Document
stringlengths
87
1.67M
Source
stringclasses
5 values
SugarCRM SupportProduct GuidesSugar DeveloperSugar Developer Guide 8.0Data FrameworkModelsSugarBean SugarBean Overview The SugarBean class supports all the model operations to and from the database. Any module that interacts with the database utilizes the SugarBean class, which contains methods to create, read/retrieve, update, and delete records in the database (CRUD), as well as fetch related records. CRUD Handling The SugarBean handles the most basic functions of the Sugar database, allowing you to create, retrieve, update, and delete data.  Creating and Retrieving Records The BeanFactory class is used for bean loading. The class should be used whenever you are creating or retrieving bean objects. It will automatically handle any classes required for the bean. More information on this can be found in the BeanFactory section. Obtaining the Id of a Recently Saved Bean For new records, a GUID is generated and assigned to the record id field. Saving new or existing records returns a single value to the calling routine, which is the id attribute of the saved record. The id has the following format: aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee You can retrieve a newly created record's id with the following: //Create bean $bean = BeanFactory::newBean($module); //Populate bean fields $bean->name = 'Example Record'; //Save $bean->save(); //Retrieve the bean id $record_id = $bean->id; Saving a Bean with a Specific ID Saving a record with a specific id requires the id and new_with_id attribute of the bean to be set. When doing so, it is important that you use a globally unique identifier. Failing to do so may result in unexpected behavior in the system. An example setting an id is shown below: //Create bean $bean = BeanFactory::newBean($module); //set the new flag $bean->new_with_id = true; //Set the record id with a static id $id = '38c90c70-7788-13a2-668d-513e2b8df5e1'; $bean->id = $id; //or have the system generate an id for you //$id = Sugarcrm\Sugarcrm\Util\Uuid::uuid1() //$bean->id = $id; //Populate bean fields $bean->name = 'Example Record'; //Save $bean->save(); Setting new_with_id to true prevents the save method from creating a new id value and uses the assigned id attribute. If the id attribute is empty and the new_with_id attribute is set to true, the save will fail. If you would like for the system to generate an id for you, you can use Sugarcrm\Sugarcrm\Util\Uuid::uuid1(). Distinguishing New from Existing Records To identify whether or not a record is new or existing, you can check the fetched_rows property. If the $bean has a fetched_row, it was loaded from the database. An example is shown below: if (!isset($bean->fetched_row['id'])) { //new record } else { //existing record } If you are working with a logic hook such as before_save or after_save, you should check the arguments.isUpdate property to determine this as shown below: <?php if (!defined('sugarEntry') || !sugarEntry) die('Not A Valid Entry Point'); class logic_hooks_class { function hook_method($bean, $event, $arguments) { if (isset($arguments['isUpdate']) && $arguments['isUpdate'] == false) { //new record } else { //existing record } } } ?> Retrieving a Bean by Unique Field Sometimes developers have a need to fetch a record based on a unique field other than the id. In previous versions you were able to use the retrieve_by_string_fields() method to accomplish this, however, that has now been deprecated. To search and fetch records, you should use the SugarQuery builder. An example of this is shown below: require_once('include/SugarQuery/SugarQuery.php'); $sugarQuery = new SugarQuery(); //fetch the bean of the module to query $bean = BeanFactory::newBean('<modules>'); //create first query $sql = new SugarQuery(); $sql->select('id'); $sql->from($bean); $sql->Where()->equals('<field>', '<unique value>'); $result = $sql->execute(); $count = count($result); if ($count == 0) { //no results were found } elseif ($count == 1) { //one result was found $bean = BeanFactory::getBean('<module>', $result[0]['id']); } else { //multiple results were found } Updating a Bean You can update a bean by fetching a record and then updating the property: //Retrieve bean $bean = BeanFactory::retrieveBean($module, $id); //Fields to update $bean->name = 'Updated Name'; //Save $bean->save(); Note: Disabling row-level security when accessing a bean should be set to true only when it is absolutely necessary to bypass security, for example, when updating a Lead record from a custom Entry Point. An example of accessing the bean while bypassing row security is: $bean = BeanFactory::retrieveBean($module, $record_id, array('disable_row_level_security' => true)); Updating a Bean Without Changing the Date Modified The SugarBean class contains an attribute called update_date_modified, which is set to true when the class is instantiated and means that the date_modified attribute is updated to the current database date timestamp. Setting update_date_modified to false would result in the date_modified attribute not being set with the current database date timestamp. //Retrieve bean $bean = BeanFactory::retrieveBean($module, $id); //Set modified flag $bean->update_date_modified = false; //Fields to update $bean->name = 'Updated Name'; //Save $bean->save(); Note: Disabling row-level security when accessing a bean should be set to true only when it is absolutely necessary to bypass security, for example, when updating a Lead record from a custom Entry Point. An example of accessing the bean while bypassing row security is: $bean = BeanFactory::retrieveBean($module, $record_id, array('disable_row_level_security' => true)); Deleting a Bean Deleting a bean can be done by fetching it then calling the mark_deleted() method which makes sure any relationships with related records are removed as well: //Retrieve bean $bean = BeanFactory::retrieveBean($module, $id); //Set deleted to true $bean->mark_deleted($id); //Save $bean->save(); Note: Disabling row-level security when accessing a bean should be set to true only when it is absolutely necessary to bypass security, for example, when updating a Lead record from a custom Entry Point. An example of accessing the bean while bypassing row security is: $bean = BeanFactory::retrieveBean($module, $record_id, array('disable_row_level_security' => true)); Fetching Relationships This section explains how the SugarBean class can be used to fetch related information from the database. To fetch related records, load the relationship using the link: //If relationship is loaded if ($bean->load_relationship($link)) { //Fetch related beans $relatedBeans = $bean->$link->getBeans(); } An example of this is to load the contacts related to an account: //Load Account $bean = BeanFactory::getBean('Accounts', $id); //If relationship is loaded if ($bean->load_relationship('contacts')) { //Fetch related beans $relatedBeans = $bean->contacts->getBeans(); } To fetch only related record IDs, load the relationship using the link: //If relationship is loaded if ($bean->load_relationship($link)) { //Fetch related record IDs $relatedBeans = $bean->$link->get(); } An example of this is to load the record IDs of contacts related to an account: //Load Account $bean = BeanFactory::getBean('Accounts', $id); //If relationship is loaded if ($bean->load_relationship('contacts')) { //Fetch related beans $relatedBeans = $bean->contacts->get(); } Fetching a Parent Record Fetching a parent record is similar to fetching child records in that you will still need to load the relationship using the link: //If relationship is loaded if ($bean->load_relationship($link)) { //Fetch related beans $relatedBeans = $bean->$link->getBeans(); $parentBean = false; if (!empty($relatedBeans)) { //order the results reset($relatedBeans); //first record in the list is the parent $parentBean = current($relatedBeans); } } An example of this is to load a contact and fetch its parent account: //Load Contact $bean = BeanFactory::getBean('Contacts', $id); //If relationship is loaded if ($bean->load_relationship('accounts')) { //Fetch related beans $relatedBeans = $bean->accounts->getBeans(); $parentBean = false; if (!empty($relatedBeans)) { //order the results reset($relatedBeans); //first record in the list is the parent $parentBean = current($relatedBeans); } } Topics This article covers how to extend core SugarBean objects to implement custom code. This can be used to alter the stock assignment notification message or to add logic to change the default modules behavior. This article covers how to implement custom SugarBean templates, which can then be extended by custom modules. It also covers vardef templates, which can more portable and used by multiple modules. By default, Sugar comes with a few templates such as Company, Person, Issue, and File templates. Last modified: 2018-07-20 12:55:44
ESSENTIALAI-STEM
Ewarton Airstrip Ewarton Airstrip is an airstrip serving the town of Ewarton and the WINDALCO bauxite mine in the Saint Catherine Parish of Jamaica. There is distant rising terrain to the northwest. The Manley VOR/DME (Ident: MLY) is located 22.1 nmi southeast of the runway.
WIKI
Help talk:Contents/Archive 1 Updated Help:Contents I've updated the Help:Contents page and moved the old page to Help:Contents/Old if users are still wanting to use the old Layout, a few users have been working on this within my own userspace - however though no links are missing from the old Layout page - however since users have been assisting with the page they've added a few more links which maybe useful. Terra 19:28, 21 April 2008 (UTC) * Well done, Terra, thanks for your efforts here - a much improved help page! -- Jtneill - Talk 00:40, 22 April 2008 (UTC) * Thanks, and thank you to those who helped out as well. I'll try and finish of the other pages within the Userpage Contents, once they're completed I'll move them to it's own page. Terra 19:54, 22 April 2008 (UTC)
WIKI
Penang State Executive Council The Penang State Executive Council is the executive authority of the state government of Penang, a Malaysian state. Led by the Chief Minister, the head of government who is appointed by Penang's head of state, the Governor, the Executive Council also comprises between four and ten other State Assemblymen from the Penang State Legislative Assembly, as well as the State Secretary, the State Legal Adviser and the State Financial Officer. While being smaller in size, the Penang State Executive Council is analogous in structure and role to the Malaysian Federal Cabinet. As federal and state responsibilities differ, there are a number of portfolios that differ between the federal and state governments. The Executive Council is collectively responsible to the Penang State Legislative Assembly. Appointment of the Executive The Chief Minister, as Penang's head of government, must be appointed by the Governor of Penang (Malay: Yang di-Pertua Negeri Pulau Pinang) on the basis that the former commands the confidence of a majority of the State Assemblymen in the Penang State Legislative Assembly. On the advice of the Chief Minister, the Governor shall form the Penang State Executive Council by appointing "not more than ten nor less than four other members" from among the State Assemblymen. Aside from the Executive Council, the Governor shall also appoint another three executive officers, namely the State Secretary, the State Legal Adviser and the State Financial Officer. * The State Secretary serves as the principal officer who handles the administrative affairs of the State. * The State Legal Adviser shall provide advice on legal matters upon request from either the Governor or the state government. * The State Financial Officer is in charge of the financial affairs of the State. These officers retain the right to participate in the proceedings of the Executive Council and may be appointed to any of the committees in the council. However, they are not permitted to vote in the Executive Council or within any of the committees. Before exercising the duties of the executive office, an incoming member of the Executive Council must take and subscribe the Oath of Office and Allegiance in the presence of the Governor. The Oath of Office and Allegiance reads as follows."I, [name], having been appointed to the office of [name of office], do solemnly swear [or affirm] that I will faithfully discharge the duties of that office to the best of my ability, that I will bear true faith and allegiance to the State of Penang, and that I will preserve, protect and defend the Constitution of the State of Penang."In addition, every incoming member of the Executive Council, plus the State Secretary, the State Legal Adviser and the State Financial Officer, must also take and subscribe the Oath of Secrecy before the Governor. The Oath of Secrecy is as follows."I, [name], do solemnly swear [or affirm] that I will not directly or indirectly communicate or reveal to any person any matter which shall be brought under my consideration or shall become known to me as a member of the Executive Council of the State of Penang except as may be required for the due discharge of my duties as such or may be specially permitted by the Yang di-Pertua Negeri." Vacation of office Any member of the Penang State Executive Council, apart from the Chief Minister, shall hold office at the Governor's pleasure, but may at any time resign from his or her position. If the Chief Minister ceases to command the confidence of the majority of the State Assemblymen in the Penang State Legislative Assembly, the Chief Minister shall tender the resignation of the entire Executive Council. However, in this particular circumstance, the Chief Minister also reserves the option to advise the Governor to dissolve the Legislative Assembly, thus paving the way for fresh state-level election. Aside from that, the Executive Council ceases to exist upon the vacancy of the Office of the Chief Minister, unless the vacancy arises while the Legislative Assembly is dissolved. Chow Kon Yeow II EXCO Members since 13 August 2023 have been : Ex officio members The State Secretary, the State Legal Adviser and the State Financial Officer are the ex officio members of the Executive Council. Chow Kon Yeow I EXCO Members from 14 May 2018 to 13 August 2023 were :
WIKI
Category Archives: FreeBSD ports collection devel/py-setuptools27 renamed to devel/py27-setuptools r436290 renamed devel/py-setuptools27 to devel/py27-setuptools. Here are four portupgrade commands to make amends: portupgrade -ncfpvo devel/py27-setuptools devel/py-setuptools27 portupgrade -fpvo devel/py27-setuptools devel/py-setuptools27 portupgrade -ncfprvx devel/py27-setuptools devel/py27-setuptools portupgrade -fprvx devel/py27-setuptools devel/py27-setuptools Run similar commands for updating the origin of, say, devel/py-setuptools36 to devel/py36-setuptools. Upgrading Qt4 and Qt5 after r434380 r434380 made massive changes to Qt4 and Qt5 in FreeBSD. Sadly, there are no instructions on how to upgrade an existing system. The changes to ports/head/UPDATING didn’t help at all. Here are the notes I made while upgrading my laptop running stable/11. To successfully install misc/qtchooser and upgrade the remaining Qt4 and Qt5 ports, you need to recursively uninstall • devel/qt4-linguisttools, • devel/qt4-rcc, and • devel/qt4-moc. At some point you to need to upgrade devel/qt5-core before everything else, e.g. portupgrade -fpv devel/qt5-core. Upgrading PostgreSQL 9.4.6 to 9.5.1 All commands were done as the root user unless indicated. su -l pgsql pg_dumpall | bzip2 -9c > all-db-9.4.6-2016-02-17.sql.bz2 chmod 0600 all-db-9.4.6-2016-02-17.sql.bz2 exit /usr/local/etc/rc.d/postgresql stop make -C /usr/ports/databases/postgresql95-server config-recursive pkg delete databases/postgresql94-contrib portupgrade -fpvo databases/postgresql95-client databases/postgresql94-client portupgrade -Nfpv databases/postgresql95-contrib portupgrade -fpvo databases/postgresql95-server databases/postgresql94-server portupgrade -fprv -x databases/postgresql95-client -x databases/postgresql95-server -x databases/postgresql95-contrib databases/postgresql95-client mv /usr/local/pgsql/data /usr/local/pgsql/data0 su -l pgsql -c 'mkdir /usr/local/pgsql/data' /usr/local/etc/rc.d/postgresql initdb /usr/local/etc/rc.d/postgresql start su -l pgsql bzcat all-db-9.4.6-2016-02-17.sql.bz2 | psql -f - template1 # Transfer all relevant settings from /usr/local/pgsql/data0 to /usr/local/pgsql/data for pg_hba.conf and postgresql.conf exit /usr/local/etc/rc.d/postgresql restart su -l pgsql pg_dumpall | bzip2 -9c > all-db-9.5.1-2016-02-17.sql.bz2 chmod 0600 all-db-9.5.1-2016-02-17.sql.bz2 exit rm -R /usr/local/pgsql/data0 Adding 24 hour clock to FreeBSD’s hardstatus string for GNU Screen FreeBSD gives the user an option of installing the file /usr/local/etc/screenrc with some sensible defaults along with GNU Screen, aka sysutils/screen. Among the defaults are a format string for the hardstatus line. It shows the date using yy/dd/mm notation and the time as a 12 hour clock. That may be fine in the English speaking parts of the world. hardstatus string '%{gk}[%{G}%H%{g}][%= %{wk}%?%-Lw%?%{=b kR}(%{W}%n*%f %t%?(%u)%?%{=b kR})%{= kw}%?%+Lw%?%?%= %{g}]%{=b C}[%m/%d/%y %C %A]%{W}' Continue reading Adding 24 hour clock to FreeBSD’s hardstatus string for GNU Screen Ascertaining installed ports for a specific architecture When upgrading from one major version of FreeBSD to another, in my case from FreeBSD/amd64 stable/9 to FreeBSD/amd64 stable/10, it’s customary to upgrade the installed ports afterwards, beginning with ports-mgmt/pkg. I forcefully upgraded all installed ports using portupgrade -afpv, but the upgrade of lang/ruby21 failed miserably. I removed all traces of Ruby 2.1, i.e. ports-mgmt/portupgrade and databases/ruby-bdb, before manually compiling and installing lang/ruby21, databases/ruby-bdb, and ports-mgmt/portupgrade using the ports collection. Now, I needed to know which remaining ports were still compiled for stable/9. The following snippet allowed me to gather the origins of such ports: pkg query -a %o:%q | grep freebsd:9: | cut -d : -f 1 Now, I could feed that list to the newly installed portupgrade and upgrade the remaining ports: portupgrade -fprv `pkg query -a %o:%q | grep freebsd:9: | cut -d : -f 1` In the end, I should have removed lang/ruby21 completely after upgrading ports-mgmt/pkg, and reinstalled ports-mgmt/portupgrade manually using the ports collection. Only then is it safe to forcefully rebuild and reinstall all the other ports. Don’t forget to add devel/cvs if you used to rely on cvs in base, and adjust all references from /usr/bin/cvs to /usr/local/bin/cvs.
ESSENTIALAI-STEM
User:Gidney/Mark Pennell Mark Pennell is an Australian born Film and theatrical producer. Born 31st August 1967 in Melbourne Victoria, Australia. He completed a Bachelor of Economics in 1987 at Monash University, Melbourne. His first professional job in the entertainment business was as an actor in the motion picture 'Man From Snowy River II'. This was followed by roles in 'All the Way', Neighbours, Blue Heelers, the Four Minute Mile, 'Quigley Downunder' and Guests of the Emperor. In 1997 he acquired the rights and produced the Cy Colman musical Sweet Charity. He cast the then unknown choreographer's assistant Kelly Abbey in the title role of Charity Hope Valentine. Kelly later reached international acclaim as choreographer of 'Happy Feet' and 'Fame'. Mark then produced/executive produced 'Fiddler on the Roof' - staring Topol 1998/9; and then the original concept show 'Cowntdown,the musical'1999/2000 In 2001 Mark was in London as producer of the motion picture 'Boswell for the Defence' starring Michael Caine. Due to funding problems created by the German Executive producer 'MBP' the project collapsed and was not completed. In 2003 he produced the film 'The Real Thing'. In 2006 he executive produced 'Storm Warning' and in 2008 he was executive producer on 'Prey' or 'Outback' (US title). In 2005 he married to model/author Tara Moss. They were divorced in 2008. No children. Mark is Godfather to Oscar Jackman, Son of Hugh Jackman the actor He has two siblings. Louise Pennell international journalist and director of Clark+Pennell Communications and Jason Pennell Barrister at the Victorian Bar. He is the son of Heather (Horwood) Pennell. Australian TV celebrity and pin-up of the early 1960's
WIKI
Motivation Spx was made to create a coherent element library for busy WordPress developers. With new major page builders being released almost yearly, there are hardly any constants when adapting to the ecosystem of a new builder, leaving countless add-ons and plugins useless when switching tools. As you might have already guessed, spx is here to combat that churn by delivering a single element library using Web Components that is able to work within current and future page builders. Web Components Introduced by Alex Rusell at the Fronteers Conference in 2011, Web Components have since gained traction among web developers to create encapsulated and reusable elements for the web. They look like that: <my-component name="Dennis" /> As you can see, it's not much different than your standard HTML elements like a div or li. Since web components are built with Javascript, they are executed on the client-side, so when visited in a browser. A custom component could be programmed in any way, depending on its purpose. For example, the goal could be to create a card component that displays the 'name' attribute in an h1 tag wrapped in a div once executed: <my-card name="Dennis"> <div class="card-wrap"> <h1 class="card-title">Dennis</h1> </div> </my-card> Components behave like standard HTML elements, so you can target them by using CSS: my-card { background: white; padding: 1em; border-radius: 0.125em; } That's it, for the most part. Let's dive deeper into how spx is utilizing the power of web components.
ESSENTIALAI-STEM
Can heartburn pain wake you up? Can heartburn pain wake you up? The effects of nighttime heartburn aren’t confined to esophagus. It can also result in chronic insomnia. Nighttime heartburn can wake you up and keep you up. “The symptoms definitely aggravate insomnia,” says Dave White, who has suffered from nighttime heartburn for years. Where is heartburn pain usually felt? Heartburn typically feels like a burning in the center of your chest, behind your breastbone. When you have heartburn, you may also feel symptoms like: A burning feeling in your chest that can last anywhere from a few minutes to a couple of hours. Pain in your chest when you bend over or lay down. Can GERD wake you up at night? The symptoms of GERD, such as coughing and choking, tend to worsen when you are lying down or attempting to sleep. The backflow of acid from the stomach into the esophagus can reach as high as your throat and larynx, causing you to experience a coughing or choking sensation. This can cause you to wake up from sleep. What does it feel like to have a heart burn? You can hurt from the chest through the back, just hurt in the chest, burn in the throat, have a sour taste in the back of your throat, belch and have a sour taste or vomit taste, you can feel like vomit is coming up.You can drink soft drinks and get the heart burn. What causes stomach pain that feels like heartburn? This can push food and stomach acid up into the esophagus, causing heartburn-like pain and GERD, according to the NIDDK. Your doctor may be able to diagnose it with an X-ray or other imaging. Other signs of hiatal hernia include chest pain, belching, and nausea. Why do I get heartburn in the middle of the night? Heartburn is a symptom of the reflux of acidic stomach content back into the esophagus, and chronic gastroesophageal reflux can lead to inflammation of the esophagus, scarring, and even precancerous or cancerous changes within the esophagus. Can a soft drink cause heartburn at night? MedicineNet does not provide medical advice, diagnosis or treatment. See additional information. Both carbonated soft drinks and commonly-used prescription sleeping pills can lead to nighttime heartburn, possibly indicative of a severe degree of gastroesophageal reflux disease ( GERD ), according to researchers. When to worry about heartburn and heart attack? Both heartburn and a developing heart attack can cause symptoms that subside after a while. The pain doesn’t have to last a long time to be a warning sign. Heartburn is discomfort or actual pain caused by digestive acid moving into the tube that carries swallowed food to your stomach (esophagus). This can push food and stomach acid up into the esophagus, causing heartburn-like pain and GERD, according to the NIDDK. Your doctor may be able to diagnose it with an X-ray or other imaging. Other signs of hiatal hernia include chest pain, belching, and nausea. Can a panic attack cause chest pain and heartburn? Although anxiety won’t cause GERD, it can cause heartburn and make GERD symptoms worse, Dr. Madanick says. What’s more, panic attacks can sometimes directly cause chest pain, according to the American Heart Association (AHA). A person can have both anxiety-related heartburn and GERD-related heartburn. Is it normal to wake up with stomach pain? Although it may not be common to wake up to stomach pain, what’s causing the stomach pain might be considered common. Use the symptoms you’re experiencing in addition to the stomach pain, to help you identify possible causes and find the treatment you need. What can cause stomach pain at night? Stomach pain is a common symptom of many conditions.
ESSENTIALAI-STEM
Fultonism Etymology , after the town of Fulton, Missouri, where gave a famous "Iron Curtain" speech at Westminster College in 1946.
WIKI
How to Set, Edit and Delete Alarms using Siri Using Siri on your iPhone or iPad to set, edit or delete alarms is a much faster and easier process than poking, prodding, and navigating around an iPhone touchscreen, last thing at night. With Siri, just climb into bed and ask to be woken up at a certain time. In this article, we trigger Siri using the “Hey Siri” voice command. Did you know there are other methods available, depending on your device? You can read about them all in our how to use Siri guide. Hey Siri, set an alarm for tomorrow at 7am Hey Siri, wake me at 7 in the morning Alarms - Set 7am Alarm Siri is intelligent enough to understand natural speech and phrases, so you don’t have to be specific with times and dates, it will know when ‘tomorrow’ or ‘two hours time’ is. Hey Siri, wake me in an hour Once you’ve made your request, Siri will then confirm the time you wish to be woken and set the alarm for you. Alarms - Wake me in an hour Slightly more complex alarms can also be be set: Hey Siri, set an alarm for 8.45am that repeats every Saturday Hey Siri, wake me up every Monday at 9am Set Alarm Every Monday You cannot set the alarm for more than one day in the future. If you try to specify a date outside of that range, Siri will offer to create a reminder for you instead. Naming an alarm It can help to give context to an alarm. Hey Siri, set a work alarm Hey Siri, set my alarm for 9am every day to call my Dad Hey Siri, set my alarm for 7pm to watch Stranger Things Set Stranger Things Alarm Ask Siri to read out alarms You can ask Siri to read out specific alarms or all alarms you have set, including its on/off status. Hey Siri, read my alarms Hey Siri, show all alarms Hey Siri, read my 2pm alarm Hey Siri, read my work alarm Editing an existing alarm You can enable and disable existing alarms: Hey Siri, turn on/off my 7am alarm Hey Siri, enable/disable all alarms To change the time of an existing alarm: Hey Siri, change my 7am alarm to 7.30am Alternatively, if you’ve named an alarm: Hey Siri, change my watch Stranger Things alarm to 8pm Change Stranger Things Alarm Snoozing and stopping alarms If you want to stay in bed a little longer (9 minutes to be precise), then say: Hey Siri, snooze To silence an alarm completely: Hey Siri, stop Deleting Alarms Whenever you ask Siri to ‘Set an alarm’ or ‘wake me’ it actually creates a brand new alarm each time. If you tend to add alarms on an ad hoc basis this can result in a very long list of alarms clogging up your app. In this instance you can remedy the issue by wiping all alarms from your device: Hey Siri, delete all alarms You can also delete alarms by name. Hey Siri, delete the Stranger Things alarm Delete Stranger Things Alarm While being able to use Siri to set alarms isn’t precisely touted as a headline feature in iOS, it is one of the most useful. Leave a Comment Copy link
ESSENTIALAI-STEM
Rap1-mediated activation of extracellular signal-regulated kinases by cyclic AMP is dependent on the mode of Rap1 activation Zhiping Wang, Tara J. Dillon, Viji Pokala, Snigdha Mishra, Kirstin Labudda, Brian Hunter, Philip J.S. Stork Research output: Contribution to journalArticlepeer-review 141 Scopus citations Abstract Like other small G proteins of the Ras superfamily, Rap1 is activated by distinct guanine nucleotide exchange factors (GEFs) in response to different signals to elicit cellular responses. Activation of Rap1 by cyclic AMP (cAMP) can occur via cAMP-dependent protein kinase A (PKA)-independent and PKA-dependent mechanisms. PKA-independent activation of Rap1 by cAMP is mediated by direct binding of cAMP to Rap1-guanine nucleotide exchange factors (Rap1-GEFs) Epac1 (exchange protein directly activated by cAMP 1) and Epac2 (Epac1 and Epac2 are also called cAMP-GEFI and -GEFII). The availability of cAMP analogues that selectively activate Epacs, but not PKA, provides a specific tool to activate Rap1. It has been argued that the inability of these analogues to regulate extracellular signal-regulated kinases (ERKs) signaling despite activating Rap1 provides evidence that Rap1 is incapable of regulating ERKs. We confirm that the PKA-independent activation of Rap1 by Epac1 activates a perinuclear pool of Rap1 and that this does not result in ERK activation. However, we demonstrate that this inability to regulate ERKs is not a property of Rap1 but is rather a property of Epacs themselves. The addition of a membrane-targeting motif to Epac1 (Epac-CAAX) relocalizes Epac1 from its normal perinuclear locale to the plasma membrane. In this new locale it is capable of activating ERKs in a Rap1- and cAMP-dependent manner. Rap1 activation by Epac-CAAX, but not wild-type Epac, triggers its association with B-Raf. Therefore, we propose that its intracellular localization prevents Epac1 from activating ERKs. C3G (Crk SH3 domain Guanine nucleotide exchanger) is a Rap1 exchanger that is targeted to the plasma membrane upon activation. We show that C3G can be localized to the plasma membrane by cAMP/PKA, as can Rap1 when activated by cAMP/PKA. Using a small interfering RNA approach, we demonstrate that C3G is required for the activation of ERKs and Rap1 by cAMP/PKA. This activation requires the GTP-dependent association of Rap1 with B-Raf. These data demonstrate that B-Raf is a physiological target of Rap1, but its utilization as a Rap1 effector is GEF specific. We propose a model that specific GEFs activate distinct pools of Rap1 that are differentially coupled to downstream effectors. Original languageEnglish (US) Pages (from-to)2130-2145 Number of pages16 JournalMolecular and cellular biology Volume26 Issue number6 DOIs StatePublished - Mar 2006 ASJC Scopus subject areas • Molecular Biology • Cell Biology Fingerprint Dive into the research topics of 'Rap1-mediated activation of extracellular signal-regulated kinases by cyclic AMP is dependent on the mode of Rap1 activation'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Alfred O. Schumann Alfred Oscar "Al" Schumann (March 27, 1924 – June 21, 2013) was an American farmer and politician. Born in Eyota, Minnesota, Schumann went to the University of Minnesota. He was a dairy farmer. From 1963 to 1973, Schumann served in the Minnesota House of Representatives and was a Republican. Schumann also served as mayor of Eyota, Minnesota. In his later years he sold a portion of his farmland for development on the South side of Eyota. He built and sold a number of homes. Schumann also established the Eyota Market, the first grocery store in Eyota in the 21st century. The store is currently owned and operated by his descendants. Schumann died in Eyota, Minnesota.
WIKI
Talk:Ananya Nanda Proud of Ananya! I have heard this girl in Indian Idol 2015.I am quite happy that such talents reside in My Country.Keep it up Ananya! Ceremonials (talk) 20:48, 26 February 2017 (UTC)
WIKI
Tethering on a iPhone 3GS? How do you connect your Mac to wifi via your iPhone 3GS? Discussion in 'iPhone' started by Ulf1103, Aug 14, 2011. 1. Ulf1103 macrumors 6502 Joined: Jan 5, 2011 #1 Hy, I remember that when I wanted to buy my iPhone 3GS 2 years ago, on the Apple website, there was a page where it explained how you could use your iPhone 3GS to let your Macbook (pro) connect to the internet. Now, I can't find any information of it anymore. Does anyone know how you can do that?   2. Intell macrumors P6 Intell Joined: Jan 24, 2010 Location: Inside #2 You can only tether the 3Gs by Bluetooth or USB without a jailbreak.   3. Ulf1103 thread starter macrumors 6502 Joined: Jan 5, 2011 #3 And how do you do that?   4. trekkie604 macrumors 68000 trekkie604 Joined: Feb 25, 2008 Location: Vancouver, Canada #4 Do what? Jailbreak or tether? Tether via USB is easiest, just turn on Personal Hotspot on the phone then plug in the sync cable. To Tether via bluetooth you'll need to pair your phone with your computer first. Also, if you're on AT&T you have to subscribe to the tethering plan to get that personal hotspot menu.   5. Applejuiced macrumors Westmere Applejuiced Joined: Apr 16, 2008 Location: At the iPhone hacks section. #5 Correct. No wifi tethering on the 3GS on stock firmware. If you're in the US you need to purchase an additional tethering package to do that or jb your iPhone.   6. Ulf1103 thread starter macrumors 6502 Joined: Jan 5, 2011 #6 Well, I'm from Belgium and I'm with MV (Mobile Vikings) an they support it for free :) I'll see tomorrow if I can use it and if it works. Thanks for the help already.   7. baypharm macrumors 68000 baypharm Joined: Nov 15, 2007 #7 Well it used to be simple. Just download PDANet or Easy tether and connect your phone to your computer and viola! But now Verizon and AT&T are blocking the use of these apps. Not entirely sure if it is legal but safe to say I seriously doubt it. In order to block the use of it on your phone, they would have to search your phone electronically and that calls into question of 4th Amendment rights. They cannot simply search your phone based on the premise that you might be doing something that is cheating them out of revenue. So far, no one has risen to file a class action but I am sure one is inevitable. In the meantime, Verizon has blocked me. Too bad I am not a hacker - I would inflict equal justice for what they have done.   Share This Page 6 August 14, 2011
ESSENTIALAI-STEM
What Is Lymphoedema and What Can I Do About It? You might have heard about it or maybe you’ve been recently diagnosed? There’s a lack of information around this condition and it’s vitally important, so I want to do my best to shed some light. Lymphoedema is a condition characterised by the accumulation of lymphatic fluid in the tissues, which results in chronic swelling. The lymphatic system plays a vital role in the immune system, and it helps to remove excess fluid and waste products from the body’s tissues. When the lymphatic system is damaged or compromised, however, lymphatic fluid can accumulate, leading to lymphoedema. There are several potential causes of lymphoedema, including: 1. Primary lymphoedema: A rare genetic condition that affects the development of the lymphatic system, leading to lymphoedema. It is possible for this to be triggered later in life which, although rare, is called Lymphoedema Tarda. 2. Secondary lymphoedema: This type of lymphoedema is more common and can be caused by a variety of factors, including surgery, radiation therapy, infection, trauma, cancer, and obesity. While we see both types of lymphoedema in our studio, secondary is more prevalent due to the treatments for cancer triggering this type of the condition. The presentation of lymphoedema can vary depending on the severity of the condition. Mild cases may only present with mild swelling or a feeling of heaviness, while severe cases can lead to significant disability and disfigurement. The swelling usually affects one or both arms or legs, but it can also occur in other parts of the body. Symptoms of lymphoedema can include: 1. Swelling in the affected limb or area 2. Heaviness or aching in the affected area 3. Restricted movement in the affected area 4. Skin changes, such as dimpling, thickening, hardening, or discoloration 5. Recurrent infections in the affected area Treatment Options: Surgical options for lymphoedema need to be discussed with your medical professional. There are a few surgeries that are emerging and now available however they may not be appropriate in all cases. Conservative management is the main form of treatment for long term management of lymphoedema. It includes measures aimed at reducing swelling and preventing infection. These measures may include: 1. Compression therapy: The use of compression stockings or bandages to promote circulation, lymph drainage and prevent further swelling. This may also include taping techniques and/or the use of a pneumatic compression pump device. 2. Exercise: Exercises can help improve circulation, improve lymph flow and reduce swelling. 3. Manual lymphatic drainage: A type of massage that stimulates the lymphatic system and helps to move the accumulated fluid out of the affected area. 4. Skin care: Keeping the skin clean and moisturised can help prevent infection. 5. Low level laser: This type of therapy uses light energy to break down damaged tissue and stimulate the growth of new lymphatic vessels. 6. Diaphragmatic breathing: Seems a little too simple doesn’t it? Don’t underestimate it, this type of breathing is crucial! The movement of the diaphragm helps to pump the lymph fluid around the body. Lymphoedema can be a challenging condition to manage, but there are various treatment options available to help improve symptoms and prevent complications. Early recognition and treatment of lymphoedema are absolutely crucial to prevent further complications and maximise long term management and improve quality of life. If you have any concerns or questions, please don’t hesitate to get in touch, we would love to chat to you. For more day to day tips on living with lymphoedema, check out our blog ‘Tips for Living with Lymphoedema Latest Articles Living with Lymphoedema Living with Lymphoedema Lymphoedema is a medical condition characterised by the accumulation of lymphatic fluid in the tissues, causing swelling in the affected areas. Although it often occurs in the arms and legs, lymphoedema can affect any part of the body. Living with lymphoedema can be... 4 Reasons to Massage Your Breasts 4 Reasons to Massage Your Breasts While breast checks and self massage has become more widespread in the fight for early detection of breast cancer, breast massage benefits extend FAR beyond just ‘detecting abnormalities’. I’ve listed a few of the other important health benefits below.  Detecting... Meet Your New Breast Friend Meet Your New Breast Friend This latest creation has been years in the planning and I’m so glad it’s finally here and being shared with you all.  Working as a lymphoedema therapist I get the chance to work with lots of women, many of whom are going through breast cancer or having trouble...
ESSENTIALAI-STEM
(Last Updated On: June 1, 2022) Mixture or Compound many think the same about these two! But here are some major differences between compound and mixture that will clear some confusion. The mixture comprises two or more mixed substances, but neither chemically nor in an inaccurate amount, while the compound contains two or more chemically integrated elements and a fixed ratio. Compound The substance created chemically in a fixed ratio as a mixture of different elements is called compounds. Compounds are completely different substances, the properties of which vary from those of their constituent substances. differences between compound and mixture The compound is the fusion of different elements such that the chemical bond binds together the atoms contained in the elements which cannot be easily broken. Bonds are formed from the sharing of electrons among atoms.  Types Of Compound Water (H2O), ethanol (C2H5OH), sodium chloride (NaCl), for example, are some of the typical compounds, made up of unique proportions of their constituents, which often have a chemical identity. Molecular, acids, cations, anions, and binary bonds are the various bond forms. Many of these have distinct chemical identities and formulas. So, there are various forms of bonds: 1. Covalent bond A chemical bond in which a pair of electrons are exchanged between atoms is referred to as a molecular bond or a covalent bond. 2. Ionic bond A chemical bond in which the entire single exchange of valence electrons takes place between atoms is called the ionic bond. 3. Metallic bond  It is a bond between metallic ions and conduction electrons that occurs as a result of electrostatic attraction. Mixture Mixtures, including air, rocks, seas, and even the atmosphere, are all around us. Some have physical properties combined with the components and not with any chemical properties and not even in a defined ratio. differences between compound and mixture Therefore, we may assume that mixture formation takes place by the combining of two or more substances, but not in a defined proportion. This gives a brief introduction on the characteristics, now let’s find some differences between compound and mixture. Types Of Mixture In mixtures, the chemical reaction does not occur, the fusion takes place physically. So, mixtures include atoms or molecules of two or three different forms, or at least one atom and one molecule. No fixed melting or boiling point is required for mixtures. Via physical techniques such as filtration, decantation, distillation, mixtures can be isolated. Mixtures may either be heterogeneous or homogeneous. 1. Homogeneous These are called true solutions, as the constituents present in this type are spread all over evenly or similarly. Sugar solution, alcohol, and water mixing are some of the examples. 2. Heterogeneous If the constituents in the mixture are not uniformly distributed, they are classified as heterogeneous mixtures. For example, (oil + water), a sulfur and iron mixture, gravel, etc. In addition to the two above, the mixtures are further categorized on the basis of the type of particle size present there. They are solutions, suspensions, and colloids. 3. Solutions They contain nano-sized particles that are less than 1nm in diameter. The solution cannot be isolated by the process of decantation or centrifuge. Examples include dissolved oxygen in water, air, and gelatin. 4. Suspensions The particles are so small in this solution that they are not visible by naked eyes and the particle size ranges from 1nm to 1mm. The colloid solution shows the effect of Tyndall, and the decantation and centrifugation process will isolate the colloidal constituents. A few examples are blood, smoke, cream. 5. Colloids These are kind of heterogeneous in nature, showing the influence of Tyndall, too. The particles within it are sufficiently large and can be separated by centrifugation or decantation. A few examples are clay, granite, dust, or air contaminants. Learn about the differences between mega bloks and lego here. Differences Between Compound and Mixture For example, Seawater, Crude Oil, Mineral Oils, Alloys (Brass, Bronze) are some of the mixtures while, Water (H2O), Hydrogen Peroxide (H2O2), Sodium Chloride (NaCl), Baking Soda (NaHCO3), etc. are some of the compounds.  differences between compound and mixture Anything that occupies space has mass and volume, as per the theory of classical physics, which is known as matter. It is also possible to categorize matter into two groups, mixtures, and pure substances. Elements and compounds are made up of pure substances. We have taken the liberty to break down the differences between compound and mixture with this in mind. Have a look:  Particulars  Compound  Mixture Definition Compounds are substances that can be formed by combining two or more elements chemically. Mixtures are impure substances that are made of two or more substances that are physically mixed. Nature Homogeneous in nature Either homogeneous or heterogeneous in nature. Examples Water, salt, baking soda, etc. Oil and water, sand and water, smog (smoke + fog), etc. Types    There are three kinds of compounds: covalent compounds, metallic compounds, and ionic compounds. Mixtures are primarily of two types, namely homogeneous and heterogeneous mixtures. Composition The elements are present in a fixed quantity, which implies that their ratio is fixed. The substances present in the mixtures are not in fixed amounts, which means that their ratio varies. Formula Depending on the constituents present, compounds have a particular formula. Mixtures do not have a certain formula. Melting/Boiling point  There is a fixed melting and boiling point for the compound. There is not a fixed melting or boiling point for mixtures. Heat change  There are a heat shift and the absorption or release of energy during the creation of the compounds since it is a chemical reaction. No heat shift or energy presence occurs when creating a mixture. Separation  . It is not easy to separate the elements and, if achieved, it is by chemical methods. By distinct physical methods such as filtration, chromatography, evaporation, the substances of the mixtures are simple to separate. Properties  The properties are set for the specific compound type and do not differ, as the elements contained in the compounds are fixed and are in the fixed ratio. The properties of the mixtures do differ (not fixed) since it depends on the nature and quantity of substances to be mixed with.   The table consists of all the differences between compound and mixture. The basic material is the elements and more can be divided into easier forms. There are two or three different atoms or elements in the compound; mixtures contain different substances, on the other hand. In conclusion, compounds are formed with a combination of elements, and mixtures are formed with the combination of substances physically. The major differences between compound and mixture are the chemical reaction in the process and composition.
ESSENTIALAI-STEM
Karl Eduard Aeschlimann Karl Eduard Aeschlimann (17 February 1808 in Burgdorf; † 4. April 1893 in Yalta) was a Swiss architect. He was a court architect of the Russian royal family. Aeschlimann was a son of the potter Johann Heinrich Aeschlimann and his wife Marie. He attended the Burgerschulen in Burgdorf and the Académie des Beaux-Arts in Paris, and worked as assistant to architects in the city of Bern. In 1828, he traveled to the Black Sea and ended up in Crimea. He was a traveling companion of the Spanish Count Orlando de la Blanca. Between about 1830 to 1860 he worked as court architect of the Russian royal family on the south coast of Crimea, especially in the district of Greater Yalta. For this area, he created a general plan and designed a number of private and public buildings, including the first hotel of Yalta. Aeshlimann was involved in construction of the castle in Alupka for the Vorontsov family. Aeschlimann married Elisa Maurer, a daughter of Johann Jakob Maurer-Fischer of Schaffhausen, in Simferopol in 1836 and was knighted in 1850. Literature * Helena A. Aeschlimann: Die Burgdorfer Familie Aeschlimann in Russland. In: Burgdorfer Jahrbuch, 60 (1993), S. 59–89.
WIKI
Talk:Pretty Pimpin Song similarity The bot reverted my changes, which I suppose seems reasonable under the "own research theme". Nevertheless, I figured, I'd put the comment here for posterity: This song samples or otherwise borrows heavily from the hook from the Midnight Run soundtrack song "Dorfler's theme": https://www.youtube.com/watch?v=O0cMmczfv4g
WIKI
Page:Dictionary of Greek and Roman Biography and Mythology (1870) - Volume 1.djvu/627 Rh C ARAN us. and there took a position which was as favourable to himself as it appeared detrimental to the Ro- mans. When Cai-actacus, in addition to this, had also fortified himself with artificial means, he ex- horted his men either to die or to conquer in the approaching battle. The Roman propraetor, P. Ostorius, who saw the disadvantages under which the Romans were labouring, would not have ven- tured upon an engagement, had not the courage of his soldiers and officers demanded it. The superior military skill of the Roman legions overcame all tiie difficulties, and a splendid victory was gained : the wife and daughters of Caractacus fell into the hands of the Romans, and his brothers surrendered. Caractacus himself sought the protection of Carti- mandua, queen of the Brigantes ; but she betrayed him, and he was delivered up to the Romans, and carried to Rome, A. D. 51, after the war in Britain had lasted for nine years, as Tacitus says. The emperor Claudius wished to exhibit to the people this old and formidable foe in his humiliation, and ordered Caractacus and the members of his family, with their clients and ornaments, to be led in a sort of triumph before an assembly of the people and an array of soldiers. The emperor himself was present. The relatives of Caractacus walked by his side cast down with grief, and entreated the mercy of the Romans; Caractacus alone did nei- ther of these things, and when he approached the seat of the emperor, he stopped and addressed him in so noble a manner, that Claudius pardoned him and his friends. They appear, however, not to have returned to Britain, but to have spent the remainder of their life in Italy. (Tac. Ann. xii. 33-38 Hist. iii. 45 ; Dion Cass. Ix. 20.) [L. S.] CARA'NUS {Kdpavos or Kapavos). 1. A He- racleid of the family of the Temenidae, and accord- ing to some accounts, the founder of the Argive dynasty in Macedonia, about the middle probably of the eighth century b. c, since he was brother to Pheidon, the Argive tyrant. The legend tells, that he led into Macedonia a large force of Greeks, and, following a flock of goats, entered the town of Edessa in the midst of a heavy storm of rain and a thick mist, unobserved by the inhabitants. Re- membering the oracle which had desired him " to seek an empire by the guidance of goats," he fixed here the seat of government, and named the place Aegae in commemoration of the miracle. Herodo- tus gives a different tradition of the origin of the dynasty, and his account seems to have been adopt- ed by Thucydides, who speaks of Archelaus I. as tlie ninth king, and therefore does not reckon Cara- nus and the other two who come before Perdiccas I. in the lists of Dexippus and Eusebius. Miiller thinks that the two traditions are substantially the same, the one in Herodotus being the rude native legend, while the other, of which Caranus is the hero, was the Argive story ; and he further sug- gests that Kdpauos is perhaps only another form of Koipauos. (Diod. Fragm. ix. p. 637, ed. Wess.; Plut. Jfer. 2; Just.vii. 1, xxxiii. 2; Clinton, Fas^. ii. p. 221 ; Miiller, Dor. i. 7. § 15, App. i. § 15, and the authorities there referred to ; Herod, viii. 137-139; Thuc. ii. 100.) Pausanias, in mention- ing that the Macedonians never erected trophies when victorious, records the national tradition by which they accounted for it, and which related, that a trophy set up by Caranus, in accordance with Argive custom, for a victory over his neigh- bour Cisseus, was thrown down and destroyed by CARAUSIUS. 609 a lion from Olympus ; whereby, it was said, the king loarnt that its erection had been of evil coun- sel, as deepening the enmity of the conquered. (Pans. ix. 40.) 2. Mentioned by Justin (xi. 2) as a son of Phi- lip and a half-brother of Alexander the Great. The latter suspected him of aiming at the throne, and put him to death soon after his accession, b. c. 336. 3. A Macedonian of the body called fraipoi or guards (comp. Polyb. v. 53, xxxi. 3), was one of the generals sent by Alexander against Satibarzanes when he had a second time excited Aria to revolt. Caranus and his colleagues were successful, and Satibarzanes was defeated and slain, in the winter of B. c. 330. (Arrian, Jnalt. iii. 25,28 ; Curt. vi. 6. § 20, &c., vii, 3. § 2, Freinsheim, ad he, vii. 4. § 32, &c. ; comp. Diod. xvii. 81.) In B. c. 329, Caranus was appointed, together with Androma- chus and Menedemus, under the command of the Lycian Pharnuches, to act against Spitamenes, the revolted satrap of Sogdiana. Their approach com- pelled him to raise the siege of Maracanda ; but, in a battle which ensued, he defeated them with the help of a body of Scythian cavalry, and forced them to fall back on the river Polytimetus, the wooded banks of which promised shelter. The rashness however or cowardice of Caranus led him to attempt the passage of the river with the cavalry under his command, and the rest of the troops plunging in after him in haste and disorder, they were all destroyed by the enemy. (Arr. Anab. iv. 3, 5 ; comp. Curt. vii. 6. § 24, 7. § 31, &c.) [E.E.J CARAU'SIUS, M. AURE'LIUS VALE'- RIUS. Maximianus Herculius having equipped a naval force at Boulogne for the purpose of re- pressing the outrages of the Franks, who cruising from place to place in their light sloops were de- vastating the coasts of Holland, Gaul, and Spain, gave the command of the armament to a certiiin Carausius, a man of humble extraction, bom in Me- napia, a district between the Scheldt and Meuse, who had been bred a pilot and had distinguished himself as a soldier in the war against the Bagaudae. Carausius was by no means deficient in zeal and energy, but after a time his peculiar tactics and rapidly increasing wealth gave rise to a suspicion, probably not ill founded, that he permitted the pirates to commit their ravages unmolested, and then watching for their return, seized the ships laden with plunder and appropriated to his own use the greater portion of the spoils thus captured. Herculius accordingly gave orders for his death, but the execution of this mandate was anticipated by the vigilance of the intended victim, who having crossed the channel with the fleet, which was de- voted to his interests, and having succeeded in gaining over the troops quartered in Britain, estab- lished himself in that island and assumed the title of Augustus. His subsequent measures were cliaracterised by the greatest vigour and prudence. A number of new galleys was constructed with all speed, alliances were formed with various barbarous tribes, who were carefully disciplined as sailors, and the usurper soon became master of all the western seas. After several ineffectual attempts to break his power, Diocletian and Maximianus found it necessary to acknowledge him as their colleague in the empire, an event commemorated by a medal bearing as a device three busts with a[)propriate emblems and the legend caravsivs. kt. fhatrks. svi., while on the reverse we read the words pax. 2 R
WIKI
Hatsuon Hatsuon (撥音) may refer to: * The moraic nasal in the Japanese language * N (kana), the character used to represent the moraic nasal
WIKI
[Docs] [txt|pdf] [Tracker] INFORMATIONAL Network Working Group B. Kantor Request for Comments: 1282 Univ. of Calif San Diego Obsoletes: RFC 1258 December 1991 BSD Rlogin Status of this Memo This memo documents an existing protocol and common implementation that is extensively used on the Internet. This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. Protocol Description The rlogin facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output [1]. It is widely used between Unix hosts because it provides transport of more of the Unix terminal environment semantics than does the Telnet protocol, and because on many Unix hosts it can be configured not to require user entry of passwords when connections originate from trusted hosts. The rlogin protocol requires the use of the TCP. The contact port is 513. An eight-bit transparent stream is assumed. Connection Establishment Upon connection establishment, the client sends four null-terminated strings to the server. The first is an empty string (i.e., it consists solely of a single zero byte), followed by three non-null strings: the client username, the server username, and the terminal type and speed. More explicitly: <null> client-user-name<null> server-user-name<null> terminal-type/speed<null> For example: <null> bostic<null> kbostic<null> vt100/9600<null> The server returns a zero byte to indicate that it has received these Kantor [Page 1] RFC 1282 BSD Rlogin December 1991 strings and is now in data transfer mode. Window size negotiation may follow this initial exchange (see below). From Client to Server (and Flow Control) Initially, the client begins operation in "cooked" (as opposed to to "raw") mode. In this mode, the START and STOP (usually ASCII DC1,DC3) characters are intercepted and interpreted by the client to start and stop output from the remote server to the local terminal, whereas all other characters are transmitted to the remote host as they are received. (But see below for the handling of the local-escape character.) In "raw" mode, the START and STOP characters are not processed locally, but are sent as any other character to the remote server. The server thus determines the semantics of the START and STOP characters when in "raw" mode; they may be used for flow control or have quite different meanings independent of their ordinary usage on the client. Screen/Window Size The remote server indicates to the client that it can accept window size change information by requesting a window size message (as out of band data) just after connection establishment and user identification exchange. The client should reply to this request with the current window size. If the remote server has indicated that it can accept client window size changes and the size of the client's window or screen dimensions changes, a 12-byte special sequence is sent to the remote server to indicate the current dimensions of the client's window, should the user process running on the server care to make use of that information. The window change control sequence is 12 bytes in length, consisting of a magic cookie (two consecutive bytes of hex FF), followed by two bytes containing lower-case ASCII "s", then 8 bytes containing the 16-bit values for the number of character rows, the number of characters per row, the number of pixels in the X direction, and the number of pixels in the Y direction, in network byte order. Thus: FF FF s s rr cc xp yp Other flags than "ss" may be used in future for other in-band control messages. None are currently defined. Kantor [Page 2] RFC 1282 BSD Rlogin December 1991 From Server to Client Data from the remote server is sent to the client as a stream of characters. Normal data is simply sent to the client's display, but may be processed before actual display (tabs expanded, etc.). The server can imbed single-byte control messages in the data stream by inserting the control byte in the stream of data and pointing the TCP "urgent-data" pointer at the control byte. When a TCP urgent- data pointer is received by the client, data in the TCP stream up to the urgent byte is buffered for possible display after the control byte is handled, and the control byte pointed to is received and interpreted as follows: 02 A control byte of hex 02 causes the client to discard all buffered data received from the server that has not yet been written to the client user's screen. 10 A control byte of hex 10 commands the client to switch to "raw" mode, where the START and STOP characters are no longer handled by the client, but are instead treated as plain data. 20 A control byte of hex 20 commands the client to resume interception and local processing of START and STOP flow control characters. 80 The client responds by sending the current window size as above. All other values of the urgent-data control byte are ignored. In all cases, the byte pointed to by the urgent data pointer is NOT written to the client user's display. Connection Closure When the TCP connection closes in either direction, the client or server process which notices the close should perform an orderly shut-down, restoring terminal modes and notifying the user or processes of the close before it closes the connection in the other direction. Implementation Notes The client defines a client-escape character (customarily the tilde, "~"), which is handled specially only if it is the first character to be typed at the beginning of a line. (The beginning of a line is defined to be the first character typed by the client user after a new-line [CR or LF] character, after a line-cancel character, after resumption of a suspended client session, or after initiation of the connection.) Kantor [Page 3] RFC 1282 BSD Rlogin December 1991 The client-escape character is not transmitted to the server until the character after it has been examined, and if that character is one of the defined client escape sequences, neither the client-escape nor the character following it are sent. Otherwise, both the client-escape character and the character following it are sent to the server as ordinary user input. If the character following the client-escape character is the dot ".", or the client-defined end-of-file character (usually control-D), the connection is closed. This is normally treated by the server as a disconnection, rather than an orderly logout. Other characters (client-defined, usually control-Z and control-Y) are used to temporarily suspend the rlogin client when the host has that ability. One character suspends both remote input and output; the other suspends remote input but allows remote output to continue to be directed to the local client's terminal. Most client implementations have invocation switches that can defeat normal output processing on the client system, and which can force the client to remain in raw mode despite switching notification from the server. A Cautionary Tale [2] The rlogin protocol (as commonly implemented) allows a user to set up a class of trusted users and/or hosts which will be allowed to log on as himself without the entry of a password. While extremely convenient, this represents a weakening of security that has been successfully exploited in previous attacks on the internet. If one wishes to use the password-bypass facilities of the rlogin service, it is essential to realize the compromises that may be possible thereby. Bypassing password authentication from trusted hosts opens ALL the systems so configured when just one is compromised. Just as using the same password for all systems to which you have access lets a villain in everywhere you have access, allowing passwordless login among all your systems gives a marauder a wide playing field once he has entered any of your systems. One compromise that many feel achieves a workable balance between convenience and security is to allow password bypass from only ONE workstation to the other systems you use, and NOT allow it between those systems. With this measure, you may have reduced exposure to a workable minimum. The trusted host specification is ordinarily one of a host name. It is possible, by compromise of your organization's domain name server, or compromise of your network itself, for a villain to make an Kantor [Page 4] RFC 1282 BSD Rlogin December 1991 untrusted host masquerade as a trusted system. There is little that a user can do about this form of attack. Luckily, so far such attacks have been rare, and often cause enough disruption of a network that attempts are quickly noticed. When the file containing a user's list of trusted logins is inadvertently left writeable by other users, untrustworthy additions may be made to it. Secure authentication extensions to the rlogin protocol (Kerberos, et al) can greatly reduce the possibility of compromise whilst still allowing the convenience of bypassing password entry. As these become more widely deployed in the internet community, the hazards of rlogin will decrease. References [1] Stevens, W., "UNIX Network Programming", ISBN 0-13-949876-1. [2] Garfinkel & Spafford, "Practical Unix Security", ISBN 0-937175-72-2. Security Considerations See the "A Cautionary Tale" section above. Author's Address Brian Kantor University of California at San Diego Network Operations C-024 La Jolla, CA 92093-0214 Phone: (619) 534-6865 EMail: brian@UCSD.EDU Kantor [Page 5] Html markup produced by rfcmarkup 1.127, available from https://tools.ietf.org/tools/rfcmarkup/
ESSENTIALAI-STEM
[ Monash University ] Museum of Pathology CARCINOMA OF CERVIX CARCINOMA OF CERVIX Clinical History A woman aged 29 gave a history of tiredness for 2 years and offensive vaginal discharge and bleeding after intercourse during the previous 2 months. She had lost 12 kg. in weight in 12 months. Examination revealed a large hard cervix and thickening of the right parametrial tissues. A Wertheim hysterectomy was followed by satisfactory post-operative recovery. Pathology The uterus has been sliced sagittally and mounted to display the cut surface. Arising from the anterior lip of the cervix there is a pale tumour mass 40 x 25 mm. in diameter which extends upwards into the region of the isthmus and internal os and anteriorly beyond the cervix into adjacent connective tissue. The endocervical canal is considerably distorted by the bulging tumour. Histologically this was a squamous cell carcinoma of the cervix.
ESSENTIALAI-STEM
Mueller investigation: House passes resolution to release Mueller report Special counsel Robert Mueller is expected to submit his long-awaited report on the Trump-Russia investigation to the Department of Justice soon. And House Democrats really, really want it to be made public. In a rare bipartisan vote, the House of Representatives overwhelmingly passed a nonbinding resolution Thursday to do just that. Republicans joined Democrats in a 420-0 vote to approve the resolution, with just four lawmakers declining to take a stance by voting ‘present.’ It’s unclear whether Senate Majority Leader Mitch McConnell will pick it up. He blocked a similar bipartisan bill from Sens. Chuck Grassley (R-IA) and Richard Blumenthal (D-CT) from the Senate floor earlier this year. The House, on the other hand, is intent on passing a resolution to make the report public because they’re not sure how much recourse they’ll otherwise have if the Justice Department decides to keep Mueller’s report under wraps. The man who has the final say on how much of the report is released is new Attorney General William Barr, who hasn’t committed to making the report public, exactly, but insists he will follow the obligations put on him under law. When Mueller’s investigation concludes, Barr will have to give senior members of the House and Senate Judiciary committees some limited information, including why Mueller’s inquiry is wrapping up now. But Barr doesn’t have to disclose the full report under law. Given the potential weight of Mueller’s report, Democrats and Republicans in the House want Congress and the American public to see the whole thing. Though McConnell has expressed support for the Mueller report’s release, he’s been fairly deferential to the Justice Department. It’s possible Mueller’s report won’t implicate President Trump, in which case Republicans would also have a strong interest in making it public. But top Democrats on House committees charged with investigating the president are particularly eager to see if Mueller’s finding will open up new lines of inquiry for them. “There may be some areas where, because of the limitations of his jurisdiction, that he had to stop. I don’t know what those areas would be,” said House Oversight Committee Chair Elijah Cummings (D-MD). “A lot of it may corroborate some of the things we’ve already found, which is helpful. But we’ve got a lot more work to do with regard to Russia’s efforts to interfere with our elections.” There are a few Justice Department regulations Barr will be looking to when deciding whether to release the Mueller report. These regulations were instituted in 1999, in large part a response to then-independent counsel Ken Starr’s bombshell report on President Bill Clinton and White House intern Monica Lewinsky, and they could help shield Trump. These regulations specify that Barr needs to brief the top Democrats and Republicans on the House and Senate Judiciary committees on why Mueller’s investigation is concluding now. But they give Barr pretty wide leeway to decide how much information in the report to disclose, saying he can release information that he determines is in the public interest. Democrats have been arguing strongly that the public release of Mueller’s report is in the public interest. “As the Department of Justice made clear over the last two years, DOJ policy permits disclosure of investigative materials when it serves the public interest, even as they pertain to ‘uncharged third parties,’” a statement from Democratic Committee chairs including Cummings, House Judiciary Committee Chair Jerry Nadler (D-NY), and House Intelligence Chair Adam Schiff (D-CA) reads. “The public is clearly served by transparency with respect to any investigation that could implicate or exonerate the President and his campaign.” The other thing Barr will have to keep in mind is a longstanding Justice Department practice to not publish negative information about a subject under investigation if that person hasn’t been charged with a crime. That protocol has certainly been broken in the past, but it could give Barr cover to explain why he’s not releasing the report. House Democrats are trying to prepare for this scenario. A resolution to urge Barr to release the Mueller report to Congress and the public ramps up the pressure on the Justice Department. If the resolution goes nowhere because McConnell declines to bring it up in the Senate, House Democrats have some recourse by trying to subpoena the report or get Mueller to Capitol Hill to testify. But they are already aware that could take much longer if the Trump administration fights it. “I think we do have the ability to subpoena the underlying evidence; we can even subpoena Bob Mueller,” said Rep. Raja Krishnamoorthi (D-IL), a member of the House Oversight and House Intelligence committees. “But the time that it will take, because I think they will object and maybe force us into litigation, means there will be delay.” Krishnamoorthi said he’s not yet aware of any effort in either committee to subpoena Mueller or his report. “But I can bet you that if that report is not turned over and the evidence is not turned over there will definitely be a push for that,” he said. In recent days, House Speaker Nancy Pelosi has reiterated that she thinks impeaching Trump is a futile business. “Impeachment is so divisive to the country that unless there’s something so compelling and overwhelming and bipartisan, I don’t think we should go down that path, because it divides the country. And he’s just not worth it,” Pelosi told the Washington Post Magazine’s Joe Heim in an interview. Pelosi has been walking this line for a while, making clear the House will conduct numerous investigations of Trump before it makes a judgment about whether to impeach the president. But she and other Democrats are also waiting to see whether the Mueller report contains a true bombshell, and if it’s just worth further investigation — or impeachment. “What I’ve been saying all along is consistent with what she said,” House Majority Leader Steny Hoyer (D-MD) told reporters this week, referring to Pelosi. “She said we need to wait for the Mueller report, we need to see what the facts are. I think we need to have as much information as possible.” It’s too early to tell if the Mueller report will change Pelosi’s mind. But we still don’t know if she’ll even get to see the whole thing.
