Document stringlengths 87 1.67M | Source stringclasses 5 values |
|---|---|
Verizon and Netflix Lock Horns Once Again in Net Neutrality Battle
Say what you will about telecom giant, Verizon -- just don't call the company a monopoly. At least that's what Vice President for Public Policy David Young said in a blog post, headlined "Dispelling the Myth of a Terminating Access Monopoly."
The post responds partly to claims from Netflix that companies have no choice but to pay Verizon, Comcast , and others for direct access to their networks, because the major ISPs rarely compete against each other. According to Netflix, that gives each broadband company domain over large parts of the U.S.
Verizon made it clear in its blog post that it disagrees with that notion. The company said it has filed a declaration by Janusz Ordover, former deputy assistant attorney general for economics in the Antitrust Division of the U.S. Department of Justice and antitrust specialist Andres Lerner, "confirming that there is no 'terminating access monopoly' for wireless broadband."
The document also declares "there is no terminating monopoly in the case of Verizon's wireline broadband services, including Verizon's FiOS broadband service, since these services face near-ubiquitous competition with next generation cable broadband."
The document was commissioned by Verizon and made available to the public here .
It's bigger than just two companies
The Netflix/Verizon dispute is part of a larger argument about exactly how open the Internet should be. The Federal Communications Commission has been carefully studying the issue. While it has not officially announced its intentions, Chairman Tom Wheeler suggested during a panel discussion at the 2015 Consumer Electronics Show earlier this month th at he supports regulating broadband providers under Title II of the Communications Act of 1934.
Wheeler said Title II appears to offer the "best protections" for consumers.He dismissed any idea that using Title II would harm ISPs or disincentivize investment in their networks by pointing out that the wireless industry has thrived even under that same classification .
"For the last 20 years the wireless industry has been monumentally successful -- hundreds of billions of dollars of investments as a Title II regulated [industry]," Wheeler said. There's a way to do Title II right, he explained. "The model has been set in the wireless business."
Using Title II to ensure an open Internet would classify the ISPs as utilities, thus subject to stricter regulation, which the Internet providers have vocally opposed.
FCC Chairman Tom Wheeler (right) spoke about Title II at CES. Source: Screenshot
What is Netflix saying?
Netflix has been a vocal supporter of true net neutrality and filed comments with the FCC on the subject. The document spans 25 pages, but Netflix summarizes its thoughts at the end:
It needs to be stated that in the same way Verizon's study supports its goals, Netflix's document comes out strongly in favor of what would benefit the streaming video provider. Of course, the difference is that Netflix makes it clear it is offering an opinion, while Verizon is attempting to pass off a study it paid for as unbiased research.
Verizon's response
Verizon's document contends that it is not a monopoly in its territories, because it faces competition from cable companies that also offer broadband Internet access. In many cases, that's true. Verizon is usually one of two choices for consumers -- giving it a duopoly, not a monopoly.
Because it has at least one competitor, Verizon dismisses both Netflix's claims and the FCC's rationale for regulating ISPs at all.
"The lack of a 'terminating monopoly' eviscerates the case for Title II reclassification. When these economic considerations are added to the many other legal, factual, and public policy arguments against Title II regulation, the risk of pursuing the radical Title II path becomes all the more clear," Young wrote.
What will happen
While Verizon might not technically have a monopoly, the major ISPs have generally worked together. If consumers had real choice, then at least one major broadband provider would not have forced Netflix into paid interconnectivity deals.
However, all the big boys -- Time Warner Cable , Comcast, AT&T , and Verizon -- have forced the streaming service into these deals.
Calling Verizon a monopoly is wrong -- in most cases it is a duopoly in unofficial collusion with its competitors.
The FCC, however, most likely understands that Verizon's study shows little more than what the company wants it to. Title II means an end to a revenue stream for ISPs, since deals like the paid interconnectivity contracts with Netflix would be illegal under the policy.
Netflix is arguing what's best for Netflix as well, but in this case, the streaming company's interests largely align with those of the public.
Wheeler seems to agree -- and he clearly believes history shows Title II won't be bad for Verizon and the other ISPs.
Your cable company is scared, but you can get rich
You know cable's going away. But do you know how to profit? There's $2.2 trillion out there to be had. Currently, cable grabs a big piece of it. That won't last. And when cable falters, three companies are poised to benefit. Click here for their names. Hint: They're not Netflix, Google, and Apple.
The article Verizon and Netflix Lock Horns Once Again in Net Neutrality Battle originally appeared on Fool.com.
Daniel Kline has no position in any stocks mentioned. He does not recall ever successfully finishing a game of Monopoly. The Motley Fool recommends Netflix and Verizon Communications. The Motley Fool owns shares of Netflix. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy .
Copyright © 1995 - 2015 The Motley Fool, LLC. All rights reserved. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Sun Java Communications Suite 5 Installation Guide
ProcedureTo Run the Installer in Silent Mode
Silent installation can be lengthy, depending on the number and type of product components that you are installing.
1. Verify that your state file is edited correctly for the host.
2. If you are not logged in as root, become superuser.
3. Navigate to the directory where the installation program is located.
cd installer-directory
4. Run the installer using the following syntax:
./installer -nodisplay -noconsole -state statefile
-nodisplay
Suppress the graphical display.
-noconsole
Start the installer in silent mode, suppressing the user interface.
-state
Use the specified state file as input to a silent installation.
statefile
Specify an absolute or relative pathname to a state file.
5. After installation is complete, proceed to the next host and repeat Steps 1 through 4. | ESSENTIALAI-STEM |
When did Flora Nwapa live?
Flora Nwapa was born on January 13, 1931, in Oguta, Nigeria. She had her early education in Oguta, Port Harcourt and Lagos. She went to college at University College Ibadan, Nigeria, and at Edinburgh University in the UK. Nwapa died of pneumonia at the age of 62 on October 16, 1993.
Click here for more African Roots
What were the themes of Nwapa's novels?
Through her books, Nwapa sought to change the narrative of male African authors whose works were full of stereotypes about the African woman. Nwapa's books did the opposite, by telling success stories of African women. Her novels like Efuru and Idu challenged the traditional portrayal of the African woman as one who must always live in the shadows of men because she is perceived to be docile, submissive and unproductive.
What are her most notable novels?
One of Nwapa's most notable novels is Efuru. It portrays a woman who empowers herself enough to financially support her husband and her father. Efuru, the protagonist, breaks anti-feminist stereotypes of traditional African society by showing she has a mind of her own. She makes some crucial decisions in her life based on what she feels is right for her, rather than bow to the demands of others. Other novels include Idu, Never Again, One Is Enough and Women Are Different.
What is the author's legacy?
Nwapa is considered the mother of modern African literature because she was the first female writer on the continent to have her works widely published. Perhaps her most enduring legacy is the birth of contemporary Nigerian female writers who are replicating the themes of her novels in an effort to change the negative narrative of the African woman in a male-dominated literature space.
Is Nwapa a feminist?
While she is reluctant to be seen as a feminist, some of Nwapa's books are noted for advocating women's rights. In her work, she uses female characters to challenge unfair cultural practices that African women are subjected to due to widowhood and childlessness. The use of her novels to tackle unfair cultural practices against women remains an inspiration for Nigerian women's rights activists.
Scientific advice on this article was provided by historians Professor Doulaye Konaté, Professor Lily Mafela and Professor Christopher Ogbogbo. African Roots is supported by the Gerda Henkel Foundation. | FINEWEB-EDU |
Castres–Mazamet Airport
Castres – Mazamet Airport (Aéroport de Castres - Mazamet) is an airport serving Castres and Mazamet and the east of Midi-Pyrénées. The airport is located 7 km southeast of Castres and northwest of Mazamet, near the commune of Labruguière, in the Tarn department.
Facilities
The airport resides at an elevation of 239 m above mean sea level. It has one paved runway designated 14/32 which measures 1825 x. The airport is VFR and IFR compliant.
Airlines and destinations
The following airlines operate regular scheduled and charter flights at Castres–Mazamet Airport: | WIKI |
User:Mph102189
SOS sos sos sos sos sos I’m a black male the American named our race African American we hate the white man for killing us and our brothers and sisters around the world help us escape | WIKI |
Page:The Black Cat November 1916.djvu/41
Rh seat and rewrote his list of names very plainly, labeling it, "Partial list of dead and injured." He then wrote a brief account of the wreck, skeletonizing it to save time in transmission; merely listing the essentials for the rewrite man in the office, and confining it to a single sheet of copy paper. The relief train upon which he had come was about to return, carrying the first of the dead and injured. Stratton gave his story into the keeping of one of the trainmen, who promised to get it on the wire for him.
He went back to the line by the fence. Several new figures had been added to the end and he obtained the names of these. The last one in the row was a little girl. She was conscious, so he leaned down and asked her name. The child stared back at him in a wide-eyed, dazed fashion; and Stratton, obtaining no answer, wrote on his list, "Unidentified girl, about seven, slightly injured—shock." As he wrote, he became conscious that someone had kneeled down opposite. Very tenderly this newcomer raised the frightened girl in her arms and drew a caressing hand over her forehead. "Now tell me your name," she said, a note of maternal gentleness in her tone, and the child answered immediately.
"Why," said the girl, softly, "her mother is down at the other end of the line. How glad they both will be!" And the tense, strained lines of her face relaxed in a quick smile at Stratton.
He had looked up at the first sound of her voice, and now, for an instant, their eyes held each other's. A moment passed before either spoke, and then, unconscious of their surroundings, their hands went out in an instinctive, friendly grasp. Tongues were loosed and words came tumbling from their lips.
"Helen Dimmick—"
"The great Stratton!" exclaimed she, and then the girl between them stirred; this brought both back to the present, repentant at their moment of self-interest. Helen Dimmick, a quick look of sympathy in her face, gathered the child up and carried it to its mother.
"I'll look for you on the train," promised Stratton, returning to his work.
During the greater part of the journey back to town the girl was busy at her volunteer nursing and Stratton gathered up the loose ends of his story. Then he sought her out and they sat together in a deserted rear seat. In a few brief words he explained to her the story of his return to the Sun. Helen Dimmick listened eagerly.
"Why—why I, myself," she began haltingly, and then paused. "It's so surprising; I can hardly explain—"
"There's no need," said Stratton, slowly. "I can do it as well; explain how you one day found leisure to look along the road ahead, and how you fell to wondering if such things as quiet and restfulness really existed anywhere, or if they were only soft-sounding names. And, how, after a time, the days on the Sun rose before your eyes, and you had your answer, and—"
"And the next morning I bought my ticket, laughing at my own folly, | WIKI |
Washington Symphonic Brass
The Washington Symphonic Brass is an American professional modern brass ensemble, and a not-for-profit 501- (c)(3) arts organization. The ensemble performs in the Washington, DC, Maryland, and Northern Virginia areas. The WSB presents live concerts, produces commercial recordings, and educates young brass and percussion musicians. The WSB is the Ensemble-in-Residence at George Mason University and is a collaborative artist with the National Philharmonic Orchestra, the Fairfax Choral Society, and the Amadeus Orchestra.
History
The Washington Symphonic Brass was founded in 1993 by former National Symphony Orchestra trombonist Milton Stevens and trumpeter/arranger Phil Snedecor. It is incorporated in the state of Maryland.
The ensemble performs custom arrangements written by Phil Snedecor for large brass ensemble and percussion (four trumpets, four horns, four trombones, tuba, timpani, and percussion instruments), and plays both classical and modern symphonic music.
The WSB was presented with a Washington Area Music Award for recording excellence.
In 2012, the WSB's CD, The Edge, featured four of Phil Snedecor's arrangements of the music of Stravinsky, Shostakovich, Copland, and Berlioz.
In 2015, the WSB performed a composition by John Henderson at the Cathedral of St. Matthew the Apostle during a visit by Pope Francis.
Discography
* Ancient Airs for Brass & Organ was recorded at Saint Luke Catholic Church in McLean, VA with William Neil, organist of National Presbyterian Church and the National Symphony Orchestra. "Ancient Airs" includes music of Respighi, Hildegard von Bingen, J.S. Bach, Praetorius and others.
* Nielsen on Brass was recorded at Washington National Cathedral with Douglas Major, organist. Included is the music of Carl Nielsen—his Symphony No. 3 "Sinfonia Espansiva", nine of the Short Preludes for Organ, Op. 51, and The Aladdin Suite, Op. 34
* Dances with Brass was recorded at The National Presbyterian Church in Washington, D.C. and includes symphonic dances arranged specifically for the Washington Symphonic Brass by Phil Snedecor.
* Burana in Brass, features music from Carl Orff's Carmina Burana. as well as the Finale to the Saint-Saëns famous "Organ Symphony" and solo performances from members of the WSB. Released on the Warner Classics label. | WIKI |
Martha MILES, Appellant, v. CITY OF EDGEWATER POLICE DEPARTMENT/PREFERRED GOVERNMENTAL CLAIMS SOLUTIONS and State of Florida, Appellees.
No. 1D15-0165.
District Court of Appeal of Florida, First District.
April 20, 2016.
Rehearing Denied May 13, 2016.
Michael J. Winer of the Law Offices of Michael J. Winer, P.A., .Tampa, and Geoffrey Bichler of Bichler, Kelley, Oliver & Longo, PLLC, Maitland, for Appellant.
Kimberly A. Hill of Kimberly A. Hill, P.L., Fort Lauderdale, for Amici Curiae Fraternal Order of Police, Police Benevolent Association, International Union of Police Associations, and Florida Association of State Troopers, in support of Appellant. ■
George A. Helm, III, Lake Mary, and William H. Rogner, Winter Park, for Ap-pellees City of Edgewater Police Department/Preferred Governmental Claims Solutions. ■
Pamela Jo Bondi, Attorney General, Rachel Nordby, Deputy Solicitor General, Office of the Attorney General, Tallahassee, for Intervenor State of Florida.
THOMAS, J.
In this workers’ compensation appeal, Claimant, a law enforcement officer, appeals two orders of the Judge of Compensation Claims (JCC): the first order denied Claimant’s motion to approve two attorney’s fee retainer agreements — one agreement provided for payment of a $1,500 retainer by Claimant’s union, the Fraternal Order of Police Lodge 40(FOP), and a second agreement provided that Claimant would pay her attorney an hourly fee once the $1,500 is exhausted — and the other order on appeal determined'that Claimant failed to establish she sustained a compensable injury. Claimant challenges the constitutionality of sections 440.105 and 440.34, Florida Statutes, which limit attorney’s fees as applied to her. She argues these provisions infringe on her First Amendment rights protected under the United States Constitution.
We hold that the challenged provisions violate Claimant’s First Amendment guarantees of free speech, freedom of association, and right to petition for redress. For the reasons that follow, we reverse the appealed orders, and remand for a new hearing on the motion for approval of the retainer agreements and on Claimant’s petitions for benefits.
Factual and Procedural Background
Through counsel, Claimant filed two petitions for benefits. The first petition alleged she was exposed over time to chemicals related to methamphetamine production, which resulted in her becoming disabled on August 3, 2011. The second petition alleged she was exposed to an intense smell that prevented her from conducting any further investigation regarding a shoplifting case. The Employer/Carrier (E/C) filed Notices of Denial regarding both petitions, disputing occupational causation of Claimant’s condition. Claimant voluntarily dismissed those petitions, and her attorney withdrew as counsel of record.
Thereafter, two retainer agreements were signed in this matter — one between Bichler, Kelley, Oliver & Longo, PLLC (the Firm) and the Fraternal Order of Police (FOP), and one between the Firm and Claimant. The agreement with the FOP provided that the FOP would pay the Firm a flat, fee of $1,500 to represent Claimant. In the retainer agreement signed by Claimant, she stated she understood the. $1,500, fee paid by the FOP would not be “sufficient compensation” if the Firm expended more than 15 hours representing her; accordingly, Claimant agreed to pay her attorney an hourly fee for all attorney time expended beyond 15 hours. Claimant acknowledged in the agreement that the Workers’ Compensation Law prohibits such a fee arrangement, and specifically waived those statutory prohibitions. Claimant further acknowledged that the Firm advised her of the extremely difficult legal burden she must carry in order, to prevail, and stated she was entering into this agreement with the understanding she may not prevail.
In July 2013, Claimant’s attorney filed two more petitions, each alleging a chemical exposure during an investigation, and in each instance seeking compensability of the exposure along with an award of attorney’s fees and costs. The E/C filed a response, again asserting that these claims were the same that had previously been denied, and again disputing occupational causation of Claimant’s condition.
In January 2014, Claimant’s attorney filed a “Motion to Approve Attorney’s Fee,” seeking approval of both retainer agreements. •Claimant’s attorney alleged that because of the extensive litigation necessary to pursue an exposure claim, “it would not be economically feasible for the undersigned to continue on a purely contingent basis with fee restrictions as contained in Florida Statute § 440.34.” The attorney certified-that if the JCC denied the retainer fee, the Firm may have no choice but to withdraw.
An evidentiary hearing on the -motion took place in July 2014. At the hearing, Claimant’s attorney referenced the time-intensive nature of. pursuing an exposure claim under the Workers’ Compensation Law, asserting, “It is economically not feasible for our firm to continue to represent [Claimant] without being paid for it.” Based on the fee restrictions contained in chapter 440 and the contingent nature of the fee, Claimant’s attorney argued that “it is unreasonable to ask ,an attorney to basically work for free.” The E/C represented that it was. taking no position on the issue, because the fee request did not involve an E/C-paid fee.
After hearing .argument, the JCC announced he was denying both retainer agreements as being contrary to the Workers’ Compensation Law:as it currently exists. : In-his'written order, the JCC noted that the argument advanced was
not limited to the assertion that a guideline fee would be inadequate to compensate her attorney in the event she prevailed on the claim, which is the issue in Castellanos [v. Next Door Co., 124 So.3d 392 (Fla. 1st DCA 2013) ] and- was also the issue in the Emma Murray [v. Mariner Health, 994 So.2d 105 [1051] (Fla.2008) ] decisión. - Rather, claimant argues that the contingent nature of the fee, in and of itself, is what leads to the alleged economic infeasibility. This is a new and different argument altogether. To argue that a guideline fee would be inadequate to compensate an attorney in the event the attorney prevailed on the -claim is one thing; to argue that the attorney should be paid up front for .time -spent, without having secured any benefits ... is an entirely different proposition, and I can find no persuasive authority or. reason-to support it.... It is not the province óf a JCC to decide whether the law: is fair or reasonable. Rather,- it is the job of the JCC to apply the law as it exists. I find that the -law •as it currently exists does not allow for non-contingerit, claimant-paid hourly fees for prosecution of a claim- on the merits. ■ -<
Théreafter, 'Claimant’s attorney filed a motion to withdraw'and to impress a lito based oh hours expended. Claimant’s attorney explained that the agreement extended to prosecutibn of claims on behalf of Claimant only if the contractual agreement was approved by the JCC. Further, “[t]he clear understanding between the Claimant and the under signed" counsel was that, should the contract for representation not be approved, then the undersigned counsel would have no choice but to withdraw as counsel of record.” Claimant’s attorney explained that a conflict of interest now arose, because Claimant wished to pursue the claims, but her counsel’s continued representation 'of Claimant would create a financial hardship for her counsel, “as well as an undue burden- on her ability to practice law and to zealously represent her other clients if she* were to be forced to remain as counsel of record on these claims.” Finally, Claimant’s attorney advised that Claimant had been served with' this motion to withdraw “and has indicated she does not object to same.” The .JCC granted the motion to withdraw and impress lien, finding that “claimant and claimants counsel are .in a position of conflict.”
The merits hearing went forward, with Claimant appearing pro se. 'Claimant renewed' her request that the JCC' approve the retainer agreements which would allow her, and the FOP on her behalf, to retain the Firm to represent her. The JCC again advised that the Workers’ Compensation Law does not permit payment of non-contingent hourly -attorney’s fees. Claimant’s'prior-attorney, who was , present as an observer, asked that the JCC take-judicial notice of-affidavits Claimant had obtained from attorneys in which they asserted they did not have time to take this case- on a contingency basis. The E/C objected - on grounds- the affidavits were not the sort, of documents that would qualify-for-judicial notice-and-were not-relevant to the merits of Claimant’s exposure claims. The JCC excluded the affidavits, agreeing they related to the attorney’s fee question that was the subject of -an earlier hearing and should have been submitted at that time:
Next, Claimant argued for' entitlement to medical benefits, including ongoing care, for her two dates of accident. The E/C responded that" it was Claimant’s burden, as she was a law- enforcement officer, to prove by a preponderance of the evidence that she was exposed to a specific level of a specific substance and that the exposure actually eaused her injury. .See § 112.1815(2)(a)l., Fla. Stat. (2011) (providing that first responders must prove exposure to toxic substance by preponderance of evidence). The E/C maintained there was no evidence of a specific exposure and - ho medical evidence linking any exposure to Claimant’s condition.
■’ Claimant was sworn in and testified regarding what occurred on the two dates of accident. She testified that she became ill after each incident and lost time from work, but was eventually- released to return to work. She testified that she received some medical treatment after the second exposure. On cross-examination, she testified she-had been diagnosed with Chronic .Obstructive Pulmonary Disease prior to the first date of accident and had seen her personal physician on three separate visits regarding this condition. Claimant agreed it was possible that at the time of the events she was a cigarette smoker, as she had stopped and started smoking many times. The E/C did not offer any exhibits or testimony from any witness.
In closing argument, Claimant asserted that losing a significant amount of work and requiring medical treatment for a short time after each event “would lead anyone to believe that there was something that occurred that was out of the ordinary from the individual normal health responses.” The E/C noted that this'ease would have been difficult to prove, even ■with counsel: Because Claimant offered no evidence’necessary to meet her'burden of proof, the -E/C asked that the JCC enter an order denying and dismissing her petitions for benefits with prejudice.
In his order, the JCC denied and dismissed both petitions, concluding:
In this case, claimant offered no evidence as to what the specific substance or substances were to which she was exposed. Further, she offered no evidence as to the levels to which she was exposed. Finally, she offered no evidence that the exposure she suffered can cause the injury or disease she complains of. Without such evidence, claimant cannot carry and has not carried her required burden of proof. ,
Claimant filed a motion for rehearing or motion to vacate the final compensation order, arguing, in relevant part, that the JCC erred in not allowing her to submit the affidavits she had secured from attorneys who declined to represent her. Claimant argued that this was new information and evidence which “related to the futility of trying to hire alternative counsel given the nature of her case. The evidence relates directly to constitutional concerns of Equal Protection, Due Process of Law, and First Amendment freedoms which are fundamental rights under both the State and Federal Constitutions.” Claimant argued that she had the right “to build a record related to constitutional issues.” The JCC denied'the motion both on grounds it was untimely and on its merits. Notwithstanding that denial, the JCC allowed Claimant to supplement the record and accepted the affidavits as proffered exhibits, noting that even if he accepted them as evidence, his ruling would not change.-
Legal Background
Paragraph' 440.105(3)(c), Florida Statutes (2011), provides that an attorney receiving á fee for services rendered in connection with proceedings under chapter 440 commits a first-degree misdemeanor, unless the fee is approved by a JCC. Subsection 440.34(1), Florida Statutes (2011), provides the JCC -with the following limits on his or her- ability to approve an attorney’s .fee:
A fee, gratuity, or other consideration may not be paid for- a claimant in connection with any proceedings arising under this chapter, unless approved by the [JCC] or court having jurisdiction over such proceedings. Any attorney’s fee approved by a[JCC] for benefits secured on behalf of a claimant must equal to 20 percent of the first $5,000 of the amount of the benefits secured, 15 percent of the next $5,000 of the amount of the benefits secured, 10 percent of the remaining amount of the benefits secured to be provided during the first 10 years after the date the claim is filed,-and 5 percent of the benefits secured, after 10 years. The [JCC] shall not approve a compensation order, a joint stipulation for lump-sum settlement, a stipulation or agreement between a claimant and his or her attorney, or any other agreement related to benefits under this chapter which provides for an attorney’s fee in excess of the amount permitted by this section. The [JCC] is not required to approve any retainer, agreement between the claimant and his or her attorney. The retainer agreement as to fees and costs may not be for compensation in excess of the amount allowed under this subsection or subsection (7).
Subsection 440.34(2) instructs the JCC to “consider only those benefits secured by the attorney” when awarding a fee. Thus, the relevant statutes impose a criminal penalty on any attorney who accepts a fee for providing legal representation to a workers’ compensation claimant who may not successfully obtain benefits under chapter 440.
The First Amendment of the United States Constitution provides,' in relevant part, that “Congress shall make no law... abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.” Freedom of speech is “among the fundamental personal rights and liberties which are secured to all persons by the Fourteenth Amendment against abridgment, by a state.” - Thornhill v. Ala., 310 U.S. 88, 95, 60 S.Ct. 736, 84 L.Ed. 1093 (1940).
Standard of Review
An as-applied challenge, as raised here, is an argument that a law which is constitutional on its face is nonetheless unconstitutional as applied to a particular case or party, because of its discriminatory effects; in contrast, a facial challenge asserts that a statute always operates unconstitutionally. - In a First Amendment challenge, “content-based speech restrictions will not survive strict scrutiny unless the government can show that the regulation promotes a compelling government interest and that it chooses the least restrictive means to further the articulated interest.” Cashatt v. State, 873 So.2d 430, 434 (Fla. 1st DCA 2004) (citing Sable Commc’ns of Calif., Inc. v. Fed. Commc’ns Comm’n, 492 U.S., 115, 109 S.Ct. 2829, 106 L,Ed.2d 93 (1989)). In Florida workers’ compensation proceedings, constitutional challenges of any sort need not be preserved for appellate review, because JCCs lack jurisdiction to determine constitutionality. See B & B Steel Erectors v. Burnsed, 591 So.2d 644, 647 (Fla. 1st DCA 1991) (“[W]e note that workers’ compensation judges do not have the power to determine the constitutionality of a portion of the Workers’ Compensa.tion Act, and that such issues may be raised for the first time on appeal, without having been preserved below.”).
Furthermore, the applicable legal test by which to review the legislation itself depends upon the particular claim. Because First Amendment rights are fundamental, “we apply strict scrutiny to section 440.34, regarding its effect on these First Amendment rights when taken in conjunction with section 440.105(3)(c).” Jacobson v. Se. Pers. Leasing, Inc., 113 So.3d 1042, 1048 (Fla. 1st DCA 2013). “To survive strict scrutiny, a law ‘[a] must be necessary to promote a compelling governmental interest and [b] must be narrowly tailored to advance that interest',’ and ‘[c] accomplishes its goal through the use of the least intrusive means.’ ” Id. (quoting State v. J.P., 907 So.2d 1101, 1110 (Fla.2004)). The applicable standard of “review,” even though there is no constitutional ruling to review, is de novo. See Medina v. Gulf Coast Linen Servs., 825 So.2d 1018, 1020 (Fla. 1st DCA 2002).
Analysis
Freedom of Speech
Included in the First Amendment’s fundamental guarantee of freedom of speech, association, and to petition for redress of grievances, is the right to hire and consult an attorney. In United Mine Workers of America, District 12 v. Illinois State Bar Association, 389 U.S. 217, 88 S.Ct. 353, 19 L.Ed.2d 426 (1967), the Court held that “the freedom of speech, assembly, and petition guaranteed by the First and Fourteenth Amendments” gave the union “the right to hire attorneys on a salary basis to assist its members in the assertion of their legal rights.” Id. at 221-22, 88 S.Ct. 353. The Court based, this conclusion on “the premise that the rights to assemble peaceably and to petition for a redress for grievances are among-the most precious of the liberties safeguarded by the Bill of Rights. These rights, moreover, are intimately connected both in origin and in purpose, with the other First Amendment rights of free speech and free press,” that, although not identical, are inseparable. Id. . at 222, 88 S.Ct. 353. Here, Claimant argues that the fee statutes violate her right to free speech, because the evidence established that no attorney would take her case if counsel’s compensation was limited to a “guideline” fee, regardless of whether that fee was paid by the E/C or by Claimant. .
In Jacobson, this court addréssed a similar challenge to the fee statutes challenged here, and explained that it viewed the “speech at issue here [was] Claimant’s own words — given voice through his attorney — spoken or written before the court in his defense during litigation.” ■ 113 So.3d at 1049. The. claimant in Jacobson was faced with a claim for litigation costs by the E/C and wished to hire an attorney. The court .held that, the fee statutes— insofar as they limited claimant-paid fees due under contract (as opposed to fees paid by an E/C to a claimant’s attorney)— violated the claimant’s First Amendment rights, because they completely, denied his right ;to hire an attorney given that no benefits could-ever be secured as a result of the cost hearing, even upon a successful defense against the E/C’s motion to tax costs. Id. at, 1048-49. Because section 440.105(3)(c), Florida Statutes, makes it a crime for an attorney to accept a fee that is not approved by a JCC, and section 440.34, Florida , Statutes, prohibits a JCC from approving a fee that is not tied to the amount of benefits secured, the two statutes opérated as an unconstitutional infringement on the claimant’s right to hire an attorney.
Addressing the governmental interests advanced as the basis for these statutes, the Jacobson court pointed to “the regulation of attorney’s fees in general ...; lowering the. overall cost of the workers’ compensation system ...; and protecting injured workers who are of relativély limited financial means — ” Id, at 1049. The court found that the general interest in regulating fees in thé contéxt of prior case law related “specifically to the state’s interest in protecting the amount of benefits secured by an injured worker under chapter 440 from depletion to pay a law-yér’s bills,” and that it was “not evident from' case law that these fee regulations represent a general interest in ‘regulating attorney’s fees.’ Id.
The Jacobson court also held that the State’s interest in lowering the cost of workers’ compensation premiums was “not implicated in the instant case because it is Claimant, not the E/C, who would pay the fee implicated by , the legal work at issue here — defending against the E/C’s motion to tax costs. Thus, premiums charged by insurers would be unaffected.” Id. Finally, the court held that the interest in “protecting the body of workers’ compensation benefits from depletion” was not implicated, because “there can be no depletion of benefits where there are no benefits. • A successful defense against an E/C’s motion to tax costs does not constitute ‘benefits secured.’” Id.
Here, by contrast, Claimant was seeking to obtain workers’ compensation benefits, and she properly requested the JCC approve retainer agreements, under which Claimant and her union would pay an attorney out of their own funds to pursue those benefits. Despite this difference, the analysis that led to the holding in Jacobson still applies here, as we discuss below.' ■'
We start with the premise that “[laypersons] cannot be expected to know how to protect their rights when déáling with practiced and carefully counseled adversaries.” Bhd. of R.R. Trainmen v. Va. ex rel Va. State Bar, 377 U.S. 1, 7, 84 S.Ct. 1113, 12 L.Ed.2d 89 (1964). Here, although the JCC specifically found the attorney affidavits would not have changed his ruling on the fee retainer issue, his ruling was that he did not have jurisdiction over the constitutional arguments, and the JCC could not declare the statutory provision unconstitutional. See Burnsed, 591 So.2d at 647 (noting workers’ compensation judges do not have authority to determine constitutionality of statutory provisions). In our view, the affidavits of the six attorneys support Claimant’s argument that she could not secure their representation, as it is not economically feasible for an attorney to undertake representation in a case as complex as an exposure claim, knowing that a fee would be payable only if the claim was successful. In other words, no reasonable attorney would accept the risk of invésting their labor‘ into representing Claimant where the likelihood of receiving any compensation was uncertain;
The State cites United States Department of Labor v. Triplett, 494 U.S. 715, 717-18, 110 S.Ct. 1428, 108 L.Ed.2d 701 (1990), to bring into question the sufficiency of Claimant’s record. In Triplett, the assessment -of the three attorneys relied upon by Mr. Triplett, as described in the opinion, were all commenting in the third person: “ ‘fewer qualified attorneys are accepting black lung claims,’ and that more claimants are proceeding pro se .... ‘few attorneys are willing to represent black lung claimants.’ ... ‘many of his colleagues had ‘... stated unequivocally that they would not take black • lung cases....”” 494 U.S. at 723, 110 S.Ct. 1428. Here,-in contrast, the-six affidavits spoke in the first person: All six attorneys averred they would not be able to take this case on a contingency basis under the current statutory scheme, where a fee is paid only if the prosecution of the claim is successful. The evidence is direct, unlike the evidence rejected in Triplett, 494 U.S. at 723-24, 110 S.Ct, 1428, and the evidence persuasively supports Claimant’s -argument that sections 440.105 and 440.34 thwart her First Amendment rights, which can be adequately exercised only by obtaining legal representation.
Thus, because Claimant, a layperson, required legal counsel to pursue her claim for benefits, and without counsel she was in all likelihood destined to fail in that pursuit, there were no benefits to deplete, as in Jacobson. Therefore, the interest in regulating attorney’s fees under the guise of protecting the amount of benefits secured by an injured worker against unreasonable attorney’s fee payments, or o'f protecting the body of workers’ compensation benefits from depletion, was not and could not be implicated if securing any benefits was effectively prevented by Claimant’s inability to secure counsel. As the court in Jacobson observed, “there can be no depletion of benefits where there are no benefits.” 113 So.3d at 1049.
Furthermore, even to the ■ extent that Claimant ■ may have prevailed, and was only entitled to an E/C-paid fee based on the guidelines which would not cover.the amount she paid out .of pocket, Claimant would still be left in a better position with counsel, as without counsel she likely would obtain no benefits at all (and been exposed, to a potential claim for costs as well). As noted in the concurring opinion to In re Amendment to the Rules Regulating■ the Florida Bar — Rule 1^1.5(f)(1)(B) of the Rules of Professional Conduct, 939 So.2d 1032, 1041 (Fla.2006), “[t]here are many reasons why a client would' choose a particular lawyer at a rate which would be higher than that charged by other lawyers.” Likewise, there may be many reasons why a claimant in a workers’ compensation .case may choose to pay more in attorney’s fees than she otherwise would under the guidelines, including increasing her likelihood of obtaining any benefits at all. The equation is simple: Some compensation is superior to no compensation.
Furthermore, again as in Jacobson, an attorney’s fee paid by Claimant and her union would have no impact on workers! compensation premiums, because Claimant and her union are the ones paying the fee, not the E/C. If Claimant prevailed, the E/C still could not be required to pay more in fees that the Legislature allows under section 440.34, Florida Statutes, regardless of Claimant obtaining legal counsel not authorized under chapter 440, as Claimant would pay the excess fee.
Nor are we persuaded that the exception to strict scrutiny review for laws that permissibly restrict the time, place, or manner of the exercise of the applicable rights has been satisfied. As we noted in Jacobson, “such [time, place and manner] laws must (a) be content-neutral, (b) be narrowly tailored to ■ serve a significant (rather than “compelling”) governmental interest, and (c) leave'- open alternative channels of communication.” 113 So.3d at 1049 (citing Clark v. Cmty. for Creative Non-Violence, 468 U.S. 288, 293, 104 S.Ct, 3065, 82 L.Ed.2d 221 (1984)),
Applying this test here, sections 440.105(3)(c) and 440.34 fail, because
[t]here is no significant governmental interest being served, because there is no “benefit secured” associated with the fees at issue in this case and, thus, no need to protect such from depletion. Moreover, the legislation is not content-neutral. “The principal inquiry in determining content neutrality, in speech cases generally and in-time, place, or manner cases in-particular, is whether the • government has adopted a regulation of speech because of disagreement with the message it conveys.” Ward [v. Rock Against Racism, 491 U.S. 781, 791, 109 S.Ct. 2746 105 L.Ed.2d 661 (1989)]. The fee restrictions at issue here are not content-neutral, both because they are limited to work done on workers’ compensation issues as opposed to other areas of law, and because they are imposed only on claimants arguing [entitlement ■ to benefits], rather than on both parties’ arguments....
Id. at 1050.
Thus, we conclude that, to the extent these statutes prohibit a workers’ compensation claimant (or a claimant’s union) from paying attorney’s fees out of their own funds for purposes of litigating a workers’ compensation. claim, these statutes are unconstitutional, because they im-permissibly infringe on a claimant’s rights to free speech and to seek, redress of grievances. Additionally, any fee agreement, “must nonetheless, like all fees for Florida attorneys, comport with the factors set forth in Lee Engineering & Construction Co. v. Fellows, 209 So.2d 454, 458 (Fla,1968), and codified in the Rules Regulating the Florida Bar at rule lp-1.5(b).” Jacobson, 113 So.3d at 1052. Consequently, we hold that no attorney accepting fees in this situation may be prosecuted under section 440.105(3)(c), Florida Statutes.
Freedom to Contract
The Jacobson court also held that the statutes under review violated the claimant’s right to contract, for legal services. Id. at 1050. “The right to make contracts of any kind, so long as no fraud or deception is practiced and the contracts are legal in all respects, is an element of civil liberty possessed by all persons who are sui juris. It is-both a liberty and property right and is within the protection of the guaranties against the taking of liberty or property without due process of law.” State ex rel. Fulton v. Ives, 123 Fla. 401, 167. So. 394, 398-99 (1936) (citations omitted). “The right to contract is one of the most sacrosanct rights guaranteed by our -fundamental law.” Lawnwood Med. Ctr. v. Seeger, 959 So.2d 1222, 1224 (Fla. 1st DCA 2007).
“Like the First Amendment rights to freedom of speech, assembly, and petition, the right to contract for legal services is a fundamental right, implicating strict scrutiny.” Jacobson, 113 So.3d at 1050. Although strict scrutiny applies, because the right to contract is a property right, the relevant exception to strict scrutiny review is whether the--restrictions on the right to contract represent a “reasonable restraint” under the State’s police power, “the right being ‘the general rule’ and its restraint ‘the exception to be exercised when necessary to secure the comfort, health, welfare, safety and prosperity of the people.’” Id. at 1050-51 (quoting Golden v. McCarty, 337 So.2d 388, 390 (Fla.1976)).
The Jacobson court determined that the statutory limitations on attorney’s fees were not a permissible exercise of that police power in the context of a legal defense' against a motion to tax costs, because the fee provisions precluded entirely the claimant’s ability to obtain legal representation. Id. at 1051. The Jacobson court distinguished the determination in Lundy v. Four Seasons Ocean Grand Palm Beach, 932 So.2d 506 (Fla. 1st DCA 2006), that section 440.34 “ ‘does not offend the right to freely contract,’ ” on grounds that Lundy addressed E/C-paid fees as opposed to claimant-paid fees. Id. at 1052 (quoting Lundy, 932 So.2d at 510).
Here, although, Claimant is seeking benefits (unlike the claimant in Jacobson ), she argues that her right to contract is no less violated by the strict adherence to the fee schedule than it was under the circumstances in Jacobson, where the issue was not an E/C-paid fee, but a claimant-paid fee, because the challenged statutes prevented Claimant from retaining and paying an attorney with her own funds (or those of her union) in an amount not based on the mandated statutory fee schedule. The issue, therefore, is whether sections 440.105 and 440.34 are constitutionally permissible restrictions on claimant-paid fees based on the State’s police power.
“There is no settled formula for determining when the valid exercise of police power stops and an impermissible encroachment on private property rights begins.” Graham v. Estuary Props., Inc., 399 So.2d 1374, 1380 (Fla.1981) (reviewing decision to deny approval for development of wetlands). As we noted in Jacobson, however, the Florida Supreme Court listed some factors in Graham which have been considered in past appeals, and the Jacob son court found that the following of those factors were relevant in addressing the fees statutes at issue here: (1) whether the regulation confers a public benefit or prevents a public harm; (2) whether the regulation promotes the health, safety, welfare, or morals of the public; and (3) whether .the regulation is arbitrarily and capriciously applied. Jacobson, 113 So.3d at 1051.
Regarding factor (1), the supreme court observed, “If the regulation creates a public benefit it is more likely an exercise of eminent domain, whereas if a public harm is prevented it is more likely an exercise of the police power.” Graham, 399 So.2d at 1381. The fee regulations here are intended to prevent public harm, and are therefore at least purportedly an exercise of the State’s police power. See generally City of El Paso v. Simmons, 379 U.S. 497, 508, 85 S.Ct. 577, 13 L.Ed.2d 446 (1965) (noting, in reviewing statute governing forfeiture of public land sale contracts for nonpayment of interest, that Legislature has “wide discretion” in determining what is necessary to protect general welfare of people in association with police power).
For the same basic reasons addressed above holding that these statutes do not advance the State’s interest in regulating attorney’s fees to protect the amount of benefits a claimant is awarded, .the statutes do not actually prevent a public harm. To the contrary, as Claimant established, the statutes actually operated to discourage attorneys from representing her, thus potentially placing the burden for any allegedly compensable injury or condition, which might normally be borne by the E/C, on the public as a whole, if Claimant is forced to access governmental benefits. Thus, the statutes cannot be reasonably read to prevent a public harm.
Likewise, the statutes’ restrictions on a claimant’s ability to contract for legal representation to obtain benefits no longer promote the health, safety, welfare, or morals' of the public when, as demonstrated here, an injured worker is unable to secure benefits to which she could potentially otherwise be entitled under law, because of the statutory restrictions on attorney compensation. Finally, application of the statutes to this scenario is arbitrary and capricious, because only the attorney’s fees paid to claimants’ attorneys are regulated, and E/Cs are free to contract for legal services without limitation.. See id. (holding application of statutes to scenario in which only claimant is restricted from paying for legal services in an action for costs is arbitrary and capricious). •
We recognize that the Legislature could intend to prevent the,public harm caused when injured workers might qukotically seek benefits the worker is highly unlikely to obtain. In addition, the’ Législature could rationally seek to disincentivize mer-itless litigation which disrupts the workplace and causes unnecessary hostility between employers and employees. But in a free society which attempts to allow individuals .the intellectual prerogative to personally weigh the benefits and risk of exercising their statutory right to obtain redress for their injury, we hold that the rational intent to minimize workplace litigation cannot ultimately trump the benefits the public obtains fey allowing an injured. worker, or- one who personally thinks she is injured, to seek redress under law. . Thus, the public harm to be prevented — undue depletion of workers’ financial resources and undue disruption of the workplace — does not prevail against the individual’s right to, contract for legal representation.
