutes left in the third quarter. Cleveland responded by driving 64 yards in eight plays, featuring a 43-yard completion from Holcomb to receiver André Davis, to score on Dawson's 24-yard field goal on the second play of the final quarter, increasing their lead to 27–14.
On Pittsburgh's ensuing drive, Maddox completed three passes to Randle-El for gains of 20, 30, and six yards before finding tight end Jerame Tuman with a 3-yard touchdown pass early in the fourth quarter. But the Browns stormed back, with Green's 23-yard run sparking a 61-yard drive that ended on Holcomb's 22-yard touchdown pass to Davis, giving them a 33–21 lead after the 2-point conversion failed.
With 3:06 left in the game, Maddox finished off a 77-yard drive with a 5-yard touchdown pass to Hines Ward, cutting the score to 33–28. The Browns tried to run out the clock on their ensuing possession, but Northcutt dropped a potential first down catch on third down and 12, forcing his team to punt. Taking over at their own 42-yard line, Maddox threw to Burress for 24 yards, Ward for 10, Burress again for 17, and Ward again for seven before Fuamatu-Ma'afala finished the drive with a 3-yard touchdown run. Then Tuman scored the two-point conversion to give the Steelers a 36–33 lead. The Browns attempted to drive for the tying field goal, but time expired in the game on Holcomb's 16-yard completion to Andre King at the Steelers 29-yard line.
Maddox completed 30 of 48 passes for a franchise postseason record 367 yards and three touchdowns, with two interceptions. Burress caught six passes for 100 yards and a touchdown, while Ward caught 11 passes for 104 yards and a score. Randle El caught five passes for 85 yards and returned a punt 66 yards for a touchdown. In his first career playoff game, Holcomb completed 26 of 43 passes for 429 yards, three touchdowns, and an interception. Johnson caught four passes for 140 yards, while Northcutt caught six passes for 92 yards and two touchdowns, and returned two punts for 70 yards.
This was the most recent playoff appearance for the Browns until the 2020 season.
This was the second postseason meeting between the Browns and Steelers. Pittsburgh won the only prior meeting.
This was the first game that Heinz Field played Renegade.
NFC: San Francisco 49ers 39, New York Giants 38
The Steelers' comeback earlier in the day was matched by San Francisco's similar late drive, overcoming a 38–14 deficit by scoring 25 unanswered points in the second half.
In the first quarter, 49ers linebacker Julian Peterson intercepted a pass from Kerry Collins at the San Francisco 24-yard line after it bounced off the hands of running back Ron Dayne. On the next play, 49ers quarterback Jeff Garcia threw a moderate pass to Terrell Owens, who broke two tackles and took it 76 yards to the end zone. New York responded with an 11-play, 65-yard drive, that ended with Collins' 12-yard touchdown pass to Amani Toomer, tying the game at 7.
In the second quarter, the Giants stormed 61 yards in five plays, featuring a 29-yard run by Tiki Barber. After that, Collins completed a 27-yard pass to tight end Jeremy Shockey, and capped off the drive with a 2-yard touchdown pass to him one play later. The 49ers however, responded with an unconventional 69-yard drive that featured two runs by Garcia for over 10 yards and a 25-yard completion from Owens to receiver Tai Streets on a reverse-pass play. Running back Kevan Barlow completed the drive with a 1-yard touchdown run to tie the game. However, two key 49ers turnovers allowed the Giants to go into their locker room at halftime with a 28–14 lead. First, the Giants were forced to punt on their ensuing possession, but returner Cedrick Wilson muffed the kick and New York's Johnnie Harris recovered the ball on the 49ers 8-yard line. Collins then threw an 8-yard touchdown pass to Toomer on the next play. After the ensuing kickoff, cornerback Jason Sehorn picked off a pass from Garcia at New York's 44-yard line. Two plays later on third down and 8, Collins completed a 30-yard pass to Barber, and followed it up with a 24-yard touchdown completion to Toomer with just 10 seconds left in the half.
The Giants continued to build their lead in the second half. Five minutes into the third quarter, San Francisco turned the ball over on downs at the Giants 46-yard line, but the stop came at a cost for the Giants, as defensive end Kenny Holmes suffered a game-ending injury while making the tackle on fourth down. New York subsequently moved the ball 54 yards in six plays. Barber rushed for 37 yards on the drive and finished it with a 6-yard touchdown run, increasing the Giants lead to 35–14. Later in the quarter, Collins' 46-yard completion to Toomer set up a 21-yard field goal from kicker Matt Bryant, making the score 38–14 with 4:27 left in the third quarter. However, the field goal came after Shockey dropped a potential touchdown catch in the end zone.
San Francisco stormed back, driving 70 yards in seven plays on a drive that consumed only 2:24 and ended with Garcia's 26-yard touchdown pass to Owens. Owens added a 2-point conversion catch on the next play, cutting the 49ers deficit to 38–22. After the play, an iconic scene of defensive end Michael Strahan walking over to Owens and pointing to the scoreboard to remind him of the deficit they still faced would be a highlight of the game.
New York was forced to punt after three plays on their next drive. Matt Allen's short kick and a 15-yard personal foul against Dhani Jones for hitting the returner after a fair catch gave San Francisco the ball on the Giants 27-yard line. Three plays later, Garcia scored on a 14-yard touchdown run, and then completed another two-point conversion pass to Owens, cutting the score to 38–30 five seconds into the fourth quarter.
After forcing New York to punt once again, the 49ers drove 74 yards in 15 plays, including a 3-yard reception by Streets on fourth down and 1, and scored with a 25-yard field goal by Jeff Chandler. The Giants responded with a drive to the San Francisco 20-yard line, but with 3:01 left in the game, a poor snap from 41-year-old Trey Junkin, who had been signed back out of retirement less than a week before the game, threw off the timing on Bryant's 42-yard field goal attempt and it went wide left. Garcia then took over, converting two third downs, one of them a 25-yard completion to tight end Eric Johnson, and rushing for 12 yards on the way to a 13-yard touchdown pass to Streets. This time, the two-point conversion failed when Will Allen intercepted Garcia's pass intended for Owens, but the 49ers took the lead, 39–38, with one minute left in regulation.
The touchdown and 2-point conversion plays resulted in offsetting personal fouls on both teams after they ended. After the touchdown, Owens was flagged for taunting safety Shaun Williams, while Williams was flagged shoving him to the ground in response. Then after the two-point conversion, Owens was penalized for a late hit on Allen, which started a brawl between both teams. During the altercation, Williams was penalized and ejected from the game for throwing a punch at 49ers center Jeremy Newberry.
However, the Giants did have a chance to win. Delvin Joyce returned Chandler's short kickoff 32 yards to the 48-yard line. Collins then led them to the 49ers 23-yard line with six seconds left, but Junkin botched a snap for a 41-yard field goal attempt, resulting in a feeble pass play that fell incomplete. The Giants were also called for having an illegal man downfield on the play, and the game ended. The following day, it was revealed that the penalized player (guard Rich Seubert) had in fact checked in as an eligible receiver before the field goal attempt, although a different Giant lineman (guard Tam Hopkins) actually was illegally downfield. NFL Vice President of Officiating Mike Pereira admitted pass interference also should have been called on 49ers defensive end Chike Okeafor for pulling down Seubert. Had the two right calls been made, the down would have been replayed at the previous spot, the San Francisco 23.
Garcia threw for 331 yards, three touchdowns, and interception, while also leading the 49ers on the ground with 60 rushing yards and another score. Owens caught nine passes for 177 yards and two touchdowns. He also scored two two-point conversions and completed a 25-yard pass. Collins threw for 342 yards, four touchdowns, and an interception. Toomer caught eight passes for 136 yards and three touchdowns. Barber rushed for 115 yards, caught five passes for 62 yards, and scored a touchdown.
This was featured on the NFL's Greatest Games as One Wild Finish, and was #4 on NFL Top 10's Top Ten Comebacks and was also #6 on NFL Top 10's Top Ten Controversial Calls for Rich Seubert's illegal man downfield call.
This was the seventh postseason meeting between the Giants and 49ers. Both teams had split the prior six meetings.
Divisional playoffs
Saturday, January 11, 2003
AFC: Tennessee Titans 34, Pittsburgh Steelers 31 (OT)
The third time was the charm for Titans kicker Joe Nedney. After missing the potential game-winning field goal at the end of regulation time, and a second failed kick in overtime was negated because of a controversial running-into-the-kicker penalty on Pittsburgh's Dewayne Washington, Nedney won the game from 26 yards out 2:15 into overtime. Steelers coach Bill Cowher was incensed, saying he called a timeout before the winning kick took place.
Titans cornerback Samari Rolle gave his team an early scoring opportunity when he intercepted Tommy Maddox's first pass of the game and returned it 16 yards to the Tennessee 48-yard line. The Titans then drove 52 yards in seven plays to score on quarterback Steve McNair's 8-yard scramble. Following a Steelers punt, Tennessee drove 76 yards in 16 plays to score on Eddie George's 1-yard touchdown run. The key player of the drive was receiver Drew Bennett, who was responsible for two of the drive's four third down conversions. He caught a 19-yard pass on third and 16 from the Titans 36, and later hauled in a 9-yard catch on third and 8 from the Steelers 43.
However, Pittsburgh ended up dominating the second quarter. After punting on their next drive, Lethon Flowers recovered a fumble from George (his first fumble of the season) on the Titans 8-yard line, leading to Maddox's 8-yard touchdown pass to Hines Ward. Then Tennessee lost another turnover when McNair threw a pass that was intercepted by Chad Scott on the Steelers 41. On the next play, Maddox completed a 40-yard pass to Plaxico Burress, setting up Jeff Reed's 30-yard field goal that made the score 14–10. The next time they had the ball, they took advantage of a 35-yard pass interference penalty against Rolle, along with three key plays by Ward, who caught two passes for 18 yards and rushed for 11. Reed finished the drive with a 39-yard field goal on the last play of the half, making the score 14-13 going into halftime.
On the first play of the second half, Steelers nose tackle Casey Hampton forced a fumble from George that Aaron Smith recovered for Pittsburgh on the Titans 31-yard line. On the next play, the team took a 20–14 lead with a 31-yard touchdown run by Amos Zereoué. But Tennessee stormed right back, going into a no-huddle offense and scoring twice in a span of five minutes. First, they responded by driving 70 yards in eight plays, including a 39-yard reception by tight end Frank Wycheck, and scored on McNair's 7-yard touchdown toss to Wycheck that retook the lead. The Steelers had to punt on their next drive, and Derrick Mason returned the ball nine yards to the Titans 42-yard line. McNair then completed two passes to Mason for 24 total yards and one to Wycheck for 21 on the way to his 2-yard touchdown pass to tight end Erron Kinney, giving Tennessee a 28–20 lead with 2:53 left in the third quarter.
The momentum seemed to be back in Tennessee's favor, particularly when Reed missed a 44-yard field goal attempt early in the fourth quarter. But after a Titans punt, Pittsburgh drove 65 yards in seven plays to score on Maddox's 21-yard touchdown pass to Ward. Then Burress caught a pass for a 2-point conversion that tied the game at 28. On the first play after the following kickoff, Deshea Townsend intercepted a pass from McNair on the Steelers 43, leading to Reed's 40-yard field goal that gave the team a 31–28 lead. Titans running back John Simon returned the ensuing kickoff 38 yards to the Steelers 42-yard line, where the team proceeded to drive 38 yards, including a 20-yard catch by Bennett, to tie the game with Nedney's 43-yard field goal. After the next three drives ended in punts, the Titans drove for a potential game-winning field goal, only to have Nedney miss a 48-yard kick on the last play of regulation.
In the first overtime period, referee Ron Blum announced that each team had three timeouts. This caused some confusion because, compared with the regular season, overtime in the postseason utilizes slightly different rules. The Titans took the opening kickoff and McNair threw completions to Justin McCareins for gains of 31 and 22 yards before Robert Holcombe's 3-yard run put the ball on the Steelers 16-yard line. They sent out Nedney to win the game, setting up a wild finish. Nedney's first kick was good, but it was negated because the Steelers had called timeout. The fireworks operator at the stadium inadvertently set off the fireworks, delaying the game for several minutes. After the fireworks had fizzled, Nedney attempted to win the game again. His kick was wide right, but Washington was penalized for running into Nedney. After the five-yard penalty was assessed, Nedney was given a third try. This time he converted the kick, winning the game.
Wycheck finished the game with 10 receptions for 123 yards and a touchdown. McNair threw for a career postseason high 338 yards and two touchdowns, with two interceptions, while rushing for 29 yards and another score on the ground. Maddox threw for 266 yards, two touchdowns, and an interception. Ward caught seven passes for 82 yards and two touchdowns, while also rushing for 11 yards.
This was the fourth postseason meeting between the Steelers and Titans. Pittsburgh won all three prior meetings while the Titans were the Houston Oilers.
NFC: Philadelphia Eagles 20, Atlanta Falcons 6
The hyped quarterback duel between Donovan McNabb and Michael Vick never materialized, as the Eagles' defense sacked Vick three times and intercepted him twice, including Bobby Taylor's 39-yard return for a touchdown.
At the end of the game's second possession, Eagles punter Lee Johnson pinned the Falcons back at their own 18-yard line with a 60-yard kick. A few plays later, Taylor intercepted a Vick pass and returned it 39 yards for the first score of the game. Following a Falcons punt, McNabb's completions to Chad Lewis and Todd Pinkston for gains of 15 and 24 yards set up David Akers's 34-yard field goal. Early in the second quarter, Akers kicked another field goal at the end of a drive that featured a 42-yard completion from McNabb to receiver James Thrash.
With the Eagles now leading 13–0, Vick tried to rally his team back. First he led them 61 yards in 13 plays, including a 23-yard completion to Quentin McCord, to score on a Jay Feely field goal with 4:10 left in the half. Then after forcing a punt, Vick ran for 20 yards and completed a 16-yard pass to Brian Finneran to set up a 52-yard field goal from Feely, making the score 13–6 by halftime. But in the third quarter, a 20-yard touchdown run by Vick that could have tied the game was called back by a holding penalty on Travis Claridge, and Feely missed a 37-yard field goal a few plays later. The Eagles eventually increased their lead to 20–6 with McNabb's 35-yard touchdown pass to Thrash with 6:26 left in the fourth quarter. Atlanta drove into scoring range on their next two possessions, but the first ended with a turnover on downs at the Eagles 21, and the second was ended by Brian Dawkins' interception with 17 seconds left in the game.
McNabb finished with 20 of 30 completions for 247 yards and a touchdown, along with 24 rushing yards. This would be the last win for the Eagles at Veterans Stadium.
This was the second postseason meeting between the Falcons and Eagles. Atlanta won the only prior meeting.
Sunday, January 12, 2003
NFC: Tampa Bay Buccaneers 31, San Francisco 49ers 6
{{Americanfootballbox
|titlestyle=text-align:center;
|title=San Francisco 49ers vs. Tampa Bay Buccaneers – Game summary
|Road=49ers
|R1=3
|R2=3
|R3=0
|R4=0
|Home=Buccaneers
|H1=7
|H2=21
|H3=3
|H4=0
|stadium=Raymond James Stadium, Tampa, Florida
|time=1:00 p.m. EST
|weather=, partly cloudy
|TV=Fox
|TVAnnouncers=Joe Buck (play-by-play), Troy Aikman, Cris Collinsworth (color commentators), and Pam Oliver (sideline reporter)
|referee=Gerald Austin
|attendance=65,599
|scoring=
First Quarter
TB – Mike Alstott 2 yard run (Martín Gramática kick), 6:41. Buccaneers 7–0. Drive: 12 plays, 64 yards, 5:16.
SF – Jeff Chandler 24 yard field goal, 0:22. Buccaneers 7–3. Drive: 12 plays, 63 yards, 6:17.
Second Quarter
TB – Joe Jurevicius 20 yard pass from Brad Johnson (Martín Gramática kick), 9:35. Buccaneers 14–3. Drive: 11 plays, 87 yards, 5:50.
SF – Jeff Chandler 40 yard field goal, 8:36. Buccaneers 14–6. Drive: 5 plays, 9 yards, 0:46.
TB – Rickey Dudley 12 yard pass from Brad Johnson (Martín Gramática kick), 7:31. Buccaneers 21–6. Drive: 2 plays, 16 yards, 1:07.TB – Mike Alstott 2 yard run (Martín Gramática kick), 0:55. Buccaneers 28–6. Drive: 4 plays, 26 yards, 1:10.Third Quarter
TB – Martín Gramática 19 yard field goal, 8:33. Buccaneers 31–6. Drive: 10 plays, 36 yards, 6:16.Fourth QuarterNo scoring plays.}}
The Buccaneers, with the league's top-ranked defense during the 2002 regular season, forced five turnovers, sacked quarterback Jeff Garcia four times, and limited the 49ers to only two field goals. Tampa Bay quarterback Brad Johnson, who had been sidelined for a month, returned to throw for 196 yards and two touchdowns. Fullback Mike Alstott rushed for 60 yards, caught three passes for 27 yards, and scored two touchdowns, while the Buccaneers held onto the ball for 36:46 and held the 49ers to a season low 228 yards. This was San Francisco's first playoff game without a touchdown since 1986, while Tampa Bay finished this game with more points scored than in their last three playoff games combined.
San Francisco had a chance to score early when Rashad Holman intercepted a pass from Johnson on the opening drive and returned it 13 yards to the Buccaneers 40-yard line. But on third down, Bucs defenders Warren Sapp and Derrick Brooks shared a sack on Garcia that pushed the 49ers out of field goal range. Tampa Bay then drove 74 yards in 13 plays with a drive that included 17-yard receptions by Alstott and receiver Keyshawn Johnson, along with four third down conversions. Alstott finished the drive with a 2-yard touchdown run. San Francisco responded as Garcia's 30-yard completion to Tai Streets set up a 24-yard field goal by Jeff Chandler, but the 7–3 score ended up being as close as the 49ers would get for the rest of the game.
Tampa Bay increased their lead to 14-3 early in the second quarter with a 73-yard drive in which Keyshawn Johnson caught two passes for 42 total yards and Brad Johnson finished off with a 20-yard scoring pass to Joe Jurevicius. A pair of 15-yard penalties against the Bucs defense enabled the 49ers to drive back for another Chandler field goal, but a 36-yard pass interference call against San Francisco safety Tony Parrish soon led to another Buccaneer touchdown, this one a 12-yard catch by tight end Rickey Dudley. Later on, Brooks intercepted a pass from Garcia at the 49ers 26-yard line. One play later, Michael Pittman's 22-yard burst moved the ball to the 4-yard line, and Alstott finished the drive with a 2-yard touchdown run, giving Tampa Bay a 28–6 lead with 55 seconds left in the half.
On the first play of the third quarter, Bucs safety Dwight Smith intercepted Garcia and returned the ball six yards to the San Francisco 37, setting up Martín Gramática's 19-yard field goal. This ended up being the final score of the game as both defenses took over from that point on. The closest the Bucs would come to scoring again was a missed 45-yard field goal attempt by Gramatica. Meanwhile, San Francisco's remaining drives would result in two punts, a Garcia fumble that was recovered by Brooks on the Tampa Bay 35, a failed fourth down conversion attempt when Brooks tackled Eric Johnson one yard short of the marker, an interception by Tampa Bay cornerback Ronde Barber (which was returned for a touchdown, but a penalty nullified the runback), and time expiring in the game.
Despite San Francisco's 10–6 record, the NFC West title, and their Wild Card playoff win against the New York Giants, coach Steve Mariucci was fired three days after this game. The 49ers would not return to the playoffs until 2011.
This was the first postseason meeting between the 49ers and Buccaneers.
AFC: Oakland Raiders 30, New York Jets 10
Chad Pennington's dream season came to an end as the Jets quarterback threw two interceptions, lost two fumbles, and was sacked four times (twice by Rod Coleman). Raiders quarterback Rich Gannon threw for 283 yards and two touchdowns as Oakland pulled away from a 10–10 halftime tie by forcing four consecutive turnovers and scoring twenty consecutive second half points.
Aided by a 15-yard run from Curtis Martin and a 20-yard pass interference penalty on Charles Woodson, John Hall's 38-yard field goal gave the Jets an early 3–0 lead before he was matched by a 29-yard field goal from Sebastian Janikowski to tie the game. On the Jets next drive, Travian Smith forced and recovered a fumble from Pennington on New York's 27-yard line. On the next play, running back Charlie Garner fumbled the ball, but Oakland guard Frank Middleton recovered it, and fullback Zack Crockett ended up scoring with a 1-yard touchdown run a few plays later. But Pennington led the Jets back, completing eight of nine passes for 51 yards on an 81-yard drive that took seven minutes off the clock and ended with his 1-yard touchdown pass to Jerald Sowell, tying the game with 22 seconds left in the first half.
Early in the third quarter, Tory James intercepted a pass from Pennington on the Jets 45-yard line. Gannon then went downfield, hitting Tim Brown with a 16-yard completion and then throwing a 29-yard touchdown pass to Jerry Rice. New York turned the ball over on downs with their next possession, and Gannon once again went to work, completing a 50-yard strike to Jerry Porter and finishing the drive with a 9-yard touchdown pass to Rice, increasing the Raiders lead to 24–10. The Jets turned the ball over again when Richie Anderson fumbled a handoff on their ensuing drive. Damien Robinson intercepted a pass from Gannon on the next play, but Oakland's Eric Barton returned the favor with an interception of his own, setting up a 34-yard Janikowski field goal. Janikowski later added another field goal with less than five minutes left in the game.
This was the fourth postseason meeting between the Jets and Raiders. New York won two of the three previous meetings.
Conference Championships
Sunday, January 19, 2003
NFC: Tampa Bay Buccaneers 27, Philadelphia Eagles 10
A game that is now known as Black Sunday in Philadelphia's sports lore, Tampa Bay won on the road for the first time in playoff history, and in temperatures below 32 °F (0 °C), in the last football game played at Veterans Stadium. The Eagles were heavy favorites at home going into the game. The Eagles had beaten the Buccaneers four consecutive times, in the wild card round the two previous seasons, and also during regular-season games in 2001 and 2002. During the two playoff losses, both at Veterans Stadium, Tampa Bay had failed to score a single touchdown.
Eagles running back Brian Mitchell returned the opening kickoff 70 yards to the Tampa Bay 26-yard line, setting up a 20-yard touchdown run by Duce Staley less than a minute into the game. Tampa Bay responded by driving 37 yards and scoring with Martin Gramatica's 48-yard field goal on their ensuing drive. After a Philadelphia punt, Eagles safety Bobby Taylor intercepted a pass from Brad Johnson on the Buccaneers 47-yard line. The Eagles then drove to a fourth down on the 32, but decided to punt rather than try a long field goal. Lee Johnson's 28-yard punt pinned the Buccaneers back at their own 4-yard line. But Tampa Bay stormed 96 yards and scored with Mike Alstott's 1-yard touchdown run to take a 10–7 lead. The key play on the drive was a 71-yard completion from Brad Johnson to Joe Jurevicius on third down and two from their own 24-yard line. According to America's Game, coach Jon Gruden had three receivers stacked tight in a trips formation, and he got Jurevicius on a one-on-one "option" route against the middle linebacker of the Eagles.
Early in the second quarter, Lee Johnson's 64-yard punt pinned the Bucs back on their own 2-yard line. This time the Eagles defense was able to take advantage of the field position, forcing a three-and-out that earned the offense a first down on Tampa Bay 38-yard line after Tom Tupa's 36-yard punt. Philadelphia then drove 26 yards to tie the game 10–10 on a 30-yard field goal from David Akers, but the Bucs responded with an 80-yard, 12-play drive. Johnson completed a 31-yard pass to running back Michael Pittman and a 22-yard strike to Keyshawn Johnson before finishing the drive with a 9-yard touchdown pass to Keyshawn Johnson that gave the team a 17–10 lead. With time running out in the half, Donovan McNabb led the Eagles to the Tampa Bay 24-yard line, only to lose a fumble while being sacked by his high school teammate Simeon Rice, who stripped the ball away and recovered it himself.
On the Eagles' first drive of the third quarter, McNabb lost another fumble due to a tackle from cornerback Ronde Barber, and Bucs defensive tackle Ellis Wyms recovered it. Later on, the Buccaneers took advantage of a 15-yard fair catch interference penalty against Philadelphia that gave them a first down on their own 48, driving 41 yards, including a 19-yard catch by tight end Ken Dilger to score on a 27-yard Martín Gramática field goal with 1:02 left in the third quarter. In the fourth quarter, the Eagles managed to drive 73 yards to Tampa Bay's 10-yard line, but Barber intercepted McNabb's pass with 3:12 left in the game and returned it 92 yards for a touchdown to seal the victory.
This game was somewhat devoid of offensive stars. Jurevicius's single reception for 71 yards made him the leading receiver, while the leading rusher was Staley with a mere 58 yards. Brad Johnson threw for 259 yards and a touchdown. Mitchell, the NFL's all-time leader in both regular season and postseason kickoff return yards, returned four kickoffs for 125 yards and four punts for 34 yards in the final playoff game of his career.
This was the last Eagles game played at Veterans Stadium, which was demolished following the 2003 Major League Baseball season. In a Sports Illustrated'' list of the worst losses in Philadelphia sports history since the city's last title in 1983 published in 2008, this game was ranked first.
Until the Jacksonville Jaguars' appearance in the 2017 AFC championship game, this was the last conference title game to feature a team from Florida.
This was also the Buccaneers' last NFC championship appearance until 2020.
This was the fourth postseason meeting between the Buccaneers and Eagles. Philadelphia had won two of the previous three meetings.
AFC: Oakland Raiders 41, Tennessee Titans 24
Oakland called only one running play in the first three quarters of the game, choosing to rely almost exclusively on the passing of 37-year-old quarterback Rich Gannon. And Gannon proved to be up to the task, leading the Raiders to victory with 286 passing yards and three touchdowns, along with 41 yards and a touchdown on eight carries.
On the first play from scrimmage, Gannon completed a 29-yard pass to Jerry Rice. He went on to complete 5/5 passes for 64 yards and rush for three on a 70-yard drive that ended with his 2-yard touchdown pass to wide receiver Jerry Porter. The Titans countered with a 9-play, 74-yard drive that ended with a 33-yard touchdown pass from Steve McNair to Drew Bennett to tie it up five minutes later. Oakland struck back as Gannon completed a 17-yard pass to Charlie Garner, a 14-yard pass to Jon Ritchie, and then ran the ball 13 yards to the Titans 42. Following a penalty, his 31-yard completion to Porter moved the ball to the 16, and he ended up finishing the drive with a 12-yard touchdown completion to Garner, giving the Raiders a 14–7 lead.
Tennessee then drove 59 yards, featuring a 16-yard scramble by McNair, to cut the score to 14-10 early in the second quarter on Joe Nedney's 29-yard field goal. Later on, Derrick Mason returned a Raiders punt 11 yards to the Titans 45-yard line, sparking a 55-yard drive that ended on McNair's 9-yard touchdown run that gave the team a 17–14 lead with 2:54 left in the half.
Then things fell apart for Tennessee. Backed up at their own 11-yard line by a Shane Lechler punt and simply trying to run out the clock, running back Robert Holcombe fumbled the ball while being tackled by Raiders linebacker Eric Barton, and safety Anthony Dorsett, Holcombe's old teammate who was a member of the Titans when they reached Super Bowl XXXIV, recovered the ball at the Tennessee 16-yard line. On the next play, Rice caught a 15-yard reception at the 1-yard line, and then Gannon found Doug Jolley in the back of the end zone for a 1-yard touchdown pass, giving the Raiders a 21–17 lead. Then on the ensuing kickoff, rookie returner John Simon was stripped of the ball by Tim Johnson, and Alvis Whitted recovered the fumble for Oakland on the Titans' 39-yard line, setting up a 43-yard field goal by Sebastian Janikowski on the last play of the first half, making the score 24–17.
Tennessee took the second half kickoff and drove all the way to the Raiders 22-yard line before McNair was sacked for an 11-yard loss on third down by John Parrella. Because Nedney had been injured making a tackle in the second quarter, Titans coach Jeff Fisher decided to punt rather than attempt a long field goal. The next time they had the ball, Titans punter Craig Hentrich was tackled for a 6-yard loss by Johnson before he could kick the ball, giving Oakland a first down on the Tennessee 19. Janikowski then kicked another field goal to make the score 27–17. This time, the Titans managed to respond, driving 70 yards and scoring with McNair's 13-yard touchdown run to cut their deficit to 27–24. But the Raiders responded with a 66-yard drive, kept alive by a 14-yard pass interference penalty on defensive back Samari Rolle on a third down play in which Gannon threw an incompletion. Garner also made a big impact with an 18-yard run, and eventually Gannon capped the drive off with a 2-yard touchdown run in the fourth quarter. Fullback Zack Crockett later finished a 69-yard drive with a 7-yard touchdown run to put the game away.
As of 2023, this is the last AFC championship game which has not featured Tom Brady, Peyton Manning, Ben Roethlisberger or Patrick Mahomes as a starting quarterback. With the Raiders' approved relocation to Las Vegas for 2020, this would prove to be the last playoff game played at the Oakland–Alameda County Coliseum. In addition, this is, to date, the last Oakland Raiders' playoff victory, as they would not qualify for the playoffs again until 2016.
This was the fourth postseason meeting between the Titans and Raiders. Oakland won all three previous meetings while the Titans were the Houston Oilers.
Super Bowl XXXVII: Tampa Bay Buccaneers 48, Oakland Raiders 21
This was the first Super Bowl meeting between the Raiders and Buccaneers.
Notes and references
NFL.com scores for the 2002 playoffs (Last accessed January 9, 2006)
References
National Football League playoffs
Playoffs |
```xml
export * from './Bar'
export * from './BarCanvas'
export * from './BarItem'
export * from './BarTooltip'
export * from './BarTotals'
export * from './ResponsiveBar'
export * from './ResponsiveBarCanvas'
export * from './props'
export * from './types'
``` |
William Laing Heermance (February 28, 1837 - February 25, 1903) was a Union Army soldier in the American Civil War who received the U.S. military's highest decoration, the Medal of Honor.
Heermance was born on February 28, 1837, and entered service at Kinderhook, New York. He was awarded the Medal of Honor for extraordinary heroism on April 30, 1863, while serving as a Captain with Company C, 6th New York Cavalry Regiment, at Chancellorsville, Virginia. His Medal of Honor was issued on March 30, 1898.
He died at the age of 65, on February 25, 1903, and was buried at the Oakland Cemetery in Yonkers, New York.
Medal of Honor citation
References
External links
1837 births
1903 deaths
People from Kinderhook, New York
People of New York (state) in the American Civil War
Union Army officers
United States Army Medal of Honor recipients
American Civil War recipients of the Medal of Honor |
Paolo Valdagno (16th century) was an Italian physician from Verona.
Biography
His biographical history was written by the Brescian physician Girolamo Donzellini.
Among Valdagno's works are:
De Theriacae usu in Febribus pestilentibus (1570) Brescia
De mixtione Dialogi Duo (1562) Basil
Proclo del moto
Die Quaestiones medicae, (1568) PaviaEudoxi Philalethis Apologia'' (1573) Verona
References
Date of birth unknown
Date of death unknown
17th-century Italian physicians
People from Verona |
The Journal of Things We Like (Lots) (known by its abbreviated name Jotwell) is an online legal journal based at and financially subsidized by the University of Miami School of Law in Coral Gables, Florida, United States.
The journal specializes in short scholarly reviews on topics related to the law and is edited primarily but independently by law school professors. Some, including the Editor-in-Chief, are at the University of Miami School of Law but the large majority are at other law schools in the U.S., Canada, and Europe.
Overview
Jotwell was founded in 2008, with the editorial mission of publishing short reviews (called “jots”) by law professors of what they believe to be the best recent scholarship relevant to their field. These jots are typically 500–1,000 words.
Jotwell is organized into sections, each reflecting a legal specialization are, including constitutional law, corporate law, and intellectual property law. Each section is managed by section editors with independent editorial control. The section editors select ten to twenty contributing editors, each of whom commits to writing once a year, which ensures that each section of the journal contains one or more articles.
The journal's website (jotwell.com) aggregates content and new articles typically appear between three and five times a week. All content is available for free and open to reader comment. Jotwell carries no advertising and is supported by the University of Miami School of Law.
Jotwell editor-in-chief is A. Michael Froomkin, the Laurie Silvers and Mitchell Rubenstein Distinguished Professor of Law at the University of Miami School of Law. Jotwell is published using WordPress and a custom theme.
All Jotwell articles are available under a Creative Commons license, which is an Attribution-Noncommercial-Share Alike 3.0 License.
Jotwell states that its objective is to help academics and others identify the best recent legal scholarship, a task deemed important as law review journals have proliferated, now exceeding 350 in North America alone. The journal’s mission statement also argues that new scholarly intermediaries are needed now that major journals such as the Harvard Law Review and the Yale Law Journal no longer function as "gatekeepers of legitimacy".
In a 2012 Jotwell article, Ross E. Davies, a law professor at George Mason University School of Law and the editor-in-chief of The Green Bag suggested that if Jotwell were to expand "its coverage to include the best old (as well as new) legal scholarship, and occasionally narrowing its focus to the questions presented in a Supreme Court case, it could produce first-rate amicus briefs of scholarship," which would help the Supreme Court in finding scholarship relevant to its decisions.
In 2014, the ABA Journal, published by the American Bar Association, selected Jotwell as one of the top legal blogs of 2013, listing it in its "Blawg 100."
Jotwell has been identified as an example of an ongoing trend towards web-only law journals. It has been criticized as "highly US-centric" even if "really neat". Jotwell has also been criticized for focusing too much on "articles placed in top law journals."
