Document
stringlengths
87
1.67M
Source
stringclasses
5 values
wall walk Noun * 1) The walkway along the top of a defensive wall, normally shielded by a parapet on one side; the allure.
WIKI
Johannes Karl von und zu Franckenstein Johannes Karl von und zu Franckenstein (1610–1691) was the Prince-Bishop of Worms from 1683 to 1691. Biography A member of the House of Franckenstein, Johannes Karl von und zu Franckenstein was born in Castle Frankenstein in 1610. On 17 August 1683, the cathedral chapter of Worms Cathedral elected him to be the new Prince-Bishop of Worms. Pope Innocent XI confirmed his appointment on 16 July 1688 and he was consecrated as a bishop by Anselm Franz von Ingelheim, Archbishop-Elector of Mainz, on 5 September 1688. He died on 29 September 1691 and is buried in Frankfurt Cathedral.
WIKI
Wikipedia:Articles for deletion/Super Sireyna Worldwide The result was Merge to Eat Bulaga. (non-admin closure) czar ♔ 14:48, 16 November 2014 (UTC) Super Sireyna Worldwide * – ( View AfD View log Stats ) Pageant lacks notability, article is devoid of reliable independent sources. No indication of any significance. WWGB (talk) 10:52, 9 November 2014 (UTC) * Note: This debate has been included in the list of Fashion-related deletion discussions. NorthAmerica1000 22:49, 9 November 2014 (UTC) * Note: This debate has been included in the list of Philippines-related deletion discussions. NorthAmerica1000 22:49, 9 November 2014 (UTC) * Note: This debate has been included in the list of Events-related deletion discussions. NorthAmerica1000 22:51, 9 November 2014 (UTC) * Merge and redirect to Eat Bulaga as a possible search term, and because it hasn't gained notability independent of the noontime show. Narutolovehinata5 tccsdnew 13:38, 10 November 2014 (UTC) * Merge/redirect as above - Narutolovehinata's suggestion sounds like a good compromise that means this alternative pageant will receive SOME acknowledgement. Mabalu (talk) 15:53, 11 November 2014 (UTC)
WIKI
-- Saint-Gobain Third-Quarter Sales Rise 7.8%, Led By Asia, Beating Estimates Cie. de Saint-Gobain SA , Europe’s biggest supplier of building materials, said third-quarter sales rose 7.8 percent, helped by higher demand in emerging markets and an improvement in European construction markets. Revenue rose to 10.5 billion euros ($14.6 billion) from 9.72 billion euros a year earlier, the Paris-based company said today in an e-mailed statement. That compares with an average estimate of 10.3 billion euros in a Bloomberg survey of five analysts. Excluding acquisitions, asset sales, and exchange rates, revenue rose 2.3 percent, Saint-Gobain said. Sales in the quarter “continued to be driven by the emerging countries and Asia region and by the Innovative Materials Sector,” allowing price increases in all the group’s divisions “over the past few months,” the company said. European construction “gathered pace,” while North American construction markets “were hit by repercussions of over- optimistic expectations from distributors.” Saint-Gobain said on Oct. 13 the company may sell a minority stake of its packaging business in an initial public offering next year. Chief Executive Officer Pierre-Andre de Chalendar wants the maker of glass, plasterboards and pipes to focus on housing and construction products, and seeks medium- sized acquisitions in emerging markets and in the energy- efficiency and solar-energy industries. Packaging Revenue Revenue at the packaging business rose 0.2 percent on a comparable structure and currency basis to 923 million euros in the third quarter. Like-for-like sales rose 1.4 percent at the distribution unit , while they fell 3.1 percent in the construction products unit and advanced 13 percent at the glass and innovative materials unit. The French supplier of flat glass, packaging and pipes reiterated its full-year goals of “strong growth” in operating income at constant exchange rates, with an operating income for the second-half 2010 “slightly above the first half.” It also maintained its goal for free cash flow of 1.4 billion euros, while keeping “a robust financial structure.” Saint-Gobain said it will focus on controlling prices, and passing on higher costs for raw materials and energy. To contact the reporter on this story: Francois de Beaupuy in Paris at fdebeaupuy@bloomberg.net . To contact the editor responsible for this story: Benedikt Kammel at bkammel@bloomberg.net .
NEWS-MULTISOURCE
Typer: A Python Library for Building CLI Applications # What is Typer? # Typer is an exciting library for Python developers, designed to make the creation of command-line interface (CLI) applications not just easier, but also more enjoyable. Built on top of the well-known Click library, Typer leverages Python 3.6+ features, like type hints, to define CLI commands in a straightforward and intuitive way. Why Choose Typer? # • Simplicity: With Typer, you can create powerful CLI applications using minimal code. • Type Hints: Leverages Python's type hints for parameter declaration, reducing errors and improving code clarity. • Automatic Help: Generates help text and error messages based on your code. • Subcommands: Supports nested commands, allowing complex CLI applications. Getting Started with Typer # Installation # To begin using Typer, you first need to install it. You can easily do this using pip: !pip install typer -q Creating Your First Typer Application # Let's start with a simple example. We'll create an application that greets a user. First, import Typer and create an instance of it: import typer app = typer.Typer() Now, define a function that will act as your command. Use type hints for function arguments: @app.command() def greet( name: str = typer.Option( "--name", "-n", help="The name of the person to greet." ) ) -> None: """Greets the user by name.""" typer.echo(f"Hello {name}!") To run this application, use the following code block at the end of your script: if __name__ == "__main__": app() Running the Application # Save the script as greet.py and run it from the command line: %%writefile greet.py import typer app = typer.Typer() @app.command() def greet( name: str = typer.Option( ..., "--name", help="The name of the person to greet." ) ) -> None: """Greets the user by name.""" typer.echo(f"Hello {name}!") if __name__ == "__main__": app() OUTPUT Overwriting greet.py !python greet.py --name Alice OUTPUT Hello Alice! Help Documentation # Typer automatically generates help documentation for your application. Try running: !python greet.py --help OUTPUT Usage: greet.py [OPTIONS] Greets the user by name. Options: --name TEXT The name of the person to greet. [required] --install-completion [bash|zsh|fish|powershell|pwsh] Install completion for the specified shell. --show-completion [bash|zsh|fish|powershell|pwsh] Show completion for the specified shell, to copy it or customize the installation. --help Show this message and exit. You'll get a detailed description of how to use the command, including available options. Working with Subcommands # Typer supports subcommands, allowing you to build more complex applications. In the following example, the script is structured around a main Typer application (app) and two sub-applications (app_user and app_product). This hierarchical structure is a hallmark of Typer, allowing for the organization of commands into distinct categories – in this case, user-related and product-related operations. Such an approach not only enhances the readability and maintainability of the code but also provides a more intuitive interface for the end users. They can easily navigate through the different functionalities of the application, whether it's creating or updating users, or handling product information. %%writefile ecommerce.py import typer from typer import Context, Option app = typer.Typer(help="Operations for e-commerce.") app_user = typer.Typer(help="Operations for user model.") app_product = typer.Typer(help="Operations for product model.") app.add_typer(app_user, name="user") app.add_typer(app_product, name="product") @app.callback(invoke_without_command=True) def main( ctx: Context, version: bool = Option( None, "--version", "-v", is_flag=True, help="Show the version and exit.", ), ) -> None: """Process envers for specific flags, otherwise show the help menu.""" if version: __version__ = "0.1.0" typer.echo(f"Version: {__version__}") raise typer.Exit() if ctx.invoked_subcommand is None: typer.echo(ctx.get_help()) raise typer.Exit(0) @app_user.command("create") def user_create(name: str = typer.Argument(..., help="Name of the user to create.")) -> None: """Create a new user with the given name.""" print(f"Creating user: {name} - Done") @app_user.command("update") def user_update(name: str = typer.Argument(..., help="Name of the user to update.")) -> None: """Update user data with the given name.""" print(f"Updating user: {name} - Done") @app_product.command("create") def product_create(name: str = typer.Argument(..., help="Name of the product to create.")) -> None: """Create a new product with the given name.""" print(f"Creating product: {name} - Done") @app_product.command("update") def product_update(name: str = typer.Argument(..., help="Name of the product to update.")) -> None: """Update a product with the given name.""" print(f"Updating product: {name} - Done") if __name__ == "__main__": app() OUTPUT Overwriting ecommerce.py A key feature demonstrated in the script is the use of the callback function with the invoke_without_command=True parameter. This setup enables the execution of specific code (like displaying the version or help text) before any subcommands are processed. It's a powerful tool for handling pre-command logic or global options that apply to the entire CLI application. Moreover, the script showcases the simplicity and elegance of defining commands in Typer. Each operation, such as creating or updating users and products, is defined as a function, with parameters automatically translated into command-line options or arguments. This approach not only makes the code more readable but also leverages Python's type hints to ensure that the command-line arguments are correctly interpreted, providing a seamless and error-free user experience. In the following lines, there are some examples of the CLI call with different parameters. !python ecommerce.py --help OUTPUT Usage: ecommerce.py [OPTIONS] COMMAND [ARGS]... Operations for e-commerce. Options: -v, --version Show the version and exit. --install-completion [bash|zsh|fish|powershell|pwsh] Install completion for the specified shell. --show-completion [bash|zsh|fish|powershell|pwsh] Show completion for the specified shell, to copy it or customize the installation. --help Show this message and exit. Commands: product Operations for product model. user Operations for user model. !python ecommerce.py --version OUTPUT Version: 0.1.0 !python ecommerce.py user --help OUTPUT Usage: ecommerce.py user [OPTIONS] COMMAND [ARGS]... Operations for user model. Options: --help Show this message and exit. Commands: create Create a new user with the given name. update Update user data with the given name. !python ecommerce.py user create --help OUTPUT Usage: ecommerce.py user create [OPTIONS] NAME Create a new user with the given name. Arguments: NAME Name of the user to create. [required] Options: --help Show this message and exit. !python ecommerce.py product --help Conclusion # Typer is a powerful yet straightforward tool for building CLI applications in Python. By leveraging Python's type hints, it offers an intuitive way to define commands and parameters, automatically handles help documentation, and supports complex command structures with subcommands. Whether you're a beginner or an experienced Python developer, Typer can significantly enhance your productivity in CLI development. Happy coding with Typer! 🐍✨
ESSENTIALAI-STEM
Shire's stock surges after ADHD drug trial meets key endpoints Shares of Shire PLC surged 3.5% in premarket trade Wednesday, after the drug maker said a trial of its treatment for attention-deficit/hyperactivity disorder (ADHD) met its primary efficacy and safety endpoints. The secondary endpoint of improvement in global functioning was also met. The company said it plans to use these study results as part of a resubmission for Food and Drug Administration approval in the second half of 2017. The stock has tumbled 17% year to date through Tuesday, while the SPDR Health Care Select Sector ETF has declined 3.2% and the S&P 500 has eased 0.4%.
NEWS-MULTISOURCE
User:Shreyanshsharma.04/Sample page Shreyansh Sharma ''Shreyansh Sharma is bron on 4 September 2003 in Varanasi. In his early age he started playing cricket. At the age of 14 he started playing for Uttar Pradesh under 14 and at the age of 16 he is also the part of Uttar Pradesh under 16 And Also the India under 16. Now he is part of Uttar Pradesh under 19 squad.''
WIKI
VirtualStore in Windows 7 causes problems Feature? Hack? Or hugely misguided mistake? Imagine this: You are a web developer. You buy a brand new computer running Windows 7. You install Apache using all the default installation options. You fire up your browser to see Apache’s “It works!” test page …so it does, Apache. Awesome. You edit httpd.conf to point to your latest web project, restart Apache, refresh the browser. Which still shows It works! … not your project. Hmm. No startup errors in the Apache error.log …. you close & reopen httpd.conf & your changes still look good. Apache still shows It works! In a mad rage you delete all settings in httpd.conf & bang out some undocumented 4-letter profanity settings guaranteed to throw Apache startup errors. Restart Apache. It works! No, Apache, it doesn’t!! What the fuck. WTF is happening is a little-known feature, hack, & extremely bad idea from Microsoft in Windows 7 (and some other versions) called VirtualStore. VirtualStore should have been called VirtualStoreYourFilesElsewhereAndNotTellYou, because that’s what is occurring. When you saved your edited httpd.conf file, Windows 7 secretly saved it in (deep breath) … /Users/[Your User Name]/AppData/Local/VirtualStore/Program Files/Apache Software Foundation/Apache2.2/conf/httpd.conf … and a hidden link gets created within your Program Files folders to the VirtualStore copy. Normally this works okay with legacy Windows programs, but apparently with Apache running as a service, it doesn’t pick up the VirtualStore link. The upshot is while you continue madly editing your VirtualStore’d httpd.conf, Apache continues reading the original, which you are secretly being prevented from editing. How are you supposed to know what’s going on? Take a look … Awful VirtualStore Warning Microsoft's alert that VirtualStore files exist Yea. One little icon in the action bar. Not at all noticeable. (Microsoft should consider using my patented red oval). No indication of which files are “Compatibility Files”. And apparently, the linked file system doesn’t work consistently. What a stupid feature. It’s a hack, really, trying to blindly protect an operating system infamous for core-level security flaws. How about a simple warning that the VirtualStore hack was occurring? Or ditch VirtualStore & display a UAC-style dialog, “Program X wants to write to Program Files, cancel or allow?” Even cancel or allow would be an improvement. run as Administrator Don't forget this minor detail. What triggered VirtualStore in the first place? Way back when you fired up your text editor, you needed to run it in Administrator mode. Only then does it have the ability to save files directly under the protected Program Files folder structure without VirtualStore links. How to fix the VirtualStore mess — First, move your Apache config file(s) out of the VirtualStore folder structure. Then delete the Virtualstore/Apache Software Foundation/ folder. That removes the “Compatibility Files” links from the real directory. Then you can run your text editor in Administrator mode & redo your Apache config edits. Or even better: right-click on the folder that contains the files you want to edit, click Properties, Security tab & give Full Access privileges to your Windows user. Notepad (& possibly Wordpad) won’t trigger VirtualStore — instead they’ll simply throw a “permission denied” error until you switch to Administrator mode. Most third-party editors like Komodo Edit will silently generate the VirtualStore’d copies until you run them in Administrator mode. You can see which of your applications are being VirtualStore’d by opening Task manager, Processes tab, View menu, “Select Columns…”, check Virtualization. Back at the task list, any process with “Enabled” in the column means you’re in for some VirtualStore fuckedupedness. Best part: VirtualStore isn’t just for files — any program attempting to write to the registry under the HKEY_LOCAL_MACHINE\Software branch will be VirtualStore-slapped over to HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\Software Hope this helps someone! As someone commented on another blog, “I really hate how Microsoft surprises you with their new retarded ways of keeping us safe from ourselves.” Amen to that. If you have Windows 7 Professional, Ultimate, or Enterprise editions, you can disable VirtualStore completely through the Local Policy Editor. This may prevent some legacy programs from running, however. For more, see VirtualStore is horrible. How do you disable it in Windows 7.
ESSENTIALAI-STEM
The String of Pearls/Chapter 35 XXXV Sweeney Todd Commences Clearing the Road to Retirement Todd was but half satisfied with this excuse of Master Charley's, and yet it was one he could not very well object to, and might be true; so, after looking at Johanna for some moments suspiciously, he thought he might take it upon trust. 'Well, well,' he said, 'no doubt you will be better tomorrow. There's your sixpence for today; go and get yourself some dinner; and the cheapest thing you can do is to go to Lovett's pie-shop with it.' 'Thank you, sir.' Johanna was aware as she walked out of the shop, that the eyes of Sweeney Todd were fixed upon her, and that if she betrayed, by even the remotest gesture, that she had suspicions of him, probably he would yet prevent her exit; so she kept herself seemingly calm, and went out very slowly; but it was a great relief to gain the street, and feel that she was not under the same roof with that dreadful and dreaded man. Instead of going to Lovett's pie-shop, Johanna turned into a pastry-cook's near at hand, and partook of some refreshments; and while she is doing so, we will go back again, and take a glance at Sweeney Todd as he sat in his shop alone. There was a look of great triumph upon his face, and his eyes sparkled with an unwonted brilliance. It was quite clear that Sweeney Todd was deeply congratulating himself upon something; and, at length, diving his hand into the depths of a huge pocket, he produced the identical string of pearls for which he had already received so large a sum from Mr Mundel. 'Truly,' he said, 'I must be one of Fortune's prime favourites, indeed. Why, this string of pearls to me is a continued fortune; who could have for one moment dreamed of such a piece of rare fortune? I need not now be at all suspicious or troubled concerning John Mundel. He has lost his pearls, and lost his money. Ha, ha, ha! That is glorious; I will shut up shop sooner than I intended by far, and be off to the continent. Yes, my next sale of the string of pearls shall be in Holland.' With the pearls in his hand, Todd now appeared to fall into a very distracted train of thought, which lasted him about ten minutes, and then some accidental noise in the street, or the next house, jarred upon his nerves, and he sprang to his feet, exclaiming, 'What's that - what's that?' All was still again, and he became reassured. 'What a fool I get,' he muttered to himself, 'that every casual sound disturbs me, and causes this tremor. It is time, now that I am getting nervous, that I should leave England. But first, I must dispose of one whose implacable disposition I know well, and who would hunt me to the farthest corner of the earth, if she were not at peace in the grave. Yes, the peace of the grave must do for her. I can think of no other mode of silencing so large a claim.' As he spoke those words, he took from his pocket the small packet of poison that he had purchased, and held it up between him and the light with a self-satisfied expression. Then he rose hastily, for he had again seated himself, and walked to the window, as if he were anxious for the return of Johanna, in order that he might leave the place. As he waited, he saw a young girl approach the shop, and having entered it, she said, 'Mrs Lovett's compliments, Mr Todd, and she has sent you this note, and will be glad to see you at eight o'clock this evening.' 'Oh, very well, very well. Why, Lucy, you look prettier than ever.' 'It's more than you do, Mr Todd,' said the girl, as she left, apparently in high indignation that so ugly a specimen of humanity as Sweeney Todd should have taken it upon himself to pay her a compliment. Todd only gave a hideous sort of a grin, and then he opened the letter which had been brought to him. It was without signature, and contained the following words: The new cook is already tired of his place, and you must tonight make another vacancy. He is the most troublesome one I have had, because the most educated. He must be got rid of - you know how. I am certain mischief will come of it. 'Indeed!' said Todd, when he finished this epistle, 'this is quick; well, well, we shall see, we shall see. Perhaps we shall get rid of more than one person, who otherwise would be troublesome tonight. But here comes my new boy; he suspects nothing.' Johanna returned, and Todd asked somewhat curiously about the toothache; however, she made him so apparently calm and cool a reply, that he was completely foiled, and fancied that his former suspicions must surely have had no real foundation, but had been provoked merely by his fears. 'Charley,' he said, 'you will keep an eye on the door, and when anyone wants me, you will pull that spring, which communicates with a bell that will make me hear. I am merely going to my bedroom.' 'Very well, sir.' Todd gave another suspicious glance at her, and then left the shop. She had hoped that he would have gone out, so that there would have been another opportunity, and a better one than the last, of searching the place, but in that she was disappointed; and there was no recourse but to wait with patience. The day was on the decline, and a strong impression came over Johanna's mind, that something in particular would happen before it wholly passed away into darkness. She almost trembled to think what that something could be, and that she might be compelled to be a witness to violence, from which her gentle spirit revolted; and had it not been that she had determined nothing should stop her from investigating the fate of poor Mark Ingestrie, she could even then have rushed into the street in despair. But as the soft daylight deepened into the dim shadows of evening, she grew more composed, and was better able, with a calmer spirit, to await the progress of events. Objects were but faintly discernible in the shop when Sweeney Todd came downstairs again; and he ordered Johanna to light a small oil lamp which shed but a very faint and sickly ray around it, and by no means facilitated the curiosity of anyone who might wish to peep in at the window. 'I am going out,' he said, 'I shall be gone an hour, but not longer. You may say so to anyone who calls.' 'I will, sir.' 'Be vigilant, Charley, and your reward is certain.' 'I pray to Heaven it may be,' said Johanna, when she was again alone; but scarcely had the words passed her lips, when a hackney coach drove up to the door; and then alighted someone who came direct into the shop. He was a tall, gentlemanly-looking man, and before Johanna could utter a word, he said, 'The watchword, Miss Oakley, is St Dunstan; I am a friend.' Oh, how delightful it was to Johanna, to hear such words, oppressed as she was by the fearful solitude of that house; she sprang eagerly forward, saying, 'Yes, yes; oh, yes! I had the letter.' 'Hush! there is no time to lose. Is there any hiding-place here at all?' 'Oh yes! a large cupboard.' 'That will do; wait here a moment while I bring in a friend of mine, if you please, Miss Oakley. We have got some work to do tonight.' The tall man, who was as cool and collected as anyone might be, went to the door, and presently returned with two persons, both of whom, it was found, might with very little trouble be hidden in the cupboard. Then there was a whispered consultation for a few minutes, after which the first corner turned to Johanna, and said, 'Miss Oakley, when do you expect Todd to return?' 'In an hour.' 'Very well. As soon as he does return, I shall come in to be shaved, and no doubt you will be sent away; but do not go further than the door, whatever you do, as we may possibly want you. You can easily linger about the window.' 'Yes, yes! But why is all this mystery? Tell me what it is that you mean by all this. Is there any necessity for keeping me in the dark about it?' 'Miss Oakley, there is nothing exactly to tell you yet, but it is hoped that this night will remove some mysteries, and open your eyes to many circumstances that at present you cannot see. The villainy of Sweeney Todd will be espied, and if there be any hope of your restoration to one in whom you feel a great interest, it will be by such means. 'You mean Mark Ingestrie?' 'I do. Your history has been related to me.' 'And who are you - why keep up to me a disguise if you are a friend?' 'I am a magistrate, and my name is Blunt; so you may be assured that all that can be done shall be done.' 'But, hold! you spoke of coming here to be shaved. If you do, let me implore you not to sit in that chair. There is some horrible mystery connected with it, but what it is, I cannot tell. Do not sit in it.' 'I thank you for your caution, but it is to be shaved in that very chair that I came. I know there is a mystery connected with it, and it is in order that it should be no longer a mystery that I have resolved upon running what, perhaps, may be considered a little risk. But our further stay here would be imprudent. Now, if you please.' These last words were uttered to the two officers that the magistrate had brought with him, and it was quite wonderful to see with what tact and precision they managed to wedge themselves into the cupboard, the door of which they desired Johanna to close upon them, and when she had done so and turned round, she found that the magistrate was gone. Johanna was in a great state of agitation, but still it was some comfort to her now to know that she was not alone, and that there were two strong and no doubt well-armed men ready to take her part, should anything occur amiss; she was much more assured of her own safety, and yet she was much more nervous than she had been. She waited for Sweeney Todd, and strove to catch the sound of his returning footstep, but she heard it not; and, as that gentleman went about some rather important business, we cannot do better than follow him, and see how he progressed with it. When he left his shop, he went direct to Bell-yard, although it was a little before the time named for his visit to Mrs Lovett.
WIKI
Raúl Aguayo-Krauthausen Raúl Aguayo-Krauthausen (born July 15, 1980, in Lima, Peru) is a German disability rights activist. He was awarded the Order of Merit of Germany and is an Ashoka Fellow. Early life and education Krauthausen grew up in Berlin and attended one of the first inclusive schools as a child. He claims that going to this school is what laid the foundation stone for his career. After he finished school, Krauthausen decided to study social and business communication, which he says gave him a new perspective on life as a person with a disability. Krauthausen has said that throughout his life, he never wanted to think much about his disability. His parents always tried to make him play with other kids who were disabled, but he thought this was weird. However, when he entered college and was the only person with a disability, he changed his view. He missed the contact he had with other disabled persons. This is when he decided to start his nonprofit organisation. He studied Social and Economic Communication at the Berlin University of the Arts and Design Thinking at the HPI School of Design Thinking. Career Together with his cousin, Jan, he founded the nonprofit organisation Sozialhelden, which translates to social heroes, in 2004. He works alongside his colleague, Svenja Heinecke, on projects to make Germany and the rest of the world accessible. The organisation develops projects which address social issues and offer practical solutions in a spirit of diversity and inclusion. Their fundraising project Pfandtastisch helfen, which raises funds for other nonprofit organisations through donated bottle recycling receipts, received the Startsocial prize from Chancellor Angela Merkel in 2008. In 2010, Wheelmap.org, a crowdsourced online map for finding and marking wheelchair accessible places was launched by Sozialhelden. The map, which is available in 22 languages, is based on OpenStreetMap and operates under a Creative-Commons license. Wheelmap has worked with German phonebook provider, "Gelbe Seiten" to offer accessibility information about places that were already in the book. Krauthausen and his colleagues also invented Accessibility Cloud, a cloud that allows data on accessibility to be easily transferred to international organizations with the same goal. The overall goal of Krauthausen's nonprofit is "Disability Mainstreaming". In addition to his work for Sozialhelden Raúl Krauthausen co-founded Selfpedia.de in 2013, an online self-help community for questions and advice pertaining to life with a disability. Raúl Krauthausen is a frequent guest on talk shows and a popular interview partner for journalists regarding topics related to disability rights, accessibility and inclusion. In October 2016 Krauthausen went undercover in a German home for people with disabilities. He shaved his beard, cut his hair and even got rid of his signature hat. For five days he lived in the home and uncovered some harsh truths about the complete loss of independence that comes with being a disabled person in a care home. Krauthausen's undercover investigation was discussed by German politicians and decision-makers but did not lead to a change in legislation. One of the newest Sozialhelden projects is Leidmedien.de, an online platform for journalists and others whose work involves the portrayal of people with disabilities. Through advocacy, articles, workshops and informational materials Leidmedien.de offers perspectives on life with a disability which steer away from stereotypes and clichés. In 2014 Raúl Krauthausen developed a printable 3D mini ramp which can be used to overcome sidewalk curbs in a wheelchair. Raúl Krauthausen has osteogenesis imperfecta, also known as brittle bone disease, and uses a wheelchair. Krauthausen sees the Americans with Disability Act as a role model that he thinks Germany should follow. He believes that Germany doesn't score high in terms of accessibility in relation to other European countries. Personal life Krauthausen's partner is also disabled. Krauthausen says that he is fine with children being curious and asking him questions about his disability, but he is much stricter when it comes to adults and parents. Awards * 2009: Deutscher Engagementpreis (German Prize for Engagement) * 2010: Deutscher Bürgerpreis (German citizen Price) * 2010: Appointment as Ashoka Fellow * 2010: Inca-Award (Sozialhelden) * 2011: Vodafone Smart Accessibility Award * 2013: Order of Merit of Germany (Bundesverdienstkreuz am Bande) for his Engagement of Sozialhelden. * 2018: Grimme Online Award
WIKI
Wikipedia:Articles for deletion/Georgings The result was delete. - Mailer Diablo 11:07, 14 August 2006 (UTC) Georgings About a drinking game that appears to only be popular at one university. Only gets 250 hits on google, most are reposts of this article. NN. Renosecond 02:40, 9 August 2006 (UTC) * Delete. WP:NFT; no evidence of third-party coverage. --Allen 03:07, 9 August 2006 (UTC) * Delete per nom. -- Gogo Dodo 04:31, 9 August 2006 (UTC) * Delete Do you really need some cheesy made-up game as an excuse to drink? --Xrblsnggt 06:32, 9 August 2006 (UTC) * Delete, non-notable drinking game. J I P | Talk 09:08, 9 August 2006 (UTC) * Delete Wikipedia cannot possibly document every non-notable drinking game. — Adrian~enwiki (talk) 09:09, 9 August 2006 (UTC) * Delete per WP:NFT. Non-notable game with no verifiable sources. Scorpiondollprincess 13:40, 9 August 2006 (UTC) * Note: This debate has been included in the list of UK-related deletions. -- the wub "?!" 09:05, 10 August 2006 (UTC)
WIKI
Dust Mite Allergy Solutions - Do dust mites bite? Do dust mites bite? When it comes to allergies, most people associate them with common symptoms like sneezing, watery eyes, and congestion. However, allergies can also manifest in surprising ways, such as skin reactions. Dust mites, microscopic creatures commonly found in households, can be a hidden trigger for allergic skin reactions. Do dust mites bite? No, dust mites do not bite humans. Dust mites lack the physical structures necessary to bite or puncture the skin.They are microscopic creatures that primarily feed on dead skin cells and other organic matter found in dust. While they can cause allergic reactions in some individuals, their allergenic proteins are not delivered through biting. Instead, the allergic reactions are triggered when people come into contact with the microscopic waste particles produced by dust mites. Who can get dust mite allergy? Dust mite allergies can affect anyone, but certain factors can increase the likelihood of developing this type of allergy. Individuals with asthma, eczema, hay fever (allergic rhinitis), or a family history of atopy are at a higher risk. Atopy refers to a genetic predisposition to develop allergic reactions. Duration of dust mite allergy The duration of a dust mite allergy can vary from person to person. Allergic reactions to dust mites typically last as long as the person continues to be exposed to the allergens. If an individual remains in an environment where dust mite allergens are present, the allergic symptoms can persist. However, with proper management and avoidance of dust mite exposure, symptoms can be significantly reduced or even eliminated. It is important to consult with a healthcare professional for an accurate diagnosis and personalized treatment plan to effectively manage the duration of a dust mite allergy. Understanding dust mite allergies and skin reactions When sensitive individuals come into contact with dust mite allergens, their immune system goes into overdrive, resulting in various allergic symptoms, including skin reactions. Possible types of skin reactions: 1. Dermatitis: Dust mite allergens can trigger dermatitis, which manifests as red, itchy, and inflamed skin. This condition may present as atopic dermatitis (eczema), characterized by dry, scaly patches of skin that may ooze or become infected when scratched. 2. Urticaria (Hives): Hives are raised, itchy welts that can appear anywhere on the body. Dust mite allergens can cause hives as part of an allergic reaction, leading to temporary skin eruptions. 3. Pruritus: Dust mite allergens can induce pruritus, or generalised itching, without visible signs of rash or inflammation. How to reduce your dust mite allergies Managing and minimizing exposure to dust mites can help control and alleviate associated skin rashes and other allergy symptoms. By taking steps to control dust mites in your environment, you can reduce the presence of allergens that trigger skin reactions. Here are some effective strategies: 1. Regular Cleaning: Vacuum carpets, rugs, and upholstery frequently using a vacuum cleaner with a HEPA filter. This helps remove dust mites and their allergens from your living spaces. 2. Changing PJs and using anti-allergy materials in bedding: Anti-allergy bedding, such as mattress and pillow covers, prevents dust mite waste particles from penetrating the fabric and coming into direct contact with the skin. Additionally, opting for hypoallergenic materials in clothing, upholstery, and carpets can further reduce the presence of allergens in the living environment. By incorporating these anti-allergy materials, individuals with dust mite allergies can significantly improve their comfort and quality of life, ensuring a restful sleep and reducing the risk of skin rashes and other allergic symptoms. 3. Wash Bedding: Wash your bedding, including sheets, pillowcases, and blankets, in hot water regularly to kill dust mites and remove allergens. Use allergen-proof covers for mattresses, pillows, and duvets to create a barrier between you and the mites. 4. Minimize Clutter: Reduce the number of items that collect dust, such as stuffed toys, heavy curtains, and unnecessary decorations. Decluttering your living space makes it easier to keep surfaces clean and lowers the dust mite population. 5. Maintain Optimal Humidity: Dust mites thrive in humid environments, so it's essential to control indoor humidity levels. Use dehumidifiers or air conditioners to keep the humidity below 50%, creating an inhospitable environment for dust mites. 6. Clean Air Filters and use an air purifier: Regularly clean and replace filters in air conditioning and heating systems to prevent the circulation of dust mite allergens in the air. By implementing these control measures, you can significantly reduce dust mite populations and minimize the allergens that trigger skin rashes. However, it's important to remember that individual responses may vary, and consulting with a healthcare professional is recommended for personalized advice and treatment options. Remember, prevention and consistent maintenance are key in controlling dust mites and managing associated skin rashes effectively.   Sources: Healthline: What Dust Mite Bites Look Like and How to Get Rid of Them Cleveland Clinic: Dust Mite Allergy  Back to blog Join our community! We understand how challenging it can be to cope with a dust mite allergy. That's why we've created a Facebook group - to provide a safe and supportive space for those who are dealing with this condition. Whether you're seeking advice, sharing your experiences, or simply looking for a place to connect with others who understand what you're going through, we invite you to join this group. We encourage you to ask questions, offer support, and share your tips and tricks for managing your allergy symptoms.
ESSENTIALAI-STEM
Page:The empire and the century.djvu/544 standing army, and bred in traditions of triumphant militarism. Ah, but (we are told) he should have waited for the young generation. Were not young Afrikanders growing up who had education and could understand the inevitable forces at work? Odd as it may seem, the educated young Afrikanders did not consider these forces inevitable. They thought the Republican would be—or they could make it—me winning cause in South Africa. Test it in the concrete. Take a case wholly favourable, you would have said—a clever, ambitious young Afrikander of high character who was making his choice just when Milner came to Cape Town—Mr. J. C. Smuts. Born and bred a Cape Colonist, Mr. Smuts was loyal, of course—it seems but the other day he took honours at Cambridge. He chooses Pretoria. In a year or two behold him State Attorney: honest, competent, acridly Republican, talking (like General Trepoff) of reform, but as careful as he, or as Kruger himself, that reform should not touch the tap-root of exclusive power; next, counsel for reform (the Trepoff kind) at the Bloemfontein Conference … next, before the war ends, a Commandant spiritedly raiding his old Colony. And to-day? To-day Mr. Smuts is civis Britannicus once more. A great career in politics is assured to him by his talents and the title of a Boer ex-General; a great career at the Bar by his talents and the eager retainers of Johannesburg. He accepts the new order, quotes Schopenhauer to inquiring pro-Boers, and corresponds with the High Commissioner on the requirements of a truly democratic suffrage. Of course, he is loyal; English admirers quote his speeches, sombrely pledging his faith to the logic of the stricken field. Do I impugn it? Not at all. My question is, on the contrary, How far would England have got with that young man by any other logic? How far by 'waiting a generation'? General de Wet's war book affords a similar startling sidelight—one among many thrown by the war—upon
WIKI
How important is Data lineage in the context of Data Observability? This is a very long due post, predominantly because there is a lot of confusion around data lineage , data observability and the inter-dependancies. As many of us know data Lineage is one of the most discussed topic today (only after data observability ! ), this article covers the applicability of data lineage in Data […] Mona Rakibe August 16, 2022 This is a very long due post, predominantly because there is a lot of confusion around data lineage , data observability and the inter-dependancies. As many of us know data Lineage is one of the most discussed topic today (only after data observability ! ), this article covers the applicability of data lineage in Data Observability. PS: If you are specifically looking to understand lineage better, these are few of my favorites on this topic. Building Data Lineage: netflix & Leveraging Apache spark for Data Lineage : Yelp What is Data Lineage? Data lineage tracks the changes and transformations impacting any data record. Data lineage tells us where data is coming from, where it is going, and what happens as it flows from data sources and pipeline workflows to downstream data marts and dashboards. In short, it enables better data governance by giving you a more complete, top-down picture of your data and analytics ecosystem. Why is it so important for data quality? Data lineage is essential for understanding the health of the data because it ensures transparency around the source of data, ownership, access, and its transformation. These are excellent indicators of the reliability and trust of the data. However unlike other data quality indicators like Completeness, Validity, Accuracy, Consistency, Uniqueness, and Timeliness.(Read here) Data lineage can not me metricized. The insights provided by Lineage enable data users to solve all kinds of problems encountered within mass quantities of interconnected data like Data troubleshooting, Impact analysis, Discovery and trust, Data privacy regulation (GDPR and PII mapping), and Data asset cleanup/technology migration, and Data valuation. What is Data Observability? Data Observability is a set of measures that can help predict, identify and resolve data issues. Data Observability aims to reduce the mean time to detect (MTTD) and mean time to resolve (MTTR) data issues. Why is Lineage important for data Observability? Data lineage can be very effective in getting good Observability outcomes.The insights provided by Lineage enable data users to quickly find the root cause of issues , conduct impact analysis also invoke a remediation. So your data observability should leverage lineage information. How is data lineage used in Data Observability? Today, most data observability companies leverage Data Lineage for mean time to resolve (MTTR) issues by doing two things, Root cause analysis (RCA) Once a monitoring system detects an issue, Lineage can help investigate the previous steps in the pipeline and changes. Specifically, if you are using Datawarehouse monitoring tools like Montecarlo data, Metaplane etc you can find table/view lineage, that can help shrink the root cause analysis time. Downstream Impact Analysis Often Data Lineage can help find downstream impact and invoke remediation flow. Remediation by definition is an reactive approach and can become a nightmare. If you have a datamesh architecture, and have multiple consuming products using the data, leveraging lineage helps you identify which products are impacted and who own those products/systems. Now you can systematically notify those users. Other usecase is using Lineage you can identify the impacted dashboards. The above methods are definitely useful but still suboptimal for data observability. Data Lineage for RCA and Impact analysis What is the correct usage of Lineage in Observability? Data Observability, by definition, should be proactive. Data engineers should use Lineage to check downstream impact before adding any changes. For Example, am I making schema changes? Let me automatically check the downstream implications. For data in motion a full pipeline monitoring approach will not only help with MTTR but also MTTD issues. Design a metric monitoring system that monitors every step in the data pipeline. So users get alerted when there is a drift or outlier in a specific step of the pipeline, and multiple data points will help detect issues even before a they have downstream impact. Example : Get alerted that CRM system got partial data at 2pm PST.Such an alert can automatically be sent to CRM system owner, so data engineers dont have to find out about this issues inside Snowflake or BigQuery and reverse track them back to CRM system. Often this approach will also help orchestrate the date pipeline flow refer: Circuit breaker pattern. A good analogy would be monitoring vs. tracing and logs. If you have a lot of monitoring, you may not need tracing and log review because tracking at every level will highlight the same problems but sooner. This is because all methods highlight the same issues just from different angles. So I would say that Lineage is a good tool for root cause analysis and impact analysis (MTTR) but your observability tools should focus higher on for mean time to detect (MTTD) issues i.e be more proactive. Summary Data Lineage is a crucial aspect of Data reliability. However, to effectively reduce the MTTD and MTTR data issues : 1: Leverage lineage to understand the downstream impact before making changes. 2: Monitoring important data metrics every step of the pipeline and leverage Lineage to identify where the metric has drifted. • On this page See what’s possible with Telmai Request a demo to see the full power of Telmai’s data observability tool for yourself.
ESSENTIALAI-STEM
User:HueSatLum/Header [ Rights log] [ Articles created] AfD stats [ Automated edits] WikiChecker
WIKI
Denny High School Denny High School in Scotland is a non-denominational public secondary school. The school was opened in 1959, and moved to a new building in February 2009. The new school contains a gymnasium, swimming pool and drama studio. The school serves an area of 25 sqmi around the area of Denny, Falkirk, including Bonnybridge, Dunipace, Banknock and Dennyloanhead. In 2004, Denny High School had a roll of 1316 pupils and 95 teachers. It also employed 34 non-teaching staff. Alumni * David Marshall (born 1941), Member of Parliament (MP) for Glasgow Shettleston 1979–2005, Glasgow East 2005–08 * Andrew D. Taylor (born 1950) Director of the Science and Technology Facilities Council (STFC) * Karine Polwart (born 1970), singer-songwriter and folk musician
WIKI
How To Stop Knee and Low Back Pain For Runners, Cyclists, and Triathletes (0:00) This is a great exercise. A very simple exercise (0:03) for pain in the knee that’s (0:07) to the outside or the inside of the knee and also for lower back pain. (0:12) It’s great for cyclists and for runners (0:16) or triathletes. I’m a triathlete and (0:19) this has been really successful for me and for many of my clients as well (0:23) who have inner or outer knee pain as well as (0:28) low back pain, especially people with very unstable low backs. (0:31) If you’ve got discs that are out or long-term challenges, (0:36) a flat lower back – those kinds of things. This is a really good (0:40) exercise for you. First off, (0:43) you need a yoga brick – a basic yoga brick. (0:47) I’m using a foam one. I prefer wooden one, but a hard foam one actually will work quite (0:51) well. You can get these from a variety of places: (0:55) yoga studios, Walmart, Target I believe has them even, (1:00) you can buy online,ARTHRITIS-KNEE-PAIN (1:04)a bunch of different places. So start out with this. (1:08) First thing you’re going to do is you’re going to step fairly wide apart. You’re going (1:11) to take the brick and place it on the widest (1:15) width here between (1:18) the two legs. You want it just above (1:21) the boney part of the knee into the flesh of the inner thigh. (1:25) So very straight forward. Inner feet are parallel. You don’t want them (1:30) in a v-shape like this. You want them parallel. So what you’re doing is you’re (1:34) aligning the segments of your leg and your feet to proper (1:39) forward facing alignment and then you’re going to do movement through (1:42) them. That’s critical because this is going to (1:45) help to rebalance the tensioning between the inner and the outer (1:49) leg – rebalance it in a way that takes the pain away (1:52) and helps you to feel better basically. So just stand straight up. (1:57) Take your hands, put them on the back of your hips. The elbows are back so a lot of (2:01) times you’ll start with your elbows out, put your (2:03) elbows back. If putting your elbows back forces your lower back forward like so, (2:07) then drop your buttocks so that (2:11) your low back isn’t so bowed forward. (2:14) If that’s impossible and you’re getting a lot of strain up here (2:17) then maybe bring your arms out a little bit, but really do your best (2:20) not to. A mirror is your friend with this exercise. A mirror is your friend. (2:24) Try and keep this brick relatively (2:27) parallel to the floor. It may come off a little bit, but try and make it as parallel as you can. (2:32) At this point, your legs are fairly relaxed, the feet are flat against the (2:36) floor across the length of the foot so your arch isn’t gripping, your feet aren’t (2:42) curling up, and your toes aren’t off the floor. They’re nice and (2:45) flat and relaxed. Just a quick bend of the knees (2:48) and hips, and up, and then you’re going to squish the brick as hard as you can. (2:55) Now when you squish the brick, I want you to feel (2:59) not with your hands, but into this area, the pelvic region (3:02) the pelvic floor and feel whether or not your buttock is tightening up. If (3:07) it’s holding tight, if the buttock or the rearLow-Back-Pain (3:10) of the inner thigh is really grabbing, you want to release it so you can spread (3:14) across this sacral area here. So you’re going to be pressing primarily with the front inner (3:20) thigh, the front of the inner thigh. The feet – check in and see. Are they gripping and (3:25) grabbing? Are the toes off the ground? You want them nice and relaxed and soft on the ground. Now they may push (3:30) into the ground a little bit. That’s okay. Squish the brick as hard as you can. It’s going to hurt (3:34) a little bit. And then release, and bend, and come up, and squish again, (3:38) and release, and bend, and squish (3:41) again. Same rules go for every time you squish. Then when you remove the brick, (3:46) just have a walk and get a sense for what’s changed and what’s different. (3:50) Generally, you will have stimulated this (3:54) deductor, the inner thigh, and the outer (3:57) leg has to release. If you have pain in the outer leg, (4:00) it’s usually due you over tension and (4:04) pain in the inter leg, again, often due to over tension in the outer leg (4:08) and imbalance and tension in the inner leg. You’re stimulating this (4:12) and it’s causing your body to have to release this, therefore, these (4:16) two become more balanced. Pain goes away. (4:19) Anyway, have fun with it. Leave a Comment
ESSENTIALAI-STEM
User:Queenala/sandbox ENGL 470D 3/23/2017 Reflection – Team Lee Team Members: Queena Lau Mikayla Erceg Sam Du Bois Joon Rho Topic and Rationale: Team Lee chose to create a new article for Nancy Lee’s Dead Girls (novel). This topic was chosen because there was no existing page for the book, despite it having been in publication since 2002. Since the book was Nancy Lee’s debut novel, had received numerous awards, was overall well-received by critics, is available in several languages, and has been published overseas, we felt that by creating a Wikipedia page for the collection we would be actively engaging with the establishment and reception of CanLit. In addition, the book is reportedly inspired by the missing and murdered women in Vancouver’s Downtown Eastside between the 1980’s to 2000’s; by bringing this book to light, we would also be bringing to light the largely ignored topic, and context, of the marginalized in Canadian literature, the general media, and Vancouver’s literary culture. Group Reflection: Overall, we surprised at the interactive and immediate nature of the Wikipedia community. Our original topic received feedback almost as soon as it was posted on our sandbox; the reply was very insightful, if somewhat discouraging. Stating that they had already attempted to edit the same article, the wiki-user said that there was no available information for the outline we had made. After conducting some additional research, we found that the user was indeed correct. This ultimately allowed us to save a lot of time and effort that would otherwise have been spent on further research, and allowed us to make an informed decision to develop an entirely different topic and plan. The assignment also helped many of us develop new technical and transferable skills. We learned how to edit an article via technical platform, how to edit an article based on Wikipedia’s regulations and specifications, some basic programming skills, and how to work around copyright laws. Since we were developing a new article, it was difficult for us to learn how to set the correct “tone” for the page; we were aware that Wikipedia had constraints on opinions being written as facts. As a result, developing plot summaries, without inputting judgement or opinion, for the short stories in Dead Girls was a challenge. Given Wikipedia’s genre as a non-biased source of information, we had to learn to use the correct language when describing a character—for instance, “sex worker” instead of “prostitute”. This portion of our article, which necessitated the avoidance of descriptive language when describing a series of events, stood out from other parts of the page like “reception” or “media adaptation” where using journalistic, non-biased language was easier to utilize because facts were just being reiterated. Another aspect we learned from this genre was the format, or “template” of the information. We frequently had to check with other (similar) pages on novels and short stories in to know how the information was supposed to be laid out. This included the correct titles for subheadings, the general order of subheadings, whether certain subheadings looked better bolded, and what information is typically deemed necessary to include in the article. Overall, the group felt like we had addressed the exigency of lesser-known, but significant, Canadian literature, which was our intention from the start. Working on this article made us realize just how many other exigencies of the more marginalized have not yet been addressed. It is interesting to note, for instance, that our article on Dead Girls is now much longer, thorough, and has many more sources than the author herself. The other book listed on Nancy Lee’s Wikipedia page still has no page. Nonetheless, the group largely accomplished what we had set out to achieve. While we did not start out with any one defined goal, we did want to cover as many areas of the book as possible, both primary and secondary. We were able to locate almost hidden and/or lesser-known information about topics as a film adaptation, awards, and old newspaper reviews. Some of this information had not been publicized, and some had been taken down from the creditor’s website; this made finding certain information difficult. For instance, we were unable to find proper information on international releases, a sub-topic that was made more difficult by This sub-topic by language barriers. Also, since our project was to create a new article, we think that we may not have learned as much on how to engage with other wiki-users via the Talk function when editing an article, as some of the other groups in the class. Our team functioned very well as a group; we met deadlines and divided tasks equally, which allowed us to develop a high quality article, with numerous sources. Each member picked up tasks that needed to be done, and all members were open to constructive criticism and edits from/by the other members. All members were also comfortable enough with each other and the project to ask questions and ask for help, when needed. If we were to do this project again, we would try to read all of the stories in the novel in advance. The article took longer to create because we had to take time out to read the stories, and watch the film. Alternatively, we would also try to create an article on a novel or topic that the majority of members were already familiar with. In this scenario, only one of our group member had prior knowledge. Finally, our experience with this project really taught us more about the interactivity of Web 2.0, but in a more scholarly sense. While most of us may have experience with more personal platforms such as Facebook, or Reddit, or Twitter, this project taught us how to contribute to platforms like Wikipedia, where the majority of us have only read and used as a source of information. This project allowed us to become an intermediary source and author for specific, general, and global communities. It also taught us more about how different Web 2.0’s function, which allows us to make more informed comparisons. For instance, we were not aware that Wikipedians had talk pages for discussion, nor did we know that there was a very specific protocol for edits and interactions. We learned how Wikipedia defines “reliability”, and we learned of an entirely new Web 2.0 community “behind the scenes”. We found it interesting that this production structure existed. It was almost a little daunting to enter this community at first, because everyone appeared already well versed in these scholarly and social dynamics. However, once we started to post on talks and compare articles, it became easier to let go of our own work and allow it to be edited by the community, which is the point of collaborative work in the age of Web 2.0. Works Cited Lee, Nancy. Dead Girls. Toronto: McClelland & Stewart. Ltd, 2002. Print
WIKI
1946 Battersea North by-election The 1946 Battersea North by-election was a parliamentary by-election held on 25 July 1946 for the British House of Commons constituency of Battersea North in the Metropolitan Borough of Battersea. The seat had become vacant on the resignation from the House of Common of the constituency's Labour Member of Parliament (MP), Francis Douglas, who had been appointed as Governor of Malta and ennobled as Baron Douglas of Barloch. He had held the seat since a by-election in 1940. Candidates The Labour Party selected as its candidate Douglas Jay, a 39-year-old economist who had been a financial journalist, a Fellow of All Souls and then (from 1941) a civil servant. The Conservative Party candidate was B.A. Shattock, while the Liberal Party did not field a candidate. The third candidate was 38-year-old Trotskyite and adult education tutor, Hugo Dewar of the Independent Labour Party (ILP). He had joined the ILP in 1928, and in 1929 co-founded the Marxian League. He joined the Communist Party of Great Britain in 1931, but was expelled the following year. He was one of the founders in 1932 of the Communist League, Britain's first 'official' Trotskyist group, and had remained active in 'Left Opposition' groups until he was drafted into the army in 1943. Results On a turnout reduced to 55% from the 71% at the 1945 general election, Jay held the seat for Labour with 69% of votes, a small reduction from the 74% won by his predecessor in 1945. Shattock's 29.6% share was a small increase on the 26.1% Conservative vote the previous year, while Dewar won only 240 votes (1.5%) of the total, and lost his deposit. Aftermath Jay joined the government the following year as Economic Secretary to the Treasury, and held several other government offices before his retirement from the House of Commons in 1983. He was made a life peer in 1987.