NEWS-MULTISOURCE
Peter C. Ragsdale v. J. A. Robinson. 1. Practice.—No objections to an instrument offered in evidence, not made in the court below, will be considered on appeal, even though objections be apparent upon it, and the original be sent up with the record. 2. Deed—Description.—To warrant the exclusion of a deed duly proven and offered in evidence, the court must be able to determine, from inspection of it, that it is absolutely void, or that it was for other and different land than that claimed. 3. Practice.—After a deed has been admitted in evidence, parol testimony, introduced in rebuttal, will not authorize the court to withdraw it from the jury. The testimony goes with tiie deed to the jury for their action. 4. Evidence.—Evidence that A or B did a certain act, is not admissible to prove that A did it. 6. Deed executed in blank.—When a party delivers a deed duly executed, with parol authority to fill blanks, and this is done, he is estopped from denying its validity, against a subsequent purchaser for value, and without notice of the manner in which the deed was executed. 6. Calls in a deed.—A deed described a tract of land as 200 acres of land, part of the John Cauble headlight survey, the other part of which survey having been sold to Gilliland; that sold to Gilliland hating been identified: Meld, A sufficient description of land, and to control contradictory calls for beginning corner, curves, and distance. 7. Construction.—Rules of construction of contracts discussed. Appeal from Smith. Tried below before the Hen. J. L. Henry, special judge. March 23, 1874, Peter G. Ragsdale brought an action of trespass to try title against Julius A. Robinson for one-third interest in 200 acres of land, part of the John W. Cauble 640 acres headright. The defendant pleaded not guilty, and limitation of three and five years. The parties also pleaded specially their titles, the various amendments covering about forty pages of the record. On the trial, plaintiff" read patent to John W. Cauble for 640 acres of land, and a deed from Cauble to plaintiff for one-third interest therein. The defendant filed his deeds relied on for title, with notice to plaintiff, September 10,1874, and on the trial read, over objections, the following deed: “The State of Texas, ) County of Guadalupe. Know all men by these presents, that I, Peter C. Ragsdale, in consideration of $200 to me in hand paid by Nathaniel Killoagh, the receipt is hereby acknowledged, have granted, bargained, sold, and released, and by these presents do grant, bargain, sell, and release unto the said Killough my interest, the following tract of land, situated in Smith county, near the southwest comer, and known as a part of the head-right of John Cauble: Beginning at a post on the west boundary-line of a seven-league survey, a post from which a red-oak bears IV. 36° W. 1 varas; another varas S. 32° W. 1 varas; thence north 832 varas, to a post from a willow-oak bears N. 3° E. 2^- varas; another bears N. 49 E. 5^ varas; thence north arid east so as to include two hundred acres of land, (the other part of the above survey having been sold to Gilliland,) to the beginning, containing 200 acres of land, together with all and singular the rights and appurtenances to the same belonging; to have and to hold all and singular the premises above mentioned unto the Killough, his heirs and assigns, forever. And I do hereby bind myself, my heirs, executors, and administrators, to warrant and forever defend the title to one-third of the above-named tract of land, it being all my interest in the same, unto the said Nathaniel Killough; his heirs and assigns, against every person lawfully claiming the same or any part of it. Witness my hand and seal, using a scrawl for seal. Signed, sealed, and delivered in presence of —■--, December 10, A. D. 1862. Attest: Peter C. Ragsdale.” [seal.] The deed had been duly acknowledged and recorded. To the deed, it was objected: (1) It does not describe the land sued for; and (2) it is unintelligible, and describes no land whatever. Before the trial, the plaintiff filed an affidavit, denying the execution of the deed. Defendant then read the will of Nathaniel Killough; deed by executors of Killough to Jefferson Wallace, of date February 5,1867, for 200 acres of the John Cauble 640 acres head-right; (describing the tract as “ beginning at the southwest corner of said survey; thence N. 832 varas; thence N. 45° E. 594 varas; thence E. 592 varas, to a stake from which a hickory six inches in diameter bears S. 24° E.; thence S. 1,232 varas, to a stake on the south boundary-line, with bearing-trees; thence W. 982 varas, to the beginning;”) deed from Wallace to J. F. Rosbury and defendant, for the same land, September 20,1867; and deed from Rosbury to defendant, November 12,1871. Defendant then read copy of a deed from Peter C. Rags-dale, plaintiff, to John H. Gilliland, administrator of the estates of E. H. and Margaret Gilliland, of date December 5, 1870, for all his interest in said John Cauble survey. A. J. Glaze, for defendant, testified that Wallace traded a tract of 200 acres to Killough for the land in controversy, and entered upon it in 1862 or 1863, and had lived on it until his sale to Rosbury and Robinson, in 1867. Witness knew the land in controversy. All the balance of the Cauble 640 acres survey was sold by plaintiff" to E. H. Gilliland in 1859, and a deed therefor was made to John H. Gilliland several years after the war. Witness testified to conversations of plaintiff touching the sale to Gilliland. The 200 acres in controversy does not touch the seven-league grant. It is in the southwest corner of the Cauble survey. Robinson had held possession of the land, from Wallace’s sale, in 1867, up to the trial. Plaintiff", in rebuttal, called Ira Ellis, who testified that he was a surveyor. After examining the map of Smith county and the field-notes set out in the petition, he testified that it being in the southwest corner of the Cauble survey, and by following the field-notes, it would not touch the seven-league grant. After examining the deed from Ragsdale to Eillough, he stated that to follow out the field-notes, the land would fall on the seven-league survey, and did not contain any portion of the Cauble survey. That a tract with the beginning corner on the west line of the seven-league survey, would not describe land situated in the southwest corner of the Cauble survey. “ He stated, also, that in the deed from Ragsdale to Eillough, the name Eillough and the description (that part in italics above) were in different handwriting and different ink from the balance, which was in Ragsdale’s handwriting. “A deed to land which ran off on the seven-league survey, could not be a part of the Cauble survey. The first call East in the deed would not be a call for land on the Cauble survey. The deed, then, was a misdescription.” <■ Below is a sketch showing the Cauble survey, with refer- ■ ence to the seven-league grant. The surveys are in southwest part of Smith county. Plaintiff testified that he had located the John W. Cauble 640-acre tract, and that Cauble made him a deed to an undivided one-third interest for his services; that on receiving a letter, he wrote a deed to his undivided one-third interest in 200 acres, to be taken off the north end of the Cauble tract, to begin in the western boundary of the Querado seven-league survey, and at the northern corner of the Cauble survey; thence with its northern and western boundary to a point, so that by running due east to the western line of the seven-league survey, and thence north to the beginning, would contain 200 acres; that he left blanks for courses and distances and bearing-trees, and for the name of the grantee; that he acknowledged the deed in Guadalupe county, and forwarded it to Killough; that he fixed the beginning corner on the western boundary of the seven-league survey, and northern corner of the Cauble survey; that after Killough’s death he sought to regain the deed, searching among his papers, and in the clerk’s office at Tyler; that he had paid taxes continuously on the land. Witness also testified to conversations with Robinson, which were in turn denied by Robinson. On the trial, the fourth interrogatory to Ragsdale, and the answer, were excluded on exceptions, as follows: “Int. 4. Did you receive a letter from Nathaniel Killough about December 1, 1862, in regard to the transfer of a part of the Cauble survey ? If yea, attach the said letter to your answer; and if the same is not in your possession, state whether it is lost or destroyed;' and if so, state as near as possible the contents of the letter.” “ Ans. to 4th. I received a letter about 1st of December, 1862. I am not certain whether it was from Nathaniel Killough or my brother, E. B. Ragsdale, stating that N. Killough had contracted to sell 200 acres of land off the northern end of the Cauble survey, in Smith county, Texas, and said Killough wished me to send a deed in blank, that he might fill it out and put in the name of the purchaser. The letter is lost or destroyed, and I have stated its contents as near as I can.” After the testimony of Ellis had been introduced, plaintiff moved to exclude the deed from Peter C. Ragsdale to Killough, because it described land different from that sued for. April, 1877, the case was tried on the above testimony. The charge of the court is sufficiently indicated in the opinion. Verdict and judgment were for the defendant, and Rags-dale appealed. Whitaker & Robinson, for appellant. I. We objected to the introduction in evidence of the instrument purporting to be a deed from plaintiff to N. Killough, because the same did not describe the land in controversy, nor did it describe any land; and, after the introduction of Ira Ellis, moved to exclude the deed, upon the ground that it did not describe the land in controversy, as shown by the testimony. These motions were not only overruled, but the judge, in his charge, gives not one word of instruction upon this very important issue. As sustaining the exceptions referred to, we would not only urge that unless this instrument actually calls for the land in controversy, or, by the legal rules of construction, could be made to do so, then it would constitute no muniment of title in this suit; but, in the second place, if it describes no land, or so inaccurately that it cannot be identified, which is evident on the face of the instrument, then we invoke the law—that if land be so inaccurately described as to render its identity wholly uncertain, the grant is void. (1 Greenl. Ev., sec. 350; 3 Wash. on Real Prop., 881-398; Wofford v. McKinna, 23 Tex., 36; Kingston v. Pickins, 46 Tex., 101; 5 Tex., 312.) II. As to the manner of construing this instrument. 1. Under this head, we complain of the error of the court-in excluding that part of the plaintiff’s deposition wherein he states that he received a letter from his brother, E. B. Rags-dale, or from N. Killough, informing him that Killough had contracted to sell 200 acres off of the north end of the Gamble survey. We contend that the evidence was legal, from whoever plaintiff may have received the letter, as going to show his intent in the instrument; upon the principle that it is admissible to prove the circumstances and information. upon which a party acted as explaining his action. (Wash., on Real Prop., 404; 1 Greenl. Ev., secs. 286-288 ; Stanley v. Green, 12 Cal., 162.) 2. The first great rule in construing written instruments is to give them such meaning as was intended by the parties at the time of the execution. But we must go further, and invoke other rules not given in the charge, and which are necessary to arrive at the true meaning of the instrument. The second step is, that since the beginning corner for land to be embraced in the Cauble survey is inconsistent with the course and distance given, then the beginning corner stands upon the principle, that .first a natural and then an artificial object controls course and distance. (3 Wash. on Real Prop., 405; Bolton v. Lann, 16 Tex., 96.) The third step is, that since the beginning corner fixed in the instrument is repugnant to the fact that all the land of the Cauble survey lying adjacent to the seven leagues had been sold to Gilliland, and the former being the first of the two repugnant clauses, it is held to prevail over the last. (3 Wash. on Real Prop., 398.) Now, what is the result of the application of these rules ? The deed, as far as a description of the land goes, remains just as it was when it left the hands of Peter C. Ragsdale, that is, a deed calling for land on the Cauble survey, with the beginning corner “ on the W. B. line of the seven leagues,” which corroborates in every particular the testimony of the plaintiff; and we may remark, that it is rather a significant circumstance when rules of law sustain a witness’ testimony so minutely. III. We now come to the investigation of the case upon the proof that the instrument, when it left the hands of the plaintiff, was incomplete in two essential particulars, that is, as not naming any grantee or describing any land. 1. Real estate, in this State, can only be conveyed in such manner as has been laid down in Paschal’s Digest, art. 997, and that is, that the instrument of conveyance shall contain all the elements necessary to make a deed, after which it shall be acknowledged before the proper authority. Now, when this instrument was signed and acknowledged by Peter C. Ragsdale, it had no significance, it spoke no language, and was of no greater effect than so much blank paper, with the party’s signature and acknowledgment on it. (Park v. Glover, 23 Tex., 472.) However plausibly it may be contended that this instrument could have been filled out before acknowledgment by a proper party, it, at any rate, cannot be urged with any rear son, under our statute, that the same could be done after acknowledgment ; and this, we say, is the rule, whether the instrument was in the hands of an innocent purchaser or not, and with the greater force when the face of the instrument itself is sufficient to create a suspicion, and put an ordinarily prudent man upon such inquiry as would lead to the true facts of the case. (3 Wash. on Real Prop., 242; McCown v. Wheeler, 20 Tex., 372; Viser v. Rice, 33 Tex., 139 ; Upton v. Archer, 41 Cal., 85; Preston v. Hull, 23 Gratt., (Va.,) 603; Master v. Miller, Smith’s Lead. Cas., and notes; Cross v. State Bank, 5 Pike, (Ark.,) 524; Mano v.Worthing, 3 Scam., (Ill.,) 26; Ingram v. Little, 11 Ga., 174; Byrns v. Lynde, 6 Allen, 305; Bashford v. Pearson, 9 Id., 387; Williams v. Crutcher, 5 How., (Miss.,) 71; 2 Dev. & Bat. Law, 381.) 2. If this instrument could be filled out after acknowledgment, it, at any rate, could not be in the name of the agent to whom it had been intrusted to complete the sale of the land; and could be avoided as to parties holding under him who knew, or might have known by reasonable diligence, of such defects. And here we submit, that special charges 4 and 5, asked for by the plaintiff, and refused, were proper, and should have been given. But the court, in the charge throughout, seems to have taken the view that the defects in the instrument must have absolutely been known to the defendant, although they may have been patent enough to have put an ordinarily prudent man upon inquiry that would have led to their discovery. IV. We come next to consider this instrument as altered in material particulars. 1 Greenleaf’s Evidence, sec. 565, says: “Any alteration of an instrument which causes it to speak a language different in legal effect from that which it originally spoke, is a material alteration.” In this instance, we think that the addition of the name of the grantee, and a description of land different from that intended by the grantor, is a material alteration, because, in the language of Park v. Glover, 23 Tex., 472, “As it was originally written, it had no legal effect; it spoke no language at all. By the addition of these words, a distinct legal effect was given to it; it was made to speak effectually and clearly.” It is well established by the authorities, that the alteration of an instrument in a material part renders the instrument void; and since every person must take notice of what his title papers disclose, the rule would apply with greater "force here, because the fact of the alteration is apparent upon the face of the instrument; or if not, it is, at any rate, sufficiently evident to arouse such suspicion as would put an ordinarily prudent man upon inquiry. And the defendant can derive no benefit from the tact that he never saw this deed until after the institution of this suit. The further rule of law, in connection with this subject, is that the burden of proof is on the party who offers an altered instrument to explain the alteration, and show that it was made with the consent or authority of the maker of the instrument; and the instrument should be excluded from the jury until the alteration is accounted for, or they should be instructed to disregard it in their finding, as requested by the plaintiff in his special charges. But, strange to say, these well-recognized rules of law were ignored by the court, and the charges refused. (3 Wash. on Real Prop., 243, et seq.; Waring v. Smyth, 2 Barb. (N. Y.) Ch., 119; Lewis v. Payn, 8 Cow., (N. Y.,) 71; Chesley v. Frost, 1 N. H., 145; Bowers v. Jewell, 2 N. H., 543; Wade v. Withington, 1 Allen, 561; Getty v. Shearer, 20 Penn. St., 12; Preston v. Hull, 23 Gratt., 605; Nunnery v. Cotton, 1 Hawks., 222; Burton v. Pressley, 1 Cheves, (S. C.,) 1; Park v. Glover, 23 Tex., 471; Ricks v. Wofford, 31 Tex., 415; 1 Greenl. Ev., sec. 564, et seq.; Smith v. McGowan, 3 Barb., 404; Jackson v. Osborn, 2 Wend., 555-9; Herrick v. Malin, 22 Wend., 388; Galland v. Jackman, 26 Cal., 85; United States v. Linn, 1 How., 104; Hills v. Barnes, 11 N. H., 395; Walters v. Short, 5 Gill., (Ill.,) 252; Jordan v. Neilson, 2 Wash., (Va.,) 166; Hodge v. Gilman, 20 Ill., 437; Farnsworth v. Sharp, 4 Sneed, (Tenn.,) 55; Huntington v. Finch, 3 Ohio, (N. S.) 445.) G. W. & Horace Chilton, for appellees. We proceednow to inquire as to the proper construction to be placed upon the deed from Eagsdale to Killough. On the question of the construction of a deed where calls conflict, the first great rule is to ascertain, not the mere intention of the grantor, “but the understanding of the parties, and those who were acting upon and interested in it.” (Rogers v. Broadnax, 27 Tex., 240.) And it is the part of the jury, and not of the court, to decide upon the weight and effect to be given to each and every call, subject to review by the court on a motion for new trial; (Booth v. Hpshur, 26 Tex., 64; Booth v. Strippleman, 26 Tex., 441; Jones v. Burgett, 46 Tex., 292;) and it is to be noticed here, that appellant himself took this view of the case on the trial below, and he will not be heard now to complain that the jury were not instructed as to the weight due to the different calls. We ask the court to carefully read the charge of the court, and we think it will be found that it states fully and clearly all the rules of law which were necessary to the proper decision of the case. The general rule for the identification of a survey, is that “the most material and most certain calls should control those which are less material”; but there is no fixed and invariable rule by which one class of calls are held to prevail over others. "While courts have laid it down as a rule of logic and of law, that first natural and then artificial objects shall be preferred to course and distance, yet the. calls least in dignity may, in some cases, become the most material calls. (Phillips v. Ayres, 45 Tex., 601.) The appellant argues, that the call for “beginning corner,pn the W. B. line of the seven leagues ” should prevail over the call, “ the other part of the above survey having been sold to Gilliland,” on the principle that the former of two repugnant clauses should be preferred to the latter. How, this argument proceeds on the theory that these two calls are of equal dignity, which is not the case. We have already shown the court, that, under the circumstances, the last call is the most certain call contained in the deed,—that it is necessarily exact. But, again, the rule which counsel invokes is not applicable, for Mr. Greenleaf says, (vol. 1, sec. 301,) speaking of the construction of deeds: “It is vain to imagine one part before another; for though words can neither be spoken nor written at once, yet the mind of the author comprehends them at once, which gives vitam et modum to the sentence.” Again, appellant did not ask any instruction on this point, and we are not at liberty to consider whether or not such charge would have been correct. In conclusion, we may add, that the object in “cases of this kind is to ascertain the intent of the parties. The rule to find the intent, is to give most effect to those things about which men are least liable to mistake.” (Davis v. Eainsford, 17 Mass., 210; Mclver v. Walker, 9 Oranch, 178.) How, can there be any doubt that' men are more likely to mistake a beginning corner, than the fact that the remainder of a survey has been sold to another person ? Then, again, Mr. Greenleaf says, (vol. 1, sec. 301,) citing numerous authorities: “ So if lands are described by the number or name of the lot or parcel, and also by metes and bounds, and the grantor owns lands answering to the one description and not to the other, the description of the land which he owned will be taken to be the true one, and the other rejected as falsa demonstration In this case, the call, “west boundary line of the seven leagues,” would include land which the grantor did not own at any time; and the call, “ the other part of the above survey having been sold to Gilliland,” would include land which he did own; therefore the last call is to be preferred. As tending to aid the court in the interpretation of this deed, we state some principles: 1st. Doubtful words and provisions in a deed are to be taken most strongly against the grantor. (Adams v. Frothingham, 3 Mass., 352; Hogg’s Appeal, 22 Penn., 190; Cocheco Manf. Co. v. Whittier, 10 N. H., 305, and many other cases.) 2d. Every deed is to be construed with reference to the actual rightful state of the property conveyed by it at the time of its execution. (Richardson v. Palmer, 38 N. H., 212; Moore v. Griffin, 22 Me., 350.) 3d. Where a deed may inure several ways, the grantee may elect which way to take it. (Jackson v. Hudson, 3 Johns., (N. Y.,) 375.) 4th. If the description be sufficient to ascertain the estate conveyed, although the estate will not agree to some of the particulars in the description, it will pass by the conveyance. (Worthington v. Hyler, 4 Mass., 196; Sawyer v. Kendall, 10 Cush., 241.) 5th. If by a particular construction the agreement would be rendered frivolous and ineffectual, and the apparent object of the contract would be frustrated, but a contrary exposition, though per se less appropriate, looking to the words only, would produce a different effect, the latter interpretation shall be applied, if it can possibly be supported by anything in the contract, or in the nature thereof. (Chitty on Cont., 78.) The third point made by appellant in Ms brief, is as to the filling of the blanks in the deed, thereby constituting an alteration, as he contends. Before we consider the validity and effect of a filling of a blank in a deed, we desire to submit to the court a few observations as to the right of appellants to raise this question. First, we maintain, that as defendant specially deraigned his title, plaintiff had no right to prove any matter seeking to avoid the deed, without first having plead this matter in avoidance. (See authorities before cited.) Second, that the deed not having been objected to when offered in evidence, on that ground, plaintiff had no right to a charge upon the question. In other words, can a party allow a deed, in which he claims that blanks have been filled, and thus altered, to go in evidence, without objection on that score, and then seek to destroy its effect by a charge to the jury ? Was it not incumbent on the plaintiff to plead specially that certain blanks in the deed had been filled, and then, when it was offered as testimony, to object to it, if he conceived it to be altered ? We think this, was clearly the proper course to have been pursued; otherwise, a party may introduce a deed, and when the case goes to the jury, have its sufficiency assailed on grounds which he might have obviated, if he had been apprised of its supposed deficiency by the pleadings, and if objection had been made when it was offered in evidence. The question of the alteration of a deed by the filling of blanks, like every other question of alteration, is one of evidence, and unless objection is made to it at the proper time, it cannot afterwards be attacked. The plea of non est factum, in this case, called in question only the execution of the deed, and did not do even this in a way to throw the defendant upon its proof, because the plea was filed more than one day after the deed. Ho proof could be received under it, except proof establishing the non-execution of the instrument. (Barnett v. Logue, 29 Tex., 282; Wells v. Moore, 15 Tex., 522.) What is the effect to be given to a deed, where no plea of non est factum has been filed within the statutory time ? A plea, styled a plea of non est factum, filed more than one day after a deed, is of no greater effect than an unsworn plea setting up the same defense. The fact that the plaintiff made oath to the plea in this case, adds to it no force whatever. Consequently, when the deed was offered, the plea was, in law, equivalent to the same matter written upon a piece of paper, and signed by Ragsdale’s counsel. How, under these circumstances, what was the effect of this deed as evidence ? If there had been subscribing witnesses to the deed, clearly it was entitled to the same force “ as if its due execution had been proven on the trial by the subscribing witnesses.” (Jordan v. Robson, 27 Tex., 612.) But as in this case there were no subscribing witnesses, what was the status of the deed ? The deed being acknowledged, it stood as if Peter G. Rags-dale had acknowledged the deed before the officer whose name and seal were affixed to it. Then the question arises,— Is not the acknowledgment conclusive of the facts therein stated, as between the grantor and a bona-fide purchaser of the land? (Wiley v. Prince, 21 Tex., 640; Shelby v. Burtis, 18 Tex., 644; Hartley v. Frosh, 6 Tex., 215; Pool v. Chase, 46 Tex., 210; Kerr v. Russell, 69 Ill., 666; Harkins v. Forsythe, 11 Leigh, (Va.,) 294, and other cases.) But it will be attempted to reply to this, by saying that the acknowledgment only concludes Ragsdale as to what was in the deed when he acknowledged it. But how can this court determine what was, and what was not, in the deed when Ragsdale acknowledged it ? Ho plea of non est factum having been filed, the acknowledgment stands proven in this court, and it is Ragsdale’s testimony at last contradicting the acknowledgment. If Ragsdale can be permitted to testily in this case that certain parts of a deed were not in it when acknowledged, what is there to prevent any grantor from coming in and destroying a deed, by swearing that certain parts of it had been put there after the acknowledgment ? The fact that certain parts of the deed are in a different handwriting and ink, does not conflict with this view, because it resolves itself again into the competency of Ragsdale’s own testimony, that ' these blanks had not been filled at the time he acknowledged it. The case of Park v. Glover, 23 Tex., 471, does not apply to this case; for there the certified copy from the county records showed that the blanks had been filled after the title bond had been recorded. But even if these objections which we have urged did not prevent plaintiff from raising the question, yet the principle which appellant contends for is not correct. That the blanks could have been tilled, see Van Etta v. Evenson, 28 Wis., 83; Gibbs v. Frost, 4 Ala., (N. S.,) 720; Banks v. Hammond, 1 Rich., 281; Gourdin v. Commander, 6 Rich., 497; Duncan v. Hodges, 4 McC., 239; Camden Bank v. Hall, 2 Green, 383; Worrall v. Munn, 5 N. Y., 229; Drury v. Foster, 2 Wall., 24; Field v. Stagg, 52 Mo., 534; Speake v. "United States, 9 Cranch, 28; White v. Ver. & Mass. R. R., 21 How., 575; Smith v. Crooker, 5 Mass., 538; Jones v. Primm, 6 Tex., 170, and other cases. Viser v. Rice, 33 Tex., 139, and all the other cases cited by appellant which we have examined, are cases between the original parties to the instrument. An examination of the case of McCown v. Wheeler, 20 Tex., 372, will show that the point decided in that case is favorable to us. Further, there was no instruction asked by plaintiff as to the right of a party to fill a blank after acknowledgment of a deed, and his complaint, that no such instruction was given, cannot be heard. We think it would be strange if an innocent third party should be deprived of land by the remote grantor, because blanks in a deed were filled, when the blanks were left there by the grantor for the very purpose of being filled. As to the alteration of the deed, we here reiterate what we have already said on the question of the conclusiveness of an acknowledgment, and the inadmissibility of such a defense in the absence of pleading, and again specially call the attention of the court to the fact that no objection was made to the deed as an altered instrument. In addition to all this, we do not understand the law to be, that a filling of blanks which were left to be filled, or the use of different ink, constitutes a material alteration. (Howard v. Colquhoun, 28 Tex., 142; Drury v. Foster, 2 Wall., 24; Speake v. United States, 9 Cranch, 28; 1 Greenl. Ev., sec. 568.) It would certainly be very hazardous to purchasers, if the fact that- part of a deed was in a different ink and handwriting avoided their deeds, as being materially altered. Then again, the presumption of law is, that the alteration was made before or at the time of the execution of the instrument. (Stoner v. Ellis, 6 Ind., 152; Matthews v. Coalter, 9 Mo., 705; Maybee v. Sniffen, 2 E. D. Smith, (N. Y.,) 1; Farnsworth v. Sharp, 4 Sneed, 55.) Moore, Associate Justice. This is an action of trespass to try title, brought by appellant, Ragsdale, against appellee, Robinson, for an undivided one-third of a tract of 200 acres of land, a part of a tract of 640 acres patented to John W. Cauble. All the important questions in this case arise out of, and depend upon, the construction and effect to be given to an instrument purporting to be a deed from appellant to 1ST. Killough, through and by which appellee claims to deraign his title. By an agreement of the parties, this instrument has been sent up with the record, that the court may, from an inspection of the original instead of a copy, more fully and clearly apprehend the objections made to it, and more satisfactorily and correctly pass upon and determine them. It may, however, be well, before entering upon the consideration of the supposed errors relied upon for the reversal of the judgment by counsel for appellant, to say that the fact of the original instrument being brought up with the record does not warrant objections being made to it here, which were not taken in the court below, even though it is manifest, from an examination of the instrument, that such objection, if taken at the proper time, should have been sustained. The first point urged by appellant’s counsel for a reversal of the judgment, is that the court erred in admitting this purported deed from Ragsdale to Killough over his objections, which were: 1st. Said deed does not describe the land sued for. 2d. The deed is unintelligible, and describes no land whatever. To have warranted the court in excluding the deed from the jury, as has been, in effect, decided by this court, (Kingston v. Pickins, 46 Tex., 99,) it must have been able to say, from inspection of it, that it was absolutely void, or that it was for other and different land than that claimed by the plaintiff". An inspection of the deed shows that it is a very inartificial instrument; that the draughtsman was extremely careless and indifferent to the proper discharge of the duty he had undertaken, or wholly unqualified to prepare such an instrument. But while this is the case, we cannot say the deed is void, or that it describes other and different land from that for which appellant sues. Nor did the testimony of the witness Ellis give any additional force to appellant’s objections. The evidence of the witness was not addressed to the court to rebut evidence of the appellee to establish a predicate for the admission of the deed; nor was it called for, or necessary for any such purpose. It was testimony for the jury, to be weighed and considered by them in determining the issues on which it bore. "Whatever effect the court might believe it should have in determining whether the deed described any land at all, or if it did, in showing its proper locality, this effect could be attained only by the action of the jury on it, and such other testimony as might be submitted to them. If it was material to show that appellant forwarded the deed to Killough, because he had received a letter from Killough requesting him to do so, the court did not err in excluding that part of appellant’s deposition to which appellee objected. The answer was not responsive to the question propounded, and was inadmissible to prove that the letter in question was from Killough. Evidence that either A or B did a particular act is not admissible to prove that A did it. If, however, as we are inclined to think, it was immaterial from whom appellant received the information which induced him to forward the deed to Killough, the ruling, though erroneous, is immaterial, and worked appellant no injury. His statement of what he was induced to do by the letter was admitted in evidence without objection. It is maintained by appellant, that the deed to Killough is void, because it w.as incomplete when it was acknowledged by him, and when it left his hands. This objection is unquestionably valid in fact, and if good in law the judgment should be reversed. The rule insisted upon by appellant certainly is recognized as correct, in respect to deeds and other instruments of like character, by many courts of the highest authority and the majority of the earlier decisions. But it is flatly denied by an equal, if not a greater, array of authorities at the present day. (Van Etta v. Evenson, 28 Wis., 33; Drury v. Foster, 2 Wall., 24.) Neither time nor space will admit of our attempting a review of even the leading cases on the subject, or to give the reasons which lead us to concur, as we think, with the majority of the more recent decisions, to the extent, at least, of saying that when a party delivers a deed duly executed, with parol authority to fill blanks, and this is done, that he is estopped against a subsequent purchaser for value, without notice of the manner in which the deed was executed, from denying its validity, which is as far as we need go in this case. (3 Wash., 220, and cases there cited.) The objection to the deed as an altered instrument is untenable. No such objection was made to it when offered in evidence; if it had been, the objection might have been fully met and explained. It comes too late when made after appellee’s mouth is closed, if the burden of removing any suspicion cast upon an instrument by apparent alterations or erasures rests on the party offering the instrument. But the real objection to this deed was that there were blanks in it when it was acknowledged, which had been subsequently filled, with the consent and permission of the grantor, by the party to whom it had been sent, and not that it had been altered after the blanks had been thus filled. The most serious and difficult question in the case, to my mind, is whether the deed can be held to sufficiently describe the land in controversy to pass the title. The beginning corner and the call for course by which the land is to be surveyed, are clearly repugnant to, and contradictory of, the call for the survey in which the land sold is situated. These contradictory calls cannot be reconciled. One or the other must be disregarded. And we agree with the court below, that preference should be given to the call for the survey from which the land sold is to be taken, rather than to the beginning corner and calls for course by which the land should be surveyed. Unquestionably, the parties would be more liable to fall into error in the latter calls than the former. This conclusion is also supported by' the maxim, that that construction should be preferred which gives effect to contracts, rather than that which renders them inoperative and void, where there is nothing else to turn the scale; and also by that which says, when the proper interpretation of an instrument is doubtful, it should be construed most strongly against the maker. Controlling weight must be given to the calls describing the land conveyed as 200 acres of land, a part of the John W. Cauble headlight survey; and also to the statement, by way of further identity, that “ the other part of the above survey having been sold to Gilliland.” This description of the land, in connection with the identification of the remainder of the tract previously sold, fully identifies and fixes the locality and boundaries of the 200 acres conveyed by the deed. Other questions are presented by the assignment of errors, and some of them have been discussed by counsel; but what has been already said renders it unnecessary to extend this opinion to a greater length. The appellant is estopped, as we have previously said, from controverting the validity of Ms deed to Killough. He made no pretense to owning more than one-third of the Cauble survey, which was 640 acres; yet it appears. that he has sold 440 acres of it—more than twice as much as he is entitled to under his deed, and all of the survey, except the 200 acres in suit. The alleged defect in defendant’s title, which is urged as a reason why he should recover the land, has resulted from appellant’s act, or that of the party whom he trusted to act for him. In no aspect in which we can view the case, has appellant either a legal or equitable right to a reversal of the judgment or a recovery of the land. The judgment is affirmed. Affirmed.
CASELAW
Community Articles Find and share helpful community-sourced technical articles Labels (1) Contributor Sqoop Overview Sqoop is a tool designed to transfer data between Hadoop and relational databases or mainframes. You can use Sqoop to import data from a relational database management system (RDBMS) such as MySQL or Oracle or a mainframe into the Hadoop Distributed File System (HDFS), transform the data in Hadoop MapReduce, and then export the data back into an RDBMS. Sqoop automates most of this process, relying on the database to describe the schema for the data to be imported. Sqoop uses MapReduce to import and export the data, which provides parallel operation as well as fault tolerance. Sqoop Performance Tuning Best Practices Tune the following Sqoop arguments in JDBC connection or Sqoop mapping to optimize performance • batch• • split-by and boundary-query• • direct• • fetch-size• • num-mapper• 2.Inserting Data in Batches Specifies that you can group the related SQL statements into a batch when you export data. The JDBC interface exposes an API for doing batches in a prepared statement with multiple sets of values. With the --batch parameter, Sqoop can take advantage of this. This API is present in all JDBC drivers because it is required by the JDBC interface. Enable JDBC batching using the --batch parameter. sqoop export --connect <<JDBC URL>> --username <<SQOOP_USER_NAME>> --password <<SQOOP_PASSWOR>> --table <<TABLE_NAME>> --export-dir <<FOLDER_URI>> --batch The second option is to use the property sqoop.export.records.per.statementto specify the number of records that will be used in each insert statement: sqoop export -Dsqoop.export.records.per.statement=10 --connect <<JDBC URL>> --username <<SQOOP_USER_NAME>> --password <<SQOOP_PASSWORD>> --table <<TABLE_NAME>> --export-dir <<FOLDER_URI>> Finally, you can set how many rows will be inserted per transaction with the sqoop.export.statements.per.transaction property: sqoop export -Dsqoop.export.statements.per.transaction=10 --connect <<JDBC URL>> --username <<SQOOP_USER_NAME>> --password <<SQOOP_PASSWORD>> --table <<TABLE_NAME>> --export-dir <<FOLDER_URI>> The default values can vary from connector to connector. Sqoop defaults to disabled batching and to 100 for both sqoop.export.records.per.statementand sqoop.export.statements.per.transactionproperties. 2.Custom Boundary Queries Specifies the range of values that you can import. You can use boundary-query if you do not get the desired results by using the split-by argument alone. When you configure the boundary-query argument, you must specify the min(id) and max(id) along with the table name. If you do not configure the argument, Sqoop runs the following query. sqoop import --connect <<JDBC URL>> --username <<SQOOP_USER_NAME>> --password <<SQOOP_PASSWORD>> --query <<QUERY>> --split-by <<ID>> --target-dir <<TARGET_DIR_URI>> --boundary-query "select min(<<ID>>), max(<<ID>>) from <<TABLE>>" 2.Importing Data Directly into Hive Specifies the direct import fast path when you import data from RDBMS. Rather than using the JDBC interface for transferring data, the direct mode delegates the job of transferring data to the native utilities provided by the database vendor. In the case of MySQL, the mysqldump and mysqlimport will be used for retrieving data from the database server or moving data back. In the case of PostgreSQL, Sqoop will take advantage of the pg_dump utility to import data. Using native utilities will greatly improve performance, as they are optimized to provide the best possible transfer speed while putting less burden on the database server. There are several limitations that come with this faster import. For one, not all databases have available native utilities. This mode is not available for every supported database. Out of the box, Sqoop has direct support only for MySQL and PostgreSQL. sqoop import --connect <<JDBC URL>> --username <<SQOOP_USER_NAME>> --password <<SQOOP_PASSWORD>> --table <<TABLE_NAME>> --direct 2.Importing Data using Fetch-size Specifies the number of entries that Sqoop can import at a time. Use the following syntax: --fetch-size=<n> Where <n> represents the number of entries that Sqoop must fetch at a time. Default is 1000. Increase the value of the fetch-size argument based on the volume of data that need to read. Set the value based on the available memory and bandwidth. 2.Controlling Parallelism Specifies number of map tasks that can run in parallel. Default is 4. To optimize performance, set the number of map tasks to a value lower than the maximum number of connections that the database supports. Use the parameter --num-mappers if you want Sqoop to use a different number of mappers. For example, to suggest 10 concurrent tasks, use the following Sqoop command: sqoop import --connect jdbc:mysql://mysql.example.com/sqoop --username sqoop --password sqoop --table cities --num-mappers 10 Controlling the amount of parallelism that Sqoop will use to transfer data is the main way to control the load on your database. Using more mappers will lead to a higher number of concurrent data transfer tasks, which can result in faster job completion. However, it will also increase the load on the database as Sqoop will execute more concurrent queries. 2.Split-By Specifies the column name based on which Sqoop must split the work units. Use the following syntax: --split-by <column name> sqoop import --connect <<JDBC URL>> --username <<SQOOP_USER_NAME>> --password <<SQOOP_PASSWORD>> --query <<QUERY>> --split-by <<ID>> Note: If you do not specify a column name, Sqoop splits the work units based on the primary key. 52,542 Views
ESSENTIALAI-STEM
Messages and listbox Hey, Can you explain how messages and listboxes work? Are you able to automatically populate a listbox based on certain parameters (like if a file is an .mov, add it)? Once you do, are you able to have the user select lines within the listbox and have it affect other parameters. (Have the ones the user picks translate to selected items, for example). Thanks! Hi @skimber , the list box is just a way to create fast list that you can copy easily. you need to create a message and click on “sum to list”, it will add each message to a one big list. finally you can show a list using the listbox line. Example - an automation that creates a list of all the .mov project items. Download - MOV List.json (3.9 KB) You can read more about messages and listboxes in the user guide website - Message - Automation Toolkit Pro User Guide the list box can’t do that, it’s only for showing text lists, but you can have a user select from a dynamic list of options(using a collection) that you choose or search for and affect other parameters in the automation (but you can only select 1 item of the list), but this question should be on another topic. Thanks, Alon
ESSENTIALAI-STEM
Poll: 70% say Mueller should be able to look at Trump's finances In a new CNN poll conducted by SSRS, 70% of people believe Trump's finances should be on the table for Mueller's Russia investigation. CNN reported on Friday that Mueller had expanded the investigation to include any possible financial crimes (even some unrelated to election), and "Trump and his associates' financial ties to Russia." Trump said in a New York Times interview that he believed Mueller looking at his finances unrelated to Russia is "a red line." Other poll take-aways: 67% of those polled believe Jeff Sessions "did the right thing" by removing himself from the investigation, 60% of respondents believe the Russia investigation is "a serious matter that should be fully investigated" and 59% disapprove of how Trump is handling the investigation. Sampling: The poll surveyed 1,018 adults; 30 percent of which identified as Democrats, 25 percent as Republicans, and 42 percent as Independents.
NEWS-MULTISOURCE
Page:Sanskrit Grammar by Whitney p1.djvu/144 (but there are many exceptions); 4. secondary derivatives in (1225) and (1245 e): e. g. ; ; 5. most ordinal numbers (487 h): e. g., ,. Not a few words make the feminine in either or : e. g. or -, or -, or -, or -; but ordinarily only one of these is accepted as regular. 333. There are no verbal roots ending in. But is sometimes substituted for the final of a root (and, rarely, for final ), and it is then inflected like an ordinary adjective in (see below, 354). 334. a. A noun ending in, when occurring as final member of an adjective compound, is inflected like an original adjective in , making its feminine likewise in or (367). b. For the most part, an adjective compound having a noun in as final member makes its feminine in. But there are numerous exceptions, certain nouns taking, usually or always, instead. Some of the commonest of these are as follows: eye (e. g., , ), leaf (e. g. , ; but ), face (e. g. , ; but etc.), limb, body (e. g. , ; but etc.), hair (e. g. , or -, etc.), ear (e. g. ; but etc.), belly (e. g. ), root (e. g. ; but oftener etc.). The very great majority of such nouns (as the examples indicate) signify parts of the body. c. On the other hand, a feminine noun ending in derivative shortens its final to to form a masculine and neuter base: see 367 c. d. In frequent cases, nouns of consonant ending are, as finals of compounds, transferred to the -declension by adding suffix (1209 a) or (1222). 335. The stems in इ and उ are inflected in so close accordance with one another that they cannot be divided into two separate declensions. They are of all the three genders, and tolerably numerous — those in इ more numerous than those in उ, especially in the feminine (there are more neuters in उ than in इ ). a. The endings of this declension also differ frequently and widely from the normal, and the irregularities in the older language are numerous.
WIKI
Sarcosaurus From Wikipedia, the free encyclopedia Jump to: navigation, search Sarcosaurus Temporal range: Early Jurassic, 194 Ma Sarcosaurus woodi.jpg Pelvis and parts of femur and dorsal vertebra Scientific classification e Kingdom: Animalia Phylum: Chordata Clade: Dinosauria Order: Saurischia Suborder: Theropoda Superfamily: Coelophysoidea Genus: Sarcosaurus Andrews, 1921 Type species Sarcosaurus woodi Andrews, 1921 Synonyms Sarcosaurus (meaning "flesh lizard") is a genus of theropod dinosaur, roughly 3.5 metres (11 ft) long. It lived during the Sinemurian stage of the Early Jurassic, about 194 million years ago. If the specimen called "Liassaurus" is confirmed as a synonym, Sarcosaurus would have an adult length over 6 metres (20 ft).[citation needed] Fossils of Sarcosaurus were found in the Lower Lias of England. The type species, Sarcosaurus woodi, was first described by Charles William Andrews in 1921 shortly after a partial skeleton had been found by S.L. Wood near Barrow-on-Soar. The generic name is derived from Greek sarx, "flesh". The specific name honours Wood. The holotype, BMNH 4840/1, consists of a pelvis, a vertebra and the upper part of a femur. The preserved length of the femur is 31.5 centimetres (12.4 in).[1] A second species, Sarcosaurus andrewsi, was named by Friedrich von Huene in 1932,[2] based on a 445 millimetres (17.5 in) tibia, BMNH R3542, described by Arthur Smith Woodward in 1908 and found near Wilmcote.[3] Confusingly von Huene in the same publication named the very same fossil Magnosaurus woodwardi. Later he made a choice for S. andrewsi to be the valid name.[4] In 1974 S. andrewsi was reclassified as Megalosaurus andrewsi by Michael Waldman, on the probably erroneous assumption it was a megalosaurid.[5] A later study concluded the two species to be indistinguishable except for size,[6] but other authors consider any identity to be unprovable as there are no comparable remains and conclude both species to lack autapomorphies and therefore to be nomina dubia.[7] Von Huene in 1932 referred a partial skeleton from the collection of the Warwick Museum to S. woodi but the identity is unproven; in 1995 it was given the generic name "Liassaurus"[8] but this has remained a nomen nudum. Andrews originally assigned Sarcosaurus to the Megalosauridae. The first to suggest a more basal position was Samuel Paul Welles who placed it in the Coelophysidae.[9] Later analyses resulted in either a position in the Ceratosauria,[10] or in the Coelophysoidea.[11]Ezcurra (2012) found Sarcosaurus to be the most basal ceratosaur in a large unpublished analysis.[12] See also[edit] References[edit] 1. ^ Andrews, C.W., 1921, "On some remains of a theropodous dinosaur from the Lower Lias of Barrow-on-Soar", Annals and Magazine of Natural History, series 9 8: 570-576 [1] 2. ^ von Huene, F., 1932, Die fossile Reptil-Ordnung Saurischia, ihre Entwicklung und Geschichte, Monographien zur Geologie und Palaeontologie 1(4) pp. 361 3. ^ Woodward, A.S. 1908. "Note on a megalosaurian tibia from the Lower Lias of Wilmcote, Warwickshire". Annals and Magazine of Natural History. 8(1): 257-259 4. ^ Huene, F. von, 1956, Paläontologie und Phylogenie der niederen Tetrapoden. Gustav Fischer Verlag, Jena. 716 pp 5. ^ Waldman, M. 1974. "Megalosaurids from the Bajocian (Middle Jurassic) of Dorset". Paleontology 17(2): 325-339 6. ^ Carrano and Sampson (2004). "A review of coelophysoids (Dinosauria: Theropoda) from the Early Jurassic of Europe, with comments on the late history of the Coelophysoidea." N. Jb. Geol. Palaont. Mh., 2004(9): 537-558. 7. ^ D. Naish and D. M. Martill. 2007. "Dinosaurs of Great Britain and the role of the Geological Society of London in their discovery: basal Dinosauria and Saurischia". Journal of the Geological Society, London 164: 493-510 8. ^ Pickering, S. 1995. Jurassic Park: Unauthorized Jewish Fractals in Philopatry. A Fractal Scaling in Dinosaurology Project, 2nd revised printing. Capitola, California. 478 pp 9. ^ S.P. Welles. 1984. "Dilophosaurus wetherilli (Dinosauria, Theropoda): osteology and comparisons". Palaeontographica Abteilung A 185: 85-180 10. ^ J A. Gauthier. 1986. "Saurischian monophyly and the origin of birds". In: The Origin of Birds and the Evolution of Flight, K. Padian (ed.), Memoirs of the California Academy of Sciences 8: 1-55 11. ^ M.T. Carrano, J.R. Hutchinson, and S.D. Sampson. 2005. "New information on Segisaurus halli, a small theropod dinosaur from the Early Jurassic of Arizona". Journal of Vertebrate Paleontology 25 (4): 835-849 12. ^ Ezcurra, 2012. Phylogenetic analysis of Late Triassic - Early Jurassic neotheropod dinosaurs: Implications for the early theropod radiation. Journal of Vertebrate Paleontology. Program and Abstracts 2012, 91. External links[edit]
ESSENTIALAI-STEM
C10H8N2 The molecular formula C10H8N2 (molar mass: 156.18 g/mol, exact mass: 156.0687 u) may refer to: * Bipyridines * 2,2'-Bipyridine * 4,4'-Bipyridine
WIKI
Page:Iran521120.pdf/3 The report, as amended and adopted, was subsequently submitted to the President for consideration. The President has this date approved NSC 136 as amended and enclosed herewith, and directs its implemanéation by all appropriate executive departments and agencies of the U. S. Government under the coordination of the Secretary of State. Accordingly NSC 107/2 is superseded by the enclosed report. The policy relating to the Eastern Mediterranean and the Middle East uuntained in tghe enclosure to Reference 1 is superseded by the enclosure and NSC 129/1 approved on April 24. 1952. JAMES S. LAY, Jr. Executive Secretary. cc: The Secretary of the Treasury The Attorney General The Director of Defense Mobilization NSC 136/1
WIKI
2 votes 1answer 38 views Silently drop OUTGOING mails to us.er.n.a.me@gmail.com (more than 3 dots in username part) With postfix-2.6.6-2.2.el6_1.x86_64 on CentOS 6.4 is there please a way to inspect OUTGOING mails and silently drop them (i.e. do not send them) if the recipient looks like us.er.n.a.me@gmail.com ... 0 votes 1answer 82 views Spam sent from fake email accounts on my domain [duplicate] One of my clients is getting thousands of "Delivery Status Notification (Failure)" emails per day and it's replied to random email accounts that don't exist on the domain. The content of the emails ... 0 votes 0answers 98 views Return-Path showing spam coming from my domain? So I just logged into an old email address to see a ton of similar messages like the one below: To: "oliver@example.com" <oliver@example.com> Content-Transfer-Encoding: 7bit Mime-Version: 1.0 ... 0 votes 1answer 151 views Our outgoing emails from a shared hosting provider (Bluehost) are returned because the server is listed as SPAM SERVERS I am getting very frustrated with this web hosting provider -- Bluehost.com. We have several small business sites hosted with them. We also use email accounts provided by the Bluehost for our outgoing ... 0 votes 1answer 159 views Making CommuniGate Pro react better on SPAM and Backscatter issues I would like to make a CGP mail server as SPAM free as possible. I made some research but didn't find so much. So my question: where should I start in order to make CommuniGate dealing better with ... 2 votes 1answer 194 views How do I configure my domain and web application so the emails send from the latter are not blocked as spam? I have a WordPress site that needs to send notifications to an email address. I would like the from field from this emails to be an address on my client's domain. I dont know much about email ... 1 vote 3answers 1k views Make Exim send bounces to postmaster instead of the sender, for non-local sender I have a few e-mail aliases that forward to external hosts. Currently, if the external host rejects a message, Exim generates a bounce message and sends it to the original sender. This is bad because ... 1 vote 1answer 290 views Email id @ IP address I getting the following error while I am taking SMTP test. The SMTP server does not accept mails to postmaster@[IP_ADDRESS]. This is a very bad thing, as this address is used by people that don't ... 0 votes 1answer 90 views Are you able to filter outgoing NDRs based on Header in Microsoft Exchange? I administrate an email system for a commercial ISP. I'm currently having an issue with one of our customers relaying outbound SMTP traffic from their Exchange system through ours, and they're ... 0 votes 2answers 512 views Stopping spam-related bounced emails One of my e-mail customers is currently on the receiving end of massive amounts of delivery failure notices as a "Nigerian scammer" seems to be using her address as its MAIL FROM field. A lot of it ... 22 votes 7answers 11k views How to stop spammers from sending spam as me We've starting to receive bounced spam messages and the sender is one of our email address. We know that we don't send spam from that address. We've tried changing the password but we're still ... 4 votes 1answer 354 views Avoid creating backscatter on a Postfix forwarding server I run a Postfix server that hosts a small, alias-based mailing list. Let's say people@myserver forwards to alice@someprovider and bob@someotherprovider. Now, alice@someprovider might use a more ... 1 vote 5answers 771 views How to configure email server to send lots of transactional emails My organization is currently outsourcing email delivery to an SMTP service provider. We're considering bringing that back in house to deliver our own emails. We send about 5k transaction emails per ... 3 votes 6answers 3k views Hotmail and Live.com rejecting all emails I have been having problems sending emails from my server to hotmail.com and live.com email addresses. I have read other posts on serverfault but they have not been helpful. Here is the error message. ... 0 votes 2answers 180 views Will Hotmail DELIVER to spam-friendly ISP? I have a user who is using Hotmail to communicate with one of our suppliers. Recently, Hotmail started bouncing emails to that address (while other ISPs are working fine.) Hotmail bounce messages ... 4 votes 1answer 303 views Indirect Postfix bounces create new user directories I'm running Postfix on my personal server in a data centre. I am not a professional mail hoster and not a Postfix expert, it is just used for a few domains served from that server. IIRC, I mostly ... 0 votes 3answers 380 views Need advice on integrating mail server with a smallish social network? I have been given a task to setup email management and delivery for a smallish social network. We're currently sending out about 1000 emails per day with help of VerticalResponse (a bulk emailing ...
ESSENTIALAI-STEM
About last night - POLITICO By Maggie Haberman 11/09/11 09:56 AM EST The First Read crew parses the meaning of the elections in key swing states last night, and comes up with a few hard-to-argue-with lessons that apply for next year - that the margins are small, and the perils of overreaching are great: ...Our initial takeaway is that they suggest this is no longer 2010 (or even 2009), when Republican enthusiasm fueled by the Tea Party helped the GOP win up and down the ballot...But if last night's results suggested that this is no longer 2010, it's also no longer 2008, when Democrats held the political upper hand. If anything, we're looking at a political environment one year before the 2012 presidential election that's a jump ball and could be decided by the slimmest of margins (like that Virginia state Senate race). Story Continued Below ...But there's another way to look at last night's results, especially when you add the surprising defeat of that anti-abortion/personhood amendment in Mississippi, the likely recall of anti-illegal-immigration Arizona state Senate President Russell Pearce (R), the two Ohio ballot measures, and the rejection of a Maine law ending same-day voter registration: Voters punished elected officials for going too far...Politicians may be pushing absolutes, but voters are sending a different message. By Thomas Joscelyn By Rich Lowry By David Freedlander By Mark A. Patterson 2017 POLITICO LLC
NEWS-MULTISOURCE
Orthonama Orthonama is a genus of the geometer moth family (Geometridae). It belongs to the tribe Xanthorhoini of the "carpet" subfamily (Larentiinae). Nycterosea is usually included here by modern authors, but may in fact be distinct enough to warrant recognition as an independent genus. The genus was erected by Jacob Hübner in 1825. Selected species Species of Orthonama (sensu lato) include: * Orthonama centrostrigaria (Wollaston, 1858) (= O. interruptata, O. latirupta, O. luscinata, O. mediata, O. paranensis) * Orthonama dicymanta Prout, 1929 * Orthonama discataria * Orthonama evansi (McDunnough, 1920) * Orthonama flavillacea * Orthonama obstipata (Fabricius, 1794) – gem * Orthonama plemyrata * Orthonama quadrisecta Herbulot, 1954 * Orthonama vittata (Borkhausen, 1794) – oblique carpet Synonyms Junior synonyms of Orthonama are: * Nycterocea (lapsus) * Nycterosea Hulst, 1896 (but see above) * Nyctosia (lapsus; non Hampson, 1900: preoccupied) * Orthonoma (lapsus) * Percnoptilota Hulst, 1896 * Plemyria Hübner, 1825a (non Hübner, 1825b: preoccupied)
WIKI
Page:King Alfred's Old English version of St. Augustine's Soliloquies - Hargrove - 1902.djvu/29 GRAMMATICAL OBSERVATIONS XXIII The ind. pres. pi. occurs as cumæð (10.1), beside cumað (10.2). The opt. pres. sg. has often the older -æ instead of -e, as in gelȳfæ (11.18) and lufiæ (15.22), magæ and mægæ (23.16); while the plural offers the following variations: leorniæn (68 8), findan (12.19), findon (12.18). These examples might be multiplied, but are sufficient to show the state of the language. Doubtless, when the field of Anglo-French is thoroughly worked over, Skeat's suggestion that these seeming abnormalities may prove important facts as to the date and writer of the manuscript, will be found true.