Sections
The number of sections in Jotwell has grown gradually since 2008. Current sections include: administrative law, classics, constitutional law, corporate Law, courts law, criminal law, cyberlaw, equality, family Law, health law, intellectual property law, jurisprudence, Lex (which includes arbitration, art and cultural property law, education law, election law, energy law, environmental Law, immigration law, librarianship and legal technology, and Native Peoples law), legal history, the legal profession, tax law, tort Law, trusts and estates, and workplace law.
References
External links
Official website
American law journals
General law journals
Creative Commons Attribution-licensed journals
University of Miami
2008 establishments in Florida
Irregular journals |
Santa María la Real is a monastery in the small town of Nájera in the La Rioja community, Spain. Originally a royal foundation, it was ceded by Alfonso VI to the Cluniac order. It was an important pilgrimage stop on the Camino de Santiago. It is particularly well known for the woodwork in the choir of the church.
History
The first construction on the site dates back to the 11th century. Santa Maria la Real and the attached royal pantheon were founded by King García Sánchez III of Navarre in 1052. It was later elevated to an episcopal see and placed under Papal authority.
In 1076 the kingdom of Navarre passed into the hands of Alfonso VI of León and Castile. The Mozarabic Rite (sometimes called the Isidorean or Spanish Rite) was replaced with the Latin Rite. The Missal of Silos, a Mozarabic missal which is the oldest known Western manuscript on paper, was created in the monastery in the 11th century.
Cluniac Order
In 1079, the see was transferred to Calahorra, which had been the seat of a bishopric before the Muslim Conquest.
Alfonso gave St María la Real to the Cluniac order and it became one of only two important Cluniac centres South of the Pyrenees. As a center of Cluniac power, the monastery is associated with the introduction of the Cluniac reform to Castile. It appears that this helped Alfonso assert his control over Riojan territory.
In 1142, the Abbot of Cluny Peter the Venerable visited the monastery. While in Spain, he met with translators from the Arabic language and commissioned the first translation into a European language of the Qur'an.
The monastery remained in Cluniac hands until the 15th century, when it was established through Papal mandate as an independent abbacy under Rodrigo Borgia (later Pope Alexander VI), at which time it underwent a major reconstruction.
Later history of monastery
As the popularity of the Camino de Santiago waned, so did the fortunes of the monastery, which depended on the wealth generated by traffic of pilgrims. The monastery fell into a long decay. In the nineteenth century it suffered under the Napoleonic occupation of Spain and anti-monastic legislation in the 1830s (the Ecclesiastical confiscations of Mendizábal) before being declared a national monument in 1889. The fortunes of the monastery further revived with the arrival of Franciscans at the end of the 19th century.
Monastery
The exterior of the Monastery of Santa María la Real de Nájera is a mixture of different styles, fruit of its long story. Defensive needs led to high walls and buttress with the function of bastions. The 17th century left the decoration of the walls and the doors and the squared tower. The portico of the church was built between the years 1621 and 1625.
Inside the monastery, two main areas can be discerned: the church with the Royal Mausoleum and the cloister, so-called of the Knights. The access to the cloister is through the so-called Gate of Charles I. This gate is of flamboyant style and is very decorated; a big coat of arms of Charles I can be found above it with a double-headed eagle. This coat of arms was carried to honor the king, who generously contributed to the construction of the cloister.
The stairs to access the upper cloister can be found next to the gate. This stairs are in Renaissance style and is covered with a hemispherical dome decorated with panels painted in Trompe-l'œil. The central motif of the decoration is a bird: a pelican. The date of its construction is the year 1594 and it is called the Royal Stairs.
The church
The primitive church honoring the Virgen de la Cueva (Virgin of the Cave) was inaugurated in 1052 and consecrates the primitive temple to the Virgin of the Cave. The style of the building is romanesque with Mozarabic influences.
The current temple was built between 1422 and 1453, in flowery Gothic style, presenting stylized and at the same time simple forms. All the vaults are simple ribbed except for the one covering of the central Apse; the side apses are squared and the triforium has almost triangular windows.
The interior has three naves separated with 10 columns. Beneath the choir the entrance to the cave can be found, where the image of the Virgin is believed to have been discovered, a place which has remained unchanged since then.
The main reredos dates back to the 17th century, of baroque style, and with big highly decorated Solomonic columns with vine grapes and leaves. The dressing room (Camarín) of the Virgin is located in the central part, with the original image, surrounded by the founders of the Benedictines, in its male (Saint Benedict) and female (Saint Scholastica) branches and a depiction of the founder kings. The depiction of the elements that are believed to have been found next the image of the Virgin is noteworthy: a jar with Madonna lilies (emblem of the monastery), a lamp and a bell. Above these elements, a frieze tells the story of the discovery of the Virgin by the king Don García. A Calvary concludes the reredos.
In the left aisle, a replica of the former main reredos which existed before the construction of the current can be found. Part of the original is located in the Antwerp museum, where it arrived after being sold in the 19th century. Its author was Hans Memling.
The image of the Virgin
The image which originally leads to the construction of the religious complex is a medieval polychrome (only in the front face) sculpture carved in wood. It depicts the Virgin holding baby Jesus, imparting the blessings with the right hand while holding a ball on the other.
The image was restored in 1948 by the Institute Príncipe de Viana.
The Imperial State Crown, which belongs to the Crown Jewels of the United Kingdom, was created in 1838 for the coronation of Queen Victoria. A ruby can be found on the center of the cross of the front face, coming from a Virgin of the Monastery of Santa María la Real de Nájera and which was taken to England as spoils of war by the Black Prince after assisting Peter the Cruel in his wars.
The cave
The cave where the image was discovered, integrated into the temple, is one of the many that can be found in the surroundings of Nájera and which have had different uses through time. According to the tradition, this is the cave where a small chapel honoring this Virgin originally was located and where it was worshiped. In 1044 the king, who was hunting with falconry, following its hawk found the Virgin with a bouquet of Madonna lilies, a lamp and a bell in this cave. The king attributed the victories which followed in the wars of conquest against the Muslims to the image found.
Until the construction of the main reredos, the image if the Virgin was kept in this place. It was later replaced by other coming from the chapel of the Alcázar Real, which is the one that can be seen today since 1845. This carving dates back to the end of the 13th century. It was restored in 1998. The cave has been one of the places chosen by numbers of noblemen and religious leaders for their burial. Until the restoration works at the end of the 20th century, those tombs were located on the ground of the building.
Choir
Noteworthy in the Choir is the set of chairs, of gothic style. It was created between the years 1493 and 1495, attributing the work management to the brothers Andrés and Nicolás Amutio, and funded by the abbot Pablo Martínez de Uruñuela (they are depicted on the back of the second lower left chair).
The carvings of the backs, as well as of the misericords, are all different from each other and represent religious symbols, scenes of daily life and leading figures at the time. Noteworthy is the carving of the abbatial chair, where the king García of Nájera is depicted.
The set of chairs is crowned by two big paintings. In one of them a gallery with six couples of kings properly identified can be observed. The set is concluded with a baroque depiction of a Benedictine congregation over a frieze with slender pillars which enclose a rococo landscape. It resulted very damaged after the abandonment period of the monumental complex at the end of the 19th century.
Mausoleums and chapels
Royal Mausoleum
The tombs of the kings of the Kingdom Nájera-Pamplona, the precursor of the Kingdom of Navarra, can be found at the feet of the main nave, on both sides of the entrance to the Cave. Here are buried the kings of the Jimena dynasty, or the Abarca dynasty, which hold the throne from 918 to 1076, and which was followed by García Ramírez who ruled from 1135 to 1234. This dynasty comes from the Abarcas.
The sculptural work formed by the funerary coffers is later to the period of the bodies that can be found in them. They are of Renaissance style with certain a Plateresque look. The decoration is austere, the reclining figures of the different personalities with their king attributes and an epitaph corbel are placed above the white stone burial urns. This Mausoleum was built around 1556.
Mausoleum of the infantes
The mausoleum of the infantes can be found on the left aisle where the remains of those royal personalities who did not become kings are located. Among all the tombs the most relevant is the tomb of Blanca Garcés, also known as Blanca of Navarra. Blanca of Navarra's tomb, of which only the lid is preserved, is the only original of the set. It dates back to the 12th century and is a piece of Romanesque manufacture. It is decorated with bas-reliefs which depict scenes of the Gospels and the life of the deceased, who died at a very early age.
Mausoleum of the Dukes of Nájera
The high altar is located on the left side of the mausoleum of Manrique de Lara, duques of Nájera since its creation by the catholic Monarchs in 1482. The dukes of Nájera ruled the city until the year 1600 when they left no successors. The most relevant among them is tomb og the first duke of, known as the Strong, Pedro Manrique III de Lara which played a relevant role in the court of Ferdinand II of Aragon, taking part with him in the Granada War and then as virrey of Navarra after the conquer of this kingdom in 1512. Also buried there is Juan Esteban Manrique de Lara, who was virrey of Navarra in 1521 and who fought by Ignatius of Loyola in the siege of Pamplona.
Cloister of the Knights
Between the years 1517 and 1528 the cloister was built, which combines flowery Gothic in domes and pillars, with plateresque in the tracery of the arcs. Most gravestones of the mural tombs located there belong also to this style.
The arcs, in the number of 24, are decorated with stone traceries, each one of different motifs. This stone latticework appears supported by slender pillars. The upper cloister was built in 1578 above this level.
The name cloister of the Knights is because of the large number of noblemen who chose this place for their burial. Of those tombs, just those located in the walls remain, given that those on the floor were removed during the restoration given the bad conservation status they presented.
Abandonment and misuse of the monumental complex during the 19th century deteriorated the cloister significantly. Right now only the lower cloister is restored.
Chapel of the queen Mencía López de Haro
The entrance to the tomb of the queen of Portugal, Mencía López de Haro, is located on one of the west side corners of the cloister. This lady was the wife, married for the second time, of the Portuguese King Sancho II the Caped. When this king died in the year 1248 Mencía returned to Nájera, where she lived until her death in 1272. The sarcophagus dates back to the 13th century and it is decorated with the coat of arms of Portugal and the coat of arms of López de Haro. Next to Mencía's tomb her brother's and Garci Lasso Ruiz de la Vega's can be found, who died in the battle of Nájera in the year 1367. The chapel was the home of a Christ which was greatly venerated.
Mausoleum of Diego López de Haro, the Good
The lineage of López de Haro hold the title of counts of Nájera and lords of Biscay since king Sancho the Great appointed them until the 19th century.
The Mausoleum of Diego López de Haro, known as the good, 10th lord of Biscay (1170–1214) is located next to the entrance to the church and can be reached at the feet of the main nave, in the south wall of the cloister. At the feet of the sarcophagus of Don Diego her second wife's, Toda Pérez de Azagra, who died in 1216. The urns are Romanesque, but Renaissance external decoration elements were later added. The bas-relieves depict scenes of burial and personalities in clothes of the 18th century.
Access gate to the church
The gate which grants access to the temple is an excellent example of plateresque carving. It dates back to the first half of the 16th century and is decorated with medallions, vegetal motives and fantasy animals grouped in rectangular panels. It is carved in walnut wood.
Notes
External links
Sta. María la Real de Nájera Geocities website
1052 establishments in Europe
Former Roman Catholic dioceses in Europe
Christian monasteries established in the 11th century
Cluniac monasteries in Spain
Franciscan monasteries in Spain
Fortified church buildings in Spain
Monasteries in La Rioja (Spain)
Bien de Interés Cultural landmarks in La Rioja (Spain)
Burial sites of the House of Jiménez |
California Coast University (CCU) is a private for-profit online university based in Santa Ana, California. It is accredited by the Distance Education Accrediting Commission and approved by the State of California. Approximately 8,000 students are enrolled at any given time.
History
California Coast University was founded in 1973 as California Western University, with administration and library facilities located in downtown Santa Ana, California. The name was changed to California Coast University in 1981. In 2010, CCU moved to larger headquarters to accommodate its continued growth.
Academics
California Coast University presently offers undergraduate and graduate programs in business administration, management, marketing, psychology, criminal justice, human resource management, health care management, and education. Academics at California Coast University are offered through five schools: School of Administration and Management, School of Arts and Sciences, School of Behavioral Science, School of Criminal Justice, and School of Education.
Accreditation
CCU was initially accredited by the Distance Education Accrediting Commission (DEAC) on January 8, 2005. DEAC accreditation recognizes the validity of CCU degrees up to doctoral level.
CCU has been approved to operate by the State of California since 1974. Approval to operate is presently granted by the California Bureau for Private Postsecondary Education (BPPE), a unit of the California Department of Consumer Affairs. The BPPE approves private postsecondary schools to operate in the state that meet "minimum standards established by the Bureau for integrity, financial stability, and educational quality."
In 2004, and prior to their DEAC accreditation, the U.S. General Accounting Office (GAO) found that federal employees had improperly received subsidies to attend CCU. The report also found that federal agencies may have incorrectly accepted CCU degrees issued before their accreditation.
Format and delivery
Since the early 1970s, California Coast University has offered off-campus self-paced degree programs to mid-career adults. Students were accepted who had verifiable years of full-time employment in the major field or a closely related field. In the 1980s, seven years of verifiable full time on the job experience were required before entering the doctoral programs. Five years of experience were required to enter the master's degree (MS) programs, and three years of experience were required to enter the baccalaureate (BS) programs. Academic approval by California required not less than nine months or one academic year to complete any degree program (a minimum of three years for the doctoral degrees). Students earn their degrees through a variety of methods including transfer credit from other recognized educational institutions, courses completed at CCU, and specialized, documented, formal training (undergraduate level only). In addition, doctoral students must complete a dissertation focused on research related to the field of education and an oral defense before their dissertation committee.
CCU's academic programs are designed based on research in the field of on-line/distance education, and in support of the university's mission to "...offer quality, affordable, flexible, online undergraduate and graduate educational programs that are valuable both personally and professional to our students." Students enroll and complete degrees for a variety of reasons including enhancing job performance, promotional purposes, salary increases, personal goals, etc. Students utilize library and research facilities in their own geographic areas, or on-line resources provided by CCU. Faculty members are hired based on a combination of educational achievement and as recognized leaders in their respective fields. Curriculum is based on current research and theory in the various fields, and developed by faculty members in conjunction with the curriculum development team.
Originally, California Coast University provided distance education degrees, at the bachelor's, master's and doctoral level, for a variety of majors including business administration, management, psychology, education, and engineering management. Over time, the engineering management programs, along with the other doctoral programs, were phased out in response to a reorientation of the CCU programs in preparation for accreditation by DETC (now DEAC). Students completing programs that were discontinued could complete their degrees in a teach-out agreement with the accreditor. Teach-out agreements are a standard practice required of all recognized educational institutions. During the teach-out phase, qualified faculty continue to work with enrolled students.
Since accreditation, CCU has continued to expand and to offer more distance education programs in the areas of health care administration and management, criminal justice, human resource management, marketing, general studies, and to offer additional master's and professional doctoral degrees in education, since DEAC became authorized by US Department Of Education to accredit professional doctorates.
Notable alumni
Mohammad Hossein Adeli, a diplomat, economist and academic who is presently Secretary General of Gas Exporting Countries Forum.
David Borja, Northern Mariana Islands educator, military veteran, and politician. He was the running mate of gubernatorial candidate Ramon Guerrero in the 2009 gubernatorial election.
Ben Bova, American author of more than 120 works of science fact and fiction, and six-time winner of the Hugo Award.
Joseph V. Cuffari, Inspector General of the Department of Homeland Security.
Jeff Papows, former CEO of Lotus Software Corporation
Walter Martin an American Evangelical Christian minister founder the Christian Research Institute.
Cheryl Saban, philanthropist, advocate for women, Senior Advisor, U.S. Mission to the United Nations, and Representative of the United States to the Sixty-seventh Session of the United Nations General Assembly.
Tim Solobay, Pennsylvania politician who serves as the Fire Commissioner of Pennsylvania. He previously served as a member of the Pennsylvania State Senate and, before that, the Pennsylvania House of Representatives.
Cynthia Denzler, Colombian-American-Swiss alpine skier who competed in the 2010 Winter Olympics.
Jeffrey Goodman, American archaeologist with training in geology and archaeology who also holds degrees from Columbia University, University of Arizona, and the Colorado School of Mines.
Philip Wong Yu-hong, a member of the legislative council, a deputy to the National People's Congress, and vice-chairman of the Chinese General Chamber of Commerce in Hong Kong.
References
External links
Universities and colleges in Orange County, California
Private universities and colleges in California
Distance Education Accreditation Commission
Universities and colleges established in 1973
1973 establishments in California |
Alom Shaha (born 1973) is a British-Bangladeshi science teacher, writer, and filmmaker. His books include The Young Atheist's Handbook: Lessons for Living a Good Life Without God, Mr Shaha's Recipes for Wonder: adventures in science round the kitchen table, and Mr Shaha's Marvellous Machines: adventures in making round the kitchen table. He has also written for The Guardian, The Big Issue, BBC Science Focus, New Humanist and New Scientist and spoken at events such as the Richmond Literature Festival and Cheltenham Science Festival.
Education and early life
Shaha was born in Bangladesh and grew up in a strict Muslim family in the Elephant and Castle area of London where he developed an interest in atheism. He was educated at University College London where he was awarded a Bachelor of Science degree in physics, followed by Imperial College London (Master of Science degree in science communication), Goldsmiths, University of London (Master of Arts degree in creative writing and life writing and King's College London (Postgraduate Certificate in Education (PGCE) Physics).
Career
Shaha is a teacher of physics, previously he taught at Camden School for Girls from 2008 to 2020 and The Watford UTC. He was elected a councillor in the 1998 Southwark London Borough Council election for the London Borough of Southwark for the Liberal Democrats. Shaha is a patron of Humanists UK, who have sent his books to secondary schools in the UK. His work has been recognised by fellowships awarded by the National Endowment for Science, Technology and the Arts (NESTA) and the Nuffield Foundation. He has worked on content creation for the BBC and the Royal Institution.
Popular science
Shaha has published books on popular science aimed at children, teenagers and their families including:
Mr Shaha's Recipes for Wonder: adventures in science round the kitchen table
Mr Shaha's Marvellous Machines: adventures in making round the kitchen table
Why Don't Things Fall Up?: and Six Other Science Lessons You Missed at School
Textbooks
Shaha has co-authored textbooks on GCSE Science and A-Level Physics for the AQA examination board published by Oxford University Press:
Oxford Revise: AQA GCSE Physics
Oxford Revise: AQA A-Level Physics
Oxford Revise: AQA GCSE Combined Science
Media
Alongside appearances on YouTube, Shaha's appearances on mainstream media have included:
Science Shack
What the Victorians Did for Us
Horizon
Personal life
Shaha speaks Sylheti fluently having been born in a small village in the Sylhet Division of Bangladesh.
References
Living people
21st-century British writers
English humanists
Liberal Democrats (UK) councillors
21st-century British educators
1973 births |
Homo Sovieticus (cod Latin for 'Soviet Man') is a pejorative term for an average conformist person in the Soviet Union and other countries of the Eastern Bloc. The term was popularized by Soviet writer and sociologist Aleksandr Zinovyev, who wrote the book titled Homo Sovieticus.
Michel Heller asserted that the term was coined in the introduction of a 1974 monograph "Sovetskye lyudi" ("Soviet People") to describe the next level of evolution of humanity, where the USSR becomes the "kingdom of freedom", the birthplace of "a new, higher type of Homo sapiens - Homo sovieticus".
In a book published in 1981, but available in underground samizdat in the 1970s, Zinovyev also coined an abbreviation homosos (гомосос, literally homosucker).. A synonym of Homo Sovieticus is Sovok.
Characteristics
The idea that the Soviet system would create a new, better kind of Soviet people was first postulated by the advocates of the system; they called the prospective outcome the "New Soviet man". Homo Sovieticus, however, was a term with largely negative connotations, invented by opponents to describe what they saw as the real result of Soviet policies. In many ways it meant the opposite of the New Soviet man, someone characterized by the following:
Indifference to the results of his labour (as expressed in the saying "They pretend they are paying us, and we pretend we are working").
Lack of initiative and avoidance of taking any individual responsibility for anything. Jerzy Turowicz wrote: "it's a person enslaved, incapacitated, deprived of initiative, unable to think critically; he expects – and demands – everything to be provided by the state, he cannot and doesn't want to take his fate in his own hands".
Indifference to common property and to petty theft from the workplace, either for personal use or for profit. A line from a popular song, "Everything belongs to the kolkhoz, everything belongs to me" ("" / vsyo teperь kolkhoznoe, vsyo teperь moyo), meaning that people on collective farms treasured all common property as their own, was sometimes used ironically to refer to instances of petty theft: "Take from the plant every nail, you are the owner here, not a guest" ("" / taschi s zavoda kazhdyj gvozd' - ty zdes' hozyain, a ne gost''').
Chauvinism. The Soviet Union's restrictions on travel abroad and strict censorship of information in the media (as well as the abundance of propaganda) aimed to insulate the Soviet people from Western influence. There existed non-public "ban lists" of Western entertainers and bands, which, in addition to the usual criteria of not conforming to fundamental Soviet values, were added to the list for rather peculiar reasons; one such example being the Irish band U2, the name of which resembled that of Lockheed U-2, a high-altitude U.S. reconnaissance airplane. As a result, "exotic" Western popular culture became more interesting precisely because it was forbidden. Due to limited exposure, entertainers considered minor, B-list, or of low artistic value in the West were regarded as A-list in the Soviet sphere. Soviet officials called this fascination "Idol worshiping the West" ( / idolopoklonstvo pered Zapadom).
Obedience to or passive acceptance of everything that government imposes (see authoritarianism).
In the opinion of a former US ambassador to Kazakhstan, a tendency to drink heavily: "[a Kazakh defence minister] appears to enjoy loosening up in the tried and true Homo Sovieticus style – i.e., drinking oneself into a stupor".
According to Leszek Kolakowski, the Short course history of the CPSU(b) played a crucial role in forming the key social and mental features of the Homo Sovieticus as a "textbook of false memory and double thinking". Over the years, Soviet people were forced to continuously repeat and accept constantly changing editions of the Short course, each containing a slightly different version of the past events. This inevitably led to forming "a new Soviet man: ideological schizophrenic, honest liar, person always ready for constant and voluntary mental self-mutilations".
Opinions
Historian Mikhail Geller defined homo sovieticus as a set of qualities and character traits characteristic of all Soviet people in varying proportions. According to Geller, the Soviet-type system, carrying out "social training", promotes the development, growth and dominance of these qualities. Geller listed the following features of the "Soviet man", as they were officially described by the Soviet ideology: the primary importance of work; boundless devotion to the Motherland; membership in the collective; constant interest in the life of neighbors, from housemates to neighbors on the planet; the state takes full care of this person. Geller believed that if you remove the advertising rhetoric, then these features completely coincide with the description of Zinoviev, and cited the following version of the text from the book "Homo Sovieticus":
According to the English Slavist, a former lecturer at the University of Leeds Frank Ellis, the constant attacks on reason, common sense and the rules of decency both distort and cripple both personality and intellect, abolish the boundary between truth and falsehood. As a result, a Homo sovieticus, full of fear and devoid of intellectual initiative, is formed, which is "a mouthpiece for Party ideas and slogans, it is not so much a human being as a vessel that is filled and emptied at the direction of the Party".
In their articles and lectures , the well-known sociologist Yuri Levada and members of his group Levada Center attributed the following to the typical negative features of Homo soveticus:
indifference to the quality of their work;
theft from workplaces;
lack of initiative and avoidance of any personal responsibility;
understated ambitions;
uncomplaining submission to any actions of the authorities, adaptability;
willingness to carry out any, even immoral orders;
propensity to drink;
suspicion;
guile.
In a number of his works, Levada described the negative personal qualities inherent in the Soviet man and, summing up many years of research, expressed confidence that the Soviet man as a type of personality did not disappear with the collapse of the USSR, but continues to exist in modern Russia and be reproduced in new generations. Moreover, according to the scientist, cynicism and an increase in the level of aggression were added to such negative features as social hypocrisy, paternalism, suspicion and isolationism. According to Levada, these negative changes were again the result of restrictions on public freedoms, as well as distorted economic and moral incentives introduced by the new Russian authorities. As one of the surveys of the study showed, by 2004, the number of people who believe that Russians are no different from residents of other countries has significantly decreased and the number of those who consider Russia a "besieged fortress" surrounded by enemies has increased.
Sociologist M. E. Gabovich, criticizing Levada's research, notes that the researchers did not try to empirically establish the existence of a "Soviet man", but simply, without any justification, declared Soviet society composed of people of a certain "anthropological type", in contrast to Western society, where it is customary to distinguish different types. The purpose of the research was not the question of the specific weight of any type in the population, but only a description of its features. According to Gabovich, the thesis about the very existence of the Levada concept of the Soviet man should first be proved by empirical research, and not postulated. According to Gabovich, the task of Levada and his staff is to "prove the unmodernization of Russia" associated with the idealization of the West, which they have preserved since the 1970s, when, according to L. D. Gudkov, "all mental work in intellectual circles fit into the framework of a neurotic comparison of their real life and vaguely imagined, but seemed reasonable and an orderly life "there", in a "normal society".
According to the Russian scholar-educator Nikolay Nikandrov, the expression Homo sovieticus is an insulting name invented by the critics of Soviet power for the "new man" mentioned as part of the new anthropological construct whose development was declared in the Soviet Union ("Soviet people").
The contemporary American and Russian sociologist and social anthropologist Alexei Yurchak believe that the constant reference to the expression Homo sovieticus in Western academic and publicist discourse manifested assumptions that socialism was "bad", "amoral" or "imposed", expressing ideas about the existence of socialism as such in the Soviet Union and, accordingly, about the inevitable collapse of the Soviet Union.
According to philosopher Artem Magun, the disappointment of a group of Russian intellectuals including Zinovyev and Levada in the Soviet project had extremely negative consequences in the 1970s: elitism in the Soviet intelligentsia, the emergence of an anti-national and anti-populist pathos ("we are heavenly men, we think, but there is gloom and some anthropological degenerates around"). Despite the intellectuals' hypothetical affiliation with the Homo sovieticus, this approach was just a pretense, Magun concluded. Magun concludes that the hostility of the intelligentsia towards the people was the cause of its subsequent (in the 1990s) betrayal, which in turn led to the counter-attack of "Putinist populism".
According to the British weekly The Economist, which devoted a large article to the concept of Homo sovieticus in 2011, after the fall of communism in 1991, both in Russia and in the West, there was hope that Western moral values would take root in Russia, and the country would eventually become one of the developed countries of the world. But, according to journalists, this point of view did not take into account the degree of destruction of the Russian economy, the magnitude of mental exhaustion of people and the depth of moral decay after 70 years of Soviet power. No one had any idea what type of state would replace the USSR and what it meant to "be Russian".
See also
Authoritarian personality
Brainwashing
Heart of a Dog Idiocracy''
Mankurt
Tibla
Vatnik (slang)
References
Further reading
Cambra, Fernando P. de. Homo sovieticus. La vida actual en Rusia. - Barcelona : Ediciones Petronio, 1975. - 296 p.
"The long life of Homo sovieticus" The Economist, Dec 10th 2011
Anti-communism
Political pejoratives for people
Soviet phraseology
Soviet culture
Latin political words and phrases
Dog Latin words and phrases |
Andy Ray Mill (born February 11, 1953) is a former alpine ski racer on the U.S. Ski Team. He was two-time Olympian, competing primarily in the downhill and combined events on the World Cup circuit.
Ski career
Born in Fort Collins, Colorado, Mill moved with his family to Laramie, Wyoming, before relocating to Aspen, Colorado, in the early 1960s. Mill was an accomplished junior racer and made the U.S. Ski Team in 1971, and in 1974, Mill competed at the World Championships in St. Moritz, Switzerland. For the next seven years, when not injured, he was America's top downhill racer. In the mid-1970s, Mill was nicknamed "Wilde Hund" (wild dog) by Europeans for his gritty style and appearance (long hair & beard).
Mill's finest hour was at the 1976 Winter Olympics in Innsbruck, Austria, where he placed sixth in the downhill at Patscherkofel, which was won dramatically by Franz Klammer of Austria. Mill's finish was the best by an American in the men's downhill in 24 years, since Bill Beck's fifth place in 1952. Mill had placed fifth in the previous year's World Cup event on the same run, his best World Cup finish.
Following the Olympics, Mill won the downhill at the 1976 U.S. Alpine Championships. Two years later, he competed at the 1978 World Championships in Garmisch, West Germany, and the 1980 Olympics in Lake Placid, where he was 16th in the downhill. His racing career ended in January 1981 after a serious crash in a training run on the Lauberhorn in Wengen, Switzerland.
In 1988, Mill was presented with the U.S. Olympic Spirit Award in recognition for overcoming adversity in the 1976 Olympic Games, where he placed sixth in the downhill, even though injured. His lower right leg was so badly bruised from a training injury that he could not stand without pain the day before the race. In order to compete, he froze his leg in the snow minutes before entering the starting gate.
World Cup results
Top ten finishes
World championship results
From 1948 through 1980, the Winter Olympics were also the World Championships for alpine skiing.
Olympic results
After ski racing
Since his retirement from ski racing in 1981, Mill has worked as a ski racing commentator with ESPN, NBC, ABC, and CBS. He has a syndicated show in major ski areas in the U.S. entitled Ski with Andy Mill, which he hosts, writes and produces.
Mill has served on the boards of the Aspen Educational Foundation, the U.S. Olympic Educational Ski Foundation for the U.S. Ski Team, Aspen Winterclub Foundation, and National Atlantic Salmon Fishing Federation.
After his ski racing career concluded, Andy Mill found another passion - tarpon fishing. A lifelong fisherman, he brought a similar level of dedication and perfection to fishing. Although he admittedly struggled for quite a few years, he eventually mastered the art of tarpon fishing and went on to become only the second angler to win 5 Gold Cup Tarpon tournaments and be a triple crown winner in tarpon fishing (Gold Cup, Hawley, and Golden Fly). Mill has also hosted an outdoor show on OLN as well as fished for a number of fish including marlin, sailfish, bonefish, and permit, among others.
Personal life
He was divorced from his first wife, Robin, a former Miss California. On July 30, 1988, in Boca Raton, Florida, Andy Mill married tennis star Chris Evert, whom he had met 19 months earlier at a New Year's Eve party at the Hotel Jerome in Aspen. After 18 years of marriage and three sons, they were divorced in December 2006 in Fort Lauderdale, Florida, citing irreconcilable differences. Evert had left Mill for golfer and former friend of the couple, Greg Norman. Mill received $7 million in cash & securities from Evert, the $4 million house in Aspen, and several vehicles. After their divorce, Mill wished Evert and Greg Norman 'happiness'. He became engaged to Debra Harvick of Aspen in 2009 and proposed marriage after their third date. Mill and Harvick married shortly before Evert and Norman separated after only 15 months of marriage. Mill is now divorced from Harvick. Harvick, whom Mill also describes as his best friend, enjoyed such hobbies together as biking along coastlines, skiing, fishing, and bow hunting.
References
External links
Andy Mill World Cup standings at the International Ski Federation
Sports Illustrated – The Downhill: Majesty and Madness – 11-February-1980
American male alpine skiers
Olympic alpine skiers for the United States
Alpine skiers at the 1976 Winter Olympics
Alpine skiers at the 1980 Winter Olympics
Sportspeople from Fort Collins, Colorado
Sportspeople from Aspen, Colorado
1953 births
Living people
People from Laramie, Wyoming
Olympic Games broadcasters
Skiing announcers |
Meionite is a tectosilicate belonging to the scapolite group with the formula Ca4Al6Si6O24CO3. Some samples may also contain a sulfate group. It was first discovered in 1801 on Mt Somma, Vesuvius, Italy. It was named by Rene Just Haüy after μειωυ, the Greek word for less, in reference to the less acute pyramidal form as compared to Vesuvianite.
As an end-member of the scapolite solid solution, meionite has the largest cell dimension and very high thermal stability at high pressures. This indicates that meionite is one of the primary minerals in deep seated basic or intermediate magmatic processes. Meionite also breaks down to grossularite + kyanite + quartz + calcite at high pressure, similar to the upper pressure limits of anorthite . This sets its occurrence to the crustal rocks.
References
Tectosilicates
Calcium minerals
Tetragonal minerals
Minerals in space group 87 |
Mt. Healthy City School District Board of Education v. Doyle, 429 U.S. 274 (1977), often shortened to Mt. Healthy v. Doyle, was a unanimous U.S. Supreme Court decision arising from a fired teacher's lawsuit against his former employer, the Mount Healthy City Schools. The Court considered three issues: whether federal-question jurisdiction existed in the case, whether the Eleventh Amendment barred federal lawsuits against school districts, and whether the First and Fourteenth Amendments prevented the district, as a government agency, from firing or otherwise disciplining an employee for constitutionally protected speech on a matter of public concern where the same action might have taken place for other, unprotected activities. Justice William Rehnquist wrote the opinion.
The case was first heard in the Southern District of Ohio. In 1971, Fred Doyle, who had been teaching social studies for five years in the Mount Healthy City Schools, learned his contract had not been renewed, not only denying him tenure but any further employment with the district. The superintendent's letter cited both an incident where he had made an obscene gesture to students and his sharing of a district dress code for teachers with a local radio station as displaying a "lack of tact". He took a position with another district and filed suit under Section 1983, arguing his constitutional rights to free speech had been violated, per the Court's 1967 decision in Pickering v. Board of Education, another case involving an untenured teacher fired for speaking out in the media. After the district court ruled in his favor, the school district appealed to the Sixth Circuit Court of Appeals, which partially vacated the decision in a brief per curiam opinion late in 1975.
