Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Multiple TOF/TOF Events in a Single Laser Shot for Multiplexed Lipid Identifications in MALDI Imaging Mass Spectrometry Int J Mass Spectrom. 2019 Mar:437:30-37. doi: 10.1016/j.ijms.2018.06.006. Epub 2018 Jun 28. Abstract Tandem mass spectrometry (MS/MS) is often used to identify lipids in matrix-assisted laser desorption/ionization imaging mass spectrometry (MALDI IMS) workflows. The molecular specificity afforded by MS/MS is crucial on MALDI time-of-flight (TOF) platforms that generally lack high resolution accurate mass measurement capabilities. Unfortunately, imaging MS/MS workflows generally only monitor a single precursor ion over the imaged area, limiting the throughput of this methodology. Herein, we demonstrate that multiple TOF/TOF events performed in each laser shot can be used to improve the throughput of imaging MS/MS. This is shown to enable the simultaneous identification of multiple phosphatidylcholine lipids in rat brain tissue. Uniquely, the separation in time achieved for the precursor ions in the TOF-1 region of the instrument is maintained for the fragment ions as they are analyzed in TOF-2, allowing for the differentiation of fragment ions of the exact same m/z derived from different precursor ions (e.g., the m/z 163 fragment ion from precursor ion m/z 772.5 is easily distinguished from the m/z 163 fragment ion from precursor ion m/z 826.5). This multiplexed imaging MS/MS approach allows for the acquisition of complete fragment ion spectra for multiple precursor ions per laser shot. Keywords: MALDI; MS/MS; Multiplexed; imaging mass spectrometry; lipid.
ESSENTIALAI-STEM
Kubernetes Course Labs Docker Image Optimiziation The key to optimizing Docker builds is to use the right base images, and keep your application images small with multi-stage builds. Multi-stage builds use the standard Dockerfile syntax, with multiple stages separated with FROM commands. They give you a repeatable build with minimal dependencies. Multi-stage builds are a great way to centralize your toolset - developers and build servers just need Docker and the source code, all the tools come packaged in Docker images, so everyone's using the same versions. Reference It's the standard docker build command for multi-stage builds. The Dockerfile syntax uses multiple FROM instructions; the patterns are the same for all languages, but the individual details are specific. These are samples in the major languages: Multi-Stage Dockerfiles There are two build engines in Docker - the original and BuildKit. They both produce compatible images, but BuildKit is optimized and it's the default in recent Docker installations. We'll start by using the original build engine so it's clear what's happening in the build - later we'll switch to BuildKit which has better performance: # on macOS or Linux: export DOCKER_BUILDKIT=0 # OR with PowerShell: $env:DOCKER_BUILDKIT=0 Here's a simple multi-stage Dockerfile: 📋 Build an image called simple from the labs/docker/simple Dockerfile. # just a normal build: docker build -t simple ./labs/docker/simple/ All the stages run, but the final app image only has content explicitly added from earlier stages. Run a container from the image and it prints content from the base and build stages: docker run simple The final image doesn't have the additional content from the test stage. BuildKit and build targets BuildKit is an alternative build engine in Docker. It's heavily optimized for multi-stage builds, running stages in parallel and skipping stages if the output isn't used. Switch to BuildKit by setting an environment variable: # on macOS or Linux: export DOCKER_BUILDKIT=1 # OR with PowerShell: $env:DOCKER_BUILDKIT=1 Now repeat the build for the simple Dockerfile - this time Docker will use BuildKit: docker build -t simple:buildkit ./labs/docker/simple/ You'll see output from different stages at the same time - and if you look closely you'll see the test stage is skipped. 📋 Run a container from the new image. Is the output the same? Compare the image details. # run a container - the output is the same: docker run simple:buildkit # list images - they're the same size but not the same image: docker image ls simple BuildKit skips the test stage because none of the output is used in later stages. You can explicitly build an image up to a specific stage with the target flag: docker build -t simple:test --target test ./labs/docker/simple/ This image is the output of the test stage not the final stage. 📋 Run a container from the test build, printing the contents of the build.txt file. # no output here - the test stage has no CMD instruction docker run simple:test # run the cat command to see the output docker run simple:test cat /build.txt The output is from the build stage plus the test stage. Simple Go application Real multi-stage builds use an SDK (Software Development Kit) image to compile the app in the build stage and a smaller runtime image (with no build tools) to package the compiled app. The images you use and the commands you run are different for each language, but you'll find official images on Docker Hub for all the major platforms, including: We won't cover different languages in detail. The whoami Dockerfile shows how the pattern works, using a Go application: 📋 Build an image called whoami from the folder labs/docker/whoami. docker build -t whoami ./labs/docker/whoami/ You'll see all the stage output from BuildKit. SDK images are typically very large, having the whole build toolset. You don't want to use an SDK image in your final stage, otherwise you'll have all that stuff in your app image. 📋 Compare the sizes of the whoami and golang images. docker pull golang:1.16.4-alpine docker image ls -f reference=whoami -f reference=golang Woah! The SDK image is over 300MB; the app image is under 10MB. The app is a simple web server. Run a container publishing a random port and find the port: docker run -d -P --name whoami1 whoami docker port whoami1 The EXPOSE instruction tells Docker the target port for the container; when you use the -P flag Docker publishes all exposed ports. Now you can use the app: curl http://localhost:<port> The server just prints some details about the environment and the request. Lab Apps need special Linux permissions to listen on the standard HTTP ports - even inside a container. The whoami app supports an option to configure the port it listens on, so you can use a non-standard port and potentially run with tighter security. Your goal for this lab is to run the whoami app in a container - using the -port application argument to listen on a specific port. What happens when you run a container with the -P (--publish-all) option? Does Docker map the new port correctly? What do you need to do to run a working container? Stuck? Try hints or check the solution. Cleanup Cleanup by removing all the whoami containers: docker rm -f $(docker ps -q --filter="name=whoami")
ESSENTIALAI-STEM
At the time of their birth, a child becomes attracted and interested in the blurry colors and images that they first see and, later on, progresses to facial expressions and body language as they grow older. Whatever they visually perceive is what they would translate into as the meaning of the words and sentences that they would, later on, read and write. As they start to go into their schooling years, educators would often encourage their students to apply the words that they have learned through actions or in their daily activities to incorporate the meaning of the word. And one of the activities would be imaginative play. Imaginative play, also known as make-believe, fantasy play, or pretend play, is a creative activity that allows a child to utilize their imagination to create imaginary scenarios as a way to interpret what they have witnessed or seen, experienced, or would, later on, like to experience.
FINEWEB-EDU
Demi-Gods and Semi-Devils (film) Demi-Gods and Semi-Devils, also known as Dragon Story, is a 1984 Hong Kong film based on Louis Cha's novel of the same title. The film was directed and produced by Siu Sang and starred Norman Chui, Kent Tong, Felix Wong, Idy Chan, Lam Jan-kei and Austin Wai. The film is not to be confused with the television series of the same title produced by TVB, which was also released in the same year and shared some common cast members (Tong, Wong and Chan played the same roles in the television series as well). Cast * Note: Some of the characters' names are in Cantonese romanisation. * Norman Chui as Kiu Fung * Kent Tong as Duen Yu * Felix Wong as Hui-juk * Idy Chan as Wong Yu-yin * Lam Jan-kei as Ah-chu * Austin Wai as Muk-yung Fuk * Eddy Ko as Kau Mo-chit * Lee Lung-kei as Duen Ching-sun * Lau Kong as Ye-lut Hung-kei * Chen Kuan-tai * Lau Kwok-shing * Cheung Hei * Ling Hon * Wang Han-chen * Sham Chin-bo * Tam Wai-man * Leung Sam
WIKI
Dos Pos, Bonaire, Important Bird Area The Dos Pos Important Bird Area lies on the leeward side of the northern end of the island of Bonaire in the Caribbean Netherlands. It is a 234 ha former fruit plantation, adjacent to the Washington Slagbaai National Park, that has been identified by BirdLife International as an Important Bird Area (IBA) because it supports populations of several threatened or restricted-range bird species. The landscape is one of small hills and sheltered valleys with remnant fruit trees, mainly mangoes, and a small ephemeral pond. Threats to the unprotected site are habitat degradation by feral donkeys, goats and pigs, predation by introduced cats and rats, and poaching for the pet trade. Birds Birds for which the IBA was designated include bare-eyed pigeons, Caribbean elaenias, pearly-eyed thrashers and yellow-shouldered amazon parrots. In winter some 40% of the island's parrot population (of about 650 birds) roosts in the IBA. It is also a valuable location for migrating passerines, including blackburnian warblers, summer and scarlet tanagers, and rose-breasted grosbeaks, while peregrine falcons and merlins are frequent winter visitors. Caribbean coots and least grebes have bred on the pond.
WIKI
 Gene Frequency of <i>CYP2D6*4</i> and <i>*10</i> Variants in Karachi Population | Bentham Science Gene Frequency of CYP2D6*4 and *10 Variants in Karachi Population Author(s): Tamkeen Fatima, Farah Zeb, Ahsana Dar Farooq* Journal Name: Current Pharmacogenomics and Personalized Medicine Formerly Current Pharmacogenomics Volume 17 , Issue 3 , 2020 Become EABM Become Reviewer Call for Editor Graphical Abstract: Abstract: Background: In the human population, CYP2D6 is highly polymorphic group of genes involved in metabolizing ~25% of all clinically used neuroleptic and antidepressant drugs. The CYP2D6*4 and CYP2D6*10 variants are prevalent in Asian population exhibiting variable drug metabolizing ability thereby affecting drug therapeutic responses. Objective: To determine the genotypic frequencies of CYP2D6*1 (Normal metabolizer), *4 (Poor metabolizer) and *10 (Intermediate metabolizer) variants among schizophrenic subjects and control group from a sub-set of Karachi population. Method: Genomic Deoxyribonucleic Acid (gDNA) was extracted and amplified with CYP2D6*4 and *10 primers using Polymerase Chain Reaction (PCR) and digested by Bacillus stereothermophilus (BstN1) and Hemophilus parahemolyticus (Hph1) restriction enzymes. The digested gDNA bands were identified as wild type or mutants and their genotypic frequencies were estimated by Hardy-Weinberg Equation (HWE). Results: In normal subjects, frequencies of CYP2D6*1 wild allele (57%) coded functional enzyme, CYP2D6*4 variant (9%) producing non-functional enzyme and CYP2D6*10 allele (70%) producing altered enzyme with reduced activity that was most prevalent in schizophrenic patients. Discussion: Drug response is a complex phenomenon that is governed by genetic and environmental factors. Antipsychotic drug metabolism among schizophrenic patients with variable drug responsesis related to CYP2D6 polymorphism. Clinically, it is imperative to differentiate between responders and non-responders using the treatment, otherwise the drug will be either nonefficacious or toxic to the patients. Therefore, a gene testing system needs to be established to identify patient’s genotype(s) predicting whether they are normal, poor, intermediate or ultrarapid drug metabolizer thereby allowing clinicians to adjust dose(s) of antipsychotic drug(s). Conclusion: Genotyping of CYP2D6 alleles among schizophrenic patients indicated prevalence of *4 and *10 variants in Karachi population producing non-functional (poor metabolizer) and reduced functional (intermediate metabolizer) drug metabolizing enzymes phenotypes, respectively. Hence, dose adjustment is crucial otherwise schizophrenia condition will not be improved satisfactorily. Therefore, CYP2D6 gene screening program should be included in clinical practice to help clinicians to prescribe appropriate doses according to patient’s genotype and minimize sufferings of schizophrenics including side effects of drug that might occur at high drug concentrations. Keywords: Schizophrenia, CYP2D6 alleles, genotyping, gene frequency, Karachi population, Genomic Deoxyribonucleic Acid (gDNA). Rights & PermissionsPrintExport Cite as Article Details VOLUME: 17 ISSUE: 3 Year: 2020 Published on: 14 October, 2020 Page: [172 - 181] Pages: 10 DOI: 10.2174/1875692117999201014162804 Price: $25 Article Metrics PDF: 125
ESSENTIALAI-STEM
What is revolution (unit) Revolution is an angle measurement unit A revolution is a unit of plane angle, and defined as a complete turn around a circle. The revolution is equal to 360° or 2×π.ORT? • TT?1 revolution = 21 600 arc-minutes 1 revolution = 21 600 MOA • TT?1 revolution = 1 296 000 arc-seconds 1 revolution = 1 296 000 arcsec • TT?1 revolution = 360 degrees 1 revolution = 360 ° • TT?1 revolution = 400 gradians 1 revolution = 400 grad • TT?1 revolution = 6.2831853071796 radians 1 revolution = 6.2831853071796 rad • TT?1 revolution = 6 sextants • TT?1 revolution = 12 signs Foods, Nutrients and Calories CAMPBELL'S Red and White, Golden Mushroom Soup, condensed weigh(s) 131.03 gram per (metric cup) or 4.37 ounce per (US cup), and contain(s) 65 calories per 100 grams or ≈3.527 ounces  [ calories | weight to volume | volume to weight | density ] Gravels and Substrates Gravel, Pea density is equal to 17.88 kg/m²/cm.  Calculate how much of this gravel is required to attain a specific depth in a cylinderquarter cylinder  or a rectangular shaped object Materials and Substances Calcium weigh(s) 1.55 gram per (cubic centimeter) or 0.896 ounce per (cubic inch)  [ weight to volume | volume to weight | density ] What is grain per foot? The grain per foot is a measurement unit of linear or linear mass density. The unit is used to measure length in feet in order to estimate weight or mass in grains.read more...» What is density measurement? The objects made of different materials may occupy the same volume but have different masses or weights, e.g. aluminum and steel. If we assume that the object mass is spread equally along the whole object, then ratio of mass to volume remain a constant number and specific to the material this object is made of.  The density of a material or substance is defined as its mass per unit of volume. The symbol of density is the Greek letter ρ (rho).read more...» Do you like Aqua-Calc?     Add us
ESSENTIALAI-STEM
Template:Did you know nominations/2017 Notre Dame attack The result was: rejected by BlueMoonset (talk) 16:29, 24 July 2017 (UTC) Nominator has edited on Wikipedia since the notice below, but not responded here; closing as unsuccessful. 2017 Notre Dame attack * ... that the terrorist who attacked Notre Dame cathedral in Paris was a PhD candidate at the University of Lorraine? (John Leicester,Suspect in Notre Dame attack was ex-journalist, student [www.washingtonpost.com/world/europe/french-govt-notre-dame-police-attacker-a-doctoral-student/2017/06/07/897d6810-4b5b-11e7-987c-42ab5745db2e_story.html], Washington Post) Source: "You are strongly encouraged to quote the source text supporting each hook" (and [link] the source, or cite it briefly without using citation templates) * ALT1:... that ...? Source: "You are strongly encouraged to quote the source text supporting each hook" (and [link] the source, or cite it briefly without using citation templates) Created by Rævhuld (talk). Self-nominated at 14:27, 8 June 2017 (UTC). * Article was created on June 6.E.M.Gregory (talk) 15:15, 8 June 2017 (UTC) * Note that the article is nominated at AFD currently at Articles for deletion/2017 Notre Dame attack. Cowlibob (talk) 16:52, 8 June 2017 (UTC) * Why would you nominate an article that is at AfD? - Knowledgekid87 (talk) 05:11, 10 June 2017 (UTC) * most likely because E.M.Gregory encouraged the nominator to do so on their talk page.TheGracefulSlick (talk) 05:31, 10 June 2017 (UTC) * AfD closed as Keep.E.M.Gregory (talk) 10:21, 14 June 2017 (UTC) * Symbol question.svg This article is new enough and long enough. However, this is a BLP and realistically, the hook is a non-starter. The suspect is considered innocent until convicted in a court of law, so you will need a factual hook on another aspect of the incident. Nor will this nomination go ahead while the article has a neutrality tag, - Ikken is not a perpetrator or an attacker, he is a suspect at this time. Cwmhiraeth (talk) 17:28, 15 June 2017 (UTC) * Symbol possible vote.svg I placed a reminder notification on Rævhuld's talk page on July 6, and it has already been archived. Since the hook is, as Cwmhiraeth notes, a non-starter, I have struck it. The nomination is over a month old; if a new hook isn't proposed within seven days, this will be marked for closure. I hope we hear something before then. BlueMoonset (talk) 19:54, 9 July 2017 (UTC) * Symbol delete vote.svg Rævhuld has not edited on Wikipedia since July 2. Marking for closure per the above, though if action is taken before this is closed, the nomination can continue. BlueMoonset (talk) 04:38, 18 July 2017 (UTC) * I don't really get what I have to do with any of this?--Rævhuld (talk) 22:00, 18 July 2017 (UTC) * Rævhuld, you created this page. People usually don't create DYK nomination pages unless they want to nominate their article for DYK. If you don't want this to run at DYK, then we'll just close this. If, however, you do want it to run, then the nomination needs a valid hook per DYK and Wikipedia rules, and that's up to you to create and post to this page. Please let us know your preference. Many thanks. BlueMoonset (talk) 22:05, 21 July 2017 (UTC)
WIKI
High-Dollar Gospel High-Dollar Gospel is the seventh album by Virginia-based blues rock artist, Eli Cook. It was released on August 18, 2017. The album consists of mostly acoustic, original songs and revamped covers of Muddy Waters and Bob Dylan. At the time of release, Cook stated this album contained the most "authenticity" in his songwriting to date. The ironic nature of the title was inspired by a spiritual "loss of direction" that Cook noticed in American youth. Critical reception Critical response has been highly positive. Scott Bampton of Rock & Blues Muse noted that Eli had marked a "new blues territory" with the album's release. Shane Handler of Glide Magazine stated that High-Dollar Gospel proves that "Eli can play with the best." Blues Festival Guide complimented the energy of the album, stating that the record "preaches a high voltage bolt to your ears and shakes you loose." Personnel * Eli Cook – Vocals, Guitar, Mandolin * Peter Spaar – Upright Bass * Nathan Brown – Drums Track listing All songs written by Eli Cook, except where noted.
WIKI
Mukim Lumapas Mukim Lumapas is a mukim in Brunei-Muara District, Brunei. It has an area of 62.10 km2; the population was 7,756 in 2016. Name The mukim is named after Kampong Lumapas, one of the villages it encompasses. Geography The mukim is located in the south of the district, bordering the mukims within Kampong Ayer and Mukim Kianggeh to the north, Mukim Kota Batu to the north and east, Limbang District in Sarawak, Malaysia to the east and south, Mukim Pengkalan Batu to the west and Mukim Kilanas to the west and north. Demographics As of 2016 census, the population was 7,756 with NaN% males and NaN% females. The mukim had 1,208 households occupying 1,187 dwellings. Among the population, NaN% lived in urban areas, while the remainder of NaN% lived in rural areas. Villages As of 2016, the mukim comprised the following census villages: Infrastructures As of 2004, the mukim had three primary schools, three secondary schools, four mosques, a post office and four police posts. Public housing STKRJ Kampong Lumapas is the sole public housing estate within the mukim. Schools Sayyidina Umar Al-Khattab Secondary School (SMSUA), located in Kampong Lupak Luas, was opened in 1994 and inaugurated on 6 August 1996. As of 2004, it had 1,208 students and 105 teachers. It was named after Umar, who was a companion of Muhammad as well as a Rashidun caliph. Other locations Other locations within the mukim include: * Jong Batu, an island in the Brunei River Sister cities/towns/mukims * Bogor, West Java, Indonesia
WIKI
Factors predictive of high-output ileostomy: a retrospective single-center comparative study Mitsunobu Takeda, Hidekazu Takahashi, Naotsugu Haraguchi, Norikatsu Miyoshi, Taishi Hata, Hirofumi Yamamoto, Chu Matsuda, Tsunekazu Mizushima, Yuichiro Doki, Masaki Mori 研究成果: Contribution to journalArticle査読 7 被引用数 (Scopus) 抄録 Purpose: High-output syndrome (HOS) is a complication of ileostomy, which can affect quality of life significantly; however, its exact cause remains unknown. The aim of this study was to establish the frequency, as well as the preoperative and intraoperative factors predictive of HOS. Methods: The subjects of this study were 164 consecutive patients who underwent colorectal cancer surgery with ileostomy construction at our institute between January, 2011 and August, 2018. Thirteen patients with postoperative complications reported as causes of HOS, including intraperitoneal abscess, paralytic ileus, and outlet obstruction, were excluded. We used a logistic regression analysis to identify the factors predictive of HOS. Results: HOS developed in 36 of the 151 patients (23.8%). There were significantly more diabetic patients in the HOS group (P = 0.03), but other patient factors such as age, gender, body mass index, and use of daily laxatives were not significantly different between the groups. The HOS group had significantly more cases of total proctocolectomy (P = 0.04), but other surgical factors such as operative time, and blood transfusion were not significantly different between the two groups. Conclusions: These results indicate that diabetes and total proctocolectomy are preoperative predictors of HOS, allowing for the possibility of early intervention via post-surgical treatment. 本文言語英語 ページ(範囲)482-487 ページ数6 ジャーナルSurgery today 49 6 DOI 出版ステータス出版済み - 6 1 2019 外部発表はい All Science Journal Classification (ASJC) codes • Surgery フィンガープリント 「Factors predictive of high-output ileostomy: a retrospective single-center comparative study」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。 引用スタイル
ESSENTIALAI-STEM
Frederick H. Evans Frederick H. Evans (26 June 1853 – 24 June 1943) was an English photographer, best known for his images of architectural subjects, such as English and French cathedrals. Evans was born and died in London. He began his career as a bookseller, but retired from that to become a full-time photographer in 1898, when he adopted the platinotype technique for his photography. Platinotype images, with extensive and subtle tonal range, non glossy-images, and better resistance to deterioration than other methods available at the time, suited Evans' subject matter. Almost as soon as he began, however, the cost of platinum - and consequently, the cost of platinum paper for his images - began to rise. Because of this cost, and because he was reluctant to adopt alternate methodologies, by 1915 Evans retired from photography altogether. Evans' ideal of straightforward, "perfect" photographic rendering - unretouched or modified in any way - as an ideal was well-suited to the architectural foci of his work: the ancient, historic, ornate and often quite large cathedrals, cloisters and other buildings of the English and French countryside. This perfectionism, along with his tendency to exhibit and write about his work frequently, earned for him international respect and much imitation. He ultimately became regarded as perhaps the finest architectural photographer of his, or any, era - though some professionals privately felt that the Evans' philosophy favoring extremely literal images was restrictive of the creative expression rapidly becoming available within the growing technology of the photographic field. Evans was also an able photographer of landscapes and portraits, and among the many notable friends and acquaintances he photographed was George Bernard Shaw, with whom he also often corresponded. Evans was made an honorary fellow of the Royal Photographic Society in 1928, he was also a member of the Linked Ring photographic society.
WIKI
Signs Of Food Intolerance In Children In recent years, more and more doctors, as is the case of Dr. William Sears, a pediatrician in San Clemente, California, met with countless cases of asthma and eczema. Dairy and wheat are the main causes, but experts believe that there are other factors that can contribute to the development of sensitivity to food, as well as synthetic additives such as hydrogenated oils and artificial colorings, flavorings, sweeteners and genetically modified ingredients. Without diagnosis and proper treatment, food intolerances can lead over time to damage, notifies Sears, author of The Book N.D.D. = About nutritional deficiency (Little, Brown, 2009), who treats the disorder called by him nutritional deficiency (the nutrition deficiency disease). if your child has a reaction to something in the food, the first step is to look for the reason. “Many parents suspect the reason,” says Kelly Dorfman, LND, author of What your child eats? (Workman publishing, 2011). Turn yourself into a “Detective of nutrition,” she suggests, to see when and how the symptoms arise. Here’s a guide for assessing the evidence and finding solutions. Possible cause: intolerance to casein, a milk protein. Casein in dairy products — which is different from human milk casein — which ends up in the breast milk or is inserted into the milk powder can irritate the intestinal wall of the developing baby Gastroesophageal disease (GERD). Later, symptoms may develop in chronic diseases such as ear infections, or constipation, Dorfman says.  What you can do: Remove dairy products from baby and mother’s diet for a week. (Eliminating dairy products from breast milk within four to five days.) For powdered milk, if it is really needed, choose a variation made with casein or whey. For the healing of the intestinal wall of the child, can manage 10 ml/day probiotic bacteria mixed in a bottle and pressed on solid food. •  Chronic diarrhea Possible cause: gluten intolerance (a protein in wheat and other grains) or lactose (milk sugar). Diarrhea is the way in which the gastrointestinal tract is trying to get rid of harmful substances. Therefore, the most common symptoms of intolerance to gluten and lactose are diarrhea, gas and bloating.   Lactose intolerance is usually the main cause for the enzyme that digests lactose (lactase) is rapidly inhibited when the small intestine is irritated. When you are sensitive to gluten, digesting gluten irritates the large intestine, which is why people who don’t tolerate gluten generally do not tolerate any lactose, Dorfman says. Fortunately, dairy products such as cheese and yogurt fermented have a low level of lactose, and their use is usually safe.  What you can do: take a blood test to eliminate the suspicion of celiac disease; then eliminate gluten for at least a month. Although diarrhea can disappear in a week, it takes several weeks to get a clear picture of school children. “Birthdays, visits to grandparents — are situations in which it can cheat without want,” Dorfman says. “That’s why you need a longer period to trace a pattern.” • Chronic ear infections Possible cause: milk intolerance and, in this case, some sensitivity to soy products. Some studies show that 90% of children with frequent infections or leak equalized have reactions to food, a statistic that Dorfman says. As a rule, the main suspects are dairy products. Still, about half of the people who have reactions to dairy have a reaction to soy as well, says Dorfman.   What you can do: give up dairy for a few months. However, children do not have infections weekly, that’s why it takes a longer period to create a causal connection. Recommend removing soy milk, says Dorfman, soy yogurt, and the tofu, but he adds, that people should avoid processed foods because many of them contain secondary byproducts from soybean. • Eczema or skin irritation with itching  possible cause: the reaction to a combination of gluten, casein (dairy products), eggs and what Dorfman calls “wide range” of citrus (oranges, grapefruit, tangerines, lemons, strawberries, and pineapple).  What you can do: Ask an allergist to do a blood test IgE-alergo radio-a (RAST) of your child. As an irritation with itching of the skin suggests a histaminic reaction, blood tests can be more effective here than they are in identifying food sensibility. • Hyperactivity  possible cause: sensitivity to artificial colors, or even sugar. In the opinion of Sears, blood brains barrier is not yet very developed in children, as they are more vulnerable to the neurotoxic effects of chemical additives in food, artificial colorings and monosodium glutamate (GMS).   A 2007 British study of six colors associated with a food possible hyperactivity in children. As a result, the European Union has established itself as the majority of the foods that contain food dyes to mention this on the labels. Pay attention to the intake of sugar; some children are hypersensitive to sweet products literally.  What you can do: Buy organic products; by definition, organic products do not contain artificial colors. If you don’t have access to organic produce, check labels for identification of synthetic food dyes based on approved oil for food use. To avoid excessive consumption of sugar, read the list of ingredients, not just the table with nutritional factors, which combine natural additions of sugar with the synthetic nutrient intake for all. Words like corn syrup high content of fructose, sucrose, glucose, fructose, sugar from sugar beet syrup, all indicate the added sugar. • Continued agitated state  possible cause: gluten intolerance. Gluten sensitivity is associated exclusively with the classic digestive upset, but recent studies associated with neurological symptoms, which can range from change of mood in the cornice of the head pain, ADHD and loss of coordination.  What you can do: Remove gluten from the diet for a month to make the connection between mood and food. There may be other reasons for the anxiety of children; but, if the reason is related to food, says Dorfman, children will often consume to excess food they exactly those causes problems. • Small or very picky eater  possible cause: Sensitivity to gluten, or zinc deficiency. Because gluten intolerance interferes with absorption of nutrients, children who suffer from these disorders often do not develop. “Small-either height or weight is a classic symptom of celiac disease,” says Dorfman.  Zinc may be another factor: it is a mineral that normalizes appetite and, through its relationship with growth hormones, contributing to the development of the body. If the level of zinc in the body is low, child care can be slowed down, with up to 5% or less compared to standard charts of weight and height. In this case, a child may feel that rarely is hungry, it can be very picky about food, or you can cry as the food tastes like “weird,” says Dorfman.   What you can do: Remove gluten from the diet for a month. Ask him to conduct a pediatric blood analysis in order to verify the level of zinc, or buy a test online for zinc sulfate. Once you taste the mix of sulfate, the child may declare that it does not feel anything (which indicate a vitamin deficiency) or has bad taste (no deficiency). Among zinc-rich foods include beans, pumpkin seeds, cashew nuts.
ESSENTIALAI-STEM
Page:Royal Naval Biography Marshall sp3.djvu/352 were carried by the bayonet, and took prisoners, with their arms and ammunition, the captain commanding the islands of Zupano and Mezzo, 2 Serjeants, 3 corporals, and 33 privates, belonging to the 4th light infantry regiment (the lieutenant and 15 privates escaping), which completely put the whole of the island in our possession, and I am happy to say without loss, and only a few slight bayonet wounds. The determined conduct of the seamen and marines, headed by Lieutenants Holmes and Hancock, made all their resistance ineffectual. On examining the harbour, there were no vessels found there bound to Ragusa; and I have every reason to think, no vessel, however small, has escaped from Stagno since I have been on this station, the boats of the Saracen being kept constantly on the lookout, at different stations, during the night. I am informed, that the lieutenant and his party made their escape in a boat, and went towards Ragusa. The island I have left in the quiet possession of the inhabitants, who appear much attached to the English. I have the honor to be, &c. (Signed)“.” Zupano was one of three islands which the enemy had garrisoned for the protection of vessels conveying supplies from Stagno to Ragusa, and thence to Boco di Cattaro. Constantly expecting an attack, the soldiers composing the garrison were always under arms, by night, in the market-place, which was surrounded by a breast-work. When Captain Harper arrived in the square of the town, his men were completely drenched with rain; many of them had lost their shoes in the mud, and all their ammunition was unserviceable. The alarm had then been given, and the enemy were prepared to receive him. To retreat or hesitate would have been certain destruction. He instantly charged, and, after a doubtful struggle of 10 minutes, carried every thing before him. The island was well cultivated, and produced great quantities of oil and wine. Captain Harper immediately hoisted British colours, disbanded and re-organized the national guard, dismissed the mayor from his office, and requested the Count Natali, a much respected nobleman, to assume that of civil governor, – arrangements which completely put down the French party, and gave universal satisfaction to the loyal inhabitants. One of the other fortified islands was Mezzo, situated between Zupano and Ragusa, garrisoned by an officer and 59 regular troops, including artillery-men, and defended by a strong castle and the pinnacle of an almost inaccessible hill.
WIKI
Page:EB1911 - Volume 14.djvu/85 AND CANALS] § 111. Egg-Shaped Channels or Sewers.—In sewers for discharging storm water and house drainage the volume of flow is extremely variable; and there is a great liability for deposits to be left when the flow is small, which are not removed during the short periods when the flow is large. The sewer in consequence becomes choked. To obtain uniform scouring action, the velocity of flow should be constant or nearly so; a complete uniformity of velocity cannot be obtained with any form of section suitable for sewers, but an approximation to uniform velocity is obtained by making the sewers of oval section. Various forms of oval have been suggested, the simplest being one in which the radius of the crown is double the radius of the invert, and the greatest width is two-thirds the height. The section of such a sewer is shown in fig. 113, the numbers marked on the figure being proportional numbers. § 112. Problems on Channels in which the Flow is Steady and at Uniform Velocity.—The general equations given in §§ 96, 98 are &emsp; &emsp; &emsp; = (1 + /m); (1) v2/2g = mi;&emsp; &emsp; (2) Q = v. (3) Problem I.—Given the transverse section of stream and discharge, to find the slope. From the dimensions of the section find and m; from (1) find, from (3) find v, and lastly from (2) find i. Problem II.—Given the transverse section and slope, to find the discharge. Find v from (2), then Q from (3). Problem III.—Given the discharge and slope, and either the breadth, depth, or general form of the section of the channel, to determine its remaining dimensions. This must generally be solved by approximations. A breadth or depth or both are chosen, and the discharge calculated. If this is greater than the given discharge, the dimensions are reduced and the discharge recalculated. Since m lies generally between the limits m = d and m = d, where d is the depth of the stream, and since, moreover, the velocity varies as √ (m) so that an error in the value of m leads only to a much less error in the value of the velocity calculated from it, we may proceed thus. Assume a value for m, and calculate v from it. Let v1 be this first approximation to v. Then Q/v1 is a first approximation to, say 1. With this value of design the section of the channel; calculate a second value for m; calculate from it a second value of v, and from that a second value for. Repeat the process till the successive values of m approximately coincide. § 113. ''Problem IV. Most'' Economical Form of Channel for given Side Slopes.—Suppose the channel is to be trapezoidal in section (fig. 114), and that the sides are to have a given slope. Let the longitudinal slope of the stream be given, and also the mean velocity. An infinite number of channels could be found satisfying the foregoing conditions. To render the problem determinate, let it be remembered that, since for a given discharge ∞ ∛, other things being the same, the amount of excavation will be least for that channel which has the least wetted perimeter. Let d be the depth and b the bottom width of the channel, and let the sides slope n horizontal to 1 vertical (fig. 114), then = (b + nd) d; = b + 2d √ (n2 + 1). Both and are to be minima. Differentiating, and equating to zero. (db/dd + n) d + b + nd = 0, db/dd + 2 √ (n2 + 1) = 0; eliminating db/dd, {n − 2√ (n2 + 1)} d + b + nd = 0; b = 2 {√ (n2 + 1) − n} d. But / = (b + nd) d / {b + 2d √ (n2 + 1)}. Inserting the value of b, m = / = {2d √ (n2 + 1) − nd} / {4d √ (n2 + 1) − 2nd} = d. That is, with given side slopes, the section is least for a given discharge when the hydraulic mean depth is half the actual depth. A simple construction gives the form of the channel which fulfils this condition, for it can be shown that when m = d the sides of the channel are tangential to a semicircle drawn on the water line. Since / = d, therefore = d. (1) Let ABCD be the channel (fig. 115); from E the centre of AD drop perpendiculars EF, EG, EH on the sides. Let AB = CD = a; BC = b; EF = EH = c; and EG = d. Putting these values in (1), ac + bd = (a + b) d; and hence c = d. That is, EF, EG, EH are all equal, hence a semicircle struck from E with radius equal to the depth of the stream will pass through F and H and be tangential to the sides of the channel. To draw the channel, describe a semicircle on a horizontal line with radius = depth of channel. The bottom will be a horizontal tangent of that semicircle, and the sides tangents drawn at the required side slopes. The above result may be obtained thus (fig. 116):— = b + 2d / sin. (1) = d (b + d cot ); /d = b + d cot ; (2) /d&#8202;2 = b/d + cot. (3) From (1) and (2), = / d − d cot + 2d / sin. This will be a minimum for d / dd = / d&#8202;2 + cot − 2 / sin = 0, or /d&#8202;2 = 2 cosec. − cot. (4) or d = √ { sin / (2 − cos )}. From (3) and (4), b/d = 2 (1 − cos ) / sin = 2 tan.
WIKI
How to save money by running your PC 24/7 If the leak is slow then you may not notice it during normal desktop use, but leave the PC for days and it's sure to become more significant, eventually grinding your system to a halt. Could this happen to you? Try monitoring your system to see how it's performing. The simplest way to do this in Windows XP is to close all your applications, launch Task Manager, switch to the 'Performance' tab, and note the Commit Charge (allocated memory including the paging file). Now minimise Task Manager and continue running your PC, returning to check the Commit Charge occasionally when you've no programs running. It's normal for the figure to increase sometimes, perhaps because a background program requires more resources, but if your Commit Charge shows consistent growth, even if the PC is left running overnight, then you may have a problem. Fixing memory leaks can be hard, though, and beyond removing the offending program altogether, may not be possible at all. So our advice is to forget the technicalities, and get back to basics. The most important thing is to simplify your system, ruthlessly stripping out the Windows start-up programs you don't need, and uninstalling any applications that are surplus to requirements. The fewer you have running, the less likely you are to have problems. You can also work around these problems by rebooting your system occasionally. If you're at home then do it yourself, on a daily basis (or weekly, or monthly, depending on how quickly your resources are being eaten up). But you can also automate the process, using Task Manager to force a reboot at the time of your choosing. Use the instructions we described earlier for automating a defrag, but with the command line "%windir%\system32\shutdown.exe -r -t 00 -f ", and your system should restart just fine. Don't leave programs open, though, as any unsaved data will be lost. And make sure any scheduled reboot won't interfere with other automated processes, such as a disk defrag, or you could be left with a corrupted hard drive. Reduce power consumption and save money Running a 24/7 PC has advantages, then, but of course this comes at the cost of increased electricity use and higher fuel bills. If you're making good use of your full-time PC then we don't think this should put you off the idea altogether, but it's important to address the power consumption problem. You should start by only plugging in and turning on hardware you'll actually need. Some devices have an 'Off ' button, but this only switches it into an idle state, and could still be using 10W or more. Anything connected by USB could also be using electricity, even if it seems to be powered down. You might also try turning down the brightness of your LCD monitor. We took a 19in model, turned the brightness from the maximum to minimum setting, and power consumption halved from 48 to 24W. A similar test on the 22in Chimei CMV 221H saw power use fall from 41.5 to a mere 14.2W. The image it still readable, too, once your eyes get used to the new look, but even dropping from 100 to 60 per cent could save a significant amount, though this depends on the monitor. Windows Vista users can also benefit from creating a new power plan. First click on 'Control Panel | Power Options | Create a power plan, use Power Saver' as a base'. Choose this power plan, then click 'Change Plan Settings | Change Advanced Power Settings', locate 'Processor Power Management' in the list and check 'Maximum Processor State' is set to something like 10 per cent. And while you're there, set 'Search and Indexing' to 'High Performance'. Selecting this power plan last thing at night ensures your CPU will only run at very low speeds, but it will still cope just fine if you're only downloading files. And again, the money savings are very worthwhile: our test system saved 20W on idle, 40W on light processor activity. You could now have cut your power consumption by more than 50W, enough to make a real difference to your bill. But why stop there? Borrow a power meter and try some of these other ideas, particularly monitor brightness, with friends and at work. These power savings don't justify you leaving a system on just because you can't be bothered to wait a couple of minutes while it boots, of course. But if you're making good use of your 24/7 PC through the ideas we've suggested, and maybe others, then you should at least now be able to enjoy the benefits without feeling any green guilt or paying too much for the privilege.
ESSENTIALAI-STEM
Tycho Jæger Tycho Christoffer Jæger (25 June 1819 – 31 January 1889) was a Norwegian painter. Biography Tycho Christoffer Jæger was born in Bergen as a son of the first cousins, shoemaker Tycho Christoffer Jæger and Øllegaard Jæger. He was an uncle of Henrik Jæger. From September 1870 he was married to Bergithe Steendahl (1850–1932). He painted between 1841 and 1889, almost exclusively landscapes. He studied partly in Copenhagen, in the 1840s. He also travelled in Norway, Denmark and Sweden, and lived in Bergen and Leikanger after taking his education. Norsk biografisk leksikon called two of his paintings "among the most peculiar to be created in contemporary Norwegian art".