WIKI
Office for Foreign Relations and Information The Office for Foreign Relations and Information (ÚZSI) (Czech: Úřad pro zahraniční styky a informace) is the main foreign intelligence service of the Czech Republic responsible for the collection, analysis and dissemination of intelligence. It is mandated to provide accurate and timely intelligence to the Government of the Czech Republic that is vital to support and protect foreign and economic policy interests. The service also protects the country from terrorism, the proliferation of weapons of mass destruction, economic crimes, etc. Powers of the service are determined by the Act N.153/1994 Coll., the Intelligence Services of the Czech Republic Act which also lays out the structure of the organization. Officers of the service are mandated to act in accordance with the agency's code of ethics. History The UZSI was located within the portfolio of the Czech Ministry of the Interior before the Act No. 153/1994 Coll. on intelligence services of the Czech Republic which made the service an independent institution. Before the Czech Republic became independent the agency was called the Office for Foreign Relations and Information of the Federal Ministry of the Interior. After the Czech independence, UZSI faced numerous challenges concerning the services development like developing a new framework of their activities, using new technologies and cooperation with foreign intelligence services. Production had significantly increased after these improvements had been made. Today the intelligence agency is a major player on the international intelligence scene and represents the Czech intelligence community all over the world. Organizational structure UZSI is headed by a Director-General who, on the government's consent, is appointed and dismissed by the Minister of the Interior. Czech's Interior minister is accountable to Government for the actions of UZSI. Directors in UZSI include: * Office of the Director General – who is responsible for Security and Defense, the secretariat of Public Affairs and the Inspection and control department. Directly subordinated to the Director are advisors including the Spokesman of the Office and those who are responsible for the areas of Security and Defence, Inspection and Control. * Deputy Director for Intelligence and Operations – who is responsible for numerous operational departments which include the Analysis department, the Signals Intelligence department and the foreign department. This director is also responsible for communication and the exchange of intelligence with foreign partners; * Deputy Director for Logistics – who is accountable for the finance and logistics, communication and information technology, archives and administration, legal affairs, personnel and training. Director General The current director of USZI is Marek Šimandl Former directors of the agency include: * Oldřich Černý * Petr Zeman * Jiří Lang * Karel Randák * Ivo Schwarz * František Bublan * Jiří Šašek 2014–2018 Radio operations According to Langley Pierce's Intercepting Numbers Stations, ÚZSI once operated a shortwave numbers station using the OLX callsign. The station ran under ÚZSI until 1996.
WIKI
Talk:Brno death march Naming * The following discussion is an archived discussion of the . Please do not modify it. Subsequent comments should be made in a new section on the talk page. No further edits should be made to this section. move. Andrewa (talk) 08:50, 8 January 2008 (UTC) It would be interesting to have a discussion on the naming of this article, as Google Scholar only give one result for the title "Brünn death march", and Google books gives none at all! This is in stark contrast with "Brno death march", which has five Google Scholar results (four this century), and six results on Google books - four this century and two from the Sixties, indicating a naming with long-standing currency in the English-speaking academic fraternity. Perhaps another title is even more prevalent. Thoughts? Knepflerle (talk) 18:21, 31 December 2007 (UTC) * This article was originally derived from a German language Wikipedia article and I concur that "Brno death march" would be a better title. Unless there are rational objections, I shall make the necessary moves. A l i c e ✉ 19:02, 31 December 2007 (UTC) * Please see WP:NCGN. The question is what the city is called in English when talking about May of 1945, which is a matter of fact; and what the death march is called, which may be something less melodramatic. If this were 1849, we would certainly use Brünn; if it were 1930, we would probably use Brno; 1968 would certainly be Brno. I would expect 1942 to be borderline, because most of our secondary sources would be discussing the Protectorate; I'm not sure of the answere here. Septentrionalis PMAnderson 19:54, 31 December 2007 (UTC) * A scholarly summation which I will take to mean that you favour the article being moved/renamed (or are neutral/undecided) unless you contradict my précis. (WP:NCGN is tangentially relevant since we are discussing the naming of an article dealing primarily with a march from a geographical place rather than geographical places themselves.) A l i c e ✉ 20:13, 31 December 2007 (UTC) * No, it means that you haven't supplied sufficient reason to move (and WP:NCGN is intended to cover mentions of places, like Brno, in other articles). Please see the section on False Positives. Persuade me, and the closing admin. Septentrionalis PMAnderson 20:27, 31 December 2007 (UTC) * I take your point about the dangers of relying on Google, but I am not convinced they apply in this case: "Use modern English names for titles and in articles. Historical names or names in other languages can be used in the lead if they are frequently used and important enough to be valuable to readers, and should be used in articles with caution." * The template I placed was as a courtesy and to attract exactly the sort of erudite input you are now providing but, of course, neither of us actually requires the assistance of an admin to complete the renaming/move. * Would you be kind enough to specify whether you think the proposed title is preferable to the current title and if you have an alternative preference or suggestion? A l i c e ✉ 22:00, 31 December 2007 (UTC) In considering what name should be used for an article on a historical event, I am not sure that our guidelines call for us to specifically consider what the English usage was at the time of the event - correct me and point out the relevant policy if I'm wrong. It calls for consideration just of English usage in general, over all the time since the event that it has been discussed in English. I still don't know what the best title for this article is; there exists a title seemingly more frequently used than that we currently use, but there may exist a yet more appropriate one. Knepflerle (talk) 05:11, 1 January 2008 (UTC) * No, although English of the time is often suggestive (I avoid contemporary, which should be used for this; hacks have rendered it uselessly ambiguous). It requires us to use the name which is used in modern English for the place (as it was then) and for the event. Evidence, if you please. Septentrionalis PMAnderson 18:22, 2 January 2008 (UTC) * The Google searches I referred to at the top of the page are some evidence that "Brno death march" is used more often in modern English writing than "Brünn death march", which seems to have next-to-no currency at all. What the most common use name for this event is I couldn't say, however I think the current title probably isn't it. If we gather some further evidence on how English refers to this event then we can make an informed decision. Knepflerle (talk) 19:08, 2 January 2008 (UTC) * Because this is Wikipedia, nothing is chiselled in stone, so changing to an imperfect "B" from an obviously unsatisfactory "A" is not necessarily an obstruction to a more perfect "C" (and "D" and "E" etc, if this historical event suddenly becomes newsworthy - for example). I think we're agreed that the "Brno" ingredient in the title is better than the current "Brünn", but there may be some argument as to whether "death" should be included (there was a recent contribution on this theme that was withdrawn by its author, if you examine the history of this talk page). A l i c e ✉ 19:37, 2 January 2008 (UTC) * I agree. Bearing in mind the comments below, I think the move to "B" would improve matters for now; I just hope that the search for the perfect "C" continues! Knepflerle (talk) 14:28, 6 January 2008 (UTC) Support move. I go to Google, and the results are not ust websites, but what I would call 'reliable' sources. The Prague Post is a weekly newspaper published in the Czech Republic and they write an article using "Brno". Next link is to an article by Centre Natiponal De La Recherche Scientific. A journal about it called 'National Mythologies and Ethnic Cleansing: The Expulsion of Czechoslovak Germans in 1945' says that it was the name that "survivors came to call it", so we must remember that it was called nothing when it happened in 1945 and the name came later. So if it definitely wold be called Brno in 1968 and borderline in 1945 like Septentrionalis suggests, what about 1950-1960 since this will be when name begins to become famous? Callmederek (talk) 19:44, 4 January 2008 (UTC) Support My thoughts parallel Callmederek comments regarding use of "Brno death march" in publications --Lox (t,c) 09:26, 6 January 2008 (UTC) * The above discussion is preserved as an archive of the . Please do not modify it. Subsequent comments should be made in a new section on this talk page. No further edits should be made to this section. Sudeten Germans vs. Germans All ethnic Germans were expelled, not only sudeten Germans, it includes also those who came from Germany during the war. So using sudeten Germans only is not historically accurate. ≈Tulkolahten≈ ≈talk≈ 14:32, 11 January 2008 (UTC) Article name Should this article be named * Brno "death march"? Compare to "Polish death camp" controversy. 3 people dying is tragic, but it does not make a death march. I would like some opinions on this. K.e.coffman (talk) 22:43, 22 February 2016 (UTC) External links modified (January 2018) Hello fellow Wikipedians, I have just modified 2 external links on Brno death march. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20070724041522/http://www.bruenn.org/de/ende.php to http://www.bruenn.org/de/ende.php * Added archive https://web.archive.org/web/20071009035004/http://todesmarsch.bruenn.org/PDF/btm-doku-avt.pdf to http://todesmarsch.bruenn.org/PDF/btm-doku-avt.pdf Cheers.— InternetArchiveBot (Report bug) 19:40, 23 January 2018 (UTC)
WIKI
Pore morphology in thermally-treated shales and its implication on CO2 storage applications: A gas sorption, SEM, and small-angle scattering study Debanjan Chandra, Tuli Bakshi, Jitendra Bahadur, Bodhisatwa Hazra, Vikram Vishal*, Shubham Kumar, Debasis Sen, T. N. Singh *Corresponding author for this work Research output: Contribution to journalArticlepeer-review Abstract A combination of high-resolution imaging, low-pressure gas adsorption, and small-angle X-ray and neutron scattering quantifies changes in the pore characteristics of pulverized shale samples under oxic and anoxic environments up to 300 ℃. Clay-rich early-mature shales have a fair potential to generate hydrocarbons, the total organic carbon content of which lies within a range of 2.9 % to 7.4 %. High-resolution imaging indicates restructuring and coalescence of Type III kerogen-hosted pores due to oxic heating, which causes up to 580 % and 300 % increase in the surface area and pore volume of mesopores respectively. Similarly, up to 300 % and 1200 % increase in micropore surface area and pore volume is observed post oxic heating. However, during anoxic heating, bitumen mobilizes, leads to pore-blockage, and reduces the surface area and pore volume up to 45 % and 12 % respectively without any significant mass loss up to 350 °C. Between 400 and 550 °C, considerable loss in mass occurred due to breaking of organic matter, facilitated by the presence of siderite that caused up to 30 % loss in mass. The test conditions display starkly opposite effects in pores that have a width of < 100 nm when compared to the larger macropore domain, which has a pore width in the range of 100 to 700 nm as inferred from their small-angle X-ray (SAXS) and neutron (SANS) scattering behaviour, respectively. Despite the formation of new mesopores or the creation of new networks of pores with rougher surfaces, the fractal behavior of accessible mesopores in combusted shales minimally increase mesopore surface roughness. The pyrolyzed shales exhibit decreased mesopore surface roughness at higher temperatures, which indicates smoothening of pores due to pore blocking. Increase in pore volume and surface area due to oxic-heat treatment enhances the feasibility of long-term CO2 storage in shales. Original languageEnglish Article number125877 JournalFuel Volume331 DOIs Publication statusPublished - 2023 Bibliographical note Accepted Author Manuscript Keywords • CO storage • Combustion & inert heating • Organic matter • Pore characteristics • SANS • SAXS Fingerprint Dive into the research topics of 'Pore morphology in thermally-treated shales and its implication on CO2 storage applications: A gas sorption, SEM, and small-angle scattering study'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
1 Warren Buffett Stock I'd Buy Before 2023 Without Any Hesitation Those wanting to forge a path as successful investors could do worse than mirroring the philosophy of legendary Berkshire Hathaway CEO Warren Buffett, who is arguably one of the most successful investors of all time. Since taking the helm in 1965, his picks have yielded compounded annual gains of more than 20% and have collectively soared a massive 3,641,613%. As we close out the train wreck that was 2022, investors are beginning to look to the future. Buffett's intriguing array of stock picks offer something for every investing style, including income generation, growth potential, preservation of capital, and everything in between. If I could only buy one Buffett stock before 2023, my pick would be a company with a strong track record of growth, the resources to ride out an economic storm, and a history of returning capital to shareholders. Read on to find out why Apple (NASDAQ: AAPL) is my top pick. Image source: Apple. Growth is second nature Apple was long known for its Mac computers but it wasn't until the release of its iconic iPod 21 years ago that the company became a household name. Since then, the tech giant has consistently found ways to stay on a trajectory of growth. The company has employed a strategy of new products, upgrades to existing devices, and a growing roster of services to fuel its growth. For fiscal 2022 (ended Sept. 24) Apple's sales grew 8% year over year, while its diluted earnings per share climbed 9%. Even as device sales slowed, services picked up the slack, growing 14%. What makes this all the more impressive is that it came in the face of the worst macroeconomic headwinds in more than a decade. The reason? Apple's sticky ecosystem combined with its extremely loyal customer base. This is just one of the reasons Apple is far and away Buffett's top stock, making up roughly 39% of Berkshire Hathaway's entire portfolio. A port in an economic storm Apple's consistently strong results are certainly an attraction, but for some investors, there's nothing more compelling than the safety and security of a fortress-like balance sheet -- which provides them a port to ride out an economic storm. The iPhone maker certainly qualifies in that regard. In the event the economy continues to worsen, Apple is prepared. The company has roughly $49 billion in net cash on its balance sheet, which provides it with plenty of financial resources to ride out any economic headwinds and an increasingly rocky economy. With each passing quarter, Apple continues to store up for a rainy day. A record of shareholder-friendly policies Apple has a long history of rewarding shareholders -- and not just with impressive stock price gains. Apple resumed paying a dividend in 2012 and its track record over the past 10 years has been striking. On a split-adjusted basis, Apple's payout began at roughly $0.095, but has soared an impressive 143% since its inception. Furthermore, Apple uses just 15% of its profits to fund the payout, so the company continues to grow its dividend for the foreseeable future. While its yield might seem meager at 0.64%, that's the result of Apple's impressive stock gains. Over the past decade alone, shares are up roughly 650% -- even after their recent decline. The stock price has been fueled by robust business performance that has consistently defied expectations. There's also Apple's lavish share repurchase plan. The company has been buying stock left and right, retiring more than 39% of its outstanding shares over the past decade. This gives shareholders an increasing ownership of Apple. Buffett commented on Apple's stock buyback plan, saying he's "wildly in favor of it." He also said he likes that the repurchase plan increases Berkshire's ownership of every dollar of Apple's earnings, without having to lift a finger to get it. Every rose has its thorns To be clear, Apple stock isn't going to appeal to every investor and -- as with every stock -- there are risks. In the event the economy slips into a recession and demand for the iPhone dries up, Apple will no doubt take a hit. The iconic device accounted for 52% of the company's revenue last year. Given the relatively high price point of the iPhone, consumers might opt to wait out a downturn before upgrading to the latest model. On the other hand, the resulting pent-up demand would catapult the results forward when the economy found better footing. Furthermore, Apple stock isn't particularly cheap, selling for 23 times earnings, just slightly below the price-to-earnings ratio of 25 for the Nasdaq Composite. That said, given the company's long history of growth, its ability to withstand a downturn, and its shining record of shareholder returns, I'd buy Apple before 2023 without any hesitation. 10 stocks we like better than Apple When our award-winning analyst team has a stock tip, it can pay to listen. After all, the newsletter they have run for over a decade, Motley Fool Stock Advisor, has tripled the market.* They just revealed what they believe are the ten best stocks for investors to buy right now... and Apple wasn't one of them! That's right -- they think these 10 stocks are even better buys. See the 10 stocks *Stock Advisor returns as of December 1, 2022 Danny Vena has positions in Apple. The Motley Fool has positions in and recommends Apple and Berkshire Hathaway. The Motley Fool recommends the following options: long January 2023 $200 calls on Berkshire Hathaway, long March 2023 $120 calls on Apple, short January 2023 $200 puts on Berkshire Hathaway, short January 2023 $265 calls on Berkshire Hathaway, and short March 2023 $130 calls on Apple. The Motley Fool has a disclosure policy. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Talk:San Leandro Yellow pages While this is a nice article and a ton of work is going into it, one of the goals of Wikivoyage is to avoid being a yellow pages of all establishments in a city. Generally the goal is to try to pick some highlights and write a review of those establishments - see Project:Restaurant listings and Project:Goals and non-goals for details. It may be sufficient to simply add a sentence about some of the fast-food restaurants in San Leandro ("San Leandro offers the standard chain restaurant selection, with McDonalds, KFC... all having stores in the city") and focus the guide on places that might be of more interest to travelers. -- (WT-en) Ryan &bull; (talk) &bull; 20:05, 25 June 2007 (EDT) Manual of style There have been several edits by an anonymous user that reverted edits meant to bring this article in line with the Project:Manual of style. All articles should conform to the article guidelines unless there is a good reason not to. Additionally, to the anonymous user making these changes, it would help us very much if you created a user account so that we can communicate with you. -- 16:27, 6 July 2007 (EDT) * Also see Project:Listings, Project:Restaurant listings, Project:Accommodation listings and Project:Manual of style. The correct format for a listing is: * *Name of Place, Address (extra directions if necessary), phone number (email, fax, other contact if possible), . Days and times open. One to three sentences about the service, atmosphere, view, rooms, what have you. $lowprice-$highprice (extra price info). * This can be automatically created using: * * * -- (WT-en) Ryan &bull; (talk) &bull; 00:42, 7 July 2007 (EDT)
WIKI
Monday, July 13, 2009 Extracting Data From MS Sql Server on MacOS I've had really a rough time lately getting data from legacy systems based on MS Sql Server. In each case I got only the .bak backup file and had to do the rest. The whole thing is a bit easier if you run everything on windows, but as I did the development on Mac I'll cover how to connect to MS Sql from MacOS as well. Restore database from backup You will need a windows machine with MS Sql Server running (of course :-) Luckily, you can download it for free from here. Next connect to the database server using the command line utility osql (you will need to have it in your PATH) cd C:\Program Files\Microsoft SQL Server\MSSQL\Binn osql -E You may need to create a new user: use master go EXEC sp_addlogin 'peter', 'pass45' go Now let's have a look at the backup file (put it in some easy location so you don't have to type out the path): Restore FILELISTONLY FROM DISK='c:\AMS.bak' This query allows us to find out the logical name of the database and log file which is needed to appropriately restore a database to a new path. What you get is basically an original location of the data and the log file. In my case I got: AMS_Data D:\Program Files\Microsoft SQL Server 2000\MSSQL\data\AMS_Data.MDF AMS_Log D:\Program Files\Microsoft SQL Server 2000\MSSQL\data\AMS_Log.LDF Which means that the original installation was on drive D:\. As my temp server is on C: I will have to recover with changing the locations of the files RESTORE DATABASE ams FROM DISK='c:\AMS.bak' WITH MOVE 'AMS_Data' to 'C:\Program Files\Microsoft SQL Server\MSSQL\Data\ams.mdf', MOVE 'AMS_Log' to 'C:\Program Files\Microsoft SQL Server\MSSQL\Data\ams_log.ldf' go The only important thing here is that 'AMS_Data' and 'AMS_Log' names match the ones from the previous query. Now you should hopefully see that your database has been restored. Now, will just get access to the database: use ams go EXEC sp_grantdbaccess 'peter' go sp_addrolemember db_owner,peter go There's more info on how to use osql here. Now we should be set to connect to the database from development machine. This was quite a number of steps just to restore the database - compared to createdb tmp; psql tmp <>Connecting to MS Sql from MacOS We will need to install and set up a couple of things: sudo port install rb-dbi +dbd_odbc sudo port install freetds set up connection to database /opt/local/etc/freetds/freetds.conf Add your server to the end of the file: [Ams] host = 192.168.11.106 port = 1433 tds version = 8.0 where the host is IP of your windows machine. After this step you should be already able to connect to MS Sql Server: tsql -S Ams -U peter -P pass45 You should get the server database prompt (just like the osql on windows machine). You can try some commands like use ams go select * from contacts go Now set up ODBC connection. Go to Applications -> Utils -> ODBC Administrator 1) add driver with following descriptions: Description: TDS Driver File: /opt/local/lib/libtdsobdc.so Setup FIle: /opt/local/lib/libtdsobdc.so Define as: System 2) add User DNS DSN: Ams Desc: old AMS database server add 2 keyword/value placeholders. To update them click on it and press TAB. Set it to following values: ServerName: Ams (or whatever you set in freetds.conf) Database: ams (or whatever your database name) now you should be able to test iODBC. Note that I am using sudo for this as it doesn't seem to work without sudo complaining Data source name not found and no default driver specified. Driver could not be loaded (0) SQLSTATE=IM002. sudo iodbctest "dsn=Ams;uid=USERNAME;pwd=PASSWORD" You should be now in interactive terminal again. Once all this works connecting from Ruby is really easy: require 'rubygems' require 'dbi' DBI.connect('DBI:ODBC:ams', 'USERNAME', 'PASSWORD') Rescuing the data This is just a short ruby script I use to extract all the data from MS Sql and import it to Postgresql. It's not any functional database conversion - it's just to get the data out to something that's easier to work with and doesn't require windows machine running. It may have an issue with binary fields - it worked on most of them but it did choke on a couple of fields. DBI actually provides more metadata like NOT NULL attribute, primary key, etc. so the script could generate a more precise copy of the original database but this was enough for what I needed. You may run into unknown data type - especially if you try to import it to a different database engine - all you need to do is just update the method update_type to return correct mappings of the data types. require 'rubygems' require 'dbi' require_library_or_gem 'pg' def escape(text) return "NULL" if text.nil? text = PGconn.escape("#{text}") return "'#{text}'" end def self.update_type(col) type = col["type_name"] type ||= 'timestamptz' type = type.downcase case type when 'clob' return 'varchar' when 'varbinary' return "oid" when 'long varbinary' return "oid" when 'double' return 'double precision' when 'tinyint' return 'smallint' when 'char' return "char(#{col['precision']})" else return type end end dbh = DBI.connect("DBI:ODBC:ams", "peter", "pass45") sth = dbh.prepare('select name from sysobjects where type = \'U\' ORDER BY NAME;') sth.execute tables = sth.collect{|row| row[0]} tables.each do |table| sth = dbh.prepare("select * from #{table} ") sth.execute create = "CREATE TABLE #{table}(\n" create << sth.column_info.collect{|col| "\"#{col['name'].downcase}\" #{update_type(col)}"}.join(",\n") create << ");\n\n" puts create sth.each do |row| create << "INSERT INTO #{table} (#{sth.column_info.collect{|column| "\"#{column['name'].downcase}\""}.join(', ')}) VALUES (#{sth.column_info.collect{|col| escape(row[col['name']])}.join(', ')});\n" end create << "\n\n" output = File.new("data_ams.sql", "ab+") output.puts create output.close #puts create end To import the data to Postgresql is as simple as: createdb ams_backup psql ams_backup <> noise.txt 3 comments: 1. Nếu bạn đang muốn đăng tin bán nhà hay bán đất hoặc bạn muốn ban nha quan 12 , nha dat xinh thì hãy đến với chúng tôi rao vat mien phi, với chất lương hàng đầu chúng tôi sẽ giúp các bạn , đăng tin và xem các khu vực nha dat go vap, nha dat quan 9, nha dat thu duc , nha dat binh tan , nha dat tan phu , nha dat tan binh và các khu vực khác trên NguyenManhKha toàn quốc với uy tín và hiệu quả cao khi bạn đến với chúng tôi. ReplyDelete Replies 1. Hi, Great.. Tutorial is just awesome..It is really helpful for a newbie like me.. I am a regular follower of your blog. Really very informative post you shared here. Kindly keep blogging. If anyone wants to become a .Net developer learn from Dot Net Online Training from India. or learn thru ASP.NET Essential Training Online . Nowadays Dot Net has tons of job opportunities on various vertical industry. JavaScript Online Training from India Delete 2. I like the post format as you create user engagement in the complete article. It seems round up of all published posts. Thanks for gauging the informative posts. cara menggugurkan kandungan cara menggugurkan hamil ReplyDelete  
ESSENTIALAI-STEM
UPDATE 2-Puerto Rico Supreme Court rules new governor must step down (Recasts first sentence with potential successor, adds statement from justice secretary) SAN JUAN, Aug 7 (Reuters) - The Puerto Rico Supreme Court on Wednesday ruled that last week's swearing in of Pedro Pierluisi as governor was unconstitutional and that he must leave office later in the day, paving the way for Justice Secretary Wanda Vazquez to succeed him. In a unanimous decision, the nine-member high court nullified his governorship based on the fact his earlier appointment as secretary of state and next in line for governor had not been confirmed by both chambers of the legislature. Pierluisi has said he would abide by the supreme court's decision, which set a 5 p.m. local time deadline for him to leave office. Vazquez said she will assume the governorship under the succession plan in Puerto Rico's constitution. "Puerto Rico needs certainty and stability," she said in a statement. The high court's ruling followed weeks of political turmoil in the bankrupt U.S. territory, where Governor Ricardo Rossello, left office last Friday in the wake of days of protests demanding he resign. Pierluisi, Rossello's hand-picked successor, was appointed secretary of state and next in line for governor on July 31. He was sworn in as governor last Friday. His swearing in as governor came after only the Puerto Rico House of Representatives, in a special session, confirmed him as secretary of state. On Sunday, Senate President Thomas Rivera Schatz filed a lawsuit claiming his chamber's advice and consent duty under the island's constitution was usurped and Pierluisi should be removed from office. Pierluisi had argued that under a 2005 law, his July 31 appointment by Rossello did not require confirmation because the legislature was not in session at the time. But the court on Wednesday declared as unconstitutional the part of the law that allowed Pierluisi to take over as governor despite his lack of confirmation by both legislative chambers. (Reporting by Luis Valentin Ortiz in San Juan Additional reporting by Karen Pierog in Chicago Editing by Matthew Lewis)
NEWS-MULTISOURCE
How to Add A Click Event on Vuetify Headers? 4 minutes read To add a click event on Vuetify headers, you can use the @click directive on the <v-list-item> component or any other clickable element within the header. This directive allows you to call a method or execute a piece of code when the header is clicked by the user. By adding the @click directive to the desired element in the header, you can listen for the click event and perform the necessary action in your Vue component. How to add multiple click events on Vuetify headers? To add multiple click events on Vuetify headers, you can use the @click directive to bind multiple methods to the click event. Here's an example: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 <template> <v-card> <v-card-title class="headline grey lighten-2" @click="handleClick1" @click="handleClick2" > Click me </v-card-title> </v-card> </template> <script> export default { methods: { handleClick1() { console.log('First click event triggered'); }, handleClick2() { console.log('Second click event triggered'); } } } </script> In this example, the v-card-title element has two click event handlers handleClick1 and handleClick2 that will be triggered when the element is clicked. You can add as many click event handlers as needed by adding more @click directives with different methods in the template. What is the best way to performance optimize click events on Vuetify headers? One way to performance optimize click events on Vuetify headers is to use "debouncing" or "throttling" techniques. This means limiting the number of times the click event handler is called within a certain time frame, to prevent it from being called excessively and causing performance issues. Another way is to use the v-once directive on components within the Vuetify headers, so that they are only rendered once and don't need to be re-rendered on every click event. Additionally, you can use the v-on directive with the "capture" modifier to stop click events from propagating up the DOM tree unnecessarily. This can help improve performance by preventing unnecessary event handling in parent components. Finally, consider using event delegation by attaching a single click event listener to a parent container element that contains the Vuetify headers. This can help reduce the number of event handlers and improve performance by handling all click events in one place. How to customize click events on Vuetify headers? To customize click events on Vuetify headers, you can use the @click directive to listen for click events and then call a method to handle the click event. Here's an example of how you can customize click events on Vuetify headers: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 <template> <v-data-table :headers="headers" :items="items" item-key="name" > <template v-slot:header="{ header }"> <div @click="handleHeaderClick(header)" class="custom-header" > {{ header.text }} </div> </template> </v-data-table> </template> <script> export default { data() { return { headers: [ { text: 'Name', value: 'name' }, { text: 'Age', value: 'age' }, { text: 'Country', value: 'country' } ], items: [ { name: 'Alice', age: 25, country: 'USA' }, { name: 'Bob', age: 30, country: 'Canada' }, { name: 'Eve', age: 21, country: 'UK' } ] } }, methods: { handleHeaderClick(header) { console.log(`Clicked on ${header.text} header`); // Add custom logic here to handle the click event } } } </script> <style> .custom-header { cursor: pointer; color: blue; } </style> In the above example, we use the v-slot:header directive to customize the header cell in the Vuetify data table. We add a click event listener to the header cell using the @click directive and call the handleHeaderClick method when the header cell is clicked. Inside the handleHeaderClick method, you can add custom logic to handle the click event on the header. You can further customize the appearance of the header cell by adding CSS styles to the .custom-header class in the <style> section of your Vue component. How to handle click events in scoped slots of Vuetify headers? To handle click events in scoped slots of Vuetify headers, you can simply add a click event listener to the element within the scoped slot that you want to make clickable. Here's an example using a scoped slot in a Vuetify <v-data-table>: 1 2 3 4 5 6 7 8 <v-data-table :headers="headers" :items="items" > <template v-slot:[`item.name`]="{ item }"> <span @click="handleClick(item)">{{ item.name }}</span> </template> </v-data-table> In this example, we have a scoped slot for the name column header that renders the name of each item in the table. We have added a click event listener to the <span> element within the scoped slot, which calls a method named handleClick and passes the item as a parameter. You can then define the handleClick method in your Vue component to handle the click event: 1 2 3 4 5 6 methods: { handleClick(item) { console.log('Clicked item:', item); // Add your custom click event handling logic here } } By adding click event listeners to specific elements within scoped slots, you can easily handle click events in Vuetify headers or any other custom slots. How can I trigger a function on click of Vuetify headers? To trigger a function on click of Vuetify headers, you can use the @click event handler in Vue.js. Here's an example of how you can achieve this: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 <template> <v-app> <v-container> <v-row> <v-col> <v-card> <v-card-header @click="handleClick"> Click me </v-card-header> <v-card-text> Content of the card </v-card-text> </v-card> </v-col> </v-row> </v-container> </v-app> </template> <script> export default { methods: { handleClick() { // Your function logic goes here console.log('Header clicked!'); } } }; </script> In this example, the @click event handler is added to the v-card-header element, and it calls the handleClick method when clicked. You can replace the console.log statement with your own logic inside the handleClick method. Facebook Twitter LinkedIn Telegram Related Posts: To build a project in Vuetify, first make sure you have Node.js installed on your system. Then, create a new Vue project using the Vue CLI by running the command &#34;vue create project-name&#34; in your terminal.Once your project is created, navigate to the p... To set the language in Vuetify, you can use the lang property in the Vuetify object when initializing your Vue application. Simply provide the language code as a string value to the lang property, such as &#39;en&#39; for English or &#39;fr&#39; for French. Th... To bind an event to a treeview node in Vuetify, you can use the @click event listener on the &lt;v-treeview&gt; component and access the node data using the item argument in the event handler. This allows you to perform actions based on the clicked treeview no... To add a logo to the appbar in Vueify, you can use the v-img component provided by Vuetify. You can add the logo image as a child element of the v-app-bar component and customize its size, position, and other properties using Vuetify classes and attributes. Ma... To center the text on a Vuetify footer, you can use the &#34;text-center&#34; class provided by Vuetify. Simply add the &#34;text-center&#34; class to the text element in your footer component, and the text will be centered horizontally. This class takes care ...
ESSENTIALAI-STEM
How To Fix Samsung Galaxy S7 Edge Texting Problems Including “Messages has stopped” Error • Samsung Galaxy S7 Edge owner reported that text messages aren’t sent entirely as the recipient only receives a part or two. • Learn how to troubleshoot the infamous error “Unfortunately, Messages has stopped” that seems to occur more often after firmware updates. • Learn what you need to do if you are receiving long text messages in parts, which are often received not in order. • What to do if your phone can’t join group conversation or if messages are sent to different recipients as separate messages. • MMS messages can’t be downloaded on the Galaxy S7 Edge. Learn how to fix this problem or what you need to do in order to work around it. Galaxy-S7-Edge-messages-has-stopped Text messaging is one of the most common features of a phone and it doesn’t take much to send one SMS. However, many Samsung Galaxy S7 Edge owners have been reporting that their devices seem to have issues sending and receiving messages. It’s very disappointing to know that a smartphone as expensive and powerful as the S7 Edge can’t even transmit 1Kb worth of data. We received several complaints from our readers that are related to text messaging. Among the most common are the error message “Unfortunately, Messages has stopped,” long text messages are split into parts, texts aren’t in order, MMS attachments can’t be downloaded, etc. I’ve addressed some of the issues below so take time to go through each problem I cited especially if you already contacted us before regarding this issue as I may have already included your concern. How To Fix Samsung Galaxy S7 Edge Texting Problems Including “Messages has stopped” Q: “When sending a regular send message it doesn’t send all of the text.. if it’s over so many characters long it will only send part of it. It will say something to the effect that there are 235/2 characters and messages that I have typed but when I send it, the receiver only gets part of that 2 message. I hope I am explaining this well enough, since it has been something that has been a problem since I first for the phone. Thank you in advance if you can help me at all. A: The thing about text messaging is that there are always two parties involved; the sender and the recipient. So, when problem occurs, there are always two possibilities; either it’s with the sender or the recipient. In your case, you’re the sender and you said that only a part of your message is received by the person you’re sending the message to. So, basically, you can send a message successfully and the recipient can actually receive it however, some parts are missing. Obviously, the problem is with the receiving end and not on your side. It may take a little time more time to receive all of them so tell him/her to wait. But the thing is, there’s always a setting that would allow the phone to automatically combine parts of a message into one. You should tell him/her to find that on his/her phone. On your end, you don’t have to worry about it since there’s no issue with your device. Q: “Hi guys. I have a problem with my new S7 Edge. Every time I try to send a text message, there’s an error that keeps popping up. It says “Unfortunately, Messages has stopped” and when I hit OK, it closes and I still can’t send text messages. The phone is about a month old and this is the problem I encountered ever since. Can you guys help me with this, please? A: I am wondering what happened to it why it triggered that kind of error. I assume the problem occurred just recently because if it came with the phone, you should have reported it a few ago. But here’s how you troubleshoot it: 1. Clear the cache and data of the Messages app since it clearly states the name of the app that crashes. 2. If the problem started after an update, try to wipe the cache partition first. 3. If wiping the cache partition can’t fix it, then you need to backup your data and do the factory or master reset. How to Clear App Cache and Data 1. From the Home screen, tap the Apps icon. 2. Find and tap on Settings. 3. Touch Applications and then Application manager. 4. Swipe to ALL tab. 5. Find and touch Messages. 6. Touch the Force Close button first. 7. Then, tap Storage. 8. Tap Clear cache and then Clear data, Delete. How to Delete the System Cache 1. Turn OFF your Samsung Galaxy S7 Edge. 2. Press and then hold the Home and Volume UP keys, then press and hold the Power key. 3. When the Samsung Galaxy S7 Edge shows on the screen, release the Power key but continue holding the Home and Volume Up keys. 4. When the Android logo shows, you may release both keys and leave the phone be for about 30 to 60 seconds. 5. Using the Volume Down key, navigate through the options and highlight ‘wipe cache partition.’ 6. Once highlighted, you may press the Power key to select it. 7. Now highlight the option ‘Yes’ using the Volume Down key and press the Power button to select it. 8. Wait until your phone is finished wiping the cache partition. Once completed, highlight ‘Reboot system now’ and press the Power key. 9. The phone will now reboot longer than usual. How to Master Reset S7 Edge 1. Backup your data. 2. Remove your Google account. 3. Disengage screen lock. 4. Turn OFF your Samsung Galaxy S7 Edge. 5. Press and then hold the How To Fix Samsung Galaxy S7 Edge Texting Problems Including “Messages has stopped” and Volume UP keys, then press and hold the Power key. NOTE: It doesn’t matter how long you press and hold the Home and Volume Up keys, it won’t affect the phone but by the time you press and hold the Power key, that’s when the phone starts to respond. 1. When the Samsung Galaxy S7 Edge shows on the screen, release the Power key but continue holding the Home and Volume Up keys. 2. When the Android logo shows, you may release both keys and leave the phone be for about 30 to 60 seconds. NOTE: The “Installing system update” message may show on the screen for several seconds before displaying the Android system recovery menu. This is just the first phase of the entire process. 1. Using the Volume Down key, navigate through the options and highlight ‘wipe data / factory reset.’ 2. Once highlighted, you may press the Power key to select it. 3. Now highlight the option ‘Yes — delete all user data’ using the Volume Down key and press the Power button to select it. 4. Wait until your phone is finished doing the Master Reset. Once completed, highlight ‘Reboot system now’ and press the Power key. 5. The phone will now reboot longer than usual. Q: Hello. I have an issue with receiving text messages. When I receive a long message, it’s broken up into multiple message. The issue is receiving them in the proper order. Lets say the long message is received in 4 messages. I would get message 4/4 first then 1/4, 2/4 and lastly 3/4. Is there a solution to this. It doesn’t happen often but it does happen. Thank you! A: Don’t worry, there’s no problem with your phone. It’s just that it was set to receive long text messages that way but there is a setting that will allow your phone to automatically combine all parts of the messages into one SMS. Go to Apps > Settings > Applications > tap on Messages > More settings > Text messages > Auto combination. Once you enabled that, long SMS will be received as one. Q: I just received a group message yesterday but didn’t see the other person that received the message. The only reason I know it was a group was because it started out “hey ladies!” Finally, when the other person on the tread responded, her text came thru, but separately in another thread her and I have going together. I don’t know how to fix it. A: The question is was the message intended to be as an individual conversation or a group message? Just like the first problem, there are always two possibilities here; either it’s the problem with the sender or the recipient. We can only rule out one possibility and that’s on your side. So, that said, go to Apps > Settings > Applications > tap on Messages > More settings > Multimedia messages > make sure Group conversation is enabled. It is, then the problem is with the sender; her phone may not have been set to send texts as group conversation when there’s more than one contact involved. Q: How to get text messages to align in order it was received. It show other person text at top and mine on bottom. I’m used to seeing (theirs, mine, theirs, etc.) A: If text messages aren’t arranged in chronological order when received, then it must have something to do with the time and date of your phone. Make sure it is set to correct date and that it follows the follow time zone. Messages received while the phone follows incorrect time and/or date can no longer be arranged in order but new ones will come in correctly. That is if this is really the case. If the you meant that the messages are split in parts and are received not in order, then your problem is the same as the second issue I addressed. Follow the same procedure in fixing your own. Q: Hi, for some reason I cannot receive any mms messages. Both video and picture messages just say they need downloading but then after I download it, it says message not found. Please help. A: MMS messages require mobile data to be transmitted, so the first thing you should is check whether the mobile data in your phone is enabled or not. If it is and you still can’t send/receive MMS, it might be the APN that has some issues. You should call your provider to ask for the correct APN for your phone and at the same time, inquire about the status of your account. If it’s in good standing, then ask the rep to help you setup the APN. Once finished, you can receive the messages and downloaded attached files. 2 thoughts on “How To Fix Samsung Galaxy S7 Edge Texting Problems Including “Messages has stopped” Error” 1. Hi, I have a problem in sending long text messages. Whenever I try and send a long text message it automatically converts into mms, however I don’t have any issues sending short messages? I really need help! Comments are closed.
ESSENTIALAI-STEM
Wasatch Peak Wasatch Peak is a 13,156 ft mountain summit located in Summit County, Utah, United States. Description Wasatch Peak is set within the High Uintas Wilderness on land managed by Uinta-Wasatch-Cache National Forest. It is situated one mile north of the crest of the Uinta Mountains which are a subset of the Rocky Mountains. It ranks as the 14th-highest summit in Utah, and 55th-highest in the United States if a 400-foot clean prominence cutoff is considered as criteria. Neighbors include Mount Beulah three miles to the west-northwest, Mount Lovenia two miles to the south-southeast, and Dead Horse Peak is five miles to the southwest. Precipitation runoff from the mountain's west slope drains to the West Fork of Blacks Fork, whereas the east slope drains into headwaters of East Fork Blacks Fork. Topographic relief is significant as the summit rises 2,100 ft in one mile from the valleys on either side. This mountain's toponym has not been officially adopted by the United States Board on Geographic Names and will remain unofficial as long as the USGS policy of not adopting new toponyms in designated wilderness areas remains in effect. It is labelled on USGS topographic maps as "Wasatch" benchmark. Climate Based on the Köppen climate classification, Wasatch Peak is located in a subarctic climate zone with cold snowy winters and mild summers. Tundra climate characterizes the summit and highest slopes.
WIKI
Let's talk about George Eastman and the legacy he left to the world. Only a few professionals and enthusiastic amateurs were interested in photography in its first fifty years. It was expensive, time-consuming, cumbersome and demanding expertise. All these adversities changed in 1888, when the American inventor George Eastman introduced a machine that was both cheap and convenient. Who is George Eastman? George Eastman was born on a small farm in New York. When he was 5, his family moved to Rochester. George lost his father when he was 8 years old and his family suffered a lot during that time. Eventually, George was forced to give up his education at the age of 13 and started to work. He was eager to learn and learned many things through his efforts. Eastman's interest in photography started about when he was planning a trip abroad while working as a bank clerk at the age of 24. When a colleague told him to record his trip, Eastman bought a camera. The machine consisted of a large, coarse box and was attached to a heavy tripod. Inside the box were individual glass plates, which were placed in large plate slots and covered with photosensitive emulsion, instead of film. The plates had to be prepared for outdoor shots in a portable tent that served as a darkroom. In 1878 George Eastman learned about "dry plates" invented in 1871 by British photographer Richard Leach Maddox. The emulsion was coated to the plates with gelatin. These plates could be stored and used at any time. Thus, making the majority of the equipment Eastman purchased was unnecessary. While Eastman continued to work at the bank, he devoted all his free time to finding the most competent method of producing dry plates in series. In 1880, he founded the Eastman Dry Plate. In 1881 he began to produce and sell dry plates and soon decided to use a lighter, flexible material instead of glass. In 1884 he considered rolling the flexible plate. Accordingly, the machine would have a roll slot instead of a plate slot. The first device, known as a "detective camera" using a film roll, appeared in 1885. The roll was made of paper, and this method did not produce the desired result because the fibers in the paper were visible in printing. In the meantime, other researchers were working on flexible and dry plates too. Some researchers have been experimenting with nitrocellulose, also known as celluloid. Eastman launched the celluloid film in 1889. Eastman's genius move showed that he had to expand the photography market in order to succeed. The way to do this was to make photography, in his own words "as convenient as the pencil". He had to develop a new, smaller and reasonably priced machine. In 1888, the first Kodak machine was introduced and soon achieved great success. The camera was equipped with a roll that can store up to 100 photos. Once the camera owner took the photos, all he had to do was send the camera to Eastman's company, wait for the photos to come out, and take it back with a new film. The main factor in Kodak's success has been to take photography to a level that everyone can do. Eastman's short statement suited the situation: "You press the button, we do the rest" George Eastman later changed the name of the company to Eastman Kodak and seized the market by offering "affordable photography". He never married and had no children. As a generous donor, he helped universities, hospitals and dental clinics. In the last two years, he struggled with a progressively worsening bone disease. In 1932, he ended his life by shooting himself in the heart. In his suicide note, he said: "My work is done, why wait?" Kodak's first camera with widespread demand had a retail price of $25. That was half the amount Eastman paid for his first camera. But it was still a high price for amateur photographers. In 1900, Eastman Kodak introduced a new, very cheap camera solution: Brownie. Between 1900 and 1980, Eastman Kodak produced and sold 99 different Brownie models. The first Brownie machine was a cardboard box with a roll holder, a roll of film, and a lens. Outside the box, there was a shutter and winder. The world's cheapest photograph machine was sold for only $1 ($30 today). Thus, the "snapshot" era began. It was able to capture the moments without requiring any preparation. - "Light makes photography. Embrace light. Admire it. Love it. But above all, know light. Know it for all you are worth, and you will know the key to photography." - "What we do during our working hours determines what we have; what we do in our leisure hours determines what we are." - "You push the button, we do the rest." - "If a man has wealth, he has to make a choice, because there is the money heaping up. He can keep it together in a bunch, and then leave it for others to administer after he is dead. Or he can get it into action and have fun, while he is still alive. I prefer getting it into action and adapting it to human needs, and making the plan work." - "I used to think that music was like lace upon a garment, nice to have but not necessary. I have come to believe that music is absolutely essential to our community life." - "I don’t believe in men waiting until they are ready to die before using any of their money for helpful purposes."