The Supreme Court took the case and heard oral argument almost a year later. It handed down its decision early in 1977. On the jurisdictional question, Rehnquist held that although the school district had been created by state law, it was primarily a local entity and thus beyond the reach of the Eleventh Amendment, its first ruling in that area in 86 years. The Court did not, however, decide the question of whether Doyle had been fired legally, since there were other incidents suggesting he had difficulties in his relationships with students and fellow teachers which the district had introduced into the record. Instead, it remanded the case to the district court, ordering it to require the district to show by a preponderance of evidence that Doyle would have been fired regardless if he had not contacted the radio station. The school district was later able to do so, and in 1982 the Sixth Circuit upheld that decision.
The case introduced what has since become known as the "Mt. Healthy test" into similar cases that follow the Pickering line in asserting the First Amendment rights of public employees where the employer claims other, unprotected conduct motivated the adverse action, a two-prong process that shifts the burden of proof from plaintiff to defendant in the course of the action. First, the plaintiff must prove that the activity they were allegedly disciplined for was indeed protected speech. The defendant must then show by a preponderance that the adverse action would have occurred if the protected activity had never happened. This has been criticized as allowing public employers a way to circumvent restrictions on taking adverse action against whistleblowers, and more generally as incompatible with the underlying principles of tort law. The test has also been expanded into mixed motive discrimination cases in employment law.
Underlying dispute
Doyle had begun teaching in Mt. Healthy, Ohio, a suburb of Cincinnati, in 1966. His one-year contract with the school system was renewed three times; in 1969 the contract term was extended to two years. Were it to be renewed, Doyle also expected to be granted tenure and commit to teaching at Mt. Healthy for the long term.
During the 1970 school year, he served as president of the school's Teachers' Association, and worked to expand the subjects of negotiations between it and the school board. The following year he was on the association's executive board. During this time relations between the association and the board were reportedly very tense, and Doyle was at the center of several incidents during 1970. As the Court recounted them:
In February 1971 the principal circulated a memo to all employees outlining a new dress code, apparently motivated by the administration's belief that public support for the district's bond issues was in part motivated by the teachers' appearance. Doyle, as an association official, had been aware that the administration was considering such a measure but had been led to believe that the association would have had some input before it was announced. He thus shared the memo with a friend at Cincinnati radio station WSAI, which used it as the basis for an on-air news item.
Doyle later apologized to the principal, saying he should have expressed his concerns over the administration's handling of the issue privately before making the memo public. A month later the district's superintendent made his annual recommendations to the board on whether to renew the contracts of untenured faculty. Doyle was one of nine whom he did not recommend rehiring, and the board accepted the recommendations and voted not to renew the contracts, denying Doyle tenure and terminating his employment with the Mt. Healthy schools.
Doyle asked for a reason he had not been rehired, and later received a short written note. The board cited his "notable lack of tact in handling professional matters which leaves much doubt as to your sincerity in establishing good school relationships." It pointed to two specific instances of this: his obscene gesture to the girls in the cafeteria and his leaking of the dress-code memo which "raised much concern not only within this community, but also in neighboring communities."
Lower courts
Shortly after the school year ended Doyle accepted another teaching position, for less pay but with tenure, at Miami Trace High School, midway between Cincinnati and Columbus. He and two of the other fired teachers brought suit in federal court for the Southern District of Ohio, seeking reinstatement, back pay and $50,000 in punitive damages for violations of their civil rights under Section 1983. They named as defendants the board as a governmental entity, its members and the superintendent individually in their official and personal capacities. Judge Timothy Sylvester Hogan heard the case.
The school district's defenses were primarily procedural, in particular challenging whether federal courts had the jurisdiction over it in this case. Doyle relied on the Court's 1968 Pickering v. Board of Education decision, in which it unanimously held in favor of an untenured Illinois teacher fired for writing a letter skeptical of a school tax increase to a local newspaper, to assert his First Amendment rights against similar retaliatory action by the Mt. Healthy board. That case, however, had been appealed to the Supreme Court from the Illinois Supreme Court, having originated in that state's courts.
For two reasons, the school district claimed, there was no federal jurisdiction. First, as an "arm of the state", under the Eleventh Amendment, it was entitled to the same sovereign immunity since Ohio law did not consent to litigation against school districts for violations of constitutional rights. Second; Since Doyle had taken another job so soon after his dismissal, his lost wages were minimal and thus the amount in controversy was less than the $10,000 required for federal jurisdiction.
It raised two other defenses that addressed Doyle's substantive claims. In 1972's Board of Regents of State Colleges v. Roth, the Court had held that an untenured professor did not have a due process claim over the nonrenewal of his contract (as opposed to a dismissal prior to the expiration of the contract term) without a property or liberty interest at stake. Therefore, the district argued, neither did Doyle. And even if he did, his history of misconduct and intemperate outbursts was sufficient justification for his termination.
Hogan ruled in Doyle's favor on every issue; although he dismissed the case against the board members as individual defendants. The statute creating school districts had effectively waived any Eleventh Amendment protection. And since Doyle had filed his suit under the section of the law that creates federal-question jurisdiction, limitations such as the amount in controversy did not apply. He felt Pickering gave him no leeway to decide whether Doyle would have been fired without leaking the memo, an act which he found had played "a substantial role" in the board's decision. Doyle was to be reinstated and reimbursed over $5,000 in back pay plus $6,000 in attorney's fees.
The district appealed the verdict to the Sixth Circuit Court of Appeals. In late 1975, the appellate court affirmed all of Hogan's decision save for attorney's fees, which per the Supreme Court's recent decision in Alyeska Pipeline Co. v. Wilderness Society it believed were not a permissible award in the case. The district petitioned the Supreme Court for certiorari, and it was granted early the following year.
Before the Court
In their reply brief, the school board raised the issue of whether or nor the district itself was a "person" that could be sued under Section 1983. At trial, Hogan had ruled that since the case had been filed under the statute allowing for federal-question jurisdiction, it was properly a 1983 case as well and was not subject to any limitations of that statute. In a string of cases brought against local governments dating to 1961's Monroe v. Pape, it had held that they were not "persons" and could not be sued under 1983. Three years earlier, in a case similar to Doyle's, a district court in Colorado had held that school districts were not persons under those precedents, and it was this case the district relied on.
Oral argument was scheduled for late in 1976. Philip Olinger, the school district's lawyer, argued their case. Michael Gottesman appeared for Doyle.
Argument for board
No sooner had Olinger finished his review of the facts of the case when Justice William Rehnquist began questioning him about the nature of school districts in Ohio, using Rehnquist's native Arizona as a point of comparison. Were the boards named as defendants in lawsuits? Who paid verdicts against them? Were they provided for by the state constitution? What was their authority to tax and how much money did the state contribute to them? In his native Virginia, Justice Lewis Powell noted, school board members were "constitutional officers." Olinger told him that was as far as he knew not the case in Ohio.
When he was able to turn to the specifics of the case, Olinger reminded the justices that Hogan had agreed that, other than Doyle's contact with WSAI, the board had ample reason not to renew his contract. The rest of the argument focused on the jurisdictional issues. Olinger said that the difference between Doyle's salaries at Mt. Healthy and Miami Trace was too small to reach the $10,000 threshold. Pressed by one of the justices, he admitted that he was not taking into account the difference it might have made over the course of several years of employment; however he said it was entirely possible that Doyle's potential top salary step at his new school would be higher than it might be at Mt. Healthy.
Olinger explained to the court that language in Ohio's 1912 constitution allowing the legislature to pass laws under which the state could be sued had, shortly after its adoption, raised the question among the state's legal community of whether Ohio had, by doing so, surrendered its sovereign immunity. After a series of cases on this question, the Ohio Supreme Court had held in 1922, following the Court's Hans v. Louisiana decision, that if the state were to do so, it would have to be by a specific act of the legislature. He dismissed Doyle's suggestion that the Court, as it had done with the Fourth Amendment in Bivens v. Six Unknown Named Agents, find an implied cause of action in the Fourteenth Amendment that would allow lawsuits regardless of any statutory provision. Lastly, he reminded the justices that, when Section 1983 was adopted, Congress rejected an amendment explicitly allowing for actions against states and local governments.
Argument for Doyle
While he understood the jurisdictional issue was most important to them and planned to discuss it first, Gottesman told the justices, he hoped to spend some time on the facts of the case. He conceded that the implied cause of action he saw was not necessary to establish jurisdiction. Rather, it had been a response to the school district's late argument that it was not a person under Section 1983, and that he should have cross-appealed Hogan's ruling, in which he dismissed the case against the individual members as defendants, but did not because he did not expect that issue to arise again.
But he begged the Court's indulgence because under Kenosha v. Bruno, another one of the cases following Monroe, if the school district had the same Eleventh Amendment immunity as a municipality Doyle could not seek equitable relief such as his reinstatement against the board as an entity; he would have had to do it against the members personally. If the case were remanded in its present state, he said, he would be unable to proceed even if he won on all the other issues. Since Congress had changed the federal-question statute since Bivens, he felt that created the implied cause of action from the enabling language in the Fourteenth Amendment.
"It may be the most important civil rights question this court is going to in the next decade", Gottesman reminded the justices. "The lower courts are deciding this issue by the legions." Nevertheless, he allowed that they might want to wait for a case where the issue was briefed by both parties.
Having devoted most of his time to the jurisdictional arguments, he asked for some time to speak about the merits near the end. "If we only knew what the school board would have done but for the phone call [to WSAI]," Gottesman suggested, "we know how to ... deal with this case." The Court should follow precedent from civil-rights and labor law and put the burden of proving that on the defendant. Otherwise, "every school board that wants to fire someone for a First Amendment reason, well ... no teacher can teach for five years without doing something somebody would find objectionable. Even though their motivation is solely the First Amendment reason, they'll tack on two or three other reasons." At a justice's prompting, he likened it to the harmless error rule in appellate review.
Opinion of the Court
Two months later, early in 1977, the Court handed down its decision. The justices had unanimously ruled in Doyle's favor on all the jurisdictional questions. And on the merits, they said, the school district would have to prove that it would have fired him for reasons unrelated to his leaking the memo to the radio station.
Procedural issues
Justice William Rehnquist wrote for the Court. First, he said, the amount in controversy did not defeat Doyle's claim to jurisdiction since "[e]ven if the District Court had chosen to award only compensatory damages and not reinstatement, it was far from a 'legal certainty' at the time of suit that Doyle would not have been entitled to more than $10,000. "Rehnquist agreed with Gottesman that the possibility of an implied cause of action in the Fourteenth Amendment was an important question, yet "one that should not be decided on this record."
Since Doyle had made the suggestion in response to the board's late resurrection of its claim to non-personhood, Rehnquist dealt with that. Had the board properly preserved the issue, he noted, the Court would have been obliged to decide it. But it had not, and since Doyle's claim to federal-question jurisdiction seemed like a legitimate constitutional issue and not one claimed for the sole purpose of obtaining federal jurisdiction, "we leave those questions for another day, and assume, without deciding, that the respondent could sue under § 1331 without regard to the limitations imposed by 42 U.S.C. § 1983."
The Court had chosen a different approach to the Eleventh Amendment question. Rather than agree with Hogan that Ohio had waived sovereign immunity for its school districts through the statute that had created them, "we prefer to address instead the question of whether such an entity had any Eleventh Amendment immunity in the first place, since if we conclude that it had none it will be unnecessary to reach the question of waiver," Rehnquist wrote. Ohio law itself was very clear—the state did not include local "political subdivisions" and the school district was a political subdivision. While it received guidance and some money from the state Department of Education, it was one of many local school districts in the state and had broad authority to levy property taxes and issue bonds financed by those tax revenues. "On balance, the record before us indicates that a local school board such as petitioner is more like a county or city than it is like an arm of the state ... it was not entitled to assert any Eleventh Amendment immunity from suit in the federal courts."
Substantive issues
Rehnquist then turned to the merits of the case. After recounting in some detail Doyle's history of intemperate behavior in his years at Mt. Healthy and the contact with the radio station, he rejected the board's argument that Roth barred Doyle's claim since he did not have tenure. Instead he followed Roth's companion case, Perry v. Sindermann, another case Gottesman had argued, with distinct similarities to Doyle's. In Perry, a Texas public junior college professor who had, like Doyle, been president of a faculty organization that clashed with the administration, challenged the nonrenewal of his contract. In contrast to Roth, the Court had ruled that he had alleged enough facts to make an arguable case that the nonrenewal was retaliatory action for his speech on a matter of public concern, and so it would for Doyle.
Lastly Rehnquist considered Hogan's admission that while he read Pickering as mandating that Doyle be reinstated with tenure and back pay for the board's violation of his constitutional rights, there were certainly other reasons the board could have cited to justify the firing that were not constitutionally actionable. Since under state law the board did not even have to show cause for the nonrenewal, "it is not clear what the District Court meant by this latter statement." The only "plausible" meaning Rehnquist could divine was that the board could have fired Doyle anyway even if he had never called the radio station.
In that case, Rehnquist went on, it would not necessarily have been a constitutional violation for an adverse action to have resulted even significantly from protected activity. The Court did not want to leave that reading in place, since it would allow a misbehaving employee to insulate themselves from adverse action by engaging in protected conduct.
It was, Rehnquist wrote, necessary to establish a test for future such cases. He looked to other areas of the law to formulate one. In two prior criminal cases, Lyons v. Oklahoma and Parker v. North Carolina the Court had allowed the use of later confessions or statements by defendants even where earlier ones had been coercively obtained as long as the later statements appeared otherwise voluntarily given. "While the type of causation on which the taint cases turn may differ somewhat from that which we apply here, those cases do suggest that the proper test to apply in the present context is one which likewise protects against the invasion of constitutional rights without commanding undesirable consequences not necessary to the assurance of those rights." Since Doyle had met his burden of showing that one of the actions for which the board terminated him was constitutionally protected speech, "the District Court should have gone on to determine whether the Board had shown by a preponderance of the evidence that it would have reached the same decision as to respondent's re-employment even in the absence of the protected conduct." The Court could not determine this from the available record, so it vacated the Sixth Circuit and remanded the case to District Court to facilitate that inquiry.
Subsequent proceedings
On remand, Hogan did as the Supreme Court ordered. He concluded that "the Board has established by a preponderance of the evidence that Doyle would not have been renewed because of the incidents—exclusive of the radio incident—which had occurred during the year or so prior to the nonrenewal" and ruled in its favor. Doyle appealed this finding of fact to the Sixth Circuit.
A panel composed of the circuit's chief judge at the time, George Clifton Edwards, Jr., Albert J. Engel, Jr. and senior judge John Weld Peck II heard arguments in late 1981. A little over a month later, four years and two days after the Supreme Court's decision in the case, they issued a brief per curiam opinion that largely recounted the history of the case to that point. "We read this record as disclosing that while appellant Doyle had some fine qualities as a teacher, he also had a very quick temper," they wrote. "[W]e cannot find that the district judge's finding of fact on remand is clearly erroneous." They affirmed his decision.
Subsequent jurisprudence
Later cases that rely on Mt. Healthy have largely concerned the eponymous test derived from the case. The Supreme Court expanded its application to other areas of the law, for now leaving it to the appeals courts to wrestle with the specifics.
Supreme Court
Two years later, the Court was able to reinforce the "Mt. Healthy test" in another, very similar case. Givhan v. Western Line Consolidated School District came on appeal from the Fifth Circuit, which had upheld the firing of a Mississippi teacher for, in part, her regular and vehement complaints to her principal about the racially disparate impact of school-district policies in the wake of court-ordered desegregation. The appeals court distinguished the case from Pickering and Mt. Healthy by noting that her complaints, despite involving a matter of public concern, had been made privately.
Rehnquist, again writing for a unanimous court, held that the context of the speech made no difference under the First Amendment; it was as protected as Pickering's letter and Doyle's telephone call. The Fifth Circuit, writing before the Supreme Court had decided Mt. Healthy, had been in much the same position with regards to the factual record with regards to the Supreme Court in Mt. Healthy. "while the District Court found that petitioner's 'criticism' was the 'primary' reason for the School District's failure to rehire her, it did not find that she would have been rehired but for her criticism." It remanded the case to the district court again to resolve that issue; unlike Doyle, Givhan ultimately triumphed.
Over the course of the 1980s the Court would extend the test to claims alleging other improper adverse employment action in the private sector as well. In National Labor Relations Board v. Transportation Management Co., it unanimously endorsed the board's use of the test in upholding its ruling in favor of a bus-company employee alleging he was fired for his attempts to organize a union, contrary to the other reasons claimed by the company. Two years later, Rehnquist again wrote for a unanimous Court that, Mt. Healthy "suppl[ies] the proper analysis" in 1985's Hunter v. Underwood, finding Alabama's felony disenfranchisement laws were primarily meant to target black voters even if they also affected poor whites.
The Court extended the Mt. Healthy test to private-sector mixed motive discrimination claims in 1989 with Price Waterhouse v. Hopkins. There, Justice William J. Brennan, Jr. wrote for a plurality that clarified the language it had used in Givhan: "A court that finds for a plaintiff under this standard has effectively concluded that an illegitimate motive was a 'but-for' cause of the employment decision." The decision's imposition of a shift in the burden of proof from plaintiff to defendant once the former has proved that an improper reason motivated the adverse action was criticized in Anthony Kennedy's dissent as only narrowly applicable to such cases.
Appeals courts
By 1992 the Fifth Circuit could assert that "the two-step burden-shifting rule ... has now become standard fare in discrimination cases" in the third and final appeal by a Mississippi newspaper alleging that local government withdrew legal advertising in retaliation for critical coverage. The district court had found the first-ever application of the test to a case involving denial of public patronage "strained"; Judge John Robert Brown disagreed, saying it was" broad enough potentially to lend itself to a wide variety of fact patterns" and remanded the case.
In a pair of cases, the Seventh Circuit has dealt with how and when to instruct a jury that is given the Mt. Healthy test to apply. In Greenberg v. Kmetko it directed a district court to change its instruction to more closely match the test should the case be heard by a jury, even though it had granted qualified immunity to the defendants. Frank Easterbrook observed in 1992's Gooden v. Neal, where a correctional officer alleged he had been demoted in retaliation for exposing corruption, that "[m]any defendants do not want Mt. Healthy instructions and prefer to ask an either-or question of the jury" since they also contend the activity the adverse action was in retaliation for was not protected by the First Amendment. "Mt. Healthy is something of a misfit in such circumstances." In that case, where the employer denied that the plaintiff's speech was in any way related to the adverse decision, they chose to shift the burden of proof of that to the employer as well, an approach Donald P. Lay of the Eighth Circuit, sitting by designation, criticized at length in dissent. In 2002, the Ninth Circuit held that the test still applies when a plaintiff presents only a circumstantial case that the adverse action was retaliatory as opposed to a direct one.
"In the aftermath of Mt. Healthy," wrote Sandra Lynch for the First Circuit in 2004, "confusion still sometimes arises about the issue of causation." She was writing in one of several cases it heard in the mid-2000s arising from alleged political retaliation in Puerto Rico, where members of the New Progressive Party (NPP) brought suit claiming that members of the rival Popular Democratic Party (PDP) had improperly forced them out of government jobs after the PDP defeated the incumbent NPP in the commonwealth's 2000 elections. Many of them involved the correctness of jury instructions on the subject. Since the employer's defense largely rested on the illegality of personnel moves by the outgoing NPP so that its members could keep their jobs, Lynch elaborated:
Since the jury instructions had not included a direct question as to whether they found that the defendants would have taken the same action without the political consideration, the First Circuit overturned the jury's finding for the plaintiffs and remanded the case for retrial with a proper jury instruction.
In Tejada-Batista v. Morales, where a discharged Puerto Rico Special Investigations Bureau agent alleged retaliation by a superior for his contact with a local newspaper, then-Chief Judge Michael Boudin denied defendants' request that a Mt. Healthy instruction be allowed, as it was "not on point" since he did not feel they had introduced enough evidence to support a claim that there were permissible reasons to take adverse action. Gene Carter dissented, arguing that the verdict should have been reversed since the evidence suggested one of the named defendants had no knowledge of anything but the domestic violence charge that was the stated reason Tejada had been fired.
Judge Juan R. Torruella, in Rodriguez-Marin v. Rivera-Gonzalez, another of the political cases, characterized the Mt. Healthy test as an affirmative defense. In that case, not only did the court find that it was insufficient for the defendants to merely introduce evidence that would be sufficient for a jury to find that they had other reasons to take action against the plaintiffs, they had to show that a reasonable jury could have found for them. Similarly, the court held that a jury instruction that a finding that the plaintiffs' political affiliations and activities were the "determinative factor" in the defendants' actions against them met the test's requirements.
In 2011, the Second Circuit affirmed a successful use of the Mt. Healthy defense in a case where it had found one constitutionally protected speech act was a motivation for the adverse action. The plaintiff in Anemone v. Metropolitan Transportation Authority was the former head of security for the agency, who claimed his attempts to root out corruption in the agency had been ignored or frustrated by his superiors. At one point he had discussed it with a reporter from The New York Times, which eventually published a story about the allegations.
Judge Debra Ann Livingston wrote for a panel that took two years to decide the case. It found that while that act was constitutionally protected, the balancing test established by Pickering v. Board of Education actually improved the MTA's case under Mt. Healthy, since although it was speech on a matter of public concern it was disruptive to the MTA's operations since it breached the confidentiality the plaintiff was required to maintain about security matters and internal investigations as part of his job duties. Even if it had not been so disruptive, the court held, his record of insubordination and deception of several of the defendants was enough reason for him to have been disciplined and fired—indeed he had even admitted he believed his job to be in jeopardy before he had contacted the Times.
Analysis and commentary
Three years after the decision, E. Gordon Gee, then a professor at West Virginia University College of Law, described it as a turning point in First Amendment jurisprudence.
He anticipated the later efforts of the First and Seventh circuits in working out how to implement the Mt. Healthy test: "The major effect of Mt. Healthy will be felt, and struggled with, in the trial courts. [It] provides little guidance ... on the amount and type of evidence required of the plaintiff to shift the burden of proof to the defendant."
Some tort-law specialists have been very critical of the burden-shifting test. Georgia law professor Michael L. Wells finds it at odds with the fundamental principles of tort law and thus wrongly decided. "It should be replaced by a rule that allows the plaintiff to recover full damages when the constitutional violation was sufficient to cause them." The Court, he wrote in 2000, could have found other causation tests in tort law that were fairer to the plaintiff than but-for, such as suffi. "It is especially ill-suited to constitutional torts charging retaliation for the exercise of First Amendment rights" since it ensures that an employee who speaks out on a matter of public concern will have to consider the possibility that his or her employer will find some plausible reasons for taking action against him apart from his protected speech or other activity.
Sheldon Nahmod of Chicago-Kent College of Law shares Wells's criticism. He points to one case in particular where the Court seemed to recognize the theory that constitutional violations should always be grounds for liability regardless of whatever other issues exist. In Carey v. Phipus, decided a year after Mt. Healthy, the Court held that two students challenging their suspensions were entitled to prove that their due process rights were violated as they alleged even if the suspensions themselves turned out to have been factually justified. While not a constitutional claim, he also looks to 1995's McKennon v. Nashville Banner Publishing Co., a case under the Age Discrimination in Employment Act, where an age discrimination verdict against a private employer was upheld even though the respondent had concededly met the Mt. Healthy burden with evidence of her wrongdoing because that evidence was discovered subsequent to the employee's termination.
Other commentators have focused on the Eleventh Amendment aspects. New York lawyer Anthony J. Harwood reads the decision as establishing, along with the 1979 case Lake County Estates v. Tahoe Regional Planning Board, a test to determine when a political subdivision is not an arm of the state and thus does not enjoy the state's sovereign immunity.
Despite the existence of this test, however, he notes that lower courts have generally followed Lincoln County v. Luning, the last case before Mt. Healthy to pose an Eleventh Amendment question to the Court regarding state political subdivisions, regardless of whether the case invokes federal-question or diversity jurisdiction. "This practice is contrary to the balance of state and federal interests that inheres in the Supreme Court's Eleventh Amendment doctrine."
See also
List of United States Supreme Court cases involving the First Amendment
List of United States Supreme Court cases, volume 429
Notes
References
Further reading
Roth, Mitchell; "The Effect of Mt. Healthy City School District v. Doyle upon Public Sector Labor Law: A Union Perspective" 10 J.L. & Educ. 517 (1981).
Koerner, John; "Between Healthy and Hartman: Probable Cause in Retaliatory Arrest Cases"; 109 Colum. Law Rev. 4, 755–797 (2009).
External links
1977 in United States case law
United States Constitution Article Three case law
United States Supreme Court cases
United States Supreme Court cases of the Burger Court
United States Free Speech Clause case law
United States state sovereign immunity case law
United States public employment case law
United States constitutional torts case law
United States federal question jurisdiction case law
United States due process case law
Education in Hamilton County, Ohio
National Education Association |
The 2013 ITF Men's Circuit is the 2013 edition of the entry level tour for men's professional tennis, and is the third tier tennis tour below the Association of Tennis Professionals, World Tour and Challenger Tour. It is organised by the International Tennis Federation (ITF) who additionally organizes the ITF Women's Circuit which is an entry level tour for women's professional tennis. Future tournaments are organized to offer either $10,000 or $15,000 in prize money and tournaments which offering hospitality to players competing in the main draw give additional ranking points which are valid under the ATP ranking system, and are to be organized by a national association or approved by the ITF Men's Circuit Committee.
The tournaments are played on a rectangular flat surface, commonly referred to as a tennis court. The dimenstion of a tennis court are defined and regulated by the ITF and the court is long, wide. Its width is for singles matches and for doubles matches. Tennis is played on a variety of surfaces and each surface has its own characteristics which affect the playing style of the game. There are four main types of courts depending on the materials used for the court surface, clay, hard, grass and carpet courts with the ITF classifying five different pace settings ranging from slow to fast.
Point distribution
Key
Month
January
February
March
References
External links
International Tennis Federation official website
ITF Futures tournaments
ITF Futures results archive
01-03 |
```c++
#include "voxel_instance_library_scene_item.h"
namespace zylann::voxel {
void VoxelInstanceLibrarySceneItem::set_scene(Ref<PackedScene> scene) {
if (scene != _scene) {
_scene = scene;
notify_listeners(IInstanceLibraryItemListener::CHANGE_SCENE);
}
}
Ref<PackedScene> VoxelInstanceLibrarySceneItem::get_scene() const {
return _scene;
}
void VoxelInstanceLibrarySceneItem::_bind_methods() {
ClassDB::bind_method(D_METHOD("set_scene", "scene"), &VoxelInstanceLibrarySceneItem::set_scene);
ClassDB::bind_method(D_METHOD("get_scene"), &VoxelInstanceLibrarySceneItem::get_scene);
ADD_PROPERTY(
PropertyInfo(Variant::OBJECT, "scene", PROPERTY_HINT_RESOURCE_TYPE, PackedScene::get_class_static()),
"set_scene",
"get_scene"
);
}
} // namespace zylann::voxel
``` |
WCKK (96.7 FM, "Kicks 96") is an American radio station licensed to serve Walnut Grove, Mississippi. The station's broadcast license is held by Boswell Media, LLC.
Programming
WCKK broadcasts a country music format. The morning show, "The Morning House Party," features Eric Matthews, Lora Beckham, and news with Dave Ingram. Kicks 96 can be heard from Starkville to Jackson and from Winona to Meridian. Eric Matthews left the Morning House Party after a successful 13 years with WCKK moving back to his hometown of Elyria, Ohio. Award winning Mississippi newscaster Dave Ingram died in 2016.
Stance Bingham, a 30-year radio veteran, became the new host of "The Morning House Party" in July 2017. The new show line-up features news with Mina Mooney, "Minute with the Mayor" segment with Philadelphia, MS Mayor James Young, and live updates with WTOK-TV Philadelphia Bureau Reporter Ashleigh Fortenberry.
History
In October 2009, Johnny Boswell Radio, LLC applied to the Federal Communications Commission (FCC) for a construction permit for a new broadcast radio station. The FCC granted this permit on November 16, 2010, with a scheduled expiration date of November 16, 2013. The new station was assigned call sign "WCKK" on December 3, 2010. After construction and testing were completed in June 2011, the station was granted its broadcast license on November 30, 2011.
References
External links
WCKK official website
CKK
Country radio stations in the United States
Radio stations established in 2011
Leake County, Mississippi
2011 establishments in Mississippi |
```smalltalk
#if !__WATCHOS__ && !MONOMAC
using System;
using System.Drawing;
using Foundation;
using UIKit;
using NUnit.Framework;
namespace MonoTouchFixtures.UIKit {
[TestFixture]
[Preserve (AllMembers = true)]
public class DictationPhraseTest {
[Test]
public void Defaults ()
{
using (UIDictationPhrase dp = new UIDictationPhrase ()) {
Assert.Null (dp.AlternativeInterpretations, "AlternativeInterpretations");
Assert.Null (dp.Text, "Text");
}
}
}
}
#endif // !__WATCHOS__
``` |
Michael Demaree McCurry is best known for having served in Bill Clinton's administration as the nation's 20th White House Press Secretary. He is a Washington-based communications consultant and is associated with the firm Public Strategies Washington, Inc. He is also active within the administration of the United Methodist Church, serving as a lay delegate to the Church General Conference and on various denominational boards. He currently co-chairs the Commission on Presidential Debates. Born in Charleston, South Carolina, he was educated at Princeton University and Georgetown University.
Education and early career
McCurry was born in Charleston, South Carolina, and raised in the San Francisco Bay Area. He attended San Carlos High School on the San Francisco Peninsula from 1969 to 1971 and then transferred to Ravenswood High School in East Palo Alto, where he graduated in 1972. During his senior year in high school, McCurry served as Governor of the California Junior State, a student-run mock government that today is better known as the Junior State of America.
McCurry earned his Bachelor of Arts degree from Princeton University in 1976 and a Master of Arts degree from Georgetown University in 1985. He began his political career as press secretary to the Committee on Labor and Human Resources, as well as press secretary to Senator Harrison A. Williams from 1976 to 1981. Between 1981 and 1983, he served as press secretary to Senator Daniel Patrick Moynihan.
From 1988 to 1990, McCurry served as director of communications for the Democratic National Committee, and served as press secretary for the presidential campaigns of John Glenn (1984), Bruce Babbitt (1988), and Bob Kerrey, (1992), as well as the 1988 vice-presidential campaign for Lloyd Bentsen.
Prior to serving in the White House as press secretary to Clinton, McCurry served as spokesman for the Department of State from 1993 to 1995, as well as chief spokesman for Warren Christopher.
Post-Clinton career
McCurry serves on numerous boards or advisory councils for organizations including Share Our Strength, the Junior State of America Foundation, Children's Scholarship Fund, the Wesley Theological Seminary, United Methodist Communications and the White House Historical Association. He is co-chairman of the Commission on Presidential Debates.
He once responded to the Taco Liberty Bell incident by saying that the federal government was also "selling the Lincoln Memorial to Ford Motor Co. and renaming it the Lincoln-Mercury Memorial". He was well respected by the press corps during his tenure, but his honesty and competency were not always appreciated by his colleagues. In 1998 he expressed doubts about Bill Clinton's fitness to remain in office.
Starting May 2005, McCurry was a contributing blogger at The Huffington Post; as of November 2008, however his most recent contribution was dated May 2006. In December 2008, McCurry wrote "How my party found God" for The Daily Beast. In the biographical blurb with the column, it was reported that he was a graduate student at Wesley Theological Seminary.
McCurry is a partner at the influential Washington, D.C.-based government relations firm Public Strategies Washington, Inc. In 2006, in his position as co-chairman of Hands Off the Internet, he lobbied against Internet regulations in the controversial network neutrality debate.
On April 15, 2009, it was announced that McCurry and George W. Bush press secretary Ari Fleischer would both work as temporary media aides to Conservative Prime Minister of Canada Stephen Harper. The two aides were enlisted by the PMO to elevate Harper's and Canada's profiles with American news outlets.
In a later round of the network neutrality fight, in 2011, McCurry came out in favor of the Stop Online Piracy Act (SOPA)/Protect IP Act, representing them as a way to combat online theft. In an opinion piece in Politico on the subject, which drew a favorable comment from the MPAA, McCurry said the new proposals addressed concerns of past critics.
On June 15, 2011, McCurry and Arts + Labs co-chair Mark McKinnon sponsored the "CREATE -- A Forum on Creativity, Commerce, Copyright, Counterfeiting and Policy" conference with members of Congress, artists and information-business executives.
References
External links
Clinton administration personnel
Communications consultants
Georgetown University alumni
Living people
People from Charleston, South Carolina
People from Kensington, Maryland
United States Department of State spokespeople
Wesley Theological Seminary
White House Press Secretaries
20th-century Methodists
21st-century Methodists
American United Methodists
Year of birth missing (living people) |
Federico Salvatore (17 September 1959 – 19 April 2023) was an Italian singer-songwriter and comedian.
Life and career
Born in Naples, Salvatore started his career in the late 1980s as a stand-up comedian and as a singer-songwriter of humorous and satirical songs. After enjoying local success, he became nationally well-known during the 1990s thanks to his semi-regular participation in the Canale 5 program Maurizio Costanzo Show. Produced by Giancarlo Bigazzi, he got a significant success with the albums Azz... and Il mago di Azz, which were both certified platinum.