Because the record establishes that Claimant demonstrated that, as applied to her, the .restrictions on her right to contract for legal \vork in workers’ compensation cases do not adequately prevent public harm,, no longer promote the health, safety, welfare, and morals of the. public, and are being arbitrarily and capriciously applied, sections 440.105 and 440.34 are not a valid exercise of the State’s police power, and. thus are unconstitutional violations of the right to contract. ,
Waiver.
Florida case law has long recognized that an individual can waive his or her personal constitutional rights. In re Shambow’s Estate, 153 Fla. 762, 15 So.2d 837, 837 (1943). (“It .is fundamental that constitutional rights which are personal may be waived.”). Courts Rave also recognized the ability to waive various protective rights, including the right to present mitigating evidence in the penalty phase of a first-degree murder trial, see Spann v. State, 857 So.2d 845, 853 (Fla.2003); the right to require a warrant before authorities can search one’s property, see Lockwood v. State, 470 So.2d 822 (Fla.1985); the right to remain silent, see Bailey v. State, 31 So.3d 809, 812 (Fla. 1st DCA 2009); and the right to a jury or speedy trial, see Torres v. State, 43 So.3d 831 (Fla. 1st DCA 2010), arid State v. Burgess, 153 So.3d 286 (Fla. 2d DCA 2014).
Logically, then, if a person can waive constitutional rights, a person can also waive statutory rights such as those in section 440.34, Florida Statutes. For example, in In re Amendment to the Rules Regulating the Florida Bar — Rule 1-5 (f) (k) (B) of the Rules of Professional Conduct, the Florida Supreme Court approved ' a Florida Bar rule' that allowed medical malpractice plaintiffs to waive the constitutional caps on attorney’s fees, subject to certain conditions. 939 So.2d 'at 1038-39. Notably, those conditions did not require judicial review of such waivers; whereas in the workers’ compensation context, the JCC must approve as reasonable the fee a claimant agrees to pay her attorney. Likewise,, here, we see no reason why a workers? compensation claimant should not be• able to waive a limitation on claimant- attorney’s fees and agree to pay her attorney with her own (or, someone else’-s) funds, subject to a JCC’s finding that the fee is reasonable.
Conclusion
• In conclusion, the restrictions in sections 440.105 and 440.34, when applied to a claimant’s ability to. retain counsel under a contract that calls for the payment of a reasonable fee by a claimant (or someone on his or her behalf), are unconstitutional violations of a claimant’s rights to free speech, free association, and petition — and are not permissible time, place, or manner restrictions on those rights. Likewise, those provisions also, represent unconstitutional violations ’ of a claimant’s ■ right to form contracts — and are not permissible police.power restrictions on those rights. .Thus, we hold that the criminal penalties of section 440.105(3)(c), Florida Statutes, are unenforceable against an attorney representing a workers’ compensation client seeking to obtain benefits under chapter 440, as limited by other provisions discussed above.
We conclude that the statutory restrictions are ' unconstitutional, and that the proper remedy is to allow an injured worker and an attorney to enter into a fee agreement approved by thé JCC, notwithstanding the’ statutory restrictions. ‘ Accordingly, we reverse the orders of the JCC, and remand for a new hearing on the motion to approve the retainer agreements and on the petitions for benefits;
REVERSED and REMANDED for further proceedings consistent with this opinion.
ROBERTS, C.J., and WOLF, J., concur.
. The cases cited were Samaha v. State, 389 So.2d 639, 640 (Fla.1980); Lundy v. Four Seasons Ocean Grand Palm Beach, 932 So.2d 506, 510 (Fla. 1st DCA 2006); and Khoury v. Carvel Homes South, Inc., 403 So.2d 1043, 1045 (Fla. 1st DCA 1981).
| CASELAW |
Blöschl G
Technische Universität Wien, Vienna, Vienna, Austria
Are you Blöschl G?
Claim your profile
Publications (4)0 Total impact
• Source
Article: Geostatistical regionalization of low-flow indices: PSBI and Top-Kriging
[show abstract] [hide abstract]
ABSTRACT: Recent studies highlight that geostatistical interpolation, which has been originally developed for the spatial interpolation of point data, can be effectively applied to the problem of regionalization of hydrometric information. This study compares two innovative geostatistical approaches for the prediction of low-flows in ungauged basins. The first one, named Physiographic-Space Based Interpolation (PSBI), performs the spatial interpolation of the desired streamflow index (e.g., annual streamflow, low-flow index, flood quantile, etc.) in the space of catchment descriptors. The second technique, named Topological kriging or Top-Kriging, predicts the variable of interest along river networks taking both the area and nested nature of catchments into account. PSBI and Top-Kriging are applied for the regionalization of Q355 (i.e., the streamflow that is equalled or exceeded 355 days in a year, on average) over a broad geographical region in central Italy, which contains 51 gauged catchments. Both techniques are cross-validated through a leave-one-out procedure at all available gauges and applied to a subregion to produce a continuous estimation of Q355 along the river network extracted from a 90 m DEM. The results of the study show that Top-Kriging and PSBI present complementary features and have comparable performances (Nash-Sutcliffe efficiencies in cross-validation of 0.89 and 0.83, respectively). Both techniques provide plausible and accurate predictions of Q355 in ungauged basins and represent promising opportunities for regionalization of low-flows.
Hydrology and Earth System Sciences Discussions. 01/2010;
• Source
Article: On the role of storm duration in the mapping of rainfall to flood return periods
Viglione A, Blöschl G
[show abstract] [hide abstract]
ABSTRACT: While the correspondence of rainfall return period TP and flood return period TQ is at the heart of the design storm procedure, their relationship is still poorly understood. The purpose of this paper is to shed light on the controls on this relationship. To better understand the interplay of the controlling factors we assume a simplified world with block rainfall, constant runoff coefficient and linear catchment response. We use an analytical derived flood frequency approach in which, following design practise, TP is defined as the return period of the intensity-duration-frequency (IDF) curve given storm duration and depth. Results suggest that the main control on the mapping of rainfall to flood return periods is the ratio of storm duration and catchment response time, as would be expected. In the simple world assumed in this work, TQ is always smaller or equal than TP of the associated storm, i.e., TQ/TP≤1. This is because of the difference in the selectiveness of the rectangular filters used to construct the IDF curves and the unit hydrograph (UH) together with the fact that different rectangular filters are used when evaluating the storm return periods. The critical storm duration that maximises TQ/TP is, in descending importance, a function of the catchment response time and the distribution of storm duration, while the maximum value of TQ/TP is mainly a function of the coefficient of variation of storm duration. The study provides the basis for future analyses, where more complex cases will be examined.
Hydrology and Earth System Sciences. 01/2009;
• Source
Article: Matching ERS scatterometer based soil moisture patterns with simulations of a conceptual dual layer hydrologic model over Austria
Parajka J, Naeimi V, Blöschl G, Komma J
[show abstract] [hide abstract]
ABSTRACT: This study compares ERS scatterometer top soil moisture observations with simulations of a dual layer conceptual hydrologic model. The comparison is performed for 148 Austrian catchments in the period 1991–2000. On average, about 5 to 7 scatterometer images per month with a mean spatial coverage of about 37% are available. The results indicate that the agreement between the two top soil moisture estimates changes with the season and the weight given to the scatterometer in hydrologic model calibration. The hydrologic model generally simulates larger top soil moisture values than are observed by the scatterometer. The differences tend to be smaller for lower altitudes and the winter season. The average correlation between the two estimates is more than 0.5 in the period from July to October, and about 0.2 in the winter months, depending on the period and calibration setting. Using both ERS scatterometer based soil moisture and runoff for model calibration provides more robust model parameters than using either of these two sources of information.
Hydrology and Earth System Sciences. 01/2009;
• Source
Article: On the role of the runoff coefficient in the mapping of rainfall to flood return periods
Viglione A, Merz R, Blöschl G
[show abstract] [hide abstract]
ABSTRACT: While the correspondence of rainfall return period TP and flood return period TQ is at the heart of the design storm procedure, their relationship is still poorly understood. The purpose of this paper is to shed light on the controls on this relationship examining in particular the effect of the variability of event runoff coefficients. A simplified world with block rainfall and linear catchment response is assumed and a derived flood frequency approach, both in analytical and Monte-Carlo modes, is used. The results indicate that TQ can be much higher than TP of the associated storm. The ratio TQ/TP depends on the average wetness of the system. In a dry system, TQ can be of the order of hundreds of times of TP. In contrast, in a wet system, the maximum flood return period is never more than a few times that of the corresponding storm. This is because a wet system cannot be much worse than it normally is. The presence of a threshold effect in runoff generation related to storm volume reduces the maximum ratio of TQ/TP since it decreases the randomness of the runoff coefficients and increases the probability to be in a wet situation. We also examine the question which runoff coefficients produce a flood return period equal to the rainfall return period if the design storm procedure is applied. For the systems analysed here, this runoff coefficient is always larger than the median of the runoff coefficients that cause the maximum annual floods. It depends on the average wetness of the system and on the return period considered, and its variability is particularly high when a threshold effect in runoff generation is present.
Hydrology and Earth System Sciences Discussions. 01/2009; | ESSENTIALAI-STEM |
Agathiyar
Agathiyar is a 1972 Indian Tamil-language Hindu mythological film written, directed, and produced by A. P. Nagarajan. The soundtrack was composed by Kunnakudi Vaidyanathan. The film stars Sirkazhi Govindarajan playing the main character, T. R. Mahalingam, A. V. M. Rajan, Kumari Padmini, R. S. Manohar, Suruli Rajan, Manorama and Sridevi were in supporting roles. This film ran for 100 days and won widespread appreciation. The film was dubbed into Hindi under the title Maharish in 1986.
Plot
The story is about Agathiyar Muni, who is considered to be the embodiment of one of celestial intellectuals who descended on earth to enlighten human beings. During the wedding of Shiva and Goddess Parvati, the earth tilted to the northern side, as the whole world was witnessing the marriage. Shiva gave the responsibility of balancing the earth to Agathiyar by going to the southern side. Agathiyar is also given the additional responsibility of spreading goodness and equality. He has the additional task of spreading the Tamil language. Many small stories between heaven and earth are interwoven in the movie. The stories teach one to lead a simple existence without ego. It also shows how Agathiyar's journey facing Vindhya Mount, River Kaveri, Vilvala/Vaathapi, Lord Murugan, A Farmer,Ravana,Urvashi, Tholkappiyan thereby teaching them the greatness of humility.
Cast
* Actors
* Sirkazhi Govindarajan as Agathiyar
* T. R. Mahalingam as Narathar
* A. V. M. Rajan as Lord Siva
* R. S. Manohar as Ravaneswaran/Langeswaran
* T. K. Bhagavathy as Devendran
* Sasikumar as Jayandran (Devendran's son)
* Sivakumar as Poet Tholkappiayan
* Suruli Rajan
* A. K. Veerasami as Saint
* Usilai Mani as Boodham
* O. A. K. Thevar as Vinthiyan (Vindhya mount)
* T. N. Sivathanu as Vadhaapi or Saththamuni
* Typist Gopu as Vilvala or Saagaramuni
* E. R. Sahadevan
* K. D. Santhanam
* Shanmugasundari
* Master Sekhar
* Master Sridhar
* Gundu Karuppaiah
* S. Ramarao
* Actresses
* Kumari Padmini as Goddess Parvathy
* Lakshmi as Ponni/Kaviri
* C. R. Vijayakumari as Mandothari
* Manorama as Selli
* A. Sakunthala as Urvasi
* M. Bhanumathi as Kakkai Padiniyar
* Rajakokila
* Baby Sridevi as Lord Murugan
* V. Vasantha
* P. Seethalakshmi
* Kalasree
Soundtrack
Music was composed by Kunnakudi Vaidyanathan. lyrics were written by Ulundurpet Shanmugam, Poovai Senguttuvan, K. D. Santhanam, Era. Pazhanisamy, Puthaneri Subramanyam and Nellai Arulmani. The song "Isaiyai Tamizhai" is set in Kharaharapriya raga. The song "Vendriduven" is a ragamalika comprising 16 ragas and is composed in such a way that the name of the raga used in each stanza is a word play on a common Tamil word which sounds similar to the raga's name starting with Natta i, Bhairavi, Todi, Arabhi, Shanmukhapriya, Darbar, Hamsadhwani, Vasantha, Mohanam, Manolayam, Bageshri, Saranga, Kamboji, Gowrimanohari, Kalyani and Saraswathi, | WIKI |
Chester County Courthouse (Tennessee)
The Chester County Courthouse is an historic county courthouse building located at 133 East Main Street, Court Square in Henderson, Chester County, Tennessee. Built in 1913 in the Classical Revival style of architecture. it is the third courthouse that Chester County has had, the previous ones having burned down. It is a two-story redbrick structure with a colonnaded front portico and a cupola in the center of its gabled roof. The original building has been added onto with an architecturally complementary extension on the rear. In 1973, it was featured in the movie Walking Tall, based on the life of McNairy County sheriff Buford Pusser. On March 26, 1979, it was added to the National Register of Historic Places. | WIKI |
Forskolin and Testosterone/Weight Loss
Home » Forskolin and Testosterone/Weight Loss
Forskolin
Are you tired of endless diets and supplements that promise much but deliver little? Discover Forskolin, nature’s secret to optimized health.
Forskolin stands out for its unique ability to increase levels of cyclic adenosine monophosphate (cAMP) in your body, acting as a catalyst for various physiological processes. From igniting your metabolic rate to fostering hormonal balance, Forskolin is a game-changer.
Forskolin
Derived from the Coleus forskohlii, a botanical sibling of mint, Forskolin captivates with its health-enhancing prowess. Historically embraced in age-old medicinal practices, this compound shines for its role in amplifying cyclic adenosine monophosphate (cAMP) within our system, paving the way for a myriad of physiological benefits.
• cAMP: cAMP acts as a pivotal intermediary in our body, orchestrating the dialogue between cells and ensuring the harmonious execution of metabolic activities and hormone synthesis. This molecule’s influence extends to converting ingestibles into vital energy and supervising the seamless dispatch of hormonal signals across the body.
• Revving Up Metabolism with Forskolin: Forskolin’s claim to fame lies in its capacity to elevate cAMP levels, thereby supercharging our metabolic machinery. This elevation signals our system to intensify fat decomposition, transforming stored fats into usable energy. This mechanism is the cornerstone of Forskolin’s association with weight management, promising a natural boost to the body’s fat-burning capabilities.
• Forskolin’s Additional Virtue: The benefits of Forskolin stretch far beyond mere weight reduction. Its influence on cAMP levels can also recalibrate hormone production, potentially enriching the body with essential hormones responsible for muscular health, bone density, and overall vitality. Notably, it holds promise for enhancing testosterone levels, offering a multifaceted approach to health optimization.
Forskolin emerges as a distinguished natural ally, advocating for not only metabolic efficiency but also for a balanced hormonal landscape. Its burgeoning appeal among the health-conscious and scientific communities underscores the necessity for informed usage and further exploration. As Forskolin continues to pique interest, it embodies the potential for holistic health benefits, meriting a cautious yet optimistic approach from those seeking to harness its natural potency.
Forskolin and Weight Loss
Harvested from the roots of the Coleus forskohlii plant, Forskolin stands out in the natural supplement realm for its potential to combat excess body fat. Central to Forskolin’s appeal is its mechanism for upregulating cyclic adenosine monophosphate (cAMP). This enhancement in cAMP is believed to trigger a domino effect, catalyzing the breakdown of fat cells and potentially steering users towards their weight loss goals.
Forskolin’s Fat-Busting Mechanism Explained
Delving into Forskolin’s biochemical influence reveals its strategic role in lifting cAMP levels. This elevation is more than a minor tweak; it’s a significant shift that activates the enzyme hormone-sensitive lipase, a key player in the mobilization of fat from adipose tissues. This process not only aims at slashing the body’s fat reserves but also at converting these fats into energy, offering a twofold benefit crucial for anyone looking to shed weight and gain vitality.
Strategic Use of Forskolin in Weight Loss Endeavors
Considering Forskolin’s addition to weight management regimens calls for a holistic view that integrates nutritional and physical activity considerations. While Forskolin shows promise in enhancing fat metabolism, a balanced approach incorporating dietary adjustments and regular exercise is essential for sustainable results. The diverse findings from various studies underscore the importance of further exploration into Forskolin’s role within a comprehensive weight management framework.
Prior to embarking on a Forskolin supplementation journey, seeking advice from healthcare professionals is recommended. This step is pivotal in ensuring that Forskolin aligns with your health conditions and objectives, facilitating a more informed and effective approach to weight management.
Enhancing Hormonal Balance
The hormone testosterone is fundamental in shaping physical strength, bone integrity, and sexual health in individuals. A unique herbal extract, derived from the Coleus forskohlii plant, shows promise in elevating these crucial hormonal levels through its action on cyclic adenosine monophosphate (cAMP). This compound’s ability to increase cAMP suggests a natural pathway to boost hormonal production, offering a glimmer of hope for those seeking alternatives to synthetic supplements.
The cAMP and Hormone Production Nexus
At the cellular level, cAMP acts as a key signal bearer, orchestrating a variety of bodily processes. Its influence is particularly noteworthy in the realm of hormone synthesis, where it serves as a catalyst to encourage the testes and ovaries to increase the output of testosterone. This signaling mechanism is vital for maintaining an optimal hormonal milieu, supporting everything from muscle functionality and skeletal robustness to libido and overall mood.
Considering a Holistic Strategy for Hormonal Well-being
The journey toward hormonal equilibrium may benefit from integrating this plant-based supplement as part of a comprehensive health strategy. While initial studies offer encouraging signs, the full spectrum of its benefits and mechanisms remains to be explored through further research. For those pondering this natural route for enhancing testosterone, a consultation with health care practitioners is essential. This ensures the integration of supplementation within a tailored health plan, addressing individual needs and health objectives while navigating potential interactions and contraindications.
Important Safety Information on Natural Supplementation
While the natural extract from the Coleus forskohlii plant offers intriguing health advantages, it’s critical to approach its use with caution, particularly regarding its safety profile and potential side effects. Users might encounter several common adverse effects, such as headaches, a decrease in blood pressure (hypotension), and a notable increase in heart rate. These reactions underscore the importance of proceeding with care, especially for those with underlying health issues.
Understanding the Side Effects
Headaches, one of the more frequent complaints, can range from mild to severe and may impact daily activities. Hypotension, or lowered blood pressure, while beneficial in some circumstances, poses risks for individuals with already low blood pressure, potentially leading to dizziness or fainting. An increased heart rate, another potential side effect, can cause discomfort and, in certain cases, more serious cardiac issues. These side effects, though not universally experienced, highlight the need for informed usage of this supplement.
Navigating Pre-existing Health Conditions
For those managing pre-existing conditions, particularly those affecting blood pressure or heart health, the decision to incorporate this natural extract into a health regimen should not be taken lightly. The impact on blood pressure and heart rate necessitates a cautious evaluation by healthcare professionals. This is particularly vital for individuals on medication for heart conditions or blood pressure, as the supplement may interact with these medications, potentially leading to adverse effects.
The Role of Healthcare Provider Consultation
Consulting with a healthcare provider is an essential step before starting any new supplement, including this one. A medical professional can offer personalized advice based on your health history and current medications, ensuring that the supplement complements your health goals without compromising safety. This consultation can help navigate the risks associated with its use, particularly for those with specific health concerns or those taking other medications.
While this natural extract presents potential health benefits, it’s crucial to weigh these against the possibility of side effects and interactions, especially for individuals with certain health conditions. An informed approach, guided by professional medical advice, is paramount to safely incorporating this supplement into your health routine. By doing so, users can better navigate the benefits while minimizing risks, ensuring a more secure and beneficial experience.
Optimal Dosage
Adjusting the intake of the herbal compound derived from the roots of the Coleus forskohlii is pivotal for tapping into its health-promoting potentials while ensuring user safety. The appropriate amount varies, tailored to objectives such as enhancing metabolic functions or stabilizing hormonal levels.
Defining Dosage Guidelines
Investigative studies on this herb’s effectiveness for health improvements typically suggest daily intakes between 250 mg and 500 mg. These doses are usually offered in formulations that provide 10% to 20% concentration of the active botanical ingredient. A regimen often advised for metabolic benefits involves taking a 250 mg dose of a 10% concentrated extract twice daily, balancing effectiveness with safety considerations.
Strategic Timing for Intake
The efficacy of this herbal supplement can be influenced by the timing of its consumption. It is generally recommended to ingest the compound approximately 15 to 30 minutes before meals to enhance absorption and optimize its positive effects on metabolic rates and appetite. Personal adaptation based on individual responses is advisable for optimal results.
Consideration for Food Consumption
The decision to consume the herbal extract with or without food hinges on personal absorption rates and gastrointestinal tolerance. For some, taking the supplement on an empty stomach might boost absorption and quicken its benefits. Yet, individuals with sensitive digestive systems may find that consuming the extract alongside a light meal helps alleviate potential discomfort.
Conclusion
Extracted from the Coleus forskohlii plant, this compound significantly elevates cAMP levels, facilitating weight reduction and hormonal equilibrium. It stands out for its metabolic enhancement capabilities, serving as a natural catalyst for fat decomposition and energy conversion. Promising effects on elevating testosterone and nurturing hormonal balance underscore its holistic health benefits. Professional guidance from health experts is recommended to navigate its use safely, particularly for individuals with specific health considerations. Determining the right dosage and timing for consumption is key to unlocking its full potential for well-being.
FAQs
What’s the role of the Coleus forskohlii extract in weight management?
Extracted from a botanical source, this active ingredient elevates cellular cAMP levels, which plays a pivotal role in breaking down fats and transforming them into energy, thus aiding in weight management.
How does this herbal supplement enhance metabolic processes?
By acting as a catalyst, it accelerates metabolic activities, enhancing the body’s ability to metabolize fat stores into energy, leading to potential weight reduction.
Is it beneficial for hormonal health?
Indeed, studies suggest its effectiveness in improving the balance of crucial hormones, including testosterone, contributing to overall hormonal well-being.
Who should seek medical advice before using this supplement?
Those managing existing health issues, particularly concerning blood pressure, cardiac health, or hormonal levels, are advised to consult health professionals to ensure its safe use. | ESSENTIALAI-STEM |
-- Otto May Cut Jobs as Part of Cost-Savings Plan, Abendblatt Says
Otto Group, the world’s largest
mail-order company, may cut jobs as part of a restructuring
program that aims to lower costs amid falling sales and
increasing competition from the Internet, Hamburger Abendblatt
reported, citing Otto spokesman Thomas Voigt. Code-named “Fokus,” the program may affect employees at
the Otto, Baur and Schwab brands in Hamburg, Burgkunstadt and
Hanau, Germany , the newspaper said. Otto Group’s Voigt declined
to say how many jobs may be cut, Hamburger Abendblatt reported. To contact the reporter on this story:
Niklas Magnusson in Hamburg at
nmagnusson1@bloomberg.net To contact the editor responsible for this story:
Angela Cullen at
acullen8@bloomberg.net | NEWS-MULTISOURCE |
Talk:Fire Shut Up in My Bones/GA1
GA Review
The edit link for this section can be used to add comments to the review.''
Reviewer: An anonymous username, not my real name (talk · contribs) 00:14, 31 October 2022 (UTC)
I'll do the review. An anonymous username, not my real name (talk) 00:14, 31 October 2022 (UTC)
It's close, but there are a couple things that I think should be changed.
* The lead of an article should rarely/never have citations because the information should be elsewhere in the article. If it already is, remove the citations. If it isn't, move the information to the body.
* There are a few topics and people with WP articles which could be linked but aren't.
All in all, good work. There's not much more that could be added, and it probably could be passed as it is, but I would still recommend changing the things I mentioned. An anonymous username, not my real name (talk) 00:31, 31 October 2022 (UTC)
* Alright, looks like you did everything. Passing it now. An anonymous username, not my real name (talk) 19:58, 31 October 2022 (UTC) | WIKI |
Cal Ramsey
Calvin Ramsey (July 13, 1937 – March 25, 2019) was an American professional basketball player and broadcaster. A standout college player for NYU, he played 13 NBA games over two seasons. After his playing career ended, he began a 28-year affiliation with the New York Knicks as a broadcaster and a community representative.
Early life and career
Ramsey was born in Selma, Alabama on July 13, 1937 but spent most of his life in New York City. In his youth, he played in the Rucker Park League, winning the MVP and was known for his wars with Connie Hawkins. After graduating from High School of Commerce, he joined the NYU Violets as a forward in 1956. At NYU, he played with future hall of famer Thomas “Satch” Sanders. Over three years, he averaged 20.2 points per game and 17.5 rebounds. in his senior year, 1958, Ramsey was named as an All-American. When he died, he still held the school record for rebounds in a game, with 34 against Boston College. As of 2018, he was 11th on NYU's all-time scoring list.
After graduating from NYU with a degree in business, Ramsey entered the 1959 NBA draft where the St. Louis Hawks selected him with the 13th overall pick. At a height of 6’4”, Ramsey was short to play the forward position during that era, but was not a strong enough ball handler to play guard. This limited his career, and he only played 11 games in his rookie season with the Hawks (he also played for the New York Knicks). The following season, he played in two games with the Syracuse Nationals. After his NBA career, Ramsey played semi-pro basketball for one season before injuries forced him to retire.
After his playing days ended, Ramsey charged that a quota system in basketball limited the number of black players in the league at that time. Fellow broadcaster Marv Albert agreed, saying “If you didn’t start as a black player, you wouldn’t be with the team.” Out of basketball, Ramsey became a teacher for several years.
Broadcaster and coach
In 1972, he joined the Knicks broadcasting team, a position he held until 1982. He called the Knicks win over the Los Angeles Lakers in the 1973 NBA Finals and, over his tenure, worked with Dick Stockton for one season, and Marv Albert, who joined the television crew in 1979. In 1982, the Knicks retired Ramsey from the broadcast booth and replaced him with former NBA player Butch Beard.
After leaving the Knicks, he joined the coaching staff of NYU in 1983, which restored its basketball program after a 12-year hiatus. His former teammate at NYU, Mike Muzio, was appointed as the head coach. He continued in that role for the remainder of his life.
Later life
In 1991, the Knicks hired him as a community ambassador where he worked with schools and youth programs. He continued attending Knicks games until his health began to fail in 2018.
On March 25, 2019, Ramsey died from cardiac arrest at a rehabilitation facility. Ramsey had suffered from diabetes for a number of years.
Ramsey was inducted into the NYU Athletics Hall of Fame in 1978 and the New York City Basketball Hall of Fame in 1994.
NBA
Source | WIKI |
Starting a Kubernetes batch job when a file was uploaded to S3
Hello, if I was looking to start a Kubernetes batch job when a file was uploaded to S3 - would the best solution be to
• Setup an eventbridge rule to monitor S3 uploads for a bucket
• Kick off a step functions job on upload
• Step functions start and monitor Kubernetes job
I think you want S3 event trigger => SQS => Lambda and then do whatever you need in there. I can’t fathom why you would then trigger a k8s batch job when you have lambda at that point, but you could start the batch job from lambda.
Thanks. I need to execute jar files that have been built elsewhere. These jar files will interact with other services and finish when they have a response back and have done some data transformation.
So I thought containerising those jar files might be the easiest approach.
Nothing inherently would stop you from executing those in lambda that I’m aware of. lambda can run binaries. If the action is going to take longer than 15minutes you can use codebuild to run the container for up to 8 hours. For longer you can use ECS Fargate scheduled task. There isn’t anything about what you are doing that fundamentally would be better with k8s, but again, that’s up to you.
That’s interesting I didn’t think of using CodeBuild, that would certainly reduce operational overhead of a cluster just to run odd jobs. I guess using AWS Batch would be a more complicated solution than CodeBuild too.
And use either lambda or step functions/eventbridge to kick off the CodeBuild job.
Possibly wrap the codebuild job in codepipeline which can allegedly receive s3 events to kick the build off :thinking_face: | ESSENTIALAI-STEM |
Employee Importance LeetCode Solution
Difficulty Level Medium
Frequently asked in Amazon Apple Google Microsoft UberViews 1258
Problem Statement
Employee Importance LeetCode Solution – You have a data structure of employee information, including the employee’s unique ID, importance value, and direct subordinates’ IDs.
You are given an array of employees employees where:
• employees[i].id is the ID of the ith employee.
• employees[i].importance is the important value of the ith employee.
• employees[i].subordinates is a list of the IDs of the direct subordinates of the ith employee.
Given an integer id that represents an employee’s ID, return the total importance value of this employee and all their direct and indirect subordinates.
Employee Importance LeetCode Solution
Input: employees = [[1,5,[2,3]],[2,3,[]],[3,3,[]]], id = 1
Output: 11
Explanation: Employee 1 has an importance value of 5 and has two direct subordinates: employee 2 and employee 3.
They both have an importance value of 3.
Thus, the total importance value of employee 1 is 5 + 3 + 3 = 11.
Explanation
Thoughts Before Coding
• The employees are passed in as a list
• We need to have a quicker lookup of employees using their ID
• So, we will need to first put all of the employees inside a HashMap for O(1) lookup
• If we take a closer look the structure is very similar to a tree
• Each root node can be represented as the leader
• Each of the children nodes can be represented as subordinates
• We can use recursion to find the total importance
• We will first find the importance value of our current node
• Then we will add this value to the total values accumulated from each of the child nodes
We can consider each employee as a node in the graph and traverse each node that is accessible from the employee id given in the input and track the total importance.
Both DFS and BFS traversal will get accepted as solution. We will be doing DFS (Depth First Search).
Now to find the total importance of an employee, it will be the importance of that employee, plus the total importance of each of that employee’s subordinates. This is a straightforward depth-first search.
Code
Java Code for Employee Importance
class Solution {
Map<Integer, Employee> emap;
public int getImportance(List<Employee> employees, int queryid) {
emap = new HashMap();
for (Employee e: employees) emap.put(e.id, e);
return dfs(queryid);
}
public int dfs(int eid) {
Employee employee = emap.get(eid);
int ans = employee.importance;
for (Integer subid: employee.subordinates)
ans += dfs(subid);
return ans;
}
}
C++ Code for Employee Importance
class Solution {
public:
int getImportance(vector<Employee*> employees, int id) {
unordered_map<int, Employee*> map;
for(const auto element : employees){
map[element->id] = element;
}
return help(map, id);
}
int help(unordered_map<int, Employee*>& map, const int id){
auto sum = map[id]->importance;
for(const auto element : map[id]->subordinates){
sum += help(map, element);
}
return sum;
}
};
Python Code for Employee Importance
class Solution(object):
def getImportance(self, employees, query_id):
emap = {e.id: e for e in employees}
def dfs(eid):
employee = emap[eid]
return (employee.importance +
sum(dfs(eid) for eid in employee.subordinates))
return dfs(query_id)
Complexity Analysis for Employee Importance LeetCode Solution
Time Complexity
O(N) since in the worst case also we will iterate over each node (employee) only once.
Space Complexity
O(N) we use a hashmap to store employee id for easy retrieval.
Translate » | ESSENTIALAI-STEM |
Wikipedia:Articles for deletion/Grameen Vidyapeeth Girls Senior Secondary School
The result was delete. ✗ plicit 09:50, 17 December 2021 (UTC)
Grameen Vidyapeeth Girls Senior Secondary School
* – ( View AfD View log | edits since nomination)
Non-notable school. Just sourced with a related source.Fails WP:NSCHOOL, WP:SIGCOV and WP:ORG. A search point to listings and WP-forks. The Banner talk 12:42, 4 December 2021 (UTC) Relisted to generate a more thorough discussion and clearer consensus. Relisting comment: WP:PROD was declined previously, so not eligible for soft deletion. Please add new comments below this notice. Thanks, RL0919 (talk) 21:21, 11 December 2021 (UTC)
* Note: This discussion has been included in the list of Education-related deletion discussions. Shellwood (talk) 12:52, 4 December 2021 (UTC)
* Note: This discussion has been included in the list of Schools-related deletion discussions. Shellwood (talk) 12:52, 4 December 2021 (UTC)
* Note: This discussion has been included in the list of India-related deletion discussions. Shellwood (talk) 12:52, 4 December 2021 (UTC)
* delete schools need to qualify either WP:NORG, or WP:GNG. Existence is not notability. —usernamekiran • sign the guestbook • (talk) 05:08, 12 December 2021 (UTC)
* Delete per nom. Peter Ormond 💬 15:55, 12 December 2021 (UTC)
| WIKI |
Page:What We Want.djvu/43
is, in short, our mind which, by its operation, creates the things whose aspects only at a given moment we can know and register, whose relations only we can seek to establish by means of categories which are themselves fashioned by our mind for the practical utility of life. Verifications, registrations, and categories make up our science, which is, therefore, not an immediate and objective knowledge of reality, but its representation elaborated by us at a given moment, and so subjective, relative, and capable of transformation and variation in accordance with the evolution of the human spirit, which is in a continual process of becoming. Thence has sprung a great revolution, not only in the circle of the empirical sciences, but in that of the rational sciences as well. The latest attempts to reconstruct the mathematical and geometrical sciences on a basis utterly different from that hitherto employed, attempts which have been | WIKI |
NASA chief: Moon base first, then Mars - Technology & science - Space - Space.com | NBC News
GLASGOW, Scotland NASA Administrator Michael D. Griffin defended his agency's determination to establish a lunar colony before embarking on a manned Mars mission Sept. 30, arguing that those who prefer to focus only on Mars are overestimating what is known about the moon and underestimating the difficulties of going to Mars. Addressing the International Astronautical Congress here, Griffin said the U.S. Apollo program spent a total of just 27 working days on the moon, which he said is as big as Africa and merits substantially more exploration. Several space agencies, including some in Europe, say their scientists are much less interested in the moon than in Mars and that, since doing both is beyond their means, are weighing whether to focus on Mars. Griffin wondered whether those pushing Mars-oriented efforts are fully cognizant of the difficulties of sending astronauts to Mars, and the amount of preparation needed before a mission is pursued. Griffin said that before any attempt to send a crew to Mars is made, the sponsoring agency or agencies must at least be able to conduct the following mission: Send astronauts to the international space station for a six- or nine-month visit, after which they would be sent to the moon for a similar amount of time, equipped with no additional supplies beyond those sent with them to the station. Once they completed their moon visit, this same group of astronauts would return directly to the space station for another six- to nine-month visit, again with no resupply. Only then would they return home. Griffin said this mission would simulate what it will take to send astronauts to Mars and return them home. I am not saying that we have to have conducted such a mission, but that we have to be confident in our ability to conduct it before we send astronauts to Mars, Griffin said. Otherwise, the crew we send to Mars will not come back. 2013 Space.com. All rights reserved. More from Space.com. Discussion comments Most active discussions Show discussion | NEWS-MULTISOURCE |
C/C++ callback with sending object pointer
The callback was always confusing for me until today. Today, I wrote my own callback then put in the library. After that, In my c++ application I register my function to the callback. It was really cool the see my c++ function getting called from outside of my program. Especially, when it is my own callback function.
While I was doing this I came across a website which is really good to learn for the different aspect of the writing callback. You can access the website from here
If you go over the website and run the given examples, you will have a deep intuition of the callback function both in c and c++.
Have a wonderful day.
Advertisements
Kinect linux
If you are using the kinect XBOX 360, follow this post
Ubuntu + Kinect + OpenNI + PrimeSense
Opencv and Qt integration
I found two good websites which they explain OpenCV and Qt integration. Here is a website that explain OpenCV installation well. And another website explains more about QT side. You may face two problem if you follow these two websites.
1 ) When you follow the first website steps change the “-D WITH_QT=ON” to “-D WITH_QT=OFF”. Then you will not have a problem.
2 ) Another change you need to do is for the second website. In the website, it is saying that we need to add this lines to .pro file.
INCLUDEPATH += `pkg-config --cflags opencv`
LIBS += `pkg-config —libs opencv`
Actually it did not work for me. So instead of those two lines I added the code below. :
INCLUDEPATH += /usr/local/include/opencv \
/usr/local/include/opencv2
LIBS += -L/usr/local/lib \
-lopencv_core \
-lopencv_imgproc \
-lopencv_highgui \
-lopencv_ml \
-lopencv_video \
-lopencv_features2d \
-lopencv_calib3d \
-lopencv_objdetect \
-lopencv_contrib \
-lopencv_legacy \
-lopencv_flann
Then it works fine. One more quick detail if you add the code below to .pro file you will not see .moc and .obj files in the directory.
OBJECTS_DIR = .obj
MOC_DIR = .moc
I hope this information helps you. Good bye.
beagleboard xm touch screen
Shop | ESSENTIALAI-STEM |
Talk:Tim Friese-Greene
Untitled
Any relation to the photographer William Friese-Greene? That can't be a common surname. Indisciplined (talk) 23:28, 8 November 2009 (UTC)
* Friese-Greene, friese means Frisian, it's probably a Frisian married to a Greene in frisian/old english it's very unlikely they're not related in some way (If someone's interested in searching for it, please do) Markthemac (talk) 11:23, 26 February 2013 (UTC) | WIKI |
Category «Biotechnology»
AIPMT PMT Bioreactors and Biotechnology MCQs
1. A bioreactor is (a) fermentation tank (b) culture containing radioactive isotopes (c) culture for synthesis of new chemicals (d) hybridoma. 2. Blunt ends of passenger and vehicle DNA’s are joined by (a) DNA polymerase I (b) RNA polymerase (c) DNA ligase (d) DNA polymerase III. 3. Restriction endonucleases are obtained from (a) bacteria (b) …
Recombinant DNA Technology
1. Isolation of the genetic material (DNA) • In order to cut the DNA with restriction enzymes, it needs to be in pure form, free from other macromolecules. • The DNA enclosed within the membranes has to be released by breaking the nuclear and cell membranes, along with other macromolecules such as RNA, proteins, polysaccharides …
Introduction of recombinant DNA into a suitable host
A. Increase competence of host for transformation • Competent host is essential for transformation with the recombinant DNA. Transformation is a process by which a cell takes up the naked DNA fragment from its environment, incorporates it into its own chromosomal DNA, and finally expresses the trait controlled by the incoming DNA. • Finally, the …
Enzymes in Recombinant DNA Technology
Different kinds of specific enzymes are used in genetic engineering (recombinant DNA technology). These include lysing enzymes, cleaving enzymes, synthesizing enzymes, joining enzymes and alkaline phosphatase. • The palindromes in DNA are base pair sequences that are the same, when read forward (left to right) or backward (right to left), from a central axis of …
AIPMT PMT – Biotechnology – Principles and Processes
Biotechnology • The term biotechnology is derived from a fusion of biology and technology. Biotechnology means any technological application that uses biological systems, living organisms, or derivatives thereof, to make or modify products or processes for specific use. • Berg is often considered “Father of genetic engineering”. He was awarded Nobel Prize in 1980. • …
4 Top Issues with Applications of Biotechnology
Following are the issues related to applications of Biotechnology: Ethical Issues: Ethics include a set of standards by which a community regulates its behaviour and decides as to which activity is legitimate and which is not. Therefore, bioethics may be viewed as a set of standards that may be used to regulate our activities in …
Transgenic Animals
Animals that have had their DNA manipulated to possess and express an extra (foreign) gene are known as transgenic animals or Genetically Engineered Animals. Various applications of transgenic animals are: • Study of normal physiology and development: Transgenic animals can be specifically designed to allow the study of how genes are regulated, and how they …
Applications of Biotechnology in Medicine
The recombinant DNA technological processes have made great impact in the area of healthcare by mass production of safe and more effective therapeutic drugs. A large number of human genes encoding pharmaceutically valuable proteins have been cloned and expressed in microorganisms largely employed by biotech pharmaceuticals. Initially, E. coli was used as the host for …
Biotechnology and its applications
Biotechnology is the use of living systems and organisms to develop or make useful products. It harnesses cellular and biomolecular processes to develop technologies and products that help improve our health and lives. Modern biotechnology provides breakthrough solutions and technologies to combat debilitating and rare diseases, reduce our environmental footprint, feed the hungry, use less … | ESSENTIALAI-STEM |
Archaeologia/Volume 38/Lord Coningsby's Account of the State of Political Parties during the Reign of Queen Anne
| WIKI |
tuned in
Adjective
* 1) Listening to or watching a channel, station, etc., as on television or radio.
* 2) Paying attention.
* 3) Attuned; having a sense of understanding. | WIKI |
Photo: Jon-Are Berg-Jacobsen/Nofima
Dietary fiber and glycemic carbohydrates
Food and health
In this research program our primary objective is to increase our knowledge on how processing can maximize the benficial health effects of dietary fiber and minimize the detrimental health effects of glycaemic carbohydrates.
Time:1. January 2013 – 31. December 2016
Financed by: Foundation for Research Levy on Agricultural Products (FFL)
Contact person
Portrettbilde av Simon Ballance
Simon Ballance
Senior Scientist
Phone: +47 917 95 440
simon.ballance@nofima.no
Nutritionally, there are two categories of carbohydrates; “Glycaemic carbohydrates” also known as ‘available carbohydrates’ are digested and absorbed in the human small intestine. These include starch and sugars that give rise to an increase in blood glucose. The second category is Dietary fibre which are non-digestible carbohydrates passing to the large intestine
Consumption of dietary fibre has been shown to benefit human health in reducing the risk of developing life-style diseases such as heart disease, colon cancer and diabetes. Despite this, a large section of Europe’s population consumes less fibre than the current EU guidelines of 25g/day for an adult and 10 g per day for children from 12 years – 48 months. For glycaemic carbohydrates, there is good evidence that frequent consumption of foods high in sugars increases the risk of tooth decay, and the risk of developing various life-style disease such as diabetes. New World Health Organisation (WHO) guidelines published in 2015 recommends adults and children reduce their daily intake of free sugars to less than 50 g (12 teaspoons) per day (10% of total energy intake). A further reduction to below 5% or roughly 25 grams (6 teaspoons) per day would provide additional health benefits.