WIKI
Multispectral Photoacoustic Coded Excitation with Low PRF High Power Laser Diodes Martin F. Beckmann, Hans-Martin Schwab, Georg Schmitz 2014 IEEE International Ultrasonics Symposium Proceedings, Chicago (2014), pp. 1288-1291. doi:10.1109/ULTSYM.2014.0318 Abstract Photoacoustic imaging is based on the generation of ultrasound using laser irradiation. Solid state laser systems are commonly employed for this purpose, but pulsed laser diodes can be an attractive alternative. Currently, a photoacoustic handheld probe is developed within the European Union project FULLPHASE and will include multiple wavelengths. In this probe, multiple wavelengths will be available simultaneously. This can be exploited for increasing the signal to noise ratio of acquired images by generating images containing all wavelengths (“fused” images) at the loss of spectral information. Here we show that applying a multispectral code instead of a simple fusion of the wavelengths, allows to generate both a high SNR fused image and separate wavelength images simultaneously. The concept is applied in experiments using two wavelengths. tags: laser diodes, multispectral, photoacoustic coded excitation, photoacoustics
ESSENTIALAI-STEM
Talk:Paris-Panthéon-Assas University/Archive 2 Review of the Article As an editor who has done B-class, GA-class and A-class reviews and who has contributed B-class and GA-class articles, I think I'm relatively qualified to give an assessment of the article as it is in its current state. So I've taken the time to re-assess it against the B-class criteria. It is currently rated B-class, and I'm not going to change that designation, but, I hope the below will act to demonstrate what I think this article is lacking in. It lacks three things in my opinion; 1. citations (refer to B1), 2. well written and non-contentious claims (refer B2 and B4), and 3. standardized format - the citations that are here are a mess. * B1 - Referencing and Citations; * Lede - citations should not be pervasive in the lede, the lede summarizes the body of the article. That said, there are a heap of things said in the lede that are either not mentioned in the body, or, not cited in the body either. * Administration - entirely uncited. * Campuses; * The university has eighteen campuses in Paris and one in Melun. - Citation needed * The campus in Melun hosts local first-year students. It is located in the old town of Melun, on Saint-Étienne Island, among Roman and Gothic remains. The Institute of Law and Economics of Pantheon-Assas University is located there. - Citation needed * Admissions * All French universities are legally obliged to allow students to change universities and curriculums after the first semester of their first year. However, they are allowed to accept as few or many students as they like; Panthéon-Assas accepts only 3% of transfer requests. Admission to the second year of the university's master programs is selective as well, some of these programs admitting only 1.7% of applicants. - Citation needed * Libraries * and which is co-administered by Panthéon-Assas and Panthéon-Sorbonne. - Citation needed * Research - entirely uncited * Programs for excellence - entirely uncited * Alumni - entirely uncited * Presidents - entirely uncited * Citations themselves are a mess, most citations are just a link to an article and do not give the reader any information about the publisher, date, or author. The citations need a thorough cleaning. * Result: Fails B1 due to the significant portions of the article lacking any citation whatsoever. I didn't even count the multiple instances of questionable citations. * B2 - Coverage and accuracy; * Panthéon-Assas University has always been ranked first in law in national rankings - WP:PEACOCK; This is clearly impossible to prove. It may be ranked first by Eduniversal and others, but, that ranking only applies to them. As stated above this would need to be recast and attribution provided. It is not a neutral statement. Take Harvard, known to be one of the best institutions in the world, nowhere on it's article does it describe itself as such without giving proper attribution to whom is declaring it. Despite this, it's also ranked anywhere between 1st and 6th in other sources and this is acknowledged within the article as well. Assas is much the same - Eduniversal puts it first, QS puts it third, LLM puts it second. * is commonly associated with "excellence" in Law - This is far too vague to be of any use. One source =/= common. * and is seen in France and abroad as "the top law school in France". - by whom? and more importantly not "the", never "the". One of the... sure, but, "the" no. Not a neutral statement. * Panthéon-Assas University has always been ranked first in law in national rankings - only Eduniversal rankings and this alone is not sufficient to make such a declarative statement. Not a neutral statement. * Assas graduates have by far the highest salary of all French law schools. - According to "capital.fr" Assas graduates have by far the highest salary of all French law schools. A single source should never be used to make a contentious declarative statement. * Assas is commonly seen as a university of "excellence" in Law and is often called in France and abroad "the top law school in France". - I noted all the citations, but, I feel relative safe in saying that each of those sources state this only for themselves. I.e. They state that it is "the top law school in France", but, do not state "is often called ... the top law school in France". As such, this statement only reflects a select group of sources and not necessarily the common statement across all sources. * Thanks for your point of view. In fact, the source clearly states that it is generally considered as the top law school of France without giving its own opinion: "son image prestigieuse de “première université juridique de France”" . I don’t think "prestigious should be in the article, because all schools can be prestigious, but the reputation of first law school is clearly stated. --Launebee (talk) 14:09, 30 April 2017 (UTC) * Result = Fails B2 due to the fairly pervasive use of exaggerated or contentious labels that may well reflect the sources used within the article, but, cannot and do not reflect the views of all or most sources. * No, only the sources that you have selected say that. I have already provided ranking that says that this university compares poorly against other French universities. XIIIfromTOKYO (talk) 14:17, 30 April 2017 (UTC) * 1)No, you did not. 2) It is off-topic. We are talking about reputation here, and since the source was in French, I just explained. --Launebee (talk) 14:24, 30 April 2017 (UTC) * I did it on the French version of Wikipédia to your other puppet, and again on the English version. You are lying to an other contributor just to try to gain some time. It's relevant because it shows that you know that you are lying when you write this article. XIIIfromTOKYO (talk) 14:34, 30 April 2017 (UTC) * B3 - Structure * Result = Passes easily enough. * B4 - Grammar * Lede * Heir of the... - you mean successor. Buildings aren't heirs, they are successors. * Body * Panthéon-Assas was established so as to take over from the... - Not a well written sentence with run-ons to boot. Perhaps; Panthéon-Assas was established in 1970 to take over the faculty of law and economics from its predecessor, the University of Paris (Sorbonne Univesity) which itself was founded in the middle of the twelfth century and ceased to exist on December 31st, 1970 as a result of the student protests of 1969. * Clinging to the cultural legacy of the University of Paris, and considering that their faculty already gathered professors from other disciplines (political economics and political science) than their own, most of the law professors of the faculty of law and economics wished only to restructure their faculty into a university, so they founded the "University of law, economics and social sciences of Paris" or "Paris II". - Another poorly written sentence which I actually can't even follow. * and in 1998 to "Panthéon-Assas" only, in reference to the - run on. And in 1998 to "Panthéon-Assas" only. This is a reference to the... * The president of Panthéon-Assas is elected by members of the administration council, for a four-year tenure - remove the comma. * in 1969 serving as - in 1969, and serves as... * two dozens of research centres - two dozen research centres... * are located in the structure - a structure, not the. * It is registered among - it is registered as a... * second-year to four-year law students - fourth year. * with 1,700 seats; - a period (.) would be more appropriate. * Assas building has been redesigned last ten years and now hosts a learning center. - has it been redesigned in the past ten years, or over the period of the last ten years. * There's many more like this. I'm just not doing a complete review as parts of this article remain uncited and thus subject to change or removal. * Result = Not a B-class standard, so fails B4 as well. * B5 - Supporting Materials * Result = Passes with ease, though I'm not sure about non-free content usage. Overall; The article needs serious work to clean up the writing, fix up the citations, and remove insufficiently sourced non-neutral statements. This is definitely not an article I would pass at the B-class level. This is my opinion only, nor am I expecting anybody to undertake this as their project. I just want to explain/demonstrate where and how this article is lacking. Mr rnddude (talk) 11:14, 5 December 2016 (UTC) * As of today, nothing has been done to fix the issues. The conclusion is still fully relevant.XIIIfromTOKYO (talk) 14:17, 30 April 2017 (UTC) * The review was followed by a change and is not relevant anymore. --Launebee (talk) 09:23, 6 May 2017 (UTC)--Launebee (talk) 16:22, 30 April 2017 (UTC) * Never confuse movement with action. * Some dust was removed, but as of today, nothing has been done to fix the issues. The conclusion is still fully relevant. XIIIfromTOKYO (talk) 09:56, 6 May 2017 (UTC) * {{ping|Mr rnddude]], could you tell us if you think there still is a neutrality issue on this article. For understanding of sources, this one states that PA has an "image prestigieuse de “première université juridique de France”" ("prestigious reputation of top law school of France"). Thanks! --Launebee (talk) 23:02, 9 May 2017 (UTC) * You made an error with the ping template, but, I have this article on my watchlist so found it anyway. L'Etudiant doesn't state that PA has a "prestigious reputation of top law school of France" it says that PA "cultivates its prestigious image as the "top law school in France"". In fact, L'Etudiant was quoting the front page of PA's website which says; {{tq|Premiere universite juridique de France}}. There is a big difference between having that image and cultivating it. What L'Etudiant does say, however, is that PA is "renowned for excellence in Law"; {{tq|Réputée pour son excellence en droit}}. On the question of neutrality, yes it still has problems. Example; {{tq|... and is generally considered to be "the top law school in France"}}. Like I said, this isn't what L'Etudiant says. A more accurate portrayal of the source would be {{tq|... and cultivates it's own image of being "the top law school in France"}}. I think I said somewhere in my review that one source =/= a common view. I skimmed over my review and looked at the article in comparison. Most of my review still stands. The sources sections is much cleaner, but, the citations are still something of a mess. Large paragraphs still have no citation; e.g. Administration and Presidents. There are numerous grammatical problems that still exist. There have been some improvements though. What I did miss was the 16 revert (8 each) edit-war between you and {{u|XIIIfromTOKYO}} on April 30th, 2017 over this edit. From what I can tell, the edit war was over the phrase {{tq|... and is generally considered as "the top law school in France"}} and the removal of the maintenance tags for "advert", "refimprove" and "close paraphrasing". The rest of the edit seemed fine to me? Numerous sources added and some non-controversial material about PA's history. Is there anything else in the edit that you find controversial XIIIfromTOKYO. If there's a large edit and you contest a small portion of it only, then it's best to remove only the part that you find problematic and leave the rest in as a constructive contribution to the article. I'll probably come back to this sometime later, I have other things to attend to in the meantime. Mr rnddude (talk) 05:10, 10 May 2017 (UTC) * {{ping|Mr rnddude}} I have already tried {{tq|to remove only the part that you find problematic}}, but it is impossible with this contributor. * I have also tried to bring more contributors, but even admins have fleed. What should I do next ? XIIIfromTOKYO (talk) 06:30, 10 May 2017 (UTC) * {{ping|Mr rnddude}} Thanks. Is it better now? --Launebee (talk) 09:52, 10 May 2017 (UTC) * {{ping|Mr rnddude}}, Launebee has once again tried to remove the warning template. S/he says that it was beacause s/he was Following Mr rnddude remarks. Do you agree on that kind of beheaviour ? XIIIfromTOKYO (talk) 10:21, 10 May 2017 (UTC) * I'm considering trying to help this article out. It's not a topic of interest and I don't know anything about French educational institutions, but, I figure if we can bring to this article to an amiable quality (genuine B-class) that might end this dispute. I'm going to do a copy-edit of the whole article. I'll leave comments possibly both today and tomorrow. I was hoping to start work on either Lycurgus of Sparta or Djoser today, but, I'll postpone that for a few days if I have to. On the topic of Launebee's question; Yes, the change makes the article more neutral now. Whether the article is now NPOV I don't know as I haven't gone through the whole article. I also don't know that it was wise to remove the templates. Specifically, even if that addresses NPOV it doesn't touch on advert or refimprove. On the topic of XIIIfromTOKYO's question; I am aware that Launebee removed the maintenance templates from the article in their most recent edit. You've re-instated the templates. Can we leave the templates alone (in the article) for about a week or until all three of us are completely satisfied that they are no longer necessary. I also considered posting at Dispute resolution noticeboard as I don't actively participate in this area. If by the end of the week (Sunday, 14th May 2017 at 12:00 UTC - 2pm in France I think and 10pm AEST for me) we've made no or limited progress and are still having the same problems I'm going to leave a post at DRN. I'm also going to outline a proposal for dealing with controversial changes. 1. Be bold and make your contribution. 2. If it's undone (that is found controversial), bring the proposed change to the article talk and we'll discuss. 3. Do not reinstate the change until we have a consensus on what to do with it. If the consensus is to re-instate do so, if not, leave it out. Mr rnddude (talk) 10:52, 10 May 2017 (UTC) * Thanks a lot, your help would be greatly appreciated indeed! Launebee (talk) 23:05, 10 May 2017 (UTC) * {{ping|Mr rnddude}} As you can see, "Thanks a lot" mean "I don't care, I will remove the templates no matter what you say". I have had to face that beahaviour for months. XIIIfromTOKYO (talk) 21:50, 12 May 2017 (UTC) * It is very annoying that everything I do is turned into personal attacks by XIII. {{ping|Mr rnddude}} Do you think that even after your edits, one template is not sufficient? --Launebee (talk) 09:32, 13 May 2017 (UTC) Edit warring , Please stop removing sourced content. If you have arguments to disagree on sourced content that has been here for months, please talk first (without personal attacks like "you are lying") and then we get a consensus on your proposed changes. --Launebee (talk) 15:19, 30 April 2017 (UTC) * I am only following the rules. No Consensus has been reach, so the materials have to be removed from the article. XIIIfromTOKYO (talk) 15:28, 30 April 2017 (UTC) * No Consensus has been reach on your changes, so please follow the rules. Launebee (talk) 15:29, 30 April 2017 (UTC) * Give the links proving what you say. XIIIfromTOKYO (talk) 15:44, 30 April 2017 (UTC) * A link proving that you are deleting sources without consensus? Launebee (talk) 15:50, 30 April 2017 (UTC) * """The article needs serious work to clean up the writing, fix up the citations, and remove insufficiently sourced non-neutral statements.""". * You have had 5 months to fix it. You didn't . So I remove anything that fall under the ""insufficiently sourced non-neutral statements"". XIIIfromTOKYO (talk) 16:12, 30 April 2017 (UTC) * You are precisely deleting the sources. --Launebee (talk) 16:19, 30 April 2017 (UTC) * I'm deleting ""insufficiently sourced non-neutral statements"". * Sources and neutrality are 2 differents things. I have also given dozens of sources showing that antisemitism, racism, and many other criminal activities in Assas have been a commun sight for decades. Correct me if I'm wrong, but I haven't seen you saying that because it was sourced, it had to be on the article. I haven't used legal threat to put it on the article either. XIIIfromTOKYO (talk) 16:24, 30 April 2017 (UTC) * 1) It is false. 2) You cannot answer so you are personally attacking me. 3) You quote is about an old version, not about this one. --Launebee (talk) 16:27, 30 April 2017 (UTC) * Can you be more specific ? It should be a good start to give the quotes and diffs of anything that you think is "false", or an "personnal attack". It's getting very difficult to understand what you mean. * Again, I have also given dozens of references showing that antisemitism, racism, and many other criminal activities in Assas have been a commun sight for decades. There are references (lots of them), so do you agree to put them in the article ? XIIIfromTOKYO (talk) 06:52, 10 May 2017 (UTC) * PA has been sometimes the VICTIM of antisemitism because of its strong Jewish community. Once again, if a synaguogue receives swastikas, we wouldn’t summarize "antisemitism in this synaguogue"! PA has "porté plainte" (declared itself as victim to the public prosecutor for charges to be brought) because of this swastica put by one student (not at all common sight). Launebee (talk) 09:51, 10 May 2017 (UTC) * So now there is a strong Jewish community in this college. Do you have a reference to back that claim, or is that from your personnal experience or préjugés ? XIIIfromTOKYO (talk) 10:23, 10 May 2017 (UTC) * It is off-topic anyway, but you can see the Facebook page of Union des Étudiants Juifs de France Assas has a lot more likes and followers than UNEF Assas (twice less)(UNEF being historically the first student union of France) or UNI Assas (10 times less) (UNI being the first right-wing student union). --Launebee (talk) 23:06, 10 May 2017 (UTC) * So you don't have any solid reference to back your claim. * I have provided solid references that say that antisemitism, among other misbeheviour, has been a common sight on the campus for decades. I don't see any reason why it should be kept away from the article. XIIIfromTOKYO (talk) 06:57, 11 May 2017 (UTC) * Absolutely not, you only provided reference of the fact that Panthéon-Assas has been the victim of a swastika marking, and it is certainly not the only university with shamefull tags on its walls. --Launebee (talk) 21:00, 11 May 2017 (UTC) * victim is your opinion only. Nothing like that that is said in the references. XIIIfromTOKYO (talk) 21:23, 11 May 2017 (UTC) * The references say that PA has "porté plainte", so, legally, PA is called a "victim". --Launebee (talk) 11:40, 12 May 2017 (UTC) * On touche le fond. * Bon, je vais t'aider pour tes prochains partiels. Un dépôt de plainte n'est que le début de la procédure. Non seulement il ne présage pas du résultat final, mais en plus il peut tout à fait aboutir à un classement sans suite. * Tu n'as sans doute pas été assez attentif lors de ta capacité en droit, mais une fr:plainte et une fr:Plainte avec constitution de partie civile en France sont deux choses différentes. * Tu es bien conscient que tout es public, et que n'importe qui peut poster ça sur Twitter, avec ton exploit sur Eduniversal et Science-Po (avec tout le basard médiatique à prévoir vu certaines expressions utilisées en PDD ) ? XIIIfromTOKYO (talk) 10:26, 13 May 2017 (UTC) * It is the second time this user is threatening me by saying the press might be contacted etc. Not that I am afraid of this, but isn’t it contrary to Wikipedia policies? --Launebee (talk) 23:04, 13 May 2017 (UTC) * Needless to say that not a word of what Launebee says is true. * A new attempt to bring the discussion away from the main points. No serious reference has been provided. XIIIfromTOKYO (talk) 06:51, 14 May 2017 (UTC) * I made an ANI request. --Launebee (talk) 09:18, 14 May 2017 (UTC) Rankings, or journalists' opinions ? So most of the rankings used are from Eduniversal. "false advertising" was the expression used by fr:Jean-Loup Salzmann, the head director of the French University president network, and embarrassing was the word used by many other University presidents to define that company in France. Even the ministry of higher education was mulling a legal approach about that company. Does is qualify as a reliable source ? When we check the rankings, one can see that most of the references... are not rankings at all. Only words used by some journalists, and most of the time the university is not even the topic of these press articles. Does is qualify as a reliable source ? Strangely, the French version of the article provides a list of rankings. Real ones. By serious newspaper (Le Point, Le Figaro, L'Étudiant). The best univerity in France ? Well 15th, 19th, 49th, 52th. Real rankings are pretty bad. So yes, the, , and templates are a necessity, and others could be added. XIIIfromTOKYO (talk) 07:34, 14 May 2017 (UTC) You are confusing ranking and reputation. On rankings, it seems the French version has been written by you, and I explained you above "ranking" section, that these are not accurate. --Launebee (talk) 08:57, 14 May 2017 (UTC) * I've taken a look at a number of organizations that do University rankings specifically. The results were mixed. * QS World University Rankings for Law puts Pantheon-Assas as 101st-150th in the world and 3rd in France. <- this is by far the most relevant finding and also one that I made last year that has not been used in the article. * Webometrics puts Pantheon-Assas at 146th in France across all subjects and 176th in Excellence. It doesn't do subject specific rankings unfortunately. * For ARWU, CWUR, and THE (Times Higher Education) it does not appear in the rankings at all. ARWU doesn't do law rankings, and CWUR only does the top ten in the world for law which are all U.S. Universities. * THE lists; Ecole Normale Superieure, Paris-Sud University, Paris-Descartes, University of Bordeaux, Montpellier, U of Nantes, U of Nice Sophia Antipolis, Paris I, Ecole Centrale de Lyon, and U of Cergy-Pontaise. * GWC doesn't list Paris II either, but, it doesn't do subject or national rankings. * RUR doesn't list Paris II.. * So on and so on. Eduniversal rankings do not appear to be disreputable. Not from what I've found at least. That said, selectively listing only a single source which puts PA in the best possible light is by definition not neutral and therefore inappropriate. I'd like at least QS (3rd) and Eduniversal (1st) to be cited for national rankings in Law. I'd also like some comparison to world rankings; that is 101-150th according to QS for Law. I haven't found any other world wide rankings for PA in Law unfortunately. * On the topic of Eduniversal, they list PA as 27th in France. * It appear Meilleurs-Licenses is a subsidiary of Eduniversal. They are the one's who list PA as the best in France in Law. * Btw Masterbooking.fr is a subsidiary of Eduniversal. From what I gather, the problem with masterbooking.fr is that they are charging students (or potential students) for their applications or their services in a way that the Universities in question are completely unaware about? I read the whole article in translation, but, it wasn't very insightful to me. * Lastly and this annoys me most of all, L'etudiant does not list Paris II as 52nd, they list it as 54th. Clermont Ferrand 2 is 52nd. This isn't XIIIfromTOKYO's fault, that's actually what is written on the French article. I have gone ahead, made my first ever edit to the .fr Wikipedia and fixed it.. Mr rnddude (talk) 09:15, 14 May 2017 (UTC) --Launebee (talk) 09:30, 14 May 2017 (UTC) * As you can find in the PA article, QS rankings are based on English speaking publications. * The Eduniversal ranking you are refering to are in business, not in Law. "Licence" means "bachelor". The meilleures licences websites ranks bachelor degree, meilleurs masters masters’s degree, and the global site Eduniversal business schools (not law school) * The French websites rankings are very specific rankings, not overall rankings of universities. One is on job finding, but numbers are approximative, and PA has 97% of findings, so not noticable at all. The other one is diffulty to exams (proportions of pass in three years), so it is the same. These are not global rankings at all. * QS rankings and other rankings companies have also paid activities, some raised questions in France. But it has no relationship with the rankings. * Ah, I had missed that the QS rankings had been included already. Sorry, I had been looking at the lede with the Eduniversal ranking only. Rankings don't have to be global/overall only. You can have overall rankings and more specific rankings together in a larger section. I haven't written on any university or college article before so I've been trying to compare with University articles I actually know something about. Normally you'd but the global rankings first and then go into details if you want to. That's really just an article development question which I defer to those interested in expanding the article. Mr rnddude (talk) 09:50, 14 May 2017 (UTC) Sorbonne Law School XIIIfromTOKYO is repetitively deleting all reference to the name "Sorbonne Law School", saying it is an advertisement, even though you have sources with the Financial Times, the Chicago Tribune, Vocativ, US News either calling it "Sorbonne Law School", or explicitely saying PA is "the Law School in the Sorbonne". What to do? --Launebee (talk) 11:40, 12 May 2017 (UTC) * I have already clearly explained the point when I removed tyour mistake. * The École de droit de la Sorbonne is not the name of the university. It is the name of one of the departement of the university. * You have only provided very poor references so far. None of them come from a media with at least a minimum knowledge of the subject. * Still, you have provided a source showing that the university has been the craddle of "Holocaust-denying, Vichy-celebrating" groups for decades. XIIIfromTOKYO (talk) 10:19, 13 May 2017 (UTC) * Not at all the "cradle" of it. It is an article about Le Pen, saying by the way that she went to the Sorbonne Law School. Like Christiane Taubira and a lot of left-wing politician. About "media with at least a minimum knowledge of the subject", so Wikipedia should contain your point of view over the Financial Times, The Chicago Tribune, and three other major news agencies? --Launebee (talk) 23:04, 13 May 2017 (UTC) * The only references that you can find come from journalists who have never been to France, and have no particular knowledge on the topic. Obviously not reliable sources. Clear and simple. XIIIfromTOKYO (talk) 06:53, 14 May 2017 (UTC) * They "have never been in France" is really your argument for saying that The Financial Times is not serious about French universities? --Launebee (talk) 09:16, 14 May 2017 (UTC) Sources in Google cache: https://webcache.googleusercontent.com/search?q=cache:cct_UIjeLuMJ:https://www.ft.com/content/9e81dc58-9e57-11e0-8e61-00144feabdc0+&cd=1&hl=fr&ct=clnk&gl https://webcache.googleusercontent.com/search?q=cache:EbV6EJUm2QEJ:https://www.ft.com/content/510c561c-f405-11df-886b-00144feab49a+&cd=1&hl=fr&ct=clnk&gl --Launebee (talk) 17:58, 14 May 2017 (UTC) Findings and attempted research I've spent the past couple of days searching online for good sources for this article. PA is most notable in France, not particularly notable in an English speaking countries. This means in my searching that I've found fewer English sources than French. In this case specifically, aside from press releases (which I personally don't use for non-news articles at all) I haven't found anything useful to help me fix up the article. I've looked at the sources currently in the article, I'm of the opinion that the French sources are of a much better quality than the English ones. I've never heard of U.S. News before. The sources that I can look at are used improperly. For examples; I haven't been able to look at some sources like the Financial Times which requires a paid subscription. I don't speak French and can't translate google books pages without significant effort to rewrite entire pages first. Luckily, sources that are on news webpages I can get Mozilla Firefox to automatically translate the entire page for me. So I don't have to do so manually. In short, it would take a lot of effort for me to go through this entire article and actually fix it. Far more than I am willing to expend on this topic. What I can do is the basic copy-editing for grammar, spelling and punctuation that I have already done to parts of the article. I will endeavour to complete this copy-edit for the whole article. I've done about half of the article at this moment. This effort is being hampered by the edit-warring over content that continues at a slow pace. So instead I'm going to drive my focus to one specific thing; this material which has been the focus of the edit war for the last while. I can't remember if this dates back to the 2016 edit-wars, but, it's what is at stake right now. I'm going to go piece by piece into the material being added and removed in this edit and make a recommendation for each individual sentence. * 1. Assas’ international Law School, Sorbonne-Assas International Law School, is the 25th most popular in the world (1st of France) on LLM Guide cited to LLM. That's only half accurate Sorbonne-Assas is the 18th most popular in the world and first in France. That's not really the issue though. Sorbonne-Assas is not Pantheon-Assas (according to LLM), which is ranked 78th in the world and 5th in France on the same article. Indeed, I think Sorbonne-Assas is a reference to Paris I and not Paris II. Furthermore this popularity ranking is based on A ranking of the most popular Worldwide LLM listings in our directory based on unique profile views. This is a dubious at best way to measure popularity. * 2. On top of its official name, the university is referred to as "Assas" or "Paris II" cited to this article by "voanews". Mentions of Assas in the article = 0. Mentions of Paris II in the article = 1. Mentions of Pantheon-Assas in the article = 0. Yet somehow this source demonstrates that Pantheon-Assas is also referred to as Assas and Paris II. I understand what the point of this was, it was to link to a source that does call it by an alternative name. I don't know how the French encyclopaedia works, but, the English on has a very strict no original research policy. * or "Sorbonne Law School" ). Like I've said, I can't read the Financial Times article as it is hidden behind a paywall. So I have to neglect to pass any comment on this sentence specifically. (I have more to say about this on the second to last point) * Heir of the faculty of law and economics of the University of Paris (La Sorbonne),. I can support inclusion of this. I can confirm the veracity of the statement that Pantheon-Assas is l'Université Panthéon-Assas est l'héritière de l'ancienne Faculté de droit et de sciences économiques de Paris, composante de la Sorbonne, installée au cœur du quartier latin depuis le XIIIème siècle or in English the Panthéon-Assas University is the heir of the former Faculty of Law and Economics of Paris, part of the Sorbonne, located in the heart of the Latin Quarter since the 13th century. I can also state that University of Paris and Sorbonne are being used interchangeably within the source. I suspect the reason for this is that Sorbonne is the law school at University of Paris. XIIIfromTOKYO, I think you're getting a bit confused on this point. PA is the only heir of the faculty of law. Paris II inherited Law, Paris IV inherited humanities, Paris V inherited medicine etc, etc. Pantheon-Sorbonne (Paris I) is multidisciplinary and while an inheritor of University of Paris, was not built by a single discipline. * Panthéon-Assas University is ranked first in law by Eduniversal Support inclusion, but, not in the lede of the article. If you're going to do rankings, they need to be updated every year. Eduniversal has ranked Pantheon-Assas first in Law in France for the period 2016-17. By the way, change that sentence to is is ranked first in law in France by Eduniversal. Leaving it as first in law implies in the world. The rankings should only be mentioned in the section entitled rankings. This sentence should replace this one; Panthéon-Assas University has always been ranked first in law in Eduniversal rankings. I checked each year and in 2011-2012 PA was ranked third behind Pantheon-Sorbonne and Paris Dauphine. So no, not always. * and is renowned for excellence in Law." Accurate to the cited source. Can be included in the lede, but, this should be done with care and thought as to where in the lede this belongs. Third paragraph is a good place to do it with the discussion about who the alumni of the university are. * and "Sorbonne Law School". Citations 1 and 5 are both to FT. Citation 6 states law school at the Sorbonne. Citation 7 states Among them is Frederic Chatillon — a Hitler admirer and old friend of Le Pen’s from her Sorbonne law school days — who was banned per judicial order from having commercial ties with the National Front. In this case, citation 7 is inconsequential and should be removed. It's overlinking and doesn't actually go anywhere to suggest that Sorbonne Law School is PA. You'd have to know that Marine Le Pen was a student at PA to make the connection that Sorbonne Law School is in fact PA. I do have one problem with this whole Sorbonne Law School thing. While Sorbonne Law School does refer to PA it also refers to Pantheon-Sorbonne University (Paris I) and also Paris Law Faculty which is the predecessor of PA. * ... but Jean Chambaz, president of Paris-Sorbonne University, "bet" that Panthéon-Assas will follow the merge by 2021. Does not appear to be in the cited source. Jean Chambaz stated that PA chose to step aside from the merger for fear of losing their identity. I didn't notice anything about a merge in the future. Mr rnddude (talk) 11:09, 13 May 2017 (UTC) Sincerely thanks a lot for your work. Just few comments. * 1. Sorbonne-Assas is linked to PA, and has no link with Panthéon-Sorbonne, you can see their logo I agree LLM guide is not general, but only linked to itself. * 2. You have here the FT articles: Indeed, Panthéon-Sorbonne created in 2009 a law school with this name, but the Sorbonne Law School is primirily PA university, and it is called as such in different sources anyway. * 3. PA has always been first in law in France in Eduniversal rankings. If you look at your ehample (2011-12), the two first in the ranking are "Law and Management" ("Droit et gestion") bachelor degrees, Panthéon-Sorbonne is fifth of the ranking in pure Law. Since 2013-14, they separate Law and Law and Management (like Law and English was already separated), which makes things clearer. * 4. Chambaz says about their current refusal to be part of the merge: "Je fais le pari que dans quatre ans, leurs réticences seront levées." * Hope these comments help. * --Launebee (talk) 23:03, 13 May 2017 (UTC) * 1. Good, we agree that "Sorbonne-Assas" (or "Sorbonne-Assas international law school") is not the university itself, but just a school. So clearly saying that PA is "Sorbonne law school" is an obvious mistake and must be removed. * 2. See 1/ the school and the university are 2 different bodies. Poor references must be removed. * 3. Eduniversival... lol. "false advertising" was the expression used by fr:Jean-Loup Salzmann, the head director of the French University network, and embarrassing was the word used by many other University presidents. Even the ministry of higher education was mulling a legal approach about that company. * 4. So, nothing serious. XIIIfromTOKYO (talk) 07:06, 14 May 2017 (UTC) * 1.2. Not at all what I have said. Sorbonne-Assas international law school is a different entity created by PA, which is the Sorbonne Law School (not the international one). The FT is very clear about. * 3. It is false and you know it, they are talking about another activity of the company which own Eduniversal, and it is only opinions with obviously no legal claim. I already explained it to you above "rankings", and in Eduniversal talk page. All major French newspaper and some international ones have confidence in this company and this ranking, as already said. * --Launebee (talk) 08:57, 14 May 2017 (UTC) * Given the number of different threads and comments to deal with I'll try to be quick here. Launebee, on your first point, Sorbonne Law School is a disambig page which links to PA and Pantheon-Sorbonne. Indeed the Pantheon-Sorbonne University article has several references to Sorbonne Law School being part of their faculty. I don't know why that is because no citation is provided, I just noticed that its written into the article. On your second point, thanks for the links. On your third point, fair enough I had wondered why Pantheon-Sorbonne was listed twice. Though in this case, that would mean PS is first in Law and Management and third in Law with PA being first in just law. On your fourth, thanks for the quote and while it's nothing special, it's fair enough if you want to include it as sourced material. I don't mind either way. Mr rnddude (talk) 09:39, 14 May 2017 (UTC) * On point 1, "Sorbonne Law School" is originally the Paris Law Faculty, then it became Panthéon-Assas, and the PS created a different law school which it called that way in 2009, but we are talking about different entities. I see that they even created a "Sorbonne Law School" in English recently, which is the name of a master degree. But hese are other entities that they called this way. * On point 3, you are totally right. PA has no Law and Management bachelor degree, it is why it is not in this ranking. You can see that Law, and Law and English rankings are listed apart in the rankings section. * On point 4, thanks. * --Launebee (talk) 10:00, 14 May 2017 (UTC) As anyone can see hasn't reached an agreement on any text, nor has s/he even proposed one. Pretending to be "Following Mr rnddude remarks", S:he just reverted back. There is no concensus on any text, as nothing as ever been proposed on the talk page. XIIIfromTOKYO (talk) 10:29, 14 May 2017 (UTC) * You haven’t reached any agreement to remove sourced content which has been here for a long time, and supports, at least partially, the inclusion (Mr rnddude, tell me if I am wrong). --Launebee (talk) 17:58, 14 May 2017 (UTC) * I did say I support part of the edit in dispute. 1. I agreed with removing the LLM paragraph as potentially dubious. 2. I had no issue with including the Jean Chambaz quote with regards a merge in four years. 3. As far as I can tell, PA is the heir to the faculty of Law of the University of Paris. Indeed, that's what the cited source says. That said, I would still like to work out what to do with "Sorbonne Law School" – I mentioned above the ambiguity, and haven't worked out how to deal with it – and I don't think university rankings belong in the lede of the article. I have not seen this approach taken with more quality articles like Harvard University. It does appear in the lede in some University articles such as University of New South Wales. That's it I think. I got the message about leaving a comment at AN/I. Mr rnddude (talk) 04:38, 15 May 2017 (UTC) A new flock of IP reverting me So, for months on the French and the English Wikipédia, we had to face a flock of newly created accout, whose only was to revert contributors. It seems that a news strategy is at work, as IPs are now swarming the article. For today only : * <IP_ADDRESS> reverting me to hide the warning templates * <IP_ADDRESS> reverting me to hide the warning templates * <IP_ADDRESS> reverting me to hide the warning templates * <IP_ADDRESS> reverting me to hide the warning templates Funny isn't it ?XIIIfromTOKYO (talk) 18:45, 13 September 2017 (UTC) * The article has been protected. Sad to see that a criminal is using such a method to harrass an other contributors. Sad and disgusting. XIIIfromTOKYO (talk) 18:29, 15 September 2017 (UTC) Sources to be added has pointed out there are still sections that need sources and I have suggested that they provide those here. Feel free to ping me if there are suggestions here needing action which I have missed, whether from Launebee or anyone else. Or, if you are also willing to action such requests, please indicate that here, especially if you read French as some of these references may be in French. Andrewa (talk) 01:52, 6 October 2017 (UTC) Controversies? added nearly 15 references to the Sciences Po article about "scandals" related to that college (more than half of the references), so as to describe it as "strongly criticised in France and abroad and faced numerous scandals." in the lead. Neutrality explains that articles should be written "without editorial bias". So let's see what can be found about this university, and so, what should be written in the lead if it had to be written like Science Po's. XIIIfromTOKYO (talk) 09:20, 8 December 2016 (UTC) * Thank you to start this thread with a personal attack on me. If you have a change to propose about SP, please tell us there. You statement is irrelevant here. --Launebee (talk) 02:07, 9 December 2016 (UTC) * Can you stop saying that I'm a criminal who is breaking the rules ? XIIIfromTOKYO (talk) 11:09, 9 December 2016 (UTC) * I was merely explaining to you that your point was not relevant here. --Launebee (talk) 00:01, 14 December 2016 (UTC) Racism and antisemitism? The university has a long tradition of racism and antisemitism. Since its creation, ratonnades have been a common sight, , , ,. "Elitism" has a very specific meaning there. I have noticed that has written the lead section of Sciences Po so as to mention any controversies. So I assume that he or she will agree to mention in the lead the racist and antisemitic reputation of this university. XIIIfromTOKYO (talk) 22:06, 30 November 2016 (UTC) EDIT : and of course, Le Monde, Libération, and Le Parisien are serious newspapers, nothing like Eduniversal. XIIIfromTOKYO (talk) 22:07, 30 November 2016 (UTC) * refuses to talk about this part, and even claims that it concerns only "the 1970's (...)a few years with only a few students". * So to put it clearly, there is an an article about the Groupe Union Défense, so it's a bit famous. * But let's check an other article, by Le Figaro this time, and published in 2012 (an other well known newspaper) : * "les militants [de l'UDJF] se battaient fréquemment avec ceux du GUD dans les années 1980-1990" : UDJF activists and GUD members frequently clashed during the 1980's and the 1990's. * "Des bastons très violentes entre gudards et antifascistes dont certains ont eu des côtes cassées se sont déroulés près de l'université. Et deux cars de police ont été récemment postés devant la fac" : violent brawls between GUD members and antifascists near the university, some of them had ribs and noses broken. Two police vans had to be permanently dispatched in front of the campus. This part is about recent events, and the article goes on, gibing explanations about how these GUD members enroll in this "prestigious" university. XIIIfromTOKYO (talk) 02:23, 3 December 2016 (UTC) Panthéon-Assas is here the VICTIM of racism and antisemitsm What you are quoting (some fights sometimes near the university) is not at all what you are saying, ie foreigners and Jews being commonly beaten up in PA (ratonnades) or PA as an institution having or having the reputation to have an enduring tradition of racism and antisemistism! If you don’t understand that you cannot state that someone or an entity is a place for crimes, you should get informed about defamation. Your articles are only saying that some students had activities outside the university, and they tried and failed to get elected inside, that’s it. It’s not at all attached to PA, and you are yourself quoting that guards had once been put in front of PA, to prevent this violence to touch PA. But such a thing (temporary guard to protect the university from an external thing) exists for every Parisian university, it is Paris in itself that have some violence, especially student ones, perhaps like every capital in the world. --Launebee (talk) 09:01, 3 December 2016 (UTC) * Why are you refering to jew students as "foreigners" ? World War II is over, and you can still be French and jew. You should start to really carefully care about the words you use. * Well, for the rest of your comment, that's only your opinion. And of course it should be kept out of the article (and come on, cops in Front of every universities in Paris because of brawls ?) * I gave you references from well know newspapers (Le Figaro, Le Monde, Libération, and Le Parisien), I gave you the quotes, and their translations. There is a part about it on the French article. XIIIfromTOKYO (talk) 09:54, 3 December 2016 (UTC) * I did not write that at all, what you are writing is absolutely outrageous! * You cannot give references about one topic and invent anything you like about this topic. These newspapers are not saying that at all, simply because it is false, no court has ever said such despicable things exist in PA, and then it is libelous. Beating up people is a crime, letting that done inside an institution is a crime, having a tradition of racism and antisemitism is a crime, saying that someone has this reputation without any actual evidence is a crime. You cannot tell such things if it is not true. Any journalist who would have made such libelous statement would be prosecuted, and even if it was done, copying libelous statements from any source is in itself a crime. * You are now making libelous statements against PA and me. You seriously have to stop! * --Launebee (talk) 10:47, 3 December 2016 (UTC) * You have used to word "foreigners" to described thoses students, victims of racism and antisemitism. This kind of speech in France is deeply connected to far-right movements, and is considered as hate-speech. You say that you know a lot of things about France, so that's definitely something that you can't ignore. You are responsible for what you say. * I have given references from well know newspapers, I have quoted them, and I have translated these quotes. I have even shown that this topic is tackled on the French article. Your denial won't lead you anywhere. XIIIfromTOKYO (talk) 12:23, 3 December 2016 (UTC) * I clearly did not describe Jews as foreigners. Your attack is absolutely despicable. --Launebee (talk) 14:28, 3 December 2016 (UTC) As there is no valid opposition, this shall be added to the Lead, just like the scandals are mention in the Sciences Po lead. XIIIfromTOKYO (talk) 09:45, 5 December 2016 (UTC) * Illegal activities in SP have been pointed out by official state agencies and by courts. What you want to put in here is only libel. --Launebee (talk) 12:26, 5 December 2016 (UTC) * Still nothing relevant to say about these references ? Good. XIIIfromTOKYO (talk) 13:01, 5 December 2016 (UTC) Again, just a selection. XIIIfromTOKYO (talk) 09:49, 8 December 2016 (UTC) * As stated under, PA is a victim of this swastikas, because of its strong Jewish community, it asked for prosecution. If a synaguogue receives swastikas, we wouldn’t summarize "antisemitism in this synaguogue"! --Launebee (talk) 12:28, 7 April 2017 (UTC) Sexism? Just a short selection of articles related to sexism issues at this university. of course more can be added, and feel free to do so. XIIIfromTOKYO (talk) 08:59, 8 December 2016 (UTC) Not at all the deed of Panthéon-Assas * Private website, nothing to do with the university in itself (see under). --Launebee (talk) 12:28, 7 April 2017 (UTC) Unfair competition Again, just a selection. XIIIfromTOKYO (talk) 09:12, 8 December 2016 (UTC) Global answer Except those on the private school, none of these articles are related to the deeds of PA as an institution. In every academic institution, some students are doing things. For instance, in Harvard, blacks deans portraits have been crossed, but it is not Harvard as an institution at all. However, in Stanford, there has been concerns about the board attitude toward sexual assault: there, it is the institution (but even here, you could not repeat this as a fact until it proven in court). For SP, all of the scandals deal with SP as an institution, with judicicial sentences and state agency's report. For PA, I don't see how the managerial instances are anyhow involved in, for example in your claim of sexism, the fact one of its first year student created and then deleted a private-owned website (all your links deal with this event). Nobody is even accusing PA of any wrongdoing in your links. About racism, these articles do not support your original claims. About the private school, it is this time not libelous, but it is a very specific topic (is a law school allowed to create its own preparatory school) and not a controversy. --Launebee (talk) 02:07, 9 December 2016 (UTC) * The title is clearly a legal threat, and you have been warned against that. told you less than a week ago that "Danger, we've entered NLT territory". You refused to remove your comment, and you said what you simply started a "discussion as to whether material is libelous (is not a legal threat)". * Today you don't even try to start a discussion about that, that is say using Arguments to proove your statement. * That's clearly an intimidation attempt. XIIIfromTOKYO (talk) 11:28, 9 December 2016 (UTC) * No it's not, and I don't think Hasteur entered the AN/I thread with a sufficient level of understanding of the discussion. Discussing or declaring something to be libelous is not in itself a legal threat. Not a legal threat; "This is libelous". A legal threat; "This is libelous and I'm going to sue" or "This is libelous and I'll be contacting my attorneys about this" or anything to that effect. Anything that has the express intention of legal intimidation, which I'm not reading anywhere in the above, is a legal threat. That said, I'm going to ask you to refrain from declaring anything as being libelous or defamatory as it is not unreasonable for an editor to perceive it as such. Per NLT; if you repeatedly assert that another editor's comments are "defamatory" or "libelous," that editor might interpret this as a threat to sue, even if that is not your intention. It's a "trigger" word that leaves people uneasy. Understandably so since usually these terms are generally used in the context of lawsuits. Mr rnddude (talk) 11:55, 9 December 2016 (UTC) * I understand what you mean. In the same time, isn’t it important for him to know that what he is writing is seriously wrong, to the extent that he has to stop and the admins have to delete history? Yes, it is legally wrong, but it is also morally wrong to freely drag one’s reputation in the mire. * What he is trying to do is to say, there are newspapers talking in the same time of PA and Jews, so let’s say that this university has a tradition of having its Jews beaten up! And, by the way, this user is not happy with that, so let’s say he’s saying Jews are foreigners! He just 'can’t', because it is morally wrong. Don’t you think? * --Launebee (talk) 17:59, 11 December 2016 (UTC) * Doubling down on statements that editors have suggested could get you into trouble only demonstrates that you don't understand the point of NLT. Do not, under any circumstances, use language that suggests or implies that you are going to use legal action to get your point of view. Your repeated pirouetting about the definitions of the terms does not remove the chilling effect that your words and phrases have imparted to this page and to the ANI discussion. Next time you claim that you claim "libel" I will suggest that your repeated doubling down on your statements regarding the content have risen sufficiently to the point that administrative revocation of your ability to edit this encyclopedia should be enacted. I say again (along with Mr rnddude) knock off any claims of libel. There are other ways to express opposition to sources or claims such as I do not think X is right because Y,R,M, and Z which invites a consensus discussion instead of wielding implied legal threats. Hasteur (talk) 13:10, 12 December 2016 (UTC) * While I understand MrNudule point, I don’t understand yours. Once again, "A discussion as to whether material is libelous is not a legal threat." --Launebee (talk) 23:53, 13 December 2016 (UTC) Controversies over the decades. It's weird that this article, unlike Sciences Po's, doesn't have a "controversy" section. For decades, many newspapers, radios, and Tvs have published articles about problems women and/or minorities have to face there. Silencing theses issue clearly goes against NPOV. It needs to be addressed. XIIIfromTOKYO (talk) 16:12, 12 September 2020 (UTC) Translation help needed Could someone uninvolved who speaks French please evaluate the section above and tell us whether the sources claim what the person posting them says they claim? A question about this has been posted at Help desk Thanks! --Guy Macon (talk) 13:35, 25 November 2020 (UTC) * I am neither an admin nor involved. French is probably my third language. I skimmed all the above citations. * All the allegations are historical: 2007-2016. * The far-right allegations relate to a group, who claimed to be students, called Assas Patriote, and who claimed to be successors to Groupe Union Défense (GUD). Their activities may have taken place at the university, but there is no indication that they were condoned by the university; indeed, the swastika-daubing incident mentioned in the Europe1 citation was condemned by it. IMO they have no place in University of Paris II Panthéon-Assas, though they might merit addition to the GUD article. * The sexism allegations relate to a short-lived website, bestassas.com. I can see no reason for enwiki to cover that unpleasant one-off affair at all. Narky Blert (talk) 17:37, 25 November 2020 (UTC) * Thanks! That doesn't seem like it supports the claim "The university has been considered for decades as the hotbed of French far right". XIIIfromTOKYO, do you have a source that actually says that about this university? * As a general question just for my personal curiosity; in the US many universities tend to be somewhat leftist (in the US meaning of "left"). Is the same true of French Universities? Is there any evidence that the University of Paris II Panthéon-Assas is more to the right or left than is typical? As an analogy, in the US the University of California, Berkeley tends to lean more to the left than most and Texas A&M tends to lean more to the right than most. How about University of Paris II Panthéon-Assas? --Guy Macon (talk) 18:18, 25 November 2020 (UTC) * I think ment that most of these articles were published during the 2007-2016 period. I don't understand how an article published in 1995 could cover that period. Speaking of which, could you provide a translation from this article "Paris-II Assas continua donc la tradition de la faculté de droit de Paris, marquée, sans remonter aux Camelots du roi, par les riches heures de la corpo, présidée par Le Pen, et d'Occident, dirigé par Madelin. La tradition se perd. L'extrême droite lyncheuse, faute d'adversaires, a perdu son ressort anticommuniste". * An other is also needed from this article... : "Le local que la direction de l'université de droit Paris-II Panthéon-Assas vient d'attribuer au RED - le Rassemblement des étudiants de droite - dérange. (...) Car même si le RED n'a été créé qu'en 2000, il a déjà une lourde histoire derrière lui. Il n'est autre que le petit frère du GUD, le Groupe union défense née en 1968 à Assas et connu pour ses liens avec le Front de la jeunesse, son logo en forme de croix celtique et ses positions... radicales'" * ...This article... Cette arrivée (...) attire l'attention dans un établissement marqué par un passé de violences liées au militantisme d'extrême droite.] * ...or what's your opinion of what is said in this article. * And for Guy Macon's personal curiosity, yes some colleges have that kind of reputation in France. Toulouse Le Mirail, Rennes-II, or Paris VIII are often associated with left to far-left groups. Assas-Paris-II or Lyon-III are often associated with right to far-right groups. The Groupe Union Défense is notoriously associated with Assas. XIIIfromTOKYO (talk) 18:53, 25 November 2020 (UTC) * Those are opinion pieces about elements of the student body from time to time. They are not about the university as such. * I could comment about les événements and their inexact parallels in UK and US, but that would be WP:OFFTOPIC. Narky Blert (talk) 21:40, 25 November 2020 (UTC) * The student body is one aspect of the university, its research an other, its History an other one, its campus... Neutral point of view clearly says that an article must represent "all the significant views that have been published by reliable sources on a topic". That includes controversies. * You have failed to provide any translation so far. Still, you have managed to make a few mistakes, including claiming that an article published in 1995 was dealing with 2010's events. * Once again, there is a village pump for non-French speakers on FR.wiki. Not only a contributor form FR.wiki will be able to check these articles, but will also be able to under the political references in them. XIIIfromTOKYO (talk) 09:29, 26 November 2020 (UTC)
WIKI
Thunk From Wikipedia, the free encyclopedia   (Redirected from Thunk (compatibility mapping)) Jump to navigation Jump to search In computer programming, a thunk is a subroutine used to inject an additional calculation into another subroutine. Thunks are primarily used to delay a calculation until its result is needed, or to insert operations at the beginning or end of the other subroutine. They have a variety of other applications in compiler code generation and modular programming. The term originated as a humorous past participle of "think." That is, a "thunk value" is one that a program can use only by thinking through (executing) its calculation routine.[1] Background[edit] The early years of compiler research saw broad experimentation with different evaluation strategies. A key question was how to compile a subroutine call if the arguments can be arbitrary mathematical expressions rather than constants. One approach, known as "call by value", calculates all of the arguments before the call and then passes the resulting values to the subroutine. In the rival "call by name" approach, the subroutine receives the unevaluated argument expression and must evaluate it. A simple implementation of "call by name" might substitute the code of an argument expression for each appearance of the corresponding parameter in the subroutine, but this can produce multiple versions of the subroutine and multiple copies of the expression code. As an improvement, the compiler can generate a helper subroutine, called a thunk, that calculates the value of the argument. The address and environment[a]of this helper subroutine are then passed to the original subroutine in place of the original argument, where it can be called as many times as needed. Peter Ingerman first described thunks in reference to the ALGOL 60 programming language, which supported call-by-name evaluation.[2] Applications[edit] Functional programming[edit] Although the software industry largely standardized on call-by-value and call-by-reference evaluation,[3] active study of call-by-name continued in the functional programming community. This research produced a series of lazy evaluation programming languages in which some variant of call-by-name is the standard evaluation strategy. Compilers for these languages, such as the Glasgow Haskell Compiler, have relied heavily on thunks, with the added feature that the thunks save their initial result so that they can avoid recalculating it;[4] this is known as memoization. Functional programming languages have also allowed programmers to explicitly generate thunks. This is done in source code by wrapping an argument expression in an anonymous function that has no parameters of its own. This prevents the expression from being evaluated until a receiving function calls the anonymous function, thereby achieving the same effect as call-by-name.[5] The adoption of anonymous functions into other programming languages has made this capability widely available. The following is a simple demonstration in JavaScript (ES6): // 'hypot' is a binary function const hypot = (x, y) => Math.sqrt(x * x + y * y); // 'thunk' is a function that takes no arguments and, when invoked, performs a potentially expensive // operation (computing a square root, in this example) and/or causes some side-effect to occur const thunk = () => hypot(3, 4); // the thunk can then be passed around... doSomethingWithThunk(thunk); // ...or evaluated thunk(); // === 5 Object-oriented programming[edit] Thunks are useful in object-oriented programming platforms that allow a class to inherit multiple interfaces, leading to situations where the same method might be called via any of several interfaces. The following code illustrates such a situation in C++. class A { public: virtual int Access() const { return value_; } private: int value_; }; class B { public: virtual int Access() const { return value_; } private: int value_; }; class C : public A, public B { public: int Access() const override { return better_value_; } private: int better_value_; }; int Use(B *b) { return b->Access(); } int main() { // ... B some_b; Use(&some_b); C some_c; Use(&some_c); } In this example, the code generated for each of the classes A, B and C will include a dispatch table that can be used to call Access on an object of that type, via a reference that has the same type. Class C will have an additional dispatch table, used to call Access on an object of type C via a reference of type B. The expression b->Access() will use B's own dispatch table or the additional C table, depending on the type of object b refers to. If it refers to an object of type C, the compiler must ensure that C's Access implementation receives an instance address for the entire C object, rather than the inherited B part of that object.[6] As a direct approach to this pointer adjustment problem, the compiler can include an integer offset in each dispatch table entry. This offset is the difference between the reference's address and the address required by the method implementation. The code generated for each call through these dispatch tables must then retrieve the offset and use it to adjust the instance address before calling the method. The solution just described has problems similar to the naïve implementation of call-by-name described earlier: the compiler generates several copies of code to calculate an argument (the instance address), while also increasing the dispatch table sizes to hold the offsets. As an alternative, the compiler can generate an adjustor thunk along with C's implementation of Access that adjusts the instance address by the required amount and then calls the method. The thunk can appear in C's dispatch table for B, thereby eliminating the need for callers to adjust the address themselves.[7] Interoperability[edit] Thunks have been widely used to provide interoperability between software modules whose routines cannot call each other directly. This may occur because the routines have different calling conventions, run in different CPU modes or address spaces, or at least one runs in a virtual machine. A compiler (or other tool) can solve this problem by generating a thunk that automates the additional steps needed to call the target routine, whether that is transforming arguments, copying them to another location, or switching the CPU mode. A successful thunk minimizes the extra work the caller must do compared to a normal call. Much of the literature on interoperability thunks relates to various Wintel platforms, including MS-DOS, OS/2,[8] Windows[9][10][11][12] and .NET, and to the transition from 16-bit to 32-bit memory addressing. As customers have migrated from one platform to another, thunks have been essential to support legacy software written for the older platforms. Overlays and dynamic linking[edit] On systems that lack automatic virtual memory hardware, thunks can implement a limited form of virtual memory known as overlays. With overlays, a developer divides a program's code into segments that can be loaded and unloaded independently, and identifies the entry points into each segment. A segment that calls into another segment must do so indirectly via a branch table. When a segment is in memory, its branch table entries jump into the segment. When a segment is unloaded, its entries are replaced with "reload thunks" that can reload it on demand.[13] Similarly, systems that dynamically link modules of a program together at run-time can use thunks to connect the modules. Each module can call the others through a table of thunks that the linker fills in when it loads the module. This way the modules can interact without prior knowledge of where they are located in memory.[14] See also[edit] Thunk technologies[edit] Related concepts[edit] Notes[edit] 1. ^ The environment passed is that of the call with the by-name parameter, not that of the called routine. References[edit] 1. ^ Eric Raymond rejects "a couple of onomatopoeic myths circulating about the origin of this term" and cites the inventors of the thunk recalling that the term "was coined after they realized (in the wee hours after hours of discussion) that the type of an argument in Algol-60 could be figured out in advance with a little compile-time thought [...] In other words, it had 'already been thought of'; thus it was christened a thunk, which is 'the past tense of "think" at two in the morning'. See: Raymond, Eric S. (1996). Raymond, Eric S. (ed.). The New Hacker's Dictionary. MIT Press. p. 445. ISBN 9780262680929. Retrieved 2015-05-25. 2. ^ Ingerman, P. Z. (1961-01-01). "Thunks: a way of compiling procedure statements with some comments on procedure declarations". Communications of the ACM. Association for Computing Machinery (ACM). 4 (1): 55–58. doi:10.1145/366062.366084. ISSN 0001-0782. 3. ^ Scott, Michael (2009). Programming Language Pragmatics. p. 395. 4. ^ Marlow, Simon (2013). Parallel and Concurrent Programming in Haskell. p. 10. 5. ^ Queinnec, Christian (2003). Lisp in Small Pieces. p. 176. 6. ^ Stroustrup, Bjarne (Fall 1989). "Multiple Inheritance for C++" (PDF). Computing Systems. USENIX. 1 (4). Retrieved 4 August 2014. 7. ^ Driesen, Karel; Hölzle, Urs (1996). "The Direct Cost of Virtual Function Calls in C++" (PDF). OOPSLA. Retrieved 24 February 2011. Cite journal requires |journal= (help) 8. ^ Calcote, John (May 1995). "Thunking: Using 16-Bit Libraries in OS/2 2.0". OS/2 Developer Magazine. 7 (3). 9. ^ King, Adrian (1994). Inside Microsoft Windows 95 (2nd ed.). Redmond, Washington, USA: Microsoft Press. ISBN 1-55615-626-X. 10. ^ Programmer's Guide to Microsoft Windows 95: Key Topics on Programming for Windows from the Microsoft Windows Development Team. Technical Reference (1st ed.). Redmond, Washington, USA: Microsoft Press. 1995-07-01. ISBN 1-55615-834-3. Retrieved 2016-05-26. 11. ^ Hazzah, Karen (1997). Writing Windows VxDs and Device Drivers - Programming Secrets for Virtual Device Drivers (2nd printing, 2nd ed.). Lawrence, Kansas, USA: R&D Books / Miller Freeman, Inc. ISBN 0-87930-438-3. 12. ^ Kauler, Barry (August 1997). Windows Assembly Language and Systems Programming - 16- and 32-Bit Low-Level Programming for the PC and Windows (2nd ed.). Lawrence, Kansas, USA: R&D Books / Miller Freeman, Inc. ISBN 0-87930-474-X. 13. ^ Bright, Walter (1990-07-01). "Virtual Memory For 640K DOS". Dr. Dobb's Journal. Retrieved 2014-03-06. 14. ^ Levine, J.R. (2000). Linkers and loaders. Operating Systems. San Francisco: Morgan Kaufmann. ISBN 1-55860-496-0. OCLC 42413382.
ESSENTIALAI-STEM
Nicholas Sacco Nicholas J. Sacco (born November 17, 1946) is an American Democratic Party politician who served in the New Jersey State Senate from 1994 to 2024, where he represented the 32nd Legislative District. Sacco serveed as the chairman of the Senate Transportation Committee and was also a member of the Law and Public Safety and Veterans' Affairs Committee. He has served as mayor of North Bergen since 1991, and was allowed to hold two offices under a grandfather clause in a bill that took effect in February 2008 that prohibits dual office holding. Sacco announced on February 24, 2022 that he would not seek re-election to the State Senate. Early life Sacco was born in Jersey City on November 17, 1946. He grew up in West New York, graduating from Memorial High School. Sacco received a B.A. in 1968 in History from Rutgers University and an M.A. in Administration and Supervision from Seton Hall University in 1973. Political career Sacco was first elected to the North Bergen Board of Commissioners in 1985 as a part of recall elections headed up by Leo Gattoni to clean out corrupt officials in the Township. In 1991, Gattoni retired from the Mayor's office and decided to endorse Sacco as mayor (in North Bergen, the mayor is chosen among members of the Board of Commissioners). Sacco has been reelected every four years, most recently in May 2019. Two years after becoming mayor, Sacco defeated incumbent state senator Thomas F. Cowan in the Democratic primary election for the 32nd district. He has also been overwhelmingly re-elected to this office since his first election. In addition to serving as a state senator and mayor of North Bergen, Sacco served as the Director of Primary Education for the North Bergen School District until his retirement in 2017. Sacco has been Principal of Horace Mann and Lincoln School in North Bergen, and former president and vice president of the North Bergen Council of Administrators and Supervisors which is affiliated with the New Jersey Education Association. He simultaneously holds a seat in the New Jersey Senate and as Mayor. This dual position, often called double dipping, is allowed under a grandfather clause in the state law enacted by the New Jersey Legislature and signed into law by Governor of New Jersey Jon Corzine in September 2007 that prevents dual-office-holding but allows those who had held both positions as of February 1, 2008, to retain both posts. Sacco is a sponsor of the state's Urban Enterprise Zone legislation, which has helped foster private business investment in urban centers and generates millions of dollars in revenue for North Bergen and other cities. Sacco has also sponsored legislation expanding the use of DNA testing in criminal cases, by having DNA collected from individuals convicted of disorderly conduct offenses that could be compared against databases to help close unsolved crime cases. In 2021 Sacco voted in favor of legislation establishing a constitutional right to reproductive freedom. In 2012 the Hudson Reporter named him #1 in its list of Hudson County's 50 most influential people. In 2013 and 2014, he was ranked #3 (the first of which tied him with Senate colleague and Union City mayor Brian P. Stack), and #4 in 2015. On February 24, 2022, Sacco announced that he would not run for re-election as state senator in 2023, after North Bergen was redistricted to the 33rd Legislative District, which placed Sacco in the same district as his colleague, Union City mayor and state senator Brian Stack, whom Sacco said he would support. Committees Committee assignments for the current session are: * Law and Public Safety, Vice-Chair * Transportation District 32 Each of the 40 districts in the New Jersey Legislature has one representative in the New Jersey Senate and two members in the New Jersey General Assembly. Representatives from the 32nd District for the 2022—2023 Legislative Session are: * Senator Nicholas Sacco * Assemblyman Pedro Mejia * Assemblywoman Angelica M. Jimenez Personal life On November 26, 2022, Sacco married his longtime girlfriend Kathryn Somick at a ceremony at the Venetian in Garfield, New Jersey. His brother Joseph served as best man and his grandson, Nathan, was the ring bearer. Somick comes from a family with several members that work in the education system, and she herself worked with Sacco at the Board of Education.
WIKI
China’s CIC Aims to Invest in Canadian Resources, Globe Reports China Investment Corp. is looking to invest in Canadian resource, infrastructure and real estate companies, the Globe and Mail reported, citing the director of the Beijing-based sovereign wealth fund’s Canadian office. China Investment seeks minority stakes in such companies, not controlling investments, Felix Chee said in an interview. “There is a perception and concern about China and the controlling of resources,” Chee told the Toronto-based newspaper, adding that the fund “does not seek control” of any Canadian company. China Investment appointed Chee as head of the Toronto office, its first foreign representative bureau, in January. The fund bought a 17 percent stake in Teck Resources Ltd., Canada ’s largest diversified mining company, for C$1.74 billion ($1.5 billion at the time of purchase) in July 2009. To contact the reporter on this story: Hugo Miller in Toronto at hugomiller@bloomberg.net . To contact the editor responsible for this story: David Scanlan at dscanlan@bloomberg.net .
NEWS-MULTISOURCE
SMB SMB may refer to: Business * Small and medium-sized enterprises (SMEs), also known as small and medium-sized businesses (SMBs) Arts and entertainment * Sveriges Medeltida Ballader, a compilation of Swedish medieval ballads * Michigan State University Spartan Marching Band * Super Mario Bros., a 1985 NES video game * Super Mario Bros. (disambiguation), other articles related to the NES game * Super Monkey Ball, a video game series * Super Monkey Ball (video game), the first game in the series * Super Meat Boy, a 2010 platform video game * Super Mega Baseball, a sports video game series Science * Society for Mathematical Biology * Surface mass balance of a glacier or ice sheet Electronics and computing * SMB connector, SubMiniature B connector * System Management Bus, for computer communication * Server Message Block (SMB or SMB/CIFS), a network protocol Other technologies * Simulated moving bed for chromatographic separation * Surface marker buoy, to indicate a diver's position * Survey motor boat, for hydrographic survey Other uses * San Miguel Beermen (disambiguation), the name of several Philippine basketball teams * Sean Murphy-Bunting, an American footballer * Sekolah Menengah Berakas (Berakas Secondary School), Brunei * Seven Mile Beach, Grand Cayman * Shimbashi Station (Tokyo), JR East station code * Staatliche Museen zu Berlin, a group of museums in Berlin
WIKI
John Willis (judge) Sir John Ramsay Willis (1908 – 29 October 1988) was a British barrister and judge. He was known as J. Ramsay Wills at the planning bar and was known as "Jack" to his friends. The son of Dr and Mrs J. K. Willis, of Cranleigh, Surrey, Willis was educating at Lancing College, where he was a scholar, and Trinity College, Dublin, where he took the BA and LLB. He was called to the English bar at Gray's Inn in 1932. He was a High Court judge from 1966 to 1980, sitting in the Queen's Bench Division.