FINEWEB-EDU
Siouxland Siouxland is a vernacular region that encompasses the entire Big Sioux River drainage basin in the U.S. states of South Dakota, Minnesota, Nebraska and Iowa. The demonym for a resident of Siouxland is Siouxlander. A "vernacular region" is a distinctive area where the inhabitants collectively consider themselves interconnected by a shared history, mutual interests, and a common identity. Such regions are "intellectual inventions" and a form of shorthand to identify things, people, and places. Vernacular regions reflect a "sense of place," but rarely coincide with established jurisdictional borders. The lower Big Sioux River drainage basin stretches from Sioux City, Iowa, to Sioux Falls, South Dakota, an area that includes much of northwestern Iowa, the northeast corner of Nebraska, the southeast corner of South Dakota, and the extreme southwest corner of Minnesota. The term "Siouxland" was coined by author Frederick Manfred in 1946. Manfred was born in Doon, Iowa, a small town in Lyon County. Origin Frederick Manfred, who grew up in this region, set his novels in Minnesota, South Dakota, Iowa, and Nebraska, but these names alone did not meet his needs. Manfred said, "I wanted to find one name that meant this area where state lines have not been important. I tried Land of the Sioux, but that was too long, so Siouxland was born" in 1946. The following year, it was first used in the prologue to Manfred's third novel, This Is the Year — The cock robin winged on, north. ''At last, in late March, he arrived in Siouxland. He wheeled over the oak-crested, doming hills north of Sioux City, flew up the Big Sioux River, resting in elms and basswoods....'' Time magazine, reviewing the novel on 31 March 1947, introduced Siouxland to its readers by quoting from the book: "By a river in the Siouxland he stood weeping." By the summer of 1948, Alex Stoddard, sports editor of the Sioux City Journal, had begun referring to "Siouxland teams." Soon after Manfred's fictional naming of Siouxland, commercial and political entities adopted the name and made it widely known. Orlyn A. Swartz, who came to Sioux City in 1948, purchased the local office of O'Dea Finance Co. and renamed it Siouxland Finance Co. Swartz told Book Remarks that the idea was so new that he asked Harold Murphey, of the Chamber of Commerce, if there would be any objection to using the name. What was perhaps the first business application of Siouxland was still in use after four decades (in 1991), in Siouxland Insurance Agency, a successor company. A sampling of telephone directories (completed in 1991) showed two businesses using Siouxland in 1950 and nine in 1953, two of which were spelled Sioux Land. By contrast, in the 1990 Sioux City telephone directory there were sixty-five listings under Siouxland, including spelling variants (Sioux Land, Sooland, and Soo Land), and another eleven in the 1990 Sioux Falls telephone directory. Boundaries As a vernacular region, the boundaries of Siouxland have no official designation. As the term is frequently used by Sioux City media, it is often assumed that Siouxland is roughly synonymous with the Sioux City area, but not everyone agrees with this assumption. The Sioux City media bias towards Sioux City was illustrated in January 1990, when a letter to the Sioux City Journal asked, "Just where is Siouxland?" The writer, a resident of Ida Grove, was disputing that the "first baby born in Siouxland" was born in Sioux City at 3:30 a.m. on January 1, because a baby was born in Ida Grove at 1:42 a.m. the same day. As residents of the Sioux Falls area wanted their own regional name, they adopted Sioux Empire. Manfred, in a 1991 interview with Book Remarks, expressed disappointment that so many residents of Sioux Falls believed Siouxland to mean Sioux City, to the extent that they came up with a new name of Sioux Empire. Manfred drew a map of Siouxland for the cover of This Is the Year; his version encompassed the lower Big Sioux River drainage basin. At that time, Manfred lived in Luverne, Minnesota, which he considered to be part of Siouxland. In 1995, Siouxland Libraries—sometimes called the Siouxland Public Library—was created out of the merger of the Sioux Falls Public Library and the Minnehaha County Rural Public Library. "Just where is Siouxland?" The answer varies geographically. Like most vernacular regions, Siouxland is more-or-less where one wants it to be—or where popular perception places it. Major cities The two largest Siouxland cities are Sioux Falls, South Dakota, and Sioux City, Iowa. Another prominent city in this area is Norfolk, Nebraska, a major commercial area of northeast Nebraska, but this city is marginally in what is considered to be Siouxland. Sioux Empire The area around Sioux Falls (the metropolitan area including the counties of Minnehaha County, Lincoln County, McCook County, and Turner County) is often referred to as the "Sioux Empire." This region (which includes adjacent areas in the southwest corner of Minnesota) is part of Manfred's original conception of Siouxland. Siouxland cities Cities that are usually considered part of Siouxland include: Iowa * Akron, Iowa * Bronson, Iowa * Cherokee, Iowa * Climbing Hill, Iowa * Correctionville, Iowa * Denison, Iowa * Hawarden, Iowa * Hinton, Iowa * Hornick, Iowa * Hull, Iowa * Ida Grove, Iowa * Kingsley, Iowa * LeMars, Iowa * Lawton, Iowa * Little Sioux, Iowa * Merrill, Iowa * Moville, Iowa * Okoboji, Iowa * Onawa, Iowa * Orange City, Iowa * Rock Rapids, Iowa * Rock Valley, Iowa * Sac City, Iowa * Salix, Iowa * Sergeant Bluff, Iowa * Sheldon, Iowa * Sioux Center, Iowa * Sioux City, Iowa * Sloan, Iowa * Spencer, Iowa * Storm Lake, Iowa Minnesota * Luverne, Minnesota Nebraska * Allen, Nebraska * Bancroft, Nebraska * Beemer, Nebraska * Coleridge, Nebraska * Dakota City, Nebraska * Hartington, Nebraska * Homer, Nebraska * Hoskins, Nebraska * Magnet, Nebraska * Maskell, Nebraska * Newcastle, Nebraska * Norfolk, Nebraska * Obert, Nebraska * Pender, Nebraska * Pierce, Nebraska * Pilger, Nebraska * Ponca, Nebraska * Rosalie, Nebraska * South Sioux City, Nebraska * Stanton, Nebraska * St. Helena, Nebraska * Wakefield, Nebraska * Walthill, Nebraska * Wayne, Nebraska * West Point, Nebraska * Winnebago, Nebraska * Winside, Nebraska * Wisner, Nebraska * Wynot, Nebraska South Dakota * Beresford, South Dakota * Canton, South Dakota * Dakota Dunes, South Dakota * Elk Point, South Dakota * Gayville, South Dakota * Jefferson, South Dakota * North Sioux City, South Dakota * Sioux Falls, South Dakota * Vermillion, South Dakota * Yankton, South Dakota
WIKI
Morocco's Platinum Power partners with China's CFHEC on $300 mln hydropower project RABAT (Reuters) - Renewable energy investor Platinum Power, minority-owned by U.S. private equity firm Brookstone Partners, has teamed up with China’s CFHEC to build a $300 million hydropower plant in central Morocco, it said on Wednesday. CFHEC, which is a subsidiary of state-owned construction firm CCCC, will partner with the Moroccan group to finance, build and run the 108-megawatt plant, Platinum Power’s chief executive Omar Belmamoun said. The two companies have also agreed to partner on renewable energy projects elsewhere in Africa, where they both see growing demand for clean energy, Platinum Power said in a statement. Platinum Power is currently developing hydropower projects with a capacity of 325 MW in Morocco, 365 MW in Cameroon and 300 MW in Ivory Coast. By the end of last year, Morocco had installed 1,215 MW of wind energy, 1,770 MW of hydropower and 700 MW of solar capacity, according to official figures. Morocco plans to exceed a 52% share of renewable energy in the national energy mix by 2030. (This story corrects erroneous reference to Brookstone Partners as parent of Platinum Power) Reporting by Ahmed Eljechtimi; Editing by Jan Harvey
NEWS-MULTISOURCE
Targeted therapy is lagging behind in esophageal adenocarcinoma (EAC). To guide the development of new treatment strategies, we provide an overview of the prognostic biomarkers in resectable EAC treated with curative intent. The Medline, Cochrane and EMBASE databases were systematically searched, focusing on overall survival (OS). The quality of the studies was assessed using a scoring system ranging from 0–7 points based on modified REMARK criteria. To evaluate all identified prognostic biomarkers, the hallmarks of cancer were adapted to fit all biomarkers based on their biological function in EAC, resulting in the features angiogenesis, cell adhesion and extra-cellular matrix remodeling, cell cycle, immune, invasion and metastasis, proliferation, and self-renewal. Pooled hazard ratios (HR) and 95% confidence intervals (CI) were derived by random effects meta-analyses performed on each hallmarks of cancer feature. Of the 3298 unique articles identified, 84 were included, with a mean quality of 5.9 points (range 3.5–7). The hallmarks of cancer feature ‘immune’ was most significantly associated with worse OS (HR 1.88, (95%CI 1.20–2.93)). Of the 82 unique prognostic biomarkers identified, meta-analyses showed prominent biomarkers, including COX-2, PAK-1, p14ARF, PD-L1, MET, LC3B, IGFBP7 and LGR5, associated to each hallmark of cancer. doi.org/10.1038/s41598-018-31548-6, hdl.handle.net/1765/110166 Scientific Reports Department of Surgery Creemers, A. (Aafke), Ebbing, E.A. (Eva A.), Pelgrim, T.C. (Thomas C.), Lagarde, S., van Etten-Jamaludin, F.S. (Faridi S.), van Berge Henegouwen, M. I., … van Laarhoven, H. (2018). A systematic review and meta-analysis of prognostic biomarkers in resectable esophageal adenocarcinomas. Scientific Reports, 8(1). doi:10.1038/s41598-018-31548-6
ESSENTIALAI-STEM
Wikipedia:Wikipedia Signpost/2005-12-19/ArbCom election This week, Jimbo Wales closed the straw poll he had set up to "gauge community input and feedback about the selection process." Citing the result of the poll as a 19-3-25-5 final count with the majority favoring his second proposal, Wales announced that the second proposal, a hybrid approach that requires a Requests for Adminship-like vote by the community, would be used. "The community can and should begin a community approval process immediately, patterned as closely as is reasonable after the RfA process," Wales wrote. "The point of the process should be to generate a pool of acceptable candidates from whom I can make appointments." Wales also stated that his "role in putting forward candidates is essentially just a way for me to communicate pre-approval to the community. I don't plan to do that in this term unless it appears that we are overlooking someone particularly noteworthy." However, no process has been started following Wales's announcement. Community feedback was mixed. "I think deciding the election procedure based on a straw poll... is [an] inherently bad idea. It's not like there was a significant majority in favour of any one of the proposals, either," commented Talrias. "The result of a straw poll is not to use the procedure with the most support, it is to find out why other people didn't like that proposal, and work on improving it so that people who didn't support the original idea will support an improved version (or at least, not oppose as much)." Wales responded to these comments by citing the need to advance the elections: "Yes, but we need to move forward. We do have the luxury of ongoing investigations as we move forward, and flexibility to analyze what works well and doesn't, for next time around." In addition, some users also questioned the use of the 50 percent requirement. "Would it not make sense to hold ArbCom polls on the principle of consensus rather than simple majority?" questioned Radiant!. "I realize that RFA's criterion (~75%) would be rather difficult to achieve, but 60%-65% sounds workable." Wales responded by saying, "We'll see how well it all goes" and saying that the percent could be adjusted depending on the average percent. Finally, this week Edivorce (statement), Rowlan (statement), Maywither (statement), Trilemma (statement), and Aranda56 (statement) announced their candidacies. In addition, Talrias withdrew from the race.
WIKI
MACDRAW, INC., Plaintiff, v. THE CIT GROUP EQUIPMENT FINANCING, INC. and Richard Johnston, Defendants. No. 91 Civ. 5153(DC). United States District Court, S.D. New York.' Feb. 5, 1997. Ramsey Clark, Lawrence W. Schilling, New York City, for Respondents Larry Klayman and Paul J. Orfanedes. Larry Klayman, Paul J. Orfanedes, Klayman & Associates, P.C., Washington, DC, for Plaintiff. Susan G. Rosenthal, Jeffrey H. Weinberger, Winick & Rich, P.C., New York City, for Defendants. OPINION & ORDER CHIN, District Judge. In this case, I find myself in the position of having my. fairness and impartiality as a judge called into question because of my race. After I ruled against their client at trial, respondents Larry Klayman, Esq. and Paul J. Orfanedes, Esq. directed a series of questions to me inquiring (1) whether I knew John Huang and Melinda Yee, individuals involved in the recent campaign finance controversy, and (2) whether I had had any “business, political or personal dealings” with them or any other “persons related in any way to. the Clinton Administration.” Respondents have since conceded on the record in open court that the questions were asked of me in part because of my race: THE COURT: You are standing there and you are telling me that you did not ask these questions of me because I am Asian-American, is that what you are telling me? MR. KLAYMAN: I’m saying that is part of it. THE COURT: You are conceding that that is part of it?. MR. KLAYMAN: Part of it, yes. And I’m also asking the questions— THE COURT: You are conceding that you asked questions of the court, at least in part, because of my race? MR. KLAYMAN: In part.... (12/19/96 Tr. at 8). Respondents had absolutely no basis for posing such questions to the Court. Moreover, Mr. Klayman has engaged in other conduct disrespectful of the Court. For example, in the same hearing, after purporting to advise me of my obligations under the canons of judicial ethics, Mr. Klayman suggested that I “search [my] own soul.” (12/19/96 Tr. at 14,16). Messrs. Klayman and Orfanedes are not members of the Bar of this Court. Rather, they were both granted the privilege of appearing pro hac vice. Because of their conduct in this case, I issued an order directing them to show cause why they should not be sanctioned or disciplined for violating Disciplinary Rules 1-102(A)(5) and 7-106(0(6). They retained counsel, who filed a written response on their behalf. Having reviewed the response as well as all the relevant parts of the record, and for the reasons set forth below, I find that respondents Larry Klayman, Esq. and Paul J. Orfanedes, Esq. have violated Disciplinary Rules 1-102(A)(5) and 7-106(0(6). Consequently, they are disciplined as follows: (1) their admissions pro hac vice are hereby revoked; (2) any future applications by Messrs. Klayman and Orfanedes to appear before me on a pro hac vice basis will be denied; and (8) Messrs. Klayman and Orfanedes are hereby ordered to provide a copy of this opinion to any other judge in this District to whom they may make an application for admission pro hac vice in the future. STATEMENT OF THE CASE A. The Underlying Facts Plaintiff Macdraw, Inc. (“Macdraw”) imports and sells wire-drawing equipment. In 1989, it agreed to sell certain equipment to Laribee Wire Manufacturing Company, Inc. (“Laribee”) for a purchase price of approximately $7.1 million, to be paid in four installments. Because of the size of the transaction, Laribee approached defendant CIT Group Equipment Financing, Inc. (“CIT”) for financing. CIT agreed to provide financing in return for a security interest in the equipment. Laribee was required, under the terms of the agreement, to meet certain conditions on a continuing basis. One such condition was that Laribee not be in default on any loans with other financial institutions. Eventually, all of the equipment was delivered by Macdraw to Laribee. Consequently, CIT made the first three of the four payments under the financing agreement directly to Macdraw, as instructed by Laribee, leaving only the fourth and final installment — some $711,000 — to be paid. In November 1990, Laribee acknowledged to CIT that it had “accepted” the equipment, clearing the way, from Macdraw’s point of view, for the final payment. As CIT began processing the fourth installment, however, it learned that Laribee had defaulted on a loan with Bankers Trust. As a consequence, Laribee was in default under the financing agreement with CIT and CIT refused to release the final $711,000 to Macdraw. Laribee was not able to make the final payment itself. Hence, Macdraw was never paid the final $711,000. B. Prior Proceedings Macdraw commenced this action against CIT in August 1991, asserting five causes of action. Laribee was not named because it had filed for bankruptcy. Notwithstanding Laribee’s inability to comply with the terms of its financing agreement with CIT, Mac-draw contends that CIT was required to make the final $711,000 payment on Laribee’s behalf because (1) defendant Richard Johnston purportedly made certain promises on CIT’s behalf, and (2) CIT purportedly failed to disclose to Macdraw that Laribee was in default and encountering financial problems. CIT denied the allegations. In the fall of 1991, respondent Klayman advised the Court (Kram, D.J.) of his intention to move, on behalf of Macdraw, for summary judgment. Judge Kram sought to discourage Mr. Klayman from filing such a motion, to no avail, for in March 1992 Mac-draw moved for partial summary judgment. On April 14, 1992, having failed to demand a jury trial on a timely basis, Macdraw also filed a motion for an order granting it a jury trial. Defendants thereafter cross-moved for summary judgment dismissing the complaint and seeking sanctions for Maedraw’s purportedly frivolous motion practice. By Memorandum Opinion and Order docketed January 18, 1994, Judge Kram: (1) denied plaintiffs motion for partial summary judgment; (2) denied plaintiffs request for a jury trial; (3) granted defendants’ cross-motion to dismiss with respect to three of the five counts (leaving only the fraud and promissory estoppel claims for trial); and (4) granted defendants’ cross-motion for sanctions. MacDraw, Inc. v. CIT Group Equip. Fin., Inc., 1994 WL 17952 (S.D.N.Y. Jan.18, 1994). Among other things, Judge Kram concluded “[i]t is apparent that ‘plaintiffs counsel engaged in little or no preliminary factual and legal investigation’ before bringing its motion.” Id. at *20 (quoting Wrenn v. New York City Health & Hospitals Corp., 104 F.R.D. 553, 559 (S.D.N.Y.1985)). The Court imposed sanctions under Rule 11, which Maedraw’s attorneys were ordered to pay. At an earlier point in the proceedings, Mr. Klayman wrote the Court a letter requesting leave to file a motion for voluntary recusal, pursuant to 28 U.S.C.' § 455(a), on the ground that “the Court ‘has prejudged the case against the plaintiff.’ ” Id. at *20 (quoting Letter to Hon. Shirley Wohl Kram from Larry Klayman of 5/14/92). Judge Kram reminded the parties that the Court had the power to impose sanctions for bad faith, vexatious, wanton, or oppressive conduct and directed the parties to submit proposed briefing schedule for a recusal motion. Id. at *20. No such motion, however, was ever filed. On January 5, 1995, Macdraw, Klayman, and Klayman’s firm (Klayman & Associates) appealed the imposition of sanctions to the Second Circuit. In an opinion dated January 3, 1996, the Second Circuit reversed the award of sanctions. MacDraw, Inc. v. CIT Group Equip. Fin., Inc., 73 F.3d 1253 (2d Cir.1996). In doing so, however, the Second Circuit noted: Our discussion should not be taken to suggest that we find the conduct of plaintiffs counsel throughout this litigation to be acceptable. Indeed, we note our sympathy with the district court’s frustration; in pursuing this appeal, plaintiffs counsel submitted briefs that included inaccurate characterizations of the record and comments that we consider entirely inappropriate. There is no question that our rules permit sanctions where an attorney’s conduct degrades the legal profession and dis-serves justice. In the face of significant abuse, a district court need not hesitate to impose penalties for unreasonable conduct and acts of bad faith. Nevertheless, it must do so with care, specificity, and attention to the sources of its power____ Id. at 1262. While the appeal of the sanctions award was pending in the Second Circuit, Macdraw filed a “renewed motion” for a jury trial in the District Court. In the motion papers, signed by respondents Klayman and Orfanedes, respondents wrote: Macdraw respectfully submits that the Court has demonstrated perhaps an unintentional, yet readily apparent, predisposition against its claims. As set forth below, the record in this matter raises legitimate cause for concern. In order to alleviate any such concern, and avoid even the appearance of judicial predisposition, Mac-draw respectfully requests that the Court allow a jury trial so as to safeguard Mac-draw’s rights.... (PL Mem. in Support of Renewed Motion for Jury Trial at 1). That motion was denied by Judge Kram on July 31, 1995. Thereafter, Macdraw filed with the Second Circuit a petition for a writ of mandamus directing the District Court to grant Macdraw a jury trial, which the Second Circuit denied on October 3,1995. By letter to Judge Kram dated October 30, 1995, Macdraw requested a stay of the ease pending the filing of a petition for a writ of certiorari to the Supreme Court on the issue of Macdraw’s right to a jury trial. On November 2, 1995, Judge Kram granted the application and the case was stayed pending the filing by Maedraw of a petition for certiorari. On November 6, 1995, the case was reassigned to me. Although it is not clear from the record whether Maedraw ever filed a petition for a writ of certiorari with the Supreme Court, in the summer of 1996 Mac-draw advised the Court that it was prepared to proceed to trial without a jury. I conferenced the case on September 3, 1996, at which time I directed the parties to be ready for trial in November 1996. C. The Trial After the submission of detailed trial briefs, the case was tried to the Court without a jury on November 6, 7, 12, and 13, 1996. Maedraw’s principal witness was its president, Massimo Colella. After Maedraw rested, defendants moved for judgment as a matter of law and I reserved decision. (Trial Tr. at 302). Defendants proceeded to call two witnesses, including defendant Richard Johnston. At that point defendants renewed their motion for judgment as a matter of law, without resting. (Trial Tr. at 416). On November 12,1996,1 adjourned the trial so that I could complete my reading of the depositions before ruling on defendants’ motion. (Id. at 425-33). On November 13, 1996, I granted defendants’ motion for judgment as a matter of law. Pursuant to Rule 52(e), I made findings of fact and conclusions of law. (Trial Tr. at 436-45). My decision turned largely on my credibility findings. Having heard both Johnston and Colella testify, and having reviewed all the evidence in the case, I found Johnston to be more credible than Colella. I accepted Johnston’s testimony that he never made the alleged oral promises and I rejected Colella’s testimony to the contrary. (Id. at 439-42). I also found that Maedraw could not have reasonably believed that CIT would commit to disbursing $711,000 in additional financing without assuring itself that Laribee was still in sound financial condition. (Id. at 444). D. Respondents’ Conduct Three aspects of respondents’ conduct, taken together, led me to issue the order to show cause. They are: (1) comments made by Mr. Klayman at the conclusion of trial on November 13, 1996; (2) the questions contained in a letter dated December 9, 1996, signed by both Messrs. Klayman and Orfanedes; and (3) comments made by Mr. Klayman at a conference I held on December 13, 1996, after receiving the December 9th letter. I will review each in detail. 1. The November 13,1996 Comments After I stated my findings and conclusions at the conclusion of the trial on November 13, 1996, Mr. Klayman expressed a desire to make post-trial motions. A colloquy with the Court ensued (Trial Tr. at 445-52), concluding with the following: [THE COURT TO MR. KLAYMAN:] I am not going to debate this with you. I have ruled---- I really don’t think any additional motions are really going to help. All I am suggesting to you is that I think your view of the evidence is very different from my view of the evidence and that’s fine. You have to do your job. If you want to make any motions, go ahead and make your motions, but I am not going to require any responses from CIT until I look at the motions first. MR. KLAYMAN: Your Honor, I understand your position and I understand you have denied the motions. We will simply file a notice of appeal. But I had to say that for the record. We are not here 6 years later because we wanted to be. You are newly appointed to the bench, we are aware of the fact that you did speed this ease to trial. We hope in the future this court functions better because frankly it has not functioned well— THE COURT: Mr. Klayman, that is totally out of line. I don’t know what you are doing now. I have no history with you. MR. KLAYMAN: What I am telling you is, you criticized us for being 6 years later into this case and I am pointing out that we would have liked to have tried this case a lot sooner, period. I’m not trying to embarrass you or anybody else. THE COURT: Believe me, you are not embarrassing me. This case is five or six year’s old for whatever the reason. When it came to me I moved it very quickly. Your client got his day in court. That’s it. For you to stand there and criticize the court gets you nowhere. I just don’t understand why you are doing that. How does it help you to stand there and criticize the court? MR. KLAYMAN: Because I am an officer of the court and I take it seriously. And criticism goes both ways. There is a First Amendment, your Honor. THE COURT: Mr. Klayman, is there anything else you want to say? MR. KLAYMAN: No. THE COURT: Then this case is over. (Trial Tr. at 451-52) (emphasis added). 2. The December 9,1996 Letter Unfortunately, however, the case was not over. Some four weeks later, I received a letter, dated December 9, 1996 (the “December 9th Letter”), addressed to me and signed by both Messrs. Klayman and Orfanedes, which stated in part: Finally, as you may know, Mr. Orfanedes and I have been involved in very highly publicized and significant public interest litigation, Judicial Watch, Inc. v. U.S. Department of Commerce, Case No. 95-0133(RCL) (D.D.C.), which involves a Mr. John Huang, Ms. Melinda Yee and other persons in the Asian and Asian-American communities. See Exhibit 1. Recently, we came upon a document in this case which mentions your name in the context of other prominent Asian-American appointees of the Clinton Administration. See Exhibit 2. Accordingly, could you please formally advise us whether you know either of these individuals, as well as what relationship, contacts, and/or business, political or personal dealings, if any, you have had with them, or persons related in any way to the Clinton Administration. Please also advise us if you had seen the enclosed or similar newspaper articles or press accounts- before this case was tried on November 6, 7, 12 and 13, 1996. Attached as Exhibit 1 to the December 9th Letter were eight articles from magazines and newspapers reporting on the recent controversy regarding John Huang, the Democratic National Committee, and campaign contributions. Mr. Klayman is mentioned in some of the articles. Exhibit 2 to the December 9th Letter is a computer-generated print-out of a newspaper or magazine article that appeared on November 4, 1994, more than two years ago, in which certain presidential appointments of Asian-Americans are listed, including John Huang and myself. 3. The December 19,1996 Comments After receiving the December 9th Letter, I directed counsel to appear for a conference ■at which I asked respondents to explain the basis on which they felt it was appropriate to ask me the questions contained in their Letter. Mr. Klayman spoke on their behalf and articulated the view that they asked the questions because: (1) they felt I had made some comments directed toward them that were critical and “in some way personal”; (2) they were involved in a case against the Commerce Department and the Clinton Administration in which they had been accused of being biased against the Asian-American community; and (3) I was a recent appointee of the. Clinton Administration and had been actively involved, prior to taking the bench, with the Asian American Legal Defense and Education Fund and the Asian American Bar Association of New York. (12/19/96 Tr. at 4-9). Mr. Klayman then said the following to me: I frankly felt, and Mr. Orfanedes frankly felt, that the remarks in some way were personal, and we are concerned, as advocates on behalf of our client, given the unusual nature of this case concerning Mr. Huang, that somehow subjectively this did not in any way influence you or perhaps have you view me negatively or Mr. Orfanedes. (12/19/96 Tr. at 6). To the extent there was any doubt that the questions in respondents’ December 9th Letter were asked of me in part because of my race, that doubt was eliminated by Mr. Klayman’s responses to my questions: THE COURT: ... What I hear is that you are asking questions of me because you have some questions about my fairness and impartiality because of my race. Is that not so? MR. KLAYMAN: No, that’s not so, your Honor. THE COURT: Would you have asked me these questions if I were not Asian-American? MR. KLAYMAN: I might have. THE COURT: You would have asked me these questions if I were Caucasian or African-American? MR. KLAYMAN: Let me tell you why I might have. And I don’t see any harm in asking these questions because I have a duty to a client. THE COURT: Did your client ask you to ask these questions of me? MR. KLAYMAN: My client is aware of the general issues. They did not ask me to ask these questions of you. Frankly, your Honor, given whatever your response may be, I don’t know that there’s any issue here at all, but I felt that asking the question was something that would be prudent and wise and part of my responsibility to represent our client zealously within the balance of the law. It’s not your race. I myself am a minority. I myself have been subject to discrimination. I am sensitive to that. THE COURT: You are standing there and you are telling me that you did not ask these questions of me because I am Asian-American, is that what you are telling me? MR. KLAYMAN: I’m saying that is part of it. THE COURT: You are conceding that that is part of it? MR. KLAYMAN: Part of it, yes. And I’m also asking the questions— THE COURT: You are conceding that you asked questions of the court, at least in part, because of my race? MR. KLAYMAN: In part. And let me tell you why. And I would [have] asked questions because you’re also a recent appointee of the Clinton Administration. Has nothing to do with it. But you have been active, your Honor, for instance, in these kinds of efforts. And I commend you for your activity on behalf of Asian-Americans, with regard to the AsianAmeriean Legal Defense Fund and being a president of the Asian-American Bar Association. I myself have been active in similar types of things and am fully supportive of those activities. But we are all human, and sometimes, sometimes subjective criteria can unwittingly, no matter how ethical, no matter how decent, no matter how honest someone is — and we believe you to be that— they can subjectively influence our decision-making. I, for instance, would not sit as a Jewish American on a ease that involved a Palestinian. I wouldn’t do it if I was a judicial officer just because of a lot of things which enter into the subjectivity of all our thinking. I’m not making any accusations, but I felt that I had a right, given what— THE COURT: Based on what? Based on what did you have that right? MR. KLAYMAN: Representing the client. We live in the real world, your Honor. People are influenced by subjective criteria. (12/19/96 Tr. at 7-9). Mr. Klayman articulated the view that he was simply asking questions of the Court, that he was not making accusations, and that there was no harm in asking the questions. (12/19/96 Tr. at 9-12). Mr. Orfanedes spoke briefly and stated that he did not “see this as necessarily race-based.” (Id. at 12). Mr. Klayman then purported to advise me on the canons of judicial ethics (id. at 14) and eventually suggested that I “search [my] own soul”: [MR. KLAYMAN:] Now, I believe your Honor has to search his own soul to a large extent. There may be independent legal requirements here on whether or not you wish to advise this court of some of the questions which we asked, which are benign, which were posed in a very respectful way. We ask that this letter [the December 9th letter] be made part of the court record. THE COURT: The letter has already been docketed. I am not going to search my soul. I do not need to do any soul searching at all. The letter is offensive. I find the letter to be offensive. I do not think it is benign nor do I think it is respectful. Not at all. MR. KLAYMAN: I take it your Honor is not going to respond to the questions. THE COURT: I am not going to respond to your questions. I have heard no basis that would give me any reason to answer your questions. (12/19/96 Tr. at 16). E. The Order To Show Cause On January 10, 1997, in accordance with General Rule 4 of the Court, and in particular paragraphs (f), (g), and (k) thereof, I ordered Messrs. Klayman and Orfanedes to show cause why they should not be sanctioned or disciplined for violating Disciplinary Rules 1-102(A)(5) and 7-106(0(6) by their conduct in this case on November 13, 1996 and December 19, 1996 and their December 9th Letter. Respondents retained counsel, who submitted a letter brief dated January 24,1997 (the “Letter Brief’) on respondents’ behalf. In the Letter Brief, respondents essentially argue that their conduct could not prejudice the administration' of justice or degrade a tribunal. In addition, respondents contend that they acted reasonably in sending the December 9th Letter because of the “notoriety” surrounding their lawsuit against the Department of Commerce, which focused on “a prominent Presidential appointee, John Huang, who is Asian-American,” their involvement in the lawsuit, and what they believed to be my hostility toward them personally. (Letter Br. at 5-6). The Letter Brief . further states: Mr. Klayman and Mr. Orfanedes became concerned that because the Court was a recent appointee of President Clinton and Mr. Huang was a principle [sic] advisor on Asian-American appointments and fund raising and Mr. Klayman had been prominently mentioned in the media for his role in the Commerce Department case, which focused in part on the White House, the Democratic National Committee, John Huang, Melinda Yee, and other persons in the Asian and Asian-American communities, and because the lawsuit had elicited such angry responses from the White House, Democrats and the Asian-American community, that the Court might be angry at them and unable to be fair and impartial in a case in which they were counsel____ (Letter Br. at 8-9) (emphasis added). Respondents also'contend in the letter that they did not ask the questions because of any concern that I was biased because of my race, and state that they “strive to be free of racial prejudice and believe they are.” (Letter Br. at 10-11). Finally, respondents contend in the Letter Brief that no further action is required, but that if the Court believes otherwise, “further identification of the issues, facts and law involved would be necessary.” In that event, they request that the matter be referred to another judge of this Court. (Letter Br. at 12-13). DISCUSSION A. Procedural Issues Rule 4 of the General Rules of this Court governs the discipline of attorneys. Attorneys are entitled to notice and an opportunity to be heard. Gen. Rule 4(f). If, after such notice and opportunity, they are found guilty by clear and convincing evidence of violating the Code of Professional Responsibility, they may be disciplined. Id. In the case of an attorney admitted pro hac vice, discipline may include censure, suspension, or an-, order “precluding the attorney from again appearing at the bar of this court.” Gen. Rule 4(g). In addition, “[u]pon the entry of an order of preclusion, the clerk shall transmit to the court or courts where the attorney was admitted to practice a certified copy of the order, and of the court’s opinion, if any.” Id. Where misconduct occurs in the presence of a judge of this Court or “in respect to any matter pending in this [Cjourt,” the matter “may be dealt with directly by the judge in charge of the matter or at said judge’s option referred to the committee on grievances, or both.” Gen. Rule 4(k). Here, respondents raise three procedural issues: (1) whether further action is required; (2) if so, whether the proceedings should be delayed for “further identification of the issues, facts and law”; and (8) whether the matter should be referred to another Judge of the Court. (Letter Br. at 12-13). As to the first procedural issue, for the reasons stated herein, I believe further action is required. As to the second procedural issue, respondents have been provided with notice and an opportunity to be heard. Indeed, they were given two opportunities to explain why they asked the questions contained in the December 9th Letter. Moreover, my order to show cause specified that I was concerned about their conduct on November 13 and December 19,1996 and their December 9th Letter, and it further specified the two Disciplinary Rules that I believed were implicated. Hence, there is no need for “further identification of the issues, facts and law involved.” Finally, as to the third procedural issue, respondents request that the matter be referred to another Judge of this Court. The misconduct, however, occurred both in my presence and “in respect to” a matter pending before me. Thus, I have the option of dealing with the matter “directly.” I choose to do so. B. The Applicable Disciplinary Rules Two Disciplinary Rules of the Code of Professional Responsibility (see Appendix to N.Y. Judiciary Law (McKinney 1992 & Supp. 1997)) must be considered. They are DR 1-102(A)(5) and DR 7-106(0(6). DR 1-102(A)(5) provides that: A lawyer shall not ... [ejngage in conduct that is prejudicial to the administration of justice. Disciplinary Rule 7-106(C)(6) provides that: In appearing as a lawyer before a tribunal, a lawyer shall not ... [ejngage in undignified or discourteous conduct which is degrading to a tribunal. Hence, the issue presented is whether the record shows, by clear and convincing evidence, that respondents engaged in conduct that was “prejudicial to the administration of justice” or that was “undignified or discourteous” and “degrading to a tribunal.” Fortunately, the ease law on the subject of whether attorneys violated their ethical obligations by their conduct toward courts is sparse. It is clear, however, that attorneys who engage in disrespectful conduct against courts are subject to discipline. For example, in In re Evans, 801 F.2d 703 (4th Cir.1986), cert. denied, 480 U.S. 906, 107 S.Ct. 1349, 94 L.E,d.2d 520 (1987), an attorney was disbarred by the district court for accusing a magistrate judge of either being incompetent or having a “Jewish bias” in favor of an adversary. Id. at 704. The district court found that the attorney had, by his conduct, violated DR 1-102(A)(5), 7-106(C)(6), and 8-102(B). Id. at 705. The attorney appealed, and the Fourth Circuit affirmed, concluding, among other things, that the attorneys’ accusations against the magistrate of incompetence and religious and racial bias were “unquestionably undignified, discourteous, and degrading.” Id. at 706. Moreover, the Fourth Circuit found that because the accusations were made while the underlying case was on appeal, the district court properly viewed the accusations as “an attempt to prejudice the administration of justice in the course of the litigation.” Id. In People ex rel. Chicago Bar Ass’n v. Metzen, 291 Ill. 55, 125 N.E. 734 (1919), an attorney was disbarred for writing a letter to a judge stating that the attorney “was usually engaged in dealing with men and not irresponsible political manikins or appearances of men.” Id. at 735. The Illinois Supreme Court wrote: Judges are not exempt from just criticism, and whenever there is proper ground for serious complaint against a judge, it is the right and duty of a lawyer to submit his grievances to the proper authorities, but the public interest and the administration of the law demand that the courts should have the confidence and respect of the people. Unjust criticism, insulting language, and offensive conduct toward the judges personally by attorneys, who are officers of the court, which tend to bring the courts and the law into disrepute and to destroy public confidence in their integrity, cannot be permitted. Id. at 735. See also In re Greenfield, 24 A.D.2d 651, 262 N.Y.S.2d 349, 350 (2d Dep’t 1965) (suspending one attorney and disbarring another for writing a letter to a judge falsely accusing the judge of misconduct in office); Kentucky Bar Ass’n v. Williams, 682 S.W.2d 784, 786 (Ky.1984) (suspending attorney for three months for deliberately failing to appear for court appearance and for writing disrespectful letter to the trial judge and holding “[djeliberately disrespectful actions toward the judiciary cannot help but tend to bring Bench and Bar into disrepute”). The source of a court’s power to discipline an attorney for misconduct is clear. As the Supreme Court has held, Courts have long recognized an inherent authority to suspend or disbar lawyers____ This inherent power derives from the lawyer’s role as an officer of the court which granted admission. In re Snyder, 472 U.S. 634, 643, 105 S.Ct. 2874, 86 L.Ed.2d 504 (1985); accord In re Jacobs, 44 F.3d 84, 87 (2d Cir.1994) (“A district court’s authority to discipline attorneys admitted to appear before it is a well-recognized inherent power of the court.”), cert. denied, 516 U.S. 817, 116 S.Ct. 73, 133 L.Ed.2d 33 (1995); People ex rel. Karlin v. Culkin, 248 N.Y. 465, 470-71, 162 N.E. 487 (1928) (“ ‘Membership in the bar is a privilege burdened with conditions.’ [An attorney is] received into that ancient fellowship for something more than private gain. He [becomes] an officer of the court, and, like the court itself, an instrument or agency to advance the ends of justice.”) (citations omitted). This power extends as well to out-of-state attorneys who are granted the privilege of appearing pro hac vice: “Just as with a regularly admitted attorney, one seeking admission pro hac vice is subject to the ethical standards and supervision of the court.” In re Rappaport, 558 F.2d 87, 89 (2d Cir.1977); see also Leis v. Flynt, 439 U.S. 438, 441-42, 99 S.Ct. 698, 58 L.Ed.2d 717 (1979) (ability of an out-of-state attorney to appear pro hac vice is a “privilege” and “not a right granted either by statute or the Constitution”). C. Respondents’ Conduct I find, by clear and convincing evidence, that respondents, and in particular Mr. Klayman, engaged in undignified and discourteous conduct that was both degrading to the Court and prejudicial to the administration of justice. That conduct includes the following: 1. The November 13,1996 Comment Mr. Klayman stated on November 13,1996 that “[w]e hope in the future this court functions better because frankly it has not functioned well ----” (Trial Tr. at 451). This comment was,undignified, discourteous, and degrading to the Court. Although respondents now contend that this comment “was not referring to the period after the case was reassigned,” nonetheless, the comment was not made in a constructive manner and was degrading to the Court as a whole. (Letter Br. at 3). In fact, a review of the court file shows that whatever delay there was in the case was largely attributable to Macdraw and its counsel. For example, Macdraw did not make a timely jury demand; as a consequence, it filed a motion for a jury trial, a renewed motion for a jury trial, a petition for a writ of mandamus requiring the district court to grant a jury trial, and a petition for rehearing en banc — all of which were unsuccessful. Ultimately, Macdraw requested and was granted a stay of the proceedings so that it could file a petition for certiorari to the Supreme Court. In addition, although it had no realistic chance of winning a summary-judgment motion as the plaintiff in a case that turned on a disputed oral promise, it nonetheless filed such a motion, which led to a cross motion for sanctions and further litigation, including appellate litigation. All of these actions — as well as others by Macdraw and its attorneys — served to prolong the proceedings. 2. The December 9th Letter The questions contained in the December 9th Letter were inappropriate and were asked in an undignified and disrespectful manner. They were asked, as respondents concede, in part because I am Asian-American. They were asked because respondents were concerned that because I had been active with the Asian American Legal Defense and Education Fund and the Asian American Bar -Association of New York before I took the bench and they had been involved in litigation that involved some individuals who happened to be Asian-American, I “might be angry at them and unable to be fair and impartial in a case in which they were counsel.” (Letter Br. at 8-9). In essence, respondents were suggesting that a judge might be “angry” at them and therefore unable to treat them fairly merely because (1) the judge was Asian-American and (2) they were involved in what some apparently have perceived to be “anti-Asian” litigation. This sentiment is absurd and demeans me individually and the Court as a whole. In fact, I was not aware, until it was brought to my attention in the December 9th Letter, that Mr. Klayman and Mr. Orfanedes had any connection to any litigation involving the John Huang fund-raising controversy. Mr. Klayman’s comment that if he were a “judicial officer” he “would not sit as a Jewish American on a case that involved a Palestinian” (12/19/96 Tr. at 9) is most telling. Judges cannot recuse themselves solely on the basis of their race or religion or the race or religion of the attorneys or parties who come before them. As Judge Motley wrote more than 20 years ago in denying a motion for her recusal in a sex discrimination case brought by a female attorney against a law firm: It is beyond dispute that for much of my legal career I worked on behalf of blacks who suffered race discrimination. I am a woman, and before being elevated to the bench, was a woman lawyer. These obvious facts, however, clearly do not, ipso facto, indicate or even suggest the. personal bias or prejudice required [for recusal]. The assertion, without more, that a judge who engaged in civil rights litigation and who happens to be of the same sex as a plaintiff in a suit alleging sex discrimination on the part of a law firm, is, therefore, so biased that he or she could not hear the case, comes nowhere near the standards required for recusal. Indeed, if background or sex or race of each judge were,' by definition, sufficient grounds for removal, no judge on this court -could hear this case, or many others, by virtue of the fact that all of them were attorneys, of a sex, often with distinguished law firm or public service backgrounds. Blank v. Sullivan & Cromwell, 418 F.Supp. 1, 4 (S.D.N.Y.1975). See also Commonwealth of Pennsylvania v. Local Union 542, IUE, 388 F.Supp. 155, 163 (E.D.Pa.), aff'd, 478 F.2d 1398 (3d Cir.1973), cert. denied, 421 U.S. 999, 95 S.Ct. 2395, 44 L.Ed.2d 665 (1975) (Higginbotham, J.) (denying defendant’s motion to disqualify judge from hearing race discrimination claim, on basis of his race and comments he made in speech to “group' composed of black- historians,” and holding “that one is black does not mean, ipso facto, that he is anti-white; no more than being Jewish implies being anti-Catholic, or being Catholic implies being anti-Protestant”). 3. The December 19,1996 Comments Mr. Klayman’s lack of respect for the Court continued on December 19, 1996. After he admitted that the questions in the December 9th Letter were asked of me in part because of my race (12/19/96 Tr. at 7-9), he presumed to advise me on my ethical ■obligations under the canons of judicial ethics. (Id. at 14, 16-17). He took it upon himself to suggest that “your Honor has to search his own soul to a large extent.” (Id. at 16). These comments went beyond mere arrogance and foolishness and were undignified, discourteous, and degrading to the Court. D. Respondents’ Claim of Hostility In an effort to rationalize their behavior, respondents contend that they were concerned about my fairness and impartiality because comments that I made led them to believe that I “had become hostile to them personally.” (Letter Br. at 6). They cite to a number of specific instances, including my reference to their “abusive and onerous [sic] questioning in the depositions” (Letter Br. at 6 (citing Trial Tr. at 444)); my characterization of one of plaintiffs theories as “preposterous” (id.); my reliance on the failure of Macdraw to have made a demand on CIT before bringing suit (id.); my reaction to plaintiffs stated intention to file post-trial motions and my reference to plaintiffs attorneys’ fees (id. at 448). To the extent I expressed any impatience, it was not due to any personal bias against respondents; rather, it was the result of a bias against questionable lawyering, the taking of specious positions, and the wasting of resources of the parties and the Court. 1. The Depositions Respondents complain that “the Court spoke of “very abusive and onerous questioning in the depositions’ by plaintiffs counsel without identifying it.” (Letter Br. at 6 (citing Trial Tr. at 444)). Not only is my statement misquoted, it is also taken out of context. The complete and accurate statement was as follows: I also note, by the way, that having read the depositions I am convinced that there was no effort on the part of CIT to defraud Macdraw or even to take advantage of Macdraw. To the contrary, I found the CIT witnesses to be frank and forthright in the face of some very abusive and obnoxious questioning in the depositions. (Trial Tr. at 444) (emphasis added). Moreover, Mr. Klayman’s questioning at the depositions was indeed “abusive and obnoxious” at times. For example, at the deposition of John Zakoworotny, he stated to the witness: “It [the question] calls for a yes or no. Don’t play around with the questions. Give me a yes or no____Tell me yes or no. This is not an exercise in your evading my question.” (Zakoworotny Dep. at 67-68). When the witness later stated that he could not answer a question about a document based on his “initial review,” Mr. Klayman responded: “You want to review it more thoroughly? Read it five times.” (Id. at 78). When the witness tried to answer another question by providing an explanation, Mr. Klayman chastised him as follows: Just answer the question. I think you’ve had too much preparation. Just answer the question. And I put “preparation” in quotes. You’re tied like a pretzel. Just answer the question. (Id. at 81-82). There are numerous other examples. (See, e.g., Zakoworotny Dep. at 44-45, 56-57, 60-61, 67-68, 71, 83, 86, 90-91, 97; Swallwell Dep. at 21-22, 40-41). 2. Plaintiff’s “Preposterous” Claim I did describe one of Macdraw’s theories as being “preposterous” (Trial Tr. at 444), and indeed it was. Macdraw was contending that a relatively low-level employee, who had been employed by CIT at that point for only five months, was conspiring with others at CIT to cheat Macdraw by lulling it into providing services to Laribee to enhance the value of equipment that CIT could later seize as security and re-sell at a higher price when Laribee defaulted. The only motive that Macdraw could offer for why Johnston would engage in this conspiracy to defraud was that he hoped to improve his chances of being promoted. The notion that a low level employee would see perpetuating a fraud as a means to obtain a promotion is indeed preposterous. 3. The Absence of a Demand In my findings of fact and conclusions of law, I observed that “[i]t is also significant that Macdraw never, prior to this lawsuit, ever made a demand on CIT or communicated its belief that CIT had made a promise or guarantee that it refused to honor.” (Trial Tr. at 444). Respondents claim that this observation further demonstrates my hostility toward them because my observation (1) was purportedly based on “an error of fact,” citing PX 133, and (2) in . any event was “irrelevant.” (Letter Br. at 6). Respondents are wrong in both respects. First, PX 133 hardly constitutes a “demand” letter or a communication from Mac-draw to CIT setting forth a claim that CIT had made a promise or guarantee that it refused to honor. Rather, the January 29, 1991 letter from counsel for Macdraw simply asks Mr. Zakoworotny of CIT to “contact [the attorney! regarding certain issues that [Macdraw] needs to address promptly re[g]arding the balance due.” (PX 133). In contrast, Mr. Colella, the President of Mac-draw, testified in response to the Court’s questions that Macdraw had not communicated to CIT, before bringing the lawsuit, its belief that CIT had made and failed to honor such a promise. (Trial Tr. at 145-46; see also id. at 142-43). Hence, the record shows that no demand was made prior to suit being filed. Second, the issue of whether Macdraw had made its view known to CIT before the filing of suit was relevant. Macdraw’s failure to make such a demand supports CIT’s contention that the claim lacks any merit and that, as a factual matter, Macdraw did not actually believe that any promise had been made by CIT to Macdraw. Significantly, when CIT’s counsel commenced this line of inquiry on cross-examination of Mr. Colella, Maedraw’s counsel did not object. (Trial Tr. at 142-46). 4. Post-Trial Motions and Attorneys’ Fees Respondents also find evidence of my “hostility” toward them in my response to their stated desire to make post-trial motions and my comments on what they describe as “irrelevant issues like the reasonableness of their attorneys fees.” (Letter Br. at 6). Apparently to show the reasonableness of their fees, respondents point to the fact that defendants incurred some $355,654 in legal fees. (.Id. at 7). My comments, however, reflect no bias. First, the issue of Macdraw’s attorneys’ fees was raised on cross-examination of Mr. Colella. Again, there was no objection to this line of inquiry. (Trial Tr. at 173-74). Second, my concern was not with whether the fees that Macdraw had already paid were reasonable for the services rendered or whether services were actually rendered. Rather, I was concerned that Macdraw had already spent more than $300,000 on a claim that, in my view, never had much chance of succeeding. I was also concerned that $300,000 in fees had been spent on a claim based on CIT’s refusal to provide $711,000 in financing. Furthermore, I was concerned that Macdraw would be billed even more fees for post-trial motions that had little, if any chance of success — indeed, post-trial motions in a non-jury case in which detailed pre-trial briefs had been filed (see Trial Tr. at 8-9) and where the outcome had turned almost entirely on issues of credibility. Indeed, my comments were made in the following context: MR. KLAYMAN: I understand your Hon- or’s decision, and I’m not going to use that forum as an opportunity to re-argue that. We will be moving with post-trial motions accordingly. We feel that your Honor will have an open mind once you have had a chance [tjo look at this in a full perspective. THE COURT: What post-trial motions are we talking about? This case has gone on for 5 years. This [is] not a jury case where I have to consider if there was evidence to support the jury’s verdict. I’m not going to grant any post-trial motions. I granted the defendants’ motion for judgment as a matter of law. What motions do you propose to make? One of the things that troubles me, frankly, is Mr. Colella testified that he spent $300,000 in legal fees on this case. Frankly, I don’t understand it____ (Trial Tr. at 447-48). The fact that CIT also spent some $355,000 in fees certainly does not help respondents. If anything, by the time this case is completed, the parties together would have spent more in legal fees than the -$711,000 in financing in question. E. The Administration of Justice In determining whether respondents have engaged in improper conduct, it is important to consider two issues that are raised by their arguments: First, to what extent do lawyers have an obligation to question the impartiality of judges? Second, what harm is there in asking? Lawyers do have an obligation to inquire when they have a reasonable basis for believing that a judge might not be fair and impartial. But there must be a reasonable basis. In re Evans, 801 F.2d 703, 705-06 (4th Cir. 1986), cert. denied, 480 U.S. 906, 107 S.Ct. 1349, 94 L.Ed.2d 520 (1987); People ex rel. Chicago Bar Ass’n v. Metzen, 291 Ill. 55, 125 N.E. 734, 735 (1919). And where there is a reasonable basis for doing so, there is no harm in asking — as long as the “asking” is done in a discreet, dignified, and respectful way. If a lawyer has a reasonable basis for inquiring about a judge’s ability to be impartial, the attorney might, for example, request a pretrial conference to explain the circumstances and to ask the Court whether the Court believes there is any reason it ought not to hear the particular case. But where there is no reasonable basis for questioning a judge’s impartiality, or where the questioning is done in an undignified and disrespectful manner, there is harm in asking, for the integrity of the Court is challenged, the administration of justice is prejudiced, and both the bar and the bench are degraded. Here, respondents had no reasonable or good faith basis to question my fairness and impartiality. Rather than acknowledge that fact and apologize for their actions, they instead have resorted to mischaracterizing and misrepresenting the record in an effort to justify their actions. The record does not, however, provide the justification they seek. Moreover, instead of raising the issue discreetly and respectfully, they confronted me with what was tantamount to a series of written interrogatories, including: “could you please formally advise us whether you know either of these individuals, as well as what relationship, contacts and/or business, political or personal dealings, if any, you have had with them, or persons related in any way to the Clinton Administration.” They asked for my “immediate attention to this matter,” and noted that a deadline was approaching for any post-trial motions. This was followed by further disrespectful conduct, including urging me to “search [my] own soul.” Significantly, Mr. Klayman has a history of accusing judges of bias or prejudging cases. In this case, although he claims they are not accusations, he has raised questions about my ability to be fair. He accused Judge Kram of prejudging the case against plaintiff and of having “perhaps an unintentional, yet readily apparent, predisposition against its claims.” And in 1992, in a case in the United States District Court for the Central District of California, Mr. Klayman accused a judge of being anti-Asian and anti-semitic and having “prejudged” the case. See Baldwin Hardware Corp. v. Franksu Enter. Corp., 78 F.3d 550, 555 (Fed.Cir.), cert. denied, — U.S. -, 117 S.Ct. 360, 136 L.Ed.2d 251 (1996). Mr. Klayman’s repeated efforts to find fault with the judges before whom he appears certainly interferes with the administration of justice. Cf. In re Snyder, 472 U.S. 634, 647, 105 S.Ct. 2874, 86 L.Ed.2d 504 (1985) (“a single incident of rudeness or lack of professional courtesy ... does not support „a finding of contemptuous or contumacious conduct, or a finding that a lawyer is ‘not presently fit to practice law in the federal courts’ ”). Mr. Klayman has also been sanctioned on prior occasions, including by Judge Kram in this case. Although the Second Circuit reversed the award of sanctions (largely on procedural grounds), it noted in its opinion that “in pursuing this appeal, plaintiffs counsel submitted briefs that included inaccurate characterizations of the record and comments that we consider entirely inappropriate.” 73 F.3d at 1262. Mr. Klayman was also sanctioned in the Baldwin case in 1992. The trial judge, because of his belief that Mr. Klayman had acted in bad faith and made certain misrepresentations, permanently and prospectively barred Mr. Klayman from appearing before him again pro hac vice and required him to attach a copy of the court’s order to any future pro hac vice application in that court. 78 F.3d at 561-62. In particular, the trial judge found that Mr. Klayman had represented to the court, when he applied for admission pro hac vice, that he had never been sanctioned before when, in fact, his former firm, Klayman & Gurley, P.C., had been sanctioned in a matter handled by Mr. Klayman and two other attorneys at the firm. Id. at 562. The Federal Circuit affirmed, holding, among other things, that the trial judge had not abused his discretion in finding misconduct on the part of Mr. Klayman and his firm. Id. Mr. Klayman and his current firm were also sanctioned $1,500 in Wire Rope Importers’ Ass’n v. United States, 1994 WL 235620, 18 C.I.T. 478 (CIT 1994), for making a “frivolous” filing and for raising arguments that “stood no chance of success.” Id. at *6-7. Mr. Orfanedes is certainly less culpable than Mr. Klayman. The comments about which I am concerned were made not by him but by Mr. Klayman. Moreover, Mr. Orfanedes does not appear to have a history of this type of conduct as does Mr. Klayman. Nonetheless, Mr. Orfanedes signed the letter, was present when Mr. Klayman made the comments, and effectively joined in them. Hence, he must be held accountable as well. CONCLUSION As noted above, in reversing the prior award of sanctions against plaintiffs’ counsel in this case, the Second Circuit wrote: There is no question that our rules permit sanctions where an attorney’s conduct degrades the legal profession and disserves justice. In the face of significant abuse, a district court need not hesitate to impose penalties for unreasonable conduct and acts of bad faith. 73 F.3d at 1262. Respondents have engaged in significant abuse, unreasonable conduct, and acts of bad faith. Their conduct has degraded the legal profession and disserved justice. Accordingly, it is hereby ORDERED as follows: (1) the admissions of Larry Klayman, Esq. and Paul J. Orfanedes, Esq. pro hac vice are hereby revoked; hence, if there are any further proceedings in this case in this Court, Macdraw will be required to retain new counsel; (2) any future applications by Messrs. Klayman and Orfanedes to appear before me on a pro hac vice basis will be denied; (3) Messrs. Klayman and Orfanedes shall provide a copy of this opinion to any other judge in this District to whom they may make a future application for admission pro hae vice; and (4) The Clerk of the Court shall transmit to the courts where Messrs. Klayman and Orfanedes are admitted (as set forth in their applications for admission pro hac vice) a certified copy of this Opinion and Order. SO ORDERED. . Mr. Klayman was admitted pro hac vice in November 1991 by Judge Kram and Mr. Orfanedes was admitted pro hac vice by me in November 1996. . Macdraw is now known as Samp U.S.A (Trial Tr. at 23), but for ease of reference I will simply refer to it as Macdraw. . DR 8-102(B) prohibits a lawyer from making false accusations against a judge. Respondents have disavowed that they were making any accusations against me. Although the point is debatable, I have chosen not to invoke DR 8-102(B).