Primary Objective
In this research program our primary objective is to increase our knowledge on how processing can maximize the benficial health effects of dietary fiber and minimize the detrimental health effects of glycaemic carbohydrates. Our focus is on land-based staple foods such as wheat, oat, barley and potatoes. Correct food processing is essential for the food industry in their work to develop new healthier foods.
Method platform
In order to characterize and quantify dietary fibres and glycaemic carbohydrates in foods, ingredients as eaten, and during digestion and metabolism we need a comprehensive food processing and analytical platform. Our current platform has a comprehensive toolbox for food processing including cereal milling, dry fractionation, a well-equipped bakery and well-equipped pilot scale food production facilities. Further, we have a host of most major advanced analytical methods (not found in routine food carbohydrate analysis labs) to study the fate of food-derived carbohydrates in ingredients, foods, during digestion and metabolism. A major goal of this program is not just to maintain the methods and equipment we have, but expand our platform to encompass techniques we deem are most useful in in our goal of collaboration with the food industry and worldwide research community to develop heathier foods.
Processing technology
We aim to optimize processing technologies to make new ingredients and subsequently heathier foods with real beneficial health effects and good sensory quality. Examples of industry relevant topics we are currently working on: 1) new methods for milling and fractionation of grain. 2) Optimization of dietary fiber quality for maximized health benefits during baking 3). Reduction of mycotoxins in oats. 4) Understanding the fate of processing on the immune-stimulatory properties of certain dietary fibres. 5) The fate and effect of phenolic constituents during processing and digestion
Health effects
To quantify what comprises ‘healthier food’ we measure biomarkers for human health. These ‘biomarkers’ may be analytes in human biological samples from clinical trials with humans and animals, dietary fibers and starch in stimulated human digesta of test foods. It can also include cell-line models of the human intestine to study uptake and biological interactions related to human health. We also collaborate with other research institutes both nationally and internationally, for example, VTT, Espoo, Finland, INRA, Montpellier, France and the Clinical Research Center in Kiel, Germany. We have a major focus on the preparation of foods and ingredients for clinical testing, characterization of carbohydrate components of foods and ingredients, and in addition analysis of carbohydrates and their related biomarkers and degradation products in various biological samples.
Related content | ESSENTIALAI-STEM |
Allegheny City
Proper noun
* 1) A former city in Pennsylvania, United States, which was annexed by in 1907. | WIKI |
It's A Little Ridiculous to Blame Netflix for the Restaurant Industry's Decline
If the Pokemon Go phenomenon could be blamed for poor retail sales this summer as people were reportedly too busy chasing after Pikachu to go shopping, is it so fanciful to think Netflix (NASDAQ: NFLX) is now to blame for falling restaurant sales?
According to Olive Garden owner Darden Restaurants (NYSE: DRI) , which actually reported same-restaurant sales above the industry average in the third quarter and beat analyst expectations on earnings, casual dining chains are having a more difficult time these days competing against the movie streaming service.
Industry watchers MillerPulse and Black Box Intelligence indicate that restaurant comparable sales posted another poor quarter, with chains averaging a 0.4% decline for the period. While the fast-casual segment performed the worst, brought down in large part by Chipotle Mexican Grill , which saw comps tumble once again, down 22% in the third quarter (excluding Chipotle, comps were actually up 0.7%), the casual dining segment was down 1.2% on average.
When you're here, you're family
That makes the achievement at Darden's Olive Garden chain all the more remarkable, since it had at one time been written off because supposedly, no one was eating carb-heavy food anymore. Comparable sales were up 2.6% at the Italian eatery in the fiscal 2017 second quarter that ended in November, and they are 2.3% higher year to date. It's still having trouble getting more customers in the door, as traffic was flat for the period, but it's a positive development that Olive Garden looks as though it has turned the corner.
Netflix has enjoyed its own gains, too, saying recently it expects to add 1.45 million U.S. subscribers to its rolls in the fourth quarter, well ahead of the 1.27 million analysts were anticipating. That means it's closing in on 100 million subscribers worldwide, and though other online video services have about a billion people a day tuning in, consumers continue to access their Netflix accounts regularly.
Divided loyalties
There is some sense to the notion that consumers are eschewing eating out because they're finding their discretionary funds limited. And in fairness, Darden CEO Gene Lee said it's people competing against the "new necessities today, whether smartphones, whether your cable bill, your Netflix bill, those all have increased significantly over the years and I think that people are making choices."
So, he wasn't saying the streaming service itself was to blame, but rather as part of a mix of distractions consuming customer attention, it was a contributing factor.
Certainly, although a smartphone purchase might cost a few hundred dollars and is a one-time cost, the ongoing monthly bill including data plans can easily run $100. And the cable TV bill can be pricey, particularly if you have one of those triple-play packages combining TV, internet, and landline service.
Still it's hard to include Netflix dinging you $10 a month for streaming movies (maybe another $10 or so if you still get a DVD, too). Sure, all these monthly expenses add up, but it's not as though they're new expenses consumers didn't have before. Restaurants need to look somewhere other than Netflix for a villain to blame.
Cleanup in aisle 7
And there is one: price deflation. Grocery store prices are tumbling. The Bureau of Labor Statistics reported earlier this month that food-at-home prices fell 0.1% in November, the seventh straight month they've declined, and over the past 12 months, they're down 2.2% from the same time last year with meats, poultry, fish, and eggs posting the biggest drops and now sitting 6% below the year-ago figure. Eating out, on the other hand, is more expensive, with food away from home rising 0.1% last month and 2.3% over the last 12 months.
Grocery stores' earnings are getting dented as a result. The largest supermarket chain Kroger (NYSE: KR) continues to feel pressure from lower prices, and after reporting third-quarter earnings on Dec. 1, it lowered its per-share earnings guidance from $2.10 to $2.20 down to $2.10 to $2.15, blaming "persistent and increasing deflation." SUPERVALU (NYSE: SVU) has called it "sustained and deepening levels of deflation."
Further, the proliferation of prepared foods is now a thing. According to a study by NPD Group, in-store dining and grocery store prepared foods takeout has grown nearly 30% since 2008. They account for 2.4 billion food service visits, market researchers estimate, but more importantly, some $10 billion in consumer spending in 2015.
If Darden Restaurants and the rest of the industry are looking for a culprit for their flagging sales, they shouldn't blame Netflix for their woes, but rather grocery store competition. Consumers feel it's just easier -- and cheaper -- to eat at home than to load the kids in the car to go out to a restaurant.
10 stocks we like better than Darden Restaurants
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor , has tripled the market.*
David and Tom just revealed what they believe are the 10 best stocks for investors to buy right now...and Darden Restaurants wasn't one of them! That's right -- they think these 10 stocks are even better buys.
Click here to learn about these picks!
*Stock Advisor returns as of Nov. 7, 2016.
Rich Duprey has no position in any stocks mentioned. The Motley Fool owns shares of and recommends Chipotle Mexican Grill and Netflix. Try any of our Foolish newsletter services free for 30 days . We Fools may not all hold the same opinions, but we all believe that considering a diverse range of insights makes us better investors. The Motley Fool has a disclosure policy .
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
++ed by:
KARUPA DEMIAN MJEMMESON ALEXBIO PALIK
167 PAUSE users
146 non-PAUSE users.
Léon Brocard
and 1 contributors
NAME
Math::Trig - trigonometric functions
SYNOPSIS
use Math::Trig;
$x = tan(0.9);
$y = acos(3.7);
$z = asin(2.4);
$halfpi = pi/2;
$rad = deg2rad(120);
DESCRIPTION
Math::Trig defines many trigonometric functions not defined by the core Perl which defines only the sin() and cos(). The constant pi is also defined as are a few convenience functions for angle conversions.
TRIGONOMETRIC FUNCTIONS
The tangent
tan
The cofunctions of the sine, cosine, and tangent (cosec/csc and cotan/cot are aliases)
csc, cosec, sec, sec, cot, cotan
The arcus (also known as the inverse) functions of the sine, cosine, and tangent
asin, acos, atan
The principal value of the arc tangent of y/x
atan2(y, x)
The arcus cofunctions of the sine, cosine, and tangent (acosec/acsc and acotan/acot are aliases)
acsc, acosec, asec, acot, acotan
The hyperbolic sine, cosine, and tangent
sinh, cosh, tanh
The cofunctions of the hyperbolic sine, cosine, and tangent (cosech/csch and cotanh/coth are aliases)
csch, cosech, sech, coth, cotanh
The arcus (also known as the inverse) functions of the hyperbolic sine, cosine, and tangent
asinh, acosh, atanh
The arcus cofunctions of the hyperbolic sine, cosine, and tangent (acsch/acosech and acoth/acotanh are aliases)
acsch, acosech, asech, acoth, acotanh
The trigonometric constant pi is also defined.
$pi2 = 2 * pi;
ERRORS DUE TO DIVISION BY ZERO
The following functions
acoth
acsc
acsch
asec
asech
atanh
cot
coth
csc
csch
sec
sech
tan
tanh
cannot be computed for all arguments because that would mean dividing by zero or taking logarithm of zero. These situations cause fatal runtime errors looking like this
cot(0): Division by zero.
(Because in the definition of cot(0), the divisor sin(0) is 0)
Died at ...
or
atanh(-1): Logarithm of zero.
Died at...
For the csc, cot, asec, acsc, acot, csch, coth, asech, acsch, the argument cannot be 0 (zero). For the atanh, acoth, the argument cannot be 1 (one). For the atanh, acoth, the argument cannot be -1 (minus one). For the tan, sec, tanh, sech, the argument cannot be pi/2 + k * pi, where k is any integer.
SIMPLE (REAL) ARGUMENTS, COMPLEX RESULTS
Please note that some of the trigonometric functions can break out from the real axis into the complex plane. For example asin(2) has no definition for plain real numbers but it has definition for complex numbers.
In Perl terms this means that supplying the usual Perl numbers (also known as scalars, please see perldata) as input for the trigonometric functions might produce as output results that no more are simple real numbers: instead they are complex numbers.
The Math::Trig handles this by using the Math::Complex package which knows how to handle complex numbers, please see Math::Complex for more information. In practice you need not to worry about getting complex numbers as results because the Math::Complex takes care of details like for example how to display complex numbers. For example:
print asin(2), "\n";
should produce something like this (take or leave few last decimals):
1.5707963267949-1.31695789692482i
That is, a complex number with the real part of approximately 1.571 and the imaginary part of approximately -1.317.
PLANE ANGLE CONVERSIONS
(Plane, 2-dimensional) angles may be converted with the following functions.
$radians = deg2rad($degrees);
$radians = grad2rad($gradians);
$degrees = rad2deg($radians);
$degrees = grad2deg($gradians);
$gradians = deg2grad($degrees);
$gradians = rad2grad($radians);
The full circle is 2 pi radians or 360 degrees or 400 gradians.
RADIAL COORDINATE CONVERSIONS
Radial coordinate systems are the spherical and the cylindrical systems, explained shortly in more detail.
You can import radial coordinate conversion functions by using the :radial tag:
use Math::Trig ':radial';
($rho, $theta, $z) = cartesian_to_cylindrical($x, $y, $z);
($rho, $theta, $phi) = cartesian_to_spherical($x, $y, $z);
($x, $y, $z) = cylindrical_to_cartesian($rho, $theta, $z);
($rho_s, $theta, $phi) = cylindrical_to_spherical($rho_c, $theta, $z);
($x, $y, $z) = spherical_to_cartesian($rho, $theta, $phi);
($rho_c, $theta, $z) = spherical_to_cylindrical($rho_s, $theta, $phi);
All angles are in radians.
COORDINATE SYSTEMS
Cartesian coordinates are the usual rectangular (x, y, z)-coordinates.
Spherical coordinates, (rho, theta, pi), are three-dimensional coordinates which define a point in three-dimensional space. They are based on a sphere surface. The radius of the sphere is rho, also known as the radial coordinate. The angle in the xy-plane (around the z-axis) is theta, also known as the azimuthal coordinate. The angle from the z-axis is phi, also known as the polar coordinate. The `North Pole' is therefore 0, 0, rho, and the `Bay of Guinea' (think of the missing big chunk of Africa) 0, pi/2, rho. In geographical terms phi is latitude (northward positive, southward negative) and theta is longitude (eastward positive, westward negative).
BEWARE: some texts define theta and phi the other way round, some texts define the phi to start from the horizontal plane, some texts use r in place of rho.
Cylindrical coordinates, (rho, theta, z), are three-dimensional coordinates which define a point in three-dimensional space. They are based on a cylinder surface. The radius of the cylinder is rho, also known as the radial coordinate. The angle in the xy-plane (around the z-axis) is theta, also known as the azimuthal coordinate. The third coordinate is the z, pointing up from the theta-plane.
3-D ANGLE CONVERSIONS
Conversions to and from spherical and cylindrical coordinates are available. Please notice that the conversions are not necessarily reversible because of the equalities like pi angles being equal to -pi angles.
cartesian_to_cylindrical
($rho, $theta, $z) = cartesian_to_cylindrical($x, $y, $z);
cartesian_to_spherical
($rho, $theta, $phi) = cartesian_to_spherical($x, $y, $z);
cylindrical_to_cartesian
($x, $y, $z) = cylindrical_to_cartesian($rho, $theta, $z);
cylindrical_to_spherical
($rho_s, $theta, $phi) = cylindrical_to_spherical($rho_c, $theta, $z);
Notice that when $z is not 0 $rho_s is not equal to $rho_c.
spherical_to_cartesian
($x, $y, $z) = spherical_to_cartesian($rho, $theta, $phi);
spherical_to_cylindrical
($rho_c, $theta, $z) = spherical_to_cylindrical($rho_s, $theta, $phi);
Notice that when $z is not 0 $rho_c is not equal to $rho_s.
GREAT CIRCLE DISTANCES
You can compute spherical distances, called great circle distances, by importing the great_circle_distance function:
use Math::Trig 'great_circle_distance'
$distance = great_circle_distance($theta0, $phi0, $theta1, $phi1, [, $rho]);
The great circle distance is the shortest distance between two points on a sphere. The distance is in $rho units. The $rho is optional, it defaults to 1 (the unit sphere), therefore the distance defaults to radians.
If you think geographically the theta are longitudes: zero at the Greenwhich meridian, eastward positive, westward negative--and the phi are latitudes: zero at the North Pole, northward positive, southward negative. NOTE: this formula thinks in mathematics, not geographically: the phi zero is at the North Pole, not at the Equator on the west coast of Africa (Bay of Guinea). You need to subtract your geographical coordinates from pi/2 (also known as 90 degrees).
$distance = great_circle_distance($lon0, pi/2 - $lat0,
$lon1, pi/2 - $lat1, $rho);
EXAMPLES
To calculate the distance between London (51.3N 0.5W) and Tokyo (35.7N 139.8E) in kilometers:
use Math::Trig qw(great_circle_distance deg2rad);
# Notice the 90 - latitude: phi zero is at the North Pole.
@L = (deg2rad(-0.5), deg2rad(90 - 51.3));
@T = (deg2rad(139.8),deg2rad(90 - 35.7));
$km = great_circle_distance(@L, @T, 6378);
The answer may be off by few percentages because of the irregular (slightly aspherical) form of the Earth.
BUGS
Saying use Math::Trig; exports many mathematical routines in the caller environment and even overrides some (sin, cos). This is construed as a feature by the Authors, actually... ;-)
The code is not optimized for speed, especially because we use Math::Complex and thus go quite near complex numbers while doing the computations even when the arguments are not. This, however, cannot be completely avoided if we want things like asin(2) to give an answer instead of giving a fatal runtime error.
AUTHORS
Jarkko Hietaniemi <jhi@iki.fi> and Raphael Manfredi <Raphael_Manfredi@grenoble.hp.com>. | ESSENTIALAI-STEM |
How much money the winners of this year's NBA Finals could take home
Going into game six of the 2019 NBA Finals, the Toronto Raptors lead the Golden State Warriors three games to two. If the Raptors win again tonight, Thursday, June 13, they'll clinch the championship — and walk away with way more than just bragging rights. They'll take home a nice bonus, too. The NBA creates a "players' pool" each season that's split among the teams that make the playoffs and finals, and the National Basketball Players Association helps decide how it's divvied up. This time, the pool is about $22 million, an NBPA representative confirmed to CNBC Make It. Using data from sports website SB Nation, we crunched the numbers to provide our best estimate of how much this year's champs could get, since the NBPA declined to share those details. Last season, when the pool was $20 million, the winning team took home around $3.3 million, which broke down to about $220,000 per player for a 15-person roster. So using that logic, and assuming the winners' share grows by 10%, in line with the pool's overall increase, the winners this year could take home around $3.6 million, or $240,000 per player. That's just fraction of the star players' salaries. Steph Curry, the Warriors' star point guard, for example, earned a base of $37.4 million for the 2017-2018 season, according to sports-data site Spotrac. Kyle Lowry, the Raptors' point guard, brought in $31 million. The championship bonus is still high compared to other professional sports, like the NFL. Players on the winning Super Bowl team — including those who were injured or inactive — got a $118,000 bonus, according to the NFL's collective bargaining agreement, while the losing team got $59,000 for each player. For Curry, a two-time NBA Most Valuable award recipient and winner of three NBA championships with the Warriors, it's not all about the money: "One thing my pops always told me is you never count another man's money," he said in a 2017 interview with The Mercury News. "It's what you've got and how you take care of it." | NEWS-MULTISOURCE |
Moustapha Quaynor
Moustapha Quaynor (born 17 July 1995) is a Ghanaian footballer who most recently played for FK Vardar as a midfielder.
After initially joining FC Strathmore in Australia, Quaynor joined St Albans Saints SC for a brief stint in June 2016 before eventually joining Pascoe Vale FC. | WIKI |
[plt-scheme] Question re: PLT object system and CLOS
From: Michael Forster (mike at sharedlogic.ca)
Date: Mon Mar 31 21:15:00 EDT 2008
Hi,
I'm evaluating the feasibility of using PLT Scheme for some of my
company's web applications. The applications were originally
written in Common Lisp, but, as I add new features, I see where a
continuation-based web server might eliminate some of the
standard HTTP interaction baggage and better facilitate mental
flow while exploring ideas.
To keep things brief, one CL/PLT difference that concerns me
is the flavour of object systems. I'm aware of the Swindle module,
but it seems to me, if the PLT GUI framework is any indication,
that the CLOS-like approach garners less support. In "Scheme
with Classes, Mixins, and Traits," the authors state,
Finally, the CLOS approach to classes is relatively popular in
Scheme, e.g., the Meroon library [26] or Barzilay's Swindle
library [7]. In contrast to Smalltalk-style classes, where behaviors
are added by changing a class or deriving a new subclass,
behavioral extensions in CLOS are attached to generic methods.
An advantage of this approach is that it provides a clear path for
adding "methods" to existing data types, including primitive types
like numbers and strings. Another advantage is that it gen-eralizes
well to multi-method dispatch, which can easily specialize an
operation to a particular combination of classes. A major drawback
is that it encourages an impera-tive programming style, where
generic methods are mutated to add new class-specific
implementations."
Indeed, our applications make heavy use of generic functions, but
define relatively few classes. For example, we often dispatch on CL's
builtin type specifiers as well as some of our own extended ones.
So, I'm intrigued by that last statement in the excerpt above. I'm
wondering if one of the authors or another Schemer in-the-know
could given me some examples where the CLOS approach would
lead to an imperative style and the PLT approach would not.
Thanks in advance.
-Mike
Posted on the users mailing list. | ESSENTIALAI-STEM |
Hércules CF
Hércules de Alicante Club de Fútbol, S.A.D. is a Spanish football team in Alicante, in the Valencian Community. Founded on 25 October 1922, it currently plays in Segunda Federación – Group 3, and plays its home games at the 29,500-capacity Estadio José Rico Pérez.
History
Hércules CF has been documented since 1914 although not officially registered until 26 September 1922, alongside Mercantil de Cartagena, Federación Levantina and others. Its founder was Vicente Pastor Alfosea dubbed "El Chepa". In its early days, the club played in various locations, the foothills of la montañosa, the lands of l'Hort del tio Ron, the campo de Benalúa or the facilities of the Alicante Recreation Club. Hercules joined a youth league, becoming champion in 1918. The first official match was in 1919 against Athletic Club Benaluense, Hercules winning 2–1. At first the team played in white and red striped shirts and black pants.
After first appearing in La Liga in the 1935–36 season, Hércules would play sporadically in the category for the next 40 years, playing mainly in the second division but going as low as the third. From 1961 to 1969, neighbours Alicante acted as its feeder club.
After a ten-year spell in the top flight, encompassing 12 seasons in the 1970s and '80s, the club only returned again in the 1996–97 campaign. Though eventually relegated, it managed two remarkable comeback wins over Barcelona, which ultimately handed the Liga title to Real Madrid.
In 2004–05, after five years in the third level, Hércules finished second, being subsequently promoted to the "silver category". After posting three consecutive solid seasons, the club narrowly missed out on a return to the top division in 2009, finishing fourth, three points behind last-promotee Tenerife.
The 2009–10 campaign saw Hércules promoted back into the top flight after 14 years in dramatic fashion: losing 0–1 at half-time at Rayo Vallecano, the team fought back to win 2–1 in the penultimate game of the season and leap frogged Real Betis into third place. In the last round, a 2–0 away win against relegation-threatened Real Unión guaranteed promotion, with the 4–0 win of Betis over Levante eventually counting for nothing (all three teams – Levante, Hércules and Betis – ended equal on points).
Early into the 2010–11 season, one year, three months and 19 days after Barcelona's last home defeat in the league, Hércules recorded a shock 2–0 win at the Camp Nou thanks to a brace from Nelson Valdez – Barcelona had won their last 11 home matches, scored at least three times in each of their last six league fixtures and were protecting a 17-game unbeaten streak. This was the Alicante outfit's third successive win over the Barcelona, having won both meetings in their previous top flight campaign 14 years before.
In the 2013–14 campaign, they were relegated to the Segunda División B after finishing in last place in the Segunda División.
In the 2016–17 Copa del Rey, the team drew 1–1 with Barcelona. In the second match at the Camp Nou (Barcelona's home), Hércules was defeated by the Catalonian side 7–0.
Season to season
* 20 seasons in La Liga
* 43 seasons in Segunda División
* 1 seasons in Primera Federación
* 18 seasons in Segunda División B
* 3 seasons in Segunda Federación
* 7 seasons in Tercera División
Relationships with other teams
* 🇬🇷 Iraklis – Since 2003, fans of both teams formed a friendship through the Internet, because "Iraklis" is a Greek name for "Hercules", the Roman name for Heracles, the Greek god of strength. There is even a Hércules supporters club that bears the name Iraklis, in honor of their friendship. They also have a newly formed partnership with St Johnstone FC of Scotland. | WIKI |
Talk:Halo 5: Guardians
Available info
Depending on whether any new info comes through at E3 in a week, this article might be better re-merged back into the series article since the available info is still scarce czar ♔ 12:34, 31 May 2014 (UTC)
* It's confirmed for E3. A merge discussion would be impractical when the article gets split off again. All shall be revealed. CR 4 ZE (t • c) 14:41, 31 May 2014 (UTC)
Box art
There appear to be conflicting opinions about whether File:Halo Guardians.png is, in fact, the final box art and hence whether it's appropriate for the infobox. (Pinging ). It appears that RS's have picked up on it being the final box art. The original source (from Microsoft) calls the image "Halo5_2D_RP-Boxshot_FOB_RGB_Final". Leads me to think this is the real deal, not a placeholder. Thoughts? CR 4 ZE (t • c) 14:50, 31 May 2014 (UTC)
Halo 5 Limited collectors edition
apparently there will be 2 version of limited collector's edition coming out to Xbox on October 2015 more info on gogames2010.blogspot.com
Game-addict2015 (talk) 06:17, 20 June 2015 (UTC)
No it was cancelled after issues Landonv (talk) 13:39, 7 January 2020 (UTC)
ESRB comment
Is the ESRB rating comment noteworthy? Seems like a pretty trivial thing to me, but I'd rather not remove it in case someone contests. --The1337gamer (talk) 22:47, 6 September 2015 (UTC)
Yeah, you probably shouldn't do that. Gary the stormtrooper (talk) 03:45, 27 July 2017 (UTC)
Vandalism
Vandalism in first paragraph: "Halo is Jesus favorite game to play with God in Heaven." Not adept enough to figure out if anything was removed.Dude6935 (talk) 04:09, 5 October 2015 (UTC)
* ✅ — zziccardi ( talk ) 16:45, 18 October 2015 (UTC)
"Projectile Weapon"
It says early in the "Gameplay" section that the player can only carry 2 "Projectile Weapons" which is supposed to mean two weapons but also has grenades, etc. The problem is that the game includes non-projectile weapons that can take on those slots (energy sword...) I'm not sure what the best way to correct this is. — Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs)
Game Critics Awards 2015
Is this noteworthy? This sounds as though it would belong in the "Awards" subsection under "Reception", but it does sound a little trivial because critics were only rating games' presentations' overall qualities. After all, they were only in alpha (if not beta). What are your opinions? Gamingforfun 3 6 5 ( talk ) 21:09, 28 January 2016 (UTC)
* After a long time of waiting, I have added this information to the article (similar to what I did here). Gamingforfun 3 6 5 ( talk ) 04:07, 16 June 2016 (UTC) | WIKI |
Template:Did you know nominations/Coccomyces dentatus
Coccomyces dentatus
* ... that the black lines formed by Coccomyces dentatus (pictured) result from antagonistic interactions between individuals of different genotypes?
* Reviewed: Purdue University Reactor Number One
Created/expanded by Sasata (talk). Self nom at 08:50, 7 October 2012 (UTC)
* Symbol confirmed.svg New enough and long enough at time of nomination. Fully supported by sources and there are no copyright issues. The hook is interesting and good for the main page. The image has the appropriate licence for the main page. QPQ is done, and is good. Thine Antique Pen (talk) 10:10, 7 October 2012 (UTC) | WIKI |
Dissertation/Thesis Abstract
Phenotypic alterations in Borrelia burgdorferi and implications for the persister cell hypothesis
by Caskey, John Russell, Ph.D., Tulane University, 2014, 126; 3680987
Abstract (Summary)
Lyme disease is the most commonly reported vector-borne disease in the United States. The causative agent of Lyme disease, can alter gene expression to enable survival in a diverse set of conditions, including the tick midgut and the mammalian host. External environmental changes can trigger gene expression in B. burgdorferi, and the data demonstrate that B. burgdorferi can similarly alter gene expression as a stress-response when it is treated with the antibiotic doxycycine. After treatment with the minimum bactericidal concentration (MBC) of doxycycline, a subpopulation can alter its phenotype to survive antibiotic treatment, and to host adapt and successfully infect a mammalian host. Furthermore, our data demonstrate that if a population is treated with the MBC of doxycycline, a subpopulation may alter its phenotype to adopt a state of dormancy until the removal of the antibiotic, whereupon the subpopulation can regrow. We demonstrate that the chance of regrowth occurring increases as a population reaches stationary phase, and present a mathematical model for predicting the probability of a persister subpopulation within a larger population, and ascertain the quantity of a persister subpopulation. To determine which genes are expressed as stress-response genes, RNA Sequencing analysis, or RNASeq, was performed on treated, untreated, and treated and regrown B. burgdorferi samples. The results suggest several genes were significantly different in the treated group, compared to the untreated group, and in the untreated and regrown group compared to the untreated group, including a 50S ribosomal stress-response protein, coded from BB_0786. The appendices discuss the theory and methods that were used in RNA Sequencing (RNASeq) analysis, and provide an overview of the database that was created for the B. burgdorferi transcriptome. Additional studies may demonstrate further how persister subpopulations form, and which genes can trigger a persister state in B. burgdorferi.
Indexing (document details)
Advisor: Embers, Monica E.
Commitee: Freytag, Lucia C., Kaushal, Deepak, MacLean, Andrew, McLachlan, James B., Philipp, Mario
School: Tulane University
Department: Biomedical Sciences
School Location: United States -- Louisiana
Source: DAI-B 76/06(E), Dissertation Abstracts International
Source Type: DISSERTATION
Subjects: Microbiology, Bioinformatics
Keywords: Antibiotic, Doxycycline, Ion torrent, Ixodes, Persistence, Rnaseq
Publication Number: 3680987
ISBN: 978-1-321-53403-0
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest | ESSENTIALAI-STEM |
2006 Open Canada Cup
The 2006 Open Canada Cup was the 9th edition of the Canadian Soccer League's open league cup tournament running from late May through late September. Ottawa St. Anthony Italia defeated Toronto Lynx 2-0 in the final played at Cove Road Stadium, London, Ontario. Ottawa became the first victorious amateur club in the tournament's history, and first amateur club to claim a purely Canadian treble (Open Canada Cup, Ontario Cup, and The Challenge Trophy). The tournament expanded to include for the first time the Toronto Lynx of the USL First Division at that time the nations top tier division. Notable entries included the reigning Spectator Cup champions Hamilton Serbia, and 2005 Canadian National Challenge Cup, Ontario Cup champions Scarborough GS United both respectively from the Ontario Soccer League.
The Ontario and Quebec amateur clubs began the tournament in the preliminary rounds while the CSL clubs and Toronto Lynx received an automatic bye to the second round. For the fifth straight year London City were awarded the hosting rights to the finals which granted them a wild card match if they were defeated in the earlier rounds. All CSL clubs competed in the competition with the exception of Toronto Croatia which opted out in order to compete in the annual Croatian-North American Soccer Tournament. | WIKI |
Luigi Dossena
Luigi Dossena (28 May 1925 – 9 September 2007) was an Italian prelate of the Catholic Church who spent his career in the diplomatic service of the Holy See.
Biography
Luigi Dossena was born in Campagnola Cremasca, Italy, on 28 May 1925. He was ordained a priest of the Diocese of Crema on 25 March 1951.
To prepare for a diplomatic career, he entered the Pontifical Ecclesiastical Academy in 1953. His early assignments in the diplomatic service include a stint in the Dominican Republic.
On 27 February 1973, Pope Paul VI appointed him a titular archbishop and Apostolic Pro-Nuncio to Korea. He received his episcopal consecration on 25 March 1973 from Cardinal Jean-Marie Villot.
On 24 October 1978, Pope John Paul II named him Apostolic Pro-Nuncio to Cape Verde, Niger, Senegal, and Upper Volta and also Apostolic Delegate to Mali, Guinea-Bissau, and Mauritania. His responsibilities changed as the Vatican reorganized its diplomatic presence in Africa. The posts of Pro-Nuncio to Upper Volta and to Niger were assigned to Justo Mullor García on 2 May and 25 August 1979. And Dossena's title in Mali was raised to Apostolic Pro-Nuncio on 3 June 1980.
On 30 December 1985, he was appointed Apostolic Nuncio to Peru by Pope John Paul. Though viewed as more moderate than his predecessor Mario Tagliaferri, his took similar positions with respect to his role as nuncio and the Church's role in civic life. Some in the Church hierarchy in Peru complained he had excessive influence over episcopal appointments. He urged the Peruvian bishops to publicly support Mario Vargas Llosa in the 1990 presidential election.
On 2 March 1994, he was named Apostolic Nuncio to Slovakia.
His service as nuncio ended when he was replaced in Slovakia by Henryk Józef Nowacki on 8 February 2001.
He died on 9 September 2007. | WIKI |
If you have not experienced back pain, then you are fortunate. The world health organization states that one in four people experiences back pain in any given year, making back pain the top cause of workplace disability in the United States. Back pain is also one of the number one reasons physicians prescribe opioids, though recent studies have found that opioids are not an effective solution for chronic back pain.
The spine is a beautiful design, much like beads on a string. The beads can be thought of as the bones or vertebral bodies, and the string the spinal cord. The beads are smooth and rounded in the front and have multiple protrusions in the back – those are the joints where the vertebral bodies articulate with the bones above and below them. The vertebrae can be responsible for back pain, especially in the case of vertebral compression fractures, when the bone collapses on itself, a painful condition seen in severe osteoporosis, bone cancer, and other conditions. The vertebral bodies have fibrocartilage discs between them to provide cushioning and to increase flexibility. Ligaments run down the sides and back of the bones. Ligament and disc problems can cause back pain, too, but not as often as physicians thought in the past. Surgeons used to perform many more disc surgeries until studies showed they didn’t necessarily lead to reduced back pain. Recent research points to muscle strain and sprains as the most common cause of back pain. Muscle strains are more likely to occur if the muscles are weak, tight, or overused from common repetitive positions like sitting at a desk all day. The good news is that muscle injuries are often easier to heal than bone or disc issues.
To prevent back pain caused by muscle strains, the first recommendation is to use proper lifting and bending techniques. We need to remember to squat before we lift a heavy load. Better yet, we should use assistive tools like dollies and carts to move heavy objects. Maintaining awareness of our posture while working at a desk or watching TV can create better back habits.
The Cayce readings give more recommendations for preventing back pain. Though food choice would seem to have little to do with back pain, research has confirmed that Cayce's advice to maintain a healthy plant-based, unprocessed food diet and to keep our weight in a healthy range can help decrease back pain. Losing even 10 pounds reduces 40 pounds of stress on the vertebrae and other joints! Minimizing sugar, another emphatic dietary recommendation in the Cayce readings decreases inflammation and pain throughout the body, including in the lower back.
Current science also supports another common-sense Cayce remedy for preventing back pain - twice a day stretching. Stretching increases flexibility and blood flow in the spine. A.R.E. Health Center Chiropractor and Cayce/Reilly faculty member, Dr. J.P. Amonte, has created two videos that offer Cayce-based stretching exercises for the morning and evening. These “Heal Thyself” videos are available on the member-only section at edgarcayce.org and in our YouTube Channel at youtube.com/edgarcayce.
The Cayce/Reilly® Massage targets not only the back muscles, but also the thigh and abdominal muscles that support the spine. Regular Cayce massage loosens tight muscles, opens up compacted joints, and stretches the spine and the whole body.
Multiple Cayce readings champion the health improving qualities of exercise, especially walking.
Walking is the best form of exercise for the body.
-Edgar Cayce Reading 23-11
People with chronic back pain may be wary of exercise and think it might make their pain worse. At first, they might feel stiff and tired when starting a walking plan. After a few weeks of daily exercise, endogenous opioids – the natural pain relievers our body makes – kick in to decrease discomfort. Our bodies habituate to exercise like they do to opioids. Cayce health reading #257-204 pointed to additional holistic benefits of walking outside:
1. Q) How much walking should be done daily?
2. A) Whether it’s a mile or a step, do that which makes for a better “feel” for the body; getting into the open! Know something of nature.
Though back muscle strain is common, there are many holistic ways to decrease and prevent back pain, and all are available to us without a prescription! | ESSENTIALAI-STEM |
Page:LittleBookOfTheMostHolyChildJesus.djvu/42
, Foster-father of , the Heart of that holy beats for me. Mary is my Mother; pray for me that I may be truly humble and belong to this Holy Family, now, and at the hour of my death, and for evermore.
Most Holy, save Thy children.
See those good shepherds on the mountain side.
How watchfully they guard their flocks through the long drear night!
It is to keep away the robber and the wolf from their sheep that they are thus wakeful. | WIKI |
1982 Donnay Indoor Championships
The 1982 Donnay Indoor Championships was a men's tennis tournament played on indoor carpet courts in Brussels in Belgium the event was part of the 1982 Volvo Grand Prix. It was the second edition of the tournament and was held from 8 March through 14 March 1982. Third-seeded Vitas Gerulaitis won the singles title.
Singles
🇺🇸 Vitas Gerulaitis defeated 🇸🇪 Mats Wilander, 4–6, 7–6, 6–2
* It was Gerulaitis' 1st singles title of the year and the 20th of his career.
Doubles
Pavel Složil / 🇺🇸 Sherwood Stewart defeated 🇺🇸 Tracy Delatte / 🇺🇸 Chris Dunk, 6–4, 6–7, 7–5 | WIKI |
Petar Kosturkov
Petar Kosturkov (Петър Костурков) (born 10 September 1969) is a former Bulgarian footballer who is currently manager.
Career
A midfielder, between 1994 and 1996 Kosturkov played in 13 A PFG matches for Levski Sofia, becoming champion of Bulgaria at the end of the 1994–95 season. He also represented Pirin Blagoevgrad, Etar, Pirin Razlog, Dobrudzha, and Spartak Pleven, while also having a spell abroad with Austria Lustenau. | WIKI |
Tomb of Xu Guangqi
The tomb of Xu Guangqi is the burial site of Xu Guangqi (24 April 1562 – 10 November 1633), a prominent late Ming dynasty statesman, scholar, and leader of the Catholic community, as well as some of his relatives. It is located north of Xujiahui, Shanghai, in the present-day Guangqi Park, covering an area of 3,000 square meters and standing 2.2 meters tall. The tomb is elliptical in shape.
In the seventh year of the Chongzhen era (1634), he was posthumously granted the privilege of burial with the rank of a first-rank official, and a special envoy was dispatched to escort his coffin back to Shanghai for burial. Due to the unsettled situation at the time, the coffin was temporarily placed outside the Da'nan Gate of Shanghai (Old City) in the Shuangyuan Villa. In the fourteenth year of the Chongzhen era (1641), he was finally buried in the southwest corner of Gaochang Township, Shanghai County, Songjiang Prefecture.
In the twenty-ninth year of the Guangxu era (1903), the Catholic Vicariate of Kiang-nan renovated and expanded the tomb. It was once abandoned, even turned into a vegetable garden. In 1957, it was briefly rebuilt. During the Cultural Revolution, it became an open-air warehouse and was severely damaged. It was once again restored in 1983. In 2003, it was reconstructed according to the tomb's design from 1903 and has since been well-maintained.
On 26 May 1959, and 7 December 1977, the tomb of Xu Guangqi was declared a cultural relic protection unit of Shanghai. On 13 January 1988, it was announced as a national major cultural relic protection unit by the State Council.
Ancient times
Xu Guangqi, a native of Shanghai County, Songjiang Prefecture, Nanzhili, in the late Ming dynasty, passed the imperial examination in the 32nd year of the Wanli era (1604) and held the highest official position as the Director of the Ministry of Rites and concurrently the Grand Secretary of the Hall of Literary Profundity. He studied astronomy, calendar, mathematics, and firearms with the Jesuit missionary Matteo Ricci. He presented several astronomical and mathematical works to the Ming Emperor, along with contributions in military strategy, salt administration, land reclamation, and hydraulic engineering. Xu Guangqi's significant contributions to east–west cultural exchange earned him the title "the first person in China to truly open his eyes to the world", as described by Professor Mao Peiqi. In the sixth year of the Chongzhen era (1633), Xu Guangqi passed away at the age of 72. A special guard was dispatched by the Ming government to escort Xu Guangqi's remains back to Shanghai, arriving in his hometown in the second month of the seventh year of the Chongzhen era (1634). Eventually, Xu Guangqi was buried at the junction of Zhaojiabang and Fahuajing, known as the Tomb of Xu Guangqi. One of his descendants later settled near the tomb, and the area was named "Xujiahui" ("property of the Xu family at the junction of two rivers").
Modern times
Originally covering more than 20 mu, Xu Guangqi's tomb had two huabiao (ornamental columns) in front of it, as well as a stone archway. Stone statues of sheep, horses, and elderly figures were placed on both sides of the tomb path. In the 29th year of the Guangxu era (1903), the huabiao of Xu Guangqi's tomb had disappeared. Due to Xu Guangqi's Catholic faith during his lifetime, the Catholic Church erected a cross in commemoration of the 270th anniversary of Xu Guangqi's passing. Inscriptions in Chinese and Latin on the base of the cross describe Xu Guangqi's achievements, and the tomb was renovated simultaneously. In 1933, to commemorate the 300th anniversary of Xu Guangqi's passing, different communities raised funds to build an iron fence around the cross, as well as stone railings and cement roads around the cemetery. After the War of Resistance Against Japan, the trees in the vicinity were heavily felled, the soil was excavated, and the cemetery was turned into vegetable fields.
Present
In 1956, eight influential figures from the direct lineage of Xu Guangqi and the Xu clan wrote to the Shanghai People's Committee expressing their willingness to entrust Xu Guangqi's tomb to the state for safekeeping. Subsequently, Xu Guangqi's tomb was placed under the management of the Shanghai Cultural Bureau. In 1957, the tomb underwent restoration, and residents who had been cultivating vegetables in the cemetery were relocated elsewhere. Apart from the portion of land occupied by the Shanghai Meteorological Bureau staff area, the rest of the area was restored to its original state, with trees replanted within the cemetery. The surrounding area was transformed into the Nandan Park. During the Cultural Revolution, most of the landmark buildings in the cemetery were destroyed, including the rebuilt huabiao, stone archway, and stone statues, all of which were smashed, and the cemetery was converted into an open-air warehouse. In 1975, the cemetery was reclaimed by the Shanghai Municipal Gardens Department in collaboration with the Shanghai Municipal Cultural Relics Management Committee and underwent renovation.
In 1980, mathematician Su Buqing inscribed a tombstone for Xu Guangqi, which was erected in front of Xu Guangqi's tomb. In 1981, the burial mound was reconstructed, and dragon cypress and evergreen trees were planted on both sides. In 1983, Xu Guangqi's tomb was again restored. Approximately 15 meters in front of the tomb, a granite statue of Xu Guangqi wearing the robes of a first-rank official, half bust, 1.2 meters high, with a pedestal 1.6 meters high, was erected. A new stele corridor was built on the east side, and a 150-square-meter granite tomb platform was constructed on the small road in front of the tomb. A large number of trees were planted around the tomb, and several stone benches were placed. In April 2012, two commemorative stone tablets were erected at Xu Guangqi's tomb, each inscribed with articles commemorating Xu Guangqi by Ruan Yuan and Chu Coching; in addition, two sculptures related to Xu Guangqi were also erected at the same time.