WIKI
Detecting Exoplanet Life in Our Proximity Title: Detecting Proxima b’s Atmosphere with JWST Targeting CO2 at 15 Micron Using a High-Pass Spectral Filtering Technique Authors: I.A.G. Snellen, J.M. D’esert, L.B.F.M. Waters, T. Robinson, et al. Lead Author’s Institution: Leiden Observatory, Leiden University, The Netherlands Status: Accepted for Publication in AJ, open access   Proxima Centauri b and The Significance of CO2 This summer marks the one-year anniversary of the detection of an exoplanet orbiting our solar system’s nearest stellar neighbor, Proxima Centauri. This Earth sized exoplanet, with the oh-so-imaginative name Proxima Centauri b, lies in the habitable zone of its M-dwarf star. As we’ve previously discussed, having such an Earth-like planet in our stellar backyard is really exciting, and astronomers are keen to explore the system as thoroughly as possible for potential signs of life. Figure 1 shows an artists’s rendition of this intriguing exoplanet. Figure 1: This artist’s interpretation shows the planet Proxima Centauri b around its star, Proxima Centauri. Proxima Centauri is actually part of trinary system which includes the close binary Alpha Centauri AB. You can see Alpha Centauri AB in between the planet and star, as two faint white dots in the background. Image: ESO. Since the discovery of this close planet, researchers have been studying methods that might detect the presence of life on Proxima Centauri b. Today’s paper by devising a method to detect  CO2 in the planet’s atmosphere. They focus on this particular molecule because it is one of the four main biomarkers used in evaluating habitability of exoplanets; water, methane, carbon dioxide, and oxygen are primarily produced during biological processes, so their presence in the atmosphere implies life. In addition to being a biomarker molecule, carbon dioxide (CO2) has many distinguishable features that are visible on the 15 micron band, which JWST is equipped to look at. These researchers present a technique that can be performed with the soon-to-be-launched James Webb Space Telescope (JWST) which will reveal the presence of CO2 in the atmosphere of this nearby exoplanet. The emission in the 15 micron band will be ideal for detecting CO2, since this molecule has over 100 features within this band. JWST and High-Pass Spectral Filtering Techniques JWST is equipped with several extremely sensitive instruments. One of the goals of this mission is to detect and characterize atmospheres of exoplanets. With this in mind, these authors suggest using the medium resolution spectrograph (MRS) mode of the Mid-Infrared Instrument (MIRI) to detect CO2 markers in the atmosphere of Proxima Centauri b. Figure 2: This shows an example planet spectrum and high-pass filtered spectrum. The high-pass image has more distinguishable features, which allows for greater sensitivity in molecule detection. Figure 1 in the paper. This new technique combines several methods to attain greater sensitivity. The cross-correlation requires a high spectral resolution which finds the radial component of the planet orbital velocity that is used to filter out the planet’s signal.e his method cross-correlates the observed spectrum with template spectra; however, the spectral resolution is not high enough to achieve this with Proxima Centauri b, so the authors suggest a slight modification; use this method while targeting a specific feature in the spectrum. Proxima Centauri b is believed to be tidally locked, meaning that the same hemisphere always faces the star. This means at certain alignments, Proxima b will show a contrast of up to 100 ppm with respect to the star. This contrast will be helpful in separating planet signatures from the flux of the star. This method does not require absolute flux calibration, but only depends on the relative flux of the star and the planets. However, a limitation of this method is that the stellar spectrum must be precisely known beforehand, since the flux of the planet, even at its highest, is much smaller than the stellar flux. The authors used atmospheric models of Proxima Centauri b to show the limits of their detection method in extreme cases and expected results which are shown in Figure 3. Figure 3: Planet model spectra, assuming a standard Earth atmospheric model for the temperatures and gas mixing ratios. The temperature and pressure relation is shown on the right column. The left column has the observed spectra given the temperature profiles. The upper panel has stratospheric temperatures that are equal to the tropopause temperature; the middle panel shows a model for clear sky conditions with an Earth-like temperature profile; the lower panel shows the spectrum for high, thick cloud coverage, again with an Earth-like temperature profile.   A Step Forward in the Search for Extraterrestrial Life If we can detect exoplanet life or a habitable exoplanet so close to Earth, this could tell us more about how common life is in our universe and the origins of life in different environments. Until we find a way to accurately detect the presence of life, such as detecting CO2 in atmospheres, we won’t know the extent of life in all parts of the universe. Though we don’t know for certain yet, I for one hope that we can soon discover and say hello to our new alien neighbors, hopefully on Proxima b! About Mara Zimmerman Mara is working on her PhD in Astronomy at the University of Wyoming. She has done research with Heartbeat binary stars, and currently works on modeling the composition of debris disks. When not at her computer writing code, she likes hiking, baking scones, and making puns. 3 Comments 1. Echoes of Fast radio Bursts can be used for interstellar Radar from proxima and other local systems as targets Signal processing employing previously recieved FRBs and borrowing SETI dishes for a brief period may be sufficient to recover the echoes from beneath cosmic noise. Reply 2. Nice bite, Mara. One request tho – on future, could you link to the abstract in arXiv not directly to the PDF? If I’m accessing the internet on a mobile I don’t necessarily want a PDF (of unknown size) to download, but I may well want to glance at the abstract and decide whether to get the paper later. Reply 3. As a student in high school, I have always loved learning about physics and biology. I find this topic interesting because not only does it pose the possibility of colonizing a different planet relatively close to our Solar System, but also because it opens up the possibility of finding planets with extraterrestrial life. I hope to learn more about this topic and to also hear if there are any updates to the progress of the James Webb Space Telescope in the future! Reply Trackbacks/Pingbacks 1. ALMA descubre polvo frío alrededor de la estrella más cercana – Asociación de Aficionados a la Astronomía del Uruguay - […] Detecting Exoplanet Life in Our Proximity.  Mara Zimmerman | Astrobites, Aug 1, 2017 . […] 2. Proxima Centauri sports a fancy dust ring | astrobites - […] this undistinguished low-mass red dwarf star became a target for tireless examination, despite the challenges involved in observing it.… 3. Proxima Centauri Sports a Fancy Dust Ring - […] this undistinguished low-mass red dwarf star became a target for tireless examination, despite the challenges involved in observing it.… 4. Choosing targets with TESS | astrobites - […] present in an exoplanet’s atmosphere is important because doing so can allow us to look for signs of life.… Leave a Reply
ESSENTIALAI-STEM
[07/13] dax: Inline dax_pmd_insert_mapping() into the callsite Message ID 20170817160815.30466-8-jack@suse.cz State Not Applicable Headers show Commit Message Jan Kara Aug. 17, 2017, 4:08 p.m. dax_pmd_insert_mapping() has only one callsite and we will need to further fine tune what it does for synchronous faults. Just inline it into the callsite so that we don't have to pass awkward bools around. Signed-off-by: Jan Kara <jack@suse.cz> --- fs/dax.c | 43 ++++++++++++++----------------------------- include/trace/events/fs_dax.h | 1 - 2 files changed, 14 insertions(+), 30 deletions(-) Comments Ross Zwisler Aug. 18, 2017, 10:12 p.m. | #1 On Thu, Aug 17, 2017 at 06:08:09PM +0200, Jan Kara wrote: > dax_pmd_insert_mapping() has only one callsite and we will need to > further fine tune what it does for synchronous faults. Just inline it > into the callsite so that we don't have to pass awkward bools around. > > Signed-off-by: Jan Kara <jack@suse.cz> Sure, looks good. Reviewed-by: Ross Zwisler <ross.zwisler@linux.intel.com> Christoph Hellwig Aug. 23, 2017, 6:32 p.m. | #2 Looks fine, Reviewed-by: Christoph Hellwig <hch@lst.de> Patch diff --git a/fs/dax.c b/fs/dax.c index 766cb840c276..54d2a9161f71 100644 --- a/fs/dax.c +++ b/fs/dax.c @@ -1230,34 +1230,6 @@ static int dax_iomap_pte_fault(struct vm_fault *vmf, */ #define PG_PMD_COLOUR ((PMD_SIZE >> PAGE_SHIFT) - 1) -static int dax_pmd_insert_mapping(struct vm_fault *vmf, struct iomap *iomap, - loff_t pos, void *entry) -{ - struct address_space *mapping = vmf->vma->vm_file->f_mapping; - const sector_t sector = dax_iomap_sector(iomap, pos); - struct inode *inode = mapping->host; - void *ret = NULL; - pfn_t pfn; - int rc; - - rc = dax_iomap_pfn(iomap, pos, PMD_SIZE, &pfn); - if (rc < 0) - goto fallback; - - ret = dax_insert_mapping_entry(mapping, vmf, entry, sector, - RADIX_DAX_PMD); - if (IS_ERR(ret)) - goto fallback; - - trace_dax_pmd_insert_mapping(inode, vmf, PMD_SIZE, pfn, ret); - return vmf_insert_pfn_pmd(vmf->vma, vmf->address, vmf->pmd, - pfn, vmf->flags & FAULT_FLAG_WRITE); - -fallback: - trace_dax_pmd_insert_mapping_fallback(inode, vmf, length, pfn, ret); - return VM_FAULT_FALLBACK; -} - static int dax_pmd_load_hole(struct vm_fault *vmf, struct iomap *iomap, void *entry) { @@ -1312,6 +1284,7 @@ static int dax_iomap_pmd_fault(struct vm_fault *vmf, void *entry; loff_t pos; int error; + pfn_t pfn; /* * Check whether offset isn't beyond end of file now. Caller is @@ -1379,7 +1352,19 @@ static int dax_iomap_pmd_fault(struct vm_fault *vmf, switch (iomap.type) { case IOMAP_MAPPED: - result = dax_pmd_insert_mapping(vmf, &iomap, pos, entry); + error = dax_iomap_pfn(&iomap, pos, PMD_SIZE, &pfn); + if (error < 0) + goto finish_iomap; + + entry = dax_insert_mapping_entry(mapping, vmf, entry, + dax_iomap_sector(&iomap, pos), + RADIX_DAX_PMD); + if (IS_ERR(entry)) + goto finish_iomap; + + trace_dax_pmd_insert_mapping(inode, vmf, PMD_SIZE, pfn, entry); + result = vmf_insert_pfn_pmd(vma, vmf->address, vmf->pmd, pfn, + write); break; case IOMAP_UNWRITTEN: case IOMAP_HOLE: diff --git a/include/trace/events/fs_dax.h b/include/trace/events/fs_dax.h index fbc4a06f7310..88a9d19b8ff8 100644 --- a/include/trace/events/fs_dax.h +++ b/include/trace/events/fs_dax.h @@ -148,7 +148,6 @@ DEFINE_EVENT(dax_pmd_insert_mapping_class, name, \ TP_ARGS(inode, vmf, length, pfn, radix_entry)) DEFINE_PMD_INSERT_MAPPING_EVENT(dax_pmd_insert_mapping); -DEFINE_PMD_INSERT_MAPPING_EVENT(dax_pmd_insert_mapping_fallback); DECLARE_EVENT_CLASS(dax_pte_fault_class, TP_PROTO(struct inode *inode, struct vm_fault *vmf, int result),
ESSENTIALAI-STEM
3 open source log aggregation tools 3 open source log aggregation tools Log aggregation systems can help with troubleshooting and other tasks. Here are three top options. Person standing in front of a giant computer screen with numbers, data Image by :  opensource.com x Get the newsletter Join the 85,000 open source advocates who receive our giveaway alerts and article roundups. How is metrics aggregation different from log aggregation? Can’t logs include metrics? Can’t log aggregation systems do the same things as metrics aggregation systems? These are questions I hear often. I’ve also seen vendors pitching their log aggregation system as the solution to all observability problems. Log aggregation is a valuable tool, but it isn’t normally a good tool for time-series data. A couple of valuable features in a time-series metrics aggregation system are the regular interval and the storage system customized specifically for time-series data. The regular interval allows a user to derive real mathematical results consistently. If a log aggregation system is collecting metrics in a regular interval, it can potentially work the same way. However, the storage system isn’t optimized for the types of queries that are typical in a metrics aggregation system. These queries will take more resources and time to process using storage systems found in log aggregation tools. So, we know a log aggregation system is likely not suitable for time-series data, but what is it good for? A log aggregation system is a great place for collecting event data. These are irregular activities that are significant. An example might be access logs for a web service. These are significant because we want to know what is accessing our systems and when. Another example would be an application error condition—because it is not a normal operating condition, it might be valuable during troubleshooting. A handful of rules for logging: • DO include a timestamp • DO format in JSON • DON’T log insignificant events • DO log all application errors • MAYBE log warnings • DO turn on logging • DO write messages in a human-readable form • DON’T log informational data in production • DON’T log anything a human can’t read or react to Cloud costs When investigating log aggregation tools, the cloud might seem like an attractive option. However, it can come with significant costs. Logs represent a lot of data when aggregated across hundreds or thousands of hosts and applications. The ingestion, storage, and retrieval of that data are expensive in cloud-based systems. As a point of reference from a real system, a collection of around 500 nodes with a few hundred apps results in 200GB of log data per day. There’s probably room for improvement in that system, but even reducing it by half will cost nearly $10,000 per month in many SaaS offerings. This often includes retention of only 30 days, which isn’t very long if you want to look at trending data year-over-year. This isn’t to discourage the use of these systems, as they can be very valuable—especially for smaller organizations. The purpose is to point out that there could be significant costs, and it can be discouraging when they are realized. The rest of this article will focus on open source and commercial solutions that are self-hosted. Tool options ELK ELK, short for Elasticsearch, Logstash, and Kibana, is the most popular open source log aggregation tool on the market. It’s used by Netflix, Facebook, Microsoft, LinkedIn, and Cisco. The three components are all developed and maintained by Elastic. Elasticsearch is essentially a NoSQL, Lucene search engine implementation. Logstash is a log pipeline system that can ingest data, transform it, and load it into a store like Elasticsearch. Kibana is a visualization layer on top of Elasticsearch. A few years ago, Beats were introduced. Beats are data collectors. They simplify the process of shipping data to Logstash. Instead of needing to understand the proper syntax of each type of log, a user can install a Beat that will export NGINX logs or Envoy proxy logs properly so they can be used effectively within Elasticsearch. When installing a production-level ELK stack, a few other pieces might be included, like Kafka, Redis, and NGINX. Also, it is common to replace Logstash with Fluentd, which we’ll discuss later. This system can be complex to operate, which in its early days led to a lot of problems and complaints. These have largely been fixed, but it’s still a complex system, so you might not want to try it if you’re a smaller operation. That said, there are services available so you don’t have to worry about that. Logz.io will run it for you, but its list pricing is a little steep if you have a lot of data. Of course, you’re probably smaller and may not have a lot of data. If you can’t afford Logz.io, you could look at something like AWS Elasticsearch Service (ES). ES is a service Amazon Web Services (AWS) offers that makes it very easy to get Elasticsearch working quickly. It also has tooling to get all AWS logs into ES using Lambda and S3. This is a much cheaper option, but there is some management required and there are a few limitations. Elastic, the parent company of the stack, offers a more robust product that uses the open core model, which provides additional options around analytics tools, and reporting. It can also be hosted on Google Cloud Platform or AWS. This might be the best option, as this combination of tools and hosting platforms offers a cheaper solution than most SaaS options and still provides a lot of value. This system could effectively replace or give you the capability of a security information and event management (SIEM) system. The ELK stack also offers great visualization tools through Kibana, but it lacks an alerting function. Elastic provides alerting functionality within the paid X-Pack add-on, but there is nothing built in for the open source system. Yelp has created a solution to this problem, called ElastAlert, and there are probably others. This additional piece of software is fairly robust, but it increases the complexity of an already complex system. Graylog Graylog has recently risen in popularity, but it got its start when Lennart Koopmann created it back in 2010. A company was born with the same name two years later. Despite its increasing use, it still lags far behind the ELK stack. This also means it has fewer community-developed features, but it can use the same Beats that the ELK stack uses. Graylog has gained praise in the Go community with the introduction of the Graylog Collector Sidecar written in Go. Graylog uses Elasticsearch, MongoDB, and the Graylog Server under the hood. This makes it as complex to run as the ELK stack and maybe a little more. However, Graylog comes with alerting built into the open source version, as well as several other notable features like streaming, message rewriting, and geolocation. The streaming feature allows for data to be routed to specific Streams in real time while they are being processed. With this feature, a user can see all database errors in a single Stream and web server errors in a different Stream. Alerts can even be based on these Streams as new items are added or when a threshold is exceeded. Latency is probably one of the biggest issues with log aggregation systems, and Streams eliminate that issue in Graylog. As soon as the log comes in, it can be routed to other systems through a Stream without being processed fully. The message rewriting feature uses the open source rules engine Drools. This allows all incoming messages to be evaluated against a user-defined rules file enabling a message to be dropped (called Blacklisting), a field to be added or removed, or the message to be modified. The coolest feature might be Graylog’s geolocation capability, which supports plotting IP addresses on a map. This is a fairly common feature and is available in Kibana as well, but it adds a lot of value—especially if you want to use this as your SIEM system. The geolocation functionality is provided in the open source version of the system. Graylog, the company, charges for support on the open source version if you want it. It also offers an open core model for its Enterprise version that offers archiving, audit logging, and additional support. There aren’t many other options for support or hosting, so you’ll likely be on your own if you don’t use Graylog (the company). Fluentd Fluentd was developed at Treasure Data, and the CNCF has adopted it as an Incubating project. It was written in C and Ruby and is recommended by AWS and Google Cloud. Fluentd has become a common replacement for Logstash in many installations. It acts as a local aggregator to collect all node logs and send them off to central storage systems. It is not a log aggregation system. It uses a robust plugin system to provide quick and easy integrations with different data sources and data outputs. Since there are over 500 plugins available, most of your use cases should be covered. If they aren’t, this sounds like an opportunity to contribute back to the open source community. Fluentd is a common choice in Kubernetes environments due to its low memory requirements (just tens of megabytes) and its high throughput. In an environment like Kubernetes, where each pod has a Fluentd sidecar, memory consumption will increase linearly with each new pod created. Using Fluentd will drastically reduce your system utilization. This is becoming a common problem with tools developed in Java that are intended to run one per node where the memory overhead hasn’t been a major issue. What to read next In the first of a new series focusing on DevOps monitoring tools, we review the various types of system observability tools. About the author Dan Barker Dan Barker - Website: http://danbarker.codes Email: dan@danbarker.codes Dan spent 12 years in the military as a fighter jet mechanic before transitioning to a career in technology as a software engineer and then a manager. He was the Chief Architect at the National Association of Insurance Commissioners leading their technical and cultural transformation. He's now leading RSA Archer as their Chief Architect in their cloud...
ESSENTIALAI-STEM
Thread:Comments:"Bigoted woman": controversial Gordon Brown remarks caught on air/Comments from feedback form - "I don't see why the article is..." I don't see why the article is really so against Brown. It also didn't mention wether the recording was intentional or not.
WIKI
Page:Aloway Kirk, or, Tam O' Shanter (NLS104186395).pdf/6 6 A murdere's banes in gibbet airns; Twa span long, wee unchristened bairns; A thief, new cutted frae a rape, Wi' his last gasp his gah did gape: Five tomahawks, wi' blud red-rusted : Five scimitars, wi' murder crusted ; A garter, which a babe had strangled : A knife a father's throat had mangled, Whom his ain ſon of life bereft, The grey hairs yet stack to the heſt: With mair o' Forrible and awfu' Which een to name wad be unlawfu? Three lawyers' tongues. turn'd inside out. Wi'lies ſeem'd like a beggar clout; Three Priests hearts, ratten, black as muck, Lay stinking, vile, in every neuck.— As Tamie glow'd, amaz'd and curious, The mirth and fun grew fast and furious ; The piper loud and louder blew : The dancers quick and quicker flew; They reel'd, they set, they cross d, they cleekit, Till ilka Carlin ſwat and reekit, And koost her dudies to the wark, And linkit at it in her sark! Now, Tam, O Tam! had they been queens A' plump and strapping in their teens; Their sarks, instead o' creeshie flanen, Been snaw white, ſeventeen hundred linen! Thir breeks o' mine, my only pair That ance were plush o gude blue hair, I wad hae gien them aff my hurdies, For a blink o' the bory burdies! But wither'a bedlams, auld and droll,
WIKI
Don’t Slouch! Five Exercises to Fix Bad Posture By Top.me Top.me Look great, feel healthy and live happy with Top.me. You look more like the Hunchback of Notre Dame than Arnold Schwarzenegger? Read on for some key exercises to fix bad posture. tl;dr - click to read summary Bad posture can be reversed with daily practice. Effective and easy to do exercises include brdiges, spine rotations and shoulder stretches. Exaggerated curvature of the spine as in the “hunchback” posture is termed kyphosis. There are several factors that can lead to this unnatural curvature, including excessive amounts of time in poor seated positions (couch/office chair); muscular imbalances through the posterior chain (including spinal muscles, gluteal muscles and neck) and of course ‘stooping’ — a problem mainly with tall people who have to constantly orient their head downwards to interact with others and their environment. What Leads to Hunchback Posture? fix bad posture The spine is under a tremendous amount of pressure to maintain an upright posture. Muscles of the neck must be strong and properly balanced in order to keep the head in a stable upright position. The problem, however, is much more complex than just neck position. Kyphotic curvature of the spine manifests in the upper (thoracic) region but it often originates from musclular problems further down the body. Here is a brief list of muscle groups that affect your posture: • Hip extensors: gluteus maximus and hamstrings • Hip flexors • Spinal erectors (deep muscles that support the spinal column) • Trunk flexors: abs and obliques • Internal rotators such as the muscles in the chest and the lats • External rotators such as the muscles of the upper back and the rear of the shoulders • Shoulder blade (scapula) muscles including elevators, retractors and depressors. This is a general list but as you can see, any muscle involved in moving the shoulder blades, supporting the spine or maintaining correct hip posture will influence your postural alignment. For this reason, exercises that focus solely on the upper back and neck regions won’t be sufficient to counter a kyphotic spine. Believe it or not but the muscles that align the hips are often to blame for many postural problems. Poor gluteal, hip flexor and hamstring activation in daily movements cause the pelvis to tilt forwards. This anterior pelvic tilt pulls the spine with it. If the spinal curvature is compromised in this way in the lower back the upper body will be forced to compensate by widening the arc of the upper spine. Over time this becomes set in place and gets worse if not corrected. Excercises to Fix Bad Posture Knowing that the problems in thoracic spine curvature originate in poor muscle activation in the core helps you construct an exercise regime that will benefit your entire posterior chain. This also means less crippling problems in the lower back, more even activation of muscles in the hips and glutes and better overall movement. The first step in fixing poor posture is to start at the root cause. Stretch your hip flexors, hamstrings and lower back. Focus on strengthening the abs and glutes. Activating these muscles groups prevents imbalances rotating the pelvis forward and setting off a domino effect of dysfunctional movement. Below are a handful of exercises that will recreate healthy postural alignment. We also have e a sample daily workout to show how to integrate these into your life. 1) Bridges Bridge Since stooping forward is very easy for the body to do, the Bridge and Bridge Holds help train your muscles and joints to be comfortable bending backwards. Bridges help reverse the naturally tendency of the body to stoop forward while activating all the muscles of the posterior chain. Think of the Bridge as a functional correction exercise that wakes up the glutes and strengthens the deep muscles of the spine. As you get stronger, progress to more challenging Bridge variations, such as the Full Bridge that requires arching your back so only your hands and feet are supporting you. You can perform these as isometric holds (think of it as a reverse Plank) or lower your torso down and perform reps. 2) Crucifix Stretches Crucifix Stretches Excessive amounts of time in seated positions causes the muscles in both the lower and upper back to shorten, leading to poor posture. The Crucifix Stretch is so good at undoing these shortened muscles that you should do it every day. How to do it: Stand tall with your arms extended out to your sides and shoulder height. Turn your wrists so your thumbs face backwards and pull your arms back as if stretching the chest. Hold and then return to perform another rep. 3) T-Spine Rotations T-Spine Rotation Thoracic (T) Spine Rotations are essential for increasing mobility in the thoracic spine region. The thoracic spinal region evolved for flexion, extension and rotation. People with kyphotic spines have poor mobility in this region so T-Spine Rotations address this issue nicely. How to do it: Get on all fours with your arms at full length and hands just in front of your shoulders. Take your right hand and hold the back of your head. Move your elbow in a rotation underneath your left pectoral muscle. Reverse the rotation until your elbow is overhead, trying to move rotate as far s possible. Make this movement effective by keeping your gaze fixed on the moving elbow. 4) Scapular Wall Slides Wall Slides Wall Slides mobilize the thoracic spine through extension while providing for good mobility through the shoulders. This exercise also strengthens the scapular retractors and is regard as one of the best remedial exercises for hunchback posture. How to do it: Stand about 12 inches away from a wall, facing out into the room. With your arms in a ‘W’ shape, hands facing up, push your hands up the wall until they reach a ‘Y’ position. Contract your shoulder blades to return your arms to the ‘W’ position. 5) Lying Y Handcuff Lying Y Handcuff This is a great exercise, named by legendary athletic trainer Joe DeFranco. The benefits you will get from this exercise include stronger muscle of the rotator muscles in the upper back as well thoracic and shoulder mobility. How to do it: Lie face down with your head of the floor and lower back slightly hyperextended. With your hands in a ‘Y’ position out in front of you and thumbs pointing up, pull the arms back in an arc until your hands meet behind your back (think handcuff position). Reverse the arc back around until you’re at the start again. When done properly you’ll feel a nice burn in your upper back and it makes a nice upper body warm up exercise before lifting weights. Make Good Posture a Daily Commitment Bad posture comes about through repeated daily practice of bad movements so it makes sense that resurrecting your posture will take a daily commitment. Aside from practising better posture at your workstation and when standing/walking, you’ll need to perform at least 10 minutes of corrective exercise daily. If you’re already working out you can use this little routine as a great warm up. You’ll find the mobility exercises will help grease your joints and activate the muscles necessary for efficient movement. Here’s a sample routine you can use. Any resistance training you do to supplement these exercises is a bonus. Day Stretches Perform the following stretches throughout the day, especially after periods of sitting down: Stretches Reps Crucifix Stretch 5-10 reps, hold each stretch for 3 seconds Hamstring stretch Perform a hamstring stretch of your choice, holding 30 seconds. Mobility Warm Up T-Spine Rotations Perform as a circuit. One round is best for warm up. Two rounds for posture corrective purposes. Rest briefly between exercises: Exercises Reps Crucifix Stretches 5-10 reps, 3 second hold Bridges Isometric hold for 30 seconds. Use whichever form of bridge is suitable for your current strength level. Lying Y Handcuffs 10 reps Scapula Wall Slides 12 reps T-Spine Rotations 12 reps (6 rotations per side). When performing these exercises emphasize quality of movement and good form over rep goals and fatigue. The purpose of these exercises is to improve your posture and movement so be sure to maintain quality movement throughout the entire set. You can do the routine every day (recommended) but if you choose to do it every other day, make sure you at least stretch your hamstrings and do the crucifix stretch  a couple of times per day. You’ll feel better for it trust me. The five exercises listed represent some of the best movements you can do to fix your posture. Make these exercises part of your life and you will avoid the back problems many people face as they get older.
ESSENTIALAI-STEM
Day and Night Stories/H. S. H. In the mountain Club Hut, to which he had escaped after weeks of gaiety in the capital, Delane, young travelling Englishman, sat alone, and listened to the wind that beat the pines with violence. The firelight danced over the bare stone floor and raftered ceiling, giving the room an air of movement, and though the solid walls held steady against the wild spring hurricane, the cannonading of the wind seemed to threaten the foundations. For the mountain shook, the forest roared, and the shadows had a way of running everywhere as though the little building trembled. Delane watched and listened. He piled the logs on. From time to time he glanced nervously over his shoulder, restless, half uneasy, as a burst of spray from the branches dashed against the window, or a gust of unusual vehemence shook the door. Overwearied with his long day’s climb among impossible conditions, he now realised, in this mountain refuge, his utter loneliness; for his mind gave birth to that unwelcome symptom of true loneliness⁠—that he was not, after all, alone. Continually he heard steps and voices in the storm. Another wanderer, another climber out of season like himself, would presently arrive, and sleep was out of the question until first he heard that knocking on the door. Almost⁠—he expected someone. He went for the tenth time to the little window. He peered forth into the thick darkness of the dropping night, shading his eyes against the streaming pane to screen the firelight in an attempt to see if another climber⁠—perhaps a climber in distress⁠—were visible. The surroundings were desolate and savage, well named the Devil’s Saddle. Black-faced precipices, streaked with melting snow, rose towering to the north, where the heights were hidden in seas of vapour; waterfalls poured into abysses on two sides; a wall of impenetrable forest pressed up from the south; and the dangerous ridge he had climbed all day slid off wickedly into a sky of surging cloud. But no human figure was, of course, distinguishable, for both the lateness of the hour and the elemental fury of the night rendered it most unlikely. He turned away with a start, as the tempest delivered a blow with massive impact against his very face. Then, clearing the remnants of his frugal supper from the table, he hung his soaking clothes at a new angle before the fire, made sure the door was fastened on the inside, climbed into the bunk where white pillows and thick Austrian blankets looked so inviting, and prepared finally for sleep. “I must be overtired,” he sighed, after half an hour’s weary tossing, and went back to make up the sinking fire. Wood is plentiful in these climbers’ huts; he heaped it on. But this time he lit the little oil lamp as well, realising⁠—though unwilling to acknowledge it⁠—that it was not overfatigue that banished sleep, but this unwelcome sense of expecting someone, of being not quite alone. For the feeling persisted and increased. He drew the wooden bench close up to the fire, turned the lamp as high as it would go, and wished unaccountably for the morning. Light was a very pleasant thing; and darkness now, for the first time since childhood, troubled him. It was outside; but it might so easily come in and swamp, obliterate, extinguish. The darkness seemed a positive thing. Already, somehow, it was established in his mind⁠—this sense of enormous, aggressive darkness that veiled an undesirable hint of personality. Some shadow from the peaks or from the forest, immense and threatening, pervaded all his thought. “This can’t be entirely nerves,” he whispered to himself. “I’m not so tired as all that!” And he made the fire roar. He shivered and drew closer to the blaze. “I’m out of condition; that’s part of it,” he realised, and remembered with loathing the weeks of luxurious indulgence just behind him. For Delane had rather wasted his year of educational travel. Straight from Oxford, and well supplied with money, he had first saturated his mind in the latest Continental thought⁠—the science of France, the metaphysics and philosophy of Germany⁠—and had then been caught aside by the gaiety of capitals where the lights are not turned out at midnight by a Sunday School police. He had been surfeited, physically, emotionally, and intellectually, till his mind and body longed hungrily for simple living again and simple teaching⁠—above all, the latter. The Road of Excess leads to the Palace of Wisdom⁠—for certain temperaments (as Blake forgot to add), of which Delane was one. For there was stuff in the youth, and the reaction had set in with violent abruptness. His system rebelled. He cut loose energetically from all soft delights, and craved for severity, pure air, solitude and hardship. Clean and simple conditions he must have without delay, and the tonic of physical battling. It was too early in the year to climb seriously, for the snow was still dangerous and the weather wild, but he had chosen this most isolated of all the mountain huts in order to make sure of solitude, and had come, without guide or companion, for a week’s strenuous life in wild surroundings, and to take stock of himself with a view to full recovery. And all day long as he climbed the desolate, unsafe ridge, his mind⁠—good, wholesome, natural symptom⁠—had reverted to his childhood days, to the solid worldly wisdom of his churchgoing father, and to the early teaching (oh, how sweet and refreshing in its literal spirit!) at his mother’s knee. Now, as he watched the blazing logs, it came back to him again with redoubled force; the simple, precious, old-world stories of heaven and hell, of a paternal Deity, and of a daring, subtle, personal devil⁠— The interruption to his thoughts came with startling suddenness, as the roaring night descended against the windows with a thundering violence that shook the walls and sucked the flame halfway up the wide stone chimney. The oil lamp flickered and went out. Darkness invaded the room for a second, and Delane sprang from his bench, thinking the wet snow had loosened far above and was about to sweep the hut into the depths. And he was still standing, trembling and uncertain, in the middle of the room, when a deep and sighing hush followed sharp upon the elemental outburst, and in the hush, like a whisper after thunder, he heard a curious steady sound that, at first, he thought must be a footstep by the door. It was then instantly repeated. But it was not a step. It was someone knocking on the heavy oaken panels⁠—a firm, authoritative sound, as though the new arrival had the right to enter and was already impatient at the delay. The Englishman recovered himself instantly, realising with keen relief the new arrival⁠—at last. “Another climber like myself, of course,” he said, “or perhaps the man who comes to prepare the hut for others. The season has begun.” And he went over quickly, without a further qualm, to unbolt the door. “Forgive!” he exclaimed in German, as he threw it wide, “I was half asleep before the fire. It is a terrible night. Come in to food and shelter, for both are here, and you shall share such supper as I possess.” And a tall, cloaked figure passed him swiftly with a gust of angry wind from the impenetrable blackness of the world beyond. On the threshold, for a second, his outline stood full in the blaze of firelight with the sheet of darkness behind it, stately, erect, commanding, his cloak torn fiercely by the wind, but the face hidden by a low-brimmed hat; and an instant later the door shut with resounding clamour upon the hurricane, and the two men turned to confront one another in the little room. Delane then realised two things sharply, both of them fleeting impressions, but acutely vivid: First, that the outside darkness seemed to have entered and established itself between him and the new arrival; and, secondly, that the stranger’s face was difficult to focus for clear sight, although the covering hat was now removed. There was a blur upon it somewhere. And this the Englishman ascribed partly to the flickering effect of firelight, and partly to the lightning glare of the man’s masterful and terrific eyes, which made his own sight waver in some curious fashion as he gazed upon him. These impressions, however, were but momentary and passing, due doubtless to the condition of his nerves and to the semi-shock of the dramatic, even theatrical entrance. Delane’s senses, in this wild setting, were guilty of exaggeration. For now, while helping the man remove his cloak, speaking naturally of shelter, food, and the savage weather, he lost this first distortion and his mind recovered sane proportion. The stranger, after all, though striking, was not of appearance so uncommon as to cause alarm; the light and the low doorway had touched his stature with illusion. He dwindled. And the great eyes, upon calmer subsequent inspection, lost their original fierce lightning. The entering darkness, moreover, was but an effect of the upheaving night behind him as he strode across the threshold. The closed door proved it. And yet, as Delane continued his quieter examination, there remained, he saw, the startling quality which had caused that first magnifying in his mind. His senses, while reporting accurately, insisted upon this arresting and uncommon touch: there was, about this late wanderer of the night, some evasive, lofty strangeness that set him utterly apart from ordinary men. The Englishman examined him searchingly, surreptitiously, but with a touch of passionate curiosity he could not in the least account for nor explain. There were contradictions of perplexing character about him. For the first presentment had been of splendid youth, while on the face, though vigorous and gloriously handsome, he now discerned the stamp of tremendous age. It was worn and tired. While radiant with strength and health and power, it wore as well this certain signature of deep exhaustion that great experience rather than physical experience brings. Moreover, he discovered in it, in some way he could not hope to describe, man, woman, and child. There was a big, sad earnestness about it, yet a touch of humour too; patience, tenderness, and sweetness held the mouth; and behind the high pale forehead intellect sat enthroned and watchful. In it were both love and hatred, longing and despair; an expression of being ever on the defensive, yet hugely mutinous; an air both hunted and beseeching; great knowledge and great woe. Delane gave up the search, aware that something unalterably splendid stood before him. Solemnity and beauty swept him too. His was never the grotesque assumption that man must be the highest being in the universe, nor that a thing is a miracle merely because it has never happened before. He groped, while explanation and analysis both halted. “A great teacher,” thought fluttered through him, “or a mighty rebel! A distinguished personality beyond all question! Who can he be?” There was something regal that put respect upon his imagination instantly. And he remembered the legend of the countryside that Ludwig of Bavaria was said to be about when nights were very wild. He wondered. Into his speech and manner crept unawares an attitude of deference that was almost reverence, and with it⁠—whence came this other quality?⁠—a searching pity. “You must be wearied out,” he said respectfully, busying himself about the room, “as well as cold and wet. This fire will dry you, sir, and meanwhile I will prepare quickly such food as there is, if you will eat it.” For the other carried no knapsack, nor was he clothed for the severity of mountain travel. “I have already eaten,” said the stranger courteously, “and, with my thanks to you, I am neither wet nor tired. The afflictions that I bear are of another kind, though ones that you shall more easily, I am sure, relieve.” He spoke as a man whose words set troops in action, and Delane glanced at him, deeply moved by the surprising phrase, yet hardly marvelling that it should be so. He found no ready answer. But there was evidently question in his look, for the other continued, and this time with a smile that betrayed sheer winning beauty as of a tender woman: “I saw the light and came to it. It is unusual⁠—at this time.” His voice was resonant, yet not deep. There was a ringing quality about it that the bare room emphasised. It charmed the young Englishman inexplicably. Also, it woke in him a sense of infinite pathos. “You are a climber, sir, like myself,” Delane resumed, lifting his eyes a moment uneasily from the coffee he brewed over a corner of the fire. “You know this neighbourhood, perhaps? Better, at any rate, than I can know it?” His German halted rather. He chose his words with difficulty. There was uncommon trouble in his mind. “I know all wild and desolate places,” replied the other, in perfect English, but with a wintry mournfulness in his voice and eyes, “for I feel at home in them, and their stern companionship my nature craves as solace. But, unlike yourself, I am no climber.” “The heights have no attraction for you?” asked Delane, as he mingled steaming milk and coffee in the wooden bowl, marvelling what brought him then so high above the valleys. “It is their difficulty and danger that fascinate me always. I find the loneliness of the summits intoxicating in a sense.” And, regardless of refusal, he set the bread and meat before him, the apple and the tiny packet of salt, then turned away to place the coffee pot beside the fire again. But as he did so a singular gesture of the other caught his eyes. Before touching bowl or plate, the stranger took the fruit and brushed his lips with it. He kissed it, then set it on the ground and crushed it into pulp beneath his heel. And, seeing this, the young Englishman knew something dreadfully arrested in his mind, for, as he looked away, pretending the act was unobserved, a thing of ice and darkness moved past him through the room, so that the pot trembled in his hand, rattling sharply against the hearthstone where he stooped. He could only interpret it as an act of madness, and the myth of the sad, drowned monarch wandering through this enchanted region, pressed into him again unsought and urgent. It was a full minute before he had control of his heart and hand again. The bowl was half emptied, and the man was smiling⁠—this time the smile of a child who implores the comfort of enveloping and understanding arms. “I am a wanderer rather than a climber,” he was saying, as though there had been no interval, “for, though the lonely summits suit me well, I now find in them only⁠—terror. My feet lose their sureness, and my head its steady balance. I prefer the hidden gorges of these mountains, and the shadows of the covering forests. My days”⁠—his voice drew the loneliness of uttermost space into its piteous accents⁠—“are passed in darkness. I can never climb again.” He spoke this time, indeed, as a man whose nerve was gone forever. It was pitiable almost to tears. And Delane, unable to explain the amazing contradictions, felt recklessly, furiously drawn to this trapped wanderer with the mien of a king yet the air and speech sometimes of a woman and sometimes of an outcast child. “Ah, then you have known accidents,” Delane replied with outer calmness, as he lit his pipe, trying in vain to keep his hand as steady as his voice. “You have been in one perhaps. The effect, I have been told, is⁠—” The power and sweetness in that resonant voice took his breath away as he heard it break in upon his own uncertain accents: “I have⁠—fallen,” the stranger replied impressively, as the rain and wind wailed past the building mournfully, “yet a fall that was no part of any accident. For it was no common fall,” the man added with a magnificent gesture of disdain, “while yet it broke my heart in two.” He stooped a little as he uttered the next words with a crying pathos that an outcast woman might have used. “I am,” he said, “engulfed in intolerable loneliness. I can never climb again.” With a shiver impossible to control, half of terror, half of pity, Delane moved a step nearer to the marvellous stranger. The spirit of Ludwig, exiled and distraught, had gripped his soul with a weakening terror; but now sheer beauty lifted him above all personal shrinking. There seemed some echo of lost divinity, worn, wild yet grandiose, through which this significant language strained towards a personal message⁠—for himself. “In loneliness?” he faltered, sympathy rising in a flood. “For my Kingdom that is lost to me forever,” met him in deep, throbbing tones that set the air on fire. “For my imperial ancient heights that jealousy took from me⁠—” The stranger paused, with an indescribable air of broken dignity and pain. Outside the tempest paused a moment before the awful elemental crash that followed. A bellowing of many winds descended like artillery upon the world. A burst of smoke rushed from the fireplace about them both, shrouding the stranger momentarily in a flying veil. And Delane stood up, uncomfortable in his very bones. “What can it be?” he asked himself sharply. “Who is this being that he should use such language?” He watched alarm chase pity, aware that the conversation held something beyond experience. But the pity returned in greater and ever greater flood. And love surged through him too. It was significant, he remembered afterwards, that he felt it incumbent upon himself to stand. Curious, too, how the thought of that mad, drowned monarch haunted memory with such persistence. Some vast emotion that he could not name drove out his subsequent words. The smoke had cleared, and a strange, high stillness held the world. The rain streamed down in torrents, isolating these two somehow from the haunts of men. And the Englishman stared then into a countenance grown mighty with woe and loneliness. There stood darkly in it this incommunicable magnificence of pain that mingled awe with the pity he had felt. The kingly eyes looked clear into his own, completing his subjugation out of time. “I would follow you,” ran his thought upon its knees, “follow you with obedience forever and ever, even into a last damnation. For you are sublime. You shall come again into your Kingdom, if my own small worship⁠—” Then blackness sponged the reckless thought away. He spoke in its place a more guarded, careful thing: “I am aware,” he faltered, yet conscious that he bowed, “of standing before a Great One of some world unknown to me. Who he may be I have but the privilege of wondering. He has spoken darkly of a Kingdom that is lost. Yet he is still, I see, a Monarch.” And he lowered his head and shoulders involuntarily. For an instant, then, as he said it, the eyes before him flashed their original terrific lightnings. The darkness of the common world faded before the entrance of an Outer Darkness. From gulfs of terror at his feet rose shadows out of the night of time, and a passionate anguish as of sudden madness seized his heart and shook it. He listened breathlessly for the words that followed. It seemed some wind of unutterable despair passed in the breath from those nonhuman lips: “I am still a Monarch, yes; but my Kingdom is taken from me, for I have no single subject. Lost in a loneliness that lies out of space and time, I am become a throneless Ruler, and my hopelessness is more than I can bear.” The beseeching pathos of the voice tore him in two. The Deity himself, it seemed, stood there accused of jealousy, of sin and cruelty. The stranger rose. The power about him brought the picture of a planet, throned in mid-heaven and poised beyond assault. “Not otherwise,” boomed the startling words as though an avalanche found syllables, “could I now show myself to⁠—you.” Delane was trembling horribly. He felt the next words slip off his tongue unconsciously. The shattering truth had dawned upon his soul at last. “Then the light you saw, and came to⁠—?” he whispered. “Was the light in your heart that guided me,” came the answer, sweet, beguiling as the music in a woman’s tones, “the light of your instant, brief desire that held love in it.” He made an opening movement with his arms as he continued, smiling like stars in summer. “For you summoned me; summoned me by your dear and precious belief: how dear, how precious, none can know but I who stand before you.” His figure drew up with an imperial air of proud dominion. His feet were set among the constellations. The opening movement of his arms continued slowly. And the music in his tones seemed merged in distant thunder. “For your single, brief belief,” he smiled with the grandeur of a condescending Emperor, “shall give my vanished Kingdom back to me.” And with an air of native majesty he held his hand out⁠—to be kissed. The black hurricane of night, the terror of frozen peaks, the yawning horror of the great abyss outside⁠—all three crowded into the Englishman’s mind with a slashing impact that blocked delivery of any word or action. It was not that he refused, it was not that he withdrew, but that Life stood paralysed and rigid. The flow stopped dead for the first time since he had left his mother’s womb. The God in him was turned to stone and rendered ineffective. For an appalling instant God was not. He realised the stupendous moment. Before him, drinking his little soul out merely by his Presence, stood one whose habit of mind, not alone his external accidents, was imperial with black prerogative before the first man drew the breath of life. August procedure was native to his inner process of existence. The stars and confines of the universe owned his sway before he fell, to trifle away the dreary little centuries by haunting the minds of feeble men and women, by hiding himself in nursery cupboards, and by grinning with stained gargoyles from the roofs of city churches.⁠ ⁠… And the lad’s life stammered, flickered, threatened to go out before the enveloping terror of the revelation. “I called to you⁠ ⁠… but called to you in play,” thought whispered somewhere deep below the level of any speech, yet not so low that the audacious sound of it did not crash above the elements outside; “for⁠ ⁠… till now⁠ ⁠… you have been to me but a⁠ ⁠… coated bogy⁠ ⁠… that my brain disowned with laughter⁠ ⁠… and my heart thought picturesque. If you are here⁠ ⁠… alive! May God forgive me for my⁠ ⁠…” It seemed as though tears⁠—the tears of love and profound commiseration⁠—drowned the very seed of thought itself. A sound stopped him that was like a collapse in heaven. Some crashing, as of a ruined world, passed splintering through his little timid heart. He did not yield, but he understood⁠—with an understanding which seemed the delicate first sign of yielding⁠—the seductiveness of evil, the sweet delight of surrendering the Will with utter recklessness to those swelling forces which disintegrate the heroic soul in man. He remembered. It was true. In the reaction from excess he had definitely called upon his childhood’s teaching with a passing moment of genuine belief. And now that yearning of a fraction of a second bore its awful fruit. The luscious Capitals where he had rioted passed in a coloured stream before his eyes; the Wine, the Woman, and the Song stood there before him, clothed in that Power which lies insinuatingly disguised behind their little passing show of innocence. Their glamour donned this domino of regal and virile grandeur. He felt entangled beyond recovery. The idea of God seemed sterile and without reality. The one real thing, the one desirable thing, the one possible, strong and beautiful thing⁠—was to bend his head and kiss those imperial fingers. He moved noiselessly towards the Hand. He raised his own to take it and lift it towards his mouth⁠— When there rose in his mind with startling vividness a small, soft picture of a child’s nursery, a picture of a little boy, kneeling in scanty nightgown with pink upturned soles, and asking ridiculous, audacious things of a shining Figure seated on a summer cloud above the kitchen-garden walnut tree. The tiny symbol flashed and went its way, yet not before it had lit the entire world with glory. For there came an absolutely routing power with it. In that half-forgotten instant’s craving for the simple teaching of his childhood days, Belief had conjured with two immense traditions. This was the second of them. The appearance of the one had inevitably produced the passage of its opposite.⁠ ⁠… And the Hand that floated in the air before him to be kissed sank slowly down below the possible level of his lips. He shrank away. Though laughter tempted something in his brain, there still clung about his heart the first aching, pitying terror. But size retreated, dwindling somehow as it went. The wind and rain obliterated every other sound; yet in that bare, unfurnished room of a climber’s mountain hut, there was a silence, above the roar, that drank in everything and broke the back of speech. In opposition to this masquerading splendour Delane had set up a personal, paternal Deity. “I thought of you, perhaps,” cried the voice of self-defence, “but I did not call to you with real belief. And, by the name of God, I did not summon you. For your sweetness, as your power, sickens me; and your hand is black with the curses of all the mothers in the world, whose prayers and tears⁠—” He stopped dead, overwhelmed by the cruelty of his reckless utterance. And the Other moved towards him slowly. It was like the summit of some peaked and terrible height that moved. He spoke. He changed appallingly. “But I claim,” he roared, “your heart. I claim you by that instant of belief you felt. For by that alone you shall restore to me my vanished Kingdom. You shall worship me.” In the countenance was a sudden awful power; but behind the stupefying roar there was weakness in the voice as of an imploring and beseeching child. Again, deep love and searching pity seared the Englishman’s heart as he replied in the gentlest accents he could find to master: “And I claim you,” he said, “by my understanding sympathy, and by my sorrow for your Godforsaken loneliness, and by my love. For no Kingdom built on hate can stand against the love you would deny⁠—” Words failed him then, as he saw the majesty fade slowly from the face, grown small and shadowy. One last expression of desperate energy in the eyes struck lightnings from the smoky air, as with an abandoned movement of the entire figure, he drew back, it seemed, towards the door behind him. Delane moved slowly after him, opening his arms. Tenderness and big compassion flung wide the gates of love within him. He found strange language, too, although actual, spoken words did not produce them further than his entrails where they had their birth. “Toys in the world are plentiful, Sire, and you may have them for your masterpiece of play. But you must seek them where they still survive; in the churches, and in isolated lands where thought lies unawakened. For they are the children’s blocks of make-believe whose palaces, like your once tremendous kingdom, have no true existence for the thinking mind.” And he stretched his hands towards him with the gesture of one who sought to help and save, then paused as he realised that his arms enclosed sheer blackness, with the emptiness of wind and driving rain. For the door of the hut stood open, and Delane balanced on the threshold, facing the sheet of night above the abyss. He heard the waterfalls in the valley far below. The forest flapped and tossed its myriad branches. Cold draughts swept down from spectral fields of melting snow above; and the blackness turned momentarily into the semblance of towers and bastions of thick beaten gloom. Above one soaring turret, then, a space of sky appeared, swept naked by a violent, lost wind⁠—an opening of purple into limitless distance. For one second, amid the vapours, it was visible, empty and untenanted. The next, there sailed across its small diameter a falling Star. With an air of slow and endless leisure, yet at the same time with terrific speed, it dived behind the ragged curtain of the clouds, and the space closed up again. Blackness returned upon the heavens. And through this blackness, plunging into that abyss of woe whence he had momentarily risen, the figure of the marvellous stranger melted utterly away. Delane, for a fleeting second, was aware of the earnestness in the sad, imploring countenance; of its sweetness and its power so strangely mingled; of it mysterious grandeur; and of its pathetic childishness. But, already, it was sunk into interminable distance. A star that would be baleful, yet was merely glorious, passed on its endless wandering among the teeming systems of the universe. Behind the fixed and steady stars, secure in their appointed places, it set. It vanished into the pit of unknown emptiness. It was gone. “God help you!” sighed across the sea of wailing branches, echoing down the dark abyss below. “God give you rest at last!” For he saw a princely, nay, an imperial Being, homeless forever, and forever wandering, hunted as by keen remorseless winds about a universe that held no corner for his feet, his majesty unworshipped, his reign a mockery, his Court unfurnished, and his courtiers mere shadows of deep space.⁠ ⁠… And a thin, grey dawn, stealing up behind clearing summits in the east, crept then against the windows of the mountain hut. It brought with it a treacherous, sharp air that made the sleeper draw another blanket near to shelter him from the sudden cold. For the fire had died out, and an icy draught sucked steadily beneath the doorway.