WIKI
Автор: Нуржабова Дилафруз Шукруллаевна Рубрика: Информатика Опубликовано в Молодой учёный №8 (112) апрель-2 2016 г. Дата публикации: 20.04.2016 Статья просмотрена: 12 раз Библиографическое описание: Нуржабова Д. Ш. Creating special dictionary on the platform android // Молодой ученый. — 2016. — №8. — С. 141-144.  This work is considered making the dictionary on three languages: Russian, Uzbek and English on sphere ICT, using оbject-oriented programming languages Java and database SQLite. The words is offered on three languages ICT sphere and created dictionary runs on platforms Android for device smart phones and tablets. Giving dictionary is intended for students, programmer and student studied on this sphere. Key words: Java, database SQLite, ICT, оbject-oriented programming languages. 1. Introduction Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google. Applications («apps»), which extend the functionality of devices, are written using the Android software development kit (SDK) and, often, the Java programming language that has complete access to the Android APIs. Java may be combined with C/C++, together with a choice of non-default runtimes that allow better C++ support [1, 3]. SQLite- compactly integrated relational database. The source code for the library in the public domain. In 2005 the project was awarded Google-O'Reilly Open Source Awards. As you know in its development SQL rushed in different directions. Young people interested in Android platform, because there is among popular tab, mobile devices or fashionable gadget [2,4]. 2. Russian, uzbek and english dictionary on sphere ICT SQLite database Large manufacturers have started to push any expansion. Although all sorts of accepted standards (SQL 92), in real life all the major databases do not support full have something of their own. So, SQLite tries to live by the principle of «minimal, but the full set». It does not support the complex stuff, but largely corresponds to SQL 92. And introduces some features which are very convenient, but it is not standard [5,6]. The word «embedded» (embedded) means that SQLite does not use the client-server paradigm, the SQLite engine is there is not a separate working process interacts with the program, and provides a library with which the program is assembled and the engine becomes an integral part of the program. Thus, as the protocol used by function calls (API) library SQLite. This approach reduces overhead costs, response time and simplifies the program. SQLite stores all database (including definitions, tables, indexes, and data) in a single standard file on the computer on which the program is executed. Ease of implementation is achieved due to the fact that prior to the execution of a transaction record the entire file that stores the database is locked; ACID-functions are achieved, including by creating a log file [5,6]. Several processes or threads can be simultaneously without any problem to read data from one database. An entry in the database can be carried out only if no other requests are currently not in service; otherwise write attempt fails, and the program returns an error code. Another scenario is the automatic repetition of attempts to write for a specified length of time. The bundle comes as a functional part of the customer in the form of an executable file sqlite3, by which demonstrates the realization of the main functions of the library. The client side runs from the command line allows access to the database file on the basis of standard functions of the operating system. Creating program and connected together database SQLite. At firstly, we try to create database under the three name: Dictionary Ict_temps Sqllite _sequences Fig.1. Interface of program SQLite database Fig.2. Entering words of three languages to SQLite database Secondly after connected database and entering words, as result is appears on the interface SQLite. 3. SQLiteOpenHelper and program code Due to the architecture of the engine may use SQLite as embedded systems, as well as on a dedicated machine with a gigabyte data sets. Older versions of the SQLite were designed without any restrictions, the only condition was that the database fits in memory, in which all calculations were performed using 32-bit integers [4,7]. This created some problems. Due to the fact that the upper limits have not been determined and thus properly tested frequently detected errors by using a sufficiently SQLite extreme conditions. Therefore, new versions were introduced SQLite limits are now tested with a common set of tests [4,7]. SQLite is available on any Android-powered device does not need to be installed separately. SQLite supports the types TEXT (analogue of the String Java), INTEGER (analogue long in Java) and REAL (analogue double to Java). Other types must be converted before you save the database. SQLite itself does not check the data types, so you can write an integer in the column designed for strings, and vice versa. In the third step part of dictionary be following view: package com.aiw.ictdictionary; import android.content.Context; import android.database.Cursor; import android.database.sqlite.SQLiteDatabase; import android.util.Log; import android.widget.Toast; import java.io.File; import java.io.FileOutputStream; import java.io.IOException; import java.io.InputStream; import java.io.OutputStream; import java.sql.SQLException; import java.util.ArrayList; import java.io.File; import java.io.FileOutputStream; import java.io.IOException; import java.io.InputStream; import java.io.OutputStream; import java.sql.SQLException; import java.util.ArrayList; public class DatabaseManager { public final String APP_TAG = "ICT_DICTIONARY"; public final String DB_NAME = "ict_dict.db"; public final String DB_FOLDER = "databases"; private static DatabaseManager instance; private SQLiteDatabase db; private Context context; private DatabaseManager(Context context) { this.context = context; this.db = openDatabase(DB_NAME); } public static DatabaseManager getInstance(Context context) { if (instance == null) { instance = new DatabaseManager(context); } return instance; } private SQLiteDatabase openDatabase(String dbName) { File dbFile = this.context.getDatabasePath(dbName); String dbPath = dbFile.toString(); File dbDir = new File(dbPath.substring(0, dbPath.lastIndexOf('.'))); if ( ! dbFile.exists()) { if ( ! dbDir.exists() ) dbDir.mkdirs(); copyDatabase(dbFile, dbName); } return SQLiteDatabase.openDatabase(dbPath, null, 0); } private void copyDatabase(File dbFile, String dbName) { try { InputStream istream = this.context.getAssets().open(DB_FOLDER + "/" + dbName); OutputStream ostream = new FileOutputStream(dbFile); byte[] buffer = new byte[100 * 1024]; int length; Android contains an abstract class SQLiteOpenHelper, with which you can create, open and update the database. This is the basic class with which you will have to work in their projects. If you implement this helper class is hiding from you the logic on which the decision to create or update the database before opening it. References: 1. Dmitriy Volkov. Google Android eto neslojno. Sbornik urokov. Elektronnoe izdanie, 2012. 2. Orlov L. V. Web-sayt bez sekretov. 2-e izd. M.: ZAO “Noviy izdatelskiy dom”, 2004. -512 p. 3. Wikipedia. Internet encyclopedias. (ru.wikipedia.org/wiki/Android) 4. Official web- site of Android, (android.com) 5. Spravka — OS Android. (http://support.google.com/android/?hl=ru) 6. Programmirovanie dlya android, java — s samix pervix shagov. (http://davidmd.ru/tag/eclipse/) API Guides for Android App. (http://developer.android.com/guide/components/index.html) 7. D.Vinogradov. Start Andorid. (Sbornik urokov) — 2012. 703 p. Основные термины (генерируются автоматически): SQLite, database SQLite, ICT SQLite database, program SQLite database, SQLite extreme conditions, library SQLite, SQLite engine, оbject-oriented programming languages, SQLite stores, interface SQLite, import, SQLite limits, import java.io.File, import java.io.FileOutputStream, import java.io.IOException, import java.io.InputStream, import java.io.OutputStream, import java.util.ArrayList, import java.sql.SQLException, languages ICT sphere. Ключевые слова Ява, База данных SQLite, ИКТ, Ориентированные на объектно-ориентированные языки программирования. Обсуждение Социальные комментарии Cackle Задать вопрос
ESSENTIALAI-STEM
What is the CLARITY technique neuroscience? CLARITY is a novel tissue clearing technique that transforms intact biological tissues into a nanoporous hydrogel-tissue hybrid, preserving anatomical structures, proteins and nucleic acids. The hydrogel-based structure is transparent after the removal of lipids and permits several rounds of immunostaining and imaging. What is CLARITY in the brain? When accompanied with antibody or gene-based labeling, CLARITY enables highly detailed pictures of the protein and nucleic acid structure of organs, especially the brain. It was developed by Kwanghun Chung and Karl Deisseroth at the Stanford University School of Medicine. What is CLARITY technique? CLARITY is a technique developed in the Deisseroth lab at Stanford University. The method is used to transform an intact tissue into an optically transparent and permeable hydrogel-hybridized form that can undergo immunostaining and high resolution 3-D imaging without damage to the sample. What is CLARITY microscope? The CLARITY Microscope is a new technology that enables 3D imaging of tissues. A number of lab groups have already expressed interest in the CLARITY technique and light sheet microscope facility. Can you use clarity with immunohistochemistry? As for immunostaining, a major advantage of CLARITY is that it permits multiple rounds of immunohistochemistry labeling after clearing compared with other tissue clearing methods2. What does iDISCO stand for? Authors of iDISCO (stands for “immunolabeling-enabled imaging of solvent-cleared organs“) included pretreatment of sample with methanol, hydrogen peroxide, detergents and dimethyl sulfoxide (DMSO) together with antibody labeling before clearing. Why do tissues clear? Clearing allows you to image thicker tissue sections, or even whole organs, by increasing tissue transparency, which ultimately yields more data from each experiment. What is the clarity of an image in a microscope? The resolution of a microscope or lens is the smallest distance by which two points can be separated and still be distinguished as separate objects. The smaller this value, the higher the resolving power of the microscope and the better the clarity and detail of the image. What is clarity tissue clearing? CLARITY is a tissue-clearing method that transforms intact tissue into a nanoporous hydrogel-hybridized form (crosslinked to a three-dimensional network of hydrophilic polymers) that is fully assembled but optically transparent and macromolecule-permeable. How does antibody staining work? Chromogenic immunohistochemistry: The cell is exposed to a primary antibody (red) that binds to a specific antigen (purple square). The primary antibody binds a secondary (green) antibody that is chemically coupled to an enzyme (blue). The enzyme changes the color of the substrate to a more pigmented one (brown star). What does tissue clearing do? What is clearing? Tissue clearing techniques all aim to make tissues or cell cultures more transparent to overcome their opacity, which prevents them from being penetrated by visible wavelengths of light under the microscope. What is a clearing reagent? Additional Information. CytoVista Tissue Clearing Reagent clears fluorescently labeled tissue to enable sharp and bright 3D fluorescent imaging at any tissue depth. This reagent is recommended for tissues that are easier to clear. How is clarity used to make brain tissue transparent? CLARITY. CLARITY is a method of making brain tissue transparent using acrylamide -based hydrogels built from within, and linked to, the tissue, and as defined in the initial paper, represents “transformation of intact biological tissue into a hybrid form in which specific components are replaced with exogenous elements that provide new… Why is clarity important in the field of neuroscience? CLARITY is powerful. It will enable researchers to study neurological diseases and disorders, focusing on diseased or damaged structures without losing a global perspective. How is clarity used in the medical field? When accompanied with antibody or gene-based labeling, CLARITY enables highly detailed pictures of the protein and nucleic acid structure of organs, especially the brain. It was developed by Kwanghun Chung and Karl Deisseroth at the Stanford University School of Medicine. How are excitatory neurons labeled in CLARITY imaging? Excitatory neurons are labeled in green, Inhibitory neurons in red, and astrocytes in blue. The process of applying CLARITY imaging begins with a postmortem tissue sample. Depending on the tissue type pre-processing steps such as demineralization or decolorization may be necessary after sample fixation.
ESSENTIALAI-STEM
Korean Red Ginseng: The Roots of Athletic Performance and Endurance Athletes, coaches, and their health providers are always on the lookout for safe and effective ways to enhance the athletic performance. The therapeutic values of many herbs are beneficial in not only supporting the performance but also in aiding the recovery process. Herbs like Ginseng are believed to boost energy and endurance levels, which make them supplements invaluable to sportspersons. Ginseng root extracts have been used in Asian countries for thousands of years. It is one of the most popular herbal medicines in the world [Jia and Zhao, 2009]. Korean red ginseng is the second best sold herbal supplement in the United states. Ginseng has plenty to contribute to human health. It is believed to: 1. Increase the endurance and strength of athletes, 2. Improve immunity leading to increased resistance to infections; 1. Be an ergogenic aid that improves physical performance; 2. Reduce physical fatigue; 3. Reduce mental stress; 4. Improve mental awareness; 5. Increase life expectancy. The Chinese Herbal “Qi” Ginseng is recorded by Asians as a Chinese herbal “Qi” meaning energy and life force. According to traditional Chinese medicine, ginseng root extract tonic has beneficial effects on the central nervous system. It helps to reduce stress and has an anti-fatigue action. Ginseng has the ability to accelerate metabolism. Herbs are non-woody plants whose flowers, seeds, or leaves are used for food, medicine, flavoring, or fragrance. The phytochemicals such as flavonoids, phenols, saponins, and terpenes in herbs are believed to account for their beneficial effects. Ginseng is an adaptogenic herb belonging to the genus Panax of the plant family Araliaceae. Adaptogens are therapeutic and restorative substances that promote a sense of general wellbeing. They help the body resist the damaging effects of stress. (Brekhman et al., 1966) The  main  bioactive components in Ginseng are ginsenosides and gintonin (Leung and Wong, 2010). About 30 steroidal glycosides called ginsenosides, found only in ginseng species, were considered the primary components of ginseng (Shibata et al., 1965). The ginsenoside levels can vary depending on the species, age of the herb, harvesting season, type of soil, and the part of the root being used. The fleshy roots of Korean red ginseng, traditionally harvested 6 years after planting, will contain 1-2% ginsenosides. Korean red ginseng: The Power of Ginsenosides A research team in Germany noted that athletes consuming Korean Red Ginseng supplements experienced remarkable improvements in their aerobic capacity. Another research from California State Polytechnic University studied subjects who took ginseng for a month found that the subject’s endurance levels to reach exhaustion levels had increased by more than 7 minutes. The adrenal corticotropic hormone (ACTH) has the capacity to bind to brain cells and affect a variety of stress-related processes in the body including motivation, performance, arousal and vitality. Ginseng’s positive effects are believed to be because of its interactions in the hypothalamic-pituitary axis to balance the secretion of ACTH. Athletes are prone to fungal infections like jockey’s itch and athlete’s foot as they tend to sweat a lot. Ginsenosides are found to have antimicrobial and anti-fungal properties. Studies have also found that isolated ginsenosides can stimulate the central nervous system. They level up the production of corticotropin and cortisol, and act as immunostimulants. As immunity strengthens, athletes are able to ward off many infections and they heal faster from sports-related injuries. Ginsenosides have the potential to prevent and treat inflammatory diseases. They play critical roles in inflammatory responses and diseases. They are said to regulate inflammatory responses by inhibiting the NF-κB signaling pathway. In vitro study results displayed the anti-inflammatory action of ginsenosides in treating many diseases. This is a great news for athletes as muscle injuries are extremely common among sportspersons. Inflammation can be due to stress and the ensuing cortisol release into the body. Joints may swell up as muscle fibers break down after intense workouts. The muscle inflammation creates pain and dysfunction resulting in the inability to return to practice or competition. Managing the symptoms can optimize recovery and reduce the time to return to practice. A Safe Herbal Supplement for Athletic Endurance Ginseng offers so many health benefits to athletes, from increasing endurance and energy to soothing muscle inflammation and preventing fungal infections like athlete’s foot, that it has become one of the most sought after dietary supplements in the athletic world. Since there are no known allergic reactions, drug interactions, or toxicity related to plants in the ginseng family, Korean red ginseng is considered quite safe for consumption. It is available for purchase as whole root, dried powder or standardized extracts. For adaptogenic and energetic benefits, a daily intake of 100 to 300 mg is recommended for a minimum of three to six weeks. Standardized extracts that contain 4-5 percent ginsenosides are considered the best for consumption for athletes as this ensures effectiveness of the product. References: http://www.sciencedirect.com/ https://www.motherearthliving.com/ https://en.wikipedia.org/wiki/Ginseng https://www.ncbi.nlm.nih.gov/ https://www.ahcmedia.com/ https://www.ncbi.nlm.nih.gov/ Image Credits: Flickr You might also like
ESSENTIALAI-STEM
Seasonal hysteresis of net ecosystem exchange in response to temperature change: Patterns and causes Shuli Niu, Yiqi Luo, Shenfeng Fei, Leonardo Montagnani, Gil Bohrer, Ivan A. Janssens, Bert Gielen, Serge Rambal, Eddy Moors, Giorgio Matteucci Research output: Contribution to journalArticlepeer-review 63 Scopus citations Abstract Understanding how net ecosystem exchange (NEE) changes with temperature is central to the debate on climate change-carbon cycle feedbacks, but still remains unclear. Here, we used eddy covariance measurements of NEE from 20 FLUXNET sites (203 site-years of data) in mid- and high-latitude forests to investigate the temperature response of NEE. Years were divided into two half thermal years (increasing temperature in spring and decreasing temperature in autumn) using the maximum daily mean temperature. We observed a parabolic-like pattern of NEE in response to temperature change in both the spring and autumn half thermal years. However, at similar temperatures, NEE was considerably depressed during the decreasing temperature season as compared with the increasing temperature season, inducing a counter-clockwise hysteresis pattern in the NEE-temperature relation at most sites. The magnitude of this hysteresis was attributable mostly (68%) to gross primary production (GPP) differences but little (8%) to ecosystem respiration (ER) differences between the two half thermal years. The main environmental factors contributing to the hysteresis responses of NEE and GPP were daily accumulated radiation. Soil water content (SWC) also contributed to the hysteresis response of GPP but only at some sites. Shorter day length, lower light intensity, lower SWC and reduced photosynthetic capacity may all have contributed to the depressed GPP and net carbon uptake during the decreasing temperature seasons. The resultant hysteresis loop is an important indicator of the existence of limiting factors. As such, the role of radiation, LAI and SWC should be considered when modeling the dynamics of carbon cycling in response to temperature change. Original languageEnglish (US) Pages (from-to)3102-3114 Number of pages13 JournalGlobal change biology Volume17 Issue number10 DOIs StatePublished - Oct 2011 Externally publishedYes Keywords • Carbon cycle • Climate change • Day length • Ecosystem respiration • Gross ecosystem productivity • Leaf area index • Seasonal variation • Temperature sensitivity ASJC Scopus subject areas • Global and Planetary Change • Environmental Chemistry • Ecology • General Environmental Science Fingerprint Dive into the research topics of 'Seasonal hysteresis of net ecosystem exchange in response to temperature change: Patterns and causes'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Wednesday, January 22, 2020 kodak history :: essays research papers On July 12, 1854 in the village of Waterville Maria Kilbourn and George Washington Eastman had a child that would change the way the world took pictures forever, and that child was George Eastman. When George was five his father sold the family nursery business and moved to Rochester where he founded the Eastman Commercial College. Shortly thereafter Georgeââ¬â¢s father died and the College failed leaving George and his mother in financial despair. So because of family circumstances George had to drop out of school at the age of fourteen and find a job. His first job was as a messenger boy with an insurance firm, which paid three dollars a week. A year later George got a job as an office boy for a different insurance firm. There through his own hard work, dedication, and initiative he soon took charge of filing policies and even began to write them. With these new responsibilities his pay rose to five dollars a week. After four years of working at the insurance firm he was hired as a junior clerk at Rochester Savings Bank where his current salary of five dollars a week tripled to more than fifteen dollars a week. Four years later George had planned to take a vacation to Santo Domingo. When a colleague of his suggested that he make a record of the trip George went out and purchased a photographic outfit with all the paraphernalia of the wet plate days. This was to be his first endeavor into the photographic world. At the time cameras were as big as todayââ¬â¢s microwave ovens and needed a heavy tripod to support them. He also had purchased a tent to develop the pictures before the glass plates dried out. The supplies needed consisted of glass tanks, a heavy plate holder and a jug of water the entire outfit ââ¬Å"was a pack-horse loadâ⬠as George described it. Learning how to use his new equipment cost him five dollars. After all this George never made his Santo Domingo trip but became completely engrossed in photography and seeking out ways to simpl ify the process. George had heard that British photographers were using their own gelatin emulsions that remained sensitive after they were dry and could be exposed at your leisure. Using a formula he got from a British magazine for emulsions, George began making his own. He continued to work at the bank during the day while experimenting in his motherââ¬â¢s kitchen in the evenings.
FINEWEB-EDU
User:Jaydon Kennedy Jaydon Scott Kennedy was born on April 2nd, 2004. He his a professional animator and is best known for his creation "Space Aliens" Kennedy is also known for his work with another animator named Caden Hoyme. He also plays as Marcus in This is the future.
WIKI
A revision to the Inventory of Vascular Plants for the Sefton Document Sample A revision to the Inventory of Vascular Plants for the Sefton Powered By Docstoc 1 A revision to the Inventory of Vascular Plants for the Sefton Coast Philip H. Smith October 2006 2005/06 was a particularly productive period for finding new plants on the Sefton Coast. This came about through continuing field work for the New Flora of South Lancashire project and BSBI and Bradford Botany Group field meetings at Birkdale in June and July 2006, when experts from further afield determined several new taxa. More significant additions were made during a 2006 survey of a recently scrub-cleared slack at Cabin Hill NNR, where several exotic ruderal plants turned up (Smith 2006a). Other interesting finds were made at Range Lane, Formby, where works to improve access for site traffic disturbed adjacent soils, leading to appearance of other scarce ruderals. Also, two new brambles (Rubus) were located on Freshfield Dune Heath. In total, 25 new taxa were added to the Inventory and 5 “extinct” species were rediscovered (Table 2). In addition, two identifications were changed (Triteleia laxa for Brodiaea sp. and Erigeron speciosus for E. glaucus) and the omission of SCI status for Fumaria bastardii was corrected. Table 1 lists the additional taxa, using the same format as the Inventory (Smith 2005, 2006b). Table 3 provides an overall summary of vascular taxa recorded in the Sefton Coast Partnership area and in the sand-dune system. The new total of vascular plants for the Sefton Coast is 1202 and, for the sand-dunes, 1075 taxa. Acknowledgements I would like to thank particularly M.P. Wilcox, D.P. Earl, E.F. Greenwood, P. Jepson and the Bradford Botany Group for contributing records to this study. References Smith, P.H. (2005). Inventory of Vascular Plants for the Sefton Coast. Unpublished report to Sefton Coast Partnership. 2 Smith, P.H. (2006a). Vascular plants of a scrub-cleared area at Cabin Hill NNR. Unpublished report to English Nature. Smith, P.H. (2006b). An inventory of vascular plants for the Sefton Coast. BSBI News 102: 4-9. Table 1. New additions to the inventory. Taxon English name Status Habitat Acorus calamus* Sweet-flag Rare Scrape D Atriplex hortensis* Garden Orache Rare Disturbed Ground D Briza maxima* Greater Quaking-grass Rare Disturbed Ground Carex x pseudoaxillaris Hybrid sedge Rare Dune slack D Clarkia amoena* Godetia Rare Disturbed ground D Colchicum autumnale* SCI Meadow Saffron Rare Disturbed ground D Cotoneaster x suecicus* Swedish Cotoneaster Rare Disturbed ground D Datura ferox* Angels’-trumpets Rare Disturbed ground D Epilobium palustre x E. Hybrid Willowherb Rare Dune slack D ciliatum Fagopyrum esculentum* Buckwheat Rare Disturbed ground Hypericum x inodorum* Tall Tutson Rare Disturbed ground D Lonicera tatarica* Tartarian Honeysuckle Rare Disturbed ground D Lysichiton americanus* American Skunk- Rare Dune slack D cabbage Melilotus indicus* Small Melilot Rare Strand-line D Papaver dubium ssp. lecoqii Babington’s Poppy Rare Disturbed Ground Physalis peruviana* Cape Gooseberry Rare Disturbed ground D Rubus bertramii Bramble Rare Dune heath D Rubus warrenii Bramble Rare Dune heath D Solanum physalifolium* Green Nightshade Rare Disturbed ground D Soleirolia soleirolii* Mind-your-own- Rare Disturbed ground business Spiraea x cinerea* Bridewort Rare Disturbed ground Stachys byzantina* Lamb’s-ear Rare Disturbed ground D Tradescantia virginiana* Spiderwort Rare Disturbed Ground 3 D Typha x glauca Hybrid Bulrush Rare Dune slack D Viola tricolor ssp. tricolor Wild Pansy Rare Disturbed Ground D Table 2. “Extinct” taxa rediscovered in 2005/06. Taxon English name Status Habitat Armeria arenaria* Jersey Thrift Rare Disturbed ground D Blysmus rufus SCI Saltmarsh Flat- Occasional Dune slacks, salt-marsh sedge D Cotula coronopifolia* Buttonweed Occasional Grazing-marsh Dactylorhiza x wintoni Hybrid marsh- Occasional Dune slacks D orchid Juncus compressus SCI Round-fruited Locally Dune slacks, grazing- NT Rush abundant marsh D Table 3. Revised summary of data from the vascular plant inventory of the Sefton Coast. SCP area Sand-dune system Total no. of taxa 1202 1075 No. of species 1013 913 No. of sub-species 70 59 No. of hybrids 118 102 Native taxa 749 712 Introduced taxa 453 362 % introduced taxa 37.7 33.7 Extinct taxa 34 33 Nationally rare 15 15 Nationally scarce 13 13 Endangered 3 3 Vulnerable 17 16 Near Threatened 15 14 Species of Conservation Importance 122 116 DOCUMENT INFO Shared By: Categories: Tags: Stats: views:10 posted:1/31/2011 language:English pages:3  
ESSENTIALAI-STEM
Announcement Collapse No announcement yet. Text Compare multiple files with different file names Collapse X   • Filter • Time • Show Clear All new posts • Text Compare multiple files with different file names I have 2 folders each with 70 pdf files, but different file names. I suspect that the content of the PDF is the same. For example in Folder A there is a file names 0013 Receipt and in Folder B 0013 Import. I figured out how to text compare one-to-one and they are the same for the first few files I reviewed one-to-one. Is there a way to simultaneously select all 70 files in each folder for text compare? Please keep in mind I have little to no experience in BC and no scripting knowledge. Thanks. • #2 Hello, Yes, if the files are aligned and have equal names, but No if the file names are all different and marked as orphans (unaligned). How did you perform the Text Compare on the "first few files"? Manually selected two orphan files with different names, right clicked, and Quick Compare? We do have an Align With command which can align files of different names manually. We also have a Pro feature called Alignment Overrides that can create a rule to align different names that match the rule. For example, if all of your files are Number Receipt and Number Import, we could define something similar to * Receipt = * Import to align them. If the names vary greatly or randomly, this might not work. If you could post or email us a full screen screenshot of your current Folder Compare showing several of the files you want to align, I can help provide more specific information. If you email us privately at support@scootersoftware.com, please also include a link back to this forum thread in the email, for our reference. Aaron P Scooter Software Comment • #3 Thanks for the quick response and the info. I will play with "Align With." I selected Text Compare from the dashboard and manually selected each file. Unfortunately, I'm unable to share my screenshot unless I change the file names. There is more variety in the files name, I generalized the file names for the example I used. Again, thanks. BTW I've only had BC for a few weeks and have found it useful and easy to use from the start. I have a desktop label maker that is more complicated. Comment • #4 In case you wanted to try the Folder Compare's Session Settings, Misc tab: new Alignment Override, you can use this KB article to trial Pro mode for free: http://www.scootersoftware.com/suppo...?zz=kb_evalpro Aaron P Scooter Software Comment Working... X
ESSENTIALAI-STEM
Facial canal explained Facial canal Latin:canalis nervi facialis, canalis facialis The facial canal (Canalis nervi facialis), also known as the Fallopian Canal,[1] first described by Gabriele Falloppio, is a Z-shaped canal running through the temporal bone from the internal acoustic meatus to the stylomastoid foramen. In humans it is approximately 3 centimeters long, which makes it the longest human osseous canal of a nerve.[2] It is located within the middle ear region, according to its shape it is divided into three main segments: the labyrinthine, the tympanic, and the mastoidal segment.[3] It contains Cranial Nerve VII, also known as the facial nerve. See also Notes and References 1. Abing W, Rauchfuss A . Fetal development of the tympanic part of the facial canal . European Archives of Oto-Rhino-Laryngology . 243 . 6 . 374–377 . 2005 . 3566620. 10.1007/bf00464645 . 2. Weiglein AH . Postnatal development of the facial canal. An investigation based on cadaver dissections and computed tomography . Surgical and Radiologic Anatomy . 18 . 2 . 115–23 . June 1996 . 8782317 . 10.1007/BF01795229 . 3. 10.1007/BF01627665 . Weiglein AH, Anderhuber W, Jakse R, Einspieler R . Imaging of the facial canal by means of multiplanar angulated 2-D-high-resolution CT-reconstruction. Surgical and Radiologic Anatomy . 16 . 4 . 423–427 . 1994 . 7725200.
ESSENTIALAI-STEM
Template talk:Routes of Santiago de Compostela in France Numbers in the Template I am really glad to see this new template created, and have a question about its appearance. It seems to be organized with numbers and not according to groupings (such as geographical or the like) as is common in other templates such as World Heritage Sites in France. Is it still in process or was another format for this need what was in mind, @Ferclopedio? Thanks. FULBERT (talk) 13:45, 11 October 2022 (UTC) * Hello. Since it is a navigation chart for a specific World Heritage site, I followed the official numbering given by UNESCO for the elements of the site which can be found here Ferclopedio (talk) 14:01, 11 October 2022 (UTC) * @Ferclopedio Thanks. It is a bit hard to follow and I am not sure it will help people to navigate it as it does not follow the conventions of other navigation templates. I wonder if there are ways we can group them, perhaps based on route or region or the like, that will make it more user-friendly? FULBERT (talk) 14:23, 11 October 2022 (UTC) * Yeah, I did notice that with the 78 elements it was getting a bit dense when doing it. But I don't know what would be the best way to group them, giving meaning to the World Heritage Site and not missing any. I don't know enough about the geography/history of France to put them together myself. Ferclopedio (talk) 14:57, 11 October 2022 (UTC) Hi, I had the exact same boggled feeling on looking at the list, and immediately started thinking about how to make it more geographically/route based - I see I'm not the first. How about ignoring the official listing by regions, and grouping them according to the four main blue routes shown in the map on the right, as if you were making one of the journeys of pilgrimage yourself? I realise that the template list doesn't match up with the places on the map, but I'm lucky to have travelled extensively in France and have been to almost half of all the towns & cities on the map, not necessarily the specific sites in the template. The article Routes of Santiago de Compostela in France groups the sites by region and numerically but they appear to be randomly dotted around, eg Nouvelle-Aquitaine: 1. Périgueux 19: Oloron-Sainte-Marie 24: Poitiers (see the location maps in these articles). One suggestion might be to have a horizontal-type table (thinking aargh already) going from N.E to S.W with main destinations of Bordeaux, Périgeux, Moissac and Oloron like the four main blue routes as shown in the map. Note these are just the places on the map, and many are not in the UNESCO list: and that the great majority are in the centre and south-west. On the other hand, places on the map like Chartres Cathedral already have a UNESCO listing in their own right but aren't duplicated in the Santiago list. Hmmm. Sambre - Amiens - Reims - Paris - Orléans } Dieppe - Rouen - Caen - Chartres - Tours } Mont St-Michel - Angers } Poitiers - Saintes - Bordeaux } Paimpol - Saint-Mathieu - Quimper - Nantes} Strasbourg - Toul - Bars-s-Aube - Vézelay - Bourges } Besançon - Chalons - Dijon - Sauvigny } Noblat - Limoges - Périgeux } Ostabat Lyons - Valence - Le Puy - Conques - Moissac } Nice - Arles - Saint-Guilhem - Toulouse } Narbonne - Foix } Oloron However, the UNESCO website also has that nice interactive map so it would be easy (hah!) or relatively trivial - if time-consuming - to match up the sites with the routes outlined above. I don't know the Pyrenees at all, maybe many of the sites are on passes through the mountains rather than all on the way to Oloron, as it were. Anyway, just a thought, or maybe it's a bit meta and would need too much explaining. MinorProphet (talk) 12:18, 15 April 2023 (UTC) * @MinorProphet@Ferclopedio I really like the idea of a table and grouping them via the 4 routes and think this may be helpful. I think a template like this one for the Celts may be used as a model? I would be happy to assist with this if either of your are interested in collaborating on it. FULBERT (talk) 16:00, 15 April 2023 (UTC) * Chemins-Saint-Jacques-PM-en-France fr.svg * , : The four routes you are talking about are, as you can see in the image (from left to right): Via Turonensis, Via Lemovicensis, Via Podiensis and Via Tolosane, and they have been called this way since the 12th century. The sites that fall right on the routes are easy to locate in the image, the problem arises with the sites that fall between two routes or away. Most likely, those sites are historically and religiously related to one of the routes but, without the necessary knowledge, relating it to one of them -or grouping them separately- will be entirely speculative. * Also keep in mind that this navigation box is about the UNESCO World Heritage Site called Routes of Santiago de Compostela in France, I mean that only the places in the list of this site must appear in the navbox. The places in the site that are also World Heritage Sites on their own (like Mont-Saint-Michel), must appear in it as part of the site, but any other World Heritage Site in France (like the Chartres Cathedral) must not appear in it. Ferclopedio (talk) 19:16, 15 April 2023 (UTC) * I have found an image with the branches of the four main routes and with a fifth route near the Pyrenees (Via Pyrenean Piedmont) that may help: https://commons.wikimedia.org/wiki/File:Caminos_de_Santiago_Francia_(por_grupos).svg Ferclopedio (talk) 19:51, 15 April 2023 (UTC) * Thanks both for your swift and helpful replies, That Spanish map is great and much more relevant. I have no experience in editing .svg files, but the specifically Spanish names can (in theory) be edited for French ones. I agree with your other comments: it should only contain the Unesco sites in the list. If you both quite like the the idea of grouping the sites by Via or Camino, what's the best way to go about it? If there are sites 'off the beaten track' well, I'm sure we can reach some mutually satisfactory placement, even if it's just 'less than half-way to the next major route' to begin with. I speak French fairly well, I'm happy to go do some historical research if needed. * Perhaps we could start a draft page with the original template/navbox and migrate the entries into a table once we've decided how it should be arranged, possibly into the five Ways. If either of you has experience with tables (the visual editor is meant to be good with them, never tried it), then that would be great - otherwise it's planning something like the following and then some 70 dreaded rowcol params which I would not enjoy: 1. Sambre - Amiens - Reims - Paris - Orléans } 4. Dieppe - Rouen - Caen - Chartres - Tours } 5. Mont St-Michel - Angers } 2. Poitiers - Saintes - Bordeaux } 6. Paimpol - Saint-Mathieu - Quimper - Nantes} 7. Strasbourg - Toul - Bars-s-Aube - Vézelay-Bourges} 9. Besançon - Chalons - Dijon - Sauvigny }8. Noblat-Limoges- Périgeux } 3. Ostabat 10. Lyons - Valence - Le Puy - Conques - Moissac } but that would need to be reversed anyway eg 1.Ostabat { 2. Bordeaux - Saintes - Poitiers { 3. Orléans - Paris - Reims - Amiens - Sambre { 4. Tours - Chartres - Caen - Rouen - Dieppe Getting the order in a table from SE to NW on any given Way might be a bit challenging: but since the Unesco website list gives the co-ordinates, they could possibly be transferred to one or more Commons maps which can be linked to an anchor in text or a table - here's one I made earlier with clickable links... User:MinorProphet/Draft subpages/HMS Cyclops (1839) - edit to see how it's done. The entries don't have to be in any order, the mediawiki software just puts them in the right place on the map. There may better ways. Finally, I'm around tomorrow but shall be away from Monday am to Thursday pm next week although I'll have my laptop with me. Cheers, MinorProphet (talk) 22:58, 15 April 2023 (UTC) * Hi, I think you are making it too complicated, remember that we are talking about a navigation box and it has to be kept simple and should facilitate the navigation between its articles. What you say about making a table, or ordering its elements by coordinates, or ordering them like if you were doing the route, or making a clickable map, is more of a job for the article itself than for the navigation box. * In my opinion, if grouping by Via is the best approach, the only thing to do is to write the five groups in the navbox and relocate each site under the list it belongs, ordered alphabetically by the town in which they are located or by the number that UNESCO has given to the site: * Ferclopedio (talk) 09:02, 16 April 2023 (UTC) * You are quite right, I've been over-complicating things. It's a habit of mine. Alphabetical order by Via would certainly work. MinorProphet (talk) 09:52, 16 April 2023 (UTC) * @Ferclopedio @MinorProphet I was thinking about this again, and wonder if anybody has done any work on trying to make this happen according to the 4 ancient paths. If not, I will take a try of it. I do not want to begin this if somebody else has tried redrafting this. FULBERT (talk) 11:30, 10 August 2023 (UTC) * Good to hear from you again. I haven't made any attempt at re-drafting the template. Although I have been busy with other things, I'd be happy to help/make suggestions from the sidelines if you were to have a go. The place on the list I visited most recently was Amiens Cathedral - a simply vast edifice. None of the photos of the awe-inspiring interior quite does it justice. MinorProphet (talk) 16:10, 10 August 2023 (UTC) * @FULBERT I haven't made any attempt either. If you go for it, I think the map with all the branches of the five ancient paths I sent earlier will be very useful. Ferclopedio (talk) 20:25, 12 August 2023 (UTC) * @Ferclopedio @MinorProphet OK, I went through the 71 entries and categorized them according to the 4 ancient paths through France. Can one or both of you proof this based on the maps in the UNESCO declaration Routes of Santiago de Compostela in France - Map of inscribed property Clarification / adopted on the slides and website here? Some of them are not exactly on the paths, so I used the map submitted on the original French nomination file here. Also, I left the small numbers to make sure we do not miss any of these. I tried them after the names (see the first two in the Le Puy Route, though even if we added parentheses with them after the names themselves, I think they are distracting so recommend removing them. I did not alphabetize them in each group, keeping them as numbered, though think they do need to be alphabetized (though not sure if by their name or their city would make most sense). I welcome some feedback and help with this before I personally do any more with it as I need fresh eyes. FULBERT (talk) 23:18, 13 August 2023 (UTC) * @MinorProphet @Ferclopedio I just saw this template for the Camino in Spain and think it may help guide our work here. FULBERT (talk) 23:27, 13 August 2023 (UTC) * @FULBERT I made a visual edit in the titles and added a subsection for the sectors of Le Puy. * In a first quick review of some of the sites I moved three: * Soulac-sur-Mer -> Turonensis * Le Buisson-de-Cadouin -> Podiensis * Saint-Avit-Sénieur -> Podiensis * I agree to remove the numbers (they are distracting) and alphabetize by city. Ferclopedio (talk) 21:13, 14 August 2023 (UTC) * @Ferclopedio @MinorProphet Nice tweaks and adding the subsection. I will remove the numbers (in order) to ensure we did not miss any. Will also add another section on the Le Puy Route for Monuments to balance the Sections section. If one of you can then alphabetize next? FULBERT (talk) 13:17, 15 August 2023 (UTC) * @Ferclopedio @MinorProphet I think we should alphabetize by city, along with adding any missing cities in the process. FULBERT (talk) 13:18, 15 August 2023 (UTC) * Ordered! Ferclopedio (talk) 20:26, 15 August 2023 (UTC) * @Ferclopedio @MinorProphet I think this looks great now. Nice work, everybody! If anything, it is now clear where we need more articles written! Thanks, all. FULBERT (talk) 18:25, 19 August 2023 (UTC) Hi, I've been AFK for a few days, I'm hoping to get up to speed tomorrow. PS Is it cheugy to appropriate gamer terms if not gamer? I don't think online Hearts counts... Maybe you could ping me on this one? MinorProphet (talk) 16:02, 16 August 2023 (UTC) * Fantastic work! Well done. The template looks much more approachable and attractive now. The remaining Vias could certainly benefit from their own article... I also agree with the removal of the numbers, they were somewhat distracting. I wonder how the Unesco team assigned them in the first place. Personally I hate red links, but I have actually written a few articles because of them in templates etc. Is there a case for making red links for the non-existent articles, possibly using interlanguage links (ill)? - I imagine there are a number of existing French WP articles, I'll have a look. This might initially swamp the blue links, but one of the more rewardings things is seeing a template gradually filled up to completion. MinorProphet (talk) 10:22, 20 August 2023 (UTC) * @MinorProphet, Thanks. Interlanguage links are very useful in articles (I use them often), but wikipedia guidelines don't allow red links in navigation boxes, nor using interlanguage links. Even having unlinked items is an exception to the rule, since the navigation box refers to a closed set of items. Ferclopedio (talk) 20:38, 20 August 2023 (UTC)
WIKI
Page:Memoirs of Margaret Fuller Ossoli (IA memoirsofmargare01fullrich).pdf/250 248 ‘1839, — When I first knew George Sand, I thought I found tried the experiment I wanted. I did not value Bettine so much; she had not pride enough for me; only now when I am sure of myself, would I pour out my soul at the feet of another. In the assured soul it is kingly prodigality; in one which cannot forbear, it is mere babyhood. I love abandon only when natures are capable of the extreme reverse. I knew Bettine would end in nothing, when I read her book. I knew she could not outlive her love. ‘But in Les Sept Cordes de la Lyre, which I read first, I saw the knowledge of the passions, and of social institutions, with the celestial choice which rose above them. I loved Hélene, who could so well hear the terrene voices, yet keep her eye fixed on the stars. That would be my wish, also, to know all, then choose; I ever revered her, for I was not sure that I could have resisted the call of the Now, could have left the spirit, and gone to God. And, at a more ambitious age, I could not have refused the philosopher. But I hoped from her steadfastness, and I thought I heard the last tones of a purified life: — Gretchen, in the golden cloud, raised above all past delusions, worthy to redeem and upbear the wise man, who stumbled into the pit of error while searching for truth. ‘Still, in André and in Jacques, I traced the same high morality of one who had tried the liberty of circumstance only to learn to appreciate the liberty of law, to know that license is the foe of freedom. And, though the sophistry of passion in these books disgusted me, flowers of purest hue seemed to grow upon the
WIKI
:: [Netsukuku] ANDNS protocol Top Page Delete this message Reply to this message Author: Luca Dionisi Date:   To: netsukuku, Porting netsukuku to Vala language. Developers. Subject: [Netsukuku] ANDNS protocol Netsukuku (the Vala port) now has a server implementation of the ANDNS protocol [0]. It runs inside the ntkd daemon. There is the library libntkresolv. This implements the client part of ANDNS protocol. This library (and the tools below) can be used also by a computer that is not running the ntkd daemon, that is, a computer that is not part of the netsukuku network. Only requirement is that you have a route to reach a node that is part of it. There is a tool named ntk-resolv that depends on libntkresolv. The user can use it to query the ANDNA distributed database. There is the library libnss_andna. This is a module, again dependent on libntkresolv, that the GNU Name Service Switch (part of the GNU C library) can use as a mean to resolv a computer name. This means that a program calling gethostbyname (or the newer getaddrinfo) is able to resolv names of the ANDNA domain (as long as it runs on a GNU system). Still missing is a wrapper acting as a DNS server that transforms a DNS request into a ANDNS one and pass it to a ANDNS server. And then passes back the answers. So, the packages forming the suite are now: tasklet [1] lightweight cooperative multithread system. zcd [2] zero configuration dispatchers: framework for remote procedure calls. netsukuku-rpc [3] model for the rpc; the messages that the daemon exchanges with other nodes forming the netsukuku. andns-rpc [4] model for the rpc; the ANDNS protocol is based on it. ntkresolv [5] client part of ANDNS protocol; tools. netsukuku [6] the daemon. I will, as time permits, prepare packages for openwrt and update the instructions [7]. [0] http://netsukuku.freaknet.org/index.php?pag=documentation&file=main_documentation/ntk_rfc/Ntk_andna_and_dns [1] bzr://bzr.savannah.nongnu.org/netsukuku/tasklet [2] bzr://bzr.savannah.nongnu.org/netsukuku/rpc [3] bzr://bzr.savannah.nongnu.org/netsukuku/rpcntk [4] bzr://bzr.savannah.nongnu.org/netsukuku/andns-rpc [5] bzr://bzr.savannah.nongnu.org/netsukuku/ntkresolv [6] bzr://bzr.savannah.nongnu.org/netsukuku/ntkd [7] https://lab.dyne.org/Netsukuku_Dev/vala/flashing_notes4
ESSENTIALAI-STEM
Thursday, January 3, 2013 Discover Python! A few weeks ago, I visited Northern Illinois University (NIU; my Alma mater) for Geography's annual career day.  It is a day focused on networking for students and alumni that helps build and maintain a strong foundation for all who graduate from the program. When the chance came to give advice to meteorology students (no, not the advice to ignore Gilbert!), I promptly responded with Geographic Information Systems (GIS) and Python.  There is an ArcPY module for Python, and many tools in ArcMap run via Python scripts.  In my opinion, Python is *the* answer for budding scientists.  Its ease of use, open source, and large support community nature make it an obvious choice.  However, don't ask just me!  The latest issue of the Bulletin of the American Meteorological Society (BAMS) highlights the utility of Python for use in atmospheric science.  Python can easily deal with netCDF arrays (numPy module) or GRIB data (Nio module), both of which are commonplace data formats in meteorology. Patrick Marsh (OU SoM) does a lot of amazing things in Python, and it is easy to see how useful it can be for research purposes. For example, a Python script of mine was able to deal with all 1980-2011 NARR data and produce this map in about 3 hours! It's also great for plotting any sort of GRIB message: Download Python today and get started!  Some of my most used add-on modules are: NumPy ArcPy (good BLOG here) matlibplot basemap pygrib netCDF4 pyNIO No comments:  
ESSENTIALAI-STEM
From patchwork Thu Aug 29 13:27:29 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: [bitbake-devel] cookerdata: Allow bblayers.conf to be found using BBPATH From: Richard Purdie X-Patchwork-Id: 56873 Message-Id: <1377782849.1059.1.camel@ted> To: bitbake-devel Date: Thu, 29 Aug 2013 14:27:29 +0100 It should be possible to run a build anywhere on the filesystem and have bitbake find the correct build directory if its set somehow. The BBPATH variable makes perfect sense for this usage. Therefore use any available value of BBPATH to search for conf/bblayers.conf before walking the parent directory structure. This restores the option of being able to run bitbake from anywhere if the user has set things up to operate in that environment. Signed-off-by: Richard Purdie --- diff --git a/bitbake/lib/bb/cookerdata.py b/bitbake/lib/bb/cookerdata.py index 8a0bc22..0b278b1 100644 --- a/bitbake/lib/bb/cookerdata.py +++ b/bitbake/lib/bb/cookerdata.py @@ -177,14 +177,21 @@ def _inherit(bbclass, data): bb.parse.BBHandler.inherit(bbclass, "configuration INHERITs", 0, data) return data -def findConfigFile(configfile): +def findConfigFile(configfile, data): + search = [] + bbpath = data.getVar("BBPATH", True) + if bbpath: + for i in bbpath.split(":"): + search.append(os.path.join(i, "conf", configfile)) path = os.getcwd() while path != "/": - confpath = os.path.join(path, "conf", configfile) - if os.path.exists(confpath): - return confpath - + search.append(os.path.join(path, "conf", configfile)) path, _ = os.path.split(path) + + for i in search: + if os.path.exists(i): + return i + return None class CookerDataBuilder(object): @@ -225,8 +232,8 @@ class CookerDataBuilder(object): logger.exception("Error parsing configuration files") sys.exit(1) - def _findLayerConf(self): - return findConfigFile("bblayers.conf") + def _findLayerConf(self, data): + return findConfigFile("bblayers.conf", data) def parseConfigurationFiles(self, prefiles, postfiles): data = self.data @@ -236,7 +243,7 @@ class CookerDataBuilder(object): for f in prefiles: data = parse_config_file(f, data) - layerconf = self._findLayerConf() + layerconf = self._findLayerConf(data) if layerconf: parselog.debug(2, "Found bblayers.conf (%s)", layerconf) # By definition bblayers.conf is in conf/ of TOPDIR.
ESSENTIALAI-STEM
Old English/1st reading: David's feats Note that grammatical suffixes have been bolded, to help easy identification. This reading is from Ælfric. The spelling has been slightly normalized. Reading Saul hātte sē forma cyning þe ofer godes folc rīxode Sē ƿæs tō cyninġe āhafen sƿȳðor for folces ġecorennysse⁠ þonne ðurh godes rǣd. Fela ōðre cyningas⁠ rīxodon ǣr ġeond ealne middaneard ofer hǣðenum lēodum · ac ofer israhēla folc þe on god belȳfde næs nān eorðliċ cyning ǣr ðan þe saul sƿā sƿā hī sylfe ġecuron ofer hī cynerīċe underfēng · Sē bēah hrædlīċe fram þæs ælmihtigan godes ƿillan⁠ and nolde be his ƿissunge and be his ƿitegan lāre faran · and sē yfela gāst hine drehte mid deofollicum stiċelsum · and on unġeƿitte his mōd āƿende · Þā forseah sē ælmihtiga god þone saul æt nēxtan ·⁠ and hine of his rīċe āƿearp be his āgenum ġeƿyrhtum · and ġeċēas him tō cyninġe þone cēnan dauid · Sē ðe būtan ƿǣpnum ġeƿylde ðā lēon · and þæs beran ċeaflas tōbræc mid his handum · and āhredde þæt ġelæhte sċēp of his sċearpum tōðum · Hē ofƿearp ēac syððan þone sƿȳþlican ent⁠ · goliam þone gramlican þe godes naman hyrƿde · and mid ġebēote clypode bysmor godes folce · ġearu tō ānƿīġe mid ormettre ƿǣpnung'''e · Hƿæt; þā dauid ēode tōġēanes þām ente ·⁠ and ofƿearp mid his liþeran þone ġelēaflēasan ent · būfon ðām ēagan þæt hē bēah tō eorðan · Ġelǣhte þā of ðām ente his āgen sƿurd ·⁠ and his ormǣte hēafod mid þām of āslōh · and hæfde ðā ġeƿunnen sīġe his lēode · Vocabulary Note that for the purposes of alphabetic listing, the prefix "ġe-" is not accounted for. If you cannot find a word beginning with "ġe-" in the g section, go at the section of the first letter following "ġe-". * ac (conj) -- but * āhebban (s6) -- to lift up; to elevate; "tō cyninġe āhebban" - "to elevate to king" * āhreddan (w1) -- to save, rescue * and (conj) -- and * āƿendan (w1) -- to change * āƿearp -- singular preterite indicative of "āƿeorpan" * āƿeorpan (s3) -- to throw out, get rid of, dispose of * ælmihtiġ (aj) -- almighty * ǣr (av)- before, previously; already; (conj) before * ǣr þan þe (conj) -- before * æt nēxtan (av phrase) -- next, next thing * be (prep) -- (+dat) by means of; by, beside, by the side of; concerning, about, with regards to * belīfan (w1) -- to believe, to trust, to have faith; "belīfan on (+acc)" - "to believe in" * bera (wm) -- bear * būgan (s2) -- to bend, to turn * būtan (prep) -- (+dat) without * ċeafl (sm) -- jaw * ġeċēas -- singular preterite indicative of "ġeċēosan" * cēne (aj) -- bold, fierce, brave * ġeċēosan (s2) -- to choose, to select, to make a choice * ġecorennness (sf) -- choice, choosing * cynerīċe (sn) -- kingdom * cyning (sm; gen: cyninġes; dat: cyninġe) -- king * deofolliċ (aj) -- demonic, devilish * dreċċan (w1) -- to torment * eall (aj) -- all * eorðliċ (aj) -- earthly, of this world * faran (s6) -- to go, to proceed * fela (indec aj) -- many * folc (sn) -- people * forma (ord) -- first * forseah -- see "forsēon" * forsēon (s5) -- to overlook, neglect, reject * gāst (sm) -- spirit, ghost * ġeond (prep) -- (+acc) throughout * god (sm) -- God * hātan (s7b) -- to call, to command; to be called. NOTE: the passive form "to be called", takes an additional -t-: Saul hātte - "(He) was called Saul". This is an archaic feature only present in hātan. * hǣðen (aj) -- heathen, pagan * hē (3prs sg pron) -- he; it (referring to grammatically masculine non-living objects) * hine -- accusative of "hē" * him -- dative of "hē" * hrædlīċe (av) -- quickly, soon * israhēlas (sm pl) -- the Israelites, Israel * lār (sf) -- teaching, instruction * ġelæċċan (w1) -- to catch, seize * ġelæht -- past participle of "ġelæċċan" * lēo (wm) -- lion * lēod (sf) -- nation, people(-group) * middaneard (sm) -- the earth, the world * mōd (sn) -- mind * nān (aj) -- not any, no, none (West Saxon dialect) * næs (contraction) -- "ne ƿæs" - "was not": SEE "ƿesan" and "ne" * ne (av) -- (before verbs, NOT before adjectives or nouns) not; (conj) nor * nolde (contraction) -- "ne ƿolde" - "did not want": SEE "ƿillan" and "ne" * of (prep) -- (+dat) from, out of; from (place of origin) * ofer (prep) -- (+dat) over * on (prep acc/dat) -- (with acc) marking object of thought; (with dat) in, on, into * rīċe (sn) -- kingdom, empire, state; rulership * rīxian (w2) -- to rule * saul (sm) -- Saul, king of Israel * sċēp (sn) -- sheep * sċearp (aj) -- sharp * sē (article) -- the, that * sē þe (rel pron) -- who, he who * stiċels (sm) -- goad, thorn * sƿā (conj) -- as, of the same degree, like; "sƿā sƿā" - "just like", "just as" * sƿīðor (av) -- more * sylf (aj) -- self, (him/her/etc)-self; NOTE: could be used either reflexively with the suitable personal pronoun, or emphatically. When it followed a noun or a pronoun, it could be declined strong: "hī sylfe" - "they themselves". * tō (prep) -- (+dat) to; as (denoting fulfilment of a role) * tōbrecan (s4) -- to break apart * tōð (sm i-mut) -- tooth * þā (av) -- then (referring to a specific instance), on that occasion * þonne (conj) - than (in comparatives) * þe (rel pron) -- which, who, that. NOTE: Used to introduce relative clauses "the person who did that" - "sē mann þe dyde þæt" * þurh (prep) -- (+acc) by, by means of * underfōn (s7) -- to accept; "cynerīċe underfēng" -- "(he) accepted (the) (rule of the) kingdom" * unġeƿitt (sn) -- insanity, senselessness * ƿesan (irregv) -- to be * ƿilla (wm) -- will, desire * ƿillan (irreg vaux) -- to want, to desire, to wish (to do) * ƿissung (sf) -- instruction, guidance * ƿītega (wm) -- prophet, wise man, soothsayer * ġeƿyrht (sn) -- work, deed * ġeƿyldan (w1) -- to subdue, to conquer, take power over * yfel (aj) -- bad, evil
WIKI
Foe (disambiguation) A foe is an enemy. Foe or FOE may also refer to: People * Greg Foe (born 1991), Samoan rugby player * Marc-Vivien Foé (1975–2003), Cameroonian football midfielder * Victoria Foe (born 1945), American developmental biologist * Frances Tiafoe (born 1998), American tennis player nicknamed "Big Foe" or "Foe" Literature * Foe (Coetzee novel), a 1986 novel by J. M. Coetzee * Foe (Reid novel), a 2018 novel by Iain Reid Film and TV * Foe (film), a 2023 film based on the Reid novel * "Foe" (Person of Interest), an episode of the American TV drama series Person of Interest Music * Foe (EP), a 2003 EP by the German band Blackmail Companies and organizations * Friends of the Earth, a network of environmental organizations * Fred. Olsen Energy, a Norwegian offshore driller * Fraternal Order of Eagles, international fraternal order Other uses * Topeka Regional Airport (IATA airport code: FOE) in Kansas, United States * Foe (unit), a unit of energy used in astrophysics * Foe language, spoken in Papua New Guinea * Prix Marc-Vivien Foé (Foé Prize) for the best African nationals player in Ligue 1
WIKI
One Star Change Endpoint Hello, I've created a webservice with TOS_ESB 5.1.2 and I have deployed it. When I connect to http://my_esb_server/services I can see available SOAP services but I have the following informations : Endpoint address: http://localhost:8040/services/AnnuaireGroupeService WSDL : {http://www.talend.org/service/}AnnuaireGroupeService Target namespace: http://www.talend.org/service/ How can I change http://localhost:8040/services/AnnuaireGroupeService to http://my_esb_server/services/AnnuaireGroupeService ? Moreover, the WSDL URL : {http://www.talend.org/service/}AnnuaireGroupeService is http://localhost:8040/services/AnnuaireGroupeService, same question, how can I change it ? Regards. Erwan 2 REPLIES One Star Re: Change Endpoint Hi Erwan, Can you put the solution please? Thanks, Regards www.talendforge.org/forum/viewtopic.php?id=26034 One Star Re: Change Endpoint Hi, Solved by modifying the host file. Regards, Rahim
ESSENTIALAI-STEM
Engineering elliptical spin-excitations by complex anisotropy fields in Fe adatoms and dimers on Cu(111) Filipe S. M. Guimarães, Manuel dos Santos Dias, Benedikt Schweflinghaus, Samir Lounis 2017 Physical review B   We investigate the dynamics of Fe adatoms and dimers deposited on the Cu(111) metallic surface in the presence of spin-orbit coupling, within time-dependent density functional theory. The \textit{ab initio} results provide material-dependent parameters that can be used in semiclassical approaches, which are used for insightful interpretations of the excitation modes. By manipulating the surroundings of the magnetic elements, we show that elliptical precessional motion may be induced through the more » ... induced through the modification of the magnetic anisotropy energy. We also demonstrate how different kinds of spin precession are realized, considering the symmetry of the magnetic anisotropy energy, the ferro- or antiferromagnetic nature of the exchange coupling between the impurities, and the strength of the magnetic damping. In particular, the normal modes of a dimer depend on the initial magnetic configuration, changing drastically by going from a ferromagnetic metastable state to the antiferromagnetic ground state. By taking into account the effect of the damping into their resonant frequencies, we reveal that an important contribution arises for strongly biaxial systems and specially for the antiferromagnetic dimers with large exchange couplings. Counter intuitively, our results indicate that the magnetic damping influences the quantum fluctuations by decreasing the zero-point energy of the system. doi:10.1103/physrevb.96.144401 fatcat:f6xjgs4xa5cvjlykpfxofdkg3m
ESSENTIALAI-STEM
Shrikebill The shrikebills are the monarch flycatcher genus Clytorhynchus. The five species have long laterally compressed bills similar to true shrikes that give them their names. The genus is endemic to the islands of Melanesia and western Polynesia. The shrikebills are insectivorous, and use their large heavy bills to explore tangles of dead leaves and dead wood; an unusual foraging strategy for their family. Their diet may also include small fruits and lizards. Extant species The genus Clytorhynchus contains the following species: Former species Formerly, some authorities also considered the following species (or subspecies) as species within the genus Clytorhynchus: * Sangihe whistler (as Pinarolestes sanghirensis) * Little shrikethrush (as Pinarolestes megarhynchos or Pinarolestes megarhynchus)
WIKI
Kajin Sara Lake Kajin Sara is a lake in the Manang district of Nepal. History A group of mountaineers discovered the Kajin Sara lake in early 2019. The lake is situated in Chame rural municipality of Manang district, Nepal. The lake is 1,500 meters long and 600 meters wide in its dimensions. The Lake is one of the highest altitude lake in the world, 5002 m above sea level. It is considered sacred by Buddhists, Sikhs and Hindus. It will be highest altitude lake replacing Tilicho Lake, which is now the highest lake in the world. Trekking route The visitors can reach Chame of Manang District via jeep from Besisahar, Lamjung. The trekking Starts from Chame, Nepal situated at 2650 m altitude. The First-day trek is about a 5-6 hour walk uphill up to 3760 m to stay at Lamjung Himal Base Camp. The trail starts with motor roads and follows along the forest filled with pine trees. The path dips up and down until you reach Lamjung Himal Base Camp. There are some Sheds and a new shelter for accommodation, where trekkers can spend overnight free of cost, however, you have to carry your food and sleeping equipment. The next day's trek is of 6–10 hours to high camp at 4750m depending upon weather condition. There is a place to stay at high camp. Low camp is still under construction at 4200m, which upon completion will make this trekking route much easier for the tourists. Day 3 is a 2 hours walk uphill from high camp to Kajin Sara at 5020 m and return to High camp (2hours) or Lamjung base camp(6–8 hours). Day 4 from Lamjung Base camp to Chame rural municipality.
