Document
stringlengths
87
1.67M
Source
stringclasses
5 values
USRP Hardware Driver and USRP Manual  Version: 4.0.0.0-216-g1f83ce199 UHD and USRP Manual Python API UHD supports a Python API, in case the C++ or C APIs are not the right solution for your application. Installing the Python API In order to install the Python API when building UHD from source, make sure you have the CMake variable ENABLE_PYTHON_API set to ON (e.g., by running cmake -DENABLE_PYTHON_API=ON). UHD requires Python header files in order to compile the Python API. On most Linux systems, there are packages called "python3-dev" or "python3-devel" that provide that functionality. On Windows, these headers always get installed when using the binary installers provided on https://www.python.org/downloads/windows/. If CMake can't find the Python headers or library, specify the PYTHON_INCLUDE_DIR and/or PYTHON_LIBRARY CMake variables manually. Note that since UHD version 4.0.0.0, Python 2 is no longer supported. Installing on Windows Static linking on is unsupported on Windows. Otherwise, compiling the Python API on Windows is no different from other operating systems. Note that you may have to set the PYTHONPATH environment variable to ensure that Python is able to find the UHD package. For example, if the UHD install base path is C:\Program Files (x86)\UHD: set PYTHONPATH=%PYTHONPATH%;C:\Program Files (x86)\UHD\lib\site-packages Python 3.8 Note: If you receive an error similar to this when running import uhd in Python 3.8 and above on Windows: ImportError: DLL load failed while importing libpyuhd: The specified module could not be found. this indicates a problem finding one or more of the DLLs that the UHD Python module depends on to load correctly. Python 3.8 includes a change to the paths Windows searches when attempting to find a module's dependent DLLs. To ensure that Python is able to find and load the DLLs required to import the UHD module, it is advised that the uhd.dll and libusb-1.0.dll (if UHD was build with USB support) DLLs be copied to one of the following directories: • The %windows%\system32 directory • The directory where the Python UHD package is installed (by default, this is C:\Program Files (x86)\UHD\lib\site-packages\uhd • The directory from which the Python executable is run • Paths added to the import extension module DLL search path via Python's os.add_dll_directory function Advanced Usage Notes UHD uses the PyBind11 library to generate its Python bindings. UHD ships its own copy of PyBind11, in order to facilitate the access to that library, as it is not packaged for many operating systems, but also to lock down its version. For the purpose of experimentation, it is, however possible to replace the version of PyBind11 shipped with UHD by overriding the PYBIND11_INCLUDE_DIR CMake variable. Using the Python API The Python API mirrors the C++ API, so the C++ reference manual can be used to understand the behaviour of the Python API as well. Names in the Python API have been modified to follow a PEP8-compatible naming convention, for example, uhd::usrp::multi_usrp in C++ corresponds to uhd.usrp.MultiUSRP in Python (this makes UHD/Python code implicitly compatible with most linters, but it also has the side-effect of hiding symbols that get imported from the C++ domain). The following two snippets are equivalent. First the C++ version: // ... auto usrp = uhd::usrp::multi_usrp::make("type=b200"); usrp->set_rx_freq(100e6); Now the Python version: import uhd # ... usrp = uhd.usrp.MultiUSRP("type=b200") usrp.set_rx_freq(100e6) Not all API calls from the C++ API are also supported in the Python API, and the Python API has some additional functions that are not available in C++, but for the most part, the uhd::usrp::multi_usrp API is identical. One-off transmit/receive applications A common type of Python-based SDR applications are those which produce or consume a limited number of samples. For example, an application could receive a second's worth of samples, then do offline processing, print the result, and exit. For this case, convenience API calls were added to the Python API. The following snippet is an example of how to store 1 second of samples acquired at 1 Msps: import uhd def recv_to_file(): """RX samples and write to file""" usrp = uhd.usrp.MultiUSRP("type=b200") num_samps = 1e6 if not isinstance(args.channels, list): args.channels = [args.channels] samps = usrp.recv_num_samps( 1e6, # Number of samples 2.4e9, # Frequency in Hz 1e6, # Sampling rate [0], # Receive on channel 0 80, # 80 dB of RX gain ) samps.tofile('samples.dat') This kind of API is particularly useful in combination with Jupyter Notebooks or similar interactive environments. Thread Safety and the Python Global Interpreter Lock From the Python wiki page on the GIL: In CPython, the global interpreter lock, or GIL, is a mutex that protects access to Python objects, preventing multiple threads from executing Python bytecodes at once. During some performance-critical function calls, the UHD Python API releases the GIL, during which Python objects have their contents modified. The functions calls which do so are uhd::rx_streamer::recv, uhd::tx_streamer::send, and uhd::tx_streamer::recv_async_msg. To be clear, the functions listed here violate the expected contract set out by the GIL by accessing Python objects (from C++) without holding the GIL. This is necessary to achieve rates similar to what the C++ API can provide. To this end, users must ensure that the Python objects accessed by the listed functions are handled with care. In simple, single threaded applications, this won't require any extra work. However, in more complicated and/or multi- threaded applications, steps must be taken to avoid thread-unsafe behavior. For example, if an application needs to call recv() in one thread, and access the sample buffer from another thread, a synchronization method (ie. a mutex) must be used to safeguard access to that buffer.
ESSENTIALAI-STEM
STATE OF CONNECTICUT v. JOSE AYUSO (AC 26360) Flynn, C. J., and Harper and Peters, Js. Argued September 18, 2007 officially released January 15, 2008 Stephanie L. Evans, special public defender, for the appellant (defendant). Harry D. Weller, senior assistant state’s attorney, with whom, on the brief, was James E. Thomas, former state’s attorney, for the appellee (state). Opinion FLYNN, C. J. The defendant, Jose Ayuso, appeals from the judgment of conviction, rendered after a jury trial, of two counts of assault in the first degree in violation of General Statutes § 53a-59 (a) (5), and one count each of attempt to commit assault in the first degree in violation of General Statutes §§ 53a-49 (a) (2) and 53a-59 (a) (5), carrying a pistol without a permit in violation of General Statutes § 29-35 and criminal possession of a firearm in violation of General Statutes § 53a-217 (a) (1). On appeal, the defendant claims that (1) his constitutional rights were violated (a) by a witness’ assertion of an invalid fifth amendment privilege against self-incrimination or, alternatively, (b) by the failure of the trial court to compel the state to grant that witness immunity, (2) the prosecutor engaged in impropriety that deprived him of a fair trial and (3) the evidence was insufficient to support his conviction for one of the counts of assault in the first degree. We affirm the judgment of the trial court. The jury reasonably could have found the following facts. On June 5, 2003, at approximately 1 a.m., Officers Tishay Johnson and Victor Otero and Sergeant Gerry Pleasant of the Hartford police department were working undercover to target street crimes in Hartford and were patrolling the city in an unmarked, two door Toyota Tercel. At that time, the undercover officers received a radio dispatch, directing them to investigate the 500 block of Zion Street for loitering and narcotics sales. Johnson then drove northbound on Zion Street, turning right onto Park Street. Johnson entered a driveway located between 835 and 853 Park Street and parked the vehicle in the rear parking lot. After Johnson parked the vehicle, the defendant, who had been standing underneath a nearby tree, approached the driver’s side of the vehicle. Pleasant immediately recognized the defendant from previous encounters. Johnson rolled down the window, and the defendant asked Johnson what he needed. In response, Johnson asked the defendant what he had. The defendant then looked inside the vehicle at Otero, who was sitting in the backseat, and at Pleasant, who was sitting in the front passenger seat, and then stepped away from the vehicle. Pleasant and Johnson, who still were seated in the front seat, heard the defendant load his gun, which was a .40 caliber dock semiautomatic handgun. Johnson also observed the defendant point the gun at him. As Johnson was exiting the vehicle, the defendant fired two gunshots in Johnson’s direction, one of which struck the bulletproof vest that Johnson was wearing underneath his clothes. The defendant continued to shoot as he moved away from the vehicle, and the officers also fired their .45 caliber semiautomatic handguns. During this time, the defendant shot Otero several times. Johnson briefly chased the defendant down Park Street; however, Johnson returned to the parking lot after exhausting his supply of ammunition. Pleasant then notified the police dispatcher of the situation, providing a description of the defendant, and requested an ambulance. Johnson, who was experiencing pain in his ribs, and Otero, who was bleeding from his abdomen, lay on the ground and waited to be taken to a hospital. Although the defendant had sought refuge in a nearby apartment building on Mortson Street, responding officers, having been informed of the defendant’s whereabouts by a resident of the apartment building, eventually located and arrested him. The police also located the defendant’s .40 caliber Glock handgun in an apartment on Mortson Street. The defendant later was brought to the hospital so that the officers could identify him. Johnson made a positive identification of the defendant. Thereafter, the state charged the defendant with three counts of attempt to commit murder in violation of General Statutes §§ 53a-49 (a) (2) and 53a-54a, two counts of assault in the first degree in violation of § 53a-59 (a) (5), three counts of assault of a peace officer in violation of General Statutes § 53a-167c (a) (1) and one count each of attempt to commit assault in the first degree in violation of §§ 53a-49 (a) (2) and 53a-59 (a) (5), carrying a pistol without a permit in violation of § 29-35 and criminal possession of a firearm in violation of § 53a-217 (a) (1). On December 15, 2004, the jury found the defendant guilty of two counts of assault in the first degree and one count each of attempt to commit assault in the first degree, carrying a pistol without a permit and criminal possession of a firearm. The jury found the defendant not guilty of the other charges. Subsequently, the court imposed a total effective sentence of forty-one years incarceration, with a two year mandatory minimum sentence to serve. Additional facts will be set forth where necessary. I FIFTH AMENDMENT PRIVILEGE AGAINST SELF-INCRIMINATION CLAIMS The defendant raises multiple claims regarding the assertion by a witness, Angel Rosa, of his fifth amendment privilege against self-incrimination. On appeal, the defendant claims that he was deprived of his constitutional right to compulsory process to produce witnesses on his behalf under the sixth amendment to the United States constitution and that he was forced to waive his constitutional right to remain silent under the fifth amendment. The defendant argues that his constitutional rights were violated by Rosa’s assertion of an invalid fifth amendment privilege against self-incrimination and, in the alternative, by the court’s refusal to compel the prosecution to grant the witness immunity. We are not persuaded by any of the defendant’s contentions. The following additional facts are relevant to our resolution of the defendant’s claims. During trial, the defendant sought to call Rosa, a convicted drug dealer, as a defense witness to support his theory of self-defense. At that time, Rosa was serving a nine year sentence and a one year concurrent sentence for two counts of possession of narcotics with intent to sell and one count of interfering with a police officer; all of the charges related to the sale of narcotics on Zion Street in Hartford and at Rosa’s place of business on Zion Street. The defendant wanted Rosa to testify about the multiple disputes he had with the defendant on June 4, 2003, on Zion Street. According to the defendant, Rosa had accused him of being a snitch, had threatened him and had told him that he should carry his gun. Outside the presence of the juiy, the court confirmed that Rosa had consulted with his attorney and then asked Rosa whether he wanted to testify. In response, Rosa stated that he wanted to invoke his fifth amendment right. After the court reminded Rosa that he could confer with his attorney, defense counsel indicated that he wanted to voir dire Rosa. The court granted the request, and Rosa took the witness stand. Defense counsel began his voir dire of Rosa, outside of the jury’s presence, by asking him whether he owned a store on Zion Street, to which Rosa replied that he did own a store. Then, defense counsel asked Rosa to provide the name of the store, and Rosa stated that he did not own the store and that it was his parents’ store. After defense counsel asked Rosa whether his parents owned the store, Rosa invoked his fifth amendment privilege against self-incrimination. Defense counsel then questioned Rosa about whether answering the question would incriminate him in any way, to which Rosa refused to answer and again asserted his fifth amendment privilege. Rosa also declined to answer defense counsel’s questions about the defendant and the events of June 4, 2003, and, instead, invoked his fifth amendment privilege. Thereafter, defense counsel requested that Rosa be immunized. Defense counsel also objected to Rosa’s invocation of his fifth amendment privilege, arguing that there was no possibility of prosecution. After hearing argument from both parties, the court ruled against the defendant with respect to his request for an order of immunity and his objection to Rosa’s assertion of his fifth amendment privilege. A First, the defendant contends that Rosa invoked an invalid fifth amendment privilege against self-incrimination that deprived the defendant of his constitutional right to compulsory process to produce witnesses under the sixth amendment to the federal constitution. The defendant argues that the court improperly upheld Rosa’s invocation of the right against self-incrimination because there was no possibility that Rosa could have been subjected to prosecution. We disagree. Our Supreme Court has stated that a valid fifth amendment privilege against self-incrimination prevails over a defendant’s right to compel a witness’ testimony on his behalf. State v. Simms, 170 Conn. 206, 209, 365 A.2d 821, cert. denied, 425 U.S. 954, 96 S. Ct. 1732, 48 L. Ed. 2d 199 (1976). Accordingly, we must first ascertain whether Rosa had a valid fifth amendment right to assert. If Rosa’s invocation of his fifth amendment privilege was valid, the defendant’s sixth amendment right to compulsory process must give way, and he will have failed to state a constitutional claim on appeal. See State v. Mourning, 104 Conn. App. 262, 276, 934 A.2d 263 (2007); see also State v. Simms, supra, 209-10. “A ruling on the validity of a witness’ fifth amendment privilege is an evidentiary determination that this court will review under an abuse of discretion standard. . . . It is well settled that the trial court’s evidentiary rulings are entitled to great deference. . . . The trial court is given broad latitude in ruling on the admissibility of evidence, and we will not disturb such a ruling unless it is shown that the ruling amounted to an abuse of discretion.” (Internal quotation marks omitted.) State v. Mourning, supra, 104 Conn. App. 276. “The standard for determining whether to permit invocation of the privilege against self-incrimination is well established. To reject invocation it must ‘be perfectly clear, from a careful consideration of all the circumstances in the case, that the witness is mistaken, and that the answer[s] cannot possibly have [a] tendency to incriminate’ the witness. . . . The right to the privilege ‘does not depend on the likelihood of prosecution but upon the possibility of prosecution.’ ” (Citations omitted; emphasis in original.) State v. Giraud, 258 Conn. 631, 640, 783 A.2d 1019 (2001). Our Supreme Court also has stated that “[t]o sustain the privilege, it need only be evident from the implications of the question, in the setting in which it is asked, that a responsive answer to the question or explanation of why it cannot be answered might be dangerous because injurious disclosure could result.” (Internal quotation marks omitted.) State v. Simms, supra, 170 Conn. 209. In other words, one does not have to disclose how he might incriminate himself in order to assert the fifth amendment privilege. Defense counsel objected to Rosa’s assertion of his fifth amendment right. The court clarified that defense counsel intended to question Rosa about the confrontations he had with the defendant on Zion Street. Defense counsel informed the court that he sought to have Rosa testily about his belief that the defendant was a police informant, who had “snitched” on him, and that he had threatened the defendant. According to defense counsel, the evidence he sought from Rosa did not pertain to his drug dealing, but rather to his confrontations with the defendant in which he had made threats, and, therefore, Rosa’s answers could not have subjected him to prosecution because, at the time of trial, the statute of limitations already had run for the crime of threatening. The court, in exploring the basis for Rosa’s refusal to testify, reiterated that Rosa was a convicted drug dealer in the Zion Street neighborhood and stated that “the questions on cross-examination could certainly get into his business competition, potentially with the defendant, and a whole bunch of other things.” The prosecutor then argued outside of Rosa’s presence that there was a possibility that Rosa’s testimony regarding his disputes with the defendant on Zion Street could reveal other criminal conduct, exposing him to prosecution. In the present case, it was not perfectly clear from all the circumstances that the answers could not possibly have a tendency to incriminate the witness. It is well established that “[t]he fifth amendment extends to disclosures that merely ‘furnish a link in the chain of evidence needed to prosecute the claimant for a . . . crime.’ . . . Hoffman v. United States, 341 U.S. 479, 486, 71 S. Ct. 814, 95 L. Ed. 1118 (1951)____” (Citation omitted; emphasis in original.) State v. Brown, 22 Conn. App. 521, 526, 577 A.2d 1120, cert. denied, 216 Conn. 825, 582 A.2d 204 (1990). After a colloquy with the attorneys, the court ruled that Rosa was permitted to invoke his fifth amendment privilege. Answers to defense counsel’s questions pertaining to events that occurred on Zion Street involving the defendant and Rosa could have provided a “link in the chain of evidence” and put Rosa at risk for additional prosecutions for crimes. Moreover, “a witness may properly refuse to respond to a question posed on direct examination where an answer could expose him to the risk of self-incrimination on cross-examination.” Id. In the present case, if Rosa had testified, the prosecutor would have been allowed to cross-examine him on matters related to credibility. See id. For example, questions properly could have included inquiries into Rosa’s drug dealing on Zion Street, as the court had acknowledged in ruling that the invocation of the privilege was valid, and also into Rosa’s reasons for engaging in disputes with the defendant. In fact, the prosecutor indicated that he would cross-examine Rosa on “an abundance of subjects . . . that might very well relate to criminal conduct for which he could be held responsible . . . .” Accordingly, we conclude that the defendant’s constitutional rights were not violated and that the court did not abuse its discretion in permitting Rosa to invoke his fifth amendment privilege against self-incrimination. B The defendant also claims, in the alternative, that the court improperly denied his request to have the court order the state to grant immunity to Rosa. The defendant acknowledges that pursuant to General Statutes § 54-47a, the prosecutor, and not the court, has the authority to compel the testimony of a witness through a grant of immunity. N evertheless, the defendant asserts that his right to compulsory process was violated by the court’s failure to compel the prosecution to immunize Rosa and urges this court to apply the prosecutorial misconduct theory to his claim. We disagree and conclude that the court properly declined the defendant’s request. As a threshold matter, we must first determine the applicable standard of review that governs our examination of the defendant’s claim. “The issue of whether a defendant’s rights to due process and compulsory process require that a defense witness be granted immunity is a question of law and, thus, is subject to de novo review. . . . “[A] defendant has a right under the compulsory process and due process clauses to present [his] version of the facts as well as the prosecution’s to the jury so [that] it may decide where the truth lies. . . . The compulsory process clause of the sixth amendment generally affords an accused the right to call witnesses whose testimony is material and favorable to his defense .... “[Section] 54-47a authorizes the prosecution to grant immunity to state witnesses under certain circumstances. [Our Supreme Court] explicitly [has] held that § 54-47a confers no such authority upon the courts with regard to defense witnesses. . . . Indeed, [our Supreme Court] has held repeatedly that there is no authority, statutory or otherwise, enabling a trial court to grant immunity to defense witnesses. . . . We have no occasion to revisit those holdings today. “We recognize that other courts have held that under certain compelling circumstances the rights to due process and compulsory process under the federal constitution require the granting of immunity to a defense witness. The federal Circuit Courts of Appeals have developed two theories pursuant to which the due process and compulsory process clauses entitle defense witnesses to a grant of immunity. They are the effective defense theory, and the prosecutorial misconduct theory. .. . “The prosecutorial misconduct theory of immunity is based on the notion that the due process clause [constrains] the prosecutor to a certain extent in [the] decision to grant or not to grant immunity. . . . Under this theory, however, the constraint imposed by the due process clause is operative only when the prosecution engages in certain types of misconduct, which include forcing the witness to invoke the fifth amendment or engaging in discriminatory grants of immunity to gain a tactical advantage, and the testimony must be material, exculpatory and not cumulative, and the defendant must have no other source to get the evidence.” (Citation omitted; internal quotation marks omitted.) State v. Kirby, 280 Conn. 361, 403-404, 908 A.2d 506 (2006); State v. Holmes, 257 Conn. 248, 252-55, 777 A.2d 627 (2001), cert. denied, 535 U.S. 939, 122 S. Ct. 1321, 152 L. Ed. 2d 229 (2002). The defendant, citing United States v. Burns, 684 F.2d 1066 (2d Cir. 1982), cert. denied, 459 U.S. 1174, 103 S. Ct. 823, 74 L. Ed. 2d 1019 (1983), argues that the prosecutorial misconduct theory of immunity is applicable to the present case because “[t]he prosecutor, through his own overreaching, forced Angel Rosa to invoke the Fifth Amendment,” and, therefore, Rosa should have been immunized. According to the defendant, the prosecutor suggested that Rosa might incriminate himself, which was an “intentional act of intimidation and manipulation designed to distort and impair the fact-finding process by withholding exculpatory evidence from the juiy in order to gain a tactical advantage.” Our review of the record reveals, however, that the prosecutor did not force Rosa to invoke his fifth amendment privilege. Contrary to the defendant’s contention, the prosecutor did not suggest to Rosa that he could incriminate himself by testifying, nor did he instruct Rosa to invoke his fifth amendment right. Outside of the jury’s presence, the court informed Rosa that the attorneys wanted to ask him some questions and that if he chose to testify, he also would testify before the jury on the following day. Rosa, on his own initiative, then stated that he wanted to assert his fifth amendment right. Thereafter, Rosa took the witness stand, and defense counsel began voir dire. Rosa answered two of defense counsel’s questions before invoking his fifth amendment privilege. After Rosa invoked his right, defense counsel specifically asked Rosa whether answering the questions would incriminate him. At that time, the prosecutor still remained silent. Rosa then was excused from the witness stand. Despite the defendant’s assertion to the contrary, the prosecutor had done nothing to encourage Rosa’s assertion of his fifth amendment right. The prosecutor and defense counsel then began their arguments on defense counsel’s objection to Rosa’s invocation of his fifth amendment right and defense counsel’s request for the immunization of Rosa. We therefore fail to see how the prosecutor engaged in overreaching. Because we do not agree with the defendant that the prosecutor engaged in misconduct, we need not decide whether the prosecu-torial misconduct theory is a “correct application of the due process or compulsory process clause.” State v. Holmes, supra, 257 Conn. 255. II PROSECUTORIAL IMPROPRIETY CLAIMS The defendant next claims that he was deprived of a fair trial as a result of prosecutorial impropriety. First, the defendant claims that the prosecutor engaged in impropriety during cross-examination of the defendant. The defendant also challenges several remarks made by the prosecutor during rebuttal argument to the jury. We disagree. As a preliminary matter, we set forth the legal principles that govern our resolution of claims of prosecutorial impropriety. “In analyzing claims of prosecutorial impropriety, we engage in a two step analytical process. . . . The two steps are separate and distinct. . . . We first examine whether prosecutorial impropriety occurred. . . . Second, if an impropriety exists, we then examine whether it deprived the defendant of his due process right to a fair trial.” (Citations omitted.) State v. Fauci, 282 Conn. 23, 32, 917 A.2d 978 (2007). If we conclude that prosecutorial impropriety has occurred, we then must determine, by applying the six factors enumerated in State v. Williams, 204 Conn. 523, 540, 529 A.2d 653 (1987), whether the entire trial was so infected with unfairness as to deprive the defendant of his due process right to a fair trial. See State v. Schiavo, 93 Conn. App. 290, 302, 888 A.2d 1115, cert. denied, 277 Conn. 923, 895 A.2d 797 (2006). These factors include the extent to which the misconduct was invited by defense conduct, the severity of the misconduct, the frequency of the misconduct, the centrality of the misconduct to the critical issues in the case, the effectiveness of the curative measures adopted and the strength of the state’s case. State v. Williams, supra, 540. At trial, the defendant failed to object to all of the alleged instances of prosecutorial impropriety that he takes issue with on appeal. “Once prosecutorial impropriety has been alleged, however, it is unnecessary for a defendant to seek to prevail under State v. Golding, 213 Conn. 233, 239-40, 567 A.2d 823 (1989), and it is unnecessary for an appellate court to review the defendant’s claim under Golding. . . . The reason for this is that the touchstone for appellate review of claims of prosecutorial [impropriety] is a determination of whether the defendant was deprived of his right to a fair trial, and this determination must involve the application of the factors set out by this court in State v. Williams, [supra, 204 Conn. 540].” (Citation omitted; internal quotation marks omitted.) State v. Fauci, supra, 282 Conn. 33. Having set forth the applicable legal principles, we now examine each of the challenged remarks in turn. A The defendant contends that the prosecutor, in cross-examination of the defendant, improperly highlighted the unavailability of Rosa by repeatedly asking questions about the threats that Rosa allegedly made to the defendant. The following additional facts are necessary to resolve this claim. During direct examination, the defendant testified that on June 4, 2003, he had multiple encounters with Rosa in the Zion Street neighborhood. The defendant further testified that Rosa had accused him of being a snitch and that a dispute ensued. According to the defendant, Rosa also had threatened him and had told him that he had better carry his gun. In addition, the defendant stated that, after the confrontation with Rosa, he observed several of Rosa’s friends enter a store that he believed Rosa owned, and, as a result, he believed that Rosa was planning on retaliating against him. The defendant’s testimony on direct examination also indicated that he had believed that the situation involving the undercover officers was connected to the disputes with Rosa. On cross-examination, the prosecutor questioned the defendant about being threatened by Rosa and about his actions following the confrontations with Rosa. Our Supreme Court often has stated that “[prosecutorial [impropriety] may occur in the course of cross-examination of witnesses . . . .” (Citations omitted.) State v. Williams, supra, 204 Conn. 538-39. We conclude, however, that the prosecutor’s questions during the defendant’s cross-examination were not improper. The subject of the threats allegedly made by Rosa was broached first by defense counsel during direct examination, and, therefore, the prosecutor properly could inquire further into that subject matter. See State v. Vazquez, 79 Conn. App. 219, 226-28, 830 A.2d 261, cert. denied, 266 Conn. 918, 833 A.2d 468 (2003). B The defendant also claims that the prosecutor engaged in several instances of impropriety during rebuttal argument. Specifically, the defendant argues that the prosecutor improperly tried to bolster the credibility of Johnson by appealing to the jury’s emotions and by discussing unchecked and unsworn testimony. In addition, the defendant argues that the prosecutor improperly mischaracterized the evidence and referred to an unavailable witness. We disagree. Because the defendant’s remaining claims of prosecutorial impropriety concern remarks that the prosecutor made in rebuttal arguments, we briefly note that “ [p]rosecutorial [impropriety] of a constitutional magnitude can occur in the course of closing [and rebuttal] arguments.” (Internal quotation marks omitted.) State v. Skakel, 276 Conn. 633, 744-45, 888 A.2d 985, cert. denied, 549 U.S. 1030, 127 S. Ct. 578, 166 L. Ed. 2d 428 (2006). 1 The defendant claims that the prosecutor improperly tried to sway the emotions of the jury by characterizing Johnson’s description of the laser sight of the defendant’s handgun pointed at his head as “chilling” and by stating that the defendant tried to kill the officers and almost killed Johnson. We are not persuaded. “A prosecutor may not appeal to the emotions, passions and prejudices of the jurors. . . . When the prosecutor appeals to emotions, he invites the jury to decide the case, not according to a rational appraisal of the evidence, but on the basis of powerful and irrelevant factors which are likely to skew that appraisal.” (Internal quotation marks omitted.) State v. Warholic, 278 Conn. 354, 376, 897 A.2d 569 (2006). The prosecutor’s statement, in which he characterized Johnson’s testimony about having a gun pointed directly at his head as “chilling,” was not improper argument. The comment, which was made in response to defense counsel’s closing argument, was based on the evidence adduced at trial, in which Johnson described the laser sight of the gun being aimed at him. After reviewing the record, we also cannot conclude that the prosecutor’s statements that the defendant “tried to kill these people” and that Johnson was “almost . . . killed” were unsupported by the evidence presented at trial. Johnson provided testimony about how the defendant had fired his gun at the police vehicle and had pointed the gun at Johnson’s head. The jury also heard from Otero, who testified that he had sustained serious injuries as a result of the bullets fired from the defendant’s gun. Furthermore, the defendant testified that he had shot at the parked vehicle, emptying his gun. In light of the testimony from the officers and from the defendant himself, we conclude that the prosecutor’s rebuttal remarks constituted fair comment on inferences which could have been drawn from the evidence to support, for example, the intent element of some of the crimes with which the defendant was charged. See State v. Medina, 228 Conn. 281, 303, 636 A.2d 351 (1994) (“[ijntent may be inferred from the nature of any weapons used, the manner in which they were used and the nature and number of wounds inflicted” [internal quotation marks omitted]). 2 Next, the defendant argues that several remarks made during the prosecutor’s rebuttal argument amounted to unsworn testimony. The defendant argues that it was improper for the prosecutor to state that the defendant never called the police “because [he] knew the police were already there.” In addition, the defendant challenges several instances in which the prosecutor referred to Johnson’s state of mind at the time of the shooting. We are not persuaded. “In reviewing the defendant’s claim that the state improperly presented unsworn testimony to the jury during its [rebuttal] argument, we recognize that a prosecutor properly may ask the jury to draw reasonable inferences on the basis of the evidence at trial.” State v. Skidd, 104 Conn. App. 46, 68, 932 A.2d 416 (2007). “We must give the jury the credit of being able to differentiate between argument on the evidence and attempts to persuade [it] to draw inferences in the state’s favor, on one hand, and improper unsworn testimony, with the suggestion of secret knowledge, on the other hand.” (Internal quotation marks omitted.) State v. Richardson, 86 Conn. App. 32, 41, 860 A.2d 272 (2004), cert. denied, 273 Conn. 907, 868 A.2d 748, cert. denied, 545 U.S. 1107, 125 S. Ct. 2550, 162 L. Ed. 2d 281 (2005). The prosecutor’s statement during rebuttal argument that the defendant knew that the undercover officers were police did not suggest to the jury that the prosecutor possessed secret knowledge. The prosecutor, in challenging the defendant’s version of the events, merely was asking the jury to draw a reasonable inference from the evidence. Pleasant had testified that he knew the defendant from previous encounters. Testimony also indicated that after the defendant had looked inside the parked vehicle, he immediately stepped away and pulled out his gun. The prosecutor, therefore, was arguing an inference that the jury reasonably could draw from the evidence. “Remarks that are nothing more than a permissible appeal to the jurors’ common sense do not constitute prosecutorial [impropriety].” State v. Lindo, 75 Conn. App. 408, 416, 816 A.2d 641, cert. denied, 263 Conn. 917, 821 A.2d 771 (2003). Further, we note that “[t]here is also no rule that precludes a prosecutor from challenging the defendant’s account.” State v. Farr, 98 Conn. App. 93, 108, 908 A.2d 556 (2006). We conclude that the prosecutor’s remark was not improper. With respect to the challenged remarks about Johnson’s state of mind at the time of the shooting, we conclude that the prosecutor’s comments did not constitute improper unsworn testimony. In addition to hearing the defendant testify about how he had fired his gun at the undercover police vehicle, the jury heard from Johnson regarding his observations of the defendant loading the gun and pointing it at his head at close range. Johnson also testified that he momentarily “froze,” before his “body . . . [and mind] identified” the situation as a threat. Johnson further testified that after being shot, he “was hurting, but the threat was still there so [I decided] to fight through the pain.” The prosecutor’s comments about how Johnson, who just had been shot, was nervous and was not thinking clearly, underscored an inference that the jury could have drawn on its own, on the basis of the evidence presented. The challenged remarks did not suggest that the prosecutor had secret knowledge. Moreover, “[j]urors are not expected to lay aside matters of common knowledge or their own observation and experience of the affairs of life, but, on the contrary, to apply them to the evidence or facts in hand, to the end that their action may be intelligent and their conclusions correct.” (Internal quotation marks omitted.) State v. Guadalupe, 66 Conn. App. 819, 826, 786 A.2d 494 (2001), cert. denied, 259 Conn. 907, 789 A.2d 996 (2002). Accordingly, we conclude that the prosecutor’s comments were not improper. 3 The defendant also argues that the prosecutor improperly mischaracterized certain evidence pertaining to the ejection of the cartridge casings from the defendant’s handgun. We disagree. Specifically, the defendant takes issue with the following remarks made by the prosecutor during rebuttal argument: “The problem with counsel’s analysis of the evidence is [that] you’ve heard [Edward Jachimowicz, a firearms and tool mark examiner with the state forensic science laboratory] describe the action of a handgun, semiautomatic pistol, and what happened is, as that slide is vigorously forced by the escaping gases, the shell casing also is ejected violently out of the gun. Where does it go? It doesn’t just drop down. You heard how he described how the shell is ejected. It’s ejected vigorously out of the gun. Where does it go? What direction? Those shell casings could have gone anywhere. They could have hit the car behind.” (Emphasis added.) Defense counsel objected to the prosecutor’s comments, arguing that they were speculative, but the court overruled the objection. The prosecutor then proceeded with his rebuttal argument and stated that “[defense counsel] would have you believe that those shell casings just dropped out on the ground and dropped out of the gun and landed on the ground. Well, maybe that’s what did happen, but maybe when they hit the ground they bounced,” to which defense counsel again objected. (Emphasis added.) At trial, Jachimowicz testified as follows about the operation of the defendant’s handgun: “When you fire this firearm, when you pull the trigger, the gases that are generated by the cartridge would drive the bullet down the barrel, it would also force the slide rearward. As the slide went rearward, the action would open up, the fired cartridge case would be hooked by ... an extractor. It would be pulled out of the firearm to a point where it hit the ejector, and it would then be thrown out of the firearm.” (Emphasis added.) “It is well settled that a prosecutor must not comment on evidence that is not part of the record, nor is he to comment unfairly on the evidence adduced at trial so as to mislead the jury.” (Internal quotation marks omitted.) State v. Johnson, 82 Conn. App. 777, 793, 848 A.2d 526 (2004). On the basis of our review of the record, we conclude that the prosecutor’s remarks constituted fan-comment, asking the jury to draw reasonable inferences from the evidence presented at trial. We therefore conclude that the defendant’s claim that the prosecutor mischaracterized the evidence lacks merit. 4 In his final prosecutorial impropriety claim, the defendant claims that the prosecutor improperly commented on Rosa, who was an unavailable witness. The prosecutor stated during rebuttal argument that “it is not sufficient to use deadly force regardless of what happened or didn’t happen with Mr. Rosa.” Our review of the challenged remark in the context of the closing argument made by both parties reveals that the prosecutor’s comment was not improper. Contrary to the defendant’s assertion, the prosecutor did not comment on the absence of Rosa. Rather, the prosecutor merely was responding to the closing argument made by defense counsel. See State v. Galarza, 97 Conn. App. 444, 471, 906 A.2d 685 (“[a] prosecutor may respond to the argument of defense counsel during rebuttal”), cert. denied, 280 Conn. 936, 909 A.2d 962 (2006). To support his theory of self-defense, defense counsel reminded the jury during closing argument that the defendant had testified about being threatened by Rosa on the day of the incident. The prosecutor, therefore, attempted to rebut defense counsel's summation by arguing that the defendant’s testimony concerning the threats made by Rosa did not support a theory of self-defense. Ill SUFFICIENCY OF THE EVIDENCE CLAIM The defendant’s final claim is that the court improperly denied his motion for a judgment of acquittal on the ground that there was insufficient evidence to support his conviction on one of the counts of assault in the first degree. Specifically, the defendant argues that the evidence was insufficient to prove beyond a reasonable doubt that Johnson was injured by a bullet that was discharged from the defendant’s firearm. We are not persuaded. “In reviewing the sufficiency of the evidence to support a criminal conviction we apply a two-part test. First, we construe the evidence in the light most favorable to sustaining the verdict. Second, we determine whether upon the facts so construed and the inferences reasonably drawn therefrom the [finder of fact] reasonably could have concluded that the cumulative force of the evidence established guilt beyond a reasonable doubt. . . . “We note that the jury must find every element proven beyond a reasonable doubt in order to find the defendant guilty of the charged offense, [but] each of the basic and inferred facts underlying those conclusions need not be proved beyond a reasonable doubt. . . . If it is reasonable and logical for the jury to conclude that a basic fact or an inferred fact is true, the juiy is permitted to consider the fact proven and may consider it in combination with other proven facts in determining whether the cumulative effect of all the evidence proves the defendant guilty of all the elements of the crime charged beyond a reasonable doubt. . . . “Moreover, it does not diminish the probative force of the evidence that it consists, in whole or in part, of evidence that is circumstantial rather than direct. . . . It is not one fact, but the cumulative impact of a multitude of facts which establishes guilt in a case involving substantial circumstantial evidence. ... In evaluating evidence, the [finder] of fact is not required to accept as dispositive those inferences that are consistent with the defendant’s innocence. . . . The [finder of fact] may draw whatever inferences from the evidence or facts established by the evidence it deems to be reasonable and logical. . . . “Finally, [a]s we have often noted, proof beyond a reasonable doubt does not mean proof beyond all possible doubt . . . nor does proof beyond a reasonable doubt require acceptance of every hypothesis of innocence posed by the defendant that, had it been found credible by the [finder of fact], would have resulted in an acquittal. ... On appeal, we do not ask whether there is a reasonable view of the evidence that would support a reasonable hypothesis of innocence. We ask, instead, whether there is a reasonable view of the evidence that supports the [finder of fact’s] verdict of guilty.” (Internal quotation marks omitted.) State v. Lopez, 280 Conn. 779, 808-809, 911 A.2d 1099 (2007). “To convict the defendant of assault in the first degree under § 53a-59 (a) (5), the state must demonstrate with proof beyond a reasonable doubt that the defendant (1) intended to cause physical injury to another person, (2) caused such injury to such person or a third person and (3) did so by means of the discharge of a firearm.” State v. Williams, 94 Conn. App. 424, 435, 892 A.2d 990, cert. denied, 279 Conn. 901, 901 A.2d 1224 (2006). The defendant claims on appeal that there was insufficient evidence demonstrating that the discharge of his firearm caused Johnson’s injury. In support of his claim, the defendant first contends that the evidence showed that it “was virtually impossible” for Johnson to have been injured by a bullet from the defendant’s firearm because, when looking at the nine bullet entry points on the exterior of the vehicle, only one of the bullets was within striking distance of Johnson. Additionally, the defendant argues that Johnson’s testimony was not credible and should not have been believed because of inconsistencies between Johnson’s testimony at trial and his police report, as well as inconsistencies between his testimony and the testimony of the other witnesses. We do not agree. The evidence, when viewed in a light most favorable to sustaining the verdict, reveals facts from which the jury reasonably could have inferred that a bullet discharged from the defendant’s firearm caused Johnson’s injury. At trial, Johnson testified that after the defendant looked into the vehicle at the other occupants, the defendant stepped away from the vehicle, pulled out a firearm and loaded the weapon. Johnson observed the defendant, who was standing a short distance away from the vehicle, point the laser sight of the firearm directly at his head. Johnson further testified that as he was exiting the vehicle, the defendant fired two bullets in his direction, one of which struck him in the abdominal area. The jury also heard from Pleasant, who indicated that after hearing the defendant load the firearm, he heard a rapid succession of gunshots and observed the drivers’ side window shatter as Johnson exited the vehicle. The state also called Detective Timothy Shaw to testify about his investigation of the scene of the incident. Shaw testified that the police found nine spent shell casings, which were ejected from the defendant’s firearm, in the parking lot near the undercover police vehicle. During his testimony, the defendant also informed the jury about how he had pulled out his firearm and had shot ten rounds at the vehicle, emptying his gun. Johnson, who had been wearing a bulletproof vest, stated that he experienced pain and a burning sensation near the right side of his ribs immediately after the incident. As a result of being shot, Johnson testified that he had a bruise on his right abdominal area, a bruised liver and a fractured rib. When Pleasant had rendered assistance to Johnson, he observed a wound “where the bullet had impacted the bulletproof vest and burned [Johnson’s] skin from the twisting action of the bullet.” Additionally, the state presented Ronald Gross, a trauma surgeon, who testified that he had examined Johnson’s abrasions located on his hip and right arm, which he thought were consistent with a bullet wound. Construing the evidence in a light most favorable to sustaining the verdict, we conclude that the jury reasonably could have found that the defendant was guilty beyond a reasonable doubt of assault in the first degree. The jury had before it ample evidence from which it could infer that one of the ten bullets that the defendant had fired at the vehicle struck Johnson and caused his injury. The cumulative effect of the evidence, namely, the location of the defendant’s spent shell casings, the entry points of the bullets on the vehicle, the position of Johnson next to the vehicle during the shooting, and the testimony and reasonable inferences drawn therefrom, was sufficient to establish that Johnson was injured by a bullet from the defendant’s firearm. To the extent that the defendant focuses on minor inconsistencies in Johnson’s testimony, the defendant primarily is attacking Johnson’s credibility. However, it is well settled that “[w]hether [a witness’] testimony [is] believable [is] a question solely for the jury. It is . . . the absolute right and responsibility of the jury to weigh conflicting evidence and to determine the credibility of the witnesses.” (Internal quotation marks omitted.) State v. Rodriguez, 93 Conn. App. 739, 751, 890 A.2d 591 (2006), appeal dismissed, 281 Conn. 817, 917 A.2d 959 (2007). “[T]he [jury] can . . . decide what— all, none or some—of a witness’ testimony to accept or reject.” (Internal quotation marks omitted.) State v. Salmon, 66 Conn. App. 131, 145, 783 A.2d 1193 (2001), cert. denied, 259 Conn. 908, 789 A.2d 997 (2002). Because questions of whether to believe or to disbelieve a competent witness are beyond our review, we reject the defendant’s argument. Accordingly, we conclude that the court properly denied the defendant’s motion for a judgment of acquittal. The judgment is affirmed. In this opinion the other judges concurred. The defendant also references in passing his rights to testily, to be free from compelled testimony, to a fair trial and to due process under article first, § 8, of the constitution of Connecticut. We decline, however, to address this claim because it does not satisfy the standard enunciated by our Supreme Court in State v. Geisler, 222 Conn. 672, 684-86, 610 A.2d 1225 (1992). In his brief, the defendant also claims, cursorily, that when the court permitted Rosa to invoke the fifth amendment privilege, he was forced to testify on his own behalf in order to provide evidence to support his theory of defense and was precluded from exercising his constitutional right to remain silent. This section of the brief quotes various constitutional principles without relating them to the evidence. To the extent that the claim is set forth, it lacks merit, however, because it is well established that a defendant has the choice about whether to testify. See State v. Harrell, 199 Conn. 255, 266-67, 506 A.2d 1041 (1986); State v. Denson, 67 Conn. App. 803, 818-19, 789 A.2d 1075, cert. denied, 260 Conn. 915, 797 A.2d 514 (2002). The constitution is not offended by requiring the defendant to make this choice. See State v. Perkins, 271 Conn. 218, 233, 856 A.2d 917 (2004) (“The criminal process, like the rest of the legal system, is replete with situations requiring the making of difficult judgments as to which course to follow. Although a defendant may have a right, even of constitutional dimensions, to follow whichever course he chooses, the Constitution does not by that token always forbid requiring him to choose.” [Internal quotation marks omitted.]). Further, we also note that the court, after permitting Rosa to invoke his fifth amendment privilege, asked defense counsel if anyone else had witnessed the confrontation between the defendant and Rosa. Defense counsel indicated that there was another person present, but he did not know the person’s identity. On the following day, the court canvassed the defendant about his decision to testify and informed him that he had the right not to testify. The defendant then stated that he would testify. Thereafter, the defendant testified, and the state called its rebuttal witnesses and rested its case. Later that same day, defense counsel informed the court that he had located Michael Callendar, the other man who had witnessed the exchange of words between the defendant and Rosa. Defense counsel questioned Callendar outside of the jury’s presence, and Callendar testified that he had observed the confrontation between the two men and that the dispute concerned drug selling territory on Zion Street. Defense counsel, however, declined to call Callendar as a witness at trial. Accordingly, it cannot be said that the court’s adverse ruling “compelled” the defendant to the make the choice to testify on his own behalf. We note that Eosa asserted his fifth amendment privilege in response to a specific question. The defendant did not object at trial on the ground that Eosa’s assertion was a “blanket” refusal to testify, nor was that claim raised on appeal. General Statutes § 53a-62 (a) provides: “A person is guilty of threatening in the second degree when: (1) By physical threat, such person intentionally places or attempts to place another person in fear of imminent serious physical injury, (2) such person threatens to commit any crime of violence with the intent to terrorize another person, or (3) such person threatens to commit such crime of violence in reckless disregard of the risk of causing such terror.” Because the offense of threatening is a class A misdemeanor, General Statutes § 54-193 (b) provides that no person may be prosecuted except “within one year next after the offense has been committed.” In his appellate brief, the defendant states that he “was denied his right to due process when the trial court refused to instruct the jury as to the unavailability of Angel Rosa.” The defendant does not offer any citation or discussion of any authority to support his claim. We therefore decline to review this claim because it has been inadequately briefed. See State v. Carocoglia, 95 Conn. App. 95, 129, 895 A.2d 810, cert. denied, 278 Conn. 922, 901 A.2d 1222 (2006). We cannot speculate about what his claim might be when it is not set out with citations to authority. General Statutes § 54-47a provides: “(a) Whenever in the judgment of the Chief State’s Attorney, a state’s attorney or the deputy chief state’s attorney, the testimony of any witness or the production of books, papers or other evidence of any witness (1) in any criminal proceeding involving narcotics, arson, bribery, gambling, election law violations, felonious crimes of violence, any violation which is an offense under the provisions of title 22a, corruption in the executive, legislative or judicial branch of state government or in the government of any political subdivision of the state, fraud by a vendor of goods or services in the medical assistance program under Title XIX of the Social Security Act amendments of 1965, as amended, any violation of chapter 949c, or any other class A, B or C felony or unclassified felony punishable by a term of imprisonment in excess of five years for which the Chief State’s Attorney or state’s attorney demonstrates that he has no other means of obtaining sufficient information as to whether a crime has been committed or the identity of the person or persons who may have committed a crime, before a court or grand jury of this state or (2) in any investigation conducted by an investigatory grand jury as provided in sections 54-47b to 54-47g, inclusive, is necessary to the public interest, the Chief State’s Attorney, the state’s attorney, or the deputy chief state’s attorney, may, with notice to the witness, after the witness has claimed his privilege against self-incrimination, make application to the court for an order directing the witness to testify or produce evidence subject to the provisions of this section. “(b) Upon the issuance of the order such witness shall not be excused from testifying or from producing books, papers or other evidence in such case or proceeding on the ground that the testimony or evidence required of him may tend to incriminate him or subject him to a penalty or forfeiture. No such witness may be prosecuted or subjected to any penalty or forfeiture for or on account of any transaction, matter or thing concerning which he is compelled to testify or produce evidence, and no testimony or evidence so compelled, and no evidence discovered as a result of or otherwise derived from testimony or evidence so compelled, may be used as evidence against him in any proceeding, except that no witness shall be immune from prosecution for perjury or contempt committed while giving such testimony or producing such evidence. Whenever evidence is objected to as inadmissible because it was discovered as aresult of or otherwise derived from compelled testimony or evidence, the burden shall be upon the person offering the challenged evidence to establish a source independent of the compelled testimony or evidence.” Similar provisions authorize the grant of immunity by United States attorneys to compel testimony before federal courts and grand juries. See 18 U.S.C. §§ 6002-6003 (2000). In its brief, the state asserts that the defendant waived his claim pertaining to the grant of the immunity for Rosa. Specifically, the state argues that the defendant could have introduced the evidence he sought from Rosa’s testimony through the testimony of Callendar and that the defendant’s failure to call Callendar as a witness amounted to a tactical decision, which constituted a waiver of the immunity claim. See footnote 2. Because we conclude that the present case does not warrant the application of the prosecutorial misconduct theory of immunity, we need not decide whether the defendant’s failure to call Callender effectively waived the immunity claim. Specifically, the defendant challenges the following questions asked by the prosecutor during the defendant’s cross-examination: “Q. And this threat that was made against you, this took place when? “A. Say that again. “Q. The threat that was made against you by Mr. Rosa, when did that take place? “A. In the morning. “Q. And you hung around for a while to watch what he was doing? “A. Yes. “Q. So, the threat was in the morning; you didn’t arm yourself until it got dark? “A. Yes. “Q. So, you went out at midnight directly across the street from the business of the person who had threatened you that day? “A. Well, down the street some. “Q. But it’s right across the street, isn’t it? “A. It’s on the same street. “Q. So, you went down the street to a building next to or two buildings away from the business of the person who threatened you? “A. Yes. “Q. “A. “Q. All right, so, you hang around there all day or at least in an apartment near there, and then at midnight, when it’s dark, you armed yourself, you wore dark clothing and you went to visit a friend to smoke weed? “A. True. * ** * “Q. So, you’re standing on the street smoking weed in an area where your life has just been threatened? “A. Correct. “Q. “A. No, sir. “Q. It was dark. And so you’re going to take the garbage into this dark parking lot in an area where your life has been threatened? “A. Yes. “Q. So, did you think it was a robbery or were these the people that Mr. Rosa sent to do you harm? “A. That was—that’s what I said. You know, just trying to see what was going on. “Q. Well, my question, though, was, sir, what did you think? Was it a robbery or was it somebody sent to do you harm? “A. Both. That’s why I said what I said, to see what kind of reaction I would get. “Q. Did you, on the morning of June 5, 2003, after you were taken into custody, tell any of the detectives about the threats that Mr. Rosa had made against you? “A. No, sir.” In reciting the relevant facts of his prosecutorial impropriety claim, the defendant mentions the prosecutor’s remark, which he also objected to at trial, that ”[i]f that’s all that’s required under the law to use deadly force, then there are a lot more neighborhoods that are going to be dangerous.” The defendant, however, has not included in his brief an analysis of this alleged instance of prosecutorial impropriety, and, therefore, we do address this statement. See State v. Crocker, 83 Conn. App. 615, 660-61, 852 A.2d 762, cert. denied, 271 Conn. 910, 859 A.2d 571 (2004). In Ms rebuttal argument, the prosecutor stated that during Johnson’s testimony describing the defendant’s laser sight on the gun, “there is a point at wMch it’s very chilling—at least, I thought it was chilling in Ms description—and he describes the laser coming up the car onto Ms body, onto Ms face . . . The defendant objected to tMs statement after the prosecutor had completed rebuttal argument. “Well, I would argue to you that a reasonable inference could be drawn that I would say Officer Johnson was a little bit upset by what had transpired. He said on the [witness] stand that he believes he fired his weapon at his attacker when he got out of the car. There is no evidence of that. In fact, there is no evidence, if you look at the chart, that he fired his weapon at all until he got down the alley and onto Park Street. Now, that tells you something about Officer Johnson. He’s a trained police officer. Someone just tried to kill him. He’s in pain. Adrenaline is going. He never fires his weapon, never fires his weapon at the attacker until he gets onto Park Street after the other officers have already emptied their guns. What does that tell you about what’s going through his mind? I-Ie’s not thinking clearly. He’s thinking, I just about got killed. He’s got that loaded .45 caliber gun in his hand, and he doesn’t discharge it. Was he nervous? I would say that almost being killed makes you kind of nervous. It shows that. Any surprise that his testimony here is not necessarily consistent with what actually happened that night or his report, which is written days after, trying to reconstruct this, this incident?” The defendant objected to this remark. After reviewing the evidence presented to the jury and reviewing the transcript from the hearing on the defendant’s motion for examination of evidence, which occurred outside of the jury’s presence, we are of the opinion that in his brief to this court, the defendant has argued, in part, inferences drawn from the evidence presented at the hearing on the motion. Specifically, the defendant argues that there was insufficient evidence to sustain his conviction on one of the counts of assault in the first degree, referring to defense counsel’s statement during the hearing on the motion in which counsel stated that “the vest that Officer Johnson was wearing did not appear to contain any type of marking or bullet hole.” The jury, however, was not present at the hearing on the motion. Therefore, we cannot consider the evidence that was presented at that hearing in reviewing the sufficiency of evidence that the jury considered in reaching its verdict. See State v. Rivera, 74 Conn. App. 129, 137 n.7, 810 A.2d 824 (2002). In connection with his arguments concerning the virtual impossibility of Johnson being struck by a bullet from the defendant’s firearm, the defendant posits that the physical evidence supports two reasonable hypotheses that are inconsistent with his guilt of assault in the first degree. The defendant asserts that because Johnson was wearing his gun under his shirt, “[i]t is very possible that [Johnson] injured his own rib while he was trying to pull his gun from his waist.” In addition, the defendant argues that because a bullet, consistent with those issued by police, was found behind the driver’s seat, “it is very possible that while Otero was in the backseat, firing . . . one of [the bullets] could have grazed Johnson as he was in the process of getting out of the driver’s seat.” Although the defendant offers possible hypotheses of innocence, he misapplies the standard by which we review sufficiency claims, and our review of the defendant’s claim is not controlled by his possible inteipretations of the evidence. See State v. Salaman, 97 Conn. App. 670, 677, 905 A.2d 739, cert. denied, 280 Conn. 942, 912 A.2d 478 (2006). “On appeal, we do not ask whether there is a reasonable view of the evidence that would support a reasonable hypothesis of innocence. We ask, instead, whether there is a reasonable view of the evidence that supports the [finder of fact’s] verdict of guilty.” (Internal quotation marks omitted.) State v. Lopez, supra, 280 Conn. 809. Accordingly, for the reasons we will discuss, we conclude that there is a reasonable view of the evidence from which the jury inferred that a bullet from the defendant’s firearm caused Johnson’s injury.
CASELAW
The Medieval period was marked by the existence of kingdoms and empires in Europe.The most notable medieval kingdoms of the period included those of England, France and Italy.Other empires of the period included the Byzantine Empire, Holy Roman Empire and the short-lived but significant Carolingian Empire.Following are some of the most significant medieval rulers who ruled over these European territories. Hugh Capet was the King of the Franks in West Francia in the 10th century, He was the first French king of the Capetian dynasty and he was quick to establish his dynasty Read more about the Hugh Capet >> King Alfred, also known as Alfred the Great, who ruled over most of England in the late 9th century. Alfred was the first English ruler to assume the title “King of the Anglo-Saxons” and his reign effectively coincided with a consolidation of the Anglo-Saxon identity in England. He ascended to the throne of Wessex in 871 and had to deal with the imminent Viking threat. Although King Alfred suffered a few initial setbacks, he was ultimately able to push back the Viking incursion and decisively secure most of Anglo-Saxon England. Being a patron of education and arts, Alfred helped the Anglo-Saxons forge a definite identity for the first time. King Alfred promoted religious education and the use of English language and also spearheaded many legal and social reforms in the Anglo-Saxon society of the time. It was also during his era that Anglo-Saxons significantly evolved their military structure and came to view naval supremacy as key to England’s defense. King Richard ‘The Lionheart’ Richard the Lionheart was one of the most notable monarchs of England in the medieval period. He ruled over England from 1189 to 1199 and during his brief reign of ten years, he undertook such significant measures and adventures as to earn him a lasting fame in the annals of history. Before his ascension to English throne, King Richard was actively involved in military conflicts against France and later against his father, King Henry II. Assuming military leadership at the age of 16, he came to earn fame as a formidable warrior and leader. After Richard became King, he most notably took command of one of the armies of the Third Crusade. On this Crusade, he occupied Cyprus, took control of Sicily and was able to defeat Saladin in a few battles although he couldn’t wrest back the control of Jerusalem. Richard was seen as an embodiment of the medieval knightly ideals of chivalry, valor and nobility. King Henry VIII Henry VIII was the most famous of the monarchs of the Tudor dynasty. He was the second King of the Tudor dynasty, ascending to the English throne in 1509 and remaining in it until his death in 1547. During his reign, England underwent decisive changes which were to permanently alter the future of the country. Most notably, a schism between Henry VIII and Papacy led to the beginning of English Reformation and a permanent tilt towards Protestantism. Henry VIII was an extravagant patron of arts and had as many as 60 musicians on his court staff while also owning hundreds of musical instruments himself. King Henry composed many pieces of music, few of which are extant today. Henry led battles against France and the Holy Roman Empire through most of his reign, succeeding in many of his military conflicts. Charlemagne was one of the most powerful kings throughout the medieval period.He arose to power first as the King of the Franks in 768. Soon after ascending to power, Charlemagne sought to expand his kingdom and was successful in gaining control of Italy and being crowned as the King of Italy as well in 774. Charlemagne then turned to the East of his kingdom and subdued the pagan Saxon tribes after nearly 18 years of warfare, converting them to Christianity and gaining control over their territories. In the West, Charlemagne expanded his Empire all the way to the Iberian Peninsula, launching offensives against the advancing Moors. Charlemagne was the first person to forge a sizable Empire in Western Europe since the fall of the Roman Empire and the first to consequently assume the title of “Holy Roman Emperor”. As a staunch patron of the Church and fervent exponent of Christianity throughout Western Europe, he is hailed as one of the key figures who gave Europe its Christian identity. King Otto I Charlemagne’s vast Empire disintegrated towards the end of the 9th century. It was only at the hands of Otto I that a similar Empire was revived in Central Europe. Otto I originally ascended to power as King of the Germans in the Saxony region in 936. King Otto united the German tribes into a single identity and subdued the notable dukes and barons of his kingdom by expanding his own powers significantly. Otto then went on to conquer the Kingdom of Italy in the south and decisively defeated the Magyars in 955, effectively blocking their conquest of Western Europe. Like Charlemagne before him, Otto I was crowned the Holy Roman Emperor in 962 in Rome. Although he played the role of the protector of the Church at many instances, he also effectively used the Church to further his political goals successfully. The Empire forged by Otto I would continue to exist, in one form or the other, until the 19th century! Hugh Capet was the King of the Franks from 987 to 996. He was born in France at a time when the Carolingian might had declined and members of the Robertian dynasty were being elected as Kings by the nobility. Capet was a member of the Robertian family himself but he couldn’t initially win an election to kingship. He rather had Louis V, one of the remaining Carolingian descendants, elected to the throne. Once Louis V was in power, Capet successfully manipulated him and was able to amass so much power that he was second in power to the King alone. In 987, Louis V died in an accident and Capet was elected King of the Franks while his son, Robert was established as his heir. Capet remained the King of the Franks until his death in 996 and his dynasty directly ruled over France until the 14th century. King Philip II Augustus Philip II Augustus ascended to the French throne in 1180 and remained in power until his death in 1223. Before him, the monarchs of France had used the title “King of the Franks” but Philip II became the first to use instead “King of France”. Philip II reign was decisive in the history of France in that he was able to establish France on firmer grounds and amassed significant power and prestige for the French crown. King Phillip’s notable military feats include the defeat of English in the Anglo-French War at the beginning of the 13th century whereby he broke up the Angevin Empire. King Phillip then went on to defeat a joint coalition of Germans, English and Flemish in 1214 at the historic Battle of Bouvines. This victory at the battle forced the English king to seek conciliation with his rebel barons, ultimately resulting in the signing of the Magna Carta. During his reign, France emerged as the most formidable power in Europe while internally, the kingdom underwent rapid urbanisation and many towns prospered, giving rise to a new bourgeoisie class. King Philip IV Philip IV of France was one of the most powerful French monarchs during the medieval period. He became the King of France in 1285 at a time when the power of the nobility was diminishing in the face of a new bourgeoisie class, rich merchant class and skilled civil servants directly reporting to the king. By leaning on these changes, Philip IV further constrained the power of the feudals and nobles in his kingdom, at the same time becoming more powerful as the king. King Phillip also ruled over the Kingdom of Navarre in Iberia and his extended family came to rule in Naples and Hungary at the time. With centralized authority in his hand, Philip sought to push French control both eastward and westward, annexing many counties and fiefs in the process and extending French territories. A rather notorious event of Philip IVs reign was the extermination of the Knights Templar on direct orders from the King who was under their debt. His reign is also considered the decisive mark in history whereby the ultimate temporal authority of the Catholic Church began to diminish in the face of monarchy. King Charles V Charles V was a French monarch who ruled from 1364 to 1380. He earned the epithet of “The Wise” on account of his skillful rule at a turbulent time. Before he ascended the throne, his father King John II was captured by the English forces at the Battle of Poitiers. King Charles V then signed a compromising treaty with the English, ceding key territories and agreeing to pay a heavy ransom. Once he ascended to the throne in 1364, Charles V led a round of reforms and measures with the help of his advisers. These were a huge success and helped him replenish the kingdom’s coffers, brought together a regular and paid army for the first time and wrest back most of the territories ceded to the English earlier. King Charles also pursued a construction program and had a number of monumental buildings built in his kingdom. Charles was known to own a sizable library at Louvre in which he stored French manuscripts which he would share with his counselors. King Frederick Barbarossa Frederick Barbarossa was the Holy Roman Emperor from 1155 to 1190, being one of the most powerful and well-known European rulers of the medieval period. During his long reign, he waged war against a wide range of foes, including the Papacy, and despite many setbacks, scores vital successes. He was initially elected the King of Germany in 1152. He then proceeded to gain control over Italy and was crowned the King of Italy in 1155, also being crowned as the Emperor the same year. Italy would prove a contested point for Frederick who led three subsequent campaigns in a bid to subdue Italy, ending in disagreements with the Papacy and the Normans in southern Italy. His disagreements with Papacy led him to appoint an anti-pope whose papacy was short-lived. After many decades of extended warfare, Barbarossa successfully consolidated the imperial authority of the German throne. His significance in medieval history is also due to his charismatic personality. Being well-versed in a number of languages, very well-read, highly well-mannered and living to a very long life, Barbarossa was considered an extraordinary monarch of his period. Reining over the Empire in the 6th century, Justinian’s ascension coincided with what has been considered the golden period of the Empire. It was during his reign that Byzantine Empire attempted, with great success, to annex the territories lost by the Western Roman Empire. Consequently, Italy and portions along North African coasts as well as territories in Iberia came back under Byzantine control. During his reign, Roman supremacy was once against established in the Mediterranean. While a patron of the Eastern Orthodox Church, Justinian placed the Church authority decisively under his own. Justinian also actively patronized arts and culture, launching an architectural Renaissance in the Empire which flowered in masterpieces such as the Hagia Sophia. Justinian remained in power from 527 until 565. Most of his reign was marked by rapid military expansion of the Empire and a flurry of cultural activities which proved vital in sustaining the Byzantine Empire in the coming centuries and contributed to the birth of its unique identity. Robert the Bruce Robert the Bruce was the King of the Scots from 1306 until 1329. Before he ascended to the Scottish throne, the English and the Scots were pitted in an ongoing armed conflict which was later termed the “Wars of Scottish Independence”. Until 1306, the English had been successful in subduing many attempts by Scots to gain independence from the English throne. In 1307, the tide began to turn as the Scots launched another war against England under Robert as their king. Robert defeated the English in open battle in 1307 and then launched large-scale guerrilla warfare, devastating the English and their allies in Scotland. By 1314, Robert had gained control of most of Scotland through decisive military victories. He then went on to ravage northern England, taking the battle to English territory. Robert reigned as the King of the Scots until his death in 1329. His military prowess, political acumen and his tenacity in defending Scottish independence earned him a semi-legendary status in Scottish medieval history. William the Conqueror William the Conqueror was the first Norman king of England following the Norman invasion of England in 1066. His conquest of England decisively replaced the Anglo-Saxon royalty and nobility of the country with a French-Norman nobility. The change also significantly altered the cultural outlook of England. William was originally the Duke of Normandy but following a succession dispute against Edward the Confessor’s death, he laid claim to the English throne. This was followed by the 1066 invasion in which he successfully defeated the Anglo-Saxons, cemented his control over England by extensively building castles and subdued many attempted rebellions by the Anglo-Saxon nobility in different parts of England.
FINEWEB-EDU
Jeff Weinstein Jeff Weinstein (born September 8, 1947) is an American critic, editor, fiction writer and union activist, best known as a former restaurant critic for the Village Voice, where he was also on staff from 1981 to 1995. In 1982, he helped negotiate a Voice union contract that extended health insurance and other benefits, which the newspaper already provided to married couples and, as a matter of practice, to unmarried heterosexual couples, to same-sex couples. The agreement was the second union contract in the United States, the first by a private company, and the first to be widely reported on, to offer same-sex couples these protections. Early life and education Weinstein was born and raised in New York City. A type 1 diabetic since age 8, he studied biology at Brandeis University, and did graduate work at the University of California, Riverside and the University of California, San Diego. At UCSD, Weinstein was a member of the Radical Coalition, where he participated in the United Farm Workers lettuce boycott against Safeway. He was also the first out gay student on campus. Career Weinstein was hired to write restaurant reviews for the San Diego Reader when he was 25 years old, in 1972. He quit in early 1973, because of articles the Reader published that he considered to be “sexist and racist crap.” While primarily a nonfiction writer, Weinstein also wrote fiction in the mid-1970s and early 1980s, including the short story “A Jean-Marie Cookbook,” which won a 1979-80 Pushcart Prize, and the novella Life in San Diego, which was published by Sun & Moon Press in 1983, with illustrations by the artist Ira Joel Haber. After he moved back to New York, Weinstein worked as a restaurant critic for the SoHo Weekly News and later joined the Village Voice as both a restaurant critic and as Senior Editor, overseeing pieces about visual art and architecture. As a food critic, Weinstein is known for his uncommon prose style and perspective, his interest in covering a variety of restaurants in their own particular cultural and socioeconomic contexts, and his “roving intellectual appetite.” In 1983, Weinstein helped found the National Writers Union, for which he served as East Coast representative to the Union's executive board. Weinstein collected his Village Voice restaurant column, “Eating Around,” into a book, Learning to Eat, which Sun & Moon Press published in 1988. During his tenure at the Voice, Weinstein also wrote a column about consumerism, entitled “Consumerismo.” From 1997 to 2006, he was columnist and fine arts editor for the Philadelphia Inquirer. He subsequently served as arts and culture editor for Bloomberg News, and currently writes the LGBTQIA-related blog “Out There” on ArtsJournal.com. Personal life Weinstein was partnered with the writer, critic and artist John Perreault from 1976 until Perreault's death in 2015. The couple married in Provincetown, Massachusetts in 2008. Since 2017, Weinstein has been partnered with the writer and critic Daniel Felsenthal, with whom he lives in New York City and in Bellport, Long Island.