WIKI
Gamithromycin Gamithromycin, sold under the brand name Zactran, is a veterinary medication used for the treatment of cattle, pigs, and sheep. It is a macrolide antibacterial. It is a 7a-azalide. It was approved for veterinary use in the European Union in 2008. Veterinary uses In the EU, gamithromycin is indicated for the treatment and prevention of bovine respiratory disease in cattle, swine respiratory disease in pigs, and infectious pododermatitis (foot rot) in sheep. In the US, gamithromycin is indicated for the treatment of bovine respiratory disease in cattle.
WIKI
Bill Berry (footballer, born 1882) William Alexander Berry (July 1882 – 1 March 1943) was an English footballer who played as a forward. Born in Sunderland, he played for Sunderland, Tottenham Hotspur, Manchester United and Stockport County.
WIKI
 Scholarship 13/01538-4 - Biological Sciences - BV FAPESP Advanced search Start date Betweenand Análisis of the impact of E6/E7 proteins of different HPV16 molecular variants upon signal transduction pathways mediated by MAPK Grant number: 13/01538-4 Support type:Scholarships in Brazil - Doctorate Effective date (Start): May 01, 2013 Effective date (End): July 31, 2016 Field of knowledge:Biological Sciences - Biochemistry - Biochemistry of Microorganisms Principal Investigator:Laura Cristina Sichero Vettorazzo Grantee:Jimena Paola Hochmann Valls Home Institution: Instituto do Câncer do Estado de São Paulo Octavio Frias de Oliveira (ICESP). Coordenadoria de Serviços de Saúde (CSS). Secretaria da Saúde (São Paulo - Estado). São Paulo , SP, Brazil Abstract HPV-16 infection with is strongly associated with increased risk of developing cervical cancer. This is the most prevalent viral type in both cytologically normal and in cervical cancer samples worldwide. HPV-16 intra-type nucleotide variability has been extensively studied resulting in important findings concerning the evolution and phylogeny of the virus and the natural history of infections. Asian American and E-350G HPV-16 variants have been associated with increased risk of persistent infection and cervical cancer when compared to the European prototype variant, although it still presents a high risk when compared to other HPV types. Some studies have demonstrated functional differences between E6/E7 proteins of different HPV-16 molecular variants which could explain the observed differences in oncogenic potential observed. Recent data from our group pointed to the increased expression of MAP2K1 protein specifically in keratinocytes infected with the variant E-350G (or L83V). These data support other results which showed that the MAPK pathway is increased in cells expressing the E6 protein of the variant E-350G (or L83V). Therefore, it is necessary to examine the impact of E6/E7 proteins of HPV-16 different molecular variants upon signal transduction pathways mediated by MAPK. Thus, our aim is: (1) analyze the levels of activation of effector proteins of the MAPK pathway (NOTCH1, MEK1 / 2 and ERK1 / 2) in keratinocytes infected with E6/E7 of different HPV-16 molecular variants (AA, EP, E-350G), (2) analyze the effects of the interaction between E6/E7 of different HPV-16 molecular variants with NOTCH1 in the transforming potential measured indirectly by colony formation assays, (3) analyze the effects of the interaction between E6/E7 of different HPV-16 molecular variants with NOTCH1 upon angiogenesis induction; (4) analyze the effects of different E6/E7 HPV-16 molecular variants upon MAPK induced pathway concerning the induction of AP1, NFºB and other transcription factors. The results from this study will be of extreme importance to assess the impact of HPV-16 intra-typical variability upon the oncogenic potential observed. Scientific publications (References retrieved automatically from Web of Science and SciELO through information on FAPESP grants and their corresponding numbers as mentioned in the publications by the authors) HOCHMANN, JIMENA; SOBRINHO, JOAO S.; VILLA, LUISA L.; SICHERO, LAURA. The Asian-American variant of human papillomavirus type 16 exhibits higher activation of MAPK and PI3K/AKT signaling pathways, transformation, migration and invasion of primary human keratinocytes. VIROLOGY, v. 492, p. 145-154, MAY 2016. Web of Science Citations: 6. Please report errors in scientific publications list by writing to: cdi@fapesp.br.
ESSENTIALAI-STEM
2020 Democratic candidates support Las Vegas casino workers on debate day | TheHill A slate of Democratic presidential candidates rallied with striking casino workers in Las Vegas on Wednesday as they work to attract support from labor groups ahead of the evening's primary debate and the Nevada caucuses on Saturday. Former Vice President Joe BidenJoe BidenBiden leads Sanders by single digits in South Carolina: poll Pro-Trump super PAC hits Biden with new Spanish-language ad in Nevada Biden will go after Bloomberg, Sanders at Las Vegas debate, aides say MORE, former South Bend, Ind., Mayor Pete ButtigiegPeter (Pete) Paul ButtigiegBiden leads Sanders by single digits in South Carolina: poll 2020 Democratic candidates support Las Vegas casino workers on debate day What to watch in the debate tonight MORE, businessman Tom SteyerTom Fahr SteyerBiden leads Sanders by single digits in South Carolina: poll 2020 Democratic candidates support Las Vegas casino workers on debate day Sanders takes lead in new Hill/HarrisX poll MORE and Sens. Amy KlobucharAmy Jean Klobuchar2020 Democratic candidates support Las Vegas casino workers on debate day Democratic senators ask DOJ watchdog to expand Giuliani probe What to watch in the debate tonight MORE (D-Minn.) and Elizabeth WarrenElizabeth Ann WarrenBiden leads Sanders by single digits in South Carolina: poll 2020 Democratic candidates support Las Vegas casino workers on debate day Sanders takes lead in new Hill/HarrisX poll MORE (D-Mass.) were all seen protesting with the workers, who are demanding a new contract at Palms Casino Resort. Warren swarmed as she arrives with doughnuts for the Culinary 226 picket line outside The Palms pic.twitter.com/4eMPyu3pd0 ✅ Just hours before the Democratic Presidential Debate candidates show they stand with labor as they pick in front of @Palms this morning. Hundreds gathered in solidarity for station casinoworkers fighting for a #ContractNow! pic.twitter.com/8lxU2650C4 “Proud to stand with the cooks, servers, bartenders, and housekeepers of @Culinary226 as they stand up for their right to organize,” Buttigieg tweeted after his appearance at the protest. Proud to stand with the cooks, servers, bartenders, and housekeepers of @Culinary226 as they stand up for their right to organize. It's time for @Palms and others to follow the law. https://t.co/49RwmEe5HL The demonstration was organized by Nevada’s powerful Culinary Workers Union, which holds significant sway in the Silver State. The group raised eyebrows after it squared off with supporters of Sen. Bernie SandersBernie SandersBiden leads Sanders by single digits in South Carolina: poll Pro-Trump super PAC hits Biden with new Spanish-language ad in Nevada Biden will go after Bloomberg, Sanders at Las Vegas debate, aides say MORE (I-Vt.) over his “Medicare for All” plan and later declined to endorse a 2020 candidate. The Democratic White House hopefuls have scrambled for labor support throughout the campaign, seeking to win over working class voters who historically vote Democrat but defected to President TrumpDonald John TrumpFed saw risks to US economy fading before coronavirus spread quickened Pro-Trump super PAC hits Biden with new Spanish-language ad in Nevada Britain announces immigration policy barring unskilled migrants MORE in 2016. The Saturday Nevada caucuses will be the first real test of candidates’ support among Hispanic voters, who could account for up to one-fifth of the primary electorate in the state. Polls there show Sanders and Biden locked in contention for the top spot, with Warren trailing in third and Steyer making a push to break into the top tier. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2020 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Favela Discos Favela Discos (sometimes referred to as Favela) is a Portuguese electronic music and experimental music record label founded in 2013 as an artists and intellectuals collective based in Porto. It focuses on experimental music, particularly game piece, as well as transethnicism, free improvisation, fluxus, noise, and vaporwave, among other styles. They are considered among others as the future of portuguese music. Artists * Batsaykhan * Bezbog * David Ole * Diana Wellington * Dies Lexic * Dora Vieira * Favela Live System * Guadalupe Fiasco * Inês Castanheira * Inês Tartaruga Água * Jomi * José Pinhal Post-Mortem Experience * Judas Triste * Lorr No * Max Potion * Milteto * MotoRotos * Nuno O * Pepe Marcio * Rita Laranja * Sarnadas * Tito Frito * Vasco Da Ganza * Vive Les Cônes * Well * Xavier Paes Guest artists: * Drvg Cvltvre * Evamuss Past members: * Airlift * Arzemnieks * ASPHALTO * Carocho * Claiana * Das monstrvm * Desgrace * Dizmental * Dj Campanhã * Gabriel Ferrandini & Pedro Sousa * Mada Treku * Moleke$ * Os Canto-Esquina * Olumarak * Pai Inválido * Psyderman * SMOP * The 1969 Revolutionary Orgy * úlfr * Xamano * XTRMNTR_VKTR
WIKI
P2040/P2041 Local Bus Specific FAQs Document created by Omar Cruz Employee on Aug 6, 2012 Version 1Show Document • View in full screen mode Can you please give more details about 32 address signals for the eLBC implementation on P2040? Below is a detailed explanation of 32 address signals for the eLBC implementation on P2040: LAD[0:15] - these are multiplexed address/data signals that need to be externally latched using the LALE signal. LA[16:31] - these are dedicated address signals. LAD[0] is the most significant address signal and LA[31] is the least significant address signal. Can the Local Bus FCM support two, 2GByte (16Gbit) NAND devices, if they are the appropriate page size (2K SLC)? FCM can support two devices, each one is connected to a separate /CS. Attachments Outcomes
ESSENTIALAI-STEM
Trofeo Ciudad de Marbella Ciudad de Marbella Trophy is a summer tournament organized by Atlético Marbella in Marbella. In the beginning there used to be three participating teams, but in the last years it has been a two-team tournament. The first edition was in 1963 and was won by the home team. From 1963 to 1978 the tournament was called the Trofeo Semana del Sol (Sun Week Trophy) of 1979–1992 was called Ciudad de Marbella Trophy, in 1993 and 1994 changed the name FORTA Trophy, Antena 3 Marbella Trophy called in 1995, turning to call Ciudad de Marbella Trophy in the last edition of 1997. Titles ''Note that only the winner and runner-up is shown here. Some years there were more than two participating teams.''
WIKI
Hernádnémeti Hernádnémeti is a village in Borsod-Abaúj-Zemplén County in northeastern Hungary. It is situated on the left bank of the Hernád River, 14 km from Miskolc. The village is 120 m above sea level. It can be reached by car via highway 37 or by train from the Hernádnémeti–Bőcs train station, which is located in the neighboring village of Bőcs. History The village was originally settled in the times of Prince Árpád. During the Mongol invasion it was completely depopulated; it was resettled in 1254 by Germans who were invited to the country by the king. From these German settlers the village gets its name (német being the word in Hungarian for German). The village was again destroyed during the Turkish invasions; in 1567 the area is referred to as being unpopulated. Gradually it was repopulated and in 1596 it was included into the Rákóczi estates. At this time the village became Protestant due to an influx of hajduk settlers.
WIKI
Talk:Pines Express Ended in 1967??? I seem to remember that there was a version of the Pines Express running in the 1980s, during the time when BR revived a number of the old named expresses. Anyone else know anything about this, or is it just a faulty memory? BaseTurnComplete (talk) 20:43, 17 February 2008 (UTC) * The reference I have, said it ended in March 1967, but was reintroduced in the 1990s, via Birmingham, Coventry, Leamington, Oxford, Reading, Basingstoke and Southampton.Pyrotec (talk) 20:04, 11 July 2008 (UTC) Ended with end of locomotive haulage? I remember travelling on the Pines Express between Birmingham and Reading. I'm pretty sure it was a Manchester to Bournemouth/Poole train under CrossCountry, until the end of locomotive haulage. When the Voyagers took over all services and CrossCountry (Virgin) was relaunched, all trains on the route were de-named (including the Sussex Scot etc.) Aboodoo (talk) 02:13, 23 March 2008 (UTC) * See my comment above.Pyrotec (talk) 20:05, 11 July 2008 (UTC) More sources began editing this one as a bit of a point and while I don't have any more time to dedicate to it, there are more sources if someone wants to work on it. TRAVELLINGCARI My storyTell me yours 18:07, 27 April 2008 (UTC)
WIKI
DVT e Language IDE User Guide Rev. 23.2.28, 28 November 2023 38.11 Handling UNRECOGNIZED Macros Sometimes you may get syntax errors like UNRECOGNIZED_STATEMENT, UNRECOGNIZED_ACTION etc. when you use macros. If the macros are declared in your project in one of the files that appear in the Compile Order View, then it might be a bug, please report it. However, there are several cases when you will have to use a work-around in order to get rid of such errors: • you use macros defined in some encrypted eVC, for example vr_ad, hence we cannot parse the macro definitions and detect matches • you use undocumented constructs like keep for, report, display Our recommendation is: 1. Create a separate file ( eclipse_macros.e) where you'll define dummy macros for unrecognized constructs. 2. Put the dummy macros file in your project. 3. Configure the Project Top Files so that the dummy macros file will be the first one. 4. Rebuild. Dummy macros might look like:
ESSENTIALAI-STEM
Escola Superior de Ciências Empresariais (Setúbal) The Escola Superior de Ciências Empresariais (ESCE) or, in English, "School of Business Sciences" is a public institution of higher education, part of the Polytechnic Institute of Setúbal. The School was established in 1994 by Decree-Law n. 304/94 of 19 December, and currently has in its training offer, courses in the field of Management: Logistics, Marketing, Accounting, Human Resources and Information Systems. The mission of ESCE is "teaching, research and service in the field of Business Sciences, with the highest levels of ethics and quality, dignifying man, contributing, in partnership with the community, to promote the country's development in general and the region of Setúbal, in particular". Internal organization Internally, the School is organized as follows: » Management Bodies : » Scientific and Educational Units: * Director * Council of Representatives * Scientific-Technical Council * Pedagogical Council * Coordination Council * Advisory Board * Department of Economics and Management * Department of Accounting and Finance * Department of Marketing and Logistics * Department of Organizational Behavior and Human Resource Management * Department of Information Systems The current director of ESCE is Professor Boguslawa Sardinha. Undergraduate * Accounting and Finance * Human Resources Management * Marketing * Distribution Management and Logistics * Management of Information Systems Postgraduate * Public Accounting * Management of the Relationship and Communication with Customers * Logistics Management * Management of Training, Knowledge and Skills (in partnership with the Institute of Education, University of Lisbon) * MBA in International Business (in partnership with FEARP/USP and Sines Tecnopolo) * Master in Business Sciences * Master in Accounting and Finance * Master in Strategic Management of Human Resources * Master in Occupational Health and Safety (in partnership with EST Setúbal) * Master in Organizational IT Systems * Master in Management - Entrepreneurship and Innovation (in partnership with the University of Évora)
WIKI
The Kottonmouth Xperience The Kottonmouth Xperience is the Kottonmouth Kings' sixth official album released on November 16, 2004. It contains remixes of previous songs. The album includes a bonus DVD of the same name, The Kottonmouth Xperience.
WIKI
Andrew Janiak Andrew Janiak is a professor of philosophy at Duke University, where he directs the Graduate Program in History and Philosophy of Science. He received an M.A. from the University of Michigan and a Ph.D. from Indiana University. His dissertation was directed by Michael Friedman. . He received the Richard K. Lublin Distinguished Award for Teaching Excellence in 2009. Janiak writes on the philosophy of science, philosophy of physics, and the history of modern philosophy, especially on the philosophical works of Isaac Newton. Janiak served as dissertation advisor for Matthew C. Harris, who was taken into custody after making threats against his former employer, UCLA.
WIKI
A team of researchers has determined the age of the most ancient fossil of a squid ancestor. The creature seemed to attack its prey. The fossil is approximately 200 million years old, and it was located on the Jurassic Coast region of the UK. The fossil was recovered in the 19th century, and it is stored at the British Geological Survey in Nottingham. Some researchers wanted to learn more about it and decided to conduct an analysis that offered exciting results. The squid-like creature, which has been classified as Clarkeiteuthis Montefiorei, fossilized with a herring ancestor in its jaws. According to the researchers, the interesting position of the arms, which are placed alongside the body of the fish, suggests that the fossil was the result of a paleobiological event. The event may have taken place during the Sinemurian period, predating any fossils that were uncovered in the past by more than 10 million years. About the ancient fossil of the mysterious predator squid ancestor The area from which the sample was recovered has been famous for the large number of fossils that have been found there. Many mudstones have offered specimens which have a significant palaeobiological value, with an accent of those who have arms and hooks that could be used to capture prey. This particular ancient fossil is deemed to be more important than others since its one of the few who feature an active predation event, which tends to be quite rare. A violent attack that was initiated by the squid-like predator seems to have caused the death and the preservation of the two creatures. The analysis of the fossils has also revealed that the attacker crushed the skull of the fish. Two theories may explain the death of both creatures. One of them argues that the prey was too large and became stuck in the jaws of the predator. It is also possible that the squid ancestor attempted to take the prey lower, but there wasn’t enough oxygen at the lower depth, and it suffocated.
FINEWEB-EDU
1984 Purdue Boilermakers football team The 1984 Purdue Boilermakers football team represented Purdue University during the 1984 Big Ten Conference football season. Led by third-year head coach Leon Burtnett, the Boilermakers compiled an overall record of 7–5 with a mark of 6–3 in conference play, tying for second place in the Big Ten. Purdue was invited to the Peach Bowl, where the Boilermakers lost to Virginia. The team played home games at Ross–Ade Stadium in West Lafayette, Indiana. The Boilermakers defeated Notre Dame, Ohio State, and Michigan in the same season for the first and only time in college football history. Minnesota * Ray Wallace 32 rushes, 158 yards Michigan State * Jim Everett 27/42, 335 yards Iowa Iowa won in West Lafayette for the first time since 1956, snapping a 12-game losing skid at Ross–Ade Stadium. Northwestern * Jim Everett 25/35, 312 yards Michigan * Source: PUR: Steve Griffin 6 Rec, 112 yards Wisconsin * Jim Everett 23/49, 328 yards Indiana * A grass fire was reported in the end-zone during the game as a result of a warming barrel tipping over. * Rodney Carter 23 rushes, 148 yards * Steve Griffin 6 receptions, 103 yards * Jason Houston 16 solo tackles
WIKI
User:OccultZone/Charles C. Eberhardt Charles Christopher Eberhardt (1871 - 1965) was an American diplomat who served as ambassador to Costa Rica. Biography Charles Christopher Eberhardt was born in Salina, Kansas, July 27, 1871. He received his education from the public schools of Salina. Served as minister to Nicaragua, in 1922 he became consul- general for Eastern Europe. He was appointed as minister to Costa Rica in 1930.
WIKI
Cerrca Cerrca or Crnce (Црнце) is a village in Kosovo, 2 km south of the town of Istog. Geography This village of approximately 300 households is located in north-west Kosovo on the border with Serbia. Demographics Except for a few exceptions, the whole population of Cerrcë are defined as Muslims of Albanian ethnicity. The inhabitants of this village speak Albanian in the Gheg dialect of the language. Economy Crnce has approximately 766 residents of working age. Of these, 231 people describe themselves as having some sort of regular cash income. Construction work and public-sector jobs are the two greatest sources of income. The commercial agriculture and industrial sectors in Crnce have largely collapsed. Family farms are presently producing almost exclusively for their own consumption, and only two Crnce farmers report owning more than ten cows. Part of the agricultural decline is believed to be an effect of the former socialist cooperatives no longer supporting farmers with the purchase of inputs or the marketing of produce. There was a construction boom in the first few years after the war in 1999 when 90 percent of the houses in Crnce were destroyed. The largest local construction company, employing 12 people, was launched in 2000. The remainder of the private sector consists of family-run shops, taxis, and other micro-enterprises. Notable natives * Ibrahim Rugova, former President of Kosovo. * Naser Rugova, Kosovo member of parliament * Selman Kadria
WIKI
Dymer Dymer may refer to: * Dymer, Poland * Dymer, Kyiv Oblast, Ukraine * Dymer (poem), by C. S. Lewis
WIKI
Page:Harvey O'Higgins--Silent Sam and other stories.djvu/136 124 As soon as he found his voice, he said: "Take 'im away. Take 'im away from me." "Now, look 'ere, Pop," she replied. "You behave yerself. 'E never would 'a' married me at all if I 'ad n't asked 'im. You behave yerself. You 're a disgrace to the fam'ly." And it was evident from her manner that she and Sutley were "the fam'ly." It was the servant who ended the scene—and recalled them all to the proprieties—by putting her head in the door to announce: "'S retty—dinner!" It was through Burls, of course, that the story became public. He still tells it with roars of laughter; and he is most effective when he describes how Sutley announced to old Yost that Milly and he were married, and Yost attacked the clown with his ringmaster's whip. This is almost as good as his other story of how he and Sutley were nearly lynched in Macon, once, and he saved Sutley and himself by sending the mob into convulsions of laughter with his clowning. He is truly a romantic artist. He does not tell that he was, in his own way, almost as "soft" on Milly as Sutley was. The only hint he ever gives of it is when he says, disgustedly: "I tell you what 's the whole trouble with women: they got no sense o' humor. They don't even know good clownin' when they see it. They 're too danged matter-of-fact." And Sutley, funnier than ever and more successful than ever, continues to work at his clowning with all the seriousness of a Russian realist. "No good clown,"
WIKI
Page:Withgodbookofpra00las.djvu/697 especially over those against chastity, an indulgence of 100 days, once a day. I. Holiest Virgin, with all my heart I worship thee above all the angels and saints in paradise as the daughter of the eternal Father, and to thee I consecrate my soul and all its powers. Hail Mary, etc. II. Holiest Virgin, with all my heart I worship thee above all the angels and saints in paradise as the Mother of the only-begotten Son, and to thee I consecrate my body with all its senses. Hail Mary, etc. III. Holiest Virgin, with all my heart I worship thee above all the angels and saints in paradise as the spouse of the Holy Ghost, and to thee I consecrate my heart and all its affections, praying thee to obtain for me from the ever blessed Trinity all the graces which I need for my salvation. Hail Mary, etc. Indulgence of 300 days, each time. — Leo XII, Oct. 21, 1823. ost holy and immaculate Virgin! O my Mother! thou who art the Mother of my Lord, the Queen of the world, the advocate, hope, and refuge of sinners! I, the most wretched among them, now come to thee. I worship thee, great Queen, and give thee thanks for the many favors thou hast bestowed on me in the past; most of all do I thank thee for having saved me from hell, which I had so often
WIKI
Session 3 - Development of the Limbs Flashcards Preview Semester 2 - MSK > Session 3 - Development of the Limbs > Flashcards Flashcards in Session 3 - Development of the Limbs Deck (50): 1 What appears at fourth week of development? Limb buds 2 What are the limb buds in embryonic development made up of? Core of proliferating mesenchymal cells with an ectoderm covering 3 What are A and B? A - Anterior B - Posterior 4 What are C and D? C - Dorsal D - Ventral 5 What are E and F? E - Distal F - Proximal 6 Give two examples of a dorsal location on the body Back of the hand and top of the foot 7 Give two examples of a ventral position on a foetus Palm of the hand and sole of the foot 8 What is the proximo-distl axis? Base of the limb to the tips of the digits 9 What is the antero-posterior axis From 1st digit to 5th 10 Where do limb buds first appear? On the ventro-lateral body wall 11 What order to limb buds appear in? Upper limb first, lower limb second 12 In which direction do limb buds at first extend? Ventrally at first 13 What does limb development begin with? Activation of mesenchyme within lateral mesoderm 14 Where are limb buds derived from? The somatic layer of lateral plate mesoderm 15 What does somatic mesoderm contribute to? Limb skeleton 16 What do somites contribute to? Musculature 17 What is mesenchyme? Flexible mesoderm 18 How does limb bud elongate? Through proliferation of mesenchyme core 19 Give a feature of the apex of a limb bud Thickened ectoderm 20 Give the three degrees of asymmetry of limb development Top and bottom (Shoulder to fingertips) Front and back (No hairy palms) Side to side (Left and right hands mirror images) 21 What is the AER? The apical ectodermal ridge 22 What is the AER critical for? Limb bud outgrowth 23 What does the AER facillitate? Limb development, proximal to distal 24 What is the final appearance of the AER before it regressed? Appearance of paddles 25 What is the arrow pointing to? The Apical Ectodermal Ridge 26 What are the anatomical effects of the AER? Causes differentiation of underlying tissue, before finally inducing development of the digits within the hand/foot plates 27 What is the ZPA? Zone of polarising activity 28 What are the three functions of the zone of polarising activity? Generation of assymetry in the limbs Asignalling centra located at the posterior base of the limb bud Controls both patterning and maintains the AER 29 What does the AER mark the boundary between? The dorsal and ventral ectoderm 30 Label A, B and C A - Dorsal ectoderm B - Ventral ectoderm C - AER 31 What does AER mark the boundary between? 32 What do preaxial and postaxial refer to? Preaxial - Medial - Thumb and Big to Postaxial - Lateral - Little finger and little toe 33 What controls anterior/posterior development? ZPA 34 What controls proximal - distal development? AER 35 What controls dorsal/ventral development? Ectoderm 36 What occurs in hand and foot plates to convert them from buds to appendages? Digital rays Mesenchyme condensations within plates Cartaliginous models of the digital bone Apoptosis Of the tissues between the digits 37 What is syndactyly? Fusion of digits, may involve just CT or bones may be fused 38 Polydactyly Extra digits, genetic recessive trait 39 What happens to lateral plate mesoderm? What is Amelia? Condenses and diffentiates, undergoes endochondral ossification.  Amelia - Complete abcense of a limb 40 How do long bones extend? What is Meromelia? Secondar ossification centres appear in epiphyses. Bone growth maintained by cartilage forming regions (epiphyseal growth plates) Partial abcesnse of one or more limb structures 41 How is musculature formed? Myogenic precursors migratre into limbs from somites. Form two muscles msses - Vental (flexors) and dorsal (extensors) 42 What is the difference in comparments between upper and lower limb? U limb - flexor anterior L limb - flexor posterior 43 How do the reveresed compartments formed in upper limbs and legs? Both limbs extend ventrally However • Upper limb: rotates laterally • Lower limb: rotates medially 44 Why do limbs have the innervation they do? Upper limb bud appears opposite the caudal cervical spinal segments 45 Why is innervation vital to limb development? Without it development stalls 46 Describe formation of brachial plexus Anterior divisions for anterior compartments - Regroup to form lateral and medial cords.  Posterior compartments supplied by posterior divisions  47 Why do nails have different innervation to rest of dorsal surface of hand? Nails develop from nail fields on the tips of the fingers 48 What is a dermatome? A single strip f skin supplied by a single spinal nerve? 49 What is a myotome? Myotome is a muscle/group of muscles supplied by a single spinal nerve 50 What occurs in hand and foot plates to convert them from buds to appendages? Digital rays Mesenchyme condensations within plates Cartaliginous models of the digital bone Apoptosis Of the tissues between the digits
ESSENTIALAI-STEM
User:Skyemoor Skyemoor I'm a systems engineer educated in electro-mechanical engineering and computer science. My primary interest points are renewable energy sources, energy conservation, energy efficiency techniques, and sustainable development (which covers a wide swath of topics). I also spend time reading about those who actively sought to improve the state of humankind, such as the Founders of the U.S., Gandhi, and many others. Cheers to User:Sceptre for the page design! Current work * Renewable energy * Energy conservation * Energy efficiency * Hubberts Peak * Solar energy * Wind Power * Intermittent Power Sources Babel Interests Environments LIVE: TRAVELS: &mdash; &mdash; &mdash; &mdash; &mdash;
WIKI
Saturday, May 25, 2024 HomeworldEnhancing Data Security in Scientific Research with GitLab Enhancing Data Security in Scientific Research with GitLab In the fast-paced world of scientific research, the security and integrity of data is non-negotiable. The value of data in fields such as genomics, drug discovery, and environmental monitoring cannot be overstated. Maintaining the confidentiality, availability, and accuracy of data while allowing for collaboration and innovation presents a unique challenge. GitLab, a robust platform for software development, offers a suite of tools that can be adapted to enhance data security and integrity in scientific research. By leveraging GitLab’s features, researchers can establish secure and scalable workflows for managing sensitive data. Understanding the Importance of Data Security in Scientific Research Data security is a vital component of any scientific research endeavor, particularly in light of the increasing prevalence and sophistication of cyber threats. The consequences of a breach in scientific research can be far-reaching, from the compromise of groundbreaking discoveries to legal and ethical implications. In the life sciences, for instance, the protection of genomic data is paramount. Genomic information not only contains highly sensitive personal identifiers but is also the blueprint for cutting-edge personalized medicine and clinical diagnostics. Similarly, in pharmaceutical research, safeguarding intellectual property can mean the difference between leading the market and being left behind. The Unique Data Security Challenges in Research Environments Scientific research involves the handling of massive datasets, the use of complex analytical tools, and often requires collaboration across teams, institutions, and even countries. This complexity magnifies the challenge of keeping data secure. Security measures must be robust yet flexible, enabling the rapid iteration and exchange of ideas while safeguarding against unauthorized access. Because the nature of scientific work is exploratory and often leads to recalibrating hypotheses and methods, the tools used must support a dynamic environment where changes can be tracked and audited. Furthermore, compliance with regulations such as GDPR and HIPAA is a critical requirement, adding layers of complexity to an already multifaceted challenge. GitLab as a Solution for Enhanced Data Security GitLab is a well-established name in the software development world, known for its version control capabilities and collaborative features. However, its versatility makes it an ideal platform for securing and managing sensitive data in the realm of scientific research. Version Control and Tracking Changes At the heart of GitLab’s functionality is its version control system, which keeps a historical record of every change made to code. Applying this to data, researchers can track the evolution of datasets and experimental protocols, ensuring a clear audit trail and the ability to roll back to previous states if necessary. Access Control and Auditability GitLab allows for the fine-grained control of access to data. Researchers can define who can view, edit, or merge data, and these permissions can be managed at the project level. Every action taken within GitLab is logged, providing an audit trail that can be crucial for compliance with data security regulations and for internal governance. Continuous Integration for Data Processing Continuous Integration (CI) is a practice in software engineering that involves automating the integration of code changes. In the context of scientific research, CI tools can automate data processing tasks, reducing the risk of human error and ensuring that data pipelines are executed in a controlled and reproducible manner. Security Scanning and Compliance Management GitLab incorporates a range of security scanning tools that can be applied to data repositories, including vulnerability scanning, security policy management, and container scanning. These features allow researchers to proactively identify and address security issues. GitLab also provides a platform for managing compliance with data protection regulations, helping to ensure that data-related practices are aligned with legal and ethical standards. Secure Collaboration and Code Review GitLab’s collaboration features, such as merge requests, inline comments, and task lists, facilitate a secure environment for team members to review each other’s work. This process not only enhances the quality of the research but also ensures that changes are scrutinized before being integrated into the main dataset. Scalability and Performance GitLab is a scalable solution that can accommodate the storage and processing needs of even the largest scientific datasets. With features such as Git LFS (Large File Storage) and High Availability, GitLab can handle the demands of high-throughput data workflows and the large file sizes common in scientific research. Implementing GitLab in Scientific Research Workflows Adopting GitLab in scientific research workflows requires careful planning and execution. It involves the integration of new tools and the establishment of best practices among the research team. Here are some steps to consider: Training Researchers and IT Professionals Ensuring that the research team is proficient in using GitLab is essential. Training should cover not only the technical aspects of the platform but also best practices for maintaining data security. Establishing Data Management Policies Institute policies for data management that govern how data is handled, stored, and accessed. These policies should take into account the specific requirements of the research, as well as any regulatory compliance needs. Setting Up a Secure Infrastructure Implement GitLab in conjunction with a secure IT infrastructure. Encryption, secure login mechanisms, and robust backup and recovery procedures are vital for protecting sensitive data. Conducting Regular Security Assessments Continuous monitoring and assessment of the security of the GitLab platform and the data it contains is crucial. This includes regular vulnerability scans, penetration testing, and monitoring of access logs. Encouraging a Security-Conscious Culture Foster a culture of data security awareness among the research team. Encourage the reporting of security incidents and promote the understanding of the importance of data security in all research activities. Conclusion In conclusion, data security in scientific research is an ongoing challenge that requires a multifaceted approach. GitLab offers a range of tools and capabilities that, when implemented thoughtfully, can significantly enhance the security and integrity of research data. By adopting GitLab, research teams can enjoy the benefits of a secure, collaborative, and scalable platform that is well-equipped to handle the unique challenges of scientific data management. RELATED ARTICLES LEAVE A REPLY Please enter your comment! Please enter your name here Most Popular Recent Comments
ESSENTIALAI-STEM
Shannon Farnon Shannon Farnon (born Sharon Maureen Farnon; November 28, 1941 ) is a Canadian-born American actress. She is best known as being the first actress to voice Wonder Woman in a Hanna-Barbera production, having voiced her in Super Friends from 1973 to 1983. Early life Born in Toronto, and raised, respectively, in Detroit, Chicago, and San Fernando, California, Farnon is the daughter of musician and conductor Brian Farnon and singer/actress Rita Oehmen, and the sister of actresses Charmian Carr and Darleen Carr. After graduating from San Fernando High School in 1959, Farnon majored in theatre arts at Los Angeles Valley College, co-starring in at least one production—James Costigan's Cradle Song—with her sister and fellow San Fernando High alumnus, then still known as Charmian Farnon. Named homecoming queen in 1960, Farnon made the dean's list the following year. In between, she featured prominently—as "MISS WEEKEND"—in the summer 1961 promotional campaign by the San Fernando Valley Times on behalf of its new "Friday" section. Career Farnon starred in film, television, commercials and cartoons. However, her first role was in 1965 in an uncredited role on Burke's Law. She went on to appear in multiple other television series, but was most active in commercials. In 1967, she appeared in an episode of I Dream of Jeannie as Major Nelson's date, selected by Jeannie with the use of a "computer machine" at a dating club, and in March, 1970, she was in an episode of Dragnet ("Night School"), where she played a fellow student attending a college course with Joe Friday (played by the show's, creator, producer and star, Jack Webb). While playing a mother in a live-action commercial in 1973 for Flintstone vitamins, she was approached by voice director Wally Burr to audition for what was to be her most long-running famous role, Wonder Woman on Super Friends. From 1973 to 1983, Farnon voiced the Amazonian superheroine on Super Friends, Challenge of the Superfriends, The All-New Super Friends Hour, The World's Greatest Super Friends and the revival of Super Friends. Farnon did voice several incidental characters, such as Lois Lane and Hawkgirl on some of the series and also played Kim Butler in Valley of the Dinosaurs in 1974, but mainly she did the voice of Wonder Woman. She made a guest appearance in the television show Emergency! (1977 S6E21 “Limelight”) as Mrs. Robinson. However, in 1984, her prominent character was recast in Super Friends: The Legendary Super Powers Show, when the role was given to Constance Cawlfield and later to B.J. Ward. This case has often been given as an example of injustice in the television and animation industry. Mary McDonald-Lewis voiced Wonder Woman in an episode of Superman. She voiced Wonder Woman on many Cartoon Network promos and went on to appear in several films and television series, but since 2005, her acting appearances have been infrequent. She has voiced various commercials, including Betty Crocker, Nivea, Kodak, National World War II Memorial, Oil of Olay, Scotchgard and Cartoon Network spoofs of The Super Friends. Personal life She was married to William Wells from 1966 to 1975 (married twice after that) and had twins, Jeremy and Julie (born 1971). Jeremy died from a skiing accident at the age 24.
WIKI
Monbeig Monbeig is a surname. Notable people with the surname include: * Pierre Monbeig (1908–1987), French geographer * Théodore Monbeig (1875–1914), French Catholic missionary and botanist
WIKI
CHAOS IN THE MICROMASER. T. A.B. Kennedy, P. Meystre, C. Savage, E. M. Wright Research output: Chapter in Book/Report/Conference proceedingConference contribution Abstract The semiclassical dynamics of the micromaser are analyzed and it is shown that it exhibits deterministic chaos in a rather general set of circumstances. In general, it exhibits a number of coexisting attractors. In the generic case, each of these follows a period-doubling route to chaos, with a subsequent inverse route back to stability, as one of the order parameters of the system (e. g. , the cavity losses) is varied. The various bifurcations occur at different values of the order parameter for different attractors, and because of the complexity of the return map of the system, other possibilities such as intermittency and crises cannot be ruled out in general. In contrast to the lossless case, which is characterized by an infinite set of marginally stable fixed points corresponding to 2n pi atom-field interactions, the semiclassical lossy micromaser possesses a finite number of fixed points with an alternance of unstable fixed points and of potentially unstable fixed points which can evolve into more complex attractors. As in the lossless case, the map is not invertible, and the determination of the basins of attraction of the various fixed points requires a detailed numerical analysis. Original languageEnglish (US) Title of host publicationUnknown Host Publication Title PublisherOptical Soc of America Number of pages1 ISBN (Print)0936659513 StatePublished - Jan 1 1987 ASJC Scopus subject areas • Engineering(all) Fingerprint Dive into the research topics of 'CHAOS IN THE MICROMASER.'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Nintendo is reportedly making a Mario movie with the studio behind Minions Mario may be taking a second stab at the big screen. The Wall Street Journal is reporting that Illumination Entertainment — the production company behind Minions and Despicable Me — is close to a deal with Nintendo to make an animated film based on Super Mario. According to the report, Illumination has been in talks about the move for nearly a year, and the major sticking point for Nintendo has been ensuring that the company is heavily involved in the creative process. (This is not surprising considering the 1993 live-action Mario film was an infamous disaster.) If the movie does come to pass, Mario creator Shigeru Miyamoto will reportedly likely serve as a producer. Last year, Nintendo president Tatsumi Kimishima said that the company was in talks with several Hollywood companies about bringing the iconic character to the big screen. While not yet official, the news is in line with Nintendo’s recent push to move beyond the traditional realm of video games. The company has started a mobile initiative to reach new customers, teamed up with the likes of Vans and Uniqlo for clothing lines, and struck up a deal with Universal for Nintendo-themed attractions at multiple theme parks. Meanwhile, the timing also seems to be right, with Mario fever in full swing; the mobile release Super Mario Run has been downloaded more than 200 million times, while Super Mario Odyssey on the Switch came out last month to rave reviews. That said, in 2015 the Journal reported that a live-action Legend of Zelda series was coming to Netflix, which turned out to be incorrect. It’s far too early to tell whether or not Illumination can help Mario get past the jinx of video game adaptations — which includes recent high-profile disappointments like Warcraft and Assassin’s Creed — but at least we know that Mario and Minions are actually a pretty good fit. When reached for comment, a Nintendo representative said that “We have nothing to announce on this topic.” Update November 14th, 12:43PM ET: This article was updated with a statement from Nintendo of America.
NEWS-MULTISOURCE
Childbirth is one of the most important moments in a woman's life. It is best to consider what are your options for childbirth before you are due. Here are some tips on how to decide how to give birth. It comes a time during pregnancy when you have to think about how you would want to give birth, what are your options for childbirth. Most women are afraid of giving birth naturally while others are not and would even consider home birth. You need to plan your delivery ahead so think about your options. Depending on your preference here are your options for childbirth: Home birth is an option for women who prefer to give birth in the comfort of their own home instead of a hospital. The birth needs to be done with the help of an experienced and well trained birth assistant (nurse or midwife). Home birth can be an option only for women who have a low risk of birth complications. If you choose to give birth at home you need to be aware that there are risks involved. If something does go wrong there is a better chance that it will get resolved in the hospital because of the staff and equipment available there. Make sure you are near a hospital in case of an emergency. Normal, vaginal delivery at a hospital is the most popular way among women who give birth. The doctor or midwife will perform an enema before labor and pain killers will be administrated if requested. Most women prefer to get an epidural so the labor process won't be as painful. The doctor will make sure everything is going well and will perform an episiotomy under local anesthetic, and either vacuum or forceps extraction if necessary. Cesarean section is a surgical procedure in which the doctor delivers the baby through an incision or cut made in the abdomen. This procedure is usually done if the doctor thinks you are risking your health or the baby's health through natural vaginal labor. Emergency cesarean can be done in case any complications occur while giving natural birth. Water birth is one of the newest childbirth options. The mother to be will sit in a water tub where she will give birth. Many women choose this option because they say that is is more comfortable than the other options they had. Water reduces the pressure on the abdomen and supports the weight. It relieves a little bit of the pain and promotes contractions and relaxation. Choose whatever option you think might make it easier for you. The most important thing is your baby's health and it will all be worth it when you get to hold him/her in your arms.
ESSENTIALAI-STEM
6.1.4 Files and Directories access (path, mode) Check read/write/execute permissions for this process or existence of file path. mode should be F_OK to test the existence of path, or it can be the inclusive OR of one or more of R_OK, W_OK, and X_OK to test permissions. Return 1 if access is allowed, 0 if not. See the Unix man page access(2) for more information. Availability: Unix, Windows. F_OK Value to pass as the mode parameter of access() to test the existence of path. R_OK Value to include in the mode parameter of access() to test the readability of path. W_OK Value to include in the mode parameter of access() to test the writability of path. X_OK Value to include in the mode parameter of access() to determine if path can be executed. chdir (path) Change the current working directory to path. Availability: Macintosh, Unix, Windows. getcwd () Return a string representing the current working directory. Availability: Macintosh, Unix, Windows. chmod (path, mode) Change the mode of path to the numeric mode. Availability: Unix, Windows. chown (path, uid, gid) Change the owner and group id of path to the numeric uid and gid. Availability: Unix. link (src, dst) Create a hard link pointing to src named dst. Availability: Unix. listdir (path) Return a list containing the names of the entries in the directory. The list is in arbitrary order. It does not include the special entries '.' and '..' even if they are present in the directory. Availability: Macintosh, Unix, Windows. lstat (path) Like stat(), but do not follow symbolic links. Availability: Unix. mkfifo (path[, mode]) Create a FIFO (a named pipe) named path with numeric mode mode. The default mode is 0666 (octal). The current umask value is first masked out from the mode. Availability: Unix. FIFOs are pipes that can be accessed like regular files. FIFOs exist until they are deleted (for example with os.unlink()). Generally, FIFOs are used as rendezvous between ``client'' and ``server'' type processes: the server opens the FIFO for reading, and the client opens it for writing. Note that mkfifo() doesn't open the FIFO -- it just creates the rendezvous point. mkdir (path[, mode]) Create a directory named path with numeric mode mode. The default mode is 0777 (octal). On some systems, mode is ignored. Where it is used, the current umask value is first masked out. Availability: Macintosh, Unix, Windows. makedirs (path[, mode]) Recursive directory creation function. Like mkdir(), but makes all intermediate-level directories needed to contain the leaf directory. Throws an error exception if the leaf directory already exists or cannot be created. The default mode is 0777 (octal). New in version 1.5.2. pathconf (path, name) Return system configuration information relevant to a named file. name specifies the configuration value to retrieve; it may be a string which is the name of a defined system value; these names are specified in a number of standards (POSIX.1, Unix95, Unix98, and others). Some platforms define additional names as well. The names known to the host operating system are given in the pathconf_names dictionary. For configuration variables not included in that mapping, passing an integer for name is also accepted. Availability: Unix. If name is a string and is not known, ValueError is raised. If a specific value for name is not supported by the host system, even if it is included in pathconf_names, an OSError is raised with errno.EINVAL for the error number. pathconf_names Dictionary mapping names accepted by pathconf() and fpathconf() to the integer values defined for those names by the host operating system. This can be used to determine the set of names known to the system. Availability: Unix. readlink (path) Return a string representing the path to which the symbolic link points. Availability: Unix. remove (path) Remove the file path. See rmdir() below to remove a directory. This is identical to the unlink() function documented below. Availability: Macintosh, Unix, Windows. removedirs (path) Recursive directory removal function. Works like rmdir() except that, if the leaf directory is successfully removed, directories corresponding to rightmost path segments will be pruned way until either the whole path is consumed or an error is raised (which is ignored, because it generally means that a parent directory is not empty). Throws an error exception if the leaf directory could not be successfully removed. New in version 1.5.2. rename (src, dst) Rename the file or directory src to dst. Availability: Macintosh, Unix, Windows. renames (old, new) Recursive directory or file renaming function. Works like rename(), except creation of any intermediate directories needed to make the new pathname good is attempted first. After the rename, directories corresponding to rightmost path segments of the old name will be pruned away using removedirs(). Note: this function can fail with the new directory structure made if you lack permissions needed to remove the leaf directory or file. New in version 1.5.2. rmdir (path) Remove the directory path. Availability: Macintosh, Unix, Windows. stat (path) Perform a stat() system call on the given path. The return value is a tuple of at least 10 integers giving the most important (and portable) members of the stat structure, in the order st_mode, st_ino, st_dev, st_nlink, st_uid, st_gid, st_size, st_atime, st_mtime, st_ctime. More items may be added at the end by some implementations. Note that on the Macintosh, the time values are floating point values, like all time values on the Macintosh. (On MS Windows, some items are filled with dummy values.) Availability: Macintosh, Unix, Windows. Note: The standard module stat defines functions and constants that are useful for extracting information from a stat structure. statvfs (path) Perform a statvfs() system call on the given path. The return value is a tuple of 10 integers giving the most common members of the statvfs structure, in the order f_bsize, f_frsize, f_blocks, f_bfree, f_bavail, f_files, f_ffree, f_favail, f_flag, f_namemax. Availability: Unix. Note: The standard module statvfs defines constants that are useful for extracting information from a statvfs structure. symlink (src, dst) Create a symbolic link pointing to src named dst. Availability: Unix. tempnam ([dir[, prefix]]) Return a unique path name that is reasonable for creating a temporary file. This will be an absolute path that names a potential directory entry in the directory dir or a common location for temporary files if dir is omitted or None. If given and not None, prefix is used to provide a short prefix to the filename. Applications are responsible for properly creating and managing files created using paths returned by tempnam(); no automatic cleanup is provided. tmpnam () Return a unique path name that is reasonable for creating a temporary file. This will be an absolute path that names a potential directory entry in a common location for temporary files. Applications are responsible for properly creating and managing files created using paths returned by tmpnam(); no automatic cleanup is provided. TMP_MAX The maximum number of unique names that tmpnam() will generate before reusing names. unlink (path) Remove the file path. This is the same function as remove(); the unlink() name is its traditional Unix name. Availability: Macintosh, Unix, Windows. utime (path, times) Set the access and modified times of the file specified by path. If times is None, then the file's access and modified times are set to the current time. Otherwise, times must be a 2-tuple of numbers, of the form (atime, mtime) which is used to set the access and modified times, respectively. Changed in version 2.0: added support for None for times. Availability: Macintosh, Unix, Windows. See About this document... for information on suggesting changes.