In 1996, he entered the main competition at the 46th edition of the Sanremo Music Festival with the song "Sulla porta", the first Sanremo Festival song having homosexuality as main theme. In 2001, he entered the Festival di Napoli competition with "Se io fossi San Gennaro", a ballad about Naples which raised controversy because of his lyrics critical of the social situation of the city.
Struck by a cerebral haemorrhage in October 2021, he never fully recovered, and died on 19 April 2023, at the age of 63.
Discography
Album
1989 – Na tazzulella 'e ca...baret
1990 – Pappagalli lat(r)ini
1991 – Incidente al Vomero
1992 – Cabarettombola
1993 – Storie di un sottosviluppato... sviluppato sotto!!!
1994 – Superfederico
1995 – Azz...
1996 – Il mago di Azz
1997 – Coiote interrotto
2000 – L'azz 'e bastone
2002 – L'osceno del villaggio
2004 – Dov'è l'individuo?
2009 – Fare il napoletano... stanca!
2011 – Se io fossi San Gennaro – LIVE
2013 – Pulcin'hell
2020 – Sta luna pare ’na scorza ’e limone
References
External links
1959 births
2023 deaths
Deaths from intracranial haemorrhage
Singers from Naples
Italian male singer-songwriters
Italian singer-songwriters |
```javascript
Abbreviate commands in npm
Deprecate npm packages
Combining script commands in npm
List binaries for scripting in npm
devDependencies in `npm`
``` |
Implerstraße is an U-Bahn station in Munich on the and the .
References
External links
Munich U-Bahn stations
Railway stations in Germany opened in 1975
1975 establishments in West Germany |
Mykhailyna Mykhailivna Roshkevych (1859 - 1957) was a Ukrainian folklorist and memoirist. One of the first writers in Galicia, whom Ukrainian writers Ivan Franko and Mykhailo Pavlyk called a "great talent." Mother of the Ukrainian artist Ivan Ivanets.
Early life and education
Maria Roshkevych was born in Uhornyky village, Stanislaviv district, Austrian empire (now Ivano-Frankivsk district, Ukraine). She was the daughter of the Ukrainian Greek Catholic Church priest, Mykhailo Roshkevich and Maria Rudenska. She was given a double name - Mykhailyna-Maria - after her parents. From 1864, Roshkevych lived in the village of Lolyn (now Dolyna district of Ivano-Frankivsk region), where her father Mykhailo Roshkevich was appointed to the parish.
Works
Roshkevich is the author of memoirs about Ukrainian writer Ivan Franko's stay in Lolyna. Folk songs collected by her, Ivan Franko used in the study Women's plight in Russian folk songs (1883). And the song about the gendarme, recorded by Mykhailyna Roshkevich from a resident of Lolyna, Yavdokha Chigur, became the impetus for Franko's writing of the drama Stolen Happiness. Roshkevich also wrote literary sketches of life in Lolyna.
Roshkevych's work The Godmother with the Godmother was published in the magazine “Molot” as "a fascinating depiction of the life of women in Lolyna" with a favorable assessment from the publishing house, which wished that "the young author would not abandon such work in the future."
In 1877, Roshkevich published two stories from folk life: This is what God has judged the fate of and Mother-in-law in the women's almanac "The First Wreath" in Lviv. After the death of her father in 1886, Roshkevych's family left Lolyna village. They had to move out of the rectory because the new priest of the Church of St. Nicholas was moving there. Roshkevych was sheltered in Bolehov by writer Natalya Kobrynska for four years until she got married.
Roshkevych married a priest Yosyp Ivanets. She often visited Ivan Franko, particularly when he was ill. She lived to the age of 98 in Czechoslovakia, where she moved to her youngest son, Roman. Roshkevych died in 1957 in Czechoslovakia.
References
1859 births
1957 deaths
Ukrainian folklorists
Ukrainian women folklorists
Ukrainian women writers
People from Austria-Hungary |
```go
package cli
import (
"encoding/json"
"errors"
"fmt"
"os"
"time"
"github.com/urfave/cli"
)
var statsCmd = cli.Command{
Name: "stats",
Usage: "view stats",
Action: stats,
Flags: []cli.Flag{
cli.Int64Flag{
Name: "site-id",
Usage: "ID of the site to retrieve stats for",
},
cli.StringFlag{
Name: "start-date",
Usage: "start date, expects a date in format 2006-01-02",
},
cli.StringFlag{
Name: "end-date",
Usage: "end date, expects a date in format 2006-01-02",
},
cli.BoolFlag{
Name: "json",
Usage: "get a json response",
},
},
}
func stats(c *cli.Context) error {
start, _ := time.Parse("2006-01-02", c.String("start-date"))
if start.IsZero() {
return errors.New("Invalid argument: supply a valid --start-date")
}
end, _ := time.Parse("2006-01-02", c.String("end-date"))
if end.IsZero() {
return errors.New("Invalid argument: supply a valid --end-date")
}
// TODO: add method for getting total sum of pageviews across sites
siteID := c.Int64("site-id")
result, err := app.database.GetAggregatedSiteStats(siteID, start, end)
if err != nil {
return err
}
if c.Bool("json") {
return json.NewEncoder(os.Stdout).Encode(result)
}
fmt.Printf("%s - %s\n", start.Format("Jan 01, 2006"), end.Format("Jan 01, 2006"))
fmt.Printf("===========================\n")
fmt.Printf("Visitors: \t%d\n", result.Visitors)
fmt.Printf("Pageviews: \t%d\n", result.Pageviews)
fmt.Printf("Sessions: \t%d\n", result.Sessions)
fmt.Printf("Avg duration: \t%s\n", result.FormattedDuration())
fmt.Printf("Bounce rate: \t%.0f%%\n", result.BounceRate*100.00)
return nil
}
``` |
```python
#
# Properties
#
_PROPERTIES__SCHEMA = """
version: 2
models:
- name: model_a
columns:
- name: id
tags: [column_level_tag]
data_tests:
- unique
- name: incremental_ignore
columns:
- name: id
tags: [column_level_tag]
data_tests:
- unique
- name: incremental_ignore_target
columns:
- name: id
tags: [column_level_tag]
data_tests:
- unique
- name: incremental_append_new_columns
columns:
- name: id
tags: [column_level_tag]
data_tests:
- unique
- name: incremental_append_new_columns_target
columns:
- name: id
tags: [column_level_tag]
data_tests:
- unique
- name: incremental_sync_all_columns
columns:
- name: id
tags: [column_level_tag]
data_tests:
- unique
- name: incremental_sync_all_columns_target
columns:
- name: id
tags: [column_leveL_tag]
data_tests:
- unique
"""
#
# Models
#
_MODELS__INCREMENTAL_SYNC_REMOVE_ONLY = """
{{
config(
materialized='incremental',
unique_key='id',
on_schema_change='sync_all_columns'
)
}}
WITH source_data AS (SELECT * FROM {{ ref('model_a') }} )
{% set string_type = 'varchar(10)' %}
{% if is_incremental() %}
SELECT id,
cast(field1 as {{string_type}}) as field1
FROM source_data WHERE id NOT IN (SELECT id from {{ this }} )
{% else %}
select id,
cast(field1 as {{string_type}}) as field1,
cast(field2 as {{string_type}}) as field2
from source_data where id <= 3
{% endif %}
"""
_MODELS__INCREMENTAL_IGNORE = """
{{
config(
materialized='incremental',
unique_key='id',
on_schema_change='ignore'
)
}}
WITH source_data AS (SELECT * FROM {{ ref('model_a') }} )
{% if is_incremental() %}
SELECT id, field1, field2, field3, field4 FROM source_data WHERE id NOT IN (SELECT id from {{ this }} )
{% else %}
SELECT id, field1, field2 FROM source_data LIMIT 3
{% endif %}
"""
_MODELS__INCREMENTAL_SYNC_REMOVE_ONLY_TARGET = """
{{
config(materialized='table')
}}
with source_data as (
select * from {{ ref('model_a') }}
)
{% set string_type = 'varchar(10)' %}
select id
,cast(field1 as {{string_type}}) as field1
from source_data
order by id
"""
_MODELS__INCREMENTAL_IGNORE_TARGET = """
{{
config(materialized='table')
}}
with source_data as (
select * from {{ ref('model_a') }}
)
select id
,field1
,field2
from source_data
"""
_MODELS__INCREMENTAL_FAIL = """
{{
config(
materialized='incremental',
unique_key='id',
on_schema_change='fail'
)
}}
WITH source_data AS (SELECT * FROM {{ ref('model_a') }} )
{% if is_incremental() %}
SELECT id, field1, field2 FROM source_data
{% else %}
SELECT id, field1, field3 FROm source_data
{% endif %}
"""
_MODELS__INCREMENTAL_SYNC_ALL_COLUMNS = """
{{
config(
materialized='incremental',
unique_key='id',
on_schema_change='sync_all_columns'
)
}}
WITH source_data AS (SELECT * FROM {{ ref('model_a') }} )
{% set string_type = 'varchar(10)' %}
{% if is_incremental() %}
SELECT id,
cast(field1 as {{string_type}}) as field1,
cast(field3 as {{string_type}}) as field3, -- to validate new fields
cast(field4 as {{string_type}}) AS field4 -- to validate new fields
FROM source_data WHERE id NOT IN (SELECT id from {{ this }} )
{% else %}
select id,
cast(field1 as {{string_type}}) as field1,
cast(field2 as {{string_type}}) as field2
from source_data where id <= 3
{% endif %}
"""
_MODELS__INCREMENTAL_APPEND_NEW_COLUMNS_REMOVE_ONE = """
{{
config(
materialized='incremental',
unique_key='id',
on_schema_change='append_new_columns'
)
}}
{% set string_type = 'varchar(10)' %}
WITH source_data AS (SELECT * FROM {{ ref('model_a') }} )
{% if is_incremental() %}
SELECT id,
cast(field1 as {{string_type}}) as field1,
cast(field3 as {{string_type}}) as field3,
cast(field4 as {{string_type}}) as field4
FROM source_data WHERE id NOT IN (SELECT id from {{ this }} )
{% else %}
SELECT id,
cast(field1 as {{string_type}}) as field1,
cast(field2 as {{string_type}}) as field2
FROM source_data where id <= 3
{% endif %}
"""
_MODELS__A = """
{{
config(materialized='table')
}}
with source_data as (
select 1 as id, 'aaa' as field1, 'bbb' as field2, 111 as field3, 'TTT' as field4
union all select 2 as id, 'ccc' as field1, 'ddd' as field2, 222 as field3, 'UUU' as field4
union all select 3 as id, 'eee' as field1, 'fff' as field2, 333 as field3, 'VVV' as field4
union all select 4 as id, 'ggg' as field1, 'hhh' as field2, 444 as field3, 'WWW' as field4
union all select 5 as id, 'iii' as field1, 'jjj' as field2, 555 as field3, 'XXX' as field4
union all select 6 as id, 'kkk' as field1, 'lll' as field2, 666 as field3, 'YYY' as field4
)
select id
,field1
,field2
,field3
,field4
from source_data
"""
_MODELS__INCREMENTAL_APPEND_NEW_COLUMNS_TARGET = """
{{
config(materialized='table')
}}
{% set string_type = 'varchar(10)' %}
with source_data as (
select * from {{ ref('model_a') }}
)
select id
,cast(field1 as {{string_type}}) as field1
,cast(field2 as {{string_type}}) as field2
,cast(CASE WHEN id <= 3 THEN NULL ELSE field3 END as {{string_type}}) AS field3
,cast(CASE WHEN id <= 3 THEN NULL ELSE field4 END as {{string_type}}) AS field4
from source_data
"""
_MODELS__INCREMENTAL_APPEND_NEW_COLUMNS = """
{{
config(
materialized='incremental',
unique_key='id',
on_schema_change='append_new_columns'
)
}}
{% set string_type = 'varchar(10)' %}
WITH source_data AS (SELECT * FROM {{ ref('model_a') }} )
{% if is_incremental() %}
SELECT id,
cast(field1 as {{string_type}}) as field1,
cast(field2 as {{string_type}}) as field2,
cast(field3 as {{string_type}}) as field3,
cast(field4 as {{string_type}}) as field4
FROM source_data WHERE id NOT IN (SELECT id from {{ this }} )
{% else %}
SELECT id,
cast(field1 as {{string_type}}) as field1,
cast(field2 as {{string_type}}) as field2
FROM source_data where id <= 3
{% endif %}
"""
_MODELS__INCREMENTAL_SYNC_ALL_COLUMNS_TARGET = """
{{
config(materialized='table')
}}
with source_data as (
select * from {{ ref('model_a') }}
)
{% set string_type = 'varchar(10)' %}
select id
,cast(field1 as {{string_type}}) as field1
--,field2
,cast(case when id <= 3 then null else field3 end as {{string_type}}) as field3
,cast(case when id <= 3 then null else field4 end as {{string_type}}) as field4
from source_data
order by id
"""
_MODELS__INCREMENTAL_APPEND_NEW_COLUMNS_REMOVE_ONE_TARGET = """
{{
config(materialized='table')
}}
{% set string_type = 'varchar(10)' %}
with source_data as (
select * from {{ ref('model_a') }}
)
select id,
cast(field1 as {{string_type}}) as field1,
cast(CASE WHEN id > 3 THEN NULL ELSE field2 END as {{string_type}}) AS field2,
cast(CASE WHEN id <= 3 THEN NULL ELSE field3 END as {{string_type}}) AS field3,
cast(CASE WHEN id <= 3 THEN NULL ELSE field4 END as {{string_type}}) AS field4
from source_data
"""
#
# Tests
#
_TESTS__SELECT_FROM_INCREMENTAL_IGNORE = """
select * from {{ ref('incremental_ignore') }} where false
"""
_TESTS__SELECT_FROM_A = """
select * from {{ ref('model_a') }} where false
"""
_TESTS__SELECT_FROM_INCREMENTAL_APPEND_NEW_COLUMNS_TARGET = """
select * from {{ ref('incremental_append_new_columns_target') }} where false
"""
_TESTS__SELECT_FROM_INCREMENTAL_SYNC_ALL_COLUMNS = """
select * from {{ ref('incremental_sync_all_columns') }} where false
"""
_TESTS__SELECT_FROM_INCREMENTAL_SYNC_ALL_COLUMNS_TARGET = """
select * from {{ ref('incremental_sync_all_columns_target') }} where false
"""
_TESTS__SELECT_FROM_INCREMENTAL_IGNORE_TARGET = """
select * from {{ ref('incremental_ignore_target') }} where false
"""
_TESTS__SELECT_FROM_INCREMENTAL_APPEND_NEW_COLUMNS = """
select * from {{ ref('incremental_append_new_columns') }} where false
"""
``` |
This is a list of shipwrecks located in the region of Oceania.
Australia
Federated States of Micronesia
Chuuk
During World War II, Chuuk Lagoon (then known as Truk) was the logistical hub of Japan's operations in the South Pacific theatre. In February 1944, in preparation for the forthcoming Battle of Eniwetok, the United States Navy launched an attack on the atoll. Over the course of two days, a series of airstrikes devastated the Japanese fleet, in an offensive codenamed Operation Hailstone. A total of 50 ships were sunk, although many key Japanese warships had been relocated the week before, and thus escaped destruction.
Palau
Yap
Indonesia
Kiribati
Marshall Islands
New Zealand
Papua New Guinea
Polynesia
Samoa
Pitcairn Islands
Tahiti
Solomon Islands
Ironbottom Sound
Ironbottom Sound is the name given to the stretch of water between Guadalcanal and Florida Island, because of the dozens of ships and planes that sank there during the Guadalcanal Campaign in 1942–43.
References
Further reading
External links
WRECKSITE Worldwide free database of + 65,000 wrecks with history, maritime charts and GPS positions
Oceania
Shipwrecks |
Qari Ismail, a Taliban commander, was credited with downing an American Special Forces helicopter responding to Operation Red Wings in June 2005, killing all 16 soldiers aboard.
On 2 October 2003, Ismail, Ahmed Khadr and his son Abdulkareem, al-Jowfi, al-Iraqi and Khalid Habib were all staying at a South Waziristan safe house. The following day, after Fajr prayers, Khadr told his son that Pakistani troops had warned a raid was scheduled in the village, and told him to start moving. A few minutes later, a Pakistani helicopter team and hundreds of security forces attacked the village.
In August 2004, Pakistan reported that it had arrested Ismail as a "key element" of al-Qaeda.
References
Taliban members
Living people
Year of birth missing (living people)
Deobandis |
Alpha Coronae Australis or α Coronae Australis, officially named Meridiana (), is the brightest star in the constellation of Corona Australis and is located about 125 light-years from Earth.
Nomenclature
α Coronae Australis (Latinised to Alpha Coronae Australis) is the star's Bayer designation.
It is the only star in the constellation with a traditional proper name, Alphekka Meridiana (Latin for 'Alphekka South'), after Alphecca, the brightest star in the constellation Corona Borealis. The name Alphecca or Alphekka is Arabic, short for نير الفكّة nayyir al-fakka "the bright (star) of the broken (ring of stars)". In 2016, the IAU organized a Working Group on Star Names (WGSN) to catalog and standardize proper names for stars. The WGSN approved the name Meridiana for this star on 5 September 2017 and it is now so included in the List of IAU-approved Star Names.
In Chinese, (), meaning River Turtle, refers to an asterism consisting of Alpha Coronae Australis, Alpha Telescopii, Eta¹ Coronae Australis, Zeta Coronae Australis, Delta Coronae Australis, Beta Coronae Australis, Gamma Coronae Australis, Epsilon Coronae Australis, HD 175362, Kappa² Coronae Australis and Theta Coronae Australis. Consequently, the Chinese name for Alpha Coronae Australis itself is (, .).
Properties
Alpha Coronae Australis belongs to the spectral class A2Va, making it an A-type star like Vega. Like the latter, it has excess infrared radiation, which indicates it may be ringed by a disk of dust. It has an apparent magnitude of +4.10. The star's mass and radius are estimated at 2.3 times the Sun's mass and radius. With an effective temperature of roughly 9,100 K, the star radiates a total luminosity of about 31 times the Sun's. This star is roughly 254 million years old. A rapidly rotating star, it spins at almost 200 km per second at the equator, making a complete revolution in approximately 14 hours, close to its breakup velocity.
See also
Lists of stars in the constellation Corona Australis
Class A Stars
Vega
Circumstellar disk
References
A-type main-sequence stars
Corona Australis
Coronae Australis, Alpha
Durchmusterung objects
178253
094114
7254
Meridiana |
Warwick District Council elections are held every four years. Warwick District Council is the local authority for the non-metropolitan district of Warwick in Warwickshire, England. Since the last boundary changes in 2019, 44 councillors have been elected from 17 wards.
Political control
The first election to the council was held in 1973, initially operating as a shadow authority before coming into its powers on 1 April 1974. Since 1974 political control of the council has been held by the following parties:
Leadership
The leaders of the council since 1995 have been:
Council elections
1973 Warwick District Council election
1976 Warwick District Council election
1979 Warwick District Council election
1983 Warwick District Council election (New ward boundaries)
1987 Warwick District Council election
1991 Warwick District Council election
1995 Warwick District Council election (District boundary changes took place but the number of seats remained the same)
1999 Warwick District Council election
2003 Warwick District Council election (New ward boundaries increased the number of seats by 1)
2007 Warwick District Council election (Some new ward boundaries)
2011 Warwick District Council election
2015 Warwick District Council election (New ward boundaries)
2019 Warwick District Council election (New ward boundaries)
2023 Warwick District Council election
By-election results
1995-1999
1999-2003
2003-2007
2007-2011
2015-2019
2019-2023
Town Council by-elections
2019-2023
References
External links
Warwick District Council
Council elections in Warwickshire
Warwick District
District council elections in England |
```java
/*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
/* This is stub code written based on com.oracle.truffle.api.nodes package
* javadoc published for GraalVM. It makes possible to compile code, which uses
* GraalVM features on JDK 8. The compiled stub classes should never be
* included in the final product.
*/
package com.oracle.truffle.api.nodes;
/**
*
* @author Tomas Hurka
*/
public class LanguageInfo {
public String getId() {return null;}
}
``` |
Gazzoli is an Italian surname. Notable people with the surname include:
Chiara Gazzoli (born 1978), Italian footballer
Massimo Gazzoli (born 1975), Italian footballer
Michele Gazzoli (born 1999), Italian cyclist
Italian-language surnames |
```objective-c
/* Various declarations for functions found in mbchar.c
This file is part of GCC.
GCC is free software; you can redistribute it and/or modify it under
Software Foundation; either version 2, or (at your option) any later
version.
GCC is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or
for more details.
along with GCC; see the file COPYING. If not, write to the Free
Software Foundation, 59 Temple Place - Suite 330, Boston, MA
02111-1307, USA. */
#ifndef GCC_MBCHAR_H
#define GCC_MBCHAR_H
#ifdef MULTIBYTE_CHARS
/* Escape character used for JIS encoding */
#define JIS_ESC_CHAR 0x1b
#define ISSJIS1(c) (((c) >= 0x81 && (c) <= 0x9f) || ((c) >= 0xe0 && (c) <= 0xef))
#define ISSJIS2(c) (((c) >= 0x40 && (c) <= 0x7e) || ((c) >= 0x80 && (c) <= 0xfc))
#define ISEUCJP(c) ((c) >= 0xa1 && (c) <= 0xfe)
#define ISJIS(c) ((c) >= 0x21 && (c) <= 0x7e)
extern int local_mbtowc PARAMS ((wchar_t *, const char *, size_t));
extern int local_mblen PARAMS ((const char *, size_t));
extern int local_mb_cur_max PARAMS ((void));
/* The locale being used for multibyte characters in string/char literals. */
extern const char *literal_codeset;
#endif /* MULTIBYTE_CHARS */
#endif /* ! GCC_MBCHAR_H */
``` |
Whiskey Run Township is one of nine townships in Crawford County, Indiana. As of the 2010 census, its population was 1,911 and it contained 881 housing units.
Geography
According to the 2010 census, the township has a total area of , all land.
Cities and towns
Milltown (west half)
Unincorporated towns
Hogtown
Idlewild (extinct)
Wynnsboro (extinct)
Adjacent townships
Posey Township, Washington County (northeast)
Blue River Township, Harrison County (east)
Spencer Township, Harrison County (southeast)
Jennings Township (southwest)
Sterling Township (west)
Liberty Township (northwest)
Southeast Township, Orange County (northwest)
Major highways
Indiana State Road 64
Indiana State Road 66
Cemeteries
The township contains four cemeteries: Saint Josephs, Union Chapel, Milltown Community and Totten.
References
United States Census Bureau cartographic boundary files
U.S. Board on Geographic Names
External links
Indiana Township Association
United Township Association of Indiana
Townships in Crawford County, Indiana
Townships in Indiana |
The Hôtel-Dieu de Montréal (founded in 1645) was the first hospital established in Montreal, Quebec, Canada.
Hôtel-Dieu, literally translated in English as Hotel of God, is an archaic French term for hospital, referring to the origins of hospitals as religious institutions.
Its emergency room and function as an active hospital ended in 2017, and as of 2020 serves as a COVID-19 test site during the COVID-19 pandemic in Montreal.
History
The origins of the Hôtel-Dieu de Montréal date to the arrival in 1642 of Paul Chomedey and a small party of French settlers on the Island of Montreal to found the French colony of Ville-Marie. Among them was Jeanne Mance, the first nurse in New France. She founded the hospital on October 8, 1645, as confirmed by letters patent of Louis XIV of France in April 1669.
In addition to returning to France to seek financial support for the hospital, in 1657 Mance recruited three sisters of the Religious Hospitallers of St. Joseph (Religieuses hospitalières de Saint-Joseph) order of nuns to serve with her as staff. Their order was founded in 1636 by a layman, Jérôme Le Royer de la Dauversière, along with Mother Marie de la Fere (fr), in La Fleche, France. Guillaume Bailly, a Sulpician missionary, is credited with drawing up the plans for the stone structure that was built in 1688.
The hospital burned and was rebuilt three times between 1695 and 1734. After the conquest of New France by the British, for two centuries, it was the only French-language hospital in Montreal. Around 1850, the hospital became affiliated with the Montreal School of Medicine and Surgery. It continued to grow until 1861, when it was moved from Old Montreal to its present site near Mount Royal. It had an affiliated nursing school between 1901 and 1970.
In 1996, it became one of the three hospitals to make up the Centre hospitalier de l'Université de Montréal (CHUM), along with the Hôpital Notre-Dame du CHUM and the Hôpital Saint-Luc du CHUM.
With the completion of the CHUM megahospital campus adjacent to Hôpital Saint-Luc in 2017, the Hôtel-Dieu's patients were moved to the new facility as of November 5, 2017. The Hôtel-Dieu was initially slated for closure, but ultimately remained open as a large-scale urgent care clinic until 2020.
In 2020, amid the COVID-19 pandemic in Montreal, the former hospital became home to one of Montreal's largest testing sites.
The present site also contains a museum of the hospital's long history.
Medical achievements
During its history, many medical milestones have been recorded at the Hôtel-Dieu, including the world's first removal of a kidney (1868), the world's first removal of a tongue and jaw (1872), the first femur transplant (1959), the first identification of an AIDS patient in Canada (1979), the world's first successful recovery of a person with severe burns to 90% of the body (1981), and the world's first robotically assisted laparoscopic surgery (1993).
References
Further reading
Joanna Emery, "Angel of the Colony," Beaver (Aug/Sep 2006) 86#4 pp 37–41. online
External links
354 years of history (Réligieuses hospitalières de Saint-Joseph)
Musée des hospitalières de l'Hôtel-Dieu de Montréal
Hospitals in Montreal
Defunct hospitals in Canada
Hospital buildings completed in the 17th century
Hospital buildings completed in 1861
Hospitals established in the 17th century
Société Notre-Dame de Montréal
Le Plateau-Mont-Royal
1645 establishments in the French colonial empire
1861 establishments in Canada
COVID-19 pandemic in Canada |
Adler is a surname of German origin meaning eagle. and has a frequency in the United Kingdom of less than 0.004%, and of 0.008% in the United States.
In Christian iconography, the eagle is the symbol of John the Evangelist, and as such a stylized eagle was commonly used as a house sign/totem in German speaking areas. From the tenement the term easily moved to its inhabitants, particularly to those having only one name. This phenomenon can be easily seen in German and Austrian censuses from the 16th and 17th centuries.
Notable Adlers
Actors, writers and producers
Alfred Adler (1870–1937), Austrian doctor and psychotherapist
Allen Adler (1916–1964), American writer
Bill Adler (born 1951), American music journalist
Bruce Adler (1944–2008), American actor
Celia Adler (1891–1979), American Jewish actress
Charles Adler (broadcaster) (born 1954), Canadian broadcaster
Charlie Adler (born 1956), American voice actor
Cyrus Adler (1863–1940), American educator
David A. Adler (born 1947), Writer of children's books
Elizabeth Adler (born 1950), British author
Friedrich Adler (writer) (1857–1938), Czech-Austrian politician
H. G. Adler (1910–1988), German Jewish poet and novelist.
Jacob Pavlovich Adler (1855–1926), born Yankev P. Adler, Ukrainian-born Jewish actor and a star in Yiddish theater
Jay Adler (1896–1978), American actor in theater, television, and film
Jerry Adler (born 1929), American theatre director, production supervisor and television and film actor
Julius Ochs Adler (1892–1955), American publisher, journalist, and United States Army General
Jussi Adler-Olsen (born 1950), Danish writer
Lou Adler (journalist) (1929–2017), American broadcaster
Lou Adler (1933–), American record producer, manager, and director
Luther Adler (1903–1984), American actor and director on Broadway
Margot Adler, (1946–2014), author, journalist, Wiccan Priestess and Elder, NPR correspondent in New York City
Maurice Adler (1909–1960), American film producer and 20th Century Fox production head
Max Adler (actor) (born 1986), American actor
Mortimer J. Adler (1902–2001), American Aristotelian philosopher, author, and educator
Renata Adler (born 1938), American journalist and writer
Sara Adler (1858–1953), Ukrainian Jewish actress in Yiddish theater
Sonya Adler or Sonya Oberlander (died 1886), one of the first women to perform in Yiddish theater in Imperial Russia
Stella Adler (1901–1992), Jewish-American actress and acting teacher
Warren Adler (1927–2019), American writer
Sarah Adler (born 1978), French actress
Engineers and scientists
Ada Adler (1878–1946), Danish classical scholar
August Adler (1863–1923), Austrian mathematician
Charles Adler Jr. (1899–1980), American inventor
Darin Adler, software architect
David Adler (1935–1987), American physicist
Edda Adler (born 1937), Argentine chemist and biologist
George J. Adler, a noted philologist, linguist and author of A Practical Grammar of the Latin Language
Howard I. Adler, biologist, founder of Oxyrase Inc.
Irving Adler (1913–2012) author, mathematician, scientist, political activist and educator
Johan Gunder Adler (1784–1852), Danish civil servant and a co-author of the Constitution of Norway
Mark Adler, Mars Exploration Rover mission manager, co-author of zlib, inventor of Adler-32 checksum
Nancy Adler, American health psychologist
Niclas Adler, (born 1971), Swedish organizational theorist
Robert Adler (1913–2007), inventor of the remote control
Saul Adler (1895–1966), British-Israeli expert on parasitology
Stephen L. Adler (born 1939), American physicist
Jonathan Adler (born 1988), Israeli Engineer
Regina Kapeller-Adler (1900–1991), Austrian Biochemist and inventor of histidine-detecting urine pregnancy tests
Musicians
Chris Adler (born 1972), drummer of the metal band "Lamb of God"
Cisco Adler, the artist featured in all songs of the artist Shwayze
Guido Adler (1855–1941), Bohemian-Austrian musicologist and writer on music
Hans G. Adler (1904–1979), South African pianist, musicologist, and antique keyboard instrument collector
Henry Adler, American drum kit educator, player and actor
Hugo Chaim Adler (1896–1955), Belgian composer, cantor, and choir conductor
James Adler (born 1950), Composer and pianist from Chicago, Illinois
Julia Rebekka Adler (born 1978), German violist.
Larry Adler (1914–2001), American musician, widely acknowledged as one of the world's most skilled harmonica players
Oskar Adler (1875–1955), Austrian violinist, physician and esoteric savant, brother of Max Adler.
Richard Adler (1921–2012), Jewish-American lyricist, composer and producer of several Broadway shows
Samuel Adler (born 1928), Jewish-American composer and conductor
Steven Adler (born 1965), a drummer for the hard rock band Guns N' Roses
Vincent Adler, Hungarian pianist, composer
Willie Adler (born 1976), guitarist of the metal band Lamb of God
Conductors
Frederick Charles Adler (1889–1959), London-born conductor known as "F. Charles Adler"
Kurt Adler (1907–1977), Austrian-American conductor, Metropolitan Opera Chorus Master(1943–1973)
Kurt Herbert Adler (1905–1988), Vienna-born American conductor, San Francisco Opera general director (1953–1981)
Peter Herman Adler (1899–1990), Czech-born American conductor, director of NBC Opera Theatre (1950–1964)
Politicians
Charles S. Adler (1862–1911), American politician from New York
Ernie Adler (born 1950), American politician from Nevada
Friedrich Adler (1879–1960), Austrian revolutionary politician, son of Viktor Adler
John Adler (1959–2011), American politician from New Jersey
Julius Adler (1894–1945), German politician
Steve Adler (born 1956), American politician, mayor of Austin, Texas
Victor Adler (1852–1918), Austrian Social Democratic leader
Rabbis and theologians
Felix Adler (professor) (1851–1933), leader of ethical humanism
Hermann Adler (1839–1911), Orthodox Chief Rabbi of the British Empire, 1891–1911
Johann Kaspar Adler (1488–1560), also Kaspar Aquila or Caspari Aquilae, German reformer
Michael Adler (1868–1944), first Jewish chaplain to the British Army
Nathan Adler (1741–1800), German kabalist
Nathan Marcus Adler (–1891), Orthodox Chief Rabbi of the British Empire, 1845–1891
Samuel Adler (rabbi) (1809–1891), Reform rabbi
Athletes
Anders Adler (born 1982), Swedish ice hockey player
Daniel Adler (sailor) (born 1958), Brazilian sailor
Jens Adler (born 1965), German football player
Kim Adler, American bowler
Nicky Adler (born 1985), German football player
Nikki Adler (born 1987), German boxer
Oliver Adler (born 1967), German football player
René Adler (born 1985), German football player
Thomas Adler (born 1965), German football player
Others
Alfred Adler (1870–1937), Austrian psychologist, founder of the school of individual psychology
Coleman Adler (1868–1938), Jeweler and founder of Adler's Jewelry in New Orleans in 1898
Dankmar Adler (1844–1900), German-born American architect
David B. Adler (1826–1878), Jewish-Danish banker
Freda Adler (born 1934), criminologist
Friedrich Adler (architect) (1827–1908), German architect and archaeologist
Friedrich Adler (artist) (1878–1942), German artist and designer, murdered in the Holocaust
Hans Hermann Adler (1891–1956), German professor of journalism at the University of Heidelberg
Jacob O. Adler (1913–1999), Professor of Economics and Business at the University of Hawaii
Jankel Adler (1895–1949), Polish painter and printmaker
Jonathan Adler (born 1966), American potter, designer, and author
Jonathan H. Adler (born 1969), Professor of Law at Case Western University School of Law
Karl-Heinz Adler (1927–2018), German artist
Matthew Adler (born 1962), American law professor
Max Adler (Sears) (1866–1952), American businessman and philanthropist
Max Adler (Marxist) (1873–1937), Austrian social theorist, brother of Oskar Adler.