CASELAW
Deleting Old iTunes Backups If you’re concerned about storage space on your computer, consider removing old iTunes backups. If you’ve ever looked at the Apple–>About this Mac/”Storage” section on your computer, you may have noticed that there is a chunk of storage space being used by “Other” files. One thing that is grouped in this category is old iTunes backups. On a Windows computer it’s not so easy to see exactly how your files are using up disk space, but it’s easy to check in iTunes to see if there are any backups you are ready to get rid of. Seeing Exactly how Much Space iTunes Backups are Using (totally optional, for the curious) If you want to see how much space is being used by iTunes backups on your computer: On a Mac: 1. Click on the desktop to make sure you’re in the Finder, hold down the Option key, and choose “Go–>Library”. 2. Find and select (single click) the folder “MobileSync”. 3. Select File–>Get Info and look at the “Size” figure. On a PC the backups are stored in “Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup”. To navigate to that folder: 1. Find the Search bar: • In Windows 7, click “Start”. • In Windows 8, click the magnifying glass in the upper-right corner. • In Windows 10, click the Search bar next to the “Start” button. 2. In the Search bar, enter “%appdata%” 3. Press “Return”. 4. Open up the “Apple Computer” folder 5. Right-click on the “MobileSync” folder and select “Properties” and look for the folder size. Checking & Removing Backups in iTunes When you are ready to remove iTunes backups: 1. Open up iTunes. 2. On a Mac choose iTunes–>Preferences, and on Windows choose Edit–>Preferences. 3. Click Devices. 4. Choose the backup that you want to delete. If you have several devices or backups, hover the mouse pointer over the backup to see more details. 5. Choose “Delete Backup”, then confirm.
ESSENTIALAI-STEM
• Dmitry Kazakov's avatar Add workaround for handling table press correctly in WinInk mode · d684bc55 Dmitry Kazakov authored Original problem: widgets do not get synthesized mouse-down and mouse-press events until the stylus is released Reason: if the app accepts the event, WndProc should report that to the system (by returning true). This is the only way to prevent Windows from starting some system-wide gestures, like click+hold -> right button click. If we ignore the event, then OS postpones all synthesized mouse events until the entire gesture is completed. The patch implements a "hackish" workaround for the original problem by using the following rules: 1) All tablet-move events are ignored (without synthesized mouse events OS doesn't generate any Enter/Leave events) 2) All not-accepted tablet press- and release-events and also reported as ignored (without it D&D doesn't work). 3) All accepted tablet press- and release-events are reported as "accepted", **but** we artificially synthesize mouse events for them. TODO: there are still two problems: 1) Perhaps this synthesizeMouseEvent() is not needed at all. But we should first check if Qt relies on these synthesized messages anywhere in the code or not. 2) If we still keep synthesizeMouseEvent(), then it should fetch actual tablet buttons from QGuiApplicationPrivate::tabletDevicePoint(). Right now it always synthesizes left-click, whatever the button was pressed/ released. CCBUG:406668 d684bc55 0051-Add-workaround-for-handling-table-press-correctly-in.patch 13.6 KB
ESSENTIALAI-STEM
Ulrike von Levetzow Theodore Ulrike Sophie von Levetzow, known as Baroness Ulrike von Levetzow (4 February 1804 in Leipzig – 13 November 1899 in Třebívlice) was a friend and the last love of Johann Wolfgang von Goethe. Life She was born in Leipzig in Saxony, the daughter of the ducal Mecklenburg-Schwerin chamberlain and later Hofmarschall Joachim Otto Ulrich von Levetzow and his wife Amalie. The seventeen-year-old girl first met Goethe in 1821 at Mariánské Lázně and again at Karlovy Vary in 1822 and 1823. The poet, then 72, was so carried away with her wit and beauty that he thought for a time of marrying her and urged Grand Duke Karl August of Saxe-Weimar-Eisenach to ask for her hand in his name. Rejected, he left for Thuringia and addressed to her the poems which he afterward called Trilogie der Leidenschaft. These poems include the famous Marienbad Elegy. Ulrike later confessed she was not prepared to marry and angrily denied a liaison with Goethe. She remained unmarried all her life and died at the age of 95 at Třebívlice Castle in Bohemia, which she inherited after the death of her mother. Legacy Goethe's infatuation with Ulrike is the subject of Martin Walser's novel A Man in Love, published in 2008. Publications * Suphan, Goethe Jahrbuch, volume xxi (Frankfort, 1900) * Kirschoer, Erinnerungen an Goethes Ulrike und an die Familie von Levetzow-Rauch (Aussig, 1904)
WIKI
Page:The day butterflies and duskflyers of New England, how to find and know them (IA daybutterfliesdu00knob).pdf/28 X. Skippers. Hesperidce. Dark Brown. i. Eudamus (Epargyreus) shine, three transparent dots large silver blotch on 2^2 tityrus. With in. on forewing, and small under side of hindwing. bronzelike silver spot below> Caterpillar feeds on locust. 2. Eudamus (Thorybcs) pvlades. dots across middle of forewing and bands on under side of hindwing. Eudamus of forewing batli vllus. i j/> in. 1 /? in. Row of shorter row near small tip, white two dark Caterpillar feeds on clover. light band across middle One narrow and one small dot near tip, broad light border on hind- win";. 3. '1 hanaos jitrcnitHs. i'_. in. Smoky brown, six or seven band with eye-spots on under side of hindwing. Caterpillar feeds on bush clover, poplar, and willow. Six white spots, border of black dots, and three Tlmiiiios /V/>.t///,v. black bands across forewing. white spots near tip, 'J/ui/iiii's liu'ilus. broad light Five spots, dark border with light dots and two black bands. 26
WIKI
coderrr May 3, 2011 Beware of Thread#kill or your ActiveRecord transactions are in danger of being partially committed Filed under: concurrency, patch, rails — Tags: , , — coderrr @ 3:25 pm Firstly, before you all say you should never use Thread#kill and link to Headius post, this is not the same issue which he explains, but it is somewhat related. Secondly, before you ask why are you using Thread#kill anyway, or why should we worry about anyone who is. There is one scenario where Threads being #killed is quite likely and there are probably a bunch of people who run into it without knowing. When a ruby process terminates all Threads other than the main one are #killed (the main Thread gets an exception raised). So if you had a ruby process with a bunch of threads and this process received a TERM signal, all those Threads are going to get #killed unless you specifically handle the TERM signal and instruct/wait for all threads to finish. That is of course what you should do but I am guessing there are plenty of people who don’t. ActiveRecord transactions and Thread#kill First let me say your ActiveRecord transactions could already be partially committed if you use Thread#kill or Thread#raise due to the reasons Headius’ explains. But the chance of this happening due to those reasons is lower than due to this new one. Here’s the ActiveRecord transaction code. I’ve posted the Rails 2.2 version because it’s much simpler and less code than the current 3.0 source. But 3.0 is still vulnerable to the same issue: def transaction(start_db_transaction = true) transaction_open = false begin if block_given? if start_db_transaction begin_db_transaction transaction_open = true end yield end rescue Exception => database_transaction_rollback if transaction_open transaction_open = false rollback_db_transaction end raise unless database_transaction_rollback.is_a? ActiveRecord::Rollback end ensure if transaction_open begin commit_db_transaction rescue Exception => database_transaction_rollback rollback_db_transaction raise end end end Now imagine you’re using it like this ActiveRecord::Base.transaction do user_1.update_attribute :something, 1 ... user_n.update_attribute :something, n end If Thread#kill is called anywhere inside of that block the rest of the updates will not occur but the transaction will be committed. How does it happen? The reason this happens and why it’s a little unexpected is because Thread#kill will bypass all code _including_ rescue blocks and jump immediately to ensure blocks. Many people code with the assumption if an ensure block is hit without a rescue block being hit the code must have finished executing. And this is the assumption made in the ActiveRecord transaction code. Imagine we move from the middle of the block passed to #transaction (where Thread#kill was called) down to the start of the ensure block. transaction_open will evaluate to true (which it would not have were an exception raised since the rescue block sets transaction_open to false) and commit_db_transaction will be called. In contrast, for this to occur due to the Headius’ issue first an exception would have to be raised inside the transaction block and _then_ Thread#raise or Thread#kill would have to be called inside the rescue block before transaction_open is set to false, a much smaller area of attack. Can this be fixed? Yes and no. Setting a local variable to true after the yield statement is a simple way to determine if the block passed to yield ran to completion: begin yield completed = true ensure puts "entire block ran!" if completed end This assumes the code in the block doesn’t use certain flow control statements. Those statements are return, break, next, retry, redo and throw. If one of these statements is used to break out of the block prematurely it will effectively act just like Thread.kill. The interpreter will immediately jump to the ensure block bypassing everything else including the local variable being set. Which means if you relied on the local variable being set to commit the transaction then any transaction block with one of those statements would always be rolled back. In MRI 1.8 and Rubinius Thread.current.status will be set to ‘aborting’ if the current thread is in the state of being killed. So we can detect if we are in the ensure block because of a Thread#kill rather than one of the flow control statements. begin yield ensure puts "enitre block ran!" if Thread.current.status != 'aborting' end The problem is this doesn’t work at all in 1.9 and isn’t consistent in JRuby. If all interpreters behaved as 1.8 does then fixing this issue would be trivial and have no downsides. Knowing whether you are in an ensure block prematurely because the programmer intended so via flow control statements versus due to an aborting thread seems fairly important. So I believe that 1.9 and JRuby should copy this behavior or at least provide some other similar mechanism. The Patch Here’s a patch which fixes the issue for MRI 1.8 and Rubinius: https://github.com/coderrr/rails/commit/7f8ac269578e847329c7cfb2010961d3e447fd19 Thanks to Marcos Toledo for brainstorming the issue with me and helping me proofread 4 Comments » 1. Is there a link to a pull request or github issue so this can get fixed? Comment by Eric Hodel — May 4, 2011 @ 12:10 am 2. The real problem is that the code inside the ensure block goes against the semantic of transactions. If anything it should contain a rollback not a commit, the rationale being that commit is the last operation inside regular code; if you exit normal flow for any reason and the transaction is still open you should make a rollback because at that point you can only be sure that something went wrong. I would do it like this def transaction(start_db_transaction = true) transaction_open = false begin if block_given? if start_db_transaction begin_db_transaction transaction_open = true end yield commit_db_transaction transaction_open = false end rescue Exception => database_transaction_rollback if transaction_open transaction_open = false rollback_db_transaction end raise unless database_transaction_rollback.is_a? ActiveRecord::Rollback end ensure if transaction_open rollback_db_transaction end end Comment by Paolo Angelini — May 6, 2011 @ 7:11 pm • You’re assuming exiting normal flow includes using ” return, break, next, retry, redo and throw ” inside your transaction block. Ruby encourages the use of these as normal flow control constructs. Returning from a method early due to a guard is extremely common as an alternative to nesting if/else statements. This brings up an interesting issue with Ruby. Ensure is not only for making sure some code runs whether or not an exception is raised, but it is necessary to use an ensure to make sure code runs in case a block is exited early due to one of these flow control statements. If Thread#kill didn’t existed there would be no problem. Because you could assume if you entered an ensure block without previously entering a rescue block then you must be there due to a flow control statement and the block finished executing as the programmer intended. Thread#kill introduces the ambiguity, you might be there because the executed as intended, or because the thread was #killed. If Thread#kill raised an exception like Thread#raise rather than immediately jumping you to the ensure block none of this would be an issue… Comment by coderrr — May 6, 2011 @ 8:32 pm RSS feed for comments on this post. TrackBack URI Leave a Reply Please log in using one of these methods to post your comment: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s The Silver is the New Black Theme. Blog at WordPress.com. Follow Get every new post delivered to your Inbox. Join 29 other followers %d bloggers like this:
ESSENTIALAI-STEM
Talk:Alta Murgia National Park Images Skipping through this article, it looks good, with one exception: Per this site's image policy guidelines on minimal use of images, it has too many thumbnails. On my browser, the last 2 images are wholely below the end of the article and one more extends slightly below its end. Which 3-4 images should we remove, at least until the article gets longer? Ikan Kekek (talk) 00:59, 20 January 2021 (UTC) * I took this into my own hands. Please read Image policy. Yes, it's different from it.voy. Ikan Kekek (talk) 08:50, 20 January 2021 (UTC)
WIKI
Harvest was an incredibly important time in the lives of our ancestors, one that not only determined the success of the year’s work, but also the fate of the people involved. A successful harvest was a celebration, but if the harvest were to fail, this would often mean a long, potentially fatal winter ahead. The final step of the yearly harvest is the threshing. Threshing is the process of removing the edible wheat or corn from the stalk of the plant, so each separate component can be used for its intended purpose – whether that be as food, thatch, animal bedding or something else. Traditionally carried out with a flail, two pieces of stick joined by a leather band. The process of threshing was physically demanding and very time consuming. Machines to do the work were first developed at the end of the eighteenth century and could carry out this important job at least 12 times faster than by hand. Wind, water or horsepower could drive threshing machines. However, steam became the most popular method with mobile steam engines driven to the field in order to complete the task. The process, when done by machine, is completed by a threshing drum, run by the steam engine. The grain is separated from the stalk and comes out of the end of the threshing drum into bags. The stalk then comes out of another section. We sometimes have a steam powered threshing machine onsite in the autumn, threshing triticale – a wheat/rye mix with long stalks, suited for both thatching and animal bedding, as well as grain which we use to feed the ducks and poultry on site and oats which we use to feed the horses. The vehicle in the images shown that is used to power the threshing machine, is a Burrell 3935 7nhp Traction Engine, named ‘Surprise’. This class of machine was manufactured by Charles Burrell & Sons in the late 19th and early 20th centuries. It has a robust and compact design, making it suitable for a variety of tasks on the farm, including powering the threshing machine. Nhp stands for ‘nominal horse power’, which means that this engine could carry out the work of seven horses! ‘Surprise’ was ordered in 1922 by J P Morgan to power a sawmill on his estate at Wall Hall, Aldenham Herts. She had various owners until 2004 when she was deemed to require boiler work and was dismantled. She was recommissioned in 2019 and attended her first event in August that year, after a 15 year absence.
FINEWEB-EDU
1997 All-Big Ten Conference football team The 1997 All-Big Ten Conference football team consists of American football players chosen as All-Big Ten Conference players for the 1997 Big Ten Conference football season. The conference recognizes two official All-Big Ten selectors: (1) the Big Ten conference coaches selected separate offensive and defensive units and named first- and second-team players (the "Coaches" team); and (2) a panel of sports writers and broadcasters covering the Big Ten also selected offensive and defensive units and named first- and second-team players (the "Media" team). Quarterbacks * Billy Dicken, Purdue (Coaches-1; Media-2) * Brian Griese, Michigan (Coaches-2; Media-1) Running backs * Tavian Banks, Iowa (Coaches-1; Media-1) * Curtis Enis, Penn State (Coaches-1; Media-1) * Ron Dayne, Wisconsin (Coaches-2; Media-2) * Sedrick Irvin, Michigan State (Coaches-2; Media-2) Center * Zach Adami, Michigan (Coaches-1; Media-1) * Derek Rose, Iowa (Coaches-2; Media-2) Guards * Phil Ostrowski, Penn State (Coaches-1; Media-1) * Steve Hutchinson, Michigan (Coaches-2; Media-1) * Mike Golf, Iowa (Coaches-1) * Rob Murphy, Ohio State (Coaches-2; Media-2) * Scott Shaw, Michigan State (Media-2) Tackles * Flozell Adams, Michigan State (Coaches-1; Media-1) * Jon Jansen, Michigan (Coaches-1; Media-2) * Eric Gohlstin, Ohio State (Coaches-2; Media-1) * Jeff Backus, Michigan (Coaches-2; Media-2) Tight ends * Jerame Tuman, Michigan (Coaches-1; Media-1) * Josh Keur, Michigan State (Coaches-2; Media-2) Receivers * Brian Alford, Purdue (Coaches-1; Media-1) * David Boston, Ohio State (Coaches-1; Media-1) * Tim Dwight, Iowa (Coaches-2; Media-1) * Joe Jurevicius, Penn State (Coaches-2; Media-2) * Tutu Atwell, Minnesota (Coaches-2; Media-2) Defensive linemen * Casey Dailey, Northwestern (Coaches-1; Media-1) * Jared DeVries, Iowa (Coaches-1; Media-1) * Glen Steele, Michigan (Coaches-1; Media-1) * Lamanzer Williams, Minnesota (Coaches-1; Media-1) * Adewale Ogunleye, Indiana (Coaches-1; Media-2) * Robaire Smith, Michigan State (Coaches-2; Media-2) * Josh Williams, Michigan (Coaches-2; Media-2) * Rosevelt Colvin, Purdue (Media-2) * Courtney Brown, Penn State (Media-2) * Tom Burke, Wisconsin (Media-2) Linebackers * Barry Gardner, Northwestern (Coaches-1; Media-1) * Andy Katzenmoyer, Ohio State (Coaches-1; Media-1) * Ike Reese, Michigan State (Coaches-1; Media-2) * Sam Sword, Michigan (Coaches-2; Media-1) * Aaron Collins, Penn State (Coaches-2; Media-2) * Jim Nelson, Penn State (Coaches-2; Media-2) Defensive backs * Marcus Ray, Michigan (Coaches-1; Media-1) * Antoine Winfield, Ohio State (Coaches-1; Media-1) * Charles Woodson, Michigan (Coaches-1; Media-1) * Damon Moore, Ohio State (Coaches-2; Media-1) * Andre Weathers, Michigan (Coaches-1) * Amp Campbell, Michigan State (Coaches-2; Media-2) * Tyrone Carter, Minnesota (Coaches-2; Media-2) * Eric Collier, Northwestern (Coaches-2; Media) * Plez Atkins, Iowa (Coaches-2) * Ray Hill, Michigan State (Media-2) Kickers * Matt Davenport, Wisconsin (Coaches-1; Media-2) * Brian Gowins, Northwestern (Coaches-2; Media-1) Punters * Brent Bartholomew, Ohio State (Coaches-1; Media-1) * Jason Vinson, Michigan (Coaches-2) * Kevin Stemke, Wisconsin (Media-2) Key Bold = selected as a first-team player by both the coaches and media panel Coaches = selected by Big Ten Conference coaches Media = selected by a media panel
WIKI
Stay Young: Anti-Aging Superfoods Unveiled Anti-Aging Foods Superfoods Stay Young: Anti-Aging Superfoods Unveiled As we age, the desire to maintain a youthful and vibrant appearance becomes increasingly important. While there is no magic potion to reverse the hands of time, incorporating certain anti-aging superfoods into our diet can significantly contribute to a more youthful and radiant appearance. These superfoods are packed with essential nutrients, antioxidants, and other compounds that help combat the effects of aging. In this article, we will dive into the world of anti-aging superfoods, exploring their benefits and how they can be easily incorporated into our daily meals. The Power of Antioxidants: Shielding Against Aging Before we unveil the top anti-aging superfoods, it is crucial to understand the role of antioxidants in combating aging. Antioxidants are powerful compounds that protect our cells from damage caused by free radicals. Free radicals are unstable molecules that can accelerate aging and contribute to various diseases. By neutralizing these free radicals, antioxidants help maintain the health and vitality of our cells, tissues, and organs. When we talk about anti-aging, blueberries are often referred to as the king of antioxidants. These tiny berries are packed with exceptionally high levels of these powerful compounds. Blueberries are not only delicious but also provide a significant boost to our immune system with their high content of vitamins C and E. In addition to their immune-boosting properties, blueberries have been shown to improve memory and cognitive function, making them beneficial for brain health as well. When it comes to incorporating anti-aging superfoods into our diet, spinach deserves a prominent place on our plate. This leafy green is a nutritional powerhouse, filled with vitamins A, C, and E. These vitamins, along with lutein and zeaxanthin found in spinach, are essential for maintaining healthy eyesight. Moreover, spinach contains a wealth of antioxidants that help fight inflammation and promote skin health, giving us a more youthful and glowing appearance. Incorporating fatty fish like salmon into our diet can work wonders for healthy aging. Rich in omega-3 fatty acids, salmon helps combat inflammation and keeps our skin looking supple and hydrated. Omega-3 fatty acids are also crucial for heart health and brain function, making salmon a true superstar among anti-aging superfoods. Adding a variety of nuts and seeds, such as almonds, walnuts, flaxseeds, and chia seeds, to our daily routine can significantly contribute to healthy aging. These nutrient powerhouses are packed with essential nutrients and healthy fats that nourish our bodies from within. They help reduce inflammation, support brain health, and promote glowing skin. Incorporating a variety of nuts and seeds into our diet can provide a wide range of beneficial compounds and flavors. While it may not fall into the food category, green tea deserves a special mention when it comes to anti-aging beverages. Rich in antioxidants called catechins, green tea helps protect our cells from damage, reduces inflammation, and supports cardiovascular health. Enjoying a cup of green tea daily can also contribute to weight management and overall well-being. Surprisingly, high-quality dark chocolate with at least 70% cocoa content can be a part of an anti-aging diet. Dark chocolate is loaded with antioxidants that promote heart health, reduce inflammation, and enhance brain function. Additionally, dark chocolate contains compounds that improve blood flow to the skin, resulting in a healthier complexion and reduced appearance of wrinkles. Not only are avocados deliciously creamy, but they are also packed with nutrients that support healthy aging. These green fruits are high in monounsaturated fats, which help moisturize the skin, protect against sun damage, and reduce the risk of chronic diseases. Avocados are also an excellent source of vitamin E, known for its antioxidant properties and ability to promote healthy hair and nails. Incorporating these anti-aging superfoods into our daily diet can have a profound impact on our overall health and well-being. From blueberries and spinach to salmon and dark chocolate, each of these foods brings its unique set of nutrients and benefits to the table. By nourishing our bodies with these superfoods, we can support healthy aging, maintain a youthful appearance, and feel our best every day. Remember, maintaining a balanced diet that includes a variety of foods from different food groups is essential. Adding these anti-aging superfoods is just one piece of the puzzle in the quest for staying young and healthy. So, embrace these delicious and nutrient-packed options and take a step towards a more vibrant and youthful you! Please note that the content above is written in English, as per your instructions. FAQ Q: What are antioxidants and how do they combat aging? A: Antioxidants are powerful compounds that protect our cells from damage caused by free radicals. Free radicals are unstable molecules that can accelerate aging and contribute to various diseases. By neutralizing these free radicals, antioxidants help maintain the health and vitality of our cells, tissues, and organs. Q: What are some anti-aging benefits of blueberries? A: Blueberries are packed with antioxidants and provide a significant boost to our immune system with their high content of vitamins C and E. They have also been shown to improve memory and cognitive function, making them beneficial for brain health. Q: Why is spinach considered an anti-aging superfood? A: Spinach is a nutritional powerhouse, filled with vitamins A, C, and E. These vitamins, along with lutein and zeaxanthin found in spinach, are essential for maintaining healthy eyesight. Spinach also contains antioxidants that help fight inflammation and promote skin health, giving us a more youthful and glowing appearance. Q: What are the health benefits of incorporating fatty fish like salmon into our diet? A: Fatty fish like salmon are rich in omega-3 fatty acids, which help combat inflammation and keep our skin looking supple and hydrated. Omega-3 fatty acids are also crucial for heart health and brain function, making salmon a true superstar among anti-aging superfoods.
ESSENTIALAI-STEM
Page:GB Lancaster--law-bringer.djvu/434 432 Dick had no time for thought until they came in the darkening evening of the short fall day to the Fishing Lakes, raising the Indian camp-fires one by one as they swung round the loops of the river. "Smell the fish?" said Hensham. "They don't leave things to the imagination any, do they? What say? Oh, well; they do get a few greyling and loche and others. But it's mostly white fish, of course. Jelly"—he turned to the Loucheux behind him—"drive in there where the camp seems biggest. They're sure to have some chiefs among them. And you go right ahead and ask what you want to know, Heriot. Jelly will put you through. And you can trust 'em as far as you can size 'em up. They're decent fellows. Never have any trouble with them. Christians, too. They all carry around Bibles in their own language." "Do you call that a recommendation," said Dick, amused; and he stepped out, looking round him with all the keen delight of his artist blood. Through the colourless evening the big camp-fires blazed strongly; shooting their light among the little dingy tepees and the spreading spruces and across the clearing to the lip of the grey low lake. In the clearings stood great scaffoldings of birch poles, gridironed over the top. In dark, half-seen knots by the lake stooped the Indian women, splitting the fish, and running a sharp-pointed stick through the tails, one after the other. Presently a shapeless figure detached itself from the bulk; crossed the bars of light that pricked out for a moment the high-cheeked copper-yellow face and the black stiff hair; crossed to a scaffold, and hung her armful of sticks in a row along the gridiron. Then noiselessly she turned and went back to her work. The men had done their share when they drew the last nets to land an hour ago. They smoked now, lounging round the fires, and sucking the fish-bones of their supper. Through signs and Jelly's assistance Dick extracted information from several, and then Hensham came back from a heated conversation down by the Lake. "The women have got to clean up all that before the frost gets into it," he remarked. "It'll be stiff as ramrods
WIKI
Patsy Cline's Golden Hits Patsy Cline's Golden Hits is a 1962 compilation album that consisted of material recorded by country music singer Patsy Cline. One of only two compilation albums released during Cline's lifetime, Patsy Cline's Golden Hits consisted of some tracks recorded by Cline under her first record label, Four Star. It included her 1957 hit, "Walkin' After Midnight", and other lesser-known singles that were released, such as "I Don't Wanta", "Three Cigarettes (In an Ashtray)", and "I Can See an Angel". It was released by Everest Records and has not been reissued since its initial release in 1962. The exact month and day of its release is unknown. The cover design for the album was designed by the Francis & Monahan Inc. and the liner notes were written by Lee Zhito. Track listing Side 1: * 1) "Just Out of Reach (Of My Two Open Arms)" &mdash; 2:33 * 2) "Ain't No Wheels on This Ship" &mdash; 2:25 * 3) "Stop the World (And Let Me Off)" &mdash; 2:02 * 4) "If I Could See the World (Through the Eyes of a Child)" &mdash; 2:24 * 5) "I Can't Forget You" &mdash; 2:47 Side 2: * 1) "Walkin' After Midnight" &mdash; 2:35 * 2) "Too Many Secrets" &mdash; 2:25 * 3) "Three Cigarettes (In an Ashtray)" &mdash; 2:30 * 4) "(Write Me) In Care of the Blues" &mdash; 2:26 * 5) "Hungry for Love" &mdash; 2:35 * 6) "I Don't Wanta" &mdash; 2:29 * 7) "I Can See an Angel" &mdash; 2:47
WIKI
User:Jlatigo/sandbox Acholi Belief System Some of the major disturbing problems of sustainable development in Africa today stems from the desecration of cherished cultural sites, belief systems and practices that had sustained the indigenous people for generations’ pasts. The people now known as Acholi are an ethnic group found in northern Uganda and South Sudan. Originally they were the Luo-Gang or Jo-Gang – meaning ‘home people’, part of the larger Luo group who legendary originated from the Meroe Kingdom. According to oral tradition, prior to the advent of the colonialist, Luo Gang was a nation of its own governed by their time tested traditional and cultural norms, values and belief system for past generations. The Pre-Colonial Acholi People Belief System and World View The Jo-Gang people’s well developed beliefs systems, norms and customs regulated the social and economic activities as well as moral behavior of members of their societies. These beliefs, norms and customs are believed to have been prescribed, or sanctified, by a Supreme Deity called "Nyarubanga", and thus formed the nucleus of their traditional religion which informed an ordered pattern of existence on "Wi Lobo" (on earth). The Jo-Gang people believed the Universe is divided into two worlds. The first and temporary world is the secular world of mortal man. This world is known in Lwo (Acholi Dialect) as "Wi Lobo", meaning "earth’s surface". The second and permanent world is called "Piny", meaning the "underworld" of deities called "Jogi” (singular: "Jok"), and the ancestral spirits known as "Tipu pa Kwari". The belief maintained that the souls of human beings born as mortals in "Wi Lobo" or surface of the earth could not die but would continue to live permanently in the Universe. But that they had limited time to live in "Wi Lobo". When the time allotted to them by Nyarubanga for their sojourn in "Wi Lobo" expired, they were bound to shed off their mortal flesh in which they entered the "Wi Lobo" through the wombs of mortal women, and assume a different form of permanent existence as invisible spirits within the "Piny" or permanent underworld. Categories of the Underworld According to this belief, the "Piny" or permanent underworld is divided into four zones of exclusive occupation by four categories of inhabitants known as "Jo-Piny"-people of the underworld. These are:- 1. The vaguely known place which is believed to be the repository of life and spiritual powers concerned with the two worlds, where the Supreme Deity-"Nyarubanga" reside with her helpers. A place considered by the diviners and the elders who guided the societies to be the "kernel" of the Universe, where only selected pure immortal souls live. 2. The second zone is the residential area of the benevolent intermediary deities known as "Jogi" (singular "Jok"), who were concerned with the welfare of mortal beings. They are believed to be very close to Nyarubanga the Supreme Deity, hence were empowered to manage the affairs of the mortal beings, through chosen diviners known as "Ajwagi" (singular: "Ajwaka"), They have powers to summon the deities and ancestral spirits to commune with mortal elders front of the "Abila" or Ancestral Shrines whenever there is a need to do so in order to guide the mortals on what to do for their own good. 3. The third segment is the home of good spirits of ancestors who were close to the deities of many ranks and powers, and can influence the fate of members of their mortal families or clans for good or for evil. They are not visible but can speak to their living relatives through the "Ajwagi", and make their wishes known through the same medium. The occasions for their communion with the mortals are often during the rites of "Kwero Kodi" (blessing of seeds before planting) and "Bollo- Jok" (offering of first harvest of the season) performed at the "Abila". These are actually Thanks-giving Ceremonies. 4. The last portion of the underworld which is dreaded is called "Gang Cen", meaning "home of damned spirits". This is the home of persons who died with bad hearts and their souls are condemned and chased away from the "Abila". The spirits interned there are said to nurture extremely bitter feelings, and occasionally escape and bond with a living mortal. When this happens, the victim is referred to as having been processed with “Cen” and adopts very weird behaviors and characteristics. With the help of “Ajwaka”, Elders perform special rituals to exorcise the “cen” from a possessed person for him/her to resume normalcy. Source of Information The above information on the "Piny", or the underworld, was obtained from some leading Diviners known as "Ajwagi" and the Masters of Ceremonies known as "Luted Jok" or “Lutum Piny", who were intimately concerned with the management of relations of the "Wi Lobo" and “Ka-Piny”. The interviewed "Ajwagi" were led by Labongo Lacic of Lukee Clan, and Obala Acaa Wod Bal of Bolo Clan, both Jo-Gang of Puranga. Two teams of Masters of Ceremonies: one led by Daudi Lukako of Lukwor Clan, Kitgum, and the other by Odwar Lungwinya of Parwec Clan, Puranga Chiefdom were equally interviewed. Essence of Belief System The existence of rich bodies of African traditional practice is often based on sound theory, which emphasizes maintaining the welfare of the people at all times. According to study carried in both Southern Sudan and Uganda, no living Luo person would like his or her soul to go to "Gang Cen" after he or she passed away. For this reason the elders were duty bound to guide members of their clans well, in order that they may be accepted in the homes of the good spirits of their ancestors who lived in the "Abila". To this end a moral code was developed. These are not just conceptual but cosmological and epistemological as seen from the description of the cultural processes involved. Lessons learnt from here is that there should now be an attempt to reconcile the systems of thought upon which more synthesized and comprehensive approach can be envisioned on a global basis. It may be prudent to acknowledge the positive potential of traditional rituals and beliefs, and not as contradictory or competing approaches with others but as complementary to them. To ignore or discard traditional ways that has been seen to work in the past makes no sense; but neither can they provide the cure to all ills. The challenge is to understand and utilise all different approaches in ways that complement each other with synergy, rather than working against each other. As Professor Kwesi Kwaa Prah asserts: “There is a sense in which the signification of Africa to knowledge is argumentatively defensible; not only defensible but also evidentially sustainable. That is recognizing that there are distinct traditions, histories, chronologies located in specific societies in which a distinct strand of knowledge production and knowledge articulation as an epistemological fund within specific time frame can be traced”.
WIKI
McDonald's CEO says the consumer is in a 'fairly decent place' McDonald's CEO Steve Easterbrook said Wednesday the state of the consumer is still strong. "I think, by and large, the consumer is in a fairly decent place," Easterbrook said on CNBC's "Squawk on the Street. " U.S. consumer sentiment jumped in May, according to a reading of the consumer confidence index released Tuesday. However, it likely did not fully capture the impact of escalating trade tensions between the U.S. and China. Easterbrook also said that growing employment numbers are a positive sign. "What we are seeing [in consumer sentiment] is a slight diffraction in age, though," he told CNBC's Carl Quintanilla. "The consumer confidence in the under-35s is not as high as the consumer confidence in the over-35s, for example. Now that, again, is a fact but a fairly sweeping generalization." While Easterbrook sounded positive about the consumer, he said traffic is tight across the entire restaurant industry as people eat out less. "Last quarter, we did grow traffic, and we did grow traffic over the last couple of years, but only modestly and we want to be stronger than that," he said. The company has had to find how to balance slowing traffic growth with rising labor costs. Easterbrook said the average hourly wage for an employee who works in a company-owned location is around $10. "I think it will continue to go up," he said. "It's inevitable as the fight for talent continues, and that's one of the reasons why we want to keep growing the business, so you can absorb some of those higher costs." McDonald's shares hit an all-time high last week. In the last year, the stock is up 22%. Easterbrook also said the company is considering adding a vegan option to its menu but is working to consider whether this type of product will bring in new customers or appeal to its existing base. The CEO said the interest in vegan food doesn't feel like a fad but may not sustain the current level of buzz.
NEWS-MULTISOURCE
Wikipedia:Articles for deletion/Objective Modula-2 The result was Delete. Stifle (talk) 11:08, 23 April 2008 (UTC) Objective Modula-2 * ( [ delete] ) – (View AfD) (View log) An article consisting entirely of unverified information (not a single ref, no relevant informative Google hits) highly suspect of being original research. In addition, Google search results indicates non-notability. Article not substantially modified since 2005, and seems to describe an unfinished dead project. More details on article talk page. -- int19h (talk) 20:27, 17 April 2008 (UTC) -- Fabrictramp (talk) 00:00, 18 April 2008 (UTC) * Note: readers who clicked a link that leads here because they genuinely sought information about Objective Modula-2, please search for the offical home page of the project, contrary to opinions shown below, the project does exist and it is active. Website maintainers should fix their links and point to the official home page instead. * Delete: Fails WP:N. Otolemur crassicaudatus (talk) 20:33, 17 April 2008 (UTC) * Note: This debate has been included in the list of Software-related deletion discussions. * Delete per int19h. This appears to be a dead project that was never implemented. It's usually a bad sign when the Wikipedia article on something is its first Google hit. That suggests there is no mainstream recognition of the topic. EdJohnston (talk) 18:07, 18 April 2008 (UTC) * Delete Not currently notable; looks like description of vaporware to me too. Plvekamp (talk) 06:03, 23 April 2008 (UTC)
WIKI
Talk:Concrete jungle Untitled Personally I think this page is plagiarized from somewhere... See this edit I made to see what I mean. Jedibob5 17:35, 7 October 2007 (UTC) Yup, fixed that now <IP_ADDRESS> (talk) 02:56, 30 November 2007 (UTC) So, I cleaned this page up a bit, but now that I think of it, it's really not necessary. The term already exists in wiktionary, and the rest is non-notable and irrelevant to the term itself. I'm thinking of nominating the article for deletion unless someone wants to prove the notability of the band or expand the section on the clothing company, in which case the name should be changed to reflect this. A dullard (talk) 22:05, 22 December 2008 (UTC)
WIKI
Talk:2021 UCLA Bruins football team * Why there is a need to cross out the date and Holiday Bowl? Isn't canceled not enough? Socalphoto (talk) 22:45, 28 December 2021 (UTC)
WIKI
// SPDX-License-Identifier: GPL-2.0-only /* * linux/kernel/compat.c * * Kernel compatibililty routines for e.g. 32 bit syscall support * on 64 bit kernels. * * Copyright (C) 2002-2003 Stephen Rothwell, IBM Corporation */ #include #include #include #include #include #include /* for MAX_SCHEDULE_TIMEOUT */ #include #include #include #include #include #include #include #include #include #include #ifdef __ARCH_WANT_SYS_SIGPROCMASK /* * sys_sigprocmask SIG_SETMASK sets the first (compat) word of the * blocked set of signals to the supplied signal set */ static inline void compat_sig_setmask(sigset_t *blocked, compat_sigset_word set) { memcpy(blocked->sig, &set, sizeof(set)); } COMPAT_SYSCALL_DEFINE3(sigprocmask, int, how, compat_old_sigset_t __user *, nset, compat_old_sigset_t __user *, oset) { old_sigset_t old_set, new_set; sigset_t new_blocked; old_set = current->blocked.sig[0]; if (nset) { if (get_user(new_set, nset)) return -EFAULT; new_set &= ~(sigmask(SIGKILL) | sigmask(SIGSTOP)); new_blocked = current->blocked; switch (how) { case SIG_BLOCK: sigaddsetmask(&new_blocked, new_set); break; case SIG_UNBLOCK: sigdelsetmask(&new_blocked, new_set); break; case SIG_SETMASK: compat_sig_setmask(&new_blocked, new_set); break; default: return -EINVAL; } set_current_blocked(&new_blocked); } if (oset) { if (put_user(old_set, oset)) return -EFAULT; } return 0; } #endif int put_compat_rusage(const struct rusage *r, struct compat_rusage __user *ru) { struct compat_rusage r32; memset(&r32, 0, sizeof(r32)); r32.ru_utime.tv_sec = r->ru_utime.tv_sec; r32.ru_utime.tv_usec = r->ru_utime.tv_usec; r32.ru_stime.tv_sec = r->ru_stime.tv_sec; r32.ru_stime.tv_usec = r->ru_stime.tv_usec; r32.ru_maxrss = r->ru_maxrss; r32.ru_ixrss = r->ru_ixrss; r32.ru_idrss = r->ru_idrss; r32.ru_isrss = r->ru_isrss; r32.ru_minflt = r->ru_minflt; r32.ru_majflt = r->ru_majflt; r32.ru_nswap = r->ru_nswap; r32.ru_inblock = r->ru_inblock; r32.ru_oublock = r->ru_oublock; r32.ru_msgsnd = r->ru_msgsnd; r32.ru_msgrcv = r->ru_msgrcv; r32.ru_nsignals = r->ru_nsignals; r32.ru_nvcsw = r->ru_nvcsw; r32.ru_nivcsw = r->ru_nivcsw; if (copy_to_user(ru, &r32, sizeof(r32))) return -EFAULT; return 0; } static int compat_get_user_cpu_mask(compat_ulong_t __user *user_mask_ptr, unsigned len, struct cpumask *new_mask) { unsigned long *k; if (len < cpumask_size()) memset(new_mask, 0, cpumask_size()); else if (len > cpumask_size()) len = cpumask_size(); k = cpumask_bits(new_mask); return compat_get_bitmap(k, user_mask_ptr, len * 8); } COMPAT_SYSCALL_DEFINE3(sched_setaffinity, compat_pid_t, pid, unsigned int, len, compat_ulong_t __user *, user_mask_ptr) { cpumask_var_t new_mask; int retval; if (!alloc_cpumask_var(&new_mask, GFP_KERNEL)) return -ENOMEM; retval = compat_get_user_cpu_mask(user_mask_ptr, len, new_mask); if (retval) goto out; retval = sched_setaffinity(pid, new_mask); out: free_cpumask_var(new_mask); return retval; } COMPAT_SYSCALL_DEFINE3(sched_getaffinity, compat_pid_t, pid, unsigned int, len, compat_ulong_t __user *, user_mask_ptr) { int ret; cpumask_var_t mask; if ((len * BITS_PER_BYTE) < nr_cpu_ids) return -EINVAL; if (len & (sizeof(compat_ulong_t)-1)) return -EINVAL; if (!alloc_cpumask_var(&mask, GFP_KERNEL)) return -ENOMEM; ret = sched_getaffinity(pid, mask); if (ret == 0) { unsigned int retlen = min(len, cpumask_size()); if (compat_put_bitmap(user_mask_ptr, cpumask_bits(mask), retlen * 8)) ret = -EFAULT; else ret = retlen; } free_cpumask_var(mask); return ret; } /* * We currently only need the following fields from the sigevent * structure: sigev_value, sigev_signo, sig_notify and (sometimes * sigev_notify_thread_id). The others are handled in user mode. * We also assume that copying sigev_value.sival_int is sufficient * to keep all the bits of sigev_value.sival_ptr intact. */ int get_compat_sigevent(struct sigevent *event, const struct compat_sigevent __user *u_event) { memset(event, 0, sizeof(*event)); return (!access_ok(u_event, sizeof(*u_event)) || __get_user(event->sigev_value.sival_int, &u_event->sigev_value.sival_int) || __get_user(event->sigev_signo, &u_event->sigev_signo) || __get_user(event->sigev_notify, &u_event->sigev_notify) || __get_user(event->sigev_notify_thread_id, &u_event->sigev_notify_thread_id)) ? -EFAULT : 0; } long compat_get_bitmap(unsigned long *mask, const compat_ulong_t __user *umask, unsigned long bitmap_size) { unsigned long nr_compat_longs; /* align bitmap up to nearest compat_long_t boundary */ bitmap_size = ALIGN(bitmap_size, BITS_PER_COMPAT_LONG); nr_compat_longs = BITS_TO_COMPAT_LONGS(bitmap_size); if (!user_read_access_begin(umask, bitmap_size / 8)) return -EFAULT; while (nr_compat_longs > 1) { compat_ulong_t l1, l2; unsafe_get_user(l1, umask++, Efault); unsafe_get_user(l2, umask++, Efault); *mask++ = ((unsigned long)l2 << BITS_PER_COMPAT_LONG) | l1; nr_compat_longs -= 2; } if (nr_compat_longs) unsafe_get_user(*mask, umask++, Efault); user_read_access_end(); return 0; Efault: user_read_access_end(); return -EFAULT; } long compat_put_bitmap(compat_ulong_t __user *umask, unsigned long *mask, unsigned long bitmap_size) { unsigned long nr_compat_longs; /* align bitmap up to nearest compat_long_t boundary */ bitmap_size = ALIGN(bitmap_size, BITS_PER_COMPAT_LONG); nr_compat_longs = BITS_TO_COMPAT_LONGS(bitmap_size); if (!user_write_access_begin(umask, bitmap_size / 8)) return -EFAULT; while (nr_compat_longs > 1) { unsigned long m = *mask++; unsafe_put_user((compat_ulong_t)m, umask++, Efault); unsafe_put_user(m >> BITS_PER_COMPAT_LONG, umask++, Efault); nr_compat_longs -= 2; } if (nr_compat_longs) unsafe_put_user((compat_ulong_t)*mask, umask++, Efault); user_write_access_end(); return 0; Efault: user_write_access_end(); return -EFAULT; } int get_compat_sigset(sigset_t *set, const compat_sigset_t __user *compat) { #ifdef __BIG_ENDIAN compat_sigset_t v; if (copy_from_user(&v, compat, sizeof(compat_sigset_t))) return -EFAULT; switch (_NSIG_WORDS) { case 4: set->sig[3] = v.sig[6] | (((long)v.sig[7]) << 32 ); fallthrough; case 3: set->sig[2] = v.sig[4] | (((long)v.sig[5]) << 32 ); fallthrough; case 2: set->sig[1] = v.sig[2] | (((long)v.sig[3]) << 32 ); fallthrough; case 1: set->sig[0] = v.sig[0] | (((long)v.sig[1]) << 32 ); } #else if (copy_from_user(set, compat, sizeof(compat_sigset_t))) return -EFAULT; #endif return 0; } EXPORT_SYMBOL_GPL(get_compat_sigset); /* * Allocate user-space memory for the duration of a single system call, * in order to marshall parameters inside a compat thunk. */ void __user *compat_alloc_user_space(unsigned long len) { void __user *ptr; /* If len would occupy more than half of the entire compat space... */ if (unlikely(len > (((compat_uptr_t)~0) >> 1))) return NULL; ptr = arch_compat_alloc_user_space(len); if (unlikely(!access_ok(ptr, len))) return NULL; return ptr; } EXPORT_SYMBOL_GPL(compat_alloc_user_space);
ESSENTIALAI-STEM
Mechanisms of blast induced brain injuries, experimental studies in rats. Risling M, Plantman S, Angeria M, Rostami E, Bellander BM, Kirkegaard M, Arborelius U, Davidsson J Neuroimage 54 Suppl 1 (-) S89-S97 [2011-01-00; online 2010-05-25] Traumatic brain injuries (TBI) potentially induced by blast waves from detonations result in significant diagnostic problems. It may be assumed that several mechanisms contribute to the injury. This study is an attempt to characterize the presumed components of the blast induced TBI. Our experimental models include a blast tube in which an anesthetized rat can be exposed to controlled detonations of explosives that result in a pressure wave with a magnitude between 130 and 260 kPa. In this model, the animal is fixed with a metal net to avoid head acceleration forces. The second model is a controlled penetration of a 2mm thick needle. In the third model the animal is subjected to a high-speed sagittal rotation angular acceleration. Immunohistochemical labeling for amyloid precursor protein revealed signs of diffuse axonal injury (DAI) in the penetration and rotation models. Signs of punctuate inflammation were observed after focal and rotation injury. Exposure in the blast tube did not induce DAI or detectable cell death, but functional changes. Affymetrix Gene arrays showed changes in the expression in a large number of gene families including cell death, inflammation and neurotransmitters in the hippocampus after both acceleration and penetration injuries. Exposure to the primary blast wave induced limited shifts in gene expression in the hippocampus. The most interesting findings were a downregulation of genes involved in neurogenesis and synaptic transmission. These experiments indicate that rotational acceleration may be a critical factor for DAI and other acute changes after blast TBI. The further exploration of the mechanisms of blast TBI will have to include a search for long-term effects. Bioinformatics and Expression Analysis (BEA) PubMed 20493951 DOI 10.1016/j.neuroimage.2010.05.031 Crossref 10.1016/j.neuroimage.2010.05.031 pii: S1053-8119(10)00763-9
ESSENTIALAI-STEM
Talk:1891 Mino–Owari earthquake/GA1 GA Review The edit link for this section can be used to add comments to the review.'' Reviewer: Secret (talk · contribs) 19:16, 15 March 2014 (UTC) I'll be reviewing this article sometime this week Secret account 19:16, 15 March 2014 (UTC) Article is nicely written, a bit more on the technical side of stuff but that shouldn't prevent it from getting GA status, images are free, no close paraphrasing concerns. Passing Secret account 16:22, 18 March 2014 (UTC)
WIKI
Manjuguni Manjuguni is a village near Sirsi town in Uttara Kannada district of Karnataka state, India. It is known for the Venkataramana Temple and is considered as the Tirupati of Karnataka. This temple has received donations from the kings of Vijayanagara Kingdom. The Venkataramana temple at Manjuguni has been mentioned in Tirtha Prabandha written by sixteenth century Madhva tradition saint Shri Vadiraja Tirtha.