WIKI
nʕaylintn Proper noun * 1) Large ridge of rock, made of gneiss, located south of Vaseux Lake between Okanagan Falls and Oliver in British Columbia, Canada. Synonyms * McIntyre Bluff
WIKI
Next Year "Next Year" is a song released as the last single from the third Foo Fighters' album There Is Nothing Left to Lose. History A shorter version (running at just 3:21 compared to the original's 4:36) was released as a single in 2000 and was used in the music video. Backup vocals were added, and it does not include the outro present in the original album version. Style SPIN Magazine proclaimed the song "a power ballad in the "Wonderwall" sense", remarking that the band are "at their loveliest when aping peak-popularity Britpop". Ed theme song The opening of "Next Year" was used as the theme song for the NBC television series Ed (2000–2004). The show's creators, Rob Burnett and Jon Beckerman (formerly of the Late Show with David Letterman) used the song despite knowledge of production company Viacom's insistence that they own the rights to the show's theme song. "Next Year" was thus ultimately replaced by Clem Snide's "Moment in the Sun" during the second season. As a result of outcries from Burnett and Beckerman, however, Viacom relented and "Next Year" returned as the theme song in the third and fourth seasons. Music video The video, directed by Phil Harder, shows the band in a remake of the Apollo 11 Moon mission and incorporates heavy use of NASA stock footage. They experience zero-gravity in the space capsule (where they conduct experiments and perform the song with instruments), land on the Moon, plant a Foo Fighters flag, and return to Earth where they are welcomed back as heroes during a ticker-tape parade. Many moments and images of the Apollo era are re-enacted, such as the band meeting President Richard Nixon, bassist Nate Mendel golfing on the Moon (a nod to Alan Shepard during Apollo 14), and depictions of Vietnam war protests. The video ends with a portrait of the band in the style of a traditional astronaut crew photo. This bears a strong resemblance to the cover of Led Zeppelin's Best of Led Zeppelin compilation. Track listing CD1 dark cover: (Also comes with the first 6 months of a 2001 poster calendar) * 1) "Next Year" * 2) "Big Me" (acoustic radio performance, 2 Meter Sessions, Netherlands 22 November 1999) * 3) "Next Year" (acoustic radio performance, 2 Meter Sessions, Netherlands 22 November 1999) CD2 light cover: (Also comes with the second 6 months of a 2001 poster calendar) Enhanced CD-ROM, includes "Next Year" video * 1) "Next Year" * 2) "Baker Street" (Gerry Rafferty cover) Australia CD: * 1) "Next Year" * 2) "Next Year" (Dave Way remix) * 3) "Monkey Wrench" (Melbourne, Australia on 1 February 2000) 7 inch: * 1) "Next Year" * 2) "Next Year" (Acoustic Radio Performance, 2 Meter Sessions, Netherlands 22 November 1999) Japan EP * 1) "Next Year" * 2) "Have a Cigar" (Pink Floyd cover) * 3) "Make a Bet" * 4) "Floaty" (Acoustic Radio Performance, 2 Meter Sessions, Netherlands 22 November 1999)) * 5) "Monkey Wrench" (Melbourne, Australia on 1 February 2000) Netherlands Live in Holland, part two * 1) "Next Year" (Dave Way remix) * 2) "My Hero" (Live at the Melkweg 29 February 2000) * 3) "For All the Cows" (Live at the Melkweg 29 February 2000) * 4) "Monkey Wrench" (Live at the Melkweg 29 February 2000)
WIKI
View on MetaCPAN search.cpan.org is shutting down For details read Perl NOC. After June 25th this page will redirect to MetaCPAN.org Kjetil Kjernsmo > RDF-LinkedData > RDF::LinkedData Download: RDF-LinkedData-1.940.tar.gz Dependencies Annotate this POD Website View/Report Bugs Module Version: 1.940   Source   NAME ^ RDF::LinkedData - A Linked Data server implementation VERSION ^ Version 1.940 SYNOPSIS ^ For just setting this up and get it to run, you would just use the linked_data.psgi script in this distribution. The usage of that is documented in Plack::App::RDF::LinkedData, with the README being a quick start guide. If you want to try and use this directly, you'd do stuff like: my $ld = RDF::LinkedData->new(store => $config->{store}, endpoint_config => $config->{endpoint}, base_uri => $config->{base_uri} ); $ld->namespaces($config->{namespaces}) if ($config->{namespaces}); $ld->request($req); return $ld->response($uri)->finalize; See Plack::App::RDF::LinkedData for a complete example. DESCRIPTION ^ This module is used to create a Linked Data server that can serve RDF data out of an RDF::Trine::Model. It will look up URIs in the model and do the right thing (known as the 303 dance) and mint URLs for that, as well as perform content negotiation. Thus, you can concentrate on URIs for your things, and you need not be concerned about minting URLs for the pages to serve it. In addition, optional modules can provide other important functionality: Cross-origin resource sharing, VoID description, cache headers, SPARQL Endpoint, Triple Pattern Fragments, etc. As such, it encompasses a fair share of Semantic Web best practices, but possibly not in a very flexible "Big Data" manner. METHODS ^ new ( store => $store, model => $model, base_uri => $base_uri, hypermedia => 1, namespaces_as_vocabularies => 1, request => $request, endpoint_config => $endpoint_config, void_config => $void_config, writes_enabled => 0 ) Creates a new handler object based on the named parameters, given a store config (recommended usage is to pass a hashref of the type that can be passed to RDF::Trine::Store->new_with_config, but a simple string can also be used) or a model and a base URI. Optionally, you may pass a Plack::Request object (which must be passed before you call content) and an endpoint_config hashref if you want to have a SPARQL Endpoint running using the recommended module RDF::Endpoint. This module can also provide additional triples to turn the response into a hypermedia type. If you don't want this, set the hypermedia argument to false. Currently this entails setting the SPARQL endpoint and vocabularies used using the VoID vocabulary. Finally, it can provide experimental Triple Pattern Fragments support. Read-write support is even more experimental, and is provided by RDF::LinkedData::RWHypermedia. BUILD Called by Moo to initialize an object. BUILDARGS Called by Moo to ensure that some attributes can be left unset. model The model that contains the entire database of linked data. This method returns a RDF::Trine::Model object. response_model This model contains response, it is used to build the response to one particular request. This method returns a RDF::Trine::Model object of a temporary model. base_uri Returns or sets the base URI for this handler. writes_enabled Attribute that indicates whether write operations are permitted. does_read_operation Returns or sets whether the current request is a read operation. request ( [ $request ] ) Returns the Plack::Request object, if it exists; or sets it if a Plack::Request object is given as parameter. current_etag Returns the current Etag of the model suitable for use in a HTTP header. This is a read-only attribute. last_etag, has_last_etag Returns or sets the last Etag of so that changes to the model can be detected. namespaces ( $namespace_map ) Gets or sets the namespaces that some serializers use for pretty-printing. Should be handed a URI::NamespaceMap object. response ( $uri ) Will look up what to do with the given URI object and populate the response object. helper_properties ( ) Returns the RDF::Helper::Properties object. if it exists; or sets it if an RDF::Helper::Properties object is given as a parameter. type Returns or sets the type of result to return, i.e. page, in the case of a human-intended page or data for machine consumption, or an empty string if it is an actual resource URI that should be redirected. my_node A node for the requested URI. This node is typically used as the subject to find which statements to return as data. This expects to get a URI object containing the full URI of the node. count ( $node) Returns the number of statements that has the $node as subject, or all if $node is undef. endpoint ( [ $endpoint ] ) Returns the RDF::Endpoint object if it exists or sets it if a RDF::Endpoint object is given as parameter. In most cases, it will be created for you if you pass a endpoint_config hashref to the constructor, so you would most likely not use this method. void ( [ $voidg ] ) Returns the RDF::Generator::Void object, if it exists; or sets it if an RDF::Generator::Void object is given as parameter. Like endpoint, it will be created for you if you pass a void_config hashref to the constructor, so you would most likely not use this method. AUTHOR ^ Kjetil Kjernsmo, <kjetilk@cpan.org> CONTRIBUTORS ^ Toby Inkster BUGS ^ Please report any bugs using github SUPPORT ^ You can find documentation for this module with the perldoc command. perldoc RDF::LinkedData The perlrdf IRC channel is the right place to seek help and discuss this module: irc://irc.perl.org/#perlrdf TODO ^ This module does what it is supposed to do rather well and has thus reached the 1.0 milestone. To support a wider variety of use cases, the current module isn't flexible enough, so future versions will need substantial changes, but the version number is intended to reflect that. ACKNOWLEDGMENTS ^ This module was started by Gregory Todd Williams <gwilliams@cpan.org> for RDF::LinkedData::Apache, but has been almost totally rewritten. COPYRIGHT & LICENSE ^ Copyright 2010 Gregory Todd Williams Copyright 2010 ABC Startsiden AS Copyright 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018 Kjetil Kjernsmo This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself. syntax highlighting:
ESSENTIALAI-STEM
Ecto custom type issue: "value `[list_of_ids]` in `where` cannot be cast to type {:in, :id} in query" In my project, ids are just auto incremented ids managed by the database. When showing an id to the user, it is encoded using Hashids. I have a helper module that just wraps it to avoid the boilerplate of passing the salt to every function. Until now I’ve been manually converting the ids from integers to hashes and vice versa every time a hash was provided and an id was to be shown. I wanted to avoid that, so I wrote a custom Ecto Type: defmodule Embers.Hashid do @behaviour Ecto.Type alias Embers.Helpers.IdHasher def type(), do: :id def cast(int) when is_integer(int) do {:ok, IdHasher.encode(int)} end def cast(id) when is_binary(id) do {:ok, id} end def cast(_) do :error end def dump(id) when is_binary(id) do case IdHasher.decode(id) do id when is_integer(id) -> {:ok, id} _ -> :error end end def load(id) when is_integer(id) do {:ok, IdHasher.encode(id)} end end It should cast integers into hashes, convert integers from the db into hashes, and convert hashes to integers before putting them in the db. The type is used in the schemas via the @primary_key module attribute: @primary_key {:id, Embers.Hashid, autogenerate: true} For single entities, without preloads, it works, but when trying to preload an association Ecto blows with this error: [error] Task #PID<0.11545.0> started from #PID<0.11541.0> terminating ** (Ecto.Query.CastError) deps/ecto/lib/ecto/association.ex:623: value `["KV3A8", "Ja344", "8n43V", "304Ko"]` in `where` cannot be cast to type {:in, :id} in query: from r0 in Embers.Reactions.Reaction, where: r0.post_id in ^["KV3A8", "Ja344", "8n43V", "304Ko"], order_by: [asc: r0.post_id], select: {r0.post_id, r0} (elixir 1.10.4) lib/enum.ex:2111: Enum."-reduce/3-lists^foldl/2-0-"/3 (elixir 1.10.4) lib/enum.ex:1520: Enum."-map_reduce/3-lists^mapfoldl/2-0-"/3 (elixir 1.10.4) lib/enum.ex:2111: Enum."-reduce/3-lists^foldl/2-0-"/3 (ecto 3.0.7) lib/ecto/repo/queryable.ex:132: Ecto.Repo.Queryable.execute/4 (ecto 3.0.7) lib/ecto/repo/queryable.ex:18: Ecto.Repo.Queryable.all/3 (ecto 3.0.7) lib/ecto/repo/preloader.ex:188: Ecto.Repo.Preloader.fetch_query/8 (ecto 3.0.7) lib/ecto/repo/preloader.ex:119: Ecto.Repo.Preloader.preload_assoc/10 (elixir 1.10.4) lib/task/supervised.ex:90: Task.Supervised.invoke_mfa/2 (elixir 1.10.4) lib/task/supervised.ex:35: Task.Supervised.reply/5 (stdlib 3.13) proc_lib.erl:226: :proc_lib.init_p_do_apply/3 Function: &:erlang.apply/2 Args: [#Function<8.84726962/1 in Ecto.Repo.Preloader.maybe_pmap/4>, [{{:assoc, %Ecto.Association.Has{cardinality: :many, defaults: [], field: :reactions, on_cast: nil, on_delete: :nothing, on_replace: :raise, owner: Embers.Posts.Post, owner_key: :id, queryable: Embers.Reactions.Reaction, related: Embers.Reactions.Reaction, related_key: :post_id, relationship: :child, unique: true, where: []}, {0, :post_id}}, nil, nil, []}]] I’m clueless on what could cause that error. This issue seemed similar, but the error I’m getting mentions casting, not dumping. I don’t know either, but wondering if you change this to: def cast(other) do IO.inspect(other, label: "Casting Embers.HashID") :error end You might at least see if this give you a clue? After a lot of IO.ispecting I found out that the issue only happened when using preloads. For some reason Ecto wasn’t using the custom type, so it was trying to cast the strings to :id, and that obviously failed. It expected the ids to be integers, not strings. I finally got to this part of the Ecto.Schema.belongs_to docs: :type - Sets the type of automatically defined :foreign_key . Defaults to: :integer and can be set per schema via @foreign_key_type So I tried and configured the associations as: belongs_to(:field, SchemaModule, type: Embers.Hashid) and now everything works fine. That… made sense, but the documentation is split between Ecto.Type and Ecto.Schema, so it wasn’t clear from the start how everything fits together and the error wasn’t helpful at all. The Programming Phoenix book does use a custom type as primary key, that’s where I got the @primary_key {:id, Embers.Hashid, autogenerate: true} bit, but it does not mention anything about associations with custom types. I couldn’t find references to it in the Programming Ecto book, either. I guess this is an opportunity to improve Ecto.Type or Ecto.Schema docs. EDIT: PR sent :slight_smile: 3 Likes
ESSENTIALAI-STEM
PUJ PUJ may mean: * IATA airport code for Punta Cana International Airport * FAA LID code for Paulding County Regional Airport * Public Utility Jeepney * Pelvico ureteral junction or Ureteropelvic junction - Where the ureter connects to the renal pelvis
WIKI
California Gasoline Weakens After Refineries Recover From Flares California-blend gasoline slipped from its highest premium to futures in more than two weeks on speculation that refinery issues over the weekend did little to change supply in the market. The premium for Carbob in Los Angeles fell 4 cents to 18 cents above gasoline futures traded on the New York Mercantile Exchange at 4:10 p.m. East Coast time, according to data compiled by Bloomberg. Prompt delivery rose 6.76 cents to $2.816 a gallon. BP Plc said its 266,000-barrel-a-day Carson refinery may flare gases until next week. Valero Energy Corp. (VLO) flared over the weekend at its 135,000-barrel-a-day Wilmington refinery after a power dip, and ConocoPhillips (COP) released sulfur dioxide at its 128,000-barrel-a-day Rodeo refinery in Northern California . “It looks like, after all that happened, no refinery buyers showed up,” said David Hackett, president of energy consultant Stillwater Associates in Irvine , California. Gasoline for October delivery also rose the most in four months to settle at $2.6955 a gallon on the New York Mercantile Exchange months on speculation that European governments will contain the region’s debt crisis. The premium for Carbob in San Francisco fell 5 cents to 19.5 cents a gallon over futures. The premium for conventional, 87-octane gasoline in Portland , Oregon , narrowed 6 cents to 22 cents versus futures. To contact the reporter on this story: Lynn Doan in San Francisco at ldoan6@bloomberg.net To contact the editor responsible for this story: Dan Stets at dstets@bloomberg.net
NEWS-MULTISOURCE
Page:Bat Wing 1921.djvu/117 Rh At this point our tête-à-tête was interrupted by the return of Madame de Stämer. “Oh, la la!” she cried, “the Colonel must have allowed himself to become too animated this evening. He is threatened with one of his attacks and I have insisted upon his immediate retirement. He makes his apologies, but knows you will understand.” I expressed my concern, and: “I was unaware that Colonel Menendez’s health was impaired,” I said. “Ah,” Madame shrugged characteristically. “Juan has travelled too much of the road of life on top speed, Mr. Knox.” She snapped her white fingers and grimaced significantly. “Excitement is bad for him.” She wheeled her chair up beside Val Beverley, and taking the girl’s hand patted it affectionately. “You look pale to-night, my dear,” she said. “All this bogey business is getting on your nerves, eh?” “Oh, not at all,” declared the girl. “It is very mysterious and annoying, of course.” “But M. Paul Harley will presently tell us what it is all about,” concluded Madame. “Yes, I trust so. We want no Cuban devils here at Cray’s Folly.” I had hoped that she would speak further of the matter, but having thus apologized for our host’s absence, she plunged into an amusing account of Parisian society, and of the changes which five years of war had brought about. Her comments, although brilliant, were superficial, the only point I recollect being her reference to a certain Baron Bergmann, a Swedish diplomat, who, according to Madame, had the longest nose and the shortest memory in Paris, so that in the cold weather, “he even sometimes forgot to blow his nose.”
WIKI
Page:Vision of Almet (2).pdf/4 "Almet," ſaid the ſtranger, "thou ſeeſt before thee a man, whom the hand of Proſperity has overwhelmed with wretchedneſs. Whatever I once deſired as the means of happineſs, I now posseſs; but I am not yet happy, and therefore I deſpair. I regret the lapſe of time, becauſe it glides away without enjoyment; and as I expect nothing in the future but the vanities of the paſt. I do not wiſh that the future ſhould arrive. Yet I tremble leſt it ſhould be cut off; and my heart ſinks, when I anticipate the moment in which eternity ſhall cloſe even the vacuity of my life, like the ſeas upon the path of a ſhip, and leave no traces of my exiſtence more durable than the furrow which remains after the waves have united. If in the treaſures of thy wiſdom there is any precept to obtain felicity vouchſafe it to me: for this purpoſe I am come; a purpoſe which I yet fear to reveal, leſt, like all the former, it ſhould be diſappointed." Almet liſtened with looks of astoniſhment and pity, to this complaint of a being in whom reason was known to be a pledge of immortality: but the serenity
WIKI
The Massachuset were Native Americans who lived along the coast of what is now Massachusetts. The state was named after the tribe. The Massachuset lived in bark-covered homes called wigwams. Wigwams were large enough for several families. The Massachuset grew corn, beans, and squash. They also fished and hunted deer and other animals. In 1605 French explorers arrived in Massachuset territory. The tribe welcomed the traders who followed. But many Massachuset died from smallpox and other diseases brought by the Europeans. In 1646 an English pastor named John Eliot came to live with the Massachuset. He convinced many tribe members to become Christians. The Christian Massachuset moved to villages with Christian Indians from other tribes. The Indians in these villages became known as Praying Indians. In 1675 neighboring tribes declared war on English settlers who were taking their lands. This war became known as King Philip’s War. During the war neither side trusted the Praying Indians. The English raided the Praying Indians’ villages and took some Massachuset captive. They sold some of the captives as slaves. The surviving Massachuset scattered. Many found homes among other Indian tribes. By the 1800s the Massachuset no longer existed as a separate tribe.
FINEWEB-EDU
Paid Notice: Deaths SILBERZWEIG, SOL SILBERZWEIG -- Sol. The American Society for Yad Vashem mourns the passing of Sol Silberzweig, Board member and benefactor of Yad Vashem. A Holocaust survivor who survived the Warsaw Ghetto uprising and seven concentration camps, lost his whole family except one brother who was living in the United States. He went on to become a highly successful businessman in the fur trade. A book about Mr. Silberzweig's life will be published shortly by Yad Vashem. He is survived by daughters Rochelle Cherry and Leslie Rueda, son Moe Silberzweig, eight grandchildren and four great-grandchildren. Eli Zborowski, Chairman American Society for Yad Vashem
NEWS-MULTISOURCE
Best of the Web awards Best of the Web awards was an annual contest for museum-related website content, organized each year at the Museums and the Web conference. A committee of peers recognizes the best museum work on the web. Sites are nominated by museum professionals from around the world. In 2016, the Museums and the Web conference renamed the award to the GLAMi Awards, honoring innovative contributions--not just on the web--from practitioners in the so-called "GLAM" sector--galleries, libraries, archives, and museums. Categories Sites have been nominated in the following categories. To recognize the enormous evolution in the online space these categories have been updated for MW2013: * Audio / Visual / Podcast - Rich Media (audio/film/interactive) * Education * Exhibition - Digital Exhibition * Innovative / Experimental * Long-lived * Mobile * Museum Professional * Research / Online Collection - Research / Collections Online * Social Media An overall winner is chosen among all nominated sites. In addition, there is a People's Choice Award (based on voting by the Museums and the Web community), and an award for a Small organization (based on staff number, annual budget, and/or project budget). All nominations are made through the Museums and the Web site http://www.museumsandtheweb.com/mw2012/best and are also available online for others to review. Sites can be nominated in any one of the categories. Note that the award categories may change from year-to-year, evolving along with the current trends of online presence. 2015 * Rich Media: Stinks, Bangs & Booms * Education: Fondation Louis Vuitton: Become An Apprentice Architect http://archimoi.fondationlouisvuitton.fr/en/ * Education Honorable Mention: Cleveland Museum of Art: Studio Play http://mw2014.museumsandtheweb.com/bow/studio-play/ * Digital Exhibition: Van Go Yourself http://vangoyourself.com/ * Innovative / Experimental: Tate After Dark http://www.tate.org.uk/whats-on/tate-britain/special-event/after-dark * Innovative / Experimental Honorable Mention: The Digital Pen http://www.cooperhewitt.org/new-experience/designing-pen/ * Long-lived: The non-museum museum - redesigning the Royal Academy online http://www.royalacademy.org.uk * Long-lived Honorable Mention: British Council Visual Arts http://visualarts.britishcouncil.org/ * Mobile: Field Guides to Australian Fauna - a suite of eight apps http://museumsvictoria.com.au/discoverycentre/museum-victoria-apps/national-field-guide-apps/ * Museum Professional: Art Detective https://web.archive.org/web/20160216200302/http://www.thepcf.org.uk/artdetective/ * Research / Collections Online: Living Collections Catalogue http://www.walkerart.org/collections/publications * Social Media: 1840s GIF Party at Tate Britain http://mw2015.museumsandtheweb.com/bow/1840s-gif-party-at-tate-britain/ * Social Media Honorable Mention: #PlayArtfully http://mw2015.museumsandtheweb.com/bow/playartfully/ * People’s Choice: Van Go Yourself http://vangoyourself.com/ * Best of the Web: Art Detective https://web.archive.org/web/20160216200302/http://www.thepcf.org.uk/artdetective/ 2014 * Rich Media: #Taull1123. Immersive experience in a World Heritage Site (or Augmented Reality without devices)' http://mw2014.museumsandtheweb.com/bow/taull1123-immersive-experience-in-a-world-heritage-site-or-augmented-reality-without-devices/ * Education: MoMA’s Catalysts: Artists Creating with Sound Video and Time' http://mw2014.museumsandtheweb.com/bow/catalysts-artists-creating-with-sound-video-and-time/ * Education Honourable Mention: Cleveland Museum of Art: Studio Play' http://mw2014.museumsandtheweb.com/bow/studio-play/ * Digital Exhibition: Cleveland Museum of Art: Collection Wall' http://www.clevelandart.org/gallery-one/collection-wall * Innovative / Experimental: Dallas Museum of Art: DMA Friends' http://www.dma.org/visit/dma-friends * Long-lived: Horniman Museums and Gardens' http://www.horniman.ac.uk/ * Mobile: Cleveland Museum of Art: ArtLens' http://mw2014.museumsandtheweb.com/bow/artlens/ * Museum Professional: Musepunks' http://museopunks.org/ * Research / Collections Online: Operation War Diary' http://www.operationwardiary.org/ * Research / Collections Online Honourable mention: Seattle Art Museum: The Online Catalogue of Chinese Painting & Calligraphy' http://chinesepainting.seattleartmuseum.org/OSCI/ * Social Media: In the Horniman' http://in-the-horniman.tumblr.com/ * Best Small Museum Project: Tang Museum “Classless Society” exhibition website' https://web.archive.org/web/20140306044625/https://tang.skidmore.edu/app/public/webroot/files/uploads/classless_society/index.html * Best Small Museum Project Honourable mention: Victorian Collections' http://victoriancollections.net.au/ * People’s Choice: BoW Nomination: Reynolda House Museum of American Art' http://reynoldahouse.org * Best of the Web: Dallas Museum of Art: DMA Friends' http://www.dma.org/visit/dma-friends 2013 * Rich Media: Anish Kapoor in MCA Publications http://www.mca.com.au/apps/mca-publications/ * Education: ArtNC http://artnc.org/ * Digital Exhibition: The Gallery of Lost Art http://galleryoflostart.com/ * Innovative / Experimental: Rijksstudio: Make Your Own Masterpiece http://www.rijksmuseum.nl/rijksstudio * Long-lived: ArtBabble Redesign http://www.artbabble.org/ * Mobile: Sound Uncovered https://itunes.apple.com/us/app/sound-uncovered/id598835017?mt=8 * Museum Professional: Beyond the Printed Page: Museum Digital Publishing Bliki http://digitalpublishingbliki.com/ * Research / Collections Online: Cooper-Hewitt Online Collection http://collection.cooperhewitt.org/ * Social Media: Titanic on Twitter https://web.archive.org/web/20130426233131/http://mw2013.museumsandtheweb.com/bow/titanic-on-twitter/ * Best Small Museum Project: TXTilecity http://txtilecity.ca/ * People’s Choice: Rijksstudio: Make Your Own Masterpiece * Best of the Web: Rijksstudio: Make Your Own Masterpiece 2012 * Audio / Visual / Podcast: * Education: * Exhibition: * Innovative: * Long Lived: * Mobile: * Museum Professional: * Research / Online Collection: * Social Media: * Small: * People's Choice: * Best Overall: 2011 * Audio / Visual / Podcast: Museum Victoria ‘Access All Areas’ podcast adventures, designed in-house * Education: Australian Centre for the Moving Image ACMI Generator, designed by Monkii https://web.archive.org/web/20120214044545/http://generator.acmi.net.au/ * Education (Honorable Mention): The College of Physicians of Philadelphia The History of Vaccines, designed by Night Kitchen Interactive http://www.historyofvaccines.org * Exhibition: Museum of Modern Art Henri Cartier-Bresson: The Modern Century, designed by Second Story, Inc. http://moma.org/cartierbresson * Exhibition (Honorable Mention): Center of Contemporary Culture of Barcelona (CCCB) City of Horrors, designed by Ignasi Rifé http://www.cccb.org/laciutatdelshorrors/old.php?l=en * Innovative: Nationaal Historisch Museum / Museum of National History Nationnaal Historisch Museum / Museum of National History, designed in-house http://www.innl.nl * Long Lived: Exploratorium Exploratorium.org, designed by varied http://www.exploratorium.org * Mobile: The Museum of Modern Art AB EX NY iPAD APP, designed by Deep Focus http://www.moma.org/explore/mobile/abexnyapp * Mobile (Honorable Mention): California Academy of Sciences Golden Gate Park Field Guide, designed by Odopod https://web.archive.org/web/20120106232816/http://calacademy.org/apps/ggp/ * Museum Professional: Smithsonian Institution Smithsonian Web and New Media Strategy Wiki, designed in-house http://smithsonian-webstrategy.wikispaces.com * Research / Online Collection: The British Museum Portable Antiquities Scheme, designed by Daniel Pett http://finds.org.uk * Social Media: Tate One-to-one with the Artist: Ai Weiwei, designed by Cogapp http://aiweiwei.tate.org.uk/ * Social Media (Honorable Mention): The Museum of Modern Art Andy Warhol: Motion Pictures, designed by Stamen http://MoMA.org/screentests * Small: County Museum, Dundalk ASI: Archaeology Scene Investigations in North County Louth, designed by MOR Solutions http://www.asi-louth.ie/ * People's Choice: Smithsonian Institution Smithsonian Web and New Media Strategy Wiki, designed in-house http://smithsonian-webstrategy.wikispaces.com * Best Overall: Australian Centre for the Moving Image ACMI Generator, by Monkii https://web.archive.org/web/20120214044545/http://generator.acmi.net.au/ * Special Community Award: Spinny Bar Historical Society SBHS, designed "in-house" http://www.spinnybarhistoricalsociety.org/ 2010 * Education: Museum of Modern Art Meet Me: The MoMA's Alzheimer's Project, designed in-house http://www.moma.org/meetme * Exhibition (Honorable Mention): Historical Society of Pennsylvania PhilaPlace, designed by Night Kitchen Interactive http://www.philaplace.org/ * Exhibition: Museum of Modern Art Bauhaus: Workshops for Modernity 1919-1933, designed by Hello Design https://web.archive.org/web/20120423044459/http://www.moma.org/bauhaus * Innovative/Experimental: Royal Observatory Greenwich Solar Stormwatch, designed in-house http://solarstormwatch.com/ * Long-lived: Culture24 Culture24, designed by Culture24 and System Simulation Limited http://www.culture24.org.uk/ * Museum Professional: Museum Marketing https://web.archive.org/web/20120502204447/http://museummarketing.org/ * Podcast: National Museum of Australia National Museum of Australia's Audio on demand program, designed by Icelab http://www.nma.gov.au/audio/ * Research: Victoria and Albert Museum V&A Search the Collection, designed by The Other Media https://collections.vam.ac.uk/ * Social Media: Museo Picasso de Barcelona Museo Picasso Online Community, designed in-house http://www.bcn.cat/museupicasso/en/get-involved/online-community.html * Small: Dulwich Picture Gallery Dulwich OnView, designed in-house http://www.dulwichonview.org.uk/ * People's Choice: National September 11 Memorial & Museum Make History, designed by Local Projects http://911history.org/ * Best Overall: Indianapolis Museum of Art ArtBabble, designed in-house http://www.artbabble.org/ 2009 * Online Exhibition: Click! A Crowd-Curated Exhibition http://www.brooklynmuseum.org/exhibitions/click * Educational: Tate Kids http://kids.tate.org.uk/ * Education (Honorable Mention): Firefly Watch, Museum of Science, Boston https://www.mos.org/fireflywatch/ * Museum Professional's: CODART.nl http://www.codart.nl * Research: Museum of Jewish Heritage Online Collection http://collection.mjhnyc.org * Online Community or Service: Brooklyn Museum Collection, Posse, and Tag! You are It! http://www.brooklynmuseum.org/opencollection/collections/ * Online Community or Service (Honorable Mention): Flickr Commons https://www.flickr.com/commons and Indicommons https://web.archive.org/web/20120228172506/http://www.indicommons.org/ * Podcast (Audio, Video): RWM (Radio web MACBA) http://rwm.macba.cat * Innovative or Experimental: My Yard Our Message http://myyardourmessage.com/ * Innovative or Experimental (Honorable Mention) Astronomy Photographer of the Year (plus complimentary digital astronomy services) https://web.archive.org/web/20170421004616/http://www.adrianmactaggart.co.uk/work/web/astrophoto/ * Small: Museum 2.0 http://museumtwo.blogspot.com/ * People's Choice: Video Active Video Active, designed by the Video Active Project http://videoactive.wordpress.com/workplan-2/ * Best Overall: Brooklyn Museum Collection http://www.brooklynmuseum.org/ 2008 * Exhibition: The American Image: The Photographs of John Collier Jr. https://web.archive.org/web/20160303172725/http://americanimage.unm.edu/ * Exhibition Honorable Mention: The Digital Vaults http://www.digitalvaults.org * Educational: Great Chicago Stories, Chicago History Museum https://web.archive.org/web/20161221092603/http://www.greatchicagostories.org/ * Museum Professional's: ExhibitFiles, Association of Science-Technology Centers https://web.archive.org/web/20100214152434/http://www.exhibitfiles.org/ * Museum Professional's Honorable Mention: The IMA Dashboard, Indianapolis Museum of Art https://web.archive.org/web/20160303204512/http://dashboard.imamuseum.org/ * Research: Prints and Printmaking, Australia, Asia, Pacific https://web.archive.org/web/20130302182605/http://www.printsandprintmaking.gov.au/catalogues/work.aspx? * Online Community or Service: My Brighton and Hove http://www.mybrightonandhove.org.uk * Online Community or Service (Honorable Mention): Brooklyn Museum of Art Community, Brooklyn Museum of Art https://web.archive.org/web/20140305195115/http://www.brooklynmuseum.org/community/ * Podcast (Audio, Video): Roman Art from the Louvre Webisodes, Indianapolis Museum of Art https://web.archive.org/web/20100224061009/http://www.theromansarecoming.com/webisodes * Podcast (Audio, Video) Honorable Mention: TateShots, Tate https://web.archive.org/web/20081011203916/http://tate.org.uk/tateshots/ * Innovative or Experimental: Launchball, Science Museum, London http://www.sciencemuseum.org.uk/launchball * Innovative or Experimental (Honorable Mention) Astronomy Photographer of the Year (plus complimentary digital astronomy services) http://www.rmg.co.uk/discover/astronomy-photographer-gallery * People's Choice: Maps: Tools for Adventure, The Children's Museum of Indianapolis (in conjunction with the National Geographic Society) https://web.archive.org/web/20090626085547/http://www.nationalgeographic.com/education/toolsforadventure/ * Best Overall: Launchball, Science Museum, London http://www.sciencemuseum.org.uk/launchball 2007 * Online Exhibition: Rembrandt-Caravaggio Webspecial http://www.brooklynmuseum.org/exhibitions/click * Online Exhibition Honorable Mention: Caught & Coloured * Educational: Stagework https://web.archive.org/web/20160205060918/http://www.stagework.org.uk/ * Museum Professional's: Collections Link https://web.archive.org/web/20140622092324/http://www.collectionslink.org.uk/ * Research: Discover Nikkei http://www.discovernikkei.org * Innovative or Experimental: SFMOMA ArtCasts https://web.archive.org/web/20081021025016/http://www.sfmoma.org/podcasts/ * Best Overall: Stagework https://web.archive.org/web/20160205060918/http://www.stagework.org.uk/ 2006 * Online Exhibition: Curating the City - Wilshire Boulevard http://www.curatingthecity.org * Online Exhibition Honorable Mention: Monticello Explorer http://explorer.monticello.org * E-Services or E-Commerce Site: Minnesota Historical Society (MHS) Online Store http://shop.mnhs.org * Educational: Life of a Rock Star http://collectionscanada.ca/rock/index2-e.html * Educational Honorable Mention: Palaeography: Reading old handwriting, 1500-1800 http://www.nationalarchives.gov.uk/palaeography * Museum Professional's: International Council of African Museums (AFRICOM) https://web.archive.org/web/20150510064937/http://www.africom.museum/ * Research: NYPL Digital Gallery http://digitalgallery.nypl.org/nypldigital/index.cfm * Research Honorable Mention: Birds in Backyards http://www.birdsinbackyards.net/ * Innovative or Experimental: Science Buzz http://www.smm.org/buzz * Small Museum: Waterford County Image Archive http://www.waterfordcountyimages.org * Best Overall: Science Buzz http://www.smm.org/buzz
WIKI
B1: Cell structure and transport ? • Created by: h.omar • Created on: 05-06-18 19:28 Eukaryotic and prokaryotic cells: Eukaryotic cells are cells that have their DNA enclosed in a nucleus. For example, animal and plant cells. Prokaryotic cells are cells with their DNA loose in the cytoplasm. They are generally much smaller than eukaryotic cells. Animal and plant cells: Animal cells are eukaryotes. They have these organelles:    Nucleus - contains genetic information and controls cell's activity.    Cytoplasm - where most of the cell's chemical reactions take place.    Mitochondria - site of respiration (transferring energy)    Ribosomes - site of protein synthesis.    Cell membrane - controls what goes in and out (partially permeable) Plant cells are also eukaryotes. They have the same organelles as animal cells but have 3 other features.    Chloroplasts - contain chlorophyll (site of photosynthesis)    Cell  wall - made of cellulose, strengthens cell.    Vacuole - filled with cell sap which helps the cell keep its shape. Bacterial cells are prokaryotes. They share some organelles as animal and plant cells but also have:   Comments No comments have yet been made
ESSENTIALAI-STEM
San Francesco, Pioraco San Francesco is a Gothic-style, Roman Catholic church located in the town of Pioraco, province of Macerata, region of Marche, Italy. History The church was built in the first decade of the 14th century, completed in 1327, along with the adjacent Franciscan monastery. It was built putatively atop the ruins of an Ancient Roman theater. The external structure retains some late-Romanesque features including a polygonal apse, but also have Gothic mullioned window above the portal. The stone façade is plain except for the round white stone main portal. The interior has a wooden ceiling made with cassettoni or coffers, added in 1730. This ceiling and other baroque refurbishments eliminated some of the original frescoes depicting the life of the saint. The altar of the Crucifix was erected in 1622, by the guild of papermakers. The church also houses a canvas depicting San Carlo Borromeo by an unknown Bolognese painter. The canvases depicting the Via Crucis were painted by Mancini. Two 17th-century wooden statues depict Our Lady of Sorrows and the Apostle John. The church also has a stone sculpture of a Pietà. Modern day In 1984, the convent became the home of the municipal offices. On Holy Friday a procession leaves this church and wends its way to the church of the Madonna della Grotta.
WIKI
How long do headlights last in cars? Do car headlights wear out? In addition to allowing you to see, headlights ensure that others are able to see your car coming toward them. Like any light bulb, though, headlight bulbs can and do burn out. Whether you have halogen, xenon, LEDs, or any other type of bulb, it will not last forever. How long do headlight bulbs last in years? The typical longevity of a halogen based headlight bulb is between 450 and 1,000 hours. The calculation of the lifetime of a bulb depends on a number of factors. What causes headlights to burn out quickly? VIBRATION. Halogen bulbs and sealed beam headlights have very fine tungsten wire filaments inside that emit light when heated. Even under ideal conditions, the filament can break, leaving you in the dark. Vibration caused by driving over rough roads, potholes and bumps will reduce the filament lifespan. How long does it take for headlights to fade? As a rule, the lens of a restored headlight should stay clear and sharp for about 9 months to 2 years before becoming oxidized. IT IS SURPRISING:  You asked: Can you put a camera in a light bulb? How do I know if my headlights are bad? One of the first symptoms of a bad or failing headlight bulb is dim headlights. Over time headlight bulbs can wear out and begin to shine noticeably dimmer than when they were new. A dim headlight will not provide proper illumination and is also usually a sign that the bulb is approaching the end of its service life. What headlights last the longest? Finally, LED bulbs last the longest of all three headlight bulb types we’ve discussed. LED bulbs can last as long as 30,000 hours. That’s enough to make it through the entire lifespan of many vehicles, meaning you may never have to replace LED bulbs. Do LED headlights last longer? LEDs operate about 90% more efficiently than incandescent bulbs, and because they generate less heat, that helps them last much longer than other types of lights. … Because LEDs are smaller than bulb-type lights, they allow more design freedom with headlights and other vehicle lights. Should I replace headlights in pairs? ‘ The answer is, no, it’s not required to replace both bulbs. There are some advantages, however, to getting a professional Ace Auto Parts mechanic to change both lights at the same time. The most important reason for changing out all headlights at the same time is that you don’t want both headlamps to go dark. Why do my car headlights keep blowing? This is due to spikes of high voltage jumping through the system which in-turn blow the bulb filaments and/or headlight fuses. You can perform a simple test to check if the voltage regulator is faulty, however you’ll need another person to help you rev the engine whilst you take a multimeter reading. IT IS SURPRISING:  What are Adaptive LED Headlights? How much does it cost to fix a burnt out headlight? The average cost for Halogen bulb for example is between $15 to $20 and an extra $50 for installation. According to an aftermarket auto part retailer, the cost per each High-Intensity discharge bulb replacement is $100 or more while the average cost of replacing an entire headlight assembly is ranges from $250 to $700. Is it normal for headlights to get hot? All light bulbs get hot when in use – it’s the nature of how they work. With the exception of LEDs and fluorescent bulbs, light bulbs work on the principle of resistance. Electric current is directed through the bulb.
ESSENTIALAI-STEM
This ARM RISC assembly language implementation for sorting an array of bit integers demonstrates how well quicksort takes advantage of the register model. function quicksort(array) var list less, equal, greater if length(array) ≤ 1 return array select a pivot value pivot from array for each x in array if x. Como el ordenamiento por mezcla, el ordenamiento rápido utiliza divide y vencerás, así que es un algoritmo recursivo. La manera en que el ordenamiento . Author: Doshicage Samushura Country: Denmark Language: English (Spanish) Genre: Politics Published (Last): 7 November 2018 Pages: 202 PDF File Size: 4.1 Mb ePub File Size: 3.25 Mb ISBN: 524-1-33138-231-1 Downloads: 73447 Price: Free* [*Free Regsitration Required] Uploader: Tojas Introduction to Algorithms 3rd ed. El quickosrt [2], a la izquierda del pivote, es un caso base cuando hacemos recursividad, como lo es el subarreglo [5], a la derecha de pivote. Retrieved 22 April In our example, those are 54, 77, and Practical implementations this variant are considerably slower on average, but they are of theoretical interest because they show an optimal selection algorithm can yield an optimal sorting algorithm. Other more sophisticated parallel sorting algorithms can achieve even better time bounds. Views Read Edit View history. D 19 the three numbers used in selecting the pivot are 1, 9, The original partition scheme described by C. But no two calls at the same level of the call tree process the same part of the original list; thus, each level of calls needs only O n time all together each call has some constant overhead, but since there are only O n calls at each level, this is subsumed in the O n factor.   ASHRAYA YOJANA PDF The Quick Sort — Problem Solving with Algorithms and Data Structures Given the following list of numbers [14, 17, 13, 15, 19, 10, 3, 16, 9, 12] which answer shows the contents of the list after the second partitioning according to the quicksort algorithm? The problem is clearly apparent when all the input elements are equal: Partition algorithm in detail There are two indices i and j and at the very beginning of the partition algorithm i points algoritmk the first quicksotr in the array and j points to the last one. Values equal to the pivot can stay in any part of the array. In pseudocode[16]. This page has been accessedtimes. The Haskell code in the core implementations section is almost self explanatory but can suffer from inefficiencies because it crawls through the list “rest” twice, once for each qquicksort comprehension. Data Structures and Algorithms. Let C denote the cost of creation of the BST. Since we have looked at this example a few times already, we know that 54 will eventually end up in the position currently holding First of the range of indexes to sort arrives in r1 right: It is certainly possible to algorit,o up with a more efficient one, but it will probably not be as clear as this one:. Quick Sort Runestone in social media: Contribute to help us keep sharing free knowledge and write new tutorials. Java Platform SE 7. If a limited stack overflows the sorting simply restarts.   ASTM B194 PDF This same pivot strategy can be used to construct a algoritml of quicksort median of medians quicksort with O n log n time. This is a basic implementation using C. We begin by incrementing leftmark until we locate a value that is greater than the pivot value. Index j algoriitmo moved backward, until an element with value lesser or equal to the pivot is found. We use the recursive quicksort of Tony Qquicksort with inline array swapping to partition the array. Como con el ordenamiento por mezcla, piensa en ordenar un subarreglo array[p. They may be replaced with a swap function as in the above examples. Quicksort algorithm overview | Quick sort (artículo) | Khan Academy The depth of quicksort’s divide-and-conquer tree directly impacts the algorithm’s scalability, and this depth is highly dependent on the algorithm’s choice of pivot. At the point where rightmark becomes less than leftmarkwe stop. All registers are filled with “garbage” data in the process, so they need to be pushed to the stack to be saved. At that time, Hoare worked in a project on machine translation for the National Physical Laboratory. The following implementation works with any data type, given its size and a function that compares it.
ESSENTIALAI-STEM
Serenity (Culture Beat album) Serenity is the second studio album by German Eurodance band Culture Beat, released in 1993. It includes the single "Mr. Vain", which topped the charts across Europe and Australia. Background The line-up of Culture Beat changed slightly from their previous album released two years earlier, with Tania Evans becoming the new singer, joining Jay Supreme who remained the rapper. A total of five singles were released from the album: "Mr. Vain", "Got to Get It", "Anything", "World in Your Hands" and "Adelante". The album won the 1993 Echo award for Most Successful German Album Abroad which is the highest German music industry award. It went on to sell almost two million copies worldwide. Critical reception AllMusic editor William Cooper opined that "Serenity is an okay listen, albeit a repetitious one. "Got to Get It" is a virtual rewrite of "Mr. Vain", and the beat-heavy tracks "World in Your Hands" and "The Other Side of Me" are unremarkable but competent and entertaining. Serenity may lack substance, but the album should please fans of pleasant, non-threatening dance music." James Muretich from Calgary Herald commented, "Culture Beat has co-ruled the dance clubs with hit after hit after hit recently and Serenity gathers them together, including its recent "Mr. Vain" smash, adds some new tunes and, presto, it's dance party time. A tight, techno, soulful serving of dance grooves, raps and singing, Culture Beat easily ranks a notch above its beats-per-minute competitors." Alan Jones from Music Week wrote that "Germany's latest hitmakers make their album debut, which simply proves the huge debt they owe to fellow countrymen Snap." He felt that "there's little of distinction here with none of the tracks sounding likely to emulate the singles success of "Mr. Vain"."
WIKI
Grace L. Hamilton Grace L. Hamilton (1894-1992) was an American painter. A Regionalist painter, she is known for her mural in the old Stillwater, Oklahoma Post Office. Biography Hamilton née Lysinger was born on February 19, 1894, in Pittsburgh, Pennsylvania. She attended Carnegie Mellon University graduating in 1918 with a fine arts degree. She also studied at Oklahoma State University eventually earning a master's degree in English. In 1920 She married fellow artist Donald Alan Hamilton. The couple settled in Stillwater, Oklahoma where Donald taught at Oklahoma State University–Stillwater and was head of the architecture department. In 1962 the Fine Arts Committee of the City Planning Committee of Stillwater selected Hamilton to paint a mural of the Early Days of Payne County for the post office. The proposal was submitted to the United States Commission of Fine Arts, where it was approved in 1963. The Commission of Fine Arts had taken over public works projects from the Works Progress Administration after the end of World War II. The mural is still in existence, preserved during the renovation of the old post office. Hamilton died on May 17, 1992.
WIKI
Ask is moving to Stack Overflow and Serverfault.com! Please use the "opendaylight" tag on either of these sites. This site is now in Read-Only mode 0 Enunicate version problem asked 2014-10-28 11:24:11 -0700 shenh10 gravatar image Hi all, I am trying to do some development on controller project. However, I met some compiling problems when using maven to compile to northbound projects. It seems the version of maven-enunciate-plugin is conflict with some source codes . Here shows the errors: [INFO] [enunciate:docs {execution: default}] [FATAL ERROR] org.codehaus.enunciate.DocsBaseMojo#execute() caused a linkage error (java.lang.NoClassDefFoundError) and may be out-of-date. Check the realms: [FATAL ERROR] Plugin realm = app0.child-container[org.codehaus.enunciate:maven-enunciate-plugin:1.28] urls[0] = file:/home/shenh10/.m2/repository/org/codehaus/enunciate/maven-enunciate-plugin/1.28/maven-enunciate-plugin-1.28.jar urls[1] = file:/home/shenh10/.m2/repository/org/opendaylight/controller/sal/0.9.0-SNAPSHOT/sal-0.9.0-SNAPSHOT.jar urls[2] = file:/home/shenh10/.m2/repository/org/apache/commons/commons-lang3/3.1/commons-lang3-3.1.jar urls[3] = file:/home/shenh10/.m2/repository/org/apache/felix/org.apache.felix.dependencymanager/3.1.0/org.apache.felix.dependencymanager-3.1.0.jar urls[4] = file:/home/shenh10/.m2/repository/org/osgi/org.osgi.core/5.0.0/org.osgi.core-5.0.0.jar urls[5] = file:/home/shenh10/.m2/repository/org/osgi/org.osgi.compendium/4.2.0/org.osgi.compendium-4.2.0.jar urls[6] = file:/home/shenh10/.m2/repository/org/slf4j/slf4j-api/1.7.2/slf4j-api-1.7.2.jar urls[7] = file:/home/shenh10/.m2/repository/org/codehaus/enunciate/enunciate-swagger/1.28/enunciate-swagger-1.28.jar urls[8] = file:/home/shenh10/.m2/repository/org/codehaus/enunciate/enunciate-core/1.28/enunciate-core-1.28.jar urls[9] = file:/home/shenh10/.m2/repository/org/codehaus/enunciate/enunciate-core-rt/1.28/enunciate-core-rt-1.28.jar urls[10] = file:/home/shenh10/.m2/repository/org/codehaus/enunciate/enunciate-core-annotations/1.28/enunciate-core-annotations-1.28.jar urls[11] = file:/home/shenh10/.m2/repository/javax/annotation/jsr250-api/1.0/jsr250-api-1.0.jar urls[12] = file:/home/shenh10/.m2/repository/javax/ws/rs/jsr311-api/1.1.1/jsr311-api-1.1.1.jar urls[13] = file:/home/shenh10/.m2/repository/javax/servlet/servlet-api/2.3/servlet-api-2.3.jar urls[14] = file:/home/shenh10/.m2/repository/org/freemarker/freemarker/2.3.19/freemarker-2.3.19.jar urls[15] = file:/home/shenh10/.m2/repository/net/sf/apt-jelly/apt-jelly-freemarker/2.15/apt-jelly-freemarker-2.15.jar urls[16] = file:/home/shenh10/.m2/repository/net/sf/apt-jelly/apt-jelly-core/2.15/apt-jelly-core-2.15.jar urls[17] = file:/home/shenh10/.m2/repository/commons-digester/commons-digester/2.1/commons-digester-2.1.jar urls[18] = file:/home/shenh10/.m2/repository/commons-beanutils/commons-beanutils/1.8.3/commons-beanutils-1.8.3.jar urls[19] = file:/home/shenh10/.m2/repository/commons-logging/commons-logging/1.1.1/commons-logging-1.1.1.jar urls[20] = file:/home/shenh10/.m2/repository/org/codehaus/jackson/jackson-mapper-asl/1.9.3/jackson-mapper-asl-1.9.3.jar urls[21] = file:/home/shenh10/.m2/repository/org/codehaus/jackson/jackson-core-asl/1.9.3/jackson-core-asl-1.9.3.jar urls[22] = file:/home/shenh10/.m2/repository/org/opendaylight/controller/commons.logback_settings/0.1.0-SNAPSHOT/commons.logback_settings-0.1.0-SNAPSHOT.jar urls[23] = file:/home/shenh10/.m2/repository/org/codehaus/enunciate/maven-enunciate-slim-plugin/1.28/maven-enunciate-slim-plugin-1.28.jar urls[24] = file:/home/shenh10/.m2/repository/org ... (more) edit retag flag offensive close merge delete 1 answer Sort by » oldest newest most voted 0 answered 2015-05-14 04:58:47 -0700 Robert Varga gravatar image The problem is use of JDK8, which is not compatible with enunciate. This failure has been fixed in Lithium release train, and should work (by skipping enunciate when JDK8 is detected). edit flag offensive delete publish link more Login/Signup to Answer Question Tools Follow 1 follower Stats Asked: 2014-10-28 11:24:11 -0700 Seen: 311 times Last updated: May 14 '15
ESSENTIALAI-STEM
BIERING et al., Respondents, v. RINGLING, Appellant. (No. 5,685.) (Submitted June 27, 1925. Decided September 28, 1925.) [240 Pac. 829.] Conspiracy — Deceit—Burden of Proof — Parties — Damages<— Evidence — Sufficiency—Corporations—Minutes of Board of Directors — When not Written Evidence of Contract — Appeal— Briefs — Buies of Court — Directed Verdict — Instructions — Law of Case. Appeal — Briefs—Specifications of Error — Instructions — Nonobservanee of Buies of Supreme Court. 1. A specification of error based upon the giving or refusal of an instruction will not be considered where counsel fails to observe Bule X, subdivision b, of section 3, making it incumbent upon appellant to set forth the particular instruction in full. Defective Complaint — Cured by Answer. 2. Where a necessary allegation in the complaint is omitted but supplied by an averment in the answer,, the defect will be .deemed cured. Conspiracy — Damages — Parties Owning All of Stock of Corporation Conducted as Partnership Entitled to Sue in Own Names. 3. Plaintiffs in an action for damages resulting from a conspiracy between defendant and another to deprive them of their property, who were the sole owners of all the stock in a livestock corporation, the business of which they carried on as partners, could properly prosecute the aetion in their own names. Trial — Directed Verdict — When Motion Properly Overruled. 4. Where there is any substantial evidence in support of plaintiff’s ease, a motion by defendant for a directed verdict is properly overruled. Conspiracy — Damages—Evidence—Sufficiency. • 5. Evidence in an action for conspiracy to defraud plaintiffs of their livestock business which, though incorporated, they were conducting as a partnership and who were in financial straits, in inducing them, by promises of assistance which were not kept, to agree to the formation of a new corporation of the assets of which defendant ultimately became the owner, held sufficient to justify submission of the case to the jury. Trial — Instructions—Law of Case. 6. Instructions given are the law of the case. 1. Necessity of pleading specially noncomplianee with domestic statutes by foreign corporation, see note in 9 Ann. Cas. 492. See, also, 12 E. C. L. 101. 2. See 21 E. C. L. 492. Conspiracy — Definition. 7. A conspiracy is a combination of two or more persons by some concerted action to accomplish a criminal or unlawful purpose or to accomplish a purpose, though in itself not criminal or unlawful, by criminal or unlawful means. Same — De'ceit—All Acts Done in Furtherance of Conspiracy Illegal. 8. Under section 7574, Revised Codes of 1921, acquisition of another’s property by deceit is illegal, and all acts done in furtherance of a purpose to so acquire it become tainted with the illegality, although if performed without the unlawful purpose in view, they might of themselves be innocent. Same — -Damages—Proximate Cause — Burden of Proof. 9. In an action for conspiracy to defraud plaintiffs of their property, the burden of proving that acts of the defendant and his co-conspirator were the proximate causo of the damages sustained, and not the result of a new and independent factor for which defendant was not responsible, was upon plaintiffs. Corporations — Minutes of Board of Directors — When not Written Evidence of Contract. 10. Where the minutes of the board of directors of a corporation merely recited that defendant had made a proposition for the acquisition of a block of stock and that the proposition had been accepted, but did not recite the terms of the agreement, the contention that the minutes constituted written evidence of a contract between the parties rendering inadmissible oral testimony with - relation to the transaction, held without merit. Appeal and Error, 3 C. J., sec. 752, p. 845, n. 75; see. 1589, p. 1419, n. 8; 4 C. J., see. 2229, p. 488, n. 21; see. 2571, p. 674, n. 41. Conspiracy, 12 C. J., sec. 1, p. 540, n. 4; see. 8, p. 545, n. 36; see. 99, p. 581, n. 58; see. 224, p. 633, n. 38; see. 234, p. 639, n. 90. Corporations, 14 O. J., sec. 1445, p. 929, n. 46. Damages, 17 C. J., see. 367, p. 1065, n. 15. Evidence, 22 C. J., sec. 1441, p. 1089, n. 23 New. Pleading, 31 Cyc., p. 714, n. 55. Trial, 38 Cyc., p. 1576, n. 35. 7. Definition and nature of conspiracy and general principles relating thereto, see note in 51 Am. Dec. 82. Gist of civil actions for conspiracy, see notes in Ann. Cas. 1914C, 763; Ann. Cas. 1917E,' 289. See, also, 5 R. C. L. 1091. 8. Separate tortious acts in pursuance of conspiracy as giving rise to single cause of action, see note in Ann. Cas. 1915B, 1014. 10. See 10 R. C. L. 1024. 12. See 10 R. C. L. 1131. 13. See 15 R. C. L. 1071. Appeal from District Court, Gallatin County; B. B. Lam, Judge. Action -by Hans Biering and another against Richard T. Ringling. Judgment for plaintiffs and defendant appeals. Affirmed. Mr. Hubert D. Bath, Mr. James F. O’Connor and Mr. D. M. Kelly, for Appellant, submitted a brief. Mr. O’Connor and Mr. Kelly argued the cause orally. The courts hold that it is contrary to public policy to permit copartners, by virtue of agreement or otherwise, to organize a corporation for the conduct of copartnership business, hold themselves out as a corporation and then come into court and take the position that the corporation was in fact a disguised partnership. (Seitz v. Michel, 148 Minn. 80, 181 N. "W. 102, 104; Jackson v. Hooper, 76 N. J. Eq. 592, 27 L. R. A. (n. s.) 658, 75 Atl. 568, 571; Boag v. Thompson, 208 App. Div. 132, 203 N. T. Supp. 395, 398; Conley v. MatMeson Alkali Works, 190 U. S. 406, 409, 47 L. Ed. 1113, 23 Sup. Ct. Rep. 728 [see, also, Rose’s U. S. Notes]; Peterson v. Chicago, B. I, & Pac. By. Co., 205 U. S. 364, 51 L. Ed. 841, 27 Sup. Ct. Rep. 513 [see, also, Rose’s U. S. Notes].) Even assuming that the sole stockholders of a corporation may maintain an action for damages for the taking of the property of the corporation by fraud or otherwise, this complaint is fatally defective, because it fails to allege that the plaintiffs were the owners of all of the stock of the Taylors Fork Cattle Company at the time the property of the Taylors Fork Cattle Company was so taken, or at all. In order to maintain such an action as this in any event, it would be necessary for the plaintiffs to allege that 'they owned all of this stock in this corporation at the time of the .transaction of which they complain, or that the shares have devolved upon them since, not by purchase, but by operation of law. (Dcmnmeyer v. Coleman, 11 Fed. 97, 101, 8 Sawy. 51, 5 Morr. Min. Rep. 474.) An allegation that plaintiff was the owner of the stock at the time of the commencement of the action would not be sufficient. (Bobinson v. West Virginia Loam, Co., 90 Fed. 770, 772; Moyle v. Landers, 3 Cal. ITnrep. 113, 21 Pac. 1133; SouthWest Natural Gas Co-, v. Fayette Fuel Gas Co., 145 Pa. 13', 23 Atl. 224.) The evidence offered and received in this case was not sufficient to support the verdict or any verdict. The complaint charges a conspiracy and overt acts committed in pursuance thereof, out of which it is alleged the damages arose. While there are eases to the contrary in other jurisdictions, the rule is well settled in Montana .that where a conspiracy is entered into ¡by any number of persons, great or small, for the purpose of injuring another or another’s business or another’s property, no cause of action can arise on account of any overt acts in furtherance of such conspiracy, unless such acts be illegal or, being legal, that they be carried out in an unlawful manner. (Lindsay & Co. v. Montana F. of L., 37 Mont. 264, 127 Am. St. Rep. 722, 18 L,. R. A. (n. s.) 707, 96 Pac. 127; Empire Theatre Co. v. Cloke, 53 Mont. 183, L. R. A. 1917E, 383, 163 Pac. 107.) There is no evidence in this record that the defendant, or anyone connected with him, committed an illegal act in furtherance of this alleged conspiracy, or that he did any act in an unlawful manner. (See 12 C. J., sec. 104; Dalury v. Rezinas, 183 App. Div. 456, 170 N. Y. Supp. 1045, 1049; affirmed, 229 N. Y. 513, 129 N. E. 896; Almirall & Co., Inc., v. MeClement, 207 App. Div. 320, 202 N. Y. Supp. 139, 148; Kelly v. Chicago, M. & St. P. Ry. Co., 93 Iowa, 436, 61 N. W. 957, 962; Bitzer v. 'Washburn, 121 Iowa, 462, 96 N. W. .978; Conner v. Bryce, 170 N. Y. Supp. 94; Boivman v. Wohlke, 166 Cal. 121, Ann. Cas. 1915B, 1011, 135 Pac. 37, 39; O’Callaghan v. Cronan, 121 Mass. 114.) The minutes of the meetings of the Taylors Fork Cattle Company and Southern Montana Livestock Company constituted a written contract between plaintiffs and the defendant and superseded all the oral negotiations or stipulations concerning. its matter which preceded or accompanied it. (Schlens v. Poe, 128 Md. 352, 97 Atl. 649; Western Timber Co. v. Kalama River Co., 42 Wash. 620, 114 Am. St. Rep. 137, 7 Ann. Cas. 667, 6 L. R. A. (n. s.) 260, 85 Pac. 338; Salusbury v. American Vulcanized Fibre Co., 5 Boyce (Del.), 182, 91 Atl. 536; Foreman’s Systems v. Milk Dealers’ Crate Co., 13 Del. Ch. 351, 120 Atl. 358.) It therefore follows that the obligations of the defendant Singling must be determined by an examination of these written instruments. 'Mr. C. E. Carlson, Mr. W. S. Hwt'tman and Messrs. Haight, 'Adcock, Haight & Harris, for Sespondent, submitted a brief; Mr. Carlson and Mr. Hartman argued the cause orally. It is evident from the decisions in Barnes v. Smith, 48 Mont. 309, 137 Pae. 541, Hanson Sheep Co. v. The Bank, 53 Mont. 324, 163 Pac. 1151, and Soott v. Prescott, 69 Mont. 540, 223 Pac. 490, that in none of them is there any statement or insinuation that it was contrary to public policy for the owners of all the stock of a corporation, whether one or more persons, to conduct their own business in the name of the corporation, and to use it as a convenience or agency for the conduct of such business. All that the court says in any of the cases is that such conduct of a corporation must not be used or relied upon to defraud anyone dealing with it, or with the individual stockholders. In other words, this court will not permit corporations, individuals or copartnerships to take advantage of or defraud anyone, either by doing business in the name of a corporation or by relying upon that fact when an injured person with whom they have been dealing seeks redress in the courts, but there is nothing in the conduct of business in such fashion which is contrary to public policy. There was m> fraud or deceit practiced by Biering and Cunningham. ' They did not use Taylors Fork Cattle Company to deceive or defraud anyone. They entered into a personal agreement with the appellant to procure the conveyance to the new corporation to foe organized by plaintiffs and defendants, of all of their property and business held in the name of Taylors Fork Cattle Company, and they complied absolutely and to the letter and in the spirit with their agreement. In the case at bar, it was not only permissible but necessary that the suit be brought by Biering and Cunningham. The evidence is amply sufficient to support the verdict, hearing in mind the principles which guide a court when dealing with fraud announced in Merchants’ Nat. Bank v. Greenhood, 16 Mont. 395, 41 Pac. 250', 851. The minutes of corporate meetings do not of themselves constitute contracts. Appellant has cited many cases on the proposition that minutes of a corporate meeting constitute a contract. There is no question that there are many instances where such minutes do constitute the evidence of a contract, but it will be noted that those cases are where the minutes of a meeting are held to constitute a contract between the corporation and some other party, and often it has been held that the corporation cannot deny its own minutes when some other person has relied on them to his own risk. These rules of law, however, are far from the situation in the case at bar. Attempt is made to relieve defendant of liability on the ground that the only contract between the parties is one that is evidenced by. the minutes of the meeting, and that defendant did not violate this alleged contract. This is not an action on contract, and so far as this ease is concerned, it would make no difference whether the minutes of the meeting did or did not constitute a valid contract. "Whether the minutes of a meeting constitute a contract depends upon whether the parties intended those minutes to embody the terms of their contract. This is fundamental. (See Wigmore, sees. 2401, 2409 and 2430 ; also see Brockway v. Blair, 53 Mont. 531, 165 Pae. 455.) In Hygienic Health Food Co. v. Grant, 187 Cal. 431, 202 Pae. 653, it was held that the minutes of a meeting of a board of directors could be contradicted by other evidence. In Cannon v. Grain Agency, 103 Or. 26, 202 Pac. 725, the court quotes from Fletcher’s Cyc. of Corporations, to the effect that when the minutes contain a record of the action taken, it will be presumed prima facie that the record covers the entire action. This is not conclusive, however, and parol evidence may be introduced to show what in fact was done. (See, also, Goodwin v. Insurance Go., 24 Conn. 591, 601.) An action lies wherever a plaintiff is aggrieved and damnihed by unlawful acts done by defendant pursuant to a plan and conspiracy for that purpose. (Hammond v. Sully, 48 App. D. C. 320, 4 A. L. R. 160; Mott v. Danforth, 6 Watts (Pa.), 304, 31 Am. Dee. 468; Bumney v. Skinner, 64 Mont. 75, 208 Pac. 895; McIntyre v. Dames, 71 Mont. 367, 229 Pac. 846; 26 R. C. L. 756.) Whether damages proximately flowed from the wrongful acts of the conspirators is a question for the ¡jury. (Doremuo; v. Hennessey, 176 111. 