ESSENTIALAI-STEM
remove games ready to install #1neo_one3566Posted 2/27/2014 2:17:54 PM So if you uninstall a game, is the download still there? for example downloaded the lego super heroes demo, played it, uninstalled, but now its sitting there greyed out but ready to install.... is the download data still there and can be removed? Thanks! #2MattFoleyPosted 2/27/2014 2:19:34 PM It can be removed. Just highlight the game and hit start. You should see an option to uninstall. #3squarex8264Posted 2/27/2014 2:20:02 PM Data is no longer on your box. The greyed out box with "Ready to Install" just means that the title is associated to your account, so you can redownload it at any time. Having "Ready to Install" for past digital purchases makes sense, since it lets you remember what you bought but have deleted from your box without having to go dig through the store to find it again. However, I hope there is an option in the future to remove demos from that list, since I feel it may clutter up the other items. --- "You guys can sig that if you want." -TheArcade
ESSENTIALAI-STEM
Talk:Tomasz Skweres skweres - notability hi imo he meets following criteria: 1 sources - articles about him and reviews of his pieces appear on major austrian websites for music, german newspapers and austrian state tv website. his work was subject of radio broadcasts in different countries. 2 was commissioned to write major orchestral works for theatres and concert halls run by german, swiss or austrian state (f.i. only other polish composer who received commission by the viennese concert hall was - as far as i know - penderecki) 3 has won several competitions not established for newcomers it is also notable, that his work is regularly performed worldwide. his music has been performed in more then 20 countries on all continents (except of the antarctica), which is somehow exceptional under polish musicians born in the 80s (but also earlier)
WIKI
Identity and Access Management in the Cloud |||Identity and Access Management in the Cloud Cloud computing opens up tremendous opportunities for companies that prefer to focus on their areas of expertise rather than on spending massive amounts of timemoney, and personnel resources on their data center. But, there is one area where companies should not scrimp when it comes to securing their data — identity and access management (IAM). This becomes even more important when the cloud-based data and applications are required to meet either regulatory or industry compliance rules such as Payment Card Industry Data Security Standards (PCI DSS), for credit card or personally identifiable information, and the Health Insurance Portability and Accountability Act (HIPAA), or Health Information Technology for Economic and Clinical Health Act (HiTECH), for data in the healthcare industry. These and many other regulations require companies to maintain the confidentiality of protected data and the best way to do that is to ensure that only authorized personnel have access to that data. Traditionally, data has been protected simply by using a login name and password, but major data breaches at large healthcare providers such as Premera, federal agencies, including the governments personnel office, and even data security vendors, such as RSA, have demonstrated that this approach is no longer sufficient. Multifactor authentication — a combination of something you know (a password), something you have (a token), and something you are (a biometric scan) — is generally considered an important step up from basic password-based access. Traditional tokens, sometimes called smart keys, were either a key fob that generated a random, one-time-use access code or a USB-based device that contained authentication data about the user. While these approaches are still used today, they can be expensive to maintain, difficult to manage, and require a lot of user support when the tokens are lost or the user forgets their authentication passwords. Today, smart phones are becoming the token of choice for many service providers and security consultants. Cloud services, for example, can send users’ phones a special code if the user tries to log in from a system that the application’s database does not recognize. The user types in the one-time-use code and now that device becomes authenticated for future access. Smart phones also can be fitted with near-field communications technology that acts as a smart key to authenticate a user. Hardware-to-hardware authentication is often preferred by security professionals because devices are capable of remembering very long and complex data strings that a human is simply not capable of memorizing. Authenticating the device, combined with something the user knows (password) or is (a biometric scan), therefore, can be more reliable than authenticating the user alone. Today’s biometric devices, especially in the consumer realm, tend to be of relatively low sensitivity. Fingerprint scanners on many laptops, for example, can be defeated using a picture of the fingerprint. Retina scanners tend to be more reliable than fingerprints, but some of these also can be defeated with a photo. And false negatives can occur if the user has a cut on their finger or some types of eye diseases. While the promise of biometrics is significant, this technology still lacks the price point and quality controls that some applications and chief security officers require. Remember that for passwords to be reliable you need a user policy that dictates how often they need to change their passwords and how complex the password or passphrase should be. Long passphrases can be very secure, but only if the user changes them frequently — generally speaking, every 60 days — so that if credentials are compromised, the damage can be limited. Multifactor authentication today is quite easy to implement.  If your service provider is not yet offering multifactor authentication, ask them when it will be offered. It’s important enough of a security best practice to make you considering changing providers if it is not supported. Journalist Stephen LawtonStephen Lawton is a veteran technology journalist living in the Pacific Northwest. Follow him on Twitter (@afabmedia) or LinkedIn.   For more information on our Cloud security practices, please visit our Cloud Security page or request information to speak with a cloud specialist. 2018-09-17T11:02:00+00:00
ESSENTIALAI-STEM
onstat -k command: Print active lock information Use the onstat -k command to print information about active locks, including the address of the lock in the lock table. Read syntax diagramSkip visual syntax diagram Syntax: >>-onstat-- -k------------------------------------------------->< Example output The maximum number of locks available is specified by the value of the LOCKS configuration parameter in the onconfig file. Figure 1. onstat -k command output Locks address wtlist owner lklist type tblsnum rowid key#/bsiz a095f78 0 a4d9e68 0 HDR+S 100002 203 0 1 active, 2000 total, 2048 hash buckets, 0 lock table overflows In the following output, the number 2 in the last row shows an Enterprise Replication pseudo lock: Locks address wtlist owner lklist type tblsnum rowid key#/bsiz a1993e8 0 5c2f03d0 a19be30 S 2 1c05a 0 Output description address Is the address of the lock in the lock table If a user thread is waiting for this lock, the address of the lock shows in the wait field of the onstat -u (users) output. wtlist Is the first entry in the list of user threads that is waiting for the lock, if there is one owner Is the shared-memory address of the thread that is holding the lock This address corresponds to the address in the address field of onstat -u (users) output. When the owner value is displayed in parentheses, it represents the shared memory address of a transaction structure. This scenario is possible only when a lock is allocated for a global transaction. This address corresponds to the address field of the output for onstat -G. lklist Is the next lock in a linked list of locks that are held by the owner listed type Uses the following codes to indicate the type of lock: HDR Header B Bytes S Shared X Exclusive I Intent U Update IX Intent-exclusive IS Intent-shared SIX Shared, intent-exclusive tblsnum Is the tblspace number of the locked resource. If the number is less than 10000, it indicates Enterprise Replication pseudo locks. rowid Is the row identification number The rowid provides the following lock information: • If the rowid equals zero, the lock is a table lock. • If the rowid ends in two zeros, the lock is a page lock. • If the rowid is six digits or fewer and does not end in zero, the lock is probably a row lock. • If the rowid is more than six digits, the lock is probably an index key-value lock. key#/bsiz Is the index key number, or the number of bytes locked for a VARCHAR lock If this field contains 'K-' followed by a value, it is a key lock. The value identifies which index is being locked. For example, K-1 indicates a lock on the first index that is defined for the table. Copyright© 2020 HCL Technologies Limited
ESSENTIALAI-STEM
Talk:Kirlian photography/Archive 2 Kirlian pictures Dear MrX, your edition is perfect and the text is clear. There were only 2 errors in names, but now everything is correct. I would like to comment like specialist in spectroscopy the following 4 pictures - Kirlian photo of two fingertips, Kirlian photo of a leaf, Kirlian photo of two coins and Kirlian photo of two fingertips. The color picture was performed with amateur film. The final picture Kirlian photo of a Coleus leaf is perfect. It is visible from red color, which is not very real. There are special films in physics with 100% red color. Also the quality of black-white pictures is low in the process of preparation. My proposal is for the canceling of these pictures. There more colorful picture and each scientist will agree for the publishing of the photo only if you show the name, because the picture are object of copy right. Mbreht--Mbreht (talk) 17:18, 24 August 2012 (UTC) I think also that for readers is very important to see on picture on film and one with digital methods. With digital method there are only blue and violet colors. Mbreht --Mbreht (talk) 18:13, 24 August 2012 (UTC) * Mbreht, I agree that better photos are needed and that there should be both film and digital images. For example, the Coleus leaf photo was an amateur Kirlian photograph that I made more than 30 years ago. * Please understand that any photos that you upload generally have to be freely licensed to the public with a creative commons license. You can read more here: WP:IUP, and at the links at the bottom of the upload page. Uploaded images can include attribution of the creators (the scientists), however, once they are uploaded anyone in the world can use them on other web sites, books, magazines, and so on. There are exceptions to this, which you can read about here WP:NONFREE. Also, you must have permission of the copyright holder of any images that you upload. I hope this helps. &mdash; MrX 22:37, 24 August 2012 (UTC) Dear MrX, I know the conditions for the pictures perfect, nut the scientists are leaving in the world.what is the practice in this situation? In scientific circles are popular the results of Ignat Ignatov with Kirlian Photography of water samples on photographic film and digital. The research is in the same time with the same water samples. I have seen that in the pictures there is name of author and sign of copy right. http://www.medicalbiophysics.dir.bg/en/water_memory.html Ignatov, I., Tsvetkova, V., Water for the origin of life and informationaability of water, Kirlian (electric images) of different types of water, Euromedica, Hanover, (2011). Also this pictures were published with the name of Dr. Ignat Ignatov: Dr. Oleg Mosin: http://www.o8ode.ru/article/eng/engl/kirlian.htm http://www.o8ode.ru/article/learn/life/water_aura.htm For Black-White Kirlian I will think what can do. You informed me that Coleus leaf photo was an amateur Kirlian photograph that I made more than 30 years ago. If this is on Kodak film the quality can be high. My proposal is you to publish the new Kirlian pictures, because you have experience in Wikipedia. Mbreht--Mbreht (talk) 04:26, 25 August 2012 (UTC) * Mbreht, the Coleus leaf was photographed with Kodak film (Kodachrome, daylight balanced, if I remember correctly). I also created some using Polaroid instant film, which look completely different. * I will not be able to upload any photos unless I have permission from the copyright owners (the scientist who made them). For this, I would want letters signed by the copyright owners. In some cases, photos can be uploaded under fair use criteria (see WP:FAIR and fair use), but that is not something that would be comfortable doing myself. &mdash; MrX 12:47, 25 August 2012 (UTC) Dear MrX, what we can inform Dr. Ignat Ignatov to give the copy right of the pictures. His e-mail is public. Who can do that or this is difficult. Only Ignatov now in the world has a digital pictures and on film. I have not experience with pictures in Wikipedia. For me will be easy if I know the order. For example from Dr. Mosin for heavy water. I already published information for biological effects of heavy water. Simple: what I can do for copy right from the scientists for pictures. Mbreht--Mbreht (talk) 13:15, 25 August 2012 (UTC) * Mbreht, I'm not certain that I understand your question "what I can do for copy right from the scientists for pictures[?]". If you are asking how to get permission from living scientists to upload their photos to Wikipedia, then you simply have to ask them and be sure they understand that once photos are uploaded, anyone can use them, for any purpose. * For any scientists no longer living, the copyright ownership usually goes to their heirs (children, family, etc.), so you would need their permission. There is an admin on Wikimedia Commons who may be able to help you EugeneZelenko. He speaks Russian/Belarusian. * Dear EugeneZelenko, in Wikipedia in Section Astronomy there are pictures which are object of scientific publications. This is the possibility the readers of Wikipedia to see the actual information. For example: Star Gliese 581: http://en.wikipedia.org/wiki/Gliese_581 In Russian Wikipedia the situation is the same: For example: Star Gliese 581: http://ru.wikipedia.org/wiki/%D0%93%D0%BB%D0%B8%D0%B7%D0%B5_581 Mbreht--Mbreht (talk) 11:04, 26 August 2012 (UTC) * You should have no problem uploading. You simply click on the upload file link on the left and follow the instructions. I hope that helps. &mdash; MrX 15:42, 25 August 2012 (UTC) Dear EugeneZelenko, thank you very information. Thank you to MrX also. I am not sure that I know perfect the conditions of Wikipedia for pictures. My idea is the publishing 1-3 pictures with perfect quality and for me this is the maximum of Kirlian photography. This is important for readers. I have only the color Kirlain pictures of living scientists. Form dead scientists I have with the same quality like now in Wikipedia. Mbreht--Mbreht (talk) 16:13, 25 August 2012 (UTC) Biological effects of heavy water. http://en.wikipedia.org/wiki/Heavy_water#Effect_on_biological_systems Mbreht--Mbreht (talk) 13:18, 25 August 2012 (UTC) Dear MrX, in physics there is special education for the range of the film. I am sure that for Kirlian effect is the same. The picture now results of non-professional work. The professional pictures are very colorful. You also had I idea for Application of Kirlian effect. From 1 till 10 of September I will not be online. I like to work with you! Mbreht--Mbreht (talk) 13:28, 25 August 2012 (UTC) Dear MrX, your structuring of Kirlian page in interesting with difference between scientific research and paranormal research. The Application is new challenge and I am sure of your success. Mbreht--Mbreht (talk) 20:25, 25 August 2012 (UTC) * I removed this from the section that discusses Ignatov's experiments: * "In [the] Kirlian effect an auto-electron emission is also observed. The optic transitions depend on the energy of the emitted photons." * It looks like this text was copied from another web site. Also, there a few concepts that have not been previously defined for the reader, namely * Kirlian effect (is this the same as corona discharge?) * auto-electron emission (is this the same as cold cathode emission?) * optic transitions (vague) * I rewrote these sentences as best I could. If my edits are not sufficient, then these sentences would need considerable clarification and copy editing so that reader understands what is being presented. &mdash; MrX 02:05, 26 August 2012 (UTC) * Dear MrX, I have seen your changes. The new text is correct in language in Physics. Thank you very much for your edition. It is better you first to make the text in Application. Your English is with perfect structuring for scientific-popular topic. Maybe you are author of books and journal. If you are not you can do that. I will write my proposal after your text only hear (Talk)Mbreht --Mbreht (talk) 10:15, 26 August 2012 (UTC) * Dear MrX, I think that why GDV camera is not medical method is very simple. For precise diagnostics of human body the medical doctors need a lot of parameters. GDV camera studies the electrical parameters of 10 fingers. This is not directly measurement of electrical parameters. This results of gas discharge. From other side what is the statistical level of China diagnostics? The situation is the similar like bioresonace diagnostics and therapy. Resonance in biological systems is different. It is important to show the true to the society. For Kirlian effects there are 2 biophysical parameters – bioelectric field and dielectric permittivity. The measurement of these 2 parameters from Prof. Korotkov is enough. With dielectric permittivityis possible to measure the water drops of different types of water and liquids. For how many diseases is possible to make diagnostics with EEG? EEG is more precise method than GDV study. This is perfect that we make difference between real scientific research in physics with Kirlian effect and unreliable medical application of this method. * Mbreht--Mbreht (talk) 16:58, 26 August 2012 (UTC) * Not to turn this into a forum, but to address your statement which is somewhat related to the article (and this is all my opinion): I think a large part of the reason why Kirlian photography is considered to be pseudoscience by so many people, is because scientists such as Koroktov take legitimate science and exaggerate the "possibilities" of the science, using marketing language and technobabble. For example, these items are directly from his web site: * Diagnosis and monitoring of the human energy-informational state and analysis of subtle energies * Experimental research of human body activity after death * Diagnostic Possibilities Of The Modified GDV Technique In Obstetrics * The GDV Technique Application In Oncology * Analysis of Stimulated Electrophotonic Glow of Liquids * Science Confirms Reconnective Healing * Energetic Properties Of Aqueous Gemstone Elixers * He writes all these article and does all this research, yet none of it appears in any of the hundreds of medical journals, science journals or other publications that considered authoritative by the scientific community. * Dear MrX, like scientist I absolutely agree with these 6 points. But in topic research is clear what is Kirlian effect like physics and what do Korotkov after the border of science. Accept my congratulations for your real position. The results from Russia, Poland and USA will show to the readers the true. I know that the life of Antonov, Inyushin, Adamenko had been only with real proofs in science, with scientific commissions and during the socialism this was not easy. The topic in Application Art is very interesting. Mbreht--Mbreht (talk) 15:34, 27 August 2012 (UTC) * Thanks for your support Mbreht. &mdash; MrX 19:37, 27 August 2012 (UTC) * IMO, he uses these unproven (as far as I can tell) ideas to sell devices, books and lectures. This is virtually the textbook definition of pseudoscience. On top of that, everyone else with a web site then starts peddling their own version of this pseudoscience, making alarmingly bold medical claims and outright lies. So, a potentially legitimate and useful science is made a mockery of by vocal, self-promoting people who operate completely outside of the bounds of accepted scientific practices. * The bioelectric field (as explained by Koroktov and his followers) is conjectured. It has not been proven to exist, so talking about it as if it is factual, removes all credibility from any argument upon which it is based. &mdash; MrX 17:53, 26 August 2012 (UTC) * Dear MrX, our comments are very interesting. I already published 2 reliable sources for biophysical fields. 1. Gulyaev, Yu. V., Godik, E. E., Human and animal physical fields, Newspaper of Acad. of Scie. SU, N8 (1983) 118. 2. Gulyaev, Yu. V., Godik, E. E, Human and animal physical fields, Scientific American, N5 75 (1990). The academician reputation of Prof, Yuri Gulyaev is indisputable. One of the 7 biophysical fields is bioelectric field. Korotkov is not originator of this topic in physics. He is engineer. With GDV device is not possible to study full spectrum. For me is very strange that PhD like Beverly Rubuk explains "biofield". In physics there are 4 fundamental field. Also is very strange the she says "living" energy and this is vitalism. The correct is energy in biological systems. What says Korotkov is one and what is the reality in physics is different. What is measurement of living energy? What are the parameters of living energy. Paradox! Mbreht--Mbreht (talk) 18:14, 26 August 2012 (UTC) * Unfortunately I'm unable to respond substantively because I do not have access to those sources (Gulyaev). Thanks for sharing your insights. &mdash; MrX 19:37, 27 August 2012 (UTC) Dear MrX, I regret that I have this source only in Russian. Prof. Gulyaev is very famous in Russia. He has been director of Institute for Electronics, Russian Academy of Science. The level is visible for the publishing the same publication in USA. I know Prof. Gulyaev personally. Accept my congratulations for the page for Nikola Tesla. This is the publication in Russian: http://astrokey.org/issledovanija/fizicheskie-polja-biologicheskih-obektov-guljaev-godik Mbreht--Mbreht (talk) 20:20, 27 August 2012 (UTC) * I found that http://translate.google.com worked well for this. It translated the article from Russian to English in a manner that is quite comprehensible. ~Amatulić (talk) 21:04, 27 August 2012 (UTC) * I agree it does work well. I've been able to use when I can find text articles in Russian. Unfortunately, I don't think it works with PDFs. &&Dear Amatulic#top, thank you very much for your efforts. Mbreht--Mbreht (talk) 05:09, 28 August 2012 (UTC) * I didn't realize (until just now) that Mbreht posted the article that he used for citation. I look forward to reading it. &mdash; MrX 21:46, 27 August 2012 (UTC) * I shown this article for the reality of electric biophysical field and in some papers of electric aura. Mbreht--Mbreht (talk) 05:09, 28 August 2012 (UTC) * I read the (Gulyaev) article and I see that it refers to electromagnetic radiation (heat, light, magnetism, electrical fields, etc.) and acoustic (mechanical) vibrations. Certainly no scientist would dispute those claims. The article, however, does not mention Kirlian photography, and I have never seen any proof that Kirlian photography (or GDV) can be used to reliably visualize these fields, especially in a medical diagnostic application. &mdash; MrX 22:11, 27 August 2012 (UTC) Dear MrX, the article of Gulyev and Godik is connected with biophysical field. The Kirlian effect is not including, but in their publications there is electric aura. Kirlian effect is not including. The GDV method was not created of the time of the report (1983). I show this publication for the reality physical fields of biological objects (Gulyev, Godik, 1983) of biophysical fields (Ignatov, Antonov, 1983). They are professors and doctors in Physics. In physics is not correct biofield, energy field etc. Mbreht--Mbreht (talk) 05:04, 28 August 2012 (UTC) Electric glow PROPOSAL FOR ELECTRIC GLOW: In the scientific circles in Eastern Europe for Kirlian effect is popular electric aura or electric glow like result of this effect. Electric aura is difficult to explain to Western readers. There are 2 possibilities for Kirlian effect for water drops for example - electric glow of water drops like result of Kirlian effect or Kirlian photographs of water drops. For me second is more easy for readers. http://en.wikipedia.org/wiki/Electric_glow_discharge Mbreht--Mbreht (talk) 05:39, 28 August 2012 (UTC) * Electric glow discharge refers to the light from a plasma, usually from a rarefied, ionized gas. It seems as if you are trying to attribute a mysterious, unknown property to the well-understood property of corona discharge. Using terms like "Electric glow"and "electric aura" is not helpful unless you define the terms. I would suggest that these concepts would not be difficult to explain to western readers if they were explained in English, using consistent terminology, grounded in known scientific principles and physical concepts. Perhaps the information would be better suited for inclusion on ru.wiki, where the language barrier would not be an issue. &mdash; MrX 13:39, 28 August 2012 (UTC) Kirlian device Dear Amatulic, your color picture for Kirlian device is very clear and nice. The traditional Kirlian device in Russian school is with metal conducting plate. From 1984 Prof. Antonov and Bulgarian scientists make these research with transparent electrode. The image is better that the same image in the same time with metal electrode. One of the biggest secret is the liquid in the electrode. Mbreht--Mbreht (talk) 17:29, 31 August 2012 (UTC) Applications: Biology and Kirlian photographs of water drops Dear MrX, I publish the information in Application about Biology and Kirlian photographs of water drops. I hope that I am useful. I am sure of the information of these 2 topics. For the topic Sport and health I am not sure of the sources of Korotkov. What are the parameters of sport and what are the parameters of health is not very clear. For Flaw detection you can solve what can do. Mbreht--Mbreht (talk) 09:46, 28 August 2012 (UTC) * The Biology and Kirlian photographs of water drops sections recently added to not seem to fit the category of applications. An application is the use of the technique (Kirlian photography) for a practical purpose, for example manufacturing, curing diseases or water purification. Neither section describes a practical application, but more of a vague overview. * All of the sources for the biology section are research and study related. Unless there are practical applications, this content does not belong. * The Kirlian photographs of water drops section has similar issues. First, this content was previously removed from the article partly because the sources are not independent of the subject. A paper written by a scientist about that scientist's own research is not a sufficient source for inclusion. If this content is worthy of inclusion, it should be covered in books, magazines, newspapers, etc. Also, what are the practical applications? If these issues can not be addressed then this content also does not belong. &mdash; MrX 13:23, 28 August 2012 (UTC) * Dear MrX, thank you very much for your information. You can solve if this information is for Application. If this information is for other place is perfect. I think that the readers can know for these two topics. The sources of the topic Kirlian photographs of water drops is connected with reliable scientific sources with reviewers. The application of the research of Prof. Antonov is connected with non-equilibrium processes in physics and theoretical biophysics. The research of Dr. Ignatov is with full spectrum of color Kirlian discharge. The experiment of Prof. Korotkov is with digital device and there is change of the signal and this results is not reliable. They are only in blue and violet part of the spectrum. Also the Bulgarian scientist measure the additional parameters of water - spectrum in IR range, dielectric permittivity, contact angle of evaporation. Without these additional parameters is impossible the publication of this type scientific journals. Prof. Korotkov has not these additional study. Also Antonov and Ignatov are working with control sample. In biophysics these absolutely necessary for non-equilibrium processes. The biggest problem of Masaru Emoto and Konstantin Korotkov are the measurements without control samples. Mbreht--Mbreht (talk) 14:03, 28 August 2012 (UTC) * Mbreht, everything that you have described is research, and has not addressed any of the issues that I have raised. If you believe this information should be included under the research section, then please write it so that it is an overview of the subject, encyclopedic in composition, and in clear English. Thank you. &mdash; MrX 14:20, 28 August 2012 (UTC) * Dear MrX, thank you. I will be ready in next 3 hours. Mbreht--Mbreht (talk) 17:33, 28 August 2012 (UTC) * Dear MrX, I published the text with better edition. I hope that the text is interesting for the readers and you know the place. If you have the questions to me, please. Mbreht--Mbreht (talk) 18:57, 28 August 2012 (UTC) * I sincerely appreciate your efforts, but your edits still have not addressed the issues that I raised regarding notability, reliable sources and the fact that your edits discuss research, not applications. I don't think you are deliberately ignoring my concerns, so I can only assume that you do not understand what I have said. Perhaps other editors will share their views. &mdash; MrX 19:12, 28 August 2012 (UTC) * Dear MrX, I understood perfect your information. Please, do that which is important for the readers of Wikipedia. The sources are reliable from the scientific journals in Eastern Europe. Mbreht —Preceding undated comment added 20:11, 28 August 2012 (UTC) * Dear MrX, your edition is better that my structuring of the text. I hope that we will make the text with you for other topics. Now I read your page for Nikola Tesla. Mbreht--Mbreht (talk) 17:09, 30 August 2012 (UTC) * Dear MrX, there is only one error. Your text is: Galina Gudakova conducted biological research in Russia.[46][47] and Bulgaria[48]. He explored the growth of microbiological cultures using Kirlian photograph. The text can be: Galina Gudakova conducted biological research in Russia.[46][47]. She explored the growth of microbiological cultures using Kirlian photograph. Galina Gudakova is woman from Russia. Mbreht--Mbreht (talk) 17:24, 30 August 2012 (UTC) * Sorry about that Mbreht, I should have been more careful. I will correct it. &mdash; MrX 17:28, 30 August 2012 (UTC) Dear MrX, the structuring of Slavic names is very interesting. In Russia and Bulgaria -ov is for the man - Ivan Ivanov, for woman -ova - Ivana Ivanova. In Poland and Czech Republic -ski for man Popovski, for woman -ska Popovska. The originator of Slavic alphabet had been from Bulgaria in IX century, Cyril and Metodiy. The Russian alphabet is from Bulgaria. Mbreht--Mbreht (talk) 17:37, 31 August 2012 (UTC) There is publication in Russian journal “Biomedical Radio electronics, Biomedical Technologies and Radio electronics” for the physical parameters of Kirlian effect in the research of water, biological objects and human skin tissue. The head editor of the journal is eminent Russian scientist Prof. Yuri Gulyaev. In the publication there are not scientific proofs that Kirlian method is diagnostical method for different type of diseases. Ignatov, I., Mosin, O. V. (2012) Kirlian Effect in Biomedicine Diagnostics and Research of Properties of Biological Objects and water, Biomedical Radio electronics, Biomedical Technologies and Radio electronics, №12, pp. 13-21. http://www.radiotec.ru/catalog.php?cat=jr6&art=11945 --Mbreht (talk) 17:20, 30 January 2013 (UTC) Research with no notoriety Hello all. Mbreht is a long-known spammer in the Bulgarian-language version of Wikipedia; he is constantly making references to Ignatov and the Center for Medical Biophysics and is spamming the "external links" sections; you can take a look at their website. Needless to remind you, extraordinary claims require extraordinary evidence, and in Wikipedia's case, reliable sources. None of those pointed out by Mbreht are something else than WP:SPS. Moreover, the lack of citations and discussion about Antonov and Ignatov's research make it not worthy for inclusion in Wikipedia, as it has already been pointed out (I'm now discovering the Archive 1 of this talk, it's pretty informative for Mbreht's intentions). Cheers, −PetaRZ (talk) 12:51, 17 February 2013 (UTC) * Dear PetaRZ, I do this edition of which I am sure.I future I will publish for different topics and scientists, when I am have reliable sources. I also improved Kirlian photography with MrX with information for scientists from Russia. --Mbreht (talk) 12:57, 17 February 2013 (UTC) * Thank you for admitting that you don't have reliable sources. Please wait until you have a lot of them before you publish this information in Wikipedia. −PetaRZ (talk) 13:00, 17 February 2013 (UTC) * Dear PetaPZ, I know perfect the activities of Bulgarian biophysicists. We already discuss the editors how reliable are the sources for Kirlian effect in talk page. The idea was to inform the readers for Kirlian effect.If you think that this information is useful for Wikipedia, please publish. There are not a lot of scientists in the world with results for Kirlian effect. * With Google Scholar are visible the publications of Antonov and Ignatov. --Mbreht (talk) 13:56, 17 February 2013 (UTC) * PetaRZ. Please don't attack other editors or their intentions. Please do discuss content. I suggest you address portions of the content that you believe are not reliably sourced, or properly attributed, and then we can work from there. Sweeping generalizations about notability or pseudo-science will not get us very far. Perhaps you could present one of these extraordinary claims and we can discuss its sourcing. (Mbreht - would you please properly indent your talk page posts using colons so that we can follow the thread? Thanks.) - MrX 14:10, 17 February 2013 (UTC) * Please, point me out when did I attack anybody or their intentions. I'm only discussing the content which, as I pointed out, is either poorly sourced or incorrectly sourced. As you suggested, I'm going to discuss those claims one by one. Nevertheless, I remind you that Wikipedia has criteria for notability, and not criteria for dismissal. Hence the burden of proof that Mr Ignatov's research has to be included is on Mbreht, and not on any other editor. Would anybody be so kind to point out any secondary sources/reviews where Mr Ignatov's research is referenced OR reviewed OR praised OR dismissed? When such sources are not available for us, not a single generalization about notability is sweeping, hasty, or whatsoever. −PetaRZ (talk) 14:23, 17 February 2013 (UTC) * Dear PetaRZ, please read the comments on Talk page of the topic Kirlian. Part of the sources are on the paper and I have its, because I am curious of this topic for reliable sources. I am working also in Russian Wikipedia for the topic Origin of life without name of Ignatov. But, the names are part of the research. The editors of Russian Wikipedia ask me for the publication of Oleg Mosin PhD --Mbreht (talk) 14:33, 17 February 2013 (UTC) * "Mbreht is a long-known spammer" <-- This is not nice. * Yes, let's take it piece by piece and gain consensus. Generally, I'm comfortable removing any research that is not cited by a third party reliable source. I think this would eliminate most of the Ignatov and Korotkov material which is referenced to primary sources. I have a few books on the subject, so I will check them for any mentions of these two scientists. - MrX 14:42, 17 February 2013 (UTC) * Dear MrX, you know the history of the preparation of page Kirlian photography. You have better experience like editor and I am sure that you will do the best. --Mbreht (talk) 14:48, 17 February 2013 (UTC) * Dear PetaRZ, I published information in BG Wiki for Prof. Marinov, Prof. Antonov, Dr. Ignatov and Prof. Vitanov. They are physicists and in Bulgaria there are not a lot of physicists with publications in scientific journals (Google Scholar) and public position. You are physicist also and please publish the achievements of Bulgarian scientists. I will not do that, because you are better editor.--Mbreht (talk) 15:08, 17 February 2013 (UTC) * I'm sorry, let me correct myself: Mbreht has a long history of spamming on bg.wiki. Thank you for your willingness to look for references in third party reliable sources, their presence in the references is the only thing for which I insist. −PetaRZ (talk) 14:53, 17 February 2013 (UTC) * Google scholar is not a scientific journal. −PetaRZ (talk) 15:11, 17 February 2013 (UTC) * The books that I have: Kirlian Photography: Research and Prospects - Luigi Gennaro et al; The Unseen Self - Brian Snellgrove; and The Body Electric - Thelma Moss; do not mention Ignatov or Korotkov at all. None of these book are scholarly though. - MrX 15:46, 17 February 2013 (UTC) Section Anton Antonov All the references point out to Antonov's research. Hence, they are primary sources. See WP:PRIMARY for relevant general discussion about primary, secondary and tertiary sources. This section is original research at its best. Unless reliable secondary sources, where Antonov's research is reviewed, this section is to be wholly removed. * I agree. Unless better sources can be introduced, it should be removed. - MrX 15:57, 17 February 2013 (UTC) Section Ignat Ignatov All the references point out either to Ignatov's research or research by his co-authors. The information is not relevant to the article. Secondary sources, explaining the notability of the experiment, establishing that his results depend on the dielectric permittivity of a water sample with its particular impurities are urgently needed. Otherwise, the section is also to be removed. The phrase Kirlian photography is used as an auxiliary method for Bulgarian scientists in research the properties of water is not verifiable. The next phrase (The primary method) does not have any particular meaning and is also not verifiable. −PetaRZ (talk) 15:10, 17 February 2013 (UTC) * Dear PetaRZ, there is not like Ignatov measurement sensitive method of coronal discharge. His results are connected with dielectric permittivity of a water sample. The publications are in Google Scholar. The connection of dielectric permittivity of the object and image are in Doctor Dissertation of Antonov with different publications. Please, read these publications. --Mbreht (talk) 15:32, 17 February 2013 (UTC) * Well, as it has been pointed out, a PhD thesis is a primary source. What we need is: "Somename, who is an expert in the field, reviews Ignatov's research and thinks it is, in a good or a bad way, important for something". Do you get it? −PetaRZ (talk) 20:34, 17 February 2013 (UTC) * @PetaRZ - I agree, secondary sources are needed. I would also be interested in what other editors think. - MrX 16:02, 17 February 2013 (UTC) * Definitely. −PetaRZ (talk) 20:34, 17 February 2013 (UTC) * Dear MrX, Did you remember our communication from the summer. Big part of the sources for Kirlian photography have not secondary sources. Please, read wich source from 58 is executig these conditions. The problem is also that part of the sources are only on paper, they are not in Google Scholar. I try to show additional sourses, because would like to be correct. For example Engeneer Journal from Germany - 1. Zellner, A. (2009) Energy, Color Kirlan Analysis of Ignat Ignatov, Die Ingenieurin, Nr. 89, Germany, pp. 26-27. From Bulgaria: 2. Manolev et al. (1991) Dependence of Electrical Discharge of Fingers from Frequency, South-Western University Neofit Rilski, Blagoevgrad.--Mbreht (talk) 16:32, 17 February 2013 (UTC) It is very important also that Antonov and Ignatov show that Kirlian photography is not diagnostic method in medicine. * I have the following 3 sources on paper for Bulgarian scientists: 3. Gudakova, G. Z. et al. (1988) Study of Parameters of Gas Discharge Glow Microbiological Cultures, Journal for Application Spectroscopy, V. 49, №3, Moscow. 4. Gudakova, G. Z. et al., (1990) Research of the crop growth of fungi С. Quilliermondy with method of Kirlian, Journal for Mythology and Fitology, issue 2, №2, Moscow. 5. Kiseliova, M. (2002) Brain Electrical Activity Study and Kirlian effect, Federal Center for Traditional Methods for Diagnostics and Treatment, Ministry of Health, Moscow.--Mbreht (talk) 16:50, 17 February 2013 (UTC) --Mbreht (talk) 17:04, 17 February 2013 (UTC) 6. Topusov, I., Antonov, A. (2002) Executing of High Frequency Photography (Kirlian effect)and Tehrmography for Diagnostics of Sports Traumas, Theory and Prsctice of Phisycal Culture, №2. Source №11 with Ignatov http://lib.sportedu.ru/Press/TPFK/2002N2/p15-17.htm --Mbreht (talk) 17:21, 17 February 2013 (UTC) * Yes, I remember the discussions. Do you remember being reminded that our notability standards require that content in Wikipedia must be reliably sourced and important enough that other sources would write about it? Some of the sources that you present above have already been rejected. I've never heard of Journal for Mythology and Fitology, nor Journal for Application Spectroscopy although there is a Applied Spectroscopy (journal). Simply writing a paper on one's own research and having published is not sufficient. It must rise to the level of being significant enough for other reliable sources to cite it. - MrX 12:03 pm, Today (UTC−5) * Dear MrX, the sources are from Russia and Bulgaria and there are reliable. I know that the information in Wikipedia can be independence. You are editor with biggest practice. --Mbreht (talk) 17:43, 17 February 2013 (UTC) Dear MrX, Dear Peta RZ, I am leaving Wikipedia. For me was pleasure to work with you. Hear I feel like in prison without creation. For me in Wikipedia there is subjective human factor. I wish you success for the spreading of information to the readers. Good Bay. --Mbreht (talk) 19:08, 17 February 2013 (UTC) * Oh, I think that you are realizing something very important: that Wikipedia is not a place to promote someone's original research. In the current level, you should really focus on promoting Ignatov's research outside Wikipedia, most important on peer-reviewed scientific journals. An Google Scholar is a search engine, it is not in any case a peer-reviewed scientific journal (but it may index some peer-reviewed scientific journals). It is very funny that you state that scientific sources can be reliable in Bulgaria or in Russia but not outside those two countries. −PetaRZ (talk) 20:34, 17 February 2013 (UTC) * Dear PetaRZ, the science is worldwide and the scientific journals from Russia are valid in whole world. This is your opinion and please show the proof. Your opinion is discrimination of Russian science. Then why we write for Kirlian or Mendeleev, Oparin, Russian cosmic industry, Nobel holders from Russia etc. Again for the Kirlian effect there are not a lot of scientific publications. Again, please read the publication from Kirlain photography. Also what is the topic of Prof. Antonov dissertation? On which page is the information for dielectric permittivity, what are the sources...? --Mbreht (talk) 21:13, 17 February 2013 (UTC) * Again, Wikipedia has notability criteria, and not exclusion criteria. The burden of proof that Antonov's publications have notability is on you, not on me. −PetaRZ (talk) 22:38, 17 February 2013 (UTC) * At the risk of hypocritically doing the same think I assused PetaRZ of upthread, I think this is clear case of IDHT and possibly CIR. There is no doubt that the policies and guidelines have been presented here again and again, to no avail. Even the simple requests to properly indent talk page posts seem to be ignored. These discussions have been repeated to the annoyance of other editors, including myself. At this point, I fully support removing anything from this article that is only referenced to primary sources. I doubt anyone other than Mbreht will object to this, but since he has announced his departure from the project, I'm sure he will not stand in the way of improving the article. - MrX 23:19, 17 February 2013 (UTC) * Don't worry . You accused me of something, I advanced my arguments, you heard them, and now we agree on the content. All this is perfectly fine for me. We can wait a little and if no other editor objects, content supported by primary sources only (Antonov and Ignatov sections at least) should be removed. −PetaRZ (talk) 12:51, 18 February 2013 (UTC) * Dear MrX, I had a lot of efforts of this page. I will work for the improvement of the page. The problem is time. I gave the maximum of the sources for Kirlian effect and I try to be useful. It is very important that the readers know that this is not medical and this is biophysical method. The problem is that there are a lot of parapsychological papers without scientific value and the selection of real scientific research was not easy. I already shown secondary sources from 1-6 for Antonov and Ignatov. --Mbreht (talk) 05:22, 18 February 2013 (UTC) New publications for Kirlian effect: Dear MrX, In 2007 Prof. Pisotskaya published electronic paper with study of Kirlian effect of water drops with Black White Kirlian photography. In references were included Antonov and Ignatov. This publication is not online now. I just achieved new publication from Pisotskaya: Lapitskiy V.N., L.A. Pesotskaya V.N. et al. (2012) Estimation of influence of schungite room on the state of human health by the method of Kirlian, Scientific Paper, N11. Also there are sources in English: http://www.nvngu.in.ua/index.php/uk/?option=com_content&view=article&id=517:2011-10-19-17-05-44&catid=208:2011-10-19-11-44-31&Itemid=53&lang=ru Second publication with clear information that Kirlian effect is not medical method is in Wikipedia, Kirlian photography, 39: In the journal with Head editor Prof. Gulyaev. He is author of 1. Gulyaev, Yu. V., Godik, E. E., Newspaper of Acad. Of Scie. SU, N8 (1983) 118. 2. Gulyaev, Yu. V., Godik, E. E, Scientific American, N5 (1990)75. Ignatov, I., Mosin, O. V. (2012) Kirlian Effect in Biomedicine Diagnostics and Research of Properties of Biological Objects and Water, Biomedical Radio electronics, Biomedical Technologies and Radio electronics, №12, pp. 13-21. http://www.radiotec.ru/catalog.php?cat=jr6&art=11945 --Mbreht (talk) 06:11, 18 February 2013 (UTC) * You definitely refuse to hear any other arguments than your own. −PetaRZ (talk) 12:51, 18 February 2013 (UTC) New information from Russia and USA * Dear editors, I am Doctor in Physics from Russia. I’ve read carefully the information on Kirlian photography. I am familiar with scientific sources from Russia and the bibliography is accurate in English Wikipedia. There was a great interest in the Kirlian method in Russia in the sixties years in order to show that this is a medical method. Since it is not medical, the scientific interest in it declined. Few scientists, mainly biophysicists influenced by the Russian school continue to real scientific research for the biophysical parameters for Kirlian effect. We can estimate their real scientific efforts, because they are part of history of Kirlian photography. I think that your editorial work is optimal. I can quote you a Russian journal regarding the study of the electric indicators of the human body in space orbit. You understand that some of these studies are not subject to significant disclosure. For the following 2 authors the situation is similar like Korotkov: Die neue Dimension der Diagnose, Hans. Christian Seidl, Germany Marina Shaduri, Georgia --Analiticus (talk) 19:35, 18 February 2013 (UTC) * This is the journal from USA, The International Journal of Healing and Caring, FIELDS AND ENERGIES RELATED TO HEALING: A REVIEW OF SOVIET AND WESTERN STUDIES* Daniel J. Benor, MD http://www.wholistichealingresearch.com/user_files/documents/ijhc/articles/Benor-4-1.pdf --Analiticus (talk) 21:33, 18 February 2013 (UTC) * This is exellent level for scientific pulication in Journal of Applied Physics : Kirlian‐type images and the transport of thin‐film materials in high‐voltage corona discharges J. Opalinski --Analiticus (talk) 21:39, 18 February 2013 (UTC) * This is also excellent publication for the Kirlian effect for water drops in Journal of Applied Physics: Influence of ionic composition of water on the corona discharge around water drops Skarja, M --Analiticus (talk) 21:43, 18 February 2013 (UTC) * Microwave Electromagnetic Field Affects the Corona Discharge Pattern of Water in Electromagnetic Biology and Medicine Primož Kmecl, Igor Jerman and Metod Škarja --Analiticus (talk) 21:48, 18 February 2013 (UTC) * Installation for study of light activity of the water with the help of surface gas discharge in Modern Problems of Radio Electronics, Ukraine Y Dobrovolskiy, V Petrenko, L Pidkamin There are secondary sources about the research of Kirlian effect for water (water drops). --Analiticus (talk) 21:55, 18 February 2013 (UTC) * Welcome to Wikipedia, Analiticus. Please let us know if you come across any peer-reviewed scientific journals, magazines, newspapers, or major news sites that comment on these researcher in any depth. You may want to read WP:N, WP:RS, WP:CITE, WP:MEDRS, WP:PSEUDOSCIENCE, WP:SOAP and WP:MEATPUPPET to gain a better understanding of our source requirements and related policies. * Primary resources are of little value, unless they are also accompanied by secondary and tertiary sources. In other words, if you simply list every academic paper written by these Russian researchers, you will likely not gain any support for them being included in the article. - MrX 22:21, 18 February 2013 (UTC) * Dear MrX, good morning from Russia. This text is without real scientific proofs and secondary sources “Izabela Ciesielska at the Institute of Architecture of Textiles in Poland experimented with corona discharge photography (CDP) to evaluate the effects of human contact with various textiles on biological factors such as heart rate and blood pressure, as well as corona discharge images“ The sources, which I was published, are from American journal Applied Physics. They are secondary for the Kirlian effect with water or water drops. The best journal in Russia for Kirlian effect is the journal “Biomedical Technologies and Radio electronics“of one the most eminent Russian scientists – Prof. Yuri Gulyev. Dear MrX, good morning from Russia. This text is without real scientific proofs and secondary sources “Izabela Ciesielska at the Institute of Architecture of Textiles in Poland experimented with corona discharge photography (CDP) to evaluate the effects of human contact with various textiles on biological factors such as heart rate and blood pressure, as well as corona discharge images.“ The sources, which I was published, are from American journal Applied Physics. They are secondary for the Kirlian effect with water or water drops. The best journal in Russia for Kirlian effect is the journal of one the most eminent Russian scientists – Prof. Yuri Gulyev. 1.Gulyaev, Yu. V., Godik, E. E (1990) Physical Field of Biological Objects, Scientific American, №5, p. 75. 2.Gulyaev, Yu. V., Godik, E. E. (1983) Physical Field of Biological Objects, Newspaper of USSR Academy of Science. SU, №8, p. 118. What do hear this editor PetaRZ without experience for Kirlian effect? http://en.wikipedia.org/w/index.php?title=User:PetaRZ&action=history --Analiticus (talk) 03:53, 19 February 2013 (UTC) * I had phone conversation with my friend from France who is this Bulgarian PhD PetaRZ from the Laboratory for Theoretical Astrophysics. He is excellent scientist, but without experience for Kirlian effect. Why the people without experience of the topics in Wikipedia are working hear like editors. This influence on Wikipedia like independence sourse. I regret, but my place is not hear. I am busy. --Analiticus (talk) 04:21, 19 February 2013 (UTC) * For me the editor like PetaRZ who is again Google Scholar and Russian scientific school is not normal. I think what can do with this editor in Russian Wikipedia and in Wikipedia. He feels like mesa and this is not normal. --Analiticus (talk) 05:34, 19 February 2013 (UTC) * Dear MrX, thank you very much for your message. For me is important to be useful for the readers. I have information for Kirlian effect from 30 years and the edition in English Wikipedia is better than in Russian. This is difficult topic, because this is “border area of science”. Part of scientist are from one side (biophysics) and part of “scientists“ try to make “medical diagnostics“. I will think what I do. Thank you to you. --Analiticus (talk) 08:00, 19 February 2013 (UTC) * Oh, I'm not against Google scholar, neither against Russian science. I simply say that if something is on Google scholar it doesn't mean anything, because everybody can publish content that can be indexed by Google scholar. Including pseudoscientific stuff. Next, I'm not against Russian science. Possibly, if you make a greater effort in overcoming the language barrier, you could understand that I never said such a thing. −PetaRZ (talk) 10:30, 19 February 2013 (UTC) * If you are busy: don't waste your time here. Thank you for admitting that we are dealing with fringe science. Take a look at this page: „Важной лакмусовой бумажкой для определения значимости и степени признания маргинальных концепций, связанных с естественной наукой, историей или другими академическими областями, является наличие или отсутствие их экспертной оценки“. Скажите мне, где скрыты "экспертной оценки" для работы Игнатьева и Антонова? −PetaRZ (talk) 10:48, 19 February 2013 (UTC) * Dear editors, I have all publications in Russian for Kirlian effect. These sources (1-5) are more reliable than publications from 14 till 18. We can be independents. The reader, who read talk page and report, can not has feeling for double standard. These authors show that Kirlian effect is not medical method. I know the name of Prof. Antonov from Dubna. Please, read the originals of publications: Ass. Prof. Oleg Mosin is holder of award of science of the president of Russian federation: http://scholar.google.bg/citations?user=j-yDMDYAAAAJ&hl=bg&oi=ao Mosin is Lawyer, International Law with publications, Google scholar. 1.Skarja, M., Berden, M., Jerman, I. (1998) The Influence of Ionic Composition of Water on the Corona Discharge around Water Drops. Journal of Applied Physics, Vol. 84, №5, pp. 2436-2442. 2.Lapitskiy V.N., L.A. Pesotskaya V.N. et al. (2012) Estimation of Influence of Schungite Room on the State of Human Health by the Method of Kirlian, Scientific Paper, №11. 3. Antonov, A., Yukesselieva, L. (1987) Kirlian effekt, Wisenshaft. Zeitschrift Der TU, Magdeburg, p. 57. 4. Antonov, A., Yuskeselieva, L. (1968) Research of Water Drops with High-frequency Electric Discharge (Kirlian) effect, Bulgarian Academy of Science, 2I, №5, pp. 34-36. 5. Ignatov, I., Mosin, O. V. (2012) Kirlian Effect in Biomedicine Diagnostics and Research of Properties of Biological Objects and Water, Biomedical Radio electronics, Biomedical Technologies and Radio electronics, №12, 13-21. --Analiticus (talk) 06:25, 21 February 2013 (UTC) 14,000 Romanians I tagged the claim that 14,000 people worked in this area in Romania, though this is sourced the claim is too bold so a better source than some phrase in a newspaper article is needed. Besides, the quoted source sounds very much like an advert.Isbromberg (talk) 09:25, 28 May 2014 (UTC) * I agree and I edited it out. It was sourced to a tabloid newspaper that is not considered a reliable source.- MrX 13:29, 28 May 2014 (UTC) About Replication/Research--second reference See also the summary of research and replication studies in the article beginning on page 25 of: http://www.gahmllc.com/digital_issues/biofield2015/ — Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:04, 22 December 2015 (UTC) False statement about lack of replication in the article. The current version states, "Paranormal claims of Kirlian photography have not been observed or replicated in experiment..." This is simply not true. See: Pubmed abstract at this .gov site: http://www.ncbi.nlm.nih.gov/pubmed/25603488 See also: http://www.gahmllc.com/digital_issues/biofield2015/ page 25 to 34 — Preceding unsigned comment added by <IP_ADDRESS> (talk) 00:05, 22 December 2015 (UTC) Someone who cares, should correct the error — Preceding unsigned comment added by <IP_ADDRESS> (talk) 23:59, 21 December 2015 (UTC) some categories * category:parapsychology: * category:paranormal & category:pseudoscience: * 7 years and 4 years! It is very strange. Extra, it seems anomalous. — Yuriy Dzyаdyk (t•c), 10:00, 29 October 2016 (UTC). * These categories are wrong, so deleted. — Yuriy Dzyаdyk (t•c), 12:12, 7 November 2016 (UTC). * No they're not. They are defining characteristics as evidenced by the sources in the article. There's an entire section called Parapsychology research. Health claims based on Kirlian photography are widely considered pseudoscience.- MrX 13:19, 7 November 2016 (UTC) External links modified Hello fellow Wikipedians, I have just modified one external link on Kirlian photography. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20160303202347/http://www.colorado.edu/philosophy/vstenger/Medicine/Biofield.html to http://www.colorado.edu/philosophy/vstenger/Medicine/Biofield.html Cheers.— InternetArchiveBot (Report bug) 05:37, 11 December 2017 (UTC)
WIKI
ZD6126 ZD6126 is a vascular-targeting agent and a prodrug of N-acetylcolchinol, related to colchicine. It has shown promising results on tumors in mice. A phase I clinical trial identified gastrointestinal and cardiac effects as limiting dosing. Two phase II clinical trials were suspended investigating ZD6126 in metastatic renal cell carcinoma and metastatic colorectal cancer. ZD6126 was being investigated by AstraZeneca as a vascular disrupting agent (VDA). However, the trials were halted, after it became apparent that ZD6126 was too cardiotoxic at the required doses.