WIKI
Phenomenon (film) Phenomenon is a 1996 romantic fantasy-drama film about an ordinary man who sees a bright light descend from the sky and discovers he now has super-intelligence and telekinesis. * Directed by Jon Turteltaub. Written by Gerald Di Pego. Some things in life just can't be explained. George Malley * Love is buried under fear, and partnership, is right there under competition, and there's compassion underneath the greed. Nate, you gotta take your eraser and do the work. It's hard work and nobody can do it for you. There's no drug. That's the sum of it. Doc * [fuming off at his and George Malley's common friends belittling George's abilities] Why do ya have to tear him down? What are you so afraid of? What have you got to lose? He wasn't selling anything! He didn't want anything from anybody! He wanted nothing from nobody! Nothing! NOTHING!!! [pauses] And you people have to tear him down so you can sleep better tonight! So ya can prove that the world is flat and sleep better toniight! Am I right?... [pause; calms down, in soft voice] I'm right... The Hell with all of ya. The Hell with everyone of ya. [leaves the bar] Dialogue * George: This is good, Lace. I think you're a good cook. * Lace: No, I'm not. I only make two things pretty well: pork chops and, um, turkey. * George: Hm. Which is this? * [Everybody is dumbfounded when he is able to converse with an old Portuguese man] * Bonnie: George Malley! You learned the Portuguese language in 20 minutes? * George: Not all of it. * Dr. Niedorf: All right, I'll start the questions, and I'll be timing your responses, and we'll be recording. Any questions? * George: What's your first name? * Dr. Niedorf: Uh, my first name is Bob. [George reaches across the wide table to shake hands] * George: Shoot, Bob. * Dr. Niedorf: Right. Name as many mammals as you can in 60 seconds. Ready? Go. [starts stopwatch] * George: Hmm. 60 seconds. Well, how would you like that? How about alphabetical? Aardvark, baboon, caribou, dolphin, eohippus, fox, gorilla, hyena, ibex, jackal, kangaroo, lion, marmoset, Newfoundland, ocelot, panda, rat, sloth, tiger, unicorn, varmint, whale, yak, zebra. Now "varmint" is a stretch; so is "Newfoundland" (that's a dog breed); "unicorn" is mythical, "eohippus" is prehistoric. But you weren't being very specific. Now were you, Bob? * Dr. Niedorf: [pauses, then stops watch and laughs] Well! Ahh, I'll, uh — I'll try to be more specific. You ready for the next one? * George: Shoot. * Dr. Niedorf: Answer as quickly as you can... how old is a person born in 1928? [starts stopwatch] * George: Man or a woman? * Dr. Niedorf: [stops stopwatch and pauses] Why? * George: Specifics, Bob. * Dr. Niedorf: Okay, one more time. How old is a MAN born in 1928? [starts stopwatch] * George: Still alive? * Dr. Niedorf: [stops watch, pauses, nods] If a man is born in 1928, and he's still alive, how old is he? [starts stopwatch] * George: What month? * Dr. Niedorf: [stops stopwatch] If a man was born October 3, 1928, and he's still alive, how old is he? [starts stopwatch] * George: What time? * Dr. Niedorf: 10:00... PM! [starts stopwatch] * George: Where? * Dr. Niedorf: [stops stopwatch; now impatient] Anywhere! * George: Well. Let's get specific, Bob! I mean, if the guy's still alive, born in California, October 3, 1928, 10:00 PM. he 67 years, nine months, 22 days, 14 hours, and... [takes Bob's hand to see his wristwatch] ...and 12 minutes. If he was born in New York, he's three hours older, now isn't he? * [George goes to the bar after his tests] * Banes: What did they find out? * George: I'm pregnant. That's how it feels. [Roger smirks] * Roger: How what feels? * George: Yeah, you know, to be full of ideas and you can't deliver, okay? I mean, you know, you're ready to break out and you can't deliver. You know, uh, this professor, he won't even talk to me. He won't even talk to me. * Nate Pope: You're not going to Berkeley, George? * George: Oh, come on. Me, at Berkeley? That's a thought, huh? * Nate: I'm sorry, buddy. * Jimmy: You mean, inventions? You got inventions? * George: No, no. Ideas, okay? I get a thousand ideas a day, every d-damn minute. Okay? I got big, big, holy cow kind of ideas and, and little what if ideas. All right? Hey, I got ideas for you, Jimmy. Look at this. Look at this. Your parking lot- [shows papers] it's laid out all wrong, okay? Now, if you just follow this, right, you can put six more cars in and no one gets fender benders. All right? Where's Paulette? Where is she? Bonnie, here. Take this. [slides papers to her] This is a new route for our mail. Okay? Now, if she does this, she can save an hour a day and everybody gets their mail by three o'clock. Imagine, three o'clock. Oh, and l got a holy shit idea too. Look at this. [shows Jimmy diagram on legal pad] Now this may be the most efficient way to store solar energy. Okay? Take it. * Jimmy: Well, what am I gonna do with it? * George: What the hell am I supposed to do with it, huh? You know what that light was? You know what that sound was? * Jimmy: Tell us. * George: I'm gonna tell you what it was. * Jimmy: Well, tell us! * Banes: It was a damn alien. * Nate: Don't say that. You don't know what it was. * George: I know what it is, Nate. * Nate: You don't know what it was. Don't say that. * Jimmy: Well, tell us! * George: It's a GODDAMN mistake, is what it is! Okay? It was supposed to happen to someone smart, someone that's scientific, someone who is a leader. But it didn't. It happened to me, George freakin' Malley. Look at him. Now look at him. Look! [his psychic powers slightly break the glass panel at the bar and Jimmy heads for cover] * Doc: Let's see, uh... George... George... there's a tumor in your brain, that's spread out like a hand, threads of it, you know, everywhere. But instead of dysfunction — now here's the mystery, George. Instead of destroying brain function, so far it's been stimulating it. We can't understand that. You have more area of active brain use than anybody ever tested — ever — because of those tentacles. I mean, we've seen tumors like this before, it's called astrocytoma. And it explains, uh, the dizziness, and... the illusion of light. But the way it's in there, waking up areas of the brain, it's a... big mystery. So... * George: And it's killing me. * [at Lace's house, George guides her son Al on repairing her truck's air filter] * Al Pennamin: [coldly at George] You came here to die, didn't you? * George: But I'm-- I like this place, and, um, [as Al walks off] I love the people here. * George: Hey, would you, uh, love me the rest of my life? * Lace Pennamin: No. I'm gonna love you for the rest of mine. Change the World * If I could reach the stars I'd pull one down for you Shine it on my heart so you could see the truth That this love I have inside is everything it seems But for now I find it's only in my dreams That I can change the world I would be the sunlight in your universe You will think my love was really something good Baby if I could change the world. * "Change the World", performed in the movie by Eric Clapton, written by Tommy Sims, Gordon Kennedy and Wayne Kirkpatrick - Video related to movie - Live performance by Clapton Cast * John Travolta - George Malley * Kyra Sedgwick - Lace Pennamin * Forest Whitaker - Nate Pope * Robert Duvall - Doc Brunder * Jeffrey DeMunn - Prof. John Ringold * Richard Kiley - Dr. Wellin * David Gallagher - Al Pennamin
WIKI
vyflusnutý Etymology From Early Modern German fluss (“stream”), from fliessen (“to flow”). Adjective * 1) exhausted, zonked, worn out
WIKI
User:Urve/What Belongs to You What Belongs to You is a 2016 novel by Garth Greenwell, an American poet. Background Garth Greenwell is an American poet who taught literature and English at the American College of Sofia in Bulgaria. He published the novella Mitko in 2011, which was adapted to become the first section of What Belongs to You.
WIKI
Just an extra 10 minutes outside in nature can help reduce tantrums in young children, a study suggests. Children who were more connected to nature during the first coronavirus lockdown were found to have better behavior and general well-being. Green space is believed to help protect young children from the mental health effects of not going to school, normal daily routines and friendships. Just an extra 10 minutes outside in nature can help reduce tantrums in young children, study suggests (stock image) What are tantrums? Tantrums usually start around 18 months and are very common in toddlers. Hitting and biting are also common. One reason for this is that toddlers want to express themselves, but find it difficult. They feel frustrated and the frustration comes out as a tantrum. Once a child can talk more, they are less likely to throw tantrums. By age 4, tantrums are much less common. These ideas can help you deal with tantrums when they happen. Researchers recruited 376 families with children ages three to seven and asked them whether their relationship with nature had increased, decreased, or remained the same between April and July last year. Parents were also asked about their children’s general behaviors, including aggression, hyperactivity, and “acting” with things like tantrums. The results show that children who were more interested in nature had significantly lower levels of behavioral problems than children whose connection to gardens, parks and similar green spaces decreased. They also had a lower level of emotional distress. Samantha Friedman, who led the study from the University of Cambridge, said: ‘We know that access to and engagement with nature is associated with broad benefits in children and adults, including lowering anxiety and depression and reducing stress. ‘Being connected to nature may have helped protect some British children from the effects of the lockdown.’ She added: ‘Our research revealed the wide range of ways parents can help children become more connected to nature. “For some, this might be a little daunting, but it doesn’t necessarily have to be camping in the woods and foraging for food — it really can be as simple as taking a walk near your house or sitting outside for ten minutes a day. ‘ The study, published in the journal People and Nature, looked at children ages three to seven because they were likely to experience a lot of inconvenience from the pandemic and also have less understanding of what was happening. Researchers asked parents if their child’s connection to nature had changed, which some interpreted as spending more or less time in green spaces, while others interpreted it as being more or less interested in nature (SUBS – pls keep). Tantrums usually start around 18 months and are very common in toddlers. Hitting and biting are also common (stock image) Giving your child time to calm down the screen could make tantrums WORSE, scientists warn Giving toddlers a smartphone or tablet to calm them down could make their tantrums worse, a new study warns. In experiments, American researchers observed toddlers aged between two and three years after a cartoon they were watching ended prematurely. Parents were also asked how heavily they depended on electronic media, including TVs, tablets, phones and video games, to calm their child. Toddlers who were more used to getting electronic media to avoid a tantrum had more extreme emotions when it was removed, the experts found. While it may seem like a harmless way to have a toddler play on a phone or tablet to distract them when they’re having a hard time, in the long run it can make the reactions worse and worse if they’re taken away. Researchers advise parents that they should avoid using smartphones and tablets as their number one strategy to avoid a potentially embarrassing tantrum in a public place. Nearly 54 percent of young children, according to their families, had a deeper ‘connection’ to nature during the initial lockdown for Covid-19. Parents usually reported that this was because their children became more aware of, interested in or excited about nature, and the family had more free time to spend outdoors, such as planting flowers in the garden. To assess children’s behavior, researchers questioned their parents about things such as whether they often had tantrums, were generally obedient, often fought with other children, lied, cheated or stole. Families were also asked about children’s hyperactivity, including being restless, nervous, and not completing tasks. Children who were more connected to nature during the lockdown had fewer behavioral problems than children whose connection decreased – perhaps because parks and farm parks were closed, or the forest was too far away. Emotional problems were assessed by asking parents about friendships with children, lonely behavior and whether they were bullied, and whether they were often unhappy or nervous and had many worries. These emotional problems were lower in children who became more connected to nature, compared to children whose connection decreased or remained the same. Children from less affluent backgrounds were more likely to be among the 6.6 percent whose connection to nature declined. The study authors suggest gardening projects in schools, and nature-based learning programs can help protect children’s mental health in difficult times. dr. Elian Fink, a co-author of the study from the University of Sussex, said: ‘Connecting with nature can be an effective way to support children’s wellbeing, especially when children return to normal routines, such as school and extracurricular activities. .
FINEWEB-EDU
Page:For remembrance, soldier poets who have fallen in the war, Adcock, 1920.djvu/306 248 us that the Stationery Department could do everything. A second visit to that Department resulted in our invading the War Office again with the name of an official who, when we found him, protested that he knew no more of the posters than we did, and it was on the advice of a policeman outside in Whitehall that we rode round to the big recruiting depot in Old Scotland Yard, walked past the crowd waiting to enlist and the officers who were shepherding it, as if we belonged there, and, once inside, were directed to a large basement room in which we discovered what we were seeking. I had to answer a good many questions, Kilmer standing by in discreet silence, and, in the end, with a little diplomacy, we possessed ourselves of samples of almost every variety of poster and window-card and carried them out between us, a bulky armful apiece, to the taxi. We piled them in, and then Kilmer paused to look round for a minute at the long queue of young men who were waiting to offer themselves for enlistment—a long
WIKI
                           This article is updated regularly. All data presented are as of August 09, 2020, the last update was on August 10, 2020. Introduction The ongoing COVID-19 pandemic needs no explanation because the whole world is currently badly affected. The high infectivity of the SARS-CoV-2 pathogen and the potentially severe course of the disease are putting healthcare systems around the world to the test. However, to take the right steps to contain the pandemic, analyzing the number of cases is an essential step. Many of us have now made it a habit to look at the current state of the case numbers at least once a day. The good availability of the data and new visualization technologies enable us to update graphs in the shortest possible time. Especially the data of the Johns Hopkins University and of the Robert Koch Institute are used intensively for reporting cases in Germany. On different platforms, for example Kaggle.com, a lot of data is available to everyone, in the hope that the large global community of data scientists will generate valuable information and predictions from the data. We at StatSoft Europe GmbH offer a variety of R training courses and have also used the COVID-19 data to generate knowledge through visualization. We have used the Open-Source statistics software R and disclosed the code below to provide interested analysts with free help for visualizing data in R. We used the data from the Johns Hopkins University (downloaded from this Kaggle Link). The original data, as used in Kaggle, originated from the Git Repository of the Johns Hopkins University. At this point we would like to take the opportunity to draw your attention to various support platforms for the Corona crisis. Perhaps you are affected yourself or know people who are particularly at risk and should stay at home for their own safety. In order to make life a little easier for those people, many support platforms have emerged, for example to provide free grocery shopping. This is a list of German aid platforms, where you can register as a person affected or as a potential helper. There you will also find links to Germany-wide help platforms. Please also remember that animal shelters in particular may have a large influx of pets during this time, whose owners are no longer able to take care of due to the illness. You can support the shelters by donating food or money. Reommended literature For data analysis and visualization we can warmly recommend the excellent books R for Data Science and Hands on Programming with R by Hadley Wickham and Garret Grolemund. Incidentally, both authors are also the authors of most packages that we need in this project. The Current Situation In this section we would like to use various graphics to show you how the COVID-19 pandemic is spreading throughout the world. The status of the data record is the August 09, 2020. In the next section below, we then show how we created these graphics using R. Worldwide The following figure shows the number of confirmed cases from all countries, divided into active cases, recoveries and deaths, which had registered at least 50000 confirmed cases on August 09, 2020. The following figure shows the number of confirmed cases on a log scale by days after the 100th confirmed case was registered in each country. This way, it is possible to see how fast the outbreak developed in the respective countries. For this figure, only the countries which registered the most cases as of August 09, 2020 as well as South Korea were selected. South Korea is a special case, because their fast reaction and testing regime caused a strong decrease in further infections. By choosing the log scale, it is easier to compare the increase in cases irrespective of their order of magnitude. China, Europe and USA The following figure shows how the number of cases developed in China, Europe, the USA and all other countries (other). It becomes clear how quickly China managed to get the outbreak under control by taking very strict measures. About five weeks after the number of cases in China reached a plateau, the number of cases in Europe was already higher than in China. Just two more weeks later, there were five times as many cases in Europe as in China. The USA also showed a rapid increase, which follows Europe’s trend, delayed by about a week and a half. Europe and the USA are currently the new epicentres of the COVID-19 pandemic. The following figure shows the daily increase in case numbers in China, Europe, the USA and in all other countries. This clearly shows how quickly the Chinese government reacted and took drastic measures, because the quarantine of Hubei already began on January 23, at a time when there were only 639 confirmed cases and 18 deaths in China. Nevertheless, despite the quarantine, the confirmed cases in China rose to 84668, including 4634 deaths (as of August 09, 2020). This makes it very clear that a strong restriction on travel and freedom of movement (however painful this may be) a) can effectively limit the spread, b) should be carried rather earlier than later, and c) may flatten the curve only after a certain delay. In Europe on 04.04.2020 the highest daily increase in cases (54896) was recorded, in the USA the highest increase was 78310 cases on 16.07.2020. In China, on the other hand, the highest increase was only 15133 cases on 13.02.2020. The following figure shows the total active cases of all defined regions for the respective period, the width of the colored band symbolizes the proportion of those diseases that occurred in the respective region. The spread began in China first, then continued in Europe and other countries and at the same time decreased again in China. Around two weeks after the outbreak in Europe, the disease spread to the United States. The United States is the country with the highest number of acute illnesses. The following figure shows the confirmed cases, deaths and active cases for the different regions on August 09, 2020. Europe In the following figure we see the confirmed cases of all European countries in which at least 5000 confirmed cases were registered on 30.03.2020. The width of the colored band shows which proportion of confirmed cases states can be assigned to the respective state and how this proportion changes over time. This shows that Italy was the first country to register a high number of confirmed cases. A few weeks later, the number of infections also rose sharply in surrounding European countries. Most infections were recorded until August 09, 2020 in Italy, Spain and Germany and France.
ESSENTIALAI-STEM
Common myths when upgrading a video system: A camera is a camera There are so many cameras out there.  You can buy a $100 Flip camera all the way up to $100,000+ for a camera.  So buying a camera can at many times be confusing.  Some SD cameras cost more than some HD cameras.  How do you find the best deal and get what you need. The first thing to understand is the different classes of Cameras: • Consumer: any camera under $1500 • Prosumer: usually in the $1,500 to $10,000. Usually have 3 CCD or CMOS chips.  They have a higher quality than consumer cameras and are close to professional quality. • Industrial: Broadcast quality cameras made for both ENG and EFP production.  Made to be portable and used for many different situations. Very configurable for any type of situations or need, Very good quality. Usually listed as Dockable cameras as the backs can be swapped out for decks, studio configs and more. • Broadcast/ Professional: Made for Studio operation, best quality and made durable but only for studio and EFP configurations.  There are both Hard cameras and portable Studio cameras.  Hard cameras can only be on a tripod where portable studio cameras are for Hand held operation. Now there are three different uses for cameras, ENG, EFP and studio. • ENG: ENG stands for Electronic News Gathering.  Basically anytime you use a camera to shoot video to be played back later, and most of the time edited before airing is considered ENG. • EFP: EFP stands for Electronic Field Production.  Any time there is a multiple camera shoot directed live, it is considered EFP. • Studio: Made for studio.  Again this is a multi-camera situation but in a controlled environment. There are many different manufactures out there, all of them have their strengths and weaknesses, for the sake of staying mostly neutral on this blog, I will list them so you know the camera manufactures but I won’t rank them.  The major camera manufactures are: Ikegami, Grass Valley, Hitachi, Sony, Panasonic, and JVC. Now that you know the classes and different uses for cameras here is what you need to know: These days manufactures are tying to blur the lines in both the classes and uses of cameras.  Every camera is claimed to be able to “do it all” at a cheap price.  But know that a camera was first designed to fit into one of these classes and for one of these purposes. It is important to know what you need and how these cameras will react in your situations. Here are a couple of other things to understand: • Chip size: There are two different types of chips CCD’s and CMOS.  Most Prosumer cameras and bigger are 3 chip cameras. Chips sizes are ¼, 1/3, ½ and 2/3 inch.  The bigger the chip size the better color response and quality the camera. I recommend 1/3 as the smallest you should ever go. 1/3 looks great outdoors and in controlled lighting situations.  ½ and 2/3” chips are better in low-light and theatrical situations where there is a lot of color. Industrial and Broadcast cameras will be always have 2/3″ chips in them. • Lenses: most prosumer cameras have fixed lenses, in that they are not interchangeable.  Cameras with interchangeable lenses have what is called a bayonet size.  The size of the bayonet directly corresponds to the size of the chips.  Most lenses are made for a 2/3” bayonet so any camera that has a smaller bayonet size has to be adapted.  The bigger the lens bayonet size, the more light it lets through for a better image.  Your distances and the type of shots you want to get determine choosing the right lens for the job.  The main two lens manufactures are Canon and Fujinon. • Cabling: There are a few different ways to tie a camera into a live system.  A studio configured camera when connected has these features: Power from the CCU, video from the camera, genlock, return video, tally, Com, Audio from the camera, Camera controls, White Balancing, Black balancing and iris control. A studio configured camera should allow all these features no matter what cabling it uses, here are a few different cabling options: o    Multi-core: A 26 pin connector that transports all signals from CCU to and from the camera.  Not very durable but works fine in a fixed install. The technology is cheap but cable repair is difficult and expensive. o   Triax: A form of copper cable that multiplexes the signal to and from a camera to the CCU.  Very durable, and very high quality o   Camplex: A universal multiplex system that can be used for a wide variety of systems using a simple coax cable. Can be very finicky and lower quality but very flexible. o   Fiber: Another form of high quality transportation.  Not the most durable but used for the highest quality camera transmission. o   Proprietary systems: Different camera manufactures have different proprietary send and receive systems for many different situations.  They can be low profile or very bulky. o   Tie: The final way to get a camera is to use the camera in/ outs to connect it to a system.  Usually a simple output and a genlock in is all that is needed.  You do not get any of the studio features this way.  All white balancing and irising has to be done on the camera itself and there is no return video or tally lights available.  If you need the signal to go multiple places it has to go through a DA rather than using multiple outs on a camera.  Power has to also be done locally. When you start to look at purchasing a camera know that the cost of the camera itself is just the beginning.  You have to purchase the CCU’s, viewfinders, lenses, lens controls, tripods, tripod plates, and cabling. So when picking out a camera, especially for a form of studio operation it is important to know what your needs are and to understand the different options and types of cameras out there.  This way you can pick out the best camera for the job. For most church IMAG applications I recommend using EFP cameras and have should shoot for either an industrial or Broadcast camera. Most of us doing IMAG are using theatrical lighting and need those bigger chips and the ability to control the cameras in the control roms, EFP because we are switching a live show and the cameras need to work well in a live system. Advertisements About brhoda I freelance doing a few different thing in the video and live production market. I worked for a church for 5 years directing services and designing control rooms. This entry was posted in All, Common Myths When upgrading a Video system. Bookmark the permalink. One Response to Common myths when upgrading a video system: A camera is a camera 1. Cazare Ungaria Thanks , I have just been searching for info approximately this subject for ages and yours is the greatest I have discovered till now. However, what concerning the conclusion? Are you sure in regards to the source? Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Google+ photo You are commenting using your Google+ account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) w Connecting to %s
ESSENTIALAI-STEM
Therapeutic: telitacicept for autoimmune diseases Published: 4-Jun-2024 Primary Sjögren syndrome (PSS) is a common autoimmune disease. It mainly affects the lacrimal and salivary glands, leading patients to experience dry eyes and mouth, but it can also affect other organs including the kidneys, lungs and nervous system There is no specific therapy that restores gland secretion, with treatment restricted to symptom management such as the use of artificial tears. Telitacicept is a novel fusion protein being developed by China’s RemeGen as a potential treatment for several autoimmune diseases, including PSS.1 It includes the extracellular domain of TACI, the human transmembrane activator, calcium modulator and cyclophilin ligand interactor, and the Fc domain of human immunoglobulin G. It targets B-lymphocyte stimulator (BLyS) and a proliferation-inducing ligand (APRIL), two cell signalling molecules that are vital for B-lymphocyte development. Inhibiting them reduces B-cell mediated autoimmune responses. A randomised, double-blind, placebo-controlled Phase II trial has been done in 42 patients with PSS.2 Subjects were given weekly subcutaneous doses of either 160 or 240 mg of telitacicept or a placebo for 24 weeks. The lower dose gave a significant reduction in the EULAR PSS disease activity index from baseline to week 24, with a placebo adjusted 4.5% mean reduction. For the higher dose, the decline was 2.7% with no statistical difference compared with the placebo. No serious adverse events were seen in the treatment group. It is also being investigated in other autoimmune diseases, including systemic lupus erythematosus with rheumatoid arthritis, IgA nephritis and myasthenia gravis. For example, a randomised, open-label Phase II study was done in patients with generalised myasthenia gravis.3 In all, 29 patients who tested positive for acetylcholine receptor antibodies or muscle-specific kinase antibodies, and who were receiving standard of care therapy, were given weekly subcutaneous doses of 160 or 240 mg of the drug for 24 weeks on top of their standard of care treatment. After 24 weeks, the mean reduction in quantitative myasthenia gravis score from baseline was 7.7 in the lower dose group and 9.6 for the higher group; the reductions after 12 weeks were 5.8 and 9.5, respectively. There were no adverse events leading to discontinuation or death. A Phase III trial is planned. In a Phase IIb trial in active systemic lupus erythematosus, 249 patients were randomised to receive 80, 160 or 240 mg weekly subcutaneous doses of telitacicept or a placebo once a week on top of standard therapy.4 At week 48, 76% of patients given the highest dose achieved an SLE Responder Index 4 response, with 68% in the 160 mg group, 71% with 80 mg and 34% with the placebo. It was well tolerated, with adverse event profiles being similar across all treatment groups. Further trials are planned. References 1. F. Shi, et al., Immunopharmacol. Immunotoxicol. 43, 666 (2021). 2. D. Xu, et al., Rheumatology (Oxford) 63, 698 (2024). 3. J. Yin, et al., Eur. J. Neurol. 10, e16322 (2024). 4. D. Wu, et al., Ann. Rheum. Dis. 83, 475 (2024). You may also like
ESSENTIALAI-STEM
What is MCC deficiency? 3-methylcrotonyl-CoA carboxylase deficiency (also known as 3-MCC deficiency) is an inherited disorder in which the body is unable to process certain proteins properly. What causes 3MCC? 3MCC happens when an enzyme called “3- methylcrotonyl CoA carboxylase” is missing or doesn’t work right. This enzyme helps break down leucine. All foods with protein contain leucine. Harmful matter can build up in the blood and cause problems when someone with 3MCC eats protein. How do I know if I have 3MCC? Symptoms of a metabolic crisis include feeding difficulties, vomiting, behavioral changes, hypotonia, lethargy, hypoglycemia, metabolic acidosis, increased ketones in urine, and high levels of ammonia in the blood. If untreated, the crisis can lead to breathing problems, liver failure, seizures, coma, and death. What is Mccd? 3-Methylcrotonyl-CoA carboxylase deficiency (MCCD) is an autosomal recessive disorder of leucine catabolism that has a highly variable clinical phenotype, ranging from acute metabolic acidosis to nonspecific symptoms such as developmental delay, failure to thrive, hemiparesis, muscular hypotonia, and multiple sclerosis … What is Holocarboxylase synthetase deficiency? Holocarboxylase synthetase deficiency is an inherited disorder in which the body is unable to use the vitamin biotin effectively. This disorder is classified as a multiple carboxylase deficiency, which is a group of disorders characterized by impaired activity of certain enzymes that depend on biotin. What is a Biotinidase deficiency? Biotinidase deficiency is a genetic disorder caused by changes (mutations) in the BTD gene. The BTD gene instructs the body in creating the enzyme biotinidase that helps the body recycle an important vitamin called biotin (vitamin H). What is Methylcrotonylglycinuria? 3-Methylcrotonyl-CoA carboxylase deficiency also known as 3-Methylcrotonylglycinuria or BMCC deficiency is an inherited disorder in which the body is unable to process certain proteins properly. What is trifunctional protein deficiency? Trifunctional protein deficiency (TFP deficiency) is a fatty acid oxidation disorder. Individuals are lacking or have decreased function of trifunctional protein, leading to an inability to utilize certain dietary fats or fat stored in the body for energy. How common is Holocarboxylase synthetase deficiency? The exact incidence of this condition is unknown, but it is estimated to affect 1 in 87,000 people. Is biotinidase deficiency curable? Biotinidase deficiency (BTD) deficiency is a treatable, inherited condition. BTD affects the way the body processes a vitamin called biotin (sometimes called vitamin H). Is biotinidase deficiency life threatening? With early detection and treatment, a person with biotinidase deficiency can live a completely normal life. If left untreated, the disease can cause life-threatening complications. When the disease is not detected early, patients may experience permanent damage to their hearing, vision, and intellectual ability. What are the symptoms of protein deficiency? Signs and symptoms of protein deficiency • Skin, hair and nail problems. • Loss of muscle mass. • Increased risk of bone fractures. • Bigger appetite and increased calorie intake. • Risk of infections. • Fatty liver. • May inhibit proper body growth in children. What is 3-methylcrotonyl-CoA carboxylase deficiency? 3-Methylcrotonyl-CoA carboxylase (3-MCC) deficiency is an inherited (genetic) condition that prevents your baby’s body from breaking down certain proteins properly. “3-MCC” is the name of an enzyme in your body that helps you digest a part of some proteins called leucine. What do you need to know about 3-mcc deficiency? From Genetics Home Reference. Learn more 3-methylcrotonyl-CoA carboxylase deficiency (also known as 3-MCC deficiency) is an inherited disorder in which the body is unable to process certain proteins properly. Which is the best website for carboxylase deficiency? MedlinePlus Genetics contains information on 3-methylcrotonyl-CoA carboxylase deficiency. This website is maintained by the National Library of Medicine. Why does my baby not have 3-mcc enzyme? “3-MCC” is the name of an enzyme in your body that helps you digest a part of some proteins called leucine. This enzyme breaks leucine into smaller pieces that your body can either use or get rid of. Without enough working 3-MCC enzyme, your baby has trouble using proteins with leucine to make energy.
ESSENTIALAI-STEM
/* * Copyright (C) 2007-2018 Apple Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "config.h" #include "History.h" #include "BackForwardController.h" #include "Document.h" #include "Frame.h" #include "FrameLoader.h" #include "FrameLoaderClient.h" #include "HistoryController.h" #include "HistoryItem.h" #include "Logging.h" #include "NavigationScheduler.h" #include "Page.h" #include "ScriptController.h" #include "SecurityOrigin.h" #include #include namespace WebCore { History::History(Frame& frame) : DOMWindowProperty(&frame) { } unsigned History::length() const { if (!m_frame) return 0; auto* page = m_frame->page(); if (!page) return 0; return page->backForward().count(); } ExceptionOr History::scrollRestoration() const { if (!m_frame) return Exception { SecurityError }; auto* historyItem = m_frame->loader().history().currentItem(); if (!historyItem) return ScrollRestoration::Auto; return historyItem->shouldRestoreScrollPosition() ? ScrollRestoration::Auto : ScrollRestoration::Manual; } ExceptionOr History::setScrollRestoration(ScrollRestoration scrollRestoration) { if (!m_frame) return Exception { SecurityError }; auto* historyItem = m_frame->loader().history().currentItem(); if (historyItem) historyItem->setShouldRestoreScrollPosition(scrollRestoration == ScrollRestoration::Auto); return { }; } SerializedScriptValue* History::state() { m_lastStateObjectRequested = stateInternal(); return m_lastStateObjectRequested.get(); } SerializedScriptValue* History::stateInternal() const { if (!m_frame) return nullptr; auto* historyItem = m_frame->loader().history().currentItem(); if (!historyItem) return nullptr; return historyItem->stateObject(); } bool History::stateChanged() const { return m_lastStateObjectRequested != stateInternal(); } JSValueInWrappedObject& History::cachedState() { if (m_cachedState && stateChanged()) m_cachedState = { }; return m_cachedState; } bool History::isSameAsCurrentState(SerializedScriptValue* state) const { return state == stateInternal(); } void History::back() { go(-1); } void History::back(Document& document) { go(document, -1); } void History::forward() { go(1); } void History::forward(Document& document) { go(document, 1); } void History::go(int distance) { LOG(History, "History %p go(%d) frame %p (main frame %d)", this, distance, m_frame, m_frame ? m_frame->isMainFrame() : false); if (!m_frame) return; m_frame->navigationScheduler().scheduleHistoryNavigation(distance); } void History::go(Document& document, int distance) { LOG(History, "History %p go(%d) in document %p frame %p (main frame %d)", this, distance, &document, m_frame, m_frame ? m_frame->isMainFrame() : false); if (!m_frame) return; ASSERT(isMainThread()); if (!document.canNavigate(m_frame)) return; m_frame->navigationScheduler().scheduleHistoryNavigation(distance); } URL History::urlForState(const String& urlString) { if (urlString.isNull()) return m_frame->document()->url(); return m_frame->document()->completeURL(urlString); } ExceptionOr History::stateObjectAdded(RefPtr&& data, const String& title, const String& urlString, StateObjectType stateObjectType) { m_cachedState = { }; // Each unique main-frame document is only allowed to send 64MB of state object payload to the UI client/process. static uint32_t totalStateObjectPayloadLimit = 0x4000000; static Seconds stateObjectTimeSpan { 30_s }; static unsigned perStateObjectTimeSpanLimit = 100; if (!m_frame || !m_frame->page()) return { }; URL fullURL = urlForState(urlString); if (!fullURL.isValid()) return Exception { SecurityError }; const URL& documentURL = m_frame->document()->url(); auto createBlockedURLSecurityErrorWithMessageSuffix = [&] (const char* suffix) { const char* functionName = stateObjectType == StateObjectType::Replace ? "history.replaceState()" : "history.pushState()"; return Exception { SecurityError, makeString("Blocked attempt to use ", functionName, " to change session history URL from ", documentURL.stringCenterEllipsizedToLength(), " to ", fullURL.stringCenterEllipsizedToLength(), ". ", suffix) }; }; if (!protocolHostAndPortAreEqual(fullURL, documentURL) || fullURL.user() != documentURL.user() || fullURL.pass() != documentURL.pass()) return createBlockedURLSecurityErrorWithMessageSuffix("Protocols, domains, ports, usernames, and passwords must match."); const auto& documentSecurityOrigin = m_frame->document()->securityOrigin(); // We allow sandboxed documents, 'data:'/'file:' URLs, etc. to use 'pushState'/'replaceState' to modify the URL query and fragments. // See https://bugs.webkit.org/show_bug.cgi?id=183028 for the compatibility concerns. bool allowSandboxException = (documentSecurityOrigin.isLocal() || documentSecurityOrigin.isUnique()) && equalIgnoringQueryAndFragment(documentURL, fullURL); if (!allowSandboxException && !documentSecurityOrigin.canRequest(fullURL) && (fullURL.path() != documentURL.path() || fullURL.query() != documentURL.query())) return createBlockedURLSecurityErrorWithMessageSuffix("Paths and fragments must match for a sandboxed document."); Document* mainDocument = m_frame->page()->mainFrame().document(); History* mainHistory = nullptr; if (mainDocument) { if (auto* mainDOMWindow = mainDocument->domWindow()) mainHistory = mainDOMWindow->history(); } if (!mainHistory) return { }; WallTime currentTimestamp = WallTime::now(); if (currentTimestamp - mainHistory->m_currentStateObjectTimeSpanStart > stateObjectTimeSpan) { mainHistory->m_currentStateObjectTimeSpanStart = currentTimestamp; mainHistory->m_currentStateObjectTimeSpanObjectsAdded = 0; } if (mainHistory->m_currentStateObjectTimeSpanObjectsAdded >= perStateObjectTimeSpanLimit) { if (stateObjectType == StateObjectType::Replace) return Exception { SecurityError, String::format("Attempt to use history.replaceState() more than %u times per %f seconds", perStateObjectTimeSpanLimit, stateObjectTimeSpan.seconds()) }; return Exception { SecurityError, String::format("Attempt to use history.pushState() more than %u times per %f seconds", perStateObjectTimeSpanLimit, stateObjectTimeSpan.seconds()) }; } Checked titleSize = title.length(); titleSize *= 2; Checked urlSize = fullURL.string().length(); urlSize *= 2; Checked payloadSize = titleSize; payloadSize += urlSize; payloadSize += data ? data->data().size() : 0; Checked newTotalUsage = mainHistory->m_totalStateObjectUsage; if (stateObjectType == StateObjectType::Replace) newTotalUsage -= m_mostRecentStateObjectUsage; newTotalUsage += payloadSize; if (newTotalUsage > totalStateObjectPayloadLimit) { if (stateObjectType == StateObjectType::Replace) return Exception { QuotaExceededError, "Attempt to store more data than allowed using history.replaceState()"_s }; return Exception { QuotaExceededError, "Attempt to store more data than allowed using history.pushState()"_s }; } m_mostRecentStateObjectUsage = payloadSize.unsafeGet(); mainHistory->m_totalStateObjectUsage = newTotalUsage.unsafeGet(); ++mainHistory->m_currentStateObjectTimeSpanObjectsAdded; if (!urlString.isEmpty()) m_frame->document()->updateURLForPushOrReplaceState(fullURL); if (stateObjectType == StateObjectType::Push) { m_frame->loader().history().pushState(WTFMove(data), title, fullURL.string()); m_frame->loader().client().dispatchDidPushStateWithinPage(); } else if (stateObjectType == StateObjectType::Replace) { m_frame->loader().history().replaceState(WTFMove(data), title, fullURL.string()); m_frame->loader().client().dispatchDidReplaceStateWithinPage(); } return { }; } } // namespace WebCore
ESSENTIALAI-STEM
  Search • leahheadon The Athletes Kitchen- The Quest for Thinness Brought to you courtesy of Nancy Clark, MS RD CSSD Many athletes have engraved this message into their brains: The lighter I am, the better I will perform. While lugging around excess flab can indeed slow you down, many dieting athletes are already lean for their genetics—yet may yearn to be even leaner. These tenacious dieters overlook the fact that weight is more than a matter of willpower, and ask: •What is wrong with my diet? For all the exercise I do, I should be pencil-thin by now. What should I be eating to lose weight…? • Why am I not losing weight? Am I eating too much … or too little? • When I first lost weight, I got faster and set PRs. Now, I just get injury after injury. Do you think that’s because of my diet? If any of this sounds familiar, keep reading. Weight-conscious athletes must remember they need to “nourish to flourish.” Denying the body of food denies it of valuable fuel and nutrients. Athletes in sports focusing on leanness or weight classes get stuck between a rock and a hard place. Speaking at the Academy of Nutrition and Dietetics (AND) annual Food and Nutrition Conference and Exposition (FNCE), Mary Jane De Souza PhD and Nancy Williams ScD, Penn. State University professors renowned for their research with female athletes, presented information that can help us learn why the quest for a lighter body commonly backfires into injuries and health issues that take a toll. Here are some key points to ponder: • You can only perform at your best if you are fueled at your best. You cannot reach peak performance when you are poorly fed. While some athletes might improve in the initial stages of weight loss, extended food restriction can lead to injuries as the body breaks down and lacks nutrients to heal quickly. Athletes with a high drive for thinness might set PRs – until they get stress fractures, torn ligaments, or a cascade of other muscle and bone injuries. • Your body needs fuel, not only to perform optimally, but also to function (pump blood, make hormones, grow hair, etc.). The energy needed to stay alive—your resting metabolic rate (RMR)—accounts for about 60 to 70% of all that you eat. You do not have to exercise to deserve to eat! • When energy availability is low, the body initiates a dangerous cascade of adaptations that lowers one’s RMR, curbs growth, and hinders reproduction. Women can stop having regular menstrual periods, and men can experience a drop in libido and sperm quality/motility. Both males and females need to eat enough to support normal body functions as well as their exercise. • Historically, female athletes thought loss of menses (amenorrhea) was a sign of training “hard enough” and being “lean enough” to be a successful competitor. We now know that amenorrhea means a 2 to 4 times higher risk of getting stress fractures (as compared to female athletes with regular menstrual periods). Athletes who experience one stress fracture are at high risk for getting more stress fractures. The combination of an energy imbalance and altered hormonal status contributes to reduced bone density and culminates in stress fractures now, and osteoporosis in the future. • Weight-conscious male cross-country runners, cyclists, and jockeys commonly have low bone density, similar to that seen in female athletes. Their bone injuries can often be linked to eating disorders. Yes, male athletes get eating disorders just like women do, though males, as compared to females, require a more severe energy deficit before bone and reproductive problems occur. • Bone loss in the spine and hip can be 2.5% per year if left unchecked. Bone loss is slow to recover and not all reductions in bone density are reversible. Nutrition strategies to improve bone health include eating more food/calories, consuming a calcium-rich food at least 2 to 3 times a day, and boosting vitamin D if blood levels are low. • To resolve the energy imbalance, athletes want to increase their food intake by at least 350 calories/day. This additional fuel can reverse the negative changes in men within a week, whereas in women, resuming menses can take months. Active women who eat more and still do not get a period for six months should consult with a reproductive endocrinologist to rule out any medical reasons for the amenorrhea. • Failing to consume enough calories can happen intentionally (with dieting) or unintentionally (with “eating only healthy foods”). Hunger can be inadequate to cue an adequate intake. So how can you tell if you are undereating? Energy deficiency can be difficult to identify because an under-fueled athlete can be weight-stable. The body simply conserves energy, which stops fat loss. That’s when athletes start to wonder: Am I overeating or undereating? If under-eating, surely the athlete would be losing fat, right? No. Nature wants to protect athletes from starving themselves to death. • Measuring energy balance is challenging and fraught with error. Counting calories and tracking how many calories you burned off with exercise can get obsessive and is generally inaccurate in that you have to account for your non-exercise calories. That is, after exercising for two-hours, do you then become a “sedentary athlete” for the rest of the day as you watch NetFlix? • Getting your RMR measured is one way to assess if you are eating enough. A simpler method is to notice if you are always cold, hungry, and thinking about food all day. If yes, and not losing body fat, you could easily be undereating. Experiment with eating more, to learn if feel warmer, less hungry, and are no longer thinking about food all the time. The bottom line: When striving to lose weight to perform at your best, keep in mind health needs to be your most important goal. Without healthy bones and normal hormone levels, you cannot be the best athlete you want to be. You might be able to perform well at a lower-than-normal weight for a season or two but not for the long run. The best athlete is genetically gifted, well trained, and well fed. The website femaleandmaleathletetriad.org offers more information. 6 views0 comments Recent Posts See All  
ESSENTIALAI-STEM
In the Matter of the Application of the Board of Education of Union Free School District No. 2 of the Town of Brookhaven, Suffolk County, and Others, Appellants, for a Certiorari Order against Frank P. Graves, as Commissioner of Education of the State of New York, Respondent. (Case No. 888.) Third Department, May 26, 1925. Schools — consolidated union free school district — transportation of children of school age residing in remote part of district—-board of education does not have power or duty, under Education Law, §§ 310 and 325, to furnish transportation — district has discretion under Education Law, § 206, subd. 18, to provide transportation — Commissioner of Education has no power, under Education Law, § 891, to direct board of education to provide transportation and levy taxes to pay for same. The board of education of a consolidated union free school district does not have the power, under section 310 of the Education Law, to provide for transportation of children of school age residing in a remote part of the district, nor does said section impose a duty to do so, and furthermore, such a board of education has no power or duty to levy a tax for such transportation under section 325 of the Education Law. The transportation of children residing in a remote part of such a district at the expense of the district is not a duty imposed upon the district by subdivision 18 of section 206 of the Education Law, but it is within the discretion of the district to provide for transportation.- ' ' " Accordingly, the Commissioner of Education has no power under section 891 of the Education Law to direct the board of education of a consolidated union free school district to provide transportation for children residing in a remote part of the district and to levy a tax to pay for the same, notwithstanding the children for whom transportation is asked, at the expense of the district, reside approximately three miles from the schoolhouse; that their parents are financially unable to transport their children to the school; that the roads over which they must travel are infrequently used and are almost impassable at certain seasons of the year; that several of the children, although of school age, are so young that it will be impossible for them to attend school unless they are transported to and from the schoolhouse; that in the absence of transportation, the children and their parents will not be able to comply with the provisions of the Education Law relating to compulsory education; and that the assessed valuation of the school district is so high in comparison with the cost of maintenance of the school that it would not be a burden on the school district to pay the expense of transportation. Hinman, J., dissents, with opinion. Appeal by the petitioners, Board of Education of Union Free School District No. 2 of the town of Brookhaven, Suffolk county, and others, from an order of the Supreme Court, made at the Albany Special Term and entered in the office of the clerk of the county of Albany on the 18th day of October, 1924, granting defendant’s application to vacate a certiorari order granted on the 3d day of July, 1924. Lester Hand Jayne, for the appellants. Frank B. Gilbert [Irwin Esmond and Raymond F. Allen of counsel], for the respondent. Van Kirk, J.: On August 14, 1923, fifteen residents of union free school district No. 2 of the town of Brookhaven, Suffolk county, presented a petition to the board of education of the district, which is a consolidated district. The petition stated that the petitioners do hereby respectfully petition the Board of Education of the said school district to provide transportation for the children of the residents of said school district, living in the district, including the residence of Bernard Selleck and that part of the district lying south of his said residence.” The board of education took no action in reference to furnishing the transportation prayed for. On the 28th day of September, 1923, Sadie D. Hawkins,- one of the petitioners to the board of education, presented a petition to the Commissioner of Education: The petition set up the presentation to the board of education of the petition signed by the fifteen residents and stated that the board had refused to take any action thereupon. It contained the following: “ That deponent acting for those signing the petition appeals to the Commissioner of Education for relief and for an order requiring the Board of Education of Union Free School at Setauket, New York, being district #2 town of Brookhaven to furnish a conveyance for the children residing in South Setauket in said District at a distance of more than two and one-half miles from the school house.” The petition also contained the following: “ That on several occasions deponent has brought the question of transportation before the Board of Education, and they have always turned the application down. Once the question came up before a district meeting and was turned down.” The board of education, on the 15th day of November, 1923, filed an answer to the petition. On the 21st day of March, 1924, the Commissioner of Education made an order reading as follows: The appeal is sustained. It is ordered that the Board of Education of Union Free School District No. 2 of the Town of Brookhaven, Suffolk County, be and it is hereby directed to provide conveyance immediately for the appellant’s child and other children residing in the neighborhood referred to in this appeal who are required to travel an unreasonable distance in order to attend the district school, and to pay the cost of such conveyance from any moneys that are on hand belonging to the district that are available for such purpose. In the event there are no moneys available the Board of Education is hereby authorized and directed to raise by tax upon the taxable property of the district a sum sufficient to pay such cost of conveyance.” (See Matter of [Hawkins] Appeal Relative to Transportation of Children [Town of Brookhaven], 31 State Dept. Rep. 85, 88.) A meeting of the voters of the school district was subsequently called by the board of education. There was submitted to the meeting a resolution to provide for the transportation of pupils in accordance with the order of the Commissioner. Eighty-three votes were cast at said meeting, all of which were against the resolution except the votes of the fifteen petitioners. Thereafter, on May 26, 1924, the Commissioner of Education made an order withholding from the district the State moneys apportioned to it on the ground that the board of education had failed to comply with his order previously made. Thereafter the board of education obtained an order of certiorari to review the action of the Commissioner in respect to the two orders made. The order was subsequently vacated and from the vacating order so made this appeal was taken. We do not in this opinion consider the question whether or not the Legislature can delegate to the Commissioner of Education the power to tax a school district. If all the provisions of the Education Law are valid we think the Commissioner has in this case exceeded his power. The Commissioner of Education is by statute made the executive director of the Education Department of the State and is charged with the general duty of overseeing its administration. He is given quasi judicial power to determine, among others, such controversies as may arise from acts or failures to act of a board of education or a school district meeting. But the power given to him is not an unlimited power. (People ex rel. Hylan v. Finegan, 227 N. Y. 219, 224 and cases cited at p. 225.) Boards of education and school district meetings have such powers only as are delegated, and such duties only as are imposed, by statute. We find nothing in the statute giving the Commissioner of Education power to add to or take from those powers delegated and those duties imposed. He may require the law to be obeyed; he may not make law; his is an executive, not a legislative power. The general powers and duties of boards of education are fixed by section 310 of the Education Law, as amended. These powers and duties do not include the furnishing of transportation to scholars. There are some additional powers and duties specially given. In article 6-B “ Central Rural Schools ” are provided for. (§§ 180-186, added by Laws of 1914, chap. 55, as since amd.) By the last section power is in form given to the Commissioner of Education, without any previous vote of the district, to require the district to pay for transportation of scholars within a central school district. From this it may be inferred that he may order the board of education to raise the necessary funds by taxes. Article 6-C provides for Central High School Districts.”' (§§ 187-189-1, added by Laws of 1917, chap. 137, as since amd.) In these districts the board of education is given power, without vote of the district, to provide transportation for scholars and, if the board fails to so provide, the Commissioner of Education may require the board to provide such transportation. So far as we have been able to find, in these two articles is the only direct authority given to the Commissioner of Education to require transportation to be furnished to the scholars in a district and to tax or cause to be taxed a district therefor; they do not apply to consolidated districts. Article 5 (§§ 120-154, as amd.) provides in section 130 et seq. (added by Laws of 1913, chap. 129, as amd.) for the consolidation of school districts. With reference to these there is no special provision authorizing the Commissioner of Education to require transportation to be furnished or to tax a district therefor. Nor is there any mention of transportation of scholars except in section 134 (added by Laws of 1913, chap. 129, as amd. by Laws of 1923, chap. 716; since amd. by Laws of 1924, chap. 192, and Laws of 1925, chap. 674), which permits the use of State moneys for that purpose. If then such power exists in the Commissioner of Education it must be found in the general provisions of the Education Law. Among the general powers and duties of boards of education, fixed by section 310, as amended, some involve the expenditure of money and the raising of taxes therefor by vote of the inhabitants of the district. Then section 325 provides: “ Levy of tax for certain purposes without vote. If the inhabitants shall neglect or refuse, to vote the sum estimated necessary for teachers’ wages, after applying thereto the public school moneys, and other moneys received or to be received for that purpose, or if they shall neglect or refuse to vote the sum estimated necessary for ordinary contingent expenses, the board of education may levy a tax for the same, in like manner as if the same had been voted by the inhabitants.” Here is a plain distinction between those purposes which are essentials and necessaries and those which are left to the discretion of the inhabitants; and it is a fair inference that the board may not levy taxes, the voters having refused, except in the cases here specified, or where a mandatory statute places the duty upon a school district to provide funds for a necessary school purpose. Among the general provisions of the statute, section 206, subdivision 18, alone authorizes the inhabitants of a district to provide by tax or otherwise for the conveyance of pupils residing therein to the school of the district. This is the section giving powers to the district meeting; it does not purport to impose duties upon the district meetings. We may assume that, if the duty to furnish transportation were imposed upon the board of education or the district meeting, the Commissioner of Education would have the right to require the board of education to furnish transportation, or the school district to act. But, where the matter is left to the discretion of the voters, he could not direct how their votes should be cast. We think his powers are limited to matters of school administration and policy and he is not invested with power to require the board of education or any officer of the school district to levy taxes, except in cases where the duty is imposed upon the board or officer to furnish that thing or service to which the moneys to be raised by tax are to be applied. There seems to be an intimation of this in Bullock v. Cooley (225 N. Y. 566, 578), where the court said: “The determination of the Commissioner of Education upon the appeal involved matters of school administration and policy not without his jurisdiction and his decision is not subject to review by the courts so far as it pertained to such school administration and policy and but incidentally, if at all, affects property rights.” And upon this subject in Gautier v. Ditmar (204 N. Y. 20, 28) the court said: “While it would be incompetent for the Legislature to leave to a State officer or department the power to determine whether a tax should be levied, or at what rate, or upon what property, it may lawfully delegate to a ministerial officer or any department, or its appointee or other authority, the power of using the machinery, as and in the method created by it, for the collection of the taxes it has levied.” We think that section 206, subdivision 18, is not mandatory. While it is true that, where a public body or officer is clothed with power and furnished with means to do an act required for the public interests, the execution of such power will often be required as a duty, although the wording of the statute seems to be permissive, in which cases the word may ” is interpreted as mandatory. But in our view this is not such a case; a private citizen is not a public officer or body; that rule is not applied to private citizens exercising the right of franchise and thereby of determining whether or not a tax should be levied. The public officer or body represents the public and may be compelled to perform his duty in its interest; the citizen voters act for themselves in a matter resting primarily in their discretion. There is still such a word as “ may.” There is such a thing as authorizing an act to be done, without imposing the duty that it should be done. The wording of this subdivision 18 of section 206 is permissive. Without the permission therein given the district meeting could not vote a tax or appropriate district money for this purpose. If there had been the intent to impose the duty upon the district why was it not so expressed? It was so expressed in the sections as to central schools above cited. If it was meant to give the Commissioner of Education power to overrule the vote of the district, why put the district to the useless expense and trouble of calling a meeting and taking a vote? Is the district meeting authorized to do a vain thing? We may be reminded that the transportation of scholars to school has never been considered a part in the administration of our common school system; and that in sections 620 to 636, as amended, providing for compulsory education, the parents are required to see that the children attend the schools and there is no provision for transportation of children of indigent parents. These provisions in this respect are in harmony with the law and custom prior to the enactment of subdivision 18 of section 206. Section 891 of the Education Law (as renum. from § 881 by Laws of 1918, chap. 252), giving the Commissioner of Education power upon appeal from acts of a board of education or a district meeting “ to make all orders, by directing the levying of taxes or otherwise, which may, in his judgment, be proper or necessary to give effect to his decision,” in our view does not confer upon him authority to disregard the vote of a district meeting and require the board of education to furnish transportation to the scholars, thus requiring it to perform a duty the statute does not impose upon it or authorize it to perform. The words and spirit of this statute find sufficient purpose in the fact that the Commissioner is empowered to require a board of education, or a school district meeting, to perform those duties which are imposed upon them respectively by statute, to furnish schools, teachers, equipment and facilities necessary for the ordinary contingent expenses of the schools. (See Education Law, §§ 324, 325.) We may assume that the Legislature knew that in many school districts the requirement that scholars should be transported to the school building would expose the taxpayers to heavy expenses and liabilities (See Williams v. Board of Trustee, 210 App. Div. 161); that it intended, as its language in this subdivision 18 of section 206 of the Education Law given its ordinary meaning plainly states, to empower the inhabitants at a school district meeting in their discretion to impose this new and additional burden upon themselves and that it did not intend to give the Commissioner of Education power to repudiate the wish of those voters and of his own choice impose the burden. The order withholding from this school district the public money we think was unjustified and beyond the power of the Commissioner to make. The order appealed from should be reversed, with ten dollars costs and disbursements, and the motion denied, with costs. All concur, H. T. Kellogg, J., with an opinion, in which McCann, J., concurs, except Hinman, J., dissenting with an opinion. H. T. Kellogg, J. (concurring): The principle that the taxing power may not be delegated by the Legislature to any officer, board or person whatsoever knows but one exception. That exception is that municipal officers may be granted the power to impose taxes upon property within a municipality for municipal purposes. Otherwise the principle is universal in scope and application. (Schuster v. Metropolitan Board of Health, 49 Barb. 450; Matter of Brooklyn Children’s Aid Society, 166 App. Div. 852; Gautier v. Ditmar, 204 N. Y. 20; Township of Bernards v. Allen, 61 N. J. L. 228; Van Cleve v. Passaic Valley Sewerage Comrs., 71 id. 574; State v. Mayor, 103 Iowa, 76; Vallelly v. Board of Park Comrs., 16 N. D. 25; Cooley Const. Lim. [6th ed.] 137; 37 Cyc. 725; Dillon Mun. Corp. [4th ed.] § 741; Gray Limitations of Taxing Power, chap. VI; 26 Harvard L. R. 257.) A board of health, holding office by the appointment of the Governor of the State, not being elected by the people of a municipality, nor appointed by. any persons so elected, is not a board to which the power of local legislation may be committed. (Schuster v. Metropolitan Board of Health, supra.) The power to tax property within a municipality for school, health or other purposes cannot be delegated to a commission appointed by the Governor to be exercised in instances where the local officers neglect or refuse to act. (Township of Bernards v. Allen, supra.) The power to impose local taxes cannot be delegated to a board of park commissioners the members of which are not elected by the people. (Vallelly v. Board of Park Comrs., supra.) It may not be delegated to a board of library trustees not elected by the people. (State v. Mayor, supra.)The question of taxation and what property is liable therefor, and of exemption both from taxation and also from local assessments, is peculiarly legislative in character and may not be delegated to administrative officers.” (Matter of Brooklyn Children’s Aid Society, supra.) “ It is a legislative function and is vested in the absolute legitimate discretion of the Legislature. It cannot be delegated, except as the Legislature may confer upon the municipalities or political divisions, which are through the local authorities representatives of the people and participants in the government of the State, powers of providing revenue for local governmental and public purposes.” (Gautier v. Ditmar, supra.) The Commissioner of Education, in the case at bar, is not within the recognized exception. He is not a municipal officer. He was not elected by the voters of a municipality. He was not appointed by elected municipal officers. Indeed he was not elected by the people of the State or by the elected representatives of the people. If he may impose local taxation, an exception heretofore unknown in the law will have been made and a striking example of taxation without representation will be permitted to take place. There can be no doubt that the Commissioner’s order, which of necessity will result in the laying of taxes and in terms provides therefor, is a taxing order. In my judgment the Legislature was without authority to confer upon the Commissioner the power to make the order in question even if the order is within the terms of the statute. I, therefore, concur. McCann, J., concurs. Hinman, J. (dissenting): An order of certiorari was obtained ex parte from a justice of the Supreme Court for the purpose of having this court review a determination of the Commissioner of Education of the State of New York. A motion was made to vacate this order of certiorari and the justice holding the Special Term at which this motion to vacate was made returnable has held that the said Commissioner had jurisdiction to make the determination in question and that his decision was final and conclusive and not subject to review in the courts. The order of certiorari was accordingly vacated, giving rise to this appeal. We are not left in doubt as to what the record before us would have been if the order of certiorari had not been vacated and if the Commissioner had made a return to this court of all of the proceedings and papers before him concerning the matter of his determination. No hearing was conducted or sought and no oral testimony was taken. The evidence before him was entirely documentary and is contained in the record upon this appeal. From the evidence before him the following appeared: District No. 2 of the town of Brookhaven, Suffolk county, is one of the many school districts subject to the jurisdiction of the Commissioner of Education and of the Regents under the Education Law. From the records of the Education Department it appears that said district is a union free school district and has a board of education. This district was formed from the consolidation of several districts. One school took the place of several. Eleven teachers were employed. In the year in question there were 256 pupils in the school. The assessed valuation of the district was over $1,600,000 and the tax rate in said district was approximately $10 per $1,000. On November 2, 1923, a taxpayer of the district having a child of school age and living three miles from the schoolhouse over a road very little traveled, especially in winter, filed a petition with the Commissioner of Education petitioning “ for relief arising out of the following statements of facts.” The petitioner stated that at the time the old school districts were consolidated the residents of the old district in which she had lived were promised that they would either have transportation provided for the children, or a branch school would be kept in that part of the new district. She stated that the promise to provide the transportation, or to keep a branch school had never been kept. She stated the facts showing the necessity of transportation for her own daughter, eight years of age, and her inability to otherwise send her daughter to school. She stated in her petition: “ That on several occasions deponent has brought the question of transportation before the Board of Education, and they have always turned the application down. Once the question came up before a district meeting and was turned down. On August 14, 1923, the petition, of which the annexed is a copy, was handed to the president of the Board of Education by the attorney of deponent with a request for the Board to take some action thereon. That deponent is informed that at the regular meeting of the Board of Education the matter was laid on the table indefinitely, the Board refusing to take any action thereon.” Her petition set forth the necessities of the children of others living in her vicinity and also the character of the road over which these children would have to travel. She appealed to the Commissioner for relief and for an order requiring the board of education to furnish a conveyance for the children residing in her vicinity. Thereafter the board of education filed an answer to this petition. From an examination of said answer it appears that none of the allegations of the petition were denied but the board set up certain facts which it claimed justified the failure to provide transportation. Various affidavits in support of the petition were thereafter filed as a reply to the answer of the board of education. Neither the board nor any one else made application for a hearing upon the issues involved or for an oral argument and no issues were raised except the issue of the merits as raised by the answer of the board. The Commissioner of Education considered the papers on appeal and pursuant to. authority conferred upon him by statute, he designated one of his assistants to investigate the matter, who thereafter made such investigation and reported in writing the facts found by him upon the merits of this controversy. In his affidavit before us on this appeal, the Commissioner of Education states the case before him as follows: That deponent as Commissioner of Education after a careful consideration of all the facts presented in this case came to the conclusion that the petitioner’s child and other children of compulsory school age in the neighborhood, known as South Setauket, were being unlawfully deprived of school privileges in that they could not attend school because their parents were unable to provide transportation, and because the district through its electors assembled at district meeting had failed to do so and because the Board of Education had failed to give any proper attention to the appellants’ repeated requests that something be done; that the situation was further aggravated because of the fact that the former South Setauket district in which the appellant lives had been consolidated with District No. 2, as appears from the undisputed allegations of the petition, and the children required to attend the central school without any provision being made for transportation; that in such circumstances the power conferred by statute upon the voters of the district to provide transportation became their duty and since the matter had come before the district meeting and been ‘ turned down,’ as alleged in the petition and not denied in the answer, and since the electors had failed to perform their plain duty and since the Board of Education, as the official representatives of the district, had repeatedly ignored the appellant’s request to take some action in regard thereto, it became deponent’s duty, as Commissioner of Education, to overrule and correct the district’s refusal to provide transportation and to require the district to perform its duty and to compel the district, acting through its Board of Education, to provide adequate transportation.” On March 21, 1924, the Commissioner rendered his opinion and decision in writing in which he set forth all the facts and proceedings and his“ views upon the duty of the district under the law. He sustained the appeal and ordered the board of education “ to provide conveyance * * * and to pay the cost of such conveyance from any moneys that are on hand belonging to the district that are available for such purpose.” He also ordered: In the event there are no moneys available the Board of Education is hereby authorized and directed to raise by tax upon the taxable property of the district a sum sufficient to pay such cost of conveyance.” The Commissioner has not given an arbitrary construction or application of the statutory duty imposed upon the district in this instance. He has fully explained the grounds of his decision. In his opinion the Commissioner stated as follows: The law does not impose upon a district the arbitrary duty of providing transporation for children living in remote parts of the district. Qualified electors of a district may, by a majority of the votes of those present, provide by tax or otherwise for the conveyance of children of school age whenever there are any such children in the district who reside so remote from the schoolhouse that they are practically deprived of school advantages during any portion of the school year (See Education Law, § 206, subd. 18), but where it appears that districts have been dissolved and consolidated and children are required to walk an excessive distance in order to attend school it has been held repeatedly that there was an obligation on the part of the consolidated district to see that conveyance was furnished. This is particularly true where, as in the present case, it affirmatively appears that the parents have no adequate means of transporting the children. Where the children are so placed that they cannot walk to and from school during any portion of the school year and their parents are unable to provide conveyance it has been held repeatedly that it is the duty of the district in which such children reside to take action under the authority conferred by the above-cited section of the Education Law and make necessary provision for conveyance. In my opinion this. district has failed to fulfill its duty in this respect as to these children residing in the above-mentioned portion of the district. This is not a case where the taxable resources of the district are insufficient to justify an order requiring transportation. The district has an assessed valuation of over $1,600,000. While a school is being maintained with eleven teachers, the tax burden is not heavy and the evidence establishes the fact that the children living in this neighborhood are being denied educational advantages at present because they have no means of attending the school in their district and for that reason most of them have not attended school at all during the present school year. This condition cannot be permitted to continue. The consolidated district is financially able to provide transportation and the Board of Education must take immediate steps to do so.” (See Matter of [Hawkins] Appeal Relative to Transportation of Children [Town of Brookhaven] 31 State Dept. Rep. 85.) The decision of the Commissioner was thereafter duly filed in the district and a copy thereof was served upon the board of education. Instead of complying with the decision and order of the Commissioner, the board of education called a district meeting and submitted to that meeting the question whether transportation should be provided. The voters present at that meeting voted against providing such transportation. When this action was called to the attention of the Commissioner, an order was made by the acting Commissioner of Education withholding from the district the balance of the public moneys due to it on account of the failure of the district to comply with the decision and order of the Commissioner as authorized by the statute. Thereafter this certiorari proceeding to review the determination of the Commissioner was commenced. It is urged that the Commissioner had no authority to issue his order (1) because the order was predicated upon an appeal from the action of the board of education and not from any action of a district meeting; (2) because section 206, subdivision 18, of the Education Law is not mandatory but provides that the inhabitants of the district at a district meeting may authorize transportation and the levying of a tax therefor; that the power of the board of education to provide transportation is dependent upon previous action of the district meeting authorizing the same; and that this board of education was not so authorized and has been ordered by the Commissioner to do something which the statute did not authorize the board to do or the Commissioner to direct it to do; and (3) that the Legislature had no power to confer upon the Commissioner of Education authority to direct the levying of a tax upon the inhabitants of the district to enforce his decision under section 891 of the Education Law, even assuming that the appeal before him included an appeal in consequence of the action of the district meeting as well as that of the board of education. It is provided by section 890 of the Education Law (as renum. from § 880 by Laws of 1918, chap. 252) that “ any person conceiving himself aggrieved may appeal or petition to the Commissioner of Education who is hereby authorized and required to examine and decide the same; and the Commissioner of Education may also institute such proceedings as are authorized under this act and his decision in such appeals, petitions or proceedings shall be final and conclusive, and not subject to question or review in any place or court whatever. Such appeal or petition may be made in consequence of any action: 1. By any school district meeting; * * * 7. By any other official act or decision of any officer, school authorities, or meetings concerning any othér matter under this chapter, or any other act pertaining to common schools.” It is also expressly provided by section 891 of the Education Law (as renum. from § 881 by Laws of 1918, chap. 252) that “The Commissioner, in reference to such appeals, petitions or proceedings, shall have power: 1. To regulate the practice therein. * * * 4. To make all orders, by directing the levying of taxes or otherwise, which may, in his judgment, be proper or necessary to give effect to his decision.” These grants of power must be considered in conjunction with the Constitution (Art. 9, §§ 1, 2) and the other provisions of the Education Law. In this connection the Court of Appeals has said: “ By the Education Law the Education Department is charged with the general management and supervision of all public schools and all of the educational work of the State (Education Law, sec. 20), and the Commissioner of Education is the chief executive officer of the State system of education (Education Law, secs. 20, 94) and he is by the Legislature recognized as having judicial functions. (Education Law, secs. 46, 94, 398, 890, 891, 892.) The authority of the Commissioner of Education to hear appeals as by the statute provided and the binding effect of his decision and that of his predecessors in authority have been a part of our statute law since 1822. (Laws of 1822, chapter 216.) * * * The purpose of the statute and of the amendment is to make all matters pertaining to the general school system of the State within the authority and control of the Department of Education and to remove the same so far as practicable and possible from controversies in the courts. It has been frequently held that there is conferred upon the executive head of the Education Department power to review on the petition of a person aggrieved any decision mentioned in the School or Educ-cation Law. * * * The State Constitution was revised and established in 1894 and it provides: ' The Legislature shall provide for the maintenance and support of a system of free common schools, wherein all the children of this State may be educated.’ It also provides: The corporation created in the year 1784, under the name of the Regents of the University of the State of New York, is hereby continued under the name of The University of the State of New York. It shall be governed and its corporate powers, which may be increased, modified or diminished by the Legislature, shall be exercised by not less than nine Regents.’ (Constitution State of New York, article 9, secs. 1, 2.) It was ratified by the people with knowledge and appreciation of the history of the free common schools of the State and of The University of the State of New York.” (Bullock v. Cooley, 225 N. Y. 566, 576.) Thus the broad purpose of the Education Law to make all matters pertaining to the general school system of the State within the authority and control of the Commissioner of Education as the executive head of the department has been held to be constitutional and valid. The Commissioner has the power to review on the petition of a person aggrieved, any decision mentioned in the Education Law. Section 890 of the Education Law “ gives the Commissioner power of deciding controversies arising from the action or failure of action of bodies or individuals generally or, for the time being, made agencies of the Education Department and which are subject to the undisputed authority of the Education Law and bound to obey its commands. * * * As illustrative of other subdivisions we find specified as those whose actions may be reviewed, school district meetings,” etc. (People ex rel. Hylan v. Finegan, 227 N. Y. 219, 224.) Thus a school district meeting stands in the position of an agency of the Education Department and is subject to the undisputed authority of the Commissioner to decide controversies arising from its action or failure of action. The same is true of the board of education of this school district. The question of transportation of school children is a matter of school administration and policy under the Education Law. It is an incident and in some cases a necessary incident to the enforcement of the compulsory attendanee law. (Education Law, art. 23, as amd.) Unless the Commissioner exceeded any statutory authority in dealing with this controversy over transportation in this district, his ruling is final and conclusive under the law. It is claimed that his order was predicated upon an appeal from the action of the board of education and not from the action of the district meeting. The statute, however (Education Law, § 891), gives to the Commissioner the power to regulate the procedure and practice in all of the applications made to him for a review of any such decision. The statute does not prescribe any limitations as to practice. It is sufficient if the moving papers show facts sufficient to support his jurisdiction. He had the right to treat the petition and proceeding before him in this case as an appeal from the failure of the district meeting to act as well as the failure of the board to take such action as the situation required. The petition before him showed the necessary fact as to refusal of the district meeting to provide transportation. He could make the procedure before him as informal as he desired. He treated the appeal as one in consequence of the action of the district meeting and he granted to the petitioner the ultimate relief to which she conceived herself entitled and for which she asked. To say that his order was predicated upon an appeal only from the action of the board of education, is to find contrary to the fact expressly stated by the Commissioner. He expressly found that the district had passed upon the question with disapproval. He substituted his judgment for that of the district, as he had a right to do, and ordered the board of education to act accordingly. The next question which arises is whether the Commissioner was guilty of a usurpation of power in substituting his judgment for that of the district meeting where the language of the Education Law (§ 206, subd. 18) is not mandatory in form but merely confers power upon the district meeting, through the vote of the inhabitants thereat, to provide for transportation by tax or otherwise.” It is provided by section 206, subdivision 18, of the Education Law that whenever in any school district children of school age shall reside so remote from the school-house therein that they are practically deprived of school advantages during any portion of the school year, the inhabitants thereof entitled to voté are' authorized to provide, by tax or otherwise, for the conveyance of any or all pupils residing therein * * * to the school maintained in said district, and the trustees thereof may contract for such conveyance when so authorized in accordance with such rules and regulations as they may establish, ’ ’ etc. It is claimed by the petitioners that this language is permissive only, leaving the matter to the judgment of the inhabitants of the district “ to provide, by tax or otherwise, for the conveyance ” and limiting the trustees’ right to “ contract for such conveyance when so authorized.” It is a long-established principle that where a public body is clothed with power and furnished with means to do an act required for the public interests, the execution of such power will be insisted upon as a duty, although the statute conferring it is only permissive. In such cases the word may ” is interpreted as mandatory. (People ex rel. Cayuga Nation v. Land Commissioners, 207 N. Y. 42, 50; Phelps v. Hawley, 52 id. 23; Hagadorn v. Raux, 72 id. 583; Hutson v. City of New York, 9 id. 163.) Under the broad and final power of the Commissioner to review any decision of the district meeting as a school agency and to decide the matter for the district, the Commissioner had the power to apply this doctrine in rendering his decision. Did he apply it arbitrarily and capriciously? That is the only question that might survive in a court review. In his opinion the Commissioner does not hold it to be the arbitrary duty of the district under this statute to provide transportation for children living in remote parts of any district, but he holds that under the facts and circumstances of this case, where districts have been dissolved and consolidated and children are required to walk an excessive distance under serious obstacles which prevent them from walking to and from school during any portion of the school year and their parents are unable to provide conveyance, thus unlawfully depriving these children of school privileges and in a district which has taxable resources amply justifying provision for transportation, the power conferred by the statute upon the voters of the district to provide such transportation becomes their plain duty under the Education Law. Since the electors had failed to perform their plain duty when the matter was brought before the district meeting and since the board of education, as the official representatives of the district, had repeatedly ignored the petitioner’s request to take some action in regard thereto, the Commissioner held it to be his duty to overrule and correct the district’s refusal to provide, by tax or otherwise, for the conveyance and to compel the district, acting through its board of education, to provide adequate transportation. The express grant of power to the inhabitants of the district to provide, by tax or otherwise, for such conveyance must be considered with the other provisions of the Education Law which make all matters pertaining to the general school system of the State, including decisions of school district meetings, within the authority and control of the Commissioner of Education as the executive head of the department. It seems clear that the Commissioner had the right to overrule and correct the refusal of the district meeting to provide this transportation and to substitute his judgment for that of the district meeting and thus to lay the foundation for his order directing the district through its board of education to provide such transportation. But it is claimed that his order involves the levying of a tax upon the inhabitants of this district and that the Legislature was without power to confer authority upon the Commissioner of Education to levy such a tax; that the power to tax cannot be delegated by the Legislature and that this rule is subject solely to the exception that the Legislature may delegate to municipal officers the power to tax, for municipal purposes, property within the municipality. This argument calls in question the right of the Commissioner to provide, by tax or otherwise, for the conveyance ” under section 206, subdivision 18, of the Education Law, when he substitutes his action for that of the district in overruling or correcting its action and also that provision of section 891 of the Education Law which gives to him the power to make all orders, by directing the levying of taxes or otherwise, which may, in his judgment, be proper or necessary to give effect to his decision.” The theory, that this clear statutory authority authorizing the Commissioner to direct the levying of a tax upon the district is unconstitutional and void, is clearly unsound. The Commissioner does not levy the tax. He merely substitutes his decision for that of the district meeting. The school district is a unit of a unique State system which has been under the control of the Commissioner of Education and his predecessors in authority and the Regents since 1822. And since the passage of the Consolidated School Law of 1864 (Laws of 1864, chap. 555, tit. 12, § 2, subd.. 4) the Commissioner of Education and. his predecessors in authority have had the power given by section 891, subdivision 4, of the Education Law, to direct the levy of taxes when necessary or proper to give effect to their decisions. (See, also, Consol. School Law of 1894 [Laws of 1894, chap 556], tit. 14, § 2, subd. 4; Education Law of 1909, § 361, subd. 4.) This statutory power has been repeatedly exercised during so many years without having been disturbed on the ground of unconstitutionality that it ought not now to be questioned upon any such theory of interference with our principles of local self-government and as constituting “ taxation without representation.” With knowledge and appreciation of the history of the management of the common schools of the State as a State system under the control of the State Department of Public Instrudtion and the Regents, there were inserted in the Constitution of 1894 provisions {supra) giving to the Legislature special powers and duties with reference to the maintenance and support of a “ system ” of free common schools in the State. Clearly the system” intended could have been that which the Legislature had adopted and approved for thirty years prior to the granting of the special constitutional power to the Legislature. For these reasons I dissent from the views and determination of the majority of the court and vote for an affirmance of the order. Order reversed on the law, with ten dollars costs and disbursements, and motion denied, with ten dollars costs. See Laws of 1822, chap. 256, § 7; 1 R. S. 487, §§ 110, 111; Laws of 1830, chap. 320, § 7, repealing said §§ 110, 111, and adding new § 110; Consol. School Law of 1864 (Laws of 1864, chap. 555), tit. 12, § 1 et seq.; Consol. School Law of 1894 (Laws of 1894, chap. 556), tit. 14, § 1 et seq.; Education Law of 1909, § 360 et seq.; Education Law of 1910, § 880, et seq., as renum, § 890 et seq. by Laws of 1918, chap. 252. [Rep.