608, 68 Am. St. Rep. 203, 43 L. R. A, 797, 52 N. E. 924, 54 N. E. 524; 5 R. C. L. 1104.) MR. JUSTICE STARK delivered the opinion of the court. This is an action in tort, wherein the plaintiffs seek to recover from the defendant damages alleged to have been sustained by them as the result of a conspiracy entered into between the defendant and another for the purpose of depriving them of their property and gaining possession and control thereof for himself. In the complaint it is alleged that in the year 1921 the Taylors Fork Cattle Company, a Montana corporation, which will be hereafter referred to as the Taylors Fork Company,, was the owner and in possession of a large amount of real estate, leases of real estate, and grazing permits for the running of sheep on the Gallatin and Madison National Forests, all having a capacity for the pasturage' and grazing of 27,000 head of sheep, and in addition thereto owned a large amount of personal property, but was not possessed of sufficient livestock to stock the same 'so as to produce revenue therefrom, all of which properties had a value, above indebtedness on the same, of more than $500,000. The capital stock of this corporation consisted of 500 shares, 496 of which were owned by plaintiffs, who for more than twenty years had been partners in the livestock business, and the other four shares were held by persons other than plaintiffs for the purpose of making up the board of directors. This corporation was used by plaintiffs merely as a convenient agency for carrying on their partnership business, and all of the property standing in the name of the corporation was in truth and fact the property of plaintiffs as partners. It is alleged that the defendant, knowing the condition of plaintiffs’ ownership of the capital stock of said corporation, their ownership of said properties, and the value thereof, entered into a conspiracy with one Lester P. Work, with whom he had been associated in business for many years as partner or otherwise, to defraud the plaintiffs of their property and gain possession and control thereof for himself. In brief, the scheme of the defendant and his co-eonspirator, Work, as stated in the complaint, was to induce the plaintiffs to join with him in the organization of a corporation to engage in the ranching and livestock business, with a capital stock of $500,000, upon the understanding and agreement that plaintiffs would cause the Taylors Fork Company to transfer to it all of its properties, of which plaintiffs as partners were in fact the owners, in consideration of one-half its' capital stock, and that the defendant, for the remaining half of said capital stock, should turn over to the corporation 12,000 head of good, young, merchantable ewes, and then finance the corporation to the extent that it would be able to stock its properties to their full capacity of 27,000 head of sheep, and, after having effected the organization of such corporation and having secured the transfer of the plaintiffs’ properties to it, to finance the corporation in such a way as to freeze the plaintiffs out and secure their stock. The complaint says that this new corporation was organized under the name of the Southern Montana Live Stock Company (which will be hereafter referred to as the Southern Montana Company); that, relying upon the defendant’s promises and agreements, and believing that he would keep and perform the same, plaintiffs caused their properties to be transferred and conveyed to it by the Taylors Fork Company, and received therefor one-half of its capital stock, less seven shares, which were issued to other persons for organization purposes; that defendant transferred a band of between 11,000 and 12,000 sheep to it, and received capital stock of the Southern Montana Company equal to that received by the plaintiffs. It is then alleged that all of the agreements and promises, made by the defendant were made as inducements to the plaintiffs to part with -their property, and were so made by him fraudulently, deceitfully and without any intent on his part to keep and perform the same, and as a part of the gei. mal scheme arranged between him and Work to defraud the plaintiffs of their property. It is said that the defendant wholly failed to keep his agreement to finance the corporation to the extent of the capacity of its properties for running 27,000 head of sheep, and many acts of fraud, mismanagement, oppression and deceit on the part of the defendant and his co-conspirator are then set forth. It is claimed that by reason of them, and without fault on the part of plaintiffs, after about two years’ operation of the corporation, its stock had become valueless; all that originally was owned by plaintiffs had been acquired by the defendant without consideration to them, and thereby the defendant and his co-conspirator had accomplished their purpose. The formal allegations of the complaint were admitted by the defendant’s answer, but issue was joined upon all the allegations of conspiracy and fraud. The cause was tried to a jury. At the close of the plaintiffs’ testimony, defendant made a motion for a directed verdict in his favor, which was denied, and he thereupon rested his case without the introduction of any evidence. The jury returned a verdict in favor of plaintiffs, upon which a judgment was entered. Defendant moved for a new trial, which was denied, and he has appealed from the judgment. In the beginning we are confronted with a contention on the part of respondents that the bill of exceptions embraced in the record cannot properly be considered by the court on account of irregularities and defects in its preparation and settlement. This 'bill is a proper subject of adverse criticism. As it appears in the transcript on appeal, it takes up nearly 1,300 printed pages, many hundreds of which could readily have been eliminated by any proper effort at abbreviation, and the task of reviewing it thereby greatly lightened; but we cannot disregard the bill on this account. An inspection of the record discloses that the judgment was entered on July 14, 1924, and motion for new trial made in due time, which was denied on September 5, 1924; that on August 6 an order was made by the court granting defendant sixty days in addition to the statutory time in which to prepare and serve his bill of exceptions on appeal to the supreme court. Under the statute the defendant was entitled to fifteen days after September 5 in which to prepare and serve his proposed bill of exceptions, and the sixty days additional granted by the court on August 6 carried this time beyond November 8, the date" upon which the proposed bill was actually served and delivered to the clerk for the judge. Under these conditions we are obliged to hold that the objections to the consideration of the bill of exceptions must be overruled. Counsel for defendant have made twelve specifications of error in their brief, the first three of which raise but two questions for consideration, namely: (1) Whether the complaint states facts sufficient to constitute a cause of action; and (2) whether there was sufficient evidence to justify the court in submitting the case to the jury. The remaining specifications of error, 4 to 12, inclusive, relate to instructions given by the court. Since these specifications wholly ignore -the requirements of subdivision (b), section 3, of Rule X of this court, and counsel for defendant made no effort to correct the defect after their attention was called to it in plaintiffs’ brief, they will not be considered. (Brockway v. Blair, 53 Mont. 531, 165 Pac. 455; Conner v. Hamilton, 62 Mont. 239, 204 Pac. 489.) In support of their contention that the complaint does not state facts sufficient to constitute a cause of action in favor of the plaintiffs, defendant in the first place presents the argument that it was contrary to public policy for the plaintiffs to carry on their partnership business in the name of the Taylors Fork Company. This contention-need not be considered. The method in which the Taylors Fork Company carried on its business prior to the time of the transactions between the plaintiffs and the defendant is not the subject of inquiry here. The complaint alleges that the plaintiffs, as partners, entered into an agreement with the defendant to procure the conveyance to the Southern Montana Company of all of their property and business, held in the name of the Taylors Fork Company, and that they complied with their agreement in that behalf. No question of public policy is involved. It is next contended that the damages, if any, sustained by plaintiffs, could only be recovered in an action brought in the name of the Taylors Fork Company. Before entering upon a consideration of this contention, it is proper to consider the allegations of the pleadings in reference to the •ownership of the shares of capital stock of the Taylors Fork Company, concerning which there is a considerable amount of discussion in the briefs. In the complaint it is alleged that the plaintiffs owned 496 of the 500 shares of this stock, and that the other four shares were held by persons other than the plaintiffs for the purpose of making up the number of directors required by law; but it is not expressly alleged that the plaintiffs were in reality the owners of these four shares, although an inference to that effect might be drawn from the complaint as a whole. In the first section of his answer the defendant says that he has not sufficient knowledge or information to form a belief as to these allegations of the complaint, and therefore denies the same. . However the answer contains two other sections: A further defense, and (2) a further defense and counterclaim, in each of which it is alleged that “the plaintiffs were operating and the owners of all the capital stock of what was known as the Taylors Fork Company, a corporation,” etc., which allegations are admitted in the plaintiffs’ reply. If an allegation that the plaintiffs were in fact the owners of all the capital stock of the Taylors Fork Company was necessary, the defect in the complaint in this respect was cured by the allegation of that fact in the answer. (Stephens v. Conley, 48 Mont. 352, Ann. Cas. 1915D, 958, 138 Pac. 189; Anderson v. Wirkman, 67 Mont. 176, 215 Pac. 224.) In this situation it must be considered that the complaint contains sufficient allegations to the effect that the plaintiffs in fact were the owners of all the capital stock of the Taylors Fork Company, and likewise as partners, were the real owners of all the property standing in the name of that corporation. This brings the case within the principle adopted in the case of Camp v. Gress, 244 Fed. 121, 156 C. C. A. 549, affirmed in 250 U. S. 308, 63 L. Ed. 997, 39 Sup. Ct. Rep. 478. The plaintiffs had a right to bring this action in their own names, and the. complaint states a cause of action in their favor. This leaves for consideration only the question whether there was sufficient evidence to justify the court in submitting the case to the jury. This presents three inquiries: (a) Does the evidence tend to establish that the defendant entered into a conspiracy with Work to defraud the plaintiff as alleged in the complaint? And, if so, (b) Did the plaintiffs produce evidence from which a jury would be entitled to draw a conclusion that the defendant, in furtherance of such plan and scheme, committed overt acts which resulted in damage to the plaintiffs? And, finally, (c) Was there evidence from which the jury could properly estimate the amount of this damage? In pursuing these inquiries, we must bear in mind that there is no dispute in the testimony, and also the rule, many times announced by this court, that, where there is any substantial evidence to support the plaintiffs’ ease, it is proper to refuse defendant’s motion for a directed verdict. (In re Carroll’s Estate, 59 Mont. 403, 196 Pac. 996.) That "Work and Singling formulated a scheme to deprive the plaintiffs of their property does not admit of doubt. A witness, A. M. Sackett, testified that during the fall or early winter of the year 1920, at the Birch Creek ranch in Meagher county, he overheard a conversation between these two men in which they were 'discussing the condition of certain sheep owned by them, which were located on the ranches of the Taylors Fork Company. In response to an inquiry made of him by Singling, Work said: “They are all right. There is plenty of feed and pasture over there, and we will just leave them there. They are old, and we do not ever have to move them anyway. As I have said to you before, that is one of the best sheep ranches in the state. We want to get hold of that. With that summer range and pasture it will make our outfit complete. You know Cunningham and Biering are crazy to get into the sheep game, and they don’t know anything about sheep. I think that we can get them into a corporation, stock it up with those old sheep and finance it in such a way that we can freeze them out.” To this suggestion Singling replied: “You can arrange a meeting; I will form the corporation.” It is significant that there was no cross-examination of this witness, and that neither Work nor Singling went upon the witness-stand to deny the statements attributed to them; so that these statements stand unimpeached and undenied. It is admitted in the pleadings that the Southern Montana Company was organized for the purpose of taking over the plaintiffs’ properties from the Taylors Fork Company and 12,000 head of sheep from the defendant, and that, in consideration therefor, all the capital stock of the company was to foe equally divided between the plaintiffs and the defendant; that the Taylors Fork Company did convey said properties to the new corporation; that the defendant conveyed to it about 12,000 head of sheep; that the capital stock was divided as had been agreed upon; and that plaintiff Biering was made president and general manager of the company. Since the record in the case is so volnminons, manifestly it would unnecessarily prolong this opinion to undertake a 'statement of all of it, but some of the salient points in the testimony, tending to establish the overt acts committed by the defendant and his co-conspirator in furtherance of the object of the conspiracy, are as follows: In financing the company, instead of loaning money to it or providing some method of procuring cash to be placed in the treasury for expenditure by the officers in stocking the company’s properties, the defendant adopted the plan of furnishing sheep direct to plaintiffs from bands owned by him and his co-conspirator, Work, and taking notes therefor. From the original band of 11,000 or 12,000 ewes, turned over to the Southern Montana Company by the defendant, there were produced in the year 1921 about 8,500 lambs, of which 1,500 were sold to the defendant and Work upon an express agreement that they would furnish the company with 10,000 head of good ewe lambs in the spring of 1922. Meantime, during the summer of 1921, Ringling and Work brought on to the Southern Montana Company’s properties about 10,000 head of their own sheep, where they were pastured and fed, the expense of keeping them being paid by the Southern Montana Company, which was never fully compensated therefor. In October, after Ringling and Work had taken the wool and lamb crop for the season, Work attempted to sell the whole 10,000 to the company, but, upon Biering’s objection to the quality of these sheep, Work picked out 4,000 of the poorest ones, turned over 6,000 to the company, taking notes in the sum of $65,000 as payment for 10,000 head, promising that he would later deliver 4,000 good, young ewes to make up the general average of the 10,000 band. A little later Work delivered 4,000 head from the Ringling and Work ranch at White Sulphur Springs, but they were not seen by Biering until after delivery, when he found that they were old, .poor and so bad that Work apologized and promised that it would be made all right when the 10>000 young ewes were delivered in the spring of 1922. In the spring of 1922 Biering went to the Ringling and Work ranch at White Sulphur Springs to obtain the 10,000 ewes which had been promised at the time of the sale of the 1,500 lambs and the delivery of the 4,000 head above mentioned, but upon his arrival at the ranch Work notified him that he could have only 3,000 sheep, although Ringling and Work then had upwards of 19,000 available at that place. As the Southern Montana Company was short of sheep and not financially able to get them elsewhere, Biering finally acquiesced in Work’s declaration that he was to have only 3,000 head. After a considerable amount of discussion and the inspection of various bands of sheep, Biering agreed to accept 3,000 black-faced sheep out of a band shown to him by Work, and, as it was necessary for him to leave in order to make arrangements to have the sheep driven across the forest reserve, he said to Work that he would leave it to him as an officer and director of the Southern Montana Company to see to it that the sheep selected were the ones that were delivered; but when the sheep arrived at the company’s ranch they were short about 200 head, and consisted of a mixed lot of black faces, white faces, coarse wool and about 150 wethers. There was no evidence of any attempt to further comply with the agreement to furnish 10,000 head of good ewes in the spring of 1922. The Southern Montana Company went into the summer of 1922 with about 19,000 head of sheep instead of 27,000 head, due to the failure and neglect of Ringling properly to assist in financing it. The lamb crop for 1922 was sold to John Clay & Co. of Chicago in the fall and brought a total of a little over $130,000, and, although Ringling and Work wore directors of the company, without authority for doing so, they held ont something over $10,000 of this amount, claiming it as commissions on this sale, and also demanded that the whole sum should be turned over to John Clay & Co., to be applied to the account of Bingling & Work. When this demand was refused by Biering, as manager, of the Southern Montana Company, John Clay & Co. deducted from the total sale price of these lambs the sum of $114,319.80 as payment for notes due from the Southern Montana Company, including some notes which Bingling and Work had received from the company and turned over to John Clay & Co., leaving a balance still due of $5,625.79, and this balance Bingling and Work took for their own use; so that the Southern Montana Company received no funds whatever from the 1922 lamb crop. The settlement of this transaction was in November, 1922. Thereafter the Southern Montana Company received no further credit from that source, and was left without adequate funds for operations during the ensuing months. It had been the custom that the ordinary running expenses of the Southern Montana Company should be paid by drafts drawn by those in charge of the ranch operations, but during the month of January, 1923, Work instructed Bingling’s private secretary to see to it that no cheeks drawn by the plaintiffs were paid, stating that they had cut off their credit. Following these instructions, payment was refused on numerous drafts drawn in payment of hay, pasturage, labor, groceries and other supplies necessary for the conduct of the business. After payment had been refused on these drafts, the plaintiff Biering went to the Metals Bank of Butte, where the Southern Montana Company had theretofore borrowed $90,000, seeking further financial assistance, which was refused, and he was advised that his credit was no good. There was testimony to the effect that between the time of the organization of the Southern Montana Company in 1921, and the fall and winter of 1922, the price of lambs and wool just about doubled, that in 1923 the market was a little stronger than in 1922, and that, if the company’s ranches had been stocked to their capacity, it would have made money. When the plaintiffs received their stock in the Southern Montana Company, they turned it over to the Elling Estates Company as collateral to some notes which they, with others, were owing to that institution. Shortly thereafter, Work induced one Malott, manager of the Spokane & Eastern Bank, to demand from the Elling Estates Company the plaintiffs’ notes and stock as additional security for an indebtedness due from the plaintiffs and the Elling Estates Company to that bank, for the purpose of enabling the Spokane and Eastern Bank to foreclose on the stock, so that Ringling and Work could get hold of it. In the fall of 1922 the Spokane & Eastern Bank, being induced to do so by Work, commenced an action against the plaintiffs and other signers of said notes and sought to foreclose their lien on the plaintiffs’ stock ahead of other collateral which it held. When Work’s attention was called to this situation, he admitted he was responsible for it, and was pleased that he had been able to “put it over” on the plaintiffs. When Ringling was advised of these facts, he admitted that he knew all about it. In December, 1922, just about a month after the settlement with John Clay & Co., and while the Spokane & Eastern Bank suit was pending against them, the plaintiffs had a conference with Ringling in Butte with reference to the affairs of the Southern Montana Company and their own affairs, in which the above-mentioned Spokane & Eastern Bank transaction was discussed, as well as the financial situation of the Southern Montana Company; whereupon Ringling agreed that the Southern Montana Company should sever its relations with Ringling & Work, and that a bond issue should be floated to enable the Southern Montana Company to pay its indebtedness and do business on a cash basis by purchasing sheep in the open market and doing away with the difficulties between it and Ringling and Work. At this time Ringling requested Biering to resign as president of the Southern Montana Company and allow himself (Ringling) to be elected to that office, so as to make the financing of the company easier. At the same time the plaintiffs advised Ringling confidentially that they were obliged to depend entirely upon the Southern Montana Company for all of their income, and that they had no other resources. In furtherance of the agreement then made, Biering did resign as president of the company, and on December 20, 1922, Ringling was elected to that office, but no steps were ever taken toward a 'bond issue. At this Butte conference, Ringling promised plaintiffs to protect them against the loss of their stock on account of the action of the Spokane & Eastern Bank; but it is further shown that this stock, together with plaintiffs’ notes, got back into the possession of the Elling Estates Company, and that the defendant subsequently became the owner of them. At the time of the organization of the Southern Montana Company, Ringling had agreed with the plaintiffs that Work should have nothing to do with the management of its affairs on account of the fact that Work was in disrepute with the federal officers having charge of the national forests, and the further fact that he had made a failure of any business which he had theretofore been engaged in. In January, 1923, Biering had a tqlk with Work in which Work was directed to refrain from interfering with the business of the Southern Montana Company, whereupon Work informed Biering that he “was going to have it all in a little while, and that he was going to break Biering up in business.” About an hour later Work handed Biering a telegram from Ringling, instructing him (Work) to take care of the Southern Montana Company, and stating that he (Ringling) did not care to finance the company further unless “we have complete control”; and it appears that, just prior to that time, on December 28, 1922, Ringling had executed to Work a proxy authorizing him to vote all of the Ringling stoek at all stockholders’ meetings. At this time the company was in serious financial straits; Ringling was in Florida; Biering sent him six telegrams, which were not delivered, for the reason that Ringling refused to receive them. There was evidence in the case from which the jury were justified in concluding that the directors of the Southern Montana Company were dominated and controlled by Ringling and Work; that valuable leases were lost to the Southern Montana Company through its inability and- neglect to pay the rentals due thereon; that all the sheep belonging to the company were sold at less than their market value; that director Work took funds of the company under, the guise of commissions, without legal authority for doing so; that the plaintiffs were harassed by numerous lawsuits instituted by the conspirators; their credit ruined so that they were unable to raise funds with which to pay ‘their indebtedness and redeem their stock; and that finally it passed into the ownership of Ringling by purchase from the Ellings Estates Company, so that, at the end of about two years of operations of the Southern Montana Company,- the plaintiffs had lost all their property valued at half a million dollars, and the defendant had acquired it all, without any compensation accruing to plaintiffs, so far as this record discloses. It also appeared in the evidence that at all times during these operations the defendant was possessed of ample resources so that he could easily have assisted in financing the company, had he so- desired, and so have avoided the catastrophe which overtook it. On the question of damages, the court in its instruction No. 8 advised the jury: “In fixing the amount of actual damages, you may take into consideration the value of the property transferred to the Southern Montana Live Stock Company^ at the date that the plaintiffs parted with the same, and you should deduct from such value the amount of indebtedness which you may find from a preponderance of the evidence was against the property at the time. In no case can you fix the actual damages at a greater sum than the difference between the value of said property so found by you and the said indebtedness.” The only objection offered to this instruction by the defendant was as follows: “The defendant objects to the giving of instruction No. 8, offered by the plaintiffs, for the reason that it does not state the correct measure of damages which may be used by the jury in the determination of the damages suffered by the plaintiffs, if any, in this case, in that it permits the plaintiffs to recover the value of the property which was turned over to the Southern Montana Live Stock Company, without regard to the indebtedness of the Taylors Fork Cattle Company, a corporation, as it existed at the time of the transfer; and that there is no basis upon which the jury may determine any damages in this action.” This instruction became the law of the case. (Bliss v. Wolcott, 40 Mont. 491, 135 Am. St. Rep. 636, 107 Pac. 423.) A bare reading of the instruction shows that the first portion of the objection was groundless; and a consideration of the testimony discloses that the last portion was without merit. "While there is considerable discussion in the briefs of counsel as to the value of the properties belonging to the plaintiffs, and which were turned over to the Southern Montana Company, that matter is not in dispute on this record. Numerous witnesses testified that it was worth in excess of $646,000. The indebtedness against it was placed at $146,000, leaving its net value, above any encumbrances, at $500,000. In addition to this, it was testified to by the plaintiff Biering that, at the time the transfer was made, it was agreed between the plaintiffs and the defendant that the value of their property was $500;000, exclusive of their debts, and there was no contradiction of this testimony. When the Taylors Fork Company transferred plaintiffs’ property to the Southern Montana Company, the plaintiffs lost their interest in one-half of it, and the defendant acquired that half; and when the defendant came into the ownership of the plaintiffs’ stock in the Southern Montana Company through his purchase from the Elling Estates Company, he acquired the other half of the plaintiffs’ property and thereby consummated the scheme which he and his co-conspirator, Work, had formulated in their talk at the Birch Creek ranch in the fall or early winter of the year 1920, if the testimony of the witnesses given at the trial was true. “A conspiracy is a combination of two or more persons by some concerted action to accomplish a criminal or unlawful purpose or to accomplish .a purpose, not in itself criminal or unlawful, by criminal or unlawful means.” (Lindsay & Co. v. Montana F. of L., 37 Mont. 264, 127 Am. St. Rep. 722, 18 L. R. A. (n. s.) 707, 96 Pac. 127.) “That is not lawful which is: (1) Contrary to an express provision of law; (2) contrary to the policy of express law, though not expressly prohibited; or, (3) otherwise contrary to good morals. (See. 7553, Rev. Codes 1921.) “A promise, made without any intention of performing it” is a deceit. (See. 7575, Id.) “One who willfully deceives another, with intent to induce him to alter his position to his injury or risk, is liable for any damage which he thereby suffers.” (Sec. 7574, Id.) No man can justify the acquisition of another’s property by deceit. To undertake such an acquisition is an illegal act within the purview of the Code sections above quoted. “It is the illegality of the purpose to be accomplished, or the illegal means used in furtherance of the purpose, which makes the act illegal.” (Lindsay & Co. v. Montana F. of L., supra, at page 273, 37 Mont.) If the purpose sought to be accomplished is illegal, then all the acts done in furtherance of that purpose become tainted with the illegality, although, if performed by themselves without the unlawful purpose in view, they might be innocent. It was, of course, incumbent upon the plaintiffs in order to be entitled to recover, to prove that the acts of defendant and his co-conspirator were the proximate cause of the damages sustained by them. In Doremus v. Hennessy, 176 Ill. 608, 68 Am. St. Rep. 203, 43 L. R. A. 797, 802, 52 N. E. 924, 54 N. E. 524, it is said: “Whether the injury and damage sustained by plaintiff resulted from the acts of the defendant or were the result of a new, independent factor for which appellants were not responsible, cannot be determined by the court as a question of law, unless the fact be conceded or the proof be substantially all to that effect.” It cannot be said as a matter of law that the testimony of the witnesses given at the trial was not true, and the case was properly submitted to the jury. By their verdict the jury resolved the issues of fact in favor of the plaintiffs. The amount of their verdict is well within what they were authorized to award under the instructions of the court, and this verdict cannot be disturbed. We have given due consideration to all the matters discussed by counsel in their briefs but have found nothing therein which would justify a conclusion other thaij that above stated. The judgment is affirmed. Affirmed. Associate Justices Holloway, Galen and Matthews' concur. Mr. Chief Justice Callaway, being absent on account of illness, did not hear the argument and takes no part in the foregoing decision. On Motion for Rehearing. MR. JUSTICE STARE delivered the opinion of the court. Counsel for defendant filed a petition for a rehearing in this case upon various grounds, among them being that the court overlooked a material and vital question relative to the sufficiency of plaintiffs’ evidence to sustain the judgment, for the reason that, in the opinion filed, no mention was made of the effect of certain minutes of the proceedings had at meetings of the boards .of directors of the Taylors Fork Company and the Southern Montana Company. It did not appear to us that a consideration of the effect of these minutes was material to a decision of the case as presented in the record. Counsel, however, urge their views in this matter with such insistence that we add to what is said in the original opinion the following observations relative to the sufficiency of the evidence to sustain the judgment: Without objection, each of the plaintiffs testified that the agreement between themselves and the defendant, by which they were induced to join with him in organizing the Southern Montana Company for the purposes and upon the terms and conditions recited in the complaint, was made by oral negotiations carried on between them some time in the spring of 1921. Upon cross-examination of the plaintiff Biering, it was shown that subsequent to ‘the time when this agreement was made, and on May 19, 1921, the plaintiffs caused a meeting of the board of directors of the Taylors Fork Company to be held, at which a resolution was adopted containing a recital to. the effect that the defendant had made a proposition to the company that he would transfer certain sheep to the Southern Montana Company and assist in financing its operations, upon condition that the Taylors Fork Company would transfer to said corporation all of its property, consisting of real estate, land contracts and leases, with the equipment appurtenant thereto, and that, as a consideration therefor, the defendant should receive one-half of the stock of said corporation, less seven shares, to be issued to other persons to qualify them as directors, and that the Taylors Fork Company, or Biering and Cunningham, as its principal stockholders, should receive a like amount of the stock of said corporation. In connection with the cross-examination of the same witness, over objections of the plaintiffs, there was also introduced in evidence the minutes of a meeting of the board of directors of the Southern Montana Company, held on May 27, 1921, in which it was disclosed that the defendant and the plaintiffs were both present, and at which the defendant made a proposal to the company that he would turn over to it 12,000 head of ewes and approximately 250 head of bucks and all livestock and property used in connection with the handling of the same, free and clear of all encumbrances, and would agree to assist the company in financing itself and. disposing of its commercial paper in consideration of 2,493 shares of its capital stock, The minutes also showed that at this meeting the plaintiff Cunningham stated to the directors* that, as a stockholder and director of the Taylors Fork Company, he was authorized to announce that said company would transfer to the Southern Montana Company all of its real estate and additionally some personal property, in consideration of 2,493 shares of its capital stock. The minutes show that both of the above propositions were accepted. Counsel urge that the recitals contained in the minutes of these two meetings constitute written evidence of the contract between the plaintiffs and the defendant; that any oral arrangements which may have theretofore been made between them must be deemed merged in the written contract thus disclosed; that, since these minutes refer only to the fact that the defendant was to turn over to the Southern Montana Company 12,000 head of ewes and 250 bucks and assist in financing it, but do not contain any recitals that he was to finance or assist in financing this company, so as to enable it to stock its ranches to their capacity of 27,000 head of sheep, the rights of the parties. to this action must be determined solely by the recitals contained in these minutes; that it was not competent, to vary these recitals by oral testimony; that the evidence wholly failed to establish that defendant had not done everything he agreed to do, according to the recitals contained in these minutes, and hence the plaintiffs had not sustained the burden of proving their case. There is no merit in this contention. It is manifest that the resolution shown by the minutes of the meeting of the board of directors of the Taylors Fork Company was adopted only as a part of the means of carrying into effect the contract which had theretofore been entered into between the plaintiffs and the defendant, and that it was not intended that it should state what that contract was, and it did not, in fact, purport to do so. So far as the minutes of the Southern Montana Company are concerned, they do not in any manner pretend to state •the terms of any agreement between the parties to this action. Nothing contained in them even remotely intimates the existence of such an agreement. According to their recitals, the defendant made a proposition to this company which was accepted. The Taylors Fork Company likewise made a proposition to the company which was accepted. That is all these minutes assume to state. They do not purport to state the terms of any agreement made between the plaintiffs and the defendant individually at the time this meeting was held, or at any other time. Therefore a consideration of the circumstances under which the recorded minutes of a corporate meeting are deemed to have the effect of a contract was not essential to a determination of the case on this appeal. The other grounds advanced in support of the petition for a rehearing amount only to a reargument of the appeal on its merits, and we aré satisfied with the original disposition of them. The motion for a rehearing is denied. Behearing denied. Associate Justices Holloway, Galen and Matthews concur. Mr. Chief Justice Callaway, having been absent on account of illness when the cause was originally heard and submitted, did not take part in the former decision and takes no part in this.
CASELAW
Pathophysiology of type 2 diabetes 2021, Study uncovers why COVID-19 is more deadly for some people with diabetes than others Full size table Experimental design A To investigate the effect of DDW on metabolic changes occur in diabetes, diabetic and control rats were divided into two main groups: half of the animals were given DDW 25 ppm Dand the other half received normal tap water ppm Dboth provided ad libitum. To determine whether DDW exerts its effects, at least partially, by modifying the action of insulin, diabetic rats were further divided into subgroups according to insulin treatment. The control rats did not receive insulin treatment. We did not want to achieve euglycaemia by insulin treatment, but to prevent severe acute complications only. Therefore, two different doses of insulin Huminsulin Lilly Normal I. The insulin was administered subcutaneously in equal portions twice daily 8. Treatments started at the 2nd week after STZ injection and lasted for an additional 8 weeks. Treatments started at the 2nd week after STZ injection and lasted for 4 weeks. Food intake, water consumption, and body weight were measured daily. Blood samples from the tail vein and 24 h urine samples were collected once a week. The plasma samples were obtained by centrifugation at ×g for 15 min at 4 °C. After measuring the volume, urine was centrifuged at × g for 10 min and the supernatant was used for analysis. Plasma glucose Plasma Glucose was determined spectrophotometrically using reagent kits from Reanal Finechemical Co. Budapest, Hungary. The plates were analyzed by a Biorad microplate reader. Plasma fructosamine concentration Plasma fructosamine concentration was determined spectrophotometrically using the micro method developed by Oppel et al. In brief, fructosamine reagent was prepared by dissolving 50 mg nitroblue tetrazolium NBT, from Sigma, Budapest, Hungary in Standard was prepared from bovine serum albumin as described previously in detail [ 23 ]. Twenty pathophysiology of type 2 diabetes 2021 of plasma or an adequate volume of standard solution was pipetted into the wells of a well plate in three parallels, respectively. After the addition of µl reagent into each well, the plates were profoundly shaken and then incubated at 37 °C for 10 min. The initial absorbance was read at nm A1. Following a subsequent incubation for 10 min, the absorbance pathophysiology of type 2 diabetes 2021 read again at nm A2. Fructosamine concentration Csample was calculated from Eq. In brief, 30 µl of blood samples collected without anticoagulants were hemolysated in µL deionised water. After further washing of the columns with washing buffer 10 mLµL of the hemolysate were transferred to the top of the columns and normál diabetes kezelésére 2021-től to soak in. Unbound hemoglobins were eluted by passing 8 mL of washing buffer through the column. The unbound fraction, containing most of the hemoglobin was diluted to 15 mL with washing buffer. The absorbance of each fraction was measured at nm and the amount of hemoglobin bound glycosylated was calculated as a percentage of the total. Isolation of the membrane fraction of soleus muscle Isolation of the membrane fraction of soleus muscle was performed according to Villanueva-Peñacarrillo ML et al. Briefly, soleus muscles from each rat hind limb were removed and trimmed of connective tissue, fat and nerves. The homogenate was centrifuged at ×g for 10 min at 4 °C, and the pellet was discarded. The supernatant was then centrifuged at ×g for 60 min in a Beckman SW55 rotor. Introduction The pellet was resuspended in 0. The pellet was finally resuspended and homogenized in washing buffer, and the total membrane protein content was measured by the Bradford method. Western blot analyses The samples were prepared in 2 × Laemmli buffer containing mmol dithiothreitol and boiled in a water bath for 15 min. The ODs of bands were determined by densitometry. pathophysiology of type 2 diabetes 2021 diabetes kína kezelése All chemicals not mentioned otherwise were purchased from Sigma Budapest, Hungary. Statistical analyses The results are presented as the mean ± SEM of n observations. Results DDW as drinking water reduced plasma glucose concentration and improved the metabolic parameters in diabetic rats To evaluate the effect of DDW on the glucose metabolism in streptozotocin STZ -induced diabetic rat model, first we aimed to test the 25 ppm D-concentration, which was the lowest D-concentration of DDW available. In animals without any insulin treatment, DDW alone did not affect blood glucose concentration. These results indicate that deuterium depletion, in the presence of insulin, can affect blood glucose levels in diabetic animals. Open and closed circles represent the data obtained from animals receiving either DDW 25 ppm or tap water, respectively. • Cukor szint meres • Study uncovers why COVID is more deadly fo | EurekAlert! • Cukorbetegek diétája pdf Numbers in brackets show the number of animals in each group Full size image To evaluate the changes of metabolic parameters in non-diabetic rats receiving drinking water with ppm or 25 ppm D content for four weeks were individually placed in metabolic cages for 24 h and the amount of fluid and food consumed was measured and the volume of urine excreted and its glucose content were determined. To evaluate the changes of metabolic parameters in STZ-treated diabetic rats receiving drinking water with ppm or 25 ppm D content for four weeks were individually placed in metabolic cages for 12 h, without insulin administration, and the amount of fluid and food consumption, the volume of urine excretion and its glucose content were measured, respectively. pathophysiology of type 2 diabetes 2021 kezelése pneumonium diabetes In conclusion, the D content of the drinking water did not significantly affect the parameters studied in either non-diabetic or STZ-treated animals without insulin administration. Next, to determine the most effective D-concentration, DDW with 25, 75,and ppm D-concentrations was tested along with the application of a low insulin dose only. Surprisingly, we found that the ppm value, which was closer to the natural D level, was the most effective D-concentration in reducing blood glucose levels in diabetic animals. The inset shows the values for the symbols. The amount of fluid and food consumed was measured, and the volume of urine excreted and its glucose content were determined. Table 3. Figures 3 — 5 show the summary of three experiments in which the following D-concentrations were applied: 25, 75,ppm and ppm in the control group. pathophysiology of type 2 diabetes 2021 inzulin értékek Low dose of insulin was used along with all D-concentrations. The inset graphs show the magnified part of the curve between the deuterium content of ppm and ppm, respectively. Animals receiving drinking water-containing ppm deuterium had the lowest fructosamine levels among the DDW-treated animals. The inset graphs show the magnified part of the curve in the range of the deuterium content between and ppm. Furthermore, symbols indicate the significance level of data compared to animals receiving 25 ppm deuterium-containing drinking water. DDW did not influence the half-life of insulin in blood The first experiment revealed that the presence of insulin is essential for DDW to be able to reduce blood glucose concentration. To exclude the possibility that deuterium depletion may stabilize the insulin in the plasma which results in lower blood glucose levels, the insulin concentration of the blood plasma was determined after the administration of DDW. The insulin concentration was the highest two hours after administration and there was a gradual decrease for 10 h until the next administration, but the data did not support the hypothesis that DDW influences insulin stability Fig. The essential role of insulin in the mechanism influenced by the lowering D-concentration was cukormentes müzli lidl confirmed by following the correlation between insulin and glucose concentration after every two hours of administration. The data show that the blood glucose concentration was the lowest two hours after the administration, when the insulin level was the highest. DDW dose-dependently potentiates the effect of insulin, in part, due to the increased GLUT4 protein translocation from the cytoplasm to the membrane As glucose is cleared from the bloodstream by a family of facilitative transporters GLUTs and the GLUT4 isoform is the major insulin-responsive transporter, we planned to measure the amount of GLUT4 in the membrane fraction of the soleus muscle. Figure 8 shows that in non-diabetic rats the GLUT4 level was high and remained the same independently pathophysiology of type 2 diabetes 2021 D-concentration in the drinking water 25 ppm or ppm. Inset shows a representative immunoblot of insulin-promoted GLUT4 translocation to the membrane fraction. Bars indicate the mean values of the densitometry evaluation of the GLUT4 protein corresponding spots on the immunoblots and expressed as a percentage of the pathophysiology of type 2 diabetes 2021 of the tap water given to control group non-diabetic animals. In diabetic rats, we found a strong correlation between the amount of GLUT4 in the membrane fraction and the blood glucose concentration. As the blood glucose concentration was the highest in the control group, the lowest GLUT4 level was detected in the membrane, but at the same time the ppm DDW resulted in the lowest glucose concentration. This can be explained with the highest GLUT4 level being in the membrane. Discussion There has been increasing evidence that naturally occurring deuterium has a central role in living organisms since the first paper was published [ 9 ]. In this study, we proved that the changes in D-concentrations in water may potentiate the insulin-regulated membrane trafficking by recruiting membrane vesicles containing the GLUT4 glucose transporters from the interior of cells to the cell surface. Study uncovers why COVID-19 is more deadly for some people with diabetes than others One of the most striking results was that it was not the lowest D-concentration 25 ppm that exerted the most significant stimulus on the insulin signal transduction system, but a narrow subnatural concentration range between and ppm. We also suggest that the D-concentration varies in the different nutrients depending on the place of cultivation, country of origin, the biochemical pathways for photosynthetic CO2-fixation in plants [ 3637 ], and the ratio of the main organic compounds carbohydrates, proteins, lipids also influences cellular processes and has a major impact on metabolism. Based on our experimental data, deuterium-depleted water can offer clinical benefits in the treatment of patients with metabolic syndrome by increasing insulin sensitivity. The results presented here serve as novel evidence that the naturally occurring deuterium has an important role in living organisms. MeSH terms Further research is needed to explore whether a similar mechanism could be responsible for the beneficial effect of DDW on the parameters of glucose metabolism in human subjects, however this is beyond the scope of the current study. Nevertheless, deuterium depletion can potentially offer an effective and innocuous tool for treating not only malignant but also metabolic diseases. Data availability All data generated or analysed during vércukorszintmérő tesztcsík lejárt study are included in this published article. References 1. Jancsó G Isotope effects. Van Nostrand Reinhold, New York, pp —
ESSENTIALAI-STEM
  OFFLINE CODING TO THE RESCUE FOR FMD COMPLIANCE Thousands of pharmaceutical manufacturers and packers across the EU face the rather costly prospect of re-engineering their production lines to satisfy the EU Falsified Medicines Directive (FMD). Systems that carry out coding and inspection offline could be one way of easing the compliance burden. The Falsified Medicines Directive (FMD), aimed at reducing the number of falsified and counterfeit medicines infiltrating the legal pharmaceutical supply chain within Europe, was implemented in 2011. From January 2016 onwards manufacturers failing to comply with the directive will have to withdraw their products from the European market. A core requirement of the legislation is the serialisation of individual pharmaceutical packs, via unique codes encrypted in machine readable 2D datamatrix codes. Besides a randomised unique serial number, the datamatrix codes will be required to carry a manufacturer product code, expiry date and batch number. This increases the burden on pharmaceutical manufacturers when it comes to coding cartons, as they have to print and verify complex datamatrix codes at high speeds, which is both costly and complex to do. The majority of manufacturers will have to upgrade their production lines to accommodate sophisticated coding and image recognition systems that are capable of working at high speeds.  And it’s not just old embossing kit and hot foil coders that will have to go. According to some estimates, up to 80% of the coding solutions currently used in pharmaceuticals and healthcare will be rendered obsolete by FMD. Retrofitting a coding station that can transport the filled carton, print and inspect the code and reject problem packs is problematic on lines where space is at a premium, introduces the challenge of integrating different interfaces and can compromise line efficiency. CIJs fall short Whilst in theory most modern inline coders are capable of reliably producing readable 2D codes, in reality, this is not always the case. Manufacturers are typically finding that continuous ink jets (CIJs) are not up to the challenge, because they struggle to consistently produce 2D codes that meet the ISO/IEC 15415 quality specification. Code quality is crucial for machine readable codes. Under the FMD, 2D codes must be verified via a camera-based system to confirm that the unique number encrypted in the code has been printed on the pack. Vision system performance is influenced by the quality of the code, and 2D codes that are slightly fuzzy, blurred or out-of-position might be unreadable. Rejection and rework of any packs carrying unreadable codes will have serious implications for overall equipment effectiveness (OEE).   There are other reasons against CIJ for pharmaceutical coding besides its relatively low print resolution. The technology is perceived as messy and dirty, with a high risk of ink spillage and odours emitted by the solvents used. Thermal inkjet printers (TIJs) place their pixels more accurately and offer higher resolution printing (typically 300 dpi or above) than CIJ systems. This makes TIJ the obvious print technology of choice for pharmaceutical 2D codes. Perfect presentation a must However, even where manufacturers are using TIJ, print quality is still dependent on the presentation of the carton to the printer. Datamatrix barcoding requires near perfect presentation of a carton to the printer in order to achieve the highest verification grade. This means cartons must be fed smoothly, flat and square to the printer. Any deviation from this may cause a serious flaw in the print, resulting in mis-coded packs that cannot be validated by an online vision system. Recurrent mis-codes can lead to major production inefficiencies. To this end, accurate carton feeding is crucial, and with an online system, the necessary accuracy will rarely be achieved without the addition of an extra line element that controls the carton during print and inspection. This can have serious space implications and revalidation issues. Pharmaceutical cartons are usually coded on the end flap. Further potential for mis-codes arises when the closed end flap bulges, presenting a convex surface to the printer. Maintaining line speeds Producing high quality serialised codes at the line speeds required by some pharmaceutical operations is no mean feat either. Current systems generally print the same information, say, 20,000 times. With serialisation you’re printing 20,000 batches of one at rates of up to eight per second. Manufacturers have to get all those numbers to the printer, filed, printed and never duplicated. The key is getting data into the printer and making sure print speed is high, so factors like drying time become very important. The absolute requirement for codes to be verified immediately after printing may also impact line efficiency. Essentially, the vision system needs enough time to acquire an image of the 2D code and the human readable lines of text, to process that information and come back with a decision as to whether the pack is acceptable before the next pack is in front of the camera. Both the printing of serialised codes and the code verification step could slow down the line. Taking coding offline For many pharmaceutical operations, the answer to these issues could lie in taking coding offline, with a modular system that incorporates printing, labelling, inspection and automatic stack-to-stack feeding technology. Offline overprinting systems come into their own where a large amount of text is required or the print is required to meet an exacting standard, such as the 2D datamatrix code on a pharmaceutical carton. By taking this process offline, the cartons are brought to the line ready printed and inspected, eliminating any delays due to coding issues. The potential for rejects is massively reduced because the carton can be presented to the printer in the most favourable orientation. For example, an offline system will print cartons flat, so there are no problems with mis-codes on bulging end flaps. Gravity also works in the favour of offline printing. Whereas an online printer usually sits adjacent to the line and applies the ink across the pack, on an offline system the nozzles fire the ink from above. This minimises the risk of run from excess ink and produces super-crisp codes. Many companies assume that an online system will be faster and more efficient than an offline one, but once you take into account the impact that inline verification, serialised code printing and mis-codes could have on line efficiency and OEE, offline coding starts to look like an attractive option. Speeds of up to 200 packs per minute are well within the capabilities of an offline coder, and a range of pharmaceutical packaging formats can be coded offline, including cartons, wallets, sleeves and crash-lock cartons. In fact, small batches of only a few hundred cartons or even less than a hundred are more efficient and economical coded offline. Systems can be positioned either near or next to a line to keep it supplied during running or can supply a second line in a central location. Counting the cost of compliance From an investment point of view, the cost of complying with FMD through an offline system is far lower than the cost of upgrading an online system, particularly when you take into account disruption and downtime. Based on experience, it can take several months to decide on your equipment supplier, then up to a year to set up and test a new line. An offline system is independent of the production line and can be up-and-running in a matter of weeks. Offline coding might sound like a low tech solution, but this is not necessarily the case. Offline coders can be built with an inline diverter-flap reject system for automatic removal of reject cartons, software controls and shingling (accumulation) conveyors to maintain high throughput. Integral inspection of printed information and pharmacode verifies that datamatrix codes and human readable information such as expiry dates and lot codes are correct. Offline systems can be fitted with either a thermal inkjet or a thermal transfer printer, depending on the application. In some scenarios, a system incorporating both technologies may be configured. For example, manufacturers may want thermal inkjet for printing on the flap of a carton, which is a rough, varnish free surface, and thermal transfer for coding the main body of the pack, which is a smooth, glossy surface. It is not just small, low volume producers and packers who are embracing offline coding. Multi-national pharmaceutical manufacturers are increasingly realising that it offers a way of complying with the new legislation without impacting the production line. Weigh up all options The timetable for FMD implementation is tight, but instead of rushing into expensive upgrades to their production lines, pharmaceutical manufacturers and packers would be well advised to consider offline as well as online options. With the FMD, coding has become a core capability – without it you cannot manufacture – so there is no margin for error. %d bloggers like this:
ESSENTIALAI-STEM
Is Google Set to Bring DoubleClick to Outdoor Ad Space? Search giant Google Inc.GOOGL has started testing its online advertisement technology, DoubleClick, to take it beyond desktop computers and mobile phones to billboards. Google started the trial of testing its DoubleClick ad technology, which automatically selects and provides ads on numerous websites, on digital billboards or as the ad industry calls it, Digital Out-Of-Home Media in October. It is at present powering outdoor billboards in some of London's most highly-trafficked streets, including Waterloo Station and Euston Road. The trials will run until November. The technology capitalized data collected in real-time - including audience, weather, travel information, sporting events, and scores - to decide on the kind of ads to run, the best time to display them, and which billboards to play them on. Google is basically testing how premium billboard ads can be purchased programmatically via DoubleClick's automated processes, instead of having to manually place an order with an outdoor advertising company. The technology will show the relevant ads depending on the audience. If the passing audience isn't the right one to show an ad to, the technology chooses not to serve an ad. DoubleClick, founded in 1996, was acquired by Google for $3.1 billion in 2007. The acquisition helped it strengthen its advertising business. Google generates revenues primarily from the sale of advertising space on its online properties. It has therefore focused on protecting and growing its position in the search market through continued innovation and quality improvements. Extending Google's technology to outdoor ads is a positive because advertisers are already familiar with the ad exchange. But working out the details may not be easy given the difference in the nature of advertising. At any rate, Google doesn't plan for a broader launch just yet, these are measures to test the technology to identify problems and opportunities. So we'll probably have to wait a bit to Google's billboard advertising in action. Google has a Zacks Rank #3 (Hold). Better-ranked stocks in the technology space worth considering include Facebook, Inc. FB , Expedia EXPE and JD.com, Inc. JD . All these stocks sport a Zacks Rank #1 (Strong Buy). Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days.Click to get this free report >> Want the latest recommendations from Zacks Investment Research? Today, you can download 7 Best Stocks for the Next 30 Days. Click to get this free report ALPHABET INC-A (GOOGL): Free Stock Analysis Report EXPEDIA INC (EXPE): Free Stock Analysis Report FACEBOOK INC-A (FB): Free Stock Analysis Report JD.COM INC-ADR (JD): Free Stock Analysis Report To read this article on Zacks.com click here. Zacks Investment Research The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Donglegate Donglegate was an online shaming incident. A double entendre on the word "dongle" was overheard at a Python Conference (PyCon) programmers' convention on March 17, 2013, which led to two people being fired and a denial-of-service attack. History In March 2013, at the nearly all-male PyCon technology conference, Adria Richards, a female participant heard two men seated nearby using the words "dongle" and "forking" in reference to the male presenter, which she perceived as a sexual joke (see sexual innuendo). She photographed the attendees with their faces visible, then published the photograph on Twitter including a shaming statement in her tweet. The following day, the employer of one of the photographed individuals, a software developer, terminated his employment because of the joke. In response to the public shaming of the developers, Internet users who were uninvolved launched a DDoS attack on the woman's employer, SendGrid, and according to an article by Jon Ronson in The New York Times Magazine, demanded her firing. SendGrid subsequently terminated her employment later the same day. Following the incident, PyCon updated its attendee rules stating, "Public shaming can be counter-productive to building a strong community. PyCon does not condone nor participate in such actions out of respect." In a 2014 interview, the woman—still unemployed—speculated whether the developer was responsible for instigating the Internet backlash against her. The developer, who was offered a new job "right away", said he had not engaged with those who sent him messages of support, and had posted a short statement on Hacker News the same night after he was fired saying in part that the woman had "every right to report me to staff, and I defend her position".
WIKI
Optimistic concurrency control, Database Management System Optimistic Concurrency Control Is locking the only way to stop concurrency related problems? There exist some other ways too. One such way is known as an Optimistic Concurrency control. The basic logic in optimistic concurrency control is to permit the concurrent transactions to update the data items supposing that the concurrency related trouble will not occur. Though, we require to reconfirm our view in the validation phase. Thus, the optimistic concurrency control algorithm has the following phases: a)   READ Phase: In a read phase, transaction T reads the data items from the database into its private workspace. All the updates of the transaction can only alter the local copies of the data in the private workspace. b)   VALIDATE Phase: Checking is performed to verify whether the read values have changed during the time transaction was updating the local values. This is performed by evaluating the current database values to the values that were read in the private workspace. In case, the values have altered the local copies are thrown away and the transaction aborts. c)   WRITE Phase: In a write phase, if validation phase is successful the transaction is committed and updates are applied to the database, otherwise the transaction is rolled back.   Posted Date: 3/12/2013 3:12:05 AM | Location : United States Related Discussions:- Optimistic concurrency control, Assignment Help, Ask Question on Optimistic concurrency control, Get Answer, Expert's Help, Optimistic concurrency control Discussions Write discussion on Optimistic concurrency control Your posts are moderated Related Questions What is hash file organization? What are the causes of bucket overflow within a hash file organization? What can be completed to decrease the occurrence of bucket overflow? I want a professional with strong IT background who provide me timely assignments Project Description: I want a professional who can do my assignments for my major i.e. Infor A database to track your progress in your college program will track your progress towards graduation! A database that has information containing the classes that you have taken, c Difference between LEFT OUTER JOIN and RIGHT OUTER JOIN In left outer join tuples from the left-hand-side relation which do not match any tuple in the right-hand-side relation Read the description below and draw an Entity-Relationship diagram for it. You must use the symbols described in the course materials. This database will help the Parents Assocc What are the two approaches to store relations in distributed database? a) Replication b) Fragmentation What is meant by functional dependencies? Consider a relation schema R and α C R and β C R. The functional dependency α ->β  holds on relational schema R if in any legal relati An entity type usually has an attribute whose values are distinct for every individual entity in the collection. Such an attribute is known as a key attribute and its values can be
ESSENTIALAI-STEM
Huawei units to be arraigned on U.S. criminal charges on Feb. 28 WASHINGTON (Reuters) - Two units of China’s Huawei Technologies Co Ltd are to be arraigned on Feb. 28 in Seattle on a 10-count indictment on charges they conspired to steal T-Mobile US Inc trade secrets, according to court filings Tuesday. The Justice Department alleged that Huawei Device Co Ltd and Huawei Device USA Inc committed wire fraud and obstructed justice by stealing robotic technology from T-Mobile to test smartphones’ durability. A spokeswoman for the U.S. Attorney’s Office for the Western District of Washington said a corporate representative for Huawei would appear at the arraignment. Huawei did not immediately comment. Separately, federal prosecutors in Brooklyn have also charged Huawei and its affiliates with bank and wire fraud on allegations that they violated sanctions against Iran. That separate 13-count indictment made public Monday. No arraignment date has been set in that case, which has added to Washington’s tensions with Beijing. T-Mobile had accused Huawei of stealing the technology, called “Tappy,” which mimicked human fingers and was used to test smartphones. Huawei has said the two companies settled their disputes in 2017. The charges add to pressure from the U.S. government on Huawei, the world’s biggest telecommunications equipment maker. Washington is trying to prevent American companies from buying Huawei routers and switches and pressing allies to do the same. Court records show the two Huawei units has retained several high-profile lawyers including former Deputy Attorney General Jim Cole, a partner at Sidley Austin LLP; former Justice Department lawyer David Bitkower, a partner at Jenner & Block; former federal prosecutor Robert Westinghouse, a partner at Yarmuth LLP; and two lawyers at Steptoe & Johnson LLP. Reporting by David Shepardson; Editing by David Gregorio
NEWS-MULTISOURCE
Cookbook:Carquinyoli (Catalan Almond Cookies) Carquinyoli are Catalan cookies much like biscotti. Ingredients * 150 g flour * 1 teaspoon cinnamon * 1 teaspoon baking powder * 1 egg * 100 g granulated sugar * 1 lemon, zested * 125 g whole raw almonds * 1 egg, beaten Procedure * 1) Combine the flour, cinnamon, and baking powder. * 2) Combine the egg, sugar, and lemon zest. Whip until very foamy. * 3) Stir the flour mixture and almonds into the egg mixture to get a dough. * 4) Shape the dough into two flattened logs of about 6 x 3 cm on a parchment-lined baking sheet. * 5) Brush the dough with the beaten egg. * 6) Bake in the oven at moderate heat (180°C) for 25 minutes. * 7) While still hot, cut the baked dough into thin slices less than 1 cm thick. Arrange slices on baking sheets without letting them touch. * 8) Bake them for 5 minutes more in the oven to brown their surfaces. * 9) Allow to cool before eating.
WIKI
Pre-installing prebuilt APK nightmare 188 views Skip to first unread message void coder unread, Jan 23, 2023, 3:06:42 PMJan 23 to Android Building Hi. I'm struggling for quite some time now with pre-installing a prebuilt 3rd party APK on 11. This turned to be quite a journey. One would think this is a rather common generic task pretty much every vendor has to go through so some Android built-in automation must be there to help with the task. Like e.g. dropping the APK to some predefined vendor pre-installed apps folder or similar easy to use way ... But nope, I can't find any official AOSP documentation on this so Google Search and dev forums apparently is my only source of info on the topic :( Apparently the general consensus is to go with a dummy APK project for the prebuilt APK + BUILD_PREBUILT rule in the makefile + LOCAL_SRC_FILES pointing to prebuilt and presigned APK. The method seems to work for simple Java only apps but is a serious hassle if the APK has native libs in it. You literally have to manually unpack the APK archive, extract the shared .so libs from it and build those into image along side other system libs for the whole thing to work. And pray to Android gods none of those extracted native libs conflict with system libs or libs from other APKs preinstalled in the same way. I wasn't able to find any way to recreate what Package Manager does when installing APK at runtime, i.e. create /data/app/<package>/lib dir where it extracts all of native libs belonging to package. Anyways, while this method worked fine for some test APKs I tried it doesn't fly with the only 3rd party APK I actually need it for. For whatever reason the pre-installed app won't run, apparently failing to init Webview according to logcat. My first thought was SELinux but no difference with system booted into fully permissive mode either. The same app will work perfectly fine when installed via remote "adb install" or e.g. local "pm install" on the device. Unfortunately original developer no longer accessible to help with debugging so looks like a dead end. Any ideas on possible reasons much appreciated. Anyways, my next thought was - fine - if I can't pre-install I'll try installing the APK on the first boot via Package Manager as I know this works fine. To my surprise, this also turned to be quite a nightmare. First there is a system build rule which will prevent adding an APK to image via PRODUCT_COPY_FILES as a simple data file. You will get an error like e.g. build/make/core/Makefile:49: error: Prebuilt apk found in PRODUCT_COPY_FILES: vendor/foo/bar.apk:vendor/foo/bar.apk, use BUILD_PREBUILT instead!. Essentially sending you back to use the dummy APK project and BUILD_PREBUILT method described above which already failed for me. Eventually I edited the core Makefile to remove the check so I can still proceed with building the APK in. This worked but only to fail later on when I actually attempted to install the built-in APK via "pm install -r ...". PM will fail with INSTALL_PARSE_FAILED_NO_CERTIFICATES error. This is where it all getting super fishy. Same APK pushed to device over adb will 'pm install' just fine. I started digging and discovered that despite APK having the same file size the actual content is different. SHA checksum differs for the original APK and the one copied to device via PRODUCT_COPY_FILES which is why I believe PM is failing to extract the certificates. I believe I noticed something similar with some but not all shared native .so libs. Doesn't matter whether they are added via PRODUCT_COPY_FILES or using .mk + BUILD_PREBUILT rule. Some .so will have slightly different size, like 16 bytes or so. Clearly some processing going on already prebuilt binaries which is super confusing. Perhaps some extra signing? Any ideas please? Is there a way to add a file to image as is, preventing build system to process it in any way whatsoever. Sorry if I missed something obvious, a complete AOSP beginner here ... Reply all Reply to author Forward 0 new messages
ESSENTIALAI-STEM
Page:Anna Karenina.djvu/1075 saw two stars glowing in the already darkening sky, and suddenly he remembered a course of reasoning:— "Yes," said he to himself, "as I looked at the heavens I thought that the vault which I gaze at is not a lie. But there was the something that remained half thought out in my mind,—something that I hid from myself. Now, what was it? There cannot be an answer. If one could think it out, all things would be explained." Just as he entered the child's chamber, he remembered what it was that he hid from himself. It was this:— "If the chief proof of the existence of God lies in the revelation of good, why should this revelation be limited to the Christian Church? How about those millions of Buddhists and Mohammedans, who are also seeking for the truth and doing right?" It seemed to him that there must be an answer to this question, but he could not find and express it before entering the room. Kitty, with her sleeves rolled up, was bending over the bath-tub, in which she was washing the baby. As she heard her husband's steps, she turned her face to him, and with a smile called him to her. With one hand she was supporting the head of the plump little fellow, who was floating on his back in the water and kicking with his legs; with the other she was squeezing the sponge on him. "Come here! look, look!" said she, as her husband came up to, her. "Agafya Mikhaïlovna is right; he knows us." The fact was that Mitya to-day for the first time gave indubitable proof that he knew his friends. As soon as Levin went to the bath-tub, the experiment was tried, and it was wholly successful. A cook, who was called for the purpose, bent over the tub. The baby frowned and shook his head. Kitty bent over him, and he smiled radiantly, and clung with his little hands to the sponge and sucked with his lips, producing such a strange and contented sound that not only the mother and the nurse, but Levin himself, were enchanted.
WIKI
Progress M-04M Progress M-04M (Прогресс М-04М), identified by NASA as Progress 36P, was a Russian Progress spacecraft launched in February 2010 to resupply the International Space Station. It was docked with the aft port of the Zvezda module of the station. Launch Progress M-04M was launched by a Soyuz-U carrier rocket, flying from Site 1/5 at the Baikonur Cosmodrome. The launch occurred at 03:45 UTC on 3 February 2010. Docking After just over three days of free flight, Progress M-04M docked with the Zvezda module of the International Space Station at 04:26 UTC on 5 February 2010. Its docking marked the first time four Russian spacecraft had been docked to the station at the same time, joining the Soyuz TMA-16, Soyuz TMA-17 and Progress M-03M spacecraft already docked. It remained docked until 10 May 2010, when it departed, allowing Soyuz TMA-17 to be moved to the Zvezda aft port to clear the way for the arrival of the Rassvet module, to be delivered by Space Shuttle Atlantis on STS-132 later that month. Cargo The Progress M-04M spacecraft delivered 2686 kg of cargo to the ISS. This included water to be used by systems in the Russian segment of the station, propellant to refuel the station and to perform orbital manoeuvres, food and medical supplies. Undocking Progress M-04M undocked from the ISS on 10 May 2010. On 7 May 2010, Russian Space Agency's Mission Control announced that the ISS crew had loaded Progress M-04M with garbage and readied the spacecraft for undocking. The command for undocking was issued at 11:13 UTC, and three minutes later Progress M-04M separated from the Zvezda module. Cosmonauts Aleksandr Skvortsov and Mikhail Kornienko monitored the undocking with photo and video cameras focusing on the Progress docking mechanism to confirm that there were no missing or damaged O-ring seals on the docking interface. Deorbited The spacecraft stayed in autonomous flight for 60 days after undocking, taking part in the Reflection geophysical experiment to study reflective characteristics of the freighter's hull and the transparency of the Earth's atmosphere. Progress M-04M was deorbited on 1 July 2010 over the Pacific Ocean. The deorbit burn began at 13:54 UTC and at about 14:40, the remaining parts of the spacecraft which had not burnt during the reentry, fell down in the south area of the Pacific Ocean, 37°47′ South, and 235°09′ West.