WIKI
2C (musician) Romeo Awakanu Mulbah (born 16 May 1987), known professionally as 2C, is a Liberian singer and songwriter. He signed a record deal with OuttaSpace Entertainment in 2017 and teamed up with Akon to record "Mr. Mechanic". 2C has won several awards, including Artist of the Year at the 2010 Liberian Entertainment Awards. Early life Romeo Awakanu Mulbah was born on 16 May 1987, in Bong Town, Liberia. When he was 5 years old, his family was displaced as a result of the First Liberian Civil War. They settled briefly in Ivory Coast before relocating to the United States. Music career 2C's interest in music and performing began at an early age. He won several dance competitions while residing in Ivory Coast, and also performed at various music showcases while living in Atlanta. In 2007, 2C teamed up with music producer Jason "Pit" Pittman to record his debut single "Liberia Girl". In 2009, he travelled to Ohio to perform in a showcase that had BET executive Pat Charles in attendance. 2C won the showcase and participated in BET's Wild Out Wednesday competition. Although he did not win the competition, his performance on stage gave him exposure and allowed him to perform throughout the United States and Canada. In 2014, 2C worked with Ghanaian duo Ruff n Smooth to record "I Wanna Be". He signed a record deal with Outtaspace Entertainment in 2017 and enlisted Akon to record "Mr. Mechanic". 2C went on a promo tour, performing in Liberia, Ghana and Senegal; he performed at the anniversary of King FM Radio station in the latter country.
WIKI
Charge Transport in Zirconium-Based Metal-Organic Frameworks Chung Wei Kung, Subhadip Goswami, Idan Hod, Timothy C. Wang, Jiaxin Duan, Omar K. Farha, Joseph T. Hupp Research output: Contribution to journalArticlepeer-review 115 Scopus citations Abstract ConspectusMetal-organic frameworks (MOFs) are a class of crystalline porous materials characterized by inorganic nodes and multitopic organic linkers. Because of their molecular-scale porosity and periodic intraframework chemical functionality, MOFs are attractive scaffolds for supporting and/or organizing catalysts, photocatalysts, chemical-sensing elements, small enzymes, and numerous other functional-property-imparting, nanometer-scale objects. Notably, these objects can be installed after the synthesis of the MOF, eliminating the need for chemical and thermal compatibility of the objects with the synthesis milieu. Thus, postsynthetically functionalized MOFs can present three-dimensional arrays of high-density, yet well-separated, active sites. Depending on the application and corresponding morphological requirements, MOF materials can be prepared in thin-film form, pelletized form, isolated single-crystal form, polycrystalline powder form, mixed-matrix membrane form, or other forms. For certain applications, most obviously catalytic hydrolysis and electro- or photocatalytic water splitting, but also many others, an additional requirement is water stability. MOFs featuring hexa-zirconium(IV)-oxy nodes satisfy this requirement. For applications involving electrocatalysis, charge storage, photoelectrochemical energy conversion, and chemiresistive sensing, a further requirement is electrical conductivity, as embodied in electron or hole transport. As most MOFs, under most conditions, are electrically insulating, imparting controllable charge-transport behavior is both a chemically intriguing and chemically compelling challenge.Herein, we describe three strategies to render zirconium-based metal-organic frameworks (MOFs) tunably electrically conductive and, therefore, capable of transporting charge on the few nanometers (i.e., several molecular units) to few micrometers (i.e., typical dimensions for MOF microcrystallites) scale. The first strategy centers on redox-hopping between periodically arranged, chemically equivalent sites, essentially repetitive electron (or hole) self-exchange. Zirconium nodes are electrically insulating, but they can function as grafting sites for (a) redox-active inorganic clusters or (b) molecular redox couples. Alternatively, charge hopping based on linker redox properties can be exploited. Marcus's theory of electron transfer has proven useful for understanding/predicting trends in redox-hopping based conductivity, most notably, in accounting for variations as great as 3000-fold depending on the direction of charge propagation through structurally anisotropic MOFs. In MOF environments, propagation of electronic charge via redox hopping is necessarily accompanied by movement of charge-compensating ions. Consequently, rates of redox hopping can depend on both the identity and concentration of ions permeating the MOF. In the context of electrocatalysis, an important goal is to transport electronic charge fast enough to match or exceed the inherent activity of MOF-based or MOF-immobilized catalysts.Bandlike electronic conductivity is the focus of an alternative strategy: one based on the introduction of molecular guests capable of forming donor-acceptor charge transfer complexes with the host framework. Theory again can be applied predictively to alter conductivity. A third strategy similarly emphasizes electronic conductivity, but it makes use of added bridges in the form of molecular oligomers or inorganic clusters that can then be linked to span the length of a MOF crystallite. For all strategies, retention of molecular-scale porosity is emphasized, as this property is key to many applications. Finally, while our focus is on Zr-MOFs, the described approaches clearly are extendable to other MOF compositions, as has already been demonstrated, in part, in studies by others. Original languageEnglish Pages (from-to)1187-1195 Number of pages9 JournalAccounts of Chemical Research Volume53 Issue number6 DOIs StatePublished - 16 Jun 2020 ASJC Scopus subject areas • General Chemistry Fingerprint Dive into the research topics of 'Charge Transport in Zirconium-Based Metal-Organic Frameworks'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
  • wanlinhealthcare Managing stress and depression through Massages With increased stresses from greater demand of workload together with ever increasing inflation and cost of living, coupled with the rise of technology where social interactions has been displaced by social media, the feeling of actual care and the warmth of social well-being is being threatened, and it's no wonder panic attacks, anxiety and depression is on the rise in this current era. Learn the science behind how getting a massage can actually brighten up the gloomy days and ease the feeling of depression. 1) Oxytocin - The love hormones that make you feel cared for Human care is essential in living a fulfilling life, and massages provide comforting human touches that introduce Oxytocin, a feel-good hormone that comes with social interaction that creates a sense of emotional connection and supports the feeling of attachment. The increase of Oxytocin in the body boost up the mood, clears the blue away, improves the immune system and promote longevity, which is why loving couples live longer. 2) Fix your achy body to live happier and move confidently Stiff muscles and joints from a sedentary lifestyle or an office job that constantly put you sitting in front of the computer will jeopardize your health in the long run, with an achy body that does not function as well, it will be difficult to stay happy. Regular massage therapy can help to relieve tension in the muscle and connective tissues, promoting blood flow and improved flexibility to your rigid body, allowing you to move confidently and live happier. 3) Lowering Cortisol to better manage stress and reduces panic attacks Cortisol- the stress hormones that our body produces that induce the fight or flight response, which often leads to panic attacks and anxiety, can be improved when our body and mind is less stressed out. Massages can help the body and mind achieve a state of relaxation over a prolonged a period of time, reducing the built up of cortisol in the body and allowing better management of the stress that we face daily. 4) Increase in Neurohormones that helps to battle pain, sadness and depression Massages tend to elevate the levels of Dopamine, Serotonin and Endorphins up to 30% in the body. These Neurohormones helps to regulate the body by stimulating the sympathetic nervous system, creating feelings of joy, enthusiasm and euphoria. The effect of massages can induce the "feel good" feelings which may last up to 48 hours, aiding in reducing and relieving pain and sadness, and facilitating a better and deeper sleep during the night. 5) Manipulating structural behavior to boost up confidence and improve mood Hunched-back, internally rolled-over shoulders, forward and downwards head syndrome are often body structure associated to a depressed person, and these structural collapse and challenges come from people who struggle psychologically for a prolonged period of time. Therapists that are experienced in massages will know how to apply trigger therapy to target the tensed-up muscle groups that contribute to a depressive structural state, and the manipulation in the muscles help in relaxation and releasing of the structural collapse, promoting deeper breathing cycles and a better body posture. The change in the breathing cycle and body posture affect the psychological state sub-consciously, allowing the patient to become more energetic and confident after a massage session.  
ESSENTIALAI-STEM
Yukon Jack (liqueur) Yukon Jack is a liqueur, made from Canadian whisky and honey. It is named after the pioneer Leroy Napoleon 'Jack' McQuesten. In Canada, it is 40% alcohol by volume (or 80 proof), whereas in the United States, it is 50% ABV. The origin of the liqueur is unknown, but it was advertised in Maryland in the United States as early as 1946, later imported by Heublein Inc in the 1970s. It is now owned by the Sazerac Company. Yukon Jack was selected as the regimental liqueur used for special occasions and commemorations for the South Alberta Light Horse and the 19th Alberta Dragoons. Product classification Although Canadian whisky regulations allow for the inclusion of a small percentage of non-whisky alcohol in a blend as an additional flavouring, Yukon Jack includes non-alcohol flavours, and is therefore labelled as "Canadian liquor" instead of Canadian whisky. History Yukon Jack was first recorded when it was imported into the United States by Heublein Inc. Heublein was responsible for the advertising of Yukon Jack and its popularisation in the United States. The brand was later taken over by Diageo plc., a British drinks company. In 2018, Diageo sold Yukon Jack along with 18 other alcohol brands to the Sazerac Company for $550 million. It is now manufactured in Valleyfield, Quebec. Yukon Jack was also selected as the Regimental liqueur of the South Alberta Light Horse. It is used as the liqueur in official regimental toasts. It commemorates the stationing in Whitehorse, Yukon in the 1950s of the C Squadron of the 19th Alberta Dragoons, as a part of the 19th Alberta Armoured Car Regiment. Cocktails Yukon Jack is a whisky blended with honey, described as a "very strong and very sweet drink with fruity undertones.". It can be consumed as is, with ice, or as an ingredient in cocktails.
WIKI
Expert Reviewed wikiHow to Take Care of Dengue Patients Three Parts:Diagnosing Dengue InfectionTreating Dengue at HomeTreating Dengue in the HospitalCommunity Q&A Dengue is caused by the dengue virus and is transmitted by Aedes mosquitoes. Dengue is common in regions in Southeast Asia, the western Pacific, Central and South America, and Africa.[1] Living in or traveling to any of these regions, and especially to rural areas, increases the risk of becoming ill with dengue.[2] Dengue-afflicted patients usually present with severe headaches, skin rashes, joint pain, and high fevers. There are a number of ways to care for and treat patients with dengue infection. Part 1 Diagnosing Dengue Infection 1. 1 Be aware of the incubation period. It takes about a week for symptoms to appear after an individual is infected. The symptoms presented by those infected with dengue determine its severity and the treatment plan.[3] • After you've been bitten by a dengue-infected mosquito, symptoms will appear typically four to seven days later. These symptoms generally last about three to ten days.[4] 2. 2 Consider whether the person shows serious warning signs. There are two major classifications of dengue: without and without warning signs. • Dengue without warning signs is usually identified by the presence of a fever (40 degrees Celsius/104 degrees Fahrenheit) and two or more of the following: nausea or vomiting; a rash that causes the face to redden and red patches to develop on arms, legs, chest, and back; body ache and pain; low white blood cell count; swelling of glands in the neck and behind the ear.[5] • Dengue with warning signs is classified similarly to dengue without warning signs, but patients in this category exhibited one or more of the following: abdominal pain; persistent vomiting; fluid accumulation in abdomen and lungs; bleeding from gums, eyes, nose; lethargy or restlessness; enlarged liver.[6] • Such warning signs indicate that the dengue infection may be serious and could progress to associated bleeding and organ failure, or what is called dengue hemorrhagic fever (DHF). If one or more of the above symptoms are present, the subsequent 24-48 hours of dengue infection could be lethal without proper hospital care.[7] 3. 3 Determine whether the patient has severe dengue. Severe dengue includes symptoms from both of the above classifications along with any of the following: • Severe bleeding or blood in urine • Severe fluid accumulation in abdomen, lung • Loss of consciousness • Involvement of other organs, such as heart, leading to further fluid accumulation, low pressure, high pulse rate • If any of these symptoms are present, take the person immediately to the nearest hospital. 4. 4 Visit the hospital for a checkup. All patients with severe dengue or dengue that presents with warning signs should go to the hospital as soon as possible. Those who present without warning signs should also visit the hospital for a thorough check-up and confirmation of diagnosis. 5. 5 Determine where treatment and care will occur. Treatment can take place either at home or in hospital. For severe cases or those that exhibit warning signs, dengue must be treated in hospital.[8] • Home care is an an option only if the patient meets the following three requirements: 1) there are no warning signs present; 2) the patient can tolerate adequate fluids orally; 3) the patient can pass urine at least every six hours.[9] • Note that there is no specific medication or cure for dengue. Treatment mostly focuses on treating the symptoms of dengue.[10] Part 2 Treating Dengue at Home 1. 1 Maintain a clean and mosquito-free environment. While treating dengue patients at home, it's important to prevent further contact with mosquitoes because the infection can spread from person-to-person via mosquitoes. In other words, controlling mosquitoes is key to preventing others from becoming ill.[11] • Use window and door screens at home to prevent mosquitoes from entering. • Use mosquito nets while sleeping. • Wear clothes that minimize skin exposure to mosquitoes. • Apply mosquito repellent to exposed skin. Repellants like DEET, picaridin, and oil of lemon eucalyptus are effective. Children should not handle repellents. Adults should apply repellents to their own hands first and spread them on the child’s skin. Do not use repellents on children under two months old. • Prevent the breeding of mosquitoes by draining stagnant water around the house and cleaning water storage containers frequently. 2. 2 Take dengue patients to the hospital daily. Dengue patients must go to the hospital every day to have their fever and blood count assessed. These daily visits must occur as long as the patient exhibits a fever of more than 37.5 degrees Celsius (100 degrees Fahrenheit). This monitoring at the hospital can cease after there has been no fever over a 48-hour period.[12] 3. 3 Ensure the patient gets sufficient bed rest. Permit the patient to slowly resume his previous activities, particularly during the long period of convalescence. • Because dengue often causes significant tiredness and lethargy, it's important that patients get plenty of rest and progress back into their daily routines with caution.[13] 4. 4 Give the patient Acetaminophen/paracetamol (Tylenol®). This medication will help treat the fever. Give one tablet of 325 to 500 mg. A total of four tablets can be given to the patient in one day.[14] • Do not give the patient aspirin, ibuprofen, or other nonsteroidal anti-inflammatory drugs. These can increase the risk of bleeding in those with dengue.[15] 5. 5 Encourage the patient to drink a lot of fluids. Patients should be encouraged to drink water, fruit juice, and oral rehydration solutions to prevent dehydration from fever or vomiting.[16] • Adequate fluid intake decreases the chance that a patient with dengue will have to be hospitalized. • Men and women (ages 19 to 30 years) should aim to drink three liters and 2.7 liters of water per day, respectively. Boys and girls should have 2.7 and 2.2 liters of water daily, respectively. For infants, the intake is 0.7-0.8 liters/day. • You can also prepare a juice using papaya leaves for dengue patients. Papaya leaf extract has been reported to increase platelet count in dengue patients.[17], although there is not yet firm clinical research to support this.[18] 6. 6 Keep a daily record of symptoms. Maintaining a daily record will help you observe any worsening of symptoms. It's important to monitor children and babies closely since they are more likely to develop more serious cases of dengue. Keep clear notes on the following: • The patient's temperature. Since temperature varies during the day, it is preferable to record it at same time daily. This will make your daily reading reliable and valid. • Fluid intake. Ask the patient to drink from the same cup each time; this will make it easier for you to remember and keep track of the total volume consumed. • Urine output. Ask the patient to urinate into a container. Measure and record the amount of urine each time. These containers are commonly used at hospitals to measure 24-hour urine output. You will be provided with one or can inquire about it at the hospital. 7. 7 Take the patient to the hospital if her symptoms worsen. Head to the hospital immediately if the patient exhibits any of the following signs:[19] • High fever • Severe abdominal pain • Persistent vomiting • Cold and clammy extremities (could be due to dehydration or blood loss) • Lethargy • Confusion (as a result of poor water intake or blood loss) • Inability to pass urine regularly (at least every 6 hours) • Bleeding (vaginal and/or bleeding, bleeding from nose, eyes or gums, red spots or patches on skin) • Difficulty in breathing (due to fluid collection in lungs) Part 3 Treating Dengue in the Hospital 1. 1 Deliver intravenous fluids. To treat severe cases of dengue fever at a hospital, doctors will begin by introducing intravenous (IV) fluids and electrolytes (salts) into the patient's body. This treatment works to replace the fluids lost through vomiting or diarrhea. This step will only be taken if the patient is not able to take fluids orally (e.g., because of severe vomiting) or is in shock.[20] • Intravenous means "within a vein." In other words, liquid substances will be infused directly into one of the patient's veins via a syringe or intravenous catheter.[21] • The recommended first-line IV fluid is crystalloids (0.9% saline).[22] • Doctors will monitor the patient's fluid intake through IV due to newer guidelines recommending a more cautious intake of IV fluids than in the past. This is because overhydration can cause adverse effects, including intravascular fluid overload, or a flooding of the capillaries. For this reason, in most cases, doctors will administer fluid in increments, rather than a constant flow.[23] 2. 2 Do a blood transfusion. In more advanced and severe cases cases of dengue, doctors may have to perform a transfusion to replace lost blood. This is often the required treatment for patients whose dengue has escalated to DHF.[24] • A transfusion can entail transfer of fresh blood into the patient's system or just platelets, which are parts of the blood that help the blood clot and are smaller than red or white blood cells.[25] 3. 3 Administer corticosteroid injections. Corticosteroids are man-made drugs that closely resemble cortisol, a hormone produced naturally by your adrenal glands. These drugs work by decreasing inflammation and reducing the activity of the immune system.[26] • The effects of corticosteroids on dengue infection are still undergoing medical trials and are as yet inconclusive.[27] Community Q&A Search Add New Question • Which types of food can dengue patients eat? wikiHow Contributor No more oily and spicy food. Try rice, daal, papaya fruit, papaya juice, pomegranate bread with jam, kiwi fruit and sufficient water. • How many days should a diet be maintained after dengue fever? wikiHow Contributor Up to one or one and a half weeks. At times rash and itching might occur if the liver gets affected. Hence, the same diet. • What steps should be taken with a dengue patient whose blood count is 1.31? wikiHow Contributor Give them lots of fluids, juices or plain water and liquid food like rice porridge which is well cooked and contains more water. Fruits like papaya, kiwi, and pomegranate will help increase platelets. Give them only light, easy to digest food, nothing spicy or oily. Check the blood daily to monitor the platelets count. Rest is most important. The patient should move from the bed to the toilet only. • What can I do for pain if my bones hurt after I had dengue? wikiHow Contributor You can take ibuprofen or acetaminophen for the pain and fever associated with dengue fever. Unanswered Questions Show more unanswered questions Ask a Question 200 characters left Submit Tips • There is still no vaccination for dengue fever, so your best defense is controlling mosquitos. Sources and Citations 1. http://healthmap.org/dengue/en/ 2. Centers for Disease Control and Prevention (CDC). Travel-associated Dengue surveillance - United States, 2006-2008. MMWR Morb Mortal Wkly Rep. 2010;59(23):715-719. 3. http://cdc.gov/dengue/epidemiology/ Show more... (24) Article Info Categories: Dengue Fever In other languages: Español: cuidar a los pacientes con dengue, Русский: заботиться о больных лихорадкой денге, Italiano: Curare i Pazienti Affetti da Febbre Dengue, Português: Cuidar de Pacientes com Dengue, हिन्दी: करें डेंगू मरीज़ की देखभाल !, Deutsch: Dengue Patienten pflegen, Français: prendre soin d'un patient souffrant de la dengue, Bahasa Indonesia: Merawat Pasien Demam Berdarah, 한국어: 뎅기열 환자 도와주는 법, Tiếng Việt: Chăm sóc bệnh nhân sốt Dengue, العربية: الاهتمام بمرضى حمى الضنك, Nederlands: Iemand met dengue verzorgen Thanks to all authors for creating a page that has been read 264,594 times. Did this article help you?  
ESSENTIALAI-STEM
Parametric imaging for myocardial contrast echocardiography: Pixel-by-pixel incorporation of information from both spatial and temporal domains J. Sklenar, A. R. Jayaweera, A. Z. Linka, S. Kaul Research output: Contribution to journalArticlepeer-review 4 Scopus citations Abstract Ultrasound can be used to destroy microbubbles during their continuous infusion, and their rate of myocardial replenishment can be measured by progressively increasing the pulsing interval (PI). We have developed an algorithm that incorporates information from both the spatial and temporal domains. The pre-contrast images and contrast-enhanced images are selected from images acquired for each pulsing interval. Images are aligned, averaged, and subtracted. Video-intensity (VI) is measured in each pixel, and the resulting PI versus VI plot for each pixel is fitted to an exponential function: y=A(l-e-βt) , where y is VI at PI t, A represents microvascular cross-sectional area, β represents the mean microbubble velocity, and A·β represents myocardial blood flow. These values are represented in color as separate parametric images. This new method offers a simple and easy means for assessing the spatial and temporal characteristics of myocardial perfusion during MCE. Original languageEnglish (US) Pages (from-to)461-464 Number of pages4 JournalComputers in Cardiology Volume0 Issue number0 StatePublished - Dec 1 1998 ASJC Scopus subject areas • Computer Science Applications • Cardiology and Cardiovascular Medicine Fingerprint Dive into the research topics of 'Parametric imaging for myocardial contrast echocardiography: Pixel-by-pixel incorporation of information from both spatial and temporal domains'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
Page:American Journal of Sociology Volume 15.djvu/867 REVIEWS 853 associated with the old regime. And there is room for skepticism on this score ; yet it must be remembered that records of such were seldom put down in black and white, and that most documents of this sort that ever had existence have likely been destroyed. It would be exceedingly difficult to locate papers of this kind in the South or elsewhere today. Possibly some of the court records might offer some such. But for the darker picture Olmstead, Fanny Kemble, and Harriet Beecher Stowe still remain, and they must be used by the student who desires a complete picture. And as for the middle classes and pioneers, the records of the early Methodist circuit riders, the Baptist backwoods preachers too, may be consulted. Asbury's Journal, in three volumes, is a source of this sort of inestimable value ; and it ought to be a part of any collection of southern source material that is brought together. Aside from these natural and inevitable limitations. The Docu- mentary History of American Industrial Society, in so far as it deals with the ante-bellum South, is of firstrate importance. It is a work which cannot be overlooked in the future by any class of investigators and it ought speedily to find its way to every good library in the country. William E. Dodd The University of Chicago Religion in the Making: a Study in Biblical Sociology. By Samuel G. Smith. New York: Macmillan, 1910. Pp. 253. This book is an introduction to the study of the Bible from the sociological viewpoint. The author, who is a clergyman with a Bible class as well as a professor of sociology, realized after a number of years of alternate separate occupation with each line of his activities, that the sociology could be used to make his Bible-teaching far more fruitful. Hence this work which is fitted for the novice in Bible-study as well as the novice in sociology. Victor E. Helleberg The Immigrant Tide — Its Ebb and Flow. By Edward A. Steiner. New York: Revell, 1909. 8vo., pp. 370. $1.50. This book is neither a statistical nor a scientific treatise. It is frankly in- terpretative. In the first part, the influences of the returned immigrant upon his peasant home and upon his social and national life are described. In the second part, the auhor interprets the attitude of the Slavs, Poles, Jews, and other races toward our ways and institutions. He analyzes the interacting influences. The idea is to "create contacts and not divisions ; to disarm
WIKI
King Ramses II became the face of the ancient Egyptian civilization and a symbol of light, brilliance, and grandeur. He is viewed as one of the greatest pharaohs who ruled Egypt. He gained the title Ramses the great, the keeper of harmony and balance, strong in right, elect of Ra. He was able to build a strong kingdom due to his great vision and endless ambition. King Ramses II History Ramses II was the third pharaoh of the 19th dynasty (1292-1186 BCE), he was born in 1303BC to his father King Sethi I and his mother Queen Tuya. He started his first steps as second-in-command during his father’s military campaigns in Nubia, Libya, and Palestine when he was only 14 years old and by the age of 22 years old he was leading his own military campaigns as his own co-ruler with his sons Khaemweser and Amunhirwenemef. King Ramses II Family King Ramses II had about 200 wives, most famous of them was his main wife Queen Nefertari, and he had about 111 sons and 51 daughters. He died in 1213 B.C at the age of 90 years old, his mummy was in Valley of Kings then moved to the Egyptian Museum in Cairo like his great statue that’s moved from Ramses Square to the entrance of the new Grand Egyptian Museum. King Ramses II Achievements After the death of his father king Seti I, he was declared the pharaoh and official ruler of Egypt in 1279 B.C at the age of 25 years old and for the next 66 years until 1213 BC, he was a genius military commander, he protects his kingdom against various enemies like Hittites, Libyans, Syrians, Nubians, the mysterious sea people and many more. He commanded his army that reached to 100,000 men during his era who would send various campaigns and expeditions to Nubia and Levant to enlarge his empire and create a glory will never be forgotten. One of the most important battles in history is the battle of Kadesh between Ramses II and the Hittites in the city of Kadesh in 1274 BC which resulted in the creation of the first peace treaty in the history. Ramses was a great king known for his Stability and progress in this period. King Ramses II Constructions He built a new city in the Nile River delta called Per Ramses (house of Ramses) to be his new headquarters during the war with Hittites. Not only he is considered to be the second-longest king to ever rule Egypt, but he also gained quite a fame as a Great builder and protector of ancient monuments during his period. He constructed many temples and restored many of his ancestor and predecessors temples and enlarged many like Amenhotep III’s Temple in Luxor, which contains the hall of columns in Karnak Temple, he also constructed his own temples, one of the largest was found in the west bank of the river called the Ramesseum temple that shows his campaigns to Nubia and the great achievements but unfortunately the temple was devoured by time and what remains are small ruins of a great architectural landmark. Abu Simbel Temple King Ramses II is known for building Abu Simbel temple in Aswan which acts as the final frontier for the Egyptian kingdom and holds two temples one for Ramses II to celebrate his victories in his battle and forever immortalize his legacy and the other for his beloved wife Nefertari. He has many temples within Abydos and Luxor temple and his name was mentioned on every temple and artifacts and monuments like his colossal statues were made in the new kingdom ( 1550- 1070 BC ) and some of them are located all over the country and in the Egyptian museum such as his mummy in the city of Cairo.
FINEWEB-EDU
OnCommand Storage Management Software Discussions Simulator can't locate network device (Fedora 16) Hi, I upgraded my workstation to Fedora 16 and since that move I've been unable to get the simulator to start.  It panics as follows: pf_packet_init: can't get IF flags: No such device PANIC: pfif can't initialize device version: NetApp Release 7.3.6: Thu Jul  7 00:41:19 PDT 2011 cc flags: L dumpcore: pfif can't initialize device This failure was probably caused by having your network interface down or an invalid interface. Re-run setup.sh and choose a different interface or fix the one you have chosen. In Fedora 16 the naming of ethernet interfaces has changed from "ethX" to "emX" - trying to add the correct interface (em1 in this case) during setup fails with: The network interfaces have been examined for use by the simulator: Choosing a DOWN interface will cause the simulator to crash. Either repair the interface(s) or choose the "default route" interface. Which network interface should the simulator use? [default]: em1 No interface em1 found. Choose a network interface that the simulator should use. The simulator is unable to attach to the default network interface.  I also tried attaching it to an alias interface, and a bridge interface, with similar results.  It seems something in the way Fedora 16 is presenting it's ethernet interface is causing the simulator to be unable to recognize it. Anyone tackle this yet? 2 REPLIES 2 Re: Simulator can't locate network device (Fedora 16) Anyone?  Bueller? Re: Simulator can't locate network device (Fedora 16) OK, I have a work-around in case anyone else tries to run the simulator on Fedora 15+.  There is a new naming scheme which is hardware location dependent.  This messes up software which is rigidly programmed to look for an "eth#" naming scheme.  The NetApp simulator is not alone in having this problem. You can turn this off an go back to the old scheme naming method by doing the following (I actually did all three): A) Update the name in the /etc/sysconfig/network-scripts/ifcfg-* file B) Disable biosdevname in the kernel command line C) Remove the biosdevname package See the information below for the steps: A) According to the documentation, you should have a file in /etc/sysconfig/network-scripts that is named "ifcfg-" and the name of your network device. To restore the name, you can rename this file to "ifcfg-eth0" and rename the device name from the current name to eth0 in the contents of the file. Once updated, restarting networking services or rebooting should enable the change. You can also write rules in /etc/udev/rules.d/70-persistent-net.rules to change the device names to anything you wish. Such will take precedence over this physical location naming scheme. Such rules may look like: SUBSYSTEM=="net", ACTION=="add", DRIVERS=="?*", ATTR{address}=="00:11:22:33:44:55", ATTR {type}=="1", KERNEL=="eth*", NAME="public" B) To disable this feature you can reboot the computer and bring up the kernel command line in the boot menu. From the kernel command line, you can run: biosdevname=0 To disable this feature. C) Lastly, if you don't want to use this feature, you can simply remove the package by running the following command in a terminal as root: yum remove biosdevname This removes the package and on reboot will restore the traditional naming scheme Forums
ESSENTIALAI-STEM
Author Archives: Yash - Page 5 Run PHP from HTML – .html as .php – Execute PHP in .html How can I execute PHP code on my existing myfile.html page?: When a web page is accessed, the server checks the extension to know how to handle the page. Generally speaking if it sees a .htm or .html file, it sends it right to the browser because it doesn’t have anything to process on the server. If it sees a .php extension (or .shtml, or .asp, etc), it knows that it needs to execute the appropriate code before passing it along to the browser. Read more » MySQL DETERMINISTIC, NO SQL, or READS SQL DATA solution /*ERROR HY000: This function has none of DETERMINISTIC, NO SQL, or READS SQL DATA in its declaration and binary logging is enabled (you *might* want to use the less safe log_bin_trust_function_creators variable)*/ Set this value using mysql console (mysql> SET GLOBAL log_bin_trust_function_creators = 1;) Jquery autocomplete with multiple data $("#Query").autocomplete({ source: [{ label: 'My First Item', value: '/items/1' }, { label: 'My Second Item', value: '/items/2'}] ,focus: function (event, ui) { $(event.target).val(ui.item.label); return false; } ,select: function (event, ui) { $(event.target).val(ui.item.label); window.location = ui.item.value; return false; } }); Read more » Get row height and Column width of QListView Row Height of QListView sizeHintForRow (int row); Column width of QListView sizeHintForColumn (int column) Set QIcon or say Icon in QListView Create a new model class based on QSqlQueryModel and implement data() method like below:   QVariant SqlQueryModel::data ( const QModelIndex & item, int role) const { if (role == Qt::DecorationRole) { switch(item.column()) { case 0: // column 0 contains text data QPixmap image; // column 1 contains BLOB data image.loadFromData(record(item.row()).value(1).toByteArray()); return image.scaled(160, 160, Qt::KeepAspectRatio, Qt::SmoothTransformation); }   if (value.isValid() && role == Qt::DisplayRole) { if (item.column() == 0) return value.toString().prepend("#"); else if (item.column() == 1) return value.toString().toUpper(); } if (role == Qt::TextColorRole && item.column() == 0) return qVariantFromValue(QColor(Qt::blue)); } return QSqlQueryModel::data(item, role); } Then connect it to QListView like this:   queryModel = new SqlQueryModel(this); queryModel->setQuery(query, sqlDatabase); QListView *pView = new QListView(ui.tab_2); pView->setViewMode(QListView::IconMode); pView->setModelColumn(0); pView->setModel(queryModel); Different Mouse Events in Qt bool MyQMainWindowEventFilter::eventFilter (QObject* o, QEvent* e) { // play with all mouse events if ((e->type() == QEvent::MouseButtonPress) || (e->type() == QEvent::MouseButtonRelease) || (e->type() == QEvent::MouseButtonDblClick) || (e->type() == QEvent::MouseMove)) { cout < < "mouse event" << endl; return false; }   return true; } //Mouse in and out events //Do this first setMouseTracking(true)   //now check QWidget::leaveEvent(QLeaveEvent *) QWidget::enterEvent(QLeaveEvent *) Get objectname of event sender in Qt What would be object name which sends event ? Use QObject::sender() to get the sending object. void myslot() { QObject* pObject = sender(); QString name = pObject-&gt;objectName(); } A Crash-Course in CSS Media Queries Method 1: Within your Stylesheet @media screen and (min-width : 1200px) { /* let's do somethin' */ } Method 2: Import from within your Stylesheet @import url( small.css ) screen and ( min-width: 1200px ); Note that you can also add addition rules, by applying a comma — much like you would when using multiple selectors. Method 3: Link to a Stylesheet <link rel="stylesheet" media="screen and (min-width: 1200px)" href="small.css" /> Method 4: Targeting the iPhone <ink rel="stylesheet" media="only screen and (max-device-width: 480px)" href="mobile.css" /> An interesting note, after a bit of research around the web, is that, despite the fact that iPhone 4 sports a resolution of 640×960, it still we pick up mobile.css, referenced in the code above. How strange? If you have more information on this, please leave a comment for the rest of us! Browsers that Support CSS Media Queries Firefox 3.5+ Opera 9.5+ Safari 3+ Chrome Internet Explorer 9+ Please note that Internet Explorer 8 and below do not support CSS media queries. In those cases, you should use a JavaScript fallback. Best design scripts, tools and websites collection Compass is a stylesheet authoring framework that makes your stylesheets and markup easier to build and maintain. With compass, you write your stylesheets in Sass instead of CSS. Using the power of Sass Mixins and the Compass community, you can apply battle-tested styles from frameworks like Blueprint to your stylesheets instead of your markup. compass Sass makes CSS fun again. Sass is an extension of CSS3, adding nested rules, variables, mixins, selector inheritance, and more. It’s translated to well-formatted, standard CSS using the command line tool or a web-framework plugin. sass The dynamic stylesheet language. LESS extends CSS with dynamic behavior such as variables, mixins, operations and functions. LESS runs on both the client-side (IE 6+, Webkit, Firefox) and server-side, with Node.js. lesscss Modernizr adds classes to the element which allow you to target specific browser functionality in your stylesheet. You don’t actually need to write any Javascript to use it. modernizr CSS3 selectors for IE selectivizr is a JavaScript utility that emulates CSS3 pseudo-classes and attribute selectors in Internet Explorer 6-8. Simply include the script in your pages and selectivizr will do the rest. selectivizr A Javascript CSS3 Selector and Matcher not using XPath standard compliance to published specs ensure result sets are “document ordered” CSS3 support (including “of-type” pseudos) correct resolution of case-sensitivity in attributes singleton, no dependencies, few JS1.2 native functions no XPath used just loops and one getElementsByTagName not extending anything, not adding to objects or arrays minified code 18Kbytes, only 6Kbytes if served compressed multi-frame/multi-document aware, fully cross-browser compatible NWMatcher Getting Offline Access with HTML5 Application Cache using Htaccess Just when you thought you’d seen all the cool features of HTML5, I’m here to bring you yet another one. The internet is no longer about just websites; it’s about web applications. Often, our users are on portable or mobile devices, and they won’t always have access to a network. With HTML5’s Application Cache, you can provide them with all or some of the functionality they would have online, no matter where they go. Step 1: Make the Cache Manifest The trick here is using a cache manifest file. In its most basic form, it’s incredibly simple:   CACHE MANIFEST   # version 0.1   index.html style.css script.js preview.jpg Step 2: Serve the Manifest Correctly This file needs to be served with a content-type header of text/cache-manifest.it’s really simple to do this with a .htaccess file: AddType text/cache-manifest manifest This will serve all files with an extention of “manifest” with the appropriate content-type header. Step 3: Hook the Manifest In To use the cache manifest file, you simply add a property to the html element: <!DOCTYPE html> <html lang="en" manifest="site.manifest"> <meta charset='utf-8'> Now, the next time a user visits your site / app, their browser will cache the required files. It’s that easy. If they browse to your URL when they’re offline, they’ll get the cached content. Caveat: Refreshing the Cache It’s important to note that even when the user is online, the browser will only go to the server to get new content in three cases: The user clears their cache (obviously removing your content). The manifest file changes. The cache is updated via JavaScript So, to force all your users to reload their cache, you can change something in the manifest file (not the files linked to, the actual content of the manifest file). Most of the time, you’ll probably just want to change a comment, and that will be enough. If you want, build cache updating into your app via the JavaScript API; that’s beyond the scope of this quick tip, but if you want to learn more, check out this article at html5rocks.com. Browser Support Like a lot of other HTML5 features, the Application Cache is supported by all the modern browsers. Chart from www.findmebyip.com And that’s HTML5′s Application Cache; it’s pretty cool, and I’m sure it will be used by developers, of almost any site, to provide a gracefully degrading experience that keeps their users happy wherever they are. Thanks for reading! Page 5 of 9« First...34567...Last »
ESSENTIALAI-STEM
Kevin Gall Kevin Alexander Gall (born 4 February 1982) is a Welsh former footballer who played as a winger and striker, scoring 49 goals in 352 league and cup appearances in a 12-year career. He also represented Wales at under-21 level. Gall, a former Welsh under-21 international, started his career with Newcastle United before signing for Bristol Rovers. After 50 league games for Rovers, he moved to Yeovil Town in 2003. He spent three years at Yeovil before joining Carlisle United in 2006. He had loan spells at Darlington, Lincoln City, and Port Vale before joining Darlington permanently in 2009. He then had one-year spells at York City and Wrexham before a brief spell in the US with FC Dallas. He returned to England to play for Workington in September 2011 before moving on to Guiseley the following month. He joined Stockport Sports in December 2012. Club career Born in Merthyr Tydfil, Gall played for Cardiff City as a trainee before signing for Newcastle United in 1997, who had to pay Cardiff £150,000 in compensation. He formed a strike partnership with Shola Ameobi in the youth team. With limited opportunities at Newcastle, he attended a trial at Lilleshall, where he was offered a contract by Bristol Rovers. He signed on a short-term contract, before making the deal permanent in March 2001. He played at Rovers for two seasons. He moved on to Yeovil Town in 2003, where he played in midfield, as opposed to his usual role as a striker. In an FA Cup match against Charlton Athletic, Gall ran half the pitch to set up a goal for Paul Terry. Even though Yeovil lost that match 3–2, Gall received the Performance of the Round Award the following week. Gall was released by Yeovil in May 2006, before signing for Carlisle United on a two-year contract in June. He scored his first league goal against his former club Yeovil. On 28 January 2008, he joined League Two side Darlington on a one-month loan. His loan was extended for a second month in February, and in March, he stated he was interested in signing permanently. In March, Gall had a trial with Major League Soccer club Toronto FC, but he rejected their offer after failing to agree terms. On 28 July, Gall joined Lincoln City on a five-month loan deal, but failed to score in his time at Sincil Bank and returned to Carlisle at the start of 2009. On 24 February, he was loaned out to Port Vale, and manager Dean Glover hoped Gall's pace and tenacity would help resurrect some of Vale's season. Despite not scoring in his seven games, Glover was keen to extend Gall's loan, however, a calf injury ruled out this option for the cash strapped club. Carlisle released him at the end of the 2008–09 season and he had a trial with former club Yeovil in July. During the week before Darlington's game against his former club, Port Vale, on 22 August, it was announced that the club had signed Gall on a free transfer. He left the bottom placed club in October 2009, having scored twice in 12 games. Gall signed for Conference Premier team York City on a contract until January 2010 on 10 November, making his debut as a 70th minute substitute in a 3–2 victory over Chester City. He scored his first goal in a 4–1 victory over Hayes & Yeading United in January 2010 after entering the game as a 60th-minute substitute. He later extended his contract until the end of the 2009–10 season. He finished the season with nine appearances and one goal for York, and the club announced that he would be released when his contract expired on 30 June. He agreed to sign for Conference Premier team Wrexham on 1 July, and he made his debut as a 90th-minute substitute in a 1–0 victory over Cambridge United on 14 August. His first start for the club came in a 2–0 victory at Bath City on 30 August. However, manager Dean Saunders changed the playing system, leaving Gall in the reserves. He, therefore, agreed to have his contract cancelled in January 2011. In March 2011, Gall flew to the United States and signed a short deal with FC Dallas, but returned to Britain after he was denied a visa. He joined Workington in September 2011 in what was described as a "major transfer coup" for manager Darren Edmondson, making his debut as a substitute in the club's 3–0 Conference North defeat to Hyde at Borough Park on 10 September. After just four games and 314 minutes on the pitch for the "Reds", Gall signed a contract with league rivals Guiseley the following month. His stay with the "Lions" was also brief, and he left the club after just five league appearances. On 28 December 2012, he signed for Stockport Sports, debuting the following day in a 2–0 home North West Counties League victory over Congleton Town. International career Gall is a former Wales schoolboy, youth and under-21 international. He was called into the under-21 team for the game against Norway in September 2001, and a training camp in April 2002. He made his under-21 debut in November, scoring against Azerbaijan in a 1–0 victory, which was the team's first victory in 26 games. Style of play Gall played as a striker, although he was versatile and could also play as a winger. Personal and later life Gall is a devout Christian and, from January 2010 onwards, underwent 40 hours of tattooing to cover both his arms with religious and other symbols, including Jesus, a Bible and the Virgin Mary. He went on to work as a football consultant at agency firm Sports Management International, spotting talent from the Manchester area, Wales and the North East. Gall is also a director of Optima Sport, which brings academy football teams from across the world to compete against academies in the UK. Career statistics * A. The "League" column constitutes appearances and goals (including those as a substitute) in the English Football League and Conference. * B. The "Other" column constitutes appearances and goals (including those as a substitute) in the Football League Trophy and FA Trophy. * C. Statistics for FC Dallas, Workington, and Stockport Sports unavailable. Honours Yeovil Town * Conference: 2002–03 * League Two: 2004–05 Individual * Football Conference Goalscorer of the Month: April 2003
WIKI