CASELAW
Shawn Spikes Shawn Spikes Jr. (March 15, 1996-June 11, 2019) was a professional American thoroughbred jockey. At Golden Gate Fields, Spikes had a total of 141 starts and 3 career wins. Spikes also won a number of horse races in the California State Fair county horse racing circuit. Career Three years after graduating high school, on March 13, 2016, Sean Spikes won his first thoroughbred race, riding the horse 'Game Seeker' in Race 1 at Golden Gate Fields. Education Sean Spikes attended Gateway High School in San Francisco, California, and graduated in 2013. Disappearance and death On Tuesday, June 11, 2019, Spikes was boating with friends at Lake Del Valle in unincorporated Alameda County, south of Livermore. Authorities later said it was not clear if Spikes fell, or jumped into the water. It was also not immediately clear if Spikes knew how to swim, or wore a life jacket. East Bay Regional Park District police and firefighters responded to the scene and were joined by the Alameda County Fire Department and Sheriff’s Department divers to conduct a search, authorities said. Searchers used a helicopter and boats before calling off the search just after midnight. The search resumed later Wednesday morning, and Spikes’ body was found before noon in more than 40 feet of water, authorities said. Authorities said his relatives were at the lake when he was found. Legacy Commemorating Spikes on September 22, 2021 - friend, a former Gateway High School classmate, and recording artist, Marcus Orelias dedicated his third self-titled album to Spikes in an Instagram post stating in the later of the message; "R.I.P. to my brother, Shawn Spikes. This next one [album] is for you."
WIKI
Is Exact Sciences or Editas Medicine the Better Growth Stock to Own in 2023? After a tumultuous 2022, growth stocks have started to regain their footing in 2023. Small- and mid-cap growth stocks, in particular, have seemingly benefited from a fair amount of bargain hunting during the opening weeks of the new year. Nowhere is this pattern more evident than the beaten-down biopharmaceutical space. Clinical-stage and early commercial-stage biopharma stocks were routed last year over concerns about rising interest rates. The bellwether SPDR S&P Biotech ETF, for instance, lost a staggering 25.8% of its value in 2022. However, this closely watched biotech fund has inched higher by nearly 4% over the first six weeks of 2023. Image source: Getty Images. On a more nuanced scale, this bargain hunting becomes even more apparent. For example, Editas Medicine (NASDAQ: EDIT) and Exact Sciences (NASDAQ: EXAS) fell by 66.5% and 36.4% respectively over the course of 2022. Since the change in the calendar year, Editas stock has risen by a healthy 16.8% and Exact's shares have stormed higher by a noteworthy 33.6%. Which of these rebounding biopharma stocks is the better buy-and-hold in 2023? Let's dig deeper to find out. The case for Editas Medicine Editas is a clinical-stage gene-editing company. Its editing platform is based on CRISPR technology. The biotech's shares crumbled last year due to clinical setbacks and the steady progress of a key competitor. On the competitive front, CRISPR Therapeutics and Vertex Pharmaceuticals submitted their CRISPR-based sickle cell and beta thalassemia candidate, exa-cel, for regulatory approval in multiple territories in November 2022. Editas' lead candidate, known as EDIT-301, appears to be several years away from a potential regulatory filing. Earlier this year, Editas announced a reorganization plan centering around accelerating the development of EDIT-301. Some analysts think this strategy could yield worthwhile financial results in the back half of the decade. As such, there is a real possibility that Editas' stock might be significantly undervalued right now. That being said, the company faces an uphill battle in this highly competitive rare disease indication. The case for Exact Sciences Exact Sciences is a leading cancer and infectious disease diagnostics company. The company's top line has risen at a blistering compound annual growth rate of 46% over the past five years. Most of this sales growth stems from the novel colon cancer screening test known as Cologuard. In 2022, Cologuard generated an outsize portion of the company's $2 billion-plus in annual sales. Despite this impressive sales growth, however, Exact remains unprofitable. Exact's long-term outlook is overall bullish. While competition from top companies like Illumina may hurt its chances at establishing a formidable moat in the liquid biopsy arena, Exact only needs to capture approximately 10% of this $30 billion market to more than double its current revenue. That's a very achievable goal given that this market isn't overly competitive. All that being said, Exact's shares are bumping up against Wall Street's fair value estimate at the moment. So, for its stock to churn even higher as the year progresses, the company may have to exceed analysts' quarterly revenue expectations in the months ahead. The verdict? Exact is the hands-down winner in this head-to-head comparison. The cancer diagnostic pioneer has a proven business model and a fairly encouraging long-term outlook. That's not to say Editas stock can't also continue to rebound in 2023. But the biotech faces a far tougher path from a value creation standpoint than Exact at this point in their respective lifecycles. 10 stocks we like better than Editas Medicine When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and Editas Medicine wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of February 8, 2023 George Budwell has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends CRISPR Therapeutics, Editas Medicine, Spdr Series Trust-Spdr S&p Biotech ETF, and Vertex Pharmaceuticals. The Motley Fool recommends Exact Sciences and Illumina. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Page:StVincentsManual.djvu/693 E commend to thee, O Lord, the soul of this thy servant, and beseech thee, O Jesus Christ, Redeemer of the world! that, as in thy mercy to him [her], thou becamest man, so now thou wouldst vouchsafe to admit him [her] into the number of the blessed. Remember, O Lord! that he [she] is thy creature, not made by strange gods, but by thee, the only true and living God; for there is no other God but thee, and none can work thy wonders. Let his [her] soul find comfort in thy sight, and remember not his [her] former sins, nor any of those excesses which he [she] has fallen into, through the violence of passion and corruption. For although he [she] has sinned, yet he [she] has still retained a true faith in thee, Father, Son, and Holy Ghost; he [she] has had a zeal for thy honor, and faithfully adored thee, his [her] God, and the Creator of all things. EMEMBER not, O Lord! the sins and ignorances of his [her] youth; but according to thy great mercy, be mindful of him [her] in thy eternal glory. Let the heavens be opened to him [her], and let the Angels rejoice with him [her]. May St. Michael, the Archangel, the chief of the heavenly host, conduct him [her]; may blessed Peter, the Apostle, to whom were given the keys of the kingdom of heaven, receive him [her]; may holy Paul, the Apostle, and chosen vessel of election, assist him [her]; may St. John, the beloved disciple, to whom the secrets of heaven were revealed, intercede for him [her]; may all the holy Apostles, to whom was given the power of binding and loosing, pray for him [her], may all the chosen servants and blessed martyrs of God, who, in this world, have suffered torments for the sake of Christ, intercede for him [her]; that being delivered from this body of corruption, he [she] may be admitted into the kingdom of heaven; Through
WIKI
clopidogrel bisulfate Also found in: Thesaurus, Medical, Wikipedia. ThesaurusAntonymsRelated WordsSynonymsLegend: Noun1.clopidogrel bisulfate - a blood thinner (trade name Plavix) approved for the treatment of mild heart attacks; works by preventing blood platelets from sticking together to form clots that would restrict blood flow medicament, medication, medicinal drug, medicine - (medicine) something that treats or prevents or alleviates the symptoms of disease Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc. References in periodicals archive ? Moreover the patient also orally took 75 mg of clopidogrel bisulfate tablets and 100 mg of aspirin enteric-coated tablets daily. Healthcare company Sanofi (Euronext:SAN) (NYSE: SNY) and biopharmaceutical company Bristol-Myers Squibb Company (NYSE: BMY) announced yesterday that Apotex has made a payment of USD442,209,362 to Sanofi and Bristol-Myers Squibb to satisfy the damages ruling of the Plavix (clopidogrel bisulfate) patent infringement case against Apotex. The FDA advises patients taking PPIs to warn their physician or pharmacist if they are also taking diazepam, warfarin, antifungals, digoxin, tacrolimus, clopidogrel bisulfate (Plavix), or atazanavir. In TRITON-TIMI 38 (TRial to Assess Improvement in Therapeutic Outcomes by Optimizing Platelet InhibitioN with Prasugrel-Thrombolysis In Myocardial Infarction), Effient has been shown to reduce the rate of a composite endpoint of CV death, nonfatal myocardial infarction (MI), or nonfatal stroke compared to Plavix[R] (clopidogrel bisulfate). Plavix, whose chemical name is clopidogrel bisulfate, is the biggest seller for Bristol-Myers and second-biggest for Paris-based Sanofi, behind the Lovenox clot treatment.
ESSENTIALAI-STEM
Page:The Yankee and the Teuton in Wisconsin.djvu/91 persons contained most of the individuals whose views swayed public opinion among the 6000 Milwaukee Germans. Among them were two newspaper editors, each in charge of a German language paper. There were six lawyers, nine teachers, and eleven clergymen and preachers. Four of the preachers are described as German Lutheran, one was Evangelical, and one Methodist. Two, Joseph Salzman and Franz Fusseden, were Catholic priests. One, F. W. Helfer, was called a "rationalist preacher." Two, John Mühlhauser and G. Klügel, were merely called preachers. It is not strange that medicine, among all the professions, should have had the strongest representation. A physician, wherever trained, is equipped to practice anywhere, while a lawyer, clergyman, editor, or teacher is obliged to prepare for service by first fitting himself into the community he is to serve. German medical education was far superior to American at that time, and, in the western states at least, the supply of trained physicians was below the requirements. There were communities in Wisconsin where not one-fourth of the practitioners were graduates of medical schools or had honestly earned the title of "doctor." This condition made a splendid opportunity for German physicians, who could hope to win the patronage of Americans as well as Germans. That the prospect was alluring to them is shown by the fact that Milwaukee at the census date in 1850 had seventeen German physicians, some of them already men of note in the community. The Yankees and the Germans came into such close and intimate contacts in Milwaukee, that it is easier to study their normal attitudes there than in the outlying portions of the state. On the whole those relations, in the
WIKI
Embedded SIM (e-SIM) is the next step in the evolution of Subscriber Identity Modules (SIM cards). They are designed to deliver unprecedented freedom and flexibility. Unlike the physical SIM, you do not need to insert an eSIM into your phone as it is already built into your smartphone, device or wearable. You simply activate the eSIM with your account profile and you are ready to enjoy all the services you normally would with a physical SIM.   Benefits of eSIM • e-SIMs allow you have more than one phone number associated to your smart device. They particularly useful for people who want to manage personal and business lines. • The possibility of losing or damaging your SIM is reduced because it is built into your device. • You no longer have to deal with cutting SIM cards or finding adapters. • It is extremely convenient for frequent travelers, making it easier to switch between network operators.   How to activate an eSIM The eSIM trial will run for one year and is open on a first come first served basis to a limited number of subscribers who own compatible devices. You’ll need to visit any of our MTN stores. Our customer care agents will check your device for eligibility and walk you through the setup process. Need help finding a store? Go to our Stores Page to find the store nearest you. Q: How do I download my eSIM profile? A: You can download the eSIM by scanning the QR-Code presented by the customer care agent. Q: Can an eSIM profile be used more than once? A: Yes, it can be used but not while it is downloaded and installed in a device. It can be reused once the profile is dissociated from a device. Q: I bought an eSIM device. How do I get my physical sim pack? A: A slip with a QR code containing the SIM serial and PUK will be given to you. This will serve as the eSIM pack. Q: Do I require data to download my eSIM profile? A: Yes, you will need to be connected to a wireless network to download the eSIM profile. Q: What happens if I misplace my QR code? A: The QR code can always be retrieved at any time from any of our MTN stores. You will have to provide proof of identity and the associated mobile number to retrieve your QR-code. Q: What happens if I misplace my eSIM device? A: Call 180 or walk into any of the MTN stores and request for the MSISDN to be blocked. You can immediately initiate a SIM swap if you have another mobile device and acceptable proof of identity. Q: What happens if I cannot download my eSIM profile? A: To troubleshoot this type of issue. Do the following: • Check if the profile has been installed already. • Check eSIM is active (the eSIM could be the primary or secondary sim) • Check if the eSIM network icon is active • Check if the device is connected to a wireless access point: • Check if the wireless access point icon is active and connected • Check if the wireless access point is strong enough for the download. • Check if the wireless access point icon has a full bar. You can also test if you can stream on the mobile device with the wireless network. Q: What is the cost of activating the eSIM? A: The eSIM activation is Free. Q: Is the eSIM swap process different from regular SIM swap process? A: No, the eSIM swap process is not different except that you will need to download profile when swapping into an eSIM device. Q: Is the eSIM registration process different from regular SIM registration process? A: No, eSIM registration process is not different except that the eSIM is pre-activated by downloading a profile and associating it with a new phone number, a given serial and PUK number. Q: I have a physical SIM, how do I change to an eSIM? A: You will need to perform a SIM swap into the eSIM. Q: I have an eSIM phone. How do I buy and register an eSIM line A: Simply walk into any of the MTN stores and request for eSIM activation. The eSIM activation is free. You will be provided with a QR code to scan and download an eSIM profile and perform the usual SIM registration. Q: My eSIM was barred for SIM re-registration. How do I re-register my line? A: Call 180 or walking to any MTN stores and request for the eSIM to be unbarred. Like the physical SIM, you must have satisfied the condition for the eSIM to be unbarred. Q: Can I port my physical line to an eSIM line? A: Yes, you can. Our customer care agent will have to perform a SIM swap for you. All necessary documents and identification will have to be provided by you. A QR code will be given to you to download the eSIM profile. Q: I bought a new phone, can I swap my line back to regular SIM A: Yes, you can. Our customer care agent will have to perform a SIM swap for you. In this case, a physical SIM to be given to you. Q: How do I know my eSIM profile has been attached to my eSIM phone? A: There will be an indication on the phone that shows that the eSIM is active (the eSIM can be primary or secondary SIM). Also, the network for the eSIM will become active. Q:  What are the steps to attach eSIM profile on iPhone and Google pixel? A: iPhone: • First, you need to get the QR code from our customer care agent • Go to Settings> Cellular Data / Mobile Data (NB: iPhone 11 series above displays Mobile Data Plan. iPhone 10 Series shows Cellular Data) • Tap add a cellular plan/ Mobile Data Plan • Scan QR code which you have received from our customer care agent • Our customer care agent will associate the SIM serial and PUK number on the QR code with the new phone number. Google Pixel 3: • From the settings go to Network & internet and select Mobile Network • Expand Advanced then press Carrier and Add Carrier • Scan your QR code which you have received from our customer care agent • Our customer care agent will associate the SIM serial and PUK number on the QR code with the new phone number. Samsung Device • From the Settings go to Connects • Select SIM Card Manager • Scan your QR code which you have received from our customer care agent • Our customer care agent will associate the SIM serial and PUK number on the QR code with the new phone number. Q:  What are the steps to remove eSIM profile on iPhone and Google pixel? A: iPhone: • Go to settings > Cellular / Mobile Data • Select “Remove Mobile Data Plan” / Remove Cellular Data Plan • ESIM is removed from phone Google Pixel: • Go to settings and select mobile network • Click the toggle button • Phone displays “turning off eSIM” • Click on “Erase SIM” and select “Erase” • Phone displays Erasing SIM • ESIM is removed from phone Samsung Device: • Go to settings and select Connections • Select Remove all Data Plan • ESIM is removed from phone Q: Can I switch my eSIM profile from one phone to the Other? A: Yes, you can switch your eSIM profile from one phone to the other. Steps to switch eSIM Profile from one phone to another phone • Connect Old phone to WiFi • Remove Data Plan from old phone • Turn phone Off • Connect New Phone to WiFi • Scan eSIM profile to new phone Q: Can I perform all regular activities on eSIM (Check balance, buy data, MTN Share, buy Value Added Services etc.) A: Yes, all activities above and many more can be performed on the eSIM when it is active. Q: Can I view and perform all regular activities on eSIM MyMTN App (Check balance, buy data, MTN Share, buy VAS etc.) A: Yes, all activities above and many more can be performed on the eSIM when it is active. Q: Can post-paid lines be migrated to eSIM? A: Yes, a postpaid line can be migrated to the eSIM. This will follow the postpaid activation process. Q: Can post-paid lines perform all regular activities on MyMTN (Check balance, buy data, MTN Share, buy VAS, migrate, etc.) A: Yes, all activities above and many more can be performed on the postpaid eSIM when it is active. Q: Can I perform a SIM upgrade of my line to eSIM? A: Yes, you can perform SIM upgrade of your line to an eSIM. Related Sim Services
ESSENTIALAI-STEM
[R] Alignment of a double plot where one has a switched axis Gavin Rudge G.Rudge at bham.ac.uk Fri Feb 5 17:19:28 CET 2016 Hi Rgonauts, I am plotting 3 variables from one data set on one plot. Two of them as a stacked bar and a ratio on a completely different scale, so I need to put one of the axes on the top of the plot for clarity. Whilst this is not good visualisation practice, there is a valid reason why, in this case, people viewing this plot would be interested in the magnitude of the values in the stacked bars and the distribution of the ratio of them (too complex and dull to go into here). The plot consists of horizontal stacked bars showing two values, with a dot plot showing the ratio of them, all in order of the magnitude of the ratio (this is important). I want them to look something like the code below but with a correct alignment I wanted to avoid something overly complex with grobs as I don't find working with them very intuitive, although this may be the only way. I've codged together this imperfect solution from code I found about the place and was hoping someone could either suggest a much better way or help with the final task of nudging the plots to make them coherent Thanks in advance for any help received. GavinR #here is my code require(ggplot2) require(cowplot) require(reshape2) require(gridExtra) require(grid) #my original data set looks something like this, but with many more values Set.seed=42 df1<-data.frame(idcode=LETTERS[1:10],v1=rnorm(10,mean=30,sd=10),v2=rnorm(10,mean=10,sd=5)) str(df1) df1$rto<-(df1$v1/df1$v2) #melt the frame require(reshape2) df2<-melt(df1,id.vars=c("idcode","rto")) df2 #oder the data by the ratio variable df2$idcode<-reorder(df2$idcode,df2$rto) #make the first plot plot1<-ggplot(df2)+geom_bar(stat="identity",aes(x=idcode,y=value, fill=variable))+theme(legend.position=c(.92,.87))+coord_flip() plot1 #make the second plot plot2<-ggplot(df2)+geom_point(stat="identity",aes(x=idcode,y=rto))+coord_flip()+theme(panel.background = element_rect(fill="transparent"))+coord_flip() plot2 #flip the axis with cowplot plot2<-ggdraw(switch_axis_position(plot2, axis='x')) #plot both on the same page grid.newpage() #create the layout pushViewport(viewport(layout=grid.layout(1,1))) #helper function to get the regions right - no idea what this does but I cribbed it from: #http://www.sthda.com/english/wiki/ggplot2-easy-way-to-mix-multiple-graphs-on-the-same-page-r-software-and-data-visualization#create-a-complex-layout-using-the-function-viewport define_region <- function(row, col){ viewport(layout.pos.row = row, layout.pos.col = col) } #here is the plot print(plot1,vp=define_region(1,1)) print(plot2, vp=define_region(1,1)) #has all the ingredients but how to nudge it? More information about the R-help mailing list
ESSENTIALAI-STEM
St. Patrick's Church (Cumming, Iowa) St. Patrick's Catholic Church is a parish church in the Diocese of Des Moines. The church was built in 1868 and is located southwest of the town of Cumming in rural Madison County, Iowa, United States. It was listed on the National Register of Historic Places in 1978. Pope John Paul II visited the church while he was on his first pastoral visit to the United States in 1979. History The significance of St. Patrick's Church is its association with the area that became known as Irish Settlement. This rural farm community was settled in the early 1850s by Irish immigrants. It was established by the Rev. Timothy Mullen, who had been sent by Bishop Mathias Loras of the Dubuque diocese to Fort Des Moines to serve the small Catholic community there. He was also to establish an Irish colony in central Iowa, similar to several that had already begun in Eastern Iowa. The first 40 acres were purchased by Bishop Loras. Many of the early families who settled here came from Wisconsin. By 1860, Irish Settlement covered four townships in two counties. Forty of the families resided in Madison County and by 1870 they had increased to 63 families. There was a rivalry between those who settled on the north side of the North River and those who settled on the south side as to who would get the church. The parish was founded in 1852 with the church on the north side. It was the first parish founded in what would become the Diocese of Des Moines. A log structure served as the first church, which was begun by Mullen but finished by Rev. John Kreckel. Itinerant priests served the parish in its early years. The Rev. Francis McCormick was appointed the first resident pastor in 1857, but he did not stay long. The Rev. John Brazill of St. Ambrose Church in Des Moines had the present frame church built to replace the original log structure in 1868. A monument in the parish cemetery commemorates the old church on the site where it stood. St. Patrick's became a parish in the Davenport diocese when it was established in 1881. The parish was divided in 1884 at the North River with the parishioners who lived to the south forming a new parish at Churchville. Other divisions happened soon after that when parishes were begun at St. Mary's and in Winterset. The parish was transferred to the Des Moines diocese when it was created in 1911. Pope John Paul II visits The idea for a visit by Pope John Paul II to a rural church was initiated by Archbishop Paul Marcinkus, an American who worked at the Vatican. Des Moines Bishop Maurice Dingman brought him to visit St. Patrick's when they were planning the trip. The parish had been without a pastor so Dingman named a recently ordained priest, Rev. John Richter, to the position. The papal visit took place on October 4, 1979. Pope John Paul led a prayer service for 200 parishioners and gave a reflection based on the Acts of the Apostles "that spoke of the gathering for the breaking of the bread and prayers." He also urged them to maintain unity with the diocese and the wider Church. After his visit to St. Patrick's, the pope celebrated Mass at Living History Farms near Des Moines. Architecture St. Patrick's Church is a frame structure that measures 66 by, and it has a 24 by sacristy attached to the back. It is five bays in length with a round-arch Stained glass window in each bay. A small rose window is located above the altar. A low-pitched gable roof with partially-returned cornices caps the sanctuary. The building has a uniquely tapered bell tower in the front. The bell-chamber has a round-arch louver on each side and it is capped with a hipped roof and a cross. The church is surrounded by 20 acre of property that includes, timber, grassland, cultivated fields, and the parish cemetery where many of the first parishioners were laid to rest.
WIKI
Things You Need to Know About Data Recovery Data recovery has been a common thing for almost 18 year now since the advancement of computing devices. While there is already a plethora of data recovery forensics available in the market, not all provide a very convenient price out of their services. One obvious reason (which many still fail to see) why such tools and programs are quite pricey is because there are a number of people who have the same problems. And as we all know, while the demand is high, the price also tags along with it. Each computer is equipped with sensitive and important data or files which is at risk of being delete. And of course, imagine the number of computers at present.  While the demand is high, the competition is also rough which is why service providers come up with better service packages which usually end up spiking up the price. Possible issues with drives that can cause lost data One possible issue that could lead to lost data is a corrupted service area. The drive OS will always be prone to damages or corruption. If you can’t fix the modules that are causing the issue, you won’t be able to retrieve any data. Corrupted ROM data could likewise cause a permanent loss of data however could also be remedied depending on the model, make or age of the RAM. For less than worse cases, you are able to rewrite ROM data by using a donor drive. Blowing up the fuse or the TVS on your PCB can also threaten data on your drive. This is a common issue caused by inexpensive power supplies which works the other way around a regular fuse. A motor controller that is bad can also be a reason to say goodbye to your files. Parts and components such as motor controllers and boards always have specific requirements and compatibility with other parts. Always make sure you are using the right one for these components. In case you are unsure of what to do with your data recovery venture, it is always best to let the pros handle such issues. It may require shelling off a few dollars but it sure is worth it especially if you’re looking to recover sensitive data and files. Professionals can handle everything from simple RAID recoveries to JTAG forensics.  
ESSENTIALAI-STEM
User:Melora Nishal/sandbox Nightingales Medical Trust is a non-profit organization based in Bangalore, India, dedicated to providing healthcare services, particularly for the elderly population. Founded in 1998.
WIKI
An Internet of Everything?/Surveillance and Sousveillance =Surveillance and Sousveillance= Introduction and Main Concepts This chapter of 'An Internet of Everything?' will look into the main concepts of Surveillance and Sousveillance. This includes in-depth descriptions of the meaning the two platforms. For Surveillance, it reviews the organisations and technologies used to accomplish Surveillance as well as the laws and restrictions. Also, the section discusses the ideology that humanity is against Surveillance and the argument about whether or not video-posting platform YouTube is a form of Surveillance or Sousveillance. The chapter then shifts its focus to Sousveillance. It covers the history of Steve Mann, who is known as the founder of the term while later analysis covers different forms of sourveillance and its progress throughout human history. Citizen Journalism is another concept discussed under the term Sousveillance and will be looked into through the use of case studies that show both the advantages and disadvantages of Sousveillance. When it comes to Surveillance and Sousveillance one seems easier to define than the other. This could simply be because we are more aware of surveillance as it happens every day, we cannot take a single step without some sort of surveillance watching over us. This is referred to as the “big brother effect” which will be talked about further in the chapter. Despite knowing that surveillance is everywhere it's something we are not truly conscious of. We were always told that it is there for our safety and to not worry about it however this subliminal messaging has made us forget how often we are watched. Sousveillance on the other hand is newer, therefore less known. This could be because of the technology needed to aid sousveillance (hand held cameras) did not become readily available to the public until recently, therefore only allowing it to flourish now. While the term is known as an activity of a camera equipment pointed to a form of higher authority sousveillance can occur when a group watches a more powerful one with any form of technology old or new.By taking a closer look at history we will see that the beginnings of first revolutions such as the French relied on means of sousveillance and resulted in overthrowing kings and changing societies. As a theory sousveillance was established and developed by Steve Mann who is discussed in detail further into this chapter. =Surveillance= Definition The following section will discuss some of the known definitions of the word 'Surveillance'. The word Surveillance is of French origin, its etymology deriving from sur which means over or above and Veiller which means to watch therefore the literal meaning is to watch from above. Surveillance can be defined as cameras (or other sensors) affixed to property (real-estate, e.g. land, by way of posts or poles, or buildings). It is the veillance of the authority (i.e. the veillance that has the capacity to prohibit other veillances). Surveillance is, quite simply, observations conducted to gain information. This simple definition includes a plethora of techniques and methods that can be considered a form of surveillance. Many of these are recognizable through common knowledge produced by popular culture. For a full history on the development of surveillance please go to History of surveillance, here it is explained that the concept of surveillance has been present from the beginning of civilisation and only the type of technology and level to which we monitor the population has changed. From the humble spyglass to the modern RFID, surveillance technology has only developed and increased as time has gone on. The most well-known methods include stationary surveillance, technical surveillance (typically covert video or audio recordings), electronic surveillance (digital observations, keystroke dynamics), and many more. Nearly anyone can engage in surveillance once properly trained and educated; individuals using the various techniques of surveillance range from federal officials trying to save lives, to private investigators gathering evidence for civil court. The Oxford Dictionary Online (2016) defines surveillance as 'Close observation, especially of a suspected spy or criminal'. This leads into a discussion later in this book on how the growth of digital media has made the level of surveillance rise to a point where it could be argued the wider public is always under surveillance. Types of Surveillance There are mainly three types of surveillance. Omnipresent electronic monitoring through cameras in public places, as the technologies for power domination, violating the privacy and freedom of the public while protecting social safety. Network database overthrows the boundary between public and individuals, bringing individuals into a digital panopticon. Facebook, Twitter, blog, Instagram etc., enable the individuals to make their privacy widely known forwardly. Firstly, CCTV (Closed-circuit television) is the most popular technology for electronic monitoring. England, as a country first installing CCTV, has around 3 million cameras in public places monitoring individuals' daily lives day and night. Norris and Armstrong described a society filled with CCTV as "the biggest surveillance society". Google Earth, a map search tool promoted by Google, provides real-time pictures and data for all users combining satellite pictures and the technologies of GPS, GIS, video streaming, and 3D. People said that Google Earth establishes an era where everyone can be a spy. Secondly, the development of network database monitors the activities of individuals in their unknown situations. In 1990, TV star Rebecca Saire was shot by a fanatic fan at the door of her house. Investigation showed that the murderer found her address from her driver license's number registered in government website. With Cookies technology, not only basic personal information, but also the users' likes and dislikes, email address, etc. can be collected. Thirdly, personal information will also be posted online forwardly by the users, which is an ideal channel of surveillance. Facebook, Twitter, blog, Instagram etc., are the most popular social network for ordinary people. They share their daily activities, pictures, reflections on the network. Even though real-name authentication is not a prerequisite for these websites, individual information and activities are also monitored. IP address is the basic method to confirm user's identity. The websites will locate the users' geographical position, including logging in cities or districts with IP address. If the same surveillance system is installed in two different websites, their browsing history can be tracked and analysed together. For instance, the user browses another website while logging in Facebook. When he/she clicks on the “Like” button in another website, Facebook will record the browse history of the website, not to mention recording the users’ friends from Facebook - with these information collected from different social networks, those who are monitoring the users will establish a social link for them in order to distinguish personal information including their friends, locations in different period of time etc. Another type of categorization is based on computing and surveillance Scholars in surveillance studies and information society studies have stressed the importance of computing for conducting surveillance for more than 20 years. This has resulted in a number of categories that describe the interconnection of computing and surveillance: for the new surveillance, dataveillance, the electronic (super)panopticon, electronic surveillance, or digital surveillance. Gary T. Marx defines the new surveillance as “the use of technical means to extract or create personal data. This may be taken from individuals or contexts”. He argues that in the old surveillance, it was more difficult to send data, whereas in the new surveillance this is easier. In traditional surveillance, “what the surveillant knows, the subject probably knows as well”, whereas in the new surveillance the “surveillant knows things the subject doesn’t”. He says that the new surveillance is not on scene, but remote, and that it is “less coercive” and “more democratized” because some forms are more widely available. Computerized surveillance is an important form of new surveillance. “Computers qualitatively alter the nature of surveillance—routinizing, broadening, and deepening it. Organizational memories are extended over time and across space” (. Dataveillance is the “systematic monitoring of people’s actions or communications through the application of information technology” (Clarke 1988, 500). Clarke (1994) distinguishes between personal dataveillance that monitors the actions of one or more persons and mass dataveillance, where a group or large population is monitored in order to detect individuals of interest. Bogard (2006) argues that the computer is a technology that simulates surveillance. Gordon (1987) speaks of the electronic panopticon. Mark Poster (1990) has coined the notion of the electronic superpanopticon: “Today’s ‘circuits of communication’ and the databases they generate constitute a Super- panopticon, a system of surveillance without walls, windows, towers or guards” (Poster 1990, 93). Mark Andrejevic has coined the notion of the digital enclosure in which interactive technologies. The third type of categorization comes from Ogura's (2006) and Gandy's (1993) argument that a common characteristic of surveillance is the management of population based on capitalism and/or the nation state. We can distinguish between economic and political surveillance as two major forms of surveillance. Surveillance by nation states and corporations aims at controlling the behaviour of individuals and groups, i.e., they should be forced to behave or not behave in certain ways because they know that their appearance, movements, location, or ideas are or could be watched by surveillance systems. In the case of political electronic surveillance, individuals are threatened by the potential exercise of organized violence (of the law) if they behave in certain ways that are undesired, but watched by political actors (such as secret services or the police). In the case of economic electronic surveillance, individuals are threatened by the violence of the market that wants to force them to buy or produce certain commodities and help reproduce capitalist relations by gathering and using information on their economic behaviour with the help of electronic systems. In such forms of surveillance violence and heteronomy are the ultimo ratio. The following table discusses the role of surveillance at the various ‘information communication technologies further augment these tendencies by enabling locational surveillance of private behaviors through mobile phones, digital video recording systems and other household devices, and challenging the meaning of private property.’ Surveillance Objectives There are many reasons why surveillance can be beneficial. The objectives of surveillance will vary from case to case, but are most often one or more of following: * Obtain information for a search or warrant. * Locate a subject, contraband, or the site of illegal activities. * Obtain intelligence about a subject, criminal group or location. * Prevent a crime from occurring through covert or overt surveillance. * Gather intelligence for a raid. * Provide protection for informants, undercover individuals or others. Global Surveillance Global surveillance refers to mass surveillance of entire populations across national borers. It's history can be retraced until the 1920s century, when the United Kingdom and the USA concluded an agreement. It was later expanded to New Zealand, Canada and Australia, to create the 'Five Eyes alliance'. They concluded several arrangements with 'third-party' nations. That also created a global surveillance network, called 'ECHELON'. Most of the people did not know it until the Edward Snowden affair came up. Organizations for Surveillance Surveillance system was originally designed for safety reasons and adopted by the authorities. That's why it is defined as "the few watch the many". Thus the organisations used this system were government, police stations, banks, security companies of department stores, business buildings etc., in order to secure the safety of citizens and capital. This surveillance system meets the safety needs of people for preventing and cracking down on criminals. Nevertheless, with the widespread use of surveillance technology, the possibility of personal information being collected, transmitted and used illegally reveals the threat of violating individual privacy and freedom. In this new medium era, not only the above-mentioned organisations, but also ordinary companies, private detectives, or even individual hackers have access to monitor people's basic information and daily activities through cameras and network database. United States National Security Agency In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden began providing the international media with details about the agency's mass surveillance of American citizens and foreign countries. In order to avoid an effort by law enforcement to arrest him, Snowden flew to Russia, where he was granted official permission to reside. Snowden was formally charged with espionage and theft of government property in June 2013. Among the information leaked by Snowden to the media was evidence that the NSA collected internet activity information and phone data from billions of people in countries all over the world. In addition to collecting data on both American and foreign citizens, the NSA has collected information on foreign leaders and their colleagues. Based on the information provided by Snowden, it became clear that employees within the NSA and government officials endorsed the surveillance efforts with the understanding that it would aid in the goal of preventing terrorist attacks and help ensure global economic security. Nevertheless, critics of the NSA programs maintain that the United States government has used the issue of terrorism as a pretext to invade the personal lives of millions of people and put them under surveillance without their knowledge. While U.S. President Barack Obama reacted to the NSA controversy with assurances that the government does not exceed legal boundaries of privacy in its surveillance practices, the issue of government spying is likely to inform the debate about security and privacy well into the future. Youtube: Surveillance or Sousveillance? When looking at the definitions of Surveillance and Sousveillance and thinking of them in relation to activity on Youtube there becomes a very interesting debate in how the lines of the terms can become blurred and can cross over. There are lots of different subsections to look at in terms of this topic. They include, but are not limited to, looking at vloggers and how they mainly fit into the category of sousveillance but can fit into surveillance. Various examples of Youtubers will be given and looked at. The pyramid of intention and power of society in relation to Surveillance and Sousveillance. A mini debate of tampering with footage from anywhere on the pyramid. There will also be an interesting case study of two Youtubers who have had suffered a copyright breach of content and have/still are fighting for their case to own said content. Finally, a link of surveillance and sousveillance to the lectures. YouTube has always been a great source for sousveillance to exist and thrive as its premise is for video content filmed by the public and then sharing the content to the wider world for various purposes. Over recent years YouTube has been developed and its format changed in a way to suit its users, allowing them to produce their own content and promote themselves to the world. The phrases that has been coined for them are Youtubers and vloggers. Vlogging means making a video log or diary of an event, but for Youtubers this means vlogging everything - including their daily life. By doing this they provide a sense of entertainment for the viewers as they feel connected to their lives and feel it to be more real than TV as they are depicting real lives that have not be altered or scripted. Most Youtubers also take on challenges, play video games or speak about pressing issues that come across as a real voice for the people. The format of YouTube allows the Youtubers to promote themselves or their lifestyles. As well as the entertainment and promotional side, there is also a financial side as Youtubers can be paid for their videos if enough people watch them. This means that technically if their videos are viewed enough the Youtuber can make a living that way, which most of the popular ones like PewDiePie does. They do not stop there though as some of them also make and sell their own merchandise - Rose and Rosie, ZackScottgames and some have also made their own books -Ashley Mardell, Tyler Oakley, Zoella. Some even breaking into main stream with a TV show - Epic Meal Time. YouTube is an excellent format for regular people to have their shot at fame, like Good Mythical Morning or PewDiePie, as some have made some real success and are known to many celebrities. Youtubers mostly fit into sousveillance as it fits in accordance to the definition given earlier on and how they are recording real life and the people and themselves are aware of the camera being there to record their lives. This is furthered by Youtubers like Rose and Rosie discussing how they film most of their lives so they have little moments caught on camera to remember. So sousveillance for them can be beneficial. The interest in how Youtubers come in to surveillance however comes particularly from prank videos where the general public are secretly filmed in order to scare them or reveal something about the way society reacts to certain situations. FouseyTube and Sam Pepper are two examples of Youtubers who make prank videos. The issue and blurring of boundaries between Sousveillance and Surveillance comes from the fact that by nature YouTube is sousveillance as the public have the camera and are aware of it. However, when the public or Youtubers turn on the rest of the general public in pranking them and to how they are unaware that they are being filmed, it begins to blur the lines of which category YouTube belongs in. This idea is further made complex when the idea of intent and power is added to the equation. On a pyramid of power it can be argued the Government is on top, then the police and council, professionals/businesses/Youtubers below them and finally the general public at the bottom. This unique power dynamic shapes, in a way, the intentions of surveillance and sousveillance when thought in accordance to this pyramid. The Government will only use CCTV (full definition given below) as a surveillance tool to patrol the streets and keep the general public safe. It can be argued that their intention is not as pure and something along the lines of spying, but assuming that the intention is pure then the reason for their surveillance is in the public's best interest to exist. This is furthered by how people are employed specifically to watch the cameras and report any activity that may be illegal. So the footage is reliable and is not tampered with as it has a sole purpose to protect and comes from a supposedly reliable resource. However, there will be an injection made later that will be drawn to argue how footage can be tampered with from the Government. Next on the pyramid is the police and council and again their intention is pure and professional as it serves a purpose to protect the public. This can be debated with American Police vs British Police where the British police had to show them how to act accordingly with little violence because the American public were feeling threatened by their police force and its excessive use of fire arms. To a point where they feel that the recorded footage/dash cameras do not accurately record the truth which adds a dynamic to the reliable nature of surveillance and to how it can possibly be tampered with if the intention is to favor one person e.g. a cop over the perpetrator/victim. There have been several cases made like this and Huffington Post give various examples to look at and a campaign of black lives matter. But the surveillance by the police is supposed to be intentionally good as it would give the police evidence against the perpetrator in order to convict them in court. Below the police and council are professionals, businesses and Youtubers. The first two utilise cameras for surveillance of their businesses in order to keep them safe from intruders and to protect their assets. So the intention again is good as they only want to use the footage to keep themselves safe and it will mainly be not tampered with, but this is a little more hazy as this is the first section of the pyramid where surveillance may not be either mandatory or required but more for personal safety and piece of mind. Therefore, the intention can be harder to pin point but the footage should remain not tampered with as it would be in their best interest to do so for a court case for instance. The latter of this section however is more interesting in both intention and power. The intentions of Youtubers is mostly transparent but is never crystal clear leaving the intent unclear. Their main intentions would be either entertainment for (the bottom section of the pyramid) the general public, to inform them or to challenge certain concepts of society. This can seen through prank videos how they can either provide entertainment as a laugh for the viewer or to expose a dysfunction of society e.g. how unhelpful it can be to those in need. The power Youtubers have as well is interesting as although they are still real people and feel like that more than other celebrities, because we can access their more private lives, they still have a slight hierarchy over the general public. For instance, they can get away with making a prank video and making the public look idiotic, whereas no one else could. This is where the clash of surveillance and sousveillance comes in. Also linking to before where Youtubers can turn on the rest of the public and secretly film them is a demonstration of power and again adds to how the lines of surveillance and sousveillance can be blurred. Earlier there was an idea of a debate arising from tampered and not tampered footage of Surveillance and Sousveillance which again links to intent. An example of this is the 'Anti-Tesco' incident in Stokes Croft. There, the media covered the riot outside Tesco as the citizens protested against the installation of the super market. It was later revealed on emerging YouTube videos that the riot was created by heavy-handed police officers, which supported the general public's initial claims. On top of the pyramid there is the Government with CCTV footage which should be the most reliable and not tampered footage as its sole purpose for existing is the protect the general public. However, an opposition to this argument could be how the footage in certain cases can be tampered with in the removal of sections or only certain acts shown to a court in order to lead them to a certain conclusion. This of course is hypothetical and for argument's sake, but it adds an interesting dimension to surveillance and how it could potentially be used to convict the wrong person instead of protecting them. This can be linked back to intentions and power as the court will most likely favour the CCTV footage as they believe its intentions to be pure, even if they are not, as the highest power can appear more trustworthy. At the other end of the scale with Youtubers and sousveillance an interesting point also arises as of course the public are more aware of the tampering that can go on with their footage as it is for personal use and the intensions can be mixed. This can be seen with youtubers like Sam Pepper and FouseyTube as it has been argued they turn on the general public to secretly film them for different intensions like exposing parts of society but at the cost of the public. So their intentions can be unclear. However, YouTube and the public can be more reliable with their footage as some events are filmed by the public specifically to try and capture the truth in said events. Examples of this can link back to the black lives matter case where the American public have started to record attacks on civilians, even alongside the higher category of the police, as they believe that footage to be either tampered with or unreliable and theirs more reliable. In most cultures there is a rebellion against authority which would explain why the public could favor amateur footage over the ‘more reliable’ government CCTV. It is interesting to think how the public may actually favor this footage over the suppose ‘reliable’ footage. But this debate over surveillance and sousveillance with intent and reliability between the sections of the pyramid brings in an interesting dynamic to this overall section. Sousveillance can and does have a darker side to it and in relation to the week 7 lecture there arises an interesting case study of two Youtubers, Bria and Chrissy, who are battling copyright issues in relation to revenge porn. When Chrissy was eighteen she was filmed without her knowledge having sex with an ex which was uploaded to certain sites as a form of revenge porn. Copyright issues come into play as although Chrissy did not give consent, nor recall the event taking place as he got her drunk, she still does not own the footage. The footage belongs to her ex-boyfriend as it was filmed on his camera. In regards to general laws of copyright in the UK, although they have been updated now, this cannot help Chrissy as they came in too late for her case. Her only hope is to sue her ex for the rights to the video in order to take it down from all websites. Her battle for the copyrights to the video is still going on to this day. There was a mini documentary made by The Guardian on it as well as Bria and Chrissy's vlogs. There is also a link to their page where it explains their story in full. This case study of the YouTube couple also relates to the section on intent, as Chrissy's ex had sinister intentions as he recorded her without her consent. This meant that the sousveillance was malicious and throws it to possible surveillance as Chrissy was not aware of being filmed. The ordeal for Chrissy also relates to the week 2 lecture of online identity as her reputation and online self has been altered for the worse with this one video. She has recalled that people who looked up to her as a role model, then when they discovered the video, they immediately changed their position. Her online identity which she has spent so long creating to be positive for young people was shattered with one horrendous video. This links to the topic at hand as although YouTube has been argued here as a way for positive sousveillance to exist prominently, it can also become negative with malicious content if the intentions are either bad or unclear. Finally, surveillance and sousveillance of course link back to the lectures and YouTube as well can be linked back. In regards to the week 2 lecture of online identity there was a reading by Zizi A. Papacharissi which introduces blogging (p. 144) and YouTube (p. 150). The book describes YouTube as a place where it “does not tell you what to do” (p. 150) and how it has “diversity of content featured, making mention of the “Many Tribes of Youtube” (p. 150). These ‘tribes’ can relate to potential LGBT Youtubers who may not get recognition anywhere else so YouTube allows them a space to create and sousveillance freely and peacefully. It continues “Youtube also provides an opportunity for expression different from conventional mobilization, expression of opinion, or protest... some simply evoke sarcasm, humor, or satire, which are equally important forms of political thought and expression” (p. 151). This links back to the idea of online identity as YouTube allows people to have their identity online or even their identity represented online by others which can create a strong sense of community as they feel connected to others like them. The idea of what makes YouTube such a good format also explains why sousveillance thrives as people can act and, in a sense, create what they like and this in turn is sousveillance as they record themselves doing the activities and are aware of the camera. Surveillance can also be linked back to the week 4 lecture - always on as it discussed how we are always tethered to some form of technology with the idea of CCTV footage always looking at you and surveilling your actions. Evidence of this can be found under the section of Humanity Vs Surveillance where it is discussed how there are even apps anyone can purchase in order to surveil people with CCTV footage. But this constant surveillance of everyone creates ‘an online self’ which links back to week 2 as even though most people are not aware being recorded, it still is a platform where they are visible and showcases a side of them which could be used as evidence in court (which has been previously mentioned earlier on). Danah Boyd discusses being always on “It’s no longer about on or off really. It’s about living in a world where being networked to people and information wherever and whenever you need it is just assumed.” (p. 71-72) boyd applies this to social media and phone technology but it can be applied to surveillance as the general public are aware of CCTV being around them, but it does not appear to phase them even though it is recording them/creating another part of said person's online profile. In relation to the cognitive surplus week 8 lecture Sousveillance becomes very interesting as the lecture discussed how people have too much time on their hands due to manual labour not being an issue any longer as technology has taken over. The examples given were mainly gamers completing games under difficult circumstances. However, this can be related to sousveillance as it and platforms like YouTube would not exist without this surplus in time to allow them to say vlog their ‘daily life’ and other activities like challenges or videos commenting on society. It is a good example in new medium era, which has the functions of both surveillance and sousveillance. Through all users sharing their videos online freely, important events happening everywhere can be transmitted to the world in seconds, whether the government wants to display them to the world or not. Through this channel, citizens from different countries have the opportunities to supervise the activities of the hierarchy, in other words, the many to watch the few. For instance, in the Boston Marathon bombing in 2013, a large quantity of pictures and videos were uploaded to the social media sites including Vine, Facebook, YouTube etc., which were a great help for police investigation. On the other hand, however, with the chance of sousveillance, the few can also monitor the many through YouTube. There are companies analyzing user data from different social media sites including YouTube, such as SumAll, ThoughtBuzz and GraphDive. The most common purpose for collecting individual information is to support marketing and customer service activities with users' basic information, hobbies, contacts, geographical positions and so on. Laws and Restrictions As stated in the definition surveillance is observations conducted to gain information. Since companies and the government collect several data types, just as communication data and content of those communications, there have to be laws and restriction to control the use of surveillance to prevent the endangering of privacy. The house of lords constitution committee said:' The expansion in the use of surveillance represents one of the most significant changes in the life of the nation since the end of the Second World War. Mass surveillance has the potential to erode privacy.' There is a code of practice, by the Secretary of State which provides guidelines on how to use surveillance camera systems in an appropriate way (Section 33 of the Protection of Freedoms Act 2012). Surveillance Camera Code of Practice The Surveillance Camera Code of Practice provides guidelines to ensure that the surveillance technologies are used in an appropriate way, so that surveillance technologies can function as valuable tools in order to protect the people, but as well properties. The purpose of the code is to ensure that the people feel more safe and have the confidence that cameras are only installed and used in order to protect them. This code sets out guidelines, so that the usage of surveillance technologies is transparent and understandable. But the Code most only applies to surveillance technologies or cameras, that are operating in public places. Examples When talking about surveillance, the American government should be the first to bear the brunt, especially after September 11 attacks. In order to prevent further possible terrorist attacks, the American government issued the Patriot Act and Homeland Security Act which stipulates that personal information of the public on the Internet can be monitored under necessary conditions. However, they are criticized by the United Nations for violating human rights and the rights of privacy. German Media Law is the first law in the world regulating the Internet, which states that personal data and information on the Internet should be protected. Each year since 1997, the US-based Electronic Privacy Information Center and the UK-based Privacy International have undertaken what has now become the most comprehensive survey of global privacy ever published. The Privacy and Human Rights Report (Privacy International 2007a) surveys developments in more than 75 countries, assessing the state of surveillance and privacy protection. ‘Privacy is a fundamental human right. It underpins human dignity and other values such as freedom of association and freedom of speech. It has become one of the most important human rights of the modern age. Hence in Europe information privacy is a basic human right supported by the EU Directive on Data Privacy (95/46/EC). Every member state should have a privacy protection law in place to enforce this directive. For example, in the UK there is the Data Protection Act 1998 (Information Commissioner's Office 1998). UK organisations that collect personal data must register with the government and take precautions against the misuse of data. Laws for telephone companies U.S and European courts have defined privacy rights as citizens entitlement to control information about themselves, and to take steps to protect personal information. For example, telephone companies are required to obtain customer permission to use or disclose personal information collected while providing services (Title 47 of the US Code of Federal Regulations, section 64.2005), illegally intercepted electronic communications may be disclosed (Title 18, Section 2511 of the US Code), and unauthorized access to user files online is prohibited (US Electronic Communications Privacy Act of 1986). These stipulations present a direct recognition of the vulnerability of personal information in post-industrial democracies. Still, from a legal perspective, they do not cover the entirety of personal information that may be gathered by a commercial sector. European Union member countries abide by stricter regulations that protect consumer privacy, specified by the Directive on Data Protection of 1999. This privacy directive safeguards individual control over consumer data and requires that foreign trading partners adhere to the same level of equal protection ). While the transmission of personal information from EU member countries to outside countries without adequate privacy protection is prohibited, the nature of globalized business is such that it is possible for the EU to contractually agree to conduct business with global companies despite differences in privacy approaches (e.g. Lee, 2000). Unless these agreements prioritize personal privacy over legal protection, it is impossible to avoid potential misuses of data. Restrictions There are a couple of restrictions that are imposed by the Data Protection Act 1998 to ensure that several requirements are satisfied in order to survey via CCTV. These restrictions include the following aspects: * 1) Keep the film footage safe * 2) Do not release the material to third parties * 3) Only keep material as long as you need it * 4) Apply identification, that there are surveillance cameras operating. According to these restrictions, therefore video material can only be used as evidence if the CCTV is operating according to legal restrictions. If the CCTV operating system is installed to prevent crime the material can be kept by the operators as long as needed. Draft Investigatory Powers Bill The Draft Investigatory Powers Bill is examined by a joint committee of the Parliament of the UK. It will govern the oversight and the use of powerful bodies and agencies. It is based on three reviews, which suggest reforms, in order to oversee powerful bodies and agencies. Furthermore, they propose the introduction of a safeguard to guarantee the abidance. There are three main important aspects, that the draft Bill will do: * 1) It will unite all powers which are already allocated to law enforcement, the security and the Intelligence agency. It will obtain all the data about communications and make these powers clear and understandable. * 2) It will change the way how things are approved and observed and furthermore it will establish a kind of ‘double-lock’ for interception warrants, which give the permission to conduct surveillance, so that they can only come into force, when being approved by a judge. Therefore, it will establish a new Investigatory Powers Commissioner (IPC) to, who controls if the powers obey the law enforcements. * 3) It ensures that all powers will fit in the digital age and will provide the retention of ICRS which are records of the internet services that have been accessed by a device. 