WIKI
Sr/Mg – doped bioceramic scaffolds for biomedical application Abstract Main Article Content Tamara Matić https://orcid.org/0000-0002-7415-0453 Farah Daou Alessandro C. Scalia Andrea Cochis Lia Rimondini https://orcid.org/0000-0002-7785-2282 Đorđe Veljović https://orcid.org/0000-0001-6370-7167 Abstract Bone is a mineralized connective tissue with remarkable self-healing capability. However, in the presence of large bone defects (≥ 2.5 cm), bone self-recovery is not efficient, necessitating surgical intervention and the introduction of a bone substitute. Hydroxyapatite (HAP) is a widely investigated material for bone tissue engineering (BTE) due to its similarity to the biological apatite found in bones and teeth. Mesoporous bioactive glasses (MBAGs), quickly bind to surrounding tissues and release ions promoting the formation of new bone. The silica from glass enhances angiogenesis, which is a pivotal consideration given the high vascularization level of this tissue. Ion-doping approach of both HAP and MBAG particles has gained great attention due to the ability of therapeutical ions to stimulate a certain cell response. The project aims to develop and characterize bioceramic scaffolds based on a combination of Sr/Mg-doped HAP and MBAG, thereby promoting osteogenesis and creating a favourable environment for the proliferation of endothelial cells. Downloads Download data is not yet available. Article Details How to Cite Matić, T. ., Daou, F. ., Scalia, A. C. ., Cochis, A. ., Rimondini, L. ., & Veljović, Đorđe . (2024). Sr/Mg – doped bioceramic scaffolds for biomedical application : Abstract. HEMIJSKA INDUSTRIJA (Chemical Industry), 78(1S), 39. Retrieved from https://www.ache-pub.org.rs/index.php/HemInd/article/view/1285 Section Biomaterials for orthopedic and dental applications Funding data References Lalzawmliana, V., Anand, A., Roy, M., Kundu, B., & Nandi, S. K. (2020). Mesoporous bioactive glasses for bone healing and biomolecule delivery. Mater. Sci. Eng. C Pantulap U, Arango-Ospina M, Boccaccini AR. Bioactive glasses incorporating less-common ions to improve biological and physical properties. J Mater Sci Mater Med. 2021 Dec 23;33(1):3. https://doi.org/10.1007/s10856-021-06626-3 Most read articles by the same author(s) 1 2 > >> 
ESSENTIALAI-STEM
Bagman The term bagman (or bag man) has different meanings in different countries. One group of definitions centers on the idea of traveling. In British usage, "bagman" is a term for a traveling salesman, first known from 1808. In Australian usage, it can mean a tramp or homeless man. However, many other definitions center around money. People involved in political fundraising, soliciting donations, or otherwise involved in the financial side of a political campaign may be referred to as a bagman. This usage has led to an expansion of meaning to include those who solicit bribes for public officials. In organized crime, a bagman may be involved in protection rackets or the numbers game, collecting or distributing the money involved. When acting as an intermediary in such activities, a bagman may also be called a delivery boy or running man, and may receive a fraction of the money collected. Journalist Jack Shafer defines "bag man" as a slang term "for criminals who perform deliveries and run errands for other criminals". In criminal operations involving disbursements of cash as illegal payments for some service, a bagman delivers the money, often cash, to the recipient, such as Fred LaRue in the Watergate scandal.
WIKI
Noralvis de Las Heras Noralvis de las Heras is a Paralympian athlete from Cuba competing mainly in category F42-46 throwing events. Noralvis competed in the 2004 Summer Paralympics in Athens winning a bronze medal in the F42-46 shot put and finishing outside the medals in the discus and javelin.
WIKI
Phrynotettix robustus Phrynotettix robustus, known generally as the robust toad lubber or robust toad hopper, is a species of lubber grasshopper in the family Romaleidae. It is found in North America. Subspecies These three subspecies belong to the species Phrynotettix robustus: * Phrynotettix robustus manicola Rehn and Grant, 1959 * Phrynotettix robustus occultus Rehn and Grant, 1959 * Phrynotettix robustus robustus (Bruner, 1889)
WIKI
Huawei, Angela Merkel, Kevin Hart: Your Friday Briefing (Want to get this briefing by email? Here’s the sign-up.) Good morning, We start today with the fallout from the arrest of a Chinese executive, proposed rollbacks of environmental regulations and the latest from the midterm elections. We also invite you to share your thoughts about our new design. The arrest over the weekend of a top executive at Huawei, the Chinese telecommunications giant, has complicated President Trump’s trade talks with Beijing and drawn sharp protests from the Chinese government. Meng Wanzhou, the company’s chief financial officer and the daughter of its founder, was arrested in Canada at Washington’s request, which is seen as a warning shot against the growing influence of Chinese technology. The Justice Department is investigating the company on charges of violating sanctions on Iran. Reaction: “To detain someone without giving clear reason is an obvious violation of human rights,” said a spokesman for China’s Foreign Ministry, demanding Ms. Meng’s release. Side effects: The news contributed to whiplash for global markets on Thursday, but things seem more stable today. Background: The U.S. has considered Huawei a security threat for years, and other countries are expressing increased concern, too. The administration outlined plans on Thursday to open nine million acres in the American West to drilling and mining by removing protections for the sage grouse, an imperiled ground-nesting bird. Reaction: The proposal, which is expected to be finalized next year, drew immediate criticism from environmentalists and praise from energy-industry representatives. Background: The plan is part of an effort to promote more oil and gas drilling on public land in support of what Mr. Trump calls a policy of American “energy dominance.” Related: The administration is also expected to submit a proposal next week that would significantly weaken a major Obama-era regulation to protect the sources of drinking water for about a third of the country. Republicans conceded a seventh congressional seat in California on Thursday, meaning that Democrats are likely to take 40 House seats from Republicans in the new Congress. David Valadao, who has represented Central California since 2013, had initially been declared the winner, but his Democratic opponent, T.J. Cox, pulled ahead when mail-in votes were counted. In North Carolina: The congressional campaign of the Republican Mark Harris disclosed that it owed more than $34,000 to a company whose work on absentee ballots and voter turnout has prompted fears of election fraud and called his narrow victory into question. In Michigan: Republicans, following the example of lawmakers in Wisconsin, moved to limit the powers of the incoming Democratic secretary of state. They also prepared to curb the authority of Democrats who will take over as governor and attorney general in January. Victorina Morales, a housekeeper at the Trump National Golf Club in Bedminster, N.J., is also an undocumented immigrant. Sandra Diaz, who is now a legal resident of the U.S., said she, too, was undocumented when she worked at the club from 2010 to 2013. The two women said they were not the only workers at Bedminster who were in the country illegally, although there is no evidence that Mr. Trump or Trump Organization executives knew of the women’s immigration status. Notable: Mr. Trump has made border security and the fight to protect jobs for Americans a cornerstone of his presidency. Response: The Trump Organization, which owns the golf course, said in a statement: “If an employee submitted false documentation in an attempt to circumvent the law, they will be terminated immediately.” The White House declined to comment. How we know: Ms. Morales and Ms. Diaz approached The Times through their lawyer, who is representing them on immigration matters. As part of its verification of this article, The Times reviewed Ms. Morales’s pay stubs and W-2 forms, which list the golf course as her employer. Mrs. Obama, pictured above as a college student at Princeton, is the descendant of the very caste of people that some of her predecessors in the White House owned. Her new memoir is “a serious work of candid reflection by a singular figure of early-21st-century America,” according to Isabel Wilkerson, a Pulitzer Prize-winning Times journalist and the author of “The Warmth of Other Suns: The Epic Story of America’s Great Migration.” Monthly jobs report: The U.S. economy added 155,000 jobs in November, the Labor Department reported today. The unemployment rate was unchanged from the month before, at 3.7 percent. Final farewell for George Bush: After a funeral service for the former president in Houston on Thursday, his body was carried 70 miles by train to his presidential library in College Station, Tex., where he was laid to rest. German politics: After 18 years under the leadership of Chancellor Angela Merkel, the Christian Democratic Union party is set to elect a new leader today. Here’s a look at the leading candidates to replace her. Featured videos: Standout actors including Julia Roberts and Ethan Hawke turn common experiences into enchanting moments of dance for The Times Magazine’s annual Great Performers issue. Kevin Hart controversy: Days after the comedian was named the host of next year’s Academy Awards, he drew criticism for his past use of homophobic slurs on Twitter. Early this morning he withdrew from the role. Grammy nominations: The rappers Kendrick Lamar and Drake led the list of nominees announced today. The four major categories — record of the year, song of the year, album of the year and best new artist — are dominated by women. News quiz: Did you follow the headlines this week? Test yourself. Late-night comedy: Filling in for an ailing Trevor Noah, Desi Lydic noted that President Trump has employed undocumented immigrants: “Trump told us he’d build a wall, but he never said there’d be a service entrance.” What we’re reading: Anne-Sophie Bolon, an editor in London, recommends this piece from Longreads: “The series ‘Ugly History of Beautiful Things’ turns to Angora rabbit wool, prized for its beauty, silky touch and warmth. The fiber was particularly popular in the 1930s and ’40s with Hollywood stars, but also, it turns out, with Nazi officers.” Cook: A comforting dish of polenta topped with fried eggs. Listen to: Our critics’ picks of the best pop music of the year. There are 65 songs to enjoy. Go to: The best performance of Handel’s “Messiah” in New York City. (Hint: It’s not at Lincoln Center.) Watch: Some great TV this weekend, including RuPaul’s holiday special and a costume drama. Smarter Living: If you’re shopping for the holidays, know that our editors are here to help you find the perfect gift for the hardest-to-please people on your list. Ask them your gift-giving questions here. We also have tips for choosing an environmentally friendly Christmas tree. You may have read that the Bank of England is looking for a new face for its 50-pound note (worth about $65). There have been many suggestions: the former prime minister Margaret Thatcher, the mathematician Alan Turing and the physicist Stephen Hawking. One lesser-known name caught our attention: Noor Inayat Khan, who spied for Britain during World War II. Ms. Khan wasn’t what one would expect of a British spy. She was born a princess to Indian royalty, and she was a musician and a writer. But she spoke French and had excellent radio skills. She became the first female radio operator sent by Britain into occupied France. She did the work of six radio operators, moving constantly and dyeing her hair blond to avoid detection. Her work became crucial to the war effort. Ms. Khan never made it home; she was captured and executed at the Dachau concentration camp in 1944. She was 30. Read more about her here. That’s it for this briefing. Have a good weekend. — Chris Thank youTo Eleanor Stanford for the cultural recommendations, and Kenneth R. Rosen and James K. Williamson for their Smarter Living tips. Amie Tsang, who works in our London office, wrote today’s Back Story. You can reach the team at briefing@nytimes.com. P.S.• We’re listening to “The Daily.” Today’s episode is about a Yemeni girl who drew attention to her country’s plight.• Here’s today’s mini crossword puzzle, and a clue: Light green (4 letters). You can find all of our puzzles here.• Do you have a story idea, feedback on our coverage or a question for our journalists? We’d love to hear from you.
NEWS-MULTISOURCE
Talk:George Brown Theatre School Reputation The "Reputation" section contains unverifiable puffery and self-promotion, in violation of Wikipedia standards. Numerous opinions are stated as fact. This page has been flagged accordingly. WP:SOURCE WP:PROMOTION Patrickc2006 (talk) 12:22, 15 March 2018 (UTC) * Please revise or remove the "Reputation" section to adhere to Wikipedia's core principles of verifiability WP:VER and neutral point of view WP:NPOV. Patrickc2006 (talk) 13:56, 23 March 2018 (UTC) * I intend on deleting the "Reputation" section because of its violation of Wikipeida's core principles. I would much prefer that you edit it yourself to bring it in line with Wikipedia standards. I would like to invite you to discuss the matter on this talk page. Patrickc2006 (talk) 14:28, 29 March 2018 (UTC) I've asked twice that you please discuss this matter. I'm going to go ahead and make the change I've described above. If you revert without responding here, then I'm going to have to file a complaint against you at ANI for disruptive editing by reverting without discussing.— Patrickc2006 (talk) 08:56, 8 April 2018 (UTC). Curriculum The "Curriculum" section does not actually contain any information specifically relating to the program's curriculum. I would like to suggest that the heading be changed to "Enrollment and Graduation Rates". Please remove content in this article that is intrinsically unverifiable (e.g. "To maintain a high standard of excellence and professional progress, high expectations are placed on students"). I would like to recommend an edit of the first sentence: "The George Brown Theatre Department is a conservatory program, similar to a professional training programs at The National Ballet School or The Royal Conservatory of Music." Perhaps you could expand this to explain specifically how these programs are similar. Please remember that content in Wikipedia requires citation from reliable, published sources (WP:SOURCE). Currently only the "Abuse Allegations" section contains appropriate citations. I would like to invite you to discuss these proposed edits on this talk page. Patrickc2006 (talk) 14:28, 29 March 2018 (UTC) I've asked twice that you please discuss this matter. I'm going to go ahead and make the change I've described above. If you revert without responding here, then I'm going to have to file a complaint against you at ANI for disruptive editing by reverting without discussing.— Patrickc2006 (talk) 08:56, 8 April 2018 (UTC). Controversy (Removed) I included a section providing a brief overview of long-standing abuse and harassment allegations at George Brown Theatre School. Within a couple of days, that section was deleted entirely by user Zonedthaws. I would like to invite this user to discuss the reasoning here for the deletion. In the meantime, I have restored that section along with minor edits. Offlabel noname (talk) 20:35, 15 March 2017 (UTC) * - See above. Excirial ( Contact me, Contribs ) 20:47, 15 March 2017 (UTC) - I noticed you removed the reference link to the Legacy of Trauma document. Can you provide justification? * - would you be able to weigh in on this issue? Offlabel noname (talk) 23:57, 23 March 2017 (UTC) * I have restored it for now. Offlabel noname (talk) 02:23, 24 March 2017 (UTC) Notable alumnae The list shows a very long list of people that no-one will read. I suggest that the names of people who don't have a Wikipedia article will be deleted. Any other ideas? While we're at it, I think that the copy editing template could be removed; anyone else agree? TheSheepGuy (talk) 15:00, 27 November 2016 (UTC) * We've listed graduates who've had success in the industry and work regularly in theatre, film and television.Gbcollege (talk) 17:41, 6 July 2018 (UTC) Abuse Allegations Fixed that for you. Patrickc2006 (talk) 14:40, 29 January 2018 (UTC)
WIKI
User:Sack36/sandbox ==English== Snowclones Snowclones are phrases'' that are synonyms of the original word. Some examples of snowclones:'' * not the sharpest tool in the shed * a few cards short of a deck Key field1 is the head word field2 are the major meanings field3 are the synonyms short define replace with a short definition of the synonym.
WIKI
Publications by Keyword: Adult By year:[ 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 ] Altay, Gizem, Batlle, Eduard, Fernández-Majada, Vanesa, Martínez, Elena, (2020). In vitro self-organized mouse small intestinal epithelial monolayer protocol Bio-protocol 10, (3), e3514 Developing protocols to obtain intestinal epithelial monolayers that recapitulate in vivo physiology to overcome the limitations of the organoids’ closed geometry has become of great interest during the last few years. Most of the developed culture models showed physiological-relevant cell composition but did not prove self-renewing capacities. Here, we show a simple method to obtain mouse small intestine-derived epithelial monolayers organized into proliferative crypt-like domains, containing stem cells, and differentiated villus-like regions, closely resembling the in vivo cell composition and distribution. In addition, we adapted our model to a tissue culture format compatible with functional studies and prove close to physiological barrier properties of our in vitro epithelial monolayers. Thus, we have set-up a protocol to generate physiologically relevant intestinal epithelial monolayers to be employed in assays where independent access to both luminal and basolateral compartments is needed, such as drug absorption, intracellular trafficking and microbiome-epithelium interaction assays. Keywords: Mouse intestinal organoids, Adult intestinal stem cells, Matrigel, Intestinal epithelial monolayer, In vitro intestinal epithelial model, Tissue-like functionality, TEER Hervera, A., De Virgiliis, F., Palmisano, I., Zhou, L., Tantardini, E., Kong, G., Hutson, T., Danzi, M. C., Perry, R. B. T., Santos, C. X. C., Kapustin, A. N., Fleck, R. A., Del Río, J. A., Carroll, T., Lemmon, V., Bixby, J. L., Shah, A. M., Fainzilber, M., Di Giovanni, S., (2018). Reactive oxygen species regulate axonal regeneration through the release of exosomal NADPH oxidase 2 complexes into injured axons Nature Cell Biology 20, (3), 307-319 Reactive oxygen species (ROS) contribute to tissue damage and remodelling mediated by the inflammatory response after injury. Here we show that ROS, which promote axonal dieback and degeneration after injury, are also required for axonal regeneration and functional recovery after spinal injury. We find that ROS production in the injured sciatic nerve and dorsal root ganglia requires CX3CR1-dependent recruitment of inflammatory cells. Next, exosomes containing functional NADPH oxidase 2 complexes are released from macrophages and incorporated into injured axons via endocytosis. Once in axonal endosomes, active NOX2 is retrogradely transported to the cell body through an importin-β1–dynein-dependent mechanism. Endosomal NOX2 oxidizes PTEN, which leads to its inactivation, thus stimulating PI3K–phosporylated (p-)Akt signalling and regenerative outgrowth. Challenging the view that ROS are exclusively involved in nerve degeneration, we propose a previously unrecognized role of ROS in mammalian axonal regeneration through a NOX2–PI3K–p-Akt signalling pathway. Keywords: Adult neurogenesis, Endocytosis, Exocytosis, Monocytes and macrophages, Stress signalling Mata, A., Gil, V., Pérez-Clausell, J., Dasilva, M., González-Calixto, M. C., Soriano, E., García-Verdugo, J. M., Sanchez-Vives, M. V., Del Río, J. A., (2018). New functions of Semaphorin 3E and its receptor PlexinD1 during developing and adult hippocampal formation Scientific Reports 8, (1), 1381 The development and maturation of cortical circuits relies on the coordinated actions of long and short range axonal guidance cues. In this regard, the class 3 semaphorins and their receptors have been seen to be involved in the development and maturation of the hippocampal connections. However, although the role of most of their family members have been described, very few data about the participation of Semaphorin 3E (Sema3E) and its receptor PlexinD1 during the development and maturation of the entorhino-hippocampal (EH) connection are available. In the present study, we focused on determining their roles both during development and in adulthood. We determined a relevant role for Sema3E/PlexinD1 in the layer-specific development of the EH connection. Indeed, mice lacking Sema3E/PlexinD1 signalling showed aberrant layering of entorhinal axons in the hippocampus during embryonic and perinatal stages. In addition, absence of Sema3E/PlexinD1 signalling results in further changes in postnatal and adult hippocampal formation, such as numerous misrouted ectopic mossy fibers. More relevantly, we describe how subgranular cells express PlexinD1 and how the absence of Sema3E induces a dysregulation of the proliferation of dentate gyrus progenitors leading to the presence of ectopic cells in the molecular layer. Lastly, Sema3E mutant mice displayed increased network excitability both in the dentate gyrus and the hippocampus proper. Keywords: Adult neurogenesis, Axon and dendritic guidance Almendros, Isaac, Carreras, Alba, Montserrat, Josep M., Gozal, David, Navajas, Daniel, Farre, Ramon, (2012). Potential role of adult stem cells in obstructive sleep apnea Frontiers in Neurology 3, 1-6 Adult stem cells are undifferentiated cells that can be mobilized from the bone marrow or other organs, home into injured tissues and differentiate into different cell phenotypes to serve in a repairing capacity. Furthermore, these cells can respond to inflammation and oxidative stress by exhibiting immunomodulatory properties. The protective and reparative roles of mesenchymal stem cells (MSCs), very small embryonic-like stem cells (VSELs) and endothelial progenitor cells (EPCs) have primarily been examined and characterized in auto-immune and cardiovascular diseases. Obstructive sleep apnea (OSA) is a very prevalent disease (4-5% of adult population and 2-3% of children) characterized by an abnormal increase in upper airway collapsibility. Recurrent airway obstructions elicit arterial oxygen desaturations, increased inspiratory efforts and sleep fragmentation, which have been associated with important long-term neurocognitive, metabolic, and cardiovascular consequences. Since inflammation, oxidative stress and endothelial dysfunction are key factors in the development of the morbid consequences of OSA, bone marrow-derived stem cells could be important modulators of the morbid phenotype by affording a protective role. This mini-review is focused on the recent data available on EPCs, VSELs and MSCs in both animal models and patients with OSA. Keywords: Mesenchymal Stem Cells, Sleep Apnea, Endothelial progenitor cells, Very Small-like Embryonic Stem Cells, Adult bone-marrow derived stem cells Madronal, Noelia, Lopez-Aracil, Cristina, Rangel, Alejandra, del Rio, Jose A., Delgado-Garcia, Jose M., Gruart, Agnes, (2010). Effects of Enriched Physical and Social Environments on Motor Performance, Associative Learning, and Hippocampal Neurogenesis in Mice PLoS ONE 5, (6), e11130 We have studied the motor abilities and associative learning capabilities of adult mice placed in different enriched environments. Three-month-old animals were maintained for a month alone (AL), alone in a physically enriched environment (PHY), and, finally, in groups in the absence (SO) or presence (SOPHY) of an enriched environment. The animals' capabilities were subsequently checked in the rotarod test, and for classical and instrumental learning. The PHY and SOPHY groups presented better performances in the rotarod test and in the acquisition of the instrumental learning task. In contrast, no significant differences between groups were observed for classical eyeblink conditioning. The four groups presented similar increases in the strength of field EPSPs (fEPSPs) evoked at the hippocampal CA3-CA1 synapse across classical conditioning sessions, with no significant differences between groups. These trained animals were pulse-injected with bromodeoxyuridine (BrdU) to determine hippocampal neurogenesis. No significant differences were found in the number of NeuN/BrdU double-labeled neurons. We repeated the same BrdU study in one-month-old mice raised for an additional month in the above-mentioned four different environments. These animals were not submitted to rotarod or conditioned tests. Non-trained PHY and SOPHY groups presented more neurogenesis than the other two groups. Thus, neurogenesis seems to be related to physical enrichment at early ages, but not to learning acquisition in adult mice. Keywords: Long-term potentiation, Adult neurogenesis, Synaptic transmission, Cell proliferation, CA3-CA1 synapse, Granule cells Diez, Pablo F., Laciar, Eric, Mut, Vicente, Avila, Enrique, Torres, Abel, (2008). A comparative study of the performance of different spectral estimation methods for classification of mental tasks IEEE Engineering in Medicine and Biology Society Conference Proceedings 30th Annual International Conference of the Ieee Engineering in Medicine and Biology Society (ed. IEEE), IEEE (Vancouver, Canada) 1-8, 1155-1158 In this paper we compare three different spectral estimation techniques for the classification of mental tasks. These techniques are the standard periodogram, the Welch periodogram and the Burg method, applied to electroencephalographic (EEG) signals. For each one of these methods we compute two parameters: the mean power and the root mean square (RMS), in various frequency bands. The classification of the mental tasks was conducted with a linear discriminate analysis. The Welch periodogram and the Burg method performed better than the standard periodogram. The use of the RMS allows better classification accuracy than the obtained with the power of EEG signals. Keywords: Adult, Algorithms, Artificial Intelligence, Cognition, Electroencephalography, Female, Humans, Male, Pattern Recognition, Automated, Reproducibility of Results, Sensitivity and Specificity, Task Performance and Analysis, User-Computer Interface
ESSENTIALAI-STEM
Preliminary Laboratory Investigation of Enzyme Solutions as a Soil Stabilizer Author(s): Mihai Marasteanu, Ray Hozalski, Timothy Clyne, Raul Velasquez June 2005 Report no. Mn/DOT 2005-25 This research studied the effect of two enzymes as soil stabilizers on two soil types to determine how and under what conditions they function. Researchers evaluated the chemical composition, mode of action, resilient modulus, and shear strength to determine the effects of the enzymes A and B on the soils I and II. The enzymes produced a high concentration of protein and observations suggest the enzymes behave like a surfactant, which effects its stabilization performance. The specimens were subjected to testing of varying lengths of time to determine their performance. Researchers observed an increase in the resilient modulus as the curing time increased but that an increase in application rate, as suggested by manufacturers, did not improve the performance of the enzymes. The study also suggests noticeable differences between the two enzymes and their effects on the soils in terms of resilient modulus and the stiffness of the soil. Download or order Download PDF (1.1 MB)
ESSENTIALAI-STEM
Page:UKSI1964 (Part 3- Section 1).pdf/915 diagram No. RM24 in Schedule 2 thereto ) but not by these Regulations and if it then complies with the provisions relating thereto by virtue of the Regulations of 1957, shall so long as it continues to comply with the said provisions as though the same had not been revoked be treated as if prescribed by these Regulations.
WIKI
Boingo Alive Boingo Alive is a double album by American new wave band Oingo Boingo, released in 1988 by MCA Records. It was performed and recorded live in a rehearsal studio with no audience, with the band performing songs from previous albums and two previously unreleased songs to celebrate the 10th anniversary of the band's beginning. Background According to the Los Angeles Times, as well as the album's sleeve sticker and promotional material, Boingo Alive was recorded live on a soundstage over nine nights in July 1988. The sticker and ads also read, "Hear our greatest hits the way they were meant to be heard—live". After Oingo Boingo migrated from A&M Records/I.R.S. Records to MCA Records in 1984, A&M had retained ownership of the band's previous recordings, but by 1988 the band became legally able to re-record their old material. Frontman Danny Elfman stated that Boingo Alive was a project the band had been planning for years, as they had been unhappy with the sound of their studio recordings, particularly with regards to the comparative lack of "energy". Elfman stated, "This is our 10th anniversary as a band and we wanted to present our songs in a way that our fans have grown accustomed to (when) seeing us." On the choice to eschew an audience, Elfman said at the time, "I hate the poor fidelity and the crowd noise from live albums. It made more sense this way. It's just us playing in a big room with a mobile truck outside—minus the 10,000 screaming teenagers." "Winning Side" peaked at No. 14 on the Billboard Modern Rock Tracks chart in November 1988. Disc 1 All tracks written and composed by Danny Elfman. Tracks marked with an asterisk do not appear on the LP and cassette versions of the album. Disc 2 All tracks written and composed by Danny Elfman, except "Violent Love", by Willie Dixon. Personnel Oingo Boingo * John Avila – bass, vocals * Steve Bartek – guitars * Danny Elfman – vocals, rhythm guitar * Carl Graves– keyboards, vocals * Johnny "Vatos" Hernandez – drums, percussion * Sam Phipps – tenor and soprano saxophones * Leon Schneiderman – baritone saxophone * Dale Turner – trumpet, trombone Additional musician * Bruce Fowler – trombone Technical * Danny Elfman – co-producer * Steve Bartek – co-producer * John Avila – co-producer * Bill Jackson – engineer, mixing * Jim Scott – additional mixing, additional recording * Le Mobile – audio recording * Dean Burt – additional recording * David Roberts – assistant engineer * Greg Stevenson – monitors * Charlie Brocco – assistant engineer (mixing) * Robert Hart – assistant engineer (mixing) * Jeff DeMorris – assistant engineer (mixing) * Stephen Marcussen – mastering * Vartan – art direction * DZN, The Design Group – design * Georganne Deen – illustration * John Scarpati – group photo * Steve Jennings – live photos * John Burlan – live photos * Laura Engel – live photos * Sean Riley – live photos
WIKI
X-ray reflectivity X-ray reflectivity (sometimes known as X-ray specular reflectivity, X-ray reflectometry, or XRR) is a surface-sensitive analytical technique used in chemistry, physics, and materials science to characterize surfaces, thin films and multilayers. It is a form of reflectometry based on the use of X-rays and is related to the techniques of neutron reflectometry and ellipsometry. The basic principle of X-ray reflectivity is to reflect a beam of X-rays from a flat surface and to then measure the intensity of X-rays reflected in the specular direction (reflected angle equal to incident angle). If the interface is not perfectly sharp and smooth then the reflected intensity will deviate from that predicted by the law of Fresnel reflectivity. The deviations can then be analyzed to obtain the density profile of the interface normal to the surface. History The technique appears to have first been applied to X-rays by Lyman G. Parratt in 1954. Parratt's initial work explored the surface of copper-coated glass, but since that time the technique has been extended to a wide range of both solid and liquid interfaces. Approximation When an interface is not perfectly sharp, but has an average electron density profile given by $$\rho_e(z) $$, then the X-ray reflectivity can be approximated by: * $$ R(Q)/R_F(Q) = \left|\frac{1}{\rho _\infty} {\int\limits_{ - \infty }^\infty {e^{iQz} \left( \frac{d \rho _e}{dz} \right) dz} } \right|^2 $$ Here $$R(Q)$$ is the reflectivity, $$ Q = 4 \pi \sin ( \theta ) / \lambda $$, $$\lambda $$ is the X-ray wavelength (typically copper's K-alpha peak at 0.154056 nm), $$\rho _\infty $$ is the density deep within the material and $$\theta $$ is the angle of incidence. Below the critical angle $$ Q < Q_c $$ (derived from Snell's law), 100% of incident radiation is reflected through total external reflection, $$ R=1 $$. For $$ Q \gg Q_c $$, $$ R \sim Q^{-4} $$. Typically one can then use this formula to compare parameterized models of the average density profile in the z-direction with the measured X-ray reflectivity and then vary the parameters until the theoretical profile matches the measurement. Oscillations For films with multiple layers, X-ray reflectivity may show oscillations with Q (angle/wavelength), analogous to the Fabry-Pérot effect, here called Kiessig fringes. The period of these oscillations can be used to infer layer thicknesses, interlayer roughnesses, electron densities and their contrasts, and complex refractive indices (which depend on atomic number and atomic form factor), for example using the Abeles matrix formalism or the recursive Parratt-formalism as follows: * $$ X_j = \frac{R_j}{T_j} = \frac{r_{j,j+1} + X_{j+1} e^{2i k_{j+1,z} d_j}}{1 + r_{j,j+1} X_{j+1} e^{2i k_{j+1,z} d_j}} e^{-2i k_{j,z} d_j} $$ where Xj is the ratio of reflected and transmitted amplitudes between layers j and j+1, dj is the thickness of layer j, and rj,j+1 is the Fresnel coefficient for layers j and j+1 * $$ r_{j,j+1} = \frac{k_{j,z} - k_{j+1,z}}{k_{j,z} + k_{j+1,z}} $$ where kj,z is the z component of the wavenumber. For specular reflection where the incident and reflected angles are equal, Q used previously is two times kz because $$ Q = k_\text{incident} + k_\text{reflected} $$. With conditions RN+1 = 0 and T1 = 1 for an N-interface system (i.e. nothing coming back from inside the semi-infinite substrate and unit amplitude incident wave), all Xj can be calculated successively. Roughness can also be accounted for by adding the factor * $$ r_{j,j+1,\text{rough}} = r_{j,j+1,\text{ideal}} e^{-2 k_{j,z} k_{j+1,z} \sigma_j^2} $$ where $$\sigma$$ is a standard deviation (aka roughness). Thin film thickness and critical angle can also be approximated with a linear fit of squared incident angle of the peaks $$\theta^2$$ in rad2 vs unitless squared peak number $$N^2$$ as follows: * $$ \theta^2 = \left(\frac{\lambda}{2 d}\right)^2 N^2 + \theta_c^2 $$. Curve fitting X-ray reflectivity measurements are analyzed by fitting to the measured data a simulated curve calculated using the recursive Parratt's formalism combined with the rough interface formula. The fitting parameters are typically layer thicknesses, densities (from which the index of refraction $$n$$ and eventually the wavevector z component $$k_{j,z}$$ is calculated) and interfacial roughnesses. Measurements are typically normalized so that the maximum reflectivity is 1, but normalization factor can be included in fitting, as well. Additional fitting parameters may be background radiation level and limited sample size due to which beam footprint at low angles may exceed the sample size, thus reducing reflectivity. Several fitting algorithms have been attempted for X-ray reflectivity, some of which find a local optimum instead of the global optimum. The Levenberg-Marquardt method finds a local optimum. Due to the curve having many interference fringes, it finds incorrect layer thicknesses unless the initial guess is extraordinarily good. The derivative-free simplex method also finds a local optimum. In order to find global optimum, global optimization algorithms such as simulated annealing are required. Unfortunately, simulated annealing may be hard to parallelize on modern multicore computers. Given enough time, simulated annealing can be shown to find the global optimum with a probability approaching 1, but such convergence proof does not mean the required time is reasonably low. In 1998, it was found that genetic algorithms are robust and fast fitting methods for X-ray reflectivity. Thus, genetic algorithms have been adopted by the software of practically all X-ray diffractometer manufacturers and also by open source fitting software. Fitting a curve requires a function usually called fitness function, cost function, fitting error function or figure of merit (FOM). It measures the difference between measured curve and simulated curve, and therefore, lower values are better. When fitting, the measurement and the best simulation are typically represented in logarithmic space. From mathematical standpoint, the $$\chi^2$$ fitting error function takes into account the effects of Poisson-distributed photon counting noise in a mathematically correct way: * $$ F = \sum_i \frac{(x_{simul,i} - x_{meas,i})^2}{x_{meas,i}} $$. However, this $$\chi^2$$ function may give too much weight to the high-intensity regions. If high-intensity regions are important (such as when finding mass density from critical angle), this may not be a problem, but the fit may not visually agree with the measurement at low-intensity high-angle ranges. Another popular fitting error function is the 2-norm in logarithmic space function. It is defined in the following way: * $$ F = \sqrt{\sum_i (\log x_{simul,i} - \log x_{meas,i})^2} $$. Needless to say, in the equation data points with zero measured photon counts need to be removed. This 2-norm in logarithmic space can be generalized to p-norm in logarithmic space. The drawback of this 2-norm in logarithmic space is that it may give too much weight to regions where relative photon counting noise is high. Open source software Diffractometer manufacturers typically provide commercial software to be used for X-ray reflectivity measurements. However, several open source software packages are also available: GenX is a commonly used open source X-ray reflectivity curve fitting software. It is implemented in the Python programming language and runs therefore on both Windows and Linux. Motofit runs in the IGOR Pro environment, and thus cannot be used in open-source operating systems such as Linux. Micronova XRR runs under Java and is therefore available on any operating system on which Java is available. Reflex is a standalone software dedicated to the simulation and analysis of X-rays and neutron reflectivity from multilayers. REFLEX is a user-friendly freeware program working under Windows, Mac and Linux platforms.
WIKI
Ctrip.com International Leads Declines in Asian ADRs After Downgrade Following Air China Commission Cut Ctrip.com International Inc. ( CTRP ) led declines among American depositary receipts Tuesday after being downgraded by two U.S. brokerages. Japan's markets closed at a record high as Asian markets posted broad gains. The Bank of New York Mellon Asia ADR Index fell 0.4%, compared with a 0.2% gain for the S&P 500 Stock Index. Asian ADR advancers led decliners 81 to 63. Ctrip.com fell 3.6% to $57.05 per ADR after analysts at Stifel Nicolaus downgraded the Chinese travel website to a hold rating from a buy and removed their price target of $58. The analysts cited an announcement by Air China that ticketing commissions will be cut to 2% from 3% for domestic flights sold by travel agencies. Stifel said other airlines may cut commissions, too. Morgan Stanley also downgraded Ctrip.com to a hold rating from buy. Qunar Cayman Islands Ltd. ( QUNR ), a competing travel website, fell 3.2% to $23.13 per ADR. Asia's ADR decliners included Novogen Ltd. ( NVGN ) -2.9%, China Sunergy Co. ( CSUN ) -2.8%, Mecox Lane Ltd. ( MCOX ) -2.6% and Taomee Holdings Ltd. (TAOM) -2.4%. Gainers included Zhaopin Ltd. (ZPIN) +8.7%, 51Job Inc. (JOBS) +5.4% and Soufun Holdings Ltd. (SFUN) +4%. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. Copyright (C) 2016 MTNewswires.com. All rights reserved. Unauthorized reproduction is strictly prohibited. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
User:Mystereo35/sandbox Athabasca University (AU) is a Canadian university specializing in online distance education and one of four comprehensive academic and research universities in Alberta. Founded in 1970, it was the first Canadian university to specialize in distance education.
WIKI
SiS (talk show) SiS, formerly SiS: Janice & Gelli is a Philippine television talk show broadcast by GMA Network. Originally hosted by Gelli de Belen and Janice de Belen, it premiered on August 27, 2001. The show is the longest running morning talk show in Philippine television. The show concluded on January 1, 2010 with a total of 2,250 episodes. Gelli de Belen, Janice de Belen and Carmina Villarroel served as the final hosts. The show is streaming online on YouTube. Hosts * Gelli de Belen (2001–10) * Janice de Belen (2001–10) * Carmina Villarroel (2004–10) * Recurring hosts * Marites "Tessbomb" Marañon (2001–10) * Eva Papaya (2004–06) * Guest hosts * Carmina Villarroel (2003–04) Ratings According to AGB Nielsen Philippines' Mega Manila household television ratings, the final episode of SiS scored a 5.6% rating.