Ex-ethics chief: Melania Trump's visit to migrant shelter a 'flim flam con job' | TheHill Former federal ethics chief Walter ShaubWalter Michael ShaubEx-ethics chief rips Trump July 4 event as 'taxpayer-funded campaign ad' Here are the top paid White House staffers The Hill's Morning Report - Trump touts handshake with Kim, tariff freeze with Xi MORE blasted first lady Melania TrumpMelania TrumpEx-Melania Trump adviser raised concerns of excessive inauguration spending weeks before events: CNN The Hill's Morning Report - Trump moves green cards, citizenship away from poor, low-skilled White House seeks volunteers, musicians for Christmas celebrations MORE's trip to the border on Thursday, calling her tour of a facility used to house migrant children "a load of crap." "This photo op press conference is a load of crap! This is the biggest flim flam con job! Shame on everyone involved!" Shaub tweeted. "No talk about how they're going to return kids whose parents have been deported. No explanation of how identities are recorded and their parents are tracked," he added. THIS PHOTO OP PRESS CONFERENCE IS A LOAD OF CRAP!THIS IS THE BIGGEST FLIM FLAM CON JOB! SHAME ON EVERYONE INVOLVED!NO TALK ABOUT HOW THEY'RE GOING TO RETURN KIDS WHOSE PARENTS HAVE BEEN DEPORTED. NO EXPLANATION OF HOW IDENTITIES ARE RECORDED AND THEIR PARENTS ARE TRACKED. Shaub issued several more tweets slamming the first lady's visit to the facility, accusing staff of offering deceptive answers and calling Melania Trump's visit "pure propaganda."  This is pure propaganda. They hope schmaltz is the opiate of the masses. The first lady made the surprise trip to Texas on Thursday, one day after her husband signed an executive order halting family separations at the border. Melania Trump had previously expressed concerns with the policy. She was scheduled to visit two facilities while in Texas. The first is a social services center in McAllen, while the other is a customs and border processing center, her office said.  When she arrived at the McAllen facility, the first lady sat in what appeared to be a classroom and spoke with staff members. "We all know they’re here without their families and I want to thank you for your hard work, your compassion and your kindness you’re giving them in this difficult time," she said. "I’d also like to ask you how I can help these children to reunite with their families as quickly as possible." She later asked how long children typically stay in the facility and what kind of activities they do. "This is their home," one of the staffers told her. "They refer to these as shelters, but it is really a home for the children." View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Speeding Up IDE Boot-Up Even when an A4000 is configured without one, the system will still look for an IDE hard drive on power-up or reset. To allow IDE drives time to spin up, there is a long search built into the 3.0 ROMs, and an even longer one in the 3.1 ROMs (about 30 seconds). A BattMem bit to disable the extra delay with 3.1 ROMs has been reported and finally confirmed, but it enables or disables an additional eight seconds of the wait, and defaults to off. With software, it is possible to remove the delay between resets, but not on power-up (Matthew Frost's "NoIDE" program is available from the disk/misc directory of Aminet). The only currently-known way to completely disable this delay is by obtaining a small piece of hardware (the circuit is courtesy of Sean Riddle; the instructions are mine, so errors are entirely my fault). With this "IDE ignorer," the search for IDE drives is skipped altogether.  You can follow the instructions here to build one, or buy a prebuilt version from Redmond Cable (part number is "40socket-term"). Parts Required two 4.7K resistors 40-pin crimp-on IDC connector male-to-male 40-pin header (see below) Procedure: The two resistors are connected between pin 39 and pin 3, and pin 39 and pin 5 (the effect is to tie IDE data bits 7 and 6 high). Rather than using a piece of whole 40-conductor ribbon cable, I stripped short pieces of individual conductors from one and used fine needle-nose pliers to press these wires into the contacts for pins 3, 5, and 39. Then the crimp-on cover was clipped on top of these. Since the relevant pins are at either end of the connector, I ran the resistors flat along the side of the connector, using heat-shrink tubing and tape to insulate the leads. The only 40-pin male-to-male header I had didn't have pins long enough to make contact with both connectors, so I just cut three pins off a wire-wrap socket and stuck them in the connectors at pin locations 3, 5, and 39. Physically, this seems to be strong enough to hold the two connectors together.    _______________________________   |-----------####----------------|  <--two 4.7K resistors on side   |---------------####------------|     of 40-pin IDC connector   \_______________________________/    |||||||||||||||||||||||||||||||    ===============================   <--40-pin male-to-male header    |||||||||||||||||||||||||||||||    _______________________________   /                               \   |                               |  <--A4000 IDE cable connector   |_______________________________| [Main]
ESSENTIALAI-STEM
Local Installation This guide walks you through the steps to install Pachyderm on macOS®, Linux®, or Microsoft® Windows®. Local installation helps you to learn some of the Pachyderm basics and is not designed to be a production environment. Note Pachyderm supports the Docker runtime only. If you want to deploy Pachyderm on a system that uses another container runtime, ask for advice in our Slack channel. Prerequisites Before you can deploy Pachyderm, make sure you have the following programs installed on your computer: If you want to install Pachyderm on Windows, follow the instructions in Deploy Pachyderm on Windows. Using Minikube On your local machine, you can run Pachyderm in a minikube virtual machine. Minikube is a tool that creates a single-node Kubernetes cluster. This limited installation is sufficient to try basic Pachyderm functionality and complete the Beginner Tutorial. To configure Minikube, follow these steps: 1. Install minikube and VirtualBox in your operating system as described in the Kubernetes documentation. 2. Install kubectl. 3. Start minikube: minikube start Note Any time you want to stop and restart Pachyderm, run minikube delete and minikube start. Minikube is not meant to be a production environment and does not handle being restarted well without a full wipe. Docker Desktop If you are using Minikube, skip this section and proceed to Install pachctl You can use Docker Desktop instead of Minikube on macOS or Linux by following these steps: 1. In the Docker Desktop settings, verify that Kubernetes is enabled: Docker Desktop Enable K8s 2. From the command prompt, confirm that Kubernetes is running: kubectl get all NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE service/kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 56d • To reset your Kubernetes cluster that runs on Docker Desktop, click the Reset button in the Preferences sub-menu. Reset K8s Install pachctl pachctl is a command-line utility that you can use to interact with a Pachyderm cluster. To deploy Pachyderm locally, you need to have pachctl installed on your machine by following these steps: 1. Run the corresponding steps for your operating system: • For macOS, run: brew tap pachyderm/tap && brew install pachyderm/tap/pachctl@1.10 • For a Debian-based Linux 64-bit or Windows 10 or later running on WSL: curl -o /tmp/pachctl.deb -L https://github.com/pachyderm/pachyderm/releases/download/v1.10.0/pachctl_1.10.0_amd64.deb && sudo dpkg -i /tmp/pachctl.deb • For all other Linux flavors: curl -o /tmp/pachctl.tar.gz -L https://github.com/pachyderm/pachyderm/releases/download/v1.10.0/pachctl_1.10.0_linux_amd64.tar.gz && tar -xvf /tmp/pachctl.tar.gz -C /tmp && sudo cp /tmp/pachctl_1.10.0_linux_amd64/pachctl /usr/local/bin 2. Verify that installation was successful by running pachctl version --client-only: pachctl version --client-only System Response: COMPONENT VERSION pachctl 1.9.8 If you run pachctl version without --client-only, the command times out. This is expected behavior because pachd is not yet running. Deploy Pachyderm After you configure all the Prerequisites, deploy Pachyderm by following these steps: Tip If you are new to Pachyderm, try Pachyderm Shell. This handy tool suggests you pachctl commands as you type and helps you learn Pachyderm faster. • For macOS or Linux, run: pachctl deploy local This command generates a Pachyderm manifest and deploys Pachyderm on Kubernetes. • For Windows: 1. Start WSL. 2. In WSL, run: pachctl deploy local --dry-run > pachyderm.json 3. Copy the pachyderm.json file into your Pachyderm directory. 4. From the same directory, run: kubectl create -f .\pachyderm.json Because Pachyderm needs to pull the Pachyderm Docker image from DockerHub, it might take a few minutes for the Pachyderm pods status to change to Running. 1. Check the status of the Pachyderm pods by periodically running kubectl get pods. When Pachyderm is ready for use, all Pachyderm pods must be in the Running status. kubectl get pods System Response: NAME READY STATUS RESTARTS AGE dash-6c9dc97d9c-vb972 2/2 Running 0 6m etcd-7dbb489f44-9v5jj 1/1 Running 0 6m pachd-6c878bbc4c-f2h2c 1/1 Running 0 6m If you see a few restarts on the pachd nodes, that means that Kubernetes tried to bring up those pods before etcd was ready. Therefore, Kubernetes restarted those pods. You can safely ignore that message. 2. Run pachctl version to verify that pachd has been deployed. pachctl version System Response: COMPONENT VERSION pachctl 1.9.5 pachd 1.9.5 3. Open a new terminal window. 4. Use port forwarding to access the Pachyderm dashboard. pachctl port-forward This command runs continuosly and does not exit unless you interrupt it. 5. Alternatively, you can set up Pachyderm to directly connect to the Minikube instance: 1. Get your Minikube IP address: minikube ip 2. Configure Pachyderm to connect directly to the Minikube instance: pachctl config update context `pachctl config get active-context` --pachd-address=`minikube ip`:30650 Next Steps After you install and configure Pachyderm, continue exploring Pachyderm: • Complete the Beginner Tutorial to learn the basics of Pachyderm, such as adding data and building analysis pipelines. • Explore the Pachyderm Dashboard. By default, Pachyderm deploys the Pachyderm Enterprise dashboard. You can use a FREE trial token to experiment with the dashboard. Point your browser to port 30080 on your minikube IP. Alternatively, if you cannot connect directly, enable port forwarding by running pachctl port-forward, and then point your browser to localhost:30080. - Last updated: March 16, 2020 -
ESSENTIALAI-STEM
AWS – Creating serverless functions with AWS Lambda How to Configure Network Static IP Address on Ubuntu 19.10 AWS Lambda is quickly becoming an indispensable resource for building systems in the cloud. It fits in nicely for several utility use cases, such as running code each time an object is dropped into an S3 bucket, but it can also be used to construct entire applications. Lambda lends itself well to the microservices mentality, which is an important piece of the DevOps puzzle. A microservice is a small, fully independent component of an application. Microservices generally have a dedicated code repository and a dedicated data store so that they can be deployed in isolation from any other related services. By decomposing your architecture down to the individual function level, you can maximize your compute resources by configuring, deploying, and scaling each function separately. How to do it… Follow these steps to create a simple AWS Lambda function that processes messages from an Amazon Simple Queue Service (SQS) queue. The ability to automatically process all the messages in a queue with a Lambda function is an incredibly valuable feature that was announced by AWS in 2018. Anyone who has written code to poll a queue for messages knows that it can be surprisingly hard to do correctly, especially at scale with distributed systems. Adding this tool to your belt will allow you to tackle a wide variety of architectural challenges: 1. Go to the SQS dashboard and create a new queue. Name the queue MySampleQ, choose Standard Queue, and click Quick-Create Queue. 2. Go to the AWS Lambda dashboard and click Create function. 3. Choose Author from scratch and name the function MyQReader.   1. Choose Node.js 8.10 as the runtime and click Create function. 2. Scroll down to the function code and paste in the following: exports.handler = async (event) => { // Log the entire event console.info('event', JSON.stringify(event)) let numRecordsProcessed = 0 event.Records.forEach(record => { // Process the message from SQS here console.log(record.body); numRecordsProcessed++ }); const response = { statusCode: 200, body: JSON.stringify(`${numRecordsProcessed} messages handled!`), }; return response; }; 1. Your Lambda function needs additional privileges to interact with SQS. Scroll down to the execution role and click the role name to view it in the IAM console. 2. Expand the policy and click Edit policy. 3. Click the JSON tab and add the following policy statement to the array of statements that are already present in the policy. Note that the best practice is to replace the asterisk (*) in the Resource property with the actual ARN of your SQS queue: { "Effect": "Allow", "Action": [ "sqs:ReceiveMessage", "sqs:DeleteMessage", "sqs:GetQueueAttributes" ], "Resource": "*" } 1. Go back to your browser tab with the Lambda function. 2. Scroll down to  Designer and select SQS from the event sources. 3. Select MySampleQ from the dropdown under Configure triggers: Configuring triggers 1. Click Add and then Save the function. 2. Open a new tab (leaving the Lambda tab open) and go to the SQS dashboard.    1. Select MySampleQ and, from the Queue Actions dropdown, select Send a Message: Sending a message 1. Type some text into the box and click Send M essage. 2. Go back to the Lambda function and click the Monitoring tab. Click View logs in CloudWatch.   1. On the CloudWatch page, click the latest log stream and check out the log messages that have been sent from your Lambda function to confirm that the message was successfully processed: CloudWatch logs being sent from the Lambda function 1. Delete the Lambda function and the SQS queue to avoid future charges. Delegating work to a queue can drastically improve the perceived performance of your web applications, and there is no easier way to accomplish queue processing than to wire up a Lambda function to SQS. Using a queue also helps you decompose your application into decoupled, separately deployable components, which reduces risks when you’re making future changes. How it works… Lambda functions run in containers that are fully managed by AWS. All of the implementation details are hidden from you, and, in most cases, you don’t need to know how or where your function runs. Of course, a little bit of knowledge of what’s going on behind the scenes can help in some situations. For example, it’s important to understand the penalty you pay when your function is run for the first time. This is called a cold start, and it can add a significant amount of latency if there are no ready resources that have already been provisioned to run your function. For a busy application, this is often not a problem, since frequent function invocations guarantee that for most requests, your function will be warm. There are certain steps you can take to optimize your functions with cold starts in mind, such as increasing the configured memory size and making sure that you create resources such as database connection pools outside of your function code so that you don’t pay the cold startup price every time your function runs. There’s more… While it’s possible to create and edit Lambda functions solely within the Lambda dashboard, it is highly recommended that you use a system such as the AWS Serverless Application Model (SAM) to structure your applications. Use SAM in combination with a version control system such as AWS CodeCommit so that you can maintain a revision history and share your code with colleagues. SAM templates are a superset of AWS CloudFormation and use abbreviated commands that make creating Lambda functions much easier. The following screenshot shows an example SAM template that was created using AWS Cloud 9, an excellent web-based Integrated Development Environment (IDE) that you can run from your own account: Cloud9 and the Serverless Application Model SAM templates make it easier to create Lambda functions with Infrastructure as Code (IaC), and they should be your default way of allowing your development teams to create serverless microservices. See also • Check out AWS CodeStar, a service that allows you to create a complete microservice or website, along with a code repository, development environment, and CI/CD pipeline, all in a single command that takes just a few minutes to run: https://aws.amazon.com/codestar/ Comments are closed.
ESSENTIALAI-STEM
Which will Vitamins Regarding Erectile Problem Truly Function? Many males these days experience erectile dysfunction because of their way of life or at times a disease that they have. This is the purpose why natural vitamins for erectile dysfunction are rising in popularity. But ahead of we examine that, let’s go over 1st the which means of erectile dysfunction. Erectile dysfunction can be described as not being able to have or maintain erection. A lot of factors are attributed to this malfunction this sort of as harmful way of life like using tobacco or diseases between outdated people. Normally, https://www.americanmalewellness.com/ -aged individual encounter erectile dysfunction. These men are in search of nutritional vitamins for erectile dysfunction. However, because of rising calls for of this sort of natural vitamins, many opportunists take gain of this and market place or sell bogus nutritional vitamins that they claim have constructive results on impotence. Below are some illustrations of nutritional vitamins that were stated to have optimistic consequences on erectile dysfunction. DHEA or dehydroepiandrosterone is explained to be successful when it comes to combating impotence. Males who are having issues with erection typically have lower blood ranges of this hormone. An experiment was carried out amongst 40 men who have reduced DHEA degree. Half of them were given 50mg of DHEA and the other 50 percent was presented placebos. The outcomes verified that this vitamin for erectile dysfunction will help. Even so, there are still debates about the safety of utilizing this vitamin, so be mindful and be educated prior to you take in this vitamin. An additional vitamin for erectile dysfunction is arginine. Arginine is an amino acid that has an effect on the generation of nitric oxide. Nitric oxide is necessary for men with erectile dysfunction problem. It widens blood vessels so that blood can movement simply, hence, creating an erection. There was also an experiment executed to examination gentlemen with erectile dysfunction. In the 1st trial which lasted for two months, 15 guys took in 2800 mg of arginine in a day. Nevertheless, only six of them experienced enhancement in their erection. In the 2nd demo which has bigger sample and which lasted for 6 months, participants had to just take in 1670 mg of arginine every working day. The results revealed that if men have abnormal fat burning capacity of nitric oxide, this vitamin for erectile dysfunction will have a more positive influence than if the guys have typical metabolism of nitric oxide. On the a single hand, there is not nevertheless an set up info about the level or diploma of performance of arginine. But on the other hand, there are numerous researches that say that arginine will most very likely support gentlemen with erectile dysfunction. Combining one particular kind of L-carnitine, propionyl-L-carnitine, and acetyl-L-carnitine is the yet another vitamin for erectile dysfunction. This assists more mature folks who have erectile dysfunction associated to reduced degree of testosterone. The volume of these nutritional vitamins that a single ought to take in is two g for each and every vitamin. These two vitamins have much more constructive benefits when it comes to rising testosterone level than prescription drugs for minimal level of testosterone. The last example of vitamins for erectile dysfunction that may possibly actually help is Pycnogenol, a material discovered in Pinus pinaster, a sort of tree. If presented 120 mg each and every day, this may well just improve your sexual intercourse with your associate. One should not be afraid or ashamed of having erectile dysfunction simply because presently, individuals have several possibilities that can help them beat or defeat erectile dysfunction. Leave a Reply Your email address will not be published.
ESSENTIALAI-STEM
Page:United States Statutes at Large Volume 34 Part 2.djvu/561 FIFTY-NINTH CONGRESS. Sess. I. Cns. 217o~21T—i. 1906. 1879 laws, the name of Clara N. Scranton, widow of WVilliam N. Scranton, late of Company B, Fifth Regiment Connecticut Volunteer Infantry, and pay her a pension at the rate of eight dollars per month. Approved, May 7, 1906. CHAP. 2171.——An Act Granting a pension to Dora C. Walter. §l{,&yR7.9{g<;6, Be it enacted by the Senate and House cflfepresentatyues of the Mztted —fi>nK`$. 2023.1 States QfrlllZL’T?.L‘(l in Congress assembled, That the Secretary of the Dom C_Ws,,s,_ Interior be, and he is hereby, authorized and directed to place on the Pensionpension roll, subject to the provisions and limitations of the pension laws, the name of Dora C. Walter, widow of George F. Walter, late of Companies C and D, Fifty-lifth Regiment, Company K, Thirty- · eighth Regiment, and Company H, Fortieth Regiment, New York Volunteer Infantry, and pay her a pension at the rate of eight dollars per month. Approved, May 7, 1906. CHAP. 2172.-An Act Granting an increase of pension to Thomas C, Jackson. ?*,g¤YR7,g5$;066, _ Be it enacted ln; the Senate and House OfR@7'68€hbdZtU68 afthe United lPriv¤t<>. No-2024J States of America in (gbngress assembled, That the Secretary of the Thomas C_ Jackson Interior be, and he is hereby, authorized and directed to place on the P¤¤¤i<>¤i¤cr¤¤·¤¢T=’®$T States cfAmw·ica in Cbozyrew assemble:/, That the Secretary of the M,,.,.,,,,_ Ms,,,,,,, Interior be, and he is hereby, authorized and directed to place on the i’°¤*·l*>¤ i¤¤·‘*€¤*<*<*· pension roll, subject to the provisions and limitations of the pension aws, the name of Alfred B. Menard, late of Company D, First Regi— ment Texas Volunteer Rides, war with Mexico, and pay him a pension at the rate of twenty dollars per month in lieu of that he is now receiving. Approved, May 7. 1906. CHAP. 2174.——An Act Granting an increase of pension to John B. Page. g,¤YR7-9236, Be it enacted by the Senate and House of R?n·e4·¢en.tatZaes of the Lbtited {Private. Ne Mel States cfrlnzerlca in Lbn;g7·e#·~r assembled,hat the Secretary of the ,0,,,, B_,,sgs_ Interior be, and he is hereby, authorized and directed to place on the P¤¤¤i<>¤i¤¤r¤¤—=¢d· pension roll, subject to the provisions and limitations of the pension laws, the name of John B. Page, late of Company K, Fifth Regiment Kentucky Volunteer Cavalry, and pay him a pension at the rate of twenty-four dollars per month in lieu of that he is now receiving. Approved, May 7, 1906.
WIKI
Multithreaded Fortran Subroutine Guidelines? Multithreaded Fortran Subroutine Guidelines? Hi all, I have a main program, written in C, that utilizes a threadpool of 12 threads (using pthreads)to perform parallel processing of some science data. Our group has a legacy Fortran subroutine that we need to call from each of thread to do the actual processing on a subset of the data. What are some basic guidelines for converting this Fortran subroutine so that it is thread safe? I'm getting run-time errors in the Fortran code (forrtl severe 29). The subroutine reads/writes to several thread-specific files and allocates/deallocates memory structures. I'm fluent in C/C++ but a novice in Fortran. It seems as though the Fortran subroutine is not creating thread-specific local memory or io units? I'm usingifortv11.1 to compile the Fortran code and gcc v4.1.2 to compile and link the program in Linux. Thanks, Phil Losie Raytheon Co. 6 posts / 0 new Last post For more complete information about compiler optimizations, see our Optimization Notice. correct, IO units are a process-wide shared table. So each thread will need a unique IO unit. You'll need to coordinate the threads so they don't reuse the same unit number. And like in C, if you have unique file pointers BUT they point to the same file, you'll have to synchronize or coordinate the accesses. Unique IO units to unique files. I've always used an array of unit numbers indexed by the thread logical number ( base 1 for Fortran ). Avoid the -SAVE compiler option and SAVE attribute. Avoid COMMON blocks. Avoid writing to variables in MODULEs : all of these are shared Do not use the -heap-arrays compiler option local variables declared within the subroutines/functions will be thread-local as long as you don't see SAVE or compile with -save. ron Ron, thanks for the quick reply! Are there any compiler options like -threadsthatare necessary for safemultithreaded code? Phil Also, Declare the functions and subroutines with the prefix RECURSIVE. RECURSIVESUBROUTINE FOO(... RECURSIVE INTEGER FUNCTION FEE(... The default for function/subroutine declared "local" arrays are SAVE. RECURSIVE defaults "local" arrays to stack. (In this case RECURSIVE means REENTRANT - FORTRAN does not have a REENTRANT function/subroutine attribute.) Jim Dempsey As Jim said, RECURSIVE declaration assures that local arrays and variables are on stack, consistent with threading. Without that declaration, you would depend on setting -auto, or other options which imply it, including -openmp or -reentrant. Yes, there is an ifort option -reentrant, although it's not a Fortran declaration. With such options set, you must take care to avoid uninitialized variables (which in any case aren't compatible with threading). WARNING: Local variables that are initialized within the declaration e.g. INTEGER :: number = 999 are implicitly persistent, justas with the SAVE attribute, and thus NOT thread safe. This construct is only thread safe when used in derived type declarations. Leave a Comment Please sign in to add a comment. Not a member? Join today
ESSENTIALAI-STEM
appmetrics-dash: Detailed Overview & Metrics v5.3.0(over 4 years ago) This package was last published over a year ago. It may not be actively maintained.The package doesn't have any types definitionsNumber of direct dependencies: 5Monthly npm downloads appmetrics-dash is a Node.js module that provides monitoring and visualization capabilities for Node.js applications. It offers real-time insights into the performance and behavior of Node.js applications through a dashboard interface. With appmetrics-dash, developers can track key metrics such as CPU usage, memory consumption, event loop delays, and garbage collection statistics. Compared to other monitoring solutions, appmetrics-dash is specifically tailored for Node.js applications, offering deep insights into the runtime behavior of Node.js processes. It provides a user-friendly interface for monitoring and troubleshooting Node.js applications in production environments. Alternatives: express-status-monitor+ pm2+ nodejs-dashboard+ autocannon+ clinic+ 0x+ easy-monitor+ v8-profiler-next+ heapdump+ swagger-stats+ Tags: node.jsmonitoringvisualizationperformancedashboard
ESSENTIALAI-STEM
Talk:List of Teenage Mutant Ninja Turtles (2012 TV series) episodes TBAs * A few weeks back, Koala15 and went back and forth about TBAs, so I asked about TBAs at Wikipedia talk:Manual of Style/Television. Another experienced editor made a good point that blank spaces imply TBA, and are better for readers with limited vision. The alternative the editor proposed was to create the table rows, but comment them out until the information arrived. I thought that was a reasonable and useful suggestion, as did Koala 15. On that basis, I've again removed the TBAs and commented out the incomplete episodes. Cyphoidbomb (talk) 14:04, 31 May 2013 (UTC) Edit request on 14 June 2013 All I need to do is add a note to the episode "The Gauntlet" Conar555 (talk) 19:06, 14 June 2013 (UTC) * Red question icon with gradient background.svg Not done: please be more specific about what needs to be changed. - — Preceding unsigned comment added by Cyphoidbomb (talk • contribs) Remaining Season 1 Episodes Is it known, when the remaining 4 episodes of season 1 will air? — Preceding unsigned comment added by <IP_ADDRESS> (talk) 15:57, 23 June 2013 (UTC) * Nickelodeon's programming SVP probably knows, if you want to ask her/him. If Wikipedians could source it reliably, the information would likely be in the episode table, even though Wikipedia is not TV Guide. Booyaka-Showdown The final S1 episode titles do not belong on Wikipedia until we have a reliable source to support the additions, per WP:CRYSTAL (and a number of other policies). Wikipedia is not TV Guide, nor does it endeavor to be. There is absolutely no rush to add this information this far in advance if there is no reliable source. Most of the sites asserting that this is the title are fan-contributed sites like Wikia, which does not qualify as a reliable source. Nick.com hosts a promo entitled "Booyakasha Showdown", but 1) that's not "Booyaka-Showdown" and 2) using a promo title as the de facto name of the episode, is pure speculation. Without a source, it gets cut. Cyphoidbomb (talk) 18:36, 24 July 2013 (UTC) * UPDATE: Just noticed that another editor provided a reliable source for "Showdown", at Zap2It. Cyphoidbomb (talk) 18:41, 24 July 2013 (UTC) It's is called "the showdown"part 1 and part 2not booyakasha-showdown Muddystripe (talk) 01:57, 1 May 2017 (UTC) Semi-protected edit request on 13 March 2014 Alaric1234567 (talk) 23:07, 13 March 2014 (UTC) i want it to open because the ninja turtles have a episode that is not on your page and that episode is called Mazes & Mutants * Red question icon with gradient background.svg Not done: it's not clear what changes you want made. Please mention the specific changes in a "change X to Y" format. Jackmcbarn (talk) 23:15, 13 March 2014 (UTC) * And, please provide a reliable source if it is an episode that hasn't aired yet. See WP:CRYSTAL Cyphoidbomb (talk) 23:18, 13 March 2014 (UTC) Semi-protected edit request on 21 March 2014 Correct the title of the most recent episode from "Wormquake!" to "The Manhattan Project". The latter is what is shown on-screen.George Fergus (talk) 04:43, 22 March 2014 (UTC) * Hi, shown on screen where? In the US or elsewhere? The series occasionally uses different titles depending on where the series is shown. Cyphoidbomb (talk) 15:25, 22 March 2014 (UTC) * In answer to your question it was aired in the U.S.A. with the title of "The Manhattan Project" as a one hour episode on March 14, 2014. It was just recently repeated in the U.S.A. on May 26, 2014, as a two part episode also entitled "The Manhattan Project". I will repeat for the 1000th time, there is not, has never been, and never will be an episode titled Wormquake. Wormquake was never anything but an advertizing gimmick that apparently hypnotized the entire world. Aragorn8354 (talk) 04:02, 27 May 2014 (UTC) * As shown on Nickelodeon HD in the U.S. There is a copy of this version available online as Teenage.Mutant.Ninja.Turtles.2012.S02E13E14.Wormquake.480p.HDTV.x264-mSD.mkv. This is also the title given at toonzone, a very reliable source. George Fergus (talk) 12:09, 23 March 2014 (UTC) One of those FYI's if you care: This Ep was billed as "Wormquake" but When shown in the USA on Nick the on screen title is "The Manhattan Project". I recorded it for later viewing And it has the Project title when aired a week later on Sunday and on nick on demand (Go figure) — Preceding unsigned comment added by <IP_ADDRESS> (talk) 02:02, 7 April 2014 (UTC) * There never was an episode anywhere titled "Wormquake". Wormquake was nothing more than an advertizing gimmick during commercial breaks. Aragorn8354 (talk) 18:28, 26 May 2014 (UTC) Semi-protected edit request on 24 March 2014 Please change the newest episode to "Mazes and Mutants" because the latest update concerning the episode is incorrect. Also, the link provided to back up this claim is incorrect. I know this because my source is real. http://tmnt2012series.wikia.com/wiki/Mazes_%26_Mutants Jesusfreak792 (talk) 12:49, 24 March 2014 (UTC) * [[Image:Pictogram voting comment.svg|20px]] Note: This article is no longer Semi-Protected, so you can now edit the article yourself, but please ensure that any additions or alterations are properly sourced, to reliable sources - Arjayay (talk) 18:02, 24 March 2014 (UTC) Season 5 episode order Comicbook.com says there's an episode order of 20 episodes.http://comicbook.com/2015/07/10/david-tennant-peter-stormare-michael-dorn-to-guest-star-on-teena/ Even though Peter DiCicco seems to suggest that season 5 has been extended (along with season 4), he doesn't outright confirm it, just that there's another season to come.http://peterdicicco.tumblr.com/post/130779220037/hi-so-the-season-4-will-have-26-episodes-as-the -- Anythingspossibleforapossible (talk) 00:04, 23 September 2016 (UTC) Semi-lock request Some moron keeps on adding a fake film section which apparently I'm the only one who's bothering to notice, so can someone please take a notice of this message and take my request to the correct place on locking this page for a while so unregistered users can't edit (especially that moron). -- Anythingspossibleforapossible (talk) 13:54, 14 October 2017 (UTC) External links modified Hello fellow Wikipedians, I have just modified one external link on List of Teenage Mutant Ninja Turtles (2012 TV series) episodes. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20121215064442/http://tvbythenumbers.zap2it.com/2012/10/02/teenage-mutant-ninja-turtles-renewed-by-nickelodeon-for-second-season-premiere-is-number-1-kids-program-on-basic-cable/151241/ to http://tvbythenumbers.zap2it.com/2012/10/02/teenage-mutant-ninja-turtles-renewed-by-nickelodeon-for-second-season-premiere-is-number-1-kids-program-on-basic-cable/151241/ Cheers.— InternetArchiveBot (Report bug) 14:38, 27 December 2017 (UTC)
WIKI
Paid Notice: Deaths NEWBOULD, ARTHUR W., JR NEWBOULD-Arthur W., Jr, 86, formerly of NYC died on January 24, 2001. Beloved father of A. William Newbould, Barbara Geneve and Bettye Ragognetti. Dear brother of E.J. (Jack) Newbould, Esq; and adored grandfather of six. Service on Saturday (January 27) at 10:30 A.M. in Our Lady of Fatima Church, 229 Danbury Road (Route 7) in Wilton, CT. Memorials to the Alzheimers Assoc., Fairfield County Chapter, 607 Main Avenue, Norwalk, CT. 06851.
NEWS-MULTISOURCE
         Results 1 to 8 of 8 Thread: OK, got the signin - signup with Twitter and Facebook working, but still not right 1. #1 Join Date Jan 2009 Location Huntington Beach, CA Posts 718 Default OK, got the signin - signup with Twitter and Facebook working, but still not right OK, I think what is happening is that they login with Facebook or Twitter and since they aren't a user yet in our application, they get directed to our registration page where they can enter a password and other information for our application. They save, and like perfection, they are also now logged in to our application. However, they don't seem to have the Roles that I added to the UserDetails object. And therefore some things that should show on the page aren't because of using <security> taglib. And it has things like <security:authorize access="hasRole('Player')"> Which since they aren't getting their role, it isn't showing. In my code for the post of signup has Code: if (accountSecurity != null) { accountSecurity.addRole(new UserRole()); accountSecurity.setLastModified(new Date()); accountService.save(accountSecurity); SpringSecuritySignInAdapter.signin(accountSecurity.getUsername()); ProviderSignInUtils.handlePostSignUp(accountSecurity.getUsername(), request); return "redirect:/"; } As you can see in the code I add a UserRole, which by default is set to "Player" in its no-arg constructor. Then I save it to the database. I then run two lines I copied from the showcase and redirect back to our home page. I think the adapter isn't really signing in to Spring Security as it would if the user logged in through the login page and j_spring_security_check happens. I am guessing the adapter signin method is making a fake Authentication object. So I think that might need to change. Also, TextEncryptor. In the showcase it has noOpt, which can't be used in production, but I can't find anywhere in the Spring Social doc that explains how or what to use in production. Mostly how to get it setup and working. I know it comes from Spring Security, but I think the Spring Social docs needs to either link to an explaination (Since I found out a textEncryptor bean is mandatory in Spring Social configuration. If I leave it out it shows errors) or explain it in the docs. The sample showcase is great, but there aren't any docs explaining what is what so it is a matter of guessing what is unique to that application versus all applications that would use Spring Social. Thanks Mark 2. #2 Join Date Aug 2004 Posts 1,067 Default You're right in saying that the adapter is responsible for handling the *full* signin of the user with Spring Security. The reason that the adapter exists is to allow Spring Social to work with *any* security mechanism, whether it's Spring Security or not. But a consequence of that is that the adapter has full responsibility for handling that. For the showcase sample, I'm only showing the minimal needed to get the user signed in. To handle other factors (roles, remember-me, etc), you'll need to beef it up some more. But alternative, that's why the new SocialAuthenticationFilter was created. Rather than be security framework agnostic, SocialAuthenticationFilter is designed from the ground up to work with Spring Security. In fact, it plugs into Spring Security's filter chain just like any other authentication filter. The benefit with that is that it does everything a regular authentication filter would do, including handling the roles you need. As for the TextEncryptor, have you even looked at the JavaDoc for the Encryptors class (http://static.springsource.org/sprin...ncryptors.html)? It offers more than no-op encryption through other static members. You could also bypass the Encryptors class and write your own implementation of TextEncryptor or BytesEncryptor if none of the ones out of the box suit your needs. But as you pointed out, that's a Spring Security question. Again, the showcase is *just* a sample of Spring Social's capabilities and not intended to showcase other parts of the Spring portfolio. As such, I chose the no-op there as a simple, easy to debug encryptor and didn't bother explaining the Encryptors class or any other part of the Spring portfolio. Last edited by habuma; Feb 8th, 2013 at 09:23 AM. Craig Walls Spring Social Project Lead 3. #3 Join Date Jan 2009 Location Huntington Beach, CA Posts 718 Default Thanks. Yes I did know all the other stuff in the Encryptor, and was using the text() then the queryableText() and it would give errors because it uses using 256 bit AES encryption. Which then requires downloading other files and installing them on all machines that this would be running on. I do like the idea of writing my own implementation. (edit: nevermind found the filter and auth provider bean configuration) Thanks Mark Last edited by bytor99999; Feb 8th, 2013 at 09:37 AM. Reason: remove 4. #4 Join Date Jan 2009 Location Huntington Beach, CA Posts 718 Default Sorry to ask this. But I see the beans here in the config SocialSecurityConfig. Which are mandatory, which are app specific? I understand this is new and because of it there is no documentation on it and what things mean, so that we can use it correctly in our applications. So my questions on this 1) setFilterProcessesUrl("/auth"); What does that do? Is it required, is it something I then have to write code to that URL mapping? Although I do see in my intercept urls in my Security config that I have an "/auth" mapping, but not in any code. (I don't even remember typing that. Must have been a copy paste) 2) UserIdExtractor userIdExtractor() Is this the same/part as what SpringSecurityAuthenticationNameUserIdSource was doing? And a replacement for it? 3) Simple Core questions. Does @Bean on a method with a parameter mean that that parameter gets Autowired too? Actually didn't know that. Thanks again for your time. I know I am asking basic stupid questions. But sometimes I am really slow. Mark 5. #5 Join Date Aug 2004 Posts 1,067 Default 1. That is the base URL that the SocialAuthenticationFilter will trigger on. That is, any request whose path starts with "/auth" will cause SocialAuthenticationFilter to jump into action. (For example going to /auth/facebook will trigger SocialAuthenticationFilter to kick off sign in with Facebook.) That parameter defaults to "/auth", so setting it explicitly isn't required. 2. UserIdExtractor no longer exists. In the latest code, it has been merged with UserIdSource (from the configuration stuff) and moved to the org.springframework.social package. It is now used for both security and configuration purposes. Note that the choice for putting it in org.springframework.social was arbitrary and that I'm considering another move to a different (and probably new) package. Just be aware of that in case it breaks in some future build. 3. Yes. Parameters to @Bean methods will be autowired into that method. Craig Walls Spring Social Project Lead 6. #6 Join Date Jan 2009 Location Huntington Beach, CA Posts 718 Default Thanks. One last question, I promise. How to get the Spring Social Security classes. Is there an M1 version out there? I won't be able to get snapshots. I am not allowed. Although I made that rule for our company, so it would be very odd if I broke my own rules, then no one would follow my rules again. Anyway, if there isn't an M1 version out there, then I can always fork like Yuan did. Mark 7. #7 Join Date Aug 2004 Posts 1,067 Default It's not in 1.1.0.M1, but is to be part of 1.1.0.M2. I expect to cut that release early next week. (I was going to cut it this week but decided to give it a bit more time to gel and give some other team members opportunity to review it.) Craig Walls Spring Social Project Lead 8. #8 Join Date Jan 2009 Location Huntington Beach, CA Posts 718 Default Thanks. I'll fork for a week. Lead a horse to a fork and he'll drink for a day. Have the horse fork a github project and they have a dependency for life. Mark Posting Permissions • You may not post new threads • You may not post replies • You may not post attachments • You may not edit your posts •  
ESSENTIALAI-STEM
Nissan Motor Car Carrier Nissan Motor Car Carrier Co., Ltd. (Abbreviation: NMCC; 日産専用船株式会社) is a Japanese roll-on/roll-off shipping company owned by Nissan Motors (60%) and Mitsui O.S.K. Lines (40%). Overview The company fleet includes 9 deep sea Car carrier vessels, each one with a gross tonnage between 46,000 and 60,000 GT. The main business is the sea carriage of new Nissan and sister brands vehicles manufactured in Japan and Mexico, all over the world and specifically to US, Europe, intra Asia and Middle East. Its subsidiary, Euro Marine Carrier is a short sea operator in Europe, also in charge of carrying Nissan models to more peripheral European ports, not directly called by NMCC. NMCC also has a cooperative business relationship with the Norwegian shipping company, Höegh Autoliners. In Europe, Port of Amsterdam is used as the home port for all main discharging and transhipment activities of imported and exported Nissan cars. In August 2017 a large fine was applied by the South Korean Fair Trade Commission against Mitsui O.S.K. Lines and Nissan Motor Car Carrier for antitrust law violation. Select list of ships This is a dynamic list and may never be able to satisfy particular standards for completeness. You can help by expanding it with reliably sourced entries. * Asian Spirit * Jupiter Spirit * Leo Spirit * Nordic Spirit * Pleiades Spirit * Venus Spirit * World Spirit * United Spirit * Luna Spirit * Andromeda Spirit
WIKI
Pediatric Heel Pain Pediatric Heel Pain Pediatric Heel Pain Calcaneal apopysitis or pediatric heel pain is a common condition where the growth plate of the heel  is inflamed and becomes very painful.  It was previously called “Sever’s Disease” but it is not a true disease at all. Growing pains are a normal and sometimes unavoidable consequence of our bodies getting bigger.  However, with the heel bone, it is frequently made worse by poor shoe gear, abnormal biomechanics (body movements), foot deformities, tight achilles tendon, overuse, or prior  injuries.  Children usually tolerate a lot of pain when they are happily playing, but a child affected by this will frequently limp, toe walk, or even stop playing because of the pain.  This is a treatable condition and with care, can resolve relatively quickly. Other conditions may occur or play a role on top of the calcaneal apopysitis.  Your foot and ankle surgeon can evaluate and diagnose these in the office and in rare cases can order advanced imaging studies or lab work.  X-rays in the office and a thorough medical history will aid in ruling out more serious conditions.  Achilles tendonitis, flatfoot or other conditions may also exist or even mimic the heel pain. Treatments often include rest, ice, stretching, PT, immobilization, and medications. The benefits of appropriate orthotics are also very important.  An orthotic is an arch support or device that can help alleviate pain and can even be customized to each child if needed.  A variety of over the counter products may also be recommended specifically for each activity or condition to help the child’s pain.  With patience and parental support, the child can be back on their feet to a healthy lifestyle. Don’t Live Life in Pain! Call us today for an appointment at 505.880.1000. We take care of your feet…so that they’ll take care of you! Justin Ward, DPM Call Now Button
ESSENTIALAI-STEM
Harassing fire Harassing fire is a form of psychological warfare in which an enemy force is subjected to random, unpredictable and intermittent small-arms or artillery fire over an extended period of time (usually at night and times of low conflict intensity) in an effort to undermine morale, increase the enemy's stress levels and deny them the opportunity for sleep, rest and resupply. This lowers the enemy's overall readiness and fighting ability, acting as a force multiplier for the harassing force. As the name suggests, harassing fire is undertaken as an extreme form of nuisance without a major effort to produce significant casualties or to support a larger attack. The intent is to merely ensure the enemy can never fully rest or attend to non-combat related tasks and must always be alert and in cover from incoming fire. For this reason, harassing fire is often conducted at night (or around the clock if resources allow) and by a small number of guns or artillery pieces rather than the whole contingent. The denial of sleep and constant alert state it induces is physically and psychologically unsustainable by infantry forces for any length of time, and eventually causes severe degenerative stress and degradation of the force's combat abilities. For this reason, it has been a standard and efficacious tactic used since the introduction of the projectile weapon. Antiquity Harassing fire became commonplace after the invention of the catapult and trebuchet, which could be used to hurl a variety of harmful objects over fortified walls during the siege of a city or castle. Since such a siege could drag on for months or years if the attackers were unable to forcibly breach the walls, an alternative plan called for patience coupled with regular harassing fire in an effort to induce the defenders to surrender due to low morale, disease, and starvation. Aside from lethal projectiles such as stones and iron balls, the artillery of the time would also throw harassment projectiles: rotting bodies (both men and animals), plague-infected corpses, piles of human excrement, beehives and the severed heads of captured enemy prisoners of war, all in an effort to harass and discourage the besieged defenders until they surrendered. World War I Harassing fire entered a new phase following the widespread mass-production of cheap, long-range high-explosive artillery in World War I, assisted by the static, inflexible nature of the defensive positions faced. Whole batteries on all sides of the conflict were dedicated to harassing fire (especially prior to a planned infantry attack) and the concept was refined to a science, complete with formulae for shells-per-hour and pattern density to ensure sleep and resupply were statistically impossible for the targeted force. In most cases, resupply and relief was already nearly impossible during the day due to artillery observers, and the addition of random harassing fire at night meant even fewer replacements and supplies could reach the front. The shell shock this eventually induced in the enemy was usually a dissociative psychological reaction to months of unending explosions, fear, hunger and sleep deprivation. World War II Harassing fire continued to be an effective and widespread practice in World War II as bomber aircraft and missiles were added to the equation. Soviet forces famously formed three all-female military aviation regiments in 1942 (the 586th, 587th and 588th), with the 588th Regiment exclusively equipped for night harassment raids with obsolescent Polikarpov Po-2 biplane trainer aircraft. Although very slow, poorly armed and virtually defenseless during the day, the nearly all-wood structure Po-2 was exceptionally cheap and reliable, could carry six small, 50 kg, HE bombs and was nearly silent when flown by an expert at night; its small, low-RPM five-cylinder radial piston engine produced only a muted rattling for a sound signature, far quieter and less identifiable than the supercharged aero-engines of a then-modern fighter/bomber. As a result, it was much harder to pinpoint the plane's exact bearing or distance and gave the target very little warning of their arrival. Although initially sneered at by the Germans, who called the Po-2 Russenfurnier ("Russian plywood") or Die Nähmaschine ("the sewing machine"), it proved unexpectedly effective at night harassment attacks on rear areas of the German lines, flying so low and slow the German fighters were unable to locate or engage them. The otherwise obsolescent-for-combat wood-and-fabric plane also proved both highly resistant to standard armor-piercing anti-aircraft ammunition, as well as invisible to modern radar, leaving the Germans with no option but blind saturation flak and searchlights, neither of which were particularly successful and helped further ensure nobody in an encampment could get any restful sleep. Soon the Germans frustratedly dubbed the women pilots Die Nachthexen, "The Night Witches", and Luftwaffe pilots and anti-aircraft gunners were promised the Iron Cross if they managed to shoot down even a single Po-2. The Germans themselves began using their own obsolescent aircraft for similar raids against the Soviets, first with the Störkampfstaffel-named squadron-size units, then banding those together into Nachtschlachtgruppe units for this purpose. Early in the Pacific Theater of World War II during the Guadalcanal campaign, American forces defending Henderson Field from the Japanese were periodically harassed by a small number of Japanese military aircraft on night harassment raids, with their engine(s) deliberately adjusted to run in a manner that would awake American troops at night. Harassing fire also expanded to civilians as terror bombing of cities became the norm. In a 1944 report on the recent introduction of the V-1 Flying Bomb, Time magazine referred to the attacks on London as a form of harassing fire, since they were random and frightening attacks (usually at night) designed to damage English civilian morale rather than directly disable members of the British military. A tired, frightened worker would produce less war material at their daily factory jobs, they opined. During the Korean War, the Po-2 was once again used for "Bedcheck Charlie" night harassment attacks, this time by the North Korean People's Air Force against the UN forces defending South Korea – successful raids by the KPAF on UN air bases even managed to destroy small numbers of F-51 Mustang and F-86 Sabre fighters early in the war. Vietnam War The term "Harassment and Interdiction" (H&I) was used in the Vietnam War to describe artillery missions where artillery batteries fired on suspected enemy areas and movements based on intelligence reports concerning enemy activity. These missions engaged suspected targets with no more than a few rounds fired at random intervals throughout the night, and sometimes during the day, seeking to deny enemy freedom of movement and to destroy enemy morale. The bulk of H&I fire was aimed at river crossings, paths and trails, junctures, gullies, ridgelines, or where river valleys left the highlands and entered the coastal plain. American, Australian, and New Zealand artillery batteries also regularly shelled the likely approaches to bases, fire support bases, and night defensive positions. Modern day The concept continues to be relevant in modern warfare and remains in the artillery curriculum of the US Army War College and the US Army's War Plans Division.