'Investigatory Powers Tribunal' There is a need for someone who controls whether the aspects of the Powers Bill are misused. There is an authority called Investigatory Powers Tribunal, which was established in 2000 and is an independent body from the government, to ensure that the public bodies act in a way that is compatible with the human rights act. People can submit complaints on their website, if they feel like they have been a victim to unlawful action, and the IPT will then check the specific complaint. Data Retention and Investigatory Powers Act 2014 Supported by all three major political parties in the UK, Parliament passed the Data Retention and Investigatory Powers Act in July 2014 to ensure the police and security services retained their existing powers to access telephone and internet records. No additional powers were granted by the legislation, but it did make clear that the requirements also apply to foreign companies, based abroad, whose telephone and internet services are used in the UK. The Data Retention and Investigatory Powers Act provides 'the powers to introduce secondary legislation to replace the Data Retention (EC Directive) Regulations 2009 (S.I. 2009/859) (“the 2009 Regulations”), while providing additional safeguards.' This Act is called into existence to ensure that companies who provide communication services within the United Kingdom are obliged to adjust with requests from the Secretary of state, concerning communication datas and interception warrants. The components of this Act clarify and strengthen the already existent framework. Protection of Freedoms Act 2012 The Protection of Freedoms Act 2012 includes several provisions related to controlling or restricting the collection, storage, retention, and use of information in government databases. * It creates a new framework for police retention of fingerprints and DNA data * This law introduces a code of practice for surveillance camera systems but only provides it for judicial approval of surveillance activities by local authorities * It extends Freedom of Information rights by requiring databases to be available in are-usable format * Provides for a code of practice to cover officials' power of entry, with these powers being subject to review and repeal The UK Data Protection Act (DPA) empowers you as the data subject with the right to know what is stored on you and by whom. The DPA includes the right for transparency. This means that you as a British citizen have the right to know what is stored about you, whether this is by government authorities or other organisations personal information that can be linked directly back to your identity. All you need to do is make a formal request to the data holding authority and as long as the parameters of your request are reasonable they have no choice but to fulfil it. Regulation of Investigatory Powers Act 2000 The Regulation of Investigatory Powers Act 2000 (RIP or RIPA) is a significant piece of legislation that granted and regulated the powers of public bodies to carry out surveillance and investigation. Activities covered by the Act include the interception of the content of telephone, internet, and postal communications; collection of information about, but not the content of, telephone, Internet, and postal communications (type of communication, caller and called telephone numbers, Internet addresses, domain names, postal addresses, date, time, and duration); use of agents, informants, undercover officers; electronic surveillance of private buildings and vehicles; following people; and gaining access to encrypted data. Telecommunications Act 1984 The Telecommunication Act is regulation of the Parliament of the United Kingdom to govern the following provisions: * Privatising British Telecom * To protect consumer's interests and market competition 'Oftel' was established as a telecommunications regulator * To introduce a licensing system to run a telecommunications or to make a connection to another system. Doing that without having a license becomes a criminal The use of the Telecommunications Act 1984 for communications data collection, and the lack of oversight of this capability, was highlighted in the April 2014 report of the Home Affairs Committee of the House of Commons on Counter-terrorism. Humanity Argument "A central political concern in debates about surveillance is whether the obsession with security and spread of new monitoring technologies are ushering in oppressive totalitarian societies akin to George Orwell's dystopic vision in 1984." Surveillance cameras sit on every street corner, in every pub and on every mode of public transport. They are hard-wired into our cities and into the psyche of the public. It is said that in an urban area in the UK you are likely to be captured by about 30 surveillance camera systems as you go about your daily business – not cameras, systems! If you want to know that is probably around 300 cameras! According to estimates from the British Security Industry Association there are anywhere between 4 and 6 million surveillance cameras in the UK. Technology is moving at the speed of light and what was once just a bog standard CCTV camera is now a device capable of facial recognition or predicating behaviour. In the humanity versus surveillance argument who is really winning? This constant supervision has brought on a standard of living that is likened to Big Brother,wherein an ordinary citizen living in the UK is aware that their every move is being tracked, much like the popular reality show. Not only is this in the everyday public sphere, the average person will have their internet activity monitored as well, even if they have no criminal record. Surveillance in itself is an invasion of privacy but the possibilities and cases of positive results are undeniable. Recorded footage can be in court cases such as with street crimes or even within the home, but it also encourages the increasing number of cameras that monitor every city, as an excuse. It also questions the ethical and moral judgement in the installation of cameras on an unaware subject in both the home and out. Although - unlike big brother itself - the footage is not as easily accessible like watching big brother itself there is apps that give you live stream to watch anywhere in the world. Apps such as Surveillance App, Webcams Viewer, live Cams, ispy Cameras can help hack into surveillance and let you watch it. This links back to the idea of “Is surveillance really keeping us safe?” Clearly not if you can download an app that shows live footage from CCTV cameras. You could be spying on anyone including strangers who you would like to attack or steal from. Some apps such as Live Cams (which has 2980 live cameras available to watch) even allow you to view inside of colleges and universities although great for showing you an aspect of University life in real time- it is also very disturbing. Any one can view you doing anything. The worst of them all is being able to view Schools and parks. Although the intention could be just to watch your child to ensure that they are staying safe anyone could be watching. This gives open access to pedophiles and other disgusting fetish people ability to watch anywhere through their phone. There is no sense of security here anymore. If you have pure intentions you may be able to see this as an easy app to keep people safe however not everyone has pure intentions and that's the important factor to remember thinking of these apps going around. It can sometimes be a case of the public being at loggerheads with the idea of being 'spied' on, while simultaneously wanting to feel protected and safe from crime or danger in cities and towns. The general population is also weary about their face being recorded and filed away for future surveillance. It is easy accessible anyone to watch a CCTV camera online- all that needs to be done is a quick search on Google for almost 9.5 million results. This easiness and swiftness should be alarming to anyone who has ever been in a public area. It is not just for Government use, as if it was, it would not be so easily accessible. However, it is undeniable that surveillance, while intrusive and irritating, is a necessity for public safety and for damning evidence in criminal cases because it provides undeniably true footage of the actual event. It should also speed up the response from emergency services such as the police with the intention of stopping disruption or accident before it spirals out of control. Is there really a pressing need for so many cameras? Society has always endured the constant watching eyes of surveillance because it has been drilled into us that it's for our safety. For how long can that argument stay relevant? If they choose to upgrade the systems so that they can do more than just watch, if they start to actually listen to peoples conversations and be able to store face recognition to watch out for you and focus on exactly what you do, is that really to do with our safety? However you notice despite the increase on technology lately there has not been an upgrade to the CCTV systems – at least in a wide aspect. This could be because if they were upgraded people would notice them more. We are so use to passing simple CCTV cameras that we have become so unaware of their existence therefore creating a more natural reading of human behaviour. With between 4-6 million cameras across the UK alone in order to upgrade them all it would cost a bomb – something the government couldn't hide. This creates suspicion of maybe they are not going to upgrade them (not because of cost although that is also a server issue) but so that they can keep the public unaware of how often they are really being watched. This links back to the idea of are we actually being protected by the cameras? With some of them ranging between 15–20 years old and still running on analogue systems how can they protect us? Or an even better question might be with humanity versus surveillance: where is humanities voice? This is not to say that all the CCTV cameras are outdated. In fact, in Scotland the CCTV system in Glasgow is one of the most sophisticated in the UK and can allegedly track individuals’ movements using an algorithm. The system is able to assign a unique signature to each person that walks past a camera, in real time, and then track their movements through the city – but how many people are actually aware of this happening to them? How are the general public meant to just stumble across this information? Is the real motivation for so many cameras to protect humanity or is it just a way to spy on us? The best way to describe the constant surveillance is by “the big brother effect.” Although the footage is not as easily accessible like watching big brother itself there is apps that give you live stream to watch anywhere in the world. Apps such as Surveillance App, Webcams Viewer, live Cams, ispy Cameras can help hack into surveillance and let you watch it. This links back to the idea of “Is surveillance really keeping us safe?” Clearly not if you can download an app that shows live footage from CCTV cameras. You could be spying on anyone including strangers who you would like to attack or steal from. Some apps such as Live Cams (which has 2980 live cameras available to watch) even allow you to view inside of colleges and universities although great for showing you an aspect of University life in real time- it is also very disturbing. Any one can view you doing anything. The worst of them all is being able to view Schools and parks. Although the intention could be just to watch your child to ensure that they are staying safe anyone could be watching. This gives open access to pedophiles and other disgusting fetish people ability to watch anywhere through their phone. There is no sense of security here anymore. If you have pure intentions you may be able to see this as an easy app to keep people safe however not everyone has pure intentions and that's the important factor to remember thinking of these apps going around. Finally– surveillance doesn't prevent crime. There is no robust evidence that cameras prevent crime. You even have a police and crime commissioner in Wales removing funding from CCTV because of this very fact. Take the awful events that took place in Paris in 2015. No amount of Surveillance could have predicted that these events would be going on or even stop them. Despite the huge amount of cameras amiable it is impossible for someone to be there able to watch everyone at once. Humanity does not need so many cameras, there is a fine line between being spied on and safety. Surveillance argument However, despite the attack on surveillance it does have a purpose. Surveillance supports society. The public are behind it, in research done 84% felt that cameras provided a valuable purpose. The 16% minority of those against the surveillance only had issue over the fact that there was a lack of monitoring over such surveillance.It has been used to the publics advantage so well by helping arrest and provide evidence to put criminals away that people feel safer with it than if it was to disappear. So if there is so many people for surveillance why is there even a doubt to this argument? That is because you will never be able to ask everyone their personal opinion. It's impossible to go out there and see what every single person believes however the best chance you get is asking a majority of different types of people. You will always get the people however who claim that "Surveillance it is just the governments way of spying on us!!" However this idea that it is just there to spy on you on your daily life is just delusional. Just as Santa is only real in children's minds - this is just a delusion made up in some of societies minds. A scaremongering tactic that makes you believe that the government has only bad intentions. In fact only 5% of CCTV cameras operated in England and Wales are operated by the police or local authorities. The idea that we are a surveillance state – one nation under CCTV could be argued to be a complete fallacy. A large portion of CCTV cameras come from general public using CCTV for their business to keep it SAFE. So how is there a difference between other peoples surveillance cameras and the police/governments? Surveillance has been used to catch people who have convicted a murder or other serious crimes. It has been used to spot someone 10 minutes from a crime scene. Yes, a camera cannot prevent an act of random violence or crime but they can help identify and catch the perpetrators. Take the incident which lead to the proliferation of CCTV across the UK in the 1990s – the abduction of Jamie Bulger. I’m sure you will recall the grainy images of the toddler being led away from a Merseyside shopping centre by his two 10 year old killers. These images were replayed night after night on TV, becoming iconic. Whilst they did not prevent the horrific crime the images led to the belief that those who carried it out would be caught. For a more recent events in France with the Charlie Hebdo attack the use of CCTV images proved to be crucial in quickly assessing the situation and helping the police respond quicker to the situation. The cooperation between the police and other authorities was able to give key evidence from the CCTV that helped identifying the brothers who'd carried out the attack. The information that was quickly made available to the authorities made it possible for them to direct resources for the manhunt. Without the use of CCTV there would have been a slower response time and with that there would have been less chance to catch who done it. This shows that CCTV cannot be all that bad. For it to be able to help in an emergency situation like that it's clear that it has its pros - not only that but it shows that it is actually doing its job. Surveillance is not only just there for big crimes. Clearly it works for smaller crimes like stealing. If it didn't why would the general public who are business owners spend obey to install such cameras? Finally, the last point will be on privacy. It has been argued that the surveillance cameras are extremely intrusive. I fully understand that if you believe that a camera is tracking you or peering into your garden or your home how unsettling that could feel. Think about however the surveillance cameras or those used by large corporations, most of which these organisations should have completed privacy impact assessments and their systems will have privacy by design built in. What is meant by the privacy design is that if a camera pans over or looks into a residential area the images are pixelated so the operator can't actually see into someone's house, garden or a school. By doing this you are keeping the general public safe by no spying on their private lives. There has also been talk of improving the anonymity of surveillance cameras that are to do with large businesses. What this means is that the things that is being filmed will show avatars rather than people – this completely anonymises the data being captured. Those images can then be unencrypted if there is an incident which therefore means that anyone who is not committing any crimes will kept anonymous and it will only be used if someone breaks the law. The Universal Declaration of Human Rights & Related Issues In 1948, the UN General Assembly issued the first global and comprehensive document in human society - The Universal Declaration of Human Rights. It stipulated that the private lives, families, and communications of all people must not be intervened arbitrarily. In this regulation, all individual information is included in the right of privacy of citizens. The scope of surveillance system was restricted through this kind of laws and regulations. As the development of technology, however, the channel of public communication can display the privacy of every citizen. For example, personal conversation will be monitored by camera and recorders installed in corporations, supermarkets, banks, roads etc. Browsing history and habits will be transmitted to network providers. Smartphones will record people's daily lives publicly or secretly. The rapid development of surveillance systems, where both legal institutions and criminals have the opportunity to monitor others, violates humanity in a broad sense. Conclusion There is a huge debate between the two. It is all up to personal preference wether or not you can fully trust surveillance however there is great arguments for and against is. It is all down to the intentions of the user. You can see surveillance as being a bad thing when it is used for bad intentions however when it focuses on its true intentions of keeping the general public safe that then shows it in a good light and shows that we do need it to help keep everything in order and keep people safe. Surveillance Technologies Surveillance technologies are mainly divided into public cameras or CCTV - which will be discussed in detail further, and invisible camera - Internet. Regardless of whether it is in relation to visible cameras or invisible cameras, technologies are neutral essentially. It is the organizations which adopt these technologies that make them either beneficial or evil, thus restrictions are needed when using them. Computer The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Act Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies. There is far too much data on the Internet for human investigators to manually search through all of it. So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore (FBI), NarusInsight, and ECHELON to intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies. CCTV Perhaps the most widely known and observed technology used for surveillance purposes is CCTV. CCTV stands for Closed Circit TV, and was invented in Germany, 1942. The technology has become globalised in many senses, and has been used widely across many countries, including the U.K. In the case of CCTV, who has the right to install CCTV, and where and when they can install them should all be reported and restricted. As American critic Jennifer Granholm has said, it is unreasonable for citizens to expect not to be monitored by the public and police, while they have the right to require no surveillance towards their personal communications under high power remote monitor. Additionally, with regards to invisible cameras or network database, Mark Poster proposed a new concept of "superpanopticon" explaining how personal lives are constructed in the digital world. Data transmission in network databases is fast and convenient, which is even more accurate and exhaustive than CCTV. In this case, the laws and regulations stated the rights and obligations of network technologies should be proposed and imposed for sure. Surveillance cameras or CCTV (are increasingly being used to monitor public and private spaces throughout the world. Governments and law-enforcement authorities, companies and private individuals use video surveillance for the prevention of crimes, the safety of urban environments and government buildings, traffic control, the monitoring of demonstrators and in the context of criminal investigations. Surveillance technologies have even been described as the ‘fifth utility’ where CCTV is being integrated into the urban environment in much the same way as the electricity supply and the telephone network in the first half of the century. CCTV might be considered the dominant powerhouse of all surveillance technologies due to the pure number of cameras that are in action. For example, in 2007, nearly ten years ago, it was estimated that the U.K had 4.2 million CCTV cameras. CCTV has potenitally changed the act of surveillance entirely. Michel Foucault (1977) explains how in the past, the many watched the few (for example, those with political power) through events like public speeches. However, thanks to surveillance technologies like CCTV, the few can now watch the many! And thus he describes that 'visibility is a trap' However, this is not a one-way relationship, as the 'many' still watch the few' through T.V and online media. However, CCTV is in the remit of the few and means that when in public, there is a high possibility of being recorded, often without that person's knowledge. Britain has by far the most surveillance cameras in the world: about 1 for every 12 people or approximately 5 million in public and private hands. ANPR Automatic number plate recognition cameras (ANPR), or licence plate recognition cameras (LPR) are one of the primary methods of vehicle surveillance. Placed along roads, particularly motorways, they serve to report speeding and other highway safety violations. They can also be used for processes such as automatic toll tax collection. While a form of camera, they differ from CCTV in that their purpose is not to record visual data on what vehicles are doing, but to detect number plates and identify the characters, even from a distance or at speed. The software OCR is used to convert data from multiple captured images into usable code, and cameras must be sensitive to infrared light while restricted in terms of the visible spectrum in order to function both day and night, regardless of headlamp illumination and other obstacles. Telephones The official and unofficial tapping of telephone lines is widespread. Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call. Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone. Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. The Snowden leaks have also revealed that the British Government Communications Headquarters (GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official". There are various different surveillance technologies that are effective and readily available to use in relation with telephones and mobile phones. Some of the most well known are the means of bugging, and tracking telephones and cellular devices. Bugging Also known as a covert listening device, a bug or a wire, the listening devices usually consist of a small radio transmitter and a microphone. Mostly used in police investigations, the devices are still available for use by the public. The Daily Mail published an article warning people in relationships of their partners possibly spying on them with the use of bugging devices on their mobile phones. With systems such as Flexispy, which advertise their spying software with the statement “If you’re in a committed relationship, responsible for a child or manage an employee, YOU HAVE A RIGHT TO KNOW. Find out the truth, spy on their phone.” While in blatant breach of the Data Protection act, the system, along with many others are still popular and the penalty is only a fine. However, is it legal to use listening or recording equipment in public places, in offices and in your own home. Tracking When it comes to tracking, the StingRay phone tracker is the most common. Developed by the Harris Corporation, the device is a cellular phone surveillance device. The device forces all nearby devices to connect to it, and from there can retrieve internal data, download data, and can intercept communication content, and can decrypt and record content. The StingRay can also track and locate devices it has connected to. The software was originally developed for the likes of the military and intelligence community, and while controversial, with blurred lines between protection and privacy issues, it is widely used across the US. The American Civil Liberties Union has identified at least 60 agencies across 23 states that own and use StingRay technology. In the United Kingdom however, usage of the technology hasn't been confirmed. A BBC report on a Sky News investigation revealed the accusation that police have been setting up fake mobile towers across London. These towers connect to mobile devices and reveal the location of the users. The report suggests that the devices could be used to track police suspects. Metropolitan police have neither denied nor confirmed the usage of this type of surveillance. Examples In the Netherlands all ISPs have to have the capability to intercept all traffic with a court order and maintain users’ logs for three months. In New Zealand the Telecommunications (Interception Capabilities) Act 2004 obliges telecommunications companies and ISPs to intercept phone calls and emails on the request of the police and security services. In Switzerland ISPs are required to take all necessary measures to allow for the interception of mail and telecommunications. Social Media Another part of information privacy that is not covered by any legal framework is the information that we are sharing when we go online. This raises a whole new connotation to the definition of ‘information exposure’ in the domain of information security when applied within the context of social networking. ‘Digital information residue’ is our personal information that has been collected or shared and digitally stored somewhere by someone or something in cyberspace and over which we have no control. As long as there have been online communities, there has been social media as outlined in the Oxford Dictionary of Media Communications. However, it is less easy to define who exactly is monitoring our profile on social media pages without them making direct contact. Some privacy settings are within our control such as the ‘custom’ setting on a post which allows us to see who is viewing the post; however, other people's tagging (until we have de-tagged ourselves) is out with our control and those few minutes are fraught with ‘oh no – who has already seen this?’ Graham Meikle and Sherman Young say: 'Think about the way Facebook publicizes our activities to everyone on our friends lists through the newsfeed function. You may think a particular comment that you make on a Friend's status is restricted from others whom might not want to see it, only to find her profile is open to everyone, and so your remark has been redistributed to every one of your friends as ‘Top News’. According to recruitment company Jobvite in their annual survey (latest September 2015) 92% of employers check social media pages before hiring. Furthermore, with the rise of social media in a younger generation, there are stringent guidelines in place to ensure that teachers are not spied upon outside of class. It could be argued that both instances are examples of theorist Erving Goffman work who argues that we have a multicity of guises for different social situations, and we perform to our catered audience and while similar to the theatre, our real selves are backstage. Screenshot Sousveillance Online Dating and Infidelity Screenshots used to be only something we could do by pressing Print Screen on a PC or laptop, but the ready availability of smartphones today means with one click they are becoming an increasingly common method to capture pictures and information to forward onto friends on a daily basis. The social media dating app Tinder released plans to create a ‘share’ function for its users and potential mates. The dating giant says that this will benefit users to share a profile of someone they have perhaps met as an acquaintance, and not close enough to add as a Facebook friend, of someone they were interested in but unsure of their availability. This naturally brings about concerns over privacy as a link can be emailed to the person's friend available for 48 hours or after five clicks. Tinder argue that users already have the option to screenshot user profiles and send them to their friends and that users will have the opportunity to ‘opt’ out of the decision to share their details. However, with entertainment websites such as Buzzfeed and Distractify using profiles to create humour at the expense of unsuspecting users by compiling screenshots sent in by users who have captured quirky, dirty and downright odd conversations, such measures bring little comfort to those on the receiving end. There are now whole accounts dedicated and encouraging users to send in Tinder Nightmares. See also: Sousveillance and art? However, screenshot surveillance can be used to an advantage in the case of Model Emily Sears, who after being frustrated with the amount of men sending unsolicited pictures of their penis' she looked on their profile to find their family or girlfriends and threatened to forward them on. She found the men quickly apologised for their behaviour. In her Buzzfeed interview Ms Sears made a point of stating that the men believe they were secure behind their computers. This social behaviour is a termed online disinhibition, by theorist John Suler, as the feeling of freedom to do or say things in reality one would normally not be allowed to. If a man exposed himself on the street, he would be arrested yet somehow some men believe sending a picture of their penis is more socially acceptable. Companies Passport Services have exploited consumer information, and were pressured into revising their privacy policies and statements following a series of articles originating from Salon.com. Both Yahoo and Microsoft e- mail services reportedly divulged customer information in opposition to their stated privacy policies of not sharing personally identifiable information. In February 2009, in response to user criticism about potential privacy violations, Facebook was forced to suspend its newly revised terms of service. Google privacy practices do not meet EU privacy standards and have been similarly criticized by several US policymakers Lawmaker questions Google over privacy practices Companies employ privacy and terms of use statements to outline how personal information provided will be used, so that in the event of user complaints, companies are absolved of responsibility. In this manner, personal information is commercialized into the public realm, with little input from the individual in the process. There have been companies that have taken a firm stance against the NSA.In 2014, Social media giant Twitter filed a lawsuit against the US government in which it asked the ability to be transparent with information about the government's surveillance of Users. Ben lee, Twitters' vice president stated that the restrictions were a violation of the first amendment.Prior to twitters lawsuit, Google had filed a similar lawsuit that also requested permission to disclose to the public how often the company receives national security requests for data. Biometric According to the Electronic Frontier Foundation, "Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioural characteristics". This kind of surveillance technology has been in use for many years with the commonly known fingerprint recognition and iris recognition. The popular social network Facebook uses a facial recognition software to 'tag' people in photographs posted on it. All of this can be considered surveillance, particular when the data formed from it is gathered and stored for government or commercial purposes. This kind of use of biometric data is well known, however, new uses are being explored constantly. In America and China, facial recognition cameras are being placed on lamp posts around cities for the purpose of watching video that is tagged to individuals in real time, as well as dispersing large crowds that may gather for violent activity. Only last year there was controversy over the cameras places around Download Festival by Leicestireshire police in order to scan the crowd for wanted criminals in Europe. It was the first use of that kind of technology in an outdoor venue in the UK and sparked outrage when it was brought to public attention. At the same time EyeSee mannequins are being used in stores where they can track the age, race, and sex of retail customers in order to give companies marketing data; a form of corporate surveillance. It may sound like the content of a science fiction movie but increasingly it is becoming a reality. Iconeme, for example, has its own mannequin system which uses beacon technology in smartphones to automatically alert customers to product details via an app. It could be feasible in just a few years to walk into a store and have the mannequin call you by your name and then recommend products to you, simply by combining facial recognition software and customer databases. Of course none of this is done easily as Kelly Gates brings up in her book Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance, however billions of dollars are being placed into the development and manufacture of it. The U.S. at this time has no regulation on the use of biometric surveillance technology, however the U.K. and Canada passed certain laws which would help limit invasive biometrics, such as the 'Snoop Bill' which would reduce the powers of the Communications Capabilities Development Programme (CCDP). Peter Wagett says, "I've been working in biometrics for 20 years, and it's reaching a tipping point where it's going to be impossible not to understand where people are and what they are doing. Everything will be monitored." To a certain extent this is already true but it will be interesting to see where biometrics goes next. Examples In Sweden almost every citizen born in 1975 or later has provided a blood sample at birth for the purpose of research. Function or mission creep has recently resulted in these blood samples being used for the conviction of a murderer in 2003 and for identification of victims from the Tsunami disaster in Thailand in 2004. All 27 EU countries agreed to unrestricted access to genetic information, fingerprints and car registration information in all EU police databases?. In New Zealand newborn blood spot samples and related information is collected and this data may be used by the police, but only as a last resort or with parental consent. Aerial Aerial surveillance is a type of surveillance that is usually conducted by computerised aerial engines. This form of surveillance comes with its own set of problems and boundaries which are often crossed. New technology has been building devices such as the drone, an aerial surveillance unit which operates on its own and sends surveillance images to the owner from a distance. The main issue of using these devices is the invasion of privacy, especially concerning the fact that many drones can be purchased and used without a licence in the UK. Drones under the weight of 20 kg do not require a special permit, meaning that anyone can use these recording devices to 'spy' on whomever they wish. Those who own a drone must avoid flying it within 150 metres of a busy area and 50 metres of a person, but this rule is not strictly enforced. Many people are weary of drones as the machines take on a new form of artificial intelligence. The electronic devices are able to use their computer vision to use facial recognition while adapting to their surroundings and possessing the ability to follow and document the movements of their target. Drones do not have the restrictions of that of a closed-circuit television, otherwise known as CCTV which, while able to record an individuals movement in public, cannot follow the individual or record from an aerial view. Drones with computer vision, face recognition, object recognition and other tracking technologies are fast becoming one of the most intrusive forms of surveillance. Drones can adapt to their environment and complete human like objectives such as following a subject and filming while they move through an area. There has been some restrictions in aerial surveillance for the protection of the public and their right to privacy in their own home, and also for safety precautions, as the FAA rules which bans the use of drones flying above 400 ft or within two miles of an airport. In May 2015 a housing bill in the USA was introduced to restrict the use of aerial surveillance. The bill, christened the Protecting Individuals From Mass Aerial Surveillance Act, announced that that federal law enforcement officials now have to get a warrant if they want to conduct aerial surveillance inside the country. They also cannot identify people who are caught within the frame. As drones are a more recent form of surveillance, many people are not sure of the dangers or benefits that the technology has, but there has been a rising number of officials who want to rise the regulations and rules for owning an aerial surveillance system. Robert Knowles was convicted in 2014 for using a drone in a seemingly dangerous way, after he lost control of the machine near a nuclear submarine facility. He was ordered to pay £4,300 by the Civil Aviation Authority. BBC news have released an article which states where someone can and cannot use a drone, as many are being received as Christmas and birthday presents. Drones are the new 'it' toy of surveillance technology, but the repercussions from ignoring the guidelines can be hazardous, with another case of misuse in Manchester, where a man was arrested for flying a drone over Manchester City's home game with Tottenham Hotspur. Drones are seen as fun, harmless toys for many, but this highly advanced form of aerial surveillance can be dangerous and morally questionable in regards to a right to privacy and anonymity. If CCTV is warned as being too intrusive on privacy, the drone by comparison is much more invasive, with more advanced technology and a bigger scope for gathering information. Data Mining and Profiling Data mining and profiling is surveillance of data, using a pattern based variant and searching through data mines to scrutinise individual activity. Data mining and profiling is used to gather information about an individual in order to generate a profile and find patterns of the individuals internet activity. This can be used to make prognostications about behaviour, and thus be able to determine behaviour both online and offline. Technological advances in software make for an even more detailed analytical approach, with online transactions being surveyed and noted. Widespread information about individuals is used by private organisations with the intention of following the internet activities of a range of people. This is used to build a consumer profile for the individual. Some call these companies "third parties," as they are directly entrusted with personal or business information as a means of furthering their customers' transactions." For another set of corporate players, however, the collection and sale of personal information is their business, not just a by product of the exchange of goods and services. The tracking and noting of data by companies create a risk for the privacy of the target. Additional privacy issues arise when the government obtains this information, which it currently can without any legal consequences. This creates a power struggle between the profile and the profiler, or the prey and the hunter. With the tracking of a person's personal life comes into question the legitimacy or even necessity of passwords and such. It seems obsolete that one requires a passcode to enter their own email, while a data miner has access to anything they think is necessary for the complete picture of an individual. It is ironic the difficulty in accessing a site such as Gmail when the password is forgotten- a mothers maiden name or a childhood pet must be remembered while a separate company or profiler is able to have their ignorance overlooked in order to collect the identity of someone. Studies have shown that data mining has been used as a strategy by intelligence and law enforcement agents when combating terrorism. This was introduced when investigations do not reveal enough about the behaviour and intentions of terrorists who tend to purposely blend in society. To identify, isolate and prevent terrorist activity, intelligence agencies have begun collecting, retaining, and analysing huge and mostly useless transactional information about the daily activities of hundreds of millions of people. Data profiling and mining is used in the world of surveillance to dig beneath the surface of what the naked eye can see and turn banal activity into a user pattern. Using data that is considered meaningless can be vital for a profiler who can build their data from online transactions and such to create a clearer image of an individual. It is not the accuracy of the practice which is often questioned, but the ethical malpractice which is part of the strategy. Private information is a hot commodity for large companies but data mining and profiling is generally just sifting through the everyday activities of an ordinary person and this type of surveillance is questionable in its necessity. Human Operatives Are agents such as we see in spy thrillers a tool of surveillance? It can be argued that yes they are. According to [ https://www.mi5.gov.uk MI5]'s website "Covert Human Intelligence Sources (CHIS), or “agents”, are people who can provide intelligence that assists our investigations". These agents are often misrepresented in fictitious works for the purpose of drama, but the base of such stories remains the same. Possibly the best known Security agency in the world is the C.I.A. or Central Intelligence Agency, a branch of the United States security forces. Surprisingly intelligence activities in the U.S. have only been carried out on a government-wide basis since World War II., while in the U.K, MI6 and MI5 have been established since 1909 when they were known as the Secret Service Bureau. The most active period of use of these security services, and the most replicated era in popular culture must be the Cold War. During this time surveillance of foreign government's was essential to the avoidance of a nuclear war. All of this is in relation to operations dealing with foreign interest, however there are also agencies set up for the surveillance of the domestic population through human operatives also. The largest homeland counter-terrorism organisation is the U.S. Department of Homeland Security. Almost every country in the world has its own homeland security service where agents are tasked with monitoring the population for possible terrorist risks. Human operatives are their own form of surveillance technology, possibly the oldest in the world and the most universally recognised. For more information on the role of agents in the U.K., the Today programme on BBC's Radio 4 recently interviewed an anonymous agent about their experiences of working with MI5. D.N.A. Profiling Several countries are building nationwide DNA databases for medical research driven principally by pharmaceutical companies and other business enterprises hoping to profit from new medical procedures and services. Medical research is the driver in Sweden whereby almost every citizen born in 1975 or later has provided a blood sample at birth (PKUlaboratoriet 2008). The sample is used to test for a genetic disease Phenyle–Ketone–Uria (PKU). It is also saved for future medical research in a database. The database does not contain any DNA profiles, but the blood samples can easily be analysed. There is also identity data provided with each sample. The database is not intended for use in criminal investigation. However, in the high-profile case of the murder of Anna Lindh (the Swedish secretary of foreign affairs) the police obtained temporary access to the database which was used to identify the murderer. Satellite Imagery On May 25, 2007 the U.S. Director of National Intelligence John Michael McConnell authorized the National Applications Office of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth. Identification and credential One of the simplest forms of identification is the carrying of credentials. Some nations have an Identity document system to aid identification, whilst others are considering it but face public opposition. Other documents, such as passports, driver's licenses, library cards, banking or credit cards are also used to verify identity. If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number, it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above. Geological devices In the U.S., police have planted hidden tracking devices in people's vehicles to monitor their movements, without a warrant. In early 2009, they were arguing in court that they have the right to do this. Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison. Human microchip In recent years, critical thinkers and skeptics have become highly critical of a potential surveillance method: the use of micro-chips to track citizens' movement. While many commercial products are already equipped with micro-chips to prevent theft, these chips can potentially be used for other purposes, too. By now it has become a matter of fact that new American passports are issued with an RFID chip that contains personal information. These chips can be identified within a radius of ten meters. However, similar chips have already been implanted in humans also. A few clubs and discothèques have spearheaded this use by injecting micro-chips into the arms of regular customers in order to provide them with easier access and an electronic tab that does away with the need to carry money or credit cards. Ironically, it follows that surveillance can be used not only as an implicit and secret form of control, but has been accepted in business circles as a way to provide explicit 360° feedback. This type of feedback involves the evaluation of managerial performance through auditing the entire organizational context. However, this process can give rise to micro-politics within an organization and invite denunciations and blackmail. It has been argued that this is the perfect form of discipline in that it makes the subject of disciplinary power feel welcome and invite discipline openly. Similarly, skeptics fear that we are willingly creating the transparent human or the "Man of Glass" by laying bare every personal detail and making these details subject to control by outside forces. Postal services With the rise of text messaging, Instant messaging and email, it could be argued that the postal letter is becoming obsolete for the younger generation. In 2015, the UK newspaper The Daily Telegraph reported that research by the National Literacy Trust revealed that only one in six teenagers still write letters and they believe that living a technologically advanced world is the reason behind the decline of letter writing. For those of us who do send and receive letters, and aren’t at her majesty's pleasure even if it's just the odd Christmas or thank you card, we always assume our information is private; however, the United Kingdom has experienced a fluctuating relationship with postal and communication privacy rights. According to Media Blog INFORM (International Forum Of Responsible Media Forum) from the 17th to the 20th century letters could only be opened in transit by the authorisation of a warrant but the form of the warrant would be at the discretion of government powers but they did not publicly advise that interception was taking place. Furthermore, any scandals would have been dealt with in secret. The silence of this practice remained until 1979 when it was revealed that the local police had been recording an antique dealer's telephone and when the UK courts dismissed the courts, the plaintiff took the case to the European Court of Human Rights where it was revealed that the UK government were in violation of Article 8 of the European Convention of Human Rights entitling a UK individual the right to a quiet life. The only loop hole being in order to ensure political stability. This led to the creation of the Interception of Communications Act 1985 ordered by the courts and was later replaced by Regulation of Investigatory Powers Act 2000. See also: Laws and Restrictions The privacy of postal law in the USA only took place in the 19th century. John Durham Peters states that before stamps, sealed envelopes and post boxes, letters could be opened, read out and even published in the local press. Graham Meikle and Sherman Young make the connection between the evolved privacy conformity in letter writing and that in today's social media outlets, there has been no call to define what is private and what is not. They say ‘It is not unusual to send someone a message in this way only then to have them reply by writing on the ‘wall’ area of your page thus opening up the conversation to what may be a much wider audience, depending on what privacy settings are applied to the wall in question’. Applications A particular form of surveillance technology is that which is consumer accessible via application stores such as Google Play and iTunes. There are many different ways in which this technology is marketed; for companies in order to track employees' internet usage at the workplace, advertised to parents for monitoring their children's communications via their phone and those sold for the purpose of investigating a spouse's activities. Of course, the basic software is essentially the same and is downloadable to any computer or phone with an internet connection. This section will look particularly at these applications and how they function. An interesting starting point may be an article by the Huffington Post on five different applications sold to parents for "spying" on their children. This highlights the main selling points of these products, from one's ability to view what their children text to knowing the speed of the vehicle they are travelling in. The websites for these products themselves mention similar points, as well as speaking of slacking employees and cheating spouses. According to Top Tracking Apps 'Mspy' is the "top used cell phone tracking app worldwide", therefore it is valuable to look at the way in which it functions and what the company have to say on the matter. Mspy on its homepage has a section entitled 'How it Works' where they state "Our software works by tracking all activity in the background of the monitored phone including GPS location, web history, images, videos, emails, SMS, Skype, WhatsApp, keystrokes and much more." It's features include - managing calls, tracking text messages and GPS locations, accessing calender and address books, and controlling apps and programs to name a few. It is compatible with iOS, Android, Windows and Mac OS. There may be questions of legality here, as it is civilian surveillance software, however their site explains "its usage is absolutely legal" as long as it is used to monitor under-age children, employees who are aware they are being tracked, or used in the buyer's own phone. However, the software is available to download onto a device remotely so it is very easy for users to make use of it illegally. On similar sites such as Spy Bubble, the question of legality is even more questionable as it is advertised to be used on a partner's device and the subject of authorization is not addressed. There are many articles online discussing the legal and ethical issues outlined here. The use of such applications may remain controversial, however they are only becoming more popular worldwide as time goes on as an everyday surveillance technology. Power politics of a Networked culture Technology and everything else that has mass appeal should always be critiqued in relation to power relations. It is naïve to not be critical or highlight the advantages that a networked society grants to powerful governments in the world. A world where the seamless access to technology allow for seamless watching of our everyday lives. Who is watching us? Who watches those that watch us? These are the questions we have to ask in order to remain critical and active participants in this technological age. Political sociologist, Larry Diamond has a positive perspective on 'always on culture' in that it has allowed for easier access to technology and information. Diamond believes that cheap video cameras and internet enabled mobile phones that can record video have put the 'power' back in the hands of civilians, allowing the people to become surveillants themselves and flattening the traditional hierarchy of surveillance. He argues that the devices we hold in our hands allow us to document the activity of public and corporate officials, therefore allowing civilians the ability to hold powerful officials accountable at any given time of the day; the ability to watch the authorities from below. The concept of a society that has the power to become the fourth estate and hold power symbols accountable through our access and use of technology can be seen in 80's show COPS. A show that exposed the day-to-day operations of American police officers as they apprehended offenders using force and sometimes brutal tactics. The show was revolutionary in that it put agents of power who had been comfortably operating in the dark without anyone to question their actions, and were suddenly brought into the light for the general public to critique. Ex-CIA employee Edward Snowden, however, showcased how sometimes the most invasive surveillance occurs when we do not know it is happening or even exists. When no one can be held accountable because the public is unaware. The times when political power and mounds of laws that no one reads, allows power agents the access to personal files. The NSA was collecting the telephone records of thousands of unassuming Americans. A process that was enabled by a secret court order commanding telecommunications company Verizon to hand over telephone data on a daily basis. The NSA also managed to tap into the server of every major internet firm in a surveillance programme called PRISM. Britain was also exposed for obtaining information from the 'Prism' programme. Edward Snowden who was responsible for the leak, was charged in the US for theft of Government property and remains in exile and yet all he did was hold power accountable. Edward Snowden and organisations like Wikileaks have illustrated the extent of mass surveillance. Snowden has had to flee the US and Julian Assange to the Ecuadorian embassy to prevent, what he claims as, attempts of extraordinary rendition to the US. It may be much easier to organise online in terms of accessibility, but if the public is under constant surveillance it becomes difficult to argue that they are truly empowered by their devices, if these are what allows such invasions of their privacy. The News Of the world phone hacking scandal is another example of how those in power can abuse surveillance features in a society that is dependent on technology.The story began in 2006 when Clive Goodman, the then News of the World royal editor, and Glenn Mulcaire, a private investigator were convicted of intercepting voicemail messages left for royal aides and were as a result jailed.Following that revelation investigations began and more hacking stories surfaced. However, the critical political moment in the scandal came when the Guardian newspaper reported that the newspaper had hacked the mobile phone belonging to murdered schoolgirl Milly Dowler.Rupert Murdoch closed the paper down and court proceedeings began.Allegedly, targets included politicians, celebrities, actors, sports people, relatives of dead UK soldiers and people who were caught up in the 7/7 London bombings. In a society with networked culture, immateriality is the most distinctive characteristics, since all information are transmitted in digital form. Besides, the distance in time and space is also eliminated owing to the Internet. What's more, equality is also one of the characteristics of networked culture, since all citizens can read and post their opinions online. For power politics, the above-mentioned characteristics of Internet can help to transmit political information in time in order to gain the support from the public to the largest extent. Networked newspaper, broadcasts, televisions etc. can provide a large quantity of information to the public, so as to shape the correct orientation for public opinions. In countries like the People's Republic of China, this has led to widespread censorship online. The great firewall of China has meant the internet only accesses government approved content, and searches are filtered for certain words that can result in criminal charge and imprisonment. Artist and critic of the PRC Ai Weiwei has criticised surveillance programmes by the NSA for behaving like China and calls for the need for democratic accountability in government surveillance. Ethical concerns Surveillance should never intrude on the subject's reasonable expectation of privacy. Although private security and surveillance operatives are not police officers with the primary concern over search and seizure protections, if there is a violation of a subject's rights through unreasonable means, there will likely be civil liability. It is a known fact that when using for example digital devices, software and applications – a use that tends to be massive on a daily basis - people agree to terms and conditions without even reading them. Apps then not only collect significantly sized data banks on the users, but institutions (like the government) themselves access personal data from the profiles and conversations (exchange of information between users), filtering these for matters that are said to be of security. It is difficult to acquire precise data on these events and although, from what the public is given knowledge of, not every government controls as closely everything, when it happens it is a clear example of surveillance. In situations of this kind it is very debated whether there could be a ‘positive’ use of surveillance for safety reasons that is in the best interest of the community or it is a case of privacy infringement and control over the population. Arguments arising as well, on a more general level of the internet as a whole, from the fact that digital labour has a good exploitation potential. Where by using some apps and pages, for example, we users are benefitting someone else more than ourselves, and where labour is extremely cheap in systems like a Mechanical Turk while it pays and therefore benefits the requester of the HIT. Not to forget the value data in itself has, allowing systems/corporations like Google and Amazon to become megastructures, databanks with significant relevance, as if a virtual empire that could challenge more physical ones (for example oil companies and car factories). Databanks built on the ‘consent’ (often though unaware) of the user. Although the digital world as a whole allows for examples (occasionally making for good news stories) of shady situations, infringements, abuse and situations of ethical concern, these can be found even taking a sample section of it like social platforms. Facebook being a popular one, it has been topic of concern in the past, being able for example to run "experimental evidence of massive-scale emotional contagion through social networks" without the users even being aware of it until later on. Underlining once again the fragility of the user and an exposure that allows relatively easy manipulation, there are ethical issues within the working of it and its extension apps. One interesting case study might be the ethical concerns regarding Facebook's app Messenger. Many of Messenger's users are unaware of just how many permissions they have given the app when agreeing to use it. There is an argument surrounding the fact of whether this should be considered a privacy issue or not. Some of the more surprising permissions include but are not limited to: modifying your contacts, reading your text messages, sending text messages, directly call phone numbers, read call log, read the contents of your USB storage, take pictures and video, record audio and video. Some of these permissions woud seem surprising considering this app is mainly used just to send messages and pictures. The ethical concern here is that many users are unaware of these permissions and thus there may be a fear that app developers may take advantage of this to data mine, or in extreme cases, spy. There are also concerns for the future here, for example - "If this many people have not checked the permission groups that apply to Facebook Messenger... how emboldened will mobile developers be in the future?". Facebook did respond to this ethical panic. For example, in relation to the concerns regarding camera, it was stated - "If you want to send a selfie to a friend, the app needs permission to turn on your phone's camera and capture that photo. We don't turn on your camera or microphone when you aren't using the app.". However, this has not ended speculation entirely, for the response did not contain a full breakdown of all the permission justifications. Perhaps Facebook is now also seen as a 'big brother' too and there is a level of distrust. However, slowly people have come to realise how Facebook uses these permissions. With reference to the contacts permission, another justification is that "The app needs you to allow it to have control over messages to allow you to confirm your phone number via a confirmation code". This might quash some of the ethical debate about the app, but what is true is that Facebook does use the app to target specific ads to you, however most of this data collection is in-app. This raises a complex question: should sending ads based on your interests be considered a breach of privacy? Largely, the answer to this question changes from person to person. Ethical issues, the principle of informed consent and the exposure of identity online are in fact part of a broad topic and can be tackled from different perspectives, from an individual's status updates to academic publications like Rafael Capurro and Christoph Pingel's paper. From censorship in the printing era to a more actual situation regarding online trust, it is brought to attention the tension between surveillance and freedom, which constitutes the basic ethical challenge, in the creation of a collaborative atmosphere and mutual support of the digital community. For and Against Surveillance Supporters argue surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the Modus operandi. This requires a minimal level of invasiveness. Surveillance can give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e. video analytics. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt. * Supporters simply believe that there is nothing that can be done about it, and that people must become accustomed to having no privacy. * common argument is: "nothing to hide argument, if you aren't doing something wrong then you don't have anything to fear". On the other hand, many civil rights and privacy, such as the Electronic Frontier Foundation and American Civil Liberties Union, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. * Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear". If there is an argument that we should be limiting digital surveillance, this would necessitate a cutback on the use of platforms like social media. However, if "today's social media has taught us anything about ourselves as a specieis it is that the human impulse to share trumps the human impulse for privacy." This would then suggest that humans value the act of sharing over privacy, so the increase of surveillance is thus unsurprising for there is more available to be watched. Surveillance in the UK For more information on Surveillance in the UK, please, visit Mass surveillance in the UK In the United Kingdom the use of surveillance in digital form increased because of pioneering during the Second World War. In the 1950 and 1960 there was build the Government Communications Headquarters (GCHQ) which participated in programmes such as the Five Eyes collaboration of English-speaking nations. The purpose was to intercept in electronic communications, which increased a lot over time. Nowadays, surveillance of electronic communications in the United Kingdom is controlled by laws made in the UK Parliament. In particular, access to the content of private messages (that is, interception of a communication such as an email or telephone call) must be authorised by a warrant signed by a Secretary of State. In addition European Union data privacy law applies in UK law. The law provides for governance and safeguards over the use of electronic surveillance. Surveillance in Popular Culture * In George Orwell's prolific Nineteen Eighty-Four, a lack of privacy is a major running theme throughout the novel. Telescreens that record both audio and video are installed in many of the characters’ homes, businesses, and in public places in order to keep tabs on them. Private citizens are encouraged to report on their neighbours, and the Thought Police are undercover officers in charge of uncovering ‘thought crime’. The themes of surveillance in the novel have had a huge cultural impact, including the use of the phrase 'Big Brother', and the television program of the same name. There is a definite fear associated with surveillance in popular culture and 1984 illustrates this very well - "There was of course no way of knowing whether you were watched at any given moment" Further on from this, Orwell addresses the idea of surveillance coexisting with the hunger and drive for Government power. This raises an important point about the negative implications of surveillance being used as a way of control, which is evident in modern society today through the use of CCTV and the increasing amount of surveillance being introduced today. As Orwell states in his novel "“Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power.” This demonstrates that the use of surveillance is not to keep society safe, but it is to control them. * The show COPS in the 80's was a hit as it showed surveillance footage of American police officers using force on multiple occasions to reinforce the law on offenders. The show unmasked the seemingly untainted image of the American police officer. * Many ‘fly-on-the-wall’ reality TV shows employ the method of mounting cameras in a setting and observing the subjects actions without them acknowledging they are being watched. This can be done with the subjects’ knowledge, in show such as I’m a Celebrity... Get Me Out of Here!, or the camera can be concealed and consent only given afterwards in shows such as Punk'd. This second type tends to use members of the public. * In the 2013 film Under the Skin, there is a series of scenes in which Scarlett Johansson's character, an alien attempting to abduct people, drives around picking up strangers in a van. These strangers were not played by actors, but members of the public unaware they were about to take part in feature film, with a series of hidden cameras in the van recording the scenes * Gogglebox, An interaction programme that showcases everyday people watching tv.The viewer watching the viewer as they watch television. * Paparazzi is a recurring issue in popular culture. It is an invasive form of surveillance that essentially harasses celebrities to get photos and videos of them when they are caught off guard. This becomes problematic as this kind of surveillance goes against ethical codes of conduct, as this sort of invasive practice has not been consented. * The short story The Minority Report by Phillip K. Dick, and the subsequent film, video game, and Fox television series, depict a world in which people can be arrested for crimes they have not yet committed. In the film adaptation, the protagonist must undergo a risky eye transplant surgery in order to avoid the city-wide optical recognition system. * In the final season of Parks and Recreation, Leslie battles a data-mining tech company that are gathering information on the citizens of Pawnee. =Sousveillance= Definition Sousveillance means "watching from below and its etymology derives from replacing 'sur' (over) with 'sous', which means 'under' or 'below' or 'from below'. So the term itself suggests that sousveillance is an opposite to surveillance with the act of watching being the only constant between the two. Sousveillance is the recording of an activity by a participant in the activity, typically by way of small wearable or portable personal technologies. Sousveillance is defined as cameras (or other sensors) borne by people. Sousveillance is the veillance of plurality (i.e. "crowd veillance" or watching, sensing, or the like, done by non-authorities). Your Dictionary defines Sousveillance as "the recording of the environment from a person's vantage point in the course of everyday activities.". An example of using Sousveillance in everyday life – which is popular within social media platforms – is where a person takes a photo or recording of a higher authority breaking the law. For example, a police officer fully dressed in uniform but using their phone while driving or a court judge parking on double yellow lines. These maybe just minor examples however when you see something along these lines it is actually using Sousveillance. Steve Mann A key figure in the field of sousveillance is the person who coined its term Steve Mann, a professor at the University of Toronto. The practice of sousveillence has been enacted in real life for some years now by him, who claims to be the world's first cyborg. Mann has been living with a computer attached on his head for the past 35 years making his life a testament to sousveillance practice.Steve Mann hopes to be a social reformist who will indulge others into adopting the use of wearable technology. Throughout his lifetime Mann has been using his EyeTap to filter out advertising banners on the streets. He believes that people should be free to choose what to see and that today's societies are bombarded by enticing sound and imagery that nudge them to purchase products and services uncontrollably. Main ideas on Sousveillance Mann offers two main definitions of sousveillance, which are approximately equivalent, but each capture slightly different aspects of sousveillance: * 1) Inverse surveillance: to watch from below; * 2) Personal experience capture: recording of an activity by a participant in the activity. There is already a certain legal precedent for audio sousveillance, e.g. “one-party” recording of telephone conversations enjoys greater legal protection than recording by a person who is not a party to the conversation. In most states, audio surveillance is illegal, but audio sousveillance is legal. According to Steve Mann, there are two kinds of sousveillance: inband sousveillance (e.g. arising from within the organization) and out-of-band sousveillance (often unwelcome by the organization). Examples of inband sousveillance (“subveillance”) include: wherein “subveillance” is subversive, in the sense of “turning the tables” on surveillance from within the organization, (“subversive” literally meaning “to turn from beneath”, working secretly from within an organization). * the 1-800 numbers on the back of trucks so other drivers can report “how am I driving”; * feedback on a professor's perform by his or her students; * satisfactory questionnaires given to shoppers by management, Examples of out-of-band sousveillance include: * taxicab passengers documenting the driver's (illegal) driving habits; * customers photographing unsafe fire exits in department stores and reporting them to the authorities; * citizens videotaping police brutality and sending copies to media institutions. McDonald's Attack On 1 July 2012 Steve Mann was physically assaulted by McDonald's employees while on holiday in Paris with his family. The cause of the attack was that Mann was filming the inside of the restaurant and the menu with the EyeTap technology mounted on his head. Although Mann had no intention of proving a point here his case is now known as the first cybernetic hate crime showing clearly what happens when the lines between surveillance and sousveillance are blurred. Mann was denied access to the venue while being filmed by its surveillance system because he was filming it back. At the result of the attack Mann's six-year-old daughter draw a sketch describing the power dynamics of the two terms. The McDonalds incident coined a new term called McVeillance that Mann later put in a diagram shown right to explain the different directions societies maintain towards the act of veillance. The three groups Societies through history have been split into three groups according to their approach to surveillance based on the ratio of surveillance to sousveillance (Mann and Ferenbok). The first type of state allows for people to watch over the state to the same degree they are surveilled by it. These states allow their people to interfere with politics via Social Networking, political forums and transmission of information to encourage political discussion and reform. Current democratic states in North America and Europe provide the appropriate ideological framework where such conditions of sousveillance are acceptable. Although people are free to act as they wish the laws existing in countries like these are such that protect sensitive information and data that belong to government and corporate organisations. Therefore, when individuals are trying to obtain such information or leak it to the public are prosecuted. These were the cases of Chelsea Manning and Edward Snowden when they both leaked classified information to the WikiLeaks website. Among their revelations were the PRISM surveillance program for Snowden and a video know as Collateral Murder on Manning's part. Whistleblowers are a hot topic of debate as they are people equipped with the technology and power assigned to them by governments who instead decide to turn their tools toward the state. Hence, they seem to be able to conduct surveillance and sousveillance at the same time until they get caught. The second type is the state that maintains legislation that prevents people from engaging in any discussion that could possibly initiate political reform and start social movements. Although the state has a number of ways to monitor its citizens via cameras or electronic media it does not take their interference with politics seriously. In states like this it is quite usual that phenomena of corporation or government corruption are being covered as in the case of North Korea, China and military dictatorships across the world. In the third category fall in states where people have more undersight authority compared to the oversight of the state. In this case citizens, activists and journalists provide their knowledge to fight corruption and crime along with police and government organisations. Also there is great participation of the electorate in voting processes through E-Vote systems to pass legislation and vote for elections. In similar ways the development of reputation systems such as Amazon and eBay have given users the chance to rate products and services for future buyers creating a kind of customer sousveillance system. Although this promotes fair trade and establishes democratic conditions in the online market, it also sometimes works at the expense of eloquence and professionalism.As these sites invite all kinds of users to post their rating/review from a service or a product they purchased it does not require of them any special skills or expertise in a certain area(Rheingold). Sousveillance and Society The performances show how certain kinds of rule violation can be deliberately used to engender a new kind of balance. They show public acceptance of being videoed as an act of surveillance in public places. When such data collection is done by ordinary people, such as the performers, to other ordinary people, it is often accepted. However, when data projectors show surveillance officials the data that has been collected about them, there is less acceptance. Organizational personnel responsible for surveillance generally do not accept sousveillance from the "ordinary people" performers, even when data displays reveal what the sousveillers are recording. The social aspect of self-empowerment suggests that sousveillance is an act of liberation, of staking our public territory, and a leveling of the surveillance playing field. Yet, the ubiquitous total surveillance that sousveillance now affords is an ultimate act of acquiescence on the part of the individual. Universal surveillance/sousveillance may, in the end, only serve the ends of the existing dominant power structure. Universal sur/sousveillance may support the power structures by fostering broad accessibility of monitoring and ubiquitous data collection. Or as William Gibson comments in the feature-length motion picture film CYBERMAN (http://wearcam.org/cyberman.htm) “You're surveilling the surveillance. And if everyone were surveilling the surveillance, the surveillance would be neutralized. It would be unnecessary.” In such a coveillance society, the actions of all may, in theory, be observable and accountable to all. The issue, however, is not about how much surveillance and sousveillance is present in a situation, but how