WIKI
Wiktionary:Tea room/2022/June platinum jubilee I hate to be a party pooper, but is (and coordinate terms like, , etc., as well as entries like and ) not sum-of-parts? We do not have an appropriate adjective definition for yet, but compare and. Thought I would raise the issue here to get some views before making any RFD nominations. (Pinging who appears to have created many of these entries.) — Sgconlaw (talk) 22:28, 2 June 2022 (UTC) * Poop away! Seems to be a clear SOP to me. Overlordnat1 (talk) 11:31, 3 June 2022 (UTC) * Agree. SOP --Jonathan Webley (talk) 12:40, 4 June 2022 (UTC) * So long as we have the appropriate entries under the first word, they're all SOP. Theknightwho (talk) 21:28, 4 June 2022 (UTC) * The only question I have / thing I can see that might save them, is whether the longer phrases came first and pass the WT:JIFFY test. But I suspect if any phrase came first, it was "...anniversary", not "...jubilee", so yeah, these seem SOP. - -sche (discuss) 23:12, 4 June 2022 (UTC) ḏrt If the hand hieroglyph 𓂧 represents d, and the cobra 𓆓 represents ḏ, for example in the word "say" that is spelled 𓆓𓂧 (cobra + hand) and transliterated ḏd ... how come the word "hand", spelled using the hand glyph, is transliterated ḏrt and not drt? Was the word pronounced drt originally or in some dialects, only to shift to ḏrt? (If it was always ḏrt, why is it the glyph for d-as-opposed-to-ḏ; why not use a d-word to represent d?) - -sche (discuss) 22:05, 2 June 2022 (UTC) * The main spelling is phonetically d + t, but the alternative form is ḏr + r + t (the intermediate r is a ). Also, 𓂧 on its own is apparently a logogram for ḏrt (which makes sense since it depicts a hand), so the reading could just be ḏrt + t. * Oh, I just noticed the footnote here, which says that the word used to actually be read dt, but it was revised based on . That looks like a more satisfying answer. <IP_ADDRESS> 17:18, 3 June 2022 (UTC) * Yep, the hand glyph in the word for hand is being used a logogram for rather than a phonogram for d (which is also why there’s no r glyph in the word, and why the most common way to write it ends with glyph Z1 (the vertical line), which is usually used to mark out logograms). (In regards to the footnote you mention, note that what Gardiner says about the word formerly being read dt is talking about an error made by modern Egyptologists, not the original Egyptian reading of the word.) * The reason why the hand was chosen to represent d is a matter of some debate; Gardiner (at the link you provided) gives one suggestion (‘from the old Semitic word ’), but it’s not very satisfying. Other authors following the neuere Komparatistik school see Egyptian ꜥ as a reflex of earlier d and connect the hand to, making it a kind of doublet to , but the neuere Komparatistik is far from universally accepted, and this answer isn’t very convincing either. Unfortunately, for a lot of the basic Egyptian phonograms we simply don’t know where their sound value comes from; compare the many equally unsatisfying hypotheses given at . — Vorziblix (talk · contribs) 18:24, 3 June 2022 (UTC) * Thank you both. With 𓅓, the theories that "since it represents m, it probably came from a word for owl that started with (or at least contained) m" seem reasonable enough (even if there's no evidence for one over the other). A glyph representing d coming from a word that doesn't contain d [but instead ḏ] seems weirder, hence my wondering if it was originally drt. The possible connection to ꜥ, and of those words to /d/, is interesting. - -sche (discuss) 23:24, 4 June 2022 (UTC) conscience Is it just me, or is this word also pronounced /ˈkɒn.tʃəns/? ---&#62; Tooironic (talk) 23:18, 2 June 2022 (UTC) * That's how I might pronounce it. Vininn126 (talk) 09:29, 3 June 2022 (UTC) * Many people in various countries say it like that as can be seen on Youglish . The same process occurs quite often in reverse with the word bunch and mince and mints are often homophones, either both as ‘mins’ or ‘mints’. Personally I use the s/sh rather than the ts/ch version of all these possibilities. Overlordnat1 (talk) 12:01, 3 June 2022 (UTC) * I think American English merges /nʃ ntʃ/ unconditionally and so the distinction never comes up .... it's a matter of analysis which is the correct underlying pronunciation. See prince for an example of where we distinguish two similar clusters. But I dont know how widespread the distinction is maintained outside the US. — Soap — 19:01, 4 June 2022 (UTC) * I definitely use nʃ with, as distinct from ntʃ in (say) . However, I know Brits who would use ntʃ in as well. Might be worth amending the US pronunciation and having both for the UK, with nʃ coming first as I think it's more common. Theknightwho (talk) 19:43, 4 June 2022 (UTC) * It might even be worth listing three pronunciations for some of these, for example prins, prin?s and prints - like they do in Wikipedia . Overlordnat1 (talk) 13:51, 6 June 2022 (UTC) * Thanks everyone for your contributions. Listening to the audios on Forvo, it seems /ˈkɒn.tʃəns/ is a common variant, at least in BrE. I went ahead and added it. ---&#62; Tooironic (talk) 11:26, 7 June 2022 (UTC) * That’s probably for the best. I realise we have dunsh and dunch as dialect words with the same meaning (to hit/collide) but presumably a different pronunciation too. I can’t say I’ve seen or heard the dunch form personally though, I’ve only ever heard/seen Geordies say/spell it as dunsh prior to intentionally looking up dunch on a ‘hunch’ that it might be an alternative form earlier today. Overlordnat1 (talk) 22:46, 7 June 2022 (UTC) * No, it's not /ˈkɒn.tʃəns/, and the entry you have put in Wiktionary today is just fraudulent. What it is is that in words like prince (=prints), some people preglottalise after the n. It can then be /ˈkɒnˀ.ʃəns/. The trouble with Wiktionary is that it is a dictionary that people with no academic knowledge of linguistics can edit. The Internet weaponises and empowers the uneducated. It is an editorial policy how narrow the transcriptions are to be. Unless all words like prince and mince show the glottal reinforcement too -- which is not usually found in /nʃ/ -- then it is wrong to enter it here. This has become a downmarket dictionary. Do you mark the preglottalisation of the /k/ in "dictionary"?2A00:23C8:A7A3:4801:733E:646C:63DA:CF9D 12:02, 8 June 2022 (UTC) * A related discussion took recently place here, presenting a reference to Wikipedia, . --Lambiam 14:25, 11 June 2022 (UTC) * It's a phonetic issue, not necessarily a phonemic one. /n/ followed immediately by a homorganic fricative (which applies to English /nʃ/ [ṉʃ]) always produces some amount of plosion by the nature of the sudden onset of the fricative. This is why prince and prints are often (or even usually) homophonous. — <IP_ADDRESS> 01:06, 12 June 2022 (UTC) Steps versus stairs To my mind, steps are outside and stairs inside. Should the Wiktionary entry mention this? --<IP_ADDRESS> 10:05, 3 June 2022 (UTC)Jonathan Deane * I don’t think there’s such a strict division of meaning in most usages. — Sgconlaw (talk) 11:55, 3 June 2022 (UTC) * I think there might be a distinction in usage relating to the number, configuration, and purpose/setting of various sets of steps referred to as steps vs. stairs. Three steps do not make stairs. Typical stairs ascend a full storey. But in my idiolect there are not stairs but steps to the Lincoln Memorial in Washington DC. There definitely is something to the indoor/outdoor distinction, but it is more complicated. We also have the terms staircase and stairway. I'd be surprised if other languages had exactly homologous groups of words, so we may need to try to make an effort to tease out differences in application of these words so that we have more precise placement for translations. DCDuring (talk) 16:03, 3 June 2022 (UTC) * Hmm. Can't be that simple. Inside a building, I think carpeted ones and long flights are more likely to be stairs and stone ones and short flights are more likely to be steps! Equinox ◑ 16:17, 3 June 2022 (UTC) * A "flight of steps" a Google Books is almost always outdoors, whereas a "flight of stairs" is almost always indoors. "Fire escape" co-occurs about equally with "flight of steps" and "flight of stairs". DCDuring (talk) 16:58, 3 June 2022 (UTC) * I could have sworn I recall reading discussion somewhere adjacent to osmwiki:tag:highway=steps about how 'stairs' in a 'stairwell' were a collection of runs of 'steps' plus 'landings', but a search there isn't turning up anything relevant. Arlo Barnes (talk) 18:48, 3 June 2022 (UTC) * The phrase "landing between stairs" is extremely common, so that distinction seems too narrow. Equinox ◑ 18:51, 3 June 2022 (UTC) * I agree that the number of steps, their setting, etc., probably influence whether stairs or steps is used, but doubt we’ll find enough consistency of usage to be able to capture it in the definitions or usage notes. To add to what’s already been said, I’d probably call them steps if they are broad lengthwise, and stairs if narrow. — Sgconlaw (talk) 21:16, 3 June 2022 (UTC) * For me, steps mostly rest on the ground, while stairs can be supported by some kind of framework. Chuck Entz (talk) 23:54, 3 June 2022 (UTC) * This looks like a job for some weasel words in our definitions. One of my favorites is "typically". If not weasel words, then usage examples biased toward what we think are more common collocations indicating outdoor for steps and indoor for stairs. * I think there are definite distinctions, even though there is a huge overlap. In a use like “the steps leading to the podium”, you cannot substitute “stairs”. Here, and in many cases, I think of “steps” as the plural of “step”, as in “the three steps leading to the podium”. In contrast, “stairs” is somewhat uncountable, although it can function as its own plural, as seen in “either of two stairs”. instead of using “flights of stairs”. If you can immediately count the number of steps just by glancing at the steps, they are unlikely to be referred to as “stairs”. For a sequence of steps to be called “stairs”, the number of steps, and therefore the vertical distance bridged, has to be considerable. --Lambiam 13:04, 7 June 2022 (UTC) * One can find "one stair" and "two/three... stairs" with stair meaning step. I think that stairs or steps is only very rarely used with a singular verb, whatever the definition; never in my idiolect. DCDuring (talk) 16:37, 7 June 2022 (UTC) * And then, to keep things interesting, we also have ... 😆 ‑‑ Eiríkr Útlendi │Tala við mig 19:11, 7 June 2022 (UTC) * From now on I am referring to everything as stairsteps. bd2412 T 19:33, 7 June 2022 (UTC) * I also spot a few cites of . Oh dear! - -sche (discuss) 22:42, 7 June 2022 (UTC) * Does belong here too as a kind of stoop or buffer or is it just an ascending plane, ie. #9 "A playspot where water flows back on itself"? I can't explain succinctly why this matters. (found via Ger. where comparison to stopper "bung" seems to be implied). * As regards Ger., akin to stair, this is well relevant to the initial question pertaining to insides (sorry @DCDuring). That is a shaft for utilities or the conductors themselves, cp. and coincidently (unrelated to ladder) ~ . This should of course remind of chimneys inasmuch as the architecture is concerned. On the other hand, the sense of connecting levels appears no less pertinent, that is summarized succinctly in the given definition of. * The iconic from New York cinema deserves a notable mention, by the way. ApisAzuli (talk) 12:39, 12 June 2022 (UTC) * I presume you’re referring to the external fire escapes that lead to a landing with a ladder that people have to lower and climb down in an emergency? They certainly seem to be more common in America than elsewhere but I think they would be included in our existing senses, so there’s no need to create a new sense at our fire escape entry. Overlordnat1 (talk) 00:47, 13 June 2022 (UTC) loll The second and third definitions of "loll" are given as follows: * 2. To hang extended from the mouth, like the tongue of an animal heated from exertion. * 3. To let (the tongue) hang from the mouth in this way. * 3. To let (the tongue) hang from the mouth in this way. However, I do not understand why "from the mouth" is mentioned specifically, for you could "loll" your head on, say, someone's shoulder as well. If you look at the examples themselves, they, perhaps for this very reason, mention "tongue" explicitly: "loll" does not necessarily entail only the tongue: * 2. ". . . With lolling Tongue . . ." * 3. ". . . teeth glittering, tongue lolling." Merriam-Webster and Cambridge Dictionary both do not restrict "loll"'s usage (in this context) to the tongue. * I agree. Also, the quote about cattle ‘lolling their way’ probably means they’re moving slowly, a special case of the ‘act lazily’ definition - I see no reason to assume their tongues are out. Overlordnat1 (talk) 13:57, 6 June 2022 (UTC) King's Own and Queen's Own ...as used in the names of many British regiments. Just type "King's Own" into Wikipedia and you'll see what I mean. But what do these terms mean? --Jonathan Webley (talk) 12:43, 4 June 2022 (UTC) heaumeau Is this presentation of sense 2 ideal? It seems to me that this is typically use as a generic insult in a much wider sense, akin to how is used by the unenlightened. By extension I think it is not so much the case that this spelling is offensive, but that this spelling is often used in offensive senses or in offensive statements. As an aside this type of spelling supposedly originates from the defunct forum Alt0169.com, so perhaps it can be found on archived pages of that site. ←₰-→ Lingo Bingo Dingo (talk) 16:46, 4 June 2022 (UTC) * That translation of the quote looks wrong to me: "Not only is Marc Overmands gay, the entire team of Dicky should drop the soap." is a more literal translation and to me that sounds quite harsh actually. I agree, this doesn't seem to be a separate sense. Thadh (talk) 19:18, 4 June 2022 (UTC) * Yeah, it seems like the senses could be merged, to just define it as an alternative spelling of homo (with whatever context labels appropriate); that entry already covers the "general slur" use, so pseudo-duplicating it here but with (incorrectly?) narrower wording is bad. - -sche (discuss) 23:29, 4 June 2022 (UTC) * On the last point, I might be mistaken, but I feel like the spelling is mocking the "fabulous" aspect of homosexuals? In which case I think there's a slightly greater derogatory component there? But I'm not sure how to represent it in labels. Thadh (talk) 09:40, 5 June 2022 (UTC) * While such overtones or undertones are possible, but this is also just the usual affected blog slang spelling that was first seen on Alt0169.com and then spread to GeenStijl and Retecool. Compare val deaut and the rare feauteaumeaudel. I think it is difficult to establish anything definite; it was mainly applied on words that bloggers and commenters wanted to mark, so it was not used for entire statements like leetspeak often was. ←₰-→ Lingo Bingo Dingo (talk) 10:53, 5 June 2022 (UTC) * In that case I agree, we should get rid of the labels in the alt spelling entry. Thadh (talk) 11:28, 5 June 2022 (UTC) Pronunciation of swaffelen Someone has added as the transcription for southern Dutch. Does this really exist generally in such a large range or is it distributed more locally, if at all? ←₰-→ Lingo Bingo Dingo (talk) 17:00, 4 June 2022 (UTC) * Here, in unmistakably southern Dutch, I clearly hear . I’m not sure what the rules are for the “Belgisch kampioenschap zwaffelen”, but I imagine that people who spell this this way pronounce the term with and not with . --Lambiam 12:30, 7 June 2022 (UTC) Please help add the singular of jammies I want to add a sense of jammy we don't have, as an attributive singular just like pajama is, and paralleling words like sunglass. A usex could be such as Did you put your phone in your jammy drawer? As it stands now we link from jammies to jammy but nowhere on the jammy page is there anything about pajamas. Im sure most English speakers could figure it out, but a learner at a low level of fluency might think that the primary sense is "gun" or even "penis". My eyesight isnt very good and so I cant figure out how to work with the formatting ..... in this case I figured the better thing to do would be to ask for help instead of creating a messy entry. Thank you, — Soap — 18:48, 4 June 2022 (UTC) * Added. This should have been at Requested entries (English). J3133 (talk) 20:40, 4 June 2022 (UTC) "Elsewhere" as verb I have found this sentence: "Let us elsewhere ourselves." The Enigma of the Warwickshire Vortex by F. Gwynplaine MacIntyre position 8718 in The Mammoth Book of New Sherlock Holmes Adventures (ebook), published by Robinson ISBN 978-1-84529-926-2 * Thanks for the alert. We'll keep an eye on this; for inclusion in the dictionary we require two more uses in permanently recorded media (see ). --Lambiam 12:36, 7 June 2022 (UTC) * Someone should probably create Citations:Elsewhere. I’d do it myself but I’m not sure how best to format the cite, given that there’s no page number but a position number (8718) instead. Overlordnat1 (talk) 22:54, 7 June 2022 (UTC) * We know that this occurs on p458 of the hardcover version (ISBN 978-0-7858-1880-9), even though GBS keeps this specific snippet under a shroud. The name of the story is “The Adventure of the Bulgarian Diplomat”, written by . --Lambiam 23:51, 7 June 2022 (UTC) * How can we be sure it’s part of “The Adventure of the Bulgarian Diplomat” rather than “The Enigma of the Warwickshire Vortex”? Overlordnat1 (talk) 21:38, 15 June 2022 (UTC) fivescore I don't think this is a noun. Also, the quote should be correctly formatted. Pious Eterino (talk) 09:12, 6 June 2022 (UTC) * It appears in some archaic writings (,, , and ). King’s speech seems to be considered as containing the words ‘five score’ rather than the word ‘fivescore’ here though ( and ). I can also find one use of five-score . Overlordnat1 (talk) 11:18, 6 June 2022 (UTC) * Also consider fourscore which appears in (some versions of) the Bible and (some editions of) Shakespeare as quoted at our entry. We claim Abraham Lincoln said “four score and seven years ago” in the famous Gettysburg address at that entry and provide a quote from a book to support that but there are other books which quote him as saying “fourscore and seven years ago” - of course it would have sounded the same in any case, so it may be impossible to be precise about that. Overlordnat1 (talk) 11:30, 6 June 2022 (UTC) * The handwritten originals of the Gettysburg Address that I've found online all have four score, though, and the bunched spelling seems to only appear in later printed versions. It may be the reason why we arent quoting Lincoln on our fourscore page. (edit: i didnt see that we actually are quoting Lincoln.) — Soap — 11:50, 6 June 2022 (edited 14:57, 6 June 2022 (UTC)) * That’s a good point but the quote is still at the fourscore entry. Perhaps we should list four score and four-score (see ) as alternative forms and keep it there. Another option would be to keep the quote at score, where it also appears, and delete it from fourscore. Similar considerations arise for five score/fivescore/five-score. Overlordnat1 (talk) 14:09, 6 June 2022 (UTC) subhorizontal Can somebody with the knowledge confirm the definition here ("Not quite horizontal in position or orientation")? I think it might mean "relating to a subhorizon", which is entirely different. Equinox ◑ 22:44, 6 June 2022 (UTC) * Probably both senses exist, e.g. "...in subvertical boreholes at depths below F.Z. 2 invariably produced horizontal or subhorizontal fractures..." seems like it's the definition in the entry, whereas plenty of cites at look like the definition you mention. How to tell which sense is meant in other less-clear contexts where it could be either, I don't know. - -sche (discuss) 00:44, 8 June 2022 (UTC) * are geological soil horizons always horizontal in the generic sense of being flat and at an even depth from end to end? I would say that perhaps the two definitions coincide in the field of geology, but only if we allow the definition of horizontal to also have a special sense. — Soap — 08:26, 8 June 2022 (UTC) * Well, approximately flat: . A subhorizon might be "not quite horizontal in position or orientation", but there does seem to be a separate sense too, where "subhorizontal" specifically means "relating to subhorizon" and doesn't just describe any old thing with that orientation. Added. Equinox ◑ 14:59, 8 June 2022 (UTC) epoch: computing vs. astronomy senses * (astronomy) A precise instant of time that is used as a point of reference. * (computing) A precise instant of time that is used as a point of reference (e.g., January 1, 1970, 00:00:00 UTC). Why are these two separate senses? I'm only familiar with the computing one (it is, as far as my experience goes, the earliest date the computer can recognise, so that all other dates and times are measured by adding to that one). Equinox ◑ 22:59, 6 June 2022 (UTC) * Wikipedia gives this closely related sense: “In and, an epoch or reference epoch is an in time chosen as the origin of a particular . The "epoch" serves as a reference point from which time is measured.” This is not precisely the same as our sense 2: “A notable event which marks the beginning of [a particular period].” The instant in time chosen as the reference moment will preferably be a notable event, but this is not required. At least, I'm not aware of any notable event happening on 11 August 3114 BCE ( <IP_ADDRESS>.0). What is not explicit in these definitions is that the instant of time used as “a point of reference” serves as the zero in some system for identifying instants of time such as 18 brumaire an VIII. IMO we can unify these three senses, e.g. as * “ A specific instant of time, chosen as the zero of a system for identifying instants of time.” * --Lambiam 10:11, 8 June 2022 (UTC) * I agree with this approach. The current entry using identical wording means that by definition they’re the same thing - both idiomatically and literally. Theknightwho (talk) 22:03, 8 June 2022 (UTC) * I had a go at updating the entry. I altered Lamb's gloss a bit on the basis that astronomical epochs seem to be used to define spatial coordinate systems as opposed to directly acting as the zero for a time measurement system. This, that and the other (talk) 03:28, 10 June 2022 (UTC) Greyfriars I was lazy and, fixing the formatting of an entry, assumed any aspect of Oxford notable enough for inclusion here must be one of the colleges. Not so! Apparently Greyfriars is just a former residence private hall. Do individual halls at universities (even admittedly prestigious ones) actually merit separate inclusion here? What's the prestige criteria? How far down the US News list does eligibility go? How many buildings at Tokyo U and Peking U should be separately included? All of them? or does the OED or CED grandfather the British ones in special? — LlywelynII 11:15, 8 June 2022 (UTC) The only other we have an entry for is apparently a partial entry that handles that "Regent's Park" can mean, although that doesn't get a separate entry here yet on its own. — LlywelynII 12:30, 8 June 2022 (UTC) * is a former of Oxford University - something very different to a residence hall. These operate in a similar fashion to Oxbridge colleges, but are generally a lot smaller, and can often have quirky aspects to them (such as explicit religious affiliation), and in several cases they also have a combined function as something else. They're quite clearly notable, having extensive WP pages, and in the case of Greyfriars it's also a friary - something that didn't change when it stopped being a PPH. * However, what's relevant to Wiktionary is whether terms are lexical. The reason why it makes sense for Greyfriars,, and to have entries is because they're ambiguous (which is true whether or not we have other senses listed). The terms "Regent's Park College" and "St Benet's Hall" are not lexical, and should not have entries. * Theknightwho (talk) 12:50, 8 June 2022 (UTC) * When I went to UCLA in the late '80s, everyone knew that the departments in STEM subjects were on the south end of the campus, and those in the humanities were on the north end, so one could refer to linguists and historians as "north campus" people and chemists or engineers as "south campus". I'm sure there are similar patterns in universities all over the planet. The different buildings at Oxford have a long history and the university has had a major influence on any number of fields of knowledge, but they're still a matter of local knowledge. We have to be very careful about inclusion of local knowledge, because a lot of it is attestable via newspapers and various public records and there's just too much of it. Chuck Entz (talk) 14:20, 8 June 2022 (UTC) * I genuinely don't see the issue with it, but I appreciate it's just a matter of opinion. These things can spread surprisingly far, though, and you never know when something might come in handy for an etymology. Theknightwho (talk) 14:52, 8 June 2022 (UTC) partouzard = orgygoer Is there an English equivalent? I'd hoped at least one of orgymaker or orgygoer or orgier or orgydoer to be an actual word Zumbacool (talk) 00:43, 9 June 2022 (UTC) * orgiast is the word you’re looking for. Overlordnat1 (talk) 01:01, 9 June 2022 (UTC) * Dammit, that was too easy. I feel dumb... Zumbacool (talk) 01:05, 9 June 2022 (UTC) * Quite clearly the term is organist, though admittedly that can be a solo activity. Theknightwho (talk) 01:35, 9 June 2022 (UTC) Pronunciation of puce Every printed dictionary I have on hand and some ten results from a quick Google search unanimously show the pronunciation as /pjuːs/, not yodless /puːs/ as is currently listed. Is the latter some accepted regional pronunciation at odds with English orthography, or is this simply an error? I'm leaning strongly towards it being erroneous, but the audio file is giving me pause. Wiljahelmaz (talk) 22:54, 10 June 2022 (UTC) * Only one of the 10 examples to be found on YouGlish is yodless. Despite YouGlish tagging the speaker as American they’re clearly Australian ( - see hit 8 out of 10). I would always say it with the yod, and I don’t think I’ve ever heard it without, but perhaps in an extreme West Country, East Anglian or Welsh accent the yod might be dropped. Some people might be influenced to an extreme degree by the pronunciation of the French original like Americans are by the pronunciation of the originally Spanish word puma (despite what it says at our entry, it is highly unorthodox for people to say puma without a yod in Britain - I’m not sure how often Americans say it with a yod but I suspect the opposite is true in America). Actually YouGlish proves my suspicions right again, I can only find three exceptions, the British supermodel Cara Delevigne saying ‘puma’ without a yod, the Texan author Joe Galloway saying puma with a yod and one Australian using a yod and the other not on a podcast (the ‘What’s your message?’ podcast). (Overlordnat1 (talk) 00:33, 11 June 2022 (UTC) * Wrong. OED only has it with /j/. Don't trust the audio as that's by Wonderfool. Equinox ◑ 01:34, 11 June 2022 (UTC) * Thanks for pointing out the error, E-dawg Zumbacool (talk) 16:59, 11 June 2022 (UTC) * In which case you’re clearly right to remove the audio as the only other instance I can find of it being pronounced this way is one Australian on YouTube. It’s occurred to me that Cara Delevigne and the Australian who say Puma without a yod might only be doing so to reflect the German pronunciation of the originally German brand, they’d probably pronounce puma (the big cat) with a yod. We should probably split the pronunciation for puma into two; without a yod for America (and Canada?) and with a yod for everywhere else. Overlordnat1 (talk) 01:49, 11 June 2022 (UTC) Proto-Slavic *vòlxъ pronunciation Let ask an academician /etymologist/linguist/. Which would be the most likely scenario for, say ? Would they pronounce, "ò" like in Russian волох IPA(key): [vɐˈɫox] with an "a" ? Or with an "o" as in Ukranian and/or in some other Slavic language, if I am not mistaken 2) Did they drop "l" as it looks like the case in Polish? Example: [ Vwoh] [pol ] Włoch POLISH > an ITALIAN vocative Włochu = Vwohfu IPA(key): /vwɔx/. Is there such thing as comparative evidence on phonology/pronunciation of a reconstructed language? Flāvidus (talk) 02:34, 11 June 2022 (UTC) * I wouldn't even bother so much to find it out. akanye is a feature of the standard and modern Russian (and Belarusian) but there are dialects, which were much more prominent in the past. First signs of akanye appeared around the 14th century, according to some sources but it's nowhere near the common and the only pronunciation and applied only to Russian with 100% certainty. * As for your other question (e.g. "olo"/"oro" vs "la"/"ra", etc. in East Slavic languages), this feature is called and there are too many examples where East Slavic terms have more vowels than any other cognates in other Slavic languages and the Proto-Slavic itself. Anatoli T. (обсудить/вклад) 07:29, 11 June 2022 (UTC) * Polish underwent a lot of metathesis with liquids and vowels, whereas more Eastern Slavic languages added a vowel, as Anatoli already mentioned. It is written with an o because it was most likely spoken with an o, with a falling tone at that. Wikipedia has some great articles on Proto Slavic phonology as well as sound changes from Proto Slavic to modern Slavic languages. Vininn126 (talk) 12:32, 11 June 2022 (UTC) * I would add that *vòlxъ is more or less an etymological fiction. At the time of Proto-Slavic (c. 500 AD), this term would have been pronounced more like *valxu. The sound changes /a/ -> /o/ and /u/ -> /ъ/ date to the Common Slavic period that, strictly speaking, post-dates Proto-Slavic. The reason why *vòlxъ is reconstructed is because all Slavic languages underwent these two sound changes (and several others during the Common Slavic period), but by that point, some dialectal changes had already happened, e.g. the change of /al/ into either /laː/, /la/ (→ /lo/) or /ala/ (→ /olo/). The existence of /a/ not /o/, for example, in Proto-Slavic is known for certain by transliterations of contemporary Slavic names into Greek. Benwing2 (talk) 00:13, 13 June 2022 (UTC) * Notably Polish has many more cases of "o" where the majority of Slavic languages (excluding East Slavic polnoglasie) have "a", as in - Polish, Czech , Bulgarian . --Anatoli T. (обсудить/вклад) 02:58, 16 June 2022 (UTC) 5K It's been proposed to me that be set as Word of the Day when we reach the 5,000th WOTD. However, I'd like to check if editors feel it is sum-of-parts. — Sgconlaw (talk) 13:04, 11 June 2022 (UTC) * It isn't a sum of parts. It's a product! * It's missing a unit, too. So it seems to be even less than a sum of parts. In the defined context it seems to be a recurrent proper name, and not fictional either, so maybe that needs an update. ApisAzuli (talk) 11:10, 14 June 2022 (UTC) * It doesn't require a unit, because is an abbreviation for kilometre(s). Thus it seems SoP to me because it's 5 + K (kilometres). Not sure why you think it should be a "proper name" (do you mean proper noun?), though. — Sgconlaw (talk) 13:52, 14 June 2022 (UTC) * See proper name, there is no real difference. * Don't worry, I am wondering about proper nouns for a while now because of the entirely arbitrary capitalization. If Winter is the personification of winter, if that's how you choose to split the difference, then 5K is the baby reincarnation of the Marathon myth, where Μαραθών itself is a typical proper noun. So this is just my gut feeling as someone who doesn't run on a weekly basis. Someone else might think of it as a distance, in which case '5000 meter' surely is SoP. * But, why does K stand for kilometer, where did you take that idea from? It usually stands for kg because that's a standard unit, and then it is /ki:/, in contrast to the 5k audio. ApisAzuli (talk) 05:11, 15 June 2022 (UTC) * er, because means a 5,000-meter (5-kilometre) race? Obviously K doesn’t refer to kilogram or any other unit in this context. — Sgconlaw (talk) 06:16, 15 June 2022 (UTC) * I'm not sure how the road race part is obvious from the name. You're assuming a lot of contextual knowledge here. Theknightwho (talk) 06:55, 15 June 2022 (UTC) * that’s a good point, that the fact it is a race is not obvious from the name (though the distance is, in my view). But then that fact should just be captured in the definition of K. It doesn’t seem like there in anything particularly significant about 5K; you could have 1K, 2K, 10K, and so on. — Sgconlaw (talk) 07:11, 15 June 2022 (UTC) * Beyond that, there's a difference between the, the and (yes, really) the race. Theknightwho (talk) 07:15, 15 June 2022 (UTC) * @Sgconlaw Just spotted your edit. I don’t think it make sense to have that under K, because that gets used more widely to just mean “kilometre” (which I agree should be an sense of that, as it’s widely used informally). If someone said “I’m doing a 7K on Saturday” I would not immediately assume they meant a run, as it’s nonstandard, so I’d probably ask for clarification: for all I know it could be standard in some other sport I’m less familiar with. Only 5K and 10K carry the immediate connotation. Theknightwho (talk) 12:40, 15 June 2022 (UTC) * Unless we want to unleash a mini-onslaught of SoP entries and be compelled to educate newbies about CFI, I think we should not make it a WOTD. I do agree with the arguments for including it. DCDuring (talk) 13:34, 15 June 2022 (UTC) * OK, I don't think we'll feature it as WOTD. Will leave the possible SoP issue to be sorted out another day. — Sgconlaw (talk) 15:33, 15 June 2022 (UTC) devil (nautical) From the entry “Between the Devil and the Deep Blue Sea” in Scholastic Dictionary of Idioms: * In the early 17th century the heavy plank fastened to the side of a vessel as a support for guns was called the devil. Sometimes a sailor had to go out onto this plank to do repairs to the boat. In heavy seas he would be in great danger of falling overboard and drowning because he was between “the devil and the deep blue sea”. I have struggled to verify this sailor's speak sense, which is not mentioned on the Wiktionary entry for, nor is there any etymology listed on. All I have found are some online posts by laypeople which refer to the aforementioned etymology of the idiom, with lots of variation in how it's described. But these people also seem to be confused about the nautical meaning of devil. More problematic is that the description cited above seems to refer to the, and this is not something sailors would have stood upon like a plank during ship maintenance—but even if they did, they wouldn't be between it and the sea, so the book's etymology doesn't make sense under scrutiny. Perhaps devil was indeed a synonym of gunwale, and sailors hung from it, or climbed alongside the boat underneath it? But that doesn't seem right either. I suspect that there was a real nautical term devil, but that authors not familiar with it butchered its definition as the etymology was handed down over generations. Needless to say I am not familiar with nautical speak, let alone 17th-century jargon, so I would appreciate any help in researching this. — <IP_ADDRESS> 21:27, 11 June 2022 (UTC) * The OED has a similar (but non-identical?) sense: "13. Nautical. Any of various seams in the planking of a wooden ship, esp. either of the long seams running along the keel, which are considered difficult to caulk. Now historical and rare." They go on to say that it is sometimes suggested as the origin of the phrase "the devil to pay and no pitch hot". They give four citations but they are all mentions, not uses, taken from other dictionaries and reference books. Equinox ◑ 01:17, 12 June 2022 (UTC) * OED (1897) provides the definition "The seam which margins the waterways on a ship's hull", citing Smyth (entry "DEVIL TO PAY [...]"). This is followed by an alternative definition, which may or may not be equivalent, "a seam between the garboard-strake and the keel", citing Funk & Wagnalls. * I'm not sure this is the right sense for "between the devil and the deep blue sea", but it seems superficially plausible. (Wrote this comment before noticing the other one was posted.) <IP_ADDRESS> 01:17, 12 June 2022 (UTC) * Did this perhaps refer to a dowel (cp. Ger., vs. regional ), as planks are bound to be joined by some sort of pegs? Also, if this is on the front of the sheep, "between" may applay in the horizontal plane as the ship plunges forward into the waves, I guess. ApisAzuli (talk) 07:10, 19 June 2022 (UTC) * I'm more familiar with the sense of devil in regards to the long edge of abutting shipboard planks, as in the devil to pay (i.e. "pay out, lay out" in reference to the strands of oakum used for caulking) and no pitch hot (where the pine pitch had to be heated to liquefy, and this was then used as waterproof resin applied to the oakum). * I am intrigued by @ApisAzuli's suggestion of a possible derivation from 🇨🇬 /, perhaps also or instead 🇨🇬 which is even closer phonologically to 🇨🇬. ‑‑ Eiríkr Útlendi │Tala við mig 00:34, 23 June 2022 (UTC) spitting image Same source as the above. Is there any reason to suppose an old meaning “likeness” for the word ? And which etymology would that sense belong to? (Apologies if this is better suited for the etymology scriptorium, but I think it should be kept with the above.) — <IP_ADDRESS> 21:41, 11 June 2022 (UTC) * This sense definitely exists. There's already a relevant sense on : "A person who exactly resembles someone else (usually in set phrases; see spitting image)", supported with quotations. It's also in a bunch of other dictionaries. Some early examples: 1805, 1818, 1824. I did not search very hard for earlier examples. * We currently group this sense of together with the saliva sense. However, the Scholastic Dictionary entry you referenced (first ed., second ed.) adds something about possible relation to the word . I don't know if this is supported. <IP_ADDRESS> 22:07, 11 June 2022 (UTC) * I somehow missed it. Thank you. — <IP_ADDRESS> 22:09, 11 June 2022 (UTC) * The "spit and image" > "spitting image" idea is well-attested and supported by other etymological dictionaries (example). <IP_ADDRESS> 22:11, 11 June 2022 (UTC) * This has to be from t-glotallized from speculum, equivalent to, cp. , , . Last time I have checked nobody knew that, but I doubt that I am the first one to recognize. As for spirit, see likewise spectre. ApisAzuli (talk) 11:41, 14 June 2022 (UTC) Help with citing the Commentarii notarum tironianarum (1893) I was recently working on a page for Latin, a word that is attested only in a table of Tironian notes (Latin shorthand). The standard reference work for these notes seems to be Commentarii notarum tironianarum cum prolegomenis adnotationibus criticis et exegeticis notarumque indice alphabetico, (1893), edited by Wilhelm Schmitz, a work that has entered the public domain in the United States and is available to read online on the Internet Archive. However, it is indexed not with ordinary page numbers, but with some system involving multiple numbers and abbreviations that I'm not too sure of. I tried to reference it the best I could, using the preexisting entry for, which also cites this source, as a model, but I'd appreciate any advice on understanding the proper format for citing this reference. Because there is little lexical information that can be provided about this word, I'd like to add a picture of the Tironian note to this entry. Perhaps a scan of a manuscript would be best, but to start with, I was considering adding just the relevant portion of the scan of Schmitz 1893. However, I wasn't sure about the copyright status of the scan itself, as opposed to the original text it reproduces. Is it safe to assume the scan is also public domain in the United States? Urszag (talk) 01:10, 12 June 2022 (UTC) * The citation formatting currently present on nucunculus seems perfectly fine to me. * I believe most scans of public domain content should be in the public domain, per discussion here. <IP_ADDRESS> 01:28, 12 June 2022 (UTC) blush Is this sense wrong somehow? "Blushing a beet red" doesn't feel very transitive, as blushing is not something being done to the red. It's more adverbial. * 1) To change skin color in the face (to a particular shade). Equinox ◑ 01:14, 12 June 2022 (UTC) * This seems grammatically comparable to sense 5 of . On that entry, is used. Based on the definition of copular verb, it seems like the category that might fit the verb in this instance, but IANAG (I am not a grammarian). <IP_ADDRESS> 01:53, 12 June 2022 (UTC) * This is an, like become or turn. It's not transitive because it takes a complement, not an object. It's also a copula. Syntactically, there's not much difference between "he blushed beet red", "he turned beet red" and "he was beet red"- they don't describe actions, they describe states or changes in states. Chuck Entz (talk) 03:08, 12 June 2022 (UTC) Holocash, holocash Oddly, these two entries have different definitions (and at least some of the citations appear to back them up). But I suppose really either could be an alt form of the other...? Equinox ◑ 02:22, 12 June 2022 (UTC) * This is one of those words (I know there are others that have come up, but I can't think of them offhand, maybe y]ou or someone else can) where, because people mostly use it to gesture pejoratively and uncarefully at some supposed link between two ideas ("Holocaust, cash! Jews are money-grubbing, amirite?!"), it's hard to write a definition that pins down a "meaning". That said, the gloss in holocash and the second half of the definition in Holocash were similar enough that I merged them. - -sche (discuss) 22:15, 12 June 2022 (UTC) bruck Does the adjectival sense need to be marked somehow? Perhaps as "slang" or "dialect"? Tharthan (talk) 05:14, 12 June 2022 (UTC) * Probably . <IP_ADDRESS> 05:15, 12 June 2022 (UTC) * ✅ Equinox ◑ 05:16, 12 June 2022 (UTC) * It was already near the header of the verb. Besides the etymology makes its current distribution kind of bait. This is like some one being confused by not marked according to epoch in spite of it already telling that it is borrowed from Italian – didn’t really know the details of its being spread across Medieval Latin, Renaissance Latin, or only New Latin to be loud about it, likewise I was not sure if perhaps perhaps transpired earlier into British English or also some other Carribean islands, as the oldest quotes appeared to predate the emergence of MLE. Fay Freak (talk) 21:08, 23 June 2022 (UTC) * Wrights dialect dictionary lists bruck as a Scottish and Irish word and claims that it can not only mean broke but rubbish or scraps of food in Scotland (from the idea that unwanted stuff is broken) and it can mean ‘brook’ there too and there are some writings on GoogleBooks in broad Orcadian or Shetlandic Scots that seems to bear this out. The earliest hit I can find for bruck meaning broke is a depiction of an Irishman from Clonmel using the word in 1829 and interesting is this hit, which seems to be written in broad West Country dialect but apparently is written in a broad Doncastrian dialect from 1853, so it must have been said in at least some parts of England back then. Glancing through some other hits it seems that it may have been used in the West Country and Appalachia too but I’ll have to investigate further. The use of bruck, brack and several variants in Scots is analysed extensively at the DSL . It’s certainly rare to hear bruck or brack for broke outside of the West Indies and MLE but IIRC the form brack was used in a Ken Loach film about neds (possibly in the line “Ah brak ra windaes en ra weans ‘ame” meaning “I broke the windows in the childrens’ home”) near Glasgow and we list it as exclusively Doric Overlordnat1 (talk) 00:32, 24 June 2022 (UTC) Italian imperatives of third-person-only verbs? A question for native Italian speakers: do third-person imperatives exist for third-person-only verbs like accadere, piovere, bisognare, volerci, etc., i.e. verbs that exist only in the 3rd-person singular and plural? I'm pretty sure the answer is no; it seems to me that third-person imperatives are used specifically as polite second-person imperatives (with Lei/Loro), which don't make sense with such verbs. However, several existing/old verb conjugation tables for these verbs do contain third-person imperatives, and several existing non-lemma forms of these verbs claim to be third-person imperatives (e.g. accada, accadano). I ask because my new conjugation module Module:it-verb does not generate them, and I want to make sure this is correct. Benwing2 (talk) 00:20, 13 June 2022 (UTC) * According to the way I studied the language, only second-person forms are actual imperative forms. The remaining ones use the forms of the subjunctive, in the so-called congiuntivo esortativo (“exhortatory subjunctive”). I suppose that, if you regard those forms as imperatives, impersonal verbs have them as well (e.g. (che) piova! (“let it rain!; may it rain!”)) — GianWiki (talk) 06:43, 13 June 2022 (UTC) * Imperative forms only exist for the second person. "Third person imperatives" (between quotation marks because it is a completely alien concept in Italian; no Italian native speaker would ever consider it an imperative), as @GianWiki explained, are rendered by + subjunctive. * As for accadere, piovere and bisognare, I really wouldn't say that they only exist in the third person. They are mainly used in the third person, but if you wanted to use them in any other person, you could. If you're writing an ode to rain, you could very well say things like "acqua celeste, che piovi sulla terra" (litt.: "oh heavenly water, that rain on the earth"), "Giovanni, ma cosa stai facendo?" "Accado" ("Giovanni, what are you doing there?" "I'm happening"). Is it unusual? Sure. Impossible, not at all. The Italian dictionary Zingarelli has no problem giving the full declensions of these verbs. I think we should do the same. Sartma (talk) 08:55, 13 June 2022 (UTC) * @Benwing2 With "lei/loro" we use the pure subjunctive to express a polite request. That's not an imperative, though. It also isn't a 3rd person (it is etymologically, that's why the verb form is the same, but meaning wise it's a 2nd person and it should be given along other 2nd person forms). Sartma (talk) 13:54, 13 June 2022 (UTC) * Thanks. If you want to include non-third-person forms of these verbs (compare also and impersonal-only verbs like ), then I will see about doing so and marking them as rare. BTW is Zingarelli online anywhere? I don't seem to be able to find it. Benwing2 (talk) 01:18, 14 June 2022 (UTC) * @Benwing2: annottare and piovigginare only have the third person, so they're good the way they are (Zingarelli confirmed that too). But piovere, accadere and bisognare have all forms. To be honest, I don't really know if there is a rule to decide which verbs only have the third person and which can be used in all forms... I guess a good dictionary would tell you? I'm also not sure that it makes sense to mark them as "rare" (unless "rarity of use" something we regularly mark on Wiktionary lemmas...?) I even found a book titled "Io accado". * Unluckily Zingarelli is not available for free. I use it for work so I have my own digital copy that gives declension tables for all verbs. Sartma (talk) 09:44, 14 June 2022 (UTC) transliterator Hey, I'm reading transliterator and I can't figure out what this is. If I were a person unfamiliar with this term (I am), I would be lost (I am). Is this a job or a software or what? If it is a job, are there famous transliterators from history? I would appreciate an example sentence or similar where someone noted for their transliterator skills is mentioned. Unfamiliar with this line of work. --Geographyinitiative (talk) 20:37, 13 June 2022 (UTC) * It's an agent noun. The definition's a bit substandard, because it doesn't need to be a person. Agent nouns sometimes get used as professions, and sometimes those are perceived as more formal. For example, someone can be an actor (as an agent noun) without being an actor (the profession). * I'd suggest we just change it to "One who transliterates", because that also covers things like software etc. Theknightwho (talk) 23:08, 13 June 2022 (UTC) * actually, "one who transliterates" doesn't suggest to me anything other than a human person. If you want a definition that also includes software, I think it would have to be something like "A person who, or thing which, transliterates." — Sgconlaw (talk) 13:45, 14 June 2022 (UTC) * "That which transliterates"? Though I'm pretty sure it's a standard use of (pronoun sense 4). Theknightwho (talk) 13:50, 14 June 2022 (UTC) * It should be “one who or that which transliterates”, to include both people and things (e.g., see this search). J3133 (talk) 13:52, 14 June 2022 (UTC) * Gloriously cumbersome. Theknightwho (talk) 13:56, 14 June 2022 (UTC) * We use it on many pages and I doubt you would find a better solution. J3133 (talk) 14:01, 14 June 2022 (UTC) * pronoun sense 4 covers this and it's used in a vast number of Latin entries, but okay matey. Theknightwho (talk) 14:18, 14 June 2022 (UTC) * As Sgconlaw has stated above, one does not suggest anything other than a human person to most, and I agree. Were that not the case, as many as have added “one who or that which” would not. J3133 (talk) 14:21, 14 June 2022 (UTC) * The problem here isn't the first pronoun, but the second: who specifies a person. You can't say "the one who" about a thing without anthropomorphizing it. How about "someone or something that transliterates"? Chuck Entz (talk) 14:58, 14 June 2022 (UTC) * This feels much more natural, and I'd prefer this as the standard wording. Theknightwho (talk) 05:09, 16 June 2022 (UTC) * Yes, that sounds good! — Sgconlaw (talk) 05:27, 16 June 2022 (UTC) Italian odiare: tu odi, tu odii, ...? che io odi, che io odii, ...? Hi. I'm confused a verb like. Hoepli, which is generally trustworthy, says "tu òdii o tu òdi" and similarly it says that the singular present subjunctive is "òdii o òdi". Treccani doesn't say; it just says "òdio etc." DiPI has a subentry that appears to refer to odii but I'm having a hard time interpreting what it says. Olivetti has only odii but I'm somewhat skeptical of this dictionary's reliability. The "Dizionario di Orthografia e Pronuncia" (DOP) would probably shed a lot of light but it seems to no longer exist online (or did it move? If so does anyone know its new location?). I was under the impression that verbs in -iare with stressed i take -ii, e.g. : io invìo, tu invìi, etc., but that verbs with unstressed i take just -i in the second person singular and the singular present subjunctive. Am I wrong here or is an exception in having tu òdii? Are these forms with -ii archaic or otherwise stylistically differentiated from forms in -i? Are forms in -ii available for every verb in -iare, e.g. studiare, mangiare, lasciare, invecchiare, scoppiare, abbaiare, abbracciare, abbreviare, lanciare, baciare, tagliare, cambiare, variare, etc.? Or maybe only those verbs in -iare where the /i/ is actually pronounced? Or maybe only a small or large subset? Thanks for any help you can give and any light you can shed. Benwing2 (talk) 07:02, 14 June 2022 (UTC) * As far as I know, → tu odi. I've seen forms like odii chiefly used as plural forms of (even though the correct form is odi, or better yet odî), or even archaic spellings like odj. — GianWiki (talk) 07:22, 14 June 2022 (UTC) * @Benwing2: Zingarelli gives òdi as the usual form, and òdii next to it, marked as literary (both for present and conjunctive forms). I don't remember ever reading odii as a verbal form (or if I did, I might just not have noticed that it was spelt with two I's...), but I would definitely never write it with two I's. Sartma (talk) 11:36, 14 June 2022 (UTC) * @Benwing2: Oh, I forgot to reply to the second part of your question. I checked the inflections of all the verbs you listed and only variare has an alternative form varii, marked as rare, next to the usual vari. I don't think there is a rule here, it must be a question of "we found these forms in the corpus of Italian literature we examined, so we need to indicate that they exist". They are definitely not spellings taught in Italian schools. I guess we can add them as alternative forms, just to recognise their existence, but I wouldn't personally do so in a declension table. Sartma (talk) 11:52, 14 June 2022 (UTC) * Thanks. I won't include them in the conjugation table but maybe add a usage note about these forms. Benwing2 (talk) 00:43, 15 June 2022 (UTC) Missing sense of tongue (verb) or noun tonguing? In the song Wellerman there is the line "One day when the tonguin' is done we'll take our leave and go." Is this synonymous with or related our nautical sense listed as a noun definition of tongue, or is it something else? Acolyte of Ice (talk) 09:52, 14 June 2022 (UTC) * Were the boards that made up the hulls of sailing ships joined by tongue and groove? DCDuring (talk) 15:16, 14 June 2022 (UTC) * I didn't find anything for the last millennium, when they may have used shiplap instead. DCDuring (talk) 15:30, 14 June 2022 (UTC) * See and . DCDuring (talk) 15:35, 14 June 2022 (UTC) * See and . DCDuring (talk) 15:35, 14 June 2022 (UTC) Synonyms I would suggest that if two words refer to the same thing but if both are non-generic terms for it (that is if both belong to different registers), then they should not be stated as synonyms of each other. If one of them is the common term for it, I think only then a synonym of different register can be added. Refer to this entry. In this case, one word is a common slang/vulgar word, and other is a nonstandard/regional term. ·~ dictátor · mundꟾ 11:43, 14 June 2022 (UTC) * Qualifiers are your friend for this. Theknightwho (talk) 13:52, 14 June 2022 (UTC) * Sure, but this should apply only when one of the words is a common term. But if both are non-generic terms, then even using qualifiers, it’s really misleading and looks bad. ·~ dictátor · mundꟾ 15:45, 14 June 2022 (UTC) * Sure - I agree with that. Theknightwho (talk) 17:16, 14 June 2022 (UTC) * I generally agree with you and suggest you take this to the Beer Parlour. In general we need to be careful with synonyms of different registers, particularly when one of the registers is offensive, vulgar or derogatory. Benwing2 (talk) 00:56, 15 June 2022 (UTC) * Can you give an example where qualifiers won’t do? --Lambiam 09:20, 15 June 2022 (UTC) * Qualifier won't do in any case, see Template:qualifier: * To identify the sense to which a usage note, synonym, or other -onym applies, use instead. * Anyway it sounds like a slippery slope. NB: Wilhelm Schmidt et al., -- "(es gibt eben keine echte Synonymie, wohl in keinem sprachlichen Bereich)." (Geschichte der Deutschen Sprache, vol. 1. Hirzel, 2020. cf. pg. 7). ApisAzuli (talk) 15:00, 18 June 2022 (UTC) based In the "verb" section, the verb used is exclusively "to be", all the uses of "based" are adjectival. The entry for the adjective sense of praiseworthy; admirable feels less than ideal at the moment for a couple of reasons: * We don't mention the association that the term has with the alt-right. I notice that that sense was deleted back in 2019 on the basis that it could be folded into the general sense, but I'm not sure that that's entirely accurate. At least for a while, the term was certainly used as a dog whistle, even if it's become more widespread. * We currently give the usage example "based and redpilled". Frankly, I don't think we should be repeating highly politicised slogans just because they happen to be common collocations, particularly when: * There is nothing that indicates the actual implications of that slogan. * The entry at red pill also doesn't do a particularly good job of signposting this either (e.g. no usage note in the verb section), and implies that it is far more benign than it really is. * At best the combingation is misleading. Theknightwho (talk) 02:12, 15 June 2022 (UTC) * I agree, we should add a qualifier (alt-right slogan) and/or "translation" to it. Or perhaps re-add it as a cite? At least there will be some surrounding context. – Jberkel 08:02, 15 June 2022 (UTC) * Wasn't this discussed before? Tea_room/2021/March. I don't think this deserves too much attention, because it is a moving target. ApisAzuli (talk) 08:50, 15 June 2022 (UTC) * I am of course not opposed to factually accurate qualifiers; my sole concern was that I didn't want to remove correct information (the fact that "based and redpilled" is a collocation is undeniable) from that page. * As to the qualifiers: I actually, by and large, agree with the label (Internet slang, originally 4chan) given in based. It appears to me that based has found wide-spread adoption in non-right-wing (i.e. either left-wing or apolitical) circles (leftypol, ContraPoints, this deleted meme) and based and redpilled too though to a (much?) lesser degree. I think we could do with a usage notes section that explains the transition from it being far right lingo to an (innocuous?) main stream Internet word (which is where we are at today from what I can tell). Pinging also who has proven to be well-versed in online political discourse. &mdash; Fytcha〈 T | L | C 〉 10:46, 15 June 2022 (UTC) * I discern three possible senses that could fit under Etymology 2. The first – "not caring what others think" – seems to be the source of the other two. The alt-right sense seems to have emerged on 4chan around 2014 with . As a prominent example,, a libertarian feminist, was dubbed "Based Mom" after she aligned with Gamergate. I would probably define this sense more narrowly: "admirable for rejecting liberalism or left-wing values." It's somewhat synonymous with the later coinage , but I think the concept of praiseworthiness is baked into its meaning. The third sense I would suggest is a more generalized "admirable or praiseworthy" one. This seems to have grown out of ironic use or reclamation within progressive spaces. WordyAndNerdy (talk) 11:39, 15 June 2022 (UTC) * To add to Wordy's comments about people who had the name attached to them: there was also "Based Stickman" (Kyle Chapman) who became famous for hitting an anti-fascist protester with a stick (or so I gather from very cursory Web searches). Equinox ◑ 21:55, 16 July 2022 (UTC) * Just a comment: The "alt-right" tag seems inaccurate. It is commonly used among socialists/communists online as well. ---&#62; Tooironic (talk) 03:03, 16 June 2022 (UTC) * Yes, but they in any case have appropriated it from DR memers. ᛙᛆᚱᛐᛁᚿᛌᛆᛌ ᛭ Proto-Norsing ᛭ Ask me anything 12:36, 16 June 2022 (UTC) * Possibly not directly from the alt-right, but rather from its general usage –Jiaminglimjm (talk) 11:12, 16 July 2022 (UTC) * I've always thought of this word as a 4chan (later spread elsewhere) synonym for "awesome". Usage by political edgelords != political word? —Fish bowl (talk) 22:37, 16 June 2022 (UTC) * I use this word. The only popular usage I come across is when it's used to praise someone or show agreement with them. I think this is what the word is notable for. I wasn't aware of this being "alt-right" stuff Python Drink (talk) 23:10, 13 July 2022 (UTC) * This is a fine and amusing word that I happily use (but not in liberal company; same reason you might be scared to say "blind drunk" or "went totally crazy"). Most people I know who use this word are the "dirtbag left", who might not be your best friends but certainly aren't the alt-right. Equinox ◑ 11:38, 16 July 2022 (UTC) * "based" is without doubt of DR/4chan origin. I know because I've seen its rise over the last few years and that is where it started. The left simply took it for themselves in order to insult right wingers, in order to say things like "the allies were based chud", when by the earlier users the Allies would definitely NOT be designated as "based". It then began to be adopted by apolitical people. ᛙᛆᚱᛐᛁᚿᛌᛆᛌ ᛭ Proto-Norsing ᛭ Ask me anything 21:51, 16 July 2022 (UTC) * That's lovely but it means nothing whatsoever unless you have sources and proof. Equinox ◑ 21:53, 16 July 2022 (UTC) * The origin is, as our etymology states, cocaine addiction, then reclaimed by rappers (first Lil B) to mean “carrying yourself with swagger”. Reference: Dictionary.com. J3133 (talk) 08:09, 17 July 2022 (UTC) * It seems that there are 2 words, one older derived from freebase, and a later one. I've moved the sense being discussed here to a new Etymology 3, adding that the previous senses may have crossed over to the new formation. Please advise if this doesn't look quite right. Leasnam (talk) 03:12, 6 March 2023 (UTC) * I said above that i was surprised that it comes from cocaine too, but that is where all the evidence points. Any supposed third etymology is a folk etymology. — Soap — 13:05, 10 March 2023 (UTC) * Another good thing to add here is the correlation to AAVE and how it connects to appropriation of it; maybe adding a source to the 4chan origin of the word! Cvni81 (talk) 15:11, 13 September 2023 (UTC) want to... I'm rereading Pride and Prejudice (1813), and I have come across a sentence in which Elizabeth says, "Last Christmas you were afraid of his marrying me, because it would be imprudent; and now, because he is trying to get a girl with only ten thousand pounds, you want to find out that he is mercenary." (Chapter Twenty-weven) As I understand it, Elizabeth is teasing her aunt, Mrs Gardiner, who wishes to see "him" (Wickham) in a good light. I understand this sentence to mean "Wickham has gone after Miss King instead of me because she has come into a fortune, but you don't blame him, because her fortune is only ten thousand pounds". In other words, the words "you want to find out that he is mercenary" actually means "you lack the ability to see him as mercenary". That of course is very different to the meaning of "you want to ..." today. I think "want" was not used to mean "wish" back then. Am I right in my interpretation? Can we add this meaning to the article? Eric Kvaalen (talk) 16:07, 15 June 2022 (UTC) * I read Pride and Prejudice a very long time ago so I don’t recall the context of the quotation, but just looking at it in isolation it seems to be a straightforward use of want to mean “to desire or wish for (something)”. Elizabeth is insinuating that her aunt is prejudiced against Wickham; she is constantly trying to find fault with him, and so she wants (desires, wishes) to find out that he is pursuing Miss King only for her money. — Sgconlaw (talk) 16:38, 15 June 2022 (UTC) * Well, I think it's the opposite! Take a look: Pride and Prejudice Eric Kvaalen (talk) 17:28, 15 June 2022 (UTC) * I have read the relevant page, and my opinion remains unchanged. * “But my dear Elizabeth,” she added, “what sort of girl is Miss King? I should be sorry to think our friend mercenary.” * “Pray, my dear aunt, what is the difference in matrimonial affairs, between the mercenary and the prudent motive? Where does discretion end, and avarice begin? Last Christmas you were afraid of his marrying me, because it would be imprudent; and now, because he is trying to get a girl with only ten thousand pounds, you want to find out that he is mercenary.” * — Sgconlaw (talk) 18:40, 15 June 2022 (UTC) * @Eric Kvaalen I think the confusion here is coming from the word "only". It doesn't mean that Miss King's fortune is "only ten thousand pounds" (i.e. small) - it means that Miss King is "a girl with only ten thousand pounds" (i.e. that's the only thing she has going for her, from Wickham's perspective). Theknightwho (talk) 02:43, 16 June 2022 (UTC) * MW 1913 has "To feel need of; to wish or long for; to desire; to crave." Webster 1828 has a similar definition. DCDuring (talk) 18:32, 15 June 2022 (UTC) I suppose you folks are right. Now that I've found a PDF of it, I checked and found that there are about a dozen other places where "want to" is used and the ones I checked do mean "desire to'. I find the passage in question difficult to understand. Mrs Gardiner does seem to desire to think well of Wickham. She says later, "I should be sorry, you know, to think ill of a young man who has lived so long in Derbyshire". Apparently "want to" did mean "desire to" in 1813. But in 1611 the King James Bible never used the word "want" to meant "desire". There are many places where the Greek has the verb meaning to desire or wish, but the KJV always uses "will", "would", "desire", or something similar. For instance, the "Golden Rule" in Matthew 7:12 says, "all things whatsoever ye would that men should do to you, do ye even so to them". People think it means "what you would have them do unto you", like a conditional, but it really means "what you want them to do unto you". While we're at it, can someone explain to me why Elizabeth says, near the end of Chapter 29, "I am not one and twenty"? Eric Kvaalen (talk) 08:38, 16 June 2022 (UTC) * Elizabeth is saying, "I am not yet 21 years old." — Sgconlaw (talk) 13:12, 16 June 2022 (UTC) * Well, I don't really understand why she says that. She would then be agreeing with Lady de Burgh that she is not more than 20. I don't see the point of it. Maybe it's just a way of saying "Yes, I am 20." A bit earlier she says her youngest sister "is not sixteen", which I suppose is just saying she's 15. Like when we say "She's going on 16" or "I'm going on 21". (By the way, four daughters between the ages of 15 and 20 seems a lot!) Eric Kvaalen (talk) 15:49, 17 June 2022 (UTC) * @Eric Kvaalen "I should be sorry" is an affectation. It would have been socially unacceptable for her to openly express desire that Wickham is bad (or to make a direct accusation), so instead what she's doing is expressing regret (which is socially acceptable) as a way to draw attention to a concern that other people didn't actually have in the first place. It's a good example of the very thing the novel is named for, in fact. Theknightwho (talk) 13:07, 16 June 2022 (UTC) * Just to add: the second time she says she's sorry, she's being intentionally ambiguous. What Mrs Gardiner is actually doing is expressing regret that Derbyshire's reputation might be damaged by someone like that having lived there so long (another example of pride and prejudice in tandem). Again, it might need a bit of attuning to, because it's another common sleight of hand in the UK (even if people wouldn't use that precise phrasing these days). Theknightwho (talk) 13:14, 16 June 2022 (UTC) * (Another addendum) - remember that Mrs Gardiner is ultimately trying to comfort Elizabeth here (essentially "you didn't want him anyway"), with a bit of "I told you so" thrown in. Elizabeth's using irony (sense 3) as a retort to the second bit, but she's being somewhat good-humoured about it because she recognises the good intentions. It's a miscalculated move on Mrs Gardiner's part, though, which is why the conversation goes downhill. Mrs Gardiner has no incentive to think good things of Wickham, in any event. Theknightwho (talk) 13:28, 16 June 2022 (UTC) * Well, maybe. Thanks. Eric Kvaalen (talk) 15:49, 17 June 2022 (UTC) quality of -ei in Italian 1sg conditional, e.g. vorrei, sarei Hi. User:GianWiki posted on my talk page about the conditional ending -ei; he believes it is -èi whereas I currently have -éi in. The current pronunciations of vorrei and sarei disagree; the former has vorréi but the later sarèi. My -éi is based on DiPI, see, which has -éi for the passato remoto ending, and I would assume that the conditional is in origin the same ending. However, I am not completely sure, and DOP appears to be no longer online; that is a good source for "traditional" pronunciations. Can a native Italian speaker comment? Also it would be great it someone could review the accents I put in pages like amare and insistere that use the new. Benwing2 (talk) 02:02, 16 June 2022 (UTC) * OK, Hoepli agrees that it is -èi. I changed the module accordingly. Another question though ... I know that the verb form dà of dare (3rd singular present indicative, 2nd singular imperative) has a written accent on it in normal usage, and dò of dare (1st singular present indicative) can, although do without a written accent is more common. What about sdarsi? Do the forms sdo and/or sda have a written accent? I am guessing the answer is no, and that's what my module implements, but I'm not sure. I know that ridò and ridà of ridare do have a written accent, but that's expected because the forms are multisyllabic with final stress. Same question concerns the imperative dì of dire; what about sdire, does the imperative sdi have a written accent? (For that matter, does sdi exist at all? sdire itself is archaic so this may not be easy to answer.) Benwing2 (talk) 06:20, 16 June 2022 (UTC) * Treccani lists the second-person singular imperative form of as di’ (with an apostrophe), with dì as a secondary choice (which can also lead to confusion with the noun ). Di’ is likely the best choice. — GianWiki (talk) 07:37, 16 June 2022 (UTC) * One final question, about forms like 1st singular fò of fare, and similarly rifò of rifare, (sod)disfò of disfare/soddisfare, liquefò of liquefare, stupefò of stupefare, etc. Hoepli says fàccio or fò are equally good and Treccani actually lists fò before fàccio, but I gather fò is literary, archaic or regional, so I marked it as such in the conjugation table of all these verbs. Is this correct or are there additional nuances? I know for example that disfare has a common form dìsfo (note the position of the accent) and similarly soddisfare has soddìsfo, and that these forms aren't archaic; and liquefare has forms like lìquefo that are common but proscribed, so there are definitely some subtleties. Benwing2 (talk) 07:12, 16 June 2022 (UTC) * @Benwing2: you're right. fo is indeed literary or regional (Tuscan). Zingarelli gives it as "rare" and spells it without accent. Definitely not standard Italian. I wouldn't say it's archaic, since you still hear it from people speaking regional Italian (mainly in Tuscany), but it's clear to everyone that it's literary/not standard. * As for the 1st singular indicative of the other verbs you mentioned: * rifare: rifàccio, but Zingarelli also gives rifò (I consider the second regional, though) * disfare: dìsfo, but Zingarelli also gives disfàccio (wich I would never, ever say, it sounds a bit ignorant, like you don't know it's dìsfo) and disfò (wich I would also never say, since it sounds like a 3rd person past, like lui disfò - even though apparently the correct form would be lui disféce) * soddisfare: soddìsfo, but Zingarelli also gives soddisfàccio (that I never heard and also would never use) and soddisfò as "rare". * liquefare: I say liquefàccio. But Zingarelli says: lìquefo, or, more correct but less widespread, liquefàccio. I would consider lìquefo to be wrong (sounds quite ignorant to me), but if Zingarelli gives it as the most widespread, I guess we can do the same... sigh. * stupefare: I never use this verb in the first person, it's not generally something people "do". Zingarelli gives stupefàccio and stupefò. * Sartma (talk) 09:42, 16 June 2022 (UTC) * @Benwing2: Zingarelli gives dò as "rare". I wouldn't even put it in inflection tables. In contemporary Italian it's spelt "do". The accent is not needed because it can't really be confused with any other word. The only reason dà is spelt with the accent is to clearly differentiate it from the preposition da (even though it's a bit silly, but that's a story for another day). I never heard sdarsi before. Zingarelli gives it as "Tuscan" in its first meaning of "to stop applying yourself to something", and "rare" in its second meaning of "to do something profusely". It says that it's conjugated like dare, but then in the inflection table it puts accents for everything so one can't really know. I wouldn't personally put an accent, since neither "sdo" nor "sda" can be confused with anything and are one syllable words ("can it be confused with something else?" is the main reason in Italian to write the accent on words that wouldn't normally need it). * As for the imperative of dire, the modern form is only di'. Zingarelli give dì as "disusato" (no more used). I wouldn't put it in inflection tables, maybe just a note saying that you might find it written like that in some old book (but then again, you find any sort of oddities in old books, so I'm not really sure where to draw a line). Of sdire, Zingarelli gives it as "archaic" and doesn't even give the conjugation table, lol. I never heard that verb, we only use disdire these days. I don't know what the imperative would be, to be honest. If it's like disdire it would be sdici, not sdi. I think you can just give it a pass on adding the inflection table for this one. It's not modern Italian anyway... Sartma (talk) 08:49, 16 June 2022 (UTC) * @Benwing2: Oh, just noticed that we have sdici on Wiktionary already. Sartma (talk) 08:50, 16 June 2022 (UTC) * @Benwing2: I forgot one thing about imperatives: the imperative of dare in modern Italian is either dai or da' (with the apostrophe indicating that the -i has dropped). The same is true for fare (fai or fa'), andare (vai or va'), stare (stai or sta'). Forms with the accent like dà are given as "not used anymore" by Zingarelli. I wouldn't put them in inflection tables. Sartma (talk) 09:57, 16 June 2022 (UTC) * @Benwing2: I noticed that at the moment under dare we give dà' as imperative. That's definitely wrong. There should be no accent on the a of da'. Sartma (talk) 10:02, 16 June 2022 (UTC) * @Benwing2: I found a whole paragraph in Zingarelli on when to write the accent on words. It clearly says that it's wrong to write the imperatives of fare, andare, dare, dire and stare with an accent, but they have to be written with the apostrophe, since it's a case of truncation, exactly the same as mo' for modo, po' for poco, ca' for casa, etc. Sartma (talk) 10:16, 16 June 2022 (UTC) * @Benwing2: I checked the accents on amare and insistere. They look alright to me. The only thing that I find a bit strange is the two versions for the 3rd person of the conditional, one with -èbbe(ro) and one in -ébbe(ro). The second one is clearly regional. I'm not sure it should be there... Sartma (talk) 12:12, 16 June 2022 (UTC) * Thank you very much for your detailed comments. I'm in the process of incorporating them into the conjugation tables. Some comments: * -ébbe(ro) comes from DiPI, which lists -èbbero, -ébbero here: and also in the pronunciation for ebbero itself: DiPI uses various symbols, and if you hover over the "Varianti di pronuncia", it says the first pronunciation is la più consigliabile and pronunciations after a comma are abbastanza consigliabile. Generally DiPI seems reliable, and the pronunciation with high-mid /e/ agrees with the audio pronunciation given for vorrebbero here: That said, if this is a regional pronunciation, I can mark it as such in the table or leave it out. * The indication dà' is not to be taken to indicate that the accent should be written; the convention I've used is that I mark the stressed syllable in all words, even monosyllabic words (since the accent may be necessary to convey the quality of e and o), and in monosyllabic words, there's a footnote if the accent is written in normal text, indicating this. You can see an example of this in the table for dare, where the 1sg present indicative has dò twice, where the first one links to do and the second one to dò, and the second one has footnotes "Less common" and "With written accent on monosyllabic verb". Granted, this may be confusing, and there may be a better way; for example, Treccani under fare writes "(pres. fo 〈fò〉 [radd. sint.] o fàccio, fai [ant. faci], fa [radd. sint.; ant. e poet. face], facciamo, fate, fanno; ..."). Possibly some indication for monosyllabic words like fo〈fò〉would be best. I am also thinking of changing the indication of syntactic gemination to use a following superscripted asterisk with an explanatory tooltip; this is already being used in the pronunciation section, see for an example. * As for stupefare, that was intended to stand in for all the remaining compounds of fare. Apparently that is not a good example. There are several others: contraffare, ricontraffare, sopraffare, strafare, prefare, sfare, artefare, putrefare, torrefare, tumefare, assuefare, riassuefare, mansuefare, dissuefare, rarefare, tepefare, satisfare (obsolete, not sure if you can comment on it), benefare (obsolete), perfare (obsolete), misfare (obsolete). Maybe you can comment on (some of) these. * Benwing2 (talk) 01:24, 18 June 2022 (UTC) * One more question ... Hoepli says the future of effigiare is either effigerò or effigierò. I would expect only the former. Is there a rule for this, or is this just based on the spelling effigie? svaligiare doesn't seem to have *svaligierò as a possibility. Benwing2 (talk) 19:00, 19 June 2022 (UTC) * @Benwing2: Zingarelli only gives effigerò, and that's the only one I would write. Italian Wikipedia] (see: Etimologia - Alcuni verbi in -[c;g]iare) does talk about verbs like effigiare, but says that the etymological form (that keeps the original i of the Latin verb) is "extremely rare, antiquated and Latinising, therefore nowadays easily mistaken for grammatically incorrect and better avoided in formal writings". I would give it as an alternative spelling, maybe marked as "etymological", but not in inflection tables. Sartma (talk) 21:50, 19 June 2022 (UTC) * Hi. I wonder if you missed my preceding comments (just above where i say "One more question ...") in response to your detailed comments above? Could you take a look when you have a chance? Also, under dolere there are currently two conjugations. The first looks fairly correct but the second one (which claims to be "literary") looks copied from volere with v -> d; e.g. present indicative doglio, duoi, duole, dogliamo, dolete, dogliono, past historic dolli, doleste, dolle, .... Do these unusual forms like duoi, dolli, dogliono exist at all or is this just garbage? I can't verify these forms either in Hoepli or Treccani. BTW what I've taken to doing for common verbs with archaic/literary/rare/regional/etc. forms is to include two conjugation tables, a "normal" one that just lists the modern forms and a second one listing all the rare/archaic/etc. forms. You can see an example of this under essere. Benwing2 (talk) 04:17, 22 June 2022 (UTC) * @Benwing2: Hi! Sorry, I did see your last question, I just haven't had time to get round it yet (got busy with work...). I added a couple imperative forms to dolere and deleted the second conjugation. I've never heard of it and can't really find any reference online either (Zingarelli doesn't have it either). * I guess the double table would work? I'm not super sure about the "regional" forms, though... mainly because... where do you draw a line? Meaning: when does it stop being Italian and becoming something else? I find it difficult to say that forms like sémo and èramo are Italian... They're quite clearly dialectal (Roman? We say sémo/jèrimo in Venetian, and I'd never accept that as Italian, not even regional). "Regional Italian" is still Italian, which means that verbal forms should be the same as the standard language (expressions, idioms, nouns might be different, but not verb forms...)