WIKI
How to Track and Locate Lost Google Pixel Remotely 0 Google released Pixel and Pixel XL a few years back. It is said to be one of the best Android smartphone of 2016. Its camera quality has got the highest result in a reputable bench-marking tool. Pixel and Pixel XL look great and they are very comfortable to hold in hand because of their design. If you have lost your Pixel and you are looking for ways to find it. In this guide, I will tell you a trick which can help you to track and locate lost Google Pixel remotely. Google Pixel has an optimal display size of 5 inches whereas Pixel XL is of 5.5 inches. Both devices have premium build quality with an aerospace-grade aluminium unibody. They are equipped with 4GB LPDDR4 RAM and Snapdragon 821. The back camera is of 12.3 megapixels and the front camera is of 8 Megapixel. On the bottom side, both phones support USB type-C for charging and data transfer. Pixel is running on the latest Android operating system that is Android 8 Oreo, and it still gets regular updates. Recover Stolen Pixel or Locate Lost Google Pixel Remotely: If you have lost your phone. You can make use of the Android device manager to track and locate lost Google Pixel. Android device manager offers a number of services that can be used to remotely on your phone. All you need is an internet connection and some other smartphone or you can locate your phone using a PC. First, let’s have a look at the features it has got to offer. • Ring: If you are certain your phone is present inside the home or office. It is on silent so you can ring it and find it. Use this feature to make it ring on its highest volume. • Locate: You can see the exact location of your phone on google maps using this service. It has limitations. Your phone must be connected to the internet and your lost Google Pixel must have its location services on. • Lock: If you have forgotten your phone somewhere and you have hopes that someone might find it and try to contact you. Use this feature to lock down your phone and display a custom message on its screen along with your contact number. • Erase: If you are certain that you will never get your phone back and you have lost every hope to see it back ever again. Use this feature to completely wipe all the data present inside it. After erasing your phone. You won’t be able to access it via the Android device manager. Following are the steps to track and locate lost Google Pixel: This method works but it has some limitations, like if your phone isn’t connected to the internet. You won’t be able to access its location or track it. To be able to track and locate lost Google Pixel. You need to have access to your Google/Gmail account that you used on your phone for the Google Play Store. The same email which you entered when you first opened your phone. 1. First of all, go to Google Find my Device website or download it on your iOS or Android device from their respective app stores. 2. Now log in using your Gmail email and password. You have to use the same Email address that you used to download apps from the Google Play Store. The same email that you used to set up your phone for the very first time. 3. Select your phone. Which in this case is Google Pixel or Pixel XL. 4. You will see the location of your phone on Google Maps. Along with it you will see different options like lock, erase and ring. locate lost Google pixel That’s all. If you know some other methods to locate lost Google Pixel do share with us. If you have any issues or questions regarding the above guide. Let me know in the comments. If you were able to get back your Google Pixel or Pixel XL using the guide above. Do share your story with us. Stay safe and take good care of your phone. We only realize their importance once we have lost them. Concluding Remarks and Future Precautions: I know that this guide has its limitations. If the location services are off or the phone is not connected to the internet. You won’t be able to find the exact location of your phone. There are apps that send their last location via text before they are turned off. Those apps are to be pre-installed before your phone gets stolen. It is always best to keep all your data backed up on your cloud. So even if your Pixel is lost or stolen. You can at least access the data present in it. If you still can’t locate your Pixel phone and you have lost all hopes to recover it. If your phone was carrier locked, it means it was meant for a specific carrier like T-Mobile. Contact them and give them your IMEI number. Your phone will be blocked. So no one can access the data in it. There are other government agencies that regulate smartphones and carriers. You can also contact them to block your phone by giving them IMEI number of your phone. You can find the IMEI number on the box of your phone. Feel free to ask us if you have any questions via Facebook or contact us form. Even if your phone is stuck into some problem and you can not find its solution. Our Support team will be happy to help. Subscribe Notify of guest This site uses Akismet to reduce spam. Learn how your comment data is processed. 0 Comments Inline Feedbacks View all comments
ESSENTIALAI-STEM
Sweden Solar System Sweden Solar System is the world's largest permanent scale model of the Solar system on the scale 1 to 20 million. The inner bodies can be found in and around Stockholm, and the outer bodies are scattered across northern Sweden. Destinations Since the inception in 1998, some of the models have been replaced or removed. * Saturn: Uppsala. As of 2024, Uppsala has no physical model of Saturn, though some of the city's schools have models of Saturn's moons. * Ixion: Härnösand * Eris: Umeå * Sedna: Luleå * Termination shockwave: Kiruna * Saturn: Uppsala. As of 2024, Uppsala has no physical model of Saturn, though some of the city's schools have models of Saturn's moons. * Ixion: Härnösand * Eris: Umeå * Sedna: Luleå * Termination shockwave: Kiruna * Ixion: Härnösand * Eris: Umeå * Sedna: Luleå * Termination shockwave: Kiruna Related sites A smaller scale model of the Solar System, 2.5 km long and with a diameter of the Sun at 76 cm, can be found along the main road of Örebro. Each sphere is accompanied by a descriptive plaque.
WIKI
react native-tutorial React Native Router For routing and navigation in a React Native application, React Navigation is a well-liked library. The issue of switching between many screens and transferring data between them is helped by this package. It will show how many connections a user has and give them an opportunity to add more pals. You will experiment with react-mobile navigation’s application screen navigation techniques with this sample application. Install Router To begin with, we need to install the Router. We will use the React Native Router Flux in this chapter. You can run the following command in terminal, from the project folder. npm i react-native-router-flux --save Entire Application Since we want our router to handle the entire application, we will add it in index.ios.js. For Android, you can do the same in index.android.js. App.js import React, { Component } from 'react'; import { AppRegistry, View } from 'react-native'; import Routes from './Routes.js' class reactTutorialApp extends Component { render() { return ( <Routes /> ) } } export default reactTutorialApp AppRegistry.registerComponent('reactTutorialApp', () => reactTutorialApp) Add Router Now we will create the Routes component inside the components folder. It will return Router with several scenes. Each scene will need key, component and title. Router uses the key property to switch between scenes, component will be rendered on screen and the title will be shown in the navigation bar. We can also set the initial property to the scene that is to be rendered initially. Routes.js import React from 'react' import { Router, Scene } from 'react-native-router-flux' import Home from './Home.js' import About from './About.js' const Routes = () => ( <Router> <Scene key = "root"> <Scene key = "home" component = {Home} title = "Home" initial = {true} /> <Scene key = "about" component = {About} title = "About" /> </Scene> </Router> ) export default Routes Create Components We already have the Home component from previous chapters; now, we need to add the About component. We will add the goToAbout and the goToHome functions to switch between scenes. Home.js import React from 'react' import { TouchableOpacity, Text } from 'react-native'; import { Actions } from 'react-native-router-flux'; const Home = () => { const goToAbout = () => { Actions.about() } return ( <TouchableOpacity style = {{ margin: 128 }} onPress = {goToAbout}> <Text>This is HOME!</Text> </TouchableOpacity> ) } export default Home About.js import React from 'react' import { TouchableOpacity, Text } from 'react-native' import { Actions } from 'react-native-router-flux' const About = () => { const goToHome = () => { Actions.home() } return ( <TouchableOpacity style = {{ margin: 128 }} onPress = {goToHome}> <Text>This is ABOUT</Text> </TouchableOpacity> ) } export default About The app will render the initial Home screen. You can press the button to switch to the about screen. The Back arrow will appear; you can use it to get back to the previous screen. RECOMMENDED ARTICLES Leave a Reply Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
Lear Corp (LEA) Q1 2025 Earnings Call Highlights: Record New Business Awards Amidst Challenging ... Revenue: $5.6 billion in the first quarter. Revenue: $5.6 billion in the first quarter. Core Operating Earnings: $270 million. Core Operating Earnings: $270 million. Operating Margin: Improved to 4.9%. Operating Margin: Improved to 4.9%. Adjusted Earnings Per Share: $3.12. Adjusted Earnings Per Share: $3.12. Operating Cash Flow: Use of $128 million. Operating Cash Flow: Use of $128 million. Seating Segment Sales: $4.2 billion, a decrease of 7% from 2024. Seating Segment Sales: $4.2 billion, a decrease of 7% from 2024. E-Systems Segment Sales: $1.4 billion, a decrease of 7% from 2024. E-Systems Segment Sales: $1.4 billion, a decrease of 7% from 2024. Seating Segment Operating Margin: 6.7%. Seating Segment Operating Margin: 6.7%. E-Systems Segment Operating Margin: 5.2%. E-Systems Segment Operating Margin: 5.2%. Share Repurchase: $25 million worth of shares repurchased. Share Repurchase: $25 million worth of shares repurchased. Global Production: Increased 1% compared to the same period last year. Global Production: Increased 1% compared to the same period last year. Headcount Reduction: Reduced global hourly headcount by 3,600 in the first quarter. Headcount Reduction: Reduced global hourly headcount by 3,600 in the first quarter. Joint Venture in China: Consolidation expected to add approximately $70 million to reported revenue for 2025. Joint Venture in China: Consolidation expected to add approximately $70 million to reported revenue for 2025. New Business Awards: More than $750 million in annual sales, the most in any quarter in more than a decade. New Business Awards: More than $750 million in annual sales, the most in any quarter in more than a decade. Available Liquidity: $2.8 billion. Available Liquidity: $2.8 billion. Warning! GuruFocus has detected 4 Warning Signs with LEA. Warning! GuruFocus has detected 4 Warning Signs with LEA. Release Date: May 06, 2025 For the complete transcript of the earnings call, please refer to the full earnings call transcript. Lear Corp (NYSE:LEA) reported $5.6 billion in revenue for the first quarter of 2025, with core operating earnings of $270 million and an improved operating margin of 4.9%. Lear Corp (NYSE:LEA) reported $5.6 billion in revenue for the first quarter of 2025, with core operating earnings of $270 million and an improved operating margin of 4.9%. The company achieved historic levels of positive net performance, contributing significantly to margin improvements in both seating and E-Systems. The company achieved historic levels of positive net performance, contributing significantly to margin improvements in both seating and E-Systems. Lear Corp (NYSE:LEA) won significant new business, including $750 million in annual sales for E-Systems, marking the most awarded business in any quarter in over a decade. Lear Corp (NYSE:LEA) won significant new business, including $750 million in annual sales for E-Systems, marking the most awarded business in any quarter in over a decade. The company successfully expanded its global leadership in seating, securing new ComfortFlex programs and a global seat program with key Chinese domestic automakers. The company successfully expanded its global leadership in seating, securing new ComfortFlex programs and a global seat program with key Chinese domestic automakers. Lear Corp (NYSE:LEA) demonstrated strong operational performance, with efficiency improvements and savings from restructuring and automation investments driving durable operating performance. Lear Corp (NYSE:LEA) demonstrated strong operational performance, with efficiency improvements and savings from restructuring and automation investments driving durable operating performance. Lear Corp (NYSE:LEA) faced a challenging production environment, with global production only increasing by 1% and significant declines in North America and Europe. Lear Corp (NYSE:LEA) faced a challenging production environment, with global production only increasing by 1% and significant declines in North America and Europe. The company experienced a use of $128 million in operating cash flow for the first quarter, impacted by timing and higher cash restructuring costs. The company experienced a use of $128 million in operating cash flow for the first quarter, impacted by timing and higher cash restructuring costs. Lear Corp (NYSE:LEA) is dealing with significant uncertainty due to international trade negotiations and tariffs, which have introduced risks to production volume and mix. Lear Corp (NYSE:LEA) is dealing with significant uncertainty due to international trade negotiations and tariffs, which have introduced risks to production volume and mix. The company has paused its share repurchase program temporarily to maintain a strong liquidity position amid the uncertain environment. The company has paused its share repurchase program temporarily to maintain a strong liquidity position amid the uncertain environment. Lear Corp (NYSE:LEA) withdrew its full-year guidance due to the wide range of potential outcomes related to production outlook and trade policy changes. Lear Corp (NYSE:LEA) withdrew its full-year guidance due to the wide range of potential outcomes related to production outlook and trade policy changes. Q: Have you seen any meaningful changes to the production schedules yet, or are you just anticipating this? A: Jason Cardew, CFO: We have seen changes announced over the last few weeks, but the environment remains dynamic. We decided to withdraw guidance due to the wide range of variability in the production outlook. We are waiting for more visibility on consumer responses to price increases, customer reactions, and additional trade policies before providing further guidance. Q: Regarding tariffs, is there a way to get your customers to be the importer of record to claim reimbursement? A: Ray Scott, CEO: Yes, we have presented this option to our customers. We are also considering moving production around based on tariff impacts. Jason Cardew, CFO, added that wire harnesses have a high likelihood of being imported tariff-free, and they are working on reducing exposure through design and sourcing changes. Q: Can you provide an update on the original outlook and how it has changed? A: Jason Cardew, CFO: Our February guidance anticipated a 1% global production decline. We expect some top-line improvement from FX and tariff pass-throughs, but there are risks, particularly in North America. We are confident in achieving our net performance targets, but the production outlook remains uncertain. Q: How are strategic actions impacting your market position and growth? A: Ray Scott, CEO: Our operational excellence and innovation are helping us remain competitive. We are seeing benefits from automation and software development, which allow us to quote business with returns above our cost of capital. This positions us well for margin expansion and new business wins. Q: Are you pausing share repurchases due to the current uncertainty? A: Jason Cardew, CFO: Yes, we are temporarily pausing share repurchases until there is more visibility on the production environment. We plan to resume once we have a clearer understanding of our customers' production plans for the second half of the year. For the complete transcript of the earnings call, please refer to the full earnings call transcript. This article first appeared on GuruFocus.
NEWS-MULTISOURCE
Defensive behavior - Washington Times Sign In Manage Newsletters COVID-19: A crisis fit for a new world order How Democrats are wrongly taking advantage of the coronavirus crisis Airlines should heed a parable from Jesus as they seek mercy at the expense of taxpayers NASHVILLE, Tenn. | A not-so-raw rookie and a trustworthy veteran lifted the Baltimore Ravens to the brink of the Super Bowl. With the help of a brutal defense that knocks opponents silly, of course. After all, these are the Ravens, who love nothing more than to win grudge matches. And this one was worthy of pro wrestling. Baltimore survived 13-10 on Saturday against the Tennessee Titans thanks to Matt Stover's 43-yard field goal with 53 seconds remaining. The unflappable Flacco was certain the 40-year-old kicker would get his team into next weekend's AFC title game at either Pittsburgh or San Diego. TOP STORIESAide to D.C. mayor dies from coronavirusWhat good are constitutional rights if they are violated when Americans get sick?COVID-19: A crisis fit for a new world order I just watched on the big screen, said the first rookie quarterback to win two playoff games. I didn't watch it live for whatever reason. Maybe Flacco's reason was simply that he never flinches. Nor does his team, which took the wild-card route to the Super Bowl in 2000 and just might do it again. We've been confident in ourselves all year, Flacco said. It seems like we've been on the road for the longest time. It doesn't matter to us. We're going to go out there and battle the crowd, battle the other team, and give it our best. Their best has them at 13-5 after Stover, the last member of the Ravens who played when the franchise was in Cleveland, nailed his field goal. I would say this would be the No. 1 [kick in my career], Stover said, then added, but we've got some more kicks, too. So let's just be humble about that. Humble after a rumble. Two teams with an extreme dislike for each other never stopped pounding it out in the wind and rain. The difference: Baltimore forced three turnovers and never gave away the ball. We just continued to fight and refused to let them in [the end zone], linebacker Bart Scott said. We made the plays we had to … the ball came out. We'll take it any way we can get it. Baltimore's postseason run looks eerily similar to when it won the championship after the 2000 season. Back then, it also was a wild card and also won in Tennessee on the way to the title. It's great to make our own history, our own path, Scott said. That team has its own identity and we're trying to create our own. It was so rugged that the highlight-reel play was All-Pro linebacker Ray Lewis' explosive second-quarter hit on Titans fullback Ahmard Hall near the sideline. Hall's helmet flew off, and both players began jawing at each other. The nasty words never stopped flowing. But the Ravens backed it up with just enough points. It's a little shocking, said Titans linebacker Keith Bulluck, who slammed down a few small metal barriers lining the tunnel leading to the Titans' locker room at the end. You go out and play defense the way you did. At the end of the day, realistically you have two, three turnovers inside the 20, you're not supposed to win. Playoff football, those are the mistakes you can't have as a team. The 40-year-old Stover also made a 21-yard field goal early in the fourth quarter for a 10-7 lead. Rob Bironas' 27-yarder with 4:23 left in regulation tied it at 10. Then Flacco connected with Todd Heap on a 23-yard pass on third down, eventually leading to the winning kick. Flacco almost had a major blunder on Baltimore's next-to-last series when he nearly stepped out of the back of the end zone while passing. Few replays were shown at LP Field, and Titans coach Jeff Fisher dismissed the play afterward. I wasn't out because they didn't call it, Flacco said. Tennessee, a plus 14 in turnover margin while winning the AFC South, wasted a half-dozen scoring opportunities with errors. Copyright 2020 The Washington Times, LLC. Click here for reprint permission. Click to Read More and View Comments Click to Hide Terms of Use / Privacy Policy / Manage Newsletters
NEWS-MULTISOURCE
Willie LATIMORE, Petitioner v. Luis SPENCER, et al., Respondents. No. CIV.A. 97-11563-EFH. United States District Court, D. Massachusetts. Feb. 6, 1998. Robert Carnes, Pittsfield, MA for Willie R. Latimore, Petitioner. Gregory I. Massing, Attorney General’s Office, Boston, MA for Luis Spencer, Superintendent, L. Scott Harshbarger, Attorney General, Respondents. MEMORANDUM AND ORDER HARRINGTON, District Judge. Petitioner, Willie Latimore, petitions this court for a Writ of Habeas Corpus pursuant to 28 U.S.C. § 2254 alleging that his conviction in the Massachusetts Superior Court for second degree murder was unconstitutionally obtained in violation of his Fourteenth Amendment rights to equal protection and due process of law and of his Sixth Amendment right to a speedy trial. First, he contends that the prosecution impermissibly exercised peremptory challenges on the basis of race during jury selection. Second, he alleges that the judge’s instruction on reasonable doubt constituted a reversible error. Third, he argues that the government’s rejection of his proposed Alford plea to a manslaughter charge was an abuse of prosecutorial discretion. Last, he claims that the seventeen-year delay between his first trial and second trial violated his Sixth Amendment right to a speedy trial and his post-conviction right to due process. I. BACKGROUND A. Facts The Court states the factual background in the light most favorable to the verdict. Stewart v. Coalter, 48 F.3d 610, 611 (1st Cir.), cert. denied, 516 U.S. 853, 116 S.Ct. 153, 133 L.Ed.2d 97 (1995). The facts of the case are summarized in Commonwealth v. Latimore, 423 Mass. 129, 667 N.E.2d 818 (1996). Briefly stated, on the evening of October 18, 1975 at a tavern in Taunton called the Canadian Club, Philip Poirier was stabbed in the chest and died shortly thereafter. Earlier in the evening petitioner was at the club with his brother and a female companion. They became noisy while playing pool, and Poirier asked them to quiet down. Petitioner and his party left the bar a short time later. Petitioner reentered the club while his companions waited in the car. Poirier said something to petitioner, to which petitioner responded “When are you going to learn to keep your mouth shut?” Blows were exchanged and the two men grappled on the floor. The fight ended when Poirier, having pinned petitioner to the ground, helped him to his feet and said, “Well, I got the worst of it---Look, my shirt’s all torn.” He staggered, fell to the floor, and died from a single stab wound to the chest. Petitioner ran to the car and drove away from the scene. The four eyewitness to the stabbing stated that they neither saw the knife nor the actual stabbing. No knife was ever found. Petitioner’s description of the events differed from the Commonwealth’s version. Petitioner testified at trial that he had returned to the club to search for his wallet, which he discovered was missing while at the package store. Petitioner said that Poirier pulled out the knife and while wrestling he rolled Poirier over, causing Poirier to be stabbed by the knife. B. Prior Proceedings On October 29, 1975, a Bristol County grand-jury indicted petitioner for the murder of Philip Poirier. On May 24, 1976, the jury convicted petitioner of murder in the first degree, and the court sentenced him to a life sentence. The Massachusetts Supreme Judicial Court affirmed the conviction on August 7, 1979. Commonwealth v. Latimore, 878 Mass. 671, 393 N.E.2d 370 (1979). On May 6, 1982, petitioner filed a motion for a new trial in the Superior Court. The court denied the motion on January 18,1983. Pursuant to Massachusetts General Laws ch. 278, 33E, petitioner sought leave from a single justice of the Supreme Judicial Court to appeal the denial of his new trial motion. Justice Nolan denied leave to appeal on November 22, 1983, and denied petitioner’s motion for reconsideration, filed on March 19, 1984, on April 11,1984. On October 23, 1989, petitioner filed a petition in federal district court for a Writ of Habeas Corpus. On February 1, 1990, the respondent moved to stay the habeas corpus action pending the Commonwealth’s seeking clarification of Justice Nolan’s prior denial of the petition for leave to appeal. On February 21, 1990, Justice Nolan entered an amended order, nunc pro tunc to November 23,1983, stating, “The application for leave to appeal is denied for reasons of procedural default.” Petitioner’s habeas corpus petition was accordingly withdrawn. On June 28, 1991, petitioner filed a second motion for a new trial. The Superior Court on August 13, 1992, allowed the motion and ordered a new trial on the ground of the trial court’s instruction on “malice.” The.Commonwealth’s application for leave to appeal was denied by a single justice of the Supreme Judicial Court on November 18, 1992. Petitioner was released on bail and filed several motions for continuances. Retrial commenced on October 12,1993. On October 19, 1993, a jury convicted petitioner of second-degree murder and the court sentenced him to a term of life imprisonment. Petitioner appealed, and on July 11, 1996, the Supreme Judicial Court affirmed his conviction. Commonwealth v. Latimore, 423 Mass. 129, 667 N.E.2d 818 (1996). The instant Petition for a Writ of Habeas Corpus was filed on July 10, 1997. II. DISCUSSION A. Peremptory Challenges Latimore, who is black, -asserts that in his second trial the government violated his right to equal protection of the law by exercising race-based peremptory challenges in selecting the jury that convicted him. In evaluating an equal protection challenge to a prosecutor’s use of a peremptory strike, a three-part framework should be employed. Batson v. Kentucky, 476 U.S. 79, 96-98, 106 S.Ct. 1712, 90 L.Ed.2d 69 (1986); United States v. Bergodere, 40 F.3d 512 (1st Cir. 1994), cert. denied, 514 U.S. 1055, 115 S.Ct. 1439, 131 L.Ed.2d 318 (1995). First, the defendant must make a prima facie showing of discrimination in the prosecutor’s launching of the challenge. Batson, 476 U.S. at 96-97. At the second stage, once a prima facie, case has been made out, the burden shifts to the prosecutor to articulate a race-neutral explanation for the challenge. United States v. Perez, 35 F.3d 632, 634 (1st Cir.1994). The prosecutor’s burden is merely a. burden of production, not a burden of persuasion.' Bergodere, 40 F.3d at 515: Finally, if the prosecutor artidulates a race-neutral reason, the trial court is charged with deciding whether the defendant has carried his burden of proving that the challenge constituted purposeful discrimination on the basis of race. Hernandez v. New York, 500 U.S. 352, 358-359, 111 S.Ct. 1859, 114 L.Ed.2d 395 (1991). At trial defense counsel objected that there was a pattern of discriminatory intent in the Commonwealth’s use of peremptory challenges to remove all nonwhite jurors from the venire. The prosecutor used two of his six peremptory challenges to remove two nonwhite members of the venire. He also used a third peremptory challenge to remove another member of the venire who stated in voir dire that she had “mixed race” in her family. The final jury composition had no non-white jurors. The First Circuit has made clear that the question of whether a defendant has established a Batson prima facie case is a mixed question of law and fact that is fact sensitive and, therefore, should be reviewed under the clear-error standard. Bergodere, 40 F.3d at 516. Here, there was no explicit factual findings made by the trial judge on petitioner’s prima facie Batson challenge. This Court concludes that the trial judge implicitly found that petitioner had established a prima facie case when the judge asked the government to give reasons for its peremptory challenges. Hernandez, 500 U.S. at 359 (“Once a prosecutor has offered a race-neutral explanation and the trial judge has ruled on the ultimate question of racial discrimination,- the preliminary issue of whether the defendant made a prima facie showing is moot.”) The next step of the inquiry is whether the prosecutor met his burden of articulat- , ing a race-neutral basis for striking the jurors. Perez, 35 F.3d at 634. The second step of this process does not demand an explanation that is persuasive, or even plausible. Purkett v. Elem, 514 U.S. 765, 115 S.Ct. 1769, 131 L.Ed.2d 834 (1995). “At the [second] step of the inquiry, the issue is the facial validity of the prosecutor’s explanation. Unless a discriminatory intent is inherent in the prosecutor’s explanation, the reason offered will be deemed race-neutral.” Hernandez, 500 U.S. at 360. Thus, an explanation is race neutral simply if it is based on something other than the race of the juror. Id. at 360. In the present case the prosecutor offered a race-neutral explanation for each of the three peremptory challenges at issue. The prosecutor’s reasons for the peremptory challenges are detailed in footnote 8 of the Supreme Judicial Court’s decision. Latimore, 423 Mass. at 137-138 n. 8, 667 N.E.2d 818. The prosecutor struck Juror 1-3 due to her young age and the fact that she appeared tentative while answering questions during voir dire. Additionally, the prosecutor noted that she had been involved in a domestic relations injunction ease which may have affected her view of the District Attorney’s Office. The prosecutor struck Juror 5-2 because he was a full time student and that students tend to be more liberal. Additionally, the prosecutor stated that the juror was wearing a sweatshirt which tends to show a level of disrespect for the serious public obligation of jury duty. Although attorneys cannot be permitted to exercise peremptory challenges based on race, they are not prohibited from striking from the venire the persons of a particular race for a race neutral reason. Bergodere, 40 F.3d at 517. The fact that the exercise of peremptory challenges produced a final jury with no nonwhite jurors does not negate the prosecutor’s race neutral explanations at this stage. Hernandez, 500 U.S. at 362. (“[Disparate impact... will not be conclusive in the preliminary race-neutrality step of the Bat-son inquiry.”) At the second stage of the Batson inquiry, the Court finds that these explanations fall within the Supreme Court’s definition of being race-neutral. In the third stage, it is for the trial court to decide the ultimate question of whether the defendant has proved that the prosecutor’s challenges were, in fact, motivated by race. Hernandez, 500 U.S. at 359. The First Circuit stated in Perez that the trial court must choose whether to believe the prosecutor’s race-neutral explanation or to find that the explanation was a pretext to cover a race-based motive. Perez, 35 F.3d at 635. This determination turns upon an assessment of the credibility of the prosecutor’s explanation, the best evidence of which will often be the demeanor of the attorney who exercises the challenge. Id. Since evaluation of the prosecutor’s state of mind based upon demeanor and credibility lies peculiarly within the trial judge’s province, the trial court’s decision on the ultimate issue of discriminatory intent represents a finding of fact of the sort accorded great deference on appeal. Id. Petitioner argues that the prosecutor’s asserted race-neutral explanations were a mere pretext for a race-based motive. Specifically, petitioner contends that although youth was a factor cited by the prosecutor, the government allowed other jurors as young or younger than the challenged jurors to be seated. Jurors 1-3 and 5-2 were both 21 years of age. Petitioner argues that the government allowed three jurors who were 19, 22, and 26 years of age to remain on the jury. The record reflects that the prosecutor did not challenge Jurors 1-3 or 5-2 solely on the basis of age, but coupled their youth with other factors. The prosecutor stated that Juror 1-3 appeared very tentative during voir dire and may not have been able to decide the difficult issues presented in the case. The prosecutor stated that he challenged Juror 5-2 for a “constellation of issues” including his age, that he was a full time student, and his manner of dress. Petitioner argues that the explanation based on Juror 5-2 wearing a sweatshirt was a sham because his dress was not much different from the dress of other members of the venire. On this point the trial judge was present in the court room and was in the best position to compare the dress of other jurors. In addition to the juror’s youth, petitioner argues that the use of a juror’s education was also a pretext for a race-based motive. Specifically, petitioner argues that, similar to Juror 1-15, several other members of the venire had limited education or had failed to fill out their educational history in the jury questionnaire. The prosecutor stated that he challenged Juror 1-15, not only because of her ninth grade education, but also because she had been involved in a domestic relations injunction and had no real world work experience. Additionally, petitioner argues that the contradictory explanations based on education for Juror 1-15 and Juror 5-2 illustrates that they are a pretext for a race-based motive. The prosecutor was concerned that Juror 1-15’s limited educational background, coupled with her involvement with a domestic relations injunction, would affect her ability to decide the difficult issues presented at trial. In contrast, the prosecutor’s reason for striking Juror 5-2, the full-time student, was not based on the fact that he was “too educated” but rather the fact that young students tend to lack practical experience and hold more liberal views. In a habeas corpus proceeding in federal courts, the factual findings of state courts are presumed to be correct. See 28 U.S.C. § 2254(e)(1). Petitioner has the burden of rebutting the presumption of correctness by clear and convincing evidence. The trial judge accepted the race-neutral explanations of the prosecutor. The Supreme Judicial Court concluded that the trial judge’s determination — that the defendant’s right to a jury selected on a nondiscriminatory basis was not violated — was not erroneous. Latimore, 423 Mass. at 138-139, 667 N.E.2d 818. This Court concludes that “[t]he trial court did not commit clear.error in choosing to believe the reasons given by the prosecutor.” Hernandez, 500 U.S. at 372. Moreover, Judge Brady expressly asked all potential jurors during voir dire whether they had any feelings about the different races of the victim and defendant that may affect their judgment. The court excused at least five potential jurors for cause on the basis of their answers to this question. In Brewer v. Marshall, 119 F.3d 993, 1005 (1st Cir.1997), the First Circuit stated that “Such a voir dire creates a ‘high probability that the individual jurors seated in a particular case were free from bias,’ ” quoting Allen v. Hardy, 478 U.S, 255, 259, 106 S.Ct. 2878, 92 L.Ed.2d 199 (1986). Therefore, petitioner is not entitled to habeas corpus relief on Ground One. B. Reasonable Doubt Jury Instruction In Ground Two, petitioner claims that the trial court’s reasonable doubt instruction defined proof beyond a reasonable doubt solely in terms of a “moral certainty” with no other explanation, in violation of his due process rights guaranteed by the Fourteenth Amendment. The Due Process Clause requires that the government prove a criminal defendant’s guilt beyond a reasonable doubt, and trial courts must avoid defining reasonable doubt so as to lead the jury to convict on a lesser showing than due process requires. Victor v. Nebraska, 511 U.S. 1, 21, 114 S.Ct. 1239, 127 L.Ed.2d 583 (1994). Petitioner’s reliance on the United States Supreme Court’s decision in Victor is misplaced. The Supreme Judicial Court considered the reasonable doubt instruction in this case, and approved the trial court’s instruction as “substantially based on the language of Commonwealth v. Webster, 5 Cush. [59 Mass.] 295, 320 (1850), which was ruled constitutional by the United States Supreme Court in Victor v. Nebraska.” Latimore, 423 Mass. at 139-140, 667 N.E.2d 818. The challenged instruction uses the term “moral certainty” twice. The first usage was in language almost identical to the language approved by the Supreme Court in Victor. The Court in Victor stated that “Instructing the jurors that they must have an abiding conviction of the defendant’s guilt does much to alleviate any concerns that the phrase moral certainty might be misunderstood in the abstract.” Victor, 511 U.S. at 21. The trial judge’s specific instruction was “A charge is proved beyond a reasonable doubt if after you have compared all of the evidence you have in your minds an abiding conviction to a moral certainty that the charge is true.” Here the use of the term “an abiding conviction” lent content to the otherwise potentially ambiguous use of the term “moral certainty” by itself. Victor, 511 U.S. at 14. The trial judge’s second use of the term “moral certainty” couched the language “reasonable and moral certainty” in terms of the evidence. Accordingly, there is no reasonable likelihood that the jury would have understood moral certainty to be disassociated from the evidence in the case. Victor, 511 U.S. at 14. This Court concludes that the instruction informs the jury that the evidence must be strong enough to prove the defendant’s guilt beyond a reasonable doubt. Therefore, petitioner is not entitled to habeas corpus relief on Ground Two. C. Prosecutorial Misconduct Petitioner contends that he was deprived of his constitutional right to a fair trial because, while the second trial was pending, the government rejected the petitioner’s offer to make an “Alford ” plea to manslaughter. The district attorney declined the offer, partly because the victim’s family wanted the Commonwealth to pursue a murder conviction. The Supreme Judicial Court rejected this claim. Latimore, 423 Mass. at 135-137, 667 N.E.2d 818. It is well established that prosecutors possess broad discretion in determining whom to prosecute and what charges to file. United States v. Armstrong, 517 U.S. 456, 116 S.Ct. 1480, 1486, 134 L.Ed.2d 687 (1996). A prosecutor’s discretion, however, is subject to some restraints. One of these constraints is that the decision whether to prosecute may not be based on an unjustifiable standard such as race, religion, or other arbitrary classifications. Wayte v. United States, 470 U.S. 598, 608, 105 S.Ct. 1524, 84 L.Ed.2d 547 (1985). The Supreme Court cases delineating the necessary elements to prove a claim of selective prosecution have taken great pains to explain that the standard is a demanding one. Armstrong, 116 S.Ct. at 1486. In order to dispel the presumption that a prosecutor has not violated equal protection, a criminal defendant must present “clear evidence to the contrary.” Id. In the present case petitioner does not allege that he was prosecuted on the basis of race, but that the prosecutor based his decision on the considerations of the victim’s family. The Supreme Judicial Court concluded that the family’s concerns and desires are not the sort of impermissible motives which justify judicial inquiry into the district attorney’s exercise of discretion. Latimore, 423 Mass. at 136, 667 N.E.2d 818. The Supreme Judicial Court noted that Massachusetts General Laws specifically provide that victims may make a statement to the court as to the impact of the crime as a factor to be considered in imposing sentence. The Supreme Judicial Court reasoned that, similarly, a district attorney may consider the harm and impact to the victim and a victim’s family when deciding whether to accept a plea to a lesser charge. The Supreme Judicial Court’s decision was not contrary to any clearly established federal law as determined by the United States Supreme Court. 28 U.S.C. § 2254(d)(1). Therefore, petitioner is not entitled to habeas corpus relief on Ground Four. D. Due Process and Speedy Trial Petitioner contends that being retried for an offense seventeen years after first being convicted for that offense amounted to an unreasonable delay in violation of Due Process under the Fourteenth Amendment and of his Sixth Amendment right to a speedy trial. The Supreme Judicial Court held that petitioner’s right to due process was not offended because the delay was not prejudicial and that the right to a speedy trial was inapplicable. Latimore, 423 Mass. at 133—135. This Court recognizes that a significant period of time elapsed between the affirmation of his conviction in the first trial and his subsequent retrial. After a careful examination of the record, however, this Court concludes that the Supreme Judicial Court’s decision was not contrary to clearly established federal law as determined by the United States Supreme Court. 28 U.S.C. § 2254(d)(1). Petitioner contends that the period beginning August 7, 1979, the date his first conviction was affirmed by the Supreme Judicial Court, and ending November 18, 1992, the date the single justice of the Supreme Judicial Court denied the Commonwealth’s application to appeal the order for retrial presents an unusual situation requiring application of the Sixth Amendment right to a speedy trial in conjunction- with a post-conviction right to due process. Petitioner characterizes that interval as a “delay of the prospective retrial.” The Sixth Amendment provides that “[i]n all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial____” The Sixth Amendment right to a speedy trial is not primarily intended to prevent prejudice to the accused caused by passage of time; that interest is protected primarily by the Due Process Clause. United States v. MacDonald, 456 U.S. 1, 8, 102 S.Ct. 1497, 71 L.Ed.2d 696 (1982). The right to a speedy trial is concerned only with the period between a defendant’s indictment or arrest and his trial. Id. 456 U.S. at 8-9. Therefore, the right does not apply to the appellate process. Nor does the Sixth Amendment right apply when a conviction is reversed on collateral attack. United States v. Ewell, 383 U.S. 116, 121, 86 S.Ct. 773, 15 L.Ed.2d 627 (1966). Thus, the right to a speedy trial is not violated by the length of time between the conclusion of the state appellate process and retrial. Petitioner directs this Court toward a line of cases relating to whether post-conviction appellate delay constitutes a due process violation. United States v. Mohawk, 20 F.3d 1480 (9th Cir.1994); Harris v. Champion, 15 F.3d 1538 (10th Cir.1994). A number of circuits courts have extended the speedy trial analysis set forth in Barker v. Wingo, 407 U.S. 514, 530, 92 S.Ct. 2182, 33 L.Ed.2d 101 (1972), to delays arising in the processing of post-conviction appeals. See United States v. Smith, 94 F.3d 204, 206-07 (6th Cir.1996), cert. denied, — U.S.-, 117 S.Ct. 997, 136 L.Ed.2d 877 (1997); Simmons v. Reynolds, 898 F.2d 865, 868 (2d Cir.1990); Burkett v. Cunningham, 826 F.2d 1208, 1219-21 (3rd Cir.1987); United States v. Johnson, 732 F.2d 379, 381 (4th Cir.), cert. denied, 469 U.S. 1033, 105 S.Ct. 505, 83 L.Ed.2d 396 (1984). In Barker, the Supreme Court enunciated a four part balancing test to be used in pretrial delay cases wherein courts consider: (1) the length of the delay; (2) the reason for the delay; (3) whether the defendant asserted his right to a timely appeal; and (4) the prejudice to -the defendant as a result of the delay. The First Circuit, however, has never explicitly applied Barker in analyzing delay in post-conviction appeals. Nevertheless, the First Circuit examines such cases on a case by case basis applying factors similar to those employed in Barker. See Morales Ro que v. People of Puerto Rico, 558 F.2d 606, 607 (1st Cir.1976) citing Barker v. Wingo, 407 U.S. at 514; see also United States v. Pratt, 645 F.2d 89, 91 (1st Cir.1981). This Court finds that the factors set forth in Barker and the subsequent cases modifying it for post-conviction appeals provide the relevant standard for determining the constitutionality of delay in the present case. The Tenth Circuit in Harris v. Champion, elaborated on the Barker test in the context of post-conviction appeal delays and provided a well reasoned framework for evaluating alleged violations of a defendant’s post-conviction due process right. Harris, 15 F.3d at 1558-65. The modified test applies the four factors of the Barker test, but tempers the fourth factor to “reflect the interest sought to be protected by an appeal ‘unencumbered by excessive delay.’” Harris, 15 F.3d at 1559. The modified test requires consideration of whether the petitioner was prejudiced by the delay because he (1) suffered oppressive incarceration pending appeal; (2) suffered constitutionally cognizable anxiety and concern while awaiting the outcome of his or her appeal; and (3) had the grounds for his appeal or his defense in the event of reversal and retrial impaired. Harris, 15 F.3d at 1559. This approach places additional emphasis on the prejudice prong of the Barker analysis. In the present case any prejudice to petitioner based on delay before his retrial will be analyzed under the Barker test as modified by Harris. III. Length of the Delay In applying the modified Barker test to the facts of the instant case, this Court first must determine the relevant period of delay in question. Petitioner contends that the applicable time period is the entire seventeen years from the date of his first conviction, May 24, 1976, to the date of his retrial, October 12, 1993. This seventeen-year period, however, must be analyzed to properly determine the prejudice to petitioner due to delay caused by the government. From his indictment on October 29, 1975, to the affirmation of his conviction by the Supreme Judicial Court on August 7, 1979, petitioner’s case properly worked its way through the judicial process. These 45 months are excluded as a period of delay attributable to either the government or petitioner. Following the affirmation of his conviction in the first trial by the Supreme Judicial Court, petitioner did not file a motion for a new trial in the Superior Court until May 6, 1982. These 33 months are attributable solely to petitioner. Moving forward, petitioner filed a second motion for a new trial on June 28, 1991, which was granted on August 13, 1992. The Commonwealth’s application for leave to appeal was denied by a single justice of the Supreme Judicial Court on November 18, 1992. Prior to the retrial, petitioner filed several motions for continuance. The retrial commenced on October 12, 1993. The 11 months from the denial of the Commonwealth’s application for leave to appeal to the commencement of the retrial cannot be attributed to the government. Thus, the Court rules that the crucial time period for determining prejudice is the period which elapsed between November 22, 1983, the date of the denial by a single justice of the Supreme Judicial Court of petitioner’s application for leave to appeal the denial of his first motion for a new trial, and November 18,1992, the date of the denial by a single justice of the Supreme Judicial Court of the Commonwealth’s application for leave to appeal the granting of the petitioner’s second motion for a new trial. This period of nine years is sufficient to trigger further inquiry. See e.g., Smith, 94 F.3d at 206-07 (three-year delay sufficient to trigger inquiry); Mohawk, 20 F.3d at 1484 (ten-year delay “is ‘extreme’ by any reckoning”); Champion, 15 F.3d at 1560 (holding that a two-year appellate delay will create a rebuttable presumption of unconstitutionality); Reynolds, 898 F.2d at 868 (six years “was clearly excessive”); Johnson, 732 F.2d at 381 (two-year delay “is in the range of magnitude” for triggering inquiry). IV. Reason for the Delay The Court must determine the reason for the delay during this nine year period and whether it impaired petitioner’ grounds for a defense in the retrial. As explained in Barker, “different weights should be assigned to different reasons”: A deliberate attempt to delay the trial in order to hamper the defense should be weighted heavily against the government. A more neutral reason such as negligence or overcrowded courts should be weighed less heavily but nevertheless should be considered since the ultimate responsibility for such circumstances must rest with the government rather than the defendant. Finally, a valid reason, such as a missing witness, should serve to justify appropriate delay. The nine-year period in question commenced in 1983 when petitioner sought leave from a single justice of the Supreme Judicial Court to appeal the denial of his first motion for a new trial. That application was denied on November 22,1983 by Justice Nolan. On March 19,1984 petitioner filed .a motion for reconsideration of Justice Nolan’s denial of his application for leave to appeal, which was denied on April 11, 1984. Petitioner contends that Justice Nolan’s denial was in error and led to the nine-year delay. The basis for Justice Nolan’s denial of the petitioner’s application for leave to appeal and petitioner’s subsequent assertions of right to appeal demand examination. Justice Nolan denied petitioner’s application for leave to appeal on the procedural ground that petitioner had failed to raise his objection to the jury instructions on the direct appeal of his first conviction. Petitioner appealed his first conviction on the grounds that it was error for the trial judge to deny his separate motions for directed verdicts of not guilty, of not guilty of murder in the first degree, and of not guilty in the second degree. Commonwealth v. Latimore, 378 Mass. 671, 671-72, 393 N.E.2d 370 (1979). Petitioner first raised the issue of error in the jury instructions in his first motion for a new trial before Judge Hurd in Superior Court on May 6, 1982. Judge Hurd denied the motion on January 18, 1983. In denying petitioner’s first motion for a new trial, Judge Hurd stated that “the jury instruction may be open to criticism were it not for the context in which it was uttered.” After reviewing the jury instruction as a whole, Judge Hurd concluded that “there was no danger that a reasonable juror might have interpreted the judge’s instruction as creating a constitutionally impermissible presumption or as requiring the defendant to disprove malice.” After the denial of his application for leave to appeal on April 11,1984, petitioner took no action for over five years. In his first motion for a new trial petitioner had argued, under the principles of Sandstrom v. Montana, 442 U.S. 510, 99 S.Ct. 2450, 61 L.Ed.2d 39 (1979), that the trial judge’s instruction on the issue of malice created an unconstitutional presumption relieving the state of its affirmative burden of proof. Sandstrom, 442 U.S. at 523. Subsequent to the denial of petitioner’s first motion for a new trial in 1983, the United States Supreme Court clarified Sandstrom in Francis v. Franklin, 471 U.S. 307, 105 S.Ct. 1965, 85 L.Ed.2d 344 (1985). The Francis Court addressed itself to “the limited category of criminal prosecutions in which intent is the pivotal element of the crime charged and the only contested issue at trial.” Id. 471 U.S. at 309. The Court in Francis held that “contradictory instructions as to intent — one of which imparts to the jury an unconstitutional understanding of the allocations of burdens of persuasion — create a reasonable likélihood that a juror understood the instructions in an unconstitutional manner, unless other language in the charge explains the infirm language sufficiently to eliminate this possibility.” Francis, 471 U.S. at 324 n. 8. The Court reasoned that if such a reasonable possibility of an unconstitutional understanding exists, “we have no way of knowing that [the defendant] was not convicted on the basis of the unconstitutional instruction.” Francis, 471 U.S. at 324 n. 8, quoting Sandstrom', 442 U.S. at 526. Petitioner, believing Justice Nolan’s denial of his application for leave to appeal was not based on procedural grounds, filed a Petition for a Writ of Habeas Corpus in federal court on October 23, 1989. On February 21, 1990, Justice Nolan entered an amended order, nunc pro tunc to November 23,1983, stating, “The application for leave to appeal is denied for reasons of procedural default.” Petitioner subsequently withdrew his federal habeas corpus petition. Petitioner filed a second motion for a new trial on June 28, 1991. In ruling on petitioner’s second motion for a new trial, Judge Nixon ruled that the jury instructions were unconstitutional and ordered a new trial, basing his decision on Francis. Similar to Justice Wilkins’ concurring opinion in Latimore, 423 Mass. at 139, 667 N.E.2d 818, the Court is concerned by the length of the delay between Justice Nolan’s denial of the petitioner’s application for leave to appeal the denial of his first motion for new trial and Judge Nixon’s granting of a new trial. (“I am troubled that the inordinate delay in petitioner’s retrial was caused by the failure of the process for permitting appellate review of post-conviction challenges.”) Judge Nixon stated in his Memorandum and Order granting a new trial that “with due deference and respect for Justice Nolan’s decision, I rule that defendant’s claim of error on the issue of the malice instruction given at his trial was initially lost, but was, however, resurrected for appellate review after Judge Hurd considered the merits of this claim in the context of a motion for a new trial.” The Court cannot overlook the fact that petitioner’s application for leave to appeal his denial of his first motion for a new trial was erroneously denied on purely procedural grounds when his claim was viable according to Judge Nixon. The nine-year delay in the appellate process, thus, must be determined under the prejudice prong of the modified Barker analysis to determine whether petitioner’s right to due process was violated. V. Assertion of the Right The third factor the Court must consider in determining whether a due process violation has occurred is the petitioner’s assertion of his right to a timely appeal. The Supreme Court rejected in Barker “the rule that a defendant who fails to demand a speedy trial forever waives his right.” 407 U.S. at 528. Instead, the Supreme Court held that whether and how strongly a defendant asserts his right to a speedy trial should be balanced with the other factors. Id. at 528-529. A criminal defendant who has already been convicted usually wants a speedy appeal and has little or no incentive to the delay the outcome. Therefore, we presume that petitioner desired a timely appeal. During the period from 1982 to 1991, petitioner was heard in state court on a motion for a new trial, and on an application for leave to appeal the denial of his motion for a new trial, and he filed a habeas corpus petition in federal court. Under these circumstances, the filing of these motions constitutes a sufficient assertion of petitioner’s right to a timely appeal. VI. Prejudice In determining prejudice petitioner submits that the Supreme Judicial Court incorrectly applied the Doggett standards in this ease. The Supreme Court in Doggett v. United States, 505 U.S. 647, 112 S.Ct. 2686, 120 L.Ed.2d 520 (1992), held that, in the context of an eight and a half year delay between defendant’s indictment and his subsequent arrest, a defendant need not prove prejudice in order to succeed in gaining dismissal of the charges on speedy trial grounds. In cases involving such an inordinate pretrial delay, prejudice is presumed. Id. 505 U.S. at 655. The Supreme Court stated that “We generally have to recognize that excessive delay presumptively compromises the reliability of a trial in ways that neither party can prove or, for that matter, identify.” Id. at 655. The circuit courts have sent conflicting signals as to whether Doggett should apply to post-conviction appellate delay. Smith, 94 F.3d at 212 (“In our view, there is no reason why Barker’s speedy trial analysis should apply to cases of appellate delay but Doggett’s speedy-trial presumption of prejudice should not.”); Mohawk, 20 F.3d at 1487-88 (Doggett analysis is “inapposite” to appellate delay claims); Reiser v. Ryan, 15 F.3d 299, 304 (3rd Cir.) (Uncertain as to Doggett’s relevance), cert. denied, 513 U.S. 926, 115 S.Ct. 313, 130 L.Ed.2d 276 (1994). The reasons for presuming prejudice in the Doggett situation simply do not appertain to circumstances where the delay has occurred between the affirmation of conviction on appeal and a subsequent new trial. When a full trial has occurred, even if there is an inordinate post-trial delay, the record of the trial is preserved. The Court agrees with the Ninth Circuit that petitioner must make some showing on the fourth factor— prejudice — to establish a due process violation. United States v. Tucker, 8 F.3d 673, 676 (9th Cir.1993) (en banc), cert. denied, 510 U.S. 1182, 114 S.Ct. 1230, 127 L.Ed.2d 574 (1994). Therefore, the Doggett presumption of prejudice is not applicable here and petitioner must establish that the delay has caused an impairment of his ability to present his arguments effectively at retrial. Mohawk, 20 F.3d at 1487-88. The burden is on petitioner to demonstrate that any delay impaired his grounds for defense at the retrial. Petitioner contends that the “particularized trial prejudice” was the use of the trial transcripts from the first trial at retrial in place of three live witnesses who could not be cross-examined. All of the prosecution’s eyewitnesses, except for one, were unavailable at retrial. In general, the unavailability of key prosecution witnesses increases the difficulty of the government’s burden. Reading trial transcripts into evidence is not as effective as in-court live testimony. The Court of Appeals for the Ninth Circuit in Mohawk noted that the risk of prejudice after a full-fledged adversarial proceeding is less because there is a complete and reliable record. Mohawk, 20 F.3d at 1488. Petitioner argues that Mohawk’s reasoning is not applicable because his trial counsel in the first ease did an ineffective job of cross-examination of the three unavailable witness. In particular, petitioner contends that the focus of the cross-examination at the first trial was the witnesses’ ability to identify petitioner. The Sixth Circuit in Smith questioned Mohawk’s reliance on evidence obtained in the first trial because the whole point of retrial is that there was something materially wrong with the original trial. 94 F.3d at 212. The court in Harris stated that “[A]n appeal that is inordinately delayed is as much a ‘meaningless ritual’ as an appeal that is adjudicated without the benefit of effective counsel or a transcript of the trial court proceedings.” Harris, 15 F.3d at 1558. Petitioner’s claim that the witnesses were not fully cross-examined in the first trial raises serious due process concerns. The issue of ineffective assistance of counsel in the first trial was not raised on direct appeal nor was it argued in the proceedings before Justice Nolan in 1983. In petitioner’s second motion for a new trial on June 28, 1991, he argued that “The defendant was denied his constitutional rights to the effective assistance of counsel during his trial and especially on his direct appeal by counsel’s failure to object to and raise on direct appeal the clearly reversible error in the trial’s judge’s reasonable doubt instruction.” Judge Nixon based his ruling for a new trial solely on the erroneous jury instruction and did not address the ineffective assistance of counsel claim. For habeas corpus relief based on ineffective assistance of counsel to be warranted a petitioner must demonstrate that there was a reasonable probability that, but for counsel’s unprofessional errors, the result would have been different. Strickland v. Washington, 466 U.S. 668, 694, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984). The nine-year delay resulted in two eyewitnesses to the crime, the bar owner and a patron, being unavailable to testify at retrial, thus necessitating the use of the first trial transcript of these witnesses’ testimony. Thus, the sole question before the Court is whether the use at retrial of the transcripts of the first trial testimony of two unavailable eyewitnesses was prejudicial to petitioner at the second trial. The Supreme Judicial Court based its determination that there was no due process violation by the delay in retrial on the availability of the transcripts from the first trial. The Supreme judicial Court followed the reasoning established by the Ninth Circuit in Mohawk. Whereas “delay of an initial trial compromises reliability because of the risk that exculpatory evidence will be lost — either through the death, disappearance, or fading memory of witnesses____At a second trial, however, ‘[i]f important witnesses have become, for one reason or another, unavailable, their former testimony may be introduced at the second trial____Latimore, 423 Mass. at 134, 667 N.E.2d 818, quoting, United States v. Mohawk, 20 F.3d 1480, 1488 (9th Cir.1994). It is axiomatic that delay resulting in the unavailability of prosecution witnesses usually prejudices the prosecution. This was substantiated here where the retrial resulted in a verdict of second-degree murder rather than in a verdict of first degree murder, which had been obtained in the first trial. A review of the first trial testimony of the two unavailable eyewitnesses shows that the cross-examination established that the bar owner, Joseph Kmiec, did not see the fight start and only observed petitioner and the victim fighting on the floor. The testimony of a bar patron, Edward Doherty, that petitioner “pushed” the victim before the fight ensued was also probed on cross-examination. Doherty furthered testified on cross-examination that he did not see anything in petitioner’s hands. Neither witness testified about anyone possessing a knife nor anyone doing the actual stabbing. The cross-examination reinforced the theme that these two witnesses did not closely observe the fight itself. The petitioner’s assertion that the cross-examination of these two witnesses focused solely on identification is incorrect. Petitioner exercised his right to full cross-examination at the first trial. It is important to note that another bar patron, Paul Salamon, testified at both trials. At each trial Salamon’s testimony provided the crucial description of the fight and the victim’s reaction on realizing he had been stabbed. During retrial, Salamon was cross-examined regarding any possible bias he might possess because he was a friend of the victim. The Court • acknowledges that it is concerned by the delay suffered by petitioner and the consequent unavailability of the two eyewitnesses at the second trial. Petitioner, however, suffered no prejudice ás he was fully accorded his right to cross-examination at the first trial which was preserved by transcript for production at the retrial. After careful review of the trial transcripts and the parties' briefs and oral arguments, the Court concludes that based on the clearly established law as determined by the United States Supreme Court no violation of petitioner’s due process right can be found. VIL CONCLUSION For all of the foregoing reasons, the habeas corpus petition is denied and is hereby dismissed. SO ORDERED. . "Instead, the evidence must convince you of the defendant's guilt to a reasonable and moral certainty; a certainty that convinces your understanding and satisfies your reason and judgment as jurors who are sworn to act conscientiously on the evidence.” . This Court only addresses prejudice impairing the grounds for his defense in the retrial. Petitioner does not raise prejudice based on that he suffered oppressive incarceration pending appeal or that he suffered constitutionally cognizable anxiety and concern while awaiting the outcome of his or her appeal. . The patron’s wife was also unavailable, but the transcript of her first trial testimony was introduced by the defendant in the second trial.