Rodney Adler, (born 1959), Australian businessman and white collar criminal
Ruth Adler (1944–1994), feminist, human rights campaigner and child welfare advocate
Salomon Adler (1630–1709), German painter of the Baroque period
Solomon Adler (1909–1994), Soviet spy who supplied information to the Silvermaster espionage ring
Valerie Adler, South African artist
Katya Adler, British German journalist
Fictional characters
Adler von Berg, a Luftwaffe pilot-turned-adventurer, of the Belgian comics series Adler by René Sterne
Grace Adler, female lead in the TV series Will and Grace
Henry Adler, main character in David Wellington's film I Love a Man in Uniform
Irene Adler, fictional character featured in the Sherlock Holmes story "A Scandal in Bohemia" by Arthur Conan Doyle.
Judith Adler, fictional character in The Case of the Toxic Spell Dump by Harry Turtledove.
Klaus Adler, would-be Führer of the Moon Nazis in the movie Iron Sky (2012).
Rafe Adler, the main antagonist of Uncharted 4: A Thief's End.
Russell Adler, a character of Call of Duty: Black Ops Cold War by Treyarch.
Sadie Adler, character in Red Dead Redemption 2.
Samantha Adler, arms dealer in the novel series Son Altesse Sérénissime
Scott Adler, a fictional character featured in the Tom Clancy Jack Ryan universe novels. Adler is a career U.S. Department of State employee who rises throughout the series, eventually becoming Secretary of State.
Vincent Adler, antagonist behind the first two seasons of White Collar
Wilhelm Adler, main character in Saul Bellow's novella Seize the Day
John Adler, main character in Mary Burton's novel Her Last Word
References
Surnames of Jewish origin
German-language surnames
Yiddish-language surnames
Surnames from nicknames |
The Dakar Conference (also known as the Dakar Dialogue and the Dakar Initiative) was a historic conference between members of the Institute for Democratic Alternatives in South Africa (IDASA) and the African National Congress (ANC). It was held in Dakar, Senegal between 9 and 12 July 1987. The conference discussed topics such as strategies for bringing fundamental change in South Africa, national unity, structures of the government and the future of the economy in a free South Africa. The IDASA delegation from South Africa, participated in the conference in their private capacity and would later be condemned by the South African government for meeting a banned organization. The future indirect result of the conference was South African government talks with Nelson Mandela and his eventual meeting with P. W. Botha in 1989.
Background
Frederik van Zyl Slabbert, a member of the opposition resigned from the Progressive Federal Party and the South African parliament in January 1986, describing it as irrelevant and that he would explore other avenues of negotiations between white and black South African's. Dr. Alex Boraine would also leave with him. Van Zyl Slabbert and Boraine would the establish The Institute for Democratic Alternatives in South Africa (IDASA), a non-partisan organization that aimed to promote inclusive democracy in South Africa by talking to people of all races within and outside the country. Slabbert, in communication with Thabo Mbeki, member of the ANC National Executive, discussed the change in attitude amongst some of the Afrikaner elite towards Afrikaner Nationalism and Apartheid. Out of these discussions and meetings, an idea was generated for a possible meeting between them and the ANC. This would be a change from the opposition White liberals attempting to force political change from within the parliamentary system, to the Afrikaner elite taking direct action in shaping the future direction of South Africa.
Later in 1986, Slabbert and Breyten Breytenbach met on Gorée Island of Dakar in Senegal and decided that the city should be the location of the conference. One third of the conference's cost was financed by the German Friedrich Naumann Foundation and further support was provided by George Soros, who however he was skeptical that the conference would achieve anything for South Africa. Breytenbach then approached Danielle Mitterrand, the French president's wife who headed the France-Libertés Foundation and who was well acquainted with Abdou Diouf, the Senegalese President, and asked her to intercede with him to allow the South African delegates to enter Senegal and ensure the security of the conference. The African Jurists' Association would also play a role in the conference's organisation. By 3 June 1987, more than a month before the start date, the South African press had caught wind of the proposed conference and published stories about a group of South Africans who were going to have a meeting with the ANC.
The IDASA delegation personally invited by Slabbert consisted of 61 delegates with at least half consisting of Afrikaner academics, teachers, journalists, artists, directors, writers and professionals and the group had Afrikaans speaking Coloureds, ten English-speaking businessmen and academics and three German academics working on South Africa. The South African delegation attended in their private capacity and did not represent the organisations they worked for. The seventeen ANC delegates would be led by Thabo Mbeki in his capacity of ANC Director of Information and four other members of the ANCs National Executive Committee while the other twelve were made up of ANC members based in Zambia, Scandinavia, UK, Ireland, United States and West Africa.
The IDASA delegation flew into Dakar from London and were met at the airport by the Senegalese Head of Protocol in the VIP lounge and then escorted by motorcycle riders to their hotel where the conference would take place and were met there by the ANC delegation. During the conference, the delegates would attend receptions at Presidential Palace and the Minister of Educations residence. The conference began on 9 July and would end on 12 July.
Conference
The conference was opened by President Abdou Diouf and attended by his cabinet and members of the diplomatic community and then an address was given by Danielle Mitterrand. The delegates would then return to their hotel and the conference venue. Four major topics had been agreed upon and the delegates had submitted the papers prior to conference and had been viewed by the ANC and they would respond to them after their presentation. The four major topics included, strategies for bringing fundamental change in South Africa, national unity, structures of the government and the future of the economy in a free South Africa. Informal topics were also discussed and included the armed struggle, violence, negotiations, political pluralism, a Bill of Rights, future of Afrikaans and its culture, a future economy, distributive justice and other topics.
The delegates in their presentation expressed their concern about violence in South Africa and its impact on civilians while the ANC members outlined why they had begun an armed struggle when all other peaceful strategies to bring about racial policy change in South Africa had failed and that attacks on soft targets was not a policy and that control over its armed cadres in the country was not always possible. It was clear to the delegates during the discussions that the ANC was prepared to negotiate with the government but that certain preconditions would have to be met which included the release of political prisoners and the unbanning of banned organisation's in the country.
With regards to pluralism, the ANC expressed a commitment of political pluralism in a new South African political system and that racism and fascism would be outlawed in the political system. It expressed a belief that the groups committed to the ending of Apartheid would in a new South Africa political system would split into its own organizations expressing their own ideas and beliefs.
The ANC in the discussion concerning a Bill of Rights said it did not have a problem with it but would not guarantee privileges in such a bill. It expressed a reassurance that the Afrikaans language would be safeguarded as well as its cultural identity and that all people's cultural heritages should be protected.
Concerning the future South African economy the ANC's policies were still governed by the Freedom Charter and that some form of nationalization would be required to redress the economic and wealth imbalances and that any nationalization would not occur instantly and consultation would take place between business and the future government. Health housing and education were key areas that the ANC would be readdressing.
At the conclusion of the conference, a declaration was released by the participants stating that a negotiated settlement in South Africa was preferred and that main obstacle was the South African government's unwillingness to negotiate, and the delegates concern about the level of uncontrolled violence in the country. A ferry trip was then organized to the Gorée Island and they visited the Maison des Esclaves and its museum in remembrance to the Dutch slave trade in West Africa.
Known participants
ANC
Thabo Mbeki
Kader Asmal
Selwyn Gross
Pallo Jordan
Brigitte Mabandla
Lindiwe Mabuza
Penuell Maduna
Mac Maharaj
Francis Melli
Reggie Mbono
Alfred Nzo
Tom Sebina
Essop Pahad
Albie Sachs
Tony Trew
Steve Tshwete
IDASA
Frederick Van Zyl Slabbert
Dr. Alex Boraine
Professor Andre Du Toit - political scientist University of Stellenbosch
Professor Jaap Durand - academic
Jakes Gerwel - academic
Professor Lourens Du Plessis - University of Potchefstroom
Abraham Viljoen - brother of Constand Viljoen
Tommy Bedford - former rugby captain
Andre Brink - writer
Breyten Breytenbach - poet
Leon Louw - director Free Market Foundation
Lawrence Schlemmer
Christo Nel
Theuns Eloff - religious leader
Hermann Giliomee
Riaan de Villiers
Revel Fox - architect
Grethe Fox - actress
Manie van Rensburg - film director
Max du Preez - journalist
Others
Abdou Diouf - Senegalese President
Danielle Mitterrand - Wife of the French President
Dr. Klaus Baron von der Ropp - German Institute for International and Security Affairs
Conclusion
At the end of the conference, the two groups left Senegal on a visit to Burkina Faso and Ghana. Forty South African delegates would return on 21 July 1987 and were met at the airport by a hundred demonstrators from the Afrikaner Resistance Movement (Afrikaner Weerstandsbeweging) led by Eugene Terre Blanche. Posters would accuse the delegates of being traitors, communists and terrorists. No news conference was held by the delegates, having been banned by the police and they were escorted via a back entrance from Jan Smuts International Airport. Frederick Van Zyl Slabbert and Dr. Alex Boraine would return to South Africa on 31 July.
The ruling National Party condemned the talk, worried about the legitimacy the conference gave to the ANC and the government controlled South African Broadcasting Corporation (SABC) and Afrikaner newspapers were critical. English newspapers were said to be critical and lukewarm to the conference. Government officials would express their opinion privately that they thought the conference would hinder the government's own initiates.
In the end, the conference had broken the ice and would make it acceptable for an Afrikaner government to negotiate in the future with the ANC as well as the ANC to understand the Afrikaner. Further meetings were held when South African businessmen met with the ANC, Stellenbosch University students would meet in Lusaka and IDASA would organize further meetings in Germany, United States, France, Zambia and Zimbabwe.
References
1987 conferences
Events associated with apartheid
Anti-Apartheid organisations
1987 in South Africa
Political history of South Africa |
The list of shipwrecks in December 1854 includes ships sunk, foundered, wrecked, grounded, or otherwise lost during December 1854.
1 December
2 December
3 December
4 December
5 December
6 December
7 December
8 December
9 December
10 December
11 December
12 December
13 December
14 December
15 December
16 December
17 December
18 December
19 December
20 December
21 December
22 December
23 December
24 December
25 December
26 December
27 December
28 December
29 December
30 December
31 December
Unknown date
References
1854-12 |
The Orléanais dialect is a langue d'oïl that was part of a dialect group called Francien.
The dialect covers three departments, corresponding to the territory of Orléanais, former province of the kingdom of France: Loir-et-Cher, Loiret and Eure-et-Loir. It and other Francien dialects such as Berrichon progressively dissolved into a regional variant of French.
References
French dialects |
Apchon () is a commune in the Cantal department in the Auvergne region of south-central France.
The inhabitants of the commune are known as Apchonnais or Apchonnaises.
Geography
Apchon is located some 80 km south-west of Clermont-Ferrand, 25 km north-west of Murat, and 30 km south-east of Bort-les-Orgues. Access is by the D3 road from Riom-ès-Montagnes in the north-west passing through the north of the commune to Murat in the south-east. Access to the village is by the D49 which branches off the D3 north-east of the commune and passes through the village then south to Saint-Hippolyte. There is also the D249 from the village south-west to join the D263 south of Collandres. Apart from the village there are also the hamlets of La Ribeyre and La Vidal along the D3, and Brechailles on the north-east. Apart from some patches of forest in the north the commune is entirely farmland.
The Petite Rhue river flows from south to north through the commune and continues to join the Grande Rhue river at Coindre. The Ruisseau de Brechailles flows from the south-east to join the Petite Rhue north of the D3. The Ruisseau de Mazeyres rises in the south of the commune and flows into the Petite Rhue on the left bank. Several small streams rise in the west of the commune and flow north-west eventually joining and flowing into the Veronne.
Neighbouring communes and villages
Heraldry
Administration
List of successive mayors
Population
Sites and monuments
The Château fort d'Apchon (12th century) is registered as an historical monument.
The Church contains several items that are registered as historical objects:
An Altar, Retable, and Statue (17th century)
An Altar, Retable, 2 Statues, and a Bust-Reliquary (17th century)
An Altar, Retable, and 2 Group Sculptures (17th century)
A Statue: Virgin and child (15th century)
A Retable in the main Altar (18th century)
2 Sarcophagii (11th century)
Views of Apchon
See also
Communes of the Cantal department
References
External links
Apchon on the National Geographic Institute website
Apchon on Géoportail, National Geographic Institute (IGN) website
Apchon on the 1750 Cassini Map
Communes of Cantal |
Jannatah () is a Palestinian town in the central West Bank south of Bethlehem in the Bethlehem Governorate. Nearby villages include Hindaza in the north and Tuqu' to the south. It is situated above sea level. The total land area is 11,901 dunams of which 319 constitute built-up area and 277 have been confiscated by the Israeli government for settlements and a military base. Much of the remainder is used for arable land.
History
In the wake of the 1948 Arab–Israeli War, and after the 1949 Armistice Agreements, Jannatah came under Jordanian rule.
Since the Six-Day War in 1967, Jannatah has been held under Israeli occupation.
According to ARIJ, Israel has confiscated land from Jannatah to construct two Israeli settlements; 409 dunams of land in 1982 for Nokdim and 222 dunams in 1999 for El David.
After the 1995 accords, 9.4% of the Jannatah’s land was classified as Area A, 28.5% as Area B, 54% as Area C, while the remaining 8.1% was classified as "nature reserves".
Jannatah is named after Wadi al-Jana'en or "Valley of Gardens," the name of the area where the town is located. Jannatah was formed by the Palestinian National Authority (PNA) in 1996 with the merger of the villages of al-Iqab, Rakhme, al-Asakra, Khallet al-Karaneen, Harmala and Abu Nujeim in order to ease the provision of government services and planning for the communities. Since then the town has been governed by a municipality consisting of eleven members appointed by the PNA. The current mayor is Mustafa Urooj and his deputy is Ibrahim Abakreh. There are six mosques and five public schools in Jannatah.
On 28 August 2001, during the Second Intifada, ARIJ reported the Israeli Army raided Abu Nujeim, destroyed its water network, uprooted 20 of its olive trees and damaged part of the Abu Nujeim School. That same day, ARIJ reported Israeli soldiers had fired at a livestock pen, killing 15 sheep.
In the 2007 census by the Palestinian Central Bureau of Statistics (PCBS), Jannatah had a population of 5,416, or 860 households. The principal families are al-'Asakra, az-Zeer, al-Mu'ti, al-Urooj, al-Hreimi, Shawriya, Salahat and at-Tinih. About 60% of the town's labor force work in agriculture, 15% as civil servants and the remainder in the Israeli labor market and trade, service and industry sectors. By 2017, the population was 7,336.
References
External links
Jannatah Town (Fact Sheet), Applied Research Institute–Jerusalem (ARIJ)
Jannatah Town Profile, ARIJ
Jannatah, aerial photo, ARIJ
The priorities and needs for development in Jannatah town based on the community and local authorities’ assessment, ARIJ
Towns in the West Bank
Municipalities of the State of Palestine
Bethlehem Governorate |
Virginia's 97th House of Delegates district elects one of the 100 members of the Virginia House of Delegates, the lower house of the state's bicameral legislature. The district is made up of New Kent County and parts of Hanover County and King William County on the Middle Peninsula of Virginia.
The 97th district has been represented by Republican Scott Wyatt since 2020.
List of delegates
References
External links
Virginia House of Delegates districts
New Kent County, Virginia
Hanover County, Virginia
King William County, Virginia |
Cathedral glass is the name given commercially to monochromatic sheet glass. It is thin by comparison with slab glass, may be coloured, and is textured on one side.
The name draws from the fact that windows of stained glass were a feature of medieval European cathedrals from the 10th century onwards.
The term cathedral glass is sometimes applied erroneously to the windows of cathedrals as an alternative to the term stained glass. Stained glass is the material and the art form of making coloured windows of elaborate or pictorial design.
Manufacture
Traditional methods of making coloured glass
Very early architectural glass, like that sometimes found in excavations of Roman baths, was cast. The molten glass was poured into a mold of wood or stone to make a sheet of glass. The texture of the mold material would be picked up by the glass.
By the time stained glass was being made, the glassblowing pipe was in common use, so hand-blown (or mouth-blown) sheets were made by the cylinder glass and/or crown glass method.
Casting came back as a common technique when rolled glass began to be manufactured in the mid-1830s and as glass jewels (also used for architectural glass) became popular. Rolled glass is not as rich and translucent as hand-blown glass, but it is much cheaper and is made in a variety of colors and textures, making it a useful decorative material.
Modern methods of making cathedral glass
This type of rolled glass is produced by pouring molten glass onto a metal or graphite table and immediately rolling it into a sheet using a large metal cylinder, similar to rolling out a pie crust. The rolling can be done by hand or machine. Glass can be "double rolled", which means it is passed through two cylinders at once to yield glass of a certain thickness (approximately 3/16" or 5 mm.) Glass made this way is never fully transparent, but it does not necessarily have much texture. It can be pushed and tugged while molten to achieve certain effects. For more distinct textures the metal cylinder is imprinted with a pattern that is pressed into the molten glass as it passes through the rollers. The glass is then annealed.
Rolled glass was first commercially produced around the 1830s and is widely used today. It is often called cathedral glass, but this has nothing to do with medieval cathedrals, where the glass used was hand-blown.
Cathedral glass comes in a very wide variety of colors and surface textures including hammered, rippled, seedy, and marine textures. It is made in the US, England, Germany, and China.
Uses
Cathedral glass has been used extensively in churches (often for non-pictorial windows) and for decorative glass in domestic and commercial buildings, both leaded and not, often in conjunction with drawn sheet glass and sometimes with decorative sections of beveled glass. It lets in light while reducing visibility and is an inexpensive, but useful and decorative material. While it does not have the richness and versatility of hand-blown glass, it has been used successfully for the creation of modern stained-glass windows in which the texture of the glass is treated, with the color, as a significant design element.
References
Sarah Brown, Stained Glass, an Illustrated History 1995, Bracken Books,
Ben Sinclair, Plain Glazing, 2001, the Building Conservation Directory,
Windows
Glass architecture
Glass art
Church architecture |
Christopher S. Weaver is an American entrepreneur, software developer, scientist, author, and educator. He is known for founding Bethesda Softworks, where he was one of the creators of The Elder Scrolls role-playing series.
Weaver and Bethesda are credited with developing the first real-time physics engine for sports simulation, used in Bethesda's Gridiron! video game. Weaver also developed game screen captioning for the deaf and made it available as open source software.
Career
At Hobart and William Smith Colleges, Weaver helped redesign the campus radio and television studios, and modified Link Trainers to better simulate situational spatial awareness. Because of this experience, he created AeroTechnology Enterprises, a company specializing in analog training simulators for aviation.
Weaver moved to New York for post-graduate work at Columbia University and got a night job as an Assistant Director of News at NBC. He was then hired by the American Broadcasting Company, where he established the first office of Technology Forecasting for the network. He then became the Vice-President for Science and Technology at the National Cable Television Association (NCTA), followed by an appointment as Chief Engineer to the Congressional Subcommittee on Communications and Technology.
Weaver later started Videomagic Laboratories, a company working in vehicular simulators for military and entertainment purposes. He temporarily moved to Los Angeles to work on the Universal Studios lot in Burbank, working on new camera technology with Panavision for interactive media. During this time, Weaver contributed to early work in graphical interfaces, optical storage, and computer-assisted editing, including encoding spatial information for tracking camera shots.
In the 1980s, Weaver was introduced to video games when he was asked by one of his engineers to look at a football game idea he was developing. Weaver felt it "was boring" and sought to create a more realistic gameplay by incorporating physics. This meant that players would perform based on their masses and accelerations, adding a layer of reality-based strategy to the game. They decided to produce the game, resulting in the formation of Bethesda Softworks. The game was released as Gridiron! for the Atari ST and Commodore 64/128, in 1986. Bethesda later found widespread success as a game developer with its Elder Scrolls series of games.
In 1999, Weaver cofounded ZeniMax Media with Robert A. Altman, as a new parent company for Bethesda. Weaver contributed his stake in Bethesda to ZeniMax, and served as CTO until 2002, then was pushed out. He filed a lawsuit against ZeniMax, claiming he was ousted by his new business partners and was owed severance when ZeniMax didn't renew his employment contract. The lawsuit was ongoing as of 2007, and at that time Weaver was still a 33% stockholder.
Microsoft acquired Bethesda and its parent company, ZeniMax Media, in September 2020. The deal gave Microsoft new game titles as it prepared to launch the next generation of Xbox consoles.
Current
As of 2016, Weaver has been pursuing a career in academia, in which he teaches computational media in the College of Integrative Sciences at Wesleyan University. He also teaches in the Comparative Media Studies and Engineering departments at MIT. He is a Fellow of the Futures of Entertainment Consortium; a Board Member of the Communications Technology Roadmap Group and a visiting scientist in the Microphotonics Center. Recently, he was asked to co-direct a new Center at MIT, which will use the science and epistemology of game tools to enhance STEM education for children of multiple age groups.
Weaver continues to serve on committees for various national and international organizations. Some of his past and present appointments include:
American Association for the Advancement of Science
National Academy of Sciences
National Academy of Engineering
National Research Council
International Game Developers Association
Cable Telecommunications Research Institute
Society of Cable Television Engineers
Aspen Institute
Institute of Electrical and Electronics Engineers
In 2016, as part of the MIT educational contingent, he became Director of Interactive Simulation for the AIM Photonics Academy.
He has acted as technical advisor to various governments and organizations, including the White House, Office of Technology Policy, Congressional Committee of House Administration and the Department of Homeland Security. Weaver has been a technical advisor to numerous films including Independence Day, where writer/producer Dean Devlin used Weaver as the basis for the film character David Levinson (played by Jeff Goldblum) and on the science fiction film, Geostorm.
In 2005, Weaver was inducted into the Cosmos Club for excellence in Engineering.
In 2016, Weaver was appointed a Distinguished Research Scholar by the Smithsonian Institution and installed as the first Project Director of the newly created Video Game Pioneers Archive within the Lemelson Center for the Study of Invention and Innovation.
Publications
Weaver has been published in a number of science and technology journals and periodicals, including: the MIT Microphotonics Center, IEEE Spectrum, Techline, Edge Magazine, SCTE Journal, NCTA Bulletin, ITU Standards, Video Magazine, and Next Generation Magazine on subjects ranging from microprocessors to copyright law. He is also a co-writer/creator of the multi-volume science-fiction series The Tenth Planet published by Ballantine Books and was the technical editor and contributor for Fundamentals of Game Design.
Personal life
Weaver is a volunteer air ambulance pilot for AngelFlight and holds numerous FAA licenses and type certificates. He is married to Nanci Weaver. In 1994 he was married to Dr Constance Boston, chief of gynecology of Columbia Hospital for Women, and they had a son named Isaac.
References
American company founders
American computer businesspeople
American computer programmers
Living people
Massachusetts Institute of Technology alumni
American video game programmers
American video game producers
Bethesda Softworks employees
Video game businesspeople
Wesleyan University alumni
Wesleyan University faculty
ZeniMax Media
Year of birth missing (living people)
20th-century American businesspeople
21st-century American businesspeople |
The Crackerjacks were a 1960s Memphis garage rock group. Band members included organist-bassist Bobby Sowell, lead guitarist David Preola, lead singer Jerry Stamson, and drummer Roy Yeager. They gained popularity in 1966–67, regularly appearing on Memphis WHBQ TV Talent Party with George Klien (also a popular radio DJ and friend of Elvis Presley). They won the Mid-South Fair in 1966 for best group. The Crackerjacks had no bass player; Bobby Sowell played bass and organ at the same time. The group was short lived due to several reasons. Sowell was drafted in 1968, Preola also was drafted into the Army, Stampson went into the restaurant business and Yeager went with the group Lobo and the southern rock band Atlanta Rhythm Section. Sowell was inducted into the Rockabilly Hall of Fame in 2002. The Crackerjacks are featured in a rock book, History of Memphis Bands, 1960-72 by Ron Hall, available at bookstores.
Early band history
The Crackerjacks were formed out of another popular 1960s Memphis garage band, The Out Of Its, in 1965–66. Besides Bobby Sowell, David Preola and Roy Yeager, other members included brothers Ricky and Micky Caughron and bass player Murphy Odom. They were a popular band with area colleges and universities, traveling the Mid-South in Mississippi, Arkansas, Kentucky and Tennessee. They won several Memphis area battles of the bands.
Personal conflicts and other factors lead to their breakup. Micky Caughron, Ricky Caughron and Murphy went with other bands while Sowell, Preola and Yeager formed The Crackerjacks, adding Jerry Stampson to the mix. Eventually, Fred Prouty replaced Yearger on drums and occasionally, Bobby Whitlock also sang with them. They also performed regularly at the club The Roaring 60's. Whitlock went on to play keyboards with Derek and the Dominoes, Eric Clapton and the Beatles's George Harrison.
References
Selected reading
History of Memphis Bands: 1960 - 1975 by Ron Hall (2003) Memphis, TN.
Bobby Sowell Rockabilly Biography: Bob Timmers (2002 )
External links
Bobby Sowell Rockabilly Hall of Fame
Bobby Sowell Official Website
[ Roy Yeager - Credits & Achievements]
History of Memphis Bands 1960-75
American rhythm and blues musical groups
Musical groups from Memphis, Tennessee |
The Mongolian People's Republic (MPR; , ) was a socialist state which existed from 1924 to 1992, located in the historical region of Outer Mongolia in East Asia. Until 1990, it was a one-party state ruled by the Mongolian People's Revolutionary Party, and maintained close political and economic ties with the Soviet Union, as part of the Eastern Bloc.
Outer Mongolia gained independence from Qing China in 1911, and enjoyed brief autonomy before it was seized by the Republic of China in 1919. After a Soviet-backed revolution in 1921, the Mongolian People's Republic was established in 1924. It was led from 1939 to 1952 by Khorloogiin Choibalsan, who carried out Stalinist purges in the country, and from 1952 to 1984 by Yumjaagiin Tsedenbal, who allied with the Soviets during the 1960s Sino-Soviet split. In 1990, protests for democracy resulted in reforms which established a multi-party system and a market economy, and a new constitution in 1992 ended the socialist republic.
History
Revolutions and foundation
From 1691, the Mongols were ruled by the Manchu-led Qing dynasty of China, during which northern and southern Mongolia became known as Outer Mongolia and Inner Mongolia, respectively. The Qing dynasty promoted Tibetan Buddhism and built monasteries, which grew rich and powerful. Its administrators also impoverished and oppressed the Mongols, and pursued colonization of Inner Mongolia in the 19th century. In the early 20th century, the implementation of the New Policies, aimed at further Qing integration of Outer Mongolia, led to anti-Manchu mutinies and uprisings. In late 1911, the Qing dynasty collapsed in the Xinhai Revolution, and Outer Mongolia declared its independence under the leadership of the 8th Jebtsundamba Khutuktu, who was named the Bogd Khan. The new state called on the Mongols of Inner Mongolia to join it, and sought international recognition. In 1912, it signed a treaty with the Russian Empire. Under the Treaty of Kyakhta of 1915, Mongolia accepted autonomy under the suzerainty of the Republic of China (ROC).
After the 1917 October Revolution and outbreak of the Russian Civil War, Mongolia was recognized by the Bolshevik government in August 1919. That November, ROC troops entered the capital and overthrew the Bogd Khan. During the Chinese occupation, Mongolian revolutionaries made contact with the Bolsheviks in Siberia, and in 1920 founded the Mongolian People's Party (MPP), led by Damdin Sükhbaatar, Khorloogiin Choibalsan, Dogsomyn Bodoo, Soliin Danzan, and others, across the border at Kyakhta. In October, White Russian cavalry under Baron Roman von Ungern-Sternberg entered Mongolia, and in February 1921 drove out the Chinese and restored the Bogd Khan. The MPP made a provisional government at its first congress on 1 March, and that July cavalry under Sükhbaatar, supported by Soviet troops, captured the capital in the Mongolian People's Revolution. Bodoo was appointed prime minister, while the Bogd Khan was allowed to remain on the throne. In November, a Mongolian delegation traveled to Soviet Russia and signed a treaty.
A split began to emerge between nationalists and communists in the MPP, whose members included lamas and nobles. In 1922, Bodoo was executed as a "counter-revolutionary". After Sükhbaatar's death in 1923, the MPP program was amended so the party could be "purged of oppressor class elements"; after the Bogd Khan's death in 1924, the search for a new incarnation was forbidden. Danzan was executed for "bourgeois tendencies" that year. The MPP declared a socialist "non-capitalist path of development", was renamed the Mongolian People's Revolutionary Party (MPRP), and joined the Comintern. The 1924 constitution founded the Mongolian People's Republic (MPR), and its capital was renamed Ulaanbaatar (meaning "red hero").
Early years (1924–1939)
As in the Soviet Union under Joseph Stalin, Mongolian politics went through several abrupt changes of direction in the 1920s and 1930s. The initial nationalist leadership of the MPRP advanced the slogan "Get rich!" to promote business, which was opposed by the communists. The Fifth Congress in 1926 called for restriction and nationalization of private property. The Seventh Congress in 1928 denounced previous "right opportunism" (baruun opportunizm) and dismissed several leaders. In 1929, the state began expropriating monastery property and tried to force herdsmen into collective farms and communes. During 1930–1932, there were uprisings led by the lamas of several monasteries, the largest of which took place in 1932 and was brutally suppressed, and herdsmen began to slaughter their livestock or herd their animals across the border. At the direction of the Comintern, the MPRP expelled the perpetrators of the "left deviation" (züünii nugalaa) in 1932, and a "new turn" (shine ergelt) was taken by moderate leadership. Collectivization of livestock herders was completed in the 1950s (see ).
From September 1937 to April 1939, Stalinist purges in Mongolia saw mass arrests of top party and state leaders, lamas, soldiers, and citizens on false charges of "counter-revolution" and spying for Japan. Some 20,000 to 35,000 Mongols were executed in Mongolia and the USSR in a campaign organized by NKVD officials and Khorloogiin Choibalsan, minister of internal affairs and commander-in-chief. Under communist repression, an estimated 17,000 monks were killed, official figures show. Prime Ministers Peljidiin Genden and Anandyn Amar, for example, were accused of counter-revolution and shot in Moscow in 1937 and 1941, respectively. Buddhist institutions were nearly all destroyed, their property appropriated, and the lamas killed or secularized. In March 1939, Choibalsan, Stalin's close ally, became prime minister of Mongolia and led a Stalinist dictatorship, and initiated further episodes of repression during his tenure.
World War II (1939–1945)
In 1931–1932, the Empire of Japan invaded Manchuria and set up the puppet state of Manchukuo. In 1934, Mongolia and the USSR made a verbal agreement on mutual aid in case of invasion, followed by a formal agreement in 1936. In May 1939, Japanese forces first skirmished with Soviet and Mongolian troops at the Battle of Khalkhin Gol. That July, Japan launched an unsuccessful attack across the river, and in August, Soviet and Mongolian troops under General (later Marshal) Georgy Zhukov, encircled and destroyed the Japanese forces. In April 1941, the USSR and Japan concluded a neutrality pact. That June, Nazi Germany invaded the Soviet Union in Operation Barbarossa. Mongolia did not join the war directly, but provided the Soviets with volunteers and materiel, and the country's economy was marshalled to support the war effort. Yumjaagiin Tsedenbal, MPRP general secretary and second to Choibalsan, rose to prominence, inspecting aid deliveries and touring the Eastern Front as a Mongolian People's Army (MPA) lieutenant general.
At the Yalta Conference in February 1945, the "Big Three" Allied powers (the United States, the United Kingdom, and the Soviet Union) decided the terms of the planned Soviet entry into the war against Japan, which included a recognition of the "status quo" in Mongolia (which was still internationally recognized as part of China). In August 1945, the Soviet Union used Mongolia as one base for its Manchurian Strategic Offensive Operation. The build-up brought 650,000 Soviet troops and large amounts of equipment to the country; the MPA played a limited role. The ROC, headed by Chiang Kai-shek, was persuaded to recognize Mongolian independence in the 1945 Sino-Soviet Treaty after Stalin promised to refrain from supporting the Chinese Communist Party (CCP) in the Chinese Civil War. In keeping with the treaty, a successful independence referendum was held in Mongolia in October 1945.
Cold War politics (1945–1984)
Following the CCP's victory in the Chinese Civil War and its proclamation of the People's Republic of China (PRC) in 1949, Mongolia transferred its recognition from the ROC to the PRC. The 1950 Sino-Soviet Treaty guaranteed Outer Mongolia's independence, but ended Choibalsan's hopes for reuniting it with Inner Mongolia. Mao Zedong privately hoped for Outer Mongolia's reintegration with China, and he was rebuffed by Soviet leadership after raising the question in 1949 and again in 1954, the year after Stalin's death. In 1956, after Nikita Khrushchev's denunciation of Stalin, Chinese leaders attempted to present Mongolia's independence as one of Stalin's mistakes. The Soviet response was that the Mongols were free to decide their own fate. Choibalsan died of cancer in Moscow in 1952, and was replaced as prime minister by Tsedenbal. Unlike his predecessor, Tsedenbal was enthusiastic about incorporating Mongolia as a constituent republic of the Soviet Union. This proposal was met with strenuous opposition from other MPRP members, and was subsequently abandoned.
Mongolia's foreign relations outside of the USSR and PRC were initially limited to the Soviet satellites of the Eastern Bloc. It was recognized by India in 1955, and that year attempted to join the United Nations (UN), but its request was vetoed by the ROC (now based in Taiwan) which had withdrawn its recognition of Mongolia's independence and renewed its territorial claim on the country. Mongolia eventually became a member state of the UN in 1961, after the Soviet Union threatened to veto the admission of the newly decolonized states of Africa if the ROC again used its veto. Mongolia established diplomatic relations with its first Western country, the United Kingdom, in 1961, but its diplomatic relations with the United States were not established until 1987, near the end of the Cold War.