... On the other hand, forms like the present participle essente are pretty much never used (given as "rare" by Zingarelli, they are those forms that if you catch yourself saying you wonder whether you just made it up or if it's ok to use...), so shouldn't they only be in the second table? But then again, what does "rare" mean anyway when we're talking about an actual verbal form and not an alternative? * I guess I'd prefer a list of "alternative forms" with their specifying what they are, instead of a full table, but I don't know really... I guess I'm not really helping, lol... Sartma (talk) 16:34, 22 June 2022 (UTC) * Thanks for your response. I agree that drawing a line is hard. The forms I've included come from a combination of the forms listed by Hoepli and Treccani, along with their notes; I figure these forms are "Italian" since these two dictionaries are generally reliable. I would use Zingarelli as well if I had access to it. The idea of the two tables is to segregate all the forms that aren't part of the modern standard language while still making note of them. * As for essente, I got rid of it from the main table for essere; now, the table says there is no present participle for essere. BTW the data for all the built-in verbs that the module knows about is now in Module:it-verb/builtin. I'm in the process of documenting how the / specs work, and the same format is used for the built-in verbs. Benwing2 (talk) 04:29, 23 June 2022 (UTC) Sorry to ping you again. I was thinking about your comment about -èbbero vs. -ébbero. If you look up ebbero in DiPI, you see ˈɛbbero, ˈe- [T ɛ, UMLR e] which indicates that DiPI thinks ébbero is "acceptable" and "rather advisable" [abbastanza consigliabile] compared with èbbero but also specifies that èbbero is used in Tuscany (T) while ébbero is used in Umbria, Marche, Lazio and Roma (UMLR). I have been taking the comma as indicating acceptable pronunciations that should be listed after the primary one, but maybe I shouldn't. DiPI also says this about all the indications: * Caratteristica unica del DiPI è quella di fornire tutte le possibili varianti di pronuncia che rientrino nella pronuncia «neutra», vale a dire quella usata dai «professionisti della voce», cioè attori, doppiatori, presentatori e annunciatori. * La prima (o, talora, unica) pronuncia indicata è quella definita «moderna», la piú consigliabile oggi, ma è sempre indicata (dopo « . ») l'eventuale pronuncia «tradizionale», quella piú consigliata in passato. Vengono fornite anche la pronuncia «accettabile» (dopo «, »), leggermente meno consigliabile (ma ugualmente utilizzabile) e quella «tollerata» (dopo « ; »), che è, però, meno consigliabile, soprattutto per un uso professionale della voce. * Si forniscono anche indicazioni per i tipi di pronuncia «trascurata» (dopo « ↓ »), da evitare in quanto segno d'ignoranza, nonché quella «intenzionale» (dopo « ↑ »), cioè l'opposto della precedente, che si può voler usare proprio per dare «sfoggio» di cultura; infine, c'è anche la pronuncia «aulica» (dopo « ↕ »), propria di certi testi letterari o arcaici. Do you think it's generally the case that "Tuscan" forms are standard while all the rest are regional? Some other similar examples: for siede ˈsjɛde, -je- [TR ɛ, UML e] ; for seggo ˈsɛɡɡo, -e- [T ɛ, ULR e/ɛ, M e] ; for partecipo parˈteʧipo, -ɛ- (no region-specific info) ; for medesimo meˈdezimo, -ɛz-; -es- [TML e/ɛ, U ɛ/e, R e] (here, things after the semicolon are "less advisable"). Thanks for any input. Benwing2 (talk) 18:17, 25 June 2022 (UTC) * @Benwing2: Sorry, I missed this! Traditional Tuscan pronunciation is generally considered "the correct one" by dictionaries, especially when it comes to open/closed vowels. Modern pronunciation, on the other end, tends to be based on a more northern pronunciation. That's why DiPI gives (northern pronunciation) as "modern pronunciation" of, and (Tuscan) as "traditional". * If it was up to me, I would only give the "modern" pronunciation + a general "alternative pronunciations" (traditional + regional), grouped together without further classifications (giving a pronunciation as "traditional" would be prescriptive anyway, so against WT:NPOV, and distinguishing by region could only be approximate, since in the next town people already open or close vowels in a different way, it would be impossible to register all of them precisely by place/region)... Sartma (talk) 14:33, 5 July 2022 (UTC) faceless metaphorical senses 2. Having or revealing no individual identity or character; anonymous. 3. Having or revealing no individuality, personality or distinctive characteristics. How are these really different? The "corporation" usex was under sense 2, but I moved it under sense 3, because a corporation isn't anonymous (every large corp has got a name), it's merely lacking personality. Should we merge? Equinox ◑ 05:18, 17 June 2022 (UTC) * In one view, it's a value judgement about intrinsic properties, in another view it's extrinsic and by definition not tangible to introspection. As that's a marked charactetistic, it differs to the effect that the other definition cannot apply. One of the definitions has premise and consequence reversed, "anonymous" being a qualified premise. I'd agree to doubt that the distinction is lexical as it amounts to circular reasoning, unless there are lexical collocations to prove the point. * As regards faceless #€@% corporations, this seems to be a conceptual blend with the frequent head- metaphores (cp. Capitan) which may be quite diverse and indeed semanticly bleached. Eg. to lose face one had to have become faced(?) in the first place. ApisAzuli (talk) 12:30, 19 June 2022 (UTC) меньше: confused and confusing? has two Adverb sections and one Adjective section. Russian Wiktionary simply says that is both, being the comparative of the adverb and the adjective. Here, however, we have an second adverb section, defining it as “under, below”, without specifying the sense, so that one could easily take it to mean “spatially below” (a sense ru.wiktionary does not mention). Is this a mistake, and should we simply scrap the second adverb section? The second adverb section was introduced in this edit on 2019-02-03 by, who normally seems highly reliable, but maybe this was a slip. PJTraill (talk) 09:44, 17 June 2022 (UTC) * I took a look at the history. The "under, below" text was there from almost the very beginning but as a synonym of "less than". Somehow in the process of editing this I gradually separated this sense from the "less than" sense, probably out of confusion. I think we should remove it and I'll do so. Benwing2 (talk) 00:39, 18 June 2022 (UTC) tokus I think that toches is the wrong primary spelling. When I starting writing this I thought tokus should be the primary spelling, but now I think there's an argument to be made for tuchus too. In any case, I didn't make any big changes myself because I'm brand new here and I'd be overturning existing consensus. Assorted evidence: * Merriam-Webster has tokus but not toches. * Collins has tokus, tuchis, and tochis but not toches. * Google books was inconclusive. It has more results for toches than tokus, but I didn't see anything relevant from either search when I glanced at the first couple of pages of results. (Most results for the former that I looked at were either a misspelling of touches or referring to the Louisiana city of Natchitoches. For the latter, almost all of them used it as a name, many in the context of the Ohio court case Railway v. Tokus) * When searched the OED (using their "quick search" option, not the advanced search of their corpus), tokus redirected me to tuchus whereas tochis just said "no dictionary entries found". * In light of the OED result, I searched Merriam-Webster and Collins for tuchus. Collins doesn't have a page but MW does, and it's better fleshed out than their tokus page to boot. Anyway, I'm not sure what to make of all this and I'm brand new here, so I was hoping some more experienced editors could sort this out. Thanks, WallAdhesion (talk) 18:52, 17 June 2022 (UTC) * Thank you for spending time doing the digging. We are probably going to support any spelling that has got a serious weight of usage (clearly we can't exist just by copying what other dictionaries say). There is something to be said regarding which entry should be the "main" one (hopefully the most common) that we redirect others to. We usually support forms that have got plausible citations (see WT:RFV): if they all look dodgy or possibly erroneous (e.g. we can only ever find foreign-looking author names) then we might drop it, or at least call it rare or non-standard. Equinox ◑ 19:04, 17 June 2022 (UTC) * I have never seen the spelling tokus. The spelling toches seems influenced by the original Yiddish spelling, which is logical, but my pronunciation is /ˈtʊxəs/ and I have never heard the primary pronunciation /ˈtɒxəs/ that we give. So I think it should be under tuchus. Benwing2 (talk) 00:44, 18 June 2022 (UTC) * @Benwing2 I think I'm also convinced it should be under tuchus. * A Google Ngram suggests that "tuchus" is the most popular lately. And when I spot-checked the first 20 recent Google Book results for "tuchus", about half were legit (most of the rest being Yiddish inside of otherwise English books). For "toches" I saw one out of twenty that looked like this usage, with the rest mostly Yiddish or Natchitoches, Louisiana. For "tokus" I think four of the first twenty I looked at were right. So the true number of each ("toches" and "tokus") seems like a smaller percentage of a smaller total. * While I'm typing about Google Book results, I'll add that when I looked at 19th century results for "toches" I saw a bunch of Natchitoches, what looked like French, and some failed OCR of the word inches, but nothing remotely relevant. So I think we can discount the older dominance of "toches" in the Ngram as noise. * @Equinox hopefully that qualifies as sufficient non-dictionary evidence. (Sufficient regarding which form is the main one, anyway — I wasn't even thinking about which alternate spellings we should support. That sounds like a whole can of worms I don't want to open.) WallAdhesion (talk) 02:02, 18 June 2022 (UTC) * ✅ This, that and the other (talk) 11:59, 24 June 2022 (UTC) white privilege Better? I'm not convinced. Equinox ◑ 19:10, 17 June 2022 (UTC) * Wikipedia's first sentence seems pretty good: * White privilege, or white skin privilege, is the societal privilege that benefits white people over non-white people in some societies, particularly if they are otherwise under the same social, political, or economic circumstances. * Benwing2 (talk) 00:47, 18 June 2022 (UTC) * (PS Sorry if I introduced any problematic wording there ; I was merely trying to restate the definition after I consulted the English Wikipedia article. I am not an expert on this subject.) --Geographyinitiative (talk) 00:54, 18 June 2022 (UTC) * That sounds like an academic definition. The normal-use definition seems more SoP to me. DCDuring (talk) 01:42, 18 June 2022 (UTC) * SoP? As in, “How come your privilege is whiter than mine?”? Academic or not, I don’t think “collective” should be part of the definition – the insidious aspect of white privilege is that when it manifests concretely, it is mostly inconspicuously, one person at a time. What about “A societal relative advantage that may benefit white-skinned persons”? I think that should suffice; the page refers upfront to the Wikipedia article. (The addition of “may” acknowledges that the presumed advantage may fail to materialize for a given individual. And “relative” underlines that this is in comparison to people of colour.) --Lambiam 12:20, 18 June 2022 (UTC) * I've removed the part about the reason, I don't think it's all too material to the definition, though interesting if anyone feels it should be added back. Leasnam (talk) 22:05, 20 June 2022 (UTC) * The definition now (after several edits) is better than the "In critical race theory, a way of conceptualizing..." definition. Dropping the reference to "colonial history" also seems like an improvement, IMO, although I'd revise "as contrasted against the advantages (or lack thereof) of non-whites of the same society" (which reads like saying non-white people have their own different, potentially separate-but-equal privileges/advantages) to something like just "relative to non-white people" or something. We certainly shouldn't reduce the definition all the way down to something uninformatively SOP like "A societal relative advantage that may benefit white-skinned persons" (where the "may" is also a weasel word). - -sche (discuss) 22:06, 21 June 2022 (UTC) What is a "cork mould"? From corking pin: A large pin used to attach a woman's headdress to a cork mould. * - What exactly is this "cork mould"? Some framework, make of cork, to maintain an elaborately-shaped headdress? Maybe some additional explanatory sentence is needed, because it's so unclear. --CopperKettle (talk) 04:31, 18 June 2022 (UTC) * Mould might be mold. DCDuring (talk) 04:46, 18 June 2022 (UTC) * This video shows a hat mold in use. DCDuring (talk) 05:06, 18 June 2022 (UTC) * Thank you! So it's the mould represending a person's head, and is made of cork. A head-shaped cork mould used by hatmakers to fit a hat on it. Maybe the definition should be somehow edited to make it clearer. --CopperKettle (talk) 05:36, 18 June 2022 (UTC) * Or add a lemma for “cork mould”, as this specific form may be hard to infer from the words “cork” and “mould”. PJTraill (talk) 12:23, 18 June 2022 (UTC) * I don't think it would be a good lemma. I don't know what these things were made of in the past, but the type that are available for sale and use in wig-making and display now consist of granular cork tightly wrapped in canvas. Hat blocks used in millinery are/were made of hardwood. I saw mention of the use of balsawood. But we are clearly deficient in our coverage of millinery vocabulary, as of the vocabulary of many crafts and engineering fields. DCDuring (talk) 14:01, 18 June 2022 (UTC) Natal robin I am interested in this bird. Can anyone share information. I will share my information with you. Thank you for reading * or Natal robin (Cossypha natalensis). DCDuring (talk) 17:41, 19 June 2022 (UTC) ඞ Could we add a translingual meaning to this explaining that it is used on the Internet to depict an Among Us crewmate? I'm sure lots of citations could be found from Twitter and the like. (Unfortunately, Citations:ඞ is protected so I am prevented from adding them myself.) <IP_ADDRESS> 01:44, 21 June 2022 (UTC) * I don't see any issue with adding this. Theknightwho (talk) 21:24, 27 June 2022 (UTC) * There's even precedent for adding "memey" senses for letters that have been reinterpreted in online use, e.g. . The only problem is that the entry and citation page are both protected so I don't know how to proceed. <IP_ADDRESS> 04:24, 20 July 2022 (UTC) * Creating an account ;-) If you like, you could make a note of those you want to add, and I can edit the pages? Theknightwho (talk) 13:14, 20 July 2022 (UTC) Shouldn't Category:en:Neo-Nazism be a subcat of Category:en:Nazism? A little while back, I added the then-newly-created Category:en:Neo-Nazism to Category:en:Nazism. The creator of the former category then reverted me, saying that (and I quote) "[t]hey're separate on purpose". However, as Neo-Nazism is a subset of Nazism, doesn't Category:en:Neo-Nazism need to be a subcategory of Category:en:Nazism? Whoop whoop pull up Bitching Betty ⚧️ Averted crashes 01:52, 21 June 2022 (UTC) * The general feeling around the creation of this was that it was sensible to separate Nazism (i.e. the historical ideology) from neo-Nazism. They're pretty different, though obviously both belong under the label fascism. Theknightwho (talk) 02:01, 21 June 2022 (UTC) * For comparison, on the English Wikipedia, "Neo-Nazism" is indeed a subcategory of "Nazism". <IP_ADDRESS> 02:51, 21 June 2022 (UTC) * I'm not seeing evidence of the 'general feeling' Theknightwho mentions; in Tea_room/2022/February I discern no consensus for having the separate category at all, and noted several problems, including that it's not possible to clearly or cleanly separate these concepts because some people and words continued being or being used by (respectively) Nazis both before and after the war. (I ignored there some sophistry from our resident Nazi editor about whether Nazism had its own terminology, because it's trivial to see that some terms are indeed primarily used by Nazis.) To the extent anyone is trying to maintain "neo-Nazism" as a segregated category, it should of course be under the general "Nazism" category. - -sche (discuss) 21:52, 21 June 2022 (UTC) * @-sche We run into similar difficulties when it comes to Category:White supremacist ideology, Category:Alt-right, Category:Fascism and so on. Neo-Nazism is a distinctive phenomenon from Nazism, and one which therefore has its own quite distinctive jargon, so I do think there is value in separating Nazi Party terminology from that which has only been used by Neo-Nazis (though obviously there is overlap). This distinction may be more apparent in English, with the former generally being German borrowings (e.g., ) and the latter generally slang or coded language (e.g. , ). * However, on reflection, I think that can still be achieved by subcategorising Neo-Nazism within Nazism. Terms can be labelled or if any kind of clarificaion on usage is necessary. This also has the dual advantage of not indulging the bad faith crap that gave rise to this discussion, too. Theknightwho (talk) 00:59, 22 June 2022 (UTC) * However, on reflection, I think that can still be achieved by subcategorising Neo-Nazism within Nazism. Terms can be labelled or if any kind of clarificaion on usage is necessary. This also has the dual advantage of not indulging the bad faith crap that gave rise to this discussion, too. Theknightwho (talk) 00:59, 22 June 2022 (UTC) * Neo-Nazis aren't Nazis, so obviously no. Also neo-romantics aren't Romantics and neo-druidism isn't druidism, etc. I imagine in a lot of cases one could replace "neo-" with "pseudo-"! Equinox ◑ 22:53, 21 June 2022 (UTC) venomous Defined as "powerful", with a sports quote (all possibly added by WF; I didn't check but he's added such things before). Is that the best way to be defining the word in that example? Are there more examples where it means "powerful"? Otherwise, it seems possible to view it as ~"spiteful". - -sche (discuss) 21:38, 21 June 2022 (UTC) * A better gloss is probably "difficult". It does seem to be in sports usage, specifically in relation to shots. Theknightwho (talk) 01:10, 22 June 2022 (UTC) * To me it is a synonym of wicked, as in He throws a wicked curveball. * MWOnline has, for wicked: "going beyond reasonable or predictable limits : of exceptional quality or degree", with a usex: throws a wicked fastball * MW has six senses of wicked to our two, including one "vicious", which most dictionaries have as a synonym or definition of venomous. Other words used to characterize shots, pitches, moves, fakes include evil, tricky, nasty. DCDuring (talk) 02:43, 22 June 2022 (UTC) buxom Someone reverted the page buxom all the way back to a 2019 revision, and then made some changes of their own. From the diff of before vs. after I don't understand their intention. Anyone want to take a closer look? Looks like some valid translations got removed at least. <IP_ADDRESS> 07:48, 22 June 2022 (UTC) * Re-reverted. Apparently they reverted to a version from before language code parameters were added to some of the templates, which caused module errors. I had added back the language codes to fix the module errors without thinking about why the codes went missing in the first place- but then I saw this. Chuck Entz (talk) 08:15, 22 June 2022 (UTC) * Our entry was essentially a copyvio of OED, so I tried to clean it up a bit. The RFC tag is still there, as it could use a final polish and perhaps merger of a couple of senses. This, that and the other (talk) 11:52, 24 June 2022 (UTC) ба (Ukrainian interjection missing) ба has an article in the Ukrainian Wiktionary, but not the English one. I can vouch for its veracity, and the article is quite extensive. (There's also a number of other languages in the Russian Wiktionary, you may take a look, too.) Adûnâi (talk) 18:37, 22 June 2022 (UTC) -ιανός ending is invented, has no attestation in standard sources Wiktionary seems to be the only dictionary that suggests that -ιανός is a dimunitive suffix. It provides only χριστιανός as an example. Smyth's Greek Grammar doesn't list it as a dimunitive suffix (section 852). Thayer's lexicon, Strong's lexicon, and Liddel and Scott's lexicons all do not mention this. I suspect this is parroting some invented "fact" from some sermon somewhere. Jemfinch (talk) 19:24, 22 June 2022 (UTC) * You seem to think is talking about an Ancient Greek suffix, but it's not. It's talking about a Modern Greek suffix. &mdash; S URJECTION / T / C / L / 19:49, 22 June 2022 (UTC) * The Modern Greek suffix is likely derived from, . Compare the etymology of . <IP_ADDRESS> 19:51, 22 June 2022 (UTC) * If this is an actual diminutive suffix in modern Greek, it still seems like the entry badly needs to be edited with further examples, since the semantic relationship between a word meaning "Christian" and a word meaning "Christ" doesn't constitute a prototypical example of a diminutive, and there is nothing currently in the entry to support the note saying bases used with this suffix are "chiefly neuter". (Looks like the entry for also needs to be cleaned up: is it the feminine form of or a separate word?)--Urszag (talk) 20:31, 22 June 2022 (UTC) * Looking into this further, the only two entries presently categorized under the suffix are and the related . But it seems possible that the former is just directly inherited from instead of being a novel formation in Modern Greek. <IP_ADDRESS> 03:45, 23 June 2022 (UTC) * The Greek Wiktionary defines this as a suffix that forms demonyms. A Καλαματιανός (Kalamatianós) is someone from . --Lambiam 20:26, 23 June 2022 (UTC) * This is consistent with the derivation via Latin's -ianus ending, which forms (micro)demonyms from proper names. Still doesn't support the diminutive claim. * And I do not consider as supporting this either (even if implausibly analyzed as a Modern Greek formation,, Christian does not mean “little Christ”), so right now we have zero support for this sense. --Lambiam 17:21, 24 June 2022 (UTC) * , I updated the lemma, +ref. No, it is not diminutive. Hellenistic Koine from Latin. Various meanings, chiefly denotes a characteristic property. Thank you &#8209;&#8209;Sarri.greek &#9835; I 19:29, 27 June 2022 (UTC) Cp. DWDS.de for imagery. Lexico and Collins know at least the "two-headed top" type of playing instrument used in juggling. * Is hourglass shaped an appropriate description? * Is hourglass shaped SoP? Feels lexical to me. Wouldn't say "hourglass form" for example. * Is the sense of ammunition of the same shape used with peashooters also understood, or what would you call it? * Is that di- "two" and bolos, cf. balistic, or maybe balanced? ApisAzuli (talk) 04:51, 23 June 2022 (UTC) * The name of the toy should be written . Sorry, I did not see this was meant to be German. Given the earlier names devil on two sticks and French Diable (in Philippart’s 1905 patent – see at Wikipedia), it is just a fanciful alteration of diablo, ultimately from, from the verb , from , which is cognate to the prefix , but not the same. -shaped means “having the shape of an ”. --Lambiam 18:01, 23 June 2022 (UTC) * But it is also two bowls, the playing instrument. Whereas the ammunition (chiefly German "Diabolo" I presume for now) is solid, we still have akin to, at least indirectly if the PIE roots are correct. That alone doesn't have a leg to stand on, of course. ApisAzuli (talk)\ die Post geht ab How can this be properly lemmatized? die Post abgehen is wrong because there Post is the object, not subject. Can subject+verb even be lemmatized? &mdash; Fytcha〈 T | L | C 〉 19:55, 23 June 2022 (UTC) * I'd say die Post geht ab is the lemma. When the idiom contains the subject of the verb, we lemmatize the whole expression, e.g., , , or even simply . —Mahāgaja · talk 20:08, 23 June 2022 (UTC) * Should we list (attestable) conjugated forms (der Appetit war beim Essen gekommen; der Appetit wird beim Essen kommen)? --Lambiam 20:42, 23 June 2022 (UTC) * In die Post abgehen there is no object since it is not a sentence, so no syntactic categorizations apply. Auf Wiktionary geht die Post ab. Ich lache, weil auf Wiktionary die Post abgeht, und auf Wikipedia bisher weniger die Post abgegangen ist. (not an object). die Post abgehen is correct since it employs the citation form of the verb—it is not an idiom as the examples of Mahāgaja: is lemmatized at the perfect because it is defective by means of fixed tense and finiteness, similar to, though one can modify it into future perfect or past perfect and build it into sentences, while and are unchangeable as complete sentences. Fay Freak (talk) 20:56, 23 June 2022 (UTC) * I see, this seems to be the precedent. * I'd say so but, one, de-conj doesn't support that from what I know and, two, the question remains whether they should be non-lemma entries or just hard redirects. * You are right that syntactic categorizations don't apply. The sense in which I meant it was that in every instantiation of this idiom (idiom here as an abstractum), die Post necessarily has to fill the subject slot of abgehen. I take it you prefer creating it at ? &mdash; Fytcha〈 T | L | C 〉 16:19, 24 June 2022 (UTC) * Just like is not a hard redirect to, so should not be a hard redirect to . It can be listed with the PoS “Phrase”, defined as “indicative pluperfect of der Appetit kommt beim Essen”. --Lambiam 17:05, 24 June 2022 (UTC) * I think we shouldn't lemmatize subject + infinitive in German. It sounds bad to my ears and goes against my native Sprachgefühl because German has subject agreement. As @Fytcha hinted above, in the phrase **, feels like an object even though abgehen is not transitive. Take the similar idiom : if we lemmatized it as **, I would perceive it as someone trying to say ("do the 'bear'" – an imaginary dance called "Bär") with the wrong article. –Austronesier (talk) 17:12, 24 June 2022 (UTC) * I'd prefer present tense etc. as default, unless in cases like in which case the perfect tense form is most commonly used. –Austronesier (talk) 17:21, 24 June 2022 (UTC) * Naja, if we nominalize it, you see that this shape does not sound that strange, disregarding that it is not written like this: »Ich schreibe diese Zeilen zum Die-Post-Abgehen.« (My next rap … Not sure by heart about the spellings of such complex nominalizations however, which are somewhat avoided but nonetheless happen, perhaps also like .) Regard also, , I recognize a systematic slant towards citations forms in me. Fay Freak (talk) 18:31, 24 June 2022 (UTC) * ? Not that strange? What do you think of ? --Lambiam 19:08, 24 June 2022 (UTC) * You what, mate? ApisAzuli (talk) 12:37, 27 June 2022 (UTC) * I mean, call me old fashioned but me thinks citation forms should be well citable. ApisAzuli (talk) 12:50, 1 July 2022 (UTC) здоро́во and здорово́ I have just undone the edit by User:A1 wiki B3 (2019-03-14T16:19:20, in which they removed the heading for the stress здорово́), to agree with the page, but I notice that ru:здоровый does not give these alternate stress patterns for the senses “big, strong”. If our is right, ru:здоровый ought to be changed, and the sequence of edits by that user (and perhaps others by them) should be reviewed. If not, then several things should be changed here. Who knows enough to deal with this? PJTraill (talk) 12:22, 24 June 2022 (UTC) * To be honest, I have never heard здорово́, but it's possible I just haven't heard it used in this specific form (short neuter isn't a very common inflection anyway). * Anyway, as always, sorry for the mass ping: . Thadh (talk) 12:30, 24 June 2022 (UTC) * I have never heard "здорово́" myself. It's neither standard or common. I would exclude it, until the existence is confirmed. There are very few Google hits but there are not solid. --Anatoli T. (обсудить/вклад) 00:16, 25 June 2022 (UTC) * The edits to здоровый look suspiciously like mine, and I looked up in Zaliznyak to see what it says there. It does mention здорова́, здорово́, здоровы́ with the meaning "сильный, большой" but labels it as "простореч.", which I seem to have missed before. That would explain why people don't think it's standard (because it's not ...). Benwing2 (talk) 02:51, 25 June 2022 (UTC) * BTW ruwikt mentions these forms and says they are colloquial in the "strong, big" meaning. Benwing2 (talk) 02:55, 25 June 2022 (UTC) * Since Zaliznyak has it, we should include it. Thanks! --Anatoli T. (обсудить/вклад) 05:46, 25 June 2022 (UTC) * I see these forms now at ru:здоровый, sorry I missed them before (they are not in the table and I did not look hard enough elsewhere); thanks for everybody’s attentions. PJTraill (talk) 22:51, 25 June 2022 (UTC) Page забирать: воро́нках from воро́нка “funnel” or вороно́к “house martin / black horse / Black Maria” On забирать, in an example воро́нках is explained as the instrumental plural of воро́нка “funnel”, but it seems clear that it should be of вороно́к “house martin / black horse / Black Maria”. If I do not hear to the contrary I may change this myself, but I thought I should first give the better informed a chance to warn me off! PJTraill (talk) 21:47, 24 June 2022 (UTC) * , a native speaker who created the entry at in 2013 with this already included. Chuck Entz (talk) 23:35, 24 June 2022 (UTC) * Thank you for bringing this up. To me regret, the stress and the link was wrong and I am sorry the error was there for so long. Fixed it now. @PJTrail is right, the lemma is at, not and it's not "funnel". --Anatoli T. (обсудить/вклад) 00:23, 25 June 2022 (UTC) etwas an den Tag legen etc. Shouldn't this just be an den Tag legen? Etwas is not part of the phrase, but just a placeholder for the grammatical object. There's quite a lot of similar lemmas:. Whether we translate etwas für bare Münze nehmen as "to take something at face value", or für bare Münze nehmen as "to take at face value", it doesn't make much of a difference, but since both German and English have the same logical argument as object, having "etwas" here is just as useless as in etwas essen "to eat something". –Austronesier (talk) 19:06, 25 June 2022 (UTC) * These should be moved if they have etwas at the start or end of the title. Moreover, this particular one should potentially even be reduced to an den Tag as there are +legen, +kommen, +bringen and potentially more that don't come to mind right now, though I'm personally not opposed to including these super common (and restricted) collocations as full articles. &mdash; Fytcha〈 T | L | C 〉 22:51, 25 June 2022 (UTC) * Yes, this is one in a long list of senseless lemmatizations copied from de.Wiktionary, as said on Talk:jemanden hellhörig machen. Fay Freak (talk) 00:08, 26 June 2022 (UTC) * others could be trimmed down to the core too, e.g. sich einen Reim auf etwas machen → einen Reim machen, parallel to erinnern (not **sich an etwas erinnern). So anything that's not part of the actual phrase but just a placeholder for arguments and adjuncts governed by the phrase should be move out of the lemma and, if helpful, moved to the label or the gloss, e.g. einen Reim machen ... [+ auf (object)]. * And agree, an den Tag is the actual lemma for etwas an den Tag legen; the verbs that most commonly combine with this phrase in the given sense can be listed in the gloss. –Austronesier (talk) 08:57, 26 June 2022 (UTC) * This is probably best solved by means of policy so that we don't have to start a discussion around every single one of these. What do you think about adding a sentence along the lines of "Lemma forms may not contain words that are placeholders for grammatical arguments (in English commonly oneself, something, someone etc.)." to WT:Lemmas and making that page binding policy? However, an exception has to be added to that clause because I don't think there's any better way to lemmatize e.g. despite it containing a placeholder. See also intitle:"oneself", intitle:"something", intitle:"someone" which is what informed the "at the start or end of the title" part of my previous comment: unlike in the case of, I can kind of see why somebody would want to use as the lemma. M-W has it at give a shot with a "(something)" being displayed in the title for comparison. &mdash; Fytcha〈 T | L | C 〉 11:13, 26 June 2022 (UTC) What is a ? We define the primary meaning of as: “The sharp cutting edge of a knife, chisel, or other tool, a razor blade/sword.” Oxford Dictionaries has a similar definition, except that there the edge is flat, not sharp. I think this is wrong. A blade has a cutting edge; it is more than its edge. (Also, a dull blade does not have a sharp cutting edge.) And I do not quite get the function of the last part: “a razor blade/sword”. (It used to be just ”a razor blade”, which I understand but is circular; perhaps there should be a separate sense “”. And blade can be used metonymically as a pars pro toto for a sword, but also for a knife; we list this separately as a poetic sense, but it can also be prozaic urban slang.) --Lambiam 10:32, 26 June 2022 (UTC) * Indeed, defining it as the edge is wrong. (If blade meant edge, it would make little sense to say a blade could have one edge or two.) I reworded it to something better but still basic; it could probably be improved further. - -sche (discuss) 08:21, 28 June 2022 (UTC) * I'd take razor blade as the prototype and go from there. It's so thin you don't see the edge (mind your folklore), and it's functionally similar to the cutting end of a knife. * Just for reference, might have similar senses, but may also be the wing of a door (ie. the door in common parlance). The sense of sword might actually relate to Frankish brand though as in, no? ApisAzuli (talk) 12:45, 27 June 2022 (UTC) * Is "razor blade" really a separate sense? I could see adding subsenses for all the things that have different translations — a sword-blade vs a razor-blade vs a skate blade, an oar-blade vs a hockey-stick's blade, etc — but is there anything special about a razor's blade that makes "razor blade" a separate sense from "The (typically sharp-edged) part of a [...] razor, or other tool with which it cuts"? - -sche (discuss) 18:12, 28 June 2022 (UTC) * The blade of a sword is part of the sword. To drop the blade of a sword you need to drop the sword. You can drop a razor blade without dropping the razor. A razor blade is (IMO) just as much part of the razor as a gun cartridge is part of the gun. A gun that takes cartridges won’t work without one, but it is still a gun. --Lambiam 23:27, 29 June 2022 (UTC) * Hmm, that's a point, but a detachable part is still a "part of a [...] razor, or other tool with which it cuts", it's only detachable on some razors (not disposable ones with built-in blades), and conversely it is also possible to have a sword blade alone without or separate from the rest of the sword, a skate blade separate from a skate (and the skate seems to remain a skate, when people say a ), etc. Hmm. What do you think of making "razor blade" a subsense of the first sense? We could also add subsenses for other kinds of blades (under sense 1 or what is currently sense 3, as appropriate); certainly, the translations seem to often differ. - -sche (discuss) 14:56, 30 June 2022 (UTC) * Handle and blade can me made from one piece more expensively, thus only relevant in the edge case. The analogy with should be most insightful. Where many etymologies like are uncertain, the allophony with intervocalic b is remarkable * Is this prosaic: "Don't push me cuz I'm close to the "? ApisAzuli (talk) 20:18, 30 June 2022 (UTC) involution Why are there verb definitions here for a noun? &mdash; S URJECTION / T / C / L / 20:13, 26 June 2022 (UTC) * Because not every editor is equally competent in English. See also . --Lambiam 22:05, 26 June 2022 (UTC) * If I had the courage, I would actually go so far as to send the verb senses to WT:RFV. As far as I know, the senses only exist in Chinese and not English. --ItMarki (talk) 14:41, 27 June 2022 (UTC) * I reworded the bottom two senses, which had been worded as verbal meanings, to instead be nominal. If these senses are in fact not present at all in the English, and instead are only found in the 🇨🇬, please do send to RFV or otherwise edit as appropriate. ‑‑ Eiríkr Útlendi │Tala við mig 08:17, 29 June 2022 (UTC) subdifferential, subderivative The former article claims to be a synonym of the latter (in the second sense), however Wikipedia draws quite a clear line: a subderivative of a convex function in a point is described as any value inclusively between the left and the right limit of the difference quotient, whereas the subdifferential is described to be the set of all subderivatives. Is this distinction also reflected by the literature? Pinging as the creator. &mdash; Fytcha〈 T | L | C 〉 23:35, 26 June 2022 (UTC) * The definition of subdifferential in the Encyclopedia of Mathematics is equivalent to our definition but does not use the term “subderivative” (also not found in other entries). The term subderivative appears variously in the literature as a one-sided limit, and as defined on Wikipedia. --Lambiam 12:59, 27 June 2022 (UTC) Swedish inhale sound meaning "yes" As described here:. How do we document this? Does it have a spelling? Equinox ◑ 19:36, 27 June 2022 (UTC) * The technical term in Swedish is "Inandnings-jo". That page lists some approximate spellings ("schu", "schoo", "schwwp", "schvuu", "schuu", "schuup", "schoup") Voltaigne (talk) 23:12, 27 June 2022 (UTC) * Sounds like a good FEOTD or FSOTD candidate, even if it doesn't qualify for FWOTD. DCDuring (talk) 23:20, 27 June 2022 (UTC) * What are you on about? It's an ingressive realization of regular words, the ingressive manner associated with "yes" in other languages as well. * "The main function of inhaled speech can be paralinguistic, showing agreement with a statement and encouraging a speaker to continue, but in northern Sweden, "Yes" can be replaced with an inhalation alone.[9]" (, note that "This article has multiple issues"). * I did not know that, but see it like this: "no" can be accompanied by a slap on the wrist, that may as well stand alone. ApisAzuli (talk) 00:15, 28 June 2022 (UTC) * I gather that the "canonical" spelling/word is still ja (that's the word that's being said, it's just being said ingressively in some cases rather than egressively) or jo, and the other spellings would be pronunciation spelling ofs. IMO we would ideally have audio and a note about this at ja (and have entries for any of the attestable pronunciation spellings). - -sche (discuss) 14:35, 30 June 2022 (UTC) * The word being said is, not , from what I've read. IPA (I believe it's possible) and audio would be good. Theknightwho (talk) 15:22, 30 June 2022 (UTC) * Something like would work I think? Theknightwho (talk) 16:09, 30 June 2022 (UTC) * Isn't it ? Thadh (talk) 16:54, 30 June 2022 (UTC) * Hmmm, I think that's too far back in the mouth, and doesn't sound right when I try it. I find an ingressive bilabial fricative the most natural way to make the noise, though it does involve pursing my lips very close to the teeth. Maybe [↗︎ʋ̥↓p̚] is more accurate. Theknightwho (talk) 21:17, 30 June 2022 (UTC) twyhyndman <IP_ADDRESS> (who has only edited that page) added a definition on 13 June, which contains misspellings and has wrong formatting, which I would fix but I do not know whether this definition is correct (the related terms and , also created by me, do not have definitions). J3133 (talk) 06:25, 29 June 2022 (UTC) * These terms seem to be nothing more than classifications of men by the amount of their wergelds: a twyhyndman is worth two hundred shillings, a sixhyndman is worth six hundred shillings, and a twelfhyndman is worth twelve hundred. "Y" is what you get when you apply i-umlaut to "u", which perhaps explains why those aren't -hund-, but that doesn't the "y" in "twy", which is from twa. Chuck Entz (talk) 07:58, 29 June 2022 (UTC) * This would seem to be, which had a variant , so would be equivalent to (not that such a form should be reconstructed, as this word is only found in Old English AFAIK. Hazarasp (parlement · werkis) 17:15, 13 July 2022 (UTC) * : You kept the definition that was added, but according to it does not seem to be correct. J3133 (talk) 05:09, 14 July 2022 (UTC) * This should be fixed now (apparently a who owned land was one of the kinds of people worth two hundred shillings in wergeld. In case anyone's wondering, non-land-owning Welshmen were worth one hundred shillings, but the corresponding term is not attested). Hazarasp (parlement · werkis) 06:55, 14 July 2022 (UTC) deidentify vs. anonymize IP <IP_ADDRESS> has just added some notes on the difference, but has dropped them into the middle of the entry, stating that the entry is wrong! It would be nice if this material could be incorporated properly. Equinox ◑ 11:51, 29 June 2022 (UTC) * I think it's apparent IP isn't going to clean it up. I'd say it's fairly safe we could RFV... that somehow asking for cites, otherwise remove it. Vininn126 (talk) 08:39, 30 June 2022 (UTC) * I don't know that RFV would help much; it's easy to find uses of the word that speak of "deidentifying or anonymizing" data. The complaint, as I understand it, is over whether there is a subtle technical difference in how recoverable the identities are, but I think the IP is prescribing an ideal distinction which real-world examples fall short of; anonymization (or, a process which people use the words "anonymize" and "anonymization" to denote) may also be done imperfectly or even (intentionally) only nominally, in such a way that identities can be recovered. - -sche (discuss) 14:20, 30 June 2022 (UTC) loaf and unloaf as verbs I saw this here recently and have been wondering if these terms can be attested. Acolyte of Ice (talk) 12:55, 29 June 2022 (UTC) * Context, since videos often get deleted: the title is "Cat Loafs And Unloafs Whilst Purring", the description says "Tango loafs waiting for his food then jumps up as soon as he sees his food", and it's a video of a catloaf. Equinox ◑ 13:01, 29 June 2022 (UTC) * To RfV. DCDuring (talk) 18:48, 11 January 2024 (UTC) Names of national anthems See User talk:<IP_ADDRESS>. This user started adding various national anthem titles on the grounds that we already had some! Should we have any of them? We wouldn't usually include song titles. We do have a few book titles (Snow White etc.) which I also disagree with... Anyway, thoughts on anthems specifically? Equinox ◑ 00:56, 30 June 2022 (UTC) * I don't think we should have ones that aren't words, like Advance Australia Fair (which the user readded despite previous deletions) or Poland is Not Yet Lost. Single-word ones like Deutschlandlied (which I created) or Hatikvah (which you did) feel more includable. I would delete the 'a fairy tale...' sense of Snow White, too, and let the sense for the character house the info about her getting poisoned and living with dwarfs... - -sche (discuss) 14:28, 30 June 2022 (UTC) Переносный: quote from Tolstoy not in Wikipedia At I added the sense “bearable” and a supporting quote from Tolstoy from ru:переносный, but now I see that the work quoted, «Христианское учение» is not mentioned in the Russian Wikipedia article. Can anyone help verify this reference? (I left the quote in the page, as it seemed much more likely to be a confusion than a fiction.) PJTraill (talk) 14:26, 30 June 2022 (UTC) * It is listed on Wikipedia in the section ; the year is given though as 1898, not 1896. This page writes that the treatise was published in 1896. The full text can be found here (where the year is given as 1895), and the quotation in snippet view on Google books here, here, and here. --Lambiam 17:47, 30 June 2022 (UTC) * Thanks, not sure why I missed that on Wikipedia, though I looked for it on Russian Wikipedia, where I could not find it by looking for “Христиан”; I thought perhaps it was a part of something else. Anyway, the main thing is that it is clearly genuine — but is “The Grate Sin” in that same section (“Untranslated”) the typo it appears to be? PJTraill (talk) 21:33, 30 June 2022 (UTC) length of iota in ἰθύς The page for ἰθύς doesn't mark the iota as long or short and has a comment ; however, of the dictionaries it links to, Liddell & Scott, Bailly, and Cunliffe (I checked the Internet Archive's version, since your link requires a login) say that the iota is long (Edit: so does Brill's Etymological Dictionary of Greek). (Autenrieth's Homeric dictionary doesn't give a vowel quantity, even in a version without the typo in Perseus's version of it.) I looked up a few occurrences of the word in epic poetry and found only occurrences where the meter seems to require it to have a long iota, e.g. Iliad 24.471 "ἵππους ἡμιόνους τε· γέρων δ’ ἰθὺς κίεν οἴκου" (where the meter, if I am reading it right, is --|-uu|-uu|--|-uu|-- in the notation used at w:Dactylic hexameter) and Argonautica 1.1032 "ἀλλὰ μιν Αἰσονίδης τετραμμένον ἰθὺς ἑοῖο" (-uu|-uu|--|-uu|-uu|-u) and 2.100 "ἰθὺς ἀνασχόμενοι Πολυδεύκεος ἀντιάασκον" (-uu|-uu|-uu|-uu|-uu|-u). Is this sufficient to mark the iota as long? If not, what additional evidence would be required, or what contrary evidence prompted the original uncertainty? - LaetusStudiis (talk) 19:17, 30 June 2022 (UTC) Russian на: 2nd neologism with prepositional well-attested? In we have these senses: Russian Wiktionary does not distinguish the latter sense, which was added, with usage examples in this edit by User:Arzet Ro with the comment “I’ve spent 5 hours doing this”. It sounds a little artificial to me — is this an accepted and significantly different sense? I also feel that the definition and translation could be a little more idiomatic, maybe something like “You see, my son didn’t really mean to throw your new TV out of the window … it’s just that when he caught her cheating on him” (is that meant?) “he was in such a state (emotionally), that he had had to let off steam, and your TV was simply the first thing that came to hand.” But it seems an awful lot for “на эмо́циях” to mean! PJTraill (talk) 21:21, 30 June 2022 (UTC) * (neologism) being dominated by a certain emotional state * (neologism) accomplishing something while being dominated by a certain emotional state and primarily because of it * Понима́ете ли, сын мой ваш но́вый телеви́зор вы́кинул в окно́ (из окна́) не специа́льно… про́сто он был на эмо́циях по́сле того́, как заста́л её, а те́лик — он про́сто пе́рвое, что ему́ подверну́лось. * You see, my son threw your new TV set out of the window unintentionally… it's just that he had such an outburst of emotions after having caught her, that he had had to do something, and the first thing that crossed his mind was your new TV set. * You see, my son threw your new TV set out of the window unintentionally… it's just that he had such an outburst of emotions after having caught her, that he had had to do something, and the first thing that crossed his mind was your new TV set.
WIKI
1918 Purdue Boilermakers football team The 1918 Purdue Boilermakers football team was an American football team that represented Purdue University during the 1918 Big Ten Conference football season. In their first season under head coach A. G. Scanlon, the Boilermakers compiled a 3–3 record, finished in a tie for first place in the Big Ten Conference with a 1–0 record against conference opponents, and outscored opponents by a total of 87 to 78. Pre-season On September 10, 1918, Purdue's athletic director O. F. Cutts announced that Cleo A. O'Donnell was at his home in Boston and would probably not return as the school's head football coach. Cutts stated that assistant coach Butch Scanlon would take change of the team when students reported. Game summaries On October 26, 1918, Purdue was upset by DePauw, 9–7, in Lafayette, Indiana. The DePauw team was delayed by a freight wreck that blocked the railroad near Roachdale, with the players traveling the remaining 45 miles in automobiles. The game began at 5 p.m. and was played in shortened quarters. DePauw threw a touchdown pass for the victory with minutes to play in the "gathering darkness." On November 2, 1918, Purdue defeated Chicago, 7–3, at Lafayette, Indiana. The Purdue victory broke a 20-game losing streak against Chicago dating back to 1898. According to a newspaper account, Chicago's coach Stagg "used everything at his command to put a winning score across, but the plucky Purdue men foiled him." On November 9, 1918, Purdue defeated Michigan Agricultural, 14–6, in Lansing, Michigan. Purdue scored twice in the second quarter, both times on interceptions returned for touchdowns. On November 16, 1918, Purdue defeated Wabash, 53–6, at Washington Park in Indianapolis. On November 23, 1918, Notre Dame defeated Purdue, 26-6, before a crowd of 7,000 at Stuart Field in Lafayette, Indiana. On November 30, 1918, the Great Lakes Navy defeated Purdue, 27–0, at Northwestern Field in Evanston, Illinois. Great Lakes led, 6–0, at halftime, but scored 21 points in the third quarter to extend its lead. The 1918 Great Lakes Navy Bluejackets compiled a 3–0–1 record against Big Ten opponents, went on to win the 1919 Rose Bowl, and featured three players (George Halas, Jimmy Conzelman, and Paddy Driscoll) who were later inducted into the Pro Football Hall of Fame.
WIKI
Exclusive: Venezuela's oil imports slump on payment woes, economic meltdown HOUSTON (Reuters) - Venezuela has not been able to import all the crude and fuel it needs this year to cover shortfalls at oilfields and refineries as state-run PDVSA struggles to pay suppliers on time, according to trade sources and internal company data seen exclusively by Reuters. The decline is the largest in five years as the worst economic crisis in decades undermines PDVSA’s ability to buy oil imports, which fell 21 percent in the first seven months of this year to 154,465 barrels per day (bpd), the data showed. Venezuela is also on track to suffer its steepest annual oil output drop in 14 years after years of state mismanagement and under investment. Risk-averse suppliers are refusing to discharge cargoes to cash-strapped PDVSA without being paid first, unusual in an industry in which buyers normally have 30 to 60 days to pay after delivery. Others have stopped dealing with PDVSA entirely as it resorts to bartering its own oil in swap deals, according to traders and a company source who was not authorized to speak publicly. “We have no more access to purchases under any type of credit. We are importing under two mechanisms: prepayment and swap,” said the source, who did not want to be identified. PDVSA’s oil import needs started growing in 2012 after a severe explosion hit its largest refining complex, Paraguana. Output since then has been hobbled. Despite having the world’s largest crude reserves, Venezuela’s purchases grew further in 2015 as a decline in crude production forced the company to carry out regular imports of lighter crudes and naphtha to dilute its extra heavy oil into exportable grades. But in 2016 the trend of rising imports has been upended as PDVSA grapples with a cash crunch that has also raised risk premiums on its debt bonds. PDVSA, which does not regularly disclose figures on imports, did not answer a request for comment. A 10 percent decline in domestic demand for gasoline and diesel, reported by the country’s fuel retailers, has partially mitigated the need for imports. In 2016, PDVSA’s base of suppliers has fallen to 13 from 19 in 2015, the data show, as sellers grow skittish. Shipments received this year have come from Royal Dutch Shell, Reliance Industries, Total, ENI, Helsinge, Gunvor, Lukoil, Rosneft, BP, PetroChina, ChinaOil, Citizens Resources and PDVSA’s unit Citgo Petroleum, the company data say. Some providers, including Reliance, Lukoil and Rosneft, have accepted swap deals, picking up Venezuelan oil in exchange for refined products, according to the data. Swaps appear to be going more smoothly than cash purchases. Two tankers carrying some 1.5 million barrels of U.S. light crude sold by BP have been anchored for more than two months around PDVSA’s terminal in the island of Curacao, waiting for payments before discharging, according to trade sources and Thomson Reuters vessel tracking data. Those delayed tankers are the last in a group of 12 that were discharged after facing long holdups. The payment issues have driven a 34 percent decline this year to 51,350 bpd in imports of naphtha PDVSA uses as a diluent. That has contributed to a 5 percent drop in crude exports to 1.42 million bpd, the internal data showed. Excluding a few specialty components such as alkylate that Venezuela has always imported to formulate finished fuels, most products received this year have been bought to cover deficiencies in refining output. At the end of June, PDVSA’s Paraguana refining center was working at around half of its capacity of 955,000 bpd, according to an internal report quoted by union representatives. Products such as catalytic naphtha, ultra-low sulfur diesel (ULSD), gasoil for power generation, gasoline blend stock and base oils have been imported by PDVSA in 27 cargoes this year, mostly bought on the open market. The only fuel to see a rise in imports this year was liquefied petroleum gas (LPG), used as cooking gas in Venezuela. PDVSA has bought 38 cargoes of it from PetroChina. In the past, its refineries were able to fully cover domestic needs for these fuels. Even after being increased this year, Venezuela’s retail fuel prices are the lowest in the world and are subsidized by PDVSA. Reporting by Marianna Parraga; Editing by Terry Wade and Andrew Hay
NEWS-MULTISOURCE
Kinistin Chief Kinistin (c. 1850–c. 1920) was an Ojibway councilor (headman) of Chief Ošāwaškokwanēpi (Yellow-quill). Background "Kinistin" or Kiništin (meaning "Cree") came to Saskatchewan from Western Ontario along with his two brothers, Miskokwanep ("Red [Crow-]Feather") and Mehcihcākanihs ("Coyote"). Chief Kinistin possibly participated in the 1869-1870 Red River Rebellion. Exodus into Saskatchewan During the Treaty 1 negotiations, Yellow Quill and Kinistin agreed to the treaty terms but a dispute arose among the Plains Ojibway of southern Manitoba which led Yellow Quill and other Ojibway chiefs including Kinistin, to commence an exodus into Saskatchewan in the 1870s. They settled in the Qu'Appelle River valley. An agreement to observe to Treaty 4 was signed on August 24, 1876, at Fort Pelly, which established the Nut Lake Band. Further exodus to the north During the 1880s, amid unrest among the Plains Ojibway over whether to maintain traditional way of life, Kinistin broke from Yellow Quill and camped in the parkland of the Barrier River district. Uprooting his people again in 1885 to avoid the North-West Rebellion, he moved north into the caribou country of the. After searching for good hunting grounds not claimed by other larger tribes, Kinistin and his people resided in the Pasquia Hills of northeastern Saskatchewan, well north of what is now Prince Albert and Flin Flon, Manitoba. Following Riel’Denes defeat, Kinistin returned to Barrier River to choose a reserve. In February 1890 he sent for Reginald Beatty, extracting a promise to aid him in securing a reserve along the Barrier River/ The two secured reserve areas that became the base for the present Kinistin Saulteaux Nation in 1900. Descendants The Ojibway descendants of Kinistin's subjects live on the Hatchet Lake First Nation, Lac La Ronge First Nation, and the Peter Ballantyne First Nation of Manitoba and the Barren Lands First Nation, Mathias Colomb First Nation, Marcel Colomb First Nation, and the Northlands First Nation of Manitoba.
WIKI
Sania Sultana Liza Sania Sultana Liza is a Bangladeshi singer. Her songs has been featured in different albums and films. She was the winner of the musical reality show Close Up-1 at NTV in 2008. She served as the chief judge in the reality show, RTV's Young Star Season 2, 2023 themed Gola Chhere Gao. Background and career Liza took up singing lessons at the age of seven, her first teacher was M A Hye who taught her the basics. Afterwards she learned lessons from Anwar Hossain Anu, a teacher of Mymensingh Shilpakala Academy. He taught her classical and modern songs. Her participation in the media started in 2004 through performing in the Notun Kuri Competition at Bangladesh Television. She passed SSC in 2008 from Gouripur Pilot Girls High School from commerce group. She passed HSC in 2010 from Shahid Syed Nazrul Islam College, Mymensingh. She completed her BBA from Daffodil International University in 2015. Liza participated in music and sports at high school and during brief periods at college in Mymensingh and later around the world. In 2004, she achieved the position of "Runner-Up" in Badminton of Jatiyo Shishu Kriya Protijogita based on age. She was the "Champion" in Badminton based on age of Jatiyo Shishu Kriya Protijogita in greater Mymensingh district for 06 years (2005-2010). She also got "Silver Medal" in Hamdth – Nath competition based on age which is arranged by Islamic Foundation Bangladesh in 2006. She has received the "Gold Medal" in the National Music Competition and Jatiyo Shishu Polli Geeti Competition in 2006. Close Up-1 In 2008, the third talent hunt organised by Closeup1 was held. The contest began in June and around 86,000 contestants were selected in the primary rounds from all over the country. From them 541 got the opportunity to take part in the main contest. At the third selection 115 were selected. From the 115, 42 were singled out. From 42 only the top 16 were chosen. Liza was the winner of Close Up-1. On December 17 the grand finale of “CloseUp1: Tomakei Khujchhey Bangladesh 2008” was held. The winner was selected based on a point system that included both marks given by the judges and public votes (through SMS). As the winner, Liza received Tk 10 lakh and a car. Music career In 2008, Liza won the musical talent hunt Close Up-1. Liza's first solo album, Tausif ft Liza Part 1, was released on 12 July 2012. Her second solo album, Pagli Suraiya was released on 17 July 2015. Liza also did Playback in over 50 Bangladeshi Films. She has sung in over 50 mixed album. She is the first Bangladeshi female singer that her music video on aired on UK-based Bollywood music channel B4U Music. Liza is also a TV host in Bangladesh. She has hosted over 10 regular TV shows about music on Bangladeshi satellite TV channels. Liza take on the role of chief judge in the reality show, RTV's 'Young Star Season 2, 2023' themed 'Gola Chhere Gao. Personal life Liza is married to Shobuj Khandakar, a Bangladeshi businessman residing in the United States, since December 2022. She gave birth to a daughter in New York on 18 March 2024. Filmography * Eito Bhalobasha (2012) * O Amar Desher Mati (2012) * Taarkata (2014) * Cheleti Abol Tabol Meyeti Pagol Pagol (2015) * Bhola To Jay Na Tare (2015) * Aina Shundory (2015) * Sultana Bibiana (2017) * Gohin Baluchor (2017) * Abbas (2019) * Joy Nogorer Jomidar (2020) * Shoshurbari Zindabad 2 (2022) * Adom (2023) * Briddhashram (2023) Awards * 2008- Close Up-1(Champion) * 2014- AJFB Awards (Best Singer Female) * 2015- Dallywood Awards (Best Singer Female) * 2022- Star Plus Communication Awards (Best Singer Female)
WIKI
Log Entries INFO300 User Id: mstormo          Date: 2017-11-13 Date/TimeLogActionFileFlag 2017-11-13 16:54:07SessionsPassword Accepted 2017-11-13 19:31:53SessionsClosed Session Bash Commands: 2017-11-13 16:54:12 cd Outlines 2017-11-13 16:54:17 ls -la 2017-11-13 16:54:22 vi Brief1 2017-11-13 19:08:29 cat Brief1 2017-11-13 19:10:08 ls -la 2017-11-13 19:10:20 cd .. 2017-11-13 19:10:24 ls -la 2017-11-13 19:28:29 cd Outlines 2017-11-13 19:28:33 Brief1 2017-11-13 19:28:47 cat Brief1 2017-11-13 19:29:34 vi Brief1 2017-11-13 19:30:02 cat Brief1 2017-11-13 19:31:53 exit
ESSENTIALAI-STEM
spacer Skip to content Supported NPM Scripts As you likely are aware you can embed scripts within package.json. Using this capability coupled with the knowledge that pretty much all of the tools we use now support code files (.js/.ts) as configuration we have removed gulp from our tooling and now execute our various actions via scripts. This is not a knock on gulp, it remains a great tool, rather an opportunity for us to remove some dependencies. This article outlines the current scripts we've implemented and how to use them, with available options and examples. Start Executes the serve command npm start Serve Starts a debugging server serving a bundled script with ./debug/serve/main.ts as the entry point. This allows you to run tests and debug code running within the context of a webpage rather than node. npm run serve Test Runs the tests and coverage for the library. More details on setting up MSAL for node. Options There are several options you can provide to the test command. All of these need to be separated using a "--" double hyphen so they are passed to the spawned sub-commands. Test a Single Package --package or -p This option will only run the tests associated with the package you specify. The values are the folder names within the ./packages directory. # run only sp tests npm test -- -p sp # run only logging tests npm test -- -package logging Run a Single Test File --single or --s You can also run a specific file with a package. This option must be used with the single package option as you are essentially specifying the folder and file. This option uses either the flags. # run only sp web tests npm test -- -p sp -s web # run only graph groups tests npm test -- -package graph -single groups Specify a Site --site By default every time you run the tests a new sub-site is created below the site specified in your settings file. You can choose to reuse a site for testing, which saves time when re-running a set of tests frequently. Testing content is not deleted after tests, so if you need to inspect the created content from testing you may wish to forgo this option. This option can be used with any or none of the other testing options. # run only sp web tests with a certain site npm test -- -p sp -s web --site https://some.site.com/sites/dev Cleanup --cleanup If you include this flag the testing web will be deleted once tests are complete. Useful for local testing where you do not need to inspect the web once the tests are complete. Works with any of the other options, be careful when specifying a web using --site as it will be deleted. # clean up our testing site npm test -- --cleanup Logging --logging If you include this flag a console logger will be subscribed and the log level will be set to Info. This will provide console output for all the requests being made during testing. This flag is compatible with all other flags - however unless you are trying to debug a specific test this will produce a lot of chatty output. # enable logging during testing npm test -- --logging You can also optionally set a log level of error, warning, info, or verbose: # enable logging during testing in verbose (lots of info) npm test -- --logging verbose # enable logging during testing in error npm test -- --logging error spVerbose --spverbose This flag will enable "verbose" OData mode for SharePoint tests. This flag is compatible with other flags. npm test -- --spverbose build Invokes the pnpbuild cli to transpile the TypeScript into JavaScript. All behavior is controlled via the tsconfig.json in the root of the project and sub folders as needed. npm run build package Invokes the pnpbuild cli to create the package directories under the dist folder. This will allow you to see exactly what will end up in the npm packages once they are published. npm run package lint Runs the linter. npm run lint clean Removes any generated folders from the working directory. npm run clean
ESSENTIALAI-STEM
Talk:Lucida (star) This page is redundant. It links to Alpha Monocerotis, but Alpha Mon has no name. The word "lucida" simply refers to the brightest star in a constellation. Hence this link is based on a misunderstanding. Skeptic2 (talk) 22:48, 22 September 2008 (UTC)
WIKI
During Science, we have been exploring . We went outside to create the Earth, Moon and Sun. Independently in groups, we thought about size and movement and had to create a mime to show what was happening. Looking at the picture: Why is Vinnie on his own to be the moon? What is he doing and how long does it take? Would Seany’s side of the Earth be day or night? Why? Seany’s group is doing two things at once – why? What is the correct use of vocabulary to explain what Seany’s group is doing? How long does it take to do both things? Liam is in a group of 4. This is the biggest group – why? What are they doing and why?
FINEWEB-EDU
Sat. Dec 2nd, 2023 React Native has revolutionized mobile app development by allowing developers to create cross-platform applications from a single codebase. Because of its vast community and extensive component library, React Native has become a go-to framework for many react native app development company developers. However, as applications become more complex, performance becomes increasingly crucial. To solve this concern, Facebook introduced React Native Hermes, a new version with enhanced performance. However, before we begin, you should know the latest features and improvements in the React native version. Here are some of the most recent features and enhancements in React Native versions: • Hermes: Hermes is a new JavaScript engine designed to improve the performance of React Native applications. Despite the fact that it is still in development, it has already shown significant gains in startup time, programme size, and memory utilisation. • New Architecture: React Native’s new architecture is meant to improve performance and make it easier to construct complex apps. The new architecture, built on the React Hooks API, allows for more declarative coding. • New APIs: A number of new APIs in React Native make it easier to construct native-looking apps. These APIs include new elements, styling options, and APIs for interfacing with native APIs. • Tooling Improvements: Recent releases have improved the React Native toolset. This version enhances the testing framework, debugger, and development server. You just read the latest features and improvements in the React native version. You must be thinking about what react native hermes is and how fast hermes is. What is React Native Hermes? Native React React Native Hermes is a JavaScript engine created specifically for React Native applications. It is designed to reduce startup times, require less memory, and provide customers with a more dependable and seamless experience. React Native Hermes replaces React Native’s built-in JavaScript engine (JavaScriptCore) with its fast and effective engine. React Native Hermes can assist react native app development company developers with creating React Native applications that have faster startup times, less memory usage, and faster UI interactions. How Fast is Hermes? React Native Hermes is well-known for its speed and efficiency. It can achieve quicker JavaScript execution by leveraging AOT compilation and static type analysis, enhancing overall speed. Hermes’ actual performance can vary based on a number of factors, including the application’s complexity, device requirements, and unique optimisations provided by the developer. However, as compared to the default JavaScript Core engine, Hermes allows React Native applications to start up faster and give smoother user experiences. You must be thinking about the features of react native hermes and their benefits. React Native Hermes’ Key Features • Faster Startup Time: One of the key characteristics of React Native Hermes is its ability to reduce application startup time dramatically. Hermes uses ahead-of-time (AOT) compilation during construction to convert JavaScript code into highly efficient bytecode. As a result, JavaScriptCore no longer necessitates the standard Just-in-Time (JIT) compilation. As a result, the software launches faster, providing consumers with a more responsive experience. • Memory Usage is Reduced: Mobile devices frequently have limited resources, especially memory. React Native Hermes uses a more efficient garbage collection approach to reduce memory consumption. It employs a compacting garbage collector to reorganize memory, reduce fragmentation, and increase overall memory utilization. Hermes lets apps operate smoothly, even on low-end devices, by minimizing the memory footprint. • Smoother UI Interactions: Developers may expect smoother and more consistent user interface (UI) interactions with React Native Hermes. Because of the enhanced JavaScript engine, UI updates and animations are executed more efficiently, resulting in a better user experience. This is especially useful for sophisticated apps with many UI components or animations. • Improved JavaScript Execution: Hermes uses static type analysis to optimize JavaScript execution. Specific performance optimizations are conceivable that are not possible with the typical JIT compilation approach. As a result, JavaScript execution is faster, improving the overall speed of React Native applications.   The Advantages of React Native Hermes • Improved User Experience: React Native Hermes improves the user experience by lowering startup time and memory usage. Hermes-based applications start up faster and respond to user inputs more quickly, increasing user engagement and satisfaction. • Improved Performance on Low-End Devices: Low-end mobile devices sometimes struggle to perform resource-intensive applications. React Native Hermes was created expressly to address this issue. Hermes ensures smooth performance even on low-end smartphones by decreasing memory usage and optimizing JavaScript execution, broadening the possible user base for React Native apps. • Increased Development Efficiency: Instead of focusing on performance optimization, developers can generate features and functionality with React Native Hermes. Because of the improved performance, react native app development company developers may spend more time boosting the value of their applications and less on refining performance. • Compatibility and ease of integration: React Native Hermes is fully compatible with current React Native projects. It may be simply integrated into new or existing schemes, enabling hassle-free performance improvement without requiring large code modifications.   It is crucial to note that the actual performance increases obtained using Hermes may vary based on factors such as the complexity of the program, device specs, and specific optimizations done by the developer. Benchmarking and testing the application in various settings is recommended to evaluate the performance improvements brought forth by Hermes. Conclusion React Native Hermes is a game changer for developers trying to boost the performance of their React Native applications. Hermes provides developers with the tools they need to create high-performing apps that offer a better user experience by emphasising faster startup times, lower memory utilization, and improved JavaScript performance. The efficient resource consumption and increased UI interactions of React Native Hermes benefit both developers and users. Hermes should be considered for any React Native project seeking excellent performance due to its compatibility and ease of integration.   Finally, with its Hermes engine and AOT compilation capabilities, React Native Hermes provides a powerful solution for improving the performance of React Native applications, delivering faster startup times, lower memory usage, and smoother user interactions. Developers can read blogs and resources to learn more about Hermes’s benefits and implementation details in React Native projects. If you are, Consider making your mobile app. If so, an  Android app development company can help you. Leave a Reply Your email address will not be published. Required fields are marked * Comment Rules • Please show respect to the opinions of others no matter how seemingly far-fetched. • Abusive, foul language, and/or divisive comments may be deleted without notice. • Each blog member is allowed limited comments, as displayed above the comment box. • Comments must be limited to the number of words displayed above the comment box. • Please limit one comment after any comment posted per post.
ESSENTIALAI-STEM
Google Chrome shortcut keys Below is a listing of all the major shortcut keys used with the Google Chrome Internet browser. See the computer shortcuts page if you are looking for shortcut keys used in other programs. Shortcut KeysDescription Alt+HomeOpen your homepage. Alt+Left ArrowBack a page. Alt+Right ArrowForward a page. F11Display the current website in full-screen mode. Pressing F11 again will exit this mode. EscStop page or download from loading. Ctrl+(- or +)Zoom in or out of a page, „-” will zoom out and „+” will zoom in. Ctrl+1-8Pressing Ctrl and any number 1 through 8 will move to the corresponding tab in your tab bar. Ctrl+9Switch to last tab. Ctrl+0Reset browser zoom to default. Ctrl+EnterThis combination is used to quickly complete an address. For example, type „computerhope” in the address bar and press Ctrl+Enter to get https://www.computerhope.com. Ctrl+Shift+DelOpen the Clear browsing data window to quickly clear private data. Ctrl+Shift+BToggle the bookmarks bar between hidden and shown. Ctrl+ASelect everything on a page. Ctrl+DAdd a bookmark for the page currently opened. Ctrl+FOpen the „find” bar to search text on the current page. Ctrl+OOpen a file in the browser. Ctrl+Shift+OOpen the Bookmark manager. Ctrl+HOpen browser history in a new tab. Ctrl+JDisplay the downloads window. Ctrl+K or Ctrl+EMoves your text cursor to the omnibox so that you can begin typing your search query and perform a Google search. Ctrl+LMove the cursor to the browser address bar and highlight everything in it. Ctrl+NOpen New browser window. Ctrl+Shift+NOpen a new window in incognito (private) mode Ctrl+PPrint current page or frame Ctrl+R or F5Refresh the current page or frame. Ctrl+SOpens the Save As window to save the current page. Ctrl+TOpens a new tab Ctrl+UView a web page’s source code Ctrl+WCloses the currently selected tab. Ctrl+Shift+WCloses the currently selected window. Ctrl+Shift+TThis combination reopens the last tab you’ve closed. If you’ve closed multiple tabs you can press this shortcut key multiple times to restore each of the closed tabs. Ctrl+TabMoves through each of the open tabs going to the right. Ctrl+Shift+TabMoves through each of the open tabs going to the left. Ctrl+Left-clickOpen a link in a new tab in the background. Ctrl+Shift Left-clickOpen a link in a new tab and switch to the new tab. Ctrl+Page DownOpen the browser tab to the right. Ctrl+Page UpOpen the browser tab to the left. SpacebarMoves down a page at a time. Shift+SpacebarMoves up a page at a time. HomeGo to top of page. EndGo to bottom of page. Alt+Down ArrowDisplay all previous text entered in a text box and available options on a drop-down menu. Share Button
ESSENTIALAI-STEM
The Celtic people had a deep appreciation for nature and their local environment. Like many ancient societies, they believed that the natural world was surrounded by spiritual energy and that every part of nature had its own significance and meaning. Among the many things they held in high esteem were flowers. Some flowers had important symbolic and spiritual significance and could therefore be regarded as a Celtic Flower. One of the most important flowers in Celtic culture was the shamrock. The shamrock, which is a small, three-leafed clover, was revered by the Celts for its association with the number three. The Celts believed that the number three had powerful symbolic significance. It represented unity, harmony, and balance. They also believed that the shamrock was a symbol of the triple goddess, which represented the feminine aspects of the divine. The triple goddess was often depicted as a maiden, a mother, and a crone, and the shamrock was seen as a symbol of these three aspects of the goddess. The triquetra or trinity knot was another important symbol in Celtic beliefs. This symbol also had three sides. Another flower that was highly valued in Celtic culture was the daffodil. The daffodil was seen as a symbol of renewal and rebirth, as it was one of the first flowers to bloom in the spring in the Celtic Isles. The Celts believed that the daffodil had the power to bring new life and vitality to a person’s spirit, and they often gave these flowers as gifts to celebrate the arrival of spring. Scottish Celtic Flower – Thistle The thistle was another flower that was highly regarded in Celtic culture. It was a symbol of strength and resilience, as it was a hardy plant that could survive in harsh conditions. They saw the thistle as a symbol of their own tenacity and strength in the face of adversity, and they often used the image of the thistle in their art and mythology. Today, the thistle is the national flower of Scotland, another Celtic nation. Flowers and Celtic Knots One of the most iconic images associated with Celtic culture is the Celtic knot, which is a complex interlacing pattern that represents the interconnectedness of all things. Flowers were often incorporated into Celtic knots, and the resulting designs were seen as powerful symbols of the interconnectedness of all living things.