Structure
The tomb of Xu Guangqi is located on the north side of Guangqi Park, covering an area of 3000 square meters. There are a total of 10 tombs in the cemetery. The main tomb houses Xu Guangqi and his wife, Madam Wu, while his four grandsons and their wives are buried on both sides. After the 1983 renovation, the height of the burial mound reached 2.2 meters with an area of 300 square meters, elliptical in shape, surrounded by granite paving. Green grass is planted on the burial mound, while large camphor trees, dragon cypresses, cedar trees, and oleanders are planted in front of the tomb. A tombstone stands in front, inscribed with "Tomb of Xu Guangqi" in the handwriting of mathematician Su Buqing. Stone benches are placed on both sides, and on the right side of the tomb, a Qing Dynasty stone horse is preserved.
Additionally, there is another stone horse, as well as pairs of stone sheep, stone elephants, and stone dogs, and a cross. On the east side of the tomb, there is a stele corridor built in 1983. Originally a resting pavilion in the park, it was renovated to have a wall in the middle, with 12 inscribed stone tablets, featuring Xu Guangqi's portrait, the biography of Xu Guangqi written by Zha Jizuo at the end of the Ming Dynasty and the beginning of the Qing Dynasty, the first sentence of Xu Guangqi's handwriting preface to the "Introduction to Geometry", and a poem by the Tang Dynasty poet Li Qi handwritten by Xu Guangqi. In front of the tomb, there is a memorial archway with three bays and four columns, with the inscription "Tomb of the Late Great Scholar and Prince Tutor, Posthumously Honored as Grand Guardian and Further Honored as Grand Guardian, Minister of Rites, and Concurrent Grand Secretary of the Hall of Literary Profundity, Xu Wending's Tomb". The archway also has couplets inscribed, with the upper couplet reading "Master of Calendar and Agriculture for Hundreds of Generations, Guiding Heaven and Earth", and the lower couplet reading "From General to Minister, an official devoted to military affairs and scholarly pursuits".
Commemoration
On 26 May 1959, and 7 December 1977, the tomb of Xu Guangqi was successively declared a cultural heritage site in Shanghai. On 13 January 1988, the tomb of Xu Guangqi was announced by the State Council as one of the third batch of nationally major protected cultural relics. In 2003, the tomb of Xu Guangqi was designated as a patriotism education base in Shanghai. Since then, the Education Bureau, Cultural Bureau, and other units of Xuhui District in Shanghai have organized memorial ceremonies at the tomb of Xu Guangqi every Qingming Festival. Sometimes there are offerings of flower baskets and speeches on related commemorative themes.
In 2003, the South Chunhua Hall, a cultural heritage site in Meilong, Xuhui District, was converted into the Xu Guangqi Memorial Hall. The memorial hall covers an area of more than 400 square meters, with an exhibition area of over 220 square meters. It features four exhibition themes, displaying valuable materials such as portraits, manuscripts, and documents related to Xu Guangqi.
In 2006, the contents of the lost epitaph of Xu Guangqi's tomb were discovered in a magazine published in 1920. Based on the Latin content of the epitaph on the tombstone, it was inferred that Xu Guangqi had indeed converted to Catholicism and had taken the baptismal name "Paul". In 2007, the tombstone of Xu Guangqi's tomb was accidentally discovered buried under the soil of the tomb, with an area of about 1 square meter and some damage in the upper right corner. After this discovery, the tombstone was placed in a flower bed in Guangqi Park. | WIKI |
The Works of Sir John Suckling in prose and verse/Cantilena Politica-Jocunda Facta post Principis Discessum in Hispaniam, 1623
| WIKI |
C02 Laser Design
Atlas IT
The CO2 laser, once an industry work-horse, has been eclipsed by newer laser designs that are more narrowly focused toward specific uses. However, because of its unique design and function, the CO2 laser is still an irreplaceable tool for many industrial applications that cannot be matched by other technologies. Optical systems can focus the light energy into small spot sizes useful in metal cutting, welding, cladding, and heat-treating applications. Here’s why it works so well in so many heat treating, welding, and other hard-surfacing applications.
Essential components
The CO2 laser is comprised of two basic parts. The first part includes the components that generate the laser energy, and the second part is the beam delivery system that translates the laser energy into a light beam that can be used. The energy-generating part of a CO2 laser consists of a lasing medium, an optical resonator to contain the lasing medium, and an excitation source for the lasing medium.
A lasing medium is the original source of the energy for the laser. The lasing medium in a CO2 laser is a mixture of carbon dioxide, helium, and nitrogen gas.
In an axial-flow type of CO2 laser, the gas is contained in a long double walled glass tube. This glass tube is the optical resonator and has reflecting mirrors mounted at each of its ends. High electrical voltage is the excitation source applied to the gas in the resonator to excite the CO2 molecules to a higher energy level.
Making light
As the gas mixture is electrically charged, the excited molecules try to find a more stable energy level. In the process, they emit energy in the form of photons. This is similar to a controlled chain reaction, as each emitted photon stimulates the emission of more photons from other excited molecules. Every photon emitted by the excited CO2 molecules has exactly the same wavelength.
As the energy beam develops from the excited photons, the mirrors at the ends of the optical resonator catch the photons traveling parallel to the axis of the resonator and reflect them back down the resonator. This process further amplifies the energy content of the beam by stimulating the emission of even more photons. The optical resonator makes all the energy flow in one direction, since all reflected photons are traveling in a direction parallel to the resonator’s axis.
The energy within the laser is of no value until it can be directed out of the unit and onto a work surface. An output coupler is used to get the energy out of the optical resonator so it can be used for some work application. To form the output coupler for a CO2 laser, one of the mirrors on the end of the resonator tube is made only partially reflective.
This partially reflective mirror allows about 50 percent of the laser beam to exit the optical resonator, and that portion is used for the laser’s intended application. The remaining 50 percent of the beam continues to stimulate photon emission in the excited CO2 molecules inside the resonator. The output coupler focuses the exiting beam to produce high energy densities in a small area.
Making heat
The laser beam is simply an energy source until it contacts the surface of a work piece. To make the light beam useful, lasers have optical systems that use reflectors and lenses to direct the beam from the optical coupler to the work piece.
Because a CO2 laser beam retains most of its power over long distances, the optical systems can direct the beam to a workstation located quite a large distance from the laser. The beam can even be split and shared among more than one workstation, as it is in BMR Group’s facility in Wolf Lake, Indiana.
BMR Group has used CO2 laser technology for two decades, helping customers conquer or alleviate wear problems caused by everyday operation in difficult production environments. If you’d like to learn how this same technology might help you improve your productivity and your bottom line, call BMR Group at 260-635-2195 or drop us an email explaining what you want to accomplish. | ESSENTIALAI-STEM |
Wikipedia:Featured picture candidates/Still life
Still life
* Reason:During the seventeenth century the Dutch Reformed Church forbade overtly religious subjects, so still life artists depicted moral lessons symbolically, often with a small object such as a skull or a pocket watch in an opulent scene to suggest that worldly pleasures come to an end. A high resolution file from a good source (the Dutch national library again), painted by one of the leading artists in the genre. This would be Wikipedia's first featured picture of a still life.
* Articles this image appears in:Abraham van Beijeren
* Creator:Abraham van Beijeren
* Support as nominator -- Durova Charge! 23:30, 3 August 2008 (UTC)
* Can someone explain the fading/banding that I've circled in the image? Is it a scanning or photographic error? Nautica Shad es 03:31, 4 August 2008 (UTC)
* Wow, it seems I was chasing ghosts. What I was seeing was a monitor problem (fixed now), not anything wrong with the image. I'll remove the circled image. Janke's right about the artifacts, though. Nautica Shad es 14:57, 4 August 2008 (UTC)
* Oppose They're terrible JPG artifacts. --Janke | Talk 12:30, 4 August 2008 (UTC)
* Withdraw nomination - Drat, you're right. After the Vermeer and the Rembrandt I thought this was a good archive to use again. Off to dig through more archives... Durova Charge! 14:54, 4 August 2008 (UTC)
* Comment: There is a typo in the file name. It should only have two l's, not three. Rmhermen (talk) 15:43, 5 August 2008 (UTC)
. --John254 01:33, 11 August 2008 (UTC) | WIKI |
d3-flextree-fixed-for-ng
2.1.1 • Public • Published
D3 flextree plugin
This plugin provides a more general version of the D3 tree layout module. Unlike tree, this plugin allows for nodes of variable sizes; like tree, the algorithm is fast, running in O(n) time.
See the demo.
flextree() is a factory function that returns a layout instance. A layout is a function that computes the positions of nodes in a tree diagram. Properties attached to the layout control various parameters of the algorithm.
Try d3-flextree in your browser.
Installing
If you use npm, npm install d3-flextree. Otherwise, download the latest release. AMD, CommonJS, and browser environments are supported.
Alternatively, you can use it straight from the jsdelivr CDN at https://cdn.jsdelivr.net/npm/d3-flextree@2.0.0/build/d3-flextree.min.js. or d3-flextree.js
Overview
Computing the layout of a tree data structure involves two steps: first, create a hierarchy from the data, and second, invoke the layout function.
In a Node environment:
const flextree = require('d3-flextree').flextree;
const layout = flextree();
const tree = layout.hierarchy({
size: [1, 1],
children: [
{ size: [2, 4] },
{ size: [3, 1],
children: [
{ size: [4, 1] },
],
},
],
});
layout(tree);
tree.each(node => console.log(`(${node.x}, ${node.y})`));
In a browser, flextree is attached to a d3 global (which is created if necessary):
<script src="d3-flextree.js"></script>
<script>
const flextree = d3.flextree;
...
</script>
When creating the hierarchy, the library uses the children accessor function to determine the children of a data node. When the layout is computed, two other accessor functions are used: nodeSize (to get the node sizes) and spacing (to determine how far apart adjacent nodes in the diagram should be placed).
The example above uses the default accessors:
children: data => data.children,
nodeSize: node => node.data.size,
spacing: 0,
If the data is structured differently, the children and nodeSize accessors can be customized. For example, here is the same tree encoded in a nested array structure, along with the code to compute the layout using a spacing function that increases the gap between more distantly related nodes:
const data = [
1, 1,
[ 2, 4 ],
[ 3, 1,
[ 4, 1 ],
],
];
const layout = flextree({
children: data => {
const kd = data.slice(2);
return kd.length ? kd : null;
},
nodeSize: node => node.data.slice(0, 2),
spacing: (nodeA, nodeB) => nodeA.path(nodeB).length,
});
const tree = layout.hierarchy(data);
layout(tree);
console.log(layout.dump(tree)); //=> prints the results
The accessors can also be set using D3-style chained methods:
const layout = flextree()
.children(data => {
const kd = d.slice(2);
return kd.length ? kd : null;
})
.nodeSize(node => node.data.slice(0, 2))
.spacing((nodeA, nodeB) => nodeA.path(nodeB).length);
One thing to keep in mind is that the argument passed to the children accessor is a node in the data structure, whereas the arguments to nodeSize and spacing are nodes of the hierarchy.
The layout.hierarchy method is a convenience form of the d3.hierarchy function, and creates a set of objects that are instances of a class that derives from d3.hierarchy. It's not required to use the d3-flextree version. The following code is equivalent to the example above, with three custom accessors. Note that the children accessor needs to be passed as the second argument to the d3.hierarchy function:
const layout = flextree({
nodeSize: node => node.data.slice(0, 2),
spacing: (nodeA, nodeB) => nodeA.path(nodeB).length,
});
const tree = hierarchy(data, data => {
const kd = d.slice(2);
return kd.length ? kd : null;
});
layout(tree);
API Reference
# flextree(accessors)
Creates a new layout with the specified accessors. Any subset of children, nodeSize, and spacing can be specified in the argument object. If one is not specified, then the default is used:
children: data => data.children,
nodeSize: node => node.data.size,
spacing: 0,
The accessors can also be changed using chained methods, for example:
const layout = flextree()
.spacing((nodeA, nodeB) => nodeA.path(nodeB).length);
# layout.hierarchy(data)
Creates a new hierarchy from the data, using the children accessors in effect when called. This is an enhanced version of the d3.hierarchy function, and produces a tree of instances of a class derived from d3.hierarchy.
Each node of the hierarchy inherits all of the methods defined in d3.hierarchy, including:
In addition, each of the objects in the returned hierarchy has several property getters. Many of these will be meaningless until layout is called on this tree. They include:
• x - the computed x-coordinate of the node position.
• y - the computed y-coordinate of the node position.
• data - reference to the original data object
• nodes - all of the nodes in this subtree (same as descendants())
• parent - the parent node, or null for the root.
• children - the array of child nodes, or null for leaf nodes.
• numChildren
• hasChildren
• noChildren
• depth - the depth of the node, starting at 0 for the root.
• height - the distance from this node to its deepest descendent, or 0 for leaf nodes.
• length - number of nodes in this subtree
• size - size of this node (the values fetched by the nodeSize accessor) as a two-element array.
• xSize
• ySize
• top
• bottom
• left
• right
• extents - the minimum top and left, and the maximum bottom and right values for all of the nodes in this subtree
# layout(tree)
Computes the layout of a hierarchy. x and y properties are set on each node, and many other properties useful in rendering are available -- see the list above.
Although the layout is defined in terms of x and y, these represent an arbitrary coordinate system. For example, you can treat x as a radius and y as an angle to produce a radial rather than Cartesian layout.
# layout.children([children])
If children is specified, sets the specified children accessor function. If children is not specified, returns the current children accessor function, which by default assumes that the input data is an object with a children property, whose value is either an array or null if there are no children:
data => data.children
Note that unlike the other accessors, this takes a data node as an argument. This is used only in the creation of a hierarchy, prior to computing the layout, by the layout.hierarchy method.
# layout.nodeSize([nodeSize])
If nodeSize is specified as a two-element array [xSize, ySize], then this sets that as the fixed size for every node in the tree. If nodeSize is a function, then that function is passed the hierarchy node as an argument, and should return a two-element array. If nodeSize is not specified, this returns the current setting.
The default nodeSize assumes that a node's size is available as a property on the data item:
node => node.data.size
# layout.spacing([spacing])
If a spacing argument is given as a constant number, then the layout will insert the given fixed spacing between every adjacent node. If it is given as a function, then that function will be passed two nodes, and should return the minimum allowable spacing between those nodes. If spacing is not specified, this returns the current spacing, which defaults to 0.
To increase the spacing for nodes as the distance of their relationship increases, you could use, for example:
layout.spacing((nodeA, nodeB) => nodeA.path(nodeB).length);
The Algorithm
The existing D3 tree layout is based on an algorithm developed originally by Reingold and Tilford in their paper from 1981, Tidier Drawings of Trees. The algorithm was improved over time by others, including Walker, in a paper in 1989, A Node-Positioning Algorithm for General Trees, and the latest improvement by Bucheim, Junger, and Leipert in 2002, described in their paper, Improving Walker's Algorithm to Run in Linear Time.
A limitation of that algorithm is that it applies to trees in which all of the nodes are the same size. This is adequate for many applications, but a more general solution, allowing variable node sizes, is often preferable.
In a paper from 2013, A.J. van der Ploeg enhanced the algorithm to allow for variable-sized nodes, while keeping its linear runtime nature. He described the algorithm in his paper, Drawing Non-layered Tidy Trees in Linear Time. The author also provided a working Java application on GitHub at cwi-swat/non-layered-tidy-trees.
This module is a port from that Java code into JavaScript.
Install
npm i d3-flextree-fixed-for-ng
DownloadsWeekly Downloads
9
Version
2.1.1
License
WTFPL
Unpacked Size
706 kB
Total Files
40
Last publish
Collaborators
• ashustariov | ESSENTIALAI-STEM |
buul
Etymology
.
Noun
* 1) ball
Noun
* 1) game of chance
Verb
* 1) play a game of chance
* 2) win or lose a bet; gamble
Verb
* 1) dive | WIKI |
RSS
2021-10-08
Despite being old it's gold.
RSS stands for Really Simple Syndication. It refers to files easily read by a computer, called XML files, that automatically update information. A link to a website is created using this tech and that very link is identified by an RSS reader software which then fetches the information from that particular linked site and shows it to the user. RSS was created by Dan Libby and Ramanathan V. Guha in 1999 with a motive of making it easier to subscribe to web feeds. Checking each site one by one will take forever. Signing up for their newsletters could ensure you keep up with the latest updates and information, but it's also easy to mistake the emails as spam or to ignore them altogether in your crowded inbox. Then again, relying solely on the site's social media updates might mean you miss something important you wanted to know about.
In simple terms, RSS helps you create your own e-magazine where you get only the information you want to get from the sites you've chosen. Not only can you subscribe to your favourite websites, but you also can subscribe to blogs and podcasts if the RSS reader supports it. RSS readers can fetch text information, audio, images and even video files, so you won't lose any information you want to get in any form. Even though it can fetch every kind of file all you get in an RSS reader is the title, a short description, some pictures or a video, and the link to the original website (Usually* because RSS cannot fetch the ads present on the site which hampers the monetization of those sites since no ads = no income.).
Workings
╻ ╻┏━╸┏┓ ┏━┓╻╺┳╸┏━╸
┃╻┃┣╸ ┣┻┓┗━┓┃ ┃ ┣╸
┗┻┛┗━╸┗━┛┗━┛╹ ╹ ┗━╸
╻
┏┛
╹
┏━┓┏━┓┏━┓ ┏━ ┏━╸┏━╸╺┳╸┏━╸╻ ╻┏━╸┏━┓ ╺┳┓┏━┓╺┳╸┏━┓ ━┓
┣┳┛┗━┓┗━┓ ┃ ┣╸ ┣╸ ┃ ┃ ┣━┫┣╸ ┗━┓ ┃┃┣━┫ ┃ ┣━┫ ┃
╹┗╸┗━┛┗━┛ ┗━ ╹ ┗━╸ ╹ ┗━╸╹ ╹┗━╸┗━┛ ╺┻┛╹ ╹ ╹ ╹ ╹ ━┛
╻
┏┛
╹
┏━┓╻ ╻┏┓ ┏━┓┏━╸┏━┓╻┏━┓╺┳╸╻┏━┓┏┓╻ ┏━ ╻ ╻┏┓╻╻┏ ┏━┓ ┏━┓┏━┓┏━┓ ╺┳╸┏━┓ ┏━┓┏━╸┏━┓╺┳┓┏━╸┏━┓ ━┓
┗━┓┃ ┃┣┻┓┗━┓┃ ┣┳┛┃┣━┛ ┃ ┃┃ ┃┃┗┫ ┃ ┃ ┃┃┗┫┣┻┓┗━┓ ┣┳┛┗━┓┗━┓ ┃ ┃ ┃ ┣┳┛┣╸ ┣━┫ ┃┃┣╸ ┣┳┛ ┃
┗━┛┗━┛┗━┛┗━┛┗━╸╹┗╸╹╹ ╹ ╹┗━┛╹ ╹ ┗━ ┗━╸╹╹ ╹╹ ╹┗━┛ ╹┗╸┗━┛┗━┛ ╹ ┗━┛ ╹┗╸┗━╸╹ ╹╺┻┛┗━╸╹┗╸ ━┛
╻
┏┛
╹
┏━┓┏━┓┏━┓ ┏━┓┏━╸┏━┓╺┳┓┏━╸┏━┓ ┏━ ┏━╸┏━┓╻ ╻ ┏━╸┏━╸╺┳╸┏━┓ ┏━┓╻ ╻┏┓ ┏━┓┏━╸┏━┓╻┏━┓╺┳╸╻┏━┓┏┓╻┏━┓ ━┓
┣┳┛┗━┓┗━┓ ┣┳┛┣╸ ┣━┫ ┃┃┣╸ ┣┳┛ ┃ ┃ ┃ ┃┃ ┃ ┣╸ ┃ ┃ ┗━┓ ┗━┓┃ ┃┣┻┓┗━┓┃ ┣┳┛┃┣━┛ ┃ ┃┃ ┃┃┗┫┗━┓ ┃
╹┗╸┗━┛┗━┛ ╹┗╸┗━╸╹ ╹╺┻┛┗━╸╹┗╸ ┗━ ┗━╸┗━┛┗━╸┗━╸┗━╸┗━╸ ╹ ┗━┛ ┗━┛┗━┛┗━┛┗━┛┗━╸╹┗╸╹╹ ╹ ╹┗━┛╹ ╹┗━┛ ━┛
╻
┏┛
╹
┏━╸┏━╸┏━╸╺┳┓ ┏━ ┏━┓┏━╸╺┳┓╻┏━┓┏━╸┏━╸╺┳╸┏━┓ ╺┳╸┏━┓ ╻ ╻┏━╸┏┓ ┏━┓╻╺┳╸┏━╸ ━┓
┣╸ ┣╸ ┣╸ ┃┃ ┃ ┣┳┛┣╸ ┃┃┃┣┳┛┣╸ ┃ ┃ ┗━┓ ┃ ┃ ┃ ┃╻┃┣╸ ┣┻┓┗━┓┃ ┃ ┣╸ ┃
╹ ┗━╸┗━╸╺┻┛ ┗━ ╹┗╸┗━╸╺┻┛╹╹┗╸┗━╸┗━╸ ╹ ┗━┛ ╹ ┗━┛ ┗┻┛┗━╸┗━┛┗━┛╹ ╹ ┗━╸ ━┛
╻
┏┛
╹
╻ ╻┏━╸┏┓ ┏━┓╻╺┳╸┏━╸ ┏━ ┏━╸┏━┓┏┳┓┏┳┓╻┏┓╻┏━╸ ╻ ╻┏━╸┏━┓┏━╸ ╻┏━┓ ┏━┓┏━┓╺┳╸╻┏━┓┏┓╻┏━┓╻ ━┓
┃╻┃┣╸ ┣┻┓┗━┓┃ ┃ ┣╸ ┃ ┃ ┃ ┃┃┃┃┃┃┃┃┃┗┫┃╺┓ ┣━┫┣╸ ┣┳┛┣╸ ┃┗━┓ ┃ ┃┣━┛ ┃ ┃┃ ┃┃┗┫┣━┫┃ ┃
┗┻┛┗━╸┗━┛┗━┛╹ ╹ ┗━╸ ┗━ ┗━╸┗━┛╹ ╹╹ ╹╹╹ ╹┗━┛ ╹ ╹┗━╸╹┗╸┗━╸ ╹┗━┛ ┗━┛╹ ╹ ╹┗━┛╹ ╹╹ ╹┗━╸ ━┛
Advantages
• You get the latest updates. Whether it is about the weather, new music, local news, or a new posting from a rarely-updated site, learn you get as soon as it is published.
• You can save a lot of time by reading a self curated feed instead of browsing all the websites one by one.
• Unlike emails, you can easily subscribe and unsubscribe whenever you want.
• You won't be spammed with useless information, unlike emails where you might get every kind of spam and non-informative emails after they get your email.
• The feed you get is organized in a chronological order, and you can keep track if it is already read or not.
• RSS doesn't have ads and trackers that you find on a website, which is good for your reading experience as well as your privacy.
Disadvantages
• Articles (Info) from the sites is received in a certain amount instead of the whole article, so you are very likely to go inside the webpage instead of just reading the RSS content.
• It is very difficult to accurately track the number of subscribers who read an RSS feed or the items contained in an RSS feed.
• RSS readers load up different websites at once and since most RSS contents doesn't contain full articles you also go to their website, increasing the data traffic.
• RSS contents will not be counted as views to the websites, so it could impact on the income of the creator.
RSS is a very old but useful tech. With it being one of the go-to methods of creating feeds, RSS has been implemented in various fields and can fetch different data from different sources. I am personally using RSS to keep track of what my friends are doing on Instagram and Twitter, as well as subscribing to websites as well as YouTube channels I like. These social media don't have RSS integrated with them, but frontends like Bibliogram(Instagram) and Nitter(Twitter) allow you to subscribe to the publicly available profiles with RSS. RSS is a must-have thing if you go to websites frequently to get information. | ESSENTIALAI-STEM |
Michele Columbu
Michele Columbu (8 February 1914 – 10 July 2012 ) was an Italian politician and writer from Ollolai, Sardinia.
For decades, between World War II and the 1970s he was the leader of the Sardinian Action Party (PSd'Az), a Sardinian nationalist party calling for detachment from Italy and fiercely contesting the presence of NATO military bases in Sardinia. He was elected into the European Parliament in 1984.
He wrote a collection of short stories, L'aurora è lontana (1968), and the essay collection Senza un perché. | WIKI |
NYSE-owner ICE's profit rises nearly 4%
Aug 1 (Reuters) - Intercontinental Exchange Inc, which owns the New York Stock Exchange, posted a 3.7% rise in quarterly profit on Thursday, helped by growth across both its transaction and clearing business and data services unit. Net income attributable to the company rose to $472 million, or 84 cents per share, in the second quarter ended June 30 from $455 million, or 78 cents per share, a year earlier. (reut.rs/2YCBUhd) Total revenue, excluding transaction-based expenses, rose 4% to $1.29 billion. (Reporting by Bharath Manjesh in Bengaluru; Editing by Anil D’Silva) | NEWS-MULTISOURCE |
Effect of surface sublayer on surface skin temperature and fluxes
Xubin Zeng, Robert E. Dickinson
Research output: Contribution to journalArticlepeer-review
59 Scopus citations
Abstract
The surface sublayer is the layer of air adjacent to the surface where the transfer of momentum and heat by molecular motion becomes important. Equations are derived to incorporate this surface sublayer (or the variable ratio of the roughness length for momentum over that for heat, Zo/Zoh) over bare soil into a commonly used formulation for aerodynamic transfer coefficients. Along with the consideration of the laminar layer around vegetation leaves in the Biosphere-Atmosphere transfer Scheme (BATS), these equations provide a consistent approach for the computation of surface fluxes over bare soil or vegetated surface. Qualitative and quantitative analysis show that the surface sublayer tends to substantially increase the surface skin temperature for a given sensible heat flux and decrease the heat flux for a given surface versus air temperature difference. Using a climate model output as the atmospheric forcing data for BATS over a semiarid region, it is also found that the surface sublayer significantly increases the monthly and July-averaged hourly surface skin temperature and decreases surface sensible heat and net radiation fluxes. Comparison with limited observations of Zo/Zoh also suggests that the same (or different) exchange coefficients should be used over bare soil and vegetated portions in a grid box for dense canopies (eg grassland or forest [or sparse canopies (eg semiarid regions)].
Original languageEnglish (US)
Pages (from-to)537-550
Number of pages14
JournalJournal of Climate
Volume11
Issue number4
DOIs
StatePublished - Apr 1998
ASJC Scopus subject areas
• Atmospheric Science
Fingerprint
Dive into the research topics of 'Effect of surface sublayer on surface skin temperature and fluxes'. Together they form a unique fingerprint.
Cite this | ESSENTIALAI-STEM |
Wikipedia:Reference desk/Archives/Miscellaneous/2014 July 6
= July 6 =
Clarification of laws and rulings for Trade Secret article
I posted this in the Talk:Trade_secret last year, but have had no response. Hopefully someone here can help.
* "I'm having trouble finding the legal precedents of possible repercussions of a person publishing a trade secret on behalf of another. This has been brought up in Scientology lawsuits and the AACS key. My understanding is that it is misappropriation of a trade secret, but the actual application of this to, say, internet publication seems undecided.
* "The California Supreme Court appears to have ruled that it is free speech to publish the secret, but that the publication can have an injunction applied. Does that mean the publisher cannot really be prosecuted or sued? What about the Coke formula revealed in the book Big Secrets, or was that relatively free of legal action only because it was published before USTA? Are there people who can shed more light on this area of US law? )SamuelRiv (talk) 06:06, 16 March 2013 (UTC)"
Bonus points for editing the wiki page if you can point to specific court cases. Super extra bonus points if you can find if this has been addressed in other countries or in international law. Thanks for the help. SamuelRiv (talk) 02:10, 6 July 2014 (UTC)
Vampires and the sun
According to vampire lore, if a vampire is outside in sunlight, they are killed by the sun. Is it just the sun in the solar system that does this, or would the light from another star kill a vampire? Clearly it doesn't when they are out at night on earth, but would it affect them if they were on another planet? Could a vampire go into space? And can reflected sunlight kill a vampire? Horatio Snickers (talk) 12:26, 6 July 2014 (UTC)
* There are probably authors who have addressed this question in their fictions, but since each such author will have invented an answer to suit the needs of the story, I don't see how this can possibly be answered from authoritative sources. --ColinFine (talk) 13:38, 6 July 2014 (UTC)
* Well, the moon does not kill a vampire and that is reflected sun. Also, a vampire has no reflection since it cannot see itself in a mirror, so I believe it cannot be harmed by reflected sunlight. This is just my theory, of course. Here is a good Wikipedia article on Vampire literature that goes into traits of vampires in fiction. Originally, in the Dracula novel, by Bram Stoker, the vampire could walk around in sunlight, but in a weakened state. All the best, Fylbecatulous talk 14:04, 6 July 2014 (UTC)
* Since vampires are fictional, each author is at liberty to come up with any set of attributes for them. These are frequently ill-thought-through, self-contradictory, etc. You can't reason about how they work for all of those reasons. Sunlight is just a bunch of photons with some set of energies and frequencies - whichever of those kill the vampire cannot be energies and frequencies that occur in artificial light or from fires or from creatures like fireflies. As has already been pointed out, frequencies reflected by the moon don't harm them either - which eliminates another huge slice of the electromagnetic spectrum. Some authors have claimed that the first rays of a rising sun suffice to save our heroine - so clearly frequencies that are strongly attenuated by our atmosphere are not to blame - and large quantities of solar energy are not required. However, on overcast days, the cloud cover is sufficient to shield the vampire - so these dangerous frequencies are clearly attenuated sufficiently by water vapor.
* Consider also what it takes for photons reflected or emitted by the vampire's body to be plainly visible by the human eye - yet be absorbed by all forms of reflecting devices (vampires cannot be seen in a mirror) and be of frequency/energy levels that won't kill other vampires who happen to be standing nearby.
* Taken together, this suggests that a highly specific frequency of light at almost any energy level is needed. So it's possible that some other solar systems would provide daytime refuge for them.
* However, many vampire biographers claim that the vampire must sleep in a coffin lined with soil from his native transylvania. When vampires attempt to colonize other star systems, they'll need to take vast quantities of this soil with them or else their population size will be severely limited in the future.
* Truly, it's pointless to ask serious questions about fictional entities here on the Wikipedia reference desk. SteveBaker (talk) 14:24, 6 July 2014 (UTC)
* Nit pick: Clouds are not water vapour, but water droplets. Water vapour is largely transparent to visible light (but not infrared). --Stephan Schulz (talk) 16:18, 6 July 2014 (UTC)
* This is the same type of question as the now-boxed "Time travel and Jaws". Should this one likewise be boxed up? ←Baseball Bugs What's up, Doc? carrots→ 17:31, 6 July 2014 (UTC)
* Yes, done. About time this go to ANI as well, should the OP revert. μηδείς (talk) 02:32, 7 July 2014 (UTC)
* I have removed the box as there appears to be no real consensus to box this post. I will not bow to your threat to report this. I should firstly state that this is clearly a very different question to "Time travel and Jaws", and has actually led to some interesting discussion about the nature of which light sources can inflict damage upon a vampire. By all means report this to ANI if this is what you believe is the best thing to do, but I cannot see what the problem is in using a reference desk to ask questions. Horatio Snickers (talk) 15:00, 7 July 2014 (UTC)
* Horatio, your question makes the assumption that vampires are the same in every work, as if they're real or something. It ends up being a matter of opinion, which is why this thread was rightfully closed. If you had asked "are there works of vampire fiction that address these issues..." that'd be different. But as the question is currently worded, I have to agree that it's inappropriate. Ian.thomson (talk) 15:08, 7 July 2014 (UTC)
* The OP asked about vampire lore not works of fiction. Lore is traditional knowledge about nature and their culture that people get from their parents and other older people, not from books. The term is found in Old English lar "learning, what is taught, knowledge, science, doctrine, art of teaching," from Proto-Germanic *laizo (Old Saxon lera, Old Frisian lare, Middle Dutch lere, Dutch leer, Old High German lera, German Lehre "teaching, precept, doctrine". Oral tradition is the transmissison of cultural material through vocal utterance, and was long held to be a key descriptor of folklore. As an academic discipline, it refers both to a set of objects of study and a method by which they are studied—the method may be called variously "oral traditional theory", "the theory of Oral-formulaic composition" and the "Parry-Lord theory" (after two of its founders).
* The question is about the extreme phototoxic vulnerability of the hematophageous Undead meta-person traditionally called a Vampire. The effect, as reported in fiction, exceeds Type III (aka hepatic photosensitivity) which is the most common type of photosensitivity reaction seen in animals. A link was proposed by biochemist David Dolphin between vampire folklore and the enzyme disorder Porphyria which is derived from the Greek πορφύρα, porphyra, meaning "purple pigment". The name refers to the purple discolouration of feces and urine when exposed to light in patients during an attack. Although original descriptions are attributed to Hippocrates, the disease was first explained biochemically by Felix Hoppe-Seyler in 1871 and acute porphyrias were described by the Dutch physician Barend Stokvis in 1889.
* A Swedish police enquiry seeks information on suspected vampire activity near Sankt Eriksplan in Stockholm. It may or may not be entirely non-coincidental that Stockholm and Transylvania are in similar time zones and within bat migration range. <IP_ADDRESS> (talk) 22:56, 7 July 2014 (UTC)
* Orally transmitted fiction doesn't cease to be fiction. -- Jayron 32 21:11, 8 July 2014 (UTC)
* Keep that thought in church. <IP_ADDRESS> (talk) 22:30, 10 July 2014 (UTC)
* A related question: Does the ignition effect require oxygen? If not, given that they don't breathe, perhaps vampires are well suited to work in space. —Tamfang (talk) 09:52, 9 July 2014 (UTC)
* Even if it doesn't require oxygen they may be useful in space as a form of monopropellant. K ati e R (talk) 15:38, 9 July 2014 (UTC)
US state capitals: size
We know that the capital of a U.S. state isn't always the largest city with its name. One city of this kind is Springfield, Illinois. It's only the third largest Springfield in the United States. The largest is Springfield, Missouri and the second is Springfield, Massachusetts.
Is there another capital city that's not the largest city in the United States with that name?? If so, name all the largest cities in the United States with that name up to the capital city. (For Springfield, this list would be Springfield, Missouri; Springfield, Massachusetts; Springfield, Illinois.) Georgia guy (talk) 13:51, 6 July 2014 (UTC)
* That information should easily be found in Wikipedia. Get to work. :) ←Baseball Bugs What's up, Doc? carrots→ 16:17, 6 July 2014 (UTC)
* Start with List_of_capitals_in_the_United_States, and click on their names, then find the disambiguation page that will list all places with that name. Many cities have an infobox that will give census data, but smaller townships and unincorporated areas often won't have population figures on their pages. SemanticMantis (talk) 16:43, 6 July 2014 (UTC)
* But dis-ambiguation pages don't compare populations of cities; they only list cities. Georgia guy (talk) 16:46, 6 July 2014 (UTC)
* Then click through to each city and see the population. Staecker (talk) 16:52, 6 July 2014 (UTC)
* Augusta, Georgia seems to be larger than Augusta, Maine, the capital. —Kusma (t·c) 17:25, 6 July 2014 (UTC)
* Let the OP (a Georgia guy, ironically) do his own homework. ←Baseball Bugs What's up, Doc? carrots→ 17:29, 6 July 2014 (UTC)
* Yes, Augusta, Georgia is more than 10 times as big as Augusta, Maine. I've gone through the dis-ambiguation page and it seems that other Augustas are even smaller. Georgia guy (talk) 17:42, 6 July 2014 (UTC)
* And Concord, California, is more populous than Concord, New Hampshire. Deor (talk) 19:01, 6 July 2014 (UTC)
* I am revising the heading of this section from New question to US state capitals: size, in harmony with WP:TPOC, point 12 (Section headings). Please see Microcontent: How to Write Headlines, Page Titles, and Subject Lines. The new heading facilitates recognition of the topic in links and watchlists and tables of contents.
* —Wavelength (talk) 19:06, 6 July 2014 (UTC)
* And I posted an "anchor" to avoid breaking links. And I say again, the OP needs to research this question himself rather than expecting others to do his homework for him. ←Baseball Bugs What's up, Doc? carrots→ 22:50, 6 July 2014 (UTC)
* I already posted an anchor, "formerly", one of those mentioned at WP:TPOC, section 12 (Section headings).
* —Wavelength (talk) 01:55, 7 July 2014 (UTC)
* Aha, something new, to me anyway. Works like an anchor except the former title is visible, right? ←Baseball Bugs What's up, Doc? carrots→ 02:44, 7 July 2014 (UTC)
* Yes, that is right.—Wavelength (talk) 01:10, 8 July 2014 (UTC)
* Charleston, South Carolina is larger than Charleston, West Virginia. However, Albany, New York is slightly larger than Albany, Georgia. (Just being thorough.) → Michael J Ⓣ Ⓒ Ⓜ 15:28, 9 July 2014 (UTC) | WIKI |
Cryptoplini
Cryptoplini is a tribe of weevils in the subfamily Curculioninae. It occurs mostly in Australia with one species in New Guinea.
Description
In adults of Cryptoplini, the pronotum and elytra are densely covered in scales, and the elytra are uniformly convex from base to apex. The rostrum is usually stout and relatively straight (long, thin and distinctly curved in Zeopus). The maxillary palps and labial palps are 3-segmented. The antennae have funicles 6- or 7-segmented and clubs 4- or 5-segmented, and the clubs are elongate. The procoxae are narrowly separate to contiguous (Zeopus). The femora have one or more unequal teeth. The tibiae have a large uncus and a smaller premucro inside a tuft of setae. The tarsi have the onychium (terminal segment that bears a claw) narrow or reduced to absent. The tarsal claws are simple and either connate, single or absent. The proventriculus (part of the digestive system) is undifferentiated, lacking plates and paired brushes. In males, the penis has the tectal plate fused with the pedon at the base. In females, the gonocoxites are without styli, and the spermathecal gland has a sclerotised funnel-shaped base.
Ecology
Cryptoplini are herbivores and mostly associated with plants in the family Myrtaceae.
Cryptoplus, Haplonyx, Sigastus and Zeopus mainly use Eucalyptus as hosts. Their larvae can develop in flower and fruit buds, or in galls (often galls already formed by other insects). Some Haplonyx species use Melaleuca, Leptospermum or Casuarina (Casuarinaceae) as hosts.
Menechirus use fruits of Syzygium and possibly also Rhodomyrtus macrocarpa.
Kuschelorhynchus macadamiae uses fruits of Macadamia (Proteaceae) and is a pest of macadamia plantations.
Genera
The genera of Cryptoplini are:
* Cryptoplus Erichson, 1842
* Haplonyx Schoenherr, 1836
* Kuschelorhynchus Jennings & Oberprieler, 2018
* Menechirus Hartmann, 1901
* Sigastus Pascoe, 1865
* Zeopus Pascoe, 1872 | WIKI |
User:Teammandog
Team Mandog is a group of highly educated and expierienced scientists dedicated to the research and breeding of the mandogs. | WIKI |
Brooklyn Tabernacle
Brooklyn Tabernacle is an evangelical non-denominational megachurch located at 17 Smith Street at the Fulton Mall in downtown Brooklyn, New York City, United States. The senior pastor is Jim Cymbala.
History
The Brooklyn Tabernacle was originally established in 1847 as the Central Presbyterian Church, using the facilities of the First Presbyterian Church, at the corner of Willoughby Street and Pearl.
In 1966, the church was renamed "Brooklyn Gospel Tabernacle" by the pastor Clair D. Hutchins.
By the time Pastor Jim and Carol Cymbala took over the church leadership in the autumn of 1971, the congregation had dwindled to only 40 people who met in a rundown building on Atlantic Avenue in Brooklyn.
In the 1980s, the Brooklyn Tabernacle purchased the former Carlton Theatre at 292 Flatbush Avenue at 7th Avenue, converting the 1383-seat theatre into a church. After many years of decline, the church was revitalized as a non-denominational congregation, and became well-known as the home of the Brooklyn Tabernacle Choir.
In 1984, the church took its current name "The Brooklyn Tabernacle".
The church remained in this location until 2002 when they moved into the former Loew's Metropolitan Theatre at 17 Smith Street. The sanctuary seats 3,300 people.
The Brooklyn Tabernacle Choir has received six Grammy Awards. It is directed by Carol Cymbala, the wife of the main Pastor, Jim Cymbala.
The Brooklyn Tabernacle Choir sang "The Battle Hymn of the Republic" at the 2013 second inauguration of Barack Obama.
The church has held three two-hour services weekly.
In 2017, the church had 10,000 members.
Building
The current building was completely redone by Kostow Greenwood Architects and Robert Silman Associates by gutting and renovating the old vaudeville theater for modern worship, and with state-of-the-art acoustics and recording equipment. Two adjacent buildings were converted into offices, classrooms, community service areas, and dining facilities. | WIKI |
Beatbox House
The Beatbox House is an American beatbox crew based in New York City originally consisting of six beatboxers. The Beatbox House has since its formation helped many beatboxers along their journey.