In the 1950s, relations between the MPR and the PRC improved considerably. The Trans-Mongolian Railway, which opened in 1949 and linked Moscow with Ulaanbaatar via the Trans-Siberian Railway, was extended to the Chinese border and linked with Beijing in 1955. China provided economic support to Mongolia by building factories and apartment blocks, and thousands of Chinese laborers were involved in the projects until they were withdrawn in 1962 in an unsuccessful bid to pressure Mongolia to break with the USSR during the Sino-Soviet split. A military build-up on the Sino-Mongolian border began in 1963, and in 1966 the Soviet Union and Mongolia signed a new mutual aid treaty with a secret annex allowing the stationing of Soviet troops and missiles in the country. The Soviet Union increased its investment in the Mongolian economy on a "fraternal" or "elder brother–younger brother" (akh düü) basis.
Tsedenbal, a friend of Soviet leader Leonid Brezhnev, sent many of his political rivals into internal exile during his leadership, including Dashiin Damba in 1959, Daramyn Tömör-Ochir in 1962, Tsogt-Ochiryn Lookhuuz and others in 1964, Bazaryn Shirendev in 1982, and Sampilyn Jalan-Aajav in 1983. After Jamsrangiin Sambuu's death, Tsedenbal was elected in his place as chairman of the presidium of the People's Great Khural (head of state) in 1974, and handed the premiership to Jambyn Batmönkh. Tsedenbal was expelled from office by Batmönkh and the MPRP Politburo in August 1984, on the pretext of "old age and mental incapacity" in a move with full Soviet backing, and he retired to Moscow; Batmönkh took over as the party leader and head of state.
Reforms and end (1984–1992)
After Mikhail Gorbachev became leader of the Soviet Union in March 1985, he began implementing policies of perestroika (restructuring the economy) and glasnost (openness and accountability); the atmosphere of reform prompted the same policies in Mongolia, known as öörchlön baiguulalt and il tod. Unlike Tsedenbal, Batmönkh agreed with the Soviet leadership on normalizing Sino-Soviet relations; between 1987 and 1992, Soviet troops were withdrawn from Mongolia, which enabled both countries to normalize relations with China. In 1988, the MPRP newspaper Ünen urged accelerated reforms to overcome the party's "dogmatic interpretation of socialism", declared that "authoritarianism and intellectual indolence" undermined national "renewal", and described Tsedenbal as "willful and unprincipled". In 1989, Mongolian newspapers called for an "objective and realistic evaluation" of Mongolian–Soviet relations.
On 10 December 1989 (Human Rights Day), young people began demonstrating for political freedom in Ulaanbaatar. In January 1990, anti-MPRP rallies were held by student and social democratic organizations; their spokesman was Sanjaasürengiin Zorig. After more demonstrations and a hunger strike, the MPRP leadership resigned in March, and Batmönkh was replaced as head of state and general secretary. Tsedenbal was expelled from the MPRP. In May, the constitution was amended by the People's Great Khural, which deleted references to the MPRP's "guiding role" in society, legalized opposition parties, and established the office of president and a standing legislature (the State Little Khural). At Mongolia's first multiparty elections in July, the MPRP gained majorities in both bodies. A transition to a market economy was approved, and the herding cooperatives and state farms were broken up and privatized. A new constitution, adopted in January 1992 and entering into force in February, created a unicameral State Great Khural and ended the socialist republic.
Government and politics
From 1924 to 1990, the Mongolian People's Republic was a one-party state ruled by the Mongolian People's Revolutionary Party (MPRP). While formally a democratic republic with regular elections, in reality, its elections were pre-decided and its government alternated between oligarchy and one-man rule.
Before 1928, the leader of the MPRP was the chairman (darga) of its Central Committee (töv khoroo), which had a presidium (tergüülegchid) of about 10 members representing the core party leadership. Between 1928 and 1940, the Comintern replaced the chairman with three co-secretaries to weaken the party's ability to resist its directives. In 1940, the presidium was replaced by a political bureau (Politburo; uls töriin tovchoo), headed by a general secretary (yerönkhii nariin bichgiin darga); the title of the position was "first secretary" (negdügeer nariin bichgiin darga) from 1954 to 1981. Until 1974, the maximum leader of Mongolia was the head of government as the chairman of the council of ministers (said naryn zövlöl), equivalent to a prime minister. The council oversaw cabinet-level ministries, which numbered 42 by 1981. Before it was abolished in 1951, the Little Khural, a presidium of five members (from 1927, three) was elected by the Great Khural to select the premier; its chairman was the head of state. Thereafter, the chairman of the eight-member presidium of the (People's) Great Khural became the head of state. From 1974 to 1990, the maximum leader held this position and that of party general secretary.
The Central Committee was responsible for supervising party affairs and making important policy decisions, including the appointment and removal of party and government leaders. Most of its work was done at plenary meetings, typically held twice a year. The Central Committee's membership numbered 83 in 1971, 91 in 1976 and 1981, and 85 in 1986 (in addition to 55, 61, 71, and 65 non-voting candidate members in the same years). Its members were elected at party congresses; the first congress was held in 1921 and followed by one every year from 1923 to 1928, involving relatively frank debate. From 1930 to 1960, only six congresses were held (in 1930, 1934, 1940, 1947, 1954, and 1958), ratifying key decisions which had been made in advance. From 1961 to 1986, the congresses were purely symbolic events, held every five years to coincide with those of the Soviet Union and the creation of five-year plans. The next MPRP congress was due for 1991, but the protests of 1990 forced an extraordinary congress in April 1990, which claimed a membership of 94,750.
From 1990 to 1992, the head of government was a prime minister (yerönkhii said) and the head of state was a president (yerönkhiilögch), elected indirectly by the People's Great Khural. The People's Great Khural also elected the 50-member State Little Khural, whose seat apportionment reflected proportional representation of the total ballot for parties in the legislative election; three-quarters of its members were required to be People's Great Khural deputies.
Constitutions
Mongolia's first-ever constitution, adopted by the first Great Khural in November 1924, proclaimed the Mongolian People's Republic and the transfer of political power to the working people along Marxist–Leninist lines. The land, water, and mineral wealth of the country were nationalized. The constitution contained a declaration of the rights of the people, equality before the law, and suffrage at age 18 (with the exception of "feudalists" and Buddhist lamas resident in the monasteries). The soyombo symbol of Mongolian independence was adopted as the state arms.
The second constitution, adopted by the eighth Great Khural in June–July 1940, was closely modeled on the 1936 Soviet constitution. It proclaimed a state of "herdsmen, workers, and intelligentsia" taking a "non-capitalist road of development for the future transition to socialism". It added "counter-revolutionaries" to the list of disenfranchised, and declared the Mongolian People's Revolutionary Party to be the "vanguard of the working people and core of all their organizations". New state arms depicted a herdsman on horseback and the heads of a cow, sheep, goat, and camel. Amendments adopted by the ninth Great Khural in February 1949 introduced electoral reform, including a secret ballot, universal suffrage, and direct elections. In 1951, the Little Khural was abolished and the Great Khurals were renumbered. In 1956, the Council of Ministers was restructured.
The third constitution, adopted by the fourth Great Khural in July 1960, proclaimed a state of "workers, collectivized herdsmen, and working intelligentsia" which sought to achieve the "building of socialism and in the future build a communist society"; the preamble declared the MPRP the "guiding and directing force of society and the state". The Great Khural was renamed the People's Great Khural. New state arms replaced the four animal heads with a cogwheel and ears of wheat. Amendments adopted by the 11th People's Great Khural in March and May 1990 removed references to the MPRP's "guiding" role from the preamble, instituted a presidency, and established the State Little Khural (a standing legislature). The 1992 constitution ended the socialist republic.
Economy
At the MPR's foundation in 1924, Mongolia was a nomadic subsistence society. Farming and industry were almost nonexistent, and transportation and communications were primitive. Most people were illiterate nomadic herders, and a large part of the male labor force lived in the monasteries, contributing little to the economy. Property in the form of livestock was primarily owned by aristocrats and the monasteries; ownership of the remaining sectors of the economy was dominated by Chinese and other foreigners. The MPR was thus faced with the daunting task of building a modern economy. Socialist collectivization, industrialization, and urbanization ultimately transformed the agrarian, nomadic economy of the 1920s into a developing, agricultural-industrial economy by the late 1980s.
Collective farming
The first attempt to collectivize livestock herding began in 1929. By the end of 1930, nearly 30 percent of all poor and middle herdsmen's households had been forced to join collective farms (khamtral) or communes (kommun). After uprisings, these collectives were disbanded in 1932 and replaced by voluntary cooperatives (nökhörlöl) and production associations (negdel), of which there were 91 in 1940. Collectivization was achieved in the 1950s; the number of negdel, which were run by member councils, rose from 165 in 1952 to a peak of 727 in 1958, comprising 108,200 households (75 percent of the total). The number of livestock owned by negdel rose from 280,500 in 1952 to 16.9 million in 1960, by which the number of negdel had decreased to 354 after consolidation. In the 1950s, the sum (rural districts) and negdel were combined into sum-negdel, and the positions of head of the sum administration and chairman of the negdel council were merged. The national Union of Production Associations was founded in 1967 to regulate negdel membership.
The first state farms (sangiin aj akhui) were established in 1922–1923, and numbered 10 in 1940. Their numbers increased rapidly with the development of large-scale grain and vegetable farming and the introduction of industrialized methods in the 1970s and 1980s, rising to 25 by 1960 and to 52 by 1985. In 1990, there were 53 state farms and 20 specialized fodder farms (tejeeliin aj akhui), with a total of 35,200 workers. They were concentrated in the central and northern regions of the country, where natural conditions were suitable. An average state farm in 1985 had 15,400 hectares of arable land, 92 tractors, 36 grain harvesters, 26,200 head of livestock, and 500 workers. In 1990, the state farms owned 5.1 percent of the country's livestock (1.32 million head).
Industry and urbanization
After a failed attempt in 1931–1935, the government launched eight five-year plans (and one three-year plan) in the period between 1948 and 1990, with the goal of rapidly developing agriculture and industry: 1948–1952 (first), 1953–1957 (second), 1958–1960 (the three-year plan); 1961–1965 (third), 1966–1970 (fourth), 1971–1975 (fifth); 1976–1980 (sixth), 1981–1985 (seventh), and 1986–1990 (eighth). Mongolia first attended a meeting of the Council for Mutual Economic Assistance (Comecon) in 1958 as an observer, and became a member in June 1962. It received large amounts of economic, financial, and technical assistance through the council from the USSR and Eastern Europe, in the forms of credits, advisers, and joint ventures. In 1961, the manufacturing town of Darkhan was founded on the Trans-Mongolian Railway, north of Ulaanbaatar. In 1973, Erdenet was founded on a branch railway west of Darkhan to host the Erdenet Mining Corporation, a joint Mongolian–Soviet enterprise and one of the world's largest copper mines. Both towns, which are today Mongolia's second and third largest, were built in previously uninhabited areas and gained modern power stations, high-rise housing, schools, hospitals, and shops. Industrial development of cities was paralleled by small-scale urbanization of rural communities. Some 300 small permanent settlements were built with a school, clinic, shop, administrative office, police station, and electricity.
Mongolia has industrial reserves of coal, copper, fluorite, and iron ore as well as numerous deposits of gold, silver, zinc, lead, tin, tungsten, and other precious and rare metals. The first modern coal mine was built at Nalaikh, near Ulaanbaatar, in the 1930s and linked to the capital by a narrow-gauge railway line. The development of large-scale open-pit mining at Sharyngol near Darkhan and Baganuur, east of Ulaanbaatar, made the Nalaikh mine obsolete. Mongolia had no manufacturing industries before the building of the Ulaanbaatar industrial combine in the 1930s; there were no large-scale developments until the building of Darkhan and Erdenet in the 1960s and 1970s, which was accompanied by efforts to modernize provincial towns such as Choibalsan and Sükhbaatar. The main industries were mining, electricity generation, production of building materials, and processing of livestock produce (meat, wool, and hides) into semi-finished goods, foodstuffs, and consumer goods.
Industry accounted for 7 percent of Mongolia's net material product (NMP) in 1950 and increased to 35 percent in 1985. Trade increased from 10 percent to 26 percent; agriculture, including herding, declined from 68 percent to 20 percent. In 1960, 61 percent of the employed worked in the agricultural sector, decreasing to 33 percent by 1985. GDP figures for Mongolia record growth throughout the 1980s; as late as 1988, the annual increase in GDP amounted to 5.1 percent. In the late 1980s, the stagnation of the economy and the example of perestroika in the Soviet Union led Mongolian leaders to undertake a program of reform which developed the economy in a market direction, which ultimately led to the end of the socialist republic and the turn to capitalism.
Banking and trade
The national bank of Mongolia (Mongolbank) was founded in June 1924 as the Mongolian Trade and Industry Bank, which held yanchaan (silver dollars). In December 1925, it began issuing Mongolia's own currency, the tögrög ('round'), in silver coins of one tögrög subdivided into möngö. It became the sole legal currency in 1928. The bank was transferred to the Mongolian government in 1935, and renamed the State Bank of the Mongolian People's Republic in 1954. Circulation of the tögrög was strictly controlled by the MPR government with Soviet backing, and its foreign exchange rate was artificially fixed. In the 1960s, for example, it was valued by the State Bank at an rate of 1 USD to 4 tögrög. In the 1920s, the Mongolian government drove foreign merchants out of the country and introduced a foreign trade monopoly. Mongolia traded only with the USSR until the establishment of relations with China after World War II, which ceased after the 1960s Sino-Soviet split. Comecon membership enabled import of machinery and vehicles from Eastern Europe in exchange for raw materials, though some 85 percent of trade remained with the USSR. In the 1980s, 1 to 2 percent of trade was opened with Western countries; the value of imports far exceeded that of exports, and the imbalance was funded by long-term loans from the USSR, estimated at 10 billion rubles by 1990.
Society
Education
Before the 1921 revolution, religious schools in monasteries taught lamas to read Buddhist scriptures in Tibetan and Mongol, and the few secular schools trained clerks for local administration. The first government-run primary school was opened in the capital in November 1921, followed by the first secondary school in 1923. The Ministry of Education was established in 1924, and devised a 10-year plan (1926–1936) for the development of education and teacher training. Buryat intellectual Erdene Batkhaan, minister of education in 1926–1929, played a key role. A nationwide cultural offensive was declared in 1930–1931 following the government's decision to adopt the Latin script for Mongolian and eradicate adult illiteracy; adoption of the Cyrillic script was decreed in March 1941, but only came into general use from January 1946. Starting in 1937, increasing numbers of Mongolian students were sent to the Soviet Union for training in vocational schools; Mongolia's first vocational school opened in 1938. Higher education in Mongolia began with the opening of the Mongolian State University in 1942. The number of general education schools rose from 331 with 24,000 pupils in 1940, to 359 with 50,000 pupils in 1947. Obligatory eight-year general education (ages eight to 16) was introduced gradually in the 1970s. In 1980, the 113 elementary schools taught grades one to four, 150 "incomplete" secondary education schools for grades one to nine, and 108 (267 by 1990) "complete" secondary education schools for grades one to 11.
Healthcare
Before the 1920s, Mongolia had no health services apart from what was provided by lamas or shamans, who offered a combination of herbal remedies and incantations, and the population was in decline from untreated sickness. Modern healthcare in Mongolia was developed starting in 1922 under the Soviet Semashko model, with the construction of a large hospital and clinical network and training of staff in Western medicine. The isolation of the country meant that developments in medicine were slow to reach it, though population decline was gradually reversed by the 1930s. The ratio of doctors to the general population increased dramatically; in 1990, there were more than 6,000 physicians, three-quarters of whom were women. The medical care system was accessible at little or no cost even in the most remote areas. State-sponsored maternity rest homes for pastoral women in the final stages of pregnancy helped to lower infant mortality from 109 per 1,000 live births in 1960 to 57.4 in 1990, and maternal mortality by about 25 percent from 1960 to 1990.
Media and arts
Under the one-party rule of the Mongolian People's Revolutionary Party, media in Mongolia was strictly controlled. The main source of information was the state-owned Montsame news agency. The official MPRP newspaper Ünen ('Truth'), founded in 1920 and still published today, served as a mouthpiece of the People's Great Khural, Council of Ministers, and MPRP Central Committee. The party also published the monthly journal Namyn Amidral ('Party Life'), which discussed theoretical matters. Other official publications included the Mongolian Revolutionary Youth League newspaper Zaluuchuudyn Ünen ('Youth Truth') and the cultural paper Utga Zokhiol Urlag ('Literature and Art'), which dispensed ideological guidance. Mongolradio was established in 1933, and Mongolteleviz in 1967.
Under political pressure, traditional Mongolian arts were suppressed in favor of Soviet-inspired "socialist realism". Much of traditional culture was viewed as "feudal" or "religious", and was officially abandoned in favor of artworks depicting revolutionary heroism, intended to mold the "new man" of the socialist society. The MPRP established systematic censorship of press, publications, and artistic performance. However, there was disagreement and lack of clear direction, reflected in particular by the fluctuating political attitudes toward Mongolia's greatest hero, Genghis Khan. Common subjects of "socialist realism" included heroic shepherds and workers, and figures from history such as Sükhbaatar and Choibalsan (a prominent example being the monumental equestrian statue of Sükhbaatar which today stands in the center of Ulaanbaatar's Sükhbaatar Square). Some painters combined realism and mongol zurag, a style developed in the early 20th century. Bypassing Capitalism, a design depicting a Mongol rider jumping from feudalism to socialism, was reproduced in murals and as a stamp design.
The most prominent figure to emerge in modern Mongolian poetry and literature was Dashdorjiin Natsagdorj, whose opera Uchirtai gurvan tolgoi ("Three Sad Hills") remains popular today. The national theater was established in 1931, represented by such playwrights as Sodnombaljiryn Buyannemekh and Donrovyn Namdag. Mongolia's first film studio, set up with Soviet aid in 1935, produced the drama Norjmaa's Destiny in 1938 but generally concentrated on full-length feature films about heroes from Mongolian history. There were co-productions with Soviet filmmakers, such as Son of Mongolia (1936), as well as film versions of classics such as Transparent Tamir by Chadraabalyn Lodoidamba, released as a trilogy in 1970–1973. The first Mongolian ballet, Path of Happiness by Bilegiin Damdinsüren, was staged in 1950. Traditional arts were best preserved as epic poetry, music, and song, which had been passed down by bards and storytellers and first recorded (in printed word and sound) in the 20th century. The state folk song and dance ensemble was established in 1961. Under Soviet influence, European instruments were introduced, foreign works were performed, and Mongolian composers began to write music for orchestras and brass bands. The first full-scale symphonic work, My Homeland, was composed in 1955 by Luvsanjambyn Mördorj. The National Symphony Orchestra was founded in 1957. The 1970s and 1980s saw the development of Soviet-style dance bands and popular music groups.
Science
In November 1921, Buryat scholar Tsyben Zhamtsarano founded the Committee of Scriptures and Manuscripts, which established national archives in 1927. In 1931, the institute was renamed the Committee of Sciences, and began to undertake studies in botany, agriculture, geography, geology, and mapmaking. Further research institutes were linked either to the government (building, education, health, and communications) or universities (physics, mathematics, biology, and the social sciences). The Institute of Party History supervised the writing of the history of the MPRP and the translation of Marxist–Leninist classics. There was close cooperation with the Soviet Academy of Sciences, whose Mongolian Commission supervised Soviet research on Mongolia. In 1961, the Mongolian Academy of Sciences was founded. Scientific cooperation with the Eastern Bloc was coordinated by Comecon.
Military
The Mongolian People's Revolutionary Army was founded in 1921 as a partisan force against Chinese occupation. It primarily consisted of cavalry under its commander, Damdin Sükhbaatar. With Soviet technical aid and training, it received weapons, motor vehicles, communications equipment, and aircraft. Mongolian and Soviet troops clashed with Japanese forces in the Battle of Khalkhin Gol on Mongolia's eastern border in 1939, and jointly participated in the invasion of Manchuria in northern China in 1945, in which Mongolia was an important base. In the Beitashan Incident in 1947, Republic of China cavalry fought Mongolian and Soviet troops on the border with Xinjiang. The army was renamed the Mongolian People's Army in 1955. During the 1970s and 1980s, Mongolia received modern equipment, including tanks, armored personnel carriers, heavy and anti-aircraft artillery, radar, attack helicopters, and jet fighters. The Mongolian Air Force, founded in 1925, initially ran the civil airline MIAT, established in 1956.
Mongolian army ranks and uniform were similar to their Soviet counterparts. As in the Soviet military, there was an army political directorate and deputy political commissars, whose function was to ensure loyalty to the MPRP. The army maintained close ties with Soviet Red Army intelligence and NKVD secret police; Mongolia's Interior Ministry secret police and Buryat Mongol Comintern agents assisted in its administration under direct Soviet guidance.
See also
List of socialist states
History of modern Mongolia
Politics of Mongolia
Mengjiang
Tuvan People's Republic
Notes
References
Works cited
Further reading
Jianyong, Feng. "The 1911 Revolution and the Frontier: The 'Political Game' and 'State-Building' in Outer Mongolia during the 1911 Revolution 辛亥革命とフロンティア 外モンゴルにおける政治のゲームと国家建設." (2014). Online
External links
History of the Mongolian People's Republic, a joint 1973 Soviet-Mongolian work published in English.
By-Passing Capitalism, a 1968 Mongolian work published in English.
Mongolian People's Republic
Mongol states
Mongolia
States and territories established in 1924
States and territories disestablished in 1992
1924 establishments in Mongolia
1992 disestablishments in Asia
20th-century disestablishments in Mongolia
20th century in Mongolia
Former socialist republics
Communist states
Totalitarian states |
```java
package com.aspsine.irecyclerview.bean;
import android.os.Parcel;
import android.os.Parcelable;
/**
* 10
*/
public class PageBean implements Parcelable {
private int page=0;
private int rows=10;
private int totalCount;
private int totalPage;
private boolean refresh=true;
public int getLoadPage() {
if(refresh){
return page=1;
}
return ++page;
}
public int getPage() {
return page;
}
public void setPage(int page) {
this.page = page;
}
public int getRows() {
return rows;
}
public void setRows(int rows) {
this.rows = rows;
}
public int getTotalCount() {
return totalCount;
}
public void setTotalCount(int totalCount) {
this.totalCount = totalCount;
}
public int getTotalPage() {
return totalPage;
}
public void setTotalPage(int totalPage) {
this.totalPage = totalPage;
}
public boolean isRefresh() {
return refresh;
}
public void setRefresh(boolean refresh) {
this.refresh = refresh;
}
@Override
public int describeContents() {
return 0;
}
@Override
public void writeToParcel(Parcel dest, int flags) {
dest.writeInt(this.page);
dest.writeInt(this.rows);
dest.writeInt(this.totalCount);
dest.writeInt(this.totalPage);
dest.writeByte(refresh ? (byte) 1 : (byte) 0);
}
public PageBean() {
}
protected PageBean(Parcel in) {
this.page = in.readInt();
this.rows = in.readInt();
this.totalCount = in.readInt();
this.totalPage = in.readInt();
this.refresh = in.readByte() != 0;
}
public static final Creator<PageBean> CREATOR = new Creator<PageBean>() {
@Override
public PageBean createFromParcel(Parcel source) {
return new PageBean(source);
}
@Override
public PageBean[] newArray(int size) {
return new PageBean[size];
}
};
}
``` |
```c++
/*******************************************************************************
*
*
* path_to_url
*
* Unless required by applicable law or agreed to in writing, software
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
*******************************************************************************/
#ifndef your_sha256_hashALLOCATION_INTERVAL_TREE_HPP
#define your_sha256_hashALLOCATION_INTERVAL_TREE_HPP
#include <algorithm>
#include <functional>
#include <set>
#include <vector>
#include "virtual_reg.hpp"
namespace dnnl {
namespace impl {
namespace graph {
namespace gc {
namespace xbyak {
/* *
* Non-overlapping balanced interval tree implemetation based on std::set.
* */
class interval_tree_t {
public:
// constructor
interval_tree_t() = default;
// destructor
virtual ~interval_tree_t() = default;
bool empty() { return node_map_.empty(); }
// insert new interval
void insert(stmt_index_t start, stmt_index_t end, virtual_reg_t *virt_reg) {
node_map_.insert(node_t(start, end, virt_reg));
}
// remove existing interval
void remove(stmt_index_t start, stmt_index_t end, virtual_reg_t *virt_reg) {
erase_nodes(start, end, virt_reg, [](node_t node) {});
}
// divide existing interval using cut range
void divide(stmt_index_t start, stmt_index_t end, virtual_reg_t *virt_reg) {
std::vector<node_t> erased_nodes;
auto node_func = [&](node_t node) { erased_nodes.push_back(node); };
erase_nodes(start, end, virt_reg, node_func);
for (auto &node : erased_nodes) {
// front
stmt_index_t start_front = node.start_;
stmt_index_t end_front = std::min(node.end_, start);
if (start_front < end_front) {
insert(start_front, end_front, virt_reg);
}
// back
stmt_index_t start_back = std::max(node.start_, end);
stmt_index_t end_back = node.end_;
if (start_back < end_back) {
insert(start_back, end_back, virt_reg);
}
}
}
// search interval for overlap
bool search(stmt_index_t start, stmt_index_t end) {
auto iter = node_map_.lower_bound(node_t(start, end, nullptr));
if (iter != node_map_.begin()) { iter--; }
while (iter != node_map_.end()) {
auto &node = *iter;
if (end <= node.start_) { break; }
if (node.intersects(start, end)) { return true; }
iter++;
}
return false;
}
// query interval for overlap
void query(stmt_index_t start, stmt_index_t end,
std::function<void(virtual_reg_t *)> func) {
auto iter = node_map_.lower_bound(node_t(start, end, nullptr));
if (iter != node_map_.begin()) { iter--; }
while (iter != node_map_.end()) {
auto &node = *iter;
if (end <= node.start_) { break; }
if (node.intersects(start, end)) { func(node.virtual_reg_); }
iter++;
}
}
private:
// Internal node
struct node_t {
stmt_index_t start_;
stmt_index_t end_;
virtual_reg_t *virtual_reg_;
bool intersects(stmt_index_t start, stmt_index_t end) const {
return std::max(start_, start) < std::min(end_, end);
}
bool operator<(const node_t &b) const { return start_ < b.start_; }
node_t(stmt_index_t start, stmt_index_t end, virtual_reg_t *virt_reg)
: start_(start), end_(end), virtual_reg_(virt_reg) {
// must contain valid range
assert(start < end);
}
};
// Internal RB-tree
std::set<node_t> node_map_;
// erase interval node
void erase_nodes(stmt_index_t start, stmt_index_t end,
virtual_reg_t *virt_reg, std::function<void(node_t)> func) {
auto iter = node_map_.lower_bound(node_t(start, end, nullptr));
if (iter != node_map_.begin()) { iter--; }
while (iter != node_map_.end()) {
auto &node = *iter;
if (end <= node.start_) { break; }
if (node.virtual_reg_ == virt_reg) {
func(node);
iter = node_map_.erase(iter);
} else {
iter++;
}
}
}
};
} // namespace xbyak
} // namespace gc
} // namespace graph
} // namespace impl
} // namespace dnnl
#endif
``` |
```vue
<template>
<section class="page page--ui-slider">
<h2 class="page__title">UiSlider</h2>
<p>UiSlider allows the user to select a value from a continuous range of values by moving the slider thumb, clicking on the slider, or using the keyboard arrow keys.</p>
<p>UiSlider supports an icon and a disabled state. The slider is keyboard accessible.</p>
<h3 class="page__section-title">
Examples <a href="path_to_url" target="_blank" rel="noopener">View Source</a>
</h3>
<div class="page__examples">
<h4 class="page__demo-title">Basic</h4>
<ui-slider v-model="slider1"></ui-slider>
<h4 class="page__demo-title">With icon</h4>
<ui-slider v-model="slider2" icon="volume_up"></ui-slider>
<h4 class="page__demo-title">With marker</h4>
<ui-slider v-model="slider3" show-marker></ui-slider>
<h4 class="page__demo-title">With custom min and max: [1, 15]</h4>
<ui-slider v-model="slider4" show-marker :min="1" :max="15" :step="1"></ui-slider>
<h4 class="page__demo-title">Snap to steps: 20</h4>
<ui-slider
v-model="slider5"
show-marker
snap-to-steps
:step="20"
></ui-slider>
<h4 class="page__demo-title">In a modal</h4>
<ui-button @click="openModal">Open modal</ui-button>
<ui-modal ref="modal" title="Slider in a modal" dismiss-on="close-button esc">
<ui-slider v-model="slider7"></ui-slider>
</ui-modal>
<h4 class="page__demo-title">Disabled</h4>
<ui-slider v-model="slider6" icon="volume_up" disabled></ui-slider>
<div class="reset-sliders">
<ui-button @click="resetSliders">Reset Sliders</ui-button>
</div>
</div>
<h3 class="page__section-title">API</h3>
<ui-tabs raised>
<ui-tab title="Props">
<div class="table-responsive">
<table class="table">
<thead>
<tr>
<th>Name</th>
<th>Type</th>
<th>Default</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>name</td>
<td>String</td>
<td></td>
<td>
<p>The <code>name</code> attribute of the slider's hidden input element. Useful when traditionally submitting a form the slider is a part of.</p>
</td>
</tr>
<tr>
<td class="no-wrap">modelValue, v-model *</td>
<td>Number</td>
<td>(required)</td>
<td>
<p>The model that the slider value syncs to. Changing this value will update the slider.</p>
<p>If you are not using <code>v-model</code>, you should listen for the <code>update:modelValue</code> event and update <code>modelValue</code>.</p>
</td>
</tr>
<tr>
<td>icon</td>
<td>String</td>
<td></td>
<td>
<p>The slider icon. Can be any of the <a href="path_to_url" target="_blank" rel="noopener">Material Icons</a>.</p>
<p>You can also use the <code>icon</code> slot to show a custom or SVG icon.</p>
</td>
</tr>
<tr>
<td>min</td>
<td>Number</td>
<td><code>0</code></td>
<td>The minimum slider value.</td>
</tr>
<tr>
<td>max</td>
<td>Number</td>
<td><code>100</code></td>
<td>The maximum slider value.</td>
</tr>
<tr>
<td>step</td>
<td>Number</td>
<td><code>10</code></td>
<td>The amount to increment or decrement the slider value by when using the keyboard arrow keys. Also determines the snap points on the slider when <code>snapToSteps</code> is <code>true</code>.</td>
</tr>
<tr>
<td>snapToSteps</td>
<td>Boolean</td>
<td><code>false</code></td>
<td>Whether or not the slider value should be snapped to discrete steps. Setting to <code>true</code> will ensure that the value is always a multiple of the <code>step</code> prop when a drag is completed.</td>
</tr>
<tr>
<td>showMarker</td>
<td>Boolean</td>
<td><code>false</code></td>
<td>Whether or not to show a marker (like a tooltip) above the slider which shows the current value. The value shown can be customized using the <code>markerValue</code> prop.</td>
</tr>
<tr>
<td>markerValue</td>
<td>Number, String</td>
<td></td>
<td>The value shown in the marker when <code>showMarker</code> is <code>true</code>. If not provided and <code>showMarker</code> is <code>true</code>, the slider's value is shown in the marker.</td>
</tr>
<tr>
<td>tabindex</td>
<td>Number, String</td>
<td></td>
<td>The slider input <code>tabindex</code>.</td>
</tr>
<tr>
<td>disabled</td>
<td>Boolean</td>
<td><code>false</code></td>
<td>
<p>Whether or not the slider is disabled.</p>
<p>Set to <code>true</code> to disable the slider.</p>
</td>
</tr>
</tbody>
</table>
</div>
* Required prop
</ui-tab>
<ui-tab title="Slots">
<div class="table-responsive">
<table class="table">
<thead>
<tr>
<th>Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>icon</td>
<td>Holds the slider icon and can be used to show a custom or SVG icon.</td>
</tr>
</tbody>
</table>
</div>
</ui-tab>
<ui-tab title="Events">
<div class="table-responsive">
<table class="table">
<thead>
<tr>
<th>Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>focus</td>
<td>
<p>Emitted when the slider is focused.</p>
<p>Listen for it using <code>@focus</code>.</p>
</td>
</tr>
<tr>
<td>blur</td>
<td>
<p>Emitted when the slider loses focus.</p>
<p>Listen for it using <code>@blur</code>.</p>
</td>
</tr>
<tr>
<td>update:modelValue</td>
<td>
<p>Emitted when the slider value is changed. The handler is called with the new value.</p>
<p>If you are not using <code>v-model</code>, you should listen for this event and update the <code>modelValue</code> prop.</p>
<p>Listen for it using <code>@update:modelValue</code>.</p>
</td>
</tr>
<tr>
<td>change</td>
<td>
<p>Emitted when the value of the slider is changed. The handler is called with the new value.</p>
<p>Listen for it using <code>@change</code>.</p>
</td>
</tr>
<tr>
<td>dragstart</td>
<td>
<p>Emitted when the user starts dragging the slider thumb. The handler is called with the current value and the drag event object.</p>
<p>Listen for it using <code>@dragstart</code>.</p>
</td>
</tr>
<tr>
<td>dragend</td>
<td>
<p>Emitted when the user stops dragging the slider thumb. The handler is called with the current value and the drag event object.</p>
<p>Listen for it using <code>@dragend</code>.</p>
</td>
</tr>
</tbody>
</table>
</div>
</ui-tab>
<ui-tab title="Methods">
<div class="table-responsive">
<table class="table">
<thead>
<tr>
<th>Name</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><code>focus()</code></td>
<td>
<p>Call this method to programmatically focus the slider.</p>
</td>
</tr>
<tr>
<td><code>reset()</code></td>
<td>Call this method to reset the slider's value to its initial value.</td>
</tr>
</tbody>
</table>
</div>
</ui-tab>
</ui-tabs>
</section>
</template>
<script>
import UiButton from '@/UiButton.vue';
import UiModal from '@/UiModal.vue';
import UiSlider from '@/UiSlider.vue';
import UiTab from '@/UiTab.vue';
import UiTabs from '@/UiTabs.vue';
export default {
components: {
UiButton,
UiModal,
UiSlider,
UiTab,
UiTabs
},
data() {
return {
slider1: 25,
slider2: 50,
slider3: 60,
slider4: 8,
slider5: 40,
slider6: 75,
slider7: 30
};
},
methods: {
resetSliders() {
this.slider1 = 25;
this.slider2 = 50;
this.slider3 = 60;
this.slider4 = 7;
this.slider5 = 40;
this.slider6 = 75;
this.slider7 = 30;
},
openModal() {
this.$refs.modal.open();
}
}
};
</script>
<style lang="scss">
@import '@/styles/imports';
.page--ui-slider {
.page__examples {
max-width: rem(500px);
}
.ui-slider {
margin-bottom: rem(8px);
}
.reset-sliders .ui-button {
margin-top: rem(36px);
}
}
</style>
``` |
```css
/**/
footer.text-muted {
position: fixed;
bottom: 0;
z-index: 1000;
width: 100%;
background-color: #FFF;
}
body {
font-family: "Microsoft YaHei";
}
.ztree li span.button.root_close {
background-position: -126px -23px;
}
.ztree li span.button.root_open {
background-position: -106px -23px;
}
::-webkit-scrollbar {
width: 10px;
height: 10px;
background-color: #F5F5F5;
}
/* +*/
::-webkit-scrollbar-track {
-webkit-box-shadow: inset 0 0 6px rgba(0, 0, 0, 0.3);
border-radius: 10px;
background-color: #F5F5F5;
}
/* +*/
::-webkit-scrollbar-thumb {
border-radius: 10px;
-webkit-box-shadow: inset 0 0 6px rgba(0, 0, 0, .3);
background-color: #555;
}
textarea {
resize: none;
}
table tbody td span {
cursor: pointer;
}
a, a:hover, a:focus {
color: #333;
}
ul {
padding: 0;
}
li {
list-style: none;
}
/**/
.navigation > li > ul li:last-child {
padding-bottom: 0;
}
.navigation > li > ul li:first-child {
padding-top: 0;
}
.navigation-main li > ul, .navigation-main ul > li > a {
position: relative;
}
.navigation-main li > ul:before {
content: "";
display: block;
position: absolute;
z-index: 1;
left: 28px;
top: 20px;
bottom: 20px;
border-left: 1px solid #425668;
}
.navigation-main > li > ul > li > ul:before {
left: 55px;
}
.navigation-main > li > ul > li > ul > li > ul:before {
left: 80px;
}
.navigation-main ul > li > a:before {
content: "";
display: inline-block;
position: absolute;
width: 8px;
height: 8px;
border-radius: 4px !important;
left: 24px;
top: 17px;
background-color: #425668;
z-index: 2;
}
.navigation-main > li > ul > li > ul > li > a:before {
left: 51px;
}
.navigation-main > li > ul > li > ul > li > ul > li > a:before {
left: 76px;
}
.navigation>li:nth-child(2),.navigation>li:nth-child(3),.navigation>li:nth-child(4),
.navigation>li:nth-child(5),.navigation>li:nth-child(6){
}
/**/
.has-feedback.search {
top: 8px;
}
.search.has-feedback .form-control {
height: 30px;
line-height: 30px;
min-width: 220px;
}
.search .form-control-feedback {
height: 30px;
line-height: 30px;
}
/**/
.control-label .text-danger {
/* margin-left: 2px; */
}
/**/
.modal .modal-dialog {
margin-top: 120px;
}
.modal-header {
padding: 10px 15px;
border-bottom: 1px solid #eee;
}
.modal-header .close {
top: 30%;
}
.modal-body .deleteText {
font-size: 16px;
}
#timedTaskDelete .modal-dialog {
margin-top: 20%;
}
/**/
.tooltip-inner {
white-space: nowrap;
}
.tooltip.top {
left: -17px !important;
}
/**/
.dataTables_filter input {
min-width: 200px;
}
.dataTables_filter .add-btn {
margin-right: 20px;
position: relative;
top: -3px;
}
.dataTables_filter .add-btn i {
margin-right: 5px;
position: relative;
top: -3px;
}
.selectboxit-container .selectboxit-options{
padding: 0;
}
.ztree {
padding: 5px;
}
.ztree li a, .ztree li a.curSelectedNode {
display: inline-block;
height: 26px;
line-height: 26px;
}
.ztree li a.curSelectedNode {
background-color: rgba(0, 0, 0, .1);
}
.ztree li span {
font-size: 14px;
}
.tree-editable {
padding: 10px;
}
.ztree li span.button.add, .ztree li span.button.edit, .ztree li span.button.remove {
vertical-align: middle;
}
.saveSet{
margin-bottom: 10px;
}
.saveSet i{
margin-right: 5px;
position: relative;
top:-2px;
}
/**/
.datepicker.dropdown-menu {
z-index: 1099;
}
.validation-error-label, .validation-valid-label {
margin-bottom:0px;
}
/* */
.loading {
position: fixed;
top: 0;
left: 0;
width: 100%;
height: 100%;
display: none;
z-index: 99999;
}
.loading_bg {
background-color: #000;
opacity: 0.5;
filter: alpha(opacity=50);
-moz-opacity: 0.5;
position: absolute;
top: 0;
left: 0;
right: 0;
height: 100%;
width: 100%;
}
.loading_mean {
width: 40px;
height: 40px;
background: #fff;
position: absolute;
top: 50%;
margin-top: -25px;
left: 50%;
margin-left: -25px;
border-radius: 5px;
text-align: center;
padding-top: 7px;
}
``` |
Henry Williams (11 February 1792 – 16 July 1867) was the leader of the Church Missionary Society (CMS) mission in New Zealand in the first half of the 19th century.