FINEWEB-EDU
Oxford University (UK Parliament constituency) Oxford University was a university constituency electing two members to the British House of Commons, from 1603 to 1950. The last two members to represent Oxford University when it was abolished were A. P. Herbert and Arthur Salter. Boundaries, electorate and electoral system This university constituency was created by a Royal Charter of 1603. It was abolished in 1950 by the Representation of the People Act 1948. The constituency was not a physical area. Its electorate consisted of the graduates of the University of Oxford. Before 1918 the franchise was restricted to male graduates with a Doctorate or MA degree. Namier and Brooke estimated the number of electors as about 500 in the 1754–1790 period; by 1910, it had risen to 6,500. Following the reforms of 1918, the franchise encompassed all graduates who paid a fee of £1 to join the register. This included around 400 women who had passed examinations which would have entitled them to a degree if they were male. The constituency returned two Members of Parliament. From 1918, the MPs were elected by the single transferable vote method of proportional representation. History The university strongly supported the old Tory cause in the 18th century. The original party system endured long after it had become meaningless in almost every other constituency. After the Hanoverian succession to the British throne the Whigs became dominant in the politics of Cambridge University, the other university represented in Parliament, by using a royal prerogative power to confer doctorates. That power did not exist at Oxford, so the major part of the university electorate remained Tory (and in the first half of the 18th century sometimes Jacobite) in sympathy. The university also valued its independence from government. In a rare contested general election in 1768 the two candidates with administration ties were defeated. In the 19th century the university continued to support the right, almost always returning Tory, Conservative or Liberal Unionist candidates. The only exception was William Ewart Gladstone, formerly "the rising hope of the stern unbending Tories". He first represented the university as a Peelite, supporting a former member for the constituency – the sometime Conservative Prime Minister Sir Robert Peel. Gladstone retained his seat as a Liberal, for a time after 1859. Following Gladstone's defeat, in 1865, subsequent Liberal candidates were rare and they were never successful in winning a seat. Even after the introduction of proportional representation, in 1918, both members continued to be Conservatives until 1935. Independent members were elected in the last phase of university elections to Parliament, before the constituency was abolished in 1950. Members of Parliament Sir William Whitelock is named by Rayment as "Sir William Whitelocke" and by Sedgwick as "Sir William Whitlock". The Roman numerals in brackets after the names of the two members called William Bromley (who were father and son) are included to distinguish them. It is not a method which would have been used by the men themselves. * Constituency created (1603) Parliament of England 1604–1707 As there were sometimes significant gaps between Parliaments held in this period, the dates of first assembly and dissolution are given. Where the name of the member has not yet been ascertained, the entry unknown is entered in the table. Notes:- * a Date of Pride's Purge, which converted the Long Parliament into the Rump Parliament. * b Date when Oliver Cromwell dissolved the Rump Parliament by force. * c Date when the members of the nominated or Barebones Parliament were selected. The university was not represented in this body. * d Date when the members of the First Protectorate Parliament were elected. The university was represented by one member in this body. * e Date when the members of the Second Protectorate Parliament were elected. The university was represented by one member in this body. * f The Rump Parliament was recalled and subsequently Pride's Purge was reversed, allowing the full Long Parliament to meet until it agreed to dissolve itself. * g Clarges died on 4 October 1695, so the seat was vacant at the dissolution of 11 October 1695. * h The MPs of the last Parliament of England and 45 members co-opted from the former Parliament of Scotland, became the House of Commons of the 1st Parliament of Great Britain which assembled on 23 October 1707 (see below for the members in that Parliament). Parliaments of Great Britain 1707–1800 and of the United Kingdom 1801–1950 * Constituency abolished (1950) Notes:- * 1 Bromley had represented the university since a by-election in March 1701. He was Speaker of the House of Commons 1710–1713. * 2 Abbot was Speaker of the House of Commons 1802–1817. * 3 Estcourt and Inglis are regarded as Conservative MPs from 1835, as this was the approximate date when the Tory Party became known as the Conservative Party. * 4 Gladstone accepted office in a Liberal ministry in 1859, thus vacating the seat he had held (as a Peelite MP – more formally a Liberal Conservative). He was re-elected as a Liberal candidate. * 5 Anson became a Conservative MP when the Liberal Unionists formally merged with the Conservatives in 1912. * 6 Cecil joined the non-Coalition wing of his party at some point during the 1918–1922 Parliament. Elections in the 1710s * Note (1715): Bromley had been Speaker of the House of Commons 1710-1713. * Death of Whitelock Elections in the 1720s * Note (1722): Stooks Smith records the votes as Bromley 278, Clarke 213 and King 142. Elections in the 1730s * Death of Bromley * Death of Clarke * Death of Bromley Elections in the 1740s * Death of Butler Elections in the 1750s * Summons to the House of Lords of Cornbury, by writ in acceleration for his father's subsidiary title of Lord Hyde * Note (1751): Stooks Smith records Turner's vote as 47. Elections in the 1760s * Death of Palmer * Death of Bagot Elections in the 1800s * Resignation of Page Elections in the 1810s * Creation of Abbot as the 1st Lord Colchester Elections in the 1820s * Creation of Scott as the 1st Lord Stowell * Seat vacated on the appointment of Peel as Secretary of State for the Home Department * Resignation of Heber * Seat vacated on the appointment of Peel as Secretary of State for the Home Department * Resignation of Peel * Note (1829): Stooks Smith records that the polls were open for three days. Inglis was a candidate promoted by the Ultra-Tories in opposition to Catholic emancipation. Elections in the 1840s * Note (1841): McCalmont classifies Inglis as a Peelite candidate, at this election. * Note (1847): Poll 5 days. (Source for this note and the number of voters: Stooks Smith). McCalmont classifies Inglis as a Peelite and Gladstone as a Liberal Conservative candidate, at this election. Elections in the 1850s * Note (1852): Minimum possible turnout estimated by dividing votes by 2. To the extent that electors did not use both their votes, the figure will be an underestimate. McCalmont classifies Gladstone as a Liberal Conservative candidate, at this election. * Seat vacated on the appointment of Gladstone as Chancellor of the Exchequer * Resignation of Inglis. * Seat vacated on the appointment of Gladstone as Lord High Commissioner to the Ionian Islands. McCalmont classifies Gladstone as a Liberal Conservative candidate, at this election. * Seat vacated on the appointment of Gladstone as Chancellor of the Exchequer. McCalmont classifies Gladstone as a Liberal candidate, at this election. Elections in the 1860s * Note (1865): Turnout estimated in the same way as for the 1852 election. * Seat vacated on the appointment of Hardy as President of the Poor Law Board * Seat vacated on the appointment of Hardy as Secretary of State for the Home Department Elections in the 1870s * Seat vacated on the appointment of Hardy as Secretary of State for War * Creation of Hardy as the 1st Viscount Cranbrook Elections in the 1890s * Death of Mowbray Elections in the 1910s * Anson became a Conservative MP in 1912 when the Liberal Unionist Party formally merged with the Conservative Party. * Death of Anson * Electorate expanded and elections using the bloc vote replaced by those using the single transferable vote, by the Representation of the People Act 1918, from the 1918 United Kingdom general election. * Creation of Prothero as 1st Lord Ernle Elections in the 1930s * Resignation of Cecil Elections in the 1940s * As two candidates achieved the quota only one count was necessary * Constituency abolished (1950)
WIKI
Chartophylax A chartophylax (χαρτοφύλαξ, from χάρτα, "document" and φύλαξ, "guard, keeper"), sometimes also referred to as a chartoularios, was an ecclesiastical officer in charge of official documents and records in the Greek Orthodox Church in Byzantine times. The post existed in Constantinople as well as the provincial dioceses, and holders of the post were responsible for the archives and chancery. Some monasteries also included a chartophylax or, for the women's convents, a chartophylakissa, in charge of their records. Gradually, by virtue of his office's importance, the chartophylax of the Patriarch of Constantinople rose to become one of the most important officials in the clergy, despite his nominally low rank. Codinus calls the Grand Chartophylax the judge of all causes, and the patriarch's right arm. He adds that this officer was the depository or keeper of all the charters relating to the ecclesiastical rights stored in the chartophylakeion (Archives). In addition, the chartophylax presided over matrimonial causes, and was the main intermediary between the clergy and the patriarch, controlling his correspondence and access to him. He drew up all sentences and decisions of the patriarch, who signed and sealed them; he presided in the synods in the patriarch's absence and took cognizance of all ecclesiastical and civil matters and causes, whether among the clergy, the monks, or the people. The chartophylax took precedence over all the bishops, though he was only a deacon. On occasion, he discharged the functions of the priests: he had twelve notaries under him. The chartophylax of Constantinople was analogous to the chartulary of the See of Rome, but far more powerful.
WIKI
Artem Panchoyan Artem Panchoyan - 7 months ago 33 Javascript Question Play 2.x: How to use two jsRoutes files in one scala template I'm using jsRoutes in my Play 2.1.x app. Part of my routes file looks the following way: GET /assets/template/js/routes/admin.js controllers.Admin.jsRoutes GET /assets/template/js/routes/salonManagement.js controllers.SalonManagement.jsRoutes And I would like to use both references in my scala template (that is by design, one controller contains necessary api functions, the other one necessary form submission urls). So in my scala template I have the following part: <script type="text/javascript" src="@routes.Admin.jsRoutes()"></script> <script type="text/javascript" src="@routes.SalonManagement.jsRoutes()"></script> Unfortunately, each generated javascript file starts with var jsRoutes = {}; . Therefore, @routes.SalonManagement.jsRoutes() overrides properties of @routes.Admin.jsRoutes() and I can use only the last jsRoutes object. Now, I know only one workaround. After each jsRoutes declaration I can insert a script that copies old jsRoutes object to a temporary object and then extends new jsRoutes with itself. But that doesn't look like the right way to go. Isn't there any better way? Answer There's nothing special about the "jsRoutes" name. You can keep the same method name for consistency among the various controllers, but just pass a different name to the Routes.javascriptRouter method.
ESSENTIALAI-STEM
Skip to main content Dryad logo Data from: Signal design and courtship presentation coincide for highly biased delivery of an iridescent butterfly mating signal Citation White, Thomas Edward; Zeil, Jochen; Kemp, Darrell J.; White, Thomas E. (2014), Data from: Signal design and courtship presentation coincide for highly biased delivery of an iridescent butterfly mating signal, Dryad, Dataset, https://doi.org/10.5061/dryad.3hk2v Abstract Sensory drive theory contends that signalling systems should evolve to optimize transmission between senders and intended receivers, while minimising visibility to eavesdroppers where possible. In visual communication systems, the high directionality afforded by iridescent colouration presents underappreciated avenues for mediating this trade-off. This hypothesis predicts functional links between signal design and presentation such that visual conspicuousness is maximised only under ecologically relevant settings and/or to select audiences. We addressed this prediction using Hypolimnas bolina, a butterfly in which males possess ultraviolet markings on their dorsal wing surfaces with a narrow angular reflectance function. Males bearing brighter dorsal markings are increasingly attractive to females, but also likely more conspicuous to predators. Our data indicate that, during courtship (and given the ritualized wingbeat dynamics at these times), males position themselves relative to females in such a way as to simultaneously maximise three components of known or putative signal conspicuousness: brightness, area, and iridescent flash. This suggests that male signal design and display have coevolved for the delivery of an optimally conspicuous signal to courted females. More broadly, these findings imply a potential signalling role for iridescence itself, and pose a novel example for how signal design may coevolve with the behavioural context of display. Usage Notes References
ESSENTIALAI-STEM
Antje Herlyn, Sebastian Barreveld Dr. Antje Marianne Herlyn, the daughter of Dr. Dorothee M. Herlyn and Dr. Meenhard F. Herlyn of Wynnewood, Pa., was married last Monday to Sebastian Marc Barreveld, a son of Corry M. Barreveld and René C. Barreveld of Cortlandt Manor, N.Y. Ruth E. Loutchek, a deputy marriage commissioner in the office the San Francisco County Clerk, officiated at San Francisco City Hall. Next Saturday, the Rev. Herbert Heiss-Hasala, a Lutheran minister, will lead a religious ceremony at St. Pieterskerk in Utrecht, the Netherlands.
NEWS-MULTISOURCE
The process of beer-making is complicated. The brewing process has an array of steps that need to be followed fairly precisely or you risk ruining the flavor of your concoction. A general description of the process is that brewer’s yeast, usually specially cultivated strains of the model organism Saccharomyces cerevisiae, is used along with sugars from chosen grains in order to ferment them into ethanol and the other flavors that make up your typical beer. The Problems With Hops Hops are a critical component for most beer makers, as the compounds in the flowers of the Humulus lupulus plant are what give beer its characteristic bitter flavor and the majority of its fragrance. This is why beer with hops are commonly referred to as having a “hoppy” flavor profile. And these types of beers have only become more popular over time, leading to more farmers planting hops in order to sell to breweries. This isn’t actually a good thing, however, even with the increase in domestic sales prices. Hop plants require a significant amount of water and irrigation to grow and they have to be grown rather particularly if you want to even approximate a consistent flavor production. So, in terms of environmental impact, they are firmly in the negative. Add to this that said flavor is largely not able to be consistent over time, due to differences in how much of the essential oils in the flowers are produced year by year, meaning that beer brewed with hops tastes at least a little altered with each batch. When trying to sell beer to a general market, this isn’t a good thing. Due to this, a fair amount of research has gone into hops in order to identify what the specific compounds are in the oils that impart that characteristic flavor. It hasn’t been an easy taste, due to the cornucopia of compounds found in the oils. But, over time and much effort, the determinants of flavor were narrowed down to two terpenes, linalool and geraniol. They appear to be the basis of the aroma and flavor that hops present in beer and it was also found that they are the main mixture used in the most popular brand of hops in the US known as Cascade hops. With that figured out, the next step was to find out how to produce those compounds separate from the hop plant itself. Luckily, there was plenty of insight on how to do that already. Experiments with wine yeast in the past had succeeded in making monoterpene compounds such as those by overexpressing a transgene for them in yeast. However, that was only with one compound. Producing both and in the right quantities to make a precise balance of flavor would be more complicated. Synthesizing Some Synthases Scientists at the University of California and the Lawrence Berkeley National Laboratory felt up to the task though. They first sought out the synthases responsible for making the two aforementioned compounds, as the genes and enzymes for those two in particular had yet to be identified in the hop plant. Though they had been found in other unrelated plants, but the question is whether they would produce enough of it or even any of it at all when expressed in yeast. Six separate linalool synthase genes from a variety of plants were taken and expressed in a lab strain of yeast. But the experimental groups for each one were not able to have enough gene and protein activity in order to meet the needed concentrations. The main reason for this is that these monoterpenes are usually produced in the chloroplasts of plants, where the N-terminal end is cleaved to make the mature protein. Without this cleavage, the proteins are only able to work at a minimal level of activity. The method to know where to cleave on the protein hasn’t been perfected yet, as the answer varies between plant species. So the researchers continued looking through linalool synthase genes and used a bioinformatics algorithm to try and predict the proper truncation site, along with finding a synthase that had a high amount of activity. They finally found what they were looking for in a tomato cultivar named Lycopersicon esculentum. A similar search for geraniol synthases found another suitable gene for that purpose. Now that the synthases with a high enough activity in yeast had been found, next was to move beyond the lab yeast strain that was being used and try to do the same monoterpene production in a specially chosen brewer’s yeast. They had to take care to ensure production also continued during the process of beer fermentation. Finalizing the Hops-Less Beer A number of pathways were investigated to find limiting steps in the process of terpene production and several genes were overexpressed in order to provide plenty of the pre-curser molecules needed to make the terpenes. To get around the difficulty of making such a multi-gene transgene construct, they used an existing toolkit in the Golden Gate genetic building blocks assembly method. The last problem they came across was delivering all of these desired transgene into the brewer’s yeast. The size at over 10 kilobases was too large for older methods to accomplish, so they used a Cas9-mediated method in order to integrate the transgenes, along with using a colorimetric visual assay so selective markers weren’t needed in order to confirm successful integration. Some refining of the brewer’s yeast and several generations later and the researchers had accomplished their goal. A comparison of consistency between the yeast and hops sent in from different farms around the US, all of which were meant to be made for consistent Cascade hops type beer, showed that only the yeast managed to have consistent combination levels of the terpenes between multiple samples. A Taste of Success The final test was to see if beer brewed using the yeast and no added hops tasted as the beer should. A blinded panel of taste testers was used, along with different developed strains of the yeast with variations in terpene output. The testers confirmed the beer has the “hoppy” favor they wanted and that each of the beers had a unique flavor profile. Overall, the scientists noted that this only forms a foundation for future research and terpene producing brewer’s yeast production. The two terpenes used make up just a simple form of the flavor from hops, with there being many other aroma and flavor compounds left to incorporate to make alternative kinds of hops-less beer. They hope that future yeast biosynthesis research will be able to improve on their work and make an even broader amount of hops molecules for use in beer brewing. Press Article Link Study Link Photo CCs: Hops-1 from Wikimedia Commons Liked it? Take a second to support Bioscription on Patreon! About SterlingAdmin
ESSENTIALAI-STEM
free42  3.0.5 About: Free42 is a re-implementation of the HP-42S scientific calculator and the HP-82240 printer.   Fossies Dox: free42-3.0.5.tar.gz  ("unofficial" and yet experimental doxygen-generated source code documentation)   free42 Documentation Some Fossies usage hints in advance: 1. To see the Doxygen generated documentation please click on one of the items in the steelblue colored "quick index" bar above or use the side panel at the left which displays a hierarchical tree-like index structure and is adjustable in width. 2. If you want to search for something by keyword rather than browse for it you can use the client side search facility (using Javascript and DHTML) that provides live searching, i.e. the search results are presented and adapted as you type in the Search input field at the top right. 3. Doxygen doesn't incorporate all member files but just a definable subset (basically the main project source code files that are written in a supported language). So to search and browse all member files you may visit the Fossies free42-3.0.5.tar.gz contents page and use the Fossies standard member browsing features (also with source code highlighting and additionally with optional code folding). README ------------------------------------------------------------------------------- Free42 is a software clone of the Hewlett-Packard 42S calculator. If you know how to use an HP-42S, you know how to use Free42. If you're new to the HP-42S and its clones, you may want to take a peek at the manual. You can find documentation at https://thomasokken.com/free42/#doc The remainder of this README file covers some miscellaneous tidbits that I had no other decent place to put. ------------------------------------------------------------------------------- Binary vs. Decimal Starting with release 1.4, Free42 can be built with binary or with decimal floating point. Building the binary versions works as always (just say "make"); to build the decimal versions, set the BCD_MATH environment variable, or use "make BCD_MATH=1". When switching between building the decimal and binary version (or vice versa), be sure to do "make clean", to avoid linking the wrong objects. When building the Windows version using Visual C++, choose the Free42Binary or Free42Decimal projects; these projects are set up so that all output files are written to separate directories (ReleaseBinary, ReleaseDecimal, DebugBinary, DebugDecimal), so you can switch between these projects without having to worry about cleaning up object files. ------------------------------------------------------------------------------- Building on Raspbian 10 # apt install libgtk-3-dev # apt install libasound2-dev $ git clone https://github.com/thomasokken/free42.git $ cd free42/gtk $ make BCD_MATH=1 AUDIO_ALSA=1 ------------------------------------------------------------------------------- Creating Free42 build environment in FreeBSD Create VirtualBox VM (using VirtualBox 5.2.22) Install FreeBSD-12.0-RELEASE-amd64-dvd1.iso then: pkg install gnome3 pkg install xorg pkg install virtualbox-ose-additions in /etc/fstab, added: proc /proc procfs rw 0 0 in /etc/rc.conf, added: vboxguest_enable="YES" vboxservice_enable="YES" dbus_enable="YES" hald_enable="YES" gdm_enable="YES" gnome_enable="YES" That brings up the desktop. Now, some more stuff: pkg install devel/pkgconf pkg install devel/gmake ------------------------------------------------------------------------------- About the character sets: ('bigchars' and 'smallchars' arrays in core_display.c) The top half of the 256 character codes are like the bottom half, with these exceptions: 0x80: thin colon (':') (looks different than regular colon), while 0x00 is a calculator-style divide sign (superposition of ':' and '-') 0x81: small 'Y'; 0x01: multiply sign 0x8a: displays 'LF' character (small 'L' and small 'F', slightly offset, squeezed into one character cell); 0x0a: actual linefeed (move to next line of display). The bigchars array contains 130 characters, in 5x8 pixel cells, corresponding to codes 0-129. Char 10 is the 'LF' ligature. Note: the 'x:' and 'y:' legends for the standard X and Y register display are built from 0x78 (lowercase x), 0x81 (small 'Y'), and 0x80 (thin ':'). Note: 0x01 (multiply) is different than 0x78 (lowercase x) (it is 1 pixel higher). ------------------------------------------------------------------------------- HP-42S bugs that I found: If you activate the CUSTOM menu in KEYASN mode, go to its third row, and then switch to LCLBL mode, you get a menu row with labels "L", "M", "N", "O", "@", "XEQ"; these keys activate the commands XEQ ST Z, XEQ ST Y, XEQ ST X, XEQ ST L, XEQ 117, XEQ 118. These commands do actually work, but entering the corresponding labels into a program is a bit tricky... ->POL and ->REC with a real number in X reject a string in Y (good), accept a real number in Y (good), accept a complex number in Y but only use its real part (undocumented and not very useful), and accept real and complex matrices in Y with weird results. I'd say the complex and matrix cases are all bugs, resulting from a missing parameter type check. If MATA, MATB, or MATX is the indexed matrix, and SIMQ resizes it to a smaller size, IJ aren't set to (1, 1) as they usually are when the indexed matrix is resized (though DIM or SIZE). As a result, IJ can end up pointing outside the allocated elements, and RCLEL and STOEL can then produce wacky results. HP-42S bugs that others have found: When COMB or PERM are invoked with bad arguments (e.g. X > Y), "Invalid Data" is returned (good), but all subsequent invocations of those two functions also yield that message, even if the parameters are now correct (bad). This condition can be cleared up by performing an operation that affects LASTx (but not STO ST L). Apparently some rev. B models do not have this bug; I have read that the original problem was a hardware bug, for which rev. B introduced a software workaround; somewhere in the rev. B production run the hardware bug was fixed, but now the software workaround would *cause* the bug. The bug also exists in all rev. C models, apparently (it does in mine, and in Emu42 when run with a rev. C ROM!). I'm curious as to why a couple of basic, straightforward instructions like COMB and PERM would be sensitive to a hardware bug (and *only* they, apparently), but who am I to question what I've heard others report? I'm not about to spend weeks poring over ROM disassemblies to make sure... In LINΣ mode, summing a matrix is buggy. I have seen it sum only the first row, and report a bogus value back in X (8.47216900137e-489), and also seen it say Insufficient Memory when that clearly wasn't true; I have heard a report from someone else about the machine even locking up to the point where it needs a hard reset. In some versions, in LINΣ mode, Σ+ and Σ- do not update LASTx. I read about this in a manual addendum from HP; however, I cannot reproduce this, neither on my real HP-42S nor on Emu42 (both rev. C ROM). I have also heard a report that FCSTX is buggy in PWRF mode; I have not been able to confirm this yet but there appears to be more I have to read about it. Probably depends on your ROM version; I tested with rev. C but it seemed fine. Not sure if this is a bug or not: When KEYX or KEYG are used to reprogram the ▲ and ▼ keys, it would be nice if the user would be alerted to this by the ▼▲ annunciator in the display turning on. The manual does not mention this behavior, but older editions of the Programming Examples and Techniques book do (page 34, bottom). It doesn't work on the actual calculator, at least not on any that I've heard of. Free42 does turn on the ▼▲ annunciator. Although my general rule is to mimic the HP-42S as closely as possible, I felt that this was a nice feature and that it's pretty unlikely to break anything. :-) ------------------------------------------------------------------------------- [MIN], [MAX], and [FIND]: undocumented HP-42S matrix functions [MIN] finds the lowest element of the current column, starting at the current row, of the indexed matrix, and returns the element to X and the row where it was found to Y; [MAX] is like [MIN] except it finds the highest element; if the minimum or maximum is not unique (it is found in more than one row), the highest matching row is returned. [MIN] and [MAX] require the indexed matrix to be a real matrix, and they do not allow string elements in the column being searched. [FIND] locates a specific value, searching the indexed matrix left to right and top to bottom. The function works as a conditional: when a program is running, the following instruction is executed if a match is found, and skipped if a match is not found; when executed interactively, the display shows "Yes" if a match is found and "No" if not. Also, if a match is found, I and J are set to point to it. The indexed matrix may be real or complex, and the search value may be real, complex, or string; real or string values are only found in real matrices, and complex values are only found in complex matrices; in other words, 5 is not considered equal to 5 + 0i -- mathematically speaking this is wrong, but on the other hand it is consistent with the behavior of the X=Y? and X≠Y? functions. ------------------------------------------------------------------------------- Differences between the Free42 printer emulation and the HP-42S/82240 Free42 prints programs differently in NORM or TRACE modes: in NORM mode, the listing is right-justified, and in TRACE mode, the listing is compact (multiple commands per line). The HP42S does not do this; Free42 "inherited" this behavior from the HP-82143 printer, which the author remembers fondly. :-) When the HP-42S has to print a line that is too long to fit on one physical printer line (i.e., more than 24 characters), it takes no special action. Whether the printer prints the overflow left- or right-justified remains to be found out. I should check the 82240 specs to see how it behaves. Free42 usually prints the overflow left-justified; the only exceptions are PRP and LIST in NORM mode.
ESSENTIALAI-STEM
Sonya Clark Sonya Clark (born 1967, Washington, D.C.) is an American artist of Afro-Caribbean heritage. Clark is a fiber artist known for using a variety of materials including human hair and combs to address race, culture, class, and history. Her beaded headdress assemblages and braided wig series of the late 1990s, which received critical acclaim, evoked African traditions of personal adornment and moved these common forms into the realm of personal and political expression. Although African art and her Caribbean background are important influences, Clark also builds on practices of assemblage and accumulation used by artists such as Betye Saar and David Hammons. Biography Clark's father was a psychiatrist from Trinidad while her mother was a nurse from Jamaica. Clark was influenced by the craftspeople in her family, including a grandmother who worked as a tailor, and a grandfather who was a furniture maker. Education Clark graduated from the Sidwell Friends School in 1985. She then received a BA in psychology from Amherst College in 1989. She went on to receive a BFA from the School of the Art Institute of Chicago in 1993, where she studied with the artists Nick Cave (performance artist), Anne Wilson, and Joan Livingstone. In 1995, Clark received an MFA from Cranbrook Academy of Art. In 2011, Clark was honored with Cranbrook Academy of Art's first Distinguished Mid-Career Alumni Award. She has been a recipient of four honorary doctorates. In 2015, she received an honorary doctorate from Amherst College. In 2021, she received two additional honorary doctorates from Maine College of Art in Portand, Maine and Franklin and Marshall College in Lancaster, Pennsylvania. In 2023, she was the commencement speaker and received another honorary doctorate from the School of the Art Institute of Chicago. Clark cites professor Rowland O. Abiodun, Amherst College as an early influence in her studies of the connection between her Caribbean culture and Yoruba culture, which was further enhanced by a post-graduation trip to the Ivory Coast, where she learned to weave on a hand loom. Clark also cites Nick Cave as instrumental in furthering her investigations in fiber. Professional academic career Clark is a professor of art in the department of Art and the History of Art at Amherst College. Between 2006 and 2017, she was chair of the Craft/Material Studies Department and was honored as a Distinguished Research Fellow. In 2016, she was awarded a university-wide Distinguished Scholars Award at the highly acclaimed School of the Arts at Virginia Commonwealth University in Richmond, VA. The department is ranked by U.S. News & World Report as one of the top in the nation. Prior to her appointment at VCU, she was Baldwin-Bascom Professor of Creative Arts at the University of Wisconsin-Madison, where she received tenure with distinction and an H.I. Romnes award. Art career Much of Clark's work utilizes humble materials and objects, like combs, seed beads, coins, threads, and strands of hair. Through the use of these materials, she explores the ways people assign function and connotations to things. “Objects have personal and cultural meaning because they absorb our stories and reflect our humanity back to us. My stories, your stories, our stories are held in the object,” says Clark. Clark is perhaps best known for artwork that honors contemporary craftspeople, like hairdressers, and notable African American figures. She has studied with craftspeople in places like Australia, Brazil, China, Côte d'Ivoire, Ghana, India, and Indonesia, where she learned about their mediums, tools, technique, and cultural associations. In her work, craft and community and intertwined; many of her projects involve participation and promote collaboration across racial, gender, and socioeconomic lines. One of Clark's artist statements describes her work as follows: "I use craft and materials to investigate identity. Simple objects become cultural interfaces. Through them I navigate accord and discord. When trying to unravel complex issues, I am instinctively drawn to things that connect to my personal narrative as a point of departure: a comb or a strand of hair. Charged with agency, simple objects nave the mysterious ability to reflect or absorb us. I find my image, my personal story, in an object. But it is also the object's ability to act as a rhizome, the multiple ways in which it can be discovered or read by a wide audience that draws me in. To sustain my practice, I milk the object, its potential, its image, and its materiality. I manipulate the object in a formal manner to engage the viewer in conversation about collective meaning. If we unravel a cloth together, what do we learn in the process? What is the connection between combs, hair, and textiles? Can a strand of hair tell a life story or a whole cultural history? I trust that my stories, your stories, our stories are held in the object. In this way, the everyday 'thing' becomes a lens through which we may better see one another. A visual vocabulary derived from object and image forms a language ranging from the vernacular to the political to the poetic.'" Hair Craft Project The Hair Craft Project is a series of photographs and canvas works that were made in collaboration between the artist and Black hairstylists, who Clark sees as practicing their own form of textile artistry. Each hairdresser demonstrated their skills and expertise by working on Clark's own hair, using her head as a canvas. The resulting hairstyle was then photographed, and paired with a complementing canvas work. On each canvas, the hairstylists duplicated the hairstyle done on Clark's hair using silk thread. This project breaks down barriers between craft and art, salon and art institutions, showing that both spaces are sites of skill, improvisation, aesthetic sensibility, and commerce. According to Clark, "Hairdressers are my heroes. The poetry and politics of Black hair care specialists are central to my work as an artist and educator. Rooted in a rich legacy, their hands embody an ability to map a head with a comb and manipulate the fiber we grow into a complex form. These artists have mastered a craft impossible for me to take for granted." She claims, "hair is power," and, "as carrier of DNA, hair holds the essence of identity." "I grew up braiding my hair and my sister's hair, so in one sense, like many black women, I had been preparing to be a textile artist for a very long time." Clark further considered the hair strand as a tool for communication and worked with graphic designer Boquin Peng to create an alphabet based on the curl pattern of her hair called Twist. Flag Project Clark's explorations with flags began with her thesis Kente Flag Project in 1995. This work is a mixture of elements from African and Western/American culture. Clark specifically utilized Kente patterns for strength and endurance, advancement and achievement, and prosperity. The traditional Kente patterns, an African weave structure, were woven on a European loom, and combined with American flag imagery--the result being fabric that contained symbols of identity and cultural pride that reached across two cultures. Since 2009, Clark has created serial projects surrounding the Confederate Battle Flag. She has performed Unraveling in June 2015 at the now-defunct Mixed Greens gallery in New York City and then at the Nasher Museum of Art at Duke University, in October 2016. Her presentation of the exhibit in Louisville Kentucky in 2017 "was the first performance under the [Trump] administration and since the country has found itself embroiled in debate over the presence and ramifications of Confederate imagery in the wake of the violence in Charlottesville, Virginia, this past summer." "The act is now a part of a larger movement through which state and local governments are dismantling these objects out of a sense of civic duty." During the exhibition, members of the audience are encouraged to join Clark one at a time in the unraveling of a confederate flag while she explains her vision and demonstrates how to pull the strands of the flag apart. According to Goodman, "Clark stands side-by-side by participants, shoulder-to-shoulder as they pull each strand of the flag and confront the reality it represents". In April 2018, Clark returned to her alma mater, Amherst College, to perform "Unravelling" at the Mead Art Museum. In 2017, Clark created a hand woven linen cloth reproduction of the white dish towel used by a Confederate soldier to surrender at the Appomattox Court House on April 9, 1865. This piece is known as "Monumental Cloth (sutured)". It is the artist's hope that this flag of truce becomes as well known as the Confederate Battle Flag. Both "Unravelling" and "Monumental Cloth (sutured)" were on display at the Mead Art Museum from April 5, 2018, to July 1, 2018. Clark reproduced the Truce Flag with the intention of drawing attention back to the flag that brokered and to the Civil War, questioning why symbols of white supremacy, such as the Confederate Battle Flag, are memorialized in favor of symbols of peace. A larger immersive outgrowth of the project "Monumental Cloth: the Flag We Should Know" was made in collaboration with and exhibited at The Fabric Workshop and Museum Her 450 square foot enlarged replica of the truce flag used for the Confederate surrender at Appomattox, Virginia, "Monumental", is in the permanent collection of the Smithsonian American Art Museum's Renwick Gallery. Exhibitions, collections, and awards Clark's work has been exhibited in over 500 museums and galleries in Europe, Africa, Asia, Australia, and throughout the Americas. Her work is in the collection of many museums including the Indianapolis Museum of Art, Delaware Art Museum, Philadelphia Museum of Art, the Madison Museum of Contemporary Art, and Memphis Brooks Museum. Her work has been favorably reviewed in journals such as Art in America, The New York Times, Sculpture, Surface Design Journal, The Los Angeles Times, Fiber Arts, New American Paintings, Philadelphia Inquirer, Italian Vogue, Hyperallergic, Mother Jones, and Huffington Post. Sonya Clark was an artist in residence at the McColl Center for Art + Innovation in 2011. She has received several awards including an Anonymous Was a Woman Award, a United States Artists Fellowship, Pollock-Krasner Award, a Rockefeller Foundation Residency in Italy, an Art Matters Grant, Red Gate Residency in China, a Wisconsin Arts Board Fellowship, a Virginia Museum of Fine Arts Fellowship, a Virginia Commission for the Arts Fellowship, a Civitella Ranieri Fellowship in Italy, an 1858 Award for Contemporary Southern Art from the Gibbes Museum, the 2014 ArtPrize a Juried Grand Prize co-winner and recipient of the Juried award for Best Two-Dimensional work, and a Smithsonian Artist Research Fellowship. Clark was inducted into the American Craft Council College of Fellows in 2020. Her work can be found in many books including Wrapped in Pride, Mami Wata, Hand + Made, The Global Africa Project, Second Lives, Manufractured, Material Girls, Contemporary Black Women Artists, Pricked, African American Art and Artists, Choosing Craft, and Master: bead-weaving Her work, Monumental,, was acquired by the Smithsonian American Art Museum as part of the Renwick Gallery's 50th Anniversary Campaign. In 2023, Clark's work was featured in the group show and accompanying publication Spirit in the Land, organized and displayed by the Nasher Museum of Art at Duke University, which is also traveling to the Pérez Art Museum Miami. Exhibition history * 2023: Sonya Clark: We Are Each Other Cranbrook Art Museum, June 17 –September 24 * 2021: Sonya Clark: Tatter, Bristle, and Mend, National Museum of Women in the Arts, March 3 – June 28 * 2019: Monumental Cloth: the flag we should know, Fabric Workshop and Museum, March 29 – August 4, 2019 * 2019: Sonya Clark: Hair|Goods, An Homage to Madam CJ Walker, Goya Contemporary Gallery, January 25 - March 30, 2019 * 2017: Oaths and Epithets: Works by Sonya Clark, Contemporary Craft, April 12 – August 19, 2017 * 2015: Loving After Lifetimes of All This, The Center for Craft, Creativity & Design, January 30 – May 23, 2015 * 2008: Sonya Clark: Loose Strands, Tight Knots, Walters Art Museum, June 28 – September 2, 2008 Published works * Haystack Monograph Series No. 17, 2004: Craft and Design. "Hand-me-downs: Our Stories held in Objects, Materials and Processes." * Surface Design, Fall 2003. "In Review: Nick Sargent." * Surface Design, Summer 2000. "Beneath Pattern: Investigating Symmetry." * Ornament, Spring 1997. "Sculptural Headdresses." * The Hair Craft Project: Sonya Clark, eds. Melissa Anderson, Sonya Clark, Meg Roberts and Leigh Suggs, Exhibition Catalogue, 2015
WIKI
Page:Moby-Dick (1851) US edition.djvu/145 Rh voyage, Captain Peleg and Captain Bildad were going it with a high hand on the quarter-deck, just as if they were to be joint-commanders at sea, as well as to all appearances in port. And, as for Captain Ahab, no sign of him was yet to be seen; only, they said he was in the cabin. But then, the idea was, that his presence was by no means necessary in getting the ship under weigh, and steering her well out to sea. Indeed, as that was not at all his proper business, but the pilot’s; and as he was not yet completely recovered&mdash;so they said&mdash;therefore, Captain Ahab stayed below. And all this seemed natural enough; especially as in the merchant service many captains never show themselves on deck for a considerable time after heaving up the anchor, but remain over the cabin table, having a farewell merry-making with their shore friends, before they quit the ship for good with the pilot. But there was not much chance to think over the matter, for Captain Peleg was now all alive. He seemed to do most of the talking and commanding, and not Bildad. “Aft here, ye sons of bachelors,” he cried, as the sailors lingered at the main-mast. “Mr. Starbuck, drive aft.” “Strike the tent there!”&mdash;was the next order. As I hinted before, this whalebone marquee was never pitched except in port; and on board the Pequod, for thirty years, the order to strike the tent was well known to be the next thing to heaving up the anchor. “Man the capstan! Blood and thunder!&mdash;jump!”&mdash;was the next command, and the crew sprang for the handspikes. Now in getting under weigh, the station generally occupied by the pilot is the forward part of the ship. And here Bildad, who, with Peleg, be it known, in addition to his other offices, was one of the licensed pilots of the port&mdash;he being suspected to have got himself made a pilot in order to save the Nantucket pilot-fee to all the ships he was concerned in, for he never piloted any other craft&mdash;Bildad, I say, might now be seen ac-
WIKI
File:  [DragonFly] / src / usr.sbin / mixer / mixer.c Revision 1.4: download - view: text, annotated - select for diffs Thu Apr 15 12:38:02 2004 UTC (9 years, 7 months ago) by joerg Branches: MAIN CVS tags: HEAD Don't print the recording sources to stderr, the manpage doesn't indicate this and it doesn't seem sensible. Print the recording source in parameter format, if mixer is called with -s. /* * This is an example of a mixer program for Linux * * updated 1/1/93 to add stereo, level query, broken * devmask kludge - cmetz@thor.tjhsst.edu * * (C) Craig Metz and Hannu Savolainen 1993. * * You may do anything you wish with this program. * * ditto for my modifications (John-Mark Gurney, 1997) * * $FreeBSD: src/usr.sbin/mixer/mixer.c,v 1.11.2.6 2001/07/30 10:22:58 dd Exp $ * $DragonFly: src/usr.sbin/mixer/mixer.c,v 1.4 2004/04/15 12:38:02 joerg Exp $ */ #include <err.h> #include <fcntl.h> #include <stdio.h> #include <string.h> #include <stdlib.h> #include <unistd.h> #include <sys/soundcard.h> #define LEFT(vol) (vol & 0x7f) #define RIGHT(vol) ((vol >> 8) & 0x7f) const char *names[SOUND_MIXER_NRDEVICES] = SOUND_DEVICE_NAMES; const char *defaultdev = "/dev/mixer"; void usage(int devmask, int recmask); int res_name(const char *name, int mask); void print_recsrc(int recsrc); void print_recsrc_short(int recsrc); void usage(int devmask, int recmask) { int i, n; printf("usage: mixer [-f device] [-s] [dev [+|-][voll[:[+|-]volr]] ...\n" " mixer [-f device] [-s] recsrc ...\n" " mixer [-f device] [-s] {^|+|-|=}rec recdev ...\n" " mixer -h\n"); printf(" devices: "); for (i = 0, n = 0; i < SOUND_MIXER_NRDEVICES; i++) if ((1 << i) & devmask) { if (n) printf(", "); printf("%s", names[i]); n = 1; } printf("\n rec devices: "); for (i = 0, n = 0; i < SOUND_MIXER_NRDEVICES; i++) if ((1 << i) & recmask) { if (n) printf(", "); printf("%s", names[i]); n = 1; } printf("\n"); exit(1); } int res_name(const char *name, int mask) { int i; for (i = 0; i < SOUND_MIXER_NRDEVICES; i++) if ((1 << i) & mask && !strcmp(names[i], name)) break; return i == SOUND_MIXER_NRDEVICES ? -1 : i; } void print_recsrc(int recsrc) { int i, n = 0; printf("Recording source: "); for (i = 0; i < SOUND_MIXER_NRDEVICES; i++) if ((1 << i) & recsrc) { if (n) printf(", "); printf("%s", names[i]); n = 1; } printf("\n"); } void print_recsrc_short(int recsrc) { int i, first; first = 1; for (i = 0; i < SOUND_MIXER_NRDEVICES; i++) { if ((1 << i) & recsrc) { if (first) { printf("=%s ", names[i]); first = 0; } else printf("+%s ", names[i]); } } } int main(int argc, char *argv[]) { int i, mset, fd, dev; int devmask = 0, recmask = 0, recsrc = 0, orecsrc; int dusage = 0, drecsrc = 0, shortflag = 0; int l = 0, r = 0, t = 0; int n = 0, lrel = 0, rrel = 0; char lstr[8], rstr[8]; char ch; const char *name = defaultdev; while ((ch = getopt(argc, argv, "f:sh")) != -1) switch (ch) { case 'f': name = optarg; break; case 's': shortflag = 1; break; case 'h': /* Fall through */ default: dusage = 1; } argc -= optind; argv += optind; if ((fd = open(name, O_RDWR)) < 0) err(1, "%s", name); if (ioctl(fd, SOUND_MIXER_READ_DEVMASK, &devmask) == -1) err(1, "SOUND_MIXER_READ_DEVMASK"); if (ioctl(fd, SOUND_MIXER_READ_RECMASK, &recmask) == -1) err(1, "SOUND_MIXER_READ_RECMASK"); if (ioctl(fd, SOUND_MIXER_READ_RECSRC, &recsrc) == -1) err(1, "SOUND_MIXER_READ_RECSRC"); orecsrc = recsrc; if (dusage) { close(fd); usage(devmask, recmask); /* Does not return */ } if (argc == 0) { for (i = 0; i < SOUND_MIXER_NRDEVICES; i++) { if (!((1 << i) & devmask)) continue; if (ioctl(fd, MIXER_READ(i),&mset)== -1) { warn("MIXER_READ"); continue; } if (shortflag) printf("%s %d:%d ", names[i], LEFT(mset), RIGHT(mset)); else printf("Mixer %-8s is currently set to %3d:%d\n", names[i], LEFT(mset), RIGHT(mset)); } if (ioctl(fd, SOUND_MIXER_READ_RECSRC, &recsrc) == -1) err(1, "SOUND_MIXER_READ_RECSRC"); if (shortflag) { print_recsrc_short(recsrc); if (isatty(STDOUT_FILENO)) printf("\n"); } else print_recsrc(recsrc); exit(0); } while (argc > 0) { if (!strcmp("recsrc", *argv)) { drecsrc = 1; argc--; argv++; continue; } else if (argc > 1 && !strcmp("rec", *argv + 1)) { if (**argv != '+' && **argv != '-' && **argv != '=' && **argv != '^') { warnx("unknown modifier: %c", **argv); dusage = 1; break; } if ((dev = res_name(argv[1], recmask)) == -1) { warnx("unknown recording device: %s", argv[1]); dusage = 1; break; } switch(**argv) { case '+': recsrc |= (1 << dev); break; case '-': recsrc &= ~(1 << dev); break; case '=': recsrc = (1 << dev); break; case '^': recsrc ^= (1 << dev); break; } drecsrc = 1; argc -= 2; argv += 2; continue; } if ((t = sscanf(*argv, "%d:%d", &l, &r)) > 0) { dev = 0; } else if((dev = res_name(*argv, devmask)) == -1) { warnx("unknown device: %s", *argv); dusage = 1; break; } #define issign(c) (((c) == '+') || ((c) == '-')) if (argc > 1) { n = sscanf(argv[1], "%7[^:]:%7s", lstr, rstr); if (n > 0) { if (issign(lstr[0])) lrel = rrel = 1; l = atoi(lstr); } if (n > 1) { rrel = 0; if (issign(rstr[0])) rrel = 1; r = atoi(rstr); } } switch(argc > 1 ? n : t) { case 0: if (ioctl(fd, MIXER_READ(dev),&mset)== -1) { warn("MIXER_READ"); argc--; argv++; continue; } if (shortflag) printf("%s %d:%d ", names[dev], LEFT(mset), RIGHT(mset)); else printf("Mixer %-8s is currently set to %3d:%d\n", names[dev], LEFT(mset), RIGHT(mset)); argc--; argv++; break; case 1: r = l; case 2: if (ioctl(fd, MIXER_READ(dev),&mset)== -1) { warn("MIXER_READ"); argc--; argv++; continue; } if (lrel) l += LEFT(mset); if (rrel) r += RIGHT(mset); if (l < 0) l = 0; else if (l > 100) l = 100; if (r < 0) r = 0; else if (r > 100) r = 100; printf("Setting the mixer %s to %d:%d.\n", names[dev], l, r); l |= r << 8; if (ioctl(fd, MIXER_WRITE(dev), &l) == -1) warn("WRITE_MIXER"); argc -= 2; argv += 2; break; } } if (orecsrc != recsrc) if (ioctl(fd, SOUND_MIXER_WRITE_RECSRC, &recsrc) == -1) err(1, "SOUND_MIXER_WRITE_RECSRC"); if (drecsrc) { if (ioctl(fd, SOUND_MIXER_READ_RECSRC, &recsrc) == -1) err(1, "SOUND_MIXER_READ_RECSRC"); print_recsrc(recsrc); } close(fd); exit(0); }
ESSENTIALAI-STEM
view raw Juste3alfaz Juste3alfaz - 8 months ago 51 C# Question Insert collection into List from MongoDB I try to get all data from collection into MongoDB server using C# driver. The idea is connect to the server and get all collection than insert into list of class. List<WatchTblCls> wts; List<UserCls> users; List<SymboleCls> syms; public WatchTbl() { InitializeComponent(); wts = new List<WatchTblCls>(); users = new List<UserCls>(); syms = new List<SymboleCls>(); } public async void getAllData() { client = new MongoClient("mongodb://servername:27017"); database = client.GetDatabase("WatchTblDB"); collectionWatchtbl = database.GetCollection<WatchTbl>("Watchtbl"); collectionUser = database.GetCollection<UserCls>("Users"); collectionSymbole = database.GetCollection<SymboleCls>("Users"); var filter = new BsonDocument(); using (var cursor = await collectionWatchtbl.FindAsync(filter)) { while (await cursor.MoveNextAsync()) { var batch = cursor.Current; foreach (var document in batch) { wts.Add(new WatchTblCls(document["_id"], document["userId"], document["wid"], document["name"], document["Symboles"])); } } } } I get this error under wts.Add(new WatchTblCls(document["_id"], document["userId"], document["wid"], document["name"], document["Symboles"])); Cannot apply indexing with [] to an expression of type 'WatchTbl' Answer I don't understand the reason behind using WatchTbl and WatchTblCls both together. Is WatchTblCls a model for the entity WatchTbl here? Im not sure. In any case. If you go for aggregation and want to convert WatchTbl collection to WatchTblCls list, your desired solution might look like the following. I don't know the defiitions of the classes so I'm assuming: var client = new MongoClient("mongodb://servername:27017"); var database = client.GetDatabase("WatchTblDB"); var collectionWatchtbl = database.GetCollection<WatchTbl>("Watchtbl"); var collectionUser = database.GetCollection<UserCls>("Users"); var collectionSymbole = database.GetCollection<SymboleCls>("Users"); var list = collectionWatchtbl.AsQueryable().Select(x => new WatchTblCls() { id = x.id, userId = x.userId, ..... }); If you can use the same WatchTbl class and still want to load the full collection to a local List (which is definitely not a good idea): List<WatchTbl> list = await collectionWatchtbl.Find(x => true).ToListAsync();
ESSENTIALAI-STEM
Template talk:R:en:14C can be accessed through Google books here: http://books.google.co.uk/books?id=dGULAAAAMAAJ John Cross 11:52, 8 August 2009 (UTC)
WIKI
Embarcadero Media Embarcadero Media was a publishing company for four decades whose titles included the Palo Alto Weekly, The Almanac of Menlo Park, the Mountain View Voice, the Pleasanton Weekly, The Six Fifty, and Palo Alto Online. The company was founded as The Embarcadero Publishing Company in 1979 by William Johnson and was renamed Embarcadero Media in 2009. Johnson served as president and CEO until 2022, when he announced that he would retire and be succeeded by Adam Dawes, while remaining chairman of the board of directors. In November 2023, the company announced the establishment of a non-profit entity that would continue publishing the community weeklies. Mountain View Voice Kate Wakerly and Carol Torgrimson established the Voice, a monthly independent newspaper in Mountain View, California, in the fall of 1992. They ran operations for a time from Wakerly's basement. In 1994, the newspaper became part of Embarcadero Media, which changed its schedule to a weekly paper. Wakerly remained publisher and stayed through 2002 when she stepped down because of a breast cancer diagnosis. Tom Gibboney took over the editorship, and Wakerly died of cancer in 2004. The Voice won a 2014 state newspaper association award for first place in environmental reporting for Daniel Debolt's reporting on TCE, a toxic solvent that computer chip manufacturers discarded in Mountain View in the mid-20th century. These solvents leaked into an aquifer in the northeast part of the city. Justin Scheck also won earlier awards for his work on TCE plumes, and became managing editor in 2001. Candice Shih was named managing editor in 2003, and was succeeded by Don Frances. Gibboney retired from his position as editor and publisher in 2014, handing the reins to Andrea Gemmet. Transition to Non Profit On November 15, 2023, Embarcadero issued a press release acknowledging that in recent years, Embarcadero Media had faced significant challenges, including declining advertising revenue due to the local business closures from the pandemic and changing shopping patterns away from local retailers, the press release stated. “Across our three newspapers and special publications, we've seen our print ads revenue decline by more than 42% since the end of 2019. Revenue across our entire operation, including print, our seven news websites and three newsletters, has declined by 32%,” Chief Executive Officer Adam Dawes wrote. “All over the country, news organizations are failing or on the verge of failure, primarily due to the steady decline in advertising revenue that has stemmed from the use of digital media,” Executive Chairman of Embarcadero Media Bill Johnson said.
WIKI
4. Nesting and subsections A Config subsection is itself a Config instance - it’s easy to group your keys therefore. Here’s a sample file we’ll be discussing: xx.a.z1 = alpha-xx xx.a.z2 = beta-xx xx.b.z3 = gamma-xx xx.b.z4 = delta-xx [yy] a.z1 = alpha-yy a.z2 = beta-yy [zz] a.z1 = alpha-zz a.z2 = beta-zz There are two ways to deal with sections and hierarchies of settings. Prefixes The crudest is simply by choosing a common prefix on all the keys in the group. Here’s how to extract a sub-section and a sub-sub-section, by means of the startingWith method: val xx: Config = config.startingWith("xx.") // keys a.z1, a.z2, b.z3, b.z4 val xxa: Config = xx.startingWith("a.") // keys z1, z2 INI File Sections If you prefer, you can use ‘INI’-file syntax for the sections instead. If the config file contains [yy] on a line as shown above, all the items below that line are separated out like this: val yy: Config = config.section("yy") // keys a.z1, a.z2 Note that a dot separates the section name from the keys it contains. Therefore, a directly equivalent way of extracting this section is: val yy: Config = config.startingWith("yy.") // keys a.z1, a.z2 Because INI files are supported simply by prepending a section name onto each of the keys following it, with a dot separator, you can choose freely between the section approach and the equivalent startingWith approach. The only difference between the two is that section implies an extra dot whereas startingWith does not.  
ESSENTIALAI-STEM
Ulysses S. Grant • Ulysses Grant grew up in Ohio, unremarkable in his studies and most skills other than riding and taking care of horses. • He studied at the United States Military Academy at West Point and upon graduation was assigned to a post near St. Louis, Missouri. With this group he would fight in the Mexican-American War, and after that war he would get married and be stationed in Detroit, New York, the Oregon Territory and California. • Grant left the Army in 1854 and struggled to make a living. When the Civil War broke out, he took over a group of volunteers and steadily made his way up through the ranks until he was named commander of all Union forces. • Grant was a war hero after the Civil War, and in 1866 he was named general of the armies, only the second man to achieve the rank. (George Washington was the first.) His status as a hero positioned him to be a presidential candidate, especially when he differed from President Johnson’s views. How he defined the office • President Grant was loyal to those who had worked with him in the past. This led to some appointments in his administration of people who were corrupt. Though Grant was never directly implicated, his time in office was plagued by scandal. Successes and failures • From the moment he took office President Grant worked to protect the rights of black citizens, pushing for the ratification of the Fifteenth Amendment, which gave citizens the right to vote no matter their race. He signed the Amendment into law in 1870. • Grant had to deal with an economic downturn after the Civil War, including the Panic of 1873, which led to a depression. He believed in a conservative fiscal approach. • Grant worked to improve treatment of Native Americans but was never able to install changes that lasted beyond his time in office. • “The greatest good to the greatest number is the object to be attained … This requires security of person, property, and free religious and political opinion in every part of our common country, without regard to local prejudice. All laws to secure these ends will receive my best efforts for their enforcement.” – from his first inaugural address March 4, 1869.
FINEWEB-EDU
Lists of English words The following articles list English words that share certain features in common. Lists of words • List of animal names • List of buzzwords • List of English homographs • List of English words with disputed usage • List of English–Spanish interlingual homographs • List of ethnic slurs • List of generic and genericized trademarks • List of Germanic and Latinate equivalents in English • List of self-contradicting words in English • Lists of Merriam-Webster's Words of the Year • Most common words in English With unusual spelling * English words without vowels * List of English words containing Q not followed by U * List of English words that may be spelled with a ligature By formation * List of English apocopations * List of English back-formations * List of portmanteaus * List of retronyms * List of words ending in ology * -graphy * -ism By pronunciation * List of English words without rhymes * List of the longest English words with one syllable * List of names in English with counterintuitive pronunciations * List of onomatopoeias By provenance * List of calques * Lists of English words by country or language of origin By part of speech * List of collective nouns * List of English auxiliary verbs * List of English copulae * List of English determiners * List of English irregular verbs * List of English prepositions * List of eponymous adjectives in English * Post-positive adjective Regionalisms * List of American words not widely used in the United Kingdom * List of British words not widely used in the United States * List of South African English regionalisms * List of words having different meanings in American and British English: A–L * List of words having different meanings in American and British English: M–Z Articles about English word lists * Academic Word List * Collins Scrabble Words * Dolch word list * General Service List * NASPA Word List (formerly Official Tournament and Club Word List) * New General Service List
WIKI
Calculating a date in the future or past Java: Calculating a date in the future or past How to: import java.time.LocalDate; import java.time.temporal.ChronoUnit; public class DateCalculation { public static void main(String[] args) { LocalDate today = LocalDate.now(); // Add 10 days to the current date LocalDate futureDate = today.plusDays(10); System.out.println("Future Date: " + futureDate); // Subtract 2 months from the current date LocalDate pastDate = today.minus(2, ChronoUnit.MONTHS); System.out.println("Past Date: " + pastDate); } } Output could look like this: Future Date: 2023-04-30 Past Date: 2023-02-20 Deep Dive Before Java 8, manipulating dates was a pain. Old classes like java.util.Date and java.util.Calendar were bug-prone and not user-friendly. The java.time package introduced in Java 8 fixed this with well-thought-out classes like LocalDate, LocalTime, and ZonedDateTime. Alternatives? In the pre-Java 8 era, third-party libraries like Joda-Time were common. Nowadays, you could still use them, but standard java.time is recommended because it’s officially part of Java and handles daylight saving, time zones, and leap years elegantly. When coding date calculations, consider time zones if your context needs it. For UTC, use Instant instead of LocalDate. For specific zones, you’d typically use ZonedDateTime. Remember, date-time operations can be chained, like date.minusWeeks(1).plusHours(3), making your code cleaner. See Also 1. The java.time package overview: Oracle Docs 2. Time zone handling with ZonedDateTime: Oracle ZonedDateTime 3. Official date and time patterns for java.time.format.DateTimeFormatter: Oracle DateTimeFormatter
ESSENTIALAI-STEM
Aquatic Therapy There are many benefits to pediatric aquatic therapy, as it encourages physical, sensory, and language development in children with varying needs. The pool setting is a highly motivating and physically supportive environment, so children often engage in tasks they typically would not tolerate. It is an excellent environment for those who are immobile, have poor coordination, or muscle weakness, to work on strengthening, weight-bearing and balance. Such a setting also allows caregivers to safely support their children, as it's easier on the caregiver's body to hold and assist a child in a supportive pool environment than on land. Aquatic therapy provides opportunities to practice functional skills such as dressing, grooming, and hygiene. With movement and multi-sensory input, speech and language work is likely to occur as well. When the child relies on the caregiver in the pool, verbal requests and good eye contact are facilitated. Aquatic therapy oftentimes helps kids who have "plateaued" with a skill on land to make it "over the hump" and achieve that goal, after working on it in the water!!
ESSENTIALAI-STEM
This 1 Stock Is Set to Bounce (with 100%+ Dividend Growth) With Rates Let's give ourselves a double shot of dividend and share-price growth by diving into a group of stocks I guarantee your friends are missing out on. I'm talking about financial firms--particularly those that buy back their shares. We want to get into these stocks now because Fed Chair Jay Powell just took the shackles off lenders when it comes to buybacks and dividends, after the nation's 23 biggest banks aced their "stress tests." (Prior to June 30, the amount a bank could put toward dividends and buybacks couldn't be more than the average of its last four quarters of earnings.) Repurchasers Roar Back This means we're lined up for a surge in bank-stock buybacks--and we love repurchases because they cut the number of shares outstanding, juicing earnings per share (EPS). Those fatter per-share profits are lures for investors, who bid up the share price in response, giving you a fat gain to go with your expanding payout. And we've got a nice shot at buying repurchasers now because there's a rotation happening: namely, after a long period of lagging the market, companies on the frequent-flier buyback plan are finally outperforming. To see what I'm getting at, consider the performance of the Invesco BuyBack Achievers ETF (PKW), the benchmark for share repurchasers. The ETF, which has the largest slice of its portfolio (27%) in financial firms, holds US companies that have bought back 5% or more of their shares in the preceding 12 months. Its top-10 holdings include insurer Allstate (ALL), financial-services firm Ameriprise Financial (AMP) and tech giant Oracle. (ORCL). Buyback Stars Lag ... As you can see above, PKW (in purple) has trailed the market over the last five years. That's an anomaly--with buybacks constantly juicing their earnings, the stocks in PKW's portfolio should have an edge. It's a situation that can't last--and in fact, investors are now fixing their mistake. Since the March 2020 crash, PKW has roared ahead, with most of its gains coming since late last autumn: ... But They're Jumping Back Into the Lead This, by the way, makes now a great time for us to pick up share repurchasers--just as they're showing their "relative strength" against the rest of the market. We're not, however, going to buy PKW--its 0.9% yield isn't enough to get our hearts racing. Which is where our finance plays come in. Playing the Rate Pullback (With an Assist from Share Buybacks) Think back three months. Back then, everyone in the financial world was betting on rising rates. Right on cue, 10-year Treasury rate went the other way. But now looks like a good time to bet that the washout is over. That's because, five years ago, the 10-year yield bottomed at the current level of around 1.3%. For the past decade, in fact, this has served as a reliable floor. Last year was the exception, but I think you'll agree we can throw out most data from the ultra-weird year that was 2020. My bet is that the floor holds and yields bounce. If so, bank stocks would see a nice profit jump as they cash in on the gap between the rate at which they lend to one another (the Fed's near-zero overnight rate) and the rate to which they lend to customers, which is pegged to the (likely-to-bounce) yield on the 10-year. And with a rate rise inflating their profits, newly unchained banks will be eager to reward shareholders with bigger buybacks (and higher dividends!), which would throw a strong lift under their share prices. State Street Corp. (STT), which announced plans to hike its dividend by 10% in the third quarter, after it passed the stress test, shows this pattern in action: STT: Share Count Down, Dividend and Share Price Up As you can see, State Street (current yield: 2.8%), has taken nearly a third of its shares off the market in the last decade. That's helped drive its share-price gains. Its soaring dividend (which has nearly tripled in that time) is also pulling in new investors. State Street's runaway payout growth also means that anyone who bought 10 years ago is yielding a nice 4.8% on their original purchase today. And, like clockwork, State Street's dividend growth has pulled its share price higher with each upward tick, until mid-2018, when the two parted company. As I've written before, share-growth corresponds with payout growth in the long haul, and when a firm's share price falls off the track, it's a clear buying opportunity. State Street's bargain valuation backs that up: as I write, it trades at 13.9-times its last 12 months of earnings, so management has a shot at buying back shares at a great price here, particularly as analysts have pegged EPS at $8.65 in 2022, up 29% from $6.70 in 2020. State Street trades at just 9.7-times that forecast. Where does this leave us? With a nice profit cycle: earnings at financial firms rise with the yield on the 10-year, which boosts their stocks and spurs buybacks and dividend hikes. That, in turn, lifts their stocks further (inflating the yield on your original buy). Rinse and repeat. Urgent: Buy These 7 Buyback Stocks for Imminent Gains (and Payout Hikes!) My top 7 stocks to buy right now are ALL primed for big buybacks and dividend hikes in the coming months. The time to buy them is now--and front-run the rest of the crowd before these investor handouts are announced! Doing so sets you up for a nice pop in your capital gains, and dividend income, as this cash flows to shareholders. The really nice thing is that you can tuck these 7 stocks away forever and they'll keep boosting your income, while their buybacks drive your price upside and help shield you in market crashes. I'm ready to share everything I have on these 7 dividend-growth plays with you now. Go here and get the full story on these 7 stocks, including their names, tickers my complete analysis of their operations and everything you need to know to start profiting with confidence. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Wide Open Spaces (1924 film) Wide Open Spaces is a 1924 American silent comedy film starring Stan Laurel. It is a parody of the 1923 film Wild Bill Hickok and its original title was Wild Bill Hiccough. Gabriel Goober thwarts a stagecoach robbery by Jack McQueen and his gang. Cast * Stan Laurel as Gabriel Goober * Ena Gregory * James Finlayson as Jack McQueen * George Rowe * Noah Young * Sammy Brooks * Billy Engle as Phil Sheridan * Charles Dudley as Abraham Lincoln * Al Forbes as George Armstrong Custer * Mae Laurel as Calamity Jane
WIKI
Olusegun Obasanjo Presidential Library The Olusegun Obasanjo Presidential Library is a library owned by Chief Olusegun Obasanjo, a former President of Nigeria. It is a historic, tourist and academic centre established as a national archive for the preservation of documents and materials used by the president during his tenure as the president of Nigeria. The library is located at Oke Mosan Abeokuta, Ogun State in Nigeria. History The library resembles the presidential library system from the United States. The concept of the Presidential Library started in 1939 by President Franklin D. Roosevelt who donated his official documents for national use. The country passed the Presidential Libraries Act into law in 1955 to formalize this project for a national archive of all American Presidential documents and materials in office. The Olusegun Obasanjo Presidential Library was conceived by Nyaknno Osso in 1988 to immortalize him, and it was actualized after he became the president of the Federal Republic of Nigeria. The idea to establish the Olusegun Obasanjo Presidential Library remained just an idea until 10 years later when Chief Olusegun Obasanjo rose from prison to the State House as Nigeria's second-elected Executive President. He soon established the Office of Presidential Libraries (Libraries, Research and Documentation) with a stated mission to see the OOPL idea translated into reality. On November 12, 2002, the Olusegun Obasanjo Presidential Library Foundation was incorporated as a non-profit organisation to advise, promote and encourage the establishment, growth, and development of the Library, coordinate its activities and provide support for its programmes. The Foundation's board of trustees was charged with mobilising private sector interest and funding to construct, furnish, maintain, and protect the Library complex's buildings and its holdings. Facilities The Presidential Library complex comprises 32 hectares. The archives house 15 million documents, two million books and 4,000 artifacts relating to Obasanjo's two stints in power, and contemporary Nigerian and African history more generally. The complex also includes an open air amphitheater, a 1,000-seat auditorium, a 153-room hotel, several restaurants and bars, a small amusement park, a wildlife park, and an observation point. Structure The presidential library complex is strategically located at the intersection of two major roads that lead into the city of Abeokuta from two different directions, namely, The Presidential Boulevard and The MKO Abiola Way. The first leads to Lagos, and the second leads to Ibadan. The complex's 32 hectares lie near the Federal High Court, the City Stadium, the Federal and State Governments’ Secretariats, a golf course and several high-brow residential estates. The construction of the complex presented many environmental and physical challenges due to the site's unique topographical formation. Almost 47 percent of the site is covered with outcrops of igneous granite rock formation. The shape and outlook of the rock formations are impressive and interesting. A plateau-like formation serves as a natural helipad. Others form hillocks that create an excellent view of the entire complex and major areas of the surrounding cityscape. The site is not all rock. A swift stream empties into a small swamp and was dammed to provide water and electricity. The dam is one of the highlights of any visit to the library complex.