WIKI
How to Improve Your Drinking Water Habits 26 Mar 2018 Category: Educational Are You Drinking Enough Water? Unlikely… The recommended daily water intake from professionals is 6 – 8 glasses a day. Alongside your cups of coffee and tea throughout the day, this can feel like a lot of liquid to get through! Many people either struggle to consume this much fluid or forget to drink enough and end up feeling dehydrated. To try and make it a little more exciting and easier to get through this much water each day, why not try adding a little lemon, infuse your water with fruit, swap tea for water or put it in a bottle with markers so you can see how much you’re getting through. It is equally as important to drink enough water, as it is to drink water at the correct times. Drinking at different times of day can have different effects on the body, and depending on when you’ve eaten it can have more or less of a positive effect. So, here’s the non-watered down truth about when you should be drinking water, and the effect it has on your body… Early Morning 6-9am. Drinking water first thing in the morning is a great way of energising your body ready for the day ahead. Water can stimulate your brain and kick start your metabolism before you’ve even sat down to breakfast. If you combine your first glass of water for the day with lemon, it can also help eliminate toxins and get your digestive system moving. It also tastes great and adds a little tang to your morning beverage. Just think, if you sleep for 6-8 hours every night, that’s 6-8 hours where your body is not getting any liquids! This is why it’s so important to quench your thirst and hydrate your body every morning before breakfast. Mid-Morning 10-11am. Ensure you have a glass of water just before your breakfast as this helps your body absorb more nutrients from your morning meal. Instead of reaching for a cup of tea, why not try a glass of water instead. Have one glass with breakfast, and then one glass whenever you start to feel hungry at work. This can stop you from reaching for an unhealthy morning snack. A lot of the time, the brain mistakes thirst for hunger, so always make sure you drink before you eat to identify what your body is really craving. Water can help kerb your appetite, so drink up! Before Lunch 11.00-1pm. Aim to drink a glass of water before you have your lunch. Again, drinking before you eat helps your body to separate food more effectively in your mouth and stomach, and therefore, helps your body digest food better. This also means your body will take in more of the nutrients from the food you choose to have for lunch, giving your body more of the good stuff! Sparkling water is a good choice for this time of day, as it aids digestion due to it being rich in sodium bicarbonate. After Lunch 2-3pm. Drinking whilst eating is discouraged by some professionals due to the fact it can prevent your body from absorbing supplements from your food correctly. However, that is only when it is consumed in excess. One glass with lunch is adequate and should quench your thirst. By now, you should be starting to go with the flow of your new drinking water routine! Mid-Afternoon 3-5pm. As your day at work progresses, your brain and mind can tire. Mid Afternoons are the point where most people begin to feel sleepy. Water is a natural energy drink, full of minerals that are essential to brain function. Think of it like a natural Lucozade without all the sugar! After your mid-afternoon glass, enzyme activity in your body will increase, and cholesterol production will lower. At this time of day, you may start to feel hungry in the run up to dinner. By drinking water, you’ll maintain the feeling of fullness from lunch. Evening 5-8pm. One glass should be drunk prior to eating. If you eat a fibre heavy meal, water ensures it passes through your stomach with no problems. Thus, keeping you out of hot water with your intestines and keeping you regular! Water can also be beneficial to the body if you’re planning on having a bath or shower. Hot showers or baths can raise your blood pressure due to the rise in temperature! Drinking water prior to bathing etc. can help reduce this. Night-time 8-10pm. Heart disease and strokes are the last things you want. Fortunately, quenching your thirst before bed and hydrating yourself can help prevent both of these things. If this doesn’t motivate you to keep hydrated before you doze we don’t know what will… Why don’t you try a bottle with markers to tell you how much you should have drunk by a certain time of the day. Drink down to the bottom, then refill at lunch time and drink to the bottom again. This will help you keep track of your drinking water habits and keep you hydrated!   Water Tracker - Billi Water Bottles With Time Markers
ESSENTIALAI-STEM
User:Челябинск Hello! Привет! I am Челябинск, and I want to help. I am from Russia, but I am currently living in the United States. 🇷🇺🇷🇺🇷🇺🇷🇺
WIKI
User:Fluxorz fluxorz is a techno-geek who knows way too much about the physics and real-world science behind the Back To The Future movies. he enjoys inventing in his basement and exploring the internet. he plays guitar by ear, and (given enough time), will learn to play guitar hero 3 better than his computer teacher, mr. jonathan schmid. fluxorz spends too much time at the library, and even more time researching things that only super-nerdy techno-geeks even want to know. he watches Stargate SG-1 reruns, and tries to keep up with Stargate: Atlantis as much as possible, even though he gets bogged down with too much homework quite often. by the way, Darth Vader is his hero, er, villain. one more important thing: he rocks at air guitaring to wicked guitar solos and heavy metal songs, and rules at guitar hero! [[Media:Through The Fire And Flames.flv]] [[Media:me playing eruption.flv]] by the way, he has a flavor. one more thing: his cell number is (eight-five-nine) eight-one-six four-seven-seven-four. text him "OMG OFC WTF BBQ (insert your name here) (insert your state or country of residence here)" someday, it'll be fun.
WIKI
Trump’s national emergency: Republicans worry about precedent for Dems As President Donald Trump publicly weighs declaring a national emergency as a way to get his border wall, some Republicans are expressing concern about the precedent such a move could set for future — and Democratic — presidents. Trump appears increasingly inclined to go the route of a national emergency to divert funds to a wall at the US-Mexico border as the partial government shutdown reaches its 21st day on Friday. “If we don’t make a deal with Congress, most likely I will do that,” Trump told Fox News host Sean Hannity in a Thursday interview. “I would actually say I would. I can’t imagine any reason why not, because I’m allowed to do it. The law is 100 percent on my side.” While declaring a national emergency is within his powers as president, some on the right are sounding alarms that Trump doing so in this circumstance would set the stage for future presidents to do the same. And not over immigration, but instead over issues like climate change, health care, or other Democratic Party priorities if and when a member of that party lands in the White House. Sen. Marco Rubio (R-FL) said in an interview on CNBC’s Squawk Box on Thursday that he wasn’t “prepared to endorse” Trump’s use of a national emergency at the moment and warned of future fallout. “It sets long-term precedents, and I can tell you, for people on my side of the aisle, one of the concerns we should have is if today the national emergency is border security and it entitles him to go out and do something, we all support that. Tomorrow, the national security emergency might be, you know, climate change, so let’s seize fossil fuel plants or something,” he said. “Maybe it’s an exaggeration, but my point is, we’ve got to be very careful about endorsing broad uses of executive power in our republic.” Sen. Marco Rubio said he's not ready to support Trump declaring a national emergency over border security because under a Democratic president, "the national security emergency might be climate change." pic.twitter.com/2taNpiW5Nr Rep. Matt Gaetz (R-FL) made a slippery slope argument against it in an interview with the Wall Street Journal. “I don’t want the next national emergency to be that some Democrat president says we have to build transgender bathrooms in every elementary school in America,” he said. The Wall Street Journal’s editorial board issued a warning on Thursday, arguing that while the courts could potentially step in on Trump’s emergency declaration, there’s no guarantee that would happen. “If Mr. Trump did win in court, a President Elizabeth Warren might take the precedent as a license to circumvent Congress whenever it is political expedient,” the editorial board wrote. “Rising carbon emissions or even income inequality could be declared national emergencies.” Even Fox News has cautioned against a national emergency declaration. Fox & Friends host Brian Kilmeade on Thursday said it would “be a disaster in the big picture, and it would show us at being inept and unable to govern around the world.” He added that it would set a “terrible precedent.” Republicans for years publicly fretted about Barack Obama’s potential for presidential overreach. Now Trump is weighing declaring a national emergency — even though there isn’t one — and they’re kind of stuck. They want to back the president. They also don’t want to look bad, or set up a scenario where future presidents use a similar play. Vox’s Jane Coaston recently explained Republican concerns: Among conservatives, including those who are strongly in support of a border wall, the debate over a potential national emergency declaration was less about whether a wall in the style Trump promised time and again during the campaign is necessary than about the powers a president has, and should have. “Do we really want to establish the precedent that the president can simply declare ‘It’s an emergency’ like some magical incantation and then completely bypass property rights and the will of Congress just so he can fulfill a campaign promise that, if Sam Nunberg is to be believed, began as a consultant’s gimmick to get the candidate Trump to talk about immigration and what a great builder he is?” Jonah Goldberg, a columnist at conservative publication the National Review, wrote on Monday. “If President Trump begins to imitate Barack Obama in issuing dubious executive orders and trampling on private property rights, he could find himself in trouble even with portions of his base,” John Fund wrote separately in the National Review last weekend. Democrats thus far appear pretty resistant to the idea of Trump declaring a national emergency and have decried his threats that he might do so. Some, however, have at least jumped onto the idea in jest. “Pumped for the next Democratic president to use ‘emergency powers,’” Jon Favreau, a former Obama speechwriter and Crooked Media co-founder joked on Twitter on Thursday, envisioning a future just like the ones Republicans are scared of. Pumped for the next Democratic president to use “emergency powers” for a Green New Deal (climate emergency), Medicare for All (public health emergency), and a new Voting Rights Act (democracy emergency)! https://t.co/cuC19W6nkH If Trump were to declare a national emergency to get the border wall, the move would certainly be scrutinized and likely subject to legal challenge in court. Congress could also overturn it with a two-thirds majority in both chambers, and it’s unclear how that would play out. But Trump could at the very least make the first move: Under the National Emergencies Act of 1976, the president can issue an emergency declaration and draw from some 130 laws already codified by Congress to try to build the wall. His legal team is already figuring out ways to do it.
NEWS-MULTISOURCE
Facility Maintenance Decisions On-site Opportunities Advances in microturbine and fuel-cell technology are helping managers address facilities� concerns about power cost, quality and reliability By Mohammad Qayoumi   Energy Efficiency The effect of computers on facilities goes beyond their influence on productivity and communication. The proliferation of computer technology impacts energy considerations, as well. A decade ago, the percentage of electricity used by computerized equipment was negligible. Today, these pieces of equipment consume close to 15 percent of the nation's total electricity. But their impact goes well beyond quantity. In the future, the quality of electricity that facilities will need to power this often-sensitive equipment will be much more stringent than traditional electrical loads. Maintenance and engineering managers have grappled with the reliability of electricity for some time. Because of their central role in overseeing facilities' power distribution systems, they often get the first call when problems arise. To address facilities’ need for high-quality, reliable power, many facilities have installed uninterruptible power supplies (UPS). But increasingly, managers are exploring emerging technologies to handle facilities’ onsite power requirements. Distributed Generation Systems With the advent of small-scale electrical-generation systems, one technique that can address facilities’ electrical needs is small-scale distributed-generation systems (DGS). These systems enable managers to seriously evaluate onsite generation as an economically viable and attractive option. Traditionally, in-house power systems have consisted of passive equipment. The utility provides most of the power in these facilities, except in rare occasions when the emergency generator of a UPS might provide some power. In a DGS arrangement, a large percentage of energy is generated in a limited geographic area using small generation units. Similar to utility distribution power grids, these small units are connected to each other in a micro-grid. An analogy for the DGS would be the centralized mainframe computers of the past and a large number of PCs and servers connected via a network. In the case of a power utility, the size of electrical generators ranges from 150 megawatts (MW) to 800 MW per unit. With a DGS, the generation units could be as small as 20 kilowatts (KW) and as large as 100 KW. Bottom-line Benefits The key to the commercial feasibility of these small units is the development of new technologies that have significantly lowered their cost. For instance, the cost of installing one such technology, a microturbine, is roughly $600 per KW, which is very comparable to the unit cost of generation for large-scale units that utilities use. Also known as virtual power plants, DGS offer new possibilities for reliable, low-cost power. Numerous small generation units are connected to create a totally self-sufficient environment. In some cases, the local utility can supplement a facility's electrical power needs. In other words, sometimes power comes partially from the local utility, while at other times, DGS units supply excess power to the utility. New technologies enable customers and utilities to remotely monitor the energy use of major loads, and managers can make decisions on real-time basis as to whether any units must be taken off line. Micro-grids use the Internet for communication and system control. So, unlike traditional systems, they require no dedicated communication system. Micro-grid systems also can be AC or DC. The use of DC systems also can help facilities avoid most power-quality issues present with AC power systems. DGS use a variety of technologies, including microturbines and fuel cells. Microturbines Microturbines offer great potential for many facilities. The technology is very robust and reliable, due to microturbines' inherently simple design. Many units can be connected in parallel to supply power to larger loads. In fact, because of their modularity, the overall reliability of the power system is significantly higher than that of one large traditional generation unit. Based on supercharger turbine technology, these units can use a relatively wide range of primary fuels, including some that otherwise would have been vented or flared. The net efficiency of these units is better than that of traditional utility sources. For instance, typical utility plants have an efficiency of about 38 percent, with roughly 7 percent wasted due to transmission and distribution losses. By comparison, microturbines have an efficiency of about 30 percent. But when used in cogeneration applications that use both the units’ power and thermal energy, the combined efficiency can be 70-90 percent. Another important characteristic of these units is low emission rates. Nitrogen oxide (NOx) emission rates can be less than 9 parts per million, or less than 0.5 pounds per megawatt-hour (MWh). By contrast, the emission level from a typical power plant is 10 times higher. The contrast between a microturbine and a diesel engine is even greater. A diesel engine generates more pollutants in one hour than a microturbine produces in nine days. For this reason, in many metropolitan areas, a diesel generator can only operate as an emergency unit and cannot operate on an ongoing basis. Microturbines require relatively low maintenance, due to their inherent design. The units only have one moving part — namely, a compressor and turbine mounted on a rapidly spinning shaft. For this reason, the availability of these units often exceeds 99.8 percent. Finally, microturbines are compact and create negligible vibration. These characteristics mean that, unlike traditional generation units, they require less space and can be installed and ready for service rather quickly. Fuel Cells During the past few decades, fuel cells have received attention as a viable electrical generation source. As with regular batteries, they generate electricity using hydrogen and oxygen. Unlike regular batteries that contain a fixed amount of charge that is depleted, in a fuel cell, the process is continually regenerated, so the unit can stay on line for long periods of time. Fuel cells have a number of potential benefits, including no moving parts and few emissions, other than water and heat. Typically, the NOx emission of a fuel cell is less than 0.01 gram per kilowatt-hour (kWh), or roughly 600 hundred times less than that of a utility power plant. Also, their low maintenance features make them prime candidates for reliable power. Many utilities have demonstration projects using fuel cells. One barrier to fuel-cell technology is installation cost, which can be $4,000-8,000 per kW. So without a utility subsidy, the technology is not commercially viable. Some industry experts believe that fuel cells might become commercially viable within a decade or so, while others point out they have heard such projections about fuel-cell technology for four decades. Given the continuing trend toward microprocessor-based technology in facilities, the need for reliable, high-quality power seems destined to continue. As these alternative power-generation technologies emerge and advance, the challenge for managers is to specify the technology that best meets the specific needs of their facilities and does so cost-effectively.   Contact FacilitiesNet Editorial Staff »   posted on 3/1/2003   Article Use Policy Related Topics: Comments
ESSENTIALAI-STEM
Clinton-Sanders battle for Hispanic voters intensifies | TheHill The battle for Hispanic voters in the Democratic presidential primary is just getting started. Hillary ClintonHillary Diane Rodham ClintonLewandowski on potential NH Senate run: If I run, 'I'm going to win' Fighter pilot vs. astronaut match-up in Arizona could determine control of Senate Progressive Democrats' turnout plans simply don't add up MORE’s presidential campaign says the strong support it received from Hispanics in Nevada on Saturday will translate to other parts of the country and help her win the Democratic nomination. But Team Sanders isn’t ceding any ground, knowing that it must win more minority voters to beat Clinton. Despite entrance-exit polls in Nevada that indicated Bernie SandersBernie SandersJoe Biden faces an uncertain path Bernie Sanders vows to go to 'war with white nationalism and racism' as president Biden: 'There's an awful lot of really good Republicans out there' MORE won the sought-after voting bloc, Clinton aides claim otherwise. They point to the final results, which show that Clinton won Clark County — a heavily Hispanic community — by 11 points. It›s not possible, they say, that she lost the Hispanic vote but still won the state by a relatively comfortable margin. They also note that Clinton won all the at-large voting sites on the Las Vegas strip. The Hispanic vote is particularly important in Super Tuesday states such as Texas, Colorado and Virginia, where voters will cast their ballots on March 1, as well as in states such as Florida, which vote later in the month. “I think the support from Latinos proved what we have been saying all along,” said one former Clinton aide. “The support from that community is very real.” But Sanders, who pummeled Clinton in the predominantly white state of New Hampshire, is vying hard for Hispanic support. And his aides say Clinton has a problem with the demographic. “What we learned today is that Hillary Clinton’s firewall with Latino voters is a myth,” said Arturo Carmona, the deputy political director for the Sanders campaign, in a statement Saturday. “The Latino community responded strongly to Bernie Sanders’s message of immigration reform and creating an economy that works for all families.» Clinton aide Nick Merrill didn’t hold back in his response to that statement, calling it “complete and utter bullshit” on Twitter. The Sanders campaign has vowed to continue to lure Hispanic voters to its column in states such as Colorado, Arizona, Texas and California. And one Democratic strategist said the fact that the poll numbers are in dispute “says everything we need to know … it was competitive.” Still, Eric Herzik, a professor of political science at the University of Nevada-Reno, said if the Silver State were any indication, Clinton would do well with Hispanic communities across the country. “She won among Latinos,” Herzik said, adding that Clinton was better organized on the ground and her message was “far clearer and much better focused than Sanders,” particularly in the final days, when she went from casino to casino on the Las Vegas Strip and spent time with workers there. And when it came to immigration reform, Clinton was also effective in sending a message of “I can get it done. I will do this,” Herzik said. “She came across as more believable than Sanders.” Herzik pointed to the final town hall, which aired on MSNBC two days before the caucuses, where Clinton’s message appeared to resonate with caucusgoers. He also highlighted a campaign ad that aired in the final week and shows a teary-eyed 10-year-old girl at a campaign event who tells Clinton she’s afraid her parents will be deported. Clinton called the girl “really brave” and tells her “not to worry too much.” “Let me do the worrying. I’ll do all the worrying. Is that a deal?” she says before giving the girl a hug and telling her she promises to do everything she can to help. Democratic strategist Lynda Tran said Clinton has an “extraordinarily strong record on immigration reform, including supporting the effort and standing with so-called Dreamers.” But one lesson from the caucus, she said, “has to be ensuring Hillary Clinton also makes the case to Latino and Hispanic voters when it comes to economic issues and kitchen-table concerns that are critically important to these communities.” Tran said Clinton also will “need to be clear how her vision for tackling climate change and addressing student debt and other parts of her platform are connected to both job creation and improving economic opportunity for everyone — including Latinos.” Asked what their plans were to keep Hispanics in their column, Clinton campaign aides on Monday highlighted their Hispanic-to-Hispanic phone banks where voters can interact with one another. They also pointed to organized events including the one in San Antonio, Texas, “that showed a tremendous amount of excitement” for Clinton and her surrogates, including Democratic Reps. Joaquín Castro (Texas) and Xavier BecerraXavier BecerraCalifornia leads states in lawsuit over Trump public charge rule Overnight Energy: Trump sparks new fight over endangered species protections | States sue over repeal of Obama power plant rules | Interior changes rules for ethics watchdogs California counties file first lawsuit over Trump 'public charge' rule MORE (Calif.). Rep. Luis Gutiérrez (D-Ill.), a Congressional Hispanic Caucus member who backed then-Sen. Barack ObamaBarack Hussein ObamaDick Cheney to attend fundraiser supporting Trump reelection: report Forget conventional wisdom — Bernie Sanders is electable 2020 Democrats fight to claim Obama's mantle on health care MORE (D-Ill.) over Clinton in 2008, is now backing the former secretary of State. He has ripped Sanders’s record on immigration reform, most recently calling it “troubling.” In a column written for Univision, the congressman accused Sanders — who voted against comprehensive immigration reform in 2006 — of breaking with Democrats and standing with “the hard-line anti-immigrant wing of the Republican Party.” In explaining his vote, Sanders has noted that union officials had major concerns with that immigration reform measure. The Clinton campaign dispatched former President Bill ClintonWilliam (Bill) Jefferson ClintonThe magic of majority rule in elections The return of Ken Starr Assault weapons ban picks up steam in Congress MORE to Colorado over the weekend and to Texas on Monday, where he reinforced his wife’s message. “We need to stop talking about sending 11 million immigrants home. We need to stop talking about throwing these Dreamers out of college,” he said. “If you really sent all these people home and built a wall, it would have the dual benefit of collapsing the economy and making everyone in Latin America furious. “That doesn’t seem to me like a really good strategy in an interdependent world where we need to grow the economy and we need more partners and fewer enemies. We need to do this together.” The next Democratic primary is Saturday in South Carolina, where Clinton — who enjoys strong support among African-Americans — is expected to cruise to victory. Ben Kamisar contributed. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Vainu Bappu Manali Kallat Vainu Bappu (10 August 1927 – 19 August 1982) was an Indian astronomer and president of the International Astronomical Union. Bappu helped to establish several astronomical institutions in India, including the Vainu Bappu Observatory which is named after him, and he also contributed to the establishment of the modern Indian Institute of Astrophysics. In 1957, he discovered the Wilson–Bappu effect jointly with American astronomer Olin Chaddock Wilson. On 2 July 1949, when Bappu was taking pictures of the night sky, he spotted a bright moving object which he had rightfully understood to be a comet. When he turned to his professor, Bart Bok, and colleague Gordon Newkirk, they confirmed the discovery. They calculated the orbit of the comet which revealed that the comet would reappear only after 60,000 years. The International Astronomical Union officially named the comet as the Bappu-Bok-Newkirk comet (C/1949N1). Bappu also received the Donohoe Comet Medal of the Astronomical Society of the Pacific. This is the only comet with an Indian name. Early life Vainu Bappu was born on 10 August 1927, in Chennai, as the only child of Manali Kukuzhi Bappu and Kallat Sunanna Bappu. His family originally hails from Thalassery in Kerala. His father was an astronomer at the Nizamiah Observatory in Telangana. He attended the Harvard Graduate School of Astronomy for his PhD after obtaining postgraduate degree from the Madras University. Discoveries Bappu, along with two of his colleagues, discovered the 'Bappu-Bok-Newkirk' comet. He was awarded the Donhoe Comet-Medal by the Astronomical Society of the Pacific in 1949. In a paper published in 1957, American astronomer Olin Chaddock Wilson and Bappu had described what would later be known as the Wilson–Bappu effect. The effect as described by L.V. Kuhi is: 'The width of the Ca II emission in normal, nonvariable, G, K, and M stars is correlated with the visual absolute magnitude in the sense that the brighter the star the wider the emission.' The paper opened up the field of stellar chromospheres for research. Vainu Bappu Observatory On his return to India, Bappu was appointed to head a team of astronomers to build an observatory at Nainital. His efforts of building an indigenous large optical telescope and a research observatory led to the founding of the optical observatory of Kavalur and its large telescope. The Vainu Bappu Observatory is one of the main observatories of the Indian Institute of Astrophysics, also initiated in its modern avatar by Bappu in 1971. Later, a number of discoveries were made from the Vainu Bappu Observatory.
WIKI
uter Etymology 1 For, from , from , ultimately from. See also 🇨🇬 and 🇨🇬. Adjective * 1) "Which?" (of two), whether? * 2) whichever (of two) * 3) either * 4) both Etymology 2 For, from. Compare with 🇨🇬. Related to. Noun * 1) wine or water skin or bottle * 2) bag made of hide (inflated for flotation) Declension * Note: although the nominative and accusative plural was normally the masculine, the rare alternative neuter plural is also attested. Etymology From, from , ,. Noun * 1) udder Etymology ,. Noun * 1) uterus
WIKI
[No. D005383. Fourth Dist., Div. One. Nov. 19, 1987.] BLAS REYES et al., Plaintiffs and Appellants, v. BOARD OF SUPERVISORS OF SAN DIEGO COUNTY et al., Defendants and Respondents. Counsel Peter M. Liss, Anson B. Levitan, Colleen Fahey Feam, Carol L. Bracy and Charles Wolfinger for Plaintiffs and Appellants. Lloyd M. Harmon, Jr., County Counsel, Daniel J. Wallace, Chief Deputy County Counsel, Barbara Baird and Arlene Prater, Deputy County Counsel, for Defendants and Respondents. Opinion WORK, J. —Bias Reyes and the Welfare Rights Organization of San Diego, Inc. (Plaintiffs), brought this class action for declaratory and injunctive relief against the San Diego County Board of Supervisors and Department of Social Services (County) to stop the practice of depriving general relief recipients of benefits for failing to comply with work project rules without distinguishing between willful and nonwillful violators and to recover past benefits lost from such illegal terminations. They appeal that portion of the trial court’s order denying its motion for class certification as to retroactive relief. They contend the class for retroactive benefits is ascertainable and meets all proper community of interest requirements necessary for certification, asserting the trial court improperly relied on the County’s potential administrative burdens at the remedy stage of determining class identity and individual claimant entitlements. For the reasons which follow, we conclude the trial court abused its discretion in denying Plaintiffs’ motion for class certification as to retroactive relief. Accordingly, we reverse its order in part. Factual and Procedural Background Welfare and Institutions Code section 17000, requires every county to provide general relief to all incompetent, poor, indigent and incapacitated individuals who are not supported by relatives, friends or state or private relief. Financed entirely out of County general funds, this program was designed to be the residual financial “safety net” for indigents who cannot obtain relief from any private sources and cannot qualify for aid under any specialized state or private program. (Mooney v. Pickett (1971) 4 Cal.3d 669, 681 [94 Cal.Rptr. 279, 483 P.2d 1231].) Pursuant to this mandate, the County established a general relief pro-, gram divided into two essential parts, providing assistance to those employable and eligible for benefits under section 17000 and those who are incapacitated and unemployable by reason of age, disease, or accident. Those recipients who are employable must participate in work projects as a condition of obtaining relief. Employable recipients work up to 72 hours per month on a county work project at the federal minimum wage to repay any grant. During their off-hours, these employable recipients must seek employment and accept any job paying the minimum wage. They are required to submit job applications to different employers each month and provide proof of such job contact to the County. Consequently, the following conditions must be met by an employable recipient before relief will be continued; (1) attendance and participation in the assigned work project; (2) submission of four written job applications per month; and (3) filing a monthly status report and interview. Failure to comply with any welfare program requirement without good cause results in a recipient being “sanctioned” by a period of ineligibility or denial of relief for three months on the first noncompliance and six months for a second within a twelve-month period. Failure to timely return a job-search verification results in the loss of aid for one month. Relying on Jennings v. Jones, supra, 165 Cal.App.3d at pages 1092-1093, Plaintiffs’ lawsuit essentially contends the sanctioning process of the County’s program fails to distinguish between the competent healthy recipients who willfully fail to comply with the underlying requirements of the program and those whose failure is the result of mere negligence, inadvertence, or mental or physical disability. The class action complaint seeks injunctive and declaratory relief, claiming the County’s practice of terminating general relief benefits without distinguishing between willful and nonwillful violations of its work project rules violates substantive due process. The action further asks the court to require the County to provide advance notice of terminations for alleged work project violations so recipients can request continued benefits pending an administrative hearing consistent with the constitutional guarantee of procedural due process. Petitioners also seek a peremptory writ of mandate ordering the County to provide timely and adequate notice of actions to sanction individuals, to provide full discovery of evidence for and during hearings, to cease enforcement of its sanctioning process, to implement regulations requiring County to sanction only healthy, competent individuals who willfully fail to comply with the program requirements, and to identify and set aside all actions sanctioning class members since April 10, 1983, restoring prospective benefit to currently sanctioned individuals, providing notice of eligibility to apply for retroactive benefits to class members, and providing hearings for such individuals to determine eligibility for benefits. Plaintiffs’ motion for class certification was granted insofar as it sought to certify a class of all individuals who will be sanctioned by the County and deprived of general relief benefits on or after the date of entry of final judgment. However, with regard to retroactive relief to all individuals who have been sanctioned by the County's relief program since April 10, 1983, to the date of entry of the final judgment, certification was denied. The trial court rationalized its denial of retroactive benefits to a class estimated to be comprised of 15,000 individuals, because determination of class identity and entitlement to relief at the remedy stage rendered the class unascertainable and unmanageable. The court explained: “I think that in this instance the class does not fit into the traditional class where it is a mechanical calculation ... to determine the entitlements of the class, but merely requires individual hearings as to the willful nature of the violations and the determination of liability on a case-by-case basis. “That really does not suit class certification as far as retroactive benefits are concerned. It seems to me that those parties who still have rights may pursue them, if they wish, certainly, individually. But this is all we’re doing, if we order the class certification, would be to just renotice people that they had a right to assert their individual actions and have administrative hearings on each one. I don’t think that suits the standard of the class litigation. It certainly becomes unmanageable from the county view and I think the Metcalf vs. Edelman case is on point in this matter, which would prohibit the determination of the class. “Certainly, the county has indicated their willingness to have this order made without prejudice to renewal of a more determinable, manageable class that didn’t require the individual determinations of, really, a mini trial as to each party to determine whether or not they are indeed entitled to the benefits or the rights of which they were alleged to be deprived. . . . ” Governing Law Class actions serve an important role by establishing a judicial process within which claims of many individuals can be resolved simultaneously, eliminating repetitive litigation and providing claimants with a practical method of securing redress for claims which because of their size do not warrant individual litigation. Consequently, courts and legislatures have developed and transformed this former, limited equity device to a contemporary tool designed to meet the needs of modem society. (Richmond v. Dart Industries, Inc. (1981) 29 Cal.3d 462, 469 [174 Cal.Rptr. 515, 629 P.2d 23].) The class action has now become “a ‘peculiarly appropriate’ vehicle for providing effective relief when, as here, a large number of applicants or recipients have been improperly denied governmental benefits on the basis of an invalid regulation, statute or administrative practice. [Citations.]” (Employment Development Dept. v. Superior Court (1981) 30 Cal.3d 256, 265 [178 Cal.Rptr. 612, 636 P.2d 575].) In California, Code of Civil Procedure section 382. authorizes class action suits “when the question is one of a common or general interest, of many persons, or when the parties are numerous, and it is impracticable to bring them all before the court . . . .” (See Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at p. 470; Miller v. Woods (1983) 148 Cal.App.3d 862, 872 [196 Cal.Rptr. 69].) This provision has been construed to require the showing of an ascertainable class and a well-defined community of interest in questions of law and fact among the members of that class. (Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at p.470; Occidental Land, Inc. v. Superior Court (1976) 18 Cal.3d 355, 360 [134 Cal.Rptr. 388, 556 P.2d 750], Daar v. Yellow Cab Co. (1967) 67 Cal.2d 695, 704 [63 Cal.Rptr. 724, 433 P.2d 732]; Stephens v. Montgomery Ward & Co. (1987) 193 Cal.App.3d 411, 417 [238 Cal.Rptr. 602].) However, in light of the general character of Code of Civil Procedure section 382 which fails to define a procedural framework for class certification, the courts have sought guidance from both Civil Code section 1781 regarding consumer class actions and the Federal Rules of Civil Procedure, rule 23, in the absence of state precedent. (Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at pp. 469-470, fn. 7; Green v. Obledo (1981) 29 Cal.3d 126, 145-146 [172 Cal.Rptr. 206, 624 P.2d 256]; Vasquez v. Superior Court (1971) 4 Cal.3d 800, 821 [94 Cal.Rptr. 796, 484 P.2d 964, 53 A.L.R.3d 513]; Schneider v. Vennard (1986) 183 Cal.App.3d 1340, 1345 [228 Cal.Rptr. 800].) Whether a class is ascertainable is determined by examining (1) the class definition, (2) the size of the class, and (3) the means available for identifying class members. (Vasquez v. Superior Court, supra, 4 Cal. 3d at pp. 821-822; Miller v. Woods, supra, 148 Cal.App.3d at p. 873.) As to the community of interest requirement, it consists of three factors: “(1) predominant common questions of law or fact; (2) class representatives with claims or defenses typical of the class; and (3) class representatives who can adequately represent the class. [Citation.]” (Richmond v. Dart Industries, Inc., supra, 29 Cal. 3d at p. 470; Miller v. Woods, supra, 148 Cal.App.3d at p. 874.) The decision whether to certify a class rests within the sound discretion of the trial court (Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at p.470; Schneider v. Vennard, supra, 183 Cal.App.3d at p.1345) and will not be disturbed on appeal if supported by substantial evidence, unless either improper criteria were employed or erroneous legal assumptions were made. (Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at p.470; Schneider v. Vennard, supra, 183 Cal.App.3d at p. 1345; Miller v. Woods, supra, 148 Cal.App.3d at p.872.) Trial courts have been admonished to carefully weigh the respective benefits and burdens and to allow maintenance of the class action only where substantial benefits accrue both to the litigants as well as the courts. (Blue Chip Stamps v. Superior Court (1976) 18 Cal.3d 381, 385 [134 Cal.Rptr. 393, 556 P.2d 755]; Occidental Land, Inc. v. Superior Court, supra, 18 Cal.3d at p.360; City of San Jose v. Superior Court (1974) 12 Cal.3d 447, 460 [115 Cal.Rptr. 797, 525 P.2d 701, 76 A.L.R.3d 1223]; Vasquez v. Superior Court, supra, 4 Cal.3d at p.810; Collins v. Safeway Stores, Inc. (1986) 187 Cal.App.3d 62, 67-68 [231 Cal.Rptr. 683].) The party seeking class certification bears the burden of not only showing that substantial benefits, both to the litigants and to the court, will result from class certification (City of San Jose v. Superior Court, supra, 12 Cal.3d at p.460; Collins v. Safeway Stores, Inc., supra, 187 Cal.App.3d at p.68), but also proving the adequacy of its representation (Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at p.470). At the certification stage, just as the trial court is not to examine the merits of the case, our inquiry on review is strictly limited to whether plaintiffs have carried their burden of establishing the prerequisites of a class action. (Stephens v. Montgomery Ward & Co., supra, 193 Cal.App.3d at p. 418.) “Reviewing courts consistently look to the allegations of the complaint and the declarations of attorneys representing the plaintiff class to resolve this question. [Citations.]” (Richmond v. Dart Industries, Inc., supra, 29 Cal.3d at p. 478.) Plaintiffs’ Contentions and the County’s Response Plaintiffs contend they have met their burden of establishing not only an ascertainable class, but also a well-defined community of interests among their class members. They assert the trial court erroneously relied on the County’s potential administrative burdens at the postjudgment remedy stage of determining class identity and individual claimant entitlement to relief, when it denied class certification for retroactive benefits. They argue the determination of class certification in government benefits cases involves the primary concern of the court’s role in trying the case, not the administrative agency’s duties in providing legally required relief to those who prove they are members of the class. Consequently, because the issues of class member identity and relief entitlement are not determined by the court, they are irrelevant to the class certification decision. Moreover, they contend the County’s remedial concerns here were based upon unsupported assumptions that determinations regarding past benefits would be unduly administratively burdensome. The County responds certification was properly denied because the validity of its actions as to any specific recipient must be individually factually determined and thus it is possible the challenged sanctioning process may have been invalidly applied to only a few members of the broadly defined class. (Dale v. Hahn (2d Cir. 1971) 440 F.2d 633, 640; Burchette v. Dump-son (E.D.N.Y. 1974) 387 F.Supp 812, 820; Mays v. Scranton City Police Dept. (M.D.Pa. 1979) 87 F.R.D. 310, 315.) Consequently, because each recipient’s right to recover depends on the facts peculiar to his/her case, the County asserts the trial court properly exercised its discretion since even if the plaintiffs prevail in their action, each member of the class in order to recover must establish through the administrative process his/her violation was in fact “nonwillful,” general eligibility for relief, the nature of the violation and the existence of any defenses. (See, e.g., Fischer v. Dallas Federal Sav. and Loan Ass’n (N.D.Tex. 1985) 106 F.R.D. 465, 470-471; Rice v. City of Philadelphia (E.D.Pa. 1974) 66 F.R.D. 17, 20.) In short, the County asserts the right to monetary relief depends entirely on factual issues peculiar to each case, emphasizing liability and proof of damages cannot be determined here in an easily calculable, mechanical manner. Accordingly, the County argues there is no sufficiently ascertainable class with a well-defined community of interest in questions of law and fact to permit class certification. It contends the class is unascertainable, not because the definition is unduly complex, but rather because the cost to the County both in time and money to manually cross-compare statistical records of 15,200 sanctions imposed since April 10, 1983, is approximately eight months of staff time and $14,000 in salary. The County also argues manageability is a proper factor for the court to consider in determining class certification, citing the total administrative cost here of processing approximately 7,600 claims (approximately one-half of the 15,200 sanctions imposed during the time involved) would be approximately $257,000 and exhaust six and one-half years of staff time. It claims retroactive relief here would be without substantial benefit to the class members in comparison to the administrative burden imposed. Citing section 17403, the County explains that because general relief must be repaid by a recipient when one has the means to do so, retroactive payments to rehabilitated individuals would result in simply debts due to the County. Moreover, it contends current general relief recipients would suffer from the enormous expenditure of administrative resources in attempting to afford retroactive relief because it would be better for the general public to keep the funds in the public treasury for public use than to consume them in attempting to award retroactive relief where the administrative burden is severe and the potential benefit is small. An Ascertainable Class Mindful in determining whether a class is ascertainable we examine the class definition, the size of the class and the means of identifying class members (Vasquez v. Superior Court, supra, 4 Cal.3d at pp. 821-822; Miller v. Woods, supra, 148 Cal.App.3d at p.873), we conclude Plaintiffs’ proffered class of “all individuals sanctioned from the County’s general relief program since April 10, 1983,” is sufficiently defined to meet the “ascertainable” standard. The County concedes the proposed class as defined is not “unduly complex.” It clearly includes all individuals potentially affected by the challenged administrative sanctioning process. (Compare Employment Development Dept. v. Superior Court, supra, 30 Cal.3d at p.260, where the class was defined as “all other women ‘subjected’ to the provisions of [Unemployment Insurance Code] section 1264”; Miller v. Woods, supra, 148 Cal.App.3d at p. 873, where the class was defined as “ ‘all applicants, recipients and providers of IHSS in California who have been or will be disqualified from receiving or providing protective supervision based solely on MPP § 30-463.233c.’ ”) Moreover, the County does not challenge the size of the class, conceding it exceeds 15,000 individuals. Rather, the County asserts the class is not easily ascertainable because it would take approximately eight months of staff time at a cost of $14,000 to manually cross-compare the statistical records of the approximately 60,000 general relief cases closed since April 10, 1983, to identify those individuals whose cases were closed as a result of a sanction. (See, e.g., Lawson v. Brown (D.Va. 1972) 349 F.Supp. 203, 209.) Preliminarily, it is firmly established a plaintiff is not required at this stage of the proceedings to establish the existence and identity of class members. (Stephens v. Montgomery Ward & Co., supra, 193 Cal.App.3d at p.419; Collins v. Safeway Stores, Inc., supra, 187 Cal.App.3d at p.71; Lazar v. Hertz Corp. (1983) 143 Cal.App.3d 128, 138 [191 Cal.Rptr. 849].) In fact, prejudgment notice is not required in welfare class actions where declaratory and injunctive relief are the primary objectives. “California decisions follow the analysis of the federal courts; prejudgment notice ‘serves no apparent purposes’ in welfare class actions where there are no factual disputes and the class is adequately represented by counsel.” (Miller v. Woods, supra, 148 Cal.App.3d at p.875; see also Gonzales v. Jones (1981) 116 Cal.App.3d 978, 985-987 [171 Cal.Rptr. 567].) However, within the context of manageability, the issue is whether there exist sufficient means for identifying class members at the remedial stage. (S eeDaar v. Yellow Cab Co., supra, 67 Cal.2d at p. 706.) Here, the means are available in that the County does have the records from which to identify those past general relief recipients who were sanctioned out of the welfare program. However, the County essentially argues the class is unmanageable because of the cited administrative cost in identification at the remedial stage. (See, e.g., Simer v. Rios (7th Cir. 1981) 661 F.2d 655, 671.) Manageability within this context is intertwined not only with the question of ascertainability, but also the underlying admonishment the Supreme Court has given the trial courts to carefully weigh the respective benefits and burdens of a class action and to permit its maintenance only where substantial benefits will be accrued by both litigants and the courts alike. (Blue Chip Stamps v. Superior Court, supra, 18 Cal.3d at p.385; City of San Jose v. Superior Court, supra, 12 Cal.3d at p. 459.) Consequently, where the administrative cost in identification and processing of past general relief recipients’ claims is so substantial to render the likely appreciable benefits to the class de minimis in comparison, the class action should not be certified. (See, e.g., Blue Chip Stamps v. Superior Court, supra, 18 Cal.3d at pp. 385-386; Bacom v. County of Merced (1977) 66 Cal.App.3d 45, 48-52 [136 Cal.Rptr. 14]; see also Lawson v. Brown, supra, 349 F.Supp at p.209, and compare Hypolite v. Carleson (1975) 52 Cal.App.3d 566, 578-579 [125 Cal.Rptr. 221], where the trial court and the court of appeal acknowledged that identification from government records was readily available, presenting a “relatively uncomplicated problem” involving “neither unreasonable time nor expense.”) However, a court should not decline to certify a class simply because it is afraid that insurmountable problems may later appear at the remedy stage. “But where the court finds, on the basis of substantial evidence . . . that there are serious problems now appearing, it should not certify the class merely on the assurance of counsel that some solution will be found.” (Windham v. American Brands, Inc. (4th Cir. 1977) 565 F.2d 59, 70.) Consequently, unless the unmanageability of the class action is essentially without dispute or clearly established, it should not foreclose class certification. Here, the County has not shown the administrative cost of retroactive relief outweighs appreciable benefits to the class. Preliminarily, we are unpersuaded the County’s selected method of identification and notice is the most practicable and cost-efficient; for, in comparison, how effective and costly would simple notice to all general relief recipients during that period of time be? Moreover, the size of the class in regards to the starting date for payment of retroactive benefits to class members is not established and binding until the trial court grants final relief. Indeed, in order for the County to show the administrative costs are disproportionate to the potential benefits to the class if the latter should prevail, the County must determine the potential class benefits and compare them to the administrative cost. Disproportionality can only be established by comparing administrative cost figures with the total potential retroactive benefits to the class; for, all such class actions inevitably accrue administrative costs. Consequently, if we take as unchallenged the County’s claim of $257,000 in administrative costs, then that figure is not so overwhelming in light of the Plaintiffs’ estimate the class has been illegally denied $3,4 million in retroactive benefits. Granted, both parties challenge each other’s figures; however, it is precisely these disputes which illustrate the County has failed to establish disproportionality and the propriety of leaving these issues to the discretion of the trial court at the remedial stage. There, the County may raise a specific objection to any remedial mechanism the court, in the exercise of its discretion, fashions to cope with the identification and notice problems arising from the government records and the individual determinations of liability and damages. (Employment Development Dept. v. Superior Court, supra, 30 Cal. 3d at p. 266.) In fact, the Supreme Court explained in Green v. Obledo, supra, 29 Cal.3d at page 142: “[A]n action by an entire class to recover past welfare benefits withheld pursuant to an invalid regulation or statute might impose, in some circumstances, a disproportionate clerical and financial burden on the governmental entity if such benefits were ordered paid for the entire period of limitations. This could occur, for example, if the regulation or statute had been in force for a number of years at the time of the judgment, if the class were particularly large, or if the potential individual recovery of each class member wére small. Accordingly, on such a showing the trial court, acting as a court of equity, has discretion to fix a more realistic starting date for the payment of retroactive benefits to class members.” In summary, the trial court has considerable flexibility in the management of a class action at the remedial stage. Under these circumstances, the County’s assertion the certification order here if the class should prevail, will require them to incur undue administrative costs both in identifying and notifying class members should be presented to the trial court postjudgment at the remedial stage. (Employment Development Dept. v. Superior Court, supra, 30 Cal.3d at p. 266.) The Class Shares a Well-defined Community of Interest in Questions of Law and Fact In determining whether the class satisfies the community of interest requirement, we look to whether common questions of law or fact dominate, the claims of the class representative are typical of the class and the class representative can adequately represent the class in its entirety. (Richmond v. Dart Industries, Inc., supra, 29, Cal.3d at p.470.) We conclude the class for retroactive benefits meets all proper criteria, as the trial court will decide the legality of the County’s sanctioning process and the County’s existing administrative agency will decide the remaining issues of individual recipient qualification, entitlement and amount of damages. It is undisputed Plaintiffs’ claims are typical of those of the class and the Plaintiffs constitute an adequate representative with qualified and experienced counsel able to conduct the proposed litigation. Accordingly, the sole issue presented here is whether there are predominate questions of law or fact common to the class as a whole. This second statutory requirement of a “community of interest” revolves on “whether the common questions are sufficiently pervasive to permit adjudication in a class action rather than in a multiplicity of suits.” (Vasquez v. Superior Court, supra, 4 Cal.3d at p.810; Miller v. Woods, supra, 148 Cal.App.3d at pp. 873-874.) This common question requirement is patently satisfied here by the class claim the County has violated state law by failing to distinguish between willful violations of work rules by competent healthy adults who may be sanctioned and nonwillful violations caused by negligence, inadvertence or mental or physical disability which may not serve as a basis for sanctioning. In other words, the common goal of the entire class is to invalidate this sanctioning process and require the implementation of regulations requiring the County to sanction only healthy, competent individuals who willfully fail to comply with program requirements. The County challenges this assessment, contending classwide liability cannot be established by the declaratory/injunctive relief phase of this case, because each class member’s right to recover depends on facts peculiar to his/her case. The County explains that in order for a class member to recover, that individual must establish at the remedy phase not only damages, but liability—that he/she was a victim of unlawful conduct, to wit sanctioned for nonwillful conduct. Finally, the County stresses that as to each class member, the separate factual issues of eligibility, nature and willfulness of the violation, and the existence of any defenses must be determined. Granted, there lacks a sufficient community of interest within a class where each member would be required to individually litigate numerous and substantial questions to determine his/her right to recover following the class judgment determining issues common before the class. (City of San Jose v. Superior Court, supra, 12 Cal.3d pp. 459-460; Hamwi v. Citinational-Buckeye Inv. Co. (1977) 72 Cal.App.3d 462,471 [140 Cal.Rptr. 215].) However, the necessity for class members to individually establish eligibility and damages does not mean individual fact questions predominate. (Employment Development Dept. v. Superior Court, supra, 30 Cal.3d at p. 266; Hypolite v. Carleson, supra, 52 Cal.App.3d at p. 580; see Clothesrigger, Inc. v. GTE Corp. (1987) 191 Cal.App.3d 605, 617 [236 Cal.Rptr. 605]; Lazar v. Hertz Corp., supra, 143 Cal.App.3d at p. 140.) In fact, under these circumstances, it is firmly established that “a class action is not inappropriate simply because each member of the class may at some point be required to make an individual showing as to his or her eligibility for recovery or as to the amount of his or her damages. [Citations.] . . . [A] court can devise remedial procedures which channel the individual determinations that need to be made through existing administrative forums. [Citations.]” (Employment Development Dept. v. Superior Court, supra, 30 Cal.3d at p. 266.) Moreover, this community of interest requirement is especially satisfied here, because the trial court would have to redetermine the legality of the County’s sanctioning process in each case individually pursued. For, “[t]he courts will not apply . . . [the principle of res judicata] to foreclose the relitigation of an issue of law covering a public agency’s ongoing obligation to administer a statute enacted for the public benefit and affecting members of the public not before the court. [Citations.]” (California Optometric Ass'n v. Lackner (1976) 60 Cal.App.3d 500, 505 [131 Cal.Rptr. 744].) Finally, we find unpersuasive the County’s assertion that the “common issue” cannot be decided without examining the facts of each individual case. In other words, the County contends that even if all class members share a common interest in whether it had a duty to distinguish between willful and nonwillful violations of the work program, proof of whether it did in fact improperly administer their work project program in its sanctioning process depends entirely on the facts peculiar to each individual case. Rather, whether the County applied an unlawful sanctioning process can be proved by reviewing the County’s regulations, the testimony of the County’s welfare employees as to the standard practices followed in making sanctioning decisions, as well as a sampling of representative cases probative of the County’s practice of sanctioning for nonwillful noncompliance with work program requirements. The General Appropriateness of Class Certification As already noted, it is especially appropriate to proceed with a class action to provide effective relief when, as here, a large number of welfare recipients have been allegedly, improperly denied governmental benefits on the basis of an invalid administrative practice. (Employment Development Dept. v. Superior Court, supra, 30 Cal.3d at p.265, and cases there cited.) The true appropriateness of proceeding with a class action here rests solely not in the ascertainability of a class of past welfare recipients under section 17000 et seq. (Adkins v. Leach, (1971) 17 Cal.App.3d 771, 776-777 [95 Cal.Rptr. 61]), but rather the underlying reality that those indigent and disabled who qualify for general relief are utterly desperate and impoverished, dependent as a last resort upon the County grant for the rudimentary necessities of life. (Goldberg v. Kelly (1970) 397 U.S. 254, 264 [25 L.Ed.2d 287, 297, 90 S.Ct. 1011]; Mooney v. Pickett, supra, 4 Cal.3d at p. 681; Jennings v. Jones, supra, 165 Cal.App.3d at p. 1092.) Plaintiffs characterize the general relief program as the “last government safety net” before the streets. Considering the desperate financial condition one must be in in order to qualify for general relief, this assessment is probably correct. If the gravamen of this litigation is legally correct and many past general relief recipients were illegally denied benefits, such victims as a practical matter without class certification will individually neither seek nor obtain redress because they are too poor, their claims too small and the legal issues too arcane to obtain private counsel. The remaining public policy considerations supporting class actions, such as judicial economy, finality of judgment binding all parties to the decree, and enforceability of class judgments through contempt or supplemental decree, all support the appropriateness of a class action here. Indeed, we must not forget “[t]he class action is a product of the court of equity. ‘It rests on considerations of necessity and convenience, adopted to prevent a failure of justice.’ ” (Lowry v. Obledo, supra, 111 Cal.App.3d at p. 26, quoting City of San Jose v. Superior Court, supra, 12 Cal.3d at p. 458.) The trial court certification of the class for purposes of prospective relief does not promote justice in that it deprives a potentially substantial class the barest of necessities, a means by which to enforce a vindicated right, and notice one has been invalidly denied general welfare benefits. Accordingly, let us not speculate on the size of the resulting eligible class or how many valid claims will be made, but rather let this matter proceed as a class action as to both prospective and retroactive relief. The nature of the complaint and those who comprise the class compel us to leave to the discretion of the trial court at the remedial phase the fashioning of a cost-effective and practical administrative procedure designed to identify and notify the class members and to resolve individual issues of eligibility and damages, because the County has failed to establish the cost in administering retroactive relief would be disproportionate to the benefits received by class members individually and the class as a whole warranting the denial of class certification as to retroactive relief. Disposition That portion of the order denying class certification as to all individuals who have been sanctioned from the County’s general relief program from April 10, 1983, to the date of entry of final judgment is reversed. In all other respects, the order is affirmed. Wiener, Acting P. J., concurred. BENKE, J.—I concur. The court below concluded Metcalf v. Edelman (N.D.I11. 1974) 64 F.R.D. 407, precludes the class action herein. I do not believe it does so. Moreover, I would read Metcalf not as a confusing expression of law but as being consistent with that federal authority which defines when class certification is proper. Existing California authority provides a class action is not inappropriate merely because each class member must, at some point, make an individual showing as to eligibility for recovery or the amount of damages involved. (Employment Development Dept. v. Superior Court (1981) 30 Cal.3d 256, 266 [178 Cal.Rptr. 612, 636 P.2d 575].) Moreover, where there is but one essential issue to be pursued and each claimant’s entitlement to benefits depends upon the existence of this single issue rather than a separate set of issues or facts applicable to him, the class action may go forward. (Hypolite v. Carleson (1975) 52 Cal.App.3d 566, 579-580 [125 Cal.Rptr. 221] [class defined as those denied benefits because their parents maintained a home together elsewhere]; also see Clothesrigger, Inc. v. GTE Corp. (1987) 191 Cal.App.3d 605, 617 [236 Cal.Rptr. 605] [class composed of those who were charged for one or more unanswered long distance calls; damage amount may vary; class action permitted]; Lazar v. Hertz Corp. (1983) 143 Cal.App.3d 128, 140 [191 Cal.Rptr. 849] [misrepresentation is inferred as to entire class, hence individual “minitrials” not necessary; class action permitted].) However, where, after the common questions have been determined, each class claimant would still have to litigate a number of substantial questions peculiar to himself in order to recover, there does not exist a necessary community of interest and there is no assurance the class representative would indeed be representative. A class action is therefore improper. (See D'Amico v. Sitmar Cruises, Inc. (1980) 109 Cal.App.3d 323, 326 [167 Cal.Rptr. 254].) The preceding rules are easy to articulate. However, the difficulty and danger in examining the number of issues at the class certification stage lies in determining at what point the number of substantial issues passes from the permissible number into the impermissible and whether the multiple issues problem will present itself at the liability or remedial stage of the proceedings. While it is certainly possible, and the court is duty bound to detect an unascertainable class at the certification stage, incorrect focusing at that time on the number of substantial issues potentially involved or when they will arise may in doubtful cases serve to prematurely foreclose a legitimate class action which might more properly be limited or eliminated by decertification in later proceedings on the merits. Unfortunately, existing California authority does not clearly set forth how the lower court is to go about deciding whether existing issues are appropriately considered at the litigation’s merits stage or its remedial stage. As has been observed, the various rules and classifications contained in our case law respecting class actions are not easily reconcilable. (4 Wit-kin, Cal. Procedure (3d ed. 1985) Pleading, § 202, p. 238.) One potential danger is that multiple issues which may arise and which can properly be absorbed into administrative proceedings and forums at the remedial stage, will be mistaken for an impermissible number of issues for purposes of the litigation on the merits. I believe this is what occurred below. Whether the multiple issues will arise at the liability or remedial stages depends in large part upon the theory of liability to be advanced by the proposed class. For purposes of the case herein, it is instructive that there is federal authority where, despite potential differences amongst members’ claims, certification has been ordered because the legal theory of liability was “as broad as the class claimed.” (See Donaldson v. Pillsbury Co. (8th Cir. 1977) 554 F.2d 825, 832, fn. 6; Gibson v. Local 40, Supercargoes & Checkers, Etc. (9th Cir. 1976) 543 F.2d 1259, 1264-1265; Tonya K. v. Chicago Bd. of Educ. (N.D.Ill. 1982) 551 F.Supp. 1107, 1111.) Metcalf v. Edelman, supra, 64 F.R.D. 407, 409, upon which the trial court here relied, is consistent with these federal cases. Indeed, it appears to me that certification was denied in Metcalf not simply because of the number of issues involved, but because plaintiff’s counsel were unable to offer the court an objective definition of the class which was consistent with and as broad as their theory of liability, i.e., denial of a livelihood compatible with health and well-being. (Ibid.) In this case, the plaintiff’s theory of liability is that the county illegally sanctioned individuals without first drawing a distinction between those acting willfully and those acting nonwillfully. The proposed class—everyone “sanctioned”—is objectively discernible and coextensive with the theory of liability. Although the county’s ultimate liability to each class member may well depend upon individual factual circumstances, the county’s existing administrative forums do provide a suitable means of protecting individual interests without sacrificing the efficacy of a class proceeding. Thus, contrary to the court’s ruling below, the holding in Metcalf is not an impediment to certification of the proposed class. A petition for a rehearing was denied December 4, 1987, and appellants’ petition for review by the Supreme Court was denied March 3, 1988. All statutory references are to the Welfare and Institutions Code unless otherwise specified. It is settled that section 17000 imposes a mandatory duty upon the County to support its indigent and disabled. (Mooney v. Pickett, supra, 4 Cal.3d at p. 676; Nelson v. Board of Supervisors (1987) 190 Cal.App.3d 25, 29 [235 Cal.Rptr. 305]; Jennings v. Jones (1985) 165 Cal.App.3d 1083, 1092 [212. Cal.Rptr. 134]; City and County of San Francisco v. Superior Court (1976) 57 Cal.App.3d 44, 47 [128 Cal.Rptr. 712].) The underlying legislative purpose of this duty “ ‘is to provide for protection, care, and assistance to the people of the state in need thereof, and to promote the welfare and happiness of all of the people of the state by providing appropriate aid and services to all of its needy and distressed.’ ” (Jennings v. Jones, supra, 165 Cal.App.3d at p. 1091, quoting section 10000.) Such work as a condition of relief is authorized by section 17200 and is designed to assist in the recipient’s rehabilitation and the preservation of his or her self-respect. This sanctioning process parallels those found in state and federal work incentive programs. (42 U.S.C. § 602(a)(19)(F); § 11308 [AFDC work incentive program, providing a sanction of three months for the first offense and six months for the second offense where a registrant fails without good cause to comply].) The County asserts in passing that class certification here for purposes of prospective relief was unnecessary, because the complaint sought injunctive and declaratory relief where a final judgment will, as a practical matter, produce the same result as formal classwide certification (LaMadrid v. Hegstrom (D.Ore. 1984) 599 F.Supp. 1450, 1452) and there exists no reason to doubt it would accord to all members of the proposed class the benefits of any favorable judgment obtained (Kow v. New York City Housing Authority (S.D.N.Y. 1981) 92 F.R.D. 73, 74). However, acknowledging it was nonetheless within the trial court’s discretion to grant class certification as to prospective relief (Montgomery v. Rumsfeld (9th Cir. 1978) 572 F.2d 250, 255), the County has not appealed. Accordingly, we do not address the merits of this potential contention on this appeal. “It is well settled that class actions are an appropriate procedure in government benefit cases where statutes and policies are likely to have an impact upon a broad class of recipients. Recognized advantages of government benefit class actions include mootness avoidance, the tolling of the statute of limitations, the enhancement of the effectiveness of a final judgment, and the adequacy of satisfaction of the exhaustion of administrative remedies requirement by the named plaintiff on behalf of all class members. (Fns. omitted.)” (4 Newberg on Class Actions (2d ed. 1985) § 23.07, p. 204.) Moreover, class actions for injunctive or declaratory relief serve the additional objectives particularly important in government benefits litigation, including institutional changes, “facilitating enforcement of a favorable judgment, and protecting the interests of affected class members from the burden of bringing individual actions to establish the applicability of a decision for their benefit. (Fns. omitted.)” (Id. at § 23.11, p. 210.) The County’s program manager, Income Maintenance Bureau, Department of Social Services, stated in her declaration: “To generate a list of plaintiff class members by manually cross-matching existing records would require the following tasks: []J] a) Examine the monthly printouts showing ‘negative actions’ for all Income Maintenance programs (we do not have a separate printout for General Relief) to identify only those cases which are General Relief cases and which were closed for the reason that a sanction was imposed. This would mean looking at some 2,000 pages of printouts covering the relevant time period, and creating the list, expected to include over 15,000 cases. [$] b) To obtain the addresses corresponding to the sanctioned cases, it would be necessary to call each case up on the computer terminal and then to record the address shown on the master list. []]] c) Finally, to generate mailing labels, it would be necessary to type the entire list (consisting of over 15,000 cases) into our word processing system.” The validity of this contention is doubtful. First, section 17403 provides the County with a claim against one for whom the County supported with public funds only if the former recipient has later acquired property in excess of personal and familial support needs. (County of San Diego v. Muniz (1978) 22 Cal.3d 29, 37 [148 Cal.Rptr. 584, 583 P.2d 109].) Second, because general relief grants to employable recipients are conditioned upon participation in County work projects at the minimum wage, we doubt whether section 17403 applies to such conditional grants. Moreover, because the invalid withholding of general assistance funds constitutes a state debt effective as of the date of denial (.Lowry v. Obledo (1980) 111 Cal.App.3d 14, 24 [169 Cal.Rptr. 732]; Mooney v. Pickett (1972) 26 Cal.App.3d 431, 436 [102 Cal.Rptr. 708]), we query whether each formerly eligible recipient determined to be entitled to retroactive relief here is so entitled without condition, because at the time of sanction the recipient otherwise qualified for relief. Finally, the fatal flaw to this comment is the County has not proffered any statistical evidence as to how many former recipients meet the qualifications of section 17403, are no longer in need of, or interested in obtaining further assistance. In a similar vein, the County argues that class certification was properly denied because the challenged process was constitutionally applied as to all those sanctioned for willful conduct. Although we grant the likelihood that many within the presently defined class may have been properly sanctioned for willful conduct, we do not believe such a likelihood precludes class certification for purposes of retroactive relief. Rather, the redefining and winnowing down of the class at the remedial stage where notice to the general class requires sanctioning for nonwillful conduct in order to be eligible for retroactive benefits resolves any perceived inadequacy in the definition of the proposed class and any allegation of lack of commonality of interest as to law and fact. As the Plaintiffs aptly point out, it is precisely the County’s sanctioning process which precludes the early determination of whether a past relief recipient was sanctioned-for willful or nonwillful conduct because it never evaluated a recipient’s conduct in those terms. Indeed, all terminated past recipients had the right to have legally proper standards apply. The trial court relied on Metcalf v. Edelman (N.D.I11. 1974) 64 F.R.D. 407, 409. There, welfare recipients sought declaratory and injunctive relief against state welfare officials, alleging the officials had improperly failed to provide them through a shelter system a livelihood (an ability to obtain housing) compatible with health and well-being. The trial court denied the plaintiff’s motion for class certification for lack of an ascertainable class and common questions pf law or fact, explaining separate adjudications would be necessary to determine whether each potential class member was being deprived of a livelihood compatible with health and well-being and was thus a member of the class. The dearth of facts within Metcalf renders it impossible for us to thoroughly comprehend the district court’s decision, even with the aid of the explanation in Metcalf v. Trainor (N.D.I11. 1979) 472 F.Supp. 576, 582-583. However, the class as presently defined by Plaintiffs here is ascertainable and may be characterized as a class commonly challenging the County’s failure to employ a standard which distinguishes between willful and nonwillful violations in every class member’s case. In other words, unlike Metcalf where the only apparent common issue of law is whether a particular class member'was denied a livelihood consistent with health and well-being based upon the-specific facts of that class member’s case, here objectively all class members who were sanctioned without regard whether their conduct was willful have a common interest in invalidating the challenged regulation. “State general assistance funds withheld in accordance with an invalid regulation constitute a debt of the state effective as of the date of application.” (Lowry v. Obledo, supra, 111 Cal.App.3d at p. 24; Mooney v. Pickett, supra, 26 Cal.App.3d, at p.436.)
CASELAW
-- SEC Push May Yield New Disclosures of Company Cyber Attacks China-based hackers rifled the computers of DuPont Co. (DD) at least twice in 2009 and 2010, hunting the technological secrets that made the company one of the world’s most successful chemical makers. It’s not something investors would have learned from DuPont’s regulatory filings , or from those of other companies victimized by hackers. The 10-K’s DuPont submitted to the U.S. Securities and Exchange Commission over the period don’t identify hacking as even a significant risk, much less reveal what two U.S. intelligence officials later said was a successful case of industrial espionage. Over the next three months, as publicly traded companies file 10-K’s, investors may see new admissions of corporate networks being hacked after the SEC said companies can’t continue to hold back the details of those incidents. As cyberspies from China, Russia and other countries ransack the computer networks of one major U.S. and European firm after the next, the SEC in October offered its new interpretation of disclosure requirements as applied to cybercrime. The amount of information that’s forthcoming will depend on whether company lawyers determine the incidents had, or will have, a material effect on the enterprise. Daniel Turner, a spokesman for Wilmington, Delaware-based DuPont, said, regarding the previously-reported hack, “We let our disclosures speak for themselves.” Serious Breaches Mandiant Corp., an Alexandria, Virginia-based security firm that specializes in cyber-based industrial espionage, has responded to incidents at 22 Fortune 100 companies, said Richard Bejtlich, the firm’s chief security officer. Mandiant estimates that many more than 20 percent of Fortune 500 companies experienced serious breaches recently or are dealing with current ones, Bejtlich said. When Google Inc. (GOOG) announced in 2010 that China-based hackers had raided its networks, it was a rare example of a U.S. company publicly revealing a cyberburglary aimed at its intellectual property -- in this case, its source code. Google, the world’s largest search-engine firm, said at the time that at least 34 other major companies were victims of the same attack. Only two -- Intel Corp . and Adobe Systems Inc. (ADBE) -- stepped forward, and they provided few specifics. The networks of more than 2,000 companies, research universities, Internet service providers and government agencies were hit over the past decade by China-based cyber spies, according to Joel Brenner, U.S. counterintelligence chief until 2009. A November report by 14 U.S. intelligence agencies said Russia and other countries also are involved in such activities. RIM, Boston Scientific The companies, including firms such as Research In Motion Ltd. (RIM) and Boston Scientific Corp. (BSX) , range from some of the largest corporations to niche innovators in sectors like aerospace, semiconductors, pharmaceuticals and biotechnology, according to intelligence data obtained by Bloomberg News. “It doesn’t square that billions of dollars in intellectual property is being lost and investors don’t care,” said Jacob Olcott, a former staff expert on cybersecurity for the Senate Commerce Committee. In May, the panel asked SEC Chairman Mary Schapiro to clarify how cyber intrusions should be reported under the so-called material fact rule. “We’re afraid investors don’t know what they don’t know,” he said. ‘Risk Factors’ The guidance, which also says companies can’t use vague, general descriptions of the risks associated with possible future cyber break-ins when describing “risk factors,” raised fears that more detail could create a road map for hackers, said Alexander Tabb, a partner at TABB Group, which advises corporate clients on risk assessment . “I have to agree with some of the critics who say the guidance is much more useful for the individuals looking to attack a company than it is for investors,” Tabb said. The victims of even serious attacks, meanwhile, are largely silent, often reporting only breaches that fit narrow legal requirements, such as the theft of credit card numbers or customer information. Many of the headline-grabbing hacks of 2011, including Sony Corp., Citicorp, and Epsilon Data Management LLC, involved such data. “I have not heard any company in any meeting commenting on this subject or being asked about this subject,” said Fadel Gheit, an oil and gas industry analyst and managing director at Oppenheimer & Co. Oil Industry Yet the oil and gas industry has been a frequent target of successful cyber-raids -- many originating from China , which is on a hunt for global oil reserves. Beginning in 2009, the networks of at least six major U.S. and European energy companies were breached by China-based hackers. The victims included Exxon Mobil Corp., Royal Dutch Shell Plc, ConocoPhillips and BP Plc. The hackers stole exploration data and computerized topographical maps, according to several assessments, including one by McAfee Inc., a security division of Intel Corp., which didn’t identify the victims. The attacks provided the cyber- thieves with valuable, confidential assessments of the quality and accessibility of oil reserves, according to Ed Skoudis, senior security consultant with InGuardians Inc., a Washington- based security firm that investigated two of the breaches. He declined to identify his clients or the origin of the hackers. Company Filings The oil companies ’ financial filings from the period didn’t assess possible losses or mention the attacks, which became public through a report by Bloomberg News. John Roper , a spokesman for ConocoPhillips, and Alan Jeffers , a spokesman for Exxon Mobil, said their companies don’t comment on security matters. Toby Odone, a London-based BP spokesman, and Kayla Macke, a Shell spokeswoman, declined to comment. Whatever the potential effect of those attacks, it would be less than a scenario outlined in December at the World Petroleum Conference in Doha, Qatar. WPC attendees were warned that hackers, who are launching more carefully planned attacks against the industry, could gain control of computerized release valves that control oil pipelines, resulting in loss of life, uncontainable fires and costly court battles, according to a report of the briefing by the Soufan Group, a New York-based security firm. Investors scouring the financial filings of major oil companies would have no idea they faced such a risk. “That is the nightmare scenario,” Gheit said. “It just has gone over our heads” as investors. Raids on Companies In the past five years, cyberspies have raided pharmaceutical companies, cosmetics makers, chip fabricators and mining companies. They have stolen blueprints, manufacturing technology and the chemical formulas of market-leading products, according to two intelligence officials, who spoke on the condition their names not be used because of the sensitivity of the subject. Often, the officials said, the significance of the hacks are difficult for the companies themselves to evaluate, Tabb said. The costs may depend on factors such as who took the data and whether they have the ability to use it, or transfer it, to replicate competitive products. Those unknowns may lead compliance attorneys to advise against making incidents public regardless of the new guidance, said Tabb, especially given concerns over reputational loss or a backlash by shareholders angry that the company failed to secure its secrets. ‘Too Early’ “You will see an increased mention of cybersecurity risk- factor disclosure as a result of the SEC guidance,” said Amy L. Goodman, co-chairman of the securities regulation practice group at Gibson, Dunn & Crutcher LLP. “In terms of disclosure of actual cyberattacks, I think it’s too early to tell.” An indication of the conservative inclination in reporting cybersecurity matters occurred in March 2011, following an attack against RSA Security Inc., the network security division of EMC Corp. In that incident, China-based hackers infiltrated RSA’s computer network and stole critical technology related to SecurID, an authentication token used by banks, defense contractors and government agencies to secure their networks. It was a devastating attack by several measures, including the loss of valuable proprietary technology and damage to the reputation of a company that’s paid for its expertise in protecting its clients from hackers. Material Impact In an 8-K filed on March 17, 2011, EMC told investors that the event wouldn’t have a material impact on the company or its financial results. Kevin Kempskie, a spokesman for RSA, declined to comment on the filing. Olcott said EMC based the decision on the security division’s contribution to total company revenue. Critics, including the lawmakers who sent the letter to Schapiro in May, said narrow disclosure calculations by companies skirt several SEC requirements, including the necessity to disclose when trade secrets are compromised. “Companies will think of every single reason not to report these incidents, which is why the investor side of things really needs to take control of these issues,” said Olcott, the former Senate aide. Investors haven’t done more to press for details and the impact of attacks because “they now look at an investing cycle as maybe a quarter or at most a year,” said Eden Chen, portfolio manager at Los Angeles-based Lightmark Capital. That’s too short a time for stolen technology to make a significant difference in many companies’ fortunes, he said. “If you are looking at companies for 10 years down the line you would definitely ask those questions,” he said. To contact the reporter on this story: Michael Riley in Washington at michaelriley@bloomberg.net To contact the editor responsible for this story: Michael Hytha at mhytha@bloomberg.net .
NEWS-MULTISOURCE
Facebook’s GraphQL gets its own open-source foundation – TechCrunch GraphQL, the Facebook -incubated data query language, is moving into its own open-source foundation. Like so many other similar open-source foundations, the aptly named GraphQL Foundation will be hosted by the Linux Foundation. Facebook announced GraphQL back in 2012 and open sourced it in 2015. Today, it’s being used by companies that range from Airbnb to Audi, GitHub, Netflix, Shopify, Twitter and The New York Times . At Facebook itself, the GraphQL API powers billions of API calls every day. At its core, GraphQL is basically a language for querying databases from client-side applications and a set of specifications for how the API on the backend should present this data to the client. It presents an alternative to REST-based APIs and promises to offer developers more flexibility and the ability to write faster and more secure applications. Virtually every major programming language now supports it through a variety of libraries. “GraphQL has redefined how developers work with APIs and client-server interactions. We look forward to working with the GraphQL community to become an independent foundation, draft their governance and continue to foster the growth and adoption of GraphQL,” said Chris Aniszczyk, vice president of Developer Relations at the Linux Foundation. As Aniszczyk noted, the new foundation will have an open governance model, similar to that of other Linux Foundation projects. The exact details are still a work in progress, though. The list of founding members is also still in flux, but for now, it includes Airbnb, Apollo, Coursera, Elementl, Facebook, GitHub, Hasura, Prisma, Shopify and Twitter. “We are thrilled to welcome the GraphQL Foundation into the Linux Foundation,” said Jim Zemlin, the executive director of the Linux Foundation. “This advancement is important because it allows for long-term support and accelerated growth of this essential and groundbreaking technology that is changing the approach to API design for cloud-connected applications in any language.” For now, the founding members expect that the GraphQL specification, GraphQL.js reference implementation, DataLoader library and GraphiQL developer tool will become the core technical projects of the foundation, but that, too, could still change. At this point, the Linux Foundation is essentially a foundation for foundations. It provides support for dozens of projects now, with Linux itself being just one of those. Those other foundations include the likes of the Cloud Native Computing Foundation (the home of Kubernetes), the Cloud Foundry Foundation, Automotive Grade Linux, the JS Foundation (which is about to merge with the Node.js Foundation) and more. As more large companies release open-source projects, those projects that become popular often get to the point where having a single company govern the project’s life cycle is neither feasible nor in the best interest of the community. Spinnaker, the continuous delivery platform backed by Netflix and Google, recently reached this point, for example. Surely, GraphQL is also now at this point, where it’s stable and has wide adoption but could benefit from being separated from the mothership and get its own vendor-neutral foundation.
NEWS-MULTISOURCE
Men and Women (1914 film) Men and Women is an extant short 1914 silent film produced by the Biograph Company and released by General Film Company. It is based on the 1890 play of the same name by David Belasco and Henry Churchill de Mille. It stars Lionel Barrymore, Blanche Sweet and Marshall Neilan. Sweet and Neilan would later marry in real life. Plot Robert Stevens robs the bank where he is employed, and through the efforts of Calvin Stedman, the prosecuting attorney, he is sentenced to six years' imprisonment. While in jail his wife dies and his little daughter, Agnes, is placed in a convent. At the expiration of his sentence, Stevens locates his daughter and settles in Arizona, assuming the name of Stephen Rodman. Cast * Lionel Barrymore - Stephen Rodman/Robert Stevens * Blanche Sweet - Agnes Rodman, Stephen's daughter * Fred Hearn - District Attorney Calvin Stedman * Gertrude Robinson - Ruth Prescott * Marshall Neilan - Will Prescott * Frank Crane - Ned Seabury (*as Frank Hall Crane) * Fred Herzog - Kirke, the broker * Hattie Delaro - Mrs Prescott * Claire McDowell - Mrs. Stephen Rodman * Frank M. Norcross - Cohen * Alan Hale - One of Kirke's Creditors * Antonio Moreno - Man in Kirke's Office * Gladys Egan - An Orphan (uncredited) * Lillian Gish (uncredited) * Vivian Prescott (uncredited) Legacy The story was refilmed by Paramount in 1925 as Men and Women.
WIKI
The Gateway to Computer Science Excellence First time here? Checkout the FAQ! x 0 votes 219 views #include <stdio.h> int main() {     int a[] = {50, 60, 10, 30, 40, 20 };     int *b[] = {a+3, a+4, a, a+2, a+1, a+5 };     int **c = b;     c++;     printf("%u, %u, %u\n", c-b, *c - a, **c);     return 0; } asked in Programming by Loyal (7.5k points) | 219 views +1 Answer : 1,4,40 0 @Prashant. I am not getting this, when we do, c-b why we got 1 as answer, likewise when we do *c-a why we got 4 as answer ? Here i modified to programme to see the address, i think c-b should be 8 and *c-a should be 16. Where i am going wrong ? +1 3347544000 is nothing the base address of the array b. 3347544008 is nothing the 2nd element address of the array b.  which is contain by c after c++. 3347544008 - 3347544000 = 8 but we know pointer take 8 byte here . so divide by size of pointer is needed. so 8/8= 1 1 Answer +3 votes Best answer Output will be  1,4,40 answered by Junior (891 points) selected by Related questions 0 votes 1 answer 1 0 votes 0 answers 2 +1 vote 1 answer 3 Quick search syntax tags tag:apple author user:martin title title:apple content content:apple exclude -tag:apple force match +apple views views:100 score score:10 answers answers:2 is accepted isaccepted:true is closed isclosed:true 41,055 questions 47,654 answers 147,219 comments 62,380 users
ESSENTIALAI-STEM
Perl Weekly Challenge 267: Line Count These are some answers to the Week 267, Task 2, of the Perl Weekly Challenge organized by Mohammad S. Anwar. Spoiler Alert: This weekly challenge deadline is due in a few days from now (on May 5, 2024 at 23:59). This blog post provides some solutions to this challenge. Please don’t read on if you intend to complete the challenge on your own. Task 2: Line Count You are given a string, $str, and a 26-items array @widths containing the width of each character from a to z. Write a script to find out the number of lines and the width of the last line needed to display the given string, assuming you can only fit 100 width units on a line. Example 1 Input: $str = "abcdefghijklmnopqrstuvwxyz" @widths = (10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10) Output: (3, 60) Line 1: abcdefghij (100 pixels) Line 2: klmnopqrst (100 pixels) Line 3: uvwxyz (60 pixels) Example 2 Input: $str = "bbbcccdddaaa" @widths = (4,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10) Output: (2, 4) Line 1: bbbcccdddaa (98 pixels) Line 2: a (4 pixels) Line Count in Raku The first step is to build a hash, %widths, mapping each letter of the alphabet to its width. Then, we iterate over the letters of the input string: we keep adding letters to the current line so long as the line is not more than 100, or we start a new line. sub line-count(@in_widths, $in_str) { my $i = 0; my %widths; for 'a'..'z' -> $let { %widths{$let} = @in_widths[$i++]; } my $line-count = 1; my $line-width = 0; for $in_str.comb -> $let { my $tmp = $line-width + %widths{$let}; if $tmp <= 100 { $line-width = $tmp; } else { $line-count++; $line-width = %widths{$let}; } } return "($line-count, $line-width)"; } my @tests = (10 xx 26, "abcdefghijklmnopqrstuvwxyz"), ([4,10,10,10,10,10,10,10,10,10,10,10,10,10,10, 10,10,10,10,10,10,10,10,10,10,10], "bbbcccdddaaa"); for @tests -> @test { printf "%-28s => ", @test[1]; say line-count @test[0], @test[1]; } This program displays the following output: $ raku ./line-count.raku abcdefghijklmnopqrstuvwxyz => (3, 60) bbbcccdddaaa => (2, 4) Line Count in Perl This is a port to Perl of the above Raku program. We first build a hash to map letters to their width, and then iterate over the letters of the input string to fill lines with length not more than 100. use strict; use warnings; use feature 'say'; sub line_count { my @in_widths = @{$_[0]}; my $in_str = $_[1]; my $i = 0; my %widths; for my $let ('a'..'z') { $widths{$let} = $in_widths[$i++]; } my $line_count = 1; my $line_width = 0; for my $let (split //, $in_str) { my $tmp = $line_width + $widths{$let}; if ($tmp <= 100) { $line_width = $tmp; } else { $line_count++; $line_width = $widths{$let}; } } return "($line_count, $line_width)"; } my @tests = ( [[10,10,10,10,10,10,10,10,10,10,10,10,10,10, 10,10,10,10,10,10,10,10,10,10,10,10], "abcdefghijklmnopqrstuvwxyz"], [[4,10,10,10,10,10,10,10,10,10,10,10,10,10, 10,10,10,10,10,10,10,10,10,10,10,10], "bbbcccdddaaa"]); for my $test (@tests) { printf "%-28s => ", $test->[1]; say line_count $test->[0], $test->[1]; } This program displays the following output: $ perl ./line_count.pl abcdefghijklmnopqrstuvwxyz => (3, 60) bbbcccdddaaa => (2, 4) Wrapping up The next week Perl Weekly Challenge will start soon. If you want to participate in this challenge, please check https://perlweeklychallenge.org/ and make sure you answer the challenge before 23:59 BST (British summer time) on May 12, 2024. And, please, also spread the word about the Perl Weekly Challenge if you can. Leave a comment About laurent_r user-pic I am the author of the "Think Perl 6" book (O'Reilly, 2017) and I blog about the Perl 5 and Raku programming languages.
ESSENTIALAI-STEM
Page:The Works of the Rev. Jonathan Swift, Volume 9.djvu/57 Rh proof, yet every person in the court believed him to be guilty. The second was tried for a rape, and stands recorded in the votes of the house of commons, for endeavouring, by perjury and subornation, to take away the life of John Bingham, esq. But, since I have gone so far as to mention particular persons, it may be some satisfaction to know who is this Wood himself, that has the honour to have a whole kingdom at his mercy for almost two years together. I find he is in the patent entitled esquire, although he were understood to be only a hardwareman; and so I have been bold to call him in my former letters; however, a 'squire he is, not only by virtue of his patent, but by having been a collector in Shropshire; where, pretending to have been robbed, and suing the county, he was cast, and for the infamy of the fact lost his employment. I have heard another story of this 'squire Wood, from a very honourable lady, that one Hamilton told her. Hamilton was sent for six years ago, by sir Isaac Newton, to try the coinage of four men, who then solicited a patent for coining halfpence for Ireland; their names were Wood, Costor, Eliston, and Parker. Parker made the fairest offer, and Wood the worst; for his coin were three halfpence in a pound weight less value than the other. By which it is plain, with what intentions he solicited his patent; but not so plain how he obtained it. It is alleged in the said paper called the Report, that upon repeated orders from a secretary of state for sending over such papers and witnesses, as should be thought proper to support the made
WIKI
Wikipedia:Articles for deletion/Princess Olga, Duchess of Apulia The result was keep. (non-admin closure) Extraordinary Writ (talk) 22:34, 13 August 2021 (UTC) Princess Olga, Duchess of Apulia * – ( View AfD View log ) The subject does not appear to meet WP:GNG. To try to inform a requested move discussion, I've been trying to find reliable secondary sources that are independent of the subject. There don't appear to be any that provide significant coverage beyond a mere trivial mention. Other than blogs, web forums and stand-alone images, she is only mentioned a few times in society pages or listed in genealogical directories. These do not clearly demonstrate 'significant coverage'. DrKay (talk) 19:33, 6 August 2021 (UTC) * Note: This discussion has been included in the list of Greece-related deletion discussions. DrKay (talk) 19:33, 6 August 2021 (UTC) * Note: This discussion has been included in the list of Royalty and nobility-related deletion discussions. Shellwood (talk) 19:39, 6 August 2021 (UTC) * Note: This discussion has been included in the list of Women-related deletion discussions. Spiderone (Talk to Spider) 20:06, 6 August 2021 (UTC) * Neutral - At the moment, this bio article is going through an RM. But seeing the result at her husband's RM? the result of this bio article's RM is a foregone conclusion. So, not sure whether or not we should keep this bio of a wife of a disputing pretender to the defunct Italian throne. GoodDay (talk) 17:17, 7 August 2021 (UTC) * I closed the requested move discussion as no consensus, so feel free to amend your comment as needed. Thanks! D🐶ggy54321 (let's chat!) 19:06, 13 August 2021 (UTC) * Delete Per nomination. ǁ ǁǁ ǁ Chalk19 (talk) 21:31, 7 August 2021 (UTC) * Keep. There's a profile in the New York Times here that recounts she has been the online creative director for Christian Louboutin and a filmmaker, illustrator and textile designer. Dujour research editor Samuel Anderson profiled her in that magazine for her work with Louboutin here. She was profiled by Vouge Italia in 2010 here. She was photographed by Helmut Newton for Vanity Fair here. The NYT article is absolutely not a trivial mention, and I think if her work with Louboutin and filmmaking was included, it'd be more than just genealogy. This article should be expanded, not deleted. --Kbabej (talk) 17:51, 9 August 2021 (UTC) * Keep per Kbabej. Also profiled by Vanity Fair Spain and in the Greek Media . - dwc lr (talk) 15:02, 10 August 2021 (UTC) * Keep passes WP:GNG and BASIC per source found by Kbabej. The article requires improvement. Pls someone expand on this. Cheers 16:53, 11 August 2021 (UTC) * Keep - as I believe that's been the practice for the spouses of pretenders. GoodDay (talk) 19:10, 13 August 2021 (UTC)
WIKI
Unable to log into Word Press Admin wordpress #1 I was editing the pictures in an older post this morning and the dashboard for my site suddenly switched to the WP admin log-in screen. No matter how many times I try to log in, it just keeps going back to that screen. I put in my name and password and it blanks out and comes back to the log-in screen. How can I get back to my dashboard? Here is the site if it helps - everything looks okay (except for the huge pictures on the one post) www.patricecapone.com #2 As of WordPress 4.0, the cookie rules are a lot tighter for your security. Which means that if the home and siteURL values for your site aren’t matching, the cookie won’t be set and you can’t log in. Boo. Usually this happens if one of the values has www and the other doesn’t. Your home was http://www.patricecapone.com but your SITE url was OurTinyTexas… instead. I made them match. You should be able to log in now, but please flush your cache on your browser first :slight_smile: #3 I had this problem after my website was subject to a brute force attack. I had the admin login username details set to “admin” and had the Stop Spammers plug in installed. Every time I used the admin log in, it kept me out. I had to clear the cache in the dreamhost panel, get help from dreamhost Via LiveChat. when that was all reset I signed in, downloaded ADMIN USER NAME CHANGE plug in, changed the admin user name to something else and problem fixed. Took a while, but not sure if this is the same as your problem. #4 In general, having ‘admin’ as your admin account is a bad idea, but that error sounds like you were accidentally tripping out brute force protection :slight_smile: I think that may actually be ironic, and not Alanis Morrisette Ironic.
ESSENTIALAI-STEM
Dollar rebounds from 2-week low as risk sentiment worsens The dollar rallied from a two-week low on Tuesday as a sell-off in world stock markets spurred safe-haven bids and investors worried about slowing global growth. Other safe-haven currencies such as the and Swiss franc gained as well. "Dovish comments from the Fed that the world economy may be cooling off has dented investors' sentiment," said Viash Sreemuntoo, corporate trader at online FX broker XE. Earlier, cautious comments overnight by Federal Reserve officials about the global economic outlook knocked the dollar to two-week troughs as it suggested the Fed could slow the pace of raising interest rates or that the tightening cycle is ending. In midmorning trading, the dollar index, a measure of its value against a basket of six major currencies, rose 0.65 percent to 96.83, off its weakest level since Nov. 7. "With investors holding significant long U.S. dollar exposure, especially versus the yen, we think the dollar remains at risk of weakening further if the market's doubts about the Fed outlook are sustained or increase further especially as the broader dollar lift associated with seasonal demand around this time of year is typically at or close to a peak by now," said Shaun Osborne, chief FX strategist at Scotiabank in Toronto. The euro also gave up its gains, spooked by a slide in European equities. Italian bank shares hit a two-year low and Italian bonds sold off again amid a continuing confrontation with the European Union over Rome's budget plans. Europe's single currency was last down 0.73 percent at $1.1367, off a two-week high earlier. Persisting worries about the China-U.S. trade conflict and Brexit negotiations also kept investors jittery. With investor nerves high, the yen added 0.13 percent to 112.69 U.S. 10-year Treasury yields pulled back, removing some support for the greenback. The dollar was also weighed down by weak U.S. data. "For the U.S. equity market to stabilize, either the rest of the world will have to show better growth or the Fed will have to moderate its stance," Hans Redeker, global head of FX strategy, at Morgan Stanley, wrote in a client note. "Both outcomes are U.S. dollar-negative and explain why rising U.S. equity volatility has failed to spill over into emerging markets." Sterling was slightly lower against the dollar, but was firmer against the euro as Prime Minister Theresa May heads to Brussels for more Brexit talks.