Williams entered the Royal Navy at the age of fourteen and served in the Napoleonic Wars. He went to New Zealand in 1823 as a missionary. The Bay of Islands Māori gave Williams the nickname Karu-whā ("Four-eyes" as he wore spectacles). He was known more widely as Te Wiremu. ('Wiremu' being the Māori form of 'William'). His younger brother, William Williams, was also a missionary in New Zealand and known as "the scholar-surgeon". Their grandfather, the Reverend Thomas Williams (1725–1770), was a Congregational minister at the Independent Chapel of Gosport.
Although Williams was not the first missionary in New Zealand – Thomas Kendall, John Gare Butler, John King and William Hall having come before him – he was "the first to make the mission a success, partly because the others had opened up the way, but largely because he was the only man brave enough, stubborn enough, and strong enough to keep going, no matter what the dangers, and no matter what enemies he made".
In 1840, Williams translated the Treaty of Waitangi into the Māori language, with some help from his son Edward.
On 21 September 1844, Williams was installed as Archdeacon of Te Waimate in the diocese centred on Te Waimate mission.
Parents, brothers and sisters
Williams was the son of Thomas Williams (Gosport, England, 27 May 1753 – Nottingham 6 January 1804) and Mary Marsh (10 April 1756 – 7 November 1831) who had married in Gosport on 17 April 1783. Thomas Williams was a supplier of uniforms to the Royal Navy in Gosport. In 1794, Thomas and Mary Williams and their six children moved to Nottingham, then the thriving centre of the East Midlands industrial revolution. Thomas Williams was listed in the Nottingham trade directories as a hosier. The industry was based on William Lee's stocking frame knitting machine. The business was successful. Thomas Williams received recognition as a Burgess of Nottingham in 1796 and as a Sheriff of Nottingham in 1803. However the prosperity which had been such a feature of the hosiery industry in the second half of the 18th century ended. In 1804, when Thomas Williams died of typhus at the age of 50, his wife was left with a heavily mortgaged business with five sons and three daughters to look after.
Williams's parents had nine children, of whom six (including himself) were born in Gosport and three (including William Williams) in Nottingham:
Mary (Gosport, England, 2 March 1784 – Gosport, England, 19 April 1786)
Thomas Sydney (Gosport, England, 11 February 1786 – Altona, Germany, 12 February 1869)
Lydia (Gosport, England, 17 January 1788 – 13 December 1859), married (7 July 1813) Edward Garrard Marsh (8 February 1783 – 20 September 1862)
John (Gosport, England, 22 March 1789 – New Zealand, 9 March 1855)
Henry (Gosport, England, 11 February 1792 – Pakaraka, Bay of Islands, New Zealand 16 July 1867)
Joseph William (Gosport, England, 27 October 1793 – Gosport, England, August 1799)
Mary Rebecca (Nottingham, England, 3 June 1795 – Bethlehem, Palestine 17 December 1858)
Catherine (Nottingham, England, 28 July 1797 – Southwell, Nottinghamshire, England, 11 July 1881)
William (Nottingham, England, 18 July 1800 – Napier, New Zealand, 9 February 1878)
Williams was aged 11 when his father died (his brother William Williams was three).
1806–1815: Navy years
In 1806, aged 14, Williams entered the Royal Navy, serving on . He became a midshipman in 1807. He then served on HMS Maida under Captain Samuel Hood Linzee during the Battle of Copenhagen when the Danish fleet was seized in 1807. He landed with the party of seamen who manned the breaching battery before the city. He participated in the engagement on 13 February 1810, when 8 boats under the command of Lieutenant Gardiner Henry Guion, attacked nine French gun boats in the Basque Roads.
On , under Captain Woodley Losack, he took part in the Battle of Tamatave (1811) between three English frigates, under the command of Captain Schomberg, and three French vessels of superior force. Williams was wounded and never entirely recovered. For this service he qualified for the Naval General Service Medal, which was awarded in 1847 with clasp "Off Tamatave 20 May 1811".
After the outbreak of the War of 1812 between Britain and the United States, he served on as part of the blockading squadron off New York City. He was transferred to and served under Captain Henry Hope in the action on 14 January 1815 against the American warship . When the latter was forced to surrender, Williams was a member of the small prize crew that sailed the badly damaged vessel to port, after riding out a storm and quelling a rebellion of the American prisoners. In 1848 the Admiralty authorized the issue of the Naval General Service Medal, with clasp "Endymion wh. President", to any still surviving crew from Endymion.
Before serving on HMS Saturn, Williams sat and passed his examinations for the rank of lieutenant, although he was not promoted to lieutenant until 28 February 1815, after the Treaty of Ghent was ratified by the United States. When peace came in 1815, he retired on half pay. At the age of 23 he had been "in the North Sea and the Baltic, around the French and Spanish coasts, southwards to the Cape, up to the eastern shores of Madagascar, across the Indian Ocean to Mauritius, and northward to the coast of India. After service at Madras and Calcutta, it was on into the cold American winter and that epic last naval engagement in which he took part, on the Endymion".
Williams' experiences during the Napoleonic Wars and the War of 1812 influenced his decision to become a Christian missionary and peacemaker in carrying out the work of the Church Missionary Society in what was then considered an isolated and dangerous mission in Aotearoa (New Zealand).
Marriage and children
After leaving the Royal Navy, Williams gained employment at Cheltenham, as a teacher of drawing. His artistic skills are apparent in the drawings he made in New Zealand. Williams married Marianne Coldham on 20 January 1818. They had eleven children:
Edward Marsh (2 November 1818 – 11 October 1909). Married Jane Davis, daughter of the Rev. Richard Davis, a CMS missionary.
Marianne (28 April 1820 – 25 November 1919). Married the Rev. Christopher Pearson Davies, a CMS missionary.
Samuel (17 January 1822 – 14 March 1907). Married Mary Williams, daughter of William and Jane Williams.
Henry (Harry) (10 November 1823 – 6 December 1907). Married Jane Elizabeth Williams (also a daughter of William and Jane).
Thomas Coldham (18 July 1825 – 19 May 1912). Married Annie Palmer Beetham, daughter of William Beetham.
John William (6 April 1827 – 27 April 1904). Married Sarah Busby, daughter of James Busby.
Sarah (26 February 1829 – 5 April 1866). Married Thomas Biddulph Hutton.
Catherine (Kate) (24 February 1831 – 8 January 1902). Married the Rev. Octavius Hadfield.
Caroline Elizabeth (13 November 1832 – 20 January 1916). Married Samuel Blomfield Ludbrook.
Lydia Jane (2 December 1834 – 28 November 1891) Married Hugh Carleton. Lydia died in Napier, New Zealand on 28 November 1891.
Joseph Marsden (5 March 1837 – 30 March 1892).
Missionary
Edward Garrard Marsh, the husband of their sister Lydia, would play an important role in the life of Henry and William. He was a member of the Church Missionary Society (CMS) and was described as "influential" in the decision of Henry and William to convert to Anglicanism in February 1818, and then to join the CMS. Williams received The Missionary Register from Marsh, which described the work of CMS missionaries. Williams took a special interest in New Zealand and its native Māori people. It was not until 1819 that he offered his services as a missionary to the CMS, being initially accepted as a lay settler, but was later ordained.
Williams studied surgery and medicine and learned about boat-building. He studied for holy orders for two years and was ordained a deacon of the (Anglican) Church of England on 2 June 1822 by the Bishop of London; and as a priest on 16 June 1822 by the Bishop of Lincoln.
On 11 September 1822, Williams with his wife Marianne and their three children embarked on the Lord Sidmouth, a convict ship carrying women convicts to Port Jackson, New South Wales, Australia. In February 1823, in Hobart, Williams met Samuel Marsden for the first time. In Sydney he met Marsden again and in July 1823 they set sail for New Zealand, accompanying Marsden on his fourth visit to New Zealand on board the Brampton. In 1823 he arrived in the Bay of Islands and settled at Paihia, across the bay from Kororāreka (nowadays Russell); then described as "the hell-hole of the South Pacific" because of the abuse of alcohol and prostitution that was the consequence of the sealing ships and whaling ships that visited Kororāreka.
Early days at Paihia
The members of the CMS were under the protection of Hongi Hika, the rangatira (chief) and war leader of the Ngāpuhi iwi (tribe). The immediate protector of the Paihia mission was the chief, Te Koki and his wife Ana Hamu, a woman of high rank, gave permission to the CMS to occupy the land at Paihia. Williams was appointed to be the leader of the missionary team. Williams adopted a different approach to missionary work as that applied by Marsden. Marsden's policy had been to teach useful skills rather than focus on religious instruction. This approach had little success in fulfilling the aspirations of the CMS as an evangelistic organisation. Also, in order to obtain essential food, the missionaries had yielded to the pressure to trade in muskets, the item of barter in which Māori showed the greatest interest in order to engage in intertribal warfare during what is known as the Musket Wars.
Williams concentrated on the salvation of souls. The first baptism occurred in 1825, although it was another 5 years before the second baptism. Schools were established, which addressed religious instruction, reading and writing and practical skills. Williams also stopped the trade in muskets, although this had the consequence of reducing trade for food as Māori withheld the supply of food so as to pressure the missionaries to resume the trade in muskets. Eventually the mission began to grow sufficient food for itself. Māori eventually came to see that the ban on muskets was the only way to bring an end to the tribal wars, but that took some time.
At first there were several conflicts and confrontations with the Ngāpuhi. One of the most severe was the confrontation with the chief Tohitapu on 12 January 1824, which was witnessed by other chiefs. The incident began when Tohitapu visited the mission. As the gate was shut, Tohitapu jumped over the fence. Williams demanded that Tohitapu enter the mission using the gate. Tohitapu was a chief and a tohunga, skilled in the magic known as makutu. Tohitapu was offended by William's demand and began a threatening haka flourishing his mere and taiaha. Williams faced down this challenge. Tohitapu then seized a pot, which he claimed as compensation for hurting his foot in jumping over the fence, whereupon Williams seized the pot from Tohitapu. The incidence continued through the night during which Tohitapu began a karakia or incantation of bewitchment. Williams had no fear of the karakia. The next morning Tohitapu and Williams reconciled their differences – Tohitapu remained a supporter of Williams and the mission at Paihia.
This incident and others in which Williams faced down belligerent chiefs, contributed to his growing mana among the Māori by established to the Māori that Williams had a forceful personality, "[a]lthough his capacity to comprehend the indigenous culture was severely constrained by his evangelical Christianity, his obduracy was in some ways an advantage in dealings with the Maori. From the time of his arrival he refused to be intimidated by the threats and boisterous actions of utu and muru plundering parties".
Kororāreka (Russell) was a provisioning station for whalers and sealers operating in the South Pacific. Apart from the CMS missionaries, the Europeans in the Bay of Islands were largely involved in servicing the trade at Kororāreka. On one occasion escaped convicts arrived in the Bay of Islands. On the morning of 5 January 1827 a brig had arrived, the Wellington, a convict ship from Sydney bound for Norfolk Island. The convicts had risen, making prisoners of the captain, crew, guard and passengers. Williams convinced the captains of two whalers in the harbour to fire into and retake the Wellington. Forty convicts escaped. Threats were made to shoot Williams, whom the convicts considered instrumental in their capture.
Building of the schooner Herald
Starting in 1824 the 55 ton schooner was constructed on the beach at Paihia. Williams was assisted by Gilbert Mair who became the captain of Herald with William Gilbert Puckey as the mate. They launched Herald in 1826. This ship enabled Williams better to provision the mission stations and to more easily visit the more remote areas of New Zealand. Heralds maiden voyage brought Williams to Port Jackson, Australia. Here he joined his younger brother William and his wife Jane. William, who had studied as a surgeon, had decided to become a missionary in New Zealand. They sailed to Paihia on board , the same ship that brought William and Jane from England.
Herald was wrecked in 1828 while trying to enter Hokianga Harbour.
Translation of the Bible and dictionary making
The first book published in the Māori language was A Korao no New Zealand! The New Zealanders First Book!, published by Thomas Kendall in 1815. In 1817 Tītore and Tui (also known as Tuhi or Tupaea (1797?–1824)) sailed to England. They visited Professor Samuel Lee at Cambridge University and assisted him in the preparation of a grammar and vocabulary of Māori. Kendall travelled to London in 1820 with Hongi Hika and Waikato (a lower ranking Ngāpuhi chief) during which time work was done with Professor Samuel Lee, which resulted in the First Grammar and Vocabulary of the New Zealand Language (1820). The CMS missionaries did not have a high regard for this book. Williams organised the CMS missionaries into a systematic study of the language and soon started translating the Bible into Māori. After 1826 William Williams became involved in the translation of the Bible and other Christian literature, with Henry Williams devoting more time to his efforts to establish CMS missions in the Waikato, Rotorua and Bay of Plenty.
In July 1827 William Colenso printed the first Māori Bible, comprising three chapters of Genesis, the 20th chapter of Exodus, the first chapter of the Gospel of St John, 30 verses of the fifth chapter of the Gospel of St Matthew, the Lord's Prayer and some hymns. It was the first book printed in New Zealand and his 1837 Māori New Testament was the first indigenous language translation of the Bible published in the southern hemisphere. By 1830 the CMS missionaries had revised the orthography for writing the Māori; for example, 'Kiddeekiddee' became, what is the modern spelling, 'Kerikeri'.
After 1844, Robert Maunsell worked with William Williams on the translation of the Bible. William Williams concentrated on the New Testament; Maunsell worked on the Old Testament, portions of which were published in 1827, 1833 and 1840 with the full translation completed in 1857. William Gilbert Puckey also collaborating with William Williams on the translation of the New Testament, which was published in 1837 and its revision in 1844. William Williams published the Dictionary of the New Zealand Language and a Concise Grammar in 1844.
Musket Wars
In the early years of the CMS mission there were incidents of intertribal warfare. In 1827, Hongi Hika, the paramount Ngāpuhi chief, instigated fighting with the tribes to the north of the Bay of Islands. In January 1827, Hongi Hika was accidentally shot in the chest by one of his own warriors. On 6 March 1828, Hongi Hika died at Whangaroa. Williams was active in promoting a peaceful solution in what threatened to be a bloody war. The death of Tiki, a son of Pōmare I (also called Whetoi) and the subsequent death of Te Whareumu in 1828 threw the Hokianga into a state of uncertainty as the Ngāpuhi chiefs debated whether revenge was necessary following the death of a chief. Williams, Richard Davis and Tohitapu mediated between the combatants. As the chiefs did not want to escalate the fighting, a peaceful resolution was achieved.
In 1830 there was a battle at Kororāreka, which is sometimes called the Girls' War, which led to the death of the Ngāpuhi leader Hengi. Williams and Ngāpuhi chiefs, including Tohitapu, attempted to bring an end to the conflict. When the highly respected Samuel Marsden arrived on a visit, he and Williams attempted to negotiate a settlement in which Kororāreka would be ceded by Pōmare II (nephew of Pōmare I, originally called Whiria, also called Whetoi) as compensation for Hengi's death, which was accepted by those engaged in the fighting. However the duty of seeking revenge had passed to Mango and Kakaha, the sons of Hengi, they took the view that the death of their father should be acknowledged through a muru, or war expedition against tribes to the south. It was accepted practice to conduct a muru against tribes who had no involvement in the events that caused the death of an important chief.
Tītore, the war leader of the Ngāpuhi, did not commence the muru until January 1832. Willams accompanied the first expedition, without necessarily believing that he could end the fighting, but with the intention of continuing to persuade the combatants as to the Christian message of peace and goodwill. The journal of Henry Williams provides an extensive account of this expedition, which can be described as an incident in the so-called Musket Wars. In this expedition the Ngāpuhi were successful in battles on the Mercury Islands and Tauranga, with the muru lasted until late July 1832. When Williams sailed back to Paihia from Tauranga the boat was caught in a raging sea. Williams took command out of the hands of the captain and saved the ship. By 1844 the conversion of Ngāpuhi chiefs to Christianity contributed to a significant reduction in the number of incidents of intertribal warfare in the north.
The first conversions of Māori chiefs to Christianity
Karaitiana Rangi was the first person baptised, which occurred in 1825. On 7 February 1830 Rawiri Taiwhanga, a Ngāpuhi chief, was baptised. He was the first high-ranking Māori to be converted to Christianity. This gave the missionary work of the CMS a great impetus, as it influenced many others to do the same. Hone Heke attended the CMS mission school at Kerikeri in 1824 and 1825. Heke and his wife Ono were baptised on 9 August 1835 and Heke later became a lay reader in the Anglican church. For a time Heke lived at Paihia during which time Williams became a close friend and adviser.
On 26 February 1840, Williams baptised Eruera Maihi Patuone and also Patuone's wife with the name of "Lydia". In January 1844 Williams baptised Waikato, the Ngāpuhi chief who had travelled to England with Hongi Hika in 1820. Te Ruki Kawiti was baptised by Williams in 1853.
Expansion of the activities of the CMS mission
Williams played a leading role in the expansion of the activities of the CMS. In 1833 a mission was established at Kaitaia in Northland as well as a mission at Puriri in the Thames area. In 1835 missions were established in the Bay of Plenty and Waikato regions at Tauranga, Matamata and Rotorua and in 1836 a mission was open in the Manakau area.
In April 1833, 7 Ngāti Porou men and 5 women arrived in the Bay of Islands on the whaler Elizabeth. They had been made prisoner when the Captain of the whaler left Waiapu after a confrontation with the people of that place. In the Bay of Islands they were delivered to Ngāpuhi chiefs to become slaves. Henry Williams, William Williams and Alfred Nesbit Brown persuaded the Ngāpuhi to give up the slaves. An attempt was made to return them on the schooner Active although a gale defeated that attempt. They returned to the Bay of Islands, where they received religious instruction, until the following summer. In January 1834 the schooner Fortitude carried William Williams and the Ngāti Porou to the East Cape.
In 1839 Williams travelled by ship to Port Nicholson, Wellington, then by foot to Ōtaki with the Rev. Octavius Hadfield, where Hadfield established a mission station. From December 1839 to January 1840 Williams returned over land through Whanganui, Taupo, Rotorua, and Tauranga, the first European who had undertaken that journey.
"From 1830 to 1840 Henry Williams ruled the mission with a kind but firm hand.(...) And when the first settlers of the New Zealand Company landed at Wellington in 1839, Williams did his best to repel them, because he felt they would overrun the country, taking the land and teaching the Māori godless customs".
Attempts to interfere with land purchasing by the New Zealand Company
In November 1839 Williams and Octavius Hadfield arrived in Port Nicholson, Wellington, days after the New Zealand Company purchased the land around Wellington harbour. Within months the company purported to purchase approximately 20 million acres (8 million hectares) in Nelson, Wellington, Whanganui and Taranaki. Williams attempted to interfere with the land purchasing practices of the company. Reihana, a Christian who had spent time in the Bay of Islands, had bought for himself 60 acres (24 hectares) of land in Te Aro, in what is now central Wellington. When Reihana and his wife decided to go and live in Taranaki, Williams persuaded Reihana to pass the land to him to hold in trust for Reihana. On his journey north, Williams records in a letter to his wife, "I have secured a piece of land, I trust, from the paws of the New Zealand Company, for the natives; another piece I hope I have upset." Upon arriving in Whanganui, Williams records, "After breakfast, held council with the chiefs respecting their land, as they were in considerable alarm lest the Europeans should take possession of the county. All approve of their land being purchased and held in trust for their benefit alone."
The Church Missionary Society in London rejected Williams' request for support for this practice of acquiring land on trust for the benefit of the Māori. The society were well aware that the New Zealand Company actively campaigned against those that opposed it plans. While the Church Missionary Society had connections with the Whig Government of Viscount Melbourne, in August 1841 a Tory government came to office. The Church Missionary Society did not want to be in direct conflict with the New Zealand Company as its leaders had influence within the Tory government led by Sir Robert Peel.
Treaty of Waitangi
Williams played an important role in the translation of the Treaty of Waitangi (1840). In August 1839 Captain William Hobson was given instructions by the Colonial Office to take the constitutional steps needed to establish a British colony in New Zealand. Hobson was sworn in as Lieutenant-Governor in Sydney on 14 January, finally arriving in the Bay of Islands on 29 January 1840. The Colonial Office did not provide Hobson with a draft treaty, so he was forced to write his own treaty with the help of his secretary, James Freeman, and British Resident James Busby. The entire treaty was prepared in four days. Realising that a treaty in English could be neither understood, debated or agreed to by Māori, Hobson instructed Williams, who worked with his son Edward, who was also proficient in the Māori language (Te Reo), to translate the document into Māori and this was done overnight on 4 February. At this time William Williams, who was also proficient in Te Reo, was in Poverty Bay.
Bishop Broughton wrote to Williams in January 1840 to recommend that "your influence should be exercised among the chiefs attached to you, to induce them to make the desired surrender of sovereignty to Her Majesty". On 5 February 1840 the original English version of the treaty and its translation into Māori were put before a gathering of northern chiefs inside a large marquee on the lawn in front of Busby's house at Waitangi. Hobson read the treaty aloud in English and Williams read his Māori version. In his translation he used a dialect known as "Missionary Māori", which was not traditional Māori, but had been made up by the missionaries. An example of this in the Treaty is kāwanatanga (governorship), a cognate word which Williams is believed to have transplanted from English. The word kāwanatanga was first used in the Declaration of Independence of New Zealand (1835). It reappeared in 1840 in the Treaty and hence, some argue, was an inappropriate choice. There is considerable debate about what would have been a more appropriate term. Some scholars argue that mana (prestige, authority) would have more accurately conveyed the transfer of sovereignty; although others argue that mana cannot be given away and is not the same thing as sovereignty.
Hone Heke signed the Treaty of Waitangi although there is uncertainty as to whether he signed it on 6 May 1840 or only signed at a later date after being persuaded to sign by other Māori. In any event he was later to cut down the flagstaff on Flagstaff Hill Kororāreka (nowadays Russell) to express his dissatisfaction with how the representatives of Crown subsequently treated the authority of the chiefs as being subservient to that of the Crown.
Williams was also involved in explaining the treaty to Māori leaders, firstly at the meetings with William Hobson at Waitangi, but later also when he travelled to Port Nicholson, Queen Charlotte's Sound, Kāpiti, Waikanae and Ōtaki to persuade Māori chiefs to sign the treaty. His involvement in these debates brought him "into the increasingly uncomfortable role of mediating between two races".
Controversy over land purchases
In the 1830s Williams purchased 11,000 acres (5,420 hectares) from Te Morenga of Pakaraka in the Tai-a-mai district, inland from the Bay of Islands, to provide employment and financial security for his six sons and five daughters as the Church Missionary Society had no arrangements for pensions or other maintenance of CMS missionaries and their families who lived in New Zealand. The Church Missionary Society implemented land purchase policies for its missionaries in Australia, which involved the society paying for the purchase of land for the children of missionaries, but discussions for such a policy for the New Zealand missions had not been settled.
The purchase of the land was reviewed by Land Commissioner FitzGerald under the Land Claims Ordinance 1841. FitzGerald, in the Land Office report of 14 July 1844, recommended that Governor FitzRoy confirm the award in favour of Williams of 9,000 of the 11,000 acres as Williams "appears to have paid on behalf of himself and children enough to entitle them to (22,131) twenty-two thousand one hundred and thirty-one acres". This did not end the controversy over the purchase of land by Williams as the New Zealand Company, and others with an interest in acquiring Māori land, continued to attack the character of Williams. These land purchases were used by the notorious John Dunmore Lang, of New South Wales, as a theme for a virulent attack on the CMS mission in New Zealand in the second of four "Letters To the Right Hon. Earl Durham" that were published in England. Lord Durham was a supporter of the New Zealand Company.
Hone Heke and the Flagstaff War
In 1845 George Grey arrived in New Zealand to take up his appointment as Governor. At this time Hone Heke challenged the authority of the British, beginning by cutting down the flagstaff on Flagstaff Hill at Kororāreka. On this flagstaff the flag of the United Tribes of New Zealand had previously flown, now the Union Jack was hoisted; hence the flagstaff symbolised the grievances of Heke and his allies as to changes that had followed the signing of the Treaty of Waitangi.
After the battle of Te Ahuahu Heke went to his pā at Kaikohe to recover from his wounds. He was visited by Williams and Robert Burrows, who hoped to persuade Heke to end the fighting. During the Flagstaff War Williams also wrote letters to Hone Heke in further attempts to persuade Heke and Kawiti to cease the conflict. In 1846, following the battles at Ōhaeawai pā and Ruapekapeka pā, Hone Heke and Te Ruki Kawiti sought to end the Flagstaff War; with Tāmati Wāka Nene acting as an intermediary, they agreed peace terms with Governor Grey.
Dismissed from service with the CMS
Governor Grey was 'shrewd and manipulative' and his main objective was to impose British sovereignty over New Zealand, which he did by force when he felt it necessary. But his first strategy to attain land was to attack the close relationship between missionaries and Māori, including Henry Williams who had relationships with chiefs.
In following years Governor Grey listened to the voices speaking against the CMS missionaries and Grey accused Williams and the other CMS missionaries of being responsible for the Flagstaff War; The newspaper New Zealander of 31 January 1846 inflamed the attack in an article referring to "Treasonable letters. Among the recent proclamations in the Government Gazette of the 24th instant, is one respecting some letters found in the pa at Ruapekapeka, and stating that his Excellency, although aware that they were of a treasonable nature, ordered them to be consigned to the flames, without either perusing or allowing a copy of them to be taken."
In a thinly disguised reference to Williams, with the reference to "their Rangatira pakeha [gentlemen] correspondents", the New Zealander went on to state: "We consider these English traitors far more guilty and deserving of severe punishment, than the brave natives whom they have advised and misled. Cowards and knaves in the full sense of the terms, they have pursued their traitorous schemes, afraid to risk their own persons, yet artfully sacrificing others for their own aggrandizement, while, probably at the same time, they were most hypocritically professing most zealous loyalty."
Official communications also blamed the missionaries for the Flagstaff War. In a letter of 25 June 1846 to William Ewart Gladstone, the Colonial Secretary in Sir Robert Peel's government, Governor Grey referred to the land acquired by the CMS missionaries and commented that "Her Majesty's Government may also rest satisfied that these individuals cannot be put in possession of these tracts of land without a large expenditure of British blood and money". However, Heke took no action against the CMS missionaries during the war and directed his protest at the representatives of the Crown, with Hone Heke and Te Ruki Kawiti fighting the British soldiers and the Ngāpuhi led by Tāmati Wāka Nene who remained loyal to the Crown.
In 1847 William Williams published a pamphlet that defended the role of the Church Missionary Society in the years leading up to the war in the north. The first Anglican bishop of New Zealand, George Selwyn, took the side of Grey in relation to the purchase of the land, and in 1849 the CMS decided to dismiss Williams from service when he refused to give up the land acquired for his family at Pakaraka.
Retirement at Pakaraka and reinstatement to the CMS
Williams and his wife moved to Pakaraka where his children were farming the land that was the source of his troubles. He continued to minister and preach in Holy Trinity Church in Pakaraka, which was built by his family. He lived by the church, in a house known as "The Retreat", which still stands.
Governor Grey's first term of office ended in 1853. In 1854 Williams was reinstated to CMS after Bishop Selwyn and George Grey addressed the committee of the CMS and requested his reinstatement. Sir George Grey returned to New Zealand in 1861 as Governor. Williams welcomed his return, meeting Grey at Te Waimate mission in November 1861.