Formation
The Beatbox House began as a residence home in Brooklyn, New York for beatboxer Chris Celiz and Izzy Freedman who one day had an idea to create a place for beatboxers to connect and socialize. Beatboxers Mark Martin and Johnny Buffalo lived in the house and organized jam sessions and performances for beatboxers. Artists from worldwide locations would lodge in the house when traveling for shows. Eventually, beatboxers Neil Meadows of Pennsylvania, Kenny Urban of Connecticut, Amit Bhowmick, Kaila Mullady of New York City and Gene Shinozaki of Boston, met up along with Chris at the American Human Beatbox festival, joined the residency and decided to form an official group. They often do their performances busking in the subways and streets of New York City.
Neil Meadows (2011-)
Neil Meadows (known as NaPoM) is a beatboxer, whose titles include: Grand Beatbox Battle Vice Champion (2016), Grand Beatbox Battle Champion (2017), Vice World Champion (2015), two-time American Beatbox Champion (2014, 2015), American Tag-team Champion (2014), Midwest Champion (2014) and two-time Unity Champion. His beatbox style involves his signature percussive sounds and extensive liproll techniques. He started beatboxing after high school, won the 2014 American beatbox championships at age 18 and was given the opportunity to compete at the Beatbox Battle World Championship where he earned his title as the Vice World Beatbox Champion (2015). He is also known for his work with fellow Beatbox House member Kenny Urban as "K-POM". In 2018, he released a beatbox album "Lips" with Swissbeatbox. Napom is well-known for revolutionizing the use of different liproll techniques such as the inward liproll and sub-liproll bass.
Amit Bhowmick (2011-)
Amit Bhowmick is a hip hop artist based in America who started beatboxing at the age of 14. Amit is originally from Bangladesh. His beatbox sound involves his extensive usage of technical beats and deep bass sounds. His title credits include Midwest Champion (2012) and East Coast Champion (2014). In 2018, he won Smash Sounds, the first ever hybrid Beatbox Battle & Super Smash Bros tournament. He is also known for his signature and original sound, the "OD Bass".
Gene Shinozaki (2011-)
Gene Shinozaki is a beatbox musician from Boston, MA. He began his music career attending Berklee College of Music, studying drumming as a major, before dropping out to pursue a career in beatboxing. His beatbox style involves his imitation of guitar power chords using lip oscillation techniques, his melodic sounds, and clicks. He often incorporates singer songwriter elements into his performances. He cites Bobby McFerrin as a primary influence to his sound. He is a Grand Beatbox Battle Champion (2015), and with fellow Beatbox House member, Chris Celiz, won the titles of World Beatbox Tag-team Champion (2018), American Tag-team Champion (2015) and Grand Beatbox Battle Tag-team Champion (2018) as "Spiderhorse".
Chris Celiz (2011-)
Chris Celiz, the founding member of the Beatbox House, is a beatboxer, musician and teacher. He is the American Tag-team Champion (2015) together with Gene Shinozaki as the group "Spiderhorse". He is most known for his signature percussive grooves and harmonic sounds. He has done work for artists such as Harry Belafonte, Bryonn Bain, and Dana Leong. He is one of the top North American beatboxers, and with fellow Beatbox House member, Gene Shinozaki, won the titles of World Beatbox Tag-team Champion (2018) and Grand Beatbox Battle Tag-team Champion (2018) as "Spiderhorse".
Kenny Urban (2011-)
Kenny Urban is an American beatboxer and singer, whose title credits include Grand Beatbox Champion (2016), Vice American Beatbox Champion (2015), American Tag-team Champion (2014) and two-time Unity Beatbox Champion. His beatbox style involves bass emphasized beats, synth sounds and extensive singing. He is a private beatbox instructor and has also taught workshops in various schools such as Harvard University and The Raymond York Elementary School. Kenny is also a part of the beatbox tag-team "K-POM" together with NaPom.
Mark Martin (201?-2018)
Mark Martin (formerly Mandibul) is an American beatboxer, singer and teacher from Connecticut. Mark has won titles such as American Beatbox Champion (2016) and Human Beatbox Festival BeatRhyme Champion (2016). Mark is also currently a part of the tag team "Lightship" (formerly Power Couple) consisting of him and Kaila Mullady. Mark Martin left the beatbox house in 2018 together with his fellow tag-team member and girlfriend Kaila Mullady.
Kaila Mullady (2011-2018)
Kaila Mullady is an american beatboxer, beatrhyming champion, singer and rapper. Kaila holds the titles of Beatbox World Champion (2015, 2018) in the solo female category, three-time American Loopstation Champion, three-time reigning Beatrhyming Champion and Vice American Champion (2014). Kaila is an active beatboxer and has been a part of many different productions which includes but are not limited to the Broadway musical Freestyle Love Supreme (2019-2020). She is also a part of the tag team "Power Couple" and the beatbox duo "Light Ship," together with her boyfriend Mark Martin. Together with Mark she is also a teacher and the head director of the speech therapy project BEAT Global's Beatrocker program. Kaila also collaborates and performs together with her mentor Kid Lucky under the group name "The Adventures of Kaila and the Kid". Kaila is the producer of the American Beatbox Championships since 2016. Kaila left the Beatbox House together with her boyfriend and fellow tag-team member Mark Martin in 2018. | WIKI |
User:Dsinger1/Child sexuality
Contemporary issues
=== In the latter part of the 20th century, sexual liberation probably arose in the context of a massive cultural explosion in the United States of America following the upheaval of the Second World War, and the vast quantity of audiovisual media distributed worldwide by the new electronic and information technology. Children are apt to gain access and be influenced by material, despite censorship and content-control software. ===
Sex education
=== The extent of sex education in public schools varies widely around the world, and within countries such as the United States where course content is determined by individual school districts. A series of sex education videos from Norway, intended for 8–12 year olds, includes explicit information and images of reproduction, anatomy, and the changes that are normal with the approach of puberty. Rather than diagrams or photos, the videos are shot in a locker room with live nude people of all ages. The presenter, a physician, is relaxed about close examination and touching of relevant body parts, including genitals. While the videos note that the age of consent in Norway is 16, abstinence is not emphasized. As of 2015, however, 37 U.S. states required that sex education curricula include lessons on abstinence and 25 required that a "just say no" approach be stressed. Studies show that early and complete sex education does not increase the likelihood of becoming sexually active, but leads to better health outcomes overall. ===
Social Media's Role on Child Sexuality:
The impact of social media on adolescent sexuality is a multifaceted concern requiring ongoing research for a comprehensive understanding. Research suggests that exposure to sexual content on social media can influence adolescents' sexual attitudes, beliefs, and behaviors, given their vulnerable state during this developmental period when gender roles, sexual attitudes, and behaviors are actively being shaped. Studies have identified a positive association between high-frequency social media use and increased sexual risk behaviors among adolescents.
Exposure to sexual displays on social media sites has been linked to problematic beliefs and behaviors among both content creators and viewers, particularly affecting adolescents who are more susceptible to these effects and may encourage risky sexual behavior, associated with an increase in sexually transmitted infection rates and unintended pregnancies . Social media can have both positive and negative effects on the sexual orientation of children and adolescents. For instance, it may provide a safe space for sexual identity exploration and expression for LGBTQ+ youth, fostering connectivity, social support, and positive impacts on well-being . While early adopters of the LGBTQ+ identity within the youth use social media to understand their sexuality and connect with like-minded individuals, contributing to improved emotional support and development, it's important to note that social media can also expose children to inaccurate and potentially harmful information about sexuality, perpetuate risky sexual behaviors, and provide anonymity to potential dangers , further covered in the proceeding sections.
Sexualization of children
Over recent decades, children have been subject to a premature sexualization, as indicated by a level of sexual knowledge or sexual behavior inappropriate for their age group. The causes of this premature sexualization that have been cited include portrayals in the media of sex and related issues, especially in media aimed at children; the marketing of products with sexual connotations to children, including clothing; the lack of parental oversight and discipline; access to adult culture via the internet; and the lack of comprehensive school sex education programs. For girls and young women in particular, studies have found that sexualization has a negative impact on their "self-image and healthy development".
Social media has been associated with an increase in child sexual exploitation and abuse. Reports indicate that social media platforms have become a pipeline for the rapid spread of child sexual abuse material (CSAM), leading to an alarming increase in the dissemination of such content Further, child predators use social media to identify and groom potential victims, and the closed or private social media groups enable them to connect with like-minded peers and trade tips on how to secretly record and share CSAM. | WIKI |
Trigger Point Injections
What are trigger point injections?
In skeletal muscle, some focal points are used for treating the pain and inflammation; these points are termed as Trigger point. The considerable focal areas in the skeletal system are back muscles of trapezius and rhomboid which are located in the superior part of the spine and shoulder regions.
trigger point injections chart
Other trigger points are located at the lower portion of the spine and in the limbs. These specific muscles are used due to the knots formed in this site are never relaxed. These knots are even sometimes felt beneath the cutaneous tissue by touching.
For managing uncontrollable spasm or pain, trigger point injection (TPI) is administered into the trigger points. The Usual medications administered through trigger point injections are anesthetics like lidocaine, bupivicaine, or combination of these, steroidal drugs like corticosteroids alone or in a combination with lidocaine.
Even sometimes without adding any medication, alone needle is injected into the trigger point for deactivating the triggering point which helps to relieve the pain symptoms. This technique is known as ‘dry needling’.
What happens during a trigger point injections?
During a triggering point injection, clinician injects a small needle into the trigger point of the skeletal system of the patient. The included medicaments may be local anesthetics, steroidal drugs (corticosteroids) or saline solution. This process inactivate the trigger point and pain is become lessen. Usually continuation of a short duration of the treatment beneficial for sustained pain management.
trigger point injections procedure
The procedure is not a complex, it need only few minutes in a clinic. Some times more than one injecting sites are involved in treatment process. If pain medication causes hypersensitivity to the patient, then ‘dry needle technique can be used.
Pathogenesis
The pathogenesis of the pain management by using trigger point injection is not yet having any scientific background. Many medical scientists believe that sharp strain or continual micro trauma may cause development of a trigger point.
The possible reasons of the tendency of the development of the micro trauma are poor posture maintained for prolonged periods, insufficiency of vitamin intake, and faulty posture during sleep or joint disorder. Occupational over stress or prolonged activity generates chronic stress in the muscle fibers which leads to trigger points.
Sudden strain during sports activity, surgical trauma or any repetitive stress may also affect skeletal muscle and causes development of the trigger points.
Symptoms of generating Trigger point
Usually at the trigger point, a certain nodule is manifested in the affected muscle. The site has become tender; pressing of the affected muscular region generates pain. The pain is not only restricted on the trigger zone, but it also spread to the surrounding tissues which is termed as referred pain.
The equipments required for trigger point injections
The following basics equipments are required
• Various sized needles and syringes.
• Alcohol or Betadin solution
• Sterilized gauze pieces
• Sterile and unsterile hand gloves
• Xylocaine (lidocaine)
• Bandages
• Vapocoolant spray
The procedure of performing trigger point injection
The of trigger point injection is conduction usually in the heath care professional’s clinic. The positioning of the patient is either as lying down position on the stomach on the examination table, or in sitting posture on the examination table.
The health care professional locates the trigger point by manual palpation method and marking the site. Then marked the area and after that sterilized with alcohol and then again uses the betadin solution for complete removal of germs.
Numbing spray like Vapocoolant spray is frequently administered for anaesthetized the location and to reduce the discomfort of the patient. Then an injection is administered at the trigger point and pushing the medicaments and then bring out the syringe. Application of the adhesive bandage is applied on the injected site. After injection, if any patient complains about pain, then ice compression or other analgesic medicines are prescribed for a short duration.
When trigger point injection is prescribed?
If patient is having pain at the triggering points and gradually spread to the surrounding area, then for reduction of the referred pain which is radiated from the trigger point pain, then trigger point injection is prescribed. This treatment is also applicable for fibromyalgia, myofascial pain syndrome tension headaches, neck pain and low back pain, though the recurrence of chronic pain at the trigger point is common.
How frequently do trigger point injections need to be administered?
One trigger point injection can able to resolve the pain. This is possible when the reason of micro trauma generation can be restricted. In case of fibromyalgia or myofascial pain syndrome, the recurrence of trigger point is common due to the underlying cause is not eradicate completely. In these conditions, trigger point injection need to repetitive conduction. Depending upon the medication like in case of anaesthetic medication monthly administration is required, whereas in case of steroidal drugs administration, required delayed therapy , as they associated with different side effects.
Side Effects & Complications
The included complication after trigger point injection is pain at the injection location, though this pain managed by its own way and eliminated after a few days. This pain is more frequent in case of ‘dry needle’ method.
If trigger point injection contains steroidal drugs, then prolonged therapy causes cutaneous or muscular tissue shrinkage with producing dent at the site of the injection. These side effects do not occur in anaesthetic medications. Other possible complications are skin puncture leads to bleeding and infection development.
Contraindications
For local or systemic infection, trigger point injection should not be applicable. The patient has any coagulation disorder or treating under anti-coagulant therapy for them the trigger point injection should be avoided.
In case of pregnancy and the diabetic patient, the trigger point injection use is restricted. In diabetes delayed wound healing is one of the causes of avoidance of trigger point injection.
Patient with hypersensitivity to anaesthetic drugs or having excessive fright of the needles causes contraindication of trigger point injection.
References
1. http://www.medicinenet.com/trigger_point_injection/article.htm
2. http://www.webmd.com/pain-management/guide/trigger-point-injection
3. http://emedicine.medscape.com/article/1997731-overview
4. http://www.aafp.org/afp/2002/0215/p653.html
5. http://www.achenet.org/resources/the_basics_of_trigger_point_injections_for_headache_and_migraine/
Leave a Reply
Your email address will not be published. | ESSENTIALAI-STEM |
Firmata firmware for Arduino
Firmata is a protocol for communicating with microcontrollers from software on a host computer
Firmata
Gitter
Firmata is a protocol for communicating with microcontrollers from software on a host computer. The protocol can be implemented in firmware on any microcontroller architecture as well as software on any host computer software package. The Arduino repository described here is a Firmata library for Arduino and Arduino-compatible devices. If you would like to contribute to Firmata, please see the Contributing section below.
Contents
Usage
There are two main models of usage of Firmata. In one model, the author of the Arduino sketch uses the various methods provided by the Firmata library to selectively send and receive data between the Arduino device and the software running on the host computer. For example, a user can send analog data to the host using Firmata.sendAnalog(analogPin, analogRead(analogPin)) or send data packed in a string using Firmata.sendString(stringToSend). See File -> Examples -> Firmata -> AnalogFirmata & EchoString respectively for examples.
The second and more common model is to load a general purpose sketch called StandardFirmata (or one of the variants such as StandardFirmataPlus or StandardFirmataEthernet depending on your needs) on the Arduino board and then use the host computer exclusively to interact with the Arduino board. StandardFirmata is located in the Arduino IDE in File -> Examples -> Firmata.
Firmata Client Libraries
Most of the time you will be interacting with Arduino with a client library on the host computers. Several Firmata client libraries have been implemented in a variety of popular programming languages:
Note: The above libraries may support various versions of the Firmata protocol and therefore may not support all features of the latest Firmata spec nor all Arduino and Arduino-compatible boards. Refer to the respective projects for details.
Updating Firmata in the Arduino IDE - Arduino 1.6.4 and higher
If you want to update to the latest stable version:
1. Open the Arduino IDE and navigate to: Sketch > Include Library > Manage Libraries
2. Filter by "Firmata" and click on the "Firmata by Firmata Developers" item in the list of results.
3. Click the Select version dropdown and select the most recent version (note you can also install previous versions)
4. Click Install.
Cloning Firmata
If you are contributing to Firmata or otherwise need a version newer than the latest tagged release, you can clone Firmata directly to your Arduino/libraries/ directory (where 3rd party libraries are installed). This only works for Arduino 1.6.4 and higher, for older versions you need to clone into the Arduino application directory (see section below titled "Using the Source code rather than release archive"). Be sure to change the name to Firmata as follows:
$ git clone git@github.com:firmata/arduino.git ~/Documents/Arduino/libraries/Firmata
Update path above if you're using Windows or Linux or changed the default Arduino directory on OS X
Updating Firmata in the Arduino IDE - older versions (<= 1.6.3 or 1.0.x)
Download the latest release (for Arduino 1.0.x or Arduino 1.5.6 or higher) and replace the existing Firmata folder in your Arduino application. See the instructions below for your platform.
Note that Arduino 1.5.0 - 1.5.5 are not supported. Please use Arduino 1.5.6 or higher (or Arduino 1.0.5 or 1.0.6).
Mac OSX:
The Firmata library is contained within the Arduino package.
1. Navigate to the Arduino application
2. Right click on the application icon and select Show Package Contents
3. Navigate to: /Contents/Resources/Java/libraries/ and replace the existing Firmata folder with latest Firmata release (note there is a different download for Arduino 1.0.x vs 1.6.x)
4. Restart the Arduino application and the latest version of Firmata will be available.
If you are using the Java 7 version of Arduino 1.5.7 or higher, the file path will differ slightly: Contents/Java/libraries/Firmata (no Resources directory).
Windows:
1. Navigate to c:/Program\ Files/arduino-1.x/libraries/ and replace the existing Firmata folder with the latest Firmata release (note there is a different download for Arduino 1.0.x vs 1.6.x).
2. Restart the Arduino application and the latest version of Firmata will be available.
Update the path and Arduino version as necessary
Linux:
1. Navigate to ~/arduino-1.x/libraries/ and replace the existing Firmata folder with the latest Firmata release (note there is a different download for Arduino 1.0.x vs 1.6.x).
2. Restart the Arduino application and the latest version of Firmata will be available.
Update the path and Arduino version as necessary
Using the Source code rather than release archive (only for versions older than Arduino 1.6.3)
It is recommended you update to Arduino 1.6.4 or higher if possible, that way you can clone directly into the external Arduino/libraries/ directory which persists between Arduino application updates. Otherwise you will need to move your clone each time you update to a newer version of the Arduino IDE.
If you're stuck with an older version of the IDE, then follow these keep reading otherwise jump up to the "Cloning Firmata section above".
Clone this repo directly into the core Arduino application libraries directory. If you are using Arduino 1.5.x or <= 1.6.3, the repo directory structure will not match the Arduino library format, however it should still compile as long as you are using Arduino 1.5.7 or higher.
You will first need to remove the existing Firmata library, then clone firmata/arduino into an empty Firmata directory:
$ rm -r /Applications/Arduino.app/Contents/Resources/Java/libraries/Firmata
$ git clone git@github.com:firmata/arduino.git /Applications/Arduino.app/Contents/Resources/Java/libraries/Firmata
Update paths if you're using Windows or Linux
To generate properly formatted versions of Firmata (for Arduino 1.0.x and Arduino 1.6.x), run the release.sh script.
Contributing
If you discover a bug or would like to propose a new feature, please open a new issue. Due to the limited memory of standard Arduino boards we cannot add every requested feature to StandardFirmata. Requests to add new features to StandardFirmata will be evaluated by the Firmata developers. However it is still possible to add new features to other Firmata implementations (Firmata is a protocol whereas StandardFirmata is just one of many possible implementations).
To contribute, fork this repository and create a new topic branch for the bug, feature or other existing issue you are addressing. Submit the pull request against the master branch.
If you would like to contribute but don't have a specific bugfix or new feature to contribute, you can take on an existing issue, see issues labeled "pull-request-encouraged". Add a comment to the issue to express your intent to begin work and/or to get any additional information about the issue.
You must thoroughly test your contributed code. In your pull request, describe tests performed to ensure that no existing code is broken and that any changes maintain backwards compatibility with the existing api. Test on multiple Arduino board variants if possible. We hope to enable some form of automated (or at least semi-automated) testing in the future, but for now any tests will need to be executed manually by the contributor and reviewers.
Use Artistic Style (astyle) to format your code. Set the following rules for the astyle formatter:
style = ""
indent-spaces = 2
indent-classes = true
indent-switches = true
indent-cases = true
indent-col1-comments = true
pad-oper = true
pad-header = true
keep-one-line-statements = true
If you happen to use Sublime Text, this astyle plugin is helpful. Set the above rules in the user settings file. | ESSENTIALAI-STEM |
HD 222095
HD 222095 is a single star in the southern constellation of Phoenix, near the western constellation border with Grus. It has a white hue and is visible to the naked eye with an apparent visual magnitude of 4.74. The star is located at a distance of is approximately 200 light years based on parallax, and it is drifting further away with a radial velocity of +3.4 km/s.
This object is an A-type main-sequence star with a stellar classification of A1/2V. It has a high rate of spin with a projected rotational velocity of 141 to 165 km/s, giving it an equatorial bulge that is 4% larger than the polar radius. The star is 482 million years old with 2.55 times the mass of the Sun and around 2.2 times the Sun's radius. It is radiating 41 times the luminosity of the Sun from its photosphere at an effective temperature of 9,230 K. The chemical abundance of the star's outer atmosphere is similar to that in the Sun. | WIKI |
How to stop snacking at night. Hutton Health
How to stop snacking at night
7th December 2022
(This post may contain referral links. Please read my disclaimer for more info.) As an Amazon Associate I earn from qualifying purchases.
It is easy to be committed to a healthy and balanced diet during the day, but then to mindlessly succumb to cravings in the evening. Regularly snacking at night can make it difficult to reach your weight loss, health and fitness goals.
Reasons you may be snacking at night
• You are not eating enough food during the day. It is easy to stick to a healthy eating plan and also not to notice hunger signals when you are busy during the day. If you are not eating enough food during the day, it can leave you feeling hungry and craving snacks in the evening.
• Alone with your thoughts and feelings. Evenings can mean quiet time on your own with your thoughts and feelings. Food can offer a welcome reprieve and distraction from these thoughts and feelings and a way to unwind after a stressful day. Allowing yourself to deal with your emotions in alternative ways and finding healthier coping mechanisms will help reduce your eating in the evenings.
• A bedtime ‘treat’. An overly stressful schedule or a lack of free time during the day can mean that the evening is the chance for you to have ‘you time’. We often view sugary foods as a way to ‘treat’ ourselves, disregarding the negative effect that the cumulative night-time snacking can have on our health.
Reasons why you may be snacking at night
• Boredom. If you are feeling bored in the evening, food can serve as a form of entertainment and a source of joy.
• Habit. If you are used to having food in the evening, you may start reaching for a snack out of habit rather than out of hunger. Perhaps you attach evenings as your chance to snuggle under a blanket on the sofa with a snack, or if you watch a show at a specific time in the evening with snacks in hand, you may attach the time, location or show with snacking.
• Private space. If certain foods leave you feeling guilty or ashamed, the peaceful space that an evening at home offers can allow you the freedom to indulge without feeling like others will judge you.
• Mindless eating. When you have busy days, evenings allow you the chance to switch off, zoning out to your favourite TV shows. Switching your mind off can also mean that you are enabling yourself to eat mindlessly, oblivious to the amount that you are consuming and unaware of your body’s signals that it is full.
Why is snacking at night a problem?
Snacking at night often gets slated as a way to sabotage weight loss goals or fitness gains. Snacking at night is not always bad, however it is a time when many people snack even though they are not truly hungry.
Factors such as eating out of boredom, being overly tired or stressed, socialising, or as a habit can make snacking at night an issue.
Why is snacking at night a problem?
Often the foods that we reach for when we snack at night are full of empty calories and sugar which can make snacking at night a problem. When you snack in front of the television, or while you are scrolling social media or other distractions, portion control becomes more difficult as you aren’t concentrating or aware of the amount of food that you are consuming.
Night-time snacking can lead to disrupted sleep and digestive problems. Eating in the evening does not give your body the chance to digest food effectively before lying horizontally for an extended time which doesn’t allow for your body to break down and digest foods efficiently.
If you continue to snack at night, over time your increased calorie consumption will likely lead to unwanted weight gain and difficulty reaching your health and fitness goals.
Tips to stop night-time snacking
• Make sure you are giving yourself ‘you time’ during the day so you don’t feel like evenings are your only time to switch off
• Replace your evening snack with something different: a piece of fruit or a warm drink (Caffeine free tea, spiced apple and hot chocolate can be great sources of comfort in the evening)
• Make evening plans to keep you entertained and occupied. Consider taking a class or start a new hobby
• Try to create a different evening routine to change your habit. Try an after-dinner walk, reading a book, phoning a friend, doing an online yoga class, writing in a journal, doing a jigsaw puzzle – anything that can occupy the time when you normally reach for your evening snack
• Control your environment to limit the unhealthy snacks that are easily accessible and in view. Providing barriers or ‘work’ that you need to do to reach the snacks can deter you from reaching for them.
• Eat regularly during the day to ensure that you aren’t too hungry in the evening
Tips to stop snacking at night
When is it okay to snack at night
Snacking at night isn’t always a problem. Evening snacking can be a part of a healthy lifestyle, particularly when:
• Your evening snacking is occasional
• You choose nutritious options
• You are eating as part of a balanced diet in response to hunger signals rather than out of habit
• Your evening snacking does not result in you exceeding the calories that you need in a day
• You eat mindfully and stop snacking when you are satisfied
When is it okay to snack at night?
Evening snacking can become a problem when it leads to unhealthy habits such as emotional or mindless eating. Understanding why you are snacking in the evening can help you develop different eating routines and healthier habits.
You may also be interested in: | ESSENTIALAI-STEM |
For questions call: +1 (917) 972-7460
Muscle Injury Studied With PEMF Pulsed ElectroMagnetic Fields Therapy
Pulsed Electromagnetic Field (PEMF) therapy is a non-invasive treatment that has been suggested as a potential therapy for muscle injury due to its ability to promote tissue repair and regeneration. Muscle injury is a common condition that can occur due to a variety of reasons such as overuse, trauma, or surgery. While there are various treatments available to manage symptoms and improve healing, PEMF therapy is a promising option due to its ability to improve blood flow, reduce inflammation, and accelerate tissue repair.
One of the key mechanisms behind PEMF therapy is its ability to improve blood flow. Improved blood flow can help deliver nutrients and oxygen to damaged muscle tissue, which can accelerate healing and tissue repair. Additionally, PEMF therapy has been shown to reduce inflammation, which can help alleviate pain and other symptoms associated with muscle injury.
In addition to its effects on blood flow and inflammation, PEMF therapy may also help promote tissue regeneration. PEMF therapy has been shown to stimulate the growth and repair of muscle tissue, which can be beneficial for individuals with muscle injury. By promoting tissue regeneration, PEMF therapy may help speed up the healing process and improve overall outcomes.
Finally, PEMF therapy may also help improve muscle function and range of motion. Muscle injury can lead to stiffness and reduced range of motion, which can negatively impact daily activities and quality of life. PEMF therapy has been shown to improve muscle function and range of motion in individuals with muscle injury, which can help restore mobility and improve quality of life.
Studies:
1. Cheng, N., Van Hoof, H., Bockx, E., Hoogmartens, M. J., Mulier, J. C., & De Dijcker, F. J. (2002). The effects of electric currents on ATP generation, protein synthesis, and membrane transport in rat skin. Clinical Orthopaedics and Related Research, 403S, S246-S256.
2. Sutbeyaz, S. T., Sezer, N., & Koseoglu, B. F. (2016). Low-frequency pulsed electromagnetic field therapy in fibromyalgia: a randomized, double-blind, sham-controlled clinical study. Clinical Journal of Pain, 32(7), 592-598.
3. Binder, A., Parr, G., Hazleman, B., & Fitton-Jackson, S. (1984). Pulsed electromagnetic field therapy of persistent rotator cuff tendinitis. Lancet, 1(8379), 695-698.
4. Tsurkan, M. V., Tokar, L. M., Voronov, V. V., Pekhnyo, V. I., & Kalchenko, V. I. (2014). Efficiency of magnetic-laser therapy for soft tissue injuries. Bulletin of Experimental Biology and Medicine, 156(2), 250-253.
5. Kwan, R. L. C., Wong, T. L., Chao, Y. K., & Fung, K. P. (2004). Pulsed electromagnetic fields promotes collagen production in bone marrow osteoprogenitor cells through an ERK1/2 MAPK signaling pathway. Bioelectromagnetics, 25(3), 218-224. | ESSENTIALAI-STEM |
Robotics ETFs Head to Head (Revised)
The impressive prospects of the robotics industry led major fund houses to launch products that provide significant exposure to this sector. Technological advancement and an urge to run businesses in a more efficient manner have played a major role in boosting the demand for robotics. This in turn had a positive impact on securities from the domain as investors are looking to take advantage of the sector's solid potential.
For an instance, a Bank of America Merrill Lynch report shows that the robotics industry may expand at a robust rate from being worth $10.7 billion in 2014 to $83 billion by 2020. Meanwhile, reducing cost coupled with rapid advancement of technology is likely to reduce prices of robots significantly. This may further boost demand in the industry. According to CEO of Robo Global, Travis Briggs, prices, which dropped nearly 25% from 2010 through 2015, may fall a further 20% in the next five years.
This may be the primary reason why issuers are busy launching robotics focused ETFs. After Robo Global's launch of Robo Global Robotics&Automation ETFROBO in 2013, Global X launched Robotics & Artificial Intelligence Thematic ETFBOTZ with an objective to gain from the emerging robotics industry.
These funds give exposure to stocks that operate within the robotic domain. Let's take a look at these two products and find out the difference between each (see all Technology ETFshere ).
Inside ROBO
The fund looks to track the Robo Global Robotics and Automation Index. Holding about 85 stocks in its portfolio, the fund maintains a diversified portfolio with only 2.15% of its assets invested in the top company. Having debuted in 2013, the fund has amassed about $99.6 million in assets so far.
The fund is inclined toward heavy machinery (25%) and electronic components (23%). In terms of country exposure, the fund mostly invests in companies from the U.S. (43%) and Japan (23%). The fund is multi-cap in nature, with a tilt toward smaller capitalization. It has an expense ratio of 0.80% (read: Bubbles Bursting For Technology ETFs? ).
Inside BOTZ
The 28-stock fund looks to follow companies that are into the increased application of robotics and artificial intelligence (AI). SMC Corp (8.29%), ABB Ltd-Reg (8.12%) and Keyence Corp (7.69%) are the top three holdings of the fund. Industrial Machinery takes up the first spot with about 30% exposure followed by Electronic Equipment & Instruments (11.6%) and Health Care Equipment (11.24%).
Geographically, Japan takes the top spot with about 46% weight while the U.S. (20.36%) and Switzerland (10.48%) also get a double-digit allocation. Though the fund invests in companies irrespective of their market capitalization, it has a slight tilt toward companies with larger capitalization. It charges 68 bps in fees (read: 3 Thematic ETFs from Global X Hit the Market ).
Bottom Line
As a seasoned player in the robotics domain, ROBO has the experience while BOTZ may attract investors' attention as a comparatively cheaper option. BOTZ's expense ratio of 0.68% is much lower than that of ROBO. Though both the ETFs have significant exposure to a number of nations, domestic exposure is higher in ROBO compared to BOTZ.
Separately, ROBO bears less company-concentration risks than BOTZ. Though there are a number of technology ETFs available in the market, the Robotics segment is relatively unexplored. Thus both ROBO and BOTZ are poised to offer investors scope for growth.
Want more information on the world of ETFs?
Make sure to check out the podcast below where we discuss the investing landscape with Kevin O'Leary and Connor O'Brien of O'Shares Investments:
(We are reissuing this article to correct a mistake. The original article, issued on Sep 21, 2016, should no longer be relied upon.)
Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report
ROBO GR&AI (ROBO): ETF Research Reports
GLBL-X ROB&ART (BOTZ): ETF Research Reports
To read this article on Zacks.com click here.
Zacks Investment Research
Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
c++ – How to build a program that uses a third-party library
Question:
There is a program that consists of one .cpp file. It uses the libcurl library. You need to compile this case for embedded Linux on a Cortex A7 (arm 32-bit) processor.
As I understand it, you need to configure and then build the library for the desired architecture, and then build the program itself using a cross-platform compiler.
The problem is that I have no idea how to tell the compiler to #include understand that the library is somewhere near here.
Answer:
how to indicate there so that #include understands that the library is somewhere nearby here
In fact, we are talking about the header file of the library (* .h)
-I. (includes are searched in the same folder as the compiled file)
so that the linker knows where the compiled library is located
the -L. (in the same folder)
so that when loading the library is searched in the same folder with the executable file
flags -Wl, -R,\$$ORIGIN
It's probably not enough to solve your specific problem, but these are the three standard methods to build and run something in one folder. Might be of some help.
Scroll to Top | ESSENTIALAI-STEM |
Talk:Als het om de liefde gaat
Repetition of information
Concerning the ESC song stubs in general, the main body of the article tends, inevitably, to be a repetition of information that is already in the info-box. The "meat in the sandwich", capable of later expansion, is what appears between the first and last paragraphs. I do think, however, that such formulaic final paragraphs as
* It was succeeded as Dutch representative at the 1973 Contest by Ben Cramer with "De Oude Muzikant".
(which I have edited out here) constitute a repetition too far. The information is in the info-box, so is not lost, but is not strictly relevant to an article about the song in itself. Use of the word "representative" is problematic too, in my view, since the Dutch/French/Icelandic etc. representative is the singer not the song: the latter is the Dutch/French/Icelandic etc. entry. Finally, I think it improves the article to give the pride of final place to the information about the result on the night. --Picapica (talk) 08:27, 4 October 2008 (UTC) | WIKI |
Boston College–UMass football rivalry
The Boston College–UMass football rivalry is a college football rivalry between the Eagles of Boston College and Minutemen of the University of Massachusetts Amherst.
The rivalry was most active during the 1960s and 1970s, when the teams met on an annual basis. Because of changes to the NCAA's division structure, the teams did not meet for 30 years, but UMass' promotion to the top-tier NCAA Division I Football Bowl Subdivision enabled them to resume the rivalry, with a three-game series starting in 2014. The latest series has been dubbed The Battle of the Bay State. As of 2021, Boston College has won the past 11 meetings, including all of the 21st century matchups.
Early history
The first game played between the two schools took place in Amherst, on November 28, 1901, with Massachusetts winning, 11–0. BC and Massachusetts met again 1902 and 1912, with Massachusetts winning all three contests before the series was halted. The two schools did not meet again on the football field until 1966, when BC and UMass—which by then had adopted its present name—began a 17-year series in which the teams would play each other in the last week of UMass' football season. Though both programs were in NCAA Division I, the highest level of competition at the time, they were facing an increasingly different level of opponents. BC, as an independent, played many of its games against large schools from outside New England. UMass was part of the Yankee Conference and played most of its games against regional rivals. Boston College dominated the stretch of the rivalry, winning 15 of the 17 games, routinely blowing out the overmatched Minutemen.
The NCAA split Division I into two subdivisions in 1978: the premier Division I-A (now known as the Football Bowl Subdivision) and the second-tier Division I-AA (now known as the Football Championship Subdivision). Boston College was placed in I-A; UMass, along with the rest of the Yankee Conference, in I-AA.
With BC's schedule increasingly filled with powerhouse I-A teams from outside New England, the annual rivalry entered a long hiatus after the 1982 game, and would not be played again for 30 years.
Recent history
Starting in the 1990s, UMass administrators began talking about moving the football team to what was then still called Division I-A. Though the school trustees voted to hold off on an immediate move in 2003, the school did start to schedule games against Division I-A opponents—including trips to Chestnut Hill to play the Eagles.
In April 2011, UMass announced plans to join the Mid-American Conference and play the next year as the second Massachusetts member of the FBS. This prompted speculation that the two schools might renew their rivalry on a more regular basis. This was confirmed when it was reported in September 2011 that they had agreed to play a three-game biannual series beginning in 2014.
The first two games would be played in 2014 and 2016 at Gillette Stadium in Foxborough, a Boston suburb, about 30 miles south of Chestnut Hill. The games counted as UMass home dates, however, as the New England Patriots stadium had been UMass' regular home field in 2012 and 2013, and the team continued to play half its home schedule there for several years. A rematch in 2018 would be played at BC's Alumni Stadium.
For UMass, the games were a chance to test their mettle against the only other FBS team in the state and prove that they belong at the top level of NCAA football. For Boston College, the "rivalry" was not as keenly felt, as the Eagles have had four decades to establish a long history of competition with top-tier programs outside New England.
2014
The first-ever all-FBS BC-UMass game was both teams' season opener in September 2014. BC won the game by a score of 30–7.
The weeks preceding the game were met by a moderate amount of local media coverage and hype, mostly from the UMass side, which billed the game as the "Battle of the Bay State". One UMass fan even went as far as to outfit the Doug Flutie statue outside BC's Alumni Stadium with a Minuteman jersey. The famous 1980s BC quarterback tweeted: "Ew."
2016
The contest was again called the Battle of the Bay State. A UMass pep rally in the city of Boston was held the day before the game. BC defeated UMass 26–7.
Game results
''Rankings for BC from the Division I-A/FBS-level AP Poll. Rankings for UMass from Division I-AA/FCS-level Sports Network Poll 2011 or earlier, or AP Poll 2012 or later.'' | WIKI |
Fortaleza Esporte Clube
Fortaleza Esporte Clube is a Brazilian multi-sport club based in Fortaleza, capital of the state of Ceará. Founded in 18 October 1918, primarily a football club, is active in other sports such as futsal, handball and basketball. The club's colors are red, blue and white.
Fortaleza is one of the most successful football clubs in the Brazilian Northeast, having won 46 state league titles and 3 Copa do Nordeste titles. It is placed by surveys as the second biggest fan base in the Northeast, behind only EC Bahia. Its biggest rival is Ceará SC, and clashes between them are called Clássico-Rei (Classic-King).
History
On 23 February 1912, Alcides Santos founded a club called Fortaleza, and participated shortly after in the founding of the Stella Foot-Ball Club. Finally, on 18 October 1918, Fortaleza Sporting Club was born, the first denomination of the Fortaleza Esporte Clube. Its colors represent the colors of the French flag, since the founder spent time in France and decided to put the colors of the European country in the Brazilian club.
In 1920, they participated in the foundation of the Associação Cearense de Desportos. That same year they got their first Cearense Championship title.
In 1951, the Municipality of Fortaleza decided to renovate the Presidente Vargas Stadium. The idea of having a private stadium was reborn in the board since it had its own stadium during the 1920s.
In 1957, the club acquired from the land in Bairro do Pici from Mrs. Hedwing, which during the Second World War was where the American military base was in Fortaleza, called Post Command ( Command Post), hence the name Pici, transfers it to the Club of Gentilândia in exchange for the new neighborhood. It changed its name to Leão do Pici, a reference to the neighborhood where the Parque dos Campeonatos is located.
The Alcides Santos Stadium opened its doors in June 1962, beating Usina Ceará in the inaugural match.
After finishing in 4th place in the 2021 Campeonato Brasileiro Série A, the club qualified for the Copa Libertadores for the first time in history. In 2023 they finished 2nd place in the Copa Sudamericana, losing to L.D.U. Quito.
Uniform
* Home Uniform: Blue and red shirt with blue pants and white socks.
* Away uniform: White and blue shirt with blue pants and blue socks.
Statistics
* Campeonato Brasileiro Série A
* Player with most goals scored: Rinaldo (23 goals)
* Player with most goals scored in a single tournament: Rinaldo (16 goals), in 2005
* All divisions taken in consideration
* Player with most goals scored: Rinaldo (43 goals); in 2004 (14), 2005 (16), 2006 (11) and 2008 (2)
* Topscorers in national competitions (cups and leagues)
* Bececê (7 goals), Taça Brasil 1960
* Rinaldo (14 goals), Campeonato Brasileiro Série B 2004
* Best Série A right-back (Bola de Prata award): Louro, in 1974
Mascot
Fortaleza's mascot is a lion named Juba. In the 1960s, a journalist suggested that a lion be used as the club's mascot, inspired by the city of Fortaleza's General Tibúrcio Square, popularly known as Praça dos Leões (Square of Lions).
Headquarters
The headquarters of Fortaleza lies in the district of Pici, which is a complex consisting of buildings named after prominent figures of the club throughout their history.
Stadiums
Fortaleza play their games at the 8,300-seater Estádio Alcides Santos, as well as Estádio Castelão, which can hold 63,903 supporters and Estádio Presidente Vargas with a capacity of 20,600.
Past presidents
* Alcides Santos
* João Gentil
* João César
* Ney Rebouças
* Aírton França Rebouças
* Péricles Mulatinho
* José Atanásio dos Santos
* José Nestor Falcão
* Osvaldo Azim
* Ezequiel Menezes
* Jorge Mota (1999—03)
* Clayton Alcântara Veras (2004)
* Ribamar Bezerra (2005—06)
* Marcello Desidério (2007—08)
* Lúcio Bonfim (2008—09)
* Renan Vieira (2010)
* Paulo Arthur Magalhães (2011)
* Osmar Baquit (2011—14)
* Jorge Mota (2015—17)
* Luis Eduardo Girão (2017)
* Marcelo Paz (2017—2023)
* Alex Santiago (2024—present)
National
* Campeonato Brasileiro Série B
* Winners (1): 2018
Regional
* Copa do Nordeste
* Winners (3): 2019, 2022, 2024
* Torneio Norte-Nordeste
* Winners (1): 1970
State
* Campeonato Cearense
* Winners (46): 1920, 1921, 1923, 1924, 1926, 1927, 1928, 1933, 1934, 1937, 1938, 1946, 1947, 1949, 1953, 1954, 1959, 1960, 1964, 1965, 1967, 1969, 1973, 1974, 1982, 1983, 1985, 1987, 1991, 1992, 2000, 2001, 2003, 2004, 2005, 2007, 2008, 2009, 2010, 2015, 2016, 2019, 2020, 2021, 2022, 2023
* Copa dos Campeões Cearenses
* Winners (2): 2016, 2017 | WIKI |
Siege of Tomioka Castle
The siege of Tomioka Castle (2-6 January 1638) was a defeat of the rebel peasants and ronin during Shimabara Rebellion. After a successful uprising in Shimabara Domain, several thousand of rebels crossed the sea to the nearby Amakusa islands, domain of the Terazawa family, to help the local Christians who rose to arms at the same time. The local Terazawa samurai suffered a devastating defeat at Hondo Castle, but the survivors took refuge in Tomioka Castle, where they were able to repulse several assaults.