NEWS-MULTISOURCE
Skip to main content CloseSearch Department of Computer Science and Software Engineering Student Projects and Research The following are highlights of some of the recent research that has been conducted by our students. Artificial Intelligence, Robotics NAO Robot NAO is an autonomous and programmable robot with a long list of possible functions that involve topics such as human interaction, object sensing, and humanoid movements. NAO can be programmed by a user using the Python programming language, and the Choreograph desktop application. Real-Time Control The following video shows SE-641 (Real-Time Robot Control) final projects involving real-time robotic control using NAO. The projects demonstrated are: 1) robot calculator, 2) grab and carry objects, and 3) play rock-paper-scissors. Dialogue and Face Recognition In the following project, students have programmed NAO to demonstrate several ways in which the robot can converse with humans, and how the robot can adapt its conversations based on a face it recognizes. This project sets up a strong base for students to build on to explore more complex problems with NAO. Deep Learning-Based Hand Gesture Recognition and Drone Flight Controls In this master’s degree thesis project a hand gesture recognition system is designed and developed for the control of flights of unmanned aerial vehicles (UAV). To train the system to recognize designed gestures, skeleton data collected from a Leap Motion Controller are converted to two different data models. As many as 9,124 samples of training dataset, 1,938 samples of testing dataset are created to train and test the proposed three deep learning neural networks, which are a 2-layer fully connected neural network, a 5-layer fully connected neural network and an 8- layer convolutional neural network. The static testing results show that the 2-layer fully connected neural network achieves an average accuracy of 98.2% on normalized datasets and 11% on raw datasets. The 5-layer fully connected neural network achieves an average accuracy of 95.2% on normalized datasets and 45% on raw datasets. The 8-layers convolutional neural network achieves an average accuracy of 96.2% on normalized datasets and raw datasets.  Testing on a drone-kit simulator and a real drone shows that this system is feasible for drone flight controls. Motion Control of Robots Using Speech This is a graduate class project. Students were asked to design and develop a real-time application in the Linux environment to control the motion of two robots. The motion of the robots are purely controlled by speech, and thus a speech recognition system is also developed to produce control commands. A Robot to Improve Verbal Communication Skills of Children with Autism (In collaboration with Dr. Patrizia Bonaventura of the Speech Pathology Department) Children diagnosed with autism typically display difficulty in the areas of social interaction and verbal communication. Various studies suggest that children with autism respond better to robots than to humans. Another reason is the special interest of autistic children in electronic and mechanic devices. We have been experimenting with various types of robots. In this project, we are seeking answers to the following questions: Can an interactive robot help children with autism to respond in interpersonal communication? Does the children’s interaction with a human differ from the interaction with a robot? How does the form of the robot affect the children’s interaction with it? Data Science, Natural Language Processing, Image Processing Informed and Timely Business Decisions – A Data-driven Approach One of the main characteristics of business rules (BRs) is their propensity for frequent change, due to internal or external factors to an enterprise. As these rules change, their immediate dissemination across people and systems in an enterprise becomes vital. The delay in dissemination can adversely impact the reputation of the enterprise, and cause significant loss of revenue. The current BRMS are often maintained by the IT group within a company, therefore the modifications of the BRs intended by executive management would not be instantaneous, since they have to be coded and tested before being deployed. Moreover, the executives might not have the possibility to take the best decisions, without having the benefit of analyzing historical data, and the possibility of quickly simulating what-if scenarios to visualize the effects of a set of rules on the business. Some of the systems that provide this functionality are prohibitively expensive. This project proposes to solve these challenges by using the power of Big Data analysis to source, clean and analyze historical data that is used for mining business rules, which can be visualized, tested on what-if scenarios, and immediately deployed without the intervention of the IT group. The proposed approach is using open source components to mine stop loss rules for financial systems. Touristic Sites Recommendation System Recommending touristic places for visitors is an important service of touristic websites. Most websites allow visitors to either numerically rate or leave a review about the site they visited to express their opinion. Those reviews help future visitors to choose the place that is the most attractive to them and at the same time allow the touristic place owner to improve and increase the visitor’s satisfaction. Sometimes, the amount of reviews can be overwhelming, discouraging intended visitors to manually read all the reviews to draw a conclusion. Relying only on star-rating of the touristic places can be misleading, as it lacks the context and details of the reviews. This is why we propose a semantic based recommender system that relies on natural language processing and big data analysis of the visitors’ reviews. The touristic places recommendation uses extracted keywords from data that is “cleaned”, together with sentiment analysis of the reviews, and context sensitive information such as geographic location, temporal selection and keywords translation. Link-Analysis Link-Analysis is a project to extract who, what, when, where, why, and how data from Wikipedia. Beyond extracting the data and getting it into a form for use, this project has a lot of interesting data processing issues, such as recognizing that the sentence ‘George Washington Carver was named after George Washington’ is discussing two different people. The data extract can be used for a wide number of purposes. Devdas Devdas (a Sanskrit word meaning Servant of the Gods) is intended to be an ‘Alexa’ on steroids. It is a platform of cooperating intelligent agents which can exploit current advances in computer science: deep learning, big data, vision, and even quantum computing. There are currently plans to incorporate at least 30 different agents in the platform, which leaves more than enough work to keep the students busy. BioSimVis BioSimVis is a vision processing program that is being developed to taking into account how a biological entity processing visual information. The actual process is far different than how computers currently address the problem. The computer tries to process an entire scene while the eye focuses on a smaller region to process (saccades). The digital image is recto-linear while the nerves on the back of the eye are arranged in phyllotactic structure. A second part of the program is to detect human emotion from image data. This project will be using the Woody Allen movie, Hannah and Her Sisters, as the training and testing dataset. Rapid Homoglyph Prediction and Detection As technology permeates the globe, it is becoming necessary to support an increasing number of languages, and hence character sets. Many character sets contain characters that look similar or identical to characters from other character sets (known as homoglyph characters). This poses a number of unique problems, such as the homoglyph URL attacks frequently used in phishing scams. The previously proposed solutions to these problems have mostly focused on restricting the characters available to users. This project proposes a new approach which can predict and detect homoglyphs with a high level of accuracy. This methodology simulates the human behavior of “visual scanning” and allows large amounts of visual data to be represented in a format that is easily and quickly searchable. Additionally, it employs a pre-processing time-memory trade-off to enable the detection and prediction of homoglyphs in fractions of a second. Improving Text Mining with Enhanced Named-Entity Recognition We are using a state-of-the-art parser to process natural language texts such as news articles. The parser uses a named-entity recognizer (NER) to identify phrases as names of people, organizations, and locations. DBpedia is a semantically organized database that is automatically created from the structured content of Wikipedia. In accordance with the principles of the Semantic Web, DBpedia has a large ontology that further categorizes people, organizations and locations. By accessing the latest archives of DBpedia, we are experimenting with matching the named entities found in the text with those categorized by DBpedia to obtain a finer-grained categorization. For example, this technique allows us to identify people as scientists or politicians, and organizations as companies or universities. Our goal is to use this information to improve the performance of text clustering and classification methods. Urban Data Analysis Data Analytics involves the study and application of algorithms and methodologies to discover insights from data. Specifically, our research activity is focused on the analysis of urban data, aimed at predicting crime patterns and user mobility behaviors. Such predictive models can be profitably used to improve resource furnishing and management of city resources, to anticipate criminal activity, to predict mobility patterns and avoid traffic congestion. Information Security Privacy Control of Social Networking. Social media is a de facto standard in online communication. When users interact with others on a large scale, privacy plays an increasingly important part in maintaining safety and user confidence in a social media platform. Allowing end-users to control their interactions and data with others is a way to inspire end-user confidence. Many control schemes exist; however, they are flawed on two key points. These systems are somewhat confusing to the end users in that the users may not understand exactly what information is being shared with others and that the control schemes are hidden and abstract. In this project, we propose an idea with a prototype, named Solendar, that attempts to solve the issue with a special authorization approach. It has a pass system which allows end-users to explicitly specify which users are able to see and interact with their information on individual level. It has a group system that builds on the pass system, allowing end-users to organize other users into logical segments for effective information sharing while retaining the control of privacy. Augmented/Virtual Reality 1995-2016 Barnegat Bay Algal Bloom VR Visualization
ESSENTIALAI-STEM
Page:The Eight-Oared Victors.djvu/249 Rh the time that duffer—what was his name—took out some of the wheels to make some machine he was crazy over? Remember that?" "I should say so!" exclaimed Tom. "But this chap wasn't satisfied with a single wheel—he wanted the whole works. I wonder who it could be?" "I shouldn't wonder but what the Snail had a hand in this," opined Phil. "He's so fond of roaming about nights." "He stays over in the North dormitory now," declared Frank. "Besides, he wouldn't get in here at this hour of the morning—at least I think It must be near morning. The doors are locked after hours, you know. No, it was someone from here all right, who took that clock." "And the nerve of 'em!" exclaimed Phil. "And to think Tom took that lad—whoever he was—for me," put in Sid. "Did he really look like me?" "He sure did." "Maybe it was Bean Perkins," suggested Frank. "No, Bean wouldn't do a trick like that. He couldn't keep quiet enough," declared Tom. "He'd want to give a class yell or sing a song in the middle of it, and that would give it away. Say, but I have a scheme though." "Out with it, and then let's get to bed," yawned Frank.
WIKI
Talk:21st-century classical music UK-Centric Maybe it's all those rainy days, but is seems that English people spend a lot of time editing the California-based Wikipedia. This article is no exception. Gingermint (talk) 00:41, 28 January 2012 (UTC) * I haven't seen any substantial improvement in this department over the past two-and-a-half years, so I have added a flag to the "multiple issues" banner at the top of the article. The problem largely stems from relying too much on a very small number of sources, most of them based in the UK (BBC Music Magazine, the Guardian). Heaven forbid that this article should now be flooded with material from just one other country, but I am deeply disappointed to gain the impression that, for example, Australia has stopped producing notable composers altogether, after such a rich output in the 20th century. Similarly for Japan, Indonesia, the entire continent of South America, Italy, Spain, Russia, and Germany.—Jerome Kohl (talk) 20:52, 11 August 2014 (UTC) Started cleanup OK. I'm back and looking at this again. I've reviewed all the above, and the tags, and started to clean up the article. It's going to take a while to find sources - obviously, this isn't something many people write about so actually sourcing will be tricky. But it is important so I'll persist... Getting a more woldwide view is probably the first point of order to address. Any other suggestions always welcome. Iadmc (Jubileeclipman) (talk) 20:20, 10 November 2016 (UTC) More work today with help from user:Jerome Kohl. It's starting to feel better but we need more non-UK composers! Iadmc (Jubileeclipman) (talk) 20:16, 11 November 2016 (UTC) * I think the centre of gravity is now slowly shifting away from Croydon.—Jerome Kohl (talk) 02:55, 16 November 2016 (UTC) * Looking good! The number of US composers has certainly increased... Seriously, though, we'll crack it yet. I notice that many of the composers' articles need a fair amount of work also. Another day... Iadmc (Jubileeclipman) (talk) 14:05, 16 November 2016 (UTC) * We should probably expand the section on performance to discuss rather than simply list the groups. But one thing at a time... Iadmc (Jubileeclipman) (talk) 14:49, 16 November 2016 (UTC) * Yes. I am a little uneasy about some of the orchestras in that list of performers allegedly emphasizing 21st-century music (New York Philharmonic, Berlin Philharmonic, etc.).—Jerome Kohl (talk) 17:37, 16 November 2016 (UTC) I found a list somewhere alleging them to be active in promoting New Music. They certainly perform it but whether they promote it is another question... They can be removed as we have plenty that certainly are active in promotion. Iadmc (Jubileeclipman) (talk) 17:59, 16 November 2016 (UTC) * What I meant to say is that this list will quickly get out of hand if it is to include every group that ever performed a piece composed after 2000. The New York and Berlin Philharmonics are only two examples of ensembles the bulk of whose repertoire dates from well before the 21st century. This contrasts rather sharply with groups like Musikfabrik and the London Sinfonietta, for example. Conductors are a separate issue, and probably need to be judged by different criteria.—Jerome Kohl (talk) 18:38, 16 November 2016 (UTC) * Well, quite. I'm sure we and others could add at least a dozen more... And, as you said previously, lists can attract random "favourites", notable or otherwise. I wonder if we should just remove them to the talk page for now so we can review them and add names in context to the article as required? Iadmc (Jubileeclipman) (talk) 18:50, 16 November 2016 (UTC) * Perhaps that is not necessary quite yet, though if I keep on as I have done for the past couple of days, something will have to be done to stop me! I think for the moment we can discuss such matters here. For a start, I would propose an adjustment to the introductory sentence, to read "In the 21st century, there are a number of musicians and groups whose primary purpose is the promotion of new music:" (italics only meant to call attention to the changed wording). That should give a clearer basis for excluding those whose enthusiasm is divided.—Jerome Kohl (talk) 18:56, 16 November 2016 (UTC) Sounds good. And remove the less relevant entries at the same time. Go for it. Iadmc (Jubileeclipman) (talk) 19:01, 16 November 2016 (UTC) Also, I wonder if we should swap the sections "Art-forms of the 21st century" (I just changed the title) and "Composers"? It makes more sense that way I feel. Iadmc (Jubileeclipman) (talk) 19:05, 16 November 2016 (UTC) * I agree. This makes better sense, as it presents the more general and inclusive first, with individuals afterward.—Jerome Kohl (talk) 19:08, 16 November 2016 (UTC) * Thanks Iadmc (Jubileeclipman) (talk) 19:20, 16 November 2016 (UTC) I going to do a bit more research before I touch this again (beyond ce etc). There is so much more that needs discussion and the composers' and other articles only really scratch the surface. I'll be back... Iadmc (Jubileeclipman) (talk) 19:28, 16 November 2016 (UTC) Good work, both of you! I've only had a quick glance over this – I'll have a look in more detail when I find myself with more than the odd minute to spare. --Deskford (talk) 21:46, 17 November 2016 (UTC) * Thanks! Iadmc (Jubileeclipman) (talk) 23:36, 17 November 2016 (UTC) Joan Tower is among the missing here. A very important and frequently performed composer.Conscientia (talk) 00:55, 23 November 2016 (UTC) * Added. Thanks Iadmc (Jubileeclipman) (talk) 02:05, 23 November 2016 (UTC) Music files Comment Suggestion Would it be useful/appropriate to add some music examples? Obviously copyright may be an issue but they may help to establish styles, genres, etc Iadmc (Jubileeclipman) (talk) 21:04, 20 November 2016 (UTC) * I notice that 20th-century classical music is devoid of such examples. It could be down to copyright issues, but might there be some other reasons for this?——Jerome Kohl (talk) 21:21, 20 November 2016 (UTC) * Also, Contemporary classical music as highlight by Hyacinth on the talk page recently (she added the templates). Same issue, probably. Iadmc (Jubileeclipman) (talk) 23:34, 20 November 2016 (UTC) What Makes a Composer "Classical" or "Notable"? I made an edit to the "Multimedia and music" to include Michael Giacchino, who I thought was worthy of note due to producing some popular soundtrack music, but this edit was undone due to his not being a "classical composer". I'm just a fan, not a musicologist, so I won't revert the undoing of my edits as I'm outside my depth, but I'm curious - what makes someone like John Williams a classical composer but not Giacchino? Looking at Williams' Wikipedia page, he did many more film scores than concert works even early in his career. Is it something about his style or training, or how he orchestrates his music? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 17:32, 23 May 2018 (UTC) * I will pass on the question of notability, though I will mention that, on Wikipedia, if the composer has a biographical article, then he/she is usually considered notable. As for John Williams as a "classical" composer, you will find on his biographical page—way, way, down on that page—a discussion of some of his concert (i.e., "classical") music, for example, his Horn Concerto, which even has an article of its own. I see nothing at all about such activities for Michael Giacchino.—Jerome Kohl (talk) 17:38, 23 May 2018 (UTC) Yeah, John Williams and Michael Giacchino are both cinematic composers, but only John Williams has composed music in classical forms. They are both notable, though. — Preceding unsigned comment added by <IP_ADDRESS> (talk) 20:41, 17 November 2020 (UTC) Technicality of the Term 21st Century Technically, the 21st century starts in the year 2001 instead of 2000. This is because there was no year 0 and AD started with 1. So the article should either change titles to "2000s classical music" or remove any works from the year 2000. Example: "Jennifer Higdon's blue cathedral, premièred in 2000, is a one-movement orchestral tone-poem and is ranked among the most widely performed works of the early 21st century" should be removed because it is incorrect, 2000 is not in the 21st century. --Pithon314 (talk) 13:24, 30 November 2020 (UTC) Music and arts 2 songs during 21 century — Preceding unsigned comment added by <IP_ADDRESS> (talk) 09:00, 27 November 2021 (UTC) "21st century music" listed at Redirects for discussion The redirect [//en.wikipedia.org/w/index.php?title=21st_century_music&redirect=no 21st century music] has been listed at redirects for discussion to determine whether its use and function meets the redirect guidelines. Readers of this page are welcome to comment on this redirect at until a consensus is reached. Edward-Woodrow :) [ talk ] 23:27, 16 August 2023 (UTC) Let's better call this "21st-century Western classical music" As the Western perspective was questioned in a hatnote 10 years ago without any obvious answer, IMHO the lemma would be more correct being called "21st-century Western classical music". Generally, musicologists agree that there are several classical musics, including Indian, Arabic, Chinese and other classical music. So when we write about "classical music" we should always make it clear to which tradition this applies. This would also resolve the reason for the hatnote, that could then be deleted. Munfarid1 (talk) 07:04, 1 May 2024 (UTC) * Hm. Same for 20th-century classical music then? Interesting idea. — Iadmc ♫ talk 19:22, 2 June 2024 (UTC) * This has already been discussed on the classical music page. The change would have to begin there and then these ones would be adjusted. Unfortunately, it seems like secondary sources still use the term "classical music" for Western classical music more often than not. Aza24 (talk) 19:32, 2 June 2024 (UTC) * Cat and pigeons come to mind... Since the sources talk about classical music without the Western caveat, we need to follow them, I guess — Iadmc ♫ talk 16:03, 3 June 2024 (UTC) * At this point, I'd say so. I wouldn't be surprised if 20/30 years down the road the vast majority of modern scholarship is using the "Western" qualifier. Aza24 (talk) 00:00, 4 June 2024 (UTC)
WIKI
Page:Carroll Lane Fenton - A History of Evolution (1922).djvu/43 40 breadth of vision equalled by but few of the workers who preceded him. As Osborn states: "The brilliant early achievements of Goethe in science afford another illustration of the union of imagination and powers of observation as the essential characteristics of the naturalist. When he took his journey into Italy, and the poetic instinct began to predominate over the scientific, science lost a disciple who would have ranked among the very highest, if not the highest. Of this time Goethe says: 'I have abandoned my master Loder for my friend Schiller, and Linnaeus for Shakespeare.' Yet Goethe, in the midst of poetry, never lost his passion or scientific studies. He seems to have felt instinctively that what contemporary science needed was not only observation, but generalization." Goethe derived much of his inspiration from Buffon and the German natural philosophers. Unfortunately he never discovered the works of Lamarck, although he anticipated that scientist in some of his work with plants. There can be little doubt that, had Goethe discovered the "Philosophie Zoologique," he would have accepted its principal doctrine, and would have proclaimed them with a vigor that would have overcome even the antagonism of Cuvier. As
WIKI
Page:RussianFolkTales Afanasev 368pgs.djvu/103 Rh on me, on the grey Wolf, and Princess Eléna the Fair she can ride on the golden-maned horse." Iván Tsarévich sat on the grey Wolf and they went a third journey. Soon the grey Wolf took Iván Tsarévich to the place where he had cleft his horse in two, and said: "Now, Iván Tsarévich, I have served you well, faithfully and truly: on this spot I cleft your horse in two, and up to this spot I have brought you again: slip off me, off the grey Wolf; now you have your golden-maned horse, I can serve you no more." The grey Wolf spoke these words and went into the forest; and Iván Tsarévich wept bitterly for the grey Wolf, and went on his road with the fair Eléna on the golden-maned horse. And before he reached his own kingdom and when he was only twenty versts off, he stopped, got off his horse, and together with the fair Eléna went under a tree: he tied the golden-maned horse to that same tree, and he took the cage with the Bird of Light with him; and lying on the grass engaged in loving conversations they went to sleep. Now it happened at this time that the brothers of Iván Tsarévich, Dmítri and Vasíli, were riding out in different states and could not find the Bird of Light. They were just returning to their kingdom with empty hands, and they were provoked. And they lit upon their sleeping brother with the fair Princess Eléna. When they saw the golden-maned horse and the Bird of Light in the golden cage on the grass they were delighted, and thought that they would slay their brother Iván Tsarévich. Dmítri took his sword out of his sheath and cleft Iván Tsarévich, and then he roused the fair Princess Eléna and began to ask her: "Fair maiden, from what kingdom art thou, who was thy father, how do they call thee on earth?" And the fair Princess Eléna, seeing Iván Tsarévich dead, was sore afraid, and with bitter tears spake. "I
WIKI
win2k server group policies I'm using win2k server and I'm trying to make a 'webmembers' group.  They will be allowed to enter the protected area of a particular website.  I have that all set up already through IIS and NTFS.  Now what I'm trying to do is add a group called 'webmembers'.  I don't want the group to be able to do ANYTHING locally.  I dont' want them to be able to log in, shut down, use services, or anything.  I want them to have NO rights whatsoever (except for the right to view the protected area on the website).  The group only exists for Integrated Windows Authentication.  The only thing the users of that group will be able to do is view the protected area of the website.  I went to 'Local Security Policy' and removed the group 'Everyone' from the local policies that contained 'Everyone'.  This didn't help.  It allowed me to login locally with a user in the group 'webmembers'.  What am I doing wrong here???    (By the way, my server is not set up as a domain controller).  Please help. LVL 1 GorGor1Asked: Who is Participating?   HousenetConnect With a Mentor Commented: -To do this you idealy should have the private access area files stored in a different folder, like wwwroot\priv. -Create a virtual directory in iis under the website folder. Set the access control permissions for the virtual dir to not allow anonymous access. -Set the file permissions for the files in priv. -forget about the gpo's to do this.. 0   matt023Commented: Check the "logon locally" right in the default domain group policy.  this will override your lcoal security if set and if your web server is a part of this domain. 0   GorGor1Author Commented: I don't have a default domain group policy.  Are you talking about the group 'Users'?  I made a new group 'webmembers' from scratch.  How do I deny them from doing anything?  My server is not set up as a domain controller, so I don't have domain user options. 0 Question has a verified solution. Are you are experiencing a similar issue? Get a personalized answer when you ask a related question. Have a better answer? Share it in a comment. All Courses From novice to tech pro — start learning today.
ESSENTIALAI-STEM
Wikipedia:Reference desk/Archives/Computing/2012 May 14 = May 14 = Free online GIF program... I have created a string of GIF animations that I would like to join together. I've used free online software so far, but I don't know of any free programs that allow you to join multiple GIFs. Each of the GIFs that I have created have different timing speeds, so I don't want to upload them to a website that will force one timing speed on all of them. Suggestions are welcome. --Ghostexorcist (talk) 01:45, 14 May 2012 (UTC) * I don't believe a single animated GIF has the ability to vary the speed. So, that leaves you with the options of keeping them separate, or using some other format. Apparently, they do. StuRat (talk) 03:02, 14 May 2012 (UTC) * Depending on how long you want the animated GIF to be, maybe you can repeat frames to alter the length they each appear? The alternative is to make them into a slideshow with something like open office impress. Vespine (talk) 04:26, 14 May 2012 (UTC) * Sorry, I just realized what you're saying, you have mutiple GIF animations, not frames, so my 1st suggestion won't work, however my second suggestion might still work. This post on the openoffice forums seems to suggest making slideshows out of animated GIFs should work. Vespine (talk) 04:30, 14 May 2012 (UTC) * Each frame of an animated GIF has an independent delay value, so there's no need for hacks like duplicated frames. Gifsicle with the --multifile option may do what you want. I'm not sure, and the documentation is not very clear. -- BenRG (talk) 05:42, 14 May 2012 (UTC) * ¦ Reisio (talk) 12:31, 14 May 2012 (UTC) * Are you sure that the ImageMagick convert statement can join multiple animated GIFs, and maintain the different time intervals within each ? StuRat (talk) 20:31, 14 May 2012 (UTC) * See ImageMagick docs . --Colapeninsula (talk) 11:34, 15 May 2012 (UTC) * Wow, impressive capabilities. StuRat (talk) 17:41, 15 May 2012 (UTC) * You better get used to it. After a few years with ImageMagick, I wouldn't be surprised if "convert mouse.usb energy.battery" would convert the material in your mouse into pure energy and reuse it to recharge a battery. And I know that "convert mossad.crypt clear.txt" will decrypt any document in no time. --Stephan Schulz (talk) 21:53, 15 May 2012 (UTC) That ImageMagick code is way too advanced for me. I just started making GIFs with free online stuff. I doubt I will ever get involved in it enough to learn code. Thank you all for the suggestions so far. I ended up downloading a 15 day trial of a GIF editing program. It has worked pretty well. Here is what I came up with (I'll make a second part later). It's based on a silly picture I drew a few years ago. I hope that I can figure out how to scale all of the images to a single sized window at some point. --Ghostexorcist (talk) 04:54, 16 May 2012 (UTC) * Too complicated ? Once you download ImageMagick, all you need to do is type "convert", followed by the individual animated GIFs, in the order you want them, and then the name of the new animated GIF it creates. How could it be any simpler ? StuRat (talk) 05:29, 16 May 2012 (UTC) * There's no need to berate the OP for not being accustomed to command line interfaces. They look like programming to someone who doesn't use them regularly; don't take for granted the many years you spent getting completely up to speed with your understanding of what they can do and how they can work. --Mr.98 (talk) 13:18, 16 May 2012 (UTC) * OK, maybe the missing instructions are how to get to the command line interface. In Windows XP, it's Start + All Programs + Accessories + Command Prompt. Not sure what it is in Windows Vista and 7, but I have to assume they changed how to get there, for no apparent reason. :-) StuRat (talk) 16:23, 16 May 2012 (UTC) * on windows vista and 7, just type cmd or command in the start menu finder. Nil Einne (talk) 05:10, 17 May 2012 (UTC) * Or SHIFT+Right_mouse to get a cmd prompt in the directory of the ImageMagick dir, so he doesn't have to ask how to add it to his path. ¦ Reisio (talk) 18:17, 18 May 2012 (UTC) Folders like this Windows folders with names like: C:\3a8039561e532edd33c74b are temporary and can be deleted, right? I have one but when I try to delete it, it says that I can't because it is shared with someone else. I am the only user on this computer, so how can I be sharing it? (I do have a second user account on it.) Bubba73 You talkin' to me? 02:50, 14 May 2012 (UTC) * You can delete it once whatever process created it has finished. It may not have finished. You could try rebooting. -- BenRG (talk) 05:44, 14 May 2012 (UTC) * This is a known issue with a recent Windows update. The files created in this directory are supposed to be temporary, but end up being marked as system files. Google for the exact folder name and you should be able to find a solution to delete it (such as killing Windows Explorer first, or deleting it in Safe Mode). Chris Cunningham (user:thumperward) (talk) 14:12, 14 May 2012 (UTC) * If you do get permission to see what's inside, it probably contains one file, MRT.exe. This is the temporary installation file for the Malicious software removal tool and can be deleted if you are allowed. Astronaut (talk) 19:03, 15 May 2012 (UTC) about autorun.inf Some days earlier I asked if the file autorun.inf is executable by itself, and the answer is no because computer will only check it when a CD or USB is opened. Is there a chance that something being run when the autorun.inf is checked? Because the content of my autorun.inf look like something in a dll file, and is it possible to have any influence on the system running?--Noname67097 (talk) 06:12, 14 May 2012 (UTC) It is got 86 KB in size and I am doubting if it just functions like an lnk file--Noname67097 (talk) 08:00, 14 May 2012 (UTC) * That's probably something evil. Tricking AutoRun on USB drives is one of the more common ways for viruses to propagate themselves. If your Windows version is up to date, it shouldn't be able to run unless you give it permission, though. Looie496 (talk) 17:57, 14 May 2012 (UTC) lost IE from desktop, etc In Windows 7, I was messing around and lost the IE icon from my task bar and desktop. It is not in the start menu either. I tried downloading it, but that didn't work. Is is still on my computer because I can enter ie.exe at the search and it comes up. But I cannot apply windows updates either (they fail). I did a system restore and got the icon back to the task menu. Then I unpinned it, thinking that would get it to the desktop, but it went away. I tried the system restore again, but then all of the networking and access to the internet went away. I restored to a different restore point and got networking and the internet back, but IE is gone from the task bar, desktop, and start menu (although the command still works),but updates don't work. How can I get IE and updates back to normal? Bubba73 You talkin' to me? 06:41, 14 May 2012 (UTC) * Well, when I typed in ie.exe, it showed a shortcut that I was able to drag to the desktop. And from there I was able to pin it to the task bar. But Windows Updates are still failing. Any ideas? Bubba73 You talkin' to me? 06:50, 14 May 2012 (UTC) * What happens when you try to run Windows Update? Do you get an error message? Chris Cunningham (user:thumperward) (talk) 14:11, 14 May 2012 (UTC) * Could be a virus. Mr Little Irish (talk) 申 14:39, 14 May 2012 (UTC) * I think I deleted some files that I shouldn't. Bubba73 You talkin' to me? 23:23, 14 May 2012 (UTC) * If your XP installation took the Browser Choice update you might not be able to get back your original IE desktop icon (the one with no shortcut arrow and the internet options link on the right-click menu). Instead, you will have to make do with a regular shortcut. I don't think that update actually removes your original icon, it just removed the option to bring it back should you accidentally dfelete it, using the desktop settings. Astronaut (talk) 18:59, 15 May 2012 (UTC) Facebook page Can a page admin delete(remove) the owner from the page..... AND TAKE OVER THE PAGE COMPLETELY.... <IP_ADDRESS> (talk) 07:11, 14 May 2012 (UTC) * They can find ways of doing so, though I did not check if there is any report of such thing.--Noname67097 (talk) 08:02, 14 May 2012 (UTC) * Yes, because the admin has the same page access as the owner. Mr Little Irish (talk) 申 14:40, 14 May 2012 (UTC) How can I ensure an Adobe Flash Player updater is a true one but not a Trojan? Recently I have just heard about the Mac virus that disguises itself as an Adobe Flash Player Updater. I use Windows and updated my Adobe Flash Player for several times. How can I know if it is a true update or not (and also some Trojan disguises as Windows upgrade)? — Preceding unsigned comment added by Noname67097 (talk • contribs) 08:06, 14 May 2012 (UTC) * You can always just update from Adobe's website if you are unsure. If you are using Windows you should definitely be running antivirus all the time anyways. --Mr.98 (talk) 11:55, 14 May 2012 (UTC) * And be very wary if you click on a website and it displays a message saying you need to update Adobe - unless you 100% trust the website, don't accept its offer and instead update yourself from the Adobe website (or use the automatic updater for Flash). --Colapeninsula (talk) 11:37, 15 May 2012 (UTC) Monobook/vector Morning! Idiot question here. I had a nice set up in my monobook whatsit where I had a good script for adding refs, where I could add the URL and the rest of it would self-populate. A while ago it stopped working, and now when I added a new link to AfC categories in my toolbox list it's now stopped working altogether. Can someone who knows about computers fix it for me? S.G.(GH) ping! 09:23, 14 May 2012 (UTC) * Uhh… not without seeing it. ¦ Reisio (talk) 12:25, 14 May 2012 (UTC) * Yes, please post the script here. StuRat (talk) 20:28, 14 May 2012 (UTC) This is what I have. S.G.(GH) ping! 08:34, 18 May 2012 (UTC) importScript('Wikipedia:AutoEd/complete.js'); importScript('User:Timotheus Canens/afchelper4.js'); // Yet another AfC helper script v4. importScript ('User:Henrik/js/afc-helper.js'); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'User:SGGH/vector.js'), 'My Vector'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'User:SGGH/Useful policy links'), 'Useful policy links'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'Category:Pending AfC submissions'), 'P.AFC'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'WP:UAA'), 'WP:UAA'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'WP:AIV'), 'WP:AIV'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'WP:ANI'), 'WP:ANI'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'CAT:SPEEDY'), 'Speedy Deletion'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'Special:Newpages'), 'New Pages'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'Wikipedia:Categories for discussion'), 'Categories for discussion'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'Category:Unassessed Law enforcement articles'), 'Unassessed WPLE Articles'); }); addOnloadHook(function { addPortletLink ('p-tb', wgArticlePath.replace(/\$1/,'Category:Uncategorized pages'), 'Uncategorized Pages'); }); importScript('User:TheDJ/Gadget-HotCat.js'); importScript('User:AzaToth/twinkle.js'); TwinkleConfig = { revertMaxRevisions : 50, userTalkPageMode : 'window', showSharedIPNotice : true, openTalkPage : [ 'agf', 'norm', 'vand' ], openTalkPageOnAutoRevert : false, summaryAd : " using TW", deletionSummaryAd : " using TW", protectionSummaryAd : " using TW", watchSpeedyPages : [ ], watchProdPages : false, openUserTalkPageOnSpeedyDelete : [ 'g1', 'g2', 'g10', 'g11', 'g12', 'a1', 'a7', 'i3', 'i4', 'i5', 'i6', 'i7', 'u3', 't1' ], watchRevertedPages : [ 'agf', 'norm', 'vand', 'torev' ], markRevertedPagesAsMinor : [ 'agf', 'norm', 'vand', 'torev' ], deleteTalkPageOnDelete : false, watchWarnings : false, markAIVReportAsMinor : true, markSpeedyPagesAsMinor : true, offerReasonOnNormalRevert : true, orphanBacklinksOnSpeedyDelete : {orphan:true, exclude:['g6']} }; importScript('User:Ioeth/friendly.js'); FriendlyConfig = { summaryAd : " using Friendly", topWelcomes : true, watchWelcomes : false, markWelcomesAsMinor : true, insertHeadings : true, welcomeHeading : "== Welcome ==", insertUsername : true, insertSignature : true, quickWelcomeMode : "auto", quickWelcomeTemplate : "Welcome", markSharedAsMinor : true, groupByDefault : true, watchTaggedPages : false, markTaggedPagesAsMinor : true }; importScript('User:Mr.Z-man/refToolbar.js'); importScript('User:Smith609/toolbox.js'); What product (name & version) did Steve Wozniak use to program the ROM of the very first Apple Is made in Steve Jobs's garage? <IP_ADDRESS> (talk) 13:36, 14 May 2012 (UTC) * The excellent apple2history.org website has a section on the Apple I here, which seems to say that Woz coded a lot of it on an HP computer that ran a 6502 emulator written by a friend of Woz's. Other parts, he wrote on the Apple I itself by hand-assembling the code and typing it in using the Apple I's Monitor, a 256-byte program that he had already written. Comet Tuttle (talk) 02:56, 15 May 2012 (UTC) * Programming a ROM means burning the bytes into a (programmable) ROM. The device you use to do this is called a programmer. According to the page you linked to, "Wozniak used two 256 x 4 PROM (programmable read-only memory) chips to create a 256 byte program (called a 'monitor') that looked at the keyboard when the computer was turned on." <IP_ADDRESS>'s question seems to be asking what programmer device Wozniak used to program (burn) these ROMs. --Bavi H (talk) 03:46, 15 May 2012 (UTC) * Yes. <IP_ADDRESS> (talk) 12:34, 15 May 2012 (UTC) Connection issue So, I have this issue. This happens about once a day on average...I lose the ability to make new Internet connections. If I have Skype or Team Fortress running, they'll keep going without a hitch, but if I try to access a new web page, or sign into another online program, or play a different game, I won't be able to. I have to reset the router...which fixes the problem. But I shouldn't have to do that daily, right? My uncle thinks it's an issue with my router. A classmate thinks it's a DNS issue and I should switch to OpenDNS (about which I know nothing). Would anyone here be able to shed some more light on the issue, or my options? Thanks in advance. <IP_ADDRESS> (talk) 18:24, 14 May 2012 (UTC) * Is this a cumulative issue ? That is, does it only happen after you've been on awhile ? If so, it sounds like it might be failing to close connections after the apps close. At some point it then hits the maximum open connections limit and needs a reset. StuRat (talk) 20:26, 14 May 2012 (UTC) * It has happened the moment a computer gets turned on. Sometimes, I'll go to bed when this happens (all computers get turned off at night), turn on, and it's sitll the same way; other times, it'll be fine when I go to bed and broken in the morning. On the other hand, if the router never gets turned off, and that's what's failing to sever the connections, I'm not sure there would be any way to determine if the effect is cumulative easily, would there? <IP_ADDRESS> (talk) 22:04, 14 May 2012 (UTC) * Does it ever happen right after your reset the router ? (I notice ours automatically resets once a day, presumably as a kludge to handle problems like this.) StuRat (talk) 23:58, 14 May 2012 (UTC) * Like your classmate, I also suspect DNS problems: When you connect to a name address, you computer actually contacts a DNS server first to look up the number address for that name, then it connects to the number address. When existing connections continue to work fine, but new connections fail, there may be a problem with the DNS lookups your computer is performing before every connection. * Some routers run a local DNS server that acts as a middle man between your computers and the ISP DNS server. You might investigate your router settings to see if it acts as a local DNS server. If so, you might disable the router's local DNS server as a test. If you disable the router's local DNS server, you should release and renew your computer's IP address (or restart your computer) so the computer will get set up with the ISP DNS server to use for new DNS lookups. --Bavi H (talk) 00:30, 15 May 2012 (UTC) * StuRat; I don't think so. I only ever reset the router immediately after this happens, and it clears it up almost every time. * Bavi; is this safe for a novice to do? I'm not even 100% sure how to access the settings on my router (although I could probably find this information out); is disabling some of its settings safe if I don't really know what I'm doing? <IP_ADDRESS> (talk) 01:05, 15 May 2012 (UTC) * I can understand you don't want to cause worse problems. Of course, you'll want to read the router manual to find if there's one specific setting that could turn off the router's DNS server before attempting any changes. You typically log into the settings page of your router using a number address like <IP_ADDRESS> or similar, so even if DNS isn't working correctly, you can always log into the router and change the setting back. (Connecting to a number address doesn't need a DNS lookup.) * Are you using the same internet connection to post to Wikipedia? The IP addresses shown in your signatures are owned by Sky. If you use a Sky router, I briefly looked on their website, but didn't find any router manuals. If you've never logged into a router settings page before, you might not want to experiment without a manual. However, while on the Sky website, I did find this service status page that suggests there may be known internet problems right now. Perhaps you might go to that page, enter your postcode and see if there's additional information. --Bavi H (talk) 02:18, 15 May 2012 (UTC) * Before you consider logging into the router, you can check what DNS server your computer is currently using. On a Windows computer, click Start, Run, and enter nslookup. If you see an address like <IP_ADDRESS> or similar, your router may be acting as a local DNS server, and you may want to see if you turn it off as a test. If you see an address that looks like it's from your ISP, that suggests your DNS lookups go directly to your ISP. --Bavi H (talk) 03:05, 15 May 2012 (UTC) * I am indeed on Sky, and I do see <IP_ADDRESS> when I run nslookup. The website you linked me to indicates no issues at my nearest exchange, although that doesn't surprise me...this has been happening since 2009. So I'll be changing my router settings and seeing if that helps. Thanks for the help, by the way, you've been excellent. <IP_ADDRESS> (talk) 17:32, 15 May 2012 (UTC) * Can't make the changes right now; someone's changed the password and I need to find out what it is. In the meantime, I'm curious as to what the purpose of this function - using the router as a DNS server - is? <IP_ADDRESS> (talk) 17:56, 15 May 2012 (UTC) * Here's one advantage, as I understand it (I think I remember reading this in the manual for one of the routers we've had): If your router has to reconnect to the internet connection in the background, and for some reason the new connection specifies a new ISP DNS server, there's no easy way to pass that DNS server information to your computers unless you release and renew their IP addresses or restart them. Letting the router act as a middle man DNS server lets the DNS lookups continue to work in this case without fuss. Additionally, some routers use their local DNS to give the router itself a name like "myrouter" so you can just type "myrouter" into your web browser address box to access the router settings page. --Bavi H (talk) 03:53, 16 May 2012 (UTC) * My mother is so paranoid about losing our Internet connection that she won't give me the password. Well, she doesn't know it, but she could probably find out if she were so inclined. I realise this is nothing you can help with, just thought I'd let you know, in case I don't come back. <IP_ADDRESS> (talk) 18:01, 15 May 2012 (UTC) * Since you can't disable the local DNS server in the router, another possible idea is to change the DNS server address the computer uses. Go to <IP_ADDRESS> and see if your router shows a status page without needing to log in. If the ISP DNS server addresses appear on that page, you can make a note of them, then change the DNS server settings in your computer to use the ISP DNS servers for a test period. You might want to print the steps out. (If you put in incorrect DNS server addresses, then your computer can't make connections to name addresses, and the webpage with the steps would be inaccessible.) If you want to undo the settings, go back to the same place and change it back to "Obtain DNS server address automatically." If you decide to leave the settings in place for a while, remember that if you ever experience connection issues in the future (or change ISPs or locations) you should change the setting back to automatically obtain the DNS address. --Bavi H (talk) 03:37, 16 May 2012 (UTC) * For your symptoms (existing connections continue fine, new connections fail), my hypothesis was that your router's local DNS server may periodically have some internal problem causing DNS requests to fail until you power cycle your router to restart it. To test that hypothesis, my idea was to bypass the router's local DNS server and see if sending DNS requests directly to your ISP DNS server worked more reliably for you. * Your classmate may not have been aware the router was doing DNS as a middle man, so they suspected Sky's DNS servers were flaky and suggested you use another DNS provider. You might want to try DNS lookups directly to Sky's DNS servers first (bypassing the router's local DNS). If you still have problems, then you might decide to test another DNS provider. --Bavi H (talk) 04:35, 16 May 2012 (UTC) CSS: fieldset and div automatic width difference Question to follow: Why do all major browsers apply different widths to the fieldset and the second div? Or rather, how can I make that div the same width as the fieldset that precedes it (without wrapping it in one and preferably without relying on the fact that the width of the right hand column - 220px - is a known figure)? The same effect occurs even if I copy styles such that the only "computed style" difference Firebug reports is width. Thanks, - Jarry1250 [Deliberation needed] 20:44, 14 May 2012 (UTC) * Probably quirks mode from not starting your source with, for starters. ¦ Reisio (talk) 21:47, 14 May 2012 (UTC) * Well yes, obviously my actual code does actually have a doctype, the addition of which to my test code does not unfortunately resolve the issue. - Jarry1250 [Deliberation needed] 21:52, 14 May 2012 (UTC) * Firstly, you're making assumptions about the default styles of the fieldset vs div tags - it's likely that the fieldset gets default padding (see the html doc). In general, excepting div and span tags, you can't assume browsers will give them the same default style, and have to either set them yourself or use a stylesheet that zaps all the css. Secondly, if you want two block level elements to have the same width, you have two choices - explicitly set the width of both to be the same, or wrap them with another block level element. You can't, in CSS, say "make me the same with as otherblock N". You can do it in JavaScript, but that's dumb. <IP_ADDRESS> (talk) 21:58, 14 May 2012 (UTC) * Agreed. Actually, the solution I found here was to use "overflow:auto; padding:2px;", which prompts the div to begin a new Block Formatting Context (whatever one of those is), which makes it behave in the same way as a fieldset (i.e. respecting the confines of that div on the right. I don't pretend to understand, but it works, anyhow. - Jarry1250 [Deliberation needed] 22:11, 14 May 2012 (UTC) hacking cell phone number I'm not sure if I should be asking this in this forum or another one but here goes: If I text someone they can see my phone number. My question is: can a scammer hack my cell phone number based on recieving a text from me? <IP_ADDRESS> (talk) 20:49, 14 May 2012 (UTC) * I'm not sure what "hack" means here. They will know your cell phone number, unless your phone has the option to hide your phone number, and this is the setting when you send the text. StuRat (talk) 20:55, 14 May 2012 (UTC) Sorry. I should have been clearer. What I am asking is if I text someone and they then can see my cell number, can they then send texts and/or make phone calls using my cell number via their own phone? <IP_ADDRESS> (talk) 22:08, 14 May 2012 (UTC) * That's called spoofing. See that article for a discussion of when this is possible. (Of course, they already have your number, if you didn't block it, as mentioned in my previous post.) StuRat (talk) 23:52, 14 May 2012 (UTC) * Bear in mind that if you do manage to hide your number on outgoing texts, your texts will be a) probably blocked by the network as spoofed (ie, they think you're doing exactly the thing you're worried about other people doing), and b) impossible for the recipient to reply to. :) FiggyBee (talk) 01:41, 15 May 2012 (UTC) * Perhaps one of the former staff of News of the World could answer this question? <IP_ADDRESS> (talk) 14:13, 15 May 2012 (UTC) * Let me just look through their cell phone messages to see if any discussed this... :-) StuRat (talk) 17:05, 15 May 2012 (UTC) * Note that spoofing Caller ID is not the same as using somebody else's cell number. My understanding is that this is either impossible or very difficult, because each individual phone has a unique identifier built into its hardware, which identifies that individual phone to the cell network but is not transmitted to people who receive calls. To hack in as a different phone, a hacker would have to know the hardware ID of that phone, and Caller ID is not going to be useful for that. Looie496 (talk) 00:19, 16 May 2012 (UTC) Thanks, everyone. As usual, Wikipedia is the place to go! <IP_ADDRESS> (talk) 01:51, 16 May 2012 (UTC) * You're welcome. I'll mark this Q resolved. StuRat (talk) 16:19, 16 May 2012 (UTC) Windows 7 network problem I've been having some networking problems. I'm on a Windows 7 (W7) computer, with two W7 computer on the network. One I can't access now. The other one has two internal hard drives, and I can access both of them. I moved a printer and an external HD to that computer. The printer can be accessed fine. The external HD cannot - it says "Windows cannot access ... you do not have permission ...". When I click on that computer in Network, all of the drives are shown, but only the external one gives that message. The external HD has exactly the same sharing options as the two internal HDs that work. I checked the general sharing options, network detection, etc, and they seem right too. Why wouldn't the external HD be shared properly? Bubba73 You talkin' to me? 23:30, 14 May 2012 (UTC) * Check the permissions by right clicking, security. Make sure that they are set correctly. Mr Little Irish (talk) 申 12:44, 15 May 2012 (UTC) * Properties/sharing/advanced sharing - yes they are set correctly. It still doesn't work on that drive. Bubba73 You talkin' to me? 14:45, 19 May 2012 (UTC)
WIKI
LG will unveil its new V20 phone on September 6th LG sent out invitations this week to an event in San Francisco on September 6th where it plans to unveil its new V20 phone. The invite asks participants to "play more," and says "the second story begins." Here we go. LG already confirmed in an earlier teaser that the followup to 2015's second flagship phone will come with Android Nougat. Last year’s massive V10 came with two screens, one of which was a 5.7-inch QHD display and the other a smaller always-on screen. It also included two five-megapixel front-facing cameras, which came with varying fields of view. The cameras ended up creating noteworthy photos, although the rest of the specs weren’t all that special. Who knows what LG is thinking about this year; maybe we’ll get three front-facing cameras and three screens!
NEWS-MULTISOURCE