CASELAW
We're sorry Aspose doesn't work properply without JavaScript enabled. Free Support Forum - aspose.com Incorrect Attachment Name for non ASCII character Hi, When processing emails that have attachment names that are not in standard ASCII, they do not have the correct encoding applied. In my attached sample code, There is the same characters in the subject as the attachment name. Things to note. I do supply preferred encoding of UTF-8, and the subject part gets applied, but the attachment name does not. (I think this may be where the issue is). Chinese Character in Attachment Name.zip (5.7 KB) Thanks Charles @ccuster68 If you save the .eml file to .txt file format using MS Outlook, you will get the same output. Could you please share your expected output here for our reference? We will then provide you more information on it. My expected output would be to match the Chinese character as it is displayed in the subject. In the eml file the subject has ‚¡5S¡.xls, which is the same text in the attachment name. The subject converts the character to the Chinese character correct, yet the attachment name does not. The subject seems to return the encoding UTF-8, but the attachment returns blank for the encoding, even though I specify UTF-8 encoding for the preferred encoding when loading the eml file. image.png (9.6 KB) Thanks, Charles @ccuster68 We have logged this problem in our issue tracking system as EMAILNET-40578. You will be notified via this forum thread once this issue is resolved. We apologize for your inconvenience.
ESSENTIALAI-STEM
Bootleggers in the "Roaring Twenties" The 18th Amendment to the Constitution was ratified in 1919 and went into effect in 1920. A huge win for temperance advocates, the new law made alcoholic beverages illegal in America. But it didn't take long for the federal government to realize enforcing the ban would be difficult. Bootlegging, or illegally manufacturing and selling liquor, became a common business venture for willing entrepreneurs. Speakeasies and rum-runners made millions selling illegal alcohol -- and bootlegging gang organizations made even more. Some bootleggers became notorious and their fame outlasted the prohibition law itself, which ended in 1933 with the repeal of the 18th Amendment. 1 Al "Scarface" Capone: Public Enemy Number One Capitalizing on bootlegging opportunities, Al Capone created a hugely successful crime empire called the South Side Gang. His allies filled vice industry posts throughout the country. In Chicago, he gained control over massive networks of bookies, brothels, race tracks, clubs, speakeasies and distilleries. By 1925, his income swelled to more than $100 million a year. So wealthy, he "out-gunned" law enforcement. Capone was listed as "Public Enemy Number One" in 1930. In 1931, he was found guilty of tax evasion and sent to the Alcatraz Correctional Facility in 1932. 2 George “Bugs” Moran: North Side Gang Boss At the beginning of the Prohibition era, George "Bugs" Moran worked as a leader in the infamous North Side Gang of Chicago. When its chief, Dean O'Bannion died in 1920, Moran took the reins and built a bootlegging empire. Though Moran was hugely successful in his own right, he is most recognized for his connection to Al Capone. He and Capone clashed in a gang war that took many civilian lives. The bloody battles continued for years until Capone's gang murdered nearly all of Moran's top men in the St. Valentine's Day Massacre of 1929. 3 George Remus: Attorney Turned Successful Bootlegger George Remus had been a skilled defense attorney in the Midwest for 20 years when he decided that bootlegging would be a more lucrative enterprise. When Prohibition was enacted, he purchased local distilleries and created a drug company. He worked as buyer and seller and then cooked the books to "lose" shipments. His fortune amassed so quickly that he soon had 3,000 employees working for him. His business and legal savvy helped him rake in millions of dollars until his indictment for violating the National Prohibition Act in 1925. Remus would go on to kill his wife when he got out of prison, however, he was found not guilty on grounds of insanity. 4 Roy Olmstead: King of the Puget Sound Bootleggers Roy Olmstead was an officer with the Seattle Police Department when he founded his bootlegging empire. In March of 1920, he was caught and his badge revoked -- but not before he learned valuable bootlegging information. With little competition and geography that made enforcement difficult, his empire quickly grew. Olmstead reportedly made over $200,000 a month and quickly became one of the biggest employers in the region. His bootlegging success continued until he and 89 other defendants were found guilty of violating prohibition laws in 1925. The case was America's largest trial under the 18th Amendment.
FINEWEB-EDU
AI Researcher Anca Dragan on Helping Robots Understand Humans When humans and robots cross paths, the results aren’t just frustrating—the autonomous car, say, that’s too shy to turn left—they can also be fatal. Consider last year’s Uber crash, in which the self-driving algorithms weren’t coded to yield to an unexpected human jaywalker. At the WIRED25 conference Friday, Anca Dragan, a professor who studies human-robot interaction at UC Berkeley, spoke about what it takes to avoid those kinds of problems. Her interest is in what happens when robots graduate beyond virtual worlds and wide-open test tracks, and start dealing with unpredictable humans. “It turns out that really complicates matters,” she says. The issues go beyond simply teaching robots to treat humans as obstacles to be avoided. Instead, robots need to be given a predictive model of how humans behave. That isn’t easy; even to each other, humans are basically black boxes. But the work done in Dragan’s lab revolves around a fundamental insight: “Humans are not arbitrary, because we’re actually intentional beings,” she says. Her group designs algorithms that help robots figure out our goals: that we’re trying to reach that door or pass on the freeway or take that turn. From there, a robot can begin to infer what actions you’ll take to get there and how best to avoid cutting you off. It’s like that song, Dragan says: “Every step you take; every move you make” reveals your desires and intentions, and also the next moves you might take or make to get there. Still, sometimes it’s impossible for robots and humans to figure out what the other will do next. Dragan gives the example of a robot driver and a human one pulling up to an intersection at the same exact moment. How do you avoid a stalemate or crash? One potential fix is to teach robots social cues. Dragan might have the robocar inch back a bit—a signal to the human driver that it’s OK for them to go first. It’s one step toward getting us all to play a bit nicer.
NEWS-MULTISOURCE
Next: , Previous: , Up: Profiling   [Contents][Index] 8.7 Using mdprof The user interface of the deep profiler is a browser. To display the information contained in a deep profiling data file (which will be called Deep.data unless you renamed it), start up your browser and give it a URL of the form http://server.domain.name/cgi-bin/mdprof_cgi?/full/path/name/Deep.data. The server.domain.name part should be the name of a machine with the following qualifications: it should have a web server running on it, and it should have the ‘mdprof_cgi’ program installed in the web server’s CGI program directory. (On many Linux systems, this directory is /usr/lib/cgi-bin.) The /full/path/name/Deep.data part should be the full path name of the deep profiling data file whose data you wish to explore. The name of this file must not have percent signs in it, and it must end in the suffix .data. When you start up ‘mdprof’ using the command above, you will see a list of the usual places where you may want to start looking at the profile. Each place is represented by a link. Clicking on and following that link will give you a web page that contains both the profile information you asked for and other links, some of which present the same information in a different form and some of which lead to further information. You explore the profile by clicking on links and looking at the resulting pages. The deep profiler can generate several kinds of pages. The menu page The menu page gives summary information about the profile, and the usual starting points for exploration. Clique pages Clique pages are the most fundamental pages of the deep profiler. Each clique page presents performance information about a clique, which is either a single procedure or a group of mutually recursive procedures, in a given ancestor context, which in turn is a list of other cliques starting with the caller of the entry point of the clique and ending with the clique of the ‘main’ predicate. Each clique page lists the closest ancestor cliques, and then the procedures of the clique. It gives the cost of each call site in each procedure, as well as the cost of each procedure in total. These costs will be just those incurred in the given ancestor context; the costs incurred by these call sites and procedures in other ancestor contexts will be shown on other clique pages. Procedure pages Procedure pages give the total cost of a procedure and its call sites in all ancestor contexts. Module pages Module pages give the total cost of all the procedures of a module. Module getters and setters pages These pages identifies the getter and setter procedures in a module. Getters and setters are simply predicates and functions that contain ‘_get_’ and ‘_set_’ respectively in their names; they are usually used to access fields of data structures. Program modules page The program modules page gives the list of the program’s modules. Top procedure pages Top procedure pages identify the procedures that are most expensive as measured by various criteria. Procedure caller pages A procedure caller page lists the call sites, procedures, modules or cliques that call the given procedure. When exploring a procedure’s callers, you often want only the ancestors that are at or above a certain level of abstraction. Effectively you want to draw a line through the procedures of the program, such that you are interested in the procedures on or above the line but those below the line. Since we want to exclude procedures below the line from procedure caller pages, we call this line an exclusion contour. You can tell the deep profiler where you want to draw this line by giving it a ‘exclusion contour file’. The name of this file should be the same as the name of the deep profiling data file, but with the suffix ‘.data’ replaced with ‘.contour’. This file should consist of a sequence of lines, and each line should contain two words. The first word should be either ‘all’ or ‘internal’; the second should the name of a module. If the first word is ‘all’, then all procedures in the named module are below the exclusion contour; if the first word is ‘internal’, then all internal (non-exported) procedures in the named module are below the exclusion contour. Here is an example of an exclusion contour file. all bag all list all map internal set Next: , Previous: , Up: Profiling   [Contents][Index]
ESSENTIALAI-STEM
HIIT Workout - group of people in gym while exercising Image by Geert Pieters on Unsplash.com High-intensity Interval Training (hiit) Explained In the pursuit of fitness and health, many individuals are constantly seeking new and effective ways to optimize their workout routines. One popular method that has gained significant traction in recent years is High-intensity Interval Training, commonly known as HIIT. This workout strategy has been praised for its efficiency and effectiveness in achieving fitness goals in a shorter amount of time compared to traditional exercise routines. Let’s delve into the details of HIIT and understand why it has become a go-to choice for many fitness enthusiasts. The Basics of HIIT HIIT involves alternating between short bursts of intense exercise and periods of rest or lower-intensity exercise. The key principle behind HIIT is to push your body to its limits during the high-intensity intervals, followed by brief recovery periods to allow for partial or full recovery before the next intense interval. This cycle is typically repeated for a set number of rounds or a specific duration, making HIIT a time-efficient workout option for those with busy schedules. Benefits of HIIT 1. Efficient Fat Burning: One of the primary benefits of HIIT is its ability to torch calories and promote fat loss in a shorter amount of time. The intense bursts of exercise elevate your heart rate and metabolism, leading to increased calorie burn during and after the workout. 2. Improved Cardiovascular Health: HIIT has been shown to enhance cardiovascular fitness by challenging the heart and lungs with intense intervals of exercise. Over time, regular HIIT sessions can improve your heart’s efficiency in pumping blood and your body’s capacity to utilize oxygen during physical activity. 3. Time-Saving Workouts: With HIIT, you can achieve significant fitness gains in a fraction of the time compared to longer, steady-state workouts. This makes HIIT an attractive option for individuals looking to maximize their workout efficiency without spending hours in the gym. 4. Boosted Metabolism: The intense nature of HIIT can elevate your metabolic rate even after you’ve finished your workout. This phenomenon, known as excess post-exercise oxygen consumption (EPOC), means that your body continues to burn calories at an elevated rate post-exercise to aid in recovery and replenish energy stores. How to Incorporate HIIT into Your Routine To reap the benefits of HIIT, it’s essential to structure your workouts effectively. Here are some key tips for incorporating HIIT into your fitness routine: – Choose Your Exercises Wisely: HIIT can be performed with a variety of exercises, including bodyweight movements, sprints, cycling, or even using equipment like kettlebells or battle ropes. Select exercises that target multiple muscle groups and allow for high-intensity effort. – Set Intervals and Rest Periods: Determine the work-to-rest ratio that suits your fitness level and goals. For example, a common HIIT protocol is 20 seconds of intense exercise followed by 10 seconds of rest, repeated for several rounds. Adjust the intervals and rest periods based on your fitness level and progression. – Monitor Intensity: During the high-intensity intervals, aim to work at a level that feels challenging but sustainable for the duration of the interval. Listen to your body and adjust the intensity as needed to maintain proper form and effort. – Stay Consistent: Like any workout regimen, consistency is key to seeing results with HIIT. Aim to incorporate HIIT sessions into your weekly routine and gradually increase the intensity and duration as your fitness improves. Incorporating HIIT into your fitness routine can offer a time-efficient and effective way to achieve your fitness goals. By leveraging the principles of high-intensity intervals and strategic rest periods, you can maximize your workout efficiency and experience the benefits of this dynamic training approach. Give HIIT a try and discover the transformative power of this popular workout method. Similar Posts
ESSENTIALAI-STEM
Exploring the Intricacies of Molecular Biology: Unlocking the Secrets of Life   In the vast expanse of scientific inquiry, few fields hold as much promise and intrigue as molecular biology. At its core, molecular biology delves into the fundamental processes that govern life at its most basic level – the molecular mechanisms that underpin biological phenomena. From the intricacies of DNA replication to the elegant dance of https://molecularbiology.io/ proteins within cells, molecular biology unravels the mysteries of life with each discovery. Unveiling the Blueprint of Life Central to molecular biology is the exploration of the genetic material that serves as the blueprint of life: deoxyribonucleic acid, or DNA. This double-helix molecule, with its intricate structure of nucleotide bases, holds the instructions for building and maintaining an organism. The elucidation of DNA’s structure by James Watson and Francis Crick in 1953 marked a watershed moment in science, paving the way for decades of exploration into the genetic code. Deciphering the Genetic Code The genetic code, written in the language of nucleotide sequences, governs the synthesis of proteins – the workhorses of the cell. Molecular biologists painstakingly decode this language, revealing how genes are transcribed into messenger RNA (mRNA) and translated into functional proteins. Through techniques such as polymerase chain reaction (PCR) and DNA sequencing, researchers probe the secrets encoded within the genome, shedding light on the mechanisms of inheritance and the diversity of life. From Genes to Proteins: The Central Dogma The central dogma of molecular biology, articulated by Francis Crick in 1958, outlines the flow of genetic information within cells. According to this principle, DNA is transcribed into mRNA, which in turn is translated into proteins. This unidirectional flow of information forms the backbone of cellular processes, from the synthesis of enzymes and structural proteins to the regulation of gene expression. Molecular biologists dissect this intricate machinery, unraveling the mechanisms that govern gene regulation, RNA processing, and protein folding. Beyond the Genome: Epigenetics and Gene Regulation While the genome provides the blueprint for life, it is the epigenome – a complex network of chemical modifications to DNA and histone proteins – that orchestrates gene expression. Epigenetic modifications, such as DNA methylation and histone acetylation, regulate when and where genes are turned on or off, influencing cellular differentiation, development, and disease. Molecular biologists probe the dynamic interplay between the genome and the epigenome, unraveling the role of epigenetics in health and disease. Frontiers of Molecular Biology: CRISPR-Cas9 and Synthetic Biology In recent years, molecular biology has witnessed groundbreaking advances that promise to revolutionize the field. CRISPR-Cas9, a revolutionary gene-editing technology derived from bacterial immune systems, allows precise manipulation of the genome with unprecedented ease and efficiency. Molecular biologists harness CRISPR-Cas9 to edit genes, modulate gene expression, and probe the function of specific genetic elements, opening new avenues for research and therapeutic applications. Simultaneously, synthetic biology – the design and construction of biological systems from standardized genetic components – offers the prospect of engineering living organisms with novel functions and capabilities. From engineered microbes for bioremediation and biofuel production to designer cells for therapeutic purposes, synthetic biology blurs the boundaries between biology and engineering, pushing the limits of what is possible in the realm of life science. Conclusion In the ever-evolving landscape of scientific discovery, molecular biology stands as a beacon of knowledge, illuminating the mysteries of life with each new revelation. From the elegant structure of DNA to the intricate dance of molecules within cells, molecular biologists continue to unravel the secrets of the living world, paving the way for transformative advances in medicine, biotechnology, and beyond. Comments No comments yet. Why don’t you start the discussion? Leave a Reply Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
1 0 Fork 0 Finds and hardlinks duplicate files with same relative path. https://aweirdimagination.net/2024/01/28/hardlink-identical-directory-trees/ Go to file Daniel Perelman db3e3d74ce Credit StackExchange answer on stat to count links. 2024-02-01 17:52:35 -08:00 LICENSE Initial commit 2024-02-01 17:52:35 -08:00 README.md Initial commit. 2024-02-01 17:52:35 -08:00 hardlink-dups-by-name.sh Credit StackExchange answer on stat to count links. 2024-02-01 17:52:35 -08:00 README.md hardlink-dups-by-name Searches two directory trees in parallel and hardlinks identical files, only comparing files with identical relative paths. USAGE: hardlink-dups-by-name.sh [--clobber=none|first|second] [--verbose] [--] search_dir other_dir
ESSENTIALAI-STEM
Maria Sharapova Moves to Within Two Wins of Second Wimbledon Tennis Title Maria Sharapova is two wins from her second Wimbledon tennis title. The 2004 champion defeated No. 24 seed Dominika Cibulkova of Slovakia 6-1, 6-1 yesterday to set up a semifinal against Sabine Lisicki, the first German woman in 12 years to get this close to a Grand Slam championship. Lisicki, a wild card ranked 62nd in the world, beat France ’s Marion Bartoli , the No. 9 seed, 6-4, 6-7 (4-7), 6-1. Fifth-seeded Sharapova is 12-3 in Grand Slam quarterfinals and 4-0 at the All England Club, where before this year she failed to reach the quarterfinals since 2006. In 2011, the 24- year-old Russian won a tournament in Rome and was runner-up in Miami. She also reached her first French Open semifinal and the last four at Indian Wells , California . “I’ve worked really hard to get in this stage, but I’m not saying this is where I want to end,” Sharapova told reporters. “I want to keep going.” Tomorrow’s other semifinal will be between Petra Kvitova and Victoria Azarenka , who will meet for the second straight year at the tournament. The men’s quarterfinals are scheduled today, with six-time champion Roger Federer of Switzerland playing 12th-seeded Jo- Wilfried Tsonga from France on Centre Court and No. 2 seed Novak Djokovic from Serbia facing unseeded Australian 18-year-old Bernard Tomic on Court No. 1. Murray, Nadal After those matches, Britain’s Andy Murray will seek to overcome Spain ’s Feliciano Lopez on Centre Court and defending champion Rafael Nadal , another Spaniard, will take on American 10th seed Mardy Fish on Court No. 1. Yesterday, Kvitova beat Bulgarian Tsvetana Pironkova 6-3, 6-7 (5-7), 6-2, while No. 4 seed Azarenka of Belarus advanced with a 6-3, 6-1 win against 80th-ranked Tamira Paszek of Austria. It was the first time since 1913 that all eight women’s quarterfinalists at Wimbledon came from Europe . Last year, Kvitova beat Azarenka 7-5, 6-0 in the third round and went on to the semifinals, where she lost to eventual champion Serena Williams . Lisicki recovered after squandering three match points in the second set, which Bartoli won in a tiebreaker, to become the first German woman to reach the semifinal of a Grand Slam since 22-time major singles champion Steffi Graf in 1999. “I was disappointed with myself,” Lisicki said in a televised interview. “But I felt that I was the better player and I knew I had to focus and fight in the third set.” Thunder Storm Thunder, lightning and heavy rain accompanied part of Lisicki’s match, which was watched from the Royal Box by U.S. Open golf champion Rory McIlroy. The 21-year-old Lisicki, who has delivered the fastest serve of the women’s tournament at 124 miles-per-hour (199kph), beat French Open champion Li Na in the second round. Lisicki reached the quarterfinals two years ago and missed last year’s Wimbledon with an ankle injury that kept her away from the tour for five months. She earned a wild-card entry from the All England Club this year after winning a grass-court event in Birmingham, England, this month. Bartoli, the 2007 runner-up, beat defending champion Serena Williams to reach the quarterfinals, while Pironkova ousted five-time champion Venus Williams for the second year in a row. The results meant the quarterfinals didn’t include a Williams sister for the first time since 2006. The Americans had taken nine of the past 11 singles titles at Wimbledon and have also won four doubles championships together. To contact the reporter on this story: Danielle Rossingh at Wimbledon through the London sports desk at drossingh@bloomberg.net To contact the editor responsible for this story: Chris Elser at celser@bloomberg.net
NEWS-MULTISOURCE
Common Questions about WARTS • Common Questions about WARTS What are Warts? Warts are one of the most unattractive and embarrassing skin condition which is explained as infections on the top layer of the skin. These are usually found at such body known as knees, elbows, feet, and fingers, additionally, these are small in size. What are the symptoms of Warts? The main and foremost symptoms of the Warts are bleeding, changes in appearance, severe pain, and comes back after prior removal. If you notice any one of the sign then you should immediately contact your doctor, he will guide you the wart removal treatment. It can be done through medicines or a medical procedure. What are the reasons behind Warts? Warts are caused by skin infection known as Human Papillomavirus (HPV). This virus additionally explained as a sexually transmitted infection but warts are not caused by sexual intercourse. Additionally, this virus will enter through a minor scratch on the top layer of the skin. HPV is a virus which rapidly grows on the top layer of the skin. It is basically keratin that is a hard protein which is present on the layer of the human skin. Many people claim that this is the condition which can be caused due to spread from skin to skin. It is usually caused when you should wear the clothes of the affected person and shaving your legs with a dirty blade. Are Warts dangerous and contagious? Yes, of course, warts are contagious because these can spread skin to skin such as wearing clothes of other persons who are suffering from this condition. Moreover, no, warts are not dangerous because you can simply treat them with home remedies such as garlic and you can simply use duct tape. What are the different types of Warts? The warts are of many types such as Common, Flat warts, Molluscum contagiosum, Plantar warts, and Condyloma. But the majority of doctors reveal that these can classify by location on the body and their appearance. In which common warts are usually developed at legs, knees, and elbows that are small in size. Additionally, flat warts affect the legs of women and children that are liquidy white in color. Moreover, the plantar warts are developed on the feet and spread due to pressure during a walk. The most popular type of warts is condyloma that is defined as sexually transmitted infections caused due to sexual intercourse. How to treat common warts? There are various ways to treat common warts, for example, you should use a pumice stone for exfoliation and you can apply a natural wart removal cream. You should also go with laser treatment which will give you permanent results. How to get rid of genital warts? You must ask your doctor for the proper treatment, he will guide you according to the type and reason behind. But you can get rid of genital warts with essential oils such as tea tree and castor oil. Or you can simply apply apple vinegar and topical cream for removal. It is a good idea to keep the area clean and dry because otherwise, it can worsen your condition. • And before anyone asks: TCA DOES NOT REMOVE A WART   Powered by Vaskir
ESSENTIALAI-STEM
IBM BASIC From Wikipedia, the free encyclopedia   (Redirected from BASICA) Jump to: navigation, search Five 8 KB ROM DIP chips and an empty 8 KB ROM expansion socket, on an IBM PC motherboard. Four chips hold Cassette BASIC, and one holds the BIOS. The IBM Personal Computer Basic, commonly shortened to IBM BASIC, is a programming language first released by IBM with the IBM Personal Computer (model 5150) in 1981. IBM released four different versions of the Microsoft BASIC interpreter, licensed from Microsoft for the PC and PCjr. They are known as Cassette BASIC, Disk BASIC, Advanced BASIC (BASICA), and Cartridge BASIC. Versions of Disk BASIC and Advanced BASIC were included with IBM PC DOS up to PC DOS 4. In addition to the features of an ANSI standard BASIC, the IBM versions offered support for the graphics and sound hardware of the IBM PC line. Source code could be typed in with a full screen editor, and very limited facilities were provided for rudimentary program debugging. IBM also released a version of the Microsoft BASIC compiler for the PC, concurrently with the release of PC DOS 1.10 in 1982. IBM Cassette BASIC[edit] IBM Cassette BASIC IBM Cassette BASIC.png Appeared in 1981 Developer Microsoft (for IBM) Influenced IBM Disk BASIC, IBM BASICA, GW-BASIC IBM Cassette BASIC came in 32 kilobytes (KB) of read-only memory (ROM), separate from the 8 KB BIOS ROM of the original IBM PC, and did not require an operating system to run. Cassette BASIC provided the default user interface if there was no floppy disk drive installed, or if the boot code did not find a bootable floppy disk at power up. The name Cassette BASIC came from its use of cassette tapes rather than floppy disks to store programs and data. Cassette BASIC was built into the ROMs of the original PC and XT, and early models in the PS/2 line. It only supported loading and saving programs to the IBM cassette tape interface, which was unavailable on models after the original Model 5150. The entry-level version of the 5150 came with just 16 KB of random-access memory (RAM), which was sufficient to run Cassette BASIC. However, Cassette BASIC was rarely used because few PCs were sold without a disk drive, and most were sold with PC DOS and sufficient RAM to at least run Disk BASIC—many could run Advanced BASIC as well. There were three versions of Cassette BASIC: C1.00 (found on the early IBM PCs with 16k-64k motherboards), C1.10 (found on all later IBM PCs, XTs, ATs, and PS/2s), and C1.20 (found on the PCjr). IBM Disk BASIC[edit] IBM Disk BASIC IBM Disk BASIC.png Appeared in 1981 Developer Microsoft (for IBM) Influenced by IBM Cassette BASIC Influenced IBM BASICA, GW-BASIC IBM Disk BASIC (BASIC.COM) was included in the original IBM PC DOS and required 32 KB of RAM, DOS and the 32 KB Cassette BASIC ROM to run. The name Disk BASIC came from its use of floppy disks rather than cassette tapes to store programs and data. Disk-based code corrected errata in the ROM-resident code and added floppy disk and serial port support. Neither version of IBM BASIC would run on non-IBM computers or later IBM models, since those lack the needed ROM BASIC. Disk BASIC could be identified by its use of the letter D preceding the version number. It added disk support and some features lacking in Cassette BASIC, but did not include the extended sound/graphics functions of BASICA. The primary purpose of Disk BASIC was as a "lite" version for IBM PCs with only 64k of memory. By 1986, all new PCs shipped with at least 256k and DOS versions after 3.00 reduced Disk BASIC to only a small stub that called BASICA.COM for compatibility with batch files. IBM Advanced BASIC[edit] IBM Advanced BASIC (BASICA) IBM BASICA.png Appeared in 1981 (1981) Developer Microsoft (for IBM) Influenced by IBM Cassette BASIC, IBM Disk BASIC Influenced GW-BASIC Platform IBM Personal Computer OS PC DOS IBM Advanced BASIC (BASICA.COM) was also included in the original IBM PC DOS, and required 48 KB of RAM and the ROM-resident code of Cassette BASIC. It added functions such as diskette file access, storing programs on disk, monophonic sound using the PC's built-in speaker, graphics functions to set and clear pixels, draw lines and circles, and set colors, and event handling for communications and joystick presses. BASICA would not run on non-IBM computers (even so-called "100% compatible" machines) or later IBM models, since those lack the needed ROM BASIC. BASICA versions were the same as their respective DOS, beginning with v1.00 and ending with v3.30. The early versions of BASICA did not support subdirectories and some graphics commands functioned slightly differently. As an example, if the LINE statement was used to draw lines that trailed off-screen, BASIC would merely intersect them with the nearest adjacent line while in BASIC 2.x and up, they went off the screen and did not intersect. The PAINT command in BASIC 1.x begins filling at the coordinate specified and expands outward in alternating up and down directions while in BASIC 2.x it fills everything below the starting coordinate and then after finishing, everything above it. BASIC 1.x's PAINT command also makes use of the system stack for storage and when filling in complex areas, it was possible to produce an OVERFLOW error. To remedy this, the CLEAR statement can be used to expand BASIC's stack (128 bytes is the default size). BASIC 2.x does not use the stack when PAINTing and thus is free of this problem. Compaq BASIC 1.13 was the first standalone BASIC for the PC (that did not require Cassette BASIC to run) as well as the only version of BASIC besides IBM BASICA 1.00 and 1.10 to use FCBs and include the original LINE statement with intersecting lines (the PAINT statement in Compaq BASIC 1.13 worked like in all later versions of BASICA/GW-BASIC, using the new fill algorithm and no stack). Early versions of PC DOS included several sample BASIC programs demonstrating the capabilities of the PC, including the BASICA game DONKEY.BAS. GW-BASIC is identical to BASICA, with the exception of including the Cassette BASIC code in the program, thus allowing it to run on non-IBM computers and later IBM models that lack Cassette BASIC in ROM. IBM PCjr Cartridge BASIC[edit] A ROM cartridge version of BASIC was only available on the IBM PCjr (shipped 1984) and supported the additional graphics modes and sound capabilities possible on that platform.[1] It is a superset of advanced BASIC.[2] Cartridge BASIC can only operate within the first 128k of memory on the PCjr and will not work with expansion RAM (e.g. the DEF SEG function cannot be used to point to memory segments above &H1FF0) Cartridge BASIC is activated by typing BASICA at the DOS prompt. Conversely, IBM BASICA versions 2.1 and up will refuse to run if it detects a PCjr (but can be patched to work around this). Operation[edit] Cassette BASIC loads when a PC or PCjr is booted without a bootable disk or cartridge. Disk BASIC and Advanced BASIC load when their command name (BASIC and BASICA respectively) is typed at a DOS command prompt (except PCjr, which activates Cartridge BASIC instead), with some optional parameters to control allocation of memory. When loaded, a sign-on identification message displays the program version number, and a full-screen text editor starts (see images, right). The function keys are assigned common commands, which display at the bottom of the screen. Commands may be typed in to load or save programs, and expressions can be typed in and executed in direct (immediate) mode. If a line of input starts with a number, the language system stores the following line of text as part of program source, allowing a programmer to enter in an entire program line by line, entering line numbers before each statement. When listed on screen, lines are displayed in order of increasing line number. Changes can be made to a displayed line of program source code by moving the cursor to the line with the cursor keys, and typing over the on-screen text. Program source is stored internally in a tokenized form, where keywords are replaced with a single byte token, to save space and execution time. Programs may be saved in compact tokenized form, or optionally saved as DOS text ASCII files that can be viewed and edited with other programs. Like most other DOS applications, IBM BASIC is a text-mode program and has no features for windows, icons, mouse support, or cut and paste editing. Successors[edit] GW-BASIC, launched in 1983, was a disk-based Microsoft product distributed with non-IBM MS-DOS computers, and supported all the graphics modes and features of BASICA on computers that did not have the IBM Cassette BASIC. The successor to BASICA for MS-DOS and PC DOS versions was QBasic, launched in 1991, which was a stripped-down version of the Microsoft QuickBASIC compiler that could not save executable files. See also[edit] References[edit] 1. ^ Readers' Feedback: IBM BASIC Versions, Compute! Magazine, No. 78, November 1986, p. 8, retrieved December 23, 2011 2. ^ IBM. PCjr Cartridges Announcement Letter. 1983-11-01 ([1]). External links[edit]
ESSENTIALAI-STEM
The Patents Act, 1970/Chapter 8 * 43. Grant and sealing of patent * 44.Amendment of patent granted to deceased applicant * 45.Date of patent * 46.Form, extent and effect of patent * 47.Grant of patents to be subject to certain conditions * 48.Rights of patentee * 49.Patent rights not infringed when used on foreign vessels, etc., temporarily or accidentally in India * 50. Rights of co-owners of patents * 51.Power of Controller to give directions to co-owners * 52.Grant of patent to true and first inventor where it has been obtained by another in fraud of him * 53.Term of patent
WIKI
Pagan the Butler Pagan the Butler (Paganus Pincerna; died around 1149) was lord of Oultrejordain in the Kingdom of Jerusalem from around 1126. He was first mentioned as the butler of Baldwin II of Jerusalem in 1120. He ordered the erection of Kerak Castle which became his seat in 1142. Career Pagan was an influential retainer of Baldwin II of Jerusalem who mounted the throne in 1118. Baldwin soon reorganized the royal court and appointed his faithful supporters to the highest offices. Pagan was first mentioned as the king's butler in 1120. Hans Eberhard Mayer argues that Pagan the Butler (who was mentioned in 1120) and Pagan of Montreal (mentioned in 1126) were not identical, but other historians have not accepted Mayer's view. Pagan replaced Roman of Le Puy as lord of Oultrejordain by 1126. According to a royal charter which was issued in 1161, Pagan was the first lord of Oultrejordain, which implies that Le Puy had not ruled the whole territory of the lordship. Initially, Pagan had his seat in the castle of Montréal. After he could not prevent a band of Syrian soldiers from making a raid across the Jordan River, he decided to build a new fortress at a triangular plateau at the Wadi al-Karak which was located closer to the Dead Sea and Jerusalem. He transferred his seat to the newly built Kerak Castle in 1142. Pagan died in the late 1140s. He was succeeded by his nephew Maurice.
WIKI
Vi gör det igen Vi gör det igen was released on 21 April 2010, and is a studio album by Scotts. The album consists of a recording of the song "In a Moment Like This", Denmark's Eurovision Song Contest 2010 entry, here performed by Scotts as a duet with Erica Sjöström from the Drifters, and a recording of The Playtones song "Sofie" from the Dansbandskampen 2009 finals. The album also consists of a recording of the 1966 Sven-Ingvars song, "Kristina från Vilhelmina". The song "Jag ångrar ingenting" charted at Svensktoppen for one week on 25 July 2010, before getting knocked out of chart. Personnel * Henrik Strömberg - vocals, guitar * Claes Linder - keyboards, choir * Roberto Mårdstam - bass, choir * Per-Erik "Lillen" Tagesson - drums * Production and arrangement: Roberto Mårdstam, Claes Linder * Song production/Choir arrangement: Henrik Sethsson * Recorded in Studio Scotts, Lidköping, Sweden * Mixed by: Plec i Panicroom * Engineer assistant: Ermin Harmidović * Executive producer: Bert Karlsson * The song "Jennie" produced and arranged by Henrik Sethsson och Pontus Assarsson and mixed by Jörgen Ringqvist * Photography: Karin Törnblom * Graphic form: R & R Reproduktion.se
WIKI
Browse Source add mutt config master Yorick van Pelt 5 years ago parent commit 92bae59a20 1. 2   install.sh 2. 83   mutt/.mutt/colors 3. 8   mutt/.mutt/creds 4. 88   mutt/.mutt/gpg 5. 4   mutt/.mutt/mailboxes 6. 28   mutt/.mutt/muttrc 7. BIN   mutt/.mutt/yorick_pass.gpg 2 install.sh @ -1,4 +1,4 @@ #!/usr/bin/env nix-shell #!nix-shell -i bash -p stow stow -d `dirname $0` -t ~ nix git x pentadactyl i3 gtk gpg stow -d `dirname $0` -t ~ nix git x pentadactyl i3 gtk gpg mutt nix-build -A $(hostname -s) 83 mutt/.mutt/colors @ -0,0 +1,83 @@ # -- # {{{1 # # File : mail/mutt/colours # Maintainer : Felix C. Stegerman <flx@obfusk.net> # Date : 2014-08-22 # # Copyright : Copyright (C) 2014 Felix C. Stegerman # Licence : GPLv3+ # # Transparency edit : Yorick van Pelt, 2016 # -- # }}}1 # index, ... color error brightred default color indicator black white color message brightyellow default color normal default default color status brightwhite blue color tree red default # pager color attachment brightyellow default color hdrdefault cyan default color markers brightred default color quoted green default color search black white color signature blue default color tilde blue default # headers color header white default "^Subject:" color header brightred default "^From:" color header brightyellow default "^Date:" color header brightgreen default "^To:" color header green default "^Cc:" # index highlight # * new mail # * mail sent my me color index blue default "~(~P)" # threads posted in color index green default "~P" # my messages color index yellow default "~(~N)" # in thread w/ new color index brightyellow default "~N" # new messages color index magenta default "~(~F)" # in thread w/ flagged color index red default "~(~F) ~N" # new in thread w/ flagged color index brightred default "~F" # flagged messages color index cyan default "~D" # deleted messages color index brightwhite default "~T" # tagged messages # body highlight # * email addresses # * http(s), ftp # # * bold [nroff] # * underline [nroff] # # * *bold* [disabled] # * _underline_ [disabled] # * /italic/ [disabled] color body brightred default \ "[\-\.+_a-zA-Z0-9]+@[\-\.a-zA-Z0-9]+" color body brightblue default \ "(https?|ftp)://[\-\.,/%~_:?&=\#a-zA-Z0-9]+" color bold brightwhite default color underline brightwhite default # color body brightwhite default "[*]+[^*]+[*]+" # color body brightwhite default "_+[^_]+_+" # color body brightwhite default "/+[^/]+/+" 8 mutt/.mutt/creds @ -0,0 +1,8 @@ set my_pass = "`gpg -q --no-tty --batch -d ~/.mutt/yorick_pass.gpg`"" set spoolfile = "imaps://yorick:$my_pass@pennyworth.yori.cc/INBOX" set realname = "Yorick van Pelt" set from = "Yorick van Pelt <yorick@yorickvanpelt.nl>" set folder = "imaps://pennyworth.yori.cc/" set smtp_url = "smtp://yorick@pennyworth.yori.cc:587/" set smtp_pass = "$my_pass" 88 mutt/.mutt/gpg @ -0,0 +1,88 @@ # -*-muttrc-*- # # Command formats for gpg. # # This version uses gpg-2comp from # http://70t.de/download/gpg-2comp.tar.gz # # $Id$ # # %p The empty string when no passphrase is needed, # the string "PGPPASSFD=0" if one is needed. # # This is mostly used in conditional % sequences. # # %f Most PGP commands operate on a single file or a file # containing a message. %f expands to this file's name. # # %s When verifying signatures, there is another temporary file # containing the detached signature. %s expands to this # file's name. # # %a In "signing" contexts, this expands to the value of the # configuration variable $pgp_sign_as. You probably need to # use this within a conditional % sequence. # # %r In many contexts, mutt passes key IDs to pgp. %r expands to # a list of key IDs. # Note that we explicitly set the comment armor header since GnuPG, when used # in some localiaztion environments, generates 8bit data in that header, thereby # breaking PGP/MIME. # decode application/pgp set pgp_decode_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - %f" # verify a pgp/mime signature set pgp_verify_command="gpg --status-fd=2 --no-verbose --quiet --batch --output - --verify %s %f" # decrypt a pgp/mime attachment set pgp_decrypt_command="gpg --status-fd=2 %?p?--passphrase-fd 0? --no-verbose --quiet --batch --output - %f" # create a pgp/mime signed attachment # set pgp_sign_command="gpg-2comp --comment '' --no-verbose --batch --output - %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f" set pgp_sign_command="gpg --no-verbose --batch --quiet --output - %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f" # create a application/pgp signed (old-style) message # set pgp_clearsign_command="gpg-2comp --comment '' --no-verbose --batch --output - %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? %f" set pgp_clearsign_command="gpg --no-verbose --batch --quiet --output - %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? %f" # create a pgp/mime encrypted attachment # set pgp_encrypt_only_command="pgpewrap gpg-2comp -v --batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" set pgp_encrypt_only_command="pgpewrap gpg --batch --quiet --no-verbose --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f" # create a pgp/mime encrypted and signed attachment # set pgp_encrypt_sign_command="pgpewrap gpg-2comp %?p?--passphrase-fd 0? -v --batch --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" set pgp_encrypt_sign_command="pgpewrap gpg %?p?--passphrase-fd 0? --batch --quiet --no-verbose --textmode --output - --encrypt --sign %?a?-u %a? --armor --always-trust -- -r %r -- %f" # import a key into the public key ring set pgp_import_command="gpg --no-verbose --import %f" # export a key from the public key ring set pgp_export_command="gpg --no-verbose --export --armor %r" # verify a key set pgp_verify_key_command="gpg --verbose --batch --fingerprint --check-sigs %r" # read in the public key ring set pgp_list_pubring_command="gpg --no-verbose --batch --quiet --with-colons --with-fingerprint --with-fingerprint --list-keys %r" # read in the secret key ring set pgp_list_secring_command="gpg --no-verbose --batch --quiet --with-colons --with-fingerprint --with-fingerprint --list-secret-keys %r" # fetch keys # set pgp_getkeys_command="pkspxycwrap %r" # pattern for good signature - may need to be adapted to locale! # set pgp_good_sign="^gpgv?: Good signature from " # OK, here's a version which uses gnupg's message catalog: # set pgp_good_sign="`gettext -d gnupg -s 'Good signature from "' | tr -d '"'`" # This version uses --status-fd messages set pgp_good_sign="^\\[GNUPG:\\] GOODSIG" # pattern to verify a decryption occurred set pgp_decryption_okay="^\\[GNUPG:\\] DECRYPTION_OKAY" 4 mutt/.mutt/mailboxes @ -0,0 +1,4 @@ set record="=Sent" set postponed="=Drafts" set trash="=Archive" mailboxes =INBOX =Archive =Sent =Spam =Trash 28 mutt/.mutt/muttrc @ -0,0 +1,28 @@ source ~/.mutt/colors source ~/.mutt/gpg source ~/.mutt/mailboxes source ~/.mutt/creds set edit_headers set auto_tag set imap_servernoise unset imap_passive set mail_check = 60 set header_cache = ~/.mutt/hcache set message_cachedir = ~/.mutt/msg_cache set net_inc = 5 set sort = threads set sort_browser = date set sort_aux = reverse-last-date-received set sidebar_width= 10 set pgp_verify_sig set pgp_replysign set pgp_sign_as = DC014A15 ifdef ENCRYPT_SELF set pgp_encrypt_self set pgp_use_gpg_agent bind index G imap-fetch-mail BIN mutt/.mutt/yorick_pass.gpg Binary file not shown. Loading… Cancel Save
ESSENTIALAI-STEM