Prelude
After the rebel victory at Hondo Castle on December 29, Amakusa Shiro arrived the next day from Shimabara (where the main rebel army was besieging Shimabara Castle) and assumed command of the rebel army in Lower Amakusa, which swelled to some 10 thousand men.
Battle
On 2 January 1638, 10 thousand rebels advanced on Shiki, a small village south of Tomioka Castle, finding it deserted and burning its small castle and the shrine to Hachiman, the Japanese god of war. In Tomioka, Terazawa soldiers have retreated to the castle proper, leaving the town to the rebels and burning the outlying buildings to deprive the attackers of any cover under the walls. As the rebels entered the town, the defenders of the castle fired their only cannon, which burst after a single shot, making it useless. In order to intimidate them, Amakusa Shiro ordered for the heads of high-ranking samurai taken at Hondo to be mounted on spikes in view of the defenders, along with a sign that read: These five people, including Miyake Tobee (the former castellan of Tomioka Castle)'', have been punished for being hostile to the Christians. ''
Before the sunrise on 3 January, the rebels made a daring assault on the castle, chanting the name of Jesus as they advanced. One group climbed up to the high ground behind the castle, firing arrows and muskets at the castle's main turret. As the soldiers within returned fire, a second group of rebels charged the main gate, but the cleared ground in front of it gave no cover from the muskets and archers on the walls, and the rebels were forced to retreat, losing some 200 men. The day ended in stalemate, with the rebels breaching the castle gate, only to be repulsed. The defenders of Tomioka lost four of their officers, and an unrecorded number of soldiers.
The rebels spent 4 and 5 January making improvised shields to protect themselves from musket balls and arrows, using wooden doors and sliding screens taken from Tomioka town. A final attack came around 8 a.m. on 6 January, with the rebels advancing behind these new shields. Defenders lost another officer, while the rebels, pressed forward till the second wall was taken and only the inner wall remained. At that critical moment, the defenders unleashed a storm of fire-arrows on the advancing shield wall, which burst in flames: as the rebels dropped their shields, they received a volley of musket balls from close quarters, which repulsed them with heavy casualties.
Aftermath
This last assault broke the resolution of the attackers, as they received the news that an Imperial Commissioner was on his way to Shimabara, assembling a great army from the western domains of Japan along the way, and they could not afford to wait for the shogunate army in the open field. So the entire rebel army took to their boats and left Amakusa for the abandoned ruin of Hara Castle, where they planned to make a final stand. | WIKI |
Page:Notes and Queries - Series 9 - Volume 8.djvu/296
288
NOTES AND QUERIES. [0* s. vm. OCT. 5, 1901.
" the soldier said " is clearly inadmissible as evidence. Indeed, the statement is too absurd to be considered seriously for a moment. It is, however, a fair example of the kind of evidence which is too often adopted in such cases as this.
MR. BLIND does not appear to realize the need of adducing real documentary evidence, as I said in my former note, and not the opinions of, perhaps, prejudiced or careless writers, in support of his contention. When such evi- dence is produced it will no doubt be duly appreciated. As yet this has not been done. I do not think that any serious living musician believes a word of the farrago of stuff that has been printed in derogation of Rouget de FIsle's claim to the authorship of the great song. I shall be surprised to hear the contrary. JULIAN MARSHALL.
QUOTATIONS (9 th S. viii. 203). 2. Colley Cibber's poem ' The Blind Boy,' commencing
say what is that thing called light ! includes the lines
Let not what I cannot have My peace of mind destroy.
W. H. CUMMINGS.
Erasmus ('Adag.' 989, ed. 1606) gives the saying, "Lupus pilum mutat non mentem" (aliter, " L. p. non ingenium mutat"), as originally Greek, o Av/cos rrjv rp^ ov rr^v yi'w/o/i/aAAdrret, without author's name. The variant " Vulpes p. in. n. mores" (ibid. 995) is attributed by Suetonius ('Vespas.' 16) to an old peasant, a disappointed suitor to that emperor. CIIAS. P. PHINN.
\\ atford.
HURI/S ' HISTORY OF ALL RELIGIONS ' (8 th S vi 107, 296, 377; viii. 79).-Some further light is thrown upon the date of the original publication of this book, and other details concerning it are given, in an article sub nonune appearing in the New Church Maga- zine tor September. CHARLES HIGHAM.
Fox FAMILY OF BRISTOL (9> S. viii. 165).- In addition to the references cited in the Dictionary of National Biography,' much information can be gathered by consulting the numerous references that are given m Musgrave's 'Obituary' (Harleian Society s Publications, 1900), which record a cen- tenarian, viz., Mary Fox, Bristol, 1761 t
H. J. B. '
PEWS ANNEXED TO HOUSES (9 th S vii 388 517 ; vm. 89, 191).-Mp, ADDY may 1 ke to be referred to a very interesting paper by Mr W. O. Roper, F.S.A., on 'Warton Church?'
This is printed on pp. 21-38 of vol. viii. of the Transactions of the Lancashire and Cheshire Antiquarian Society (Manchester, 1891). It contains an account of the old pew of the Mid- dletons of Leigh ton Hall, which passed with the Hall. The pew is covered with shields, and is dated 1614. Mr. Roper was mainly instrumental in asserting the right of the Gillow family to this pew as owners of Leighton Hall. The details are shown in his paper entitled ' On the Value of Archaeology in Legal Matters ' (Transactions of the Lanca- shire and Cheshire Historical Society, New Series, x. 57-70).
I think (I write now from memory) that there is a seat in Wythburn Church, on the borders of Thirlmere, which is vested in Sir John James Harwood, as lord of the manor of Wythburn by virtue of the ownership of Dale Head Hall by the Manchester Corpora- tion. There was a seat in Bow Church, Devon, attached to the ownership of Hil- lerton, which formerly belonged to Mr. Mark Cann, now of Nymph Spreyton.
T. CANN HUGHES, M.A., F.S.A.
Lancaster.
The illustrated article * Birthplace of Sir Walter Raleigh,' in the Penny Magazine for 7 February, 1835, No. 183, vol. iv. pp. 52-3, concludes :
"In East Budleigh church the oaken pew still attached to Hayes' farm is pointed out, which was occupied by the Raleigh family. The exterior of it is embellished with ancient carved work, among which are^the^arms of Wymond Raleigh, grand- father of Sir Walter, quartering those of Jane his wife, daughter of Sir Thomas Grenville, Knt. On an adjoining panel is the date ' 1534.' The parish register, which is still in a good state of preserva- tion, commences only in 1555, three years after that of the birth of Sir Walter."
THOMAS J. JEAKES.
PARTRIDGE LORE (9 fch S. viii. 202). In con- nexion with this I might mention that two years ago a young swallow flew into my bedroom in Devon, and on my telling my hostess she remarked " it was unlucky," with- oiifc specifying the exact manner in which I might expect misfortune. Being cynically indifferent to all kinds of superstition (although a Devonshire man), I attached no importance to it then, and to-day, in review- ing the past two years, I certainly entertain no. harsh memories of that poor young swallow (indeed, my conscience is easy when I reflect how I tenderly stroked the bird before giving it its liberty). I have had some provoking experiences, which to the super- stitious and less philosophical might have appeared misfortunes and due to the swallow's visit; on the other hand, I have | WIKI |
Integers in Arrays Give Strange Result
2 views (last 30 days)
For example, try this,
vec = [pi, -2, uint8(1)]
vec =
1×3 uint8 row vector
3 0 1
vec = [pi, uint16(2), int8(-2)]
vec =
1×3 uint16 row vector
3 2 0
vec = [pi, uint16(2), int16(-2)]
vec =
1×3 uint16 row vector
3 2 0
So, if one element is an integer MATLAB seem to cast every other element in the array to that integer class. If there are several integer elements all elements seem to be cast to the higher integer class and, in a draw, to the unsigned class.
This is an extremely odd behavior. One would expect all elements to be cast to a numeric class that can accurately represent all elements or, at least, all elements cast to 'double' if there are mixed numerical classes in the array.
This can lead to totally wrong results if a user supplies integers to a function, for example this one,
function y = myFun(x, k)
par = [k, -2];
y = par(1) + par(2)*cos(x);
end
myFun(0, 1) will give -1 and myFun(0, uint8(1)) will give the incorrect result 1.
So, is there some logic behind this behavior or is it a bug?
Accepted Answer
Steven Lord
Steven Lord on 15 Nov 2022
For concatenation see this documentation page. If you concatenate one or more integer arrays with one or more double arrays, the leftmost of the integer arrays will determine the type of the result.
For the behavior of arithmetic see this documentation page.
This is the documented behavior and has been for many years. It is not a bug.
7 Comments
Paul
Paul on 15 Nov 2022
Looking at M2 in Bruno's example and the doc page linked by the cyclist, the leftmost integer type governs, not the signedness nor smallest [number of bits] type when concatenating doubles with integer types, IIUC.
Sign in to comment.
More Answers (0)
Products
Release
R2020a
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting! | ESSENTIALAI-STEM |
McConnell faces Supreme Court test like no other
Senate Majority Leader Mitch McConnell has been been involved in Supreme Court nomination fights going back to when Richard Nixon was still in the White House. But the 74-year-old Kentucky Republican now faces a nomination struggle unlike any he has taken part in before, and the stakes couldn’t be higher — for him, the Senate, the White House and the Supreme Court. McConnell is trying to prevent a sitting president with 334 days left in office from naming a replacement for the late Justice Antonin Scalia, an unprecedented assertion of authority by the Senate and one that could alter the balance of power between the White House and Capitol Hill. McConnell also wants to leave a Supreme Court seat vacant for at least a year — potentially as long as 15 months or more — an extraordinary move that would leave the panel with only eight justices for the longest period since the Nixon era. Democrats are already crying foul, labeling McConnell “the greatest hypocrite ever” and an “obstructionist,” while vowing to make the GOP pay a heavy price in November. Progressive activists have begun to target him and vulnerable Republican incumbents with TV ads and protests back in their home states, believing they can make the penalty so high for refusing to take action on any nominee from President Barack Obama that McConnell and Republicans must back down. However, to think McConnell is going to cave in this struggle is a serious misread of the Kentucky Republican, according to those closest to him. McConnell sees this faceoff as an existential fight for the Senate Republican majority. In his mind, Republicans must block Obama from getting a third nominee onto the Supreme Court — potentially shifting the liberal-conservative ratio of the panel for a generation — or there really is no need to have a Senate majority in the first place. For McConnell, the gamble of risking his majority at this point makes sense. To allow another Obama appointee on the Supreme Court could definitively change the trajectory of the entire judicial branch of government. And there’s a chance a Republican might win the White House in November, meaning that wouldn’t happen. However, even in a worst-case scenario, with a Democrat taking the White House and Republicans losing their Senate majority, McConnell would likely still control more than 40 Senate votes and have a huge say in who eventually replaces Scalia. While he is unlikely to be able to completely block a liberal from getting on the court in that case, McConnell will have a say in what kind of liberal it is. “If Democrats are pushing all their chips into the middle of the table on the prospect of McConnell caving to political pressure, they’re going to leave the White House in nine months broke and confused,” said Josh Holmes, McConnell’s former top aide and campaign manager. “They may as well start boxing up their belongings so they can get something accomplished before the moving man comes.” In addition, McConnell knows the conservative base would never forgive him or other Senate GOP leaders if they were to allow Obama to push through a nominee. Tea party activists already loathe McConnell and always will. While he views these critics as gadflys who have no insight into national policy issues or a serious plan for governing the country, they can cause problems for him and the Senate GOP leadership, especially in an already volatile election year in which an erratic New York billionaire with a checkered history is his party’s front-runner for the presidential nomination. For once, McConnell’s views are in alignment with the most hard-core elements of the conservative base. A conservative group, the Judicial Crisis Network, has already announced it will run TV ads urging McConnell and other Republican senators to hold the line against an Obama nominee, and there is no doubt millions of dollars will be poured into this fight by both sides. There are two other factors that play into McConnell’s position: Senate Democrats’ decision to invoke the “nuclear option” in November 2013 to eliminate filibusters on most presidential nominees (excluding Supreme Court picks); and Obama’s use of a recess appointment to fill three vacant posts on the National Labor Relations Board in 2012. Although the Supreme Court later ruled Obama’s NLRB action unconstitutional, the moves by Democrats — brought on by what they called a “reckless and relentless” drive by Republicans to derail Obama’s ability to govern — infuriated McConnell and helped convince him that the risks of this Supreme Court stall are worth the potential downside. While Minority Leader Harry Reid (D-Nev.) and Sen. Chuck Schumer (D-N.Y.), Reid’s heir apparent, have predicted that McConnell will eventually back down and allow a confirmation hearing and vote, Republican insiders say these comments have only strengthened McConnell’s will to stand firm. McConnell and Judiciary Committee Chairman Chuck Grassley (R-Iowa) have already signaled they are willing to do whatever it takes to block Obama’s expected nominee. “No one disputes the president’s authority to nominate a successor to Scalia, but as inconvenient as it may be for this president, Article II, Section 2, of the Constitution grants the Senate the power to provide, or as the case may be, withhold its consent,” the two Republicans wrote in a joint op-ed in The Washington Post. “It is today the American people, rather than a lame-duck president whose priorities and policies they just rejected in the most recent national election, who should be afforded the opportunity to replace Justice Scalia.” For their part, Senate Democrats will easily be able to play the “hypocrisy card” against McConnell. He has argued the exact opposite position when Republicans had the White House and he was pushing for a vote on judicial nominees, including Supreme Court hopefuls. In January 2008, the final year of President George W. Bush’s term in office, McConnell complained that too many judicial posts were vacant because of Democratic opposition to Bush’s choices. While there was no Supreme Court fight at that time, McConnell’s comments are being used as political ammo by Democrats now. “We should also be able to agree that too many judicial posts have been left empty too long,” McConnell said on the Senate floor on Jan. 22, 2008. “But we cannot confirm judges if they don’t get hearings. And since last summer, Democrats have allowed only one hearing, … on a circuit court nominee. Compare that with Senate Republicans in 1999, who held more hearings on President Clinton’s nominees in the fall of that year alone than Democrats allowed this president all last year. This pattern is neither fair nor acceptable.” In a July 2005 appearance on Fox News, McConnell was even more blunt on Senate’s role in evaluating Supreme Court nominees. “Our job is to react to that nomination in a respectful and dignified way, and at the end of the process, to give that person an up-or-down vote as all nominees who have majority support have gotten throughout the history of the country,” McConnell said. “It’s not our job to determine who ought to be picked.” This is McConnell in 1986: “Under the Constitution, our duty is to provide advice and consent to judicial nominations, not to substitute our judgment for what are reasonable views for a judicial nominee to hold.” Perhaps most damning for McConnell are these lines from a 1970 Kentucky Law Journal article he wrote. McConnell was elected to the Senate in 1984, but he has cited the article in floor speeches since then. “The president is presumably elected by the people to carry out a program and altering the ideological directions of the Supreme Court would seem to be a perfectly legitimate part of a presidential platform,” McConnell stated. “After all, if political matters were relevant to senatorial consideration it might be suggested that a constitutional amendment be introduced giving to the Senate rather than the president the right to nominate Supreme Court justices.” Grassley — like many senators in both parties — is vulnerable to the hypocrisy charge on judicial nominations as well. “The Senate has never stopped confirming judicial nominees during the last few months of a president’s term,” the Iowa Republican said in July 2008. | NEWS-MULTISOURCE |
Linux and UNIX Man Pages
Linux & Unix Commands - Search Man Pages
zoneadm(1m) [v7 man page]
zoneadm(1M) zoneadm(1M)
NAME
zoneadm - administer zones SYNOPSIS
zoneadm -z zonename subcommand [subcommand_options] zoneadm [-z zonename] list [list_options] The zoneadm utility is used to administer system zones. A zone is an application container that is maintained by the operating system run- time. SECURITY
Once a process has been placed in a zone other than zone 0, the process or any of its children cannot change zones. The following options are supported: -z zonename String identifier for a zone. SUBCOMMANDS
Subcommands which can result in destructive actions or loss of work have a -F flag to force the action. If input is from a terminal device, the user is prompted if such a command is given without the -F flag; otherwise, if such a command is given without the -F flag, the action is disallowed, with a diagnostic message written to standard error. If a zone installation or uninstallation is interrupted, the zone is left in the incomplete state. Use uninstall to reset such a zone back to the configured state. The following subcommands are supported: boot [boot_options] Boot (or activate) the specified zones. The following boot_options are supported: -s Boots only to milestone svc:/milestone/single-user:default. This milestone is equivalent to init level s. See svc.startd(1M) and init(1M). halt Halt the specified zones. halt bypasses running the shutdown scripts inside the zone. It also removes run time resources of the zone. Use: zlogin zone shutdown to cleanly shutdown the zone by running the shutdown scripts. help [subcommand] Display general help. If you specify subcommand, displays help on subcommand. install Install the specified zone on the system. This subcommand automatically attempts to verify first. It refuses to install if the verify step fails. See the verify subcommand. list [list_options] Display the name of the current zones, or the specified zone if indicated. By default, all running zones are listed. If you use this subcommand with the zoneadm -z zonename option, it lists only the specified zone, regardless of its state. In this case, the -i and -c options are disallowed. The following list_options are supported: -c Display all configured zones. -i Expand the display to all installed zones. -p Request machine parsable output. The -v and -p options are mutually exclusive. If neither -v nor -p is used, just the zone name is listed. -v Display verbose information, including zone name, id, current state, root directory and options. The -v and -p options are mutually exclusive. If neither -v nor -p is used, just the zone name is listed. ready Prepares a zone for running applications but does not start any user processes in the zone. reboot Restart the zones. This is equivalent to a halt boot sequence. This subcommand fails if the specified zones are not active. uninstall [-F] Uninstall the specified zone from the system. Use this subcommand with caution. It removes all of the files under the zonepath of the zone in question. You can use the -F flag to force the action. verify Check to make sure the configuration of the specified zone can safely be installed on the machine. Following is a break-down of the checks by resource/property type: zonepath zonepath and its parent directory exist and are owned by root with appropriate modes . The appropriate modes are that zonepath is 700, its parent is not group or world-writable and so forth. zonepath is not over an NFS mount. A sub-directory of the zonepath named "root" does not exist. If zonepath does not exist, the verify does not fail, but merely warns that a subsequent install will attempt to create it with proper permissions. A verify subsequent to that might fail should anything go wrong. fs Any fs resources have their type value checked. An error is reported if the value is one of proc, mntfs, autofs, cachefs, or nfs or the filesystem does not have an associated mount binary at /usr/lib/fs/<fstype>/mount. It is an error for the directory to be a relative path. It is an error for the path specified by raw to be a relative path or if there is no fsck binary for a given filesystem type at /usr/lib/fs/<fstype>/fsck. It is also an error if a corresponding fsck binary exists but a raw path is not specified. net All physical network interfaces exist. All network address resources are one of: o a valid IPv4 address, optionally followed by "/" and a prefix length; o a valid IPv6 address, which must be followed by "/" and a prefix length; o a host name which resolves to an IPv4 address. Note that hostnames that resolve to IPv6 addresses are not supported. rctl It also verifies that any defined resource control values are valid on the current machine. This means that the privilege level is privileged, the limit is lower than the currently defined system value, and that the defined action agrees with the actions that are valid for the given resource control. The following exit values are returned: 0 Successful completion. 1 An error occurred. 2 Invalid usage. See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWzoneu | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ svcs(1), zlogin(1), zonename(1), svcadm(1M), svc.startd(1M) and init(1M), svc.startd(1M), zonecfg(1M), attributes(5), smf(5), zones(5) The zones(5) service is managed by the service management facility, smf(5), under the service identifier: svc:/system/zones:default Administrative actions on this service, such as enabling, disabling, or requesting restart, can be performed using svcadm(1M). The ser- vice's status can be queried using the svcs(1) command. The act of installing a new non-global zone is a fresh installation of the Solaris operating system. A new installation of Solaris must not require interaction with the user (that is, it must be "hands off"). Because of this, packages installed in the global zone and all non- global zones cannot contain request scripts (see pkgask(1M)). If a package did have a request script, then the creation of a non-global zone could not be done without user intervention. Any package that contains a request script is added to the global zone only. See pkgadd(1M). 3 Jun 2005 zoneadm(1M)
Man Page | ESSENTIALAI-STEM |
Ministry of Environment and Forestry
The Ministry of Environment and Forestry (Kementerian Lingkungan Hidup dan Kehutanan) is the cabinet-level, government ministry in the Republic of Indonesia responsible for managing and conserving that nation's forests. The current Minister of Environment and Forestry is Siti Nurbaya Bakar.
History
Since late 2014, the Ministry of Environment and Ministry of Forestry was merged into Ministry of Environment and Forestry. However, Environment and Forestry management has been an official government concern since Presidential Decree No. 16 of 1972 established the Committee of Formulation and Work Plan to the Government in the Field of Environment following the 1972 World Environment Conference in Stockholm, Sweden.
Environment
* 1) State Minister Office of Development Monitoring and Environment (1978-1983)
* 2) State Minister Office of Demography and Environment (1983-1993)
* 3) State Minister Office of Environment (1993-2004)
* 4) Department of Environment (2004-2010)
* 5) Ministry of Environment (2010-2014)
Forestry
* 1) General Directorate of Forestry, Department of Agriculture (-1983)
* 2) Department of Forestry (1983-1998)
* 3) Department of Forestry and Plantation (1998)
* 4) Department of Forestry (1998-2010)
* 5) Ministry of Forestry (2010-2014)
List of ministers
* Minister of Environment and Forestry
* Siti Nurbaya Bakar (27 October 2014-)
* Minister of Forestry
* Soedjarwo (27 July 1964 – 25 July 1966 and 19 March 1983 – 11 March 1988)
* Hasjrul Harahap (21 March 1988 – 11 March 1993) | WIKI |
Page:Popular Science Monthly Volume 91.djvu/134
118
��Popular Science Monthly
���A bridge deck cruiser having two compartments is not considered a fair type of boat for large or rough waters but is adapted for protected waters, such as a lake, river or bay and for fair weather
��planking with a sharp-pointed knife. If the timber is sound, it will be difficult to make the point enter the wood, but if it is inclined to "dry rot," the blade of the knife will sink into the plank, meeting practically no resistance. While this inclination to- wards rot does not necessarily condemn the boat, it does necessitate new planking or timber, and this expense must be figured when making an offer for the craft. There is an old idea held by many boatmen that the most vulnerable part of the hull is that which lies between "wind and water." This, however, is not the case. Dry rot is caused in most cases by steam. For that reason the bilge of the boat is most likely to be the part affected, as there is always more or less water lying in the bilge and the hot sun often causes it to steam. The ribs should also be carefully examined. If they are spliced out or doubled it is a pretty sure indication that the boat is either getting pretty old or has at some time run ashore
���Deck plan of the sturdy trunk cabin cruiser shown below
��and been wrecked. As a general rule, a hull that has been re-ribbed or stiffened should either be inspected by an experi- enced boat-builder or be rejected entirely, for fear of its opening up badly in a pounding sea.
Authorities differ as to the most desirable power plant; but it is the model of the hull rather than the power used to drive it that develops the speed. For instance, the short, beamy, heavy fishing boats used on the Columbia River are equipped with an eight horsepower, single cylinder engine which drives them along at a speed of about six miles an hour. Several years ago the writer endeavored to speed up one of these boats by installing a twenty horsepower en- gine. This resulted in an increased speed of about one mile an hour, and the boat was prac- tically wrecked from the excessive vibration and her sea-worthiness decreased to a large ex- tent by the excessive weight. This same idea holds good in practically any class of craft.
��� � | WIKI |
VLC 4.0.0-dev
vlc_object_t Struct Reference
VLC object common members. More...
Collaboration diagram for vlc_object_t:
[legend]
Data Fields
struct vlc_loggerlogger
union {
struct vlc_object_internals * priv
struct vlc_object_marker * obj
};
bool no_interact
bool force
Module probe flag. More...
Detailed Description
VLC object common members.
Common public properties for all VLC objects. Object also have private properties maintained by the core, see vlc_object_internals_t
Field Documentation
◆
union { ... }
◆ force
bool vlc_object_t::force
Module probe flag.
A boolean during module probing when the probe is "forced". See module_need().
Referenced by demux_Probe(), generic_start(), module_need(), and vout_display_New().
◆ logger
◆ no_interact
◆ obj
struct vlc_object_marker* vlc_object_t::obj
◆ priv
struct vlc_object_internals* vlc_object_t::priv
The documentation for this struct was generated from the following file: | ESSENTIALAI-STEM |
DATA Step, Macro, Functions and more
How to dynamically add macro variables to %LOCAL statement
Accepted Solution Solved
Reply
Trusted Advisor
Posts: 1,934
Accepted Solution
How to dynamically add macro variables to %LOCAL statement
Suppose I am creating a bunch of macro variables, and the number of macro variables can change depending on the input data set.
Example:
proc sql;
select count(distinct salesman) into :nsales from dataset;
select distinct salesman into :sales1-:sales%left(&nsales) from dataset;
quit;
If there are 4 salesmen in the dataset, I get 4 macro variables. If there are 5 salesmen in the dataset, I get 5 macro variables. And so on.
I would like all the macro variables thus created to be in a %LOCAL statement. Is there an easy way to do this?
Accepted Solutions
Solution
07-09-2013 03:05 PM
Super User
Posts: 5,518
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
Not too difficult ...
You're allowed to specify a macro variable name that will resolve, such as:
%local sales&i;
So you could run with this code:
%local i;
%do i=1 %to &nsales;
%local sales&i;
%end;
The tricky part is that you can actually insert this code between your SELECT statements. Each SELECT statement runs immediately, and the %DO loop also runs immediately. So the statements would all run in the proper order.
Good luck.
View solution in original post
All Replies
Solution
07-09-2013 03:05 PM
Super User
Posts: 5,518
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
Not too difficult ...
You're allowed to specify a macro variable name that will resolve, such as:
%local sales&i;
So you could run with this code:
%local i;
%do i=1 %to &nsales;
%local sales&i;
%end;
The tricky part is that you can actually insert this code between your SELECT statements. Each SELECT statement runs immediately, and the %DO loop also runs immediately. So the statements would all run in the proper order.
Good luck.
Trusted Advisor
Posts: 1,934
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to Astounding
Astounding wrote:
Not too difficult ...
You're allowed to specify a macro variable name that will resolve, such as:
%local sales&i;
So you could run with this code:
%local i;
%do i=1 %to &nsales;
%local sales&i;
%end;
The tricky part is that you can actually insert this code between your SELECT statements. Each SELECT statement runs immediately, and the %DO loop also runs immediately. So the statements would all run in the proper order.
Good luck.
Now why didn't I think of that?
Respected Advisor
Posts: 3,799
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
It might be easier to use CALL SYMPUTX and specify the scope than to do all that looping.
Super User
Posts: 19,878
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
Or to create a single macro variable and loop through it in your macro list as I imagine you're doing a %do loop somewhere else using the counter and the macro variables created.
Super User
Posts: 10,046
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
Those macro variables would be local, if you keep it in a macro, and those macro vaiables are not defined before.
Trusted Advisor
Posts: 1,137
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
There is a automatic macro variable called sysmaxlong which has a values of 2147483647, this can be used to automatically generate n number of macro variables. And since we are generating the macro variables within the macro, they all will be local macro variables.
Please try the below code;
%macro test();
proc sql;
select name into :name1-:name&sysmaxlong from sashelp.class;
quit;
%mend;
%test;
The above code will generate following local macro variables name1,name2,name3,name4 etc., till name19.
Thanks,
Jagadish
Thanks,
Jag
Trusted Advisor
Posts: 3,215
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to PaigeMiller
I am sorry but the statement the that the "%do loop would run at the same time as the proc select" is incorrect.
SAS(R) 9.3 Macro Language: Reference (how the macro Processor compiles a macro defnition)
Be happy, the default creation scope is local.
The problem will arise when you need them to be global or have a conflicting global name.
SAS(R) 9.3 Macro Language: Reference (forcing a macro variable to be local - Examples of macro variablescopes)
These are just te doc-refs to underpin what Ksharp stated.
---->-- ja karman --<-----
Frequent Contributor
Posts: 85
Re: How to dynamically add macro variables to %LOCAL statement
Is there a way to make these variables global. Why following code doesn't work
% macro m1;
%global sales&i;
%local i;
%do i=1 %to 5;
%let sales&i=&I;
%end;
% mend;
% m1
% put &sales1;
Super User
Posts: 5,518
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to forumsguy
forumsguy,
Your code isn't working because &i doesn't exist at the time that the %GLOBAL statement attempts to execute. Move the %GLOBAL statement inside the loop, before the %LET statement.
Good luck.
Super User
Posts: 5,518
Re: How to dynamically add macro variables to %LOCAL statement
Jaap Karman,
There must be another way to interpret the documentation. Here's a test program that you can run (once leaving the comment statement in place, and once uncommenting it) to confirm that the program works as posted:
%macro test;
data temp; do i=21 to 25; output; end; run;
proc sql noprint;
select count(distinct i) into : n_vars from temp;
%local i;
%do i=1 %to &n_vars;
%local sales&i;
%end;
%let n_vars = &n_vars;
*select distinct i into : sales1 -: sales&n_vars from temp;
quit;
%put _user_;
%mend test;
options mprint;
%test
The %DO loop can be compiled ahead of time (at least partially since &n_vars is not yet known). But it doesn't execute ahead of time. That's a feature of PROC SQL ... the SELECT statements run right away without looking for a QUIT (or a RUN) statement.
Trusted Advisor
Posts: 3,215
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to Astounding
@Astounding,
I just has given you to the documentational links a I have done solving this kind of issue for many years... Nearly about some 30 of them,
I was supporting SAS in a former big organization connecting Windows Unix and Mainframe together freeing the users/analists of this kind of issues.
All kind of macro issues are burned into my fingers. I referred KSharp as recognizing the value of his statement.
As said and documented the local definition is not needed/ This is tested and used many times. You can test it by removing it, and it still will run.
Aside the scope also macro quiting can be very challenging. Wanting to combine it with SAS/connect or SQL pass-thru is giving a lot other nice things. As a nice sample I put on my personal site: Sample Securing Business keys and passwords (%keypsw)
It solves the issue of eliminating key/psw in code. By the way this macro knowledge is part of SAS -advanced. After all years I started to collect some of those certifications. You can find me on linkedin as you probably wish.
---->-- ja karman --<-----
Super User
Posts: 5,518
Re: How to dynamically add macro variables to %LOCAL statement
Jaap Karman,
You're absolutely right that INTO : creates %LOCAL variables automatically. However, INTO : doesn't always have to create a new macro variable. What if the %GLOBAL environment already contains a macro variable &SALES1 and you want the INTO : version of &SALES1 to appear in the %LOCAL table? Then the %LOCAL statements are necessary. It's never a bad idea to add %LOCAL statements to guard against this possibility.
Trusted Advisor
Posts: 3,215
Re: How to dynamically add macro variables to %LOCAL statement
Posted in reply to Astounding
Astounding,
SAS is often using an approach like Lazy initialization - Wikipedia, the free encyclopedia By that you are right being more formal.
in the TTA glossary of istqb.org you can find the same approach of quality testing of technical software (code review).
As the macro-code defining the scope must run before they are used the number and must be known in advance.
The nice thing with proc SQL is it will fill them with naming conventions numbers added etc dependent of it contens. There is the contradiction.
And SAS is not Always correct in their handling. This one 31887 - Problems with macro variables Created in an AUTOEXEC.SAS file when executing SAS on a worksp... is an sample how surprising wrong it can be (experienced by hitting).
---->-- ja karman --<-----
🔒 This topic is solved and locked.
Need further help from the community? Please ask a new question.
Discussion stats
• 13 replies
• 443 views
• 3 likes
• 8 in conversation | ESSENTIALAI-STEM |
locus
(redirected from Locus coeruleus)
Also found in: Dictionary, Thesaurus, Medical, Acronyms, Encyclopedia, Wikipedia.
Related to Locus coeruleus: Raphe nuclei
Locus
[Latin, Place; place where a thing is performed or done.]
For example, the locus delicti is the place where an accident or crime occurred.
locus
(low-cuss) n. Latin for "place," it means "place which" this or that occurred.
locus
noun bailiwick, demesne, emplacement, ground, locale, locality, location, place, position, region, site, situs, territory
Foreign phrases: Locus crontractus, locus criminis.The place of the crime. Locus delecti. The place of the offense. Locus partitus. A place divided. Locus reisitae. A place where something is situated.
See also: address, circuit, locality, location, position, post, purview, region, scene, scope, section, situation, situs, space, vicinity
locus
‘place’ or ‘area’.
LOCUS. The place where a thing is done.
References in periodicals archive ?
Single unit activity of locus coeruleus neurons in behaving animals.
Actions of acetylcholine and nicotine on rat locus coeruleus neurons in vitro.
Neural mechanism of rapid eye movement sleep generation: Cessation of locus coeruleus neurons is a necessity.
Role of GABA in acetylcholine induced locus coeruleus mediated increase in REM sleep.
Immunohistochemical study using a GABA antiserum for demonstration of inhibitory neurons in the rat locus coeruleus.
Localization of GABA-A receptor subunit mRNAs in the rat locus coeruleus.
GABA in locus coeruleus regulates spontaneous rapid eye movement sleep by acting on GABAA receptors in freely moving rats.
Electrophysiological evidence that noradrenergic neurons of the rat locus coeruleus are tonically inhibited by GABA during sleep.
Interactions between cholinergic and GABAergic neurotransmitters in and around the locus coeruleus for the induction and maintenance of rapid eye movement sleep in rats.
GABA-ergic neurons in prepositus hypoglossi regulate REM sleep by its action on locus coeruleus in freely moving rats.
Role of alpha and beta adrenoceptors in locus coeruleus stimulation-induced reduction in rapid eye movement sleep in freely moving rats.
The role of brain noradrenaline in cortical activation and behavior: a study of lesions of the locus coeruleus, medial thalamus and hippocampus-neocortex and of muscarinic blockade in the rat. | ESSENTIALAI-STEM |
3 High-Growth Cloud Stocks I'd Buy Right Now
Many cloud stocks soared last year amid robust demand for their remote software and infrastructure services throughout the pandemic. The unfettered growth of many of these companies throughout the crisis amplified those gains as they became temporary safe-haven stocks.
Unfortunately, many of those stocks generated less impressive gains this year as rising bond yields, inflation fears, and a focus on reopening plays sparked a rotation from growth to value stocks.
That shift could persist throughout the rest of the year, but investors shouldn't blindly sell all their cloud stocks. Gartner still expects global spending on public cloud services to rise 21% to $332.3 billion this year, and jump another 20% to $397.5 billion in 2022. So the market could still offer great opportunities for long-term investors.
Image source: Getty Images.
However, investors should still avoid the unprofitable "hypergrowth" cloud stocks that trade at high double-digit price-to-sales ratios for now, since many of those volatile names still have too much growth baked into their prices.
Instead, they should stick with established cloud giants that are firmly profitable and reasonably valued relative to their near-term growth. Here are three stocks that fit that description: Microsoft (NASDAQ: MSFT), Adobe Systems (NASDAQ: ADBE), and salesforce.com (NYSE: CRM).
1. Microsoft
Microsoft's commercial cloud revenue rose 33% year over year to $17.7 billion, or 42% of its top line, last quarter. That segment includes Office 365, Dynamics 365, and Azure, the world's second-largest cloud infrastructure platform after Amazon Web Services (AWS).
Microsoft evolved from an aging enterprise software giant into a cloud king under CEO Satya Nadella, who took over in 2014 and prioritized a "mobile first, cloud first" mantra to generate fresh growth again.
Those strategies included the transformation of its Office and Dynamics software into subscription-based services, the expansion of Azure with new services and major partnerships, the development of new mobile apps for iOS and Android, and the launch of Windows 10 as the "last" version of its flagship OS and a firm foundation for its new cloud-based ecosystem.
Analysts expect Microsoft's revenue and earnings to rise 16% and 35%, respectively, this fiscal year (which ends in June). Next year they expect its revenue and earnings to rise another 12% and 7%, respectively, as its cloud business expands, its enterprise software business recovers, and it continues to sell more Xbox and Surface devices.
Microsoft's stock is reasonably valued at 29 times forward earnings. Its low forward yield of 0.9% probably won't attract any income investors, but it's a nice bonus for sticking with this long-term winner.
2. Adobe
Like Microsoft, Adobe has transformed its desktop software into cloud-based services over the past several years. Its flagship software products -- including Photoshop, Illustrator, and After Effects -- are now hosted as subscription services within its Digital Media cloud services.
Image source: Getty Images.
Adobe also expanded its enterprise-facing Digital Experience cloud, which provides cloud-based advertising, e-commerce, and analytics services. This smaller segment competes against other cloud-based companies like Salesforce and Shopify.
Both of Adobe's businesses remained resilient during the pandemic since it locked in customers with sticky subscriptions and early cancellation fees. More importantly, Adobe's Digital Media tools still mostly dominate their respective image, video, and document-editing markets as "best in breed" solutions.
Analysts expect Adobe's revenue and earnings to rise 20% and 17%, respectively, this year, as its core cloud services continue to grow and its advertising cloud business -- which suffered a slowdown during the pandemic -- gradually recovers. Next year, they expect its revenue and earnings to both grow about 15%.
Adobe's stock looks a bit pricey at 35 times forward earnings, but the stickiness of its cloud services arguably justifies that slight premium.
3. Salesforce
Salesforce was built from the ground up as a cloud-based CRM (customer relationship management) services provider. It currently controls about a fifth of the global CRM market, according to IDC, while all of its closest competitors hold single-digit percentage shares.
Salesforce also provides cloud-based marketing, e-commerce, and analytics services. Its upcoming takeover of Slack will tie together all those pieces with a unified communications platform.
Salesforce is an evergreen cloud king because it profits from the digitization of businesses, automation of repetitive tasks, and the outsourcing of CRM services to remote workers. Its Einstein AI platform also helps companies optimize their businesses. In short, companies will rely more on Salesforce's services as they cut costs and reduce their overall dependence on human employees.
Analysts expect Salesforce's revenue to rise 21% this year, but for its adjusted earnings to dip 30% as it integrates Slack. But looking further ahead, Salesforce still expects to more than double its annual revenue to $50 billion by fiscal 2026 as its core markets continue to expand.
Salesforce trades at just over 50 times forward earnings. That P/E ratio might seem steep for an enterprise software company, but it's actually fairly low for a pure-play cloud services company.
10 stocks we like better than Salesforce.com
When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.*
David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Salesforce.com wasn't one of them! That's right -- they think these 10 stocks are even better buys.
See the 10 stocks
*Stock Advisor returns as of May 11, 2021
John Mackey, CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. Teresa Kersten, an employee of LinkedIn, a Microsoft subsidiary, is a member of The Motley Fool's board of directors. Leo Sun owns shares of Amazon and Salesforce.com. The Motley Fool owns shares of and recommends Adobe Systems, Amazon, Microsoft, Salesforce.com, Shopify, and Slack Technologies. The Motley Fool recommends Gartner and recommends the following options: long January 2022 $1,920 calls on Amazon, long January 2023 $1,140 calls on Shopify, short January 2022 $1,940 calls on Amazon, and short January 2023 $1,160 calls on Shopify. The Motley Fool has a disclosure policy.
The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. | NEWS-MULTISOURCE |
Radiology Data and Natural Language Processing Term Paper
• Length: 14 pages
• Sources: 14
• Subject: Communication - Language
• Type: Term Paper
• Paper: #98348862
Excerpt from Term Paper :
Harnessing Unstructured Data in Radiology
The harnessing of unstructured data is vital to moving the field of radiology forward. There are methods used for the mining of unstructured data, with one of the most common being Natural Language Processing (NLP). However, there are some difficulties with the use of NLP in the radiology field, because NLP lacks the capacity to analyze free-text radiology reports and images. There is too much uncertainty to be addressed with NLP, but there may be ways in which it can be useful. In order to make that determination, this paper examines the current usage of NLP and other methods such as RadLex and Annotation and Image Markup for unstructured data mining in the radiology field, as well as the desired and sought out use of the mining of unstructured data. Both clinical decision support and research analysis could benefit from unstructured data mining in the field of radiology, but only if the data can be mined correctly and the value can be extracted from it. With that in mind, various forms and methods used for the mining of unstructured data in radiology reports must be carefully considered and compared to one another, in order to find the method or combination of methods that works best and provides the most success for translation of unstructured data into valuable information for clinical decision support and research analysis.
Outline
Introduction
Historical and Theoretical Background
Natural Language Processing
RadLex
Annotation and Image Markup
Use and Intended Impact
NLP
RadLex
Annotation and Image Markup
Interaction with Other Topics and Themes
Comparison and Contrast
A Comparison of Unstructured Data Mining Methods
The Contrasting Values of Unstructured Data Mining Methods
Strengths and Weaknesses
Organizational and Technical Risks
Conclusion
References
Bibliography
Harnessing Unstructured Data in Radiology
Introduction
Radiology is the use of imaging to look into the human body and see disease processes taking place (Chapman, et al., 2011). Both diagnosis and treatment can be improved when radiology is used. There are a number of techniques used by radiologists, including CT scans, X-rays, ultrasounds, MRIs, and PET scans, among others (Hong, et al., 2013). There are also interventional radiology techniques that are generally minimally invasive but that work well in diagnosing and treating specific ailments (Chapman, et al., 2011). However, there is one area in which radiology is severely lacking, and that is in the mining of unstructured data in order to present a clearer picture of the patients' issues and provide more information about what those patients may be facing. There is a great deal of data provided within radiology reports, but without collecting this data and processing it, it can be of no real use to the patients or the doctors.