WIKI
PMCC PMCC Search tips Search criteria Advanced Results 1-3 (3)   Clipboard (0) None Journals Authors more » Year of Publication Document Types 1.  Distemper in a Dolphin  Emerging Infectious Diseases  2007;13(12):1959-1961. doi:10.3201/eid1312.070309 PMCID: PMC2876748  PMID: 18258062 Dolphin; distemper; morbillivirus; encephalitis; letter 2.  Rise of oceanographic barriers in continuous populations of a cetacean: the genetic structure of harbour porpoises in Old World waters  BMC Biology  2007;5:30. Background Understanding the role of seascape in shaping genetic and demographic population structure is highly challenging for marine pelagic species such as cetaceans for which there is generally little evidence of what could effectively restrict their dispersal. In the present work, we applied a combination of recent individual-based landscape genetic approaches to investigate the population genetic structure of a highly mobile extensive range cetacean, the harbour porpoise in the eastern North Atlantic, with regards to oceanographic characteristics that could constrain its dispersal. Results Analyses of 10 microsatellite loci for 752 individuals revealed that most of the sampled range in the eastern North Atlantic behaves as a 'continuous' population that widely extends over thousands of kilometres with significant isolation by distance (IBD). However, strong barriers to gene flow were detected in the south-eastern part of the range. These barriers coincided with profound changes in environmental characteristics and isolated, on a relatively small scale, porpoises from Iberian waters and on a larger scale porpoises from the Black Sea. Conclusion The presence of these barriers to gene flow that coincide with profound changes in oceanographic features, together with the spatial variation in IBD strength, provide for the first time strong evidence that physical processes have a major impact on the demographic and genetic structure of a cetacean. This genetic pattern further suggests habitat-related fragmentation of the porpoise range that is likely to intensify with predicted surface ocean warming. doi:10.1186/1741-7007-5-30 PMCID: PMC1971045  PMID: 17651495 3.  Long-term feeding ecology and habitat use in harbour porpoises Phocoena phocoena from Scandinavian waters inferred from trace elements and stable isotopes  BMC Ecology  2007;7:1. Background We investigated the feeding ecology and habitat use of 32 harbour porpoises by-caught in 4 localities along the Scandinavian coast from the North Sea to the Barents Sea using time-integrative markers: stable isotopes (δ13C, δ15N) and trace elements (Zn, Cu, Fe, Se, total Hg and Cd), in relation to habitat characteristics (bathymetry) and geographic position (latitude). Results Among the trace elements analysed, only Cd, with an oceanic specific food origin, was found to be useful as an ecological tracer. All other trace elements studied were not useful, most likely because of physiological regulation and/or few specific sources in the food web. The δ13C, δ15N signatures and Cd levels were highly correlated with each other, as well as with local bathymetry and geographic position (latitude). Variation in the isotopic ratios indicated a shift in harbour porpoise's feeding habits from pelagic prey species in deep northern waters to more coastal and/or demersal prey in the relatively shallow North Sea and Skagerrak waters. This result is consistent with stomach content analyses found in the literature. This shift was associated with a northward Cd-enrichment which provides further support to the Cd 'anomaly' previously reported in polar waters and suggests that porpoises in deep northern waters include Cd-contaminated prey in their diet, such as oceanic cephalopods. Conclusion As stable isotopes and Cd provide information in the medium and the long term respectively, the spatial variation found, shows that harbour porpoises experience different ecological regimes during the year along the Scandinavian coasts, adapting their feeding habits to local oceanographic conditions, without performing extensive migration. doi:10.1186/1472-6785-7-1 PMCID: PMC1781931  PMID: 17229317 Results 1-3 (3)
ESSENTIALAI-STEM
Arlington Oval The Arlington Recreation Ground (known as Arlington Oval) is a soccer stadium in Dulwich Hill, Sydney, Australia with a capacity of 6,000. History The venue was built in 1932 with a natural grass playing surface and a grandstand, on land which had previously been used as a brick works; the brick pits were infilled to greate the green space. Empire Games During the British Empire Games in 1938, women athletes competed at Arlington Oval. The grandstand was used in scenes from the Australian movie The First Kangaroos, which was named after the Australian Rugby League's inaugural international tour of England. Revamped venue In mid-August 2014, Arlington Oval was upgraded for $2.15 million with an installion of new pitch which replaced the existing natural grass surface which was in poor condition before then. The stadium was also upgraded with new lights, fencing and other general improvements.
WIKI
-- London Landlords Facing Rents of Zero Turn Offices Into Condos More people will be making their homes among the banks and insurance companies of central London as a shrinking financial industry and the prospect of leasing out buildings for free prompts landlords to convert offices into luxury apartments. Developers including Axa Real Estate Investment Managers Ltd., Berkeley Group Holdings Plc (BKG) and Heron International Inc. also plan to build homes in the heart of Britain’s financial services industry, known as the Square Mile, after purchasing obsolete commercial buildings in the area. “The fringes of the City are struggling in terms of letting secondhand buildings,” said Anthony Duggan, head of real estate research at Deloitte LLP. “There will be a number of developments looking at alternative uses.” London has seen demand for offices slump after banks cut more jobs in the U.K. than in any other country last year. Rents in the City of London will fall 4 percent this year, compared with earlier predictions of a 6.1 percent increase, JPMorgan Chase & Co. said in a Jan. 11 note. Values will drop 7.3 percent in 2012, the bank said. Axa is seeking older offices or partly developed “brownfield” sites on the fringes of the financial district to turn into housing. Berkeley plans to renovate a derelict office property near Moorgate into 90 residences. Heron is building a 36-story residential tower near the Barbican, and Hammerson plans to develop 253 apartments near Liverpool Street station. Finance Jobs Lost Employment in the Square Mile dropped 8.5 percent last year and it will remain below 1998 levels until 2014, according to the Centre for Economics & Business Research Ltd. The cutbacks and the amount of aging space give City tenants greater bargaining power on rents with owners of older, empty office blocks. About 54 percent of office space in the City of London and on its fringes is more than 15 years old, meaning it can no longer be marketed as “prime,” according to research from DTZ Holdings Plc (DDTZ) . Some landlords may choose to lease space for nothing to avoid a charge on empty buildings, Michael Marx, Chief Executive Officer of Development Securities Plc, said in an interview. “I’m feeling more and more robust about that forecast as time goes past,” he said. Since April 2008, the U.K. government has required office property owners to pay business taxes, equal to those usually owed by tenants, on buildings that remain vacant for more than three months. Axa Shops Around Axa Real Estate plans to build homes and offices that will be worth at as much as 100 million pounds ($158 million) when completed Harry Badham, U.K. director of development, said in an interview. The company, which has 40 billion euros ($52.4 billion) of property under management, is looking at buildings and sites in Clerkenwell, Farringdon and Shoreditch. “Residential conversion of older buildings can be an obvious route to value,” Badham said. Purchases would be by its Development Venture III fund, which has raised 588.5 million euros to date to buy property across Europe , he said. A separate Axa Real Estate fund is developing an office building at 1 St Paul’s, close to the cathedral, that will include 10,000 square feet (929 square meters) of homes as well as 60,000 square feet of offices and 20,000 square feet of retail, the insurer said in a statement. “There’s more value in going residential,” said Badham, who said home values were 10 percent to 15 percent higher at St. Paul’s than that for offices. Axa Real Estate may retain flats and lease them to a serviced apartment owner. Cheaper Than Knightsbridge Home prices in the City of London typically range from 650 pounds to 1,350 pounds a square foot, Neil Chegwidden, residential research director at Jones Lang LaSalle Inc., said in October. Knightsbridge has the highest average price per square foot in London at 2,007 pounds, followed by Belgravia at 1,982 pounds and Mayfair at 1,960 pounds, broker Savills Plc said in an October report. The average two-bedroom apartment in the U.K. is about 800 square feet (74.3 square meters), according to 2008 data from Nationwide Building Society . That means a property that size in the City of London is worth 520,000 pounds to 1.08 million pounds based on Jones Lang’s valuations. Luxury home prices in central London have increased for 14 consecutive months through December, Knight Frank LLP said Jan. 9, making conversion to homes more attractive to owners of empty buildings. Roman House Berkeley, the U.K.’s largest homebuilder by market value, won approval to renovate Roman House, a derelict office near Moorgate, into a 90-apartment building in December. It’s seeking more empty structures or brownfield land in the City to convert into homes, Berkeley (Capital) Plc managing director Piers Clanford, said in an interview. “There’s interest from the City for a pied a terre and somewhere to stay during the week,” Clanford said. “People work long hours and that’s a target market us.” Renovating Roman House, which contains a protected Roman wall, rather than building from scratch, saved Berkeley as much as six months in construction time, he said. For other developers, sites will need to be demolished and rebuilt because their layout is unsuitable for homes. When refurbishment costs reach about 160 pounds a square foot, they equal the cost of developing a site, said Iain Parker, head of European offices at real-estate adviser Davis Langdon . ‘Moons Aligning’ “The environment is almost more suitable for refurbishment and reinvention,” Parker said. “It’s almost like all of the moons are aligning in terms of cost, money being tight, the sustainability agenda” and planning. Heron demolished a fire station when it tore down the Barbican Centre’s service building to develop The Heron , a 36- story residential tower. The project is less than one kilometer (0.62 miles) from Berkeley’s development and Heron is seeking what it says will be the highest home prices ever charged in the City at about 1,600 pounds a square foot. New residential developments will deliver better quality than renovating old offices into homes, though winning planning approval can be difficult, said Paul Cheshire, professor of economic geography at the London School of Economics. “You really should be building houses in the first place because what you’re going to end up with is second-class houses or apartments,” by converting offices, Cheshire said in an interview at the university. “But the planning system may make it very difficult.” Residents Rights The fringe of the Square Mile is more suitable for residential conversion than the center because housing would “sterilize” the surrounding area, said Ken Shuttleworth of Make Architects. Residents would have the right to impede future development if it blocks out sunlight, and that would reduce the value of neighboring buildings, he said. Brookfield Office Properties Inc., lower Manhattan ’s biggest office landlord, is also looking to buy obsolete City office blocks for conversion to flats, said Martin Jepson, senior vice president for development and investment at the New York-based company. “Redundant offices are the natural provider of future residential land,” said Ian Marris, partner of London residential development at Knight Frank LLP, by phone. “There’s an acute shortage of supply of new-build homes across all of central London.” Office Conversions From 2007 through 2011, landlords began turning 19 commercial buildings in the Square Mile into homes, according to research by Savills and London Residential Research. Of those, 14 refurbishments were completed and all the apartments in them have been sold, Savills said. Two of the five projects still under construction are new build. “The land registry doesn’t report residential index figures for the City because it’s so small,” Lucian Cook, director of residential research said in an interview today. “Scarcity is one of the biggest drivers of price in prime central London.” The City of London, which has restricted the majority of homes to the Barbican area, had about 11,677 residents in the middle of 2010, according to the Office for National Statistics . That’s likely to increase, according to David Wootton, the lord mayor of London. “We would like to have more residences,” Wootton said in an interview. “It’s a matter of balance and making sure that small pockets of residential don’t disrupt the business cluster.” Lower Manhattan A similar phenomenon has taken place in lower Manhattan, where almost 16 million square feet of space, mostly in older buildings deemed obsolete for offices, have been or are slated to be converted to housing between 1995 and 2013, according to the Alliance for Downtown New York , an organization representing area businesses. “The goal in lower Manhattan has always been to keep it a globally competitive business address,” said Elizabeth Berger, the alliance president. Beginning in the 1990s, “you saw both the conversion of obsolete office space and the creation of new residential, and the community has grown exponentially. I’m a lower Manhattan resident for 30 years, and when I moved here, about 10,000 people lived below Chambers Street,” she said. The most recent population estimate is 56,000, according to the alliance. On Hold Hammerson Plc (HMSO) , the U.K.’s third-largest publicly traded developer, delayed plans to develop an office block at Principal Place on the edge of the City after talks to lease part of the building to CMS Cameron McKenna LLP prior to construction failed, according to a Jan. 16 statement. The project was canceled to avoid exposing shareholders “to excessive risk,” Hammerson Chief Executive Officer David Atkins said in the statement. Hammerson still plans to develop a residential tower with 253 apartments at the site near Liverpool Street rail station and is in talks with companies to develop the tower in a joint venture. One of the companies is Manhattan Loft Corp., its chairman Harry Handelsman said in an interview. “It’s a sexy opportunity,” said Handelsman, who masterminded the conversion of a disused building at Kings Cross railway into a luxury hotel and residences. “Towers are still a bit of a novelty in London. It’s a way of sustaining growth of a city. It needs to adapt to the high-rise model.” To contact the reporters on this story: Neil Callanan in London at ncallanan@bloomberg.net ; Christopher Spillane in London at cspillane3@bloomberg.net To contact the editor responsible for this story: Andrew Blackman at ablackman@bloomberg.net
NEWS-MULTISOURCE
Better Buy: Realty Income vs. Store Capital Real estate investment trusts are a staple in income investors' portfolios because they're required to distribute at least 90% of their income as dividends, producing yields well in excess of the market's average. And they thrive best when interest rates are falling, as their costs to borrow fall but the rents they collect do not. Realty Income (NYSE: O) and Store Capital (NYSE: STOR) are both REITs in the net-lease space (more on that shortly), but with very different histories. One has existed for half a century and has a steady record of increasing dividends -- in fact, it's trademarked the name "the Monthly Dividend Company." That's Realty Income. The other went public in 2014, but has the endorsement of legendary investor Warren Buffett. That's Store Capital. Which is better for your portfolio? The net-lease REIT model Generally speaking, there are two basic types of leases for retail REITs. The typical type is the gross lease, where where the tenant simply writes a monthly rent check and the REIT is responsible for maintenance and taxes. If you've ever rented an apartment, you signed a gross lease. The landlord paid the property taxes, and if you had any issues with the apartment, you called the superintendent. Gross leases are generally higher-risk for the landlord, but they usually have higher rents. The other type is the net-lease model, where the tenants don't just pay rent -- they also cover costs like maintenance, insurance, and taxes. These leases are generally longer-term and include built-in rent increases. These arrangements put most of the risk on the tenant. And this is how both Realty Income and Store Capital operate. Realty Income and Store Capital focus on sale-and-leaseback transactions in which the owner of a retail development sells it to the REIT, which then leases it back to the former owner. This provides the seller with cash it can use for expansion or operations, and is more efficient since REITs can often borrow on better terms than other businesses. In many ways, net-lease REITs are really in the financing business (which is what a sale-and-leaseback transaction essentially is). Image source: Getty Images. You just have to be there Both companies have taken steps to avoid some of the "Amazon effect" that has been plaguing retail. They focus on tenants whose business models are relatively recession-proof and insulated from online competition. Service providers are ideal -- for example, fitness centers, child care, and medical offices. Retailers with less of a focus on discretionary spending also fit the bill -- like drug stores, convenience stores, truck stops. Realty Income's top tenant is Walgreens, which accounts for about 6% of rental revenue, while Store Capital's is Midwestern discount chain Fleet Farm, at less than 3%. Given that the business models of both companies are relatively similar, what are their differences? The biggest is size: Realty Income has 6,843 properties some of which are in international markets, while Store Capital has 2,504, all of them domestic. Realty Income's market cap is proportionally larger as well -- more than three times the size of Store Capital's. Another difference is tenant mix. While retail and services are key for both companies, Realty Income gets about 17% of its rental income from industrial, office, and agriculture. FedEx is a major non-retail / service tenant. About 16% of Store Capital's rent comes from manufacturing and metal fabrication. Catering to businesses that depend on in-person visits is a double-edged sword today, with fear of the coronavirus (COVID-19) causing people to avoid going out in public and to pull back on discretionary spending. Store Capital takes a greater share of its rent from tenants that are more likely to be affected -- restaurants, child care, health clubs, and theaters and other entertainment centers will be some of the first businesses to feel the pain, and these contributed roughly 33% of Store's total rent last year. Realty Income was a little more insulated, coming in around 25%. On the other hand, if you want to Amazon-proof your business, in-person services are probably the surest way, and this was likely one of the reasons Buffett's team at Berkshire Hathaway bought a nearly 10% stake in Store Capital in 2017. Buffett is famous for investing in companies with durable models that will weather all economic cycles, along with good corporate governance, and presumably Store Capital fits the bill. So which should you buy? As you might expect when comparing a company that's more than 50 years old will one that's less than 10, size and revenue growth are key differences between Realty Income and Store Capital. But other key metrics are closer. Here's a quick look: COMPANY MARKET CAP PRICE-TO-FFO RATIO REVENUE GROWTH RATE DIVIDEND YIELD FFO PAYOUT RATIO Realty Income $25 billion 22 12% 3.6% 82% Store Capital $7 billion 15 22% 4.6% 70% Data Source: Company filings. On a valuation basis, Store Capital gets the nod as the better buy. Its dividend yield is higher, its payout ratio is lower, its growth rate is almost twice Realty Income's, and it trades at a cheaper multiple of funds from operations (FFO -- the REIT equivalent of earnings). Realty Income probably trades at a higher multiple due to its greater size and lower exposure to manufacturing. Store also has a slightly higher interest coverage ratio, 3.6 to 2.8, which means it has more leeway if FFO falls. Both companies are well-run and should provide the investor with income and capital preservation, so it is hard to go wrong with either, especially in the current environment of falling interest rates. At the end of the day, it comes down to investment tolerance. Realty Income is a dividend machine -- it's raised its dividend every quarter going back to late 1997 -- with good insulation from the economic swings of the market. It isn't necessarily cheap, but you are paying for safety and a track record. Store Capital is so new it wasn't around during the past recession. However, it has about the strongest investor endorsement there is in Berkshire's ownership. Store trades at a cheaper multiple, and it has faster growth and a better dividend. That said, if more people stay at home to prevent the spread of COVID-19, the company could more vulnerable. 10 stocks we like better than Realty Income When investing geniuses David and Tom Gardner have a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* David and Tom just revealed what they believe are the ten best stocks for investors to buy right now... and Realty Income wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of December 1, 2019 John Mackey, CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool’s board of directors. Brent Nyitray, CFA has no position in any of the stocks mentioned. The Motley Fool owns shares of and recommends Amazon, Berkshire Hathaway (B shares), FedEx, and STORE Capital and recommends the following options: long January 2021 $200 calls on Berkshire Hathaway (B shares), short January 2021 $200 puts on Berkshire Hathaway (B shares), and short March 2020 $225 calls on Berkshire Hathaway (B shares). The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
17.05 - Example: Using MANIFESTFILE('file_name') and MANIFESTONLY('TRUE') - Advanced SQL Engine - Teradata Database Teradata Vantage™ - Native Object Store Getting Started Guide Product Advanced SQL Engine Teradata Database Release Number 17.05 Release Date January 2021 Content Type Programming Reference Publication ID B035-1214-175K Language English (United States) The following creates a manifest file on external object store. First, create a database table containing manifest file values, then writes the rows in the table to a manifest file on external object store. 1. If not already done, create a manifest table called ManifestTbl in the database to store the manifest values. See Creating a Manifest File Without Writing Separate Objects to the Object Store. 2. Insert data into ManifestTbl: INSERT INTO ManifestTbl VALUES ('/S3/s3.amazonaws.com/ie-writenos-bucket/20180701/ManifestFile/object_33_0_1.parquet', 2803); INSERT INTO ManifestTbl VALUES ('/S3/s3.amazonaws.com/ie-writenos-bucket/20180701/ManifestFile/object_33_6_1.parquet', 2733); INSERT INTO ManifestTbl VALUES ('/S3/s3.amazonaws.com/ie-writenos-bucket/20180701/ManifestFile/object_33_1_1.parquet', 3009); INSERT INTO ManifestTbl VALUES ('/S3/s3.amazonaws.com/ie-writenos-bucket/20180701/ManifestFile/object_33_7_1.parquet', 2591); INSERT INTO ManifestTbl VALUES ('/S3/s3.amazonaws.com/ie-writenos-bucket/20180701/ManifestFile/object_33_2_1.parquet', 2725); 3. Write the data in ManifestTbl to the manifest file on external object store: SELECT * FROM WRITE_NOS_FM ( ON ( SELECT * FROM ManifestTbl ) USING LOCATION('YOUR-STORAGE-ACCOUNT/20180701/ManifestFile2/') STOREDAS('PARQUET') MANIFESTFILE('YOUR-STORAGE-ACCOUNT/20180701/ManifestFile2/manifest2.json') MANIFESTONLY('TRUE') ) AS d ; Replace the LOCATION of YOUR-STORAGE-ACCOUNT/20180701/ManifestFile2/ with the URI to the external object store location where you want to write the manifest file. Replace the MANIFESTFILE location of YOUR-STORAGE-ACCOUNT/20180701/ManifestFile2/manifest2.json with the URI to the manifest file on external object store. MANIFESTONLY('TRUE') writes only a manifest file to external storage; no data objects are written: • Use this option to create a new manifest file in the event that a WRITE_NOS operation fails due to a database abort or restart, or when network connectivity issues interrupt and stop a WRITE_NOS operation before all data has been written to external storage. • The manifest is created from the table or query result set that is input to WRITE_NOS. The input must be a list of storage object names and sizes, with one row per object. 4. You can view the manifest file on external storage using commands from the command line of your external object store. The manifest file contains the following information: {"entries":[{"url":"s3://ie-writenos-bucket/20180701/ManifestFile/object_33_2_1.parquet","meta":{"content_length":2725}}, {"url":"s3://ie-writenos-bucket/20180701/ManifestFile/object_33_6_1.parquet","meta":{"content_length":2733}}, {"url":"s3://ie-writenos-bucket/20180701/ManifestFile/object_33_7_1.parquet","meta":{"content_length":2591}}, {"url":"s3://ie-writenos-bucket/20180701/ManifestFile/object_33_0_1.parquet","meta":{"content_length":2803}}, {"url":"s3://ie-writenos-bucket/20180701/ManifestFile/object_33_1_1.parquet","meta":{"content_length":3009}}] }
ESSENTIALAI-STEM
5 Replies Latest reply on Jul 24, 2006 9:01 AM by Mr Black Question about XMLFormat mkane1 Level 1 I am having some problems outputting text data stored in SQL databases into XML files, because of "invisible" characters in the text. Using the XMLFormat tag, i.e. XMLFormat(string), does not work in all cases. This has happened several times. Below are details for the most recent case. In the code window I have put the entire CFML and text showing the problem. I have a SQL Server 2000 table named Organizations. Among other fields are UID (an int field, not null) and OrgName (varchar 120, not null). The query is simple. If I loop over the query and output each value into a select box as options, no problem. But when I try to put them into an XML file to send someone, I get an error with 1 record. It seems to be caused by an invisible (to me, at least) character. My questions: Why doesn't the XMLFormat function handle these characters? I haven't yet installed the 7.0.2 updater. I looked through the relase notes but have not found a reference to XMLFormat. How can I find such characters? Is there something I can do to prevent this problem? Thanks! • 1. Re: Question about XMLFormat jdeline Level 1 You could use a ReReplace( ) function to replace all characters less than ASCII 32 and greater than ASCII 127. • 2. Re: Question about XMLFormat mkane1 Level 1 Thanks for the reply, jdeline. Using REReplace or some other function as you suggest seems inefficient to me. Why doesn't XMLFormat take care of it? I realize this may be a question for the Adobe team. The help for XMLFormat says it escapes "High ASCII characters in the range 128 - 255". If characters less than 32 are a known problem, wouldn't it make more sense to have XMLFormat handle it? In fact, I would think that a function such as XMLFormat would actually **enforce** XML Format, at least as best as it could: if a character is not known to be acceptable in an XML string, then escape it. Sort of the "deny all, allow these" versus "allow all, deny these". The XML specifications are fairly well-defined. And finicky. In any event, thanks again for the reply! • 3. Re: Question about XMLFormat Mr Black Most likely XMLFormat() has nothing to do with this error. As it looks to me, this is a charset/encoding problem. Your non-ASCII characters got corrupted in the browser, because [maybe] of the wrong encoding specification. Do you specify encoding for your XML in Content-Type header? Valid XML can contain any characters except those used for XML mark-up (like < and >). Those are escaped. The rest should be properly encoded (UTF-8, for example), but I beleive CF does it for you for free. • 4. Re: Question about XMLFormat mkane1 Level 1 Mr Black, thanks for the reply. Perhaps it is a semantic distinction, whether the problem has to do with XMLFormat or the encoding process. From my point of view, I epxect CF to handle it. I have some "raw material", whether it's rows from a query or text read in from a file, whatever. At some point, I decide "Yes, put this string into the space between an opening and closing element". I use the XMLFormat function to make the string acceptable to the XML specification. I then have CF make the XML document using the cfxml tag. Whether I specify the encoding or not, I expect CF to create a well-formed XML object. It should not be including "illegal" characters, or being confused by them in any way. In this case, I can pass the offending string to an OPTION tag, or display it in a cfoutput block, use it in an SQL operation via ODBC (actually, JDBC which is even more picky than ODBC), write it to a text file, seemingly anything one can do with a string, without problem. Except for putting it into an XML element. I believe CF shouild handle this. • 5. Re: Question about XMLFormat Mr Black Level 1 Just try to change this line: <cfcontent type="text/xml"> to this: <cfcontent type="text/xml; charset=utf-8"> See, if it makes any difference.
ESSENTIALAI-STEM
Getting Data In Need help writing input stanza for maillog Jarohnimo Builder I'm having a hard time getting my stanza setup correctly. I basically want to monitor the maillog directories (maillog + maillog-date) and choose the best appropriate sourcetype However the archive maillog directories aren't coming in Can someone spin me In the right direction on how to better write this stanza? Please resist the urge to send me a splunk doc link as I've been rummaging through those for a while.. it's not clicking   Can someone please help me in rewriting a better stanza [monitor:///var/log] Whitelist =(maillog$) disabled = false sourcetype = maillog Index = linux Currently it's not working where it's pulling in the archive logs. So anything with a date after maillog isn't getting pulled I think I tried [monitor:///var/log/maillog*] without the whitelist but it isn't working Labels (1) 0 Karma brent_weaver Builder Hey there. Check Splunk's _internal index for any nuggets of info on this issue. This is assuming that the internal logs are being forwarded. If not look at the splunkd.log file on the host that has the input configured. Splunk btool command may be of use to ensure that this config is even being read or being over ridden somehow. If you are editing the inputs.conf manually make sure that splunkd can read the inputs.conf file. Just some things that come to mind... 0 Karma isoutamo SplunkTrust SplunkTrust Have you check permission of files and directories, so your splunk user can read those or are you running splunk as root (security risk)? r. Ismo 0 Karma Jarohnimo Builder Hi, I do have read permission as other logs are coming in   Could you please tell me if: maillog    Is the correct sourcetype for /var/log/maillog   I saw a few choices but it's unclear what's the best to use. Sendmail_syslog I thought looked promising but there I am guessing again  0 Karma Get Updates on the Splunk Community! Enter the Splunk Community Dashboard Challenge for Your Chance to Win! The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ... .conf24 | Session Scheduler is Live!! .conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ... Introducing the Splunk Community Dashboard Challenge! Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...
ESSENTIALAI-STEM
ASML reports better Q3 sales, China growth to continue despite U.S. AMSTERDAM, Oct 14 (Reuters) - ASML Holding NVASML.AS, the semiconductor equipment maker, reported on Wednesday better than expected earnings for the third quarter, saying it saw double digit growth in 2021. The company reported sales of 3.96 billion euros, ahead of analyst estimates of 3.7 billion euros, and net profit of 1.06 billion euros. ASML CFO Roger Dassen forecast sales of 3.7 billion euros in the fourth quarter and said the company expected "low double digit" growth in 2021. U.S. trade curbs on sales to some Chinese companies will mean ASML must apply for a license to sell older-generation equipment to those companies. Still, he raised his forecast for sales to China this year from around 1 billion euros to "a little over a billion" in 2020. In the third quarter of 2019, ASML reported net profit of 627 million euros on sales of 3.0 billion euros. (Reporting by Toby Sterling; Editing by Clarence Fernandez) ((toby.sterling@thomsonreuters.com; +31 20 504 5002;)) The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Arizona Democrat to get treatment for alcohol dependence after suffering fall | TheHill Rep. Ann KirkpatrickAnn KirkpatrickArizona Democrat to get treatment for alcohol dependence after suffering fall House holds moment of silence to mark anniversary of 2011 Tucson shooting Adam Schiff's star rises with impeachment hearings MORE (D-Ariz.) announced Wednesday that she will be taking a hiatus as she undergoes treatment for “alcohol dependence." The announcement came after Kirkpatrick, 69, had a "serious" fall, the “underlying cause” of which she said was her dependence on alcohol. She must undergo physical therapy for the fall and is expected to fully recover. Next week she will begin treatment for her alcoholism. "I am finally seeking this help after struggling to do so in the past, and I am ready to admit that I, like countless other Americans, suffer from this disease,” she wrote in a statement. “Hard work and determination — which have brought me success in life — have not been enough to win this battle. Other than being a wife, mother, and grandmother, the most important job in the world to me is representing my fellow Arizonans. I know I must get better in order to do my best in each of these roles.” In the statement Kirkpatrick did not say how long she expects to be away from Capitol Hill but made clear both her district office in Tucson and Capitol office will continue to run as usual, and her stance on votes will be submitted for the Congressional Record. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2020 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
The Role of CNC Machining in Producing Resistant Metals--cncmass.com(how to strip chrome wheels Rod) • Time: • Click:6 • source:DAHLER CNC Machining Introduction: CNC machining has revolutionized the manufacturing industry with its precise and efficient production capabilities. One area where CNC machining shines is in the creation of resistant metals, which are essential for numerous applications that require durability and strength. In this article, we will explore how CNC machining contributes to the production of resistant metals. Understanding Resistant Metals: Resistant metals refer to materials that possess superior resistance against various external forces such as corrosion, heat, oxidation, wear, and impact. They often exhibit exceptional mechanical properties, making them suitable for critical components subjected to extreme conditions. Examples of resistant metals include stainless steel, titanium, nickel-based alloys, tungsten, and zirconium. The CNC Machining Process: Computer Numerical Control (CNC) machining involves using computer-controlled machines to precisely shape and mold raw materials into desired forms. This automated process eliminates human errors and allows for a high degree of accuracy. Let's delve into the different stages involved in producing resistant metals through CNC machining: 1. Design and Modeling: Before starting the CNC machining process, engineers create a 3D model or CAD design of the desired metal component. This ensures accurate representation and aids in identifying any potential issues upfront. 2. Material Selection: Choosing the right material is vital when producing resistant metals. Considering factors like chemical composition, mechanical properties, and environmental compatibility helps determine the ideal material for the desired application. 3. Tooling Selection: Another crucial aspect is selecting appropriate cutting tools for machining operations. Carbide inserts, ceramic tools, and diamond-coated cutters are commonly used for working with resistant metals due to their hardness and durability. 4. CNC Programming: Once the design and tooling selections are finalized, CNC programmers generate the machining instructions using software programs like Computer-Aided Manufacturing (CAM). These instructions control the movements of the machine, ensuring precise cuts at specific angles and depths. 5. Machining Operations: CNC machines use various operations to shape the raw material into the desired form. These include turning, milling, drilling, grinding, and threading. Each operation is carefully programmed to remove excess material, achieve smooth finishes, and create intricate features characteristic of resistant metals. Benefits of CNC Machining in Producing Resistant Metals: Employing CNC machining techniques for producing resistant metals offers several advantages: 1. Precision: CNC machines can produce complex shapes with extreme precision, ensuring tight tolerances and maintaining consistent quality throughout production. 2. Efficiency: The automated nature of CNC machining allows for faster production times, reducing lead times and increasing overall productivity. 3. Versatility: CNC machines can work with a wide range of resistant metals, offering flexibility in material selection based on specific application requirements. 4. Enhanced Surface Finishes: CNC machining provides superior surface finishes, minimizing the need for additional polishing or refining processes. 5. Cost-Effectiveness: Although initial setup costs may be higher due to equipment and programming investments, CNC machining reduces labor costs associated with traditional manufacturing methods over time. Applications of Resistant Metals: Resistant metals find extensive applications across industries: 1. Aerospace: Aircraft components require materials that can withstand high temperatures, corrosion, and mechanical stress. 2. Automotive: Resistant metals are essential for critical automotive parts like engine components, exhaust systems, and brake discs. 3. Medical Equipment: Implants, surgical instruments, and diagnostic devices rely on resistant metals for their durability and biocompatibility. 4. Oil and Gas Industry: Resistant metals are crucial for equipment exposed to harsh environments, such as offshore drilling rigs and pipelines. Conclusion: CNC machining plays a significant role in producing resistant metals, enabling manufacturers to meet stringent quality standards and cater to diverse industrial needs. By harnessing the precision, efficiency, and versatility offered by CNC technology, the production process becomes streamlined, leading to robust and reliable resistant metal components for a range of applications. CNC Milling CNC Machining
ESSENTIALAI-STEM
The Precambrian emergence of animal life: a geobiological perspective Authors • T. Dubuc, M, Dunford, P. McAndrew, J. Padilla-Gamiño, B. Studer, and K. Weersing contributed equally to this work. Corresponding author: Eric J. Gaidos, Tel.: 1 808 956 7897; fax: 1 808 956 5512; e-mail: gaidos@hawaii.edu. ABSTRACT The earliest record of animals (Metazoa) consists of trace and body fossils restricted to the last 35 Myr of the Precambrian. It has been proposed that animals arose much earlier and underwent significant evolution as a cryptic fauna; however, the need for any unrecorded prelude of significant duration has been disputed. In this context, we consider recent published research on the nature and chronology of the earliest fossil record of metazoans and on the molecular-based analysis that yielded older dates for the appearance of major animal groups. We review recent work on the climatic, geochemical, and ecological events that preceded animal fossils and consider their portent for metazoan evolution. We also discuss inferences about the physiology and gene content of the last common ancestor of animals and their closest unicellular relatives. We propose that the recorded Precambrian evolution of animals includes three intervals of advancement that begin with sponge-grade organisms, and that any preceding cryptic fauna would be no more complex than sponges. The molecular data do not require that more complex animals appeared well before the recognized fossil record; nor, however, do they rule the possibility out, particularly if the interval of simpler metazoan ancestors lasted no more than about 100 or 200 Myr. The geological record of abrupt changes in climate, biogeochemistry, and phytoplankton diversity can be taken to be the result of changes in the carbon cycle triggered by the appearance and diversification of metazoans in an organic carbon-rich ocean, but as yet no compelling evidence exists for this interpretation. By the end of this cryptic period, animals would already have possessed sophisticated systems of cell–cell signalling, adhesion, apoptosis, and segregated germ cells, possibly with a rudimentary body plan based on anterior–posterior organization. The controls on the timing and tempo of the earliest steps in metazoan evolution are unknown, but it seems likely that oxygen was a key factor in later diversification and increase in body size. We consider several recent scenarios describing how oxygen increased near the end of the Precambrian and propose that grazing and filter-feeding animals depleted a marine reservoir of suspended organic matter, releasing a microbial ‘clamp’ on atmospheric oxygen. Ancillary
ESSENTIALAI-STEM
Donald Clough Cameron Donald Clough Cameron (December 21, 1905 – November 17, 1954) was an American writer of detective novels and comic books. He is credited with creating several supporting characters and villains in DC Comics' line of Batman comic books. Career Donald Clough Cameron graduated from St. John's Military Academy in Delafield, Wisconsin, and became a crime reporter for the Detroit Free Press in 1924 and later worked for the Windsor Star in Windsor, Ontario. In the 1930s, he settled in New York City and became a writer, publishing short stories, sometimes signed with the pseudonym C.A.M. Donne, for pulps and comic books. Between 1939 and 1946, Cameron wrote six detective novels, three of which featured the young criminologist and detective Abelard Voss, who liked to take philosophical reflections during his investigations. The sixth and final novel by Don Cameron, White for a Shroud, features the character of Andrew Brant, the only journalist in a local newspaper, who investigates a series of murders committed in an American town isolated from the outside world by a snowstorm. Cameron made several notable contributions to the Batman mythos. The story "Here Comes Alfred!" in Batman #16 (April–May 1943) by Cameron and Bob Kane introduced Alfred as Bruce Wayne's butler. Cameron co-created Tweedledum and Tweedledee in Detective Comics #74 (April 1943) and the Cavalier in Detective Comics #81 (Nov. 1943). His story "Brothers in Crime!" in Batman #12 (Aug.–Sept. 1942) featured "Batman's Hall of Trophies" a precursor to the Batcave, which debuted in Detective Comics #83 (Jan. 1944). Cameron and Win Mortimer created Batman's Batboat in Detective Comics #110 (April 1946). In addition, Cameron was one of the writers of the Batman comic strip for the McClure Newspaper Syndicate. His work on Superman includes creating the Toyman in Action Comics #64 (Sept. 1943) and writing the earliest Superboy stories in More Fun Comics. Cameron created Liberty Belle in Boy Commandos #1 (Winter 1942) and Pow Wow Smith in Detective Comics #151 (Sept. 1949). He was one of the writers of DC's Hopalong Cassidy licensed series based on the film and TV Western hero. Other comic book work by Cameron includes Aquaman, Congo Bill, and the Western character Nighthawk. Donald Clough Cameron died of cancer in New York City in November 1954. His final comics story "The Giant Eagle Robberies" was published posthumously in Hopalong Cassidy #99 (March 1955). Other similarly-named creators Donald Clough Cameron should not be confused with the similarly named Don Cameron, an artist who was also active during the Golden Age of Comic Books, nor with an unrelated Don Cameron, a comics artist who worked on the Cyberella series in the 1990s. Comic books * Action Comics #58, 61–68, 70–71, 77–83, 85–86, 88–90, 99–100, 102, 107, 109, 119, 148, 151, 192 (1943–1954) * Adventure Comics #91, 103–121, 123–128, 132, 138, 141, 147–149, 151, 154, 156, 158, 160–166, 168, 171–174 (1944–1952) * Batman #12–17, 19–21, 23–30, 32, 36, 38, 46 (1942–1948) * Boy Commandos #1–2, 6–8, 12–13, 16, 27–28, 30, 33 (1942–1949) * Detective Comics #70, 73–75, 79, 81–83, 86, 89, 96, 98–101, 105–111, 114–117, 131, 151–152, 154–156 (1942–1950) * Hopalong Cassidy #86–90, 92–99 (1954–1955) * More Fun Comics #101–107 (1945–1946) * Star-Spangled Comics #20–49, 51–68 (1943–1947) * Superboy #6, 11, 19 (1950–1952) * Superman #23–24, 26–44, 47, 49–50, 53, 60 (1943–1949) * Western Comics #2, 6, 15, 18, 21–28, 30, 32–42, 44–47 (1948–1954) * World's Finest Comics #12–13, 15, 17–21, 23, 25, 28–31, 33–34, 45, 47–48, 61, 63 (1943–1953) Abelard Voss series * Murder's Coming (1939) * Grave Without Grass (1940) * And So He Had to Die (1941) Other novels * Death at Her Elbow (1940) * Dig Another Grave (1946) * White for a Shroud (1947) As Donald Clough Cameron * Mood for Murder (1939) * In the Dark (1940) * Benjy Takes a Holiday (1944) * Attar of Homicide (1944) As C.A.M. Donne * Isle of Ghouls (1935) * Marriage for Murder (1937) * Vengeance of the Severed Hands (1937) * Judgment of the Ghost God (1937) * A Bride for the General (1939) * White Man's Magic (1941) * Rendezvous (1941) * No More Raids (1941)
WIKI
今天同事问我用python来实现ftp上传文件是否熟悉,因为之前没接触过,所以现在研究下,通过参考了一些文档,简单编写了code,已测试通过!Ftp服务端相关的配置我这里就不啰嗦了!希望对大家有所帮助! python代码如下: #!/usr/bin/env python #-*- coding:utf-8 -*- #author:icyboy from ftplib import FTP import os,sys,string,datetime,time #import traceback hostaddr = '192.168.2.58' #ftp地址 username = 'jiunile' #用户名 password = '123456' #密码 port = 21 #端口号 rootdir_local = '/Users/icyboy/upload/' #本地目录 rootdir_remote = './' #远程目录,注意如果ftp是chroot的话就不能写/home/jiunile/xxx/,默认进去就是/目录了,只需要写xxx/即可,不然会提示550没权限 local_file = '/Users/icyboy/upload/1.txt' #本地文件 remote_filename = '1.txt' #保存到远程目录文件名 def login(remotedir='.'): try: ftp.set_pasv(True) #模式:被动模式 ftp.connect(hostaddr, port) #连接:地址端口 ftp.login(username, password) #登录:用户密码 log("---------------------------------------------") log("连接已完成:"+ftp.getwelcome()) except Exception: log("连接或登录失败") sys.exit() #返回一个 SystemExit异常 (退出程序) try: #print ftp.pwd() #打印ftp目录 #ftp.retrlines('LIST') #列出ftp目录下的信息 ftp.cwd(remotedir) except Exception: log("切换目录失败") sys.exit() def is_same_size( localfile, remotefile): try: remotefile_size = ftp.size(remotefile) except: remotefile_size = -1 try: localfile_size = os.path.getsize(localfile) except: localfile_size = -1 if remotefile_size == localfile_size: return 1 else: return 0 #上传文件函数 def upload_file( localfile, remotefile): if not os.path.isfile(localfile): #如果文件不存在 return if is_same_size(localfile, remotefile): #本地与远程文件大小一样的话(文件存在) log('文件已存在: %s' %localfile) return file_handler = open(localfile, 'rb') #打开本地要上传的文件 ftp.storbinary('STOR %s' %remotefile, file_handler) #上传本地文件 file_handler.close() #关闭打开的文件 log('文件已传送: %s' %localfile) #创建子目录并执行上面的 上传文件upload_file函数 def upload_files( localdir='./', remotedir = './'): if not os.path.isdir(localdir): #目录是否存在 return localnames = os.listdir(localdir) #获取目录中的文件及子目录的列表 ftp.cwd(remotedir) #变更工作目录 #循环目录下的文件与子目录 for item in localnames: src = os.path.join(localdir, item) #连接字符串 if os.path.isdir(src): #目录是否存在 try: ftp.mkd(item) #创建目录 except: log('目录已存在: %s' %item) upload_files(src, item) else: upload_file(src, item) #上传文件(upload_file函数) ftp.cwd('..') #变更工作目录 #记录日志函数 def log(msg): datenow = time.strftime('%Y-%m-%d %H:%M:%S',time.localtime()) logstr = '%s : %s \n' %(datenow, msg) logfile.write(logstr) if __name__ == '__main__': logfile = open("/tmp/log.txt", "a") ftp = FTP() login(rootdir_remote) #上传文件夹下面的文件 upload_files(rootdir_local,rootdir_remote) #上传某个文件 #upload_file(local_file, remote_filename) log('操作已完成') log('---------------------------------------------') logfile.close() php代码如下: <?php $hostaddr = "192.168.2.58"; $username = "mm"; $password = "123456"; $local_file = "/Users/icyboy/upload/1.txt"; $remote_filename = "./1.txt"; $conn_id = ftp_connect($hostaddr,0) or die("Couldn't connect to $hostaddr"); $login_result = ftp_login($conn_id, $username, $password); if ( !$conn_id || !$login_result ) { echo 'FTP连接失败!\n'; exit; } else { echo "FTP连接成功!\n"; } $upload = ftp_put($conn_id, $remote_filename, $local_file, FTP_BINARY) or die("连接失败!"); ftp_close($conn_id); if ( !$upload ) echo "上传失败!\n"; else echo "上传成功!\n"; shell代码如下: #!/bin/sh TRANS_DATE=`date +%y%m%d%H%M` echo " open 192.168.2.58 prompt user mm 123456 cd . binary lcd /Users/icyboy/upload mput 1.txt close bye "|ftp -v -n |sed 's/^/>/g' >>run.log #open 192.168.2.58 建立FTP服务器连接 #user mm 123456 设置FTP服务器登录时的用户名和密码 #cd . 设置要上传到FTP服务器上目标文件夹 #lcd /Users/icyboy/upload 进入要进入上传文件的目录 #mput 1.txt 将1.txt传至服务器目标文件夹 #ftp -v -n -v 显示远程服务器所有响应信息,-n 限制FTP的自动登录 #sed 's/^/>/g' 每行开头处都替换为> if [ -s run.log ] #判断run.log是否存在且不为空 then echo "SYSTEM: FTP LOGGING SUCCESS!!!" SEARCH=`grep 'bytes sent in' run.log` if [ $? -eq 0 ] #$?为上次命令的退出状态,$?=0表示从中寻找到bytes sent in关键字 then echo "FTP transfer file OK" rm run.log else echo "FTP transfer file fail" mv run.log ${TRANS_DATE}_fail.log fi else echo "SYSTEM: FTP LOGGING FAIL!!!" exit 1 fi
ESSENTIALAI-STEM
Imul-arithmetic instruction-microprocessor, Assembly Language Assignment Help: IMUL: Signed Multiplication: This instruction multiplies a signed byte by a signed bit in source operand e in the register AL or signed word in source operand by signed word in the register AX. The source can be a general purpose register, index register, memory operand or base register, but it can't be an immediate data. In the case of 32- bits results, the higher order word (MSW) is stored in  the DX and the lower order word is stored in the register AX. The PF, AF, ZF, and PF flags are undefined after IMUL. If AH and DX both contain parts of 16 and 32-bit result respectively, CF and OF both will be set. The AL and AX are the implicit operands in case of 8 bits and 16 bits multiplications respectively. Sign bit and CF fills the unused higher bits of the result, the AF are cleared. The example instructions are given as follows: Example : 1. IMUL     BH 2. IMUL     CX 3. IMUL     [SI] Related Discussions:- Imul-arithmetic instruction-microprocessor Program for generate mips assembly code that runable on spim, Project Overv... Project Overview In this series of projects you will write a compiler for a small subset of Pascal.  In this assignment, you will start writing the syntax analysis and code gen Entering a program-microprocessor, Entering a Program In this section, ... Entering a Program In this section, we will explain the procedure for entering a small program on IBM PC with DOS operating system. Assume a program of addition of 2 bytes, as Program, wap proram for bthe addition of two 3*3 matrix wap proram for bthe addition of two 3*3 matrix Code for reading flow & generating serial output, Assembly Code for Reading... Assembly Code for Reading Flow & Generating Serial Output The timer is timer 1 is set for the baud rate 9600, as the crystal used is of 11.0592 Hz.  Then the timer 1 is starte Program to convert decimal to binary number, Program is written but has err... Program is written but has errors returning values from the procedure. Explore debugger, add the contents of the defined memory locations 120, 133... add the contents of the defined memory locations 120, 133, 122 using mov instruction in dosbox Assembly HW help, I was wondering if you guys could offer me some advice an... I was wondering if you guys could offer me some advice and help on how to proceed - not answers- for a homework problem I am attempting. I am currently working on a "bomb" project Any project ideas plz, can any one help me in my project by using assembly ... can any one help me in my project by using assembly language English, how we can take permission how we can take permission Interrupt system based on 8259 a-microprocessor, Interrupt System Based on ... Interrupt System Based on Single 8259 A The 8259A is contained in a 28-pin dual-in-line package that need only a + 5-V supply voltage.  Its organization is shown in given figur Write Your Message! Captcha Free Assignment Quote Assured A++ Grade Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report! All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd
ESSENTIALAI-STEM
Talk:Kenneth M. Merz Jr. Undisclosed paid tag I have added an undisclosed paid tag to this article because of extensive editing by a UPE sockfarm, please see Sockpuppet investigations/125BOP for evidence. The article will need a thorough review ensuring due weight, neutral language, and use of reliable sources before the tag is removed. --Blablubbs (talk) 11:31, 20 July 2021 (UTC)
WIKI
For thousands of years, humankind has relied on horses to support our lives. And for much of that time, horses have been used in battle. Some people choose to wear a purple poppy on Remembrance Day to remember the sacrifice made by animals in warfare. Different breeds of horses brought different attributes to the battlefield. Some animals were required to carry heavy loads. Others needed speed and agility to carry soldiers as they fought. Here, we take a look at 17 war horse breeds, and find out why they were chosen. Table of Contents In medieval times, the Destrier was the king of war horses. Contemporary accounts even call it “the Great Horse”. Strictly speaking, it was not a breed but a type of horse, usually a stallion. They were bred, raised and trained specifically for battle. They were not much larger than other horses, typically measuring between 14 and 15 hands. But what distinguished them from riding horses was their muscular physique. Their strong hindquarters allowed them to sprint, spin and stop abruptly, making them perfect mounts for cavalry. Medieval paintings show other distinguishing characteristics were a straight or slightly arching neck, short back and heavily muscled loin. They were expensive horses, and were used in tournaments as well as in battle. The Friesian horse takes it names from the region where it was first bred, Friesland in the Netherlands. It was popular as a war horse throughout the Early and High Middle Ages. The first illustrations of the horse date to around the 11th century. They were most usually black, and stood around 15 hands tall. They had a stocky build, but were considerably more graceful and agile than might be expected for their size. Like the Destrier, medieval Friesians had powerful hindquarters. These allowed their riders to move quickly and smoothly on the battlefield. And the horses’ calm demeanor made them less likely to get spooked by the noise and chaos around them. Friesians can still be found today, although the breed has evolved over time and is now much taller. Fortunately for them, you are more likely to find them as riding or dressage horses than in battle. The elegant Arabian horse has been used in battle by civilizations from the ancient Egyptians to the Ottoman Empire. Its value on the battlefield lay in its intelligence, speed, stamina and agility. And although known for its beauty, it’s also a very hardy animal. They were used both for raids and as chargers for light cavalry troops. Although the breed has developed over centuries, today’s Arabian horses retain their speed, agility and stamina. They are now used in virtually all equestrian disciplines, including show jumping, dressage and flat racing. The Andalusian was known as the “royal horse of Europe”, and was the mount of choice for kings and noblemen. It originated in the Iberian Peninsula, and was used by both French and English forces. Both Henry VIII and French monarchs Louis XIII and Louis XIV rode Andalusian horses. The Andalusian has been recognised as a specific breed since the 15th century. It is usually gray, with a thick mane and tail. It’s known for being intelligent and docile, as well as for its stamina and athleticism. Today, its graceful appearance makes it a favorite choice for dressage events. And it’s also often used in TV and films, including in the Lord of the Rings movies. The Marwari originates from North-West India, in the region of Rajasthan. It was first bred in the 12th century, and was prized for its hardiness, loyalty and courage in battle. It was used as a calvary horse by Indian rulers and the people of the Marwar locale. It was noted for its exceptional hearing and sense of direction. That meant that Marwari horses were often able to return wounded soldiers from the battlefield without guidance. The breed can be found in all equine colors. Its most distinctive feature is its ears, which curve gently inwards. They can rotate a full 180 degrees, touching at the tips. It also has long, broad shoulders, a medium-length back and rounded, muscular hindquarters. The Percheron is another breed that takes its name from its region of origin, Perche, in western France. The emergence of the breed is lost in the mists of time. The horses were, however, documented in the region from the seventeenth century. Percherons were used extensively during the First World War. Their calm temperaments saw them used with guns and forward units. And the lack of feathering on their legs helped in the muddy conditions in which they often had to work. The popularity of the breed declined after the Second World War, but numbers are now recovering. Percherons are still used in agriculture, and in English equine disciplines including show jumping. Sadly, in France, their ancestors’ loyalty and war service is repaid by being used for meat. The strong and placid Shire horse is another breed that was instrumental in the First and Second World Wars. The horses, the largest and heaviest breed in the world, were requisitioned from farms across Britain. Their rural working days were swapped for a life of pulling guns, weapons and supplies, transporting the wounded, and even cavalry charges. The breed survived both wars, but during the 1950s, the increasing use of machinery on farms saw their numbers dwindle. Today, dedicated enthusiasts have kept the breed alive, and you can even visit them at specialist centers. Perhaps the most famous of all war horses was Bucephalus, the beloved steed of Alexander the Great. Thessaly in Greece was renowned for its horses, and Bucephalus was reported to come from the “best Thessalian strain”. Legend has it that the 12-year-old Alexander won the horse in a bet with his father. If he could tame him, his father said, he could have him. Alexander succeeded by speaking calmly to the stallion, and turning him away from the sun. The result was a partnership between man and horse that lasted almost 20 years. It came to an end when Bucephalus was injured in Alexander’s final battle. He died of his wounds, and Alexander founded a city, Bucephala, in his memory. Mongolian horses were key to the success of the 13th century Mongol Empire. The breed is reputed to remain largely the same today. There are currently over 3 million horses in Mongolia, more than the population of traditional Mongolian nomads who own them. Mongol soldiers in the time of Genghis Khan relied on their horses to carry their equipment and to ride into battle. The horses are hardy, with excellent stamina, and could be left to forage for their own food. They were, however, slower than some other breeds. Legend has it that a Mongolian horse would come at the whistle of its owner. Each warrior would have a number of horses, so that he could always ride a fresh mount into battle. The Courser originated in Spain, and was used in medieval times. It was much faster and lighter than the Destrier, and was usually ridden without armor. It was preferred for fast strikes and raids, and was also used for hunting. Its speed meant it was sometimes ridden by kings, and it was often used as a messenger horse. Another horse to see battle during medieval times was the Palfrey, also known as the Jennet. This was usually ridden by lower ranking knights on the battlefield. It was not a specific breed, but was a horse known for its smooth gait. That made it a comfortable ride for both soldiers and noble women. And it was regularly used in hunting and for ceremonial parades. It was shorter than the Destrier, and had a longer back. And it had plenty of stamina, making it a good choice for riding over long distances. The category of Iberian actually covers a number of different breeds of horse. These include the Andalusian we discussed earlier, as well as the Lusitano, Garrano and Pottoka. They combine sturdiness with agility and athleticism, and as such were highly prized as war horses from classical times. They were reputedly used by the Spartans to sack Athens, and by Hannibal to defeat the Romans in the Second Punic War. Today, many of the warmblood European horses have Iberian lineage. The Rouncy was another horse used in medieval times. Less expensive than the Destrier, its powerful build made it invaluable for carrying heavy loads. It was frequently used in agriculture, particularly for pulling plows. But Rouncys were also trained as war horses. These were often the mounts of poorer knights, squires and men-at-arms. They were faster than Destriers, and were the preferred horses for archers. And when a summons for horses for warfare was sent out in 1327, it specifically asked for Rouncys. The Holsteiner breed originated in the 13th century in Germany, in the region known as Schleswig-Holstein. It’s considered to be the oldest of the breeds known as warmbloods. The earliest Holsteins appear to have been bred by monks. They took native horses, which were small in stature, and bred them to develop larger mounts, more suitable for warfare. They were in great demand by armies and royals across Europe. Today, the Holsteiner is renowned as an excellent jumper, frequently appearing in show jumping, dressage and eventing. Most horses are bays, and have an elegant build and graceful, arching neck. As its name suggests, the Hanoverian originates from Hanover in Germany. Its blood lines date back to the Early Middle Ages, when its powerful physique enabled it to carry armored knights. Modern Hanoverians are taller than their ancestors, standing between 16 and 17.1 hands. They have long backs and large shoulders and chests. And they can be found in a range of colors, with brown, bay, black and chestnut the most common. The Ardennais hales from the Ardennes region, which straddles France, Belgium and Luxembourg. It was used in warfare both to carry cavalry troops and to transport artillery. Their ancestry dates back to Roman times, and Julius Caesar described them as “rustic, hardy and tireless”. During the French Revolution, they were considered the best of all artillery horses, because of their power, stamina and temperament. Their strength is reflected in their heavy-boned build and thick, muscular legs. They are most commonly bay or roan, but can also be gray, chestnut or palomino. Despite their compact and muscly build, they move freely with a long stride. 17. Boulonnais of Flanders The Boulonnais of Flanders was one of eight different breeds of horse used in the Napoleonic Wars. Their strength and stamina made them an obvious choice as a draft horse. But they were also used for heavy cavalry. Napoleon bought thousands for that purpose, and they were widely used amongst other cavalry forces across Europe too. They are usually gray, although they can also be black and chestnut. Over time, they were bred with Oriental blood lines, giving them an appearance more elegant than many draft breeds. The debt of war That brings us to the end of our round-up of 17 war horse breeds. Whether Shire horses transporting equipment, or Arabians used for swift strikes, their role has been central to centuries of warfare. While these animals had no choice in going to war, they were instrumental to the outcomes of many battles. Many paid for that with their lives. For every Bucephalus with a city named after him, there are thousands of horses whose memories are lost to history. Humankind owes them a great debt. Perhaps next Remembrance Day, more of us will wear a purple poppy to mark their sacrifice.
FINEWEB-EDU
cpander cpander - 7 months ago 80 R Question SAS Equivalent to R Vector-to-Matrix I've been trying to do something that's very easy to do in R in SAS. Basically, I have a table with 2n columns and one row. I would like to have a table with n columns and two rows. This is basically what I'm trying to do, in R: x <- c(1:10) y <- matrix(x, nrow = 2, ncol = 5, byrow = T) Which takes us from: > x [1] 1 2 3 4 5 6 7 8 9 10 to: > y [,1] [,2] [,3] [,4] [,5] [1,] 1 2 3 4 5 [2,] 6 7 8 9 10 So in SAS, let's say I have the following example dataset: data test; input v1 v2 v3 v4 v5 e_v1 e_v2 e_v3 e_v4 e_v5; datalines; 1 2 3 4 5 6 7 8 9 10 ; run; I am trying to make it such that e_v1 is actually row two of v1, etc. - in other words, I want to go from this one-row dataset (x in the R example above) to a two-row dataset (y in the R example above). Am I missing something obvious? Thank you! Answer This is a solution for your example. data tworow; set test(keep=v:) test(keep=e: rename=(e_v1-e_v5=v1-v5)); run;
ESSENTIALAI-STEM
Which is more dangerous, heat stroke or heat exhaustion? Mark Written By Mark The German Brain Foundation warned against exposure to the sun during days when temperatures rise, or drinking small amounts of fluids, as well as exerting a lot of effort at such times, in order to avoid what is known as sunstroke, which may lead to death in the worst cases. German doctors explained that heat stress differs from sunstroke in that the latter results from direct exposure of the head area to sunlight, which results in an increase in brain temperature. In this case, the head appears with red skin and a high temperature, despite the coldness of the rest of the body, and some accompanying symptoms appear such as headache, vomiting, dizziness, neck pain, fatigue and lack of concentration, and the matter may develop into inflammatory reactions and dilation of the blood vessels, and the matter may reach what is known as cerebral edema. In the case of heat stress, the body temperature exceeds 40 degrees, and this includes the entire body, especially for the elderly and children, which poses a particular danger to them. Common symptoms include convulsions and disturbance of consciousness, which is an emergency that requires immediate medical intervention. In case of suspected sunstroke or heat stress, the injured person should be immediately moved to the nearest shaded area. Doctors recommend calling for emergency medical services immediately. Until medical services arrive, the injured person should be placed in a shaded area and an attempt should be made to cool the body, but without placing ice directly on it. It is preferable to cool the victim with the help of a wet cloth. After that, the victim should be given something to drink if he is not unconscious. Suitable drinks include water and fruit tea. When the medical team arrives, the victim is treated according to the condition. For example, anticoagulant medications may be required in the hospital. Do not go out in hot weather In general, doctors recommend not going out during hot times as much as possible, or not being exposed to direct sunlight for long periods, while taking care to cover the head, and drinking sufficient amounts of fluids, with more and more attention in the case of children and the elderly. The main problem with heat stroke is that the body is no longer able to transfer and release body temperature, as the temperature reaches 40 degrees and higher, while the normal tolerance is at 37 degrees. It is important to know that heat causes the blood vessels to expand so that the maximum amount of hot blood is transferred to the skin, where heat can be released through sweating. This is why we should drink a lot on hot days, because the sweat on our skin evaporates, thus cooling the skin as well as the blood, which can then move to other areas of our bodies to regulate temperature. However, heat stroke causes this system to fail, and then the blood clots, and small clumps block small vessels, which threatens the failure of many organs such as the liver, heart, and kidneys, as well as other organs.
ESSENTIALAI-STEM
If you wish to maintain great health for several years in the future, you need to ensure that you will get the correct minerals and vitamins in your daily diet. Even so, finding the goods you need to nutritional best mass gainer supplement your diet can be difficult. For many beneficial information on this issue, read on. Lots of people who are in need of extra nutritional supplements just battle physically with swallowing the capsules as they are able be sizeable and, in all of the loyalty, awful sampling. Try out water which includes vitamins and minerals consists of with some type of fruit taste additional. This allows you to get a number of the nutritional vitamins you need and also adding to your day-to-day water intake. Coenzyme Q-10 is utilized to help remedy center and vessel circumstances, which includes angina, congestive cardiovascular system malfunction, diabetes, gum condition and high blood pressure. This powerful formulation fortifies natural defenses and improves electricity. Individuals can get the chemical normally in seafood and various meats nonetheless, most prefer to have a Coenzyme Q-10 health supplement. Vit C is one of the most beneficial vitamin supplements that you can take. It promotes cells progress, minimizes malignancy risks, helps with bloodstream mobile formation and quickens the process of recovery. Broccoli, peppers, grapefruits, tomatoes, and numerous types of other foods are common loaded with vit c. Also you can take a nutritional supplement that contains ascorbic acid. There are millions of people that believe h2o consistently is the key to overall great health. This really is true apart from you will be also flushing your body of several nutrients and vitamins, vitamins and minerals, it needs to functionality effectively. Always make sure that at the least you are taking some sort of a single per day nutritional to maintain the body satisfied within its requires. Since you now have look at this article, you should know far more about which nutritional supplements you require. Consuming a balanced diet is an essential thing you can do to promote your actual well-simply being. Use the tips that you may have just read through to hold oneself match and powerful.
ESSENTIALAI-STEM
Sunday, November 4, 2018 DNA could be used to store digital data more efficiently than computers Deoxyribonucleic acid (DNA) can be used for data storage. DNA digital data storage technology has many huge applications. Like cassette tapes and CDs, the DNA will not degrade over time and will not become obsolete. DNA digital data storage DNA-digital-data-storage DNA could be used to store digital data more efficiently than computers DNA: The future of digital storage Deoxyribonucleic acid (DNA) is a roadmap that contains all the details about every living being.  If you see DNA with the right tools and have a basic understanding of the genome of your goal, then you can tell everything from where the sample came from to the genus and species of your target organism.  You can find DNA strands that determine body type, hair color, and even sensitivity or susceptibility to some diseases or conditions. Today, the techniques for storing data in DNA are no longer strange. In the past few years, researchers have encoded all types of data in DNA strings. Advantages and disadvantages of DNA data storage Advantages  A clear advantage of DNA storage, it should ever be pragmatic and practical for everyday use, it will have the ability to keep large amounts of data in the media, with small physical volume.  Currently, all digital information present in the world can live in four grams of synthetic DNA.  A less obvious, but perhaps more important, the advantage of DNA storage is its longevity.  Since DNA molecules can survive for thousands of years, the encoded digital collections in this generation can be recovered by people for many generations to come.  It can solve the possibility of our digital age lost in history due to longevity, relative impermanence or voltage of optical, electronic and magnetic media.  Disadvantages Today, the main disadvantages of DNA storage for practical use are its high cost and slow encoding speed.  The speed problem limits the promise of technology for storage purposes in the near term, though in the end, the speed can be improved at that point where DNA storage can work effectively for normal backup applications and, perhaps, primary storage.  For the cost, the expenditure can come to a point where technology becomes commercially viable on a large scale. DNA data storage Advantages and disadvantages of DNA digital data storage How DNA can be used to store computer data? DNA is the oldest information-storage system that has known for years. It predicts one another for billions of years, from pencils and paper to computer hard drives. But trying to employ it to store the data generated by people, has failed, unlike the data needed to bring those people in the first place.  Due to cost is not so technical difficulty. A gigabyte encoding in the DNA will run a bill of several million dollars. It is still on the pricey side.  But in reality, a second ratio also comes in the game for large storage requirements: Gigabytes stored in cubic meters per cubic meter. The catalog's method can store 600bn gigabytes in the same quantity. While designing a DNA-based storage system, the apparent temptation is to look at the chemical base pair of one and zero and deoxyribose nucleic acids of binary data as equivalent and to translate one into another in relation to each file related to a single, large DNA molecule to be stored. Unfortunately, it produces molecules that are difficult to index machines when the time comes to see what data is the data of DNA encoding.  Specifically, computer data contains locations that have long strings of either ones or zeros. DNA sequencers have difficulty when facing unitary strings like base pairs. The catalog has taken a different step. The firm's system is based on 100 different DNA molecules; each ten base pairs are long.  However, the order of these bases does not encode the binary data directly. Instead, the company ties these small DNA molecules together for long periods of time.  Importantly, the enzyme system that uses it to do is able to collect small molecules in whatever is desired, into long ones.  Starting with 100 types of small molecules is enough; it means that trillions of combinations can be possible for a long time. It can contain large amounts of information in long molecules. The catalog approach also means that it is difficult to read data incorrectly. Even if the sequential machine gets the base or two wrong, it is generally possible to estimate the identification of the ten-base pair unit in question, thus preserving the data.  The connective approach of the catalog means that per-byte per DNA is required compared to the requirement of other DNA-based methods. It enhances both time and reading costs to recover data stored in electronic form for processing.  Overall, however, the method promises to have significant benefits on its predecessors. The next task is to translate that word into reality.  In the end, a catalog is working with a British technology-development firm; Cambridge Consultants, to create prototypes capable of writing 125 gigabytes of data per day to DNA. The genetic molecule is too small to store data so it will solve the encoding data tape real estate problem. We need around 10 tons of DNA to store all data of the world.  There is something that you can fit on a semi-trailer. Synthetic biologists and computing architects are now designing the system to automate DNA storage processes. No comments: Post a Comment
ESSENTIALAI-STEM
Fortinet Forum The Forums are a place to find answers on a range of Fortinet products from peers and product experts. Tutek_OLD New Contributor SD-WAN how to route all internet traffic to WAN2 Hi, I have two interfaces in SD-WAN, now I would like that my WAN2 interface should be used for all internet access, now when I create SD-WAN rule I see here only as destination "Internet service" or "Application" I don't see here any "Service" option where I could add all HTTPS, DNS services needed for web browsing, so how could I do this? 4 REPLIES 4 lobstercreed Valued Contributor I think the answer is that you can't.  But it doesn't like you need to get that granular if you want *all* Internet access to go out wan2.  Just specify the source and destination addresses appropriately. Tutek_OLD Ok, but how to co figure destination addresses for all internet sites and services? As I said three is nothing here like destination with option 'all' something like on ipv4 policy. lobstercreed Sure there is...it's right above Internet Service and Application in the Destination section.  Choose the "all" address object.  It's probably already selected by default. Tutek_OLD My IPSEC tunnels are binded to WAN1 interface, If I create SD-WAN rule to redirect "all" source and "all" destination traffic through WAN2,  does this break my IPSEC tunnels or not?