Williams died on 16 July 1867 and was buried in the grounds of Holy Trinity Church in Pakaraka.
The Revd Matthew Taupaki lead the fundraising of £200 among the Ngāpuhi for a monumental stone in memory of Archdeacon Williams. He spoke at the unveiling of the monumental stone in the grounds of St. Paul's Anglican Church, Paihia, on 11 January 1876.
Gallery
Notes
Footnotes
Citations
Literature and sources
(1961) – The Early Journals of Henry Williams 1826 to 1840. Christchurch : Pegasus Press. online available at New Zealand Electronic Text Centre (NZETC) (2011-06-27)
(1874) – The life of Henry Williams, Archdeacon of Waimate, Volume I. Auckland NZ. Online available from Early New Zealand Books (ENZB)
(1877) – The life of Henry Williams, Archdeacon of Waimate, Volume II. Auckland NZ. Online available from Early New Zealand Books (ENZB)
(2004) – Gilbert Mair, Te Kooti's Nemesis. Reed Publ. Auckland NZ.
(1992) – Faith and farming Te huarahi ki te ora; The Legacy of Henry Williams and William Williams. Published by Evagean Publishing, 266 Shaw Road, Titirangi, Auckland NZ. (soft cover), (hard cover), (leather bound)
(2011) – Te Wiremu – Henry Williams: Early Years in the North, Huia Publishers, New Zealand
(2004) – Letters from the Bay of Islands, Sutton Publishing Limited, United Kingdom; (Hardcover). Penguin Books, New Zealand, (Paperback)
(1998) – East Coast Pioneers. A Williams Family Portrait; A Legacy of Land, Love and Partnership. Published by The Gisborne Herald Co. Ltd, Gladstone Road, Gisborne NZ.
(1963) – Nine New Zealanders. Christchurch : Whitcombe and Tombs. The chapter 'Angry peacemaker: Henry Williams – A missionary's courage wins Maori converts' (p. 32 – 36)
(2007) – Williams, Henry 1792 – 1867 in Dictionary of New Zealand Biography (DNZB), updated 22 June 2007
(1973) – Te Wiremu: A Biography of Henry Williams, Christchurch : Pegasus Press
(1867) – Christianity among the New Zealanders. London. Online available from Archive.org.
External links
Henry Williams copy of the Treaty of Waitangi on New Zealand History online.
from the Dictionary of New Zealand Biography
The Early Journals of Henry Williams; Senior Missionary in New Zealand of the Church Missionary Society (1826–40). Edited by Lawrence M. Rogers. Pegasus Press, Christchurch 1961, at NZETC
some sketches made by Henry Williams at NZETC
The Character of Henry Williams described by Hugh Carleton (1874) – The Life of Henry Williams
1792 births
1867 deaths
Royal Navy officers
Royal Navy personnel of the Napoleonic Wars
19th-century English Anglican priests
Church Mission Society missionaries
English Anglican missionaries
Anglican missionaries in New Zealand
Anglican archdeacons in New Zealand
People from the Bay of Islands
Musket Wars
Treaty of Waitangi
Flagstaff War
Translators of the Bible into Māori |
Tadej Pogačar (; born 21 September 1998) is a Slovenian professional cyclist who currently rides for UCI WorldTeam . He won the 2020 and 2021 editions of the Tour de France, winning three different jerseys during each Tour, a feat unseen in nearly four decades. Comfortable in time-trialing, one-day classic riding and grand-tour climbing, he has been compared to legendary all-round cyclists such as Eddy Merckx, Bernard Hinault and Fausto Coppi.
In 2019, he became the youngest cyclist to win a UCI World Tour race with the Tour of California win at the age of 20. Later in the year, in his debut Grand Tour, Pogačar won three stages of the Vuelta a España en route to an overall third-place finish and the young rider title. In both his Tour de France debut and the following year, he won three stages and the race overall, as well as the mountains and young-rider classifications, becoming the only rider to win these three classifications simultaneously. He is the first Slovenian winner, and, at the age of 21, the second-youngest winner after Henri Cornet, who won in 1904 at the age of 19. He is the first road cyclist in history to break the 6,000-point barrier in UCI World Ranking. He is a three time National Time Trial champion (2019, 2020, 2023).
He is the only rider wearing white jersey at Tour de France 4-times overall and record 75 days in total.
He has won three different one-day Monuments five times (Tour of Flanders and Liège–Bastogne–Liège once and Giro di Lombardia three times), Paris-Nice once and Tirreno–Adriatico on two occasions.
In 2021, he also made history when he became the first Tour de France winner to take an Olympic medal in the road race in the same year after he took bronze at the men's road race.
He is the current men's UCI road racing world No.1. He has been No.1 for a record total number of weeks and record number of consecutive weeks. He finished the 2021 and 2022 seasons as world No.1.
Career
Early career
Pogačar followed his older brother Tilen in joining the Rog Ljubljana club at the age of nine. In 2011 he came to the attention of Road World Championship medallist Andrej Hauptman, who is as of 2021 his coach and head coach and selector for the Slovenian national cycling team. Hauptman watched Pogačar pursuing a group of much older teenagers from 100 metres behind. Thinking that Pogačar was struggling to keep up with the older riders, he told the race organisers that they should provide some assistance to Pogačar: the organisers explained that the younger rider was in fact about to lap the group he was chasing. Hauptman subsequently managed Pogačar as an under-23 rider with the team, before joining UAE Team Emirates as a directeur sportif in May 2019, after Pogačar joined the team.
UAE Team Emirates (2019 – Present)
2019
Pogačar joined from the 2019 season, a deal that was made ahead of the 2018 Tour de l'Avenir, which he won. He made his debut for the team at the Tour Down Under, where he finished 13th overall. He went on to win the Volta ao Algarve, taking the race lead after winning the second stage. He also placed sixth at the Tour of the Basque Country. In May 2019, he won the Tour of California, becoming the youngest rider to win a UCI WorldTour stage race. He took the race lead after winning the queen stage to Mount Baldy on stage 6. In June, Pogačar won the Slovenian national time trial championship after beating Matej Mohorič by 29 seconds.
In August, Pogačar was named in the team's startlist for the Vuelta a España, his debut in a Grand Tour. In the first week, he performed strongly, placing himself in the top ten on GC (General Classification) before winning his first Grand Tour stage on the rain-soaked stage to Cortals d'Encamp. The win allowed him to move inside the top five on GC. On stage 13, which finished on the steep climb of Los Machucos, he was the only rider to stay with the race leader and his compatriot, Primož Roglič. Pogačar ended up winning his second stage to move up to third overall, where he stayed heading into the second rest day. After losing time on stage 18, he dropped down to fifth on GC. On the penultimate stage, with one last chance to move up the standings, Pogačar launched an attack, going on an almost solo breakaway. He eventually took his third stage win, winning by more than a minute and a half over the rest of the contenders. The win allowed him to finish the Vuelta in third overall, the final podium position, and giving him the victory in the young rider classification.
2020
Before the season started, Pogačar announced that he was making his debut at the Tour de France, where he planned on riding in support of Fabio Aru. He made his season debut at the Volta a la Comunitat Valenciana, where he won two stages on his way to winning the race. At the curtailed UAE Tour, he won the fifth stage, which finished atop the Jebel Hafeet, and finishing second to Adam Yates on GC. In March, cycling events were among those postponed by the COVID-19 pandemic. When the season resumed, he took fourth overall in the Critérium du Dauphiné. In the Slovenian national championships, he finished second to Primož Roglič in the road race before defeating him in the time trial, defending his title.
In the Tour de France, Pogačar quickly demonstrated that he was in better form than Aru, his team's initial leader, after finishing second to Roglič on stage four, which finished atop the climb of Orcières-Merlette. However, he lost almost a minute and a half on stage 7, which was affected by crosswinds. The next day, he began to claw back time when he attacked on the Col de Peyresourde, gaining back 38 seconds over the rest of the contenders. After Aru withdrew on stage 9, Pogacar won the stage to Laruns, his first Tour stage win, by outsprinting Egan Bernal and Roglič, who took the maillot jaune, as well as Marc Hirschi, who had been on an solo breakaway. On stage 13, which finished atop the steep climb of Puy Mary, he was the only rider to stay with Roglič and moving up to second overall at 44 seconds down. He also took the lead in the young rider classification in the process. Two days later, he outsprinted Roglič at the top of the Col du Grand Colombier to take his second stage of the race.
At the beginning of the third week, Pogačar sat in second overall at 40 seconds behind Roglič. On stage 17, the queen stage which finished atop the Col de la Loze, he struggled to follow Roglič, eventually losing 17 seconds. Ahead of the penultimate stage, a time trial finishing at La Planche des Belles Filles, Pogačar faced a 57 second deficit to Roglič. At the first time check, he had already managed to claw back 13 seconds from his compatriot. He headed into the final climb with a lead of 36 seconds and a deficit of 21 seconds on the virtual GC. On the climb, Pogačar continued to gradually gain time before going into the virtual maillot jaune with left. He eventually took the stage victory, almost a minute and a half ahead of Tom Dumoulin while Roglič finished almost two minutes down. His third stage win of the race, the result meant he took the maillot jaune with a lead of 59 seconds on Roglič and also the lead in the mountain classification. The next day, he finished safely in the peloton to officially win the Tour, becoming the first Slovenian winner of the race. At the age of 21, he also became the second youngest winner of the Tour, just behind Henri Cornet, who won the Tour in 1904 at the age of 19. In addition to winning the Tour, he also won the young rider classification as well as the mountains classification. The previous rider to win three jerseys was Eddy Merckx in 1972. He became the twelfth rider to win the Tour de France on his first attempt, and the first since 1983.
After the Tour, Pogačar competed in the men's road race at the World Championships where he rode in support of Roglič, who eventually finished in sixth place. Three days later, he competed at La Flèche Wallonne where he finished in ninth place. He ended his season at Liège–Bastogne–Liège, where he originally finished in fourth place before moving up to third following Julian Alaphilippe's relegation.
2021
He started the 2021 season by winning the UAE Tour, Tirreno–Adriatico, Liège–Bastogne–Liège – his first win in a monument and the Tour of Slovenia.
He began the 2021 Tour de France as one of the pre-race favorites along with Primož Roglič, Geraint Thomas and Richard Carapaz. On stage one he finished with the group of favorites eight seconds behind stage winner Julian Alaphilippe and took the lead in the white jersey classification. Pogačar won the fifth stage, the race's first time trial, finishing 18 seconds ahead of Stefan Küng and taking significant time out of his GC rivals. On stage eight he launched an attack, from more than six minutes behind the breakaway, taking over the yellow jersey with a lead of over four and a half minutes on those considered to be contenders for the overall victory. Pogačar extended his GC lead on the ninth stage to Tignes, responding to an attack by Carapaz on the final climb from the finish and dropping his rivals in the main group, emerging with an overall lead of over two minutes over second placed Ben O'Connor, who had moved up the order after winning the stage from the breakaway.
Following stage eleven, which included a double ascent of Mont Ventoux, the closest rivals to Pogačar included Rigoberto Urán, Jonas Vingegaard and Carapaz, but all them remained more than five minutes behind. Pogačar had temporarily lost some time to Vingegaard on the final ascent of Ventoux before catching him on the descent to the finish alongside Carapaz and Uran. Pogačar extended his lead further with wins on stages 17 (to the Col de Portet) and 18 (in Luz Ardiden), by which point he had a lead of 5' 45" over Vingegaard and an unassailable lead in the polka dot jersey classification. On the penultimate 20th stage, a time trial between Libourne and Saint-Émilion, Pogačar conceded half a minute to Vingegaard but retained a lead of over five minutes going into the final stage to Champs-Élysées in Paris.
Pogačar's win made him the youngest cyclist to win consecutive Tours. This was also the second year in a row that he won three distinctive jerseys. Both during and at the end of the Tour there were accusations of doping on social media and in the press due to the dominance Pogačar displayed. When asked about it he answered, "For sure I am not angry about it. They are uncomfortable questions because the [cycling] history was really bad. I totally understand why there are all of these questions."
Jonathan Vaughters, the Directeur Sportif of one of the teams who had a GC rider competing against Pogačar, Team , offered an explanation for how Pogačar was able to be so successful on stage eight. He explained that the twin factors of uncharacteristic weather conditions and chaotic, uncontrolled racing dynamics played a part. In addition to this in previous years there was usually a dominant team who would contain the attacks of any riders considered a threat for victory, whether it was Team Ineos, Team Jumbo-Visma or Movistar Team. During the 2021 Tour teams Ineos and Jumbo had both suffered from the first week crashes and Movistar was not as strong as they had been in years past. As such by the time Pogačar launched his attack late in the stage, there were no teams remaining who were strong enough to keep him in check. Vaughters also stated, "Simply put, the race was so aggressive all day long, along with really the race as a whole on the flats, that basically by the time the peloton was taking in the climbs, they were cooked. This was further exacerbated by the wet conditions."
After the Tour de France, Pogačar won the bronze medal in the men's road race at the Olympic Games after finishing behind Wout van Aert in the sprint for the silver medal. At the end of July, UAE Team Emirates announced that they had agreed a one-year extension to his contract, committing him to the team up to the end of 2027. Pogačar took a break from racing following the Olympics, returning to competition at the Bretagne Classic Ouest–France at the end of August, where he initially managed to follow an attack by Alaphilippe on a gravelled climb 60 km from the finish along with Mikkel Frølich Honoré and Benoît Cosnefroy, but was dropped by the other escapees who went on to take the podium places.
In September he competed at the European Road Championships in Trentino: in the road race, after a number of breakaways had emerged and been caught by the peloton, he was able to follow an attack by Matteo Trentin to form part of a lead group which expanded to include ten riders, however he was unable to keep pace with a further attack from this group 23 km from the end of the race, with a three-man selection of Remco Evenepoel, Sonny Colbrelli and Cosnefroy dropping their rivals and securing themselves the medals. At the Road World Championships in Flanders later that month, Pogačar finished 37th in the road race.
He then moved on to Italy in October to compete in the autumn classics held there: although he failed to finish the Giro dell'Emilia, he made an impression at Tre Valli Varesine, animating the race with a long-race attack from 120 km: although he lost contact with the head of the race due to a puncture he won the sprint in the chase group to finish third. At Milano–Torino, Pogačar managed to keep pace with the other favourites for most of the day, emerging from the peloton's fragmentation in crosswinds 65 km from the end as part of a front group which absorbed the day's early breakaway, and remaining in contention for the win until losing contact with Adam Yates and Roglič in the closing kilometres of the final climb up Superga: he subsequently lost the two-up sprint for third place to João Almeida.
A few days later, Pogačar won his second monument at Il Lombardia, responding to an attack by Vincenzo Nibali by dropping the Italian and the rest of the lead group 30 km from the finish: although he was subsequently joined at the front of the race by Fausto Masnada, Pogačar won the resulting two-man sprint at the finish line. He became the third rider after Fausto Coppi and Eddy Merckx to win two monuments and the Tour in the same year and just fourth rider to win the Tour de France and the Tour of Lombardy in the same season, after Coppi, Merckx and Bernard Hinault, and the first to do so in 42 years.
As the 2021 offseason began the director of the Giro d'Italia, Mauro Vegni, challenged Pogačar to complete the Giro-Tour Double. Vegni stated, "If I'm not wrong, Pantani was the last. So perhaps it's time for a rider to add their name to the roll of honour." Pogačar did state he plans on attempting to win the Giro at some point in the future, but not in 2022. The only riders to complete any grand tour double since Pantani are Alberto Contador in 2008 and Chris Froome in 2017.
2022
Pogačar started the season off by defending his title at the UAE Tour, winning both mountaintop finishes in the process. Afterwards, Pogačar went to Italy for an Italian block of racing, starting with the Strade Bianche. Despite getting involved in a crash with around 100 kilometres to go, Pogačar attacked on the longest sector of the race, the Monte Santa Marie, with around 50 kilometres remaining. Pogačar gradually built his advantage to more than a minute before holding off the chasers to win the race solo. Two days later, Pogačar started his title defense at Tirreno-Adriatico. He won the uphill finish on stage four before dominating the queen stage. Pogačar won the general classification by almost two minutes over Jonas Vingegaard as well as winning the points and young rider classifications. A week later, Pogačar rode Milan-San Remo, where he attacked several times on the Poggio before finishing in fifth.
A few days later, Pogačar rode his first cobbled classic, the Dwars door Vlaanderen. He was caught in a bad position when the winning group escaped from the peloton and despite his attempts to bridge up to the lead group, he was unable to do so and he finished in tenth. Afterwards, Pogačar rode the Tour of Flanders, his debut at a cobbled Monument. Pogačar attacked on the second ascent of Oude Kwaremont and the Koppenberg to pull ahead of the peloton with a select group of riders. He accelerated twice more on the final ascent of Oude Kwaremont and the Paterberg and only Mathieu van der Poel was able to go with him. The duo rode slowly inside the final kilometre as they prepared for the sprint but this action allowed Dylan van Baarle and Valentin Madouas to come back in the final few hundred metres. Pogačar ended up getting boxed in during the sprint, causing him to finish fourth as van der Poel took the win. Following the race, Pogačar shifted his focus to the Ardennes classics starting with the Flèche Wallonne, where he finished twelfth. Pogačar was supposed to defend his title at Liège–Bastogne–Liège but he skipped it after the death of his fiancée, Urška Žigart's, mother. Pogačar returned to competition at the Tour of Slovenia, his final race before the Tour. He and Rafał Majka dominated the race, winning two stages each with Pogačar winning the general classification ahead of Majka.
Pogačar started the Tour with a third place in the first stage's short individual time trial, gaining time on his rivals for the general classification. On stage 5, which featured cobbles as part of the route, Pogačar rode an aggressive race to gain 13 seconds on the rest of the favorites. The following day, Pogačar won the uphill sprint to Longwy to move into the yellow jersey. On stage 7, which featured the race's first summit finish at La Planche des Belles Filles, Pogačar attacked inside the final kilometre. In the final few hundred metres, Jonas Vingegaard put in an acceleration that was only followed by the Slovenian. Pogačar moved past Vingegaard near the line to win his second successive stage, extending his lead to 35 seconds over the Dane. The next stage, Pogačar finished third in another uphill sprint to gain four more bonus seconds, extending his lead to 39 seconds over Vingegaard.
On stage 11, the race headed to the high mountains with a stage featuring the Télégraphe-Galibier combo before a summit finish at Col du Granon. On the Col du Télégraphe and on the lower slopes of Col du Galibier, Primož Roglič and Vingegaard began to repeatedly attack Pogačar but the Slovene was able to respond each time. Pogačar responded by attacking towards the top of Galibier, bringing only Vingegaard with him. After the rest of the reduced peloton caught the duo on the descent, Vingegaard attacked on the Col du Granon with four kilometres left. Pogačar was unable to respond as he cracked on the climb, losing three minutes and the yellow jersey to Vingegaard, who won the stage. Over the next five stages, Pogačar repeatedly attacked Vingegaard but the Dane was able to respond each time. The race headed to the Pyrenees with Pogačar facing a deficit of almost two and a half minutes to Vingegaard.
The seventeenth stage featured four climbs including a summit finish at Peyragudes. Mikkel Bjerg set a fast pace on the second climb before Brandon McNulty set a furious pace on the third climb, dropping everyone but Pogačar and Vingegaard. On the final climb to Peyragudes, McNulty continued to set the pace before the top two on GC battled it out in a sprint. Pogačar was able to outsprint Vingegaard to win his third stage in the race but the Dane still retained a lead of 2' 18" at the end of the day. The next stage, the race's final mountain stage to Hautacam, Pogačar attacked multiple times on the penultimate climb, the Col du Spandelles, but Vingegaard was able to respond each time. On the descent of the Spandelles, Pogačar crashed but he was able to quickly get back up. Vingegaard waited for Pogačar, with the two shaking hands once Pogačar had caught up. On the final climb to Hautacam, Pogačar was dropped by Vingegaard, with the help of Wout van Aert who was in the breakaway. Pogačar lost more than a minute to Vingegaard, who won the stage to consolidate his yellow jersey. On the penultimate day individual time trial, Pogačar finished third to consolidate his second place on GC before the final stage to Champs-Élysées. Pogačar finished the stage safely to officially finish second on GC as well as taking the young rider classification in the process.
After the Tour, It was confirmed by Javier Guillén, the director of Vuelta a España, that Pogačar elected to skip the 2022 edition of the race. Pogačar returned to racing at the Clásica de San Sebastián, where he was unable to keep up with the pace before climbing off. After a one month break, Pogačar rode at the Bretagne Classic and GP Québec, with the Slovene being unable to battle for the win in both races. At the GP Montréal, Pogačar was part of the five-man lead group that contested for the win. At the finish, Pogačar outsprinted van Aert to take his fourteenth win of the season. Afterwards, Pogačar travelled to Australia to compete at the World Championships. Pogačar finished sixth in the individual time trial before crossing the line in 19th at the road race.
To finish the season, Pogačar went to Italy for the autumn classics. At the Giro dell'Emilia, Pogačar finished second after he was dropped by Enric Mas on the final climb of San Luca. As his final preparation for his title defense at Il Lombardia, Pogačar rode at the Tre Valli Varesine, where he outsprinted the lead group to win the race, his fifteenth of the season. Pogačar ended his season at the Il Lombardia, the final Monument of the year. After his team controlled the majority of the race, Pogačar attacked on the climb of Civiglio with around 20 kilometres left. The only ones who were able to follow his move were Mas and Mikel Landa. On the final climb, the San Fermo della Battaglia, Pogačar and Mas dropped Landa before contesting the win in a two-up sprint. At the line, Pogačar outsprinted Mas to successfully defend his Il Lombardia title. With 16 wins, Pogačar ended the season by being the rider with the most wins in the 2022 season in the men's peloton.
2023
Pogačar started off the 2023 season with a win at the Jaén Paraiso Interior, before winning both the overall in the Vuelta a Andalucía and the Paris-Nice. He continued his domination in the Classics with a further three wins in the Ronde Van Vlaanderen, Amstel Gold Race and La Flèche Wallonne.
At the start of the Liège-Bastogne-Liège, Pogačar crashed with Mikkel Honore, which left him with a fractured wrist, bringing an end to his race. His wrist was successfully operated on and Pogačar was able to return to training on the indoor bike a few weeks after, before joining his team at their training camp in Sierra Nevada. This injury occurred only months away from the Tour de France, casting doubts on whether he would be fit to race or be in the form he needed to compete in the General Classification and he had only two race days to get in shape before the Tour de France.
Pogačar won Stage 6 of the Tour de France 2023 from Tarbes to Cauterets-Cambasque, and Stage 20 from Belfort to Le Markstein. He came second overall in the general classification.
Comparisons with Eddy Merckx
While many had been hesitant to make comparisons between Pogačar and Merckx following his first Tour victory, before he even started his second Tour, Cyrille Guimard, a former rival of Merckx and a Directeur Sportif of Greg LeMond, as well as of former Tour champions Van Impe, Fignon and Hinault claimed that Pogačar was above the level of both Merckx and Hinault. Then, following his performance on stage eight, former Tour de France winner Joop Zoetemelk compared the young Slovenian to Merckx. By the end of the race Merckx himself said that he regarded the Slovenian as "the new Cannibal", in reference to his own nickname, also suggesting that "If nothing happens to him, he can certainly win the Tour de France more than five times". After the 2021 Il Lombardia, Merckx said that he has heard plenty of cyclists called "the new Merckx", but none of them ever fulfilled the promise. In Pogačar's case he thinks it is finally true because of the races he has already won. Ernesto Colnago said that, according to his experience, Pogačar will be "the only one following Eddy Merckx".
Personal life
Tadej was born and grew up in Komenda, 20 km north of the Slovenian capital of Ljubljana. His mother Marjeta is a teacher of French and his father Mirko formerly worked in management at a chair factory before joining Tadej's former team as part of their management team in 2021. Tadej is the third of four siblings.
Pogačar lives in Monaco with his partner, fellow Slovenian professional cyclist Urška Žigart. They became engaged in September 2021. His role model is Alberto Contador. He was also an admirer of Fränk and Andy Schleck while growing up.
In addition to his native Slovenian, Pogačar speaks fluent English and Italian.
Major results
Road
2015
8th Overall Course de la Paix Juniors
2016
1st Time trial, National Junior Championships
1st Overall Giro della Lunigiana
1st Points classification
1st Stage 3
1st Stage 2b Course de la Paix Juniors
3rd Road race, UEC European Junior Championships
3rd Tf GD Dorigo
3rd Montichiari–Roncone
6th Overall Tour du Pays de Vaud
7th G.P. Sportivi Sovilla-La Piccola SanRemo
7th Trofeo Emilio Paganessi
2017
2nd Raiffeisen Grand Prix
3rd Time trial, National Under-23 Championships
3rd Overall Tour de Hongrie
4th Overall Istrian Spring Trophy
5th Overall Tour of Slovenia
1st Young rider classification
5th Overall Carpathian Couriers Race
1st Young rider classification
7th Piccolo Giro di Lombardia
8th GP Laguna
9th GP Capodarco
9th Croatia–Slovenia
10th Giro del Belvedere
2018
National Under-23 Championships
1st Road race
1st Time trial
1st Overall Tour de l'Avenir
1st Overall Grand Prix Priessnitz spa
1st Mountains classification
1st Young rider classification
1st Stage 3
1st Overall Giro del Friuli-Venezia Giulia
1st Young rider classification
1st Trofeo Gianfranco Bianchin
2nd Gran Premio Palio del Recioto
2nd Time trial, National Championships
3rd Overall Istrian Spring Trophy
4th Overall Tour of Slovenia
1st Young rider classification
4th Poreč Trophy
4th Raiffeisen Grand Prix
5th GP Laguna
7th Road race, UCI World Under-23 Championships
8th Giro del Belvedere
2019 (8 pro wins)
1st Time trial, National Championships
1st Overall Tour of California
1st Young rider classification
1st Stage 6
1st Overall Volta ao Algarve
1st Young rider classification
1st Stage 2
3rd Overall Vuelta a España
1st Young rider classification
1st Stages 9, 13 & 20
4th Overall Tour of Slovenia
1st Young rider classification
6th Overall Tour of the Basque Country
1st Young rider classification
6th GP Miguel Induráin
7th Gran Premio di Lugano
2020 (9)
National Championships
1st Time trial
2nd Road race
1st Overall Tour de France
1st Mountains classification
1st Young rider classification
1st Stages 9, 15 & 20 (ITT)
1st Overall Volta a la Comunitat Valenciana
1st Young rider classification
1st Stages 2 & 4
2nd Overall UAE Tour
1st Young rider classification
1st Stage 5
3rd Liège–Bastogne–Liège
4th Overall Critérium du Dauphiné
9th La Flèche Wallonne
2021 (13)
1st Overall Tour de France
1st Mountains classification
1st Young rider classification
1st Stages 5 (ITT), 17 & 18
1st Overall Tirreno–Adriatico
1st Mountains classification
1st Young rider classification
1st Stage 4
1st Overall UAE Tour
1st Young rider classification
1st Stage 3
1st Overall Tour of Slovenia
1st Mountains classification
1st Stage 2
1st Liège–Bastogne–Liège
1st Giro di Lombardia
3rd Road race, Olympic Games
National Championships
3rd Time trial
5th Road race
3rd Overall Tour of the Basque Country
1st Stage 3
3rd Tre Valli Varesine
4th Milano–Torino
5th Road race, UEC European Championships
7th Strade Bianche
10th Time trial, UCI World Championships
2022 (16)
1st Overall Tirreno–Adriatico
1st Points classification
1st Young rider classification
1st Stages 4 & 6
1st Overall UAE Tour
1st Young rider classification
1st Stages 4 & 7
1st Overall Tour of Slovenia
1st Points classification
1st Stages 3 & 5
1st Giro di Lombardia
1st Strade Bianche
1st Grand Prix Cycliste de Montréal
1st Tre Valli Varesine
2nd Overall Tour de France
1st Young rider classification
1st Stages 6, 7 & 17
Held after Stages 6–10
2nd Giro dell'Emilia
4th Tour of Flanders
5th Milan–San Remo
6th Time trial, UCI World Championships
10th Dwars door Vlaanderen
2023 (17)
National Championships
1st Road race
1st Time trial
1st Overall Paris–Nice
1st Points classification
1st Young rider classification
1st Stages 4, 7 & 8
1st Overall Vuelta a Andalucía
1st Points classification
1st Stages 1, 2 & 4
1st Tour of Flanders
1st Giro di Lombardia
1st Amstel Gold Race
1st La Flèche Wallonne
1st Clásica Jaén Paraíso Interior
2nd Overall Tour de France
1st Young rider classification
1st Stages 6 & 20
2nd Giro dell'Emilia
3rd Road race, UCI World Championships
3rd E3 Saxo Classic
3rd Coppa Sabatini
4th Milan–San Remo
4th Giro della Toscana
5th Tre Valli Varesine
General classification results timeline
Classics results timeline
Major championships results timeline
Cyclo-cross
2018–2019
1st National Championships
2021–2022
Slovenian Cup
1st Ljubljana
2022–2023
Slovenian Cup
2nd Ljubljana
Awards
Vélo d'Or: 2021
International Flandrien of the Year: 2021, 2022
References
External links
1998 births
Competitors at the 2018 Mediterranean Games
Living people
Mediterranean Games competitors for Slovenia
People from the Municipality of Komenda
Slovenian male cyclists
Slovenian Tour de France stage winners
Slovenian Vuelta a España stage winners
Tour de France winners
Olympic cyclists for Slovenia
Cyclists at the 2020 Summer Olympics
Olympic bronze medalists for Slovenia
Olympic medalists in cycling
Medalists at the 2020 Summer Olympics |
Mika Karni is an Israeli pop singer and trained violinist.
Discography
Mika Karni (1997)
Sipur Amiti ("A True Story") (2000)
Another World (2001)
Mi'rega Le'rega ("Minute by Minute" / "Moment by Moment") (2002)
Lighthouse (2004)
Simple and Good (2006)
Well-known songs:
"Migdalor"{"Lighthouse"}
"Rahamim"{"Mercy"}
"Nishakti bahura"{"I've kissed a young lady"}
"Mitchell"
References
External links
Living people
21st-century Israeli women singers
Year of birth missing (living people) |
The Calcasieu Ship Channel is a waterway that connects the city of Lake Charles, Louisiana, with the Gulf of Mexico. Its existence allows the Port of Lake Charles, which is more than 30 miles from the Gulf, to be the 11th largest seaport in the United States. The primary use of the channel is the importation of materials for processing in Lake Charles' large refinery industry, including petroleum, liquefied natural gas, and the export of refined products, such as gasoline and chemicals.
Constructed in the 1920s, the channel is a combination of natural lakes, streams, and man-made cuts. Over the years, as ships have grown larger, the channel has had increasing difficulty in accommodating contemporary ships. In June 2009, the Army Corps of Engineers agreed to dredge the channel and bring it up to modern standards.
References
Transportation in Louisiana
Buildings and structures in Lake Charles, Louisiana
1920s establishments in Louisiana |
Haitham Mohammed Ali Abu Hawi Asiri (; born 25 March 2001) is a Saudi Arabian professional footballer who plays as a winger for Al-Ahli and the Saudi Arabia national team.
Career statistics
Club
Notes
International
Scores and results list Saudi Arabia's goal tally first.
Honours
Saudi Arabia U-23
AFC U-23 Asian Cup: 2022
References
External links
2001 births
Living people
People from 'Asir Province
Saudi Arabian men's footballers
Saudi Arabia men's youth international footballers
Saudi Arabia men's international footballers
Men's association football wingers
Saudi Pro League players
Saudi First Division League players
Al-Ahli Saudi FC players
2022 FIFA World Cup players
Footballers at the 2022 Asian Games |
```makefile
libavcodec/flashsv.o: libavcodec/flashsv.c libavutil/intreadwrite.h \
libavutil/avconfig.h libavutil/attributes.h libavutil/bswap.h config.h \
libavcodec/avcodec.h libavutil/samplefmt.h libavutil/avutil.h \
libavutil/common.h libavutil/macros.h libavutil/version.h \
libavutil/intmath.h libavutil/mem.h libavutil/error.h \
libavutil/internal.h libavutil/timer.h libavutil/log.h libavutil/cpu.h \
libavutil/dict.h libavutil/pixfmt.h libavutil/libm.h \
libavutil/intfloat.h libavutil/mathematics.h libavutil/rational.h \
libavutil/attributes.h libavutil/avutil.h libavutil/buffer.h \
libavutil/cpu.h libavutil/channel_layout.h libavutil/dict.h \
libavutil/frame.h libavutil/buffer.h libavutil/samplefmt.h \
libavutil/log.h libavutil/pixfmt.h libavutil/rational.h \
libavcodec/version.h libavutil/version.h libavcodec/bytestream.h \
libavutil/avassert.h libavutil/common.h libavcodec/get_bits.h \
libavcodec/mathops.h libavcodec/vlc.h libavcodec/internal.h \
libavutil/mathematics.h
``` |
Sumarreheide () is a hamlet in Tytsjerksteradiel in the province of Friesland, the Netherlands.
Sumarreheide is not a statistical entity, and the postal authorities have placed it under Sumar. The hamlet has place name signs.
The hamlet was first mentioned around 1700 as Heyd Huysen, and become Suameerderheide in the 20th century. The inhabitants of the hamlet used to live in sod houses. In 1916, ten stone houses were built.
References
External links
Hamlet website (in Dutch)
Tytsjerksteradiel
Populated places in Friesland |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.