However, the collection and processing of the unstructured data found in those reports can be difficult and is not without its own pitfalls (Chapman, et al., 2011). The mining of that data has to be done, and there are several different types of programs that can be used to do that successfully. Natural Language Processing (NLP) is one of the most commonly used options for collecting data, but it does not always work well on unstructured data. There are many errors when using it that way, so it has not been found to be completely reliable. With that in mind, this paper will explore NLP, RadLex, and Automated Image Markup that can be used for unstructured data mining in radiology reports. This will provide information on which of these methods is the best one, or how they can be used in conjunction with one another to be more effective overall.
Historical and Theoretical Background
Natural Language Processing
Natural Language Processing (NLP) is used to mine unstructured data (Gerstmair, et al., 2012; Hong, et al., 2013). This particular concept is based on human-computer interaction, and provides a way for computers to learn natural (human) language in order to process information that is provided by humans. The more computers understand about language, the more they can process information without barriers (Johnson, et al., 1997). That can be highly beneficial in medicine, because it provides doctors, nurses, radiologists, and other medical professionals with more information than they would have previously be able to collect without the use of NLP. However, NLP is not without its downsides, which also have to be addressed in order to acquire a full understanding of whether NLP should be used in radiology and what adjustments can be made in order for that to be more viable.
Generally, complex sets of hand-written rules were used in order to allow machines to translate, but in the 1980s programmers began to write complex algorithms that allowed machines to learn and process language (Demner-Fushman, Chapman, & McDonald, 2009; Torres, et al., 2012). This was a major breakthrough, and interest in machine translation was renewed. The original algorithms were relatively primitive and not much better than the hand-written rules, but they did show that algorithms were possible, and that they did work for translation purposes (Chapman, et al., 2011; Weiss & Langlotz, 2008). As computing power became stronger, more success was seen with translation and the mining of data, allowing computers to actually "learn" language in a way that was not possible in the past. Algorithms today can be semi-supervised, in that they can learn some information from other information they are supplied (Chapman, et al., 2011).
The theory surrounding NLP is that computers can be "taught" to translate language in the same way a person can (Reiner, 2009; Torres, et al., 2012). Once machines are able to do this, computers will be able to handle a number of tasks that are currently offered only to humans. That can free up human beings for other tasks, and can result in much faster translations because computers are capable of rapid calculations that are much faster than what humans can create. However, there are issues with this particular theory that have to be considered. The main concern is that the NLP goals are not completely realistic (Gerstmair, et al., 2012; Weiss & Langlotz, 2008). Computers are not people, and because they do not "think" in the same way human beings do, they can only follow sets of rules and use those rules to process information (Demner-Fushman, Chapman, & McDonald, 2009).
RadLex
RadLex is another way of addressing unstructured data mining. There are several different methods currently used, and the main problem with them is that they are all different. In other words, when healthcare organizations use different methods for extracting and categorizing data and for keeping records, it becomes confusing when information needs to be transferred from one organization to another (Gerstmair, et al., 2012). RadLex is designed to stop all of that, through the creation of a single lexicon that can be used by all healthcare organizations and agencies (Gerstmair, et al., 2012). There are more than 68,000 terms contained within it, so it can be applied to the entire field of radiology successfully. DICOM and SNOMED-CT are two of the current standards and lexicons that are used, but RadLex is able to address and work with both of those, to unify the experience (Weiss & Langlotz, 2008).
The idea behind RadLex came from a group of committees that were created to find a better way to mine data from radiology reports. The RSNA formed these in 2005, and they were comprised of individuals from more than 30 organizations that focused on radiology and standards (Chapman, et al., 2011). In 2007, another six committees were formed to help the continued development of RadLex, and to ensure that as many terms as possible were included in it (Chapman, et al., 2011). Without that level of information, RadLex would not be any better than the other lexicons it was hoping to outshine, and it would not have been able to take those other data mining software options and tie them all together in one convenient package that can be used by radiologists everywhere. The theory behind it was to create an option that would allow all other programs to be merged, and it appears that RadLex will succeed with its goal of making that possible.
Annotation and Image Markup
Another choice for handling the mining of unstructured data in radiology reports is Annotation and Image Markup. This is, as the name would suggest, focused on the images found in reports. However, there is much more to the issue than just identifying pictures, as there are captions and tags that can be attached to these images and that will supply readers of the report with a great deal of data that might otherwise be lost (Chapman, et al., 2011). Annotation and Image Markup, or AIM, is not new. The history of it goes back a number of years when it comes to the planning stages and what it can offer. However, it is also not focused on the same types of unstructured data as other systems such as NLP. The focus of AIM remains on the images…
Cite This Term Paper:
"Radiology Data And Natural Language Processing" (2014, March 22) Retrieved February 4, 2017, from
http://www.paperdue.com/essay/radiology-data-and-natural-language-processing-185707
"Radiology Data And Natural Language Processing" 22 March 2014. Web.4 February. 2017. <
http://www.paperdue.com/essay/radiology-data-and-natural-language-processing-185707>
"Radiology Data And Natural Language Processing", 22 March 2014, Accessed.4 February. 2017,
http://www.paperdue.com/essay/radiology-data-and-natural-language-processing-185707 | ESSENTIALAI-STEM |
User:Rubel Ahammed ( RA)
RA Daily Official YouTube Channel is a Famous for Music. This Channel was Published 30 March, 2018.
The Founder of This Channel is Rubel Ahammed. He was born in (31-03-1997) Jamalpur, Dhaka, Bangladesh.
https://youtube.com/channel/UC6Pnh-t68Tffdgpsug4xNFQ | WIKI |
Jump To:
Leopard Technical Q&As: Graphics & Imaging
Developers can use the graphics & imaging frameworks in Mac OS X to implement custom 2D, 3D, and multimedia graphics features in their Carbon applications. Developers have access to a wide variety of graphics technologies, including Quartz 2D, Quartz Services, OpenGL, QuickTime, and the Mac OS X printing system.
View all Carbon Technical Q&As.
Document Descriptions
On Off
Display
Sorted by
Title
Sort by
Date
AGL Changes for Mac OS X Leopard (v. 10.5) (HTML)
QA1523: This Q&A describes the new and deprecated APIs for Apple OpenGL (AGL)
2008-01-04
Availability of Quartz Composer Patches in Web Kit (HTML)
QA1505: Details which Quartz Composer patches are available in Web Kit
2007-03-05
CalcCMask and SeedCFill in Carbon (HTML) (日本語 HTML)
QD62: Explains how to use CalcCMask and SeedCFill in Carbon even though Carbon doesn't support OpenPort.
2000-11-08
CGBitmapContextCreate Supported Color Spaces (HTML)
QA1037: Lists the color space and alpha info combinations currently supported by CGBitmapContextCreate.
2007-07-18
CGContext Bounds (HTML)
QA1048: Explains how to determine the bounds of a CGContext.
2001-07-02
CGContextAddLineToPoint, CGContextAddCurveToPoint, et. al. (HTML)
QA1049: Explains why the CGContextAddXYZ APIs don't draw anything immediately.
2001-07-02
CGContextClosePath (HTML)
QA1046: Explains when you should call CGContextClosePath.
2001-10-02
CGImageRef contents are immutable (HTML) (日本語 HTML)
QA1276: Explains that CGImageRef contents are considered immutable once created.
2003-07-17
Context Sharing Tips (HTML) (日本語 HTML)
QA1248: How to correctly share OpenGL contexts and what the limits on this sharing are.
2005-02-07
Converting RGB Colors to a Palette Index (HTML)
Deprecated - QD21: Explains how to convert RGB colors into the palette index created by an application.
1995-09-15
Creating Gray Scaled Images > 8 bits (HTML) (日本語 HTML)
Deprecated - QD51: Shows how to create gray-scaled images at resolutions greater than 8 bits for display.
1997-11-17
Current GDevice Dependencies (HTML) (日本語 HTML)
QA1115: Describes potential problems with creating windows or ports when the current GDevice isn't the main device.
2002-02-13
Drawing a Path Multiple Times (HTML)
QA1047: Explains that path drawing operations consume the path.
2001-07-02
Error -151 and NewGWorld (HTML)
Deprecated - QD18: Explains what the error code -151 means when in NewGWorld.
1995-09-15
GetPortBitMapForCopyBits (HTML) (日本語 HTML)
Deprecated - QD61: Describes the proper usage of GetPortBitMapForCopyBits.
2000-11-08
GetProcAdress and OpenGL Entry Points (HTML) (日本語 HTML)
QA1188: Technique for finding function pointers for OpenGL entry points in Cocoa and Carbon
2002-11-25
Getting the pixel data from a CGImage object (HTML)
QA1509: Describes how to access the pixel data of a CGImage object
2008-08-27
How can I programmatically determine the DPI of the current video mode? (HTML) (日本語 HTML)
QA1217: Describes how to compute the DPI for a given display in a given mode using Core Graphics.
2002-12-02
How do I tell if a particular display is being hardware accelerated by Quartz Extreme? (HTML) (日本語 HTML)
QA1218: Describes how to use CGDisplayUsesOpenGLAcceleration to see if a display is accelerated or not.
2002-12-04
How do I use PMSessionGetGraphicsContext to get a CGContextRef? (HTML) (日本語 HTML)
Deprecated - QA1216: Describes how to use PMSessionSetDocumentFormatGeneration and PMSessionGetGraphicsContext to get a CGContextRef for printing.
2003-02-25
How do I use QuickDraw with CGDirectDisplay? (HTML)
QA1011: Explains how to draw to a CGDirectDisplay-captured display using QuickDraw.
2001-04-11
How to measure CG text (HTML)
QA1051: Explains how to measure Core Graphics text.
2007-08-02
Incorrect Inside Macintosh Volume V documentation (HTML)
Deprecated - QD15: Identifies incorrect documentation in Inside Macintosh Volume V regarding the formats of PnPixPat and BkPixPat opcodes.
1995-09-15
Is ColorSync thread safe? (HTML) (日本語 HTML)
QA1261: Discusses ColorSync thread-safety issues.
2003-04-17
LockPixels and DisposeGWorld with QTNewGWorldFromPtr (HTML)
QA1007: Clarifies some issues surrounding pointer ownership when creating GWorlds with QTNewGWorldFromPtr
2001-02-26
Parsing the PICT File Format (HTML) (日本語 HTML)
Deprecated - QD56: Explains where to find information on the PICT file format and warns against parsing a PICT file.
1998-02-10
Preserving embedded ICC profiles when using QuickTime Graphics Importer/Exporters (HTML) (日本語 HTML)
QA1145: Shows how to preserve the embedded ICC profile when using the QuickTime Graphics Importer/Exporter routines
2002-09-04
Problem Getting PICTS to Display in Correct Colors (HTML)
Deprecated - QD24: Using a custom color table to get PICTs to display with the right colors in an offscreen GWorld.
1995-09-15
Problem with PaintRgn on 256-color Screens (HTML)
Deprecated - QD23: PaintRgn with RGBForeColor and transfer mode addOver doesn't return color to original on 256-color-screens.
1995-09-15
Problems Creating a Mask for a Picture (HTML)
Deprecated - QD27: Demonstrates creating a mask where the mask is 0 for pure white pixels and 1 everywhere else.
1995-09-15
Problems recording CopyBits into a PICT on Mac OS X 10.2 (HTML) (日本語 HTML)
QA1189: Identifies a problem with CopyBits and PICT on Mac OS X 10.2 and gives a simple workaround.
2002-11-19
Providing QuickDraw with a Known Good Port (HTML) (日本語 HTML)
Deprecated - QA1237: How to use SetPort( NULL) to provide QuickDraw with a known good port.
2003-09-29
QDFlushPortBuffer (HTML) (日本語 HTML)
QD65: Describes a possible solution for window update problems under Carbon.
2000-11-08
QDSwapPort (HTML) (日本語 HTML)
QA1128: Explains when to use QDSwapPort.
2002-11-06
Quartz 2D Interpolation (HTML) (日本語 HTML)
QA1186: Explains how to control Quartz 2D's image interpolation.
2002-10-29
Quartz 2D Thread Safety (HTML) (日本語 HTML)
QA1238: Explains the thread-safety issues for the Quartz 2D API.
2003-02-25
QuickDraw Text Anti-Aliasing using Quartz 2D (HTML) (日本語 HTML)
QA1193: Describes APIs added to Mac OS X to allow applications to draw QD text using CG anti-aliasing.
2002-10-29
Requirements for Quartz GL (HTML)
QA1536: Describes the requirements for enabling Quartz GL.
2008-08-08
Saving the current Core Graphics Path (HTML)
QA1056: Explains that the Core Graphics save and restore GState APIs do not affect the path.
2001-10-02
Spooling in or out of CompressPicture or CompressImage (HTML)
Deprecated - QD17: Recommends alternatives to spooling the results of CompressPicture or CompressImage to or from disk.
1995-09-15
Turning Off Core Graphics Clipping (HTML)
QA1050: Explains how to clear the clipping path for a CGContext.
2001-07-02
Unexpected CG state changes (HTML)
QA1045: Explains why the Core Graphics drawing state sometimes changes for no apparent reason.
2001-07-02
Updating OpenGL Contexts (HTML) (日本語 HTML)
QA1209: When and why to update an OpenGL context in response to system and user actions.
2003-06-19
Using Clip Region and Buffer Rectangles with OpenGL Carbon (HTML) (日本語 HTML)
QA1222: Shows the basics of using buffer rectangles and clip regions with AGL.
2002-12-19
Using qd and QDGlobals (HTML) (日本語 HTML)
Deprecated - QD40: Why a sample program compiled with SC may give the link error: undefined entry qd. Provides a solution.
1996-02-09
Using Temporary Memory with OpenPicture (HTML)
Deprecated - QD20: Provides several techniques of causing OpenPicture to allocate temporary memory for a picture handle.
1996-02-01
Window Manager and EraseRect (HTML)
Deprecated - QD26: Why WindowManager causes a flicker using EraseRect and provides a solution for this problem.
1995-09-15 | ESSENTIALAI-STEM |
Talking Points Memo
Talking Points Memo (TPM) is a liberal political news and opinion website created and run by Josh Marshall that debuted on November 12, 2000. The name is a reference to the memo (short list) consisting of the issues (points) discussed by one's side in a debate or used to support a position taken on an issue. By 2007, TPM received an average of 400,000 page views every weekday.
Growth
Talking Points Memo was founded as a political blog in 2000 by Josh Marshall, who until 2004 was the site's sole employee. In 2005, TPM Media LLC was incorporated, and the company began to grow with more employees and spinoff websites. By 2009 it had 11 employees, and, having previously been funded by ads and reader donations, received angel investments from a group led by Marc Andreessen. In 2009, TPM opened a Washington, D.C. office and joined the White House press pool along with several other progressive news outlets to cover the Obama administration. The site introduced a subscription service, TPM Prime, in 2012, which by 2017 had over 21,000 subscribers, and by December 2020 had nearly 35,000 subscribers.
Reception
Robert W. McChesney and John Nichols describe the site as taking a "more raucous and sensational" tone than traditional news media. This includes coining phrases such as "Bamboozlepalooza" to describe George W. Bush's efforts to privatize Social Security, which the blog opposed; and "bitch-slap politics" to refer to the Swiftboating of 2004 presidential candidate John Kerry.
McChesney and Nichols compare the site's style to the muckraking of Upton Sinclair. The more social aspects of the site, which invite crowdsourcing, were compared to La Follette's Weekly. Tom Rosenstiel, director of the Project for Excellence in Journalism, in 2009 said "TPM is really an advocacy operation that has moved toward journalism."
Guest bloggers have included Matthew Yglesias, Robert Reich, Dean Baker, Michael Crowley, and, briefly, vice-presidential candidate John Edwards. Beginning in the summer of 2006, many weekend postings were provided by anonymous blogger DK. On November 11, 2006, DK was revealed to be attorney David Kurtz, who now posts openly under his name.
In 2007, TPM won a George Polk Award for Legal Reporting for its coverage of the 2006 U.S. Attorneys scandal, becoming the first online-only outlet to receive the award.
Related projects
* TPMCafe - a "spin-off" blog also created by Josh Marshall, is a companion website that debuted on May 31, 2005. This site features a collection of blogs about a wide range of domestic and foreign policy issues written by academics, journalists, and former public officials, among others.
* TPMmuckraker - a new blog that was founded when Marshall expanded his operation where journalists working for the TPM collective, such as Paul Kiel and Justin Rood, investigate political corruption.
* TPMDC - founded in January 2007, the Horse's Mouth, is a blog authored by Greg Sargent with a remit to cover how Washington politics was covered by the major news outlets, that moved home from The American Prospect to the TPM Media family. Sargent had begun writing for TPMCafe in July 2006. In 2008, Sargent stopped posting to the Horse's Mouth blog and began posting to a new blog called TPM Election Central, which focused on covering the 2008 elections. In 2009, TPM Election Central was renamed TPMDC, to cover politics from Washington, D.C., and Marshall hired journalists based in Washington to report for the blog.
* TPMLiveWire - is a spin-off established in September 2009.
* TPMIdea Lab - is a blog established in January 2011 to cover science and technology.
* TPMPollTracker - is an aggregator of various polls about incumbents taken by polling agencies.
* TPMPrime - is a paid members-only section offering long form articles, and interactive discussions with journalists and political figures.
The four blogs (Talking Points Memo, TPMCafe, TPMMuckraker, and TPMDC) are published by TPM Media LLC. | WIKI |
Trump told Alexander he likes his health care approach
President Trump told Sen. Lamar Alexander during a phone call Saturday that he likes the approach Alexander is taking on a bipartisan health care package — but only if Democrats agree to the state flexibility Alexander and other Republicans have asked for, according to a senior GOP aide. Why this matters: Trump potentially wreaked havoc on the individual market on Thursday night when he decided to stop making cost-sharing subsidy payments to insurers (payments a court has found illegal). The issue now falls squarely in the lap of Congress, and Alexander has been working with Democratic Sen. Patty Murray to try to strike a deal that would, among other things, fund the subsidies. However, the president clearly wants to use the issue to extract something from Democrats on health care. "Alexander briefed Trump on the contours of the proposal and Trump thought it seemed like a good proposal if Democrats gave us meaningful flexibility," the aide told me, adding that the president "was focused on how to use [insurer subsidy payments] as leverage" and "liked what Lamar told him about state flexibility." Yes, but: Democrats have been reluctant to concede any policies that would undermine the Affordable Care Act's insurance regulations, and a deal hasn't been struck. And Office of Management and Budget Director Mick Mulvaney told Politico on Friday the president doesn't like the Alexander-Murray effort, underlining the fact that we really don't know what Trump will end up deciding. | NEWS-MULTISOURCE |
Talk:Southend University Hospital
Untitled
This has a history attached to it. Being NHS hospital, it is a major public institute. Any cleanup required can be done.
Staff members
I re-removed the list of staff members from this article. There is no need whatsoever to include these, as they add little to no value to the article along with most of them being not notable. There are numerous other things that are needed though (The lack of sourcing, the list like format, the lack of categories and on and on), so feel free to improve those. Excirial ( Talk, Contribs ) 16:59, 30 August 2008 (UTC) | WIKI |
Scouting in North West England
Scouting in North West England is about Scouting in the official region of North West England. It is largely represented by the Scout Association of the United Kingdom and some Groups of traditional Scouting including the British Boy Scouts and British Girl Scouts Association, Baden-Powell Scouts' Association and the Federation of European Scouts (British Association).
The current structure of the Scout Association sees each section overseen by a national commissioner (Beavers, Cubs, Scouts, Explorer Scouts and Network). The National Association is overseen by the Chief Commissioner (Tim Kidd).
The Scout Association in North West England is administered through 8 Scout Counties.
The British Boy Scouts and British Girl Scouts Association is administrated via its national headquarters in Dorset (United Kingdom). Administration is carried out by volunteer leaders, and the association has no paid staff, resulting in no membership fees for youth members of the association.
University of Central Lancashire SSAGO; Lancaster SSAGO, covering Lancaster University and University of Cumbria (formally St Martin's College); Liverpool Universities' Student Scout and Guide Organisation (LUSSAGO), covering University of Liverpool, Liverpool John Moores University (LJMU), Liverpool Hope University and Liverpool Institute for Performing Arts (LIPA); and Manchester SSAGO, covering the University of Manchester, Manchester Metropolitan University and University of Bolton and University of Salford ; all affiliated to the Student Scout and Guide Organisation (SSAGO), are situated in North West England.
History
Several Groups in the region were founded in 1908. These include the 1st Marple Group.
Cumbria Scout County
Cumbria is a Scout County concurrent with the political county of Cumbria, and provides Scouting opportunities for young people and adults in the area around the English Lake District, including the town of Barrow-in-Furness, and the city of Carlisle.
The county is currently divided into six Scout Districts: Eden covers Keswick, Penrith, Appleby, the Eden Valley and the North Lakes area Kentdale covers Kendal, Kirkby Lonsdale and the South Lakes area North Fells covers Workington, Maryport, Cockermouth and the Solway Coast Reivers District covers Carlisle, the border with Scotland and the surrounding villages South West Lakes covers Barrow, Ulverston and the south west of Cumbria. This district covers Whitehaven, Millom and the Western Lake District.
* Eden District
* Kentdale District
* North Fells (formerly Solway/Derwent and Workington Districts)
* Reivers District
* South West Lakes (Formally Barrow in Furness District and Duddon and High Furness District)
* Western Lakes District
Events
The Rawnsley Shield is an annual competition for Scouts in the Reivers District in Cumbria Scout County. Starting in the 1920s its roots go back to Canon Hardwicke Rawnsley who donated the shield to Scouting. The format of the competition changes every year. Each year the county organises Dragnet, an activity for Explorer Scouts and Scout Network, which is based around a manhunt across the Cumbrian Fells.
Cheshire Scout County
Cheshire is a Scout County concurrent with the political counties of Cheshire East, Cheshire West & Chester, Warrington and Halton.
The county is currently divided into nine Scout Districts:
* Alderley and Knutsford District
* Chester and District
* Ellesmere Port and Neston District
* Macclesfield And Congleton District
* Mid Cheshire District
* Mersey Weaver District
* South West Cheshire District
* Warrington East District
* Warrington West District
District badges as worn on the uniform of Scouting members.
Alderley Scout Band
Alderley Scout Band, formed in 1963 with one bugle and drum, is a traditional marching and display band in based in Wilmslow, Cheshire. It is in the Alderley and Knutsford Scout District of the Cheshire Scout County. The band takes part in competitions under the TYMBA Traditional Youth Marching Bands Association (TYMBA) and the British Youth Band Association (BYBA) rules, winning over 500 trophies including many Supreme Champions.
In 1984 and 1994 the band was invited to play at Windsor Castle in front of respectively Her Majesty the Queen and the Duchess of Kent. They have also appeared in the Royal Tournament, on Television, in the London Parade, the Lord's Mayor of Manchester's Parade and toured the Netherlands in 1992 and Belgium in 1995.
By 2000, the band has declined to under 10 members, only 3 of whom were under 25, and they could no longer compete. New members were recruited and from October 2003 it began competing again in competitions within TYMBA, and at local parades and fetes. In 2007, the Centenary year of Scouting, the band joined with the 1st Syston Scout and Guide Band to perform at the National Scout St George's Day Parade at Windsor Castle in front of the Queen. In November 2008 the band were crowned National Champions at the TYMBA National Finals, 10 years since they had last won the top award.
East Lancashire Scout County
East Lancashire Scout County covers the industrial towns of East Lancashire.
The County contains 6 Scout Districts:
* Blackburn District
* Burnley & Pendle District(formally Burnley District and Pendle District)
* Clitheroe District
* Darwen District
* Hyndburn District
* Rossendale District
The Burnley and Pendle District was formed after the merger of Burnley District and Pendle District in 2013
Greater Manchester East Scout County
Greater Manchester East Scout County is one of three Scout Counties based in Greater Manchester. The area is divided into nine Districts, covering the city of Manchester itself, Stockport, Tameside, New Mills and Glossop. Both New Mills and Glossop are situated within the county boundaries of Derbyshire, but has been included in the area due to its close geographical position near the Greater Manchester conurbation.
The County contains nine Scout Districts:
* North Manchester and Medvale
* Manchester South
* Cheadle
* Stockport (Incorporated Goyt District in 2018)
* Ladybrook Valley
* Glossop
* North Tameside
* Tameside South Scout District (Denton & Hyde)
* Tame Valley
Greater Manchester North Scout County
Greater Manchester North is one of three Scout Counties which cover the metropolitan county of Greater Manchester, and provides a Scouting programme to the towns of Bolton, Bury, Farnworth, Heywood, Middleton, Prestwich and Rochdale, amongst others. The County Headquarters are in Middleton.
The county is currently divided into 6 Scout Districts:
* Bolton Moorland
* Bolton South and Farnworth
* Bury & Ramsbottom
* Oldham Borough
* Prestwich, Whitefield and Radcliffe
Greater Manchester West Scout County
Greater Manchester West is one of three Scout Counties which cover the metropolitan county of Greater Manchester, and provides a Scouting programme to the metropolitan boroughs of Salford, Trafford and Wigan.
The County Commissioner for Greater Manchester West is currently Andy Farrell, deputised by Greg Archer (Adult Support) and Jacob Bond (Programme).
Within the Scout County there are three Scout Groups listed among the 'first troops' founded in 1908: The county is currently divided into eight Districts:
* 1st Worsley (originally: 6th Eccles)
* 1st Flixton (L'Avenir)
* 1st Stretford (Longford)
* Altrincham and District
* Ellesmere District (formally Eccles District and Worsley District)
* Lilford District Scouts (formally Atherton & Tyldesley District and Leigh and District)
* Lowry District (formally Salford District and Swinton & Pendlebury District)
* Sale and District
* Stretford District
* Urmston and District
* Wigan and District
Eccles District and Worsley District merged in the early 2000s to form Ellesmere District.
Atherton and Tyldesley District and Leigh District were merged on 1 October 2009 to form Lilford District.
Salford District and Swinton and Pendlebury District were merged in December 2015 to create the new Lowry District. The new district was named after artist L.S.Lowry who spent most of his life living in Swinton and notably painted industrial landscapes and working-class people of Salford for many years.
Merseyside Scout County
Merseyside Scout County is a Scout County covering five Metropolitan Boroughs of Knowsley, St. Helens, Sefton, Wirral, and the City of Liverpool.
The county is divided into eleven Scout Districts:
* Altside
* Bebington
* Birkenhead
* Crosby
* Liverpool North
* Liverpool South
* Sefton North
* St Helens
* Wallasey
* West Wirral
On 1 April 2010 Bootle, Sefton East and Kirkby Districts merged to form Altside District, Allerton, Picton and parts of Knowsley Districts merged to form Liverpool South District and Fairfield, Walton on the Hill and parts of Knowsley Districts merged to form Liverpool North District. This followed a review of the County in 2009.
Within Merseyside county, the Crosby district is also the home of the Crosby Scout and Guide Marina Club, who offer dinghy and kayak sailing to local youth, based at the newly rebuilt Crosby Lakeside Adventure Centre opened in October 2009. The club runs a dinghy section, sailing a variety of craft - Wayfarer, GP14s, Enterprise, RS Fevas, Herons, Gulls, Toppers - and a kayak section. It is co-run by the Scout and Guide movements, but not exclusively for Scouts and Guides, and draws its membership from local youth aged 10 to about 20 years.
In 2019, the districts of Formby and Southport were merged to create the new district of Sefton North.
West Lancashire Scout County
West Lancashire Scout County is a Scout County covering half of Lancashire, the other half being covered by East Lancashire Scout County with the two roughly separated by the M6.
The boundaries of Lancashire were changed in 1974 as part of local government. Shortly after, the Scout Counties in Lancashire changed to reflect these border changes. West Lancashire Scout County was created from parts of the original North West and South West Lancashire Scout Counties. According to their 2006 census the Scout County had 9347 members within 154 Scout Groups.
Districts
* Blackpool
* Chorley
* Fylde
* Lonsdale
* Ormskirk
* Preston
* South Ribble
* Wyre
The Scout County hosts Be Prepared: The Story of Scouting, the first purpose-built Scout museum in the UK.
Headquarters
West Lancashire Scouts headquarters are at Waddecar Scout Camp in Goosnargh, Preston.
Mountaineering
The Scout County regularly runs a varied number of trips including training weekends in Scotland around the Cairngorms and smaller ski trips to the Alps as well as Scotland.
Greenland
The Scout County is well known for their mountaineering adventure element of their program. Over the last few years two trips to Greenland have resulted in some assents of unclimbed peaks. The first trip, in 2004 featured a link up to Waddecar via a Sat phone during the campsite's birthday celebrations with the Chief Scout, the second during 2007 to Ren Land featured a far larger number of participants and a sea kayak element. The trips were approved by the Young Explorers Trust and the British Mountaineering Council. As well as the mountaineering and adventure side, scientific elements were also completed
International
Away from mountaineering the county also has run in the past trips to Uganda which aimed to complete a multi-purpose building to be used for health promotions, clinics for immunisation of the local population. The county has participant in International Jamboree, EuroJam and international trips to Austria, Belgium and Canada. They have also attended the Menin Gate memorials during November.
Ashworth Valley Camp Site
Ashworth Valley, which lies between Bury and Rochdale, was purchased in 1944 by Rochdale and Heywood Scout Association Districts. It was previously part of the estate of the Earl of Egerton. The comedian/songwriter Mike Harding included a mention of "Ashy Valley" in his song about a Cub Scout going to camp.
Bispham Hall Scout Camp
Bispham Hall is a 60 acre Activity Centre situated almost midway between Manchester and Liverpool, near to the village of Billinge.
Bowley Scout Camp and Activity Centre
Bowley Scout Camp and Activity Centre, established in 1968, is managed by the East Lancashire Scout County of the Scout Association. The site, of 47 acre of former agricultural pasture, provides both camping sites and indoor accommodation. It has open views to Pendle Hill and the distant peaks within the Lake District National Park and North Yorkshire National Park. Activities on site include climbing walls, archery, rifle shooting, and grass sledges. A new eco-building is being constructed on site, being one of the first commercial/residential centres to be built out of straw bales.
Dunham Park Scout Camp
Dunham Park is a 15 acre mixed woodland camp site located at Dunham Massey, near the town of Altrincham, some 8 mi south of the centre of Manchester.
Tatton Park Campsite
Located in the secure parkland of a National Trust property, it is ideal for water-based activities as it has access via a private jetty to Tatton Mere. The campsite has several large grassed camping areas bordering an open activity field with access to water points and three smaller woodland sites. Wood burning is permitted using the altar fires provided and in the campfire circle, which has rustic seating provided.
There is no "overnight" indoor accommodation, but there is one building, which is equipped with stainless steel commercial kitchen appliances and facilities, crockery and cutlery for 50 people is provided. The activity room can seat up to approximately 50 people for meals. Toilets and showers serve visitors.
Forest Camp Activity Centre
This large wooded camp can accommodate over 1000 in a range of sites from large open fields to small clearings. The toilet blocks have hot water and showers, and are equipped with special needs facilities.
There are two buildings that can be hired, each sleeps 24 residents in a combination of room sizes. The 'George Begg' building has central heating and a stainless steel kitchen with commercial appliances, large fridge and freezer. The 'Lakeview' building has heating throughout, the kitchen has a selection of appliances and is better suited to more reserved catering demands. Both kitchens have crockery and cutlery provided for 50 people.
Barnswood Campsite
Barnswood Scout Camp site is set in the Staffordshire Moorlands, just outside of Cheshire and is the District Scout camp site for Macclesfield & Congleton. Barnswood is open to all Scouting, Guiding and Youth groups for camps of all sizes. Barnswood Scout Camp Site is 63 acres in size and consists of mixed woodland with 22 open grassed camping sites and a selection of buildings.
Milldale Scout Camp
Milldale is South West Cheshire District Scouts own campsite. Set in 28 acres of secluded countryside near Crewe it is open to all members of the Scouting and Guiding fraternity. A stream, 5 acres of mature woodland and a 7-acre camping field make Milldale a location for traditional troop and patrol camping activities. A toilet block and large barn provide additional facilities.
Queens Charlotte's Wood
Consisting of nine acres of undulating woodland it has sheltered grass sites that are suitable for Group or Patrol camping. Being positioned between the Frodsham and Helsby Hills at the end of the sandstone ridge that runs NW to NE across the Cheshire plain, it is a base site for those wishing to walk the Sandstone Trail or the Delamere Forest.
Ennerdale Scout Centre
Ennerdale Scout Centre is owned and maintained by the Cumbria Scout Association County, and is located on the River Ehen near to Ennerdale Water. The site only covers around 6 acre, but offers a range of camping pitches, as well as some indoor accommodation for up to around 60 people. This site was previously owned by the former West Cumberland Scout County. For over 50 years, the Oxford University Scout and Guide Group has had a close association with the camp site, with students camping for a week before and after the summer camping season in the University Easter vacation and the university Summer vacation in September.
Great Tower Activity Centre
Great Tower Activity Centre is located on the eastern shore of Windermere in the Lake District National Park. While it is located in the Cumbria Scout Association County, as from 1 April 2011, Great Tower Scout Activity Centre joined the National Activity Centres programme and is owned and managed by The Scout Association. The site covers an area of 250 acre.
Greater Manchester North Scout Association Camp sites
Dog Hill Scout and Community Camp Site in Shaw, Oldham and Bibby's Farm Scout Camp and Activity Centre near Chorley but administered by the Scout districts in Bolton are available to Scouts, Guides and other youth organisations in Greater Manchester North Scout County or elsewhere. There is also Giants Seat camp site run by Radcliffe District.
Linnet Clough Scout Camp
Linnet Clough Scout Camp is situated in Greater Manchester near the towns of Marple and Stockport. Developed from a working dairy farm, Linnet Clough is an all year round Scout activity centre and camp site with facilities for a multitude of outdoor activities.
There are $17 1/4$ acres of camping fields surrounded on three sides by woods and plantations of trees to provide shelter and windbreaks on the fields. There are three main fields. There is normally a field warden resident in the camping area. There is a large "Storm Hut" which can be used in adverse weather conditions.
Middlewood Scout Camp
Closed 18-12-2016 to make room for RHS Salford Garden. A new site has been provided about 1/4-mile south east of Middlewood. This site is named Hollinwood and will open circa May 2017. Middlewood Scout Camp is situated near the town of Worsley, near the Bridgewater Canal.
Middlewood has a large number of varied size camping pitches, ranging from large sites suitable for district or group events down to small sites suited to patrol camping. The campsite features a modern toilet block with a hot water supply and showers.
Two buildings, Cunliffe Lodge and the Cub Hut are also available. Cunliffe Lodge, the larger building, features a fully equipped kitchen, a main activities/dining hall, three bunkrooms (sleeping 15, 6 and 4), male and female bathrooms and central heating. The Cub Hut features a small kitchen and dining room, a lounge with tables and chairs, two bunkrooms sleeping six and four and a leaders room.
One of Middlewood's main features is the large boating lake, co-leased with Broughton Angling Club. Scouts can use the lake for canoeing, kayaking, rafting and fishing. The site also has a rifle range and a large selection of pioneering poles. The Camp Team run open campfires with songs and campfire stunts on Saturday evenings during camping season.
Moor Crag Water Activity Centre
Moor Crag Activity Centre is based on the eastern shore of Windermere, near to Great Tower Activity Centre. It provides a base for a wide variety of waterborne activities. Accommodation is available in a residential block at the centre, the Waterside Wood Chalet. Alternatively camping is generally arranged at Great Tower.
The activity centre has 68 m of water frontage along the shore of Windermere, which includes 2 jetties and a boat house / wet dock, which is used to house the control room and safety craft. Canoes, Kayaks and Sailing boats are owned by the centre, and are available for hire.
Ratlingate International Camping Centre
Ratlingate International Camping Centre is located 4 mi south of the city of Carlisle, and is owned and maintained by Reivers Scout Association District. The site consists of 4 acre of camping field, with a further 20 acre in mixed woodland pitches. It originally had a wooden hut, which burnt down and so was replaced with a building at the top of the campsite which has kitchens, toilets and dormitories. Nearly all Reivers camps take place at Ratlingate, including the recent Centenary Camp where over 250 people attended. Its woods can hold many activities from backwoods cooking to pioneering, and is regularly used for orienteering competitions.
Tawd Vale Adventure Centre
Tawd Vale Adventure Centre is a campsite of the Merseyside Scout County. Named after the River Tawd, which flows through the camp, it consists of 80 acre in West Lancashire. The site is currently run by the county's Assistant County Commissioner (Tawd Vale), along with the assistance of a number of volunteers. The site continues to undergo improvements, including recent toilet and shower block refurbishments.
Tawd Vale has indoor accommodation consisting of two ten-person bothys, a commercial kitchen/activity space and 12-person semi-sheltered sleeping area.
The Delph, which is a flooded ex-quarry is now Tawd Vales' private facility for water sports activities such as canoeing and rafting. With flat grassy sites, and dense ancient woodland, activities available at Tawd Vale include; Climbing, Abseiling, Bouldering, Crate Stacking, High Ropes, Rifle Shooting, Archery, Tomahawk Throwing, kayaking, Canoeing, Rafting, Pioneering.
Waddecar Scout Activity Centre
Waddecar Scout Activity Centre (formerly Waddecar Scout Camp) is located in the Forest of Bowland, Lancashire. The site has a large number of woodland pitches, as well as fields, allowing almost one thousand Scouts to camp communally. There are also a number of buildings offering indoor accommodation.
Waddecar has several buildings that can be hired out by Scout groups and other youth organisations. These include Helme Lodge and Jubilee Base. It also has several large areas for pitching tents, including the Training Field and Bill's Meadow. The site also offers a number of activities, including abseiling, climbing, an obstacle course, archery, cycle hire, and an air rifle shooting range.
The site has a Scouting Museum in a building designed by Roy Fisher.
West Lancashire Scout Association District Campsites
As well as the larger County activity centres listed above, smaller centres are owned and run by Scout Districts. Mowbreck Campsite is run by Blackpool District. Fylde District has an Activity Barn at its District HQ. Lonsdale District has two activity centres: the T.W. Helme Memorial Activity Centre at Littledale and the SilverHelme Activity Centre.
Chorley Capers Scouts and Guides Gang Show
The Chorley Capers is a Gang Show held at St Michael's High School in Chorley, West Lancashire. Scouts, Guides and leaders from both organisations perform on stage in musical-style fashion. In 2019, Chorley Capers was recorded for the first time in 5 years and by a Young Person in a Youth Media Team for the first time in any gang show. The show operates yearly and usually performs in spring time.
Chester Gang Show
Chester Gang Show started in 1954.
Blackpool Gang Show
The Blackpool Gang Show was first staged in 1961. It has appeared at the Opera House, Grand Theatre & Pavilion Theatre, then from 2005, the Globe Theatre. It was visited by the Gang Show founder Ralph Reader at the Opera House. It has a cast of over 100 members from all sections of the Scout Association and Girlguiding UK along with leaders from both Associations.
Crewe Gang Show
The Crewe Gang Show originated in 1938, although the South West Cheshire Scout District had been running an evening of entertainment for attendees of their Annual General Meeting for many years beforehand. In 1949, it was performed at the New Theatre, Crewe. This venue has continued to 2008, which will mark the 70th Anniversary. The Gang Show was awarded the privilege of using the coveted Red Necker in 1964. Ralph Reader, the man behind the original Gang Show held in 1931, visited the Crewe Gang Show in 1980, and wrote in a letter, "With no hesitation, I say again, it was one of the finest Gang Shows I have ever seen". The 2006 show included 23 Cub Scouts and 62 Scouts and Leaders as the cast, and many others as production crew.
Warrington Gang Show
The Warrington Gang Show started in 1951. In 2008, it celebrated its 50th production along with the centenary of Scouting. Up until 1992 Warrington Gang Show was performed at Crosfields Centenary Theatre in Warrington, but moved to Warrington's Parr Hall in 1991 when Crosfields was closed and demolished. This venue has been Warrington Gang Show's home since.
Birkenhead Gang Show
Birkenhead Gang Show was started in 1961.
They brought the show to London for its 50th anniversary.
Barrow
The Barrow Gang Show is a relatively new Gang Show, starting in 1995.
Congleton
Congleton Gang Show started in 1972 and runs ever two years.
Knutsford
Knutsford Gang Show started in 1986.
Marple
1st Marple Scout Group, with Marple Guides, are involved in the Marple Gang Show in the Carver Theatre. This show has been running continuously for over 40 years, and is nationally recognised via the Red Knecker scheme.
Sale
The Sale Gang Show perform every year at Altrincham Garrick Playhouse since 1963. In recent years, the Gang Show has returned to playing in the Waterside in Sale, its location before moving to the Garrick.
Mid Cheshire Gang Show
The Mid Cheshire Gang Show, covering the towns of Northwich, Winsford and Middlewich in Cheshire is one of the newest Gang shows, starting in 2007. In March 2011, after the third bi-annual production, it was awarded the coveted Red Knecker.
St. Helens
St. Helens Gang Show held its first show at the Theatre Royal, St. Helens in 1964, celebrated its 50th anniversary in 2014 and continues in the same location. It now has over 100 members of the Scout and Guide movement in the cast.
West Wirral
West Wirral Gang Show started in 1990. | WIKI |
Aggregate species
Aggregate species consist of a a group of taxa, usually lower taxa such as subspecies and varieties.
An example is Sanguisorba minor. This species includes three subspecies, subsp. minor, subsp. muricata and subsp. magnolii.
All three are displayed on the genus Sanguisorba page. The aggregate species is indicated by the blue Agg. code
The reason for introducing the concept is that many records, by us and others, are to species level only. In these cases, we don't know to which subspecies the record belongs. However, we can still use them at the aggregate species level. Each of the subspecies also has its own page with information and records.