it generates an awareness of the disempowering nature of surveillance, its overwhelming presence in western societies, and the complacency of all participants towards this presence. In contemporary networked societies, individuals switch among multiple, partial communities and work teams rather than being embedded in single communities or workgroups. Yet, surveillance is a manifestation of the industrial and post-industrial eras of large hierarchical organizations efficiently employing technologies in neo-panopticons of social control. But in networked societies, people are more likely to want sousveillance and coveillance, for they lack the protection of the village/community or hierarchical organization. Newly developed technology allows them to surveil the surveillers. In affording all people to be simultaneously master and subject of the gaze, wearable computing devices offer a new voice in the usually one-sided dialogue of surveillance. They suggest a way towards a self-empowering sousveillance for people as they traverse their multiple and complex networks. The Politics of Sousveillance Sousveillance describes a process of watching from below meaning that the subject of the gaze has more power than the watcher. With various means and technology sousveillance has been taking place in different eras over the course of human history leading to uprisings and sociopolitical changes. French Revolution On May 5, 1789 France the Estates-General had been called on. The delegates of the 3rd Estate representing the bourgeoisie outnumbered those of the Clergy and the Nobles, yet they were not granted a vote by head. They immediately left the congregation and started meeting separately gathering around them members of the clergy, nobility and the peasants. All this led to the famous Tennis court oath where the members of the self-acclaimed National Assembly took an oath never to disband until France had its own constitution. The meetings escalated leading to the Storming of the Bastille before climaxing with the French Revolution. The French Revolution shows us that a group of people with less power than others managed to organise and paved the way for political reform and democratization with the overthrow of King Louis XVI and the abolition of feudal system. The news of the French Revolution spread with newspapers and regular mail correspondence but it is safe to assume that all the falling Empires of the time ( e.g. Ottoman Empire) would have been better prepared had the impact of the news been emphasized by pictures if possible. With modern mobile computing, social networking and fast internet speeds today news appear on our screen instantly. WikiLeaks' revelations and Arab Spring For more on this you can visit Illegal Access|Wikileaks and Whistle-blowing In 2010 the publication of US diplomatic documents from the WikiLeaks website caught the attention of the public community while fostered social movements in Middle East. Specifically, the work of WikiLeaks is often cited as the main cause leading to the events of the Tunisian Revolution. During that time a large number of international rights groups, activists and journalists took to the streets of Tunisia and organised their action through platforms like Twitter and Facebook. Each one of them played a vital role in raising worldwide awareness by posting material of the demonstrations and Tunisia in 2010 ousted its president Zine El Abidine Ben Ali. The events soon took over neighbouring countries Egypt, Libya, Yemen and others to form the famous revolutionary wave of Arab Spring. Zapatistas Movement in Mexico From the outburst of the Zapatista movement in Mexico a group of activists and artists called EDT formed a network of transnational support toward the rebels. To protect the movement the EDT created the FloodNet program which aimed at overwhelming the web servers of websites belonging to the Mexican and US government and other financial institutions. Citizen Journalism Citizen journalism is also an effective method for Sousveillance. Its origin can be dated back to America in 1990s. It refers to the general public posting information that they feel professional journalists should be openly talking about. It can be recognised through the way the citizens write, analyze and transmit news and information through their communication tools. This includes the use of mobile phones, personal blogs and filming in a home environment. The news and information published by them are citizen journalism. Through this Sousveillance method, not only the work of professional journalists, but also the decisions and activities of the government can be monitored by the public. Another key component that makes a difference between citizen and professional journalism is the use public feedback. Citizen Journalists are becoming increasingly easier to argue with as they include their audience. This is often shown through online blogging which allows "users" to add their own thoughts and ideas. This gives the citizens a larger and much louder voice than the professionals as it shows their true interests in the topics. There is much to be praised about the rise of citizen journalism, as ordinary people are often in the midst of major events. A news reporter will rarely be on the scene at the beginning of a disaster or event, but with regular citizens now having the ability to live stream these events or post them to YouTube in a matter of minutes. Citizen journalism is often disregarded as a second tier form of reporting, with many worrying that many citizen journalists are basically amateurs who are simply mimicking what they see on TV or in the press. However, citizen journalism is essential for not only a first hand perspective, but also to break down alliances or ties between the media and the government and reveal the whole truth of a story. Often news stories are told in a way that is not balanced, or is favourably sided towards a government initiative. With the government having some level of control of certain media platforms, it is necessary for the average citizen to step in and do what the journalists cannot. A citizen journalist is very rarely in a position of bias, as they are not being paid, or their company is not being paid or even threatened by a higher authority to twist the truth. Citizen Journalism is a raw form of sousveillence as it does not have an allegiance to the government which carries restrictions on the truth. Citizen journalism can relay the truth to the public without fear of job loss, but it also comes with a level of mistrust from professionals and the public alike. Citizen Journalism in Ferguson, Missouri In August 9, 2014, following the death of Michael Brown (at the hands of white police officer, Darren Wilson), the city of Ferguson, Missouri entered a state of disarray in what many call the "Ferguson Unrest". Due to the violent nature of the protests and the civil unrest that was being caused due to the militarisation of the police forces several Ferguson locals took a stand online to report on what was happening in their community from their side of the story. Citizen Journalists in the town took to social media sites like Twitter and Facebook to spread images and videos of what was happening in their city and took it upon themselves to make sure that international attention was brought into the issue of Michael Brown's death while also attempting to hold the U.S. Government accountable for allowing the strong militarisation of the local police force. Antonio French, an alderman in the nearby city of St. Louis, spent days sharing videos and images on Twitter that demonstrated police actions that he had captured on his phone. French was later arrested for videoing police actions. French served as a prime example of what a Citizen Journalist should be; a credible witness who helped inform the public of an important political manner and spreading the news to an international level. Thanks to French and others like him, over the next few years citizen journalists would go on to document many other cases of police brutality against people of colour. On Twitter and Facebook, the Black Lives Matter campaign was born thanks to hashtags and trending topics. Ferguson is not the first example of people using their situations to become Citizen Journalist, it happens all across the world due to the ease of the internet and technology in places like Syria, Iran, Egypt, Palestine, Occupy Wallstreet, Paris during the bombings and attacks, in fact sites like twitter are becoming better for live news updates than that of most journalistic institutions due to the speed at which content can be uploaded. Citizen Journalism as the Fifth Estate In a 1787 parliamentary debate, MP Edmund Burke stated "There are three estates in Parliament but in the Reporters' Gallery yonder there sits a Fourth Estate more important far than they all. It is not a figure of speech or witty saying, it is a literal fact, very momentous to us in these times." This statement implied that journalists were meant to be a fourth established branch to the three already established branches of government. Gone are the days of the fourth estate being the newest addition, because of the rise of Citizen Journalism a new estate has risen. The so-called fifth estate is a socio-cultural reference to groupings of outlier viewpoints in contemporary society, and is most associated with bloggers, journalists, and non-mainstream media outlets. Examples of this include groups like Wiki Leaks and Guido Fox. Main criticisms Many argue that Citizen Journalism is unregulated and cannot be trusted because there is no official proof-reading. Due to this there are those who believe that the news is and can be brought across with heavy biases. Along with the lack objectivity that can come along with this, the writing can also be judged, depending on the writer, as poor quality or amateur. Moreover, as citizen journalists to not have professional equipment for gathering their evidence, the credibility is often questioned. This suggests that this form of sousveillence is not favoured as their ideologies can overlap how credible their information is. Lastly, is there an inherent issue with the definition of Citizen Jouranlism anyway? "The term citizen journalist has its problems - journalists, after all, can be citizens too". Sousveillance and Art Although the art of sousveillance is the actual act of being sousveillant, this section will explore the concept of art within sousveillance. Art. By definition it is the expression of a skill, the outcome of creativity, imagination produced visually (in form of a painting or a sculpture for example). It is the essence of a human being transferred to a physical creation, usually accessible to a public, usually able to provoke emotions. In the digital era, with the openness and sharing of contents, where pixels often replace the manual work, when it is extremely easy for an emerging or aspiring artist to put the work out there and be known, is there a loss of romanticism, of art being beauty? As with everything, from life itself, art undergoes a cycle, a development. In this era therefore it is not wrong to expect an adaptation of art to the digital, at least on more common levels. In fact, if the classical productions of the ‘big’ names can resist the new trends or even shape them keeping a more traditional line, the emerging ones are more likely to merge with the time and popular demands. The question of whether art would be turned into something less personal and unique because of crowdsource leads to the consideration of the other side of the medal, the opposite phenomenon: the trespassing of boundaries and the exploration of the new. The digital context in fact gives the artists another territory in which to grow and be recognized. Behind art, beyond beauty, there can be interest, politics, surveillance. With the unofficially coined term ‘artveillance’ exists since the 1930s circa the segment of art that is related with surveillance, a stream of creativity put to the use of an above observer. For example, with the introduction of small, portable cameras, it was made easier for photographers to take pictures secretly. The application of this resource having found a great use in the more modern times, especially after the 9/11 attacks, within intelligence agencies. A thin line of blurred shades divides surveillance and sousveillance situations in art as although an artist becomes the surveillor, it is not necessarily rising itself above the people around, therefore acting in sousveillance. For example, this two-sided surveillance and sousveillance situation is given with equipment like the digital eyeglasses (Google's Project Glass). Although there seems to be a more practical, less artistic use of the art in terms of surveillance, some artists have found the way to transform surveillance data into something more visual, for the public to experience. A good example of this can be found in the work of two men between others: Walker Evans and Trevor Paglen. Walker Evans, one of the first to combine surveillance and art, in 1938 photographed unaware passengers of the New York City Subway to try capturing everyday routines and true moments (natural, not on a set). These stealthy photographs of anonymous people were taken by the artist by hiding a camera under his coat, the shiny chrome painted black and the lens peeking between buttons. A method anticipating the use of cameras today, recording people's lives without even them knowing. Differently from this situation, which could be related closely to sousveillance, Trevor Paglen's work combines the surveillance and the art in a clearer way. He is known for capturing from public locations photos of military facilities and images of stealth-drones and tracing information-gathering satellites’ paths. In his works there is a convergence of beauty, design and political influence to explore, understand and describe the surrounding environment. Particularly interesting, with an effect that has been described as destabilizing, Trevor Paglen puts the audience in front of the core of surveillance with a video installation in the Metro Pictures gallery. More than 4,000 code names have been collected from the archive of NSA document leaked by Snowden and are slowly projected in a darkened room in rising columns. Challenging society, in a situation of art and sousveillance, art has developed in the digital world, with a modern concept: the use of technology to divulgate creativity in a union that sometimes aims to destabilize the audience. Being different, being against the norm, being against expectations. In sousveillance art finds the potential of extreme, as seen for example with the existence of pages like Régine Debatty's we-make-money-not-art where technology is used as a medium for critical discussion, a point of fusion between artists, hackers, designers, common people. Art can be found in the text itself, in the choice of words: be it the significance within (use of irony, layers of significance, inside jokes) or the choice of font. As in this page, art can be almost denatured for more informative, critical purposes. Extravagance is one of the characteristics of the online world, an element people are aware of and that allows for the freedom of expression. In this context, two more artists will be introduced: Kate Durbin and Tiffany Trenda. Sousveillance, also known as inverse surveillance, finds a wide platform in the digital world, with ordinary people observing others. Through both the equipment and the space available to the masses, art can evolve in the ordinary, from an ordinary person to other ordinary people. Art does not have to be pompous, grand, expensive to be appreciated, and this is true especially in current times. Kate Durbin for example is an artist and writer that has found a good public response on Instagram, in which she can be a surveyor of the digital landscape while being performative. The artist herself describes her work as performance in which art and personal life overlap. For example, she has been posting screenshots of conversations she has had with men on a dating site, for the entertainment of her audience but at the same time to present a real life situation that could apply to many. From posting relatively normal conversations in fact, she is collecting and presenting data for human behaviour and ability to relate, while challenging the norms of society, for example privacy. There is a connection with the audience through the small things in everyday life that could be used as microcosm for a social study on people. In the path of challenge, performance artist Tiffany Trenda's work too are significant, although she focuses more specifically on personal space and the intrusion of this. Proximity Cinema is a work done between 2013 and 2014 in which the artist wants to explore technology and the unconscious use of it. While wearing a full body suit with forty small cell phone screens imbedded, she asked people to interact with her. Phrases like ‘go ahead’, ‘don’t worry about it’ and ‘it’s ok’ were on the screens, which when touched revealed a photo of the artist's body. With this project, the artist examines the familiarity we have with devices but also destroys normal social limits, presenting our identity through technology. An example of performance art to challenge the surveillance-based era, where we as users are unaware of how exposed our identity is. From personal expression to mass rebellion, art finds its way to the public. Be it through surveillance or sousveillance, there is a visible binary between the artist exploring the surrounding environment and the artist exploring itself. Interestingly, the term ‘sousveillance’ is used by Stefan Sonvilla-Weiss to intend self-surveillance in the process of showing himself to the world. On this line of thought, Avi Rosen can be used as an example, with the project ‘Digital Skin 2' in which data visualizations of various nature and digital lifelogging intertwine. There is also a parallel between the presentation of the self in the digital dimension and in the real world. The use of surveillance and sousveillance as an art form has also allowed people to explore political issues within the world. In 2008 Kirsty Robertson released an article which explored various artists and their use of surveillance and sousveillance. Robertson draws upon examples of using surveillance/sousveillance as an artistic form to draw attention to political issues. One of these artists was Wafaa Bilal’s Domestic Tension (2007). Within his performances surveillance was not the main subject but was used in order to uncover the power relations surveillance creates. Bilal’s performance was most effective at portraying these ideas. In 2007 Iraqi-American artist Bilal locked himself in a studio consumed with video cameras which streamed live to internet users who were granted the ability to shoot Bilal with a paintball gun linked up to the computer. His main intention for this was to highlight the daily lives for people in Iraqi suffering with the civil war. He wanted to use the internet and voyeurism with the purpose of “instigating political dialogue through participatory action” (Bilal, 2007). Therefore, surveillance can also be identified as an art form as there has been a rise in artists focusing their performances within this field. Schrodinger’s Cam Another aspect of artistic discourse and philosophical exploration was the re-ectionism of uncertainty. A large number of wireless webcam shirts were made, but only some of them had cameras in them. They were then shuffled and distributed widely. Honestly not knowing whether or not one was wearing a camera added a new dimension to putting the uncertainty principle into artistic practice. Moreover, consider, for example, the sousveillance underground" as a probe into New York proposed ban on photography in subways. An exhibit of subway photographs is expected to follow. Heisenberg Uncertainty with Schrödinger's Cam: The Maybecamera A large number of wireless webcam shirts were made, but only some having cameras. These were shuffled so each wearer did not know whether or not theirs had a camera in it. Close up picture of one of many maybecameras showing a detournement, reversalism/re-ectionism, and deconstruction of the typical language (text) of surveillance. A number of people wore these gambling (e.g. Casino Niagara, etc.) without incident. This suggests that perhaps the guards don't read shirts. The wearer's don't know which shirts contain wearable wireless web cameras and which shirts don't. The author's maybecamera design is spreading around the world. Dr. S. Pantagis, a physician at a New York hospital, made an initial batch of 25 of these to distribute to New York poets, followed by a larger production run. As seen in a New York department store's security camera. Closeup view seen by security camera. Sousveillance and art? Yes, it is a possible and existing relationship, where the artists challenge surveillance while revisiting the way in which art can be presented. Even though some articles (like Jonathan Jones's for the guardian “will the digital age kill off art?”) arise doubts regarding the future of art in the digital world, it is undeniable how the easier connections within the world allows for the development and expression of both genders. The strong masculine presence in the world in fact has a less effective influence in art's online emergence, where women can have a strong voice, in an environment of equality that can be translated to the physical world itself, as shown by events like the International symposium on electronic art. =Public Reactions to the Act of Surveillance and Sousveillance= There are two opposite public reactions towards the Act of Surveillance and Sousveillance. Some consider surveillance as a violation towards their right of privacy, and sousveillance is important for monitoring the government's decisions, while the other think that surveillance system is necessary for preventing criminals and ensuring safety. However, it is agreed by most of the citizens that ordinary surveillance by legal departments are acceptable, as long as their detailed daily lives are not under surveillance day and night. Strapping a camera to us gives us absolute control resulting in us becoming the Sousveillar, yet the camera is still capturing everyone we encounter within that time. Does this not then result in us potentially becoming the Surveillars? It can then be suggested that being represented as a Surveiller may result in people acting differently towards you. There has been a surge into the investigation of forms of Sousveillance such as wearable devices with the intention to confront Surveillance. Mann, Nolan and Wellman (2003) carried out research involving the video recording of the surrounding (surveilled) environment in order to transform Surveillance techniques into Sousveillance with the outcome of ‘watching the watcher’. This research found that many factors (including type of technology, location and the presentation/representation of technology) had a profound effect on participants which either made them feel empowered or vulnerable. The investigation discovered that people felt most at ease when they could see both the device which was recording and the footage being recorded. This form of recording then creates a new term known as ‘Coveillance’. Coveillance is neither Surveillance nor Sousveillance but is created when people can see the camera and the camera footage simultaneously. In sum, Coveillance = people being aware of the voyeurism taking place. Another interesting finding from this investigation was that authorities (security guards) would become more accepting when the sousveiller would explain that they had no control over the device. In contrast, when it was obvious the sousveiller has absolute control authorities would be more confrontational. David Bollier (2013) provides possible explanations for this reaction from security. The first possible explanation for this may be due to the idea of shopping malls trying to prevent criminals from having the ability to discover cracks in security systems which could potentially result in robberies. Moreover, retail experts stated that some stores do not allow photography due to the possibility of shop rivalries infiltrating in order to compare sale prices and retail displays. Another explanation may be due to the idea that sousveillace challenges the power relations of surveillance as it reinstates a sense of equality amongst people. Furthermore, this may convey that sousveillance levels the playing field of surveillance as it is no longer in power. William Gibson suggests if everyone became sousveillers then surveillance would eventually be defused as it would no longer serve a purpose. The implications of surveillance and sousveillance are often described as liberating, fair and democratic. However, when analytically proceeding towards the long-term macro sociological implications, the perspective becomes more troubling. The social control of surveillance by governments over citizens, mainly illustrated in totalitarian regimes, has throughout history resulted in a sense of fear. Jeremy Bentham's (1838) historical consideration of the ‘panopticon’ and a social system where the monitoring and observation made people aware of the fact that they might be monitored, although didn't know. This impact was found, according to Michel Foucault in writings from the 1980s, to implicate that the monitoring through both symbolic and pragmatic use of the panopticon within a specific social context (such as a prison) could influence people to think and act in a certain way based on the fear that they could be monitored, thus given rise to opportunities for social control. The panopticon was part of the industrial revolution that embraced a need for industrial monitoring where owners and other people in power could monitor public places just prisons and factories. Surveillance in Pop Culture Pop culture has embraced the ever widening grasp that surveillance has on our society. Over the years there have been several books, TV shows, films and even video games that have embraced the role that security and surveillance now have. George Orwell's Nineteen Eighty-Four was a book that life under an omnipresent totalitarian state, and is probably the most prominent example of surveillance in pop culture. The book follows a "Big Brother" program that acts as an over viewer to the characters of the novel, it heavily depicts the use of CCTV cameras. On 27 May 2014, Ubisoft Studios released their game Watchdogs which centres on Aidan Pierce, a master thief, hacker, and self-appointed vigilante who is able to hack into the city-wide mass surveillance and infrastructure control systems to gather information on and resources from any individual he wishes, to evade law enforcement, to stop crimes before or as they happen, to commit crimes himself if needed, and to manipulate various objects and function of the infrastructure to his advantage. The game has you hack into several major well known systems and work with cyber terrorists to steal money from corrupt companies and politicians. The game also had a strong focus on using surveillance cameras to spy on people. =Being the Sousveiller= There was also a thought-provoking discovery when the sousveillers were asked how they felt when carrying out the research. The participants who performed sousveillance felt it made them empowered. While recording there were a large range of emotions from the people being surveilled but the sousveiller felt it was stimulating to show people that there is a lot of things going on (regarding surveillance) that we are unaware of. One participant provided an interesting point suggesting that surveillance is a game in which we feel part of but in fact we are on the other side to it due to the lack of control. On the other hand, it was suggested that sousveillance is more authentic as everyone being recorded is made aware of it. Therefore, it can be argued that we all become part of the act of sousveillance as it is not hidden. However, this idea can be questioned when people start to record with hidden cameras. The act of recording in secret may then complicate the idea of sousveillance. Does this then turn sousveillance back into surveillance? These complex ideas and the constant intertwining of surveillance and sousveillance continues the ongoing research into this field. =References=
WIKI
Ferguson rifle The Ferguson rifle was one of the first breech-loading rifles to be put into service by the British military. It fired a standard British carbine ball of .615" calibre and was used by the British Army in the American Revolutionary War at the Battle of Brandywine in 1777, and possibly at the Siege of Charleston in 1780. Its superior firepower was unappreciated at the time because it was too expensive and took longer to produce – the four gunsmiths making Ferguson's Ordnance Rifle could not make 100 in 6 months at four times the cost per arm of a musket. Details The breech of the weapon is closed by 11 starting threads on a tapered screw, and the trigger guard serves as the crank to rotate it. One complete turn dropped the screw low enough to drop a round ball into the exposed breech followed by a slight overcharge of powder, which was then sheared to the proper charge by the screw as it closed the breech. Since the weapon was loaded from the breech, rather than from the muzzle, it had an amazingly high rate of fire for its day, and in capable hands, it fired six to ten rounds per minute. To prove the potency of his invention, Patrick Ferguson conducted a series of tests in which he, with a high degree of accuracy, fired 6 shots per minute at a target 200 yards distant from a stationary position, and 4 shots per minute while advancing at a marching pace. He then wet the inside of the barrel, waited another minute, and then fired the weapon again, to prove its reliability regardless of weather conditions. The action was adapted from the earlier 1720 Isaac de la Chaumette design by Major Patrick Ferguson (1744–1780), who redesigned it around 1770. He received an English patent in December of 1776 (number 1139) on details of the design. Roughly one hundred of the Ordnance rifles were manufactured by four British gun firms, Durs Egg being the most notable, and issued to Ferguson's unit when its members were drawn from numerous light infantry units in General Howe's army. The largest battle in which the rifles were used was the Battle of Brandywine, in which Ferguson was wounded. While he recuperated, his Experimental Rifle Corps was subsequently disbanded. This was in no way due to "excessive losses" or any political machinations; the unit was an experiment, and the men were always slated to return to their original units. Ferguson's men went back to the light infantry units they had originally come from, and his rifles were eventually replaced with the standard Long Land Pattern musket. But as most surviving Ferguson Ordnance Rifles known to exist in the U.S. today were spoils of war taken North during the American Civil War, the usage of these weapons remain in dispute as to any possible deployment of Ferguson rifles in the Southern theater of the American Revolutionary War. The two main reasons that Ferguson rifles were not used by the rest of the army: * The gun was difficult and expensive to produce using the small, decentralized gunsmith and subcontractor system in use to supply the Ordnance in early Industrial Revolution Britain. * The guns broke down easily in combat, especially in the wood of the stock around the lock mortise. The lock mechanism and breech were larger than the stock could withstand with rough use. All surviving military Fergusons feature a horseshoe-shaped iron repair under the lock to hold the stock together where it repeatedly broke around the weak, over-drilled out mortise. However, despite an unsubstantiated claim that one of the actions was found at the battle site of Kings Mountain, South Carolina, where Ferguson was killed in action, the only piece of a Ferguson ever found in America from a gun used in action is a trigger guard found in excavations of a British army camp in New York City. The only association the Ferguson rifle has with the Battle of Kings Mountain is that Patrick Ferguson was there. Experience with early modern replicas, made before the proper screw and thread pitch of the breechblock were rediscovered, seemed to indicate that while reloading was rapid, it seemed to be necessary to first lubricate the breech screw (originally with a mixture of beeswax and tallow) or else the (replica) rifle would foul so much that it needed cleaning after three or four shots. However, through the research efforts of DeWitt Bailey and others, the properly made reproduction Ferguson rifle, made according to Patrick Ferguson's specifications of the 1770s, can fire beyond sixty shots. In popular culture * The Ferguson Rifle, a book by Louis L'Amour, is not about the rifle specifically, but instead a historical fiction story about someone going out west who was given one of the rifles by Ferguson. * The rifle was used by Dewey Lambdin for his character Alan Lewrie, who picked one up at Yorktown. * The video game Empire: Total War has a unit of "Ferguson Riflemen," which use the Ferguson rifle and are a unique unit recruitable by Great Britain. * In the video game Rise of Liberty, the Ferguson rifle appears as a select-able weapon. In game it reloads realistically, using a breech reloading mechanism. Strangely, it is usable by both the Colonists and the British, despite it only being historically used by the latter. * In the video game GUN a Ferguson rifle is used by Ned White, the father of protagonist Colton White. It is the third of three single-shot rifles overall (the first two being long-range sharpshooter rifles) and the second of two standard rifles acquired in the game, the other being a Winchester 1866 repeater. * In the book On Basilisk Station, the first book of David Weber's Honor Harrington series, an alien firearm is compared to a Ferguson rifle. * The rifle is mentioned several times in Geoffrey Watson's book Nelson's Fighting Cocks. * In the book Like A Mighty Army, the seventh book in David Weber's "Safehold" series, a weapons designer for the antagonist, the established church, invents a Ferguson rifle. * Thomas Keneally's 1967 Miles Franklin-winning novel, Bring Larks and Heroes, opens with young Corporal Halloran striding through the 'Australian' bush in the early days of convict settlement. "Anyone who knew firearms would take great interest in the musket [sic] he's got in his right hand. It's a rare model that usually hangs in the company commander's office." Then in chapter 3: "Halloran carried… a breech-loading Ferguson, a wonder of its times, capable of downing three men a minute." * In S2E3 of the Netflix series Frontier the character Declan Harp and 2 companions are fired upon by a bounty hunter armed with a Ferguson rifle. Charlie, one of the companions, and a slave earlier freed by Harp, identifies the Ferguson rifle by the bounty hunter's high rate of fire and warns Harp of the rifle's 300 yard range. Harp later damages the rifle with a hatchet. * In H. Beam Piper's parallel universe story "He Walked Around the Horses," the Ferguson breech-loading rifle is mentioned as the primary reason why the British did far better during the American War of Independence than in "our" history, although independence was still achieved. * In the book King's Mountain by Sharyn McCrumb the Ferguson Rifle is mentioned in great detail and also the story of its development is told in fairly accurate style. Patrick Ferguson is, of course, a main character in this historical fiction piece, but the historical details are correctly rendered. The Ferguson Rifle is recounted as an emotional catalyst for the actions and frustrations of Patrick Ferguson, and he is mentioned as speaking of the rifle in great frustration. The account of the trial of the gun, and his subsequent injury, is recounted in the book by the character of Ferguson himself. There is a bit of poetic license taken in that Ferguson states that he had the opportunity to shoot George Washington with the gun, but was held back by the man's "aristocratic" demeanor. * A Ferguson rifle is carried in "The Stonecroft Saga" by B. N. Rundell, it was collected during the Revolutionary War and carried west. The breech loading is not well described but the high rate of fire gets the explorers out of a few tight spots. * The novel "What Remains of Heaven" by C.S. Harris features a Ferguson rifle as a plot point. * The Ferguson rifle can be bought in the game European War 4 Napoleon, the rifle gives +6 infantry attack , the description says "Advanced Ferguson rifle with extremely high firing rate"
WIKI
How to fix corrupted .pst (outlook data file) for Microsoft Outlook? In some rare circumstance, you may be unable to open your datafile (inbox) in Outlook (It  happens from the corruption of .pst file. So it can happen to any profile) and Outlook error message indicated a corruption in your .pst file. To resolve this issue, you need to run Inbox Repair tool in Outlook as mentioned in http://support.microsoft.com/kb/272227. To run this tool, follow below steps: 1. Click Start, and then point to Find or to Search, depending upon your operating system. 2. In the Search for files or folders named box, type scanpst.exe (It is installed with outlook installation) 3. Double click the Scanpst.exe file to open the Inbox Repair Tool. 4. Type the path and the file name of the personal folders (.pst) file or click Browse to locate the file by using the Windows file system. 5. Click Start to repair the damaged .pst file. Comments
ESSENTIALAI-STEM
Cobocards CoboCards is a web application for creation, study and sharing of flashcards. They also provide mobile application for Android and iOS mobile devices, to help study of flashcards on the move. Based on the freemium model, CoboCards provides users a free account with two card sets compared to paid subscription with premium features such as unlimited card sets, Leitner system based trainer and collaborative learning. History CoboCards is a project of Jamil Soufan and Tamim Swaid. Tamim Swaid has developed the concept and interface of a collaboratively usable e-learning platform in his diploma thesis at the University of Applied Sciences in February 2007. In January 2010 they founded the CoboCards GmbH (limited company) together with Ali Yildirim. CoboCards is supported by its strategic partners Prof. Schroeder (RWTH Aachen University), Prof. Oliver Wrede (University for Applied Sciences Aachen) and Prof. Klaus Gasteier (University of Arts Berlin). With the idea of creating and studying flashcards online and offering an active control of learning progress they won the start2grow business idea competition in September 2009 (€25.000 ). Additionally CoboCards was funded by German Authorities with approximately €100.000.
WIKI
Page:Compulsory Quarantine of Certain Persons Arriving at Hong Kong Regulation (Cap. 599C).pdf/1 Compulsory Quarantine of Certain Persons Arriving at Hong Kong Regulation L.N. 12 of 2020 B239 L.N. 12 of 2020 Compulsory Quarantine of Certain Persons Arriving at Hong Kong Regulation Contents
WIKI
Wikipedia:Featured list candidates/List of tallest buildings in Melbourne/archive1 * The following is an archived discussion of a featured list nomination. Please do not modify it. Subsequent comments should be made on the article's talk page or in Wikipedia talk:Featured list candidates. No further edits should be made to this page. The list was archived by PresN via FACBot (talk) 23:33, 20 January 2017 (UTC). List of tallest buildings in Melbourne * Nominator(s): —MelbourneStar ☆ talk 10:31, 6 October 2016 (UTC) I am nominating this for featured list because the list is quite engaging with the reader, with interesting graphics and images. Additionally, the content is regularly up-to-date, sources are not simply "Emporis" or "Skyscrapercity" forums (an issue with other FL tallest building lists). Furthermore, list employs a similar style/format to Hong Kong and New York City tallest buildings lists, in that it details the history of skyscrapers within Melbourne, their use, geographical location, etc. —MelbourneStar ☆ talk 10:31, 6 October 2016 (UTC) * Comment very thorough list with clearly much effort put into it. I do have the sense that it's a bit too much however, and could be trimmed. * First, the table is too wide and won't fit on most computer screens, so there is accessibility issues. The records columns on the far right, for example, can simply be added to notes. As a column they are mostly blank anyway. * Featured lists no longer begin with "This list ranks completed and topped out Melbourne skyscrapers"... You can simply start it with Melbourne has X skyscrapers that stand at least 150 metres tall based on standard height measurement" * You don't need a section called "Cityscape" if there is no text to go with it. You can just move that picture to be directly above the list, and save a bit of space. * I do have a big issue with "proposed" or "approved" or "cancelled" buildings being on this list as many of them will not ever end up being built, running afoul of WP:CRYSTAL. And "vision" buildings should not be on the list unless they have their own wikipedia page. Otherwise there is notability issues. * This is just a first pass, hope it helps! Mattximus (talk) 02:06, 15 October 2016 (UTC) * Hi thanks very much for your review. * I'll respond to each point you've made: * Table size has been reduced; image sizes have been reduced (120px → 100px); records column has been removed, content (already) merged into notes, per your advice. * Lead has been reworded per your advice. * Cityscape section has been removed, image has been retained in following section, per your advice. * Tricky part: I'll note, such section/s re "proposed" "approved" "cancelled" buildings are included in most tallest buildings featured lists (Hong Kong, Chicago, New York City, to name a few) – Melbourne has the same format. Nevertheless, regarding this list in question: no building listed is unsourced (all projects are verified by reliable sources provided); additionally, re Crystal: this list isn't necessarily aserting that the proposed/approved projects will be built, it's simply displaying information about active projects that have been lodged for planning approval to the State Government. Furthermore: I have been actively creating articles on buildings listed in those sections, whether they be proposed, approved, cancelled or vision. * I hope I make sense. If you would like clarification, please let me know. Again, thank you for taking your time to review this list, I really appreciate it. Kind regards, —Mel</b><b style="color:#F20">bourne</b><b style="color:#F73">Star</b> ☆ <sup style="color:#407">talk 12:08, 18 October 2016 (UTC) Comments by Dudley there are comments here that have been waiting to be addressed for over a month, are you intending to return to this candidate? If not, or if we received nothing in the next few days, we'll archive this nomination. The Rambling Man (talk) 22:20, 4 December 2016 (UTC) * I have some copy editing comments, but these may be just my taste so ignore them if you disagree. * two minds are better than one, so I don't mind addressing the concerns of another editor! :) I appreciate your input, and will answer every concern in italics as follows. —<b style="color:#E22">Mel</b><b style="color:#F20">bourne</b><b style="color:#F73">Star</b> ☆ <sup style="color:#407">talk 05:50, 14 December 2016 (UTC) * I think it would be helpful to define a high-rise building in the first sentence - presumably one of over a specified height? * I've linked high-rises, as to encompass the various definitions of such. * I think you need to explain your criteria for inclusion in the article in the lead. * ''It opens with the amount of buildings in general the city comprises, and then it specifies the amount of skyscrapers; the actual list within the page lists only skyscrapers (and it is defined within that section that only skyscrapers are included). * "completed and or topped-out". What is the difference? * Building terminology present throughout similar lists; topped-out proceeds completion in that the skyscraper or building is architecturally or structurally complete -- but not open. Topped-out is also wiki-linked. * "Of the ten tallest buildings in the Australia". The second "the" looks like a typo. * Sentence should read "of the ten (10) tallest buildings in Australia", the ≠ ten. * "other locations of prominent skyscrapers and tall buildings in Melbourne, include: Carlton, Docklands, Southbank, South Melbourne, South Yarra and St Kilda Road." I would delete the first comma and possibly also the colon. * Agree, done. * "a western skyline and an eastern skyline. These two skylines are divided by the Yarra River". Suggest "These are divided by the Yarra River". * Agree, done. * "The western side consists of more density than the east". This sounds a bit odd to me. Maybe "Buildings are more densely packed in the west than the east." * Agree, done. * "120 Collins Street and 101 Collins Street, respectively" Why "respectively". * The sentence in full: "city's tallest buildings–120 Collins Street and 101 Collins Street, respectively" – the use of 'respectively' is to suggest that 120 Collins is taller than 101 Collins (they are the "city's tallest", but one is taller than the other, hence the order of the sentence). If you believe it still doesn't make sentence, iit can be removed. * "tallest by roof" What does this mean as opposed to just tallest? Excluding the roof? If so, it would be helpful to explain. * So, 120 Collins is taller than Rialto because it has a spire that extends past Rialto's roof (which has no spire/architectural feature (as defined by CTBUH)); despite this, the roof of 120 Collins is shorter than Rialto. I have clarified the sentence: "two of the city's tallest buildings to architectural feature–120 Collins Street and 101 Collins Street, respectively". * "and whilst it was demolished in 1980," Maybe "which was demolished in 1980;" * Agree, done. * "Skyscrapers in Melbourne have a long and illustrious history." "illustrious" is POV. * Agree, done. * "35 collective years" I think "in total" would be clearer than "collective", and you need to specify up to what date, presumably 2016. * Agree, done; sentence specifies that Melbourne comprises the most skyscrapers since 2014 . * "The APA Building (Australian Building) was one of Australia's first skyscrapers and the third tallest building in the world" This repeats what is said above. I suggest deleting the paragraph and merging into the comments about the APA Building above. * Agree, done. * More to follow, but the detail seems excessive for a list article, as an editor observes above. The 'History and specifications' section might be transferred to the section on skyscrapers in Architecture in Melbourne. Dudley Miles (talk) 13:48, 28 October 2016 (UTC) * I have modelled much of the content from List of tallest buildings in New York City and List of tallest buildings in Hong Kong -- both FLs, my contention is that each section -- history, height limits, precincts, functions -- pertain directly to skyscrapers in Melbourne. Architecture in Melbourne is more broad, and from my understanding, is about design as opposed to height and location. * More comments. * thank you for your further comments! I've responded to your concerns, hope that suffices. —<b style="color:#E22">Mel</b><b style="color:#F20">bourne</b><b style="color:#F73">Star</b> ☆ <sup style="color:#407">talk 10:17, 28 December 2016 (UTC) * "as the tallest building in Australia as well as the Southern Hemisphere" Maybe "as the tallest building not only in Australia but in the Southern Hemisphere" * Perfect, done. * The image and notes column should not be sortable. * Agreed, done. * The notes column is squeezed into a very narrow column on my screen which is difficult to read due to the excessive number of columns. The New York and Hong Kong lists you cite only have the completion date, not proposed and started. I agree that the additional info is useful, but not at the expense of putting in too many columns. * So, I've removed the proposed and under-construction columns; I've added such information in the notes section where applicable. Better? * You might consider changing the precinct column to one for coordinates, as in the Hong Kong list, which would be more useful for readers. Dudley Miles (talk) 21:15, 27 December 2016 (UTC) * I've added coordinates for each individual building under the 'precincts' (now 'location') heading; I've retained the actual precincts for clarity (Melbourne is made up of various localities) + we do have a section explaining that. * Support. A first rate list. Dudley Miles (talk) 10:38, 28 December 2016 (UTC) * I've only noticed Dudley's concerns now, as I've had a few busy weeks IRL of recent and without being pinged I have regrettably forgotten about the FA nomination. Nevertheless, I intend to respond to Dudley's concerns within the next few days. Kind regards, —<b style="color:#E22">Mel</b><b style="color:#F20">bourne</b><b style="color:#F73">Star</b> ☆ <sup style="color:#407">talk 12:03, 5 December 2016 (UTC) * No problem, just checking that the nomination wasn't dead! Cheers. The Rambling Man (talk) 12:28, 5 December 2016 (UTC) This nomination has been open for more than 3 months with only a single supporting editor; it additionally has seen no activity for 3 weeks. I'm going to go ahead and close it as stalled in order to clear out the FLC queue. FLC is currently experiencing a lowered level of review activity; nominators are encouraged to review multiple other nominations for each of their own in order to ensure that all nominations receive sufficient attention. -- Pres N 16:37, 20 January 2017 (UTC)
WIKI
Mike Pompeo's Faustian bargain | TheHill Mike PompeoMichael (Mike) Richard PompeoDiplomat who raised Ukraine concerns to testify in Trump impeachment probe Overnight Defense: Trump weighs leaving some troops in Syria to 'secure the oil' | US has pulled 2,000 troops from Afghanistan | Pelosi leads delegation to Afghanistan, Jordan Mulvaney faces uncertain future after public gaffes MORE is a large man with even larger political ambitions: a Donald TrumpDonald John TrumpTrump says he doesn't want NYT in the White House Veterans group backs lawsuits to halt Trump's use of military funding for border wall Schiff punches back after GOP censure resolution fails MORE loyalist, who'd likely win a Kansas Senate seat next year and — whoever captures the White House in 2020 — could very well emerge as the next Republican candidate for President.  However, like most anyone associated with Trump, a taint inevitably sets in. For the Secretary of State, it's the current Ukrainian scandal. The revelation, thanks to a whistleblower, that Trump in a call to the President of Ukraine this summer pressured him to dig up dirt on former Vice President Joe BidenJoe BidenTrump says he doesn't want NYT in the White House Warren to protest with striking Chicago teachers Schiff punches back after GOP censure resolution fails MORE, a possible presidential rival next year, was a political bombshell. The odds are the House will vote to impeach the president before year’s end — though a Senate conviction remains unlikely at this stage, even as public opinion shifts markedly against Trump. The administration official most implicated in the controversy at this point seems to be Pompeo. Initially, he feigned ignorance. But after the Wall Street Journal disclosed that Pompeo actually was listening in on the call, he was forced to admit it. There are strong indications that Trump was threatening to hold up critical U.S. assistance to Ukraine — even as that country tries to stave off a Russian invasion and domination — unless that government tried to smear Biden. (Biden's son worked for a Ukrainian energy company, a legitimate issue, but the former Vice President, according to every reliable source, acted properly in carrying out U.S. policy to pressure Ukraine to more aggressively attack corruption.) As more stuff surfaces, with at least two intelligence whistleblowers, it's hard to envision that Secretary Pompeo, a trusted Trumpite, was in the dark. The president's out-of-control personal lawyer Rudy GiulianiRudy GiulianiTrump says he doesn't want NYT in the White House Diplomat who raised Ukraine concerns to testify in Trump impeachment probe Pelosi releases 'fact sheet' saying Trump has 'betrayed his oath of office' MORE, and two of his associates (now under indictment), orchestrated the removal of the respected American ambassador to Kiev, Marie Yovanovitch. Her sin: behaving as a good diplomat, unwilling to play ball in the smear Biden effort or to help Giuliani and his sidekicks in any business deals. The Secretary of State pushed her under the bus. This only exacerbated historically low morale at the State Department and foreign service, where people are working under a boss who cares chiefly about the president's and his own political calculations. As the House Intelligence committee requests records and testimony on the Ukrainian scandal, Pompeo is in full stonewall mode. These congressional demands, he charges, are “an attempt to intimidate, bully and treat improperly the distinguished professionals of the Department of State, including several career foreign service officers.” That's rich — on so many levels. Mike Pompeo standing up for State Department and foreign service officials? Ask former Ambassador Yovanovitch about that. He’s a classic bully with a reputation of going ballistic if he doesn't get his way. Nowhere was this more evident than in the special house probe into Benghazi, a phony scandal seeking to capitalize on the murder of four Americans by Libyan terrorists during the Obama Administration. Back then, Pompeo bellowed about the lack of cooperation from the Obama administration — notably the State Department — over documents and testimony. In reality, that Republican-led select committee interviewed over 60 State, Defense and intelligence agency officials and got some 75,000 pages of documents. Yet Pompeo now embraces the notion of preventing career diplomats from sharing information with Congress, even though such withholding is contrary to the law. All this could complicate Pompeo’s political plans. Even if Pompeo is not implicated in the scandal, next spring Trump — still in office but reeling — might see any departure as a rat leaving a foundering ship. This President has one loyalty — to himself — and his past treatment of people who have left his administration bodes ill for Pompeo. Secretary of State Pompeo also can't escape blame for the current debacle in Syria, where Trump sold out America's Kurdish allies, potentially paving the way for an ISIS revival. It's getting to him; when asked legitimate questions about Ukraine, Pompeo snapped that the reporter must be working for the Democratic National Committee.  Washington and Kansas Republican strategists are eager for him to run. The last Democrat to win a Senate seat from Kansas ran before Franklin D. Roosevelt became president. The state's Republicans, however, are engaged in a bitter, ideological war that led to the election of a Democratic governor last year. Pompeo, perhaps with an eye to this Senate race, has lost weight. The problem is a piece of it appears to have come out of his soul. Albert R. Hunt is the former executive editor of Bloomberg News. He previously served as reporter, bureau chief and Washington editor for the Wall Street Journal. For almost a quarter-century he wrote a column on politics for The Wall Street Journal, then the International New York Times and Bloomberg View. Follow him on Twitter @alhuntdc. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
File talk:NatGasProcessing.png Thanks, very informative. One question, what about Methane, shouldnt it show as a red somewhere in the diagram? — Ramit (talk) 15:54, 10 April 2014 (UTC)
WIKI
0 How to replace only 1d values in 2d array after filter using numpy in python without loop i.e in pythonic way. I want to filter only t2 rows and replace values in second column ( middle column ). example: >>> x = np.array([['t1',10,20],['t2',11,22],['t2',12,23], ['t3',21,32]]) >>> x array([['t1', '10', '20'], ['t2', '11', '22'], ['t2', '12', '23'], ['t3', '21', '32']], dtype='|S2') replace_value_for_t2_col1 = [100,101] so expected output is array([['t1', '10', '20'], ['t2', '100', '22'], ['t2', '101', '23'], ['t3', '21', '32']], dtype='|S2') What i tried was, Filter rows for t2 >>> x[x[:,0]=='t2'] array([['t2', '11', '22'], ['t2', '12', '23']], dtype='|S2') >>> x[x[:,0]=='t2'][:,1] = np.array([101,102]) Seems right, but not replacing. i guess it make a copy when we slice using [:,1], so its not changing in same array. Please suggest me any brilliant ,simple and pythonic ideas, techniques. 4 Contributors 4 Replies 22 Views 2 Years Discussion Span Last Post by sneekula 0 I would just temporarily convert back to a Python list: import numpy as np x = np.array([['t1',10,20],['t2',11,22],['t2',12,23], ['t3',21,32]]) print(x) # test # convert temporarily to Python list again mylist = x.tolist() mylist2 = ['100', '101'] n = 0 newlist = [] for line in mylist: if line[0] == 't2': line[1] = mylist2[n] n += 1 newlist.append(line) print(newlist) # test # convert back to numpy array x = np.array(newlist) print(x) # show result This article has been dead for over six months. Start a new discussion instead. Take the time to help us to help you. Please be thoughtful and detailed and be sure to adhere to our posting rules.
ESSENTIALAI-STEM
Page:The Imperial Gazetteer of India - Volume 10 (2nd edition).pdf/389 NORTH-IIESTERN PROVINCES AND OUDH. 377 Districts. The total export of wheat increased from 2,922,573 maunds in 1879-80 to 4,599,140 maunds in 1882-83 Other Food Staples.-- Rice is largely grown, but the imports as a rule balance the exports. The imported rice comes from Calcutta; the exported rice goes to Rajputána and the Punjab. This staple is mostly grown in the sub-Himalayan region, and in the eastern Districts of the Provinces. Area under rice in 1882-83—2,876,210 acres; exports, 569,196 maunds ; imports, 795,535 maunds. Barley is seldom grown alone, except in the Benares Division; in Rohilkhand it is generally mixed with wheat, and in Agra and Allahabad with gran. It requires less manure and irrigation than wheat. Barley was sown, either alone or with wheat and pulse, over 4 million acres in 1882-83. Maize is largely cultivated everywhere except in Bundelkhand. It requires good soil with plenty of moisture. About million acres were under maize in 1882-83. Millets and pulses, comprising joár, bájra, urt, and moth, were raised on 21 million acres in 1882–83. Two or more of these are sown on one field, a method that fornis the cultivator's insurance against total loss, as the chances are some one of the crops will coine up. As a rule, the heads of joár and bijra are cut off and carried to the threshing-floor before the stalks are cut. Gram, for food, as well as fodder for cattle, is sown with wheat and barley or alone, over 4 million acres. It is a hardy crop. Of Non-food Crops, cotton forms perhaps the most important staple, being grown on 5.8 per cent. of the total cultivated area, and 1 per cent. of the area under autumn crops. It is cultivated most extensively in Aligarh, Muttra, Agra, and Banda Districts, where it occupies generally over 10 per cent. of the total cultivated area. Area under cotton in 1882-83, 403, 170 acres. The oil-seeds are rape, mustard, linseed, and til; the first three grown for the spring and the last for the autur harvest. Cotton-seeds are seldom used for oil, though very generally for fattening cattle, much in the same way as oil-cake is u Europe. The export of oil-seeds in 1882-83 was 4,667,058 maunds. The principal sugar-cane growing tracts are Saharanpur, Muzaffarnagar, Meerut, Rohilkhand, and the portion of the Benares Division lying between the Ganges and Gogra. It is a curious fact that the cane is no longer an important crop in the Districts south of the Jumna, although the presence of old disused stone mills points to sugar having been formerly manufactured there. Area under sugar-cane in 1882–83, 883,323 acres. Special Crops—Tea.—The cultivation and manufacture of tea in the North-Western Provinces is confined to the sub-montane tracts in Kumáun, Garhwal, and Dehra Dún. Two indigenous plants (Osyris Nepalensis and Eurya asp.), very similar in appearance
WIKI
AWS Batch: Introduction and Step-by-Step Guide to Automate an AWS Batch Job January 21, 2022 | Comments(0) | AWS Batch is a beneficial service for batch computing heavy workloads. It removes the complexity of having a complete infrastructure setup and maintaining it. Also, it decreases the cost of the environment and is open to several types of automation to run the batch job. AWS Batch is a very effective service introduced by the AWS Team. It helps to run batch computing workloads on the AWS Cloud. We can also say that it is a service that helps us use aws resources more effectively and efficiently, making the aws cloud more convenient to its users. This service also provisions the underlying resources efficiently once job is submitted. It helps to eliminate capacity constraints, reduce compute costs, and deliver results quickly. What is Batch Processing or computing? It is used for running high-volume, repetitive data jobs at our ease. This method allows its users to process data when all the computing resources are available and minimize user Interaction. AWS Batch makes all the required resources available only when the user needs to process any data, or we can say to run any computing job. Once the job completes, it automatically releases the resources saving some money for the user. Automating an AWS Batch Job To run a Batch process, we need to create and run a job; a job can be created and run directly from the console. But in most use cases, users need to automate this process so that whenever they want to run any batch job, they don’t need to create and run the batch job manually. The two most effective ways for automating this process are using CloudWatch Events and AWS Lambda. We can easily trigger these services to create and run a job on the AWS batch. Components of AWS Batch with Simple steps of Batch creation AWS Batch Job 1. Compute Environment: It is a set of managed or unmanaged compute resources that are used to run jobs. Using managed to compute environments, users can specify desired compute type (Fargate or EC2) at several levels of detail. Users can easily set up compute environments that use a particular EC2 instance, any specific model such as c5.2xlarge or m5.10xlarge. Users can also choose to specify that they want to use the newest instance types. They can also set the minimum, desired, and maximum number of vCPUs for the environment and the amount they are willing to pay for a Spot Instance as a percentage of the On-Demand Instance price a target set of VPC subnets. AWS Batch efficiently launches, manages, and terminates compute types as needed. Users can also manage their computing environments. As such, they’re responsible for setting up and scaling the instances in an Amazon ECS cluster that AWS Batch creates for them. AWS Batch Job 2. Job Queues: Any Batch is submitted to a particular job queue, where the job resides until it is scheduled onto a compute environment. Users can easily associate one or more compute environments with a single job queue. It also gives us leverage to assign priority values for these compute environments and even across job queues themselves. For example, user can easily give high priority to any time-sensitive job and a low priority to jobs that can be run anytime when compute resources are cheaper. AWS Batch Job 3. Job Definitions: If is basically a blueprint for the resources in your job that specifies how jobs are to be run. You need to provide a suitable IAM role to the job to access the underlying resources easily. It also allows you to specify both memory and CPU requirements. It can also easily control container properties, environment variables, and mount points for persistent storage. You can also provide any commands we want to execute when your job is run. Note: – Many of the specifications provided in the Job Definition can be overridden by specifying new values when submitting individual Jobs. AWS Batch Job 4. Creating a Job: A job is created to execute the batch process. Once you submit a job from the AWS console or any automation like lambda function, it starts doing the processing job. Jobs can reference other jobs by name or by ID and depend on the successful completion of different jobs. You can also pass commands, parameters, and environment variables (in additional configuration) at the time of job creation. AWS Batch Job AWS Batch Job AWS Batch Job Conclusion: AWS Batch multi-node parallel jobs let users run a single job on multiple servers. Multi-node parallel job nodes are single tenants, which means that only a single job container is run on each Amazon EC2 instance. To know more about AWS Batch, drop a query in the below comments section, and I will get back to you quickly. CloudThat provides end-to-end support with all the AWS services. As a pioneer in the Cloud Computing consulting realm, we are  AWS (Amazon Web Services) Advanced Consulting Partner and Training partner. We are on a mission to build a robust cloud computing ecosystem by disseminating knowledge on technological intricacies within the cloud space. Read more about CloudThat’s Consulting and Expert Advisory. Leave a Reply
ESSENTIALAI-STEM
INVESTIGADORES BONOMO flavia congresos y reuniones científicas Título: Graphs of Power-Bounded Clique-Width Autor/es: BONOMO, FLAVIA; GRIPPO, LUCIANO NORBERTO; MILANIC, MARTIN; SAFE, MARTÍN DARÍO Lugar: Santorini Reunión: Workshop; Workshop on Graph Classes, Optimization, and Width Parameters (GROW); 2013 Resumen: Clique-width is a graph parameter with many algorithmic applications. A $k$-th power of a graph $G$ is the graph with the same vertex set as $G$, in which two distinct vertices are adjacent if and only if they are at distance at most $k$ in $G$. Many graph algorithmic problems can be expressed in terms of graph powers. We introduce and study the notion of graph classes of power-bounded clique-width. A graph class is of power-bounded clique-width if there exists an integer $k$ such that the $k$-th powers of graphs in the class form a class of bounded clique-width. We identify several graph classes of power-unbounded clique-width, and give a sufficient condition for clique-width to be power-bounded. Based on this condition, we characterize graph classes of power-bounded clique-width among classes defined by two connected forbidden induced subgraphs.
ESSENTIALAI-STEM
Thorella cobourgi Thorella cobourgi is a species of shrimp in the family Hippolytidae. It is found in south-eastern Asia and Australia and is the only species in the monotypic genus Thorella.
WIKI
Bassam Raouf Bassam Raouf (بسام رؤوف) born in 1968 is an Iraqi football coach and former player. Club * Al-Tayaran * Iraqi Premier League: 1991–92 * Iraq FA Cup: 1991–92 * Al-Zawraa * Iraqi Premier League: 1993–94 * Iraq FA Cup: 1993–94 International * Peace and Friendship Cup: 1989 Individual * 1986 Best Young Footballer of League.
WIKI
Article A Model of Dendritic Cell Therapy for Melanoma Department of Mathematics, Harvey Mudd College Claremont, CA, USA. Frontiers in Oncology 03/2013; 3:56. DOI: 10.3389/fonc.2013.00056 Source: PubMed ABSTRACT Dendritic cells are a promising immunotherapy tool for boosting an individual's antigen-specific immune response to cancer. We develop a mathematical model using differential and delay-differential equations to describe the interactions between dendritic cells, effector-immune cells, and tumor cells. We account for the trafficking of immune cells between lymph, blood, and tumor compartments. Our model reflects experimental results both for dendritic cell trafficking and for immune suppression of tumor growth in mice. In addition, in silico experiments suggest more effective immunotherapy treatment protocols can be achieved by modifying dose location and schedule. A sensitivity analysis of the model reveals which patient-specific parameters have the greatest impact on treatment efficacy. Download full-text Full-text Available from: Lisette Depillis, 0 Followers  ·  39 Reads • Source Frontiers in Oncology 09/2013; 3:233. DOI:10.3389/fonc.2013.00233 • [Show abstract] [Hide abstract] ABSTRACT: Mathematical models of tumor–immune interactions provide an analytical framework in which to address specific questions regarding tumor–immune dynamics and tumor treatment options. We present a mathematical model, in the form of a system of ordinary differential equations (ODEs), that governs cancer growth on a cell population level. In addition to a cancer cell population, the model includes a population of Natural Killer (NK) and CD8+ T immune cells. Our goal is to understand the dynamics of immune-mediated tumor rejection, in addition to exploring results of applying combination immune, vaccine and chemotherapy treatments. We characterize the ODE system dynamics by locating equilibrium points, determining stability properties, performing a bifurcation analysis, and identifying basins of attraction. These system characteristics are useful, not only for gaining a broad understanding of the specific system dynamics, but also for helping to guide the development of combination therapies. Additionally, a parameter sensitivity analysis suggests that the model can predict which patients may respond positively to treatment. Numerical simulations of mixed chemo-immuno and vaccine therapy using both mouse and human parameters are presented. Simulations of tumor growth using different levels of immune stimulating ligands, effector cells, and tumor challenge, are able to reproduce data from published studies. We illustrate situations for which neither chemotherapy nor immunotherapy alone are sufficient to control tumor growth, but in combination the therapies are able to eliminate the entire tumor. Mathematical Models of Tumor-Immune System Dynamics, 01/2014: pages 59-108; • Source [Show abstract] [Hide abstract] ABSTRACT: Pancreatic cancer is one of the most deadly types of cancer and has extremely poor prognosis. This malignancy typically induces only limited cellular immune responses, the magnitude of which can increase with the number of encountered cancer cells. On the other hand, pancreatic cancer is highly effective at evading immune responses by inducing polarization of pro-inflammatory M1 macrophages into anti-inflammatory M2 macrophages, and promoting expansion of myeloid derived suppressor cells, which block the killing of cancer cells by cytotoxic T cells. These factors allow immune evasion to predominate, promoting metastasis and poor responsiveness to chemotherapies and immunotherapies. In this paper we develop a mathematical model of pancreatic cancer, and use it to qualitatively explain a variety of biomedical and clinical data. The model shows that drugs aimed at suppressing cancer growth are effective only if the immune induced cancer cell death lies within a specific range, that is, the immune system has a specific window of opportunity to effectively suppress cancer under treatment. The model results suggest that tumor growth rate is affected by complex feedback loops between the tumor cells, endothelial cells and the immune response. The relative strength of the different loops determines the cancer growth rate and its response to immunotherapy. The model could serve as a starting point to identify optimal nodes for intervention against pancreatic cancer. Journal of Theoretical Biology 03/2014; 351. DOI:10.1016/j.jtbi.2014.02.028 · 2.12 Impact Factor Show more
ESSENTIALAI-STEM
Ali Noorzad (politician) Ali Noorzad (, born 1960) is an Iranian university professor and politician. He earned his doctorate in Geotechnical engineering from Concordia University, Canada in 1998. He is active in water and soil issues and huge dam construction projects. From 2013 to 2017, he was the Deputy Minister of Roads and Urban Development of Iran.
WIKI