ESSENTIALAI-STEM
Thomas E. Hutchins Thomas E. Hutchins, born in Baltimore, Maryland, was a member of the Maryland House of Delegates for District 28, which covers a portion of Charles County, Maryland, prior to being selected to be the secretary of Maryland State Police. Education Delegate Hutchins graduated from Calvert Senior High School in Prince Frederick, Maryland. He holds a master's degree in state and local government from the University of Maryland, University College, with undergraduate degrees in law enforcement and sociology from UMUC and an associate degree from Charles County Community College in criminal justice. Hutchins has graduated from several significant professional schools associated with law enforcement and military professions. He is a 1990 graduate of the United States Army Sergeants Major Academy in El Paso, Texas, and a graduate of the 29th FBI National Executive Institute in Quantico, Virginia, and the Command Programme, Bramshill Police College in Bramshill, England. In February 2005 then Colonel Hutchins was presented with an honorary degree from the College of Southern Maryland for his dedication to the college in which he began his academic quest and for bringing focus to the importance of public service based on his two lifetime careers in the fields of military and law enforcement. Hutchins founded a scholarship endowment for military veterans who enroll in the law enforcement/public safety academic track at the College of Southern Maryland. Career After serving in the military, Delegate Hutchins was a Maryland State Police trooper. Elected to office three times, he served on the judiciary committee, in addition to the gaming law & regulation, and criminal justice subcommittees, to name a few. Colonel Thomas E. Hutchins was appointed by Governor Larry Hogan January 21, 2015 as Director of the Governor's Office for Homeland Security. Hutchins served as personal advisor to the governor on all homeland security issues from counter terrorism to disasters. In addition he supervised a portfolio of Cabinet agencies including the departments of: State Police, Military, Public Safety and Correctional Services, Veterans Affairs, Information Technology, Institute for Emergency Medical Service System, Emergency Management Agency, and the Office of Crime Control and Prevention. During his tenure Hutchins provided key advice to these cabinet agencies guiding them through the transition and several critical incidents to include the riots in Baltimore City during April 2015. In 2003, Delegate Hutchins resigned from the Maryland House of Delegates to accept an appointment as Secretary of Veterans Affairs by Governor Robert Ehrlich. He served in this position for less than a year when he was appointed as the secretary of the Maryland State Police, also by Governor Erhlich. He replaced Ed Norris, who resigned after a criminal indictment. Ed Norris is also the former Baltimore City Chief of Police appointed by then Baltimore Mayor Martin O'Malley. Hutchins was appointed by Governor Robert L. Ehrlich Jr. as secretary of the Department of Maryland State Police and the superintendent of the Maryland State Police on December 10, 2003. Hutchins was confirmed as secretary of the Department of Maryland State Police by the Maryland Senate in an unprecedented event when he received confirmation in a unanimous vote of approval on the Senate floor without ever being referred to a committee for review. He is no stranger to the Maryland State Police, having served in the department more than two decades before his retirement in 1994. During his career with the State Police, Hutchins served in every bureau of the department and broadened his experience through key assignments outside the department. In the history of the Maryland State Police, he is the fourth trooper to come from the ranks of the department and be appointed superintendent. Several significant highlights of his state police career are his command of the State Police Academy / Training Division, which included outreach and training to several foreign countries. He was also instrumental in the formation and leadership of the Maryland State Police Special Tactical Assault Team Element, training them in urban and rural tactics to counter high threat situations, Air Assault Insertion and Rescue Operations, also participating in numerous operations. One accomplishment in Hutchins' career that is little known arose from his observations and subsequent traffic stop of a suspicious person which turned out to be the second secretary of the Soviet Embassy. According to the FBI this encounter uncovered one of the highest-ranking Soviet KGB agents ever identified in the United States at that time. That agent was ultimately found to be involved with John Walker, the U.S. Navy spy who inflicted significant damage to the U.S. intelligence network and the defense of this nation during the later part of Cold War era. In 2007, newly elected Governor Martin O'Malley fired Hutchins and replaced him with Baltimore County Police Chief Terrence B. Sheridan. O'Malley was criticized by Maryland State Senate President Thomas V. Mike Miller for removing Hutchins, who was the last appointed cabinet member remaining from the Ehrlich administration and the last member of the cabinet from Southern Maryland. During the period 2007 through 2013, Hutchins provided strategic planning assistance to JTF International a non-governmental organization enhancing law enforcement services in the Provincial Police Department of Cordoba, Argentina. Additionally, he worked as a contractor providing strategic planning and liaison support to the Department of Defense NGB J32 Counterdrug Division. Controversy In 2008 it was revealed that the Maryland State Police had included 53 names of non-violent protesters in several databases that track suspected terrorists, despite the lack of any evidence of crimes being committed. This action was taken under authorization from Hutchins, who at the time was serving as the state police superintendent. During testimony before the Maryland Senate Judicial Proceedings Committee, in which he voluntarily testified on the record, he stated "if it happened during my tenure then I am ultimately responsible"; he apologized for the actions that had been taken by certain members of the department stating that those names should not have been entered into that data base. He further stated on the record, that one of those named did in fact raise concerns for violence due to past actions and statements and went on to say that "sometimes advocacy groups can have one or more fringe people who have their own agenda" meaning they attach themselves to the group. Hutchins closed by saying the last thing you want is the Superintendent standing before you after a catastrophe to explain why preventive actions were not taken. Election results * 2002 Race for Maryland House of Delegates – District 28 * Voters to choose three: * {| class="wikitable" !Name !Votes !Percent !Outcome * Thomas E. Hutchins, Rep. * 19,037 * 20.3% * Won * Sally Jameson, Dem. * 18,476 * 19.7% * Won * Van Mitchell, Dem. * 18,238 * 19.5% * Won * Jim Jarboe, Dem. * 16,577 * 17.7% * Lost * James Crawford, Rep. * 12,109 * 12.9% * Lost * Robert Boudreaux, Rep. * 9,289 * 9.9% * Lost * } * James Crawford, Rep. * 12,109 * 12.9% * Lost * Robert Boudreaux, Rep. * 9,289 * 9.9% * Lost * } * 9.9% * Lost * } * 1998 Race for Maryland House of Delegates – District 28 * Voters to choose three: * {| class="wikitable" !Name !Votes !Percent !Outcome * Thomas E. Hutchins, Rep. * 18,012 * 23% * Won * Van Mitchell, Dem. * 17,835 * 23% * Won * Samuel C. Linton, Dem. * 17,268 * 22% * Won * James Crawford, Rep. * 12,780 * 16% * Lost * Michael D. Hathaway, Rep. * 11,756 * 15% * Lost * George C. Vann, Rep. * 1,333 * 2% * Lost * } * Michael D. Hathaway, Rep. * 11,756 * 15% * Lost * George C. Vann, Rep. * 1,333 * 2% * Lost * } * 2% * Lost * } * 1994 Race for Maryland House of Delegates – District 28 * Voters to choose three: * {| class="wikitable" !Name !Votes !Percent !Outcome * Van Mitchell, Dem. * 12,289 * 18% * Won * Samuel C. Linton, Dem. * 11,993 * 17% * Won * Thomas E. Hutchins, Rep. * 11,507 * 17% * Won * Gerald Schuster, Rep. * 11,416 * 17% * Lost * Ruth Ann Hall, Dem. * 11,176 * 16% * Lost * Adam M. O'Kelley, Dem. * 10,295 * 15% * Lost * } * Ruth Ann Hall, Dem. * 11,176 * 16% * Lost * Adam M. O'Kelley, Dem. * 10,295 * 15% * Lost * } * 15% * Lost * }
WIKI
Loading... General Radon Information Georgia specific radon and radon level information can be found throughout this site. You will be able to find information about certified radon inspectors in Georgia, as well as detailed radon level information for every county in Georgia. Radon is a radioactive element that is part of the radioactive decay chain of naturally occurring uranium in soil. You can't see,smell, or taste radon gas, but it can kill you. Unlike carbon monoxide and many other home pollutants, radon's adverse health effect, lung cancer, is usually not produced immediately. Thus you may be exposed to radon for many years without ever suspecting its presence in your home. Radon has been found in homes throughout the United States. It typically moves up through the ground to the air above and into your home through cracks and other holes in the foundation. Radon can also enter your home through well water. Radon can then enter the air after leaving the water during showering, cooking, and other water use activities. Water from private wells may contain much higher levels of radon than public wells. How does radon enter your home? Houses act like giant chimneys. As the air in the house warms, it rises to leak out the attic openings and around the upper floor windows, creating a small suction at the lowest level of the house, pulling the radon out of the soil and into the house. Some people think that caulking the cracks and the openings in the basement floor will stop the radon from entering the house, but in reality, it is unlikely that caulking the accessible cracks and joints will permanently seal the openings radon needs to enter the house. The radon levels will likely remain unchanged. Fortunately, there are other extremely effective means of keeping radon out of your home. Some houses have tested as high as 2,000-3,000 pCi/, yet there hasn't been a single house that could not mitigate to an acceptable level. Mitigation usually costs between $800-$2000. Any home can have a radon problem. This means new and old homes, well-sealed and drafty homes, and homes with or without basements. In fact, you and your family are most likely to get your greatest radiation exposure at home since that is where you spend most of your time. Nearly 1 out of every 15 homes in the United States is estimated to have an elevated radon level (4 pCi/L or more). Elevated levels of radon gas have been found in homes in your state. Contact your state radon office for information about radon in your area. The USEPA action level for radon is 4.0 picocuries per liter of air (pCi/L). The risk of developing lung cancer at 4.0 pCi/L is estimated at about 7 lung cancer deaths per 1000 persons. Thousands of preventable lung cancer deaths annually in the United States are attributable to indoor residential exposure to radon. Either smoking or radon exposure can independently increase the risk of lung cancer. However, exposure to both greatly enhances that risk. (At exposures to 4 pCi of radon per liter of air, the lifetime lung cancer risk attributable to radon rises from 2 cases per thousand in non-smokers to 29 cases per thousand in smokers). The USEPA and IEMA recommends reducing your radon level if the concentration is 4.0 pCi/L or more. Lung cancer in humans arising from radon exposure is recognized by the following health and environmental organizations: * American Medical Association * U.S. Surgeon General * U.S. Department of Health and Human Services * U.S. Public Health Service * U.S. Environmental Protection Agency * Center for Disease Control * National Academy of Science * National Cancer Institute * World Health Organization No level of radon is considered absolutely safe, radon levels in a home should be reduced as much as possible. The amount of radon in the air is measured in picoCuries per Liter of air, or pCi/L. The EPA recommends fixing your home if the results of one long-term test or the average of two short-term tests taken in the lowest lived-in area of the home show radon levels of 4 pCi/L or higher. The higher the radon level, the more quickly you should have your home fixed. EPA recommends that you know what the indoor radon level is in any home you consider buying. Ask the seller for their radon test results. If the home has a radon-reduction system, ask the seller for information they have about the system. If the home has not yet been tested, you should have the house tested. The EPA also recommends testing a home in the lowest level which is currently suitable for occupancy, since a buyer may choose to live in a lower area of the home than that used by the seller. If you are having a new home built, there are features that can be incorporated into your home during construction to reduce radon levels.
ESSENTIALAI-STEM
2024 England and Wales police and crime commissioner elections Elections for police and crime commissioners in England and Wales took place on 2 May 2024, the same day as local elections in England. Background Police and crime commissioners (PCCs) are elected representatives with responsibility for policing in each police area in England and Wales. Each police area elects a commissioner every four years, with the exception of police areas where responsibility for policing has passed to regional mayors such as Greater London and Greater Manchester. This was the first Police and Crime Commissioner elections to use the first past the post system following the passage of the Elections Act 2022. The supplementary vote system had been used for previous elections. The Policing and Crime Act 2017, which amended the 2011 Act, enabled PCCs to take over governance of the local fire and rescue service. PCCs who have taken on these responsibilities are known as Police Fire and Crime Commissioners (PFCCs). In 2023, it was reported that Rishi Sunak's government wants to create more elected metro mayors to take over the role of PCCs. The roles of PCCs for North Yorkshire, and South Yorkshire will be abolished, with responsibilities being taken over by their respective metro mayors. The government had planned to abolish the West Midlands PCC and transfer its powers to the Mayor of the West Midlands, however the incumbent PCC, Simon Foster, successfully challenged the transfer of powers in the High Court.
WIKI
Tetrix transsylvanica Tetrix transsylvanica, the Transsylvanian wingless groundhopper, is a species of insect in the family Tetrigidae. It is found in Romania and Slovenia and may be extinct in Croatia.
WIKI
Установка Ansible на Centos 7.3 Ansible применяется для управления множеством хостов. Не требует установки дополнительного программного обеспечения - нужен только доступ к управляемому компьютеру. ОС управляющего и управляемого сервера могут не совпадать, т.е управляющий сервер может быть на Centos а принимающий на Debian и наоборот. Ansible использует Playbooks - сценарии.на языке YAML. Для установки Ansible на ОС, использующих yum напишем в командной строке: yum install ansible Проверим корректность установки. ansible --version Настройки ansible хранятся в папке /etc/ansible. Для взаимодействия с другими хостами необходимо сгенерировать ключевой файл с помощью ssh-keygen. ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/root/.ssh/id_rsa): Created directory '/root/.ssh'. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_rsa. Your public key has been saved in /root/.ssh/id_rsa.pub. The key fingerprint is: SHA256:UlMWzER2AWF9v/HNTQQ2gzz8BNW/5ruuh2bmBKoilwA root@centos7x64 The key's randomart image is: +---[RSA 2048]----+ | =@B+=*o | | =o.*.ooo| | o = o.| | E . . ..+| | . . S . oB| | . . . . +=| | . . . .+ | | . + . .= o | | o .. =o++o| +----[SHA256]-----+ Обмен открытыми ключами можно осуществить используя ssh-copy-id <имя или ip сервера>. При соединении с данным сервером прочитается ключ и будет предоставлен доступ. ssh-copy-id 10.0.0.4 ssh 10.0.0.4 [root@centos7x64 ~]# ssh-copy-id 10.0.0.4 /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" The authenticity of host '10.0.0.4 (10.0.0.4)' can't be established. ECDSA key fingerprint is SHA256:J+QBiNgCn0OR9WWOOBy9S0NJxk0xue4w7sXDuJYO5Zg. ECDSA key fingerprint is MD5:e8:cb:20:e0:1a:40:3f:9e:01:2c:72:92:88:f1:fb:22. Are you sure you want to continue connecting (yes/no)? yes /usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed /usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys root@10.0.0.4's password: Number of key(s) added: 1 Now try logging into the machine, with: "ssh '10.0.0.4'" and check to make sure that only the key(s) you wanted were added. root@debian9:~# ssh 10.0.0.4 Linux debian9 4.9.0-6-amd64 #1 SMP Debian 4.9.88-1+deb9u1 (2018-05-07) x86_64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Thu Jul 26 14:53:46 2018 from 185.11.35.28 Теперь добавим этот узел в файл: /etc/ansible/hosts. Узел можно добавить отдельно или в любую группу, если хостов несколько, например в webservers: [webservers] #alpha.example.org #beta.example.org #192.168.1.100 10.0.0.4 Сделаем плейбук - например установим curl на сервер с ОС Debian. nano /etc/ansible/curlinst.yml --- - hosts: 10.0.0.4 tasks: - name: Install curl apt: name=curl state=present В плейбуке использованы следующие команды: • hosts: задает имя или ip хоста или группы хостов • tasks: описание задачи • name: Install curl - имя задачи • apt: name=curl state=present -операция - установить пакет curl через apt, ключ state указывает что делать с пакетом • latest означает установить или обновить до последней версии, если пакет есть • present - просто установить • absent - удалить пакет Запустим плейбук командой: ansible-playbook /etc/ansible/curlinst.yml [root@centos7x64 ~]# ansible-playbook /etc/ansible/curlinst.yml PLAY [10.0.0.4] **************************************************************** TASK [Gathering Facts] ********************************************************* ok: [10.0.0.4] TASK [Install apache service but avoid starting it immediately] **************** changed: [10.0.0.4] PLAY RECAP ********************************************************************* 10.0.0.4 : ok=2 changed=1 unreachable=0 failed=0 Средняя оценка: 5,0, всего оценок: 1 Последнее обновление: 24.08.2018 2038
ESSENTIALAI-STEM
Page:Every Woman's Encyclopedia Volume 1.djvu/609 583 WOMAN'S HOME themselves to vulgarity, and with people of flagrantly bad taste the library is usually the least offensive room in the house. I confess to a sneaking sympathy with the nouveau riche, who complacently remarked on showing his walls panelled to the ceiling with splendidly bound books, " and not a page of one of them cut ! " The very fact that he had not time to read them proved that he was doing things. The love of reading may be indulged in till it becomes a disease, and has ruined more promising careers than the world will ever know of. It is emphatically a recreation, not a man's object in life, but, as such, should be provided for, and a room without books in it is ghastly beyond telling. I once paid my first call at a house where the double drawing-rooms were furnished in duplicate, in rose-coloured brocade ; glasses there were, but not a flower, not a book, not a photograph, save of the hostess in Court dress at one end of the room, of the host in ditto at the other ! A servant left me there. I looked, I shuddered. I fled ! When my hostess descended she searched for me in vain in that wilderness of rase-colour. One book with the page turned down, one scrap of needlework would have appeased and kept me there. So books let us have by all means with which to pass a suffering or idle hour in every room you occupy, but when we have collected and arranged a good many in one place, whether we call it library, study, or smoking-room matters little, so long as we make it thoroughly comfortable. HOME LAUHDRY WORK Continued from pase 321, Parts MATERIALS NECESSARY AND THEIR DIFFERENT PROPERTIES Advantages of Soft Water— How to Soften Hard Water— Soap— Soda— Borax— Ammonia— Starch Blue — Salt — Gum Arabic— Turpentine— Bran I I VY/ater. a plentiful supply of soft water is very necessary for laundry purposes. By soft water is meant water in which soap will lather easily, and this depends upon whether the water contains certain mineral substances or not. Rain-water is the softest water obtainable, and if it can be collected clean, and in sufficient quantity, it is the best for washing clothes. When hard water has to be used, some softening substance must be added to it, such as soda, ammonia, or borax. It is impossible to wash well in hard water, as the soap does not dissolve. Soap and Soda So.vp. Common yellow soap is the best for washing. A good quality should be bought, as the cheap makes contain a large percentage of water and waste quickly. Soap should be bought in fairly large quantities, then cut into pieces and left to thoroughly dry before use. Soap has great cleansing properties ; it renders grease soluble, and forms a lather with water ; it would be impossible to cleanse most clothes without it. Soda. Soda is used to soften water, but must be dissolved in boiling water previous to use. It acts on grease, making it easily removable. Soda must never be used for coloured things, as it will either fade or entirely take out the colour. Neither must it be employed for woollen things, as it has the property of shrinking these and making them hard. Soda is specially valuable in the washing of strong and coarse articles, and things that are dirty and greasy. It should be put into a covered jar and kept dry. It is cheaper when bought by the stone. Borax. This is also used to soften water, and it is a much simpler preparation than soda. It does not destroy colour, and can be used with the finest articles. It is also used for stiffening and glossing linen. It may be obtained either as a powder or in lump form. The latter is the purer, but as it has to be dissolved before use, the powder is usually preferred. Ammonia. This is another water softener, and is particularly valuable in the washing of woollen goods. It must not be used too freely, or it will weaken the fibre of the wool, and never for the washing of coloured articles. The quantity to be used will depend upon the strength of the ammonia. It should be kept in a tightly corked bottle. Other Laundry Requisites Starch. This is used for stiffening different kinds of material. It gives clothes a fresher, crisper appearance, and prevents them becoming so easily soiled. Starch is obtained from every kind of grain, but principally from wheat and rice. The best and finest work is done with rice starch. According to the amount of stiffness required, the starch is mixed with hot or cold water. Cold water makes the stiff er starch. Blue. This is added to the water in which white things are rinsed, to give them a good colour and to counteract the yellow tinge given by wear and washing. There are many different kinds of blue, but the solid or stone blue is the most easily managed. When a cake is required, it should be tied in a small woollen bag or piece of calico. Salt. Used for fixing certain colours. It is usually put in the rinsing water, as it^ would be impossible to wash in salted water." Gum Arabic. Used for stiffening purposes, especially fine articles such as lace and silk. Turpentine. This is used in cold-water starch to give a gloss and to make the iron run smoothly. Bran. It is used in laundry work for the washing of sewn work where the colours are liable to run. It also gives a slight stiffness.
WIKI
In re Susan M. DANTONE; Guy R. Dantone, Debtors. Kurt Dantone; Carol Dantone, Plaintiffs-Appellees, v. Susan M. Dantone, Defendant-Appellant. BAP No. 12-8006. Bankruptcy No. 11-07926. Adversary No. 11-80382. United States Bankruptcy Appellate Panel of the Sixth Circuit. Argued: Aug. 7, 2012. Decided and Filed: Sept. 13, 2012. ARGUED: W. Brendan Neal, Armstrong Law Office, PLLC, St. Joseph, Michigan, for Appellant. John F. Magyar, Magyar Law Office, PC, Dowagiac, Michigan, for Appellees. ON BRIEF: W. Brendan Neal, Thomas R. Betker, Armstrong Law Office, PLLC, St. Joseph, Michigan, for Appellant. John F. Magyar, Magyar Law Office, PC, Dowagiac, Michigan, for Appellees. Before: HARRIS, PRESTON, and SHEA-STONUM, Bankruptcy Appellate Panel Judges. OPINION ARTHUR I. HARRIS, Bankruptcy Judge. This is an appeal from the bankruptcy court’s order granting summary judgment to Kurt Dantone and Carol Dantone (“Plaintiffs”) on their claim that the debt owed to them by Susan Dantone (“Debt- or”) is nondischargeable under 11 U.S.C. § 523(a)(4). I.ISSUES ON APPEAL The issue presented by this appeal is whether the bankruptcy court erred in granting summary judgment to Plaintiffs on their nondischargeability claim based on the issue preclusive effect of a prior state court judgment. Debtor argues that the bankruptcy court applied the wrong definition of embezzlement for the purposes of § 523(a)(4) and erred when it afforded issue preclusive effect to the state court judgment because the issues required for a finding of embezzlement under § 523(a)(4) were not actually litigated and necessarily determined by the state court. II.JURISDICTION AND STANDARD OF REVIEW The Bankruptcy Appellate Panel of the Sixth Circuit has jurisdiction to decide this appeal. The United States District Court for the Western District of Michigan has authorized appeals to the Panel, and neither party has timely elected to have this appeal heard by the district court. 28 U.S.C. § 158(b)(6), (c)(1). A final order of the bankruptcy court may be appealed as of right pursuant to 28 U.S.C. § 158(a)(1). An order granting summary judgment is a final order. Buckeye Retirement Co., LLC v. Swegan (In re Swegan), 383 B.R. 646, 649 (6th Cir. BAP 2008). “ ‘A bankruptcy court’s judgment determining discharge-ability is a final and appealable order.’ ” Cash Am. Fin. Servs., Inc. v. Fox (In re Fox), 370 B.R. 104, 109 (6th Cir. BAP 2007) (quoting Hertzel v. Educ. Credit Mgmt. Corp. (In re Hertzel), 329 B.R. 221, 224-25 (6th Cir. BAP 2005)). [1] The grant of summary judgment and the applicability of issue preclusion are reviewed de novo. Markowitz v. Campbell (In re Markowitz), 190 F.3d 455, 461, 463 (6th Cir.1999) (addressing the application of issue preclusion under Michigan law). “Under a de novo standard of review, the reviewing court decides an issue independently of, and without deference to, the trial court’s determination.” Gen. Elec. Credit Equities v. Brice Rd. Develops., L.L.C. (In re Brice Rd. Develops., L.L.C.), 392 B.R. 274, 278 (6th Cir. BAP 2008). For the reasons that follow, we reverse the bankruptcy court’s order granting summary judgment to Plaintiffs and remand the matter for further proceedings consistent with this opinion. III.FACTS In 2007, Plaintiffs were in possession of certain artifacts from a famous shipwreck. In October 2007, Plaintiffs delivered these artifacts to Debtor for display and, according to Debtor, for sale in Debtor’s jewelry-store. Thereafter, Debtor’s jewelry store went out of business. When Debtor returned the artifacts in September 2008, an emerald pendant and six musket balls were missing. On September 1, 2010, Plaintiffs filed a complaint against Debtor in a Michigan state court alleging that Debtor’s actions constituted a breach of fiduciary duty, common law conversion, and statutory conversion, or, in the alternative, negligence (the “Complaint”). The Complaint prayed for damages in the amount of $40,530.00 for breach of fiduciary duty and common law and statutory conversion of Plaintiffs’ property. With respect to the claim for negligence, Plaintiffs sought damages in the amount of $13,510.00. Plaintiffs designated their allegations of breach of fiduciary duty, common law conversion, and statutory conversion as “Count I.” With respect to this count, the Complaint alleged: 24. The Atocha treasure was delivered to Defendant Susan Dantone on or about October 27, 2007. At that time, Defendant signed an acknowledgment that she had received the items along with various certificates of authenticity from Plaintiffs for display at her jewelry store located in Dowagiac called Perfect Memories. A copy of the inventory and signed acknowledgment is attached and incorporated herein by reference as Exhibit D. 25. That by accepting the Atocha treasure for display, Defendant, as bail-ee, owed Plaintiffs a duty of care not to do any intentional act inconsistent with the terms of the bailment and as bailee, is expected to take, at a minimum, reasonable precautions to safeguard the property. 26. That Plaintiffs at no time authorized Defendant to sell or otherwise dispose of the Atocha treasure. 27. Sometime thereafter, the jewelry store Perfect Memories went out of business. 28. Upon learning that the jewelry store had closed, Plaintiffs requested that Defendant return the Atocha treasure that had been displayed. 29. On or about September 30, 2008, Defendant returned all items except the 12.37 carat emerald pendant with gold wrap (and original Certificate of Authenticity) and six (6) of the seven (7) lead musket balls. Attached and incorporated herein by reference as Exhibit E is a picture of the lead musket balls. 30. When asked about the missing treasure, Defendant responded that “she had forgotten to return them but that she had the treasure in a box in her basement.” 31. That Plaintiffs have repeatedly, both orally and in writing, demanded return of the missing treasure. 32. That Defendant has, both expressly and by her silence, refused to return the items, now claiming that the missing treasure may have been stolen. 33. That although the true value of the missing 12.37 carat emerald pendant with gold wrap cannot be ascertained, the treasured emerald has an estimated fair market value of $13,150.00. 34. That although the true value of the missing lead musket balls cannot be ascertained, they have an estimated fan-market value of $60.00 each. 35. That by refusing to return the missing treasure, Defendant has unlawfully taken and asserted dominance over Plaintiffs’ property. 36. That by refusing to return the missing treasure, Defendant is knowingly aiding in the concealment of converted property contrary to MCL 600.2919a. 37. That MCL 600.2919a provides for treble damages, costs and reasonable attorney fees. 38. That a bailee is liable for conversion if the bailee fails to return the bailed item as required, therefore, the acts described above constitute a breach of fiduciary duty and unlawful common law and statutory conversion of Plaintiffs’ property, resulting in damages to Plaintiffs in the amount of $40,530.00. (Compl. at 5-7, Adv. Proc. No. 11-80382, ECF No. 7-2.) Plaintiffs designated their negligence claim in the Complaint as “Count II.” With respect to this count, the Complaint alleged: 40. Alternatively, Defendant’s actions constitute negligence. 41. That when asked about the missing treasure, Defendant responded that she had forgotten to return them but that she had the treasure in a box in her basement. 42. That Plaintiffs informed Defendant that they would be coming to her home to retrieve the missing treasure. 43. That when learning of this, Defendant responded that she thought her babysitter may have taken the missing treasure. 44. That when confronted about the details concerning who the babysitter was and when the babysitter may have taken the treasure, Defendant replied that she “did not know” and “did not know the babysitter’s name.” 45. Shortly thereafter, Defendant changed her story and responded that she may have actually lost the items. 46. That regardless, as a result of her negligence, Defendant is unable to return the missing treasure to Plaintiffs, depriving them of their Atocha treasure. (Id at 7-8.) On September 29, 2010, Debtor, pro se, filed an answer to the Complaint in state court. The answer did not deny that Debtor had received the emerald pendant and the musket balls. Although Plaintiffs had alleged that the property was given to Debtor only for purposes of display, Debt- or’s answer suggests there was an agreement between the parties to allow the sale of the items. In addition, Debtor alleged that a prosecutor found no criminal intent. Thereafter, Debtor failed to respond to discovery requests in the state court action. On December 15, 2010, Plaintiffs filed a Motion for Summary Disposition in the Michigan state court. Plaintiffs argued that, because Debtor failed to respond to Plaintiffs’ request for production of documents and request for admissions, certain facts should be deemed established and judgment should be entered in their favor. Plaintiffs sought the admission of the following: A. That Defendant received from Plaintiffs various items, including a 12.37 carat emerald pendant with gold wrap (and original Certificate of Authenticity) and seven (7) lead musket balls. B. That Defendant displayed the above items at her jewelry store. C. That Defendant has not returned the 12.37 carat emerald pendant with gold wrap (and original Certificate of Authenticity) and six (6) of the seven (7) lead musket balls to Plaintiff. D. That the 12.37 carat emerald pendant with gold wrap has a fair market value of approximately $13,150.00. E. That the lead musket balls have a fair market value of approximately $60.00 each. F. That Defendant told a Dowagiac Police Department Officer that she has been unable to locate the items and believes that the items may have been lost. G. That Defendant also told a Dowagi-ac Police Department Officer that she may have thrown the items away. H. That Defendant has made offers to pay Plaintiffs back for the items, but no payments have been made. (Appellees’ Mot. for Summ. Disp. at 2, Adv. Proc. No. 11-80382, ECF No. 7-2.) Plaintiffs also alleged they had incurred costs and fees in the amount of $2,176.10. Plaintiffs asked the state court to find that “by failing to return the property, defendant continues her distinct act of dominion wrongfully exerted over plaintiffs’ property, thereby depriving plaintiffs of the property.” (Id.) On January 31, 2011, the Michigan state court issued an oral ruling on Plaintiffs’ Motion for Summary Disposition. The state court noted that failure to respond to discovery requests should result in summary disposition only when it is egregious. The state court found that Debtor’s failure to respond to any of the written discovery requests, file a response to the Motion for Summary Disposition, and appear at the hearing on the motion were sufficient basis for the entry of an order granting summary disposition. Although the state court did not specifically refer to Michigan Court Rule 2.313, which permits entry of a default judgment as a sanction for failure to comply with discovery requests, the state court did indicate in its oral ruling that the judgment was “based upon the complete and utter failure to respond to discovery requests in this case.” (Tr. of H’rg at 2, Adv. Proc. No. 11-80382, Jan. 31, 2011, ECF No. 7-2.) On January 31, 2011, the state court entered an order awarding Plaintiffs $42,706.10, plus statutory interest. The judgment did not specify the claim or claims upon which it was based. Debtor filed a voluntary petition for relief under Chapter 7 of the Bankruptcy Code on July 26, 2011. Plaintiffs timely filed an adversary complaint seeking to have the debt owed to them declared non-dischargeable pursuant to 11 U.S.C. § 523(a)(4). On October 27, 2011, Plaintiffs filed a motion for summary judgment in the bankruptcy court. Plaintiffs did not specifically identify which part of § 523(a)(4) they relied upon in bringing their dischargeability complaint. They simply stated that Debtor’s actions constituted “fraud or defalcation while acting in a fiduciary capacity, embezzlement, or larceny pursuant to 11 U.S.C. § 523(a)(4).” (Adv. Compl. at 1, Adv. Proc. No. 11-80382, ECF No. 1-2). On December 22, 2011, the bankruptcy court heard oral argument on the motion for summary judgment and announced its oral ruling from the bench. On January 5, 2012, the bankruptcy court entered an order granting Plaintiffs’ summary judgment motion and declaring the debt to be non-dischargeable pursuant to § 523(a)(4) as a debt for embezzlement. In analyzing the state court judgment, the bankruptcy court deduced from the amount of damages awarded that the judgment must have been based on Plaintiffs’ claim for statutory conversion. The bankruptcy court noted that the facts alleged and deemed admitted in the state court proceeding gave some indications of fraud. The bankruptcy court then held that conversion under Michigan law, coupled with at least some indications of fraud, is tantamount to embezzlement under 11 U.S.C. § 523(a)(4). Therefore, applying principles of issue preclusion, the bankruptcy court determined that the debt was non-dischargeable. IN RE DANTONE Cite as 477 B.R. 28 (6th Cir.BAP 2012) 35 Debtor appeals from that determination arguing that the bankruptcy court applied the wrong definition of embezzlement, that the matters at issue in the state court do not include all of the issues required for a determination of embezzlement under § 523(a)(4), and that principles of issue preclusion should not apply to a judgment which does not identify with specificity the theory upon which it is based. Prior to oral argument, the Panel asked the parties to brief the issues of whether Michigan state courts give issue preclusive effect to default judgments and whether it was appropriate for the Panel to raise this issue sua sponte. IV. DISCUSSION A. Summary Judgment Summary judgment is proper when “the movant shows that there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.” Fed.R.Civ.P. 56(a). Rule 56 of the Federal Rules of Civil Procedure was amended in 2010; however, “[t]he commentary to Rule 56 cautions that the 2010 amendments were not intended to effect a substantive change in the summary-judgment standard.” Newell Rubbermaid, Inc. v. Raymond Corp., 676 F.3d 521, 533 (6th Cir.2012). “A court reviewing a motion for summary judgment cannot weigh the evidence or make credibility determinations.” Ohio Citizen Action v. City of Englewood, 671 F.3d 564, 569 (6th Cir.2012) (citation omitted). “Instead, the evidence must be viewed, and all reasonable inferences drawn, in the light most favorable to the non-moving party.” Id. at 570. “A genuine issue of material fact exists if the evidence is such that a reasonable jury could return a verdict for the nonmoving party.” Yeschick v. Mineta, 675 F.3d 622, 632 (6th Cir.2012) (citation and internal quotation marks omitted). B. Issue Preclusion [2-4] “[Issue preclusion, also known as collateral estoppel,] precludes relitigation of an issue in a subsequent, different cause of action between the same parties where the prior proceeding culminated in a valid, final judgment and the issue was (1) actually litigated, and (2) necessarily determined.” People v. Gates, 434 Mich. 146, 452 N.W.2d 627, 630 (1990) (citations omitted), abrogated in part by Monat v. State Farm Ins. Co., 469 Mich. 679, 677 N.W.2d 843, 852 (2004) (holding that mutuality is not always a necessary element of issue preclusion). Although a bankruptcy court must make its own determination regarding the dischargeability of a debt, that determination may be governed by factual issues which were actually and necessarily decided by a state court in a prior proceeding. See Grogan v. Gamer, 498 U.S. 279, 284, n. 11, 111 S.Ct. 654, 658, n. 11, 112 L.Ed.2d 755 (1991) (holding that principles of issue preclusion apply in nondischarge-ability actions under § 523(a)). See also Corzin v. Fordu (In re Fordu), 201 F.3d 693 (6th Cir.1999); Bay Area Factors v. Calvert (In re Calvert), 105 F.3d 315 (6th Cir.1997). A bankruptcy court is obligated to give a state court judgment the same preclusive effect that the courts of the state in which the judgment was entered would accord it. In re Fordu, 201 F.3d at 703; In re Calvert, 105 F.3d at 317. [5] Under Michigan law, issue preclusion applies when: 1) there is identity of parties across the proceedings; 2) there was a valid, final judgment in the first proceeding; ■ 3) the same issue was actually litigated and necessarily determined in the first proceeding; and 36 477 BANKRUPTCY REPORTER 4) the party against whom the doctrine is asserted had a full and fair opportunity to litigate the issue in the earlier proceeding. Darrah v. City of Oak Park, 255 F.3d 301, 311 (6th Cir.2001) (citing Gates, 452 N.W.2d at 630-31). In the case currently on appeal, the parties agree that the first, second, and fourth elements have been established. The only disputed issue is whether the third element has been satisfied. Debtor contends that the bankruptcy court erred because the state court did not necessarily determine all of the elements for nondischargeability for embezzlement under § 523(a)(4). [6] Analysis of the third element for issue preclusion requires a two-part inquiry: (1) was the issue “actually litigated” in the state court proceeding, and (2) was the issue “necessarily determined.” McCal-lum v. Pixley (In re Pixley), 456 B.R. 770, 776 (Bankr.E.D.Mich.2011) (citing Michigan case law). A party “is precluded from contesting any issue that was both ‘actually litigated and necessarily determined’ by a state court judgment.” Id. at 778. An issue must meet both requirements before it is considered to have any preclusive effect in a subsequent proceeding. Id. 1. “Actually Litigated ” [7] “Under Michigan law, an issue is ‘actually litigated’ if it is ‘put into issue by the pleadings, submitted to the trier of fact for determination, and is thereafter determined.’ ” Phillips v. Weissert (In re Phillips), 434 B.R. 475, 486 (6th Cir. BAP 2010) (citing Latimer v. William Mueller & Son, Inc., 149 Mich.App. 620, 386 N.W.2d 618, 627 (1986)). As noted previously, the Panel requested supplemental briefing on the issue of whether a default judgment meets the “actually litigated” requirement for issue preclusion because it appears that the Michigan Supreme Court may not give issue preclusive effect to such judgments. In Lichon v. American Universal Insurance Co., 435 Mich. 408, 459 N.W.2d 288 (1990), the Michigan Supreme Court indicated that a default judgment is not entitled to preclusive effect because none of the issues is actually litigated. Id. at 299. The Michigan Supreme Court quoted with approval from comment e of § 27 of the Second Restatement of Judgments: Under 1 Restatement Judgments, 2d, § 27, p. 250, collateral estoppel applies “[w]hen an issue of fact or law is actually litigated and determined by a valid and final judgment.... ” Comment e to this section clarifies this rule: “A judgment is not conclusive in a subsequent action as to issues which might have been but were not litigated and determined in the prior action.” Comment e of the Restatement Judgments, 2d, § 27, p. 257, further indicates that “[i]n the case of a judgment entered by confession, consent, or default, none of the issues is actually litigated.” Id. at 298-99 (internal citation omitted). Given the Michigan Supreme Court’s favorable citations to § 27 of the Second Restatement of Judgments and to comment e in particular, and given no later case law from the Michigan Supreme Court repudiating this pronouncement, it seems fair to conclude that a default judgment entered by a state court in Michigan generally has no issue preclusive effect. Cf. Sill v. Sweeney (In re Sweeney), 276 B.R. 186, 193 (6th Cir. BAP 2002) (a default judgment entered by a state court in Ohio has no issue preclusive effect unless it is clear that the court’s findings are based on admissible evidence as opposed to allegations deemed admitted by virtue of defendant’s default). IN RE DANTONE Cite as 477 B.R. 28 (6th Cir.BAP 2012) 37 Michigan bankruptcy courts appear to have overlooked Lichon in ruling on the preclusive effect of default judgments by Michigan state courts. See In re Phillips, 434 B.R. at 486 (detailing disagreement among courts regarding the preclusive effect of default judgments and collecting cases). However, the Panel concludes that it need not decide whether the state court judgment at issue in this case was actually litigated because Debtor conceded the element of “actually litigated” in briefing before the bankruptcy court. (Def s Br. in Opp’n to Mot. for Summ. J. at 5, n.2, Adv. Proc. No. 11-80382, ECF No. 10) (Debtor stated that by filing an answer in the state court proceeding, she participated in the state action and the issue, therefore, was “actually litigated”). Our general practice is not to consider arguments raised for the first time on appeal. U.S. Bank Nat’l Ass’n v. Barbee (In re Barbee), 461 B.R. 711, 718 (6th Cir. BAP 2011). Although there are exceptions to this rule, see U.S. Nat’l Bank of Or. v. Indep. Ins. Agents of Am., Inc., 508 U.S. 439, 446, 113 S.Ct. 2173, 2178, 124 L.Ed.2d 402 (1993); United States v. Green, 654 F.3d 637, 647 (6th Cir.2011), given our ability to resolve this appeal based on an issue that was actually raised before the bankruptcy court and properly preserved on appeal, we see no reason to deviate from our general practice. 2. “Necessarily Determined ” [8] The Michigan Supreme Court holds that “[a]n issue is necessarily determined only if it is ‘essential’ to the judgment.” Gates, 452 N.W.2d at 631 (citing Restatement (Second) of Judgments § 27 cmt. h (1982)). In City of Detroit v. Qualls, 434 Mich. 340, 454 N.W.2d 374 (1990), the Michigan Supreme Court described the requirement further: ‘The issue to be concluded must be the same as that involved in the prior action. In the prior action, the issue must have been raised and litigated, and actually adjudged. The issue must have been material and relevant to the disposition of the prior action. The determination made of the issue in the prior action must have been necessary and essential to the resulting judgment.’ IB Moore, Federal Practice, ¶ 0.443[1], p. 759. Qualls, 454 N.W.2d at 382-83. As previously noted, the state court judgment did not expressly indicate the basis for the money judgment awarded Plaintiffs. Nevertheless, the amount of the money judgment — $42,706.10—sug-gests that it must have been based on Plaintiffs’ claim for statutory conversion,— the only claim of the four claims pleaded that includes treble damages. Indeed, the judgment awarded is precisely three times the $13,510.00 in damages, plus $2,176.10 in costs and attorney’s fees, sought in Plaintiffs’ motion for summary disposition. [9] During argument before the bankruptcy court and in briefing before the Panel, the parties debated the issue pre-clusive effect under Michigan law of alternative claims for relief when the judgment is a general judgment only. See, e.g., McCurdie v. Strozewski (In re Strozew-ski), 458 B.R. 397, 405-07 (Bankr. W.D.Mich.2011); Kasishke v. Frank (In re Frank), 425 B.R. 435, 440-42 (Bankr. W.D.Mich.2010). The Panel, however, need not decide whether the Michigan Supreme Court would follow the Second Restatement of Judgments or revert to the view expressed in the First Restatement of Judgments even though the Michigan Supreme Court has cited with approval to other portions of § 27 in the Second Restatement. See Lichon, 459 N.W.2d at 298-99 (comment e); Gates, 452 N.W.2d at 631 (comment h); Qualls, 454 N.W.2d at 382. Rather, the Panel agrees with the 38 477 BANKRUPTCY REPORTER bankruptcy court that the record before the state court can lead to but one conclusion, that the state court judgment of $42,706.10 was based on Plaintiffs’ claim for treble damages for statutory conversion under Michigan Compiled Laws § 600.2919a. See also Restatement (Second) of Judgments § 27 cmt. f (“If it cannot be determined from the pleadings and other materials of record in the prior action what issues, if any, were litigated and determined by the verdict and judgment, extrinsic evidence is admissible to aid in such a determination.”). Accordingly, the bankruptcy court correctly deduced from the record before it that the state court judgment was based on Plaintiffs’ claim for statutory conversion. The Michigan conversion statute, Michigan Compiled Laws § 600.2919a, provides in pertinent part: (1) A person damaged as a result of either or both of the following may recover 3 times the amount of actual damages sustained, plus costs and reasonable attorney fees: (a) Another person’s stealing or embezzling property or converting property to the other person’s own use. (b) Another person’s buying, receiving, possessing, concealing, or aiding in the concealment of stolen, embezzled, or converted property when the person buying, receiving, possessing, concealing, or aiding in the concealment of stolen, embezzled, or converted property knew that the property was stolen, embezzled, or converted. Mich. Comp. Laws § 600.2919a(l)(a)-(b). Michigan Complied Laws § 600.2919a was amended in 2005. Prior to that time, the behavior described in subsection (b) was the only basis for “statutory conversion.” As a result, treble damages were only available when a third party had acquired the converted property. In 2005, “[t]he Legislature added 600.2919a(l)(a) so that a plaintiff could receive treble damages from the actual thief himself.” Joy & Middle-belt Sunoco, Inc. v. Fusion Oil, Inc., 2008 WL 283767, at *2, n. 2 (E.D.Mich. Jan. 31, 2008) (citation omitted). In the present case, the factual allegations in the state court complaint suggest that the state court judgment was based on § 600.2919a(l)(a), as opposed to § 600.2919a(l)(b). Conversion under § 600.2919a(l)(b) does not apply to the person who committed conversion. Instead, it “applies only to other persons, who buy, receive, possess, conceal, or aid in the concealment of stolen, embezzled, or converted property, with knowledge that the property was stolen, embezzled, or converted.” In re Pixley, 456 B.R. at 786. [10-14] “The Michigan conversion statute does not define the word ‘converting’ or itself give elements for a conversion claim. Those are supplied by Michigan common law. The Michigan Supreme Court defines conversion as ‘any distinct act of domain wrongfully exerted over another’s personal property in denial of or inconsistent with the rights therein.’” In re Pixley, 456 B.R. at 787-88 (quoting Dep’t of Agrie, v. Appletree Mktg., L.L.C., 485 Mich. 1, 779 N.W.2d 237, 244 (2010); Foremost Ins. Co. v. Allstate Ins. Co., 439 Mich. 378, 486 N.W.2d 600, 606 (1992)). “ ‘Conversion may occur when a party properly in possession of property uses it in an improper way, for an improper purpose, or by delivering it without authorization to a third party.’ ” In re Pixley, 456 B.R. at 788 (quoting Appletree Mktg., L.L.C., 779 N.W.2d at 244-45). No intent to violate the property rights of another, or knowledge that another’s property rights are being violated, is required. In re Pixley, 456 B.R. at 788 (citing Michigan case law). The tort can be committed “unwittingly.” See Foremost Ins. Co., 486 IN RE DANTONE Cite as 477 B.R. 28 (6th Cir.BAP 2012) 39 N.W.2d at 606. “ ‘[N]either good nor bad faith, neither care nor negligence, neither knowledge nor ignorance, are of the gist of the action.’ ” In re Pixley, 456 B.R. at 788 (quoting J. Franklin Interests, L.L.C. v. Meng, Docket No. 296525, 2011 WL 4501841, at *9 (Mich.Ct.App. Sept. 29, 2011)). [15,16] Pursuant to § 528(a)(4), a Chapter 7 discharge will not discharge a debt “for fraud or defalcation while acting in a fiduciary capacity, embezzlement, or larceny.” Although Plaintiffs alleged that Debtor’s actions rose to the level of fraud, embezzlement and/or larceny, the bankruptcy court concluded that Debtor’s actions constituted only embezzlement. On appeal, Plaintiffs have not challenged the bankruptcy court’s determination that the other types of nondischargeability under § 523(a)(4) — defalcation and larceny — are inappropriate for summary judgment. Therefore, the Panel will not address the elements for nondischargeability under § 523(a)(4) for defalcation or larceny. Federal law defines “embezzlement” under section 523(a)(4) as the fraudulent appropriation of property by a person to whom such property has been entrusted or into whose hands it has lawfully come. A creditor proves embezzlement by showing that he entrusted his property to the debtor, the debtor appropriated the property for a use other than that for which it was entrusted, and the circumstances indicate fraud. Brady v. McAllister (In re Brady), 101 F.3d 1165,1172-73 (6th Cir.1996) (citations and internal quotation marks omitted). Thus, Plaintiffs must show (1) they entrusted property to Debtor; (2) Debtor appropriated the property for a use other than that for which it was entrusted, and (3) the circumstances indicate fraud or deceit. See id. [17] In the case currently on appeal, the bankruptcy court noted that conversion and embezzlement are similar. Because the allegations in the Complaint, which were deemed admitted, established conversion and described circumstances indicating fraud, the bankruptcy court concluded that Debtor’s actions constituted embezzlement. The Panel agrees with the bankruptcy court’s conclusion that the Michigan judgment for statutory conversion establishes the first two elements for embezzlement: (1) Plaintiffs entrusted property to Debtor, and (2) Debtor appropriated the property for a use other than that for which it was entrusted. See In re Brady, 101 F.3d at 1173. The bankruptcy court erred, however, when it concluded that the allegations in the complaint describing circumstances indicating fraud — the third element for nondischarge-ability under the embezzlement portion of § 523(a)(4) — were also a necessary element for statutory conversion under Michigan law. As noted above, statutory conversion under Michigan Compiled Laws § 600.2919a does not require circumstances indicating fraud. Section 600.2919a(a) defines statutory conversion as “[a]nother person’s stealing or embezzling property or converting property to the other person’s own use” (emphasis added). Allegations of fraud, even if deemed admitted based on a defendant’s default, cannot be “necessarily determined” for purposes of issue preclusion if they were not an essential element for a finding of statutory conversion. See In re Markowitz, 190 F.3d at 462 (in holding that the state court jury’s finding of legal malpractice did not decide issue of “willful and malicious injury” under § 523(a)(6), the Sixth Circuit noted that the state court recognized a requested special interrogatory on the question of willful and malicious injury “was neither necessary nor essential to V. CONCLUSION The Panel concludes that the bankruptcy court erred when it held that the issue of fraud was “necessarily determined” by the state court. Accordingly, the state court judgment cannot have issue preclu-sive effect as to this element for nondis-chargeability under the embezzlement portion of § 523(a)(4). The bankruptcy court’s order granting summary judgment to Plaintiffs is reversed, and the matter is remanded to the bankruptcy court for further proceedings consistent with this opinion.
CASELAW
User:WilsonSimm Wilson Simmons - writer of several books and local historian in Potter, NY Yates County.
WIKI
The Industrial Revolution Progress in technology and economy led to big changes in society during the industrialization. The industrial revolution started in Britain at the end of 17th century, and caused increasing population, wealth and power. How was the working conditions for, people and children? How was the living conditions for the less wealthy? What caused the urbanization? These settlements lack water, sanitation, garbage systems, storm drainage, street lighting, paved sidewalks, and roads for emergency access. In a typical slum within Victorian London, there was overcrowding in which people lived in the worst conditions imaginable. The air smelled gruesome from coal-fired stoves and there was hardly any sanitation. Large amounts of rubbish were dumped into the Thames River, which added The mMajority of people inon a rural areas had to migrate to the urban areas for employmentaiming for a job. This movement and, urbanization, was one of the negative effects that occuredwas issued during the Industrial Revolution. The citizens could not handle their own lives nor the overpopulated land. Their working conditions were very poor, “ Factories were not the best places to work. The only light present was the sunlight that came through the windows.” (Poddar) Their living conditions were even worse, “On the whole working-class neighborhoods were bleak, crowded, dirty, and polluted.”(Ashton, 93) According to the research, 25 to 33% of children in England diedeceased According to Document 4, the slums in towns and cities are filthy due to the lack of a drainage system and have unstable buildings. The river going through the slums are also pitch black due to a factory’s waste. This shows how the neighborhood that many factory workers lived in had deplorable living conditions where there was overpopulation and possibly many disease outbreaks to to the filth being piled in the slums. Because the point of view comes from a German socialist, it shows that the person has traveled and probably seen enough slums in cities to say that most are filthy and cramped. Document 5 shows a testimony given by a factory worker about how numerous people died at two separate mills because of dangerous working conditions including hazardous materials in the air to dangerous machinery. Tennent made apartment small to fit many immigrant family in to one apartment because the population was getting overcrowded in the city. Riis did research on people that lived in overcrowded homes and in bad condition, he investigate by seeing the role of the government in these neighborhoods he went through police and hospital record and found out that people were getting sick, especially children were mostly affected. Riis focused and saw that the living condition were unhealthy and unsanitary, that the apartment lacked pluming and proper ventilation. He found records that showed death rate in specific neighborhood in the city in 1888 he saw that death rate that year was 26.27 percent (Riis, p. 33). Not only was their high rate of diseases high, but also a high rate of criminality was high. It ended centuries of oppression and provided the peasants the opportunity to own land, vote, and live freely in society. The emancipation taught the peasantry that even under an autocratic rule, reform is achievable. The industrial revolution sent many of the peasants from the rural farms to the urban areas to work in factories. However, the peasants had simply traded the oppressive agrarian life for an equally oppressive urban industrial life. They worked long hours, generally six days a week, and their wages were barely enough to sustain a family. The environment condition was bad with smokes surrounding them. The release of harmful gases into the air from factories pollutes the world 's air, doing harm to the environment, further leading to global warming. Then, though it did boost many job opportunities, the living condition of the workers during the industrialization were poor. Company towns owned by business were rented out to employees. The owners forced them to live in isolated communities near workshops and forced them to buy goods with high interests. The Dust Bowl was a hard time during the great depression. The Dust Bowl negatively affected people in a personal way. The dust was hard to keep away. People fled and left everything. The drought made things worst and the environment was horrible to live in. When the Industrial age came sweeping over Europe, Britain was one of many nations to have seized the opportunity. Mass migration of people into the cities where work became available in factories resulted in poor living conditions for most of Britain’s people during the nineteenth century due to overcrowding. It was estimated around seventy percent of Britain’s total population were working class people by the nineteenth century. This meant poor hours, small wages, and children were forced to work for the family to survive. Had it not been for necessity children would not have worked in conditions where they were continually ill-treated at least for one man who, in a survey conducted about the conditions of the work environment stated, “Necessity The Industrialized and aristocracy people were the upper class people and the middle were the civil servants. The working class people were those who worked in the industries and were alienated by the upper class people. However many aristocracy people lost popularity due to the rapid increase in industrialization. With Industrialization, Aristocracy families began to decline leading in External
FINEWEB-EDU
[Python-Dev] FW: [Python-Help] Python threads with suncc (Forte 6.1) compiler Tim Peters tim.one@home.com Sat, 4 Aug 2001 01:33:03 -0400 Some Socket Wizard should worry about the attached. What's life like on 64-bit Linux (etc)? Perhaps more autoconf crap could fudge this. once-again-windows-shows-the-way<wink>-ly y'rs - tim Background info from an earlier Python-Help msg: > I work on a Solaris 8.0 (64 bit) system. Python is compiled with > Sun CC (Forte 6.1) compiler with threading support. A small program > telnetting to a computer often dumps core. -----Original Message----- From: python-help-admin@python.org Sent: Friday, August 03, 2001 5:06 AM To: help@python.org Subject: Re: [Python-Help] Python threads with suncc (Forte 6.1) compiler ... I've received some answers that this code running fine in the same environment. A collegaue of mine compiled Python 2.0 as I wrote yesterday, and later he debugged this error. Purify showed us stack read and write outside the stack in Modules/selectmodule.c in function: Modules/selectmodule.c . . static PyObject * select_select(PyObject *self, PyObject *args) { #ifdef MS_WINDOWS /* This would be an awful lot of stack space on Windows! */ pylist *rfd2obj, *wfd2obj, *efd2obj; #else pylist rfd2obj[FD_SETSIZE + 3]; pylist wfd2obj[FD_SETSIZE + 3]; pylist efd2obj[FD_SETSIZE + 3]; #endif . . . } In our environment FD_SETSIZE is 65536 as defined in sys/select.h (see below). The allocated stack space in select_select is 3*sizeof(rfd2obj)*(FD_SETSIZE+3). It is more than 3MB. My collegaue told me that the difference between the addresses of the same variable in two seperate threads is about 2MB. Lets suppose char *p1 = (char *)rfd2obj in thread N and char *p2 = (char *)rfd2obj in thread N + 1, abs(p1-p2) is about 2MB. The stack is overwritten between the seperate threads. He could solve the problem, as solved on Windows with allocating these variables on the heap. Do you have any ideas, how can it happen? /usr/include/sys/select.h: . . #ifndef FD_SETSIZE #ifdef _LP64 #define FD_SETSIZE 65536 #else #define FD_SETSIZE 1024 #endif /* _LP64 */ . . ... _______________________________________________ Python-Help maillist - Python-Help@python.org http://mail.python.org/mailman/listinfo/python-help
ESSENTIALAI-STEM
Patent Reform Act of 2007 The Patent Reform Act of 2007 was a bill introduced in the 110th United States Congress to introduce changes in United States patent law. Democratic Congressman Howard Berman introduced the House of Representatives bill on April 18, 2007. Democratic Party Senator Patrick Leahy introduced the Senate bill on April 18, 2007. The bill passed the house but died in the Senate. The bills broadly resembled the proposed Patent Reform Act of 2005 which would have enacted many of the proposals recommended by a 2003 report by the Federal Trade Commission and a 2004 report by the National Academy of Sciences. Similar acts were introduced as the Patent Reform Act of 2009 in the 111th Congress and as the America Invents Act in the 112th. Proposed changes in U.S. patent law In certain respects, H.R. 1908 and S. 1145 would have made American patent law more similar to patent laws of many other countries. H.R. 1908 proposed the following changes in U.S. patent law: Switch from first to invent to first to file Regardless of which application arrives first, the United States was the only nation in the world in 2007 to give priority to the application that claims the earliest invention date. The first-to-invent system is thought to benefit small inventors, who may be less experienced with the patent application system. Critics of the first-to-file system also contend it would create a "race to the mailbox," and would result in sloppier, last-minute patent applications. However, the first-to-invent system requires the United States Patent and Trademark Office (USPTO) to undertake lengthy and complicated "interference" proceedings to try to determine who invented something first when claims conflict. The first-to-file system, supporters contend, would inject much-needed certainty into the patent application process. Finally, because every other country is on a first-to-file system, supporters claim that the majority of patent applicants and attorneys are already operating on a first-to-file basis. Damages The version of the bill that passed the House contained dramatic changes to the way damages are determined when a court determines that an accused infringer has indeed infringed. The bill specifically limited royalty recovery to the "economic value properly attributable to patent's specific contributions over the prior art,"—that is, the inventive portion of the claim, as opposed to the whole claim. The bill additionally required a detailed record to be created of the basis for determining damages, presumably for use during appeal procedures, and finally, the bill created new limitations on when the whole market value of an infringing product was used as the royalty base. Other proposed provisions The bill would also have made the following changes: * Defining "inventor" to include a joint inventor and coinventor. * Revising procedures for patent interference disputes. * Revising requirements for an inventor's oath or declaration to allow substitute statements in specified circumstances (e.g., death or disability) and supplemental and corrected statements. * Allowing a third party assignee (other than the inventor) or a person with a proprietary interest to file a patent application. * Modifying provisions relating to damages for patent infringement to: * require a court to conduct an analysis of a patent's specific contribution over prior art; * allow increased damages for willful patent infringement; and * expand the prior user defense. * Renaming the Board of Patent Appeals as the Patent Trial and Appeal Board. (Also, revising provisions relating to the Board's composition, duties, and authorities). * Establishing an administrative procedure at the USPTO allowing a person who is not the patent owner to challenge the validity of an issued patent (post-grant review). Would also set forth procedures for the consideration of such petitions, including provisions to prevent harassment of patent owners and abuse of process. * Allowing third parties to submit documents relevant to the examination of a patent application. * With respect to infringement litigation, revising venue requirements to allow actions to be brought in the judicial district where either party resides (in 2007, allowed only where the defendant resides) or where the corporation has its principal place of business or was incorporated. * Banning tax planning patents. * Preventing enforcement of patents covering digital check collection against financial institutions, such as those owned by DataTreasury. Status The House version of the bill passed; the Senate version failed to pass in the 110th Congress. On September 4, 2007 the United States House Committee on the Judiciary reported the bill H.R. 1908, as amended, with the recommendation that it be passed by the House. The House passed the bill by a vote of 220-175 on September 7, 2007. It was favored among Democrats (160 ayes, 58 noes) and disfavored among Republicans (60 ayes, 117 noes). The Senate Committee on the Judiciary marked up the bill on June 16, 2007 and ordered the bill reported. The report, S. Rpt. 110-259, was issued on January 24, 2008. The bill stalled and Senate Majority Leader Harry Reid removed it from consideration. Reactions and lobbying * American Institute of Certified Public Accountants supported the provision banning patents on tax planning methods. * Business Software Alliance indicated that it supported the bill because it provided "provisions to improve patent quality; ensure equitable and fair remedies for patent infringement; give the U.S. Patent and Trademark Office greater resources to process a growing number of complex patent applications; and harmonize the American system with those of other major patent-granting nations." * Coalition for Patent Fairness which is a group of IT companies like Apple, Google, Intel, Microsoft, Cisco, Dell, HP, Micron, Oracle, and Symantec, favored limitations on damage for infringement. * Electronic Frontier Foundation favored limitations on damage for infringement. * The United States Department of Commerce opposed the bill "in its entirety" due to the provisions limiting damages for infringement and stated that if those sections were not revised, "the resulting harm to a reasonably well-functioning U.S. intellectual property system would outweigh all the bill's useful reforms." However the USDOC supported the bill's provisions directed to the improvement of patent quality, beginning at the application stage. * AFLCIO, United Steel Workers, Change To Win Labor Federation, and other unions or groups that favor unions - including POPA, the union of US patent examiners - lobbied against the bill, characterizing it as weakening the rights of patent holders which would in turn stifle American innovation and contribute to the outsourcing of U.S. jobs to other nations. * Several conservative groups, including American Family Association, and Eagle Forum lobbied against the bill on the basis that it undermined "America's historically strong intellectual property rights...for the benefit of one economic sector, large IT firms, to the detriment of almost every other industrial, service, and financial sector of the economy" * The Biotechnology Industry Organization lobbied against the bill, since the biotechnology industry relies heavily on strong patent rights. * Coalition for 21st Century Patent Reform, favored several provisions but opposed the bill that passed the House because of the damages section. * IEEE, which represents engineers and the Innovation Alliance, which represents entrepreneurs, and the National Small Business Association opposed the Act because they viewed it as weakening the rights of inventors and small business. * National Association of Patent Practitioners characterized the bill as containing an "anti-patent wish-list" and opposed it for weakening the patent system. They also noted that the bill would make it easier to challenge the validity of a patent on the basis of inequitable conduct, a point of concern for patent attorneys. * Professional Inventors Alliance, PIAUSA.ORG International reaction Yongshun Cheng, former Deputy Director of the IP Division of the Beijing High People's Court, has criticized the bill as being hypocritical. He asserts that the US should not be weakening the rights of US patent holders at the same time it is pressuring the Chinese government to strengthen the rights of Chinese patent holders. The Indian Pharmaceutical Alliance has pointed out that the provisions of the bill which allow for the validity of a US patent to be challenged shortly after the patent issues, could favor Indian generic drug manufacturers by lowering the cost and legal risks associated with challenging drug patents of questionable validity.
WIKI
Talk:Keith Self 2023 Allen mall shooting Please take WP:NOTFORUM and WP:SYNTHESIS into account when adding content to the section about gun violence. This article is about a politician, not about whether gun control is morally justifiable nor how you [the editor] personally feel about Keith Self, regardless of how strong you feel that your arguments are. The identity and personal beliefs of the perpetrator, the identity and ages of the victims, and the number of mass shootings in the last X days are irrelevant here unless a published source meeting WP:RS discusses what Self—who is the topic of this article—said or did in direct relation to these topics. Carguychris (talk) 22:48, 9 May 2023 (UTC)
WIKI
PDA View Full Version : (Revelations) DNA Sequence 1 and 2 Achievements Not Unlocking sev1nk 03-01-2014, 06:33 PM I'm currently experiencing an issue where I complete DNA sequence 1 and receive no achievement through Uplay. Same with 2. I did receive the action points however. I've attempted to start a new game, delete my cloud storage, delete my old game in the game's menu, and delete the file in the "spool" directory, and still no luck. I've opened a ticket to Ubisoft support, perhaps they can simply unlock those achievements on their end for me. This is the first problem I've run into with Uplay. My experience has been all positive so far and I'd hate to become one more user waiting for Uplay to go away. If anyone has experienced this issue, let me know what you did as a solution. Thanks. sev1nk 03-01-2014, 07:12 PM Status report. I've received the "Best Served Cold" DNA Sequence 1 achievement. I believe this is due to the fact that I completed it after I deleted my saved game on the cloud before starting a new game. 1. Open the game. Delete any saved games through the game's menu. 2. Alt-tab out of the game (don't exit) and go to your Program Files directory (usually C:\Program Files or C:\Program Files (x86)) and find the Ubisoft Game Launcher directory. Go to the savedgames folder and give all files a ".deleted" extension. 3. Go back to the game and exit through the game's menu. This will trigger Uplay to sync the cloud data with what's in the savedgames folder. 4. Start playing.
ESSENTIALAI-STEM