Copyright: Mark Hyde, 2008-21
Hyde, M.A. (2021). UK Flora: Aggregate species.
https://www.ukflora.info/aggregate.php, retrieved 21 June 2021
Site software last modified: 24 July 2017 10:48pm
Terms of use | ESSENTIALAI-STEM |
0
Hi All,
For each element in data1, I need to figure out what elements in data2 are related to it. Also, for each element in data2, I need to figure out what elements in data1 are related to it. Therefore, I setup a mutual data structure as you can see below:
class data1 {
// class variables
int id;
.....
map<string, float> m_to_data2; // string is the keyword of data2, float recorded the reference info when data1 and data2 are related.
};
class data2 {
// class variables
.....
list <int> src_id; // int is the id of data1
};
map<string, data2 *> map_2;
map<int, data1 *> map_1;
Then I parse file and fill the map_1 and map_2. I found:
(1) the total memory usage after setting up the mutual-linked two maps: 498.7M.
(2) without set the link from data2 to data1 (not fill list <int> src_id), memory usage: 392.7M.
(3) Without fill map_1, without fill list <int> src_id in data2, memory usage: 182.0M
(4) Without fill map_1, fill list <int> src_id with ids of data1, memory usage: 289.7M
(5) without fill map<string, float> m_to_data2, memory usage: 290.0M
(6) The size of map_1: 77737
(7) The size of map_2: 1830009
(8) The size of map<string, float> m_to_data2 for each element of map_1 in the range of 3 - 17522
(9) The size of list <int> src_id for each element of map_2 in the range of 1- 1377
I need to reduce the memory usage after setting up the mutual-linked maps (ideally less than 200M, currently 498M as you can see above). I was trying to token the string (keyword of data2) to int by setting up an extra map <string, int>, since int needs less memory than string, but it may not help much since I need extra memory for the map <string, int>. Any suggestions?
Your comments/suggestions are highly appreciated.
Thank you very much.
2
Contributors
4
Replies
5
Views
7 Years
Discussion Span
Last Post by pengkeanh
0
I think you're over-complicating this. Though it would help if you could be more specific about how data1 and data2 would be related. What kind of data are we working with? The choice of how to work with it does depend somewhat on how it's being used.
0
Hi Narue,
Sorry for the confusing. Basically, what I need to is to setup the mutual-link relation between data1 and data2. I mean for each element of data1, I need to find all its related elements in data2, and vice verse.
Any suggestions on this?
0
That's just another way of saying what you've already said. What does this relation represent? data1 and data2 are unhelpful names, and "related elements" is equally unhelpful. What I want to know is what problem are you trying to solve with this setup?
0
saying data1 represents the manufacture companies, and data2 represents the supplier companies. Each manufacture company has multiple suppliers, and each supplier does business with multiple manufacture companies.
Giving a manufacture company, I need to find all its suppliers efficiently for price study. Giving a supplier company, I also need to find all its customers.
Now I just want to setup such a database so that the search in both directions is efficient.
Thanks.
This topic has been dead for over six months. Start a new discussion instead.
Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules. | ESSENTIALAI-STEM |
Author:Michael Daniel Higgins
Works
* Speech in Dáil Éireann during Finance Bill debate, 25 January 2011
* Michael D. Higgins' Inaugural Address, 11 November 2011
* The Role of the University at a time of Intellectual Crisis, 25 January 2012
* Of Public Intellectuals, Universities, and a Democratic Crisis, 21 February 2012
* Towards a European Union of the Citizens, 17 April 2013
* Toward an Ethical Economy, 11 September 2013
* Statement on the death of Nelson Mandela, 5 December 2013
* Address to the Houses of Parliament, Westminster, 8 April 2014
* Toast by President Higgins at State Banquet, Windsor Castle, 8 April 2014 | WIKI |
21-Hydroxylase
Steroid 21-hydroxylase is a protein that in humans is encoded by the CYP21A2 gene. The protein is an enzyme that hydroxylates steroids at the C21 position on the molecule. Naming conventions for enzymes are based on the substrate acted upon and the chemical process performed. Biochemically, this enzyme is involved in the biosynthesis of the adrenal gland hormones aldosterone and cortisol, which are important in blood pressure regulation, sodium homeostasis and blood sugar control. The enzyme converts progesterone and 17α-hydroxyprogesterone into 11-deoxycorticosterone and 11-deoxycortisol, respectively, within metabolic pathways which in humans ultimately lead to aldosterone and cortisol creation—deficiency in the enzyme may cause congenital adrenal hyperplasia.
Steroid 21-hydroxylase is a member of the cytochrome P450 family of monooxygenase enzymes that use an iron-containing heme cofactor to oxidize substrates.
In humans, the enzyme is localized in endoplasmic reticulum membranes of cells in adrenal cortex, and is encoded by the gene which is located near the CYP21A1P pseudogene that has high degree of sequence similarity. This similarity makes it difficult to analyze the gene at the molecular level, and sometimes leads to loss-of-function mutations of the gene due to intergenic exchange of DNA.
Gene
Steroid 21-hydroxylase in humans is encoded by the CYP21A2 gene that may be accompanied by one or several copies of the nonfunctional pseudogene CYP21A1P, this pseudogene shares 98% of the exonic informational identity with the actual functional gene.
Pseudogenes are common in genomes, and they originate as artifacts during the duplication process. Though often thought of as "junk DNA", research has shown that retaining these faulty copies can have a beneficial role, often providing regulation of their parent genes.
In the mouse genome, the Cyp21a2 is a pseudogene and the Cyp21a1 is a functional gene. In the chicken and quail, there is only a single Cyp21 gene, which locus is located between complement component C4 and TNX gene, along with Cenpa.
CYP21A2 in humans is located in chromosome 6, in the major histocompatibility complex III (MHC class III) close to the Complement component 4 genes C4A and C4B, the Tenascin X gene TNXB and STK19. MHC class III is the most gene-dense region of the human genome, containing many genes that have, as of 2023 - unknown functions or structures.
Inside the MHC class III, CYP21A2 is located within the RCCX cluster (an abbreviation composed of the names of the genes RP (a former name for STK19 serine/threonine kinase 19), C4, CYP21 and TNX), which is the most complex gene cluster in the human genome. The number of RCCX segments varies between one and four in a chromosome, with the prevalence of approximately 15% for monomodular, 75% for bimodular (STK19-C4A-CYP21A1P-TNXA-STK19B-C4B-CYP21A2-TNXB), and 10% for trimodular in Europeans. The quadrimodular structure of the RCCX unit is very rare. In a monomodular structure, all of the genes are functional i.e. protein-coding, but if a module count is two or more, there is only one copy of each functional gene rest being non-coding pseudogenes with the exception of the C4 gene which always has active copies.
Due to the high degree of homology between the CYP21A2 gene and the CYP21A1P pseudogene and the complexity of the RCCX locus, it is difficult to perform molecular diagnostics for CYP21A2. The pseudogene can have single-nucleotide polymorphisms (SNP) that are identical or similar to those in the functional gene, making it difficult to distinguish between them. The pseudogene can also recombine with the functional gene, creating hybrid genes that have features of both. This can result in false-positive or false-negative results when testing for SNPs in the CYP21A2.
The whole genome sequencing technology relies on breaking the DNA into small fragments, sequencing them, and then assembling them back together based on their overlaps. However, because of the high homology and variability of the CYP21A2 and its pseudogene, the fragments cannot be mapped unambiguously to either copy of the gene. This can lead to errors or gaps in the assembly, or missing some variants that are present in the gene.
Polymerase chain reaction (PCR) molecular diagnostics uses selective primers to amplify specific segments of the DNA sequence that are relevant for diagnosing or detecting a certain disease or condition. If the primers are not designed carefully, they may bind to both the CYP21A2 and the CYP21A1P pseudogene, or to different segments of the RCCX cluster, resulting in false-positive or false-negative results. Therefore, PCR for the CYP21A2 requires the use of locus-specific primers that can distinguish between the gene and the pseudogene, and between different RCCX modules. Moreover, PCR may not be able to detect complex variants such as large gene conversions, deletions, or duplications, which are frequent in the case of the CYP21A2.
Southern blotting, a method used for detecting and quantifying a specific DNA sequence in DNA samples, also has limitations in analyzing CYP21A2. This method is time-consuming and requires a large amount of good-quality DNA, which makes it less applicable in routine diagnostic settings. This method comes with a radioactive biohazard, which poses safety concerns and makes it labor-intensive. Southern blotting is unable to detect the junction sites of chimeras. The CYP21A2 gene is prone to mismatch and rearrangement, producing different types of complex variations that include copy number variants, large gene conversions, small insertions/deletions, and single-nucleotide (SNP) variants. Southern blotting is not capable of detecting all these types of variants simultaneously. Besides that, southern blotting requires genetic analysis of the parents, which is not always feasible or practical.
Therefore, to analyze the CYP21A2 gene accurately, a more specialized and sensitive method is needed, such as targeted long-read sequencing, which can sequence longer DNA fragments and capture more information about the gene structure and variation. However, this method is not widely available or affordable for clinical use.
Protein
Steroid 21-hydroxylase, is a member of the cytochrome P450 family of monooxygenase enzymes, the protein has 494 amino acid residues with a molecular weight of 55,000. This enzyme is at most 28% homologous to other P-450 enzymes that have been studied.
Structurally, the protein contains an evolutionarily conserved core of four α-helix bundles (the importance of such genetic conservation is in demonstrating the functional importance of this aspect of this protein's structure). In addition, it has two additional alpha helices, two sets of β-sheets, and a heme cofactor binding loop. Each subunit in the human enzyme consists of a total of 13 α-helices and 9 β-strands that folds into a triangular prism-like tertiary structure.
The iron(III) heme group that defines the active site resides in the center of each subunit. The human enzyme binds one substrate at a time. In contrast, the well-characterized bovine enzyme can bind two substrates. The human and bovine enzyme share 80% amino acid sequence identity, but are structurally different, particularly in loop regions, and also evident in secondary structure elements.
Species
Variations of the steroid 21-hydroxylase can be found in all vertebrates.
Cyp21 first emerged in chordates before the speciation between basal chordates and vertebrates. The sea lamprey, an early jawless fish species that originated over 500 million years ago, provides valuable insights into the evolution and emergence of Cyp21. Sea lampreys lack the 11β-hydroxylase enzyme responsible for converting 11-deoxycortisol to cortisol as observed in mammals. Instead, they rely on 11-deoxycortisol, a product of a reaction catalyzed by CYP21, as their primary glucocorticoid hormone with mineralocorticoid properties. This suggests the presence of a complex and highly specific corticosteroid signaling pathway that emerged at least half a billion years ago during early vertebrate evolution.
In vertebrates, such as fish, amphibians, reptiles, birds, and mammals, Cyp21 participates in the biosynthesis of glucocorticoids and mineralocorticoids, therefore, Cyp21 is essential for the regulation of stress response, electrolyte balance and blood pressure, immune system, and metabolism in vertebrates.
Cyp21 is relatively conserved among mammals, and shows some variations in its structure, expression, and regulation. Rhesus macaques and orangutans possess two copies of Cyp21, while chimpanzees have three, still, a pseudogene (CYP21A1P) is only present in humans among primates.
Tissue and subcellular distribution
Steroid 21-hydroxylase is localized in microsomes of endoplasmic reticulum membranes within adrenal cortex. It is one of three microsomal steroidogenic cytochrome P450 enzymes, the others being steroid 17-hydroxylase and aromatase.
Unlike other enzymes of the cytochrome P450 superfamily of enzymes that are expressed in multiple tissues, with most abundant expression in the liver, in adult humans steroid 21-hydroxylase, along with steroid 11β-hydroxylase and aldosterone synthase, is almost exclusively expressed in the adrenal gland.
the main subcellular location for the encoded protein in human cells is not known, and is pending cell analysis.
Function
The enzyme, steroid 21-hydroxylase hydroxylates steroids at the C21 position. Steroids are a group of naturally occurring and synthetically produced organic compounds, steroids all share a four ring primary structure. The enzyme catalyzes the chemical reaction in which the hydroxyl group (-OH) is added at the C21 position of the steroid biomolecule. This location is on a side chain of the D ring.
The enzyme is a member of the cytochrome P450 superfamily of monooxygenase enzymes. The cytochrome P450 enzymes catalyze many reactions involved in drug metabolism and synthesis of cholesterol, steroids and other lipids.
Steroid 21-hydroxylase is essential for the biosynthesis of cortisol and aldosterone.
Mechanism
Steroid 21-hydroxylase is a cytochrome P450 enzyme that is notable for its substrate specificity and relatively high catalytic efficiency.
Like other cytochrome P450 enzymes, steroid 21-hydroxylase participates in the cytochrome P450 catalytic cycle and engages in one-electron transfer with NADPH-P450 reductase. Steroid 21-hydroxylase is highly specific for hydroxylation of progesterone and 17-hydroxyprogesterone. This is in marked contrast to the evolutionarily and functionally related P450 enzyme 17-hydroxylase, which has a broad range of substrates.
The chemical reaction in which steroid 21-hydroxylase catalyzes the addition of hydroxyl (-OH) to the C21 position of progesterone, 17α-hydroxyprogesterone and 21-desoxycortisone was first described in 1952.
Studies of the human enzyme expressed in yeast initially classified 17-hydroxyprogesterone as the preferred substrate for steroid 21-hydroxylase, however, later analysis of the purified human enzyme found a lower KM and greater catalytic efficiency for progesterone over 17-hydroxyprogesterone.
The catalytic efficiency of steroid 21-hydroxylase for conversion of progesterone in humans is approximately 1.3 x 107 M−1s−1 at 37 °C. This makes it the most catalytically efficient P450 enzyme of those reported to date, and catalytically more efficient than the closely related bovine steroid 21-hydroxylase enzyme. C-H bond breaking to create a primary carbon radical is thought to be the rate-limiting step in the hydroxylation.
Congenital adrenal hyperplasia
Genetic variants in the CYP21A2 gene cause a disturbance in the development of the enzyme, leading to congenital adrenal hyperplasia (CAH) due to 21-hydroxylase deficiency. Gene conversion events involving the functional gene and the pseudogene account for many cases of steroid 21-hydroxylase deficiency. CAH is an autosomal recessive disorder. There are multiple forms of CAH, defined as classical and nonclassical forms based on the amount of enzyme function still present in the patient.
The classical forms occur in approximately 1 in $10,000$ to 1 in $20,000$ births globally, and includes both the salt-wasting (excessive excretion of sodium via the urine causing hyponatremia and dehydration) and simple-virilizing forms. Complete loss of enzymatic activity causes the salt-wasting form. Variations in the structure of steroid 21-hydroxylase are related to the clinical severity of congenital adrenal hyperplasia. Cortisol and aldosterone deficits are associated with life-threatening sodium loss, as the steroids play roles in regulating sodium homeostasis. Simple-virilizing CAH patients (~1-2% enzyme function) maintain adequate sodium homeostasis, but exhibit other symptoms shared by the salt-wasting form, including accelerated growth in childhood and ambiguous genitalia in female neonates.
The nonclassical form is the mildest condition, retaining about 20% to 50% of enzyme function. This form is associated with mild and clinically silent cortisol impairment, but an excess of androgens post-puberty.
Non-classic congenital adrenal hyperplasia
Non-classical congenital adrenal hyperplasia caused by 21-hydroxylase deficiency (NCCAH) is a milder and late-onset congenital adrenal hyperplasia. Its prevalence rate in different ethnic groups varies from 1 in $1,000$ to 1 in $50$. Some people affected by the condition have no relevant signs and symptoms, while others experience symptoms of hyperandrogenism.
Women with NCCAH usually have normal female genitalia at birth. In later life, the signs and symptoms of the condition may include acne, hirsutism, male-pattern baldness, irregular menstruation, and infertility.
Fewer studies have been published about males with NCCAH comparing to those about females, because males are generally asymptomatic. Males, however, may present with acne and early balding.
While symptoms are usually diagnosed after puberty, children may present with premature adrenarche.
Research on other conditions
There is ongoing research on how Genetic variants in the CYP21A2 gene may lead to pathogenic conditions. A variant of this gene has been reported to cause autosomal dominant posterior polar cataract, suggesting that steroid 21-hydroxylase may be involved in the extra-adrenal biosynthesis of aldosterone and cortisol in the lens of the eye.
History
In the 1950s and 1960s, steroidogenic pathways that included cholesterol conversion to progesterone through a complex pathway involving multiple steps were identified, and, among them, a pathway for cortisol synthesis showing specific enzymatic steps that included hydroxylation reactions at position 21 (21-hydroxylation) mediated by cytochrome P450 enzymes. Cytochrome P450 enzymes were then described, and steroid 21-hydroxylation was associated with cytochrome P450.
In the 1980s and 1990s, partial-length bovine Cyp21 cDNA clones were identified as related to human CYP21A2. Researchers discovered mutations in the CYP21A2 gene associated with congenital adrenal hyperplasia (CAH).
From the 1990s onward, specific mutations were correlated with different forms/severity levels of CAH. Genotype/phenotype correlations were investigated for improved diagnostic accuracy. | WIKI |
Talk:Penticton Vees
Fair use rationale for Image:Penticton Vees.JPG
Fair use rationale has been completed. Flibirigit (talk) 19:51, 3 April 2008 (UTC)
Notable alumni
I am going to be sorting the alumni into sub sections for the "Broncos", "Knights" and "Panthers." Flibirigit (talk) 19:51, 3 April 2008 (UTC)
Why are the alumni sorted under the category 'Origins of the team name,' and not a history of the team category or their own category for alums? Iheartthestrals (talk) 05:19, 3 July 2015 (UTC)
Name
Where did the name Vees come from??<IP_ADDRESS> (talk) 18:39, 27 January 2011 (UTC)
* The "V" comes from the three varieties of peaches cultivated in the area, all starting with a V. DMighton (talk) 22:42, 27 January 2011 (UTC) | WIKI |
Page:A Tour Through the Batavian Republic.djvu/86
74 and a poet who lashed the worst profligacy of a debauched age styles it, "Pietaticultrix, gracilipes, crotalistria." The attention of this bird to its aged parents, in defending them against attack, and furnishing them with food, is a fact too well established to be doubted; but I cannot bear testimony to the elegance of its form, or the harmony of its voice. Its legs are long, and, though admirably fitted for its modes of life, extremely disproportionate to the size of its body; and the only sounds which I heard it emit were piercing and dissonant screams. I, however, regard the stork with favour, and am pleased with the prejudice which protects the pia avis of Greece and Rome.
At the distance of a mile from the Hague, is the house in the wood; a place of retirement which belonged to the stadtholder, but is now converted into a receptacle for the national cabinet of pictures, except a suite of apartments which are occupied by the keeper of a tavern of no very decent character. It reflects little credit on those who are charged with the care of the national domains, and from their functions must in some measure | WIKI |
Cystic Fibrosis: What Is It and What Are Some Common Treatments?
What Is Cystic Fibrosis? Who Gets CF?
In the United States, an estimated 30,000 people have been diagnosed with cystic fibrosis (CF), according to the Cystic Fibrosis Foundation. CF is classified as an autosomal recessive disorder. This simply means that for the disease to develop, two copies of the abnormal gene are necessary. When two people who are genetic CF carriers conceive a child, there is a 25 percent chance of the child having the disease. It is estimated that more than 1,800 CF mutations exist, according to an excerpt published on ScienceDirect.
What Does CF Do?
CF causes damage to the cells responsible for producing sweat, mucus, and digestive juices. This results in the accumulation of a sticky, thick mucus in the pancreas, lungs, and other organs. The mucus can trap bacteria and obstruct airways, which can cause lung damage and frequent lung infections. Over time, patients may experience respiratory failure.
Within the pancreas, the accumulation of mucus inhibits digestive enzyme release. This makes it much harder for the body to absorb critical nutrients and break down the food the patient eats.
Newborn babies are routinely screened for this condition in the United States. Adults and older children can also be tested if they start to display CF symptoms, however. This typically involves a sweat test and genetic testing.
Common Medications
Symdeko – This is an oral medication prescribed to patients age 12 and older. This drug focuses on CFTR protein defects and strives to essentially correct them. This can help create a better balance of water and salt in the lungs, making it easier to breathe due to less mucus accumulation.
The list price is $292,000 per year or roughly $23,400 per month
Kalydeco – This is a targeted CF drug designed for those with specific CFTR gene mutations. This accounts for approximately four to five percent of patients with cystic fibrosis. This medication allows more time for chloride ions to get out of cells and into them. This helps to ensure a better balance of water and salt in the lungs. This helps to reduce mucus accumulation in the lungs so that patients may breathe easier. Patients who are at least two years old may be prescribed this drug.
The list price is $34,221,60 monthly. Certain coupons can reduce this price to $23,737.41.
Pulmozyme – This drug works like a type of synthetic protein to break down the pulmonary secretion’s excess DNA in CF patients. By thinning these secretions, patients can be put at a lower risk for lung infections and may able to breathe easier. CF patients who are at least five years old may be prescribed this drug. Efficacy and safety is still being tested in patients under five.
The list price is $4,096 monthly. Coupons can cut this cost to $3,432. The official Pulmozyme site also offers discounts for eligible individuals via a Co-pay Card Program, and can cover up to $10,000 per year after certain conditions are met.
Orkambi – This drug may be prescribed to those with CF age two and older. This drug is designed for those with specific gene mutations associated with CF. The purpose of this medication is to target the underlying cause of this condition. The goal is to correct the CFTR proteins that are defective to help to reduce how much mucus is produced.
The list price is $30,695.75 monthly. Coupons can reduce this cost to $20,781.35. The HealthWell Foundation Copay Program offer discounts for those who meet its requirements.
Creon – This drug contains three pancreatic enzymes, including protease, lipase, and amylase. They play an integral role in protein, sugar, and fat digestion. When the pancreas of CF patients is not producing sufficient amounts of these enzymes, this drug may be prescribed to help replace them. This is an oral medication that should be taken with food.
The average retail price is $661.70 monthly. Coupons can cut this price to $518.97. Those with commercial prescription insurance coverage may qualify for a copay card that could bring the cost of this drug to as low as $5 per month, once certain conditions are met.
Cayston – This drug is an antibiotic that is prescribed when patients have bacterial infections that are considered to be life-threatening or severe. It is an inhaled medication that kills the bacteria while helping to improve breathing. Patients age seven and older can use this medication.
The average retail price is $13,771.43 monthly. Coupons can cut the price to $8,492.40.
This article should not replace the advice of a licensed medical professional. Only a doctor should diagnose a condition and create a treatment plan.
DISCLAIMER: The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of the site owner or any brands and companies mentioned here. Any content provided by our bloggers or authors are of their opinion, and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything. This article is purely for reference purposes and does not constitute professional advice and may not be reflective of the best choice for your unique situation. This site strives to provide as much accurate information as possible; however, sometimes products, prices, and other details are subject to change. Therefore, this site does not verify for the accuracy of the information presented in this article. This site does not assume any liability for any sort of damages arising from your use of this site and any third party content and services. | ESSENTIALAI-STEM |
User:ElsaLiner/sandbox
Practicing Citations
Today, every developing country realises that, without investing in engineering, technology and science education, the country cannot progress economically, socially and politically.
The definitions of good governance advocated by Stoker, Rhodes, Pierre and Peters, Hirst, Nanda and the United Nations Development Programme (UNDP) focus mainly on accountability in the public sector and the institutional capacity of the executive branch of the state.
An engineer should give priority and utmost importance to the public health and safety during doing any work related to his profession.
The persons who are now Corporate Members of The Institution and all such persons as may hereafter become Corporate Members of The Institution shall forever hereafter, so long as they continue to be such Corporate Members, be one Body Corporate by the name of "The Institution of Engineers, Bangladesh", and a Common Seal with power to break, alter and make a new the said Seal from time to time at Iheir will and pleasure and by the same name shall and may sue and be sued in all the courts, and in all manner of actions and suits, shall have power to do all other matters and things incidental to appertaining to a Body Corporate including the power to take and hojd lands, tenements, hereditaments or any/ interest in any lands, tenements, hereditaments, whatsoever in Bangladesh and abroad for the purpose of the Institution and power to sell, let on lease, alienate or otherwise dispose of the same or any part thereof.
= Answers to Module 7 Questions =
= Notes = | WIKI |
User:Vishalsrivastava009
Vishal Srivastava "Prathmesh" is an Indian politician and also a well speaker. he is a fire brand leader of samajwadi party Working for social welfare since 2009. Also wellknown speaker and youth leader. | WIKI |
Wikipedia:Articles for deletion/Jewel and Esk College
The result was keep__EXPECTED_UNCONNECTED_PAGE__. Liz Read! Talk! 03:07, 27 August 2023 (UTC)
Jewel and Esk College
* – ( View AfD View log | edits since nomination)
There are no references and the college no longer exists after merging with two other colleges over 10 years ago to former Edinburgh College.
I don't believe it meets WP:GNG
I see Two Options, Deletion or Merge with Edinburgh college 1keyhole (talk) 04:49, 6 August 2023 (UTC)
* Note: This discussion has been included in the list of Schools-related deletion discussions. 1keyhole (talk) 04:49, 6 August 2023 (UTC)
* Note: This discussion has been included in the list of Scotland-related deletion discussions. -- A. B. (talk • contribs • global count) 05:00, 6 August 2023 (UTC)
* I left a notification at Talk:Edinburgh College. -- A. B. (talk • contribs • global count) 05:02, 6 August 2023 (UTC)
* Keep. Meets WP:GNG. Note the former name for the same institution "Jewel and Esk Valley College". This is one of those community schools with hundreds upon hundreds of news articles over many years, most short. (Search proquest, for example, for the phrase "Jewel and esk valley college").
* 800+ words of SIGCOV in Management Services Journal which is a trade magazine with relatively standard practices
* MSP visit, 187 words
* 600+ words about shuttering a small campus
* A bit of history in this obit, about 120 words.
* Some coverage in Nursing Times, paywalled . Not sure how deep this coverage is.
* This list is not close to being exhaustive, as, again, there are hundreds of articles in total.
* Given that notability is WP:NOTTEMPORARY, and sigcov exists across several years, deletion would not be the best outcome here. A merge might be ok at some point, but Edinburgh College is not in the best of states at the moment either, so I don't necessarily recommend rushing it as part of an AFD. Long term this would slide nicely into a History of Edinburgh College article. —siroχo 06:48, 6 August 2023 (UTC)
* The number of words spent on a subject is irrelevant towards notability. It is the depth of the coverage that counts. The Banner talk 12:01, 8 August 2023 (UTC)
* The Banner, The number of words, while an imperfect measure, provides some "depth perception". While six words is not likely to provide sufficient depth, 600 very likely does. Many thanks to Siroxo for providing this useful information. — Jacona (talk) 00:45, 24 August 2023 (UTC)
* I have to disappoint you in this matter. The Banner talk 09:50, 24 August 2023 (UTC)
* The Banner, Indeed. — Jacona (talk) 15:40, 24 August 2023 (UTC)
* I know, but lots of words spent on insignificant issues does not help notability but a limited text about a significant issue can do so. The Banner talk 18:25, 24 August 2023 (UTC)
* visits by Members of Parliament and Members of the Scottish Parliament to schools, colleges, and universities are quite common, and such visits do not necessarily augment the significance of these institutions. 1keyhole (talk) 06:31, 9 August 2023 (UTC)
Relisting comment: Relisting, I'd like more evaluation of the sources found and, hopefully, the decent ones added to the article. I'm reluctant to close as Keep a completely unsourced article. Also consider the nominator's suggestion of a Merge to Edinburgh College. Please add new comments below this notice. Thanks, Liz Read! Talk! 04:22, 13 August 2023 (UTC)
* Note: This discussion has been included in the list of Education-related deletion discussions. Spiderone (Talk to Spider) 10:02, 6 August 2023 (UTC)
* Keep. Appears to meet WP:GNG per above. -- Necrothesp (talk) 13:29, 7 August 2023 (UTC)
* Seems to meet the requirements per Siroxo, however no strong opinions between keeping it and merging into Edinburgh College or making a History of Edinburgh College article. Those references need to be added to the article by someone though. - Indefensible (talk) 04:47, 12 August 2023 (UTC)
* Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Liz Read! Talk! 03:53, 20 August 2023 (UTC)
* Keep I've added references and improved the article, the article looks good now! Tails Wx (they/them) 06:10, 13 August 2023 (UTC)
* Merge with Edinburgh College. Half of the present article is about the campus (i.e. the buildings) and not about the institute. On the other hand Edinburgh College is missing a history section and info about it predecessors. The Banner <i style="color:maroon">talk</i> 19:23, 15 August 2023 (UTC)
* <p class="xfd_relist" style="margin:0 0 0 -1em;border-top: 1px solid #AAA; border-bottom: 1px solid #AAA; padding: 0px 2em;"> Relisted to generate a more thorough discussion and clearer consensus.
* The above discussion is preserved as an archive of the debate. <b style="color:red">Please do not modify it.</b> Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page. | WIKI |
Delirium vs Dementia: What is The Difference?
Share This Post
If you are providing care for a loved one and begin to observe changes in their mental condition, such as a deterioration in memory or disorientation, your initial impression might be that dementia is the cause of these symptoms.
However, delirium is another possibility of the cause of the problem. As these two illnesses have numerous similar symptoms, distinguishing one from the other can be challenging.
Dementia and delirium both impair a person’s capacity for rational thought and their ability to look after themselves. They do exhibit certain indications and symptoms that are comparable to one another. However, each condition’s causes and treatments, are distinct.
The condition known as delirium is considered a medical emergency and needs to be treated right away. On the other hand, it is frequently confused with dementia. This is because both of these illnesses can manifest simultaneously in certain people.
Discover the differences between the two and what you could do to assist a person who exhibits symptoms of one or both conditions.
Delirium
Delirium, also known as acute confusion, is a significant and acute medical illness in which a person’s mental ability is compromised directly due to the condition. It manifests within a relatively short period (often within hours or days), and symptoms tend to fluctuate throughout the day.
It is a disorder that frequently occurs in elderly patients who are hospitalized, but it is also possible, albeit less frequently, for it to manifest in people who are not confined to a healthcare facility. There is a possibility that delirium can be avoided in up to two-thirds of hospitalized patients, and even if it does occur, it is frequently treated.
Distress is caused by delirium for the individual experiencing it, their relatives, and the medical professionals treating them.
Dementia
A person is said to have dementia if they exhibit a spectrum of symptoms that indicate their brain is losing function. Over time, a person who has dementia will have a diminished capacity for thinking, remembering, and communicating with others. This condition gets progressively worse over time.
After some time has passed, people will have difficulty carrying out routine activities and following directions. In addition, the individual will have difficulty communicating with and comprehending other people. For example, a person who has dementia may, over time, forget who people are, and have trouble remembering where they are.
Differences Between Delirium And Dementia
1. The Time Frame And Reversibility
With dementia, there is no treatment or cure. One notable case in point is Alzheimer’s disease, which is the most prevalent kind of dementia.
On the contrary, delirium is not a persistent condition. In point of fact, when someone’s confusion is caused by delirium, the disorientation itself will typically reduce and go entirely in the days and weeks after the diagnosis of the condition.
There will always be exceptions, but in most cases, a person’s mental condition will recover to where it was before they entered delirium. In contrast to dementia, delirium may be treated and hence has a shorter duration of symptoms.
2. The Initial Signs And Symptoms
Even while dementia and delirium share signs of confusion, the specific symptoms of each condition are distinct. Dementia progresses gradually over the course of several years.
On the other hand, delirium manifests itself suddenly within a few hours or a few days at the most. In cases of dementia, it is sometimes difficult to pinpoint the exact moment when the confusion first emerged, but in cases of delirium, it is frequently easy to do so.
It is important to be aware that the individual’s level of confusion in delirium is more likely to fluctuate than it is in dementia. A person with delirium may experience significant improvement or worse over a single day or even in the course of a few hours. Cognitive fluctuations are the term used to describe these occurrences.
Although cognitive fluctuations can still be be present in dementia, they more commonly develop over the course of a longer length of time.
3. The Underlying Causes And Contributing Factors
It seems to be the reason that the causes of dementia and delirium are distinct, given that dementia develops gradually whereas delirium comes on quickly. There is still no conclusive evidence to support a single factor that brings on delirium.
Medical research has discovered that delirium can be caused by a combination of several factors. These can include some of the following: infection, poor nutrition, isolation, age, medications, impaired vision and hearing, a high burden of medical diseases, dehydration, and dementia. Having dementia raises the likelihood of experiencing an episode of delirium in addition to dementia.
Regardless of whether dementia exists or not, delirium can only arise in the presence of specific triggers. These include any occurrences that generate considerable strain, such as infections, falls, surgery, being admitted to the hospital, or prescription mistakes, for example.
These particular causes can bring on delirium, but they cannot bring on dementia.
4. The Treatment Strategies
Managing Both the symptoms of delirium and dementia are treatable, although each treatment is different. The objective of managing the symptoms of dementia is to help manage the symptoms that interfere with everyday life, but dementia is progressive, meaning it will get worse over time despite the medication options available.
Unfortunately, even while there are medications available to help manage the symptoms dementia, none of them can actually cure dementia.
When delirium is present, the confused condition can be totally reversed. Therefore, certain medications are only used for intermittent periods of time and on an as-needed basis.
However, the primary focus of treatment is to identify and address the underlying causes of delirium in order to alleviate its symptoms. After the triggering factor has been eradicated, the brain will heal on its own, and the confusion will begin to go away.
What Can You do to Assist Older People Who Are Confused?
If you are concerned about the mental condition of a loved one and have noticed that they appear confused, talk to their physician. It is crucial to be aware that delirium nearly often implies a severe medical problem that requires prompt medical attention.
1. Maintain Your Connection
Maintain a consistent line of communication with the member of your family or close friend whom you care for. If you do not live close to them, you can consider the use of techology to keep in contact with them and keep an eye on their health and wellness.
2. Pay Close Attention to The Various Changes
Nobody knows your friend or family member as well as you do. Your loved one will be able to receive the treatment and care they require as quickly as possible if you pay attention to small changes in their condition that the attending physician or hospital personnel may overlook.
3. Speak Up
Does the person you love appear overly reserved and far away? Do they appear to be puzzled and lost in their surroundings? Notify the doctor if you see that they are not acting like themselves completely.
4. Seek Emergency Medical Attention
If you observe any sudden shifts in the mental state or the behavior of a senior loved one, you should seek emergency medical assistance.
5. Discuss Unexpected Symptoms
Talk to your doctor about any strange symptoms or behaviors you’ve been experiencing, even if you’re not sure if there’s a connection between the two. Always remember to carry a list of all of your loved one’s prescriptions with you to appointments.
6. Help Them While They Recover
Even though the symptoms of delirium are often very transient, it may take a little time for people to recover from an episode of delirium after having one fully.
Be ready to assist your loved one with day-to-day tasks during this period, or look into other care choices, including a short-term respite care stay at an assisted care center, which may assist with things like meals, dressing, bathing, and managing medications, among other things.
Delirium Among Those Affected by Dementia
Delirium is different from dementia, but some of the symptoms can be similar. People of a certain age may experience either one of them independently or both at the same time.
The existence of dementia makes it more likely that delirium will develop in the affected individual’s brain. Delirium is roughly five times more likely to occur in people who have dementia, regardless of whether or not dementia has been identified.
Even though the duration and pattern of symptoms are different for each condition, delirium and dementia share a number of signs in common. As a consequence of this, delirium may pass unnoticed, even by those who work in the medical field.
It’s imporant to discuss and new onset of symptoms with a healthcare provider. When the signs of delirium are incorrectly attributed to dementia that has not been properly identified, this can have catastrophic effects and postpone the treatment of the real diagnosis. After many weeks, patients who have been mistakenly diagnosed with dementia may appear to be in a nearly normal state.
In most cases, the sudden onset of symptoms and variation in delirium help in the classification process. Additionally, the input from family members or other significant people is essential in order to differentiate delirium from underlying dementia.
There is some evidence to show that delirium may speed up the cognitive decline that is already present in patients who have dementia. People in the final stages of dementia typically exhibit symptoms comparable to those of delirium. In addition, those who have Lewy body disease are more likely to suffer from delirium, which is distinct from a simple worsening of the symptoms of Lewy body disease.
To Wrap Up
An abrupt change in state is one of the defining features of delirium, which is why it has to be handled as a medical emergency.
The effects of delirium may persist anywhere from a few days up to a couple of months and can typically be treated. On the other hand, dementia is a progressive condition that results in brain cell death, and this is irreversible.
In many different ways, delirium has been related to dementia. The two conditions are, in fact, extremely interwoven with one another. For example, following an episode of delirium, a person with dementia may have a discernible worsening of their symptoms.
There are cases in which an older person does not have a dementia diagnosis prior to suffering delirium but may obtain one shortly afterward. According to the Alzheimer’s Society, this phenomenon is referred to as delirium “uncovering” dementia in the patient.
You, as a caregiver, know your loved one better than anybody else. If you notice a rapid change in the person’s demeanor or the appearance of a new symptoms, make sure to inform the attending physician of any symptoms of delirium. This is crucial so the physican can further address in order to come up with an appropriate individualized treatment plan.
References
Subscribe To Our Newsletter
Get updates and learn from the best
More To Explore
Discover The 10 Essential Caregiving TipsTo Make Your Journey Less Stressful
Enter Your Name + Email To Recieve The FREE Guide
Check Your Email! | ESSENTIALAI-STEM |
Rosemarie Tong
Rosemarie "Rosie" Tong is an American feminist philosopher. The author of 1998's Feminist Thought: A More Comprehensive Introduction, an overview of the major traditions of feminist theory, she is the emeritus distinguished professor of health care ethics in the Department of Philosophy at the University of North Carolina, Charlotte.
Tong's research is focused on ethical issues in long-term care, cognitive enhancement and genetics. She has been recognized for contributions to bioethics, health care reform, genetic and reproductive technology, and the implications of caregiving for parents and children, a role performed primarily by women.
Early life
Tong was born Rosemarie Behensky in Chicago to Joseph J Behensky (1924-2005) and Lillian Ann Nedved (1924-1981), both of Czech ancestry. Her paternal grandfather was an immigrant from Nehodiv.
Education
Tong holds a BA in religious studies and German from Marygrove College, an MA in philosophy from Catholic University and a PhD from Temple University. Her MA thesis was on the 19th-century German philosopher Wilhelm Dilthey. She earned her PhD with a dissertation titled "Towards a Rational reconstruction of Anglo-American Criminal Law: The Insanity Defense."
Career and affiliations
Tong has held professorships at Williams College and Lafayette College. She was the Thatcher Professor in Medical Humanities at Davidson College until 1999, when she began her professorship at the University of North Carolina.
She chaired the American Philosophical Association's Committee on the Status of Women from 2003-2007. From 1999-2002 she was the co-coordinator of the International Network for Feminist Approaches to Bioethics. Tong has also served as chair of the Institutional Review Board's Conflict of Interest Committee at Chesapeake Research, Inc., co-chair of the North Carolina Institute of Medicine's Task Force on Pandemic Influenza, and on the boards of the U.S. Women's Bioethics Project, the North Carolina Biotechnology Center and the Association for Practical and Professional Ethics.
Tong has been a consultant to the Advanced Center for Learning Studies, the Fulbright Foundation, the Hastings Center, the National Advisory Board on Ethics and Reproduction, and curricular programs involving medical humanities bioethics and women's studies. She has received grants from the Sloan Foundation, the Ford Foundation, the Fullerton Foundation and the National Endowment for the Humanities.
She has written 13 books and more than 100 papers, and was the series editor of the Point/Counterpoint series and the New Feminist Perspectives series from Rowman and Littlefield Press.
In Feminist Thought, Tong describes intersectionality and its importance to the globalization of feminism. Tong explains the different sections of feminism that have emerged throughout the years. Tong suggests that intersectionality represents the commitment of women and global feminists, regardless of culture, to "widen the scope of feminist thought." Although global feminism is defined by the sexual issues and gender discrimination of women, its personal twist stems from the political and economic disparities. "Third World" women are far more concerned with the latter disparities separating them from their privileged oppressors. The political agenda of the western world has direct implications on the globalization of the rest of the world, the "non-west."
Personal life
Her first husband, Dr. Paul Ki King Tong, was a Chinese immigrant and professor at Glassboro State College. The couple had two sons. After Paul died in 1988, she married Jeremiah Putnam. Her son Paul died in 2013.
Author
* New Perspectives in Healthcare Ethics: An Interdisciplinary and Crosscultural Approach (Basic Ethics in Action), Westview Press, Mar 3, 2006
* Feminist Approaches To Bioethics: Theoretical Reflections And Practical Applications, Westview Press, Dec 27, 1996
* Feminine and Feminist Ethics, Westview Press Mar 1, 1993
* Feminist Thought: A More Comprehensive Introduction, Westview Press, 1989
* Women, Sex, and the Law (New Feminist Perspectives),Dec 27, 1989
* Ethics in Policy Analysis (Occupational Ethics Series), Prentice-Hall, Jan 1986
Co-author and co-editor
* Globalizing Feminist Bioethics (co-authored with Aida Santos and Gwen Anderson)
* Feminist Philosophy: Essential Readings in Theory, Reinterpretation, and Application' (Co-edited with Nancy Tuana) Westview, 1994,
* Feminist Philosophies: Problems, Theories, and Applications (Co-edited with James Sterba and Janet Kourany) Prentice-Hall, 1991. | WIKI |
File talk:Castro Battle of Actium.jpg
Error: Broken link
At "Description" the link "download from" points to http://www.rmg.co.uk/mag/images/700/BHC0251_700.jpg, which is a broken link.
Pedrassani (talk) 21:12, 31 January 2012 (UTC) | WIKI |
Diocese of Marsabit
Diocese of Marsabit may refer to:
* One of the Anglican dioceses of Mount Kenya
* Roman Catholic Diocese of Marsabit | WIKI |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.